type,product,versions,abstract,apars,fixedIn,ifixes,bulletinUrl,filesets,issued,updated,siblings,download,cvss,reboot sec,aix,OpenSSL,AIX is vulnerable to arbitrary code execution (CVE-2024-4741) and denial of service (CVE-2024-5535 CVE-2024-4603) due to OpenSSL,1112400a / 1122400a / 3013sa / 3013ma / CVE-2024-4603 / CVE-2024-4741 / CVE-2024-5535,See Bulletin,1112400a.240722.epkg.Z 1122400a.240722.epkg.Z 3013sa.240722.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory42.asc,openssl.base:1.1.1.0-1.1.1.2400 openssl.base:1.1.2.0-1.1.2.2400 openssl.base:3.0.0.0-3.0.13.1000,20240730, ,,https://aix.software.ibm.com/aix/efixes/security/openssl_fix42.tar,CVE-2024-4603:3.7 / CVE-2024-4741:8.1 / CVE-2024-5535:3.7,no sec,aix,cURL,AIX is vulnerable to security restrictions bypass due to curl,2466ma / 46218ma / curl7791mb / curl812sa / curl7791a / 32221a / CVE-2022-32221,See Bulletin,32221a.230524.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/curl_advisory.asc,oss.lib.libcurl:7.79.1.0-7.79.1.0,20230526, ,,https://aix.software.ibm.com/aix/efixes/security/curl_fix.tar,CVE-2022-32221:8.2,no sec,aix,cURL,Multiple vulnerabilities cURL libcurl affect AIX,2466ma / 46218ma / curl7791mb / curl812sa / curl7791a / CVE-2022-27782 / CVE-2022-32206 / CVE-2022-43551 / CVE-2022-43552 / CVE-2023-23916 / CVE-2023-27533 / CVE-2023-27534 / CVE-2023-27535 / CVE-2023-27536 / CVE-2023-27537 / CVE-2023-27538,See Bulletin,curl7791a.230622.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/curl_advisory2.asc,oss.lib.libcurl:7.79.1.0-7.79.1.0,20230629, ,,https://aix.software.ibm.com/aix/efixes/security/curl_fix2.tar,CVE-2022-27782:9.8 / CVE-2022-32206:4.3 / CVE-2022-43551:7.5 / CVE-2022-43552:5.9 / CVE-2023-23916:7.5 / CVE-2023-27533:8.2 / CVE-2023-27534:7.5 / CVE-2023-27535:5.9 / CVE-2023-27536:5.9 / CVE-2023-27537:7.5 / CVE-2023-27538:4.0,no sec,aix,cURL,Multiple vulnerabilities in cURL libcurl affect AIX,2466ma / 46218ma / curl7791mb / curl812sa / CVE-2023-38545 / CVE-2023-38546,See Bulletin,curl7791mb.231120.epkg.Z curl812sa.231120.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/curl_advisory3.asc,oss.lib.libcurl:7.79.1.0-7.79.1.0 oss.lib.libcurl:8.1.2.0-8.1.2.0,20231212, ,,https://aix.software.ibm.com/aix/efixes/security/curl_fix3.tar,CVE-2023-38545:8.1 / CVE-2023-38546:3.7,no sec,aix,cURL,AIX is vulnerable to security restrictions bypass due to cURL libcurl (CVE-2023-46218),2466ma / 46218ma / CVE-2023-46218,See Bulletin,46218ma.240227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/curl_advisory4.asc,oss.lib.libcurl:7.79.1.0-7.79.1.0 oss.lib.libcurl:8.1.2.0-8.1.2.0,20240306, ,,https://aix.software.ibm.com/aix/efixes/security/curl_fix4.tar,CVE-2023-46218:6.5,no sec,aix,cURL,AIX is vulnerable to security restrictions bypass due to cURL libcurl (CVE-2024-0853),2466ma / 853sa / CVE-2024-0853,See Bulletin,853sa.240503.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/curl_advisory5.asc,oss.lib.libcurl:8.5.0.0-8.5.0.0,20240620, ,,https://aix.software.ibm.com/aix/efixes/security/curl_fix5.tar,CVE-2024-0853:3.8,no sec,aix,cURL,AIX is vulnerable to a denial of service (CVE-2024-2398) and security restrictions bypass (CVE-2024-2466 CVE-2024-2004) due to cURL libcurl,2466ma / CVE-2024-2004 / CVE-2024-2398 / CVE-2024-2466,See Bulletin,2466ma.240719.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/curl_advisory6.asc,oss.lib.libcurl:7.79.1.0-7.79.1.0 oss.lib.libcurl:8.1.2.0-8.1.2.0 oss.lib.libcurl:8.5.0.0-8.5.0.0,20240820, ,,https://aix.software.ibm.com/aix/efixes/security/curl_fix6.tar,CVE-2024-2004:3.7 / CVE-2024-2398:5.3 / CVE-2024-2466:5.3,no sec,aix,OpenSSL,AIX is vulnerable to a denial of service (CVE-2024-6119) due to OpenSSL,3013ma / CVE-2024-6119,See Bulletin,3013ma.240923.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory43.asc,openssl.base:3.0.5.101-3.0.13.1000,20240930, ,,https://aix.software.ibm.com/aix/efixes/security/openssl_fix43.tar,CVE-2024-6119:5.3,no sec,aix,OpenSSH,AIX is vulnerable to unauthorized file access and arbitrary code execution due to OpenSSH,38408m9a / 38408m9b / 38408m9c / 81112ma / 92112ma / CVE-2023-38408 / CVE-2023-40371,See Bulletin,38408m9a.230811.epkg.Z 38408m9b.230811.epkg.Z 38408m9c.230811.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory15.asc,openssh.base.client:8.1.102.0-8.1.102.2106 openssh.base.server:8.1.102.0-8.1.102.2106 openssh.base.client:8.1.112.0-8.1.112.2000 openssh.base.server:8.1.112.0-8.1.112.2000 openssh.base.client:9.2.112.0-9.2.112.2000 openssh.base.server:9.2.112.0-9.2.112.2000,20230823, ,,https://aix.software.ibm.com/aix/efixes/security/openssh_fix15.tar,CVE-2023-38408:8.1 / CVE-2023-40371:6.2,no sec,aix,OpenSSH,AIX is vulnerable to a machine-in-the-middle attack (CVE-2023-48795) arbitrary command execution (CVE-2023-51385) and information disclosure (CVE-2023-51384) due to OpenSSH,81112ma / 92112ma / CVE-2023-48795 / CVE-2023-51384 / CVE-2023-51385,See Bulletin,81112ma.240224.epkg.Z 92112ma.240223.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory16.asc,openssh.base.client:8.1.112.0-8.1.112.2200 openssh.base.server:8.1.112.0-8.1.112.2200 openssh.base.client:9.2.112.0-9.2.112.2200 openssh.base.server:9.2.112.0-9.2.112.2200,20240228, ,,https://aix.software.ibm.com/aix/efixes/security/openssh_fix16.tar,CVE-2023-48795:5.9 / CVE-2023-51384:4.4 / CVE-2023-51385:9.8,no sec,aix,OpenSSH,AIX is vulnerable to arbitrary code execution (CVE-2024-6387) due to OpenSSH,9211224a / CVE-2024-6387,See Bulletin,9211224a.240708.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory17.asc,openssh.base.client:9.2.112.0-9.2.112.2400 openssh.base.server:9.2.112.0-9.2.112.2400,20240709, ,,https://aix.software.ibm.com/aix/efixes/security/openssh_fix17.tar,CVE-2024-6387:8.1,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerability in AIX bind,CVE-2006-0987 / IV62327,interim fix only,IV62327m9a.140709.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc,bos.net.tcp.server:5.3.12.0-5.3.12.6,20140815, ,5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027,ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar,CVE-2006-0987:5,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05,Vulnerability in AIX bind,CVE-2006-0987 / IV62146,6100-08-06,IV62146m4a.140709.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc,bos.net.tcp.server:6.1.8.0-6.1.8.17,20140815, ,5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027,https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar,CVE-2006-0987:5,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05,Vulnerability in AIX bind,CVE-2006-0987 / IV61090,7100-02-06,IV61090s4a.140603.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc,bos.net.tcp.server:7.1.2.0-7.1.2.17,20140815, ,5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027,https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar,CVE-2006-0987:5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03,Vulnerability in AIX bind,CVE-2006-0987 / IV61027,7100-03-04,IV61027s3a.140611.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc,bos.net.tcp.server:7.1.3.0-7.1.3.15,20140815,20150822,5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027,https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar,CVE-2006-0987:5,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09,Vulnerability in AIX bind,CVE-2006-0987 / IV62224,interim fix only,IV62224m9a.140709.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc,bos.net.tcp.server:6.1.7.0-6.1.7.20,20140815, ,5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027,https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar,CVE-2006-0987:5,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09,Vulnerability in AIX bind,CVE-2006-0987 / IV61093,interim fix only,IV61093s9a.140603.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc,bos.net.tcp.server:7.1.1.0-7.1.1.20,20140815, ,5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027,https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar,CVE-2006-0987:5,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5,Vulnerability in VIOS bind,CVE-2006-0987,2.2.2.6,IV62146m4a.140709.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc,bos.net.tcp.server:6.1.8.0-6.1.8.17,20140815, ,5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027,https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar,CVE-2006-0987:5,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3,Vulnerability in VIOS bind,CVE-2006-0987,2.2.3.4,IV62225m3a.140708.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc,bos.net.tcp.server:6.1.9.0-6.1.9.3,20140815, ,5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027,https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar,CVE-2006-0987:5,no sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8,Vulnerability in VIOS bind,CVE-2006-0987,interim fix only,IV62224m9a.140709.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc,bos.net.tcp.server:6.1.7.0-6.1.7.20,20140815, ,5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027,https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar,CVE-2006-0987:5,no sec,aix,Openssh,AIX OpenSSH Vulnerability,CVE-2010-5107,See advisory,OpenSSH_6.0.0.6102.tar.Z DEPRECATED::6201_mfix,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory2.asc,openssh.base.server:6.0.0.0-6.0.0.6101,20130408,20130802,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2010-5107:5.0,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,AIX OpenSSL Vulnerability,CVE-2010-5298,Openssl-1.0.1.503,openssl-1.0.1.503.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory8.asc,openssl.base:1.0.1.500-1.0.1.502,20140606, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2010-5298:4,no sec,aix,Openssl,AIX OpenSSL Vulnerability,CVE-2010-5298,Openssl-1.0.1.503,openssl-1.0.1.503.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory8.asc,openssl.base:1.0.1.500-1.0.1.502,20140606, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2010-5298:4,no sec,aix,Openssl,Multiple OpenSSL vulnerabilities,CVE-2011-4108 / CVE-2011-4109 / CVE-2011-4576 / CVE-2011-4619,7100-02-00,openssl.0.9.8.1801.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc,openssl.base:0.9.8.0-0.9.8.1800 openssl.base:12.9.8.0-12.9.8.1800,20120321,20120605,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2011-4108:4.3 / CVE-2011-4109:9.3 / CVE-2011-4576:5.0 / CVE-2011-4619:5.0,no sec,aix,openssl,Multiple OpenSSL vulnerabilities,CVE-2012-0884 / CVE-2012-1165 / CVE-2012-2110 / CVE-2012-2131 / CVE-2012-2333,See advisory,openssl-0.9.8.1802.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory4.asc,openssl.base:0.9.8.0-0.9.8.1801 openssl.base:12.9.8.0-12.9.8.1801,20120801, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2012-0884:5.0 / CVE-2012-1165:5.0 / CVE-2012-2110:7.5 / CVE-2012-2131:7.5 / CVE-2012-2333:6.8,no sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8 :: 2.2.1.9,Arbitary file overwrite symlink in libodm,CVE-2012-2179,2.2.1.10,IV60313s9a.140515.epkg.Z,https://www.ibm.com/support/pages/node/5740875,bos.rte.odm:6.1.7.0-6.1.7.15,20120614, ,6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303,https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar,CVE-2012-2179:6.9,yes sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4,Arbitary file overwrite symlink in libodm,CVE-2012-2179,2.2.2.5,IV60311s4a.140515.epkg.Z,https://www.ibm.com/support/pages/node/5740875,bos.rte.odm:6.1.8.0,20120614, ,6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303,https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar,CVE-2012-2179:6.9,yes sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2,Arbitary file overwrite symlink in libodm,CVE-2012-2179,2.2.3.3,IV60299s2a.140515.epkg.Z,https://www.ibm.com/support/pages/node/5740875,bos.rte.odm:6.1.9.0,20120614, ,6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303,https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar,CVE-2012-2179:6.9,yes sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4,Vulnerability in use of socketpair,CVE-2012-2192,2.2.1.5,IV21128s04.VIOS2214.120531.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair,bos.mp64:6.1.7.0-6.1.7.3,20120605, ,6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357,https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar,CVE-2012-2192:4.9,yes sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3,VIOS NFSv4 vulnerability,CVE-2012-4817,2.2.1.4,n/a,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201209/SECURITY/20120913/datafile151835&label=VIOS%20NFSv4%20Vulnerability%20CVE-2012-4817,bos.net.nfs.client:6.1.7.0-6.1.7.2,20120913, ,6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357,https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar,CVE-2012-4817:5,yes sec,aix,Openssl,Multiple OpenSSL vulnerabilities,CVE-2013-0169 / CVE-2013-0166,See advisory,openssl-0.9.8.2500.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory5.asc,openssl.base:0.9.8.0-0.9.8.2400 openssl.base:12.9.8.0-12.9.8.2400,20130315,20130605,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2013-0169:4.3 / CVE-2013-0166:5.0,no sec,aix,Openssl,Multiple OpenSSL vulnerabilities,CVE-2013-4353 / CVE-2013-6450 / CVE-2013-6449,7100-04-00,openssl-1.0.1.501.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory6.asc,openssl.base:1.0.1.500,20140225,20140303,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2013-4353:5 / CVE-2013-6450:4.3 / CVE-2013-6449:4.3,no sec,aix,Openssh,AIX OpenSSH Vulnerability,CVE-2013-4548,7100-04-00,OpenSSH_6.0.0.6104.tar.Z DEPRECATED::6201_mfix,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory3.asc,openssh.base.server:6.0.0.6103,20140221,20140416,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2013-4548:6.0,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / IV58413,6100-07-10,IV58413s9a.140421.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc,bos.net.tcp.client:6.1.7.0-6.1.7.20 ntp.rte:6.1.6.0-6.1.6.1,20140612, ,5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324,https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar,CVE-2013-5211:5.0,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / IV58068,6100-08-05,IV58068s4a.140421.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc,bos.net.tcp.client:6.1.8.0-6.1.8.17 ntp.rte:6.1.6.0-6.1.6.1,20140612, ,5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324,https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar,CVE-2013-5211:5.0,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / IV56213,6100-09-03,IV56213s1a.140421.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.1 ntp.rte:6.1.6.0-6.1.6.1,20140612, ,5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324,https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar,CVE-2013-5211:5.0,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / IV56573,7100-01-10,IV56575s9a.140421.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc,bos.net.tcp.client:7.1.1.0-7.1.1.20 ntp.rte:7.1.0.0-7.1.0.1,20140612, ,5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324,https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar,CVE-2013-5211:5.0,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / IV55365,7100-02-05,IV55365s4a.140421.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc,bos.net.tcp.client:7.1.2.0-7.1.2.17 ntp.rte:7.1.0.0-7.1.0.1,20140612, ,5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324,https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar,CVE-2013-5211:5.0,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / IV56324,7100-03-03,IV56324s2a.140522.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc,bos.net.tcp.client:7.1.3.0-7.1.3.2 ntp.rte:7.1.0.0-7.1.0.1,20140612, ,5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324,https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar,CVE-2013-5211:5.0,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / IV59636,interim fix only,IV59636s9a.140423.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10 ntp.rte:6.1.6.0-6.1.6.1,20140612, ,5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324,https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar,CVE-2013-5211:5.0,no sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8,Network Time Protocol (NTP) vulnerability in VIOS,CVE-2013-5211 / IV58413,2.2.1.9,IV58413s9a.140421.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc,bos.net.tcp.client:6.1.7.0-6.1.7.20 ntp.rte:6.1.6.0-6.1.6.1,20140612, ,5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324,https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar,CVE-2013-5211:5.0,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4,Network Time Protocol (NTP) vulnerability in VIOS,CVE-2013-5211 / IV58068,2.2.2.5,IV58068s4a.140421.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc,bos.net.tcp.client:6.1.8.0-6.1.8.17 ntp.rte:6.1.6.0-6.1.6.1,20140612, ,5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324,https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar,CVE-2013-5211:5.0,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2,Network Time Protocol (NTP) vulnerability in VIOS,CVE-2013-5211 / IV56213,2.2.3.3,IV56213s1a.140421.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.1 ntp.rte:6.1.6.0-6.1.6.1,20140612, ,5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324,https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar,CVE-2013-5211:5.0,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295,6100-08-07,IV68426m5b.150204.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc,bos.net.tcp.client:6.1.8.0-6.1.8.18 ntp.rte:6.1.6.0-6.1.6.2,20150210, ,5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430,https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar,CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295,6100-09-05,IV68428s4a.150109.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc,bos.net.tcp.client:6.1.9.0-6.1.9.30 ntp.rte:6.1.6.0-6.1.6.2,20150210, ,5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430,https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar,CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295,7100-02-07,IV68429m5b.150204.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc,bos.net.tcp.client:7.1.2.0-7.1.2.18 ntp.rte:7.1.0.0-7.1.0.2,20150210, ,5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430,https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar,CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295,7100-03-05,IV68430s4a.150109.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc,bos.net.tcp.client:7.1.3.0-7.1.3.30 ntp.rte:7.1.0.0-7.1.0.2,20150210, ,5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430,https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar,CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Network Time Protocol (NTP) vulnerability in AIX,CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295,N/A,IV68427m9a.150203.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20150210, ,5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430,ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar,CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6,Network Time Protocol (NTP) vulnerability in VIOS,CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295,2.2.2.7,IV68426m5b.150204.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc,bos.net.tcp.client:6.1.8.0-6.1.8.18 ntp.rte:6.1.6.0-6.1.6.2,20150210, ,5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430,https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar,CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4,Network Time Protocol (NTP) vulnerability in VIOS,CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295,2.2.3.5,IV68428s4a.150109.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc,bos.net.tcp.client:6.1.9.0-6.1.9.30 ntp.rte:6.1.6.0-6.1.6.2,20150210, ,5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430,https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar,CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5,no sec,aix,Java,Multiple Java vulnerabilities,CVE-2013-5456 / CVE-2013-5457 / CVE-2013-5458 / CVE-2013-4041 / CVE-2013-5375 / CVE-2013-5372 / CVE-2013-5843 / CVE-2013-5789 / CVE-2013-5830 / CVE-2013-5829 / CVE-2013-5787 / CVE-2013-5788 / CVE-2013-5824 / CVE-2013-5842 / CVE-2013-5782 / CVE-2013-5817 / CVE-2013-5809 / CVE-2013-5814 / CVE-2013-5832 / CVE-2013-5850 / CVE-2013-5838 / CVE-2013-5802 / CVE-2013-5812 / CVE-2013-5804 / CVE-2013-5783 / CVE-2013-3829 / CVE-2013-5823 / CVE-2013-5831 / CVE-2013-5820 / CVE-2013-5819 / CVE-2013-5818 / CVE-2013-5848 / CVE-2013-5776 / CVE-2013-5774 / CVE-2013-5825 / CVE-2013-5840 / CVE-2013-5801 / CVE-2013-5778 / CVE-2013-5851 / CVE-2013-5800 / CVE-2013-5784 / CVE-2013-5849 / CVE-2013-5790 / CVE-2013-5780 / CVE-2013-5797 / CVE-2013-5803 / CVE-2013-5772,See advisory,see advisory,https://aix.software.ibm.com/aix/efixes/security/java_advisory.asc,Java5:5.0.0.0-5.0.0.560 Java6:6.0.0.0-6.0.0.435 Java7:7.0.0.0-7.0.0.110,20131211,20140203,n/a,see advisory,CVE-2013-5456:9.3 / CVE-2013-5457:9.3 / CVE-2013-5458:9.3 / CVE-2013-4041:6.8 / CVE-2013-5375:4.3 / CVE-2013-5372:4.3 / CVE-2013-5843:10 / CVE-2013-5789:10 / CVE-2013-5830:10 / CVE-2013-5829:10 / CVE-2013-5787:10 / CVE-2013-5788:10 / CVE-2013-5824:10 / CVE-2013-5842:10 / CVE-2013-5782:10 / CVE-2013-5817:10 / CVE-2013-5809:10 / CVE-2013-5814:10 / CVE-2013-5832:9.3 / CVE-2013-5850:9.3 / CVE-2013-5838:9.3 / CVE-2013-5802:7.5 / CVE-2013-5812:6.4 / CVE-2013-5804:6.4 / CVE-2013-5783:6.4 / CVE-2013-3829:6.4 / CVE-2013-5823:5 / CVE-2013-5831:5 / CVE-2013-5820:5 / CVE-2013-5819:5 / CVE-2013-5818:5 / CVE-2013-5848:5 / CVE-2013-5776:5 / CVE-2013-5774:5 / CVE-2013-5825:5 / CVE-2013-5840:5 / CVE-2013-5801:5 / CVE-2013-5778:5 / CVE-2013-5851:5 / CVE-2013-5800:4.3 / CVE-2013-5784:4.3 / CVE-2013-5849:4.3 ,no sec,aix,Openssl,Openssl Heartbleed vulnerability,CVE-2014-0160,Openssl-1.0.1.502,Openssl-1.0.1.502,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory7.doc,openssl.base:1.0.1.500-1.0.1.501,20140410,20140415,n/a,https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=aixbp&lang=en_US&S_PKG=openssl&cp=UTF-8,CVE-2014-0160:5.0 / CVE-2014-0076:2.1,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03,Vulnerability in AIX bind,CVE-2014-0191 / IV62225,6100-09-04,IV62225m3a.140708.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc,bos.net.tcp.server:6.1.9.0-6.1.9.3,20140815, ,5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027,https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar,CVE-2006-0987:5,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04,AIX libxml2 vulnerability,CVE-2014-0191 / IV62447,6100-08-05,IV62447s4a.140715.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc,bos.rte.control:6.1.8.0-6.1.8.17,20140815, ,6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar,CVE-2014-0191:5.0,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03,AIX libxml2 vulnerability,CVE-2014-0191 / IV62448,6100-09-04,IV62448s3a.140715.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc,bos.rte.control:6.1.9.0-6.1.9.15,20140815, ,6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar,CVE-2014-0191:5.0,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04,AIX libxml2 vulnerability,CVE-2014-0191 / IV62449,7100-02-05,IV62449s4a.140715.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc,bos.rte.control:7.1.2.0-7.1.2.17,20140815, ,6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar,CVE-2014-0191:5.0,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03,AIX libxml2 vulnerability,CVE-2014-0191 / IV62450,7100-03-04,IV62450s3a.140715.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc,bos.rte.control:7.1.3.0-7.1.3.15,20140815, ,6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar,CVE-2014-0191:5.0,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4,VIOS libxml2 vulnerability,CVE-2014-0191,2.2.2.5,IV62447s4a.140715.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc,bos.rte.control:6.1.8.0-6.1.8.17,20140815, ,6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar,CVE-2014-0191:5.0,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3,VIOS libxml2 vulnerability,CVE-2014-0191,2.3.3.4,IV62448s3a.140715.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc,bos.rte.control:6.1.9.0-6.1.9.15,20140815, ,6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar,CVE-2014-0191:5.0,no sec,aix,Openssl,AIX OpenSSL Vulnerabilities (Multiple CVEs),CVE-2014-0224 / CVE-2014-0221 / CVE-2014-0195 / CVE-2014-0198 / CVE-2014-3470,Openssl-1.0.1.511 openssl-0.9.8.2502 openssl-12.9.8.2502,openssl-1.0.1.511.tar.Z / openssl-0.9.8.2502.tar.Z / openssl-12.9.8.2502.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc,openssl.base:1.0.1.500-1.0.1.510 openssl.base:0.9.8.401-0.9.8.2501 openssl.base:12.9.8.1100-12.9.8.2501,20140611, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2014-0224:5.8 / CVE-2014-0221:4.3 / CVE-2014-0195:7.5 / CVE-2014-0198:4.3 / CVE-2014-3470:4.3,no sec,aix,Java,AIX Java Multiple Vulnerabilities (Oracle Java 2014 CPU),CVE-2014-0428 / CVE-2014-0422 / CVE-2013-5907 / CVE-2014-0415 / CVE-2014-0410 / CVE-2013-5889 / CVE-2014-0417 / CVE-2014-0387 / CVE-2014-0424 / CVE-2013-5878 / CVE-2014-0373 / CVE-2014-0375 / CVE-2014-0403 / CVE-2014-0423 / CVE-2014-0376 / CVE-2013-5910 / CVE-2013-5884 / CVE-2013-5896 / CVE-2013-5899 / CVE-2014-0416 / CVE-2013-5887 / CVE-2014-0368 / CVE-2013-5888 / CVE-2013-5898 / CVE-2014-0411,See advisory,see advisory,https://aix.software.ibm.com/aix/efixes/security/java_jan2014_advisory.asc,Java5:5.0.0.0-5.0.0.559 Java6:6.0.0.0-6.0.0.434 Java7:7.0.0.0-7.0.0.109,20140306, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=dka&S_PKG=aix64j7b&S_TACT=105AGX05&S_CMP=JDK,CVE-2014-0428:10 / CVE-2014-0422:10 / CVE-2013-5907:10 / CVE-2014-0415:10 / CVE-2014-0410:10 / CVE-2013-5889:9.3 / CVE-2014-0417:9.3 / CVE-2014-0387:7.6 / CVE-2014-0424:7.5 / CVE-2013-5878:7.5 / CVE-2014-0373:7.5 / CVE-2014-0375:5.8 / CVE-2014-0403:5.8 / CVE-2014-0423:5.5 / CVE-2014-0376:5 / CVE-2013-5910:5 / CVE-2013-5884:5 / CVE-2013-5896:5 / CVE-2013-5899:5 / CVE-2014-0416:5 / CVE-2013-5887:5 / CVE-2014-0368:5 / CVE-2013-5888:4.6 / CVE-2013-5898:4 / CVE-2014-0411:4,no sec,aix,Java,Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition,CVE-2014-0457 / CVE-2014-2421 / CVE-2014-0429 / CVE-2014-0461 / CVE-2014-0455 / CVE-2014-2428 / CVE-2014-0448 / CVE-2014-0454 / CVE-2014-0446 / CVE-2014-0452 / CVE-2014-0451 / CVE-2014-2402 / CVE-2014-2423 / CVE-2014-2427 / CVE-2014-0458 / CVE-2014-2414 / CVE-2014-2412 / CVE-2014-2409 / CVE-2014-0460 / CVE-2013-6954 / CVE-2013-6629 / CVE-2014-2401 / CVE-2014-0449 / CVE-2014-0459 / CVE-2014-0453 / CVE-2014-2398 / CVE-2014-1876 / CVE-2014-2420 / CVE-2014-0878,See advisory,see advisory,https://aix.software.ibm.com/aix/efixes/security/java_apr2014_advisory.asc,Java5:5.0.0.0-5.0.0.575 Java6:6.0.0.0-6.0.0.455 Java7:7.0.0.0-7.0.0.130 Java7:7.1.0.0-7.1.0.10,20140619, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=dka,CVE-2014-0457:10 / CVE-2014-2421:10 / CVE-2014-0429:10 / CVE-2014-0461:9.3 / CVE-2014-0455:9.3 / CVE-2014-2428:7.6 / CVE-2014-0448:7.6 / CVE-2014-0454:7.5 / CVE-2014-0446:7.5 / CVE-2014-0452:7.5 / CVE-2014-0451:7.5 / CVE-2014-2402:7.5 / CVE-2014-2423:7.5 / CVE-2014-2427:7.5 / CVE-2014-0458:7.5 / CVE-2014-2414:7.5 / CVE-2014-2412:7.5 / CVE-2014-2409:6.4 / CVE-2014-0460:5.8 / CVE-2013-6954:5 / CVE-2013-6629:5 / CVE-2014-2401:5 / CVE-2014-0449:5 / CVE-2014-0459:4.3 / CVE-2014-0453:4 / CVE-2014-2398:3.5 / CVE-2014-1876:2.6 / CVE-2014-2420:2.6 / CVE-2014-0878:5.8,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,AIX OpenSSH Vulnerability,CVE-2014-2532 / CVE-2014-2653,Openssh-6.0.0.6107,OpenSSH_6.0.0.6107.tar.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3619&myns=pwraix71&mync=E,openssh.base:4.0.0.5200-6.0.0.6106,20140617, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2014-2532:5 / CVE-2014-2653:4.3,no sec,aix,Openssh,AIX OpenSSH Vulnerability,CVE-2014-2532 / CVE-2014-2653,Openssh-6.0.0.6107,OpenSSH_6.0.0.6107.tar.Z DEPRECATED::6201_mfix,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc,openssh.base:4.0.0.5200-6.0.0.6106,20140617, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2014-2532:5 / CVE-2014-2653:4.3,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,AIX Malloc vulnerability,CVE-2014-3074 / IV62812,interim fix only,IV62812s9a.140728.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc,bos.rte.libc:5.3.12.0-5.3.12.9,20140630,20150311,5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808,https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar,CVE-2014-3074:7.2,yes sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09,AIX Malloc vulnerability,CVE-2014-3074 / IV62802,6100-07-10,IV62802s9a.140730.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc,bos.rte.libc:6.1.7.0-6.1.7.20,20140630,20150311,5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808,https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar,CVE-2014-3074:7.2,yes sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05,AIX Malloc vulnerability,CVE-2014-3074 / IV62803,6100-08-06,IV62803s4a.140730.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc,bos.rte.libc:6.1.8.0-6.1.8.18,20140630,20150311,5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808,https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar,CVE-2014-3074:7.2,yes sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03,AIX Malloc vulnerability,CVE-2014-3074 / IV62805,6100-09-04,IV62805s3a.140731.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc,bos.rte.libc:6.1.9.0-6.1.9.15,20140630,20150311,5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808,https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar,CVE-2014-3074:7.2,yes sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09,AIX Malloc vulnerability,CVE-2014-3074 / IV62806,7100-01-10,IV62806s9a.140730.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc,bos.rte.libc:7.1.1.0-7.1.1.20,20140630,20150311,5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808,https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar,CVE-2014-3074:7.2,yes sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05,AIX Malloc vulnerability,CVE-2014-3074 / IV62807,7100-02-06,IV62807s4a.140730.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc,bos.rte.libc:7.1.2.0-7.1.2.18,20140630,20150310,5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808,https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar,CVE-2014-3074:7.2,yes sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03,AIX Malloc vulnerability,CVE-2014-3074 / IV62808,7100-03-04,IV62808s3a.140731.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc,bos.rte.libc:7.1.3.0-7.1.3.15,20140630,20150311,5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808,https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar,CVE-2014-3074:7.2,yes sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8,VIOS Malloc vulnerability,CVE-2014-3074 / IV62802,2.2.1.9,IV62802s9a.140730.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc,bos.rte.libc:6.1.7.0-6.1.7.20,20140630,20150311,6100-07:IV61313 6100-08:IV61311 6100-09:IV60935 7100-01:IV61315 7100-02:IV61314 7100-03:IV60940,https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar,CVE-2014-3074:7.2,yes sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4,VIOS Malloc vulnerability,CVE-2014-3074 / IV62803,2.2.2.5,IV62803s4a.140730.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc,bos.rte.libc:6.1.8.0-6.1.8.18,20140630,20150311,5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808,https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar,CVE-2014-3074:7.2,yes sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3,VIOS Malloc vulnerability,CVE-2014-3074 / IV62805,2.2.3.4,IV62805s3a.140731.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc,bos.rte.libc:6.1.9.0-6.1.9.15,20140630,20150311,5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808,https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar,CVE-2014-3074:7.2,yes sec,aix,Openssl,AIX OpenSSL Denial of Service due to double free and others,CVE-2014-3505 / CVE-2014-3506 / CVE-2014-3507 / CVE-2014-3508 / CVE-2014-3509 / CVE-2014-3510 / CVE-2014-3511 / CVE-2014-3512 / CVE-2014-5139,See advisory,101_fix.140902.epkg.Z 098_fix.140902.epkg.Z 1298_fix.140902.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc,openssl.base:1.0.1.500-1.0.1.511 openssl.base:0.9.8.401-0.9.8.2502 openssl.base:12.9.8.1100-12.9.8.2502,20140909, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix10.tar,CVE-2014-3505:5 / CVE-2014-3506:5 / CVE-2014-3507:5 / CVE-2014-3508:4.3 / CVE-2014-3509:4.3 / CVE-2014-3510:4.3 / CVE-2014-3511:4.3 / CVE-2014-3512:5 / CVE-2014-5139:5,no sec,aix,Openssl,AIX OpenSSL Denial of Service due to memory leak in DTLS / AIX OpenSSL Patch to mitigate CVE-2014-3566 / AIX OpenSSL Denial of Service due to memory consumption,CVE-2014-3513 / CVE-2014-3566 / CVE-2014-3567,See advisory,IV66250s9a.141027.epkg.Z IV66250s9b.141027.epkg.Z IV66250s9c.141027.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc,openssl.base:1.0.1.500-1.0.1.512 openssl.base:0.9.8.401-0.9.8.2503 openssl.base:12.9.8.1100-12.9.8.2503,20141029, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix11.tar,CVE-2014-3513:5 / CVE-2014-3566:4.3 / CVE-2014-3567:5,no sec,aix,Tivoli Directory Server,A security vulnerability has been identified in IBM Tivoli Directory Server shipped with AIX/VIOS,CVE-2014-3566,See advisory,See advisory,http://www-01.ibm.com/support/docview.wss?uid=swg21687611,Idsldap.*:6.0:6.1:6.2:6.3:6.3.1,20141021, ,n/a,n/a,CVE-2014-3566:4.3,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,Vulnerability in SSLv3 affects AIX,CVE-2014-3566 / IV69768,6100-08-07,IV69768s6a.150515.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc,bos.net.tcp.server:6.1.0.0-6.1.8.18 bos.net.tcp.client:6.1.0.0-6.1.8.19,20150617,20150626,6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar,CVE-2014-3566:4.3,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05,Vulnerability in SSLv3 affects AIX,CVE-2014-3566 / IV73324,6100-09-06,IV73324s5a.150515.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc,bos.net.tcp.server:6.1.0.0-6.1.9.45 bos.net.tcp.client:6.1.0.0-6.1.9.48,20150617,20150626,6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar,CVE-2014-3566:4.3,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,Vulnerability in SSLv3 affects AIX,CVE-2014-3566 / IV73319,7100-03-06,IV73319s6a.150515.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc,bos.net.tcp.server:7.1.3.0-7.1.2.18 bos.net.tcp.client:7.1.3.0-7.1.2.19,20150617,20150626,6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar,CVE-2014-3566:4.3,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05,Vulnerability in SSLv3 affects AIX,CVE-2014-3566 / IV73316,7100-03-06,IV73316s5a.150515.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc,bos.net.tcp.server:7.1.3.0-7.1.3.45 bos.net.tcp.client:7.1.3.0-7.1.3.48,20150617,20150626,6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar,CVE-2014-3566:4.3,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6,Vulnerability in SSLv3 affects VIOS,CVE-2014-3566 / IV69768,2.2.2.7,IV69768s6a.150515.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc,bos.net.tcp.server:6.1.0.0-6.1.8.18 bos.net.tcp.client:6.1.0.0-6.1.8.19,20150617,20150618,6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar,CVE-2014-3566:4.3,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50,Vulnerability in SSLv3 affects VIOS,CVE-2014-3566 / IV73324,2.2.3.60,IV73324s5a.150515.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc,bos.net.tcp.server:6.1.9.0-6.1.9.45 bos.net.tcp.client:6.1.9.0-6.1.9.48,20150617,20150618,6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar,CVE-2014-3566:4.3,no sec,aix,Openssl,Multiple Security vulnerabilities in AIX OpenSSL,CVE-2014-3570 / CVE-2014-3571 / CVE-2014-3572 / CVE-2014-8275 / CVE-2015-0204 / CVE-2015-0205 / CVE-2015-0206,See advisory,IV69033s9a.150129.epkg.Z / IV69033s9b.150129.epkg.Z / IV69033s9c.150129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory12.asc,openssl.base:0.9.8.401-0.9.8.2504 openssl.base:1.0.1.500-1.0.1.513 openssl.base:12.9.8.1100-12.9.8.2504,20150204, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix12.tar,CVE-2014-3570:2.6 / CVE-2014-3571:5 / CVE-2014-3572:1.2 / CVE-2014-8275:1.2 / CVE-2015-0204:1.2 / CVE-2015-0205:2.1 / CVE-2015-0206:5,no sec,aix,rsyslog,Open Source RSyslog vulnerability,CVE-2014-3634 / CVE-2014-3683,next level,IV66633s0a.141107.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rsyslog_advisory.asc,rsyslog.base:5.8.6.1-5.8.6.3,20141114, ,n/a,https://aix.software.ibm.com/aix/efixes/security/rsyslog_fix.tar,CVE-2014-3634:5.0 / CVE-2014-3683:5.0,no sec,aix,Java,Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition,CVE-2014-4227 / CVE-2014-4262 / CVE-2014-4219 / CVE-2014-4209 / CVE-2014-4220 / CVE-2014-4268 / CVE-2014-4218 / CVE-2014-4252 / CVE-2014-4266 / CVE-2014-4265 / CVE-2014-4221 / CVE-2014-4263 / CVE-2014-4244 / CVE-2014-4208 / CVE-2014-3086,See advisory,see advisory,https://aix.software.ibm.com/aix/efixes/security/java_jul2014_advisory.asc,Java5:5.0.0.0-5.0.0.579 Java6:6.0.0.0-6.0.0.459 Java7:7.0.0.0-7.0.0.134 Java7:7.1.0.0-7.1.0.14,20140818, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=dka,CVE-2014-4227:10 / CVE-2014-4262:9.3 / CVE-2014-4219:9.3 / CVE-2014-4209:6.4 / CVE-2014-4220:5 / CVE-2014-4268:5 / CVE-2014-4218:5 / CVE-2014-4252:5 / CVE-2014-4266:5 / CVE-2014-4265:5 / CVE-2014-4221:4.3 / CVE-2014-4263:4 / CVE-2014-4244:4 / CVE-2014-4208:2.6 / CVE-2014-3086:9.3,no sec,aix,Kerberos,Multiple Security vulnerabilities in IBM NAS,CVE-2014-4341 / CVE-2014-4343 / CVE-2014-4344,See advisory,1506_fix.140813.epkg.Z 1601_fix.140813.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc,krb5.server.rte:1.5.0.0-1.6.0.1 krb5.client.rte:1.5.0.0-1.6.0.1,20140828,20140905,n/a,https://aix.software.ibm.com/aix/efixes/security/nas1_fix.tar,CVE-2014-4341:5.0 / CVE-2014-4343:5.0 / CVE-2014-4344:5.0,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-10 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09 :: 7100-01-00 :: 7100-01-01 :: 7100-01-10 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09 :: 7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06 :: 7100-02-07 :: 7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08 :: 7100-03-09 :: 7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05 :: 7100-04-06 :: 7100-05-01 :: 7100-05-02,Vulnerabilities in NTP affect AIX,CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,See Bulletin,IJ06400s9a.180514.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,See Bulletin,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,aix,7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06 :: 7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04 :: 7200-02-01 :: 7200-02-02,Vulnerabilities in NTP affect AIX,CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,See Bulletin,IJ06400s9a.180514.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,See Bulletin,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,vios,2.2.0.10 :: 2.2.0.11 :: 2.2.0.12 :: 2.2.0.13 :: 2.2.1.1 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8 :: 2.2.1.9 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6 :: 2.2.2.70 :: 2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.51 :: 2.2.3.52 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80 :: 2.2.3.90 :: 2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23 :: 2.2.4.30 :: 2.2.4.40 :: 2.2.4.50 :: 2.2.4.60 :: 2.2.5.0 :: 2.2.5.10 :: 2.2.5.20 :: 2.2.5.30 :: 2.2.5.40 :: 2.2.6.10 :: 2.2.6.21,Vulnerabilities in NTP affect VIOS,CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,See Bulletin,IJ06400s9a.180514.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,See Bulletin,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,aix,Kerberos,AIX NAS vulnerability,CVE-2014-5351,next TL,NAS_1.X.0.X_aix_image.tar.Z,https://aix.software.ibm.com/aix/efixes/security/nas_advisory2.asc,krb5.client.rte:1.5.0.7-1.6.0.2 krb5.server.rte:1.5.0.7-1.6.0.2,20150120, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2014-5351:4,no sec,aix,AIX NAS (kerberos),Multiple Security vulnerabilities in IBM NAS(kerberos),CVE-2014-5352 / CVE-2014-5355 / CVE-2014-9421 / CVE-2014-9422 / CVE-2014-9423,See advisory,1507c_fix.150404.epkg.Z 1507s_fix.150407.epkg.Z 1602c_fix.150404.epkg.Z 1602s_fix.150404.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nas_advisory3.asc,krb5.client.rte:1.4.0.8-1.6.0.2 krb5.server.rte:1.4.0.8-1.6.0.2,20150521, ,n/a,https://aix.software.ibm.com/aix/efixes/security/nas3_fix.tar,CVE-2014-5352:9.0 / CVE-2014-5355:5.0 / CVE-2014-9421:9.0 / CVE-2014-9422:6.1 / CVE-2014-9423:5.0,no sec,aix,Java,Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition; issues in the Oracle October 2014 Critical Patch Update plus the POODLE SSLv3 vulnerability and,CVE-2014-6513 / CVE-2014-6503 / CVE-2014-6532 / CVE-2014-4288 / CVE-2014-6493 / CVE-2014-6492 / CVE-2014-6458 / CVE-2014-6466 / CVE-2014-6506 / CVE-2014-6476 / CVE-2014-6515 / CVE-2014-6511 / CVE-2014-6531 / CVE-2014-6512 / CVE-2014-6457 / CVE-2014-6527 / CVE-2014-6502 / CVE-2014-6558 / CVE-2014-3065 / CVE-2014-3566,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_oct2014_advisory.asc,Java5.sdk:<5.0.0.580 Java6.sdk:<6.0.0.460 Java7.sdk:<7.0.0.135 Java71.sdk:<7.1.0.15 Java5_64.sdk:<5.0.0.580 Java6_64.sdk:<6.0.0.460 Java7_64.sdk:<7.0.0.135 Java71_64.sdk:<7.1.0.15,20141026,20141114,n/a,https://www.ibm.com/developerworks/java/jdk/aix/service.html#levels,CVE-2014-6513:10 / CVE-2014-6503:9.3 / CVE-2014-6532:9.3 / CVE-2014-4288:7.6 / CVE-2014-6493:7.6 / CVE-2014-6492:7.6 / CVE-2014-6458:6.9 / CVE-2014-6466:6.9 / CVE-2014-6506:6.8 / CVE-2014-6476:5 / CVE-2014-6515:5 / CVE-2014-6511:5 / CVE-2014-6531:4.3 / CVE-2014-6512:4.3 / CVE-2014-6457:4 / CVE-2014-6527:2.6 / CVE-2014-6502:2.6 / CVE-2014-6558:2.6 / CVE-2014-3065:6 / CVE-2014-3566:4.3,no sec,aix,Java,Multiple vulnerabilities in current releases of IBM SDK Java Technology Edition; issues disclosed in the Oracle Feb 2015 Critical Patch Update vulnerability and two additional Vuln,CVE-2014-6549 / CVE-2015-0408 / CVE-2015-0412 / CVE-2015-0403 / CVE-2015-0406 / CVE-2015-0410 / CVE-2015-0407 / CVE-2015-0400 / CVE-2014-3566 / CVE-2014-6587 / CVE-2014-6593 / CVE-2014-6591 / CVE-2014-6585 / CVE-2014-8891,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_feb2015_advisory.asc,Java5.sdk:<5.0.0.590 Java6.sdk:<6.0.0.470 Java7.sdk:<7.0.0.195 Java71.sdk:<7.1.0.75 Java5_64.sdk:<5.0.0.590 Java6_64.sdk:<6.0.0.470 Java7_64.sdk:<7.0.0.195 Java71_64.sdk:<7.1.0.75,20150219, ,n/a,See advisory,CVE-2014-6549:10 / CVE-2015-0408:10 / CVE-2015-0412:10 / CVE-2015-0403:6.9 / CVE-2015-0406:5.8 / CVE-2015-0407:5 / CVE-2015-0400:5 / CVE-2014-3566:4.3 / CVE-2014-6587:4.3 / CVE-2014-6593:4 / CVE-2014-6591:2.6 / CVE-2014-6585:2.6 / CVE-2014-8891:6.8,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerability in AIX bind,CVE-2014-8500 / CVE-2014-8500,N/A,IV68997m9a.150129.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10 bos.net.tcp.server:5.3.12.0-5.3.12.6,20150227, ,5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996,ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar,CVE-2014-8500:7.80,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,Vulnerability in AIX bind,CVE-2014-8500 / CVE-2014-8500,6100-08-07,IV68993s6a.150129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc,bos.net.tcp.client:6.1.8.0-6.1.8.19 bos.net.tcp.server:6.1.8.0-6.1.8.18,20150227, ,5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996,https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar,CVE-2014-8500:7.80,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04,Vulnerability in AIX bind,CVE-2014-8500 / CVE-2014-8500,6100-09-05,IV68994s4a.150129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc,bos.net.tcp.client:6.1.9.0-6.1.9.30 bos.net.tcp.server:6.1.9.0-6.1.9.30,20150227, ,5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996,https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar,CVE-2014-8500:7.80,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,Vulnerability in AIX bind,CVE-2014-8500 / CVE-2014-8500,7100-02-07,IV68996s4a.150129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc,bos.net.tcp.client:7.1.3.0-7.1.3.30 bos.net.tcp.server:7.1.3.0-7.1.3.30,20150227, ,5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996,https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar,CVE-2014-8500:7.80,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04,Vulnerability in AIX bind,CVE-2014-8500 / CVE-2014-8500,7100-03-05,IV68995s6a.150129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc,bos.net.tcp.client:7.1.2.0-7.1.2.19 bos.net.tcp.server:7.1.2.0-7.1.2.18,20150227, ,5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996,https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar,CVE-2014-8500:7.80,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6,Vulnerability in VIOS bind,CVE-2014-8500 / CVE-2014-8500,2.2.2.7,IV68993s6a.150129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc,bos.net.tcp.client:6.1.8.0-6.1.8.19 bos.net.tcp.server:6.1.8.0-6.1.8.18,20150227, ,5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996,https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar,CVE-2014-8500:7.80,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4,Vulnerability in VIOS bind,CVE-2014-8500 / CVE-2014-8500,2.2.3.5,IV68994s4a.150129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc,bos.net.tcp.client:6.1.9.0-6.1.9.30 bos.net.tcp.server:6.1.9.0-6.1.9.30,20150227, ,5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996,https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar,CVE-2014-8500:7.80,no sec,aix,Tivoli Directory Server,Security TLS padding vulnerability affects IBM Tivoli/Security Directory Server,CVE-2014-8730,See advisory,See advisory,http://www-01.ibm.com/support/docview.wss?uid=swg21692906,ITDS,20150123, ,n/a,http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=Security%2BSystems&product=ibm/Tivoli/Tivoli+Directory+Server&release=6.0.0.73&platform=All&function=all,CVE-2014-8730:4.3,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,Vulnerability in AIX tcpdump,CVE-2014-8769 / IV68950,6100-08-07,IV68950s5a.150205.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc,bos.net.tcp.server:6.1.8.0-6.1.8.18,20150318, ,6100-08:IV68950 6100-09:IV68992 7100-02:IV68951 7100-03:IV67588,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar,CVE-2014-8769:5.00,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04,Vulnerability in AIX tcpdump,CVE-2014-8769 / IV68992,6100-09-05,IV68992s4a.150204.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc,bos.net.tcp.server:6.1.9.0-6.1.9.30,20150318, ,6100-08:IV68950 6100-09:IV68992 7100-02:IV68951 7100-03:IV67588,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar,CVE-2014-8769:5.00,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,Vulnerability in AIX tcpdump,CVE-2014-8769 / IV68951,7100-02-07,IV68951s5a.150205.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc,bos.net.tcp.server:7.1.2.0-7.1.2.18,20150318, ,6100-08:IV68950 6100-09:IV68992 7100-02:IV68951 7100-03:IV67588,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar,CVE-2014-8769:5.00,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04,Vulnerability in AIX tcpdump,CVE-2014-8769 / IV67588,7100-03-05,IV67588s4a.150204.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc,bos.net.tcp.server:7.1.3.0-7.1.3.30,20150318, ,6100-08:IV68950 6100-09:IV68992 7100-02:IV68951 7100-03:IV67588,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar,CVE-2014-8769:5.00,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,AIX cmdlvm vulnerability,CVE-2014-8904 / IV68082,6100-08-07,IV68082s5b.150122.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc,bos.rte.lvm:6.1.8.0-6.1.8.19,20150113,20150217,5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908,https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar,CVE-2014-8904:7.2,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04,AIX cmdlvm vulnerability,CVE-2014-8904 / IV67907,6100-09-05,IV67907s4b.150122.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc,bos.rte.lvm:6.1.9.0-6.1.9.30,20150113,20150217,5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908,https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar,CVE-2014-8904:7.2,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,AIX cmdlvm vulnerability,CVE-2014-8904 / IV68478,7100-02-07,IV68478s5b.150122.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc,bos.rte.lvm:7.1.2.0-7.1.2.18,20150113,20150217,5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908,https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar,CVE-2014-8904:7.2,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04,AIX cmdlvm vulnerability,CVE-2014-8904 / IV67908,7100-03-05,IV67908s4b.150122.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc,bos.rte.lvm:7.1.3.0-7.1.3.30,20150113,20150217,5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908,https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar,CVE-2014-8904:7.2,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,AIX cmdlvm vulnerability,CVE-2014-8904 / IV68070,N/A,IV68070s9b.150122.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc,bos.rte.lvm:5.3.12.0-5.3.12.9,20150113,20150120,5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908,ftp://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar,CVE-2014-8904:7.2,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6,VIOS cmdlvm vulnerability,CVE-2014-8904 / IV68082,2.2.2.7,IV68082s5b.150122.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc,bos.rte.lvm:6.1.8.0-6.1.8.19,20150113,20150217,5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908,https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar,CVE-2014-8904:7.2,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4,VIOS cmdlvm vulnerability,CVE-2014-8904 / IV67907,2.2.3.5,IV67907s4b.150122.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc,bos.rte.lvm:6.1.9.0-6.1.9.30,20150113,20150217,5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908,https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar,CVE-2014-8904:7.2,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05,Vulnerabilities in NTPv4 affect AIX,CVE-2014-9297 / CVE-2015-1799,6100-09-06,IV71094s0a.150618.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc,ntp.rte:6.1.6.0-6.1.6.4,20150629, ,6100-09:IV71094 7100-03:IV71096,https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar,CVE-2014-9297:5.00 / CVE-2015-1799:5.40,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05,Vulnerabilities in NTPv4 affect AIX,CVE-2014-9297 / CVE-2015-1799,7100-03-06,IV71096s0a.150618.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc,ntp.rte:7.1.0.0-7.1.0.4,20150629, ,6100-09:IV71094 7100-03:IV71096,https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar,CVE-2014-9297:5.00 / CVE-2015-1799:5.40,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50,Vulnerabilities in NTPv4 affect VIOS,CVE-2014-9297 / CVE-2015-1799,2.2.3.60,IV71094s0a.150618.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc,ntp.rte:6.1.6.0-6.1.6.4,20150629, ,6100-09:IV71094 7100-03:IV71096,https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar,CVE-2014-9297:5.00 / CVE-2015-1799:5.40,no sec,aix,GSKit,The GSKit that is shipped with IBM Security/Tivoli Directory Server contains multiple security vulnerabilities including the FREAK: Factoring Attack on RSA-EXPORT keys TLS/SSL clie,CVE-2015-0138 / CVE-2015-0159,See advisory,See advisory,http://www-01.ibm.com/support/docview.wss?uid=isg3T1022075,ISDS:6.3.1 ITDS:6.3 ITDS:6.2 ITDS:6.1 ITDS:6.0 GSKit:<8.0.50.41 GSKit:<7.0.5.5,20150313, ,n/a,See advisory,CVE-2015-0159:4.3,no sec,aix,Java,AIX IBM SDK Java JSSE vulnerability,CVE-2015-0138,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/javajsse_advisory.asc,Java5.sdk:<5.0.0.590 Java6.sdk:<6.0.0.470 Java7.sdk:<7.0.0.195 Java71.sdk:<7.1.0.75 Java5_64.sdk:<5.0.0.590 Java6_64.sdk:<6.0.0.470 Java7_64.sdk:<7.0.0.195 Java71_64.sdk:<7.1.0.75,20150413, ,n/a,See advisory,CVE-2015-0138:4.3,no sec,aix,Openssl,Multiple Security vulnerabilities in AIX OpenSSL,CVE-2015-0209 / CVE-2015-0286 / CVE-2015-0287 / CVE-2015-0288 / CVE-2015-0289 / CVE-2015-0292 / CVE-2015-0293,See advisory,IV71446m9a.150410.epkg.Z IV71446m9b.150410.epkg.Z IV71446m9c.150410.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory13.asc,openssl.base:1.0.1.500-1.0.1.513 openssl.base:0.9.8.401-0.9.8.2504 openssl.base:12.9.8.1100-12.9.8.2504,20150413, ,n/a,See advisory,CVE-2015-0209:7.5 / CVE-2015-0286:5 / CVE-2015-0287:7.5 / CVE-2015-0288:5 / CVE-2015-0289:5 / CVE-2015-0292:7.5 / CVE-2015-0293:5,no sec,aix,Java,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2015-0491 / CVE-2015-0459 / CVE-2015-0469 / CVE-2015-0458 / CVE-2015-0480 / CVE-2015-0486 / CVE-2015-0488 / CVE-2015-0478 / CVE-2015-0477 / CVE-2015-2808 / CVE-2015-1916 / CVE-2015-1914 / CVE-2015-0192 / CVE-2015-0204,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_april2015_advisory.asc,Java5.sdk:<5.0.0.600 Java6.sdk:<6.0.0.480 Java7.sdk:<7.0.0.205 Java71.sdk:<7.1.0.85 Java5_64.sdk:<5.0.0.600 Java6_64.sdk:<6.0.0.480 Java7_64.sdk:<7.0.0.205 Java71_64.sdk:<7.1.0.85,20150603, ,n/a,See advisory,CVE-2015-0491:10 / CVE-2015-0459:10 / CVE-2015-0469:10 / CVE-2015-0458:7.6 / CVE-2015-0480:5.8 / CVE-2015-0488:5 / CVE-2015-0478:4.3 / CVE-2015-0477:4.3 / CVE-2015-0204:4.3 / CVE-2015-0192:6.8 / CVE-2015-0486:5 / CVE-2015-2808:5 / CVE-2015-1916:5 / CVE-2015-1914:4.3 / CVE-2015-0138:4.3,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05,Vulnerability in NTPv3 affects AIX,CVE-2015-1799 / IV73783,7100-03-06,IV73783s5a.150714.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc,bos.net.tcp.client:6.1.9.0-6.1.9.45,20150821, ,6100-09:IV73783 7100-03:IV74261,https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar,CVE-2015-1799:5.4,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05,Vulnerability in NTPv3 affects AIX,CVE-2015-1799 / IV74261,7100-03-06,IV74261s5a.150714.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc,bos.net.tcp.client:7.1.3.0-7.1.3.45,20150821, ,6100-09:IV73783 7100-03:IV74261,https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar,CVE-2015-1799:5.4,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,Vulnerability in NTPv3 affects AIX,CVE-2015-1799 / IV74263,next TL,IV74263s6a.150714.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc,bos.net.tcp.client:6.1.8.0-6.1.8.19,20150821, ,6100-09:IV73783 7100-03:IV74261,https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar,CVE-2015-1799:5.4,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,Vulnerability in NTPv3 affects AIX,CVE-2015-1799 / IV74261,next TL,IV74262s6a.150714.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc,bos.net.tcp.client:7.1.2.0-7.1.2.19,20150821, ,6100-09:IV73783 7100-03:IV74261,https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar,CVE-2015-1799:5.4,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50,Vulnerability in NTPv3 affects VIOS,CVE-2015-1799 / IV73783,2.2.3.60,IV73783s5a.150714.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc,bos.net.tcp.client:6.1.9.0-6.1.9.45,20150821, ,6100-09:IV73783 7100-03:IV74261,https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar,CVE-2015-1799:5.4,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6,Vulnerability in NTPv3 affects VIOS,CVE-2015-1799 / IV74263,next TL,IV74263s6a.150714.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc,bos.net.tcp.client:6.1.8.0-6.1.8.19,20150821, ,6100-09:IV73783 7100-03:IV74261,https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar,CVE-2015-1799:5.4,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6 :: 2.2.2.70,Vulnerability in netstat affects VIOS,CVE-2015-1799 / IV77037,next TL,IV77037s7a.150924.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc,bos.net.tcp.client:6.1.8.0-6.1.8.20,20151012, ,6100-09:IV75940 7100-03:IV77299,https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar,CVE-2015-4948:7.4,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2015-2638 / CVE-2015-4733 / CVE-2015-4732 / CVE-2015-2590 / CVE-2015-4731 / CVE-2015-4760 / CVE-2015-4736 / CVE-2015-4748 / CVE-2015-2664 / CVE-2015-2632 / CVE-2015-2637 / CVE-2015-2619 / CVE-2015-2621 / CVE-2015-2613 / CVE-2015-2601 / CVE-2015-4749 / CVE-2015-4729 / CVE-2015-2625 / CVE-2015-1931,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_july2015_advisory.asc,Java5.sdk:<5.0.0.615 Java6.sdk:<6.0.0.495 Java7.sdk:<7.0.0.255 Java71.sdk:<7.1.0.135 Java5_64.sdk:<5.0.0.615 Java6_64.sdk:<6.0.0.495 Java7_64.sdk:<7.0.0.255 Java71_64.sdk:<7.1.0.135,20150731, ,n/a,See advisory,CVE-2015-4000:4.3 / CVE-2015-2638:10 / CVE-2015-4733:10 / CVE-2015-4732:10 / CVE-2015-2590:10 / CVE-2015-4731:10 / CVE-2015-4760:10 / CVE-2015-4736:9.3 / CVE-2015-4748:7.6 / CVE-2015-2664:6.9 / CVE-2015-2632:5 / CVE-2015-2637:5 / CVE-2015-2619:5 / CVE-2015-2621:5 / CVE-2015-2613:5 / CVE-2015-2601:5 / CVE-2015-4749:4.3 / CVE-2015-4729:4 / CVE-2015-2625:2.6 / CVE-2015-1931:2.1,no sec,aix,GSKit & IBM SDK for Java & IBM SDK for Node.js,Vulnerability in RC4 stream cipher affects AIX,CVE-2015-2808,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc,Java71:<=7.1.0.75 Java7:<=7.0.0.195 Java6:<=6.0.0.470 Java5:<=5.0.0.590 Node.js:<1.1.0.13,20150427,20150429,n/a,See advisory,CVE-2015-2808:5,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX,CVE-2015-2808,6100-08-07,IV74915m6a.150727.epkg.Z / IV74919m6a.150713.epkg.Z / IV74926m6a.150711.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc,bos.net.tcp.server:6.1.8.0-6.1.8.18 bos.net.tcp.client:6.1.8.0-6.1.8.19,20150427,20151215,See advisory,https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar,CVE-2015-2808:5,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05,Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX,CVE-2015-2808,6100-09-06,IV74916m5a.150727.epkg.Z / IV74920m5a.150713.epkg.Z / IV74927m5a.150711.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc,bos.net.tcp.server:6.1.9.0-6.1.9.45 bos.net.tcp.client:6.1.9.0-6.1.9.45,20150427,20151215,See advisory,https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar,CVE-2015-2808:5,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX,CVE-2015-2808,7100-02-07,IV74917m6a.150727.epkg.Z / IV74921m6a.150713.epkg.Z / IV74928m6a.150710.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc,bos.net.tcp.server:7.1.2.0-7.1.2.18 bos.net.tcp.client:7.1.2.0-7.1.2.19,20150427,20151215,See advisory,https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar,CVE-2015-2808:5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05,Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX,CVE-2015-2808,7100-03-06,IV74458m5a.150727.epkg.Z / IV74922m5a.150713.epkg.Z / IV74929m5a.150711.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc,bos.net.tcp.server:7.1.3.0-7.1.3.45 bos.net.tcp.client:7.1.3.0-7.1.3.45,20150427,20151215,See advisory,https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar,CVE-2015-2808:5,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6,Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on VIOS,CVE-2015-2808,2.2.2.7,IV74915m6a.150727.epkg.Z / IV74919m6a.150713.epkg.Z / IV74926m6a.150711.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc,bos.net.tcp.server:6.1.8.0-6.1.8.18 bos.net.tcp.client:6.1.8.0-6.1.8.19,20150427,20151215,See advisory,https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar,CVE-2015-2808:5,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50,Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on VIOS,CVE-2015-2808,2.2.3.60,IV74916m5a.150727.epkg.Z / IV74920m5a.150713.epkg.Z / IV74927m5a.150711.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc,bos.net.tcp.server:6.1.9.0-6.1.9.45 bos.net.tcp.client:6.1.9.0-6.1.9.45,20150427,20151215,See advisory,https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar,CVE-2015-2808:5,no sec,aix,Openssl,Vulnerabilities in OpenSSL impact AIX,CVE-2015-3194 / CVE-2015-3195 / CVE-2015-3196,See advisory,101_ifix.151218.epkg.Z 098_ifix.151218.epkg.Z 1298_ifix.151218.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory15.asc,openssl.base:1.0.1.500-1.0.1.515 openssl.base:0.9.8.401-0.9.8.2506 openssl.base:12.9.8.1100-12.9.8.2506,20160115, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix15.tar,CVE-2015-3194:5.3 / CVE-2015-3195:5.3 / CVE-2015-3196:3.7,no sec,aix,Openssl,Vulnerabilities in OpenSSL affect AIX,CVE-2015-3197 / CVE-2015-4000,See advisory,IV81287m9b.160217.epkg.Z IV81287m9a.160217.epkg.Z IV81287m9c.160217.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory17.asc,openssl.base:0.9.8.401-0.9.8.2506 openssl.base:1.0.1.500-1.0.1.515 openssl.base:12.9.8.1100-12.9.8.2506,20160226, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix17.tar,CVE-2015-3197:5.4 / CVE-2015-4000:4.3,no sec,aix,Openssl,Multiple Security vulnerabilities in AIX OpenSSL,CVE-2015-4000 / CVE-2015-1788 / CVE-2015-1789 / CVE-2015-1790 / CVE-2015-1791 / CVE-2015-1792 / CVE-2014-8176,See advisory,IV74809s9a.150710.epkg.Z IV75570m9a.150729.epkg.Z IV74809s9b.150710.epkg.Z IV74809s9c.150710.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory14.asc,openssl.base:1.0.1.500-1.0.1.514 openssl.base:0.9.8.401-0.9.8.2505 openssl.base:12.9.8.1100-12.9.8.2505,20150715,20150812,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix14.tar,CVE-2015-4000:4.3 / CVE-2015-1788:5 / CVE-2015-1789:5 / CVE-2015-1790:5 / CVE-2015-1791:5 / CVE-2015-1792:5 / CVE-2014-8176:6.5,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50,Vulnerability in Diffie-Hellman ciphers affects sendmail on VIOS,CVE-2015-4000,2.2.3.60,IV75643m5a.150731.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.45,20150807, ,6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar,CVE-2015-4000:4.3,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX,CVE-2015-4000,6100-09-06,IV75644m6a.150731.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc,bos.net.tcp.client:6.1.8.0-6.1.8.19,20150807, ,6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar,CVE-2015-4000:4.3,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05,Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX,CVE-2015-4000,6100-09-06,IV75643m5a.150731.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc,bos.net.tcp.client:6.1.9.0-6.1.9.45,20150807, ,6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar,CVE-2015-4000:4.3,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX,CVE-2015-4000,7100-03-06,IV75645m6a.150731.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc,bos.net.tcp.client:7.1.2.0-7.1.2.19,20150807, ,6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar,CVE-2015-4000:4.3,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05,Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX,CVE-2015-4000,7100-03-06,IV75646m5a.150731.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc,bos.net.tcp.client:7.1.3.0-7.1.3.45,20150807, ,6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar,CVE-2015-4000:4.3,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6,Vulnerability in Diffie-Hellman ciphers affects sendmail on VIOS,CVE-2015-4000,2.2.3.60,IV75644m6a.150731.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc,bos.net.tcp.client:6.1.9.0-6.1.8.19,20150807, ,6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar,CVE-2015-4000:4.3,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2015-4844 / CVE-2015-4843 / CVE-2015-4805 / CVE-2015-4860 / CVE-2015-4883 / CVE-2015-4835 / CVE-2015-4810 / CVE-2015-4806 / CVE-2015-4871 / CVE-2015-4902 / CVE-2015-4872 / CVE-2015-4911 / CVE-2015-4893 / CVE-2015-4840 / CVE-2015-4842 / CVE-2015-4882 / CVE-2015-4903 / CVE-2015-4803 / CVE-2015-4734 / CVE-2015-5006,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_oct2015_advisory.asc,Java5.sdk:<5.0.0.620 Java6.sdk:<6.0.0.510 Java7.sdk:<7.0.0.270 Java71.sdk:<7.1.0.150 Java8.sdk:<8.0.0.70 Java5_64.sdk:<5.0.0.620 Java6_64.sdk:<6.0.0.510 Java7_64.sdk:<7.0.0.270 Java71_64.sdk:<7.1.0.150 Java8_64.sdk:<8.0.0.70,20151210, ,n/a,See advisory,CVE-2015-4844:10 / CVE-2015-4843:10 / CVE-2015-4805:10 / CVE-2015-4860:10 / CVE-2015-4883:10 / CVE-2015-4835:10 / CVE-2015-4810:6.9 / CVE-2015-4806:6.4 / CVE-2015-4871:5.8 / CVE-2015-4902:5 / CVE-2015-4872:5 / CVE-2015-4911:5 / CVE-2015-4893:5 / CVE-2015-4840:5 / CVE-2015-4842:5 / CVE-2015-4882:5 / CVE-2015-4903:5 / CVE-2015-4803:5 / CVE-2015-4734:5 / CVE-2015-5006:4.6,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerability in netstat affects AIX,CVE-2015-4948 / IV77039,6100-09-06,IV77039s9b.151016.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20151012,20151016,6100-09:IV75940 7100-03:IV77299,https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar,CVE-2015-4948:7.4,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05,Vulnerability in netstat affects AIX,CVE-2015-4948 / IV75940,6100-09-06,IV75940s5b.151016.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.45,20151012,20151016,6100-09:IV75940 7100-03:IV77299,https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar,CVE-2015-4948:7.4,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05,Vulnerability in netstat affects AIX,CVE-2015-4948 / IV77299,7100-03-06,IV77299s5b.151016.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc,bos.net.tcp.client:7.1.3.0-7.1.3.45,20151012,20151016,6100-09:IV75940 7100-03:IV77299,https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar,CVE-2015-4948:7.4,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06 :: 6100-08-07,Vulnerability in netstat affects AIX,CVE-2015-4948 / IV77037,next TL,IV77037s7a.150924.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc,bos.net.tcp.client:6.1.8.0-6.1.8.20,20151012, ,6100-09:IV75940 7100-03:IV77299,https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar,CVE-2015-4948:7.4,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06 :: 7100-02-07,Vulnerability in netstat affects AIX,CVE-2015-4948 / IV77038,next TL,IV77038s7a.150924.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc,bos.net.tcp.client:7.1.2.0-7.1.2.20,20151012, ,6100-09:IV75940 7100-03:IV77299,https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar,CVE-2015-4948:7.4,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50,Vulnerability in netstat affects VIOS,CVE-2015-4948 / IV75940,2.2.3.60,IV75940s5b.151016.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.45,20151012,20151016,6100-09:IV75940 7100-03:IV77299,https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar,CVE-2015-4948:7.4,no sec,aix,NTPv4,Vulnerability in NTPv4 affects AIX,CVE-2015-5300,See advisory,IV81129m6a.160204.epkg.Z IV81130m5a.160204.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc,ntp.rte:6.1.6.0-6.1.6.4 ntp.rte:7.1.0.0-7.1.0.4,20160222, ,n/a,https://aix.software.ibm.com/aix/efixes/security/ntp_fix5.tar,CVE-2015-5300:4.3,no sec,aix,OpenSSH,AIX OpenSSH Vulnerability,CVE-2015-5352,See advisory,OpenSSH_6.0.0.6110.tar.Z OpenSSH_6.0.0.6201.tar.Z DEPRECATED::6201_mfix,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory5.asc,openssh.base.client:4.0.0.5200-6.0.0.6200 openssh.base.server:4.0.0.5200-6.0.0.6200,20150904, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2015-5352:4.3,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerability in BIND affects AIX,CVE-2015-5477 / IV75966,6100-09-06,IV75966s9a.150813.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20150813,20150817,6100-09:IV75692 7100-03:IV75693,https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar,CVE-2015-5477:7.5,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05,Vulnerability in BIND affects AIX,CVE-2015-5477 / IV75692,6100-09-06,IV75692s5a.150803.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc,bos.net.tcp.client:6.1.9.0-6.1.9.45,20150813,20150817,6100-09:IV75692 7100-03:IV75693,https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar,CVE-2015-5477:7.5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05,Vulnerability in BIND affects AIX,CVE-2015-5477 / IV75693,7100-03-06,IV75693s5a.150803.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc,bos.net.tcp.client:7.1.3.0-7.1.3.45,20150813,20150817,6100-09:IV75692 7100-03:IV75693,https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar,CVE-2015-5477:7.5,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,Vulnerability in BIND affects AIX,CVE-2015-5477 / IV75694,next TL,IV75694s6a.150803.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc,bos.net.tcp.client:6.1.8.0-6.1.8.19,20150813,20150817,6100-09:IV75692 7100-03:IV75693,https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar,CVE-2015-5477:7.5,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,Vulnerability in BIND affects AIX,CVE-2015-5477 / IV75690,next TL,IV75690s6a.150803.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc,bos.net.tcp.client:7.1.2.0-7.1.2.19,20150813,20150817,6100-09:IV75692 7100-03:IV75693,https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar,CVE-2015-5477:7.5,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50,Vulnerability in BIND affects VIOS,CVE-2015-5477 / IV75692,2.2.3.60,IV75692s5a.150803.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc,bos.net.tcp.client:6.1.9.0-6.1.9.45,20150813,20150817,6100-09:IV75692 7100-03:IV75693,https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar,CVE-2015-5477:7.5,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6,Vulnerability in BIND affects VIOS,CVE-2015-5477 / IV75694,next TL,IV75694s6a.150803.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc,bos.net.tcp.client:6.1.8.0-6.1.8.19,20150813,20150817,6100-09:IV75692 7100-03:IV75693,https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar,CVE-2015-5477:7.5,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerability in BIND affects AIX,CVE-2015-5722 / IV78092,6100-09-06,IV78092m9a.151103.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20151104, ,6100-09:IV78091 7100-03:IV78095,https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar,CVE-2015-5722:7.5,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05,Vulnerability in BIND affects AIX,CVE-2015-5722 / IV78091,6100-09-06,IV78091m5a.151020.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc,bos.net.tcp.client:6.1.9.0-6.1.9.45,20151104, ,6100-09:IV78091 7100-03:IV78095,https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar,CVE-2015-5722:7.5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05,Vulnerability in BIND affects AIX,CVE-2015-5722 / IV78095,7100-03-06,IV78095m5a.151019.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc,bos.net.tcp.client:7.1.3.0-7.1.3.45,20151104, ,6100-09:IV78091 7100-03:IV78095,https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar,CVE-2015-5722:7.5,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06 :: 6100-08-07,Vulnerability in BIND affects AIX,CVE-2015-5722 / IV78096,next TL,IV78096m7a.151021.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc,bos.net.tcp.client:6.1.8.0-6.1.8.20,20151104, ,6100-09:IV78091 7100-03:IV78095,https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar,CVE-2015-5722:7.5,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06 :: 7100-02-07,Vulnerability in BIND affects AIX,CVE-2015-5722 / IV78094,next TL,IV78094m7a.151020.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc,bos.net.tcp.client:7.1.2.0-7.1.2.20,20151104, ,6100-09:IV78091 7100-03:IV78095,https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar,CVE-2015-5722:7.5,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50,Vulnerability in BIND affects VIOS,CVE-2015-5722 / IV78091,2.2.3.60,IV78091m5a.151020.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc,bos.net.tcp.client:6.1.9.0-6.1.9.45,20151104, ,6100-09:IV78091 7100-03:IV78095,https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar,CVE-2015-5722:7.5,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6 :: 2.2.2.70,Vulnerability in BIND affects VIOS,CVE-2015-5722 / IV78096,next TL,IV78096m7a.151021.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc,bos.net.tcp.client:6.1.8.0-6.1.8.20,20151104, ,6100-09:IV78091 7100-03:IV78095,https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar,CVE-2015-5722:7.5,no sec,aix,OpenSSH,AIX OpenSSH Vulnerability,CVE-2015-6563 / CVE-2015-6564,See advisory,6110_ifix.151009.epkg.Z 6201_ifix.151009.epkg.Z DEPRECATED::6201_mfix,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory6.asc,openssh.base.client:4.0.0.5200-6.0.0.6201 openssh.base.server:4.0.0.5200-6.0.0.6201,20151019, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssh_fix6.tar,CVE-2015-6563:4 / CVE-2015-6564:7.4,no sec,aix,GSKit,Vulnerabilities in GSKit affect Tivoli Directory Server/IBM Security Directory Server on AIX,CVE-2015-7421 / CVE-2015-7420,See advisory,See advisory,http://www.ibm.com/support/docview.wss?uid=isg3T1023277,ISDS:6.4 ISDS:6.3.1 ITDS:6.3 GSKit:<8.0.50.53,20151221, ,n/a,See advisory,CVE-2015-7420:3.7 / CVE-2015-7421:3.7,no sec,aix,Openssl,Vulnerability in MD5 Signature and Hash Algorithm affects OpenSSL on AIX,CVE-2015-7575,See advisory,101a_fix.160129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory16.asc,openssl.base:1.0.1.500-1.0.1.515,20160129, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix16.tar,CVE-2015-7575:7.1,no sec,aix,NTPv4,Vulnerabilities in NTP affect AIX,CVE-2015-7973 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140,See advisory,IV83992s5a.160602.epkg.Z IV83983s5a.160602.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc,ntp.rte:6.1.6.0-6.1.6.5 ntp.rte:7.1.0.0-7.1.0.5,20160608,20160609,n/a,https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar,CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3,no sec,aix,NTPv4,Vulnerabilities in NTP affect AIX,CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519 / CVE-2016-1547 / CVE-2016-4957 / CVE-2016-4953 / CVE-2016-4954 / CVE-2016-4955,See advisory,IV87278s7a.160901.epkg.Z IV87279s7a.160901.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc,ntp.rte:6.1.6.0-6.1.6.7 ntp.rte:7.1.0.0-7.1.0.7,20160906,20160913,n/a,https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar,CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2 / CVE-2016-1547:3.7 / CVE-2016-4957:7.5 / CVE-2016-4953:3.7 / CVE-2016-4954:3.7 / CVE-2016-4955:3.7,no sec,aix,OpenSSH,AIX OpenSSH Vulnerability,CVE-2015-8325 / CVE-2016-6210 / CVE-2016-6515,See advisory,6202_ifix.160830.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory9.asc,openssh.base.client:4.0.0.5200-6.0.0.6202 openssh.base.server:4.0.0.5200-6.0.0.6202,20160906, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssh_fix9.tar,CVE-2015-8325:7.4 / CVE-2016-6210:4.3 / CVE-2016-6515:7.5,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2015-8472 / CVE-2016-0475 / CVE-2016-0466 / CVE-2016-0402 / CVE-2015-7575 / CVE-2016-0448 / CVE-2016-0494 / CVE-2016-0483 / CVE-2015-5041 / CVE-2015-7981 / CVE-2015-8126 / CVE-2015-8540,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_jan2016_advisory.asc,Java6.sdk:<6.0.0.535 Java7.sdk:<7.0.0.320 Java71.sdk:<7.1.0.200 Java8.sdk:<8.0.0.120 Java6_64.sdk:<6.0.0.535 Java7_64.sdk:<7.0.0.320 Java71_64.sdk:<7.1.0.200 Java8_64.sdk:<8.0.0.120,20160224, ,n/a,See advisory,CVE-2015-8472:6.3 / CVE-2016-0475:5.8 / CVE-2016-0466:5.0 / CVE-2016-0402:5.0 / CVE-2015-7575:7.1 / CVE-2016-0448:4.0 / CVE-2016-0494:10.0 / CVE-2016-0483:10.0 / CVE-2015-5041:4.8 / CVE-2015-7981:5.3 / CVE-2015-8126:7.8 / CVE-2015-8540:9.8,no sec,aix,GSKit,Vulnerability in GSKit affects Tivoli Directory Server/IBM Security Directory Server on AIX,CVE-2016-0201,See advisory,See advisory,http://www.ibm.com/support/docview.wss?uid=isg3T1023296,ISDS:6.4 ISDS:6.3.1 ITDS:6.3 GSKit:<8.0.50.57,20160127, ,n/a,See advisory,CVE-2016-0201:5.9,no sec,aix,OpenSSH,AIX OpenSSH Vulnerability,CVE-2016-0777 / CVE-2016-0778,See advisory,IV80743m9a.160127.epkg.Z IV80743m9b.160127.epkg.Z DEPRECATED::6201_mfix,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory7.asc,openssh.base.client:4.0.0.5200-6.0.0.6201 openssh.base.server:4.0.0.5200-6.0.0.6201,20160129, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssh_fix7.tar,CVE-2016-0777:6.5 / CVE-2016-0778:5.0,no sec,aix,Openssl,Multiple vulnerabilities in OpenSSL affect AIX,CVE-2016-0800 / CVE-2016-0799 / CVE-2016-0798 / CVE-2016-0797 / CVE-2016-0705 / CVE-2016-0702,See advisory,IV83169m9b.160401.epkg.Z IV83169m9a.160401.epkg.Z IV83169s9d.160401.epkg.Z IV83169m9c.160401.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory18.asc,openssl.base:0.9.8.401-0.9.8.2506 openssl.base:1.0.1.500-1.0.1.515 openssl.base:1.0.2.500-1.0.2.500 openssl.base:12.9.8.1100-12.9.8.2506,20160404, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix18.tar,CVE-2016-0800:7.4 / CVE-2016-0799:3.7 / CVE-2016-0798:7.1 / CVE-2016-0797:3.7 / CVE-2016-0705:3.7 / CVE-2016-0702:2.9,no sec,aix,Openssl,Vulnerabilities in OpenSSL affect AIX,CVE-2016-2176 / CVE-2016-2109 / CVE-2016-2108 / CVE-2016-2106 / CVE-2016-2105,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory20.asc,openssl.base:0.9.8.401-0.9.8.2506 openssl.base:1.0.1.500-1.0.1.515 openssl.base:1.0.2.500 openssl.base:12.9.8.1100-12.9.8.2506 openssl.base:20.11.101.500,20160712, ,n/a,See advisory,CVE-2016-2176:5.3 / CVE-2016-2109:5.3 / CVE-2016-2108:8.1 / CVE-2016-2106:5.6 / CVE-2016-2105:5.6,no sec,aix,Openssl,Vulnerabilities in OpenSSL affect AIX,CVE-2016-2177 / CVE-2016-2178 / CVE-2016-2179 / CVE-2016-2180 / CVE-2016-2181 / CVE-2016-2182 / CVE-2016-2183 / CVE-2016-6302 / CVE-2016-6303 / CVE-2016-6304 / CVE-2016-6306 / CVE-2016-7052,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc,openssl.base:1.0.1.500-1.0.1.516 openssl.base:1.0.2.500-1.0.2.800 openssl.base:20.11.101.500-20.11.101.501,20161114, ,n/a,See advisory,CVE-2016-2177:5.9 / CVE-2016-2178:5.3 / CVE-2016-2179:5.3 / CVE-2016-2180:7.5 / CVE-2016-2181:5.3 / CVE-2016-2182:4.3 / CVE-2016-2183:3.7 / CVE-2016-6302:5.3 / CVE-2016-6303:5.3 / CVE-2016-6304:7.5 / CVE-2016-2016-6306:4.3 / CVE-2016-7052:5.3,no sec,aix,Openssl,Vulnerability in OpenSSL affects AIX,CVE-2016-2842,See advisory,IV83169m9b.160401.epkg.Z IV83169m9a.160401.epkg.Z IV83169s9d.160401.epkg.Z IV83169m9c.160401.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory19.asc,openssl.base:0.9.8.401-0.9.8.2506 openssl.base:1.0.1.500-1.0.1.515 openssl.base:1.0.2.500-1.0.2.500 openssl.base:12.9.8.1100-12.9.8.2506,20160418, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix18.tar,CVE-2016-2842:7.5,no sec,aix,OpenSSH,Vulnerabilities in OpenSSH affect AIX,CVE-2016-3115 / CVE-2016-1908,See advisory,IV84698m9b.160513.epkg.Z IV84698m9a.160513.epkg.Z DEPRECATED::6201_mfix,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory8.asc,openssh.base.client:4.0.0.5200-6.0.0.6201 openssh.base.server:4.0.0.5200-6.0.0.6201,20160503,20160513,n/a,https://aix.software.ibm.com/aix/efixes/security/openssh_fix8.tar,CVE-2016-3115:8.8 / CVE-2016-1908:4.3,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2016-3443 / CVE-2016-0687 / CVE-2016-0686 / CVE-2016-3427 / CVE-2016-3449 / CVE-2016-3422 / CVE-2016-3426 / CVE-2016-0264 / CVE-2016-0363 / CVE-2016-0376,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_april2016_advisory.asc,Java6.sdk:<6.0.0.561 Java7.sdk:<7.0.0.370 Java71.sdk:<7.1.0.250 Java8.sdk:<8.0.0.130 Java6_64.sdk:<6.0.0.560 Java7_64.sdk:<7.0.0.370 Java71_64.sdk:<7.1.0.250 Java8_64.sdk:<8.0.0.130,20160506,20160518,n/a,See advisory,CVE-2016-3443:10.0 / CVE-2016-0687:10.0 / CVE-2016-0686:10.0 / CVE-2016-3427:10.0 / CVE-2016-3449:7.6 / CVE-2016-3422:5.0 / CVE-2016-3426:4.3 / CVE-2016-0264:5.6 / CVE-2016-0363:8.1 / CVE-2016-0376:8.1,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2016-3598 / CVE-2016-3511 / CVE-2016-3485,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_july2016_advisory.asc,Java6.sdk:<6.0.0.585 Java7.sdk:<7.0.0.450 Java71.sdk:<7.1.0.350 Java8.sdk:<8.0.0.310 Java6_64.sdk:<6.0.0.585 Java7_64.sdk:<7.0.0.450 Java71_64.sdk:<7.1.0.350 Java8_64.sdk:<8.0.0.310,20160819, ,n/a,See advisory,CVE-2016-3598:9.6 / CVE-2016-3511:7.7 / CVE-2016-3485:2.9,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2016-5582 / CVE-2016-5568 / CVE-2016-5556 / CVE-2016-5573 / CVE-2016-5597 / CVE-2016-5554 / CVE-2016-5542,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_oct2016_advisory.asc,Java6.sdk:<6.0.0.635 Java7.sdk:<7.0.0.560 Java71.sdk:<7.1.0.360 Java8.sdk:<8.0.0.321 Java6_64.sdk:<6.0.0.635 Java7_64.sdk:<7.0.0.560 Java71_64.sdk:<7.1.0.360 Java8_64.sdk:<8.0.0.321,20161221,20161223,n/a,See advisory,CVE-2016-5582:9.6 / CVE-2016-5568:9.6 / CVE-2016-5556:9.6 / CVE-2016-5573:8.3 / CVE-2016-5597:5.9 / CVE-2016-5554:4.3 / CVE-2016-5542:3.1,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX,CVE-2016-6038,6100-09-06,IV89386s9c.160923.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pconsole_mitigation.asc,lwi.runtime:5.3.12.0-5.3.12.9,20160922,20160930,5300-12:IV89386 6100-09:IV89418 7100-03:IV89385,https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar,CVE-2016-6038:6.5,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05,Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX,CVE-2016-6038,6100-09-06,IV89418s5a.160927.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pconsole_mitigation.asc,lwi.runtime:6.1.9.0-6.1.9.99,20160922,20160930,5300-12:IV89386 6100-09:IV89418 7100-03:IV89385,https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar,CVE-2016-6038:6.5,no sec,aix,OpenSSH,Vulnerabilities in OpenSSH affect AIX.,CVE-2016-8858 CVE-2016-10009 CVE-2016-10011 CVE-2016-10012,See Bulletin,6203_ifix.170124.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory10.asc,openssh.base.client:4.0.0.5200-6.0.0.6203 openssh.base.server:4.0.0.5200-6.0.0.6203,20170205, ,n/a, ,CVE-2016-8858:5.3 / CVE-2016-10009:6.3 / CVE-2016-10011:5.5 / CVE-2016-10012:5.9,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerabilities in BIND impact AIX,CVE-2016-8864 / CVE-2016-2848 / IV91253,6100-09-09,IV91253m9b.161209.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client_core:5.3.12.0-5.3.12.10,20161215,20161229,6100-09:IV91254 7100-03:IV91214 7100-04:IV91255 7200-00:IV91256 7200-01:IV91257,ftp://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,6100-09-06 :: 6100-09-07 :: 6100-09-08,Vulnerabilities in BIND impact AIX,CVE-2016-8864 / CVE-2016-2848 / IV91254,6100-09-09,IV91254m6b.161213.epkg.Z IV91254m7b.161209.epkg.Z IV91254m8b.161209.epkg.z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client_core:6.1.9.0-6.1.9.200,20161215,20161229,5300-12:IV91253 7100-03:IV91214 7100-04:IV91255 7200-00:IV91256 7200-01:IV91257,https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,7100-03-04 :: 7100-03-05 :: 7100-03-06,Vulnerabilities in BIND impact AIX,CVE-2016-8864 / CVE-2016-2848 / IV91214,7100-03-07,IV91214m4b.161209.epkg.Z IV91214m5b.161209.epkg.Z IV91214m6a.161209.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client_core:7.1.3.0-7.1.3.48,20161215,20161229,5300-12:IV91253 6100-09:IV91254 7100-04:IV91255 7200-00:IV91256 7200-01:IV91257,https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03,Vulnerabilities in BIND impact AIX,CVE-2016-8864 / CVE-2016-2848 / IV91255,7100-04-04,IV91255m1b.161213.epkg.Z IV91255m2a.161213.epkg.Z IV91255m3c.161213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client_core:7.1.4.0-7.1.4.30,20161215,20161229,5300-12:IV91253 6100-09:IV91254 7100-03:IV91214 7200-00:IV91256 7200-01:IV91257,https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,Vulnerabilities in BIND impact AIX,CVE-2016-8864 / CVE-2016-2848 / IV91256,7200-00-03,IV91256m1b.161212.epkg.Z IV91256m2b.161209.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client_core:7.2.0.0-7.2.0.2,20161215,20161229,5300-12:IV91253 6100-09:IV91254 7100-03:IV91214 7100-04:IV91255 7200-01:IV91257,https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,7200-01-00 :: 7200-01-01,Vulnerabilities in BIND impact AIX,CVE-2016-8864 / CVE-2016-2848 / IV91257,7200-01-02,IV91257m0a.161212.epkg.Z IV91257m1a.161213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client_core:7.2.1.0,20161215,20161229,5300-12:IV91253 6100-09:IV91254 7100-03:IV91214 7100-04:IV91255 7200-00:IV91256,https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,Java SDK,There are multiple vulnerabilities in IBM SDK Java Technology Edition,CVE-2017-10345 / CVE-2017-10295 / CVE-2017-10281 / CVE-2017-10350 / CVE-2017-10347 / CVE-2017-10349 / CVE-2017-10348 / CVE-2017-10357 / CVE-2017-10355 / CVE-2017-10356 / CVE-2017-10309 / CVE-2017-10388 / CVE-2017-10285 / CVE-2017-10346 / CVE-2017-10165,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_oct2017_advisory.asc,Java6:<6.0.0.655 Java6.jre:<6.0.0.655 Java6_64.jre:<6.0.0.655 Java6_64.sdk:<6.0.0.655 Java6.sdk:<6.0.0.655 Java7:<7.0.0.615 Java7_64.jre:<7.0.0.615 Java7.jre:<7.0.0.615 Java7_64.sdk:<7.0.0.615 Java7.sdk:<7.0.0.615 Java7.1.jre:<7.1.0.415 Java7.1_64.jre:<7.1.0.415 Java7.1:<7.1.0.415 Java7.1.sdk:<7.1.0.415 Java7.1_64.sdk:<7.1.0.415 Java8:<8.0.0.505 Java8.jre:<8.0.0.505 Java8_64.jr,20171207, ,n/a,See advisory,CVE-2017-10345:3.1 / CVE-2017-10295:4 / CVE-2017-10281:5.3 / CVE-2017-10350:5.3 / CVE-2017-10347:5.3 / CVE-2017-10349:5.3 / CVE-2017-10348:5.3 / CVE-2017-10357:5.3 / CVE-2017-10355:5.3 / CVE-2017-10356:6.2 / CVE-2017-10309:7.1 / CVE-2017-10388:7.5 / CVE-2017-10285:9.6 / CVE-2017-10346:9.6 / CVE-2017-10165:6.5,no sec,aix,6100-09-06 :: 6100-09-07 :: 6100-09-08,There is a vulnerability in bellmail that impacts AIX.,CVE-2017-1093,See Bulletin,IV92238m8a.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc,bos.net.tcp.client:6.1.9.0-6.1.9.200,20170129, ,7200-01:IV92242 7200-00:IV92241 7100-03:IV92250 7100-04:IV92240,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar,CVE-2017-1093:8.4,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.51 :: 2.2.3.52 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80,There is a vulnerability in bellmail that impacts VIOS.,CVE-2017-1093,See Bulletin,IV92238m8a.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc,See Bulletin,20170129, ,7200-01:IV92242 7200-00:IV92241 7100-03:IV92250 7100-04:IV92240,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar,CVE-2017-1093:8.4,no sec,aix,Java SDK,There are multiple vulnerabilities in IBM SDK Java Technology Edition,CVE-2017-1376 / CVE-2017-1541 / CVE-2017-10053 / CVE-2017-10067 / CVE-2017-10078 / CVE-2017-10087 / CVE-2017-10089 / CVE-2017-10090 / CVE-2017-10096 / CVE-2017-10101 / CVE-2017-10102 / CVE-2017-10105 / CVE-2017-10107 / CVE-2017-10108 / CVE-2017-10109 / CVE-2017-10110 / CVE-2017-10115 / CVE-2017-10116 / CVE-2017-10125 / CVE-2017-10243,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_july2017_advisory.asc,Java6:<6.0.0.650 Java6.jre:<6.0.0.650 Java6_64.jre:<6.0.0.650 Java6_64.sdk:<6.0.0.650 Java6.sdk:<6.0.0.650 Java7:<7.0.0.610 Java7_64.jre:<7.0.0.610 Java7.jre:<7.0.0.610 Java7_64.sdk:<7.0.0.610 Java7.sdk:<7.0.0.610 Java7.1.jre:<7.1.0.410 Java7.1_64.jre:<7.1.0.410 Java7.1:<7.1.0.410 Java7.1.sdk:<7.1.0.410 Java7.1_64.sdk:<7.1.0.410 Java8:<8.0.0.410 Java8.jre:<8.0.0.410 Java8_64.jr,20170901, ,n/a,See advisory,CVE-2017-1376:9.8 / CVE-2017-1541:7.3 / CVE-2017-10053:5.3 / CVE-2017-10067:7.5 / CVE-2017-10078:8.1 / CVE-2017-10087:9.6 / CVE-2017-10089:9.6 / CVE-2017-10090:9.6 / CVE-2017-10096:9.6 / CVE-2017-10101:9.6 / CVE-2017-10102:9 / CVE-2017-10105:4.3 / CVE-2017-10107:9.6 / CVE-2017-10108:5.3 / CVE-2017-10109:5.3 / CVE-2017-10110:9.6 / CVE-2017-10115:7.5 / CVE-2017-10116:8.3 / CVE-2017-10125:7.1 / CVE-2017-10243:6.5,no sec,aix,Java SDK,There is a vulnerability in the AIX IBM Java 6 SDK installp and updatep packages,CVE-2017-1541,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java6_advisory.asc,Java6:6.0.0.215-6.0.0.645 Java6.jre:6.0.0.215-6.0.0.645 Java6_64.jre:6.0.0.215-6.0.0.645 Java6_64.sdk:6.0.0.215-6.0.0.645 Java6.sdk:6.0.0.215-6.0.0.645 ,20171002, ,n/a,See advisory,CVE-2017-1541:7.3,no sec,aix,OpenSSH,Vulnerabilities in OpenSSH affect AIX.,CVE-2017-15906,See Bulletin,openssh-7.5.102.1100.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory11.asc,openssh.base.client:4.0.0.5200-7.1.102.1100 openssh.base.server:4.0.0.5200-7.1.102.1100,20171114, ,n/a,https://www-01.ibm.com/marketing/iwm/iwm/web/reg/download.do?source=aixbp&lang=en_US&S_PKG=openssh&cp=UTF-8,CVE-2017-15906:6.5,no sec,aix,Java SDK,There are multiple vulnerabilities in IBM SDK Java Technology Edition,CVE-2017-3289 / CVE-2017-3272 / CVE-2017-3241 / CVE-2017-3253 / CVE-2016-5546 / CVE-2016-5548 / CVE-2016-5549 / CVE-2017-3252 / CVE-2016-5547 / CVE-2016-5552 / CVE-2017-3261 / CVE-2017-3231 / CVE-2017-3259 / CVE-2016-2183,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_jan2017_advisory.asc,Java6:<6.0.0.641 Java7:<7.0.0.601 Java7.1:<7.1.0.401 Java8.sdk:<8.0.0.401,20170405, ,n/a,See advisory,CVE-2017-3289:9.6 / CVE-2017-3272:9.6 / CVE-2017-3241:9 / CVE-2017-3253:7.5 / CVE-2016-5546:7.5 / CVE-2016-5548:6.5 / CVE-2016-5549:6.5 / CVE-2017-3252:5.8 / CVE-2016-5547:5.3 / CVE-2016-5552:5.3 / CVE-2017-3261:4.3 / CVE-2017-3231:4.3 / CVE-2017-3259:3.7 / CVE-2016-2183:3.7,no sec,aix,Java SDK,There are multiple vulnerabilities in IBM SDK Java Technology Edition,CVE-2017-3514 / CVE-2017-3512 / CVE-2017-3511 / CVE-2017-3509 / CVE-2017-3544 / CVE-2017-3533 / CVE-2017-3539 / CVE-2017-1289 / CVE-2016-9840 / CVE-2016-9841 / CVE-2016-9842 / CVE-2016-9843,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_apr2017_advisory.asc,Java6:<6.0.0.645 Java6.jre:<6.0.0.645 Java6_64.jre:<6.0.0.645 Java6_64.sdk:<6.0.0.645 Java6.sdk:<6.0.0.645 Java7:<7.0.0.605 Java7_64.jre:<7.0.0.605 Java7.jre:<7.0.0.605 Java7_64.sdk:<7.0.0.605 Java7.sdk:<7.0.0.605 Java7.1.jre:<7.1.0.405 Java7.1_64.jre:<7.1.0.405 Java7.1:<7.1.0.405 Java7.1.sdk:<7.1.0.405 Java7.1_64.sdk:<7.1.0.405 Java8:<8.0.0.406 Java8.jre:<8.0.0.406 Java8_64.jr,20170621, ,n/a,See advisory,CVE-2017-3514:8.3 / CVE-2017-3512:8.3 / CVE-2017-3511:7.7 / CVE-2017-3509:4.2 / CVE-2017-3544:3.7 / CVE-2017-3533:3.7 / CVE-2017-3539:3.1 / CVE-2017-1289:8.2 / CVE-2016-9840:3.3 / CVE-2016-9841:3.3 / CVE-2016-9842:3.3 / CVE-2016-9843:3.3,no sec,aix,OpenSSL,There is a vulnerability in OpenSSL used by AIX,CVE-2017-3731,See Bulletin,102j_ifix.170207.epkg.Z fips_102j.170207.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory23.asc,openssl.base:1.0.2.500-1.0.2.1000 openssl.base:20.13.102.1000-20.13.102.1000,20170217, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix23.tar,CVE-2017-3731:5.3,no sec,aix,OpenSSL,Vulnerability in OpenSSL affects AIX,CVE-2017-3735,See advisory,openssl-1.0.2.1300.tar.Z openssl-20.13.102.1300.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory24.asc,openssl.base:1.0.2.500-1.0.2.1100 openssl.base:20.13.102.1000-20.13.102.1100,20171214, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=aixbp&lang=en_US&S_PKG=openssl&cp=UTF-8,CVE-2017-3735:5.3,no sec,aix,OpenSSL,Vulnerability in OpenSSL affects AIX (CVE-2017-3737),CVE-2017-3737,See Bulletin,102m_ifix.180105.epkg.Z fips_102m.180105.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory25.asc,openssl.base:1.0.2.500-1.0.2.1300 openssl.base:20.13.102.1000-20.13.102.1300,20180129, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix25.tar,CVE-2017-3737:5.9,no sec,aix,OpenSSL,Vulnerability in OpenSSL affects AIX (CVE-2018-0732),CVE-2018-0732,See Bulletin,102oa_ifix.180906.epkg.Z fips_102oa.180910.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory28.asc,openssl.base:1.0.2.500-1.0.2.1500 openssl.base:20.13.102.1000-20.13.102.1500,20180919, ,n/a,http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html,CVE-2018-0732:5.3,no sec,aix,OpenSSL,There are vulnerabilities in OpenSSL used by AIX.,CVE-2018-0734 CVE-2018-5407,See Bulletin,102p_fix.181127.epkg.Z fips_102p.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory29.asc,openssl.base:1.0.2.500-1.0.2.1600 openssl.base:20.13.102.1000-20.16.102.1600,20181211, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix29.tar,CVE-2018-0734:3.7 / CVE-2018-5407:5.1,no sec,aix,OpenSSL,Vulnerability in OpenSSL affects AIX (CVE-2018-0737),CVE-2018-0737,See Bulletin,openssl-1.0.2.1500.tar.Z openssl-20.13.102.1500.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory27.asc,openssl.base:1.0.2.500-1.0.2.1300 openssl.base:20.13.102.1000-20.13.102.1300,20180702, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2018-0737:3.3,no sec,aix,OpenSSL,Vulnerability in OpenSSL affects AIX (CVE-2018-0739),CVE-2018-0739,See Bulletin,102ma_ifix.180410.epkg.Z fips_102ma.180410.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory26.asc,openssl.base:1.0.2.500-1.0.2.1300 openssl.base:20.13.102.1000-20.13.102.1300,20180501, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix26.tar,CVE-2018-0739:5.3,no sec,aix,Tivoli Directory Server,Vulnerabilities in GSKit affect IBM Tivoli Directory Server and IBM Security Directory Server for AIX,CVE-2018-1388 / CVE-2018-1427 / CVE-2018-1426 / CVE-2016-0702 / CVE-2018-1447,See advisory,ITDS,https://aix.software.ibm.com/aix/efixes/security/itds_advisory2.asc,ITDS:6.2.0.0-6.2.0.56 ITDS:6.3.0.0-6.3.0.49 ITDS:6.3.1.0-6.3.1.24 ITDS:6.4.0.0-6.4.0.16,20181214, ,n/a,See Bulletin,CVE-2018-1388:9.1 / CVE-2018-1427:6.2 / CVE-2018-1426:7.4 / CVE-2016-0702:2.9 / CVE-2018-1447:5.1,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2018-1517 / CVE-2018-1656 / CVE-2018-2973 / CVE-2018-2952 / CVE-2018-2940 / CVE-2018-2964 / CVE-2018-12539,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_july2018_advisory.asc,Java7:<7.0.0.630 Java7_64.jre:<7.0.0.630 Java7.jre:<7.0.0.630 Java7_64.sdk:<7.0.0.630 Java7.sdk:<7.0.0.630 Java7.1.jre:<7.1.0.430 Java7.1_64.jre:<7.1.0.430 Java7.1:<7.1.0.430 Java7.1.sdk:<7.1.0.430 Java7.1_64.sdk:<7.1.0.430 Java8:<8.0.0.521 Java8.jre:<8.0.0.521 Java8_64.jre:<8.0.0.521 Java8.sdk:<8.0.0.521 Java8_64.sdk:<8.0.0.521,20180919, ,n/a,See advisory,CVE-2018-1517:5.9 / CVE-2018-1656:7.4 / CVE-2018-2973:5.9 / CVE-2018-2952:3.7 / CVE-2018-2940:4.3 / CVE-2018-2964:8.3 / CVE-2018-12539:8.4,no sec,aix,OpenSSH,Vulnerabilities in OpenSSH affect AIX.,CVE-2018-15473,See Bulletin,15473_fix.180919.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory12.asc,openssh.base.client:4.0.0.5200-7.5.102.1500 openssh.base.server:4.0.0.5200-7.5.102.1500,20181024, ,n/a,https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=aixbp&lang=en_US&S_PKG=openssh&cp=UTF-8,CVE-2018-15473:5.3,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2018-1890 / CVE-2018-12549 / CVE-2018-12547 / CVE-2019-2422 / CVE-2019-2449 / CVE-2019-2426 / CVE-2018-11212,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_jan2019_advisory.asc,Java7:<7.0.0.640 Java7_64.jre:<7.0.0.640 Java7.jre:<7.0.0.640 Java7_64.sdk:<7.0.0.640 Java7.sdk:<7.0.0.640 Java7.1.jre:<7.1.0.440 Java7.1_64.jre:<7.1.0.440 Java7.1:<7.1.0.440 Java7.1.sdk:<7.1.0.440 Java7.1_64.sdk:<7.1.0.440 Java8:<8.0.0.530 Java8.jre:<8.0.0.530 Java8_64.jre:<8.0.0.530 Java8.sdk:<8.0.0.530 Java8_64.sdk:<8.0.0.530,20180416, ,n/a,See advisory,CVE-2018-1890:5.6 / CVE-2018-12549:9.8 / CVE-2018-12547:9.8 / CVE-2019-2422:3.1 / CVE-2019-2449:3.1 / CVE-2019-2426:3.7 / CVE-2018-11212:3.3,no sec,aix,zlib :: zlibNX,AIX is vulnerable to denial of service due to zlib and zlibNX,CVE-2018-25032,See Bulletin,IJ41754s4a.220829.epkg.Z IJ42198s2a.220829.epkg.Z rpm.rte.4.15.1.1006 rpm.rte.4.15.1.2006,https://aix.software.ibm.com/aix/efixes/security/zlib_advisory.asc,rpm.rte:4.15.1.2000-4.15.1.2005 rpm.rte:4.9.1.3-4.15.1.1005 zlibNX.rte:7.2.4.0-7.2.4.7 zlibNX.rte:7.3.0.0-7.3.0.1,20220928, ,,https://aix.software.ibm.com/aix/efixes/security/zlib_fix.tar ,CVE-2018-25032:7.5,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2018-2579 / CVE-2018-2588 / CVE-2018-2663 / CVE-2018-2677 / CVE-2018-2678 / CVE-2018-2602 / CVE-2018-2599 / CVE-2018-2603 / CVE-2018-2657 / CVE-2018-2618 / CVE-2018-2641 / CVE-2018-2582 / CVE-2018-2634 / CVE-2018-2637 / CVE-2018-2633 / CVE-2018-2638 / CVE-2018-2639 / CVE-2018-1417,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_jan2018_advisory.asc,Java7:<7.0.0.620 Java7_64.jre:<7.0.0.620 Java7.jre:<7.0.0.620 Java7_64.sdk:<7.0.0.620 Java7.sdk:<7.0.0.620 Java7.1.jre:<7.1.0.420 Java7.1_64.jre:<7.1.0.420 Java7.1:<7.1.0.420 Java7.1.sdk:<7.1.0.420 Java7.1_64.sdk:<7.1.0.420 Java8:<8.0.0.510 Java8.jre:<8.0.0.510 Java8_64.jre:<8.0.0.510 Java8.sdk:<8.0.0.510 Java8_64.sdk:<8.0.0.510,20180501, ,n/a,See advisory,CVE-2018-2579:3.7 / CVE-2018-2588:4.3 / CVE-2018-2663:4.3 / CVE-2018-2677:4.3 / CVE-2018-2678:4.3 / CVE-2018-2602:4.5 / CVE-2018-2599:4.8 / CVE-2018-2603:5.3 / CVE-2018-2657:5.3 / CVE-2018-2618:5.9 / CVE-2018-2641:6.1 / CVE-2018-2582:6.5 / CVE-2018-2634:6.8 / CVE-2018-2637:7.4 / CVE-2018-2633:8.3 / CVE-2018-2638:8.3 / CVE-2018-2639:8.3 / CVE-2018-1417:8.1,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2018-2800 / CVE-2018-2795 / CVE-2018-2796 / CVE-2018-2797 / CVE-2018-2798 / CVE-2018-2799 / CVE-2018-2783 / CVE-2018-2794 / CVE-2018-2790,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_apr2018_advisory.asc,Java7:<7.0.0.625 Java7_64.jre:<7.0.0.625 Java7.jre:<7.0.0.625 Java7_64.sdk:<7.0.0.625 Java7.sdk:<7.0.0.625 Java7.1.jre:<7.1.0.425 Java7.1_64.jre:<7.1.0.425 Java7.1:<7.1.0.425 Java7.1.sdk:<7.1.0.425 Java7.1_64.sdk:<7.1.0.425 Java8:<8.0.0.515 Java8.jre:<8.0.0.515 Java8_64.jre:<8.0.0.515 Java8.sdk:<8.0.0.515 Java8_64.sdk:<8.0.0.515,20180612, ,n/a,See advisory,CVE-2018-2800:4.2 / CVE-2018-2795:5.3 / CVE-2018-2796:5.3 / CVE-2018-2797:5.3 / CVE-2018-2798:5.3 / CVE-2018-2799:5.3 / CVE-2018-2783:7.4 / CVE-2018-2794:7.7 / CVE-2018-2790:3.1,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2018-3139 / CVE-2018-3136 / CVE-2018-13785 / CVE-2018-3214 / CVE-2018-3180 / CVE-2018-3149 / CVE-2018-3169 / CVE-2018-3183,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_oct2018_advisory.asc,Java7:<7.0.0.635 Java7_64.jre:<7.0.0.635 Java7.jre:<7.0.0.635 Java7_64.sdk:<7.0.0.635 Java7.sdk:<7.0.0.635 Java7.1.jre:<7.1.0.435 Java7.1_64.jre:<7.1.0.435 Java7.1:<7.1.0.435 Java7.1.sdk:<7.1.0.435 Java7.1_64.sdk:<7.1.0.435 Java8:<8.0.0.525 Java8.jre:<8.0.0.525 Java8_64.jre:<8.0.0.525 Java8.sdk:<8.0.0.525 Java8_64.sdk:<8.0.0.525,20181214, ,n/a,See advisory,CVE-2018-3139:3.1 / CVE-2018-3136:3.4 / CVE-2018-13785:5.5 / CVE-2018-3214:5.3 / CVE-2018-3180:5.6 / CVE-2018-3149:8.3 / CVE-2018-3169:8.3 / CVE-2018-3183:9.0,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2019-10245 / CVE-2019-2684 / CVE-2019-2602 / CVE-2019-2697 / CVE-2019-2698,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_apr2019_advisory.asc,Java7:<7.0.0.645 Java7_64.jre:<7.0.0.645 Java7.jre:<7.0.0.645 Java7_64.sdk:<7.0.0.645 Java7.sdk:<7.0.0.645 Java7.1.jre:<7.1.0.445 Java7.1_64.jre:<7.1.0.445 Java7.1:<7.1.0.445 Java7.1.sdk:<7.1.0.445 Java7.1_64.sdk:<7.1.0.445 Java8:<8.0.0.535 Java8.jre:<8.0.0.535 Java8_64.jre:<8.0.0.535 Java8.sdk:<8.0.0.535 Java8_64.sdk:<8.0.0.535,20190628, ,n/a,See advisory,CVE-2019-10245:7.5 / CVE-2019-2684:5.9 / CVE-2019-2602:7.5 / CVE-2019-2697:8.1 / CVE-2019-2698:8.1,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2019-11775 / CVE-2019-11772 / CVE-2019-2766 / CVE-2019-2786 / CVE-2019-2816 / CVE-2019-2762 / CVE-2019-2769 / CVE-2019-7317 / CVE-2019-4473 / CVE-2019-11771,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_july2019_advisory.asc,Java7:<7.0.0.650 Java7_64.jre:<7.0.0.650 Java7.jre:<7.0.0.650 Java7_64.sdk:<7.0.0.650 Java7.sdk:<7.0.0.650 Java7.1.jre:<7.1.0.450 Java7.1_64.jre:<7.1.0.450 Java7.1:<7.1.0.450 Java7.1.sdk:<7.1.0.450 Java7.1_64.sdk:<7.1.0.450 Java8:<8.0.0.540 Java8.jre:<8.0.0.540 Java8_64.jre:<8.0.0.540 Java8.sdk:<8.0.0.540 Java8_64.sdk:<8.0.0.540,20191009, ,n/a,See advisory,CVE-2019-11775:8.4 / CVE-2019-11772:8.4 / CVE-2019-2766:3.1 / CVE-2019-2786:3.4 / CVE-2019-2816:4.8 / CVE-2019-2762:5.3 / CVE-2019-2769:5.3 / CVE-2019-7317:6.5 / CVE-2019-4473:8.4 / CVE-2019-11771:8.4,no sec,aix,OpenSSL,There is a vulnerability in OpenSSL used by AIX.,CVE-2019-1547 / CVE-2019-1563,See Bulletin,openssl-1.0.2.2000.tar.Z openssl-20.16.102.2000.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory31.asc,openssl.base:1.0.2.500-1.0.2.1801 openssl.base:20.13.102.1000-20.16.102.1801,20191126, ,n/a,https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp&S_PKG=openssl,CVE-2019-1547:5.5 / CVE-2019-1563:3.7,no sec,aix,OpenSSL,There is a vulnerability in OpenSSL used by AIX.,CVE-2019-1559,See Bulletin,102pa_mfix.190318.epkg.Z fips_102pa.190318.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory30.asc,openssl.base:1.0.2.500-1.0.2.1601 openssl.base:20.13.102.1000-20.16.102.1600,20190416, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix30.tar,CVE-2019-1559:5.8,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2019-2989 / CVE-2019-2958 / CVE-2019-2975 / CVE-2019-2999 / CVE-2019-2996 / CVE-2019-2992 / CVE-2019-2988 / CVE-2019-2983 / CVE-2019-2981 / CVE-2019-2978 / CVE-2019-2973 / CVE-2019-2962 / CVE-2019-2964 / CVE-2019-2945 / CVE-2019-2933 / CVE-2019-17631 / CVE-2020-2604 / CVE-2020-2593 / CVE-2020-2659 / CVE-2020-2583,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_jan2020_advisory.asc,Java7:<7.0.0.660 Java7_64.jre:<7.0.0.660 Java7.jre:<7.0.0.660 Java7_64.sdk:<7.0.0.660 Java7.sdk:<7.0.0.660 Java7.1.jre:<7.1.0.460 Java7.1_64.jre:<7.1.0.460 Java7.1:<7.1.0.460 Java7.1.sdk:<7.1.0.460 Java7.1_64.sdk:<7.1.0.460 Java8:<8.0.0.605 Java8.jre:<8.0.0.605 Java8_64.jre:<8.0.0.605 Java8.sdk:<8.0.0.605 Java8_64.sdk:<8.0.0.605,20200217, ,n/a,See advisory,CVE-2019-2989:6.8 / CVE-2019-2958:5.9 / CVE-2019-2975:4.8 / CVE-2019-2999:4.7 / CVE-2019-2996:4.2 / CVE-2019-2992:3.7 / CVE-2019-2988:3.7 / CVE-2019-2983:3.7 / CVE-2019-2981:3.7 / CVE-2019-2978:3.7 / CVE-2019-2973:3.7 / CVE-2019-2962:3.7 / CVE-2019-2964:3.7 / CVE-2019-2945:3.1 / CVE-2019-2933:3.1 / CVE-2019-17631:8.4 / CVE-2020-2604:8.1 / CVE-2020-2593:4.8 / CVE-2020-2659:3.7 / CVE-2020-2583:3.7,no sec,aix,OpenSSH,Vulnerabilities in OpenSSH affect AIX.,CVE-2019-6109 / CVE-2019-6110 / CVE-2019-6111 / CVE-2018-20685,See Bulletin,OpenSSH_7.5.102.1800.tar.Z,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory13.asc,openssh.base.client:4.0.0.5200-7.5.102.1600 openssh.base.server:4.0.0.5200-7.5.102.1600,20190716, ,n/a,https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp&S_PKG=openssh,CVE-2019-6109:3.1 / CVE-2019-6110:3.1 / CVE-2019-6111:5.3 / CVE-2018-20685:7.5,no sec,aix,7100-05-02 :: 7100-05-03 :: 7100-05-04,Vulnerabilities in NTP affect AIX,CVE-2019-8936,7100-05-05,IJ17062m4a.190628.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc,bos.net.tcp.client:7.1.5.0-7.1.5.33,20190819, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar,CVE-2019-8936:5.3,no sec,aix,7200-02-02 :: 7200-02-03 :: 7200-02-04,Vulnerabilities in NTP affect AIX,CVE-2019-8936,7200-02-05,IJ17064m4a.190701.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc,bos.net.tcp.ntp:7.2.2.0-7.2.2.17 bos.net.tcp.ntpd:7.2.2.0-7.2.2.17,20190819, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar,CVE-2019-8936:5.3,no sec,aix,7200-03-01 :: 7200-03-02 :: 7200-03-03,Vulnerabilities in NTP affect AIX,CVE-2019-8936,7200-03-04,IJ17065m3a.190701.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc,bos.net.tcp.ntp:7.2.3.0-7.2.3.15 bos.net.tcp.ntpd:7.2.3.0-7.2.3.15,20190819, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar,CVE-2019-8936:5.3,no sec,aix,7100-04-06 :: 7100-04-07 :: 7100-04-08,Vulnerabilities in NTP affect AIX,CVE-2019-8936,See Bulletin,IJ17061m8a.190628.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc,bos.net.tcp.client:7.1.4.0-7.1.4.35,20190819, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar,CVE-2019-8936:5.3,no sec,aix,7200-01-04 :: 7200-01-05 :: 7200-01-06,Vulnerabilities in NTP affect AIX,CVE-2019-8936,See Bulletin,IJ17063m6a.190701.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc,bos.net.tcp.ntp:7.2.1.0-7.2.1.2 bos.net.tcp.ntpd:7.2.1.0-7.2.1.3,20190819, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar,CVE-2019-8936:5.3,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2020-14621 / CVE-2020-14593 / CVE-2020-14583 / CVE-2020-14579 / CVE-2020-14578 / CVE-2020-14577 / CVE-2020-14556 / CVE-2019-17639 / CVE-2020-2601 / CVE-2020-2590,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_july2020_advisory.asc,Java7:<7.0.0.670 Java7_64.jre:<7.0.0.670 Java7.jre:<7.0.0.670 Java7_64.sdk:<7.0.0.670 Java7.sdk:<7.0.0.670 Java7.1.jre:<7.1.0.470 Java7.1_64.jre:<7.1.0.470 Java7.1:<7.1.0.470 Java7.1.sdk:<7.1.0.470 Java7.1_64.sdk:<7.1.0.470 Java8:<8.0.0.616 Java8.jre:<8.0.0.616 Java8_64.jre:<8.0.0.616 Java8.sdk:<8.0.0.616 Java8_64.sdk:<8.0.0.616,20201103, ,n/a,See advisory,CVE-2020-14621:5.3 / CVE-2020-14593:7.4 / CVE-2020-14583:8.3 / CVE-2020-14579:3.7 / CVE-2020-14578:3.7 / CVE-2020-14577:3.7 / CVE-2020-14556:4.8 / CVE-2019-17639:5.3 / CVE-2020-2601:6.8 / CVE-2020-2590:3.7,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2020-14779 / CVE-2020-14796 / CVE-2020-14797 / CVE-2020-14798 / CVE-2020-14782 / CVE-2020-2773 / CVE-2020-14803 / CVE-2020-27221 / CVE-2020-14781,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_mar2021_advisory.asc,Java7:<7.0.0.680 Java7_64.jre:<7.0.0.680 Java7.jre:<7.0.0.680 Java7_64.sdk:<7.0.0.680 Java7.sdk:<7.0.0.680 Java7.1.jre:<7.1.0.480 Java7.1_64.jre:<7.1.0.480 Java7.1:<7.1.0.480 Java7.1.sdk:<7.1.0.480 Java7.1_64.sdk:<7.1.0.480 Java8:<8.0.0.625 Java8.jre:<8.0.0.625 Java8_64.jre:<8.0.0.625 Java8.sdk:<8.0.0.625 Java8_64.sdk:<8.0.0.625,20210315, ,n/a,See advisory,CVE-2020-14779:3.7 / CVE-2020-14796:3.1 / CVE-2020-14797:3.7 / CVE-2020-14798:3.1 / CVE-2020-14782:3.7 / CVE-2020-2773:3.7 / CVE-2020-14803:5.3 / CVE-2020-27221:9.8 / CVE-2020-14781:3.7,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2020-2830 / CVE-2020-2805 / CVE-2020-2803 / CVE-2020-2800 / CVE-2020-2781 / CVE-2020-2757 / CVE-2020-2756 / CVE-2020-2755 / CVE-2020-2754 / CVE-2019-2949 / CVE-2020-2654,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_apr2020_advisory.asc,Java7:<7.0.0.665 Java7_64.jre:<7.0.0.665 Java7.jre:<7.0.0.665 Java7_64.sdk:<7.0.0.665 Java7.sdk:<7.0.0.665 Java7.1.jre:<7.1.0.465 Java7.1_64.jre:<7.1.0.465 Java7.1:<7.1.0.465 Java7.1.sdk:<7.1.0.465 Java7.1_64.sdk:<7.1.0.465 Java8:<8.0.0.610 Java8.jre:<8.0.0.610 Java8_64.jre:<8.0.0.610 Java8.sdk:<8.0.0.610 Java8_64.sdk:<8.0.0.610,20200731, ,n/a,See advisory,CVE-2020-2830:5.3 / CVE-2020-2805:8.3 / CVE-2020-2803:8.3 / CVE-2020-2800:4.8 / CVE-2020-2781:5.3 / CVE-2020-2757:3.7 / CVE-2020-2756:3.7 / CVE-2020-2755:3.7 / CVE-2020-2754:3.7 / CVE-2019-2949:6.8 / CVE-2020-2654:3.7,no sec,aix,RPM,AIX is vulnerable to arbitrary code execution and RPM database corruption and denial of service due to RPM.,CVE-2021-20271 / CVE-2021-3421 / CVE-2021-20266,See Bulletin,rpm.rte.4.15.1.1006 rpm.rte.4.15.1.2006,https://aix.software.ibm.com/aix/efixes/security/rpm_advisory.asc,rpm.rte:4.9.1.3-4.15.1.1005 rpm.rte:4.15.1.2000-4.15.1.2005,20220923, ,n/a,https://aix.software.ibm.com/aix/efixes/security/rpm_fix.tar,CVE-2021-20271:6.7 / CVE-2021-3421:6.1 / CVE-2021-20266:3.1,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2021-2161 / CVE-2021-2432 / CVE-2021-2369,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_sep2021_advisory.asc,Java7:<7.0.0.690 Java7_64.jre:<7.0.0.690 Java7.jre:<7.0.0.690 Java7_64.sdk:<7.0.0.690 Java7.sdk:<7.0.0.690 Java7.1.jre:<7.1.0.490 Java7.1_64.jre:<7.1.0.490 Java7.1:<7.1.0.490 Java7.1.sdk:<7.1.0.490 Java7.1_64.sdk:<7.1.0.490 Java8:<8.0.0.635 Java8.jre:<8.0.0.635 Java8_64.jre:<8.0.0.635 Java8.sdk:<8.0.0.635 Java8_64.sdk:<8.0.0.635,20210915, ,n/a,https://aix.software.ibm.com/aix/efixes/security/java_sep2021_fix.tar,CVE-2021-2161:5.9 / CVE-2021-2432:3.7 / CVE-2021-2369:4.3,no sec,aix,Java7 :: Java7.1 :: Java8,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2021-2163 / CVE-2021-28167 / CVE-2021-41041 / CVE-2022-21619 / CVE-2022-21624 / CVE-2022-21626 / CVE-2022-21628 / CVE-2022-3676,See Bulletin,null,https://aix.software.ibm.com/aix/efixes/security/java_dec2022_advisory.asc,See Bulletin,20221222, ,,null,CVE-2021-2163:5.3 / CVE-2021-28167:6.5 / CVE-2021-41041:5.3 / CVE-2022-21619:3.7 / CVE-2022-21624:3.7 / CVE-2022-21626:5.3 / CVE-2022-21628:5.3 / CVE-2022-3676:6.5,no sec,aix,OpenSSL,Vulnerabilities in OpenSSL affect AIX,CVE-2021-23839 / CVE-2021-23840 / CVE-2021-23841,See Bulletin,1022100b.210323.epkg.Z fips2100b.210323.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory33.asc,openssl.base:1.0.2.500-1.0.2.2100 openssl.base:20.13.102.1000-20.16.102.2100,20210415, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix33.tar,CVE-2021-23839:5.9 / CVE-2021-23840:7.5 / CVE-2021-23841:7.5,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2021-35560 / CVE-2021-35586 / CVE-2021-35578 / CVE-2021-35564 / CVE-2021-35559 / CVE-2021-35556 / CVE-2021-35565 / CVE-2021-41035 / CVE-2021-2341,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_feb2022_advisory.asc,Java7:<7.0.0.700 Java7_64.jre:<7.0.0.700 Java7.jre:<7.0.0.700 Java7_64.sdk:<7.0.0.700 Java7.sdk:<7.0.0.700 Java7.1.jre:<7.1.0.500 Java7.1_64.jre:<7.1.0.500 Java7.1:<7.1.0.500 Java7.1.sdk:<7.1.0.500 Java7.1_64.sdk:<7.1.0.500 Java8:<8.0.0.700 Java8.jre:<8.0.0.700 Java8_64.jre:<8.0.0.700 Java8.sdk:<8.0.0.700 Java8_64.sdk:<8.0.0.700,20220223, ,n/a,https://aix.software.ibm.com/aix/efixes/security/java_feb2022_fix.tar,CVE-2021-35560:7.5 / CVE-2021-35586:5.3 / CVE-2021-35578:5.3 / CVE-2021-35564:5.3 / CVE-2021-35559:5.3 / CVE-2021-35556:5.3 / CVE-2021-35565:5.3 / CVE-2021-41035:7.7 / CVE-2021-2341:3.1,no sec,aix,OpenSSL,There is a vulnerability in OpenSSL used by AIX.,CVE-2021-3712,See Bulletin,1022102a.210927.epkg.Z fips2102a.210927.epkg.Z ,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory34.asc,openssl.base:1.0.2.500-1.0.2.2102 openssl.base:20.13.102.1000-20.16.102.2103,20220106, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix34.tar,CVE-2021-3712:6.5,no sec,aix,smbcd,There is a vulnerability in the AIX smbcd daemon.,CVE-2021-38993,See Bulletin,smbcd_fix.tar smbc_302_fileset_71.tar.gz smbc_302_fileset_72.tar.gz,https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory.asc,smbc.rte:7.1.0.0-7.1.302.6 smbc.rte:7.2.0.0-7.2.302.6,20220224, ,n/a,https://aix.software.ibm.com/aix/efixes/security/smbcd_fix.tar,CVE-2021-38993:6.2,no sec,aix,OpenSSH,Vulnerabilities in OpenSSH affect AIX.,CVE-2021-41617,See Bulletin,41617s9a.211029.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssh_advisory14.asc,openssh.base.client:4.0.0.5200-8.1.102.2104 openssh.base.server:4.0.0.5200-8.1.102.2104,20220106, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssh_fix14.tar,CVE-2021-41617:7.4,no sec,aix,OpenSSL,AIX is vulnerable to a denial of service due to OpenSSL,CVE-2022-0778,See Bulletin,1022103a.220422.epkg.Z 1111200a.220422.epkg.Z 1121200a.220422.epkg.Z fips2104a.220425.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory35.asc,openssl.base:1.0.2.500-1.0.2.2103 openssl.base:20.13.102.1000-20.16.102.2104 openssl.base:1.1.1.0-1.1.1.1200 openssl.base:1.1.2.0-1.1.2.1200,20220513, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix35.tar,CVE-2022-0778:7.5,no sec,aix,OpenSSL,AIX is vulnerable to arbitrary command execution due to OpenSSL,CVE-2022-1292 / CVE-2022-2068 / CVE-2022-2097,See Bulletin,1022104a.220804.epkg.Z 1111201a.220804.epkg.Z 1121201a.220804.epkg.Z fips2105a.220804.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory36.asc,openssl.base:1.0.2.500-1.0.2.2104 openssl.base:20.13.102.1000-20.16.102.2105 openssl.base:1.1.1.0-1.1.1.1201 openssl.base:1.1.2.0-1.1.2.1201,20220817, ,n/a,https://aix.software.ibm.com/aix/efixes/security/openssl_fix36.tar,CVE-2022-1292:6.3 / CVE-2022-2068:7.3 / CVE-2022-2097:6.3,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2022-21365 / CVE-2022-21360 / CVE-2022-21341 / CVE-2022-21340 / CVE-2022-21294 / CVE-2022-21293 / CVE-2022-21248 / CVE-2021-35550 / CVE-2021-35603 / CVE-2022-21299 / CVE-2022-21496 / CVE-2022-21434 / CVE-2022-21443 / CVE-2021-35561,See advisory,See advisory,https://aix.software.ibm.com/aix/efixes/security/java_jun2022_advisory.asc,Java7:<7.0.0.705 Java7_64.jre:<7.0.0.705 Java7.jre:<7.0.0.705 Java7_64.sdk:<7.0.0.705 Java7.sdk:<7.0.0.705 Java7.1.jre:<7.1.0.505 Java7.1_64.jre:<7.1.0.505 Java7.1:<7.1.0.505 Java7.1.sdk:<7.1.0.505 Java7.1_64.sdk:<7.1.0.505 Java8:<8.0.0.706 Java8.jre:<8.0.0.706 Java8_64.jre:<8.0.0.706 Java8.sdk:<8.0.0.706 Java8_64.sdk:<8.0.0.706,20220614, ,n/a,https://aix.software.ibm.com/aix/efixes/security/java_jun2022_fix.tar,CVE-2022-21365:5.3 / CVE-2022-21360:5.3 / CVE-2022-21341:5.3 / CVE-2022-21340:5.3 / CVE-2022-21294:5.3 / CVE-2022-21293:5.3 / CVE-2022-21248:3.7 / CVE-2021-35550:5.9 / CVE-2021-35603:3.7 / CVE-2022-21299:5.3 / CVE-2022-21496:5.3 / CVE-2022-21434:5.3 / CVE-2022-21443:3.7 / CVE-2021-35561:5.3,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2022-21426 / CVE-2023-21830 / CVE-2023-21843 / CVE-2023-30441,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/java_may2023_advisory.asc,,20230519, ,,https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere,CVE-2022-21426:5.3 / CVE-2023-21830:5.3 / CVE-2023-21843:3.7 / CVE-2023-30441:7.5,no sec,aix,Python39,AIX is affected by multiple vulnerabilities in Python,CVE-2022-22827 / CVE-2022-25236 / CVE-2022-25235 / CVE-2022-25315 / CVE-2022-22824 / CVE-2022-22825 / CVE-2022-22823 / CVE-2021-46143 / CVE-2022-23990 / CVE-2022-22826 / CVE-2022-25314 / CVE-2022-25313 / CVE-2022-23852 / CVE-2021-45960 / CVE-2022-22822,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory.asc,python3.9.base:3.9.0.0-3.9.11.99,20220728, ,n/a,https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp,CVE-2022-22827:7.8 / CVE-2022-25236:5.3 / CVE-2022-25235:3.3 / CVE-2022-25315:7.8 / CVE-2022-22824:7.8 / CVE-2022-22825:7.8 / CVE-2022-22823:7.8 / CVE-2021-46143:7.8 / CVE-2022-23990:9.8 / CVE-2022-22826:7.8 / CVE-2022-25314:7.3 / CVE-2022-25313:5.5 / CVE-2022-23852:9.8 / CVE-2021-45960:5.5 / CVE-2022-22822:7.8,no sec,aix,BIND,AIX is vulnerable to denial of service due to ISC BIND,CVE-2022-3094 / CVE-2022-3736 / CVE-2022-3924,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/bind_advisory23.asc,bind.rte:7.1.916.0-7.1.916.2601,20230718, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2022-3094:7.5 / CVE-2022-3736:7.5 / CVE-2022-3924:7.5,no sec,aix,Perl,AIX is vulnerable to HTTP request smuggling due to Perl,CVE-2022-31081,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/perl_advisory6.asc,perl.rte:5.28.0.0-5.28.1.4 perl.rte:5.34.0.0-5.34.1.1,20230503, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2022-31081:7.3,no sec,aix,OpenSSL,Multiple vulnerabilities in OpenSSL affect AIX,CVE-2022-3358 / CVE-2022-3602 / CVE-2022-3786,See Bulletin,,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory37.asc,openssl.base:3.0.5.101-3.0.5.101,20230124, ,,https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp,CVE-2022-3358:5.3 / CVE-2022-3602:7.5 / CVE-2022-3786:7.5,no sec,aix,InvScout,AIX is vulnerable to a privilege escalation vulnerability due to invscout,CVE-2022-36768,See Bulletin,invscout_fix3,https://aix.software.ibm.com/aix/efixes/security/invscout_advisory3.asc,invscout.rte:2.2.0.0-2.2.0.22,20220912, ,n/a,https://aix.software.ibm.com/aix/efixes/security/invscout_fix3.tar,CVE-2022-36768:8.4,no sec,aix,zlib :: zlibNX,AIX is vulnerable to denial of service due to zlib and zlibNX,CVE-2022-37434,See Bulletin,rpm.rte.4.15.1.1007 rpm.rte.4.15.1.2007 IJ47324m5a.230623.epkg.Z IJ46030m3a.230623.epkg.Z IJ44986s1a.230623.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/zlib_advisory2.asc,rpm.rte:4.9.1.3-4.15.1.1006 rpm.rte:4.15.1.2000-4.15.1.2006 zlibNX.rte:7.2.4.0-7.2.4.8 zlibNX.rte:7.3.0.0-7.3.0.2 zlibNX.rte:7.3.1.0-7.3.1.0,20230725, ,,https://aix.software.ibm.com/aix/efixes/security/zlib_fix2.tar,CVE-2022-37434:7.3,no sec,aix,OpenSSL,Multiple vulnerabilities in OpenSSL affect AIX,CVE-2022-3996 / CVE-2023-0401 / CVE-2022-4304 / CVE-2022-4203 / CVE-2023-0216 / CVE-2023-0215 / CVE-2023-0217 / CVE-2023-0286 / CVE-2022-4450,See Bulletin,,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory38.asc,openssl.base:1.0.2.500-1.0.2.2105 openssl.base:1.1.1.0-1.1.1.1202 openssl.base:1.1.2.0-1.1.2.1202 openssl.base:20.13.102.1000-20.16.102.2106 openssl.base:3.0.5.101-3.0.7.1000,20230321, ,n/a,https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp&S_PKG=openssl,CVE-2023-3996:3.7 / CVE-2023-0401:7.5 / CVE-2022-4304:7.5 / CVE-2022-4203:7.5 / CVE-2023-0216:7.5 / CVE-2023-0215:7.5 / CVE-2023-0217:7.5 / CVE-2023-0286:8.2 / CVE-2022-4450:7.5,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2022-40609 / CVE-2023-22049,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/java_aug2023_advisory.asc,Java8:<8.0.0.810 Java8.jre:<8.0.0.810 Java8.sdk:<8.0.0.81 Java8_64.sdk:<8.0.0.810 Java8_64.jre:<8.0.0.810,20230831, ,,https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0,CVE-2022-40609:8.1 / CVE-2023-22049:3.7,no sec,aix,Python39,AIX is affected by arbitrary code execution and denial of service due to Python,CVE-2022-40674 / CVE-2020-10735,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory2.asc,python3.9.base:3.9.0.0-3.9.13.99,20221101, ,n/a,https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp,CVE-2022-40674:9.8 / CVE-2020-10735:7.5,no sec,aix,SMB,AIX is vulnerable to a denial of service due to the AIX SMB client,CVE-2022-43381,See Bulletin,null,https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory2.asc,smbc.rte:7.1.0.0-7.1.302.8 smbc.rte:7.2.0.0-7.2.302.8,20221222, ,,https://aix.software.ibm.com/aix/efixes/security/smbcd_fix2.tar,CVE-2022-43381:6.2,no sec,aix,Python,AIX is affected by a denial of service due to Python,CVE-2022-43680,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory3.asc,python3.9.base:3.9.0.0-3.9.14.0,20221222, ,,https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp,CVE-2022-43680:7.5,no sec,aix,Python,AIX is affected by a denial of service due to Python,CVE-2022-45061,See Bulletin,,https://aix.software.ibm.com/aix/efixes/security/python_advisory4.asc,python3.9.base:3.9.0.0-3.9.14.1,20230314, ,,https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp,CVE-2022-45061:7.5,no sec,aix,OpenSSL,Multiple vulnerabilities in OpenSSL affect AIX,CVE-2023-0464 / CVE-2023-0465 / CVE-2023-0466 / CVE-2023-2650 / CVE-2023-2975 / CVE-2023-3446 / CVE-2023-3817,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory39.asc,openssl.base:1.0.2.500-1.0.2.2106 openssl.base:1.1.1.0-1.1.1.2000 openssl.base:1.1.2.0-1.1.2.2000 openssl.base:20.13.102.1000-20.16.102.2107 openssl.base:3.0.5.101-3.0.8.1000,20230911, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp&S_PKG=openssl,CVE-2023-0464:5.3 / CVE-2023-0465:3.7 / CVE-2023-0466:3.7 / CVE-2023-2650:7.5 / CVE-2023-2975:5.3 / CVE-2023-3446:3.7 / CVE-2023-3817:3.7,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2023-21930 / CVE-2023-21937 / CVE-2023-21938 / CVE-2023-21939 / CVE-2023-21967 / CVE-2023-21968 / CVE-2023-2597,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/java_jul2023_advisory.asc,Java8:<8.0.0.805,20230711, ,,https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere,CVE-2023-21930:7.4 / CVE-2023-21937:3.7 / CVE-2023-21938:3.7 / CVE-2023-21939:5.3 / CVE-2023-21967:5.9 / CVE-2023-21968:3.7 / CVE-2023-2597:7.0,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2023-22067 / CVE-2023-22081 / CVE-2023-5676,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/java_dec2023_advisory.asc,Java8:<8.0.0.815 Java8.jre:<8.0.0.815 Java8.sdk:<8.0.0.815 Java8_64.sdk:<8.0.0.815 Java8_64.jre:<8.0.0.815,20231218, ,,https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&function=all,CVE-2023-22067:5.3 / CVE-2023-22081:5.3 / CVE-2023-5676:4.1,no sec,aix,Python,AIX is affected by security restrictions bypass due to Python,CVE-2023-24329,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory5.asc,python3.9.base:3.9.0.0-3.9.16.0,20230818, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-24329:7.5,no sec,aix,NTPv4,AIX is vulnerable to a denial of service due to NTP,CVE-2023-26551 / CVE-2023-26552 / CVE-2023-26553 / CVE-2023-26554,See Bulletin,IJ47973s6a.230829.epkg.Z IJ47974s4a.230829.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory14.asc,ntp.rte:7.4.2.8100-7.4.2.8153 ntp.rte:73.4.2.8151-73.4.2.8154,20231005, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix14.tar,CVE-2023-26551:5.3 / CVE-2023-26552:5.3 / CVE-2023-26553:5.3 / CVE-2023-26554:5.3,no sec,aix,BIND,AIX is vulnerable to denial of service due to ISC BIND,CVE-2023-2828,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/bind_advisory24.asc,bind.rte:7.1.916.0-7.1.916.2602,20230907, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-2828:7.5,no sec,aix,invScout,AIX is vulnerable to arbitrary command execution due to invscout,CVE-2023-28528,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/invscout_advisory4.asc,invscout.rte:2.2.0.0-2.2.0.23 invscout.rte:2.2.0.0-2.2.0.23,20230412, ,,https://aix.software.ibm.com/aix/efixes/security/invscout_fix4.tar,CVE-2023-28528:8.4,no sec,aix,Perl,AIX is vulnerable to sensitive information exposure due to Perl - CVE-2023-31484,CVE-2023-31484,See Bulletin,31484s6a.231017.epkg.Z 31484m6a.231020.epkg.Z 31484s2a.231018.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/perl_advisory7.asc,perl.rte:5.28.0.0-5.28.1.6 perl.rte:5.34.0.0-5.34.1.3,20231005,20231102,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-31484:6.8,no sec,aix,Perl,AIX is vulnerable to sensitive information exposure due to Perl - CVE-2023-2331486,CVE-2023-31486,See Bulletin,31486s6a.231017.epkg.Z 31484m6a.231020.epkg.Z 31486s6b.231020.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/perl_advisory7.asc,perl.rte:5.28.0.0-5.28.1.7,20231005,20231102,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-31486:6.8,no sec,aix,BIND,AIX is vulnerable to denial of service due to ISC BIND,CVE-2023-3341,See Bulletin,IJ49093s7.231109.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc,bind.rte:7.1.916.0-7.1.916.2603 bind.rte:7.3.916.0-7.3.916.2600,20231218, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-3341:7.5,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2023-33850 / CVE-2024-20918 / CVE-2024-20921 / CVE-2024-20926 / CVE-2024-20945 / CVE-2024-20952,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/java_feb2024_advisory.asc,Java8:<8.0.0.820 Java8.jre:<8.0.0.820 Java8.sdk:<8.0.0.820 Java8_64.sdk:<8.0.0.820 Java8_64.jre:<8.0.0.820,20240307, ,,https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&function=all,CVE-2023-33850:7.5 / CVE-2024-20918:7.4 / CVE-2024-20921:5.9 / CVE-2024-20926:5.9 / CVE-2024-20945:4.7 / CVE-2024-20952:7.4,no sec,aix,Python,AIX is affected by multiple vulnerabilities due to Python,CVE-2023-37920 / CVE-2023-43804,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory7.asc,python3.9.base:3.9.0.0-3.9.18.0,20231221, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-37920:7.5 / CVE-2023-43804:5.9,no sec,aix,Java SDK,Multiple vulnerabilities in IBM Java SDK affect AIX,CVE-2023-38264 / CVE-2024-21085,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/java_jun2024_advisory.asc,Java8:<8.0.0.825 Java8.jre:<8.0.0.825 Java8.sdk:<8.0.0.825 Java8_64.sdk:<8.0.0.825 Java8_64.jre:<8.0.0.825,20240624, ,,https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&function=all,CVE-2023-38264:5.9 / CVE-2024-21085:3.7,no sec,aix,Python,AIX is affected by a denial of service (CVE-2023-45167) and a security restrictions bypass (CVE-2023-40217) due to Python,CVE-2023-40217 / CVE-2023-45167,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory6.asc,python3.9.base:3.9.0.0-3.9.17.1,20231107, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-40217:7.4 / CVE-2023-45167:6.2,no sec,aix,BIND,AIX is vulnerable to denial of service due to ISC BIND,CVE-2023-4408 / CVE-2023-50387 / CVE-2023-50868 / CVE-2023-5517 / CVE-2023-5679 / CVE-2023-6516,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/bind_advisory26.asc,bind.rte:7.1.916.0-7.1.916.2604 bind.rte:7.2.916.0-7.2.916.2600 bind.rte:7.3.916.0-7.3.916.2601,20240604,20240605,,https://aix.software.ibm.com/aix/efixes/security/bind_fix26.tar,CVE-2023-4408:7.5 / CVE-2023-50387:7.5 / CVE-2023-50868:7.5 / CVE-2023-5517:7.5 / CVE-2023-5679:7.5 / CVE-2023-6516:7.5,no sec,aix,smbcd,AIX is vulnerable to a denial of service due to the AIX SMB client,CVE-2023-45165,See Bulletin,smbc_302_fileset_72.tar.gz smbc_302_fileset_73.tar.gz,https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory3.asc,smbc.rte:7.2.0.0-7.2.302.10,20231221, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-45165:6.2,no sec,aix,invScout,AIX is vulnerable to arbitrary command execution due to invscout,CVE-2023-45168,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/invscout_advisory5.asc,invscout.rte:2.2.0.0-2.2.0.24,20231130, ,,https://aix.software.ibm.com/aix/efixes/security/invscout_fix5.tar,CVE-2023-45168:8.4,no sec,aix,Python39,AIX is affected by information disclosure (CVE-2023-45803) and arbitrary code execution (CVE-2024-6345) due to Python,CVE-2023-45803 / CVE-2024-6345,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory11.asc,python3.9.base:3.9.0.0-3.9.19.1,20240812, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-45803:4.2 / CVE-2024-6345:8.8,no sec,aix,Perl,AIX is vulnerable to arbitrary command execution due to Perl (CVE-2024-25021 CVE-2023-47038 CVE-2023-47100),CVE-2023-47038 / CVE-2023-47100 / CVE-2024-25021,See Bulletin,perl5345ma.240213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/perl_advisory8.asc,perl.rte:5.34.0.0-5.34.1.5,20240221, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-47038:7.8 / CVE-2023-47100:9.8 / CVE-2024-25021:8.4,no sec,aix,Python39,AIX is affected by multiple vulnerabilities due to Python (CVE-2023-52425 CVE-2023-52426 CVE-2023-6597),CVE-2023-52425 / CVE-2023-52426 / CVE-2023-6597,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory8.asc,python3.9.base:3.9.0.0-3.9.18.1,20240411, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-52425:7.5 / CVE-2023-52426:5.1 / CVE-2023-6597:8.4,no sec,aix,OpenSSL,AIX is vulnerable to a denial of service (CVE-2023-5678 CVE-2023-6129 CVE-2023-6237) and an attacker may obtain sensitive information (CVE-2023-5363) due to OpenSSL,CVE-2023-5363 / CVE-2023-5678 / CVE-2023-6129 / CVE-2023-6237,See Bulletin,1022107a.240107.epkg.Z 1112200a.240109.epkg.Z 1122200a.240110.epkg.Z fips2108a.240108.epkg.Z 301002sa.240122.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory40.asc,openssl.base:1.0.2.500-1.0.2.2107 openssl.base:1.1.1.0-1.1.1.2200 openssl.base:1.1.2.0-1.1.2.2200 openssl.base:20.13.102.1000-20.16.102.2108 openssl.base:3.0.0.0-3.0.10.1002,20240126, ,,https://aix.software.ibm.com/aix/efixes/security/openssl_fix40.tar,CVE-2023-5363:5.9 / CVE-2023-5678:3.7 / CVE-2023-6129:5.9 / CVE-2023-6237:3.1,no sec,aix,RPM,AIX is vulnerable to arbitrary code execution due to RPM (CVE-2023-7104),CVE-2023-7104,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/rpm_advisory2.asc,rpm.rte:4.15.1.1000-4.15.1.1012 rpm.rte:4.15.1.2000-4.15.1.2010 rpm.rte:4.18.1.2000-4.18.1.2002,20240424, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2023-7104:5.5,no sec,aix,Python39,AIX is affected by a denial of service (CVE-2024-0397) and information disclosure (CVE-2024-4032 CVE-2024-37891) due to Python,CVE-2024-0397 / CVE-2024-37891 / CVE-2024-4032,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory12.asc,python3.9.base:3.9.0.0-3.9.19.2,20240917, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2024-0397:7.5 / CVE-2024-37891:4.4 / CVE-2024-4032:5.3,no sec,aix,Python39,AIX is affected by a denial of service due to Python (CVE-2024-0450),CVE-2024-0450,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory10.asc,python3.9.base:3.9.0.0-3.9.18.3,20240624, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2024-0450:5.5,no sec,aix,OpenSSL,AIX is vulnerable to a denial of service (CVE-2024-2511 CVE-2024-0727) due to OpenSSL,CVE-2024-0727 / CVE-2024-2511,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/openssl_advisory41.asc,openssl.base:1.1.1.0-1.1.1.2200 openssl.base:1.1.2.0-1.1.2.2200 openssl.base:3.0.5.101-3.0.10.1002,20240716, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp&S_PKG=openssl,CVE-2024-0727:3.1 / CVE-2024-2511:3.7,no sec,aix,opencryptoki,AIX is vulnerable to information disclosure due to openCryptoki (CVE-2024-0914),CVE-2024-0914,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/opencryptoki_advisory.asc,opencki.base:3.21.0.0-3.21.0.1000,20240603, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp&S_PKG=opencryptoki,CVE-2024-0914:5.9,no sec,aix,Python39,AIX is affected by information disclosure due to Python (CVE-2024-28757),CVE-2024-28757,See Bulletin,See Bulletin,https://aix.software.ibm.com/aix/efixes/security/python_advisory9.asc,python3.9.base:3.9.0.0-3.9.18.2,20240613, ,,https://www.ibm.com/resources/mrs/assets?source=aixbp,CVE-2024-28757:7.5,no hiper,vios,2.2.4.30 :: 2.2.4.40 :: 2.2.4.50,SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS,IJ00360,2.2.4.60,IJ00360m9a.180313.AIX61TL09SP09.epkg.Z IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z IJ00360sAa.171228.AIX61TL09SP10.epkg.Z IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z IV97339m7a.180329.VIOS2.2.4.40.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ00360,,20180331, ,7100-04:IJ00519 7100-05:IJ01304 7200-01:IV96360 7200-02:IJ01262,https://aix.software.ibm.com/aix/ifixes/ij00360/, ,yes hiper,vios,2.2.5.0 :: 2.2.5.10 :: 2.2.5.20 :: 2.2.5.30,SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS,IJ00360,2.2.5.40,IJ00360m9a.180313.AIX61TL09SP09.epkg.Z IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z IJ00360sAa.171228.AIX61TL09SP10.epkg.Z IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z IV97339m7a.180329.VIOS2.2.4.40.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ00360,,20180331, ,7100-04:IJ00519 7100-05:IJ01304 7200-01:IV96360 7200-02:IJ01262,https://aix.software.ibm.com/aix/ifixes/ij00360/, ,yes hiper,vios,2.2.6.0 :: 2.2.6.10,SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS,IJ00360,2.2.6.20,IJ00360m9a.180313.AIX61TL09SP09.epkg.Z IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z IJ00360sAa.171228.AIX61TL09SP10.epkg.Z IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z IV97339m7a.180329.VIOS2.2.4.40.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ00360,,20180331, ,7100-04:IJ00519 7100-05:IJ01304 7200-01:IV96360 7200-02:IJ01262,https://aix.software.ibm.com/aix/ifixes/ij00360/, ,yes hiper,aix,6100-09-08 :: 6100-09-09 :: 6100-09-10,SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS,IJ00360,6100-09-11,IJ00360m9a.180313.AIX61TL09SP09.epkg.Z IJ00360sAa.171228.AIX61TL09SP10.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ00360,devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.300,20180331, ,7100-04:IJ00519 7100-05:IJ01304 7200-01:IV96360 7200-02:IJ01262,https://aix.software.ibm.com/aix/ifixes/ij00360/, ,yes hiper,aix,7100-04-03 :: 7100-04-04 :: 7100-04-05,SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS,IJ00519,7100-04-06,IJ00519s5a.171222.AIX71TL04SP05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ00519,devices.pciex.df1060e214103404.com:7.1.4.30-7.1.4.32,20180331, ,6100-09:IJ00360 7100-05:IJ01304 7200-01:IV96360 7200-02:IJ01262,https://aix.software.ibm.com/aix/ifixes/ij00519/, ,yes sec,aix,6100-09-10 :: 6100-09-08 :: 6100-09-09,There are multiple vulnerabilities in tcpdump that impact AIX.,IJ00563 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-,6100-09-11,IV94728mAa.171008.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc,bos.net.tcp.server:6.1.9.0-6.1.9.300,20171108, ,5300-12:IJ00568 7200-00:IJ00567 7100-03:IJ00564 7100-04:IJ00565 7200-01:IJ00567,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar,CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV,no sec,aix,7100-03-07 :: 7100-03-08 :: 7100-03-09,There are multiple vulnerabilities in tcpdump that impact AIX.,IJ00564 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-,See Bulletin,IV94727m9a.171009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc,bos.net.tcp.server:7.1.3.0-7.1.3.49,20171108, ,5300-12:IJ00568 7200-00:IJ00567 7100-04:IJ00565 6100-09:IJ00563 7200-01:IJ00567,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar,CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV,no sec,aix,7100-04-03 :: 7100-04-04 :: 7100-04-05,There are multiple vulnerabilities in tcpdump that impact AIX.,IJ00565 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-,7100-04-06,IV94726m5a.171009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc,bos.net.tcp.server:7.1.4.0-7.1.4.32,20171108, ,5300-12:IJ00568 7200-00:IJ00567 7100-03:IJ00564 6100-09:IJ00563 7200-01:IJ00567,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar,CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV,no sec,aix,7200-00-03 :: 7200-00-04 :: 7200-00-05,There are multiple vulnerabilities in tcpdump that impact AIX.,IJ00566 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-,7200-00-06,IV94724m5a.171009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc,bos.net.tcp.tcpdump:7.2.0.0-7.2.0.3,20171108, ,5300-12:IJ00568 7100-03:IJ00564 7100-04:IJ00565 6100-09:IJ00563 7200-01:IJ00567,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar,CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV,no sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,There are multiple vulnerabilities in tcpdump that impact AIX.,IJ00567 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-,7200-01-04,IV94723m3a.171009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc,bos.net.tcp.tcpdump:7.2.1.0-7.2.1.1,20171108, ,5300-12:IJ00568 7200-00:IJ00567 7100-03:IJ00564 7100-04:IJ00565 6100-09:IJ00563,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar,CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV,no sec,aix,5300-12-09,There are multiple vulnerabilities in tcpdump that impact AIX.,IJ00568 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-,See Bulletin,IV94729m9a.171009.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc,bos.net.tcp.server:5.3.12.0-5.3.12.6,20171108, ,7200-00:IJ00567 7100-03:IJ00564 7100-04:IJ00565 6100-09:IJ00563 7200-01:IJ00567,ftp://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar,CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV,no sec,aix,5300-12-09,(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IJ00951 / CVE-2017-1692,See Bulletin,IJ00951s9a.171031.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.lvm:5.3.12.0-5.3.12.8,20180205, ,7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,ftp://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no hiper,aix,7200-02-00 :: 7200-02-01,SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS,IJ01262,7200-02-02,IJ01262s1a.180328.AIX72TL02SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ01262,devices.pciex.df1060e214103404.com:7.2.2.0,20180331, ,6100-09:IJ00360 7100-04:IJ00519 7100-05:IJ01304 7200-01:IV96360,https://aix.software.ibm.com/aix/ifixes/ij01262/, ,yes hiper,aix,7200-02-00 :: 7200-02-01,ETHERCHANNEL NIB MODE COMMUNICATION FAILURE ON BACKUP ADAPTER,IJ01263,7200-02-02,IJ01263s1c.AIX72TL02SP00-01.180119.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ01263,devices.common.IBM.ethernet.rte:7.2.2.0,20180123, ,,https://aix.software.ibm.com/aix/ifixes/ij01263/, ,yes hiper,aix,7100-05-00 :: 7100-05-01,SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS,IJ01304,7100-05-02,IJ01304s1a.180328.AIX71TL05SP00-01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ01304,devices.pciex.df1060e214103404.com:7.1.5.0,20180331, ,6100-09:IJ00360 7100-04:IJ00519 7200-01:IV96360 7200-02:IJ01262,https://aix.software.ibm.com/aix/ifixes/ij01304/, ,yes hiper,vios,2.2.6.0 :: 2.2.6.10,After updating all VIOS SSP nodes -- Node Upgrade Status still shows UP_LEVEL,IJ02674,2.2.6.20,IJ02674sAa.VIOS2.2.6.0.171215.epkg.Z IJ02674sAa.VIOS2.2.6.10.171215.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ02674,pool.basic.rte:6.1.9.300,20171219, ,,https://aix.software.ibm.com/aix/ifixes/ij02674/, ,yes sec,aix,6100-09-10 :: 6100-09-08 :: 6100-09-09,Vulnerability impacts AIX and VIOS (CVE-2018-1383),IJ02726 / CVE-2018-1383,6100-09-11,IJ02726s8a.171221.epkg.Z IJ02726s9a.171221.epkg.Z IJ02726sAa.171221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc,bos.cluster.rte:6.1.9.0-6.1.9.300,20180208, ,7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825,https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar,CVE-2018-1383:9.1,no sec,vios,2.2.4.30 :: 2.2.4.40,Vulnerability impacts VIOS and VIOS (CVE-2018-1383),IJ02726 / CVE-2018-1383,6100-09-11,IJ02726s8a.171221.epkg.Z IJ02726s9a.171221.epkg.Z IJ02726sAa.171221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc,bos.cluster.rte:6.1.9.0-6.1.9.300,20180208, ,7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825,https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar,CVE-2018-1383:9.1,no sec,vios,2.2.5.10 :: 2.2.5.20 :: 2.2.5.30,Vulnerability impacts VIOS and VIOS (CVE-2018-1383),IJ02726 / CVE-2018-1383,6100-09-11,IJ02726s8a.171221.epkg.Z IJ02726s9a.171221.epkg.Z IJ02726sAa.171221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc,bos.cluster.rte:6.1.9.0-6.1.9.300,20180208, ,7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825,https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar,CVE-2018-1383:9.1,no sec,vios,2.2.6.0 :: 2.2.6.10,Vulnerability impacts VIOS and VIOS (CVE-2018-1383),IJ02726 / CVE-2018-1383,6100-09-11,IJ02726s8a.171221.epkg.Z IJ02726s9a.171221.epkg.Z IJ02726sAa.171221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc,bos.cluster.rte:6.1.9.0-6.1.9.300,20180208, ,7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825,https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar,CVE-2018-1383:9.1,no sec,aix,7100-05-00 :: 7100-05-01,Vulnerability impacts AIX and VIOS (CVE-2018-1383),IJ02727 / CVE-2018-1383,7100-05-02,IJ02727s1a.171221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc,bos.cluster.rte:7.1.5.0-7.1.5.0,20180208, ,7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-04:IJ02825 6100-09:IJ02726,https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar,CVE-2018-1383:9.1,no sec,aix,7200-02-00 :: 7200-02-01,Vulnerability impacts AIX and VIOS (CVE-2018-1383),IJ02729 / CVE-2018-1383,7200-02-02,IJ02729s1a.171221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc,bos.cluster.rte:7.2.2.0-7.2.2.0,20180208, ,7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825 6100-09:IJ02726,https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar,CVE-2018-1383:9.1,no sec,aix,7100-04-03 :: 7100-04-04 :: 7100-04-05,Vulnerability impacts AIX and VIOS (CVE-2018-1383),IJ02825 / CVE-2018-1383,7100-04-06,IJ02825s3a.171221.epkg.Z IJ02825s4a.171221.epkg.Z IJ02825s5a.171221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc,bos.cluster.rte:7.1.4.0-7.1.4.32,20180208, ,7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 6100-09:IJ02726,https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar,CVE-2018-1383:9.1,no sec,aix,7200-00-03 :: 7200-00-04 :: 7200-00-05,Vulnerability impacts AIX and VIOS (CVE-2018-1383),IJ02827 / CVE-2018-1383,7200-00-06,IJ02827s3a.171221.epkg.Z IJ02827s4a.171221.epkg.Z IJ02827s5a.171221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc,bos.cluster.rte:7.2.0.0-7.2.0.5,20180208, ,7200-02:IJ02729 7200-01:IJ02828 7100-05:IJ02727 7100-04:IJ02825 6100-09:IJ02726,https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar,CVE-2018-1383:9.1,no sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,Vulnerability impacts AIX and VIOS (CVE-2018-1383),IJ02828 / CVE-2018-1383,7200-01-04,IJ02828s1a.171221.epkg.Z IJ02828s2a.171221.epkg.Z IJ02828s3a.171221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc,bos.cluster.rte:7.2.1.0-7.2.1.2,20180208, ,7200-02:IJ02729 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825 6100-09:IJ02726,https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar,CVE-2018-1383:9.1,no hiper,aix,7100-05-00 :: 7100-05-01 :: 7100-05-02,POWERHA NODE HALT DURING IP CHANGES,IJ02843,7100-05-03,IJ02843s0a.180215.71TL05SP00-02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ02843,rsct.basic.rte:3.2.3.0-3.2.3.0 ,20180228, ,7200-02:IJ02843,https://aix.software.ibm.com/aix/ifixes/ij02843/, ,yes hiper,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,POWERHA NODE HALT DURING IP CHANGES,IJ02843,7200-02-03,IJ02843s0a.180215.72TL00SP00-02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ02843,rsct.basic.rte:3.2.3.0-3.2.3.0 ,20180228, ,7100-05:IJ02843,https://aix.software.ibm.com/aix/ifixes/ij02843/, ,yes sec,aix,6100-09-10 :: 6100-09-11 :: 6100-09-09,Vulnerability in sendmail impacts AIX (CVE-2014-3956),IJ02915 / CVE-2014-3956,6100-09-12,IJ02915s9a.180110.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc,bos.net.tcp.client:6.1.9.0-6.1.9.315,20180406, ,7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar,CVE-2014-3956:2.1,no sec,vios,2.2.5.20 :: 2.2.5.30,Vulnerability in sendmail impacts VIOS (CVE-2014-3956),IJ02915 / CVE-2014-3956,2.2.5.50,IJ02915s9a.180110.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc,bos.net.tcp.client:6.1.9.0-6.1.9.315,20180406, ,7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar,CVE-2014-3956:2.1,no sec,vios,2.2.6.10 :: 2.2.6.20 :: 2.2.6.21,Vulnerability in sendmail impacts VIOS (CVE-2014-3956),IJ02915 / CVE-2014-3956,2.2.6.30,IJ02915s9a.180110.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc,bos.net.tcp.client:6.1.9.0-6.1.9.315,20180406, ,7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar,CVE-2014-3956:2.1,no sec,vios,2.2.4.40 :: 2.2.4.50,Vulnerability in sendmail impacts VIOS (CVE-2014-3956),IJ02915 / CVE-2014-3956,See Bulletin,IJ02915s9a.180110.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc,bos.net.tcp.client:6.1.9.0-6.1.9.315,20180406, ,7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar,CVE-2014-3956:2.1,no sec,aix,7100-04-03 :: 7100-04-04 :: 7100-04-05,Vulnerability in sendmail impacts AIX (CVE-2014-3956),IJ02917 / CVE-2014-3956,7100-04-07,IJ02917s3a.180105.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc,bos.net.tcp.client:7.1.4.0-7.1.4.32,20180406, ,7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 6100-09:IJ02915,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar,CVE-2014-3956:2.1,no sec,aix,7200-00-03 :: 7200-00-04 :: 7200-00-05,Vulnerability in sendmail impacts AIX (CVE-2014-3956),IJ02918 / CVE-2014-3956,7200-00-07,IJ02918s3a.180108.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc,bos.net.tcp.sendmail:7.2.0.0-7.2.0.2,20180406, ,7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7100-05:IJ03121 7100-04:IJ02917 6100-09:IJ02915,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar,CVE-2014-3956:2.1,no sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,Vulnerability in sendmail impacts AIX (CVE-2014-3956),IJ02919 / CVE-2014-3956,7200-01-05,IJ02919s1a.180108.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc,bos.net.tcp.sendmail:7.2.1.0-7.2.1.1,20180406, ,7200-02:IJ02920 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917 6100-09:IJ02915,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar,CVE-2014-3956:2.1,no sec,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,Vulnerability in sendmail impacts AIX (CVE-2014-3956),IJ02920 / CVE-2014-3956,7200-02-03,IJ02920s0a.180110.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc,bos.net.tcp.sendmail:7.2.2.0-7.2.2.15,20180406, ,7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917 6100-09:IJ02915,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar,CVE-2014-3956:2.1,no sec,aix,5300-12-09,IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.,IJ03029 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754,See Bulletin,IJ03029m9c.180124.epkg.Z IJ03029m9a.180117.epkg.Z IJ03029m9b.180117.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc,bos.mp:5.3.12.0-5.3.12.9 bos.mp64:5.3.12.0-5.3.12.10,20180125,20180209,2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032 6100-09:IJ03030,ftp://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar,CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0,no sec,aix,6100-09-08 :: 6100-09-09 :: 6100-09-10,IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.,IJ03030 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754,6100-09-11,IJ03030m8a.180117.epkg.Z IJ03030m9a.180116.epkg.Z IJ03030mAa.180116.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc,bos.mp64:6.1.9.0-6.1.9.300,20180125,20180209,2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar,CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0,no sec,vios,2.2.4.30 :: 2.2.4.40 :: 2.2.4.50,IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.,IJ03030 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754,6100-09-11,IJ03030m8a.180117.epkg.Z IJ03030m9a.180116.epkg.Z IJ03030m9b.180116.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc,bos.mp64:6.1.9.0-6.1.9.300,20180125,20180209,2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar,CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0,no sec,vios,2.2.5.10 :: 2.2.5.20 :: 2.2.5.30,IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.,IJ03030 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754,6100-09-11,IJ03030m8a.180117.epkg.Z IJ03030m9a.180116.epkg.Z IJ03030m9b.180116.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc,bos.mp64:6.1.9.0-6.1.9.300,20180125,20180209,2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar,CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0,no sec,vios,2.2.6.0 :: 2.2.6.10,IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.,IJ03030 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754,6100-09-11,IJ03030mAa.180116.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc,bos.mp64:6.1.9.0-6.1.9.300,20180125,20180209,2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar,CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0,no sec,aix,7100-04-03 :: 7100-04-04 :: 7100-04-05,IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.,IJ03032 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754,7100-04-06,IJ03032m3a.180125.epkg.Z IJ03032m3b.180125.epkg.Z IJ03032m4a.180125.epkg.Z IJ03032m5a.180116.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc,bos.mp64:7.1.4.0-7.1.4.33,20180125,20180209,2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 6100-09:IJ03030,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar,CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0,no sec,aix,7100-05-00 :: 7100-05-01,IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.,IJ03033 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754,7100-05-02,IJ03033m1a.180116.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc,bos.mp64:7.1.5.0-7.1.5.0,20180125,20180209,2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-04:IJ03032 6100-09:IJ03030,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar,CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0,no sec,aix,7200-00-03 :: 7200-00-04 :: 7200-00-05,IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.,IJ03034 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754,7200-00-06,IJ03034m3a.180117.epkg.Z IJ03034m4a.180117.epkg.Z IJ03034m5a.180117.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc,bos.mp64:7.2.0.0-7.2.0.5,20180125,20180209,2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7100-05:IJ03033 7100-04:IJ03032 6100-09:IJ03030,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar,CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0,no sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.,IJ03035 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754,7200-01-04,IJ03035m1a.180118.epkg.Z IJ03035m1b.180118.epkg.Z IJ03035m2a.180118.epkg.Z IJ03035m3a.180117.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc,bos.mp64:7.2.1.0-7.2.1.4,20180125,20180209,2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032 6100-09:IJ03030,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar,CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0,no sec,aix,7200-02-00 :: 7200-02-01,IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.,IJ03036 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754,7200-02-02,IJ03036m1a.180116.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc,bos.mp64:7.2.2.0-7.2.2.0,20180125,20180209,2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032 6100-09:IJ03030,https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar,CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0,no sec,aix,7100-05-00 :: 7100-05-01 :: 7100-05-02,Vulnerability in sendmail impacts AIX (CVE-2014-3956),IJ03121 / CVE-2014-3956,7100-05-04,IJ03121s0a.180110.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc,bos.net.tcp.client:7.1.5.0-7.1.5.15,20180406, ,7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-04:IJ02917 6100-09:IJ02915,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar,CVE-2014-3956:2.1,no hiper,vios,2.2.5.40,SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED,IJ03186,2.2.5.50,IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ03186,devices.ethernet.mlx.rte:6.1.9.315 ,20180428, ,,https://aix.software.ibm.com/aix/ifixes/ij03186/, ,yes hiper,vios,2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.21,SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED,IJ03186,2.2.6.30,IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ03186,devices.ethernet.mlx.rte:6.1.9.300-6.1.9.315 ,20180428, ,,https://aix.software.ibm.com/aix/ifixes/ij03186/, ,yes hiper,vios,2.2.4.60,SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED,IJ03186,See Advisory,IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ03186,devices.ethernet.mlx.rte:6.1.9.315,20180428, ,,https://aix.software.ibm.com/aix/ifixes/ij03186/, ,yes sec,aix,5300-12-09,Vulnerability in sendmail impacts AIX (CVE-2014-3956),IJ03273 / CVE-2014-3956,See Bulletin,IJ03273s9a.180116.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10 bos.net.tcp.server:5.3.12.0-5.3.12.6,20180406, ,7200-02:IJ02920 7200-01:IJ02919 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917 6100-09:IJ02915,ftp://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar,CVE-2014-3956:2.1,no hiper,aix,7200-02-00 :: 7200-02-01,APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP,IJ04075,7200-02-02,IJ04075s1a.180306.72TL02SP00-01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04075,bos.rte.libc:7.2.2.0-7.2.2.0 ,20180310, ,6100-09:IJ04511 7100-05:IJ04510,https://aix.software.ibm.com/aix/ifixes/ij04075/, ,yes hiper,aix,7100-05-00 :: 7100-05-01 :: 7100-05-02,POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES,IJ04266,7100-05-03,IJ04266m1a.180226.AIX71TL05SP00-01.epkg.Z IJ04266s2a.180403.AIX71TL05SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04266,bos.cluster.rte:7.1.5.0-7.1.5.15 ,20180405, ,6100-09:IJ04279 7100-04:IJ04512 7200-01:IJ04267 7200-02:IJ04268,https://aix.software.ibm.com/aix/ifixes/ij04266/, ,yes hiper,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04,POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES,IJ04267,7200-01-05,IJ04267m2a.180403.AIX72TL01SP02.epkg.Z IJ04267m3a.180403.AIX72TL01SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04267,bos.cluster.rte:7.2.1.0-7.2.1.3 ,20180405, ,6100-09:IJ04279 7100-04:IJ04512 7100-05:IJ04266 7200-02:IJ04268,https://aix.software.ibm.com/aix/ifixes/ij04267/, ,yes hiper,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES,IJ04268,7200-02-03,IJ04268s2a.180403.AIX72TL02SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04268,bos.cluster.rte:7.2.2.0-7.2.2.15 ,20180405, ,6100-09:IJ04279 7100-04:IJ04512 7100-05:IJ04266 7200-01:IJ04267,https://aix.software.ibm.com/aix/ifixes/ij04268/, ,yes hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09 :: 6100-09-10 :: 6100-09-11,POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES,IJ04279,6100-09-12,IJ04279m9a.180404.AIX61TL09SP09.epkg.Z IJ04279mAa.180220.AIX61TL09SP10.epkg.Z IJ04279sBa.180419.AIX61TL09SP11.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04279,bos.cluster.rte:6.1.9.0-6.1.9.315 ,20180405, ,7100-04:IJ04512 7100-05:IJ04266 7200-01:IJ04267 7200-02:IJ04268,https://aix.software.ibm.com/aix/ifixes/ij04279/, ,yes hiper,aix,7100-05-00 :: 7100-05-01,APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP,IJ04510,7100-05-02,IJ04510s1a.180306.71TL05SP00-01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04510,bos.rte.libc:7.1.5.0-7.1.5.0 ,20180310, ,6100-09:IJ04511 7200-02:IJ04075,https://aix.software.ibm.com/aix/ifixes/ij04510/, ,yes hiper,vios,2.2.6.0 :: 2.2.6.10,APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP,IJ04511,2.2.6.20,IJ04511sAa.180308.AIX61TL09SP10.epkg.Z IJ04511sAa.180308.VIOS2.2.6.0-10.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04511,bos.rte.libc:6.1.9.300-6.1.9.300 ,20180310, ,7100-05:IJ04510 7200-02:IJ04075,https://aix.software.ibm.com/aix/ifixes/ij04511/, ,yes hiper,aix,6100-09-10,APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP,IJ04511,6100-09-11,IJ04511sAa.180308.AIX61TL09SP10.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04511,bos.rte.libc:6.1.9.300-6.1.9.300 ,20180310, ,7100-05:IJ04510 7200-02:IJ04075,https://aix.software.ibm.com/aix/ifixes/ij04511/, ,yes hiper,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05 :: 7100-04-06,POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES,IJ04512,7100-04-07,IJ04512m5a.180313.AIX71TL04SP05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04512,bos.cluster.rte:7.1.4.0-7.1.4.33 ,20180405, ,6100-09:IJ04279 7100-05:IJ04266 7200-01:IJ04267 7200-02:IJ04268,https://aix.software.ibm.com/aix/ifixes/ij04512/, ,yes hiper,vios,2.2.5.0 :: 2.2.5.10 :: 2.2.5.20 :: 2.2.5.30 :: 2.2.5.40,Multiple issues with VIOS SSP poolfs including potential data loss,IJ04826,2.2.5.50,IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04826,pool.basic.rte:6.1.9.200-6.1.9.203,20180605, ,,https://aix.software.ibm.com/aix/ifixes/ij04826/, ,yes hiper,vios,2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.21,Multiple issues with VIOS SSP poolfs including potential data loss,IJ04826,2.2.6.30,IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04826,pool.basic.rte:6.1.9.300-6.1.9.315,20180605, ,,https://aix.software.ibm.com/aix/ifixes/ij04826/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40 :: 2.2.4.50 :: 2.2.4.60,Multiple issues with VIOS SSP poolfs including potential data loss,IJ04826,See Advisory,IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04826,pool.basic.rte:6.1.9.100-6.1.9.107,20180605, ,,https://aix.software.ibm.com/aix/ifixes/ij04826/, ,yes hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06,POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES,IJ05429,7200-00-07,IJ05429m5b.180403.AIX72TL00SP05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ05429,bos.cluster.rte:7.2.0.0-7.2.0.6 ,20180405, ,6100-09:IJ04279 7100-04:IJ04512 7100-05:IJ04266 7200-01:IJ04267 7200-02:IJ04268,https://aix.software.ibm.com/aix/ifixes/ij05429/, ,yes sec,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05818 / CVE-2018-3639,7200-02-03,IJ05818m1a.180423.epkg.Z IJ05818s2a.180420.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:7.2.2.0-7.2.2.16,20180522,20180606,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,7200-02-02,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05818 / CVE-2018-3639,7200-02-03,IJ05818s2a.180420.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:7.2.2.0-7.2.2.16,20180522, ,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,7200-01-02 :: 7200-01-03 :: 7200-01-04,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05820 / CVE-2018-3639,7200-01-05,IJ05820m2a.180430.epkg.Z IJ05820m3a.180430.epkg.Z IJ05820m4a.180423.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:7.2.1.0-7.2.1.5,20180522,20180606,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,7200-01-04,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05820 / CVE-2018-3639,7200-01-05,IJ05820m4a.180423.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:7.2.1.0-7.2.1.5,20180522, ,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,7200-00-04 :: 7200-00-05 :: 7200-00-06,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05821 / CVE-2018-3639,See Bulletin,IJ05821m4a.180430.epkg.Z IJ05821m5a.180430.epkg.Z IJ05821m6a.180424.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:7.2.0.0-7.2.0.6,20180522,20180606,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,7200-00-06,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05821 / CVE-2018-3639,See Bulletin,IJ05821m6a.180424.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:7.2.0.0-7.2.0.6,20180522, ,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,7100-05-00 :: 7100-05-01 :: 7100-05-02,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05822 / CVE-2018-3639,7100-05-03,IJ05822m1a.180430.epkg.Z IJ05822s2a.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:7.1.5.0-7.1.5.16,20180522,20180606,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,7100-05-02,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05822 / CVE-2018-3639,7100-05-03,IJ05822s2a.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:7.1.5.0-7.1.5.16,20180522, ,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,7100-04-04 :: 7100-04-05 :: 7100-04-06,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05823 / CVE-2018-3639,7100-04-07,IJ05823m4a.180501.epkg.Z IJ05823m5a.180430.epkg.Z IJ05823m6a.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:7.1.4.0-7.1.4.34,20180522,20180606,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,7100-04-06,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05823 / CVE-2018-3639,7100-04-07,IJ05823m6a.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:7.1.4.0-7.1.4.34,20180522, ,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,6100-09-09 :: 6100-09-10 :: 6100-09-11,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05824 / CVE-2018-3639,6100-09-12,IJ05824m9a.180501.epkg.Z IJ05824mAa.180501.epkg.Z IJ05824sBa.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:6.1.9.0-6.1.9.316,20180522,20180606,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,6100-09-11,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05824 / CVE-2018-3639,6100-09-12,IJ05824sBa.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:6.1.9.0-6.1.9.316,20180522, ,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,vios,2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.21,IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05824 / CVE-2018-3639,2.2.6.22,IJ05824mAa.180501.epkg.Z IJ05824sBa.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:6.1.9.0-6.1.9.316,20180522,20180606,2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,vios,2.2.6.20 :: 2.2.6.21,IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05824 / CVE-2018-3639,2.2.6.22,IJ05824sBa.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:6.1.9.0-6.1.9.316,20180522, ,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,vios,2.2.6.20 :: 2.2.6.40 :: 2.2.6.60,IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05824 / CVE-2018-3639,6100-09-12,IJ05824sBa.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:6.1.9.0-6.1.9.316,20180522, ,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,vios,2.2.4.40 :: 2.2.4.50 :: 2.2.4.60,IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05824 / CVE-2018-3639,See Bulletin,IJ05824m9a.180501.epkg.Z IJ05824m9b.180502.epkg.Z IJ05824sBa.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:6.1.9.0-6.1.9.316,20180522,20180606,2.2.6:IJ05824 2.2.5:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,vios,2.2.4.60,IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05824 / CVE-2018-3639,See Bulletin,IJ05824sBa.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:6.1.9.0-6.1.9.316,20180522, ,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,vios,2.2.5.20 :: 2.2.5.30 :: 2.2.5.40,IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05824 / CVE-2018-3639,See Bulletin,IJ05824m9a.180501.epkg.Z IJ05824m9b.180502.epkg.Z IJ05824sBa.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:6.1.9.0-6.1.9.316,20180522,20180606,2.2.6:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,vios,2.2.5.40,IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05824 / CVE-2018-3639,See Bulletin,IJ05824sBa.180426.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:6.1.9.0-6.1.9.316,20180522, ,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no sec,aix,5300-12-09,IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.,IJ05826 / CVE-2018-3639,See Bulletin,IJ05826m9b.180427.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc,bos.mp64:5.3.12.0-5.3.12.10,20180522,20180606,2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824,ftp://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar,CVE-2018-3639:0,no hiper,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,UNDETECTED DATA CORRUPTION POSSIBLE WITH DEFRAGFS -F COMMAND,IJ06486,7200-02-03,IJ06486s2b.72TL02SP02.180524.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ06486,bos.mp64:7.2.2.0-7.2.2.17 ,20180525, ,,https://aix.software.ibm.com/aix/ifixes/ij06486/, ,yes hiper,vios,2.2.5.0 :: 2.2.5.10 :: 2.2.5.20 :: 2.2.5.30 :: 2.2.5.40,Adapter firmware upgrade can fail or adapter may become unusable,IJ06644,2.2.5.50,IJ06644sAa.180917.AIX61TL09SP10.epkg.Z IJ06644sBa.180615.AIX61TL09SP11.epkg.Z IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z IJ06644sCa.180917.AIX61TL09SP12.epkg.Z IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ06644,devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.315,20181013, ,6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641,https://aix.software.ibm.com/aix/ifixes/ij06644/, ,yes hiper,vios,2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.30 :: 2.2.6.31,Adapter firmware upgrade can fail or adapter may become unusable,IJ06644,2.2.6.32,IJ06644sAa.180917.AIX61TL09SP10.epkg.Z IJ06644sBa.180615.AIX61TL09SP11.epkg.Z IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z IJ06644sCa.180917.AIX61TL09SP12.epkg.Z IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ06644,devices.pciex.df1060e214103404.com:6.1.9.300-6.1.9.400,20181013, ,6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641,https://aix.software.ibm.com/aix/ifixes/ij06644/, ,yes hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09 :: 6100-09-10 :: 6100-09-11 :: 6100-09-12,Adapter firmware upgrade can fail or adapter may become unusable,IJ06644,6100-09-12-1838,IJ06644sAa.180917.AIX61TL09SP10.epkg.Z IJ06644sBa.180615.AIX61TL09SP11.epkg.Z IJ06644sCa.180917.AIX61TL09SP12.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ06644,devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.400,20181013, ,7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641,https://aix.software.ibm.com/aix/ifixes/ij06644/, ,yes sec,aix,6100-09-09 :: 6100-09-10 :: 6100-09-11,Vulnerabilities in NTP affect AIX,IJ06651 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,6100-09-12,IJ06651m9a.180528.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,bos.net.tcp.client:6.1.9.0-6.1.9.315,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,aix,6100-09-09 :: 6100-09-10 :: 6100-09-11,Vulnerabilities in NTP affect AIX,IJ06651 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,See Bulletin,IJ06400s9a.180514.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,See Bulletin,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,vios,2.2.5.20 :: 2.2.5.30 :: 2.2.5.40,Vulnerabilities in NTP affect VIOS,IJ06651 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,2.2.5.50,IJ06651m9a.180528.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,See Bulletin,20180814, ,2.2.6:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,vios,2.2.6.0 :: 2.2.6.10 :: 2.2.6.21,Vulnerabilities in NTP affect VIOS,IJ06651 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,2.2.6.30,IJ06651m9a.180528.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,See Bulletin,20180814, ,2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,vios,2.2.4.40 :: 2.2.4.50 :: 2.2.4.60,Vulnerabilities in NTP affect VIOS,IJ06651 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,See Bulletin,IJ06651m9a.180528.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,See Bulletin,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,aix,7100-04-04 :: 7100-04-05 :: 7100-04-06,Vulnerabilities in NTP affect AIX,IJ06652 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,7100-04-07,IJ06652m4a.180528.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,bos.net.tcp.client:7.1.4.0-7.1.4.33,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,aix,7100-05-00 :: 7100-05-01 :: 7100-05-02,Vulnerabilities in NTP affect AIX,IJ06653 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,7100-05-03,IJ06653m0a.180527.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,bos.net.tcp.client:7.1.5.0-7.1.5.15,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,aix,7200-00-04 :: 7200-00-05 :: 7200-00-06,Vulnerabilities in NTP affect AIX,IJ06654 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,See Bulletin,IJ06654m4a.180527.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,bos.net.tcp.ntpd:7.2.0.0-7.2.0.4,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,aix,7200-01-02 :: 7200-01-03 :: 7200-01-04,Vulnerabilities in NTP affect AIX,IJ06655 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,7200-01-05,IJ06655m2a.180527.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,bos.net.tcp.ntpd:7.2.1.0-7.2.1.2,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,Vulnerabilities in NTP affect AIX,IJ06656 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,7200-02-03,IJ06656m0a.180527.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,bos.net.tcp.ntpd:7.2.2.0-7.2.2.15,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652,https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,aix,5300-12-09,Vulnerabilities in NTP affect AIX,IJ06657 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549,See Bulletin,IJ06657m9a.180529.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20180814, ,2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 7100-05:IJ06653 7100-04:IJ06652,ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar,CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3,no sec,aix,7100-05-00 :: 7100-05-01 :: 7100-05-02,Vulnerability in rmsock affects AIX (CVE-2018-1655),IJ06904 / CVE-2018-1655,7100-05-03,IJ06904s5a.180607.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,bos.net.tcp.client:7.1.5.0-7.1.5.15,20180621,20180703,2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-04:IJ06906 6100-09:IJ06905,https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,aix,6100-09-09 :: 6100-09-10 :: 6100-09-11,Vulnerability in rmsock affects AIX (CVE-2018-1655),IJ06905 / CVE-2018-1655,6100-09-12,IJ06905s9a.180608.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,bos.net.tcp.client:6.1.9.0-6.1.9.315,20180621,20180703,2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906,https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,vios,2.2.5.20 :: 2.2.5.30 :: 2.2.5.40,Vulnerability in rmsock affects VIOS (CVE-2018-1655),IJ06905 / CVE-2018-1655,2.2.5.50,IJ06905s9a.180608.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,See Bulletin,20180621,20180703,2.2.6:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905,https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,vios,2.2.6.10 :: 2.2.6.20 :: 2.2.6.21,Vulnerability in rmsock affects VIOS (CVE-2018-1655),IJ06905 / CVE-2018-1655,2.2.6.30,IJ06905s9a.180608.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,See Bulletin,20180621,20180703,2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905,https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,vios,2.2.6.20 :: 2.2.6.21,Vulnerability in rmsock affects VIOS (CVE-2018-1655),IJ06905 / CVE-2018-1655,2.2.6.30,IJ06905s9a.180608.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,See Bulletin,20180621, ,7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905,https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,vios,2.2.4.40 :: 2.2.4.50 :: 2.2.4.60,Vulnerability in rmsock affects VIOS (CVE-2018-1655),IJ06905 / CVE-2018-1655,See Bulletin,IJ06905s9a.180608.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,See Bulletin,20180621,20180703,2.2.6:IJ06905 2.2.5:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905,https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,aix,7100-04-04 :: 7100-04-05 :: 7100-04-06,Vulnerability in rmsock affects AIX (CVE-2018-1655),IJ06906 / CVE-2018-1655,7100-04-07,IJ06906s4a.180607.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,bos.net.tcp.client:7.1.4.0-7.1.4.33,20180621,20180703,2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 6100-09:IJ06905,https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,aix,7200-01-02 :: 7200-01-03 :: 7200-01-04,Vulnerability in rmsock affects AIX (CVE-2018-1655),IJ06907 / CVE-2018-1655,7200-01-05,IJ06907s1a.180607.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,bos.net.tcp.client_core:7.2.1.0-7.2.1.3,20180621,20180703,2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905,https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,Vulnerability in rmsock affects AIX (CVE-2018-1655),IJ06908 / CVE-2018-1655,7200-02-03,IJ06908s2a.180607.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,bos.net.tcp.client_core:7.2.2.0-7.2.2.16,20180621,20180703,2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905,https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,aix,7200-00-04 :: 7200-00-05 :: 7200-00-06,Vulnerability in rmsock affects AIX (CVE-2018-1655),IJ06934 / CVE-2018-1655,See Bulletin,IJ06934s0a.180607.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,bos.net.tcp.client_core:7.2.0.0-7.2.0.5,20180621,20180703,2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905,https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,aix,5300-12-09,Vulnerability in rmsock affects AIX (CVE-2018-1655),IJ06935 / CVE-2018-1655,See Bulletin,IJ06935s1a.180611.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20180621,20180703,2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905,ftp://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar,CVE-2018-1655:4,no sec,aix,7200-02-01 :: 7200-02-02,IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.,IJ07497 / CVE-2017-5715,7200-02-03,IJ07497m1a.180717.epkg.Z IJ07497m2a.180713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc,bos.mp64:7.2.2.0-7.2.2.16,20180817, ,2.2.6:IJ07498 2.2.5:IJ07498 2.2.4:IJ07498 7200-01:IJ07501 7100-05:IJ07500 7100-04:IJ07499 6100-09:IJ07498,https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar,CVE-2017-5715:0,no sec,aix,6100-09-09 :: 6100-09-10 :: 6100-09-11,IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.,IJ07498 / CVE-2017-5715,6100-09-12,IJ07498m9a.180726.epkg.Z IJ07498mAa.180717.epkg.Z IJ07498mBa.180713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc,bos.mp64:6.1.9.0-6.1.9.316,20180817, ,2.2.6:IJ07498 2.2.5:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-05:IJ07500 7100-04:IJ07499,https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar,CVE-2017-5715:0,no sec,vios,2.2.5.20 :: 2.2.5.30 :: 2.2.5.40,IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.,IJ07498 / CVE-2017-5715,2.2.5.50,IJ07498m9a.180726.epkg.Z IJ07498m9b.180726.epkg.Z IJ07498mBa.180713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc,See Bulletin,20180817, ,2.2.6:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-05:IJ07500 7100-04:IJ07499 6100-09:IJ07498,https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar,CVE-2017-5715:0,no sec,vios,2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.21,IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.,IJ07498 / CVE-2017-5715,2.2.6.23,IJ07498mAa.180717.epkg.Z IJ07498mBa.180713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc,See Bulletin,20180817, ,2.2.5:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-05:IJ07500 7100-04:IJ07499 6100-09:IJ07498,https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar,CVE-2017-5715:0,no sec,vios,2.2.4.40 :: 2.2.4.50 :: 2.2.4.60,IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.,IJ07498 / CVE-2017-5715,See Bulletin,IJ07498m9a.180726.epkg.Z IJ07498m9b.180726.epkg.Z IJ07498mBa.180713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc,See Bulletin,20180817, ,2.2.6:IJ07498 2.2.5:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-05:IJ07500 7100-04:IJ07499 6100-09:IJ07498,https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar,CVE-2017-5715:0,no sec,aix,7100-04-04 :: 7100-04-05 :: 7100-04-06,IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.,IJ07499 / CVE-2017-5715,7100-04-07,IJ07499m4a.180719.epkg.Z IJ07499m5a.180809.epkg.Z IJ07499m6a.180713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc,bos.mp64:7.1.4.0-7.1.4.34,20180817, ,2.2.6:IJ07498 2.2.5:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-05:IJ07500 6100-09:IJ07498,https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar,CVE-2017-5715:0,no sec,aix,7100-05-01 :: 7100-05-02,IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.,IJ07500 / CVE-2017-5715,7100-05-03,IJ07500m1a.180718.epkg.Z IJ07500m2a.180713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc,bos.mp64:7.1.5.0-7.1.5.16,20180817, ,2.2.6:IJ07498 2.2.5:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-04:IJ07499 6100-09:IJ07498,https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar,CVE-2017-5715:0,no sec,aix,7200-01-02 :: 7200-01-03 :: 7200-01-04,IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.,IJ07501 / CVE-2017-5715,7200-01-05,IJ07501m2a.180719.epkg.Z IJ07501m3a.180717.epkg.Z IJ07501m4a.180716.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc,bos.mp64:7.2.1.0-7.2.1.5,20180817, ,2.2.6:IJ07498 2.2.5:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7100-05:IJ07500 7100-04:IJ07499 6100-09:IJ07498,https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar,CVE-2017-5715:0,no hiper,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,Possible network outage with adapters using shientdd driver,IJ08410,7200-02-03,IJ08410s2a.180816.AIX72TL02SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08410,devices.ethernet.shi.rte:7.2.2.0-7.2.2.16,20180830, ,6100-09:IJ08482 7100-05:IJ08480 7200-00:IJ08785 7200-01:IJ08779,https://aix.software.ibm.com/aix/ifixes/ij08410/, ,yes hiper,aix,6100-09-10 :: 6100-09-11,Possible network outage with adapters using shientdd driver,IJ08410,6100-09-12,IJ08482sBa.180817.AIX61TL09SP11.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08482,devices.ethernet.shi.rte:6.1.9.300-6.1.9.316,20180830, ,7100-05:IJ08480 7200-00:IJ08785 7200-01:IJ08779 7200-02:IJ08410,https://aix.software.ibm.com/aix/ifixes/ij08482/, ,yes hiper,aix,7100-05-00 :: 7100-05-01 :: 7100-05-02,Possible network outage with adapters using shientdd driver,IJ08480,7100-05-03,IJ08480s2a.180817.AIX71TL05SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08480,devices.ethernet.shi.rte:7.1.5.0-7.1.5.16,20180830, ,6100-09:IJ08482 7200-00:IJ08785 7200-01:IJ08779 7200-02:IJ08410,https://aix.software.ibm.com/aix/ifixes/ij08480/, ,yes hiper,vios,2.2.5.40,Possible network outage with adapters using shientdd driver ,IJ08482,2.2.5.50,IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z IJ08482sBa.180817.AIX61TL09SP11.epkg.Z IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08482,devices.ethernet.shi.rte:6.1.9.315,20180830, ,6100-09:IJ08482 7100-05:IJ08480 7200-00:IJ08785 7200-01:IJ08779 7200-02:IJ08410,https://aix.software.ibm.com/aix/ifixes/ij08482/, ,yes hiper,vios,2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.21 :: 2.2.6.22 :: 2.2.6.23,Possible network outage with adapters using shientdd driver ,IJ08482,2.2.6.30,IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z IJ08482sBa.180817.AIX61TL09SP11.epkg.Z IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08482,devices.ethernet.shi.rte:6.1.9.300-6.1.9.316,20180830, ,6100-09:IJ08482 7100-05:IJ08480 7200-00:IJ08785 7200-01:IJ08779 7200-02:IJ08410,https://aix.software.ibm.com/aix/ifixes/ij08482/, ,yes hiper,vios,2.2.4.60,Possible network outage with adapters using shientdd driver ,IJ08482,See Advisory,IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z IJ08482sBa.180817.AIX61TL09SP11.epkg.Z IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08482,devices.ethernet.shi.rte:6.1.9.300,20180830, ,6100-09:IJ08482 7100-05:IJ08480 7200-00:IJ08785 7200-01:IJ08779 7200-02:IJ08410,https://aix.software.ibm.com/aix/ifixes/ij08482/, ,yes hiper,aix,7200-03-00 :: 7200-03-01,Adapter firmware upgrade can fail or adapter may become unusable,IJ08641,7200-03-02-1845,IJ08641s1a.181004.AIX72TL03SP00-01.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08641,devices.pciex.df1060e214103404.com:7.2.3.0,20181013, ,6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176,https://aix.software.ibm.com/aix/ifixes/ij08641/, ,yes hiper,aix,7200-01-04,Possible network outage with adapters using shientdd driver,IJ08779,7200-01-06,IJ08779s4a.180827.72TL01SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08779,devices.ethernet.shi.rte:7.2.1.3-7.2.1.3,20180830, ,6100-09:IJ08482 7100-00:IJ08480 7200-00:IJ08785 7200-02:IJ08410,https://aix.software.ibm.com/aix/ifixes/ij08779/, ,yes hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06,Possible network outage with adapters using shientdd driver,IJ08785,See Advisory,IJ08785s6a.180828.72TL00SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08785,devices.ethernet.shi.rte:7.2.0.6-7.2.0.6,20180830, ,6100-09:IJ08482 7100-05:IJ08480 7200-01:IJ08779 7200-02:IJ08410,https://aix.software.ibm.com/aix/ifixes/ij08785/, ,yes hiper,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05 :: 7100-04-06,Adapter firmware upgrade can fail or adapter may become unusable,IJ09173,7100-04-07-1845,IJ09173s6a.180917.71TL04SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09173,devices.pciex.df1060e214103404.com:7.1.4.0-7.1.4.33,20181013, ,6100-09:IJ06644 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641,https://aix.software.ibm.com/aix/ifixes/ij09173/, ,yes hiper,aix,7100-05-00 :: 7100-05-01 :: 7100-05-02 :: 7100-05-03,Adapter firmware upgrade can fail or adapter may become unusable,IJ09174,7100-05-03-1846,IJ09174s3a.180921.AIX71TL05SP03-1838.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09174,devices.pciex.df1060e214103404.com:7.1.5.0-7.1.5.30,20181013, ,6100-09:IJ06644 7100-04:IJ09173 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641,https://aix.software.ibm.com/aix/ifixes/ij09174/, ,yes hiper,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04,Adapter firmware upgrade can fail or adapter may become unusable,IJ09175,7200-01-05-1845,IJ09175s4a.180917.72TL01SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09175,devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.3,20181013, ,6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-02:IJ09176 7200-03:IJ08641,https://aix.software.ibm.com/aix/ifixes/ij09175/, ,yes hiper,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,Adapter firmware upgrade can fail or adapter may become unusable,IJ09176,7200-02-03-1845,IJ09176s2a.180917.AIX72TL02SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09176,devices.pciex.df1060e214103404.com:7.2.2.0-7.2.2.15,20181013, ,6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-03:IJ08641,https://aix.software.ibm.com/aix/ifixes/ij09176/, ,yes hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06,Adapter firmware upgrade can fail or adapter may become unusable,IJ09583,See Advisory,IJ09583s6a.181004.72TL00SP06.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ09583,devices.pciex.df1060e214103404.com:7.2.0.0-7.2.0.5,20181013, ,6100-09:IJ06644 7100-04:IJ09173 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641,https://aix.software.ibm.com/aix/ifixes/ij09583/, ,yes sec,aix,5300-12-09,There is a vulnerability in FreeBSD that affects AIX.,IJ09618 / CVE-2018-6922,See Bulletin,IJ09618s9a.181031.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.rte:5.3.12.0-5.3.12.1,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 6100-09:IJ09619 7200-03:IJ09625,,CVE-2018-6922:7.5,no sec,aix,6100-09-10 :: 6100-09-11 :: 6100-09-12,There is a vulnerability in FreeBSD that affects AIX.,IJ09619 / CVE-2018-6922,See Bulletin,IJ09619sAa.181004.epkg.Z IJ09619sBa.181004.epkg.Z IJ09619sCa.181009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.401,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 7200-03:IJ09625,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no sec,vios,2.2.5.40,There is a vulnerability in FreeBSD that affects VIOS.,IJ09619 / CVE-2018-6922,2.2.5.50,IJ09619sBa.181004.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.401,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 7200-03:IJ09625,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no sec,vios,2.2.6.23 :: 2.2.6.30 :: 2.2.6.31 :: 2.2.6.32,There is a vulnerability in FreeBSD that affects VIOS.,IJ09619 / CVE-2018-6922,2.2.6.40,IJ09619sCa.181004.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.401,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 7200-03:IJ09625,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no sec,vios,2.2.4.60,There is a vulnerability in FreeBSD that affects VIOS.,IJ09619 / CVE-2018-6922,See Bulletin,IJ09619sBa.181004.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.401,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 7200-03:IJ09625,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no sec,aix,7100-04-04 :: 7100-04-05 :: 7100-04-06,There is a vulnerability in FreeBSD that affects AIX.,IJ09620 / CVE-2018-6922,7100-04-07,IJ09620s4a.180927.epkg.Z IJ09620s5a.180927.epkg.Z IJ09620s6a.180926.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client:7.1.4.0-7.1.4.34,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 6100-09:IJ09619 7200-03:IJ09625,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no sec,aix,7100-05-01 :: 7100-05-02 :: 7100-05-03,There is a vulnerability in FreeBSD that affects AIX.,IJ09621 / CVE-2018-6922,7100-05-04,IJ09621s1a.180926.epkg.Z IJ09621s2a.180925.epkg.Z IJ09621s3a.181001.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client:7.1.5.0-7.1.5.31,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-04:IJ09620 6100-09:IJ09619 7200-03:IJ09625,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no sec,aix,7200-00-04 :: 7200-00-05 :: 7200-00-06,There is a vulnerability in FreeBSD that affects AIX.,IJ09622 / CVE-2018-6922,See Bulletin,IJ09622s4a.181001.epkg.Z IJ09622s5a.181001.epkg.Z IJ09622s6a.181001.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client_core:7.2.0.0-7.2.0.5,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7100-05:IJ09621 7100-04:IJ09620 6100-09:IJ09619 7200-03:IJ09625,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no sec,aix,7200-01-02 :: 7200-01-03 :: 7200-01-04,There is a vulnerability in FreeBSD that affects AIX.,IJ09623 / CVE-2018-6922,7200-01-05,IJ09623s2a.181002.epkg.Z IJ09623s3a.181002.epkg.Z IJ09623s4a.181002.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client_core:7.2.1.0-7.2.1.4,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 6100-09:IJ09619 7200-03:IJ09625,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no sec,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,There is a vulnerability in FreeBSD that affects AIX.,IJ09624 / CVE-2018-6922,7200-02-03,IJ09624s0a.181002.epkg.Z IJ09624s1a.181003.epkg.Z IJ09624s2a.181003.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client_core:7.2.2.0-7.2.2.17,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 6100-09:IJ09619 7200-03:IJ09625,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no sec,aix,7200-03-00 :: 7200-03-01 :: 7200-03-02,There is a vulnerability in FreeBSD that affects AIX.,IJ09625 / CVE-2018-6922,7200-03-03,IJ09625s0a.181010.epkg.Z IJ09625s2a.181203.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client_core:7.2.3.0-7.2.3.15,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 6100-09:IJ09619,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no sec,vios,3.1.0.0 :: 3.1.0.10,There is a vulnerability in FreeBSD that affects VIOS.,IJ09625 / CVE-2018-6922,3.1.0.20,IJ09625s2a.181203.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc,bos.net.tcp.client_core:7.2.3.0-7.2.3.15,20181108, ,2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 7200-03:IJ09625,https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar,CVE-2018-6922:7.5,no hiper,aix,7200-03-00 :: 7200-03-01,Possible undetected data loss with Power9 NVMe,IJ09686,7200-03-02-1845,IJ09686s1a.181113.AIX72TL03SP00-01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09686,devices.chrp.vdevice.rte:7.2.3.0 devices.chrp.pci.rte:7.2.3.0,20181117, ,6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127,https://aix.software.ibm.com/aix/ifixes/IJ09686/, ,yes hiper,aix,7100-05-02 :: 7100-05-03,Possible undetected data loss with Power9 NVMe,IJ09705,7100-05-03-1846,IJ09705s3a.181115.AIX71TL05SP03-1838.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09705,devices.chrp.vdevice.rte:7.1.5.0-7.1.5.30 devices.chrp.pci.rte:7.1.5.16-7.1.5.30,20181117, ,6100-09:IJ09710 7100-04:IJ10350 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686,https://aix.software.ibm.com/aix/ifixes/ij09705/, ,yes hiper,vios,2.2.5.40,Possible undetected data loss with Power9 NVMe,IJ09710,2.2.5.40,IJ09710sBa.181115.AIX61TL09SP11.epkg.Z IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09710,devices.chrp.vdevice.rte:6.1.9.315 devices.chrp.pci.rte:6.1.9.316,20181117, ,6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686,https://aix.software.ibm.com/aix/ifixes/ij09710/, ,yes hiper,vios,2.2.6.21 :: 2.2.6.30 :: 2.2.6.31,Possible undetected data loss with Power9 NVMe,IJ09710,2.2.6.32,IJ09710sBa.181115.AIX61TL09SP11.epkg.Z IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09710,devices.chrp.vdevice.rte:6.1.9.315-6.1.9.400 devices.chrp.pci.rte:6.1.9.316-6.1.9.400,20181117, ,6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686,https://aix.software.ibm.com/aix/ifixes/ij09710/, ,yes hiper,vios,2.2.4.60,Possible undetected data loss with Power9 NVMe,IJ09710,See Advisory,IJ09710sBa.181115.AIX61TL09SP11.epkg.Z IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09710,devices.chrp.vdevice.rte:6.1.9.315 devices.chrp.pci.rte:6.1.9.316,20181117, ,6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686,https://aix.software.ibm.com/aix/ifixes/ij09710/, ,yes hiper,aix,6100-09-11 :: 6100-09-12,Possible undetected data loss with Power9 NVMe ,IJ09710,6100-09-12-1846,IJ09710sBa.181115.AIX61TL09SP11.epkg.Z IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09710,devices.chrp.vdevice.rte:6.1.9.315-6.1.9.400 devices.chrp.pci.rte:6.1.9.316-6.1.9.400,20181117, ,7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686,https://aix.software.ibm.com/aix/ifixes/ij09710/, ,yes sec,aix,7200-03-00 :: 7200-03-01,There is a vulnerability in Oracle Solaris that affects AIX.,IJ09805 / CVE-2017-3623,7200-03-02-1845,IJ09805s0a.181012.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,bos.net.tcp.client_core:7.2.3.0-7.2.3.0,20181211, ,2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134,https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar,CVE-2017-3623:10,no hiper,aix,7200-01-04,Possible undetected data loss with Power9 NVMe,IJ09894,7200-01-05-1845,IJ09894s4a.181113.AIX72TL01SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09894,devices.chrp.vdevice.rte:7.2.1.0 devices.chrp.pci.rte:7.2.1.0,20181117, ,6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-02:IJ10127 7200-03:IJ09686,https://aix.software.ibm.com/aix/ifixes/ij09894/, ,yes hiper,aix,7200-02-02,Possible undetected data loss with Power9 NVMe,IJ10127,7200-02-03-1845,IJ10127s2a.181113.AIX72TL02SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10127,devices.chrp.vdevice.rte:7.2.2.0 devices.chrp.pci.rte:7.2.2.16,20181117, ,6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-03:IJ09686,https://aix.software.ibm.com/aix/ifixes/ij10127/, ,yes sec,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,There is a vulnerability in Oracle Solaris that affects AIX.,IJ10130 / CVE-2017-3623,7200-02-03-1845,IJ10130s0a.181011.epkg.Z IJ10130s2a.181011.epkg.Z IJ10130s2b.181011.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,bos.net.tcp.client_core:7.2.2.0-7.2.2.16,20181211, ,2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805,https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar,CVE-2017-3623:10,no sec,aix,7100-05-01 :: 7100-05-02 :: 7100-05-03,There is a vulnerability in Oracle Solaris that affects AIX.,IJ10132 / CVE-2017-3623,7100-05-03-1846,IJ10132s1a.181009.epkg.Z IJ10132s2a.181009.epkg.Z IJ10132s2b.181009.epkg.Z IJ10132s3a.181009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,bos.net.tcp.client:7.1.5.0-7.1.5.30,20181211, ,2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805,https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar,CVE-2017-3623:10,no sec,aix,6100-09-10 :: 6100-09-11 :: 6100-09-12,There is a vulnerability in Oracle Solaris that affects AIX.,IJ10134 / CVE-2017-3623,6100-09-12-1846,IJ10134sAa.181009.epkg.Z IJ10134sBa.181009.epkg.Z IJ10134sBb.181009.epkg.Z IJ10134sCa.181009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.400,20181211, ,2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 7200-03:IJ09805,https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar,CVE-2017-3623:10,no sec,vios,2.2.5.40,There is a vulnerability in Oracle Solaris that affects VIOS.,IJ10134 / CVE-2017-3623,2.2.5.50,IJ10134sBa.181009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,See Bulletin,20181211, ,2.2.6:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805,https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar,CVE-2017-3623:10,no sec,vios,2.2.6.20 :: 2.2.6.21 :: 2.2.6.23 :: 2.2.6.30 :: 2.2.6.31,There is a vulnerability in Oracle Solaris that affects VIOS.,IJ10134 / CVE-2017-3623,2.2.6.32,IJ10134sBa.181009.epkg.Z IJ10134sBb.181009.epkg.Z IJ10134sCa.181009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,See Bulletin,20181211, ,2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805,https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar,CVE-2017-3623:10,no sec,vios,2.2.4.60,There is a vulnerability in Oracle Solaris that affects VIOS.,IJ10134 / CVE-2017-3623,See Bulletin,IJ10134sBa.181009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,See Bulletin,20181211, ,2.2.6:IJ10134 2.2.5:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805,https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar,CVE-2017-3623:10,no sec,aix,7100-04-04 :: 7100-04-05 :: 7100-04-06,There is a vulnerability in Oracle Solaris that affects AIX.,IJ10275 / CVE-2017-3623,7100-04-07-1845,IJ10275s4a.181009.epkg.Z IJ10275s5a.181009.epkg.Z IJ10275s6a.181009.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,bos.net.tcp.client:7.1.4.0-7.1.4.33,20181211, ,2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 6100-09:IJ10134 7200-03:IJ09805,https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar,CVE-2017-3623:10,no sec,aix,NTPv4,There are vulnerabilities in NTPv4 that affect AIX.,IJ10280 / CVE-2018-12327 / CVE-2018-7170,See Advisory,IJ10280s3b.181206.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory11.asc,ntp.rte:7.4.2.8100-7.4.2.8110,20181214, ,n/a,See Bulletin,CVE-2018-12327:5.9 / CVE-2018-7170:3.1,no hiper,aix,7200-03-00 :: 7200-03-01,Possible errors in certain network adapters,IJ10293,7200-03-02-1845,IJ10293s1a.181109.AIX72TL03SP00-01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10293,devices.ethernet.lnc.rte:7.2.3.0 devices.ethernet.lnc2.rte:7.2.3.0,20181110, ,7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371,https://aix.software.ibm.com/aix/ifixes/ij10293/, ,yes hiper,aix,7100-05-00 :: 7100-05-01 :: 7100-05-02,Possible errors in certain network adapters,IJ10295,7100-05-03-1846,IJ10295m3a.181109.AIX71TL05SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10295,devices.ethernet.lnc.rte:7.1.5.0-7.1.5.30 devices.ethernet.lnc2.rte:7.1.5.0-7.1.5.30,20181110, ,7100-04:IJ10369 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293,https://aix.software.ibm.com/aix/ifixes/ij10295/, ,yes hiper,vios,2.2.5.0 :: 2.2.5.10 :: 2.2.5.20 :: 2.2.5.30 :: 2.2.5.40,Possible errors in certain network adapters,IJ10300,2.2.5.50,IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10300,devices.ethernet.lnc.rte:6.1.9.200-6.1.9.315 devices.ethernet.lnc2.rte:6.1.9.200-6.1.9.315,20181110, ,7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293,https://aix.software.ibm.com/aix/ifixes/ij10300/, ,yes hiper,vios,2.2.6.0 :: 2.2.6.10 :: 2.2.5.60 :: 2.2.6.30 :: 2.2.6.31,Possible errors in certain network adapters,IJ10300,2.2.6.32,IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10300,devices.ethernet.lnc.rte:6.1.9.300-6.1.9.400 devices.ethernet.lnc2.rte:6.1.9.300-6.1.9.400,20181110, ,7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293,https://aix.software.ibm.com/aix/ifixes/ij10300/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40 :: 2.2.4.50 :: 2.2.4.60,Possible errors in certain network adapters,IJ10300,See Advisory,IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10300,devices.ethernet.lnc.rte:6.1.9.100-6.1.9.315 devices.ethernet.lnc2.rte:6.1.9.100-6.1.9.315,20181110, ,7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293,https://aix.software.ibm.com/aix/ifixes/ij10300/, ,yes hiper,aix,7100-04-06,Possible undetected data loss with Power9 NVMe,IJ10350,7100-04-07-1845,IJ10350s6a.181115.AIX71TL04SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10350,devices.chrp.vdevice.rte:7.1.4.30 devices.chrp.pci.rte:7.1.4.30,20181117, ,6100-09:IJ09710 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686,https://aix.software.ibm.com/aix/ifixes/ij10350/, ,yes hiper,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05 :: 7100-04-06,Possible errors in certain network adapters,IJ10369,7100-04-07-1845,IJ10369m6a.181109.AIX71TL04SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10369,devices.ethernet.lnc.rte:7.1.4.0-7.1.4.33 devices.ethernet.lnc2.rte:7.1.4.0-7.1.4.33,20181110, ,7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293,https://aix.software.ibm.com/aix/ifixes/ij10369/, ,yes hiper,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04,Possible errors in certain network adapters,IJ10370,7200-01-05-1845,IJ10370m4a.181109.AIX72TL01SP04.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10370,devices.ethernet.lnc.rte:7.2.1.0-7.2.1.3 devices.ethernet.lnc2.rte:7.2.1.0-7.2.1.3,20181110, ,7100-04:IJ10369 7100-05:IJ10295 7200-02:IJ10371 7200-03:IJ10293,https://aix.software.ibm.com/aix/ifixes/ij10370/, ,yes hiper,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,Possible errors in certain network adapters,IJ10371,7200-02-03-1845,IJ10371m2a.181109.AIX72TL02SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10371,devices.ethernet.lnc.rte:7.2.2.0-7.2.2.16 devices.ethernet.lnc2.rte:7.2.2.0-7.2.2.16,20181110, ,7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-03:IJ10293,https://aix.software.ibm.com/aix/ifixes/ij10371/, ,yes sec,aix,7200-01-02 :: 7200-01-03 :: 7200-01-04,There is a vulnerability in Oracle Solaris that affects AIX.,IJ10552 / CVE-2017-3623,7200-01-05-1845,IJ10552s2a.181016.epkg.Z IJ10552s3a.181016.epkg.Z IJ10552s4a.181016.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,bos.net.tcp.client_core:7.2.1.0-7.2.1.3,20181211, ,2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805,https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar,CVE-2017-3623:10,no sec,aix,7200-00-04 :: 7200-00-05 :: 7200-00-06,There is a vulnerability in Oracle Solaris that affects AIX.,IJ10553 / CVE-2017-3623,See Bulletin,IJ10553s4a.181016.epkg.Z IJ10553s5a.181016.epkg.Z IJ10553s6a.181016.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,bos.net.tcp.client_core:7.2.0.0-7.2.0.5,20181211, ,2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805,https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar,CVE-2017-3623:10,no sec,aix,5300-12-09,There is a vulnerability in Oracle Solaris that affects AIX.,IJ10554 / CVE-2017-3623,See Bulletin,IJ10554s9a.181017.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20181211, ,2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805,,CVE-2017-3623:10,no sec,aix,6100-09-10 :: 6100-09-11 :: 6100-09-12,There is a vulnerability in Xorg that affects AIX.,IJ11000 / CVE-2018-14665,See Bulletin,IJ11000s0b.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:6.1.9.0-6.1.9.100,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,vios,2.2.4.40 :: 2.2.4.50 :: 2.2.4.60,There is a vulnerability in Xorg that affects VIOS.,IJ11000 / CVE-2018-14665,See Bulletin,IJ11000s0b.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:6.1.9.0-6.1.9.100,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,vios,2.2.5.20 :: 2.2.5.30 :: 2.2.5.40,There is a vulnerability in Xorg that affects VIOS.,IJ11000 / CVE-2018-14665,See Bulletin,IJ11000s0b.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:6.1.9.0-6.1.9.100,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,vios,2.2.6.23 :: 2.2.6.30 :: 2.2.6.31 :: 2.2.6.32,There is a vulnerability in Xorg that affects VIOS.,IJ11000 / CVE-2018-14665,See Bulletin,IJ11000s0b.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:6.1.9.0-6.1.9.100,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06,Possible errors in certain network adapters,IJ11207,See advisory,IJ11207m6a.181109.AIX72TL00SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ11207,devices.ethernet.lnc.rte:7.2.0.0-7.2.0.6 devices.ethernet.lnc2.rte:7.2.0.0-7.2.0.6,20181110, ,7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293,https://aix.software.ibm.com/aix/ifixes/ij11207/, ,yes hiper,aix,7200-00-06,Possible undetected data loss with Power9 NVMe,IJ11253,See Advisory,IJ11253s6a.181113.AIX72TL00SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ11253,devices.chrp.vdevice.rte:7.2.0.0 devices.chrp.pci.rte:7.2.0.0,20181117, ,6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686,https://aix.software.ibm.com/aix/ifixes/ij11253/, ,yes sec,aix,7100-04-04 :: 7100-04-05 :: 7100-04-06,There is a vulnerability in Xorg that affects AIX.,IJ11544 / CVE-2018-14665,7100-04-08,IJ11544s0a.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:7.1.4.0-7.1.4.30,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7200-03:IJ11550,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,aix,7100-04-04 :: 7100-04-05 :: 7100-04-06 :: 7100-04-07,There is a vulnerability in Xorg that affects AIX.,IJ11544 / CVE-2018-14665,7100-04-08,IJ11544s0a.181127.epkg.Z IJ11544s0a.190312.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:7.1.4.0-7.1.4.30,20181211,20190409,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7200-03:IJ11550,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,aix,7100-05-01 :: 7100-05-02 :: 7100-05-03,There is a vulnerability in Xorg that affects AIX.,IJ11545 / CVE-2018-14665,7100-05-04,IJ11545s0a.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:7.1.5.0-7.1.5.31,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-04:IJ11544 7200-03:IJ11550,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,aix,7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06,There is a vulnerability in Xorg that affects AIX.,IJ11546 / CVE-2018-14665,See Bulletin,IJ11546s0a.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:7.2.0.0-7.2.0.1,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04,There is a vulnerability in Xorg that affects AIX.,IJ11547 / CVE-2018-14665,7200-01-06,IJ11547s0a.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:7.2.1.0-7.2.1.0,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,aix,7200-02-01 :: 7200-02-02 :: 7200-02-03,There is a vulnerability in Xorg that affects AIX.,IJ11549 / CVE-2018-14665,7200-02-04,IJ11549s0a.181127.epkg.Z IJ11549s0a.190312.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:7.2.2.0-7.2.2.0,20181211,20190409,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,aix,7200-03-01 :: 7200-03-02,There is a vulnerability in Xorg that affects AIX.,IJ11550 / CVE-2018-14665,7200-03-03,IJ11550s0a.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:7.2.3.0-7.2.3.15,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,vios,3.1.0.0 :: 3.1.0.10,There is a vulnerability in Xorg that affects VIOS.,IJ11550 / CVE-2018-14665,7200-03-03,IJ11550s0a.181127.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:7.2.3.0-7.2.3.15,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544,https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar,CVE-2018-14665:8.8,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,There is a vulnerability in Xorg that affects AIX.,IJ11551 / CVE-2018-14665,See Bulletin,IJ11551s0a.181127.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc,X11.base.rte:5.3.12.0-5.3.12.2,20181211, ,2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550,,CVE-2018-14665:8.8,no hiper,vios,2.2.5.50,TCP session hang/timeout or possible undetected data corruption,IJ12143,2.2.5.51,IJ12143sCd.190221.VIOS2.2.5.50.epkg.Z IJ12143sCd.190221.VIOS2.2.6.30-32.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ12143,devices.common.IBM.ethernet.rte:6.1.9.400,20190119,20190228,,https://aix.software.ibm.com/aix/ifixes/ij12143/, ,yes hiper,vios,2.2.6.30 :: 2.2.6.31 :: 2.2.6.32,TCP session hang/timeout or possible undetected data corruption,IJ12143,2.2.6.33,IJ12143sCd.190221.VIOS2.2.5.50.epkg.Z IJ12143sCd.190221.VIOS2.2.6.30-32.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ12143,devices.common.IBM.ethernet.rte:6.1.9.400,20190119,20190228,,https://aix.software.ibm.com/aix/ifixes/ij12143/, ,yes hiper,vios,3.1.0.0 :: 3.1.0.10 :: 3.1.0.11,TCP session hang/timeout or possible undetected data corruption,IJ12809,3.1.0.12,IJ12809s2b.190225.VIOS3.1.0.0-11.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ12809,devices.common.IBM.ethernet.rte:7.2.3.15,20190119,20190228,,https://aix.software.ibm.com/aix/ifixes/ij12809/, ,yes sec,aix,6100-09-12,There is a vulnerability in tcpdump that affects AIX.,IJ12978 / IJ20781 / CVE-2018-19519,See Bulletin,,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc,bos.net.tcp.server:6.1.9.300-6.1.9.400,20190225,20190409,2.2.6:IJ12978 2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar,CVE-2018-19519:7.3,no sec,vios,2.2.5.40 :: 2.2.5.50,There is a vulnerability in tcpdump that affects VIOS.,IJ12978 / IJ20781 / CVE-2018-19519,2.2.5.60,IJ12978s9a.190215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc,bos.net.tcp.server:6.1.9.0-6.1.9.400,20190225, ,2.2.6:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar,CVE-2018-19519:7.3,no sec,vios,2.2.6.21 :: 2.2.6.23 :: 2.2.6.32,There is a vulnerability in tcpdump that affects VIOS.,IJ12978 / IJ20781 / CVE-2018-19519,2.2.6.40,IJ12978sBa.190215.epkg.Z IJ12978sCa.190215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc,bos.net.tcp.server:6.1.9.0-6.1.9.400,20190225, ,2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar,CVE-2018-19519:7.3,no sec,aix,7100-04-05 :: 7100-04-06 :: 7100-04-07,There is a vulnerability in tcpdump that affects AIX.,IJ12979 / CVE-2018-19519,7100-04-08-1914,IJ12979m5a.190304.epkg.Z IJ12979m6a.190304.epkg.Z IJ12979m7a.190205.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc,bos.net.tcp.server:7.1.4.32-7.1.4.34,20190225,20190409,2.2.6:IJ12978 2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7200-03:IJ12983,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar,CVE-2018-19519:7.3,no sec,aix,7200-01-03 :: 7200-01-04 :: 7200-01-05,There is a vulnerability in tcpdump that affects AIX.,IJ12981 / CVE-2018-19519,7200-01-06-1914,IJ12981m3a.190214.epkg.Z IJ12981m4a.190215.epkg.Z IJ12981m5a.190225.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc,bos.net.tcp.tcpdump:7.2.1.1-7.2.1.3,20190225,20190409,2.2.6:IJ12978 2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar,CVE-2018-19519:7.3,no hiper,aix,7100-05-03,Opening Mellanox Infiniband adapters will fail,IJ13283,7100-05-04-1914,IJ13283s3a.190225.AIX71TL05SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13283,bos.mp64:7.1.5.30 devices.pciex.b3154a63.rte:7.1.5.30,20190309, ,6100-09:IJ13293 7100-04:IJ13688 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334,https://aix.software.ibm.com/aix/ifixes/ij13283/, ,yes hiper,aix,6100-09-12-1837 :: 6100-09-12-1846,Opening Mellanox Infiniband adapters will fail,IJ13283,6100-09-12-1913,IJ13293sCa.190306.AIX61TL09SP12.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13293,bos.mp64:6.1.9.400-6.1.9.402 devices.pciex.b3154a63.rte:6.1.9.400,20190309, ,7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334,https://aix.software.ibm.com/aix/ifixes/ij13293/, ,yes hiper,vios,2.2.5.50,Opening Mellanox Infiniband adapters will fail,IJ13293,2.2.5.60,IJ13293sCa.190306.VIOS2.2.5.50.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13293,bos.mp64:6.1.9.400 devices.pciex.b3154a63.rte:6.1.9.400,20190309, ,6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334,https://aix.software.ibm.com/aix/ifixes/ij13293/, ,yes hiper,vios,2.2.6.30 :: 2.2.6.31 :: 2.2.6.32,Opening Mellanox Infiniband adapters will fail,IJ13293,2.2.6.40,IJ13293sCa.190306.VIOS2.2.6.30-32.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13293,bos.mp64:6.1.9.400 devices.pciex.b3154a63.rte:6.1.9.400,20190309, ,6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334,https://aix.software.ibm.com/aix/ifixes/ij13293/, ,yes hiper,vios,3.1.0.0 :: 3.1.0.10 :: 3.1.0.11,Opening Mellanox Infiniband adapters will fail,IJ13334,3.1.0.20,IJ13334s2a.190306.VIOS3.1.0.0-11.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13334,bos.mp64:7.2.3.0-7.2.3.16 devices.pciex.b3154a63.rte:7.2.3.0,20190309, ,6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334,https://aix.software.ibm.com/aix/ifixes/ij13334/, ,yes hiper,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,Opening Mellanox Infiniband adapters will fail,IJ13334,7200-03-03-1913,IJ13334s2a.190306.AIX72TL03SP00-02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13334,bos.mp64:7.2.3.0-7.2.3.16 devices.pciex.b3154a63.rte:7.2.3.0,20190309, ,6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458,https://aix.software.ibm.com/aix/ifixes/ij13334/, ,yes hiper,aix,7200-02-03,Opening Mellanox Infiniband adapters will fail,IJ13458,7200-01-04-1914,IJ13458s3a.190225.AIX72TL02SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13458,bos.mp64:7.2.2.19 devices.pciex.b3154a63.rte:7.2.2.15,20190309, ,6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-03:IJ13334,https://aix.software.ibm.com/aix/ifixes/ij13458/, ,yes hiper,aix,7100-04-07,Opening Mellanox Infiniband adapters will fail,IJ13688,7100-04-08-1914,IJ13688s7a.190225.AIX71TL04SP07.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13688,bos.mp64:7.1.4.35 devices.pciex.b3154a63.rte:7.1.4.31,20190309, ,6100-09:IJ13293 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334,https://aix.software.ibm.com/aix/ifixes/ij13688/, ,yes hiper,aix,7200-01-05,Opening Mellanox Infiniband adapters will fail,IJ13856,7200-01-06-1914,IJ13856s5a.190225.AIX72TL01SP05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13856,bos.mp64:7.2.1.6 devices.pciex.b3154a63.rte:7.2.1.1,20190309, ,6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-02:IJ13458 7200-03:IJ13334,https://aix.software.ibm.com/aix/ifixes/ij13856/, ,yes hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06,Affected PowerHA SystemMirror Levels and Recommended Fixes,IJ15739,7200-00-07,IJ15885m2a.190604.PowerHA7.2.0SP02.epkg.Z IJ15885m5a.190604.PowerHA7.2.0SP05.epkg.Z IJ15885s6b.190604.PowerHA7.2.0SP06.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ15739,cluster.es.server.rte:7.2.0.0-7.2.0.6 cluster.es.client.lib:7.2.0.0-7.2.0.6,20190430,20190612,,https://aix.software.ibm.com/aix/ifixes/ij15885/, ,yes hiper,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04,Affected PowerHA SystemMirror Levels and Recommended Fixes,IJ15739,7200-01-05,IJ09170m0c.190603.PowerHA7.2.1SP00.epkg.Z IJ09170m1c.190603.PowerHA7.2.1SP01.epkg.Z IJ09170m2c.190603.PowerHA7.2.1SP02.epkg.Z IJ09170m3c.190603.PowerHA7.2.1SP03.epkg.Z IJ09170s4b.190603.PowerHA7.2.1SP04.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ15739,cluster.es.server.rte:7.2.1.0-7.2.1.4 cluster.es.client.lib:7.2.1.0-7.2.1.4,20190430,20190612,,https://aix.software.ibm.com/aix/ifixes/ij09170/, ,yes hiper,aix,7200-02-00 :: 7200-02-01 :: 7200-02-02,Affected PowerHA SystemMirror Levels and Recommended Fixes,IJ15739,7200-02-03,IJ10601m0c.190603.PowerHA7.2.2SP00.epkg.Z IJ10601m1c.190603.PowerHA7.2.2SP01.epkg.Z IJ10601s2c.190603.PowerHA7.2.2SP02.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ15739,cluster.es.server.rte:7.2.2.0-7.2.2.2 cluster.es.client.lib:7.2.2.0-7.2.2.2,20190430,20190612,,https://aix.software.ibm.com/aix/ifixes/ij10601/, ,yes hiper,aix,7200-03-00,Affected PowerHA SystemMirror Levels and Recommended Fixes,IJ15739,7200-03-01,IJ15739m0a.190603.PowerHA7.2.3SP00.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ15739,cluster.es.server.rte:7.2.3.0 cluster.es.client.lib:7.2.3.0,20190430,20190612,,https://aix.software.ibm.com/aix/ifixes/ij15739/, ,yes hiper,vios,3.1.0.20 :: 3.1.0.21,NETSTAT PRINTS SOME MESSAGES INCORRECTLY,IJ16586,3.1.0.30,IJ16586s3a.190607.VIOS3.1.0.21.epkg.Z IJ16586s3b.190614.VIOS3.1.0.20.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ16586,bos.net.tcp.client_core:7.2.3.16-7.2.3.17,20190614, ,7100-04:IJ16623 7100-05:IJ16622 7200-03:IJ16524,https://aix.software.ibm.com/aix/ifixes/ij16586/, ,yes hiper,aix,7200-03-03-1913 :: 7200-03-03-1914,netstat prints some messages incorrectly,IJ16586,7200-03-04-1938,IJ16586s3a.190607.AIX72TL03SP03-1913.epkg.Z IJ16586s3a.190607.AIX72TL03SP03-1914.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ16586,bos.net.tcp.client_core:7.2.3.16-7.2.3.17,20190614, ,7100-04:IJ16623 7100-05:IJ16622,https://aix.software.ibm.com/aix/ifixes/ij16586/, ,yes hiper,aix,7100-05-04-1913 :: 7100-05-04-1914,netstat prints some messages incorrectly,IJ16622,7100-05-05-1937,IJ16622s4a.190614.AIX71TL05SP04-1913.epkg.Z IJ16622s4b.190614.AIX71TL05SP04-1914.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ16622,bos.net.tcp.client:7.1.5.32-7.1.5.33,20190614, ,7100-04:IJ16623 7200-03:IJ16586,https://aix.software.ibm.com/aix/ifixes/ij16622/, ,yes hiper,aix,7100-04-08-1914,netstat prints some messages incorrectly,IJ16623,See Advisory,,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ16623,bos.net.tcp.client:7.1.4.35,20190614, ,7100-05:IJ16622 7200-03:IJ16586,https://aix.software.ibm.com/aix/ifixes/ij16623/, ,yes hiper,vios,2.2.6.40 :: 2.2.6.41,NETSTAT PRINTS SOME MESSAGES INCORRECTLY,IJ16624,2.2.6.50,IJ16624sDa.190613.VIOS2.2.6.40.epkg.Z IJ16624sDb.190613.VIOS2.2.6.41.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ16624,bos.net.tcp.client:6.1.9.402-6.1.9.403,20190614, ,7100-04:IJ16623 7100-05:IJ16622 7200-03:IJ16524,https://aix.software.ibm.com/aix/ifixes/ij16624/, ,yes sec,aix,NTPv4,There are vulnerabilities in NTPv4 that affect AIX.,IJ17059 / CVE-2019-8936,See Advisory,IJ17059m9b.190719.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc,ntp.rte:7.4.2.8100-7.4.2.8121,20190819, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar,CVE-2019-8936:5.3,no sec,aix,6100-09-12,Vulnerabilities in NTP affect AIX,IJ17060 / CVE-2019-8936,See Bulletin,IJ17060m9a.190628.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc,bos.net.tcp.client:6.1.9.0-6.1.9.403,20190819, ,,Out of Support,CVE-2019-8936:5.3,no sec,vios,2.2.6.20 :: 2.2.6.21 :: 2.2.6.23 :: 2.2.6.30 :: 2.2.6.31 :: 2.2.6.32 :: 2.2.6.40 :: 2.2.6.41,Vulnerabilities in NTP affect VIOS,IJ17060 / CVE-2019-8936,2.2.6.50,IJ17060m9a.190628.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc,bos.net.tcp.client:6.1.9.0-6.1.9.403,20190819, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar,CVE-2019-8936:5.3,no sec,vios,2.2.5.40 :: 2.2.5.50 :: 2.2.5.60,Vulnerabilities in NTP affect VIOS,IJ17060 / CVE-2019-8936,See Bulletin,IJ17060m9a.190628.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc,bos.net.tcp.client:6.1.9.0-6.1.9.403,20190819, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar,CVE-2019-8936:5.3,no sec,vios,3.1.0.0 :: 3.1.0.10 :: 3.1.0.20 :: 3.1.0.21,Vulnerabilities in NTP affect VIOS,IJ17065 / CVE-2019-8936,3.1.0.30,IJ17065m3a.190701.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc,bos.net.tcp.ntp:7.2.3.0-7.2.3.15 bos.net.tcp.ntpd:7.2.3.0-7.2.3.15,20190819, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar,CVE-2019-8936:5.3,no hiper,aix,7200-03-03,Live Update fails when applying 7200-03-03 or IJ09625,IJ17505,7200-03-04-1938,IJ17505s3a.190911.AIX72TL03SP03.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ17505,bos.net.tcp.client_core:7.2.3.16-7.2.3.17,20190913,20190917,,https://aix.software.ibm.com/aix/ifixes/ij17505/, ,yes sec,aix,6100-09-12,There is a vulnerability in tcpdump that affects AIX.,IJ20781 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808,Out of Support,IJ20781sCc.191121.epkg.Z IJ20781sCd.191121.epkg.Z IJ20781sDa.191121.epkg.Z IJ20781sDb.191121.epkg.Z IJ20781sEa.191121.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc,bos.net.tcp.server:6.1.9.0-6.1.9.401,20200108, ,,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar,CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5,no sec,vios,2.2.6.31 :: 2.2.6.32 :: 2.2.6.40 :: 2.2.6.41 :: 2.2.6.50,There is a vulnerability in tcpdump that affects VIOS.,IJ20781 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808,2.2.6.60,IJ20781sCc.191121.epkg.Z IJ20781sCd.191121.epkg.Z IJ20781sDa.191121.epkg.Z IJ20781sDb.191121.epkg.Z IJ20781sEa.191121.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc,bos.net.tcp.server:6.1.9.0-6.1.9.401,20200108, ,,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar,CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5,no sec,aix,7100-05-01 :: 7100-05-02 :: 7100-05-03,There is a vulnerability in tcpdump that affects AIX.,IJ20783 / IJ12980 / CVE-2018-19519,7100-05-04-1913,IJ12980m1a.190207.epkg.Z IJ12980m1a.190207.epkg.Z IJ12980m3a.190212.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc,bos.net.tcp.server:7.1.5.0-7.1.5.31,20190225, ,2.2.6:IJ12978 2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-04:IJ12979 7200-03:IJ12983,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar,CVE-2018-19519:7.3,no sec,aix,7100-05-03 :: 7100-05-04 :: 7100-05-05,There is a vulnerability in tcpdump that affects AIX.,IJ20783 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808,7100-05-06-2015,IJ20783s4a.191118.epkg.Z IJ20783s5a.191115.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc,bos.net.tcp.server:7.1.5.0-7.1.5.32,20200108, ,,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar,CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5,no sec,aix,7200-02-01 :: 7200-02-02 :: 7200-02-03,There is a vulnerability in tcpdump that affects AIX.,IJ20784 / IJ12982 / CVE-2018-19519 / IJ20784,7200-02-04-1914,IJ12982m1a.190215.epkg.Z IJ12982m2a.190215.epkg.Z IJ12982m3a.190215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc,bos.net.tcp.tcpdump:7.2.2.0-7.2.2.16,20190225, ,2.2.6:IJ12978 2.2.5:IJ12978 3100-00:IJ12983 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar,CVE-2018-19519:7.3,no sec,aix,7200-02-02 :: 7200-02-03 :: 7200-02-04,There is a vulnerability in tcpdump that affects AIX.,IJ20784 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808,7200-02-06-2015,IJ20784s2a.191118.epkg.Z IJ20784s3a.191118.epkg.Z IJ20784s4a.191115.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc,bos.net.tcp.tcpdump:7.2.2.0-7.2.2.17,20200108, ,,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar,CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5,no sec,aix,7200-03-00 :: 7200-03-01 :: 7200-03-02,There is a vulnerability in tcpdump that affects AIX.,IJ20785 / IJ12983 / CVE-2018-19519 / IJ20785,7200-03-03-1913,IJ12983m0a.190215.epkg.Z IJ12983m1a.190215.epkg.Z IJ12983m2a.190215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc,bos.net.tcp.tcpdump:7.2.3.0-7.2.3.15,20190225, ,2.2.6:IJ12978 2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar,CVE-2018-19519:7.3,no sec,vios,3.1.0.10,There is a vulnerability in tcpdump that affects VIOS.,IJ20785 / IJ12983 / IJ20785 / CVE-2018-19519,3.1.0.20,IJ12983m2a.190215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc,bos.net.tcp.tcpdump:7.2.3.0-7.2.3.15,20190225, ,2.2.6:IJ12978 2.2.5:IJ12978 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar,CVE-2018-19519:7.3,no sec,aix,7200-03-01 :: 7200-03-02 :: 7200-03-03,There is a vulnerability in tcpdump that affects AIX.,IJ20785 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808,7200-03-05-2016,IJ20785s1a.191120.epkg.Z IJ20785s2a.191119.epkg.Z IJ20785s3a.191115.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc,bos.net.tcp.tcpdump:7.2.3.0-7.2.3.16,20200108, ,,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar,CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5,no sec,vios,3.1.0.0 :: 3.1.0.10 :: 3.1.0.20,There is a vulnerability in tcpdump that affects VIOS.,IJ20785 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808,3.1.0.40,IJ20785s2a.191119.epkg.Z IJ20785s2a.191119.epkg.Z IJ20785s3a.191115.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc,bos.net.tcp.tcpdump:7.2.3.0-7.2.3.16,20200108, ,,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar,CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5,no sec,aix,7200-04-00 :: 7200-04-01,There is a vulnerability in tcpdump that affects AIX.,IJ20786 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808,7200-04-02-2015,IJ20786s1a.191120.epkg.Z IJ20786s1a.191120.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc,bos.net.tcp.tcpdump:7.2.4.0,20200108, ,,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar,CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5,no sec,vios,3.1.1.0 :: 3.1.1.10,There is a vulnerability in tcpdump that affects VIOS.,IJ20786 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808,3.1.1.20,IJ20786s1a.191120.epkg.Z IJ20786s1a.191120.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc,bos.net.tcp.tcpdump:7.2.4.0,20200108, ,,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar,CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5,no hiper,aix,7200-04-00 :: 7200-04-01 :: 7200-04-01-1939,Possible undetected data corruption with certain Fibre Channel adapters,IJ21527,7200-04-02,IJ21527s1a.191216.AIX72TL04SP00.epkg.Z IJ21527s1a.191216.AIX72TL04SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ21527,devices.pci.df1000f7.com:7.2.4.0,20191218, ,7100-04:IJ21581 7100-05:IJ21577 7200-02:IJ21578,https://aix.software.ibm.com/aix/ifixes/ij21527/, ,yes hiper,vios,3.1.1.0 :: 3.1.1.10,Possible undetected data corruption with certain Fibre Channel adapters,IJ21527,3.1.1.20,IJ21527s1a.191216.VIOS3.1.1.0.epkg.Z IJ21527s1a.191216.VIOS3.1.1.10.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21527,devices.pci.df1000f7.com:7.2.4.0,20191218, ,7100-04:IJ21581 7100-05:IJ21577 7200-02:IJ21578 7200-03:IJ21580 7200-04:IJ21527,https://aix.software.ibm.com/aix/ifixes/ij21527/, ,yes hiper,vios,3.1.1.10,VIOS 3.1.1 SSP may not recover from network loss,IJ21564,3.1.1.20,IJ21564s1a.191211.VIOS3.1.1.10.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ21564,pool.basic.rte:7.2.4.1,20191214, ,,https://aix.software.ibm.com/aix/ifixes/ij21564/, ,yes hiper,vios,2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.30 :: 2.2.6.40 :: 2.2.6.50 :: 2.2.6.51,Possible undetected data corruption with certain Fibre Channel adapters,IJ21576,2.2.6.60,IJ21576sea.191216.VIOS2.2.6.51.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21576,devices.pci.df1000f7.com:6.1.9.300-6.1.9.401,20191218, ,7100-04:IJ21581 7100-05:IJ21577 7200-02:IJ21578 7200-03:IJ21580 7200-04:IJ21527,https://aix.software.ibm.com/aix/ifixes/ij21576/, ,yes hiper,aix,7100-05-00-1731 :: 7100-05-01 :: 7100-05-02 :: 7100-05-03 :: 7100-05-04 :: 7100-05-05 :: 7100-05-05-1939,Possible undetected data corruption with certain Fibre Channel adapters,IJ21577,7100-05-06,IJ21577s5a.191216.AIX71TL05SP05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ21577,devices.pci.df1000f7.com:7.1.5.0-7.1.5.32,20191218, ,7100-04:IJ21581 7200-02:IJ21578 7200-03:IJ21580 7200-04:IJ21527,https://aix.software.ibm.com/aix/ifixes/ij21577/, ,yes hiper,aix,7200-02-00-1731 :: 7200-02-01 :: 7200-02-02 :: 7200-02-03 :: 7200-02-04 :: 7200-02-05 :: 7200-02-05-1938,Possible undetected data corruption with certain Fibre Channel adapters,IJ21578,7200-02-06,IJ21578s4a.191216.AIX72TL02SP03.epkg.Z IJ21578s4a.191216.AIX72TL02SP04.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21578,devices.pci.df1000f7.com:7.2.2.0-7.2.2.17,20191218, ,7100-04:IJ21581 7100-05:IJ21577 7200-03:IJ21580 7200-04:IJ21527,https://aix.software.ibm.com/aix/ifixes/ij21578/, ,yes hiper,vios,3.1.0.0 :: 3.1.0.10 :: 3.1.0.20 :: 3.1.0.30,Possible undetected data corruption with certain Fibre Channel adapters,IJ21580,3.1.0.40,IJ21580s3a.191216.VIOS3.1.0.21.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21580,devices.pci.df1000f7.com:7.2.3.15-7.2.3.16,20191218, ,7100-04:IJ21581 7100-05:IJ21577 7200-02:IJ21578 7200-03:IJ21580 7200-04:IJ21527,https://aix.software.ibm.com/aix/ifixes/ij21580/, ,yes hiper,aix,7200-03-00 :: 7200-03-01 :: 7200-03-02 :: 7200-03-03 :: 7200-03-04 :: 7200-03-04-1938,Possible undetected data corruption with certain Fibre Channel adapters,IJ21580,7200-03-05,IJ21580s3a.191216.AIX72TL03SP02.epkg.Z IJ21580s3a.191216.AIX7wloW7JyDy0FcCNvo2TL03SP03.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21580,devices.pci.df1000f7.com:7.2.3.0-7.2.3.16,20191218, ,7100-04:IJ21581 7100-05:IJ21577 7200-02:IJ21578 7200-04:IJ21527,https://aix.software.ibm.com/aix/ifixes/ij21580/, ,yes hiper,aix,7100-04-00-1543 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05 :: 7100-04-06 :: 7100-04-07 :: 7100-04-08 :: 7100-04-08-1914,Possible undetected data corruption with certain Fibre Channel adapters,IJ21581,See Advisory,IJ21581s8a.191216.AIX71TL04SP07.epkg.Z IJ21581s8a.191216.AIX71TL04SP08.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21581,devices.pci.df1000f7.com:7.1.4.0-7.1.4.34,20191218, ,7100-05:IJ21577 7200-02:IJ21578 7200-03:IJ21580 7200-04:IJ21527,https://aix.software.ibm.com/aix/ifixes/ij21581/, ,yes hiper,aix,7200-04-00 :: 7200-04-01 :: 7200-04-01-1939,I/O failures on LPARs using certain FC adapters,IJ22290,7200-04-02,IJ22290s1a.200124.AIX72TL04SP00-01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ22290,devices.pciex.df1060e214103404.com:7.2.4.0,20200125, ,,https://aix.software.ibm.com/aix/ifixes/ij22290/, ,yes hiper,vios,3.1.1.0 :: 3.1.1.10,I/O failures on LPARs using certain FC adapters,IJ22290,3.1.1.20,IJ22290s1a.200124.VIOS3.1.1.0.epkg.Z IJ22290s1a.200124.VIOS3.1.1.10.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ22290,devices.pciex.df1060e214103404.com:7.2.4.0,20200125, ,,https://aix.software.ibm.com/aix/ifixes/ij22290/, ,yes hiper,vios,3.1.1.0 :: 3.1.1.10,Possible undetected data corruption when disk attribute rw_max_time is non-zero,IJ22714,3.1.1.20,IJ22714s1a.200212.VIOS3.1.1.0.epkg.Z IJ22714s1a.200212.VIOS3.1.1.10.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ22714,devices.fcp.disk.rte:7.2.4.0,20200213, ,,https://aix.software.ibm.com/aix/ifixes/ij22714/, ,yes hiper,aix,7200-04-00 :: 7200-04-01 :: 7200-04-01-1939,Possible undetected data corruption when disk attribute rw_max_time is non-zero,IJ22714,7200-04-02,IJ22714s1a.200212.AIX72TL04SP00-01.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IJ22714,devices.fcp.disk.rte:7.2.4.0,20200213, ,,https://aix.software.ibm.com/aix/ifixes/ij22714/, ,yes hiper,vios,3.1.1.0 :: 3.1.1.10,NPIV I/O hangs and/or timeouts on VIOS 3.1.1,IJ23222,3.1.1.20,IJ23222s1a.200306.VIOS3.1.1.0.epkg.Z IJ23222s1a.200306.VIOS3.1.1.10.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IJ23222,devices.vdevice.IBM.vfc-server.rte:7.2.4.0,20200311, ,,https://aix.software.ibm.com/aix/ifixes/ij23222/, ,yes hiper,aix,7200-04-00 :: 7200-04-01 :: 7200-04-01-1939,Issues with 'sendmail' as non-root user on 7200-04 ,IJ24059,7200-04-02,IJ24059m1a.200409.AIX72TL04SP00-01.epkg.Z,https://www.ibm.com/support/pages/apar/IJ24059,bos.net.tcp.sendmail:7.2.4.0,20200430, ,,https://aix.software.ibm.com/aix/ifixes/ij24059/, ,no hiper,vios,3.1.1.0 :: 3.1.1.10 :: 3.1.1.20 :: 3.1.1.21,Using NPIV with VIOS 3.1.1 can cause a crash,IJ24885,3.1.1.22,IJ24885m1a.200513.VIOS3.1.1.0-3.1.1.10.epkg.Z IJ24885m2a.200512.VIOS3.1.1.20-3.1.1.21.epkg.Z,https://www.ibm.com/support/pages/apar/IJ24885,devices.vdevice.IBM.vfc-server.rte:7.2.4.0-7.2.4.1 devices.vdevice.IBM.v-scsi-host.rte:7.2.4.0-7.2.4.1,20200529, ,,https://aix.software.ibm.com/aix/ifixes/ij24885/, ,yes hiper,vios,3.1.1.20 :: 3.1.1.21,Slow TCP performance with Virtual Ethernet Adapter and largesend packets,IJ25390,3.1.1.22,IJ25390s2b.200608.VIOS.3.1.1.21.epkg.Z,https://www.ibm.com/support/pages/apar/IJ25390,devices.vdevice.IBM.l-lan.rte:7.2.4.1-7.2.4.2,20200613, ,7100-05:IJ25443,https://aix.software.ibm.com/aix/ifixes/ij25390/, ,yes hiper,aix,7200-04-02-2015 :: 7200-04-02-2016,Slow TCP performance with Virtual Ethernet Adapter and largesend packets,IJ25390,7200-04-02-2027,IJ25390s2b.200608.AIX72TL04SP02-2016.epkg.Z,https://www.ibm.com/support/pages/apar/IJ25390,devices.vdevice.IBM.l-lan.rte:7.2.4.1-7.2.4.2,20200613, ,7100-05:IJ25443,https://aix.software.ibm.com/aix/ifixes/ij25390/, ,no hiper,vios,2.2.6.60 :: 2.2.6.61,Slow TCP performance with Virtual Ethernet Adapter and largesend packets,IJ25442,2.2.6.62,IJ25442sFa.200611.VIOS2.2.6.60.epkg.Z IJ25442sFa.200611.VIOS2.2.6.61.epkg.Z ,https://www.ibm.com/support/pages/apar/IJ25442,devices.vdevice.IBM.l-lan.rte:6.1.9.402,20200613, ,7100-05:IJ25443 7200-04:IJ25390,https://aix.software.ibm.com/aix/ifixes/ij25442/, ,yes hiper,aix,7100-05-06-2015 :: 7100-05-06-2016,Slow TCP performance with Virtual Ethernet Adapter and largesend packets,IJ25443,7100-05-06-2028,IJ25443s6a.200611.AIX71TL05SP06-2015.epkg.Z IJ25443s6a.200611.AIX71TL05SP06-2016.epkg.Z,https://www.ibm.com/support/pages/apar/IJ25443,devices.vdevice.IBM.l-lan.rte:7.1.5.33,20200613, ,7200-04:IJ25390,https://aix.software.ibm.com/aix/ifixes/ij25443/, ,yes sec,aix,7100-05-04 :: 7100-05-05 :: 7100-05-06,There are vulnerabilities in BIND that impact AIX.,IJ25924 / CVE-2020-8616 / CVE-2020-8617,7100-05-07-2037,IJ25924s6a.200708.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc,bos.net.tcp.client:7.1.5.0-7.1.5.35,20200821, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar,CVE-2020-8616:8.6 / CVE-2020-8617:7.5,no sec,aix,7200-02-04 :: 7200-02-05 :: 7200-02-06,There are vulnerabilities in BIND that impact AIX.,IJ25925 / CVE-2020-8616 / CVE-2020-8617,n/a,IJ25925s6a.200708.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc,bos.net.tcp.bind_utils:7.2.2.0-7.2.2.18,20200821, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar,CVE-2020-8616:8.6 / CVE-2020-8617:7.5,no sec,aix,7200-03-03 :: 7200-03-04 :: 7200-03-05,There are vulnerabilities in BIND that impact AIX.,IJ25926 / CVE-2020-8616 / CVE-2020-8617,7200-03-06-2038,IJ25926s5a.200708.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc,bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16,20200821, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar,CVE-2020-8616:8.6 / CVE-2020-8617:7.5,no sec,vios,3.1.0.20 :: 3.1.0.30 :: 3.1.0.40,There are vulnerabilities in BIND that impact VIOS.,IJ25926 / CVE-2020-8616 / CVE-2020-8617,3.1.0.50,IJ25926s5a.200708.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc,bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16,20200821, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar,CVE-2020-8616:8.6 / CVE-2020-8617:7.5,no sec,aix,7200-04-00 :: 7200-04-01 :: 7200-04-02,There are vulnerabilities in BIND that impact AIX.,IJ25927 / CVE-2020-8616 / CVE-2020-8617,7200-04-03-2038,IJ25927s2a.200708.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc,bos.net.tcp.bind_utils:7.2.4.0-7.2.4.1,20200821, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar,CVE-2020-8616:8.6 / CVE-2020-8617:7.5,no sec,vios,3.1.1.10 :: 3.1.1.20 :: 3.1.1.21 :: 3.1.1.22 :: 3.1.1.25,There are vulnerabilities in BIND that impact VIOS.,IJ25927 / CVE-2020-8616 / CVE-2020-8617,3.1.1.30,IJ25927s2a.200708.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc,bos.net.tcp.bind_utils:7.2.4.0-7.2.4.1,20200821, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar,CVE-2020-8616:8.6 / CVE-2020-8617:7.5,no sec,vios,2.2.6.40 :: 2.2.6.41 :: 2.2.6.50 :: 2.2.6.51 :: 2.2.6.60 :: 2.2.6.61 :: 2.2.6.65,There are vulnerabilities in BIND that impact VIOS.,IJ26021 / CVE-2020-8616 / CVE-2020-8617,n/a,IJ26021sDa.200708.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc,bos.net.tcp.client:6.1.9.0-6.1.9.404,20200821, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar,CVE-2020-8616:8.6 / CVE-2020-8617:7.5,no sec,aix,NTPv4,There are vulnerabilities in NTPv4 that affect AIX.,IJ26684 / CVE-2020-11868 / CVE-2020-13817 / CVE-2020-15025,See Advisory,IJ26684s9a.200806.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory13.asc,ntp.rte:7.4.2.8100-7.4.2.8130,20201026, ,,https://aix.software.ibm.com/aix/efixes/security/ntp_fix13.tar,CVE-2020-11868:5.9 / CVE-2020-13817:7.4 / CVE-2020-15025:4.4,no sec,aix,Perl,There are vulnerabilities in Perl that affect AIX.,IJ26985 / IJ26986 / CVE-2020-10543 / CVE-2020-10878 / CVE-2020-12723,See Bulletin,IJ26985s1a.200812.epkg.Z IJ26986s1a.200813.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/perl_advisory5.asc,perl.rte:5.20.1.0-5.20.1.3 perl.rte:5.28.1.0-5.28.1.3,20201209,20210304,n/a,https://aix.software.ibm.com/aix/efixes/security/perl_fix5.tar,CVE-2020-10543:9.8 / CVE-2020-10878:9.8 / CVE-2020-12723:9.8,no sec,aix,7200-05-00 :: 7200-05-01,IBM has released AIX iFixes in response to a vulnerability in IBM POWER9,IJ28226 / CVE-2020-4788,7200-05-02,IJ28226s1b.201117.epkg.Z IJ28226s1a.201117.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc,bos.mp64:7.2.5.0-7.2.5.1,20201119, ,,https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar,CVE-2020-4788:5.1,yes sec,vios,3.1.2.0 :: 3.1.2.10,IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9,IJ28226 / CVE-2020-4788,3.1.2.20,IJ28226s1b.201117.epkg.Z IJ28226s1a.201117.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc,bos.mp64:7.2.5.0-7.2.5.1,20201119, ,,https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar,CVE-2020-4788:5.1,yes sec,aix,7200-04-00 :: 7200-04-01 :: 7200-04-02,IBM has released AIX iFixes in response to a vulnerability in IBM POWER9,IJ28227 / CVE-2020-4788,7200-04-04,IJ28227s0a.200922.epkg.Z IJ28227s1a.200922.epkg.Z IJ28227s2a.200922.epkg.Z IJ28227s2b.200922.epkg.Z IJ28227s2c.200922.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc,bos.mp64:7.2.4.0-7.2.4.6,20201119, ,,https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar,CVE-2020-4788:5.1,yes sec,vios,3.1.1.0 :: 3.1.1.10 :: 3.1.1.21 :: 3.1.1.25,IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9,IJ28227 / CVE-2020-4788,3.1.1.40,IJ28227s0a.200922.epkg.Z IJ28227s1a.200922.epkg.Z IJ28227s2a.200922.epkg.Z IJ28227s2b.200922.epkg.Z IJ28227s2c.200922.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc,bos.mp64:7.2.4.0-7.2.4.6,20201119, ,,https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar,CVE-2020-4788:5.1,yes sec,aix,7200-03-03 :: 7200-03-04 :: 7200-03-05,IBM has released AIX iFixes in response to a vulnerability in IBM POWER9,IJ28228 / CVE-2020-4788,7200-03-07,IJ28228s3a.200921.epkg.Z IJ28228s4a.200921.epkg.Z IJ28228s5a.200921.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc,bos.mp64:7.2.3.0-7.2.3.19,20201119, ,,https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar,CVE-2020-4788:5.1,yes sec,vios,3.1.0.20 :: 3.1.0.30 :: 3.1.0.40,IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9,IJ28228 / CVE-2020-4788,3.1.0.60,IJ28228s3a.200921.epkg.Z IJ28228s4a.200921.epkg.Z IJ28228s5a.200921.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc,bos.mp64:7.2.3.0-7.2.3.19,20201119, ,,https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar,CVE-2020-4788:5.1,yes sec,aix,7100-05-05 :: 7100-05-06 :: 7100-05-07,IBM has released AIX iFixes in response to a vulnerability in IBM POWER9,IJ28229 / CVE-2020-4788,7100-05-08,IJ28229s5a.200921.epkg.Z IJ28229s5b.200922.epkg.Z IJ28229s6a.200921.epkg.Z IJ28229s6b.200922.epkg.Z IJ28229s6c.200922.epkg.Z IJ28229s7a.201117.epkg.Z IJ28229s7b.201117.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc,bos.mp64:7.1.5.0-7.1.5.40,20201119, ,,https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar,CVE-2020-4788:5.1,yes hiper,aix,7200-04-00 :: 7200-04-01 :: 7200-04-02-2016 :: 7200-04-02-2028,For Power9 Multiple issues seen while using NPIV adapters with VIOS,IJ28565,See Bulletin,,https://www.ibm.com/support/pages/node/6443731,devices.vdevice.IBM.vfc-client.rte:7.2.4.0-7.2.4.3,20210415, ,,https://www.ibm.com/support/pages/node/6404772, ,yes hiper,aix,7200-04-00 :: 7200-04-01 :: 7200-04-02-2015 :: 7200-04-02-2016 :: 7200-04-02-2027 :: 7200-04-02-2028,Possible data loss using zlibNX library,IJ28579,7.2 Exp 10/2020,IJ28579s0a.201006.epkg.Z,https://www.ibm.com/support/pages/apar/IJ28579,zlibNX.rte:7.2.4.0-7.2.4.2,20201009, ,,https://aix.software.ibm.com/aix/ifixes/ij28579/, ,no hiper,aix,7100-05-00 :: 7100-05-00-1731 :: 7100-05-01 :: 7100-05-02 :: 7100-05-02-1810 :: 7100-05-03 :: 7100-05-03-1838 :: 7100-05-03-1846 :: 7100-05-04 :: 7100-05-05 :: 7100-05-05-1939 :: 7100-05-06-2016 :: 7100-05-06-2028,For Power9 Multiple issues seen while using NPIV adapters with VIOS,IJ28592,See Bulletin,See Bulletin,https://www.ibm.com/support/pages/node/6443731,devices.vdevice.IBM.vfc-client.rte:7.1.5.0-7.1.5.36,20210415, ,,See Bulletin, ,yes hiper,aix,7200-03-00 :: 7200-03-01 :: 7200-03-02 :: 7200-03-03 :: 7200-03-04 :: 7200-03-05,For Power9 Multiple issues seen while using NPIV adapters with VIOS,IJ28596,See Bulletin,,https://www.ibm.com/support/pages/node/6443731,devices.vdevice.IBM.vfc-client.rte:7.2.3.0-7.2.3.18,20210415, ,,https://www.ibm.com/support/pages/node/6404772, ,yes sec,aix,7100-05-05 :: 7100-05-06 :: 7100-05-07,Vulnerability in gencore affects AIX,IJ28825 / CVE-2020-4887,7100-05-08,IJ28825m5a.201221.epkg.Z IJ28825m5b.201221.epkg.Z IJ28825m6a.201221.epkg.Z IJ28825m6b.201221.epkg.Z IJ28825m6c.201221.epkg.Z IJ28825m7a.201221.epkg.Z IJ28825m7b.201221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc,bos.mp64:7.1.5.0-7.1.5.40,20210119, ,,https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar,CVE-2020-4887:6.2,yes sec,aix,7200-03-03 :: 7200-03-04 :: 7200-03-05,Vulnerability in gencore affects AIX,IJ28826 / CVE-2020-4887,7200-03-07,IJ28826m3a.201221.epkg.Z IJ28826m4a.201221.epkg.Z IJ28826m5a.201221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc,bos.mp64:7.2.3.0-7.2.3.19,20210119, ,,https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar,CVE-2020-4887:6.2,yes sec,vios,3.1.0.20 :: 3.1.0.21 :: 3.1.0.30 :: 3.1.0.40,Vulnerability in gencore affects VIOS,IJ28826 / CVE-2020-4887,3.1.0.60,IJ28826m3a.201221.epkg.Z IJ28826m4a.201221.epkg.Z IJ28826m5a.201221.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc,bos.mp64:7.2.3.0-7.2.3.19,20210119, ,,https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar,CVE-2020-4887:6.2,yes sec,aix,7200-04-00 :: 7200-04-01 :: 7200-04-02 :: 7200-04-03,Vulnerability in gencore affects AIX,IJ28827 / CVE-2020-4887,7200-04-04,IJ28827m0a.201222.epkg.Z IJ28827m1a.201222.epkg.Z IJ28827m2a.201222.epkg.Z IJ28827m2b.201222.epkg.Z IJ28827m2c.201222.epkg.Z IJ28827m3a.210306.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc,bos.mp64:7.2.4.0-7.2.4.7,20210119,20210330,,https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar,CVE-2020-4887:6.2,yes sec,vios,3.1.1.0 :: 3.1.1.10 :: 3.1.1.20 :: 3.1.1.21 :: 3.1.1.22 :: 3.1.1.25 :: 3.1.1.30,Vulnerability in gencore affects VIOS,IJ28827 / CVE-2020-4887,3.1.1.40,IJ28827m0a.201222.epkg.Z IJ28827m1b.201222.epkg.Z IJ28827m2c.201222.epkg.Z IJ28827m2b.201222.epkg.Z IJ28827m2a.201222.epkg.Z IJ28827m3a.210306.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc,bos.mp64:7.2.4.0-7.2.4.7,20210119,20210330,,https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar,CVE-2020-4887:6.2,yes sec,aix,7200-05-00 :: 7200-05-01,Vulnerability in gencore affects AIX,IJ28828 / CVE-2020-4887,7200-05-02,IJ28828m1a.201222.epkg.Z IJ28828m1a.201222.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc,bos.mp64:7.2.5.0-7.2.5.1,20210119, ,,https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar,CVE-2020-4887:6.2,yes sec,vios,3.1.2.0 :: 3.1.2.10,Vulnerability in gencore affects VIOS,IJ28828 / CVE-2020-4887,3.1.2.20,IJ28828m1a.201222.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc,bos.mp64:7.2.5.0-7.2.5.1,20210119, ,,https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar,CVE-2020-4887:6.2,yes sec,aix,7200-03-03 :: 7200-03-04 :: 7200-03-05,There are vulnerabilities in BIND that impact AIX.,IJ29229 / CVE-2020-8622,7200-03-07,IJ29229m5a.201117.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc,bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16,20201218, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar,CVE-2020-8622:6.5,no sec,vios,3.1.0.20 :: 3.1.0.21 :: 3.1.0.30 :: 3.1.0.40,There are vulnerabilities in BIND that impact VIOS.,IJ29229 / CVE-2020-8622,3.1.0.60,IJ29229m5a.201117.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc,bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16,20201218, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar,CVE-2020-8622:6.5,no sec,aix,7100-05-05 :: 7100-05-06 :: 7100-05-07,There are vulnerabilities in BIND that impact AIX.,IJ29230 / CVE-2020-8622,7100-05-08,IJ29230m7a.201117.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc,bos.net.tcp.client:7.1.5.0-7.1.5.36,20201218, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar,CVE-2020-8622:6.5,no sec,aix,7200-04-00 :: 7200-04-01 :: 7200-04-02 :: 7200-04-03,There are vulnerabilities in BIND that impact AIX.,IJ29231 / CVE-2020-8622,7200-04-04,IJ29231m2a.201117.epkg.Z IJ29231s3a.210314.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc,bos.net.tcp.bind_utils:7.2.4.0-7.2.4.2,20201218,20210330,,https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar,CVE-2020-8622:6.5,no sec,vios,3.1.1.0 :: 3.1.1.10 :: 3.1.1.20 :: 3.1.1.21 :: 3.1.1.22 :: 3.1.1.25 :: 3.1.1.30,There are vulnerabilities in BIND that impact VIOS.,IJ29231 / CVE-2020-8622,3.1.1.40,IJ29231m2a.201117.epkg.Z IJ29231s3a.210314.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc,bos.net.tcp.bind_utils:7.2.4.0-7.2.4.2,20201218,20210330,,https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar,CVE-2020-8622:6.5,no sec,aix,7200-05-00 :: 7200-05-01,There are vulnerabilities in BIND that impact AIX.,IJ29232 / CVE-2020-8622,7200-05-02,IJ29232s1a.201117.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc,bos.net.tcp.bind_utils:7.2.5.0-7.2.5.1,20201218, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar,CVE-2020-8622:6.5,no sec,vios,3.1.2.0 :: 3.1.2.10,There are vulnerabilities in BIND that impact VIOS.,IJ29232 / CVE-2020-8622,3.1.2.20,IJ29232s1a.201117.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc,bos.net.tcp.bind_utils:7.2.5.0-7.2.5.1,20201218, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar,CVE-2020-8622:6.5,no hiper,aix,7100-05-07-2037,Users unable to login with LAM authentication,IJ29552,7100-05-08,IJ29552s7b.201209.AIX71TL05SP07.epkg.Z,https://www.ibm.com/support/pages/node/6409904,bos.rte.libc:7.1.5.35,20210129, ,,https://aix.software.ibm.com/aix/ifixes/ij29552/, ,yes hiper,aix,7200-05-00 :: 7200-05-01-2038,Users unable to login with LAM authentication,IJ29730,7200-05-02,IJ29730s1b.201209.AIX72TL05SP00-01.epkg.Z,https://www.ibm.com/support/pages/node/6409904,bos.rte.libc:7.2.5.0,20210129, ,,https://aix.software.ibm.com/aix/ifixes/ij29730/, ,yes hiper,vios,3.1.2.0 :: 3.1.2.10,TAPE BACKUP OR RESTORE MAY FAIL OR BE SLOW WITH VIOS 3.1.2,IJ30090,3.1.2.20,IJ30090s1a.201231.VIOS3.1.2.10.epkg.Z,https://www.ibm.com/support/pages/apar/IJ30090,devices.vdevice.IBM.vfc-server.rte:7.2.5.0-7.2.5.1,20210108, ,,https://aix.software.ibm.com/aix/ifixes/ij30090/, ,yes hiper,aix,7200-05-00 :: 7200-05-01,ksh failures on AIX 7.2 TL05,IJ30108,7200-05-02,IJ30108s1a.210205.AIX72TL05SP00-01.epkg.Z,https://www.ibm.com/support/pages/node/6412997,bos.rte.shell:7.2.5.0,20210206, ,,https://aix.software.ibm.com/aix/ifixes/ij30108/, ,yes sec,aix,7100-05-06 :: 7100-05-07,There is a vulnerability in the lpd daemon that affects AIX.,IJ30372 / CVE-2021-29693,7100-05-08,IJ30372s5a.210210.epkg.Z IJ30372s5a.210210.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc,bos.rte.printers:7.1.5.0-7.1.5.32,20210625, ,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar,CVE-2021-29693:4.9,no sec,aix,7200-05-00 :: 7200-05-01,There is a vulnerability in the lpd daemon that affects AIX.,IJ30447 / CVE-2021-29693,7200-05-02,IJ30447s1a.210210.epkg.Z IJ30447s1a.210210.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc,bos.rte.printers:7.2.5.0,20210625, ,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar,CVE-2021-29693:4.9,no sec,vios,3.1.2.0 :: 3.1.2.10,There is a vulnerability in the lpd daemon that affects VIOS.,IJ30447 / CVE-2021-29693,3.1.2.20,IJ30447s1a.210210.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc,bos.rte.printers:7.2.5.0,20210625, ,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar,CVE-2021-29693:4.9,no sec,aix,7200-05-00 :: 7200-05-01 :: 7200-05-02,There is a vulnerability in Korn Shell (ksh) that affects AIX,IJ30557 / CVE-2021-29741,7200-05-03,IJ30557s2a.210427.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc,bos.rte.shell:7.2.5.0-7.2.5.2,20210730, ,,https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar,CVE-2021-29741:8.4,no sec,vios,3.1.2.0 :: 3.1.2.10 :: 3.1.2.20 :: 3.1.2.21,There is a vulnerability in Korn Shell (ksh) that affects VIOS,IJ30557 / CVE-2021-29741,7200-05-03,IJ30557s2a.210427.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc,bos.rte.shell:7.2.5.0-7.2.5.2,20210730, ,,https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar,CVE-2021-29741:8.4,no sec,aix,7200-03-05 :: 7200-03-06,There is a vulnerability in the lpd daemon that affects AIX.,IJ30799 / CVE-2021-29693,7200-03-07,IJ30799s4a.210209.epkg.Z IJ30799s4a.210209.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc,bos.rte.printers:7.2.3.0-7.2.3.17,20210625, ,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar,CVE-2021-29693:4.9,no sec,vios,3.1.0.40 :: 3.1.0.50,There is a vulnerability in the lpd daemon that affects VIOS.,IJ30799 / CVE-2021-29693,3.1.0.60,IJ30799s4a.210209.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc,bos.rte.printers:7.2.3.0-7.2.3.17,20210625, ,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar,CVE-2021-29693:4.9,no sec,aix,7200-04-02 :: 7200-04-03,There is a vulnerability in the lpd daemon that affects AIX.,IJ30800 / CVE-2021-29693,7200-04-04,IJ30799s4a.210209.epkg.Z IJ30799s4a.210209.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc,bos.rte.printers:7.2.4.0,20210625, ,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar,CVE-2021-29693:4.9,no sec,vios,3.1.1.20 :: 3.1.1.21 :: 3.1.1.25 :: 3.1.1.30,There is a vulnerability in the lpd daemon that affects VIOS.,IJ30800 / CVE-2021-29693,3.1.1.40,IJ30800s1a.210210.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc,bos.rte.printers:7.2.4.0,20210625, ,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar,CVE-2021-29693:4.9,no hiper,aix,7200-05-00 :: 7200-05-01-2038,Multithreaded applications core dump or hang,IJ30808,7200-05-02,IJ30808s1a.210212.AIX72TL05SP00-01.epkg.Z,https://www.ibm.com/support/pages/node/6415421,bos.rte.libpthreads:7.2.5.0,20210213, ,,https://aix.software.ibm.com/aix/ifixes/ij30808/, ,yes hiper,aix,7200-05-00 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02-2113,plain2crypt or crypt2plain on an active logical volume can cause potential undetected data corruption,IJ30848,7200-05-02-2114,IJ30848s1a.210329.AIX72TL05SP01.epkg.Z IJ31743s2a.210406.AIX72TL05SP02.epkg.Z,https://www.ibm.com/support/pages/node/6441009,bos.hdcrypt:7.2.5.0-7.2.5.1,20210407, ,,https://aix.software.ibm.com/aix/ifixes/ij30848/, ,yes hiper,aix,7200-05-00 :: 7200-05-01-2038 :: 7200-05-01-2039,applications may fail unexpectedly with permission errors with setreuid,IJ31049,7200-05-02,IJ31049m1a.210308.AIX72TL05SP01.epkg.Z IJ31049s1a.210308.AIX72TL05SP01.epkg.Z,https://www.ibm.com/support/pages/node/6430903,bos.mp64:7.2.5.0-7.2.5.1,20210308, ,,https://aix.software.ibm.com/aix/ifixes/ij31049/, ,yes hiper,aix,7200-05-00 :: 7200-05-01-2038 :: 7200-05-01-2039,Multiple issues seen while using NPIV adapters with AIX,IJ31191,7200-05-03,IJ31604m1b.210322.AIX72TL05SP01.epkg.Z IJ31604s2a.210414.AIX72TL05SP02.epkg.Z,https://www.ibm.com/support/pages/node/6443731,devices.vdevice.IBM.vfc-client.rte:7.2.5.1-7.2.5.3,20210415, ,,https://aix.software.ibm.com/aix/ifixes/ij31191/, ,yes hiper,aix,7200-05-02-2113 :: 7200-05-02-2114,Multiple issues seen while using NPIV adapters with AIX,IJ31604,7200-05-03,IJ31604m1b.210322.AIX72TL05SP01.epkg.Z IJ31604s2a.210414.AIX72TL05SP02.epkg.Z,https://www.ibm.com/support/pages/node/6443731,devices.vdevice.IBM.vfc-client.rte:7.2.5.1-7.2.5.3,20210415, ,,https://aix.software.ibm.com/aix/ifixes/ij31191/, ,yes sec,aix,7100-05-06 :: 7100-05-07 :: 7100-05-08,There is a vulnerability in Korn Shell (ksh) that affects AIX,IJ31606 / CVE-2021-29741,7100-05-09,IJ31606s6a.210628.epkg.Z IJ31606s7a.210628.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc,bos.rte.shell:7.1.5.0-7.1.5.36,20210730, ,,https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar,CVE-2021-29741:8.4,no sec,aix,7200-04-02 :: 7200-04-03 :: 7200-04-04,There is a vulnerability in Korn Shell (ksh) that affects AIX,IJ31614 / CVE-2021-29741,7200-04-05,IJ31614s1a.210427.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc,bos.rte.shell:7.2.4.0-7.2.4.3,20210730, ,,https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar,CVE-2021-29741:8.4,no sec,vios,3.1.1.20 :: 3.1.1.21 :: 3.1.1.22 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40,There is a vulnerability in Korn Shell (ksh) that affects VIOS,IJ31614 / CVE-2021-29741,7200-04-05,IJ31614s1a.210427.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc,bos.rte.shell:7.2.4.0-7.2.4.3,20210730, ,,https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar,CVE-2021-29741:8.4,no hiper,vios,3.1.2.0 :: 3.1.2.10 :: 3.1.2.20 :: 3.1.2.21,For Power9 Multiple issues seen while using NPIV adapters with VIOS,IJ31936,3.1.2.30,IJ31936m1a.210409.VIOS3.1.2.10.epkg.Z IJ31936s2a.210414.VIOS3.1.2.21.epkg.Z,https://www.ibm.com/support/pages/node/6443731,devices.vdevice.IBM.vfc-server.rte:7.2.5.0-7.2.5.2,20210415, ,,https://aix.software.ibm.com/aix/ifixes/ij31936/, ,yes sec,aix,7200-03-05 :: 7200-03-06 :: 7200-03-07,There is a vulnerability in Korn Shell (ksh) that affects AIX,IJ32285 / CVE-2021-29741,See Bulletin,IJ32285s4a.210628.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc,bos.rte.shell:7.2.3.0-7.2.3.20,20210730, ,,https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar,CVE-2021-29741:8.4,no sec,vios,3.1.0.40 :: 3.1.0.50 :: 3.1.0.60,There is a vulnerability in Korn Shell (ksh) that affects VIOS,IJ32285 / CVE-2021-29741,See Bulletin,IJ32285s4a.210628.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc,bos.rte.shell:7.2.3.0-7.2.3.20,20210730, ,,https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar,CVE-2021-29741:8.4,no sec,aix,7200-03-05 :: 7200-03-06 :: 7200-03-07,There are multiple vulnerabilities in the AIX kernel,IJ32629 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862,See Bulletin,IJ32629m5a.210805.epkg.Z IJ32629m6a.210805.epkg.Z IJ32629s7a.210805.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc,bos.mp64:7.2.3.0-7.2.3.21,20210825, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar,CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2,yes sec,vios,3.1.0.40 :: 3.1.0.50 :: 3.1.0.60,There are multiple vulnerabilities in the AIX kernel for VIOS,IJ32629 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862,See Bulletin,IJ32629m5a.210805.epkg.Z IJ32629m6a.210805.epkg.Z IJ32629s7a.210805.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc,bos.mp64:7.2.3.0-7.2.3.21,20210825, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar,CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2,yes sec,aix,7200-04-02 :: 7200-04-03 :: 7200-04-04,There are multiple vulnerabilities in the AIX kernel,IJ32630 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862,7200-04-05,IJ32630m2e.210901.epkg.Z IJ32630m2f.210901.epkg.Z IJ32630m3b.210901.epkg.Z IJ32630s4a.210813.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc,bos.mp64:7.2.4.0-7.2.4.8,20210825, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar,CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2,yes sec,vios,3.1.1.21 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40,There are multiple vulnerabilities in the AIX kernel for VIOS,IJ32630 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862,3.1.1.50,IJ32630m2f.210901.epkg.Z IJ32630m2e.210901.epkg.Z IJ32630m3b.210901.epkg.Z IJ32630s4a.210813.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc,bos.mp64:7.2.4.0-7.2.4.8,20210825, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar,CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2,yes sec,aix,7200-05-01 :: 7200-05-02,There are multiple vulnerabilities in the AIX kernel,IJ32631 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862,7200-05-03,IJ32631m1a.210805.epkg.Z IJ32631s2a.210805.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc,bos.mp64:7.2.5.0-7.2.5.3,20210825, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar,CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2,yes sec,vios,3.1.2.10 :: 3.1.2.21,There are multiple vulnerabilities in the AIX kernel for VIOS,IJ32631 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862,3.1.2.30,IJ32631m1a.210805.epkg.Z IJ32631s2a.210805.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc,bos.mp64:7.2.5.0-7.2.5.3,20210825, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar,CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2,yes sec,vios,3.1.2.10 :: 3.1.2.21,Vulnerability in libc affects AIX,IJ32714 / CVE-2021-29860,3.1.2.30,IJ34081m1a.211112.epkg.Z IJ34081m2b.211112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc,bos.rte.libc:7.2.5.0-7.2.5.2,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ,CVE-2021-29860:6.2,yes sec,aix,7200-05-01 :: 7200-05-02,Vulnerability in libc affects AIX,IJ32736 / IJ34081 / CVE-2021-29860,7.2.5.03-2135,IJ34081m1a.211112.epkg.Z IJ34081m2b.211112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc,bos.rte.libc:7.2.5.0-7.2.5.2,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ,CVE-2021-29860:6.2,yes sec,aix,7100-05-06 :: 7100-05-07 :: 7100-05-08,There is a vulnerability in the AIX trace facility.,IJ32940 / CVE-2021-29706,7100-05-09,IJ32940m6a.210615.epkg.Z IJ32940m6b.210615.epkg.Z IJ32940m7a.210615.epkg.Z IJ32940m7b.210615.epkg.Z IJ32940s8a.210615.epkg.Z IJ32940s8b.210615.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/trace_advisory.asc,bos.mp64:7.1.5.0-7.1.5.42,20210615, ,,https://aix.software.ibm.com/aix/efixes/security/trace_fix.tar,CVE-2021-29706:6.8,yes sec,aix,7100-05-06 :: 7100-05-07 :: 7100-05-08,There is a vulnerability in BIND that affects AIX.,IJ33276 / CVE-2021-25215,7100-05-09,IJ33276s8a.210622.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc,bos.net.tcp.server:7.1.5.0-7.1.5.34,20210729, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar,CVE-2021-25215:7.5,no sec,aix,7200-03-05 :: 7200-03-06 :: 7200-03-07,There is a vulnerability in BIND that affects AIX.,IJ33277 / CVE-2021-25215,See Bulletin,IJ33277s7a.210622.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc,bos.net.tcp.bind:7.2.3.0-7.2.3.15,20210729, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar,CVE-2021-25215:7.5,no sec,vios,3.1.0.40 :: 3.1.0.50 :: 3.1.0.60,There is a vulnerability in BIND that affects VIOS.,IJ33277 / CVE-2021-25215,See Bulletin,IJ33277s7a.210622.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc,bos.net.tcp.bind:7.2.3.0-7.2.3.15,20210729, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar,CVE-2021-25215:7.5,no sec,aix,7200-04-02 :: 7200-04-03 :: 7200-04-04,There is a vulnerability in BIND that affects AIX.,IJ33278 / CVE-2021-25215,7200-04-05,IJ33278s4a.210622.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc,bos.net.tcp.bind:7.2.4.0,20210729, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar,CVE-2021-25215:7.5,no sec,vios,3.1.1.20 :: 3.1.1.21 :: 3.1.1.22 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40,There is a vulnerability in BIND that affects VIOS.,IJ33278 / CVE-2021-25215,3.1.1.50,IJ33278s4a.210622.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc,bos.net.tcp.bind:7.2.4.0,20210729, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar,CVE-2021-25215:7.5,no sec,aix,7200-05-00 :: 7200-05-01 :: 7200-05-02,There is a vulnerability in BIND that affects AIX.,IJ33279 / CVE-2021-25215,7200-05-03,IJ33279s2a.210621.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc,bos.net.tcp.bind:7.2.5.0-7.2.5.1,20210729, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar,CVE-2021-25215:7.5,no sec,vios,3.1.2.0 :: 3.1.2.10 :: 3.1.2.20 :: 3.1.2.21,There is a vulnerability in BIND that affects VIOS.,IJ33279 / CVE-2021-25215,3.1.2.30,IJ33279s2a.210621.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc,bos.net.tcp.bind:7.2.5.0-7.2.5.1,20210729, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar,CVE-2021-25215:7.5,no sec,aix,7100-05-06 :: 7100-05-07 :: 7100-05-08,There are multiple vulnerabilities in the AIX kernel,IJ33318 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862,7100-05-09,IJ33318m6a.210816.epkg.Z IJ33318m7a.210813.epkg.Z IJ33318m8a.210813.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc,bos.mp64:7.1.5.0-7.1.5.42,20210825,20210901,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar,CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2,yes sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11,Vulnerability in libc affects AIX,IJ33560 / IJ35673 / CVE-2021-29860,7100-05-12,IJ33560m7b.211112.epkg.Z IJ33560m8b.211112.epkg.Z IJ35673s9a.211115.epkg.Z IJ35673sAa.221206.epkg.Z IJ35673sBa.230314.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc,bos.rte.libc:7.1.5.0-7.1.5.39,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ,CVE-2021-29860:6.2,yes hiper,aix,7200-04-00 :: 7200-04-01 :: 7200-04-02-2016 :: 7200-04-02-2028 :: 7200-04-03 :: 7200-04-04-2114,Applications can terminate on systems with active IPv6 traffic,IJ34301,See Bulletin,IJ34301s1a.210808.AIX72TL04SP00-01.epkg.Z IJ34301s2a.210807.AIX72TL04SP02.epkg.Z IJ34301s3a.210809.AIX72TL04SP03.epkg.Z IJ34301s4a.210811.AIX72TL04SP04.epkg.Z,https://www.ibm.com/support/pages/node/6480733,bos.net.tcp.client_core:7.2.4.0-7.2.4.3,20210819, ,,https://aix.software.ibm.com/aix/ifixes/ij34301/, ,yes hiper,aix,7200-03-00 :: 7200-03-01 :: 7200-03-02 :: 7200-03-03 :: 7200-03-04 :: 7200-03-05 :: 7200-03-06 :: 7200-03-07 :: 7200-03-07-2114,Applications can terminate on systems with active IPv6 traffic,IJ34340,See Bulletin,IJ34340s3a.210810.AIX72TL03SP03.epkg.Z IJ34340s7a.210811.AIX72TL03SP07.epkg.Z,https://www.ibm.com/support/pages/node/6480733,bos.net.tcp.client_core:7.2.3.0-7.2.3.21,20210819, ,,https://aix.software.ibm.com/aix/ifixes/ij34340/, ,yes hiper,aix,7100-05-00 :: 7100-05-00-1731 :: 7100-05-01 :: 7100-05-02 :: 7100-05-02-1810 :: 7100-05-03 :: 7100-05-03-1838 :: 7100-05-03-1846 :: 7100-05-04 :: 7100-05-05 :: 7100-05-05-1939 :: 7100-05-06-2016 :: 7100-05-06-2028 :: 7100-05-07 :: 7100-05-08,Applications can terminate on systems with active IPv6 traffic,IJ34375,7100-05-09-2136,IJ34375s8a.210813.AIX71TL05SP08.epkg.Z,https://www.ibm.com/support/pages/node/6480733,bos.net.tcp.client:7.1.5.0-7.1.5.37,20210819, ,,https://aix.software.ibm.com/aix/ifixes/ij34375/, ,yes hiper,aix,7200-05-00 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114,Applications can terminate on systems with active IPv6 traffic,IJ34376,7200-05-03-2136,IJ34376s2a.210813.AIX72TL05SP02-2114.epkg.Z,https://www.ibm.com/support/pages/node/6480733,bos.net.tcp.client_core:7.2.5.0-7.2.5.4,20210819, ,,https://aix.software.ibm.com/aix/ifixes/ij34376/, ,yes sec,aix,7200-04-02 :: 7200-04-03 :: 7200-04-04,Vulnerability in libc affects AIX,IJ34512 / IJ35675 / CVE-2021-29860,7200-04-05,IJ34512m2a.211112.epkg.Z IJ34512m3a.211112.epkg.Z IJ34512m4a.211112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc,bos.rte.libc:7.2.4.0-7.2.4.3,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ,CVE-2021-29860:6.2,yes sec,vios,3.1.3.10,Vulnerability in EFS affects AIX,IJ35078 / CVE-2021-29861,3.1.3.14,IJ35078s3a.211026.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc,bos.rte.security:7.2.5.100-7.2.5.100,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ,CVE-2021-29861:6.2,yes sec,aix,7200-05-01 :: 7200-05-02 :: 7200-05-03,Vulnerability in EFS affects AIX,IJ35078 / IJ35211 / CVE-2021-29861,7.2.5.03-2147,IJ35078s3a.211026.epkg.Z IJ35211m1a.211110.epkg.Z IJ35211m2a.211103.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc,bos.rte.security:7.2.5.0-7.2.5.1 bos.rte.security:7.2.5.100-7.2.5.100,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ,CVE-2021-29861:6.2,yes hiper,aix,7200-05-00 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2147 :: 7200-05-03-2148,Encrypted logical volumes unable to mount,IJ35178,7200-05-04-2219,IJ35178m3b.211209.AIX72TL05SP03-2136.epkg.Z,https://www.ibm.com/support/pages/node/6494777,bos.hdcrypt:7.2.5.0-7.2.5.102,20211111, ,,https://aix.software.ibm.com/aix/ifixes/ij35178/, ,yes sec,vios,3.1.2.10 :: 3.1.2.21,Vulnerability in EFS affects AIX,IJ35211 / CVE-2021-29861,3.1.2.30,IJ35211m1a.211110.epkg.Z IJ35211m2a.211103.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc,bos.rte.security:7.2.5.0-7.2.5.1,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ,CVE-2021-29861:6.2,yes sec,vios,3.1.1.21 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40,Vulnerability in EFS affects AIX,IJ35226 / CVE-2021-29861,3.1.1.50,IJ35226m2a.211103.epkg.Z IJ35226m3a.211103.epkg.Z IJ35226m4a.211103.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc,bos.rte.security:7.2.4.0-7.2.4.3,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ,CVE-2021-29861:6.2,yes sec,aix,7200-04-02 :: 7200-04-03 :: 7200-04-04,Vulnerability in EFS affects AIX,IJ35226 / CVE-2021-29861,7200-04-05,IJ35226m2a.211103.epkg.Z IJ35226m3a.211103.epkg.Z IJ35226m4a.211103.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc,bos.rte.security:7.2.4.0-7.2.4.3,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ,CVE-2021-29861:6.2,yes sec,vios,3.1.0.40 :: 3.1.0.50 :: 3.1.0.60,Vulnerability in EFS affects AIX,IJ35505 / CVE-2021-29861,See Bulletin,IJ35505m5a.211103.epkg.Z IJ35505m6a.211103.epkg.Z IJ35505m7a.211103.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc,,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ,CVE-2021-29861:6.2,yes hiper,aix,7100-05-09-2135 :: 7100-05-09-2136,Etherchannel failure with CAA and LACP,IJ35577,7100-05-09-2148,IJ35577s9a.211015.AIX71TL05SP09-213x.epkg.Z,https://www.ibm.com/support/pages/node/6507119,bos.cluster.rte:7.1.5.37,20211022, ,,https://aix.software.ibm.com/aix/ifixes/ij35577/, ,yes hiper,aix,7200-05-03-2135 :: 7200-05-03-2136,Etherchannel failure with CAA and LACP,IJ35588,7200-05-03-2147,IJ35588s3a.211015.AIX72TL05SP03-213x.epkg.Z,https://www.ibm.com/support/pages/node/6507119,bos.cluster.rte:7.2.5.100,20211022, ,,https://aix.software.ibm.com/aix/ifixes/ij35588/, ,yes hiper,vios,3.1.3.0 :: 3.1.3.10,Etherchannel failure with CAA and LACP on VIOS,IJ35588,3.1.3.13,IJ35588s3a.211015.VIOS3.1.3.0.epkg.Z IJ35588s3a.211015.VIOS3.1.3.10.epkg.Z,https://www.ibm.com/support/pages/node/6507119,bos.cluster.rte:7.2.5.100,20211022, ,,https://aix.software.ibm.com/aix/ifixes/ij35588/, ,yes sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09-2136,There is a vulnerability in the mount command that affects AIX.,IJ35620 / CVE-2021-38990,7100-05-09-2148,IJ35620s9a.211130.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc,bos.rte.filesystem:7.1.5.0-7.1.5.36,20220106, ,,https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar,CVE-2021-38990:8.4,no sec,aix,7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136,There is a vulnerability in the mount command that affects AIX.,IJ35623 / IJ36125 / CVE-2021-38990,7200-05-03-2147,IJ36125s2a.211130.epkg.Z IJ35623s3a.211130.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc,bos.rte.filesystem:7.2.5.0-7.2.5.1 bos.rte.filesystem:7.2.5.100,20220106, ,,https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar,CVE-2021-38990:8.4,no sec,vios,3.1.3.10,There is a vulnerability in the mount command that affects VIOS.,IJ35623 / CVE-2021-38990,3.1.3.13,IJ35623s3a.211130.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc,bos.rte.filesystem:7.2.5.100,20220106, ,,https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar,CVE-2021-38990:8.4,no sec,vios,3.1.0.40 :: 3.1.0.50 :: 3.1.0.60,Vulnerability in libc affects AIX,IJ35674 / CVE-2021-29860,See Bulletin,IJ35681m5a.211112.epkg.Z IJ35681m6a.211112.epkg.Z IJ35681m7a.211112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc,,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ,CVE-2021-29860:6.2,yes sec,vios,3.1.1.21 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40,Vulnerability in libc affects AIX,IJ35675 / CVE-2021-29860,3.1.1.50,IJ34512m2a.211112.epkg.Z IJ34512m3a.211112.epkg.Z IJ34512m4a.211112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc,bos.rte.libc:7.2.4.0-7.2.4.3,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ,CVE-2021-29860:6.2,yes sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11,Vulnerability in EFS affects AIX,IJ35780 / CVE-2021-29861,7100-05-12,IJ35780m7a.211103.epkg.Z IJ35780m8a.211103.epkg.Z IJ35780m9a.211103.epkg.Z IJ35780mBa.230314.epkg.Z IJ35780sAa.221206.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc,bos.rte.security:7.1.5.0-7.1.5.39,20211116,20230317,,https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ,CVE-2021-29861:6.2,yes sec,aix,7200-04-02 :: 7200-04-02-2016 :: 7200-04-02-2028 :: 7200-04-03 :: 7200-04-04,There is a vulnerability in the mount command that affects AIX.,IJ35826 / CVE-2021-38990,7200-04-05,IJ35826s2a.211130.epkg.Z IJ35826s4a.211130.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc,bos.rte.filesystem:7.2.4.0-7.2.4.2,20220106, ,,https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar,CVE-2021-38990:8.4,no sec,vios,3.1.1.21 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40,There is a vulnerability in the mount command that affects VIOS.,IJ35826 / CVE-2021-38990,3.1.1.50,IJ35826s2a.211130.epkg.Z IJ35826s4a.211130.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc,bos.rte.filesystem:7.2.4.0-7.2.4.2,20220106, ,,https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar,CVE-2021-38990:8.4,no sec,vios,3.1.2.10 :: 3.1.2.21,There is a vulnerability in the mount command that affects VIOS.,IJ36125 / CVE-2021-38990,3.1.2.30,IJ36125s2a.211130.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc,bos.rte.filesystem:7.2.5.0-7.2.5.1,20220106, ,,https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar,CVE-2021-38990:8.4,no sec,aix,7300-00-01,There is a vulnerability in the AIX nimsh daemon.,IJ36593 / CVE-2022-22351,7300-00-02,DEPRECATED::IJ36593s1a.220208.epkg.Z IJ36593m1a.220324.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc,bos.sysmgt.nim.client:7.3.0.0,20220304,20220324,,https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar,CVE-2022-22351:6.1,no sec,aix,7300-00-01,Vulnerabilities in AIX CAA,IJ36596 / CVE-2022-22350 / CVE-2021-38996,7300-00-02,IJ36596s1a.220228.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc,bos.cluster.rte:7.3.0.0-7.3.0.0,20220301, ,,https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar,CVE-2022-22350:6.2 / CVE-2021-38996:6.2,yes sec,vios,3.1.2.10 :: 3.1.2.21,There is a vulnerability in the AIX nimsh daemon for VIOS.,IJ36681 / IJ37706 / CVE-2022-22351,3.1.2.40,DEPRECATED::IJ37706s2a.220208.epkg.Z IJ37706m2a.220324.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc,bos.sysmgt.nim.client:7.2.5.0-7.2.5.1 bos.sysmgt.nim.client:7.2.5.100,20220304,20220324,,https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar,CVE-2022-22351:6.1,no sec,vios,3.1.3.10 :: 3.1.3.14,There is a vulnerability in the AIX nimsh daemon for VIOS.,IJ36681 / IJ37706 / CVE-2022-22351,3.1.3.20,DEPRECATED::IJ36681s3a.220208.epkg.Z IJ36681m3a.220324.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc,bos.sysmgt.nim.client:7.2.5.0-7.2.5.1 bos.sysmgt.nim.client:7.2.5.100,20220304,20220324,,https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar,CVE-2022-22351:6.1,no sec,aix,7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148,There is a vulnerability in the AIX nimsh daemon.,IJ36681 / IJ37706 / CVE-2022-22351,7200-05-04,DEPRECATED::IJ37706s2a.220208.epkg.Z DEPRECATED::IJ36681s3a.220208.epkg.Z IJ37706m2a.220324.epkg.Z IJ36681m3a.220324.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc,bos.sysmgt.nim.client:7.2.5.0-7.2.5.1 bos.sysmgt.nim.client:7.2.5.100,20220304,20220324,,https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar,CVE-2022-22351:6.1,no sec,vios,3.1.2.10 :: 3.1.2.21,Vulnerabilities in AIX CAA,IJ36682 / IJ37512 / IJ35657 / CVE-2022-22350 / CVE-2021-38996,3.1.2.40,IJ37512s1a.220228.epkg.Z IJ37512s2a.220228.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc,bos.cluster.rte:7.2.5.0-7.2.5.1,20220301, ,,https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar,CVE-2022-22350:6.2 / CVE-2021-38996:6.2,yes sec,vios,3.1.3.10 :: 3.1.3.14,Vulnerabilities in AIX CAA,IJ36682 / IJ37512 / IJ35657 / CVE-2022-22350 / CVE-2021-38996,3.1.3.20,IJ36682s3a.220228.epkg.Z IJ36682s3b.220228.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc,bos.cluster.rte:7.2.5.100-7.2.5.101,20220301, ,,https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar,CVE-2022-22350:6.2 / CVE-2021-38996:6.2,yes sec,aix,7200-05-01 :: 7200-05-02 :: 7200-05-03,Vulnerabilities in AIX CAA,IJ36682 / IJ37512 / IJ35657 / CVE-2022-22350 / CVE-2021-38996,7200-05-04,IJ36682s3a.220228.epkg.Z IJ36682s3b.220228.epkg.Z IJ37512s1a.220228.epkg.Z IJ37512s2a.220228.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc,bos.cluster.rte:7.2.5.0-7.2.5.1 bos.cluster.rte:7.2.5.100-7.2.5.101,20220301, ,,https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar,CVE-2022-22350:6.2 / CVE-2021-38996:6.2,yes sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148,There is a vulnerability in the lscore command that affects AIX.,IJ36805 / CVE-2021-38991,7100-05-10,IJ36805s9a.211217.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc,bos.rte.security:7.1.5.0-7.1.5.37,20220110, ,,https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar,CVE-2021-38991:8.4,no sec,aix,7200-04-02 :: 7200-04-02-2016 :: 7200-04-02-2028 :: 7200-04-03 :: 7200-04-04,There is a vulnerability in the lscore command that affects AIX.,IJ36806 / CVE-2021-38991,7200-04-06,IJ36806s2a.211217.epkg.Z IJ36806s4a.211217.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc,bos.rte.security:7.2.4.0-7.2.4.3,20220110, ,,https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar,CVE-2021-38991:8.4,no sec,vios,3.1.1.21 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40,There is a vulnerability in the lscore command that affects VIOS.,IJ36806 / CVE-2021-38991,3.1.1.60,IJ36806s2a.211217.epkg.Z IJ36806s4a.211217.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc,bos.rte.security:7.2.4.0-7.2.4.3,20220110, ,,https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar,CVE-2021-38991:8.4,no sec,aix,7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136,There is a vulnerability in the lscore command that affects AIX.,IJ36810 / IJ36815 / CVE-2021-38991,7200-05-04,IJ36815s2a.211217.epkg.Z IJ36810s3a.211217.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc,bos.rte.security:7.2.5.0-7.2.5.1 bos.rte.security:7.2.5.100-7.2.5.101,20220110, ,,https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar,CVE-2021-38991:8.4,no sec,vios,3.1.3.10 :: 3.1.3.14,There is a vulnerability in the lscore command that affects VIOS.,IJ36810 / CVE-2021-38991,3.1.3.20,IJ36810s3a.211217.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc,bos.rte.security:7.2.5.100-7.2.5.101,20220110, ,,https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar,CVE-2021-38991:8.4,no sec,vios,3.1.2.10 :: 3.1.2.21,There is a vulnerability in the lscore command that affects VIOS.,IJ36815 / CVE-2021-38991,3.1.2.40,IJ36815s2a.211217.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc,bos.rte.security:7.2.5.0-7.2.5.1,20220110, ,,https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar,CVE-2021-38991:8.4,no sec,aix,7300-00-01,There is a vulnerability in the lscore command that affects AIX.,IJ36816 / CVE-2021-38991,7300-00-02,IJ36816s1a.211217.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc,bos.rte.security:7.3.0.0,20220110, ,,https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar,CVE-2021-38991:8.4,no sec,aix,7300-00-01,Vulnerabilities in the AIX kernel,IJ37001 / CVE-2021-38994 / CVE-2021-38995,7300-00-02,IJ37001m1a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc,bos.mp64:7.3.0.0-7.3.0.1,20220223, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar,CVE-2021-38994:6.2 / CVE-2021-38995:6.2,yes sec,vios,3.1.2.10 :: 3.1.2.21,Vulnerabilities in the AIX kernel,IJ37012 /IJ37776 / IJ37053 / CVE-2021-38994 / CVE-2021-38995,3.1.2.40,IJ37776m1a.220215.epkg.Z IJ37776m2a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc,bos.mp64:7.2.5.0-7.2.5.3,20220223, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar,CVE-2021-38994:6.2 / CVE-2021-38995:6.2,yes sec,vios,3.1.3.10 :: 3.1.3.14,Vulnerabilities in the AIX kernel,IJ37012 /IJ37776 / IJ37053 / CVE-2021-38994 / CVE-2021-38995,3.1.3.20,IJ37012m3a.220215.epkg.Z IJ37012m3b.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc,bos.mp64:7.2.5.100-7.2.5.103,20220223, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar,CVE-2021-38994:6.2 / CVE-2021-38995:6.2,yes sec,aix,7200-05-01 :: 7200-05-02 :: 7200-05-03,Vulnerabilities in the AIX kernel,IJ37012 / IJ37776 / IJ37053 / CVE-2021-38994 / CVE-2021-38995,7200-05-04,IJ37012m3a.220215.epkg.Z IJ37012m3b.220215.epkg.Z IJ37776m1a.220215.epkg.Z IJ37776m2a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc,bos.mp64:7.2.5.0-7.2.5.3 bos.mp64:7.2.5.100-7.2.5.103,20220223, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar,CVE-2021-38994:6.2 / CVE-2021-38995:6.2,yes sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148,There is a vulnerability in BIND that affects AIX.,IJ37222 / CVE-2021-25219,7100-05-10,DEPRECATED::IJ37222s9a.220120.epkg.Z IJ37222m9c.220315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc,bos.net.tcp.server:7.1.5.0-7.1.5.35 bos.net.tcp.client:7.1.5.0-7.1.5.40,20220301,20220316,,https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar,CVE-2021-25219:5.3,no sec,vios,3.1.2.10 :: 3.1.2.21,There is a vulnerability in BIND that affects AIX for VIOS.,IJ37223 / IJ37224 / IJ37325 / CVE-2021-25219,3.1.2.40,DEPRECATED::IJ37224s3a.220120.epkg.Z IJ37224m3c.220315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc,bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100 bos.net.tcp.bind_utils:7.2.5.100,20220301,20220316,,https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar,CVE-2021-25219:5.3,no sec,vios,3.1.3.10 :: 3.1.3.14,There is a vulnerability in BIND that affects AIX for VIOS.,IJ37223 / IJ37224 / IJ37325 / CVE-2021-25219,3.1.2.40,DEPRECATED::IJ37224s3a.220120.epkg.Z IJ37224m3c.220315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc,bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100 bos.net.tcp.bind_utils:7.2.5.100,20220301,20220316,,https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar,CVE-2021-25219:5.3,no sec,aix,7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148,There is a vulnerability in BIND that affects AIX.,IJ37223 / IJ37224 / IJ37325 / CVE-2021-25219,7200-05-04,DEPRECATED::IJ37224s3a.220120.epkg.Z IJ37224m3c.220315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc,bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100 bos.net.tcp.bind_utils:7.2.5.100,20220301,20220316,,https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar,CVE-2021-25219:5.3,no sec,vios,3.1.1.30 :: 3.1.1.40 :: 3.1.1.50,There is a vulnerability in BIND that affects AIX for VIOS.,IJ37225 / CVE-2021-25219,3.1.1.60,DEPRECATED::IJ37225s5a.220223.epkg.Z IJ37225m5c.220315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc,bos.net.tcp.bind:7.2.4.0-7.2.4.1 bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3,20220301,20220316,,https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar,CVE-2021-25219:5.3,no sec,aix,7200-04-03 :: 7200-04-04 :: 7200-04-05,There is a vulnerability in BIND that affects AIX.,IJ37225 / CVE-2021-25219,7200-04-06,DEPRECATED::IJ37225s5a.220223.epkg.Z IJ37225m5c.220315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc,bos.net.tcp.bind:7.2.4.0-7.2.4.1 bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3,20220301,20220316,,https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar,CVE-2021-25219:5.3,no sec,aix,7300-00-01,There is a vulnerability in BIND that affects AIX.,IJ37226 / CVE-2021-25219,7300-00-02,DEPRECATED::IJ37226s1a.220120.epkg.Z IJ37226s1b.220315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc,bos.net.tcp.bind:7.3.0.0 bos.net.tcp.bind:7.3.0.0,20220301,20220316,,https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar,CVE-2021-25219:5.3,no sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09,Vulnerabilities in AIX CAA,IJ37355 / CVE-2022-22350 / CVE-2021-38996,7100-05-10,IJ37355s7a.220228.epkg.Z IJ37355s8a.220228.epkg.Z IJ37355s9a.220228.epkg.Z IJ37355s9b.220228.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc,bos.cluster.rte:7.1.5.0-7.1.5.38,20220301, ,,https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar,CVE-2022-22350:6.2 / CVE-2021-38996:6.2,yes sec,aix,7300-00-01,There is a vulnerability in the AIX pfcdd kernel extension.,IJ37403 / CVE-2021-38988,7300-00-02,IJ37504s5a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc,bos.pfcdd.rte:7.3.0.0,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar,CVE-2021-38988:6.2,yes sec,aix,7300-00-01,There is a vulnerability in the AIX pmsvcs kernel extension.,IJ37411 / CVE-2021-38989,7300-00-02,IJ37411s1a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc,bos.pmapi.pmsvcs:7.3.0.0,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar,CVE-2021-38989:6.2,yes sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148,There is a vulnerability in the AIX nimsh daemon.,IJ37419 / CVE-2022-22351,7100-05-10,DEPRECATED::IJ37419s9a.220208.epkg.Z IJ37419m9a.220324.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc,bos.sysmgt.nim.client:7.1.5.0-7.1.5.37,20220304,20220324,,https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar,CVE-2022-22351:6.1,no sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09,Vulnerabilities in the AIX kernel,IJ37452 / CVE-2021-38994 / CVE-2021-38995,7100-05-10,IJ37452m7a.220215.epkg.Z IJ37452m8a.220215.epkg.Z IJ37452s9a.220215.epkg.Z IJ37452s9b.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc,bos.mp64:7.1.5.0-7.1.5.45,20220223, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar,CVE-2021-38994:6.2 / CVE-2021-38995:6.2,yes sec,vios,3.1.2.10 :: 3.1.2.21,There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.,IJ37488 / IJ37778 / CVE-2021-38989,3.1.2.40,IJ37778s1a.220215.epkg.Z IJ37778s2a.220215.epkg.Z IJ37488s3a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc,bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1 bos.pmapi.pmsvcs:7.2.5.100,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar,CVE-2021-38989:6.2,yes sec,vios,3.1.3.10 :: 3.1.3.14,There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.,IJ37488 / IJ37778 / CVE-2021-38989,3.1.3.20,IJ37778s1a.220215.epkg.Z IJ37778s2a.220215.epkg.Z IJ37488s3a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc,bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1 bos.pmapi.pmsvcs:7.2.5.100,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar,CVE-2021-38989:6.2,yes sec,aix,7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148,There is a vulnerability in the AIX pmsvcs kernel extension.,IJ37488 / IJ37778 / CVE-2021-38989,7200-05-04,IJ37778s1a.220215.epkg.Z IJ37778s2a.220215.epkg.Z IJ37488s3a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc,bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1 bos.pmapi.pmsvcs:7.2.5.100,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar,CVE-2021-38989:6.2,yes sec,vios,3.1.3.10 :: 3.1.3.14,There is a vulnerability in the AIX pfcdd kernel extension for VIOS.,IJ37494 / IJ37779 / CVE-2021-38988,3.1.3.20,IJ37494s3a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc,bos.pfcdd.rte:7.2.5.0,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar,CVE-2021-38988:6.2,yes sec,aix,7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148,There is a vulnerability in the AIX pfcdd kernel extension.,IJ37494 / IJ37779 / CVE-2021-38988,7200-05-04,IJ37494s3a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc,bos.pfcdd.rte:7.2.5.0,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar,CVE-2021-38988:6.2,yes sec,vios,3.1.1.30 :: 3.1.1.40 :: 3.1.1.50,Vulnerabilities in AIX CAA,IJ37496 / CVE-2022-22350 / CVE-2021-38996,3.1.1.60,IJ37496s3a.220228.epkg.Z IJ37496s4a.220228.epkg.Z IJ37496s5a.220228.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc,bos.cluster.rte:7.2.4.0-7.2.4.4,20220301, ,,https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar,CVE-2022-22350:6.2 / CVE-2021-38996:6.2,yes sec,aix,7200-04-03 :: 7200-04-04 :: 7200-04-05,Vulnerabilities in AIX CAA,IJ37496 / CVE-2022-22350 / CVE-2021-38996,7200-04-06,IJ37496s3a.220228.epkg.Z IJ37496s4a.220228.epkg.Z IJ37496s5a.220228.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc,bos.cluster.rte:7.2.4.0-7.2.4.4,20220301, ,,https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar,CVE-2022-22350:6.2 / CVE-2021-38996:6.2,yes sec,vios,3.1.1.30 :: 3.1.1.40 :: 3.1.1.50,Vulnerabilities in the AIX kernel,IJ37501 / CVE-2021-38994 / CVE-2021-38995,3.1.1.60,IJ37501m3a.220215.epkg.Z IJ37501m4a.220215.epkg.Z IJ37501m5a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc,bos.mp64:7.2.4.0-7.2.4.9,20220223, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar,CVE-2021-38994:6.2 / CVE-2021-38995:6.2,yes sec,aix,7200-04-03 :: 7200-04-04 :: 7200-04-05,Vulnerabilities in the AIX kernel,IJ37501 / CVE-2021-38994 / CVE-2021-38995,7200-04-06,IJ37501m3a.220215.epkg.Z IJ37501m4a.220215.epkg.Z IJ37501m5a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc,bos.mp64:7.2.4.0-7.2.4.9,20220223, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar,CVE-2021-38994:6.2 / CVE-2021-38995:6.2,yes sec,vios,3.1.1.30 :: 3.1.1.40 :: 3.1.1.50,There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.,IJ37503 / CVE-2021-38989,3.1.1.60,IJ37503s3a.220215.epkg.Z IJ37503s4a.220215.epkg.Z IJ37503s5a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc,bos.pmapi.pmsvcs:7.2.4.0-7.2.4.4,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar,CVE-2021-38989:6.2,yes sec,aix,7200-04-03 :: 7200-04-04 :: 7200-04-05,There is a vulnerability in the AIX pmsvcs kernel extension.,IJ37503 / CVE-2021-38989,7200-04-06,IJ37503s3a.220215.epkg.Z IJ37503s4a.220215.epkg.Z IJ37503s5a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc,bos.pmapi.pmsvcs:7.2.4.0-7.2.4.4,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar,CVE-2021-38989:6.2,yes sec,vios,3.1.1.30 :: 3.1.1.40 :: 3.1.1.50,There is a vulnerability in the AIX pfcdd kernel extension for VIOS.,IJ37504 / CVE-2021-38988,3.1.1.60,IJ37504s5a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc,bos.pfcdd.rte:7.2.4.0,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar,CVE-2021-38988:6.2,yes sec,aix,7200-04-03 :: 7200-04-04 :: 7200-04-05,There is a vulnerability in the AIX pfcdd kernel extension.,IJ37504 / CVE-2021-38988,7200-04-06,IJ37504s5a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc,bos.pfcdd.rte:7.2.4.0,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar,CVE-2021-38988:6.2,yes sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148,There is a vulnerability in the AIX pmsvcs kernel extension.,IJ37507 / CVE-2021-38989,7100-05-10,IJ37507s7a.220215.epkg.Z IJ37507s9a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc,bos.pmapi.pmsvcs:7.1.5.0-7.1.5.36,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar,CVE-2021-38989:6.2,yes sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148,There is a vulnerability in the AIX pfcdd kernel extension.,IJ37508 / CVE-2021-38988,7100-05-10,IJ37508s9a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc,bos.pfcdd.rte:7.1.5.0-7.1.5.32,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar,CVE-2021-38988:6.2,yes sec,vios,3.1.1.30 :: 3.1.1.40 :: 3.1.1.50,There is a vulnerability in the AIX nimsh daemon for VIOS.,IJ37705 / CVE-2022-22351,3.1.1.60,DEPRECATED::IJ37705s4a.220208.epkg.Z DEPRECATED::IJ37705s5a.220208.epkg.Z IJ37705m4a.220324.epkg.Z IJ37705m5a.220324.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc,bos.sysmgt.nim.client:7.2.4.0-7.2.4.4,20220304,20220324,,https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar,CVE-2022-22351:6.1,no sec,aix,7200-04-03 :: 7200-04-04 :: 7200-04-05,There is a vulnerability in the AIX nimsh daemon.,IJ37705 / CVE-2022-22351,7200-04-06,DEPRECATED::IJ37705s4a.220208.epkg.Z DEPRECATED::IJ37705s5a.220208.epkg.Z IJ37705m4a.220324.epkg.Z IJ37705m5a.220324.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc,bos.sysmgt.nim.client:7.2.4.0-7.2.4.4,20220304,20220324,,https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar,CVE-2022-22351:6.1,no sec,vios,3.1.2.10 :: 3.1.2.21,There is a vulnerability in the AIX pfcdd kernel extension for VIOS.,IJ37779 / IJ37494 / CVE-2021-38988,3.1.2.40,IJ37494s3a.220215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc,bos.pfcdd.rte:7.2.5.0,20220304, ,,https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar,CVE-2021-38988:6.2,yes sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148,There is a vulnerability in the AIX audit user commands.,IJ38113 / CVE-2021-38955,7100-05-10,IJ38113m9a.220227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc,bos.rte.security:7.1.5.0-7.1.5.37,20220228, ,,https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar,CVE-2021-38955:4.4,no sec,vios,3.1.1.30 :: 3.1.1.40 :: 3.1.1.50,There is a vulnerability in the AIX audit user commands for VIOS.,IJ38115 / CVE-2021-38955,3.1.1.60,IJ38115m5a.220227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc,bos.rte.security:7.2.4.0-7.2.4.4,20220228, ,,https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar,CVE-2021-38955:4.4,no sec,aix,7200-04-03 :: 7200-04-04 :: 7200-04-05,There is a vulnerability in the AIX audit user commands.,IJ38115 / CVE-2021-38955,7200-04-06,IJ38115m5a.220227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc,bos.rte.security:7.2.4.0-7.2.4.4,20220228, ,,https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar,CVE-2021-38955:4.4,no sec,vios,3.1.2.10 :: 3.1.2.21,There is a vulnerability in the AIX audit user commands.,IJ38117 / IJ38119 / CVE-2021-38955,3.1.2.40,IJ38119m2a.220227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc,bos.rte.security:7.2.5.0-7.2.5.2,20220228, ,,https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar,CVE-2021-38955:4.4,no sec,aix,7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148,There is a vulnerability in the AIX audit user commands.,IJ38117 / IJ38119 / CVE-2021-38955,7200-05-04,IJ38119m2a.220227.epkg.Z IJ38117m3a.220227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc,bos.rte.security:7.2.5.0-7.2.5.2 bos.rte.security:7.2.5.100-7.2.5.101,20220228, ,,https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar,CVE-2021-38955:4.4,no sec,vios,3.1.3.10 :: 3.1.3.14,There is a vulnerability in the AIX audit user commands.,IJ38119 / IJ38117 / CVE-2021-38955,3.1.3.20,IJ38117m3a.220227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc,bos.rte.security:7.2.5.100-7.2.5.101,20220228, ,,https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar,CVE-2021-38955:4.4,no sec,aix,7300-00-01,There is a vulnerability in the AIX audit user commands.,IJ38121 / CVE-2021-38955,7300-00-02,IJ38121m1a.220227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc,bos.rte.security:7.3.0.0,20220228, ,,https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar,CVE-2021-38955:4.4,no hiper,aix,7300-00-00 :: 7300-00-01 :: 7300-00-01-2148,AIX 7.3 changed some performance tuning commands default output,IJ38518,7300-00-02,IJ38518s1b.220314.AIX73TL00SP00-01.epkg.Z,https://www.ibm.com/support/pages/node/6563017,bos.perf.tune:7.3.0.0,20220323, ,,https://aix.software.ibm.com/aix/ifixes/ij38518/, ,no sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09 :: 7100-05-10,AIX is vulnerable to a denial of service due to lpd,IJ39868 / IJ44552 / CVE-2022-22444,7100-05-11,IJ39868s9a.220506.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc,bos.rte.printers:7.1.5.0-7.1.5.33,20220615,20220913,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar,CVE-2022-22444:6.2,no sec,vios,3.1.1.30 :: 3.1.1.40 :: 3.1.1.50,AIX is vulnerable to a denial of service due to lpd,IJ39875 / CVE-2022-22444,See Bulletin,IJ39875s5a.220506.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc,bos.rte.printers:7.2.4.0-7.2.4.1,20220615,20220913,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar,CVE-2022-22444:6.2,no sec,aix,7200-04-03 :: 7200-04-04 :: 7200-04-05 :: 7200-04-06,AIX is vulnerable to a denial of service due to lpd,IJ39875 / CVE-2022-22444,See Bulletin,IJ39875s5a.220506.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc,bos.rte.printers:7.2.4.0-7.2.4.1,20220615,20220913,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar,CVE-2022-22444:6.2,no sec,vios,3.1.2.10 :: 3.1.2.21,AIX is vulnerable to a denial of service due to lpd,IJ39876 / IJ39878 / IJ42162 / IJ44559 / IJ44615 / CVE-2022-22444,3.1.2.50,IJ39878s2a.220506.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc,bos.rte.printers:7.2.5.0-7.2.5.1,20220615,20220913,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar,CVE-2022-22444:6.2,no sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,AIX is vulnerable to a denial of service due to lpd,IJ39876 / IJ39878 / IJ42162 / IJ44559 / IJ44615 / CVE-2022-22444,3.1.3.30,IJ39876s3a.220506.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc,bos.rte.printers:7.2.5.100-7.2.5.100,20220615,20220913,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar,CVE-2022-22444:6.2,no sec,aix,7200-05-01 :: 7200-05-02 :: 7200-05-03 :: 7200-05-04,AIX is vulnerable to a denial of service due to lpd,IJ39876 / IJ39878 / IJ42162 / IJ44559 / IJ44615 / CVE-2022-22444,7200-05-05,IJ39876s3a.220506.epkg.Z IJ39878s2a.220506.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc,bos.rte.printers:7.2.5.0-7.2.5.1 bos.rte.printers:7.2.5.100-7.2.5.100,20220615,20220913,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar,CVE-2022-22444:6.2,no sec,aix,7300-00-01 :: 7300-00-02,AIX is vulnerable to a denial of service due to lpd,IJ39877 / IJ42800 / IJ44562 / CVE-2022-22444,7300-00-03,IJ39877s1a.220506.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc,bos.rte.printers:7.3.0.0-7.3.0.0,20220615,20220913,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar,CVE-2022-22444:6.2,no sec,aix,7300-00-01 :: 7300-00-02,AIX is vulnerable to cache poisoning due to ISC BIND,IJ40614 / CVE-2021-25220,7300-00-03,IJ40614m2b.220718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc,bos.net.tcp.bind_utils:7.3.0.0-7.3.0.1,20220728, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar,CVE-2021-25220:6.8,no sec,aix,7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148 :: 7200-05-04,AIX is vulnerable to cache poisoning due to ISC BIND,IJ40615 / IJ40674 / CVE-2021-25220,7200-05-05,IJ40615m4b.220718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc,bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101,20220728, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar,CVE-2021-25220:6.8,no sec,vios,3.1.2.10 :: 3.1.2.21 :: 3.1.2.30,AIX is vulnerable to cache poisoning due to ISC BIND,IJ40616 / IJ40674 / IJ40615 / IJ41139 / CVE-2021-25220,3.1.2.40,IJ40615m4b.220718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc,bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101,20220728, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar,CVE-2021-25220:6.8,no sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,AIX is vulnerable to cache poisoning due to ISC BIND,IJ40616 / IJ40674 / IJ40615 / IJ41139 / CVE-2021-25220,3.1.3.30,IJ40615m4b.220718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc,bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101,20220728, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar,CVE-2021-25220:6.8,no sec,vios,3.1.1.30 :: 3.1.1.40 :: 3.1.1.50,AIX is vulnerable to cache poisoning due to ISC BIND,IJ40616 / IJ40615 / IJ41139 / CVE-2021-25220,See Bulletin,IJ40616m5b.220718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc,bos.net.tcp.bind:7.2.4.0-7.2.4.1 bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3,20220728, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar,CVE-2021-25220:6.8,no sec,aix,7200-04-03 :: 7200-04-04 :: 7200-04-05,AIX is vulnerable to cache poisoning due to ISC BIND,IJ40616 / CVE-2021-25220,See Bulletin,IJ40616m5b.220718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc,bos.net.tcp.bind:7.2.4.0-7.2.4.1 bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3,20220728, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar,CVE-2021-25220:6.8,no sec,aix,7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148,AIX is vulnerable to cache poisoning due to ISC BIND,IJ40617 / CVE-2021-25220,7100-05-11,IJ40617m9b.220718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc,bos.net.tcp.server:7.1.5.0-7.1.5.35 bos.net.tcp.client:7.1.5.0-7.1.5.40,20220728, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar,CVE-2021-25220:6.8,no sec,vios,3.1.2.10 :: 3.1.2.21 :: 3.1.2.30,IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service,IJ40951 / CVE-2022-35643,3.1.2.50,IJ40951s1a.220711.epkg.Z IJ40951s2a.220711.epkg.Z IJ40951s3a.220711.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc,devices.vtdev.scsi.rte:7.2.5.0-7.2.5.3,20220728, ,,https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar,CVE-2022-35643:9.1,no sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service,IJ40952 / CVE-2022-35643,3.1.3.30,IJ40952s3b.220712.epkg.Z IJ40952s3a.220712.epkg.Z IJ40952s4a.220712.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc,devices.vtdev.scsi.rte:7.2.5.100 devices.vtdev.scsi.rte:7.2.5.102,20220728, ,,https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar,CVE-2022-35643:9.1,no sec,vios,3.1.1.30 :: 3.1.1.40 :: 3.1.1.50,IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service,IJ40954 / CVE-2022-35643,See Bulletin,IJ40954s3a.220711.epkg.Z IJ40954s4a.220711.epkg.Z IJ40954s5a.220711.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc,devices.vtdev.scsi.rte:7.2.4.0-7.2.4.4,20220728, ,,https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar,CVE-2022-35643:9.1,no sec,aix,7200-05-02 :: 7200-05-03 :: 7200-05-04,AIX is vulnerable to a privilege escalation vulnerability,IJ41396 / IJ41685 / IJ41795 / CVE-2022-34356,7200-05-05,IJ41685m3a.220810.epkg.Z IJ41685m3b.220812.epkg.Z IJ41685s4a.220809.epkg.Z IJ41795m2a.220812.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc,bos.mp64:7.2.5.0-7.2.5.5 bos.mp64:7.2.5.100-7.2.5.105,20220912,20221010,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar,CVE-2022-34356:8.4,yes sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40,AIX is vulnerable to a privilege escalation vulnerability,IJ41685 / IJ41795 / IJ41396 / CVE-2022-34356,3.1.2.50,IJ41795m2a.220812.epkg.Z IJ41795m3a.221010.epkg.Z IJ41795s4a.221010.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc,bos.mp64:7.2.5.0-7.2.5.5,20220912,20221010,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar,CVE-2022-34356:8.4,yes sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,AIX is vulnerable to a privilege escalation vulnerability,IJ41685 / IJ41795 / IJ41396 / CVE-2022-34356,3.1.3.30,IJ41685m3a.220810.epkg.Z IJ41685m3b.220812.epkg.Z IJ41685s4a.220809.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc,bos.mp64:7.2.5.100-7.2.5.105,20220912,20221010,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar,CVE-2022-34356:8.4,yes sec,aix,7300-00-01 :: 7300-00-02,AIX kernel is vulnerable to a privilege escalation vulnerability,IJ41687 / CVE-2022-34356,7300-00-03,IJ41687m1a.220810.epkg.Z IJ41687s2a.220809.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc,bos.mp64:7.3.0.0-7.3.0.3,20220912, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar,CVE-2022-34356:8.4,yes sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10,AIX is vulnerable to a privilege escalation vulnerability,IJ41688 / CVE-2022-34356,7100-05-11,IJ41688m8a.220921.epkg.Z IJ41688m9a.220822.epkg.Z IJ41688m9b.220822.epkg.Z IJ41688sAa.220913.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc,bos.mp64:7.1.5.0-7.1.5.46,20220912,20221010,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar,CVE-2022-34356:8.4,yes sec,vios,3.1.1.40 :: 3.1.1.50 :: 3.1.1.60,AIX is vulnerable to a privilege escalation vulnerability,IJ41706 / CVE-2022-34356,See Bulletin,IJ41706m4a.220812.epkg.Z IJ41706m5a.220810.epkg.Z IJ41706s6a.220912.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc,bos.mp64:7.2.4.0-7.2.4.10,20220912,20221010,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar,CVE-2022-34356:8.4,yes sec,aix,7200-04-04 :: 7200-04-05 :: 7200-04-06,AIX is vulnerable to a privilege escalation vulnerability,IJ41706 / CVE-2022-34356,See Bulletin,IJ41706m4a.220812.epkg.Z IJ41706m5a.220810.epkg.Z IJ41706s6a.220912.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc,bos.mp64:7.2.4.0-7.2.4.10,20220912,20221010,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar,CVE-2022-34356:8.4,yes sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,AIX is vulnerable to denial of service vulnerabilities - TCPIP,IJ41974 / CVE-2022-40233,3.1.3.30,IJ41974s3a.221025.epkg.Z IJ41974s3b.221213.epkg.Z IJ41974s4a.221017.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.net.tcp.client_core:7.2.5.100-7.2.5.104,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-40233:6.2,yes sec,aix,7200-05-02 :: 7200-05-03 :: 7200-05-04,AIX is vulnerable to denial of service vulnerabilities - TCPIP,IJ41974 / IJ43598 / CVE-2022-40233,7200-05-05,IJ43598s2b.221027.epkg.Z IJ41974s3a.221025.epkg.Z IJ41974s3b.221213.epkg.Z IJ41974s4a.221017.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.net.tcp.client_core:7.2.5.0-7.2.5.4 bos.net.tcp.client_core:7.2.5.100-7.2.5.104,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-40233:6.2,yes sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,AIX is vulnerable to denial of service vulnerabilities - CAA,IJ41975 / CVE-2022-39165,3.1.3.30,IJ41975m3a.221027.epkg.Z IJ41975m3b.221212.epkg.Z IJ41975s4a.221017.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.cluster.rte:7.2.5.100-7.2.5.102,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-39165:6.2,yes sec,aix,7200-05-02 :: 7200-05-03 :: 7200-05-04,AIX is vulnerable to denial of service vulnerabilities - CAA,IJ41975 / IJ44115 / CVE-2022-39165,7200-05-05,IJ44115m2a.221102.epkg.Z IJ41975m3a.221027.epkg.Z IJ41975m3b.221212.epkg.Z IJ41975s4a.221017.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.cluster.rte:7.2.5.0-7.2.5.2 bos.cluster.rte:7.2.5.100-7.2.5.102,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-39165:6.2,yes sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,AIX is vulnerable to denial of service vulnerabilities - NFS,IJ42159 / CVE-2022-43380,3.1.3.30,IJ42159s3a.221025.epkg.Z IJ42159s3b.221213.epkg.Z IJ42159s4a.221017.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.net.nfs.client:7.2.5.100-7.2.5.101,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-43380:6.2,yes sec,aix,7200-05-02 :: 7200-05-03 :: 7200-05-04,AIX is vulnerable to denial of service vulnerabilities - NFS,IJ42159 / IJ43674 / CVE-2022-43380,7200-05-05,IJ43674s2b.221027.epkg.Z IJ42159s3a.221025.epkg.Z IJ42159s3b.221213.epkg.Z IJ42159s4a.221017.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.net.nfs.client:7.2.5.0-7.2.5.3 bos.net.nfs.client:7.2.5.100-7.2.5.101,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-43380:6.2,yes sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,AIX is vulnerable to a denial of service due to lpd,IJ42162 / CVE-2022-43382,3.1.3.30,IJ42162m4a.221208.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc,bos.rte.printers:7.2.5.100-7.2.5.100,20221215,20230317,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar,CVE-2022-43382:6.2,no sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,AIX is affected by a root privilege escalation vulnerability,IJ42163 / CVE-2022-41290,3.1.3.30,IJ42163m4a.221213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc,bos.rte.install:7.2.5.100-7.2.5.105,20221214, ,,https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar,CVE-2022-41290:8.4,no sec,aix,7200-05-03 :: 7200-05-04,AIX is affected by a root privilege escalation vulnerability,IJ42163 / CVE-2022-41290,7200-05-05,IJ42163m4a.221213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc,bos.rte.install:7.2.5.0-7.2.5.5 bos.rte.install:7.2.5.100-7.2.5.105,20221214, ,,https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar,CVE-2022-41290:8.4,no sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10,AIX is affected by a root privilege escalation vulnerability,IJ42230 / CVE-2022-41290,7100-05-11,IJ42230mAa.221208.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc,bos.rte.install:7.1.5.0-7.1.5.48,20221214, ,,https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar,CVE-2022-41290:8.4,no sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40,AIX is affected by a root privilege escalation vulnerability,IJ42232 / CVE-2022-41290,3.1.2.50,IJ42232m2a.221213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc,bos.rte.install:7.2.5.0-7.2.5.5,20221214, ,,https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar,CVE-2022-41290:8.4,no sec,aix,7300-00-01 :: 7300-00-02,AIX is affected by a root privilege escalation vulnerability,IJ42234 / CVE-2022-41290,7300-00-03,IJ42234m2a.221213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc,bos.rte.install:7.3.0.0-7.3.0.3,20221214, ,,https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar,CVE-2022-41290:8.4,no sec,aix,7300-00-01 :: 7300-00-02,AIX is vulnerable to a denial of service due to libxml2,IJ42341 / CVE-2022-29824,7300-00-04,IJ42341s2a.220907.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc,bos.rte.control:7.3.0.0-7.3.0.1,20220912,20221212,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar,CVE-2022-29824:5.5,no sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40,AIX is vulnerable to a denial of service due to libxml2,IJ42379 / IJ42378 / IJ42339 / CVE-2022-29824,3.1.2.60,IJ42378s2a.220909.epkg.Z IJ42378s2a.221010.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc,bos.rte.control:7.2.5.0-7.2.5.4,20220912,20221212,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar,CVE-2022-29824:5.5,no sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,AIX is vulnerable to a denial of service due to libxml2,IJ42379 / IJ42378 / IJ42339 / CVE-2022-29824,3.1.3.40,IJ42379s4a.220909.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc,bos.rte.control:7.2.5.100-7.2.5.101,20220912,20221212,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar,CVE-2022-29824:5.5,no sec,vios,3.1.4.10,AIX is vulnerable to a denial of service due to libxml2,IJ42379 / IJ42378 / IJ42339 / CVE-2022-29824,3.1.4.20,IJ42339s5a.221212.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc,bos.rte.control:7.2.5.200-7.2.5.200,20220912,20221212,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar,CVE-2022-29824:5.5,no sec,aix,7200-05-02 :: 7200-05-03 :: 7200-05-04 :: 7200-05-05,AIX is vulnerable to a denial of service due to libxml2,IJ42379 / IJ42378 / IJ42339 / CVE-2022-29824,7200-05-06,IJ42339s2a.220909.epkg.Z IJ42339s4a.220907.epkg.Z IJ42339s5a.221212.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc,bos.rte.control:7.2.5.0-7.2.5.4 bos.rte.control:7.2.5.100-7.2.5.101 bos.rte.control:7.2.5.200-7.2.5.200,20220912,20221212,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar,CVE-2022-29824:5.5,no sec,vios,3.1.1.40 :: 3.1.1.50 :: 3.1.1.60,AIX is vulnerable to a denial of service due to libxml2,IJ42381 / CVE-2022-29824,See Bulletin,IJ42381s6a.220909.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc,bos.rte.control:7.2.4.0-7.2.4.5,20220912,20221212,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar,CVE-2022-29824:5.5,no sec,aix,7200-04-04 :: 7200-04-05 :: 7200-04-06,AIX is vulnerable to a denial of service due to libxml2,IJ42381 / CVE-2022-29824,See Bulletin,IJ42381s6a.220909.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc,bos.rte.control:7.2.4.0-7.2.4.5,20220912,20221212,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar,CVE-2022-29824:5.5,no sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40,AIX is vulnerable to a buffer overflow due to X11,IJ42677 / IJ43599 / IJ43218 / CVE-2022-47990,3.1.2.50,IJ43599s2a.221227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc,X11.base.lib:7.2.5.0-7.2.5.1,20230117, ,,https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar,CVE-2022-47990:6.2,no sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21,AIX is vulnerable to a buffer overflow due to X11,IJ42677 / IJ43599 / IJ43218 / CVE-2022-47990,3.1.3.30,IJ43218s4a.221227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc,X11.base.lib:7.2.5.100-7.2.5.100,20230117, ,,https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar,CVE-2022-47990:6.2,no sec,aix,7200-05-03 :: 7200-05-04,AIX is vulnerable to a buffer overflow due to X11,IJ42677 / IJ43599 / IJ43218 / CVE-2022-47990,7200-05-05,IJ42677s4a.221227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc,X11.base.lib:7.2.5.0-7.2.5.1 X11.base.lib:7.2.5.100-7.2.5.100,20230117, ,,https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar,CVE-2022-47990:6.2,no sec,aix,7300-00-01 :: 7300-00-02 :: 7300-00-03,IX is vulnerable to a denial of service due to lpd,IJ42800 / IJ44562 / CVE-2022-43382,7300-00-04,IJ42800m2a.221208.epkg.Z IJ44562s3a.230314.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc,bos.rte.printers:7.3.0.0-7.3.0.0 printers.rte:7.3.0.0-7.3.0.1,20221215,20230317,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar,CVE-2022-43382:6.2,no sec,aix,7300-00-01 :: 7300-00-02,AIX is vulnerable to denial of service vulnerabilities - TCPIP,IJ42937 / CVE-2022-40233,7300-00-03,IJ42937s1a.221027.epkg.Z IJ42937s2a.221018.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.net.tcp.client_core:7.3.0.0-7.3.0.2,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-40233:6.2,yes sec,aix,7300-00-01 :: 7300-00-02,AIX is vulnerable to denial of service vulnerabilities - CAA,IJ42938 / CVE-2022-39165,7300-00-03,IJ42938m1a.221027.epkg.Z IJ42938s2a.221018.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.cluster.rte:7.3.0.0-7.3.0.1,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-39165:6.2,yes sec,aix,7300-00-01 :: 7300-00-02,AIX is vulnerable to a buffer overflow due to X11,IJ42939 / CVE-2022-47990,7300-00-03,IJ42939s2a.221227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc,X11.base.lib:7.3.0.0-7.3.0.0,20230117, ,,https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar,CVE-2022-47990:6.2,no sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11,AIX is vulnerable to denial of service vulnerabilities - NFS,IJ43072 / CVE-2022-43380,7100-05-11,IJ43072s8a.221110.epkg.Z IJ43072sAa.221024.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.net.nfs.client:7.1.5.0-7.1.5.38,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-43380:6.2,yes sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10,AIX is vulnerable to a buffer overflow due to X11,IJ43073 / CVE-2022-47990,7100-05-11,IJ43073sAa.221227.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc,X11.base.lib:7.1.5.0-7.1.5.34,20230117, ,,https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar,CVE-2022-47990:6.2,no sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10,AIX is vulnerable to denial of service vulnerabilities - TCPIP,IJ43098 / CVE-2022-40233,7100-05-11,IJ43098s8a.221110.epkg.Z IJ43098s9a.221102.epkg.Z IJ43098s9b.221213.epkg.Z IJ43098sAa.221024.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.net.tcp.client:7.1.5.0-7.1.5.41,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-40233:6.2,yes sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10,AIX is vulnerable to denial of service vulnerabilities - CAA,IJ43099 / CVE-2022-39165,7100-05-11,IJ43099m8a.221110.epkg.Z IJ43099m9a.221102.epkg.Z IJ43099m9b.221213.epkg.Z IJ43099sAa.221024.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.cluster.rte:7.1.5.0-7.1.5.39,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-39165:6.2,yes sec,aix,7300-00-01 :: 7300-00-02,AIX is vulnerable to denial of service vulnerabilities - NFS,IJ43468 / CVE-2022-43380,7300-00-03,IJ43468s1a.221025.epkg.Z IJ43468s2a.221017.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.net.nfs.client:7.3.0.0-7.3.0.1,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-43380:6.2,yes sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40,AIX is vulnerable to denial of service vulnerabilities - TCPIP,IJ43598 / CVE-2022-40233,3.1.2.50,IJ43598s2b.221027.epkg.Z IJ43598s2c.221213.epkg.Z IJ43598s2d.221213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.net.tcp.client_core:7.2.5.0-7.2.5.4,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-40233:6.2,yes sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40,AIX is vulnerable to denial of service vulnerabilities - NFS,IJ43674 / CVE-2022-43380,3.1.2.50,IJ43674s2b.221027.epkg.Z IJ43674s2c.221213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.net.nfs.client:7.2.5.0-7.2.5.3,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-43380:6.2,yes sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ43869 / IJ45541 / CVE-2022-39164,3.1.3.40,IJ43869m3a.221025.epkg.Z IJ43869m3b.221212.epkg.Z IJ43869m4a.221017.epkg.Z IJ45541s3b.230404.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.mp64:7.2.5.100-7.2.5.106,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-39164:6.2,yes sec,vios,3.1.4.10,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ43869 / CVE-2022-39164,3.1.4.20,IJ43869s5a.221212.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.mp64:7.2.5.200-7.2.5.201,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-39164:6.2,yes sec,aix,7200-05-03 :: 7200-05-04 :: 7200-05-05,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ43869 / CVE-2022-39164,7200-05-06,IJ43869m3c.230216.epkg.Z IJ43869m3d.230216.epkg.Z IJ43869m4b.230216.epkg.Z IJ43869m5b.230216.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.mp64:7.2.5.0-7.2.5.5 bos.mp64:7.2.5.100-7.2.5.105 bos.mp64:7.2.5.200-7.2.5.200,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-39164:6.2,yes sec,aix,7300-00-01 :: 7300-00-02 :: 7300-00-03,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ43875 / CVE-2022-39164,7300-00-04,IJ43875m1b.230216.epkg.Z IJ43875m2b.230216.epkg.Z IJ43875s3a.230314.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.mp64:7.3.0.0-7.3.0.4,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-39164:6.2,yes sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30,AIX is vulnerable to denial of service vulnerabilities - perfstat,IJ43876 / CVE-2022-43848,3.1.3.40,IJ43876s3a.221025.epkg.Z IJ43876s3b.221213.epkg.Z IJ43876s4a.221017.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.perf.perfstat:7.2.5.100-7.2.5.101,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-43848:6.2,yes sec,vios,3.1.4.10,AIX is vulnerable to denial of service vulnerabilities - perfstat,IJ43876 / CVE-2022-43848,3.1.4.20,IJ43876s5a.221212.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.perf.perfstat:7.2.5.200-7.2.5.200,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-43848:6.2,yes sec,aix,7200-05-02 :: 7200-05-03 :: 7200-05-04 :: 7200-05-05,AIX is vulnerable to denial of service vulnerabilities - perfstat,IJ43876 / IJ44114 / CVE-2022-43848,7200-05-06,IJ44114s2a.221102.epkg.Z IJ43876s3a.221025.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.perf.perfstat:7.2.5.0-7.2.5.0 bos.perf.perfstat:7.2.5.100-7.2.5.101 bos.perf.perfstat:7.2.5.200-7.2.5.200,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-43848:6.2,yes sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30,AIX is vulnerable to denial of service vulnerabilities - pfcdd,IJ43877 / IJ46068 / CVE-2022-43849,3.1.3.40,IJ43877s3a.221025.epkg.Z IJ43877s4a.221017.epkg.Z IJ46068s3a.230404.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.pfcdd.rte:7.2.5.100-7.2.5.102,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-43849:6.2,yes sec,vios,3.1.4.10,AIX is vulnerable to denial of service vulnerabilities - pfcdd,IJ43877 / CVE-2022-43849,3.1.4.20,IJ43877s5a.230123.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.pfcdd.rte:7.2.5.200-7.2.5.200,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-43849:6.2,yes sec,aix,7200-05-02 :: 7200-05-03 :: 7200-05-04 :: 7200-05-05,AIX is vulnerable to denial of service vulnerabilities - pfcdd,IJ43877 / IJ44116 / CVE-2022-43849,7200-05-06,IJ44116s2a.221102.epkg.Z IJ43877s3a.221025.epkg.Z IJ43877s4a.221017.epkg.Z IJ43877s5a.230123.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.pfcdd.rte:7.2.5.0-7.2.5.1 bos.pfcdd.rte:7.2.5.100-7.2.5.101 bos.pfcdd.rte:7.2.5.200-7.2.5.200,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-43849:6.2,yes sec,aix,7300-00-01 :: 7300-00-02 :: 7300-00-03,AIX is vulnerable to denial of service vulnerabilities - perfstat,IJ43891 / CVE-2022-43848,7300-00-04,IJ43891s2a.221018.epkg.Z IJ43891s3a.230314.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.perf.perfstat:7.3.0.0-7.3.0.1,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-43848:6.2,yes sec,aix,7300-00-01 :: 7300-00-02 :: 7300-00-03,AIX is vulnerable to denial of service vulnerabilities - pfcdd,IJ43893 / CVE-2022-43849,7300-00-04,IJ43893s1a.221027.epkg.Z IJ43893s2a.221018.epkg.Z IJ43893s3a.230314.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.pfcdd.rte:7.3.0.0-7.3.0.2,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-43849:6.2,yes sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ43967 / CVE-2022-39164,7100-05-12,IJ43967m8a.221110.epkg.Z IJ43967m9a.221102.epkg.Z IJ43967m9b.221111.epkg.Z IJ43967mAa.221024.epkg.Z IJ43967sBa.230314.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.mp64:7.1.5.0-7.1.5.47,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-39164:6.2,yes sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11,AIX is vulnerable to denial of service vulnerabilities - perfstat ,IJ43970 / CVE-2022-43848,7100-05-12,IJ43970sAa.221024.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.perf.perfstat:7.1.5.0-7.1.5.32,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-43848:6.2,yes sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11,AIX is vulnerable to denial of service vulnerabilities - pfcdd,IJ43980 / CVE-2022-43849,7100-05-12,IJ43980sAa.221024.epkg.Z IJ43980sBa.230314.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.pfcdd.rte:7.1.5.0-7.1.5.34,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-43849:6.2,yes sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40 :: 3.1.2.50,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ43995 / CVE-2022-39164,3.1.2.60,IJ43995m2a.221025.epkg.Z IJ43995m2b.221027.epkg.Z IJ43995m2c.221212.epkg.Z IJ43995s5a.230404.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.mp64:7.2.5.0-7.2.5.6,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-39164:6.2,yes hiper,vios,3.1.3.0 :: 3.1.3.30,Possible system crashes processing network traffic,IJ44047 / IJ44534,3.1.3.40,IJ44047m4b.230213.AIX72TL05SP04.epkg.Z IJ44047m4b.230213.VIOS3.1.3.21.epkg.Z IJ44047m4e.230505.VIOS3.1.3.30.epkg.Z IJ44047m4f.230510.VIOS3.1.3.30.epkg.Z IJ44534m4a.230218.VIOS3.1.3.21.epkg.Z,https://www.ibm.com/support/pages/node/6857545,bos.mp64:7.2.5.100-7.2.5.106 bos.net.tcp.client_core:7.2.5.100-7.2.5.105,20230217, ,,https://aix.software.ibm.com/aix/ifixes/ij44534/,,yes sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40 :: 3.1.2.50,AIX is vulnerable to denial of service vulnerabilities - perfstat,IJ44114 / CVE-2022-43848,3.1.2.60,IJ44114s2a.221102.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.perf.perfstat:7.2.5.0-7.2.5.0,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-43848:6.2,yes sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40,AIX is vulnerable to denial of service vulnerabilities - CAA,IJ44115 / CVE-2022-39165,3.1.2.50,IJ44115m2a.221102.epkg.Z IJ44115m2b.221213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.cluster.rte:7.2.5.0-7.2.5.2,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-39165:6.2,yes sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40 :: 3.1.2.50,AIX is vulnerable to denial of service vulnerabilities - pfcdd,IJ44116 / IJ46105 / CVE-2022-43849,3.1.2.60,IJ44116s2a.221102.epkg.Z IJ46105s5a.230404.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.pfcdd.rte:7.2.5.0-7.2.5.2,20221214,20230406,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar,CVE-2022-43849:6.2,yes sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11,AIX is vulnerable to denial of service due to ISC BIND,IJ44422 / CVE-2022-38178 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-2795,7100-05-12,IJ44422mAa.221220.epkg.Z IJ44422sBa.230317.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc,bos.net.tcp.client:7.1.5.0-7.1.5.42 bos.net.tcp.server:7.1.5.0-7.1.5.35,20221222,20230405,,https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar,CVE-2022-38178:7.5 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-2795:5.3,no sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40 :: 3.1.2.50,AIX is vulnerable to denial of service due to ISC BIND,IJ44423 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178,3.1.2.60,IJ44423m2b.230217.epkg.Z IJ44423s5a.230404.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc,bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.4,20221222,20230517,,https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar,CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5,no sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30,AIX is vulnerable to denial of service due to ISC BIND,IJ44425 / IJ44424 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178,3.1.3.40,IJ44424s3a.230404.epkg.Z IJ44425m4b.230217.epkg.Z IJ44424s5.221129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc,bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind_utils:7.2.5.100-7.2.5.102,20221222,20230517,,https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar,CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5,no sec,vios,3.1.4.10,AIX is vulnerable to denial of service due to ISC BIND,IJ44425 / IJ44424 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178,3.1.4.20,IJ44425s5b.230214.epkg.Z IJ44424s3a.230404.epkg.Z IJ44425m4b.230217.epkg.Z IJ44424s5.221129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc,bos.net.tcp.bind_utils:7.2.5.200-7.2.5.200,20221222,20230517,,https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar,CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5,no sec,aix,7200-05 :: 7200-05-03 :: 7200-05-04 :: 7200-05-05,AIX is vulnerable to denial of service due to ISC BIND,IJ44425 / IJ44424 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178,7200-05-06,IJ44424s3a.230404.epkg.Z IJ44425m4b.230217.epkg.Z IJ44424s5.221129.epkg.Z IJ44425s5b.230214.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc,bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.4 bos.net.tcp.bind_utils:7.2.5.100-7.2.5.102 bos.net.tcp.bind_utils:7.2.5.200-7.2.5.200,20221222,20230517,,https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar,CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5,no sec,aix,7300-01,AIX is vulnerable to denial of service due to ISC BIND,IJ44426 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178,7300-01-02,IJ44426s2.221130.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc,,20221222,20230517,,https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar,CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5,no sec,aix,7300-00-01 :: 7300-00-02 :: 7300-00-03,AIX is vulnerable to denial of service due to ISC BIND,IJ44427 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178,7300-00-04,IJ44427m2a.221220.epkg.Z IJ44427s3a.230317.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc,bos.net.tcp.bind_utils:7.3.0.0-7.3.0.2,20221222,20230517,,https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar,CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5,no hiper,aix,7300-00-00 :: 7300-00-03-2246,Possible system crashes processing network traffic,IJ44513 / IJ44512,7300-00-04,IJ44512m2b.230213.AIX73TL00SP02.epkg.Z IJ44512m3a.230423.AIX73TL00SP03.epkg.Z IJ44512m3b.230517.AIX73TL00SP03.epkg.Z IJ44513m2a.230217.AIX73TL00SP02.epkg.Z,https://www.ibm.com/support/pages/node/6857545,bos.mp64:7.3.0.0-7.3.0.4 bos.net.tcp.client_core:7.3.0.0-7.3.0.3,20230217, ,,https://aix.software.ibm.com/aix/ifixes/ij44513/,,yes sec,aix,7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11,AIX is vulnerable to a denial of service due to lpd,IJ44552 / CVE-2022-43382,7100-05-12,IJ44552mAa.221208.epkg.Z IJ44552mBa.230313.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc,bos.rte.printers:7.1.5.0-7.1.5.34 printers.rte:7.1.5.0-7.1.5.32,20221215,20230317,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar,CVE-2022-43382:6.2,no sec,vios,3.1.4.10,AIX is vulnerable to a denial of service due to lpd,IJ44559 / CVE-2022-43382,3.1.4.20,IJ44559m5a.221208.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc,printers.rte:7.2.5.200-7.2.5.200,20221215,20230317,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar,CVE-2022-43382:6.2,no sec,aix,7200-05-03 :: 7200-05-04 :: 7200-05-05,AIX is vulnerable to a denial of service due to lpd,IJ44559 / CVE-2022-43382,7200-05-06,IJ44559m4a.221214.epkg.Z IJ44559m5a.221208.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc,bos.rte.printers:7.2.5.0-7.2.5.1 bos.rte.printers:7.2.5.100-7.2.5.100 printers.rte:7.2.5.200-7.2.5.200,20221215,20230317,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar,CVE-2022-43382:6.2,no sec,aix,7300-01-01,IX is vulnerable to a denial of service due to lpd,IJ44564 / CVE-2022-43382,7300-01-02,IJ44564m1a.221208.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc,printers.rte:7.3.1.0-7.3.1.0,20221215,20230317,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar,CVE-2022-43382:6.2,no sec,aix,7300-01-01,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ44594 / CVE-2022-39164,7300-01-02,IJ44594m1a.230216.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.mp64:7.3.1.0-7.3.1.1,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-39164:6.2,yes sec,aix,7300-01-01,AIX is vulnerable to denial of service vulnerabilities - perfstat,IJ44595 / CVE-2022-43848,7300-01-02,IJ44595s1a.221212.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc,bos.perf.perfstat:7.3.1.0-7.3.1.0,20221214,20230317,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ,CVE-2022-43848:6.2,yes sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40,AIX is vulnerable to a denial of service due to lpd,IJ44615 / CVE-2022-43382,3.1.2.50,IJ44615m2a.221213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc,bos.rte.printers:7.2.5.0-7.2.5.1,20221215,20230317,,https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar,CVE-2022-43382:6.2,no hiper,aix,7300-01-00 :: 7300-01-01-2246,Possible system crashes processing network traffic,IJ44761 / IJ44749,7300-01-02,IJ44761m1a.230217.AIX73TL01SP01.epkg.Z IJ44749m1a.230210.AIX73TL01SP01.epkg.Z,https://www.ibm.com/support/pages/node/6857545,bos.mp64:7.3.1.0-7.3.1.1 bos.net.tcp.client_core:7.3.1.0-7.3.1.1,20230217, ,,https://aix.software.ibm.com/aix/ifixes/ij44761/,,yes hiper,vios,3.1.4.0 :: 3.1.4.10,Possible system crashes processing network traffic,IJ44799 / IJ44047 / IJ44786 / IJ44534,3.1.4.20,IJ44047m4b.230213.AIX72TL05SP04.epkg.Z IJ44047m4b.230213.VIOS3.1.3.21.epkg.Z IJ44786m5b.230213.AIX72TL05SP05.epkg.Z IJ44786m5b.230213.VIOS3.1.4.10.epkg.Z IJ44534m3a.230412.AIX72TL05SP03.epkg.Z IJ44534m4a.230218.AIX72TL05SP04.epkg.Z IJ44534m4a.230218.VIOS3.1.3.21.epkg.Z IJ44799m5a.230218.AIX72TL05SP05.epkg.Z IJ44799m5a.230218.VIOS3.1.4.10.epkg.Z,https://www.ibm.com/support/pages/node/6857545,bos.mp64:7.2.5.200-7.2.5.201 bos.net.tcp.client_core:7.2.5.200-7.2.5.201,20230217, ,,https://aix.software.ibm.com/aix/ifixes/ij44799/,,yes hiper,aix,7200-05-03-2135 :: 7200-05-05-2246,Possible system crashes processing network traffic,IJ44799 / IJ44047 / IJ44786 / IJ44534,7200-05-06,IJ44047m4b.230213.AIX72TL05SP04.epkg.Z IJ44047m4b.230213.VIOS3.1.3.21.epkg.Z IJ44786m5b.230213.AIX72TL05SP05.epkg.Z IJ44786m5b.230213.VIOS3.1.4.10.epkg.Z IJ44534m3a.230412.AIX72TL05SP03.epkg.Z IJ44534m4a.230218.AIX72TL05SP04.epkg.Z IJ44534m4a.230218.VIOS3.1.3.21.epkg.Z IJ44799m5a.230218.AIX72TL05SP05.epkg.Z IJ44799m5a.230218.VIOS3.1.4.10.epkg.Z,https://www.ibm.com/support/pages/node/6857545,bos.mp64:7.2.5.100-7.2.5.201 bos.net.tcp.client_core:7.2.5.100-7.2.5.201,20230217, ,,https://aix.software.ibm.com/aix/ifixes/ij44799/,,yes sec,aix,7300-01-01,AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient,IJ44987 / CVE-2012-5783,7300-01-02,IJ44987s1a.230307.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc,bos.ecc_client.rte:7.3.1.0-7.3.1.0,20230414, ,,https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar,CVE-2012-5783:4.3,no sec,vios,3.1.4.10,AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient,IJ44994 / CVE-2012-5783,3.1.4.20,IJ44994s5a.230307.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc,bos.ecc_client.rte:7.2.5.200-7.2.5.200,20230414, ,,https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar,CVE-2012-5783:4.3,no sec,aix,7200-05-03 :: 7200-05-04 :: 7200-05-05,AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient,IJ44994 / CVE-2012-5783,7200-05-06,IJ44994s4a.230412.epkg.Z IJ44994s5a.230307.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc,bos.ecc_client.rte:7.2.5.0-7.2.5.1 bos.ecc_client.rte:7.2.5.100-7.2.5.100 bos.ecc_client.rte:7.2.5.200-7.2.5.200,20230414, ,,https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar,CVE-2012-5783:4.3,no sec,vios,3.1.4.10 :: 3.1.4.21,AIX is vulnerable to arbitrary code execution due to libxml2,IJ45056 / CVE-2022-40303 / CVE-2022-40304,3.1.4.30,IJ45056m5a.230125.epkg.Z IJ45056m6a.230504.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc,bos.rte.control:7.2.5.200-7.2.5.201,20230208,20230504,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar,CVE-2022-40303:7.8 / CVE-2022-40304:7.8,no sec,vios,3.1.2.21 :: 3.1.2.30 :: 3.1.2.40 :: 3.1.2.50,AIX is vulnerable to arbitrary code execution due to libxml2,IJ45057 / CVE-2022-40303 / CVE-2022-40304,3.1.2.60,IJ45057m2a.230125.epkg.Z IJ45057m2b.230405.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc,bos.rte.control:7.2.5.0-7.2.5.5,20230208,20230504,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar,CVE-2022-40303:7.8 / CVE-2022-40304:7.8,no sec,vios,3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30,AIX is vulnerable to arbitrary code execution due to libxml2,IJ45058 / CVE-2022-40303 / CVE-2022-40304,3.1.3.40,IJ45058m4a.230125.epkg.Z IJ45058m4b.230405.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc,bos.rte.control:7.2.5.100-7.2.5.102,20230208,20230504,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar,CVE-2022-40303:7.8 / CVE-2022-40304:7.8,no sec,aix,7200-05-03 :: 7200-05-04 :: 7200-05-05,AIX is vulnerable to arbitrary code execution due to libxml2,IJ45058 / IJ45057 / IJ45056 / CVE-2022-40303 / CVE-2022-40304,7200-05-06,IJ45056m4a.230125.epkg.Z IJ45056m5a.230125.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc,bos.rte.control:7.2.5.0-7.2.5.4 bos.rte.control:7.2.5.100-7.2.5.101 bos.rte.control:7.2.5.200-7.2.5.200,20230208, ,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar,CVE-2022-40303:7.8 / CVE-2022-40304:7.8,no sec,aix,7300-00-01 :: 7300-00-02 :: 7300-00-03,AIX is vulnerable to arbitrary code execution due to libxml2,IJ45059 / CVE-2022-40303 / CVE-2022-40304,7300-00-04,IJ45059m2a.230125.epkg.Z IJ45059m2b.230405.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc,bos.rte.control:7.3.0.0-7.3.0.2,20230208,20230405,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar,CVE-2022-40303:7.8 / CVE-2022-40304:7.8,no sec,aix,7300-01-01,AIX is vulnerable to arbitrary code execution due to libxml2,IJ45060 / CVE-2022-40303 / CVE-2022-40304,7300-01-03,IJ45060s1a.230125.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc,bos.rte.control:7.3.1.0-7.3.1.0,20230208, ,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar,CVE-2022-40303:7.8 / CVE-2022-40304:7.8,no sec,aix,7100-05-09 :: 7100-05-10 :: 7100-05-11,AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient,IJ45221 / CVE-2012-5783,7100-05-12,IJ45221sAa.230309.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc,bos.ecc_client.rte:7.1.5.0-7.1.5.34,20230414, ,,https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar,CVE-2012-5783:4.3,no sec,vios,3.1.2.30 :: 3.1.2.40 :: 3.1.2.50,AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient,IJ45222 / CVE-2012-5783,3.1.2.60,IJ45222s2a.230307.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc,bos.ecc_client.rte:7.2.5.0-7.2.5.1,20230414, ,,https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar,CVE-2012-5783:4.3,no sec,vios,3.1.3.14 :: 3.1.3.21 :: 3.1.3.30,AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient,IJ45223 / CVE-2012-5783,3.1.3.40,IJ45223s4a.230307.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc,bos.ecc_client.rte:7.2.5.100-7.2.5.100,20230414, ,,https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar,CVE-2012-5783:4.3,no sec,aix,7300-00-01 :: 7300-00-02 :: 7300-00-03,AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient,IJ45224 / CVE-2012-5783,7300-00-04,IJ45224s2a.230309.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc,bos.ecc_client.rte:7.3.0.0-7.3.0.1,20230414, ,,https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar,CVE-2012-5783:4.3,no sec,vios,3.1.2.30 :: 3.1.2.40 :: 3.1.2.50,AIX is vulnerable to arbitrary command execution,IJ45245 / IJ46051 / IJ46110 / CVE-2023-26286,3.1.2.60,IJ46110s3a.230323.epkg.Z IJ46110s4a.230323.epkg.Z IJ46110s5a.230407.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc,bos.mp64:7.2.5.0-7.2.5.6 bos.rte.serv_aid:7.2.5.0-7.2.5.4 bos.sysmgt.serv_aid:7.2.5.0-7.2.5.3,20230412, ,,https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar,CVE-2023-26286:8.4,no sec,vios,3.1.3.14 :: 3.1.3.21 :: 3.1.3.30,AIX is vulnerable to arbitrary command execution,IJ45245 / IJ46051 / IJ46110 / CVE-2023-26286,3.1.3.40,IJ46051s1a.230323.epkg.Z IJ46051s2a.230323.epkg.Z IJ46051s3a.230323.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc,bos.mp64:7.2.5.100-7.2.5.106 bos.rte.serv_aid:7.2.5.100-7.2.5.102 bos.sysmgt.serv_aid:7.2.5.100-7.2.5.102,20230412, ,,https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar,CVE-2023-26286:8.4,no sec,vios,3.1.4.10,AIX is vulnerable to arbitrary command execution,IJ45245 / IJ46051 / IJ46110 / CVE-2023-26286,3.1.4.20,IJ45245s5a.230322.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc,bos.mp64:7.2.5.200-7.2.5.201 bos.rte.serv_aid:7.2.5.200-7.2.5.200 bos.sysmgt.serv_aid:7.2.5.200-7.2.5.200,20230412, ,,https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar,CVE-2023-26286:8.4,no sec,aix,7200-05-03 :: 7200-05-04 :: 7200-05-05,AIX is vulnerable to arbitrary command execution,IJ45245 / IJ46051 / IJ46110 / CVE-2023-26286,7200-05-06,IJ46051s1a.230323.epkg.Z IJ46051s2a.230323.epkg.Z IJ46051s3a.230323.epkg.Z IJ45245s3a.230324.epkg.Z IJ45245s4a.230324.epkg.Z IJ45245s5a.230322.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc,bos.mp64:7.2.5.0-7.2.5.6 bos.mp64:7.2.5.100-7.2.5.106 bos.mp64:7.2.5.200-7.2.5.201 bos.rte.serv_aid:7.2.5.0-7.2.5.4 bos.rte.serv_aid:7.2.5.100-7.2.5.102 bos.rte.serv_aid:7.2.5.200-7.2.5.200 bos.sysmgt.serv_aid:7.2.5.0-7.2.5.3 bos.sysmgt.serv_aid:7.2.5.100-7.2.5.102 bos.sysmgt.serv_aid:7.2.5.200-7.2.5.200,20230412, ,,https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar,CVE-2023-26286:8.4,no sec,aix,7300-01-01,AIX is vulnerable to arbitrary command execution,IJ45246 / CVE-2023-26286,7300-01-02,IJ45246s1a.230322.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc,bos.mp64:7.3.1.0-7.3.1.1 bos.rte.serv_aid:7.3.1.0-7.3.1.1 bos.sysmgt.serv_aid:7.3.1.0-7.3.1.0,20230412, ,,https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar,CVE-2023-26286:8.4,no hiper,aix,7100-05-09-2135 :: 7100-05-11-2246,Possible system crashes processing network traffic,IJ45294 / IJ45295,7100-05-12,IJ45294mBa.230410.AIX71TL05SP11.epkg.Z IJ45295mAa.230210.AIX71TL05SP10.epkg.Z IJ45294mAa.230218.AIX71TL05SP10.epkg.Z IJ45294mBa.230410.AIX71TL05SP11.epkg.Z,https://www.ibm.com/support/pages/node/6857545,bos.mp64:7.1.5.43-7.1.5.47 bos.net.tcp.client:7.1.5.38-7.1.5.42,20230217, ,,https://www.ibm.com/support/pages/apar/IJ45294/,,yes hiper,vios,3.1.2.30 :: 3.1.2.50,Possible system crashes processing network traffic,IJ45427 / IJ45429,3.1.2.60,IJ45427m4a.230217.VIOS3.1.2.40.epkg.Z IJ45427m2a.230509.VIOS3.1.2.50.epkg.Z IJ45429m4a.230218.VIOS3.1.2.40.epkg.Z,https://www.ibm.com/support/pages/node/6857545,bos.mp64:7.2.5.4- 7.2.5.6 bos.net.tcp.client_core:7.2.5.5-7.2.5.7,20230217, ,,https://aix.software.ibm.com/aix/ifixes/ij45429/,,yes sec,aix,7100-05-09 :: 7100-05-10 :: 7100-05-11,AIX is vulnerable to arbitrary command execution,IJ45981 / CVE-2023-26286,7100-05-12,IJ45981s9a.230324.epkg.Z IJ45981sAa.230323.epkg.Z IJ45981sBa.230407.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc,bos.mp64:7.1.5.0-7.1.5.47 bos.rte.serv_aid:7.1.5.0-7.1.5.36,20230412, ,,https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar,CVE-2023-26286:8.4,no sec,aix,7300-00-01 :: 7300-00-02 :: 7300-00-03,AIX is vulnerable to arbitrary command execution,IJ45997 / CVE-2023-26286,7300-00-04,IJ45997s1a.230322.epkg.Z IJ45997s2a.230322.epkg.Z IJ45997s3a.230322.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc,bos.mp64:7.3.0.0-7.3.0.4 bos.rte.serv_aid:7.3.0.0-7.3.0.2 bos.sysmgt.serv_aid:7.3.0.0-7.3.0.1,20230412, ,,https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar,CVE-2023-26286:8.4,no hiper,aix,7300-00-00 :: 7300-00-01-2038 :: 7300-00-02-2114 :: 7300-00-03-2136 :: 7300-00-03-2148 :: 7300-00-04-2220 :: 7300-00-03-2246 :: 7300-00-06-2320,Potential undetected data loss after running chvg -ky or chvg -g,IJ46487,7300-00-04,IJ46487s1a.230425.AIX73TL00SP01.epkg.Z IJ46487s2a.230425.AIX73TL00SP02.epkg.Z IJ46487s3a.230424.AIX73TL00SP03.epkg.Z IJ46541s5a.230424.AIX72TL05SP05.epkg.Z IJ46541s6a.230503.AIX72TL05SP06.epkg.Z IJ46542s1a.230424.AIX73TL01SP01.epkg.Z IJ46542s2a.230503.AIX73TL01SP02.epkg.Z IJ46576s4a.230426.AIX72TL05SP04.epkg.Z,https://www.ibm.com/support/pages/node/6985585,bos.rte.lvm:7.3.0.0-7.3.0.2,20230424, ,,https://aix.software.ibm.com/aix/ifixes/ij46487/,,no hiper,aix,7200-05-00 :: 7200-05-01-2038 :: 7200-05-02-2114 :: 7200-05-03-2136 :: 7200-05-03-2148 :: 7200-05-04-2220 :: 7200-05-05-2246 :: 7200-05-06-2320,Potential undetected data loss after running chvg -ky or chvg -g,IJ46541,7200-05-07,IJ46487s1a.230425.AIX73TL00SP01.epkg.Z IJ46487s2a.230425.AIX73TL00SP02.epkg.Z IJ46487s3a.230424.AIX73TL00SP03.epkg.Z IJ46541s5a.230424.AIX72TL05SP05.epkg.Z IJ46541s6a.230503.AIX72TL05SP06.epkg.Z IJ46542s1a.230424.AIX73TL01SP01.epkg.Z IJ46542s2a.230503.AIX73TL01SP02.epkg.Z IJ46576s4a.230426.AIX72TL05SP04.epkg.Z,https://www.ibm.com/support/pages/node/6985585,bos.rte.lvm:7.2.5.0-7.2.5.201,20230424, ,,https://aix.software.ibm.com/aix/ifixes/ij46487/,,no hiper,aix,7300-01-00 :: 7300-01-01-2246 :: 7300-01-02-2320,Potential undetected data loss after running chvg -ky or chvg -g,IJ46542,7300-01-03,IJ46487s1a.230425.AIX73TL00SP01.epkg.Z IJ46487s2a.230425.AIX73TL00SP02.epkg.Z IJ46487s3a.230424.AIX73TL00SP03.epkg.Z IJ46541s5a.230424.AIX72TL05SP05.epkg.Z IJ46541s6a.230503.AIX72TL05SP06.epkg.Z IJ46542s1a.230424.AIX73TL01SP01.epkg.Z IJ46542s2a.230503.AIX73TL01SP02.epkg.Z IJ46576s4a.230426.AIX72TL05SP04.epkg.Z,https://www.ibm.com/support/pages/node/6985585,bos.rte.lvm:7.3.1.0-7.3.1.2,20230424, ,,https://aix.software.ibm.com/aix/ifixes/ij46487/,,no hiper,vios,3.1.4.20 :: 3.1.4.21,LDAP user logins or connections stop working,IJ46694,3.1.4.30,IJ46694s6a.230509.AIX72TL05SP06.epkg.Z IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z IJ46727s2a.230509.AIX73TL01SP02.epkg.Z,https://www.ibm.com/support/pages/node/7000043,bos.rte.security:7.2.5.201-7.2.5.201,20230602, ,,https://aix.software.ibm.com/aix/ifixes/ij46694/,,no hiper,aix,7200-05-06-2319 :: 7200-05-06-2320,LDAP user logins or connections stop working,IJ46694,7200-05-07,IJ46694s6a.230509.AIX72TL05SP06.epkg.Z IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z IJ46727s2a.230509.AIX73TL01SP02.epkg.Z,https://www.ibm.com/support/pages/node/7000043,bos.rte.security:7.2.5.201-7.2.5.201,20230602, ,,https://aix.software.ibm.com/aix/ifixes/ij46694/,,no hiper,aix,7300-01-02-2319 :: AIX 7300-01-02-2320,LDAP user logins or connections stop working,IJ46727,7300-01-03,IJ46694s6a.230509.AIX72TL05SP06.epkg.Z IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z IJ46727s2a.230509.AIX73TL01SP02.epkg.Z,https://www.ibm.com/support/pages/node/7000043,bos.rte.security:7.3.1.1-7.3.1.1,20230602, ,,https://aix.software.ibm.com/aix/ifixes/ij46694/,,no sec,vios,3.1.4.10 :: 3.1.4.21,AIX is vulnerable to a denial of service due to libxml2,IJ47597 / CVE-2023-28484 / CVE-2023-29469,3.1.4.30,IJ47597m6a.230717.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc,bos.rte.control:7.2.5.200-7.2.5.201,20230725, ,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar,CVE-2023-28484:5.5 / CVE-2023-29469:5.5,no sec,aix,7200-05-04 :: 7200-05-05 :: 7200-05-06,AIX is vulnerable to a denial of service due to libxml2,IJ47597 / CVE-2023-28484 / CVE-2023-29469,7200-05-07,IJ47597m4a.230718.epkg.Z IJ47597m6a.230717.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc,bos.rte.control:7.2.5.0-7.2.5.6 bos.rte.control:7.2.5.100-7.2.5.103 bos.rte.control:7.2.5.200-7.2.5.201,20230725, ,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar,CVE-2023-28484:5.5 / CVE-2023-29469:5.5,no sec,aix,7300-00-02 :: 7300-00-03 :: 7300-00-04,AIX is vulnerable to a denial of service due to libxml2,IJ47629 / CVE-2023-28484 / CVE-2023-29469,See Bulletin,IJ47629m4a.230718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc,bos.rte.control:7.3.0.0-7.3.0.3,20230725, ,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar,CVE-2023-28484:5.5 / CVE-2023-29469:5.5,no sec,aix,7300-01-01 :: 7300-01-02,AIX is vulnerable to a denial of service due to libxml2,IJ47630 / CVE-2023-28484 / CVE-2023-29469,7300-01-03,IJ47630m2a.230718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc,bos.rte.control:7.3.1.0-7.3.1.1,20230725, ,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar,CVE-2023-28484:5.5 / CVE-2023-29469:5.5,no sec,vios,3.1.2.40 :: 3.1.2.50 :: 3.1.2.60,AIX is vulnerable to a denial of service due to libxml2,IJ47631 / CVE-2023-28484 / CVE-2023-29469,See Bulletin,IJ47631m6a.230718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc,bos.rte.control:7.2.5.0-7.2.5.6,20230725, ,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar,CVE-2023-28484:5.5 / CVE-2023-29469:5.5,no sec,vios,3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,AIX is vulnerable to a denial of service due to libxml2,IJ47632 / CVE-2023-28484 / CVE-2023-29469,3.1.3.50,IJ47632m4a.230718.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc,bos.rte.control:7.2.5.100-7.2.5.103,20230725, ,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar,CVE-2023-28484:5.5 / CVE-2023-29469:5.5,no hiper,aix,7300-01-00 :: 7300-01-02-2320,Potential undetected data loss by using zlibNX,IJ47907,7300-01-03,IJ47907s2a.230907.AIX73TL01SP02.epkg.Z IJ48340s6a.230907.AIX72TL05SP06.epkg.Z IJ48416s4a.230907.AIX73TL00SP04.epkg.Z,https://www.ibm.com/support/pages/node/7028659,zlibNX.rte:7.3.1.0-7.3.1.1,20230911, ,,https://aix.software.ibm.com/aix/ifixes/ij47907/,,no sec,vios,3.1.4.10 :: 3.1.4.21,AIX is vulnerable to denial of service due to AIXWindows,IJ48252 / CVE-2023-45172,3.1.4.30,IJ48252s6a.230928.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc,X11.base.smt:7.2.3.0-7.2.3.15,20231218, ,,https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar,CVE-2023-45172:6.2,no sec,aix,7200-05-05 :: 7200-05-06,AIX is vulnerable to denial of service due to AIXWindows,IJ48252 / CVE-2023-45172,7200-05-07,IJ48252s6a.230928.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc,X11.base.smt:7.2.3.0-7.2.3.15,20231218, ,,https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar,CVE-2023-45172:6.2,no sec,vios,3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,AIX is vulnerable to denial of service due to AIXWindows,IJ48252 / CVE-2023-45172,See Bulletin,IJ48252s6a.230928.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc,X11.base.smt:7.2.3.0-7.2.3.15,20231218, ,,https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar,CVE-2023-45172:6.2,no hiper,aix,7200-05-00 :: 7200-05-06-2320,Potential undetected data loss by using zlibNX,IJ48340,7200-05-07,IJ47907s2a.230907.AIX73TL01SP02.epkg.Z IJ48340s6a.230907.AIX72TL05SP06.epkg.Z IJ48416s4a.230907.AIX73TL00SP04.epkg.Z,https://www.ibm.com/support/pages/node/7028659,zlibNX.rte:7.2.4.0-7.2.4.9,20230911, ,,https://aix.software.ibm.com/aix/ifixes/ij47907/,,no hiper,aix,7300-00-00 :: 7300-00-04-2320,Potential undetected data loss by using zlibNX,IJ48416,See Bulletin,IJ47907s2a.230907.AIX73TL01SP02.epkg.Z IJ48340s6a.230907.AIX72TL05SP06.epkg.Z IJ48416s4a.230907.AIX73TL00SP04.epkg.Z,https://www.ibm.com/support/pages/node/7028659,zlibNX.rte:7.3.0.0-7.3.0.3,20230911, ,,https://aix.software.ibm.com/aix/ifixes/ij47907/,,no sec,vios,3.1.4.10 :: 3.1.4.21,AIX is vulnerable to privilege escalation and denial of service,IJ48481 / CVE-2023-45166 / CVE-2023-45170 / CVE-2023-45174,3.1.4.30,IJ48481m5a.231207.epkg.Z IJ48481m5b.240202.epkg.Z IJ48481m6a.230927.epkg.Z IJ48481m6b.240130.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc,bos.rte.printers:7.2.5.200-7.2.5.201 printers.rte:7.2.5.200-7.2.5.201,20231212,20240203,,https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar,CVE-2023-45166:8.4 / CVE-2023-45170:8.4 / CVE-2023-45174:8.4,no sec,aix,7200-05-05 :: 7200-05-06,AIX is vulnerable to privilege escalation and denial of service,IJ48481 / CVE-2023-45166 / CVE-2023-45170 / CVE-2023-45174,7200-05-07,IJ48481m5a.231207.epkg.Z IJ48481m5b.240202.epkg.Z IJ48481m6a.230927.epkg.Z IJ48481m6b.240130.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc,bos.rte.printers:7.2.5.0-7.2.5.101 bos.rte.printers:7.2.5.200-7.2.5.201 printers.rte:7.2.5.200-7.2.5.201,20231212,20240203,,https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar,CVE-2023-45166:8.4 / CVE-2023-45170:8.4 / CVE-2023-45174:8.4,no sec,aix,7300-01-01 :: 7300-01-02,AIX is vulnerable to privilege escalation and denial of service,IJ48539 / CVE-2023-45166 / CVE-2023-45170 / CVE-2023-45174,7300-01-03,IJ48539m1a.231207.epkg.Z IJ48539m1b.240202.epkg.Z IJ48539m2a.230928.epkg.Z IJ48539m2b.240202.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc,bos.rte.printers:7.3.1.0-7.3.1.1 printers.rte:7.3.1.0-7.3.1.1,20231212,20240203,,https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar,CVE-2023-45166:8.4 / CVE-2023-45170:8.4 / CVE-2023-45174:8.4,no sec,aix,7300-01-01 :: 7300-01-02,AIX is vulnerable to denial of service due to AIXWindows,IJ48540 / CVE-2023-45172,7300-01-03,IJ48540s2a.230928.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc,X11.base.smt:7.3.1.0-7.3.1.0,20231218, ,,https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar,CVE-2023-45172:6.2,no sec,vios,3.1.4.10 :: 3.1.4.21,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ48608 / CVE-2023-45171 / CVE-2023-45175,3.1.4.30,IJ48608m5a.231219.epkg.Z IJ48608m5b.240109.epkg.Z IJ48608s6a.230926.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.mp64:7.2.5.200-7.2.5.203,20240104,20240110,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45171:6.2 / CVE-2023-45175:6.2,yes sec,aix,7200-05-05 :: 7200-05-06,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ48608 / CVE-2023-45171 / CVE-2023-45175,7200-05-07,IJ48608m5a.231219.epkg.Z IJ48608m5b.240109.epkg.Z IJ48608s6a.230926.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.mp64:7.2.5.0-7.2.5.7 bos.mp64:7.2.5.100-7.2.5.107 bos.mp64:7.2.5.200-7.2.5.203,20240104,20240110,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45171:6.2 / CVE-2023-45175:6.2,yes sec,aix,7300-01-01 :: 7300-01-02,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ48618 / CVE-2023-45171 / CVE-2023-45175,7300-01-03,IJ48618m1a.231219.epkg.Z IJ48618m1b.240109.epkg.Z IJ48618m2a.231213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.mp64:7.3.1.0-7.3.1.3,20240104,20240110,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45171:6.2 / CVE-2023-45175:6.2,yes sec,vios,3.1.4.10 :: 3.1.4.21,AIX is vulnerable to denial of service vulnerabilities - pmsvcs,IJ48663 / CVE-2023-45169,3.1.4.30,IJ48663s5a.230926.epkg.Z IJ48663s6a.230926.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.pmapi.pmsvcs:7.2.5.200-7.2.5.201,20240104, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45169:6.2,yes sec,aix,7200-05-05 :: 7200-05-06,AIX is vulnerable to denial of service vulnerabilities - pmsvcs,IJ48663 / CVE-2023-45169,7200-05-07,IJ48663s5a.230926.epkg.Z IJ48663s6a.230926.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.pmapi.pmsvcs:7.2.5.0-7.2.5.4 bos.pmapi.pmsvcs:7.2.5.100-7.2.5.102 bos.pmapi.pmsvcs:7.2.5.200-7.2.5.201,20240104, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45169:6.2,yes sec,vios,3.1.4.10 :: 3.1.4.21,AIX is vulnerable to denial of service vulnerabilities - NFS,IJ48671 / CVE-2023-45173,3.1.4.30,IJ48671s6a.230927.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.net.nfs.client:7.2.5.200-7.2.5.201,20240104, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45173:6.2,yes sec,aix,7200-05-05 :: 7200-05-06,AIX is vulnerable to denial of service vulnerabilities - NFS,IJ48671 / CVE-2023-45173,7200-05-07,IJ48671s6a.230927.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.net.nfs.client:7.2.5.0-7.2.5.4 bos.net.nfs.client:7.2.5.100-7.2.5.102 bos.net.nfs.client:7.2.5.200-7.2.5.201,20240104, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45173:6.2,yes sec,aix,7300-01-01 :: 7300-01-02,AIX is vulnerable to denial of service vulnerabilities - pmsvcs,IJ48724 / CVE-2023-45169,7300-01-03,IJ48724s1a.230926.epkg.Z IJ48724s2a.230926.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.pmapi.pmsvcs:7.3.1.0-7.3.1.1,20240104, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45169:6.2,yes sec,aix,7300-01-01 :: 7300-01-02,AIX is vulnerable to denial of service vulnerabilities - NFS,IJ48725 / CVE-2023-45173,7300-01-03,IJ48725s1a.230927.epkg.Z IJ48725s2a.230927.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.net.nfs.client:7.3.1.0-7.3.1.1,20240104, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45173:6.2,yes sec,aix,7300-00-02 :: 7300-00-03 :: 7300-00-04,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ48735 / CVE-2023-45171 / CVE-2023-45175,See Bulletin,IJ48735m2a.231219.epkg.Z IJ48735m2b.240109.epkg.Z IJ48735m3a.231219.epkg.Z IJ48735m3b.240109.epkg.Z IJ48735s4a.230926.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.mp64:7.3.0.0-7.3.0.5,20240104,20240110,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45171:6.2 / CVE-2023-45175:6.2,yes sec,aix,7300-00-02 :: 7300-00-03 :: 7300-00-04,AIX is vulnerable to denial of service vulnerabilities - pmsvcs,IJ48737 / CVE-2023-45169,See Bulletin,IJ48737s3a.230926.epkg.Z IJ48737s4a.230926.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.pmapi.pmsvcs:7.3.0.0-7.3.0.3,20240104, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45169:6.2,yes sec,aix,7300-00-02 :: 7300-00-03 :: 7300-00-04,AIX is vulnerable to denial of service vulnerabilities - NFS,IJ48741 / CVE-2023-45173,See Bulletin,IJ48741m2a.231219.epkg.Z IJ48741s4a.230927.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.net.nfs.client:7.3.0.0-7.3.0.3,20240104, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45173:6.2,yes sec,aix,7300-00-02 :: 7300-00-03 :: 7300-00-04,AIX is vulnerable to denial of service due to AIXWindows,IJ48758 / CVE-2023-45172,See Bulletin,IJ48758s4a.230928.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc,X11.base.smt:7.3.0.0-7.3.0.0,20231218, ,,https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar,CVE-2023-45172:6.2,no sec,aix,7300-00-02 :: 7300-00-03 :: 7300-00-04,AIX is vulnerable to privilege escalation and denial of service,IJ48784 / CVE-2023-45166 / CVE-2023-45170 / CVE-2023-45174,See Bulletin,IJ48784m2a.231207.epkg.Z IJ48784m2b.240202.epkg.Z IJ48784m3a.231207.epkg.Z IJ48784m3b.240202.epkg.Z IJ48784m4a.231002.epkg.Z IJ48784m4b.240202.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc,bos.rte.printers:7.3.0.0-7.3.0.2 printers.rte:7.3.0.0-7.3.0.2,20231212,20240203,,https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar,CVE-2023-45166:8.4 / CVE-2023-45170:8.4 / CVE-2023-45174:8.4,no sec,vios,3.1.4.10 :: 3.1.4.21 :: 3.1.4.31,AIX is vulnerable to denial of service due to ISC BIND,IJ49094 / IJ49093 / CVE-2023-3341,3.1.4.40,IJ49094s4.231110.epkg.Z IJ49093s7.231109.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc,bos.net.tcp.bind:7.2.5.200-7.2.5.200,20231218, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar,CVE-2023-3341:7.5,no sec,aix,7200-05-05 :: 7200-05-06 :: 7200-05-07,AIX is vulnerable to denial of service due to ISC BIND,IJ49094 / IJ49093 / CVE-2023-3341,7200-05-08,IJ49094s4.231110.epkg.Z IJ49093s7.231109.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc,bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind:7.2.5.200-7.2.5.200,20231218, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar,CVE-2023-3341:7.5,no sec,vios,3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,AIX is vulnerable to denial of service due to ISC BIND,IJ49094 / IJ49093 / CVE-2023-3341,See Bulletin,IJ49094s4.231110.epkg.Z IJ49093s7.231109.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc,bos.net.tcp.bind:7.2.5.100-7.2.5.101,20231218, ,,https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar,CVE-2023-3341:7.5,no sec,vios,3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,AIX is vulnerable to denial of service vulnerabilities - kernel,IJ49202 / CVE-2023-45171 / CVE-2023-45175,See Bulletin,IJ49202m2a.231219.epkg.Z IJ49202m2b.240109.epkg.Z IJ49202m3a.231219.epkg.Z IJ49202m3b.240109.epkg.Z IJ49202s4a.231120.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.mp64:7.2.5.100-7.2.5.107,20240104,20240110,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45171:6.2 / CVE-2023-45175:6.2,yes sec,vios,3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,AIX is vulnerable to privilege escalation and denial of service,IJ49461 / CVE-2023-45166 / CVE-2023-45170 / CVE-2023-45174,See Bulletin,IJ49461m2a.231207.epkg.Z IJ49461m2c.240202.epkg.Z IJ49461m4a.231207.epkg.Z IJ49461m4b.240202.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc,bos.rte.printers:7.2.5.100-7.2.5.101,20231212,20240203,,https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar,CVE-2023-45166:8.4 / CVE-2023-45170:8.4 / CVE-2023-45174:8.4,no sec,vios,3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,AIX is vulnerable to denial of service vulnerabilities - NFS,IJ49533 / CVE-2023-45173,See Bulletin,IJ49533m4a.231219.epkg.Z IJ49533s4a.231219.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.net.nfs.client:7.2.5.100-7.2.5.102,20240104, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45173:6.2,yes sec,vios,3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,AIX is vulnerable to denial of service vulnerabilities - pmsvcs,IJ49534 / CVE-2023-45169,See Bulletin,IJ49534s3a.231213.epkg.Z IJ49534s4a.231213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc,bos.pmapi.pmsvcs:7.2.5.100-7.2.5.102,20240104, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar,CVE-2023-45169:6.2,yes hiper,aix,7300-02-00 :: 7300-02-01,Print queue status does not update,IJ49882,7300-02-02,IJ49882s1a.240129.AIX73TL02SP00-01.epkg.Z,https://www.ibm.com/support/pages/node/7131625,bos.rte.printers:7.3.2.0-7.3.2.0,20240312, ,,http://aix.software.ibm.com/aix/ifixes/ij49737/,,no hiper,aix,7200-05-07,Print queue status does not update,IJ49883,7200-05-08,IJ49883s7a.240129.AIX72TL05SP07.epkg.Z,https://www.ibm.com/support/pages/node/7131625,bos.rte.printers:7.2.5.202-7.2.5.202,20240312, ,,http://aix.software.ibm.com/aix/ifixes/ij49737/,,no hiper,aix,7300-01-03,Print queue status does not update,IJ49914,7300-01-04,IJ49914s3a.240311.AIX73TL01SP03.epkg.Z,https://www.ibm.com/support/pages/node/7131625,bos.rte.printers:7.3.1.2-7.3.1.2,20240312, ,,http://aix.software.ibm.com/aix/ifixes/ij49737/,,no hiper,vios,3.1.4.0 :: 3.1.4.10 :: 3.1.4.20 :: 3.1.4.21 :: 3.1.4.30 :: 3.1.4.31,Unable to login as padmin after VIOS 4.1 upgrade,IJ50326,3.1.4.40,IJ50326m5b.240402.VIOS3.1.4.10.epkg.Z IJ50326m6c.240402.VIOS3.1.4.21.epkg.Z IJ50326s7b.240401.VIOS.3.1.4.31.epkg.Z,https://www.ibm.com/support/pages/node/7145269,ios.cli.rte:7.2.5.200-7.2.5.205,20240402, ,,https://aix.software.ibm.com/aix/ifixes/ij50326/,,no sec,vios,3.1.4.10 :: 3.1.4.21 :: 3.1.4.31,AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765),IJ50424 / CVE-2023-51765,3.1.4.40,IJ50424s7a.240315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc,bos.net.tcp.sendmail:7.2.5.200-7.2.5.200,20240411, ,,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar,CVE-2023-51765:6.5,no sec,aix,7200-05-05 :: 7200-05-06 :: 7200-05-07,AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765),IJ50424 / CVE-2023-51765,7200-05-08,IJ50424s7a.240315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc,bos.net.tcp.sendmail:7.2.5.0-7.2.5.101 bos.net.tcp.sendmail:7.2.5.200-7.2.5.200,20240411, ,,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar,CVE-2023-51765:6.5,no sec,vios,4.1.0.10,AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765),IJ50428 / CVE-2023-51765,4.1.0.20,IJ50428s1a.240315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc,bos.net.tcp.sendmail:7.3.2.0-7.3.2.0,20240411, ,,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar,CVE-2023-51765:6.5,no sec,aix,7300-02-01,AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765),IJ50428 / CVE-2023-51765,7300-02-02,IJ50428s1a.240315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc,bos.net.tcp.sendmail:7.3.2.0-7.3.2.0,20240411, ,,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar,CVE-2023-51765:6.5,no sec,aix,7300-01-01 :: 7300-01-02 :: 7300-01-03,AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765),IJ50432 / CVE-2023-51765,7300-01-04,IJ50432s3a.240315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc,bos.net.tcp.sendmail:7.3.1.0-7.3.1.0,20240411, ,,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar,CVE-2023-51765:6.5,no sec,aix,7300-00-02 :: 7300-00-03 :: 7300-00-04,AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765),IJ50433 / CVE-2023-51765,See Bulletin,IJ50433s4a.240315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc,bos.net.tcp.sendmail:7.3.0.0-7.3.0.0,20240411, ,,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar,CVE-2023-51765:6.5,no hiper,vios,3.1.3.0 :: 3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,Unable to login as padmin after VIOS 4.1 upgrade,IJ50453,See Bulletin,IJ50453m4b.240401.VIOS3.1.3.40.epkg.Z,https://www.ibm.com/support/pages/node/7145269,ios.cli.rte:7.2.5.0-7.2.5.107,20240402, ,,https://aix.software.ibm.com/aix/ifixes/ij50326/,,no sec,vios,3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765),IJ50508 / CVE-2023-51765,See Bulletin,IJ50508s1a.240325.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc,bos.net.tcp.sendmail:7.2.5.100-7.2.5.101,20240411, ,,https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar,CVE-2023-51765:6.5,no sec,vios,4.1.0.10,AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062),IJ50601 / CVE-2024-25062,4.1.0.20,IJ50601s1a.240409.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc,bos.rte.control:7.3.2.0-7.3.2.0,20240508,20240604,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar,CVE-2024-25062:5.5,no sec,aix,7300-02-01,AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062),IJ50601 / CVE-2024-25062,7300-02-02,IJ50601s1a.240409.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc,bos.rte.control:7.3.2.0-7.3.2.0,20240508,20240604,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar,CVE-2024-25062:5.5,no sec,vios,3.1.4.10 :: 3.1.4.21 :: 3.1.4.31,AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062),IJ50602 / CVE-2024-25062,3.1.4.40,IJ50602m7a.240409.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc,bos.rte.control:7.2.5.200-7.2.5.202,20240508,20240604,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar,CVE-2024-25062:5.5,no sec,aix,7200-05-05 :: 7200-05-06 :: 7200-05-07,AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062),IJ50602 / CVE-2024-25062,7200-05-08,IJ50602m7a.240409.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc,bos.rte.control:7.2.5.0-7.2.5.102 bos.rte.control:7.2.5.200-7.2.5.202,20240508,20240604,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar,CVE-2024-25062:5.5,no sec,aix,7300-01-01 :: 7300-01-02 :: 7300-01-03,AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062),IJ50635 / CVE-2024-25062,7300-01-04,IJ50635m3a.240409.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc,bos.rte.control:7.3.1.0-7.3.1.2,20240508,20240604,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar,CVE-2024-25062:5.5,no sec,aix,7300-00-02 :: 7300-00-03 :: 7300-00-04,AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062),IJ50827 / CVE-2024-25062,See Bulletin,IJ50827m4a.240409.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc,bos.rte.control:7.3.0.0-7.3.0.3,20240508,20240604,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar,CVE-2024-25062:5.5,no sec,vios,3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062),IJ50828 / CVE-2024-25062,See Bulletin,IJ50828m4a.240409.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc,,20240508,20240604,,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar,CVE-2024-25062:5.5,no sec,vios,3.1.4.10 :: 3.1.4.21 :: 3.1.4.31,AIX is vulnerable to privilege escalation (CVE-2024-27273),IJ50910 / CVE-2024-27273,3.1.4.40,IJ50910m5a.240502.epkg.Z IJ50910m6a.240502.epkg.Z IJ50910s7a.240418.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc,bos.mp64:7.2.5.200-7.2.5.205,20240506, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar,CVE-2024-27273:8.1,yes sec,aix,7200-05-05 :: 7200-05-06 :: 7200-05-07,AIX is vulnerable to privilege escalation (CVE-2024-27273),IJ50910 / CVE-2024-27273,7200-05-08,IJ50910m5a.240502.epkg.Z IJ50910m6a.240502.epkg.Z IJ50910s7a.240418.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc,bos.mp64:7.2.5.0-7.2.5.107 bos.mp64:7.2.5.200-7.2.5.205,20240506, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar,CVE-2024-27273:8.1,yes sec,vios,4.1.0.10,AIX is vulnerable to privilege escalation (CVE-2024-27273),IJ50934 / CVE-2024-27273,4.1.0.20,IJ50934s1a.240418.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc,bos.mp64:7.3.2.0-7.3.2.1,20240506, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar,CVE-2024-27273:8.1,yes sec,aix,7300-02-01,AIX is vulnerable to privilege escalation (CVE-2024-27273),IJ50934 / CVE-2024-27273,7300-02-02,IJ50934s1a.240418.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc,bos.mp64:7.3.2.0-7.3.2.1,20240506, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar,CVE-2024-27273:8.1,yes sec,aix,7300-01-01 :: 7300-01-02 :: 7300-01-03,AIX is vulnerable to privilege escalation (CVE-2024-27273),IJ50935 / CVE-2024-27273,7300-01-04,IJ50935m1a.240502.epkg.Z IJ50935m2a.240502.epkg.Z IJ50935s3a.240418.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc,bos.mp64:7.3.1.0-7.3.1.4,20240506, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar,CVE-2024-27273:8.1,yes sec,aix,7300-00-02 :: 7300-00-03 :: 7300-00-04,AIX is vulnerable to privilege escalation (CVE-2024-27273),IJ50936 / CVE-2024-27273,See Bulletin,IJ50936m2a.240502.epkg.Z IJ50936m3a.240502.epkg.Z IJ50936m4a.240502.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc,bos.mp64:7.3.0.0-7.3.0.5,20240506, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar,CVE-2024-27273:8.1,yes sec,vios,3.1.3.21 :: 3.1.3.30 :: 3.1.3.40,AIX is vulnerable to privilege escalation (CVE-2024-27273),IJ50937 / CVE-2024-27273,See Bulletin,IJ50937m2a.240502.epkg.Z IJ50937m3a.240502.epkg.Z IJ50937m4a.240502.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc,,20240506, ,,https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar,CVE-2024-27273:8.1,yes hiper,vios,3.1.4.40 :: 3.1.4.41,Some 10GbE/40GbE RoCE adapters do not configure,IJ51639,3.1.4.50,IJ51639s8a.240718.VIOS3.1.4.40-41.epkg.Z,https://www.ibm.com/support/pages/node/7159650,devices.ethernet.mlx.rte:7.2.5.202-7.2.5.202,20240730, ,,http://aix.software.ibm.com/aix/ifixes/ij51639/,,yes hiper,aix,7200-05-08-2419 :: 7200-05-08-2420,Some 10GbE/40GbE RoCE adapters do not configure,IJ51639,7200-05-09,IJ51639s8a.240718.AIX72TL05SP08.epkg.Z,https://www.ibm.com/support/pages/node/7159650,devices.ethernet.mlx.rte:7.2.5.202-7.2.5.202,20240730, ,,http://aix.software.ibm.com/aix/ifixes/ij51639/,,yes hiper,vios,4.1.0.20 :: 4.1.0.21,Some 10GbE/40GbE RoCE adapters do not configure,IJ51842,4.1.1.0,IJ51842s2a.240718.VIOS4.1.0.20-21.epkg.Z,https://www.ibm.com/support/pages/node/7159650,devices.ethernet.mlx.rte:7.3.2.1-7.3.2.1,20240730, ,,http://aix.software.ibm.com/aix/ifixes/ij51639/,,yes hiper,aix,7300-02-02-2419 :: 7300-02-02-2420,Some 10GbE/40GbE RoCE adapters do not configure,IJ51842,7300-02-03,IJ51842s2a.240718.AIX73TL02SP02.epkg.Z,https://www.ibm.com/support/pages/node/7159650,devices.ethernet.mlx.rte:7.3.2.1-7.3.2.1,20240730, ,,http://aix.software.ibm.com/aix/ifixes/ij51639/,,yes hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06,SYSTEM CRASH IN NETINFO_UNIXDOMNLIST,IV09793,6100-06-07,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV09793,bos.mp64:6.1.6.0-6.1.6.17,20111025,20130226,6100-05:IV12592 6100-06:IV09793 6100-07:IV09981 6100-08:IV10663 7100-00:IV20295 7100-01:IV09942,n/a, ,no hiper,aix,7100-01-00,SYSTEM CRASH IN NETINFO_UNIXDOMNLIST,IV09942,7100-01-04,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV09942,bos.mp64:7.1.1.0-7.1.1.15,20111031,20130226,6100-05:IV12592 6100-06:IV09793 6100-07:IV09981 6100-08:IV10663 7100-00:IV20295 7100-01:IV09942,n/a, ,no hiper,aix,6100-07-00 :: 6100-07-01,SYSTEM CRASH IN NETINFO_UNIXDOMNLIST,IV09981,6100-07-02,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV09981,bos.mp64:6.1.7.0-6.1.7.1,20111031,20130226,6100-05:IV12592 6100-06:IV09793 6100-07:IV09981 6100-08:IV10663 7100-00:IV20295 7100-01:IV09942,n/a, ,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11 :: 6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08 :: 6100-05-09 :: 6100-05-10 :: 6100-05-11,Perl Digest Module Digest->new() Code Injection,IV10197 / CVE-2011-3597,6100-09-00,n/a,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163800&label=UPDATE%20-%20AIX%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597,perl.rte:5.8.8.0-5.8.8.122,20111122,20130125,6100-08:IV10197 7100-02:IV10197,https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar,CVE-2011-3597:7.5,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09,Perl Digest Module Digest->new() Code Injection,IV10197 / CVE-2011-3597,7100-03-00,n/a,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163800&label=UPDATE%20-%20AIX%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597,perl.rte:5.10.1.0-5.10.1.150,20111122,20130125,6100-08:IV10197 7100-02:IV10197,https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar,CVE-2011-3597:7.5,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7,Perl Digest Module Digest->new() Code Injection,IV10197 / CVE-2011-3597,2.2.3.0,n/a,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201301/SECURITY/20130128/datafile163800&label=UPDATE%20-%20VIOS%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597,perl.rte:5.8.8.0-5.8.8.122,20111122,20130125,6100-08:IV10197 7100-02:IV10197,https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar,CVE-2011-3597:7.5,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06,AIX NFSv4 vulnerability,IV10327 / CVE-2012-4817,6100-06-07,6100-06-07,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120913/datafile151835&label=AIX%20NFSv4%20Vulnerability%20CVE-2012-4817,bos.net.nfs.client:6.1.6.0-6.1.6.17,20120913, ,6100-05:IV09495 6100-06:IV10327 6100-07:IV11629 6100-08:IV11511 7100-00:IV26436 7100-01:IV12169 7100-02:IV11502,https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar,CVE-2012-4817:5,yes sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02,AIX NFSv4 vulnerability,IV11629 / CVE-2012-4817,6100-07-03,6100-07-03,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120913/datafile151835&label=AIX%20NFSv4%20Vulnerability%20CVE-2012-4817,bos.net.nfs.client:6.1.7.0-6.1.7.2,20120913, ,6100-05:IV09495 6100-06:IV10327 6100-07:IV11629 6100-08:IV11511 7100-00:IV26436 7100-01:IV12169 7100-02:IV11502,https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar,CVE-2012-4817:5,yes sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03,AIX NFSv4 vulnerability,IV12169 / CVE-2012-4817,7100-01-04,IV26436s07.120907.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120913/datafile151835&label=AIX%20NFSv4%20Vulnerability%20CVE-2012-4817,bos.net.nfs.client:7.1.1.0-7.1.1.3,20120913, ,6100-05:IV09495 6100-06:IV10327 6100-07:IV11629 6100-08:IV11511 7100-00:IV26436 7100-01:IV12169 7100-02:IV11502,https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar,CVE-2012-4817:5,yes hiper,aix,6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08,SYSTEM CRASH IN NETINFO_UNIXDOMNLIST,IV12592,6100-05-09,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV12592,bos.mp64:6.1.5.0-6.1.5.10,20111228,20130226,6100-05:IV12592 6100-06:IV09793 6100-07:IV09981 6100-08:IV10663 7100-00:IV20295 7100-01:IV09942,n/a, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03,TCP RETRANSMIT PROCESSING IS VERY SLOW,IV13121,7100-01-04,IV20595m05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV13121,bos.net.tcp.client:7.1.1.0-7.1.1.3,20120207,20130226,6100-06:IV18483 6100-07:IV14297 6100-08:IV14524 7100-01:IV13121 7100-02:IV15184,ftp://public.dhe.ibm.com/aix/ifixes/iv13121/, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07,SYSTEM CRASH IN E_CLEAR_WAIT().,IV13404,6100-07-08,U859173 bos.mp64:6.1.7.19,http://www-01.ibm.com/support/docview.wss?uid=isg1IV13404,bos.mp64:6.1.7.0-6.1.7.18,20120118,20131124,6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412,ftp://public.dhe.ibm.com/aix/ifixes/iv13404/, ,no hiper,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08,SYSTEM CRASH IN E_CLEAR_WAIT().,IV13405, ,IV13405s8a.130805.53TL12SP08.epkg.Z / IV13405s8a.130805.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV13405,bos.mp:5.3.12.9 bos.mp64:5.3.12.9,20120118,20130805,http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo140901,ftp://public.dhe.ibm.com/aix/ifixes/iv13405/, ,no sec,aix,6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08,Vulnerability in AIX TCP stack,IV13751 / CV-2012-0194,6100-05-09,61JSP7_IV13751s07.120126.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc,bos.net.tcp.client:6.1.5.0-6.1.5.8,20120203,20131212,7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827,https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar,CVE-2012-0194:7.1,yes sec,vios,2.1.3.10 :: 2.1.3.0 :: 2.1.2.13 :: 2.1.2.12 :: 2.1.2.11 :: 2.1.2.0 :: 2.1.1.10 :: 2.1.1.0,Vulnerability in VIOS TCP stack,IV13751 / CV-2012-0194,2.2.1.4,61JVIOS_IV13751s01.120206.epkg.Z / 61HVIOS_IV13751s03.120204.epkg.Z / 61FVIOS_IV13751s1.120205.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc,bos.net.tcp.client:6.1.5.0-6.1.5.8,20120203,20131212,7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827,https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar,CVE-2012-0194:7.1,yes sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07,Vulnerability in AIX TCP stack,IV13820 / CV-2012-0194,6100-06-08,61NSP6_IV13820s06.120126.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc,bos.net.tcp.client:6.1.6.0-6.1.6.17,20120203,20131212,7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827,https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar,CVE-2012-0194:7.1,yes sec,vios,2.2.0.0 :: 2.2.0.10 :: 2.2.0.11 :: 2.2.0.12 :: 2.2.0.13,Vulnerability in VIOS TCP stack,IV13820 / CV-2012-0194,2.2.1.4,61NVIOS_IV13820s.120204.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc,bos.net.tcp.client:6.1.6.0-6.1.6.17,20120203,20131212,7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827,https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar,CVE-2012-0194:7.1,yes sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05,Vulnerability in AIX TCP stack,IV13827 / CV-2012-0194,5300-12-06,53XSP5_IV13827s05.120204.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc,bos.net.tcp.client:5.3.12.0-5.3.12.5,20120203,20131212,7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827,ftp://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar,CVE-2012-0194:7.1,yes sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3,Vulnerability in VIOS TCP stack,IV13827 / CV-2012-0194,2.2.1.4,61QS02_IV14209s02.120126.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc,bos.net.tcp.client:6.1.7.0-6.1.7.3,20120203,20131212,7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827,https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar,CVE-2012-0194:7.1,yes sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03,Vulnerability in AIX TCP stack,IV14209 / CV-2012-0194,6100-07-04,61QS02_IV14209s02.120126.epkg.Z / IV14209s03.120228.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc,bos.net.tcp.client:6.1.7.0-6.1.7.3,20120203,20131212,7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827,https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar,CVE-2012-0194:7.1,yes sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04,Vulnerability in AIX TCP stack,IV14210 / CV-2012-0194,7100-00-05,71BSP4_IV14210s04.120129.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc,bos.net.tcp.client:7.1.0.0-7.1.0.17,20120203,20131212,7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827,https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar,CVE-2012-0194:7.1,yes sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03,Vulnerability in AIX TCP stack,IV14211 / CV-2012-0194,7100-01-04,IV14211s03.120228.epkg.Z / 71DSP2_IV14211s02.120126.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc,bos.net.tcp.client:7.1.1.0-7.1.1.3,20120203,20131212,7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827,https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar,CVE-2012-0194:7.1,yes hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03,TCP RETRANSMIT PROCESSING IS VERY SLOW,IV14297,6100-07-04,IV14297s03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV14297,bos.net.tcp.client:6.1.7.0-6.1.7.14,20120128,20130226,6100-06:IV18483 6100-07:IV14297 6100-08:IV14524 7100-01:IV13121 7100-02:IV15184,ftp://public.dhe.ibm.com/aix/ifixes/iv14297/, ,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02,SYSTEM CRASH IN E_CLEAR_WAIT().,IV14309,6100-08-03,U854277 bos.mp64:6.1.8.16,http://www-01.ibm.com/support/docview.wss?uid=isg1IV14309,bos.mp64:6.1.8.0-6.1.8.15,20120130,20131124,6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412,ftp://public.dhe.ibm.com/aix/ifixes/iv14309/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02,DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING,IV16514,7100-01-03,IV16514s01.epkg.Z / IV16514s02.epkg.Z / IV16514s03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV16514,bos.mp64:7.1.1.0-7.1.1.2,20120229,20130413,6100-05:IV16568 6100-06:IV16567 6100-08:IV17105 7100-00:IV23966 7100-01:IV16514 7100-02:IV17107,ftp://public.dhe.ibm.com/aix/ifixes/iv16514/, ,no hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07,DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING,IV16567,6100-06-08,IV16567m72.epkg.Z / IV16567s06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV16567,bos.mp64:6.1.6.0-6.1.6.18,20120301,20130413,6100-05:IV16568 6100-06:IV16567 6100-08:IV17105 7100-00:IV23966 7100-01:IV16514 7100-02:IV17107,ftp://public.dhe.ibm.com/aix/ifixes/iv16567/, ,no hiper,aix,6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08,DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING,IV16568,6100-05-09,IV16568m08.epkg.Z / IV16568s07.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV16568,bos.mp64:6.1.5.0-6.1.5.10,20120301,20130413,6100-05:IV16568 6100-06:IV16567 6100-08:IV17105 7100-00:IV23966 7100-01:IV16514 7100-02:IV17107,ftp://public.dhe.ibm.com/aix/ifixes/iv16568/, ,no hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08,SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED,IV16603,6100-06-09,IV16603s07.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV16603,bos.mp64:6.1.6.0-6.1.6.19,20120302,20130326,6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357,ftp://public.dhe.ibm.com/aix/ifixes/iv16603/, ,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08,Vulnerability in use of socketpair,IV16603 / CVE-2012-2192,6100-06-09,IV16603s07.120514.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair,bos.mp64:6.1.6.0-6.1.6.18,20120605, ,6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357,https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar,CVE-2012-2192:4.9,yes hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08,JFS2 FILESYSTEM HANG IN BMASSIGN,IV17291,6100-06-09,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV17291,bos.mp64:6.1.6.0-6.1.6.19,20120314,20130327,6100-06:IV17291 6100-07:IV17375 6100-08:IV19995 7100-00:IV17924 7100-01:IV20607 7100-02:IV20010,n/a, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04,JFS2 FILESYSTEM HANG IN BMASSIGN,IV17375,6100-07-05,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV17375,bos.mp64:6.1.7.0-6.1.7.15,20120315,20130328,6100-06:IV17291 6100-07:IV17375 6100-08:IV19995 7100-00:IV17924 7100-01:IV20607 7100-02:IV20010,n/a, ,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05,AIX NFSv4 vulnerability,IV17855 / CVE-2012-4817,5300-12-06,n/a,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120913/datafile151835&label=AIX%20NFSv4%20Vulnerability%20CVE-2012-4817,bos.net.nfs.client:5.3.12.0-5.3.12.5,20120913, ,http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo134282,ftp://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar,CVE-2012-4817:5,yes hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06,JFS2 FILESYSTEM HANG IN BMASSIGN,IV17924,7100-00-07,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV17924,bos.mp64:7.1.0.0-7.1.0.19,20120320,20130327,6100-06:IV17291 6100-07:IV17375 6100-08:IV19995 7100-00:IV17924 7100-01:IV20607 7100-02:IV20010,n/a, ,no hiper,aix,6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08,LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR,IV18317,6100-05-09,IV18317s81.epkg.Z / IV18317s72.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV18317,bos.mp64:6.1.5.0-6.1.5.10,20120327,20130413,6100-05:IV18317 6100-06:IV18318 6100-07:IV18127 6100-08:IV18700 7100-00:IV18319 7100-01:IV18174 7100-02:IV18249,ftp://public.dhe.ibm.com/aix/ifixes/iv18317/, ,no hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07,LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR,IV18318,6100-06-08,IV18318s71.epkg.Z / IV18318s61.epkg.Z / IV18318s62.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV18318,bos.mp64:6.1.6.0-6.1.6.18,20120327,20130413,6100-05:IV18317 6100-06:IV18318 6100-07:IV18127 6100-08:IV18700 7100-00:IV18319 7100-01:IV18174 7100-02:IV18249,ftp://public.dhe.ibm.com/aix/ifixes/iv18318/, ,no hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05,LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR,IV18319,7100-00-06,IV18319s51.epkg.Z / IV18319s41.epkg.Z / IV18319s42.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV18319,bos.mp64:7.1.0.0-7.1.0.18,20120327,20130413,6100-05:IV18317 6100-06:IV18318 6100-07:IV18127 6100-08:IV18700 7100-00:IV18319 7100-01:IV18174 7100-02:IV18249,ftp://public.dhe.ibm.com/aix/ifixes/iv18319/, ,no hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07,TCP RETRANSMIT PROCESSING IS VERY SLOW,IV18483,6100-06-08,IV18483s07.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV18483,bos.net.tcp.client:6.1.6.0-6.1.6.18,20120329,20130326,6100-06:IV18483 6100-07:IV14297 6100-08:IV14524 7100-01:IV13121 7100-02:IV15184,ftp://public.dhe.ibm.com/aix/ifixes/iv18483/, ,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05,Vulnerability in use of socketpair,IV19178 / CVE-2012-2192,5300-12-06,IV19178s05.120514.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair,bos.mp64:5.3.12.0-5.3.12.5,20120605, ,http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo134316,ftp://aix.software.ibm.com/aix/efixes/security/socket_fix.tar,CVE-2012-2192:4.9,yes hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05,SYSTEM CRASH IN NETINFO_UNIXDOMNLIST,IV20295,7100-00-06,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV20295,bos.mp64:7.1.0.0-7.1.0.18,20120427,20130226,6100-05:IV12592 6100-06:IV09793 6100-07:IV09981 6100-08:IV10663 7100-00:IV20295 7100-01:IV09942,n/a, ,no hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07,TCP RETRANSMIT PROCESSING IS VERY SLOW,IV20595,7100-00-08,IV20595m05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV20595,bos.net.tcp.client:7.1.0.0-7.1.0.21,20120503,20130326,6100-06:IV18483 6100-07:IV14297 6100-08:IV14524 7100-01:IV13121 7100-02:IV15184,ftp://public.dhe.ibm.com/aix/ifixes/iv20595/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04,JFS2 FILESYSTEM HANG IN BMASSIGN,IV20607,7100-01-05,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV20607,bos.mp64:7.1.1.0-7.1.1.15,20120503,20130327,6100-06:IV17291 6100-07:IV17375 6100-08:IV19995 7100-00:IV17924 7100-01:IV20607 7100-02:IV20010,n/a, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06,A tcp connection can hang and never send the last bytes,IV20656,7100-01-07,IV20656.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV20656,bos.net.tcp.client:7.1.1.0-7.1.1.17,20120504,20131123,7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615,ftp://public.dhe.ibm.com/aix/ifixes/iv20656/, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04,SYSTEM HANGS OR CRASHES WHEN APP USES SHARED SYMTAB CAPABILITY.,IV20880,6100-07-05,IV20880s04.epkg.Z / IV20880s03.epkg.Z / IV20880s02.epkg.Z / IV20880s01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV20880,bos.mp64:6.1.7.0-6.1.7.15,20120509,20130409,6100-07:IV20880 6100-08:IV21846 7100-01:IV21116 7100-02:IV21878,ftp://public.dhe.ibm.com/aix/ifixes/iv20880/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05,SYSTEM HANGS OR CRASHES WHEN APP USES SHARED SYMTAB CAPABILITY.,IV21116,7100-01-06,IV21116s04.epkg.Z / IV21116s02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV21116,bos.mp64:7.1.1.0-7.1.1.16,20120514,20130409,6100-07:IV20880 6100-08:IV21846 7100-01:IV21116 7100-02:IV21878,ftp://public.dhe.ibm.com/aix/ifixes/iv21116/, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04,SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED,IV21128,6100-07-05,IV21128s03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV21128,bos.mp64:6.1.7.0-6.1.7.15,20120514,20130223,6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357,ftp://public.dhe.ibm.com/aix/ifixes/iv21128/, ,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04,Vulnerability in use of socketpair,IV21128 / CVE-2012-2192,6100-07-05,IV21128s03.120514.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair,bos.mp64:6.1.7.0-6.1.7.3,20120605, ,6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357,https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar,CVE-2012-2192:4.9,yes hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06,SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED,IV21131,7100-00-07,IV21131s05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV21131,bos.mp64:7.1.0.0-7.1.0.19,20120514,20130326,6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357,ftp://public.dhe.ibm.com/aix/ifixes/iv21131/, ,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06,Vulnerability in use of socketpair,IV21131 / CVE-2012-2192,7100-00-07,IV21131s05.120515.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair,bos.mp64:7.1.1.0-7.1.1.3,20120605, ,6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357,https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar,CVE-2012-2192:4.9,yes hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04,SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED,IV21235,7100-01-05,IV21131s03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV21235,bos.mp64:7.1.1.0-7.1.1.15,20120515,20130223,6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357,ftp://public.dhe.ibm.com/aix/ifixes/iv21235/, ,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03,Vulnerability in use of socketpair,IV21235 / CVE-2012-2192,7100-01-04,IV21235s03.120515.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair,bos.mp64:7.1.1.0-7.1.1.3,20120605, ,6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357,https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar,CVE-2012-2192:4.9,yes sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06,Arbitary file overwrite symlink in libodm,IV21382 / CVE-2012-2179,7100-00-07,IV21382.120613.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120620/datafile141524&label=Arbitary%20file%20overwrite%20symlink%20in%20libodm,bos.rte.odm:7.1.0.0-7.1.0.15,20120614, ,6100-06:IV21379 6100-07:IV21381 6100-08:IV19369 7100-00:IV21382 7100-01:IV21383 7100-02:IV19252,https://aix.software.ibm.com/aix/efixes/security/libodm_fix.tar,CVE-2012-2179:6.9,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04,APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY,IV22062,6100-07-05,IV22062s04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV22062,bos.64bit:6.1.7.15 bos.adt.prof:6.1.7.15 bos.rte.control:6.1.7.15 bos.rte.libc:6.1.7.15 bos.rte.shell:6.1.7.15 mcr.rte:6.1.7.15,20120602,20130226,7100-01:IV22132 7100-02:IV24288 6100-07:IV22062 6100-06:IV22982,ftp://public.dhe.ibm.com/aix/ifixes/iv22062/, ,no hiper,aix,7100-01-04,APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY,IV22132,7100-01-05,IV22132s04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV22132,bos.64bit:7.1.1.15 bos.adt.prof:7.1.1.15 bos.rte.control:7.1.1.15 bos.rte.libc:7.1.1.15 bos.rte.shell:7.1.1.15 mcr.rte:7.1.1.15,20120605,20130226,7100-01:IV22132 7100-02:IV24288 6100-07:IV22062 6100-06:IV22982,ftp://public.dhe.ibm.com/aix/ifixes/iv22132/, ,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09,Vulnerability in AIX bind,IV22554 / CVE-2012-1667,6100-06-10,IV22554m07.120713.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20AIX%20bind,bos.net.tcp.client:6.1.6.0-6.1.6.19 bos.net.tcp.server:6.1.6.0-6.1.6.18,20120713, ,5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557,https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar,CVE-2012-1667:5,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05,Vulnerability in AIX bind,IV22555 / CVE-2012-1667,6100-07-06,IV22555m04.120713.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20AIX%20bind,bos.net.tcp.client:6.1.7.0-6.1.7.16 bos.net.tcp.server:6.1.7.0-6.1.7.16,20120713, ,5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557,https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar,CVE-2012-1667:5,no sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5,Vulnerability in VIOS bind,IV22555 / CVE-2012-1667,2.2.1.7,IV22555m04.120713.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20VIOS%20bind,bos.net.tcp.client:6.1.7.0-6.1.7.16 bos.net.tcp.server:6.1.7.0-6.1.7.16,20120713, ,5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557,https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar,CVE-2012-1667:5,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07,Vulnerability in AIX bind,IV22556 / CVE-2012-1667,7100-00-08,IV22556m05.120711.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20AIX%20bind,bos.net.tcp.client:7.1.0.0-7.1.0.20 bos.net.tcp.server:7.1.0.0-7.1.0.18,20120713, ,5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557,https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar,CVE-2012-1667:5,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04,Vulnerability in AIX bind,IV22557 / CVE-2012-1667,7100-01-05,IV22557m04.120713.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20AIX%20bind,bos.net.tcp.client:7.1.1.0-7.1.1.16 bos.net.tcp.server:7.1.1.0-7.1.1.16,20120713, ,5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557,https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar,CVE-2012-1667:5,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06,Vulnerability in AIX bind,IV22625 / CVE-2012-1667,5300-12-07,IV22625m05.120713.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20AIX%20bind,bos.net.tcp.client:5.3.12.0-5.3.12.7 bos.net.tcp.server:5.3.12.0-5.3.12.4,20120713, ,5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557,ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar,CVE-2012-1667:5,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09,Vulnerability in AIX system call,IV22693 / CVE-2012-0723,6100-06-10,IV22693s07.120713.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20AIX%20system%20call,bos.mp64:6.1.6.0-6.1.6.19 bos.rte.tty:6.1.6.0-6.1.6.18,20120726, ,5300-12: IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697,https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar,CVE-2012-0723:4.9,yes sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06,Vulnerability in AIX system call,IV22694 / CVE-2012-0723,5300-12-07,IV53331s0a.131220.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20AIX%20system%20call,bos.rte.tty:5.3.12.0-5.3.12.4,20120726, ,5300-12: IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697,ftp://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar,CVE-2012-0723:4.9,yes sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05,Vulnerability in AIX system call,IV22695 / CVE-2012-0723,6100-07-06,IV22695s04.120724.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20AIX%20system%20call,bos.mp64:6.1.7.0-6.1.7.16 bos.rte.tty:6.1.7.0-6.1.7.16,20120726, ,5300-12: IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697,https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar,CVE-2012-0723:4.9,yes sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5,Vulnerability in VIOS system call,IV22695 / CVE-2012-0723,2.2.1.7,IV22695s04.120628.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20VIOS%20system%20call,bos.mp64:6.1.7.0-6.1.7.16 bos.rte.tty:6.1.7.0-6.1.7.16,20120726, ,5300-12: IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697,https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar,CVE-2012-0723:4.9,yes sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07,Vulnerability in AIX system call,IV22696 / CVE-2012-0723,7100-00-08,IV22696s05.120724.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20AIX%20system%20call,bos.mp64:7.1.0.0-7.1.0.19 bos.rte.tty:7.1.0.0-7.1.0.18,20120726, ,5300-12:IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697,https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar,CVE-2012-0723:4.9,yes sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05,Vulnerability in AIX system call,IV22697 / CVE-2012-0723,7100-01-06,IV22697s04.120724.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20AIX%20system%20call,bos.mp64:7.1.1.0-7.1.1.16 bos.rte.tty:7.1.1.0-7.1.1.16,20120726, ,5300-12:IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697,https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar,CVE-2012-0723:4.9,yes hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05,INACCURATE/INVALID RESULTS RETURNED BY SOME MATH LIBRARY APIS,IV22812,7100-01-06,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV22812,bos.adt.prof:7.1.1.0-7.1.1.17 bos.adt.libm:7.1.1.0-7.1.1.16,20120612,20130409,7100-00:IV23305 7100-01:IV22812,n/a, ,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05,Vulnerability in AIX sendmail,IV22963 / CVE-2012-2200,7100-01-06,IV22963s04.120613.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120626/datafile151612&label=Vulnerability%20in%20AIX%20sendmail,bos.net.tcp.client:7.1.1.0-7.1.1.16,20120626, ,6100-06:IV22965 6100-07:IV22966 6100-08:IV24454 7100-00:IV22964 7100-01:IV22963 7100-02:IV24645,https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar,CVE-2012-2200:7.2,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09,Vulnerability in AIX sendmail,IV22964 / CVE-2012-2200,7100-00-10,IV22964s05.120613.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120626/datafile151612&label=Vulnerability%20in%20AIX%20sendmail,bos.net.tcp.client:7.1.0.0-7.1.0.21,20120626, ,6100-06:IV22965 6100-07:IV22966 6100-08:IV24454 7100-00:IV22964 7100-01:IV22963 7100-02:IV24645,https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar,CVE-2012-2200:7.2,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09,Vulnerability in AIX sendmail,IV22965 / CVE-2012-2200,6100-06-10,IV22965s07.120613.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120626/datafile151612&label=Vulnerability%20in%20AIX%20sendmail,bos.net.tcp.client:6.1.6.0-6.1.6.20,20120626, ,6100-06:IV22965 6100-07:IV22966 6100-08:IV24454 7100-00:IV22964 7100-01:IV22963 7100-02:IV24645,https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar,CVE-2012-2200:7.2,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05,Vulnerability in AIX sendmail,IV22966 / CVE-2012-2200,6100-07-06,IV22966s04.120613.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120626/datafile151612&label=Vulnerability%20in%20AIX%20sendmail,bos.net.tcp.client:6.1.7.0-6.1.7.16,20120626, ,6100-06:IV22965 6100-07:IV22966 6100-08:IV24454 7100-00:IV22964 7100-01:IV22963 7100-02:IV24645,https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar,CVE-2012-2200:7.2,no sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5,Vulnerability in VIOS sendmail,IV22966 / CVE-2012-2200,2.2.1.7,IV22966s04.120613.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201206/SECURITY/20120626/datafile151612&label=Vulnerability%20in%20VIOS%20sendmail,bos.net.tcp.client:6.1.7.0-6.1.7.16,20120626, ,6100-06:IV22965 6100-07:IV22966 6100-08:IV24454 7100-00:IV22964 7100-01:IV22963 7100-02:IV24645,https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar,CVE-2012-2200:7.2,no hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08,APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY,IV22982,6100-06-09,IV22982s08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV22982,bos.64bit:6.1.6.18 bos.adt.prof:6.1.6.18 bos.rte.control:6.1.6.18 bos.rte.libc:6.1.6.18 bos.rte.shell:6.1.6.18 mcr.rte:6.1.6.18,20120613,20130226,7100-01:IV22132 7100-02:IV24288 6100-07:IV22062 6100-06:IV22982,ftp://public.dhe.ibm.com/aix/ifixes/iv22982/, ,no hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07,INACCURATE/INVALID RESULTS RETURNED BY SOME MATH LIBRARY APIS,IV23305,7100-00-08,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV23305,bos.adt.prof:7.1.0.0-7.1.0.19 bos.adt.libm:7.1.0.0-7.1.0.16,20120619,20130409,7100-00:IV23305 7100-01:IV22812,n/a, ,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06,AIX ftp vulnerability,IV23331 / CVE-2012-4845,6100-07-07,IV23331s6a.121226.epkg.Z / IV23331m05.121003.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845,bos.mp64:6.1.7.0-6.1.7.17 bos.rte.tty:6.1.7.0-6.1.7.16,20120703,20130208,6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669,https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar,CVE-2012-4845:6.8,yes sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5,VIOS ftp vulnerability,IV23331 / CVE-2012-4845,2.2.1.7,IV23331m04.121003.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20VIOS%20FTP%20Vulnerability%20CVE-2012-4845,bos.mp64:6.1.7.0-6.1.7.17 bos.rte.tty:6.1.7.0-6.1.7.16,20120703,20130208,6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669,https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar,CVE-2012-4845:6.8,yes hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06,DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING,IV23966,7100-00-07,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV23966,bos.mp64:7.1.0.0-7.1.0.18,20120627,20130413,6100-05:IV16568 6100-06:IV16567 6100-08:IV17105 7100-00:IV23966 7100-01:IV16514 7100-02:IV17107,n/a, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05,ASSERT IN IOCP_INSQUEUE,IV24569,6100-07-06,IV24569s05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV24569,bos.iocp.rte:6.1.7.15-6.1.7.16,20120710,20131123,7100-00:IV29604 7100-01:IV27204 6100-06:IV27337 6100-07:IV24569,ftp://public.dhe.ibm.com/aix/ifixes/iv24569/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06,SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS,IV24610,7100-01-07,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV24610,bos.perf.perfstat:7.1.1.0-7.1.1.17 bos.perf.tools:7.1.1.0-7.1.1.17,20120710,20131123,7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081,n/a, ,no hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10,SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS,IV24777,6100-06-11,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV24777,bos.perf.perfstat:6.1.6.0-6.1.7.20 bos.perf.tools:6.1.6.0-6.1.6.20,20120716,20131123,7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081,n/a, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05,REDUCE EARLY WORKING STORAGE PAGING,IV26272,6100-07-06,IV26272s05.epkg.Z / IV26272s04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV26272,bos.mp64:6.1.7.0-6.1.7.17,20120814,20130409,6100-06:IV27655 6100-07:IV26272 6100-08:IV26735 7100-00:IV26581 7100-01:IV27014 7100-02:IV26731,ftp://public.dhe.ibm.com/aix/ifixes/iv26272/, ,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07,AIX NFSv4 vulnerability,IV26436 / CVE-2012-4817,7100-00-08,IV26436s07.120907.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120913/datafile151835&label=AIX%20NFSv4%20Vulnerability%20CVE-2012-4817,bos.net.nfs.client:7.1.0.0-7.1.0.20,20120913, ,6100-05:IV09495 6100-06:IV10327 6100-07:IV11629 6100-08:IV11511 7100-00:IV26436 7100-01:IV12169 7100-02:IV11502,https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar,CVE-2012-4817:5,yes hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07,REDUCE EARLY WORKING STORAGE PAGING,IV26581,7100-00-08,IV26581s07.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV26581,bos.mp64:7.1.0.0-7.1.0.20,20120820,20130409,6100-06:IV27655 6100-07:IV26272 6100-08:IV26735 7100-00:IV26581 7100-01:IV27014 7100-02:IV26731,ftp://public.dhe.ibm.com/aix/ifixes/iv26581/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05,REDUCE EARLY WORKING STORAGE PAGING,IV27014,7100-01-06,IV27014s04.epkg.Z / IV27014s05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV27014,bos.mp64:7.1.1.0-7.1.1.16,20120824,20130409,6100-06:IV27655 6100-07:IV26272 6100-08:IV26735 7100-00:IV26581 7100-01:IV27014 7100-02:IV26731,ftp://public.dhe.ibm.com/aix/ifixes/iv27014/, ,no hiper,aix,7100-01-04 :: 7100-01-05,ASSERT IN IOCP_INSQUEUE,IV27204,7100-01-06,IV27204s05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV27204,bos.iocp.rte:7.1.1.15,20120829,20131123,7100-00:IV29604 7100-01:IV27204 6100-06:IV27337 6100-07:IV24569,ftp://public.dhe.ibm.com/aix/ifixes/iv27204/, ,no hiper,aix,6100-06-08 :: 6100-06-09,ASSERT IN IOCP_INSQUEUE,IV27337,6100-06-10,iV27337s09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV27337,bos.iocp.rte:6.1.6.18-6.1.6.19,20120831,20131123,7100-00:IV29604 7100-01:IV27204 6100-06:IV27337 6100-07:IV24569,ftp://public.dhe.ibm.com/aix/ifixes/iv27337/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07,SYSTEM CRASH IN E_CLEAR_WAIT().,IV27584,7100-01-08,U855903 bos.mp64:7.1.1.19,http://www-01.ibm.com/support/docview.wss?uid=isg1IV27584,bos.mp64:7.1.1.0-7.1.1.19,20120905,20131124,6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412,ftp://public.dhe.ibm.com/aix/ifixes/iv27584/, ,no hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09,REDUCE EARLY WORKING STORAGE PAGING,IV27655,6100-06-10,IV27655s07.epkg.Z / IV27655s09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV27655,bos.mp64:6.1.6.0-6.1.6.20,20120906,20130409,6100-06:IV27655 6100-07:IV26272 6100-08:IV26735 7100-00:IV26581 7100-01:IV27014 7100-02:IV26731,ftp://public.dhe.ibm.com/aix/ifixes/iv27655/, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06,SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES,IV27680,6100-07-07,IV27680.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV27680,bos.mp64:6.1.7.0-6.1.7.17,20120927,20131125,6100-07:IV27680 6100-08:IV32845 6100-08:IV32845 7100-01:IV30075 7100-02:IV33155,ftp://public.dhe.ibm.com/aix/ifixes/iv27680/, ,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10,AIX fuser vulnerability,IV28151 / CVE-2012-4833,6100-06-11,IV28151s09.120926.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120928/datafile160830&label=AIX%20fuser%20vulnerability%20CVE-2012-4833,bos.rte.filesystem:6.1.6.0-6.1.6.19,20120923, ,6100-06:IV28151 6100-07:IV28749 7100-00:IV28754 7100-01:IV28756,https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar,CVE-2012-4833:2.1,no sec,aix,6100-08-00 :: 6100-08-01,AIX ftp vulnerability,IV28651 / CVE-2012-4845,6100-08-02,IV28651s1a.121204.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845,bos.mp64:6.1.8.0-6.1.8.1,20120703,20130208,6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669,https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar,CVE-2012-4845:6.8,yes sec,vios,2.2.2.0 :: 2.2.2.1,VIOS ftp vulnerability,IV28651 / CVE-2012-4845,2.2.2.2,IV28651s1a.121204.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20VIOS%20FTP%20Vulnerability%20CVE-2012-4845,bos.mp64:6.1.8.0-6.1.8.1,20120703,20130208,6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669,https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar,CVE-2012-4845:6.8,yes sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10,AIX ftp vulnerability,IV28715 / CVE-2012-4845,6100-06-11,IV28715sAa.130206.epkg.Z / IV28715m09.121012.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845,bos.mp64:6.1.6.0-6.1.6.21 bos.rte.tty:6.1.6.0-6.1.6.19,20120703,20130208,6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669,https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar,CVE-2012-4845:6.8,yes sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06,AIX fuser vulnerability,IV28749 / CVE-2012-4833,6100-07-07,IV28749s05.120926.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/fuser_advisory.asc,bos.rte.filesystem:6.1.7.0-6.1.7.16,20120923, ,6100-06:IV28151 6100-07:IV28749 7100-00:IV28754 7100-01:IV28756,https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar,CVE-2012-4833:2.1,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07,AIX fuser vulnerability,IV28754 / CVE-2012-4833,7100-00-08,IV28754s07.120926.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120928/datafile160830&label=AIX%20fuser%20vulnerability%20CVE-2012-4833,bos.rte.filesystem:7.1.0.0-7.1.0.18,20120923, ,6100-06:IV28151 6100-07:IV28749 7100-00:IV28754 7100-01:IV28756,https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar,CVE-2012-4833:2.1,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06,AIX fuser vulnerability,IV28756 / CVE-2012-4833,7100-01-07,IV28756s05.120926.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120928/datafile160830&label=AIX%20fuser%20vulnerability%20CVE-2012-4833,bos.rte.filesystem:7.1.1.0-7.1.1.16,20120923, ,6100-06:IV28151 6100-07:IV28749 7100-00:IV28754 7100-01:IV28756,https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar,CVE-2012-4833:2.1,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08,AIX ftp vulnerability,IV28785 / CVE-2012-4845,7100-00-09,IV28785s8a.130206.epkg.Z / IV28785m07.121002.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845,bos.mp64:7.1.2.0-7.1.2.1,20120703,20130208,6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669,https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar,CVE-2012-4845:6.8,yes sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07,AIX ftp vulnerability,IV28787 / CVE-2012-4845,7100-01-07,IV28787s6a.130121.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845,bos.mp64:7.1.1.0-7.1.1.17 bos.rte.tty:7.1.1.0-7.1.1.16,20120703,20130208,6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669,https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar,CVE-2012-4845:6.8,yes hiper,aix,7100-00-06 :: 7100-00-07,ASSERT IN IOCP_INSQUEUE,IV29604,7100-00-08,IV29604s07.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV29604,bos.iocp.rte:7.1.0.17,20121005,20131123,7100-00:IV29604 7100-01:IV27204 6100-06:IV27337 6100-07:IV24569,ftp://public.dhe.ibm.com/aix/ifixes/iv29604/, ,no hiper,aix,7100-02-00 :: 7100-02-01,SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS,IV30032,7100-02-02,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV30032,bos.perf.perfstat:7.1.2.0-7.1.2.1 bos.perf.tools:7.1.2.0-7.1.2.1,20121011,20131123,7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081,n/a, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06,SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES,IV30075,7100-01-07,IV30075.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV30075,bos.mp64:7.1.1.0-7.1.1.18,20121012,20131125,6100-07:IV27680 6100-08:IV32845 6100-08:IV32845 7100-01:IV30075 7100-02:IV33155,ftp://public.dhe.ibm.com/aix/ifixes/iv30075/, ,no hiper,aix,6100-08-00 :: 6100-08-01,SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS,IV30236,6100-08-02,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV30236,bos.perf.perfstat:6.1.8.0-6.1.8.14 bos.perf.tools:6.1.8.0-6.1.8.14,20121013,20131123,7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081,n/a, ,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10,Vulnerability in AIX bind,IV30364 / CVE-2012-5166,6100-06-11,IV30364s10.130121.epkg.Z / IV30364s09.121016.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163519&label=UPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166,bos.net.tcp.client:6.1.6.0-6.1.6.21 bos.net.tcp.server:6.1.6.0-6.1.6.20,20121023,20130128,5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185,https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar,CVE-2012-5166:7.8,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06,Vulnerability in AIX bind,IV30365 / CVE-2012-5166,6100-07-07,IV30365s06.130121.epkg.Z / IV30365s05.121016.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc,bos.net.tcp.client:6.1.7.0-6.1.7.17 bos.net.tcp.server:6.1.7.0-6.1.7.17,20121023,20130128,5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185,https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar,CVE-2012-5166:7.8,no sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5,Vulnerability in VIOS bind,IV30365 / CVE-2012-5166,2.2.1.7,IV30365s04.121018.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201301/SECURITY/20130128/datafile163519&label=UPDATE%20-%20Vulnerability%20in%20VIOS%20bind%20-%20CVE-2012-5166,bos.net.tcp.client:6.1.7.0-6.1.7.17 bos.net.tcp.server:6.1.7.0-6.1.7.17,20121023,20130128,5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185,https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar,CVE-2012-5166:7.8,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08,Vulnerability in AIX bind,IV30366 / CVE-2012-5166,7100-00-09,IV30366s08.130121.epkg.Z / IV30366s07.121016.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163519&label=UPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166,bos.net.tcp.client:7.1.0.0-7.1.0.22 bos.net.tcp.server:7.1.0.0-7.1.1.19,20121023,20130128,5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185,https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar,CVE-2012-5166:7.8,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06,Vulnerability in AIX bind,IV30367 / CVE-2012-5166,7100-01-07,IV30367s06.130121.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163519&label=UPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166,bos.net.tcp.client:7.1.1.0-7.1.1.17 bos.net.tcp.server:7.1.1.0-7.1.1.17,20121023,20130128,5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185,https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar,CVE-2012-5166:7.8,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06,Vulnerability in AIX bind,IV30368 / CVE-2012-5166,5300-12-07,IV30368s06.121016.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163519&label=UPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166,bos.net.tcp.client:5.3.12.0-5.3.12.7 bos.net.tcp.server:5.3.12.0-5.3.12.7,20121023,20130128,5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185,ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar,CVE-2012-5166:7.8,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,AIX ftp vulnerability,IV30669 / CVE-2012-4845,7100-02-02,IV30669s1a.130114.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845,bos.mp64:7.1.2.0-7.1.2.1,20120703,20130208,6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669,https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar,CVE-2012-4845:6.8,yes hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10,SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES,IV30703,6100-06-11,IV30703.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV30703,bos.mp64:6.1.6.0-6.1.6.21,20121022,20130410,6100-07:IV27680 6100-08:IV32845 6100-08:IV32845 7100-01:IV30075 7100-02:IV33155,ftp://public.dhe.ibm.com/aix/ifixes/iv30703/, ,no hiper,aix,7100-02-00 :: 7100-02-01,A tcp connection can hang and never send the last bytes,IV31960,7100-02-02,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV31960,bos.net.tcp.client:7.1.2.0-7.1.2.1,20121113,20131123,7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615,n/a, ,no hiper,aix,6100-08-00 :: 6100-08-01,DATA PTR INCORRECTLY INCREMENTED IN UDP RECEIVE.,IV31961,6100-08-02,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV31961,bos.net.tcp.client:6.1.8.0-6.1.8.1,20121113,20131123,6100-08:IV31961 6100-09:IV33210 7100-02:IV31962 7100-03:IV34454,n/a, ,no hiper,aix,7100-02-00 :: 7100-02-01,DATA PTR INCORRECTLY INCREMENTED IN UDP RECEIVE.,IV31962,7100-02-02,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV31962,bos.net.tcp.client:7.1.2.0-7.1.2.2 bos.net.tcp.client:7.1.2.0-7.1.2.15,20121113,20131123,6100-08:IV31961 6100-09:IV33210 7100-02:IV31962 7100-03:IV34454,n/a, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06,A tcp connection can hang and never send the last bytes,IV32392,6100-07-07,IV32392.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV32392,bos.net.tcp.client:6.1.7.0-6.1.7.17,20121122,20131123,7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615,ftp://public.dhe.ibm.com/aix/ifixes/iv32392/, ,no hiper,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06,A tcp connection can hang and never send the last bytes,IV32615,5300-12-07,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV32615,bos.net.tcp.client:5.3.12.0-5.3.12.8,20121127,20131123,7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615,n/a, ,no hiper,aix,7100-02-00 :: 7100-02-01,SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES,IV33155,7100-02-02,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV33155,bos.mp64:7.1.2.0-7.1.2.1,20131207,20131125,6100-07:IV27680 6100-08:IV32845 6100-08:IV32845 7100-01:IV30075 7100-02:IV33155,n/a, ,no hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10,A tcp connection can hang and never send the last bytes,IV33483,6100-06-11,IV33483.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV33483,bos.net.tcp.client:6.1.6.0-6.1.6.21,20121214,20131123,7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615,ftp://public.dhe.ibm.com/aix/ifixes/iv33483/, ,no hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08,A tcp connection can hang and never send the last bytes,IV33484,7100-00-09,IV33434.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV33484,bos.net.tcp.client:7.1.0.0-7.1.0.22,20121214,20131123,7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615,ftp://public.dhe.ibm.com/aix/ifixes/iv33484/, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06,SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS,IV33521,6100-07-07,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV33521,bos.perf.perfstat:6.1.7.0-6.1.7.17 bos.perf.tools:6.1.7.0-6.1.7.17,20121217,20131123,7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081,n/a, ,no hiper,aix,6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11,LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL,IV33883,6100-06-12,IV33883.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV33883,bos.adt.include:6.1.6.18-6.1.6.21 bos.mp64:6.1.6.19-6.1.6.22,20121220,20131126,6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915,ftp://public.dhe.ibm.com/aix/ifixes/iv33883/, ,no hiper,aix,6100-08-00 :: 6100-08-01,CRASH IN LD_GETINFO_ALL32+000230,IV34354,6100-08-02,IV35680s6a.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV34354,bos.mp64:6.1.8.0-6.1.8.1,20130109,20131126,6100-07:IV35680 6100-08:IV34354,ftp://public.dhe.ibm.com/aix/ifixes/iv34354/, ,no hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08,SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS,IV35280,7100-00-09,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV35280,bos.perf.perfstat:7.1.0.0-7.1.0.20 bos.perf.tools:7.1.0.0-7.1.0.20,20130116,20131123,7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081,n/a, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06,CRASH IN LD_GETINFO_ALL32+000230,IV35680,6100-07-07,IV35680s6a.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV35680,bos.mp64:6.1.7.17,20130122,20131126,6100-07:IV35680 6100-08:IV34354,ftp://public.dhe.ibm.com/aix/ifixes/iv35680/, ,no hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10,DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT,IV35809,6100-06-11,IV35809sAa.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV35809,bos.mp64:6.1.6.0-6.1.6.21,20130123,20131125,7100-00:IV35812 7100-01:IV35813 7100-02:IV35814 6100-06:IV35809 6100-07:IV35810 6100-08:IV35811 6100-09:IV33672,ftp://public.dhe.ibm.com/aix/ifixes/iv35809/, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06,DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT,IV35810,6100-07-07,IV35810s6a.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV35810,bos.mp64:6.1.7.0-6.1.7.17,20130123,20131125,7100-00:IV35812 7100-01:IV35813 7100-02:IV35814 6100-06:IV35809 6100-07:IV35810 6100-08:IV35811 6100-09:IV33672,ftp://public.dhe.ibm.com/aix/ifixes/iv35810/, ,no hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08,Data error in a file on an NFS server after a server reboot,IV35812,7100-00-09,IV35812s8a.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV35812,bos.mp64:7.1.0.0-7.1.0.21,20130123,20131125,7100-00:IV35812 7100-01:IV35813 7100-02:IV35814 6100-06:IV35809 6100-07:IV35810 6100-08:IV35811 6100-09:IV33672,ftp://public.dhe.ibm.com/aix/ifixes/iv35812/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06,Data error in a file on an NFS server after a server reboot,IV35813,7100-01-07,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV35813,bos.mp64:7.1.1.0-7.1.1.18,20130123,20131125,7100-00:IV35812 7100-01:IV35813 7100-02:IV35814 6100-06:IV35809 6100-07:IV35810 6100-08:IV35811 6100-09:IV33672,ftp://public.dhe.ibm.com/aix/ifixes/iv35813/, ,no hiper,aix,7100-02-00 :: 7100-02-01,DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT,IV35814,7100-02-02,IV35814s1a.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV35814,bos.mp64:7.1.2.0-7.1.2.1,20130123,20131125,7100-00:IV35812 7100-01:IV35813 7100-02:IV35814 6100-06:IV35809 6100-07:IV35810 6100-08:IV35811 6100-09:IV33672,ftp://public.dhe.ibm.com/aix/ifixes/iv35814/, ,no hiper,aix,6100-08-00 :: 6100-08-01,UDP MULTICAST: SHORT PACKET FOR SOME LISTENERS,IV35888,6100-08-02,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV35888,bos.net.tcp.client:6.1.8.0-6.1.8.2,20130125,20131126,6100-08:IV35888 6100-09:IV35644 7100-02:IV35893 7100-03:IV33047,ftp://public.dhe.ibm.com/aix/ifixes/iv35888/, ,no hiper,aix,7100-02-00 :: 7100-02-01,UDP MULTICAST: SHORT PACKET FOR SOME LISTENERS.,IV35893,7100-02-02,IV35893.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV35893,bos.net.tcp.client:7.1.2.0-7.1.2.1,20130125,20131126,6100-08:IV35888 6100-09:IV35644 7100-02:IV35893 7100-03:IV33047,ftp://public.dhe.ibm.com/aix/ifixes/iv35893/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07,RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP,IV36524,7100-01-08,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV36524,bos.mp64:7.1.1.0-7.1.1.20,20130215,20131124,6100-06:IV36527 6100-07:IV34105 6100-08:IV38589 6100-09:IV36642 7100-00:IV36835 7100-01:IV36524 7100-02:IV38251 7100-03:IV36832,n/a, ,no hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09,RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP,IV36835,7100-00-10,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV36835,bos.mp64:7.1.0.0-7.1.0.22,20130215,20131124,6100-06:IV36527 6100-07:IV34105 6100-08:IV38589 6100-09:IV36642 7100-00:IV36835 7100-01:IV36524 7100-02:IV38251 7100-03:IV36832,n/a, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,LD FAILING TO EXPORT UNREFERENCED SYMBOLS,IV36875,7100-02-03,IV36875.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV36875,bos.rte.bind_cmds:7.1.2.0,20130218,20131124,6100-08:IV36851 7100-02:IV36875,ftp://public.dhe.ibm.com/aix/ifixes/iv36875/, ,no hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08,SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES,IV37083,7100-00-09,IV37083.epkg.Z / IV37083s8a.130225.71TL00SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV37083,bos.mp64:7.1.0.0-7.1.0.21,20130221,20130430,6100-07:IV27680 6100-08:IV32845 6100-08:IV32845 7100-01:IV30075 7100-02:IV33155,ftp://public.dhe.ibm.com/aix/ifixes/iv37083/, ,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02,ADDRESS FROM SORECEIVE NOT FILLED IN FOR UDP PACKETS,IV37701,6100-08-03,IV37701.epkg.Z / IV37701s2a.130308.61TL08SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV37701,bos.mp64:6.1.8.0-6.1.8.15,20130307,20131124,6100-08:IV37701 6100-09:IV39175 7100-02:IV37783 7100-03:IV39176,ftp://public.dhe.ibm.com/aix/ifixes/iv37701/, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,ADDRESS FROM SORECEIVE NOT FILLED IN FOR UDP PACKETS,IV37783,7100-02-03,IV37783.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV37783,bos.mp64:7.1.2.0-7.1.2.15,20130310,20131124,6100-08:IV37701 6100-09:IV39175 7100-02:IV37783 7100-03:IV39176,ftp://public.dhe.ibm.com/aix/ifixes/iv37783/, ,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11,Vulnerability in AIX inet,IV37925 / CVE-2013-3035,6100-06-12,IV37925sBa.130508.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035,bos.net.tcp.client:6.1.6.0-6.1.6.22,20130604,20130605,6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015,https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar,CVE-2013-3035:7.1,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP,IV38251,7100-02-03,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV38251,bos.mp64:7.1.2.0-7.1.2.15,20130319,20131124,6100-06:IV36527 6100-07:IV34105 6100-08:IV38589 6100-09:IV36642 7100-00:IV36835 7100-01:IV36524 7100-02:IV38251 7100-03:IV36832,n/a, ,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02,USERDEL REMOVE -F FLAG,IV38411,6100-08-03,IV38411.epkg.Z / IV38411m2a.130809.61TL08SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV38411,bos.rte.security:6.1.8.0-6.1.8.15,20130320,20131126,6100-08:IV38411 6100-09:IV39043 7100-02:IV38414 7100-03:IV38487,ftp://public.dhe.ibm.com/aix/ifixes/iv38411/, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,USERDEL REMOVE -F FLAG,IV38414,7100-02-03,IV38414.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV38414,bos.rte.security:7.1.2.0-7.1.2.15,20130320,20131126,6100-08:IV38411 6100-09:IV39043 7100-02:IV38414 7100-03:IV38487,ftp://public.dhe.ibm.com/aix/ifixes/iv38414/, ,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02,ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST,IV38695,6100-08-03,IV38695s1a.130603.61TL08SP01.epkg.Z / IV38695s2a.130621.epkg.Z / IV38695s2a.130621.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV38695,devices.vdevice.IBM.vfc-client.rte:6.1.8.0-6.1.8.15,20130327,20131124,6100-07:IV39384 6100-08:IV38695 6100-09:IV37549 7100-01:IV41362 7100-02:IV38879 7100-03:IV37484,ftp://public.dhe.ibm.com/aix/ifixes/iv38695/, ,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02,LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL,IV38743,6100-08-03,IV38743.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV38743,bos.mp64:6.1.8.0-6.1.8.15,20130328,20131126,6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915,ftp://public.dhe.ibm.com/aix/ifixes/iv38743/, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST,IV38879,7100-02-03,IV38879s2a.130603.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV38879,devices.vdevice.IBM.vfc-client.rte:7.1.2.0-7.1.2.15,20130328,20131124,6100-07:IV39384 6100-08:IV38695 6100-09:IV37549 7100-01:IV41362 7100-02:IV38879 7100-03:IV37484,ftp://public.dhe.ibm.com/aix/ifixes/iv38879/, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,LPARSTAT APP VALUE REPORTS 0 WHEN FREE PROCESSORS IN POOL,IV38915,7100-02-03,IV38915.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV38915,bos.adt.include:7.1.2.0-7.1.2.15 bos.mp64:7.1.2.0-7.1.2.15,20130328,20131126,6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915,ftp://public.dhe.ibm.com/aix/ifixes/iv41421/, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07,ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST,IV39384,6100-07-08,IV39384s7a.130627.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV39384,devices.vdevice.IBM.vfc-client.rte:6.1.7.0-6.1.7.18,20130405,20131124,6100-07:IV39384 6100-08:IV38695 6100-09:IV37549 7100-01:IV41362 7100-02:IV38879 7100-03:IV37484,ftp://public.dhe.ibm.com/aix/ifixes/iv39384/, ,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11,tftp Security Vulnerability,IV40221 / CVE-2013-3005,6100-06-12,IV40221s11.130617.epkg.Z,https://www.ibm.com/support/pages/node/5741559,bos.net.tcp.client:6.1.6.0-6.1.6.22,20130703, ,6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256,https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar,CVE-2013-3005:7.9,yes hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07,LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL,IV40614,6100-07-08,IV40614.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV40614,bos.adt.include:6.1.7.15-6.1.7.18 bos.mp64:6.1.7.15-6.1.7.18,20130424,20131126,6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915,ftp://public.dhe.ibm.com/aix/ifixes/iv40614/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07,ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST,IV41362,7100-01-09,IV41362s7a.130627.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV41362,devices.vdevice.IBM.vfc-client.rte:7.1.1.0-7.1.1.19,20130502,20131124,6100-07:IV39384 6100-08:IV38695 6100-09:IV37549 7100-01:IV41362 7100-02:IV38879 7100-03:IV37484,ftp://public.dhe.ibm.com/aix/ifixes/iv41362/, ,no hiper,aix,7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07,LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL 13/05/23 PTF PECHANGE,IV41421,7100-01-08,IV41412.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV41421,bos.adt.include:7.1.1.15-7.1.1.18 bos.mp64:7.1.1.15-7.1.1.18,20130502,20131126,6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915,ftp://public.dhe.ibm.com/aix/ifixes/iv41421/, ,no hiper,aix,7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09,LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL 13/05/23 PTF PECHANGE,IV41813,7100-00-10,IV41813.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV41813,bos.mp64:7.1.0.19-7.1.0.22,20130506,20131126,6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915,ftp://public.dhe.ibm.com/aix/ifixes/iv41813/, ,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07,Vulnerability in AIX inet,IV42072 / CVE-2013-3035,6100-07-08,IV42072s7a.130508.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035,bos.net.tcp.client:6.1.7.0-6.1.7.18,20130604,20130605,6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015,https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar,CVE-2013-3035:7.1,no sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7,Vulnerability in VIOS inet,IV42072 / CVE-2013-3035,2.2.1.8,IV42072s7a.130508.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20VIOS%20inet%20Vulnerability%20CVE-2013-3035,bos.net.tcp.client:6.1.7.0-6.1.7.18,20130604,20130605,6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015,https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar,CVE-2013-3035:7.1,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,Vulnerability in AIX inet,IV42095 / CVE-2013-3035,7100-02-03,IV42095s2a.130514.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035,bos.net.tcp.client:7.1.2.0-7.1.2.15,20130604,20130605,6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015,https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar,CVE-2013-3035:7.1,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02,Vulnerability in AIX inet,IV42124 / CVE-2013-3035,6100-08-03,IV42124s2a.130514.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035,bos.net.tcp.client:6.1.8.0-6.1.8.15,20130604,20130605,6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015,https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar,CVE-2013-3035:7.1,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2,Vulnerability in VIOS inet,IV42124 / CVE-2013-3035,2.2.2.3,IV42124s2a.130514.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20VIOS%20inet%20Vulnerability%20CVE-2013-3035,bos.net.tcp.client:6.1.8.0-6.1.8.15,20130604,20130605,6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015,https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar,CVE-2013-3035:7.1,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07,Vulnerability in AIX inet,IV42229 / CVE-2013-3035,7100-01-08,IV42229s7a.130522.epkg.Z / IV42229s6a.130514.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035,bos.net.tcp.client:7.1.1.0-7.1.1.18,20130604,20130605,6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015,https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar,CVE-2013-3035:7.1,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09,Vulnerability in AIX inet,IV42264 / CVE-2013-3035,7100-00-10,IV42264s9a.130522.epkg.Z / IV42264s8a.130514.epkg.Z,https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035,bos.net.tcp.client:7.1.0.0-7.1.0.23,20130604,20130605,6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015,https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar,CVE-2013-3035:7.1,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,SYSTEM CRASH IN E_CLEAR_WAIT().,IV42324,7100-02-03,U857589 bos.mp64:7.1.2.16,http://www-01.ibm.com/support/docview.wss?uid=isg1IV42324,bos.mp64:7.1.2.0-7.1.2.15,20130510,20131124,6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412,ftp://public.dhe.ibm.com/aix/ifixes/iv42324/, ,no hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09,SYSTEM CRASH IN E_CLEAR_WAIT().,IV42334,7100-00-10,IV42324s2a.130730.epkg.Z / IV42324s2a.130730.71TL02SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV42334,bos.mp64:7.1.0.0-7.1.0.22,20130510,20131124,6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412,ftp://public.dhe.ibm.com/aix/ifixes/iv42324/, ,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07,tftp Security Vulnerability,IV42700 / CVE-2013-3005,7100-01-08,IV42700s7a.130617.epkg.Z,https://www.ibm.com/support/pages/node/5741559,bos.net.tcp.client:7.1.1.0-7.1.1.18,20130703,20130703,6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256,https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar,CVE-2013-3005:7.9,yes sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7,tftp Security Vulnerability,IV42932 / CVE-2013-3005,2.2.1.8,IV42933s2a.130617.epkg.Z,https://www.ibm.com/support/pages/node/5741559,bos.net.tcp.client:6.1.7.0-6.1.7.18,20130703, ,6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256,https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar,CVE-2013-3005:7.9,yes sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07,tftp Security Vulnerability,IV42932 / CVE-2013-3005,6100-07-08,IV42933s2a.130617.epkg.Z,https://www.ibm.com/support/pages/node/5741559,bos.net.tcp.client:6.1.7.0-6.1.7.18,20130703, ,6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256,https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar,CVE-2013-3005:7.9,yes sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2,tftp Security Vulnerability,IV42933 / CVE-2013-3005,2.2.2.3,IV42933s2a.130617.epkg.Z,https://www.ibm.com/support/pages/node/5741559,bos.net.tcp.client:6.1.8.0-6.1.8.15,20130703, ,6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256,https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar,CVE-2013-3005:7.9,yes sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02,tftp Security Vulnerability,IV42933 / CVE-2013-3005,6100-08-03,IV42933s2a.130617.epkg.Z,https://www.ibm.com/support/pages/node/5741559,bos.net.tcp.client:6.1.8.0-6.1.8.15,20130703, ,6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256,https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar,CVE-2013-3005:7.9,yes sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09,tftp Security Vulnerability,IV42934 / CVE-2013-3005,7100-00-10,IV42934s9a.130617.epkg.Z,https://www.ibm.com/support/pages/node/5741559,bos.net.tcp.client:7.1.0.0-7.1.0.23,20130703,20130703,6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256,https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar,CVE-2013-3005:7.9,yes sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,tftp Security Vulnerability,IV42935 / CVE-2013-3005,7100-02-03,IV42935s2a.130617.epkg.Z,https://www.ibm.com/support/pages/node/5741559,bos.net.tcp.client:7.1.2.0-7.1.2.15,20130703, ,6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256,https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar,CVE-2013-3005:7.9,yes sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,Security Vulnerabilities in AIX InfiniBand,IV43561 / CVE-2013-4011,7100-02-03,iv43561m2a.130626.epkg.Z,https://www.ibm.com/support/pages/node/5741571,devices.common.IBM.ib.rte:7.1.2.0-7.1.2.15,20130716, ,6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652,https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar,CVE-2013-4011:7.2,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09,Security Vulnerabilities in AIX InfiniBand,IV43562 / CVE-2013-4011,7100-00-10,iv43562m9.130626.epkg.Z,https://www.ibm.com/support/pages/node/5741571,devices.common.IBM.ib.rte:7.1.0.0-7.1.0.21,20130716, ,6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652,https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar,CVE-2013-4011:7.2,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02,Security Vulnerabilities in AIX InfiniBand,IV43580 / CVE-2013-4011,6100-08-03,iv43580m2a.130619.epkg.Z,https://www.ibm.com/support/pages/node/5741571,devices.common.IBM.ib.rte:6.1.8.0-6.1.8.15,20130716, ,6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652,https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar,CVE-2013-4011:7.2,no sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7,Security Vulnerabilities in VIOS InfiniBand,IV43580 / CVE-2013-4011,2.2.1.8,iv43827m7a.130614.epkg.Z,https://www.ibm.com/support/pages/node/5741571,devices.common.IBM.ibm.rte:6.1.7.0-6.1.7.16,20130716, ,6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652,https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar,CVE-2013-4011:7.2,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2,Security Vulnerabilities in VIOS InfiniBand,IV43580 / CVE-2013-4011,2.2.2.3,iv43580m2a.130619.epkg.Z,https://www.ibm.com/support/pages/node/5741571,devices.common.IBM.ib.rte:6.1.8.0-6.1.8.15,20130716, ,6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652,https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar,CVE-2013-4011:7.2,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11,Security Vulnerabilities in AIX InfiniBand,IV43582/ CVE-2013-4011,6100-06-12,iv43582mBa.130626.epkg.Z,https://www.ibm.com/support/pages/node/5741571,devices.common.IBM.ib.rte:6.1.6.0-6.1.6.21,20130716, ,6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652,https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar,CVE-2013-4011:7.2,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07,Security Vulnerabilities in AIX InfiniBand,IV43756 / CVE-2013-4011,7100-01-08,iv43756m7a.130612.epkg.Z,https://www.ibm.com/support/pages/node/5741571,devices.common.IBM.ib.rte:7.1.1.0-7.1.1.18,20130716, ,6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652,https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar,CVE-2013-4011:7.2,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07,Security Vulnerabilities in AIX InfiniBand,IV43827 / CVE-2013-4011,6100-07-08,iv43827m7a.130614.epkg.Z,https://www.ibm.com/support/pages/node/5741571,devices.common.IBM.ibm.rte:6.1.7.0-6.1.7.16,20130716, ,6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652,https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar,CVE-2013-4011:7.2,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08,Security vulnerabilities in Perl for AIX,IV43973 / CVE-2012-5526 / CVE-2013-1667,6100-09-00,n/a,https://www.ibm.com/support/pages/node/5740761,perl.rte:5.8.8.0-5.8.8.244,20131120,20131204,7100-00:IV46765,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2012-5526:4.3 / CVE-2013-1667:4.3,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7,Security vulnerabilities in Perl for VIOS,IV43973 / CVE-2012-5526 / CVE-2013-1667,2.2.3.0,n/a,https://www.ibm.com/support/pages/node/5740761s,perl.rte:5.8.8.0-5.8.8.244,20131120,20131204,7100-00:IV46765,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2012-5526:4.3 / CVE-2013-1667:4.3,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03,CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP,IV44039,7100-02-04,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV44039,bos.mp64:7.1.2.0-7.1.2.16,20140605, ,6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950, , ,no hiper,aix,6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11 :: 6100-06-12,SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT,IV45736,6100-07-09,IV45736sAa.130721.61TL06SP10.epkg.Z / IV45736sAa.130721.epkg.Z / IV45736sBa.130724.61TL06SP11.epkg.Z / IV45736sBa.130724.epkg.Z / IV45736sCa.130916.61TL06SP12.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV45736,bos.mp64:6.1.6.18-6.1.6.23,20130716,20130814,7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898,ftp://public.dhe.ibm.com/aix/ifixes/iv45736/, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08,SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT,IV45897,6100-07-09,IV45897s7a.130724.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV45897,bos.mp64:6.1.7.0-6.1.7.19,20130721,20140217,7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898,ftp://public.dhe.ibm.com/aix/ifixes/iv45897/, ,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03,SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT,IV45898,6100-08-04,IV45898s2b.130724.epkg.Z / IV45898s3a.130819.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV45898,bos.mp64:6.1.8.0-6.1.8.16,20130721,20140217,7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898,ftp://public.dhe.ibm.com/aix/ifixes/iv45898/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08,SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT,IV45899,7100-01-09,IV45899s7a.130724.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV45899,bos.mp64:7.1.1.1-7.1.1.19,20130721,20140217,7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898,ftp://public.dhe.ibm.com/aix/ifixes/iv45899/, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03,SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT,IV46104,7100-02-04,IV46104s2a.130725.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV46104,bos.mp64:7.1.2.0-7.1.2.16,20130724,20140217,7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898,ftp://public.dhe.ibm.com/aix/ifixes/iv46104/, ,no hiper,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09,SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT,IV46105, ,IV46105s9a.130725.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV46105,bos.mp64:7.1.0.0-7.1.0.23,20130724,20130814,7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898,ftp://public.dhe.ibm.com/aix/ifixes/iv46105/, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03,Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system,IV46246,7100-02-04,IV46246s3a.130821.71TL02SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV46246,bos.mp64:7.1.2.0-7.1.2.16,20130729,20140217,7100-02:IV46246 7100-01:IV48042 6100-08:IV47394,ftp://public.dhe.ibm.com/aix/ifixes/iv46246/, ,no hiper,aix,7100-03-00,CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP,IV46590,7100-03-01,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV46950,bos.mp64:7.1.3.0,20140605, ,6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950, , ,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08,Security vulnerabilities in Perl for AIX,IV46765 / CVE-2012-5526 / CVE-2013-1667,7100-03-00,n/a,https://www.ibm.com/support/pages/node/5740761,perl.rte:5.10.1.0-5.10.1.150,20121120,20131204,6100-00:IV43973,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2012-5526:4.3 / CVE-2013-1667:4.3,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03,CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP,IV46850,6100-08-04,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV46850,bos.mp64:6.1.8.0-6.1.8.16,20140605, ,6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950, , ,no hiper,aix,6100-09-00,CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP,IV46897,6100-09-01,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV46897,bos.mp64:<6.1.9.15,20140605, ,6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950, , ,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03,VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS,IV47037,6100-08-04,IV47037s3a.130828.61TL08SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV47037,devices.pci.77102224.com:6.1.8.0-6.1.8.17,20130813,20140217,6100-07:IV47348 6100-08:IV47037 6100-09:IV47532 7100-01:IV47350 7100-02:IV47351 7100-03:IV47353,ftp://public.dhe.ibm.com/aix/ifixes/iv47037/, ,no hiper,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08,VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS,IV47347,5300-12-09,IV47347s8a.130925.53TL12SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV47347,devices.pci.77102224.com:5.3.12.0-5.3.12.8,20130821,20131002,7100-01:IV47350 7100-02:IV47351 6100-07:IV47348 6100-08:IV47037 5300-12:IV47347,ftp://aix.software.ibm.com/aix/efixes/iv47347/, ,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08,VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS,IV47348,6100-07-09,IV47348s8a.130917.61TL07SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV47348,devices.pci.77102224.com:6.1.7.0-6.1.7.19,20130821,20140217,6100-07:IV47348 6100-08:IV47037 6100-09:IV47532 7100-01:IV47350 7100-02:IV47351 7100-03:IV47353,ftp://public.dhe.ibm.com/aix/ifixes/iv47348/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08,VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS,IV47350,7100-01-09,IV47350s8a.130923.71TL01SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV47350,devices.pci.77102224.com:7.1.1.0-7.1.1.20,20130821,20140217,6100-07:IV47348 6100-08:IV47037 6100-09:IV47532 7100-01:IV47350 7100-02:IV47351 7100-03:IV47353,ftp://public.dhe.ibm.com/aix/ifixes/iv47350/, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03,VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS,IV47351,7100-02-04,IV47351s3a.130925.71TL02SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV47351,devices.pci.77102224.com:7.1.2.0-7.1.2.18,20130821,20140217,6100-07:IV47348 6100-08:IV47037 6100-09:IV47532 7100-01:IV47350 7100-02:IV47351 7100-03:IV47353,ftp://public.dhe.ibm.com/aix/ifixes/iv47351/, ,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03,Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system,IV47394,6100-08-04,IV47394s3a.130821.61TL08SP03.epkg.Z / IV47394s2a.130821.61TL08SP02.epkg.Z / IV47394s1a.131122.61TL08SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV47394,bos.mp64:6.1.8.0-6.1.8.16,20130821,20140217,7100-02:IV46246 7100-01:IV48042 6100-08:IV47394: 6100-07:IV48041,ftp://public.dhe.ibm.com/aix/ifixes/iv47394/, ,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08,AIX printer commands vulnerability,IV47427 / CVE-2013-5419,6100-07-09,IV47427s4a.130827.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3224&myns=pwraix61&mync=E,bos.rte.printers:6.1.7.0-6.1.7.16,20130925,20130925,6100-07:IV47427 6100-08:IV47428 7100-01:IV47429 7100-02:IV47430,https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar,CVE-2013-5419:6.9,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03,AIX printer commands vulnerability,IV47428 / CVE-2013-5419,6100-08-04,IV47428s2a.130827.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3224&myns=pwraix61&mync=E,bos.rte.printers:6.1.8.0-6.1.8.15,20130925,20130925,6100-07:IV47427 6100-08:IV47428 7100-01:IV47429 7100-02:IV47430,https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar,CVE-2013-5419:6.9,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08,AIX printer commands vulnerability,IV47429 / CVE-2013-5419,7100-01-09,IV47429s4a.130827.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3224&myns=pwraix61&mync=E,bos.rte.printers:7.1.1.0-7.1.1.16,20130925,20130925,6100-07:IV47427 6100-08:IV47428 7100-01:IV47429 7100-02:IV47430,https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar,CVE-2013-5419:6.9,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02,AIX printer commands vulnerability,IV47430 / CVE-2013-5419,7100-02-04,IV47430s2a.130827.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3224&myns=pwraix61&mync=E,bos.rte.printers:7.1.2.0-7.1.2.15,20130925,20130925,6100-07:IV47427 6100-08:IV47428 7100-01:IV47429 7100-02:IV47430,https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar,CVE-2013-5419:6.9,no hiper,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08,CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP,IV47865,6100-07-09,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV47865,bos.mp64:6.1.7.0-6.1.7.19,20140605, ,6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950, , ,no hiper,aix,6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08,Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system,IV48041,6100-07-09,IV48041s6a.131002.61TL07SP06.epkg.Z / IV48041s7a.131009.61TL07SP07.epkg.Z / IV48041s8a.130910.61TL07SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV48041,bos.mp64:6.1.7.15-6.1.7.19,20130813,20140217,6100-07:IV48041 6100-08:IV45898 7100-01:IV48042 7100-02:IV46246,ftp://public.dhe.ibm.com/aix/ifixes/iv48041/, ,no hiper,aix,6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08,Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system,IV48041,6100-07-09,IV48041s8a.130910.61TL07SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV48041,bos.mp64:6.1.7.15-6.1.7.19,20130910,20130927,7100-02:IV46246 7100-01:IV48042 6100-08:IV47394,ftp://public.dhe.ibm.com/aix/ifixes/iv48041/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08,Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system,IV48042,7100-01-09,IV48042s8a.130910.71TL01SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV48042,bos.mp64:7.1.1.15-7.1.1.19,20130910,20140217,7100-02:IV46246 7100-01:IV48042 6100-08:IV47394,ftp://public.dhe.ibm.com/aix/ifixes/iv48042/, ,no hiper,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08,CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP,IV49394,7100-01-09,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV49394,bos.mp64:7.1.1.0-7.1.1.19,20140605, ,6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950, , ,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04,AIX WPAR vulnerability,IV51421 / CVE-2014-0899,next vwpar update,IV51420s52.131030.epkg.Z / IV51420s53.131031.epkg.Z / IV51421s52.131030.epkg.Z / IV51421s53.131031.epkg.Z,https://www.ibm.com/support/pages/node/5741691,vwpar.52.rte:1.1.0.0-1.1.1.19 vwpar.52.rte:1.1.2.0-1.1.2.17 wpar.53.rte:1.1.0.0-1.1.1.18 vwpar.53.rte:1.1.2.0-1.1.2.15,20140306,20140408,n/a,https://aix.software.ibm.com/aix/efixes/security/wparcre_fix.tar,CVE-2014-0899:5.5,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09,Vulnerability in AIX X-Server,IV52181 / CVE-2013-4396,6100-07-10,IV52181s0a.131220.epkg.Z,https://www.ibm.com/support/pages/node/5740773,Xll.base.rte:6.1.8.0,20140121,20140122,7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331,https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar,CVE-2013-4396:5.5,no sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8,Vulnerability in VIOS X-Server,IV52181 / CVE-2013-4396,2.2.1.9,IV52181s0a.131220.epkg.Z,https://www.ibm.com/support/pages/node/5740773,Xll.base.rte:6.1.8.0,20140121,20140122,7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331,https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar,CVE-2013-4396:5.5,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04,Vulnerability in AIX X-Server,IV52184 / CVE-2013-4396,6100-08-05,IV52184s0a.131220.epkg.Z,https://www.ibm.com/support/pages/node/5740773,Xll.base.rte:6.1.8.0,20140121,20140122,7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331,https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar,CVE-2013-4396:5.5,no sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4,Vulnerability in VIOS X-Server,IV52184 / CVE-2013-4396,2.2.2.5,IV52184s0a.131220.epkg.Z,https://www.ibm.com/support/pages/node/5740773,Xll.base.rte:6.1.8.0,20140121,20140122,7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331,https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar,CVE-2013-4396:5.5,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09,Vulnerability in AIX X-Server,IV52185 / CVE-2013-4396,7100-01-10,IV52185s0a.131220.epkg.Z,https://www.ibm.com/support/pages/node/5740773,Xll.base.rte:7.1.1.0-7.1.1.15,20140121,20140122,7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331,https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar,CVE-2013-4396:5.5,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04,Vulnerability in AIX X-Server,IV52186 / CVE-2013-4396,7100-02-05,IV52186s0a.131220.epkg.Z,https://www.ibm.com/support/pages/node/5740773,Xll.base.rte:7.1.2.0,20140121,20140122,7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331,https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar,CVE-2013-4396:5.5,no hiper,aix,6100-09-00 :: 6100-09-01,CREATING SEA OR ETHERCHANNEL ON FC 5899 ADAPTER IS NOT POSSIBLE,IV52695,6100-09-02,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV52695,devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.1,20140514, ,6100-09:IV52695 7100-03:IV52765,http://www-933.ibm.com/support/fixcentral/aix/quickorder?release=6.1&function=fixId&fixids=U865786&includeSupersedes=0&source=fc, ,no hiper,aix,7100-03-00 :: 7100-03-01,CREATING SEA OR ETHERCHANNEL ON FC 5899 ADAPTER IS NOT POSSIBLE,IV52765,7100-03-02,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV52765,devices.pciex.e4145616e4140518.rte:7.1.3.0-7.1.3.1,20140514, ,6100-09:IV52695 7100-03:IV52765,http://www-933.ibm.com/support/fixcentral/aix/quickorder?release=6.1&function=fixId&fixids=U865786&includeSupersedes=0&source=fc, ,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02,Vulnerability in AIX X-Server,IV52978 / CVE-2013-4396,6100-09-03,IV52978s0a.140128.epkg.Z,https://www.ibm.com/support/pages/node/5740773,Xll.base.rte:6.1.9.0-6.1.9.2,20140121,20140122,7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331,https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar,CVE-2013-4396:5.5,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2,Vulnerability in VIOS X-Server,IV52978 / CVE-2013-4396,2.2.3.3,IV52978s0a.140128.epkg.Z,https://www.ibm.com/support/pages/node/5740773,Xll.base.rte:6.1.9.0-6.1.9.2,20140121,20140122,7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331,https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar,CVE-2013-4396:5.5,no hiper,aix,6100-09-00 :: 6100-09-01,TAPE MKSYSB RESTORES FROM 6100-09 OR 7100-03 WILL FAIL.,IV53002,6100-09-02,IV53002s01.140107.61TL09SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV53002,bos.sysmgt.sysbr:6.1.9.0-6.1.9.1,20131209, ,6100-09:IV53002 7100-03:IV53003,https://aix.software.ibm.com/aix/ifixes/iv53002/, ,no hiper,aix,7100-03-00 :: 7100-03-01,TAPE MKSYSB RESTORES FROM 6100-09 OR 7100-03 WILL FAIL.,IV53003,7100-03-02,IV53003s1c.140122.71TL03SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV53002,bos.sysmgt.sysbr:7.1.3.0-7.1.3.1,20131209, ,6100-09:IV53002 7100-03:IV53003,https://aix.software.ibm.com/aix/ifixes/iv53003/, ,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02,Vulnerability in AIX X-Server,IV53246 / CVE-2013-4396,7100-03-03,IV53246s0a.140128.epkg.Z,https://www.ibm.com/support/pages/node/5740773,Xll.base.rte:7.1.3.0-7.1.3.2,20140121,20140122,7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331,https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar,CVE-2013-4396:5.5,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08,Vulnerability in AIX X-Server,IV53331 / CVE-2013-4396,5300-12-09,IV53331s0a.131220.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3353&myns=pwraix61&mync=E,Xll.base.rte:5.3.12.0-5.3.12.1,20140121,20140122,7100-02:IV52186 7100-01:IV52185 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331,ftp://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar,CVE-2013-4396:5.5,no hiper,aix,6100-09-00 :: 6100-09-01,XMGC NOT TRAVERSING ALL KERNEL HEAPS.,IV53582,6100-09-02,IV53582s0a.140109.61TL9SP0.epkg.Z / IV53582s0a.140109.epkg.Z / IV53582s1b.140109.61TL9SP1.epkg.Z / IV53582s1b.140109.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV53582,bos.mp64:6.1.9.0-6.1.9.1,20131226,20140110,6100-09:IV53582 7100-03:IV53587,https://aix.software.ibm.com/aix/ifixes/iv53582/, ,no hiper,aix,7100-03-00 :: 7100-03-01,XMGC NOT TRAVERSING ALL KERNEL HEAPS.,IV53587,7100-03-02,IV53587s0a.140109.71TL3SP0.epkg.Z / IV53587s0a.140109.epkg.Z / IV53587s1b.140109.71TL3SP1.epkg.Z / IV53587s1b.140109.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV53587,bos.mp64:7.1.3.0-7.1.3.1,20131227,20140110,6100-09:IV53582 7100-03:IV53587,https://aix.software.ibm.com/aix/ifixes/iv53587/, ,no hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02,UNABLE TO SU TO A NIS USER,IV53884,7100-03-03,IV53884s1a.140113.71TL03SP01.epkg.Z,https://www-01.ibm.com/support/docview.wss?uid=isg1IV58128,bos.rte.security:7.1.3.0-7.1.3.1,20140328, ,6100-09:IV53944 7100-03:IV53884,https://aix.software.ibm.com/aix/ifixes/iv53884/, ,no hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02,UNABLE TO SU TO A NIS USER,IV53944,6100-09-03,IV53944s1a.140113.61TL09SP01.epkg.Z,https://www.ibm.com/support/pages/node/5752383,bos.rte.security:6.1.9.0-6.1.9.1,20140328, ,6100-09:IV53944 7100-03:IV53884,https://aix.software.ibm.com/aix/ifixes/iv53944/, ,no hiper,aix,7100-03-00 :: 7100-03-01,DISK I/O ERROR WITH ALGORITHM ROUND_ROBIN OR SHORTEST_QUEUE,IV54905,7100-03-02,IV54905s1a.140203.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV54905,devices.common.IBM.mpio.rte:7.1.3.0-7.1.3.1,20140203,20140204,6100-09:IV54907 7100-03:IV54905,https://aix.software.ibm.com/aix/ifixes/iv54905/, ,no hiper,aix,6100-09-00 :: 6100-09-01,DISK I/O ERROR WITH ALGORITHM ROUND_ROBIN OR SHORTEST_QUEUE,IV54907,6100-09-02,IV54907s1a.140203.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV54907,devices.common.IBM.mpio.rte:6.1.9.0-6.1.9.1,20140203,20140204,6100-09:IV54907 7100-03:IV54905,https://aix.software.ibm.com/aix/ifixes/iv54907/, ,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8 :: 2.2.1.9,Security Vulnerability in Perl _compile,IV56641 / CVE-2012-6329,2.2.3.3,perl61.zip,https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc,perl.rte:5.8.8.0-5.8.8.366,20140423, ,5300-12:IV56641 6100-09:IV56641 7100-03:IV56642,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2012-6329:7.5,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Security Vulnerability in Perl _compile,IV56641 / CVE-2012-6329,perl.rte:5.8.8.488,perl61.zip,https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc,perl.rte:5.8.8.0-5.8.8.123,20140423, ,5300-12:IV56641 6100-09:IV56641 7100-03:IV56642,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2012-6329:7.5,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09,Security Vulnerability in Perl _compile,IV56641 / CVE-2012-6329,perl.rte:5.8.8.488,perl61.zip,https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc,perl.rte:5.8.8.0-5.8.8.366,20140423, ,5300-12:IV56641 6100-09:IV56641 7100-03:IV56642,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2012-6329:7.5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09 :: 7100-01-10,Security Vulnerability in Perl _compile,IV56642 / CVE-2012-6329,perl.rte:5.10.1.250,perl71.zip,https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc,perl.rte:5.10.10.-5.10.1.200,20140423, ,5300-12:IV56641 6100-09:IV56641 7100-03:IV56642,https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp,CVE-2012-6329:7.5,no hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02,JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN,IV57361,7100-03-03,IV57361s2a.140505.71TL03SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV57361,bos.mp64:7.1.3.0-7.1.3.2,20140509,20140602,7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235,https://aix.software.ibm.com/aix/ifixes/iv57361/, ,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04,AIX ptrace Vulnerability,IV58861 / CVE-2014-0930,7100-02-05,IV58861s4a.140422.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29,bos.mp64:7.1.2.0-7.1.2.17,20140502,20140520,5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607,https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar,CVE-2014-0930:4.7,yes sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09,AIX ptrace Vulnerability,IV58888 / CVE-2014-0930,7100-01-10,IV58888s9a.140422.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29,bos.mp64:7.1.1.0-7.1.1.20,20140502,20140520,5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607,https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar,CVE-2014-0930:4.7,yes sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04,AIX ptrace Vulnerability,IV58948 / CVE-2014-0930,6100-08-05,IV58948s4a.140423.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29,bos.mp64:6.1.8.0-6.1.8.17,20140502,20140520,5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607,https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar,CVE-2014-0930:4.7,yes sec,vios,2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4,VIOS ptrace Vulnerability,IV58948 / CVE-2014-0930,2.2.2.5,IV58948s4a.140423.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS71&path=/201405/SECURITY/20140505/datafile095150&label=VIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29,bos.mp64:6.1.8.0-6.1.8.17,20140502, ,5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV58766 7100-01:IV58888 7100-02:IV58861 7100-03:IV58840,https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar,CVE-2014-0930:4.7,yes sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09,AIX ptrace Vulnerability,IV59045 / CVE-2014-0930,6100-07-10,IV59045s9a.140425.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29,bos.mp64:6.1.7.0-6.1.7.20,20140502,20140520,5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607,https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar,CVE-2014-0930:4.7,yes sec,vios,2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8,VIOS ptrace Vulnerability,IV59045 / CVE-2014-0930,2.2.1.9,IV59045s9a.140425.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS71&path=/201405/SECURITY/20140505/datafile095150&label=VIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29,bos.mp64:6.1.7.0-6.1.7.20,20140502, ,5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV58766 7100-01:IV58888 7100-02:IV58861 7100-03:IV58840,https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar,CVE-2014-0930:4.7,yes hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02,JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN,IV59100,6100-09-03,IV59100s2a.140507.61TL09SP02.epkg.Z,https://www-304.ibm.com/support/docview.wss?uid=isg1IV59100,bos.mp64:6.1.9.0-6.1.9.2,20140509,20140602,7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235,https://aix.software.ibm.com/aix/ifixes/iv59100/, ,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04,JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN,IV59225,6100-08-05,IV59225s4a.140507.61TL08SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV59225,bos.mp64:6.1.8.0-6.1.8.17,20140509,20140602,7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235,https://aix.software.ibm.com/aix/ifixes/iv59225, ,no hiper,aix,6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09,JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN,IV59227,6100-07-10,IV59227s9a.140508.61TL07SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV59227,bos.mp64:6.1.7.17-6.1.7.20,20140509,20140602,7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235,https://aix.software.ibm.com/aix/ifixes/iv59227/, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04,JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN,IV59229,7100-02-05,IV59229s2a.140507.71TL02SP02.epkg.Z / IV59229s2a.140507.71TL02SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV59229,bos.mp64:7.1.2.0-7.1.2.17,20140509, ,7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235,https://aix.software.ibm.com/aix/ifixes/iv59229/, ,no hiper,aix,7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09,JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN,IV59232,7100-01-10,IV59232s9a.140507.71TL01SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV59232,bos.mp64:7.1.1.17-7.1.1.1,20140509, ,7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235,https://aix.software.ibm.com/aix/ifixes/iv59232/, ,no hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04,LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR,IV59492,6100-09-05,IV59492s3b.150330.61TL09SP03.epkg.Z IV59492s4c.150323.61TL09SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV59492,devices.chrp.base.rte:6.1.9.0-6.1.9.45,20150317, ,6100-08:IV71109 6100-09:IV59492 7100-02:IV71110 7100-03:IV67876,https://aix.software.ibm.com/aix/ifixes/iv59492/, ,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02,AIX ptrace Vulnerability,IV59607 / CVE-2014-0930,7100-03-03,IV59607s2a.140422.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29,bos.mp64:7.1.3.0-7.1.3.2,20140502,20140520,5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607,https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar,CVE-2014-0930:4.7,yes sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02,AIX ptrace Vulnerability,IV59615 / CVE-2014-0930,6100-09-03,IV59615s2a.140422.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29,bos.mp64:6.1.9.0-6.1.9.2,20140502,20140520,5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607,https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar,CVE-2014-0930:4.7,yes sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2,VIOS ptrace Vulnerability,IV59615 / CVE-2014-0930,2.2.3.3,IV59615s2a.140422.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS71&path=/201405/SECURITY/20140505/datafile095150&label=VIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29,bos.mp64:6.1.9.0-6.1.9.2,20140502, ,5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607,https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar,CVE-2014-0930:4.7,yes sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,AIX ptrace Vulnerability,IV59675 / CVE-2014-0930,interim fix only,IV59675s9.140425.epkg.Z,http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29,bos.mp64:5.3.12.0-5.3.12.9,20140502,20140520,5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607,ftp://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar,CVE-2014-0930:4.7,yes hiper,aix,5300-12-07 :: 5300-12-08 :: 5300-12-09,JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN,IV60235,interim fix only,IV60235s9a.140508.53TL12SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV60235,bos.mp64:5.3.12.7-5.3.12.9,20140509,20140602,7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235,https://aix.software.ibm.com/aix/ifixes/iv60235/, ,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02,Arbitary file overwrite symlink in libodm,IV60299 / CVE-2012-2179,6100-09-03,IV60299s2a.140515.epkg.Z,https://www.ibm.com/support/pages/node/5740875,bos.rte.odm:6.1.9.0,20120614,20140523,6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303,https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar,CVE-2012-2179:6.9,yes sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02,Arbitary file overwrite symlink in libodm,IV60303 / CVE-2012-2179,7100-03-03,IV60303s2a.140515.epkg.Z,https://www.ibm.com/support/pages/node/5740875,bos.rte.odm:7.1.3.0,20120614,20140523,6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303,https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar,CVE-2012-2179:6.9,yes sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04,Arbitary file overwrite symlink in libodm,IV60311 / CVE-2012-2179,6100-08-05,IV60311s4a.140515.epkg.Z,https://www.ibm.com/support/pages/node/5740875,bos.rte.odm:6.1.8.0,20120614,20140523,6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303,https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar,CVE-2012-2179:6.9,yes sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09,Arbitary file overwrite symlink in libodm,IV60312 / CVE-2012-2179,7100-01-10,IV60312s9a.140515.epkg.Z,https://www.ibm.com/support/pages/node/5740875,bos.rte.odm:7.1.1.0-7.1.1.16,20120614,20140523,6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303,https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar,CVE-2012-2179:6.9,yes sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09,Arbitary file overwrite symlink in libodm,IV60313 / CVE-2012-2179,6100-07-10,IV60313s9a.140515.epkg.Z,https://www.ibm.com/support/pages/node/5740875,bos.rte.odm:6.1.7.0-6.1.7.16,20120614,20140523,6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303,https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar,CVE-2012-2179:6.9,yes sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04,Arbitary file overwrite symlink in libodm,IV60314 / CVE-2012-2179,7100-02-05,IV60314s4a.140515.epkg.Z,https://www.ibm.com/support/pages/node/5740875,bos.rte.odm:7.1.2.0-7.1.2.15,20120614,20140523,6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303,https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar,CVE-2012-2179:6.9,yes hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03,VIOS USING NPIV CAN CRASH SYSTEM,IV61759,6100-09-04,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV61759,devices.pciex.df1060e214103404.com:<6.1.9.30,20150213, ,6100-08:IV64465 6100-09:IV61759 7100-02:IV64283 7100-03:IV61764,http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo149944, ,no hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03,VIOS USING NPIV CAN CRASH SYSTEM,IV61764,7100-03-04,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV61764,devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.16,20150213, ,6100-08:IV64465 6100-09:IV61759 7100-02:IV64283 7100-03:IV61764,http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo149944, ,no hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03,UNEXPECTED APPLICATION BEHAVIOR WHEN USING TM POWER8 MODE ONLY,IV62820,7100-03-04,IV62820s3a.140808.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV62820,bos.mp64:7.1.3.0-7.1.3.30,20140818, ,7100-03:IV62820,https://aix.software.ibm.com/aix/ifixes/iv62820/, ,no hiper,aix,7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05,VIOS USING NPIV CAN CRASH SYSTEM,IV64283,7100-02-06,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV64283,devices.pciex.df1060e214103404.com:7.1.2.15-7.1.2.19,20150213, ,6100-08:IV64465 6100-09:IV61759 7100-02:IV64283 7100-03:IV61764,http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo149944, ,no hiper,aix,6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05,VIOS USING NPIV CAN CRASH SYSTEM,IV64465,6100-08-06,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV64465,devices.pciex.df1060e214103404.com:6.1.8.15-6.1.8.19,20150213, ,6100-08:IV64465 6100-09:IV61759 7100-02:IV64283 7100-03:IV61764,http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo149944, ,no hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04,SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF,IV65814,6100-09-05,IV65814m3b.141230.61TL09SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV65814,bos.mp64:<6.1.9.100,20150215, ,6100-08:IV66677 6100-09:IV65814 7100-02:IV69445 7100-03:IV66484,https://aix.software.ibm.com/aix/ifixes/iv65814/, ,no hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04,SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF,IV66484,7100-03-05,IV66484m04.141230.71TL03SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV66484,bos.mp64:7.1.3.0-7.1.3.30,20150215, ,6100-08:IV66677 6100-09:IV65814 7100-02:IV69445 7100-03:IV66484,https://aix.software.ibm.com/aix/ifixes/iv66484/, ,no hiper,aix,7100-03-04 :: 7100-03-03,REGISTER CORRUPTION WHEN USING TRANSACTIONAL MEMORY ON POWER8,IV66636,7100-03-05,IV66636m3a.141106.71TL03SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV66636,bos.mp64:7.1.3.16-7.1.3.30,20141111, ,n/a,https://aix.software.ibm.com/aix/ifixes/iv66636/, ,no hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF,IV66677,6100-08-07,IV66677m6k.150211.61TL08SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV66677,bos.mp64:6.1.8.0-6.1.8.19,20150215, ,6100-08:IV66677 6100-09:IV65814 7100-02:IV69445 7100-03:IV66484,https://aix.software.ibm.com/aix/ifixes/iv66677/, ,no hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04,LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR,IV67876,7100-03-05,IV67876s3a.150330.71TL03SP03.epkg.Z IV67876s4b.150323.71TL03SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV67876,devices.chrp.base.rte:7.1.3.0-7.1.3.45,20150317, ,6100-08:IV71109 6100-09:IV59492 7100-02:IV71110 7100-03:IV67876,https://aix.software.ibm.com/aix/ifixes/iv67876/, ,no hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02,EEH EVENTS FOLLOWED BY INACCESSIBLE PCI / CFFH ADAPTER,IV68712,6100-09-05,IV68547m4a.150123.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV68712,devices.chrp.pci.rte:6.1.9.0-6.1.9.30,20150205, ,7100-03:IV68730 6100-09:IV68712,https://aix.software.ibm.com/aix/ifixes/iv68712/, ,no hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04,EEH EVENTS FOLLOWED BY INACCESSIBLE PCI / CFFH ADAPTER,IV68730,7100-03-05,IV68678m4d.150204.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV68730,devices.chrp.pci.rte:7.1.3.0-7.1.3.30,20150205, ,7100-03:IV68730 6100-09:IV68712,https://aix.software.ibm.com/aix/ifixes/iv68730/, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF,IV69445,7100-02-07,IV69445m6k.150213.71TL02SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV69445,bos.mp64:7.1.2.0-7.1.2.19,20150215, ,6100-08:IV66677 6100-09:IV65814 7100-02:IV69445 7100-03:IV66484,https://aix.software.ibm.com/aix/ifixes/iv69445/, ,no hiper,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4,NEAR FULL SHARED STORAGE POOL CAN OVERWRITE FILESYSTEM METADATA.,IV70381,2.2.3.50,IV70381m4a.150527.61TL09SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV70381,pool.basic.rte:<6.1.9.45,20150603, ,n/a,https://aix.software.ibm.com/aix/ifixes/iv70381/, ,yes hiper,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06,LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR,IV71109,6100-08-07,IV71109s2a.150420.61TL08SP02.epkg.Z IV71109s6b.150323.61TL08SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV71109,devices.chrp.base.rte:6.1.8.0-6.1.8.21,20150317, ,6100-08:IV71109 6100-09:IV59492 7100-02:IV71110 7100-03:IV67876,https://aix.software.ibm.com/aix/ifixes/iv71109/, ,no hiper,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06,LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR,IV71110,7100-02-07,IV71110s4a.150420.71TL02SP04.epkg.Z IV71110s6a.150323.71TL02SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV71110,devices.chrp.base.rte:7.1.2.0-7.1.2.21,20150317, ,6100-08:IV71109 6100-09:IV59492 7100-02:IV71110 7100-03:IV67876,https://aix.software.ibm.com/aix/ifixes/iv71110/, ,no hiper,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4,NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK,IV71217,2.2.3.50,IV69760.fix.tar,http://www-01.ibm.com/support/docview.wss?uid=isg1IV69760,rsct.core.rmc:3.2.0.0-3.2.0.4,20150319,20150512,6100-09:IV71217 7100-03:IV71219,https://aix.software.ibm.com/aix/ifixes/iv69760/, ,no hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04,NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK,IV71217,6100-09-05,IV69760.fix.tar,http://www-01.ibm.com/support/docview.wss?uid=isg1IV69760,rsct.core.rmc:3.2.0.0-3.2.0.4,20150319,20150512,6100-09:IV71217 7100-03:IV71219,https://aix.software.ibm.com/aix/ifixes/iv69760/, ,no hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04,NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK,IV71219,7100-03-05,IV69760.fix.tar,http://www-01.ibm.com/support/docview.wss?uid=isg1IV71219,rsct.core.rmc:3.2.0.0-3.2.0.4,20150319,20150512,6100-09:IV71217 7100-03:IV71219,https://aix.software.ibm.com/aix/ifixes/iv69760/, ,no hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06, Cluster node halt due to Group Services client errors,IV74438,7100-03-07,ctHA_M1r.160808.71TL03SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV74438,rsct.basic.rte:3.1.5.0-3.2.0.7 rsct.core.rmc:3.1.5.0-3.2.0.9,20160628, ,7100-04:IV85983 7200-00:IV85983,https://aix.software.ibm.com/aix/ifixes/iv74438/, ,yes hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07,Cluster node halt due to Group Services client errors,IV74438,6100-09-08,ctHA_M1r.160808.61TL09SP05.epkg.Z ctHA_M2r.160809.61TL09SP06.epkg.Z ctHA_M2r.160809.61TL09SP07.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV74438,rsct.basic.rte:3.1.5.0-3.2.0.7 rsct.core.rmc:3.1.5.0-3.2.0.9,20160628, ,7100-04:IV85983 7200-00:IV85983,https://aix.software.ibm.com/aix/ifixes/iv74438/, ,yes hiper,vios,2.2.3.51 :: 2.2.3.52,CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL,IV74711,2.2.3.60,IV74711s5a.150716.61TL09SP05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV74711,bos.rte.tty:6.1.9.0-6.1.9.45,20150720, ,6100-09:IV74711 7100-03:IV75031,https://aix.software.ibm.com/aix/ifixes/iv74711/, ,yes hiper,aix,6100-09-05,CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL,IV74711,6100-09-06,IV74711s5a.150716.61TL09SP05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV74711,bos.rte.tty:6.1.9.0-6.1.9.45,20150720, ,6100-09:IV74711 7100-03:IV75031,https://aix.software.ibm.com/aix/ifixes/iv74711/, ,yes hiper,aix,7100-03-05,CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL,IV75031,7100-03-06,IV75031s5a.150716.71TL03SP05.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV75031,bos.rte.tty:7.1.3.0-7.1.3.45,20150720, ,6100-09:IV74711 7100-03:IV75031,https://aix.software.ibm.com/aix/ifixes/iv75031/, ,yes hiper,aix,7100-04-00,POSSIBLE SYSTEM CRASH USING PROCFS TO READ 32BIT PROCESS MAP FIL,IV79262,7100-04-00,IV79262m1a.151211.71TL04SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV79262,bos.mp64:7.1.4.0,20151219, ,7200-00:IV79441 7100-04:IV79262,https://aix.software.ibm.com/aix/ifixes/iv79262/, ,yes hiper,aix,7200-00-00 :: 7200-00-01,POSSIBLE SYSTEM CRASH USING PROCFS TO READ 32BIT PROCESS MAP FIL,IV79441,7200-00-02,IV79441m1a.151214.72TL00SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV79441,bos.mp64:7.2.0.0-7.2.0.1,20151204, ,7200-00:IV79441 7100-04:IV79262,https://aix.software.ibm.com/aix/ifixes/iv79441/, ,yes hiper,aix,7200-00-00 :: 7200-00-01,AFTER LIVE UPDATE IFIX STATE MAY BE LEFT AS Q; REBOOT REQUIRED,IV79639,7200-00-02,IV79639s0a.151210.72TL00SP00.epkg.Z IV79639s0a.151210.72TL00SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV79639,bos.liveupdate.rte:7.2.0.0-7.2.0.1,20151210, ,n/a,https://aix.software.ibm.com/aix/ifixes/iv79639/, ,LU hiper,aix,7200-00-00 :: 7200-00-01,MIRRORVG/SYNCVG ON MIMIMAL AND MIGRATION INSTALL FAILS,IV79848,7200-00-02,IV79848s1a.151217.72TL00SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV79848,bos.rte.lvm:7.2.0.0-7.2.0.1,20151217, ,n/a,https://aix.software.ibm.com/aix/ifixes/iv79848/, ,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06,Vulnerabilities in NTP affect AIX,IV79942 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855,6100-09-07,IV79942s6a.160119.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc,bos.net.tcp.client:6.1.9.0-6.1.9.101 ntp.rte:6.1.6.0-6.1.6.4,20160121, ,5300-12:IV79946 6100-09:IV79942 7100-03:IV79943 7100-04:IV79944 7200-00:IV79945,https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar,CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3,no sec,vios,2.2.4.0,Vulnerabilities in NTP affect VIOS,IV79942 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855,2.2.4.20,IV79942s6a.160119.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc,bos.net.tcp.client:6.1.9.0-6.1.9.101 ntp.rte:6.1.6.0-6.1.6.4,20160121, ,See advisory,https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar,CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06,Vulnerabilities in NTP affect AIX,IV79943 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855,7100-03-07,IV79943s5b.160119.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc,bos.net.tcp.client:7.1.3.0-7.1.3.45 ntp.rte:7.1.0.0-7.1.0.4,20160121, ,5300-12:IV79946 6100-09:IV79942 7100-03:IV79943 7100-04:IV79944 7200-00:IV79945,https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar,CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3,no sec,aix,7100-04-00 :: 7100-04-01,Vulnerabilities in NTP affect AIX,IV79944 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855,7100-04-02,IV79944s1a.160119.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc,bos.net.tcp.client:7.1.4.0 ntp.rte:7.1.0.0-7.1.0.4,20160121, ,5300-12:IV79946 6100-09:IV79942 7100-03:IV79943 7100-04:IV79944 7200-00:IV79945,https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar,CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3,no sec,aix,7200-00-00 :: 7200-00-01,Vulnerabilities in NTP affect AIX,IV79944 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855,7200-00-02,IV79945s1a.160119.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc,bos.net.tcp.bind:7.2.0.0 ntp.rte:7.1.0.0-7.1.0.4,20160121, ,5300-12:IV79946 6100-09:IV79942 7100-03:IV79943 7100-04:IV79944 7200-00:IV79945,https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar,CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerabilities in NTP affect AIX,IV79946 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855,6100-09-07,IV79946s9a.160119.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20160121, ,5300-12:IV79946 6100-09:IV79942 7100-03:IV79943 7100-04:IV79944 7200-00:IV79945,https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar,CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerability in BIND affects AIX,IV80187 / CVE-2015-8000,6100-09-07,IV80187m9a.160120.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20160224, ,5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192,https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar,CVE-2015-8000:7.5,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06,Vulnerability in BIND affects AIX,IV80188 / CVE-2015-8000,6100-09-07,IV80188s6a.160119.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc,bos.net.tcp.client:6.1.9.0-6.1.9.101,20160224, ,5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192,https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar,CVE-2015-8000:7.5,no sec,vios,2.2.4.0,Vulnerability in BIND affects VIOS,IV80188 / CVE-2015-8000,2.2.4.20,IV80188s6a.160119.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc,bos.net.tcp.client:6.1.9.0-6.1.9.101,20160224, ,5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192,https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar,CVE-2015-8000:7.5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06,Vulnerability in BIND affects AIX,IV80189 / CVE-2015-8000,7100-03-07,IV80189m5a.160119.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc,bos.net.tcp.client:7.1.3.0-7.1.3.45,20160224, ,5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192,https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar,CVE-2015-8000:7.5,no sec,aix,7100-04-00 :: 7100-04-01,Vulnerability in BIND affects AIX,IV80191 / CVE-2015-8000,7100-04-02,IV80191s1a.160113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc,bos.net.tcp.client:7.1.4.0,20160224, ,5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192,https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar,CVE-2015-8000:7.5,no sec,aix,7200-00-00 :: 7200-00-01,Vulnerability in BIND affects AIX,IV80192 / CVE-2015-8000,7200-00-02,IV80192s1a.160113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc,bos.net.tcp.bind:7.2.0.0,20160224, ,5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192,https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar,CVE-2015-8000:7.5,no hiper,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.51 :: 2.2.3.52,SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION,IV80334,2.2.3.60,IV80334s6a.61TL09SP06.160205.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV80334,bos.cifs_fs.rte:6.1.9.0-6.1.9.100,20160330, ,7100-03:IV82410 7100-04:IV81060 7200-00:IV80957 6100-09:IV80334,https://aix.software.ibm.com/aix/ifixes/iv80334/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10,SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION,IV80334,2.2.4.20,IV80334s6a.61TL09SP06.160205.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV80334,bos.cifs_fs.rte:6.1.9.0-6.1.9.100,20160330, ,7100-03:IV82410 7100-04:IV81060 7200-00:IV80957,https://aix.software.ibm.com/aix/ifixes/iv80334/, ,yes hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06,SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION,IV80334,6100-09-07,IV80334s6a.61TL09SP06.160205.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV80334,bos.cifs_fs.rte:6.1.9.0-6.1.9.100,20160330, ,7100-03:IV82410 7100-04:IV81060 7200-00:IV80957,https://aix.software.ibm.com/aix/ifixes/iv80334/, ,yes hiper,aix,7200-00-00 :: 7200-00-01,SYSTEM CRASH AFTER APPLICATION SETS SIGNAL MASK,IV80412,7200-00-02,IV80412s0b.160122.72TL00SP00.epkg.Z IV80412s0c.160125.72TL00SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV80412,bos.mp64:7.2.0.0-7.2.0.1,20160125, ,n/a,https://aix.software.ibm.com/aix/ifixes/iv80412/, ,LU sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06,Vulnerability in mustendd device driver impacts AIX,IV80569 / CVE-2016-0281,6100-09-07,IV80569s4a.160222.epkg.Z IV80569s5a.160222.epkg.Z IV80569s6a.160415.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc,devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.100,20160728, ,5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357,https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar,CVE-2016-0281:3.7,yes sec,vios,2.2.4.0,Vulnerability in mustendd device driver impacts VIOS,IV80569 / CVE-2016-0281,2.2.4.20,IV80569s4a.160222.epkg.Z IV80569s5a.160222.epkg.Z IV80569s6a.160415.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc,devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.100,20160728, ,5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357,https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar,CVE-2016-0281:3.7,yes sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06,Vulnerabilities in LibXML2 affect AIX,IV80586 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241,7100-03-07,IV80586s1a.160713.epkg.Z IV80586s1a.160121.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc,bos.rte.control:7.1.3.0-7.1.3.46,20160222,20160811,5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar,CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9,no sec,aix,7100-04-00 :: 7100-04-01,Vulnerabilities in LibXML2 affect AIX,IV80586 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241,7100-04-02,IV80586s1a.160713.epkg.Z IV80586s1a.160121.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc,bos.rte.control:7.1.4.0,20160222,20160722,5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar,CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06,Vulnerabilities in LibXML2 affect AIX,IV80588 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241,6100-09-07,IV80588s6a.160121.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc,bos.rte.control:6.1.9.0-6.1.9.100,20160222, ,5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar,CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9,no sec,vios,2.2.4.0,Vulnerabilities in LibXML2 affect VIOS,IV80588 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241,2.2.4.20,IV80588s6a.160121.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc,bos.rte.control:6.1.9.0-6.1.9.100,20160222, ,5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar,CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9,no sec,aix,7200-00-00 :: 7200-00-01,Vulnerabilities in LibXML2 affect AIX,IV80616 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241,7200-00-02,IV80616s1a.160722.epkg.Z IV80616s1a.160121.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc,bos.rte.control:7.2.0.0,20160222,20160722,5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar,CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerabilities in LibXML2 affect AIX,IV80617 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241,6100-09-07,IV80617s9a.160120.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc,bos.rte.control:5.3.12.0-5.3.12.9,20160222, ,5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616,https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar,CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9,no hiper,aix,7100-04-00 :: 7100-04-01,ROOTVG LOSS IS NOT DETECTED,IV80637,7100-04-02,IV80637s1a.160125.71TL04SP00.epkg.Z IV80637s1a.160125.71TL04SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV80637,bos.cluster.rte:7.1.4.0-7.1.4.1 ,20160226, ,7200-00:IV80883,https://aix.software.ibm.com/aix/ifixes/iv80637/, ,yes hiper,aix,7100-04-00 :: 7100-04-01,POWERHA FAILOVERS TIMES MAY BE LONG DUE TO DNS QUERY TIMEOUTS,IV80778,7100-04-02,IV80778s1a.160222.71TL04SP00.epkg.Z IV80778s1a.160222.71TL04SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV80778,bos.cluster.rte:7.1.4.0-7.1.4.1 ,20160226, ,7200-00:IV80882,https://aix.software.ibm.com/aix/ifixes/iv80778/, ,yes hiper,aix,7200-00-00 :: 7200-00-01,POWERHA FAILOVERS TIMES MAY BE LONG DUE TO DNS QUERY TIMEOUTS,IV80882,7200-00-02,IV80882s1a.160222.72TL00SP00.epkg.Z IV80882s1a.160222.72TL00SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV80882,bos.cluster.rte:7.2.0.0-7.2.0.1 ,20160226, ,7100-04:IV80778,https://aix.software.ibm.com/aix/ifixes/iv80882/, ,yes hiper,aix,7200-00-00 :: 7200-00-01,ROOTVG LOSS IS NOT DETECTED,IV80883,7200-00-02,IV80883s1a.160218.72TL00SP00.epkg.Z IV80883s1a.160218.72TL00SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV80883,bos.cluster.rte:7.2.0.0-7.2.0.1 ,20160226, ,7100-04:IV80637,https://aix.software.ibm.com/aix/ifixes/iv80883/, ,yes hiper,aix,7200-00-00 :: 7200-00-01,SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION,IV80957,7200-00-02,IV80957s1a.72TL00SP00.160329.epkg.Z IV80957s1a.72TL00SP01.160329.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV80957,bos.cifs_fs.rte:7.2.0.0,20160330, ,6100-09:IV80334 7100-03:IV82410 7100-04:IV81060,https://aix.software.ibm.com/aix/ifixes/iv80957/, ,LU hiper,aix,7100-04-00 :: 7100-04-01,SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION,IV81060,7100-04-02,IV81060s1b.71TL04SP01.160202.epkg.Z IV81060s1b.71TL04SP01.160202.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV81060,bos.cifs_fs.rte:7.1.4.0,20160330, ,6100-09:IV80334 7100-03:IV82410 7200-00:IV80957,https://aix.software.ibm.com/aix/ifixes/iv81060/, ,yes sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerability in BIND affects AIX,IV81278 / CVE-2015-8704,6100-09-07,IV81278m9a.160315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20160422, ,5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282,https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar,CVE-2015-8704:6.5,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06,Vulnerability in BIND affects AIX,IV81279 / CVE-2015-8704,6100-09-07,IV81279m4c.160331.epkg.Z IV81279m5a.160329.epkg.Z IV81279s6a.160308.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc,bos.net.tcp.client:6.1.9.0-6.1.9.101,20160422, ,5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282,https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar,CVE-2015-8704:6.5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06,Vulnerability in BIND affects AIX,IV81280 / CVE-2015-8704,7100-03-07,IV81280m4b.160329.epkg.Z IV81280m5a.160330.epkg.Z IV81280m6a.160315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc,bos.net.tcp.client:7.1.3.0-7.1.3.46,20160422, ,5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282,https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar,CVE-2015-8704:6.5,no sec,aix,7100-04-00 :: 7100-04-01,Vulnerability in BIND affects AIX,IV81281 / CVE-2015-8704,7100-04-02,IV81281m0b.160331.epkg.Z IV81281m1a.160315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc,bos.net.tcp.client:7.1.4.0,20160422, ,5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282,https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar,CVE-2015-8704:6.5,no sec,aix,7200-00-00 :: 7200-00-01,Vulnerability in BIND affects AIX,IV81282 / CVE-2015-8704,7200-00-02,IV81282m0a.160401.epkg.Z IV81282m1a.160315.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc,bos.net.tcp.bind:7.2.0.0,20160422, ,5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282,https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar,CVE-2015-8704:6.5,no sec,vios,2.2.4.0,Vulnerability in BIND affects VIOS,IV81282 / CVE-2015-8704,2.2.4.20,IV81279s6a.160308.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc,bos.net.tcp.client:6.1.9.0-6.1.9.101,20160422, ,5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282,https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar,CVE-2015-8704:6.5,no hiper,aix,7100-04-00 :: 7100-04-01,Core dump in many commands when using NIS,IV81303,7100-04-02,IV81303s1a.160224.71TL04SP00.epkg.Z IV81303s1a.160224.71TL04SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV81303,bos.rte.libc:7.1.4.0,20160307, ,6100-09:IV82196 7200-00:IV82224,https://aix.software.ibm.com/aix/ifixes/iv81303/, ,yes sec,aix,7200-00-00 :: 7200-00-01,Vulnerability in mustendd device driver impacts AIX,IV81357 / CVE-2016-0281,7200-00-02,IV81357s0a.160511.epkg.Z IV81357s1a.160414.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc,devices.pciex.e4145616e4140518.rte:7.2.0.0,20160728, ,5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357,https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar,CVE-2016-0281:3.7,yes sec,aix,7100-04-00 :: 7100-04-01,Vulnerability in mustendd device driver impacts AIX,IV81459 / CVE-2016-0281,7100-04-02,IV81459s1b.160512.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc,devices.pciex.e4145616e4140518.rte:7.1.4.0,20160728, ,5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357,https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar,CVE-2016-0281:3.7,yes hiper,aix,7200-00-00 :: 7200-00-01,MULTIBOS MAY FAIL TO MOUNT OR REMOVE A STANDBY INSTANCE,IV81482,7200-00-02,IV81482s1a.160224.72TL00SP00.epkg.Z IV81482s1a.160224.72TL00SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV81482,bos.rte.bosinst:7.2.0.0,20160307, ,6100-09:IV81503 7100-04:IV81493,https://aix.software.ibm.com/aix/ifixes/iv81482/, ,yes hiper,aix,7100-04-00 :: 7100-04-01,multibos may fail to mount or remove a standby instance,IV81493,7100-04-02,IV81493s1a.160223.71TL04SP00.epkg.Z IV81493s1a.160223.71TL04SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV81493,bos.rte.bosinst:7.1.4.0,20160307, ,6100-09:IV81503 7200-00:IV81482,https://aix.software.ibm.com/aix/ifixes/iv81493/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10,multibos may fail to mount or remove a standby instance,IV81503,2.2.4.20,IV81503s6a.160223.61TL09SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV81503,bos.rte.bosinst:6.1.9.100,20160307, ,7100-04:IV81493 7200-00:IV81482,https://aix.software.ibm.com/aix/ifixes/iv81503/, ,yes hiper,aix,6100-09-06,multibos may fail to mount or remove a standby instance,IV81503,6100-09-07,IV81503s6a.160223.61TL09SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV81503,bos.rte.bosinst:6.1.9.0-6.1.9.100,20160307, ,7100-04:IV81493 7200-00:IV81482,https://aix.software.ibm.com/aix/ifixes/iv81503/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10,Core dump in many commands when using NIS,IV82196,2.2.4.20,IV82196s6a.160308.61TL09SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV82196,bos.rte.libc:6.1.9.100,20160307, ,6100-09:IV82196 7100-04:IV81303 7200-00:IV82224,https://aix.software.ibm.com/aix/ifixes/iv82196/, ,yes hiper,aix,6100-09-06,Core dump in many commands when using NIS,IV82196,6100-09-07,IV82196s6a.160308.61TL09SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV82196,bos.rte.libc:6.1.9.0-6.1.9.100,20160307, ,7100-04:IV81303 7200-00:IV82224,https://aix.software.ibm.com/aix/ifixes/iv82196/, ,yes hiper,aix,7200-00-00 :: 7200-00-01,Core dump in many commands when using NIS,IV82224,7200-00-02,IV82224s1a.160308.72TL00SP00.epkg.Z IV82224s1a.160308.72TL00SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV82224,bos.rte.libc:7.2.0.0,20160307, ,6100-09:IV82196 7100-04:IV81303,https://aix.software.ibm.com/aix/ifixes/iv82224/, ,LU hiper,aix,7100-03-06 :: 7100-03-05 :: 7100-03-04 :: 7100-03-03 :: 7100-03-02 :: 7100-03-01 :: 7100-03-00,SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION,IV82410,7100-03-07,IV82410s6a.71TL03SP06.160324.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV82410,bos.cifs_fs.rte:7.1.3.0-7.1.3.46,20160330, ,6100-09:IV80334 7100-04:IV81060 7200-00:IV80957,https://aix.software.ibm.com/aix/ifixes/iv82410/, ,yes sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06,Vulnerability in mustendd device driver impacts AIX,IV82421 / CVE-2016-0281,7100-03-07,IV82421s4a.160505.epkg.Z IV82421s5a.160505.epkg.Z IV82421s6a.160415.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc,devices.pciex.e4145616e4140518.rte:7.1.3.0-7.1.3.46,20160728, ,5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357,https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar,CVE-2016-0281:3.7,yes hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06,Cluster split-brain issues when rebooting a node,IV82494,7100-03-07,MIG4_7134.160620.71TL03SP04.epkg.Z MIG4_7135.160620.71TL03SP05.epkg.Z MIG_7136.160429.71TL03SP06.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV82494,rsct.basic.rte:7.1.3.0-7.1.3.47,20160625, ,6100-09:IV82627 7100-04:IV82624 7200-00:IV82561,https://aix.software.ibm.com/aix/ifixes/iv82494/, ,yes hiper,aix,7100-04-00 :: 7100-04-01,Cluster split-brain issues when rebooting a node,IV82624,7100-04-02,MIG3_7141.160607.71TL04SP01.epkg.Z MIG_7142.160607.71TL04SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV82624,rsct.basic.rte:7.1.4.0-7.1.4.1,20160625, ,6100-09:IV82627 7100-03:IV82494 7200-00:IV82561,https://aix.software.ibm.com/aix/ifixes/iv82494/, ,yes hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06,Cluster split-brain issues when rebooting a node,IV82627,6100-09-07,MIG4_6194.160620.61TL09SP04.epkg.Z MIG4_6195.160620.61TL09SP05.epkg.Z MIG_6196.160429.61TL09SP06.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IV82627,rsct.basic.rte:6.1.9.0-6.1.9.100,20160625, ,7100-03:IV82494 7100-04:IV82624 7200-00:IV82561,https://aix.software.ibm.com/aix/ifixes/iv82627/, ,yes hiper,aix,7200-00-00 :: 7200-00-01,Cluster split-brain issues when rebooting a node,IV82651,7200-00-02,MIG3_7201.160607.72TL00SP01.epkg.Z MIG_7202.160607.72TL00SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV82651,rsct.basic.rte:7.2.0.0-7.2.0.1,20160625, ,6100-09:IV82627 7100-03:IV82494 7100-04:IV82624,https://aix.software.ibm.com/aix/ifixes/iv82651/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20,Server using 10 GB PCIE adapters and large_send may crash,IV82694,2.2.4.30,IV82694s6a.160510.61TL09SP06.epkg.Z IV82694s7a.160531.61TL09SP07.epkg.Z,https://www.ibm.com/support/docview.wss?uid=isg1IV82694,bos.net.tcp.client:6.1.9.100-6.1.9.102,20160816, , ,https://aix.software.ibm.com/aix/ifixes/iv82694/, ,yes hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07,Server using 10 GB PCIE adapters and large_send may crash,IV82694,6100-09-08,IV82694s6a.160510.61TL09SP06.epkg.Z IV82694s7a.160531.61TL09SP07.epkg.Z,https://www.ibm.com/support/docview.wss?uid=isg1IV82694,bos.net.tcp.client:6.1.9.100-6.1.9.102,20160816, , ,https://aix.software.ibm.com/aix/ifixes/iv82694/, ,yes hiper,vios,2.2.3.0 :: 2.2.3.10 :: 2.2.3.20 :: 2.2.3.30 :: 2.2.3.40 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70,I/O HANG OR CRASH IN EFC_FREE_LOGIN _TBLE WITH SOME FC ADAPTERS,IV83143,2.2.3.80,IV83143s0a.161018.epkg.Z IV83143s2a.161014.epkg.Z IV83143s3a.160915.61TL09SP03.epkg.Z IV83143s4a.160921.61TL09SP04.epkg.Z IV83143s5a.160502.61TL09SP05.epkg.Z IV83143s5a.160502.VIOS.2.2.3.5x.epkg.Z IV83143s6a.160523.61TL09SP06.epkg.Z IV83143s6a.160523.VIOS.2.2.3.60.epkg.Z IV83143s6a.160523.VIOS.2.2.4.0.epkg.Z IV83143s6a.160523.VIOS.2.2.4.10.epkg.Z IV83143s7a.160705.61TL09SP07.epkg.Z IV83143s7a.1607,http://www-01.ibm.com/support/docview.wss?uid=isg1IV83143,devices.pci.df1000f7.com:6.1.9.0-6.1.9.101 ,20160917, ,,https://aix.software.ibm.com/aix/ifixes/iv83143/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23,I/O HANG OR CRASH IN EFC_FREE_LOGIN _TBLE WITH SOME FC ADAPTERS,IV83143,2.2.4.30,IV83143s0a.161018.epkg.Z IV83143s2a.161014.epkg.Z IV83143s3a.160915.61TL09SP03.epkg.Z IV83143s4a.160921.61TL09SP04.epkg.Z IV83143s5a.160502.61TL09SP05.epkg.Z IV83143s5a.160502.VIOS.2.2.3.5x.epkg.Z IV83143s6a.160523.61TL09SP06.epkg.Z IV83143s6a.160523.VIOS.2.2.3.60.epkg.Z IV83143s6a.160523.VIOS.2.2.4.0.epkg.Z IV83143s6a.160523.VIOS.2.2.4.10.epkg.Z IV83143s7a.160705.61TL09SP07.epkg.Z IV83143s7a.1607,http://www-01.ibm.com/support/docview.wss?uid=isg1IV83143,devices.pci.df1000f7.com:6.1.9.100-6.1.9.101 ,20160917, ,,https://aix.software.ibm.com/aix/ifixes/iv83143/, ,yes sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07,Vulnerabilities in NTP affect AIX,IV83984 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140,6100-09-08,IV83984m4a.160506.epkg.Z IV83984m5a.160510.epkg.Z IV83984m6a.160504.epkg.Z IV83984s7a.160622.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc,bos.net.tcp.client:6.1.9.0-6.1.9.102,20160608,20160622,5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995,https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar,CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3,no sec,vios,2.2.4.0 :: 2.2.4.20,Vulnerabilities in NTP affect VIOS,IV83984 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140,2.2.4.30,IV83984m6a.160504.epkg.Z IV83984s7a.160622.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc,bos.net.tcp.client:6.1.9.0-6.1.9.102,20160608,20160622,5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995,https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar,CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07,Vulnerabilities in NTP affect AIX,IV83993 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140,7100-03-08,IV83993m4b.160510.epkg.Z IV83993m5a.160510.epkg.Z IV83993m6a.160505.epkg.Z IV83993s7a.160714.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc,bos.net.tcp.client:7.1.3.0-7.1.3.47,20160608,20160719,5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995,https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar,CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02,Vulnerabilities in NTP affect AIX,IV83994 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140,7100-04-03,IV83994m1a.160505.epkg.Z IV83994m1a.160505.epkg.Z IV83994s2a.160620.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc,bos.net.tcp.client:7.1.4.0-7.1.4.1,20160608,20160620,5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995,https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar,CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,Vulnerabilities in NTP affect AIX,IV83995 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140,7200-00-03,IV83995m0a.160510.epkg.Z IV83995m1a.160601.epkg.Z IV83995s2b.160713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc,bos.net.tcp.ntp:7.2.0.0-7.2.0.2 bos.net.tcp.ntpd:7.2.0.0-7.2.0.2,20160608,20160816,5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995,https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar,CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerability in mustendd device driver impacts AIX,IV84184 / CVE-2016-0281,6100-09-07,IV81357s0a.160511.epkg.Z IV81357s1a.160414.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc,devices.pciex.e4145616e4140518.rte:5.3.12.0-5.3.12.3,20160728, ,5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357,https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar,CVE-2016-0281:3.7,yes hiper,vios,2.2.3.0 :: 2.2.3.10 :: 2.2.3.20 :: 2.2.3.30 :: 2.2.3.40 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70,LU READS MAY DETECT BAD DATA WHILE LU MOVE IN PROGRESS,IV84212,2.2.3.80,IV84212s6a.160509.61TL09SP06.epkg.Z IV84212s6a.160509.VIOS2.2.4.10.epkg.Z IV84212s7a.160509.61TL09SP07.epkg.Z IV84212s7a.160509.VIOS2.2.4.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV84212,pool.basic.rte:6.1.9.0-6.1.9.46 ,20160527, ,,https://aix.software.ibm.com/aix/ifixes/iv84212/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20,LU READS MAY DETECT BAD DATA WHILE LU MOVE IN PROGRESS,IV84212,2.2.4.30,IV84212s6a.160509.61TL09SP06.epkg.Z IV84212s6a.160509.VIOS2.2.4.10.epkg.Z IV84212s7a.160509.61TL09SP07.epkg.Z IV84212s7a.160509.VIOS2.2.4.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV84212,pool.basic.rte:6.1.9.100-6.1.9.101 ,20160527, ,,https://aix.software.ibm.com/aix/ifixes/iv84212/, ,yes sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerabilities in NTP affect AIX,IV84269 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140,6100-09-08,IV84269m9a.160522.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20160608,20160609,5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995,https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar,CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02,Vulnerability in BIND affects AIX,IV84947 / CVE-2016-1285 / CVE-2016-1286,7100-04-03,IV84458s1a.160519.epkg.Z IV84947m1a.160531.epkg.Z IV84458s2a.160608.epkg.Z IV85296s2a.160616.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc,bos.net.tcp.client:7.1.4.0-7.1.4.1 bos.net.tcp.server:7.1.4.0-7.1.4.1,20160616, ,5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297,https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar,CVE-2016-1285:7.5 / CVE-2016-1286:7.5,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07,Vulnerabilities in BIND affects AIX,IV84984 / CVE-2016-1285 / CVE-2016-1286,6100-09-08,IV84456s5b.160607.epkg.Z IV84984m5b.160708.epkg.Z IV84456s6a.160517.epkg.Z IV84984m6a.160530.epkg.Z IV84456s7a.160608.epkg.Z IV84984s7a.160616.epkg.Z DEPRECATED::IV84984m5a.160616.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc,bos.net.tcp.client:6.1.9.0-6.1.9.102 bos.net.tcp.server:6.1.9.0-6.1.9.101,20160616,20160708,5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297,https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar,CVE-2016-1285:7.5 / CVE-2016-1286:7.5,no sec,vios,2.2.4.0,Vulnerabilities in BIND affects VIOS,IV84984 / CVE-2016-1285 / CVE-2016-1286,2.2.4.30,IV84456s5b.160607.epkg.Z IV84984m5a.160616.epkg.Z IV84456s6a.160517.epkg.Z IV84984m6a.160530.epkg.Z IV84456s7a.160608.epkg.Z IV84984s7a.160616.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc,bos.net.tcp.client:6.1.9.0-6.1.9.102 bos.net.tcp.server:6.1.9.0-6.1.9.101,20160616, ,5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297,https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar,CVE-2016-1285:7.5 / CVE-2016-1286:7.5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07,Vulnerabilities in BIND affects AIX,IV85296 / CVE-2016-1285 / CVE-2016-1286,7100-03-08,IV84457s6a.160517.epkg.Z IV85296m6a.160601.epkg.Z IV84457s5a.160613.epkg.Z IV85296m5a.160617.epkg.Z IV84457s7a.160726.epkg.Z IV85296s7a.160809.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc,bos.net.tcp.client:7.1.3.0-7.1.3.47 bos.net.tcp.server:7.1.3.0-7.1.3.47,20160616,20160817,5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297,https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar,CVE-2016-1285:7.5 / CVE-2016-1286:7.5,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,Vulnerabilities in BIND affects AIX,IV85297 / CVE-2016-1285 / CVE-2016-1286,7200-00-03,IV84459s1a.160519.epkg.Z IV85297m1a.160601.epkg.Z IV84459s2a.160613.epkg.Z IV85297s2a.160614.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc,bos.net.tcp.bind:7.2.0.0 bos.net.tcp.bind_utils:7.2.0.0-7.2.0.1,20160616, ,5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297,https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar,CVE-2016-1285:7.5 / CVE-2016-1286:7.5,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerabilities in BIND affects AIX,IV85298 / CVE-2016-1285 / CVE-2016-1286,6100-09-08,IV85298m9a.160602.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10 bos.net.tcp.server:5.3.12.0-5.3.12.6,20160616, ,5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297,https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar,CVE-2016-1285:7.5 / CVE-2016-1286:7.5,no hiper,vios,2.2.3.50 :: 2.2.3.60 :: 2.2.3.70,Malformed network packets can cause system crash,IV85460,2.2.3.80,IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z / IV85460s7a.160823.VIOS2.2.3.70.devices.ethernet.mlx.rte.epkg.Z / IV85460s7a.160823.VIOS2.2.4.23.devices.ethernet.mlx.rte.epkg.Z / IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z / IV85460s7c.161214.VIOS2.2.3.70.devices.ethernet.shi.rte.epkg.Z / IV85460s7c.161214.VIOS2.2.4.23.devices.ethernet.shi.rte.epkg.Z / IV854,http://www-01.ibm.com/support/docview.wss?uid=isg1IV85460,devices.ethernet.shi.rte:6.1.9.101-6.1.9.103 devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102 devices.ethernet.lnc2.rte:6.1.9.45-6.1.9.103,20160606,20170106,7100-03:IV88430 7100-04:IV86787 7200-00:IV88136,https://aix.software.ibm.com/aix/ifixes/iv85460/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23,Malformed network packets can cause system crash,IV85460,2.2.4.24,IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z / IV85460s7a.160823.VIOS2.2.3.70.devices.ethernet.mlx.rte.epkg.Z / IV85460s7a.160823.VIOS2.2.4.23.devices.ethernet.mlx.rte.epkg.Z / IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z / IV85460s7c.161214.VIOS2.2.3.70.devices.ethernet.shi.rte.epkg.Z / IV85460s7c.161214.VIOS2.2.4.23.devices.ethernet.shi.rte.epkg.Z / IV854,http://www-01.ibm.com/support/docview.wss?uid=isg1IV85460,devices.ethernet.shi.rte:6.1.9.101-6.1.9.103 devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102 devices.ethernet.lnc2.rte:6.1.9.101-6.1.9.103,20160606,20170106,7100-03:IV88430 7100-04:IV86787 7200-00:IV88136,https://aix.software.ibm.com/aix/ifixes/iv85460/, ,yes hiper,aix,6100-09-05 :: 6100-09-06 :: 6100-09-07,Malformed network packets can cause system crash,IV85460,6100-09-08,IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z / IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z / IV85460s7d.161215.AIX61TL09SP07.devices.ethernet.lnc2.rte.epkg.Z ,http://www-01.ibm.com/support/docview.wss?uid=isg1IV85460,devices.ethernet.shi.rte:6.1.9.101-6.1.9.103 devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102 devices.ethernet.lnc2.rte:6.1.9.45-6.1.9.103,20160606,20170106,7100-03:IV88430 7100-04:IV86787 7200-00:IV88136,https://aix.software.ibm.com/aix/ifixes/iv85460/, ,yes hiper,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02,Cluster node halt due to Group Services client errors,IV85983,7100-04-03, ctHA_O1r.160808.71TL04SP01.epkg.Z ctHA_O2r.160810.71TL04SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV85983,rsct.basic.rte:3.2.1.0-3.2.1.10 rsct.core.rmc:3.2.1.0-3.2.1.10,20160628, ,7100-03:IV74438,https://aix.software.ibm.com/aix/ifixes/iv85893/, ,yes hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,Cluster node halt due to Group Services client errors,IV85983,7200-00-03,ctHA_O1r.160808.72TL00SP01.epkg.Z ctHA_O2r.160810.72TL00SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV85983,rsct.basic.rte:3.2.1.0-3.2.1.10 rsct.core.rmc:3.2.1.0-3.2.1.10,20160628, ,6100-09:IV74438 7100-03:IV74438,https://aix.software.ibm.com/aix/ifixes/iv85893/, ,yes sec,vios,2.2.4.0 :: 2.2.4.20,Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on VIOS,IV86116 / CVE-2015-7575 / CVE-2016-0266,2.2.4.30,IV86116m7a.160701.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc,bos.net.tcp.client:6.1.9.0-6.1.9.102 bos.net.tcp.server:6.1.9.0-6.1.9.101,20160726, ,5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar,CVE-2015-7575:7.1 / CVE-2016-0266:3.7,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07,Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX,IV86116 / CVE-2015-7575 / CVE-2016-0266,6100-09-08,IV86116s6a.160812.epkg.Z IV78625m5a.160901.epkg.Z IV79072s6a.160902.epkg.Z IV79072s5a.160830.epkg.Z IV79070m6a.160902.epkg.Z IV79070m5a.160901.epkg.Z IV78624m5a.160830.epkg.Z IV79071m6a.161017.epkg.Z IV79071m5a.160901.epkg.Z IV86116m7a.160701.epkg.Z DEPRECATED::IV86116m5b.160701.epkg.Z DEPRECATED::IV86116m6a.160701.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc,bos.net.tcp.client:6.1.9.0-6.1.9.102 bos.net.tcp.server:6.1.9.0-6.1.9.101,20160726,20161020,5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar,CVE-2015-7575:7.1 / CVE-2016-0266:3.7,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07,Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX,IV86117 / CVE-2015-7575 / CVE-2016-0266,7100-03-08,IV82328m6a.160901.epkg.Z IV82328m5a.160830.epkg.Z IV82412s6a.160901.epkg.Z IV82412s5a.160829.epkg.Z IV82330m6a.160831.epkg.Z IV82330m5a.160831.epkg.Z IV82327s6a.160901.epkg.Z IV82327m5a.160830.epkg.Z IV82331m6a.160901.epkg.Z IV82331m5a.160830.epkg.Z IV86117m7a.160725.epkg.Z DEPRECATED::IV86117m5a.160701.epkg.Z DEPRECATED::IV86117m6a.160701.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc,bos.net.tcp.client:7.1.3.0-7.1.3.47 bos.net.tcp.server:7.1.3.0-7.1.3.47,20160726,20161020,5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar,CVE-2015-7575:7.1 / CVE-2016-0266:3.7,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02,Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on AIX,IV86118 / CVE-2015-7575 / CVE-2016-0266,7100-04-03,IV86118m2a.160701.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc,bos.net.tcp.client:7.1.4.0-7.1.4.1 bos.net.tcp.server:7.1.4.0-7.1.4.1,20160726, ,5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar,CVE-2015-7575:7.1 / CVE-2016-0266:3.7,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on AIX,IV86119 / IV86132 / CVE-2015-7575 / CVE-2016-0266,7200-00-03,IV86119s0a.160701.epkg.Z IV86132s0a.160701.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc,bos.net.tcp.imapd:7.2.0.0 bos.net.tcp.pop3d:7.2.0.0 bos.net.tcp.sendmail:7.2.0.0,20160726, ,5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar,CVE-2015-7575:7.1 / CVE-2016-0266:3.7,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX,IV86120 / CVE-2015-7575 / CVE-2016-0266,6100-09-08,IV88960m9a.160913.epkg.Z IV88959m9a.160915.epkg.Z IV88957m9a.160910.epkg.Z DEPRECATED::IV86120m9a.160705.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10 bos.net.tcp.server:5.3.12.0-5.3.12.6,20160726,20161020,5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132,https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar,CVE-2015-7575:7.1 / CVE-2016-0266:3.7,no hiper,aix,7100-04-02,Performance regression when using Olson timezone format,IV86730,7100-04-03,IV86730m2a.160812.71TL04SP01.epkg.Z / IV86730m2a.160812.71TL04SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV86730,bos.rte.libc:7.1.4.1,20160901, ,6100-09:IV86773 7100-03:IV87788 7100-04:IV86730 7200-00:IV87789,https://aix.software.ibm.com/aix/ifixes/iv86730/, ,yes hiper,aix,6100-09-07,Performance regression when using Olson timezone format,IV86773,6100-09-08,IV86773s9a.160831.61TL09SP07.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV86773,bos.rte.libc:6.1.9.101,20160901, ,6100-09:IV86773 7100-03:IV87788 7100-04:IV86730 7200-00:IV87789,https://aix.software.ibm.com/aix/ifixes/iv86773/, ,yes hiper,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02,Malformed network packets can cause system crash,IV86787,7100-04-03,IV86787s2a.161222.AIX71TL04SP02.devices.ethernet.mlx.rte.epkg.Z / IV86787s2b.161222.AIX71TL04SP02.devices.ethernet.lnc2.rte.epkg.Z / IV86787s2c.161222.AIX71TL04SP02.devices.ethernet.shi.rte.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV86787,devices.ethernet.shi.rte:7.1.4.0-7.1.4.2 devices.ethernet.mlx.rte:7.1.4.0-7.1.4.2 devices.ethernet.lnc2.rte:7.1.4.0-7.1.4.2,20160711,20170106,6100-09:IV85460 7100-03:IV88430 7200-00:IV88136,https://aix.software.ibm.com/aix/ifixes/iv86787/, ,yes sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07,Vulnerabilities in NTP affect AIX,IV87419 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519,6100-09-08,IV87419m5d.160823.epkg.Z IV87419m6a.160823.epkg.Z IV87419m7a.160901.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc,bos.net.tcp.client:6.1.9.0-6.1.9.102,20160906, ,5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939,https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar,CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2,no sec,vios,2.2.4.0 :: 2.2.4.20,Vulnerabilities in NTP affect VIOS,IV87419 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519,2.2.4.30,IV87419m6a.160823.epkg.Z IV87419m7a.160901.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc,bos.net.tcp.client:6.1.9.0-6.1.9.102,20160906, ,5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939,https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar,CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02,Vulnerabilities in NTP affect AIX,IV87420 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519,7100-04-03,IV87420m0a.160825.epkg.Z IV87420m2a.160901.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc,bos.net.tcp.client:7.1.4.0-7.1.4.1,20160906, ,5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939,https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar,CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerabilities in NTP affect AIX,IV87614 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519,6100-09-08,IV87614m9a.160901.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20160906, ,5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939,https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar,CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07,Vulnerabilities in NTP affect AIX,IV87615 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519,7100-03-08,IV87615m5a.160823.epkg.Z IV87615m6a.160824.epkg.Z IV87615m7a.160901.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc,bos.net.tcp.client:7.1.3.0-7.1.3.47,20160906, ,5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939,https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar,CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02,Vulnerability in lquerylv in LVM impacts AIX,IV87640 / CVE-2016-6079,7100-04-03,IV87640s2a.160825.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc,bos.rte.lvm:7.1.4.0-7.1.4.1,20161031, ,5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053,https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar,CVE-2016-6079:9.8,no hiper,aix,7100-03-07,Performance regression when using Olson timezone format,IV87788,7100-03-08,IV87788s1a.160831.71TL03SP07.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV87788,bos.rte.libc:7.1.3.47,20160901, ,6100-09:IV86773 7100-03:IV87788 7100-04:IV86730 7200-00:IV87789,https://aix.software.ibm.com/aix/ifixes/iv87788/, ,yes hiper,aix,7200-00-02,Performance regression when using Olson timezone format,IV87789,7200-00-03,IV87789s2a.160830.72TL00SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV87789,bos.rte.libc:7.2.0.1,20160901, ,6100-09:IV86773 7100-03:IV87788 7100-04:IV86730 7200-00:IV87789,https://aix.software.ibm.com/aix/ifixes/iv87789/, ,yes sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07,Vulnerability in lsmcode affects AIX,IV87794 / CVE-2016-3053,6100-09-08,IV87794s5a.160913.epkg.Z IV87794s6a.160912.epkg.Z IV87794s7b.160822.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc,bos.rte.shell:6.1.9.0-6.1.9.101 bos.rte.libc:6.1.9.0-6.1.9.101,20161017, ,6100-09:IV87794 7100-03:IV88457 7100-04:IV88007 7200-00:IV88042,https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar,CVE-2016-3053:8.4,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23,Vulnerability in lsmcode affects VIOS,IV87794 / CVE-2016-3053,2.2.4.30,IV87794s6a.160912.epkg.Z IV87794s7b.160822.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc,bos.rte.shell:6.1.9.0-6.1.9.101 bos.rte.libc:6.1.9.0-6.1.9.101,20161017, ,6100-09:IV87794 7100-03:IV88457 7100-04:IV88007 7200-00:IV88042,https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar,CVE-2016-3053:8.4,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,Vulnerabilities in NTP affect AIX,IV87939 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519,7200-00-03,IV87939m0b.160830.epkg.Z IV87939m2a.160901.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc,bos.net.tcp.ntp:7.2.0.0-7.2.0.2 bos.net.tcp.ntpd:7.2.0.0-7.2.0.2,20160906, ,5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939,https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar,CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07,Vulnerability in lquerylv in LVM impacts AIX,IV87981 / CVE-2016-6079,6100-09-08,IV87981s7a.160825.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc,bos.rte.lvm:6.1.9.0-6.1.9.101,20161031, ,5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053,https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar,CVE-2016-6079:9.8,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23,Vulnerability in lquerylv in LVM impacts VIOS,IV87981 / CVE-2016-6079,2.2.4.30,IV87981s7a.160825.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc,bos.rte.lvm:6.1.9.0-6.1.9.101,20161031, ,5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053,https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar,CVE-2016-6079:9.8,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02,Vulnerability in lsmcode affects AIX,IV88007 / CVE-2016-3053,7100-04-03,IV88007s2a.161110.epkg.Z IV88007s0a.160913.epkg.Z IV88007s2a.160819.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc,bos.rte.shell:7.1.4.0-7.1.4.1 bos.rte.libc:7.1.4.0-7.1.4.1,20161017,20161111,6100-09:IV87794 7100-03:IV88457 7100-04:IV88007 7200-00:IV88042,https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar,CVE-2016-3053:8.4,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,Vulnerability in lsmcode affects AIX,IV88042 / CVE-2016-3053,7200-00-03,IV88042s2a.161110.epkg.Z IV88042s0a.160914.epkg.Z IV88042s2a.160819.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc,bos.rte.shell:7.2.0.0-7.2.0.1 bos.rte.libc:7.2.0.0-7.2.0.1,20161017,20161111,6100-09:IV87794 7100-03:IV88457 7100-04:IV88007 7200-00:IV88042,https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar,CVE-2016-3053:8.4,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,Vulnerability in lquerylv in LVM impacts AIX,IV88053 / CVE-2016-6079,7200-00-03,IV88053s2a.160825.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc,bos.rte.lvm:7.2.0.0-7.2.0.1,20161031, ,5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053,https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar,CVE-2016-6079:9.8,no hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,Malformed network packets can cause system crash,IV88136,7200-01-03,IV88136s2a.161215.AIX72TL00SP02.devices.ethernet.mlx.rte.epkg.Z / IV88136s2b.161215.AIX72TL00SP02.devices.ethernet.lnc2.rte.epkg.Z / IV88136s2c.161215.AIX72TL00SP02.devices.ethernet.shi.rte.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV88136,devices.ethernet.shi.rte:7.2.0.0-7.2.0.2 Devices.ethernet.mlx.rte:7.2.0.0-7.2.0.2 devices.ethernet.lnc2.rte:7.2.0.0-7.2.0.2,20160816,20170106,7100-03:IV88430 7100-04:IV86787 6100-09:IV85460,https://aix.software.ibm.com/aix/ifixes/iv88136/, ,yes sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07,Vulnerability in lquerylv in LVM impacts AIX,IV88419 / CVE-2016-6079,7100-03-08,IV88419s7a.160825.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc,bos.rte.lvm:7.1.3.0-7.1.3.47,20161031, ,5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053,https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar,CVE-2016-6079:9.8,no hiper,aix,7100-03-05 :: 7100-03-06 :: 7100-03-07,Malformed network packets can cause system crash ,IV88430,7100-04-08,IV88430s7a.170105.AIX71TL03SP07.devices.ethernet.lnc2.rte.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV88430,devices.ethernet.lnc2.rte:7.1.3.45-7.1.3.48,20170106, ,6100-09:IV85460 7100-04:IV86787 7200-00:IV88136,https://aix.software.ibm.com/aix/ifixes/iv88430/, ,yes sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07,Vulnerability in lsmcode affects AIX,IV88457 / CVE-2016-3053,7100-03-08,IV88457s5a.160912.epkg.Z IV88457s6a.160912.epkg.Z IV88457s7a.160822.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc,bos.rte.shell:7.1.3.0-7.1.3.47 bos.rte.libc:7.1.3.0-7.1.3.47,20161017, ,6100-09:IV87794 7100-03:IV88457 7100-04:IV88007 7200-00:IV88042,https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar,CVE-2016-3053:8.4,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerability in lquerylv in LVM impacts AIX,IV88658 / CVE-2016-6079,6100-09-08,IV88658s9a.160825.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc,bos.rte.lvm:5.3.12.0-5.3.12.8,20161031, ,5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053,https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar,CVE-2016-6079:9.8,no hiper,vios,2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23,POTENTIAL DATA LOSS IN VIOS SSP WITH AN UN-INITIALIZED THICK LU,IV89070,2.2.4.30,IV89070s7a.161005.VIOS.2.2.4.20.epkg.Z IV89070s7a.161005.VIOS.2.2.4.21.epkg.Z IV89070s7b.161005.VIOS.2.2.4.22.epkg.Z IV89070s7b.161005.VIOS.2.2.4.23.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV89070,pool.basic.rte:6.1.9.101-6.1.9.103 ,20161015, ,,https://aix.software.ibm.com/aix/ifixes/iv89070/, ,yes sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07,Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX,IV89385 / CVE-2016-6038,7100-03-08,IV89385s7a.160927.epkg.Z IV89385s7a.160927.epkg.Z IV89385s7a.160927.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory.asc,lwi.runtime:7.1.3.0-7.1.3.7,20160922,20160930,5300-12:IV89386 6100-09:IV89418 7100-03:IV89385,https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar,CVE-2016-6038:6.5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08,Vulnerability in pConsole impacts AIX,IV89737 / CVE-2016-0266,7100-04-03, ,https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc,sysmgt.pconsole.rte:7.1.3.0-7.1.3.99,20161202, ,6100-09:IV89739 7100-04:IV89737,https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar,CVE-2016-0266:3.7,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02,Vulnerability in pConsole impacts AIX,IV89737 / CVE-2016-0266,7100-04-03,IV89737s2a.161024.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc,sysmgt.pconsole.rte:7.1.4.0,20161202, ,6100-09:IV89739 7100-04:IV89737,https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar,CVE-2016-0266:3.7,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02,pConsole on AIX does not support TLS 1.2.,IV89737 / CVE-2016-0266,7100-04-03,IV89737s2a.161024.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc,sysmgt.pconsole.rte:7.1.4.0-7.1.4.0,20161202, ,6100-09:IV89739,https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar,CVE-2016-0266:3.7,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07,Vulnerability in pConsole impacts AIX,IV89739 / CVE-2016-0266,6100-09-08,IV89739s7a.161024.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc,sysmgt.pconsole.rte:6.1.9.0-6.1.9.100,20161202, ,6100-09:IV89739 7100-04:IV89737,https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar,CVE-2016-0266:3.7,no sec,aix,6100-09-06 :: 6100-09-07,pConsole on AIX does not support TLS 1.2.,IV89739 / CVE-2016-0266,6100-09-08,IV89739s7a.161024.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc,sysmgt.pconsole.rte:6.1.9.0-6.1.9.100,20161202, ,7100-04:IV89737,https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar,CVE-2016-0266:3.7,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08,Vulnerabilities in BIND impact AIX,IV89828 / CVE-2016-2776 / CVE-2016-2775,6100-09-09,IV89828m5a.161017.epkg.Z IV89828m6a.161013.epkg.Z IV89828m7a.161013.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc,bos.net.tcp.client:6.1.9.0-6.1.9.200 bos.net.tcp.server:6.1.9.0-6.1.9.200,20161118, ,5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831,https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar,CVE-2016-2776:7.5 / CVE-2016-2775:7.5,no sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80 :: 2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23 :: 2.2.4.30 :: 2.2.5.0 :: 2.2.5.10,Vulnerabilities in BIND impact VIOS,IV89828 / CVE-2016-2776 / CVE-2016-2775,2.2.5.20,IV89828m7a.161013.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc,bos.net.tcp.client:6.1.9.0-6.1.9.200 bos.net.tcp.server:6.1.9.0-6.1.9.200,20161118, ,5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831,https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar,CVE-2016-2776:7.5 / CVE-2016-2775:7.5,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03,Vulnerabilities in BIND impact AIX,IV89829 / CVE-2016-2776 / CVE-2016-2775,7100-04-04,IV89829m1a.161013.epkg.Z IV89829m2a.161010.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc,bos.net.tcp.client:7.1.4.0-7.1.4.30 bos.net.tcp.server:7.1.4.0-7.1.4.30,20161118, ,5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831,https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar,CVE-2016-2776:7.5 / CVE-2016-2775:7.5,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08,Vulnerabilities in BIND impact AIX,IV89830 / CVE-2016-2776 / CVE-2016-2775,7100-03-09,IV89830m5a.161010.epkg.Z IV89830m6d.161012.epkg.Z IV89830m7a.161013.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc,bos.net.tcp.client:7.1.3.0-7.1.3.48 bos.net.tcp.server:7.1.3.0-7.1.3.48,20161118, ,5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831,https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar,CVE-2016-2776:7.5 / CVE-2016-2775:7.5,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,Vulnerabilities in BIND impact AIX,IV89831 / CVE-2016-2776 / CVE-2016-2775,7200-00-03,IV89831m1a.161017.epkg.Z IV89831m2a.161018.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc,bos.net.tcp.bind:7.2.0.0 bos.net.tcp.bind_utils:7.2.0.0-7.2.0.1,20161118, ,5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831,https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar,CVE-2016-2776:7.5 / CVE-2016-2775:7.5,no sec,aix,5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09,Vulnerabilities in BIND impact AIX,IV90056 / CVE-2016-2776 / CVE-2016-2775,6100-09-09,IV90056m9a.161020.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10 bos.net.tcp.server:5.3.12.0-5.3.12.6,20161118, ,5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831,https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar,CVE-2016-2776:7.5 / CVE-2016-2775:7.5,no sec,aix,7200-01-00,There is a vulnerability in sysproc that impacts AIX.,IV90234 / CVE-2016-8944,7200-01-02,IV90234s0a.161212.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc,bos.mp64:7.2.1.0-7.2.1.0,20170130, ,7200-00:IV91456 7100-03:IV91488 7100-04:IV91487,https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar,CVE-2016-8944:6.2,no hiper,aix,7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04,POWERHA NODE FAILURE DURING AIX UPDATE,IV90451,7100-04-05,IV90451m1a.161110.71TL4SP1.epkg.Z IV90451s0a.161108.71TL4SP2-4.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV90451,rsct.basic.rte:3.2.1.1-3.2.1.11,20161111,20170411,7200-00:IV90451 7200-01:IV90485,https://aix.software.ibm.com/aix/ifixes/iv90451/, ,yes hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03,POWERHA NODE FAILURE DURING AIX UPDATE,IV90451,7200-00-04,IV90451m1a.161110.72TL0SP1.epkg.Z IV90451s0a.161108.72TL0SP2-3.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV90451,rsct.basic.rte:3.2.1.0-3.2.1.11,20161111, ,7200-01:IV90485 7100-04:IV90451,https://aix.software.ibm.com/aix/ifixes/iv90451/, ,yes hiper,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02,POWERHA NODE FAILURE DURING AIX UPDATE,IV90485,7200-01-03,IV90451m1a.161110.72TL0SP1.epkg.Z IV90451s0a.161108.72TL0SP2-4.epkg.Z IV90485s0a.161104.72TL1SP0-2.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV90485,rsct.basic.rte:3.2.2.0-3.2.2.0,20161111,20170411,7200-00:IV90451 7100-04:IV90451,https://aix.software.ibm.com/aix/ifixes/iv90485/, ,yes hiper,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03,Potential data loss using Virtual FC with num_cmd_elems greater than 256,IV90915,7100-04-04,IV90915s1a.161214.71TL04SP00-01.epkg.Z IV90915s2a.161205.71TL04SP02.epkg.Z IV90915s3a.161219.71TL04SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV90915,devices.vdevice.IBM.vfc-client.rte:7.1.4.0-7.1.4.30,20170202, ,6100-09:IV91199 7100-03:IV91042 7200-00:IV92284 7200-01:IV91511,https://aix.software.ibm.com/aix/ifixes/iv90915/, ,yes hiper,aix,6100-09-08,CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK=YES,IV91004,6100-09-09,IV91004s8a.161125.AIX61TL09SP08.epkg.Z IV91004s8a.161125.61TL09SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91004,devices.vdevice.IBM.l-lan.rte:6.1.9.200,20161206, ,7200-01:IV91020 7100-04:IV91019,https://aix.software.ibm.com/aix/ifixes/iv91004/, ,yes sec,aix,6100-09-06 :: 6100-09-07 :: 6100-09-08,Vulnerability in bellmail affects AIX,IV91006 / CVE-2016-8972,6100-09-09,IV91006s8a.161125.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.200,20161215, ,7100-03:IV91007 7100-04:IV91008 7200-00:IV91010 7200-01:IV91011,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar,CVE-2016-8972:8.4,yes sec,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80 :: 2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23 :: 2.2.4.30 :: 2.2.5.0 :: 2.2.5.10,Vulnerability in bellmail affects VIOS,IV91006 / CVE-2016-8972,2.2.5.20,IV91006s8a.161125.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.200,20161215, ,7100-03:IV91007 7100-04:IV91008 7200-00:IV91010 7200-01:IV91011,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar,CVE-2016-8972:8.4,yes sec,aix,7100-03-05 :: 7100-03-06 :: 7100-03-07,Vulnerability in bellmail affects AIX,IV91007 / CVE-2016-8972,7100-03-08,IV91008s3a.161125.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc,bos.net.tcp.client:7.1.3.0-7.1.3.47,20161215, ,6100-09:IV91006 7100-04:IV91008 7200-00:IV91010 7200-01:IV91011,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar,CVE-2016-8972:8.4,yes sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03,Vulnerability in bellmail affects AIX,IV91008 / CVE-2016-8972,7100-04-04,IV91008s3a.161125.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc,bos.net.tcp.client:7.1.4.0-7.1.4.30,20161215, ,6100-09:IV91006 7100-03:IV91007 7200-00:IV91010 7200-01:IV91011,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar,CVE-2016-8972:8.4,yes sec,aix,7200-00-00 :: 7200-00-01,Vulnerability in bellmail affects AIX,IV91010 / CVE-2016-8972,7200-00-02,IV91010s2a.161125.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc,bos.net.tcp.client_core:7.2.0.0-7.2.0.1,20161215, ,6100-09:IV91006 7100-03:IV91007 7100-04:IV91008 7200-00:IV91010 7200-01:IV91011,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar,CVE-2016-8972:8.4,yes sec,aix,7200-01-00 :: 7200-01-01,Vulnerability in bellmail affects AIX,IV91011 / CVE-2016-8972,7200-01-02,IV91011s1a.161125.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc,bos.net.tcp.client_core:7.2.1.0-7.2.1.0,20161215, ,6100-09:IV91006 7100-03:IV91007 7100-04:IV91008 7200-00:IV91010,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar,CVE-2016-8972:8.4,yes hiper,aix,7100-04-03,CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK=YES,IV91019,7100-04-04,IV91019s3a.161125.71TL04SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91019,devices.vdevice.IBM.l-lan.rte:7.1.4.30,20161206, ,7200-01:IV91020 7100-04:IV91019 6100-09:IV91004,https://aix.software.ibm.com/aix/ifixes/iv91019/, ,yes hiper,aix,7200-01-00 :: 7200-01-01,CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK=YES,IV91020,7200-01-02,IV91020s0a.161125.72TL01SP00.epkg.Z IV91020s0a.161125.72TL01SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91020,devices.vdevice.IBM.l-lan.rte:7.2.1.0,20161206, ,6100-09:IV91004 7100-04:IV91019,https://aix.software.ibm.com/aix/ifixes/iv91020/, ,yes hiper,aix,7100-03-07 :: 7100-03-08,Potential data loss using Virtual FC with num_cmd_elems greater than 256,IV91042,7100-03-09,IV91042s7a.170125.71TL03SP07.epkg.Z IV91042s8a.170201.71TL03SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91042,devices.vdevice.IBM.vfc-client.rte:7.1.3.46-7.1.3.47,20170202, ,6100-09:IV91199 7100-04:IV90915 7200-00:IV92284 7200-01:IV91511,https://aix.software.ibm.com/aix/ifixes/iv91042/, ,yes hiper,aix,6100-09-06 :: 6100-09-07 :: 6100-09-08,Potential data loss using Virtual FC with num_cmd_elems greater than 256,IV91199,6100-09-09,IV91199s8a.170120.61TL09SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91199,devices.vdevice.IBM.vfc-client.rte:6.1.9.100-6.1.9.200,20170202, ,7100-03:IV91042 7100-04:IV90915 7200-00:IV92284 7200-01:IV91511,https://aix.software.ibm.com/aix/ifixes/iv91199/, ,yes sec,aix,7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07,There are two vulnerabilities in BIND that impact AIX.,IV91214 / CVE-2016-8864 / CVE-2016-2848,7100-03-09,IV91214m4b.161209.epkg.Z IV91214m5b.161209.epkg.Z IV91214m6a.161209.epkg.Z IV91214m7b.170202.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client:7.1.3.0-7.1.3.48,20161215,20161229,7200-01:IV91257 5300-12:IV91253 7200-00:IV91256 7100-04:IV91255 6100-09:IV91254,https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,5300-12-09,There are two vulnerabilities in BIND that impact AIX.,IV91253 / CVE-2016-8864 / CVE-2016-2848,See Advisory,IV91253m9b.161209.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20161215,20161229,7200-01:IV91257 7200-00:IV91256 7100-03:IV91214 7100-04:IV91255 6100-09:IV91254,ftp://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,6100-09-06 :: 6100-09-07 :: 6100-09-08,There are two vulnerabilities in BIND that impact AIX.,IV91254 / CVE-2016-8864 / CVE-2016-2848,6100-09-09,IV91254m6b.161213.epkg.Z IV91254m7b.161209.epkg.Z IV91254m8b.161209.epkg.z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client:6.1.9.0-6.1.9.200,20161215,20161229,7200-01:IV91257 5300-12:IV91253 7200-00:IV91256 7100-03:IV91214 7100-04:IV91255,https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,7100-04-01 :: 7100-04-02 :: 7100-04-03,There are two vulnerabilities in BIND that impact AIX.,IV91255 / CVE-2016-8864 / CVE-2016-2848,7100-04-04,IV91255m1b.161213.epkg.Z IV91255m2a.161213.epkg.Z IV91255m3c.161213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client:7.1.4.0-7.1.4.30,20161215,20161229,7200-01:IV91257 5300-12:IV91253 7200-00:IV91256 7100-03:IV91214 6100-09:IV91254,https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,There are two vulnerabilities in BIND that impact AIX.,IV91256 / CVE-2016-8864 / CVE-2016-2848,7200-00-04,IV91256m1b.161212.epkg.Z IV91256m2b.161209.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client_core:7.2.0.0-7.2.0.2,20161215,20161229,7200-01:IV91257 5300-12:IV91253 7100-03:IV91214 7100-04:IV91255 6100-09:IV91254,https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no sec,aix,7200-01-00 :: 7200-01-01,There are two vulnerabilities in BIND that impact AIX.,IV91257 / CVE-2016-8864 / CVE-2016-2848,7200-01-02,IV91257m0a.161212.epkg.Z IV91257m1a.161213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc,bos.net.tcp.client_core:7.2.1.0-7.2.1.0,20161215,20161229,5300-12:IV91253 7200-00:IV91256 7100-03:IV91214 7100-04:IV91255 6100-09:IV91254,https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar,CVE-2016-8864:7.5 / CVE-2016-2848:7.5,no hiper,vios,2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.51 :: 2.2.3.52 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80,possible data corruption after LPM failure,IV91339,2.2.3.90,IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z / IV91339s7b.170112.VIOS2.2.3.70.epkg.Z / IV91339s8b.170118.VIOS2.2.5.10.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91339,devices.vdevice.IBM.v-scsi-host.rte:6.1.9.0-6.1.9.48,20161207,20170119,n/a,https://aix.software.ibm.com/aix/ifixes/iv91339/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23 :: 2.2.4.30,possible data corruption after LPM failure,IV91339,2.2.4.40,IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z / IV91339s7b.170112.VIOS2.2.3.70.epkg.Z / IV91339s8b.170118.VIOS2.2.5.10.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91339,devices.vdevice.IBM.v-scsi-host.rte:6.1.9.100-6.1.9.102,20161207,20170119,n/a,https://aix.software.ibm.com/aix/ifixes/iv91339/, ,yes hiper,vios,2.2.5.0 :: 2.2.5.10,possible data corruption after LPM failure ,IV91339,2.2.5.20,IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z / IV91339s7b.170112.VIOS2.2.3.70.epkg.Z / IV91339s8b.170118.VIOS2.2.5.10.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91339,devices.vdevice.IBM.v-scsi-host.rte:6.1.9.200,20161207,20170119,n/a,https://aix.software.ibm.com/aix/ifixes/iv91339/, ,yes hiper,aix,7100-04-03,getsockname() returns incorrect NameLength,IV91431,7100-04-04,IV91431s3a.161209.71TL04SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91431,bos.mp64:7.1.4.30,20161209, ,7200-00:IV91432,https://aix.software.ibm.com/aix/ifixes/iv91431/, ,yes hiper,aix,7200-01-00 :: 7200-01-01,getsockname() returns incorrect NameLength,IV91432,7200-01-02,IV91432s1a.161209.72TL01SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91432,bos.mp64:7.2.1.0-7.2.1.1,20161209, ,7100-04:IV91431,https://aix.software.ibm.com/aix/ifixes/iv91432/, ,yes sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,There is a vulnerability in sysproc that impacts AIX.,IV91456 / CVE-2016-8944,7200-00-04,IV91456s0a.161212.epkg.Z IV91456s1a.161212.epkg.Z IV91456s2a.161212.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc,bos.mp64:7.2.0.0-7.2.0.1,20170130, ,7200-01:IV90234 7100-03:IV91488 7100-04:IV91487,https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar,CVE-2016-8944:6.2,no sec,aix,7100-04-01 :: 7100-04-02 :: 7100-04-03,There is a vulnerability in sysproc that impacts AIX.,IV91487 / CVE-2016-8944,7100-04-04,IV91487s1a.161212.epkg.Z IV91487s2a.161213.epkg.Z IV91487s3a.161213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc,bos.mp64:7.1.4.0-7.1.4.30,20170130, ,7200-01:IV90234 7200-00:IV91456 7100-03:IV91488,https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar,CVE-2016-8944:6.2,no sec,aix,7100-03-05 :: 7100-03-06 :: 7100-03-07,There is a vulnerability in sysproc that impacts AIX.,IV91488 / CVE-2016-8944,7100-03-09,IV91488s5a.161212.epkg.Z IV91488s6a.161212.epkg.Z IV91488s7a.161213.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc,bos.mp64:7.1.3.0-7.1.3.48,20170130, ,7200-01:IV90234 7200-00:IV91456 7100-04:IV91487,https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar,CVE-2016-8944:6.2,no hiper,aix,7200-01-00 :: 7200-01-01,Potential data loss using Virtual FC with num_cmd_elems greater than 256,IV91511,7200-01-02,IV91511s1a.161214.72TL01SP00-01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91511,devices.vdevice.IBM.vfc-client.rte:7.2.1.0-7.2.1.0,20170202, ,6100-09:IV91199 7100-03:IV91042 7100-04:IV90915 7200-00:IV92284,https://aix.software.ibm.com/aix/ifixes/iv91511/, ,yes sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-06 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV91803 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV91803m6a.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,bos.net.tcp.client:6.1.9.0-6.1.9.200,20170213,20170217,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,6100-09-06 :: 6100-09-07 :: 6100-09-08,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV91803 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV91803m6a.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,bos.net.tcp.client:6.1.9.0-6.1.9.200,20170213, ,7200-00:IV92192 7100-04:IV91951,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no hiper,aix,7200-01-00 :: 7200-01-01,Possible data loss with CAPI adapter after EEH,IV91922,7200-01-02,IV91922s1a.170202.72TL01SP00-01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV91922,devices.capi.1410f0041410f004.com:7.2.1.0,20170210, ,7200-00:IV92666,https://aix.software.ibm.com/aix/ifixes/iv91922/, ,yes sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV91951 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7100-04-04,IV91951m3a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,bos.net.tcp.client:7.1.4.0-7.1.4.30,20170213,20170217,7200-00:IV92192 7100-03:IV92193 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7100-04-01 :: 7100-04-02 :: 7100-04-03,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV91951 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7100-04-04,IV91951m3a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,bos.net.tcp.client:7.1.4.0-7.1.4.30,20170213, ,7200-00:IV92192 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7200-01-00 :: 7200-01-01,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92067 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7200-01-02,IV92067s1a.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,bos.net.tcp.ntpd:7.2.1.0-7.2.1.0,20170213,20170217,7100-04:IV91951 6100-09:IV91803 5300-12:IV92194,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7100-03-09,IV92126m3a.170106.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:7.1.0.0-7.1.0.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09 :: 7100-00-10,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7100-04-04, ,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:7.1.0.0-7.1.0.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,See Bulletin,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09 :: 7100-01-10,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7100-04-04, ,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:7.1.0.0-7.1.0.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,See Bulletin,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06 :: 7100-02-07,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7100-04-04, ,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:7.1.0.0-7.1.0.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,See Bulletin,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7100-04-04,IV92126m3a.170106.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:7.1.0.0-7.1.0.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7200-00-01 :: 7200-00-02,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7200-00-04,IV92126m3a.170106.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:7.1.0.0-7.1.0.7,20170213,20170217,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7200-01-00 :: 7200-01-01,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7200-01-02,IV92126m3a.170106.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:7.1.0.0-7.1.0.7,20170213,20170217,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92192 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7200-00-04,IV92192m2a.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,bos.net.tcp.ntp:7.2.0.0-7.2.0.2 bos.net.tcp.ntpd:7.2.0.0-7.2.0.2,20170213,20170217,7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92193 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,7100-03-09,IV92193m5a.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,bos.net.tcp.client:7.1.3.0-7.1.3.48,20170213,20170217,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,5300-12-09,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92194 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,See Bulletin,IV92194m9a.170113.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20170213,20170217,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,7100-04-01 :: 7100-04-02 :: 7100-04-03,There is a vulnerability in bellmail that impacts AIX.,IV92240 / CVE-2017-1093,7100-04-04,IV92240m3a.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc,bos.net.tcp.client:7.1.4.0-7.1.4.30,20170129, ,7200-01:IV92242 7200-00:IV92241 7100-03:IV92250,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar,CVE-2017-1093:8.4,no sec,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02,There is a vulnerability in bellmail that impacts AIX.,IV92241 / CVE-2017-1093,7200-00-04,IV92241m2a.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc,bos.net.tcp.client_core:7.2.0.0-7.2.0.2,20170129, ,7200-01:IV92242 7100-03:IV92250 7100-04:IV92240,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar,CVE-2017-1093:8.4,no sec,aix,7200-01-00 :: 7200-01-01,There is a vulnerability in bellmail that impacts AIX.,IV92242 / CVE-2017-1093,7200-01-02,IV92242m1a.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc,bos.net.tcp.client_core:7.2.1.0,20170129, ,7200-00:IV92241 7100-03:IV92250 7100-04:IV92240,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar,CVE-2017-1093:8.4,no sec,aix,7100-03-05 :: 7100-03-06 :: 7100-03-07,There is a vulnerability in bellmail that impacts AIX.,IV92250 / CVE-2017-1093,7100-03-09,IV92250m71.170112.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc,bos.net.tcp.client:7.1.3.0-7.1.3.48,20170129, ,7200-01:IV92242 7200-00:IV92241 7100-04:IV92240,https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar,CVE-2017-1093:8.4,no hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03,Potential data loss using Virtual FC with num_cmd_elems greater than 256,IV92284,7200-00-04,IV92284s2a.170116.72TL00SP00-02.epkg.Z IV92284s3a.170116.72TL00SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV92284,devices.vdevice.IBM.vfc-client.rte:7.2.0.0-7.2.0.1,20170202, ,6100-09:IV91199 7100-03:IV91042 7100-04:IV90915 7200-01:IV91511,https://aix.software.ibm.com/aix/ifixes/iv92284/, ,yes sec,aix,6100-00-00 :: 6100-00-01 :: 6100-00-02 :: 6100-00-03 :: 6100-00-04 :: 6100-00-05 :: 6100-00-06 :: 6100-00-07 :: 6100-00-08 :: 6100-00-09 :: 6100-00-10 :: 6100-00-11,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV92287m5a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:6.1.6.0-6.1.6.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,6100-01-00 :: 6100-01-01 :: 6100-01-02 :: 6100-01-03 :: 6100-01-04 :: 6100-01-05 :: 6100-01-06 :: 6100-01-07 :: 6100-01-08 :: 6100-01-09,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV92287m5a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:6.1.6.0-6.1.6.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,6100-02-00 :: 6100-02-01 :: 6100-02-02 :: 6100-02-03 :: 6100-02-04 :: 6100-02-05 :: 6100-02-06 :: 6100-02-07 :: 6100-02-08 :: 6100-02-09 :: 6100-02-10,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV92287m5a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:6.1.6.0-6.1.6.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,6100-03-00 :: 6100-03-01 :: 6100-03-02 :: 6100-03-03 :: 6100-03-04 :: 6100-03-05 :: 6100-03-06 :: 6100-03-07 :: 6100-03-08 :: 6100-03-09 :: 6100-03-10,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV92287m5a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:6.1.6.0-6.1.6.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,6100-04-00 :: 6100-04-01 :: 6100-04-02 :: 6100-04-03 :: 6100-04-04 :: 6100-04-05 :: 6100-04-06 :: 6100-04-07 :: 6100-04-08 :: 6100-04-09 :: 6100-04-10 :: 6100-04-11,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV92287m5a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:6.1.6.0-6.1.6.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08 :: 6100-05-09,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV92287m5a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:6.1.6.0-6.1.6.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11 :: 6100-06-12,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV92287m5a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:6.1.6.0-6.1.6.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09 :: 6100-07-10,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV92287m5a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:6.1.6.0-6.1.6.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06 :: 6100-08-07,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV92287m5a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:6.1.6.0-6.1.6.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no sec,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311,6100-09-09,IV92287m5a.170113.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc,ntp.rte:6.1.6.0-6.1.6.7,20170213, ,7200-00:IV92192 7100-04:IV91951 6100-09:IV91803,https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar,CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4,no hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03,Possible data loss with CAPI adapter after EEH,IV92666,7200-00-04,IV92666s2a.170201.72TL00SP02.epkg.Z IV92666s3a.170202.72TL00SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV92666,devices.capi.1410f0041410f004.com:7.2.0.0-7.2.0.3,20170210, ,7200-01:IV91922,https://aix.software.ibm.com/aix/ifixes/iv92666/, ,yes hiper,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02,CRASH OR POTENTIAL DATA LOSS AFTER REMOVING LARGE JFS2 FILES ON AIX 7.2.1,IV93320,7200-01-03,IV93320s0c.170411.72TL01SP00.epkg.Z IV93320s1e.170411.72TL01SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV93320,bos.mp64:7.2.1.0-7.2.1.3,20170413, ,,https://aix.software.ibm.com/aix/ifixes/iv93320/, ,yes sec,aix,6100-09-06 :: 6100-09-07 :: 6100-09-08,There is a vulnerability in BIND that impacts AIX.,IV93361 / CVE-2016-9131,6100-09-09,IV93361m8a.170215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc,bos.net.tcp.client:6.1.9.0-6.1.9.200,20170307, ,7200-01:IV93365 5300-12:IV93366 7200-00:IV93403 7100-03:IV93362 7100-04:IV93363,https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar,CVE-2016-9131:7.5,no sec,aix,7100-03-06 :: 7100-03-07 :: 7100-03-08,There is a vulnerability in BIND that impacts AIX.,IV93362 / CVE-2016-9131,7100-03-09,IV93362m8a.170215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc,bos.net.tcp.client:7.1.3.0-7.1.3.48,20170307, ,7200-01:IV93365 5300-12:IV93366 7200-00:IV93403 7100-04:IV93363 6100-09:IV93361,https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar,CVE-2016-9131:7.5,no sec,aix,7100-04-01 :: 7100-04-02 :: 7100-04-03,There is a vulnerability in BIND that impacts AIX.,IV93363 / CVE-2016-9131,7100-04-04,IV93363m3a.170215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc,bos.net.tcp.client:7.1.4.0-7.1.4.30,20170307, ,7200-01:IV93365 5300-12:IV93366 7200-00:IV93403 7100-03:IV93362 6100-09:IV93361,https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar,CVE-2016-9131:7.5,no sec,aix,7200-01-00 :: 7200-01-01,There is a vulnerability in BIND that impacts AIX.,IV93365 / CVE-2016-9131,7200-01-02,IV93365m1a.170215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc,bos.net.tcp.bind_utils:7.2.1.0-7.2.1.1,20170307, ,5300-12:IV93366 7200-00:IV93403 7100-03:IV93362 7100-04:IV93363 6100-09:IV93361,https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar,CVE-2016-9131:7.5,no sec,aix,5300-12-09,There is a vulnerability in BIND that impacts AIX.,IV93366 / CVE-2016-9131,See Advisory,IV93366m9a.170215.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20170307, ,7200-01:IV93365 7200-00:IV93403 7100-03:IV93362 7100-04:IV93363 6100-09:IV93361,ftp://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar,CVE-2016-9131:7.5,no sec,aix,7200-00-01 :: 7200-00-02 :: 7200-00-03,There is a vulnerability in BIND that impacts AIX.,IV93403 / CVE-2016-9131,7200-00-04,IV93403m3a.170215.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc,bos.net.tcp.client_core:7.2.0.0-7.2.0.3,20170307, ,7200-01:IV93365 5300-12:IV93366 7100-03:IV93362 7100-04:IV93363 6100-09:IV93361,https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar,CVE-2016-9131:7.5,no hiper,aix,6100-09-08,PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST,IV93840,6100-09-09,IV93840s1a.170301.61TL09SP08epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV93840,bos.mp64:6.1.9.200-6.1.9.200,20170303,20170323,7100-03:IV93884 7100-04:IV93845 7200-00:IV93883 7200-01:IV93885,https://aix.software.ibm.com/aix/ifixes/iv93840/, ,yes hiper,aix,7100-04-03,PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST,IV93845,7100-04-04,IV93845s3a.170302.71TL04SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV93845,bos.mp64:7.1.4.30-7.1.4.31,20170303,20170323,6100-09:IV93840 7100-03:IV93884 7200-00:IV93883 7200-01:IV93885,https://aix.software.ibm.com/aix/ifixes/iv93845/, ,yes hiper,aix,7200-00-03,PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST,IV93883,7200-00-04,IV93883s3.170302.72TL00SP03.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV93883,bos.mp64:7.2.0.3-7.2.0.3,20170303,20170323,6100-09:IV93840 7100-03:IV93884 7100-04:IV93845 7200-01:IV93885,https://aix.software.ibm.com/aix/ifixes/iv93883/, ,yes hiper,aix,7100-03-08,PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST,IV93884,7100-03-09,IV93884s8a.170302.71TL03SP08.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV93884,bos.mp64:7.1.3.49,20170303,20170323,6100-09:IV93840 7100-04:IV93845 7200-00:IV93883 7200-01:IV93885,https://aix.software.ibm.com/aix/ifixes/iv93884/, ,yes hiper,aix,7200-01-00 :: 7200-01-01,PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST,IV93885,7200-01-02,IV93885s1.170302.72TL01SP01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV93885,bos.mp64:7.2.1.0-7.2.1.2,20170303,20170323,6100-09:IV93840 7100-03:IV93884 7100-04:IV93845 7200-00:IV93883,https://aix.software.ibm.com/aix/ifixes/iv93885/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40,VIOS update and rulescfgset can save/deploy incorrect settings ,IV94438,2.2.4.50,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV94438,ios.artex_profile.rte:6.1.9.0-6.1.9.202,20170513, ,,n/a, ,yes hiper,vios,2.2.5.0 :: 2.2.5.10 :: 2.2.5.20,VIOS update and rulescfgset can save/deploy incorrect settings ,IV94438,2.2.5.30,n/a,http://www-01.ibm.com/support/docview.wss?uid=isg1IV94438,ios.artex_profile.rte:6.1.9.0-6.1.9.202,20170513, ,,n/a, ,yes sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,There are multiple vulnerabilities in tcpdump that impact AIX.,IV94723 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486,7200-01-04,IV94723s2a.170414.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc,bos.net.tcp.tcpdump:7.2.1.0-7.2.1.0,20170525, ,5300-12:IV94729 7200-00:IV94724 7100-03:IV94727 7100-04:IV94726 6100-09:IV94728,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar,CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3,no sec,aix,7200-00-01 :: 7200-00-02 :: 7200-00-03,There are multiple vulnerabilities in tcpdump that impact AIX.,IV94724 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486,7200-00-04,IV94724s4b.170417.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc,bos.net.tcp.tcpdump:7.2.0.0-7.2.0.2,20170525, ,7200-01:IV94723 5300-12:IV94729 7100-03:IV94727 7100-04:IV94726 6100-09:IV94728,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar,CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3,no sec,aix,7100-04-02 :: 7100-04-03 :: 7100-04-04,There are multiple vulnerabilities in tcpdump that impact AIX.,IV94726 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486,7100-04-05,IV94726s4c.170417.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc,bos.net.tcp.server:7.1.4.0-7.1.4.31,20170525, ,7200-01:IV94723 5300-12:IV94729 7200-00:IV94724 7100-03:IV94727 6100-09:IV94728,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar,CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3,no sec,aix,7100-03-07 :: 7100-03-08 :: 7100-03-09,There are multiple vulnerabilities in tcpdump that impact AIX.,IV94727 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486,7100-03-10,IV94727s9b.170417.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc,bos.net.tcp.server:7.1.3.0-7.1.3.49,20170525, ,7200-01:IV94723 5300-12:IV94729 7200-00:IV94724 7100-04:IV94726 6100-09:IV94728,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar,CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3,no sec,aix,6100-09-07 :: 6100-09-08 :: 6100-09-09,There are multiple vulnerabilities in tcpdump that impact AIX.,IV94728 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486,6100-09,IV94728s9c.170420.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc,bos.net.tcp.server:6.1.9.0-6.1.9.201,20170525, ,7200-01:IV94723 5300-12:IV94729 7200-00:IV94724 7100-03:IV94727 7100-04:IV94726,https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar,CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3,no sec,aix,5300-12-09,There are multiple vulnerabilities in tcpdump that impact AIX.,IV94729 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486,5300-12,IV94729s9b.170425.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc,bos.net.tcp.server:5.3.12.0-5.3.12.6,20170525, ,7200-01:IV94723 7200-00:IV94724 7100-03:IV94727 7100-04:IV94726 6100-09:IV94728,ftp://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar,CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3,no hiper,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04,SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES,IV95012,7100-04-05,IV95012s1a.170511.71TL04SP00.epkg.Z IV95012s3a.170414.71TL04SP03.epkg.Z IV95012s4a.170526.71TL04SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95012,bos.mp64:7.1.4.0-7.1.4.32,20170602, ,6100-09:IV95102 7100-03:IV95111 7200-00:IV95858 7200-01:IV95590,https://aix.software.ibm.com/aix/ifixes/iv95012/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40,SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES,IV95102,2.2.4.50,IV95102s5a.61TL09SP05.170526.epkg.Z IV95102s5a.VIOS2.2.3.90.170526.epkg.Z IV95102s9a.61TL09SP09.170526.epkg.Z IV95102s9a.VIOS2.2.4.40.170526.epkg.Z IV95102s9a.VIOS2.2.5.20.170526.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95102,bos.mp64:6.1.9.100-6.1.9.201,20170602, ,6100-09:IV95102 7100-03:IV95111 7100-04:IV95012 7200-00:IV95858 7200-01:IV95590,https://aix.software.ibm.com/aix/ifixes/iv95102/, ,yes hiper,vios,2.2.5.0 :: 2.2.5.10 :: 2.2.5.20,SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES,IV95102,2.2.5.30,IV95102s5a.61TL09SP05.170526.epkg.Z IV95102s5a.VIOS2.2.3.90.170526.epkg.Z IV95102s9a.61TL09SP09.170526.epkg.Z IV95102s9a.VIOS2.2.4.40.170526.epkg.Z IV95102s9a.VIOS2.2.5.20.170526.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95102,bos.mp64:6.1.9.200-6.1.9.201,20170602, ,6100-09:IV95102 7100-03:IV95111 7100-04:IV95012 7200-00:IV95858 7200-01:IV95590,https://aix.software.ibm.com/aix/ifixes/iv95102/, ,yes hiper,aix,6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09,SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES,IV95102,6100-09-10,IV95102s5a.61TL09SP05.170526.epkg.Z IV95102s9a.61TL09SP09.170526.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95102,bos.mp64:6.1.9.15-6.1.9.201,20170602, ,7100-03:IV95111 7100-04:IV95012 7200-00:IV95858 7200-01:IV95590,https://aix.software.ibm.com/aix/ifixes/iv95102/, ,yes hiper,vios,2.2.3.3 :: 2.2.3.13 :: 2.2.3.23 :: 2.2.3.33 :: 2.2.3.43 :: 2.2.3.53 :: 2.2.3.63 :: 2.2.3.73 :: 2.2.3.83 :: 2.2.3.84 :: 2.2.3.85 :: 2.2.3.86 :: 2.2.3.87 :: 2.2.3.88 :: 2.2.3.89 :: 2.2.3.90,SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES,IV95102,n/a,IV95102s5a.61TL09SP05.170526.epkg.Z IV95102s5a.VIOS2.2.3.90.170526.epkg.Z IV95102s9a.61TL09SP09.170526.epkg.Z IV95102s9a.VIOS2.2.4.40.170526.epkg.Z IV95102s9a.VIOS2.2.5.20.170526.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95102,bos.mp64:6.1.9.15-6.1.9.201,20170602, ,6100-09:IV95102 n/a:IV95111 7100-04:IV95012 7200-00:IV95858 7200-01:IV95590,https://aix.software.ibm.com/aix/ifixes/iv95102/, ,yes hiper,aix,7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08 :: 7100-03-09,SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES,IV95111,n/a,IV95111s9a.170526.71TL03SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95111,bos.mp64:7.1.3.15-7.1.3.50,20170602, ,6100-09:IV95102 7100-04:IV95012 7200-00:IV95858 7200-01:IV95590,https://aix.software.ibm.com/aix/ifixes/iv95111/, ,yes hiper,vios,2.2.4.40,VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS,IV95372,2.2.4.50,IV95372s9a.170427.epkg.Z IV95372s9a.AIX61TL09SP09.170427.epkg.Z IV95372s9a.VIOS2.2.3.90.170427.epkg.Z IV95372s9a.VIOS2.2.4.40.170427.epkg.Z IV95372s9a.VIOS2.2.5.20.170427.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95372,devices.ethernet.lnc.rte:6.1.9.201,20170516, ,7100-03:IV95638 7100-04:IV95637,https://aix.software.ibm.com/aix/ifixes/iv95372/, ,yes hiper,vios,2.2.5.20,VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS,IV95372,2.2.5.30,IV95372s9a.170427.epkg.Z IV95372s9a.AIX61TL09SP09.170427.epkg.Z IV95372s9a.VIOS2.2.3.90.170427.epkg.Z IV95372s9a.VIOS2.2.4.40.170427.epkg.Z IV95372s9a.VIOS2.2.5.20.170427.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95372,devices.ethernet.lnc.rte:6.1.9.201,20170516, ,7100-03:IV95638 7100-04:IV95637,https://aix.software.ibm.com/aix/ifixes/iv95372/, ,yes hiper,aix,6100-09-09,VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS,IV95372,6100-09-10,IV95372s9a.AIX61TL09SP09.170427.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95372,devices.ethernet.lnc.rte:6.1.9.201-6.1.9.201,20170516, ,7100-03:IV95638 7100-04:IV95637,https://aix.software.ibm.com/aix/ifixes/iv95372/, ,yes hiper,vios,2.2.3.90,VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS,IV95372,n/a,IV95372s9a.170427.epkg.Z IV95372s9a.AIX61TL09SP09.170427.epkg.Z IV95372s9a.VIOS2.2.3.90.170427.epkg.Z IV95372s9a.VIOS2.2.4.40.170427.epkg.Z IV95372s9a.VIOS2.2.5.20.170427.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95372,devices.ethernet.lnc.rte:6.1.9.201,20170516, ,7100-03:IV95638 7100-04:IV95637,https://aix.software.ibm.com/aix/ifixes/iv95372/, ,yes hiper,aix,7100-04-04, VLAN tagged largesend packets are dropped for some adapters ,IV95372,7100-04-05,IV95637s4a.170509.71TL04SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95637,devices.ethernet.lnc.rte:7.1.4.31,20170516, ,6100-09:IV95372 7100-03:IV95638,https://aix.software.ibm.com/aix/ifixes/iv95637/, ,yes hiper,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02,SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES,IV95590,7200-01-03,IV95590s2b.170525.72TL01SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95590,bos.mp64:7.2.1.0-7.2.1.3,20170602, ,6100-09:IV95102 7100-03:IV95111 7100-04:IV95012 7200-00:IV95858,https://aix.software.ibm.com/aix/ifixes/iv95590/, ,yes hiper,aix,7100-04-04,VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS,IV95637,7100-04-05,IV95637s4a.170509.71TL04SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95637,devices.ethernet.lnc.rte:7.1.4.31,20170516, ,6100-09:IV95372 7100-03:IV95638,https://aix.software.ibm.com/aix/ifixes/iv95637/, ,yes hiper,aix,7100-03-09,VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS,IV95638,7100-03-10,IV95638s9a.170510.71TL03SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95638,devices.ethernet.lnc.rte:7.1.3.49 devices.ethernet.mlx.rte:7.1.3.49,20170516, ,6100-09:IV95372 7100-04:IV95637,https://aix.software.ibm.com/aix/ifixes/iv95638/, ,yes hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04,SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES,IV95858,7200-00-05,IV95858s4b.170525.72TL00SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV95858,bos.mp64:7.2.0.0-7.2.0.4,20170602, ,6100-09:IV95102 7100-03:IV95111 7100-04:IV95012 7200-01:IV95590,https://aix.software.ibm.com/aix/ifixes/iv95858/, ,yes sec,aix,5300-12-09,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV96305 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464,See Bulletin,IV96305m9a.170518.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20170706,20171113,7200-01:IV96310 7200-00:IV96309 7100-03:IV96307 7100-04:IV96308 6100-09:IV96306,ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar,CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2,no sec,vios,2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact VIOS,IV96306 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464,6100-09-10,IV96306m9a.170519.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc,bos.net.tcp.client:6.1.9.0-6.1.9.200,20170707, ,5300-03::IV96305 7100-03::IV96307 7100-04::IV96308 7200-00::IV96309 7200-01::IV96310,https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar,CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2,no sec,aix,7100-03-07 :: 7100-03-08 :: 7100-03-09,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX,IV96307 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464,See Bulletin,IV96307m9a.170518.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc,bos.net.tcp.client:7.1.3.0-7.1.3.49,20170707,20171113,5300-03::IV96305 6100-09::IV96306 7100-04::IV96308 7200-00::IV96309 7200-01::IV96310,https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar,CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2,no sec,aix,7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX,IV96308 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464,7100-04-06,IV96308m4a.170518.epkg.Z IV96308m4b.171107.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc,bos.net.tcp.client:7.1.4.0-7.1.4.31,20170707,20171113,5300-03::IV96305 6100-09::IV96306 7100-03::IV96307 7200-00::IV96309 7200-01::IV96310,https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar,CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2,no sec,aix,7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV96309 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464,7200-00-06,IV96309m4a.170518.epkg.Z IV96312m5a.170518.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc,bos.net.tcp.ntp:7.2.0.0-7.2.0.2 bos.net.tcp.ntpd:7.2.0.0-7.2.0.3,20170706,20171113,7200-01:IV96310 5300-12:IV96305 7100-03:IV96307 7100-04:IV96308 6100-09:IV96306,https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar,CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2,no sec,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.,IV96310 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464,7200-01-04,IV96310m2a.170519.epkg.Z IV96312m5a.170518.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc,bos.net.tcp.ntp:7.2.1.0-7.2.1.0 bos.net.tcp.ntpd:7.2.1.0-7.2.1.1,20170706,20171113,5300-12:IV96305 7200-00:IV96309 7100-03:IV96307 7100-04:IV96308 6100-09:IV96306,https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar,CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2,no sec,aix,NTPv4,There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX,IV96311 IV96312 CVE-2017-6458 CVE-2017-6462 CVE-2017-6464 CVE-2017-6451 CVE-2017-6458 CVE-2017-6462 CVE-2017-6464,See Advisory,IV96311m5a.170518.epkg.Z IV96312m5a.170518.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc,ntp.rte:6.1.6.0-6.1.6.9 ntp.rte:7.1.0.0-7.1.0.9,20170707, ,6100-09:IV96311 7100-03:IV96312 7100-04:IV96312 7200-00:IV96312 7200-01:IV96312,https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar,CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2,no hiper,aix,7100-04-04,LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP,IV96345,7100-04-05,IV96345s4b.170525.71TL04SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96345,bos.rte.libc:7.1.4.31,20170527, ,6100-10:IV96351 7100-03:IV96352 7200-00:IV96347 7200-01:IV96348,https://aix.software.ibm.com/aix/ifixes/iv96345/, ,yes hiper,aix,7200-00-04,LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP,IV96347,7200-00-05,IV96347s4a.170525.72TL00SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96347,bos.rte.libc:7.2.0.3-7.2.0.3,20170527, ,6100-10:IV96351 7100-03:IV96352 7100-04:IV96345 7200-01:IV96348,https://aix.software.ibm.com/aix/ifixes/iv96347/, ,yes hiper,aix,7200-01-02,LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP,IV96348,7200-01-03,IV96348s2b.170525.72TL01SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96348,bos.rte.libc:7.2.1.1-7.2.1.1,20170527, ,6100-10:IV96351 7100-03:IV96352 7100-04:IV96345 7200-00:IV96347,https://aix.software.ibm.com/aix/ifixes/iv96348/, ,yes hiper,vios,2.2.4.40,LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP,IV96351,2.2.4.50,IV96351s9d.170525.61TL09SP09.epkg.Z IV96351s9d.170525.VIOS2.2.3.90.epkg.Z IV96351s9d.170525.VIOS2.2.4.40.epkg.Z IV96351s9d.170525.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96351,bos.rte.libc:6.1.9.201,20170527, ,6100-09:IV96351 7100-04:IV96345 7200-00:IV96347 7200-01:IV96348,https://aix.software.ibm.com/aix/ifixes/iv96351/, ,yes hiper,vios,2.2.5.20,LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP,IV96351,2.2.5.30,IV96351s9d.170525.61TL09SP09.epkg.Z IV96351s9d.170525.VIOS2.2.3.90.epkg.Z IV96351s9d.170525.VIOS2.2.4.40.epkg.Z IV96351s9d.170525.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96351,bos.rte.libc:6.1.9.201,20170527, ,6100-09:IV96351 7100-04:IV96345 7200-00:IV96347 7200-01:IV96348,https://aix.software.ibm.com/aix/ifixes/iv96351/, ,yes hiper,aix,6100-09-09,LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP,IV96351,6100-09-10,IV96351s9d.170525.61TL09SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96351,bos.rte.libc:6.1.9.201,20170527, ,7100-03:IV96352 7100-04:IV96345 7200-00:IV96347 7200-01:IV96348,https://aix.software.ibm.com/aix/ifixes/iv96351/, ,yes hiper,vios,2.2.3.90,LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP,IV96351,n/a,IV96351s9d.170525.61TL09SP09.epkg.Z IV96351s9d.170525.VIOS2.2.3.90.epkg.Z IV96351s9d.170525.VIOS2.2.4.40.epkg.Z IV96351s9d.170525.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96351,bos.rte.libc:6.1.9.201,20170527, ,6100-09:IV96351 7100-04:IV96345 7200-00:IV96347 7200-01:IV96348,https://aix.software.ibm.com/aix/ifixes/iv96351/, ,yes hiper,aix,7100-03-09,LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP,IV96352,n/a,iv96352s9b.170524.71TL03SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96352,bos.rte.libc:7.1.3.49,20170527, ,6100-10:IV96351 7100-04:IV96345 7200-00:IV96347 7200-01:IV96348,https://aix.software.ibm.com/aix/ifixes/iv96352/, ,yes hiper,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03,SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS,IV96360,7200-01-04,IV96360s3a.171227.72TL01SP03.epkg.Z IV97423m0a.180328.72TL01SP00-01.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96360,devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.2,20180331, ,6100-09:IJ00360 7100-04:IJ00519 7100-05:IJ01304 7200-02:IJ01262,https://aix.software.ibm.com/aix/ifixes/iv96360/, ,yes hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40,UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS,IV96553,2.2.4.50,IV96553s9a.170704.61TL09SP09.epkg.Z IV96553s9a.170704.VIOS2.2.3.90.epkg.Z IV96553s9a.170704.VIOS2.2.4.40.epkg.Z IV96553s9a.170704.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96553,devices.fcp.disk.rte:6.1.9.100-6.1.9.201 devices.pci.77102224.com:6.1.9.100-6.1.9.201 devices.pci.df1000f7.com:6.1.9.100-6.1.9.201 devices.pciex.df1060e214103404.com:6.1.9.100-6.1.9.201 ,20170715, ,7100-04:IV96603 7200-00:IV96606 7200-01:IV96604,https://aix.software.ibm.com/aix/ifixes/iv96553/, ,yes hiper,vios,2.2.5.0 :: 2.2.5.10 :: 2.2.5.20,UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS,IV96553,2.2.5.30,IV96553s9a.170704.61TL09SP09.epkg.Z IV96553s9a.170704.VIOS2.2.3.90.epkg.Z IV96553s9a.170704.VIOS2.2.4.40.epkg.Z IV96553s9a.170704.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96553,devices.fcp.disk.rte:6.1.9.200-6.1.9.201 devices.pci.77102224.com:6.1.9.200-6.1.9.201 devices.pci.df1000f7.com:6.1.9.200-6.1.9.201 devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.201 ,20170715,20170721,7100-04:IV96603 7200-00:IV96606 7200-01:IV96604,https://aix.software.ibm.com/aix/ifixes/iv96553/, ,yes hiper,aix,6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09,UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS,IV96553,6100-09-10,IV96553s9a.170704.61TL09SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96553,devices.fcp.disk.rte:6.1.9.0-6.1.9.201 devices.pci.77102224.com:6.1.9.0-6.1.9.201 devices.pci.df1000f7.com:6.1.9.0-6.1.9.201 devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201 ,20170715,20170721,7100-04:IV96603 7200-00:IV96606 7200-01:IV96604,https://aix.software.ibm.com/aix/ifixes/iv96553/, ,yes hiper,vios,2.2.3.0 :: 2.2.3.10 :: 2.2.3.20 :: 2.2.3.30 :: 2.2.3.40 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80 :: 2.2.3.90,UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS,IV96553,See Advisory,IV96553s9a.170704.61TL09SP09.epkg.Z IV96553s9a.170704.VIOS2.2.3.90.epkg.Z IV96553s9a.170704.VIOS2.2.4.40.epkg.Z IV96553s9a.170704.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96553,devices.fcp.disk.rte:6.1.9.0-6.1.9.201 devices.pci.77102224.com:6.1.9.0-6.1.9.201 devices.pci.df1000f7.com:6.1.9.0-6.1.9.201 devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201 ,20170715, ,6100-09:IV96553 7100-04:IV96603 7200-00:IV96606 7200-01:IV96604,https://aix.software.ibm.com/aix/ifixes/iv96553/, ,yes hiper,vios,2.2.3.0 :: 2.2.3.10 :: 2.2.3.20 :: 2.2.3.30 :: 2.2.3.40 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80 :: 2.2.3.90,UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS,IV96553,See Advisory,IV96553s9a.170704.61TL09SP09.epkg.Z IV96553s9a.170704.VIOS2.2.3.90.epkg.Z IV96553s9a.170704.VIOS2.2.4.40.epkg.Z IV96553s9a.170704.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96553,devices.fcp.disk.rte:6.1.9.0-6.1.9.201 devices.pci.77102224.com:6.1.9.0-6.1.9.201 devices.pci.df1000f7.com:6.1.9.0-6.1.9.201 devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201 ,20170721,20170721,6100-09:IV96553 7100-03:IV97772 7100-04:IV96603 7200-00:IV96606 7200-01:IV96604,https://aix.software.ibm.com/aix/ifixes/iv96553/, ,yes hiper,aix,7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04,UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS,IV96603,7100-04-05,IV96603s4a.170704.71TL04SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96603,devices.fcp.disk.rte:7.1.4.0-7.1.4.31 devices.pci.77102224.com:7.1.4.0-7.1.4.31 devices.pci.df1000f7.com:7.1.4.0-7.1.4.31 devices.pciex.df1060e214103404.com:7.1.4.0-7.1.4.31 ,20170715,20170721,6100-09:IV96553 7200-00:IV96606 7200-01:IV96604,https://aix.software.ibm.com/aix/ifixes/iv96603/, ,yes hiper,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02,UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS,IV96604,7200-01-03,IV96604s2a.170705.72TL01SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96604,devices.fcp.disk.rte:7.2.1.0-7.2.1.1 devices.pci.77102224.com:7.2.1.0-7.2.1.1 devices.pci.df1000f7.com:7.2.1.0-7.2.1.1 devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.1 ,20170715,20170721,6100-09:IV96553 7100-04:IV96603 7100-03:IV97772 7200-00:IV96606,https://aix.software.ibm.com/aix/ifixes/iv96604/, ,yes hiper,aix,7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04,UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS,IV96606,7200-00-05,IV96606s4a.170713.72TL00SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV96606,devices.fcp.disk.rte:7.2.0.0-7.2.0.3 devices.pci.77102224.com:7.2.0.0-7.2.0.3 devices.pci.df1000f7.com:7.2.0.0-7.2.0.3 devices.pciex.df1060e214103404.com:7.2.0.0-7.2.0.3 ,20170715,20170721,6100-09:IV96553 7100-04:IV96603 7100-03:IV97772 7200-01:IV96604,https://aix.software.ibm.com/aix/ifixes/iv96606/, ,yes hiper,vios,2.2.4.40,ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER,IV97135,2.2.4.50,IV97135s9a.170714.61TL09SP09.epkg.Z IV97135s9a.170714.VIOS2.2.3.90.epkg.Z IV97135s9a.170714.VIOS2.2.4.40.epkg.Z IV97135s9a.170714.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97135,devices.common.IBM.ethernet.rte:6.1.9.201,20170718, ,6100-09:IV97135 7100-03:IV97772 7100-04:IV97586 7200-01:IV97588,https://aix.software.ibm.com/aix/ifixes/iv97135/, ,yes hiper,vios,2.2.5.20,ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER,IV97135,2.2.5.30,IV97135s9a.170714.61TL09SP09.epkg.Z IV97135s9a.170714.VIOS2.2.3.90.epkg.Z IV97135s9a.170714.VIOS2.2.4.40.epkg.Z IV97135s9a.170714.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97135,devices.common.IBM.ethernet.rte:6.1.9.201,20170718, ,6100-09:IV97135 7100-03:IV97772 7100-04:IV97586 7200-01:IV97588,https://aix.software.ibm.com/aix/ifixes/iv97135/, ,yes hiper,aix,6100-09-09,ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER,IV97135,6100-09-10,IV97135s9a.170714.61TL09SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97135,devices.common.IBM.ethernet.rte:6.1.9.201,20170718, ,7100-04:IV97586 7200-01:IV97588,https://aix.software.ibm.com/aix/ifixes/iv97135/, ,yes hiper,vios,2.2.3.90,ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER,IV97135,See Advisory,IV97135s9a.170714.61TL09SP09.epkg.Z IV97135s9a.170714.VIOS2.2.3.90.epkg.Z IV97135s9a.170714.VIOS2.2.4.40.epkg.Z IV97135s9a.170714.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97135,devices.common.IBM.ethernet.rte:6.1.9.201,20170718, ,6100-09:IV97135 7100-03:IV97772 7100-04:IV97586 7200-01:IV97588,https://aix.software.ibm.com/aix/ifixes/iv97135/, ,yes hiper,vios,2.2.4.30 :: 2.2.4.40,CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER,IV97148,2.2.4.50,IV97148s8a.170613.61TL09SP08.epkg.Z IV97148s8a.170613.epkg.Z IV97148s9b.171030.61TL09SP09.epkg.Z IV97148s9b.171030.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97148,bos.cluster.rte:6.1.9.200-6.1.9.201 ,20171108, ,6100-09:IV97148 7100-04:IV97265 7200-01:IV97266,https://aix.software.ibm.com/aix/ifixes/iv97148/, ,yes hiper,vios,2.2.5.0 :: 2.2.5.10 :: 2.2.5.20,CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER,IV97148,2.2.5.30,IV97148s8a.170613.61TL09SP08.epkg.Z IV97148s8a.170613.epkg.Z IV97148s9b.171030.61TL09SP09.epkg.Z IV97148s9b.171030.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97148,bos.cluster.rte:6.1.9.200-6.1.9.201 ,20171108, ,6100-09:IV97148 7100-04:IV97265 7200-01:IV97266,https://aix.software.ibm.com/aix/ifixes/iv97148/, ,yes hiper,aix,6100-09-08 :: 6100-09-09,CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER,IV97148,6100-09-10,IV97148s8a.170613.61TL09SP08.epkg.Z IV97148s8a.170613.epkg.Z IV97148s9b.171030.61TL09SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97148,bos.cluster.rte:6.1.9.200-6.1.9.201 ,20171108, ,7100-04:IV97265 7200-01:IV97266,https://aix.software.ibm.com/aix/ifixes/iv97148/, ,yes hiper,vios,2.2.3.80 :: 2.2.3.90,CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER,IV97148,See Advisory,IV97148s8a.170613.61TL09SP08.epkg.Z IV97148s8a.170613.epkg.Z IV97148s9b.171030.61TL09SP09.epkg.Z IV97148s9b.171030.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97148,bos.cluster.rte:6.1.9.200-6.1.9.201 ,20171108, ,6100-09:IV97148 7100-04:IV97265 7200-01:IV97266,https://aix.software.ibm.com/aix/ifixes/iv97148/, ,yes hiper,aix,7100-04-03 :: 7100-04-04,CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER,IV97265,7100-04-05,IV97265s3a.171101.71TL04SP03.epkg.Z IV97265s4a.170823.71TL04SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97265,bos.cluster.rte:7.1.4.30-7.1.4.31,20171108, ,6100-09:IV97148 7200-01:IV97266,https://aix.software.ibm.com/aix/ifixes/iv97265/, ,yes hiper,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02,CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER,IV97266,7200-01-03,IV97266s1a.171101.72TL01SP00.epkg.Z IV97266s1a.171101.72TL01SP01.epkg.Z IV97266s2a.170920.72TL01SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97266,bos.cluster.rte:7.2.1.0-7.2.1.1 ,20171108, ,6100-09:IV97148 7100-04:IV97265,https://aix.software.ibm.com/aix/ifixes/iv97266/, ,yes sec,aix,6100-09-07 :: 6100-09-08 :: 6100-09-09,(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97356 / CVE-2017-1692,6100-09-10,IV97356m9a.170830.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.201,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,vios,2.2.3.70 :: 2.2.3.80 :: 2.2.3.90,(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692),IV97356 / CVE-2017-1692,6100-09-10,IV97356m9a.170830.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.201,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,vios,2.2.4.30 :: 2.2.4.40 :: 2.2.4.50,(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692),IV97356 / CVE-2017-1692,6100-09-10,IV97356m9a.170830.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.net.tcp.client:6.1.9.0-6.1.9.201,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no hiper,aix,7100-04-04,ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER,IV97586,7100-04-05,IV97586s4a.170714.71TL04SP04.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97586,devices.common.IBM.ethernet.rte:7.1.4.31,20170718, ,6100-09:IV97135 7200-01:IV97588,https://aix.software.ibm.com/aix/ifixes/iv97586/, ,yes hiper,aix,7200-01-02,ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER,IV97588,7200-01-03,IV97588s2a.170714.72TL01SP02.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97588,devices.common.IBM.ethernet.rte:7.2.1.1,20170718, ,6100-09:IV97135 7100-04:IV97586,https://aix.software.ibm.com/aix/ifixes/iv97588/, ,yes hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08 :: 7100-03-09,UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS,IV97772,See Advisory,IV97772s9a.170713.71TL03SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97772,devices.fcp.disk.rte:7.1.3.0-7.1.3.49 devices.pci.77102224.com:7.1.3.0-7.1.3.49 devices.pci.df1000f7.com:7.1.3.0-7.1.3.49 devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.49 ,20170715, ,6100-09:IV96553 7100-04:IV96603 7200-00:IV96606 7200-01:IV96604,https://aix.software.ibm.com/aix/ifixes/iv97772/, ,yes hiper,aix,7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08 :: 7100-03-09,UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS,IV97772,See Advisory,IV97772s9a.170713.71TL03SP09.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97772,devices.fcp.disk.rte:7.1.3.0-7.1.3.49 devices.pci.77102224.com:7.1.3.0-7.1.3.49 devices.pci.df1000f7.com:7.1.3.0-7.1.3.49 devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.49 ,20170721,20170721,6100-09:IV96553 7100-04:IV96603 7200-00:IV96606 7200-01:IV96604,https://aix.software.ibm.com/aix/ifixes/iv97772/, ,yes sec,aix,7200-00-03 :: 7200-00-04 :: 7200-00-05,(caccelstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97811 / CVE-2017-1692,7200-00-06,IV97811s2a.170712.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.acct:7.2.0.0-7.2.0.2,20180205, ,5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,(caccelstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97811 / CVE-2017-1692,7200-01-04,IV97811s2a.170712.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.acct:7.2.1.0-7.2.1.0,20180205, ,5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,6100-09-07 :: 6100-09-08 :: 6100-09-09,(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97852 / CVE-2017-1692,6100-09-10,IV97852s7a.170713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.archive:6.1.9.0-6.1.9.201,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,vios,2.2.3.70 :: 2.2.3.80 :: 2.2.3.90,(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692),IV97852 / CVE-2017-1692,6100-09-10,IV97852s7a.170713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.archive:6.1.9.0-6.1.9.201,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,vios,2.2.4.30 :: 2.2.4.40 :: 2.2.4.50,(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692),IV97852 / CVE-2017-1692,6100-09-10,IV97852s7a.170713.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.archive:6.1.9.0-6.1.9.201,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7100-04-03 :: 7100-04-04 :: 7100-04-05,(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97896 / CVE-2017-1692,7100-04-06,IV97896s4a.170712.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.acct:7.1.4.0-7.1.4.30,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-00-03 :: 7200-00-04 :: 7200-00-05,(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97898 / CVE-2017-1692,7200-00-06,IV97898s2a.171201.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.acct:7.2.0.0-7.2.0.3,20180205, ,5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97898 / CVE-2017-1692,7200-01-04,IV97898s2a.171201.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.acct:7.2.1.0-7.2.1.1,20180205, ,5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7100-04-03 :: 7100-04-04 :: 7100-04-05,(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97899 / CVE-2017-1692,7100-04-06,IV97899s4a.170712.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.acct:7.1.4.0-7.1.4.30,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-00-03 :: 7200-00-04 :: 7200-00-05,(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97901 / CVE-2017-1692,7200-00-06,IV97901s2a.171201.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.acct:7.2.0.0-7.2.0.3,20180205, ,5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97901 / CVE-2017-1692,7200-01-04,IV97901s2a.171201.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.acct:7.2.1.0-7.2.1.1,20180205, ,5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7100-04-03 :: 7100-04-04 :: 7100-04-05,(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97957 / CVE-2017-1692,7100-04-06,IV97957s2b.171205.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.archive:7.1.4.0-7.1.4.31,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97958 / CVE-2017-1692,7200-01-04,IV97958s0b.171205.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.archive:7.2.1.0-7.2.1.1,20180205, ,5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-00-03 :: 7200-00-04 :: 7200-00-05,(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV97959 / CVE-2017-1692,7200-00-06,IV97959s2b.171205.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.archive:7.2.0.0-7.2.0.3,20180205, ,5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no hiper,vios,2.2.5.0 :: 2.2.5.10 :: 2.2.5.20,LPARS USING SEA MAY LOSE NETWORK AFTER REBOOTING PRIMARY AND SECONDARY VIOS,IV97991,2.2.5.30,IV97991s8a.170714.VIOS2.2.5.0-10.epkg.Z IV97991s9a.170713.VIOS2.2.5.20.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IV97991,ios.sea:6.1.9.200-6.1.9.201 ,20170908, ,,https://aix.software.ibm.com/aix/ifixes/iv97991/, ,yes sec,aix,5300-12-09,(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV98013 / CVE-2017-1692,See Bulletin,IV98013s9a.170717.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.archive:5.3.12.0-5.3.12.7,20180205, ,7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,ftp://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,5300-12-09,There are vulnerabilities in BIND that impact AIX.,IV98825 / CVE-2017-3142 / CVE-2017-3143,See Bulletin,IV98825m9a.170830.epkg.Z,http://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc,bos.net.tcp.client:5.3.12.0-5.3.12.10,20170823,20171113,7200-01:IV98830 7200-00:IV98829 7100-03:IV98827 7100-04:IV98828 6100-09:IV98826,ftp://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar,CVE-2017-3142:5.3 / CVE-2017-3143:7.5,no sec,aix,6100-09-10 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09,There are vulnerabilities in BIND that impact AIX.,IV98826 / CVE-2017-3142 / CVE-2017-3143,6100-09-11,IV98826m9a.170809.epkg.Z IV98826m0a.171105.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc,bos.net.tcp.client:6.1.9.0-6.1.9.300,20170823,20171113,7200-01:IV98830 5300-12:IV98825 7200-00:IV98829 7100-03:IV98827 7100-04:IV98828,https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar,CVE-2017-3142:5.3 / CVE-2017-3143:7.5,no sec,aix,7100-03-07 :: 7100-03-08 :: 7100-03-09,There are vulnerabilities in BIND that impact AIX.,IV98827 / CVE-2017-3142 / CVE-2017-3143,See Bulletin,IV98827m3a.170808.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc,bos.net.tcp.client:7.1.3.0-7.1.3.49,20170823,20171113,7200-01:IV98830 5300-12:IV98825 7200-00:IV98829 7100-04:IV98828 6100-09:IV98826,https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar,CVE-2017-3142:5.3 / CVE-2017-3143:7.5,no sec,aix,7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05,There are vulnerabilities in BIND that impact AIX.,IV98828 / CVE-2017-3142 / CVE-2017-3143,7100-04-06,IV98828m4a.170808.epkg.Z IV98828m5b.171110.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc,bos.net.tcp.client:7.1.4.0-7.1.4.32,20170823,20171113,7200-01:IV98830 5300-12:IV98825 7200-00:IV98829 7100-03:IV98827 6100-09:IV98826,https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar,CVE-2017-3142:5.3 / CVE-2017-3143:7.5,no sec,aix,7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05,There are vulnerabilities in BIND that impact AIX.,IV98829 / CVE-2017-3142 / CVE-2017-3143,7200-00-06,IV98829m0a.170809.epkg.Z IV98829m0b.171106.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc,bos.net.tcp.client_core:7.2.0.0-7.2.0.4,20170823,20171113,7200-01:IV98830 5300-12:IV98825 7100-03:IV98827 7100-04:IV98828 6100-09:IV98826,https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar,CVE-2017-3142:5.3 / CVE-2017-3143:7.5,no sec,aix,7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03,There are vulnerabilities in BIND that impact AIX.,IV98830 / CVE-2017-3142 / CVE-2017-3143,7200-01-04,IV98830m1a.170809.epkg.Z IV98830m1b.171106.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc,bos.net.tcp.client_core:7.2.1.0-7.2.1.2,20170823,20171113,5300-12:IV98825 7200-00:IV98829 7100-03:IV98827 7100-04:IV98828 6100-09:IV98826,https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar,CVE-2017-3142:5.3 / CVE-2017-3143:7.5,no sec,aix,7100-04-03 :: 7100-04-04 :: 7100-04-05,(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV99497 / CVE-2017-1692,7100-04-06,IV99497m5a.171115.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.net.tcp.client:7.1.4.0-7.1.4.32,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-00-03 :: 7200-00-04 :: 7200-00-05,(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV99498 / CVE-2017-1692,7200-00-06,IV99498m5a.171115.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.net.tcp.client_core:7.2.0.0-7.2.0.4,20180205, ,5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV99499 / CVE-2017-1692,7200-01-04,IV99499m3a.171115.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.net.tcp.client_core:7.2.1.0-7.2.1.2,20180205, ,5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,6100-09-07 :: 6100-09-08 :: 6100-09-09,(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV99548 / CVE-2017-1692,6100-09-10,IV99548m9a.171031.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.lvm:6.1.9.0-6.1.9.201,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,vios,2.2.3.70 :: 2.2.3.80 :: 2.2.3.90,(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692),IV99548 / CVE-2017-1692,6100-09-10,IV99548m9a.171031.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.lvm:6.1.9.0-6.1.9.201,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,vios,2.2.4.30 :: 2.2.4.40 :: 2.2.4.50,(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692),IV99548 / CVE-2017-1692,6100-09-10,IV99548m9a.171031.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.lvm:6.1.9.0-6.1.9.201,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7100-04-03 :: 7100-04-04 :: 7100-04-05,(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV99550 / CVE-2017-1692,7100-04-06,IV99550m5a.171031.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.lvm:7.1.4.0-7.1.4.32,20180205, ,5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-00-03 :: 7200-00-04 :: 7200-00-05,(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV99551 / CVE-2017-1692,7200-00-06,IV99551m5a.171031.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.lvm:7.2.0.0-7.2.0.4,20180205, ,5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no sec,aix,7200-01-01 :: 7200-01-02 :: 7200-01-03,(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692),IV99552 / CVE-2017-1692,7200-01-04,IV99552m3a.171031.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc,bos.rte.lvm:7.2.1.0-7.2.1.2,20180205, ,5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356,https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar,CVE-2017-1692:8.4,no hiper,aix,6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11,SYSTEM CRASH IN E_CLEAR_WAIT().,IZ94647,6100-06-12,IZ94647s1a.130730.epkg.Z / IZ94647s1a.130730.61TL06SP11.epkg.Z,http://www-01.ibm.com/support/docview.wss?uid=isg1IZ94647,bos.mp64:6.1.6.0-6.1.6.22,20110208,20131124,6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412,ftp://public.dhe.ibm.com/aix/ifixes/iz94647/, ,no hiper,vios,2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40 :: 2.2.4.50 :: 2.2.4.60,Adapter firmware upgrade can fail or adapter may become unusable,See Advisory,See Advisory,IJ06644sAa.180917.AIX61TL09SP10.epkg.Z IJ06644sBa.180615.AIX61TL09SP11.epkg.Z IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z IJ06644sCa.180917.AIX61TL09SP12.epkg.Z IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z,,devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201,20181013, ,6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641,https://aix.software.ibm.com/aix/ifixes/ij06644/, ,yes sec,aix,invScout,AIX is vulnerable to arbitrary command execution due to invscout (CVE-2024-27260),is22026s1a / CVE-2024-27260,See Bulletin,is22026s1a.240514.epkg.Z,https://aix.software.ibm.com/aix/efixes/security/invscout_advisory6.asc,invscout.rte:2.2.0.0-2.2.0.26,20240515, ,,https://aix.software.ibm.com/aix/efixes/security/invscout_fix6.tar,CVE-2024-27260:8.4,no