"type","product","versions","abstract","apars","fixedIn","ifixes","bulletinUrl","filesets","issued","updated","siblings","download","cvss","reboot" "sec","aix","OpenSSL","AIX is vulnerable to arbitrary code execution (CVE-2024-4741) and denial of service (CVE-2024-5535 CVE-2024-4603) due to OpenSSL","1112400a / 1122400a / 3013sa / 3013ma / CVE-2024-4603 / CVE-2024-4741 / CVE-2024-5535","See Bulletin","1112400a.240722.epkg.Z 1122400a.240722.epkg.Z 3013sa.240722.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory42.asc","openssl.base:1.1.1.0-1.1.1.2400 openssl.base:1.1.2.0-1.1.2.2400 openssl.base:3.0.0.0-3.0.13.1000","20240730"," ","","https://aix.software.ibm.com/aix/efixes/security/openssl_fix42.tar","CVE-2024-4603:3.7 / CVE-2024-4741:8.1 / CVE-2024-5535:3.7","no" "sec","aix","cURL","AIX is vulnerable to security restrictions bypass due to curl","2466ma / 46218ma / curl7791mb / curl812sa / curl7791a / 32221a / CVE-2022-32221","See Bulletin","32221a.230524.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/curl_advisory.asc","oss.lib.libcurl:7.79.1.0-7.79.1.0","20230526"," ","","https://aix.software.ibm.com/aix/efixes/security/curl_fix.tar","CVE-2022-32221:8.2","no" "sec","aix","cURL","Multiple vulnerabilities cURL libcurl affect AIX","2466ma / 46218ma / curl7791mb / curl812sa / curl7791a / CVE-2022-27782 / CVE-2022-32206 / CVE-2022-43551 / CVE-2022-43552 / CVE-2023-23916 / CVE-2023-27533 / CVE-2023-27534 / CVE-2023-27535 / CVE-2023-27536 / CVE-2023-27537 / CVE-2023-27538","See Bulletin","curl7791a.230622.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/curl_advisory2.asc","oss.lib.libcurl:7.79.1.0-7.79.1.0","20230629"," ","","https://aix.software.ibm.com/aix/efixes/security/curl_fix2.tar","CVE-2022-27782:9.8 / CVE-2022-32206:4.3 / CVE-2022-43551:7.5 / CVE-2022-43552:5.9 / CVE-2023-23916:7.5 / CVE-2023-27533:8.2 / CVE-2023-27534:7.5 / CVE-2023-27535:5.9 / CVE-2023-27536:5.9 / CVE-2023-27537:7.5 / CVE-2023-27538:4.0","no" "sec","aix","cURL","Multiple vulnerabilities in cURL libcurl affect AIX","2466ma / 46218ma / curl7791mb / curl812sa / CVE-2023-38545 / CVE-2023-38546","See Bulletin","curl7791mb.231120.epkg.Z curl812sa.231120.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/curl_advisory3.asc","oss.lib.libcurl:7.79.1.0-7.79.1.0 oss.lib.libcurl:8.1.2.0-8.1.2.0","20231212"," ","","https://aix.software.ibm.com/aix/efixes/security/curl_fix3.tar","CVE-2023-38545:8.1 / CVE-2023-38546:3.7","no" "sec","aix","cURL","AIX is vulnerable to security restrictions bypass due to cURL libcurl (CVE-2023-46218)","2466ma / 46218ma / CVE-2023-46218","See Bulletin","46218ma.240227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/curl_advisory4.asc","oss.lib.libcurl:7.79.1.0-7.79.1.0 oss.lib.libcurl:8.1.2.0-8.1.2.0","20240306"," ","","https://aix.software.ibm.com/aix/efixes/security/curl_fix4.tar","CVE-2023-46218:6.5","no" "sec","aix","cURL","AIX is vulnerable to security restrictions bypass due to cURL libcurl (CVE-2024-0853)","2466ma / 853sa / CVE-2024-0853","See Bulletin","853sa.240503.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/curl_advisory5.asc","oss.lib.libcurl:8.5.0.0-8.5.0.0","20240620"," ","","https://aix.software.ibm.com/aix/efixes/security/curl_fix5.tar","CVE-2024-0853:3.8","no" "sec","aix","cURL","AIX is vulnerable to a denial of service (CVE-2024-2398) and security restrictions bypass (CVE-2024-2466 CVE-2024-2004) due to cURL libcurl","2466ma / CVE-2024-2004 / CVE-2024-2398 / CVE-2024-2466","See Bulletin","2466ma.240719.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/curl_advisory6.asc","oss.lib.libcurl:7.79.1.0-7.79.1.0 oss.lib.libcurl:8.1.2.0-8.1.2.0 oss.lib.libcurl:8.5.0.0-8.5.0.0","20240820"," ","","https://aix.software.ibm.com/aix/efixes/security/curl_fix6.tar","CVE-2024-2004:3.7 / CVE-2024-2398:5.3 / CVE-2024-2466:5.3","no" "sec","aix","OpenSSL","AIX is vulnerable to a denial of service (CVE-2024-6119) due to OpenSSL","3013ma / CVE-2024-6119","See Bulletin","3013ma.240923.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory43.asc","openssl.base:3.0.5.101-3.0.13.1000","20240930"," ","","https://aix.software.ibm.com/aix/efixes/security/openssl_fix43.tar","CVE-2024-6119:5.3","no" "sec","aix","OpenSSH","AIX is vulnerable to unauthorized file access and arbitrary code execution due to OpenSSH","38408m9a / 38408m9b / 38408m9c / 81112ma / 92112ma / CVE-2023-38408 / CVE-2023-40371","See Bulletin","38408m9a.230811.epkg.Z 38408m9b.230811.epkg.Z 38408m9c.230811.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory15.asc","openssh.base.client:8.1.102.0-8.1.102.2106 openssh.base.server:8.1.102.0-8.1.102.2106 openssh.base.client:8.1.112.0-8.1.112.2000 openssh.base.server:8.1.112.0-8.1.112.2000 openssh.base.client:9.2.112.0-9.2.112.2000 openssh.base.server:9.2.112.0-9.2.112.2000","20230823"," ","","https://aix.software.ibm.com/aix/efixes/security/openssh_fix15.tar","CVE-2023-38408:8.1 / CVE-2023-40371:6.2","no" "sec","aix","OpenSSH","AIX is vulnerable to a machine-in-the-middle attack (CVE-2023-48795) arbitrary command execution (CVE-2023-51385) and information disclosure (CVE-2023-51384) due to OpenSSH","81112ma / 92112ma / CVE-2023-48795 / CVE-2023-51384 / CVE-2023-51385","See Bulletin","81112ma.240224.epkg.Z 92112ma.240223.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory16.asc","openssh.base.client:8.1.112.0-8.1.112.2200 openssh.base.server:8.1.112.0-8.1.112.2200 openssh.base.client:9.2.112.0-9.2.112.2200 openssh.base.server:9.2.112.0-9.2.112.2200","20240228"," ","","https://aix.software.ibm.com/aix/efixes/security/openssh_fix16.tar","CVE-2023-48795:5.9 / CVE-2023-51384:4.4 / CVE-2023-51385:9.8","no" "sec","aix","OpenSSH","AIX is vulnerable to arbitrary code execution (CVE-2024-6387) due to OpenSSH","9211224a / CVE-2024-6387","See Bulletin","9211224a.240708.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory17.asc","openssh.base.client:9.2.112.0-9.2.112.2400 openssh.base.server:9.2.112.0-9.2.112.2400","20240709"," ","","https://aix.software.ibm.com/aix/efixes/security/openssh_fix17.tar","CVE-2024-6387:8.1","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerability in AIX bind","CVE-2006-0987 / IV62327","interim fix only","IV62327m9a.140709.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc","bos.net.tcp.server:5.3.12.0-5.3.12.6","20140815"," ","5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027","ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar","CVE-2006-0987:5","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05","Vulnerability in AIX bind","CVE-2006-0987 / IV62146","6100-08-06","IV62146m4a.140709.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc","bos.net.tcp.server:6.1.8.0-6.1.8.17","20140815"," ","5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027","https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar","CVE-2006-0987:5","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05","Vulnerability in AIX bind","CVE-2006-0987 / IV61090","7100-02-06","IV61090s4a.140603.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc","bos.net.tcp.server:7.1.2.0-7.1.2.17","20140815"," ","5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027","https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar","CVE-2006-0987:5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03","Vulnerability in AIX bind","CVE-2006-0987 / IV61027","7100-03-04","IV61027s3a.140611.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc","bos.net.tcp.server:7.1.3.0-7.1.3.15","20140815","20150822","5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027","https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar","CVE-2006-0987:5","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09","Vulnerability in AIX bind","CVE-2006-0987 / IV62224","interim fix only","IV62224m9a.140709.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc","bos.net.tcp.server:6.1.7.0-6.1.7.20","20140815"," ","5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027","https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar","CVE-2006-0987:5","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09","Vulnerability in AIX bind","CVE-2006-0987 / IV61093","interim fix only","IV61093s9a.140603.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc","bos.net.tcp.server:7.1.1.0-7.1.1.20","20140815"," ","5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027","https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar","CVE-2006-0987:5","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5","Vulnerability in VIOS bind","CVE-2006-0987","2.2.2.6","IV62146m4a.140709.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc","bos.net.tcp.server:6.1.8.0-6.1.8.17","20140815"," ","5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027","https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar","CVE-2006-0987:5","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3","Vulnerability in VIOS bind","CVE-2006-0987","2.2.3.4","IV62225m3a.140708.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc","bos.net.tcp.server:6.1.9.0-6.1.9.3","20140815"," ","5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027","https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar","CVE-2006-0987:5","no" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8","Vulnerability in VIOS bind","CVE-2006-0987","interim fix only","IV62224m9a.140709.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc","bos.net.tcp.server:6.1.7.0-6.1.7.20","20140815"," ","5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027","https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar","CVE-2006-0987:5","no" "sec","aix","Openssh","AIX OpenSSH Vulnerability","CVE-2010-5107","See advisory","OpenSSH_6.0.0.6102.tar.Z DEPRECATED::6201_mfix","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory2.asc","openssh.base.server:6.0.0.0-6.0.0.6101","20130408","20130802","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2010-5107:5.0","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","AIX OpenSSL Vulnerability","CVE-2010-5298","Openssl-1.0.1.503","openssl-1.0.1.503.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory8.asc","openssl.base:1.0.1.500-1.0.1.502","20140606"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2010-5298:4","no" "sec","aix","Openssl","AIX OpenSSL Vulnerability","CVE-2010-5298","Openssl-1.0.1.503","openssl-1.0.1.503.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory8.asc","openssl.base:1.0.1.500-1.0.1.502","20140606"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2010-5298:4","no" "sec","aix","Openssl","Multiple OpenSSL vulnerabilities","CVE-2011-4108 / CVE-2011-4109 / CVE-2011-4576 / CVE-2011-4619","7100-02-00","openssl.0.9.8.1801.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc","openssl.base:0.9.8.0-0.9.8.1800 openssl.base:12.9.8.0-12.9.8.1800","20120321","20120605","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2011-4108:4.3 / CVE-2011-4109:9.3 / CVE-2011-4576:5.0 / CVE-2011-4619:5.0","no" "sec","aix","openssl","Multiple OpenSSL vulnerabilities","CVE-2012-0884 / CVE-2012-1165 / CVE-2012-2110 / CVE-2012-2131 / CVE-2012-2333","See advisory","openssl-0.9.8.1802.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory4.asc","openssl.base:0.9.8.0-0.9.8.1801 openssl.base:12.9.8.0-12.9.8.1801","20120801"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2012-0884:5.0 / CVE-2012-1165:5.0 / CVE-2012-2110:7.5 / CVE-2012-2131:7.5 / CVE-2012-2333:6.8","no" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8 :: 2.2.1.9","Arbitary file overwrite symlink in libodm","CVE-2012-2179","2.2.1.10","IV60313s9a.140515.epkg.Z","https://www.ibm.com/support/pages/node/5740875","bos.rte.odm:6.1.7.0-6.1.7.15","20120614"," ","6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303","https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar","CVE-2012-2179:6.9","yes" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4","Arbitary file overwrite symlink in libodm","CVE-2012-2179","2.2.2.5","IV60311s4a.140515.epkg.Z","https://www.ibm.com/support/pages/node/5740875","bos.rte.odm:6.1.8.0","20120614"," ","6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303","https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar","CVE-2012-2179:6.9","yes" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2","Arbitary file overwrite symlink in libodm","CVE-2012-2179","2.2.3.3","IV60299s2a.140515.epkg.Z","https://www.ibm.com/support/pages/node/5740875","bos.rte.odm:6.1.9.0","20120614"," ","6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303","https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar","CVE-2012-2179:6.9","yes" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4","Vulnerability in use of socketpair","CVE-2012-2192","2.2.1.5","IV21128s04.VIOS2214.120531.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair","bos.mp64:6.1.7.0-6.1.7.3","20120605"," ","6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357","https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar","CVE-2012-2192:4.9","yes" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3","VIOS NFSv4 vulnerability","CVE-2012-4817","2.2.1.4","n/a","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201209/SECURITY/20120913/datafile151835&label=VIOS%20NFSv4%20Vulnerability%20CVE-2012-4817","bos.net.nfs.client:6.1.7.0-6.1.7.2","20120913"," ","6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357","https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar","CVE-2012-4817:5","yes" "sec","aix","Openssl","Multiple OpenSSL vulnerabilities","CVE-2013-0169 / CVE-2013-0166","See advisory","openssl-0.9.8.2500.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory5.asc","openssl.base:0.9.8.0-0.9.8.2400 openssl.base:12.9.8.0-12.9.8.2400","20130315","20130605","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2013-0169:4.3 / CVE-2013-0166:5.0","no" "sec","aix","Openssl","Multiple OpenSSL vulnerabilities","CVE-2013-4353 / CVE-2013-6450 / CVE-2013-6449","7100-04-00","openssl-1.0.1.501.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory6.asc","openssl.base:1.0.1.500","20140225","20140303","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2013-4353:5 / CVE-2013-6450:4.3 / CVE-2013-6449:4.3","no" "sec","aix","Openssh","AIX OpenSSH Vulnerability","CVE-2013-4548","7100-04-00","OpenSSH_6.0.0.6104.tar.Z DEPRECATED::6201_mfix","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory3.asc","openssh.base.server:6.0.0.6103","20140221","20140416","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2013-4548:6.0","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / IV58413","6100-07-10","IV58413s9a.140421.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","bos.net.tcp.client:6.1.7.0-6.1.7.20 ntp.rte:6.1.6.0-6.1.6.1","20140612"," ","5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324","https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar","CVE-2013-5211:5.0","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / IV58068","6100-08-05","IV58068s4a.140421.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","bos.net.tcp.client:6.1.8.0-6.1.8.17 ntp.rte:6.1.6.0-6.1.6.1","20140612"," ","5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324","https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar","CVE-2013-5211:5.0","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / IV56213","6100-09-03","IV56213s1a.140421.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.1 ntp.rte:6.1.6.0-6.1.6.1","20140612"," ","5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324","https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar","CVE-2013-5211:5.0","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / IV56573","7100-01-10","IV56575s9a.140421.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","bos.net.tcp.client:7.1.1.0-7.1.1.20 ntp.rte:7.1.0.0-7.1.0.1","20140612"," ","5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324","https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar","CVE-2013-5211:5.0","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / IV55365","7100-02-05","IV55365s4a.140421.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","bos.net.tcp.client:7.1.2.0-7.1.2.17 ntp.rte:7.1.0.0-7.1.0.1","20140612"," ","5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324","https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar","CVE-2013-5211:5.0","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / IV56324","7100-03-03","IV56324s2a.140522.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","bos.net.tcp.client:7.1.3.0-7.1.3.2 ntp.rte:7.1.0.0-7.1.0.1","20140612"," ","5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324","https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar","CVE-2013-5211:5.0","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / IV59636","interim fix only","IV59636s9a.140423.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10 ntp.rte:6.1.6.0-6.1.6.1","20140612"," ","5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324","https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar","CVE-2013-5211:5.0","no" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8","Network Time Protocol (NTP) vulnerability in VIOS","CVE-2013-5211 / IV58413","2.2.1.9","IV58413s9a.140421.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","bos.net.tcp.client:6.1.7.0-6.1.7.20 ntp.rte:6.1.6.0-6.1.6.1","20140612"," ","5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324","https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar","CVE-2013-5211:5.0","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4","Network Time Protocol (NTP) vulnerability in VIOS","CVE-2013-5211 / IV58068","2.2.2.5","IV58068s4a.140421.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","bos.net.tcp.client:6.1.8.0-6.1.8.17 ntp.rte:6.1.6.0-6.1.6.1","20140612"," ","5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324","https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar","CVE-2013-5211:5.0","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2","Network Time Protocol (NTP) vulnerability in VIOS","CVE-2013-5211 / IV56213","2.2.3.3","IV56213s1a.140421.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.1 ntp.rte:6.1.6.0-6.1.6.1","20140612"," ","5300-12:IV59636 6100-07:IV58413 6100-08:IV58068 6100-09:IV56213 7100-01:IV56575 7100-02:IV55365 7100-03:IV56324","https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar","CVE-2013-5211:5.0","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295","6100-08-07","IV68426m5b.150204.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc","bos.net.tcp.client:6.1.8.0-6.1.8.18 ntp.rte:6.1.6.0-6.1.6.2","20150210"," ","5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430","https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar","CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295","6100-09-05","IV68428s4a.150109.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc","bos.net.tcp.client:6.1.9.0-6.1.9.30 ntp.rte:6.1.6.0-6.1.6.2","20150210"," ","5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430","https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar","CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295","7100-02-07","IV68429m5b.150204.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc","bos.net.tcp.client:7.1.2.0-7.1.2.18 ntp.rte:7.1.0.0-7.1.0.2","20150210"," ","5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430","https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar","CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295","7100-03-05","IV68430s4a.150109.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc","bos.net.tcp.client:7.1.3.0-7.1.3.30 ntp.rte:7.1.0.0-7.1.0.2","20150210"," ","5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430","https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar","CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Network Time Protocol (NTP) vulnerability in AIX","CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295","N/A","IV68427m9a.150203.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20150210"," ","5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430","ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar","CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6","Network Time Protocol (NTP) vulnerability in VIOS","CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295","2.2.2.7","IV68426m5b.150204.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc","bos.net.tcp.client:6.1.8.0-6.1.8.18 ntp.rte:6.1.6.0-6.1.6.2","20150210"," ","5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430","https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar","CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4","Network Time Protocol (NTP) vulnerability in VIOS","CVE-2013-5211 / CVE-2014-9294 / CVE-2014-9295","2.2.3.5","IV68428s4a.150109.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc","bos.net.tcp.client:6.1.9.0-6.1.9.30 ntp.rte:6.1.6.0-6.1.6.2","20150210"," ","5300-12:IV68427 6100-08:IV68426 6100-09:IV68428 7100-02:IV68429 7100-03:IV68430","https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar","CVE-2014-9293:5.0 / CVE-2014-9294:5.0 / CVE-2014-9295:7.5","no" "sec","aix","Java","Multiple Java vulnerabilities","CVE-2013-5456 / CVE-2013-5457 / CVE-2013-5458 / CVE-2013-4041 / CVE-2013-5375 / CVE-2013-5372 / CVE-2013-5843 / CVE-2013-5789 / CVE-2013-5830 / CVE-2013-5829 / CVE-2013-5787 / CVE-2013-5788 / CVE-2013-5824 / CVE-2013-5842 / CVE-2013-5782 / CVE-2013-5817 / CVE-2013-5809 / CVE-2013-5814 / CVE-2013-5832 / CVE-2013-5850 / CVE-2013-5838 / CVE-2013-5802 / CVE-2013-5812 / CVE-2013-5804 / CVE-2013-5783 / CVE-2013-3829 / CVE-2013-5823 / CVE-2013-5831 / CVE-2013-5820 / CVE-2013-5819 / CVE-2013-5818 / CVE-2013-5848 / CVE-2013-5776 / CVE-2013-5774 / CVE-2013-5825 / CVE-2013-5840 / CVE-2013-5801 / CVE-2013-5778 / CVE-2013-5851 / CVE-2013-5800 / CVE-2013-5784 / CVE-2013-5849 / CVE-2013-5790 / CVE-2013-5780 / CVE-2013-5797 / CVE-2013-5803 / CVE-2013-5772","See advisory","see advisory","https://aix.software.ibm.com/aix/efixes/security/java_advisory.asc","Java5:5.0.0.0-5.0.0.560 Java6:6.0.0.0-6.0.0.435 Java7:7.0.0.0-7.0.0.110","20131211","20140203","n/a","see advisory","CVE-2013-5456:9.3 / CVE-2013-5457:9.3 / CVE-2013-5458:9.3 / CVE-2013-4041:6.8 / CVE-2013-5375:4.3 / CVE-2013-5372:4.3 / CVE-2013-5843:10 / CVE-2013-5789:10 / CVE-2013-5830:10 / CVE-2013-5829:10 / CVE-2013-5787:10 / CVE-2013-5788:10 / CVE-2013-5824:10 / CVE-2013-5842:10 / CVE-2013-5782:10 / CVE-2013-5817:10 / CVE-2013-5809:10 / CVE-2013-5814:10 / CVE-2013-5832:9.3 / CVE-2013-5850:9.3 / CVE-2013-5838:9.3 / CVE-2013-5802:7.5 / CVE-2013-5812:6.4 / CVE-2013-5804:6.4 / CVE-2013-5783:6.4 / CVE-2013-3829:6.4 / CVE-2013-5823:5 / CVE-2013-5831:5 / CVE-2013-5820:5 / CVE-2013-5819:5 / CVE-2013-5818:5 / CVE-2013-5848:5 / CVE-2013-5776:5 / CVE-2013-5774:5 / CVE-2013-5825:5 / CVE-2013-5840:5 / CVE-2013-5801:5 / CVE-2013-5778:5 / CVE-2013-5851:5 / CVE-2013-5800:4.3 / CVE-2013-5784:4.3 / CVE-2013-5849:4.3 ","no" "sec","aix","Openssl","Openssl Heartbleed vulnerability","CVE-2014-0160","Openssl-1.0.1.502","Openssl-1.0.1.502","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory7.doc","openssl.base:1.0.1.500-1.0.1.501","20140410","20140415","n/a","https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=aixbp&lang=en_US&S_PKG=openssl&cp=UTF-8","CVE-2014-0160:5.0 / CVE-2014-0076:2.1","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03","Vulnerability in AIX bind","CVE-2014-0191 / IV62225","6100-09-04","IV62225m3a.140708.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc","bos.net.tcp.server:6.1.9.0-6.1.9.3","20140815"," ","5300-12:IV62327 6100-07:IV62224 6100-08:IV62146 6100-09:IV62225 7100-01:IV61093 7100-02:IV61090 7100-03:IV61027","https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar","CVE-2006-0987:5","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04","AIX libxml2 vulnerability","CVE-2014-0191 / IV62447","6100-08-05","IV62447s4a.140715.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc","bos.rte.control:6.1.8.0-6.1.8.17","20140815"," ","6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar","CVE-2014-0191:5.0","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03","AIX libxml2 vulnerability","CVE-2014-0191 / IV62448","6100-09-04","IV62448s3a.140715.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc","bos.rte.control:6.1.9.0-6.1.9.15","20140815"," ","6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar","CVE-2014-0191:5.0","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04","AIX libxml2 vulnerability","CVE-2014-0191 / IV62449","7100-02-05","IV62449s4a.140715.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc","bos.rte.control:7.1.2.0-7.1.2.17","20140815"," ","6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar","CVE-2014-0191:5.0","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03","AIX libxml2 vulnerability","CVE-2014-0191 / IV62450","7100-03-04","IV62450s3a.140715.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc","bos.rte.control:7.1.3.0-7.1.3.15","20140815"," ","6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar","CVE-2014-0191:5.0","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4","VIOS libxml2 vulnerability","CVE-2014-0191","2.2.2.5","IV62447s4a.140715.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc","bos.rte.control:6.1.8.0-6.1.8.17","20140815"," ","6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar","CVE-2014-0191:5.0","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3","VIOS libxml2 vulnerability","CVE-2014-0191","2.3.3.4","IV62448s3a.140715.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc","bos.rte.control:6.1.9.0-6.1.9.15","20140815"," ","6100-08:IV62447 6100-09:IV62448 7100-02:IV62449 7100-03:IV62450","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar","CVE-2014-0191:5.0","no" "sec","aix","Openssl","AIX OpenSSL Vulnerabilities (Multiple CVEs)","CVE-2014-0224 / CVE-2014-0221 / CVE-2014-0195 / CVE-2014-0198 / CVE-2014-3470","Openssl-1.0.1.511 openssl-0.9.8.2502 openssl-12.9.8.2502","openssl-1.0.1.511.tar.Z / openssl-0.9.8.2502.tar.Z / openssl-12.9.8.2502.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc","openssl.base:1.0.1.500-1.0.1.510 openssl.base:0.9.8.401-0.9.8.2501 openssl.base:12.9.8.1100-12.9.8.2501","20140611"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2014-0224:5.8 / CVE-2014-0221:4.3 / CVE-2014-0195:7.5 / CVE-2014-0198:4.3 / CVE-2014-3470:4.3","no" "sec","aix","Java","AIX Java Multiple Vulnerabilities (Oracle Java 2014 CPU)","CVE-2014-0428 / CVE-2014-0422 / CVE-2013-5907 / CVE-2014-0415 / CVE-2014-0410 / CVE-2013-5889 / CVE-2014-0417 / CVE-2014-0387 / CVE-2014-0424 / CVE-2013-5878 / CVE-2014-0373 / CVE-2014-0375 / CVE-2014-0403 / CVE-2014-0423 / CVE-2014-0376 / CVE-2013-5910 / CVE-2013-5884 / CVE-2013-5896 / CVE-2013-5899 / CVE-2014-0416 / CVE-2013-5887 / CVE-2014-0368 / CVE-2013-5888 / CVE-2013-5898 / CVE-2014-0411","See advisory","see advisory","https://aix.software.ibm.com/aix/efixes/security/java_jan2014_advisory.asc","Java5:5.0.0.0-5.0.0.559 Java6:6.0.0.0-6.0.0.434 Java7:7.0.0.0-7.0.0.109","20140306"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=dka&S_PKG=aix64j7b&S_TACT=105AGX05&S_CMP=JDK","CVE-2014-0428:10 / CVE-2014-0422:10 / CVE-2013-5907:10 / CVE-2014-0415:10 / CVE-2014-0410:10 / CVE-2013-5889:9.3 / CVE-2014-0417:9.3 / CVE-2014-0387:7.6 / CVE-2014-0424:7.5 / CVE-2013-5878:7.5 / CVE-2014-0373:7.5 / CVE-2014-0375:5.8 / CVE-2014-0403:5.8 / CVE-2014-0423:5.5 / CVE-2014-0376:5 / CVE-2013-5910:5 / CVE-2013-5884:5 / CVE-2013-5896:5 / CVE-2013-5899:5 / CVE-2014-0416:5 / CVE-2013-5887:5 / CVE-2014-0368:5 / CVE-2013-5888:4.6 / CVE-2013-5898:4 / CVE-2014-0411:4","no" "sec","aix","Java","Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition","CVE-2014-0457 / CVE-2014-2421 / CVE-2014-0429 / CVE-2014-0461 / CVE-2014-0455 / CVE-2014-2428 / CVE-2014-0448 / CVE-2014-0454 / CVE-2014-0446 / CVE-2014-0452 / CVE-2014-0451 / CVE-2014-2402 / CVE-2014-2423 / CVE-2014-2427 / CVE-2014-0458 / CVE-2014-2414 / CVE-2014-2412 / CVE-2014-2409 / CVE-2014-0460 / CVE-2013-6954 / CVE-2013-6629 / CVE-2014-2401 / CVE-2014-0449 / CVE-2014-0459 / CVE-2014-0453 / CVE-2014-2398 / CVE-2014-1876 / CVE-2014-2420 / CVE-2014-0878","See advisory","see advisory","https://aix.software.ibm.com/aix/efixes/security/java_apr2014_advisory.asc","Java5:5.0.0.0-5.0.0.575 Java6:6.0.0.0-6.0.0.455 Java7:7.0.0.0-7.0.0.130 Java7:7.1.0.0-7.1.0.10","20140619"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=dka","CVE-2014-0457:10 / CVE-2014-2421:10 / CVE-2014-0429:10 / CVE-2014-0461:9.3 / CVE-2014-0455:9.3 / CVE-2014-2428:7.6 / CVE-2014-0448:7.6 / CVE-2014-0454:7.5 / CVE-2014-0446:7.5 / CVE-2014-0452:7.5 / CVE-2014-0451:7.5 / CVE-2014-2402:7.5 / CVE-2014-2423:7.5 / CVE-2014-2427:7.5 / CVE-2014-0458:7.5 / CVE-2014-2414:7.5 / CVE-2014-2412:7.5 / CVE-2014-2409:6.4 / CVE-2014-0460:5.8 / CVE-2013-6954:5 / CVE-2013-6629:5 / CVE-2014-2401:5 / CVE-2014-0449:5 / CVE-2014-0459:4.3 / CVE-2014-0453:4 / CVE-2014-2398:3.5 / CVE-2014-1876:2.6 / CVE-2014-2420:2.6 / CVE-2014-0878:5.8","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","AIX OpenSSH Vulnerability","CVE-2014-2532 / CVE-2014-2653","Openssh-6.0.0.6107","OpenSSH_6.0.0.6107.tar.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3619&myns=pwraix71&mync=E","openssh.base:4.0.0.5200-6.0.0.6106","20140617"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2014-2532:5 / CVE-2014-2653:4.3","no" "sec","aix","Openssh","AIX OpenSSH Vulnerability","CVE-2014-2532 / CVE-2014-2653","Openssh-6.0.0.6107","OpenSSH_6.0.0.6107.tar.Z DEPRECATED::6201_mfix","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc","openssh.base:4.0.0.5200-6.0.0.6106","20140617"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2014-2532:5 / CVE-2014-2653:4.3","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","AIX Malloc vulnerability","CVE-2014-3074 / IV62812","interim fix only","IV62812s9a.140728.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc","bos.rte.libc:5.3.12.0-5.3.12.9","20140630","20150311","5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808","https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar","CVE-2014-3074:7.2","yes" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09","AIX Malloc vulnerability","CVE-2014-3074 / IV62802","6100-07-10","IV62802s9a.140730.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc","bos.rte.libc:6.1.7.0-6.1.7.20","20140630","20150311","5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808","https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar","CVE-2014-3074:7.2","yes" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05","AIX Malloc vulnerability","CVE-2014-3074 / IV62803","6100-08-06","IV62803s4a.140730.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc","bos.rte.libc:6.1.8.0-6.1.8.18","20140630","20150311","5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808","https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar","CVE-2014-3074:7.2","yes" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03","AIX Malloc vulnerability","CVE-2014-3074 / IV62805","6100-09-04","IV62805s3a.140731.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc","bos.rte.libc:6.1.9.0-6.1.9.15","20140630","20150311","5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808","https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar","CVE-2014-3074:7.2","yes" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09","AIX Malloc vulnerability","CVE-2014-3074 / IV62806","7100-01-10","IV62806s9a.140730.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc","bos.rte.libc:7.1.1.0-7.1.1.20","20140630","20150311","5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808","https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar","CVE-2014-3074:7.2","yes" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05","AIX Malloc vulnerability","CVE-2014-3074 / IV62807","7100-02-06","IV62807s4a.140730.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc","bos.rte.libc:7.1.2.0-7.1.2.18","20140630","20150310","5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808","https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar","CVE-2014-3074:7.2","yes" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03","AIX Malloc vulnerability","CVE-2014-3074 / IV62808","7100-03-04","IV62808s3a.140731.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc","bos.rte.libc:7.1.3.0-7.1.3.15","20140630","20150311","5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808","https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar","CVE-2014-3074:7.2","yes" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8","VIOS Malloc vulnerability","CVE-2014-3074 / IV62802","2.2.1.9","IV62802s9a.140730.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc","bos.rte.libc:6.1.7.0-6.1.7.20","20140630","20150311","6100-07:IV61313 6100-08:IV61311 6100-09:IV60935 7100-01:IV61315 7100-02:IV61314 7100-03:IV60940","https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar","CVE-2014-3074:7.2","yes" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4","VIOS Malloc vulnerability","CVE-2014-3074 / IV62803","2.2.2.5","IV62803s4a.140730.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc","bos.rte.libc:6.1.8.0-6.1.8.18","20140630","20150311","5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808","https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar","CVE-2014-3074:7.2","yes" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3","VIOS Malloc vulnerability","CVE-2014-3074 / IV62805","2.2.3.4","IV62805s3a.140731.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc","bos.rte.libc:6.1.9.0-6.1.9.15","20140630","20150311","5300-12:IV62812 6100-07:IV62802 6100-08:IV62803 6100-09:IV62805 7100-01:IV62806 7100-02:IV62807 7100-03:IV62808","https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar","CVE-2014-3074:7.2","yes" "sec","aix","Openssl","AIX OpenSSL Denial of Service due to double free and others","CVE-2014-3505 / CVE-2014-3506 / CVE-2014-3507 / CVE-2014-3508 / CVE-2014-3509 / CVE-2014-3510 / CVE-2014-3511 / CVE-2014-3512 / CVE-2014-5139","See advisory","101_fix.140902.epkg.Z 098_fix.140902.epkg.Z 1298_fix.140902.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc","openssl.base:1.0.1.500-1.0.1.511 openssl.base:0.9.8.401-0.9.8.2502 openssl.base:12.9.8.1100-12.9.8.2502","20140909"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix10.tar","CVE-2014-3505:5 / CVE-2014-3506:5 / CVE-2014-3507:5 / CVE-2014-3508:4.3 / CVE-2014-3509:4.3 / CVE-2014-3510:4.3 / CVE-2014-3511:4.3 / CVE-2014-3512:5 / CVE-2014-5139:5","no" "sec","aix","Openssl","AIX OpenSSL Denial of Service due to memory leak in DTLS / AIX OpenSSL Patch to mitigate CVE-2014-3566 / AIX OpenSSL Denial of Service due to memory consumption","CVE-2014-3513 / CVE-2014-3566 / CVE-2014-3567","See advisory","IV66250s9a.141027.epkg.Z IV66250s9b.141027.epkg.Z IV66250s9c.141027.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc","openssl.base:1.0.1.500-1.0.1.512 openssl.base:0.9.8.401-0.9.8.2503 openssl.base:12.9.8.1100-12.9.8.2503","20141029"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix11.tar","CVE-2014-3513:5 / CVE-2014-3566:4.3 / CVE-2014-3567:5","no" "sec","aix","Tivoli Directory Server","A security vulnerability has been identified in IBM Tivoli Directory Server shipped with AIX/VIOS","CVE-2014-3566","See advisory","See advisory","http://www-01.ibm.com/support/docview.wss?uid=swg21687611","Idsldap.*:6.0:6.1:6.2:6.3:6.3.1","20141021"," ","n/a","n/a","CVE-2014-3566:4.3","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","Vulnerability in SSLv3 affects AIX","CVE-2014-3566 / IV69768","6100-08-07","IV69768s6a.150515.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc","bos.net.tcp.server:6.1.0.0-6.1.8.18 bos.net.tcp.client:6.1.0.0-6.1.8.19","20150617","20150626","6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar","CVE-2014-3566:4.3","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05","Vulnerability in SSLv3 affects AIX","CVE-2014-3566 / IV73324","6100-09-06","IV73324s5a.150515.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc","bos.net.tcp.server:6.1.0.0-6.1.9.45 bos.net.tcp.client:6.1.0.0-6.1.9.48","20150617","20150626","6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar","CVE-2014-3566:4.3","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","Vulnerability in SSLv3 affects AIX","CVE-2014-3566 / IV73319","7100-03-06","IV73319s6a.150515.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc","bos.net.tcp.server:7.1.3.0-7.1.2.18 bos.net.tcp.client:7.1.3.0-7.1.2.19","20150617","20150626","6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar","CVE-2014-3566:4.3","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05","Vulnerability in SSLv3 affects AIX","CVE-2014-3566 / IV73316","7100-03-06","IV73316s5a.150515.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc","bos.net.tcp.server:7.1.3.0-7.1.3.45 bos.net.tcp.client:7.1.3.0-7.1.3.48","20150617","20150626","6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar","CVE-2014-3566:4.3","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6","Vulnerability in SSLv3 affects VIOS","CVE-2014-3566 / IV69768","2.2.2.7","IV69768s6a.150515.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc","bos.net.tcp.server:6.1.0.0-6.1.8.18 bos.net.tcp.client:6.1.0.0-6.1.8.19","20150617","20150618","6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar","CVE-2014-3566:4.3","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50","Vulnerability in SSLv3 affects VIOS","CVE-2014-3566 / IV73324","2.2.3.60","IV73324s5a.150515.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc","bos.net.tcp.server:6.1.9.0-6.1.9.45 bos.net.tcp.client:6.1.9.0-6.1.9.48","20150617","20150618","6100-08:IV69768 6100-09:IV73324 7100-02:IV73319 7100-03:IV73316","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar","CVE-2014-3566:4.3","no" "sec","aix","Openssl","Multiple Security vulnerabilities in AIX OpenSSL","CVE-2014-3570 / CVE-2014-3571 / CVE-2014-3572 / CVE-2014-8275 / CVE-2015-0204 / CVE-2015-0205 / CVE-2015-0206","See advisory","IV69033s9a.150129.epkg.Z / IV69033s9b.150129.epkg.Z / IV69033s9c.150129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory12.asc","openssl.base:0.9.8.401-0.9.8.2504 openssl.base:1.0.1.500-1.0.1.513 openssl.base:12.9.8.1100-12.9.8.2504","20150204"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix12.tar","CVE-2014-3570:2.6 / CVE-2014-3571:5 / CVE-2014-3572:1.2 / CVE-2014-8275:1.2 / CVE-2015-0204:1.2 / CVE-2015-0205:2.1 / CVE-2015-0206:5","no" "sec","aix","rsyslog","Open Source RSyslog vulnerability","CVE-2014-3634 / CVE-2014-3683","next level","IV66633s0a.141107.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rsyslog_advisory.asc","rsyslog.base:5.8.6.1-5.8.6.3","20141114"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/rsyslog_fix.tar","CVE-2014-3634:5.0 / CVE-2014-3683:5.0","no" "sec","aix","Java","Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition","CVE-2014-4227 / CVE-2014-4262 / CVE-2014-4219 / CVE-2014-4209 / CVE-2014-4220 / CVE-2014-4268 / CVE-2014-4218 / CVE-2014-4252 / CVE-2014-4266 / CVE-2014-4265 / CVE-2014-4221 / CVE-2014-4263 / CVE-2014-4244 / CVE-2014-4208 / CVE-2014-3086","See advisory","see advisory","https://aix.software.ibm.com/aix/efixes/security/java_jul2014_advisory.asc","Java5:5.0.0.0-5.0.0.579 Java6:6.0.0.0-6.0.0.459 Java7:7.0.0.0-7.0.0.134 Java7:7.1.0.0-7.1.0.14","20140818"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=dka","CVE-2014-4227:10 / CVE-2014-4262:9.3 / CVE-2014-4219:9.3 / CVE-2014-4209:6.4 / CVE-2014-4220:5 / CVE-2014-4268:5 / CVE-2014-4218:5 / CVE-2014-4252:5 / CVE-2014-4266:5 / CVE-2014-4265:5 / CVE-2014-4221:4.3 / CVE-2014-4263:4 / CVE-2014-4244:4 / CVE-2014-4208:2.6 / CVE-2014-3086:9.3","no" "sec","aix","Kerberos","Multiple Security vulnerabilities in IBM NAS","CVE-2014-4341 / CVE-2014-4343 / CVE-2014-4344","See advisory","1506_fix.140813.epkg.Z 1601_fix.140813.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc","krb5.server.rte:1.5.0.0-1.6.0.1 krb5.client.rte:1.5.0.0-1.6.0.1","20140828","20140905","n/a","https://aix.software.ibm.com/aix/efixes/security/nas1_fix.tar","CVE-2014-4341:5.0 / CVE-2014-4343:5.0 / CVE-2014-4344:5.0","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-10 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09 :: 7100-01-00 :: 7100-01-01 :: 7100-01-10 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09 :: 7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06 :: 7100-02-07 :: 7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08 :: 7100-03-09 :: 7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05 :: 7100-04-06 :: 7100-05-01 :: 7100-05-02","Vulnerabilities in NTP affect AIX","CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","See Bulletin","IJ06400s9a.180514.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","See Bulletin","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","aix","7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06 :: 7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04 :: 7200-02-01 :: 7200-02-02","Vulnerabilities in NTP affect AIX","CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","See Bulletin","IJ06400s9a.180514.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","See Bulletin","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","vios","2.2.0.10 :: 2.2.0.11 :: 2.2.0.12 :: 2.2.0.13 :: 2.2.1.1 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8 :: 2.2.1.9 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6 :: 2.2.2.70 :: 2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.51 :: 2.2.3.52 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80 :: 2.2.3.90 :: 2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23 :: 2.2.4.30 :: 2.2.4.40 :: 2.2.4.50 :: 2.2.4.60 :: 2.2.5.0 :: 2.2.5.10 :: 2.2.5.20 :: 2.2.5.30 :: 2.2.5.40 :: 2.2.6.10 :: 2.2.6.21","Vulnerabilities in NTP affect VIOS","CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","See Bulletin","IJ06400s9a.180514.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","See Bulletin","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","aix","Kerberos","AIX NAS vulnerability","CVE-2014-5351","next TL","NAS_1.X.0.X_aix_image.tar.Z","https://aix.software.ibm.com/aix/efixes/security/nas_advisory2.asc","krb5.client.rte:1.5.0.7-1.6.0.2 krb5.server.rte:1.5.0.7-1.6.0.2","20150120"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2014-5351:4","no" "sec","aix","AIX NAS (kerberos)","Multiple Security vulnerabilities in IBM NAS(kerberos)","CVE-2014-5352 / CVE-2014-5355 / CVE-2014-9421 / CVE-2014-9422 / CVE-2014-9423","See advisory","1507c_fix.150404.epkg.Z 1507s_fix.150407.epkg.Z 1602c_fix.150404.epkg.Z 1602s_fix.150404.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nas_advisory3.asc","krb5.client.rte:1.4.0.8-1.6.0.2 krb5.server.rte:1.4.0.8-1.6.0.2","20150521"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/nas3_fix.tar","CVE-2014-5352:9.0 / CVE-2014-5355:5.0 / CVE-2014-9421:9.0 / CVE-2014-9422:6.1 / CVE-2014-9423:5.0","no" "sec","aix","Java","Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition; issues in the Oracle October 2014 Critical Patch Update plus the POODLE SSLv3 vulnerability and","CVE-2014-6513 / CVE-2014-6503 / CVE-2014-6532 / CVE-2014-4288 / CVE-2014-6493 / CVE-2014-6492 / CVE-2014-6458 / CVE-2014-6466 / CVE-2014-6506 / CVE-2014-6476 / CVE-2014-6515 / CVE-2014-6511 / CVE-2014-6531 / CVE-2014-6512 / CVE-2014-6457 / CVE-2014-6527 / CVE-2014-6502 / CVE-2014-6558 / CVE-2014-3065 / CVE-2014-3566","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_oct2014_advisory.asc","Java5.sdk:<5.0.0.580 Java6.sdk:<6.0.0.460 Java7.sdk:<7.0.0.135 Java71.sdk:<7.1.0.15 Java5_64.sdk:<5.0.0.580 Java6_64.sdk:<6.0.0.460 Java7_64.sdk:<7.0.0.135 Java71_64.sdk:<7.1.0.15","20141026","20141114","n/a","https://www.ibm.com/developerworks/java/jdk/aix/service.html#levels","CVE-2014-6513:10 / CVE-2014-6503:9.3 / CVE-2014-6532:9.3 / CVE-2014-4288:7.6 / CVE-2014-6493:7.6 / CVE-2014-6492:7.6 / CVE-2014-6458:6.9 / CVE-2014-6466:6.9 / CVE-2014-6506:6.8 / CVE-2014-6476:5 / CVE-2014-6515:5 / CVE-2014-6511:5 / CVE-2014-6531:4.3 / CVE-2014-6512:4.3 / CVE-2014-6457:4 / CVE-2014-6527:2.6 / CVE-2014-6502:2.6 / CVE-2014-6558:2.6 / CVE-2014-3065:6 / CVE-2014-3566:4.3","no" "sec","aix","Java","Multiple vulnerabilities in current releases of IBM SDK Java Technology Edition; issues disclosed in the Oracle Feb 2015 Critical Patch Update vulnerability and two additional Vuln","CVE-2014-6549 / CVE-2015-0408 / CVE-2015-0412 / CVE-2015-0403 / CVE-2015-0406 / CVE-2015-0410 / CVE-2015-0407 / CVE-2015-0400 / CVE-2014-3566 / CVE-2014-6587 / CVE-2014-6593 / CVE-2014-6591 / CVE-2014-6585 / CVE-2014-8891","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_feb2015_advisory.asc","Java5.sdk:<5.0.0.590 Java6.sdk:<6.0.0.470 Java7.sdk:<7.0.0.195 Java71.sdk:<7.1.0.75 Java5_64.sdk:<5.0.0.590 Java6_64.sdk:<6.0.0.470 Java7_64.sdk:<7.0.0.195 Java71_64.sdk:<7.1.0.75","20150219"," ","n/a","See advisory","CVE-2014-6549:10 / CVE-2015-0408:10 / CVE-2015-0412:10 / CVE-2015-0403:6.9 / CVE-2015-0406:5.8 / CVE-2015-0407:5 / CVE-2015-0400:5 / CVE-2014-3566:4.3 / CVE-2014-6587:4.3 / CVE-2014-6593:4 / CVE-2014-6591:2.6 / CVE-2014-6585:2.6 / CVE-2014-8891:6.8","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerability in AIX bind","CVE-2014-8500 / CVE-2014-8500","N/A","IV68997m9a.150129.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10 bos.net.tcp.server:5.3.12.0-5.3.12.6","20150227"," ","5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996","ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar","CVE-2014-8500:7.80","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","Vulnerability in AIX bind","CVE-2014-8500 / CVE-2014-8500","6100-08-07","IV68993s6a.150129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc","bos.net.tcp.client:6.1.8.0-6.1.8.19 bos.net.tcp.server:6.1.8.0-6.1.8.18","20150227"," ","5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996","https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar","CVE-2014-8500:7.80","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04","Vulnerability in AIX bind","CVE-2014-8500 / CVE-2014-8500","6100-09-05","IV68994s4a.150129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc","bos.net.tcp.client:6.1.9.0-6.1.9.30 bos.net.tcp.server:6.1.9.0-6.1.9.30","20150227"," ","5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996","https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar","CVE-2014-8500:7.80","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","Vulnerability in AIX bind","CVE-2014-8500 / CVE-2014-8500","7100-02-07","IV68996s4a.150129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc","bos.net.tcp.client:7.1.3.0-7.1.3.30 bos.net.tcp.server:7.1.3.0-7.1.3.30","20150227"," ","5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996","https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar","CVE-2014-8500:7.80","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04","Vulnerability in AIX bind","CVE-2014-8500 / CVE-2014-8500","7100-03-05","IV68995s6a.150129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc","bos.net.tcp.client:7.1.2.0-7.1.2.19 bos.net.tcp.server:7.1.2.0-7.1.2.18","20150227"," ","5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996","https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar","CVE-2014-8500:7.80","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6","Vulnerability in VIOS bind","CVE-2014-8500 / CVE-2014-8500","2.2.2.7","IV68993s6a.150129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc","bos.net.tcp.client:6.1.8.0-6.1.8.19 bos.net.tcp.server:6.1.8.0-6.1.8.18","20150227"," ","5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996","https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar","CVE-2014-8500:7.80","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4","Vulnerability in VIOS bind","CVE-2014-8500 / CVE-2014-8500","2.2.3.5","IV68994s4a.150129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc","bos.net.tcp.client:6.1.9.0-6.1.9.30 bos.net.tcp.server:6.1.9.0-6.1.9.30","20150227"," ","5300-12:IV68997 6100-07:IV68994 6100-08:IV68993 7100-02:IV68995 7100-03:IV68996","https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar","CVE-2014-8500:7.80","no" "sec","aix","Tivoli Directory Server","Security TLS padding vulnerability affects IBM Tivoli/Security Directory Server","CVE-2014-8730","See advisory","See advisory","http://www-01.ibm.com/support/docview.wss?uid=swg21692906","ITDS","20150123"," ","n/a","http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent=Security%2BSystems&product=ibm/Tivoli/Tivoli+Directory+Server&release=6.0.0.73&platform=All&function=all","CVE-2014-8730:4.3","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","Vulnerability in AIX tcpdump","CVE-2014-8769 / IV68950","6100-08-07","IV68950s5a.150205.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc","bos.net.tcp.server:6.1.8.0-6.1.8.18","20150318"," ","6100-08:IV68950 6100-09:IV68992 7100-02:IV68951 7100-03:IV67588","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar","CVE-2014-8769:5.00","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04","Vulnerability in AIX tcpdump","CVE-2014-8769 / IV68992","6100-09-05","IV68992s4a.150204.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc","bos.net.tcp.server:6.1.9.0-6.1.9.30","20150318"," ","6100-08:IV68950 6100-09:IV68992 7100-02:IV68951 7100-03:IV67588","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar","CVE-2014-8769:5.00","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","Vulnerability in AIX tcpdump","CVE-2014-8769 / IV68951","7100-02-07","IV68951s5a.150205.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc","bos.net.tcp.server:7.1.2.0-7.1.2.18","20150318"," ","6100-08:IV68950 6100-09:IV68992 7100-02:IV68951 7100-03:IV67588","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar","CVE-2014-8769:5.00","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04","Vulnerability in AIX tcpdump","CVE-2014-8769 / IV67588","7100-03-05","IV67588s4a.150204.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc","bos.net.tcp.server:7.1.3.0-7.1.3.30","20150318"," ","6100-08:IV68950 6100-09:IV68992 7100-02:IV68951 7100-03:IV67588","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar","CVE-2014-8769:5.00","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","AIX cmdlvm vulnerability","CVE-2014-8904 / IV68082","6100-08-07","IV68082s5b.150122.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc","bos.rte.lvm:6.1.8.0-6.1.8.19","20150113","20150217","5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908","https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar","CVE-2014-8904:7.2","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04","AIX cmdlvm vulnerability","CVE-2014-8904 / IV67907","6100-09-05","IV67907s4b.150122.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc","bos.rte.lvm:6.1.9.0-6.1.9.30","20150113","20150217","5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908","https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar","CVE-2014-8904:7.2","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","AIX cmdlvm vulnerability","CVE-2014-8904 / IV68478","7100-02-07","IV68478s5b.150122.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc","bos.rte.lvm:7.1.2.0-7.1.2.18","20150113","20150217","5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908","https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar","CVE-2014-8904:7.2","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04","AIX cmdlvm vulnerability","CVE-2014-8904 / IV67908","7100-03-05","IV67908s4b.150122.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc","bos.rte.lvm:7.1.3.0-7.1.3.30","20150113","20150217","5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908","https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar","CVE-2014-8904:7.2","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","AIX cmdlvm vulnerability","CVE-2014-8904 / IV68070","N/A","IV68070s9b.150122.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc","bos.rte.lvm:5.3.12.0-5.3.12.9","20150113","20150120","5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908","ftp://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar","CVE-2014-8904:7.2","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6","VIOS cmdlvm vulnerability","CVE-2014-8904 / IV68082","2.2.2.7","IV68082s5b.150122.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc","bos.rte.lvm:6.1.8.0-6.1.8.19","20150113","20150217","5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908","https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar","CVE-2014-8904:7.2","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4","VIOS cmdlvm vulnerability","CVE-2014-8904 / IV67907","2.2.3.5","IV67907s4b.150122.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc","bos.rte.lvm:6.1.9.0-6.1.9.30","20150113","20150217","5300-12:IV68070 6100-08:IV68082 6100-09:IV67907 7100-02:IV68478 7100-03:IV67908","https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar","CVE-2014-8904:7.2","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05","Vulnerabilities in NTPv4 affect AIX","CVE-2014-9297 / CVE-2015-1799","6100-09-06","IV71094s0a.150618.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc","ntp.rte:6.1.6.0-6.1.6.4","20150629"," ","6100-09:IV71094 7100-03:IV71096","https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar","CVE-2014-9297:5.00 / CVE-2015-1799:5.40","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05","Vulnerabilities in NTPv4 affect AIX","CVE-2014-9297 / CVE-2015-1799","7100-03-06","IV71096s0a.150618.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc","ntp.rte:7.1.0.0-7.1.0.4","20150629"," ","6100-09:IV71094 7100-03:IV71096","https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar","CVE-2014-9297:5.00 / CVE-2015-1799:5.40","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50","Vulnerabilities in NTPv4 affect VIOS","CVE-2014-9297 / CVE-2015-1799","2.2.3.60","IV71094s0a.150618.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc","ntp.rte:6.1.6.0-6.1.6.4","20150629"," ","6100-09:IV71094 7100-03:IV71096","https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar","CVE-2014-9297:5.00 / CVE-2015-1799:5.40","no" "sec","aix","GSKit","The GSKit that is shipped with IBM Security/Tivoli Directory Server contains multiple security vulnerabilities including the FREAK: Factoring Attack on RSA-EXPORT keys TLS/SSL clie","CVE-2015-0138 / CVE-2015-0159","See advisory","See advisory","http://www-01.ibm.com/support/docview.wss?uid=isg3T1022075","ISDS:6.3.1 ITDS:6.3 ITDS:6.2 ITDS:6.1 ITDS:6.0 GSKit:<8.0.50.41 GSKit:<7.0.5.5","20150313"," ","n/a","See advisory","CVE-2015-0159:4.3","no" "sec","aix","Java","AIX IBM SDK Java JSSE vulnerability","CVE-2015-0138","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/javajsse_advisory.asc","Java5.sdk:<5.0.0.590 Java6.sdk:<6.0.0.470 Java7.sdk:<7.0.0.195 Java71.sdk:<7.1.0.75 Java5_64.sdk:<5.0.0.590 Java6_64.sdk:<6.0.0.470 Java7_64.sdk:<7.0.0.195 Java71_64.sdk:<7.1.0.75","20150413"," ","n/a","See advisory","CVE-2015-0138:4.3","no" "sec","aix","Openssl","Multiple Security vulnerabilities in AIX OpenSSL","CVE-2015-0209 / CVE-2015-0286 / CVE-2015-0287 / CVE-2015-0288 / CVE-2015-0289 / CVE-2015-0292 / CVE-2015-0293","See advisory","IV71446m9a.150410.epkg.Z IV71446m9b.150410.epkg.Z IV71446m9c.150410.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory13.asc","openssl.base:1.0.1.500-1.0.1.513 openssl.base:0.9.8.401-0.9.8.2504 openssl.base:12.9.8.1100-12.9.8.2504","20150413"," ","n/a","See advisory","CVE-2015-0209:7.5 / CVE-2015-0286:5 / CVE-2015-0287:7.5 / CVE-2015-0288:5 / CVE-2015-0289:5 / CVE-2015-0292:7.5 / CVE-2015-0293:5","no" "sec","aix","Java","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2015-0491 / CVE-2015-0459 / CVE-2015-0469 / CVE-2015-0458 / CVE-2015-0480 / CVE-2015-0486 / CVE-2015-0488 / CVE-2015-0478 / CVE-2015-0477 / CVE-2015-2808 / CVE-2015-1916 / CVE-2015-1914 / CVE-2015-0192 / CVE-2015-0204","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_april2015_advisory.asc","Java5.sdk:<5.0.0.600 Java6.sdk:<6.0.0.480 Java7.sdk:<7.0.0.205 Java71.sdk:<7.1.0.85 Java5_64.sdk:<5.0.0.600 Java6_64.sdk:<6.0.0.480 Java7_64.sdk:<7.0.0.205 Java71_64.sdk:<7.1.0.85","20150603"," ","n/a","See advisory","CVE-2015-0491:10 / CVE-2015-0459:10 / CVE-2015-0469:10 / CVE-2015-0458:7.6 / CVE-2015-0480:5.8 / CVE-2015-0488:5 / CVE-2015-0478:4.3 / CVE-2015-0477:4.3 / CVE-2015-0204:4.3 / CVE-2015-0192:6.8 / CVE-2015-0486:5 / CVE-2015-2808:5 / CVE-2015-1916:5 / CVE-2015-1914:4.3 / CVE-2015-0138:4.3","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05","Vulnerability in NTPv3 affects AIX","CVE-2015-1799 / IV73783","7100-03-06","IV73783s5a.150714.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc","bos.net.tcp.client:6.1.9.0-6.1.9.45","20150821"," ","6100-09:IV73783 7100-03:IV74261","https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar","CVE-2015-1799:5.4","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05","Vulnerability in NTPv3 affects AIX","CVE-2015-1799 / IV74261","7100-03-06","IV74261s5a.150714.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc","bos.net.tcp.client:7.1.3.0-7.1.3.45","20150821"," ","6100-09:IV73783 7100-03:IV74261","https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar","CVE-2015-1799:5.4","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","Vulnerability in NTPv3 affects AIX","CVE-2015-1799 / IV74263","next TL","IV74263s6a.150714.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc","bos.net.tcp.client:6.1.8.0-6.1.8.19","20150821"," ","6100-09:IV73783 7100-03:IV74261","https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar","CVE-2015-1799:5.4","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","Vulnerability in NTPv3 affects AIX","CVE-2015-1799 / IV74261","next TL","IV74262s6a.150714.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc","bos.net.tcp.client:7.1.2.0-7.1.2.19","20150821"," ","6100-09:IV73783 7100-03:IV74261","https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar","CVE-2015-1799:5.4","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50","Vulnerability in NTPv3 affects VIOS","CVE-2015-1799 / IV73783","2.2.3.60","IV73783s5a.150714.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc","bos.net.tcp.client:6.1.9.0-6.1.9.45","20150821"," ","6100-09:IV73783 7100-03:IV74261","https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar","CVE-2015-1799:5.4","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6","Vulnerability in NTPv3 affects VIOS","CVE-2015-1799 / IV74263","next TL","IV74263s6a.150714.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc","bos.net.tcp.client:6.1.8.0-6.1.8.19","20150821"," ","6100-09:IV73783 7100-03:IV74261","https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar","CVE-2015-1799:5.4","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6 :: 2.2.2.70","Vulnerability in netstat affects VIOS","CVE-2015-1799 / IV77037","next TL","IV77037s7a.150924.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc","bos.net.tcp.client:6.1.8.0-6.1.8.20","20151012"," ","6100-09:IV75940 7100-03:IV77299","https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar","CVE-2015-4948:7.4","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2015-2638 / CVE-2015-4733 / CVE-2015-4732 / CVE-2015-2590 / CVE-2015-4731 / CVE-2015-4760 / CVE-2015-4736 / CVE-2015-4748 / CVE-2015-2664 / CVE-2015-2632 / CVE-2015-2637 / CVE-2015-2619 / CVE-2015-2621 / CVE-2015-2613 / CVE-2015-2601 / CVE-2015-4749 / CVE-2015-4729 / CVE-2015-2625 / CVE-2015-1931","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_july2015_advisory.asc","Java5.sdk:<5.0.0.615 Java6.sdk:<6.0.0.495 Java7.sdk:<7.0.0.255 Java71.sdk:<7.1.0.135 Java5_64.sdk:<5.0.0.615 Java6_64.sdk:<6.0.0.495 Java7_64.sdk:<7.0.0.255 Java71_64.sdk:<7.1.0.135","20150731"," ","n/a","See advisory","CVE-2015-4000:4.3 / CVE-2015-2638:10 / CVE-2015-4733:10 / CVE-2015-4732:10 / CVE-2015-2590:10 / CVE-2015-4731:10 / CVE-2015-4760:10 / CVE-2015-4736:9.3 / CVE-2015-4748:7.6 / CVE-2015-2664:6.9 / CVE-2015-2632:5 / CVE-2015-2637:5 / CVE-2015-2619:5 / CVE-2015-2621:5 / CVE-2015-2613:5 / CVE-2015-2601:5 / CVE-2015-4749:4.3 / CVE-2015-4729:4 / CVE-2015-2625:2.6 / CVE-2015-1931:2.1","no" "sec","aix","GSKit & IBM SDK for Java & IBM SDK for Node.js","Vulnerability in RC4 stream cipher affects AIX","CVE-2015-2808","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc","Java71:<=7.1.0.75 Java7:<=7.0.0.195 Java6:<=6.0.0.470 Java5:<=5.0.0.590 Node.js:<1.1.0.13","20150427","20150429","n/a","See advisory","CVE-2015-2808:5","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX","CVE-2015-2808","6100-08-07","IV74915m6a.150727.epkg.Z / IV74919m6a.150713.epkg.Z / IV74926m6a.150711.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc","bos.net.tcp.server:6.1.8.0-6.1.8.18 bos.net.tcp.client:6.1.8.0-6.1.8.19","20150427","20151215","See advisory","https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar","CVE-2015-2808:5","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05","Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX","CVE-2015-2808","6100-09-06","IV74916m5a.150727.epkg.Z / IV74920m5a.150713.epkg.Z / IV74927m5a.150711.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc","bos.net.tcp.server:6.1.9.0-6.1.9.45 bos.net.tcp.client:6.1.9.0-6.1.9.45","20150427","20151215","See advisory","https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar","CVE-2015-2808:5","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX","CVE-2015-2808","7100-02-07","IV74917m6a.150727.epkg.Z / IV74921m6a.150713.epkg.Z / IV74928m6a.150710.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc","bos.net.tcp.server:7.1.2.0-7.1.2.18 bos.net.tcp.client:7.1.2.0-7.1.2.19","20150427","20151215","See advisory","https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar","CVE-2015-2808:5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05","Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX","CVE-2015-2808","7100-03-06","IV74458m5a.150727.epkg.Z / IV74922m5a.150713.epkg.Z / IV74929m5a.150711.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc","bos.net.tcp.server:7.1.3.0-7.1.3.45 bos.net.tcp.client:7.1.3.0-7.1.3.45","20150427","20151215","See advisory","https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar","CVE-2015-2808:5","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6","Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on VIOS","CVE-2015-2808","2.2.2.7","IV74915m6a.150727.epkg.Z / IV74919m6a.150713.epkg.Z / IV74926m6a.150711.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc","bos.net.tcp.server:6.1.8.0-6.1.8.18 bos.net.tcp.client:6.1.8.0-6.1.8.19","20150427","20151215","See advisory","https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar","CVE-2015-2808:5","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50","Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on VIOS","CVE-2015-2808","2.2.3.60","IV74916m5a.150727.epkg.Z / IV74920m5a.150713.epkg.Z / IV74927m5a.150711.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc","bos.net.tcp.server:6.1.9.0-6.1.9.45 bos.net.tcp.client:6.1.9.0-6.1.9.45","20150427","20151215","See advisory","https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar","CVE-2015-2808:5","no" "sec","aix","Openssl","Vulnerabilities in OpenSSL impact AIX","CVE-2015-3194 / CVE-2015-3195 / CVE-2015-3196","See advisory","101_ifix.151218.epkg.Z 098_ifix.151218.epkg.Z 1298_ifix.151218.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory15.asc","openssl.base:1.0.1.500-1.0.1.515 openssl.base:0.9.8.401-0.9.8.2506 openssl.base:12.9.8.1100-12.9.8.2506","20160115"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix15.tar","CVE-2015-3194:5.3 / CVE-2015-3195:5.3 / CVE-2015-3196:3.7","no" "sec","aix","Openssl","Vulnerabilities in OpenSSL affect AIX","CVE-2015-3197 / CVE-2015-4000","See advisory","IV81287m9b.160217.epkg.Z IV81287m9a.160217.epkg.Z IV81287m9c.160217.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory17.asc","openssl.base:0.9.8.401-0.9.8.2506 openssl.base:1.0.1.500-1.0.1.515 openssl.base:12.9.8.1100-12.9.8.2506","20160226"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix17.tar","CVE-2015-3197:5.4 / CVE-2015-4000:4.3","no" "sec","aix","Openssl","Multiple Security vulnerabilities in AIX OpenSSL","CVE-2015-4000 / CVE-2015-1788 / CVE-2015-1789 / CVE-2015-1790 / CVE-2015-1791 / CVE-2015-1792 / CVE-2014-8176","See advisory","IV74809s9a.150710.epkg.Z IV75570m9a.150729.epkg.Z IV74809s9b.150710.epkg.Z IV74809s9c.150710.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory14.asc","openssl.base:1.0.1.500-1.0.1.514 openssl.base:0.9.8.401-0.9.8.2505 openssl.base:12.9.8.1100-12.9.8.2505","20150715","20150812","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix14.tar","CVE-2015-4000:4.3 / CVE-2015-1788:5 / CVE-2015-1789:5 / CVE-2015-1790:5 / CVE-2015-1791:5 / CVE-2015-1792:5 / CVE-2014-8176:6.5","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50","Vulnerability in Diffie-Hellman ciphers affects sendmail on VIOS","CVE-2015-4000","2.2.3.60","IV75643m5a.150731.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.45","20150807"," ","6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar","CVE-2015-4000:4.3","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX","CVE-2015-4000","6100-09-06","IV75644m6a.150731.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc","bos.net.tcp.client:6.1.8.0-6.1.8.19","20150807"," ","6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar","CVE-2015-4000:4.3","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05","Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX","CVE-2015-4000","6100-09-06","IV75643m5a.150731.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc","bos.net.tcp.client:6.1.9.0-6.1.9.45","20150807"," ","6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar","CVE-2015-4000:4.3","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX","CVE-2015-4000","7100-03-06","IV75645m6a.150731.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc","bos.net.tcp.client:7.1.2.0-7.1.2.19","20150807"," ","6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar","CVE-2015-4000:4.3","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05","Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX","CVE-2015-4000","7100-03-06","IV75646m5a.150731.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc","bos.net.tcp.client:7.1.3.0-7.1.3.45","20150807"," ","6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar","CVE-2015-4000:4.3","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6","Vulnerability in Diffie-Hellman ciphers affects sendmail on VIOS","CVE-2015-4000","2.2.3.60","IV75644m6a.150731.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc","bos.net.tcp.client:6.1.9.0-6.1.8.19","20150807"," ","6100-08:IV75644 6100-09:IV75643 7100-02:IV75645 7100-03:IV75646","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar","CVE-2015-4000:4.3","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2015-4844 / CVE-2015-4843 / CVE-2015-4805 / CVE-2015-4860 / CVE-2015-4883 / CVE-2015-4835 / CVE-2015-4810 / CVE-2015-4806 / CVE-2015-4871 / CVE-2015-4902 / CVE-2015-4872 / CVE-2015-4911 / CVE-2015-4893 / CVE-2015-4840 / CVE-2015-4842 / CVE-2015-4882 / CVE-2015-4903 / CVE-2015-4803 / CVE-2015-4734 / CVE-2015-5006","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_oct2015_advisory.asc","Java5.sdk:<5.0.0.620 Java6.sdk:<6.0.0.510 Java7.sdk:<7.0.0.270 Java71.sdk:<7.1.0.150 Java8.sdk:<8.0.0.70 Java5_64.sdk:<5.0.0.620 Java6_64.sdk:<6.0.0.510 Java7_64.sdk:<7.0.0.270 Java71_64.sdk:<7.1.0.150 Java8_64.sdk:<8.0.0.70","20151210"," ","n/a","See advisory","CVE-2015-4844:10 / CVE-2015-4843:10 / CVE-2015-4805:10 / CVE-2015-4860:10 / CVE-2015-4883:10 / CVE-2015-4835:10 / CVE-2015-4810:6.9 / CVE-2015-4806:6.4 / CVE-2015-4871:5.8 / CVE-2015-4902:5 / CVE-2015-4872:5 / CVE-2015-4911:5 / CVE-2015-4893:5 / CVE-2015-4840:5 / CVE-2015-4842:5 / CVE-2015-4882:5 / CVE-2015-4903:5 / CVE-2015-4803:5 / CVE-2015-4734:5 / CVE-2015-5006:4.6","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerability in netstat affects AIX","CVE-2015-4948 / IV77039","6100-09-06","IV77039s9b.151016.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20151012","20151016","6100-09:IV75940 7100-03:IV77299","https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar","CVE-2015-4948:7.4","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05","Vulnerability in netstat affects AIX","CVE-2015-4948 / IV75940","6100-09-06","IV75940s5b.151016.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.45","20151012","20151016","6100-09:IV75940 7100-03:IV77299","https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar","CVE-2015-4948:7.4","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05","Vulnerability in netstat affects AIX","CVE-2015-4948 / IV77299","7100-03-06","IV77299s5b.151016.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc","bos.net.tcp.client:7.1.3.0-7.1.3.45","20151012","20151016","6100-09:IV75940 7100-03:IV77299","https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar","CVE-2015-4948:7.4","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06 :: 6100-08-07","Vulnerability in netstat affects AIX","CVE-2015-4948 / IV77037","next TL","IV77037s7a.150924.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc","bos.net.tcp.client:6.1.8.0-6.1.8.20","20151012"," ","6100-09:IV75940 7100-03:IV77299","https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar","CVE-2015-4948:7.4","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06 :: 7100-02-07","Vulnerability in netstat affects AIX","CVE-2015-4948 / IV77038","next TL","IV77038s7a.150924.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc","bos.net.tcp.client:7.1.2.0-7.1.2.20","20151012"," ","6100-09:IV75940 7100-03:IV77299","https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar","CVE-2015-4948:7.4","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50","Vulnerability in netstat affects VIOS","CVE-2015-4948 / IV75940","2.2.3.60","IV75940s5b.151016.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.45","20151012","20151016","6100-09:IV75940 7100-03:IV77299","https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar","CVE-2015-4948:7.4","no" "sec","aix","NTPv4","Vulnerability in NTPv4 affects AIX","CVE-2015-5300","See advisory","IV81129m6a.160204.epkg.Z IV81130m5a.160204.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc","ntp.rte:6.1.6.0-6.1.6.4 ntp.rte:7.1.0.0-7.1.0.4","20160222"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/ntp_fix5.tar","CVE-2015-5300:4.3","no" "sec","aix","OpenSSH","AIX OpenSSH Vulnerability","CVE-2015-5352","See advisory","OpenSSH_6.0.0.6110.tar.Z OpenSSH_6.0.0.6201.tar.Z DEPRECATED::6201_mfix","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory5.asc","openssh.base.client:4.0.0.5200-6.0.0.6200 openssh.base.server:4.0.0.5200-6.0.0.6200","20150904"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2015-5352:4.3","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerability in BIND affects AIX","CVE-2015-5477 / IV75966","6100-09-06","IV75966s9a.150813.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20150813","20150817","6100-09:IV75692 7100-03:IV75693","https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar","CVE-2015-5477:7.5","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05","Vulnerability in BIND affects AIX","CVE-2015-5477 / IV75692","6100-09-06","IV75692s5a.150803.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc","bos.net.tcp.client:6.1.9.0-6.1.9.45","20150813","20150817","6100-09:IV75692 7100-03:IV75693","https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar","CVE-2015-5477:7.5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05","Vulnerability in BIND affects AIX","CVE-2015-5477 / IV75693","7100-03-06","IV75693s5a.150803.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc","bos.net.tcp.client:7.1.3.0-7.1.3.45","20150813","20150817","6100-09:IV75692 7100-03:IV75693","https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar","CVE-2015-5477:7.5","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","Vulnerability in BIND affects AIX","CVE-2015-5477 / IV75694","next TL","IV75694s6a.150803.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc","bos.net.tcp.client:6.1.8.0-6.1.8.19","20150813","20150817","6100-09:IV75692 7100-03:IV75693","https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar","CVE-2015-5477:7.5","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","Vulnerability in BIND affects AIX","CVE-2015-5477 / IV75690","next TL","IV75690s6a.150803.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc","bos.net.tcp.client:7.1.2.0-7.1.2.19","20150813","20150817","6100-09:IV75692 7100-03:IV75693","https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar","CVE-2015-5477:7.5","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50","Vulnerability in BIND affects VIOS","CVE-2015-5477 / IV75692","2.2.3.60","IV75692s5a.150803.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc","bos.net.tcp.client:6.1.9.0-6.1.9.45","20150813","20150817","6100-09:IV75692 7100-03:IV75693","https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar","CVE-2015-5477:7.5","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6","Vulnerability in BIND affects VIOS","CVE-2015-5477 / IV75694","next TL","IV75694s6a.150803.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc","bos.net.tcp.client:6.1.8.0-6.1.8.19","20150813","20150817","6100-09:IV75692 7100-03:IV75693","https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar","CVE-2015-5477:7.5","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerability in BIND affects AIX","CVE-2015-5722 / IV78092","6100-09-06","IV78092m9a.151103.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20151104"," ","6100-09:IV78091 7100-03:IV78095","https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar","CVE-2015-5722:7.5","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05","Vulnerability in BIND affects AIX","CVE-2015-5722 / IV78091","6100-09-06","IV78091m5a.151020.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc","bos.net.tcp.client:6.1.9.0-6.1.9.45","20151104"," ","6100-09:IV78091 7100-03:IV78095","https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar","CVE-2015-5722:7.5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05","Vulnerability in BIND affects AIX","CVE-2015-5722 / IV78095","7100-03-06","IV78095m5a.151019.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc","bos.net.tcp.client:7.1.3.0-7.1.3.45","20151104"," ","6100-09:IV78091 7100-03:IV78095","https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar","CVE-2015-5722:7.5","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06 :: 6100-08-07","Vulnerability in BIND affects AIX","CVE-2015-5722 / IV78096","next TL","IV78096m7a.151021.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc","bos.net.tcp.client:6.1.8.0-6.1.8.20","20151104"," ","6100-09:IV78091 7100-03:IV78095","https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar","CVE-2015-5722:7.5","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06 :: 7100-02-07","Vulnerability in BIND affects AIX","CVE-2015-5722 / IV78094","next TL","IV78094m7a.151020.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc","bos.net.tcp.client:7.1.2.0-7.1.2.20","20151104"," ","6100-09:IV78091 7100-03:IV78095","https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar","CVE-2015-5722:7.5","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50","Vulnerability in BIND affects VIOS","CVE-2015-5722 / IV78091","2.2.3.60","IV78091m5a.151020.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc","bos.net.tcp.client:6.1.9.0-6.1.9.45","20151104"," ","6100-09:IV78091 7100-03:IV78095","https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar","CVE-2015-5722:7.5","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2:: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.2.6 :: 2.2.2.70","Vulnerability in BIND affects VIOS","CVE-2015-5722 / IV78096","next TL","IV78096m7a.151021.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc","bos.net.tcp.client:6.1.8.0-6.1.8.20","20151104"," ","6100-09:IV78091 7100-03:IV78095","https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar","CVE-2015-5722:7.5","no" "sec","aix","OpenSSH","AIX OpenSSH Vulnerability","CVE-2015-6563 / CVE-2015-6564","See advisory","6110_ifix.151009.epkg.Z 6201_ifix.151009.epkg.Z DEPRECATED::6201_mfix","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory6.asc","openssh.base.client:4.0.0.5200-6.0.0.6201 openssh.base.server:4.0.0.5200-6.0.0.6201","20151019"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssh_fix6.tar","CVE-2015-6563:4 / CVE-2015-6564:7.4","no" "sec","aix","GSKit","Vulnerabilities in GSKit affect Tivoli Directory Server/IBM Security Directory Server on AIX","CVE-2015-7421 / CVE-2015-7420","See advisory","See advisory","http://www.ibm.com/support/docview.wss?uid=isg3T1023277","ISDS:6.4 ISDS:6.3.1 ITDS:6.3 GSKit:<8.0.50.53","20151221"," ","n/a","See advisory","CVE-2015-7420:3.7 / CVE-2015-7421:3.7","no" "sec","aix","Openssl","Vulnerability in MD5 Signature and Hash Algorithm affects OpenSSL on AIX","CVE-2015-7575","See advisory","101a_fix.160129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory16.asc","openssl.base:1.0.1.500-1.0.1.515","20160129"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix16.tar","CVE-2015-7575:7.1","no" "sec","aix","NTPv4","Vulnerabilities in NTP affect AIX","CVE-2015-7973 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140","See advisory","IV83992s5a.160602.epkg.Z IV83983s5a.160602.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc","ntp.rte:6.1.6.0-6.1.6.5 ntp.rte:7.1.0.0-7.1.0.5","20160608","20160609","n/a","https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar","CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3","no" "sec","aix","NTPv4","Vulnerabilities in NTP affect AIX","CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519 / CVE-2016-1547 / CVE-2016-4957 / CVE-2016-4953 / CVE-2016-4954 / CVE-2016-4955","See advisory","IV87278s7a.160901.epkg.Z IV87279s7a.160901.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc","ntp.rte:6.1.6.0-6.1.6.7 ntp.rte:7.1.0.0-7.1.0.7","20160906","20160913","n/a","https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar","CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2 / CVE-2016-1547:3.7 / CVE-2016-4957:7.5 / CVE-2016-4953:3.7 / CVE-2016-4954:3.7 / CVE-2016-4955:3.7","no" "sec","aix","OpenSSH","AIX OpenSSH Vulnerability","CVE-2015-8325 / CVE-2016-6210 / CVE-2016-6515","See advisory","6202_ifix.160830.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory9.asc","openssh.base.client:4.0.0.5200-6.0.0.6202 openssh.base.server:4.0.0.5200-6.0.0.6202","20160906"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssh_fix9.tar","CVE-2015-8325:7.4 / CVE-2016-6210:4.3 / CVE-2016-6515:7.5","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2015-8472 / CVE-2016-0475 / CVE-2016-0466 / CVE-2016-0402 / CVE-2015-7575 / CVE-2016-0448 / CVE-2016-0494 / CVE-2016-0483 / CVE-2015-5041 / CVE-2015-7981 / CVE-2015-8126 / CVE-2015-8540","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_jan2016_advisory.asc","Java6.sdk:<6.0.0.535 Java7.sdk:<7.0.0.320 Java71.sdk:<7.1.0.200 Java8.sdk:<8.0.0.120 Java6_64.sdk:<6.0.0.535 Java7_64.sdk:<7.0.0.320 Java71_64.sdk:<7.1.0.200 Java8_64.sdk:<8.0.0.120","20160224"," ","n/a","See advisory","CVE-2015-8472:6.3 / CVE-2016-0475:5.8 / CVE-2016-0466:5.0 / CVE-2016-0402:5.0 / CVE-2015-7575:7.1 / CVE-2016-0448:4.0 / CVE-2016-0494:10.0 / CVE-2016-0483:10.0 / CVE-2015-5041:4.8 / CVE-2015-7981:5.3 / CVE-2015-8126:7.8 / CVE-2015-8540:9.8","no" "sec","aix","GSKit","Vulnerability in GSKit affects Tivoli Directory Server/IBM Security Directory Server on AIX","CVE-2016-0201","See advisory","See advisory","http://www.ibm.com/support/docview.wss?uid=isg3T1023296","ISDS:6.4 ISDS:6.3.1 ITDS:6.3 GSKit:<8.0.50.57","20160127"," ","n/a","See advisory","CVE-2016-0201:5.9","no" "sec","aix","OpenSSH","AIX OpenSSH Vulnerability","CVE-2016-0777 / CVE-2016-0778","See advisory","IV80743m9a.160127.epkg.Z IV80743m9b.160127.epkg.Z DEPRECATED::6201_mfix","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory7.asc","openssh.base.client:4.0.0.5200-6.0.0.6201 openssh.base.server:4.0.0.5200-6.0.0.6201","20160129"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssh_fix7.tar","CVE-2016-0777:6.5 / CVE-2016-0778:5.0","no" "sec","aix","Openssl","Multiple vulnerabilities in OpenSSL affect AIX","CVE-2016-0800 / CVE-2016-0799 / CVE-2016-0798 / CVE-2016-0797 / CVE-2016-0705 / CVE-2016-0702","See advisory","IV83169m9b.160401.epkg.Z IV83169m9a.160401.epkg.Z IV83169s9d.160401.epkg.Z IV83169m9c.160401.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory18.asc","openssl.base:0.9.8.401-0.9.8.2506 openssl.base:1.0.1.500-1.0.1.515 openssl.base:1.0.2.500-1.0.2.500 openssl.base:12.9.8.1100-12.9.8.2506","20160404"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix18.tar","CVE-2016-0800:7.4 / CVE-2016-0799:3.7 / CVE-2016-0798:7.1 / CVE-2016-0797:3.7 / CVE-2016-0705:3.7 / CVE-2016-0702:2.9","no" "sec","aix","Openssl","Vulnerabilities in OpenSSL affect AIX","CVE-2016-2176 / CVE-2016-2109 / CVE-2016-2108 / CVE-2016-2106 / CVE-2016-2105","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory20.asc","openssl.base:0.9.8.401-0.9.8.2506 openssl.base:1.0.1.500-1.0.1.515 openssl.base:1.0.2.500 openssl.base:12.9.8.1100-12.9.8.2506 openssl.base:20.11.101.500","20160712"," ","n/a","See advisory","CVE-2016-2176:5.3 / CVE-2016-2109:5.3 / CVE-2016-2108:8.1 / CVE-2016-2106:5.6 / CVE-2016-2105:5.6","no" "sec","aix","Openssl","Vulnerabilities in OpenSSL affect AIX","CVE-2016-2177 / CVE-2016-2178 / CVE-2016-2179 / CVE-2016-2180 / CVE-2016-2181 / CVE-2016-2182 / CVE-2016-2183 / CVE-2016-6302 / CVE-2016-6303 / CVE-2016-6304 / CVE-2016-6306 / CVE-2016-7052","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc","openssl.base:1.0.1.500-1.0.1.516 openssl.base:1.0.2.500-1.0.2.800 openssl.base:20.11.101.500-20.11.101.501","20161114"," ","n/a","See advisory","CVE-2016-2177:5.9 / CVE-2016-2178:5.3 / CVE-2016-2179:5.3 / CVE-2016-2180:7.5 / CVE-2016-2181:5.3 / CVE-2016-2182:4.3 / CVE-2016-2183:3.7 / CVE-2016-6302:5.3 / CVE-2016-6303:5.3 / CVE-2016-6304:7.5 / CVE-2016-2016-6306:4.3 / CVE-2016-7052:5.3","no" "sec","aix","Openssl","Vulnerability in OpenSSL affects AIX","CVE-2016-2842","See advisory","IV83169m9b.160401.epkg.Z IV83169m9a.160401.epkg.Z IV83169s9d.160401.epkg.Z IV83169m9c.160401.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory19.asc","openssl.base:0.9.8.401-0.9.8.2506 openssl.base:1.0.1.500-1.0.1.515 openssl.base:1.0.2.500-1.0.2.500 openssl.base:12.9.8.1100-12.9.8.2506","20160418"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix18.tar","CVE-2016-2842:7.5","no" "sec","aix","OpenSSH","Vulnerabilities in OpenSSH affect AIX","CVE-2016-3115 / CVE-2016-1908","See advisory","IV84698m9b.160513.epkg.Z IV84698m9a.160513.epkg.Z DEPRECATED::6201_mfix","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory8.asc","openssh.base.client:4.0.0.5200-6.0.0.6201 openssh.base.server:4.0.0.5200-6.0.0.6201","20160503","20160513","n/a","https://aix.software.ibm.com/aix/efixes/security/openssh_fix8.tar","CVE-2016-3115:8.8 / CVE-2016-1908:4.3","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2016-3443 / CVE-2016-0687 / CVE-2016-0686 / CVE-2016-3427 / CVE-2016-3449 / CVE-2016-3422 / CVE-2016-3426 / CVE-2016-0264 / CVE-2016-0363 / CVE-2016-0376","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_april2016_advisory.asc","Java6.sdk:<6.0.0.561 Java7.sdk:<7.0.0.370 Java71.sdk:<7.1.0.250 Java8.sdk:<8.0.0.130 Java6_64.sdk:<6.0.0.560 Java7_64.sdk:<7.0.0.370 Java71_64.sdk:<7.1.0.250 Java8_64.sdk:<8.0.0.130","20160506","20160518","n/a","See advisory","CVE-2016-3443:10.0 / CVE-2016-0687:10.0 / CVE-2016-0686:10.0 / CVE-2016-3427:10.0 / CVE-2016-3449:7.6 / CVE-2016-3422:5.0 / CVE-2016-3426:4.3 / CVE-2016-0264:5.6 / CVE-2016-0363:8.1 / CVE-2016-0376:8.1","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2016-3598 / CVE-2016-3511 / CVE-2016-3485","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_july2016_advisory.asc","Java6.sdk:<6.0.0.585 Java7.sdk:<7.0.0.450 Java71.sdk:<7.1.0.350 Java8.sdk:<8.0.0.310 Java6_64.sdk:<6.0.0.585 Java7_64.sdk:<7.0.0.450 Java71_64.sdk:<7.1.0.350 Java8_64.sdk:<8.0.0.310","20160819"," ","n/a","See advisory","CVE-2016-3598:9.6 / CVE-2016-3511:7.7 / CVE-2016-3485:2.9","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2016-5582 / CVE-2016-5568 / CVE-2016-5556 / CVE-2016-5573 / CVE-2016-5597 / CVE-2016-5554 / CVE-2016-5542","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_oct2016_advisory.asc","Java6.sdk:<6.0.0.635 Java7.sdk:<7.0.0.560 Java71.sdk:<7.1.0.360 Java8.sdk:<8.0.0.321 Java6_64.sdk:<6.0.0.635 Java7_64.sdk:<7.0.0.560 Java71_64.sdk:<7.1.0.360 Java8_64.sdk:<8.0.0.321","20161221","20161223","n/a","See advisory","CVE-2016-5582:9.6 / CVE-2016-5568:9.6 / CVE-2016-5556:9.6 / CVE-2016-5573:8.3 / CVE-2016-5597:5.9 / CVE-2016-5554:4.3 / CVE-2016-5542:3.1","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX","CVE-2016-6038","6100-09-06","IV89386s9c.160923.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pconsole_mitigation.asc","lwi.runtime:5.3.12.0-5.3.12.9","20160922","20160930","5300-12:IV89386 6100-09:IV89418 7100-03:IV89385","https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar","CVE-2016-6038:6.5","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05","Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX","CVE-2016-6038","6100-09-06","IV89418s5a.160927.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pconsole_mitigation.asc","lwi.runtime:6.1.9.0-6.1.9.99","20160922","20160930","5300-12:IV89386 6100-09:IV89418 7100-03:IV89385","https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar","CVE-2016-6038:6.5","no" "sec","aix","OpenSSH","Vulnerabilities in OpenSSH affect AIX.","CVE-2016-8858 CVE-2016-10009 CVE-2016-10011 CVE-2016-10012","See Bulletin","6203_ifix.170124.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory10.asc","openssh.base.client:4.0.0.5200-6.0.0.6203 openssh.base.server:4.0.0.5200-6.0.0.6203","20170205"," ","n/a"," ","CVE-2016-8858:5.3 / CVE-2016-10009:6.3 / CVE-2016-10011:5.5 / CVE-2016-10012:5.9","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerabilities in BIND impact AIX","CVE-2016-8864 / CVE-2016-2848 / IV91253","6100-09-09","IV91253m9b.161209.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client_core:5.3.12.0-5.3.12.10","20161215","20161229","6100-09:IV91254 7100-03:IV91214 7100-04:IV91255 7200-00:IV91256 7200-01:IV91257","ftp://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","6100-09-06 :: 6100-09-07 :: 6100-09-08","Vulnerabilities in BIND impact AIX","CVE-2016-8864 / CVE-2016-2848 / IV91254","6100-09-09","IV91254m6b.161213.epkg.Z IV91254m7b.161209.epkg.Z IV91254m8b.161209.epkg.z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client_core:6.1.9.0-6.1.9.200","20161215","20161229","5300-12:IV91253 7100-03:IV91214 7100-04:IV91255 7200-00:IV91256 7200-01:IV91257","https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","7100-03-04 :: 7100-03-05 :: 7100-03-06","Vulnerabilities in BIND impact AIX","CVE-2016-8864 / CVE-2016-2848 / IV91214","7100-03-07","IV91214m4b.161209.epkg.Z IV91214m5b.161209.epkg.Z IV91214m6a.161209.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client_core:7.1.3.0-7.1.3.48","20161215","20161229","5300-12:IV91253 6100-09:IV91254 7100-04:IV91255 7200-00:IV91256 7200-01:IV91257","https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03","Vulnerabilities in BIND impact AIX","CVE-2016-8864 / CVE-2016-2848 / IV91255","7100-04-04","IV91255m1b.161213.epkg.Z IV91255m2a.161213.epkg.Z IV91255m3c.161213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client_core:7.1.4.0-7.1.4.30","20161215","20161229","5300-12:IV91253 6100-09:IV91254 7100-03:IV91214 7200-00:IV91256 7200-01:IV91257","https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","Vulnerabilities in BIND impact AIX","CVE-2016-8864 / CVE-2016-2848 / IV91256","7200-00-03","IV91256m1b.161212.epkg.Z IV91256m2b.161209.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client_core:7.2.0.0-7.2.0.2","20161215","20161229","5300-12:IV91253 6100-09:IV91254 7100-03:IV91214 7100-04:IV91255 7200-01:IV91257","https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","7200-01-00 :: 7200-01-01","Vulnerabilities in BIND impact AIX","CVE-2016-8864 / CVE-2016-2848 / IV91257","7200-01-02","IV91257m0a.161212.epkg.Z IV91257m1a.161213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client_core:7.2.1.0","20161215","20161229","5300-12:IV91253 6100-09:IV91254 7100-03:IV91214 7100-04:IV91255 7200-00:IV91256","https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","Java SDK","There are multiple vulnerabilities in IBM SDK Java Technology Edition","CVE-2017-10345 / CVE-2017-10295 / CVE-2017-10281 / CVE-2017-10350 / CVE-2017-10347 / CVE-2017-10349 / CVE-2017-10348 / CVE-2017-10357 / CVE-2017-10355 / CVE-2017-10356 / CVE-2017-10309 / CVE-2017-10388 / CVE-2017-10285 / CVE-2017-10346 / CVE-2017-10165","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_oct2017_advisory.asc","Java6:<6.0.0.655 Java6.jre:<6.0.0.655 Java6_64.jre:<6.0.0.655 Java6_64.sdk:<6.0.0.655 Java6.sdk:<6.0.0.655 Java7:<7.0.0.615 Java7_64.jre:<7.0.0.615 Java7.jre:<7.0.0.615 Java7_64.sdk:<7.0.0.615 Java7.sdk:<7.0.0.615 Java7.1.jre:<7.1.0.415 Java7.1_64.jre:<7.1.0.415 Java7.1:<7.1.0.415 Java7.1.sdk:<7.1.0.415 Java7.1_64.sdk:<7.1.0.415 Java8:<8.0.0.505 Java8.jre:<8.0.0.505 Java8_64.jr","20171207"," ","n/a","See advisory","CVE-2017-10345:3.1 / CVE-2017-10295:4 / CVE-2017-10281:5.3 / CVE-2017-10350:5.3 / CVE-2017-10347:5.3 / CVE-2017-10349:5.3 / CVE-2017-10348:5.3 / CVE-2017-10357:5.3 / CVE-2017-10355:5.3 / CVE-2017-10356:6.2 / CVE-2017-10309:7.1 / CVE-2017-10388:7.5 / CVE-2017-10285:9.6 / CVE-2017-10346:9.6 / CVE-2017-10165:6.5","no" "sec","aix","6100-09-06 :: 6100-09-07 :: 6100-09-08","There is a vulnerability in bellmail that impacts AIX.","CVE-2017-1093","See Bulletin","IV92238m8a.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc","bos.net.tcp.client:6.1.9.0-6.1.9.200","20170129"," ","7200-01:IV92242 7200-00:IV92241 7100-03:IV92250 7100-04:IV92240","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar","CVE-2017-1093:8.4","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.51 :: 2.2.3.52 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80","There is a vulnerability in bellmail that impacts VIOS.","CVE-2017-1093","See Bulletin","IV92238m8a.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc","See Bulletin","20170129"," ","7200-01:IV92242 7200-00:IV92241 7100-03:IV92250 7100-04:IV92240","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar","CVE-2017-1093:8.4","no" "sec","aix","Java SDK","There are multiple vulnerabilities in IBM SDK Java Technology Edition","CVE-2017-1376 / CVE-2017-1541 / CVE-2017-10053 / CVE-2017-10067 / CVE-2017-10078 / CVE-2017-10087 / CVE-2017-10089 / CVE-2017-10090 / CVE-2017-10096 / CVE-2017-10101 / CVE-2017-10102 / CVE-2017-10105 / CVE-2017-10107 / CVE-2017-10108 / CVE-2017-10109 / CVE-2017-10110 / CVE-2017-10115 / CVE-2017-10116 / CVE-2017-10125 / CVE-2017-10243","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_july2017_advisory.asc","Java6:<6.0.0.650 Java6.jre:<6.0.0.650 Java6_64.jre:<6.0.0.650 Java6_64.sdk:<6.0.0.650 Java6.sdk:<6.0.0.650 Java7:<7.0.0.610 Java7_64.jre:<7.0.0.610 Java7.jre:<7.0.0.610 Java7_64.sdk:<7.0.0.610 Java7.sdk:<7.0.0.610 Java7.1.jre:<7.1.0.410 Java7.1_64.jre:<7.1.0.410 Java7.1:<7.1.0.410 Java7.1.sdk:<7.1.0.410 Java7.1_64.sdk:<7.1.0.410 Java8:<8.0.0.410 Java8.jre:<8.0.0.410 Java8_64.jr","20170901"," ","n/a","See advisory","CVE-2017-1376:9.8 / CVE-2017-1541:7.3 / CVE-2017-10053:5.3 / CVE-2017-10067:7.5 / CVE-2017-10078:8.1 / CVE-2017-10087:9.6 / CVE-2017-10089:9.6 / CVE-2017-10090:9.6 / CVE-2017-10096:9.6 / CVE-2017-10101:9.6 / CVE-2017-10102:9 / CVE-2017-10105:4.3 / CVE-2017-10107:9.6 / CVE-2017-10108:5.3 / CVE-2017-10109:5.3 / CVE-2017-10110:9.6 / CVE-2017-10115:7.5 / CVE-2017-10116:8.3 / CVE-2017-10125:7.1 / CVE-2017-10243:6.5","no" "sec","aix","Java SDK","There is a vulnerability in the AIX IBM Java 6 SDK installp and updatep packages","CVE-2017-1541","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java6_advisory.asc","Java6:6.0.0.215-6.0.0.645 Java6.jre:6.0.0.215-6.0.0.645 Java6_64.jre:6.0.0.215-6.0.0.645 Java6_64.sdk:6.0.0.215-6.0.0.645 Java6.sdk:6.0.0.215-6.0.0.645 ","20171002"," ","n/a","See advisory","CVE-2017-1541:7.3","no" "sec","aix","OpenSSH","Vulnerabilities in OpenSSH affect AIX.","CVE-2017-15906","See Bulletin","openssh-7.5.102.1100.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory11.asc","openssh.base.client:4.0.0.5200-7.1.102.1100 openssh.base.server:4.0.0.5200-7.1.102.1100","20171114"," ","n/a","https://www-01.ibm.com/marketing/iwm/iwm/web/reg/download.do?source=aixbp&lang=en_US&S_PKG=openssh&cp=UTF-8","CVE-2017-15906:6.5","no" "sec","aix","Java SDK","There are multiple vulnerabilities in IBM SDK Java Technology Edition","CVE-2017-3289 / CVE-2017-3272 / CVE-2017-3241 / CVE-2017-3253 / CVE-2016-5546 / CVE-2016-5548 / CVE-2016-5549 / CVE-2017-3252 / CVE-2016-5547 / CVE-2016-5552 / CVE-2017-3261 / CVE-2017-3231 / CVE-2017-3259 / CVE-2016-2183","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_jan2017_advisory.asc","Java6:<6.0.0.641 Java7:<7.0.0.601 Java7.1:<7.1.0.401 Java8.sdk:<8.0.0.401","20170405"," ","n/a","See advisory","CVE-2017-3289:9.6 / CVE-2017-3272:9.6 / CVE-2017-3241:9 / CVE-2017-3253:7.5 / CVE-2016-5546:7.5 / CVE-2016-5548:6.5 / CVE-2016-5549:6.5 / CVE-2017-3252:5.8 / CVE-2016-5547:5.3 / CVE-2016-5552:5.3 / CVE-2017-3261:4.3 / CVE-2017-3231:4.3 / CVE-2017-3259:3.7 / CVE-2016-2183:3.7","no" "sec","aix","Java SDK","There are multiple vulnerabilities in IBM SDK Java Technology Edition","CVE-2017-3514 / CVE-2017-3512 / CVE-2017-3511 / CVE-2017-3509 / CVE-2017-3544 / CVE-2017-3533 / CVE-2017-3539 / CVE-2017-1289 / CVE-2016-9840 / CVE-2016-9841 / CVE-2016-9842 / CVE-2016-9843","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_apr2017_advisory.asc","Java6:<6.0.0.645 Java6.jre:<6.0.0.645 Java6_64.jre:<6.0.0.645 Java6_64.sdk:<6.0.0.645 Java6.sdk:<6.0.0.645 Java7:<7.0.0.605 Java7_64.jre:<7.0.0.605 Java7.jre:<7.0.0.605 Java7_64.sdk:<7.0.0.605 Java7.sdk:<7.0.0.605 Java7.1.jre:<7.1.0.405 Java7.1_64.jre:<7.1.0.405 Java7.1:<7.1.0.405 Java7.1.sdk:<7.1.0.405 Java7.1_64.sdk:<7.1.0.405 Java8:<8.0.0.406 Java8.jre:<8.0.0.406 Java8_64.jr","20170621"," ","n/a","See advisory","CVE-2017-3514:8.3 / CVE-2017-3512:8.3 / CVE-2017-3511:7.7 / CVE-2017-3509:4.2 / CVE-2017-3544:3.7 / CVE-2017-3533:3.7 / CVE-2017-3539:3.1 / CVE-2017-1289:8.2 / CVE-2016-9840:3.3 / CVE-2016-9841:3.3 / CVE-2016-9842:3.3 / CVE-2016-9843:3.3","no" "sec","aix","OpenSSL","There is a vulnerability in OpenSSL used by AIX","CVE-2017-3731","See Bulletin","102j_ifix.170207.epkg.Z fips_102j.170207.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory23.asc","openssl.base:1.0.2.500-1.0.2.1000 openssl.base:20.13.102.1000-20.13.102.1000","20170217"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix23.tar","CVE-2017-3731:5.3","no" "sec","aix","OpenSSL","Vulnerability in OpenSSL affects AIX","CVE-2017-3735","See advisory","openssl-1.0.2.1300.tar.Z openssl-20.13.102.1300.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory24.asc","openssl.base:1.0.2.500-1.0.2.1100 openssl.base:20.13.102.1000-20.13.102.1100","20171214"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=aixbp&lang=en_US&S_PKG=openssl&cp=UTF-8","CVE-2017-3735:5.3","no" "sec","aix","OpenSSL","Vulnerability in OpenSSL affects AIX (CVE-2017-3737)","CVE-2017-3737","See Bulletin","102m_ifix.180105.epkg.Z fips_102m.180105.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory25.asc","openssl.base:1.0.2.500-1.0.2.1300 openssl.base:20.13.102.1000-20.13.102.1300","20180129"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix25.tar","CVE-2017-3737:5.9","no" "sec","aix","OpenSSL","Vulnerability in OpenSSL affects AIX (CVE-2018-0732)","CVE-2018-0732","See Bulletin","102oa_ifix.180906.epkg.Z fips_102oa.180910.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory28.asc","openssl.base:1.0.2.500-1.0.2.1500 openssl.base:20.13.102.1000-20.13.102.1500","20180919"," ","n/a","http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html","CVE-2018-0732:5.3","no" "sec","aix","OpenSSL","There are vulnerabilities in OpenSSL used by AIX.","CVE-2018-0734 CVE-2018-5407","See Bulletin","102p_fix.181127.epkg.Z fips_102p.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory29.asc","openssl.base:1.0.2.500-1.0.2.1600 openssl.base:20.13.102.1000-20.16.102.1600","20181211"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix29.tar","CVE-2018-0734:3.7 / CVE-2018-5407:5.1","no" "sec","aix","OpenSSL","Vulnerability in OpenSSL affects AIX (CVE-2018-0737)","CVE-2018-0737","See Bulletin","openssl-1.0.2.1500.tar.Z openssl-20.13.102.1500.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory27.asc","openssl.base:1.0.2.500-1.0.2.1300 openssl.base:20.13.102.1000-20.13.102.1300","20180702"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2018-0737:3.3","no" "sec","aix","OpenSSL","Vulnerability in OpenSSL affects AIX (CVE-2018-0739)","CVE-2018-0739","See Bulletin","102ma_ifix.180410.epkg.Z fips_102ma.180410.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory26.asc","openssl.base:1.0.2.500-1.0.2.1300 openssl.base:20.13.102.1000-20.13.102.1300","20180501"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix26.tar","CVE-2018-0739:5.3","no" "sec","aix","Tivoli Directory Server","Vulnerabilities in GSKit affect IBM Tivoli Directory Server and IBM Security Directory Server for AIX","CVE-2018-1388 / CVE-2018-1427 / CVE-2018-1426 / CVE-2016-0702 / CVE-2018-1447","See advisory","ITDS","https://aix.software.ibm.com/aix/efixes/security/itds_advisory2.asc","ITDS:6.2.0.0-6.2.0.56 ITDS:6.3.0.0-6.3.0.49 ITDS:6.3.1.0-6.3.1.24 ITDS:6.4.0.0-6.4.0.16","20181214"," ","n/a","See Bulletin","CVE-2018-1388:9.1 / CVE-2018-1427:6.2 / CVE-2018-1426:7.4 / CVE-2016-0702:2.9 / CVE-2018-1447:5.1","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2018-1517 / CVE-2018-1656 / CVE-2018-2973 / CVE-2018-2952 / CVE-2018-2940 / CVE-2018-2964 / CVE-2018-12539","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_july2018_advisory.asc","Java7:<7.0.0.630 Java7_64.jre:<7.0.0.630 Java7.jre:<7.0.0.630 Java7_64.sdk:<7.0.0.630 Java7.sdk:<7.0.0.630 Java7.1.jre:<7.1.0.430 Java7.1_64.jre:<7.1.0.430 Java7.1:<7.1.0.430 Java7.1.sdk:<7.1.0.430 Java7.1_64.sdk:<7.1.0.430 Java8:<8.0.0.521 Java8.jre:<8.0.0.521 Java8_64.jre:<8.0.0.521 Java8.sdk:<8.0.0.521 Java8_64.sdk:<8.0.0.521","20180919"," ","n/a","See advisory","CVE-2018-1517:5.9 / CVE-2018-1656:7.4 / CVE-2018-2973:5.9 / CVE-2018-2952:3.7 / CVE-2018-2940:4.3 / CVE-2018-2964:8.3 / CVE-2018-12539:8.4","no" "sec","aix","OpenSSH","Vulnerabilities in OpenSSH affect AIX.","CVE-2018-15473","See Bulletin","15473_fix.180919.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory12.asc","openssh.base.client:4.0.0.5200-7.5.102.1500 openssh.base.server:4.0.0.5200-7.5.102.1500","20181024"," ","n/a","https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source=aixbp&lang=en_US&S_PKG=openssh&cp=UTF-8","CVE-2018-15473:5.3","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2018-1890 / CVE-2018-12549 / CVE-2018-12547 / CVE-2019-2422 / CVE-2019-2449 / CVE-2019-2426 / CVE-2018-11212","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_jan2019_advisory.asc","Java7:<7.0.0.640 Java7_64.jre:<7.0.0.640 Java7.jre:<7.0.0.640 Java7_64.sdk:<7.0.0.640 Java7.sdk:<7.0.0.640 Java7.1.jre:<7.1.0.440 Java7.1_64.jre:<7.1.0.440 Java7.1:<7.1.0.440 Java7.1.sdk:<7.1.0.440 Java7.1_64.sdk:<7.1.0.440 Java8:<8.0.0.530 Java8.jre:<8.0.0.530 Java8_64.jre:<8.0.0.530 Java8.sdk:<8.0.0.530 Java8_64.sdk:<8.0.0.530","20180416"," ","n/a","See advisory","CVE-2018-1890:5.6 / CVE-2018-12549:9.8 / CVE-2018-12547:9.8 / CVE-2019-2422:3.1 / CVE-2019-2449:3.1 / CVE-2019-2426:3.7 / CVE-2018-11212:3.3","no" "sec","aix","zlib :: zlibNX","AIX is vulnerable to denial of service due to zlib and zlibNX","CVE-2018-25032","See Bulletin","IJ41754s4a.220829.epkg.Z IJ42198s2a.220829.epkg.Z rpm.rte.4.15.1.1006 rpm.rte.4.15.1.2006","https://aix.software.ibm.com/aix/efixes/security/zlib_advisory.asc","rpm.rte:4.15.1.2000-4.15.1.2005 rpm.rte:4.9.1.3-4.15.1.1005 zlibNX.rte:7.2.4.0-7.2.4.7 zlibNX.rte:7.3.0.0-7.3.0.1","20220928"," ","","https://aix.software.ibm.com/aix/efixes/security/zlib_fix.tar ","CVE-2018-25032:7.5","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2018-2579 / CVE-2018-2588 / CVE-2018-2663 / CVE-2018-2677 / CVE-2018-2678 / CVE-2018-2602 / CVE-2018-2599 / CVE-2018-2603 / CVE-2018-2657 / CVE-2018-2618 / CVE-2018-2641 / CVE-2018-2582 / CVE-2018-2634 / CVE-2018-2637 / CVE-2018-2633 / CVE-2018-2638 / CVE-2018-2639 / CVE-2018-1417","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_jan2018_advisory.asc","Java7:<7.0.0.620 Java7_64.jre:<7.0.0.620 Java7.jre:<7.0.0.620 Java7_64.sdk:<7.0.0.620 Java7.sdk:<7.0.0.620 Java7.1.jre:<7.1.0.420 Java7.1_64.jre:<7.1.0.420 Java7.1:<7.1.0.420 Java7.1.sdk:<7.1.0.420 Java7.1_64.sdk:<7.1.0.420 Java8:<8.0.0.510 Java8.jre:<8.0.0.510 Java8_64.jre:<8.0.0.510 Java8.sdk:<8.0.0.510 Java8_64.sdk:<8.0.0.510","20180501"," ","n/a","See advisory","CVE-2018-2579:3.7 / CVE-2018-2588:4.3 / CVE-2018-2663:4.3 / CVE-2018-2677:4.3 / CVE-2018-2678:4.3 / CVE-2018-2602:4.5 / CVE-2018-2599:4.8 / CVE-2018-2603:5.3 / CVE-2018-2657:5.3 / CVE-2018-2618:5.9 / CVE-2018-2641:6.1 / CVE-2018-2582:6.5 / CVE-2018-2634:6.8 / CVE-2018-2637:7.4 / CVE-2018-2633:8.3 / CVE-2018-2638:8.3 / CVE-2018-2639:8.3 / CVE-2018-1417:8.1","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2018-2800 / CVE-2018-2795 / CVE-2018-2796 / CVE-2018-2797 / CVE-2018-2798 / CVE-2018-2799 / CVE-2018-2783 / CVE-2018-2794 / CVE-2018-2790","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_apr2018_advisory.asc","Java7:<7.0.0.625 Java7_64.jre:<7.0.0.625 Java7.jre:<7.0.0.625 Java7_64.sdk:<7.0.0.625 Java7.sdk:<7.0.0.625 Java7.1.jre:<7.1.0.425 Java7.1_64.jre:<7.1.0.425 Java7.1:<7.1.0.425 Java7.1.sdk:<7.1.0.425 Java7.1_64.sdk:<7.1.0.425 Java8:<8.0.0.515 Java8.jre:<8.0.0.515 Java8_64.jre:<8.0.0.515 Java8.sdk:<8.0.0.515 Java8_64.sdk:<8.0.0.515","20180612"," ","n/a","See advisory","CVE-2018-2800:4.2 / CVE-2018-2795:5.3 / CVE-2018-2796:5.3 / CVE-2018-2797:5.3 / CVE-2018-2798:5.3 / CVE-2018-2799:5.3 / CVE-2018-2783:7.4 / CVE-2018-2794:7.7 / CVE-2018-2790:3.1","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2018-3139 / CVE-2018-3136 / CVE-2018-13785 / CVE-2018-3214 / CVE-2018-3180 / CVE-2018-3149 / CVE-2018-3169 / CVE-2018-3183","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_oct2018_advisory.asc","Java7:<7.0.0.635 Java7_64.jre:<7.0.0.635 Java7.jre:<7.0.0.635 Java7_64.sdk:<7.0.0.635 Java7.sdk:<7.0.0.635 Java7.1.jre:<7.1.0.435 Java7.1_64.jre:<7.1.0.435 Java7.1:<7.1.0.435 Java7.1.sdk:<7.1.0.435 Java7.1_64.sdk:<7.1.0.435 Java8:<8.0.0.525 Java8.jre:<8.0.0.525 Java8_64.jre:<8.0.0.525 Java8.sdk:<8.0.0.525 Java8_64.sdk:<8.0.0.525","20181214"," ","n/a","See advisory","CVE-2018-3139:3.1 / CVE-2018-3136:3.4 / CVE-2018-13785:5.5 / CVE-2018-3214:5.3 / CVE-2018-3180:5.6 / CVE-2018-3149:8.3 / CVE-2018-3169:8.3 / CVE-2018-3183:9.0","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2019-10245 / CVE-2019-2684 / CVE-2019-2602 / CVE-2019-2697 / CVE-2019-2698","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_apr2019_advisory.asc","Java7:<7.0.0.645 Java7_64.jre:<7.0.0.645 Java7.jre:<7.0.0.645 Java7_64.sdk:<7.0.0.645 Java7.sdk:<7.0.0.645 Java7.1.jre:<7.1.0.445 Java7.1_64.jre:<7.1.0.445 Java7.1:<7.1.0.445 Java7.1.sdk:<7.1.0.445 Java7.1_64.sdk:<7.1.0.445 Java8:<8.0.0.535 Java8.jre:<8.0.0.535 Java8_64.jre:<8.0.0.535 Java8.sdk:<8.0.0.535 Java8_64.sdk:<8.0.0.535","20190628"," ","n/a","See advisory","CVE-2019-10245:7.5 / CVE-2019-2684:5.9 / CVE-2019-2602:7.5 / CVE-2019-2697:8.1 / CVE-2019-2698:8.1","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2019-11775 / CVE-2019-11772 / CVE-2019-2766 / CVE-2019-2786 / CVE-2019-2816 / CVE-2019-2762 / CVE-2019-2769 / CVE-2019-7317 / CVE-2019-4473 / CVE-2019-11771","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_july2019_advisory.asc","Java7:<7.0.0.650 Java7_64.jre:<7.0.0.650 Java7.jre:<7.0.0.650 Java7_64.sdk:<7.0.0.650 Java7.sdk:<7.0.0.650 Java7.1.jre:<7.1.0.450 Java7.1_64.jre:<7.1.0.450 Java7.1:<7.1.0.450 Java7.1.sdk:<7.1.0.450 Java7.1_64.sdk:<7.1.0.450 Java8:<8.0.0.540 Java8.jre:<8.0.0.540 Java8_64.jre:<8.0.0.540 Java8.sdk:<8.0.0.540 Java8_64.sdk:<8.0.0.540","20191009"," ","n/a","See advisory","CVE-2019-11775:8.4 / CVE-2019-11772:8.4 / CVE-2019-2766:3.1 / CVE-2019-2786:3.4 / CVE-2019-2816:4.8 / CVE-2019-2762:5.3 / CVE-2019-2769:5.3 / CVE-2019-7317:6.5 / CVE-2019-4473:8.4 / CVE-2019-11771:8.4","no" "sec","aix","OpenSSL","There is a vulnerability in OpenSSL used by AIX.","CVE-2019-1547 / CVE-2019-1563","See Bulletin","openssl-1.0.2.2000.tar.Z openssl-20.16.102.2000.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory31.asc","openssl.base:1.0.2.500-1.0.2.1801 openssl.base:20.13.102.1000-20.16.102.1801","20191126"," ","n/a","https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp&S_PKG=openssl","CVE-2019-1547:5.5 / CVE-2019-1563:3.7","no" "sec","aix","OpenSSL","There is a vulnerability in OpenSSL used by AIX.","CVE-2019-1559","See Bulletin","102pa_mfix.190318.epkg.Z fips_102pa.190318.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory30.asc","openssl.base:1.0.2.500-1.0.2.1601 openssl.base:20.13.102.1000-20.16.102.1600","20190416"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix30.tar","CVE-2019-1559:5.8","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2019-2989 / CVE-2019-2958 / CVE-2019-2975 / CVE-2019-2999 / CVE-2019-2996 / CVE-2019-2992 / CVE-2019-2988 / CVE-2019-2983 / CVE-2019-2981 / CVE-2019-2978 / CVE-2019-2973 / CVE-2019-2962 / CVE-2019-2964 / CVE-2019-2945 / CVE-2019-2933 / CVE-2019-17631 / CVE-2020-2604 / CVE-2020-2593 / CVE-2020-2659 / CVE-2020-2583","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_jan2020_advisory.asc","Java7:<7.0.0.660 Java7_64.jre:<7.0.0.660 Java7.jre:<7.0.0.660 Java7_64.sdk:<7.0.0.660 Java7.sdk:<7.0.0.660 Java7.1.jre:<7.1.0.460 Java7.1_64.jre:<7.1.0.460 Java7.1:<7.1.0.460 Java7.1.sdk:<7.1.0.460 Java7.1_64.sdk:<7.1.0.460 Java8:<8.0.0.605 Java8.jre:<8.0.0.605 Java8_64.jre:<8.0.0.605 Java8.sdk:<8.0.0.605 Java8_64.sdk:<8.0.0.605","20200217"," ","n/a","See advisory","CVE-2019-2989:6.8 / CVE-2019-2958:5.9 / CVE-2019-2975:4.8 / CVE-2019-2999:4.7 / CVE-2019-2996:4.2 / CVE-2019-2992:3.7 / CVE-2019-2988:3.7 / CVE-2019-2983:3.7 / CVE-2019-2981:3.7 / CVE-2019-2978:3.7 / CVE-2019-2973:3.7 / CVE-2019-2962:3.7 / CVE-2019-2964:3.7 / CVE-2019-2945:3.1 / CVE-2019-2933:3.1 / CVE-2019-17631:8.4 / CVE-2020-2604:8.1 / CVE-2020-2593:4.8 / CVE-2020-2659:3.7 / CVE-2020-2583:3.7","no" "sec","aix","OpenSSH","Vulnerabilities in OpenSSH affect AIX.","CVE-2019-6109 / CVE-2019-6110 / CVE-2019-6111 / CVE-2018-20685","See Bulletin","OpenSSH_7.5.102.1800.tar.Z","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory13.asc","openssh.base.client:4.0.0.5200-7.5.102.1600 openssh.base.server:4.0.0.5200-7.5.102.1600","20190716"," ","n/a","https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp&S_PKG=openssh","CVE-2019-6109:3.1 / CVE-2019-6110:3.1 / CVE-2019-6111:5.3 / CVE-2018-20685:7.5","no" "sec","aix","7100-05-02 :: 7100-05-03 :: 7100-05-04","Vulnerabilities in NTP affect AIX","CVE-2019-8936","7100-05-05","IJ17062m4a.190628.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc","bos.net.tcp.client:7.1.5.0-7.1.5.33","20190819"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar","CVE-2019-8936:5.3","no" "sec","aix","7200-02-02 :: 7200-02-03 :: 7200-02-04","Vulnerabilities in NTP affect AIX","CVE-2019-8936","7200-02-05","IJ17064m4a.190701.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc","bos.net.tcp.ntp:7.2.2.0-7.2.2.17 bos.net.tcp.ntpd:7.2.2.0-7.2.2.17","20190819"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar","CVE-2019-8936:5.3","no" "sec","aix","7200-03-01 :: 7200-03-02 :: 7200-03-03","Vulnerabilities in NTP affect AIX","CVE-2019-8936","7200-03-04","IJ17065m3a.190701.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc","bos.net.tcp.ntp:7.2.3.0-7.2.3.15 bos.net.tcp.ntpd:7.2.3.0-7.2.3.15","20190819"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar","CVE-2019-8936:5.3","no" "sec","aix","7100-04-06 :: 7100-04-07 :: 7100-04-08","Vulnerabilities in NTP affect AIX","CVE-2019-8936","See Bulletin","IJ17061m8a.190628.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc","bos.net.tcp.client:7.1.4.0-7.1.4.35","20190819"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar","CVE-2019-8936:5.3","no" "sec","aix","7200-01-04 :: 7200-01-05 :: 7200-01-06","Vulnerabilities in NTP affect AIX","CVE-2019-8936","See Bulletin","IJ17063m6a.190701.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc","bos.net.tcp.ntp:7.2.1.0-7.2.1.2 bos.net.tcp.ntpd:7.2.1.0-7.2.1.3","20190819"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar","CVE-2019-8936:5.3","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2020-14621 / CVE-2020-14593 / CVE-2020-14583 / CVE-2020-14579 / CVE-2020-14578 / CVE-2020-14577 / CVE-2020-14556 / CVE-2019-17639 / CVE-2020-2601 / CVE-2020-2590","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_july2020_advisory.asc","Java7:<7.0.0.670 Java7_64.jre:<7.0.0.670 Java7.jre:<7.0.0.670 Java7_64.sdk:<7.0.0.670 Java7.sdk:<7.0.0.670 Java7.1.jre:<7.1.0.470 Java7.1_64.jre:<7.1.0.470 Java7.1:<7.1.0.470 Java7.1.sdk:<7.1.0.470 Java7.1_64.sdk:<7.1.0.470 Java8:<8.0.0.616 Java8.jre:<8.0.0.616 Java8_64.jre:<8.0.0.616 Java8.sdk:<8.0.0.616 Java8_64.sdk:<8.0.0.616","20201103"," ","n/a","See advisory","CVE-2020-14621:5.3 / CVE-2020-14593:7.4 / CVE-2020-14583:8.3 / CVE-2020-14579:3.7 / CVE-2020-14578:3.7 / CVE-2020-14577:3.7 / CVE-2020-14556:4.8 / CVE-2019-17639:5.3 / CVE-2020-2601:6.8 / CVE-2020-2590:3.7","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2020-14779 / CVE-2020-14796 / CVE-2020-14797 / CVE-2020-14798 / CVE-2020-14782 / CVE-2020-2773 / CVE-2020-14803 / CVE-2020-27221 / CVE-2020-14781","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_mar2021_advisory.asc","Java7:<7.0.0.680 Java7_64.jre:<7.0.0.680 Java7.jre:<7.0.0.680 Java7_64.sdk:<7.0.0.680 Java7.sdk:<7.0.0.680 Java7.1.jre:<7.1.0.480 Java7.1_64.jre:<7.1.0.480 Java7.1:<7.1.0.480 Java7.1.sdk:<7.1.0.480 Java7.1_64.sdk:<7.1.0.480 Java8:<8.0.0.625 Java8.jre:<8.0.0.625 Java8_64.jre:<8.0.0.625 Java8.sdk:<8.0.0.625 Java8_64.sdk:<8.0.0.625","20210315"," ","n/a","See advisory","CVE-2020-14779:3.7 / CVE-2020-14796:3.1 / CVE-2020-14797:3.7 / CVE-2020-14798:3.1 / CVE-2020-14782:3.7 / CVE-2020-2773:3.7 / CVE-2020-14803:5.3 / CVE-2020-27221:9.8 / CVE-2020-14781:3.7","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2020-2830 / CVE-2020-2805 / CVE-2020-2803 / CVE-2020-2800 / CVE-2020-2781 / CVE-2020-2757 / CVE-2020-2756 / CVE-2020-2755 / CVE-2020-2754 / CVE-2019-2949 / CVE-2020-2654","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_apr2020_advisory.asc","Java7:<7.0.0.665 Java7_64.jre:<7.0.0.665 Java7.jre:<7.0.0.665 Java7_64.sdk:<7.0.0.665 Java7.sdk:<7.0.0.665 Java7.1.jre:<7.1.0.465 Java7.1_64.jre:<7.1.0.465 Java7.1:<7.1.0.465 Java7.1.sdk:<7.1.0.465 Java7.1_64.sdk:<7.1.0.465 Java8:<8.0.0.610 Java8.jre:<8.0.0.610 Java8_64.jre:<8.0.0.610 Java8.sdk:<8.0.0.610 Java8_64.sdk:<8.0.0.610","20200731"," ","n/a","See advisory","CVE-2020-2830:5.3 / CVE-2020-2805:8.3 / CVE-2020-2803:8.3 / CVE-2020-2800:4.8 / CVE-2020-2781:5.3 / CVE-2020-2757:3.7 / CVE-2020-2756:3.7 / CVE-2020-2755:3.7 / CVE-2020-2754:3.7 / CVE-2019-2949:6.8 / CVE-2020-2654:3.7","no" "sec","aix","RPM","AIX is vulnerable to arbitrary code execution and RPM database corruption and denial of service due to RPM.","CVE-2021-20271 / CVE-2021-3421 / CVE-2021-20266","See Bulletin","rpm.rte.4.15.1.1006 rpm.rte.4.15.1.2006","https://aix.software.ibm.com/aix/efixes/security/rpm_advisory.asc","rpm.rte:4.9.1.3-4.15.1.1005 rpm.rte:4.15.1.2000-4.15.1.2005","20220923"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/rpm_fix.tar","CVE-2021-20271:6.7 / CVE-2021-3421:6.1 / CVE-2021-20266:3.1","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2021-2161 / CVE-2021-2432 / CVE-2021-2369","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_sep2021_advisory.asc","Java7:<7.0.0.690 Java7_64.jre:<7.0.0.690 Java7.jre:<7.0.0.690 Java7_64.sdk:<7.0.0.690 Java7.sdk:<7.0.0.690 Java7.1.jre:<7.1.0.490 Java7.1_64.jre:<7.1.0.490 Java7.1:<7.1.0.490 Java7.1.sdk:<7.1.0.490 Java7.1_64.sdk:<7.1.0.490 Java8:<8.0.0.635 Java8.jre:<8.0.0.635 Java8_64.jre:<8.0.0.635 Java8.sdk:<8.0.0.635 Java8_64.sdk:<8.0.0.635","20210915"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/java_sep2021_fix.tar","CVE-2021-2161:5.9 / CVE-2021-2432:3.7 / CVE-2021-2369:4.3","no" "sec","aix","Java7 :: Java7.1 :: Java8","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2021-2163 / CVE-2021-28167 / CVE-2021-41041 / CVE-2022-21619 / CVE-2022-21624 / CVE-2022-21626 / CVE-2022-21628 / CVE-2022-3676","See Bulletin","null","https://aix.software.ibm.com/aix/efixes/security/java_dec2022_advisory.asc","See Bulletin","20221222"," ","","null","CVE-2021-2163:5.3 / CVE-2021-28167:6.5 / CVE-2021-41041:5.3 / CVE-2022-21619:3.7 / CVE-2022-21624:3.7 / CVE-2022-21626:5.3 / CVE-2022-21628:5.3 / CVE-2022-3676:6.5","no" "sec","aix","OpenSSL","Vulnerabilities in OpenSSL affect AIX","CVE-2021-23839 / CVE-2021-23840 / CVE-2021-23841","See Bulletin","1022100b.210323.epkg.Z fips2100b.210323.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory33.asc","openssl.base:1.0.2.500-1.0.2.2100 openssl.base:20.13.102.1000-20.16.102.2100","20210415"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix33.tar","CVE-2021-23839:5.9 / CVE-2021-23840:7.5 / CVE-2021-23841:7.5","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2021-35560 / CVE-2021-35586 / CVE-2021-35578 / CVE-2021-35564 / CVE-2021-35559 / CVE-2021-35556 / CVE-2021-35565 / CVE-2021-41035 / CVE-2021-2341","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_feb2022_advisory.asc","Java7:<7.0.0.700 Java7_64.jre:<7.0.0.700 Java7.jre:<7.0.0.700 Java7_64.sdk:<7.0.0.700 Java7.sdk:<7.0.0.700 Java7.1.jre:<7.1.0.500 Java7.1_64.jre:<7.1.0.500 Java7.1:<7.1.0.500 Java7.1.sdk:<7.1.0.500 Java7.1_64.sdk:<7.1.0.500 Java8:<8.0.0.700 Java8.jre:<8.0.0.700 Java8_64.jre:<8.0.0.700 Java8.sdk:<8.0.0.700 Java8_64.sdk:<8.0.0.700","20220223"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/java_feb2022_fix.tar","CVE-2021-35560:7.5 / CVE-2021-35586:5.3 / CVE-2021-35578:5.3 / CVE-2021-35564:5.3 / CVE-2021-35559:5.3 / CVE-2021-35556:5.3 / CVE-2021-35565:5.3 / CVE-2021-41035:7.7 / CVE-2021-2341:3.1","no" "sec","aix","OpenSSL","There is a vulnerability in OpenSSL used by AIX.","CVE-2021-3712","See Bulletin","1022102a.210927.epkg.Z fips2102a.210927.epkg.Z ","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory34.asc","openssl.base:1.0.2.500-1.0.2.2102 openssl.base:20.13.102.1000-20.16.102.2103","20220106"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix34.tar","CVE-2021-3712:6.5","no" "sec","aix","smbcd","There is a vulnerability in the AIX smbcd daemon.","CVE-2021-38993","See Bulletin","smbcd_fix.tar smbc_302_fileset_71.tar.gz smbc_302_fileset_72.tar.gz","https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory.asc","smbc.rte:7.1.0.0-7.1.302.6 smbc.rte:7.2.0.0-7.2.302.6","20220224"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/smbcd_fix.tar","CVE-2021-38993:6.2","no" "sec","aix","OpenSSH","Vulnerabilities in OpenSSH affect AIX.","CVE-2021-41617","See Bulletin","41617s9a.211029.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssh_advisory14.asc","openssh.base.client:4.0.0.5200-8.1.102.2104 openssh.base.server:4.0.0.5200-8.1.102.2104","20220106"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssh_fix14.tar","CVE-2021-41617:7.4","no" "sec","aix","OpenSSL","AIX is vulnerable to a denial of service due to OpenSSL","CVE-2022-0778","See Bulletin","1022103a.220422.epkg.Z 1111200a.220422.epkg.Z 1121200a.220422.epkg.Z fips2104a.220425.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory35.asc","openssl.base:1.0.2.500-1.0.2.2103 openssl.base:20.13.102.1000-20.16.102.2104 openssl.base:1.1.1.0-1.1.1.1200 openssl.base:1.1.2.0-1.1.2.1200","20220513"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix35.tar","CVE-2022-0778:7.5","no" "sec","aix","OpenSSL","AIX is vulnerable to arbitrary command execution due to OpenSSL","CVE-2022-1292 / CVE-2022-2068 / CVE-2022-2097","See Bulletin","1022104a.220804.epkg.Z 1111201a.220804.epkg.Z 1121201a.220804.epkg.Z fips2105a.220804.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory36.asc","openssl.base:1.0.2.500-1.0.2.2104 openssl.base:20.13.102.1000-20.16.102.2105 openssl.base:1.1.1.0-1.1.1.1201 openssl.base:1.1.2.0-1.1.2.1201","20220817"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/openssl_fix36.tar","CVE-2022-1292:6.3 / CVE-2022-2068:7.3 / CVE-2022-2097:6.3","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2022-21365 / CVE-2022-21360 / CVE-2022-21341 / CVE-2022-21340 / CVE-2022-21294 / CVE-2022-21293 / CVE-2022-21248 / CVE-2021-35550 / CVE-2021-35603 / CVE-2022-21299 / CVE-2022-21496 / CVE-2022-21434 / CVE-2022-21443 / CVE-2021-35561","See advisory","See advisory","https://aix.software.ibm.com/aix/efixes/security/java_jun2022_advisory.asc","Java7:<7.0.0.705 Java7_64.jre:<7.0.0.705 Java7.jre:<7.0.0.705 Java7_64.sdk:<7.0.0.705 Java7.sdk:<7.0.0.705 Java7.1.jre:<7.1.0.505 Java7.1_64.jre:<7.1.0.505 Java7.1:<7.1.0.505 Java7.1.sdk:<7.1.0.505 Java7.1_64.sdk:<7.1.0.505 Java8:<8.0.0.706 Java8.jre:<8.0.0.706 Java8_64.jre:<8.0.0.706 Java8.sdk:<8.0.0.706 Java8_64.sdk:<8.0.0.706","20220614"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/java_jun2022_fix.tar","CVE-2022-21365:5.3 / CVE-2022-21360:5.3 / CVE-2022-21341:5.3 / CVE-2022-21340:5.3 / CVE-2022-21294:5.3 / CVE-2022-21293:5.3 / CVE-2022-21248:3.7 / CVE-2021-35550:5.9 / CVE-2021-35603:3.7 / CVE-2022-21299:5.3 / CVE-2022-21496:5.3 / CVE-2022-21434:5.3 / CVE-2022-21443:3.7 / CVE-2021-35561:5.3","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2022-21426 / CVE-2023-21830 / CVE-2023-21843 / CVE-2023-30441","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/java_may2023_advisory.asc","","20230519"," ","","https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere","CVE-2022-21426:5.3 / CVE-2023-21830:5.3 / CVE-2023-21843:3.7 / CVE-2023-30441:7.5","no" "sec","aix","Python39","AIX is affected by multiple vulnerabilities in Python","CVE-2022-22827 / CVE-2022-25236 / CVE-2022-25235 / CVE-2022-25315 / CVE-2022-22824 / CVE-2022-22825 / CVE-2022-22823 / CVE-2021-46143 / CVE-2022-23990 / CVE-2022-22826 / CVE-2022-25314 / CVE-2022-25313 / CVE-2022-23852 / CVE-2021-45960 / CVE-2022-22822","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory.asc","python3.9.base:3.9.0.0-3.9.11.99","20220728"," ","n/a","https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp","CVE-2022-22827:7.8 / CVE-2022-25236:5.3 / CVE-2022-25235:3.3 / CVE-2022-25315:7.8 / CVE-2022-22824:7.8 / CVE-2022-22825:7.8 / CVE-2022-22823:7.8 / CVE-2021-46143:7.8 / CVE-2022-23990:9.8 / CVE-2022-22826:7.8 / CVE-2022-25314:7.3 / CVE-2022-25313:5.5 / CVE-2022-23852:9.8 / CVE-2021-45960:5.5 / CVE-2022-22822:7.8","no" "sec","aix","BIND","AIX is vulnerable to denial of service due to ISC BIND","CVE-2022-3094 / CVE-2022-3736 / CVE-2022-3924","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/bind_advisory23.asc","bind.rte:7.1.916.0-7.1.916.2601","20230718"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2022-3094:7.5 / CVE-2022-3736:7.5 / CVE-2022-3924:7.5","no" "sec","aix","Perl","AIX is vulnerable to HTTP request smuggling due to Perl","CVE-2022-31081","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/perl_advisory6.asc","perl.rte:5.28.0.0-5.28.1.4 perl.rte:5.34.0.0-5.34.1.1","20230503"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2022-31081:7.3","no" "sec","aix","OpenSSL","Multiple vulnerabilities in OpenSSL affect AIX","CVE-2022-3358 / CVE-2022-3602 / CVE-2022-3786","See Bulletin","","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory37.asc","openssl.base:3.0.5.101-3.0.5.101","20230124"," ","","https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp","CVE-2022-3358:5.3 / CVE-2022-3602:7.5 / CVE-2022-3786:7.5","no" "sec","aix","InvScout","AIX is vulnerable to a privilege escalation vulnerability due to invscout","CVE-2022-36768","See Bulletin","invscout_fix3","https://aix.software.ibm.com/aix/efixes/security/invscout_advisory3.asc","invscout.rte:2.2.0.0-2.2.0.22","20220912"," ","n/a","https://aix.software.ibm.com/aix/efixes/security/invscout_fix3.tar","CVE-2022-36768:8.4","no" "sec","aix","zlib :: zlibNX","AIX is vulnerable to denial of service due to zlib and zlibNX","CVE-2022-37434","See Bulletin","rpm.rte.4.15.1.1007 rpm.rte.4.15.1.2007 IJ47324m5a.230623.epkg.Z IJ46030m3a.230623.epkg.Z IJ44986s1a.230623.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/zlib_advisory2.asc","rpm.rte:4.9.1.3-4.15.1.1006 rpm.rte:4.15.1.2000-4.15.1.2006 zlibNX.rte:7.2.4.0-7.2.4.8 zlibNX.rte:7.3.0.0-7.3.0.2 zlibNX.rte:7.3.1.0-7.3.1.0","20230725"," ","","https://aix.software.ibm.com/aix/efixes/security/zlib_fix2.tar","CVE-2022-37434:7.3","no" "sec","aix","OpenSSL","Multiple vulnerabilities in OpenSSL affect AIX","CVE-2022-3996 / CVE-2023-0401 / CVE-2022-4304 / CVE-2022-4203 / CVE-2023-0216 / CVE-2023-0215 / CVE-2023-0217 / CVE-2023-0286 / CVE-2022-4450","See Bulletin","","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory38.asc","openssl.base:1.0.2.500-1.0.2.2105 openssl.base:1.1.1.0-1.1.1.1202 openssl.base:1.1.2.0-1.1.2.1202 openssl.base:20.13.102.1000-20.16.102.2106 openssl.base:3.0.5.101-3.0.7.1000","20230321"," ","n/a","https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp&S_PKG=openssl","CVE-2023-3996:3.7 / CVE-2023-0401:7.5 / CVE-2022-4304:7.5 / CVE-2022-4203:7.5 / CVE-2023-0216:7.5 / CVE-2023-0215:7.5 / CVE-2023-0217:7.5 / CVE-2023-0286:8.2 / CVE-2022-4450:7.5","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2022-40609 / CVE-2023-22049","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/java_aug2023_advisory.asc","Java8:<8.0.0.810 Java8.jre:<8.0.0.810 Java8.sdk:<8.0.0.81 Java8_64.sdk:<8.0.0.810 Java8_64.jre:<8.0.0.810","20230831"," ","","https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0","CVE-2022-40609:8.1 / CVE-2023-22049:3.7","no" "sec","aix","Python39","AIX is affected by arbitrary code execution and denial of service due to Python","CVE-2022-40674 / CVE-2020-10735","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory2.asc","python3.9.base:3.9.0.0-3.9.13.99","20221101"," ","n/a","https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp","CVE-2022-40674:9.8 / CVE-2020-10735:7.5","no" "sec","aix","SMB","AIX is vulnerable to a denial of service due to the AIX SMB client","CVE-2022-43381","See Bulletin","null","https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory2.asc","smbc.rte:7.1.0.0-7.1.302.8 smbc.rte:7.2.0.0-7.2.302.8","20221222"," ","","https://aix.software.ibm.com/aix/efixes/security/smbcd_fix2.tar","CVE-2022-43381:6.2","no" "sec","aix","Python","AIX is affected by a denial of service due to Python","CVE-2022-43680","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory3.asc","python3.9.base:3.9.0.0-3.9.14.0","20221222"," ","","https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp","CVE-2022-43680:7.5","no" "sec","aix","Python","AIX is affected by a denial of service due to Python","CVE-2022-45061","See Bulletin","","https://aix.software.ibm.com/aix/efixes/security/python_advisory4.asc","python3.9.base:3.9.0.0-3.9.14.1","20230314"," ","","https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source=aixbp","CVE-2022-45061:7.5","no" "sec","aix","OpenSSL","Multiple vulnerabilities in OpenSSL affect AIX","CVE-2023-0464 / CVE-2023-0465 / CVE-2023-0466 / CVE-2023-2650 / CVE-2023-2975 / CVE-2023-3446 / CVE-2023-3817","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory39.asc","openssl.base:1.0.2.500-1.0.2.2106 openssl.base:1.1.1.0-1.1.1.2000 openssl.base:1.1.2.0-1.1.2.2000 openssl.base:20.13.102.1000-20.16.102.2107 openssl.base:3.0.5.101-3.0.8.1000","20230911"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp&S_PKG=openssl","CVE-2023-0464:5.3 / CVE-2023-0465:3.7 / CVE-2023-0466:3.7 / CVE-2023-2650:7.5 / CVE-2023-2975:5.3 / CVE-2023-3446:3.7 / CVE-2023-3817:3.7","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2023-21930 / CVE-2023-21937 / CVE-2023-21938 / CVE-2023-21939 / CVE-2023-21967 / CVE-2023-21968 / CVE-2023-2597","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/java_jul2023_advisory.asc","Java8:<8.0.0.805","20230711"," ","","https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere","CVE-2023-21930:7.4 / CVE-2023-21937:3.7 / CVE-2023-21938:3.7 / CVE-2023-21939:5.3 / CVE-2023-21967:5.9 / CVE-2023-21968:3.7 / CVE-2023-2597:7.0","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2023-22067 / CVE-2023-22081 / CVE-2023-5676","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/java_dec2023_advisory.asc","Java8:<8.0.0.815 Java8.jre:<8.0.0.815 Java8.sdk:<8.0.0.815 Java8_64.sdk:<8.0.0.815 Java8_64.jre:<8.0.0.815","20231218"," ","","https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&function=all","CVE-2023-22067:5.3 / CVE-2023-22081:5.3 / CVE-2023-5676:4.1","no" "sec","aix","Python","AIX is affected by security restrictions bypass due to Python","CVE-2023-24329","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory5.asc","python3.9.base:3.9.0.0-3.9.16.0","20230818"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-24329:7.5","no" "sec","aix","NTPv4","AIX is vulnerable to a denial of service due to NTP","CVE-2023-26551 / CVE-2023-26552 / CVE-2023-26553 / CVE-2023-26554","See Bulletin","IJ47973s6a.230829.epkg.Z IJ47974s4a.230829.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory14.asc","ntp.rte:7.4.2.8100-7.4.2.8153 ntp.rte:73.4.2.8151-73.4.2.8154","20231005"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix14.tar","CVE-2023-26551:5.3 / CVE-2023-26552:5.3 / CVE-2023-26553:5.3 / CVE-2023-26554:5.3","no" "sec","aix","BIND","AIX is vulnerable to denial of service due to ISC BIND","CVE-2023-2828","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/bind_advisory24.asc","bind.rte:7.1.916.0-7.1.916.2602","20230907"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-2828:7.5","no" "sec","aix","invScout","AIX is vulnerable to arbitrary command execution due to invscout","CVE-2023-28528","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/invscout_advisory4.asc","invscout.rte:2.2.0.0-2.2.0.23 invscout.rte:2.2.0.0-2.2.0.23","20230412"," ","","https://aix.software.ibm.com/aix/efixes/security/invscout_fix4.tar","CVE-2023-28528:8.4","no" "sec","aix","Perl","AIX is vulnerable to sensitive information exposure due to Perl - CVE-2023-31484","CVE-2023-31484","See Bulletin","31484s6a.231017.epkg.Z 31484m6a.231020.epkg.Z 31484s2a.231018.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/perl_advisory7.asc","perl.rte:5.28.0.0-5.28.1.6 perl.rte:5.34.0.0-5.34.1.3","20231005","20231102","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-31484:6.8","no" "sec","aix","Perl","AIX is vulnerable to sensitive information exposure due to Perl - CVE-2023-2331486","CVE-2023-31486","See Bulletin","31486s6a.231017.epkg.Z 31484m6a.231020.epkg.Z 31486s6b.231020.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/perl_advisory7.asc","perl.rte:5.28.0.0-5.28.1.7","20231005","20231102","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-31486:6.8","no" "sec","aix","BIND","AIX is vulnerable to denial of service due to ISC BIND","CVE-2023-3341","See Bulletin","IJ49093s7.231109.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc","bind.rte:7.1.916.0-7.1.916.2603 bind.rte:7.3.916.0-7.3.916.2600","20231218"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-3341:7.5","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2023-33850 / CVE-2024-20918 / CVE-2024-20921 / CVE-2024-20926 / CVE-2024-20945 / CVE-2024-20952","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/java_feb2024_advisory.asc","Java8:<8.0.0.820 Java8.jre:<8.0.0.820 Java8.sdk:<8.0.0.820 Java8_64.sdk:<8.0.0.820 Java8_64.jre:<8.0.0.820","20240307"," ","","https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&function=all","CVE-2023-33850:7.5 / CVE-2024-20918:7.4 / CVE-2024-20921:5.9 / CVE-2024-20926:5.9 / CVE-2024-20945:4.7 / CVE-2024-20952:7.4","no" "sec","aix","tcl","AIX is vulnerable to arbitrary code execution (CVE-2023-36328) due to tcl","CVE-2023-36328","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/tcl_advisory.asc","tcl.base:8.6.10.0-8.6.10.0","20241107"," ","","https://aix.software.ibm.com/aix/efixes/security/tcl_fix.tar","CVE-2023-36328:9.8","no" "sec","aix","Python","AIX is affected by multiple vulnerabilities due to Python","CVE-2023-37920 / CVE-2023-43804","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory7.asc","python3.9.base:3.9.0.0-3.9.18.0","20231221"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-37920:7.5 / CVE-2023-43804:5.9","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2023-38264 / CVE-2024-21085","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/java_jun2024_advisory.asc","Java8:<8.0.0.825 Java8.jre:<8.0.0.825 Java8.sdk:<8.0.0.825 Java8_64.sdk:<8.0.0.825 Java8_64.jre:<8.0.0.825","20240624"," ","","https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&function=all","CVE-2023-38264:5.9 / CVE-2024-21085:3.7","no" "sec","aix","Python","AIX is affected by a denial of service (CVE-2023-45167) and a security restrictions bypass (CVE-2023-40217) due to Python","CVE-2023-40217 / CVE-2023-45167","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory6.asc","python3.9.base:3.9.0.0-3.9.17.1","20231107"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-40217:7.4 / CVE-2023-45167:6.2","no" "sec","aix","BIND","AIX is vulnerable to denial of service due to ISC BIND","CVE-2023-4408 / CVE-2023-50387 / CVE-2023-50868 / CVE-2023-5517 / CVE-2023-5679 / CVE-2023-6516","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/bind_advisory26.asc","bind.rte:7.1.916.0-7.1.916.2604 bind.rte:7.2.916.0-7.2.916.2600 bind.rte:7.3.916.0-7.3.916.2601","20240604","20240605","","https://aix.software.ibm.com/aix/efixes/security/bind_fix26.tar","CVE-2023-4408:7.5 / CVE-2023-50387:7.5 / CVE-2023-50868:7.5 / CVE-2023-5517:7.5 / CVE-2023-5679:7.5 / CVE-2023-6516:7.5","no" "sec","aix","smbcd","AIX is vulnerable to a denial of service due to the AIX SMB client","CVE-2023-45165","See Bulletin","smbc_302_fileset_72.tar.gz smbc_302_fileset_73.tar.gz","https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory3.asc","smbc.rte:7.2.0.0-7.2.302.10","20231221"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-45165:6.2","no" "sec","aix","invScout","AIX is vulnerable to arbitrary command execution due to invscout","CVE-2023-45168","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/invscout_advisory5.asc","invscout.rte:2.2.0.0-2.2.0.24","20231130"," ","","https://aix.software.ibm.com/aix/efixes/security/invscout_fix5.tar","CVE-2023-45168:8.4","no" "sec","aix","Python39","AIX is affected by information disclosure (CVE-2023-45803) and arbitrary code execution (CVE-2024-6345) due to Python","CVE-2023-45803 / CVE-2024-6345","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory11.asc","python3.9.base:3.9.0.0-3.9.19.1","20240812"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-45803:4.2 / CVE-2024-6345:8.8","no" "sec","aix","Perl","AIX is vulnerable to arbitrary command execution due to Perl (CVE-2024-25021 CVE-2023-47038 CVE-2023-47100)","CVE-2023-47038 / CVE-2023-47100 / CVE-2024-25021","See Bulletin","perl5345ma.240213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/perl_advisory8.asc","perl.rte:5.34.0.0-5.34.1.5","20240221"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-47038:7.8 / CVE-2023-47100:9.8 / CVE-2024-25021:8.4","no" "sec","aix","Python39","AIX is affected by multiple vulnerabilities due to Python (CVE-2023-52425 CVE-2023-52426 CVE-2023-6597)","CVE-2023-52425 / CVE-2023-52426 / CVE-2023-6597","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory8.asc","python3.9.base:3.9.0.0-3.9.18.1","20240411"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-52425:7.5 / CVE-2023-52426:5.1 / CVE-2023-6597:8.4","no" "sec","aix","OpenSSL","AIX is vulnerable to a denial of service (CVE-2023-5678 CVE-2023-6129 CVE-2023-6237) and an attacker may obtain sensitive information (CVE-2023-5363) due to OpenSSL","CVE-2023-5363 / CVE-2023-5678 / CVE-2023-6129 / CVE-2023-6237","See Bulletin","1022107a.240107.epkg.Z 1112200a.240109.epkg.Z 1122200a.240110.epkg.Z fips2108a.240108.epkg.Z 301002sa.240122.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory40.asc","openssl.base:1.0.2.500-1.0.2.2107 openssl.base:1.1.1.0-1.1.1.2200 openssl.base:1.1.2.0-1.1.2.2200 openssl.base:20.13.102.1000-20.16.102.2108 openssl.base:3.0.0.0-3.0.10.1002","20240126"," ","","https://aix.software.ibm.com/aix/efixes/security/openssl_fix40.tar","CVE-2023-5363:5.9 / CVE-2023-5678:3.7 / CVE-2023-6129:5.9 / CVE-2023-6237:3.1","no" "sec","aix","RPM","AIX is vulnerable to arbitrary code execution due to RPM (CVE-2023-7104)","CVE-2023-7104","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/rpm_advisory2.asc","rpm.rte:4.15.1.1000-4.15.1.1012 rpm.rte:4.15.1.2000-4.15.1.2010 rpm.rte:4.18.1.2000-4.18.1.2002","20240424"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2023-7104:5.5","no" "sec","aix","Python39","AIX is affected by a denial of service (CVE-2024-0397) and information disclosure (CVE-2024-4032 CVE-2024-37891) due to Python","CVE-2024-0397 / CVE-2024-37891 / CVE-2024-4032","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory12.asc","python3.9.base:3.9.0.0-3.9.19.2","20240917"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2024-0397:7.5 / CVE-2024-37891:4.4 / CVE-2024-4032:5.3","no" "sec","aix","Python39","AIX is affected by a denial of service due to Python (CVE-2024-0450)","CVE-2024-0450","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory10.asc","python3.9.base:3.9.0.0-3.9.18.3","20240624"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2024-0450:5.5","no" "sec","aix","OpenSSL","AIX is vulnerable to a denial of service (CVE-2024-2511 CVE-2024-0727) due to OpenSSL","CVE-2024-0727 / CVE-2024-2511","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/openssl_advisory41.asc","openssl.base:1.1.1.0-1.1.1.2200 openssl.base:1.1.2.0-1.1.2.2200 openssl.base:3.0.5.101-3.0.10.1002","20240716"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp&S_PKG=openssl","CVE-2024-0727:3.1 / CVE-2024-2511:3.7","no" "sec","aix","BIND","AIX is vulnerable to a denial of service due to ISC BIND","CVE-2024-0760 / CVE-2024-1737 / CVE-2024-1975 / CVE-2024-4076","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/bind_advisory27.asc","bind.rte:7.1.916.0-7.1.916.4800 bind.rte:7.2.916.0-7.2.916.4801 bind.rte:7.3.916.0-7.3.916.4800","20241118"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix27.tar","CVE-2024-0760:7.5 / CVE-2024-1737:7.5 / CVE-2024-1975:7.5 / CVE-2024-4076:7.5","no" "sec","aix","opencryptoki","AIX is vulnerable to information disclosure due to openCryptoki (CVE-2024-0914)","CVE-2024-0914","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/opencryptoki_advisory.asc","opencki.base:3.21.0.0-3.21.0.1000","20240603"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp&S_PKG=opencryptoki","CVE-2024-0914:5.9","no" "sec","aix","Java SDK","Multiple vulnerabilities in IBM Java SDK affect AIX","CVE-2024-21131 / CVE-2024-21144 / CVE-2024-21145 / CVE-2024-27267","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/java_nov2024_advisory.asc","Java8:<8.0.0.830 Java8.jre:<8.0.0.830 Java8.sdk:<8.0.0.830 Java8_64.sdk:<8.0.0.830 Java8_64.jre:<8.0.0.830","20241111"," ","","https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=ibm~WebSphere&product=ibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29&release=8.0.0.0&function=all","CVE-2024-21131:3.7 / CVE-2024-21144:3.7 / CVE-2024-21145:4.8 / CVE-2024-27267:5.9","no" "sec","aix","Python39","AIX is affected by information disclosure due to Python (CVE-2024-28757)","CVE-2024-28757","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory9.asc","python3.9.base:3.9.0.0-3.9.18.2","20240613"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","CVE-2024-28757:7.5","no" "sec","aix","Python39","AIX is affected by multiple vulnerabilities due to Python","CVE-2024-45490 / CVE-2024-45491 / CVE-2024-45492 / CVE-2024-6923 / CVE-2024-7592 / CVE-2024-8088","See Bulletin","See Bulletin","https://aix.software.ibm.com/aix/efixes/security/python_advisory13.asc","python3.9.base:3.9.0.0-3.9.19.3","20241105"," ","","https://aix.software.ibm.com/aix/efixes/security/python_fix13.tar","CVE-2024-45490:7.5 / CVE-2024-45491:7.3 / CVE-2024-45492:7.3 / CVE-2024-6923:5.5 / CVE-2024-7592:7.5 / CVE-2024-8088:8.7","no" "hiper","vios","2.2.4.30 :: 2.2.4.40 :: 2.2.4.50","SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS","IJ00360","2.2.4.60","IJ00360m9a.180313.AIX61TL09SP09.epkg.Z IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z IJ00360sAa.171228.AIX61TL09SP10.epkg.Z IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z IV97339m7a.180329.VIOS2.2.4.40.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ00360","","20180331"," ","7100-04:IJ00519 7100-05:IJ01304 7200-01:IV96360 7200-02:IJ01262","https://aix.software.ibm.com/aix/ifixes/ij00360/"," ","yes" "hiper","vios","2.2.5.0 :: 2.2.5.10 :: 2.2.5.20 :: 2.2.5.30","SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS","IJ00360","2.2.5.40","IJ00360m9a.180313.AIX61TL09SP09.epkg.Z IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z IJ00360sAa.171228.AIX61TL09SP10.epkg.Z IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z IV97339m7a.180329.VIOS2.2.4.40.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ00360","","20180331"," ","7100-04:IJ00519 7100-05:IJ01304 7200-01:IV96360 7200-02:IJ01262","https://aix.software.ibm.com/aix/ifixes/ij00360/"," ","yes" "hiper","vios","2.2.6.0 :: 2.2.6.10","SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS","IJ00360","2.2.6.20","IJ00360m9a.180313.AIX61TL09SP09.epkg.Z IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z IJ00360sAa.171228.AIX61TL09SP10.epkg.Z IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z IV97339m7a.180329.VIOS2.2.4.40.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ00360","","20180331"," ","7100-04:IJ00519 7100-05:IJ01304 7200-01:IV96360 7200-02:IJ01262","https://aix.software.ibm.com/aix/ifixes/ij00360/"," ","yes" "hiper","aix","6100-09-08 :: 6100-09-09 :: 6100-09-10","SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS","IJ00360","6100-09-11","IJ00360m9a.180313.AIX61TL09SP09.epkg.Z IJ00360sAa.171228.AIX61TL09SP10.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ00360","devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.300","20180331"," ","7100-04:IJ00519 7100-05:IJ01304 7200-01:IV96360 7200-02:IJ01262","https://aix.software.ibm.com/aix/ifixes/ij00360/"," ","yes" "hiper","aix","7100-04-03 :: 7100-04-04 :: 7100-04-05","SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS","IJ00519","7100-04-06","IJ00519s5a.171222.AIX71TL04SP05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ00519","devices.pciex.df1060e214103404.com:7.1.4.30-7.1.4.32","20180331"," ","6100-09:IJ00360 7100-05:IJ01304 7200-01:IV96360 7200-02:IJ01262","https://aix.software.ibm.com/aix/ifixes/ij00519/"," ","yes" "sec","aix","6100-09-10 :: 6100-09-08 :: 6100-09-09","There are multiple vulnerabilities in tcpdump that impact AIX.","IJ00563 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-","6100-09-11","IV94728mAa.171008.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc","bos.net.tcp.server:6.1.9.0-6.1.9.300","20171108"," ","5300-12:IJ00568 7200-00:IJ00567 7100-03:IJ00564 7100-04:IJ00565 7200-01:IJ00567","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar","CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV","no" "sec","aix","7100-03-07 :: 7100-03-08 :: 7100-03-09","There are multiple vulnerabilities in tcpdump that impact AIX.","IJ00564 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-","See Bulletin","IV94727m9a.171009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc","bos.net.tcp.server:7.1.3.0-7.1.3.49","20171108"," ","5300-12:IJ00568 7200-00:IJ00567 7100-04:IJ00565 6100-09:IJ00563 7200-01:IJ00567","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar","CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV","no" "sec","aix","7100-04-03 :: 7100-04-04 :: 7100-04-05","There are multiple vulnerabilities in tcpdump that impact AIX.","IJ00565 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-","7100-04-06","IV94726m5a.171009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc","bos.net.tcp.server:7.1.4.0-7.1.4.32","20171108"," ","5300-12:IJ00568 7200-00:IJ00567 7100-03:IJ00564 6100-09:IJ00563 7200-01:IJ00567","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar","CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV","no" "sec","aix","7200-00-03 :: 7200-00-04 :: 7200-00-05","There are multiple vulnerabilities in tcpdump that impact AIX.","IJ00566 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-","7200-00-06","IV94724m5a.171009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc","bos.net.tcp.tcpdump:7.2.0.0-7.2.0.3","20171108"," ","5300-12:IJ00568 7100-03:IJ00564 7100-04:IJ00565 6100-09:IJ00563 7200-01:IJ00567","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar","CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV","no" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","There are multiple vulnerabilities in tcpdump that impact AIX.","IJ00567 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-","7200-01-04","IV94723m3a.171009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc","bos.net.tcp.tcpdump:7.2.1.0-7.2.1.1","20171108"," ","5300-12:IJ00568 7200-00:IJ00567 7100-03:IJ00564 7100-04:IJ00565 6100-09:IJ00563","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar","CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV","no" "sec","aix","5300-12-09","There are multiple vulnerabilities in tcpdump that impact AIX.","IJ00568 / CVE-2017-12993 / CVE-2017-12992 / CVE-2017-12991 / CVE-2017-12988 / CVE-2017-12987 / CVE-2017-12986 / CVE-2017-12985 / CVE-2017-12902 / CVE-2017-12901 / CVE-2017-12900 / CVE-2017-12899 / CVE-2017-12898 / CVE-2017-12897 / CVE-2017-12896 / CVE-2017-12895 / CVE-2017-12894 / CVE-2017-12893 / CVE-2017-11542 / CVE-2017-11541 / CVE-2017-12997 / CVE-2017-12995 / CVE-2017-12990 / CVE-2017-12989 / CVE-2017-13011 / CVE-2017-11543 / CVE-2017-13018 / CVE-2017-13017 / CVE-2017-13016 / CVE-2017-11543 / CVE-2017-13015 / CVE-2017-13014 / CVE-2017-13013 / CVE-2017-13012 / CVE-2017-13010 / CVE-2017-13009 / CVE-2017-13008 / CVE-2017-13006 / CVE-2017-13005 / CVE-2017-13004 / CVE-2017-13003 / CVE-2017-13002 / CVE-2017-13001 / CVE-2017-13000 / CVE-2017-12999 / CVE-2017-12998 / CVE-2017-12996 / CVE-2017-12994 / CVE-2017-11541 / CVE-2017-11542 / CVE-2017-13043 / CVE-2017-13042 / CVE-2017-13041 / CVE-2017-13040 / CVE-2017-13039 / CVE-2017-13038 / CVE-2017-13037 / CVE-2017-13036 / CVE-2017-13035 / CVE-","See Bulletin","IV94729m9a.171009.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc","bos.net.tcp.server:5.3.12.0-5.3.12.6","20171108"," ","7200-00:IJ00567 7100-03:IJ00564 7100-04:IJ00565 6100-09:IJ00563 7200-01:IJ00567","ftp://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar","CVE-2017-12993:5.3 / CVE-2017-12992:5.3 / CVE-2017-12991:5.3 / CVE-2017-12988:5.3 / CVE-2017-12987:5.3 / CVE-2017-12986:5.3 / CVE-2017-12985:5.3 / CVE-2017-12902:5.3 / CVE-2017-12901:5.3 / CVE-2017-12900:5.3 / CVE-2017-12899:5.3 / CVE-2017-12898:5.3 / CVE-2017-12897:5.3 / CVE-2017-12896:5.3 / CVE-2017-12895:5.3 / CVE-2017-12894:5.3 / CVE-2017-12893:5.3 / CVE-2017-11542:7.5 / CVE-2017-11541:7.5 / CVE-2017-12997:7.5 / CVE-2017-12995:7.5 / CVE-2017-12990:7.5 / CVE-2017-12989:7.5 / CVE-2017-13011:7.3 / CVE-2017-11543:7.5 / CVE-2017-13018:5.3 / CVE-2017-13017:5.3 / CVE-2017-13016:5.3 / CVE-2017-11543:7.5 / CVE-2017-13015:5.3 / CVE-2017-13014:5.3 / CVE-2017-13013:5.3 / CVE-2017-13012:5.3 / CVE-2017-13010:5.3 / CVE-2017-13009:5.3 / CVE-2017-13008:5.3 / CVE-2017-13006:5.3 / CVE-2017-13005:5.3 / CV","no" "sec","aix","5300-12-09","(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IJ00951 / CVE-2017-1692","See Bulletin","IJ00951s9a.171031.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.lvm:5.3.12.0-5.3.12.8","20180205"," ","7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","ftp://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "hiper","aix","7200-02-00 :: 7200-02-01","SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS","IJ01262","7200-02-02","IJ01262s1a.180328.AIX72TL02SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ01262","devices.pciex.df1060e214103404.com:7.2.2.0","20180331"," ","6100-09:IJ00360 7100-04:IJ00519 7100-05:IJ01304 7200-01:IV96360","https://aix.software.ibm.com/aix/ifixes/ij01262/"," ","yes" "hiper","aix","7200-02-00 :: 7200-02-01","ETHERCHANNEL NIB MODE COMMUNICATION FAILURE ON BACKUP ADAPTER","IJ01263","7200-02-02","IJ01263s1c.AIX72TL02SP00-01.180119.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ01263","devices.common.IBM.ethernet.rte:7.2.2.0","20180123"," ","","https://aix.software.ibm.com/aix/ifixes/ij01263/"," ","yes" "hiper","aix","7100-05-00 :: 7100-05-01","SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS","IJ01304","7100-05-02","IJ01304s1a.180328.AIX71TL05SP00-01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ01304","devices.pciex.df1060e214103404.com:7.1.5.0","20180331"," ","6100-09:IJ00360 7100-04:IJ00519 7200-01:IV96360 7200-02:IJ01262","https://aix.software.ibm.com/aix/ifixes/ij01304/"," ","yes" "hiper","vios","2.2.6.0 :: 2.2.6.10","After updating all VIOS SSP nodes -- Node Upgrade Status still shows UP_LEVEL","IJ02674","2.2.6.20","IJ02674sAa.VIOS2.2.6.0.171215.epkg.Z IJ02674sAa.VIOS2.2.6.10.171215.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ02674","pool.basic.rte:6.1.9.300","20171219"," ","","https://aix.software.ibm.com/aix/ifixes/ij02674/"," ","yes" "sec","aix","6100-09-10 :: 6100-09-08 :: 6100-09-09","Vulnerability impacts AIX and VIOS (CVE-2018-1383)","IJ02726 / CVE-2018-1383","6100-09-11","IJ02726s8a.171221.epkg.Z IJ02726s9a.171221.epkg.Z IJ02726sAa.171221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc","bos.cluster.rte:6.1.9.0-6.1.9.300","20180208"," ","7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825","https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar","CVE-2018-1383:9.1","no" "sec","vios","2.2.4.30 :: 2.2.4.40","Vulnerability impacts VIOS and VIOS (CVE-2018-1383)","IJ02726 / CVE-2018-1383","6100-09-11","IJ02726s8a.171221.epkg.Z IJ02726s9a.171221.epkg.Z IJ02726sAa.171221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc","bos.cluster.rte:6.1.9.0-6.1.9.300","20180208"," ","7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825","https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar","CVE-2018-1383:9.1","no" "sec","vios","2.2.5.10 :: 2.2.5.20 :: 2.2.5.30","Vulnerability impacts VIOS and VIOS (CVE-2018-1383)","IJ02726 / CVE-2018-1383","6100-09-11","IJ02726s8a.171221.epkg.Z IJ02726s9a.171221.epkg.Z IJ02726sAa.171221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc","bos.cluster.rte:6.1.9.0-6.1.9.300","20180208"," ","7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825","https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar","CVE-2018-1383:9.1","no" "sec","vios","2.2.6.0 :: 2.2.6.10","Vulnerability impacts VIOS and VIOS (CVE-2018-1383)","IJ02726 / CVE-2018-1383","6100-09-11","IJ02726s8a.171221.epkg.Z IJ02726s9a.171221.epkg.Z IJ02726sAa.171221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc","bos.cluster.rte:6.1.9.0-6.1.9.300","20180208"," ","7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825","https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar","CVE-2018-1383:9.1","no" "sec","aix","7100-05-00 :: 7100-05-01","Vulnerability impacts AIX and VIOS (CVE-2018-1383)","IJ02727 / CVE-2018-1383","7100-05-02","IJ02727s1a.171221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc","bos.cluster.rte:7.1.5.0-7.1.5.0","20180208"," ","7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-04:IJ02825 6100-09:IJ02726","https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar","CVE-2018-1383:9.1","no" "sec","aix","7200-02-00 :: 7200-02-01","Vulnerability impacts AIX and VIOS (CVE-2018-1383)","IJ02729 / CVE-2018-1383","7200-02-02","IJ02729s1a.171221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc","bos.cluster.rte:7.2.2.0-7.2.2.0","20180208"," ","7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825 6100-09:IJ02726","https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar","CVE-2018-1383:9.1","no" "sec","aix","7100-04-03 :: 7100-04-04 :: 7100-04-05","Vulnerability impacts AIX and VIOS (CVE-2018-1383)","IJ02825 / CVE-2018-1383","7100-04-06","IJ02825s3a.171221.epkg.Z IJ02825s4a.171221.epkg.Z IJ02825s5a.171221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc","bos.cluster.rte:7.1.4.0-7.1.4.32","20180208"," ","7200-02:IJ02729 7200-01:IJ02828 7200-00:IJ02827 7100-05:IJ02727 6100-09:IJ02726","https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar","CVE-2018-1383:9.1","no" "sec","aix","7200-00-03 :: 7200-00-04 :: 7200-00-05","Vulnerability impacts AIX and VIOS (CVE-2018-1383)","IJ02827 / CVE-2018-1383","7200-00-06","IJ02827s3a.171221.epkg.Z IJ02827s4a.171221.epkg.Z IJ02827s5a.171221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc","bos.cluster.rte:7.2.0.0-7.2.0.5","20180208"," ","7200-02:IJ02729 7200-01:IJ02828 7100-05:IJ02727 7100-04:IJ02825 6100-09:IJ02726","https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar","CVE-2018-1383:9.1","no" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","Vulnerability impacts AIX and VIOS (CVE-2018-1383)","IJ02828 / CVE-2018-1383","7200-01-04","IJ02828s1a.171221.epkg.Z IJ02828s2a.171221.epkg.Z IJ02828s3a.171221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc","bos.cluster.rte:7.2.1.0-7.2.1.2","20180208"," ","7200-02:IJ02729 7200-00:IJ02827 7100-05:IJ02727 7100-04:IJ02825 6100-09:IJ02726","https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar","CVE-2018-1383:9.1","no" "hiper","aix","7100-05-00 :: 7100-05-01 :: 7100-05-02","POWERHA NODE HALT DURING IP CHANGES","IJ02843","7100-05-03","IJ02843s0a.180215.71TL05SP00-02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ02843","rsct.basic.rte:3.2.3.0-3.2.3.0 ","20180228"," ","7200-02:IJ02843","https://aix.software.ibm.com/aix/ifixes/ij02843/"," ","yes" "hiper","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","POWERHA NODE HALT DURING IP CHANGES","IJ02843","7200-02-03","IJ02843s0a.180215.72TL00SP00-02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ02843","rsct.basic.rte:3.2.3.0-3.2.3.0 ","20180228"," ","7100-05:IJ02843","https://aix.software.ibm.com/aix/ifixes/ij02843/"," ","yes" "sec","aix","6100-09-10 :: 6100-09-11 :: 6100-09-09","Vulnerability in sendmail impacts AIX (CVE-2014-3956)","IJ02915 / CVE-2014-3956","6100-09-12","IJ02915s9a.180110.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc","bos.net.tcp.client:6.1.9.0-6.1.9.315","20180406"," ","7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar","CVE-2014-3956:2.1","no" "sec","vios","2.2.5.20 :: 2.2.5.30","Vulnerability in sendmail impacts VIOS (CVE-2014-3956)","IJ02915 / CVE-2014-3956","2.2.5.50","IJ02915s9a.180110.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc","bos.net.tcp.client:6.1.9.0-6.1.9.315","20180406"," ","7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar","CVE-2014-3956:2.1","no" "sec","vios","2.2.6.10 :: 2.2.6.20 :: 2.2.6.21","Vulnerability in sendmail impacts VIOS (CVE-2014-3956)","IJ02915 / CVE-2014-3956","2.2.6.30","IJ02915s9a.180110.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc","bos.net.tcp.client:6.1.9.0-6.1.9.315","20180406"," ","7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar","CVE-2014-3956:2.1","no" "sec","vios","2.2.4.40 :: 2.2.4.50","Vulnerability in sendmail impacts VIOS (CVE-2014-3956)","IJ02915 / CVE-2014-3956","See Bulletin","IJ02915s9a.180110.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc","bos.net.tcp.client:6.1.9.0-6.1.9.315","20180406"," ","7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar","CVE-2014-3956:2.1","no" "sec","aix","7100-04-03 :: 7100-04-04 :: 7100-04-05","Vulnerability in sendmail impacts AIX (CVE-2014-3956)","IJ02917 / CVE-2014-3956","7100-04-07","IJ02917s3a.180105.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc","bos.net.tcp.client:7.1.4.0-7.1.4.32","20180406"," ","7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 6100-09:IJ02915","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar","CVE-2014-3956:2.1","no" "sec","aix","7200-00-03 :: 7200-00-04 :: 7200-00-05","Vulnerability in sendmail impacts AIX (CVE-2014-3956)","IJ02918 / CVE-2014-3956","7200-00-07","IJ02918s3a.180108.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc","bos.net.tcp.sendmail:7.2.0.0-7.2.0.2","20180406"," ","7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7100-05:IJ03121 7100-04:IJ02917 6100-09:IJ02915","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar","CVE-2014-3956:2.1","no" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","Vulnerability in sendmail impacts AIX (CVE-2014-3956)","IJ02919 / CVE-2014-3956","7200-01-05","IJ02919s1a.180108.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc","bos.net.tcp.sendmail:7.2.1.0-7.2.1.1","20180406"," ","7200-02:IJ02920 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917 6100-09:IJ02915","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar","CVE-2014-3956:2.1","no" "sec","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","Vulnerability in sendmail impacts AIX (CVE-2014-3956)","IJ02920 / CVE-2014-3956","7200-02-03","IJ02920s0a.180110.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc","bos.net.tcp.sendmail:7.2.2.0-7.2.2.15","20180406"," ","7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917 6100-09:IJ02915","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar","CVE-2014-3956:2.1","no" "sec","aix","5300-12-09","IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.","IJ03029 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754","See Bulletin","IJ03029m9c.180124.epkg.Z IJ03029m9a.180117.epkg.Z IJ03029m9b.180117.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc","bos.mp:5.3.12.0-5.3.12.9 bos.mp64:5.3.12.0-5.3.12.10","20180125","20180209","2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032 6100-09:IJ03030","ftp://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar","CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0","no" "sec","aix","6100-09-08 :: 6100-09-09 :: 6100-09-10","IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.","IJ03030 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754","6100-09-11","IJ03030m8a.180117.epkg.Z IJ03030m9a.180116.epkg.Z IJ03030mAa.180116.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc","bos.mp64:6.1.9.0-6.1.9.300","20180125","20180209","2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar","CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0","no" "sec","vios","2.2.4.30 :: 2.2.4.40 :: 2.2.4.50","IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.","IJ03030 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754","6100-09-11","IJ03030m8a.180117.epkg.Z IJ03030m9a.180116.epkg.Z IJ03030m9b.180116.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc","bos.mp64:6.1.9.0-6.1.9.300","20180125","20180209","2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar","CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0","no" "sec","vios","2.2.5.10 :: 2.2.5.20 :: 2.2.5.30","IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.","IJ03030 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754","6100-09-11","IJ03030m8a.180117.epkg.Z IJ03030m9a.180116.epkg.Z IJ03030m9b.180116.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc","bos.mp64:6.1.9.0-6.1.9.300","20180125","20180209","2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar","CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0","no" "sec","vios","2.2.6.0 :: 2.2.6.10","IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.","IJ03030 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754","6100-09-11","IJ03030mAa.180116.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc","bos.mp64:6.1.9.0-6.1.9.300","20180125","20180209","2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar","CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0","no" "sec","aix","7100-04-03 :: 7100-04-04 :: 7100-04-05","IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.","IJ03032 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754","7100-04-06","IJ03032m3a.180125.epkg.Z IJ03032m3b.180125.epkg.Z IJ03032m4a.180125.epkg.Z IJ03032m5a.180116.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc","bos.mp64:7.1.4.0-7.1.4.33","20180125","20180209","2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 6100-09:IJ03030","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar","CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0","no" "sec","aix","7100-05-00 :: 7100-05-01","IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.","IJ03033 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754","7100-05-02","IJ03033m1a.180116.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc","bos.mp64:7.1.5.0-7.1.5.0","20180125","20180209","2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-04:IJ03032 6100-09:IJ03030","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar","CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0","no" "sec","aix","7200-00-03 :: 7200-00-04 :: 7200-00-05","IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.","IJ03034 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754","7200-00-06","IJ03034m3a.180117.epkg.Z IJ03034m4a.180117.epkg.Z IJ03034m5a.180117.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc","bos.mp64:7.2.0.0-7.2.0.5","20180125","20180209","2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 7200-01:IJ03035 5300-12:IJ03029 7100-05:IJ03033 7100-04:IJ03032 6100-09:IJ03030","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar","CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0","no" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.","IJ03035 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754","7200-01-04","IJ03035m1a.180118.epkg.Z IJ03035m1b.180118.epkg.Z IJ03035m2a.180118.epkg.Z IJ03035m3a.180117.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc","bos.mp64:7.2.1.0-7.2.1.4","20180125","20180209","2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-02:IJ03036 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032 6100-09:IJ03030","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar","CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0","no" "sec","aix","7200-02-00 :: 7200-02-01","IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.","IJ03036 / CVE-2017-5715 / CVE-2017-5753 / CVE-2017-5754","7200-02-02","IJ03036m1a.180116.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc","bos.mp64:7.2.2.0-7.2.2.0","20180125","20180209","2.2.6:IJ03030 2.2.5:IJ03030 2.2.4:IJ03030 7200-01:IJ03035 5300-12:IJ03029 7200-00:IJ03034 7100-05:IJ03033 7100-04:IJ03032 6100-09:IJ03030","https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar","CVE-2017-5715:0 / CVE-2017-5753:0 / CVE-2017-5754:0","no" "sec","aix","7100-05-00 :: 7100-05-01 :: 7100-05-02","Vulnerability in sendmail impacts AIX (CVE-2014-3956)","IJ03121 / CVE-2014-3956","7100-05-04","IJ03121s0a.180110.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc","bos.net.tcp.client:7.1.5.0-7.1.5.15","20180406"," ","7200-02:IJ02920 7200-01:IJ02919 5300-12:IJ03273 7200-00:IJ02918 7100-04:IJ02917 6100-09:IJ02915","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar","CVE-2014-3956:2.1","no" "hiper","vios","2.2.5.40","SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED","IJ03186","2.2.5.50","IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ03186","devices.ethernet.mlx.rte:6.1.9.315 ","20180428"," ","","https://aix.software.ibm.com/aix/ifixes/ij03186/"," ","yes" "hiper","vios","2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.21","SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED","IJ03186","2.2.6.30","IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ03186","devices.ethernet.mlx.rte:6.1.9.300-6.1.9.315 ","20180428"," ","","https://aix.software.ibm.com/aix/ifixes/ij03186/"," ","yes" "hiper","vios","2.2.4.60","SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED","IJ03186","See Advisory","IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ03186","devices.ethernet.mlx.rte:6.1.9.315","20180428"," ","","https://aix.software.ibm.com/aix/ifixes/ij03186/"," ","yes" "sec","aix","5300-12-09","Vulnerability in sendmail impacts AIX (CVE-2014-3956)","IJ03273 / CVE-2014-3956","See Bulletin","IJ03273s9a.180116.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10 bos.net.tcp.server:5.3.12.0-5.3.12.6","20180406"," ","7200-02:IJ02920 7200-01:IJ02919 7200-00:IJ02918 7100-05:IJ03121 7100-04:IJ02917 6100-09:IJ02915","ftp://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar","CVE-2014-3956:2.1","no" "hiper","aix","7200-02-00 :: 7200-02-01","APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP","IJ04075","7200-02-02","IJ04075s1a.180306.72TL02SP00-01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04075","bos.rte.libc:7.2.2.0-7.2.2.0 ","20180310"," ","6100-09:IJ04511 7100-05:IJ04510","https://aix.software.ibm.com/aix/ifixes/ij04075/"," ","yes" "hiper","aix","7100-05-00 :: 7100-05-01 :: 7100-05-02","POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES","IJ04266","7100-05-03","IJ04266m1a.180226.AIX71TL05SP00-01.epkg.Z IJ04266s2a.180403.AIX71TL05SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04266","bos.cluster.rte:7.1.5.0-7.1.5.15 ","20180405"," ","6100-09:IJ04279 7100-04:IJ04512 7200-01:IJ04267 7200-02:IJ04268","https://aix.software.ibm.com/aix/ifixes/ij04266/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04","POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES","IJ04267","7200-01-05","IJ04267m2a.180403.AIX72TL01SP02.epkg.Z IJ04267m3a.180403.AIX72TL01SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04267","bos.cluster.rte:7.2.1.0-7.2.1.3 ","20180405"," ","6100-09:IJ04279 7100-04:IJ04512 7100-05:IJ04266 7200-02:IJ04268","https://aix.software.ibm.com/aix/ifixes/ij04267/"," ","yes" "hiper","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES","IJ04268","7200-02-03","IJ04268s2a.180403.AIX72TL02SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04268","bos.cluster.rte:7.2.2.0-7.2.2.15 ","20180405"," ","6100-09:IJ04279 7100-04:IJ04512 7100-05:IJ04266 7200-01:IJ04267","https://aix.software.ibm.com/aix/ifixes/ij04268/"," ","yes" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09 :: 6100-09-10 :: 6100-09-11","POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES","IJ04279","6100-09-12","IJ04279m9a.180404.AIX61TL09SP09.epkg.Z IJ04279mAa.180220.AIX61TL09SP10.epkg.Z IJ04279sBa.180419.AIX61TL09SP11.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04279","bos.cluster.rte:6.1.9.0-6.1.9.315 ","20180405"," ","7100-04:IJ04512 7100-05:IJ04266 7200-01:IJ04267 7200-02:IJ04268","https://aix.software.ibm.com/aix/ifixes/ij04279/"," ","yes" "hiper","aix","7100-05-00 :: 7100-05-01","APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP","IJ04510","7100-05-02","IJ04510s1a.180306.71TL05SP00-01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04510","bos.rte.libc:7.1.5.0-7.1.5.0 ","20180310"," ","6100-09:IJ04511 7200-02:IJ04075","https://aix.software.ibm.com/aix/ifixes/ij04510/"," ","yes" "hiper","vios","2.2.6.0 :: 2.2.6.10","APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP","IJ04511","2.2.6.20","IJ04511sAa.180308.AIX61TL09SP10.epkg.Z IJ04511sAa.180308.VIOS2.2.6.0-10.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04511","bos.rte.libc:6.1.9.300-6.1.9.300 ","20180310"," ","7100-05:IJ04510 7200-02:IJ04075","https://aix.software.ibm.com/aix/ifixes/ij04511/"," ","yes" "hiper","aix","6100-09-10","APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP","IJ04511","6100-09-11","IJ04511sAa.180308.AIX61TL09SP10.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04511","bos.rte.libc:6.1.9.300-6.1.9.300 ","20180310"," ","7100-05:IJ04510 7200-02:IJ04075","https://aix.software.ibm.com/aix/ifixes/ij04511/"," ","yes" "hiper","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05 :: 7100-04-06","POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES","IJ04512","7100-04-07","IJ04512m5a.180313.AIX71TL04SP05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04512","bos.cluster.rte:7.1.4.0-7.1.4.33 ","20180405"," ","6100-09:IJ04279 7100-05:IJ04266 7200-01:IJ04267 7200-02:IJ04268","https://aix.software.ibm.com/aix/ifixes/ij04512/"," ","yes" "hiper","vios","2.2.5.0 :: 2.2.5.10 :: 2.2.5.20 :: 2.2.5.30 :: 2.2.5.40","Multiple issues with VIOS SSP poolfs including potential data loss","IJ04826","2.2.5.50","IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04826","pool.basic.rte:6.1.9.200-6.1.9.203","20180605"," ","","https://aix.software.ibm.com/aix/ifixes/ij04826/"," ","yes" "hiper","vios","2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.21","Multiple issues with VIOS SSP poolfs including potential data loss","IJ04826","2.2.6.30","IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04826","pool.basic.rte:6.1.9.300-6.1.9.315","20180605"," ","","https://aix.software.ibm.com/aix/ifixes/ij04826/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40 :: 2.2.4.50 :: 2.2.4.60","Multiple issues with VIOS SSP poolfs including potential data loss","IJ04826","See Advisory","IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ04826","pool.basic.rte:6.1.9.100-6.1.9.107","20180605"," ","","https://aix.software.ibm.com/aix/ifixes/ij04826/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06","POSSIBLE HANG DURING POWERHA VERIFY & SYNC AND OTHER PROCESSES","IJ05429","7200-00-07","IJ05429m5b.180403.AIX72TL00SP05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ05429","bos.cluster.rte:7.2.0.0-7.2.0.6 ","20180405"," ","6100-09:IJ04279 7100-04:IJ04512 7100-05:IJ04266 7200-01:IJ04267 7200-02:IJ04268","https://aix.software.ibm.com/aix/ifixes/ij05429/"," ","yes" "sec","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05818 / CVE-2018-3639","7200-02-03","IJ05818m1a.180423.epkg.Z IJ05818s2a.180420.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:7.2.2.0-7.2.2.16","20180522","20180606","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","7200-02-02","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05818 / CVE-2018-3639","7200-02-03","IJ05818s2a.180420.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:7.2.2.0-7.2.2.16","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","7200-01-02 :: 7200-01-03 :: 7200-01-04","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05820 / CVE-2018-3639","7200-01-05","IJ05820m2a.180430.epkg.Z IJ05820m3a.180430.epkg.Z IJ05820m4a.180423.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:7.2.1.0-7.2.1.5","20180522","20180606","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","7200-01-04","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05820 / CVE-2018-3639","7200-01-05","IJ05820m4a.180423.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:7.2.1.0-7.2.1.5","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","7200-00-04 :: 7200-00-05 :: 7200-00-06","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05821 / CVE-2018-3639","See Bulletin","IJ05821m4a.180430.epkg.Z IJ05821m5a.180430.epkg.Z IJ05821m6a.180424.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:7.2.0.0-7.2.0.6","20180522","20180606","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","7200-00-06","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05821 / CVE-2018-3639","See Bulletin","IJ05821m6a.180424.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:7.2.0.0-7.2.0.6","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","7100-05-00 :: 7100-05-01 :: 7100-05-02","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05822 / CVE-2018-3639","7100-05-03","IJ05822m1a.180430.epkg.Z IJ05822s2a.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:7.1.5.0-7.1.5.16","20180522","20180606","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","7100-05-02","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05822 / CVE-2018-3639","7100-05-03","IJ05822s2a.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:7.1.5.0-7.1.5.16","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","7100-04-04 :: 7100-04-05 :: 7100-04-06","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05823 / CVE-2018-3639","7100-04-07","IJ05823m4a.180501.epkg.Z IJ05823m5a.180430.epkg.Z IJ05823m6a.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:7.1.4.0-7.1.4.34","20180522","20180606","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","7100-04-06","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05823 / CVE-2018-3639","7100-04-07","IJ05823m6a.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:7.1.4.0-7.1.4.34","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","6100-09-09 :: 6100-09-10 :: 6100-09-11","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05824 / CVE-2018-3639","6100-09-12","IJ05824m9a.180501.epkg.Z IJ05824mAa.180501.epkg.Z IJ05824sBa.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:6.1.9.0-6.1.9.316","20180522","20180606","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","6100-09-11","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05824 / CVE-2018-3639","6100-09-12","IJ05824sBa.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:6.1.9.0-6.1.9.316","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","vios","2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.21","IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05824 / CVE-2018-3639","2.2.6.22","IJ05824mAa.180501.epkg.Z IJ05824sBa.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:6.1.9.0-6.1.9.316","20180522","20180606","2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","vios","2.2.6.20 :: 2.2.6.21","IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05824 / CVE-2018-3639","2.2.6.22","IJ05824sBa.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:6.1.9.0-6.1.9.316","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","vios","2.2.6.20 :: 2.2.6.40 :: 2.2.6.60","IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05824 / CVE-2018-3639","6100-09-12","IJ05824sBa.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:6.1.9.0-6.1.9.316","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","vios","2.2.4.40 :: 2.2.4.50 :: 2.2.4.60","IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05824 / CVE-2018-3639","See Bulletin","IJ05824m9a.180501.epkg.Z IJ05824m9b.180502.epkg.Z IJ05824sBa.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:6.1.9.0-6.1.9.316","20180522","20180606","2.2.6:IJ05824 2.2.5:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","vios","2.2.4.60","IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05824 / CVE-2018-3639","See Bulletin","IJ05824sBa.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:6.1.9.0-6.1.9.316","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","vios","2.2.5.20 :: 2.2.5.30 :: 2.2.5.40","IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05824 / CVE-2018-3639","See Bulletin","IJ05824m9a.180501.epkg.Z IJ05824m9b.180502.epkg.Z IJ05824sBa.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:6.1.9.0-6.1.9.316","20180522","20180606","2.2.6:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","vios","2.2.5.40","IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05824 / CVE-2018-3639","See Bulletin","IJ05824sBa.180426.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:6.1.9.0-6.1.9.316","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 5300-12:IJ05826 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "sec","aix","5300-12-09","IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.","IJ05826 / CVE-2018-3639","See Bulletin","IJ05826m9b.180427.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc","bos.mp64:5.3.12.0-5.3.12.10","20180522"," ","2.2.6:IJ05824 2.2.5:IJ05824 2.2.4:IJ05824 7200-02:IJ05818 7200-01:IJ05820 7200-00:IJ05821 7100-05:IJ05822 7100-04:IJ05823 6100-09:IJ05824","ftp://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar","CVE-2018-3639:0","no" "hiper","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","UNDETECTED DATA CORRUPTION POSSIBLE WITH DEFRAGFS -F COMMAND","IJ06486","7200-02-03","IJ06486s2b.72TL02SP02.180524.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ06486","bos.mp64:7.2.2.0-7.2.2.17 ","20180525"," ","","https://aix.software.ibm.com/aix/ifixes/ij06486/"," ","yes" "hiper","vios","2.2.5.0 :: 2.2.5.10 :: 2.2.5.20 :: 2.2.5.30 :: 2.2.5.40","Adapter firmware upgrade can fail or adapter may become unusable","IJ06644","2.2.5.50","IJ06644sAa.180917.AIX61TL09SP10.epkg.Z IJ06644sBa.180615.AIX61TL09SP11.epkg.Z IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z IJ06644sCa.180917.AIX61TL09SP12.epkg.Z IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ06644","devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.315","20181013"," ","6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641","https://aix.software.ibm.com/aix/ifixes/ij06644/"," ","yes" "hiper","vios","2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.30 :: 2.2.6.31","Adapter firmware upgrade can fail or adapter may become unusable","IJ06644","2.2.6.32","IJ06644sAa.180917.AIX61TL09SP10.epkg.Z IJ06644sBa.180615.AIX61TL09SP11.epkg.Z IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z IJ06644sCa.180917.AIX61TL09SP12.epkg.Z IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ06644","devices.pciex.df1060e214103404.com:6.1.9.300-6.1.9.400","20181013"," ","6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641","https://aix.software.ibm.com/aix/ifixes/ij06644/"," ","yes" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09 :: 6100-09-10 :: 6100-09-11 :: 6100-09-12","Adapter firmware upgrade can fail or adapter may become unusable","IJ06644","6100-09-12-1838","IJ06644sAa.180917.AIX61TL09SP10.epkg.Z IJ06644sBa.180615.AIX61TL09SP11.epkg.Z IJ06644sCa.180917.AIX61TL09SP12.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ06644","devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.400","20181013"," ","7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641","https://aix.software.ibm.com/aix/ifixes/ij06644/"," ","yes" "sec","aix","6100-09-09 :: 6100-09-10 :: 6100-09-11","Vulnerabilities in NTP affect AIX","IJ06651 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","6100-09-12","IJ06651m9a.180528.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","bos.net.tcp.client:6.1.9.0-6.1.9.315","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","aix","6100-09-09 :: 6100-09-10 :: 6100-09-11","Vulnerabilities in NTP affect AIX","IJ06651 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","See Bulletin","IJ06400s9a.180514.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","See Bulletin","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","vios","2.2.5.20 :: 2.2.5.30 :: 2.2.5.40","Vulnerabilities in NTP affect VIOS","IJ06651 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","2.2.5.50","IJ06651m9a.180528.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","See Bulletin","20180814"," ","2.2.6:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","vios","2.2.6.0 :: 2.2.6.10 :: 2.2.6.21","Vulnerabilities in NTP affect VIOS","IJ06651 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","2.2.6.30","IJ06651m9a.180528.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","See Bulletin","20180814"," ","2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","vios","2.2.4.40 :: 2.2.4.50 :: 2.2.4.60","Vulnerabilities in NTP affect VIOS","IJ06651 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","See Bulletin","IJ06651m9a.180528.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","See Bulletin","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","aix","7100-04-04 :: 7100-04-05 :: 7100-04-06","Vulnerabilities in NTP affect AIX","IJ06652 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","7100-04-07","IJ06652m4a.180528.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","bos.net.tcp.client:7.1.4.0-7.1.4.33","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","aix","7100-05-00 :: 7100-05-01 :: 7100-05-02","Vulnerabilities in NTP affect AIX","IJ06653 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","7100-05-03","IJ06653m0a.180527.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","bos.net.tcp.client:7.1.5.0-7.1.5.15","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","aix","7200-00-04 :: 7200-00-05 :: 7200-00-06","Vulnerabilities in NTP affect AIX","IJ06654 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","See Bulletin","IJ06654m4a.180527.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","bos.net.tcp.ntpd:7.2.0.0-7.2.0.4","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","aix","7200-01-02 :: 7200-01-03 :: 7200-01-04","Vulnerabilities in NTP affect AIX","IJ06655 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","7200-01-05","IJ06655m2a.180527.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","bos.net.tcp.ntpd:7.2.1.0-7.2.1.2","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","Vulnerabilities in NTP affect AIX","IJ06656 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","7200-02-03","IJ06656m0a.180527.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","bos.net.tcp.ntpd:7.2.2.0-7.2.2.15","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 5300-12:IJ06657 7100-05:IJ06653 7100-04:IJ06652","https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","aix","5300-12-09","Vulnerabilities in NTP affect AIX","IJ06657 / CVE-2014-5209 / CVE-2018-7182 / CVE-2018-7183 / CVE-2018-7170 / CVE-2018-7184 / CVE-2018-7185 / CVE-2016-1549","See Bulletin","IJ06657m9a.180529.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20180814"," ","2.2.6:IJ06651 2.2.5:IJ06651 2.2.4:IJ06651 7200-02:IJ06656 7200-01:IJ06655 7200-00:IJ06654 6100-09:IJ06651 7100-05:IJ06653 7100-04:IJ06652","ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar","CVE-2014-5209:5.0 / CVE-2018-7182:5.3 / CVE-2018-7183:5.6 / CVE-2018-7170:3.1 / CVE-2018-7184:3.1 / CVE-2018-7185:3.1 / CVE-2016-1549:5.3","no" "sec","aix","7100-05-00 :: 7100-05-01 :: 7100-05-02","Vulnerability in rmsock affects AIX (CVE-2018-1655)","IJ06904 / CVE-2018-1655","7100-05-03","IJ06904s5a.180607.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","bos.net.tcp.client:7.1.5.0-7.1.5.15","20180621","20180703","2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-04:IJ06906 6100-09:IJ06905","https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","aix","6100-09-09 :: 6100-09-10 :: 6100-09-11","Vulnerability in rmsock affects AIX (CVE-2018-1655)","IJ06905 / CVE-2018-1655","6100-09-12","IJ06905s9a.180608.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","bos.net.tcp.client:6.1.9.0-6.1.9.315","20180621","20180703","2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906","https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","vios","2.2.5.20 :: 2.2.5.30 :: 2.2.5.40","Vulnerability in rmsock affects VIOS (CVE-2018-1655)","IJ06905 / CVE-2018-1655","2.2.5.50","IJ06905s9a.180608.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","See Bulletin","20180621","20180703","2.2.6:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905","https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","vios","2.2.6.10 :: 2.2.6.20 :: 2.2.6.21","Vulnerability in rmsock affects VIOS (CVE-2018-1655)","IJ06905 / CVE-2018-1655","2.2.6.30","IJ06905s9a.180608.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","See Bulletin","20180621","20180703","2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905","https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","vios","2.2.6.20 :: 2.2.6.21","Vulnerability in rmsock affects VIOS (CVE-2018-1655)","IJ06905 / CVE-2018-1655","2.2.6.30","IJ06905s9a.180608.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","See Bulletin","20180621"," ","7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905","https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","vios","2.2.4.40 :: 2.2.4.50 :: 2.2.4.60","Vulnerability in rmsock affects VIOS (CVE-2018-1655)","IJ06905 / CVE-2018-1655","See Bulletin","IJ06905s9a.180608.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","See Bulletin","20180621","20180703","2.2.6:IJ06905 2.2.5:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905","https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","aix","7100-04-04 :: 7100-04-05 :: 7100-04-06","Vulnerability in rmsock affects AIX (CVE-2018-1655)","IJ06906 / CVE-2018-1655","7100-04-07","IJ06906s4a.180607.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","bos.net.tcp.client:7.1.4.0-7.1.4.33","20180621","20180703","2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 6100-09:IJ06905","https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","aix","7200-01-02 :: 7200-01-03 :: 7200-01-04","Vulnerability in rmsock affects AIX (CVE-2018-1655)","IJ06907 / CVE-2018-1655","7200-01-05","IJ06907s1a.180607.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","bos.net.tcp.client_core:7.2.1.0-7.2.1.3","20180621","20180703","2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905","https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","Vulnerability in rmsock affects AIX (CVE-2018-1655)","IJ06908 / CVE-2018-1655","7200-02-03","IJ06908s2a.180607.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","bos.net.tcp.client_core:7.2.2.0-7.2.2.16","20180621","20180703","2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-01:IJ06907 5300-12:IJ06935 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905","https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","aix","7200-00-04 :: 7200-00-05 :: 7200-00-06","Vulnerability in rmsock affects AIX (CVE-2018-1655)","IJ06934 / CVE-2018-1655","See Bulletin","IJ06934s0a.180607.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","bos.net.tcp.client_core:7.2.0.0-7.2.0.5","20180621","20180703","2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 5300-12:IJ06935 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905","https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","aix","5300-12-09","Vulnerability in rmsock affects AIX (CVE-2018-1655)","IJ06935 / CVE-2018-1655","See Bulletin","IJ06935s1a.180611.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20180621","20180703","2.2.6:IJ06905 2.2.5:IJ06905 2.2.4:IJ06905 7200-02:IJ06908 7200-01:IJ06907 7200-00:IJ06934 7100-05:IJ06904 7100-04:IJ06906 6100-09:IJ06905","ftp://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar","CVE-2018-1655:4","no" "sec","aix","7200-02-01 :: 7200-02-02","IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.","IJ07497 / CVE-2017-5715","7200-02-03","IJ07497m1a.180717.epkg.Z IJ07497m2a.180713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc","bos.mp64:7.2.2.0-7.2.2.16","20180817"," ","2.2.6:IJ07498 2.2.5:IJ07498 2.2.4:IJ07498 7200-01:IJ07501 7100-05:IJ07500 7100-04:IJ07499 6100-09:IJ07498","https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar","CVE-2017-5715:0","no" "sec","aix","6100-09-09 :: 6100-09-10 :: 6100-09-11","IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.","IJ07498 / CVE-2017-5715","6100-09-12","IJ07498m9a.180726.epkg.Z IJ07498mAa.180717.epkg.Z IJ07498mBa.180713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc","bos.mp64:6.1.9.0-6.1.9.316","20180817"," ","2.2.6:IJ07498 2.2.5:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-05:IJ07500 7100-04:IJ07499","https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar","CVE-2017-5715:0","no" "sec","vios","2.2.5.20 :: 2.2.5.30 :: 2.2.5.40","IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.","IJ07498 / CVE-2017-5715","2.2.5.50","IJ07498m9a.180726.epkg.Z IJ07498m9b.180726.epkg.Z IJ07498mBa.180713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc","See Bulletin","20180817"," ","2.2.6:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-05:IJ07500 7100-04:IJ07499 6100-09:IJ07498","https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar","CVE-2017-5715:0","no" "sec","vios","2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.21","IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.","IJ07498 / CVE-2017-5715","2.2.6.23","IJ07498mAa.180717.epkg.Z IJ07498mBa.180713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc","See Bulletin","20180817"," ","2.2.5:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-05:IJ07500 7100-04:IJ07499 6100-09:IJ07498","https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar","CVE-2017-5715:0","no" "sec","vios","2.2.4.40 :: 2.2.4.50 :: 2.2.4.60","IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.","IJ07498 / CVE-2017-5715","See Bulletin","IJ07498m9a.180726.epkg.Z IJ07498m9b.180726.epkg.Z IJ07498mBa.180713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc","See Bulletin","20180817"," ","2.2.6:IJ07498 2.2.5:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-05:IJ07500 7100-04:IJ07499 6100-09:IJ07498","https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar","CVE-2017-5715:0","no" "sec","aix","7100-04-04 :: 7100-04-05 :: 7100-04-06","IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.","IJ07499 / CVE-2017-5715","7100-04-07","IJ07499m4a.180719.epkg.Z IJ07499m5a.180809.epkg.Z IJ07499m6a.180713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc","bos.mp64:7.1.4.0-7.1.4.34","20180817"," ","2.2.6:IJ07498 2.2.5:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-05:IJ07500 6100-09:IJ07498","https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar","CVE-2017-5715:0","no" "sec","aix","7100-05-01 :: 7100-05-02","IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.","IJ07500 / CVE-2017-5715","7100-05-03","IJ07500m1a.180718.epkg.Z IJ07500m2a.180713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc","bos.mp64:7.1.5.0-7.1.5.16","20180817"," ","2.2.6:IJ07498 2.2.5:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7200-01:IJ07501 7100-04:IJ07499 6100-09:IJ07498","https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar","CVE-2017-5715:0","no" "sec","aix","7200-01-02 :: 7200-01-03 :: 7200-01-04","IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.","IJ07501 / CVE-2017-5715","7200-01-05","IJ07501m2a.180719.epkg.Z IJ07501m3a.180717.epkg.Z IJ07501m4a.180716.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc","bos.mp64:7.2.1.0-7.2.1.5","20180817"," ","2.2.6:IJ07498 2.2.5:IJ07498 2.2.4:IJ07498 7200-02:IJ07497 7100-05:IJ07500 7100-04:IJ07499 6100-09:IJ07498","https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar","CVE-2017-5715:0","no" "hiper","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","Possible network outage with adapters using shientdd driver","IJ08410","7200-02-03","IJ08410s2a.180816.AIX72TL02SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08410","devices.ethernet.shi.rte:7.2.2.0-7.2.2.16","20180830"," ","6100-09:IJ08482 7100-05:IJ08480 7200-00:IJ08785 7200-01:IJ08779","https://aix.software.ibm.com/aix/ifixes/ij08410/"," ","yes" "hiper","aix","6100-09-10 :: 6100-09-11","Possible network outage with adapters using shientdd driver","IJ08410","6100-09-12","IJ08482sBa.180817.AIX61TL09SP11.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08482","devices.ethernet.shi.rte:6.1.9.300-6.1.9.316","20180830"," ","7100-05:IJ08480 7200-00:IJ08785 7200-01:IJ08779 7200-02:IJ08410","https://aix.software.ibm.com/aix/ifixes/ij08482/"," ","yes" "hiper","aix","7100-05-00 :: 7100-05-01 :: 7100-05-02","Possible network outage with adapters using shientdd driver","IJ08480","7100-05-03","IJ08480s2a.180817.AIX71TL05SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08480","devices.ethernet.shi.rte:7.1.5.0-7.1.5.16","20180830"," ","6100-09:IJ08482 7200-00:IJ08785 7200-01:IJ08779 7200-02:IJ08410","https://aix.software.ibm.com/aix/ifixes/ij08480/"," ","yes" "hiper","vios","2.2.5.40","Possible network outage with adapters using shientdd driver ","IJ08482","2.2.5.50","IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z IJ08482sBa.180817.AIX61TL09SP11.epkg.Z IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08482","devices.ethernet.shi.rte:6.1.9.315","20180830"," ","6100-09:IJ08482 7100-05:IJ08480 7200-00:IJ08785 7200-01:IJ08779 7200-02:IJ08410","https://aix.software.ibm.com/aix/ifixes/ij08482/"," ","yes" "hiper","vios","2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.21 :: 2.2.6.22 :: 2.2.6.23","Possible network outage with adapters using shientdd driver ","IJ08482","2.2.6.30","IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z IJ08482sBa.180817.AIX61TL09SP11.epkg.Z IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08482","devices.ethernet.shi.rte:6.1.9.300-6.1.9.316","20180830"," ","6100-09:IJ08482 7100-05:IJ08480 7200-00:IJ08785 7200-01:IJ08779 7200-02:IJ08410","https://aix.software.ibm.com/aix/ifixes/ij08482/"," ","yes" "hiper","vios","2.2.4.60","Possible network outage with adapters using shientdd driver ","IJ08482","See Advisory","IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z IJ08482sBa.180817.AIX61TL09SP11.epkg.Z IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08482","devices.ethernet.shi.rte:6.1.9.300","20180830"," ","6100-09:IJ08482 7100-05:IJ08480 7200-00:IJ08785 7200-01:IJ08779 7200-02:IJ08410","https://aix.software.ibm.com/aix/ifixes/ij08482/"," ","yes" "hiper","aix","7200-03-00 :: 7200-03-01","Adapter firmware upgrade can fail or adapter may become unusable","IJ08641","7200-03-02-1845","IJ08641s1a.181004.AIX72TL03SP00-01.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08641","devices.pciex.df1060e214103404.com:7.2.3.0","20181013"," ","6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176","https://aix.software.ibm.com/aix/ifixes/ij08641/"," ","yes" "hiper","aix","7200-01-04","Possible network outage with adapters using shientdd driver","IJ08779","7200-01-06","IJ08779s4a.180827.72TL01SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08779","devices.ethernet.shi.rte:7.2.1.3-7.2.1.3","20180830"," ","6100-09:IJ08482 7100-00:IJ08480 7200-00:IJ08785 7200-02:IJ08410","https://aix.software.ibm.com/aix/ifixes/ij08779/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06","Possible network outage with adapters using shientdd driver","IJ08785","See Advisory","IJ08785s6a.180828.72TL00SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ08785","devices.ethernet.shi.rte:7.2.0.6-7.2.0.6","20180830"," ","6100-09:IJ08482 7100-05:IJ08480 7200-01:IJ08779 7200-02:IJ08410","https://aix.software.ibm.com/aix/ifixes/ij08785/"," ","yes" "hiper","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05 :: 7100-04-06","Adapter firmware upgrade can fail or adapter may become unusable","IJ09173","7100-04-07-1845","IJ09173s6a.180917.71TL04SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09173","devices.pciex.df1060e214103404.com:7.1.4.0-7.1.4.33","20181013"," ","6100-09:IJ06644 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641","https://aix.software.ibm.com/aix/ifixes/ij09173/"," ","yes" "hiper","aix","7100-05-00 :: 7100-05-01 :: 7100-05-02 :: 7100-05-03","Adapter firmware upgrade can fail or adapter may become unusable","IJ09174","7100-05-03-1846","IJ09174s3a.180921.AIX71TL05SP03-1838.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09174","devices.pciex.df1060e214103404.com:7.1.5.0-7.1.5.30","20181013"," ","6100-09:IJ06644 7100-04:IJ09173 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641","https://aix.software.ibm.com/aix/ifixes/ij09174/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04","Adapter firmware upgrade can fail or adapter may become unusable","IJ09175","7200-01-05-1845","IJ09175s4a.180917.72TL01SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09175","devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.3","20181013"," ","6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-02:IJ09176 7200-03:IJ08641","https://aix.software.ibm.com/aix/ifixes/ij09175/"," ","yes" "hiper","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","Adapter firmware upgrade can fail or adapter may become unusable","IJ09176","7200-02-03-1845","IJ09176s2a.180917.AIX72TL02SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09176","devices.pciex.df1060e214103404.com:7.2.2.0-7.2.2.15","20181013"," ","6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-03:IJ08641","https://aix.software.ibm.com/aix/ifixes/ij09176/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06","Adapter firmware upgrade can fail or adapter may become unusable","IJ09583","See Advisory","IJ09583s6a.181004.72TL00SP06.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ09583","devices.pciex.df1060e214103404.com:7.2.0.0-7.2.0.5","20181013"," ","6100-09:IJ06644 7100-04:IJ09173 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641","https://aix.software.ibm.com/aix/ifixes/ij09583/"," ","yes" "sec","aix","5300-12-09","There is a vulnerability in FreeBSD that affects AIX.","IJ09618 / CVE-2018-6922","See Bulletin","IJ09618s9a.181031.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.rte:5.3.12.0-5.3.12.1","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 6100-09:IJ09619 7200-03:IJ09625","","CVE-2018-6922:7.5","no" "sec","aix","6100-09-10 :: 6100-09-11 :: 6100-09-12","There is a vulnerability in FreeBSD that affects AIX.","IJ09619 / CVE-2018-6922","See Bulletin","IJ09619sAa.181004.epkg.Z IJ09619sBa.181004.epkg.Z IJ09619sCa.181009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.401","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 7200-03:IJ09625","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "sec","vios","2.2.5.40","There is a vulnerability in FreeBSD that affects VIOS.","IJ09619 / CVE-2018-6922","2.2.5.50","IJ09619sBa.181004.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.401","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 7200-03:IJ09625","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "sec","vios","2.2.6.23 :: 2.2.6.30 :: 2.2.6.31 :: 2.2.6.32","There is a vulnerability in FreeBSD that affects VIOS.","IJ09619 / CVE-2018-6922","2.2.6.40","IJ09619sCa.181004.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.401","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 7200-03:IJ09625","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "sec","vios","2.2.4.60","There is a vulnerability in FreeBSD that affects VIOS.","IJ09619 / CVE-2018-6922","See Bulletin","IJ09619sBa.181004.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.401","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 7200-03:IJ09625","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "sec","aix","7100-04-04 :: 7100-04-05 :: 7100-04-06","There is a vulnerability in FreeBSD that affects AIX.","IJ09620 / CVE-2018-6922","7100-04-07","IJ09620s4a.180927.epkg.Z IJ09620s5a.180927.epkg.Z IJ09620s6a.180926.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client:7.1.4.0-7.1.4.34","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 6100-09:IJ09619 7200-03:IJ09625","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "sec","aix","7100-05-01 :: 7100-05-02 :: 7100-05-03","There is a vulnerability in FreeBSD that affects AIX.","IJ09621 / CVE-2018-6922","7100-05-04","IJ09621s1a.180926.epkg.Z IJ09621s2a.180925.epkg.Z IJ09621s3a.181001.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client:7.1.5.0-7.1.5.31","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-04:IJ09620 6100-09:IJ09619 7200-03:IJ09625","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "sec","aix","7200-00-04 :: 7200-00-05 :: 7200-00-06","There is a vulnerability in FreeBSD that affects AIX.","IJ09622 / CVE-2018-6922","See Bulletin","IJ09622s4a.181001.epkg.Z IJ09622s5a.181001.epkg.Z IJ09622s6a.181001.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client_core:7.2.0.0-7.2.0.5","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7100-05:IJ09621 7100-04:IJ09620 6100-09:IJ09619 7200-03:IJ09625","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "sec","aix","7200-01-02 :: 7200-01-03 :: 7200-01-04","There is a vulnerability in FreeBSD that affects AIX.","IJ09623 / CVE-2018-6922","7200-01-05","IJ09623s2a.181002.epkg.Z IJ09623s3a.181002.epkg.Z IJ09623s4a.181002.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client_core:7.2.1.0-7.2.1.4","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 6100-09:IJ09619 7200-03:IJ09625","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "sec","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","There is a vulnerability in FreeBSD that affects AIX.","IJ09624 / CVE-2018-6922","7200-02-03","IJ09624s0a.181002.epkg.Z IJ09624s1a.181003.epkg.Z IJ09624s2a.181003.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client_core:7.2.2.0-7.2.2.17","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 6100-09:IJ09619 7200-03:IJ09625","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "sec","aix","7200-03-00 :: 7200-03-01 :: 7200-03-02","There is a vulnerability in FreeBSD that affects AIX.","IJ09625 / CVE-2018-6922","7200-03-03","IJ09625s0a.181010.epkg.Z IJ09625s2a.181203.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client_core:7.2.3.0-7.2.3.15","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 6100-09:IJ09619","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "sec","vios","3.1.0.0 :: 3.1.0.10","There is a vulnerability in FreeBSD that affects VIOS.","IJ09625 / CVE-2018-6922","3.1.0.20","IJ09625s2a.181203.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc","bos.net.tcp.client_core:7.2.3.0-7.2.3.15","20181108"," ","2.2.6:IJ09619 2.2.5:IJ09619 2.2.4:IJ09619 3100-00:IJ09625 7200-02:IJ09624 7200-01:IJ09623 5300-12:IJ09618 7200-00:IJ09622 7100-05:IJ09621 7100-04:IJ09620 7200-03:IJ09625","https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar","CVE-2018-6922:7.5","no" "hiper","aix","7200-03-00 :: 7200-03-01","Possible undetected data loss with Power9 NVMe","IJ09686","7200-03-02-1845","IJ09686s1a.181113.AIX72TL03SP00-01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09686","devices.chrp.vdevice.rte:7.2.3.0 devices.chrp.pci.rte:7.2.3.0","20181117"," ","6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127","https://aix.software.ibm.com/aix/ifixes/IJ09686/"," ","yes" "hiper","aix","7100-05-02 :: 7100-05-03","Possible undetected data loss with Power9 NVMe","IJ09705","7100-05-03-1846","IJ09705s3a.181115.AIX71TL05SP03-1838.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09705","devices.chrp.vdevice.rte:7.1.5.0-7.1.5.30 devices.chrp.pci.rte:7.1.5.16-7.1.5.30","20181117"," ","6100-09:IJ09710 7100-04:IJ10350 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686","https://aix.software.ibm.com/aix/ifixes/ij09705/"," ","yes" "hiper","vios","2.2.5.40","Possible undetected data loss with Power9 NVMe","IJ09710","2.2.5.40","IJ09710sBa.181115.AIX61TL09SP11.epkg.Z IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09710","devices.chrp.vdevice.rte:6.1.9.315 devices.chrp.pci.rte:6.1.9.316","20181117"," ","6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686","https://aix.software.ibm.com/aix/ifixes/ij09710/"," ","yes" "hiper","vios","2.2.6.21 :: 2.2.6.30 :: 2.2.6.31","Possible undetected data loss with Power9 NVMe","IJ09710","2.2.6.32","IJ09710sBa.181115.AIX61TL09SP11.epkg.Z IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09710","devices.chrp.vdevice.rte:6.1.9.315-6.1.9.400 devices.chrp.pci.rte:6.1.9.316-6.1.9.400","20181117"," ","6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686","https://aix.software.ibm.com/aix/ifixes/ij09710/"," ","yes" "hiper","vios","2.2.4.60","Possible undetected data loss with Power9 NVMe","IJ09710","See Advisory","IJ09710sBa.181115.AIX61TL09SP11.epkg.Z IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09710","devices.chrp.vdevice.rte:6.1.9.315 devices.chrp.pci.rte:6.1.9.316","20181117"," ","6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686","https://aix.software.ibm.com/aix/ifixes/ij09710/"," ","yes" "hiper","aix","6100-09-11 :: 6100-09-12","Possible undetected data loss with Power9 NVMe ","IJ09710","6100-09-12-1846","IJ09710sBa.181115.AIX61TL09SP11.epkg.Z IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09710","devices.chrp.vdevice.rte:6.1.9.315-6.1.9.400 devices.chrp.pci.rte:6.1.9.316-6.1.9.400","20181117"," ","7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686","https://aix.software.ibm.com/aix/ifixes/ij09710/"," ","yes" "sec","aix","7200-03-00 :: 7200-03-01","There is a vulnerability in Oracle Solaris that affects AIX.","IJ09805 / CVE-2017-3623","7200-03-02-1845","IJ09805s0a.181012.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","bos.net.tcp.client_core:7.2.3.0-7.2.3.0","20181211"," ","2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134","https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar","CVE-2017-3623:10","no" "hiper","aix","7200-01-04","Possible undetected data loss with Power9 NVMe","IJ09894","7200-01-05-1845","IJ09894s4a.181113.AIX72TL01SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ09894","devices.chrp.vdevice.rte:7.2.1.0 devices.chrp.pci.rte:7.2.1.0","20181117"," ","6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-02:IJ10127 7200-03:IJ09686","https://aix.software.ibm.com/aix/ifixes/ij09894/"," ","yes" "hiper","aix","7200-02-02","Possible undetected data loss with Power9 NVMe","IJ10127","7200-02-03-1845","IJ10127s2a.181113.AIX72TL02SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10127","devices.chrp.vdevice.rte:7.2.2.0 devices.chrp.pci.rte:7.2.2.16","20181117"," ","6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-03:IJ09686","https://aix.software.ibm.com/aix/ifixes/ij10127/"," ","yes" "sec","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","There is a vulnerability in Oracle Solaris that affects AIX.","IJ10130 / CVE-2017-3623","7200-02-03-1845","IJ10130s0a.181011.epkg.Z IJ10130s2a.181011.epkg.Z IJ10130s2b.181011.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","bos.net.tcp.client_core:7.2.2.0-7.2.2.16","20181211"," ","2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805","https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar","CVE-2017-3623:10","no" "sec","aix","7100-05-01 :: 7100-05-02 :: 7100-05-03","There is a vulnerability in Oracle Solaris that affects AIX.","IJ10132 / CVE-2017-3623","7100-05-03-1846","IJ10132s1a.181009.epkg.Z IJ10132s2a.181009.epkg.Z IJ10132s2b.181009.epkg.Z IJ10132s3a.181009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","bos.net.tcp.client:7.1.5.0-7.1.5.30","20181211"," ","2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805","https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar","CVE-2017-3623:10","no" "sec","aix","6100-09-10 :: 6100-09-11 :: 6100-09-12","There is a vulnerability in Oracle Solaris that affects AIX.","IJ10134 / CVE-2017-3623","6100-09-12-1846","IJ10134sAa.181009.epkg.Z IJ10134sBa.181009.epkg.Z IJ10134sBb.181009.epkg.Z IJ10134sCa.181009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.400","20181211"," ","2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 7200-03:IJ09805","https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar","CVE-2017-3623:10","no" "sec","vios","2.2.5.40","There is a vulnerability in Oracle Solaris that affects VIOS.","IJ10134 / CVE-2017-3623","2.2.5.50","IJ10134sBa.181009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","See Bulletin","20181211"," ","2.2.6:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805","https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar","CVE-2017-3623:10","no" "sec","vios","2.2.6.20 :: 2.2.6.21 :: 2.2.6.23 :: 2.2.6.30 :: 2.2.6.31","There is a vulnerability in Oracle Solaris that affects VIOS.","IJ10134 / CVE-2017-3623","2.2.6.32","IJ10134sBa.181009.epkg.Z IJ10134sBb.181009.epkg.Z IJ10134sCa.181009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","See Bulletin","20181211"," ","2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805","https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar","CVE-2017-3623:10","no" "sec","vios","2.2.4.60","There is a vulnerability in Oracle Solaris that affects VIOS.","IJ10134 / CVE-2017-3623","See Bulletin","IJ10134sBa.181009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","See Bulletin","20181211"," ","2.2.6:IJ10134 2.2.5:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805","https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar","CVE-2017-3623:10","no" "sec","aix","7100-04-04 :: 7100-04-05 :: 7100-04-06","There is a vulnerability in Oracle Solaris that affects AIX.","IJ10275 / CVE-2017-3623","7100-04-07-1845","IJ10275s4a.181009.epkg.Z IJ10275s5a.181009.epkg.Z IJ10275s6a.181009.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","bos.net.tcp.client:7.1.4.0-7.1.4.33","20181211"," ","2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 6100-09:IJ10134 7200-03:IJ09805","https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar","CVE-2017-3623:10","no" "sec","aix","NTPv4","There are vulnerabilities in NTPv4 that affect AIX.","IJ10280 / CVE-2018-12327 / CVE-2018-7170","See Advisory","IJ10280s3b.181206.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory11.asc","ntp.rte:7.4.2.8100-7.4.2.8110","20181214"," ","n/a","See Bulletin","CVE-2018-12327:5.9 / CVE-2018-7170:3.1","no" "hiper","aix","7200-03-00 :: 7200-03-01","Possible errors in certain network adapters","IJ10293","7200-03-02-1845","IJ10293s1a.181109.AIX72TL03SP00-01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10293","devices.ethernet.lnc.rte:7.2.3.0 devices.ethernet.lnc2.rte:7.2.3.0","20181110"," ","7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371","https://aix.software.ibm.com/aix/ifixes/ij10293/"," ","yes" "hiper","aix","7100-05-00 :: 7100-05-01 :: 7100-05-02","Possible errors in certain network adapters","IJ10295","7100-05-03-1846","IJ10295m3a.181109.AIX71TL05SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10295","devices.ethernet.lnc.rte:7.1.5.0-7.1.5.30 devices.ethernet.lnc2.rte:7.1.5.0-7.1.5.30","20181110"," ","7100-04:IJ10369 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293","https://aix.software.ibm.com/aix/ifixes/ij10295/"," ","yes" "hiper","vios","2.2.5.0 :: 2.2.5.10 :: 2.2.5.20 :: 2.2.5.30 :: 2.2.5.40","Possible errors in certain network adapters","IJ10300","2.2.5.50","IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10300","devices.ethernet.lnc.rte:6.1.9.200-6.1.9.315 devices.ethernet.lnc2.rte:6.1.9.200-6.1.9.315","20181110"," ","7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293","https://aix.software.ibm.com/aix/ifixes/ij10300/"," ","yes" "hiper","vios","2.2.6.0 :: 2.2.6.10 :: 2.2.5.60 :: 2.2.6.30 :: 2.2.6.31","Possible errors in certain network adapters","IJ10300","2.2.6.32","IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10300","devices.ethernet.lnc.rte:6.1.9.300-6.1.9.400 devices.ethernet.lnc2.rte:6.1.9.300-6.1.9.400","20181110"," ","7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293","https://aix.software.ibm.com/aix/ifixes/ij10300/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40 :: 2.2.4.50 :: 2.2.4.60","Possible errors in certain network adapters","IJ10300","See Advisory","IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10300","devices.ethernet.lnc.rte:6.1.9.100-6.1.9.315 devices.ethernet.lnc2.rte:6.1.9.100-6.1.9.315","20181110"," ","7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293","https://aix.software.ibm.com/aix/ifixes/ij10300/"," ","yes" "hiper","aix","7100-04-06","Possible undetected data loss with Power9 NVMe","IJ10350","7100-04-07-1845","IJ10350s6a.181115.AIX71TL04SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10350","devices.chrp.vdevice.rte:7.1.4.30 devices.chrp.pci.rte:7.1.4.30","20181117"," ","6100-09:IJ09710 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686","https://aix.software.ibm.com/aix/ifixes/ij10350/"," ","yes" "hiper","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05 :: 7100-04-06","Possible errors in certain network adapters","IJ10369","7100-04-07-1845","IJ10369m6a.181109.AIX71TL04SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10369","devices.ethernet.lnc.rte:7.1.4.0-7.1.4.33 devices.ethernet.lnc2.rte:7.1.4.0-7.1.4.33","20181110"," ","7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293","https://aix.software.ibm.com/aix/ifixes/ij10369/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04","Possible errors in certain network adapters","IJ10370","7200-01-05-1845","IJ10370m4a.181109.AIX72TL01SP04.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10370","devices.ethernet.lnc.rte:7.2.1.0-7.2.1.3 devices.ethernet.lnc2.rte:7.2.1.0-7.2.1.3","20181110"," ","7100-04:IJ10369 7100-05:IJ10295 7200-02:IJ10371 7200-03:IJ10293","https://aix.software.ibm.com/aix/ifixes/ij10370/"," ","yes" "hiper","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","Possible errors in certain network adapters","IJ10371","7200-02-03-1845","IJ10371m2a.181109.AIX72TL02SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ10371","devices.ethernet.lnc.rte:7.2.2.0-7.2.2.16 devices.ethernet.lnc2.rte:7.2.2.0-7.2.2.16","20181110"," ","7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-03:IJ10293","https://aix.software.ibm.com/aix/ifixes/ij10371/"," ","yes" "sec","aix","7200-01-02 :: 7200-01-03 :: 7200-01-04","There is a vulnerability in Oracle Solaris that affects AIX.","IJ10552 / CVE-2017-3623","7200-01-05-1845","IJ10552s2a.181016.epkg.Z IJ10552s3a.181016.epkg.Z IJ10552s4a.181016.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","bos.net.tcp.client_core:7.2.1.0-7.2.1.3","20181211"," ","2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 5300-12:IJ10554 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805","https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar","CVE-2017-3623:10","no" "sec","aix","7200-00-04 :: 7200-00-05 :: 7200-00-06","There is a vulnerability in Oracle Solaris that affects AIX.","IJ10553 / CVE-2017-3623","See Bulletin","IJ10553s4a.181016.epkg.Z IJ10553s5a.181016.epkg.Z IJ10553s6a.181016.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","bos.net.tcp.client_core:7.2.0.0-7.2.0.5","20181211"," ","2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 5300-12:IJ10554 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805","https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar","CVE-2017-3623:10","no" "sec","aix","5300-12-09","There is a vulnerability in Oracle Solaris that affects AIX.","IJ10554 / CVE-2017-3623","See Bulletin","IJ10554s9a.181017.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20181211"," ","2.2.6:IJ10134 2.2.5:IJ10134 2.2.4:IJ10134 7200-02:IJ10130 7200-01:IJ10552 7200-00:IJ10553 7100-05:IJ10132 7100-04:IJ10275 6100-09:IJ10134 7200-03:IJ09805","","CVE-2017-3623:10","no" "sec","aix","6100-09-10 :: 6100-09-11 :: 6100-09-12","There is a vulnerability in Xorg that affects AIX.","IJ11000 / CVE-2018-14665","See Bulletin","IJ11000s0b.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:6.1.9.0-6.1.9.100","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","vios","2.2.4.40 :: 2.2.4.50 :: 2.2.4.60","There is a vulnerability in Xorg that affects VIOS.","IJ11000 / CVE-2018-14665","See Bulletin","IJ11000s0b.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:6.1.9.0-6.1.9.100","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","vios","2.2.5.20 :: 2.2.5.30 :: 2.2.5.40","There is a vulnerability in Xorg that affects VIOS.","IJ11000 / CVE-2018-14665","See Bulletin","IJ11000s0b.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:6.1.9.0-6.1.9.100","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","vios","2.2.6.23 :: 2.2.6.30 :: 2.2.6.31 :: 2.2.6.32","There is a vulnerability in Xorg that affects VIOS.","IJ11000 / CVE-2018-14665","See Bulletin","IJ11000s0b.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:6.1.9.0-6.1.9.100","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06","Possible errors in certain network adapters","IJ11207","See advisory","IJ11207m6a.181109.AIX72TL00SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ11207","devices.ethernet.lnc.rte:7.2.0.0-7.2.0.6 devices.ethernet.lnc2.rte:7.2.0.0-7.2.0.6","20181110"," ","7100-04:IJ10369 7100-05:IJ10295 7200-01:IJ10370 7200-02:IJ10371 7200-03:IJ10293","https://aix.software.ibm.com/aix/ifixes/ij11207/"," ","yes" "hiper","aix","7200-00-06","Possible undetected data loss with Power9 NVMe","IJ11253","See Advisory","IJ11253s6a.181113.AIX72TL00SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ11253","devices.chrp.vdevice.rte:7.2.0.0 devices.chrp.pci.rte:7.2.0.0","20181117"," ","6100-09:IJ09710 7100-04:IJ10350 7100-05:IJ09705 7200-01:IJ09894 7200-02:IJ10127 7200-03:IJ09686","https://aix.software.ibm.com/aix/ifixes/ij11253/"," ","yes" "sec","aix","7100-04-04 :: 7100-04-05 :: 7100-04-06","There is a vulnerability in Xorg that affects AIX.","IJ11544 / CVE-2018-14665","7100-04-08","IJ11544s0a.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:7.1.4.0-7.1.4.30","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7200-03:IJ11550","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","aix","7100-04-04 :: 7100-04-05 :: 7100-04-06 :: 7100-04-07","There is a vulnerability in Xorg that affects AIX.","IJ11544 / CVE-2018-14665","7100-04-08","IJ11544s0a.181127.epkg.Z IJ11544s0a.190312.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:7.1.4.0-7.1.4.30","20181211","20190409","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7200-03:IJ11550","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","aix","7100-05-01 :: 7100-05-02 :: 7100-05-03","There is a vulnerability in Xorg that affects AIX.","IJ11545 / CVE-2018-14665","7100-05-04","IJ11545s0a.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:7.1.5.0-7.1.5.31","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-04:IJ11544 7200-03:IJ11550","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","aix","7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06","There is a vulnerability in Xorg that affects AIX.","IJ11546 / CVE-2018-14665","See Bulletin","IJ11546s0a.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:7.2.0.0-7.2.0.1","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04","There is a vulnerability in Xorg that affects AIX.","IJ11547 / CVE-2018-14665","7200-01-06","IJ11547s0a.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:7.2.1.0-7.2.1.0","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","aix","7200-02-01 :: 7200-02-02 :: 7200-02-03","There is a vulnerability in Xorg that affects AIX.","IJ11549 / CVE-2018-14665","7200-02-04","IJ11549s0a.181127.epkg.Z IJ11549s0a.190312.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:7.2.2.0-7.2.2.0","20181211","20190409","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","aix","7200-03-01 :: 7200-03-02","There is a vulnerability in Xorg that affects AIX.","IJ11550 / CVE-2018-14665","7200-03-03","IJ11550s0a.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:7.2.3.0-7.2.3.15","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","vios","3.1.0.0 :: 3.1.0.10","There is a vulnerability in Xorg that affects VIOS.","IJ11550 / CVE-2018-14665","7200-03-03","IJ11550s0a.181127.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:7.2.3.0-7.2.3.15","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 5300-12:IJ11551 7100-05:IJ11545 7100-04:IJ11544","https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar","CVE-2018-14665:8.8","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","There is a vulnerability in Xorg that affects AIX.","IJ11551 / CVE-2018-14665","See Bulletin","IJ11551s0a.181127.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc","X11.base.rte:5.3.12.0-5.3.12.2","20181211"," ","2.2.6:IJ11000 2.2.5:IJ11000 2.2.4:IJ11000 7200-02:IJ11549 7200-01:IJ11547 7200-00:IJ11546 6100-09:IJ11000 3100-00:IJ11550 7100-05:IJ11545 7100-04:IJ11544 7200-03:IJ11550","","CVE-2018-14665:8.8","no" "hiper","vios","2.2.5.50","TCP session hang/timeout or possible undetected data corruption","IJ12143","2.2.5.51","IJ12143sCd.190221.VIOS2.2.5.50.epkg.Z IJ12143sCd.190221.VIOS2.2.6.30-32.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ12143","devices.common.IBM.ethernet.rte:6.1.9.400","20190119","20190228","","https://aix.software.ibm.com/aix/ifixes/ij12143/"," ","yes" "hiper","vios","2.2.6.30 :: 2.2.6.31 :: 2.2.6.32","TCP session hang/timeout or possible undetected data corruption","IJ12143","2.2.6.33","IJ12143sCd.190221.VIOS2.2.5.50.epkg.Z IJ12143sCd.190221.VIOS2.2.6.30-32.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ12143","devices.common.IBM.ethernet.rte:6.1.9.400","20190119","20190228","","https://aix.software.ibm.com/aix/ifixes/ij12143/"," ","yes" "hiper","vios","3.1.0.0 :: 3.1.0.10 :: 3.1.0.11","TCP session hang/timeout or possible undetected data corruption","IJ12809","3.1.0.12","IJ12809s2b.190225.VIOS3.1.0.0-11.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ12809","devices.common.IBM.ethernet.rte:7.2.3.15","20190119","20190228","","https://aix.software.ibm.com/aix/ifixes/ij12809/"," ","yes" "sec","aix","6100-09-12","There is a vulnerability in tcpdump that affects AIX.","IJ12978 / IJ20781 / CVE-2018-19519","See Bulletin","","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc","bos.net.tcp.server:6.1.9.300-6.1.9.400","20190225","20190409","2.2.6:IJ12978 2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar","CVE-2018-19519:7.3","no" "sec","vios","2.2.5.40 :: 2.2.5.50","There is a vulnerability in tcpdump that affects VIOS.","IJ12978 / IJ20781 / CVE-2018-19519","2.2.5.60","IJ12978s9a.190215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc","bos.net.tcp.server:6.1.9.0-6.1.9.400","20190225"," ","2.2.6:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar","CVE-2018-19519:7.3","no" "sec","vios","2.2.6.21 :: 2.2.6.23 :: 2.2.6.32","There is a vulnerability in tcpdump that affects VIOS.","IJ12978 / IJ20781 / CVE-2018-19519","2.2.6.40","IJ12978sBa.190215.epkg.Z IJ12978sCa.190215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc","bos.net.tcp.server:6.1.9.0-6.1.9.400","20190225"," ","2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar","CVE-2018-19519:7.3","no" "sec","aix","7100-04-05 :: 7100-04-06 :: 7100-04-07","There is a vulnerability in tcpdump that affects AIX.","IJ12979 / CVE-2018-19519","7100-04-08-1914","IJ12979m5a.190304.epkg.Z IJ12979m6a.190304.epkg.Z IJ12979m7a.190205.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc","bos.net.tcp.server:7.1.4.32-7.1.4.34","20190225","20190409","2.2.6:IJ12978 2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7200-03:IJ12983","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar","CVE-2018-19519:7.3","no" "sec","aix","7200-01-03 :: 7200-01-04 :: 7200-01-05","There is a vulnerability in tcpdump that affects AIX.","IJ12981 / CVE-2018-19519","7200-01-06-1914","IJ12981m3a.190214.epkg.Z IJ12981m4a.190215.epkg.Z IJ12981m5a.190225.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc","bos.net.tcp.tcpdump:7.2.1.1-7.2.1.3","20190225","20190409","2.2.6:IJ12978 2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar","CVE-2018-19519:7.3","no" "hiper","aix","7100-05-03","Opening Mellanox Infiniband adapters will fail","IJ13283","7100-05-04-1914","IJ13283s3a.190225.AIX71TL05SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13283","bos.mp64:7.1.5.30 devices.pciex.b3154a63.rte:7.1.5.30","20190309"," ","6100-09:IJ13293 7100-04:IJ13688 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334","https://aix.software.ibm.com/aix/ifixes/ij13283/"," ","yes" "hiper","aix","6100-09-12-1837 :: 6100-09-12-1846","Opening Mellanox Infiniband adapters will fail","IJ13283","6100-09-12-1913","IJ13293sCa.190306.AIX61TL09SP12.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13293","bos.mp64:6.1.9.400-6.1.9.402 devices.pciex.b3154a63.rte:6.1.9.400","20190309"," ","7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334","https://aix.software.ibm.com/aix/ifixes/ij13293/"," ","yes" "hiper","vios","2.2.5.50","Opening Mellanox Infiniband adapters will fail","IJ13293","2.2.5.60","IJ13293sCa.190306.VIOS2.2.5.50.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13293","bos.mp64:6.1.9.400 devices.pciex.b3154a63.rte:6.1.9.400","20190309"," ","6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334","https://aix.software.ibm.com/aix/ifixes/ij13293/"," ","yes" "hiper","vios","2.2.6.30 :: 2.2.6.31 :: 2.2.6.32","Opening Mellanox Infiniband adapters will fail","IJ13293","2.2.6.40","IJ13293sCa.190306.VIOS2.2.6.30-32.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13293","bos.mp64:6.1.9.400 devices.pciex.b3154a63.rte:6.1.9.400","20190309"," ","6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334","https://aix.software.ibm.com/aix/ifixes/ij13293/"," ","yes" "hiper","vios","3.1.0.0 :: 3.1.0.10 :: 3.1.0.11","Opening Mellanox Infiniband adapters will fail","IJ13334","3.1.0.20","IJ13334s2a.190306.VIOS3.1.0.0-11.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13334","bos.mp64:7.2.3.0-7.2.3.16 devices.pciex.b3154a63.rte:7.2.3.0","20190309"," ","6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334","https://aix.software.ibm.com/aix/ifixes/ij13334/"," ","yes" "hiper","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","Opening Mellanox Infiniband adapters will fail","IJ13334","7200-03-03-1913","IJ13334s2a.190306.AIX72TL03SP00-02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13334","bos.mp64:7.2.3.0-7.2.3.16 devices.pciex.b3154a63.rte:7.2.3.0","20190309"," ","6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458","https://aix.software.ibm.com/aix/ifixes/ij13334/"," ","yes" "hiper","aix","7200-02-03","Opening Mellanox Infiniband adapters will fail","IJ13458","7200-01-04-1914","IJ13458s3a.190225.AIX72TL02SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13458","bos.mp64:7.2.2.19 devices.pciex.b3154a63.rte:7.2.2.15","20190309"," ","6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-01:IJ13856 7200-03:IJ13334","https://aix.software.ibm.com/aix/ifixes/ij13458/"," ","yes" "hiper","aix","7100-04-07","Opening Mellanox Infiniband adapters will fail","IJ13688","7100-04-08-1914","IJ13688s7a.190225.AIX71TL04SP07.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13688","bos.mp64:7.1.4.35 devices.pciex.b3154a63.rte:7.1.4.31","20190309"," ","6100-09:IJ13293 7100-05:IJ13283 7200-01:IJ13856 7200-02:IJ13458 7200-03:IJ13334","https://aix.software.ibm.com/aix/ifixes/ij13688/"," ","yes" "hiper","aix","7200-01-05","Opening Mellanox Infiniband adapters will fail","IJ13856","7200-01-06-1914","IJ13856s5a.190225.AIX72TL01SP05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ13856","bos.mp64:7.2.1.6 devices.pciex.b3154a63.rte:7.2.1.1","20190309"," ","6100-09:IJ13293 7100-04:IJ13688 7100-05:IJ13283 7200-02:IJ13458 7200-03:IJ13334","https://aix.software.ibm.com/aix/ifixes/ij13856/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05 :: 7200-00-06","Affected PowerHA SystemMirror Levels and Recommended Fixes","IJ15739","7200-00-07","IJ15885m2a.190604.PowerHA7.2.0SP02.epkg.Z IJ15885m5a.190604.PowerHA7.2.0SP05.epkg.Z IJ15885s6b.190604.PowerHA7.2.0SP06.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ15739","cluster.es.server.rte:7.2.0.0-7.2.0.6 cluster.es.client.lib:7.2.0.0-7.2.0.6","20190430","20190612","","https://aix.software.ibm.com/aix/ifixes/ij15885/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03 :: 7200-01-04","Affected PowerHA SystemMirror Levels and Recommended Fixes","IJ15739","7200-01-05","IJ09170m0c.190603.PowerHA7.2.1SP00.epkg.Z IJ09170m1c.190603.PowerHA7.2.1SP01.epkg.Z IJ09170m2c.190603.PowerHA7.2.1SP02.epkg.Z IJ09170m3c.190603.PowerHA7.2.1SP03.epkg.Z IJ09170s4b.190603.PowerHA7.2.1SP04.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ15739","cluster.es.server.rte:7.2.1.0-7.2.1.4 cluster.es.client.lib:7.2.1.0-7.2.1.4","20190430","20190612","","https://aix.software.ibm.com/aix/ifixes/ij09170/"," ","yes" "hiper","aix","7200-02-00 :: 7200-02-01 :: 7200-02-02","Affected PowerHA SystemMirror Levels and Recommended Fixes","IJ15739","7200-02-03","IJ10601m0c.190603.PowerHA7.2.2SP00.epkg.Z IJ10601m1c.190603.PowerHA7.2.2SP01.epkg.Z IJ10601s2c.190603.PowerHA7.2.2SP02.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ15739","cluster.es.server.rte:7.2.2.0-7.2.2.2 cluster.es.client.lib:7.2.2.0-7.2.2.2","20190430","20190612","","https://aix.software.ibm.com/aix/ifixes/ij10601/"," ","yes" "hiper","aix","7200-03-00","Affected PowerHA SystemMirror Levels and Recommended Fixes","IJ15739","7200-03-01","IJ15739m0a.190603.PowerHA7.2.3SP00.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ15739","cluster.es.server.rte:7.2.3.0 cluster.es.client.lib:7.2.3.0","20190430","20190612","","https://aix.software.ibm.com/aix/ifixes/ij15739/"," ","yes" "hiper","vios","3.1.0.20 :: 3.1.0.21","NETSTAT PRINTS SOME MESSAGES INCORRECTLY","IJ16586","3.1.0.30","IJ16586s3a.190607.VIOS3.1.0.21.epkg.Z IJ16586s3b.190614.VIOS3.1.0.20.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ16586","bos.net.tcp.client_core:7.2.3.16-7.2.3.17","20190614"," ","7100-04:IJ16623 7100-05:IJ16622 7200-03:IJ16524","https://aix.software.ibm.com/aix/ifixes/ij16586/"," ","yes" "hiper","aix","7200-03-03-1913 :: 7200-03-03-1914","netstat prints some messages incorrectly","IJ16586","7200-03-04-1938","IJ16586s3a.190607.AIX72TL03SP03-1913.epkg.Z IJ16586s3a.190607.AIX72TL03SP03-1914.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ16586","bos.net.tcp.client_core:7.2.3.16-7.2.3.17","20190614"," ","7100-04:IJ16623 7100-05:IJ16622","https://aix.software.ibm.com/aix/ifixes/ij16586/"," ","yes" "hiper","aix","7100-05-04-1913 :: 7100-05-04-1914","netstat prints some messages incorrectly","IJ16622","7100-05-05-1937","IJ16622s4a.190614.AIX71TL05SP04-1913.epkg.Z IJ16622s4b.190614.AIX71TL05SP04-1914.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ16622","bos.net.tcp.client:7.1.5.32-7.1.5.33","20190614"," ","7100-04:IJ16623 7200-03:IJ16586","https://aix.software.ibm.com/aix/ifixes/ij16622/"," ","yes" "hiper","aix","7100-04-08-1914","netstat prints some messages incorrectly","IJ16623","See Advisory","","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ16623","bos.net.tcp.client:7.1.4.35","20190614"," ","7100-05:IJ16622 7200-03:IJ16586","https://aix.software.ibm.com/aix/ifixes/ij16623/"," ","yes" "hiper","vios","2.2.6.40 :: 2.2.6.41","NETSTAT PRINTS SOME MESSAGES INCORRECTLY","IJ16624","2.2.6.50","IJ16624sDa.190613.VIOS2.2.6.40.epkg.Z IJ16624sDb.190613.VIOS2.2.6.41.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ16624","bos.net.tcp.client:6.1.9.402-6.1.9.403","20190614"," ","7100-04:IJ16623 7100-05:IJ16622 7200-03:IJ16524","https://aix.software.ibm.com/aix/ifixes/ij16624/"," ","yes" "sec","aix","NTPv4","There are vulnerabilities in NTPv4 that affect AIX.","IJ17059 / CVE-2019-8936","See Advisory","IJ17059m9b.190719.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc","ntp.rte:7.4.2.8100-7.4.2.8121","20190819"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar","CVE-2019-8936:5.3","no" "sec","aix","6100-09-12","Vulnerabilities in NTP affect AIX","IJ17060 / CVE-2019-8936","See Bulletin","IJ17060m9a.190628.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc","bos.net.tcp.client:6.1.9.0-6.1.9.403","20190819"," ","","Out of Support","CVE-2019-8936:5.3","no" "sec","vios","2.2.6.20 :: 2.2.6.21 :: 2.2.6.23 :: 2.2.6.30 :: 2.2.6.31 :: 2.2.6.32 :: 2.2.6.40 :: 2.2.6.41","Vulnerabilities in NTP affect VIOS","IJ17060 / CVE-2019-8936","2.2.6.50","IJ17060m9a.190628.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc","bos.net.tcp.client:6.1.9.0-6.1.9.403","20190819"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar","CVE-2019-8936:5.3","no" "sec","vios","2.2.5.40 :: 2.2.5.50 :: 2.2.5.60","Vulnerabilities in NTP affect VIOS","IJ17060 / CVE-2019-8936","See Bulletin","IJ17060m9a.190628.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc","bos.net.tcp.client:6.1.9.0-6.1.9.403","20190819"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar","CVE-2019-8936:5.3","no" "sec","vios","3.1.0.0 :: 3.1.0.10 :: 3.1.0.20 :: 3.1.0.21","Vulnerabilities in NTP affect VIOS","IJ17065 / CVE-2019-8936","3.1.0.30","IJ17065m3a.190701.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc","bos.net.tcp.ntp:7.2.3.0-7.2.3.15 bos.net.tcp.ntpd:7.2.3.0-7.2.3.15","20190819"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar","CVE-2019-8936:5.3","no" "hiper","aix","7200-03-03","Live Update fails when applying 7200-03-03 or IJ09625","IJ17505","7200-03-04-1938","IJ17505s3a.190911.AIX72TL03SP03.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ17505","bos.net.tcp.client_core:7.2.3.16-7.2.3.17","20190913","20190917","","https://aix.software.ibm.com/aix/ifixes/ij17505/"," ","yes" "sec","aix","6100-09-12","There is a vulnerability in tcpdump that affects AIX.","IJ20781 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808","Out of Support","IJ20781sCc.191121.epkg.Z IJ20781sCd.191121.epkg.Z IJ20781sDa.191121.epkg.Z IJ20781sDb.191121.epkg.Z IJ20781sEa.191121.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc","bos.net.tcp.server:6.1.9.0-6.1.9.401","20200108"," ","","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar","CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5","no" "sec","vios","2.2.6.31 :: 2.2.6.32 :: 2.2.6.40 :: 2.2.6.41 :: 2.2.6.50","There is a vulnerability in tcpdump that affects VIOS.","IJ20781 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808","2.2.6.60","IJ20781sCc.191121.epkg.Z IJ20781sCd.191121.epkg.Z IJ20781sDa.191121.epkg.Z IJ20781sDb.191121.epkg.Z IJ20781sEa.191121.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc","bos.net.tcp.server:6.1.9.0-6.1.9.401","20200108"," ","","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar","CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5","no" "sec","aix","7100-05-01 :: 7100-05-02 :: 7100-05-03","There is a vulnerability in tcpdump that affects AIX.","IJ20783 / IJ12980 / CVE-2018-19519","7100-05-04-1913","IJ12980m1a.190207.epkg.Z IJ12980m1a.190207.epkg.Z IJ12980m3a.190212.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc","bos.net.tcp.server:7.1.5.0-7.1.5.31","20190225"," ","2.2.6:IJ12978 2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-04:IJ12979 7200-03:IJ12983","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar","CVE-2018-19519:7.3","no" "sec","aix","7100-05-03 :: 7100-05-04 :: 7100-05-05","There is a vulnerability in tcpdump that affects AIX.","IJ20783 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808","7100-05-06-2015","IJ20783s4a.191118.epkg.Z IJ20783s5a.191115.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc","bos.net.tcp.server:7.1.5.0-7.1.5.32","20200108"," ","","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar","CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5","no" "sec","aix","7200-02-01 :: 7200-02-02 :: 7200-02-03","There is a vulnerability in tcpdump that affects AIX.","IJ20784 / IJ12982 / CVE-2018-19519 / IJ20784","7200-02-04-1914","IJ12982m1a.190215.epkg.Z IJ12982m2a.190215.epkg.Z IJ12982m3a.190215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc","bos.net.tcp.tcpdump:7.2.2.0-7.2.2.16","20190225"," ","2.2.6:IJ12978 2.2.5:IJ12978 3100-00:IJ12983 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar","CVE-2018-19519:7.3","no" "sec","aix","7200-02-02 :: 7200-02-03 :: 7200-02-04","There is a vulnerability in tcpdump that affects AIX.","IJ20784 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808","7200-02-06-2015","IJ20784s2a.191118.epkg.Z IJ20784s3a.191118.epkg.Z IJ20784s4a.191115.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc","bos.net.tcp.tcpdump:7.2.2.0-7.2.2.17","20200108"," ","","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar","CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5","no" "sec","aix","7200-03-00 :: 7200-03-01 :: 7200-03-02","There is a vulnerability in tcpdump that affects AIX.","IJ20785 / IJ12983 / CVE-2018-19519 / IJ20785","7200-03-03-1913","IJ12983m0a.190215.epkg.Z IJ12983m1a.190215.epkg.Z IJ12983m2a.190215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc","bos.net.tcp.tcpdump:7.2.3.0-7.2.3.15","20190225"," ","2.2.6:IJ12978 2.2.5:IJ12978 3.1.0:IJ12983 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar","CVE-2018-19519:7.3","no" "sec","vios","3.1.0.10","There is a vulnerability in tcpdump that affects VIOS.","IJ20785 / IJ12983 / IJ20785 / CVE-2018-19519","3.1.0.20","IJ12983m2a.190215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc","bos.net.tcp.tcpdump:7.2.3.0-7.2.3.15","20190225"," ","2.2.6:IJ12978 2.2.5:IJ12978 7200-02:IJ12982 7200-01:IJ12981 7100-05:IJ12980 7100-04:IJ12979 7200-03:IJ12983","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar","CVE-2018-19519:7.3","no" "sec","aix","7200-03-01 :: 7200-03-02 :: 7200-03-03","There is a vulnerability in tcpdump that affects AIX.","IJ20785 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808","7200-03-05-2016","IJ20785s1a.191120.epkg.Z IJ20785s2a.191119.epkg.Z IJ20785s3a.191115.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc","bos.net.tcp.tcpdump:7.2.3.0-7.2.3.16","20200108"," ","","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar","CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5","no" "sec","vios","3.1.0.0 :: 3.1.0.10 :: 3.1.0.20","There is a vulnerability in tcpdump that affects VIOS.","IJ20785 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808","3.1.0.40","IJ20785s2a.191119.epkg.Z IJ20785s2a.191119.epkg.Z IJ20785s3a.191115.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc","bos.net.tcp.tcpdump:7.2.3.0-7.2.3.16","20200108"," ","","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar","CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5","no" "sec","aix","7200-04-00 :: 7200-04-01","There is a vulnerability in tcpdump that affects AIX.","IJ20786 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808","7200-04-02-2015","IJ20786s1a.191120.epkg.Z IJ20786s1a.191120.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc","bos.net.tcp.tcpdump:7.2.4.0","20200108"," ","","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar","CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5","no" "sec","vios","3.1.1.0 :: 3.1.1.10","There is a vulnerability in tcpdump that affects VIOS.","IJ20786 / CVE-2018-14467 / CVE-2018-14463 / CVE-2018-14464 / CVE-2018-14470 / CVE-2018-10105 / CVE-2018-14461 / CVE-2018-10103 / CVE-2019-15167 / CVE-2018-14466 / CVE-2018-14469 / CVE-2018-14468 / CVE-2018-14881 / CVE-2018-14462 / CVE-2018-14880 / CVE-2018-14465 / CVE-2018-16451 / CVE-2018-16452 / CVE-2018-16230 / CVE-2019-15166 / CVE-2018-14879 / CVE-2018-16228 / CVE-2018-16229 / CVE-2018-16227 / CVE-2018-16300 / CVE-2018-14882 / CVE-2017-16808","3.1.1.20","IJ20786s1a.191120.epkg.Z IJ20786s1a.191120.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc","bos.net.tcp.tcpdump:7.2.4.0","20200108"," ","","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar","CVE-2018-14467:6.5 / CVE-2018-14463:6.5 / CVE-2018-14464:6.5 / CVE-2018-14470:6.5 / CVE-2018-10105:8.8 / CVE-2018-14461:6.5 / CVE-2018-10103:8.8 / CVE-2019-15167:6.5 / CVE-2018-14466:6.5 / CVE-2018-14469:6.5 / CVE-2018-14468:6.5 / CVE-2018-14881:6.5 / CVE-2018-14462:6.5 / CVE-2018-14880:6.5 / CVE-2018-14465:6.5 / CVE-2018-16451:5.5 / CVE-2018-16452:5.5 / CVE-2018-16230:5.5 / CVE-2019-15166:5.5 / CVE-2018-14879:6.1 / CVE-2018-16228:5.5 / CVE-2018-16229:5.5 / CVE-2018-16227:5.5 / CVE-2018-16300:5.5 / CVE-2018-14882:5.5 / CVE-2017-16808:7.5","no" "hiper","aix","7200-04-00 :: 7200-04-01 :: 7200-04-01-1939","Possible undetected data corruption with certain Fibre Channel adapters","IJ21527","7200-04-02","IJ21527s1a.191216.AIX72TL04SP00.epkg.Z IJ21527s1a.191216.AIX72TL04SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ21527","devices.pci.df1000f7.com:7.2.4.0","20191218"," ","7100-04:IJ21581 7100-05:IJ21577 7200-02:IJ21578","https://aix.software.ibm.com/aix/ifixes/ij21527/"," ","yes" "hiper","vios","3.1.1.0 :: 3.1.1.10","Possible undetected data corruption with certain Fibre Channel adapters","IJ21527","3.1.1.20","IJ21527s1a.191216.VIOS3.1.1.0.epkg.Z IJ21527s1a.191216.VIOS3.1.1.10.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21527","devices.pci.df1000f7.com:7.2.4.0","20191218"," ","7100-04:IJ21581 7100-05:IJ21577 7200-02:IJ21578 7200-03:IJ21580 7200-04:IJ21527","https://aix.software.ibm.com/aix/ifixes/ij21527/"," ","yes" "hiper","vios","3.1.1.10","VIOS 3.1.1 SSP may not recover from network loss","IJ21564","3.1.1.20","IJ21564s1a.191211.VIOS3.1.1.10.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ21564","pool.basic.rte:7.2.4.1","20191214"," ","","https://aix.software.ibm.com/aix/ifixes/ij21564/"," ","yes" "hiper","vios","2.2.6.0 :: 2.2.6.10 :: 2.2.6.20 :: 2.2.6.30 :: 2.2.6.40 :: 2.2.6.50 :: 2.2.6.51","Possible undetected data corruption with certain Fibre Channel adapters","IJ21576","2.2.6.60","IJ21576sea.191216.VIOS2.2.6.51.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21576","devices.pci.df1000f7.com:6.1.9.300-6.1.9.401","20191218"," ","7100-04:IJ21581 7100-05:IJ21577 7200-02:IJ21578 7200-03:IJ21580 7200-04:IJ21527","https://aix.software.ibm.com/aix/ifixes/ij21576/"," ","yes" "hiper","aix","7100-05-00-1731 :: 7100-05-01 :: 7100-05-02 :: 7100-05-03 :: 7100-05-04 :: 7100-05-05 :: 7100-05-05-1939","Possible undetected data corruption with certain Fibre Channel adapters","IJ21577","7100-05-06","IJ21577s5a.191216.AIX71TL05SP05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ21577","devices.pci.df1000f7.com:7.1.5.0-7.1.5.32","20191218"," ","7100-04:IJ21581 7200-02:IJ21578 7200-03:IJ21580 7200-04:IJ21527","https://aix.software.ibm.com/aix/ifixes/ij21577/"," ","yes" "hiper","aix","7200-02-00-1731 :: 7200-02-01 :: 7200-02-02 :: 7200-02-03 :: 7200-02-04 :: 7200-02-05 :: 7200-02-05-1938","Possible undetected data corruption with certain Fibre Channel adapters","IJ21578","7200-02-06","IJ21578s4a.191216.AIX72TL02SP03.epkg.Z IJ21578s4a.191216.AIX72TL02SP04.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21578","devices.pci.df1000f7.com:7.2.2.0-7.2.2.17","20191218"," ","7100-04:IJ21581 7100-05:IJ21577 7200-03:IJ21580 7200-04:IJ21527","https://aix.software.ibm.com/aix/ifixes/ij21578/"," ","yes" "hiper","vios","3.1.0.0 :: 3.1.0.10 :: 3.1.0.20 :: 3.1.0.30","Possible undetected data corruption with certain Fibre Channel adapters","IJ21580","3.1.0.40","IJ21580s3a.191216.VIOS3.1.0.21.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21580","devices.pci.df1000f7.com:7.2.3.15-7.2.3.16","20191218"," ","7100-04:IJ21581 7100-05:IJ21577 7200-02:IJ21578 7200-03:IJ21580 7200-04:IJ21527","https://aix.software.ibm.com/aix/ifixes/ij21580/"," ","yes" "hiper","aix","7200-03-00 :: 7200-03-01 :: 7200-03-02 :: 7200-03-03 :: 7200-03-04 :: 7200-03-04-1938","Possible undetected data corruption with certain Fibre Channel adapters","IJ21580","7200-03-05","IJ21580s3a.191216.AIX72TL03SP02.epkg.Z IJ21580s3a.191216.AIX7wloW7JyDy0FcCNvo2TL03SP03.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21580","devices.pci.df1000f7.com:7.2.3.0-7.2.3.16","20191218"," ","7100-04:IJ21581 7100-05:IJ21577 7200-02:IJ21578 7200-04:IJ21527","https://aix.software.ibm.com/aix/ifixes/ij21580/"," ","yes" "hiper","aix","7100-04-00-1543 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05 :: 7100-04-06 :: 7100-04-07 :: 7100-04-08 :: 7100-04-08-1914","Possible undetected data corruption with certain Fibre Channel adapters","IJ21581","See Advisory","IJ21581s8a.191216.AIX71TL04SP07.epkg.Z IJ21581s8a.191216.AIX71TL04SP08.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ21581","devices.pci.df1000f7.com:7.1.4.0-7.1.4.34","20191218"," ","7100-05:IJ21577 7200-02:IJ21578 7200-03:IJ21580 7200-04:IJ21527","https://aix.software.ibm.com/aix/ifixes/ij21581/"," ","yes" "hiper","aix","7200-04-00 :: 7200-04-01 :: 7200-04-01-1939","I/O failures on LPARs using certain FC adapters","IJ22290","7200-04-02","IJ22290s1a.200124.AIX72TL04SP00-01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ22290","devices.pciex.df1060e214103404.com:7.2.4.0","20200125"," ","","https://aix.software.ibm.com/aix/ifixes/ij22290/"," ","yes" "hiper","vios","3.1.1.0 :: 3.1.1.10","I/O failures on LPARs using certain FC adapters","IJ22290","3.1.1.20","IJ22290s1a.200124.VIOS3.1.1.0.epkg.Z IJ22290s1a.200124.VIOS3.1.1.10.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ22290","devices.pciex.df1060e214103404.com:7.2.4.0","20200125"," ","","https://aix.software.ibm.com/aix/ifixes/ij22290/"," ","yes" "hiper","vios","3.1.1.0 :: 3.1.1.10","Possible undetected data corruption when disk attribute rw_max_time is non-zero","IJ22714","3.1.1.20","IJ22714s1a.200212.VIOS3.1.1.0.epkg.Z IJ22714s1a.200212.VIOS3.1.1.10.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ22714","devices.fcp.disk.rte:7.2.4.0","20200213"," ","","https://aix.software.ibm.com/aix/ifixes/ij22714/"," ","yes" "hiper","aix","7200-04-00 :: 7200-04-01 :: 7200-04-01-1939","Possible undetected data corruption when disk attribute rw_max_time is non-zero","IJ22714","7200-04-02","IJ22714s1a.200212.AIX72TL04SP00-01.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IJ22714","devices.fcp.disk.rte:7.2.4.0","20200213"," ","","https://aix.software.ibm.com/aix/ifixes/ij22714/"," ","yes" "hiper","vios","3.1.1.0 :: 3.1.1.10","NPIV I/O hangs and/or timeouts on VIOS 3.1.1","IJ23222","3.1.1.20","IJ23222s1a.200306.VIOS3.1.1.0.epkg.Z IJ23222s1a.200306.VIOS3.1.1.10.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IJ23222","devices.vdevice.IBM.vfc-server.rte:7.2.4.0","20200311"," ","","https://aix.software.ibm.com/aix/ifixes/ij23222/"," ","yes" "hiper","aix","7200-04-00 :: 7200-04-01 :: 7200-04-01-1939","Issues with 'sendmail' as non-root user on 7200-04 ","IJ24059","7200-04-02","IJ24059m1a.200409.AIX72TL04SP00-01.epkg.Z","https://www.ibm.com/support/pages/apar/IJ24059","bos.net.tcp.sendmail:7.2.4.0","20200430"," ","","https://aix.software.ibm.com/aix/ifixes/ij24059/"," ","no" "hiper","vios","3.1.1.0 :: 3.1.1.10 :: 3.1.1.20 :: 3.1.1.21","Using NPIV with VIOS 3.1.1 can cause a crash","IJ24885","3.1.1.22","IJ24885m1a.200513.VIOS3.1.1.0-3.1.1.10.epkg.Z IJ24885m2a.200512.VIOS3.1.1.20-3.1.1.21.epkg.Z","https://www.ibm.com/support/pages/apar/IJ24885","devices.vdevice.IBM.vfc-server.rte:7.2.4.0-7.2.4.1 devices.vdevice.IBM.v-scsi-host.rte:7.2.4.0-7.2.4.1","20200529"," ","","https://aix.software.ibm.com/aix/ifixes/ij24885/"," ","yes" "hiper","vios","3.1.1.20 :: 3.1.1.21","Slow TCP performance with Virtual Ethernet Adapter and largesend packets","IJ25390","3.1.1.22","IJ25390s2b.200608.VIOS.3.1.1.21.epkg.Z","https://www.ibm.com/support/pages/apar/IJ25390","devices.vdevice.IBM.l-lan.rte:7.2.4.1-7.2.4.2","20200613"," ","7100-05:IJ25443","https://aix.software.ibm.com/aix/ifixes/ij25390/"," ","yes" "hiper","aix","7200-04-02-2015 :: 7200-04-02-2016","Slow TCP performance with Virtual Ethernet Adapter and largesend packets","IJ25390","7200-04-02-2027","IJ25390s2b.200608.AIX72TL04SP02-2016.epkg.Z","https://www.ibm.com/support/pages/apar/IJ25390","devices.vdevice.IBM.l-lan.rte:7.2.4.1-7.2.4.2","20200613"," ","7100-05:IJ25443","https://aix.software.ibm.com/aix/ifixes/ij25390/"," ","no" "hiper","vios","2.2.6.60 :: 2.2.6.61","Slow TCP performance with Virtual Ethernet Adapter and largesend packets","IJ25442","2.2.6.62","IJ25442sFa.200611.VIOS2.2.6.60.epkg.Z IJ25442sFa.200611.VIOS2.2.6.61.epkg.Z ","https://www.ibm.com/support/pages/apar/IJ25442","devices.vdevice.IBM.l-lan.rte:6.1.9.402","20200613"," ","7100-05:IJ25443 7200-04:IJ25390","https://aix.software.ibm.com/aix/ifixes/ij25442/"," ","yes" "hiper","aix","7100-05-06-2015 :: 7100-05-06-2016","Slow TCP performance with Virtual Ethernet Adapter and largesend packets","IJ25443","7100-05-06-2028","IJ25443s6a.200611.AIX71TL05SP06-2015.epkg.Z IJ25443s6a.200611.AIX71TL05SP06-2016.epkg.Z","https://www.ibm.com/support/pages/apar/IJ25443","devices.vdevice.IBM.l-lan.rte:7.1.5.33","20200613"," ","7200-04:IJ25390","https://aix.software.ibm.com/aix/ifixes/ij25443/"," ","yes" "sec","aix","7100-05-04 :: 7100-05-05 :: 7100-05-06","There are vulnerabilities in BIND that impact AIX.","IJ25924 / CVE-2020-8616 / CVE-2020-8617","7100-05-07-2037","IJ25924s6a.200708.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc","bos.net.tcp.client:7.1.5.0-7.1.5.35","20200821"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar","CVE-2020-8616:8.6 / CVE-2020-8617:7.5","no" "sec","aix","7200-02-04 :: 7200-02-05 :: 7200-02-06","There are vulnerabilities in BIND that impact AIX.","IJ25925 / CVE-2020-8616 / CVE-2020-8617","n/a","IJ25925s6a.200708.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc","bos.net.tcp.bind_utils:7.2.2.0-7.2.2.18","20200821"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar","CVE-2020-8616:8.6 / CVE-2020-8617:7.5","no" "sec","aix","7200-03-03 :: 7200-03-04 :: 7200-03-05","There are vulnerabilities in BIND that impact AIX.","IJ25926 / CVE-2020-8616 / CVE-2020-8617","7200-03-06-2038","IJ25926s5a.200708.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc","bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16","20200821"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar","CVE-2020-8616:8.6 / CVE-2020-8617:7.5","no" "sec","vios","3.1.0.20 :: 3.1.0.30 :: 3.1.0.40","There are vulnerabilities in BIND that impact VIOS.","IJ25926 / CVE-2020-8616 / CVE-2020-8617","3.1.0.50","IJ25926s5a.200708.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc","bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16","20200821"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar","CVE-2020-8616:8.6 / CVE-2020-8617:7.5","no" "sec","aix","7200-04-00 :: 7200-04-01 :: 7200-04-02","There are vulnerabilities in BIND that impact AIX.","IJ25927 / CVE-2020-8616 / CVE-2020-8617","7200-04-03-2038","IJ25927s2a.200708.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc","bos.net.tcp.bind_utils:7.2.4.0-7.2.4.1","20200821"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar","CVE-2020-8616:8.6 / CVE-2020-8617:7.5","no" "sec","vios","3.1.1.10 :: 3.1.1.20 :: 3.1.1.21 :: 3.1.1.22 :: 3.1.1.25","There are vulnerabilities in BIND that impact VIOS.","IJ25927 / CVE-2020-8616 / CVE-2020-8617","3.1.1.30","IJ25927s2a.200708.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc","bos.net.tcp.bind_utils:7.2.4.0-7.2.4.1","20200821"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar","CVE-2020-8616:8.6 / CVE-2020-8617:7.5","no" "sec","vios","2.2.6.40 :: 2.2.6.41 :: 2.2.6.50 :: 2.2.6.51 :: 2.2.6.60 :: 2.2.6.61 :: 2.2.6.65","There are vulnerabilities in BIND that impact VIOS.","IJ26021 / CVE-2020-8616 / CVE-2020-8617","n/a","IJ26021sDa.200708.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc","bos.net.tcp.client:6.1.9.0-6.1.9.404","20200821"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar","CVE-2020-8616:8.6 / CVE-2020-8617:7.5","no" "sec","aix","NTPv4","There are vulnerabilities in NTPv4 that affect AIX.","IJ26684 / CVE-2020-11868 / CVE-2020-13817 / CVE-2020-15025","See Advisory","IJ26684s9a.200806.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory13.asc","ntp.rte:7.4.2.8100-7.4.2.8130","20201026"," ","","https://aix.software.ibm.com/aix/efixes/security/ntp_fix13.tar","CVE-2020-11868:5.9 / CVE-2020-13817:7.4 / CVE-2020-15025:4.4","no" "sec","aix","Perl","There are vulnerabilities in Perl that affect AIX.","IJ26985 / IJ26986 / CVE-2020-10543 / CVE-2020-10878 / CVE-2020-12723","See Bulletin","IJ26985s1a.200812.epkg.Z IJ26986s1a.200813.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/perl_advisory5.asc","perl.rte:5.20.1.0-5.20.1.3 perl.rte:5.28.1.0-5.28.1.3","20201209","20210304","n/a","https://aix.software.ibm.com/aix/efixes/security/perl_fix5.tar","CVE-2020-10543:9.8 / CVE-2020-10878:9.8 / CVE-2020-12723:9.8","no" "sec","aix","7200-05-00 :: 7200-05-01","IBM has released AIX iFixes in response to a vulnerability in IBM POWER9","IJ28226 / CVE-2020-4788","7200-05-02","IJ28226s1b.201117.epkg.Z IJ28226s1a.201117.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc","bos.mp64:7.2.5.0-7.2.5.1","20201119"," ","","https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar","CVE-2020-4788:5.1","yes" "sec","vios","3.1.2.0 :: 3.1.2.10","IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9","IJ28226 / CVE-2020-4788","3.1.2.20","IJ28226s1b.201117.epkg.Z IJ28226s1a.201117.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc","bos.mp64:7.2.5.0-7.2.5.1","20201119"," ","","https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar","CVE-2020-4788:5.1","yes" "sec","aix","7200-04-00 :: 7200-04-01 :: 7200-04-02","IBM has released AIX iFixes in response to a vulnerability in IBM POWER9","IJ28227 / CVE-2020-4788","7200-04-04","IJ28227s0a.200922.epkg.Z IJ28227s1a.200922.epkg.Z IJ28227s2a.200922.epkg.Z IJ28227s2b.200922.epkg.Z IJ28227s2c.200922.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc","bos.mp64:7.2.4.0-7.2.4.6","20201119"," ","","https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar","CVE-2020-4788:5.1","yes" "sec","vios","3.1.1.0 :: 3.1.1.10 :: 3.1.1.21 :: 3.1.1.25","IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9","IJ28227 / CVE-2020-4788","3.1.1.40","IJ28227s0a.200922.epkg.Z IJ28227s1a.200922.epkg.Z IJ28227s2a.200922.epkg.Z IJ28227s2b.200922.epkg.Z IJ28227s2c.200922.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc","bos.mp64:7.2.4.0-7.2.4.6","20201119"," ","","https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar","CVE-2020-4788:5.1","yes" "sec","aix","7200-03-03 :: 7200-03-04 :: 7200-03-05","IBM has released AIX iFixes in response to a vulnerability in IBM POWER9","IJ28228 / CVE-2020-4788","7200-03-07","IJ28228s3a.200921.epkg.Z IJ28228s4a.200921.epkg.Z IJ28228s5a.200921.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc","bos.mp64:7.2.3.0-7.2.3.19","20201119"," ","","https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar","CVE-2020-4788:5.1","yes" "sec","vios","3.1.0.20 :: 3.1.0.30 :: 3.1.0.40","IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9","IJ28228 / CVE-2020-4788","3.1.0.60","IJ28228s3a.200921.epkg.Z IJ28228s4a.200921.epkg.Z IJ28228s5a.200921.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc","bos.mp64:7.2.3.0-7.2.3.19","20201119"," ","","https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar","CVE-2020-4788:5.1","yes" "sec","aix","7100-05-05 :: 7100-05-06 :: 7100-05-07","IBM has released AIX iFixes in response to a vulnerability in IBM POWER9","IJ28229 / CVE-2020-4788","7100-05-08","IJ28229s5a.200921.epkg.Z IJ28229s5b.200922.epkg.Z IJ28229s6a.200921.epkg.Z IJ28229s6b.200922.epkg.Z IJ28229s6c.200922.epkg.Z IJ28229s7a.201117.epkg.Z IJ28229s7b.201117.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc","bos.mp64:7.1.5.0-7.1.5.40","20201119"," ","","https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar","CVE-2020-4788:5.1","yes" "hiper","aix","7200-04-00 :: 7200-04-01 :: 7200-04-02-2016 :: 7200-04-02-2028","For Power9 Multiple issues seen while using NPIV adapters with VIOS","IJ28565","See Bulletin","","https://www.ibm.com/support/pages/node/6443731","devices.vdevice.IBM.vfc-client.rte:7.2.4.0-7.2.4.3","20210415"," ","","https://www.ibm.com/support/pages/node/6404772"," ","yes" "hiper","aix","7200-04-00 :: 7200-04-01 :: 7200-04-02-2015 :: 7200-04-02-2016 :: 7200-04-02-2027 :: 7200-04-02-2028","Possible data loss using zlibNX library","IJ28579","7.2 Exp 10/2020","IJ28579s0a.201006.epkg.Z","https://www.ibm.com/support/pages/apar/IJ28579","zlibNX.rte:7.2.4.0-7.2.4.2","20201009"," ","","https://aix.software.ibm.com/aix/ifixes/ij28579/"," ","no" "hiper","aix","7100-05-00 :: 7100-05-00-1731 :: 7100-05-01 :: 7100-05-02 :: 7100-05-02-1810 :: 7100-05-03 :: 7100-05-03-1838 :: 7100-05-03-1846 :: 7100-05-04 :: 7100-05-05 :: 7100-05-05-1939 :: 7100-05-06-2016 :: 7100-05-06-2028","For Power9 Multiple issues seen while using NPIV adapters with VIOS","IJ28592","See Bulletin","See Bulletin","https://www.ibm.com/support/pages/node/6443731","devices.vdevice.IBM.vfc-client.rte:7.1.5.0-7.1.5.36","20210415"," ","","See Bulletin"," ","yes" "hiper","aix","7200-03-00 :: 7200-03-01 :: 7200-03-02 :: 7200-03-03 :: 7200-03-04 :: 7200-03-05","For Power9 Multiple issues seen while using NPIV adapters with VIOS","IJ28596","See Bulletin","","https://www.ibm.com/support/pages/node/6443731","devices.vdevice.IBM.vfc-client.rte:7.2.3.0-7.2.3.18","20210415"," ","","https://www.ibm.com/support/pages/node/6404772"," ","yes" "sec","aix","7100-05-05 :: 7100-05-06 :: 7100-05-07","Vulnerability in gencore affects AIX","IJ28825 / CVE-2020-4887","7100-05-08","IJ28825m5a.201221.epkg.Z IJ28825m5b.201221.epkg.Z IJ28825m6a.201221.epkg.Z IJ28825m6b.201221.epkg.Z IJ28825m6c.201221.epkg.Z IJ28825m7a.201221.epkg.Z IJ28825m7b.201221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc","bos.mp64:7.1.5.0-7.1.5.40","20210119"," ","","https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar","CVE-2020-4887:6.2","yes" "sec","aix","7200-03-03 :: 7200-03-04 :: 7200-03-05","Vulnerability in gencore affects AIX","IJ28826 / CVE-2020-4887","7200-03-07","IJ28826m3a.201221.epkg.Z IJ28826m4a.201221.epkg.Z IJ28826m5a.201221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc","bos.mp64:7.2.3.0-7.2.3.19","20210119"," ","","https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar","CVE-2020-4887:6.2","yes" "sec","vios","3.1.0.20 :: 3.1.0.21 :: 3.1.0.30 :: 3.1.0.40","Vulnerability in gencore affects VIOS","IJ28826 / CVE-2020-4887","3.1.0.60","IJ28826m3a.201221.epkg.Z IJ28826m4a.201221.epkg.Z IJ28826m5a.201221.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc","bos.mp64:7.2.3.0-7.2.3.19","20210119"," ","","https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar","CVE-2020-4887:6.2","yes" "sec","aix","7200-04-00 :: 7200-04-01 :: 7200-04-02 :: 7200-04-03","Vulnerability in gencore affects AIX","IJ28827 / CVE-2020-4887","7200-04-04","IJ28827m0a.201222.epkg.Z IJ28827m1a.201222.epkg.Z IJ28827m2a.201222.epkg.Z IJ28827m2b.201222.epkg.Z IJ28827m2c.201222.epkg.Z IJ28827m3a.210306.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc","bos.mp64:7.2.4.0-7.2.4.7","20210119","20210330","","https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar","CVE-2020-4887:6.2","yes" "sec","vios","3.1.1.0 :: 3.1.1.10 :: 3.1.1.20 :: 3.1.1.21 :: 3.1.1.22 :: 3.1.1.25 :: 3.1.1.30","Vulnerability in gencore affects VIOS","IJ28827 / CVE-2020-4887","3.1.1.40","IJ28827m0a.201222.epkg.Z IJ28827m1b.201222.epkg.Z IJ28827m2c.201222.epkg.Z IJ28827m2b.201222.epkg.Z IJ28827m2a.201222.epkg.Z IJ28827m3a.210306.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc","bos.mp64:7.2.4.0-7.2.4.7","20210119","20210330","","https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar","CVE-2020-4887:6.2","yes" "sec","aix","7200-05-00 :: 7200-05-01","Vulnerability in gencore affects AIX","IJ28828 / CVE-2020-4887","7200-05-02","IJ28828m1a.201222.epkg.Z IJ28828m1a.201222.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc","bos.mp64:7.2.5.0-7.2.5.1","20210119"," ","","https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar","CVE-2020-4887:6.2","yes" "sec","vios","3.1.2.0 :: 3.1.2.10","Vulnerability in gencore affects VIOS","IJ28828 / CVE-2020-4887","3.1.2.20","IJ28828m1a.201222.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc","bos.mp64:7.2.5.0-7.2.5.1","20210119"," ","","https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar","CVE-2020-4887:6.2","yes" "sec","aix","7200-03-03 :: 7200-03-04 :: 7200-03-05","There are vulnerabilities in BIND that impact AIX.","IJ29229 / CVE-2020-8622","7200-03-07","IJ29229m5a.201117.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc","bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16","20201218"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar","CVE-2020-8622:6.5","no" "sec","vios","3.1.0.20 :: 3.1.0.21 :: 3.1.0.30 :: 3.1.0.40","There are vulnerabilities in BIND that impact VIOS.","IJ29229 / CVE-2020-8622","3.1.0.60","IJ29229m5a.201117.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc","bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16","20201218"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar","CVE-2020-8622:6.5","no" "sec","aix","7100-05-05 :: 7100-05-06 :: 7100-05-07","There are vulnerabilities in BIND that impact AIX.","IJ29230 / CVE-2020-8622","7100-05-08","IJ29230m7a.201117.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc","bos.net.tcp.client:7.1.5.0-7.1.5.36","20201218"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar","CVE-2020-8622:6.5","no" "sec","aix","7200-04-00 :: 7200-04-01 :: 7200-04-02 :: 7200-04-03","There are vulnerabilities in BIND that impact AIX.","IJ29231 / CVE-2020-8622","7200-04-04","IJ29231m2a.201117.epkg.Z IJ29231s3a.210314.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc","bos.net.tcp.bind_utils:7.2.4.0-7.2.4.2","20201218","20210330","","https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar","CVE-2020-8622:6.5","no" "sec","vios","3.1.1.0 :: 3.1.1.10 :: 3.1.1.20 :: 3.1.1.21 :: 3.1.1.22 :: 3.1.1.25 :: 3.1.1.30","There are vulnerabilities in BIND that impact VIOS.","IJ29231 / CVE-2020-8622","3.1.1.40","IJ29231m2a.201117.epkg.Z IJ29231s3a.210314.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc","bos.net.tcp.bind_utils:7.2.4.0-7.2.4.2","20201218","20210330","","https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar","CVE-2020-8622:6.5","no" "sec","aix","7200-05-00 :: 7200-05-01","There are vulnerabilities in BIND that impact AIX.","IJ29232 / CVE-2020-8622","7200-05-02","IJ29232s1a.201117.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc","bos.net.tcp.bind_utils:7.2.5.0-7.2.5.1","20201218"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar","CVE-2020-8622:6.5","no" "sec","vios","3.1.2.0 :: 3.1.2.10","There are vulnerabilities in BIND that impact VIOS.","IJ29232 / CVE-2020-8622","3.1.2.20","IJ29232s1a.201117.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc","bos.net.tcp.bind_utils:7.2.5.0-7.2.5.1","20201218"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar","CVE-2020-8622:6.5","no" "hiper","aix","7100-05-07-2037","Users unable to login with LAM authentication","IJ29552","7100-05-08","IJ29552s7b.201209.AIX71TL05SP07.epkg.Z","https://www.ibm.com/support/pages/node/6409904","bos.rte.libc:7.1.5.35","20210129"," ","","https://aix.software.ibm.com/aix/ifixes/ij29552/"," ","yes" "hiper","aix","7200-05-00 :: 7200-05-01-2038","Users unable to login with LAM authentication","IJ29730","7200-05-02","IJ29730s1b.201209.AIX72TL05SP00-01.epkg.Z","https://www.ibm.com/support/pages/node/6409904","bos.rte.libc:7.2.5.0","20210129"," ","","https://aix.software.ibm.com/aix/ifixes/ij29730/"," ","yes" "hiper","vios","3.1.2.0 :: 3.1.2.10","TAPE BACKUP OR RESTORE MAY FAIL OR BE SLOW WITH VIOS 3.1.2","IJ30090","3.1.2.20","IJ30090s1a.201231.VIOS3.1.2.10.epkg.Z","https://www.ibm.com/support/pages/apar/IJ30090","devices.vdevice.IBM.vfc-server.rte:7.2.5.0-7.2.5.1","20210108"," ","","https://aix.software.ibm.com/aix/ifixes/ij30090/"," ","yes" "hiper","aix","7200-05-00 :: 7200-05-01","ksh failures on AIX 7.2 TL05","IJ30108","7200-05-02","IJ30108s1a.210205.AIX72TL05SP00-01.epkg.Z","https://www.ibm.com/support/pages/node/6412997","bos.rte.shell:7.2.5.0","20210206"," ","","https://aix.software.ibm.com/aix/ifixes/ij30108/"," ","yes" "sec","aix","7100-05-06 :: 7100-05-07","There is a vulnerability in the lpd daemon that affects AIX.","IJ30372 / CVE-2021-29693","7100-05-08","IJ30372s5a.210210.epkg.Z IJ30372s5a.210210.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc","bos.rte.printers:7.1.5.0-7.1.5.32","20210625"," ","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar","CVE-2021-29693:4.9","no" "sec","aix","7200-05-00 :: 7200-05-01","There is a vulnerability in the lpd daemon that affects AIX.","IJ30447 / CVE-2021-29693","7200-05-02","IJ30447s1a.210210.epkg.Z IJ30447s1a.210210.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc","bos.rte.printers:7.2.5.0","20210625"," ","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar","CVE-2021-29693:4.9","no" "sec","vios","3.1.2.0 :: 3.1.2.10","There is a vulnerability in the lpd daemon that affects VIOS.","IJ30447 / CVE-2021-29693","3.1.2.20","IJ30447s1a.210210.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc","bos.rte.printers:7.2.5.0","20210625"," ","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar","CVE-2021-29693:4.9","no" "sec","aix","7200-05-00 :: 7200-05-01 :: 7200-05-02","There is a vulnerability in Korn Shell (ksh) that affects AIX","IJ30557 / CVE-2021-29741","7200-05-03","IJ30557s2a.210427.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc","bos.rte.shell:7.2.5.0-7.2.5.2","20210730"," ","","https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar","CVE-2021-29741:8.4","no" "sec","vios","3.1.2.0 :: 3.1.2.10 :: 3.1.2.20 :: 3.1.2.21","There is a vulnerability in Korn Shell (ksh) that affects VIOS","IJ30557 / CVE-2021-29741","7200-05-03","IJ30557s2a.210427.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc","bos.rte.shell:7.2.5.0-7.2.5.2","20210730"," ","","https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar","CVE-2021-29741:8.4","no" "sec","aix","7200-03-05 :: 7200-03-06","There is a vulnerability in the lpd daemon that affects AIX.","IJ30799 / CVE-2021-29693","7200-03-07","IJ30799s4a.210209.epkg.Z IJ30799s4a.210209.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc","bos.rte.printers:7.2.3.0-7.2.3.17","20210625"," ","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar","CVE-2021-29693:4.9","no" "sec","vios","3.1.0.40 :: 3.1.0.50","There is a vulnerability in the lpd daemon that affects VIOS.","IJ30799 / CVE-2021-29693","3.1.0.60","IJ30799s4a.210209.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc","bos.rte.printers:7.2.3.0-7.2.3.17","20210625"," ","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar","CVE-2021-29693:4.9","no" "sec","aix","7200-04-02 :: 7200-04-03","There is a vulnerability in the lpd daemon that affects AIX.","IJ30800 / CVE-2021-29693","7200-04-04","IJ30799s4a.210209.epkg.Z IJ30799s4a.210209.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc","bos.rte.printers:7.2.4.0","20210625"," ","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar","CVE-2021-29693:4.9","no" "sec","vios","3.1.1.20 :: 3.1.1.21 :: 3.1.1.25 :: 3.1.1.30","There is a vulnerability in the lpd daemon that affects VIOS.","IJ30800 / CVE-2021-29693","3.1.1.40","IJ30800s1a.210210.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc","bos.rte.printers:7.2.4.0","20210625"," ","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar","CVE-2021-29693:4.9","no" "hiper","aix","7200-05-00 :: 7200-05-01-2038","Multithreaded applications core dump or hang","IJ30808","7200-05-02","IJ30808s1a.210212.AIX72TL05SP00-01.epkg.Z","https://www.ibm.com/support/pages/node/6415421","bos.rte.libpthreads:7.2.5.0","20210213"," ","","https://aix.software.ibm.com/aix/ifixes/ij30808/"," ","yes" "hiper","aix","7200-05-00 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02-2113","plain2crypt or crypt2plain on an active logical volume can cause potential undetected data corruption","IJ30848","7200-05-02-2114","IJ30848s1a.210329.AIX72TL05SP01.epkg.Z IJ31743s2a.210406.AIX72TL05SP02.epkg.Z","https://www.ibm.com/support/pages/node/6441009","bos.hdcrypt:7.2.5.0-7.2.5.1","20210407"," ","","https://aix.software.ibm.com/aix/ifixes/ij30848/"," ","yes" "hiper","aix","7200-05-00 :: 7200-05-01-2038 :: 7200-05-01-2039","applications may fail unexpectedly with permission errors with setreuid","IJ31049","7200-05-02","IJ31049m1a.210308.AIX72TL05SP01.epkg.Z IJ31049s1a.210308.AIX72TL05SP01.epkg.Z","https://www.ibm.com/support/pages/node/6430903","bos.mp64:7.2.5.0-7.2.5.1","20210308"," ","","https://aix.software.ibm.com/aix/ifixes/ij31049/"," ","yes" "hiper","aix","7200-05-00 :: 7200-05-01-2038 :: 7200-05-01-2039","Multiple issues seen while using NPIV adapters with AIX","IJ31191","7200-05-03","IJ31604m1b.210322.AIX72TL05SP01.epkg.Z IJ31604s2a.210414.AIX72TL05SP02.epkg.Z","https://www.ibm.com/support/pages/node/6443731","devices.vdevice.IBM.vfc-client.rte:7.2.5.1-7.2.5.3","20210415"," ","","https://aix.software.ibm.com/aix/ifixes/ij31191/"," ","yes" "hiper","aix","7200-05-02-2113 :: 7200-05-02-2114","Multiple issues seen while using NPIV adapters with AIX","IJ31604","7200-05-03","IJ31604m1b.210322.AIX72TL05SP01.epkg.Z IJ31604s2a.210414.AIX72TL05SP02.epkg.Z","https://www.ibm.com/support/pages/node/6443731","devices.vdevice.IBM.vfc-client.rte:7.2.5.1-7.2.5.3","20210415"," ","","https://aix.software.ibm.com/aix/ifixes/ij31191/"," ","yes" "sec","aix","7100-05-06 :: 7100-05-07 :: 7100-05-08","There is a vulnerability in Korn Shell (ksh) that affects AIX","IJ31606 / CVE-2021-29741","7100-05-09","IJ31606s6a.210628.epkg.Z IJ31606s7a.210628.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc","bos.rte.shell:7.1.5.0-7.1.5.36","20210730"," ","","https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar","CVE-2021-29741:8.4","no" "sec","aix","7200-04-02 :: 7200-04-03 :: 7200-04-04","There is a vulnerability in Korn Shell (ksh) that affects AIX","IJ31614 / CVE-2021-29741","7200-04-05","IJ31614s1a.210427.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc","bos.rte.shell:7.2.4.0-7.2.4.3","20210730"," ","","https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar","CVE-2021-29741:8.4","no" "sec","vios","3.1.1.20 :: 3.1.1.21 :: 3.1.1.22 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40","There is a vulnerability in Korn Shell (ksh) that affects VIOS","IJ31614 / CVE-2021-29741","7200-04-05","IJ31614s1a.210427.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc","bos.rte.shell:7.2.4.0-7.2.4.3","20210730"," ","","https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar","CVE-2021-29741:8.4","no" "hiper","vios","3.1.2.0 :: 3.1.2.10 :: 3.1.2.20 :: 3.1.2.21","For Power9 Multiple issues seen while using NPIV adapters with VIOS","IJ31936","3.1.2.30","IJ31936m1a.210409.VIOS3.1.2.10.epkg.Z IJ31936s2a.210414.VIOS3.1.2.21.epkg.Z","https://www.ibm.com/support/pages/node/6443731","devices.vdevice.IBM.vfc-server.rte:7.2.5.0-7.2.5.2","20210415"," ","","https://aix.software.ibm.com/aix/ifixes/ij31936/"," ","yes" "sec","aix","7200-03-05 :: 7200-03-06 :: 7200-03-07","There is a vulnerability in Korn Shell (ksh) that affects AIX","IJ32285 / CVE-2021-29741","See Bulletin","IJ32285s4a.210628.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc","bos.rte.shell:7.2.3.0-7.2.3.20","20210730"," ","","https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar","CVE-2021-29741:8.4","no" "sec","vios","3.1.0.40 :: 3.1.0.50 :: 3.1.0.60","There is a vulnerability in Korn Shell (ksh) that affects VIOS","IJ32285 / CVE-2021-29741","See Bulletin","IJ32285s4a.210628.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc","bos.rte.shell:7.2.3.0-7.2.3.20","20210730"," ","","https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar","CVE-2021-29741:8.4","no" "sec","aix","7200-03-05 :: 7200-03-06 :: 7200-03-07","There are multiple vulnerabilities in the AIX kernel","IJ32629 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862","See Bulletin","IJ32629m5a.210805.epkg.Z IJ32629m6a.210805.epkg.Z IJ32629s7a.210805.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc","bos.mp64:7.2.3.0-7.2.3.21","20210825"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar","CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2","yes" "sec","vios","3.1.0.40 :: 3.1.0.50 :: 3.1.0.60","There are multiple vulnerabilities in the AIX kernel for VIOS","IJ32629 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862","See Bulletin","IJ32629m5a.210805.epkg.Z IJ32629m6a.210805.epkg.Z IJ32629s7a.210805.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc","bos.mp64:7.2.3.0-7.2.3.21","20210825"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar","CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2","yes" "sec","aix","7200-04-02 :: 7200-04-03 :: 7200-04-04","There are multiple vulnerabilities in the AIX kernel","IJ32630 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862","7200-04-05","IJ32630m2e.210901.epkg.Z IJ32630m2f.210901.epkg.Z IJ32630m3b.210901.epkg.Z IJ32630s4a.210813.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc","bos.mp64:7.2.4.0-7.2.4.8","20210825"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar","CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2","yes" "sec","vios","3.1.1.21 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40","There are multiple vulnerabilities in the AIX kernel for VIOS","IJ32630 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862","3.1.1.50","IJ32630m2f.210901.epkg.Z IJ32630m2e.210901.epkg.Z IJ32630m3b.210901.epkg.Z IJ32630s4a.210813.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc","bos.mp64:7.2.4.0-7.2.4.8","20210825"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar","CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2","yes" "sec","aix","7200-05-01 :: 7200-05-02","There are multiple vulnerabilities in the AIX kernel","IJ32631 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862","7200-05-03","IJ32631m1a.210805.epkg.Z IJ32631s2a.210805.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc","bos.mp64:7.2.5.0-7.2.5.3","20210825"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar","CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2","yes" "sec","vios","3.1.2.10 :: 3.1.2.21","There are multiple vulnerabilities in the AIX kernel for VIOS","IJ32631 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862","3.1.2.30","IJ32631m1a.210805.epkg.Z IJ32631s2a.210805.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc","bos.mp64:7.2.5.0-7.2.5.3","20210825"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar","CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2","yes" "sec","vios","3.1.2.10 :: 3.1.2.21","Vulnerability in libc affects AIX","IJ32714 / CVE-2021-29860","3.1.2.30","IJ34081m1a.211112.epkg.Z IJ34081m2b.211112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc","bos.rte.libc:7.2.5.0-7.2.5.2","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ","CVE-2021-29860:6.2","yes" "sec","aix","7200-05-01 :: 7200-05-02","Vulnerability in libc affects AIX","IJ32736 / IJ34081 / CVE-2021-29860","7.2.5.03-2135","IJ34081m1a.211112.epkg.Z IJ34081m2b.211112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc","bos.rte.libc:7.2.5.0-7.2.5.2","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ","CVE-2021-29860:6.2","yes" "sec","aix","7100-05-06 :: 7100-05-07 :: 7100-05-08","There is a vulnerability in the AIX trace facility.","IJ32940 / CVE-2021-29706","7100-05-09","IJ32940m6a.210615.epkg.Z IJ32940m6b.210615.epkg.Z IJ32940m7a.210615.epkg.Z IJ32940m7b.210615.epkg.Z IJ32940s8a.210615.epkg.Z IJ32940s8b.210615.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/trace_advisory.asc","bos.mp64:7.1.5.0-7.1.5.42","20210615"," ","","https://aix.software.ibm.com/aix/efixes/security/trace_fix.tar","CVE-2021-29706:6.8","yes" "sec","aix","7100-05-06 :: 7100-05-07 :: 7100-05-08","There is a vulnerability in BIND that affects AIX.","IJ33276 / CVE-2021-25215","7100-05-09","IJ33276s8a.210622.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc","bos.net.tcp.server:7.1.5.0-7.1.5.34","20210729"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar","CVE-2021-25215:7.5","no" "sec","aix","7200-03-05 :: 7200-03-06 :: 7200-03-07","There is a vulnerability in BIND that affects AIX.","IJ33277 / CVE-2021-25215","See Bulletin","IJ33277s7a.210622.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc","bos.net.tcp.bind:7.2.3.0-7.2.3.15","20210729"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar","CVE-2021-25215:7.5","no" "sec","vios","3.1.0.40 :: 3.1.0.50 :: 3.1.0.60","There is a vulnerability in BIND that affects VIOS.","IJ33277 / CVE-2021-25215","See Bulletin","IJ33277s7a.210622.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc","bos.net.tcp.bind:7.2.3.0-7.2.3.15","20210729"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar","CVE-2021-25215:7.5","no" "sec","aix","7200-04-02 :: 7200-04-03 :: 7200-04-04","There is a vulnerability in BIND that affects AIX.","IJ33278 / CVE-2021-25215","7200-04-05","IJ33278s4a.210622.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc","bos.net.tcp.bind:7.2.4.0","20210729"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar","CVE-2021-25215:7.5","no" "sec","vios","3.1.1.20 :: 3.1.1.21 :: 3.1.1.22 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40","There is a vulnerability in BIND that affects VIOS.","IJ33278 / CVE-2021-25215","3.1.1.50","IJ33278s4a.210622.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc","bos.net.tcp.bind:7.2.4.0","20210729"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar","CVE-2021-25215:7.5","no" "sec","aix","7200-05-00 :: 7200-05-01 :: 7200-05-02","There is a vulnerability in BIND that affects AIX.","IJ33279 / CVE-2021-25215","7200-05-03","IJ33279s2a.210621.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc","bos.net.tcp.bind:7.2.5.0-7.2.5.1","20210729"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar","CVE-2021-25215:7.5","no" "sec","vios","3.1.2.0 :: 3.1.2.10 :: 3.1.2.20 :: 3.1.2.21","There is a vulnerability in BIND that affects VIOS.","IJ33279 / CVE-2021-25215","3.1.2.30","IJ33279s2a.210621.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc","bos.net.tcp.bind:7.2.5.0-7.2.5.1","20210729"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar","CVE-2021-25215:7.5","no" "sec","aix","7100-05-06 :: 7100-05-07 :: 7100-05-08","There are multiple vulnerabilities in the AIX kernel","IJ33318 / CVE-2021-29727 / CVE-2021-29801 / CVE-2021-29862","7100-05-09","IJ33318m6a.210816.epkg.Z IJ33318m7a.210813.epkg.Z IJ33318m8a.210813.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc","bos.mp64:7.1.5.0-7.1.5.42","20210825","20210901","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar","CVE-2021-29727:6.2 / CVE-2021-29801:8.4 / CVE-2021-29862:6.2","yes" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11","Vulnerability in libc affects AIX","IJ33560 / IJ35673 / CVE-2021-29860","7100-05-12","IJ33560m7b.211112.epkg.Z IJ33560m8b.211112.epkg.Z IJ35673s9a.211115.epkg.Z IJ35673sAa.221206.epkg.Z IJ35673sBa.230314.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc","bos.rte.libc:7.1.5.0-7.1.5.39","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ","CVE-2021-29860:6.2","yes" "hiper","aix","7200-04-00 :: 7200-04-01 :: 7200-04-02-2016 :: 7200-04-02-2028 :: 7200-04-03 :: 7200-04-04-2114","Applications can terminate on systems with active IPv6 traffic","IJ34301","See Bulletin","IJ34301s1a.210808.AIX72TL04SP00-01.epkg.Z IJ34301s2a.210807.AIX72TL04SP02.epkg.Z IJ34301s3a.210809.AIX72TL04SP03.epkg.Z IJ34301s4a.210811.AIX72TL04SP04.epkg.Z","https://www.ibm.com/support/pages/node/6480733","bos.net.tcp.client_core:7.2.4.0-7.2.4.3","20210819"," ","","https://aix.software.ibm.com/aix/ifixes/ij34301/"," ","yes" "hiper","aix","7200-03-00 :: 7200-03-01 :: 7200-03-02 :: 7200-03-03 :: 7200-03-04 :: 7200-03-05 :: 7200-03-06 :: 7200-03-07 :: 7200-03-07-2114","Applications can terminate on systems with active IPv6 traffic","IJ34340","See Bulletin","IJ34340s3a.210810.AIX72TL03SP03.epkg.Z IJ34340s7a.210811.AIX72TL03SP07.epkg.Z","https://www.ibm.com/support/pages/node/6480733","bos.net.tcp.client_core:7.2.3.0-7.2.3.21","20210819"," ","","https://aix.software.ibm.com/aix/ifixes/ij34340/"," ","yes" "hiper","aix","7100-05-00 :: 7100-05-00-1731 :: 7100-05-01 :: 7100-05-02 :: 7100-05-02-1810 :: 7100-05-03 :: 7100-05-03-1838 :: 7100-05-03-1846 :: 7100-05-04 :: 7100-05-05 :: 7100-05-05-1939 :: 7100-05-06-2016 :: 7100-05-06-2028 :: 7100-05-07 :: 7100-05-08","Applications can terminate on systems with active IPv6 traffic","IJ34375","7100-05-09-2136","IJ34375s8a.210813.AIX71TL05SP08.epkg.Z","https://www.ibm.com/support/pages/node/6480733","bos.net.tcp.client:7.1.5.0-7.1.5.37","20210819"," ","","https://aix.software.ibm.com/aix/ifixes/ij34375/"," ","yes" "hiper","aix","7200-05-00 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114","Applications can terminate on systems with active IPv6 traffic","IJ34376","7200-05-03-2136","IJ34376s2a.210813.AIX72TL05SP02-2114.epkg.Z","https://www.ibm.com/support/pages/node/6480733","bos.net.tcp.client_core:7.2.5.0-7.2.5.4","20210819"," ","","https://aix.software.ibm.com/aix/ifixes/ij34376/"," ","yes" "sec","aix","7200-04-02 :: 7200-04-03 :: 7200-04-04","Vulnerability in libc affects AIX","IJ34512 / IJ35675 / CVE-2021-29860","7200-04-05","IJ34512m2a.211112.epkg.Z IJ34512m3a.211112.epkg.Z IJ34512m4a.211112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc","bos.rte.libc:7.2.4.0-7.2.4.3","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ","CVE-2021-29860:6.2","yes" "sec","vios","3.1.3.10","Vulnerability in EFS affects AIX","IJ35078 / CVE-2021-29861","3.1.3.14","IJ35078s3a.211026.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc","bos.rte.security:7.2.5.100-7.2.5.100","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ","CVE-2021-29861:6.2","yes" "sec","aix","7200-05-01 :: 7200-05-02 :: 7200-05-03","Vulnerability in EFS affects AIX","IJ35078 / IJ35211 / CVE-2021-29861","7.2.5.03-2147","IJ35078s3a.211026.epkg.Z IJ35211m1a.211110.epkg.Z IJ35211m2a.211103.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc","bos.rte.security:7.2.5.0-7.2.5.1 bos.rte.security:7.2.5.100-7.2.5.100","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ","CVE-2021-29861:6.2","yes" "hiper","aix","7200-05-00 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2147 :: 7200-05-03-2148","Encrypted logical volumes unable to mount","IJ35178","7200-05-04-2219","IJ35178m3b.211209.AIX72TL05SP03-2136.epkg.Z","https://www.ibm.com/support/pages/node/6494777","bos.hdcrypt:7.2.5.0-7.2.5.102","20211111"," ","","https://aix.software.ibm.com/aix/ifixes/ij35178/"," ","yes" "sec","vios","3.1.2.10 :: 3.1.2.21","Vulnerability in EFS affects AIX","IJ35211 / CVE-2021-29861","3.1.2.30","IJ35211m1a.211110.epkg.Z IJ35211m2a.211103.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc","bos.rte.security:7.2.5.0-7.2.5.1","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ","CVE-2021-29861:6.2","yes" "sec","vios","3.1.1.21 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40","Vulnerability in EFS affects AIX","IJ35226 / CVE-2021-29861","3.1.1.50","IJ35226m2a.211103.epkg.Z IJ35226m3a.211103.epkg.Z IJ35226m4a.211103.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc","bos.rte.security:7.2.4.0-7.2.4.3","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ","CVE-2021-29861:6.2","yes" "sec","aix","7200-04-02 :: 7200-04-03 :: 7200-04-04","Vulnerability in EFS affects AIX","IJ35226 / CVE-2021-29861","7200-04-05","IJ35226m2a.211103.epkg.Z IJ35226m3a.211103.epkg.Z IJ35226m4a.211103.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc","bos.rte.security:7.2.4.0-7.2.4.3","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ","CVE-2021-29861:6.2","yes" "sec","vios","3.1.0.40 :: 3.1.0.50 :: 3.1.0.60","Vulnerability in EFS affects AIX","IJ35505 / CVE-2021-29861","See Bulletin","IJ35505m5a.211103.epkg.Z IJ35505m6a.211103.epkg.Z IJ35505m7a.211103.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc","","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ","CVE-2021-29861:6.2","yes" "hiper","aix","7100-05-09-2135 :: 7100-05-09-2136","Etherchannel failure with CAA and LACP","IJ35577","7100-05-09-2148","IJ35577s9a.211015.AIX71TL05SP09-213x.epkg.Z","https://www.ibm.com/support/pages/node/6507119","bos.cluster.rte:7.1.5.37","20211022"," ","","https://aix.software.ibm.com/aix/ifixes/ij35577/"," ","yes" "hiper","aix","7200-05-03-2135 :: 7200-05-03-2136","Etherchannel failure with CAA and LACP","IJ35588","7200-05-03-2147","IJ35588s3a.211015.AIX72TL05SP03-213x.epkg.Z","https://www.ibm.com/support/pages/node/6507119","bos.cluster.rte:7.2.5.100","20211022"," ","","https://aix.software.ibm.com/aix/ifixes/ij35588/"," ","yes" "hiper","vios","3.1.3.0 :: 3.1.3.10","Etherchannel failure with CAA and LACP on VIOS","IJ35588","3.1.3.13","IJ35588s3a.211015.VIOS3.1.3.0.epkg.Z IJ35588s3a.211015.VIOS3.1.3.10.epkg.Z","https://www.ibm.com/support/pages/node/6507119","bos.cluster.rte:7.2.5.100","20211022"," ","","https://aix.software.ibm.com/aix/ifixes/ij35588/"," ","yes" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09-2136","There is a vulnerability in the mount command that affects AIX.","IJ35620 / CVE-2021-38990","7100-05-09-2148","IJ35620s9a.211130.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc","bos.rte.filesystem:7.1.5.0-7.1.5.36","20220106"," ","","https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar","CVE-2021-38990:8.4","no" "sec","aix","7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136","There is a vulnerability in the mount command that affects AIX.","IJ35623 / IJ36125 / CVE-2021-38990","7200-05-03-2147","IJ36125s2a.211130.epkg.Z IJ35623s3a.211130.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc","bos.rte.filesystem:7.2.5.0-7.2.5.1 bos.rte.filesystem:7.2.5.100","20220106"," ","","https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar","CVE-2021-38990:8.4","no" "sec","vios","3.1.3.10","There is a vulnerability in the mount command that affects VIOS.","IJ35623 / CVE-2021-38990","3.1.3.13","IJ35623s3a.211130.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc","bos.rte.filesystem:7.2.5.100","20220106"," ","","https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar","CVE-2021-38990:8.4","no" "sec","vios","3.1.0.40 :: 3.1.0.50 :: 3.1.0.60","Vulnerability in libc affects AIX","IJ35674 / CVE-2021-29860","See Bulletin","IJ35681m5a.211112.epkg.Z IJ35681m6a.211112.epkg.Z IJ35681m7a.211112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc","","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ","CVE-2021-29860:6.2","yes" "sec","vios","3.1.1.21 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40","Vulnerability in libc affects AIX","IJ35675 / CVE-2021-29860","3.1.1.50","IJ34512m2a.211112.epkg.Z IJ34512m3a.211112.epkg.Z IJ34512m4a.211112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc","bos.rte.libc:7.2.4.0-7.2.4.3","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ","CVE-2021-29860:6.2","yes" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11","Vulnerability in EFS affects AIX","IJ35780 / CVE-2021-29861","7100-05-12","IJ35780m7a.211103.epkg.Z IJ35780m8a.211103.epkg.Z IJ35780m9a.211103.epkg.Z IJ35780mBa.230314.epkg.Z IJ35780sAa.221206.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc","bos.rte.security:7.1.5.0-7.1.5.39","20211116","20230317","","https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ","CVE-2021-29861:6.2","yes" "sec","aix","7200-04-02 :: 7200-04-02-2016 :: 7200-04-02-2028 :: 7200-04-03 :: 7200-04-04","There is a vulnerability in the mount command that affects AIX.","IJ35826 / CVE-2021-38990","7200-04-05","IJ35826s2a.211130.epkg.Z IJ35826s4a.211130.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc","bos.rte.filesystem:7.2.4.0-7.2.4.2","20220106"," ","","https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar","CVE-2021-38990:8.4","no" "sec","vios","3.1.1.21 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40","There is a vulnerability in the mount command that affects VIOS.","IJ35826 / CVE-2021-38990","3.1.1.50","IJ35826s2a.211130.epkg.Z IJ35826s4a.211130.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc","bos.rte.filesystem:7.2.4.0-7.2.4.2","20220106"," ","","https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar","CVE-2021-38990:8.4","no" "sec","vios","3.1.2.10 :: 3.1.2.21","There is a vulnerability in the mount command that affects VIOS.","IJ36125 / CVE-2021-38990","3.1.2.30","IJ36125s2a.211130.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc","bos.rte.filesystem:7.2.5.0-7.2.5.1","20220106"," ","","https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar","CVE-2021-38990:8.4","no" "sec","aix","7300-00-01","There is a vulnerability in the AIX nimsh daemon.","IJ36593 / CVE-2022-22351","7300-00-02","DEPRECATED::IJ36593s1a.220208.epkg.Z IJ36593m1a.220324.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc","bos.sysmgt.nim.client:7.3.0.0","20220304","20220324","","https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar","CVE-2022-22351:6.1","no" "sec","aix","7300-00-01","Vulnerabilities in AIX CAA","IJ36596 / CVE-2022-22350 / CVE-2021-38996","7300-00-02","IJ36596s1a.220228.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc","bos.cluster.rte:7.3.0.0-7.3.0.0","20220301"," ","","https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar","CVE-2022-22350:6.2 / CVE-2021-38996:6.2","yes" "sec","vios","3.1.2.10 :: 3.1.2.21","There is a vulnerability in the AIX nimsh daemon for VIOS.","IJ36681 / IJ37706 / CVE-2022-22351","3.1.2.40","DEPRECATED::IJ37706s2a.220208.epkg.Z IJ37706m2a.220324.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc","bos.sysmgt.nim.client:7.2.5.0-7.2.5.1 bos.sysmgt.nim.client:7.2.5.100","20220304","20220324","","https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar","CVE-2022-22351:6.1","no" "sec","vios","3.1.3.10 :: 3.1.3.14","There is a vulnerability in the AIX nimsh daemon for VIOS.","IJ36681 / IJ37706 / CVE-2022-22351","3.1.3.20","DEPRECATED::IJ36681s3a.220208.epkg.Z IJ36681m3a.220324.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc","bos.sysmgt.nim.client:7.2.5.0-7.2.5.1 bos.sysmgt.nim.client:7.2.5.100","20220304","20220324","","https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar","CVE-2022-22351:6.1","no" "sec","aix","7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148","There is a vulnerability in the AIX nimsh daemon.","IJ36681 / IJ37706 / CVE-2022-22351","7200-05-04","DEPRECATED::IJ37706s2a.220208.epkg.Z DEPRECATED::IJ36681s3a.220208.epkg.Z IJ37706m2a.220324.epkg.Z IJ36681m3a.220324.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc","bos.sysmgt.nim.client:7.2.5.0-7.2.5.1 bos.sysmgt.nim.client:7.2.5.100","20220304","20220324","","https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar","CVE-2022-22351:6.1","no" "sec","vios","3.1.2.10 :: 3.1.2.21","Vulnerabilities in AIX CAA","IJ36682 / IJ37512 / IJ35657 / CVE-2022-22350 / CVE-2021-38996","3.1.2.40","IJ37512s1a.220228.epkg.Z IJ37512s2a.220228.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc","bos.cluster.rte:7.2.5.0-7.2.5.1","20220301"," ","","https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar","CVE-2022-22350:6.2 / CVE-2021-38996:6.2","yes" "sec","vios","3.1.3.10 :: 3.1.3.14","Vulnerabilities in AIX CAA","IJ36682 / IJ37512 / IJ35657 / CVE-2022-22350 / CVE-2021-38996","3.1.3.20","IJ36682s3a.220228.epkg.Z IJ36682s3b.220228.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc","bos.cluster.rte:7.2.5.100-7.2.5.101","20220301"," ","","https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar","CVE-2022-22350:6.2 / CVE-2021-38996:6.2","yes" "sec","aix","7200-05-01 :: 7200-05-02 :: 7200-05-03","Vulnerabilities in AIX CAA","IJ36682 / IJ37512 / IJ35657 / CVE-2022-22350 / CVE-2021-38996","7200-05-04","IJ36682s3a.220228.epkg.Z IJ36682s3b.220228.epkg.Z IJ37512s1a.220228.epkg.Z IJ37512s2a.220228.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc","bos.cluster.rte:7.2.5.0-7.2.5.1 bos.cluster.rte:7.2.5.100-7.2.5.101","20220301"," ","","https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar","CVE-2022-22350:6.2 / CVE-2021-38996:6.2","yes" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148","There is a vulnerability in the lscore command that affects AIX.","IJ36805 / CVE-2021-38991","7100-05-10","IJ36805s9a.211217.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc","bos.rte.security:7.1.5.0-7.1.5.37","20220110"," ","","https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar","CVE-2021-38991:8.4","no" "sec","aix","7200-04-02 :: 7200-04-02-2016 :: 7200-04-02-2028 :: 7200-04-03 :: 7200-04-04","There is a vulnerability in the lscore command that affects AIX.","IJ36806 / CVE-2021-38991","7200-04-06","IJ36806s2a.211217.epkg.Z IJ36806s4a.211217.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc","bos.rte.security:7.2.4.0-7.2.4.3","20220110"," ","","https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar","CVE-2021-38991:8.4","no" "sec","vios","3.1.1.21 :: 3.1.1.25 :: 3.1.1.30 :: 3.1.1.40","There is a vulnerability in the lscore command that affects VIOS.","IJ36806 / CVE-2021-38991","3.1.1.60","IJ36806s2a.211217.epkg.Z IJ36806s4a.211217.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc","bos.rte.security:7.2.4.0-7.2.4.3","20220110"," ","","https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar","CVE-2021-38991:8.4","no" "sec","aix","7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136","There is a vulnerability in the lscore command that affects AIX.","IJ36810 / IJ36815 / CVE-2021-38991","7200-05-04","IJ36815s2a.211217.epkg.Z IJ36810s3a.211217.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc","bos.rte.security:7.2.5.0-7.2.5.1 bos.rte.security:7.2.5.100-7.2.5.101","20220110"," ","","https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar","CVE-2021-38991:8.4","no" "sec","vios","3.1.3.10 :: 3.1.3.14","There is a vulnerability in the lscore command that affects VIOS.","IJ36810 / CVE-2021-38991","3.1.3.20","IJ36810s3a.211217.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc","bos.rte.security:7.2.5.100-7.2.5.101","20220110"," ","","https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar","CVE-2021-38991:8.4","no" "sec","vios","3.1.2.10 :: 3.1.2.21","There is a vulnerability in the lscore command that affects VIOS.","IJ36815 / CVE-2021-38991","3.1.2.40","IJ36815s2a.211217.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc","bos.rte.security:7.2.5.0-7.2.5.1","20220110"," ","","https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar","CVE-2021-38991:8.4","no" "sec","aix","7300-00-01","There is a vulnerability in the lscore command that affects AIX.","IJ36816 / CVE-2021-38991","7300-00-02","IJ36816s1a.211217.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc","bos.rte.security:7.3.0.0","20220110"," ","","https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar","CVE-2021-38991:8.4","no" "sec","aix","7300-00-01","Vulnerabilities in the AIX kernel","IJ37001 / CVE-2021-38994 / CVE-2021-38995","7300-00-02","IJ37001m1a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc","bos.mp64:7.3.0.0-7.3.0.1","20220223"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar","CVE-2021-38994:6.2 / CVE-2021-38995:6.2","yes" "sec","vios","3.1.2.10 :: 3.1.2.21","Vulnerabilities in the AIX kernel","IJ37012 /IJ37776 / IJ37053 / CVE-2021-38994 / CVE-2021-38995","3.1.2.40","IJ37776m1a.220215.epkg.Z IJ37776m2a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc","bos.mp64:7.2.5.0-7.2.5.3","20220223"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar","CVE-2021-38994:6.2 / CVE-2021-38995:6.2","yes" "sec","vios","3.1.3.10 :: 3.1.3.14","Vulnerabilities in the AIX kernel","IJ37012 /IJ37776 / IJ37053 / CVE-2021-38994 / CVE-2021-38995","3.1.3.20","IJ37012m3a.220215.epkg.Z IJ37012m3b.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc","bos.mp64:7.2.5.100-7.2.5.103","20220223"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar","CVE-2021-38994:6.2 / CVE-2021-38995:6.2","yes" "sec","aix","7200-05-01 :: 7200-05-02 :: 7200-05-03","Vulnerabilities in the AIX kernel","IJ37012 / IJ37776 / IJ37053 / CVE-2021-38994 / CVE-2021-38995","7200-05-04","IJ37012m3a.220215.epkg.Z IJ37012m3b.220215.epkg.Z IJ37776m1a.220215.epkg.Z IJ37776m2a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc","bos.mp64:7.2.5.0-7.2.5.3 bos.mp64:7.2.5.100-7.2.5.103","20220223"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar","CVE-2021-38994:6.2 / CVE-2021-38995:6.2","yes" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148","There is a vulnerability in BIND that affects AIX.","IJ37222 / CVE-2021-25219","7100-05-10","DEPRECATED::IJ37222s9a.220120.epkg.Z IJ37222m9c.220315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc","bos.net.tcp.server:7.1.5.0-7.1.5.35 bos.net.tcp.client:7.1.5.0-7.1.5.40","20220301","20220316","","https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar","CVE-2021-25219:5.3","no" "sec","vios","3.1.2.10 :: 3.1.2.21","There is a vulnerability in BIND that affects AIX for VIOS.","IJ37223 / IJ37224 / IJ37325 / CVE-2021-25219","3.1.2.40","DEPRECATED::IJ37224s3a.220120.epkg.Z IJ37224m3c.220315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc","bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100 bos.net.tcp.bind_utils:7.2.5.100","20220301","20220316","","https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar","CVE-2021-25219:5.3","no" "sec","vios","3.1.3.10 :: 3.1.3.14","There is a vulnerability in BIND that affects AIX for VIOS.","IJ37223 / IJ37224 / IJ37325 / CVE-2021-25219","3.1.2.40","DEPRECATED::IJ37224s3a.220120.epkg.Z IJ37224m3c.220315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc","bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100 bos.net.tcp.bind_utils:7.2.5.100","20220301","20220316","","https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar","CVE-2021-25219:5.3","no" "sec","aix","7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148","There is a vulnerability in BIND that affects AIX.","IJ37223 / IJ37224 / IJ37325 / CVE-2021-25219","7200-05-04","DEPRECATED::IJ37224s3a.220120.epkg.Z IJ37224m3c.220315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc","bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100 bos.net.tcp.bind_utils:7.2.5.100","20220301","20220316","","https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar","CVE-2021-25219:5.3","no" "sec","vios","3.1.1.30 :: 3.1.1.40 :: 3.1.1.50","There is a vulnerability in BIND that affects AIX for VIOS.","IJ37225 / CVE-2021-25219","3.1.1.60","DEPRECATED::IJ37225s5a.220223.epkg.Z IJ37225m5c.220315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc","bos.net.tcp.bind:7.2.4.0-7.2.4.1 bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3","20220301","20220316","","https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar","CVE-2021-25219:5.3","no" "sec","aix","7200-04-03 :: 7200-04-04 :: 7200-04-05","There is a vulnerability in BIND that affects AIX.","IJ37225 / CVE-2021-25219","7200-04-06","DEPRECATED::IJ37225s5a.220223.epkg.Z IJ37225m5c.220315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc","bos.net.tcp.bind:7.2.4.0-7.2.4.1 bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3","20220301","20220316","","https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar","CVE-2021-25219:5.3","no" "sec","aix","7300-00-01","There is a vulnerability in BIND that affects AIX.","IJ37226 / CVE-2021-25219","7300-00-02","DEPRECATED::IJ37226s1a.220120.epkg.Z IJ37226s1b.220315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc","bos.net.tcp.bind:7.3.0.0 bos.net.tcp.bind:7.3.0.0","20220301","20220316","","https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar","CVE-2021-25219:5.3","no" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09","Vulnerabilities in AIX CAA","IJ37355 / CVE-2022-22350 / CVE-2021-38996","7100-05-10","IJ37355s7a.220228.epkg.Z IJ37355s8a.220228.epkg.Z IJ37355s9a.220228.epkg.Z IJ37355s9b.220228.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc","bos.cluster.rte:7.1.5.0-7.1.5.38","20220301"," ","","https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar","CVE-2022-22350:6.2 / CVE-2021-38996:6.2","yes" "sec","aix","7300-00-01","There is a vulnerability in the AIX pfcdd kernel extension.","IJ37403 / CVE-2021-38988","7300-00-02","IJ37504s5a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc","bos.pfcdd.rte:7.3.0.0","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar","CVE-2021-38988:6.2","yes" "sec","aix","7300-00-01","There is a vulnerability in the AIX pmsvcs kernel extension.","IJ37411 / CVE-2021-38989","7300-00-02","IJ37411s1a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc","bos.pmapi.pmsvcs:7.3.0.0","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar","CVE-2021-38989:6.2","yes" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148","There is a vulnerability in the AIX nimsh daemon.","IJ37419 / CVE-2022-22351","7100-05-10","DEPRECATED::IJ37419s9a.220208.epkg.Z IJ37419m9a.220324.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc","bos.sysmgt.nim.client:7.1.5.0-7.1.5.37","20220304","20220324","","https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar","CVE-2022-22351:6.1","no" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09","Vulnerabilities in the AIX kernel","IJ37452 / CVE-2021-38994 / CVE-2021-38995","7100-05-10","IJ37452m7a.220215.epkg.Z IJ37452m8a.220215.epkg.Z IJ37452s9a.220215.epkg.Z IJ37452s9b.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc","bos.mp64:7.1.5.0-7.1.5.45","20220223"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar","CVE-2021-38994:6.2 / CVE-2021-38995:6.2","yes" "sec","vios","3.1.2.10 :: 3.1.2.21","There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.","IJ37488 / IJ37778 / CVE-2021-38989","3.1.2.40","IJ37778s1a.220215.epkg.Z IJ37778s2a.220215.epkg.Z IJ37488s3a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc","bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1 bos.pmapi.pmsvcs:7.2.5.100","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar","CVE-2021-38989:6.2","yes" "sec","vios","3.1.3.10 :: 3.1.3.14","There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.","IJ37488 / IJ37778 / CVE-2021-38989","3.1.3.20","IJ37778s1a.220215.epkg.Z IJ37778s2a.220215.epkg.Z IJ37488s3a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc","bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1 bos.pmapi.pmsvcs:7.2.5.100","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar","CVE-2021-38989:6.2","yes" "sec","aix","7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148","There is a vulnerability in the AIX pmsvcs kernel extension.","IJ37488 / IJ37778 / CVE-2021-38989","7200-05-04","IJ37778s1a.220215.epkg.Z IJ37778s2a.220215.epkg.Z IJ37488s3a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc","bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1 bos.pmapi.pmsvcs:7.2.5.100","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar","CVE-2021-38989:6.2","yes" "sec","vios","3.1.3.10 :: 3.1.3.14","There is a vulnerability in the AIX pfcdd kernel extension for VIOS.","IJ37494 / IJ37779 / CVE-2021-38988","3.1.3.20","IJ37494s3a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc","bos.pfcdd.rte:7.2.5.0","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar","CVE-2021-38988:6.2","yes" "sec","aix","7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148","There is a vulnerability in the AIX pfcdd kernel extension.","IJ37494 / IJ37779 / CVE-2021-38988","7200-05-04","IJ37494s3a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc","bos.pfcdd.rte:7.2.5.0","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar","CVE-2021-38988:6.2","yes" "sec","vios","3.1.1.30 :: 3.1.1.40 :: 3.1.1.50","Vulnerabilities in AIX CAA","IJ37496 / CVE-2022-22350 / CVE-2021-38996","3.1.1.60","IJ37496s3a.220228.epkg.Z IJ37496s4a.220228.epkg.Z IJ37496s5a.220228.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc","bos.cluster.rte:7.2.4.0-7.2.4.4","20220301"," ","","https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar","CVE-2022-22350:6.2 / CVE-2021-38996:6.2","yes" "sec","aix","7200-04-03 :: 7200-04-04 :: 7200-04-05","Vulnerabilities in AIX CAA","IJ37496 / CVE-2022-22350 / CVE-2021-38996","7200-04-06","IJ37496s3a.220228.epkg.Z IJ37496s4a.220228.epkg.Z IJ37496s5a.220228.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc","bos.cluster.rte:7.2.4.0-7.2.4.4","20220301"," ","","https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar","CVE-2022-22350:6.2 / CVE-2021-38996:6.2","yes" "sec","vios","3.1.1.30 :: 3.1.1.40 :: 3.1.1.50","Vulnerabilities in the AIX kernel","IJ37501 / CVE-2021-38994 / CVE-2021-38995","3.1.1.60","IJ37501m3a.220215.epkg.Z IJ37501m4a.220215.epkg.Z IJ37501m5a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc","bos.mp64:7.2.4.0-7.2.4.9","20220223"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar","CVE-2021-38994:6.2 / CVE-2021-38995:6.2","yes" "sec","aix","7200-04-03 :: 7200-04-04 :: 7200-04-05","Vulnerabilities in the AIX kernel","IJ37501 / CVE-2021-38994 / CVE-2021-38995","7200-04-06","IJ37501m3a.220215.epkg.Z IJ37501m4a.220215.epkg.Z IJ37501m5a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc","bos.mp64:7.2.4.0-7.2.4.9","20220223"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar","CVE-2021-38994:6.2 / CVE-2021-38995:6.2","yes" "sec","vios","3.1.1.30 :: 3.1.1.40 :: 3.1.1.50","There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.","IJ37503 / CVE-2021-38989","3.1.1.60","IJ37503s3a.220215.epkg.Z IJ37503s4a.220215.epkg.Z IJ37503s5a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc","bos.pmapi.pmsvcs:7.2.4.0-7.2.4.4","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar","CVE-2021-38989:6.2","yes" "sec","aix","7200-04-03 :: 7200-04-04 :: 7200-04-05","There is a vulnerability in the AIX pmsvcs kernel extension.","IJ37503 / CVE-2021-38989","7200-04-06","IJ37503s3a.220215.epkg.Z IJ37503s4a.220215.epkg.Z IJ37503s5a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc","bos.pmapi.pmsvcs:7.2.4.0-7.2.4.4","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar","CVE-2021-38989:6.2","yes" "sec","vios","3.1.1.30 :: 3.1.1.40 :: 3.1.1.50","There is a vulnerability in the AIX pfcdd kernel extension for VIOS.","IJ37504 / CVE-2021-38988","3.1.1.60","IJ37504s5a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc","bos.pfcdd.rte:7.2.4.0","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar","CVE-2021-38988:6.2","yes" "sec","aix","7200-04-03 :: 7200-04-04 :: 7200-04-05","There is a vulnerability in the AIX pfcdd kernel extension.","IJ37504 / CVE-2021-38988","7200-04-06","IJ37504s5a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc","bos.pfcdd.rte:7.2.4.0","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar","CVE-2021-38988:6.2","yes" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148","There is a vulnerability in the AIX pmsvcs kernel extension.","IJ37507 / CVE-2021-38989","7100-05-10","IJ37507s7a.220215.epkg.Z IJ37507s9a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc","bos.pmapi.pmsvcs:7.1.5.0-7.1.5.36","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar","CVE-2021-38989:6.2","yes" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148","There is a vulnerability in the AIX pfcdd kernel extension.","IJ37508 / CVE-2021-38988","7100-05-10","IJ37508s9a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc","bos.pfcdd.rte:7.1.5.0-7.1.5.32","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar","CVE-2021-38988:6.2","yes" "sec","vios","3.1.1.30 :: 3.1.1.40 :: 3.1.1.50","There is a vulnerability in the AIX nimsh daemon for VIOS.","IJ37705 / CVE-2022-22351","3.1.1.60","DEPRECATED::IJ37705s4a.220208.epkg.Z DEPRECATED::IJ37705s5a.220208.epkg.Z IJ37705m4a.220324.epkg.Z IJ37705m5a.220324.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc","bos.sysmgt.nim.client:7.2.4.0-7.2.4.4","20220304","20220324","","https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar","CVE-2022-22351:6.1","no" "sec","aix","7200-04-03 :: 7200-04-04 :: 7200-04-05","There is a vulnerability in the AIX nimsh daemon.","IJ37705 / CVE-2022-22351","7200-04-06","DEPRECATED::IJ37705s4a.220208.epkg.Z DEPRECATED::IJ37705s5a.220208.epkg.Z IJ37705m4a.220324.epkg.Z IJ37705m5a.220324.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc","bos.sysmgt.nim.client:7.2.4.0-7.2.4.4","20220304","20220324","","https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar","CVE-2022-22351:6.1","no" "sec","vios","3.1.2.10 :: 3.1.2.21","There is a vulnerability in the AIX pfcdd kernel extension for VIOS.","IJ37779 / IJ37494 / CVE-2021-38988","3.1.2.40","IJ37494s3a.220215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc","bos.pfcdd.rte:7.2.5.0","20220304"," ","","https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar","CVE-2021-38988:6.2","yes" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148","There is a vulnerability in the AIX audit user commands.","IJ38113 / CVE-2021-38955","7100-05-10","IJ38113m9a.220227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc","bos.rte.security:7.1.5.0-7.1.5.37","20220228"," ","","https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar","CVE-2021-38955:4.4","no" "sec","vios","3.1.1.30 :: 3.1.1.40 :: 3.1.1.50","There is a vulnerability in the AIX audit user commands for VIOS.","IJ38115 / CVE-2021-38955","3.1.1.60","IJ38115m5a.220227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc","bos.rte.security:7.2.4.0-7.2.4.4","20220228"," ","","https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar","CVE-2021-38955:4.4","no" "sec","aix","7200-04-03 :: 7200-04-04 :: 7200-04-05","There is a vulnerability in the AIX audit user commands.","IJ38115 / CVE-2021-38955","7200-04-06","IJ38115m5a.220227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc","bos.rte.security:7.2.4.0-7.2.4.4","20220228"," ","","https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar","CVE-2021-38955:4.4","no" "sec","vios","3.1.2.10 :: 3.1.2.21","There is a vulnerability in the AIX audit user commands.","IJ38117 / IJ38119 / CVE-2021-38955","3.1.2.40","IJ38119m2a.220227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc","bos.rte.security:7.2.5.0-7.2.5.2","20220228"," ","","https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar","CVE-2021-38955:4.4","no" "sec","aix","7200-05-01 :: 7200-05-01-2038 :: 7200-05-01-2039 :: 7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148","There is a vulnerability in the AIX audit user commands.","IJ38117 / IJ38119 / CVE-2021-38955","7200-05-04","IJ38119m2a.220227.epkg.Z IJ38117m3a.220227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc","bos.rte.security:7.2.5.0-7.2.5.2 bos.rte.security:7.2.5.100-7.2.5.101","20220228"," ","","https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar","CVE-2021-38955:4.4","no" "sec","vios","3.1.3.10 :: 3.1.3.14","There is a vulnerability in the AIX audit user commands.","IJ38119 / IJ38117 / CVE-2021-38955","3.1.3.20","IJ38117m3a.220227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc","bos.rte.security:7.2.5.100-7.2.5.101","20220228"," ","","https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar","CVE-2021-38955:4.4","no" "sec","aix","7300-00-01","There is a vulnerability in the AIX audit user commands.","IJ38121 / CVE-2021-38955","7300-00-02","IJ38121m1a.220227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc","bos.rte.security:7.3.0.0","20220228"," ","","https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar","CVE-2021-38955:4.4","no" "hiper","aix","7300-00-00 :: 7300-00-01 :: 7300-00-01-2148","AIX 7.3 changed some performance tuning commands default output","IJ38518","7300-00-02","IJ38518s1b.220314.AIX73TL00SP00-01.epkg.Z","https://www.ibm.com/support/pages/node/6563017","bos.perf.tune:7.3.0.0","20220323"," ","","https://aix.software.ibm.com/aix/ifixes/ij38518/"," ","no" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09 :: 7100-05-10","AIX is vulnerable to a denial of service due to lpd","IJ39868 / IJ44552 / CVE-2022-22444","7100-05-11","IJ39868s9a.220506.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc","bos.rte.printers:7.1.5.0-7.1.5.33","20220615","20220913","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar","CVE-2022-22444:6.2","no" "sec","vios","3.1.1.30 :: 3.1.1.40 :: 3.1.1.50","AIX is vulnerable to a denial of service due to lpd","IJ39875 / CVE-2022-22444","See Bulletin","IJ39875s5a.220506.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc","bos.rte.printers:7.2.4.0-7.2.4.1","20220615","20220913","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar","CVE-2022-22444:6.2","no" "sec","aix","7200-04-03 :: 7200-04-04 :: 7200-04-05 :: 7200-04-06","AIX is vulnerable to a denial of service due to lpd","IJ39875 / CVE-2022-22444","See Bulletin","IJ39875s5a.220506.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc","bos.rte.printers:7.2.4.0-7.2.4.1","20220615","20220913","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar","CVE-2022-22444:6.2","no" "sec","vios","3.1.2.10 :: 3.1.2.21","AIX is vulnerable to a denial of service due to lpd","IJ39876 / IJ39878 / IJ42162 / IJ44559 / IJ44615 / CVE-2022-22444","3.1.2.50","IJ39878s2a.220506.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc","bos.rte.printers:7.2.5.0-7.2.5.1","20220615","20220913","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar","CVE-2022-22444:6.2","no" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","AIX is vulnerable to a denial of service due to lpd","IJ39876 / IJ39878 / IJ42162 / IJ44559 / IJ44615 / CVE-2022-22444","3.1.3.30","IJ39876s3a.220506.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc","bos.rte.printers:7.2.5.100-7.2.5.100","20220615","20220913","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar","CVE-2022-22444:6.2","no" "sec","aix","7200-05-01 :: 7200-05-02 :: 7200-05-03 :: 7200-05-04","AIX is vulnerable to a denial of service due to lpd","IJ39876 / IJ39878 / IJ42162 / IJ44559 / IJ44615 / CVE-2022-22444","7200-05-05","IJ39876s3a.220506.epkg.Z IJ39878s2a.220506.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc","bos.rte.printers:7.2.5.0-7.2.5.1 bos.rte.printers:7.2.5.100-7.2.5.100","20220615","20220913","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar","CVE-2022-22444:6.2","no" "sec","aix","7300-00-01 :: 7300-00-02","AIX is vulnerable to a denial of service due to lpd","IJ39877 / IJ42800 / IJ44562 / CVE-2022-22444","7300-00-03","IJ39877s1a.220506.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc","bos.rte.printers:7.3.0.0-7.3.0.0","20220615","20220913","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar","CVE-2022-22444:6.2","no" "sec","aix","7300-00-01 :: 7300-00-02","AIX is vulnerable to cache poisoning due to ISC BIND","IJ40614 / CVE-2021-25220","7300-00-03","IJ40614m2b.220718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc","bos.net.tcp.bind_utils:7.3.0.0-7.3.0.1","20220728"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar","CVE-2021-25220:6.8","no" "sec","aix","7200-05-02 :: 7200-05-02-2114 :: 7200-05-03-2135 :: 7200-05-03-2136 :: 7200-05-03-2148 :: 7200-05-04","AIX is vulnerable to cache poisoning due to ISC BIND","IJ40615 / IJ40674 / CVE-2021-25220","7200-05-05","IJ40615m4b.220718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc","bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101","20220728"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar","CVE-2021-25220:6.8","no" "sec","vios","3.1.2.10 :: 3.1.2.21 :: 3.1.2.30","AIX is vulnerable to cache poisoning due to ISC BIND","IJ40616 / IJ40674 / IJ40615 / IJ41139 / CVE-2021-25220","3.1.2.40","IJ40615m4b.220718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc","bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101","20220728"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar","CVE-2021-25220:6.8","no" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","AIX is vulnerable to cache poisoning due to ISC BIND","IJ40616 / IJ40674 / IJ40615 / IJ41139 / CVE-2021-25220","3.1.3.30","IJ40615m4b.220718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc","bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2 bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101","20220728"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar","CVE-2021-25220:6.8","no" "sec","vios","3.1.1.30 :: 3.1.1.40 :: 3.1.1.50","AIX is vulnerable to cache poisoning due to ISC BIND","IJ40616 / IJ40615 / IJ41139 / CVE-2021-25220","See Bulletin","IJ40616m5b.220718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc","bos.net.tcp.bind:7.2.4.0-7.2.4.1 bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3","20220728"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar","CVE-2021-25220:6.8","no" "sec","aix","7200-04-03 :: 7200-04-04 :: 7200-04-05","AIX is vulnerable to cache poisoning due to ISC BIND","IJ40616 / CVE-2021-25220","See Bulletin","IJ40616m5b.220718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc","bos.net.tcp.bind:7.2.4.0-7.2.4.1 bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3","20220728"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar","CVE-2021-25220:6.8","no" "sec","aix","7100-05-07 :: 7100-05-08 :: 7100-05-09-2136 :: 7100-05-09-2148","AIX is vulnerable to cache poisoning due to ISC BIND","IJ40617 / CVE-2021-25220","7100-05-11","IJ40617m9b.220718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc","bos.net.tcp.server:7.1.5.0-7.1.5.35 bos.net.tcp.client:7.1.5.0-7.1.5.40","20220728"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar","CVE-2021-25220:6.8","no" "sec","vios","3.1.2.10 :: 3.1.2.21 :: 3.1.2.30","IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service","IJ40951 / CVE-2022-35643","3.1.2.50","IJ40951s1a.220711.epkg.Z IJ40951s2a.220711.epkg.Z IJ40951s3a.220711.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc","devices.vtdev.scsi.rte:7.2.5.0-7.2.5.3","20220728"," ","","https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar","CVE-2022-35643:9.1","no" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service","IJ40952 / CVE-2022-35643","3.1.3.30","IJ40952s3b.220712.epkg.Z IJ40952s3a.220712.epkg.Z IJ40952s4a.220712.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc","devices.vtdev.scsi.rte:7.2.5.100 devices.vtdev.scsi.rte:7.2.5.102","20220728"," ","","https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar","CVE-2022-35643:9.1","no" "sec","vios","3.1.1.30 :: 3.1.1.40 :: 3.1.1.50","IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service","IJ40954 / CVE-2022-35643","See Bulletin","IJ40954s3a.220711.epkg.Z IJ40954s4a.220711.epkg.Z IJ40954s5a.220711.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc","devices.vtdev.scsi.rte:7.2.4.0-7.2.4.4","20220728"," ","","https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar","CVE-2022-35643:9.1","no" "sec","aix","7200-05-02 :: 7200-05-03 :: 7200-05-04","AIX is vulnerable to a privilege escalation vulnerability","IJ41396 / IJ41685 / IJ41795 / CVE-2022-34356","7200-05-05","IJ41685m3a.220810.epkg.Z IJ41685m3b.220812.epkg.Z IJ41685s4a.220809.epkg.Z IJ41795m2a.220812.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc","bos.mp64:7.2.5.0-7.2.5.5 bos.mp64:7.2.5.100-7.2.5.105","20220912","20221010","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar","CVE-2022-34356:8.4","yes" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40","AIX is vulnerable to a privilege escalation vulnerability","IJ41685 / IJ41795 / IJ41396 / CVE-2022-34356","3.1.2.50","IJ41795m2a.220812.epkg.Z IJ41795m3a.221010.epkg.Z IJ41795s4a.221010.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc","bos.mp64:7.2.5.0-7.2.5.5","20220912","20221010","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar","CVE-2022-34356:8.4","yes" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","AIX is vulnerable to a privilege escalation vulnerability","IJ41685 / IJ41795 / IJ41396 / CVE-2022-34356","3.1.3.30","IJ41685m3a.220810.epkg.Z IJ41685m3b.220812.epkg.Z IJ41685s4a.220809.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc","bos.mp64:7.2.5.100-7.2.5.105","20220912","20221010","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar","CVE-2022-34356:8.4","yes" "sec","aix","7300-00-01 :: 7300-00-02","AIX kernel is vulnerable to a privilege escalation vulnerability","IJ41687 / CVE-2022-34356","7300-00-03","IJ41687m1a.220810.epkg.Z IJ41687s2a.220809.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc","bos.mp64:7.3.0.0-7.3.0.3","20220912"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar","CVE-2022-34356:8.4","yes" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10","AIX is vulnerable to a privilege escalation vulnerability","IJ41688 / CVE-2022-34356","7100-05-11","IJ41688m8a.220921.epkg.Z IJ41688m9a.220822.epkg.Z IJ41688m9b.220822.epkg.Z IJ41688sAa.220913.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc","bos.mp64:7.1.5.0-7.1.5.46","20220912","20221010","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar","CVE-2022-34356:8.4","yes" "sec","vios","3.1.1.40 :: 3.1.1.50 :: 3.1.1.60","AIX is vulnerable to a privilege escalation vulnerability","IJ41706 / CVE-2022-34356","See Bulletin","IJ41706m4a.220812.epkg.Z IJ41706m5a.220810.epkg.Z IJ41706s6a.220912.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc","bos.mp64:7.2.4.0-7.2.4.10","20220912","20221010","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar","CVE-2022-34356:8.4","yes" "sec","aix","7200-04-04 :: 7200-04-05 :: 7200-04-06","AIX is vulnerable to a privilege escalation vulnerability","IJ41706 / CVE-2022-34356","See Bulletin","IJ41706m4a.220812.epkg.Z IJ41706m5a.220810.epkg.Z IJ41706s6a.220912.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc","bos.mp64:7.2.4.0-7.2.4.10","20220912","20221010","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar","CVE-2022-34356:8.4","yes" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","AIX is vulnerable to denial of service vulnerabilities - TCPIP","IJ41974 / CVE-2022-40233","3.1.3.30","IJ41974s3a.221025.epkg.Z IJ41974s3b.221213.epkg.Z IJ41974s4a.221017.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.net.tcp.client_core:7.2.5.100-7.2.5.104","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-40233:6.2","yes" "sec","aix","7200-05-02 :: 7200-05-03 :: 7200-05-04","AIX is vulnerable to denial of service vulnerabilities - TCPIP","IJ41974 / IJ43598 / CVE-2022-40233","7200-05-05","IJ43598s2b.221027.epkg.Z IJ41974s3a.221025.epkg.Z IJ41974s3b.221213.epkg.Z IJ41974s4a.221017.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.net.tcp.client_core:7.2.5.0-7.2.5.4 bos.net.tcp.client_core:7.2.5.100-7.2.5.104","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-40233:6.2","yes" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","AIX is vulnerable to denial of service vulnerabilities - CAA","IJ41975 / CVE-2022-39165","3.1.3.30","IJ41975m3a.221027.epkg.Z IJ41975m3b.221212.epkg.Z IJ41975s4a.221017.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.cluster.rte:7.2.5.100-7.2.5.102","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-39165:6.2","yes" "sec","aix","7200-05-02 :: 7200-05-03 :: 7200-05-04","AIX is vulnerable to denial of service vulnerabilities - CAA","IJ41975 / IJ44115 / CVE-2022-39165","7200-05-05","IJ44115m2a.221102.epkg.Z IJ41975m3a.221027.epkg.Z IJ41975m3b.221212.epkg.Z IJ41975s4a.221017.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.cluster.rte:7.2.5.0-7.2.5.2 bos.cluster.rte:7.2.5.100-7.2.5.102","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-39165:6.2","yes" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","AIX is vulnerable to denial of service vulnerabilities - NFS","IJ42159 / CVE-2022-43380","3.1.3.30","IJ42159s3a.221025.epkg.Z IJ42159s3b.221213.epkg.Z IJ42159s4a.221017.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.net.nfs.client:7.2.5.100-7.2.5.101","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-43380:6.2","yes" "sec","aix","7200-05-02 :: 7200-05-03 :: 7200-05-04","AIX is vulnerable to denial of service vulnerabilities - NFS","IJ42159 / IJ43674 / CVE-2022-43380","7200-05-05","IJ43674s2b.221027.epkg.Z IJ42159s3a.221025.epkg.Z IJ42159s3b.221213.epkg.Z IJ42159s4a.221017.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.net.nfs.client:7.2.5.0-7.2.5.3 bos.net.nfs.client:7.2.5.100-7.2.5.101","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-43380:6.2","yes" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","AIX is vulnerable to a denial of service due to lpd","IJ42162 / CVE-2022-43382","3.1.3.30","IJ42162m4a.221208.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc","bos.rte.printers:7.2.5.100-7.2.5.100","20221215","20230317","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar","CVE-2022-43382:6.2","no" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","AIX is affected by a root privilege escalation vulnerability","IJ42163 / CVE-2022-41290","3.1.3.30","IJ42163m4a.221213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc","bos.rte.install:7.2.5.100-7.2.5.105","20221214"," ","","https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar","CVE-2022-41290:8.4","no" "sec","aix","7200-05-03 :: 7200-05-04","AIX is affected by a root privilege escalation vulnerability","IJ42163 / CVE-2022-41290","7200-05-05","IJ42163m4a.221213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc","bos.rte.install:7.2.5.0-7.2.5.5 bos.rte.install:7.2.5.100-7.2.5.105","20221214"," ","","https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar","CVE-2022-41290:8.4","no" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10","AIX is affected by a root privilege escalation vulnerability","IJ42230 / CVE-2022-41290","7100-05-11","IJ42230mAa.221208.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc","bos.rte.install:7.1.5.0-7.1.5.48","20221214"," ","","https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar","CVE-2022-41290:8.4","no" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40","AIX is affected by a root privilege escalation vulnerability","IJ42232 / CVE-2022-41290","3.1.2.50","IJ42232m2a.221213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc","bos.rte.install:7.2.5.0-7.2.5.5","20221214"," ","","https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar","CVE-2022-41290:8.4","no" "sec","aix","7300-00-01 :: 7300-00-02","AIX is affected by a root privilege escalation vulnerability","IJ42234 / CVE-2022-41290","7300-00-03","IJ42234m2a.221213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc","bos.rte.install:7.3.0.0-7.3.0.3","20221214"," ","","https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar","CVE-2022-41290:8.4","no" "sec","aix","7300-00-01 :: 7300-00-02","AIX is vulnerable to a denial of service due to libxml2","IJ42341 / CVE-2022-29824","7300-00-04","IJ42341s2a.220907.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc","bos.rte.control:7.3.0.0-7.3.0.1","20220912","20221212","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar","CVE-2022-29824:5.5","no" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40","AIX is vulnerable to a denial of service due to libxml2","IJ42379 / IJ42378 / IJ42339 / CVE-2022-29824","3.1.2.60","IJ42378s2a.220909.epkg.Z IJ42378s2a.221010.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc","bos.rte.control:7.2.5.0-7.2.5.4","20220912","20221212","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar","CVE-2022-29824:5.5","no" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","AIX is vulnerable to a denial of service due to libxml2","IJ42379 / IJ42378 / IJ42339 / CVE-2022-29824","3.1.3.40","IJ42379s4a.220909.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc","bos.rte.control:7.2.5.100-7.2.5.101","20220912","20221212","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar","CVE-2022-29824:5.5","no" "sec","vios","3.1.4.10","AIX is vulnerable to a denial of service due to libxml2","IJ42379 / IJ42378 / IJ42339 / CVE-2022-29824","3.1.4.20","IJ42339s5a.221212.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc","bos.rte.control:7.2.5.200-7.2.5.200","20220912","20221212","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar","CVE-2022-29824:5.5","no" "sec","aix","7200-05-02 :: 7200-05-03 :: 7200-05-04 :: 7200-05-05","AIX is vulnerable to a denial of service due to libxml2","IJ42379 / IJ42378 / IJ42339 / CVE-2022-29824","7200-05-06","IJ42339s2a.220909.epkg.Z IJ42339s4a.220907.epkg.Z IJ42339s5a.221212.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc","bos.rte.control:7.2.5.0-7.2.5.4 bos.rte.control:7.2.5.100-7.2.5.101 bos.rte.control:7.2.5.200-7.2.5.200","20220912","20221212","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar","CVE-2022-29824:5.5","no" "sec","vios","3.1.1.40 :: 3.1.1.50 :: 3.1.1.60","AIX is vulnerable to a denial of service due to libxml2","IJ42381 / CVE-2022-29824","See Bulletin","IJ42381s6a.220909.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc","bos.rte.control:7.2.4.0-7.2.4.5","20220912","20221212","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar","CVE-2022-29824:5.5","no" "sec","aix","7200-04-04 :: 7200-04-05 :: 7200-04-06","AIX is vulnerable to a denial of service due to libxml2","IJ42381 / CVE-2022-29824","See Bulletin","IJ42381s6a.220909.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc","bos.rte.control:7.2.4.0-7.2.4.5","20220912","20221212","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar","CVE-2022-29824:5.5","no" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40","AIX is vulnerable to a buffer overflow due to X11","IJ42677 / IJ43599 / IJ43218 / CVE-2022-47990","3.1.2.50","IJ43599s2a.221227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc","X11.base.lib:7.2.5.0-7.2.5.1","20230117"," ","","https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar","CVE-2022-47990:6.2","no" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21","AIX is vulnerable to a buffer overflow due to X11","IJ42677 / IJ43599 / IJ43218 / CVE-2022-47990","3.1.3.30","IJ43218s4a.221227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc","X11.base.lib:7.2.5.100-7.2.5.100","20230117"," ","","https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar","CVE-2022-47990:6.2","no" "sec","aix","7200-05-03 :: 7200-05-04","AIX is vulnerable to a buffer overflow due to X11","IJ42677 / IJ43599 / IJ43218 / CVE-2022-47990","7200-05-05","IJ42677s4a.221227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc","X11.base.lib:7.2.5.0-7.2.5.1 X11.base.lib:7.2.5.100-7.2.5.100","20230117"," ","","https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar","CVE-2022-47990:6.2","no" "sec","aix","7300-00-01 :: 7300-00-02 :: 7300-00-03","IX is vulnerable to a denial of service due to lpd","IJ42800 / IJ44562 / CVE-2022-43382","7300-00-04","IJ42800m2a.221208.epkg.Z IJ44562s3a.230314.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc","bos.rte.printers:7.3.0.0-7.3.0.0 printers.rte:7.3.0.0-7.3.0.1","20221215","20230317","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar","CVE-2022-43382:6.2","no" "sec","aix","7300-00-01 :: 7300-00-02","AIX is vulnerable to denial of service vulnerabilities - TCPIP","IJ42937 / CVE-2022-40233","7300-00-03","IJ42937s1a.221027.epkg.Z IJ42937s2a.221018.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.net.tcp.client_core:7.3.0.0-7.3.0.2","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-40233:6.2","yes" "sec","aix","7300-00-01 :: 7300-00-02","AIX is vulnerable to denial of service vulnerabilities - CAA","IJ42938 / CVE-2022-39165","7300-00-03","IJ42938m1a.221027.epkg.Z IJ42938s2a.221018.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.cluster.rte:7.3.0.0-7.3.0.1","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-39165:6.2","yes" "sec","aix","7300-00-01 :: 7300-00-02","AIX is vulnerable to a buffer overflow due to X11","IJ42939 / CVE-2022-47990","7300-00-03","IJ42939s2a.221227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc","X11.base.lib:7.3.0.0-7.3.0.0","20230117"," ","","https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar","CVE-2022-47990:6.2","no" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11","AIX is vulnerable to denial of service vulnerabilities - NFS","IJ43072 / CVE-2022-43380","7100-05-11","IJ43072s8a.221110.epkg.Z IJ43072sAa.221024.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.net.nfs.client:7.1.5.0-7.1.5.38","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-43380:6.2","yes" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10","AIX is vulnerable to a buffer overflow due to X11","IJ43073 / CVE-2022-47990","7100-05-11","IJ43073sAa.221227.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc","X11.base.lib:7.1.5.0-7.1.5.34","20230117"," ","","https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar","CVE-2022-47990:6.2","no" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10","AIX is vulnerable to denial of service vulnerabilities - TCPIP","IJ43098 / CVE-2022-40233","7100-05-11","IJ43098s8a.221110.epkg.Z IJ43098s9a.221102.epkg.Z IJ43098s9b.221213.epkg.Z IJ43098sAa.221024.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.net.tcp.client:7.1.5.0-7.1.5.41","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-40233:6.2","yes" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10","AIX is vulnerable to denial of service vulnerabilities - CAA","IJ43099 / CVE-2022-39165","7100-05-11","IJ43099m8a.221110.epkg.Z IJ43099m9a.221102.epkg.Z IJ43099m9b.221213.epkg.Z IJ43099sAa.221024.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.cluster.rte:7.1.5.0-7.1.5.39","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-39165:6.2","yes" "sec","aix","7300-00-01 :: 7300-00-02","AIX is vulnerable to denial of service vulnerabilities - NFS","IJ43468 / CVE-2022-43380","7300-00-03","IJ43468s1a.221025.epkg.Z IJ43468s2a.221017.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.net.nfs.client:7.3.0.0-7.3.0.1","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-43380:6.2","yes" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40","AIX is vulnerable to denial of service vulnerabilities - TCPIP","IJ43598 / CVE-2022-40233","3.1.2.50","IJ43598s2b.221027.epkg.Z IJ43598s2c.221213.epkg.Z IJ43598s2d.221213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.net.tcp.client_core:7.2.5.0-7.2.5.4","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-40233:6.2","yes" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40","AIX is vulnerable to denial of service vulnerabilities - NFS","IJ43674 / CVE-2022-43380","3.1.2.50","IJ43674s2b.221027.epkg.Z IJ43674s2c.221213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.net.nfs.client:7.2.5.0-7.2.5.3","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-43380:6.2","yes" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ43869 / IJ45541 / CVE-2022-39164","3.1.3.40","IJ43869m3a.221025.epkg.Z IJ43869m3b.221212.epkg.Z IJ43869m4a.221017.epkg.Z IJ45541s3b.230404.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.mp64:7.2.5.100-7.2.5.106","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-39164:6.2","yes" "sec","vios","3.1.4.10","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ43869 / CVE-2022-39164","3.1.4.20","IJ43869s5a.221212.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.mp64:7.2.5.200-7.2.5.201","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-39164:6.2","yes" "sec","aix","7200-05-03 :: 7200-05-04 :: 7200-05-05","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ43869 / CVE-2022-39164","7200-05-06","IJ43869m3c.230216.epkg.Z IJ43869m3d.230216.epkg.Z IJ43869m4b.230216.epkg.Z IJ43869m5b.230216.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.mp64:7.2.5.0-7.2.5.5 bos.mp64:7.2.5.100-7.2.5.105 bos.mp64:7.2.5.200-7.2.5.200","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-39164:6.2","yes" "sec","aix","7300-00-01 :: 7300-00-02 :: 7300-00-03","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ43875 / CVE-2022-39164","7300-00-04","IJ43875m1b.230216.epkg.Z IJ43875m2b.230216.epkg.Z IJ43875s3a.230314.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.mp64:7.3.0.0-7.3.0.4","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-39164:6.2","yes" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30","AIX is vulnerable to denial of service vulnerabilities - perfstat","IJ43876 / CVE-2022-43848","3.1.3.40","IJ43876s3a.221025.epkg.Z IJ43876s3b.221213.epkg.Z IJ43876s4a.221017.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.perf.perfstat:7.2.5.100-7.2.5.101","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-43848:6.2","yes" "sec","vios","3.1.4.10","AIX is vulnerable to denial of service vulnerabilities - perfstat","IJ43876 / CVE-2022-43848","3.1.4.20","IJ43876s5a.221212.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.perf.perfstat:7.2.5.200-7.2.5.200","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-43848:6.2","yes" "sec","aix","7200-05-02 :: 7200-05-03 :: 7200-05-04 :: 7200-05-05","AIX is vulnerable to denial of service vulnerabilities - perfstat","IJ43876 / IJ44114 / CVE-2022-43848","7200-05-06","IJ44114s2a.221102.epkg.Z IJ43876s3a.221025.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.perf.perfstat:7.2.5.0-7.2.5.0 bos.perf.perfstat:7.2.5.100-7.2.5.101 bos.perf.perfstat:7.2.5.200-7.2.5.200","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-43848:6.2","yes" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30","AIX is vulnerable to denial of service vulnerabilities - pfcdd","IJ43877 / IJ46068 / CVE-2022-43849","3.1.3.40","IJ43877s3a.221025.epkg.Z IJ43877s4a.221017.epkg.Z IJ46068s3a.230404.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.pfcdd.rte:7.2.5.100-7.2.5.102","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-43849:6.2","yes" "sec","vios","3.1.4.10","AIX is vulnerable to denial of service vulnerabilities - pfcdd","IJ43877 / CVE-2022-43849","3.1.4.20","IJ43877s5a.230123.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.pfcdd.rte:7.2.5.200-7.2.5.200","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-43849:6.2","yes" "sec","aix","7200-05-02 :: 7200-05-03 :: 7200-05-04 :: 7200-05-05","AIX is vulnerable to denial of service vulnerabilities - pfcdd","IJ43877 / IJ44116 / CVE-2022-43849","7200-05-06","IJ44116s2a.221102.epkg.Z IJ43877s3a.221025.epkg.Z IJ43877s4a.221017.epkg.Z IJ43877s5a.230123.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.pfcdd.rte:7.2.5.0-7.2.5.1 bos.pfcdd.rte:7.2.5.100-7.2.5.101 bos.pfcdd.rte:7.2.5.200-7.2.5.200","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-43849:6.2","yes" "sec","aix","7300-00-01 :: 7300-00-02 :: 7300-00-03","AIX is vulnerable to denial of service vulnerabilities - perfstat","IJ43891 / CVE-2022-43848","7300-00-04","IJ43891s2a.221018.epkg.Z IJ43891s3a.230314.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.perf.perfstat:7.3.0.0-7.3.0.1","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-43848:6.2","yes" "sec","aix","7300-00-01 :: 7300-00-02 :: 7300-00-03","AIX is vulnerable to denial of service vulnerabilities - pfcdd","IJ43893 / CVE-2022-43849","7300-00-04","IJ43893s1a.221027.epkg.Z IJ43893s2a.221018.epkg.Z IJ43893s3a.230314.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.pfcdd.rte:7.3.0.0-7.3.0.2","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-43849:6.2","yes" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ43967 / CVE-2022-39164","7100-05-12","IJ43967m8a.221110.epkg.Z IJ43967m9a.221102.epkg.Z IJ43967m9b.221111.epkg.Z IJ43967mAa.221024.epkg.Z IJ43967sBa.230314.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.mp64:7.1.5.0-7.1.5.47","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-39164:6.2","yes" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11","AIX is vulnerable to denial of service vulnerabilities - perfstat ","IJ43970 / CVE-2022-43848","7100-05-12","IJ43970sAa.221024.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.perf.perfstat:7.1.5.0-7.1.5.32","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-43848:6.2","yes" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11","AIX is vulnerable to denial of service vulnerabilities - pfcdd","IJ43980 / CVE-2022-43849","7100-05-12","IJ43980sAa.221024.epkg.Z IJ43980sBa.230314.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.pfcdd.rte:7.1.5.0-7.1.5.34","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-43849:6.2","yes" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40 :: 3.1.2.50","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ43995 / CVE-2022-39164","3.1.2.60","IJ43995m2a.221025.epkg.Z IJ43995m2b.221027.epkg.Z IJ43995m2c.221212.epkg.Z IJ43995s5a.230404.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.mp64:7.2.5.0-7.2.5.6","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-39164:6.2","yes" "hiper","vios","3.1.3.0 :: 3.1.3.30","Possible system crashes processing network traffic","IJ44047 / IJ44534","3.1.3.40","IJ44047m4b.230213.AIX72TL05SP04.epkg.Z IJ44047m4b.230213.VIOS3.1.3.21.epkg.Z IJ44047m4e.230505.VIOS3.1.3.30.epkg.Z IJ44047m4f.230510.VIOS3.1.3.30.epkg.Z IJ44534m4a.230218.VIOS3.1.3.21.epkg.Z","https://www.ibm.com/support/pages/node/6857545","bos.mp64:7.2.5.100-7.2.5.106 bos.net.tcp.client_core:7.2.5.100-7.2.5.105","20230217"," ","","https://aix.software.ibm.com/aix/ifixes/ij44534/","","yes" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40 :: 3.1.2.50","AIX is vulnerable to denial of service vulnerabilities - perfstat","IJ44114 / CVE-2022-43848","3.1.2.60","IJ44114s2a.221102.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.perf.perfstat:7.2.5.0-7.2.5.0","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-43848:6.2","yes" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40","AIX is vulnerable to denial of service vulnerabilities - CAA","IJ44115 / CVE-2022-39165","3.1.2.50","IJ44115m2a.221102.epkg.Z IJ44115m2b.221213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.cluster.rte:7.2.5.0-7.2.5.2","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-39165:6.2","yes" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40 :: 3.1.2.50","AIX is vulnerable to denial of service vulnerabilities - pfcdd","IJ44116 / IJ46105 / CVE-2022-43849","3.1.2.60","IJ44116s2a.221102.epkg.Z IJ46105s5a.230404.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.pfcdd.rte:7.2.5.0-7.2.5.2","20221214","20230406","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar","CVE-2022-43849:6.2","yes" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11","AIX is vulnerable to denial of service due to ISC BIND","IJ44422 / CVE-2022-38178 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-2795","7100-05-12","IJ44422mAa.221220.epkg.Z IJ44422sBa.230317.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc","bos.net.tcp.client:7.1.5.0-7.1.5.42 bos.net.tcp.server:7.1.5.0-7.1.5.35","20221222","20230405","","https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar","CVE-2022-38178:7.5 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-2795:5.3","no" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40 :: 3.1.2.50","AIX is vulnerable to denial of service due to ISC BIND","IJ44423 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178","3.1.2.60","IJ44423m2b.230217.epkg.Z IJ44423s5a.230404.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc","bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.4","20221222","20230517","","https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar","CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5","no" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30","AIX is vulnerable to denial of service due to ISC BIND","IJ44425 / IJ44424 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178","3.1.3.40","IJ44424s3a.230404.epkg.Z IJ44425m4b.230217.epkg.Z IJ44424s5.221129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc","bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind_utils:7.2.5.100-7.2.5.102","20221222","20230517","","https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar","CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5","no" "sec","vios","3.1.4.10","AIX is vulnerable to denial of service due to ISC BIND","IJ44425 / IJ44424 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178","3.1.4.20","IJ44425s5b.230214.epkg.Z IJ44424s3a.230404.epkg.Z IJ44425m4b.230217.epkg.Z IJ44424s5.221129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc","bos.net.tcp.bind_utils:7.2.5.200-7.2.5.200","20221222","20230517","","https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar","CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5","no" "sec","aix","7200-05 :: 7200-05-03 :: 7200-05-04 :: 7200-05-05","AIX is vulnerable to denial of service due to ISC BIND","IJ44425 / IJ44424 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178","7200-05-06","IJ44424s3a.230404.epkg.Z IJ44425m4b.230217.epkg.Z IJ44424s5.221129.epkg.Z IJ44425s5b.230214.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc","bos.net.tcp.bind:7.2.5.0-7.2.5.1 bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind_utils:7.2.5.0-7.2.5.4 bos.net.tcp.bind_utils:7.2.5.100-7.2.5.102 bos.net.tcp.bind_utils:7.2.5.200-7.2.5.200","20221222","20230517","","https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar","CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5","no" "sec","aix","7300-01","AIX is vulnerable to denial of service due to ISC BIND","IJ44426 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178","7300-01-02","IJ44426s2.221130.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc","","20221222","20230517","","https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar","CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5","no" "sec","aix","7300-00-01 :: 7300-00-02 :: 7300-00-03","AIX is vulnerable to denial of service due to ISC BIND","IJ44427 / CVE-2022-2795 / CVE-2022-3080 / CVE-2022-38177 / CVE-2022-38178","7300-00-04","IJ44427m2a.221220.epkg.Z IJ44427s3a.230317.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc","bos.net.tcp.bind_utils:7.3.0.0-7.3.0.2","20221222","20230517","","https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar","CVE-2022-2795:5.3 / CVE-2022-3080:7.5 / CVE-2022-38177:7.5 / CVE-2022-38178:7.5","no" "hiper","aix","7300-00-00 :: 7300-00-03-2246","Possible system crashes processing network traffic","IJ44513 / IJ44512","7300-00-04","IJ44512m2b.230213.AIX73TL00SP02.epkg.Z IJ44512m3a.230423.AIX73TL00SP03.epkg.Z IJ44512m3b.230517.AIX73TL00SP03.epkg.Z IJ44513m2a.230217.AIX73TL00SP02.epkg.Z","https://www.ibm.com/support/pages/node/6857545","bos.mp64:7.3.0.0-7.3.0.4 bos.net.tcp.client_core:7.3.0.0-7.3.0.3","20230217"," ","","https://aix.software.ibm.com/aix/ifixes/ij44513/","","yes" "sec","aix","7100-05-08 :: 7100-05-09 :: 7100-05-10 :: 7100-05-11","AIX is vulnerable to a denial of service due to lpd","IJ44552 / CVE-2022-43382","7100-05-12","IJ44552mAa.221208.epkg.Z IJ44552mBa.230313.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc","bos.rte.printers:7.1.5.0-7.1.5.34 printers.rte:7.1.5.0-7.1.5.32","20221215","20230317","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar","CVE-2022-43382:6.2","no" "sec","vios","3.1.4.10","AIX is vulnerable to a denial of service due to lpd","IJ44559 / CVE-2022-43382","3.1.4.20","IJ44559m5a.221208.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc","printers.rte:7.2.5.200-7.2.5.200","20221215","20230317","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar","CVE-2022-43382:6.2","no" "sec","aix","7200-05-03 :: 7200-05-04 :: 7200-05-05","AIX is vulnerable to a denial of service due to lpd","IJ44559 / CVE-2022-43382","7200-05-06","IJ44559m4a.221214.epkg.Z IJ44559m5a.221208.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc","bos.rte.printers:7.2.5.0-7.2.5.1 bos.rte.printers:7.2.5.100-7.2.5.100 printers.rte:7.2.5.200-7.2.5.200","20221215","20230317","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar","CVE-2022-43382:6.2","no" "sec","aix","7300-01-01","IX is vulnerable to a denial of service due to lpd","IJ44564 / CVE-2022-43382","7300-01-02","IJ44564m1a.221208.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc","printers.rte:7.3.1.0-7.3.1.0","20221215","20230317","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar","CVE-2022-43382:6.2","no" "sec","aix","7300-01-01","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ44594 / CVE-2022-39164","7300-01-02","IJ44594m1a.230216.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.mp64:7.3.1.0-7.3.1.1","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-39164:6.2","yes" "sec","aix","7300-01-01","AIX is vulnerable to denial of service vulnerabilities - perfstat","IJ44595 / CVE-2022-43848","7300-01-02","IJ44595s1a.221212.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc","bos.perf.perfstat:7.3.1.0-7.3.1.0","20221214","20230317","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ","CVE-2022-43848:6.2","yes" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40","AIX is vulnerable to a denial of service due to lpd","IJ44615 / CVE-2022-43382","3.1.2.50","IJ44615m2a.221213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc","bos.rte.printers:7.2.5.0-7.2.5.1","20221215","20230317","","https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar","CVE-2022-43382:6.2","no" "hiper","aix","7300-01-00 :: 7300-01-01-2246","Possible system crashes processing network traffic","IJ44761 / IJ44749","7300-01-02","IJ44761m1a.230217.AIX73TL01SP01.epkg.Z IJ44749m1a.230210.AIX73TL01SP01.epkg.Z","https://www.ibm.com/support/pages/node/6857545","bos.mp64:7.3.1.0-7.3.1.1 bos.net.tcp.client_core:7.3.1.0-7.3.1.1","20230217"," ","","https://aix.software.ibm.com/aix/ifixes/ij44761/","","yes" "hiper","vios","3.1.4.0 :: 3.1.4.10","Possible system crashes processing network traffic","IJ44799 / IJ44047 / IJ44786 / IJ44534","3.1.4.20","IJ44047m4b.230213.AIX72TL05SP04.epkg.Z IJ44047m4b.230213.VIOS3.1.3.21.epkg.Z IJ44786m5b.230213.AIX72TL05SP05.epkg.Z IJ44786m5b.230213.VIOS3.1.4.10.epkg.Z IJ44534m3a.230412.AIX72TL05SP03.epkg.Z IJ44534m4a.230218.AIX72TL05SP04.epkg.Z IJ44534m4a.230218.VIOS3.1.3.21.epkg.Z IJ44799m5a.230218.AIX72TL05SP05.epkg.Z IJ44799m5a.230218.VIOS3.1.4.10.epkg.Z","https://www.ibm.com/support/pages/node/6857545","bos.mp64:7.2.5.200-7.2.5.201 bos.net.tcp.client_core:7.2.5.200-7.2.5.201","20230217"," ","","https://aix.software.ibm.com/aix/ifixes/ij44799/","","yes" "hiper","aix","7200-05-03-2135 :: 7200-05-05-2246","Possible system crashes processing network traffic","IJ44799 / IJ44047 / IJ44786 / IJ44534","7200-05-06","IJ44047m4b.230213.AIX72TL05SP04.epkg.Z IJ44047m4b.230213.VIOS3.1.3.21.epkg.Z IJ44786m5b.230213.AIX72TL05SP05.epkg.Z IJ44786m5b.230213.VIOS3.1.4.10.epkg.Z IJ44534m3a.230412.AIX72TL05SP03.epkg.Z IJ44534m4a.230218.AIX72TL05SP04.epkg.Z IJ44534m4a.230218.VIOS3.1.3.21.epkg.Z IJ44799m5a.230218.AIX72TL05SP05.epkg.Z IJ44799m5a.230218.VIOS3.1.4.10.epkg.Z","https://www.ibm.com/support/pages/node/6857545","bos.mp64:7.2.5.100-7.2.5.201 bos.net.tcp.client_core:7.2.5.100-7.2.5.201","20230217"," ","","https://aix.software.ibm.com/aix/ifixes/ij44799/","","yes" "sec","aix","7300-01-01","AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient","IJ44987 / CVE-2012-5783","7300-01-02","IJ44987s1a.230307.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc","bos.ecc_client.rte:7.3.1.0-7.3.1.0","20230414"," ","","https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar","CVE-2012-5783:4.3","no" "sec","vios","3.1.4.10","AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient","IJ44994 / CVE-2012-5783","3.1.4.20","IJ44994s5a.230307.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc","bos.ecc_client.rte:7.2.5.200-7.2.5.200","20230414"," ","","https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar","CVE-2012-5783:4.3","no" "sec","aix","7200-05-03 :: 7200-05-04 :: 7200-05-05","AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient","IJ44994 / CVE-2012-5783","7200-05-06","IJ44994s4a.230412.epkg.Z IJ44994s5a.230307.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc","bos.ecc_client.rte:7.2.5.0-7.2.5.1 bos.ecc_client.rte:7.2.5.100-7.2.5.100 bos.ecc_client.rte:7.2.5.200-7.2.5.200","20230414"," ","","https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar","CVE-2012-5783:4.3","no" "sec","vios","3.1.4.10 :: 3.1.4.21","AIX is vulnerable to arbitrary code execution due to libxml2","IJ45056 / CVE-2022-40303 / CVE-2022-40304","3.1.4.30","IJ45056m5a.230125.epkg.Z IJ45056m6a.230504.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc","bos.rte.control:7.2.5.200-7.2.5.201","20230208","20230504","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar","CVE-2022-40303:7.8 / CVE-2022-40304:7.8","no" "sec","vios","3.1.2.21 :: 3.1.2.30 :: 3.1.2.40 :: 3.1.2.50","AIX is vulnerable to arbitrary code execution due to libxml2","IJ45057 / CVE-2022-40303 / CVE-2022-40304","3.1.2.60","IJ45057m2a.230125.epkg.Z IJ45057m2b.230405.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc","bos.rte.control:7.2.5.0-7.2.5.5","20230208","20230504","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar","CVE-2022-40303:7.8 / CVE-2022-40304:7.8","no" "sec","vios","3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30","AIX is vulnerable to arbitrary code execution due to libxml2","IJ45058 / CVE-2022-40303 / CVE-2022-40304","3.1.3.40","IJ45058m4a.230125.epkg.Z IJ45058m4b.230405.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc","bos.rte.control:7.2.5.100-7.2.5.102","20230208","20230504","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar","CVE-2022-40303:7.8 / CVE-2022-40304:7.8","no" "sec","aix","7200-05-03 :: 7200-05-04 :: 7200-05-05","AIX is vulnerable to arbitrary code execution due to libxml2","IJ45058 / IJ45057 / IJ45056 / CVE-2022-40303 / CVE-2022-40304","7200-05-06","IJ45056m4a.230125.epkg.Z IJ45056m5a.230125.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc","bos.rte.control:7.2.5.0-7.2.5.4 bos.rte.control:7.2.5.100-7.2.5.101 bos.rte.control:7.2.5.200-7.2.5.200","20230208"," ","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar","CVE-2022-40303:7.8 / CVE-2022-40304:7.8","no" "sec","aix","7300-00-01 :: 7300-00-02 :: 7300-00-03","AIX is vulnerable to arbitrary code execution due to libxml2","IJ45059 / CVE-2022-40303 / CVE-2022-40304","7300-00-04","IJ45059m2a.230125.epkg.Z IJ45059m2b.230405.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc","bos.rte.control:7.3.0.0-7.3.0.2","20230208","20230405","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar","CVE-2022-40303:7.8 / CVE-2022-40304:7.8","no" "sec","aix","7300-01-01","AIX is vulnerable to arbitrary code execution due to libxml2","IJ45060 / CVE-2022-40303 / CVE-2022-40304","7300-01-03","IJ45060s1a.230125.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc","bos.rte.control:7.3.1.0-7.3.1.0","20230208"," ","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar","CVE-2022-40303:7.8 / CVE-2022-40304:7.8","no" "sec","aix","7100-05-09 :: 7100-05-10 :: 7100-05-11","AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient","IJ45221 / CVE-2012-5783","7100-05-12","IJ45221sAa.230309.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc","bos.ecc_client.rte:7.1.5.0-7.1.5.34","20230414"," ","","https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar","CVE-2012-5783:4.3","no" "sec","vios","3.1.2.30 :: 3.1.2.40 :: 3.1.2.50","AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient","IJ45222 / CVE-2012-5783","3.1.2.60","IJ45222s2a.230307.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc","bos.ecc_client.rte:7.2.5.0-7.2.5.1","20230414"," ","","https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar","CVE-2012-5783:4.3","no" "sec","vios","3.1.3.14 :: 3.1.3.21 :: 3.1.3.30","AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient","IJ45223 / CVE-2012-5783","3.1.3.40","IJ45223s4a.230307.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc","bos.ecc_client.rte:7.2.5.100-7.2.5.100","20230414"," ","","https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar","CVE-2012-5783:4.3","no" "sec","aix","7300-00-01 :: 7300-00-02 :: 7300-00-03","AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient","IJ45224 / CVE-2012-5783","7300-00-04","IJ45224s2a.230309.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc","bos.ecc_client.rte:7.3.0.0-7.3.0.1","20230414"," ","","https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar","CVE-2012-5783:4.3","no" "sec","vios","3.1.2.30 :: 3.1.2.40 :: 3.1.2.50","AIX is vulnerable to arbitrary command execution","IJ45245 / IJ46051 / IJ46110 / CVE-2023-26286","3.1.2.60","IJ46110s3a.230323.epkg.Z IJ46110s4a.230323.epkg.Z IJ46110s5a.230407.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc","bos.mp64:7.2.5.0-7.2.5.6 bos.rte.serv_aid:7.2.5.0-7.2.5.4 bos.sysmgt.serv_aid:7.2.5.0-7.2.5.3","20230412"," ","","https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar","CVE-2023-26286:8.4","no" "sec","vios","3.1.3.14 :: 3.1.3.21 :: 3.1.3.30","AIX is vulnerable to arbitrary command execution","IJ45245 / IJ46051 / IJ46110 / CVE-2023-26286","3.1.3.40","IJ46051s1a.230323.epkg.Z IJ46051s2a.230323.epkg.Z IJ46051s3a.230323.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc","bos.mp64:7.2.5.100-7.2.5.106 bos.rte.serv_aid:7.2.5.100-7.2.5.102 bos.sysmgt.serv_aid:7.2.5.100-7.2.5.102","20230412"," ","","https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar","CVE-2023-26286:8.4","no" "sec","vios","3.1.4.10","AIX is vulnerable to arbitrary command execution","IJ45245 / IJ46051 / IJ46110 / CVE-2023-26286","3.1.4.20","IJ45245s5a.230322.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc","bos.mp64:7.2.5.200-7.2.5.201 bos.rte.serv_aid:7.2.5.200-7.2.5.200 bos.sysmgt.serv_aid:7.2.5.200-7.2.5.200","20230412"," ","","https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar","CVE-2023-26286:8.4","no" "sec","aix","7200-05-03 :: 7200-05-04 :: 7200-05-05","AIX is vulnerable to arbitrary command execution","IJ45245 / IJ46051 / IJ46110 / CVE-2023-26286","7200-05-06","IJ46051s1a.230323.epkg.Z IJ46051s2a.230323.epkg.Z IJ46051s3a.230323.epkg.Z IJ45245s3a.230324.epkg.Z IJ45245s4a.230324.epkg.Z IJ45245s5a.230322.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc","bos.mp64:7.2.5.0-7.2.5.6 bos.mp64:7.2.5.100-7.2.5.106 bos.mp64:7.2.5.200-7.2.5.201 bos.rte.serv_aid:7.2.5.0-7.2.5.4 bos.rte.serv_aid:7.2.5.100-7.2.5.102 bos.rte.serv_aid:7.2.5.200-7.2.5.200 bos.sysmgt.serv_aid:7.2.5.0-7.2.5.3 bos.sysmgt.serv_aid:7.2.5.100-7.2.5.102 bos.sysmgt.serv_aid:7.2.5.200-7.2.5.200","20230412"," ","","https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar","CVE-2023-26286:8.4","no" "sec","aix","7300-01-01","AIX is vulnerable to arbitrary command execution","IJ45246 / CVE-2023-26286","7300-01-02","IJ45246s1a.230322.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc","bos.mp64:7.3.1.0-7.3.1.1 bos.rte.serv_aid:7.3.1.0-7.3.1.1 bos.sysmgt.serv_aid:7.3.1.0-7.3.1.0","20230412"," ","","https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar","CVE-2023-26286:8.4","no" "hiper","aix","7100-05-09-2135 :: 7100-05-11-2246","Possible system crashes processing network traffic","IJ45294 / IJ45295","7100-05-12","IJ45294mBa.230410.AIX71TL05SP11.epkg.Z IJ45295mAa.230210.AIX71TL05SP10.epkg.Z IJ45294mAa.230218.AIX71TL05SP10.epkg.Z IJ45294mBa.230410.AIX71TL05SP11.epkg.Z","https://www.ibm.com/support/pages/node/6857545","bos.mp64:7.1.5.43-7.1.5.47 bos.net.tcp.client:7.1.5.38-7.1.5.42","20230217"," ","","https://www.ibm.com/support/pages/apar/IJ45294/","","yes" "hiper","vios","3.1.2.30 :: 3.1.2.50","Possible system crashes processing network traffic","IJ45427 / IJ45429","3.1.2.60","IJ45427m4a.230217.VIOS3.1.2.40.epkg.Z IJ45427m2a.230509.VIOS3.1.2.50.epkg.Z IJ45429m4a.230218.VIOS3.1.2.40.epkg.Z","https://www.ibm.com/support/pages/node/6857545","bos.mp64:7.2.5.4- 7.2.5.6 bos.net.tcp.client_core:7.2.5.5-7.2.5.7","20230217"," ","","https://aix.software.ibm.com/aix/ifixes/ij45429/","","yes" "sec","aix","7100-05-09 :: 7100-05-10 :: 7100-05-11","AIX is vulnerable to arbitrary command execution","IJ45981 / CVE-2023-26286","7100-05-12","IJ45981s9a.230324.epkg.Z IJ45981sAa.230323.epkg.Z IJ45981sBa.230407.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc","bos.mp64:7.1.5.0-7.1.5.47 bos.rte.serv_aid:7.1.5.0-7.1.5.36","20230412"," ","","https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar","CVE-2023-26286:8.4","no" "sec","aix","7300-00-01 :: 7300-00-02 :: 7300-00-03","AIX is vulnerable to arbitrary command execution","IJ45997 / CVE-2023-26286","7300-00-04","IJ45997s1a.230322.epkg.Z IJ45997s2a.230322.epkg.Z IJ45997s3a.230322.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc","bos.mp64:7.3.0.0-7.3.0.4 bos.rte.serv_aid:7.3.0.0-7.3.0.2 bos.sysmgt.serv_aid:7.3.0.0-7.3.0.1","20230412"," ","","https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar","CVE-2023-26286:8.4","no" "hiper","aix","7300-00-00 :: 7300-00-01-2038 :: 7300-00-02-2114 :: 7300-00-03-2136 :: 7300-00-03-2148 :: 7300-00-04-2220 :: 7300-00-03-2246 :: 7300-00-06-2320","Potential undetected data loss after running chvg -ky or chvg -g","IJ46487","7300-00-04","IJ46487s1a.230425.AIX73TL00SP01.epkg.Z IJ46487s2a.230425.AIX73TL00SP02.epkg.Z IJ46487s3a.230424.AIX73TL00SP03.epkg.Z IJ46541s5a.230424.AIX72TL05SP05.epkg.Z IJ46541s6a.230503.AIX72TL05SP06.epkg.Z IJ46542s1a.230424.AIX73TL01SP01.epkg.Z IJ46542s2a.230503.AIX73TL01SP02.epkg.Z IJ46576s4a.230426.AIX72TL05SP04.epkg.Z","https://www.ibm.com/support/pages/node/6985585","bos.rte.lvm:7.3.0.0-7.3.0.2","20230424"," ","","https://aix.software.ibm.com/aix/ifixes/ij46487/","","no" "hiper","aix","7200-05-00 :: 7200-05-01-2038 :: 7200-05-02-2114 :: 7200-05-03-2136 :: 7200-05-03-2148 :: 7200-05-04-2220 :: 7200-05-05-2246 :: 7200-05-06-2320","Potential undetected data loss after running chvg -ky or chvg -g","IJ46541","7200-05-07","IJ46487s1a.230425.AIX73TL00SP01.epkg.Z IJ46487s2a.230425.AIX73TL00SP02.epkg.Z IJ46487s3a.230424.AIX73TL00SP03.epkg.Z IJ46541s5a.230424.AIX72TL05SP05.epkg.Z IJ46541s6a.230503.AIX72TL05SP06.epkg.Z IJ46542s1a.230424.AIX73TL01SP01.epkg.Z IJ46542s2a.230503.AIX73TL01SP02.epkg.Z IJ46576s4a.230426.AIX72TL05SP04.epkg.Z","https://www.ibm.com/support/pages/node/6985585","bos.rte.lvm:7.2.5.0-7.2.5.201","20230424"," ","","https://aix.software.ibm.com/aix/ifixes/ij46487/","","no" "hiper","aix","7300-01-00 :: 7300-01-01-2246 :: 7300-01-02-2320","Potential undetected data loss after running chvg -ky or chvg -g","IJ46542","7300-01-03","IJ46487s1a.230425.AIX73TL00SP01.epkg.Z IJ46487s2a.230425.AIX73TL00SP02.epkg.Z IJ46487s3a.230424.AIX73TL00SP03.epkg.Z IJ46541s5a.230424.AIX72TL05SP05.epkg.Z IJ46541s6a.230503.AIX72TL05SP06.epkg.Z IJ46542s1a.230424.AIX73TL01SP01.epkg.Z IJ46542s2a.230503.AIX73TL01SP02.epkg.Z IJ46576s4a.230426.AIX72TL05SP04.epkg.Z","https://www.ibm.com/support/pages/node/6985585","bos.rte.lvm:7.3.1.0-7.3.1.2","20230424"," ","","https://aix.software.ibm.com/aix/ifixes/ij46487/","","no" "hiper","vios","3.1.4.20 :: 3.1.4.21","LDAP user logins or connections stop working","IJ46694","3.1.4.30","IJ46694s6a.230509.AIX72TL05SP06.epkg.Z IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z IJ46727s2a.230509.AIX73TL01SP02.epkg.Z","https://www.ibm.com/support/pages/node/7000043","bos.rte.security:7.2.5.201-7.2.5.201","20230602"," ","","https://aix.software.ibm.com/aix/ifixes/ij46694/","","no" "hiper","aix","7200-05-06-2319 :: 7200-05-06-2320","LDAP user logins or connections stop working","IJ46694","7200-05-07","IJ46694s6a.230509.AIX72TL05SP06.epkg.Z IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z IJ46727s2a.230509.AIX73TL01SP02.epkg.Z","https://www.ibm.com/support/pages/node/7000043","bos.rte.security:7.2.5.201-7.2.5.201","20230602"," ","","https://aix.software.ibm.com/aix/ifixes/ij46694/","","no" "hiper","aix","7300-01-02-2319 :: AIX 7300-01-02-2320","LDAP user logins or connections stop working","IJ46727","7300-01-03","IJ46694s6a.230509.AIX72TL05SP06.epkg.Z IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z IJ46727s2a.230509.AIX73TL01SP02.epkg.Z","https://www.ibm.com/support/pages/node/7000043","bos.rte.security:7.3.1.1-7.3.1.1","20230602"," ","","https://aix.software.ibm.com/aix/ifixes/ij46694/","","no" "sec","vios","3.1.4.10 :: 3.1.4.21","AIX is vulnerable to a denial of service due to libxml2","IJ47597 / CVE-2023-28484 / CVE-2023-29469","3.1.4.30","IJ47597m6a.230717.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc","bos.rte.control:7.2.5.200-7.2.5.201","20230725"," ","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar","CVE-2023-28484:5.5 / CVE-2023-29469:5.5","no" "sec","aix","7200-05-04 :: 7200-05-05 :: 7200-05-06","AIX is vulnerable to a denial of service due to libxml2","IJ47597 / CVE-2023-28484 / CVE-2023-29469","7200-05-07","IJ47597m4a.230718.epkg.Z IJ47597m6a.230717.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc","bos.rte.control:7.2.5.0-7.2.5.6 bos.rte.control:7.2.5.100-7.2.5.103 bos.rte.control:7.2.5.200-7.2.5.201","20230725"," ","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar","CVE-2023-28484:5.5 / CVE-2023-29469:5.5","no" "sec","aix","7300-00-02 :: 7300-00-03 :: 7300-00-04","AIX is vulnerable to a denial of service due to libxml2","IJ47629 / CVE-2023-28484 / CVE-2023-29469","See Bulletin","IJ47629m4a.230718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc","bos.rte.control:7.3.0.0-7.3.0.3","20230725"," ","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar","CVE-2023-28484:5.5 / CVE-2023-29469:5.5","no" "sec","aix","7300-01-01 :: 7300-01-02","AIX is vulnerable to a denial of service due to libxml2","IJ47630 / CVE-2023-28484 / CVE-2023-29469","7300-01-03","IJ47630m2a.230718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc","bos.rte.control:7.3.1.0-7.3.1.1","20230725"," ","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar","CVE-2023-28484:5.5 / CVE-2023-29469:5.5","no" "sec","vios","3.1.2.40 :: 3.1.2.50 :: 3.1.2.60","AIX is vulnerable to a denial of service due to libxml2","IJ47631 / CVE-2023-28484 / CVE-2023-29469","See Bulletin","IJ47631m6a.230718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc","bos.rte.control:7.2.5.0-7.2.5.6","20230725"," ","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar","CVE-2023-28484:5.5 / CVE-2023-29469:5.5","no" "sec","vios","3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","AIX is vulnerable to a denial of service due to libxml2","IJ47632 / CVE-2023-28484 / CVE-2023-29469","3.1.3.50","IJ47632m4a.230718.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc","bos.rte.control:7.2.5.100-7.2.5.103","20230725"," ","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar","CVE-2023-28484:5.5 / CVE-2023-29469:5.5","no" "hiper","aix","7300-01-00 :: 7300-01-02-2320","Potential undetected data loss by using zlibNX","IJ47907","7300-01-03","IJ47907s2a.230907.AIX73TL01SP02.epkg.Z IJ48340s6a.230907.AIX72TL05SP06.epkg.Z IJ48416s4a.230907.AIX73TL00SP04.epkg.Z","https://www.ibm.com/support/pages/node/7028659","zlibNX.rte:7.3.1.0-7.3.1.1","20230911"," ","","https://aix.software.ibm.com/aix/ifixes/ij47907/","","no" "sec","vios","3.1.4.10 :: 3.1.4.21","AIX is vulnerable to denial of service due to AIXWindows","IJ48252 / CVE-2023-45172","3.1.4.30","IJ48252s6a.230928.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc","X11.base.smt:7.2.3.0-7.2.3.15","20231218"," ","","https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar","CVE-2023-45172:6.2","no" "sec","aix","7200-05-05 :: 7200-05-06","AIX is vulnerable to denial of service due to AIXWindows","IJ48252 / CVE-2023-45172","7200-05-07","IJ48252s6a.230928.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc","X11.base.smt:7.2.3.0-7.2.3.15","20231218"," ","","https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar","CVE-2023-45172:6.2","no" "sec","vios","3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","AIX is vulnerable to denial of service due to AIXWindows","IJ48252 / CVE-2023-45172","See Bulletin","IJ48252s6a.230928.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc","X11.base.smt:7.2.3.0-7.2.3.15","20231218"," ","","https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar","CVE-2023-45172:6.2","no" "hiper","aix","7200-05-00 :: 7200-05-06-2320","Potential undetected data loss by using zlibNX","IJ48340","7200-05-07","IJ47907s2a.230907.AIX73TL01SP02.epkg.Z IJ48340s6a.230907.AIX72TL05SP06.epkg.Z IJ48416s4a.230907.AIX73TL00SP04.epkg.Z","https://www.ibm.com/support/pages/node/7028659","zlibNX.rte:7.2.4.0-7.2.4.9","20230911"," ","","https://aix.software.ibm.com/aix/ifixes/ij47907/","","no" "hiper","aix","7300-00-00 :: 7300-00-04-2320","Potential undetected data loss by using zlibNX","IJ48416","See Bulletin","IJ47907s2a.230907.AIX73TL01SP02.epkg.Z IJ48340s6a.230907.AIX72TL05SP06.epkg.Z IJ48416s4a.230907.AIX73TL00SP04.epkg.Z","https://www.ibm.com/support/pages/node/7028659","zlibNX.rte:7.3.0.0-7.3.0.3","20230911"," ","","https://aix.software.ibm.com/aix/ifixes/ij47907/","","no" "sec","vios","3.1.4.10 :: 3.1.4.21","AIX is vulnerable to privilege escalation and denial of service","IJ48481 / CVE-2023-45166 / CVE-2023-45170 / CVE-2023-45174","3.1.4.30","IJ48481m5a.231207.epkg.Z IJ48481m5b.240202.epkg.Z IJ48481m6a.230927.epkg.Z IJ48481m6b.240130.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc","bos.rte.printers:7.2.5.200-7.2.5.201 printers.rte:7.2.5.200-7.2.5.201","20231212","20240203","","https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar","CVE-2023-45166:8.4 / CVE-2023-45170:8.4 / CVE-2023-45174:8.4","no" "sec","aix","7200-05-05 :: 7200-05-06","AIX is vulnerable to privilege escalation and denial of service","IJ48481 / CVE-2023-45166 / CVE-2023-45170 / CVE-2023-45174","7200-05-07","IJ48481m5a.231207.epkg.Z IJ48481m5b.240202.epkg.Z IJ48481m6a.230927.epkg.Z IJ48481m6b.240130.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc","bos.rte.printers:7.2.5.0-7.2.5.101 bos.rte.printers:7.2.5.200-7.2.5.201 printers.rte:7.2.5.200-7.2.5.201","20231212","20240203","","https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar","CVE-2023-45166:8.4 / CVE-2023-45170:8.4 / CVE-2023-45174:8.4","no" "sec","aix","7300-01-01 :: 7300-01-02","AIX is vulnerable to privilege escalation and denial of service","IJ48539 / CVE-2023-45166 / CVE-2023-45170 / CVE-2023-45174","7300-01-03","IJ48539m1a.231207.epkg.Z IJ48539m1b.240202.epkg.Z IJ48539m2a.230928.epkg.Z IJ48539m2b.240202.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc","bos.rte.printers:7.3.1.0-7.3.1.1 printers.rte:7.3.1.0-7.3.1.1","20231212","20240203","","https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar","CVE-2023-45166:8.4 / CVE-2023-45170:8.4 / CVE-2023-45174:8.4","no" "sec","aix","7300-01-01 :: 7300-01-02","AIX is vulnerable to denial of service due to AIXWindows","IJ48540 / CVE-2023-45172","7300-01-03","IJ48540s2a.230928.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc","X11.base.smt:7.3.1.0-7.3.1.0","20231218"," ","","https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar","CVE-2023-45172:6.2","no" "sec","vios","3.1.4.10 :: 3.1.4.21","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ48608 / CVE-2023-45171 / CVE-2023-45175","3.1.4.30","IJ48608m5a.231219.epkg.Z IJ48608m5b.240109.epkg.Z IJ48608s6a.230926.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.mp64:7.2.5.200-7.2.5.203","20240104","20240110","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45171:6.2 / CVE-2023-45175:6.2","yes" "sec","aix","7200-05-05 :: 7200-05-06","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ48608 / CVE-2023-45171 / CVE-2023-45175","7200-05-07","IJ48608m5a.231219.epkg.Z IJ48608m5b.240109.epkg.Z IJ48608s6a.230926.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.mp64:7.2.5.0-7.2.5.7 bos.mp64:7.2.5.100-7.2.5.107 bos.mp64:7.2.5.200-7.2.5.203","20240104","20240110","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45171:6.2 / CVE-2023-45175:6.2","yes" "sec","aix","7300-01-01 :: 7300-01-02","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ48618 / CVE-2023-45171 / CVE-2023-45175","7300-01-03","IJ48618m1a.231219.epkg.Z IJ48618m1b.240109.epkg.Z IJ48618m2a.231213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.mp64:7.3.1.0-7.3.1.3","20240104","20240110","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45171:6.2 / CVE-2023-45175:6.2","yes" "sec","vios","3.1.4.10 :: 3.1.4.21","AIX is vulnerable to denial of service vulnerabilities - pmsvcs","IJ48663 / CVE-2023-45169","3.1.4.30","IJ48663s5a.230926.epkg.Z IJ48663s6a.230926.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.pmapi.pmsvcs:7.2.5.200-7.2.5.201","20240104"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45169:6.2","yes" "sec","aix","7200-05-05 :: 7200-05-06","AIX is vulnerable to denial of service vulnerabilities - pmsvcs","IJ48663 / CVE-2023-45169","7200-05-07","IJ48663s5a.230926.epkg.Z IJ48663s6a.230926.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.pmapi.pmsvcs:7.2.5.0-7.2.5.4 bos.pmapi.pmsvcs:7.2.5.100-7.2.5.102 bos.pmapi.pmsvcs:7.2.5.200-7.2.5.201","20240104"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45169:6.2","yes" "sec","vios","3.1.4.10 :: 3.1.4.21","AIX is vulnerable to denial of service vulnerabilities - NFS","IJ48671 / CVE-2023-45173","3.1.4.30","IJ48671s6a.230927.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.net.nfs.client:7.2.5.200-7.2.5.201","20240104"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45173:6.2","yes" "sec","aix","7200-05-05 :: 7200-05-06","AIX is vulnerable to denial of service vulnerabilities - NFS","IJ48671 / CVE-2023-45173","7200-05-07","IJ48671s6a.230927.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.net.nfs.client:7.2.5.0-7.2.5.4 bos.net.nfs.client:7.2.5.100-7.2.5.102 bos.net.nfs.client:7.2.5.200-7.2.5.201","20240104"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45173:6.2","yes" "sec","aix","7300-01-01 :: 7300-01-02","AIX is vulnerable to denial of service vulnerabilities - pmsvcs","IJ48724 / CVE-2023-45169","7300-01-03","IJ48724s1a.230926.epkg.Z IJ48724s2a.230926.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.pmapi.pmsvcs:7.3.1.0-7.3.1.1","20240104"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45169:6.2","yes" "sec","aix","7300-01-01 :: 7300-01-02","AIX is vulnerable to denial of service vulnerabilities - NFS","IJ48725 / CVE-2023-45173","7300-01-03","IJ48725s1a.230927.epkg.Z IJ48725s2a.230927.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.net.nfs.client:7.3.1.0-7.3.1.1","20240104"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45173:6.2","yes" "sec","aix","7300-00-02 :: 7300-00-03 :: 7300-00-04","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ48735 / CVE-2023-45171 / CVE-2023-45175","See Bulletin","IJ48735m2a.231219.epkg.Z IJ48735m2b.240109.epkg.Z IJ48735m3a.231219.epkg.Z IJ48735m3b.240109.epkg.Z IJ48735s4a.230926.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.mp64:7.3.0.0-7.3.0.5","20240104","20240110","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45171:6.2 / CVE-2023-45175:6.2","yes" "sec","aix","7300-00-02 :: 7300-00-03 :: 7300-00-04","AIX is vulnerable to denial of service vulnerabilities - pmsvcs","IJ48737 / CVE-2023-45169","See Bulletin","IJ48737s3a.230926.epkg.Z IJ48737s4a.230926.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.pmapi.pmsvcs:7.3.0.0-7.3.0.3","20240104"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45169:6.2","yes" "sec","aix","7300-00-02 :: 7300-00-03 :: 7300-00-04","AIX is vulnerable to denial of service vulnerabilities - NFS","IJ48741 / CVE-2023-45173","See Bulletin","IJ48741m2a.231219.epkg.Z IJ48741s4a.230927.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.net.nfs.client:7.3.0.0-7.3.0.3","20240104"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45173:6.2","yes" "sec","aix","7300-00-02 :: 7300-00-03 :: 7300-00-04","AIX is vulnerable to denial of service due to AIXWindows","IJ48758 / CVE-2023-45172","See Bulletin","IJ48758s4a.230928.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc","X11.base.smt:7.3.0.0-7.3.0.0","20231218"," ","","https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar","CVE-2023-45172:6.2","no" "sec","aix","7300-00-02 :: 7300-00-03 :: 7300-00-04","AIX is vulnerable to privilege escalation and denial of service","IJ48784 / CVE-2023-45166 / CVE-2023-45170 / CVE-2023-45174","See Bulletin","IJ48784m2a.231207.epkg.Z IJ48784m2b.240202.epkg.Z IJ48784m3a.231207.epkg.Z IJ48784m3b.240202.epkg.Z IJ48784m4a.231002.epkg.Z IJ48784m4b.240202.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc","bos.rte.printers:7.3.0.0-7.3.0.2 printers.rte:7.3.0.0-7.3.0.2","20231212","20240203","","https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar","CVE-2023-45166:8.4 / CVE-2023-45170:8.4 / CVE-2023-45174:8.4","no" "sec","vios","3.1.4.10 :: 3.1.4.21 :: 3.1.4.31","AIX is vulnerable to denial of service due to ISC BIND","IJ49094 / IJ49093 / CVE-2023-3341","3.1.4.40","IJ49094s4.231110.epkg.Z IJ49093s7.231109.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc","bos.net.tcp.bind:7.2.5.200-7.2.5.200","20231218"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar","CVE-2023-3341:7.5","no" "sec","aix","7200-05-05 :: 7200-05-06 :: 7200-05-07","AIX is vulnerable to denial of service due to ISC BIND","IJ49094 / IJ49093 / CVE-2023-3341","7200-05-08","IJ49094s4.231110.epkg.Z IJ49093s7.231109.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc","bos.net.tcp.bind:7.2.5.100-7.2.5.101 bos.net.tcp.bind:7.2.5.200-7.2.5.200","20231218"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar","CVE-2023-3341:7.5","no" "sec","vios","3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","AIX is vulnerable to denial of service due to ISC BIND","IJ49094 / IJ49093 / CVE-2023-3341","See Bulletin","IJ49094s4.231110.epkg.Z IJ49093s7.231109.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc","bos.net.tcp.bind:7.2.5.100-7.2.5.101","20231218"," ","","https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar","CVE-2023-3341:7.5","no" "sec","vios","3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","AIX is vulnerable to denial of service vulnerabilities - kernel","IJ49202 / CVE-2023-45171 / CVE-2023-45175","See Bulletin","IJ49202m2a.231219.epkg.Z IJ49202m2b.240109.epkg.Z IJ49202m3a.231219.epkg.Z IJ49202m3b.240109.epkg.Z IJ49202s4a.231120.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.mp64:7.2.5.100-7.2.5.107","20240104","20240110","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45171:6.2 / CVE-2023-45175:6.2","yes" "sec","vios","3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","AIX is vulnerable to privilege escalation and denial of service","IJ49461 / CVE-2023-45166 / CVE-2023-45170 / CVE-2023-45174","See Bulletin","IJ49461m2a.231207.epkg.Z IJ49461m2c.240202.epkg.Z IJ49461m4a.231207.epkg.Z IJ49461m4b.240202.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc","bos.rte.printers:7.2.5.100-7.2.5.101","20231212","20240203","","https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar","CVE-2023-45166:8.4 / CVE-2023-45170:8.4 / CVE-2023-45174:8.4","no" "sec","vios","3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","AIX is vulnerable to denial of service vulnerabilities - NFS","IJ49533 / CVE-2023-45173","See Bulletin","IJ49533m4a.231219.epkg.Z IJ49533s4a.231219.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.net.nfs.client:7.2.5.100-7.2.5.102","20240104"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45173:6.2","yes" "sec","vios","3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","AIX is vulnerable to denial of service vulnerabilities - pmsvcs","IJ49534 / CVE-2023-45169","See Bulletin","IJ49534s3a.231213.epkg.Z IJ49534s4a.231213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc","bos.pmapi.pmsvcs:7.2.5.100-7.2.5.102","20240104"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar","CVE-2023-45169:6.2","yes" "hiper","aix","7300-02-00 :: 7300-02-01","Print queue status does not update","IJ49882","7300-02-02","IJ49882s1a.240129.AIX73TL02SP00-01.epkg.Z","https://www.ibm.com/support/pages/node/7131625","bos.rte.printers:7.3.2.0-7.3.2.0","20240312"," ","","http://aix.software.ibm.com/aix/ifixes/ij49737/","","no" "hiper","aix","7200-05-07","Print queue status does not update","IJ49883","7200-05-08","IJ49883s7a.240129.AIX72TL05SP07.epkg.Z","https://www.ibm.com/support/pages/node/7131625","bos.rte.printers:7.2.5.202-7.2.5.202","20240312"," ","","http://aix.software.ibm.com/aix/ifixes/ij49737/","","no" "hiper","aix","7300-01-03","Print queue status does not update","IJ49914","7300-01-04","IJ49914s3a.240311.AIX73TL01SP03.epkg.Z","https://www.ibm.com/support/pages/node/7131625","bos.rte.printers:7.3.1.2-7.3.1.2","20240312"," ","","http://aix.software.ibm.com/aix/ifixes/ij49737/","","no" "hiper","vios","3.1.4.0 :: 3.1.4.10 :: 3.1.4.20 :: 3.1.4.21 :: 3.1.4.30 :: 3.1.4.31","Unable to login as padmin after VIOS 4.1 upgrade","IJ50326","3.1.4.40","IJ50326m5b.240402.VIOS3.1.4.10.epkg.Z IJ50326m6c.240402.VIOS3.1.4.21.epkg.Z IJ50326s7b.240401.VIOS.3.1.4.31.epkg.Z","https://www.ibm.com/support/pages/node/7145269","ios.cli.rte:7.2.5.200-7.2.5.205","20240402"," ","","https://aix.software.ibm.com/aix/ifixes/ij50326/","","no" "sec","vios","3.1.4.10 :: 3.1.4.21 :: 3.1.4.31","AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)","IJ50424 / CVE-2023-51765","3.1.4.40","IJ50424s7a.240315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc","bos.net.tcp.sendmail:7.2.5.200-7.2.5.200","20240411"," ","","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar","CVE-2023-51765:6.5","no" "sec","aix","7200-05-05 :: 7200-05-06 :: 7200-05-07","AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)","IJ50424 / CVE-2023-51765","7200-05-08","IJ50424s7a.240315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc","bos.net.tcp.sendmail:7.2.5.0-7.2.5.101 bos.net.tcp.sendmail:7.2.5.200-7.2.5.200","20240411"," ","","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar","CVE-2023-51765:6.5","no" "sec","vios","4.1.0.10","AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)","IJ50428 / CVE-2023-51765","4.1.0.20","IJ50428s1a.240315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc","bos.net.tcp.sendmail:7.3.2.0-7.3.2.0","20240411"," ","","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar","CVE-2023-51765:6.5","no" "sec","aix","7300-02-01","AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)","IJ50428 / CVE-2023-51765","7300-02-02","IJ50428s1a.240315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc","bos.net.tcp.sendmail:7.3.2.0-7.3.2.0","20240411"," ","","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar","CVE-2023-51765:6.5","no" "sec","aix","7300-01-01 :: 7300-01-02 :: 7300-01-03","AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)","IJ50432 / CVE-2023-51765","7300-01-04","IJ50432s3a.240315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc","bos.net.tcp.sendmail:7.3.1.0-7.3.1.0","20240411"," ","","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar","CVE-2023-51765:6.5","no" "sec","aix","7300-00-02 :: 7300-00-03 :: 7300-00-04","AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)","IJ50433 / CVE-2023-51765","See Bulletin","IJ50433s4a.240315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc","bos.net.tcp.sendmail:7.3.0.0-7.3.0.0","20240411"," ","","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar","CVE-2023-51765:6.5","no" "hiper","vios","3.1.3.0 :: 3.1.3.10 :: 3.1.3.14 :: 3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","Unable to login as padmin after VIOS 4.1 upgrade","IJ50453","See Bulletin","IJ50453m4b.240401.VIOS3.1.3.40.epkg.Z","https://www.ibm.com/support/pages/node/7145269","ios.cli.rte:7.2.5.0-7.2.5.107","20240402"," ","","https://aix.software.ibm.com/aix/ifixes/ij50326/","","no" "sec","vios","3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)","IJ50508 / CVE-2023-51765","See Bulletin","IJ50508s1a.240325.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc","bos.net.tcp.sendmail:7.2.5.100-7.2.5.101","20240411"," ","","https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar","CVE-2023-51765:6.5","no" "sec","vios","4.1.0.10","AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)","IJ50601 / CVE-2024-25062","4.1.0.20","IJ50601s1a.240409.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc","bos.rte.control:7.3.2.0-7.3.2.0","20240508","20240604","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar","CVE-2024-25062:5.5","no" "sec","aix","7300-02-01","AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)","IJ50601 / CVE-2024-25062","7300-02-02","IJ50601s1a.240409.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc","bos.rte.control:7.3.2.0-7.3.2.0","20240508","20240604","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar","CVE-2024-25062:5.5","no" "sec","vios","3.1.4.10 :: 3.1.4.21 :: 3.1.4.31","AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)","IJ50602 / CVE-2024-25062","3.1.4.40","IJ50602m7a.240409.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc","bos.rte.control:7.2.5.200-7.2.5.202","20240508","20240604","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar","CVE-2024-25062:5.5","no" "sec","aix","7200-05-05 :: 7200-05-06 :: 7200-05-07","AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)","IJ50602 / CVE-2024-25062","7200-05-08","IJ50602m7a.240409.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc","bos.rte.control:7.2.5.0-7.2.5.102 bos.rte.control:7.2.5.200-7.2.5.202","20240508","20240604","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar","CVE-2024-25062:5.5","no" "sec","aix","7300-01-01 :: 7300-01-02 :: 7300-01-03","AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)","IJ50635 / CVE-2024-25062","7300-01-04","IJ50635m3a.240409.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc","bos.rte.control:7.3.1.0-7.3.1.2","20240508","20240604","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar","CVE-2024-25062:5.5","no" "sec","aix","7300-00-02 :: 7300-00-03 :: 7300-00-04","AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)","IJ50827 / CVE-2024-25062","See Bulletin","IJ50827m4a.240409.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc","bos.rte.control:7.3.0.0-7.3.0.3","20240508","20240604","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar","CVE-2024-25062:5.5","no" "sec","vios","3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)","IJ50828 / CVE-2024-25062","See Bulletin","IJ50828m4a.240409.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc","","20240508","20240604","","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar","CVE-2024-25062:5.5","no" "sec","vios","3.1.4.10 :: 3.1.4.21 :: 3.1.4.31","AIX is vulnerable to privilege escalation (CVE-2024-27273)","IJ50910 / CVE-2024-27273","3.1.4.40","IJ50910m5a.240502.epkg.Z IJ50910m6a.240502.epkg.Z IJ50910s7a.240418.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc","bos.mp64:7.2.5.200-7.2.5.205","20240506"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar","CVE-2024-27273:8.1","yes" "sec","aix","7200-05-05 :: 7200-05-06 :: 7200-05-07","AIX is vulnerable to privilege escalation (CVE-2024-27273)","IJ50910 / CVE-2024-27273","7200-05-08","IJ50910m5a.240502.epkg.Z IJ50910m6a.240502.epkg.Z IJ50910s7a.240418.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc","bos.mp64:7.2.5.0-7.2.5.107 bos.mp64:7.2.5.200-7.2.5.205","20240506"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar","CVE-2024-27273:8.1","yes" "sec","vios","4.1.0.10","AIX is vulnerable to privilege escalation (CVE-2024-27273)","IJ50934 / CVE-2024-27273","4.1.0.20","IJ50934s1a.240418.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc","bos.mp64:7.3.2.0-7.3.2.1","20240506"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar","CVE-2024-27273:8.1","yes" "sec","aix","7300-02-01","AIX is vulnerable to privilege escalation (CVE-2024-27273)","IJ50934 / CVE-2024-27273","7300-02-02","IJ50934s1a.240418.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc","bos.mp64:7.3.2.0-7.3.2.1","20240506"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar","CVE-2024-27273:8.1","yes" "sec","aix","7300-01-01 :: 7300-01-02 :: 7300-01-03","AIX is vulnerable to privilege escalation (CVE-2024-27273)","IJ50935 / CVE-2024-27273","7300-01-04","IJ50935m1a.240502.epkg.Z IJ50935m2a.240502.epkg.Z IJ50935s3a.240418.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc","bos.mp64:7.3.1.0-7.3.1.4","20240506"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar","CVE-2024-27273:8.1","yes" "sec","aix","7300-00-02 :: 7300-00-03 :: 7300-00-04","AIX is vulnerable to privilege escalation (CVE-2024-27273)","IJ50936 / CVE-2024-27273","See Bulletin","IJ50936m2a.240502.epkg.Z IJ50936m3a.240502.epkg.Z IJ50936m4a.240502.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc","bos.mp64:7.3.0.0-7.3.0.5","20240506"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar","CVE-2024-27273:8.1","yes" "sec","vios","3.1.3.21 :: 3.1.3.30 :: 3.1.3.40","AIX is vulnerable to privilege escalation (CVE-2024-27273)","IJ50937 / CVE-2024-27273","See Bulletin","IJ50937m2a.240502.epkg.Z IJ50937m3a.240502.epkg.Z IJ50937m4a.240502.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc","","20240506"," ","","https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar","CVE-2024-27273:8.1","yes" "hiper","vios","3.1.4.40 :: 3.1.4.41","Some 10GbE/40GbE RoCE adapters do not configure","IJ51639","3.1.4.50","IJ51639s8a.240718.VIOS3.1.4.40-41.epkg.Z","https://www.ibm.com/support/pages/node/7159650","devices.ethernet.mlx.rte:7.2.5.202-7.2.5.202","20240730"," ","","http://aix.software.ibm.com/aix/ifixes/ij51639/","","yes" "hiper","aix","7200-05-08-2419 :: 7200-05-08-2420","Some 10GbE/40GbE RoCE adapters do not configure","IJ51639","7200-05-09","IJ51639s8a.240718.AIX72TL05SP08.epkg.Z","https://www.ibm.com/support/pages/node/7159650","devices.ethernet.mlx.rte:7.2.5.202-7.2.5.202","20240730"," ","","http://aix.software.ibm.com/aix/ifixes/ij51639/","","yes" "hiper","vios","4.1.0.20 :: 4.1.0.21","Some 10GbE/40GbE RoCE adapters do not configure","IJ51842","4.1.1.0","IJ51842s2a.240718.VIOS4.1.0.20-21.epkg.Z","https://www.ibm.com/support/pages/node/7159650","devices.ethernet.mlx.rte:7.3.2.1-7.3.2.1","20240730"," ","","http://aix.software.ibm.com/aix/ifixes/ij51639/","","yes" "hiper","aix","7300-02-02-2419 :: 7300-02-02-2420","Some 10GbE/40GbE RoCE adapters do not configure","IJ51842","7300-02-03","IJ51842s2a.240718.AIX73TL02SP02.epkg.Z","https://www.ibm.com/support/pages/node/7159650","devices.ethernet.mlx.rte:7.3.2.1-7.3.2.1","20240730"," ","","http://aix.software.ibm.com/aix/ifixes/ij51639/","","yes" "hiper","aix","7200-00-01-1543 :: 7200-00-02-1614 :: 7200-00-03-1642 :: 7200-00-04-1717 :: 7200-00-05-1720 :: 7200-00-06-1806 :: 7200-01-00-1642 :: 7200-01-01-1643 :: 7200-01-02-1717 :: 7200-01-03-1720 :: 7200-01-04-1806 :: 7200-01-05-1845 :: 7200-01-06-1914 :: 7200-02-00-1731 :: 7200-02-01-1731 :: 7200-02-01-1732 :: 7200-02-02-1810 :: 7200-02-02-1832 :: 7200-02-03-1845 :: 7200-02-04-1914 :: 7200-02-05-1938 :: 7200-02-06-2016 :: 7200-03-00-1837 :: 7200-03-01-1838 :: 7200-03-02-1846 :: 7200-03-03-1914 :: 7200-03-04-1938 :: 7200-03-05-2016 :: 7200-03-06-2038 :: 7200-03-07-2114 :: 7200-04-00-1939 :: 7200-04-01-1939 :: 7200-04-02-2016 :: 7200-04-02-2028 :: 7200-04-03-2038 :: 7200-04-04-2114 :: 7200-04-05-2148 :: 7200-04-06-2220 :: 7200-05-00-2028 :: 7200-05-00-2037 :: 7200-05-01-2038 :: 7200-05-02-2114 :: 7200-05-03-2136 :: 7200-05-03-2148 :: 7200-05-04-2220 :: 7200-05-05-2246 :: 7200-05-06-2320 :: 7200-05-07-2346 :: 7200-05-08-2420","Potential undetected data loss can occur when copying or writing to files on an SMB share using the AIX SMB Client","IJ52123","See Bulletin","See Bulletin","https://www.ibm.com/support/pages/node/7166703","smbc.rte:7.2.302.6-7.2.302.5000","20241022"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","","no" "hiper","aix","7300-00-00 :: 7300-00-01-2148 :: 7300-00-02-2220 :: 7300-00-03-2246 :: 7300-00-04-2320 :: 7300-01-00 :: 7300-01-01-2246 :: 7300-01-02-2320 :: 7300-01-03-2346 :: 7300-01-04-2420 :: 7300-02-00 :: 7300-02-01-2346 :: 7300-02-02-2420","Potential undetected data loss can occur when copying or writing to files on an SMB share using the AIX SMB Client","IJ52123","See Bulletin","See Bulletin","https://www.ibm.com/support/pages/node/7166703","smbc.rte:7.3.302.0-7.3.302.1","20241022"," ","","https://www.ibm.com/resources/mrs/assets?source=aixbp","","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06","SYSTEM CRASH IN NETINFO_UNIXDOMNLIST","IV09793","6100-06-07","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV09793","bos.mp64:6.1.6.0-6.1.6.17","20111025","20130226","6100-05:IV12592 6100-06:IV09793 6100-07:IV09981 6100-08:IV10663 7100-00:IV20295 7100-01:IV09942","n/a"," ","no" "hiper","aix","7100-01-00","SYSTEM CRASH IN NETINFO_UNIXDOMNLIST","IV09942","7100-01-04","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV09942","bos.mp64:7.1.1.0-7.1.1.15","20111031","20130226","6100-05:IV12592 6100-06:IV09793 6100-07:IV09981 6100-08:IV10663 7100-00:IV20295 7100-01:IV09942","n/a"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01","SYSTEM CRASH IN NETINFO_UNIXDOMNLIST","IV09981","6100-07-02","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV09981","bos.mp64:6.1.7.0-6.1.7.1","20111031","20130226","6100-05:IV12592 6100-06:IV09793 6100-07:IV09981 6100-08:IV10663 7100-00:IV20295 7100-01:IV09942","n/a"," ","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11 :: 6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08 :: 6100-05-09 :: 6100-05-10 :: 6100-05-11","Perl Digest Module Digest->new() Code Injection","IV10197 / CVE-2011-3597","6100-09-00","n/a","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163800&label=UPDATE%20-%20AIX%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597","perl.rte:5.8.8.0-5.8.8.122","20111122","20130125","6100-08:IV10197 7100-02:IV10197","https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar","CVE-2011-3597:7.5","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09","Perl Digest Module Digest->new() Code Injection","IV10197 / CVE-2011-3597","7100-03-00","n/a","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163800&label=UPDATE%20-%20AIX%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597","perl.rte:5.10.1.0-5.10.1.150","20111122","20130125","6100-08:IV10197 7100-02:IV10197","https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar","CVE-2011-3597:7.5","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7","Perl Digest Module Digest->new() Code Injection","IV10197 / CVE-2011-3597","2.2.3.0","n/a","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201301/SECURITY/20130128/datafile163800&label=UPDATE%20-%20VIOS%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597","perl.rte:5.8.8.0-5.8.8.122","20111122","20130125","6100-08:IV10197 7100-02:IV10197","https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar","CVE-2011-3597:7.5","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06","AIX NFSv4 vulnerability","IV10327 / CVE-2012-4817","6100-06-07","6100-06-07","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120913/datafile151835&label=AIX%20NFSv4%20Vulnerability%20CVE-2012-4817","bos.net.nfs.client:6.1.6.0-6.1.6.17","20120913"," ","6100-05:IV09495 6100-06:IV10327 6100-07:IV11629 6100-08:IV11511 7100-00:IV26436 7100-01:IV12169 7100-02:IV11502","https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar","CVE-2012-4817:5","yes" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02","AIX NFSv4 vulnerability","IV11629 / CVE-2012-4817","6100-07-03","6100-07-03","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120913/datafile151835&label=AIX%20NFSv4%20Vulnerability%20CVE-2012-4817","bos.net.nfs.client:6.1.7.0-6.1.7.2","20120913"," ","6100-05:IV09495 6100-06:IV10327 6100-07:IV11629 6100-08:IV11511 7100-00:IV26436 7100-01:IV12169 7100-02:IV11502","https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar","CVE-2012-4817:5","yes" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03","AIX NFSv4 vulnerability","IV12169 / CVE-2012-4817","7100-01-04","IV26436s07.120907.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120913/datafile151835&label=AIX%20NFSv4%20Vulnerability%20CVE-2012-4817","bos.net.nfs.client:7.1.1.0-7.1.1.3","20120913"," ","6100-05:IV09495 6100-06:IV10327 6100-07:IV11629 6100-08:IV11511 7100-00:IV26436 7100-01:IV12169 7100-02:IV11502","https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar","CVE-2012-4817:5","yes" "hiper","aix","6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08","SYSTEM CRASH IN NETINFO_UNIXDOMNLIST","IV12592","6100-05-09","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV12592","bos.mp64:6.1.5.0-6.1.5.10","20111228","20130226","6100-05:IV12592 6100-06:IV09793 6100-07:IV09981 6100-08:IV10663 7100-00:IV20295 7100-01:IV09942","n/a"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03","TCP RETRANSMIT PROCESSING IS VERY SLOW","IV13121","7100-01-04","IV20595m05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV13121","bos.net.tcp.client:7.1.1.0-7.1.1.3","20120207","20130226","6100-06:IV18483 6100-07:IV14297 6100-08:IV14524 7100-01:IV13121 7100-02:IV15184","ftp://public.dhe.ibm.com/aix/ifixes/iv13121/"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07","SYSTEM CRASH IN E_CLEAR_WAIT().","IV13404","6100-07-08","U859173 bos.mp64:6.1.7.19","http://www-01.ibm.com/support/docview.wss?uid=isg1IV13404","bos.mp64:6.1.7.0-6.1.7.18","20120118","20131124","6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412","ftp://public.dhe.ibm.com/aix/ifixes/iv13404/"," ","no" "hiper","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08","SYSTEM CRASH IN E_CLEAR_WAIT().","IV13405"," ","IV13405s8a.130805.53TL12SP08.epkg.Z / IV13405s8a.130805.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV13405","bos.mp:5.3.12.9 bos.mp64:5.3.12.9","20120118","20130805","http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo140901","ftp://public.dhe.ibm.com/aix/ifixes/iv13405/"," ","no" "sec","aix","6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08","Vulnerability in AIX TCP stack","IV13751 / CV-2012-0194","6100-05-09","61JSP7_IV13751s07.120126.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc","bos.net.tcp.client:6.1.5.0-6.1.5.8","20120203","20131212","7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827","https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar","CVE-2012-0194:7.1","yes" "sec","vios","2.1.3.10 :: 2.1.3.0 :: 2.1.2.13 :: 2.1.2.12 :: 2.1.2.11 :: 2.1.2.0 :: 2.1.1.10 :: 2.1.1.0","Vulnerability in VIOS TCP stack","IV13751 / CV-2012-0194","2.2.1.4","61JVIOS_IV13751s01.120206.epkg.Z / 61HVIOS_IV13751s03.120204.epkg.Z / 61FVIOS_IV13751s1.120205.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc","bos.net.tcp.client:6.1.5.0-6.1.5.8","20120203","20131212","7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827","https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar","CVE-2012-0194:7.1","yes" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07","Vulnerability in AIX TCP stack","IV13820 / CV-2012-0194","6100-06-08","61NSP6_IV13820s06.120126.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc","bos.net.tcp.client:6.1.6.0-6.1.6.17","20120203","20131212","7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827","https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar","CVE-2012-0194:7.1","yes" "sec","vios","2.2.0.0 :: 2.2.0.10 :: 2.2.0.11 :: 2.2.0.12 :: 2.2.0.13","Vulnerability in VIOS TCP stack","IV13820 / CV-2012-0194","2.2.1.4","61NVIOS_IV13820s.120204.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc","bos.net.tcp.client:6.1.6.0-6.1.6.17","20120203","20131212","7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827","https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar","CVE-2012-0194:7.1","yes" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05","Vulnerability in AIX TCP stack","IV13827 / CV-2012-0194","5300-12-06","53XSP5_IV13827s05.120204.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc","bos.net.tcp.client:5.3.12.0-5.3.12.5","20120203","20131212","7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827","ftp://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar","CVE-2012-0194:7.1","yes" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3","Vulnerability in VIOS TCP stack","IV13827 / CV-2012-0194","2.2.1.4","61QS02_IV14209s02.120126.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc","bos.net.tcp.client:6.1.7.0-6.1.7.3","20120203","20131212","7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827","https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar","CVE-2012-0194:7.1","yes" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03","Vulnerability in AIX TCP stack","IV14209 / CV-2012-0194","6100-07-04","61QS02_IV14209s02.120126.epkg.Z / IV14209s03.120228.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc","bos.net.tcp.client:6.1.7.0-6.1.7.3","20120203","20131212","7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827","https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar","CVE-2012-0194:7.1","yes" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04","Vulnerability in AIX TCP stack","IV14210 / CV-2012-0194","7100-00-05","71BSP4_IV14210s04.120129.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc","bos.net.tcp.client:7.1.0.0-7.1.0.17","20120203","20131212","7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827","https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar","CVE-2012-0194:7.1","yes" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03","Vulnerability in AIX TCP stack","IV14211 / CV-2012-0194","7100-01-04","IV14211s03.120228.epkg.Z / 71DSP2_IV14211s02.120126.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc","bos.net.tcp.client:7.1.1.0-7.1.1.3","20120203","20131212","7100-01:IV14211 7100-00:IV14210 6100-07:IV14209 6100-06:IV13820 6100-05:IV13751 5300-12:IV13827","https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar","CVE-2012-0194:7.1","yes" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03","TCP RETRANSMIT PROCESSING IS VERY SLOW","IV14297","6100-07-04","IV14297s03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV14297","bos.net.tcp.client:6.1.7.0-6.1.7.14","20120128","20130226","6100-06:IV18483 6100-07:IV14297 6100-08:IV14524 7100-01:IV13121 7100-02:IV15184","ftp://public.dhe.ibm.com/aix/ifixes/iv14297/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02","SYSTEM CRASH IN E_CLEAR_WAIT().","IV14309","6100-08-03","U854277 bos.mp64:6.1.8.16","http://www-01.ibm.com/support/docview.wss?uid=isg1IV14309","bos.mp64:6.1.8.0-6.1.8.15","20120130","20131124","6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412","ftp://public.dhe.ibm.com/aix/ifixes/iv14309/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02","DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING","IV16514","7100-01-03","IV16514s01.epkg.Z / IV16514s02.epkg.Z / IV16514s03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV16514","bos.mp64:7.1.1.0-7.1.1.2","20120229","20130413","6100-05:IV16568 6100-06:IV16567 6100-08:IV17105 7100-00:IV23966 7100-01:IV16514 7100-02:IV17107","ftp://public.dhe.ibm.com/aix/ifixes/iv16514/"," ","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07","DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING","IV16567","6100-06-08","IV16567m72.epkg.Z / IV16567s06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV16567","bos.mp64:6.1.6.0-6.1.6.18","20120301","20130413","6100-05:IV16568 6100-06:IV16567 6100-08:IV17105 7100-00:IV23966 7100-01:IV16514 7100-02:IV17107","ftp://public.dhe.ibm.com/aix/ifixes/iv16567/"," ","no" "hiper","aix","6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08","DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING","IV16568","6100-05-09","IV16568m08.epkg.Z / IV16568s07.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV16568","bos.mp64:6.1.5.0-6.1.5.10","20120301","20130413","6100-05:IV16568 6100-06:IV16567 6100-08:IV17105 7100-00:IV23966 7100-01:IV16514 7100-02:IV17107","ftp://public.dhe.ibm.com/aix/ifixes/iv16568/"," ","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08","SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED","IV16603","6100-06-09","IV16603s07.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV16603","bos.mp64:6.1.6.0-6.1.6.19","20120302","20130326","6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357","ftp://public.dhe.ibm.com/aix/ifixes/iv16603/"," ","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08","Vulnerability in use of socketpair","IV16603 / CVE-2012-2192","6100-06-09","IV16603s07.120514.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair","bos.mp64:6.1.6.0-6.1.6.18","20120605"," ","6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357","https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar","CVE-2012-2192:4.9","yes" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08","JFS2 FILESYSTEM HANG IN BMASSIGN","IV17291","6100-06-09","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV17291","bos.mp64:6.1.6.0-6.1.6.19","20120314","20130327","6100-06:IV17291 6100-07:IV17375 6100-08:IV19995 7100-00:IV17924 7100-01:IV20607 7100-02:IV20010","n/a"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04","JFS2 FILESYSTEM HANG IN BMASSIGN","IV17375","6100-07-05","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV17375","bos.mp64:6.1.7.0-6.1.7.15","20120315","20130328","6100-06:IV17291 6100-07:IV17375 6100-08:IV19995 7100-00:IV17924 7100-01:IV20607 7100-02:IV20010","n/a"," ","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05","AIX NFSv4 vulnerability","IV17855 / CVE-2012-4817","5300-12-06","n/a","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120913/datafile151835&label=AIX%20NFSv4%20Vulnerability%20CVE-2012-4817","bos.net.nfs.client:5.3.12.0-5.3.12.5","20120913"," ","http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo134282","ftp://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar","CVE-2012-4817:5","yes" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06","JFS2 FILESYSTEM HANG IN BMASSIGN","IV17924","7100-00-07","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV17924","bos.mp64:7.1.0.0-7.1.0.19","20120320","20130327","6100-06:IV17291 6100-07:IV17375 6100-08:IV19995 7100-00:IV17924 7100-01:IV20607 7100-02:IV20010","n/a"," ","no" "hiper","aix","6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08","LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR","IV18317","6100-05-09","IV18317s81.epkg.Z / IV18317s72.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV18317","bos.mp64:6.1.5.0-6.1.5.10","20120327","20130413","6100-05:IV18317 6100-06:IV18318 6100-07:IV18127 6100-08:IV18700 7100-00:IV18319 7100-01:IV18174 7100-02:IV18249","ftp://public.dhe.ibm.com/aix/ifixes/iv18317/"," ","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07","LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR","IV18318","6100-06-08","IV18318s71.epkg.Z / IV18318s61.epkg.Z / IV18318s62.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV18318","bos.mp64:6.1.6.0-6.1.6.18","20120327","20130413","6100-05:IV18317 6100-06:IV18318 6100-07:IV18127 6100-08:IV18700 7100-00:IV18319 7100-01:IV18174 7100-02:IV18249","ftp://public.dhe.ibm.com/aix/ifixes/iv18318/"," ","no" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05","LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR","IV18319","7100-00-06","IV18319s51.epkg.Z / IV18319s41.epkg.Z / IV18319s42.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV18319","bos.mp64:7.1.0.0-7.1.0.18","20120327","20130413","6100-05:IV18317 6100-06:IV18318 6100-07:IV18127 6100-08:IV18700 7100-00:IV18319 7100-01:IV18174 7100-02:IV18249","ftp://public.dhe.ibm.com/aix/ifixes/iv18319/"," ","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07","TCP RETRANSMIT PROCESSING IS VERY SLOW","IV18483","6100-06-08","IV18483s07.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV18483","bos.net.tcp.client:6.1.6.0-6.1.6.18","20120329","20130326","6100-06:IV18483 6100-07:IV14297 6100-08:IV14524 7100-01:IV13121 7100-02:IV15184","ftp://public.dhe.ibm.com/aix/ifixes/iv18483/"," ","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05","Vulnerability in use of socketpair","IV19178 / CVE-2012-2192","5300-12-06","IV19178s05.120514.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair","bos.mp64:5.3.12.0-5.3.12.5","20120605"," ","http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo134316","ftp://aix.software.ibm.com/aix/efixes/security/socket_fix.tar","CVE-2012-2192:4.9","yes" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05","SYSTEM CRASH IN NETINFO_UNIXDOMNLIST","IV20295","7100-00-06","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV20295","bos.mp64:7.1.0.0-7.1.0.18","20120427","20130226","6100-05:IV12592 6100-06:IV09793 6100-07:IV09981 6100-08:IV10663 7100-00:IV20295 7100-01:IV09942","n/a"," ","no" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07","TCP RETRANSMIT PROCESSING IS VERY SLOW","IV20595","7100-00-08","IV20595m05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV20595","bos.net.tcp.client:7.1.0.0-7.1.0.21","20120503","20130326","6100-06:IV18483 6100-07:IV14297 6100-08:IV14524 7100-01:IV13121 7100-02:IV15184","ftp://public.dhe.ibm.com/aix/ifixes/iv20595/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04","JFS2 FILESYSTEM HANG IN BMASSIGN","IV20607","7100-01-05","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV20607","bos.mp64:7.1.1.0-7.1.1.15","20120503","20130327","6100-06:IV17291 6100-07:IV17375 6100-08:IV19995 7100-00:IV17924 7100-01:IV20607 7100-02:IV20010","n/a"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06","A tcp connection can hang and never send the last bytes","IV20656","7100-01-07","IV20656.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV20656","bos.net.tcp.client:7.1.1.0-7.1.1.17","20120504","20131123","7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615","ftp://public.dhe.ibm.com/aix/ifixes/iv20656/"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04","SYSTEM HANGS OR CRASHES WHEN APP USES SHARED SYMTAB CAPABILITY.","IV20880","6100-07-05","IV20880s04.epkg.Z / IV20880s03.epkg.Z / IV20880s02.epkg.Z / IV20880s01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV20880","bos.mp64:6.1.7.0-6.1.7.15","20120509","20130409","6100-07:IV20880 6100-08:IV21846 7100-01:IV21116 7100-02:IV21878","ftp://public.dhe.ibm.com/aix/ifixes/iv20880/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05","SYSTEM HANGS OR CRASHES WHEN APP USES SHARED SYMTAB CAPABILITY.","IV21116","7100-01-06","IV21116s04.epkg.Z / IV21116s02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV21116","bos.mp64:7.1.1.0-7.1.1.16","20120514","20130409","6100-07:IV20880 6100-08:IV21846 7100-01:IV21116 7100-02:IV21878","ftp://public.dhe.ibm.com/aix/ifixes/iv21116/"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04","SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED","IV21128","6100-07-05","IV21128s03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV21128","bos.mp64:6.1.7.0-6.1.7.15","20120514","20130223","6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357","ftp://public.dhe.ibm.com/aix/ifixes/iv21128/"," ","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04","Vulnerability in use of socketpair","IV21128 / CVE-2012-2192","6100-07-05","IV21128s03.120514.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair","bos.mp64:6.1.7.0-6.1.7.3","20120605"," ","6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357","https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar","CVE-2012-2192:4.9","yes" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06","SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED","IV21131","7100-00-07","IV21131s05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV21131","bos.mp64:7.1.0.0-7.1.0.19","20120514","20130326","6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357","ftp://public.dhe.ibm.com/aix/ifixes/iv21131/"," ","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06","Vulnerability in use of socketpair","IV21131 / CVE-2012-2192","7100-00-07","IV21131s05.120515.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair","bos.mp64:7.1.1.0-7.1.1.3","20120605"," ","6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357","https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar","CVE-2012-2192:4.9","yes" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04","SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED","IV21235","7100-01-05","IV21131s03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV21235","bos.mp64:7.1.1.0-7.1.1.15","20120515","20130223","6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357","ftp://public.dhe.ibm.com/aix/ifixes/iv21235/"," ","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03","Vulnerability in use of socketpair","IV21235 / CVE-2012-2192","7100-01-04","IV21235s03.120515.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120605/datafile162839&label=Vulnerability%20in%20use%20of%20socketpair","bos.mp64:7.1.1.0-7.1.1.3","20120605"," ","6100-06:IV16603 6100-07:IV21128 6100-08:IV19341 7100-00:IV21131 7100-01:IV21235 7100-02:IV19357","https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar","CVE-2012-2192:4.9","yes" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06","Arbitary file overwrite symlink in libodm","IV21382 / CVE-2012-2179","7100-00-07","IV21382.120613.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120620/datafile141524&label=Arbitary%20file%20overwrite%20symlink%20in%20libodm","bos.rte.odm:7.1.0.0-7.1.0.15","20120614"," ","6100-06:IV21379 6100-07:IV21381 6100-08:IV19369 7100-00:IV21382 7100-01:IV21383 7100-02:IV19252","https://aix.software.ibm.com/aix/efixes/security/libodm_fix.tar","CVE-2012-2179:6.9","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04","APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY","IV22062","6100-07-05","IV22062s04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV22062","bos.64bit:6.1.7.15 bos.adt.prof:6.1.7.15 bos.rte.control:6.1.7.15 bos.rte.libc:6.1.7.15 bos.rte.shell:6.1.7.15 mcr.rte:6.1.7.15","20120602","20130226","7100-01:IV22132 7100-02:IV24288 6100-07:IV22062 6100-06:IV22982","ftp://public.dhe.ibm.com/aix/ifixes/iv22062/"," ","no" "hiper","aix","7100-01-04","APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY","IV22132","7100-01-05","IV22132s04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV22132","bos.64bit:7.1.1.15 bos.adt.prof:7.1.1.15 bos.rte.control:7.1.1.15 bos.rte.libc:7.1.1.15 bos.rte.shell:7.1.1.15 mcr.rte:7.1.1.15","20120605","20130226","7100-01:IV22132 7100-02:IV24288 6100-07:IV22062 6100-06:IV22982","ftp://public.dhe.ibm.com/aix/ifixes/iv22132/"," ","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09","Vulnerability in AIX bind","IV22554 / CVE-2012-1667","6100-06-10","IV22554m07.120713.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20AIX%20bind","bos.net.tcp.client:6.1.6.0-6.1.6.19 bos.net.tcp.server:6.1.6.0-6.1.6.18","20120713"," ","5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557","https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar","CVE-2012-1667:5","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05","Vulnerability in AIX bind","IV22555 / CVE-2012-1667","6100-07-06","IV22555m04.120713.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20AIX%20bind","bos.net.tcp.client:6.1.7.0-6.1.7.16 bos.net.tcp.server:6.1.7.0-6.1.7.16","20120713"," ","5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557","https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar","CVE-2012-1667:5","no" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5","Vulnerability in VIOS bind","IV22555 / CVE-2012-1667","2.2.1.7","IV22555m04.120713.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20VIOS%20bind","bos.net.tcp.client:6.1.7.0-6.1.7.16 bos.net.tcp.server:6.1.7.0-6.1.7.16","20120713"," ","5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557","https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar","CVE-2012-1667:5","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07","Vulnerability in AIX bind","IV22556 / CVE-2012-1667","7100-00-08","IV22556m05.120711.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20AIX%20bind","bos.net.tcp.client:7.1.0.0-7.1.0.20 bos.net.tcp.server:7.1.0.0-7.1.0.18","20120713"," ","5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557","https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar","CVE-2012-1667:5","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04","Vulnerability in AIX bind","IV22557 / CVE-2012-1667","7100-01-05","IV22557m04.120713.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20AIX%20bind","bos.net.tcp.client:7.1.1.0-7.1.1.16 bos.net.tcp.server:7.1.1.0-7.1.1.16","20120713"," ","5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557","https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar","CVE-2012-1667:5","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06","Vulnerability in AIX bind","IV22625 / CVE-2012-1667","5300-12-07","IV22625m05.120713.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120713/datafile152434&label=Vulnerability%20in%20AIX%20bind","bos.net.tcp.client:5.3.12.0-5.3.12.7 bos.net.tcp.server:5.3.12.0-5.3.12.4","20120713"," ","5300-12:IV22625 6100-06:IV22554 6100-07:IV22555 7100-00:IV22556 7100-01:IV22557","ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar","CVE-2012-1667:5","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09","Vulnerability in AIX system call","IV22693 / CVE-2012-0723","6100-06-10","IV22693s07.120713.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20AIX%20system%20call","bos.mp64:6.1.6.0-6.1.6.19 bos.rte.tty:6.1.6.0-6.1.6.18","20120726"," ","5300-12: IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697","https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar","CVE-2012-0723:4.9","yes" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06","Vulnerability in AIX system call","IV22694 / CVE-2012-0723","5300-12-07","IV53331s0a.131220.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20AIX%20system%20call","bos.rte.tty:5.3.12.0-5.3.12.4","20120726"," ","5300-12: IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697","ftp://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar","CVE-2012-0723:4.9","yes" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05","Vulnerability in AIX system call","IV22695 / CVE-2012-0723","6100-07-06","IV22695s04.120724.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20AIX%20system%20call","bos.mp64:6.1.7.0-6.1.7.16 bos.rte.tty:6.1.7.0-6.1.7.16","20120726"," ","5300-12: IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697","https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar","CVE-2012-0723:4.9","yes" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5","Vulnerability in VIOS system call","IV22695 / CVE-2012-0723","2.2.1.7","IV22695s04.120628.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20VIOS%20system%20call","bos.mp64:6.1.7.0-6.1.7.16 bos.rte.tty:6.1.7.0-6.1.7.16","20120726"," ","5300-12: IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697","https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar","CVE-2012-0723:4.9","yes" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07","Vulnerability in AIX system call","IV22696 / CVE-2012-0723","7100-00-08","IV22696s05.120724.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20AIX%20system%20call","bos.mp64:7.1.0.0-7.1.0.19 bos.rte.tty:7.1.0.0-7.1.0.18","20120726"," ","5300-12:IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697","https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar","CVE-2012-0723:4.9","yes" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05","Vulnerability in AIX system call","IV22697 / CVE-2012-0723","7100-01-06","IV22697s04.120724.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201207/SECURITY/20120726/datafile140753&label=Vulnerability%20in%20AIX%20system%20call","bos.mp64:7.1.1.0-7.1.1.16 bos.rte.tty:7.1.1.0-7.1.1.16","20120726"," ","5300-12:IV22694 6100-06:IV22693 6100-07:IV22695 7100-00:IV22696 7100-01:IV22697","https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar","CVE-2012-0723:4.9","yes" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05","INACCURATE/INVALID RESULTS RETURNED BY SOME MATH LIBRARY APIS","IV22812","7100-01-06","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV22812","bos.adt.prof:7.1.1.0-7.1.1.17 bos.adt.libm:7.1.1.0-7.1.1.16","20120612","20130409","7100-00:IV23305 7100-01:IV22812","n/a"," ","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05","Vulnerability in AIX sendmail","IV22963 / CVE-2012-2200","7100-01-06","IV22963s04.120613.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120626/datafile151612&label=Vulnerability%20in%20AIX%20sendmail","bos.net.tcp.client:7.1.1.0-7.1.1.16","20120626"," ","6100-06:IV22965 6100-07:IV22966 6100-08:IV24454 7100-00:IV22964 7100-01:IV22963 7100-02:IV24645","https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar","CVE-2012-2200:7.2","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09","Vulnerability in AIX sendmail","IV22964 / CVE-2012-2200","7100-00-10","IV22964s05.120613.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120626/datafile151612&label=Vulnerability%20in%20AIX%20sendmail","bos.net.tcp.client:7.1.0.0-7.1.0.21","20120626"," ","6100-06:IV22965 6100-07:IV22966 6100-08:IV24454 7100-00:IV22964 7100-01:IV22963 7100-02:IV24645","https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar","CVE-2012-2200:7.2","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09","Vulnerability in AIX sendmail","IV22965 / CVE-2012-2200","6100-06-10","IV22965s07.120613.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120626/datafile151612&label=Vulnerability%20in%20AIX%20sendmail","bos.net.tcp.client:6.1.6.0-6.1.6.20","20120626"," ","6100-06:IV22965 6100-07:IV22966 6100-08:IV24454 7100-00:IV22964 7100-01:IV22963 7100-02:IV24645","https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar","CVE-2012-2200:7.2","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05","Vulnerability in AIX sendmail","IV22966 / CVE-2012-2200","6100-07-06","IV22966s04.120613.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201206/SECURITY/20120626/datafile151612&label=Vulnerability%20in%20AIX%20sendmail","bos.net.tcp.client:6.1.7.0-6.1.7.16","20120626"," ","6100-06:IV22965 6100-07:IV22966 6100-08:IV24454 7100-00:IV22964 7100-01:IV22963 7100-02:IV24645","https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar","CVE-2012-2200:7.2","no" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5","Vulnerability in VIOS sendmail","IV22966 / CVE-2012-2200","2.2.1.7","IV22966s04.120613.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201206/SECURITY/20120626/datafile151612&label=Vulnerability%20in%20VIOS%20sendmail","bos.net.tcp.client:6.1.7.0-6.1.7.16","20120626"," ","6100-06:IV22965 6100-07:IV22966 6100-08:IV24454 7100-00:IV22964 7100-01:IV22963 7100-02:IV24645","https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar","CVE-2012-2200:7.2","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08","APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY","IV22982","6100-06-09","IV22982s08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV22982","bos.64bit:6.1.6.18 bos.adt.prof:6.1.6.18 bos.rte.control:6.1.6.18 bos.rte.libc:6.1.6.18 bos.rte.shell:6.1.6.18 mcr.rte:6.1.6.18","20120613","20130226","7100-01:IV22132 7100-02:IV24288 6100-07:IV22062 6100-06:IV22982","ftp://public.dhe.ibm.com/aix/ifixes/iv22982/"," ","no" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07","INACCURATE/INVALID RESULTS RETURNED BY SOME MATH LIBRARY APIS","IV23305","7100-00-08","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV23305","bos.adt.prof:7.1.0.0-7.1.0.19 bos.adt.libm:7.1.0.0-7.1.0.16","20120619","20130409","7100-00:IV23305 7100-01:IV22812","n/a"," ","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06","AIX ftp vulnerability","IV23331 / CVE-2012-4845","6100-07-07","IV23331s6a.121226.epkg.Z / IV23331m05.121003.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845","bos.mp64:6.1.7.0-6.1.7.17 bos.rte.tty:6.1.7.0-6.1.7.16","20120703","20130208","6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669","https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar","CVE-2012-4845:6.8","yes" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5","VIOS ftp vulnerability","IV23331 / CVE-2012-4845","2.2.1.7","IV23331m04.121003.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20VIOS%20FTP%20Vulnerability%20CVE-2012-4845","bos.mp64:6.1.7.0-6.1.7.17 bos.rte.tty:6.1.7.0-6.1.7.16","20120703","20130208","6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669","https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar","CVE-2012-4845:6.8","yes" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06","DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING","IV23966","7100-00-07","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV23966","bos.mp64:7.1.0.0-7.1.0.18","20120627","20130413","6100-05:IV16568 6100-06:IV16567 6100-08:IV17105 7100-00:IV23966 7100-01:IV16514 7100-02:IV17107","n/a"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05","ASSERT IN IOCP_INSQUEUE","IV24569","6100-07-06","IV24569s05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV24569","bos.iocp.rte:6.1.7.15-6.1.7.16","20120710","20131123","7100-00:IV29604 7100-01:IV27204 6100-06:IV27337 6100-07:IV24569","ftp://public.dhe.ibm.com/aix/ifixes/iv24569/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06","SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS","IV24610","7100-01-07","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV24610","bos.perf.perfstat:7.1.1.0-7.1.1.17 bos.perf.tools:7.1.1.0-7.1.1.17","20120710","20131123","7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081","n/a"," ","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10","SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS","IV24777","6100-06-11","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV24777","bos.perf.perfstat:6.1.6.0-6.1.7.20 bos.perf.tools:6.1.6.0-6.1.6.20","20120716","20131123","7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081","n/a"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05","REDUCE EARLY WORKING STORAGE PAGING","IV26272","6100-07-06","IV26272s05.epkg.Z / IV26272s04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV26272","bos.mp64:6.1.7.0-6.1.7.17","20120814","20130409","6100-06:IV27655 6100-07:IV26272 6100-08:IV26735 7100-00:IV26581 7100-01:IV27014 7100-02:IV26731","ftp://public.dhe.ibm.com/aix/ifixes/iv26272/"," ","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07","AIX NFSv4 vulnerability","IV26436 / CVE-2012-4817","7100-00-08","IV26436s07.120907.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120913/datafile151835&label=AIX%20NFSv4%20Vulnerability%20CVE-2012-4817","bos.net.nfs.client:7.1.0.0-7.1.0.20","20120913"," ","6100-05:IV09495 6100-06:IV10327 6100-07:IV11629 6100-08:IV11511 7100-00:IV26436 7100-01:IV12169 7100-02:IV11502","https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar","CVE-2012-4817:5","yes" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07","REDUCE EARLY WORKING STORAGE PAGING","IV26581","7100-00-08","IV26581s07.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV26581","bos.mp64:7.1.0.0-7.1.0.20","20120820","20130409","6100-06:IV27655 6100-07:IV26272 6100-08:IV26735 7100-00:IV26581 7100-01:IV27014 7100-02:IV26731","ftp://public.dhe.ibm.com/aix/ifixes/iv26581/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05","REDUCE EARLY WORKING STORAGE PAGING","IV27014","7100-01-06","IV27014s04.epkg.Z / IV27014s05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV27014","bos.mp64:7.1.1.0-7.1.1.16","20120824","20130409","6100-06:IV27655 6100-07:IV26272 6100-08:IV26735 7100-00:IV26581 7100-01:IV27014 7100-02:IV26731","ftp://public.dhe.ibm.com/aix/ifixes/iv27014/"," ","no" "hiper","aix","7100-01-04 :: 7100-01-05","ASSERT IN IOCP_INSQUEUE","IV27204","7100-01-06","IV27204s05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV27204","bos.iocp.rte:7.1.1.15","20120829","20131123","7100-00:IV29604 7100-01:IV27204 6100-06:IV27337 6100-07:IV24569","ftp://public.dhe.ibm.com/aix/ifixes/iv27204/"," ","no" "hiper","aix","6100-06-08 :: 6100-06-09","ASSERT IN IOCP_INSQUEUE","IV27337","6100-06-10","iV27337s09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV27337","bos.iocp.rte:6.1.6.18-6.1.6.19","20120831","20131123","7100-00:IV29604 7100-01:IV27204 6100-06:IV27337 6100-07:IV24569","ftp://public.dhe.ibm.com/aix/ifixes/iv27337/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07","SYSTEM CRASH IN E_CLEAR_WAIT().","IV27584","7100-01-08","U855903 bos.mp64:7.1.1.19","http://www-01.ibm.com/support/docview.wss?uid=isg1IV27584","bos.mp64:7.1.1.0-7.1.1.19","20120905","20131124","6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412","ftp://public.dhe.ibm.com/aix/ifixes/iv27584/"," ","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09","REDUCE EARLY WORKING STORAGE PAGING","IV27655","6100-06-10","IV27655s07.epkg.Z / IV27655s09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV27655","bos.mp64:6.1.6.0-6.1.6.20","20120906","20130409","6100-06:IV27655 6100-07:IV26272 6100-08:IV26735 7100-00:IV26581 7100-01:IV27014 7100-02:IV26731","ftp://public.dhe.ibm.com/aix/ifixes/iv27655/"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06","SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES","IV27680","6100-07-07","IV27680.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV27680","bos.mp64:6.1.7.0-6.1.7.17","20120927","20131125","6100-07:IV27680 6100-08:IV32845 6100-08:IV32845 7100-01:IV30075 7100-02:IV33155","ftp://public.dhe.ibm.com/aix/ifixes/iv27680/"," ","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10","AIX fuser vulnerability","IV28151 / CVE-2012-4833","6100-06-11","IV28151s09.120926.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120928/datafile160830&label=AIX%20fuser%20vulnerability%20CVE-2012-4833","bos.rte.filesystem:6.1.6.0-6.1.6.19","20120923"," ","6100-06:IV28151 6100-07:IV28749 7100-00:IV28754 7100-01:IV28756","https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar","CVE-2012-4833:2.1","no" "sec","aix","6100-08-00 :: 6100-08-01","AIX ftp vulnerability","IV28651 / CVE-2012-4845","6100-08-02","IV28651s1a.121204.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845","bos.mp64:6.1.8.0-6.1.8.1","20120703","20130208","6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669","https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar","CVE-2012-4845:6.8","yes" "sec","vios","2.2.2.0 :: 2.2.2.1","VIOS ftp vulnerability","IV28651 / CVE-2012-4845","2.2.2.2","IV28651s1a.121204.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20VIOS%20FTP%20Vulnerability%20CVE-2012-4845","bos.mp64:6.1.8.0-6.1.8.1","20120703","20130208","6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669","https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar","CVE-2012-4845:6.8","yes" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10","AIX ftp vulnerability","IV28715 / CVE-2012-4845","6100-06-11","IV28715sAa.130206.epkg.Z / IV28715m09.121012.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845","bos.mp64:6.1.6.0-6.1.6.21 bos.rte.tty:6.1.6.0-6.1.6.19","20120703","20130208","6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669","https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar","CVE-2012-4845:6.8","yes" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06","AIX fuser vulnerability","IV28749 / CVE-2012-4833","6100-07-07","IV28749s05.120926.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/fuser_advisory.asc","bos.rte.filesystem:6.1.7.0-6.1.7.16","20120923"," ","6100-06:IV28151 6100-07:IV28749 7100-00:IV28754 7100-01:IV28756","https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar","CVE-2012-4833:2.1","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07","AIX fuser vulnerability","IV28754 / CVE-2012-4833","7100-00-08","IV28754s07.120926.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120928/datafile160830&label=AIX%20fuser%20vulnerability%20CVE-2012-4833","bos.rte.filesystem:7.1.0.0-7.1.0.18","20120923"," ","6100-06:IV28151 6100-07:IV28749 7100-00:IV28754 7100-01:IV28756","https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar","CVE-2012-4833:2.1","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06","AIX fuser vulnerability","IV28756 / CVE-2012-4833","7100-01-07","IV28756s05.120926.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201209/SECURITY/20120928/datafile160830&label=AIX%20fuser%20vulnerability%20CVE-2012-4833","bos.rte.filesystem:7.1.1.0-7.1.1.16","20120923"," ","6100-06:IV28151 6100-07:IV28749 7100-00:IV28754 7100-01:IV28756","https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar","CVE-2012-4833:2.1","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08","AIX ftp vulnerability","IV28785 / CVE-2012-4845","7100-00-09","IV28785s8a.130206.epkg.Z / IV28785m07.121002.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845","bos.mp64:7.1.2.0-7.1.2.1","20120703","20130208","6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669","https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar","CVE-2012-4845:6.8","yes" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07","AIX ftp vulnerability","IV28787 / CVE-2012-4845","7100-01-07","IV28787s6a.130121.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845","bos.mp64:7.1.1.0-7.1.1.17 bos.rte.tty:7.1.1.0-7.1.1.16","20120703","20130208","6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669","https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar","CVE-2012-4845:6.8","yes" "hiper","aix","7100-00-06 :: 7100-00-07","ASSERT IN IOCP_INSQUEUE","IV29604","7100-00-08","IV29604s07.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV29604","bos.iocp.rte:7.1.0.17","20121005","20131123","7100-00:IV29604 7100-01:IV27204 6100-06:IV27337 6100-07:IV24569","ftp://public.dhe.ibm.com/aix/ifixes/iv29604/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01","SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS","IV30032","7100-02-02","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV30032","bos.perf.perfstat:7.1.2.0-7.1.2.1 bos.perf.tools:7.1.2.0-7.1.2.1","20121011","20131123","7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081","n/a"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06","SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES","IV30075","7100-01-07","IV30075.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV30075","bos.mp64:7.1.1.0-7.1.1.18","20121012","20131125","6100-07:IV27680 6100-08:IV32845 6100-08:IV32845 7100-01:IV30075 7100-02:IV33155","ftp://public.dhe.ibm.com/aix/ifixes/iv30075/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01","SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS","IV30236","6100-08-02","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV30236","bos.perf.perfstat:6.1.8.0-6.1.8.14 bos.perf.tools:6.1.8.0-6.1.8.14","20121013","20131123","7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081","n/a"," ","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10","Vulnerability in AIX bind","IV30364 / CVE-2012-5166","6100-06-11","IV30364s10.130121.epkg.Z / IV30364s09.121016.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163519&label=UPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166","bos.net.tcp.client:6.1.6.0-6.1.6.21 bos.net.tcp.server:6.1.6.0-6.1.6.20","20121023","20130128","5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185","https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar","CVE-2012-5166:7.8","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06","Vulnerability in AIX bind","IV30365 / CVE-2012-5166","6100-07-07","IV30365s06.130121.epkg.Z / IV30365s05.121016.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc","bos.net.tcp.client:6.1.7.0-6.1.7.17 bos.net.tcp.server:6.1.7.0-6.1.7.17","20121023","20130128","5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185","https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar","CVE-2012-5166:7.8","no" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5","Vulnerability in VIOS bind","IV30365 / CVE-2012-5166","2.2.1.7","IV30365s04.121018.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS61&path=/201301/SECURITY/20130128/datafile163519&label=UPDATE%20-%20Vulnerability%20in%20VIOS%20bind%20-%20CVE-2012-5166","bos.net.tcp.client:6.1.7.0-6.1.7.17 bos.net.tcp.server:6.1.7.0-6.1.7.17","20121023","20130128","5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185","https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar","CVE-2012-5166:7.8","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08","Vulnerability in AIX bind","IV30366 / CVE-2012-5166","7100-00-09","IV30366s08.130121.epkg.Z / IV30366s07.121016.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163519&label=UPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166","bos.net.tcp.client:7.1.0.0-7.1.0.22 bos.net.tcp.server:7.1.0.0-7.1.1.19","20121023","20130128","5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185","https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar","CVE-2012-5166:7.8","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06","Vulnerability in AIX bind","IV30367 / CVE-2012-5166","7100-01-07","IV30367s06.130121.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163519&label=UPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166","bos.net.tcp.client:7.1.1.0-7.1.1.17 bos.net.tcp.server:7.1.1.0-7.1.1.17","20121023","20130128","5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185","https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar","CVE-2012-5166:7.8","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06","Vulnerability in AIX bind","IV30368 / CVE-2012-5166","5300-12-07","IV30368s06.121016.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201301/SECURITY/20130128/datafile163519&label=UPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166","bos.net.tcp.client:5.3.12.0-5.3.12.7 bos.net.tcp.server:5.3.12.0-5.3.12.7","20121023","20130128","5300-12:IV30368 6100-06:IV30364 6100-07:IV30365 6100-08:IV30247 7100-00:IV30366 7100-01:IV30367 7100-02:IV30185","ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar","CVE-2012-5166:7.8","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","AIX ftp vulnerability","IV30669 / CVE-2012-4845","7100-02-02","IV30669s1a.130114.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX61&path=/201302/SECURITY/20130208/datafile133630&label=UPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845","bos.mp64:7.1.2.0-7.1.2.1","20120703","20130208","6100-06:IV28715 6100-07:IV23331 6100-08:IV28651 7100-00:IV28785 7100-01:IV28787 7100-02:IV30669","https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar","CVE-2012-4845:6.8","yes" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10","SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES","IV30703","6100-06-11","IV30703.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV30703","bos.mp64:6.1.6.0-6.1.6.21","20121022","20130410","6100-07:IV27680 6100-08:IV32845 6100-08:IV32845 7100-01:IV30075 7100-02:IV33155","ftp://public.dhe.ibm.com/aix/ifixes/iv30703/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01","A tcp connection can hang and never send the last bytes","IV31960","7100-02-02","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV31960","bos.net.tcp.client:7.1.2.0-7.1.2.1","20121113","20131123","7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615","n/a"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01","DATA PTR INCORRECTLY INCREMENTED IN UDP RECEIVE.","IV31961","6100-08-02","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV31961","bos.net.tcp.client:6.1.8.0-6.1.8.1","20121113","20131123","6100-08:IV31961 6100-09:IV33210 7100-02:IV31962 7100-03:IV34454","n/a"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01","DATA PTR INCORRECTLY INCREMENTED IN UDP RECEIVE.","IV31962","7100-02-02","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV31962","bos.net.tcp.client:7.1.2.0-7.1.2.2 bos.net.tcp.client:7.1.2.0-7.1.2.15","20121113","20131123","6100-08:IV31961 6100-09:IV33210 7100-02:IV31962 7100-03:IV34454","n/a"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06","A tcp connection can hang and never send the last bytes","IV32392","6100-07-07","IV32392.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV32392","bos.net.tcp.client:6.1.7.0-6.1.7.17","20121122","20131123","7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615","ftp://public.dhe.ibm.com/aix/ifixes/iv32392/"," ","no" "hiper","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06","A tcp connection can hang and never send the last bytes","IV32615","5300-12-07","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV32615","bos.net.tcp.client:5.3.12.0-5.3.12.8","20121127","20131123","7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615","n/a"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01","SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES","IV33155","7100-02-02","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV33155","bos.mp64:7.1.2.0-7.1.2.1","20131207","20131125","6100-07:IV27680 6100-08:IV32845 6100-08:IV32845 7100-01:IV30075 7100-02:IV33155","n/a"," ","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10","A tcp connection can hang and never send the last bytes","IV33483","6100-06-11","IV33483.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV33483","bos.net.tcp.client:6.1.6.0-6.1.6.21","20121214","20131123","7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615","ftp://public.dhe.ibm.com/aix/ifixes/iv33483/"," ","no" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08","A tcp connection can hang and never send the last bytes","IV33484","7100-00-09","IV33434.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV33484","bos.net.tcp.client:7.1.0.0-7.1.0.22","20121214","20131123","7100-00:IV33484 7100-01:IV20656 7100-02:IV31960 7100-03:IV32651 6100-06:IV33483 6100-07:IV32392 6100-08:IV31959 6100-09:IV32467 5300-12:IV32615","ftp://public.dhe.ibm.com/aix/ifixes/iv33484/"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06","SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS","IV33521","6100-07-07","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV33521","bos.perf.perfstat:6.1.7.0-6.1.7.17 bos.perf.tools:6.1.7.0-6.1.7.17","20121217","20131123","7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081","n/a"," ","no" "hiper","aix","6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11","LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL","IV33883","6100-06-12","IV33883.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV33883","bos.adt.include:6.1.6.18-6.1.6.21 bos.mp64:6.1.6.19-6.1.6.22","20121220","20131126","6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915","ftp://public.dhe.ibm.com/aix/ifixes/iv33883/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01","CRASH IN LD_GETINFO_ALL32+000230","IV34354","6100-08-02","IV35680s6a.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV34354","bos.mp64:6.1.8.0-6.1.8.1","20130109","20131126","6100-07:IV35680 6100-08:IV34354","ftp://public.dhe.ibm.com/aix/ifixes/iv34354/"," ","no" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08","SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS","IV35280","7100-00-09","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV35280","bos.perf.perfstat:7.1.0.0-7.1.0.20 bos.perf.tools:7.1.0.0-7.1.0.20","20130116","20131123","7100-00:IV35280 7100-01:IV24610 7100-02:IV30032 7100-03:IV31489 6100-06:IV24777 6100-07:IV33521 6100-08:IV30236 6100-09:IV30081","n/a"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06","CRASH IN LD_GETINFO_ALL32+000230","IV35680","6100-07-07","IV35680s6a.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV35680","bos.mp64:6.1.7.17","20130122","20131126","6100-07:IV35680 6100-08:IV34354","ftp://public.dhe.ibm.com/aix/ifixes/iv35680/"," ","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10","DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT","IV35809","6100-06-11","IV35809sAa.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV35809","bos.mp64:6.1.6.0-6.1.6.21","20130123","20131125","7100-00:IV35812 7100-01:IV35813 7100-02:IV35814 6100-06:IV35809 6100-07:IV35810 6100-08:IV35811 6100-09:IV33672","ftp://public.dhe.ibm.com/aix/ifixes/iv35809/"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06","DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT","IV35810","6100-07-07","IV35810s6a.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV35810","bos.mp64:6.1.7.0-6.1.7.17","20130123","20131125","7100-00:IV35812 7100-01:IV35813 7100-02:IV35814 6100-06:IV35809 6100-07:IV35810 6100-08:IV35811 6100-09:IV33672","ftp://public.dhe.ibm.com/aix/ifixes/iv35810/"," ","no" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08","Data error in a file on an NFS server after a server reboot","IV35812","7100-00-09","IV35812s8a.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV35812","bos.mp64:7.1.0.0-7.1.0.21","20130123","20131125","7100-00:IV35812 7100-01:IV35813 7100-02:IV35814 6100-06:IV35809 6100-07:IV35810 6100-08:IV35811 6100-09:IV33672","ftp://public.dhe.ibm.com/aix/ifixes/iv35812/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06","Data error in a file on an NFS server after a server reboot","IV35813","7100-01-07","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV35813","bos.mp64:7.1.1.0-7.1.1.18","20130123","20131125","7100-00:IV35812 7100-01:IV35813 7100-02:IV35814 6100-06:IV35809 6100-07:IV35810 6100-08:IV35811 6100-09:IV33672","ftp://public.dhe.ibm.com/aix/ifixes/iv35813/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01","DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT","IV35814","7100-02-02","IV35814s1a.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV35814","bos.mp64:7.1.2.0-7.1.2.1","20130123","20131125","7100-00:IV35812 7100-01:IV35813 7100-02:IV35814 6100-06:IV35809 6100-07:IV35810 6100-08:IV35811 6100-09:IV33672","ftp://public.dhe.ibm.com/aix/ifixes/iv35814/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01","UDP MULTICAST: SHORT PACKET FOR SOME LISTENERS","IV35888","6100-08-02","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV35888","bos.net.tcp.client:6.1.8.0-6.1.8.2","20130125","20131126","6100-08:IV35888 6100-09:IV35644 7100-02:IV35893 7100-03:IV33047","ftp://public.dhe.ibm.com/aix/ifixes/iv35888/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01","UDP MULTICAST: SHORT PACKET FOR SOME LISTENERS.","IV35893","7100-02-02","IV35893.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV35893","bos.net.tcp.client:7.1.2.0-7.1.2.1","20130125","20131126","6100-08:IV35888 6100-09:IV35644 7100-02:IV35893 7100-03:IV33047","ftp://public.dhe.ibm.com/aix/ifixes/iv35893/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07","RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP","IV36524","7100-01-08","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV36524","bos.mp64:7.1.1.0-7.1.1.20","20130215","20131124","6100-06:IV36527 6100-07:IV34105 6100-08:IV38589 6100-09:IV36642 7100-00:IV36835 7100-01:IV36524 7100-02:IV38251 7100-03:IV36832","n/a"," ","no" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09","RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP","IV36835","7100-00-10","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV36835","bos.mp64:7.1.0.0-7.1.0.22","20130215","20131124","6100-06:IV36527 6100-07:IV34105 6100-08:IV38589 6100-09:IV36642 7100-00:IV36835 7100-01:IV36524 7100-02:IV38251 7100-03:IV36832","n/a"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","LD FAILING TO EXPORT UNREFERENCED SYMBOLS","IV36875","7100-02-03","IV36875.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV36875","bos.rte.bind_cmds:7.1.2.0","20130218","20131124","6100-08:IV36851 7100-02:IV36875","ftp://public.dhe.ibm.com/aix/ifixes/iv36875/"," ","no" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08","SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES","IV37083","7100-00-09","IV37083.epkg.Z / IV37083s8a.130225.71TL00SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV37083","bos.mp64:7.1.0.0-7.1.0.21","20130221","20130430","6100-07:IV27680 6100-08:IV32845 6100-08:IV32845 7100-01:IV30075 7100-02:IV33155","ftp://public.dhe.ibm.com/aix/ifixes/iv37083/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02","ADDRESS FROM SORECEIVE NOT FILLED IN FOR UDP PACKETS","IV37701","6100-08-03","IV37701.epkg.Z / IV37701s2a.130308.61TL08SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV37701","bos.mp64:6.1.8.0-6.1.8.15","20130307","20131124","6100-08:IV37701 6100-09:IV39175 7100-02:IV37783 7100-03:IV39176","ftp://public.dhe.ibm.com/aix/ifixes/iv37701/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","ADDRESS FROM SORECEIVE NOT FILLED IN FOR UDP PACKETS","IV37783","7100-02-03","IV37783.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV37783","bos.mp64:7.1.2.0-7.1.2.15","20130310","20131124","6100-08:IV37701 6100-09:IV39175 7100-02:IV37783 7100-03:IV39176","ftp://public.dhe.ibm.com/aix/ifixes/iv37783/"," ","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11","Vulnerability in AIX inet","IV37925 / CVE-2013-3035","6100-06-12","IV37925sBa.130508.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035","bos.net.tcp.client:6.1.6.0-6.1.6.22","20130604","20130605","6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015","https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar","CVE-2013-3035:7.1","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP","IV38251","7100-02-03","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV38251","bos.mp64:7.1.2.0-7.1.2.15","20130319","20131124","6100-06:IV36527 6100-07:IV34105 6100-08:IV38589 6100-09:IV36642 7100-00:IV36835 7100-01:IV36524 7100-02:IV38251 7100-03:IV36832","n/a"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02","USERDEL REMOVE -F FLAG","IV38411","6100-08-03","IV38411.epkg.Z / IV38411m2a.130809.61TL08SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV38411","bos.rte.security:6.1.8.0-6.1.8.15","20130320","20131126","6100-08:IV38411 6100-09:IV39043 7100-02:IV38414 7100-03:IV38487","ftp://public.dhe.ibm.com/aix/ifixes/iv38411/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","USERDEL REMOVE -F FLAG","IV38414","7100-02-03","IV38414.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV38414","bos.rte.security:7.1.2.0-7.1.2.15","20130320","20131126","6100-08:IV38411 6100-09:IV39043 7100-02:IV38414 7100-03:IV38487","ftp://public.dhe.ibm.com/aix/ifixes/iv38414/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02","ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST","IV38695","6100-08-03","IV38695s1a.130603.61TL08SP01.epkg.Z / IV38695s2a.130621.epkg.Z / IV38695s2a.130621.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV38695","devices.vdevice.IBM.vfc-client.rte:6.1.8.0-6.1.8.15","20130327","20131124","6100-07:IV39384 6100-08:IV38695 6100-09:IV37549 7100-01:IV41362 7100-02:IV38879 7100-03:IV37484","ftp://public.dhe.ibm.com/aix/ifixes/iv38695/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02","LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL","IV38743","6100-08-03","IV38743.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV38743","bos.mp64:6.1.8.0-6.1.8.15","20130328","20131126","6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915","ftp://public.dhe.ibm.com/aix/ifixes/iv38743/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST","IV38879","7100-02-03","IV38879s2a.130603.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV38879","devices.vdevice.IBM.vfc-client.rte:7.1.2.0-7.1.2.15","20130328","20131124","6100-07:IV39384 6100-08:IV38695 6100-09:IV37549 7100-01:IV41362 7100-02:IV38879 7100-03:IV37484","ftp://public.dhe.ibm.com/aix/ifixes/iv38879/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","LPARSTAT APP VALUE REPORTS 0 WHEN FREE PROCESSORS IN POOL","IV38915","7100-02-03","IV38915.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV38915","bos.adt.include:7.1.2.0-7.1.2.15 bos.mp64:7.1.2.0-7.1.2.15","20130328","20131126","6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915","ftp://public.dhe.ibm.com/aix/ifixes/iv41421/"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07","ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST","IV39384","6100-07-08","IV39384s7a.130627.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV39384","devices.vdevice.IBM.vfc-client.rte:6.1.7.0-6.1.7.18","20130405","20131124","6100-07:IV39384 6100-08:IV38695 6100-09:IV37549 7100-01:IV41362 7100-02:IV38879 7100-03:IV37484","ftp://public.dhe.ibm.com/aix/ifixes/iv39384/"," ","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11","tftp Security Vulnerability","IV40221 / CVE-2013-3005","6100-06-12","IV40221s11.130617.epkg.Z","https://www.ibm.com/support/pages/node/5741559","bos.net.tcp.client:6.1.6.0-6.1.6.22","20130703"," ","6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256","https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar","CVE-2013-3005:7.9","yes" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07","LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL","IV40614","6100-07-08","IV40614.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV40614","bos.adt.include:6.1.7.15-6.1.7.18 bos.mp64:6.1.7.15-6.1.7.18","20130424","20131126","6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915","ftp://public.dhe.ibm.com/aix/ifixes/iv40614/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07","ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST","IV41362","7100-01-09","IV41362s7a.130627.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV41362","devices.vdevice.IBM.vfc-client.rte:7.1.1.0-7.1.1.19","20130502","20131124","6100-07:IV39384 6100-08:IV38695 6100-09:IV37549 7100-01:IV41362 7100-02:IV38879 7100-03:IV37484","ftp://public.dhe.ibm.com/aix/ifixes/iv41362/"," ","no" "hiper","aix","7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07","LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL 13/05/23 PTF PECHANGE","IV41421","7100-01-08","IV41412.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV41421","bos.adt.include:7.1.1.15-7.1.1.18 bos.mp64:7.1.1.15-7.1.1.18","20130502","20131126","6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915","ftp://public.dhe.ibm.com/aix/ifixes/iv41421/"," ","no" "hiper","aix","7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09","LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL 13/05/23 PTF PECHANGE","IV41813","7100-00-10","IV41813.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV41813","bos.mp64:7.1.0.19-7.1.0.22","20130506","20131126","6100-06:IV33883 6100-07:IV40614 6100-08:IV38743 7100-00:IV41813 7100-01:IV41421 7100-02:IV38915","ftp://public.dhe.ibm.com/aix/ifixes/iv41813/"," ","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07","Vulnerability in AIX inet","IV42072 / CVE-2013-3035","6100-07-08","IV42072s7a.130508.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035","bos.net.tcp.client:6.1.7.0-6.1.7.18","20130604","20130605","6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015","https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar","CVE-2013-3035:7.1","no" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7","Vulnerability in VIOS inet","IV42072 / CVE-2013-3035","2.2.1.8","IV42072s7a.130508.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20VIOS%20inet%20Vulnerability%20CVE-2013-3035","bos.net.tcp.client:6.1.7.0-6.1.7.18","20130604","20130605","6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015","https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar","CVE-2013-3035:7.1","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","Vulnerability in AIX inet","IV42095 / CVE-2013-3035","7100-02-03","IV42095s2a.130514.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035","bos.net.tcp.client:7.1.2.0-7.1.2.15","20130604","20130605","6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015","https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar","CVE-2013-3035:7.1","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02","Vulnerability in AIX inet","IV42124 / CVE-2013-3035","6100-08-03","IV42124s2a.130514.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035","bos.net.tcp.client:6.1.8.0-6.1.8.15","20130604","20130605","6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015","https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar","CVE-2013-3035:7.1","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2","Vulnerability in VIOS inet","IV42124 / CVE-2013-3035","2.2.2.3","IV42124s2a.130514.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20VIOS%20inet%20Vulnerability%20CVE-2013-3035","bos.net.tcp.client:6.1.8.0-6.1.8.15","20130604","20130605","6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015","https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar","CVE-2013-3035:7.1","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07","Vulnerability in AIX inet","IV42229 / CVE-2013-3035","7100-01-08","IV42229s7a.130522.epkg.Z / IV42229s6a.130514.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035","bos.net.tcp.client:7.1.1.0-7.1.1.18","20130604","20130605","6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015","https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar","CVE-2013-3035:7.1","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09","Vulnerability in AIX inet","IV42264 / CVE-2013-3035","7100-00-10","IV42264s9a.130522.epkg.Z / IV42264s8a.130514.epkg.Z","https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201306/SECURITY/20130605/datafile060613&label=UPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035","bos.net.tcp.client:7.1.0.0-7.1.0.23","20130604","20130605","6100-06:IV37925 6100-07:IV42072 6100-08:IV42124 6100-09:IV41119 7100-00:IV42264 7100-01:IV42229 7100-02:IV42095 7100-03:IV41015","https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar","CVE-2013-3035:7.1","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","SYSTEM CRASH IN E_CLEAR_WAIT().","IV42324","7100-02-03","U857589 bos.mp64:7.1.2.16","http://www-01.ibm.com/support/docview.wss?uid=isg1IV42324","bos.mp64:7.1.2.0-7.1.2.15","20130510","20131124","6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412","ftp://public.dhe.ibm.com/aix/ifixes/iv42324/"," ","no" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09","SYSTEM CRASH IN E_CLEAR_WAIT().","IV42334","7100-00-10","IV42324s2a.130730.epkg.Z / IV42324s2a.130730.71TL02SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV42334","bos.mp64:7.1.0.0-7.1.0.22","20130510","20131124","6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412","ftp://public.dhe.ibm.com/aix/ifixes/iv42324/"," ","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07","tftp Security Vulnerability","IV42700 / CVE-2013-3005","7100-01-08","IV42700s7a.130617.epkg.Z","https://www.ibm.com/support/pages/node/5741559","bos.net.tcp.client:7.1.1.0-7.1.1.18","20130703","20130703","6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256","https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar","CVE-2013-3005:7.9","yes" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7","tftp Security Vulnerability","IV42932 / CVE-2013-3005","2.2.1.8","IV42933s2a.130617.epkg.Z","https://www.ibm.com/support/pages/node/5741559","bos.net.tcp.client:6.1.7.0-6.1.7.18","20130703"," ","6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256","https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar","CVE-2013-3005:7.9","yes" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07","tftp Security Vulnerability","IV42932 / CVE-2013-3005","6100-07-08","IV42933s2a.130617.epkg.Z","https://www.ibm.com/support/pages/node/5741559","bos.net.tcp.client:6.1.7.0-6.1.7.18","20130703"," ","6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256","https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar","CVE-2013-3005:7.9","yes" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2","tftp Security Vulnerability","IV42933 / CVE-2013-3005","2.2.2.3","IV42933s2a.130617.epkg.Z","https://www.ibm.com/support/pages/node/5741559","bos.net.tcp.client:6.1.8.0-6.1.8.15","20130703"," ","6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256","https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar","CVE-2013-3005:7.9","yes" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02","tftp Security Vulnerability","IV42933 / CVE-2013-3005","6100-08-03","IV42933s2a.130617.epkg.Z","https://www.ibm.com/support/pages/node/5741559","bos.net.tcp.client:6.1.8.0-6.1.8.15","20130703"," ","6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256","https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar","CVE-2013-3005:7.9","yes" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09","tftp Security Vulnerability","IV42934 / CVE-2013-3005","7100-00-10","IV42934s9a.130617.epkg.Z","https://www.ibm.com/support/pages/node/5741559","bos.net.tcp.client:7.1.0.0-7.1.0.23","20130703","20130703","6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256","https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar","CVE-2013-3005:7.9","yes" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","tftp Security Vulnerability","IV42935 / CVE-2013-3005","7100-02-03","IV42935s2a.130617.epkg.Z","https://www.ibm.com/support/pages/node/5741559","bos.net.tcp.client:7.1.2.0-7.1.2.15","20130703"," ","6100-06:IV40221 6100-07:IV42932 6100-08:IV42933 6100-09:IV42299 7100-00:IV42934 7100-01:IV42700 7100-02:IV42935 7100-03:IV43256","https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar","CVE-2013-3005:7.9","yes" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","Security Vulnerabilities in AIX InfiniBand","IV43561 / CVE-2013-4011","7100-02-03","iv43561m2a.130626.epkg.Z","https://www.ibm.com/support/pages/node/5741571","devices.common.IBM.ib.rte:7.1.2.0-7.1.2.15","20130716"," ","6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652","https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar","CVE-2013-4011:7.2","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09","Security Vulnerabilities in AIX InfiniBand","IV43562 / CVE-2013-4011","7100-00-10","iv43562m9.130626.epkg.Z","https://www.ibm.com/support/pages/node/5741571","devices.common.IBM.ib.rte:7.1.0.0-7.1.0.21","20130716"," ","6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652","https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar","CVE-2013-4011:7.2","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02","Security Vulnerabilities in AIX InfiniBand","IV43580 / CVE-2013-4011","6100-08-03","iv43580m2a.130619.epkg.Z","https://www.ibm.com/support/pages/node/5741571","devices.common.IBM.ib.rte:6.1.8.0-6.1.8.15","20130716"," ","6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652","https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar","CVE-2013-4011:7.2","no" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7","Security Vulnerabilities in VIOS InfiniBand","IV43580 / CVE-2013-4011","2.2.1.8","iv43827m7a.130614.epkg.Z","https://www.ibm.com/support/pages/node/5741571","devices.common.IBM.ibm.rte:6.1.7.0-6.1.7.16","20130716"," ","6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652","https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar","CVE-2013-4011:7.2","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2","Security Vulnerabilities in VIOS InfiniBand","IV43580 / CVE-2013-4011","2.2.2.3","iv43580m2a.130619.epkg.Z","https://www.ibm.com/support/pages/node/5741571","devices.common.IBM.ib.rte:6.1.8.0-6.1.8.15","20130716"," ","6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652","https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar","CVE-2013-4011:7.2","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11","Security Vulnerabilities in AIX InfiniBand","IV43582/ CVE-2013-4011","6100-06-12","iv43582mBa.130626.epkg.Z","https://www.ibm.com/support/pages/node/5741571","devices.common.IBM.ib.rte:6.1.6.0-6.1.6.21","20130716"," ","6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652","https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar","CVE-2013-4011:7.2","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07","Security Vulnerabilities in AIX InfiniBand","IV43756 / CVE-2013-4011","7100-01-08","iv43756m7a.130612.epkg.Z","https://www.ibm.com/support/pages/node/5741571","devices.common.IBM.ib.rte:7.1.1.0-7.1.1.18","20130716"," ","6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652","https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar","CVE-2013-4011:7.2","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07","Security Vulnerabilities in AIX InfiniBand","IV43827 / CVE-2013-4011","6100-07-08","iv43827m7a.130614.epkg.Z","https://www.ibm.com/support/pages/node/5741571","devices.common.IBM.ibm.rte:6.1.7.0-6.1.7.16","20130716"," ","6100-06:IV43582 6100-07:IV43106 6100-08:IV43580 6100-09:IV43657 7100-00:IV43562 7100-01:IV43539 7100-02:IV43561 7100-03:IV43652","https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar","CVE-2013-4011:7.2","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08","Security vulnerabilities in Perl for AIX","IV43973 / CVE-2012-5526 / CVE-2013-1667","6100-09-00","n/a","https://www.ibm.com/support/pages/node/5740761","perl.rte:5.8.8.0-5.8.8.244","20131120","20131204","7100-00:IV46765","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2012-5526:4.3 / CVE-2013-1667:4.3","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7","Security vulnerabilities in Perl for VIOS","IV43973 / CVE-2012-5526 / CVE-2013-1667","2.2.3.0","n/a","https://www.ibm.com/support/pages/node/5740761s","perl.rte:5.8.8.0-5.8.8.244","20131120","20131204","7100-00:IV46765","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2012-5526:4.3 / CVE-2013-1667:4.3","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03","CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP","IV44039","7100-02-04","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV44039","bos.mp64:7.1.2.0-7.1.2.16","20140605"," ","6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950"," "," ","no" "hiper","aix","6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11 :: 6100-06-12","SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT","IV45736","6100-07-09","IV45736sAa.130721.61TL06SP10.epkg.Z / IV45736sAa.130721.epkg.Z / IV45736sBa.130724.61TL06SP11.epkg.Z / IV45736sBa.130724.epkg.Z / IV45736sCa.130916.61TL06SP12.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV45736","bos.mp64:6.1.6.18-6.1.6.23","20130716","20130814","7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898","ftp://public.dhe.ibm.com/aix/ifixes/iv45736/"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08","SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT","IV45897","6100-07-09","IV45897s7a.130724.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV45897","bos.mp64:6.1.7.0-6.1.7.19","20130721","20140217","7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898","ftp://public.dhe.ibm.com/aix/ifixes/iv45897/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03","SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT","IV45898","6100-08-04","IV45898s2b.130724.epkg.Z / IV45898s3a.130819.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV45898","bos.mp64:6.1.8.0-6.1.8.16","20130721","20140217","7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898","ftp://public.dhe.ibm.com/aix/ifixes/iv45898/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08","SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT","IV45899","7100-01-09","IV45899s7a.130724.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV45899","bos.mp64:7.1.1.1-7.1.1.19","20130721","20140217","7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898","ftp://public.dhe.ibm.com/aix/ifixes/iv45899/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03","SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT","IV46104","7100-02-04","IV46104s2a.130725.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV46104","bos.mp64:7.1.2.0-7.1.2.16","20130724","20140217","7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898","ftp://public.dhe.ibm.com/aix/ifixes/iv46104/"," ","no" "hiper","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09","SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT","IV46105"," ","IV46105s9a.130725.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV46105","bos.mp64:7.1.0.0-7.1.0.23","20130724","20130814","7100-00:IV46105 7100-01:IV45899 7100-02:IV46104 6100-06:IV45736 6100-07:IV45897 6100-08:IV45898","ftp://public.dhe.ibm.com/aix/ifixes/iv46105/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03","Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system","IV46246","7100-02-04","IV46246s3a.130821.71TL02SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV46246","bos.mp64:7.1.2.0-7.1.2.16","20130729","20140217","7100-02:IV46246 7100-01:IV48042 6100-08:IV47394","ftp://public.dhe.ibm.com/aix/ifixes/iv46246/"," ","no" "hiper","aix","7100-03-00","CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP","IV46590","7100-03-01","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV46950","bos.mp64:7.1.3.0","20140605"," ","6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950"," "," ","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08","Security vulnerabilities in Perl for AIX","IV46765 / CVE-2012-5526 / CVE-2013-1667","7100-03-00","n/a","https://www.ibm.com/support/pages/node/5740761","perl.rte:5.10.1.0-5.10.1.150","20121120","20131204","6100-00:IV43973","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2012-5526:4.3 / CVE-2013-1667:4.3","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03","CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP","IV46850","6100-08-04","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV46850","bos.mp64:6.1.8.0-6.1.8.16","20140605"," ","6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950"," "," ","no" "hiper","aix","6100-09-00","CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP","IV46897","6100-09-01","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV46897","bos.mp64:<6.1.9.15","20140605"," ","6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950"," "," ","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03","VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS","IV47037","6100-08-04","IV47037s3a.130828.61TL08SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV47037","devices.pci.77102224.com:6.1.8.0-6.1.8.17","20130813","20140217","6100-07:IV47348 6100-08:IV47037 6100-09:IV47532 7100-01:IV47350 7100-02:IV47351 7100-03:IV47353","ftp://public.dhe.ibm.com/aix/ifixes/iv47037/"," ","no" "hiper","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08","VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS","IV47347","5300-12-09","IV47347s8a.130925.53TL12SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV47347","devices.pci.77102224.com:5.3.12.0-5.3.12.8","20130821","20131002","7100-01:IV47350 7100-02:IV47351 6100-07:IV47348 6100-08:IV47037 5300-12:IV47347","ftp://aix.software.ibm.com/aix/efixes/iv47347/"," ","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08","VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS","IV47348","6100-07-09","IV47348s8a.130917.61TL07SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV47348","devices.pci.77102224.com:6.1.7.0-6.1.7.19","20130821","20140217","6100-07:IV47348 6100-08:IV47037 6100-09:IV47532 7100-01:IV47350 7100-02:IV47351 7100-03:IV47353","ftp://public.dhe.ibm.com/aix/ifixes/iv47348/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08","VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS","IV47350","7100-01-09","IV47350s8a.130923.71TL01SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV47350","devices.pci.77102224.com:7.1.1.0-7.1.1.20","20130821","20140217","6100-07:IV47348 6100-08:IV47037 6100-09:IV47532 7100-01:IV47350 7100-02:IV47351 7100-03:IV47353","ftp://public.dhe.ibm.com/aix/ifixes/iv47350/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03","VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS","IV47351","7100-02-04","IV47351s3a.130925.71TL02SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV47351","devices.pci.77102224.com:7.1.2.0-7.1.2.18","20130821","20140217","6100-07:IV47348 6100-08:IV47037 6100-09:IV47532 7100-01:IV47350 7100-02:IV47351 7100-03:IV47353","ftp://public.dhe.ibm.com/aix/ifixes/iv47351/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03","Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system","IV47394","6100-08-04","IV47394s3a.130821.61TL08SP03.epkg.Z / IV47394s2a.130821.61TL08SP02.epkg.Z / IV47394s1a.131122.61TL08SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV47394","bos.mp64:6.1.8.0-6.1.8.16","20130821","20140217","7100-02:IV46246 7100-01:IV48042 6100-08:IV47394: 6100-07:IV48041","ftp://public.dhe.ibm.com/aix/ifixes/iv47394/"," ","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08","AIX printer commands vulnerability","IV47427 / CVE-2013-5419","6100-07-09","IV47427s4a.130827.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3224&myns=pwraix61&mync=E","bos.rte.printers:6.1.7.0-6.1.7.16","20130925","20130925","6100-07:IV47427 6100-08:IV47428 7100-01:IV47429 7100-02:IV47430","https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar","CVE-2013-5419:6.9","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03","AIX printer commands vulnerability","IV47428 / CVE-2013-5419","6100-08-04","IV47428s2a.130827.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3224&myns=pwraix61&mync=E","bos.rte.printers:6.1.8.0-6.1.8.15","20130925","20130925","6100-07:IV47427 6100-08:IV47428 7100-01:IV47429 7100-02:IV47430","https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar","CVE-2013-5419:6.9","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08","AIX printer commands vulnerability","IV47429 / CVE-2013-5419","7100-01-09","IV47429s4a.130827.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3224&myns=pwraix61&mync=E","bos.rte.printers:7.1.1.0-7.1.1.16","20130925","20130925","6100-07:IV47427 6100-08:IV47428 7100-01:IV47429 7100-02:IV47430","https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar","CVE-2013-5419:6.9","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02","AIX printer commands vulnerability","IV47430 / CVE-2013-5419","7100-02-04","IV47430s2a.130827.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3224&myns=pwraix61&mync=E","bos.rte.printers:7.1.2.0-7.1.2.15","20130925","20130925","6100-07:IV47427 6100-08:IV47428 7100-01:IV47429 7100-02:IV47430","https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar","CVE-2013-5419:6.9","no" "hiper","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08","CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP","IV47865","6100-07-09","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV47865","bos.mp64:6.1.7.0-6.1.7.19","20140605"," ","6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950"," "," ","no" "hiper","aix","6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08","Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system","IV48041","6100-07-09","IV48041s6a.131002.61TL07SP06.epkg.Z / IV48041s7a.131009.61TL07SP07.epkg.Z / IV48041s8a.130910.61TL07SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV48041","bos.mp64:6.1.7.15-6.1.7.19","20130813","20140217","6100-07:IV48041 6100-08:IV45898 7100-01:IV48042 7100-02:IV46246","ftp://public.dhe.ibm.com/aix/ifixes/iv48041/"," ","no" "hiper","aix","6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08","Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system","IV48041","6100-07-09","IV48041s8a.130910.61TL07SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV48041","bos.mp64:6.1.7.15-6.1.7.19","20130910","20130927","7100-02:IV46246 7100-01:IV48042 6100-08:IV47394","ftp://public.dhe.ibm.com/aix/ifixes/iv48041/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08","Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system","IV48042","7100-01-09","IV48042s8a.130910.71TL01SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV48042","bos.mp64:7.1.1.15-7.1.1.19","20130910","20140217","7100-02:IV46246 7100-01:IV48042 6100-08:IV47394","ftp://public.dhe.ibm.com/aix/ifixes/iv48042/"," ","no" "hiper","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08","CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP","IV49394","7100-01-09","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV49394","bos.mp64:7.1.1.0-7.1.1.19","20140605"," ","6100-07:IV47865 6100-08:IV46850 6100-09:IV46897 7100-01:IV49394 7100-02:IV44039 7100-03:IV46950"," "," ","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04","AIX WPAR vulnerability","IV51421 / CVE-2014-0899","next vwpar update","IV51420s52.131030.epkg.Z / IV51420s53.131031.epkg.Z / IV51421s52.131030.epkg.Z / IV51421s53.131031.epkg.Z","https://www.ibm.com/support/pages/node/5741691","vwpar.52.rte:1.1.0.0-1.1.1.19 vwpar.52.rte:1.1.2.0-1.1.2.17 wpar.53.rte:1.1.0.0-1.1.1.18 vwpar.53.rte:1.1.2.0-1.1.2.15","20140306","20140408","n/a","https://aix.software.ibm.com/aix/efixes/security/wparcre_fix.tar","CVE-2014-0899:5.5","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09","Vulnerability in AIX X-Server","IV52181 / CVE-2013-4396","6100-07-10","IV52181s0a.131220.epkg.Z","https://www.ibm.com/support/pages/node/5740773","Xll.base.rte:6.1.8.0","20140121","20140122","7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331","https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar","CVE-2013-4396:5.5","no" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8","Vulnerability in VIOS X-Server","IV52181 / CVE-2013-4396","2.2.1.9","IV52181s0a.131220.epkg.Z","https://www.ibm.com/support/pages/node/5740773","Xll.base.rte:6.1.8.0","20140121","20140122","7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331","https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar","CVE-2013-4396:5.5","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04","Vulnerability in AIX X-Server","IV52184 / CVE-2013-4396","6100-08-05","IV52184s0a.131220.epkg.Z","https://www.ibm.com/support/pages/node/5740773","Xll.base.rte:6.1.8.0","20140121","20140122","7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331","https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar","CVE-2013-4396:5.5","no" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4","Vulnerability in VIOS X-Server","IV52184 / CVE-2013-4396","2.2.2.5","IV52184s0a.131220.epkg.Z","https://www.ibm.com/support/pages/node/5740773","Xll.base.rte:6.1.8.0","20140121","20140122","7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331","https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar","CVE-2013-4396:5.5","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09","Vulnerability in AIX X-Server","IV52185 / CVE-2013-4396","7100-01-10","IV52185s0a.131220.epkg.Z","https://www.ibm.com/support/pages/node/5740773","Xll.base.rte:7.1.1.0-7.1.1.15","20140121","20140122","7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331","https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar","CVE-2013-4396:5.5","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04","Vulnerability in AIX X-Server","IV52186 / CVE-2013-4396","7100-02-05","IV52186s0a.131220.epkg.Z","https://www.ibm.com/support/pages/node/5740773","Xll.base.rte:7.1.2.0","20140121","20140122","7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331","https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar","CVE-2013-4396:5.5","no" "hiper","aix","6100-09-00 :: 6100-09-01","CREATING SEA OR ETHERCHANNEL ON FC 5899 ADAPTER IS NOT POSSIBLE","IV52695","6100-09-02","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV52695","devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.1","20140514"," ","6100-09:IV52695 7100-03:IV52765","http://www-933.ibm.com/support/fixcentral/aix/quickorder?release=6.1&function=fixId&fixids=U865786&includeSupersedes=0&source=fc"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01","CREATING SEA OR ETHERCHANNEL ON FC 5899 ADAPTER IS NOT POSSIBLE","IV52765","7100-03-02","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV52765","devices.pciex.e4145616e4140518.rte:7.1.3.0-7.1.3.1","20140514"," ","6100-09:IV52695 7100-03:IV52765","http://www-933.ibm.com/support/fixcentral/aix/quickorder?release=6.1&function=fixId&fixids=U865786&includeSupersedes=0&source=fc"," ","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02","Vulnerability in AIX X-Server","IV52978 / CVE-2013-4396","6100-09-03","IV52978s0a.140128.epkg.Z","https://www.ibm.com/support/pages/node/5740773","Xll.base.rte:6.1.9.0-6.1.9.2","20140121","20140122","7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331","https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar","CVE-2013-4396:5.5","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2","Vulnerability in VIOS X-Server","IV52978 / CVE-2013-4396","2.2.3.3","IV52978s0a.140128.epkg.Z","https://www.ibm.com/support/pages/node/5740773","Xll.base.rte:6.1.9.0-6.1.9.2","20140121","20140122","7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331","https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar","CVE-2013-4396:5.5","no" "hiper","aix","6100-09-00 :: 6100-09-01","TAPE MKSYSB RESTORES FROM 6100-09 OR 7100-03 WILL FAIL.","IV53002","6100-09-02","IV53002s01.140107.61TL09SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV53002","bos.sysmgt.sysbr:6.1.9.0-6.1.9.1","20131209"," ","6100-09:IV53002 7100-03:IV53003","https://aix.software.ibm.com/aix/ifixes/iv53002/"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01","TAPE MKSYSB RESTORES FROM 6100-09 OR 7100-03 WILL FAIL.","IV53003","7100-03-02","IV53003s1c.140122.71TL03SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV53002","bos.sysmgt.sysbr:7.1.3.0-7.1.3.1","20131209"," ","6100-09:IV53002 7100-03:IV53003","https://aix.software.ibm.com/aix/ifixes/iv53003/"," ","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02","Vulnerability in AIX X-Server","IV53246 / CVE-2013-4396","7100-03-03","IV53246s0a.140128.epkg.Z","https://www.ibm.com/support/pages/node/5740773","Xll.base.rte:7.1.3.0-7.1.3.2","20140121","20140122","7100-03:IV53246 7100-02:IV52186 7100-01:IV52185 6100-09:IV52978 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331","https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar","CVE-2013-4396:5.5","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08","Vulnerability in AIX X-Server","IV53331 / CVE-2013-4396","5300-12-09","IV53331s0a.131220.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=18&ID=3353&myns=pwraix61&mync=E","Xll.base.rte:5.3.12.0-5.3.12.1","20140121","20140122","7100-02:IV52186 7100-01:IV52185 6100-08:IV52184 6100-07:IV52181 5300-12:IV53331","ftp://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar","CVE-2013-4396:5.5","no" "hiper","aix","6100-09-00 :: 6100-09-01","XMGC NOT TRAVERSING ALL KERNEL HEAPS.","IV53582","6100-09-02","IV53582s0a.140109.61TL9SP0.epkg.Z / IV53582s0a.140109.epkg.Z / IV53582s1b.140109.61TL9SP1.epkg.Z / IV53582s1b.140109.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV53582","bos.mp64:6.1.9.0-6.1.9.1","20131226","20140110","6100-09:IV53582 7100-03:IV53587","https://aix.software.ibm.com/aix/ifixes/iv53582/"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01","XMGC NOT TRAVERSING ALL KERNEL HEAPS.","IV53587","7100-03-02","IV53587s0a.140109.71TL3SP0.epkg.Z / IV53587s0a.140109.epkg.Z / IV53587s1b.140109.71TL3SP1.epkg.Z / IV53587s1b.140109.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV53587","bos.mp64:7.1.3.0-7.1.3.1","20131227","20140110","6100-09:IV53582 7100-03:IV53587","https://aix.software.ibm.com/aix/ifixes/iv53587/"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02","UNABLE TO SU TO A NIS USER","IV53884","7100-03-03","IV53884s1a.140113.71TL03SP01.epkg.Z","https://www-01.ibm.com/support/docview.wss?uid=isg1IV58128","bos.rte.security:7.1.3.0-7.1.3.1","20140328"," ","6100-09:IV53944 7100-03:IV53884","https://aix.software.ibm.com/aix/ifixes/iv53884/"," ","no" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02","UNABLE TO SU TO A NIS USER","IV53944","6100-09-03","IV53944s1a.140113.61TL09SP01.epkg.Z","https://www.ibm.com/support/pages/node/5752383","bos.rte.security:6.1.9.0-6.1.9.1","20140328"," ","6100-09:IV53944 7100-03:IV53884","https://aix.software.ibm.com/aix/ifixes/iv53944/"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01","DISK I/O ERROR WITH ALGORITHM ROUND_ROBIN OR SHORTEST_QUEUE","IV54905","7100-03-02","IV54905s1a.140203.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV54905","devices.common.IBM.mpio.rte:7.1.3.0-7.1.3.1","20140203","20140204","6100-09:IV54907 7100-03:IV54905","https://aix.software.ibm.com/aix/ifixes/iv54905/"," ","no" "hiper","aix","6100-09-00 :: 6100-09-01","DISK I/O ERROR WITH ALGORITHM ROUND_ROBIN OR SHORTEST_QUEUE","IV54907","6100-09-02","IV54907s1a.140203.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV54907","devices.common.IBM.mpio.rte:6.1.9.0-6.1.9.1","20140203","20140204","6100-09:IV54907 7100-03:IV54905","https://aix.software.ibm.com/aix/ifixes/iv54907/"," ","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4 :: 2.2.2.5 :: 2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8 :: 2.2.1.9","Security Vulnerability in Perl _compile","IV56641 / CVE-2012-6329","2.2.3.3","perl61.zip","https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc","perl.rte:5.8.8.0-5.8.8.366","20140423"," ","5300-12:IV56641 6100-09:IV56641 7100-03:IV56642","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2012-6329:7.5","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Security Vulnerability in Perl _compile","IV56641 / CVE-2012-6329","perl.rte:5.8.8.488","perl61.zip","https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc","perl.rte:5.8.8.0-5.8.8.123","20140423"," ","5300-12:IV56641 6100-09:IV56641 7100-03:IV56642","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2012-6329:7.5","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09","Security Vulnerability in Perl _compile","IV56641 / CVE-2012-6329","perl.rte:5.8.8.488","perl61.zip","https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc","perl.rte:5.8.8.0-5.8.8.366","20140423"," ","5300-12:IV56641 6100-09:IV56641 7100-03:IV56642","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2012-6329:7.5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09 :: 7100-01-10","Security Vulnerability in Perl _compile","IV56642 / CVE-2012-6329","perl.rte:5.10.1.250","perl71.zip","https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc","perl.rte:5.10.10.-5.10.1.200","20140423"," ","5300-12:IV56641 6100-09:IV56641 7100-03:IV56642","https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source=aixbp","CVE-2012-6329:7.5","no" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02","JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN","IV57361","7100-03-03","IV57361s2a.140505.71TL03SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV57361","bos.mp64:7.1.3.0-7.1.3.2","20140509","20140602","7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235","https://aix.software.ibm.com/aix/ifixes/iv57361/"," ","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04","AIX ptrace Vulnerability","IV58861 / CVE-2014-0930","7100-02-05","IV58861s4a.140422.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29","bos.mp64:7.1.2.0-7.1.2.17","20140502","20140520","5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607","https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar","CVE-2014-0930:4.7","yes" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09","AIX ptrace Vulnerability","IV58888 / CVE-2014-0930","7100-01-10","IV58888s9a.140422.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29","bos.mp64:7.1.1.0-7.1.1.20","20140502","20140520","5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607","https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar","CVE-2014-0930:4.7","yes" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04","AIX ptrace Vulnerability","IV58948 / CVE-2014-0930","6100-08-05","IV58948s4a.140423.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29","bos.mp64:6.1.8.0-6.1.8.17","20140502","20140520","5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607","https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar","CVE-2014-0930:4.7","yes" "sec","vios","2.2.2.0 :: 2.2.2.1 :: 2.2.2.2 :: 2.2.2.3 :: 2.2.2.4","VIOS ptrace Vulnerability","IV58948 / CVE-2014-0930","2.2.2.5","IV58948s4a.140423.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS71&path=/201405/SECURITY/20140505/datafile095150&label=VIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29","bos.mp64:6.1.8.0-6.1.8.17","20140502"," ","5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV58766 7100-01:IV58888 7100-02:IV58861 7100-03:IV58840","https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar","CVE-2014-0930:4.7","yes" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09","AIX ptrace Vulnerability","IV59045 / CVE-2014-0930","6100-07-10","IV59045s9a.140425.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29","bos.mp64:6.1.7.0-6.1.7.20","20140502","20140520","5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607","https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar","CVE-2014-0930:4.7","yes" "sec","vios","2.2.1.0 :: 2.2.1.1 :: 2.2.1.2 :: 2.2.1.3 :: 2.2.1.4 :: 2.2.1.5 :: 2.2.1.6 :: 2.2.1.7 :: 2.2.1.8","VIOS ptrace Vulnerability","IV59045 / CVE-2014-0930","2.2.1.9","IV59045s9a.140425.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS71&path=/201405/SECURITY/20140505/datafile095150&label=VIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29","bos.mp64:6.1.7.0-6.1.7.20","20140502"," ","5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV58766 7100-01:IV58888 7100-02:IV58861 7100-03:IV58840","https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar","CVE-2014-0930:4.7","yes" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02","JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN","IV59100","6100-09-03","IV59100s2a.140507.61TL09SP02.epkg.Z","https://www-304.ibm.com/support/docview.wss?uid=isg1IV59100","bos.mp64:6.1.9.0-6.1.9.2","20140509","20140602","7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235","https://aix.software.ibm.com/aix/ifixes/iv59100/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04","JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN","IV59225","6100-08-05","IV59225s4a.140507.61TL08SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV59225","bos.mp64:6.1.8.0-6.1.8.17","20140509","20140602","7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235","https://aix.software.ibm.com/aix/ifixes/iv59225"," ","no" "hiper","aix","6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09","JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN","IV59227","6100-07-10","IV59227s9a.140508.61TL07SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV59227","bos.mp64:6.1.7.17-6.1.7.20","20140509","20140602","7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235","https://aix.software.ibm.com/aix/ifixes/iv59227/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04","JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN","IV59229","7100-02-05","IV59229s2a.140507.71TL02SP02.epkg.Z / IV59229s2a.140507.71TL02SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV59229","bos.mp64:7.1.2.0-7.1.2.17","20140509"," ","7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235","https://aix.software.ibm.com/aix/ifixes/iv59229/"," ","no" "hiper","aix","7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09","JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN","IV59232","7100-01-10","IV59232s9a.140507.71TL01SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV59232","bos.mp64:7.1.1.17-7.1.1.1","20140509"," ","7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235","https://aix.software.ibm.com/aix/ifixes/iv59232/"," ","no" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04","LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR","IV59492","6100-09-05","IV59492s3b.150330.61TL09SP03.epkg.Z IV59492s4c.150323.61TL09SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV59492","devices.chrp.base.rte:6.1.9.0-6.1.9.45","20150317"," ","6100-08:IV71109 6100-09:IV59492 7100-02:IV71110 7100-03:IV67876","https://aix.software.ibm.com/aix/ifixes/iv59492/"," ","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02","AIX ptrace Vulnerability","IV59607 / CVE-2014-0930","7100-03-03","IV59607s2a.140422.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29","bos.mp64:7.1.3.0-7.1.3.2","20140502","20140520","5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607","https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar","CVE-2014-0930:4.7","yes" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02","AIX ptrace Vulnerability","IV59615 / CVE-2014-0930","6100-09-03","IV59615s2a.140422.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29","bos.mp64:6.1.9.0-6.1.9.2","20140502","20140520","5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607","https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar","CVE-2014-0930:4.7","yes" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2","VIOS ptrace Vulnerability","IV59615 / CVE-2014-0930","2.2.3.3","IV59615s2a.140422.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=VIOS71&path=/201405/SECURITY/20140505/datafile095150&label=VIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29","bos.mp64:6.1.9.0-6.1.9.2","20140502"," ","5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607","https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar","CVE-2014-0930:4.7","yes" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","AIX ptrace Vulnerability","IV59675 / CVE-2014-0930","interim fix only","IV59675s9.140425.epkg.Z","http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode=7&heading=AIX71&path=/201405/SECURITY/20140505/datafile095150&label=AIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29","bos.mp64:5.3.12.0-5.3.12.9","20140502","20140520","5300-12:IV59675 6100-07:IV59045 6100-08:IV58948 6100-09:IV59615 7100-01:IV58888 7100-02:IV58861 7100-03:IV59607","ftp://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar","CVE-2014-0930:4.7","yes" "hiper","aix","5300-12-07 :: 5300-12-08 :: 5300-12-09","JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN","IV60235","interim fix only","IV60235s9a.140508.53TL12SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV60235","bos.mp64:5.3.12.7-5.3.12.9","20140509","20140602","7100-01:IV59232 7100-02:IV59229 7100-03:IV57361 6100-09:IV59100 6100-08:IV59225 6100-07:IV59227 5300-12:IV60235","https://aix.software.ibm.com/aix/ifixes/iv60235/"," ","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02","Arbitary file overwrite symlink in libodm","IV60299 / CVE-2012-2179","6100-09-03","IV60299s2a.140515.epkg.Z","https://www.ibm.com/support/pages/node/5740875","bos.rte.odm:6.1.9.0","20120614","20140523","6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303","https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar","CVE-2012-2179:6.9","yes" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02","Arbitary file overwrite symlink in libodm","IV60303 / CVE-2012-2179","7100-03-03","IV60303s2a.140515.epkg.Z","https://www.ibm.com/support/pages/node/5740875","bos.rte.odm:7.1.3.0","20120614","20140523","6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303","https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar","CVE-2012-2179:6.9","yes" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04","Arbitary file overwrite symlink in libodm","IV60311 / CVE-2012-2179","6100-08-05","IV60311s4a.140515.epkg.Z","https://www.ibm.com/support/pages/node/5740875","bos.rte.odm:6.1.8.0","20120614","20140523","6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303","https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar","CVE-2012-2179:6.9","yes" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09","Arbitary file overwrite symlink in libodm","IV60312 / CVE-2012-2179","7100-01-10","IV60312s9a.140515.epkg.Z","https://www.ibm.com/support/pages/node/5740875","bos.rte.odm:7.1.1.0-7.1.1.16","20120614","20140523","6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303","https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar","CVE-2012-2179:6.9","yes" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09","Arbitary file overwrite symlink in libodm","IV60313 / CVE-2012-2179","6100-07-10","IV60313s9a.140515.epkg.Z","https://www.ibm.com/support/pages/node/5740875","bos.rte.odm:6.1.7.0-6.1.7.16","20120614","20140523","6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303","https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar","CVE-2012-2179:6.9","yes" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04","Arbitary file overwrite symlink in libodm","IV60314 / CVE-2012-2179","7100-02-05","IV60314s4a.140515.epkg.Z","https://www.ibm.com/support/pages/node/5740875","bos.rte.odm:7.1.2.0-7.1.2.15","20120614","20140523","6100-07:IV60313 6100-08:IV60311 6100-09:IV60299 7100-01:IV60312 7100-02:IV60314 7100-03:IV60303","https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar","CVE-2012-2179:6.9","yes" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03","VIOS USING NPIV CAN CRASH SYSTEM","IV61759","6100-09-04","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV61759","devices.pciex.df1060e214103404.com:<6.1.9.30","20150213"," ","6100-08:IV64465 6100-09:IV61759 7100-02:IV64283 7100-03:IV61764","http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo149944"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03","VIOS USING NPIV CAN CRASH SYSTEM","IV61764","7100-03-04","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV61764","devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.16","20150213"," ","6100-08:IV64465 6100-09:IV61759 7100-02:IV64283 7100-03:IV61764","http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo149944"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03","UNEXPECTED APPLICATION BEHAVIOR WHEN USING TM POWER8 MODE ONLY","IV62820","7100-03-04","IV62820s3a.140808.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV62820","bos.mp64:7.1.3.0-7.1.3.30","20140818"," ","7100-03:IV62820","https://aix.software.ibm.com/aix/ifixes/iv62820/"," ","no" "hiper","aix","7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05","VIOS USING NPIV CAN CRASH SYSTEM","IV64283","7100-02-06","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV64283","devices.pciex.df1060e214103404.com:7.1.2.15-7.1.2.19","20150213"," ","6100-08:IV64465 6100-09:IV61759 7100-02:IV64283 7100-03:IV61764","http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo149944"," ","no" "hiper","aix","6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05","VIOS USING NPIV CAN CRASH SYSTEM","IV64465","6100-08-06","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV64465","devices.pciex.df1060e214103404.com:6.1.8.15-6.1.8.19","20150213"," ","6100-08:IV64465 6100-09:IV61759 7100-02:IV64283 7100-03:IV61764","http://www-01.ibm.com/support/docview.wss?uid=isg1fixinfo149944"," ","no" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04","SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF","IV65814","6100-09-05","IV65814m3b.141230.61TL09SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV65814","bos.mp64:<6.1.9.100","20150215"," ","6100-08:IV66677 6100-09:IV65814 7100-02:IV69445 7100-03:IV66484","https://aix.software.ibm.com/aix/ifixes/iv65814/"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04","SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF","IV66484","7100-03-05","IV66484m04.141230.71TL03SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV66484","bos.mp64:7.1.3.0-7.1.3.30","20150215"," ","6100-08:IV66677 6100-09:IV65814 7100-02:IV69445 7100-03:IV66484","https://aix.software.ibm.com/aix/ifixes/iv66484/"," ","no" "hiper","aix","7100-03-04 :: 7100-03-03","REGISTER CORRUPTION WHEN USING TRANSACTIONAL MEMORY ON POWER8","IV66636","7100-03-05","IV66636m3a.141106.71TL03SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV66636","bos.mp64:7.1.3.16-7.1.3.30","20141111"," ","n/a","https://aix.software.ibm.com/aix/ifixes/iv66636/"," ","no" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF","IV66677","6100-08-07","IV66677m6k.150211.61TL08SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV66677","bos.mp64:6.1.8.0-6.1.8.19","20150215"," ","6100-08:IV66677 6100-09:IV65814 7100-02:IV69445 7100-03:IV66484","https://aix.software.ibm.com/aix/ifixes/iv66677/"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04","LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR","IV67876","7100-03-05","IV67876s3a.150330.71TL03SP03.epkg.Z IV67876s4b.150323.71TL03SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV67876","devices.chrp.base.rte:7.1.3.0-7.1.3.45","20150317"," ","6100-08:IV71109 6100-09:IV59492 7100-02:IV71110 7100-03:IV67876","https://aix.software.ibm.com/aix/ifixes/iv67876/"," ","no" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02","EEH EVENTS FOLLOWED BY INACCESSIBLE PCI / CFFH ADAPTER","IV68712","6100-09-05","IV68547m4a.150123.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV68712","devices.chrp.pci.rte:6.1.9.0-6.1.9.30","20150205"," ","7100-03:IV68730 6100-09:IV68712","https://aix.software.ibm.com/aix/ifixes/iv68712/"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04","EEH EVENTS FOLLOWED BY INACCESSIBLE PCI / CFFH ADAPTER","IV68730","7100-03-05","IV68678m4d.150204.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV68730","devices.chrp.pci.rte:7.1.3.0-7.1.3.30","20150205"," ","7100-03:IV68730 6100-09:IV68712","https://aix.software.ibm.com/aix/ifixes/iv68730/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF","IV69445","7100-02-07","IV69445m6k.150213.71TL02SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV69445","bos.mp64:7.1.2.0-7.1.2.19","20150215"," ","6100-08:IV66677 6100-09:IV65814 7100-02:IV69445 7100-03:IV66484","https://aix.software.ibm.com/aix/ifixes/iv69445/"," ","no" "hiper","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4","NEAR FULL SHARED STORAGE POOL CAN OVERWRITE FILESYSTEM METADATA.","IV70381","2.2.3.50","IV70381m4a.150527.61TL09SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV70381","pool.basic.rte:<6.1.9.45","20150603"," ","n/a","https://aix.software.ibm.com/aix/ifixes/iv70381/"," ","yes" "hiper","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06","LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR","IV71109","6100-08-07","IV71109s2a.150420.61TL08SP02.epkg.Z IV71109s6b.150323.61TL08SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV71109","devices.chrp.base.rte:6.1.8.0-6.1.8.21","20150317"," ","6100-08:IV71109 6100-09:IV59492 7100-02:IV71110 7100-03:IV67876","https://aix.software.ibm.com/aix/ifixes/iv71109/"," ","no" "hiper","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06","LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR","IV71110","7100-02-07","IV71110s4a.150420.71TL02SP04.epkg.Z IV71110s6a.150323.71TL02SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV71110","devices.chrp.base.rte:7.1.2.0-7.1.2.21","20150317"," ","6100-08:IV71109 6100-09:IV59492 7100-02:IV71110 7100-03:IV67876","https://aix.software.ibm.com/aix/ifixes/iv71110/"," ","no" "hiper","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4","NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK","IV71217","2.2.3.50","IV69760.fix.tar","http://www-01.ibm.com/support/docview.wss?uid=isg1IV69760","rsct.core.rmc:3.2.0.0-3.2.0.4","20150319","20150512","6100-09:IV71217 7100-03:IV71219","https://aix.software.ibm.com/aix/ifixes/iv69760/"," ","no" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04","NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK","IV71217","6100-09-05","IV69760.fix.tar","http://www-01.ibm.com/support/docview.wss?uid=isg1IV69760","rsct.core.rmc:3.2.0.0-3.2.0.4","20150319","20150512","6100-09:IV71217 7100-03:IV71219","https://aix.software.ibm.com/aix/ifixes/iv69760/"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04","NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK","IV71219","7100-03-05","IV69760.fix.tar","http://www-01.ibm.com/support/docview.wss?uid=isg1IV71219","rsct.core.rmc:3.2.0.0-3.2.0.4","20150319","20150512","6100-09:IV71217 7100-03:IV71219","https://aix.software.ibm.com/aix/ifixes/iv69760/"," ","no" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06"," Cluster node halt due to Group Services client errors","IV74438","7100-03-07","ctHA_M1r.160808.71TL03SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV74438","rsct.basic.rte:3.1.5.0-3.2.0.7 rsct.core.rmc:3.1.5.0-3.2.0.9","20160628"," ","7100-04:IV85983 7200-00:IV85983","https://aix.software.ibm.com/aix/ifixes/iv74438/"," ","yes" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07","Cluster node halt due to Group Services client errors","IV74438","6100-09-08","ctHA_M1r.160808.61TL09SP05.epkg.Z ctHA_M2r.160809.61TL09SP06.epkg.Z ctHA_M2r.160809.61TL09SP07.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV74438","rsct.basic.rte:3.1.5.0-3.2.0.7 rsct.core.rmc:3.1.5.0-3.2.0.9","20160628"," ","7100-04:IV85983 7200-00:IV85983","https://aix.software.ibm.com/aix/ifixes/iv74438/"," ","yes" "hiper","vios","2.2.3.51 :: 2.2.3.52","CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL","IV74711","2.2.3.60","IV74711s5a.150716.61TL09SP05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV74711","bos.rte.tty:6.1.9.0-6.1.9.45","20150720"," ","6100-09:IV74711 7100-03:IV75031","https://aix.software.ibm.com/aix/ifixes/iv74711/"," ","yes" "hiper","aix","6100-09-05","CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL","IV74711","6100-09-06","IV74711s5a.150716.61TL09SP05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV74711","bos.rte.tty:6.1.9.0-6.1.9.45","20150720"," ","6100-09:IV74711 7100-03:IV75031","https://aix.software.ibm.com/aix/ifixes/iv74711/"," ","yes" "hiper","aix","7100-03-05","CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL","IV75031","7100-03-06","IV75031s5a.150716.71TL03SP05.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV75031","bos.rte.tty:7.1.3.0-7.1.3.45","20150720"," ","6100-09:IV74711 7100-03:IV75031","https://aix.software.ibm.com/aix/ifixes/iv75031/"," ","yes" "hiper","aix","7100-04-00","POSSIBLE SYSTEM CRASH USING PROCFS TO READ 32BIT PROCESS MAP FIL","IV79262","7100-04-00","IV79262m1a.151211.71TL04SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV79262","bos.mp64:7.1.4.0","20151219"," ","7200-00:IV79441 7100-04:IV79262","https://aix.software.ibm.com/aix/ifixes/iv79262/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01","POSSIBLE SYSTEM CRASH USING PROCFS TO READ 32BIT PROCESS MAP FIL","IV79441","7200-00-02","IV79441m1a.151214.72TL00SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV79441","bos.mp64:7.2.0.0-7.2.0.1","20151204"," ","7200-00:IV79441 7100-04:IV79262","https://aix.software.ibm.com/aix/ifixes/iv79441/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01","AFTER LIVE UPDATE IFIX STATE MAY BE LEFT AS Q; REBOOT REQUIRED","IV79639","7200-00-02","IV79639s0a.151210.72TL00SP00.epkg.Z IV79639s0a.151210.72TL00SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV79639","bos.liveupdate.rte:7.2.0.0-7.2.0.1","20151210"," ","n/a","https://aix.software.ibm.com/aix/ifixes/iv79639/"," ","LU" "hiper","aix","7200-00-00 :: 7200-00-01","MIRRORVG/SYNCVG ON MIMIMAL AND MIGRATION INSTALL FAILS","IV79848","7200-00-02","IV79848s1a.151217.72TL00SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV79848","bos.rte.lvm:7.2.0.0-7.2.0.1","20151217"," ","n/a","https://aix.software.ibm.com/aix/ifixes/iv79848/"," ","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06","Vulnerabilities in NTP affect AIX","IV79942 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855","6100-09-07","IV79942s6a.160119.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc","bos.net.tcp.client:6.1.9.0-6.1.9.101 ntp.rte:6.1.6.0-6.1.6.4","20160121"," ","5300-12:IV79946 6100-09:IV79942 7100-03:IV79943 7100-04:IV79944 7200-00:IV79945","https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar","CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3","no" "sec","vios","2.2.4.0","Vulnerabilities in NTP affect VIOS","IV79942 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855","2.2.4.20","IV79942s6a.160119.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc","bos.net.tcp.client:6.1.9.0-6.1.9.101 ntp.rte:6.1.6.0-6.1.6.4","20160121"," ","See advisory","https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar","CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06","Vulnerabilities in NTP affect AIX","IV79943 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855","7100-03-07","IV79943s5b.160119.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc","bos.net.tcp.client:7.1.3.0-7.1.3.45 ntp.rte:7.1.0.0-7.1.0.4","20160121"," ","5300-12:IV79946 6100-09:IV79942 7100-03:IV79943 7100-04:IV79944 7200-00:IV79945","https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar","CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3","no" "sec","aix","7100-04-00 :: 7100-04-01","Vulnerabilities in NTP affect AIX","IV79944 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855","7100-04-02","IV79944s1a.160119.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc","bos.net.tcp.client:7.1.4.0 ntp.rte:7.1.0.0-7.1.0.4","20160121"," ","5300-12:IV79946 6100-09:IV79942 7100-03:IV79943 7100-04:IV79944 7200-00:IV79945","https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar","CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3","no" "sec","aix","7200-00-00 :: 7200-00-01","Vulnerabilities in NTP affect AIX","IV79944 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855","7200-00-02","IV79945s1a.160119.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc","bos.net.tcp.bind:7.2.0.0 ntp.rte:7.1.0.0-7.1.0.4","20160121"," ","5300-12:IV79946 6100-09:IV79942 7100-03:IV79943 7100-04:IV79944 7200-00:IV79945","https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar","CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerabilities in NTP affect AIX","IV79946 / CVE-2015-5219 / CVE-2015-7691 / CVE-2015-7692 / CVE-2015-7701 / CVE-2015-7702 / CVE-2015-7850 / CVE-2015-7853 / CVE-2015-7855","6100-09-07","IV79946s9a.160119.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20160121"," ","5300-12:IV79946 6100-09:IV79942 7100-03:IV79943 7100-04:IV79944 7200-00:IV79945","https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar","CVE-2015-5219:4.3 / CVE-2015-7691:5.3 / CVE-2015-7692:5.3 / CVE-2015-7701:5.3 / CVE-2015-7702:5.3 / CVE-2015-7850:5.3 / CVE-2015-7853:7.3 / CVE-2015-7855:5.3","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerability in BIND affects AIX","IV80187 / CVE-2015-8000","6100-09-07","IV80187m9a.160120.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20160224"," ","5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192","https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar","CVE-2015-8000:7.5","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06","Vulnerability in BIND affects AIX","IV80188 / CVE-2015-8000","6100-09-07","IV80188s6a.160119.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc","bos.net.tcp.client:6.1.9.0-6.1.9.101","20160224"," ","5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192","https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar","CVE-2015-8000:7.5","no" "sec","vios","2.2.4.0","Vulnerability in BIND affects VIOS","IV80188 / CVE-2015-8000","2.2.4.20","IV80188s6a.160119.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc","bos.net.tcp.client:6.1.9.0-6.1.9.101","20160224"," ","5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192","https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar","CVE-2015-8000:7.5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06","Vulnerability in BIND affects AIX","IV80189 / CVE-2015-8000","7100-03-07","IV80189m5a.160119.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc","bos.net.tcp.client:7.1.3.0-7.1.3.45","20160224"," ","5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192","https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar","CVE-2015-8000:7.5","no" "sec","aix","7100-04-00 :: 7100-04-01","Vulnerability in BIND affects AIX","IV80191 / CVE-2015-8000","7100-04-02","IV80191s1a.160113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc","bos.net.tcp.client:7.1.4.0","20160224"," ","5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192","https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar","CVE-2015-8000:7.5","no" "sec","aix","7200-00-00 :: 7200-00-01","Vulnerability in BIND affects AIX","IV80192 / CVE-2015-8000","7200-00-02","IV80192s1a.160113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc","bos.net.tcp.bind:7.2.0.0","20160224"," ","5300-12:IV80187 6100-09:IV80188 7100-03:IV80189 7100-04:IV80191 7200-00:IV80192","https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar","CVE-2015-8000:7.5","no" "hiper","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.51 :: 2.2.3.52","SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION","IV80334","2.2.3.60","IV80334s6a.61TL09SP06.160205.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV80334","bos.cifs_fs.rte:6.1.9.0-6.1.9.100","20160330"," ","7100-03:IV82410 7100-04:IV81060 7200-00:IV80957 6100-09:IV80334","https://aix.software.ibm.com/aix/ifixes/iv80334/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10","SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION","IV80334","2.2.4.20","IV80334s6a.61TL09SP06.160205.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV80334","bos.cifs_fs.rte:6.1.9.0-6.1.9.100","20160330"," ","7100-03:IV82410 7100-04:IV81060 7200-00:IV80957","https://aix.software.ibm.com/aix/ifixes/iv80334/"," ","yes" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06","SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION","IV80334","6100-09-07","IV80334s6a.61TL09SP06.160205.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV80334","bos.cifs_fs.rte:6.1.9.0-6.1.9.100","20160330"," ","7100-03:IV82410 7100-04:IV81060 7200-00:IV80957","https://aix.software.ibm.com/aix/ifixes/iv80334/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01","SYSTEM CRASH AFTER APPLICATION SETS SIGNAL MASK","IV80412","7200-00-02","IV80412s0b.160122.72TL00SP00.epkg.Z IV80412s0c.160125.72TL00SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV80412","bos.mp64:7.2.0.0-7.2.0.1","20160125"," ","n/a","https://aix.software.ibm.com/aix/ifixes/iv80412/"," ","LU" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06","Vulnerability in mustendd device driver impacts AIX","IV80569 / CVE-2016-0281","6100-09-07","IV80569s4a.160222.epkg.Z IV80569s5a.160222.epkg.Z IV80569s6a.160415.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc","devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.100","20160728"," ","5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357","https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar","CVE-2016-0281:3.7","yes" "sec","vios","2.2.4.0","Vulnerability in mustendd device driver impacts VIOS","IV80569 / CVE-2016-0281","2.2.4.20","IV80569s4a.160222.epkg.Z IV80569s5a.160222.epkg.Z IV80569s6a.160415.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc","devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.100","20160728"," ","5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357","https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar","CVE-2016-0281:3.7","yes" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06","Vulnerabilities in LibXML2 affect AIX","IV80586 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241","7100-03-07","IV80586s1a.160713.epkg.Z IV80586s1a.160121.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc","bos.rte.control:7.1.3.0-7.1.3.46","20160222","20160811","5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar","CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9","no" "sec","aix","7100-04-00 :: 7100-04-01","Vulnerabilities in LibXML2 affect AIX","IV80586 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241","7100-04-02","IV80586s1a.160713.epkg.Z IV80586s1a.160121.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc","bos.rte.control:7.1.4.0","20160222","20160722","5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar","CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06","Vulnerabilities in LibXML2 affect AIX","IV80588 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241","6100-09-07","IV80588s6a.160121.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc","bos.rte.control:6.1.9.0-6.1.9.100","20160222"," ","5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar","CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9","no" "sec","vios","2.2.4.0","Vulnerabilities in LibXML2 affect VIOS","IV80588 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241","2.2.4.20","IV80588s6a.160121.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc","bos.rte.control:6.1.9.0-6.1.9.100","20160222"," ","5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar","CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9","no" "sec","aix","7200-00-00 :: 7200-00-01","Vulnerabilities in LibXML2 affect AIX","IV80616 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241","7200-00-02","IV80616s1a.160722.epkg.Z IV80616s1a.160121.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc","bos.rte.control:7.2.0.0","20160222","20160722","5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar","CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerabilities in LibXML2 affect AIX","IV80617 / CVE-2015-7941 / CVE-2015-7942 / CVE-2015-8241","6100-09-07","IV80617s9a.160120.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc","bos.rte.control:5.3.12.0-5.3.12.9","20160222"," ","5300-12:IV80617 6100-09:IV80588 7100-03:IV80586 7100-04:IV80586 7200-00:IV80616","https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar","CVE-2015-7941:4.3 / CVE-2015-7942:4.3 / CVE-2015-8241: 5.9","no" "hiper","aix","7100-04-00 :: 7100-04-01","ROOTVG LOSS IS NOT DETECTED","IV80637","7100-04-02","IV80637s1a.160125.71TL04SP00.epkg.Z IV80637s1a.160125.71TL04SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV80637","bos.cluster.rte:7.1.4.0-7.1.4.1 ","20160226"," ","7200-00:IV80883","https://aix.software.ibm.com/aix/ifixes/iv80637/"," ","yes" "hiper","aix","7100-04-00 :: 7100-04-01","POWERHA FAILOVERS TIMES MAY BE LONG DUE TO DNS QUERY TIMEOUTS","IV80778","7100-04-02","IV80778s1a.160222.71TL04SP00.epkg.Z IV80778s1a.160222.71TL04SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV80778","bos.cluster.rte:7.1.4.0-7.1.4.1 ","20160226"," ","7200-00:IV80882","https://aix.software.ibm.com/aix/ifixes/iv80778/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01","POWERHA FAILOVERS TIMES MAY BE LONG DUE TO DNS QUERY TIMEOUTS","IV80882","7200-00-02","IV80882s1a.160222.72TL00SP00.epkg.Z IV80882s1a.160222.72TL00SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV80882","bos.cluster.rte:7.2.0.0-7.2.0.1 ","20160226"," ","7100-04:IV80778","https://aix.software.ibm.com/aix/ifixes/iv80882/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01","ROOTVG LOSS IS NOT DETECTED","IV80883","7200-00-02","IV80883s1a.160218.72TL00SP00.epkg.Z IV80883s1a.160218.72TL00SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV80883","bos.cluster.rte:7.2.0.0-7.2.0.1 ","20160226"," ","7100-04:IV80637","https://aix.software.ibm.com/aix/ifixes/iv80883/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01","SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION","IV80957","7200-00-02","IV80957s1a.72TL00SP00.160329.epkg.Z IV80957s1a.72TL00SP01.160329.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV80957","bos.cifs_fs.rte:7.2.0.0","20160330"," ","6100-09:IV80334 7100-03:IV82410 7100-04:IV81060","https://aix.software.ibm.com/aix/ifixes/iv80957/"," ","LU" "hiper","aix","7100-04-00 :: 7100-04-01","SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION","IV81060","7100-04-02","IV81060s1b.71TL04SP01.160202.epkg.Z IV81060s1b.71TL04SP01.160202.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV81060","bos.cifs_fs.rte:7.1.4.0","20160330"," ","6100-09:IV80334 7100-03:IV82410 7200-00:IV80957","https://aix.software.ibm.com/aix/ifixes/iv81060/"," ","yes" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerability in BIND affects AIX","IV81278 / CVE-2015-8704","6100-09-07","IV81278m9a.160315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20160422"," ","5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282","https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar","CVE-2015-8704:6.5","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06","Vulnerability in BIND affects AIX","IV81279 / CVE-2015-8704","6100-09-07","IV81279m4c.160331.epkg.Z IV81279m5a.160329.epkg.Z IV81279s6a.160308.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc","bos.net.tcp.client:6.1.9.0-6.1.9.101","20160422"," ","5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282","https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar","CVE-2015-8704:6.5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06","Vulnerability in BIND affects AIX","IV81280 / CVE-2015-8704","7100-03-07","IV81280m4b.160329.epkg.Z IV81280m5a.160330.epkg.Z IV81280m6a.160315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc","bos.net.tcp.client:7.1.3.0-7.1.3.46","20160422"," ","5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282","https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar","CVE-2015-8704:6.5","no" "sec","aix","7100-04-00 :: 7100-04-01","Vulnerability in BIND affects AIX","IV81281 / CVE-2015-8704","7100-04-02","IV81281m0b.160331.epkg.Z IV81281m1a.160315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc","bos.net.tcp.client:7.1.4.0","20160422"," ","5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282","https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar","CVE-2015-8704:6.5","no" "sec","aix","7200-00-00 :: 7200-00-01","Vulnerability in BIND affects AIX","IV81282 / CVE-2015-8704","7200-00-02","IV81282m0a.160401.epkg.Z IV81282m1a.160315.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc","bos.net.tcp.bind:7.2.0.0","20160422"," ","5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282","https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar","CVE-2015-8704:6.5","no" "sec","vios","2.2.4.0","Vulnerability in BIND affects VIOS","IV81282 / CVE-2015-8704","2.2.4.20","IV81279s6a.160308.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc","bos.net.tcp.client:6.1.9.0-6.1.9.101","20160422"," ","5300-12:IV81278 6100-09:IV81279 7100-03:IV81280 7100-04:IV81281 7200-00:IV81282","https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar","CVE-2015-8704:6.5","no" "hiper","aix","7100-04-00 :: 7100-04-01","Core dump in many commands when using NIS","IV81303","7100-04-02","IV81303s1a.160224.71TL04SP00.epkg.Z IV81303s1a.160224.71TL04SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV81303","bos.rte.libc:7.1.4.0","20160307"," ","6100-09:IV82196 7200-00:IV82224","https://aix.software.ibm.com/aix/ifixes/iv81303/"," ","yes" "sec","aix","7200-00-00 :: 7200-00-01","Vulnerability in mustendd device driver impacts AIX","IV81357 / CVE-2016-0281","7200-00-02","IV81357s0a.160511.epkg.Z IV81357s1a.160414.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc","devices.pciex.e4145616e4140518.rte:7.2.0.0","20160728"," ","5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357","https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar","CVE-2016-0281:3.7","yes" "sec","aix","7100-04-00 :: 7100-04-01","Vulnerability in mustendd device driver impacts AIX","IV81459 / CVE-2016-0281","7100-04-02","IV81459s1b.160512.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc","devices.pciex.e4145616e4140518.rte:7.1.4.0","20160728"," ","5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357","https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar","CVE-2016-0281:3.7","yes" "hiper","aix","7200-00-00 :: 7200-00-01","MULTIBOS MAY FAIL TO MOUNT OR REMOVE A STANDBY INSTANCE","IV81482","7200-00-02","IV81482s1a.160224.72TL00SP00.epkg.Z IV81482s1a.160224.72TL00SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV81482","bos.rte.bosinst:7.2.0.0","20160307"," ","6100-09:IV81503 7100-04:IV81493","https://aix.software.ibm.com/aix/ifixes/iv81482/"," ","yes" "hiper","aix","7100-04-00 :: 7100-04-01","multibos may fail to mount or remove a standby instance","IV81493","7100-04-02","IV81493s1a.160223.71TL04SP00.epkg.Z IV81493s1a.160223.71TL04SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV81493","bos.rte.bosinst:7.1.4.0","20160307"," ","6100-09:IV81503 7200-00:IV81482","https://aix.software.ibm.com/aix/ifixes/iv81493/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10","multibos may fail to mount or remove a standby instance","IV81503","2.2.4.20","IV81503s6a.160223.61TL09SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV81503","bos.rte.bosinst:6.1.9.100","20160307"," ","7100-04:IV81493 7200-00:IV81482","https://aix.software.ibm.com/aix/ifixes/iv81503/"," ","yes" "hiper","aix","6100-09-06","multibos may fail to mount or remove a standby instance","IV81503","6100-09-07","IV81503s6a.160223.61TL09SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV81503","bos.rte.bosinst:6.1.9.0-6.1.9.100","20160307"," ","7100-04:IV81493 7200-00:IV81482","https://aix.software.ibm.com/aix/ifixes/iv81503/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10","Core dump in many commands when using NIS","IV82196","2.2.4.20","IV82196s6a.160308.61TL09SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV82196","bos.rte.libc:6.1.9.100","20160307"," ","6100-09:IV82196 7100-04:IV81303 7200-00:IV82224","https://aix.software.ibm.com/aix/ifixes/iv82196/"," ","yes" "hiper","aix","6100-09-06","Core dump in many commands when using NIS","IV82196","6100-09-07","IV82196s6a.160308.61TL09SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV82196","bos.rte.libc:6.1.9.0-6.1.9.100","20160307"," ","7100-04:IV81303 7200-00:IV82224","https://aix.software.ibm.com/aix/ifixes/iv82196/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01","Core dump in many commands when using NIS","IV82224","7200-00-02","IV82224s1a.160308.72TL00SP00.epkg.Z IV82224s1a.160308.72TL00SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV82224","bos.rte.libc:7.2.0.0","20160307"," ","6100-09:IV82196 7100-04:IV81303","https://aix.software.ibm.com/aix/ifixes/iv82224/"," ","LU" "hiper","aix","7100-03-06 :: 7100-03-05 :: 7100-03-04 :: 7100-03-03 :: 7100-03-02 :: 7100-03-01 :: 7100-03-00","SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION","IV82410","7100-03-07","IV82410s6a.71TL03SP06.160324.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV82410","bos.cifs_fs.rte:7.1.3.0-7.1.3.46","20160330"," ","6100-09:IV80334 7100-04:IV81060 7200-00:IV80957","https://aix.software.ibm.com/aix/ifixes/iv82410/"," ","yes" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06","Vulnerability in mustendd device driver impacts AIX","IV82421 / CVE-2016-0281","7100-03-07","IV82421s4a.160505.epkg.Z IV82421s5a.160505.epkg.Z IV82421s6a.160415.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc","devices.pciex.e4145616e4140518.rte:7.1.3.0-7.1.3.46","20160728"," ","5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357","https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar","CVE-2016-0281:3.7","yes" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06","Cluster split-brain issues when rebooting a node","IV82494","7100-03-07","MIG4_7134.160620.71TL03SP04.epkg.Z MIG4_7135.160620.71TL03SP05.epkg.Z MIG_7136.160429.71TL03SP06.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV82494","rsct.basic.rte:7.1.3.0-7.1.3.47","20160625"," ","6100-09:IV82627 7100-04:IV82624 7200-00:IV82561","https://aix.software.ibm.com/aix/ifixes/iv82494/"," ","yes" "hiper","aix","7100-04-00 :: 7100-04-01","Cluster split-brain issues when rebooting a node","IV82624","7100-04-02","MIG3_7141.160607.71TL04SP01.epkg.Z MIG_7142.160607.71TL04SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV82624","rsct.basic.rte:7.1.4.0-7.1.4.1","20160625"," ","6100-09:IV82627 7100-03:IV82494 7200-00:IV82561","https://aix.software.ibm.com/aix/ifixes/iv82494/"," ","yes" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06","Cluster split-brain issues when rebooting a node","IV82627","6100-09-07","MIG4_6194.160620.61TL09SP04.epkg.Z MIG4_6195.160620.61TL09SP05.epkg.Z MIG_6196.160429.61TL09SP06.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IV82627","rsct.basic.rte:6.1.9.0-6.1.9.100","20160625"," ","7100-03:IV82494 7100-04:IV82624 7200-00:IV82561","https://aix.software.ibm.com/aix/ifixes/iv82627/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01","Cluster split-brain issues when rebooting a node","IV82651","7200-00-02","MIG3_7201.160607.72TL00SP01.epkg.Z MIG_7202.160607.72TL00SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV82651","rsct.basic.rte:7.2.0.0-7.2.0.1","20160625"," ","6100-09:IV82627 7100-03:IV82494 7100-04:IV82624","https://aix.software.ibm.com/aix/ifixes/iv82651/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20","Server using 10 GB PCIE adapters and large_send may crash","IV82694","2.2.4.30","IV82694s6a.160510.61TL09SP06.epkg.Z IV82694s7a.160531.61TL09SP07.epkg.Z","https://www.ibm.com/support/docview.wss?uid=isg1IV82694","bos.net.tcp.client:6.1.9.100-6.1.9.102","20160816"," "," ","https://aix.software.ibm.com/aix/ifixes/iv82694/"," ","yes" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07","Server using 10 GB PCIE adapters and large_send may crash","IV82694","6100-09-08","IV82694s6a.160510.61TL09SP06.epkg.Z IV82694s7a.160531.61TL09SP07.epkg.Z","https://www.ibm.com/support/docview.wss?uid=isg1IV82694","bos.net.tcp.client:6.1.9.100-6.1.9.102","20160816"," "," ","https://aix.software.ibm.com/aix/ifixes/iv82694/"," ","yes" "hiper","vios","2.2.3.0 :: 2.2.3.10 :: 2.2.3.20 :: 2.2.3.30 :: 2.2.3.40 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70","I/O HANG OR CRASH IN EFC_FREE_LOGIN _TBLE WITH SOME FC ADAPTERS","IV83143","2.2.3.80","IV83143s0a.161018.epkg.Z IV83143s2a.161014.epkg.Z IV83143s3a.160915.61TL09SP03.epkg.Z IV83143s4a.160921.61TL09SP04.epkg.Z IV83143s5a.160502.61TL09SP05.epkg.Z IV83143s5a.160502.VIOS.2.2.3.5x.epkg.Z IV83143s6a.160523.61TL09SP06.epkg.Z IV83143s6a.160523.VIOS.2.2.3.60.epkg.Z IV83143s6a.160523.VIOS.2.2.4.0.epkg.Z IV83143s6a.160523.VIOS.2.2.4.10.epkg.Z IV83143s7a.160705.61TL09SP07.epkg.Z IV83143s7a.1607","http://www-01.ibm.com/support/docview.wss?uid=isg1IV83143","devices.pci.df1000f7.com:6.1.9.0-6.1.9.101 ","20160917"," ","","https://aix.software.ibm.com/aix/ifixes/iv83143/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23","I/O HANG OR CRASH IN EFC_FREE_LOGIN _TBLE WITH SOME FC ADAPTERS","IV83143","2.2.4.30","IV83143s0a.161018.epkg.Z IV83143s2a.161014.epkg.Z IV83143s3a.160915.61TL09SP03.epkg.Z IV83143s4a.160921.61TL09SP04.epkg.Z IV83143s5a.160502.61TL09SP05.epkg.Z IV83143s5a.160502.VIOS.2.2.3.5x.epkg.Z IV83143s6a.160523.61TL09SP06.epkg.Z IV83143s6a.160523.VIOS.2.2.3.60.epkg.Z IV83143s6a.160523.VIOS.2.2.4.0.epkg.Z IV83143s6a.160523.VIOS.2.2.4.10.epkg.Z IV83143s7a.160705.61TL09SP07.epkg.Z IV83143s7a.1607","http://www-01.ibm.com/support/docview.wss?uid=isg1IV83143","devices.pci.df1000f7.com:6.1.9.100-6.1.9.101 ","20160917"," ","","https://aix.software.ibm.com/aix/ifixes/iv83143/"," ","yes" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07","Vulnerabilities in NTP affect AIX","IV83984 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140","6100-09-08","IV83984m4a.160506.epkg.Z IV83984m5a.160510.epkg.Z IV83984m6a.160504.epkg.Z IV83984s7a.160622.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc","bos.net.tcp.client:6.1.9.0-6.1.9.102","20160608","20160622","5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995","https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar","CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3","no" "sec","vios","2.2.4.0 :: 2.2.4.20","Vulnerabilities in NTP affect VIOS","IV83984 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140","2.2.4.30","IV83984m6a.160504.epkg.Z IV83984s7a.160622.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc","bos.net.tcp.client:6.1.9.0-6.1.9.102","20160608","20160622","5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995","https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar","CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07","Vulnerabilities in NTP affect AIX","IV83993 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140","7100-03-08","IV83993m4b.160510.epkg.Z IV83993m5a.160510.epkg.Z IV83993m6a.160505.epkg.Z IV83993s7a.160714.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc","bos.net.tcp.client:7.1.3.0-7.1.3.47","20160608","20160719","5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995","https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar","CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02","Vulnerabilities in NTP affect AIX","IV83994 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140","7100-04-03","IV83994m1a.160505.epkg.Z IV83994m1a.160505.epkg.Z IV83994s2a.160620.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc","bos.net.tcp.client:7.1.4.0-7.1.4.1","20160608","20160620","5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995","https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar","CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","Vulnerabilities in NTP affect AIX","IV83995 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140","7200-00-03","IV83995m0a.160510.epkg.Z IV83995m1a.160601.epkg.Z IV83995s2b.160713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc","bos.net.tcp.ntp:7.2.0.0-7.2.0.2 bos.net.tcp.ntpd:7.2.0.0-7.2.0.2","20160608","20160816","5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995","https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar","CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerability in mustendd device driver impacts AIX","IV84184 / CVE-2016-0281","6100-09-07","IV81357s0a.160511.epkg.Z IV81357s1a.160414.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc","devices.pciex.e4145616e4140518.rte:5.3.12.0-5.3.12.3","20160728"," ","5300-12:IV84184 6100-09:IV80569 7100-03:IV82421 7100-04:IV81459 7200-00:IV81357","https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar","CVE-2016-0281:3.7","yes" "hiper","vios","2.2.3.0 :: 2.2.3.10 :: 2.2.3.20 :: 2.2.3.30 :: 2.2.3.40 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70","LU READS MAY DETECT BAD DATA WHILE LU MOVE IN PROGRESS","IV84212","2.2.3.80","IV84212s6a.160509.61TL09SP06.epkg.Z IV84212s6a.160509.VIOS2.2.4.10.epkg.Z IV84212s7a.160509.61TL09SP07.epkg.Z IV84212s7a.160509.VIOS2.2.4.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV84212","pool.basic.rte:6.1.9.0-6.1.9.46 ","20160527"," ","","https://aix.software.ibm.com/aix/ifixes/iv84212/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20","LU READS MAY DETECT BAD DATA WHILE LU MOVE IN PROGRESS","IV84212","2.2.4.30","IV84212s6a.160509.61TL09SP06.epkg.Z IV84212s6a.160509.VIOS2.2.4.10.epkg.Z IV84212s7a.160509.61TL09SP07.epkg.Z IV84212s7a.160509.VIOS2.2.4.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV84212","pool.basic.rte:6.1.9.100-6.1.9.101 ","20160527"," ","","https://aix.software.ibm.com/aix/ifixes/iv84212/"," ","yes" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerabilities in NTP affect AIX","IV84269 / CVE-2015-7972 / CVE-2015-7977 / CVE-2015-7979 / CVE-2015-8158 / CVE-2015-8139 / CVE-2015-8140","6100-09-08","IV84269m9a.160522.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20160608","20160609","5300-12:IV84269 6100-09:IV83984 7100-03:IV83993 7100-04:IV83994 7200-00:IV83995","https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar","CVE-2015-7973:5.4 / CVE-2015-7977:5.3 / CVE-2015-7979:6.5 / CVE-2015-8158:5.3 / CVE-2015-8139:5.3 / CVE-2015-8140:5.3","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02","Vulnerability in BIND affects AIX","IV84947 / CVE-2016-1285 / CVE-2016-1286","7100-04-03","IV84458s1a.160519.epkg.Z IV84947m1a.160531.epkg.Z IV84458s2a.160608.epkg.Z IV85296s2a.160616.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc","bos.net.tcp.client:7.1.4.0-7.1.4.1 bos.net.tcp.server:7.1.4.0-7.1.4.1","20160616"," ","5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297","https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar","CVE-2016-1285:7.5 / CVE-2016-1286:7.5","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07","Vulnerabilities in BIND affects AIX","IV84984 / CVE-2016-1285 / CVE-2016-1286","6100-09-08","IV84456s5b.160607.epkg.Z IV84984m5b.160708.epkg.Z IV84456s6a.160517.epkg.Z IV84984m6a.160530.epkg.Z IV84456s7a.160608.epkg.Z IV84984s7a.160616.epkg.Z DEPRECATED::IV84984m5a.160616.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc","bos.net.tcp.client:6.1.9.0-6.1.9.102 bos.net.tcp.server:6.1.9.0-6.1.9.101","20160616","20160708","5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297","https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar","CVE-2016-1285:7.5 / CVE-2016-1286:7.5","no" "sec","vios","2.2.4.0","Vulnerabilities in BIND affects VIOS","IV84984 / CVE-2016-1285 / CVE-2016-1286","2.2.4.30","IV84456s5b.160607.epkg.Z IV84984m5a.160616.epkg.Z IV84456s6a.160517.epkg.Z IV84984m6a.160530.epkg.Z IV84456s7a.160608.epkg.Z IV84984s7a.160616.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc","bos.net.tcp.client:6.1.9.0-6.1.9.102 bos.net.tcp.server:6.1.9.0-6.1.9.101","20160616"," ","5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297","https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar","CVE-2016-1285:7.5 / CVE-2016-1286:7.5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07","Vulnerabilities in BIND affects AIX","IV85296 / CVE-2016-1285 / CVE-2016-1286","7100-03-08","IV84457s6a.160517.epkg.Z IV85296m6a.160601.epkg.Z IV84457s5a.160613.epkg.Z IV85296m5a.160617.epkg.Z IV84457s7a.160726.epkg.Z IV85296s7a.160809.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc","bos.net.tcp.client:7.1.3.0-7.1.3.47 bos.net.tcp.server:7.1.3.0-7.1.3.47","20160616","20160817","5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297","https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar","CVE-2016-1285:7.5 / CVE-2016-1286:7.5","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","Vulnerabilities in BIND affects AIX","IV85297 / CVE-2016-1285 / CVE-2016-1286","7200-00-03","IV84459s1a.160519.epkg.Z IV85297m1a.160601.epkg.Z IV84459s2a.160613.epkg.Z IV85297s2a.160614.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc","bos.net.tcp.bind:7.2.0.0 bos.net.tcp.bind_utils:7.2.0.0-7.2.0.1","20160616"," ","5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297","https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar","CVE-2016-1285:7.5 / CVE-2016-1286:7.5","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerabilities in BIND affects AIX","IV85298 / CVE-2016-1285 / CVE-2016-1286","6100-09-08","IV85298m9a.160602.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10 bos.net.tcp.server:5.3.12.0-5.3.12.6","20160616"," ","5300-12:IV85298 6100-09:IV84984 7100-03:IV85296 7100-04:IV84947 7200-00:IV85297","https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar","CVE-2016-1285:7.5 / CVE-2016-1286:7.5","no" "hiper","vios","2.2.3.50 :: 2.2.3.60 :: 2.2.3.70","Malformed network packets can cause system crash","IV85460","2.2.3.80","IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z / IV85460s7a.160823.VIOS2.2.3.70.devices.ethernet.mlx.rte.epkg.Z / IV85460s7a.160823.VIOS2.2.4.23.devices.ethernet.mlx.rte.epkg.Z / IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z / IV85460s7c.161214.VIOS2.2.3.70.devices.ethernet.shi.rte.epkg.Z / IV85460s7c.161214.VIOS2.2.4.23.devices.ethernet.shi.rte.epkg.Z / IV854","http://www-01.ibm.com/support/docview.wss?uid=isg1IV85460","devices.ethernet.shi.rte:6.1.9.101-6.1.9.103 devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102 devices.ethernet.lnc2.rte:6.1.9.45-6.1.9.103","20160606","20170106","7100-03:IV88430 7100-04:IV86787 7200-00:IV88136","https://aix.software.ibm.com/aix/ifixes/iv85460/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23","Malformed network packets can cause system crash","IV85460","2.2.4.24","IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z / IV85460s7a.160823.VIOS2.2.3.70.devices.ethernet.mlx.rte.epkg.Z / IV85460s7a.160823.VIOS2.2.4.23.devices.ethernet.mlx.rte.epkg.Z / IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z / IV85460s7c.161214.VIOS2.2.3.70.devices.ethernet.shi.rte.epkg.Z / IV85460s7c.161214.VIOS2.2.4.23.devices.ethernet.shi.rte.epkg.Z / IV854","http://www-01.ibm.com/support/docview.wss?uid=isg1IV85460","devices.ethernet.shi.rte:6.1.9.101-6.1.9.103 devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102 devices.ethernet.lnc2.rte:6.1.9.101-6.1.9.103","20160606","20170106","7100-03:IV88430 7100-04:IV86787 7200-00:IV88136","https://aix.software.ibm.com/aix/ifixes/iv85460/"," ","yes" "hiper","aix","6100-09-05 :: 6100-09-06 :: 6100-09-07","Malformed network packets can cause system crash","IV85460","6100-09-08","IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z / IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z / IV85460s7d.161215.AIX61TL09SP07.devices.ethernet.lnc2.rte.epkg.Z ","http://www-01.ibm.com/support/docview.wss?uid=isg1IV85460","devices.ethernet.shi.rte:6.1.9.101-6.1.9.103 devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102 devices.ethernet.lnc2.rte:6.1.9.45-6.1.9.103","20160606","20170106","7100-03:IV88430 7100-04:IV86787 7200-00:IV88136","https://aix.software.ibm.com/aix/ifixes/iv85460/"," ","yes" "hiper","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02","Cluster node halt due to Group Services client errors","IV85983","7100-04-03"," ctHA_O1r.160808.71TL04SP01.epkg.Z ctHA_O2r.160810.71TL04SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV85983","rsct.basic.rte:3.2.1.0-3.2.1.10 rsct.core.rmc:3.2.1.0-3.2.1.10","20160628"," ","7100-03:IV74438","https://aix.software.ibm.com/aix/ifixes/iv85893/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","Cluster node halt due to Group Services client errors","IV85983","7200-00-03","ctHA_O1r.160808.72TL00SP01.epkg.Z ctHA_O2r.160810.72TL00SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV85983","rsct.basic.rte:3.2.1.0-3.2.1.10 rsct.core.rmc:3.2.1.0-3.2.1.10","20160628"," ","6100-09:IV74438 7100-03:IV74438","https://aix.software.ibm.com/aix/ifixes/iv85893/"," ","yes" "sec","vios","2.2.4.0 :: 2.2.4.20","Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on VIOS","IV86116 / CVE-2015-7575 / CVE-2016-0266","2.2.4.30","IV86116m7a.160701.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc","bos.net.tcp.client:6.1.9.0-6.1.9.102 bos.net.tcp.server:6.1.9.0-6.1.9.101","20160726"," ","5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar","CVE-2015-7575:7.1 / CVE-2016-0266:3.7","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07","Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX","IV86116 / CVE-2015-7575 / CVE-2016-0266","6100-09-08","IV86116s6a.160812.epkg.Z IV78625m5a.160901.epkg.Z IV79072s6a.160902.epkg.Z IV79072s5a.160830.epkg.Z IV79070m6a.160902.epkg.Z IV79070m5a.160901.epkg.Z IV78624m5a.160830.epkg.Z IV79071m6a.161017.epkg.Z IV79071m5a.160901.epkg.Z IV86116m7a.160701.epkg.Z DEPRECATED::IV86116m5b.160701.epkg.Z DEPRECATED::IV86116m6a.160701.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc","bos.net.tcp.client:6.1.9.0-6.1.9.102 bos.net.tcp.server:6.1.9.0-6.1.9.101","20160726","20161020","5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar","CVE-2015-7575:7.1 / CVE-2016-0266:3.7","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07","Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX","IV86117 / CVE-2015-7575 / CVE-2016-0266","7100-03-08","IV82328m6a.160901.epkg.Z IV82328m5a.160830.epkg.Z IV82412s6a.160901.epkg.Z IV82412s5a.160829.epkg.Z IV82330m6a.160831.epkg.Z IV82330m5a.160831.epkg.Z IV82327s6a.160901.epkg.Z IV82327m5a.160830.epkg.Z IV82331m6a.160901.epkg.Z IV82331m5a.160830.epkg.Z IV86117m7a.160725.epkg.Z DEPRECATED::IV86117m5a.160701.epkg.Z DEPRECATED::IV86117m6a.160701.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc","bos.net.tcp.client:7.1.3.0-7.1.3.47 bos.net.tcp.server:7.1.3.0-7.1.3.47","20160726","20161020","5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar","CVE-2015-7575:7.1 / CVE-2016-0266:3.7","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02","Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on AIX","IV86118 / CVE-2015-7575 / CVE-2016-0266","7100-04-03","IV86118m2a.160701.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc","bos.net.tcp.client:7.1.4.0-7.1.4.1 bos.net.tcp.server:7.1.4.0-7.1.4.1","20160726"," ","5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar","CVE-2015-7575:7.1 / CVE-2016-0266:3.7","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on AIX","IV86119 / IV86132 / CVE-2015-7575 / CVE-2016-0266","7200-00-03","IV86119s0a.160701.epkg.Z IV86132s0a.160701.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc","bos.net.tcp.imapd:7.2.0.0 bos.net.tcp.pop3d:7.2.0.0 bos.net.tcp.sendmail:7.2.0.0","20160726"," ","5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar","CVE-2015-7575:7.1 / CVE-2016-0266:3.7","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX","IV86120 / CVE-2015-7575 / CVE-2016-0266","6100-09-08","IV88960m9a.160913.epkg.Z IV88959m9a.160915.epkg.Z IV88957m9a.160910.epkg.Z DEPRECATED::IV86120m9a.160705.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10 bos.net.tcp.server:5.3.12.0-5.3.12.6","20160726","20161020","5300-12:IV86120 6100-09:IV86116 7100-03:IV86117 7100-04:IV86118 7200-00:IV86119 7200-00:IV86132","https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar","CVE-2015-7575:7.1 / CVE-2016-0266:3.7","no" "hiper","aix","7100-04-02","Performance regression when using Olson timezone format","IV86730","7100-04-03","IV86730m2a.160812.71TL04SP01.epkg.Z / IV86730m2a.160812.71TL04SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV86730","bos.rte.libc:7.1.4.1","20160901"," ","6100-09:IV86773 7100-03:IV87788 7100-04:IV86730 7200-00:IV87789","https://aix.software.ibm.com/aix/ifixes/iv86730/"," ","yes" "hiper","aix","6100-09-07","Performance regression when using Olson timezone format","IV86773","6100-09-08","IV86773s9a.160831.61TL09SP07.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV86773","bos.rte.libc:6.1.9.101","20160901"," ","6100-09:IV86773 7100-03:IV87788 7100-04:IV86730 7200-00:IV87789","https://aix.software.ibm.com/aix/ifixes/iv86773/"," ","yes" "hiper","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02","Malformed network packets can cause system crash","IV86787","7100-04-03","IV86787s2a.161222.AIX71TL04SP02.devices.ethernet.mlx.rte.epkg.Z / IV86787s2b.161222.AIX71TL04SP02.devices.ethernet.lnc2.rte.epkg.Z / IV86787s2c.161222.AIX71TL04SP02.devices.ethernet.shi.rte.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV86787","devices.ethernet.shi.rte:7.1.4.0-7.1.4.2 devices.ethernet.mlx.rte:7.1.4.0-7.1.4.2 devices.ethernet.lnc2.rte:7.1.4.0-7.1.4.2","20160711","20170106","6100-09:IV85460 7100-03:IV88430 7200-00:IV88136","https://aix.software.ibm.com/aix/ifixes/iv86787/"," ","yes" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07","Vulnerabilities in NTP affect AIX","IV87419 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519","6100-09-08","IV87419m5d.160823.epkg.Z IV87419m6a.160823.epkg.Z IV87419m7a.160901.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc","bos.net.tcp.client:6.1.9.0-6.1.9.102","20160906"," ","5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939","https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar","CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2","no" "sec","vios","2.2.4.0 :: 2.2.4.20","Vulnerabilities in NTP affect VIOS","IV87419 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519","2.2.4.30","IV87419m6a.160823.epkg.Z IV87419m7a.160901.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc","bos.net.tcp.client:6.1.9.0-6.1.9.102","20160906"," ","5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939","https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar","CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02","Vulnerabilities in NTP affect AIX","IV87420 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519","7100-04-03","IV87420m0a.160825.epkg.Z IV87420m2a.160901.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc","bos.net.tcp.client:7.1.4.0-7.1.4.1","20160906"," ","5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939","https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar","CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerabilities in NTP affect AIX","IV87614 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519","6100-09-08","IV87614m9a.160901.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20160906"," ","5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939","https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar","CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07","Vulnerabilities in NTP affect AIX","IV87615 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519","7100-03-08","IV87615m5a.160823.epkg.Z IV87615m6a.160824.epkg.Z IV87615m7a.160901.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc","bos.net.tcp.client:7.1.3.0-7.1.3.47","20160906"," ","5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939","https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar","CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02","Vulnerability in lquerylv in LVM impacts AIX","IV87640 / CVE-2016-6079","7100-04-03","IV87640s2a.160825.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc","bos.rte.lvm:7.1.4.0-7.1.4.1","20161031"," ","5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053","https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar","CVE-2016-6079:9.8","no" "hiper","aix","7100-03-07","Performance regression when using Olson timezone format","IV87788","7100-03-08","IV87788s1a.160831.71TL03SP07.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV87788","bos.rte.libc:7.1.3.47","20160901"," ","6100-09:IV86773 7100-03:IV87788 7100-04:IV86730 7200-00:IV87789","https://aix.software.ibm.com/aix/ifixes/iv87788/"," ","yes" "hiper","aix","7200-00-02","Performance regression when using Olson timezone format","IV87789","7200-00-03","IV87789s2a.160830.72TL00SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV87789","bos.rte.libc:7.2.0.1","20160901"," ","6100-09:IV86773 7100-03:IV87788 7100-04:IV86730 7200-00:IV87789","https://aix.software.ibm.com/aix/ifixes/iv87789/"," ","yes" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07","Vulnerability in lsmcode affects AIX","IV87794 / CVE-2016-3053","6100-09-08","IV87794s5a.160913.epkg.Z IV87794s6a.160912.epkg.Z IV87794s7b.160822.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc","bos.rte.shell:6.1.9.0-6.1.9.101 bos.rte.libc:6.1.9.0-6.1.9.101","20161017"," ","6100-09:IV87794 7100-03:IV88457 7100-04:IV88007 7200-00:IV88042","https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar","CVE-2016-3053:8.4","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23","Vulnerability in lsmcode affects VIOS","IV87794 / CVE-2016-3053","2.2.4.30","IV87794s6a.160912.epkg.Z IV87794s7b.160822.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc","bos.rte.shell:6.1.9.0-6.1.9.101 bos.rte.libc:6.1.9.0-6.1.9.101","20161017"," ","6100-09:IV87794 7100-03:IV88457 7100-04:IV88007 7200-00:IV88042","https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar","CVE-2016-3053:8.4","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","Vulnerabilities in NTP affect AIX","IV87939 / CVE-2015-7974 / CVE-2016-1550 / CVE-2016-1551 / CVE-2016-2517 / CVE-2016-2518 / CVE-2016-2519","7200-00-03","IV87939m0b.160830.epkg.Z IV87939m2a.160901.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc","bos.net.tcp.ntp:7.2.0.0-7.2.0.2 bos.net.tcp.ntpd:7.2.0.0-7.2.0.2","20160906"," ","5300-12:IV87614 6100-09:IV87419 7100-03:IV87615 7100-04:IV87420 7200-00:IV87939","https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar","CVE-2015-7974:5.3 / CVE-2016-1550:4.0 / CVE-2016-1551:3.7 / CVE-2016-2517:4.2 / CVE-2016-2518:2.0 / CVE-2016-2519:4.2","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07","Vulnerability in lquerylv in LVM impacts AIX","IV87981 / CVE-2016-6079","6100-09-08","IV87981s7a.160825.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc","bos.rte.lvm:6.1.9.0-6.1.9.101","20161031"," ","5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053","https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar","CVE-2016-6079:9.8","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23","Vulnerability in lquerylv in LVM impacts VIOS","IV87981 / CVE-2016-6079","2.2.4.30","IV87981s7a.160825.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc","bos.rte.lvm:6.1.9.0-6.1.9.101","20161031"," ","5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053","https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar","CVE-2016-6079:9.8","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02","Vulnerability in lsmcode affects AIX","IV88007 / CVE-2016-3053","7100-04-03","IV88007s2a.161110.epkg.Z IV88007s0a.160913.epkg.Z IV88007s2a.160819.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc","bos.rte.shell:7.1.4.0-7.1.4.1 bos.rte.libc:7.1.4.0-7.1.4.1","20161017","20161111","6100-09:IV87794 7100-03:IV88457 7100-04:IV88007 7200-00:IV88042","https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar","CVE-2016-3053:8.4","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","Vulnerability in lsmcode affects AIX","IV88042 / CVE-2016-3053","7200-00-03","IV88042s2a.161110.epkg.Z IV88042s0a.160914.epkg.Z IV88042s2a.160819.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc","bos.rte.shell:7.2.0.0-7.2.0.1 bos.rte.libc:7.2.0.0-7.2.0.1","20161017","20161111","6100-09:IV87794 7100-03:IV88457 7100-04:IV88007 7200-00:IV88042","https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar","CVE-2016-3053:8.4","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","Vulnerability in lquerylv in LVM impacts AIX","IV88053 / CVE-2016-6079","7200-00-03","IV88053s2a.160825.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc","bos.rte.lvm:7.2.0.0-7.2.0.1","20161031"," ","5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053","https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar","CVE-2016-6079:9.8","no" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","Malformed network packets can cause system crash","IV88136","7200-01-03","IV88136s2a.161215.AIX72TL00SP02.devices.ethernet.mlx.rte.epkg.Z / IV88136s2b.161215.AIX72TL00SP02.devices.ethernet.lnc2.rte.epkg.Z / IV88136s2c.161215.AIX72TL00SP02.devices.ethernet.shi.rte.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV88136","devices.ethernet.shi.rte:7.2.0.0-7.2.0.2 Devices.ethernet.mlx.rte:7.2.0.0-7.2.0.2 devices.ethernet.lnc2.rte:7.2.0.0-7.2.0.2","20160816","20170106","7100-03:IV88430 7100-04:IV86787 6100-09:IV85460","https://aix.software.ibm.com/aix/ifixes/iv88136/"," ","yes" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07","Vulnerability in lquerylv in LVM impacts AIX","IV88419 / CVE-2016-6079","7100-03-08","IV88419s7a.160825.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc","bos.rte.lvm:7.1.3.0-7.1.3.47","20161031"," ","5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053","https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar","CVE-2016-6079:9.8","no" "hiper","aix","7100-03-05 :: 7100-03-06 :: 7100-03-07","Malformed network packets can cause system crash ","IV88430","7100-04-08","IV88430s7a.170105.AIX71TL03SP07.devices.ethernet.lnc2.rte.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV88430","devices.ethernet.lnc2.rte:7.1.3.45-7.1.3.48","20170106"," ","6100-09:IV85460 7100-04:IV86787 7200-00:IV88136","https://aix.software.ibm.com/aix/ifixes/iv88430/"," ","yes" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07","Vulnerability in lsmcode affects AIX","IV88457 / CVE-2016-3053","7100-03-08","IV88457s5a.160912.epkg.Z IV88457s6a.160912.epkg.Z IV88457s7a.160822.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc","bos.rte.shell:7.1.3.0-7.1.3.47 bos.rte.libc:7.1.3.0-7.1.3.47","20161017"," ","6100-09:IV87794 7100-03:IV88457 7100-04:IV88007 7200-00:IV88042","https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar","CVE-2016-3053:8.4","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerability in lquerylv in LVM impacts AIX","IV88658 / CVE-2016-6079","6100-09-08","IV88658s9a.160825.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc","bos.rte.lvm:5.3.12.0-5.3.12.8","20161031"," ","5300-12:IV88658 6100-09:IV87981 7100-03:IV88419 7100-04:IV87640 7200-00:IV88053","https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar","CVE-2016-6079:9.8","no" "hiper","vios","2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23","POTENTIAL DATA LOSS IN VIOS SSP WITH AN UN-INITIALIZED THICK LU","IV89070","2.2.4.30","IV89070s7a.161005.VIOS.2.2.4.20.epkg.Z IV89070s7a.161005.VIOS.2.2.4.21.epkg.Z IV89070s7b.161005.VIOS.2.2.4.22.epkg.Z IV89070s7b.161005.VIOS.2.2.4.23.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV89070","pool.basic.rte:6.1.9.101-6.1.9.103 ","20161015"," ","","https://aix.software.ibm.com/aix/ifixes/iv89070/"," ","yes" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07","Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX","IV89385 / CVE-2016-6038","7100-03-08","IV89385s7a.160927.epkg.Z IV89385s7a.160927.epkg.Z IV89385s7a.160927.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory.asc","lwi.runtime:7.1.3.0-7.1.3.7","20160922","20160930","5300-12:IV89386 6100-09:IV89418 7100-03:IV89385","https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar","CVE-2016-6038:6.5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08","Vulnerability in pConsole impacts AIX","IV89737 / CVE-2016-0266","7100-04-03"," ","https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc","sysmgt.pconsole.rte:7.1.3.0-7.1.3.99","20161202"," ","6100-09:IV89739 7100-04:IV89737","https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar","CVE-2016-0266:3.7","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02","Vulnerability in pConsole impacts AIX","IV89737 / CVE-2016-0266","7100-04-03","IV89737s2a.161024.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc","sysmgt.pconsole.rte:7.1.4.0","20161202"," ","6100-09:IV89739 7100-04:IV89737","https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar","CVE-2016-0266:3.7","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02","pConsole on AIX does not support TLS 1.2.","IV89737 / CVE-2016-0266","7100-04-03","IV89737s2a.161024.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc","sysmgt.pconsole.rte:7.1.4.0-7.1.4.0","20161202"," ","6100-09:IV89739","https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar","CVE-2016-0266:3.7","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07","Vulnerability in pConsole impacts AIX","IV89739 / CVE-2016-0266","6100-09-08","IV89739s7a.161024.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc","sysmgt.pconsole.rte:6.1.9.0-6.1.9.100","20161202"," ","6100-09:IV89739 7100-04:IV89737","https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar","CVE-2016-0266:3.7","no" "sec","aix","6100-09-06 :: 6100-09-07","pConsole on AIX does not support TLS 1.2.","IV89739 / CVE-2016-0266","6100-09-08","IV89739s7a.161024.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc","sysmgt.pconsole.rte:6.1.9.0-6.1.9.100","20161202"," ","7100-04:IV89737","https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar","CVE-2016-0266:3.7","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08","Vulnerabilities in BIND impact AIX","IV89828 / CVE-2016-2776 / CVE-2016-2775","6100-09-09","IV89828m5a.161017.epkg.Z IV89828m6a.161013.epkg.Z IV89828m7a.161013.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc","bos.net.tcp.client:6.1.9.0-6.1.9.200 bos.net.tcp.server:6.1.9.0-6.1.9.200","20161118"," ","5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831","https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar","CVE-2016-2776:7.5 / CVE-2016-2775:7.5","no" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80 :: 2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23 :: 2.2.4.30 :: 2.2.5.0 :: 2.2.5.10","Vulnerabilities in BIND impact VIOS","IV89828 / CVE-2016-2776 / CVE-2016-2775","2.2.5.20","IV89828m7a.161013.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc","bos.net.tcp.client:6.1.9.0-6.1.9.200 bos.net.tcp.server:6.1.9.0-6.1.9.200","20161118"," ","5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831","https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar","CVE-2016-2776:7.5 / CVE-2016-2775:7.5","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03","Vulnerabilities in BIND impact AIX","IV89829 / CVE-2016-2776 / CVE-2016-2775","7100-04-04","IV89829m1a.161013.epkg.Z IV89829m2a.161010.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc","bos.net.tcp.client:7.1.4.0-7.1.4.30 bos.net.tcp.server:7.1.4.0-7.1.4.30","20161118"," ","5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831","https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar","CVE-2016-2776:7.5 / CVE-2016-2775:7.5","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08","Vulnerabilities in BIND impact AIX","IV89830 / CVE-2016-2776 / CVE-2016-2775","7100-03-09","IV89830m5a.161010.epkg.Z IV89830m6d.161012.epkg.Z IV89830m7a.161013.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc","bos.net.tcp.client:7.1.3.0-7.1.3.48 bos.net.tcp.server:7.1.3.0-7.1.3.48","20161118"," ","5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831","https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar","CVE-2016-2776:7.5 / CVE-2016-2775:7.5","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","Vulnerabilities in BIND impact AIX","IV89831 / CVE-2016-2776 / CVE-2016-2775","7200-00-03","IV89831m1a.161017.epkg.Z IV89831m2a.161018.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc","bos.net.tcp.bind:7.2.0.0 bos.net.tcp.bind_utils:7.2.0.0-7.2.0.1","20161118"," ","5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831","https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar","CVE-2016-2776:7.5 / CVE-2016-2775:7.5","no" "sec","aix","5300-12-00 :: 5300-12-01 :: 5300-12-02 :: 5300-12-03 :: 5300-12-04 :: 5300-12-05 :: 5300-12-06 :: 5300-12-07 :: 5300-12-08 :: 5300-12-09","Vulnerabilities in BIND impact AIX","IV90056 / CVE-2016-2776 / CVE-2016-2775","6100-09-09","IV90056m9a.161020.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10 bos.net.tcp.server:5.3.12.0-5.3.12.6","20161118"," ","5300-12:IV90056 6100-09:IV89828 7100-03:IV89830 7100-04:IV89829 7200-00:IV89831","https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar","CVE-2016-2776:7.5 / CVE-2016-2775:7.5","no" "sec","aix","7200-01-00","There is a vulnerability in sysproc that impacts AIX.","IV90234 / CVE-2016-8944","7200-01-02","IV90234s0a.161212.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc","bos.mp64:7.2.1.0-7.2.1.0","20170130"," ","7200-00:IV91456 7100-03:IV91488 7100-04:IV91487","https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar","CVE-2016-8944:6.2","no" "hiper","aix","7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04","POWERHA NODE FAILURE DURING AIX UPDATE","IV90451","7100-04-05","IV90451m1a.161110.71TL4SP1.epkg.Z IV90451s0a.161108.71TL4SP2-4.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV90451","rsct.basic.rte:3.2.1.1-3.2.1.11","20161111","20170411","7200-00:IV90451 7200-01:IV90485","https://aix.software.ibm.com/aix/ifixes/iv90451/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03","POWERHA NODE FAILURE DURING AIX UPDATE","IV90451","7200-00-04","IV90451m1a.161110.72TL0SP1.epkg.Z IV90451s0a.161108.72TL0SP2-3.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV90451","rsct.basic.rte:3.2.1.0-3.2.1.11","20161111"," ","7200-01:IV90485 7100-04:IV90451","https://aix.software.ibm.com/aix/ifixes/iv90451/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02","POWERHA NODE FAILURE DURING AIX UPDATE","IV90485","7200-01-03","IV90451m1a.161110.72TL0SP1.epkg.Z IV90451s0a.161108.72TL0SP2-4.epkg.Z IV90485s0a.161104.72TL1SP0-2.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV90485","rsct.basic.rte:3.2.2.0-3.2.2.0","20161111","20170411","7200-00:IV90451 7100-04:IV90451","https://aix.software.ibm.com/aix/ifixes/iv90485/"," ","yes" "hiper","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03","Potential data loss using Virtual FC with num_cmd_elems greater than 256","IV90915","7100-04-04","IV90915s1a.161214.71TL04SP00-01.epkg.Z IV90915s2a.161205.71TL04SP02.epkg.Z IV90915s3a.161219.71TL04SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV90915","devices.vdevice.IBM.vfc-client.rte:7.1.4.0-7.1.4.30","20170202"," ","6100-09:IV91199 7100-03:IV91042 7200-00:IV92284 7200-01:IV91511","https://aix.software.ibm.com/aix/ifixes/iv90915/"," ","yes" "hiper","aix","6100-09-08","CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK=YES","IV91004","6100-09-09","IV91004s8a.161125.AIX61TL09SP08.epkg.Z IV91004s8a.161125.61TL09SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91004","devices.vdevice.IBM.l-lan.rte:6.1.9.200","20161206"," ","7200-01:IV91020 7100-04:IV91019","https://aix.software.ibm.com/aix/ifixes/iv91004/"," ","yes" "sec","aix","6100-09-06 :: 6100-09-07 :: 6100-09-08","Vulnerability in bellmail affects AIX","IV91006 / CVE-2016-8972","6100-09-09","IV91006s8a.161125.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.200","20161215"," ","7100-03:IV91007 7100-04:IV91008 7200-00:IV91010 7200-01:IV91011","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar","CVE-2016-8972:8.4","yes" "sec","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2:: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80 :: 2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23 :: 2.2.4.30 :: 2.2.5.0 :: 2.2.5.10","Vulnerability in bellmail affects VIOS","IV91006 / CVE-2016-8972","2.2.5.20","IV91006s8a.161125.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.200","20161215"," ","7100-03:IV91007 7100-04:IV91008 7200-00:IV91010 7200-01:IV91011","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar","CVE-2016-8972:8.4","yes" "sec","aix","7100-03-05 :: 7100-03-06 :: 7100-03-07","Vulnerability in bellmail affects AIX","IV91007 / CVE-2016-8972","7100-03-08","IV91008s3a.161125.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc","bos.net.tcp.client:7.1.3.0-7.1.3.47","20161215"," ","6100-09:IV91006 7100-04:IV91008 7200-00:IV91010 7200-01:IV91011","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar","CVE-2016-8972:8.4","yes" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03","Vulnerability in bellmail affects AIX","IV91008 / CVE-2016-8972","7100-04-04","IV91008s3a.161125.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc","bos.net.tcp.client:7.1.4.0-7.1.4.30","20161215"," ","6100-09:IV91006 7100-03:IV91007 7200-00:IV91010 7200-01:IV91011","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar","CVE-2016-8972:8.4","yes" "sec","aix","7200-00-00 :: 7200-00-01","Vulnerability in bellmail affects AIX","IV91010 / CVE-2016-8972","7200-00-02","IV91010s2a.161125.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc","bos.net.tcp.client_core:7.2.0.0-7.2.0.1","20161215"," ","6100-09:IV91006 7100-03:IV91007 7100-04:IV91008 7200-00:IV91010 7200-01:IV91011","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar","CVE-2016-8972:8.4","yes" "sec","aix","7200-01-00 :: 7200-01-01","Vulnerability in bellmail affects AIX","IV91011 / CVE-2016-8972","7200-01-02","IV91011s1a.161125.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc","bos.net.tcp.client_core:7.2.1.0-7.2.1.0","20161215"," ","6100-09:IV91006 7100-03:IV91007 7100-04:IV91008 7200-00:IV91010","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar","CVE-2016-8972:8.4","yes" "hiper","aix","7100-04-03","CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK=YES","IV91019","7100-04-04","IV91019s3a.161125.71TL04SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91019","devices.vdevice.IBM.l-lan.rte:7.1.4.30","20161206"," ","7200-01:IV91020 7100-04:IV91019 6100-09:IV91004","https://aix.software.ibm.com/aix/ifixes/iv91019/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01","CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK=YES","IV91020","7200-01-02","IV91020s0a.161125.72TL01SP00.epkg.Z IV91020s0a.161125.72TL01SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91020","devices.vdevice.IBM.l-lan.rte:7.2.1.0","20161206"," ","6100-09:IV91004 7100-04:IV91019","https://aix.software.ibm.com/aix/ifixes/iv91020/"," ","yes" "hiper","aix","7100-03-07 :: 7100-03-08","Potential data loss using Virtual FC with num_cmd_elems greater than 256","IV91042","7100-03-09","IV91042s7a.170125.71TL03SP07.epkg.Z IV91042s8a.170201.71TL03SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91042","devices.vdevice.IBM.vfc-client.rte:7.1.3.46-7.1.3.47","20170202"," ","6100-09:IV91199 7100-04:IV90915 7200-00:IV92284 7200-01:IV91511","https://aix.software.ibm.com/aix/ifixes/iv91042/"," ","yes" "hiper","aix","6100-09-06 :: 6100-09-07 :: 6100-09-08","Potential data loss using Virtual FC with num_cmd_elems greater than 256","IV91199","6100-09-09","IV91199s8a.170120.61TL09SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91199","devices.vdevice.IBM.vfc-client.rte:6.1.9.100-6.1.9.200","20170202"," ","7100-03:IV91042 7100-04:IV90915 7200-00:IV92284 7200-01:IV91511","https://aix.software.ibm.com/aix/ifixes/iv91199/"," ","yes" "sec","aix","7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07","There are two vulnerabilities in BIND that impact AIX.","IV91214 / CVE-2016-8864 / CVE-2016-2848","7100-03-09","IV91214m4b.161209.epkg.Z IV91214m5b.161209.epkg.Z IV91214m6a.161209.epkg.Z IV91214m7b.170202.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client:7.1.3.0-7.1.3.48","20161215","20161229","7200-01:IV91257 5300-12:IV91253 7200-00:IV91256 7100-04:IV91255 6100-09:IV91254","https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","5300-12-09","There are two vulnerabilities in BIND that impact AIX.","IV91253 / CVE-2016-8864 / CVE-2016-2848","See Advisory","IV91253m9b.161209.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20161215","20161229","7200-01:IV91257 7200-00:IV91256 7100-03:IV91214 7100-04:IV91255 6100-09:IV91254","ftp://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","6100-09-06 :: 6100-09-07 :: 6100-09-08","There are two vulnerabilities in BIND that impact AIX.","IV91254 / CVE-2016-8864 / CVE-2016-2848","6100-09-09","IV91254m6b.161213.epkg.Z IV91254m7b.161209.epkg.Z IV91254m8b.161209.epkg.z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client:6.1.9.0-6.1.9.200","20161215","20161229","7200-01:IV91257 5300-12:IV91253 7200-00:IV91256 7100-03:IV91214 7100-04:IV91255","https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","7100-04-01 :: 7100-04-02 :: 7100-04-03","There are two vulnerabilities in BIND that impact AIX.","IV91255 / CVE-2016-8864 / CVE-2016-2848","7100-04-04","IV91255m1b.161213.epkg.Z IV91255m2a.161213.epkg.Z IV91255m3c.161213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client:7.1.4.0-7.1.4.30","20161215","20161229","7200-01:IV91257 5300-12:IV91253 7200-00:IV91256 7100-03:IV91214 6100-09:IV91254","https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","There are two vulnerabilities in BIND that impact AIX.","IV91256 / CVE-2016-8864 / CVE-2016-2848","7200-00-04","IV91256m1b.161212.epkg.Z IV91256m2b.161209.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client_core:7.2.0.0-7.2.0.2","20161215","20161229","7200-01:IV91257 5300-12:IV91253 7100-03:IV91214 7100-04:IV91255 6100-09:IV91254","https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "sec","aix","7200-01-00 :: 7200-01-01","There are two vulnerabilities in BIND that impact AIX.","IV91257 / CVE-2016-8864 / CVE-2016-2848","7200-01-02","IV91257m0a.161212.epkg.Z IV91257m1a.161213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc","bos.net.tcp.client_core:7.2.1.0-7.2.1.0","20161215","20161229","5300-12:IV91253 7200-00:IV91256 7100-03:IV91214 7100-04:IV91255 6100-09:IV91254","https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar","CVE-2016-8864:7.5 / CVE-2016-2848:7.5","no" "hiper","vios","2.2.3.0 :: 2.2.3.1 :: 2.2.3.2 :: 2.2.3.3 :: 2.2.3.4 :: 2.2.3.50 :: 2.2.3.51 :: 2.2.3.52 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80","possible data corruption after LPM failure","IV91339","2.2.3.90","IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z / IV91339s7b.170112.VIOS2.2.3.70.epkg.Z / IV91339s8b.170118.VIOS2.2.5.10.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91339","devices.vdevice.IBM.v-scsi-host.rte:6.1.9.0-6.1.9.48","20161207","20170119","n/a","https://aix.software.ibm.com/aix/ifixes/iv91339/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23 :: 2.2.4.30","possible data corruption after LPM failure","IV91339","2.2.4.40","IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z / IV91339s7b.170112.VIOS2.2.3.70.epkg.Z / IV91339s8b.170118.VIOS2.2.5.10.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91339","devices.vdevice.IBM.v-scsi-host.rte:6.1.9.100-6.1.9.102","20161207","20170119","n/a","https://aix.software.ibm.com/aix/ifixes/iv91339/"," ","yes" "hiper","vios","2.2.5.0 :: 2.2.5.10","possible data corruption after LPM failure ","IV91339","2.2.5.20","IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z / IV91339s7b.170112.VIOS2.2.3.70.epkg.Z / IV91339s8b.170118.VIOS2.2.5.10.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91339","devices.vdevice.IBM.v-scsi-host.rte:6.1.9.200","20161207","20170119","n/a","https://aix.software.ibm.com/aix/ifixes/iv91339/"," ","yes" "hiper","aix","7100-04-03","getsockname() returns incorrect NameLength","IV91431","7100-04-04","IV91431s3a.161209.71TL04SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91431","bos.mp64:7.1.4.30","20161209"," ","7200-00:IV91432","https://aix.software.ibm.com/aix/ifixes/iv91431/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01","getsockname() returns incorrect NameLength","IV91432","7200-01-02","IV91432s1a.161209.72TL01SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91432","bos.mp64:7.2.1.0-7.2.1.1","20161209"," ","7100-04:IV91431","https://aix.software.ibm.com/aix/ifixes/iv91432/"," ","yes" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","There is a vulnerability in sysproc that impacts AIX.","IV91456 / CVE-2016-8944","7200-00-04","IV91456s0a.161212.epkg.Z IV91456s1a.161212.epkg.Z IV91456s2a.161212.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc","bos.mp64:7.2.0.0-7.2.0.1","20170130"," ","7200-01:IV90234 7100-03:IV91488 7100-04:IV91487","https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar","CVE-2016-8944:6.2","no" "sec","aix","7100-04-01 :: 7100-04-02 :: 7100-04-03","There is a vulnerability in sysproc that impacts AIX.","IV91487 / CVE-2016-8944","7100-04-04","IV91487s1a.161212.epkg.Z IV91487s2a.161213.epkg.Z IV91487s3a.161213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc","bos.mp64:7.1.4.0-7.1.4.30","20170130"," ","7200-01:IV90234 7200-00:IV91456 7100-03:IV91488","https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar","CVE-2016-8944:6.2","no" "sec","aix","7100-03-05 :: 7100-03-06 :: 7100-03-07","There is a vulnerability in sysproc that impacts AIX.","IV91488 / CVE-2016-8944","7100-03-09","IV91488s5a.161212.epkg.Z IV91488s6a.161212.epkg.Z IV91488s7a.161213.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc","bos.mp64:7.1.3.0-7.1.3.48","20170130"," ","7200-01:IV90234 7200-00:IV91456 7100-04:IV91487","https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar","CVE-2016-8944:6.2","no" "hiper","aix","7200-01-00 :: 7200-01-01","Potential data loss using Virtual FC with num_cmd_elems greater than 256","IV91511","7200-01-02","IV91511s1a.161214.72TL01SP00-01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91511","devices.vdevice.IBM.vfc-client.rte:7.2.1.0-7.2.1.0","20170202"," ","6100-09:IV91199 7100-03:IV91042 7100-04:IV90915 7200-00:IV92284","https://aix.software.ibm.com/aix/ifixes/iv91511/"," ","yes" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-06 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV91803 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV91803m6a.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","bos.net.tcp.client:6.1.9.0-6.1.9.200","20170213","20170217","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","6100-09-06 :: 6100-09-07 :: 6100-09-08","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV91803 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV91803m6a.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","bos.net.tcp.client:6.1.9.0-6.1.9.200","20170213"," ","7200-00:IV92192 7100-04:IV91951","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "hiper","aix","7200-01-00 :: 7200-01-01","Possible data loss with CAPI adapter after EEH","IV91922","7200-01-02","IV91922s1a.170202.72TL01SP00-01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV91922","devices.capi.1410f0041410f004.com:7.2.1.0","20170210"," ","7200-00:IV92666","https://aix.software.ibm.com/aix/ifixes/iv91922/"," ","yes" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV91951 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7100-04-04","IV91951m3a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","bos.net.tcp.client:7.1.4.0-7.1.4.30","20170213","20170217","7200-00:IV92192 7100-03:IV92193 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7100-04-01 :: 7100-04-02 :: 7100-04-03","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV91951 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7100-04-04","IV91951m3a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","bos.net.tcp.client:7.1.4.0-7.1.4.30","20170213"," ","7200-00:IV92192 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7200-01-00 :: 7200-01-01","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92067 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7200-01-02","IV92067s1a.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","bos.net.tcp.ntpd:7.2.1.0-7.2.1.0","20170213","20170217","7100-04:IV91951 6100-09:IV91803 5300-12:IV92194","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7100-03-09","IV92126m3a.170106.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:7.1.0.0-7.1.0.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7100-00-00 :: 7100-00-01 :: 7100-00-02 :: 7100-00-03 :: 7100-00-04 :: 7100-00-05 :: 7100-00-06 :: 7100-00-07 :: 7100-00-08 :: 7100-00-09 :: 7100-00-10","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7100-04-04"," ","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:7.1.0.0-7.1.0.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","See Bulletin","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7100-01-00 :: 7100-01-01 :: 7100-01-02 :: 7100-01-03 :: 7100-01-04 :: 7100-01-05 :: 7100-01-06 :: 7100-01-07 :: 7100-01-08 :: 7100-01-09 :: 7100-01-10","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7100-04-04"," ","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:7.1.0.0-7.1.0.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","See Bulletin","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7100-02-00 :: 7100-02-01 :: 7100-02-02 :: 7100-02-03 :: 7100-02-04 :: 7100-02-05 :: 7100-02-06 :: 7100-02-07","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7100-04-04"," ","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:7.1.0.0-7.1.0.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","See Bulletin","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7100-04-04","IV92126m3a.170106.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:7.1.0.0-7.1.0.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7200-00-01 :: 7200-00-02","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7200-00-04","IV92126m3a.170106.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:7.1.0.0-7.1.0.7","20170213","20170217","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7200-01-00 :: 7200-01-01","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92126 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7200-01-02","IV92126m3a.170106.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:7.1.0.0-7.1.0.7","20170213","20170217","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92192 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7200-00-04","IV92192m2a.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","bos.net.tcp.ntp:7.2.0.0-7.2.0.2 bos.net.tcp.ntpd:7.2.0.0-7.2.0.2","20170213","20170217","7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92193 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","7100-03-09","IV92193m5a.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","bos.net.tcp.client:7.1.3.0-7.1.3.48","20170213","20170217","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","5300-12-09","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92194 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","See Bulletin","IV92194m9a.170113.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20170213","20170217","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","7100-04-01 :: 7100-04-02 :: 7100-04-03","There is a vulnerability in bellmail that impacts AIX.","IV92240 / CVE-2017-1093","7100-04-04","IV92240m3a.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc","bos.net.tcp.client:7.1.4.0-7.1.4.30","20170129"," ","7200-01:IV92242 7200-00:IV92241 7100-03:IV92250","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar","CVE-2017-1093:8.4","no" "sec","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02","There is a vulnerability in bellmail that impacts AIX.","IV92241 / CVE-2017-1093","7200-00-04","IV92241m2a.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc","bos.net.tcp.client_core:7.2.0.0-7.2.0.2","20170129"," ","7200-01:IV92242 7100-03:IV92250 7100-04:IV92240","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar","CVE-2017-1093:8.4","no" "sec","aix","7200-01-00 :: 7200-01-01","There is a vulnerability in bellmail that impacts AIX.","IV92242 / CVE-2017-1093","7200-01-02","IV92242m1a.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc","bos.net.tcp.client_core:7.2.1.0","20170129"," ","7200-00:IV92241 7100-03:IV92250 7100-04:IV92240","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar","CVE-2017-1093:8.4","no" "sec","aix","7100-03-05 :: 7100-03-06 :: 7100-03-07","There is a vulnerability in bellmail that impacts AIX.","IV92250 / CVE-2017-1093","7100-03-09","IV92250m71.170112.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc","bos.net.tcp.client:7.1.3.0-7.1.3.48","20170129"," ","7200-01:IV92242 7200-00:IV92241 7100-04:IV92240","https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar","CVE-2017-1093:8.4","no" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03","Potential data loss using Virtual FC with num_cmd_elems greater than 256","IV92284","7200-00-04","IV92284s2a.170116.72TL00SP00-02.epkg.Z IV92284s3a.170116.72TL00SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV92284","devices.vdevice.IBM.vfc-client.rte:7.2.0.0-7.2.0.1","20170202"," ","6100-09:IV91199 7100-03:IV91042 7100-04:IV90915 7200-01:IV91511","https://aix.software.ibm.com/aix/ifixes/iv92284/"," ","yes" "sec","aix","6100-00-00 :: 6100-00-01 :: 6100-00-02 :: 6100-00-03 :: 6100-00-04 :: 6100-00-05 :: 6100-00-06 :: 6100-00-07 :: 6100-00-08 :: 6100-00-09 :: 6100-00-10 :: 6100-00-11","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV92287m5a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:6.1.6.0-6.1.6.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","6100-01-00 :: 6100-01-01 :: 6100-01-02 :: 6100-01-03 :: 6100-01-04 :: 6100-01-05 :: 6100-01-06 :: 6100-01-07 :: 6100-01-08 :: 6100-01-09","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV92287m5a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:6.1.6.0-6.1.6.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","6100-02-00 :: 6100-02-01 :: 6100-02-02 :: 6100-02-03 :: 6100-02-04 :: 6100-02-05 :: 6100-02-06 :: 6100-02-07 :: 6100-02-08 :: 6100-02-09 :: 6100-02-10","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV92287m5a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:6.1.6.0-6.1.6.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","6100-03-00 :: 6100-03-01 :: 6100-03-02 :: 6100-03-03 :: 6100-03-04 :: 6100-03-05 :: 6100-03-06 :: 6100-03-07 :: 6100-03-08 :: 6100-03-09 :: 6100-03-10","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV92287m5a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:6.1.6.0-6.1.6.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","6100-04-00 :: 6100-04-01 :: 6100-04-02 :: 6100-04-03 :: 6100-04-04 :: 6100-04-05 :: 6100-04-06 :: 6100-04-07 :: 6100-04-08 :: 6100-04-09 :: 6100-04-10 :: 6100-04-11","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV92287m5a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:6.1.6.0-6.1.6.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","6100-05-00 :: 6100-05-01 :: 6100-05-02 :: 6100-05-03 :: 6100-05-04 :: 6100-05-05 :: 6100-05-06 :: 6100-05-07 :: 6100-05-08 :: 6100-05-09","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV92287m5a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:6.1.6.0-6.1.6.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11 :: 6100-06-12","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV92287m5a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:6.1.6.0-6.1.6.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","6100-07-00 :: 6100-07-01 :: 6100-07-02 :: 6100-07-03 :: 6100-07-04 :: 6100-07-05 :: 6100-07-06 :: 6100-07-07 :: 6100-07-08 :: 6100-07-09 :: 6100-07-10","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV92287m5a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:6.1.6.0-6.1.6.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","6100-08-00 :: 6100-08-01 :: 6100-08-02 :: 6100-08-03 :: 6100-08-04 :: 6100-08-05 :: 6100-08-06 :: 6100-08-07","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV92287m5a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:6.1.6.0-6.1.6.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "sec","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV92287 / CVE-2016-7427 / CVE-2016-7428 / CVE-2016-9310 / CVE-2016-9311","6100-09-09","IV92287m5a.170113.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc","ntp.rte:6.1.6.0-6.1.6.7","20170213"," ","7200-00:IV92192 7100-04:IV91951 6100-09:IV91803","https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar","CVE-2016-7427:4 / CVE-2016-7428:4.3 / CVE-2016-9310:6.5 / CVE-2016-9311:4.4","no" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03","Possible data loss with CAPI adapter after EEH","IV92666","7200-00-04","IV92666s2a.170201.72TL00SP02.epkg.Z IV92666s3a.170202.72TL00SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV92666","devices.capi.1410f0041410f004.com:7.2.0.0-7.2.0.3","20170210"," ","7200-01:IV91922","https://aix.software.ibm.com/aix/ifixes/iv92666/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02","CRASH OR POTENTIAL DATA LOSS AFTER REMOVING LARGE JFS2 FILES ON AIX 7.2.1","IV93320","7200-01-03","IV93320s0c.170411.72TL01SP00.epkg.Z IV93320s1e.170411.72TL01SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV93320","bos.mp64:7.2.1.0-7.2.1.3","20170413"," ","","https://aix.software.ibm.com/aix/ifixes/iv93320/"," ","yes" "sec","aix","6100-09-06 :: 6100-09-07 :: 6100-09-08","There is a vulnerability in BIND that impacts AIX.","IV93361 / CVE-2016-9131","6100-09-09","IV93361m8a.170215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc","bos.net.tcp.client:6.1.9.0-6.1.9.200","20170307"," ","7200-01:IV93365 5300-12:IV93366 7200-00:IV93403 7100-03:IV93362 7100-04:IV93363","https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar","CVE-2016-9131:7.5","no" "sec","aix","7100-03-06 :: 7100-03-07 :: 7100-03-08","There is a vulnerability in BIND that impacts AIX.","IV93362 / CVE-2016-9131","7100-03-09","IV93362m8a.170215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc","bos.net.tcp.client:7.1.3.0-7.1.3.48","20170307"," ","7200-01:IV93365 5300-12:IV93366 7200-00:IV93403 7100-04:IV93363 6100-09:IV93361","https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar","CVE-2016-9131:7.5","no" "sec","aix","7100-04-01 :: 7100-04-02 :: 7100-04-03","There is a vulnerability in BIND that impacts AIX.","IV93363 / CVE-2016-9131","7100-04-04","IV93363m3a.170215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc","bos.net.tcp.client:7.1.4.0-7.1.4.30","20170307"," ","7200-01:IV93365 5300-12:IV93366 7200-00:IV93403 7100-03:IV93362 6100-09:IV93361","https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar","CVE-2016-9131:7.5","no" "sec","aix","7200-01-00 :: 7200-01-01","There is a vulnerability in BIND that impacts AIX.","IV93365 / CVE-2016-9131","7200-01-02","IV93365m1a.170215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc","bos.net.tcp.bind_utils:7.2.1.0-7.2.1.1","20170307"," ","5300-12:IV93366 7200-00:IV93403 7100-03:IV93362 7100-04:IV93363 6100-09:IV93361","https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar","CVE-2016-9131:7.5","no" "sec","aix","5300-12-09","There is a vulnerability in BIND that impacts AIX.","IV93366 / CVE-2016-9131","See Advisory","IV93366m9a.170215.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20170307"," ","7200-01:IV93365 7200-00:IV93403 7100-03:IV93362 7100-04:IV93363 6100-09:IV93361","ftp://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar","CVE-2016-9131:7.5","no" "sec","aix","7200-00-01 :: 7200-00-02 :: 7200-00-03","There is a vulnerability in BIND that impacts AIX.","IV93403 / CVE-2016-9131","7200-00-04","IV93403m3a.170215.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc","bos.net.tcp.client_core:7.2.0.0-7.2.0.3","20170307"," ","7200-01:IV93365 5300-12:IV93366 7100-03:IV93362 7100-04:IV93363 6100-09:IV93361","https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar","CVE-2016-9131:7.5","no" "hiper","aix","6100-09-08","PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST","IV93840","6100-09-09","IV93840s1a.170301.61TL09SP08epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV93840","bos.mp64:6.1.9.200-6.1.9.200","20170303","20170323","7100-03:IV93884 7100-04:IV93845 7200-00:IV93883 7200-01:IV93885","https://aix.software.ibm.com/aix/ifixes/iv93840/"," ","yes" "hiper","aix","7100-04-03","PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST","IV93845","7100-04-04","IV93845s3a.170302.71TL04SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV93845","bos.mp64:7.1.4.30-7.1.4.31","20170303","20170323","6100-09:IV93840 7100-03:IV93884 7200-00:IV93883 7200-01:IV93885","https://aix.software.ibm.com/aix/ifixes/iv93845/"," ","yes" "hiper","aix","7200-00-03","PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST","IV93883","7200-00-04","IV93883s3.170302.72TL00SP03.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV93883","bos.mp64:7.2.0.3-7.2.0.3","20170303","20170323","6100-09:IV93840 7100-03:IV93884 7100-04:IV93845 7200-01:IV93885","https://aix.software.ibm.com/aix/ifixes/iv93883/"," ","yes" "hiper","aix","7100-03-08","PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST","IV93884","7100-03-09","IV93884s8a.170302.71TL03SP08.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV93884","bos.mp64:7.1.3.49","20170303","20170323","6100-09:IV93840 7100-04:IV93845 7200-00:IV93883 7200-01:IV93885","https://aix.software.ibm.com/aix/ifixes/iv93884/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01","PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST","IV93885","7200-01-02","IV93885s1.170302.72TL01SP01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV93885","bos.mp64:7.2.1.0-7.2.1.2","20170303","20170323","6100-09:IV93840 7100-03:IV93884 7100-04:IV93845 7200-00:IV93883","https://aix.software.ibm.com/aix/ifixes/iv93885/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40","VIOS update and rulescfgset can save/deploy incorrect settings ","IV94438","2.2.4.50","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV94438","ios.artex_profile.rte:6.1.9.0-6.1.9.202","20170513"," ","","n/a"," ","yes" "hiper","vios","2.2.5.0 :: 2.2.5.10 :: 2.2.5.20","VIOS update and rulescfgset can save/deploy incorrect settings ","IV94438","2.2.5.30","n/a","http://www-01.ibm.com/support/docview.wss?uid=isg1IV94438","ios.artex_profile.rte:6.1.9.0-6.1.9.202","20170513"," ","","n/a"," ","yes" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","There are multiple vulnerabilities in tcpdump that impact AIX.","IV94723 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486","7200-01-04","IV94723s2a.170414.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc","bos.net.tcp.tcpdump:7.2.1.0-7.2.1.0","20170525"," ","5300-12:IV94729 7200-00:IV94724 7100-03:IV94727 7100-04:IV94726 6100-09:IV94728","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar","CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3","no" "sec","aix","7200-00-01 :: 7200-00-02 :: 7200-00-03","There are multiple vulnerabilities in tcpdump that impact AIX.","IV94724 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486","7200-00-04","IV94724s4b.170417.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc","bos.net.tcp.tcpdump:7.2.0.0-7.2.0.2","20170525"," ","7200-01:IV94723 5300-12:IV94729 7100-03:IV94727 7100-04:IV94726 6100-09:IV94728","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar","CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3","no" "sec","aix","7100-04-02 :: 7100-04-03 :: 7100-04-04","There are multiple vulnerabilities in tcpdump that impact AIX.","IV94726 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486","7100-04-05","IV94726s4c.170417.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc","bos.net.tcp.server:7.1.4.0-7.1.4.31","20170525"," ","7200-01:IV94723 5300-12:IV94729 7200-00:IV94724 7100-03:IV94727 6100-09:IV94728","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar","CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3","no" "sec","aix","7100-03-07 :: 7100-03-08 :: 7100-03-09","There are multiple vulnerabilities in tcpdump that impact AIX.","IV94727 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486","7100-03-10","IV94727s9b.170417.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc","bos.net.tcp.server:7.1.3.0-7.1.3.49","20170525"," ","7200-01:IV94723 5300-12:IV94729 7200-00:IV94724 7100-04:IV94726 6100-09:IV94728","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar","CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3","no" "sec","aix","6100-09-07 :: 6100-09-08 :: 6100-09-09","There are multiple vulnerabilities in tcpdump that impact AIX.","IV94728 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486","6100-09","IV94728s9c.170420.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc","bos.net.tcp.server:6.1.9.0-6.1.9.201","20170525"," ","7200-01:IV94723 5300-12:IV94729 7200-00:IV94724 7100-03:IV94727 7100-04:IV94726","https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar","CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3","no" "sec","aix","5300-12-09","There are multiple vulnerabilities in tcpdump that impact AIX.","IV94729 / CVE-2016-7922 / CVE-2016-7923 / CVE-2016-7924 / CVE-2016-7925 / CVE-2016-7926 / CVE-2016-7927 / CVE-2016-7928 / CVE-2016-7930 / CVE-2016-7931 / CVE-2016-7932 / CVE-2016-7933 / CVE-2016-7934 / CVE-2016-7935 / CVE-2016-7936 / CVE-2016-7937 / CVE-2016-7939 / CVE-2016-7940 / CVE-2016-7973 / CVE-2016-7974 / CVE-2016-7975 / CVE-2016-7983 / CVE-2016-7984 / CVE-2016-7992 / CVE-2016-7993 / CVE-2016-8574 / CVE-2016-8575 / CVE-2017-5202 / CVE-2017-5203 / CVE-2017-5204 / CVE-2017-5482 / CVE-2017-5483 / CVE-2017-5484 / CVE-2017-5485 / CVE-2017-5486","5300-12","IV94729s9b.170425.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc","bos.net.tcp.server:5.3.12.0-5.3.12.6","20170525"," ","7200-01:IV94723 7200-00:IV94724 7100-03:IV94727 7100-04:IV94726 6100-09:IV94728","ftp://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar","CVE-2016-7922:7.3 / CVE-2016-7923:7.3 / CVE-2016-7924:7.3 / CVE-2016-7925:7.3 / CVE-2016-7926:7.3 / CVE-2016-7927:7.3 / CVE-2016-7928:7.3 / CVE-2016-7930:7.3 / CVE-2016-7931:7.3 / CVE-2016-7932:7.3 / CVE-2016-7933:7.3 / CVE-2016-7934:7.3 / CVE-2016-7935:7.3 / CVE-2016-7936:7.3 / CVE-2016-7937:7.3 / CVE-2016-7939:7.3 / CVE-2016-7940:7.3 / CVE-2016-7973:7.3 / CVE-2016-7974:7.3 / CVE-2016-7975:7.3 / CVE-2016-7983:7.3 / CVE-2016-7984:7.3 / CVE-2016-7992:7.3 / CVE-2016-7993:7.3 / CVE-2016-8574:7.3 / CVE-2016-8575:7.3 / CVE-2017-5202:7.3 / CVE-2017-5203:7.3 / CVE-2017-5204:7.3 / CVE-2017-5482:7.3 / CVE-2017-5483:7.3 / CVE-2017-5484:7.3 / CVE-2017-5485:7.3 / CVE-2017-5486:7.3","no" "hiper","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04","SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES","IV95012","7100-04-05","IV95012s1a.170511.71TL04SP00.epkg.Z IV95012s3a.170414.71TL04SP03.epkg.Z IV95012s4a.170526.71TL04SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95012","bos.mp64:7.1.4.0-7.1.4.32","20170602"," ","6100-09:IV95102 7100-03:IV95111 7200-00:IV95858 7200-01:IV95590","https://aix.software.ibm.com/aix/ifixes/iv95012/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40","SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES","IV95102","2.2.4.50","IV95102s5a.61TL09SP05.170526.epkg.Z IV95102s5a.VIOS2.2.3.90.170526.epkg.Z IV95102s9a.61TL09SP09.170526.epkg.Z IV95102s9a.VIOS2.2.4.40.170526.epkg.Z IV95102s9a.VIOS2.2.5.20.170526.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95102","bos.mp64:6.1.9.100-6.1.9.201","20170602"," ","6100-09:IV95102 7100-03:IV95111 7100-04:IV95012 7200-00:IV95858 7200-01:IV95590","https://aix.software.ibm.com/aix/ifixes/iv95102/"," ","yes" "hiper","vios","2.2.5.0 :: 2.2.5.10 :: 2.2.5.20","SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES","IV95102","2.2.5.30","IV95102s5a.61TL09SP05.170526.epkg.Z IV95102s5a.VIOS2.2.3.90.170526.epkg.Z IV95102s9a.61TL09SP09.170526.epkg.Z IV95102s9a.VIOS2.2.4.40.170526.epkg.Z IV95102s9a.VIOS2.2.5.20.170526.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95102","bos.mp64:6.1.9.200-6.1.9.201","20170602"," ","6100-09:IV95102 7100-03:IV95111 7100-04:IV95012 7200-00:IV95858 7200-01:IV95590","https://aix.software.ibm.com/aix/ifixes/iv95102/"," ","yes" "hiper","aix","6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09","SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES","IV95102","6100-09-10","IV95102s5a.61TL09SP05.170526.epkg.Z IV95102s9a.61TL09SP09.170526.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95102","bos.mp64:6.1.9.15-6.1.9.201","20170602"," ","7100-03:IV95111 7100-04:IV95012 7200-00:IV95858 7200-01:IV95590","https://aix.software.ibm.com/aix/ifixes/iv95102/"," ","yes" "hiper","vios","2.2.3.3 :: 2.2.3.13 :: 2.2.3.23 :: 2.2.3.33 :: 2.2.3.43 :: 2.2.3.53 :: 2.2.3.63 :: 2.2.3.73 :: 2.2.3.83 :: 2.2.3.84 :: 2.2.3.85 :: 2.2.3.86 :: 2.2.3.87 :: 2.2.3.88 :: 2.2.3.89 :: 2.2.3.90","SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES","IV95102","n/a","IV95102s5a.61TL09SP05.170526.epkg.Z IV95102s5a.VIOS2.2.3.90.170526.epkg.Z IV95102s9a.61TL09SP09.170526.epkg.Z IV95102s9a.VIOS2.2.4.40.170526.epkg.Z IV95102s9a.VIOS2.2.5.20.170526.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95102","bos.mp64:6.1.9.15-6.1.9.201","20170602"," ","6100-09:IV95102 n/a:IV95111 7100-04:IV95012 7200-00:IV95858 7200-01:IV95590","https://aix.software.ibm.com/aix/ifixes/iv95102/"," ","yes" "hiper","aix","7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08 :: 7100-03-09","SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES","IV95111","n/a","IV95111s9a.170526.71TL03SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95111","bos.mp64:7.1.3.15-7.1.3.50","20170602"," ","6100-09:IV95102 7100-04:IV95012 7200-00:IV95858 7200-01:IV95590","https://aix.software.ibm.com/aix/ifixes/iv95111/"," ","yes" "hiper","vios","2.2.4.40","VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS","IV95372","2.2.4.50","IV95372s9a.170427.epkg.Z IV95372s9a.AIX61TL09SP09.170427.epkg.Z IV95372s9a.VIOS2.2.3.90.170427.epkg.Z IV95372s9a.VIOS2.2.4.40.170427.epkg.Z IV95372s9a.VIOS2.2.5.20.170427.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95372","devices.ethernet.lnc.rte:6.1.9.201","20170516"," ","7100-03:IV95638 7100-04:IV95637","https://aix.software.ibm.com/aix/ifixes/iv95372/"," ","yes" "hiper","vios","2.2.5.20","VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS","IV95372","2.2.5.30","IV95372s9a.170427.epkg.Z IV95372s9a.AIX61TL09SP09.170427.epkg.Z IV95372s9a.VIOS2.2.3.90.170427.epkg.Z IV95372s9a.VIOS2.2.4.40.170427.epkg.Z IV95372s9a.VIOS2.2.5.20.170427.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95372","devices.ethernet.lnc.rte:6.1.9.201","20170516"," ","7100-03:IV95638 7100-04:IV95637","https://aix.software.ibm.com/aix/ifixes/iv95372/"," ","yes" "hiper","aix","6100-09-09","VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS","IV95372","6100-09-10","IV95372s9a.AIX61TL09SP09.170427.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95372","devices.ethernet.lnc.rte:6.1.9.201-6.1.9.201","20170516"," ","7100-03:IV95638 7100-04:IV95637","https://aix.software.ibm.com/aix/ifixes/iv95372/"," ","yes" "hiper","vios","2.2.3.90","VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS","IV95372","n/a","IV95372s9a.170427.epkg.Z IV95372s9a.AIX61TL09SP09.170427.epkg.Z IV95372s9a.VIOS2.2.3.90.170427.epkg.Z IV95372s9a.VIOS2.2.4.40.170427.epkg.Z IV95372s9a.VIOS2.2.5.20.170427.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95372","devices.ethernet.lnc.rte:6.1.9.201","20170516"," ","7100-03:IV95638 7100-04:IV95637","https://aix.software.ibm.com/aix/ifixes/iv95372/"," ","yes" "hiper","aix","7100-04-04"," VLAN tagged largesend packets are dropped for some adapters ","IV95372","7100-04-05","IV95637s4a.170509.71TL04SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95637","devices.ethernet.lnc.rte:7.1.4.31","20170516"," ","6100-09:IV95372 7100-03:IV95638","https://aix.software.ibm.com/aix/ifixes/iv95637/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02","SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES","IV95590","7200-01-03","IV95590s2b.170525.72TL01SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95590","bos.mp64:7.2.1.0-7.2.1.3","20170602"," ","6100-09:IV95102 7100-03:IV95111 7100-04:IV95012 7200-00:IV95858","https://aix.software.ibm.com/aix/ifixes/iv95590/"," ","yes" "hiper","aix","7100-04-04","VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS","IV95637","7100-04-05","IV95637s4a.170509.71TL04SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95637","devices.ethernet.lnc.rte:7.1.4.31","20170516"," ","6100-09:IV95372 7100-03:IV95638","https://aix.software.ibm.com/aix/ifixes/iv95637/"," ","yes" "hiper","aix","7100-03-09","VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS","IV95638","7100-03-10","IV95638s9a.170510.71TL03SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95638","devices.ethernet.lnc.rte:7.1.3.49 devices.ethernet.mlx.rte:7.1.3.49","20170516"," ","6100-09:IV95372 7100-04:IV95637","https://aix.software.ibm.com/aix/ifixes/iv95638/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04","SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES","IV95858","7200-00-05","IV95858s4b.170525.72TL00SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV95858","bos.mp64:7.2.0.0-7.2.0.4","20170602"," ","6100-09:IV95102 7100-03:IV95111 7100-04:IV95012 7200-01:IV95590","https://aix.software.ibm.com/aix/ifixes/iv95858/"," ","yes" "sec","aix","5300-12-09","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV96305 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464","See Bulletin","IV96305m9a.170518.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20170706","20171113","7200-01:IV96310 7200-00:IV96309 7100-03:IV96307 7100-04:IV96308 6100-09:IV96306","ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar","CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2","no" "sec","vios","2.2.4.20 :: 2.2.4.21 :: 2.2.4.22 :: 2.2.4.23","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact VIOS","IV96306 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464","6100-09-10","IV96306m9a.170519.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc","bos.net.tcp.client:6.1.9.0-6.1.9.200","20170707"," ","5300-03::IV96305 7100-03::IV96307 7100-04::IV96308 7200-00::IV96309 7200-01::IV96310","https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar","CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2","no" "sec","aix","7100-03-07 :: 7100-03-08 :: 7100-03-09","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX","IV96307 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464","See Bulletin","IV96307m9a.170518.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc","bos.net.tcp.client:7.1.3.0-7.1.3.49","20170707","20171113","5300-03::IV96305 6100-09::IV96306 7100-04::IV96308 7200-00::IV96309 7200-01::IV96310","https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar","CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2","no" "sec","aix","7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX","IV96308 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464","7100-04-06","IV96308m4a.170518.epkg.Z IV96308m4b.171107.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc","bos.net.tcp.client:7.1.4.0-7.1.4.31","20170707","20171113","5300-03::IV96305 6100-09::IV96306 7100-03::IV96307 7200-00::IV96309 7200-01::IV96310","https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar","CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2","no" "sec","aix","7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV96309 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464","7200-00-06","IV96309m4a.170518.epkg.Z IV96312m5a.170518.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc","bos.net.tcp.ntp:7.2.0.0-7.2.0.2 bos.net.tcp.ntpd:7.2.0.0-7.2.0.3","20170706","20171113","7200-01:IV96310 5300-12:IV96305 7100-03:IV96307 7100-04:IV96308 6100-09:IV96306","https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar","CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2","no" "sec","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.","IV96310 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464 / CVE-2017-6451 / CVE-2017-6458 / CVE-2017-6462 / CVE-2017-6464","7200-01-04","IV96310m2a.170519.epkg.Z IV96312m5a.170518.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc","bos.net.tcp.ntp:7.2.1.0-7.2.1.0 bos.net.tcp.ntpd:7.2.1.0-7.2.1.1","20170706","20171113","5300-12:IV96305 7200-00:IV96309 7100-03:IV96307 7100-04:IV96308 6100-09:IV96306","https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar","CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2","no" "sec","aix","NTPv4","There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX","IV96311 IV96312 CVE-2017-6458 CVE-2017-6462 CVE-2017-6464 CVE-2017-6451 CVE-2017-6458 CVE-2017-6462 CVE-2017-6464","See Advisory","IV96311m5a.170518.epkg.Z IV96312m5a.170518.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc","ntp.rte:6.1.6.0-6.1.6.9 ntp.rte:7.1.0.0-7.1.0.9","20170707"," ","6100-09:IV96311 7100-03:IV96312 7100-04:IV96312 7200-00:IV96312 7200-01:IV96312","https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar","CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2 / CVE-2017-6451:1.8 / CVE-2017-6458:4.2 / CVE-2017-6462:1.6 / CVE-2017-6464:4.2","no" "hiper","aix","7100-04-04","LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP","IV96345","7100-04-05","IV96345s4b.170525.71TL04SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96345","bos.rte.libc:7.1.4.31","20170527"," ","6100-10:IV96351 7100-03:IV96352 7200-00:IV96347 7200-01:IV96348","https://aix.software.ibm.com/aix/ifixes/iv96345/"," ","yes" "hiper","aix","7200-00-04","LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP","IV96347","7200-00-05","IV96347s4a.170525.72TL00SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96347","bos.rte.libc:7.2.0.3-7.2.0.3","20170527"," ","6100-10:IV96351 7100-03:IV96352 7100-04:IV96345 7200-01:IV96348","https://aix.software.ibm.com/aix/ifixes/iv96347/"," ","yes" "hiper","aix","7200-01-02","LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP","IV96348","7200-01-03","IV96348s2b.170525.72TL01SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96348","bos.rte.libc:7.2.1.1-7.2.1.1","20170527"," ","6100-10:IV96351 7100-03:IV96352 7100-04:IV96345 7200-00:IV96347","https://aix.software.ibm.com/aix/ifixes/iv96348/"," ","yes" "hiper","vios","2.2.4.40","LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP","IV96351","2.2.4.50","IV96351s9d.170525.61TL09SP09.epkg.Z IV96351s9d.170525.VIOS2.2.3.90.epkg.Z IV96351s9d.170525.VIOS2.2.4.40.epkg.Z IV96351s9d.170525.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96351","bos.rte.libc:6.1.9.201","20170527"," ","6100-09:IV96351 7100-04:IV96345 7200-00:IV96347 7200-01:IV96348","https://aix.software.ibm.com/aix/ifixes/iv96351/"," ","yes" "hiper","vios","2.2.5.20","LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP","IV96351","2.2.5.30","IV96351s9d.170525.61TL09SP09.epkg.Z IV96351s9d.170525.VIOS2.2.3.90.epkg.Z IV96351s9d.170525.VIOS2.2.4.40.epkg.Z IV96351s9d.170525.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96351","bos.rte.libc:6.1.9.201","20170527"," ","6100-09:IV96351 7100-04:IV96345 7200-00:IV96347 7200-01:IV96348","https://aix.software.ibm.com/aix/ifixes/iv96351/"," ","yes" "hiper","aix","6100-09-09","LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP","IV96351","6100-09-10","IV96351s9d.170525.61TL09SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96351","bos.rte.libc:6.1.9.201","20170527"," ","7100-03:IV96352 7100-04:IV96345 7200-00:IV96347 7200-01:IV96348","https://aix.software.ibm.com/aix/ifixes/iv96351/"," ","yes" "hiper","vios","2.2.3.90","LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP","IV96351","n/a","IV96351s9d.170525.61TL09SP09.epkg.Z IV96351s9d.170525.VIOS2.2.3.90.epkg.Z IV96351s9d.170525.VIOS2.2.4.40.epkg.Z IV96351s9d.170525.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96351","bos.rte.libc:6.1.9.201","20170527"," ","6100-09:IV96351 7100-04:IV96345 7200-00:IV96347 7200-01:IV96348","https://aix.software.ibm.com/aix/ifixes/iv96351/"," ","yes" "hiper","aix","7100-03-09","LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP","IV96352","n/a","iv96352s9b.170524.71TL03SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96352","bos.rte.libc:7.1.3.49","20170527"," ","6100-10:IV96351 7100-04:IV96345 7200-00:IV96347 7200-01:IV96348","https://aix.software.ibm.com/aix/ifixes/iv96352/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03","SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS","IV96360","7200-01-04","IV96360s3a.171227.72TL01SP03.epkg.Z IV97423m0a.180328.72TL01SP00-01.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96360","devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.2","20180331"," ","6100-09:IJ00360 7100-04:IJ00519 7100-05:IJ01304 7200-02:IJ01262","https://aix.software.ibm.com/aix/ifixes/iv96360/"," ","yes" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40","UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS","IV96553","2.2.4.50","IV96553s9a.170704.61TL09SP09.epkg.Z IV96553s9a.170704.VIOS2.2.3.90.epkg.Z IV96553s9a.170704.VIOS2.2.4.40.epkg.Z IV96553s9a.170704.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96553","devices.fcp.disk.rte:6.1.9.100-6.1.9.201 devices.pci.77102224.com:6.1.9.100-6.1.9.201 devices.pci.df1000f7.com:6.1.9.100-6.1.9.201 devices.pciex.df1060e214103404.com:6.1.9.100-6.1.9.201 ","20170715"," ","7100-04:IV96603 7200-00:IV96606 7200-01:IV96604","https://aix.software.ibm.com/aix/ifixes/iv96553/"," ","yes" "hiper","vios","2.2.5.0 :: 2.2.5.10 :: 2.2.5.20","UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS","IV96553","2.2.5.30","IV96553s9a.170704.61TL09SP09.epkg.Z IV96553s9a.170704.VIOS2.2.3.90.epkg.Z IV96553s9a.170704.VIOS2.2.4.40.epkg.Z IV96553s9a.170704.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96553","devices.fcp.disk.rte:6.1.9.200-6.1.9.201 devices.pci.77102224.com:6.1.9.200-6.1.9.201 devices.pci.df1000f7.com:6.1.9.200-6.1.9.201 devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.201 ","20170715","20170721","7100-04:IV96603 7200-00:IV96606 7200-01:IV96604","https://aix.software.ibm.com/aix/ifixes/iv96553/"," ","yes" "hiper","aix","6100-09-00 :: 6100-09-01 :: 6100-09-02 :: 6100-09-03 :: 6100-09-04 :: 6100-09-05 :: 6100-09-06 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09","UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS","IV96553","6100-09-10","IV96553s9a.170704.61TL09SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96553","devices.fcp.disk.rte:6.1.9.0-6.1.9.201 devices.pci.77102224.com:6.1.9.0-6.1.9.201 devices.pci.df1000f7.com:6.1.9.0-6.1.9.201 devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201 ","20170715","20170721","7100-04:IV96603 7200-00:IV96606 7200-01:IV96604","https://aix.software.ibm.com/aix/ifixes/iv96553/"," ","yes" "hiper","vios","2.2.3.0 :: 2.2.3.10 :: 2.2.3.20 :: 2.2.3.30 :: 2.2.3.40 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80 :: 2.2.3.90","UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS","IV96553","See Advisory","IV96553s9a.170704.61TL09SP09.epkg.Z IV96553s9a.170704.VIOS2.2.3.90.epkg.Z IV96553s9a.170704.VIOS2.2.4.40.epkg.Z IV96553s9a.170704.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96553","devices.fcp.disk.rte:6.1.9.0-6.1.9.201 devices.pci.77102224.com:6.1.9.0-6.1.9.201 devices.pci.df1000f7.com:6.1.9.0-6.1.9.201 devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201 ","20170715"," ","6100-09:IV96553 7100-04:IV96603 7200-00:IV96606 7200-01:IV96604","https://aix.software.ibm.com/aix/ifixes/iv96553/"," ","yes" "hiper","vios","2.2.3.0 :: 2.2.3.10 :: 2.2.3.20 :: 2.2.3.30 :: 2.2.3.40 :: 2.2.3.50 :: 2.2.3.60 :: 2.2.3.70 :: 2.2.3.80 :: 2.2.3.90","UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS","IV96553","See Advisory","IV96553s9a.170704.61TL09SP09.epkg.Z IV96553s9a.170704.VIOS2.2.3.90.epkg.Z IV96553s9a.170704.VIOS2.2.4.40.epkg.Z IV96553s9a.170704.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96553","devices.fcp.disk.rte:6.1.9.0-6.1.9.201 devices.pci.77102224.com:6.1.9.0-6.1.9.201 devices.pci.df1000f7.com:6.1.9.0-6.1.9.201 devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201 ","20170721","20170721","6100-09:IV96553 7100-03:IV97772 7100-04:IV96603 7200-00:IV96606 7200-01:IV96604","https://aix.software.ibm.com/aix/ifixes/iv96553/"," ","yes" "hiper","aix","7100-04-00 :: 7100-04-01 :: 7100-04-02 :: 7100-04-03 :: 7100-04-04","UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS","IV96603","7100-04-05","IV96603s4a.170704.71TL04SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96603","devices.fcp.disk.rte:7.1.4.0-7.1.4.31 devices.pci.77102224.com:7.1.4.0-7.1.4.31 devices.pci.df1000f7.com:7.1.4.0-7.1.4.31 devices.pciex.df1060e214103404.com:7.1.4.0-7.1.4.31 ","20170715","20170721","6100-09:IV96553 7200-00:IV96606 7200-01:IV96604","https://aix.software.ibm.com/aix/ifixes/iv96603/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02","UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS","IV96604","7200-01-03","IV96604s2a.170705.72TL01SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96604","devices.fcp.disk.rte:7.2.1.0-7.2.1.1 devices.pci.77102224.com:7.2.1.0-7.2.1.1 devices.pci.df1000f7.com:7.2.1.0-7.2.1.1 devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.1 ","20170715","20170721","6100-09:IV96553 7100-04:IV96603 7100-03:IV97772 7200-00:IV96606","https://aix.software.ibm.com/aix/ifixes/iv96604/"," ","yes" "hiper","aix","7200-00-00 :: 7200-00-01 :: 7200-00-02 :: 7200-00-03 :: 7200-00-04","UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS","IV96606","7200-00-05","IV96606s4a.170713.72TL00SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV96606","devices.fcp.disk.rte:7.2.0.0-7.2.0.3 devices.pci.77102224.com:7.2.0.0-7.2.0.3 devices.pci.df1000f7.com:7.2.0.0-7.2.0.3 devices.pciex.df1060e214103404.com:7.2.0.0-7.2.0.3 ","20170715","20170721","6100-09:IV96553 7100-04:IV96603 7100-03:IV97772 7200-01:IV96604","https://aix.software.ibm.com/aix/ifixes/iv96606/"," ","yes" "hiper","vios","2.2.4.40","ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER","IV97135","2.2.4.50","IV97135s9a.170714.61TL09SP09.epkg.Z IV97135s9a.170714.VIOS2.2.3.90.epkg.Z IV97135s9a.170714.VIOS2.2.4.40.epkg.Z IV97135s9a.170714.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97135","devices.common.IBM.ethernet.rte:6.1.9.201","20170718"," ","6100-09:IV97135 7100-03:IV97772 7100-04:IV97586 7200-01:IV97588","https://aix.software.ibm.com/aix/ifixes/iv97135/"," ","yes" "hiper","vios","2.2.5.20","ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER","IV97135","2.2.5.30","IV97135s9a.170714.61TL09SP09.epkg.Z IV97135s9a.170714.VIOS2.2.3.90.epkg.Z IV97135s9a.170714.VIOS2.2.4.40.epkg.Z IV97135s9a.170714.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97135","devices.common.IBM.ethernet.rte:6.1.9.201","20170718"," ","6100-09:IV97135 7100-03:IV97772 7100-04:IV97586 7200-01:IV97588","https://aix.software.ibm.com/aix/ifixes/iv97135/"," ","yes" "hiper","aix","6100-09-09","ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER","IV97135","6100-09-10","IV97135s9a.170714.61TL09SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97135","devices.common.IBM.ethernet.rte:6.1.9.201","20170718"," ","7100-04:IV97586 7200-01:IV97588","https://aix.software.ibm.com/aix/ifixes/iv97135/"," ","yes" "hiper","vios","2.2.3.90","ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER","IV97135","See Advisory","IV97135s9a.170714.61TL09SP09.epkg.Z IV97135s9a.170714.VIOS2.2.3.90.epkg.Z IV97135s9a.170714.VIOS2.2.4.40.epkg.Z IV97135s9a.170714.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97135","devices.common.IBM.ethernet.rte:6.1.9.201","20170718"," ","6100-09:IV97135 7100-03:IV97772 7100-04:IV97586 7200-01:IV97588","https://aix.software.ibm.com/aix/ifixes/iv97135/"," ","yes" "hiper","vios","2.2.4.30 :: 2.2.4.40","CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER","IV97148","2.2.4.50","IV97148s8a.170613.61TL09SP08.epkg.Z IV97148s8a.170613.epkg.Z IV97148s9b.171030.61TL09SP09.epkg.Z IV97148s9b.171030.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97148","bos.cluster.rte:6.1.9.200-6.1.9.201 ","20171108"," ","6100-09:IV97148 7100-04:IV97265 7200-01:IV97266","https://aix.software.ibm.com/aix/ifixes/iv97148/"," ","yes" "hiper","vios","2.2.5.0 :: 2.2.5.10 :: 2.2.5.20","CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER","IV97148","2.2.5.30","IV97148s8a.170613.61TL09SP08.epkg.Z IV97148s8a.170613.epkg.Z IV97148s9b.171030.61TL09SP09.epkg.Z IV97148s9b.171030.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97148","bos.cluster.rte:6.1.9.200-6.1.9.201 ","20171108"," ","6100-09:IV97148 7100-04:IV97265 7200-01:IV97266","https://aix.software.ibm.com/aix/ifixes/iv97148/"," ","yes" "hiper","aix","6100-09-08 :: 6100-09-09","CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER","IV97148","6100-09-10","IV97148s8a.170613.61TL09SP08.epkg.Z IV97148s8a.170613.epkg.Z IV97148s9b.171030.61TL09SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97148","bos.cluster.rte:6.1.9.200-6.1.9.201 ","20171108"," ","7100-04:IV97265 7200-01:IV97266","https://aix.software.ibm.com/aix/ifixes/iv97148/"," ","yes" "hiper","vios","2.2.3.80 :: 2.2.3.90","CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER","IV97148","See Advisory","IV97148s8a.170613.61TL09SP08.epkg.Z IV97148s8a.170613.epkg.Z IV97148s9b.171030.61TL09SP09.epkg.Z IV97148s9b.171030.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97148","bos.cluster.rte:6.1.9.200-6.1.9.201 ","20171108"," ","6100-09:IV97148 7100-04:IV97265 7200-01:IV97266","https://aix.software.ibm.com/aix/ifixes/iv97148/"," ","yes" "hiper","aix","7100-04-03 :: 7100-04-04","CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER","IV97265","7100-04-05","IV97265s3a.171101.71TL04SP03.epkg.Z IV97265s4a.170823.71TL04SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97265","bos.cluster.rte:7.1.4.30-7.1.4.31","20171108"," ","6100-09:IV97148 7200-01:IV97266","https://aix.software.ibm.com/aix/ifixes/iv97265/"," ","yes" "hiper","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02","CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER","IV97266","7200-01-03","IV97266s1a.171101.72TL01SP00.epkg.Z IV97266s1a.171101.72TL01SP01.epkg.Z IV97266s2a.170920.72TL01SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97266","bos.cluster.rte:7.2.1.0-7.2.1.1 ","20171108"," ","6100-09:IV97148 7100-04:IV97265","https://aix.software.ibm.com/aix/ifixes/iv97266/"," ","yes" "sec","aix","6100-09-07 :: 6100-09-08 :: 6100-09-09","(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97356 / CVE-2017-1692","6100-09-10","IV97356m9a.170830.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.201","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","vios","2.2.3.70 :: 2.2.3.80 :: 2.2.3.90","(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)","IV97356 / CVE-2017-1692","6100-09-10","IV97356m9a.170830.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.201","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","vios","2.2.4.30 :: 2.2.4.40 :: 2.2.4.50","(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)","IV97356 / CVE-2017-1692","6100-09-10","IV97356m9a.170830.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.net.tcp.client:6.1.9.0-6.1.9.201","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "hiper","aix","7100-04-04","ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER","IV97586","7100-04-05","IV97586s4a.170714.71TL04SP04.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97586","devices.common.IBM.ethernet.rte:7.1.4.31","20170718"," ","6100-09:IV97135 7200-01:IV97588","https://aix.software.ibm.com/aix/ifixes/iv97586/"," ","yes" "hiper","aix","7200-01-02","ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER","IV97588","7200-01-03","IV97588s2a.170714.72TL01SP02.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97588","devices.common.IBM.ethernet.rte:7.2.1.1","20170718"," ","6100-09:IV97135 7100-04:IV97586","https://aix.software.ibm.com/aix/ifixes/iv97588/"," ","yes" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08 :: 7100-03-09","UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS","IV97772","See Advisory","IV97772s9a.170713.71TL03SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97772","devices.fcp.disk.rte:7.1.3.0-7.1.3.49 devices.pci.77102224.com:7.1.3.0-7.1.3.49 devices.pci.df1000f7.com:7.1.3.0-7.1.3.49 devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.49 ","20170715"," ","6100-09:IV96553 7100-04:IV96603 7200-00:IV96606 7200-01:IV96604","https://aix.software.ibm.com/aix/ifixes/iv97772/"," ","yes" "hiper","aix","7100-03-00 :: 7100-03-01 :: 7100-03-02 :: 7100-03-03 :: 7100-03-04 :: 7100-03-05 :: 7100-03-06 :: 7100-03-07 :: 7100-03-08 :: 7100-03-09","UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS","IV97772","See Advisory","IV97772s9a.170713.71TL03SP09.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97772","devices.fcp.disk.rte:7.1.3.0-7.1.3.49 devices.pci.77102224.com:7.1.3.0-7.1.3.49 devices.pci.df1000f7.com:7.1.3.0-7.1.3.49 devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.49 ","20170721","20170721","6100-09:IV96553 7100-04:IV96603 7200-00:IV96606 7200-01:IV96604","https://aix.software.ibm.com/aix/ifixes/iv97772/"," ","yes" "sec","aix","7200-00-03 :: 7200-00-04 :: 7200-00-05","(caccelstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97811 / CVE-2017-1692","7200-00-06","IV97811s2a.170712.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.acct:7.2.0.0-7.2.0.2","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","(caccelstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97811 / CVE-2017-1692","7200-01-04","IV97811s2a.170712.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.acct:7.2.1.0-7.2.1.0","20180205"," ","5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","6100-09-07 :: 6100-09-08 :: 6100-09-09","(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97852 / CVE-2017-1692","6100-09-10","IV97852s7a.170713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.archive:6.1.9.0-6.1.9.201","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","vios","2.2.3.70 :: 2.2.3.80 :: 2.2.3.90","(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)","IV97852 / CVE-2017-1692","6100-09-10","IV97852s7a.170713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.archive:6.1.9.0-6.1.9.201","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","vios","2.2.4.30 :: 2.2.4.40 :: 2.2.4.50","(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)","IV97852 / CVE-2017-1692","6100-09-10","IV97852s7a.170713.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.archive:6.1.9.0-6.1.9.201","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7100-04-03 :: 7100-04-04 :: 7100-04-05","(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97896 / CVE-2017-1692","7100-04-06","IV97896s4a.170712.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.acct:7.1.4.0-7.1.4.30","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-00-03 :: 7200-00-04 :: 7200-00-05","(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97898 / CVE-2017-1692","7200-00-06","IV97898s2a.171201.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.acct:7.2.0.0-7.2.0.3","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97898 / CVE-2017-1692","7200-01-04","IV97898s2a.171201.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.acct:7.2.1.0-7.2.1.1","20180205"," ","5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7100-04-03 :: 7100-04-04 :: 7100-04-05","(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97899 / CVE-2017-1692","7100-04-06","IV97899s4a.170712.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.acct:7.1.4.0-7.1.4.30","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-00-03 :: 7200-00-04 :: 7200-00-05","(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97901 / CVE-2017-1692","7200-00-06","IV97901s2a.171201.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.acct:7.2.0.0-7.2.0.3","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97901 / CVE-2017-1692","7200-01-04","IV97901s2a.171201.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.acct:7.2.1.0-7.2.1.1","20180205"," ","5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7100-04-03 :: 7100-04-04 :: 7100-04-05","(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97957 / CVE-2017-1692","7100-04-06","IV97957s2b.171205.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.archive:7.1.4.0-7.1.4.31","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97958 / CVE-2017-1692","7200-01-04","IV97958s0b.171205.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.archive:7.2.1.0-7.2.1.1","20180205"," ","5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-00-03 :: 7200-00-04 :: 7200-00-05","(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV97959 / CVE-2017-1692","7200-00-06","IV97959s2b.171205.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.archive:7.2.0.0-7.2.0.3","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "hiper","vios","2.2.5.0 :: 2.2.5.10 :: 2.2.5.20","LPARS USING SEA MAY LOSE NETWORK AFTER REBOOTING PRIMARY AND SECONDARY VIOS","IV97991","2.2.5.30","IV97991s8a.170714.VIOS2.2.5.0-10.epkg.Z IV97991s9a.170713.VIOS2.2.5.20.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IV97991","ios.sea:6.1.9.200-6.1.9.201 ","20170908"," ","","https://aix.software.ibm.com/aix/ifixes/iv97991/"," ","yes" "sec","aix","5300-12-09","(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV98013 / CVE-2017-1692","See Bulletin","IV98013s9a.170717.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.archive:5.3.12.0-5.3.12.7","20180205"," ","7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","ftp://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","5300-12-09","There are vulnerabilities in BIND that impact AIX.","IV98825 / CVE-2017-3142 / CVE-2017-3143","See Bulletin","IV98825m9a.170830.epkg.Z","http://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc","bos.net.tcp.client:5.3.12.0-5.3.12.10","20170823","20171113","7200-01:IV98830 7200-00:IV98829 7100-03:IV98827 7100-04:IV98828 6100-09:IV98826","ftp://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar","CVE-2017-3142:5.3 / CVE-2017-3143:7.5","no" "sec","aix","6100-09-10 :: 6100-09-07 :: 6100-09-08 :: 6100-09-09","There are vulnerabilities in BIND that impact AIX.","IV98826 / CVE-2017-3142 / CVE-2017-3143","6100-09-11","IV98826m9a.170809.epkg.Z IV98826m0a.171105.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc","bos.net.tcp.client:6.1.9.0-6.1.9.300","20170823","20171113","7200-01:IV98830 5300-12:IV98825 7200-00:IV98829 7100-03:IV98827 7100-04:IV98828","https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar","CVE-2017-3142:5.3 / CVE-2017-3143:7.5","no" "sec","aix","7100-03-07 :: 7100-03-08 :: 7100-03-09","There are vulnerabilities in BIND that impact AIX.","IV98827 / CVE-2017-3142 / CVE-2017-3143","See Bulletin","IV98827m3a.170808.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc","bos.net.tcp.client:7.1.3.0-7.1.3.49","20170823","20171113","7200-01:IV98830 5300-12:IV98825 7200-00:IV98829 7100-04:IV98828 6100-09:IV98826","https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar","CVE-2017-3142:5.3 / CVE-2017-3143:7.5","no" "sec","aix","7100-04-02 :: 7100-04-03 :: 7100-04-04 :: 7100-04-05","There are vulnerabilities in BIND that impact AIX.","IV98828 / CVE-2017-3142 / CVE-2017-3143","7100-04-06","IV98828m4a.170808.epkg.Z IV98828m5b.171110.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc","bos.net.tcp.client:7.1.4.0-7.1.4.32","20170823","20171113","7200-01:IV98830 5300-12:IV98825 7200-00:IV98829 7100-03:IV98827 6100-09:IV98826","https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar","CVE-2017-3142:5.3 / CVE-2017-3143:7.5","no" "sec","aix","7200-00-02 :: 7200-00-03 :: 7200-00-04 :: 7200-00-05","There are vulnerabilities in BIND that impact AIX.","IV98829 / CVE-2017-3142 / CVE-2017-3143","7200-00-06","IV98829m0a.170809.epkg.Z IV98829m0b.171106.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc","bos.net.tcp.client_core:7.2.0.0-7.2.0.4","20170823","20171113","7200-01:IV98830 5300-12:IV98825 7100-03:IV98827 7100-04:IV98828 6100-09:IV98826","https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar","CVE-2017-3142:5.3 / CVE-2017-3143:7.5","no" "sec","aix","7200-01-00 :: 7200-01-01 :: 7200-01-02 :: 7200-01-03","There are vulnerabilities in BIND that impact AIX.","IV98830 / CVE-2017-3142 / CVE-2017-3143","7200-01-04","IV98830m1a.170809.epkg.Z IV98830m1b.171106.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc","bos.net.tcp.client_core:7.2.1.0-7.2.1.2","20170823","20171113","5300-12:IV98825 7200-00:IV98829 7100-03:IV98827 7100-04:IV98828 6100-09:IV98826","https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar","CVE-2017-3142:5.3 / CVE-2017-3143:7.5","no" "sec","aix","7100-04-03 :: 7100-04-04 :: 7100-04-05","(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV99497 / CVE-2017-1692","7100-04-06","IV99497m5a.171115.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.net.tcp.client:7.1.4.0-7.1.4.32","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-00-03 :: 7200-00-04 :: 7200-00-05","(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV99498 / CVE-2017-1692","7200-00-06","IV99498m5a.171115.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.net.tcp.client_core:7.2.0.0-7.2.0.4","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV99499 / CVE-2017-1692","7200-01-04","IV99499m3a.171115.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.net.tcp.client_core:7.2.1.0-7.2.1.2","20180205"," ","5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","6100-09-07 :: 6100-09-08 :: 6100-09-09","(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV99548 / CVE-2017-1692","6100-09-10","IV99548m9a.171031.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.lvm:6.1.9.0-6.1.9.201","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","vios","2.2.3.70 :: 2.2.3.80 :: 2.2.3.90","(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)","IV99548 / CVE-2017-1692","6100-09-10","IV99548m9a.171031.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.lvm:6.1.9.0-6.1.9.201","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","vios","2.2.4.30 :: 2.2.4.40 :: 2.2.4.50","(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)","IV99548 / CVE-2017-1692","6100-09-10","IV99548m9a.171031.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.lvm:6.1.9.0-6.1.9.201","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7100-04-03 :: 7100-04-04 :: 7100-04-05","(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV99550 / CVE-2017-1692","7100-04-06","IV99550m5a.171031.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.lvm:7.1.4.0-7.1.4.32","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7200-00:IV99498 7100-03:IV99496 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-00-03 :: 7200-00-04 :: 7200-00-05","(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV99551 / CVE-2017-1692","7200-00-06","IV99551m5a.171031.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.lvm:7.2.0.0-7.2.0.4","20180205"," ","5300-12:IJ00951 7200-01:IV99499 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "sec","aix","7200-01-01 :: 7200-01-02 :: 7200-01-03","(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)","IV99552 / CVE-2017-1692","7200-01-04","IV99552m3a.171031.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc","bos.rte.lvm:7.2.1.0-7.2.1.2","20180205"," ","5300-12:IJ00951 7200-00:IV99498 7100-03:IV99496 7100-04:IV99497 6100-09:IV97356","https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar","CVE-2017-1692:8.4","no" "hiper","aix","6100-06-00 :: 6100-06-01 :: 6100-06-02 :: 6100-06-03 :: 6100-06-04 :: 6100-06-05 :: 6100-06-06 :: 6100-06-07 :: 6100-06-08 :: 6100-06-09 :: 6100-06-10 :: 6100-06-11","SYSTEM CRASH IN E_CLEAR_WAIT().","IZ94647","6100-06-12","IZ94647s1a.130730.epkg.Z / IZ94647s1a.130730.61TL06SP11.epkg.Z","http://www-01.ibm.com/support/docview.wss?uid=isg1IZ94647","bos.mp64:6.1.6.0-6.1.6.22","20110208","20131124","6100-06:IZ94647 6100-07:IV13404 6100-08:IV14309 6100-09:IV42440 7100-00:IV42334 7100-01:IV27584 7100-02:IV42324 7100-03:IV42412","ftp://public.dhe.ibm.com/aix/ifixes/iz94647/"," ","no" "hiper","vios","2.2.4.0 :: 2.2.4.10 :: 2.2.4.20 :: 2.2.4.30 :: 2.2.4.40 :: 2.2.4.50 :: 2.2.4.60","Adapter firmware upgrade can fail or adapter may become unusable","See Advisory","See Advisory","IJ06644sAa.180917.AIX61TL09SP10.epkg.Z IJ06644sBa.180615.AIX61TL09SP11.epkg.Z IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z IJ06644sCa.180917.AIX61TL09SP12.epkg.Z IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z","","devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201","20181013"," ","6100-09:IJ06644 7100-04:IJ09173 7100-05:IJ09174 7200-01:IJ09175 7200-02:IJ09176 7200-03:IJ08641","https://aix.software.ibm.com/aix/ifixes/ij06644/"," ","yes" "hiper","vios","3.1.4.40 :: 3.1.4.41","Potential undetected data loss can occur on LPARs using NPIV with certain Fibre Channel adapters","cv31441s1a","3.1.4.50","cv31441s1a.241015.VIOS3.1.4.4x.epkg.Z","https://www.ibm.com/support/pages/node/7172778","devices.pciex.7710612214105006.com:7.2.5.203-7.2.5.203","20241016"," ","","https://aix.software.ibm.com/aix/ifixes/cv31141/","","yes" "hiper","vios","4.1.0.20 :: 4.1.0.21","Potential undetected data loss can occur on LPARs using NPIV with certain Fibre Channel adapters","cv41021s1a","4.1.0.30","cv41021s1a.241015.VIOS4.1.0.2x.epkg.Z","https://www.ibm.com/support/pages/node/7172778","devices.pciex.7710612214105006.com:7.3.2.1-7.3.2.1","20241016"," ","","https://aix.software.ibm.com/aix/ifixes/cv41021/","","yes" "sec","aix","invScout","AIX is vulnerable to arbitrary command execution due to invscout (CVE-2024-27260)","is22026s1a / CVE-2024-27260","See Bulletin","is22026s1a.240514.epkg.Z","https://aix.software.ibm.com/aix/efixes/security/invscout_advisory6.asc","invscout.rte:2.2.0.0-2.2.0.26","20240515"," ","","https://aix.software.ibm.com/aix/efixes/security/invscout_fix6.tar","CVE-2024-27260:8.4","no"