[ { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "AIX is vulnerable to arbitrary code execution (CVE-2024-4741) and denial of service (CVE-2024-5535 CVE-2024-4603) due to OpenSSL", "aparNo": "1112400a", "aparNoSet": [ "1112400a", "1122400a", "3013ma", "3013sa", "CVE-2024-4603", "CVE-2024-4741", "CVE-2024-5535" ], "fixedIn": "See Bulletin", "ifixes": [ "1112400a.240722.epkg.Z", "1122400a.240722.epkg.Z", "3013sa.240722.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory42.asc", "filesets": [ "openssl.base:1.1.1.0-1.1.1.2400", "openssl.base:1.1.2.0-1.1.2.2400", "openssl.base:3.0.0.0-3.0.13.1000" ], "issued": "20240730", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix42.tar", "cvss": [ "CVE-2024-4603:3.7", "CVE-2024-4741:8.1", "CVE-2024-5535:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "cURL" ], "apAbstract": "AIX is vulnerable to security restrictions bypass due to curl", "aparNo": "2466ma", "aparNoSet": [ "2466ma", "32221a", "46218ma", "CVE-2022-32221", "curl7791a", "curl7791mb", "curl812sa" ], "fixedIn": "See Bulletin", "ifixes": [ "32221a.230524.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory.asc", "filesets": [ "oss.lib.libcurl:7.79.1.0-7.79.1.0" ], "issued": "20230526", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix.tar", "cvss": [ "CVE-2022-32221:8.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "cURL" ], "apAbstract": "Multiple vulnerabilities cURL libcurl affect AIX", "aparNo": "2466ma", "aparNoSet": [ "2466ma", "46218ma", "CVE-2022-27782", "CVE-2022-32206", "CVE-2022-43551", "CVE-2022-43552", "CVE-2023-23916", "CVE-2023-27533", "CVE-2023-27534", "CVE-2023-27535", "CVE-2023-27536", "CVE-2023-27537", "CVE-2023-27538", "curl7791a", "curl7791mb", "curl812sa" ], "fixedIn": "See Bulletin", "ifixes": [ "curl7791a.230622.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory2.asc", "filesets": [ "oss.lib.libcurl:7.79.1.0-7.79.1.0" ], "issued": "20230629", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix2.tar", "cvss": [ "CVE-2022-27782:9.8", "CVE-2022-32206:4.3", "CVE-2022-43551:7.5", "CVE-2022-43552:5.9", "CVE-2023-23916:7.5", "CVE-2023-27533:8.2", "CVE-2023-27534:7.5", "CVE-2023-27535:5.9", "CVE-2023-27536:5.9", "CVE-2023-27537:7.5", "CVE-2023-27538:4.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "cURL" ], "apAbstract": "Multiple vulnerabilities in cURL libcurl affect AIX", "aparNo": "2466ma", "aparNoSet": [ "2466ma", "46218ma", "CVE-2023-38545", "CVE-2023-38546", "curl7791mb", "curl812sa" ], "fixedIn": "See Bulletin", "ifixes": [ "curl7791mb.231120.epkg.Z", "curl812sa.231120.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory3.asc", "filesets": [ "oss.lib.libcurl:7.79.1.0-7.79.1.0", "oss.lib.libcurl:8.1.2.0-8.1.2.0" ], "issued": "20231212", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix3.tar", "cvss": [ "CVE-2023-38545:8.1", "CVE-2023-38546:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "cURL" ], "apAbstract": "AIX is vulnerable to security restrictions bypass due to cURL libcurl (CVE-2023-46218)", "aparNo": "2466ma", "aparNoSet": [ "2466ma", "46218ma", "CVE-2023-46218" ], "fixedIn": "See Bulletin", "ifixes": [ "46218ma.240227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory4.asc", "filesets": [ "oss.lib.libcurl:7.79.1.0-7.79.1.0", "oss.lib.libcurl:8.1.2.0-8.1.2.0" ], "issued": "20240306", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix4.tar", "cvss": [ "CVE-2023-46218:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "cURL" ], "apAbstract": "AIX is vulnerable to security restrictions bypass due to cURL libcurl (CVE-2024-0853)", "aparNo": "2466ma", "aparNoSet": [ "2466ma", "853sa", "CVE-2024-0853" ], "fixedIn": "See Bulletin", "ifixes": [ "853sa.240503.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory5.asc", "filesets": [ "oss.lib.libcurl:8.5.0.0-8.5.0.0" ], "issued": "20240620", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix5.tar", "cvss": [ "CVE-2024-0853:3.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "cURL" ], "apAbstract": "AIX is vulnerable to a denial of service (CVE-2024-2398) and security restrictions bypass (CVE-2024-2466 CVE-2024-2004) due to cURL libcurl", "aparNo": "2466ma", "aparNoSet": [ "2466ma", "CVE-2024-2004", "CVE-2024-2398", "CVE-2024-2466" ], "fixedIn": "See Bulletin", "ifixes": [ "2466ma.240719.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory6.asc", "filesets": [ "oss.lib.libcurl:7.79.1.0-7.79.1.0", "oss.lib.libcurl:8.1.2.0-8.1.2.0", "oss.lib.libcurl:8.5.0.0-8.5.0.0" ], "issued": "20240820", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix6.tar", "cvss": [ "CVE-2024-2004:3.7", "CVE-2024-2398:5.3", "CVE-2024-2466:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "AIX is vulnerable to a denial of service (CVE-2024-6119) due to OpenSSL", "aparNo": "3013ma", "aparNoSet": [ "3013ma", "CVE-2024-6119" ], "fixedIn": "See Bulletin", "ifixes": [ "3013ma.240923.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory43.asc", "filesets": [ "openssl.base:3.0.5.101-3.0.13.1000" ], "issued": "20240930", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix43.tar", "cvss": [ "CVE-2024-6119:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "AIX is vulnerable to unauthorized file access and arbitrary code execution due to OpenSSH", "aparNo": "38408m9a", "aparNoSet": [ "38408m9a", "38408m9b", "38408m9c", "81112ma", "92112ma", "CVE-2023-38408", "CVE-2023-40371" ], "fixedIn": "See Bulletin", "ifixes": [ "38408m9a.230811.epkg.Z", "38408m9b.230811.epkg.Z", "38408m9c.230811.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory15.asc", "filesets": [ "openssh.base.client:8.1.102.0-8.1.102.2106", "openssh.base.server:8.1.102.0-8.1.102.2106", "openssh.base.client:8.1.112.0-8.1.112.2000", "openssh.base.server:8.1.112.0-8.1.112.2000", "openssh.base.client:9.2.112.0-9.2.112.2000", "openssh.base.server:9.2.112.0-9.2.112.2000" ], "issued": "20230823", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix15.tar", "cvss": [ "CVE-2023-38408:8.1", "CVE-2023-40371:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "AIX is vulnerable to a machine-in-the-middle attack (CVE-2023-48795) arbitrary command execution (CVE-2023-51385) and information disclosure (CVE-2023-51384) due to OpenSSH", "aparNo": "81112ma", "aparNoSet": [ "81112ma", "92112ma", "CVE-2023-48795", "CVE-2023-51384", "CVE-2023-51385" ], "fixedIn": "See Bulletin", "ifixes": [ "81112ma.240224.epkg.Z", "92112ma.240223.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory16.asc", "filesets": [ "openssh.base.client:8.1.112.0-8.1.112.2200", "openssh.base.server:8.1.112.0-8.1.112.2200", "openssh.base.client:9.2.112.0-9.2.112.2200", "openssh.base.server:9.2.112.0-9.2.112.2200" ], "issued": "20240228", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix16.tar", "cvss": [ "CVE-2023-48795:5.9", "CVE-2023-51384:4.4", "CVE-2023-51385:9.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "AIX is vulnerable to arbitrary code execution (CVE-2024-6387) due to OpenSSH", "aparNo": "9211224a", "aparNoSet": [ "9211224a", "CVE-2024-6387" ], "fixedIn": "See Bulletin", "ifixes": [ "9211224a.240708.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory17.asc", "filesets": [ "openssh.base.client:9.2.112.0-9.2.112.2400", "openssh.base.server:9.2.112.0-9.2.112.2400" ], "issued": "20240709", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix17.tar", "cvss": [ "CVE-2024-6387:8.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2006-0987", "aparNoSet": [ "CVE-2006-0987", "IV62327" ], "fixedIn": "interim fix only", "ifixes": [ "IV62327m9a.140709.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc", "filesets": [ "bos.net.tcp.server:5.3.12.0-5.3.12.6" ], "issued": "20140815", "updated": "null", "siblings": [ "5300-12:IV62327", "6100-07:IV62224", "6100-08:IV62146", "6100-09:IV62225", "7100-01:IV61093", "7100-02:IV61090", "7100-03:IV61027" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar", "cvss": [ "CVE-2006-0987:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2006-0987", "aparNoSet": [ "CVE-2006-0987", "IV62146" ], "fixedIn": "6100-08-06", "ifixes": [ "IV62146m4a.140709.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc", "filesets": [ "bos.net.tcp.server:6.1.8.0-6.1.8.17" ], "issued": "20140815", "updated": "null", "siblings": [ "5300-12:IV62327", "6100-07:IV62224", "6100-08:IV62146", "6100-09:IV62225", "7100-01:IV61093", "7100-02:IV61090", "7100-03:IV61027" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar", "cvss": [ "CVE-2006-0987:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2006-0987", "aparNoSet": [ "CVE-2006-0987", "IV61090" ], "fixedIn": "7100-02-06", "ifixes": [ "IV61090s4a.140603.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc", "filesets": [ "bos.net.tcp.server:7.1.2.0-7.1.2.17" ], "issued": "20140815", "updated": "null", "siblings": [ "5300-12:IV62327", "6100-07:IV62224", "6100-08:IV62146", "6100-09:IV62225", "7100-01:IV61093", "7100-02:IV61090", "7100-03:IV61027" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar", "cvss": [ "CVE-2006-0987:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2006-0987", "aparNoSet": [ "CVE-2006-0987", "IV61027" ], "fixedIn": "7100-03-04", "ifixes": [ "IV61027s3a.140611.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc", "filesets": [ "bos.net.tcp.server:7.1.3.0-7.1.3.15" ], "issued": "20140815", "updated": "20150822", "siblings": [ "5300-12:IV62327", "6100-07:IV62224", "6100-08:IV62146", "6100-09:IV62225", "7100-01:IV61093", "7100-02:IV61090", "7100-03:IV61027" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar", "cvss": [ "CVE-2006-0987:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08", "6100-07-09" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2006-0987", "aparNoSet": [ "CVE-2006-0987", "IV62224" ], "fixedIn": "interim fix only", "ifixes": [ "IV62224m9a.140709.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc", "filesets": [ "bos.net.tcp.server:6.1.7.0-6.1.7.20" ], "issued": "20140815", "updated": "null", "siblings": [ "5300-12:IV62327", "6100-07:IV62224", "6100-08:IV62146", "6100-09:IV62225", "7100-01:IV61093", "7100-02:IV61090", "7100-03:IV61027" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar", "cvss": [ "CVE-2006-0987:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08", "7100-01-09" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2006-0987", "aparNoSet": [ "CVE-2006-0987", "IV61093" ], "fixedIn": "interim fix only", "ifixes": [ "IV61093s9a.140603.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc", "filesets": [ "bos.net.tcp.server:7.1.1.0-7.1.1.20" ], "issued": "20140815", "updated": "null", "siblings": [ "5300-12:IV62327", "6100-07:IV62224", "6100-08:IV62146", "6100-09:IV62225", "7100-01:IV61093", "7100-02:IV61090", "7100-03:IV61027" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar", "cvss": [ "CVE-2006-0987:5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2", "2.2.2.3", "2.2.2.4", "2.2.2.5" ], "apAbstract": "Vulnerability in VIOS bind", "aparNo": "CVE-2006-0987", "aparNoSet": [ "CVE-2006-0987" ], "fixedIn": "2.2.2.6", "ifixes": [ "IV62146m4a.140709.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc", "filesets": [ "bos.net.tcp.server:6.1.8.0-6.1.8.17" ], "issued": "20140815", "updated": "null", "siblings": [ "5300-12:IV62327", "6100-07:IV62224", "6100-08:IV62146", "6100-09:IV62225", "7100-01:IV61093", "7100-02:IV61090", "7100-03:IV61027" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar", "cvss": [ "CVE-2006-0987:5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2", "2.2.3.3" ], "apAbstract": "Vulnerability in VIOS bind", "aparNo": "CVE-2006-0987", "aparNoSet": [ "CVE-2006-0987" ], "fixedIn": "2.2.3.4", "ifixes": [ "IV62225m3a.140708.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.3" ], "issued": "20140815", "updated": "null", "siblings": [ "5300-12:IV62327", "6100-07:IV62224", "6100-08:IV62146", "6100-09:IV62225", "7100-01:IV61093", "7100-02:IV61090", "7100-03:IV61027" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar", "cvss": [ "CVE-2006-0987:5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7", "2.2.1.8" ], "apAbstract": "Vulnerability in VIOS bind", "aparNo": "CVE-2006-0987", "aparNoSet": [ "CVE-2006-0987" ], "fixedIn": "interim fix only", "ifixes": [ "IV62224m9a.140709.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc", "filesets": [ "bos.net.tcp.server:6.1.7.0-6.1.7.20" ], "issued": "20140815", "updated": "null", "siblings": [ "5300-12:IV62327", "6100-07:IV62224", "6100-08:IV62146", "6100-09:IV62225", "7100-01:IV61093", "7100-02:IV61090", "7100-03:IV61027" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar", "cvss": [ "CVE-2006-0987:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssh" ], "apAbstract": "AIX OpenSSH Vulnerability", "aparNo": "CVE-2010-5107", "aparNoSet": [ "CVE-2010-5107" ], "fixedIn": "See advisory", "ifixes": [ "OpenSSH_6.0.0.6102.tar.Z", "DEPRECATED::6201_mfix" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory2.asc", "filesets": [ "openssh.base.server:6.0.0.0-6.0.0.6101" ], "issued": "20130408", "updated": "20130802", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2010-5107:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "AIX OpenSSL Vulnerability", "aparNo": "CVE-2010-5298", "aparNoSet": [ "CVE-2010-5298" ], "fixedIn": "Openssl-1.0.1.503", "ifixes": [ "openssl-1.0.1.503.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory8.asc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.502" ], "issued": "20140606", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2010-5298:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "AIX OpenSSL Vulnerability", "aparNo": "CVE-2010-5298", "aparNoSet": [ "CVE-2010-5298" ], "fixedIn": "Openssl-1.0.1.503", "ifixes": [ "openssl-1.0.1.503.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory8.asc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.502" ], "issued": "20140606", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2010-5298:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Multiple OpenSSL vulnerabilities", "aparNo": "CVE-2011-4108", "aparNoSet": [ "CVE-2011-4108", "CVE-2011-4109", "CVE-2011-4576", "CVE-2011-4619" ], "fixedIn": "7100-02-00", "ifixes": [ "openssl.0.9.8.1801.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc", "filesets": [ "openssl.base:0.9.8.0-0.9.8.1800", "openssl.base:12.9.8.0-12.9.8.1800" ], "issued": "20120321", "updated": "20120605", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2011-4108:4.3", "CVE-2011-4109:9.3", "CVE-2011-4576:5.0", "CVE-2011-4619:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "openssl" ], "apAbstract": "Multiple OpenSSL vulnerabilities", "aparNo": "CVE-2012-0884", "aparNoSet": [ "CVE-2012-0884", "CVE-2012-1165", "CVE-2012-2110", "CVE-2012-2131", "CVE-2012-2333" ], "fixedIn": "See advisory", "ifixes": [ "openssl-0.9.8.1802.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory4.asc", "filesets": [ "openssl.base:0.9.8.0-0.9.8.1801", "openssl.base:12.9.8.0-12.9.8.1801" ], "issued": "20120801", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2012-0884:5.0", "CVE-2012-1165:5.0", "CVE-2012-2110:7.5", "CVE-2012-2131:7.5", "CVE-2012-2333:6.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7", "2.2.1.8", "2.2.1.9" ], "apAbstract": "Arbitary file overwrite symlink in libodm", "aparNo": "CVE-2012-2179", "aparNoSet": [ "CVE-2012-2179" ], "fixedIn": "2.2.1.10", "ifixes": [ "IV60313s9a.140515.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875", "filesets": [ "bos.rte.odm:6.1.7.0-6.1.7.15" ], "issued": "20120614", "updated": "null", "siblings": [ "6100-07:IV60313", "6100-08:IV60311", "6100-09:IV60299", "7100-01:IV60312", "7100-02:IV60314", "7100-03:IV60303" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar", "cvss": [ "CVE-2012-2179:6.9" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2", "2.2.2.3", "2.2.2.4" ], "apAbstract": "Arbitary file overwrite symlink in libodm", "aparNo": "CVE-2012-2179", "aparNoSet": [ "CVE-2012-2179" ], "fixedIn": "2.2.2.5", "ifixes": [ "IV60311s4a.140515.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875", "filesets": [ "bos.rte.odm:6.1.8.0" ], "issued": "20120614", "updated": "null", "siblings": [ "6100-07:IV60313", "6100-08:IV60311", "6100-09:IV60299", "7100-01:IV60312", "7100-02:IV60314", "7100-03:IV60303" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar", "cvss": [ "CVE-2012-2179:6.9" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2" ], "apAbstract": "Arbitary file overwrite symlink in libodm", "aparNo": "CVE-2012-2179", "aparNoSet": [ "CVE-2012-2179" ], "fixedIn": "2.2.3.3", "ifixes": [ "IV60299s2a.140515.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875", "filesets": [ "bos.rte.odm:6.1.9.0" ], "issued": "20120614", "updated": "null", "siblings": [ "6100-07:IV60313", "6100-08:IV60311", "6100-09:IV60299", "7100-01:IV60312", "7100-02:IV60314", "7100-03:IV60303" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar", "cvss": [ "CVE-2012-2179:6.9" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4" ], "apAbstract": "Vulnerability in use of socketpair", "aparNo": "CVE-2012-2192", "aparNoSet": [ "CVE-2012-2192" ], "fixedIn": "2.2.1.5", "ifixes": [ "IV21128s04.VIOS2214.120531.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.3" ], "issued": "20120605", "updated": "null", "siblings": [ "6100-06:IV16603", "6100-07:IV21128", "6100-08:IV19341", "7100-00:IV21131", "7100-01:IV21235", "7100-02:IV19357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar", "cvss": [ "CVE-2012-2192:4.9" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3" ], "apAbstract": "VIOS NFSv4 vulnerability", "aparNo": "CVE-2012-4817", "aparNoSet": [ "CVE-2012-4817" ], "fixedIn": "2.2.1.4", "ifixes": [], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dVIOS%20NFSv4%20Vulnerability%20CVE-2012-4817", "filesets": [ "bos.net.nfs.client:6.1.7.0-6.1.7.2" ], "issued": "20120913", "updated": "null", "siblings": [ "6100-06:IV16603", "6100-07:IV21128", "6100-08:IV19341", "7100-00:IV21131", "7100-01:IV21235", "7100-02:IV19357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar", "cvss": [ "CVE-2012-4817:5" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Multiple OpenSSL vulnerabilities", "aparNo": "CVE-2013-0169", "aparNoSet": [ "CVE-2013-0166", "CVE-2013-0169" ], "fixedIn": "See advisory", "ifixes": [ "openssl-0.9.8.2500.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory5.asc", "filesets": [ "openssl.base:0.9.8.0-0.9.8.2400", "openssl.base:12.9.8.0-12.9.8.2400" ], "issued": "20130315", "updated": "20130605", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2013-0169:4.3", "CVE-2013-0166:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Multiple OpenSSL vulnerabilities", "aparNo": "CVE-2013-4353", "aparNoSet": [ "CVE-2013-4353", "CVE-2013-6449", "CVE-2013-6450" ], "fixedIn": "7100-04-00", "ifixes": [ "openssl-1.0.1.501.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory6.asc", "filesets": [ "openssl.base:1.0.1.500" ], "issued": "20140225", "updated": "20140303", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2013-4353:5", "CVE-2013-6450:4.3", "CVE-2013-6449:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssh" ], "apAbstract": "AIX OpenSSH Vulnerability", "aparNo": "CVE-2013-4548", "aparNoSet": [ "CVE-2013-4548" ], "fixedIn": "7100-04-00", "ifixes": [ "OpenSSH_6.0.0.6104.tar.Z", "DEPRECATED::6201_mfix" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory3.asc", "filesets": [ "openssh.base.server:6.0.0.6103" ], "issued": "20140221", "updated": "20140416", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2013-4548:6.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08", "6100-07-09" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "IV58413" ], "fixedIn": "6100-07-10", "ifixes": [ "IV58413s9a.140421.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.20", "ntp.rte:6.1.6.0-6.1.6.1" ], "issued": "20140612", "updated": "null", "siblings": [ "5300-12:IV59636", "6100-07:IV58413", "6100-08:IV58068", "6100-09:IV56213", "7100-01:IV56575", "7100-02:IV55365", "7100-03:IV56324" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar", "cvss": [ "CVE-2013-5211:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "IV58068" ], "fixedIn": "6100-08-05", "ifixes": [ "IV58068s4a.140421.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.17", "ntp.rte:6.1.6.0-6.1.6.1" ], "issued": "20140612", "updated": "null", "siblings": [ "5300-12:IV59636", "6100-07:IV58413", "6100-08:IV58068", "6100-09:IV56213", "7100-01:IV56575", "7100-02:IV55365", "7100-03:IV56324" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar", "cvss": [ "CVE-2013-5211:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "IV56213" ], "fixedIn": "6100-09-03", "ifixes": [ "IV56213s1a.140421.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.1", "ntp.rte:6.1.6.0-6.1.6.1" ], "issued": "20140612", "updated": "null", "siblings": [ "5300-12:IV59636", "6100-07:IV58413", "6100-08:IV58068", "6100-09:IV56213", "7100-01:IV56575", "7100-02:IV55365", "7100-03:IV56324" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar", "cvss": [ "CVE-2013-5211:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08", "7100-01-09" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "IV56573" ], "fixedIn": "7100-01-10", "ifixes": [ "IV56575s9a.140421.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.1.0-7.1.1.20", "ntp.rte:7.1.0.0-7.1.0.1" ], "issued": "20140612", "updated": "null", "siblings": [ "5300-12:IV59636", "6100-07:IV58413", "6100-08:IV58068", "6100-09:IV56213", "7100-01:IV56575", "7100-02:IV55365", "7100-03:IV56324" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar", "cvss": [ "CVE-2013-5211:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "IV55365" ], "fixedIn": "7100-02-05", "ifixes": [ "IV55365s4a.140421.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.17", "ntp.rte:7.1.0.0-7.1.0.1" ], "issued": "20140612", "updated": "null", "siblings": [ "5300-12:IV59636", "6100-07:IV58413", "6100-08:IV58068", "6100-09:IV56213", "7100-01:IV56575", "7100-02:IV55365", "7100-03:IV56324" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar", "cvss": [ "CVE-2013-5211:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "IV56324" ], "fixedIn": "7100-03-03", "ifixes": [ "IV56324s2a.140522.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.2", "ntp.rte:7.1.0.0-7.1.0.1" ], "issued": "20140612", "updated": "null", "siblings": [ "5300-12:IV59636", "6100-07:IV58413", "6100-08:IV58068", "6100-09:IV56213", "7100-01:IV56575", "7100-02:IV55365", "7100-03:IV56324" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar", "cvss": [ "CVE-2013-5211:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "IV59636" ], "fixedIn": "interim fix only", "ifixes": [ "IV59636s9a.140423.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10", "ntp.rte:6.1.6.0-6.1.6.1" ], "issued": "20140612", "updated": "null", "siblings": [ "5300-12:IV59636", "6100-07:IV58413", "6100-08:IV58068", "6100-09:IV56213", "7100-01:IV56575", "7100-02:IV55365", "7100-03:IV56324" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar", "cvss": [ "CVE-2013-5211:5.0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7", "2.2.1.8" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in VIOS", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "IV58413" ], "fixedIn": "2.2.1.9", "ifixes": [ "IV58413s9a.140421.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.20", "ntp.rte:6.1.6.0-6.1.6.1" ], "issued": "20140612", "updated": "null", "siblings": [ "5300-12:IV59636", "6100-07:IV58413", "6100-08:IV58068", "6100-09:IV56213", "7100-01:IV56575", "7100-02:IV55365", "7100-03:IV56324" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar", "cvss": [ "CVE-2013-5211:5.0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2", "2.2.2.3", "2.2.2.4" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in VIOS", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "IV58068" ], "fixedIn": "2.2.2.5", "ifixes": [ "IV58068s4a.140421.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.17", "ntp.rte:6.1.6.0-6.1.6.1" ], "issued": "20140612", "updated": "null", "siblings": [ "5300-12:IV59636", "6100-07:IV58413", "6100-08:IV58068", "6100-09:IV56213", "7100-01:IV56575", "7100-02:IV55365", "7100-03:IV56324" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar", "cvss": [ "CVE-2013-5211:5.0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in VIOS", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "IV56213" ], "fixedIn": "2.2.3.3", "ifixes": [ "IV56213s1a.140421.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.1", "ntp.rte:6.1.6.0-6.1.6.1" ], "issued": "20140612", "updated": "null", "siblings": [ "5300-12:IV59636", "6100-07:IV58413", "6100-08:IV58068", "6100-09:IV56213", "7100-01:IV56575", "7100-02:IV55365", "7100-03:IV56324" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar", "cvss": [ "CVE-2013-5211:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "CVE-2014-9294", "CVE-2014-9295" ], "fixedIn": "6100-08-07", "ifixes": [ "IV68426m5b.150204.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.18", "ntp.rte:6.1.6.0-6.1.6.2" ], "issued": "20150210", "updated": "null", "siblings": [ "5300-12:IV68427", "6100-08:IV68426", "6100-09:IV68428", "7100-02:IV68429", "7100-03:IV68430" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar", "cvss": [ "CVE-2014-9293:5.0", "CVE-2014-9294:5.0", "CVE-2014-9295:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "CVE-2014-9294", "CVE-2014-9295" ], "fixedIn": "6100-09-05", "ifixes": [ "IV68428s4a.150109.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.30", "ntp.rte:6.1.6.0-6.1.6.2" ], "issued": "20150210", "updated": "null", "siblings": [ "5300-12:IV68427", "6100-08:IV68426", "6100-09:IV68428", "7100-02:IV68429", "7100-03:IV68430" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar", "cvss": [ "CVE-2014-9293:5.0", "CVE-2014-9294:5.0", "CVE-2014-9295:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "CVE-2014-9294", "CVE-2014-9295" ], "fixedIn": "7100-02-07", "ifixes": [ "IV68429m5b.150204.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.18", "ntp.rte:7.1.0.0-7.1.0.2" ], "issued": "20150210", "updated": "null", "siblings": [ "5300-12:IV68427", "6100-08:IV68426", "6100-09:IV68428", "7100-02:IV68429", "7100-03:IV68430" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar", "cvss": [ "CVE-2014-9293:5.0", "CVE-2014-9294:5.0", "CVE-2014-9295:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "CVE-2014-9294", "CVE-2014-9295" ], "fixedIn": "7100-03-05", "ifixes": [ "IV68430s4a.150109.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.30", "ntp.rte:7.1.0.0-7.1.0.2" ], "issued": "20150210", "updated": "null", "siblings": [ "5300-12:IV68427", "6100-08:IV68426", "6100-09:IV68428", "7100-02:IV68429", "7100-03:IV68430" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar", "cvss": [ "CVE-2014-9293:5.0", "CVE-2014-9294:5.0", "CVE-2014-9295:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "CVE-2014-9294", "CVE-2014-9295" ], "fixedIn": "null", "ifixes": [ "IV68427m9a.150203.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20150210", "updated": "null", "siblings": [ "5300-12:IV68427", "6100-08:IV68426", "6100-09:IV68428", "7100-02:IV68429", "7100-03:IV68430" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar", "cvss": [ "CVE-2014-9293:5.0", "CVE-2014-9294:5.0", "CVE-2014-9295:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in VIOS", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "CVE-2014-9294", "CVE-2014-9295" ], "fixedIn": "2.2.2.7", "ifixes": [ "IV68426m5b.150204.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.18", "ntp.rte:6.1.6.0-6.1.6.2" ], "issued": "20150210", "updated": "null", "siblings": [ "5300-12:IV68427", "6100-08:IV68426", "6100-09:IV68428", "7100-02:IV68429", "7100-03:IV68430" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar", "cvss": [ "CVE-2014-9293:5.0", "CVE-2014-9294:5.0", "CVE-2014-9295:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4" ], "apAbstract": "Network Time Protocol (NTP) vulnerability in VIOS", "aparNo": "CVE-2013-5211", "aparNoSet": [ "CVE-2013-5211", "CVE-2014-9294", "CVE-2014-9295" ], "fixedIn": "2.2.3.5", "ifixes": [ "IV68428s4a.150109.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.30", "ntp.rte:6.1.6.0-6.1.6.2" ], "issued": "20150210", "updated": "null", "siblings": [ "5300-12:IV68427", "6100-08:IV68426", "6100-09:IV68428", "7100-02:IV68429", "7100-03:IV68430" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar", "cvss": [ "CVE-2014-9293:5.0", "CVE-2014-9294:5.0", "CVE-2014-9295:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java" ], "apAbstract": "Multiple Java vulnerabilities", "aparNo": "CVE-2013-5456", "aparNoSet": [ "CVE-2013-3829", "CVE-2013-4041", "CVE-2013-5372", "CVE-2013-5375", "CVE-2013-5456", "CVE-2013-5457", "CVE-2013-5458", "CVE-2013-5772", "CVE-2013-5774", "CVE-2013-5776", "CVE-2013-5778", "CVE-2013-5780", "CVE-2013-5782", "CVE-2013-5783", "CVE-2013-5784", "CVE-2013-5787", "CVE-2013-5788", "CVE-2013-5789", "CVE-2013-5790", "CVE-2013-5797", "CVE-2013-5800", "CVE-2013-5801", "CVE-2013-5802", "CVE-2013-5803", "CVE-2013-5804", "CVE-2013-5809", "CVE-2013-5812", "CVE-2013-5814", "CVE-2013-5817", "CVE-2013-5818", "CVE-2013-5819", "CVE-2013-5820", "CVE-2013-5823", "CVE-2013-5824", "CVE-2013-5825", "CVE-2013-5829", "CVE-2013-5830", "CVE-2013-5831", "CVE-2013-5832", "CVE-2013-5838", "CVE-2013-5840", "CVE-2013-5842", "CVE-2013-5843", "CVE-2013-5848", "CVE-2013-5849", "CVE-2013-5850", "CVE-2013-5851" ], "fixedIn": "See advisory", "ifixes": [ "see", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_advisory.asc", "filesets": [ "Java5:5.0.0.0-5.0.0.560", "Java6:6.0.0.0-6.0.0.435", "Java7:7.0.0.0-7.0.0.110" ], "issued": "20131211", "updated": "20140203", "siblings": [], "downloadUrl": "see advisory", "cvss": [ "CVE-2013-5456:9.3", "CVE-2013-5457:9.3", "CVE-2013-5458:9.3", "CVE-2013-4041:6.8", "CVE-2013-5375:4.3", "CVE-2013-5372:4.3", "CVE-2013-5843:10", "CVE-2013-5789:10", "CVE-2013-5830:10", "CVE-2013-5829:10", "CVE-2013-5787:10", "CVE-2013-5788:10", "CVE-2013-5824:10", "CVE-2013-5842:10", "CVE-2013-5782:10", "CVE-2013-5817:10", "CVE-2013-5809:10", "CVE-2013-5814:10", "CVE-2013-5832:9.3", "CVE-2013-5850:9.3", "CVE-2013-5838:9.3", "CVE-2013-5802:7.5", "CVE-2013-5812:6.4", "CVE-2013-5804:6.4", "CVE-2013-5783:6.4", "CVE-2013-3829:6.4", "CVE-2013-5823:5", "CVE-2013-5831:5", "CVE-2013-5820:5", "CVE-2013-5819:5", "CVE-2013-5818:5", "CVE-2013-5848:5", "CVE-2013-5776:5", "CVE-2013-5774:5", "CVE-2013-5825:5", "CVE-2013-5840:5", "CVE-2013-5801:5", "CVE-2013-5778:5", "CVE-2013-5851:5", "CVE-2013-5800:4.3", "CVE-2013-5784:4.3", "CVE-2013-5849:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Openssl Heartbleed vulnerability", "aparNo": "CVE-2014-0160", "aparNoSet": [ "CVE-2014-0160" ], "fixedIn": "Openssl-1.0.1.502", "ifixes": [ "Openssl-1.0.1.502" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory7.doc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.501" ], "issued": "20140410", "updated": "20140415", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source\u003daixbp\u0026lang\u003den_US\u0026S_PKG\u003dopenssl\u0026cp\u003dUTF-8", "cvss": [ "CVE-2014-0160:5.0", "CVE-2014-0076:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2014-0191", "aparNoSet": [ "CVE-2014-0191", "IV62225" ], "fixedIn": "6100-09-04", "ifixes": [ "IV62225m3a.140708.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.3" ], "issued": "20140815", "updated": "null", "siblings": [ "5300-12:IV62327", "6100-07:IV62224", "6100-08:IV62146", "6100-09:IV62225", "7100-01:IV61093", "7100-02:IV61090", "7100-03:IV61027" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar", "cvss": [ "CVE-2006-0987:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04" ], "apAbstract": "AIX libxml2 vulnerability", "aparNo": "CVE-2014-0191", "aparNoSet": [ "CVE-2014-0191", "IV62447" ], "fixedIn": "6100-08-05", "ifixes": [ "IV62447s4a.140715.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc", "filesets": [ "bos.rte.control:6.1.8.0-6.1.8.17" ], "issued": "20140815", "updated": "null", "siblings": [ "6100-08:IV62447", "6100-09:IV62448", "7100-02:IV62449", "7100-03:IV62450" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar", "cvss": [ "CVE-2014-0191:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03" ], "apAbstract": "AIX libxml2 vulnerability", "aparNo": "CVE-2014-0191", "aparNoSet": [ "CVE-2014-0191", "IV62448" ], "fixedIn": "6100-09-04", "ifixes": [ "IV62448s3a.140715.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc", "filesets": [ "bos.rte.control:6.1.9.0-6.1.9.15" ], "issued": "20140815", "updated": "null", "siblings": [ "6100-08:IV62447", "6100-09:IV62448", "7100-02:IV62449", "7100-03:IV62450" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar", "cvss": [ "CVE-2014-0191:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04" ], "apAbstract": "AIX libxml2 vulnerability", "aparNo": "CVE-2014-0191", "aparNoSet": [ "CVE-2014-0191", "IV62449" ], "fixedIn": "7100-02-05", "ifixes": [ "IV62449s4a.140715.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc", "filesets": [ "bos.rte.control:7.1.2.0-7.1.2.17" ], "issued": "20140815", "updated": "null", "siblings": [ "6100-08:IV62447", "6100-09:IV62448", "7100-02:IV62449", "7100-03:IV62450" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar", "cvss": [ "CVE-2014-0191:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03" ], "apAbstract": "AIX libxml2 vulnerability", "aparNo": "CVE-2014-0191", "aparNoSet": [ "CVE-2014-0191", "IV62450" ], "fixedIn": "7100-03-04", "ifixes": [ "IV62450s3a.140715.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc", "filesets": [ "bos.rte.control:7.1.3.0-7.1.3.15" ], "issued": "20140815", "updated": "null", "siblings": [ "6100-08:IV62447", "6100-09:IV62448", "7100-02:IV62449", "7100-03:IV62450" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar", "cvss": [ "CVE-2014-0191:5.0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4" ], "apAbstract": "VIOS libxml2 vulnerability", "aparNo": "CVE-2014-0191", "aparNoSet": [ "CVE-2014-0191" ], "fixedIn": "2.2.2.5", "ifixes": [ "IV62447s4a.140715.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc", "filesets": [ "bos.rte.control:6.1.8.0-6.1.8.17" ], "issued": "20140815", "updated": "null", "siblings": [ "6100-08:IV62447", "6100-09:IV62448", "7100-02:IV62449", "7100-03:IV62450" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar", "cvss": [ "CVE-2014-0191:5.0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3" ], "apAbstract": "VIOS libxml2 vulnerability", "aparNo": "CVE-2014-0191", "aparNoSet": [ "CVE-2014-0191" ], "fixedIn": "2.3.3.4", "ifixes": [ "IV62448s3a.140715.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc", "filesets": [ "bos.rte.control:6.1.9.0-6.1.9.15" ], "issued": "20140815", "updated": "null", "siblings": [ "6100-08:IV62447", "6100-09:IV62448", "7100-02:IV62449", "7100-03:IV62450" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar", "cvss": [ "CVE-2014-0191:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "AIX OpenSSL Vulnerabilities (Multiple CVEs)", "aparNo": "CVE-2014-0224", "aparNoSet": [ "CVE-2014-0195", "CVE-2014-0198", "CVE-2014-0221", "CVE-2014-0224", "CVE-2014-3470" ], "fixedIn": "Openssl-1.0.1.511 openssl-0.9.8.2502 openssl-12.9.8.2502", "ifixes": [ "openssl-1.0.1.511.tar.Z", "openssl-0.9.8.2502.tar.Z", "openssl-12.9.8.2502.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.510", "openssl.base:0.9.8.401-0.9.8.2501", "openssl.base:12.9.8.1100-12.9.8.2501" ], "issued": "20140611", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2014-0224:5.8", "CVE-2014-0221:4.3", "CVE-2014-0195:7.5", "CVE-2014-0198:4.3", "CVE-2014-3470:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java" ], "apAbstract": "AIX Java Multiple Vulnerabilities (Oracle Java 2014 CPU)", "aparNo": "CVE-2014-0428", "aparNoSet": [ "CVE-2013-5878", "CVE-2013-5884", "CVE-2013-5887", "CVE-2013-5888", "CVE-2013-5889", "CVE-2013-5896", "CVE-2013-5898", "CVE-2013-5899", "CVE-2013-5907", "CVE-2013-5910", "CVE-2014-0368", "CVE-2014-0373", "CVE-2014-0375", "CVE-2014-0376", "CVE-2014-0387", "CVE-2014-0403", "CVE-2014-0410", "CVE-2014-0411", "CVE-2014-0415", "CVE-2014-0416", "CVE-2014-0417", "CVE-2014-0422", "CVE-2014-0423", "CVE-2014-0424", "CVE-2014-0428" ], "fixedIn": "See advisory", "ifixes": [ "see", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2014_advisory.asc", "filesets": [ "Java5:5.0.0.0-5.0.0.559", "Java6:6.0.0.0-6.0.0.434", "Java7:7.0.0.0-7.0.0.109" ], "issued": "20140306", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003ddka\u0026S_PKG\u003daix64j7b\u0026S_TACT\u003d105AGX05\u0026S_CMP\u003dJDK", "cvss": [ "CVE-2014-0428:10", "CVE-2014-0422:10", "CVE-2013-5907:10", "CVE-2014-0415:10", "CVE-2014-0410:10", "CVE-2013-5889:9.3", "CVE-2014-0417:9.3", "CVE-2014-0387:7.6", "CVE-2014-0424:7.5", "CVE-2013-5878:7.5", "CVE-2014-0373:7.5", "CVE-2014-0375:5.8", "CVE-2014-0403:5.8", "CVE-2014-0423:5.5", "CVE-2014-0376:5", "CVE-2013-5910:5", "CVE-2013-5884:5", "CVE-2013-5896:5", "CVE-2013-5899:5", "CVE-2014-0416:5", "CVE-2013-5887:5", "CVE-2014-0368:5", "CVE-2013-5888:4.6", "CVE-2013-5898:4", "CVE-2014-0411:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java" ], "apAbstract": "Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition", "aparNo": "CVE-2014-0457", "aparNoSet": [ "CVE-2013-6629", "CVE-2013-6954", "CVE-2014-0429", "CVE-2014-0446", "CVE-2014-0448", "CVE-2014-0449", "CVE-2014-0451", "CVE-2014-0452", "CVE-2014-0453", "CVE-2014-0454", "CVE-2014-0455", "CVE-2014-0457", "CVE-2014-0458", "CVE-2014-0459", "CVE-2014-0460", "CVE-2014-0461", "CVE-2014-0878", "CVE-2014-1876", "CVE-2014-2398", "CVE-2014-2401", "CVE-2014-2402", "CVE-2014-2409", "CVE-2014-2412", "CVE-2014-2414", "CVE-2014-2420", "CVE-2014-2421", "CVE-2014-2423", "CVE-2014-2427", "CVE-2014-2428" ], "fixedIn": "See advisory", "ifixes": [ "see", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_apr2014_advisory.asc", "filesets": [ "Java5:5.0.0.0-5.0.0.575", "Java6:6.0.0.0-6.0.0.455", "Java7:7.0.0.0-7.0.0.130", "Java7:7.1.0.0-7.1.0.10" ], "issued": "20140619", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003ddka", "cvss": [ "CVE-2014-0457:10", "CVE-2014-2421:10", "CVE-2014-0429:10", "CVE-2014-0461:9.3", "CVE-2014-0455:9.3", "CVE-2014-2428:7.6", "CVE-2014-0448:7.6", "CVE-2014-0454:7.5", "CVE-2014-0446:7.5", "CVE-2014-0452:7.5", "CVE-2014-0451:7.5", "CVE-2014-2402:7.5", "CVE-2014-2423:7.5", "CVE-2014-2427:7.5", "CVE-2014-0458:7.5", "CVE-2014-2414:7.5", "CVE-2014-2412:7.5", "CVE-2014-2409:6.4", "CVE-2014-0460:5.8", "CVE-2013-6954:5", "CVE-2013-6629:5", "CVE-2014-2401:5", "CVE-2014-0449:5", "CVE-2014-0459:4.3", "CVE-2014-0453:4", "CVE-2014-2398:3.5", "CVE-2014-1876:2.6", "CVE-2014-2420:2.6", "CVE-2014-0878:5.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "AIX OpenSSH Vulnerability", "aparNo": "CVE-2014-2532", "aparNoSet": [ "CVE-2014-2532", "CVE-2014-2653" ], "fixedIn": "Openssh-6.0.0.6107", "ifixes": [ "OpenSSH_6.0.0.6107.tar.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3619\u0026myns\u003dpwraix71\u0026mync\u003dE", "filesets": [ "openssh.base:4.0.0.5200-6.0.0.6106" ], "issued": "20140617", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2014-2532:5", "CVE-2014-2653:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssh" ], "apAbstract": "AIX OpenSSH Vulnerability", "aparNo": "CVE-2014-2532", "aparNoSet": [ "CVE-2014-2532", "CVE-2014-2653" ], "fixedIn": "Openssh-6.0.0.6107", "ifixes": [ "OpenSSH_6.0.0.6107.tar.Z", "DEPRECATED::6201_mfix" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc", "filesets": [ "openssh.base:4.0.0.5200-6.0.0.6106" ], "issued": "20140617", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2014-2532:5", "CVE-2014-2653:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "AIX Malloc vulnerability", "aparNo": "CVE-2014-3074", "aparNoSet": [ "CVE-2014-3074", "IV62812" ], "fixedIn": "interim fix only", "ifixes": [ "IV62812s9a.140728.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc", "filesets": [ "bos.rte.libc:5.3.12.0-5.3.12.9" ], "issued": "20140630", "updated": "20150311", "siblings": [ "5300-12:IV62812", "6100-07:IV62802", "6100-08:IV62803", "6100-09:IV62805", "7100-01:IV62806", "7100-02:IV62807", "7100-03:IV62808" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar", "cvss": [ "CVE-2014-3074:7.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08", "6100-07-09" ], "apAbstract": "AIX Malloc vulnerability", "aparNo": "CVE-2014-3074", "aparNoSet": [ "CVE-2014-3074", "IV62802" ], "fixedIn": "6100-07-10", "ifixes": [ "IV62802s9a.140730.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc", "filesets": [ "bos.rte.libc:6.1.7.0-6.1.7.20" ], "issued": "20140630", "updated": "20150311", "siblings": [ "5300-12:IV62812", "6100-07:IV62802", "6100-08:IV62803", "6100-09:IV62805", "7100-01:IV62806", "7100-02:IV62807", "7100-03:IV62808" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar", "cvss": [ "CVE-2014-3074:7.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05" ], "apAbstract": "AIX Malloc vulnerability", "aparNo": "CVE-2014-3074", "aparNoSet": [ "CVE-2014-3074", "IV62803" ], "fixedIn": "6100-08-06", "ifixes": [ "IV62803s4a.140730.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc", "filesets": [ "bos.rte.libc:6.1.8.0-6.1.8.18" ], "issued": "20140630", "updated": "20150311", "siblings": [ "5300-12:IV62812", "6100-07:IV62802", "6100-08:IV62803", "6100-09:IV62805", "7100-01:IV62806", "7100-02:IV62807", "7100-03:IV62808" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar", "cvss": [ "CVE-2014-3074:7.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03" ], "apAbstract": "AIX Malloc vulnerability", "aparNo": "CVE-2014-3074", "aparNoSet": [ "CVE-2014-3074", "IV62805" ], "fixedIn": "6100-09-04", "ifixes": [ "IV62805s3a.140731.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc", "filesets": [ "bos.rte.libc:6.1.9.0-6.1.9.15" ], "issued": "20140630", "updated": "20150311", "siblings": [ "5300-12:IV62812", "6100-07:IV62802", "6100-08:IV62803", "6100-09:IV62805", "7100-01:IV62806", "7100-02:IV62807", "7100-03:IV62808" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar", "cvss": [ "CVE-2014-3074:7.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08", "7100-01-09" ], "apAbstract": "AIX Malloc vulnerability", "aparNo": "CVE-2014-3074", "aparNoSet": [ "CVE-2014-3074", "IV62806" ], "fixedIn": "7100-01-10", "ifixes": [ "IV62806s9a.140730.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc", "filesets": [ "bos.rte.libc:7.1.1.0-7.1.1.20" ], "issued": "20140630", "updated": "20150311", "siblings": [ "5300-12:IV62812", "6100-07:IV62802", "6100-08:IV62803", "6100-09:IV62805", "7100-01:IV62806", "7100-02:IV62807", "7100-03:IV62808" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar", "cvss": [ "CVE-2014-3074:7.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05" ], "apAbstract": "AIX Malloc vulnerability", "aparNo": "CVE-2014-3074", "aparNoSet": [ "CVE-2014-3074", "IV62807" ], "fixedIn": "7100-02-06", "ifixes": [ "IV62807s4a.140730.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc", "filesets": [ "bos.rte.libc:7.1.2.0-7.1.2.18" ], "issued": "20140630", "updated": "20150310", "siblings": [ "5300-12:IV62812", "6100-07:IV62802", "6100-08:IV62803", "6100-09:IV62805", "7100-01:IV62806", "7100-02:IV62807", "7100-03:IV62808" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar", "cvss": [ "CVE-2014-3074:7.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03" ], "apAbstract": "AIX Malloc vulnerability", "aparNo": "CVE-2014-3074", "aparNoSet": [ "CVE-2014-3074", "IV62808" ], "fixedIn": "7100-03-04", "ifixes": [ "IV62808s3a.140731.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc", "filesets": [ "bos.rte.libc:7.1.3.0-7.1.3.15" ], "issued": "20140630", "updated": "20150311", "siblings": [ "5300-12:IV62812", "6100-07:IV62802", "6100-08:IV62803", "6100-09:IV62805", "7100-01:IV62806", "7100-02:IV62807", "7100-03:IV62808" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar", "cvss": [ "CVE-2014-3074:7.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7", "2.2.1.8" ], "apAbstract": "VIOS Malloc vulnerability", "aparNo": "CVE-2014-3074", "aparNoSet": [ "CVE-2014-3074", "IV62802" ], "fixedIn": "2.2.1.9", "ifixes": [ "IV62802s9a.140730.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc", "filesets": [ "bos.rte.libc:6.1.7.0-6.1.7.20" ], "issued": "20140630", "updated": "20150311", "siblings": [ "6100-07:IV61313", "6100-08:IV61311", "6100-09:IV60935", "7100-01:IV61315", "7100-02:IV61314", "7100-03:IV60940" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar", "cvss": [ "CVE-2014-3074:7.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2", "2.2.2.3", "2.2.2.4" ], "apAbstract": "VIOS Malloc vulnerability", "aparNo": "CVE-2014-3074", "aparNoSet": [ "CVE-2014-3074", "IV62803" ], "fixedIn": "2.2.2.5", "ifixes": [ "IV62803s4a.140730.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc", "filesets": [ "bos.rte.libc:6.1.8.0-6.1.8.18" ], "issued": "20140630", "updated": "20150311", "siblings": [ "5300-12:IV62812", "6100-07:IV62802", "6100-08:IV62803", "6100-09:IV62805", "7100-01:IV62806", "7100-02:IV62807", "7100-03:IV62808" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar", "cvss": [ "CVE-2014-3074:7.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2", "2.2.3.3" ], "apAbstract": "VIOS Malloc vulnerability", "aparNo": "CVE-2014-3074", "aparNoSet": [ "CVE-2014-3074", "IV62805" ], "fixedIn": "2.2.3.4", "ifixes": [ "IV62805s3a.140731.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc", "filesets": [ "bos.rte.libc:6.1.9.0-6.1.9.15" ], "issued": "20140630", "updated": "20150311", "siblings": [ "5300-12:IV62812", "6100-07:IV62802", "6100-08:IV62803", "6100-09:IV62805", "7100-01:IV62806", "7100-02:IV62807", "7100-03:IV62808" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar", "cvss": [ "CVE-2014-3074:7.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "AIX OpenSSL Denial of Service due to double free and others", "aparNo": "CVE-2014-3505", "aparNoSet": [ "CVE-2014-3505", "CVE-2014-3506", "CVE-2014-3507", "CVE-2014-3508", "CVE-2014-3509", "CVE-2014-3510", "CVE-2014-3511", "CVE-2014-3512", "CVE-2014-5139" ], "fixedIn": "See advisory", "ifixes": [ "101_fix.140902.epkg.Z", "098_fix.140902.epkg.Z", "1298_fix.140902.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.511", "openssl.base:0.9.8.401-0.9.8.2502", "openssl.base:12.9.8.1100-12.9.8.2502" ], "issued": "20140909", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix10.tar", "cvss": [ "CVE-2014-3505:5", "CVE-2014-3506:5", "CVE-2014-3507:5", "CVE-2014-3508:4.3", "CVE-2014-3509:4.3", "CVE-2014-3510:4.3", "CVE-2014-3511:4.3", "CVE-2014-3512:5", "CVE-2014-5139:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "AIX OpenSSL Denial of Service due to memory leak in DTLS / AIX OpenSSL Patch to mitigate CVE-2014-3566 / AIX OpenSSL Denial of Service due to memory consumption", "aparNo": "CVE-2014-3513", "aparNoSet": [ "CVE-2014-3513", "CVE-2014-3566", "CVE-2014-3567" ], "fixedIn": "See advisory", "ifixes": [ "IV66250s9a.141027.epkg.Z", "IV66250s9b.141027.epkg.Z", "IV66250s9c.141027.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.512", "openssl.base:0.9.8.401-0.9.8.2503", "openssl.base:12.9.8.1100-12.9.8.2503" ], "issued": "20141029", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix11.tar", "cvss": [ "CVE-2014-3513:5", "CVE-2014-3566:4.3", "CVE-2014-3567:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Tivoli Directory Server" ], "apAbstract": "A security vulnerability has been identified in IBM Tivoli Directory Server shipped with AIX/VIOS", "aparNo": "CVE-2014-3566", "aparNoSet": [ "CVE-2014-3566" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003dswg21687611", "filesets": [ "Idsldap.*:6.0:6.1:6.2:6.3:6.3.1" ], "issued": "20141021", "updated": "null", "siblings": [], "downloadUrl": "null", "cvss": [ "CVE-2014-3566:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "Vulnerability in SSLv3 affects AIX", "aparNo": "CVE-2014-3566", "aparNoSet": [ "CVE-2014-3566", "IV69768" ], "fixedIn": "6100-08-07", "ifixes": [ "IV69768s6a.150515.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc", "filesets": [ "bos.net.tcp.server:6.1.0.0-6.1.8.18", "bos.net.tcp.client:6.1.0.0-6.1.8.19" ], "issued": "20150617", "updated": "20150626", "siblings": [ "6100-08:IV69768", "6100-09:IV73324", "7100-02:IV73319", "7100-03:IV73316" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar", "cvss": [ "CVE-2014-3566:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05" ], "apAbstract": "Vulnerability in SSLv3 affects AIX", "aparNo": "CVE-2014-3566", "aparNoSet": [ "CVE-2014-3566", "IV73324" ], "fixedIn": "6100-09-06", "ifixes": [ "IV73324s5a.150515.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc", "filesets": [ "bos.net.tcp.server:6.1.0.0-6.1.9.45", "bos.net.tcp.client:6.1.0.0-6.1.9.48" ], "issued": "20150617", "updated": "20150626", "siblings": [ "6100-08:IV69768", "6100-09:IV73324", "7100-02:IV73319", "7100-03:IV73316" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar", "cvss": [ "CVE-2014-3566:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "Vulnerability in SSLv3 affects AIX", "aparNo": "CVE-2014-3566", "aparNoSet": [ "CVE-2014-3566", "IV73319" ], "fixedIn": "7100-03-06", "ifixes": [ "IV73319s6a.150515.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc", "filesets": [ "bos.net.tcp.server:7.1.3.0-7.1.2.18", "bos.net.tcp.client:7.1.3.0-7.1.2.19" ], "issued": "20150617", "updated": "20150626", "siblings": [ "6100-08:IV69768", "6100-09:IV73324", "7100-02:IV73319", "7100-03:IV73316" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar", "cvss": [ "CVE-2014-3566:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05" ], "apAbstract": "Vulnerability in SSLv3 affects AIX", "aparNo": "CVE-2014-3566", "aparNoSet": [ "CVE-2014-3566", "IV73316" ], "fixedIn": "7100-03-06", "ifixes": [ "IV73316s5a.150515.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc", "filesets": [ "bos.net.tcp.server:7.1.3.0-7.1.3.45", "bos.net.tcp.client:7.1.3.0-7.1.3.48" ], "issued": "20150617", "updated": "20150626", "siblings": [ "6100-08:IV69768", "6100-09:IV73324", "7100-02:IV73319", "7100-03:IV73316" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar", "cvss": [ "CVE-2014-3566:4.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6" ], "apAbstract": "Vulnerability in SSLv3 affects VIOS", "aparNo": "CVE-2014-3566", "aparNoSet": [ "CVE-2014-3566", "IV69768" ], "fixedIn": "2.2.2.7", "ifixes": [ "IV69768s6a.150515.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc", "filesets": [ "bos.net.tcp.server:6.1.0.0-6.1.8.18", "bos.net.tcp.client:6.1.0.0-6.1.8.19" ], "issued": "20150617", "updated": "20150618", "siblings": [ "6100-08:IV69768", "6100-09:IV73324", "7100-02:IV73319", "7100-03:IV73316" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar", "cvss": [ "CVE-2014-3566:4.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50" ], "apAbstract": "Vulnerability in SSLv3 affects VIOS", "aparNo": "CVE-2014-3566", "aparNoSet": [ "CVE-2014-3566", "IV73324" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV73324s5a.150515.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.45", "bos.net.tcp.client:6.1.9.0-6.1.9.48" ], "issued": "20150617", "updated": "20150618", "siblings": [ "6100-08:IV69768", "6100-09:IV73324", "7100-02:IV73319", "7100-03:IV73316" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar", "cvss": [ "CVE-2014-3566:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Multiple Security vulnerabilities in AIX OpenSSL", "aparNo": "CVE-2014-3570", "aparNoSet": [ "CVE-2014-3570", "CVE-2014-3571", "CVE-2014-3572", "CVE-2014-8275", "CVE-2015-0204", "CVE-2015-0205", "CVE-2015-0206" ], "fixedIn": "See advisory", "ifixes": [ "IV69033s9a.150129.epkg.Z", "IV69033s9b.150129.epkg.Z", "IV69033s9c.150129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory12.asc", "filesets": [ "openssl.base:0.9.8.401-0.9.8.2504", "openssl.base:1.0.1.500-1.0.1.513", "openssl.base:12.9.8.1100-12.9.8.2504" ], "issued": "20150204", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix12.tar", "cvss": [ "CVE-2014-3570:2.6", "CVE-2014-3571:5", "CVE-2014-3572:1.2", "CVE-2014-8275:1.2", "CVE-2015-0204:1.2", "CVE-2015-0205:2.1", "CVE-2015-0206:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "rsyslog" ], "apAbstract": "Open Source RSyslog vulnerability", "aparNo": "CVE-2014-3634", "aparNoSet": [ "CVE-2014-3634", "CVE-2014-3683" ], "fixedIn": "next level", "ifixes": [ "IV66633s0a.141107.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rsyslog_advisory.asc", "filesets": [ "rsyslog.base:5.8.6.1-5.8.6.3" ], "issued": "20141114", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rsyslog_fix.tar", "cvss": [ "CVE-2014-3634:5.0", "CVE-2014-3683:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java" ], "apAbstract": "Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition", "aparNo": "CVE-2014-4227", "aparNoSet": [ "CVE-2014-3086", "CVE-2014-4208", "CVE-2014-4209", "CVE-2014-4218", "CVE-2014-4219", "CVE-2014-4220", "CVE-2014-4221", "CVE-2014-4227", "CVE-2014-4244", "CVE-2014-4252", "CVE-2014-4262", "CVE-2014-4263", "CVE-2014-4265", "CVE-2014-4266", "CVE-2014-4268" ], "fixedIn": "See advisory", "ifixes": [ "see", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jul2014_advisory.asc", "filesets": [ "Java5:5.0.0.0-5.0.0.579", "Java6:6.0.0.0-6.0.0.459", "Java7:7.0.0.0-7.0.0.134", "Java7:7.1.0.0-7.1.0.14" ], "issued": "20140818", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003ddka", "cvss": [ "CVE-2014-4227:10", "CVE-2014-4262:9.3", "CVE-2014-4219:9.3", "CVE-2014-4209:6.4", "CVE-2014-4220:5", "CVE-2014-4268:5", "CVE-2014-4218:5", "CVE-2014-4252:5", "CVE-2014-4266:5", "CVE-2014-4265:5", "CVE-2014-4221:4.3", "CVE-2014-4263:4", "CVE-2014-4244:4", "CVE-2014-4208:2.6", "CVE-2014-3086:9.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Kerberos" ], "apAbstract": "Multiple Security vulnerabilities in IBM NAS", "aparNo": "CVE-2014-4341", "aparNoSet": [ "CVE-2014-4341", "CVE-2014-4343", "CVE-2014-4344" ], "fixedIn": "See advisory", "ifixes": [ "1506_fix.140813.epkg.Z", "1601_fix.140813.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc", "filesets": [ "krb5.server.rte:1.5.0.0-1.6.0.1", "krb5.client.rte:1.5.0.0-1.6.0.1" ], "issued": "20140828", "updated": "20140905", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nas1_fix.tar", "cvss": [ "CVE-2014-4341:5.0", "CVE-2014-4343:5.0", "CVE-2014-4344:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-10", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09", "7100-01-00", "7100-01-01", "7100-01-10", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08", "7100-01-09", "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06", "7100-02-07", "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07", "7100-03-08", "7100-03-09", "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03", "7100-04-04", "7100-04-05", "7100-04-06", "7100-05-01", "7100-05-02" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "CVE-2014-5209", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ06400s9a.180514.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-01", "7200-00-02", "7200-00-03", "7200-00-04", "7200-00-05", "7200-00-06", "7200-01-00", "7200-01-01", "7200-01-02", "7200-01-03", "7200-01-04", "7200-02-01", "7200-02-02" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "CVE-2014-5209", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ06400s9a.180514.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.0.10", "2.2.0.11", "2.2.0.12", "2.2.0.13", "2.2.1.1", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7", "2.2.1.8", "2.2.1.9", "2.2.2.1", "2.2.2.2", "2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6", "2.2.2.70", "2.2.3.0", "2.2.3.1", "2.2.3.2", "2.2.3.3", "2.2.3.4", "2.2.3.50", "2.2.3.51", "2.2.3.52", "2.2.3.60", "2.2.3.70", "2.2.3.80", "2.2.3.90", "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.21", "2.2.4.22", "2.2.4.23", "2.2.4.30", "2.2.4.40", "2.2.4.50", "2.2.4.60", "2.2.5.0", "2.2.5.10", "2.2.5.20", "2.2.5.30", "2.2.5.40", "2.2.6.10", "2.2.6.21" ], "apAbstract": "Vulnerabilities in NTP affect VIOS", "aparNo": "CVE-2014-5209", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ06400s9a.180514.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Kerberos" ], "apAbstract": "AIX NAS vulnerability", "aparNo": "CVE-2014-5351", "aparNoSet": [ "CVE-2014-5351" ], "fixedIn": "next TL", "ifixes": [ "NAS_1.X.0.X_aix_image.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nas_advisory2.asc", "filesets": [ "krb5.client.rte:1.5.0.7-1.6.0.2", "krb5.server.rte:1.5.0.7-1.6.0.2" ], "issued": "20150120", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2014-5351:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "AIX NAS (kerberos)" ], "apAbstract": "Multiple Security vulnerabilities in IBM NAS(kerberos)", "aparNo": "CVE-2014-5352", "aparNoSet": [ "CVE-2014-5352", "CVE-2014-5355", "CVE-2014-9421", "CVE-2014-9422", "CVE-2014-9423" ], "fixedIn": "See advisory", "ifixes": [ "1507c_fix.150404.epkg.Z", "1507s_fix.150407.epkg.Z", "1602c_fix.150404.epkg.Z", "1602s_fix.150404.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nas_advisory3.asc", "filesets": [ "krb5.client.rte:1.4.0.8-1.6.0.2", "krb5.server.rte:1.4.0.8-1.6.0.2" ], "issued": "20150521", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nas3_fix.tar", "cvss": [ "CVE-2014-5352:9.0", "CVE-2014-5355:5.0", "CVE-2014-9421:9.0", "CVE-2014-9422:6.1", "CVE-2014-9423:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java" ], "apAbstract": "Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition; issues in the Oracle October 2014 Critical Patch Update plus the POODLE SSLv3 vulnerability and", "aparNo": "CVE-2014-6513", "aparNoSet": [ "CVE-2014-3065", "CVE-2014-3566", "CVE-2014-4288", "CVE-2014-6457", "CVE-2014-6458", "CVE-2014-6466", "CVE-2014-6476", "CVE-2014-6492", "CVE-2014-6493", "CVE-2014-6502", "CVE-2014-6503", "CVE-2014-6506", "CVE-2014-6511", "CVE-2014-6512", "CVE-2014-6513", "CVE-2014-6515", "CVE-2014-6527", "CVE-2014-6531", "CVE-2014-6532", "CVE-2014-6558" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_oct2014_advisory.asc", "filesets": [ "Java5.sdk:\u003c5.0.0.580", "Java6.sdk:\u003c6.0.0.460", "Java7.sdk:\u003c7.0.0.135", "Java71.sdk:\u003c7.1.0.15", "Java5_64.sdk:\u003c5.0.0.580", "Java6_64.sdk:\u003c6.0.0.460", "Java7_64.sdk:\u003c7.0.0.135", "Java71_64.sdk:\u003c7.1.0.15" ], "issued": "20141026", "updated": "20141114", "siblings": [], "downloadUrl": "https://www.ibm.com/developerworks/java/jdk/aix/service.html#levels", "cvss": [ "CVE-2014-6513:10", "CVE-2014-6503:9.3", "CVE-2014-6532:9.3", "CVE-2014-4288:7.6", "CVE-2014-6493:7.6", "CVE-2014-6492:7.6", "CVE-2014-6458:6.9", "CVE-2014-6466:6.9", "CVE-2014-6506:6.8", "CVE-2014-6476:5", "CVE-2014-6515:5", "CVE-2014-6511:5", "CVE-2014-6531:4.3", "CVE-2014-6512:4.3", "CVE-2014-6457:4", "CVE-2014-6527:2.6", "CVE-2014-6502:2.6", "CVE-2014-6558:2.6", "CVE-2014-3065:6", "CVE-2014-3566:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java" ], "apAbstract": "Multiple vulnerabilities in current releases of IBM SDK Java Technology Edition; issues disclosed in the Oracle Feb 2015 Critical Patch Update vulnerability and two additional Vuln", "aparNo": "CVE-2014-6549", "aparNoSet": [ "CVE-2014-3566", "CVE-2014-6549", "CVE-2014-6585", "CVE-2014-6587", "CVE-2014-6591", "CVE-2014-6593", "CVE-2014-8891", "CVE-2015-0400", "CVE-2015-0403", "CVE-2015-0406", "CVE-2015-0407", "CVE-2015-0408", "CVE-2015-0410", "CVE-2015-0412" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_feb2015_advisory.asc", "filesets": [ "Java5.sdk:\u003c5.0.0.590", "Java6.sdk:\u003c6.0.0.470", "Java7.sdk:\u003c7.0.0.195", "Java71.sdk:\u003c7.1.0.75", "Java5_64.sdk:\u003c5.0.0.590", "Java6_64.sdk:\u003c6.0.0.470", "Java7_64.sdk:\u003c7.0.0.195", "Java71_64.sdk:\u003c7.1.0.75" ], "issued": "20150219", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2014-6549:10", "CVE-2015-0408:10", "CVE-2015-0412:10", "CVE-2015-0403:6.9", "CVE-2015-0406:5.8", "CVE-2015-0407:5", "CVE-2015-0400:5", "CVE-2014-3566:4.3", "CVE-2014-6587:4.3", "CVE-2014-6593:4", "CVE-2014-6591:2.6", "CVE-2014-6585:2.6", "CVE-2014-8891:6.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2014-8500", "aparNoSet": [ "CVE-2014-8500" ], "fixedIn": "null", "ifixes": [ "IV68997m9a.150129.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10", "bos.net.tcp.server:5.3.12.0-5.3.12.6" ], "issued": "20150227", "updated": "null", "siblings": [ "5300-12:IV68997", "6100-07:IV68994", "6100-08:IV68993", "7100-02:IV68995", "7100-03:IV68996" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar", "cvss": [ "CVE-2014-8500:7.80" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2014-8500", "aparNoSet": [ "CVE-2014-8500" ], "fixedIn": "6100-08-07", "ifixes": [ "IV68993s6a.150129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.19", "bos.net.tcp.server:6.1.8.0-6.1.8.18" ], "issued": "20150227", "updated": "null", "siblings": [ "5300-12:IV68997", "6100-07:IV68994", "6100-08:IV68993", "7100-02:IV68995", "7100-03:IV68996" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar", "cvss": [ "CVE-2014-8500:7.80" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2014-8500", "aparNoSet": [ "CVE-2014-8500" ], "fixedIn": "6100-09-05", "ifixes": [ "IV68994s4a.150129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.30", "bos.net.tcp.server:6.1.9.0-6.1.9.30" ], "issued": "20150227", "updated": "null", "siblings": [ "5300-12:IV68997", "6100-07:IV68994", "6100-08:IV68993", "7100-02:IV68995", "7100-03:IV68996" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar", "cvss": [ "CVE-2014-8500:7.80" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2014-8500", "aparNoSet": [ "CVE-2014-8500" ], "fixedIn": "7100-02-07", "ifixes": [ "IV68996s4a.150129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.30", "bos.net.tcp.server:7.1.3.0-7.1.3.30" ], "issued": "20150227", "updated": "null", "siblings": [ "5300-12:IV68997", "6100-07:IV68994", "6100-08:IV68993", "7100-02:IV68995", "7100-03:IV68996" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar", "cvss": [ "CVE-2014-8500:7.80" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "CVE-2014-8500", "aparNoSet": [ "CVE-2014-8500" ], "fixedIn": "7100-03-05", "ifixes": [ "IV68995s6a.150129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.19", "bos.net.tcp.server:7.1.2.0-7.1.2.18" ], "issued": "20150227", "updated": "null", "siblings": [ "5300-12:IV68997", "6100-07:IV68994", "6100-08:IV68993", "7100-02:IV68995", "7100-03:IV68996" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar", "cvss": [ "CVE-2014-8500:7.80" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6" ], "apAbstract": "Vulnerability in VIOS bind", "aparNo": "CVE-2014-8500", "aparNoSet": [ "CVE-2014-8500" ], "fixedIn": "2.2.2.7", "ifixes": [ "IV68993s6a.150129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.19", "bos.net.tcp.server:6.1.8.0-6.1.8.18" ], "issued": "20150227", "updated": "null", "siblings": [ "5300-12:IV68997", "6100-07:IV68994", "6100-08:IV68993", "7100-02:IV68995", "7100-03:IV68996" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar", "cvss": [ "CVE-2014-8500:7.80" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4" ], "apAbstract": "Vulnerability in VIOS bind", "aparNo": "CVE-2014-8500", "aparNoSet": [ "CVE-2014-8500" ], "fixedIn": "2.2.3.5", "ifixes": [ "IV68994s4a.150129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.30", "bos.net.tcp.server:6.1.9.0-6.1.9.30" ], "issued": "20150227", "updated": "null", "siblings": [ "5300-12:IV68997", "6100-07:IV68994", "6100-08:IV68993", "7100-02:IV68995", "7100-03:IV68996" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar", "cvss": [ "CVE-2014-8500:7.80" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Tivoli Directory Server" ], "apAbstract": "Security TLS padding vulnerability affects IBM Tivoli/Security Directory Server", "aparNo": "CVE-2014-8730", "aparNoSet": [ "CVE-2014-8730" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003dswg21692906", "filesets": [ "ITDS" ], "issued": "20150123", "updated": "null", "siblings": [], "downloadUrl": "http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dSecurity%2BSystems\u0026product\u003dibm/Tivoli/Tivoli+Directory+Server\u0026release\u003d6.0.0.73\u0026platform\u003dAll\u0026function\u003dall", "cvss": [ "CVE-2014-8730:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "Vulnerability in AIX tcpdump", "aparNo": "CVE-2014-8769", "aparNoSet": [ "CVE-2014-8769", "IV68950" ], "fixedIn": "6100-08-07", "ifixes": [ "IV68950s5a.150205.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc", "filesets": [ "bos.net.tcp.server:6.1.8.0-6.1.8.18" ], "issued": "20150318", "updated": "null", "siblings": [ "6100-08:IV68950", "6100-09:IV68992", "7100-02:IV68951", "7100-03:IV67588" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar", "cvss": [ "CVE-2014-8769:5.00" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04" ], "apAbstract": "Vulnerability in AIX tcpdump", "aparNo": "CVE-2014-8769", "aparNoSet": [ "CVE-2014-8769", "IV68992" ], "fixedIn": "6100-09-05", "ifixes": [ "IV68992s4a.150204.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.30" ], "issued": "20150318", "updated": "null", "siblings": [ "6100-08:IV68950", "6100-09:IV68992", "7100-02:IV68951", "7100-03:IV67588" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar", "cvss": [ "CVE-2014-8769:5.00" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "Vulnerability in AIX tcpdump", "aparNo": "CVE-2014-8769", "aparNoSet": [ "CVE-2014-8769", "IV68951" ], "fixedIn": "7100-02-07", "ifixes": [ "IV68951s5a.150205.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc", "filesets": [ "bos.net.tcp.server:7.1.2.0-7.1.2.18" ], "issued": "20150318", "updated": "null", "siblings": [ "6100-08:IV68950", "6100-09:IV68992", "7100-02:IV68951", "7100-03:IV67588" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar", "cvss": [ "CVE-2014-8769:5.00" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04" ], "apAbstract": "Vulnerability in AIX tcpdump", "aparNo": "CVE-2014-8769", "aparNoSet": [ "CVE-2014-8769", "IV67588" ], "fixedIn": "7100-03-05", "ifixes": [ "IV67588s4a.150204.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc", "filesets": [ "bos.net.tcp.server:7.1.3.0-7.1.3.30" ], "issued": "20150318", "updated": "null", "siblings": [ "6100-08:IV68950", "6100-09:IV68992", "7100-02:IV68951", "7100-03:IV67588" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar", "cvss": [ "CVE-2014-8769:5.00" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "AIX cmdlvm vulnerability", "aparNo": "CVE-2014-8904", "aparNoSet": [ "CVE-2014-8904", "IV68082" ], "fixedIn": "6100-08-07", "ifixes": [ "IV68082s5b.150122.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc", "filesets": [ "bos.rte.lvm:6.1.8.0-6.1.8.19" ], "issued": "20150113", "updated": "20150217", "siblings": [ "5300-12:IV68070", "6100-08:IV68082", "6100-09:IV67907", "7100-02:IV68478", "7100-03:IV67908" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar", "cvss": [ "CVE-2014-8904:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04" ], "apAbstract": "AIX cmdlvm vulnerability", "aparNo": "CVE-2014-8904", "aparNoSet": [ "CVE-2014-8904", "IV67907" ], "fixedIn": "6100-09-05", "ifixes": [ "IV67907s4b.150122.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc", "filesets": [ "bos.rte.lvm:6.1.9.0-6.1.9.30" ], "issued": "20150113", "updated": "20150217", "siblings": [ "5300-12:IV68070", "6100-08:IV68082", "6100-09:IV67907", "7100-02:IV68478", "7100-03:IV67908" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar", "cvss": [ "CVE-2014-8904:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "AIX cmdlvm vulnerability", "aparNo": "CVE-2014-8904", "aparNoSet": [ "CVE-2014-8904", "IV68478" ], "fixedIn": "7100-02-07", "ifixes": [ "IV68478s5b.150122.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc", "filesets": [ "bos.rte.lvm:7.1.2.0-7.1.2.18" ], "issued": "20150113", "updated": "20150217", "siblings": [ "5300-12:IV68070", "6100-08:IV68082", "6100-09:IV67907", "7100-02:IV68478", "7100-03:IV67908" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar", "cvss": [ "CVE-2014-8904:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04" ], "apAbstract": "AIX cmdlvm vulnerability", "aparNo": "CVE-2014-8904", "aparNoSet": [ "CVE-2014-8904", "IV67908" ], "fixedIn": "7100-03-05", "ifixes": [ "IV67908s4b.150122.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc", "filesets": [ "bos.rte.lvm:7.1.3.0-7.1.3.30" ], "issued": "20150113", "updated": "20150217", "siblings": [ "5300-12:IV68070", "6100-08:IV68082", "6100-09:IV67907", "7100-02:IV68478", "7100-03:IV67908" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar", "cvss": [ "CVE-2014-8904:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "AIX cmdlvm vulnerability", "aparNo": "CVE-2014-8904", "aparNoSet": [ "CVE-2014-8904", "IV68070" ], "fixedIn": "null", "ifixes": [ "IV68070s9b.150122.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc", "filesets": [ "bos.rte.lvm:5.3.12.0-5.3.12.9" ], "issued": "20150113", "updated": "20150120", "siblings": [ "5300-12:IV68070", "6100-08:IV68082", "6100-09:IV67907", "7100-02:IV68478", "7100-03:IV67908" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar", "cvss": [ "CVE-2014-8904:7.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6" ], "apAbstract": "VIOS cmdlvm vulnerability", "aparNo": "CVE-2014-8904", "aparNoSet": [ "CVE-2014-8904", "IV68082" ], "fixedIn": "2.2.2.7", "ifixes": [ "IV68082s5b.150122.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc", "filesets": [ "bos.rte.lvm:6.1.8.0-6.1.8.19" ], "issued": "20150113", "updated": "20150217", "siblings": [ "5300-12:IV68070", "6100-08:IV68082", "6100-09:IV67907", "7100-02:IV68478", "7100-03:IV67908" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar", "cvss": [ "CVE-2014-8904:7.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4" ], "apAbstract": "VIOS cmdlvm vulnerability", "aparNo": "CVE-2014-8904", "aparNoSet": [ "CVE-2014-8904", "IV67907" ], "fixedIn": "2.2.3.5", "ifixes": [ "IV67907s4b.150122.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc", "filesets": [ "bos.rte.lvm:6.1.9.0-6.1.9.30" ], "issued": "20150113", "updated": "20150217", "siblings": [ "5300-12:IV68070", "6100-08:IV68082", "6100-09:IV67907", "7100-02:IV68478", "7100-03:IV67908" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar", "cvss": [ "CVE-2014-8904:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05" ], "apAbstract": "Vulnerabilities in NTPv4 affect AIX", "aparNo": "CVE-2014-9297", "aparNoSet": [ "CVE-2014-9297", "CVE-2015-1799" ], "fixedIn": "6100-09-06", "ifixes": [ "IV71094s0a.150618.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.4" ], "issued": "20150629", "updated": "null", "siblings": [ "6100-09:IV71094", "7100-03:IV71096" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar", "cvss": [ "CVE-2014-9297:5.00", "CVE-2015-1799:5.40" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05" ], "apAbstract": "Vulnerabilities in NTPv4 affect AIX", "aparNo": "CVE-2014-9297", "aparNoSet": [ "CVE-2014-9297", "CVE-2015-1799" ], "fixedIn": "7100-03-06", "ifixes": [ "IV71096s0a.150618.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc", "filesets": [ "ntp.rte:7.1.0.0-7.1.0.4" ], "issued": "20150629", "updated": "null", "siblings": [ "6100-09:IV71094", "7100-03:IV71096" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar", "cvss": [ "CVE-2014-9297:5.00", "CVE-2015-1799:5.40" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50" ], "apAbstract": "Vulnerabilities in NTPv4 affect VIOS", "aparNo": "CVE-2014-9297", "aparNoSet": [ "CVE-2014-9297", "CVE-2015-1799" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV71094s0a.150618.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.4" ], "issued": "20150629", "updated": "null", "siblings": [ "6100-09:IV71094", "7100-03:IV71096" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar", "cvss": [ "CVE-2014-9297:5.00", "CVE-2015-1799:5.40" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "GSKit" ], "apAbstract": "The GSKit that is shipped with IBM Security/Tivoli Directory Server contains multiple security vulnerabilities including the FREAK: Factoring Attack on RSA-EXPORT keys TLS/SSL clie", "aparNo": "CVE-2015-0138", "aparNoSet": [ "CVE-2015-0138", "CVE-2015-0159" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg3T1022075", "filesets": [ "ISDS:6.3.1", "ITDS:6.3", "ITDS:6.2", "ITDS:6.1", "ITDS:6.0", "GSKit:\u003c8.0.50.41", "GSKit:\u003c7.0.5.5" ], "issued": "20150313", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2015-0159:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java" ], "apAbstract": "AIX IBM SDK Java JSSE vulnerability", "aparNo": "CVE-2015-0138", "aparNoSet": [ "CVE-2015-0138" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/javajsse_advisory.asc", "filesets": [ "Java5.sdk:\u003c5.0.0.590", "Java6.sdk:\u003c6.0.0.470", "Java7.sdk:\u003c7.0.0.195", "Java71.sdk:\u003c7.1.0.75", "Java5_64.sdk:\u003c5.0.0.590", "Java6_64.sdk:\u003c6.0.0.470", "Java7_64.sdk:\u003c7.0.0.195", "Java71_64.sdk:\u003c7.1.0.75" ], "issued": "20150413", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2015-0138:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Multiple Security vulnerabilities in AIX OpenSSL", "aparNo": "CVE-2015-0209", "aparNoSet": [ "CVE-2015-0209", "CVE-2015-0286", "CVE-2015-0287", "CVE-2015-0288", "CVE-2015-0289", "CVE-2015-0292", "CVE-2015-0293" ], "fixedIn": "See advisory", "ifixes": [ "IV71446m9a.150410.epkg.Z", "IV71446m9b.150410.epkg.Z", "IV71446m9c.150410.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory13.asc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.513", "openssl.base:0.9.8.401-0.9.8.2504", "openssl.base:12.9.8.1100-12.9.8.2504" ], "issued": "20150413", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2015-0209:7.5", "CVE-2015-0286:5", "CVE-2015-0287:7.5", "CVE-2015-0288:5", "CVE-2015-0289:5", "CVE-2015-0292:7.5", "CVE-2015-0293:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2015-0491", "aparNoSet": [ "CVE-2015-0192", "CVE-2015-0204", "CVE-2015-0458", "CVE-2015-0459", "CVE-2015-0469", "CVE-2015-0477", "CVE-2015-0478", "CVE-2015-0480", "CVE-2015-0486", "CVE-2015-0488", "CVE-2015-0491", "CVE-2015-1914", "CVE-2015-1916", "CVE-2015-2808" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_april2015_advisory.asc", "filesets": [ "Java5.sdk:\u003c5.0.0.600", "Java6.sdk:\u003c6.0.0.480", "Java7.sdk:\u003c7.0.0.205", "Java71.sdk:\u003c7.1.0.85", "Java5_64.sdk:\u003c5.0.0.600", "Java6_64.sdk:\u003c6.0.0.480", "Java7_64.sdk:\u003c7.0.0.205", "Java71_64.sdk:\u003c7.1.0.85" ], "issued": "20150603", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2015-0491:10", "CVE-2015-0459:10", "CVE-2015-0469:10", "CVE-2015-0458:7.6", "CVE-2015-0480:5.8", "CVE-2015-0488:5", "CVE-2015-0478:4.3", "CVE-2015-0477:4.3", "CVE-2015-0204:4.3", "CVE-2015-0192:6.8", "CVE-2015-0486:5", "CVE-2015-2808:5", "CVE-2015-1916:5", "CVE-2015-1914:4.3", "CVE-2015-0138:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05" ], "apAbstract": "Vulnerability in NTPv3 affects AIX", "aparNo": "CVE-2015-1799", "aparNoSet": [ "CVE-2015-1799", "IV73783" ], "fixedIn": "7100-03-06", "ifixes": [ "IV73783s5a.150714.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20150821", "updated": "null", "siblings": [ "6100-09:IV73783", "7100-03:IV74261" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar", "cvss": [ "CVE-2015-1799:5.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05" ], "apAbstract": "Vulnerability in NTPv3 affects AIX", "aparNo": "CVE-2015-1799", "aparNoSet": [ "CVE-2015-1799", "IV74261" ], "fixedIn": "7100-03-06", "ifixes": [ "IV74261s5a.150714.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.45" ], "issued": "20150821", "updated": "null", "siblings": [ "6100-09:IV73783", "7100-03:IV74261" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar", "cvss": [ "CVE-2015-1799:5.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "Vulnerability in NTPv3 affects AIX", "aparNo": "CVE-2015-1799", "aparNoSet": [ "CVE-2015-1799", "IV74263" ], "fixedIn": "next TL", "ifixes": [ "IV74263s6a.150714.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.19" ], "issued": "20150821", "updated": "null", "siblings": [ "6100-09:IV73783", "7100-03:IV74261" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar", "cvss": [ "CVE-2015-1799:5.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "Vulnerability in NTPv3 affects AIX", "aparNo": "CVE-2015-1799", "aparNoSet": [ "CVE-2015-1799", "IV74261" ], "fixedIn": "next TL", "ifixes": [ "IV74262s6a.150714.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.19" ], "issued": "20150821", "updated": "null", "siblings": [ "6100-09:IV73783", "7100-03:IV74261" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar", "cvss": [ "CVE-2015-1799:5.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50" ], "apAbstract": "Vulnerability in NTPv3 affects VIOS", "aparNo": "CVE-2015-1799", "aparNoSet": [ "CVE-2015-1799", "IV73783" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV73783s5a.150714.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20150821", "updated": "null", "siblings": [ "6100-09:IV73783", "7100-03:IV74261" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar", "cvss": [ "CVE-2015-1799:5.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6" ], "apAbstract": "Vulnerability in NTPv3 affects VIOS", "aparNo": "CVE-2015-1799", "aparNoSet": [ "CVE-2015-1799", "IV74263" ], "fixedIn": "next TL", "ifixes": [ "IV74263s6a.150714.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.19" ], "issued": "20150821", "updated": "null", "siblings": [ "6100-09:IV73783", "7100-03:IV74261" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar", "cvss": [ "CVE-2015-1799:5.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6", "2.2.2.70" ], "apAbstract": "Vulnerability in netstat affects VIOS", "aparNo": "CVE-2015-1799", "aparNoSet": [ "CVE-2015-1799", "IV77037" ], "fixedIn": "next TL", "ifixes": [ "IV77037s7a.150924.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.20" ], "issued": "20151012", "updated": "null", "siblings": [ "6100-09:IV75940", "7100-03:IV77299" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar", "cvss": [ "CVE-2015-4948:7.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2015-2638", "aparNoSet": [ "CVE-2015-1931", "CVE-2015-2590", "CVE-2015-2601", "CVE-2015-2613", "CVE-2015-2619", "CVE-2015-2621", "CVE-2015-2625", "CVE-2015-2632", "CVE-2015-2637", "CVE-2015-2638", "CVE-2015-2664", "CVE-2015-4729", "CVE-2015-4731", "CVE-2015-4732", "CVE-2015-4733", "CVE-2015-4736", "CVE-2015-4748", "CVE-2015-4749", "CVE-2015-4760" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2015_advisory.asc", "filesets": [ "Java5.sdk:\u003c5.0.0.615", "Java6.sdk:\u003c6.0.0.495", "Java7.sdk:\u003c7.0.0.255", "Java71.sdk:\u003c7.1.0.135", "Java5_64.sdk:\u003c5.0.0.615", "Java6_64.sdk:\u003c6.0.0.495", "Java7_64.sdk:\u003c7.0.0.255", "Java71_64.sdk:\u003c7.1.0.135" ], "issued": "20150731", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2015-4000:4.3", "CVE-2015-2638:10", "CVE-2015-4733:10", "CVE-2015-4732:10", "CVE-2015-2590:10", "CVE-2015-4731:10", "CVE-2015-4760:10", "CVE-2015-4736:9.3", "CVE-2015-4748:7.6", "CVE-2015-2664:6.9", "CVE-2015-2632:5", "CVE-2015-2637:5", "CVE-2015-2619:5", "CVE-2015-2621:5", "CVE-2015-2613:5", "CVE-2015-2601:5", "CVE-2015-4749:4.3", "CVE-2015-4729:4", "CVE-2015-2625:2.6", "CVE-2015-1931:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "GSKit \u0026 IBM SDK for Java \u0026 IBM SDK for Node.js" ], "apAbstract": "Vulnerability in RC4 stream cipher affects AIX", "aparNo": "CVE-2015-2808", "aparNoSet": [ "CVE-2015-2808" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc", "filesets": [ "Java71:\u003c\u003d7.1.0.75", "Java7:\u003c\u003d7.0.0.195", "Java6:\u003c\u003d6.0.0.470", "Java5:\u003c\u003d5.0.0.590", "Node.js:\u003c1.1.0.13" ], "issued": "20150427", "updated": "20150429", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2015-2808:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX", "aparNo": "CVE-2015-2808", "aparNoSet": [ "CVE-2015-2808" ], "fixedIn": "6100-08-07", "ifixes": [ "IV74915m6a.150727.epkg.Z", "IV74919m6a.150713.epkg.Z", "IV74926m6a.150711.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc", "filesets": [ "bos.net.tcp.server:6.1.8.0-6.1.8.18", "bos.net.tcp.client:6.1.8.0-6.1.8.19" ], "issued": "20150427", "updated": "20151215", "siblings": [ "See", "advisory" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar", "cvss": [ "CVE-2015-2808:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05" ], "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX", "aparNo": "CVE-2015-2808", "aparNoSet": [ "CVE-2015-2808" ], "fixedIn": "6100-09-06", "ifixes": [ "IV74916m5a.150727.epkg.Z", "IV74920m5a.150713.epkg.Z", "IV74927m5a.150711.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.45", "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20150427", "updated": "20151215", "siblings": [ "See", "advisory" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar", "cvss": [ "CVE-2015-2808:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX", "aparNo": "CVE-2015-2808", "aparNoSet": [ "CVE-2015-2808" ], "fixedIn": "7100-02-07", "ifixes": [ "IV74917m6a.150727.epkg.Z", "IV74921m6a.150713.epkg.Z", "IV74928m6a.150710.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc", "filesets": [ "bos.net.tcp.server:7.1.2.0-7.1.2.18", "bos.net.tcp.client:7.1.2.0-7.1.2.19" ], "issued": "20150427", "updated": "20151215", "siblings": [ "See", "advisory" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar", "cvss": [ "CVE-2015-2808:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05" ], "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX", "aparNo": "CVE-2015-2808", "aparNoSet": [ "CVE-2015-2808" ], "fixedIn": "7100-03-06", "ifixes": [ "IV74458m5a.150727.epkg.Z", "IV74922m5a.150713.epkg.Z", "IV74929m5a.150711.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc", "filesets": [ "bos.net.tcp.server:7.1.3.0-7.1.3.45", "bos.net.tcp.client:7.1.3.0-7.1.3.45" ], "issued": "20150427", "updated": "20151215", "siblings": [ "See", "advisory" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar", "cvss": [ "CVE-2015-2808:5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6" ], "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on VIOS", "aparNo": "CVE-2015-2808", "aparNoSet": [ "CVE-2015-2808" ], "fixedIn": "2.2.2.7", "ifixes": [ "IV74915m6a.150727.epkg.Z", "IV74919m6a.150713.epkg.Z", "IV74926m6a.150711.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc", "filesets": [ "bos.net.tcp.server:6.1.8.0-6.1.8.18", "bos.net.tcp.client:6.1.8.0-6.1.8.19" ], "issued": "20150427", "updated": "20151215", "siblings": [ "See", "advisory" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar", "cvss": [ "CVE-2015-2808:5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50" ], "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on VIOS", "aparNo": "CVE-2015-2808", "aparNoSet": [ "CVE-2015-2808" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV74916m5a.150727.epkg.Z", "IV74920m5a.150713.epkg.Z", "IV74927m5a.150711.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.45", "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20150427", "updated": "20151215", "siblings": [ "See", "advisory" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar", "cvss": [ "CVE-2015-2808:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Vulnerabilities in OpenSSL impact AIX", "aparNo": "CVE-2015-3194", "aparNoSet": [ "CVE-2015-3194", "CVE-2015-3195", "CVE-2015-3196" ], "fixedIn": "See advisory", "ifixes": [ "101_ifix.151218.epkg.Z", "098_ifix.151218.epkg.Z", "1298_ifix.151218.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory15.asc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.515", "openssl.base:0.9.8.401-0.9.8.2506", "openssl.base:12.9.8.1100-12.9.8.2506" ], "issued": "20160115", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix15.tar", "cvss": [ "CVE-2015-3194:5.3", "CVE-2015-3195:5.3", "CVE-2015-3196:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Vulnerabilities in OpenSSL affect AIX", "aparNo": "CVE-2015-3197", "aparNoSet": [ "CVE-2015-3197", "CVE-2015-4000" ], "fixedIn": "See advisory", "ifixes": [ "IV81287m9b.160217.epkg.Z", "IV81287m9a.160217.epkg.Z", "IV81287m9c.160217.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory17.asc", "filesets": [ "openssl.base:0.9.8.401-0.9.8.2506", "openssl.base:1.0.1.500-1.0.1.515", "openssl.base:12.9.8.1100-12.9.8.2506" ], "issued": "20160226", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix17.tar", "cvss": [ "CVE-2015-3197:5.4", "CVE-2015-4000:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Multiple Security vulnerabilities in AIX OpenSSL", "aparNo": "CVE-2015-4000", "aparNoSet": [ "CVE-2014-8176", "CVE-2015-1788", "CVE-2015-1789", "CVE-2015-1790", "CVE-2015-1791", "CVE-2015-1792", "CVE-2015-4000" ], "fixedIn": "See advisory", "ifixes": [ "IV74809s9a.150710.epkg.Z", "IV75570m9a.150729.epkg.Z", "IV74809s9b.150710.epkg.Z", "IV74809s9c.150710.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory14.asc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.514", "openssl.base:0.9.8.401-0.9.8.2505", "openssl.base:12.9.8.1100-12.9.8.2505" ], "issued": "20150715", "updated": "20150812", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix14.tar", "cvss": [ "CVE-2015-4000:4.3", "CVE-2015-1788:5", "CVE-2015-1789:5", "CVE-2015-1790:5", "CVE-2015-1791:5", "CVE-2015-1792:5", "CVE-2014-8176:6.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50" ], "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on VIOS", "aparNo": "CVE-2015-4000", "aparNoSet": [ "CVE-2015-4000" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV75643m5a.150731.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20150807", "updated": "null", "siblings": [ "6100-08:IV75644", "6100-09:IV75643", "7100-02:IV75645", "7100-03:IV75646" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar", "cvss": [ "CVE-2015-4000:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX", "aparNo": "CVE-2015-4000", "aparNoSet": [ "CVE-2015-4000" ], "fixedIn": "6100-09-06", "ifixes": [ "IV75644m6a.150731.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.19" ], "issued": "20150807", "updated": "null", "siblings": [ "6100-08:IV75644", "6100-09:IV75643", "7100-02:IV75645", "7100-03:IV75646" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar", "cvss": [ "CVE-2015-4000:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05" ], "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX", "aparNo": "CVE-2015-4000", "aparNoSet": [ "CVE-2015-4000" ], "fixedIn": "6100-09-06", "ifixes": [ "IV75643m5a.150731.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20150807", "updated": "null", "siblings": [ "6100-08:IV75644", "6100-09:IV75643", "7100-02:IV75645", "7100-03:IV75646" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar", "cvss": [ "CVE-2015-4000:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX", "aparNo": "CVE-2015-4000", "aparNoSet": [ "CVE-2015-4000" ], "fixedIn": "7100-03-06", "ifixes": [ "IV75645m6a.150731.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.19" ], "issued": "20150807", "updated": "null", "siblings": [ "6100-08:IV75644", "6100-09:IV75643", "7100-02:IV75645", "7100-03:IV75646" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar", "cvss": [ "CVE-2015-4000:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05" ], "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX", "aparNo": "CVE-2015-4000", "aparNoSet": [ "CVE-2015-4000" ], "fixedIn": "7100-03-06", "ifixes": [ "IV75646m5a.150731.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.45" ], "issued": "20150807", "updated": "null", "siblings": [ "6100-08:IV75644", "6100-09:IV75643", "7100-02:IV75645", "7100-03:IV75646" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar", "cvss": [ "CVE-2015-4000:4.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6" ], "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on VIOS", "aparNo": "CVE-2015-4000", "aparNoSet": [ "CVE-2015-4000" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV75644m6a.150731.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.8.19" ], "issued": "20150807", "updated": "null", "siblings": [ "6100-08:IV75644", "6100-09:IV75643", "7100-02:IV75645", "7100-03:IV75646" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar", "cvss": [ "CVE-2015-4000:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2015-4844", "aparNoSet": [ "CVE-2015-4734", "CVE-2015-4803", "CVE-2015-4805", "CVE-2015-4806", "CVE-2015-4810", "CVE-2015-4835", "CVE-2015-4840", "CVE-2015-4842", "CVE-2015-4843", "CVE-2015-4844", "CVE-2015-4860", "CVE-2015-4871", "CVE-2015-4872", "CVE-2015-4882", "CVE-2015-4883", "CVE-2015-4893", "CVE-2015-4902", "CVE-2015-4903", "CVE-2015-4911", "CVE-2015-5006" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_oct2015_advisory.asc", "filesets": [ "Java5.sdk:\u003c5.0.0.620", "Java6.sdk:\u003c6.0.0.510", "Java7.sdk:\u003c7.0.0.270", "Java71.sdk:\u003c7.1.0.150", "Java8.sdk:\u003c8.0.0.70", "Java5_64.sdk:\u003c5.0.0.620", "Java6_64.sdk:\u003c6.0.0.510", "Java7_64.sdk:\u003c7.0.0.270", "Java71_64.sdk:\u003c7.1.0.150", "Java8_64.sdk:\u003c8.0.0.70" ], "issued": "20151210", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2015-4844:10", "CVE-2015-4843:10", "CVE-2015-4805:10", "CVE-2015-4860:10", "CVE-2015-4883:10", "CVE-2015-4835:10", "CVE-2015-4810:6.9", "CVE-2015-4806:6.4", "CVE-2015-4871:5.8", "CVE-2015-4902:5", "CVE-2015-4872:5", "CVE-2015-4911:5", "CVE-2015-4893:5", "CVE-2015-4840:5", "CVE-2015-4842:5", "CVE-2015-4882:5", "CVE-2015-4903:5", "CVE-2015-4803:5", "CVE-2015-4734:5", "CVE-2015-5006:4.6" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerability in netstat affects AIX", "aparNo": "CVE-2015-4948", "aparNoSet": [ "CVE-2015-4948", "IV77039" ], "fixedIn": "6100-09-06", "ifixes": [ "IV77039s9b.151016.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20151012", "updated": "20151016", "siblings": [ "6100-09:IV75940", "7100-03:IV77299" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar", "cvss": [ "CVE-2015-4948:7.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05" ], "apAbstract": "Vulnerability in netstat affects AIX", "aparNo": "CVE-2015-4948", "aparNoSet": [ "CVE-2015-4948", "IV75940" ], "fixedIn": "6100-09-06", "ifixes": [ "IV75940s5b.151016.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20151012", "updated": "20151016", "siblings": [ "6100-09:IV75940", "7100-03:IV77299" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar", "cvss": [ "CVE-2015-4948:7.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05" ], "apAbstract": "Vulnerability in netstat affects AIX", "aparNo": "CVE-2015-4948", "aparNoSet": [ "CVE-2015-4948", "IV77299" ], "fixedIn": "7100-03-06", "ifixes": [ "IV77299s5b.151016.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.45" ], "issued": "20151012", "updated": "20151016", "siblings": [ "6100-09:IV75940", "7100-03:IV77299" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar", "cvss": [ "CVE-2015-4948:7.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06", "6100-08-07" ], "apAbstract": "Vulnerability in netstat affects AIX", "aparNo": "CVE-2015-4948", "aparNoSet": [ "CVE-2015-4948", "IV77037" ], "fixedIn": "next TL", "ifixes": [ "IV77037s7a.150924.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.20" ], "issued": "20151012", "updated": "null", "siblings": [ "6100-09:IV75940", "7100-03:IV77299" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar", "cvss": [ "CVE-2015-4948:7.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06", "7100-02-07" ], "apAbstract": "Vulnerability in netstat affects AIX", "aparNo": "CVE-2015-4948", "aparNoSet": [ "CVE-2015-4948", "IV77038" ], "fixedIn": "next TL", "ifixes": [ "IV77038s7a.150924.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.20" ], "issued": "20151012", "updated": "null", "siblings": [ "6100-09:IV75940", "7100-03:IV77299" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar", "cvss": [ "CVE-2015-4948:7.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50" ], "apAbstract": "Vulnerability in netstat affects VIOS", "aparNo": "CVE-2015-4948", "aparNoSet": [ "CVE-2015-4948", "IV75940" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV75940s5b.151016.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20151012", "updated": "20151016", "siblings": [ "6100-09:IV75940", "7100-03:IV77299" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar", "cvss": [ "CVE-2015-4948:7.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "NTPv4" ], "apAbstract": "Vulnerability in NTPv4 affects AIX", "aparNo": "CVE-2015-5300", "aparNoSet": [ "CVE-2015-5300" ], "fixedIn": "See advisory", "ifixes": [ "IV81129m6a.160204.epkg.Z", "IV81130m5a.160204.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.4", "ntp.rte:7.1.0.0-7.1.0.4" ], "issued": "20160222", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix5.tar", "cvss": [ "CVE-2015-5300:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "AIX OpenSSH Vulnerability", "aparNo": "CVE-2015-5352", "aparNoSet": [ "CVE-2015-5352" ], "fixedIn": "See advisory", "ifixes": [ "OpenSSH_6.0.0.6110.tar.Z", "OpenSSH_6.0.0.6201.tar.Z", "DEPRECATED::6201_mfix" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory5.asc", "filesets": [ "openssh.base.client:4.0.0.5200-6.0.0.6200", "openssh.base.server:4.0.0.5200-6.0.0.6200" ], "issued": "20150904", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2015-5352:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "CVE-2015-5477", "aparNoSet": [ "CVE-2015-5477", "IV75966" ], "fixedIn": "6100-09-06", "ifixes": [ "IV75966s9a.150813.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20150813", "updated": "20150817", "siblings": [ "6100-09:IV75692", "7100-03:IV75693" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar", "cvss": [ "CVE-2015-5477:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "CVE-2015-5477", "aparNoSet": [ "CVE-2015-5477", "IV75692" ], "fixedIn": "6100-09-06", "ifixes": [ "IV75692s5a.150803.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20150813", "updated": "20150817", "siblings": [ "6100-09:IV75692", "7100-03:IV75693" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar", "cvss": [ "CVE-2015-5477:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "CVE-2015-5477", "aparNoSet": [ "CVE-2015-5477", "IV75693" ], "fixedIn": "7100-03-06", "ifixes": [ "IV75693s5a.150803.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.45" ], "issued": "20150813", "updated": "20150817", "siblings": [ "6100-09:IV75692", "7100-03:IV75693" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar", "cvss": [ "CVE-2015-5477:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "CVE-2015-5477", "aparNoSet": [ "CVE-2015-5477", "IV75694" ], "fixedIn": "next TL", "ifixes": [ "IV75694s6a.150803.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.19" ], "issued": "20150813", "updated": "20150817", "siblings": [ "6100-09:IV75692", "7100-03:IV75693" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar", "cvss": [ "CVE-2015-5477:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "CVE-2015-5477", "aparNoSet": [ "CVE-2015-5477", "IV75690" ], "fixedIn": "next TL", "ifixes": [ "IV75690s6a.150803.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.19" ], "issued": "20150813", "updated": "20150817", "siblings": [ "6100-09:IV75692", "7100-03:IV75693" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar", "cvss": [ "CVE-2015-5477:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50" ], "apAbstract": "Vulnerability in BIND affects VIOS", "aparNo": "CVE-2015-5477", "aparNoSet": [ "CVE-2015-5477", "IV75692" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV75692s5a.150803.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20150813", "updated": "20150817", "siblings": [ "6100-09:IV75692", "7100-03:IV75693" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar", "cvss": [ "CVE-2015-5477:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6" ], "apAbstract": "Vulnerability in BIND affects VIOS", "aparNo": "CVE-2015-5477", "aparNoSet": [ "CVE-2015-5477", "IV75694" ], "fixedIn": "next TL", "ifixes": [ "IV75694s6a.150803.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.19" ], "issued": "20150813", "updated": "20150817", "siblings": [ "6100-09:IV75692", "7100-03:IV75693" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar", "cvss": [ "CVE-2015-5477:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "CVE-2015-5722", "aparNoSet": [ "CVE-2015-5722", "IV78092" ], "fixedIn": "6100-09-06", "ifixes": [ "IV78092m9a.151103.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20151104", "updated": "null", "siblings": [ "6100-09:IV78091", "7100-03:IV78095" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar", "cvss": [ "CVE-2015-5722:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "CVE-2015-5722", "aparNoSet": [ "CVE-2015-5722", "IV78091" ], "fixedIn": "6100-09-06", "ifixes": [ "IV78091m5a.151020.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20151104", "updated": "null", "siblings": [ "6100-09:IV78091", "7100-03:IV78095" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar", "cvss": [ "CVE-2015-5722:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "CVE-2015-5722", "aparNoSet": [ "CVE-2015-5722", "IV78095" ], "fixedIn": "7100-03-06", "ifixes": [ "IV78095m5a.151019.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.45" ], "issued": "20151104", "updated": "null", "siblings": [ "6100-09:IV78091", "7100-03:IV78095" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar", "cvss": [ "CVE-2015-5722:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06", "6100-08-07" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "CVE-2015-5722", "aparNoSet": [ "CVE-2015-5722", "IV78096" ], "fixedIn": "next TL", "ifixes": [ "IV78096m7a.151021.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.20" ], "issued": "20151104", "updated": "null", "siblings": [ "6100-09:IV78091", "7100-03:IV78095" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar", "cvss": [ "CVE-2015-5722:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06", "7100-02-07" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "CVE-2015-5722", "aparNoSet": [ "CVE-2015-5722", "IV78094" ], "fixedIn": "next TL", "ifixes": [ "IV78094m7a.151020.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.20" ], "issued": "20151104", "updated": "null", "siblings": [ "6100-09:IV78091", "7100-03:IV78095" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar", "cvss": [ "CVE-2015-5722:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50" ], "apAbstract": "Vulnerability in BIND affects VIOS", "aparNo": "CVE-2015-5722", "aparNoSet": [ "CVE-2015-5722", "IV78091" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV78091m5a.151020.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.45" ], "issued": "20151104", "updated": "null", "siblings": [ "6100-09:IV78091", "7100-03:IV78095" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar", "cvss": [ "CVE-2015-5722:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2:: 2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.2.6", "2.2.2.70" ], "apAbstract": "Vulnerability in BIND affects VIOS", "aparNo": "CVE-2015-5722", "aparNoSet": [ "CVE-2015-5722", "IV78096" ], "fixedIn": "next TL", "ifixes": [ "IV78096m7a.151021.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.20" ], "issued": "20151104", "updated": "null", "siblings": [ "6100-09:IV78091", "7100-03:IV78095" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar", "cvss": [ "CVE-2015-5722:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "AIX OpenSSH Vulnerability", "aparNo": "CVE-2015-6563", "aparNoSet": [ "CVE-2015-6563", "CVE-2015-6564" ], "fixedIn": "See advisory", "ifixes": [ "6110_ifix.151009.epkg.Z", "6201_ifix.151009.epkg.Z", "DEPRECATED::6201_mfix" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory6.asc", "filesets": [ "openssh.base.client:4.0.0.5200-6.0.0.6201", "openssh.base.server:4.0.0.5200-6.0.0.6201" ], "issued": "20151019", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix6.tar", "cvss": [ "CVE-2015-6563:4", "CVE-2015-6564:7.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "GSKit" ], "apAbstract": "Vulnerabilities in GSKit affect Tivoli Directory Server/IBM Security Directory Server on AIX", "aparNo": "CVE-2015-7421", "aparNoSet": [ "CVE-2015-7420", "CVE-2015-7421" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "http://www.ibm.com/support/docview.wss?uid\u003disg3T1023277", "filesets": [ "ISDS:6.4", "ISDS:6.3.1", "ITDS:6.3", "GSKit:\u003c8.0.50.53" ], "issued": "20151221", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2015-7420:3.7", "CVE-2015-7421:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Vulnerability in MD5 Signature and Hash Algorithm affects OpenSSL on AIX", "aparNo": "CVE-2015-7575", "aparNoSet": [ "CVE-2015-7575" ], "fixedIn": "See advisory", "ifixes": [ "101a_fix.160129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory16.asc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.515" ], "issued": "20160129", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix16.tar", "cvss": [ "CVE-2015-7575:7.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "NTPv4" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "CVE-2015-7973", "aparNoSet": [ "CVE-2015-7973", "CVE-2015-7977", "CVE-2015-7979", "CVE-2015-8139", "CVE-2015-8140", "CVE-2015-8158" ], "fixedIn": "See advisory", "ifixes": [ "IV83992s5a.160602.epkg.Z", "IV83983s5a.160602.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.5", "ntp.rte:7.1.0.0-7.1.0.5" ], "issued": "20160608", "updated": "20160609", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar", "cvss": [ "CVE-2015-7973:5.4", "CVE-2015-7977:5.3", "CVE-2015-7979:6.5", "CVE-2015-8158:5.3", "CVE-2015-8139:5.3", "CVE-2015-8140:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "NTPv4" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "CVE-2015-7974", "aparNoSet": [ "CVE-2015-7974", "CVE-2016-1547", "CVE-2016-1550", "CVE-2016-1551", "CVE-2016-2517", "CVE-2016-2518", "CVE-2016-2519", "CVE-2016-4953", "CVE-2016-4954", "CVE-2016-4955", "CVE-2016-4957" ], "fixedIn": "See advisory", "ifixes": [ "IV87278s7a.160901.epkg.Z", "IV87279s7a.160901.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7", "ntp.rte:7.1.0.0-7.1.0.7" ], "issued": "20160906", "updated": "20160913", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar", "cvss": [ "CVE-2015-7974:5.3", "CVE-2016-1550:4.0", "CVE-2016-1551:3.7", "CVE-2016-2517:4.2", "CVE-2016-2518:2.0", "CVE-2016-2519:4.2", "CVE-2016-1547:3.7", "CVE-2016-4957:7.5", "CVE-2016-4953:3.7", "CVE-2016-4954:3.7", "CVE-2016-4955:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "AIX OpenSSH Vulnerability", "aparNo": "CVE-2015-8325", "aparNoSet": [ "CVE-2015-8325", "CVE-2016-6210", "CVE-2016-6515" ], "fixedIn": "See advisory", "ifixes": [ "6202_ifix.160830.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory9.asc", "filesets": [ "openssh.base.client:4.0.0.5200-6.0.0.6202", "openssh.base.server:4.0.0.5200-6.0.0.6202" ], "issued": "20160906", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix9.tar", "cvss": [ "CVE-2015-8325:7.4", "CVE-2016-6210:4.3", "CVE-2016-6515:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2015-8472", "aparNoSet": [ "CVE-2015-5041", "CVE-2015-7575", "CVE-2015-7981", "CVE-2015-8126", "CVE-2015-8472", "CVE-2015-8540", "CVE-2016-0402", "CVE-2016-0448", "CVE-2016-0466", "CVE-2016-0475", "CVE-2016-0483", "CVE-2016-0494" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2016_advisory.asc", "filesets": [ "Java6.sdk:\u003c6.0.0.535", "Java7.sdk:\u003c7.0.0.320", "Java71.sdk:\u003c7.1.0.200", "Java8.sdk:\u003c8.0.0.120", "Java6_64.sdk:\u003c6.0.0.535", "Java7_64.sdk:\u003c7.0.0.320", "Java71_64.sdk:\u003c7.1.0.200", "Java8_64.sdk:\u003c8.0.0.120" ], "issued": "20160224", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2015-8472:6.3", "CVE-2016-0475:5.8", "CVE-2016-0466:5.0", "CVE-2016-0402:5.0", "CVE-2015-7575:7.1", "CVE-2016-0448:4.0", "CVE-2016-0494:10.0", "CVE-2016-0483:10.0", "CVE-2015-5041:4.8", "CVE-2015-7981:5.3", "CVE-2015-8126:7.8", "CVE-2015-8540:9.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "GSKit" ], "apAbstract": "Vulnerability in GSKit affects Tivoli Directory Server/IBM Security Directory Server on AIX", "aparNo": "CVE-2016-0201", "aparNoSet": [ "CVE-2016-0201" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "http://www.ibm.com/support/docview.wss?uid\u003disg3T1023296", "filesets": [ "ISDS:6.4", "ISDS:6.3.1", "ITDS:6.3", "GSKit:\u003c8.0.50.57" ], "issued": "20160127", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2016-0201:5.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "AIX OpenSSH Vulnerability", "aparNo": "CVE-2016-0777", "aparNoSet": [ "CVE-2016-0777", "CVE-2016-0778" ], "fixedIn": "See advisory", "ifixes": [ "IV80743m9a.160127.epkg.Z", "IV80743m9b.160127.epkg.Z", "DEPRECATED::6201_mfix" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory7.asc", "filesets": [ "openssh.base.client:4.0.0.5200-6.0.0.6201", "openssh.base.server:4.0.0.5200-6.0.0.6201" ], "issued": "20160129", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix7.tar", "cvss": [ "CVE-2016-0777:6.5", "CVE-2016-0778:5.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Multiple vulnerabilities in OpenSSL affect AIX", "aparNo": "CVE-2016-0800", "aparNoSet": [ "CVE-2016-0702", "CVE-2016-0705", "CVE-2016-0797", "CVE-2016-0798", "CVE-2016-0799", "CVE-2016-0800" ], "fixedIn": "See advisory", "ifixes": [ "IV83169m9b.160401.epkg.Z", "IV83169m9a.160401.epkg.Z", "IV83169s9d.160401.epkg.Z", "IV83169m9c.160401.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory18.asc", "filesets": [ "openssl.base:0.9.8.401-0.9.8.2506", "openssl.base:1.0.1.500-1.0.1.515", "openssl.base:1.0.2.500-1.0.2.500", "openssl.base:12.9.8.1100-12.9.8.2506" ], "issued": "20160404", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix18.tar", "cvss": [ "CVE-2016-0800:7.4", "CVE-2016-0799:3.7", "CVE-2016-0798:7.1", "CVE-2016-0797:3.7", "CVE-2016-0705:3.7", "CVE-2016-0702:2.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Vulnerabilities in OpenSSL affect AIX", "aparNo": "CVE-2016-2176", "aparNoSet": [ "CVE-2016-2105", "CVE-2016-2106", "CVE-2016-2108", "CVE-2016-2109", "CVE-2016-2176" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory20.asc", "filesets": [ "openssl.base:0.9.8.401-0.9.8.2506", "openssl.base:1.0.1.500-1.0.1.515", "openssl.base:1.0.2.500", "openssl.base:12.9.8.1100-12.9.8.2506", "openssl.base:20.11.101.500" ], "issued": "20160712", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2016-2176:5.3", "CVE-2016-2109:5.3", "CVE-2016-2108:8.1", "CVE-2016-2106:5.6", "CVE-2016-2105:5.6" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Vulnerabilities in OpenSSL affect AIX", "aparNo": "CVE-2016-2177", "aparNoSet": [ "CVE-2016-2177", "CVE-2016-2178", "CVE-2016-2179", "CVE-2016-2180", "CVE-2016-2181", "CVE-2016-2182", "CVE-2016-2183", "CVE-2016-6302", "CVE-2016-6303", "CVE-2016-6304", "CVE-2016-6306", "CVE-2016-7052" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc", "filesets": [ "openssl.base:1.0.1.500-1.0.1.516", "openssl.base:1.0.2.500-1.0.2.800", "openssl.base:20.11.101.500-20.11.101.501" ], "issued": "20161114", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2016-2177:5.9", "CVE-2016-2178:5.3", "CVE-2016-2179:5.3", "CVE-2016-2180:7.5", "CVE-2016-2181:5.3", "CVE-2016-2182:4.3", "CVE-2016-2183:3.7", "CVE-2016-6302:5.3", "CVE-2016-6303:5.3", "CVE-2016-6304:7.5", "CVE-2016-2016-6306:4.3", "CVE-2016-7052:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Openssl" ], "apAbstract": "Vulnerability in OpenSSL affects AIX", "aparNo": "CVE-2016-2842", "aparNoSet": [ "CVE-2016-2842" ], "fixedIn": "See advisory", "ifixes": [ "IV83169m9b.160401.epkg.Z", "IV83169m9a.160401.epkg.Z", "IV83169s9d.160401.epkg.Z", "IV83169m9c.160401.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory19.asc", "filesets": [ "openssl.base:0.9.8.401-0.9.8.2506", "openssl.base:1.0.1.500-1.0.1.515", "openssl.base:1.0.2.500-1.0.2.500", "openssl.base:12.9.8.1100-12.9.8.2506" ], "issued": "20160418", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix18.tar", "cvss": [ "CVE-2016-2842:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "Vulnerabilities in OpenSSH affect AIX", "aparNo": "CVE-2016-3115", "aparNoSet": [ "CVE-2016-1908", "CVE-2016-3115" ], "fixedIn": "See advisory", "ifixes": [ "IV84698m9b.160513.epkg.Z", "IV84698m9a.160513.epkg.Z", "DEPRECATED::6201_mfix" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory8.asc", "filesets": [ "openssh.base.client:4.0.0.5200-6.0.0.6201", "openssh.base.server:4.0.0.5200-6.0.0.6201" ], "issued": "20160503", "updated": "20160513", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix8.tar", "cvss": [ "CVE-2016-3115:8.8", "CVE-2016-1908:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2016-3443", "aparNoSet": [ "CVE-2016-0264", "CVE-2016-0363", "CVE-2016-0376", "CVE-2016-0686", "CVE-2016-0687", "CVE-2016-3422", "CVE-2016-3426", "CVE-2016-3427", "CVE-2016-3443", "CVE-2016-3449" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_april2016_advisory.asc", "filesets": [ "Java6.sdk:\u003c6.0.0.561", "Java7.sdk:\u003c7.0.0.370", "Java71.sdk:\u003c7.1.0.250", "Java8.sdk:\u003c8.0.0.130", "Java6_64.sdk:\u003c6.0.0.560", "Java7_64.sdk:\u003c7.0.0.370", "Java71_64.sdk:\u003c7.1.0.250", "Java8_64.sdk:\u003c8.0.0.130" ], "issued": "20160506", "updated": "20160518", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2016-3443:10.0", "CVE-2016-0687:10.0", "CVE-2016-0686:10.0", "CVE-2016-3427:10.0", "CVE-2016-3449:7.6", "CVE-2016-3422:5.0", "CVE-2016-3426:4.3", "CVE-2016-0264:5.6", "CVE-2016-0363:8.1", "CVE-2016-0376:8.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2016-3598", "aparNoSet": [ "CVE-2016-3485", "CVE-2016-3511", "CVE-2016-3598" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2016_advisory.asc", "filesets": [ "Java6.sdk:\u003c6.0.0.585", "Java7.sdk:\u003c7.0.0.450", "Java71.sdk:\u003c7.1.0.350", "Java8.sdk:\u003c8.0.0.310", "Java6_64.sdk:\u003c6.0.0.585", "Java7_64.sdk:\u003c7.0.0.450", "Java71_64.sdk:\u003c7.1.0.350", "Java8_64.sdk:\u003c8.0.0.310" ], "issued": "20160819", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2016-3598:9.6", "CVE-2016-3511:7.7", "CVE-2016-3485:2.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2016-5582", "aparNoSet": [ "CVE-2016-5542", "CVE-2016-5554", "CVE-2016-5556", "CVE-2016-5568", "CVE-2016-5573", "CVE-2016-5582", "CVE-2016-5597" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_oct2016_advisory.asc", "filesets": [ "Java6.sdk:\u003c6.0.0.635", "Java7.sdk:\u003c7.0.0.560", "Java71.sdk:\u003c7.1.0.360", "Java8.sdk:\u003c8.0.0.321", "Java6_64.sdk:\u003c6.0.0.635", "Java7_64.sdk:\u003c7.0.0.560", "Java71_64.sdk:\u003c7.1.0.360", "Java8_64.sdk:\u003c8.0.0.321" ], "issued": "20161221", "updated": "20161223", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2016-5582:9.6", "CVE-2016-5568:9.6", "CVE-2016-5556:9.6", "CVE-2016-5573:8.3", "CVE-2016-5597:5.9", "CVE-2016-5554:4.3", "CVE-2016-5542:3.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX", "aparNo": "CVE-2016-6038", "aparNoSet": [ "CVE-2016-6038" ], "fixedIn": "6100-09-06", "ifixes": [ "IV89386s9c.160923.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_mitigation.asc", "filesets": [ "lwi.runtime:5.3.12.0-5.3.12.9" ], "issued": "20160922", "updated": "20160930", "siblings": [ "5300-12:IV89386", "6100-09:IV89418", "7100-03:IV89385" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar", "cvss": [ "CVE-2016-6038:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05" ], "apAbstract": "Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX", "aparNo": "CVE-2016-6038", "aparNoSet": [ "CVE-2016-6038" ], "fixedIn": "6100-09-06", "ifixes": [ "IV89418s5a.160927.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_mitigation.asc", "filesets": [ "lwi.runtime:6.1.9.0-6.1.9.99" ], "issued": "20160922", "updated": "20160930", "siblings": [ "5300-12:IV89386", "6100-09:IV89418", "7100-03:IV89385" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar", "cvss": [ "CVE-2016-6038:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "Vulnerabilities in OpenSSH affect AIX.", "aparNo": "CVE-2016-8858", "aparNoSet": [ "CVE-2016-10009", "CVE-2016-10011", "CVE-2016-10012", "CVE-2016-8858" ], "fixedIn": "See Bulletin", "ifixes": [ "6203_ifix.170124.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory10.asc", "filesets": [ "openssh.base.client:4.0.0.5200-6.0.0.6203", "openssh.base.server:4.0.0.5200-6.0.0.6203" ], "issued": "20170205", "updated": "null", "siblings": [], "downloadUrl": "null", "cvss": [ "CVE-2016-8858:5.3", "CVE-2016-10009:6.3", "CVE-2016-10011:5.5", "CVE-2016-10012:5.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "CVE-2016-8864", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91253" ], "fixedIn": "6100-09-09", "ifixes": [ "IV91253m9b.161209.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client_core:5.3.12.0-5.3.12.10" ], "issued": "20161215", "updated": "20161229", "siblings": [ "6100-09:IV91254", "7100-03:IV91214", "7100-04:IV91255", "7200-00:IV91256", "7200-01:IV91257" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-06", "6100-09-07", "6100-09-08" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "CVE-2016-8864", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91254" ], "fixedIn": "6100-09-09", "ifixes": [ "IV91254m6b.161213.epkg.Z", "IV91254m7b.161209.epkg.Z", "IV91254m8b.161209.epkg.z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client_core:6.1.9.0-6.1.9.200" ], "issued": "20161215", "updated": "20161229", "siblings": [ "5300-12:IV91253", "7100-03:IV91214", "7100-04:IV91255", "7200-00:IV91256", "7200-01:IV91257" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-04", "7100-03-05", "7100-03-06" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "CVE-2016-8864", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91214" ], "fixedIn": "7100-03-07", "ifixes": [ "IV91214m4b.161209.epkg.Z", "IV91214m5b.161209.epkg.Z", "IV91214m6a.161209.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client_core:7.1.3.0-7.1.3.48" ], "issued": "20161215", "updated": "20161229", "siblings": [ "5300-12:IV91253", "6100-09:IV91254", "7100-04:IV91255", "7200-00:IV91256", "7200-01:IV91257" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "CVE-2016-8864", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91255" ], "fixedIn": "7100-04-04", "ifixes": [ "IV91255m1b.161213.epkg.Z", "IV91255m2a.161213.epkg.Z", "IV91255m3c.161213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client_core:7.1.4.0-7.1.4.30" ], "issued": "20161215", "updated": "20161229", "siblings": [ "5300-12:IV91253", "6100-09:IV91254", "7100-03:IV91214", "7200-00:IV91256", "7200-01:IV91257" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "CVE-2016-8864", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91256" ], "fixedIn": "7200-00-03", "ifixes": [ "IV91256m1b.161212.epkg.Z", "IV91256m2b.161209.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client_core:7.2.0.0-7.2.0.2" ], "issued": "20161215", "updated": "20161229", "siblings": [ "5300-12:IV91253", "6100-09:IV91254", "7100-03:IV91214", "7100-04:IV91255", "7200-01:IV91257" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "CVE-2016-8864", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91257" ], "fixedIn": "7200-01-02", "ifixes": [ "IV91257m0a.161212.epkg.Z", "IV91257m1a.161213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client_core:7.2.1.0" ], "issued": "20161215", "updated": "20161229", "siblings": [ "5300-12:IV91253", "6100-09:IV91254", "7100-03:IV91214", "7100-04:IV91255", "7200-00:IV91256" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "There are multiple vulnerabilities in IBM SDK Java Technology Edition", "aparNo": "CVE-2017-10345", "aparNoSet": [ "CVE-2017-10165", "CVE-2017-10281", "CVE-2017-10285", "CVE-2017-10295", "CVE-2017-10309", "CVE-2017-10345", "CVE-2017-10346", "CVE-2017-10347", "CVE-2017-10348", "CVE-2017-10349", "CVE-2017-10350", "CVE-2017-10355", "CVE-2017-10356", "CVE-2017-10357", "CVE-2017-10388" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_oct2017_advisory.asc", "filesets": [ "Java6:\u003c6.0.0.655", "Java6.jre:\u003c6.0.0.655", "Java6_64.jre:\u003c6.0.0.655", "Java6_64.sdk:\u003c6.0.0.655", "Java6.sdk:\u003c6.0.0.655", "Java7:\u003c7.0.0.615", "Java7_64.jre:\u003c7.0.0.615", "Java7.jre:\u003c7.0.0.615", "Java7_64.sdk:\u003c7.0.0.615", "Java7.sdk:\u003c7.0.0.615", "Java7.1.jre:\u003c7.1.0.415", "Java7.1_64.jre:\u003c7.1.0.415", "Java7.1:\u003c7.1.0.415", "Java7.1.sdk:\u003c7.1.0.415", "Java7.1_64.sdk:\u003c7.1.0.415", "Java8:\u003c8.0.0.505", "Java8.jre:\u003c8.0.0.505", "Java8_64.jr" ], "issued": "20171207", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2017-10345:3.1", "CVE-2017-10295:4", "CVE-2017-10281:5.3", "CVE-2017-10350:5.3", "CVE-2017-10347:5.3", "CVE-2017-10349:5.3", "CVE-2017-10348:5.3", "CVE-2017-10357:5.3", "CVE-2017-10355:5.3", "CVE-2017-10356:6.2", "CVE-2017-10309:7.1", "CVE-2017-10388:7.5", "CVE-2017-10285:9.6", "CVE-2017-10346:9.6", "CVE-2017-10165:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-06", "6100-09-07", "6100-09-08" ], "apAbstract": "There is a vulnerability in bellmail that impacts AIX.", "aparNo": "CVE-2017-1093", "aparNoSet": [ "CVE-2017-1093" ], "fixedIn": "See Bulletin", "ifixes": [ "IV92238m8a.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.200" ], "issued": "20170129", "updated": "null", "siblings": [ "7200-01:IV92242", "7200-00:IV92241", "7100-03:IV92250", "7100-04:IV92240" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar", "cvss": [ "CVE-2017-1093:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2", "2.2.3.3", "2.2.3.4", "2.2.3.50", "2.2.3.51", "2.2.3.52", "2.2.3.60", "2.2.3.70", "2.2.3.80" ], "apAbstract": "There is a vulnerability in bellmail that impacts VIOS.", "aparNo": "CVE-2017-1093", "aparNoSet": [ "CVE-2017-1093" ], "fixedIn": "See Bulletin", "ifixes": [ "IV92238m8a.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc", "filesets": [ "See", "Bulletin" ], "issued": "20170129", "updated": "null", "siblings": [ "7200-01:IV92242", "7200-00:IV92241", "7100-03:IV92250", "7100-04:IV92240" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar", "cvss": [ "CVE-2017-1093:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "There are multiple vulnerabilities in IBM SDK Java Technology Edition", "aparNo": "CVE-2017-1376", "aparNoSet": [ "CVE-2017-10053", "CVE-2017-10067", "CVE-2017-10078", "CVE-2017-10087", "CVE-2017-10089", "CVE-2017-10090", "CVE-2017-10096", "CVE-2017-10101", "CVE-2017-10102", "CVE-2017-10105", "CVE-2017-10107", "CVE-2017-10108", "CVE-2017-10109", "CVE-2017-10110", "CVE-2017-10115", "CVE-2017-10116", "CVE-2017-10125", "CVE-2017-10243", "CVE-2017-1376", "CVE-2017-1541" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2017_advisory.asc", "filesets": [ "Java6:\u003c6.0.0.650", "Java6.jre:\u003c6.0.0.650", "Java6_64.jre:\u003c6.0.0.650", "Java6_64.sdk:\u003c6.0.0.650", "Java6.sdk:\u003c6.0.0.650", "Java7:\u003c7.0.0.610", "Java7_64.jre:\u003c7.0.0.610", "Java7.jre:\u003c7.0.0.610", "Java7_64.sdk:\u003c7.0.0.610", "Java7.sdk:\u003c7.0.0.610", "Java7.1.jre:\u003c7.1.0.410", "Java7.1_64.jre:\u003c7.1.0.410", "Java7.1:\u003c7.1.0.410", "Java7.1.sdk:\u003c7.1.0.410", "Java7.1_64.sdk:\u003c7.1.0.410", "Java8:\u003c8.0.0.410", "Java8.jre:\u003c8.0.0.410", "Java8_64.jr" ], "issued": "20170901", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2017-1376:9.8", "CVE-2017-1541:7.3", "CVE-2017-10053:5.3", "CVE-2017-10067:7.5", "CVE-2017-10078:8.1", "CVE-2017-10087:9.6", "CVE-2017-10089:9.6", "CVE-2017-10090:9.6", "CVE-2017-10096:9.6", "CVE-2017-10101:9.6", "CVE-2017-10102:9", "CVE-2017-10105:4.3", "CVE-2017-10107:9.6", "CVE-2017-10108:5.3", "CVE-2017-10109:5.3", "CVE-2017-10110:9.6", "CVE-2017-10115:7.5", "CVE-2017-10116:8.3", "CVE-2017-10125:7.1", "CVE-2017-10243:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "There is a vulnerability in the AIX IBM Java 6 SDK installp and updatep packages", "aparNo": "CVE-2017-1541", "aparNoSet": [ "CVE-2017-1541" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java6_advisory.asc", "filesets": [ "Java6:6.0.0.215-6.0.0.645", "Java6.jre:6.0.0.215-6.0.0.645", "Java6_64.jre:6.0.0.215-6.0.0.645", "Java6_64.sdk:6.0.0.215-6.0.0.645", "Java6.sdk:6.0.0.215-6.0.0.645" ], "issued": "20171002", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2017-1541:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "Vulnerabilities in OpenSSH affect AIX.", "aparNo": "CVE-2017-15906", "aparNoSet": [ "CVE-2017-15906" ], "fixedIn": "See Bulletin", "ifixes": [ "openssh-7.5.102.1100.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory11.asc", "filesets": [ "openssh.base.client:4.0.0.5200-7.1.102.1100", "openssh.base.server:4.0.0.5200-7.1.102.1100" ], "issued": "20171114", "updated": "null", "siblings": [], "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/reg/download.do?source\u003daixbp\u0026lang\u003den_US\u0026S_PKG\u003dopenssh\u0026cp\u003dUTF-8", "cvss": [ "CVE-2017-15906:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "There are multiple vulnerabilities in IBM SDK Java Technology Edition", "aparNo": "CVE-2017-3289", "aparNoSet": [ "CVE-2016-2183", "CVE-2016-5546", "CVE-2016-5547", "CVE-2016-5548", "CVE-2016-5549", "CVE-2016-5552", "CVE-2017-3231", "CVE-2017-3241", "CVE-2017-3252", "CVE-2017-3253", "CVE-2017-3259", "CVE-2017-3261", "CVE-2017-3272", "CVE-2017-3289" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2017_advisory.asc", "filesets": [ "Java6:\u003c6.0.0.641", "Java7:\u003c7.0.0.601", "Java7.1:\u003c7.1.0.401", "Java8.sdk:\u003c8.0.0.401" ], "issued": "20170405", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2017-3289:9.6", "CVE-2017-3272:9.6", "CVE-2017-3241:9", "CVE-2017-3253:7.5", "CVE-2016-5546:7.5", "CVE-2016-5548:6.5", "CVE-2016-5549:6.5", "CVE-2017-3252:5.8", "CVE-2016-5547:5.3", "CVE-2016-5552:5.3", "CVE-2017-3261:4.3", "CVE-2017-3231:4.3", "CVE-2017-3259:3.7", "CVE-2016-2183:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "There are multiple vulnerabilities in IBM SDK Java Technology Edition", "aparNo": "CVE-2017-3514", "aparNoSet": [ "CVE-2016-9840", "CVE-2016-9841", "CVE-2016-9842", "CVE-2016-9843", "CVE-2017-1289", "CVE-2017-3509", "CVE-2017-3511", "CVE-2017-3512", "CVE-2017-3514", "CVE-2017-3533", "CVE-2017-3539", "CVE-2017-3544" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_apr2017_advisory.asc", "filesets": [ "Java6:\u003c6.0.0.645", "Java6.jre:\u003c6.0.0.645", "Java6_64.jre:\u003c6.0.0.645", "Java6_64.sdk:\u003c6.0.0.645", "Java6.sdk:\u003c6.0.0.645", "Java7:\u003c7.0.0.605", "Java7_64.jre:\u003c7.0.0.605", "Java7.jre:\u003c7.0.0.605", "Java7_64.sdk:\u003c7.0.0.605", "Java7.sdk:\u003c7.0.0.605", "Java7.1.jre:\u003c7.1.0.405", "Java7.1_64.jre:\u003c7.1.0.405", "Java7.1:\u003c7.1.0.405", "Java7.1.sdk:\u003c7.1.0.405", "Java7.1_64.sdk:\u003c7.1.0.405", "Java8:\u003c8.0.0.406", "Java8.jre:\u003c8.0.0.406", "Java8_64.jr" ], "issued": "20170621", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2017-3514:8.3", "CVE-2017-3512:8.3", "CVE-2017-3511:7.7", "CVE-2017-3509:4.2", "CVE-2017-3544:3.7", "CVE-2017-3533:3.7", "CVE-2017-3539:3.1", "CVE-2017-1289:8.2", "CVE-2016-9840:3.3", "CVE-2016-9841:3.3", "CVE-2016-9842:3.3", "CVE-2016-9843:3.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "There is a vulnerability in OpenSSL used by AIX", "aparNo": "CVE-2017-3731", "aparNoSet": [ "CVE-2017-3731" ], "fixedIn": "See Bulletin", "ifixes": [ "102j_ifix.170207.epkg.Z", "fips_102j.170207.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory23.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.1000", "openssl.base:20.13.102.1000-20.13.102.1000" ], "issued": "20170217", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix23.tar", "cvss": [ "CVE-2017-3731:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "Vulnerability in OpenSSL affects AIX", "aparNo": "CVE-2017-3735", "aparNoSet": [ "CVE-2017-3735" ], "fixedIn": "See advisory", "ifixes": [ "openssl-1.0.2.1300.tar.Z", "openssl-20.13.102.1300.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory24.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.1100", "openssl.base:20.13.102.1000-20.13.102.1100" ], "issued": "20171214", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source\u003daixbp\u0026lang\u003den_US\u0026S_PKG\u003dopenssl\u0026cp\u003dUTF-8", "cvss": [ "CVE-2017-3735:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "Vulnerability in OpenSSL affects AIX (CVE-2017-3737)", "aparNo": "CVE-2017-3737", "aparNoSet": [ "CVE-2017-3737" ], "fixedIn": "See Bulletin", "ifixes": [ "102m_ifix.180105.epkg.Z", "fips_102m.180105.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory25.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.1300", "openssl.base:20.13.102.1000-20.13.102.1300" ], "issued": "20180129", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix25.tar", "cvss": [ "CVE-2017-3737:5.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "Vulnerability in OpenSSL affects AIX (CVE-2018-0732)", "aparNo": "CVE-2018-0732", "aparNoSet": [ "CVE-2018-0732" ], "fixedIn": "See Bulletin", "ifixes": [ "102oa_ifix.180906.epkg.Z", "fips_102oa.180910.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory28.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.1500", "openssl.base:20.13.102.1000-20.13.102.1500" ], "issued": "20180919", "updated": "null", "siblings": [], "downloadUrl": "http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html", "cvss": [ "CVE-2018-0732:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "There are vulnerabilities in OpenSSL used by AIX.", "aparNo": "CVE-2018-0734", "aparNoSet": [ "CVE-2018-0734", "CVE-2018-5407" ], "fixedIn": "See Bulletin", "ifixes": [ "102p_fix.181127.epkg.Z", "fips_102p.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory29.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.1600", "openssl.base:20.13.102.1000-20.16.102.1600" ], "issued": "20181211", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix29.tar", "cvss": [ "CVE-2018-0734:3.7", "CVE-2018-5407:5.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "Vulnerability in OpenSSL affects AIX (CVE-2018-0737)", "aparNo": "CVE-2018-0737", "aparNoSet": [ "CVE-2018-0737" ], "fixedIn": "See Bulletin", "ifixes": [ "openssl-1.0.2.1500.tar.Z", "openssl-20.13.102.1500.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory27.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.1300", "openssl.base:20.13.102.1000-20.13.102.1300" ], "issued": "20180702", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2018-0737:3.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "Vulnerability in OpenSSL affects AIX (CVE-2018-0739)", "aparNo": "CVE-2018-0739", "aparNoSet": [ "CVE-2018-0739" ], "fixedIn": "See Bulletin", "ifixes": [ "102ma_ifix.180410.epkg.Z", "fips_102ma.180410.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory26.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.1300", "openssl.base:20.13.102.1000-20.13.102.1300" ], "issued": "20180501", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix26.tar", "cvss": [ "CVE-2018-0739:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Tivoli Directory Server" ], "apAbstract": "Vulnerabilities in GSKit affect IBM Tivoli Directory Server and IBM Security Directory Server for AIX", "aparNo": "CVE-2018-1388", "aparNoSet": [ "CVE-2016-0702", "CVE-2018-1388", "CVE-2018-1426", "CVE-2018-1427", "CVE-2018-1447" ], "fixedIn": "See advisory", "ifixes": [ "ITDS" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/itds_advisory2.asc", "filesets": [ "ITDS:6.2.0.0-6.2.0.56", "ITDS:6.3.0.0-6.3.0.49", "ITDS:6.3.1.0-6.3.1.24", "ITDS:6.4.0.0-6.4.0.16" ], "issued": "20181214", "updated": "null", "siblings": [], "downloadUrl": "See Bulletin", "cvss": [ "CVE-2018-1388:9.1", "CVE-2018-1427:6.2", "CVE-2018-1426:7.4", "CVE-2016-0702:2.9", "CVE-2018-1447:5.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2018-1517", "aparNoSet": [ "CVE-2018-12539", "CVE-2018-1517", "CVE-2018-1656", "CVE-2018-2940", "CVE-2018-2952", "CVE-2018-2964", "CVE-2018-2973" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2018_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.630", "Java7_64.jre:\u003c7.0.0.630", "Java7.jre:\u003c7.0.0.630", "Java7_64.sdk:\u003c7.0.0.630", "Java7.sdk:\u003c7.0.0.630", "Java7.1.jre:\u003c7.1.0.430", "Java7.1_64.jre:\u003c7.1.0.430", "Java7.1:\u003c7.1.0.430", "Java7.1.sdk:\u003c7.1.0.430", "Java7.1_64.sdk:\u003c7.1.0.430", "Java8:\u003c8.0.0.521", "Java8.jre:\u003c8.0.0.521", "Java8_64.jre:\u003c8.0.0.521", "Java8.sdk:\u003c8.0.0.521", "Java8_64.sdk:\u003c8.0.0.521" ], "issued": "20180919", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2018-1517:5.9", "CVE-2018-1656:7.4", "CVE-2018-2973:5.9", "CVE-2018-2952:3.7", "CVE-2018-2940:4.3", "CVE-2018-2964:8.3", "CVE-2018-12539:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "Vulnerabilities in OpenSSH affect AIX.", "aparNo": "CVE-2018-15473", "aparNoSet": [ "CVE-2018-15473" ], "fixedIn": "See Bulletin", "ifixes": [ "15473_fix.180919.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory12.asc", "filesets": [ "openssh.base.client:4.0.0.5200-7.5.102.1500", "openssh.base.server:4.0.0.5200-7.5.102.1500" ], "issued": "20181024", "updated": "null", "siblings": [], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source\u003daixbp\u0026lang\u003den_US\u0026S_PKG\u003dopenssh\u0026cp\u003dUTF-8", "cvss": [ "CVE-2018-15473:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2018-1890", "aparNoSet": [ "CVE-2018-11212", "CVE-2018-12547", "CVE-2018-12549", "CVE-2018-1890", "CVE-2019-2422", "CVE-2019-2426", "CVE-2019-2449" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2019_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.640", "Java7_64.jre:\u003c7.0.0.640", "Java7.jre:\u003c7.0.0.640", "Java7_64.sdk:\u003c7.0.0.640", "Java7.sdk:\u003c7.0.0.640", "Java7.1.jre:\u003c7.1.0.440", "Java7.1_64.jre:\u003c7.1.0.440", "Java7.1:\u003c7.1.0.440", "Java7.1.sdk:\u003c7.1.0.440", "Java7.1_64.sdk:\u003c7.1.0.440", "Java8:\u003c8.0.0.530", "Java8.jre:\u003c8.0.0.530", "Java8_64.jre:\u003c8.0.0.530", "Java8.sdk:\u003c8.0.0.530", "Java8_64.sdk:\u003c8.0.0.530" ], "issued": "20180416", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2018-1890:5.6", "CVE-2018-12549:9.8", "CVE-2018-12547:9.8", "CVE-2019-2422:3.1", "CVE-2019-2449:3.1", "CVE-2019-2426:3.7", "CVE-2018-11212:3.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "zlib", "zlibNX" ], "apAbstract": "AIX is vulnerable to denial of service due to zlib and zlibNX", "aparNo": "CVE-2018-25032", "aparNoSet": [ "CVE-2018-25032" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ41754s4a.220829.epkg.Z", "IJ42198s2a.220829.epkg.Z", "rpm.rte.4.15.1.1006", "rpm.rte.4.15.1.2006" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/zlib_advisory.asc", "filesets": [ "rpm.rte:4.15.1.2000-4.15.1.2005", "rpm.rte:4.9.1.3-4.15.1.1005", "zlibNX.rte:7.2.4.0-7.2.4.7", "zlibNX.rte:7.3.0.0-7.3.0.1" ], "issued": "20220928", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/zlib_fix.tar ", "cvss": [ "CVE-2018-25032:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2018-2579", "aparNoSet": [ "CVE-2018-1417", "CVE-2018-2579", "CVE-2018-2582", "CVE-2018-2588", "CVE-2018-2599", "CVE-2018-2602", "CVE-2018-2603", "CVE-2018-2618", "CVE-2018-2633", "CVE-2018-2634", "CVE-2018-2637", "CVE-2018-2638", "CVE-2018-2639", "CVE-2018-2641", "CVE-2018-2657", "CVE-2018-2663", "CVE-2018-2677", "CVE-2018-2678" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2018_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.620", "Java7_64.jre:\u003c7.0.0.620", "Java7.jre:\u003c7.0.0.620", "Java7_64.sdk:\u003c7.0.0.620", "Java7.sdk:\u003c7.0.0.620", "Java7.1.jre:\u003c7.1.0.420", "Java7.1_64.jre:\u003c7.1.0.420", "Java7.1:\u003c7.1.0.420", "Java7.1.sdk:\u003c7.1.0.420", "Java7.1_64.sdk:\u003c7.1.0.420", "Java8:\u003c8.0.0.510", "Java8.jre:\u003c8.0.0.510", "Java8_64.jre:\u003c8.0.0.510", "Java8.sdk:\u003c8.0.0.510", "Java8_64.sdk:\u003c8.0.0.510" ], "issued": "20180501", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2018-2579:3.7", "CVE-2018-2588:4.3", "CVE-2018-2663:4.3", "CVE-2018-2677:4.3", "CVE-2018-2678:4.3", "CVE-2018-2602:4.5", "CVE-2018-2599:4.8", "CVE-2018-2603:5.3", "CVE-2018-2657:5.3", "CVE-2018-2618:5.9", "CVE-2018-2641:6.1", "CVE-2018-2582:6.5", "CVE-2018-2634:6.8", "CVE-2018-2637:7.4", "CVE-2018-2633:8.3", "CVE-2018-2638:8.3", "CVE-2018-2639:8.3", "CVE-2018-1417:8.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2018-2800", "aparNoSet": [ "CVE-2018-2783", "CVE-2018-2790", "CVE-2018-2794", "CVE-2018-2795", "CVE-2018-2796", "CVE-2018-2797", "CVE-2018-2798", "CVE-2018-2799", "CVE-2018-2800" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_apr2018_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.625", "Java7_64.jre:\u003c7.0.0.625", "Java7.jre:\u003c7.0.0.625", "Java7_64.sdk:\u003c7.0.0.625", "Java7.sdk:\u003c7.0.0.625", "Java7.1.jre:\u003c7.1.0.425", "Java7.1_64.jre:\u003c7.1.0.425", "Java7.1:\u003c7.1.0.425", "Java7.1.sdk:\u003c7.1.0.425", "Java7.1_64.sdk:\u003c7.1.0.425", "Java8:\u003c8.0.0.515", "Java8.jre:\u003c8.0.0.515", "Java8_64.jre:\u003c8.0.0.515", "Java8.sdk:\u003c8.0.0.515", "Java8_64.sdk:\u003c8.0.0.515" ], "issued": "20180612", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2018-2800:4.2", "CVE-2018-2795:5.3", "CVE-2018-2796:5.3", "CVE-2018-2797:5.3", "CVE-2018-2798:5.3", "CVE-2018-2799:5.3", "CVE-2018-2783:7.4", "CVE-2018-2794:7.7", "CVE-2018-2790:3.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2018-3139", "aparNoSet": [ "CVE-2018-13785", "CVE-2018-3136", "CVE-2018-3139", "CVE-2018-3149", "CVE-2018-3169", "CVE-2018-3180", "CVE-2018-3183", "CVE-2018-3214" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_oct2018_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.635", "Java7_64.jre:\u003c7.0.0.635", "Java7.jre:\u003c7.0.0.635", "Java7_64.sdk:\u003c7.0.0.635", "Java7.sdk:\u003c7.0.0.635", "Java7.1.jre:\u003c7.1.0.435", "Java7.1_64.jre:\u003c7.1.0.435", "Java7.1:\u003c7.1.0.435", "Java7.1.sdk:\u003c7.1.0.435", "Java7.1_64.sdk:\u003c7.1.0.435", "Java8:\u003c8.0.0.525", "Java8.jre:\u003c8.0.0.525", "Java8_64.jre:\u003c8.0.0.525", "Java8.sdk:\u003c8.0.0.525", "Java8_64.sdk:\u003c8.0.0.525" ], "issued": "20181214", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2018-3139:3.1", "CVE-2018-3136:3.4", "CVE-2018-13785:5.5", "CVE-2018-3214:5.3", "CVE-2018-3180:5.6", "CVE-2018-3149:8.3", "CVE-2018-3169:8.3", "CVE-2018-3183:9.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2019-10245", "aparNoSet": [ "CVE-2019-10245", "CVE-2019-2602", "CVE-2019-2684", "CVE-2019-2697", "CVE-2019-2698" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_apr2019_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.645", "Java7_64.jre:\u003c7.0.0.645", "Java7.jre:\u003c7.0.0.645", "Java7_64.sdk:\u003c7.0.0.645", "Java7.sdk:\u003c7.0.0.645", "Java7.1.jre:\u003c7.1.0.445", "Java7.1_64.jre:\u003c7.1.0.445", "Java7.1:\u003c7.1.0.445", "Java7.1.sdk:\u003c7.1.0.445", "Java7.1_64.sdk:\u003c7.1.0.445", "Java8:\u003c8.0.0.535", "Java8.jre:\u003c8.0.0.535", "Java8_64.jre:\u003c8.0.0.535", "Java8.sdk:\u003c8.0.0.535", "Java8_64.sdk:\u003c8.0.0.535" ], "issued": "20190628", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2019-10245:7.5", "CVE-2019-2684:5.9", "CVE-2019-2602:7.5", "CVE-2019-2697:8.1", "CVE-2019-2698:8.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2019-11775", "aparNoSet": [ "CVE-2019-11771", "CVE-2019-11772", "CVE-2019-11775", "CVE-2019-2762", "CVE-2019-2766", "CVE-2019-2769", "CVE-2019-2786", "CVE-2019-2816", "CVE-2019-4473", "CVE-2019-7317" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2019_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.650", "Java7_64.jre:\u003c7.0.0.650", "Java7.jre:\u003c7.0.0.650", "Java7_64.sdk:\u003c7.0.0.650", "Java7.sdk:\u003c7.0.0.650", "Java7.1.jre:\u003c7.1.0.450", "Java7.1_64.jre:\u003c7.1.0.450", "Java7.1:\u003c7.1.0.450", "Java7.1.sdk:\u003c7.1.0.450", "Java7.1_64.sdk:\u003c7.1.0.450", "Java8:\u003c8.0.0.540", "Java8.jre:\u003c8.0.0.540", "Java8_64.jre:\u003c8.0.0.540", "Java8.sdk:\u003c8.0.0.540", "Java8_64.sdk:\u003c8.0.0.540" ], "issued": "20191009", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2019-11775:8.4", "CVE-2019-11772:8.4", "CVE-2019-2766:3.1", "CVE-2019-2786:3.4", "CVE-2019-2816:4.8", "CVE-2019-2762:5.3", "CVE-2019-2769:5.3", "CVE-2019-7317:6.5", "CVE-2019-4473:8.4", "CVE-2019-11771:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "There is a vulnerability in OpenSSL used by AIX.", "aparNo": "CVE-2019-1547", "aparNoSet": [ "CVE-2019-1547", "CVE-2019-1563" ], "fixedIn": "See Bulletin", "ifixes": [ "openssl-1.0.2.2000.tar.Z", "openssl-20.16.102.2000.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory31.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.1801", "openssl.base:20.13.102.1000-20.16.102.1801" ], "issued": "20191126", "updated": "null", "siblings": [], "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp\u0026S_PKG\u003dopenssl", "cvss": [ "CVE-2019-1547:5.5", "CVE-2019-1563:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "There is a vulnerability in OpenSSL used by AIX.", "aparNo": "CVE-2019-1559", "aparNoSet": [ "CVE-2019-1559" ], "fixedIn": "See Bulletin", "ifixes": [ "102pa_mfix.190318.epkg.Z", "fips_102pa.190318.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory30.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.1601", "openssl.base:20.13.102.1000-20.16.102.1600" ], "issued": "20190416", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix30.tar", "cvss": [ "CVE-2019-1559:5.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2019-2989", "aparNoSet": [ "CVE-2019-17631", "CVE-2019-2933", "CVE-2019-2945", "CVE-2019-2958", "CVE-2019-2962", "CVE-2019-2964", "CVE-2019-2973", "CVE-2019-2975", "CVE-2019-2978", "CVE-2019-2981", "CVE-2019-2983", "CVE-2019-2988", "CVE-2019-2989", "CVE-2019-2992", "CVE-2019-2996", "CVE-2019-2999", "CVE-2020-2583", "CVE-2020-2593", "CVE-2020-2604", "CVE-2020-2659" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2020_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.660", "Java7_64.jre:\u003c7.0.0.660", "Java7.jre:\u003c7.0.0.660", "Java7_64.sdk:\u003c7.0.0.660", "Java7.sdk:\u003c7.0.0.660", "Java7.1.jre:\u003c7.1.0.460", "Java7.1_64.jre:\u003c7.1.0.460", "Java7.1:\u003c7.1.0.460", "Java7.1.sdk:\u003c7.1.0.460", "Java7.1_64.sdk:\u003c7.1.0.460", "Java8:\u003c8.0.0.605", "Java8.jre:\u003c8.0.0.605", "Java8_64.jre:\u003c8.0.0.605", "Java8.sdk:\u003c8.0.0.605", "Java8_64.sdk:\u003c8.0.0.605" ], "issued": "20200217", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2019-2989:6.8", "CVE-2019-2958:5.9", "CVE-2019-2975:4.8", "CVE-2019-2999:4.7", "CVE-2019-2996:4.2", "CVE-2019-2992:3.7", "CVE-2019-2988:3.7", "CVE-2019-2983:3.7", "CVE-2019-2981:3.7", "CVE-2019-2978:3.7", "CVE-2019-2973:3.7", "CVE-2019-2962:3.7", "CVE-2019-2964:3.7", "CVE-2019-2945:3.1", "CVE-2019-2933:3.1", "CVE-2019-17631:8.4", "CVE-2020-2604:8.1", "CVE-2020-2593:4.8", "CVE-2020-2659:3.7", "CVE-2020-2583:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "Vulnerabilities in OpenSSH affect AIX.", "aparNo": "CVE-2019-6109", "aparNoSet": [ "CVE-2018-20685", "CVE-2019-6109", "CVE-2019-6110", "CVE-2019-6111" ], "fixedIn": "See Bulletin", "ifixes": [ "OpenSSH_7.5.102.1800.tar.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory13.asc", "filesets": [ "openssh.base.client:4.0.0.5200-7.5.102.1600", "openssh.base.server:4.0.0.5200-7.5.102.1600" ], "issued": "20190716", "updated": "null", "siblings": [], "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp\u0026S_PKG\u003dopenssh", "cvss": [ "CVE-2019-6109:3.1", "CVE-2019-6110:3.1", "CVE-2019-6111:5.3", "CVE-2018-20685:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-02", "7100-05-03", "7100-05-04" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "CVE-2019-8936", "aparNoSet": [ "CVE-2019-8936" ], "fixedIn": "7100-05-05", "ifixes": [ "IJ17062m4a.190628.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.33" ], "issued": "20190819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar", "cvss": [ "CVE-2019-8936:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-02", "7200-02-03", "7200-02-04" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "CVE-2019-8936", "aparNoSet": [ "CVE-2019-8936" ], "fixedIn": "7200-02-05", "ifixes": [ "IJ17064m4a.190701.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc", "filesets": [ "bos.net.tcp.ntp:7.2.2.0-7.2.2.17", "bos.net.tcp.ntpd:7.2.2.0-7.2.2.17" ], "issued": "20190819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar", "cvss": [ "CVE-2019-8936:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-01", "7200-03-02", "7200-03-03" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "CVE-2019-8936", "aparNoSet": [ "CVE-2019-8936" ], "fixedIn": "7200-03-04", "ifixes": [ "IJ17065m3a.190701.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc", "filesets": [ "bos.net.tcp.ntp:7.2.3.0-7.2.3.15", "bos.net.tcp.ntpd:7.2.3.0-7.2.3.15" ], "issued": "20190819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar", "cvss": [ "CVE-2019-8936:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-06", "7100-04-07", "7100-04-08" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "CVE-2019-8936", "aparNoSet": [ "CVE-2019-8936" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ17061m8a.190628.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.35" ], "issued": "20190819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar", "cvss": [ "CVE-2019-8936:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-04", "7200-01-05", "7200-01-06" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "CVE-2019-8936", "aparNoSet": [ "CVE-2019-8936" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ17063m6a.190701.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc", "filesets": [ "bos.net.tcp.ntp:7.2.1.0-7.2.1.2", "bos.net.tcp.ntpd:7.2.1.0-7.2.1.3" ], "issued": "20190819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar", "cvss": [ "CVE-2019-8936:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2020-14621", "aparNoSet": [ "CVE-2019-17639", "CVE-2020-14556", "CVE-2020-14577", "CVE-2020-14578", "CVE-2020-14579", "CVE-2020-14583", "CVE-2020-14593", "CVE-2020-14621", "CVE-2020-2590", "CVE-2020-2601" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2020_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.670", "Java7_64.jre:\u003c7.0.0.670", "Java7.jre:\u003c7.0.0.670", "Java7_64.sdk:\u003c7.0.0.670", "Java7.sdk:\u003c7.0.0.670", "Java7.1.jre:\u003c7.1.0.470", "Java7.1_64.jre:\u003c7.1.0.470", "Java7.1:\u003c7.1.0.470", "Java7.1.sdk:\u003c7.1.0.470", "Java7.1_64.sdk:\u003c7.1.0.470", "Java8:\u003c8.0.0.616", "Java8.jre:\u003c8.0.0.616", "Java8_64.jre:\u003c8.0.0.616", "Java8.sdk:\u003c8.0.0.616", "Java8_64.sdk:\u003c8.0.0.616" ], "issued": "20201103", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2020-14621:5.3", "CVE-2020-14593:7.4", "CVE-2020-14583:8.3", "CVE-2020-14579:3.7", "CVE-2020-14578:3.7", "CVE-2020-14577:3.7", "CVE-2020-14556:4.8", "CVE-2019-17639:5.3", "CVE-2020-2601:6.8", "CVE-2020-2590:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2020-14779", "aparNoSet": [ "CVE-2020-14779", "CVE-2020-14781", "CVE-2020-14782", "CVE-2020-14796", "CVE-2020-14797", "CVE-2020-14798", "CVE-2020-14803", "CVE-2020-27221", "CVE-2020-2773" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_mar2021_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.680", "Java7_64.jre:\u003c7.0.0.680", "Java7.jre:\u003c7.0.0.680", "Java7_64.sdk:\u003c7.0.0.680", "Java7.sdk:\u003c7.0.0.680", "Java7.1.jre:\u003c7.1.0.480", "Java7.1_64.jre:\u003c7.1.0.480", "Java7.1:\u003c7.1.0.480", "Java7.1.sdk:\u003c7.1.0.480", "Java7.1_64.sdk:\u003c7.1.0.480", "Java8:\u003c8.0.0.625", "Java8.jre:\u003c8.0.0.625", "Java8_64.jre:\u003c8.0.0.625", "Java8.sdk:\u003c8.0.0.625", "Java8_64.sdk:\u003c8.0.0.625" ], "issued": "20210315", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2020-14779:3.7", "CVE-2020-14796:3.1", "CVE-2020-14797:3.7", "CVE-2020-14798:3.1", "CVE-2020-14782:3.7", "CVE-2020-2773:3.7", "CVE-2020-14803:5.3", "CVE-2020-27221:9.8", "CVE-2020-14781:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2020-2830", "aparNoSet": [ "CVE-2019-2949", "CVE-2020-2654", "CVE-2020-2754", "CVE-2020-2755", "CVE-2020-2756", "CVE-2020-2757", "CVE-2020-2781", "CVE-2020-2800", "CVE-2020-2803", "CVE-2020-2805", "CVE-2020-2830" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_apr2020_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.665", "Java7_64.jre:\u003c7.0.0.665", "Java7.jre:\u003c7.0.0.665", "Java7_64.sdk:\u003c7.0.0.665", "Java7.sdk:\u003c7.0.0.665", "Java7.1.jre:\u003c7.1.0.465", "Java7.1_64.jre:\u003c7.1.0.465", "Java7.1:\u003c7.1.0.465", "Java7.1.sdk:\u003c7.1.0.465", "Java7.1_64.sdk:\u003c7.1.0.465", "Java8:\u003c8.0.0.610", "Java8.jre:\u003c8.0.0.610", "Java8_64.jre:\u003c8.0.0.610", "Java8.sdk:\u003c8.0.0.610", "Java8_64.sdk:\u003c8.0.0.610" ], "issued": "20200731", "updated": "null", "siblings": [], "downloadUrl": "See advisory", "cvss": [ "CVE-2020-2830:5.3", "CVE-2020-2805:8.3", "CVE-2020-2803:8.3", "CVE-2020-2800:4.8", "CVE-2020-2781:5.3", "CVE-2020-2757:3.7", "CVE-2020-2756:3.7", "CVE-2020-2755:3.7", "CVE-2020-2754:3.7", "CVE-2019-2949:6.8", "CVE-2020-2654:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "RPM" ], "apAbstract": "AIX is vulnerable to arbitrary code execution and RPM database corruption and denial of service due to RPM.", "aparNo": "CVE-2021-20271", "aparNoSet": [ "CVE-2021-20266", "CVE-2021-20271", "CVE-2021-3421" ], "fixedIn": "See Bulletin", "ifixes": [ "rpm.rte.4.15.1.1006", "rpm.rte.4.15.1.2006" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rpm_advisory.asc", "filesets": [ "rpm.rte:4.9.1.3-4.15.1.1005", "rpm.rte:4.15.1.2000-4.15.1.2005" ], "issued": "20220923", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rpm_fix.tar", "cvss": [ "CVE-2021-20271:6.7", "CVE-2021-3421:6.1", "CVE-2021-20266:3.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2021-2161", "aparNoSet": [ "CVE-2021-2161", "CVE-2021-2369", "CVE-2021-2432" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_sep2021_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.690", "Java7_64.jre:\u003c7.0.0.690", "Java7.jre:\u003c7.0.0.690", "Java7_64.sdk:\u003c7.0.0.690", "Java7.sdk:\u003c7.0.0.690", "Java7.1.jre:\u003c7.1.0.490", "Java7.1_64.jre:\u003c7.1.0.490", "Java7.1:\u003c7.1.0.490", "Java7.1.sdk:\u003c7.1.0.490", "Java7.1_64.sdk:\u003c7.1.0.490", "Java8:\u003c8.0.0.635", "Java8.jre:\u003c8.0.0.635", "Java8_64.jre:\u003c8.0.0.635", "Java8.sdk:\u003c8.0.0.635", "Java8_64.sdk:\u003c8.0.0.635" ], "issued": "20210915", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/java_sep2021_fix.tar", "cvss": [ "CVE-2021-2161:5.9", "CVE-2021-2432:3.7", "CVE-2021-2369:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java7", "Java7.1", "Java8" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2021-2163", "aparNoSet": [ "CVE-2021-2163", "CVE-2021-28167", "CVE-2021-41041", "CVE-2022-21619", "CVE-2022-21624", "CVE-2022-21626", "CVE-2022-21628", "CVE-2022-3676" ], "fixedIn": "See Bulletin", "ifixes": [ "null" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_dec2022_advisory.asc", "filesets": [ "See", "Bulletin" ], "issued": "20221222", "updated": "null", "siblings": [], "downloadUrl": "null", "cvss": [ "CVE-2021-2163:5.3", "CVE-2021-28167:6.5", "CVE-2021-41041:5.3", "CVE-2022-21619:3.7", "CVE-2022-21624:3.7", "CVE-2022-21626:5.3", "CVE-2022-21628:5.3", "CVE-2022-3676:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "Vulnerabilities in OpenSSL affect AIX", "aparNo": "CVE-2021-23839", "aparNoSet": [ "CVE-2021-23839", "CVE-2021-23840", "CVE-2021-23841" ], "fixedIn": "See Bulletin", "ifixes": [ "1022100b.210323.epkg.Z", "fips2100b.210323.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory33.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.2100", "openssl.base:20.13.102.1000-20.16.102.2100" ], "issued": "20210415", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix33.tar", "cvss": [ "CVE-2021-23839:5.9", "CVE-2021-23840:7.5", "CVE-2021-23841:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2021-35560", "aparNoSet": [ "CVE-2021-2341", "CVE-2021-35556", "CVE-2021-35559", "CVE-2021-35560", "CVE-2021-35564", "CVE-2021-35565", "CVE-2021-35578", "CVE-2021-35586", "CVE-2021-41035" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_feb2022_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.700", "Java7_64.jre:\u003c7.0.0.700", "Java7.jre:\u003c7.0.0.700", "Java7_64.sdk:\u003c7.0.0.700", "Java7.sdk:\u003c7.0.0.700", "Java7.1.jre:\u003c7.1.0.500", "Java7.1_64.jre:\u003c7.1.0.500", "Java7.1:\u003c7.1.0.500", "Java7.1.sdk:\u003c7.1.0.500", "Java7.1_64.sdk:\u003c7.1.0.500", "Java8:\u003c8.0.0.700", "Java8.jre:\u003c8.0.0.700", "Java8_64.jre:\u003c8.0.0.700", "Java8.sdk:\u003c8.0.0.700", "Java8_64.sdk:\u003c8.0.0.700" ], "issued": "20220223", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/java_feb2022_fix.tar", "cvss": [ "CVE-2021-35560:7.5", "CVE-2021-35586:5.3", "CVE-2021-35578:5.3", "CVE-2021-35564:5.3", "CVE-2021-35559:5.3", "CVE-2021-35556:5.3", "CVE-2021-35565:5.3", "CVE-2021-41035:7.7", "CVE-2021-2341:3.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "There is a vulnerability in OpenSSL used by AIX.", "aparNo": "CVE-2021-3712", "aparNoSet": [ "CVE-2021-3712" ], "fixedIn": "See Bulletin", "ifixes": [ "1022102a.210927.epkg.Z", "fips2102a.210927.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory34.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.2102", "openssl.base:20.13.102.1000-20.16.102.2103" ], "issued": "20220106", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix34.tar", "cvss": [ "CVE-2021-3712:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "smbcd" ], "apAbstract": "There is a vulnerability in the AIX smbcd daemon.", "aparNo": "CVE-2021-38993", "aparNoSet": [ "CVE-2021-38993" ], "fixedIn": "See Bulletin", "ifixes": [ "smbcd_fix.tar", "smbc_302_fileset_71.tar.gz", "smbc_302_fileset_72.tar.gz" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory.asc", "filesets": [ "smbc.rte:7.1.0.0-7.1.302.6", "smbc.rte:7.2.0.0-7.2.302.6" ], "issued": "20220224", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/smbcd_fix.tar", "cvss": [ "CVE-2021-38993:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSH" ], "apAbstract": "Vulnerabilities in OpenSSH affect AIX.", "aparNo": "CVE-2021-41617", "aparNoSet": [ "CVE-2021-41617" ], "fixedIn": "See Bulletin", "ifixes": [ "41617s9a.211029.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory14.asc", "filesets": [ "openssh.base.client:4.0.0.5200-8.1.102.2104", "openssh.base.server:4.0.0.5200-8.1.102.2104" ], "issued": "20220106", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix14.tar", "cvss": [ "CVE-2021-41617:7.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "AIX is vulnerable to a denial of service due to OpenSSL", "aparNo": "CVE-2022-0778", "aparNoSet": [ "CVE-2022-0778" ], "fixedIn": "See Bulletin", "ifixes": [ "1022103a.220422.epkg.Z", "1111200a.220422.epkg.Z", "1121200a.220422.epkg.Z", "fips2104a.220425.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory35.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.2103", "openssl.base:20.13.102.1000-20.16.102.2104", "openssl.base:1.1.1.0-1.1.1.1200", "openssl.base:1.1.2.0-1.1.2.1200" ], "issued": "20220513", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix35.tar", "cvss": [ "CVE-2022-0778:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "AIX is vulnerable to arbitrary command execution due to OpenSSL", "aparNo": "CVE-2022-1292", "aparNoSet": [ "CVE-2022-1292", "CVE-2022-2068", "CVE-2022-2097" ], "fixedIn": "See Bulletin", "ifixes": [ "1022104a.220804.epkg.Z", "1111201a.220804.epkg.Z", "1121201a.220804.epkg.Z", "fips2105a.220804.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory36.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.2104", "openssl.base:20.13.102.1000-20.16.102.2105", "openssl.base:1.1.1.0-1.1.1.1201", "openssl.base:1.1.2.0-1.1.2.1201" ], "issued": "20220817", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix36.tar", "cvss": [ "CVE-2022-1292:6.3", "CVE-2022-2068:7.3", "CVE-2022-2097:6.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2022-21365", "aparNoSet": [ "CVE-2021-35550", "CVE-2021-35561", "CVE-2021-35603", "CVE-2022-21248", "CVE-2022-21293", "CVE-2022-21294", "CVE-2022-21299", "CVE-2022-21340", "CVE-2022-21341", "CVE-2022-21360", "CVE-2022-21365", "CVE-2022-21434", "CVE-2022-21443", "CVE-2022-21496" ], "fixedIn": "See advisory", "ifixes": [ "See", "advisory" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jun2022_advisory.asc", "filesets": [ "Java7:\u003c7.0.0.705", "Java7_64.jre:\u003c7.0.0.705", "Java7.jre:\u003c7.0.0.705", "Java7_64.sdk:\u003c7.0.0.705", "Java7.sdk:\u003c7.0.0.705", "Java7.1.jre:\u003c7.1.0.505", "Java7.1_64.jre:\u003c7.1.0.505", "Java7.1:\u003c7.1.0.505", "Java7.1.sdk:\u003c7.1.0.505", "Java7.1_64.sdk:\u003c7.1.0.505", "Java8:\u003c8.0.0.706", "Java8.jre:\u003c8.0.0.706", "Java8_64.jre:\u003c8.0.0.706", "Java8.sdk:\u003c8.0.0.706", "Java8_64.sdk:\u003c8.0.0.706" ], "issued": "20220614", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jun2022_fix.tar", "cvss": [ "CVE-2022-21365:5.3", "CVE-2022-21360:5.3", "CVE-2022-21341:5.3", "CVE-2022-21340:5.3", "CVE-2022-21294:5.3", "CVE-2022-21293:5.3", "CVE-2022-21248:3.7", "CVE-2021-35550:5.9", "CVE-2021-35603:3.7", "CVE-2022-21299:5.3", "CVE-2022-21496:5.3", "CVE-2022-21434:5.3", "CVE-2022-21443:3.7", "CVE-2021-35561:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2022-21426", "aparNoSet": [ "CVE-2022-21426", "CVE-2023-21830", "CVE-2023-21843", "CVE-2023-30441" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_may2023_advisory.asc", "filesets": [], "issued": "20230519", "updated": "null", "siblings": [], "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere", "cvss": [ "CVE-2022-21426:5.3", "CVE-2023-21830:5.3", "CVE-2023-21843:3.7", "CVE-2023-30441:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python39" ], "apAbstract": "AIX is affected by multiple vulnerabilities in Python", "aparNo": "CVE-2022-22827", "aparNoSet": [ "CVE-2021-45960", "CVE-2021-46143", "CVE-2022-22822", "CVE-2022-22823", "CVE-2022-22824", "CVE-2022-22825", "CVE-2022-22826", "CVE-2022-22827", "CVE-2022-23852", "CVE-2022-23990", "CVE-2022-25235", "CVE-2022-25236", "CVE-2022-25313", "CVE-2022-25314", "CVE-2022-25315" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.11.99" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp", "cvss": [ "CVE-2022-22827:7.8", "CVE-2022-25236:5.3", "CVE-2022-25235:3.3", "CVE-2022-25315:7.8", "CVE-2022-22824:7.8", "CVE-2022-22825:7.8", "CVE-2022-22823:7.8", "CVE-2021-46143:7.8", "CVE-2022-23990:9.8", "CVE-2022-22826:7.8", "CVE-2022-25314:7.3", "CVE-2022-25313:5.5", "CVE-2022-23852:9.8", "CVE-2021-45960:5.5", "CVE-2022-22822:7.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "BIND" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "CVE-2022-3094", "aparNoSet": [ "CVE-2022-3094", "CVE-2022-3736", "CVE-2022-3924" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory23.asc", "filesets": [ "bind.rte:7.1.916.0-7.1.916.2601" ], "issued": "20230718", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2022-3094:7.5", "CVE-2022-3736:7.5", "CVE-2022-3924:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Perl" ], "apAbstract": "AIX is vulnerable to HTTP request smuggling due to Perl", "aparNo": "CVE-2022-31081", "aparNoSet": [ "CVE-2022-31081" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory6.asc", "filesets": [ "perl.rte:5.28.0.0-5.28.1.4", "perl.rte:5.34.0.0-5.34.1.1" ], "issued": "20230503", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2022-31081:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "Multiple vulnerabilities in OpenSSL affect AIX", "aparNo": "CVE-2022-3358", "aparNoSet": [ "CVE-2022-3358", "CVE-2022-3602", "CVE-2022-3786" ], "fixedIn": "See Bulletin", "ifixes": [], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory37.asc", "filesets": [ "openssl.base:3.0.5.101-3.0.5.101" ], "issued": "20230124", "updated": "null", "siblings": [], "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp", "cvss": [ "CVE-2022-3358:5.3", "CVE-2022-3602:7.5", "CVE-2022-3786:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "InvScout" ], "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability due to invscout", "aparNo": "CVE-2022-36768", "aparNoSet": [ "CVE-2022-36768" ], "fixedIn": "See Bulletin", "ifixes": [ "invscout_fix3" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_advisory3.asc", "filesets": [ "invscout.rte:2.2.0.0-2.2.0.22" ], "issued": "20220912", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_fix3.tar", "cvss": [ "CVE-2022-36768:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "zlib", "zlibNX" ], "apAbstract": "AIX is vulnerable to denial of service due to zlib and zlibNX", "aparNo": "CVE-2022-37434", "aparNoSet": [ "CVE-2022-37434" ], "fixedIn": "See Bulletin", "ifixes": [ "rpm.rte.4.15.1.1007", "rpm.rte.4.15.1.2007", "IJ47324m5a.230623.epkg.Z", "IJ46030m3a.230623.epkg.Z", "IJ44986s1a.230623.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/zlib_advisory2.asc", "filesets": [ "rpm.rte:4.9.1.3-4.15.1.1006", "rpm.rte:4.15.1.2000-4.15.1.2006", "zlibNX.rte:7.2.4.0-7.2.4.8", "zlibNX.rte:7.3.0.0-7.3.0.2", "zlibNX.rte:7.3.1.0-7.3.1.0" ], "issued": "20230725", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/zlib_fix2.tar", "cvss": [ "CVE-2022-37434:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "Multiple vulnerabilities in OpenSSL affect AIX", "aparNo": "CVE-2022-3996", "aparNoSet": [ "CVE-2022-3996", "CVE-2022-4203", "CVE-2022-4304", "CVE-2022-4450", "CVE-2023-0215", "CVE-2023-0216", "CVE-2023-0217", "CVE-2023-0286", "CVE-2023-0401" ], "fixedIn": "See Bulletin", "ifixes": [], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory38.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.2105", "openssl.base:1.1.1.0-1.1.1.1202", "openssl.base:1.1.2.0-1.1.2.1202", "openssl.base:20.13.102.1000-20.16.102.2106", "openssl.base:3.0.5.101-3.0.7.1000" ], "issued": "20230321", "updated": "null", "siblings": [], "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp\u0026S_PKG\u003dopenssl", "cvss": [ "CVE-2023-3996:3.7", "CVE-2023-0401:7.5", "CVE-2022-4304:7.5", "CVE-2022-4203:7.5", "CVE-2023-0216:7.5", "CVE-2023-0215:7.5", "CVE-2023-0217:7.5", "CVE-2023-0286:8.2", "CVE-2022-4450:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2022-40609", "aparNoSet": [ "CVE-2022-40609", "CVE-2023-22049" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_aug2023_advisory.asc", "filesets": [ "Java8:\u003c8.0.0.810", "Java8.jre:\u003c8.0.0.810", "Java8.sdk:\u003c8.0.0.81", "Java8_64.sdk:\u003c8.0.0.810", "Java8_64.jre:\u003c8.0.0.810" ], "issued": "20230831", "updated": "null", "siblings": [], "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere\u0026product\u003dibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29\u0026release\u003d8.0.0.0", "cvss": [ "CVE-2022-40609:8.1", "CVE-2023-22049:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python39" ], "apAbstract": "AIX is affected by arbitrary code execution and denial of service due to Python", "aparNo": "CVE-2022-40674", "aparNoSet": [ "CVE-2020-10735", "CVE-2022-40674" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory2.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.13.99" ], "issued": "20221101", "updated": "null", "siblings": [], "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp", "cvss": [ "CVE-2022-40674:9.8", "CVE-2020-10735:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "SMB" ], "apAbstract": "AIX is vulnerable to a denial of service due to the AIX SMB client", "aparNo": "CVE-2022-43381", "aparNoSet": [ "CVE-2022-43381" ], "fixedIn": "See Bulletin", "ifixes": [ "null" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory2.asc", "filesets": [ "smbc.rte:7.1.0.0-7.1.302.8", "smbc.rte:7.2.0.0-7.2.302.8" ], "issued": "20221222", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/smbcd_fix2.tar", "cvss": [ "CVE-2022-43381:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python" ], "apAbstract": "AIX is affected by a denial of service due to Python", "aparNo": "CVE-2022-43680", "aparNoSet": [ "CVE-2022-43680" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory3.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.14.0" ], "issued": "20221222", "updated": "null", "siblings": [], "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp", "cvss": [ "CVE-2022-43680:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python" ], "apAbstract": "AIX is affected by a denial of service due to Python", "aparNo": "CVE-2022-45061", "aparNoSet": [ "CVE-2022-45061" ], "fixedIn": "See Bulletin", "ifixes": [], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory4.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.14.1" ], "issued": "20230314", "updated": "null", "siblings": [], "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp", "cvss": [ "CVE-2022-45061:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "Multiple vulnerabilities in OpenSSL affect AIX", "aparNo": "CVE-2023-0464", "aparNoSet": [ "CVE-2023-0464", "CVE-2023-0465", "CVE-2023-0466", "CVE-2023-2650", "CVE-2023-2975", "CVE-2023-3446", "CVE-2023-3817" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory39.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.2106", "openssl.base:1.1.1.0-1.1.1.2000", "openssl.base:1.1.2.0-1.1.2.2000", "openssl.base:20.13.102.1000-20.16.102.2107", "openssl.base:3.0.5.101-3.0.8.1000" ], "issued": "20230911", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp\u0026S_PKG\u003dopenssl", "cvss": [ "CVE-2023-0464:5.3", "CVE-2023-0465:3.7", "CVE-2023-0466:3.7", "CVE-2023-2650:7.5", "CVE-2023-2975:5.3", "CVE-2023-3446:3.7", "CVE-2023-3817:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2023-21930", "aparNoSet": [ "CVE-2023-21930", "CVE-2023-21937", "CVE-2023-21938", "CVE-2023-21939", "CVE-2023-21967", "CVE-2023-21968", "CVE-2023-2597" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jul2023_advisory.asc", "filesets": [ "Java8:\u003c8.0.0.805" ], "issued": "20230711", "updated": "null", "siblings": [], "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere", "cvss": [ "CVE-2023-21930:7.4", "CVE-2023-21937:3.7", "CVE-2023-21938:3.7", "CVE-2023-21939:5.3", "CVE-2023-21967:5.9", "CVE-2023-21968:3.7", "CVE-2023-2597:7.0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2023-22067", "aparNoSet": [ "CVE-2023-22067", "CVE-2023-22081", "CVE-2023-5676" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_dec2023_advisory.asc", "filesets": [ "Java8:\u003c8.0.0.815", "Java8.jre:\u003c8.0.0.815", "Java8.sdk:\u003c8.0.0.815", "Java8_64.sdk:\u003c8.0.0.815", "Java8_64.jre:\u003c8.0.0.815" ], "issued": "20231218", "updated": "null", "siblings": [], "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere\u0026product\u003dibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29\u0026release\u003d8.0.0.0\u0026function\u003dall", "cvss": [ "CVE-2023-22067:5.3", "CVE-2023-22081:5.3", "CVE-2023-5676:4.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python" ], "apAbstract": "AIX is affected by security restrictions bypass due to Python", "aparNo": "CVE-2023-24329", "aparNoSet": [ "CVE-2023-24329" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory5.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.16.0" ], "issued": "20230818", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-24329:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "NTPv4" ], "apAbstract": "AIX is vulnerable to a denial of service due to NTP", "aparNo": "CVE-2023-26551", "aparNoSet": [ "CVE-2023-26551", "CVE-2023-26552", "CVE-2023-26553", "CVE-2023-26554" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ47973s6a.230829.epkg.Z", "IJ47974s4a.230829.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory14.asc", "filesets": [ "ntp.rte:7.4.2.8100-7.4.2.8153", "ntp.rte:73.4.2.8151-73.4.2.8154" ], "issued": "20231005", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix14.tar", "cvss": [ "CVE-2023-26551:5.3", "CVE-2023-26552:5.3", "CVE-2023-26553:5.3", "CVE-2023-26554:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "BIND" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "CVE-2023-2828", "aparNoSet": [ "CVE-2023-2828" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory24.asc", "filesets": [ "bind.rte:7.1.916.0-7.1.916.2602" ], "issued": "20230907", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-2828:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "invScout" ], "apAbstract": "AIX is vulnerable to arbitrary command execution due to invscout", "aparNo": "CVE-2023-28528", "aparNoSet": [ "CVE-2023-28528" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_advisory4.asc", "filesets": [ "invscout.rte:2.2.0.0-2.2.0.23", "invscout.rte:2.2.0.0-2.2.0.23" ], "issued": "20230412", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_fix4.tar", "cvss": [ "CVE-2023-28528:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Perl" ], "apAbstract": "AIX is vulnerable to sensitive information exposure due to Perl - CVE-2023-31484", "aparNo": "CVE-2023-31484", "aparNoSet": [ "CVE-2023-31484" ], "fixedIn": "See Bulletin", "ifixes": [ "31484s6a.231017.epkg.Z", "31484m6a.231020.epkg.Z", "31484s2a.231018.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory7.asc", "filesets": [ "perl.rte:5.28.0.0-5.28.1.6", "perl.rte:5.34.0.0-5.34.1.3" ], "issued": "20231005", "updated": "20231102", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-31484:6.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Perl" ], "apAbstract": "AIX is vulnerable to sensitive information exposure due to Perl - CVE-2023-2331486", "aparNo": "CVE-2023-31486", "aparNoSet": [ "CVE-2023-31486" ], "fixedIn": "See Bulletin", "ifixes": [ "31486s6a.231017.epkg.Z", "31484m6a.231020.epkg.Z", "31486s6b.231020.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory7.asc", "filesets": [ "perl.rte:5.28.0.0-5.28.1.7" ], "issued": "20231005", "updated": "20231102", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-31486:6.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "BIND" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "CVE-2023-3341", "aparNoSet": [ "CVE-2023-3341" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ49093s7.231109.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc", "filesets": [ "bind.rte:7.1.916.0-7.1.916.2603", "bind.rte:7.3.916.0-7.3.916.2600" ], "issued": "20231218", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-3341:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2023-33850", "aparNoSet": [ "CVE-2023-33850", "CVE-2024-20918", "CVE-2024-20921", "CVE-2024-20926", "CVE-2024-20945", "CVE-2024-20952" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_feb2024_advisory.asc", "filesets": [ "Java8:\u003c8.0.0.820", "Java8.jre:\u003c8.0.0.820", "Java8.sdk:\u003c8.0.0.820", "Java8_64.sdk:\u003c8.0.0.820", "Java8_64.jre:\u003c8.0.0.820" ], "issued": "20240307", "updated": "null", "siblings": [], "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere\u0026product\u003dibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29\u0026release\u003d8.0.0.0\u0026function\u003dall", "cvss": [ "CVE-2023-33850:7.5", "CVE-2024-20918:7.4", "CVE-2024-20921:5.9", "CVE-2024-20926:5.9", "CVE-2024-20945:4.7", "CVE-2024-20952:7.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "tcl" ], "apAbstract": "AIX is vulnerable to arbitrary code execution (CVE-2023-36328) due to tcl", "aparNo": "CVE-2023-36328", "aparNoSet": [ "CVE-2023-36328" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcl_advisory.asc", "filesets": [ "tcl.base:8.6.10.0-8.6.10.0" ], "issued": "20241107", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcl_fix.tar", "cvss": [ "CVE-2023-36328:9.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python" ], "apAbstract": "AIX is affected by multiple vulnerabilities due to Python", "aparNo": "CVE-2023-37920", "aparNoSet": [ "CVE-2023-37920", "CVE-2023-43804" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory7.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.18.0" ], "issued": "20231221", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-37920:7.5", "CVE-2023-43804:5.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2023-38264", "aparNoSet": [ "CVE-2023-38264", "CVE-2024-21085" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jun2024_advisory.asc", "filesets": [ "Java8:\u003c8.0.0.825", "Java8.jre:\u003c8.0.0.825", "Java8.sdk:\u003c8.0.0.825", "Java8_64.sdk:\u003c8.0.0.825", "Java8_64.jre:\u003c8.0.0.825" ], "issued": "20240624", "updated": "null", "siblings": [], "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere\u0026product\u003dibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29\u0026release\u003d8.0.0.0\u0026function\u003dall", "cvss": [ "CVE-2023-38264:5.9", "CVE-2024-21085:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python" ], "apAbstract": "AIX is affected by a denial of service (CVE-2023-45167) and a security restrictions bypass (CVE-2023-40217) due to Python", "aparNo": "CVE-2023-40217", "aparNoSet": [ "CVE-2023-40217", "CVE-2023-45167" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory6.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.17.1" ], "issued": "20231107", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-40217:7.4", "CVE-2023-45167:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "BIND" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "CVE-2023-4408", "aparNoSet": [ "CVE-2023-4408", "CVE-2023-50387", "CVE-2023-50868", "CVE-2023-5517", "CVE-2023-5679", "CVE-2023-6516" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory26.asc", "filesets": [ "bind.rte:7.1.916.0-7.1.916.2604", "bind.rte:7.2.916.0-7.2.916.2600", "bind.rte:7.3.916.0-7.3.916.2601" ], "issued": "20240604", "updated": "20240605", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix26.tar", "cvss": [ "CVE-2023-4408:7.5", "CVE-2023-50387:7.5", "CVE-2023-50868:7.5", "CVE-2023-5517:7.5", "CVE-2023-5679:7.5", "CVE-2023-6516:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "smbcd" ], "apAbstract": "AIX is vulnerable to a denial of service due to the AIX SMB client", "aparNo": "CVE-2023-45165", "aparNoSet": [ "CVE-2023-45165" ], "fixedIn": "See Bulletin", "ifixes": [ "smbc_302_fileset_72.tar.gz", "smbc_302_fileset_73.tar.gz" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory3.asc", "filesets": [ "smbc.rte:7.2.0.0-7.2.302.10" ], "issued": "20231221", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-45165:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "invScout" ], "apAbstract": "AIX is vulnerable to arbitrary command execution due to invscout", "aparNo": "CVE-2023-45168", "aparNoSet": [ "CVE-2023-45168" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_advisory5.asc", "filesets": [ "invscout.rte:2.2.0.0-2.2.0.24" ], "issued": "20231130", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_fix5.tar", "cvss": [ "CVE-2023-45168:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python39" ], "apAbstract": "AIX is affected by information disclosure (CVE-2023-45803) and arbitrary code execution (CVE-2024-6345) due to Python", "aparNo": "CVE-2023-45803", "aparNoSet": [ "CVE-2023-45803", "CVE-2024-6345" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory11.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.19.1" ], "issued": "20240812", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-45803:4.2", "CVE-2024-6345:8.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Perl" ], "apAbstract": "AIX is vulnerable to arbitrary command execution due to Perl (CVE-2024-25021 CVE-2023-47038 CVE-2023-47100)", "aparNo": "CVE-2023-47038", "aparNoSet": [ "CVE-2023-47038", "CVE-2023-47100", "CVE-2024-25021" ], "fixedIn": "See Bulletin", "ifixes": [ "perl5345ma.240213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory8.asc", "filesets": [ "perl.rte:5.34.0.0-5.34.1.5" ], "issued": "20240221", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-47038:7.8", "CVE-2023-47100:9.8", "CVE-2024-25021:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python39" ], "apAbstract": "AIX is affected by multiple vulnerabilities due to Python (CVE-2023-52425 CVE-2023-52426 CVE-2023-6597)", "aparNo": "CVE-2023-52425", "aparNoSet": [ "CVE-2023-52425", "CVE-2023-52426", "CVE-2023-6597" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory8.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.18.1" ], "issued": "20240411", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-52425:7.5", "CVE-2023-52426:5.1", "CVE-2023-6597:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "AIX is vulnerable to a denial of service (CVE-2023-5678 CVE-2023-6129 CVE-2023-6237) and an attacker may obtain sensitive information (CVE-2023-5363) due to OpenSSL", "aparNo": "CVE-2023-5363", "aparNoSet": [ "CVE-2023-5363", "CVE-2023-5678", "CVE-2023-6129", "CVE-2023-6237" ], "fixedIn": "See Bulletin", "ifixes": [ "1022107a.240107.epkg.Z", "1112200a.240109.epkg.Z", "1122200a.240110.epkg.Z", "fips2108a.240108.epkg.Z", "301002sa.240122.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory40.asc", "filesets": [ "openssl.base:1.0.2.500-1.0.2.2107", "openssl.base:1.1.1.0-1.1.1.2200", "openssl.base:1.1.2.0-1.1.2.2200", "openssl.base:20.13.102.1000-20.16.102.2108", "openssl.base:3.0.0.0-3.0.10.1002" ], "issued": "20240126", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix40.tar", "cvss": [ "CVE-2023-5363:5.9", "CVE-2023-5678:3.7", "CVE-2023-6129:5.9", "CVE-2023-6237:3.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "RPM" ], "apAbstract": "AIX is vulnerable to arbitrary code execution due to RPM (CVE-2023-7104)", "aparNo": "CVE-2023-7104", "aparNoSet": [ "CVE-2023-7104" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rpm_advisory2.asc", "filesets": [ "rpm.rte:4.15.1.1000-4.15.1.1012", "rpm.rte:4.15.1.2000-4.15.1.2010", "rpm.rte:4.18.1.2000-4.18.1.2002" ], "issued": "20240424", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2023-7104:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python39" ], "apAbstract": "AIX is affected by a denial of service (CVE-2024-0397) and information disclosure (CVE-2024-4032 CVE-2024-37891) due to Python", "aparNo": "CVE-2024-0397", "aparNoSet": [ "CVE-2024-0397", "CVE-2024-37891", "CVE-2024-4032" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory12.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.19.2" ], "issued": "20240917", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2024-0397:7.5", "CVE-2024-37891:4.4", "CVE-2024-4032:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python39" ], "apAbstract": "AIX is affected by a denial of service due to Python (CVE-2024-0450)", "aparNo": "CVE-2024-0450", "aparNoSet": [ "CVE-2024-0450" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory10.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.18.3" ], "issued": "20240624", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2024-0450:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "OpenSSL" ], "apAbstract": "AIX is vulnerable to a denial of service (CVE-2024-2511 CVE-2024-0727) due to OpenSSL", "aparNo": "CVE-2024-0727", "aparNoSet": [ "CVE-2024-0727", "CVE-2024-2511" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory41.asc", "filesets": [ "openssl.base:1.1.1.0-1.1.1.2200", "openssl.base:1.1.2.0-1.1.2.2200", "openssl.base:3.0.5.101-3.0.10.1002" ], "issued": "20240716", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp\u0026S_PKG\u003dopenssl", "cvss": [ "CVE-2024-0727:3.1", "CVE-2024-2511:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "BIND" ], "apAbstract": "AIX is vulnerable to a denial of service due to ISC BIND", "aparNo": "CVE-2024-0760", "aparNoSet": [ "CVE-2024-0760", "CVE-2024-1737", "CVE-2024-1975", "CVE-2024-4076" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory27.asc", "filesets": [ "bind.rte:7.1.916.0-7.1.916.4800", "bind.rte:7.2.916.0-7.2.916.4801", "bind.rte:7.3.916.0-7.3.916.4800" ], "issued": "20241118", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix27.tar", "cvss": [ "CVE-2024-0760:7.5", "CVE-2024-1737:7.5", "CVE-2024-1975:7.5", "CVE-2024-4076:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "opencryptoki" ], "apAbstract": "AIX is vulnerable to information disclosure due to openCryptoki (CVE-2024-0914)", "aparNo": "CVE-2024-0914", "aparNoSet": [ "CVE-2024-0914" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/opencryptoki_advisory.asc", "filesets": [ "opencki.base:3.21.0.0-3.21.0.1000" ], "issued": "20240603", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp\u0026S_PKG\u003dopencryptoki", "cvss": [ "CVE-2024-0914:5.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Java SDK" ], "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX", "aparNo": "CVE-2024-21131", "aparNoSet": [ "CVE-2024-21131", "CVE-2024-21144", "CVE-2024-21145", "CVE-2024-27267" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_nov2024_advisory.asc", "filesets": [ "Java8:\u003c8.0.0.830", "Java8.jre:\u003c8.0.0.830", "Java8.sdk:\u003c8.0.0.830", "Java8_64.sdk:\u003c8.0.0.830", "Java8_64.jre:\u003c8.0.0.830" ], "issued": "20241111", "updated": "null", "siblings": [], "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere\u0026product\u003dibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29\u0026release\u003d8.0.0.0\u0026function\u003dall", "cvss": [ "CVE-2024-21131:3.7", "CVE-2024-21144:3.7", "CVE-2024-21145:4.8", "CVE-2024-27267:5.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python39" ], "apAbstract": "AIX is affected by information disclosure due to Python (CVE-2024-28757)", "aparNo": "CVE-2024-28757", "aparNoSet": [ "CVE-2024-28757" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory9.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.18.2" ], "issued": "20240613", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [ "CVE-2024-28757:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Python39" ], "apAbstract": "AIX is affected by multiple vulnerabilities due to Python", "aparNo": "CVE-2024-45490", "aparNoSet": [ "CVE-2024-45490", "CVE-2024-45491", "CVE-2024-45492", "CVE-2024-6923", "CVE-2024-7592", "CVE-2024-8088" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory13.asc", "filesets": [ "python3.9.base:3.9.0.0-3.9.19.3" ], "issued": "20241105", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/python_fix13.tar", "cvss": [ "CVE-2024-45490:7.5", "CVE-2024-45491:7.3", "CVE-2024-45492:7.3", "CVE-2024-6923:5.5", "CVE-2024-7592:7.5", "CVE-2024-8088:8.7" ], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.30", "2.2.4.40", "2.2.4.50" ], "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS", "aparNo": "IJ00360", "aparNoSet": [ "IJ00360" ], "fixedIn": "2.2.4.60", "ifixes": [ "IJ00360m9a.180313.AIX61TL09SP09.epkg.Z", "IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z", "IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z", "IJ00360sAa.171228.AIX61TL09SP10.epkg.Z", "IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z", "IV97339m7a.180329.VIOS2.2.4.40.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ00360", "filesets": [], "issued": "20180331", "updated": "null", "siblings": [ "7100-04:IJ00519", "7100-05:IJ01304", "7200-01:IV96360", "7200-02:IJ01262" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij00360/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.0", "2.2.5.10", "2.2.5.20", "2.2.5.30" ], "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS", "aparNo": "IJ00360", "aparNoSet": [ "IJ00360" ], "fixedIn": "2.2.5.40", "ifixes": [ "IJ00360m9a.180313.AIX61TL09SP09.epkg.Z", "IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z", "IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z", "IJ00360sAa.171228.AIX61TL09SP10.epkg.Z", "IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z", "IV97339m7a.180329.VIOS2.2.4.40.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ00360", "filesets": [], "issued": "20180331", "updated": "null", "siblings": [ "7100-04:IJ00519", "7100-05:IJ01304", "7200-01:IV96360", "7200-02:IJ01262" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij00360/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10" ], "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS", "aparNo": "IJ00360", "aparNoSet": [ "IJ00360" ], "fixedIn": "2.2.6.20", "ifixes": [ "IJ00360m9a.180313.AIX61TL09SP09.epkg.Z", "IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z", "IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z", "IJ00360sAa.171228.AIX61TL09SP10.epkg.Z", "IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z", "IV97339m7a.180329.VIOS2.2.4.40.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ00360", "filesets": [], "issued": "20180331", "updated": "null", "siblings": [ "7100-04:IJ00519", "7100-05:IJ01304", "7200-01:IV96360", "7200-02:IJ01262" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij00360/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-08", "6100-09-09", "6100-09-10" ], "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS", "aparNo": "IJ00360", "aparNoSet": [ "IJ00360" ], "fixedIn": "6100-09-11", "ifixes": [ "IJ00360m9a.180313.AIX61TL09SP09.epkg.Z", "IJ00360sAa.171228.AIX61TL09SP10.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ00360", "filesets": [ "devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.300" ], "issued": "20180331", "updated": "null", "siblings": [ "7100-04:IJ00519", "7100-05:IJ01304", "7200-01:IV96360", "7200-02:IJ01262" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij00360/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS", "aparNo": "IJ00519", "aparNoSet": [ "IJ00519" ], "fixedIn": "7100-04-06", "ifixes": [ "IJ00519s5a.171222.AIX71TL04SP05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ00519", "filesets": [ "devices.pciex.df1060e214103404.com:7.1.4.30-7.1.4.32" ], "issued": "20180331", "updated": "null", "siblings": [ "6100-09:IJ00360", "7100-05:IJ01304", "7200-01:IV96360", "7200-02:IJ01262" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij00519/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-10", "6100-09-08", "6100-09-09" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IJ00563", "aparNoSet": [ "CVE-", "CVE-2017-11541", "CVE-2017-11542", "CVE-2017-11543", "CVE-2017-12893", "CVE-2017-12894", "CVE-2017-12895", "CVE-2017-12896", "CVE-2017-12897", "CVE-2017-12898", "CVE-2017-12899", "CVE-2017-12900", "CVE-2017-12901", "CVE-2017-12902", "CVE-2017-12985", "CVE-2017-12986", "CVE-2017-12987", "CVE-2017-12988", "CVE-2017-12989", "CVE-2017-12990", "CVE-2017-12991", "CVE-2017-12992", "CVE-2017-12993", "CVE-2017-12994", "CVE-2017-12995", "CVE-2017-12996", "CVE-2017-12997", "CVE-2017-12998", "CVE-2017-12999", "CVE-2017-13000", "CVE-2017-13001", "CVE-2017-13002", "CVE-2017-13003", "CVE-2017-13004", "CVE-2017-13005", "CVE-2017-13006", "CVE-2017-13008", "CVE-2017-13009", "CVE-2017-13010", "CVE-2017-13011", "CVE-2017-13012", "CVE-2017-13013", "CVE-2017-13014", "CVE-2017-13015", "CVE-2017-13016", "CVE-2017-13017", "CVE-2017-13018", "CVE-2017-13035", "CVE-2017-13036", "CVE-2017-13037", "CVE-2017-13038", "CVE-2017-13039", "CVE-2017-13040", "CVE-2017-13041", "CVE-2017-13042", "CVE-2017-13043", "IJ00563" ], "fixedIn": "6100-09-11", "ifixes": [ "IV94728mAa.171008.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.300" ], "issued": "20171108", "updated": "null", "siblings": [ "5300-12:IJ00568", "7200-00:IJ00567", "7100-03:IJ00564", "7100-04:IJ00565", "7200-01:IJ00567" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar", "cvss": [ "CVE-2017-12993:5.3", "CVE-2017-12992:5.3", "CVE-2017-12991:5.3", "CVE-2017-12988:5.3", "CVE-2017-12987:5.3", "CVE-2017-12986:5.3", "CVE-2017-12985:5.3", "CVE-2017-12902:5.3", "CVE-2017-12901:5.3", "CVE-2017-12900:5.3", "CVE-2017-12899:5.3", "CVE-2017-12898:5.3", "CVE-2017-12897:5.3", "CVE-2017-12896:5.3", "CVE-2017-12895:5.3", "CVE-2017-12894:5.3", "CVE-2017-12893:5.3", "CVE-2017-11542:7.5", "CVE-2017-11541:7.5", "CVE-2017-12997:7.5", "CVE-2017-12995:7.5", "CVE-2017-12990:7.5", "CVE-2017-12989:7.5", "CVE-2017-13011:7.3", "CVE-2017-11543:7.5", "CVE-2017-13018:5.3", "CVE-2017-13017:5.3", "CVE-2017-13016:5.3", "CVE-2017-11543:7.5", "CVE-2017-13015:5.3", "CVE-2017-13014:5.3", "CVE-2017-13013:5.3", "CVE-2017-13012:5.3", "CVE-2017-13010:5.3", "CVE-2017-13009:5.3", "CVE-2017-13008:5.3", "CVE-2017-13006:5.3", "CVE-2017-13005:5.3", "CV" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-07", "7100-03-08", "7100-03-09" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IJ00564", "aparNoSet": [ "CVE-", "CVE-2017-11541", "CVE-2017-11542", "CVE-2017-11543", "CVE-2017-12893", "CVE-2017-12894", "CVE-2017-12895", "CVE-2017-12896", "CVE-2017-12897", "CVE-2017-12898", "CVE-2017-12899", "CVE-2017-12900", "CVE-2017-12901", "CVE-2017-12902", "CVE-2017-12985", "CVE-2017-12986", "CVE-2017-12987", "CVE-2017-12988", "CVE-2017-12989", "CVE-2017-12990", "CVE-2017-12991", "CVE-2017-12992", "CVE-2017-12993", "CVE-2017-12994", "CVE-2017-12995", "CVE-2017-12996", "CVE-2017-12997", "CVE-2017-12998", "CVE-2017-12999", "CVE-2017-13000", "CVE-2017-13001", "CVE-2017-13002", "CVE-2017-13003", "CVE-2017-13004", "CVE-2017-13005", "CVE-2017-13006", "CVE-2017-13008", "CVE-2017-13009", "CVE-2017-13010", "CVE-2017-13011", "CVE-2017-13012", "CVE-2017-13013", "CVE-2017-13014", "CVE-2017-13015", "CVE-2017-13016", "CVE-2017-13017", "CVE-2017-13018", "CVE-2017-13035", "CVE-2017-13036", "CVE-2017-13037", "CVE-2017-13038", "CVE-2017-13039", "CVE-2017-13040", "CVE-2017-13041", "CVE-2017-13042", "CVE-2017-13043", "IJ00564" ], "fixedIn": "See Bulletin", "ifixes": [ "IV94727m9a.171009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc", "filesets": [ "bos.net.tcp.server:7.1.3.0-7.1.3.49" ], "issued": "20171108", "updated": "null", "siblings": [ "5300-12:IJ00568", "7200-00:IJ00567", "7100-04:IJ00565", "6100-09:IJ00563", "7200-01:IJ00567" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar", "cvss": [ "CVE-2017-12993:5.3", "CVE-2017-12992:5.3", "CVE-2017-12991:5.3", "CVE-2017-12988:5.3", "CVE-2017-12987:5.3", "CVE-2017-12986:5.3", "CVE-2017-12985:5.3", "CVE-2017-12902:5.3", "CVE-2017-12901:5.3", "CVE-2017-12900:5.3", "CVE-2017-12899:5.3", "CVE-2017-12898:5.3", "CVE-2017-12897:5.3", "CVE-2017-12896:5.3", "CVE-2017-12895:5.3", "CVE-2017-12894:5.3", "CVE-2017-12893:5.3", "CVE-2017-11542:7.5", "CVE-2017-11541:7.5", "CVE-2017-12997:7.5", "CVE-2017-12995:7.5", "CVE-2017-12990:7.5", "CVE-2017-12989:7.5", "CVE-2017-13011:7.3", "CVE-2017-11543:7.5", "CVE-2017-13018:5.3", "CVE-2017-13017:5.3", "CVE-2017-13016:5.3", "CVE-2017-11543:7.5", "CVE-2017-13015:5.3", "CVE-2017-13014:5.3", "CVE-2017-13013:5.3", "CVE-2017-13012:5.3", "CVE-2017-13010:5.3", "CVE-2017-13009:5.3", "CVE-2017-13008:5.3", "CVE-2017-13006:5.3", "CVE-2017-13005:5.3", "CV" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IJ00565", "aparNoSet": [ "CVE-", "CVE-2017-11541", "CVE-2017-11542", "CVE-2017-11543", "CVE-2017-12893", "CVE-2017-12894", "CVE-2017-12895", "CVE-2017-12896", "CVE-2017-12897", "CVE-2017-12898", "CVE-2017-12899", "CVE-2017-12900", "CVE-2017-12901", "CVE-2017-12902", "CVE-2017-12985", "CVE-2017-12986", "CVE-2017-12987", "CVE-2017-12988", "CVE-2017-12989", "CVE-2017-12990", "CVE-2017-12991", "CVE-2017-12992", "CVE-2017-12993", "CVE-2017-12994", "CVE-2017-12995", "CVE-2017-12996", "CVE-2017-12997", "CVE-2017-12998", "CVE-2017-12999", "CVE-2017-13000", "CVE-2017-13001", "CVE-2017-13002", "CVE-2017-13003", "CVE-2017-13004", "CVE-2017-13005", "CVE-2017-13006", "CVE-2017-13008", "CVE-2017-13009", "CVE-2017-13010", "CVE-2017-13011", "CVE-2017-13012", "CVE-2017-13013", "CVE-2017-13014", "CVE-2017-13015", "CVE-2017-13016", "CVE-2017-13017", "CVE-2017-13018", "CVE-2017-13035", "CVE-2017-13036", "CVE-2017-13037", "CVE-2017-13038", "CVE-2017-13039", "CVE-2017-13040", "CVE-2017-13041", "CVE-2017-13042", "CVE-2017-13043", "IJ00565" ], "fixedIn": "7100-04-06", "ifixes": [ "IV94726m5a.171009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc", "filesets": [ "bos.net.tcp.server:7.1.4.0-7.1.4.32" ], "issued": "20171108", "updated": "null", "siblings": [ "5300-12:IJ00568", "7200-00:IJ00567", "7100-03:IJ00564", "6100-09:IJ00563", "7200-01:IJ00567" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar", "cvss": [ "CVE-2017-12993:5.3", "CVE-2017-12992:5.3", "CVE-2017-12991:5.3", "CVE-2017-12988:5.3", "CVE-2017-12987:5.3", "CVE-2017-12986:5.3", "CVE-2017-12985:5.3", "CVE-2017-12902:5.3", "CVE-2017-12901:5.3", "CVE-2017-12900:5.3", "CVE-2017-12899:5.3", "CVE-2017-12898:5.3", "CVE-2017-12897:5.3", "CVE-2017-12896:5.3", "CVE-2017-12895:5.3", "CVE-2017-12894:5.3", "CVE-2017-12893:5.3", "CVE-2017-11542:7.5", "CVE-2017-11541:7.5", "CVE-2017-12997:7.5", "CVE-2017-12995:7.5", "CVE-2017-12990:7.5", "CVE-2017-12989:7.5", "CVE-2017-13011:7.3", "CVE-2017-11543:7.5", "CVE-2017-13018:5.3", "CVE-2017-13017:5.3", "CVE-2017-13016:5.3", "CVE-2017-11543:7.5", "CVE-2017-13015:5.3", "CVE-2017-13014:5.3", "CVE-2017-13013:5.3", "CVE-2017-13012:5.3", "CVE-2017-13010:5.3", "CVE-2017-13009:5.3", "CVE-2017-13008:5.3", "CVE-2017-13006:5.3", "CVE-2017-13005:5.3", "CV" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IJ00566", "aparNoSet": [ "CVE-", "CVE-2017-11541", "CVE-2017-11542", "CVE-2017-11543", "CVE-2017-12893", "CVE-2017-12894", "CVE-2017-12895", "CVE-2017-12896", "CVE-2017-12897", "CVE-2017-12898", "CVE-2017-12899", "CVE-2017-12900", "CVE-2017-12901", "CVE-2017-12902", "CVE-2017-12985", "CVE-2017-12986", "CVE-2017-12987", "CVE-2017-12988", "CVE-2017-12989", "CVE-2017-12990", "CVE-2017-12991", "CVE-2017-12992", "CVE-2017-12993", "CVE-2017-12994", "CVE-2017-12995", "CVE-2017-12996", "CVE-2017-12997", "CVE-2017-12998", "CVE-2017-12999", "CVE-2017-13000", "CVE-2017-13001", "CVE-2017-13002", "CVE-2017-13003", "CVE-2017-13004", "CVE-2017-13005", "CVE-2017-13006", "CVE-2017-13008", "CVE-2017-13009", "CVE-2017-13010", "CVE-2017-13011", "CVE-2017-13012", "CVE-2017-13013", "CVE-2017-13014", "CVE-2017-13015", "CVE-2017-13016", "CVE-2017-13017", "CVE-2017-13018", "CVE-2017-13035", "CVE-2017-13036", "CVE-2017-13037", "CVE-2017-13038", "CVE-2017-13039", "CVE-2017-13040", "CVE-2017-13041", "CVE-2017-13042", "CVE-2017-13043", "IJ00566" ], "fixedIn": "7200-00-06", "ifixes": [ "IV94724m5a.171009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.0.0-7.2.0.3" ], "issued": "20171108", "updated": "null", "siblings": [ "5300-12:IJ00568", "7100-03:IJ00564", "7100-04:IJ00565", "6100-09:IJ00563", "7200-01:IJ00567" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar", "cvss": [ "CVE-2017-12993:5.3", "CVE-2017-12992:5.3", "CVE-2017-12991:5.3", "CVE-2017-12988:5.3", "CVE-2017-12987:5.3", "CVE-2017-12986:5.3", "CVE-2017-12985:5.3", "CVE-2017-12902:5.3", "CVE-2017-12901:5.3", "CVE-2017-12900:5.3", "CVE-2017-12899:5.3", "CVE-2017-12898:5.3", "CVE-2017-12897:5.3", "CVE-2017-12896:5.3", "CVE-2017-12895:5.3", "CVE-2017-12894:5.3", "CVE-2017-12893:5.3", "CVE-2017-11542:7.5", "CVE-2017-11541:7.5", "CVE-2017-12997:7.5", "CVE-2017-12995:7.5", "CVE-2017-12990:7.5", "CVE-2017-12989:7.5", "CVE-2017-13011:7.3", "CVE-2017-11543:7.5", "CVE-2017-13018:5.3", "CVE-2017-13017:5.3", "CVE-2017-13016:5.3", "CVE-2017-11543:7.5", "CVE-2017-13015:5.3", "CVE-2017-13014:5.3", "CVE-2017-13013:5.3", "CVE-2017-13012:5.3", "CVE-2017-13010:5.3", "CVE-2017-13009:5.3", "CVE-2017-13008:5.3", "CVE-2017-13006:5.3", "CVE-2017-13005:5.3", "CV" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IJ00567", "aparNoSet": [ "CVE-", "CVE-2017-11541", "CVE-2017-11542", "CVE-2017-11543", "CVE-2017-12893", "CVE-2017-12894", "CVE-2017-12895", "CVE-2017-12896", "CVE-2017-12897", "CVE-2017-12898", "CVE-2017-12899", "CVE-2017-12900", "CVE-2017-12901", "CVE-2017-12902", "CVE-2017-12985", "CVE-2017-12986", "CVE-2017-12987", "CVE-2017-12988", "CVE-2017-12989", "CVE-2017-12990", "CVE-2017-12991", "CVE-2017-12992", "CVE-2017-12993", "CVE-2017-12994", "CVE-2017-12995", "CVE-2017-12996", "CVE-2017-12997", "CVE-2017-12998", "CVE-2017-12999", "CVE-2017-13000", "CVE-2017-13001", "CVE-2017-13002", "CVE-2017-13003", "CVE-2017-13004", "CVE-2017-13005", "CVE-2017-13006", "CVE-2017-13008", "CVE-2017-13009", "CVE-2017-13010", "CVE-2017-13011", "CVE-2017-13012", "CVE-2017-13013", "CVE-2017-13014", "CVE-2017-13015", "CVE-2017-13016", "CVE-2017-13017", "CVE-2017-13018", "CVE-2017-13035", "CVE-2017-13036", "CVE-2017-13037", "CVE-2017-13038", "CVE-2017-13039", "CVE-2017-13040", "CVE-2017-13041", "CVE-2017-13042", "CVE-2017-13043", "IJ00567" ], "fixedIn": "7200-01-04", "ifixes": [ "IV94723m3a.171009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.1.0-7.2.1.1" ], "issued": "20171108", "updated": "null", "siblings": [ "5300-12:IJ00568", "7200-00:IJ00567", "7100-03:IJ00564", "7100-04:IJ00565", "6100-09:IJ00563" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar", "cvss": [ "CVE-2017-12993:5.3", "CVE-2017-12992:5.3", "CVE-2017-12991:5.3", "CVE-2017-12988:5.3", "CVE-2017-12987:5.3", "CVE-2017-12986:5.3", "CVE-2017-12985:5.3", "CVE-2017-12902:5.3", "CVE-2017-12901:5.3", "CVE-2017-12900:5.3", "CVE-2017-12899:5.3", "CVE-2017-12898:5.3", "CVE-2017-12897:5.3", "CVE-2017-12896:5.3", "CVE-2017-12895:5.3", "CVE-2017-12894:5.3", "CVE-2017-12893:5.3", "CVE-2017-11542:7.5", "CVE-2017-11541:7.5", "CVE-2017-12997:7.5", "CVE-2017-12995:7.5", "CVE-2017-12990:7.5", "CVE-2017-12989:7.5", "CVE-2017-13011:7.3", "CVE-2017-11543:7.5", "CVE-2017-13018:5.3", "CVE-2017-13017:5.3", "CVE-2017-13016:5.3", "CVE-2017-11543:7.5", "CVE-2017-13015:5.3", "CVE-2017-13014:5.3", "CVE-2017-13013:5.3", "CVE-2017-13012:5.3", "CVE-2017-13010:5.3", "CVE-2017-13009:5.3", "CVE-2017-13008:5.3", "CVE-2017-13006:5.3", "CVE-2017-13005:5.3", "CV" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IJ00568", "aparNoSet": [ "CVE-", "CVE-2017-11541", "CVE-2017-11542", "CVE-2017-11543", "CVE-2017-12893", "CVE-2017-12894", "CVE-2017-12895", "CVE-2017-12896", "CVE-2017-12897", "CVE-2017-12898", "CVE-2017-12899", "CVE-2017-12900", "CVE-2017-12901", "CVE-2017-12902", "CVE-2017-12985", "CVE-2017-12986", "CVE-2017-12987", "CVE-2017-12988", "CVE-2017-12989", "CVE-2017-12990", "CVE-2017-12991", "CVE-2017-12992", "CVE-2017-12993", "CVE-2017-12994", "CVE-2017-12995", "CVE-2017-12996", "CVE-2017-12997", "CVE-2017-12998", "CVE-2017-12999", "CVE-2017-13000", "CVE-2017-13001", "CVE-2017-13002", "CVE-2017-13003", "CVE-2017-13004", "CVE-2017-13005", "CVE-2017-13006", "CVE-2017-13008", "CVE-2017-13009", "CVE-2017-13010", "CVE-2017-13011", "CVE-2017-13012", "CVE-2017-13013", "CVE-2017-13014", "CVE-2017-13015", "CVE-2017-13016", "CVE-2017-13017", "CVE-2017-13018", "CVE-2017-13035", "CVE-2017-13036", "CVE-2017-13037", "CVE-2017-13038", "CVE-2017-13039", "CVE-2017-13040", "CVE-2017-13041", "CVE-2017-13042", "CVE-2017-13043", "IJ00568" ], "fixedIn": "See Bulletin", "ifixes": [ "IV94729m9a.171009.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc", "filesets": [ "bos.net.tcp.server:5.3.12.0-5.3.12.6" ], "issued": "20171108", "updated": "null", "siblings": [ "7200-00:IJ00567", "7100-03:IJ00564", "7100-04:IJ00565", "6100-09:IJ00563", "7200-01:IJ00567" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar", "cvss": [ "CVE-2017-12993:5.3", "CVE-2017-12992:5.3", "CVE-2017-12991:5.3", "CVE-2017-12988:5.3", "CVE-2017-12987:5.3", "CVE-2017-12986:5.3", "CVE-2017-12985:5.3", "CVE-2017-12902:5.3", "CVE-2017-12901:5.3", "CVE-2017-12900:5.3", "CVE-2017-12899:5.3", "CVE-2017-12898:5.3", "CVE-2017-12897:5.3", "CVE-2017-12896:5.3", "CVE-2017-12895:5.3", "CVE-2017-12894:5.3", "CVE-2017-12893:5.3", "CVE-2017-11542:7.5", "CVE-2017-11541:7.5", "CVE-2017-12997:7.5", "CVE-2017-12995:7.5", "CVE-2017-12990:7.5", "CVE-2017-12989:7.5", "CVE-2017-13011:7.3", "CVE-2017-11543:7.5", "CVE-2017-13018:5.3", "CVE-2017-13017:5.3", "CVE-2017-13016:5.3", "CVE-2017-11543:7.5", "CVE-2017-13015:5.3", "CVE-2017-13014:5.3", "CVE-2017-13013:5.3", "CVE-2017-13012:5.3", "CVE-2017-13010:5.3", "CVE-2017-13009:5.3", "CVE-2017-13008:5.3", "CVE-2017-13006:5.3", "CVE-2017-13005:5.3", "CV" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IJ00951", "aparNoSet": [ "CVE-2017-1692", "IJ00951" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ00951s9a.171031.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.lvm:5.3.12.0-5.3.12.8" ], "issued": "20180205", "updated": "null", "siblings": [ "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01" ], "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS", "aparNo": "IJ01262", "aparNoSet": [ "IJ01262" ], "fixedIn": "7200-02-02", "ifixes": [ "IJ01262s1a.180328.AIX72TL02SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ01262", "filesets": [ "devices.pciex.df1060e214103404.com:7.2.2.0" ], "issued": "20180331", "updated": "null", "siblings": [ "6100-09:IJ00360", "7100-04:IJ00519", "7100-05:IJ01304", "7200-01:IV96360" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij01262/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01" ], "apAbstract": "ETHERCHANNEL NIB MODE COMMUNICATION FAILURE ON BACKUP ADAPTER", "aparNo": "IJ01263", "aparNoSet": [ "IJ01263" ], "fixedIn": "7200-02-02", "ifixes": [ "IJ01263s1c.AIX72TL02SP00-01.180119.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ01263", "filesets": [ "devices.common.IBM.ethernet.rte:7.2.2.0" ], "issued": "20180123", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij01263/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-00", "7100-05-01" ], "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS", "aparNo": "IJ01304", "aparNoSet": [ "IJ01304" ], "fixedIn": "7100-05-02", "ifixes": [ "IJ01304s1a.180328.AIX71TL05SP00-01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ01304", "filesets": [ "devices.pciex.df1060e214103404.com:7.1.5.0" ], "issued": "20180331", "updated": "null", "siblings": [ "6100-09:IJ00360", "7100-04:IJ00519", "7200-01:IV96360", "7200-02:IJ01262" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij01304/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10" ], "apAbstract": "After updating all VIOS SSP nodes -- Node Upgrade Status still shows UP_LEVEL", "aparNo": "IJ02674", "aparNoSet": [ "IJ02674" ], "fixedIn": "2.2.6.20", "ifixes": [ "IJ02674sAa.VIOS2.2.6.0.171215.epkg.Z", "IJ02674sAa.VIOS2.2.6.10.171215.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ02674", "filesets": [ "pool.basic.rte:6.1.9.300" ], "issued": "20171219", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij02674/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-10", "6100-09-08", "6100-09-09" ], "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)", "aparNo": "IJ02726", "aparNoSet": [ "CVE-2018-1383", "IJ02726" ], "fixedIn": "6100-09-11", "ifixes": [ "IJ02726s8a.171221.epkg.Z", "IJ02726s9a.171221.epkg.Z", "IJ02726sAa.171221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc", "filesets": [ "bos.cluster.rte:6.1.9.0-6.1.9.300" ], "issued": "20180208", "updated": "null", "siblings": [ "7200-02:IJ02729", "7200-01:IJ02828", "7200-00:IJ02827", "7100-05:IJ02727", "7100-04:IJ02825" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar", "cvss": [ "CVE-2018-1383:9.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.30", "2.2.4.40" ], "apAbstract": "Vulnerability impacts VIOS and VIOS (CVE-2018-1383)", "aparNo": "IJ02726", "aparNoSet": [ "CVE-2018-1383", "IJ02726" ], "fixedIn": "6100-09-11", "ifixes": [ "IJ02726s8a.171221.epkg.Z", "IJ02726s9a.171221.epkg.Z", "IJ02726sAa.171221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc", "filesets": [ "bos.cluster.rte:6.1.9.0-6.1.9.300" ], "issued": "20180208", "updated": "null", "siblings": [ "7200-02:IJ02729", "7200-01:IJ02828", "7200-00:IJ02827", "7100-05:IJ02727", "7100-04:IJ02825" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar", "cvss": [ "CVE-2018-1383:9.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.10", "2.2.5.20", "2.2.5.30" ], "apAbstract": "Vulnerability impacts VIOS and VIOS (CVE-2018-1383)", "aparNo": "IJ02726", "aparNoSet": [ "CVE-2018-1383", "IJ02726" ], "fixedIn": "6100-09-11", "ifixes": [ "IJ02726s8a.171221.epkg.Z", "IJ02726s9a.171221.epkg.Z", "IJ02726sAa.171221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc", "filesets": [ "bos.cluster.rte:6.1.9.0-6.1.9.300" ], "issued": "20180208", "updated": "null", "siblings": [ "7200-02:IJ02729", "7200-01:IJ02828", "7200-00:IJ02827", "7100-05:IJ02727", "7100-04:IJ02825" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar", "cvss": [ "CVE-2018-1383:9.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10" ], "apAbstract": "Vulnerability impacts VIOS and VIOS (CVE-2018-1383)", "aparNo": "IJ02726", "aparNoSet": [ "CVE-2018-1383", "IJ02726" ], "fixedIn": "6100-09-11", "ifixes": [ "IJ02726s8a.171221.epkg.Z", "IJ02726s9a.171221.epkg.Z", "IJ02726sAa.171221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc", "filesets": [ "bos.cluster.rte:6.1.9.0-6.1.9.300" ], "issued": "20180208", "updated": "null", "siblings": [ "7200-02:IJ02729", "7200-01:IJ02828", "7200-00:IJ02827", "7100-05:IJ02727", "7100-04:IJ02825" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar", "cvss": [ "CVE-2018-1383:9.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-00", "7100-05-01" ], "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)", "aparNo": "IJ02727", "aparNoSet": [ "CVE-2018-1383", "IJ02727" ], "fixedIn": "7100-05-02", "ifixes": [ "IJ02727s1a.171221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc", "filesets": [ "bos.cluster.rte:7.1.5.0-7.1.5.0" ], "issued": "20180208", "updated": "null", "siblings": [ "7200-02:IJ02729", "7200-01:IJ02828", "7200-00:IJ02827", "7100-04:IJ02825", "6100-09:IJ02726" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar", "cvss": [ "CVE-2018-1383:9.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-00", "7200-02-01" ], "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)", "aparNo": "IJ02729", "aparNoSet": [ "CVE-2018-1383", "IJ02729" ], "fixedIn": "7200-02-02", "ifixes": [ "IJ02729s1a.171221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc", "filesets": [ "bos.cluster.rte:7.2.2.0-7.2.2.0" ], "issued": "20180208", "updated": "null", "siblings": [ "7200-01:IJ02828", "7200-00:IJ02827", "7100-05:IJ02727", "7100-04:IJ02825", "6100-09:IJ02726" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar", "cvss": [ "CVE-2018-1383:9.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)", "aparNo": "IJ02825", "aparNoSet": [ "CVE-2018-1383", "IJ02825" ], "fixedIn": "7100-04-06", "ifixes": [ "IJ02825s3a.171221.epkg.Z", "IJ02825s4a.171221.epkg.Z", "IJ02825s5a.171221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc", "filesets": [ "bos.cluster.rte:7.1.4.0-7.1.4.32" ], "issued": "20180208", "updated": "null", "siblings": [ "7200-02:IJ02729", "7200-01:IJ02828", "7200-00:IJ02827", "7100-05:IJ02727", "6100-09:IJ02726" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar", "cvss": [ "CVE-2018-1383:9.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)", "aparNo": "IJ02827", "aparNoSet": [ "CVE-2018-1383", "IJ02827" ], "fixedIn": "7200-00-06", "ifixes": [ "IJ02827s3a.171221.epkg.Z", "IJ02827s4a.171221.epkg.Z", "IJ02827s5a.171221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc", "filesets": [ "bos.cluster.rte:7.2.0.0-7.2.0.5" ], "issued": "20180208", "updated": "null", "siblings": [ "7200-02:IJ02729", "7200-01:IJ02828", "7100-05:IJ02727", "7100-04:IJ02825", "6100-09:IJ02726" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar", "cvss": [ "CVE-2018-1383:9.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)", "aparNo": "IJ02828", "aparNoSet": [ "CVE-2018-1383", "IJ02828" ], "fixedIn": "7200-01-04", "ifixes": [ "IJ02828s1a.171221.epkg.Z", "IJ02828s2a.171221.epkg.Z", "IJ02828s3a.171221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc", "filesets": [ "bos.cluster.rte:7.2.1.0-7.2.1.2" ], "issued": "20180208", "updated": "null", "siblings": [ "7200-02:IJ02729", "7200-00:IJ02827", "7100-05:IJ02727", "7100-04:IJ02825", "6100-09:IJ02726" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar", "cvss": [ "CVE-2018-1383:9.1" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-00", "7100-05-01", "7100-05-02" ], "apAbstract": "POWERHA NODE HALT DURING IP CHANGES", "aparNo": "IJ02843", "aparNoSet": [ "IJ02843" ], "fixedIn": "7100-05-03", "ifixes": [ "IJ02843s0a.180215.71TL05SP00-02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ02843", "filesets": [ "rsct.basic.rte:3.2.3.0-3.2.3.0" ], "issued": "20180228", "updated": "null", "siblings": [ "7200-02:IJ02843" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij02843/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "POWERHA NODE HALT DURING IP CHANGES", "aparNo": "IJ02843", "aparNoSet": [ "IJ02843" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ02843s0a.180215.72TL00SP00-02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ02843", "filesets": [ "rsct.basic.rte:3.2.3.0-3.2.3.0" ], "issued": "20180228", "updated": "null", "siblings": [ "7100-05:IJ02843" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij02843/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-10", "6100-09-11", "6100-09-09" ], "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)", "aparNo": "IJ02915", "aparNoSet": [ "CVE-2014-3956", "IJ02915" ], "fixedIn": "6100-09-12", "ifixes": [ "IJ02915s9a.180110.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.315" ], "issued": "20180406", "updated": "null", "siblings": [ "7200-02:IJ02920", "7200-01:IJ02919", "5300-12:IJ03273", "7200-00:IJ02918", "7100-05:IJ03121", "7100-04:IJ02917" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar", "cvss": [ "CVE-2014-3956:2.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.20", "2.2.5.30" ], "apAbstract": "Vulnerability in sendmail impacts VIOS (CVE-2014-3956)", "aparNo": "IJ02915", "aparNoSet": [ "CVE-2014-3956", "IJ02915" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ02915s9a.180110.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.315" ], "issued": "20180406", "updated": "null", "siblings": [ "7200-02:IJ02920", "7200-01:IJ02919", "5300-12:IJ03273", "7200-00:IJ02918", "7100-05:IJ03121", "7100-04:IJ02917" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar", "cvss": [ "CVE-2014-3956:2.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.10", "2.2.6.20", "2.2.6.21" ], "apAbstract": "Vulnerability in sendmail impacts VIOS (CVE-2014-3956)", "aparNo": "IJ02915", "aparNoSet": [ "CVE-2014-3956", "IJ02915" ], "fixedIn": "2.2.6.30", "ifixes": [ "IJ02915s9a.180110.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.315" ], "issued": "20180406", "updated": "null", "siblings": [ "7200-02:IJ02920", "7200-01:IJ02919", "5300-12:IJ03273", "7200-00:IJ02918", "7100-05:IJ03121", "7100-04:IJ02917" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar", "cvss": [ "CVE-2014-3956:2.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.40", "2.2.4.50" ], "apAbstract": "Vulnerability in sendmail impacts VIOS (CVE-2014-3956)", "aparNo": "IJ02915", "aparNoSet": [ "CVE-2014-3956", "IJ02915" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ02915s9a.180110.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.315" ], "issued": "20180406", "updated": "null", "siblings": [ "7200-02:IJ02920", "7200-01:IJ02919", "5300-12:IJ03273", "7200-00:IJ02918", "7100-05:IJ03121", "7100-04:IJ02917" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar", "cvss": [ "CVE-2014-3956:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)", "aparNo": "IJ02917", "aparNoSet": [ "CVE-2014-3956", "IJ02917" ], "fixedIn": "7100-04-07", "ifixes": [ "IJ02917s3a.180105.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.32" ], "issued": "20180406", "updated": "null", "siblings": [ "7200-02:IJ02920", "7200-01:IJ02919", "5300-12:IJ03273", "7200-00:IJ02918", "7100-05:IJ03121", "6100-09:IJ02915" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar", "cvss": [ "CVE-2014-3956:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)", "aparNo": "IJ02918", "aparNoSet": [ "CVE-2014-3956", "IJ02918" ], "fixedIn": "7200-00-07", "ifixes": [ "IJ02918s3a.180108.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc", "filesets": [ "bos.net.tcp.sendmail:7.2.0.0-7.2.0.2" ], "issued": "20180406", "updated": "null", "siblings": [ "7200-02:IJ02920", "7200-01:IJ02919", "5300-12:IJ03273", "7100-05:IJ03121", "7100-04:IJ02917", "6100-09:IJ02915" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar", "cvss": [ "CVE-2014-3956:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)", "aparNo": "IJ02919", "aparNoSet": [ "CVE-2014-3956", "IJ02919" ], "fixedIn": "7200-01-05", "ifixes": [ "IJ02919s1a.180108.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc", "filesets": [ "bos.net.tcp.sendmail:7.2.1.0-7.2.1.1" ], "issued": "20180406", "updated": "null", "siblings": [ "7200-02:IJ02920", "5300-12:IJ03273", "7200-00:IJ02918", "7100-05:IJ03121", "7100-04:IJ02917", "6100-09:IJ02915" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar", "cvss": [ "CVE-2014-3956:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)", "aparNo": "IJ02920", "aparNoSet": [ "CVE-2014-3956", "IJ02920" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ02920s0a.180110.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc", "filesets": [ "bos.net.tcp.sendmail:7.2.2.0-7.2.2.15" ], "issued": "20180406", "updated": "null", "siblings": [ "7200-01:IJ02919", "5300-12:IJ03273", "7200-00:IJ02918", "7100-05:IJ03121", "7100-04:IJ02917", "6100-09:IJ02915" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar", "cvss": [ "CVE-2014-3956:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.", "aparNo": "IJ03029", "aparNoSet": [ "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "IJ03029" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ03029m9c.180124.epkg.Z", "IJ03029m9a.180117.epkg.Z", "IJ03029m9b.180117.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc", "filesets": [ "bos.mp:5.3.12.0-5.3.12.9", "bos.mp64:5.3.12.0-5.3.12.10" ], "issued": "20180125", "updated": "20180209", "siblings": [ "2.2.6:IJ03030", "2.2.5:IJ03030", "2.2.4:IJ03030", "7200-02:IJ03036", "7200-01:IJ03035", "7200-00:IJ03034", "7100-05:IJ03033", "7100-04:IJ03032", "6100-09:IJ03030" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar", "cvss": [ "CVE-2017-5715:0", "CVE-2017-5753:0", "CVE-2017-5754:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-08", "6100-09-09", "6100-09-10" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.", "aparNo": "IJ03030", "aparNoSet": [ "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "IJ03030" ], "fixedIn": "6100-09-11", "ifixes": [ "IJ03030m8a.180117.epkg.Z", "IJ03030m9a.180116.epkg.Z", "IJ03030mAa.180116.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.300" ], "issued": "20180125", "updated": "20180209", "siblings": [ "2.2.6:IJ03030", "2.2.5:IJ03030", "2.2.4:IJ03030", "7200-02:IJ03036", "7200-01:IJ03035", "5300-12:IJ03029", "7200-00:IJ03034", "7100-05:IJ03033", "7100-04:IJ03032" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar", "cvss": [ "CVE-2017-5715:0", "CVE-2017-5753:0", "CVE-2017-5754:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.30", "2.2.4.40", "2.2.4.50" ], "apAbstract": "IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.", "aparNo": "IJ03030", "aparNoSet": [ "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "IJ03030" ], "fixedIn": "6100-09-11", "ifixes": [ "IJ03030m8a.180117.epkg.Z", "IJ03030m9a.180116.epkg.Z", "IJ03030m9b.180116.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.300" ], "issued": "20180125", "updated": "20180209", "siblings": [ "2.2.6:IJ03030", "2.2.5:IJ03030", "2.2.4:IJ03030", "7200-02:IJ03036", "7200-01:IJ03035", "5300-12:IJ03029", "7200-00:IJ03034", "7100-05:IJ03033", "7100-04:IJ03032" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar", "cvss": [ "CVE-2017-5715:0", "CVE-2017-5753:0", "CVE-2017-5754:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.10", "2.2.5.20", "2.2.5.30" ], "apAbstract": "IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.", "aparNo": "IJ03030", "aparNoSet": [ "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "IJ03030" ], "fixedIn": "6100-09-11", "ifixes": [ "IJ03030m8a.180117.epkg.Z", "IJ03030m9a.180116.epkg.Z", "IJ03030m9b.180116.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.300" ], "issued": "20180125", "updated": "20180209", "siblings": [ "2.2.6:IJ03030", "2.2.5:IJ03030", "2.2.4:IJ03030", "7200-02:IJ03036", "7200-01:IJ03035", "5300-12:IJ03029", "7200-00:IJ03034", "7100-05:IJ03033", "7100-04:IJ03032" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar", "cvss": [ "CVE-2017-5715:0", "CVE-2017-5753:0", "CVE-2017-5754:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10" ], "apAbstract": "IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.", "aparNo": "IJ03030", "aparNoSet": [ "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "IJ03030" ], "fixedIn": "6100-09-11", "ifixes": [ "IJ03030mAa.180116.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.300" ], "issued": "20180125", "updated": "20180209", "siblings": [ "2.2.6:IJ03030", "2.2.5:IJ03030", "2.2.4:IJ03030", "7200-02:IJ03036", "7200-01:IJ03035", "5300-12:IJ03029", "7200-00:IJ03034", "7100-05:IJ03033", "7100-04:IJ03032" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar", "cvss": [ "CVE-2017-5715:0", "CVE-2017-5753:0", "CVE-2017-5754:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.", "aparNo": "IJ03032", "aparNoSet": [ "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "IJ03032" ], "fixedIn": "7100-04-06", "ifixes": [ "IJ03032m3a.180125.epkg.Z", "IJ03032m3b.180125.epkg.Z", "IJ03032m4a.180125.epkg.Z", "IJ03032m5a.180116.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc", "filesets": [ "bos.mp64:7.1.4.0-7.1.4.33" ], "issued": "20180125", "updated": "20180209", "siblings": [ "2.2.6:IJ03030", "2.2.5:IJ03030", "2.2.4:IJ03030", "7200-02:IJ03036", "7200-01:IJ03035", "5300-12:IJ03029", "7200-00:IJ03034", "7100-05:IJ03033", "6100-09:IJ03030" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar", "cvss": [ "CVE-2017-5715:0", "CVE-2017-5753:0", "CVE-2017-5754:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-00", "7100-05-01" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.", "aparNo": "IJ03033", "aparNoSet": [ "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "IJ03033" ], "fixedIn": "7100-05-02", "ifixes": [ "IJ03033m1a.180116.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.0" ], "issued": "20180125", "updated": "20180209", "siblings": [ "2.2.6:IJ03030", "2.2.5:IJ03030", "2.2.4:IJ03030", "7200-02:IJ03036", "7200-01:IJ03035", "5300-12:IJ03029", "7200-00:IJ03034", "7100-04:IJ03032", "6100-09:IJ03030" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar", "cvss": [ "CVE-2017-5715:0", "CVE-2017-5753:0", "CVE-2017-5754:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.", "aparNo": "IJ03034", "aparNoSet": [ "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "IJ03034" ], "fixedIn": "7200-00-06", "ifixes": [ "IJ03034m3a.180117.epkg.Z", "IJ03034m4a.180117.epkg.Z", "IJ03034m5a.180117.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc", "filesets": [ "bos.mp64:7.2.0.0-7.2.0.5" ], "issued": "20180125", "updated": "20180209", "siblings": [ "2.2.6:IJ03030", "2.2.5:IJ03030", "2.2.4:IJ03030", "7200-02:IJ03036", "7200-01:IJ03035", "5300-12:IJ03029", "7100-05:IJ03033", "7100-04:IJ03032", "6100-09:IJ03030" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar", "cvss": [ "CVE-2017-5715:0", "CVE-2017-5753:0", "CVE-2017-5754:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.", "aparNo": "IJ03035", "aparNoSet": [ "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "IJ03035" ], "fixedIn": "7200-01-04", "ifixes": [ "IJ03035m1a.180118.epkg.Z", "IJ03035m1b.180118.epkg.Z", "IJ03035m2a.180118.epkg.Z", "IJ03035m3a.180117.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc", "filesets": [ "bos.mp64:7.2.1.0-7.2.1.4" ], "issued": "20180125", "updated": "20180209", "siblings": [ "2.2.6:IJ03030", "2.2.5:IJ03030", "2.2.4:IJ03030", "7200-02:IJ03036", "5300-12:IJ03029", "7200-00:IJ03034", "7100-05:IJ03033", "7100-04:IJ03032", "6100-09:IJ03030" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar", "cvss": [ "CVE-2017-5715:0", "CVE-2017-5753:0", "CVE-2017-5754:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-00", "7200-02-01" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.", "aparNo": "IJ03036", "aparNoSet": [ "CVE-2017-5715", "CVE-2017-5753", "CVE-2017-5754", "IJ03036" ], "fixedIn": "7200-02-02", "ifixes": [ "IJ03036m1a.180116.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc", "filesets": [ "bos.mp64:7.2.2.0-7.2.2.0" ], "issued": "20180125", "updated": "20180209", "siblings": [ "2.2.6:IJ03030", "2.2.5:IJ03030", "2.2.4:IJ03030", "7200-01:IJ03035", "5300-12:IJ03029", "7200-00:IJ03034", "7100-05:IJ03033", "7100-04:IJ03032", "6100-09:IJ03030" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar", "cvss": [ "CVE-2017-5715:0", "CVE-2017-5753:0", "CVE-2017-5754:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-00", "7100-05-01", "7100-05-02" ], "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)", "aparNo": "IJ03121", "aparNoSet": [ "CVE-2014-3956", "IJ03121" ], "fixedIn": "7100-05-04", "ifixes": [ "IJ03121s0a.180110.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.15" ], "issued": "20180406", "updated": "null", "siblings": [ "7200-02:IJ02920", "7200-01:IJ02919", "5300-12:IJ03273", "7200-00:IJ02918", "7100-04:IJ02917", "6100-09:IJ02915" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar", "cvss": [ "CVE-2014-3956:2.1" ], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.40" ], "apAbstract": "SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED", "aparNo": "IJ03186", "aparNoSet": [ "IJ03186" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z", "IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z", "IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z", "IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ03186", "filesets": [ "devices.ethernet.mlx.rte:6.1.9.315" ], "issued": "20180428", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij03186/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10", "2.2.6.20", "2.2.6.21" ], "apAbstract": "SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED", "aparNo": "IJ03186", "aparNoSet": [ "IJ03186" ], "fixedIn": "2.2.6.30", "ifixes": [ "IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z", "IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z", "IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z", "IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ03186", "filesets": [ "devices.ethernet.mlx.rte:6.1.9.300-6.1.9.315" ], "issued": "20180428", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij03186/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.60" ], "apAbstract": "SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED", "aparNo": "IJ03186", "aparNoSet": [ "IJ03186" ], "fixedIn": "See Advisory", "ifixes": [ "IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z", "IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z", "IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z", "IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ03186", "filesets": [ "devices.ethernet.mlx.rte:6.1.9.315" ], "issued": "20180428", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij03186/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)", "aparNo": "IJ03273", "aparNoSet": [ "CVE-2014-3956", "IJ03273" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ03273s9a.180116.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10", "bos.net.tcp.server:5.3.12.0-5.3.12.6" ], "issued": "20180406", "updated": "null", "siblings": [ "7200-02:IJ02920", "7200-01:IJ02919", "7200-00:IJ02918", "7100-05:IJ03121", "7100-04:IJ02917", "6100-09:IJ02915" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar", "cvss": [ "CVE-2014-3956:2.1" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01" ], "apAbstract": "APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP", "aparNo": "IJ04075", "aparNoSet": [ "IJ04075" ], "fixedIn": "7200-02-02", "ifixes": [ "IJ04075s1a.180306.72TL02SP00-01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04075", "filesets": [ "bos.rte.libc:7.2.2.0-7.2.2.0" ], "issued": "20180310", "updated": "null", "siblings": [ "6100-09:IJ04511", "7100-05:IJ04510" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04075/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-00", "7100-05-01", "7100-05-02" ], "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES", "aparNo": "IJ04266", "aparNoSet": [ "IJ04266" ], "fixedIn": "7100-05-03", "ifixes": [ "IJ04266m1a.180226.AIX71TL05SP00-01.epkg.Z", "IJ04266s2a.180403.AIX71TL05SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04266", "filesets": [ "bos.cluster.rte:7.1.5.0-7.1.5.15" ], "issued": "20180405", "updated": "null", "siblings": [ "6100-09:IJ04279", "7100-04:IJ04512", "7200-01:IJ04267", "7200-02:IJ04268" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04266/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES", "aparNo": "IJ04267", "aparNoSet": [ "IJ04267" ], "fixedIn": "7200-01-05", "ifixes": [ "IJ04267m2a.180403.AIX72TL01SP02.epkg.Z", "IJ04267m3a.180403.AIX72TL01SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04267", "filesets": [ "bos.cluster.rte:7.2.1.0-7.2.1.3" ], "issued": "20180405", "updated": "null", "siblings": [ "6100-09:IJ04279", "7100-04:IJ04512", "7100-05:IJ04266", "7200-02:IJ04268" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04267/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES", "aparNo": "IJ04268", "aparNoSet": [ "IJ04268" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ04268s2a.180403.AIX72TL02SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04268", "filesets": [ "bos.cluster.rte:7.2.2.0-7.2.2.15" ], "issued": "20180405", "updated": "null", "siblings": [ "6100-09:IJ04279", "7100-04:IJ04512", "7100-05:IJ04266", "7200-01:IJ04267" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04268/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07", "6100-09-08", "6100-09-09", "6100-09-10", "6100-09-11" ], "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES", "aparNo": "IJ04279", "aparNoSet": [ "IJ04279" ], "fixedIn": "6100-09-12", "ifixes": [ "IJ04279m9a.180404.AIX61TL09SP09.epkg.Z", "IJ04279mAa.180220.AIX61TL09SP10.epkg.Z", "IJ04279sBa.180419.AIX61TL09SP11.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04279", "filesets": [ "bos.cluster.rte:6.1.9.0-6.1.9.315" ], "issued": "20180405", "updated": "null", "siblings": [ "7100-04:IJ04512", "7100-05:IJ04266", "7200-01:IJ04267", "7200-02:IJ04268" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04279/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-00", "7100-05-01" ], "apAbstract": "APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP", "aparNo": "IJ04510", "aparNoSet": [ "IJ04510" ], "fixedIn": "7100-05-02", "ifixes": [ "IJ04510s1a.180306.71TL05SP00-01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04510", "filesets": [ "bos.rte.libc:7.1.5.0-7.1.5.0" ], "issued": "20180310", "updated": "null", "siblings": [ "6100-09:IJ04511", "7200-02:IJ04075" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04510/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10" ], "apAbstract": "APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP", "aparNo": "IJ04511", "aparNoSet": [ "IJ04511" ], "fixedIn": "2.2.6.20", "ifixes": [ "IJ04511sAa.180308.AIX61TL09SP10.epkg.Z", "IJ04511sAa.180308.VIOS2.2.6.0-10.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04511", "filesets": [ "bos.rte.libc:6.1.9.300-6.1.9.300" ], "issued": "20180310", "updated": "null", "siblings": [ "7100-05:IJ04510", "7200-02:IJ04075" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04511/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-10" ], "apAbstract": "APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP", "aparNo": "IJ04511", "aparNoSet": [ "IJ04511" ], "fixedIn": "6100-09-11", "ifixes": [ "IJ04511sAa.180308.AIX61TL09SP10.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04511", "filesets": [ "bos.rte.libc:6.1.9.300-6.1.9.300" ], "issued": "20180310", "updated": "null", "siblings": [ "7100-05:IJ04510", "7200-02:IJ04075" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04511/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03", "7100-04-04", "7100-04-05", "7100-04-06" ], "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES", "aparNo": "IJ04512", "aparNoSet": [ "IJ04512" ], "fixedIn": "7100-04-07", "ifixes": [ "IJ04512m5a.180313.AIX71TL04SP05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04512", "filesets": [ "bos.cluster.rte:7.1.4.0-7.1.4.33" ], "issued": "20180405", "updated": "null", "siblings": [ "6100-09:IJ04279", "7100-05:IJ04266", "7200-01:IJ04267", "7200-02:IJ04268" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04512/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.0", "2.2.5.10", "2.2.5.20", "2.2.5.30", "2.2.5.40" ], "apAbstract": "Multiple issues with VIOS SSP poolfs including potential data loss", "aparNo": "IJ04826", "aparNoSet": [ "IJ04826" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z", "IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z", "IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04826", "filesets": [ "pool.basic.rte:6.1.9.200-6.1.9.203" ], "issued": "20180605", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04826/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10", "2.2.6.20", "2.2.6.21" ], "apAbstract": "Multiple issues with VIOS SSP poolfs including potential data loss", "aparNo": "IJ04826", "aparNoSet": [ "IJ04826" ], "fixedIn": "2.2.6.30", "ifixes": [ "IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z", "IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z", "IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04826", "filesets": [ "pool.basic.rte:6.1.9.300-6.1.9.315" ], "issued": "20180605", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04826/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.30", "2.2.4.40", "2.2.4.50", "2.2.4.60" ], "apAbstract": "Multiple issues with VIOS SSP poolfs including potential data loss", "aparNo": "IJ04826", "aparNoSet": [ "IJ04826" ], "fixedIn": "See Advisory", "ifixes": [ "IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z", "IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z", "IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04826", "filesets": [ "pool.basic.rte:6.1.9.100-6.1.9.107" ], "issued": "20180605", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04826/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02", "7200-00-03", "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES", "aparNo": "IJ05429", "aparNoSet": [ "IJ05429" ], "fixedIn": "7200-00-07", "ifixes": [ "IJ05429m5b.180403.AIX72TL00SP05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ05429", "filesets": [ "bos.cluster.rte:7.2.0.0-7.2.0.6" ], "issued": "20180405", "updated": "null", "siblings": [ "6100-09:IJ04279", "7100-04:IJ04512", "7100-05:IJ04266", "7200-01:IJ04267", "7200-02:IJ04268" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij05429/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05818", "aparNoSet": [ "CVE-2018-3639", "IJ05818" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ05818m1a.180423.epkg.Z", "IJ05818s2a.180420.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:7.2.2.0-7.2.2.16" ], "issued": "20180522", "updated": "20180606", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-02" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05818", "aparNoSet": [ "CVE-2018-3639", "IJ05818" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ05818s2a.180420.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:7.2.2.0-7.2.2.16" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05820", "aparNoSet": [ "CVE-2018-3639", "IJ05820" ], "fixedIn": "7200-01-05", "ifixes": [ "IJ05820m2a.180430.epkg.Z", "IJ05820m3a.180430.epkg.Z", "IJ05820m4a.180423.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:7.2.1.0-7.2.1.5" ], "issued": "20180522", "updated": "20180606", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-04" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05820", "aparNoSet": [ "CVE-2018-3639", "IJ05820" ], "fixedIn": "7200-01-05", "ifixes": [ "IJ05820m4a.180423.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:7.2.1.0-7.2.1.5" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05821", "aparNoSet": [ "CVE-2018-3639", "IJ05821" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ05821m4a.180430.epkg.Z", "IJ05821m5a.180430.epkg.Z", "IJ05821m6a.180424.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:7.2.0.0-7.2.0.6" ], "issued": "20180522", "updated": "20180606", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-06" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05821", "aparNoSet": [ "CVE-2018-3639", "IJ05821" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ05821m6a.180424.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:7.2.0.0-7.2.0.6" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-00", "7100-05-01", "7100-05-02" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05822", "aparNoSet": [ "CVE-2018-3639", "IJ05822" ], "fixedIn": "7100-05-03", "ifixes": [ "IJ05822m1a.180430.epkg.Z", "IJ05822s2a.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.16" ], "issued": "20180522", "updated": "20180606", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-02" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05822", "aparNoSet": [ "CVE-2018-3639", "IJ05822" ], "fixedIn": "7100-05-03", "ifixes": [ "IJ05822s2a.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.16" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-04", "7100-04-05", "7100-04-06" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05823", "aparNoSet": [ "CVE-2018-3639", "IJ05823" ], "fixedIn": "7100-04-07", "ifixes": [ "IJ05823m4a.180501.epkg.Z", "IJ05823m5a.180430.epkg.Z", "IJ05823m6a.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:7.1.4.0-7.1.4.34" ], "issued": "20180522", "updated": "20180606", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-06" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05823", "aparNoSet": [ "CVE-2018-3639", "IJ05823" ], "fixedIn": "7100-04-07", "ifixes": [ "IJ05823m6a.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:7.1.4.0-7.1.4.34" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-09", "6100-09-10", "6100-09-11" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05824", "aparNoSet": [ "CVE-2018-3639", "IJ05824" ], "fixedIn": "6100-09-12", "ifixes": [ "IJ05824m9a.180501.epkg.Z", "IJ05824mAa.180501.epkg.Z", "IJ05824sBa.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.316" ], "issued": "20180522", "updated": "20180606", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-11" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05824", "aparNoSet": [ "CVE-2018-3639", "IJ05824" ], "fixedIn": "6100-09-12", "ifixes": [ "IJ05824sBa.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.316" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10", "2.2.6.20", "2.2.6.21" ], "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05824", "aparNoSet": [ "CVE-2018-3639", "IJ05824" ], "fixedIn": "2.2.6.22", "ifixes": [ "IJ05824mAa.180501.epkg.Z", "IJ05824sBa.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.316" ], "issued": "20180522", "updated": "20180606", "siblings": [ "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.20", "2.2.6.21" ], "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05824", "aparNoSet": [ "CVE-2018-3639", "IJ05824" ], "fixedIn": "2.2.6.22", "ifixes": [ "IJ05824sBa.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.316" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.20", "2.2.6.40", "2.2.6.60" ], "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05824", "aparNoSet": [ "CVE-2018-3639", "IJ05824" ], "fixedIn": "6100-09-12", "ifixes": [ "IJ05824sBa.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.316" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.40", "2.2.4.50", "2.2.4.60" ], "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05824", "aparNoSet": [ "CVE-2018-3639", "IJ05824" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ05824m9a.180501.epkg.Z", "IJ05824m9b.180502.epkg.Z", "IJ05824sBa.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.316" ], "issued": "20180522", "updated": "20180606", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.60" ], "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05824", "aparNoSet": [ "CVE-2018-3639", "IJ05824" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ05824sBa.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.316" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.20", "2.2.5.30", "2.2.5.40" ], "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05824", "aparNoSet": [ "CVE-2018-3639", "IJ05824" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ05824m9a.180501.epkg.Z", "IJ05824m9b.180502.epkg.Z", "IJ05824sBa.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.316" ], "issued": "20180522", "updated": "20180606", "siblings": [ "2.2.6:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.40" ], "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05824", "aparNoSet": [ "CVE-2018-3639", "IJ05824" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ05824sBa.180426.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.316" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "5300-12:IJ05826", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.", "aparNo": "IJ05826", "aparNoSet": [ "CVE-2018-3639", "IJ05826" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ05826m9b.180427.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc", "filesets": [ "bos.mp64:5.3.12.0-5.3.12.10" ], "issued": "20180522", "updated": "null", "siblings": [ "2.2.6:IJ05824", "2.2.5:IJ05824", "2.2.4:IJ05824", "7200-02:IJ05818", "7200-01:IJ05820", "7200-00:IJ05821", "7100-05:IJ05822", "7100-04:IJ05823", "6100-09:IJ05824" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar", "cvss": [ "CVE-2018-3639:0" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "UNDETECTED DATA CORRUPTION POSSIBLE WITH DEFRAGFS -F COMMAND", "aparNo": "IJ06486", "aparNoSet": [ "IJ06486" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ06486s2b.72TL02SP02.180524.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ06486", "filesets": [ "bos.mp64:7.2.2.0-7.2.2.17" ], "issued": "20180525", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij06486/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.0", "2.2.5.10", "2.2.5.20", "2.2.5.30", "2.2.5.40" ], "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable", "aparNo": "IJ06644", "aparNoSet": [ "IJ06644" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ06644sAa.180917.AIX61TL09SP10.epkg.Z", "IJ06644sBa.180615.AIX61TL09SP11.epkg.Z", "IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z", "IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z", "IJ06644sCa.180917.AIX61TL09SP12.epkg.Z", "IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ06644", "filesets": [ "devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.315" ], "issued": "20181013", "updated": "null", "siblings": [ "6100-09:IJ06644", "7100-04:IJ09173", "7100-05:IJ09174", "7200-01:IJ09175", "7200-02:IJ09176", "7200-03:IJ08641" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij06644/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10", "2.2.6.20", "2.2.6.30", "2.2.6.31" ], "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable", "aparNo": "IJ06644", "aparNoSet": [ "IJ06644" ], "fixedIn": "2.2.6.32", "ifixes": [ "IJ06644sAa.180917.AIX61TL09SP10.epkg.Z", "IJ06644sBa.180615.AIX61TL09SP11.epkg.Z", "IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z", "IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z", "IJ06644sCa.180917.AIX61TL09SP12.epkg.Z", "IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ06644", "filesets": [ "devices.pciex.df1060e214103404.com:6.1.9.300-6.1.9.400" ], "issued": "20181013", "updated": "null", "siblings": [ "6100-09:IJ06644", "7100-04:IJ09173", "7100-05:IJ09174", "7200-01:IJ09175", "7200-02:IJ09176", "7200-03:IJ08641" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij06644/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07", "6100-09-08", "6100-09-09", "6100-09-10", "6100-09-11", "6100-09-12" ], "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable", "aparNo": "IJ06644", "aparNoSet": [ "IJ06644" ], "fixedIn": "6100-09-12-1838", "ifixes": [ "IJ06644sAa.180917.AIX61TL09SP10.epkg.Z", "IJ06644sBa.180615.AIX61TL09SP11.epkg.Z", "IJ06644sCa.180917.AIX61TL09SP12.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ06644", "filesets": [ "devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.400" ], "issued": "20181013", "updated": "null", "siblings": [ "7100-04:IJ09173", "7100-05:IJ09174", "7200-01:IJ09175", "7200-02:IJ09176", "7200-03:IJ08641" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij06644/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-09", "6100-09-10", "6100-09-11" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IJ06651", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06651" ], "fixedIn": "6100-09-12", "ifixes": [ "IJ06651m9a.180528.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.315" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-09", "6100-09-10", "6100-09-11" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IJ06651", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06651" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ06400s9a.180514.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.20", "2.2.5.30", "2.2.5.40" ], "apAbstract": "Vulnerabilities in NTP affect VIOS", "aparNo": "IJ06651", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06651" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ06651m9a.180528.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10", "2.2.6.21" ], "apAbstract": "Vulnerabilities in NTP affect VIOS", "aparNo": "IJ06651", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06651" ], "fixedIn": "2.2.6.30", "ifixes": [ "IJ06651m9a.180528.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.40", "2.2.4.50", "2.2.4.60" ], "apAbstract": "Vulnerabilities in NTP affect VIOS", "aparNo": "IJ06651", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06651" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ06651m9a.180528.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-04", "7100-04-05", "7100-04-06" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IJ06652", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06652" ], "fixedIn": "7100-04-07", "ifixes": [ "IJ06652m4a.180528.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.33" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-00", "7100-05-01", "7100-05-02" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IJ06653", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06653" ], "fixedIn": "7100-05-03", "ifixes": [ "IJ06653m0a.180527.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.15" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IJ06654", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06654" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ06654m4a.180527.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "bos.net.tcp.ntpd:7.2.0.0-7.2.0.4" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IJ06655", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06655" ], "fixedIn": "7200-01-05", "ifixes": [ "IJ06655m2a.180527.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "bos.net.tcp.ntpd:7.2.1.0-7.2.1.2" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IJ06656", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06656" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ06656m0a.180527.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "bos.net.tcp.ntpd:7.2.2.0-7.2.2.15" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "5300-12:IJ06657", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IJ06657", "aparNoSet": [ "CVE-2014-5209", "CVE-2016-1549", "CVE-2018-7170", "CVE-2018-7182", "CVE-2018-7183", "CVE-2018-7184", "CVE-2018-7185", "IJ06657" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ06657m9a.180529.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20180814", "updated": "null", "siblings": [ "2.2.6:IJ06651", "2.2.5:IJ06651", "2.2.4:IJ06651", "7200-02:IJ06656", "7200-01:IJ06655", "7200-00:IJ06654", "6100-09:IJ06651", "7100-05:IJ06653", "7100-04:IJ06652" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar", "cvss": [ "CVE-2014-5209:5.0", "CVE-2018-7182:5.3", "CVE-2018-7183:5.6", "CVE-2018-7170:3.1", "CVE-2018-7184:3.1", "CVE-2018-7185:3.1", "CVE-2016-1549:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-00", "7100-05-01", "7100-05-02" ], "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)", "aparNo": "IJ06904", "aparNoSet": [ "CVE-2018-1655", "IJ06904" ], "fixedIn": "7100-05-03", "ifixes": [ "IJ06904s5a.180607.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.15" ], "issued": "20180621", "updated": "20180703", "siblings": [ "2.2.6:IJ06905", "2.2.5:IJ06905", "2.2.4:IJ06905", "7200-02:IJ06908", "7200-01:IJ06907", "5300-12:IJ06935", "7200-00:IJ06934", "7100-04:IJ06906", "6100-09:IJ06905" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-09", "6100-09-10", "6100-09-11" ], "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)", "aparNo": "IJ06905", "aparNoSet": [ "CVE-2018-1655", "IJ06905" ], "fixedIn": "6100-09-12", "ifixes": [ "IJ06905s9a.180608.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.315" ], "issued": "20180621", "updated": "20180703", "siblings": [ "2.2.6:IJ06905", "2.2.5:IJ06905", "2.2.4:IJ06905", "7200-02:IJ06908", "7200-01:IJ06907", "5300-12:IJ06935", "7200-00:IJ06934", "7100-05:IJ06904", "7100-04:IJ06906" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.20", "2.2.5.30", "2.2.5.40" ], "apAbstract": "Vulnerability in rmsock affects VIOS (CVE-2018-1655)", "aparNo": "IJ06905", "aparNoSet": [ "CVE-2018-1655", "IJ06905" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ06905s9a.180608.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180621", "updated": "20180703", "siblings": [ "2.2.6:IJ06905", "2.2.4:IJ06905", "7200-02:IJ06908", "7200-01:IJ06907", "5300-12:IJ06935", "7200-00:IJ06934", "7100-05:IJ06904", "7100-04:IJ06906", "6100-09:IJ06905" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.10", "2.2.6.20", "2.2.6.21" ], "apAbstract": "Vulnerability in rmsock affects VIOS (CVE-2018-1655)", "aparNo": "IJ06905", "aparNoSet": [ "CVE-2018-1655", "IJ06905" ], "fixedIn": "2.2.6.30", "ifixes": [ "IJ06905s9a.180608.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180621", "updated": "20180703", "siblings": [ "2.2.5:IJ06905", "2.2.4:IJ06905", "7200-02:IJ06908", "7200-01:IJ06907", "5300-12:IJ06935", "7200-00:IJ06934", "7100-05:IJ06904", "7100-04:IJ06906", "6100-09:IJ06905" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.20", "2.2.6.21" ], "apAbstract": "Vulnerability in rmsock affects VIOS (CVE-2018-1655)", "aparNo": "IJ06905", "aparNoSet": [ "CVE-2018-1655", "IJ06905" ], "fixedIn": "2.2.6.30", "ifixes": [ "IJ06905s9a.180608.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180621", "updated": "null", "siblings": [ "7200-02:IJ06908", "7200-01:IJ06907", "5300-12:IJ06935", "7200-00:IJ06934", "7100-05:IJ06904", "7100-04:IJ06906", "6100-09:IJ06905" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.40", "2.2.4.50", "2.2.4.60" ], "apAbstract": "Vulnerability in rmsock affects VIOS (CVE-2018-1655)", "aparNo": "IJ06905", "aparNoSet": [ "CVE-2018-1655", "IJ06905" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ06905s9a.180608.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180621", "updated": "20180703", "siblings": [ "2.2.6:IJ06905", "2.2.5:IJ06905", "7200-02:IJ06908", "7200-01:IJ06907", "5300-12:IJ06935", "7200-00:IJ06934", "7100-05:IJ06904", "7100-04:IJ06906", "6100-09:IJ06905" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-04", "7100-04-05", "7100-04-06" ], "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)", "aparNo": "IJ06906", "aparNoSet": [ "CVE-2018-1655", "IJ06906" ], "fixedIn": "7100-04-07", "ifixes": [ "IJ06906s4a.180607.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.33" ], "issued": "20180621", "updated": "20180703", "siblings": [ "2.2.6:IJ06905", "2.2.5:IJ06905", "2.2.4:IJ06905", "7200-02:IJ06908", "7200-01:IJ06907", "5300-12:IJ06935", "7200-00:IJ06934", "7100-05:IJ06904", "6100-09:IJ06905" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)", "aparNo": "IJ06907", "aparNoSet": [ "CVE-2018-1655", "IJ06907" ], "fixedIn": "7200-01-05", "ifixes": [ "IJ06907s1a.180607.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "bos.net.tcp.client_core:7.2.1.0-7.2.1.3" ], "issued": "20180621", "updated": "20180703", "siblings": [ "2.2.6:IJ06905", "2.2.5:IJ06905", "2.2.4:IJ06905", "7200-02:IJ06908", "5300-12:IJ06935", "7200-00:IJ06934", "7100-05:IJ06904", "7100-04:IJ06906", "6100-09:IJ06905" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)", "aparNo": "IJ06908", "aparNoSet": [ "CVE-2018-1655", "IJ06908" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ06908s2a.180607.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "bos.net.tcp.client_core:7.2.2.0-7.2.2.16" ], "issued": "20180621", "updated": "20180703", "siblings": [ "2.2.6:IJ06905", "2.2.5:IJ06905", "2.2.4:IJ06905", "7200-01:IJ06907", "5300-12:IJ06935", "7200-00:IJ06934", "7100-05:IJ06904", "7100-04:IJ06906", "6100-09:IJ06905" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)", "aparNo": "IJ06934", "aparNoSet": [ "CVE-2018-1655", "IJ06934" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ06934s0a.180607.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "bos.net.tcp.client_core:7.2.0.0-7.2.0.5" ], "issued": "20180621", "updated": "20180703", "siblings": [ "2.2.6:IJ06905", "2.2.5:IJ06905", "2.2.4:IJ06905", "7200-02:IJ06908", "7200-01:IJ06907", "5300-12:IJ06935", "7100-05:IJ06904", "7100-04:IJ06906", "6100-09:IJ06905" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)", "aparNo": "IJ06935", "aparNoSet": [ "CVE-2018-1655", "IJ06935" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ06935s1a.180611.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20180621", "updated": "20180703", "siblings": [ "2.2.6:IJ06905", "2.2.5:IJ06905", "2.2.4:IJ06905", "7200-02:IJ06908", "7200-01:IJ06907", "7200-00:IJ06934", "7100-05:IJ06904", "7100-04:IJ06906", "6100-09:IJ06905" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar", "cvss": [ "CVE-2018-1655:4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-01", "7200-02-02" ], "apAbstract": "IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.", "aparNo": "IJ07497", "aparNoSet": [ "CVE-2017-5715", "IJ07497" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ07497m1a.180717.epkg.Z", "IJ07497m2a.180713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc", "filesets": [ "bos.mp64:7.2.2.0-7.2.2.16" ], "issued": "20180817", "updated": "null", "siblings": [ "2.2.6:IJ07498", "2.2.5:IJ07498", "2.2.4:IJ07498", "7200-01:IJ07501", "7100-05:IJ07500", "7100-04:IJ07499", "6100-09:IJ07498" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar", "cvss": [ "CVE-2017-5715:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-09", "6100-09-10", "6100-09-11" ], "apAbstract": "IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.", "aparNo": "IJ07498", "aparNoSet": [ "CVE-2017-5715", "IJ07498" ], "fixedIn": "6100-09-12", "ifixes": [ "IJ07498m9a.180726.epkg.Z", "IJ07498mAa.180717.epkg.Z", "IJ07498mBa.180713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.316" ], "issued": "20180817", "updated": "null", "siblings": [ "2.2.6:IJ07498", "2.2.5:IJ07498", "2.2.4:IJ07498", "7200-02:IJ07497", "7200-01:IJ07501", "7100-05:IJ07500", "7100-04:IJ07499" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar", "cvss": [ "CVE-2017-5715:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.20", "2.2.5.30", "2.2.5.40" ], "apAbstract": "IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.", "aparNo": "IJ07498", "aparNoSet": [ "CVE-2017-5715", "IJ07498" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ07498m9a.180726.epkg.Z", "IJ07498m9b.180726.epkg.Z", "IJ07498mBa.180713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180817", "updated": "null", "siblings": [ "2.2.6:IJ07498", "2.2.4:IJ07498", "7200-02:IJ07497", "7200-01:IJ07501", "7100-05:IJ07500", "7100-04:IJ07499", "6100-09:IJ07498" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar", "cvss": [ "CVE-2017-5715:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10", "2.2.6.20", "2.2.6.21" ], "apAbstract": "IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.", "aparNo": "IJ07498", "aparNoSet": [ "CVE-2017-5715", "IJ07498" ], "fixedIn": "2.2.6.23", "ifixes": [ "IJ07498mAa.180717.epkg.Z", "IJ07498mBa.180713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180817", "updated": "null", "siblings": [ "2.2.5:IJ07498", "2.2.4:IJ07498", "7200-02:IJ07497", "7200-01:IJ07501", "7100-05:IJ07500", "7100-04:IJ07499", "6100-09:IJ07498" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar", "cvss": [ "CVE-2017-5715:0" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.40", "2.2.4.50", "2.2.4.60" ], "apAbstract": "IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.", "aparNo": "IJ07498", "aparNoSet": [ "CVE-2017-5715", "IJ07498" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ07498m9a.180726.epkg.Z", "IJ07498m9b.180726.epkg.Z", "IJ07498mBa.180713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc", "filesets": [ "See", "Bulletin" ], "issued": "20180817", "updated": "null", "siblings": [ "2.2.6:IJ07498", "2.2.5:IJ07498", "7200-02:IJ07497", "7200-01:IJ07501", "7100-05:IJ07500", "7100-04:IJ07499", "6100-09:IJ07498" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar", "cvss": [ "CVE-2017-5715:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-04", "7100-04-05", "7100-04-06" ], "apAbstract": "IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.", "aparNo": "IJ07499", "aparNoSet": [ "CVE-2017-5715", "IJ07499" ], "fixedIn": "7100-04-07", "ifixes": [ "IJ07499m4a.180719.epkg.Z", "IJ07499m5a.180809.epkg.Z", "IJ07499m6a.180713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc", "filesets": [ "bos.mp64:7.1.4.0-7.1.4.34" ], "issued": "20180817", "updated": "null", "siblings": [ "2.2.6:IJ07498", "2.2.5:IJ07498", "2.2.4:IJ07498", "7200-02:IJ07497", "7200-01:IJ07501", "7100-05:IJ07500", "6100-09:IJ07498" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar", "cvss": [ "CVE-2017-5715:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-01", "7100-05-02" ], "apAbstract": "IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.", "aparNo": "IJ07500", "aparNoSet": [ "CVE-2017-5715", "IJ07500" ], "fixedIn": "7100-05-03", "ifixes": [ "IJ07500m1a.180718.epkg.Z", "IJ07500m2a.180713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.16" ], "issued": "20180817", "updated": "null", "siblings": [ "2.2.6:IJ07498", "2.2.5:IJ07498", "2.2.4:IJ07498", "7200-02:IJ07497", "7200-01:IJ07501", "7100-04:IJ07499", "6100-09:IJ07498" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar", "cvss": [ "CVE-2017-5715:0" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.", "aparNo": "IJ07501", "aparNoSet": [ "CVE-2017-5715", "IJ07501" ], "fixedIn": "7200-01-05", "ifixes": [ "IJ07501m2a.180719.epkg.Z", "IJ07501m3a.180717.epkg.Z", "IJ07501m4a.180716.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc", "filesets": [ "bos.mp64:7.2.1.0-7.2.1.5" ], "issued": "20180817", "updated": "null", "siblings": [ "2.2.6:IJ07498", "2.2.5:IJ07498", "2.2.4:IJ07498", "7200-02:IJ07497", "7100-05:IJ07500", "7100-04:IJ07499", "6100-09:IJ07498" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar", "cvss": [ "CVE-2017-5715:0" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "Possible network outage with adapters using shientdd driver", "aparNo": "IJ08410", "aparNoSet": [ "IJ08410" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ08410s2a.180816.AIX72TL02SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08410", "filesets": [ "devices.ethernet.shi.rte:7.2.2.0-7.2.2.16" ], "issued": "20180830", "updated": "null", "siblings": [ "6100-09:IJ08482", "7100-05:IJ08480", "7200-00:IJ08785", "7200-01:IJ08779" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08410/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-10", "6100-09-11" ], "apAbstract": "Possible network outage with adapters using shientdd driver", "aparNo": "IJ08410", "aparNoSet": [ "IJ08410" ], "fixedIn": "6100-09-12", "ifixes": [ "IJ08482sBa.180817.AIX61TL09SP11.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08482", "filesets": [ "devices.ethernet.shi.rte:6.1.9.300-6.1.9.316" ], "issued": "20180830", "updated": "null", "siblings": [ "7100-05:IJ08480", "7200-00:IJ08785", "7200-01:IJ08779", "7200-02:IJ08410" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08482/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-00", "7100-05-01", "7100-05-02" ], "apAbstract": "Possible network outage with adapters using shientdd driver", "aparNo": "IJ08480", "aparNoSet": [ "IJ08480" ], "fixedIn": "7100-05-03", "ifixes": [ "IJ08480s2a.180817.AIX71TL05SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08480", "filesets": [ "devices.ethernet.shi.rte:7.1.5.0-7.1.5.16" ], "issued": "20180830", "updated": "null", "siblings": [ "6100-09:IJ08482", "7200-00:IJ08785", "7200-01:IJ08779", "7200-02:IJ08410" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08480/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.40" ], "apAbstract": "Possible network outage with adapters using shientdd driver ", "aparNo": "IJ08482", "aparNoSet": [ "IJ08482" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z", "IJ08482sBa.180817.AIX61TL09SP11.epkg.Z", "IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z", "IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08482", "filesets": [ "devices.ethernet.shi.rte:6.1.9.315" ], "issued": "20180830", "updated": "null", "siblings": [ "6100-09:IJ08482", "7100-05:IJ08480", "7200-00:IJ08785", "7200-01:IJ08779", "7200-02:IJ08410" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08482/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10", "2.2.6.20", "2.2.6.21", "2.2.6.22", "2.2.6.23" ], "apAbstract": "Possible network outage with adapters using shientdd driver ", "aparNo": "IJ08482", "aparNoSet": [ "IJ08482" ], "fixedIn": "2.2.6.30", "ifixes": [ "IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z", "IJ08482sBa.180817.AIX61TL09SP11.epkg.Z", "IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z", "IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08482", "filesets": [ "devices.ethernet.shi.rte:6.1.9.300-6.1.9.316" ], "issued": "20180830", "updated": "null", "siblings": [ "6100-09:IJ08482", "7100-05:IJ08480", "7200-00:IJ08785", "7200-01:IJ08779", "7200-02:IJ08410" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08482/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.60" ], "apAbstract": "Possible network outage with adapters using shientdd driver ", "aparNo": "IJ08482", "aparNoSet": [ "IJ08482" ], "fixedIn": "See Advisory", "ifixes": [ "IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z", "IJ08482sBa.180817.AIX61TL09SP11.epkg.Z", "IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z", "IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08482", "filesets": [ "devices.ethernet.shi.rte:6.1.9.300" ], "issued": "20180830", "updated": "null", "siblings": [ "6100-09:IJ08482", "7100-05:IJ08480", "7200-00:IJ08785", "7200-01:IJ08779", "7200-02:IJ08410" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08482/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-03-00", "7200-03-01" ], "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable", "aparNo": "IJ08641", "aparNoSet": [ "IJ08641" ], "fixedIn": "7200-03-02-1845", "ifixes": [ "IJ08641s1a.181004.AIX72TL03SP00-01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08641", "filesets": [ "devices.pciex.df1060e214103404.com:7.2.3.0" ], "issued": "20181013", "updated": "null", "siblings": [ "6100-09:IJ06644", "7100-04:IJ09173", "7100-05:IJ09174", "7200-01:IJ09175", "7200-02:IJ09176" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08641/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-04" ], "apAbstract": "Possible network outage with adapters using shientdd driver", "aparNo": "IJ08779", "aparNoSet": [ "IJ08779" ], "fixedIn": "7200-01-06", "ifixes": [ "IJ08779s4a.180827.72TL01SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08779", "filesets": [ "devices.ethernet.shi.rte:7.2.1.3-7.2.1.3" ], "issued": "20180830", "updated": "null", "siblings": [ "6100-09:IJ08482", "7100-00:IJ08480", "7200-00:IJ08785", "7200-02:IJ08410" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08779/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02", "7200-00-03", "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "Possible network outage with adapters using shientdd driver", "aparNo": "IJ08785", "aparNoSet": [ "IJ08785" ], "fixedIn": "See Advisory", "ifixes": [ "IJ08785s6a.180828.72TL00SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08785", "filesets": [ "devices.ethernet.shi.rte:7.2.0.6-7.2.0.6" ], "issued": "20180830", "updated": "null", "siblings": [ "6100-09:IJ08482", "7100-05:IJ08480", "7200-01:IJ08779", "7200-02:IJ08410" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08785/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03", "7100-04-04", "7100-04-05", "7100-04-06" ], "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable", "aparNo": "IJ09173", "aparNoSet": [ "IJ09173" ], "fixedIn": "7100-04-07-1845", "ifixes": [ "IJ09173s6a.180917.71TL04SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09173", "filesets": [ "devices.pciex.df1060e214103404.com:7.1.4.0-7.1.4.33" ], "issued": "20181013", "updated": "null", "siblings": [ "6100-09:IJ06644", "7100-05:IJ09174", "7200-01:IJ09175", "7200-02:IJ09176", "7200-03:IJ08641" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09173/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-00", "7100-05-01", "7100-05-02", "7100-05-03" ], "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable", "aparNo": "IJ09174", "aparNoSet": [ "IJ09174" ], "fixedIn": "7100-05-03-1846", "ifixes": [ "IJ09174s3a.180921.AIX71TL05SP03-1838.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09174", "filesets": [ "devices.pciex.df1060e214103404.com:7.1.5.0-7.1.5.30" ], "issued": "20181013", "updated": "null", "siblings": [ "6100-09:IJ06644", "7100-04:IJ09173", "7200-01:IJ09175", "7200-02:IJ09176", "7200-03:IJ08641" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09174/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable", "aparNo": "IJ09175", "aparNoSet": [ "IJ09175" ], "fixedIn": "7200-01-05-1845", "ifixes": [ "IJ09175s4a.180917.72TL01SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09175", "filesets": [ "devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.3" ], "issued": "20181013", "updated": "null", "siblings": [ "6100-09:IJ06644", "7100-04:IJ09173", "7100-05:IJ09174", "7200-02:IJ09176", "7200-03:IJ08641" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09175/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable", "aparNo": "IJ09176", "aparNoSet": [ "IJ09176" ], "fixedIn": "7200-02-03-1845", "ifixes": [ "IJ09176s2a.180917.AIX72TL02SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09176", "filesets": [ "devices.pciex.df1060e214103404.com:7.2.2.0-7.2.2.15" ], "issued": "20181013", "updated": "null", "siblings": [ "6100-09:IJ06644", "7100-04:IJ09173", "7100-05:IJ09174", "7200-01:IJ09175", "7200-03:IJ08641" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09176/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02", "7200-00-03", "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable", "aparNo": "IJ09583", "aparNoSet": [ "IJ09583" ], "fixedIn": "See Advisory", "ifixes": [ "IJ09583s6a.181004.72TL00SP06.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09583", "filesets": [ "devices.pciex.df1060e214103404.com:7.2.0.0-7.2.0.5" ], "issued": "20181013", "updated": "null", "siblings": [ "6100-09:IJ06644", "7100-04:IJ09173", "7200-01:IJ09175", "7200-02:IJ09176", "7200-03:IJ08641" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09583/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.", "aparNo": "IJ09618", "aparNoSet": [ "CVE-2018-6922", "IJ09618" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ09618s9a.181031.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.rte:5.3.12.0-5.3.12.1" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "7200-01:IJ09623", "7200-00:IJ09622", "7100-05:IJ09621", "7100-04:IJ09620", "6100-09:IJ09619", "7200-03:IJ09625" ], "downloadUrl": "null", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-10", "6100-09-11", "6100-09-12" ], "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.", "aparNo": "IJ09619", "aparNoSet": [ "CVE-2018-6922", "IJ09619" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ09619sAa.181004.epkg.Z", "IJ09619sBa.181004.epkg.Z", "IJ09619sCa.181009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.401" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "7200-01:IJ09623", "5300-12:IJ09618", "7200-00:IJ09622", "7100-05:IJ09621", "7100-04:IJ09620", "7200-03:IJ09625" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.40" ], "apAbstract": "There is a vulnerability in FreeBSD that affects VIOS.", "aparNo": "IJ09619", "aparNoSet": [ "CVE-2018-6922", "IJ09619" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ09619sBa.181004.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.401" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "7200-01:IJ09623", "5300-12:IJ09618", "7200-00:IJ09622", "7100-05:IJ09621", "7100-04:IJ09620", "7200-03:IJ09625" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.23", "2.2.6.30", "2.2.6.31", "2.2.6.32" ], "apAbstract": "There is a vulnerability in FreeBSD that affects VIOS.", "aparNo": "IJ09619", "aparNoSet": [ "CVE-2018-6922", "IJ09619" ], "fixedIn": "2.2.6.40", "ifixes": [ "IJ09619sCa.181004.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.401" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "7200-01:IJ09623", "5300-12:IJ09618", "7200-00:IJ09622", "7100-05:IJ09621", "7100-04:IJ09620", "7200-03:IJ09625" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.60" ], "apAbstract": "There is a vulnerability in FreeBSD that affects VIOS.", "aparNo": "IJ09619", "aparNoSet": [ "CVE-2018-6922", "IJ09619" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ09619sBa.181004.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.401" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "7200-01:IJ09623", "5300-12:IJ09618", "7200-00:IJ09622", "7100-05:IJ09621", "7100-04:IJ09620", "7200-03:IJ09625" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-04", "7100-04-05", "7100-04-06" ], "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.", "aparNo": "IJ09620", "aparNoSet": [ "CVE-2018-6922", "IJ09620" ], "fixedIn": "7100-04-07", "ifixes": [ "IJ09620s4a.180927.epkg.Z", "IJ09620s5a.180927.epkg.Z", "IJ09620s6a.180926.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.34" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "7200-01:IJ09623", "5300-12:IJ09618", "7200-00:IJ09622", "7100-05:IJ09621", "6100-09:IJ09619", "7200-03:IJ09625" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-01", "7100-05-02", "7100-05-03" ], "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.", "aparNo": "IJ09621", "aparNoSet": [ "CVE-2018-6922", "IJ09621" ], "fixedIn": "7100-05-04", "ifixes": [ "IJ09621s1a.180926.epkg.Z", "IJ09621s2a.180925.epkg.Z", "IJ09621s3a.181001.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.31" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "7200-01:IJ09623", "5300-12:IJ09618", "7200-00:IJ09622", "7100-04:IJ09620", "6100-09:IJ09619", "7200-03:IJ09625" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.", "aparNo": "IJ09622", "aparNoSet": [ "CVE-2018-6922", "IJ09622" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ09622s4a.181001.epkg.Z", "IJ09622s5a.181001.epkg.Z", "IJ09622s6a.181001.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.0.0-7.2.0.5" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "7200-01:IJ09623", "5300-12:IJ09618", "7100-05:IJ09621", "7100-04:IJ09620", "6100-09:IJ09619", "7200-03:IJ09625" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.", "aparNo": "IJ09623", "aparNoSet": [ "CVE-2018-6922", "IJ09623" ], "fixedIn": "7200-01-05", "ifixes": [ "IJ09623s2a.181002.epkg.Z", "IJ09623s3a.181002.epkg.Z", "IJ09623s4a.181002.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.1.0-7.2.1.4" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "5300-12:IJ09618", "7200-00:IJ09622", "7100-05:IJ09621", "7100-04:IJ09620", "6100-09:IJ09619", "7200-03:IJ09625" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.", "aparNo": "IJ09624", "aparNoSet": [ "CVE-2018-6922", "IJ09624" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ09624s0a.181002.epkg.Z", "IJ09624s1a.181003.epkg.Z", "IJ09624s2a.181003.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.2.0-7.2.2.17" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-01:IJ09623", "5300-12:IJ09618", "7200-00:IJ09622", "7100-05:IJ09621", "7100-04:IJ09620", "6100-09:IJ09619", "7200-03:IJ09625" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-00", "7200-03-01", "7200-03-02" ], "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.", "aparNo": "IJ09625", "aparNoSet": [ "CVE-2018-6922", "IJ09625" ], "fixedIn": "7200-03-03", "ifixes": [ "IJ09625s0a.181010.epkg.Z", "IJ09625s2a.181203.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.3.0-7.2.3.15" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "7200-01:IJ09623", "5300-12:IJ09618", "7200-00:IJ09622", "7100-05:IJ09621", "7100-04:IJ09620", "6100-09:IJ09619" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.0", "3.1.0.10" ], "apAbstract": "There is a vulnerability in FreeBSD that affects VIOS.", "aparNo": "IJ09625", "aparNoSet": [ "CVE-2018-6922", "IJ09625" ], "fixedIn": "3.1.0.20", "ifixes": [ "IJ09625s2a.181203.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.3.0-7.2.3.15" ], "issued": "20181108", "updated": "null", "siblings": [ "2.2.6:IJ09619", "2.2.5:IJ09619", "2.2.4:IJ09619", "3100-00:IJ09625", "7200-02:IJ09624", "7200-01:IJ09623", "5300-12:IJ09618", "7200-00:IJ09622", "7100-05:IJ09621", "7100-04:IJ09620", "7200-03:IJ09625" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar", "cvss": [ "CVE-2018-6922:7.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-03-00", "7200-03-01" ], "apAbstract": "Possible undetected data loss with Power9 NVMe", "aparNo": "IJ09686", "aparNoSet": [ "IJ09686" ], "fixedIn": "7200-03-02-1845", "ifixes": [ "IJ09686s1a.181113.AIX72TL03SP00-01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09686", "filesets": [ "devices.chrp.vdevice.rte:7.2.3.0", "devices.chrp.pci.rte:7.2.3.0" ], "issued": "20181117", "updated": "null", "siblings": [ "6100-09:IJ09710", "7100-04:IJ10350", "7100-05:IJ09705", "7200-01:IJ09894", "7200-02:IJ10127" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/IJ09686/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-02", "7100-05-03" ], "apAbstract": "Possible undetected data loss with Power9 NVMe", "aparNo": "IJ09705", "aparNoSet": [ "IJ09705" ], "fixedIn": "7100-05-03-1846", "ifixes": [ "IJ09705s3a.181115.AIX71TL05SP03-1838.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09705", "filesets": [ "devices.chrp.vdevice.rte:7.1.5.0-7.1.5.30", "devices.chrp.pci.rte:7.1.5.16-7.1.5.30" ], "issued": "20181117", "updated": "null", "siblings": [ "6100-09:IJ09710", "7100-04:IJ10350", "7200-01:IJ09894", "7200-02:IJ10127", "7200-03:IJ09686" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09705/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.40" ], "apAbstract": "Possible undetected data loss with Power9 NVMe", "aparNo": "IJ09710", "aparNoSet": [ "IJ09710" ], "fixedIn": "2.2.5.40", "ifixes": [ "IJ09710sBa.181115.AIX61TL09SP11.epkg.Z", "IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z", "IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z", "IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z", "IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09710", "filesets": [ "devices.chrp.vdevice.rte:6.1.9.315", "devices.chrp.pci.rte:6.1.9.316" ], "issued": "20181117", "updated": "null", "siblings": [ "6100-09:IJ09710", "7100-04:IJ10350", "7100-05:IJ09705", "7200-01:IJ09894", "7200-02:IJ10127", "7200-03:IJ09686" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09710/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.21", "2.2.6.30", "2.2.6.31" ], "apAbstract": "Possible undetected data loss with Power9 NVMe", "aparNo": "IJ09710", "aparNoSet": [ "IJ09710" ], "fixedIn": "2.2.6.32", "ifixes": [ "IJ09710sBa.181115.AIX61TL09SP11.epkg.Z", "IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z", "IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z", "IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z", "IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09710", "filesets": [ "devices.chrp.vdevice.rte:6.1.9.315-6.1.9.400", "devices.chrp.pci.rte:6.1.9.316-6.1.9.400" ], "issued": "20181117", "updated": "null", "siblings": [ "6100-09:IJ09710", "7100-04:IJ10350", "7100-05:IJ09705", "7200-01:IJ09894", "7200-02:IJ10127", "7200-03:IJ09686" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09710/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.60" ], "apAbstract": "Possible undetected data loss with Power9 NVMe", "aparNo": "IJ09710", "aparNoSet": [ "IJ09710" ], "fixedIn": "See Advisory", "ifixes": [ "IJ09710sBa.181115.AIX61TL09SP11.epkg.Z", "IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z", "IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z", "IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z", "IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09710", "filesets": [ "devices.chrp.vdevice.rte:6.1.9.315", "devices.chrp.pci.rte:6.1.9.316" ], "issued": "20181117", "updated": "null", "siblings": [ "6100-09:IJ09710", "7100-04:IJ10350", "7100-05:IJ09705", "7200-01:IJ09894", "7200-02:IJ10127", "7200-03:IJ09686" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09710/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-11", "6100-09-12" ], "apAbstract": "Possible undetected data loss with Power9 NVMe ", "aparNo": "IJ09710", "aparNoSet": [ "IJ09710" ], "fixedIn": "6100-09-12-1846", "ifixes": [ "IJ09710sBa.181115.AIX61TL09SP11.epkg.Z", "IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09710", "filesets": [ "devices.chrp.vdevice.rte:6.1.9.315-6.1.9.400", "devices.chrp.pci.rte:6.1.9.316-6.1.9.400" ], "issued": "20181117", "updated": "null", "siblings": [ "7100-04:IJ10350", "7100-05:IJ09705", "7200-01:IJ09894", "7200-02:IJ10127", "7200-03:IJ09686" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09710/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-00", "7200-03-01" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.", "aparNo": "IJ09805", "aparNoSet": [ "CVE-2017-3623", "IJ09805" ], "fixedIn": "7200-03-02-1845", "ifixes": [ "IJ09805s0a.181012.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.3.0-7.2.3.0" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ10134", "2.2.5:IJ10134", "2.2.4:IJ10134", "7200-02:IJ10130", "7200-01:IJ10552", "5300-12:IJ10554", "7200-00:IJ10553", "7100-05:IJ10132", "7100-04:IJ10275", "6100-09:IJ10134" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-04" ], "apAbstract": "Possible undetected data loss with Power9 NVMe", "aparNo": "IJ09894", "aparNoSet": [ "IJ09894" ], "fixedIn": "7200-01-05-1845", "ifixes": [ "IJ09894s4a.181113.AIX72TL01SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09894", "filesets": [ "devices.chrp.vdevice.rte:7.2.1.0", "devices.chrp.pci.rte:7.2.1.0" ], "issued": "20181117", "updated": "null", "siblings": [ "6100-09:IJ09710", "7100-04:IJ10350", "7100-05:IJ09705", "7200-02:IJ10127", "7200-03:IJ09686" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09894/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-02" ], "apAbstract": "Possible undetected data loss with Power9 NVMe", "aparNo": "IJ10127", "aparNoSet": [ "IJ10127" ], "fixedIn": "7200-02-03-1845", "ifixes": [ "IJ10127s2a.181113.AIX72TL02SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10127", "filesets": [ "devices.chrp.vdevice.rte:7.2.2.0", "devices.chrp.pci.rte:7.2.2.16" ], "issued": "20181117", "updated": "null", "siblings": [ "6100-09:IJ09710", "7100-04:IJ10350", "7100-05:IJ09705", "7200-01:IJ09894", "7200-03:IJ09686" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10127/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.", "aparNo": "IJ10130", "aparNoSet": [ "CVE-2017-3623", "IJ10130" ], "fixedIn": "7200-02-03-1845", "ifixes": [ "IJ10130s0a.181011.epkg.Z", "IJ10130s2a.181011.epkg.Z", "IJ10130s2b.181011.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.2.0-7.2.2.16" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ10134", "2.2.5:IJ10134", "2.2.4:IJ10134", "7200-01:IJ10552", "5300-12:IJ10554", "7200-00:IJ10553", "7100-05:IJ10132", "7100-04:IJ10275", "6100-09:IJ10134", "7200-03:IJ09805" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-01", "7100-05-02", "7100-05-03" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.", "aparNo": "IJ10132", "aparNoSet": [ "CVE-2017-3623", "IJ10132" ], "fixedIn": "7100-05-03-1846", "ifixes": [ "IJ10132s1a.181009.epkg.Z", "IJ10132s2a.181009.epkg.Z", "IJ10132s2b.181009.epkg.Z", "IJ10132s3a.181009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.30" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ10134", "2.2.5:IJ10134", "2.2.4:IJ10134", "7200-02:IJ10130", "7200-01:IJ10552", "5300-12:IJ10554", "7200-00:IJ10553", "7100-04:IJ10275", "6100-09:IJ10134", "7200-03:IJ09805" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-10", "6100-09-11", "6100-09-12" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.", "aparNo": "IJ10134", "aparNoSet": [ "CVE-2017-3623", "IJ10134" ], "fixedIn": "6100-09-12-1846", "ifixes": [ "IJ10134sAa.181009.epkg.Z", "IJ10134sBa.181009.epkg.Z", "IJ10134sBb.181009.epkg.Z", "IJ10134sCa.181009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.400" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ10134", "2.2.5:IJ10134", "2.2.4:IJ10134", "7200-02:IJ10130", "7200-01:IJ10552", "5300-12:IJ10554", "7200-00:IJ10553", "7100-05:IJ10132", "7100-04:IJ10275", "7200-03:IJ09805" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.40" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects VIOS.", "aparNo": "IJ10134", "aparNoSet": [ "CVE-2017-3623", "IJ10134" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ10134sBa.181009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "See", "Bulletin" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ10134", "2.2.4:IJ10134", "7200-02:IJ10130", "7200-01:IJ10552", "5300-12:IJ10554", "7200-00:IJ10553", "7100-05:IJ10132", "7100-04:IJ10275", "6100-09:IJ10134", "7200-03:IJ09805" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.20", "2.2.6.21", "2.2.6.23", "2.2.6.30", "2.2.6.31" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects VIOS.", "aparNo": "IJ10134", "aparNoSet": [ "CVE-2017-3623", "IJ10134" ], "fixedIn": "2.2.6.32", "ifixes": [ "IJ10134sBa.181009.epkg.Z", "IJ10134sBb.181009.epkg.Z", "IJ10134sCa.181009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "See", "Bulletin" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.5:IJ10134", "2.2.4:IJ10134", "7200-02:IJ10130", "7200-01:IJ10552", "5300-12:IJ10554", "7200-00:IJ10553", "7100-05:IJ10132", "7100-04:IJ10275", "6100-09:IJ10134", "7200-03:IJ09805" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.60" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects VIOS.", "aparNo": "IJ10134", "aparNoSet": [ "CVE-2017-3623", "IJ10134" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ10134sBa.181009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "See", "Bulletin" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ10134", "2.2.5:IJ10134", "7200-02:IJ10130", "7200-01:IJ10552", "5300-12:IJ10554", "7200-00:IJ10553", "7100-05:IJ10132", "7100-04:IJ10275", "6100-09:IJ10134", "7200-03:IJ09805" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-04", "7100-04-05", "7100-04-06" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.", "aparNo": "IJ10275", "aparNoSet": [ "CVE-2017-3623", "IJ10275" ], "fixedIn": "7100-04-07-1845", "ifixes": [ "IJ10275s4a.181009.epkg.Z", "IJ10275s5a.181009.epkg.Z", "IJ10275s6a.181009.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.33" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ10134", "2.2.5:IJ10134", "2.2.4:IJ10134", "7200-02:IJ10130", "7200-01:IJ10552", "5300-12:IJ10554", "7200-00:IJ10553", "7100-05:IJ10132", "6100-09:IJ10134", "7200-03:IJ09805" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "NTPv4" ], "apAbstract": "There are vulnerabilities in NTPv4 that affect AIX.", "aparNo": "IJ10280", "aparNoSet": [ "CVE-2018-12327", "CVE-2018-7170", "IJ10280" ], "fixedIn": "See Advisory", "ifixes": [ "IJ10280s3b.181206.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory11.asc", "filesets": [ "ntp.rte:7.4.2.8100-7.4.2.8110" ], "issued": "20181214", "updated": "null", "siblings": [], "downloadUrl": "See Bulletin", "cvss": [ "CVE-2018-12327:5.9", "CVE-2018-7170:3.1" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-03-00", "7200-03-01" ], "apAbstract": "Possible errors in certain network adapters", "aparNo": "IJ10293", "aparNoSet": [ "IJ10293" ], "fixedIn": "7200-03-02-1845", "ifixes": [ "IJ10293s1a.181109.AIX72TL03SP00-01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10293", "filesets": [ "devices.ethernet.lnc.rte:7.2.3.0", "devices.ethernet.lnc2.rte:7.2.3.0" ], "issued": "20181110", "updated": "null", "siblings": [ "7100-04:IJ10369", "7100-05:IJ10295", "7200-01:IJ10370", "7200-02:IJ10371" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10293/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-00", "7100-05-01", "7100-05-02" ], "apAbstract": "Possible errors in certain network adapters", "aparNo": "IJ10295", "aparNoSet": [ "IJ10295" ], "fixedIn": "7100-05-03-1846", "ifixes": [ "IJ10295m3a.181109.AIX71TL05SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10295", "filesets": [ "devices.ethernet.lnc.rte:7.1.5.0-7.1.5.30", "devices.ethernet.lnc2.rte:7.1.5.0-7.1.5.30" ], "issued": "20181110", "updated": "null", "siblings": [ "7100-04:IJ10369", "7200-01:IJ10370", "7200-02:IJ10371", "7200-03:IJ10293" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10295/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.0", "2.2.5.10", "2.2.5.20", "2.2.5.30", "2.2.5.40" ], "apAbstract": "Possible errors in certain network adapters", "aparNo": "IJ10300", "aparNoSet": [ "IJ10300" ], "fixedIn": "2.2.5.50", "ifixes": [ "IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z", "IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z", "IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10300", "filesets": [ "devices.ethernet.lnc.rte:6.1.9.200-6.1.9.315", "devices.ethernet.lnc2.rte:6.1.9.200-6.1.9.315" ], "issued": "20181110", "updated": "null", "siblings": [ "7100-04:IJ10369", "7100-05:IJ10295", "7200-01:IJ10370", "7200-02:IJ10371", "7200-03:IJ10293" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10300/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10", "2.2.5.60", "2.2.6.30", "2.2.6.31" ], "apAbstract": "Possible errors in certain network adapters", "aparNo": "IJ10300", "aparNoSet": [ "IJ10300" ], "fixedIn": "2.2.6.32", "ifixes": [ "IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z", "IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z", "IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10300", "filesets": [ "devices.ethernet.lnc.rte:6.1.9.300-6.1.9.400", "devices.ethernet.lnc2.rte:6.1.9.300-6.1.9.400" ], "issued": "20181110", "updated": "null", "siblings": [ "7100-04:IJ10369", "7100-05:IJ10295", "7200-01:IJ10370", "7200-02:IJ10371", "7200-03:IJ10293" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10300/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.30", "2.2.4.40", "2.2.4.50", "2.2.4.60" ], "apAbstract": "Possible errors in certain network adapters", "aparNo": "IJ10300", "aparNoSet": [ "IJ10300" ], "fixedIn": "See Advisory", "ifixes": [ "IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z", "IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z", "IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10300", "filesets": [ "devices.ethernet.lnc.rte:6.1.9.100-6.1.9.315", "devices.ethernet.lnc2.rte:6.1.9.100-6.1.9.315" ], "issued": "20181110", "updated": "null", "siblings": [ "7100-04:IJ10369", "7100-05:IJ10295", "7200-01:IJ10370", "7200-02:IJ10371", "7200-03:IJ10293" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10300/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-06" ], "apAbstract": "Possible undetected data loss with Power9 NVMe", "aparNo": "IJ10350", "aparNoSet": [ "IJ10350" ], "fixedIn": "7100-04-07-1845", "ifixes": [ "IJ10350s6a.181115.AIX71TL04SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10350", "filesets": [ "devices.chrp.vdevice.rte:7.1.4.30", "devices.chrp.pci.rte:7.1.4.30" ], "issued": "20181117", "updated": "null", "siblings": [ "6100-09:IJ09710", "7100-05:IJ09705", "7200-01:IJ09894", "7200-02:IJ10127", "7200-03:IJ09686" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10350/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03", "7100-04-04", "7100-04-05", "7100-04-06" ], "apAbstract": "Possible errors in certain network adapters", "aparNo": "IJ10369", "aparNoSet": [ "IJ10369" ], "fixedIn": "7100-04-07-1845", "ifixes": [ "IJ10369m6a.181109.AIX71TL04SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10369", "filesets": [ "devices.ethernet.lnc.rte:7.1.4.0-7.1.4.33", "devices.ethernet.lnc2.rte:7.1.4.0-7.1.4.33" ], "issued": "20181110", "updated": "null", "siblings": [ "7100-05:IJ10295", "7200-01:IJ10370", "7200-02:IJ10371", "7200-03:IJ10293" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10369/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "Possible errors in certain network adapters", "aparNo": "IJ10370", "aparNoSet": [ "IJ10370" ], "fixedIn": "7200-01-05-1845", "ifixes": [ "IJ10370m4a.181109.AIX72TL01SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10370", "filesets": [ "devices.ethernet.lnc.rte:7.2.1.0-7.2.1.3", "devices.ethernet.lnc2.rte:7.2.1.0-7.2.1.3" ], "issued": "20181110", "updated": "null", "siblings": [ "7100-04:IJ10369", "7100-05:IJ10295", "7200-02:IJ10371", "7200-03:IJ10293" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10370/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "Possible errors in certain network adapters", "aparNo": "IJ10371", "aparNoSet": [ "IJ10371" ], "fixedIn": "7200-02-03-1845", "ifixes": [ "IJ10371m2a.181109.AIX72TL02SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10371", "filesets": [ "devices.ethernet.lnc.rte:7.2.2.0-7.2.2.16", "devices.ethernet.lnc2.rte:7.2.2.0-7.2.2.16" ], "issued": "20181110", "updated": "null", "siblings": [ "7100-04:IJ10369", "7100-05:IJ10295", "7200-01:IJ10370", "7200-03:IJ10293" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10371/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.", "aparNo": "IJ10552", "aparNoSet": [ "CVE-2017-3623", "IJ10552" ], "fixedIn": "7200-01-05-1845", "ifixes": [ "IJ10552s2a.181016.epkg.Z", "IJ10552s3a.181016.epkg.Z", "IJ10552s4a.181016.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.1.0-7.2.1.3" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ10134", "2.2.5:IJ10134", "2.2.4:IJ10134", "7200-02:IJ10130", "5300-12:IJ10554", "7200-00:IJ10553", "7100-05:IJ10132", "7100-04:IJ10275", "6100-09:IJ10134", "7200-03:IJ09805" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.", "aparNo": "IJ10553", "aparNoSet": [ "CVE-2017-3623", "IJ10553" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ10553s4a.181016.epkg.Z", "IJ10553s5a.181016.epkg.Z", "IJ10553s6a.181016.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.0.0-7.2.0.5" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ10134", "2.2.5:IJ10134", "2.2.4:IJ10134", "7200-02:IJ10130", "7200-01:IJ10552", "5300-12:IJ10554", "7100-05:IJ10132", "7100-04:IJ10275", "6100-09:IJ10134", "7200-03:IJ09805" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.", "aparNo": "IJ10554", "aparNoSet": [ "CVE-2017-3623", "IJ10554" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ10554s9a.181017.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ10134", "2.2.5:IJ10134", "2.2.4:IJ10134", "7200-02:IJ10130", "7200-01:IJ10552", "7200-00:IJ10553", "7100-05:IJ10132", "7100-04:IJ10275", "6100-09:IJ10134", "7200-03:IJ09805" ], "downloadUrl": "null", "cvss": [ "CVE-2017-3623:10" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-10", "6100-09-11", "6100-09-12" ], "apAbstract": "There is a vulnerability in Xorg that affects AIX.", "aparNo": "IJ11000", "aparNoSet": [ "CVE-2018-14665", "IJ11000" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ11000s0b.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:6.1.9.0-6.1.9.100" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "7200-00:IJ11546", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7100-04:IJ11544", "7200-03:IJ11550" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.40", "2.2.4.50", "2.2.4.60" ], "apAbstract": "There is a vulnerability in Xorg that affects VIOS.", "aparNo": "IJ11000", "aparNoSet": [ "CVE-2018-14665", "IJ11000" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ11000s0b.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:6.1.9.0-6.1.9.100" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "7200-00:IJ11546", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7100-04:IJ11544", "7200-03:IJ11550" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.20", "2.2.5.30", "2.2.5.40" ], "apAbstract": "There is a vulnerability in Xorg that affects VIOS.", "aparNo": "IJ11000", "aparNoSet": [ "CVE-2018-14665", "IJ11000" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ11000s0b.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:6.1.9.0-6.1.9.100" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "7200-00:IJ11546", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7100-04:IJ11544", "7200-03:IJ11550" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.23", "2.2.6.30", "2.2.6.31", "2.2.6.32" ], "apAbstract": "There is a vulnerability in Xorg that affects VIOS.", "aparNo": "IJ11000", "aparNoSet": [ "CVE-2018-14665", "IJ11000" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ11000s0b.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:6.1.9.0-6.1.9.100" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "7200-00:IJ11546", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7100-04:IJ11544", "7200-03:IJ11550" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02", "7200-00-03", "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "Possible errors in certain network adapters", "aparNo": "IJ11207", "aparNoSet": [ "IJ11207" ], "fixedIn": "See advisory", "ifixes": [ "IJ11207m6a.181109.AIX72TL00SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ11207", "filesets": [ "devices.ethernet.lnc.rte:7.2.0.0-7.2.0.6", "devices.ethernet.lnc2.rte:7.2.0.0-7.2.0.6" ], "issued": "20181110", "updated": "null", "siblings": [ "7100-04:IJ10369", "7100-05:IJ10295", "7200-01:IJ10370", "7200-02:IJ10371", "7200-03:IJ10293" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij11207/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-06" ], "apAbstract": "Possible undetected data loss with Power9 NVMe", "aparNo": "IJ11253", "aparNoSet": [ "IJ11253" ], "fixedIn": "See Advisory", "ifixes": [ "IJ11253s6a.181113.AIX72TL00SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ11253", "filesets": [ "devices.chrp.vdevice.rte:7.2.0.0", "devices.chrp.pci.rte:7.2.0.0" ], "issued": "20181117", "updated": "null", "siblings": [ "6100-09:IJ09710", "7100-04:IJ10350", "7100-05:IJ09705", "7200-01:IJ09894", "7200-02:IJ10127", "7200-03:IJ09686" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij11253/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-04", "7100-04-05", "7100-04-06" ], "apAbstract": "There is a vulnerability in Xorg that affects AIX.", "aparNo": "IJ11544", "aparNoSet": [ "CVE-2018-14665", "IJ11544" ], "fixedIn": "7100-04-08", "ifixes": [ "IJ11544s0a.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:7.1.4.0-7.1.4.30" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "7200-00:IJ11546", "6100-09:IJ11000", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7200-03:IJ11550" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-04", "7100-04-05", "7100-04-06", "7100-04-07" ], "apAbstract": "There is a vulnerability in Xorg that affects AIX.", "aparNo": "IJ11544", "aparNoSet": [ "CVE-2018-14665", "IJ11544" ], "fixedIn": "7100-04-08", "ifixes": [ "IJ11544s0a.181127.epkg.Z", "IJ11544s0a.190312.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:7.1.4.0-7.1.4.30" ], "issued": "20181211", "updated": "20190409", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "7200-00:IJ11546", "6100-09:IJ11000", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7200-03:IJ11550" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-01", "7100-05-02", "7100-05-03" ], "apAbstract": "There is a vulnerability in Xorg that affects AIX.", "aparNo": "IJ11545", "aparNoSet": [ "CVE-2018-14665", "IJ11545" ], "fixedIn": "7100-05-04", "ifixes": [ "IJ11545s0a.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:7.1.5.0-7.1.5.31" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "7200-00:IJ11546", "6100-09:IJ11000", "3100-00:IJ11550", "5300-12:IJ11551", "7100-04:IJ11544", "7200-03:IJ11550" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-01", "7200-00-02", "7200-00-03", "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "There is a vulnerability in Xorg that affects AIX.", "aparNo": "IJ11546", "aparNoSet": [ "CVE-2018-14665", "IJ11546" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ11546s0a.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:7.2.0.0-7.2.0.1" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "6100-09:IJ11000", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7100-04:IJ11544", "7200-03:IJ11550" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "There is a vulnerability in Xorg that affects AIX.", "aparNo": "IJ11547", "aparNoSet": [ "CVE-2018-14665", "IJ11547" ], "fixedIn": "7200-01-06", "ifixes": [ "IJ11547s0a.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:7.2.1.0-7.2.1.0" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-00:IJ11546", "6100-09:IJ11000", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7100-04:IJ11544", "7200-03:IJ11550" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-01", "7200-02-02", "7200-02-03" ], "apAbstract": "There is a vulnerability in Xorg that affects AIX.", "aparNo": "IJ11549", "aparNoSet": [ "CVE-2018-14665", "IJ11549" ], "fixedIn": "7200-02-04", "ifixes": [ "IJ11549s0a.181127.epkg.Z", "IJ11549s0a.190312.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:7.2.2.0-7.2.2.0" ], "issued": "20181211", "updated": "20190409", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-01:IJ11547", "7200-00:IJ11546", "6100-09:IJ11000", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7100-04:IJ11544", "7200-03:IJ11550" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-01", "7200-03-02" ], "apAbstract": "There is a vulnerability in Xorg that affects AIX.", "aparNo": "IJ11550", "aparNoSet": [ "CVE-2018-14665", "IJ11550" ], "fixedIn": "7200-03-03", "ifixes": [ "IJ11550s0a.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:7.2.3.0-7.2.3.15" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "7200-00:IJ11546", "6100-09:IJ11000", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7100-04:IJ11544" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.0", "3.1.0.10" ], "apAbstract": "There is a vulnerability in Xorg that affects VIOS.", "aparNo": "IJ11550", "aparNoSet": [ "CVE-2018-14665", "IJ11550" ], "fixedIn": "7200-03-03", "ifixes": [ "IJ11550s0a.181127.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:7.2.3.0-7.2.3.15" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "7200-00:IJ11546", "6100-09:IJ11000", "3100-00:IJ11550", "5300-12:IJ11551", "7100-05:IJ11545", "7100-04:IJ11544" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "There is a vulnerability in Xorg that affects AIX.", "aparNo": "IJ11551", "aparNoSet": [ "CVE-2018-14665", "IJ11551" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ11551s0a.181127.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc", "filesets": [ "X11.base.rte:5.3.12.0-5.3.12.2" ], "issued": "20181211", "updated": "null", "siblings": [ "2.2.6:IJ11000", "2.2.5:IJ11000", "2.2.4:IJ11000", "7200-02:IJ11549", "7200-01:IJ11547", "7200-00:IJ11546", "6100-09:IJ11000", "3100-00:IJ11550", "7100-05:IJ11545", "7100-04:IJ11544", "7200-03:IJ11550" ], "downloadUrl": "null", "cvss": [ "CVE-2018-14665:8.8" ], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.50" ], "apAbstract": "TCP session hang/timeout or possible undetected data corruption", "aparNo": "IJ12143", "aparNoSet": [ "IJ12143" ], "fixedIn": "2.2.5.51", "ifixes": [ "IJ12143sCd.190221.VIOS2.2.5.50.epkg.Z", "IJ12143sCd.190221.VIOS2.2.6.30-32.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ12143", "filesets": [ "devices.common.IBM.ethernet.rte:6.1.9.400" ], "issued": "20190119", "updated": "20190228", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij12143/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.30", "2.2.6.31", "2.2.6.32" ], "apAbstract": "TCP session hang/timeout or possible undetected data corruption", "aparNo": "IJ12143", "aparNoSet": [ "IJ12143" ], "fixedIn": "2.2.6.33", "ifixes": [ "IJ12143sCd.190221.VIOS2.2.5.50.epkg.Z", "IJ12143sCd.190221.VIOS2.2.6.30-32.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ12143", "filesets": [ "devices.common.IBM.ethernet.rte:6.1.9.400" ], "issued": "20190119", "updated": "20190228", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij12143/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.0.0", "3.1.0.10", "3.1.0.11" ], "apAbstract": "TCP session hang/timeout or possible undetected data corruption", "aparNo": "IJ12809", "aparNoSet": [ "IJ12809" ], "fixedIn": "3.1.0.12", "ifixes": [ "IJ12809s2b.190225.VIOS3.1.0.0-11.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ12809", "filesets": [ "devices.common.IBM.ethernet.rte:7.2.3.15" ], "issued": "20190119", "updated": "20190228", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij12809/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-12" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ12978", "aparNoSet": [ "CVE-2018-19519", "IJ12978", "IJ20781" ], "fixedIn": "See Bulletin", "ifixes": [], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc", "filesets": [ "bos.net.tcp.server:6.1.9.300-6.1.9.400" ], "issued": "20190225", "updated": "20190409", "siblings": [ "2.2.6:IJ12978", "2.2.5:IJ12978", "3.1.0:IJ12983", "7200-02:IJ12982", "7200-01:IJ12981", "7100-05:IJ12980", "7100-04:IJ12979", "7200-03:IJ12983" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar", "cvss": [ "CVE-2018-19519:7.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.40", "2.2.5.50" ], "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.", "aparNo": "IJ12978", "aparNoSet": [ "CVE-2018-19519", "IJ12978", "IJ20781" ], "fixedIn": "2.2.5.60", "ifixes": [ "IJ12978s9a.190215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.400" ], "issued": "20190225", "updated": "null", "siblings": [ "2.2.6:IJ12978", "3.1.0:IJ12983", "7200-02:IJ12982", "7200-01:IJ12981", "7100-05:IJ12980", "7100-04:IJ12979", "7200-03:IJ12983" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar", "cvss": [ "CVE-2018-19519:7.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.21", "2.2.6.23", "2.2.6.32" ], "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.", "aparNo": "IJ12978", "aparNoSet": [ "CVE-2018-19519", "IJ12978", "IJ20781" ], "fixedIn": "2.2.6.40", "ifixes": [ "IJ12978sBa.190215.epkg.Z", "IJ12978sCa.190215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.400" ], "issued": "20190225", "updated": "null", "siblings": [ "2.2.5:IJ12978", "3.1.0:IJ12983", "7200-02:IJ12982", "7200-01:IJ12981", "7100-05:IJ12980", "7100-04:IJ12979", "7200-03:IJ12983" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar", "cvss": [ "CVE-2018-19519:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-05", "7100-04-06", "7100-04-07" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ12979", "aparNoSet": [ "CVE-2018-19519", "IJ12979" ], "fixedIn": "7100-04-08-1914", "ifixes": [ "IJ12979m5a.190304.epkg.Z", "IJ12979m6a.190304.epkg.Z", "IJ12979m7a.190205.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc", "filesets": [ "bos.net.tcp.server:7.1.4.32-7.1.4.34" ], "issued": "20190225", "updated": "20190409", "siblings": [ "2.2.6:IJ12978", "2.2.5:IJ12978", "3.1.0:IJ12983", "7200-02:IJ12982", "7200-01:IJ12981", "7100-05:IJ12980", "7200-03:IJ12983" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar", "cvss": [ "CVE-2018-19519:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-03", "7200-01-04", "7200-01-05" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ12981", "aparNoSet": [ "CVE-2018-19519", "IJ12981" ], "fixedIn": "7200-01-06-1914", "ifixes": [ "IJ12981m3a.190214.epkg.Z", "IJ12981m4a.190215.epkg.Z", "IJ12981m5a.190225.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.1.1-7.2.1.3" ], "issued": "20190225", "updated": "20190409", "siblings": [ "2.2.6:IJ12978", "2.2.5:IJ12978", "3.1.0:IJ12983", "7200-02:IJ12982", "7100-05:IJ12980", "7100-04:IJ12979", "7200-03:IJ12983" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar", "cvss": [ "CVE-2018-19519:7.3" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-03" ], "apAbstract": "Opening Mellanox Infiniband adapters will fail", "aparNo": "IJ13283", "aparNoSet": [ "IJ13283" ], "fixedIn": "7100-05-04-1914", "ifixes": [ "IJ13283s3a.190225.AIX71TL05SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13283", "filesets": [ "bos.mp64:7.1.5.30", "devices.pciex.b3154a63.rte:7.1.5.30" ], "issued": "20190309", "updated": "null", "siblings": [ "6100-09:IJ13293", "7100-04:IJ13688", "7200-01:IJ13856", "7200-02:IJ13458", "7200-03:IJ13334" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13283/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-12-1837", "6100-09-12-1846" ], "apAbstract": "Opening Mellanox Infiniband adapters will fail", "aparNo": "IJ13283", "aparNoSet": [ "IJ13283" ], "fixedIn": "6100-09-12-1913", "ifixes": [ "IJ13293sCa.190306.AIX61TL09SP12.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13293", "filesets": [ "bos.mp64:6.1.9.400-6.1.9.402", "devices.pciex.b3154a63.rte:6.1.9.400" ], "issued": "20190309", "updated": "null", "siblings": [ "7100-04:IJ13688", "7100-05:IJ13283", "7200-01:IJ13856", "7200-02:IJ13458", "7200-03:IJ13334" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13293/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.50" ], "apAbstract": "Opening Mellanox Infiniband adapters will fail", "aparNo": "IJ13293", "aparNoSet": [ "IJ13293" ], "fixedIn": "2.2.5.60", "ifixes": [ "IJ13293sCa.190306.VIOS2.2.5.50.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13293", "filesets": [ "bos.mp64:6.1.9.400", "devices.pciex.b3154a63.rte:6.1.9.400" ], "issued": "20190309", "updated": "null", "siblings": [ "6100-09:IJ13293", "7100-04:IJ13688", "7100-05:IJ13283", "7200-01:IJ13856", "7200-02:IJ13458", "7200-03:IJ13334" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13293/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.30", "2.2.6.31", "2.2.6.32" ], "apAbstract": "Opening Mellanox Infiniband adapters will fail", "aparNo": "IJ13293", "aparNoSet": [ "IJ13293" ], "fixedIn": "2.2.6.40", "ifixes": [ "IJ13293sCa.190306.VIOS2.2.6.30-32.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13293", "filesets": [ "bos.mp64:6.1.9.400", "devices.pciex.b3154a63.rte:6.1.9.400" ], "issued": "20190309", "updated": "null", "siblings": [ "6100-09:IJ13293", "7100-04:IJ13688", "7100-05:IJ13283", "7200-01:IJ13856", "7200-02:IJ13458", "7200-03:IJ13334" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13293/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.0.0", "3.1.0.10", "3.1.0.11" ], "apAbstract": "Opening Mellanox Infiniband adapters will fail", "aparNo": "IJ13334", "aparNoSet": [ "IJ13334" ], "fixedIn": "3.1.0.20", "ifixes": [ "IJ13334s2a.190306.VIOS3.1.0.0-11.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13334", "filesets": [ "bos.mp64:7.2.3.0-7.2.3.16", "devices.pciex.b3154a63.rte:7.2.3.0" ], "issued": "20190309", "updated": "null", "siblings": [ "6100-09:IJ13293", "7100-04:IJ13688", "7100-05:IJ13283", "7200-01:IJ13856", "7200-02:IJ13458", "7200-03:IJ13334" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13334/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "Opening Mellanox Infiniband adapters will fail", "aparNo": "IJ13334", "aparNoSet": [ "IJ13334" ], "fixedIn": "7200-03-03-1913", "ifixes": [ "IJ13334s2a.190306.AIX72TL03SP00-02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13334", "filesets": [ "bos.mp64:7.2.3.0-7.2.3.16", "devices.pciex.b3154a63.rte:7.2.3.0" ], "issued": "20190309", "updated": "null", "siblings": [ "6100-09:IJ13293", "7100-04:IJ13688", "7100-05:IJ13283", "7200-01:IJ13856", "7200-02:IJ13458" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13334/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-03" ], "apAbstract": "Opening Mellanox Infiniband adapters will fail", "aparNo": "IJ13458", "aparNoSet": [ "IJ13458" ], "fixedIn": "7200-01-04-1914", "ifixes": [ "IJ13458s3a.190225.AIX72TL02SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13458", "filesets": [ "bos.mp64:7.2.2.19", "devices.pciex.b3154a63.rte:7.2.2.15" ], "issued": "20190309", "updated": "null", "siblings": [ "6100-09:IJ13293", "7100-04:IJ13688", "7100-05:IJ13283", "7200-01:IJ13856", "7200-03:IJ13334" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13458/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-07" ], "apAbstract": "Opening Mellanox Infiniband adapters will fail", "aparNo": "IJ13688", "aparNoSet": [ "IJ13688" ], "fixedIn": "7100-04-08-1914", "ifixes": [ "IJ13688s7a.190225.AIX71TL04SP07.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13688", "filesets": [ "bos.mp64:7.1.4.35", "devices.pciex.b3154a63.rte:7.1.4.31" ], "issued": "20190309", "updated": "null", "siblings": [ "6100-09:IJ13293", "7100-05:IJ13283", "7200-01:IJ13856", "7200-02:IJ13458", "7200-03:IJ13334" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13688/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-05" ], "apAbstract": "Opening Mellanox Infiniband adapters will fail", "aparNo": "IJ13856", "aparNoSet": [ "IJ13856" ], "fixedIn": "7200-01-06-1914", "ifixes": [ "IJ13856s5a.190225.AIX72TL01SP05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13856", "filesets": [ "bos.mp64:7.2.1.6", "devices.pciex.b3154a63.rte:7.2.1.1" ], "issued": "20190309", "updated": "null", "siblings": [ "6100-09:IJ13293", "7100-04:IJ13688", "7100-05:IJ13283", "7200-02:IJ13458", "7200-03:IJ13334" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13856/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02", "7200-00-03", "7200-00-04", "7200-00-05", "7200-00-06" ], "apAbstract": "Affected PowerHA SystemMirror Levels and Recommended Fixes", "aparNo": "IJ15739", "aparNoSet": [ "IJ15739" ], "fixedIn": "7200-00-07", "ifixes": [ "IJ15885m2a.190604.PowerHA7.2.0SP02.epkg.Z", "IJ15885m5a.190604.PowerHA7.2.0SP05.epkg.Z", "IJ15885s6b.190604.PowerHA7.2.0SP06.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ15739", "filesets": [ "cluster.es.server.rte:7.2.0.0-7.2.0.6", "cluster.es.client.lib:7.2.0.0-7.2.0.6" ], "issued": "20190430", "updated": "20190612", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij15885/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02", "7200-01-03", "7200-01-04" ], "apAbstract": "Affected PowerHA SystemMirror Levels and Recommended Fixes", "aparNo": "IJ15739", "aparNoSet": [ "IJ15739" ], "fixedIn": "7200-01-05", "ifixes": [ "IJ09170m0c.190603.PowerHA7.2.1SP00.epkg.Z", "IJ09170m1c.190603.PowerHA7.2.1SP01.epkg.Z", "IJ09170m2c.190603.PowerHA7.2.1SP02.epkg.Z", "IJ09170m3c.190603.PowerHA7.2.1SP03.epkg.Z", "IJ09170s4b.190603.PowerHA7.2.1SP04.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ15739", "filesets": [ "cluster.es.server.rte:7.2.1.0-7.2.1.4", "cluster.es.client.lib:7.2.1.0-7.2.1.4" ], "issued": "20190430", "updated": "20190612", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09170/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00", "7200-02-01", "7200-02-02" ], "apAbstract": "Affected PowerHA SystemMirror Levels and Recommended Fixes", "aparNo": "IJ15739", "aparNoSet": [ "IJ15739" ], "fixedIn": "7200-02-03", "ifixes": [ "IJ10601m0c.190603.PowerHA7.2.2SP00.epkg.Z", "IJ10601m1c.190603.PowerHA7.2.2SP01.epkg.Z", "IJ10601s2c.190603.PowerHA7.2.2SP02.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ15739", "filesets": [ "cluster.es.server.rte:7.2.2.0-7.2.2.2", "cluster.es.client.lib:7.2.2.0-7.2.2.2" ], "issued": "20190430", "updated": "20190612", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10601/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-03-00" ], "apAbstract": "Affected PowerHA SystemMirror Levels and Recommended Fixes", "aparNo": "IJ15739", "aparNoSet": [ "IJ15739" ], "fixedIn": "7200-03-01", "ifixes": [ "IJ15739m0a.190603.PowerHA7.2.3SP00.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ15739", "filesets": [ "cluster.es.server.rte:7.2.3.0", "cluster.es.client.lib:7.2.3.0" ], "issued": "20190430", "updated": "20190612", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij15739/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.0.20", "3.1.0.21" ], "apAbstract": "NETSTAT PRINTS SOME MESSAGES INCORRECTLY", "aparNo": "IJ16586", "aparNoSet": [ "IJ16586" ], "fixedIn": "3.1.0.30", "ifixes": [ "IJ16586s3a.190607.VIOS3.1.0.21.epkg.Z", "IJ16586s3b.190614.VIOS3.1.0.20.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ16586", "filesets": [ "bos.net.tcp.client_core:7.2.3.16-7.2.3.17" ], "issued": "20190614", "updated": "null", "siblings": [ "7100-04:IJ16623", "7100-05:IJ16622", "7200-03:IJ16524" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij16586/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-03-03-1913", "7200-03-03-1914" ], "apAbstract": "netstat prints some messages incorrectly", "aparNo": "IJ16586", "aparNoSet": [ "IJ16586" ], "fixedIn": "7200-03-04-1938", "ifixes": [ "IJ16586s3a.190607.AIX72TL03SP03-1913.epkg.Z", "IJ16586s3a.190607.AIX72TL03SP03-1914.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ16586", "filesets": [ "bos.net.tcp.client_core:7.2.3.16-7.2.3.17" ], "issued": "20190614", "updated": "null", "siblings": [ "7100-04:IJ16623", "7100-05:IJ16622" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij16586/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-04-1913", "7100-05-04-1914" ], "apAbstract": "netstat prints some messages incorrectly", "aparNo": "IJ16622", "aparNoSet": [ "IJ16622" ], "fixedIn": "7100-05-05-1937", "ifixes": [ "IJ16622s4a.190614.AIX71TL05SP04-1913.epkg.Z", "IJ16622s4b.190614.AIX71TL05SP04-1914.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ16622", "filesets": [ "bos.net.tcp.client:7.1.5.32-7.1.5.33" ], "issued": "20190614", "updated": "null", "siblings": [ "7100-04:IJ16623", "7200-03:IJ16586" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij16622/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-08-1914" ], "apAbstract": "netstat prints some messages incorrectly", "aparNo": "IJ16623", "aparNoSet": [ "IJ16623" ], "fixedIn": "See Advisory", "ifixes": [], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ16623", "filesets": [ "bos.net.tcp.client:7.1.4.35" ], "issued": "20190614", "updated": "null", "siblings": [ "7100-05:IJ16622", "7200-03:IJ16586" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij16623/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.40", "2.2.6.41" ], "apAbstract": "NETSTAT PRINTS SOME MESSAGES INCORRECTLY", "aparNo": "IJ16624", "aparNoSet": [ "IJ16624" ], "fixedIn": "2.2.6.50", "ifixes": [ "IJ16624sDa.190613.VIOS2.2.6.40.epkg.Z", "IJ16624sDb.190613.VIOS2.2.6.41.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ16624", "filesets": [ "bos.net.tcp.client:6.1.9.402-6.1.9.403" ], "issued": "20190614", "updated": "null", "siblings": [ "7100-04:IJ16623", "7100-05:IJ16622", "7200-03:IJ16524" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij16624/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "NTPv4" ], "apAbstract": "There are vulnerabilities in NTPv4 that affect AIX.", "aparNo": "IJ17059", "aparNoSet": [ "CVE-2019-8936", "IJ17059" ], "fixedIn": "See Advisory", "ifixes": [ "IJ17059m9b.190719.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc", "filesets": [ "ntp.rte:7.4.2.8100-7.4.2.8121" ], "issued": "20190819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar", "cvss": [ "CVE-2019-8936:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-12" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IJ17060", "aparNoSet": [ "CVE-2019-8936", "IJ17060" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ17060m9a.190628.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.403" ], "issued": "20190819", "updated": "null", "siblings": [], "downloadUrl": "Out of Support", "cvss": [ "CVE-2019-8936:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.20", "2.2.6.21", "2.2.6.23", "2.2.6.30", "2.2.6.31", "2.2.6.32", "2.2.6.40", "2.2.6.41" ], "apAbstract": "Vulnerabilities in NTP affect VIOS", "aparNo": "IJ17060", "aparNoSet": [ "CVE-2019-8936", "IJ17060" ], "fixedIn": "2.2.6.50", "ifixes": [ "IJ17060m9a.190628.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.403" ], "issued": "20190819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar", "cvss": [ "CVE-2019-8936:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.5.40", "2.2.5.50", "2.2.5.60" ], "apAbstract": "Vulnerabilities in NTP affect VIOS", "aparNo": "IJ17060", "aparNoSet": [ "CVE-2019-8936", "IJ17060" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ17060m9a.190628.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.403" ], "issued": "20190819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar", "cvss": [ "CVE-2019-8936:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.0", "3.1.0.10", "3.1.0.20", "3.1.0.21" ], "apAbstract": "Vulnerabilities in NTP affect VIOS", "aparNo": "IJ17065", "aparNoSet": [ "CVE-2019-8936", "IJ17065" ], "fixedIn": "3.1.0.30", "ifixes": [ "IJ17065m3a.190701.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc", "filesets": [ "bos.net.tcp.ntp:7.2.3.0-7.2.3.15", "bos.net.tcp.ntpd:7.2.3.0-7.2.3.15" ], "issued": "20190819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar", "cvss": [ "CVE-2019-8936:5.3" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-03-03" ], "apAbstract": "Live Update fails when applying 7200-03-03 or IJ09625", "aparNo": "IJ17505", "aparNoSet": [ "IJ17505" ], "fixedIn": "7200-03-04-1938", "ifixes": [ "IJ17505s3a.190911.AIX72TL03SP03.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ17505", "filesets": [ "bos.net.tcp.client_core:7.2.3.16-7.2.3.17" ], "issued": "20190913", "updated": "20190917", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij17505/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-12" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ20781", "aparNoSet": [ "CVE-2017-16808", "CVE-2018-10103", "CVE-2018-10105", "CVE-2018-14461", "CVE-2018-14462", "CVE-2018-14463", "CVE-2018-14464", "CVE-2018-14465", "CVE-2018-14466", "CVE-2018-14467", "CVE-2018-14468", "CVE-2018-14469", "CVE-2018-14470", "CVE-2018-14879", "CVE-2018-14880", "CVE-2018-14881", "CVE-2018-14882", "CVE-2018-16227", "CVE-2018-16228", "CVE-2018-16229", "CVE-2018-16230", "CVE-2018-16300", "CVE-2018-16451", "CVE-2018-16452", "CVE-2019-15166", "CVE-2019-15167", "IJ20781" ], "fixedIn": "Out of Support", "ifixes": [ "IJ20781sCc.191121.epkg.Z", "IJ20781sCd.191121.epkg.Z", "IJ20781sDa.191121.epkg.Z", "IJ20781sDb.191121.epkg.Z", "IJ20781sEa.191121.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.401" ], "issued": "20200108", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar", "cvss": [ "CVE-2018-14467:6.5", "CVE-2018-14463:6.5", "CVE-2018-14464:6.5", "CVE-2018-14470:6.5", "CVE-2018-10105:8.8", "CVE-2018-14461:6.5", "CVE-2018-10103:8.8", "CVE-2019-15167:6.5", "CVE-2018-14466:6.5", "CVE-2018-14469:6.5", "CVE-2018-14468:6.5", "CVE-2018-14881:6.5", "CVE-2018-14462:6.5", "CVE-2018-14880:6.5", "CVE-2018-14465:6.5", "CVE-2018-16451:5.5", "CVE-2018-16452:5.5", "CVE-2018-16230:5.5", "CVE-2019-15166:5.5", "CVE-2018-14879:6.1", "CVE-2018-16228:5.5", "CVE-2018-16229:5.5", "CVE-2018-16227:5.5", "CVE-2018-16300:5.5", "CVE-2018-14882:5.5", "CVE-2017-16808:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.31", "2.2.6.32", "2.2.6.40", "2.2.6.41", "2.2.6.50" ], "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.", "aparNo": "IJ20781", "aparNoSet": [ "CVE-2017-16808", "CVE-2018-10103", "CVE-2018-10105", "CVE-2018-14461", "CVE-2018-14462", "CVE-2018-14463", "CVE-2018-14464", "CVE-2018-14465", "CVE-2018-14466", "CVE-2018-14467", "CVE-2018-14468", "CVE-2018-14469", "CVE-2018-14470", "CVE-2018-14879", "CVE-2018-14880", "CVE-2018-14881", "CVE-2018-14882", "CVE-2018-16227", "CVE-2018-16228", "CVE-2018-16229", "CVE-2018-16230", "CVE-2018-16300", "CVE-2018-16451", "CVE-2018-16452", "CVE-2019-15166", "CVE-2019-15167", "IJ20781" ], "fixedIn": "2.2.6.60", "ifixes": [ "IJ20781sCc.191121.epkg.Z", "IJ20781sCd.191121.epkg.Z", "IJ20781sDa.191121.epkg.Z", "IJ20781sDb.191121.epkg.Z", "IJ20781sEa.191121.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.401" ], "issued": "20200108", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar", "cvss": [ "CVE-2018-14467:6.5", "CVE-2018-14463:6.5", "CVE-2018-14464:6.5", "CVE-2018-14470:6.5", "CVE-2018-10105:8.8", "CVE-2018-14461:6.5", "CVE-2018-10103:8.8", "CVE-2019-15167:6.5", "CVE-2018-14466:6.5", "CVE-2018-14469:6.5", "CVE-2018-14468:6.5", "CVE-2018-14881:6.5", "CVE-2018-14462:6.5", "CVE-2018-14880:6.5", "CVE-2018-14465:6.5", "CVE-2018-16451:5.5", "CVE-2018-16452:5.5", "CVE-2018-16230:5.5", "CVE-2019-15166:5.5", "CVE-2018-14879:6.1", "CVE-2018-16228:5.5", "CVE-2018-16229:5.5", "CVE-2018-16227:5.5", "CVE-2018-16300:5.5", "CVE-2018-14882:5.5", "CVE-2017-16808:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-01", "7100-05-02", "7100-05-03" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ20783", "aparNoSet": [ "CVE-2018-19519", "IJ12980", "IJ20783" ], "fixedIn": "7100-05-04-1913", "ifixes": [ "IJ12980m1a.190207.epkg.Z", "IJ12980m1a.190207.epkg.Z", "IJ12980m3a.190212.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc", "filesets": [ "bos.net.tcp.server:7.1.5.0-7.1.5.31" ], "issued": "20190225", "updated": "null", "siblings": [ "2.2.6:IJ12978", "2.2.5:IJ12978", "3.1.0:IJ12983", "7200-02:IJ12982", "7200-01:IJ12981", "7100-04:IJ12979", "7200-03:IJ12983" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar", "cvss": [ "CVE-2018-19519:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-03", "7100-05-04", "7100-05-05" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ20783", "aparNoSet": [ "CVE-2017-16808", "CVE-2018-10103", "CVE-2018-10105", "CVE-2018-14461", "CVE-2018-14462", "CVE-2018-14463", "CVE-2018-14464", "CVE-2018-14465", "CVE-2018-14466", "CVE-2018-14467", "CVE-2018-14468", "CVE-2018-14469", "CVE-2018-14470", "CVE-2018-14879", "CVE-2018-14880", "CVE-2018-14881", "CVE-2018-14882", "CVE-2018-16227", "CVE-2018-16228", "CVE-2018-16229", "CVE-2018-16230", "CVE-2018-16300", "CVE-2018-16451", "CVE-2018-16452", "CVE-2019-15166", "CVE-2019-15167", "IJ20783" ], "fixedIn": "7100-05-06-2015", "ifixes": [ "IJ20783s4a.191118.epkg.Z", "IJ20783s5a.191115.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc", "filesets": [ "bos.net.tcp.server:7.1.5.0-7.1.5.32" ], "issued": "20200108", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar", "cvss": [ "CVE-2018-14467:6.5", "CVE-2018-14463:6.5", "CVE-2018-14464:6.5", "CVE-2018-14470:6.5", "CVE-2018-10105:8.8", "CVE-2018-14461:6.5", "CVE-2018-10103:8.8", "CVE-2019-15167:6.5", "CVE-2018-14466:6.5", "CVE-2018-14469:6.5", "CVE-2018-14468:6.5", "CVE-2018-14881:6.5", "CVE-2018-14462:6.5", "CVE-2018-14880:6.5", "CVE-2018-14465:6.5", "CVE-2018-16451:5.5", "CVE-2018-16452:5.5", "CVE-2018-16230:5.5", "CVE-2019-15166:5.5", "CVE-2018-14879:6.1", "CVE-2018-16228:5.5", "CVE-2018-16229:5.5", "CVE-2018-16227:5.5", "CVE-2018-16300:5.5", "CVE-2018-14882:5.5", "CVE-2017-16808:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-01", "7200-02-02", "7200-02-03" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ20784", "aparNoSet": [ "CVE-2018-19519", "IJ12982", "IJ20784" ], "fixedIn": "7200-02-04-1914", "ifixes": [ "IJ12982m1a.190215.epkg.Z", "IJ12982m2a.190215.epkg.Z", "IJ12982m3a.190215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.2.0-7.2.2.16" ], "issued": "20190225", "updated": "null", "siblings": [ "2.2.6:IJ12978", "2.2.5:IJ12978", "3100-00:IJ12983", "7200-01:IJ12981", "7100-05:IJ12980", "7100-04:IJ12979", "7200-03:IJ12983" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar", "cvss": [ "CVE-2018-19519:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-02", "7200-02-03", "7200-02-04" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ20784", "aparNoSet": [ "CVE-2017-16808", "CVE-2018-10103", "CVE-2018-10105", "CVE-2018-14461", "CVE-2018-14462", "CVE-2018-14463", "CVE-2018-14464", "CVE-2018-14465", "CVE-2018-14466", "CVE-2018-14467", "CVE-2018-14468", "CVE-2018-14469", "CVE-2018-14470", "CVE-2018-14879", "CVE-2018-14880", "CVE-2018-14881", "CVE-2018-14882", "CVE-2018-16227", "CVE-2018-16228", "CVE-2018-16229", "CVE-2018-16230", "CVE-2018-16300", "CVE-2018-16451", "CVE-2018-16452", "CVE-2019-15166", "CVE-2019-15167", "IJ20784" ], "fixedIn": "7200-02-06-2015", "ifixes": [ "IJ20784s2a.191118.epkg.Z", "IJ20784s3a.191118.epkg.Z", "IJ20784s4a.191115.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.2.0-7.2.2.17" ], "issued": "20200108", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar", "cvss": [ "CVE-2018-14467:6.5", "CVE-2018-14463:6.5", "CVE-2018-14464:6.5", "CVE-2018-14470:6.5", "CVE-2018-10105:8.8", "CVE-2018-14461:6.5", "CVE-2018-10103:8.8", "CVE-2019-15167:6.5", "CVE-2018-14466:6.5", "CVE-2018-14469:6.5", "CVE-2018-14468:6.5", "CVE-2018-14881:6.5", "CVE-2018-14462:6.5", "CVE-2018-14880:6.5", "CVE-2018-14465:6.5", "CVE-2018-16451:5.5", "CVE-2018-16452:5.5", "CVE-2018-16230:5.5", "CVE-2019-15166:5.5", "CVE-2018-14879:6.1", "CVE-2018-16228:5.5", "CVE-2018-16229:5.5", "CVE-2018-16227:5.5", "CVE-2018-16300:5.5", "CVE-2018-14882:5.5", "CVE-2017-16808:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-00", "7200-03-01", "7200-03-02" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ20785", "aparNoSet": [ "CVE-2018-19519", "IJ12983", "IJ20785" ], "fixedIn": "7200-03-03-1913", "ifixes": [ "IJ12983m0a.190215.epkg.Z", "IJ12983m1a.190215.epkg.Z", "IJ12983m2a.190215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.3.0-7.2.3.15" ], "issued": "20190225", "updated": "null", "siblings": [ "2.2.6:IJ12978", "2.2.5:IJ12978", "3.1.0:IJ12983", "7200-02:IJ12982", "7200-01:IJ12981", "7100-05:IJ12980", "7100-04:IJ12979" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar", "cvss": [ "CVE-2018-19519:7.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.10" ], "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.", "aparNo": "IJ20785", "aparNoSet": [ "CVE-2018-19519", "IJ12983", "IJ20785" ], "fixedIn": "3.1.0.20", "ifixes": [ "IJ12983m2a.190215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.3.0-7.2.3.15" ], "issued": "20190225", "updated": "null", "siblings": [ "2.2.6:IJ12978", "2.2.5:IJ12978", "7200-02:IJ12982", "7200-01:IJ12981", "7100-05:IJ12980", "7100-04:IJ12979", "7200-03:IJ12983" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar", "cvss": [ "CVE-2018-19519:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-01", "7200-03-02", "7200-03-03" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ20785", "aparNoSet": [ "CVE-2017-16808", "CVE-2018-10103", "CVE-2018-10105", "CVE-2018-14461", "CVE-2018-14462", "CVE-2018-14463", "CVE-2018-14464", "CVE-2018-14465", "CVE-2018-14466", "CVE-2018-14467", "CVE-2018-14468", "CVE-2018-14469", "CVE-2018-14470", "CVE-2018-14879", "CVE-2018-14880", "CVE-2018-14881", "CVE-2018-14882", "CVE-2018-16227", "CVE-2018-16228", "CVE-2018-16229", "CVE-2018-16230", "CVE-2018-16300", "CVE-2018-16451", "CVE-2018-16452", "CVE-2019-15166", "CVE-2019-15167", "IJ20785" ], "fixedIn": "7200-03-05-2016", "ifixes": [ "IJ20785s1a.191120.epkg.Z", "IJ20785s2a.191119.epkg.Z", "IJ20785s3a.191115.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.3.0-7.2.3.16" ], "issued": "20200108", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar", "cvss": [ "CVE-2018-14467:6.5", "CVE-2018-14463:6.5", "CVE-2018-14464:6.5", "CVE-2018-14470:6.5", "CVE-2018-10105:8.8", "CVE-2018-14461:6.5", "CVE-2018-10103:8.8", "CVE-2019-15167:6.5", "CVE-2018-14466:6.5", "CVE-2018-14469:6.5", "CVE-2018-14468:6.5", "CVE-2018-14881:6.5", "CVE-2018-14462:6.5", "CVE-2018-14880:6.5", "CVE-2018-14465:6.5", "CVE-2018-16451:5.5", "CVE-2018-16452:5.5", "CVE-2018-16230:5.5", "CVE-2019-15166:5.5", "CVE-2018-14879:6.1", "CVE-2018-16228:5.5", "CVE-2018-16229:5.5", "CVE-2018-16227:5.5", "CVE-2018-16300:5.5", "CVE-2018-14882:5.5", "CVE-2017-16808:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.0", "3.1.0.10", "3.1.0.20" ], "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.", "aparNo": "IJ20785", "aparNoSet": [ "CVE-2017-16808", "CVE-2018-10103", "CVE-2018-10105", "CVE-2018-14461", "CVE-2018-14462", "CVE-2018-14463", "CVE-2018-14464", "CVE-2018-14465", "CVE-2018-14466", "CVE-2018-14467", "CVE-2018-14468", "CVE-2018-14469", "CVE-2018-14470", "CVE-2018-14879", "CVE-2018-14880", "CVE-2018-14881", "CVE-2018-14882", "CVE-2018-16227", "CVE-2018-16228", "CVE-2018-16229", "CVE-2018-16230", "CVE-2018-16300", "CVE-2018-16451", "CVE-2018-16452", "CVE-2019-15166", "CVE-2019-15167", "IJ20785" ], "fixedIn": "3.1.0.40", "ifixes": [ "IJ20785s2a.191119.epkg.Z", "IJ20785s2a.191119.epkg.Z", "IJ20785s3a.191115.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.3.0-7.2.3.16" ], "issued": "20200108", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar", "cvss": [ "CVE-2018-14467:6.5", "CVE-2018-14463:6.5", "CVE-2018-14464:6.5", "CVE-2018-14470:6.5", "CVE-2018-10105:8.8", "CVE-2018-14461:6.5", "CVE-2018-10103:8.8", "CVE-2019-15167:6.5", "CVE-2018-14466:6.5", "CVE-2018-14469:6.5", "CVE-2018-14468:6.5", "CVE-2018-14881:6.5", "CVE-2018-14462:6.5", "CVE-2018-14880:6.5", "CVE-2018-14465:6.5", "CVE-2018-16451:5.5", "CVE-2018-16452:5.5", "CVE-2018-16230:5.5", "CVE-2019-15166:5.5", "CVE-2018-14879:6.1", "CVE-2018-16228:5.5", "CVE-2018-16229:5.5", "CVE-2018-16227:5.5", "CVE-2018-16300:5.5", "CVE-2018-14882:5.5", "CVE-2017-16808:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-00", "7200-04-01" ], "apAbstract": "There is a vulnerability in tcpdump that affects AIX.", "aparNo": "IJ20786", "aparNoSet": [ "CVE-2017-16808", "CVE-2018-10103", "CVE-2018-10105", "CVE-2018-14461", "CVE-2018-14462", "CVE-2018-14463", "CVE-2018-14464", "CVE-2018-14465", "CVE-2018-14466", "CVE-2018-14467", "CVE-2018-14468", "CVE-2018-14469", "CVE-2018-14470", "CVE-2018-14879", "CVE-2018-14880", "CVE-2018-14881", "CVE-2018-14882", "CVE-2018-16227", "CVE-2018-16228", "CVE-2018-16229", "CVE-2018-16230", "CVE-2018-16300", "CVE-2018-16451", "CVE-2018-16452", "CVE-2019-15166", "CVE-2019-15167", "IJ20786" ], "fixedIn": "7200-04-02-2015", "ifixes": [ "IJ20786s1a.191120.epkg.Z", "IJ20786s1a.191120.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.4.0" ], "issued": "20200108", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar", "cvss": [ "CVE-2018-14467:6.5", "CVE-2018-14463:6.5", "CVE-2018-14464:6.5", "CVE-2018-14470:6.5", "CVE-2018-10105:8.8", "CVE-2018-14461:6.5", "CVE-2018-10103:8.8", "CVE-2019-15167:6.5", "CVE-2018-14466:6.5", "CVE-2018-14469:6.5", "CVE-2018-14468:6.5", "CVE-2018-14881:6.5", "CVE-2018-14462:6.5", "CVE-2018-14880:6.5", "CVE-2018-14465:6.5", "CVE-2018-16451:5.5", "CVE-2018-16452:5.5", "CVE-2018-16230:5.5", "CVE-2019-15166:5.5", "CVE-2018-14879:6.1", "CVE-2018-16228:5.5", "CVE-2018-16229:5.5", "CVE-2018-16227:5.5", "CVE-2018-16300:5.5", "CVE-2018-14882:5.5", "CVE-2017-16808:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.0", "3.1.1.10" ], "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.", "aparNo": "IJ20786", "aparNoSet": [ "CVE-2017-16808", "CVE-2018-10103", "CVE-2018-10105", "CVE-2018-14461", "CVE-2018-14462", "CVE-2018-14463", "CVE-2018-14464", "CVE-2018-14465", "CVE-2018-14466", "CVE-2018-14467", "CVE-2018-14468", "CVE-2018-14469", "CVE-2018-14470", "CVE-2018-14879", "CVE-2018-14880", "CVE-2018-14881", "CVE-2018-14882", "CVE-2018-16227", "CVE-2018-16228", "CVE-2018-16229", "CVE-2018-16230", "CVE-2018-16300", "CVE-2018-16451", "CVE-2018-16452", "CVE-2019-15166", "CVE-2019-15167", "IJ20786" ], "fixedIn": "3.1.1.20", "ifixes": [ "IJ20786s1a.191120.epkg.Z", "IJ20786s1a.191120.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.4.0" ], "issued": "20200108", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar", "cvss": [ "CVE-2018-14467:6.5", "CVE-2018-14463:6.5", "CVE-2018-14464:6.5", "CVE-2018-14470:6.5", "CVE-2018-10105:8.8", "CVE-2018-14461:6.5", "CVE-2018-10103:8.8", "CVE-2019-15167:6.5", "CVE-2018-14466:6.5", "CVE-2018-14469:6.5", "CVE-2018-14468:6.5", "CVE-2018-14881:6.5", "CVE-2018-14462:6.5", "CVE-2018-14880:6.5", "CVE-2018-14465:6.5", "CVE-2018-16451:5.5", "CVE-2018-16452:5.5", "CVE-2018-16230:5.5", "CVE-2019-15166:5.5", "CVE-2018-14879:6.1", "CVE-2018-16228:5.5", "CVE-2018-16229:5.5", "CVE-2018-16227:5.5", "CVE-2018-16300:5.5", "CVE-2018-14882:5.5", "CVE-2017-16808:7.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-01-1939" ], "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters", "aparNo": "IJ21527", "aparNoSet": [ "IJ21527" ], "fixedIn": "7200-04-02", "ifixes": [ "IJ21527s1a.191216.AIX72TL04SP00.epkg.Z", "IJ21527s1a.191216.AIX72TL04SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21527", "filesets": [ "devices.pci.df1000f7.com:7.2.4.0" ], "issued": "20191218", "updated": "null", "siblings": [ "7100-04:IJ21581", "7100-05:IJ21577", "7200-02:IJ21578" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21527/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.1.0", "3.1.1.10" ], "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters", "aparNo": "IJ21527", "aparNoSet": [ "IJ21527" ], "fixedIn": "3.1.1.20", "ifixes": [ "IJ21527s1a.191216.VIOS3.1.1.0.epkg.Z", "IJ21527s1a.191216.VIOS3.1.1.10.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21527", "filesets": [ "devices.pci.df1000f7.com:7.2.4.0" ], "issued": "20191218", "updated": "null", "siblings": [ "7100-04:IJ21581", "7100-05:IJ21577", "7200-02:IJ21578", "7200-03:IJ21580", "7200-04:IJ21527" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21527/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.1.10" ], "apAbstract": "VIOS 3.1.1 SSP may not recover from network loss", "aparNo": "IJ21564", "aparNoSet": [ "IJ21564" ], "fixedIn": "3.1.1.20", "ifixes": [ "IJ21564s1a.191211.VIOS3.1.1.10.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21564", "filesets": [ "pool.basic.rte:7.2.4.1" ], "issued": "20191214", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21564/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.0", "2.2.6.10", "2.2.6.20", "2.2.6.30", "2.2.6.40", "2.2.6.50", "2.2.6.51" ], "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters", "aparNo": "IJ21576", "aparNoSet": [ "IJ21576" ], "fixedIn": "2.2.6.60", "ifixes": [ "IJ21576sea.191216.VIOS2.2.6.51.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21576", "filesets": [ "devices.pci.df1000f7.com:6.1.9.300-6.1.9.401" ], "issued": "20191218", "updated": "null", "siblings": [ "7100-04:IJ21581", "7100-05:IJ21577", "7200-02:IJ21578", "7200-03:IJ21580", "7200-04:IJ21527" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21576/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-00-1731", "7100-05-01", "7100-05-02", "7100-05-03", "7100-05-04", "7100-05-05", "7100-05-05-1939" ], "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters", "aparNo": "IJ21577", "aparNoSet": [ "IJ21577" ], "fixedIn": "7100-05-06", "ifixes": [ "IJ21577s5a.191216.AIX71TL05SP05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21577", "filesets": [ "devices.pci.df1000f7.com:7.1.5.0-7.1.5.32" ], "issued": "20191218", "updated": "null", "siblings": [ "7100-04:IJ21581", "7200-02:IJ21578", "7200-03:IJ21580", "7200-04:IJ21527" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21577/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-02-00-1731", "7200-02-01", "7200-02-02", "7200-02-03", "7200-02-04", "7200-02-05", "7200-02-05-1938" ], "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters", "aparNo": "IJ21578", "aparNoSet": [ "IJ21578" ], "fixedIn": "7200-02-06", "ifixes": [ "IJ21578s4a.191216.AIX72TL02SP03.epkg.Z", "IJ21578s4a.191216.AIX72TL02SP04.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21578", "filesets": [ "devices.pci.df1000f7.com:7.2.2.0-7.2.2.17" ], "issued": "20191218", "updated": "null", "siblings": [ "7100-04:IJ21581", "7100-05:IJ21577", "7200-03:IJ21580", "7200-04:IJ21527" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21578/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.0.0", "3.1.0.10", "3.1.0.20", "3.1.0.30" ], "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters", "aparNo": "IJ21580", "aparNoSet": [ "IJ21580" ], "fixedIn": "3.1.0.40", "ifixes": [ "IJ21580s3a.191216.VIOS3.1.0.21.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21580", "filesets": [ "devices.pci.df1000f7.com:7.2.3.15-7.2.3.16" ], "issued": "20191218", "updated": "null", "siblings": [ "7100-04:IJ21581", "7100-05:IJ21577", "7200-02:IJ21578", "7200-03:IJ21580", "7200-04:IJ21527" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21580/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-03-00", "7200-03-01", "7200-03-02", "7200-03-03", "7200-03-04", "7200-03-04-1938" ], "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters", "aparNo": "IJ21580", "aparNoSet": [ "IJ21580" ], "fixedIn": "7200-03-05", "ifixes": [ "IJ21580s3a.191216.AIX72TL03SP02.epkg.Z", "IJ21580s3a.191216.AIX7wloW7JyDy0FcCNvo2TL03SP03.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21580", "filesets": [ "devices.pci.df1000f7.com:7.2.3.0-7.2.3.16" ], "issued": "20191218", "updated": "null", "siblings": [ "7100-04:IJ21581", "7100-05:IJ21577", "7200-02:IJ21578", "7200-04:IJ21527" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21580/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00-1543", "7100-04-01", "7100-04-02", "7100-04-03", "7100-04-04", "7100-04-05", "7100-04-06", "7100-04-07", "7100-04-08", "7100-04-08-1914" ], "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters", "aparNo": "IJ21581", "aparNoSet": [ "IJ21581" ], "fixedIn": "See Advisory", "ifixes": [ "IJ21581s8a.191216.AIX71TL04SP07.epkg.Z", "IJ21581s8a.191216.AIX71TL04SP08.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21581", "filesets": [ "devices.pci.df1000f7.com:7.1.4.0-7.1.4.34" ], "issued": "20191218", "updated": "null", "siblings": [ "7100-05:IJ21577", "7200-02:IJ21578", "7200-03:IJ21580", "7200-04:IJ21527" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21581/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-01-1939" ], "apAbstract": "I/O failures on LPARs using certain FC adapters", "aparNo": "IJ22290", "aparNoSet": [ "IJ22290" ], "fixedIn": "7200-04-02", "ifixes": [ "IJ22290s1a.200124.AIX72TL04SP00-01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ22290", "filesets": [ "devices.pciex.df1060e214103404.com:7.2.4.0" ], "issued": "20200125", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij22290/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.1.0", "3.1.1.10" ], "apAbstract": "I/O failures on LPARs using certain FC adapters", "aparNo": "IJ22290", "aparNoSet": [ "IJ22290" ], "fixedIn": "3.1.1.20", "ifixes": [ "IJ22290s1a.200124.VIOS3.1.1.0.epkg.Z", "IJ22290s1a.200124.VIOS3.1.1.10.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ22290", "filesets": [ "devices.pciex.df1060e214103404.com:7.2.4.0" ], "issued": "20200125", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij22290/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.1.0", "3.1.1.10" ], "apAbstract": "Possible undetected data corruption when disk attribute rw_max_time is non-zero", "aparNo": "IJ22714", "aparNoSet": [ "IJ22714" ], "fixedIn": "3.1.1.20", "ifixes": [ "IJ22714s1a.200212.VIOS3.1.1.0.epkg.Z", "IJ22714s1a.200212.VIOS3.1.1.10.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ22714", "filesets": [ "devices.fcp.disk.rte:7.2.4.0" ], "issued": "20200213", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij22714/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-01-1939" ], "apAbstract": "Possible undetected data corruption when disk attribute rw_max_time is non-zero", "aparNo": "IJ22714", "aparNoSet": [ "IJ22714" ], "fixedIn": "7200-04-02", "ifixes": [ "IJ22714s1a.200212.AIX72TL04SP00-01.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ22714", "filesets": [ "devices.fcp.disk.rte:7.2.4.0" ], "issued": "20200213", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij22714/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.1.0", "3.1.1.10" ], "apAbstract": "NPIV I/O hangs and/or timeouts on VIOS 3.1.1", "aparNo": "IJ23222", "aparNoSet": [ "IJ23222" ], "fixedIn": "3.1.1.20", "ifixes": [ "IJ23222s1a.200306.VIOS3.1.1.0.epkg.Z", "IJ23222s1a.200306.VIOS3.1.1.10.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ23222", "filesets": [ "devices.vdevice.IBM.vfc-server.rte:7.2.4.0" ], "issued": "20200311", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij23222/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-01-1939" ], "apAbstract": "Issues with \u0027sendmail\u0027 as non-root user on 7200-04 ", "aparNo": "IJ24059", "aparNoSet": [ "IJ24059" ], "fixedIn": "7200-04-02", "ifixes": [ "IJ24059m1a.200409.AIX72TL04SP00-01.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ24059", "filesets": [ "bos.net.tcp.sendmail:7.2.4.0" ], "issued": "20200430", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij24059/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.1.0", "3.1.1.10", "3.1.1.20", "3.1.1.21" ], "apAbstract": "Using NPIV with VIOS 3.1.1 can cause a crash", "aparNo": "IJ24885", "aparNoSet": [ "IJ24885" ], "fixedIn": "3.1.1.22", "ifixes": [ "IJ24885m1a.200513.VIOS3.1.1.0-3.1.1.10.epkg.Z", "IJ24885m2a.200512.VIOS3.1.1.20-3.1.1.21.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ24885", "filesets": [ "devices.vdevice.IBM.vfc-server.rte:7.2.4.0-7.2.4.1", "devices.vdevice.IBM.v-scsi-host.rte:7.2.4.0-7.2.4.1" ], "issued": "20200529", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij24885/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.1.20", "3.1.1.21" ], "apAbstract": "Slow TCP performance with Virtual Ethernet Adapter and largesend packets", "aparNo": "IJ25390", "aparNoSet": [ "IJ25390" ], "fixedIn": "3.1.1.22", "ifixes": [ "IJ25390s2b.200608.VIOS.3.1.1.21.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ25390", "filesets": [ "devices.vdevice.IBM.l-lan.rte:7.2.4.1-7.2.4.2" ], "issued": "20200613", "updated": "null", "siblings": [ "7100-05:IJ25443" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij25390/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-04-02-2015", "7200-04-02-2016" ], "apAbstract": "Slow TCP performance with Virtual Ethernet Adapter and largesend packets", "aparNo": "IJ25390", "aparNoSet": [ "IJ25390" ], "fixedIn": "7200-04-02-2027", "ifixes": [ "IJ25390s2b.200608.AIX72TL04SP02-2016.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ25390", "filesets": [ "devices.vdevice.IBM.l-lan.rte:7.2.4.1-7.2.4.2" ], "issued": "20200613", "updated": "null", "siblings": [ "7100-05:IJ25443" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij25390/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.6.60", "2.2.6.61" ], "apAbstract": "Slow TCP performance with Virtual Ethernet Adapter and largesend packets", "aparNo": "IJ25442", "aparNoSet": [ "IJ25442" ], "fixedIn": "2.2.6.62", "ifixes": [ "IJ25442sFa.200611.VIOS2.2.6.60.epkg.Z", "IJ25442sFa.200611.VIOS2.2.6.61.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ25442", "filesets": [ "devices.vdevice.IBM.l-lan.rte:6.1.9.402" ], "issued": "20200613", "updated": "null", "siblings": [ "7100-05:IJ25443", "7200-04:IJ25390" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij25442/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-06-2015", "7100-05-06-2016" ], "apAbstract": "Slow TCP performance with Virtual Ethernet Adapter and largesend packets", "aparNo": "IJ25443", "aparNoSet": [ "IJ25443" ], "fixedIn": "7100-05-06-2028", "ifixes": [ "IJ25443s6a.200611.AIX71TL05SP06-2015.epkg.Z", "IJ25443s6a.200611.AIX71TL05SP06-2016.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ25443", "filesets": [ "devices.vdevice.IBM.l-lan.rte:7.1.5.33" ], "issued": "20200613", "updated": "null", "siblings": [ "7200-04:IJ25390" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij25443/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-04", "7100-05-05", "7100-05-06" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IJ25924", "aparNoSet": [ "CVE-2020-8616", "CVE-2020-8617", "IJ25924" ], "fixedIn": "7100-05-07-2037", "ifixes": [ "IJ25924s6a.200708.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.35" ], "issued": "20200821", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar", "cvss": [ "CVE-2020-8616:8.6", "CVE-2020-8617:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-02-04", "7200-02-05", "7200-02-06" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IJ25925", "aparNoSet": [ "CVE-2020-8616", "CVE-2020-8617", "IJ25925" ], "fixedIn": "null", "ifixes": [ "IJ25925s6a.200708.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.2.0-7.2.2.18" ], "issued": "20200821", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar", "cvss": [ "CVE-2020-8616:8.6", "CVE-2020-8617:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-03", "7200-03-04", "7200-03-05" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IJ25926", "aparNoSet": [ "CVE-2020-8616", "CVE-2020-8617", "IJ25926" ], "fixedIn": "7200-03-06-2038", "ifixes": [ "IJ25926s5a.200708.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16" ], "issued": "20200821", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar", "cvss": [ "CVE-2020-8616:8.6", "CVE-2020-8617:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.20", "3.1.0.30", "3.1.0.40" ], "apAbstract": "There are vulnerabilities in BIND that impact VIOS.", "aparNo": "IJ25926", "aparNoSet": [ "CVE-2020-8616", "CVE-2020-8617", "IJ25926" ], "fixedIn": "3.1.0.50", "ifixes": [ "IJ25926s5a.200708.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16" ], "issued": "20200821", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar", "cvss": [ "CVE-2020-8616:8.6", "CVE-2020-8617:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-02" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IJ25927", "aparNoSet": [ "CVE-2020-8616", "CVE-2020-8617", "IJ25927" ], "fixedIn": "7200-04-03-2038", "ifixes": [ "IJ25927s2a.200708.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.1" ], "issued": "20200821", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar", "cvss": [ "CVE-2020-8616:8.6", "CVE-2020-8617:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.10", "3.1.1.20", "3.1.1.21", "3.1.1.22", "3.1.1.25" ], "apAbstract": "There are vulnerabilities in BIND that impact VIOS.", "aparNo": "IJ25927", "aparNoSet": [ "CVE-2020-8616", "CVE-2020-8617", "IJ25927" ], "fixedIn": "3.1.1.30", "ifixes": [ "IJ25927s2a.200708.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.1" ], "issued": "20200821", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar", "cvss": [ "CVE-2020-8616:8.6", "CVE-2020-8617:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.6.40", "2.2.6.41", "2.2.6.50", "2.2.6.51", "2.2.6.60", "2.2.6.61", "2.2.6.65" ], "apAbstract": "There are vulnerabilities in BIND that impact VIOS.", "aparNo": "IJ26021", "aparNoSet": [ "CVE-2020-8616", "CVE-2020-8617", "IJ26021" ], "fixedIn": "null", "ifixes": [ "IJ26021sDa.200708.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.404" ], "issued": "20200821", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar", "cvss": [ "CVE-2020-8616:8.6", "CVE-2020-8617:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "NTPv4" ], "apAbstract": "There are vulnerabilities in NTPv4 that affect AIX.", "aparNo": "IJ26684", "aparNoSet": [ "CVE-2020-11868", "CVE-2020-13817", "CVE-2020-15025", "IJ26684" ], "fixedIn": "See Advisory", "ifixes": [ "IJ26684s9a.200806.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory13.asc", "filesets": [ "ntp.rte:7.4.2.8100-7.4.2.8130" ], "issued": "20201026", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix13.tar", "cvss": [ "CVE-2020-11868:5.9", "CVE-2020-13817:7.4", "CVE-2020-15025:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "Perl" ], "apAbstract": "There are vulnerabilities in Perl that affect AIX.", "aparNo": "IJ26985", "aparNoSet": [ "CVE-2020-10543", "CVE-2020-10878", "CVE-2020-12723", "IJ26985", "IJ26986" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ26985s1a.200812.epkg.Z", "IJ26986s1a.200813.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory5.asc", "filesets": [ "perl.rte:5.20.1.0-5.20.1.3", "perl.rte:5.28.1.0-5.28.1.3" ], "issued": "20201209", "updated": "20210304", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_fix5.tar", "cvss": [ "CVE-2020-10543:9.8", "CVE-2020-10878:9.8", "CVE-2020-12723:9.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-00", "7200-05-01" ], "apAbstract": "IBM has released AIX iFixes in response to a vulnerability in IBM POWER9", "aparNo": "IJ28226", "aparNoSet": [ "CVE-2020-4788", "IJ28226" ], "fixedIn": "7200-05-02", "ifixes": [ "IJ28226s1b.201117.epkg.Z", "IJ28226s1a.201117.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.1" ], "issued": "20201119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar", "cvss": [ "CVE-2020-4788:5.1" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.0", "3.1.2.10" ], "apAbstract": "IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9", "aparNo": "IJ28226", "aparNoSet": [ "CVE-2020-4788", "IJ28226" ], "fixedIn": "3.1.2.20", "ifixes": [ "IJ28226s1b.201117.epkg.Z", "IJ28226s1a.201117.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.1" ], "issued": "20201119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar", "cvss": [ "CVE-2020-4788:5.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-02" ], "apAbstract": "IBM has released AIX iFixes in response to a vulnerability in IBM POWER9", "aparNo": "IJ28227", "aparNoSet": [ "CVE-2020-4788", "IJ28227" ], "fixedIn": "7200-04-04", "ifixes": [ "IJ28227s0a.200922.epkg.Z", "IJ28227s1a.200922.epkg.Z", "IJ28227s2a.200922.epkg.Z", "IJ28227s2b.200922.epkg.Z", "IJ28227s2c.200922.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc", "filesets": [ "bos.mp64:7.2.4.0-7.2.4.6" ], "issued": "20201119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar", "cvss": [ "CVE-2020-4788:5.1" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.0", "3.1.1.10", "3.1.1.21", "3.1.1.25" ], "apAbstract": "IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9", "aparNo": "IJ28227", "aparNoSet": [ "CVE-2020-4788", "IJ28227" ], "fixedIn": "3.1.1.40", "ifixes": [ "IJ28227s0a.200922.epkg.Z", "IJ28227s1a.200922.epkg.Z", "IJ28227s2a.200922.epkg.Z", "IJ28227s2b.200922.epkg.Z", "IJ28227s2c.200922.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc", "filesets": [ "bos.mp64:7.2.4.0-7.2.4.6" ], "issued": "20201119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar", "cvss": [ "CVE-2020-4788:5.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-03", "7200-03-04", "7200-03-05" ], "apAbstract": "IBM has released AIX iFixes in response to a vulnerability in IBM POWER9", "aparNo": "IJ28228", "aparNoSet": [ "CVE-2020-4788", "IJ28228" ], "fixedIn": "7200-03-07", "ifixes": [ "IJ28228s3a.200921.epkg.Z", "IJ28228s4a.200921.epkg.Z", "IJ28228s5a.200921.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc", "filesets": [ "bos.mp64:7.2.3.0-7.2.3.19" ], "issued": "20201119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar", "cvss": [ "CVE-2020-4788:5.1" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.20", "3.1.0.30", "3.1.0.40" ], "apAbstract": "IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9", "aparNo": "IJ28228", "aparNoSet": [ "CVE-2020-4788", "IJ28228" ], "fixedIn": "3.1.0.60", "ifixes": [ "IJ28228s3a.200921.epkg.Z", "IJ28228s4a.200921.epkg.Z", "IJ28228s5a.200921.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc", "filesets": [ "bos.mp64:7.2.3.0-7.2.3.19" ], "issued": "20201119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar", "cvss": [ "CVE-2020-4788:5.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-05", "7100-05-06", "7100-05-07" ], "apAbstract": "IBM has released AIX iFixes in response to a vulnerability in IBM POWER9", "aparNo": "IJ28229", "aparNoSet": [ "CVE-2020-4788", "IJ28229" ], "fixedIn": "7100-05-08", "ifixes": [ "IJ28229s5a.200921.epkg.Z", "IJ28229s5b.200922.epkg.Z", "IJ28229s6a.200921.epkg.Z", "IJ28229s6b.200922.epkg.Z", "IJ28229s6c.200922.epkg.Z", "IJ28229s7a.201117.epkg.Z", "IJ28229s7b.201117.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.40" ], "issued": "20201119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar", "cvss": [ "CVE-2020-4788:5.1" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-02-2016", "7200-04-02-2028" ], "apAbstract": "For Power9 Multiple issues seen while using NPIV adapters with VIOS", "aparNo": "IJ28565", "aparNoSet": [ "IJ28565" ], "fixedIn": "See Bulletin", "ifixes": [], "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.2.4.0-7.2.4.3" ], "issued": "20210415", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/support/pages/node/6404772", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-02-2015", "7200-04-02-2016", "7200-04-02-2027", "7200-04-02-2028" ], "apAbstract": "Possible data loss using zlibNX library", "aparNo": "IJ28579", "aparNoSet": [ "IJ28579" ], "fixedIn": "7.2 Exp 10/2020", "ifixes": [ "IJ28579s0a.201006.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ28579", "filesets": [ "zlibNX.rte:7.2.4.0-7.2.4.2" ], "issued": "20201009", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij28579/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-00", "7100-05-00-1731", "7100-05-01", "7100-05-02", "7100-05-02-1810", "7100-05-03", "7100-05-03-1838", "7100-05-03-1846", "7100-05-04", "7100-05-05", "7100-05-05-1939", "7100-05-06-2016", "7100-05-06-2028" ], "apAbstract": "For Power9 Multiple issues seen while using NPIV adapters with VIOS", "aparNo": "IJ28592", "aparNoSet": [ "IJ28592" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.1.5.0-7.1.5.36" ], "issued": "20210415", "updated": "null", "siblings": [], "downloadUrl": "See Bulletin", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-03-00", "7200-03-01", "7200-03-02", "7200-03-03", "7200-03-04", "7200-03-05" ], "apAbstract": "For Power9 Multiple issues seen while using NPIV adapters with VIOS", "aparNo": "IJ28596", "aparNoSet": [ "IJ28596" ], "fixedIn": "See Bulletin", "ifixes": [], "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.2.3.0-7.2.3.18" ], "issued": "20210415", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/support/pages/node/6404772", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-05", "7100-05-06", "7100-05-07" ], "apAbstract": "Vulnerability in gencore affects AIX", "aparNo": "IJ28825", "aparNoSet": [ "CVE-2020-4887", "IJ28825" ], "fixedIn": "7100-05-08", "ifixes": [ "IJ28825m5a.201221.epkg.Z", "IJ28825m5b.201221.epkg.Z", "IJ28825m6a.201221.epkg.Z", "IJ28825m6b.201221.epkg.Z", "IJ28825m6c.201221.epkg.Z", "IJ28825m7a.201221.epkg.Z", "IJ28825m7b.201221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.40" ], "issued": "20210119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar", "cvss": [ "CVE-2020-4887:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-03", "7200-03-04", "7200-03-05" ], "apAbstract": "Vulnerability in gencore affects AIX", "aparNo": "IJ28826", "aparNoSet": [ "CVE-2020-4887", "IJ28826" ], "fixedIn": "7200-03-07", "ifixes": [ "IJ28826m3a.201221.epkg.Z", "IJ28826m4a.201221.epkg.Z", "IJ28826m5a.201221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc", "filesets": [ "bos.mp64:7.2.3.0-7.2.3.19" ], "issued": "20210119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar", "cvss": [ "CVE-2020-4887:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.20", "3.1.0.21", "3.1.0.30", "3.1.0.40" ], "apAbstract": "Vulnerability in gencore affects VIOS", "aparNo": "IJ28826", "aparNoSet": [ "CVE-2020-4887", "IJ28826" ], "fixedIn": "3.1.0.60", "ifixes": [ "IJ28826m3a.201221.epkg.Z", "IJ28826m4a.201221.epkg.Z", "IJ28826m5a.201221.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc", "filesets": [ "bos.mp64:7.2.3.0-7.2.3.19" ], "issued": "20210119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar", "cvss": [ "CVE-2020-4887:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-02", "7200-04-03" ], "apAbstract": "Vulnerability in gencore affects AIX", "aparNo": "IJ28827", "aparNoSet": [ "CVE-2020-4887", "IJ28827" ], "fixedIn": "7200-04-04", "ifixes": [ "IJ28827m0a.201222.epkg.Z", "IJ28827m1a.201222.epkg.Z", "IJ28827m2a.201222.epkg.Z", "IJ28827m2b.201222.epkg.Z", "IJ28827m2c.201222.epkg.Z", "IJ28827m3a.210306.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc", "filesets": [ "bos.mp64:7.2.4.0-7.2.4.7" ], "issued": "20210119", "updated": "20210330", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar", "cvss": [ "CVE-2020-4887:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.0", "3.1.1.10", "3.1.1.20", "3.1.1.21", "3.1.1.22", "3.1.1.25", "3.1.1.30" ], "apAbstract": "Vulnerability in gencore affects VIOS", "aparNo": "IJ28827", "aparNoSet": [ "CVE-2020-4887", "IJ28827" ], "fixedIn": "3.1.1.40", "ifixes": [ "IJ28827m0a.201222.epkg.Z", "IJ28827m1b.201222.epkg.Z", "IJ28827m2c.201222.epkg.Z", "IJ28827m2b.201222.epkg.Z", "IJ28827m2a.201222.epkg.Z", "IJ28827m3a.210306.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc", "filesets": [ "bos.mp64:7.2.4.0-7.2.4.7" ], "issued": "20210119", "updated": "20210330", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar", "cvss": [ "CVE-2020-4887:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-00", "7200-05-01" ], "apAbstract": "Vulnerability in gencore affects AIX", "aparNo": "IJ28828", "aparNoSet": [ "CVE-2020-4887", "IJ28828" ], "fixedIn": "7200-05-02", "ifixes": [ "IJ28828m1a.201222.epkg.Z", "IJ28828m1a.201222.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.1" ], "issued": "20210119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar", "cvss": [ "CVE-2020-4887:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.0", "3.1.2.10" ], "apAbstract": "Vulnerability in gencore affects VIOS", "aparNo": "IJ28828", "aparNoSet": [ "CVE-2020-4887", "IJ28828" ], "fixedIn": "3.1.2.20", "ifixes": [ "IJ28828m1a.201222.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.1" ], "issued": "20210119", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar", "cvss": [ "CVE-2020-4887:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-03", "7200-03-04", "7200-03-05" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IJ29229", "aparNoSet": [ "CVE-2020-8622", "IJ29229" ], "fixedIn": "7200-03-07", "ifixes": [ "IJ29229m5a.201117.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16" ], "issued": "20201218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar", "cvss": [ "CVE-2020-8622:6.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.20", "3.1.0.21", "3.1.0.30", "3.1.0.40" ], "apAbstract": "There are vulnerabilities in BIND that impact VIOS.", "aparNo": "IJ29229", "aparNoSet": [ "CVE-2020-8622", "IJ29229" ], "fixedIn": "3.1.0.60", "ifixes": [ "IJ29229m5a.201117.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16" ], "issued": "20201218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar", "cvss": [ "CVE-2020-8622:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-05", "7100-05-06", "7100-05-07" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IJ29230", "aparNoSet": [ "CVE-2020-8622", "IJ29230" ], "fixedIn": "7100-05-08", "ifixes": [ "IJ29230m7a.201117.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.36" ], "issued": "20201218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar", "cvss": [ "CVE-2020-8622:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-02", "7200-04-03" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IJ29231", "aparNoSet": [ "CVE-2020-8622", "IJ29231" ], "fixedIn": "7200-04-04", "ifixes": [ "IJ29231m2a.201117.epkg.Z", "IJ29231s3a.210314.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.2" ], "issued": "20201218", "updated": "20210330", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar", "cvss": [ "CVE-2020-8622:6.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.0", "3.1.1.10", "3.1.1.20", "3.1.1.21", "3.1.1.22", "3.1.1.25", "3.1.1.30" ], "apAbstract": "There are vulnerabilities in BIND that impact VIOS.", "aparNo": "IJ29231", "aparNoSet": [ "CVE-2020-8622", "IJ29231" ], "fixedIn": "3.1.1.40", "ifixes": [ "IJ29231m2a.201117.epkg.Z", "IJ29231s3a.210314.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.2" ], "issued": "20201218", "updated": "20210330", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar", "cvss": [ "CVE-2020-8622:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-00", "7200-05-01" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IJ29232", "aparNoSet": [ "CVE-2020-8622", "IJ29232" ], "fixedIn": "7200-05-02", "ifixes": [ "IJ29232s1a.201117.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.1" ], "issued": "20201218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar", "cvss": [ "CVE-2020-8622:6.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.0", "3.1.2.10" ], "apAbstract": "There are vulnerabilities in BIND that impact VIOS.", "aparNo": "IJ29232", "aparNoSet": [ "CVE-2020-8622", "IJ29232" ], "fixedIn": "3.1.2.20", "ifixes": [ "IJ29232s1a.201117.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.1" ], "issued": "20201218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar", "cvss": [ "CVE-2020-8622:6.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-07-2037" ], "apAbstract": "Users unable to login with LAM authentication", "aparNo": "IJ29552", "aparNoSet": [ "IJ29552" ], "fixedIn": "7100-05-08", "ifixes": [ "IJ29552s7b.201209.AIX71TL05SP07.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6409904", "filesets": [ "bos.rte.libc:7.1.5.35" ], "issued": "20210129", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij29552/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-00", "7200-05-01-2038" ], "apAbstract": "Users unable to login with LAM authentication", "aparNo": "IJ29730", "aparNoSet": [ "IJ29730" ], "fixedIn": "7200-05-02", "ifixes": [ "IJ29730s1b.201209.AIX72TL05SP00-01.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6409904", "filesets": [ "bos.rte.libc:7.2.5.0" ], "issued": "20210129", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij29730/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.2.0", "3.1.2.10" ], "apAbstract": "TAPE BACKUP OR RESTORE MAY FAIL OR BE SLOW WITH VIOS 3.1.2", "aparNo": "IJ30090", "aparNoSet": [ "IJ30090" ], "fixedIn": "3.1.2.20", "ifixes": [ "IJ30090s1a.201231.VIOS3.1.2.10.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ30090", "filesets": [ "devices.vdevice.IBM.vfc-server.rte:7.2.5.0-7.2.5.1" ], "issued": "20210108", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij30090/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-00", "7200-05-01" ], "apAbstract": "ksh failures on AIX 7.2 TL05", "aparNo": "IJ30108", "aparNoSet": [ "IJ30108" ], "fixedIn": "7200-05-02", "ifixes": [ "IJ30108s1a.210205.AIX72TL05SP00-01.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6412997", "filesets": [ "bos.rte.shell:7.2.5.0" ], "issued": "20210206", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij30108/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-06", "7100-05-07" ], "apAbstract": "There is a vulnerability in the lpd daemon that affects AIX.", "aparNo": "IJ30372", "aparNoSet": [ "CVE-2021-29693", "IJ30372" ], "fixedIn": "7100-05-08", "ifixes": [ "IJ30372s5a.210210.epkg.Z", "IJ30372s5a.210210.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc", "filesets": [ "bos.rte.printers:7.1.5.0-7.1.5.32" ], "issued": "20210625", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar", "cvss": [ "CVE-2021-29693:4.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-00", "7200-05-01" ], "apAbstract": "There is a vulnerability in the lpd daemon that affects AIX.", "aparNo": "IJ30447", "aparNoSet": [ "CVE-2021-29693", "IJ30447" ], "fixedIn": "7200-05-02", "ifixes": [ "IJ30447s1a.210210.epkg.Z", "IJ30447s1a.210210.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc", "filesets": [ "bos.rte.printers:7.2.5.0" ], "issued": "20210625", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar", "cvss": [ "CVE-2021-29693:4.9" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.0", "3.1.2.10" ], "apAbstract": "There is a vulnerability in the lpd daemon that affects VIOS.", "aparNo": "IJ30447", "aparNoSet": [ "CVE-2021-29693", "IJ30447" ], "fixedIn": "3.1.2.20", "ifixes": [ "IJ30447s1a.210210.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc", "filesets": [ "bos.rte.printers:7.2.5.0" ], "issued": "20210625", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar", "cvss": [ "CVE-2021-29693:4.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-00", "7200-05-01", "7200-05-02" ], "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects AIX", "aparNo": "IJ30557", "aparNoSet": [ "CVE-2021-29741", "IJ30557" ], "fixedIn": "7200-05-03", "ifixes": [ "IJ30557s2a.210427.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc", "filesets": [ "bos.rte.shell:7.2.5.0-7.2.5.2" ], "issued": "20210730", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar", "cvss": [ "CVE-2021-29741:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.0", "3.1.2.10", "3.1.2.20", "3.1.2.21" ], "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects VIOS", "aparNo": "IJ30557", "aparNoSet": [ "CVE-2021-29741", "IJ30557" ], "fixedIn": "7200-05-03", "ifixes": [ "IJ30557s2a.210427.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc", "filesets": [ "bos.rte.shell:7.2.5.0-7.2.5.2" ], "issued": "20210730", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar", "cvss": [ "CVE-2021-29741:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-05", "7200-03-06" ], "apAbstract": "There is a vulnerability in the lpd daemon that affects AIX.", "aparNo": "IJ30799", "aparNoSet": [ "CVE-2021-29693", "IJ30799" ], "fixedIn": "7200-03-07", "ifixes": [ "IJ30799s4a.210209.epkg.Z", "IJ30799s4a.210209.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc", "filesets": [ "bos.rte.printers:7.2.3.0-7.2.3.17" ], "issued": "20210625", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar", "cvss": [ "CVE-2021-29693:4.9" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.40", "3.1.0.50" ], "apAbstract": "There is a vulnerability in the lpd daemon that affects VIOS.", "aparNo": "IJ30799", "aparNoSet": [ "CVE-2021-29693", "IJ30799" ], "fixedIn": "3.1.0.60", "ifixes": [ "IJ30799s4a.210209.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc", "filesets": [ "bos.rte.printers:7.2.3.0-7.2.3.17" ], "issued": "20210625", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar", "cvss": [ "CVE-2021-29693:4.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-02", "7200-04-03" ], "apAbstract": "There is a vulnerability in the lpd daemon that affects AIX.", "aparNo": "IJ30800", "aparNoSet": [ "CVE-2021-29693", "IJ30800" ], "fixedIn": "7200-04-04", "ifixes": [ "IJ30799s4a.210209.epkg.Z", "IJ30799s4a.210209.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc", "filesets": [ "bos.rte.printers:7.2.4.0" ], "issued": "20210625", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar", "cvss": [ "CVE-2021-29693:4.9" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.20", "3.1.1.21", "3.1.1.25", "3.1.1.30" ], "apAbstract": "There is a vulnerability in the lpd daemon that affects VIOS.", "aparNo": "IJ30800", "aparNoSet": [ "CVE-2021-29693", "IJ30800" ], "fixedIn": "3.1.1.40", "ifixes": [ "IJ30800s1a.210210.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc", "filesets": [ "bos.rte.printers:7.2.4.0" ], "issued": "20210625", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar", "cvss": [ "CVE-2021-29693:4.9" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-00", "7200-05-01-2038" ], "apAbstract": "Multithreaded applications core dump or hang", "aparNo": "IJ30808", "aparNoSet": [ "IJ30808" ], "fixedIn": "7200-05-02", "ifixes": [ "IJ30808s1a.210212.AIX72TL05SP00-01.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6415421", "filesets": [ "bos.rte.libpthreads:7.2.5.0" ], "issued": "20210213", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij30808/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-00", "7200-05-01-2038", "7200-05-01-2039", "7200-05-02-2113" ], "apAbstract": "plain2crypt or crypt2plain on an active logical volume can cause potential undetected data corruption", "aparNo": "IJ30848", "aparNoSet": [ "IJ30848" ], "fixedIn": "7200-05-02-2114", "ifixes": [ "IJ30848s1a.210329.AIX72TL05SP01.epkg.Z", "IJ31743s2a.210406.AIX72TL05SP02.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6441009", "filesets": [ "bos.hdcrypt:7.2.5.0-7.2.5.1" ], "issued": "20210407", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij30848/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-00", "7200-05-01-2038", "7200-05-01-2039" ], "apAbstract": "applications may fail unexpectedly with permission errors with setreuid", "aparNo": "IJ31049", "aparNoSet": [ "IJ31049" ], "fixedIn": "7200-05-02", "ifixes": [ "IJ31049m1a.210308.AIX72TL05SP01.epkg.Z", "IJ31049s1a.210308.AIX72TL05SP01.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6430903", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.1" ], "issued": "20210308", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij31049/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-00", "7200-05-01-2038", "7200-05-01-2039" ], "apAbstract": "Multiple issues seen while using NPIV adapters with AIX", "aparNo": "IJ31191", "aparNoSet": [ "IJ31191" ], "fixedIn": "7200-05-03", "ifixes": [ "IJ31604m1b.210322.AIX72TL05SP01.epkg.Z", "IJ31604s2a.210414.AIX72TL05SP02.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.2.5.1-7.2.5.3" ], "issued": "20210415", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij31191/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-02-2113", "7200-05-02-2114" ], "apAbstract": "Multiple issues seen while using NPIV adapters with AIX", "aparNo": "IJ31604", "aparNoSet": [ "IJ31604" ], "fixedIn": "7200-05-03", "ifixes": [ "IJ31604m1b.210322.AIX72TL05SP01.epkg.Z", "IJ31604s2a.210414.AIX72TL05SP02.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.2.5.1-7.2.5.3" ], "issued": "20210415", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij31191/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-06", "7100-05-07", "7100-05-08" ], "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects AIX", "aparNo": "IJ31606", "aparNoSet": [ "CVE-2021-29741", "IJ31606" ], "fixedIn": "7100-05-09", "ifixes": [ "IJ31606s6a.210628.epkg.Z", "IJ31606s7a.210628.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc", "filesets": [ "bos.rte.shell:7.1.5.0-7.1.5.36" ], "issued": "20210730", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar", "cvss": [ "CVE-2021-29741:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-02", "7200-04-03", "7200-04-04" ], "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects AIX", "aparNo": "IJ31614", "aparNoSet": [ "CVE-2021-29741", "IJ31614" ], "fixedIn": "7200-04-05", "ifixes": [ "IJ31614s1a.210427.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc", "filesets": [ "bos.rte.shell:7.2.4.0-7.2.4.3" ], "issued": "20210730", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar", "cvss": [ "CVE-2021-29741:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.20", "3.1.1.21", "3.1.1.22", "3.1.1.25", "3.1.1.30", "3.1.1.40" ], "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects VIOS", "aparNo": "IJ31614", "aparNoSet": [ "CVE-2021-29741", "IJ31614" ], "fixedIn": "7200-04-05", "ifixes": [ "IJ31614s1a.210427.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc", "filesets": [ "bos.rte.shell:7.2.4.0-7.2.4.3" ], "issued": "20210730", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar", "cvss": [ "CVE-2021-29741:8.4" ], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.2.0", "3.1.2.10", "3.1.2.20", "3.1.2.21" ], "apAbstract": "For Power9 Multiple issues seen while using NPIV adapters with VIOS", "aparNo": "IJ31936", "aparNoSet": [ "IJ31936" ], "fixedIn": "3.1.2.30", "ifixes": [ "IJ31936m1a.210409.VIOS3.1.2.10.epkg.Z", "IJ31936s2a.210414.VIOS3.1.2.21.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731", "filesets": [ "devices.vdevice.IBM.vfc-server.rte:7.2.5.0-7.2.5.2" ], "issued": "20210415", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij31936/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-05", "7200-03-06", "7200-03-07" ], "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects AIX", "aparNo": "IJ32285", "aparNoSet": [ "CVE-2021-29741", "IJ32285" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ32285s4a.210628.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc", "filesets": [ "bos.rte.shell:7.2.3.0-7.2.3.20" ], "issued": "20210730", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar", "cvss": [ "CVE-2021-29741:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.40", "3.1.0.50", "3.1.0.60" ], "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects VIOS", "aparNo": "IJ32285", "aparNoSet": [ "CVE-2021-29741", "IJ32285" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ32285s4a.210628.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc", "filesets": [ "bos.rte.shell:7.2.3.0-7.2.3.20" ], "issued": "20210730", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar", "cvss": [ "CVE-2021-29741:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-05", "7200-03-06", "7200-03-07" ], "apAbstract": "There are multiple vulnerabilities in the AIX kernel", "aparNo": "IJ32629", "aparNoSet": [ "CVE-2021-29727", "CVE-2021-29801", "CVE-2021-29862", "IJ32629" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ32629m5a.210805.epkg.Z", "IJ32629m6a.210805.epkg.Z", "IJ32629s7a.210805.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc", "filesets": [ "bos.mp64:7.2.3.0-7.2.3.21" ], "issued": "20210825", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar", "cvss": [ "CVE-2021-29727:6.2", "CVE-2021-29801:8.4", "CVE-2021-29862:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.40", "3.1.0.50", "3.1.0.60" ], "apAbstract": "There are multiple vulnerabilities in the AIX kernel for VIOS", "aparNo": "IJ32629", "aparNoSet": [ "CVE-2021-29727", "CVE-2021-29801", "CVE-2021-29862", "IJ32629" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ32629m5a.210805.epkg.Z", "IJ32629m6a.210805.epkg.Z", "IJ32629s7a.210805.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc", "filesets": [ "bos.mp64:7.2.3.0-7.2.3.21" ], "issued": "20210825", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar", "cvss": [ "CVE-2021-29727:6.2", "CVE-2021-29801:8.4", "CVE-2021-29862:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-02", "7200-04-03", "7200-04-04" ], "apAbstract": "There are multiple vulnerabilities in the AIX kernel", "aparNo": "IJ32630", "aparNoSet": [ "CVE-2021-29727", "CVE-2021-29801", "CVE-2021-29862", "IJ32630" ], "fixedIn": "7200-04-05", "ifixes": [ "IJ32630m2e.210901.epkg.Z", "IJ32630m2f.210901.epkg.Z", "IJ32630m3b.210901.epkg.Z", "IJ32630s4a.210813.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc", "filesets": [ "bos.mp64:7.2.4.0-7.2.4.8" ], "issued": "20210825", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar", "cvss": [ "CVE-2021-29727:6.2", "CVE-2021-29801:8.4", "CVE-2021-29862:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.21", "3.1.1.25", "3.1.1.30", "3.1.1.40" ], "apAbstract": "There are multiple vulnerabilities in the AIX kernel for VIOS", "aparNo": "IJ32630", "aparNoSet": [ "CVE-2021-29727", "CVE-2021-29801", "CVE-2021-29862", "IJ32630" ], "fixedIn": "3.1.1.50", "ifixes": [ "IJ32630m2f.210901.epkg.Z", "IJ32630m2e.210901.epkg.Z", "IJ32630m3b.210901.epkg.Z", "IJ32630s4a.210813.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc", "filesets": [ "bos.mp64:7.2.4.0-7.2.4.8" ], "issued": "20210825", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar", "cvss": [ "CVE-2021-29727:6.2", "CVE-2021-29801:8.4", "CVE-2021-29862:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-02" ], "apAbstract": "There are multiple vulnerabilities in the AIX kernel", "aparNo": "IJ32631", "aparNoSet": [ "CVE-2021-29727", "CVE-2021-29801", "CVE-2021-29862", "IJ32631" ], "fixedIn": "7200-05-03", "ifixes": [ "IJ32631m1a.210805.epkg.Z", "IJ32631s2a.210805.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.3" ], "issued": "20210825", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar", "cvss": [ "CVE-2021-29727:6.2", "CVE-2021-29801:8.4", "CVE-2021-29862:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "There are multiple vulnerabilities in the AIX kernel for VIOS", "aparNo": "IJ32631", "aparNoSet": [ "CVE-2021-29727", "CVE-2021-29801", "CVE-2021-29862", "IJ32631" ], "fixedIn": "3.1.2.30", "ifixes": [ "IJ32631m1a.210805.epkg.Z", "IJ32631s2a.210805.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.3" ], "issued": "20210825", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar", "cvss": [ "CVE-2021-29727:6.2", "CVE-2021-29801:8.4", "CVE-2021-29862:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "Vulnerability in libc affects AIX", "aparNo": "IJ32714", "aparNoSet": [ "CVE-2021-29860", "IJ32714" ], "fixedIn": "3.1.2.30", "ifixes": [ "IJ34081m1a.211112.epkg.Z", "IJ34081m2b.211112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc", "filesets": [ "bos.rte.libc:7.2.5.0-7.2.5.2" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ", "cvss": [ "CVE-2021-29860:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-02" ], "apAbstract": "Vulnerability in libc affects AIX", "aparNo": "IJ32736", "aparNoSet": [ "CVE-2021-29860", "IJ32736", "IJ34081" ], "fixedIn": "7.2.5.03-2135", "ifixes": [ "IJ34081m1a.211112.epkg.Z", "IJ34081m2b.211112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc", "filesets": [ "bos.rte.libc:7.2.5.0-7.2.5.2" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ", "cvss": [ "CVE-2021-29860:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-06", "7100-05-07", "7100-05-08" ], "apAbstract": "There is a vulnerability in the AIX trace facility.", "aparNo": "IJ32940", "aparNoSet": [ "CVE-2021-29706", "IJ32940" ], "fixedIn": "7100-05-09", "ifixes": [ "IJ32940m6a.210615.epkg.Z", "IJ32940m6b.210615.epkg.Z", "IJ32940m7a.210615.epkg.Z", "IJ32940m7b.210615.epkg.Z", "IJ32940s8a.210615.epkg.Z", "IJ32940s8b.210615.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/trace_advisory.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.42" ], "issued": "20210615", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/trace_fix.tar", "cvss": [ "CVE-2021-29706:6.8" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-06", "7100-05-07", "7100-05-08" ], "apAbstract": "There is a vulnerability in BIND that affects AIX.", "aparNo": "IJ33276", "aparNoSet": [ "CVE-2021-25215", "IJ33276" ], "fixedIn": "7100-05-09", "ifixes": [ "IJ33276s8a.210622.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc", "filesets": [ "bos.net.tcp.server:7.1.5.0-7.1.5.34" ], "issued": "20210729", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar", "cvss": [ "CVE-2021-25215:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-03-05", "7200-03-06", "7200-03-07" ], "apAbstract": "There is a vulnerability in BIND that affects AIX.", "aparNo": "IJ33277", "aparNoSet": [ "CVE-2021-25215", "IJ33277" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ33277s7a.210622.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc", "filesets": [ "bos.net.tcp.bind:7.2.3.0-7.2.3.15" ], "issued": "20210729", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar", "cvss": [ "CVE-2021-25215:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.40", "3.1.0.50", "3.1.0.60" ], "apAbstract": "There is a vulnerability in BIND that affects VIOS.", "aparNo": "IJ33277", "aparNoSet": [ "CVE-2021-25215", "IJ33277" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ33277s7a.210622.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc", "filesets": [ "bos.net.tcp.bind:7.2.3.0-7.2.3.15" ], "issued": "20210729", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar", "cvss": [ "CVE-2021-25215:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-02", "7200-04-03", "7200-04-04" ], "apAbstract": "There is a vulnerability in BIND that affects AIX.", "aparNo": "IJ33278", "aparNoSet": [ "CVE-2021-25215", "IJ33278" ], "fixedIn": "7200-04-05", "ifixes": [ "IJ33278s4a.210622.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc", "filesets": [ "bos.net.tcp.bind:7.2.4.0" ], "issued": "20210729", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar", "cvss": [ "CVE-2021-25215:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.20", "3.1.1.21", "3.1.1.22", "3.1.1.25", "3.1.1.30", "3.1.1.40" ], "apAbstract": "There is a vulnerability in BIND that affects VIOS.", "aparNo": "IJ33278", "aparNoSet": [ "CVE-2021-25215", "IJ33278" ], "fixedIn": "3.1.1.50", "ifixes": [ "IJ33278s4a.210622.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc", "filesets": [ "bos.net.tcp.bind:7.2.4.0" ], "issued": "20210729", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar", "cvss": [ "CVE-2021-25215:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-00", "7200-05-01", "7200-05-02" ], "apAbstract": "There is a vulnerability in BIND that affects AIX.", "aparNo": "IJ33279", "aparNoSet": [ "CVE-2021-25215", "IJ33279" ], "fixedIn": "7200-05-03", "ifixes": [ "IJ33279s2a.210621.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.0-7.2.5.1" ], "issued": "20210729", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar", "cvss": [ "CVE-2021-25215:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.0", "3.1.2.10", "3.1.2.20", "3.1.2.21" ], "apAbstract": "There is a vulnerability in BIND that affects VIOS.", "aparNo": "IJ33279", "aparNoSet": [ "CVE-2021-25215", "IJ33279" ], "fixedIn": "3.1.2.30", "ifixes": [ "IJ33279s2a.210621.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.0-7.2.5.1" ], "issued": "20210729", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar", "cvss": [ "CVE-2021-25215:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-06", "7100-05-07", "7100-05-08" ], "apAbstract": "There are multiple vulnerabilities in the AIX kernel", "aparNo": "IJ33318", "aparNoSet": [ "CVE-2021-29727", "CVE-2021-29801", "CVE-2021-29862", "IJ33318" ], "fixedIn": "7100-05-09", "ifixes": [ "IJ33318m6a.210816.epkg.Z", "IJ33318m7a.210813.epkg.Z", "IJ33318m8a.210813.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.42" ], "issued": "20210825", "updated": "20210901", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar", "cvss": [ "CVE-2021-29727:6.2", "CVE-2021-29801:8.4", "CVE-2021-29862:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09", "7100-05-10", "7100-05-11" ], "apAbstract": "Vulnerability in libc affects AIX", "aparNo": "IJ33560", "aparNoSet": [ "CVE-2021-29860", "IJ33560", "IJ35673" ], "fixedIn": "7100-05-12", "ifixes": [ "IJ33560m7b.211112.epkg.Z", "IJ33560m8b.211112.epkg.Z", "IJ35673s9a.211115.epkg.Z", "IJ35673sAa.221206.epkg.Z", "IJ35673sBa.230314.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc", "filesets": [ "bos.rte.libc:7.1.5.0-7.1.5.39" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ", "cvss": [ "CVE-2021-29860:6.2" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-04-00", "7200-04-01", "7200-04-02-2016", "7200-04-02-2028", "7200-04-03", "7200-04-04-2114" ], "apAbstract": "Applications can terminate on systems with active IPv6 traffic", "aparNo": "IJ34301", "aparNoSet": [ "IJ34301" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ34301s1a.210808.AIX72TL04SP00-01.epkg.Z", "IJ34301s2a.210807.AIX72TL04SP02.epkg.Z", "IJ34301s3a.210809.AIX72TL04SP03.epkg.Z", "IJ34301s4a.210811.AIX72TL04SP04.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6480733", "filesets": [ "bos.net.tcp.client_core:7.2.4.0-7.2.4.3" ], "issued": "20210819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij34301/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-03-00", "7200-03-01", "7200-03-02", "7200-03-03", "7200-03-04", "7200-03-05", "7200-03-06", "7200-03-07", "7200-03-07-2114" ], "apAbstract": "Applications can terminate on systems with active IPv6 traffic", "aparNo": "IJ34340", "aparNoSet": [ "IJ34340" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ34340s3a.210810.AIX72TL03SP03.epkg.Z", "IJ34340s7a.210811.AIX72TL03SP07.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6480733", "filesets": [ "bos.net.tcp.client_core:7.2.3.0-7.2.3.21" ], "issued": "20210819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij34340/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-00", "7100-05-00-1731", "7100-05-01", "7100-05-02", "7100-05-02-1810", "7100-05-03", "7100-05-03-1838", "7100-05-03-1846", "7100-05-04", "7100-05-05", "7100-05-05-1939", "7100-05-06-2016", "7100-05-06-2028", "7100-05-07", "7100-05-08" ], "apAbstract": "Applications can terminate on systems with active IPv6 traffic", "aparNo": "IJ34375", "aparNoSet": [ "IJ34375" ], "fixedIn": "7100-05-09-2136", "ifixes": [ "IJ34375s8a.210813.AIX71TL05SP08.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6480733", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.37" ], "issued": "20210819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij34375/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-00", "7200-05-01-2038", "7200-05-01-2039", "7200-05-02", "7200-05-02-2114" ], "apAbstract": "Applications can terminate on systems with active IPv6 traffic", "aparNo": "IJ34376", "aparNoSet": [ "IJ34376" ], "fixedIn": "7200-05-03-2136", "ifixes": [ "IJ34376s2a.210813.AIX72TL05SP02-2114.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6480733", "filesets": [ "bos.net.tcp.client_core:7.2.5.0-7.2.5.4" ], "issued": "20210819", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij34376/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-02", "7200-04-03", "7200-04-04" ], "apAbstract": "Vulnerability in libc affects AIX", "aparNo": "IJ34512", "aparNoSet": [ "CVE-2021-29860", "IJ34512", "IJ35675" ], "fixedIn": "7200-04-05", "ifixes": [ "IJ34512m2a.211112.epkg.Z", "IJ34512m3a.211112.epkg.Z", "IJ34512m4a.211112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc", "filesets": [ "bos.rte.libc:7.2.4.0-7.2.4.3" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ", "cvss": [ "CVE-2021-29860:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10" ], "apAbstract": "Vulnerability in EFS affects AIX", "aparNo": "IJ35078", "aparNoSet": [ "CVE-2021-29861", "IJ35078" ], "fixedIn": "3.1.3.14", "ifixes": [ "IJ35078s3a.211026.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc", "filesets": [ "bos.rte.security:7.2.5.100-7.2.5.100" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ", "cvss": [ "CVE-2021-29861:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-02", "7200-05-03" ], "apAbstract": "Vulnerability in EFS affects AIX", "aparNo": "IJ35078", "aparNoSet": [ "CVE-2021-29861", "IJ35078", "IJ35211" ], "fixedIn": "7.2.5.03-2147", "ifixes": [ "IJ35078s3a.211026.epkg.Z", "IJ35211m1a.211110.epkg.Z", "IJ35211m2a.211103.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc", "filesets": [ "bos.rte.security:7.2.5.0-7.2.5.1", "bos.rte.security:7.2.5.100-7.2.5.100" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ", "cvss": [ "CVE-2021-29861:6.2" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-00", "7200-05-01-2038", "7200-05-01-2039", "7200-05-02", "7200-05-02-2114", "7200-05-03-2135", "7200-05-03-2136", "7200-05-03-2147", "7200-05-03-2148" ], "apAbstract": "Encrypted logical volumes unable to mount", "aparNo": "IJ35178", "aparNoSet": [ "IJ35178" ], "fixedIn": "7200-05-04-2219", "ifixes": [ "IJ35178m3b.211209.AIX72TL05SP03-2136.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6494777", "filesets": [ "bos.hdcrypt:7.2.5.0-7.2.5.102" ], "issued": "20211111", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij35178/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "Vulnerability in EFS affects AIX", "aparNo": "IJ35211", "aparNoSet": [ "CVE-2021-29861", "IJ35211" ], "fixedIn": "3.1.2.30", "ifixes": [ "IJ35211m1a.211110.epkg.Z", "IJ35211m2a.211103.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc", "filesets": [ "bos.rte.security:7.2.5.0-7.2.5.1" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ", "cvss": [ "CVE-2021-29861:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.21", "3.1.1.25", "3.1.1.30", "3.1.1.40" ], "apAbstract": "Vulnerability in EFS affects AIX", "aparNo": "IJ35226", "aparNoSet": [ "CVE-2021-29861", "IJ35226" ], "fixedIn": "3.1.1.50", "ifixes": [ "IJ35226m2a.211103.epkg.Z", "IJ35226m3a.211103.epkg.Z", "IJ35226m4a.211103.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc", "filesets": [ "bos.rte.security:7.2.4.0-7.2.4.3" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ", "cvss": [ "CVE-2021-29861:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-02", "7200-04-03", "7200-04-04" ], "apAbstract": "Vulnerability in EFS affects AIX", "aparNo": "IJ35226", "aparNoSet": [ "CVE-2021-29861", "IJ35226" ], "fixedIn": "7200-04-05", "ifixes": [ "IJ35226m2a.211103.epkg.Z", "IJ35226m3a.211103.epkg.Z", "IJ35226m4a.211103.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc", "filesets": [ "bos.rte.security:7.2.4.0-7.2.4.3" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ", "cvss": [ "CVE-2021-29861:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.40", "3.1.0.50", "3.1.0.60" ], "apAbstract": "Vulnerability in EFS affects AIX", "aparNo": "IJ35505", "aparNoSet": [ "CVE-2021-29861", "IJ35505" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ35505m5a.211103.epkg.Z", "IJ35505m6a.211103.epkg.Z", "IJ35505m7a.211103.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc", "filesets": [], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ", "cvss": [ "CVE-2021-29861:6.2" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-09-2135", "7100-05-09-2136" ], "apAbstract": "Etherchannel failure with CAA and LACP", "aparNo": "IJ35577", "aparNoSet": [ "IJ35577" ], "fixedIn": "7100-05-09-2148", "ifixes": [ "IJ35577s9a.211015.AIX71TL05SP09-213x.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6507119", "filesets": [ "bos.cluster.rte:7.1.5.37" ], "issued": "20211022", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij35577/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-03-2135", "7200-05-03-2136" ], "apAbstract": "Etherchannel failure with CAA and LACP", "aparNo": "IJ35588", "aparNoSet": [ "IJ35588" ], "fixedIn": "7200-05-03-2147", "ifixes": [ "IJ35588s3a.211015.AIX72TL05SP03-213x.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6507119", "filesets": [ "bos.cluster.rte:7.2.5.100" ], "issued": "20211022", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij35588/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.3.0", "3.1.3.10" ], "apAbstract": "Etherchannel failure with CAA and LACP on VIOS", "aparNo": "IJ35588", "aparNoSet": [ "IJ35588" ], "fixedIn": "3.1.3.13", "ifixes": [ "IJ35588s3a.211015.VIOS3.1.3.0.epkg.Z", "IJ35588s3a.211015.VIOS3.1.3.10.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6507119", "filesets": [ "bos.cluster.rte:7.2.5.100" ], "issued": "20211022", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij35588/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09-2136" ], "apAbstract": "There is a vulnerability in the mount command that affects AIX.", "aparNo": "IJ35620", "aparNoSet": [ "CVE-2021-38990", "IJ35620" ], "fixedIn": "7100-05-09-2148", "ifixes": [ "IJ35620s9a.211130.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc", "filesets": [ "bos.rte.filesystem:7.1.5.0-7.1.5.36" ], "issued": "20220106", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar", "cvss": [ "CVE-2021-38990:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-01-2038", "7200-05-01-2039", "7200-05-02", "7200-05-02-2114", "7200-05-03-2135", "7200-05-03-2136" ], "apAbstract": "There is a vulnerability in the mount command that affects AIX.", "aparNo": "IJ35623", "aparNoSet": [ "CVE-2021-38990", "IJ35623", "IJ36125" ], "fixedIn": "7200-05-03-2147", "ifixes": [ "IJ36125s2a.211130.epkg.Z", "IJ35623s3a.211130.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc", "filesets": [ "bos.rte.filesystem:7.2.5.0-7.2.5.1", "bos.rte.filesystem:7.2.5.100" ], "issued": "20220106", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar", "cvss": [ "CVE-2021-38990:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10" ], "apAbstract": "There is a vulnerability in the mount command that affects VIOS.", "aparNo": "IJ35623", "aparNoSet": [ "CVE-2021-38990", "IJ35623" ], "fixedIn": "3.1.3.13", "ifixes": [ "IJ35623s3a.211130.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc", "filesets": [ "bos.rte.filesystem:7.2.5.100" ], "issued": "20220106", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar", "cvss": [ "CVE-2021-38990:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.0.40", "3.1.0.50", "3.1.0.60" ], "apAbstract": "Vulnerability in libc affects AIX", "aparNo": "IJ35674", "aparNoSet": [ "CVE-2021-29860", "IJ35674" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ35681m5a.211112.epkg.Z", "IJ35681m6a.211112.epkg.Z", "IJ35681m7a.211112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc", "filesets": [], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ", "cvss": [ "CVE-2021-29860:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.21", "3.1.1.25", "3.1.1.30", "3.1.1.40" ], "apAbstract": "Vulnerability in libc affects AIX", "aparNo": "IJ35675", "aparNoSet": [ "CVE-2021-29860", "IJ35675" ], "fixedIn": "3.1.1.50", "ifixes": [ "IJ34512m2a.211112.epkg.Z", "IJ34512m3a.211112.epkg.Z", "IJ34512m4a.211112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc", "filesets": [ "bos.rte.libc:7.2.4.0-7.2.4.3" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ", "cvss": [ "CVE-2021-29860:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09", "7100-05-10", "7100-05-11" ], "apAbstract": "Vulnerability in EFS affects AIX", "aparNo": "IJ35780", "aparNoSet": [ "CVE-2021-29861", "IJ35780" ], "fixedIn": "7100-05-12", "ifixes": [ "IJ35780m7a.211103.epkg.Z", "IJ35780m8a.211103.epkg.Z", "IJ35780m9a.211103.epkg.Z", "IJ35780mBa.230314.epkg.Z", "IJ35780sAa.221206.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc", "filesets": [ "bos.rte.security:7.1.5.0-7.1.5.39" ], "issued": "20211116", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ", "cvss": [ "CVE-2021-29861:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-02", "7200-04-02-2016", "7200-04-02-2028", "7200-04-03", "7200-04-04" ], "apAbstract": "There is a vulnerability in the mount command that affects AIX.", "aparNo": "IJ35826", "aparNoSet": [ "CVE-2021-38990", "IJ35826" ], "fixedIn": "7200-04-05", "ifixes": [ "IJ35826s2a.211130.epkg.Z", "IJ35826s4a.211130.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc", "filesets": [ "bos.rte.filesystem:7.2.4.0-7.2.4.2" ], "issued": "20220106", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar", "cvss": [ "CVE-2021-38990:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.21", "3.1.1.25", "3.1.1.30", "3.1.1.40" ], "apAbstract": "There is a vulnerability in the mount command that affects VIOS.", "aparNo": "IJ35826", "aparNoSet": [ "CVE-2021-38990", "IJ35826" ], "fixedIn": "3.1.1.50", "ifixes": [ "IJ35826s2a.211130.epkg.Z", "IJ35826s4a.211130.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc", "filesets": [ "bos.rte.filesystem:7.2.4.0-7.2.4.2" ], "issued": "20220106", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar", "cvss": [ "CVE-2021-38990:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "There is a vulnerability in the mount command that affects VIOS.", "aparNo": "IJ36125", "aparNoSet": [ "CVE-2021-38990", "IJ36125" ], "fixedIn": "3.1.2.30", "ifixes": [ "IJ36125s2a.211130.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc", "filesets": [ "bos.rte.filesystem:7.2.5.0-7.2.5.1" ], "issued": "20220106", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar", "cvss": [ "CVE-2021-38990:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01" ], "apAbstract": "There is a vulnerability in the AIX nimsh daemon.", "aparNo": "IJ36593", "aparNoSet": [ "CVE-2022-22351", "IJ36593" ], "fixedIn": "7300-00-02", "ifixes": [ "DEPRECATED::IJ36593s1a.220208.epkg.Z", "IJ36593m1a.220324.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc", "filesets": [ "bos.sysmgt.nim.client:7.3.0.0" ], "issued": "20220304", "updated": "20220324", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar", "cvss": [ "CVE-2022-22351:6.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01" ], "apAbstract": "Vulnerabilities in AIX CAA", "aparNo": "IJ36596", "aparNoSet": [ "CVE-2021-38996", "CVE-2022-22350", "IJ36596" ], "fixedIn": "7300-00-02", "ifixes": [ "IJ36596s1a.220228.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc", "filesets": [ "bos.cluster.rte:7.3.0.0-7.3.0.0" ], "issued": "20220301", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar", "cvss": [ "CVE-2022-22350:6.2", "CVE-2021-38996:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "There is a vulnerability in the AIX nimsh daemon for VIOS.", "aparNo": "IJ36681", "aparNoSet": [ "CVE-2022-22351", "IJ36681", "IJ37706" ], "fixedIn": "3.1.2.40", "ifixes": [ "DEPRECATED::IJ37706s2a.220208.epkg.Z", "IJ37706m2a.220324.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc", "filesets": [ "bos.sysmgt.nim.client:7.2.5.0-7.2.5.1", "bos.sysmgt.nim.client:7.2.5.100" ], "issued": "20220304", "updated": "20220324", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar", "cvss": [ "CVE-2022-22351:6.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14" ], "apAbstract": "There is a vulnerability in the AIX nimsh daemon for VIOS.", "aparNo": "IJ36681", "aparNoSet": [ "CVE-2022-22351", "IJ36681", "IJ37706" ], "fixedIn": "3.1.3.20", "ifixes": [ "DEPRECATED::IJ36681s3a.220208.epkg.Z", "IJ36681m3a.220324.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc", "filesets": [ "bos.sysmgt.nim.client:7.2.5.0-7.2.5.1", "bos.sysmgt.nim.client:7.2.5.100" ], "issued": "20220304", "updated": "20220324", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar", "cvss": [ "CVE-2022-22351:6.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-01-2038", "7200-05-01-2039", "7200-05-02", "7200-05-02-2114", "7200-05-03-2135", "7200-05-03-2136", "7200-05-03-2148" ], "apAbstract": "There is a vulnerability in the AIX nimsh daemon.", "aparNo": "IJ36681", "aparNoSet": [ "CVE-2022-22351", "IJ36681", "IJ37706" ], "fixedIn": "7200-05-04", "ifixes": [ "DEPRECATED::IJ37706s2a.220208.epkg.Z", "DEPRECATED::IJ36681s3a.220208.epkg.Z", "IJ37706m2a.220324.epkg.Z", "IJ36681m3a.220324.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc", "filesets": [ "bos.sysmgt.nim.client:7.2.5.0-7.2.5.1", "bos.sysmgt.nim.client:7.2.5.100" ], "issued": "20220304", "updated": "20220324", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar", "cvss": [ "CVE-2022-22351:6.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "Vulnerabilities in AIX CAA", "aparNo": "IJ36682", "aparNoSet": [ "CVE-2021-38996", "CVE-2022-22350", "IJ35657", "IJ36682", "IJ37512" ], "fixedIn": "3.1.2.40", "ifixes": [ "IJ37512s1a.220228.epkg.Z", "IJ37512s2a.220228.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc", "filesets": [ "bos.cluster.rte:7.2.5.0-7.2.5.1" ], "issued": "20220301", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar", "cvss": [ "CVE-2022-22350:6.2", "CVE-2021-38996:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14" ], "apAbstract": "Vulnerabilities in AIX CAA", "aparNo": "IJ36682", "aparNoSet": [ "CVE-2021-38996", "CVE-2022-22350", "IJ35657", "IJ36682", "IJ37512" ], "fixedIn": "3.1.3.20", "ifixes": [ "IJ36682s3a.220228.epkg.Z", "IJ36682s3b.220228.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc", "filesets": [ "bos.cluster.rte:7.2.5.100-7.2.5.101" ], "issued": "20220301", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar", "cvss": [ "CVE-2022-22350:6.2", "CVE-2021-38996:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-02", "7200-05-03" ], "apAbstract": "Vulnerabilities in AIX CAA", "aparNo": "IJ36682", "aparNoSet": [ "CVE-2021-38996", "CVE-2022-22350", "IJ35657", "IJ36682", "IJ37512" ], "fixedIn": "7200-05-04", "ifixes": [ "IJ36682s3a.220228.epkg.Z", "IJ36682s3b.220228.epkg.Z", "IJ37512s1a.220228.epkg.Z", "IJ37512s2a.220228.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc", "filesets": [ "bos.cluster.rte:7.2.5.0-7.2.5.1", "bos.cluster.rte:7.2.5.100-7.2.5.101" ], "issued": "20220301", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar", "cvss": [ "CVE-2022-22350:6.2", "CVE-2021-38996:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09-2136", "7100-05-09-2148" ], "apAbstract": "There is a vulnerability in the lscore command that affects AIX.", "aparNo": "IJ36805", "aparNoSet": [ "CVE-2021-38991", "IJ36805" ], "fixedIn": "7100-05-10", "ifixes": [ "IJ36805s9a.211217.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc", "filesets": [ "bos.rte.security:7.1.5.0-7.1.5.37" ], "issued": "20220110", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar", "cvss": [ "CVE-2021-38991:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-02", "7200-04-02-2016", "7200-04-02-2028", "7200-04-03", "7200-04-04" ], "apAbstract": "There is a vulnerability in the lscore command that affects AIX.", "aparNo": "IJ36806", "aparNoSet": [ "CVE-2021-38991", "IJ36806" ], "fixedIn": "7200-04-06", "ifixes": [ "IJ36806s2a.211217.epkg.Z", "IJ36806s4a.211217.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc", "filesets": [ "bos.rte.security:7.2.4.0-7.2.4.3" ], "issued": "20220110", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar", "cvss": [ "CVE-2021-38991:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.21", "3.1.1.25", "3.1.1.30", "3.1.1.40" ], "apAbstract": "There is a vulnerability in the lscore command that affects VIOS.", "aparNo": "IJ36806", "aparNoSet": [ "CVE-2021-38991", "IJ36806" ], "fixedIn": "3.1.1.60", "ifixes": [ "IJ36806s2a.211217.epkg.Z", "IJ36806s4a.211217.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc", "filesets": [ "bos.rte.security:7.2.4.0-7.2.4.3" ], "issued": "20220110", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar", "cvss": [ "CVE-2021-38991:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-01-2038", "7200-05-01-2039", "7200-05-02", "7200-05-02-2114", "7200-05-03-2135", "7200-05-03-2136" ], "apAbstract": "There is a vulnerability in the lscore command that affects AIX.", "aparNo": "IJ36810", "aparNoSet": [ "CVE-2021-38991", "IJ36810", "IJ36815" ], "fixedIn": "7200-05-04", "ifixes": [ "IJ36815s2a.211217.epkg.Z", "IJ36810s3a.211217.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc", "filesets": [ "bos.rte.security:7.2.5.0-7.2.5.1", "bos.rte.security:7.2.5.100-7.2.5.101" ], "issued": "20220110", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar", "cvss": [ "CVE-2021-38991:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14" ], "apAbstract": "There is a vulnerability in the lscore command that affects VIOS.", "aparNo": "IJ36810", "aparNoSet": [ "CVE-2021-38991", "IJ36810" ], "fixedIn": "3.1.3.20", "ifixes": [ "IJ36810s3a.211217.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc", "filesets": [ "bos.rte.security:7.2.5.100-7.2.5.101" ], "issued": "20220110", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar", "cvss": [ "CVE-2021-38991:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "There is a vulnerability in the lscore command that affects VIOS.", "aparNo": "IJ36815", "aparNoSet": [ "CVE-2021-38991", "IJ36815" ], "fixedIn": "3.1.2.40", "ifixes": [ "IJ36815s2a.211217.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc", "filesets": [ "bos.rte.security:7.2.5.0-7.2.5.1" ], "issued": "20220110", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar", "cvss": [ "CVE-2021-38991:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01" ], "apAbstract": "There is a vulnerability in the lscore command that affects AIX.", "aparNo": "IJ36816", "aparNoSet": [ "CVE-2021-38991", "IJ36816" ], "fixedIn": "7300-00-02", "ifixes": [ "IJ36816s1a.211217.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc", "filesets": [ "bos.rte.security:7.3.0.0" ], "issued": "20220110", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar", "cvss": [ "CVE-2021-38991:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01" ], "apAbstract": "Vulnerabilities in the AIX kernel", "aparNo": "IJ37001", "aparNoSet": [ "CVE-2021-38994", "CVE-2021-38995", "IJ37001" ], "fixedIn": "7300-00-02", "ifixes": [ "IJ37001m1a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc", "filesets": [ "bos.mp64:7.3.0.0-7.3.0.1" ], "issued": "20220223", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar", "cvss": [ "CVE-2021-38994:6.2", "CVE-2021-38995:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "Vulnerabilities in the AIX kernel", "aparNo": "IJ37012", "aparNoSet": [ "CVE-2021-38994", "CVE-2021-38995", "IJ37012", "IJ37053", "IJ37776" ], "fixedIn": "3.1.2.40", "ifixes": [ "IJ37776m1a.220215.epkg.Z", "IJ37776m2a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.3" ], "issued": "20220223", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar", "cvss": [ "CVE-2021-38994:6.2", "CVE-2021-38995:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14" ], "apAbstract": "Vulnerabilities in the AIX kernel", "aparNo": "IJ37012", "aparNoSet": [ "CVE-2021-38994", "CVE-2021-38995", "IJ37012", "IJ37053", "IJ37776" ], "fixedIn": "3.1.3.20", "ifixes": [ "IJ37012m3a.220215.epkg.Z", "IJ37012m3b.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc", "filesets": [ "bos.mp64:7.2.5.100-7.2.5.103" ], "issued": "20220223", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar", "cvss": [ "CVE-2021-38994:6.2", "CVE-2021-38995:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-02", "7200-05-03" ], "apAbstract": "Vulnerabilities in the AIX kernel", "aparNo": "IJ37012", "aparNoSet": [ "CVE-2021-38994", "CVE-2021-38995", "IJ37012", "IJ37053", "IJ37776" ], "fixedIn": "7200-05-04", "ifixes": [ "IJ37012m3a.220215.epkg.Z", "IJ37012m3b.220215.epkg.Z", "IJ37776m1a.220215.epkg.Z", "IJ37776m2a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.3", "bos.mp64:7.2.5.100-7.2.5.103" ], "issued": "20220223", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar", "cvss": [ "CVE-2021-38994:6.2", "CVE-2021-38995:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09-2136", "7100-05-09-2148" ], "apAbstract": "There is a vulnerability in BIND that affects AIX.", "aparNo": "IJ37222", "aparNoSet": [ "CVE-2021-25219", "IJ37222" ], "fixedIn": "7100-05-10", "ifixes": [ "DEPRECATED::IJ37222s9a.220120.epkg.Z", "IJ37222m9c.220315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc", "filesets": [ "bos.net.tcp.server:7.1.5.0-7.1.5.35", "bos.net.tcp.client:7.1.5.0-7.1.5.40" ], "issued": "20220301", "updated": "20220316", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar", "cvss": [ "CVE-2021-25219:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "There is a vulnerability in BIND that affects AIX for VIOS.", "aparNo": "IJ37223", "aparNoSet": [ "CVE-2021-25219", "IJ37223", "IJ37224", "IJ37325" ], "fixedIn": "3.1.2.40", "ifixes": [ "DEPRECATED::IJ37224s3a.220120.epkg.Z", "IJ37224m3c.220315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.0-7.2.5.1", "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2", "bos.net.tcp.bind:7.2.5.100", "bos.net.tcp.bind_utils:7.2.5.100" ], "issued": "20220301", "updated": "20220316", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar", "cvss": [ "CVE-2021-25219:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14" ], "apAbstract": "There is a vulnerability in BIND that affects AIX for VIOS.", "aparNo": "IJ37223", "aparNoSet": [ "CVE-2021-25219", "IJ37223", "IJ37224", "IJ37325" ], "fixedIn": "3.1.2.40", "ifixes": [ "DEPRECATED::IJ37224s3a.220120.epkg.Z", "IJ37224m3c.220315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.0-7.2.5.1", "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2", "bos.net.tcp.bind:7.2.5.100", "bos.net.tcp.bind_utils:7.2.5.100" ], "issued": "20220301", "updated": "20220316", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar", "cvss": [ "CVE-2021-25219:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-01-2038", "7200-05-01-2039", "7200-05-02", "7200-05-02-2114", "7200-05-03-2135", "7200-05-03-2136", "7200-05-03-2148" ], "apAbstract": "There is a vulnerability in BIND that affects AIX.", "aparNo": "IJ37223", "aparNoSet": [ "CVE-2021-25219", "IJ37223", "IJ37224", "IJ37325" ], "fixedIn": "7200-05-04", "ifixes": [ "DEPRECATED::IJ37224s3a.220120.epkg.Z", "IJ37224m3c.220315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.0-7.2.5.1", "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2", "bos.net.tcp.bind:7.2.5.100", "bos.net.tcp.bind_utils:7.2.5.100" ], "issued": "20220301", "updated": "20220316", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar", "cvss": [ "CVE-2021-25219:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.30", "3.1.1.40", "3.1.1.50" ], "apAbstract": "There is a vulnerability in BIND that affects AIX for VIOS.", "aparNo": "IJ37225", "aparNoSet": [ "CVE-2021-25219", "IJ37225" ], "fixedIn": "3.1.1.60", "ifixes": [ "DEPRECATED::IJ37225s5a.220223.epkg.Z", "IJ37225m5c.220315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc", "filesets": [ "bos.net.tcp.bind:7.2.4.0-7.2.4.1", "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3" ], "issued": "20220301", "updated": "20220316", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar", "cvss": [ "CVE-2021-25219:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-03", "7200-04-04", "7200-04-05" ], "apAbstract": "There is a vulnerability in BIND that affects AIX.", "aparNo": "IJ37225", "aparNoSet": [ "CVE-2021-25219", "IJ37225" ], "fixedIn": "7200-04-06", "ifixes": [ "DEPRECATED::IJ37225s5a.220223.epkg.Z", "IJ37225m5c.220315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc", "filesets": [ "bos.net.tcp.bind:7.2.4.0-7.2.4.1", "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3" ], "issued": "20220301", "updated": "20220316", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar", "cvss": [ "CVE-2021-25219:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01" ], "apAbstract": "There is a vulnerability in BIND that affects AIX.", "aparNo": "IJ37226", "aparNoSet": [ "CVE-2021-25219", "IJ37226" ], "fixedIn": "7300-00-02", "ifixes": [ "DEPRECATED::IJ37226s1a.220120.epkg.Z", "IJ37226s1b.220315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc", "filesets": [ "bos.net.tcp.bind:7.3.0.0", "bos.net.tcp.bind:7.3.0.0" ], "issued": "20220301", "updated": "20220316", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar", "cvss": [ "CVE-2021-25219:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09" ], "apAbstract": "Vulnerabilities in AIX CAA", "aparNo": "IJ37355", "aparNoSet": [ "CVE-2021-38996", "CVE-2022-22350", "IJ37355" ], "fixedIn": "7100-05-10", "ifixes": [ "IJ37355s7a.220228.epkg.Z", "IJ37355s8a.220228.epkg.Z", "IJ37355s9a.220228.epkg.Z", "IJ37355s9b.220228.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc", "filesets": [ "bos.cluster.rte:7.1.5.0-7.1.5.38" ], "issued": "20220301", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar", "cvss": [ "CVE-2022-22350:6.2", "CVE-2021-38996:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01" ], "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension.", "aparNo": "IJ37403", "aparNoSet": [ "CVE-2021-38988", "IJ37403" ], "fixedIn": "7300-00-02", "ifixes": [ "IJ37504s5a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc", "filesets": [ "bos.pfcdd.rte:7.3.0.0" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar", "cvss": [ "CVE-2021-38988:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01" ], "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension.", "aparNo": "IJ37411", "aparNoSet": [ "CVE-2021-38989", "IJ37411" ], "fixedIn": "7300-00-02", "ifixes": [ "IJ37411s1a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc", "filesets": [ "bos.pmapi.pmsvcs:7.3.0.0" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar", "cvss": [ "CVE-2021-38989:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09-2136", "7100-05-09-2148" ], "apAbstract": "There is a vulnerability in the AIX nimsh daemon.", "aparNo": "IJ37419", "aparNoSet": [ "CVE-2022-22351", "IJ37419" ], "fixedIn": "7100-05-10", "ifixes": [ "DEPRECATED::IJ37419s9a.220208.epkg.Z", "IJ37419m9a.220324.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc", "filesets": [ "bos.sysmgt.nim.client:7.1.5.0-7.1.5.37" ], "issued": "20220304", "updated": "20220324", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar", "cvss": [ "CVE-2022-22351:6.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09" ], "apAbstract": "Vulnerabilities in the AIX kernel", "aparNo": "IJ37452", "aparNoSet": [ "CVE-2021-38994", "CVE-2021-38995", "IJ37452" ], "fixedIn": "7100-05-10", "ifixes": [ "IJ37452m7a.220215.epkg.Z", "IJ37452m8a.220215.epkg.Z", "IJ37452s9a.220215.epkg.Z", "IJ37452s9b.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.45" ], "issued": "20220223", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar", "cvss": [ "CVE-2021-38994:6.2", "CVE-2021-38995:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.", "aparNo": "IJ37488", "aparNoSet": [ "CVE-2021-38989", "IJ37488", "IJ37778" ], "fixedIn": "3.1.2.40", "ifixes": [ "IJ37778s1a.220215.epkg.Z", "IJ37778s2a.220215.epkg.Z", "IJ37488s3a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc", "filesets": [ "bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1", "bos.pmapi.pmsvcs:7.2.5.100" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar", "cvss": [ "CVE-2021-38989:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14" ], "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.", "aparNo": "IJ37488", "aparNoSet": [ "CVE-2021-38989", "IJ37488", "IJ37778" ], "fixedIn": "3.1.3.20", "ifixes": [ "IJ37778s1a.220215.epkg.Z", "IJ37778s2a.220215.epkg.Z", "IJ37488s3a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc", "filesets": [ "bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1", "bos.pmapi.pmsvcs:7.2.5.100" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar", "cvss": [ "CVE-2021-38989:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-01-2038", "7200-05-01-2039", "7200-05-02", "7200-05-02-2114", "7200-05-03-2135", "7200-05-03-2136", "7200-05-03-2148" ], "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension.", "aparNo": "IJ37488", "aparNoSet": [ "CVE-2021-38989", "IJ37488", "IJ37778" ], "fixedIn": "7200-05-04", "ifixes": [ "IJ37778s1a.220215.epkg.Z", "IJ37778s2a.220215.epkg.Z", "IJ37488s3a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc", "filesets": [ "bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1", "bos.pmapi.pmsvcs:7.2.5.100" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar", "cvss": [ "CVE-2021-38989:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14" ], "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension for VIOS.", "aparNo": "IJ37494", "aparNoSet": [ "CVE-2021-38988", "IJ37494", "IJ37779" ], "fixedIn": "3.1.3.20", "ifixes": [ "IJ37494s3a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc", "filesets": [ "bos.pfcdd.rte:7.2.5.0" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar", "cvss": [ "CVE-2021-38988:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-01-2038", "7200-05-01-2039", "7200-05-02", "7200-05-02-2114", "7200-05-03-2135", "7200-05-03-2136", "7200-05-03-2148" ], "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension.", "aparNo": "IJ37494", "aparNoSet": [ "CVE-2021-38988", "IJ37494", "IJ37779" ], "fixedIn": "7200-05-04", "ifixes": [ "IJ37494s3a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc", "filesets": [ "bos.pfcdd.rte:7.2.5.0" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar", "cvss": [ "CVE-2021-38988:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.30", "3.1.1.40", "3.1.1.50" ], "apAbstract": "Vulnerabilities in AIX CAA", "aparNo": "IJ37496", "aparNoSet": [ "CVE-2021-38996", "CVE-2022-22350", "IJ37496" ], "fixedIn": "3.1.1.60", "ifixes": [ "IJ37496s3a.220228.epkg.Z", "IJ37496s4a.220228.epkg.Z", "IJ37496s5a.220228.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc", "filesets": [ "bos.cluster.rte:7.2.4.0-7.2.4.4" ], "issued": "20220301", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar", "cvss": [ "CVE-2022-22350:6.2", "CVE-2021-38996:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-03", "7200-04-04", "7200-04-05" ], "apAbstract": "Vulnerabilities in AIX CAA", "aparNo": "IJ37496", "aparNoSet": [ "CVE-2021-38996", "CVE-2022-22350", "IJ37496" ], "fixedIn": "7200-04-06", "ifixes": [ "IJ37496s3a.220228.epkg.Z", "IJ37496s4a.220228.epkg.Z", "IJ37496s5a.220228.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc", "filesets": [ "bos.cluster.rte:7.2.4.0-7.2.4.4" ], "issued": "20220301", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar", "cvss": [ "CVE-2022-22350:6.2", "CVE-2021-38996:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.30", "3.1.1.40", "3.1.1.50" ], "apAbstract": "Vulnerabilities in the AIX kernel", "aparNo": "IJ37501", "aparNoSet": [ "CVE-2021-38994", "CVE-2021-38995", "IJ37501" ], "fixedIn": "3.1.1.60", "ifixes": [ "IJ37501m3a.220215.epkg.Z", "IJ37501m4a.220215.epkg.Z", "IJ37501m5a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc", "filesets": [ "bos.mp64:7.2.4.0-7.2.4.9" ], "issued": "20220223", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar", "cvss": [ "CVE-2021-38994:6.2", "CVE-2021-38995:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-03", "7200-04-04", "7200-04-05" ], "apAbstract": "Vulnerabilities in the AIX kernel", "aparNo": "IJ37501", "aparNoSet": [ "CVE-2021-38994", "CVE-2021-38995", "IJ37501" ], "fixedIn": "7200-04-06", "ifixes": [ "IJ37501m3a.220215.epkg.Z", "IJ37501m4a.220215.epkg.Z", "IJ37501m5a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc", "filesets": [ "bos.mp64:7.2.4.0-7.2.4.9" ], "issued": "20220223", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar", "cvss": [ "CVE-2021-38994:6.2", "CVE-2021-38995:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.30", "3.1.1.40", "3.1.1.50" ], "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.", "aparNo": "IJ37503", "aparNoSet": [ "CVE-2021-38989", "IJ37503" ], "fixedIn": "3.1.1.60", "ifixes": [ "IJ37503s3a.220215.epkg.Z", "IJ37503s4a.220215.epkg.Z", "IJ37503s5a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc", "filesets": [ "bos.pmapi.pmsvcs:7.2.4.0-7.2.4.4" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar", "cvss": [ "CVE-2021-38989:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-03", "7200-04-04", "7200-04-05" ], "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension.", "aparNo": "IJ37503", "aparNoSet": [ "CVE-2021-38989", "IJ37503" ], "fixedIn": "7200-04-06", "ifixes": [ "IJ37503s3a.220215.epkg.Z", "IJ37503s4a.220215.epkg.Z", "IJ37503s5a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc", "filesets": [ "bos.pmapi.pmsvcs:7.2.4.0-7.2.4.4" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar", "cvss": [ "CVE-2021-38989:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.30", "3.1.1.40", "3.1.1.50" ], "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension for VIOS.", "aparNo": "IJ37504", "aparNoSet": [ "CVE-2021-38988", "IJ37504" ], "fixedIn": "3.1.1.60", "ifixes": [ "IJ37504s5a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc", "filesets": [ "bos.pfcdd.rte:7.2.4.0" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar", "cvss": [ "CVE-2021-38988:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-03", "7200-04-04", "7200-04-05" ], "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension.", "aparNo": "IJ37504", "aparNoSet": [ "CVE-2021-38988", "IJ37504" ], "fixedIn": "7200-04-06", "ifixes": [ "IJ37504s5a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc", "filesets": [ "bos.pfcdd.rte:7.2.4.0" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar", "cvss": [ "CVE-2021-38988:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09-2136", "7100-05-09-2148" ], "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension.", "aparNo": "IJ37507", "aparNoSet": [ "CVE-2021-38989", "IJ37507" ], "fixedIn": "7100-05-10", "ifixes": [ "IJ37507s7a.220215.epkg.Z", "IJ37507s9a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc", "filesets": [ "bos.pmapi.pmsvcs:7.1.5.0-7.1.5.36" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar", "cvss": [ "CVE-2021-38989:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09-2136", "7100-05-09-2148" ], "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension.", "aparNo": "IJ37508", "aparNoSet": [ "CVE-2021-38988", "IJ37508" ], "fixedIn": "7100-05-10", "ifixes": [ "IJ37508s9a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc", "filesets": [ "bos.pfcdd.rte:7.1.5.0-7.1.5.32" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar", "cvss": [ "CVE-2021-38988:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.30", "3.1.1.40", "3.1.1.50" ], "apAbstract": "There is a vulnerability in the AIX nimsh daemon for VIOS.", "aparNo": "IJ37705", "aparNoSet": [ "CVE-2022-22351", "IJ37705" ], "fixedIn": "3.1.1.60", "ifixes": [ "DEPRECATED::IJ37705s4a.220208.epkg.Z", "DEPRECATED::IJ37705s5a.220208.epkg.Z", "IJ37705m4a.220324.epkg.Z", "IJ37705m5a.220324.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc", "filesets": [ "bos.sysmgt.nim.client:7.2.4.0-7.2.4.4" ], "issued": "20220304", "updated": "20220324", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar", "cvss": [ "CVE-2022-22351:6.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-03", "7200-04-04", "7200-04-05" ], "apAbstract": "There is a vulnerability in the AIX nimsh daemon.", "aparNo": "IJ37705", "aparNoSet": [ "CVE-2022-22351", "IJ37705" ], "fixedIn": "7200-04-06", "ifixes": [ "DEPRECATED::IJ37705s4a.220208.epkg.Z", "DEPRECATED::IJ37705s5a.220208.epkg.Z", "IJ37705m4a.220324.epkg.Z", "IJ37705m5a.220324.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc", "filesets": [ "bos.sysmgt.nim.client:7.2.4.0-7.2.4.4" ], "issued": "20220304", "updated": "20220324", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar", "cvss": [ "CVE-2022-22351:6.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension for VIOS.", "aparNo": "IJ37779", "aparNoSet": [ "CVE-2021-38988", "IJ37494", "IJ37779" ], "fixedIn": "3.1.2.40", "ifixes": [ "IJ37494s3a.220215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc", "filesets": [ "bos.pfcdd.rte:7.2.5.0" ], "issued": "20220304", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar", "cvss": [ "CVE-2021-38988:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09-2136", "7100-05-09-2148" ], "apAbstract": "There is a vulnerability in the AIX audit user commands.", "aparNo": "IJ38113", "aparNoSet": [ "CVE-2021-38955", "IJ38113" ], "fixedIn": "7100-05-10", "ifixes": [ "IJ38113m9a.220227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc", "filesets": [ "bos.rte.security:7.1.5.0-7.1.5.37" ], "issued": "20220228", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar", "cvss": [ "CVE-2021-38955:4.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.30", "3.1.1.40", "3.1.1.50" ], "apAbstract": "There is a vulnerability in the AIX audit user commands for VIOS.", "aparNo": "IJ38115", "aparNoSet": [ "CVE-2021-38955", "IJ38115" ], "fixedIn": "3.1.1.60", "ifixes": [ "IJ38115m5a.220227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc", "filesets": [ "bos.rte.security:7.2.4.0-7.2.4.4" ], "issued": "20220228", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar", "cvss": [ "CVE-2021-38955:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-03", "7200-04-04", "7200-04-05" ], "apAbstract": "There is a vulnerability in the AIX audit user commands.", "aparNo": "IJ38115", "aparNoSet": [ "CVE-2021-38955", "IJ38115" ], "fixedIn": "7200-04-06", "ifixes": [ "IJ38115m5a.220227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc", "filesets": [ "bos.rte.security:7.2.4.0-7.2.4.4" ], "issued": "20220228", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar", "cvss": [ "CVE-2021-38955:4.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "There is a vulnerability in the AIX audit user commands.", "aparNo": "IJ38117", "aparNoSet": [ "CVE-2021-38955", "IJ38117", "IJ38119" ], "fixedIn": "3.1.2.40", "ifixes": [ "IJ38119m2a.220227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc", "filesets": [ "bos.rte.security:7.2.5.0-7.2.5.2" ], "issued": "20220228", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar", "cvss": [ "CVE-2021-38955:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-01-2038", "7200-05-01-2039", "7200-05-02", "7200-05-02-2114", "7200-05-03-2135", "7200-05-03-2136", "7200-05-03-2148" ], "apAbstract": "There is a vulnerability in the AIX audit user commands.", "aparNo": "IJ38117", "aparNoSet": [ "CVE-2021-38955", "IJ38117", "IJ38119" ], "fixedIn": "7200-05-04", "ifixes": [ "IJ38119m2a.220227.epkg.Z", "IJ38117m3a.220227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc", "filesets": [ "bos.rte.security:7.2.5.0-7.2.5.2", "bos.rte.security:7.2.5.100-7.2.5.101" ], "issued": "20220228", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar", "cvss": [ "CVE-2021-38955:4.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14" ], "apAbstract": "There is a vulnerability in the AIX audit user commands.", "aparNo": "IJ38119", "aparNoSet": [ "CVE-2021-38955", "IJ38117", "IJ38119" ], "fixedIn": "3.1.3.20", "ifixes": [ "IJ38117m3a.220227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc", "filesets": [ "bos.rte.security:7.2.5.100-7.2.5.101" ], "issued": "20220228", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar", "cvss": [ "CVE-2021-38955:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01" ], "apAbstract": "There is a vulnerability in the AIX audit user commands.", "aparNo": "IJ38121", "aparNoSet": [ "CVE-2021-38955", "IJ38121" ], "fixedIn": "7300-00-02", "ifixes": [ "IJ38121m1a.220227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc", "filesets": [ "bos.rte.security:7.3.0.0" ], "issued": "20220228", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar", "cvss": [ "CVE-2021-38955:4.4" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7300-00-00", "7300-00-01", "7300-00-01-2148" ], "apAbstract": "AIX 7.3 changed some performance tuning commands default output", "aparNo": "IJ38518", "aparNoSet": [ "IJ38518" ], "fixedIn": "7300-00-02", "ifixes": [ "IJ38518s1b.220314.AIX73TL00SP00-01.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6563017", "filesets": [ "bos.perf.tune:7.3.0.0" ], "issued": "20220323", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij38518/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09", "7100-05-10" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ39868", "aparNoSet": [ "CVE-2022-22444", "IJ39868", "IJ44552" ], "fixedIn": "7100-05-11", "ifixes": [ "IJ39868s9a.220506.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc", "filesets": [ "bos.rte.printers:7.1.5.0-7.1.5.33" ], "issued": "20220615", "updated": "20220913", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar", "cvss": [ "CVE-2022-22444:6.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.30", "3.1.1.40", "3.1.1.50" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ39875", "aparNoSet": [ "CVE-2022-22444", "IJ39875" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ39875s5a.220506.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc", "filesets": [ "bos.rte.printers:7.2.4.0-7.2.4.1" ], "issued": "20220615", "updated": "20220913", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar", "cvss": [ "CVE-2022-22444:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-03", "7200-04-04", "7200-04-05", "7200-04-06" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ39875", "aparNoSet": [ "CVE-2022-22444", "IJ39875" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ39875s5a.220506.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc", "filesets": [ "bos.rte.printers:7.2.4.0-7.2.4.1" ], "issued": "20220615", "updated": "20220913", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar", "cvss": [ "CVE-2022-22444:6.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ39876", "aparNoSet": [ "CVE-2022-22444", "IJ39876", "IJ39878", "IJ42162", "IJ44559", "IJ44615" ], "fixedIn": "3.1.2.50", "ifixes": [ "IJ39878s2a.220506.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc", "filesets": [ "bos.rte.printers:7.2.5.0-7.2.5.1" ], "issued": "20220615", "updated": "20220913", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar", "cvss": [ "CVE-2022-22444:6.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ39876", "aparNoSet": [ "CVE-2022-22444", "IJ39876", "IJ39878", "IJ42162", "IJ44559", "IJ44615" ], "fixedIn": "3.1.3.30", "ifixes": [ "IJ39876s3a.220506.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc", "filesets": [ "bos.rte.printers:7.2.5.100-7.2.5.100" ], "issued": "20220615", "updated": "20220913", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar", "cvss": [ "CVE-2022-22444:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-01", "7200-05-02", "7200-05-03", "7200-05-04" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ39876", "aparNoSet": [ "CVE-2022-22444", "IJ39876", "IJ39878", "IJ42162", "IJ44559", "IJ44615" ], "fixedIn": "7200-05-05", "ifixes": [ "IJ39876s3a.220506.epkg.Z", "IJ39878s2a.220506.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc", "filesets": [ "bos.rte.printers:7.2.5.0-7.2.5.1", "bos.rte.printers:7.2.5.100-7.2.5.100" ], "issued": "20220615", "updated": "20220913", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar", "cvss": [ "CVE-2022-22444:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ39877", "aparNoSet": [ "CVE-2022-22444", "IJ39877", "IJ42800", "IJ44562" ], "fixedIn": "7300-00-03", "ifixes": [ "IJ39877s1a.220506.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc", "filesets": [ "bos.rte.printers:7.3.0.0-7.3.0.0" ], "issued": "20220615", "updated": "20220913", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar", "cvss": [ "CVE-2022-22444:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02" ], "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND", "aparNo": "IJ40614", "aparNoSet": [ "CVE-2021-25220", "IJ40614" ], "fixedIn": "7300-00-03", "ifixes": [ "IJ40614m2b.220718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc", "filesets": [ "bos.net.tcp.bind_utils:7.3.0.0-7.3.0.1" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar", "cvss": [ "CVE-2021-25220:6.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-02", "7200-05-02-2114", "7200-05-03-2135", "7200-05-03-2136", "7200-05-03-2148", "7200-05-04" ], "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND", "aparNo": "IJ40615", "aparNoSet": [ "CVE-2021-25220", "IJ40615", "IJ40674" ], "fixedIn": "7200-05-05", "ifixes": [ "IJ40615m4b.220718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.0-7.2.5.1", "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2", "bos.net.tcp.bind:7.2.5.100-7.2.5.101", "bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar", "cvss": [ "CVE-2021-25220:6.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21", "3.1.2.30" ], "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND", "aparNo": "IJ40616", "aparNoSet": [ "CVE-2021-25220", "IJ40615", "IJ40616", "IJ40674", "IJ41139" ], "fixedIn": "3.1.2.40", "ifixes": [ "IJ40615m4b.220718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.0-7.2.5.1", "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2", "bos.net.tcp.bind:7.2.5.100-7.2.5.101", "bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar", "cvss": [ "CVE-2021-25220:6.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND", "aparNo": "IJ40616", "aparNoSet": [ "CVE-2021-25220", "IJ40615", "IJ40616", "IJ40674", "IJ41139" ], "fixedIn": "3.1.3.30", "ifixes": [ "IJ40615m4b.220718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.0-7.2.5.1", "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2", "bos.net.tcp.bind:7.2.5.100-7.2.5.101", "bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar", "cvss": [ "CVE-2021-25220:6.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.30", "3.1.1.40", "3.1.1.50" ], "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND", "aparNo": "IJ40616", "aparNoSet": [ "CVE-2021-25220", "IJ40615", "IJ40616", "IJ41139" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ40616m5b.220718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc", "filesets": [ "bos.net.tcp.bind:7.2.4.0-7.2.4.1", "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar", "cvss": [ "CVE-2021-25220:6.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-03", "7200-04-04", "7200-04-05" ], "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND", "aparNo": "IJ40616", "aparNoSet": [ "CVE-2021-25220", "IJ40616" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ40616m5b.220718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc", "filesets": [ "bos.net.tcp.bind:7.2.4.0-7.2.4.1", "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar", "cvss": [ "CVE-2021-25220:6.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-07", "7100-05-08", "7100-05-09-2136", "7100-05-09-2148" ], "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND", "aparNo": "IJ40617", "aparNoSet": [ "CVE-2021-25220", "IJ40617" ], "fixedIn": "7100-05-11", "ifixes": [ "IJ40617m9b.220718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc", "filesets": [ "bos.net.tcp.server:7.1.5.0-7.1.5.35", "bos.net.tcp.client:7.1.5.0-7.1.5.40" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar", "cvss": [ "CVE-2021-25220:6.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.10", "3.1.2.21", "3.1.2.30" ], "apAbstract": "IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service", "aparNo": "IJ40951", "aparNoSet": [ "CVE-2022-35643", "IJ40951" ], "fixedIn": "3.1.2.50", "ifixes": [ "IJ40951s1a.220711.epkg.Z", "IJ40951s2a.220711.epkg.Z", "IJ40951s3a.220711.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc", "filesets": [ "devices.vtdev.scsi.rte:7.2.5.0-7.2.5.3" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar", "cvss": [ "CVE-2022-35643:9.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service", "aparNo": "IJ40952", "aparNoSet": [ "CVE-2022-35643", "IJ40952" ], "fixedIn": "3.1.3.30", "ifixes": [ "IJ40952s3b.220712.epkg.Z", "IJ40952s3a.220712.epkg.Z", "IJ40952s4a.220712.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc", "filesets": [ "devices.vtdev.scsi.rte:7.2.5.100", "devices.vtdev.scsi.rte:7.2.5.102" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar", "cvss": [ "CVE-2022-35643:9.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.30", "3.1.1.40", "3.1.1.50" ], "apAbstract": "IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service", "aparNo": "IJ40954", "aparNoSet": [ "CVE-2022-35643", "IJ40954" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ40954s3a.220711.epkg.Z", "IJ40954s4a.220711.epkg.Z", "IJ40954s5a.220711.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc", "filesets": [ "devices.vtdev.scsi.rte:7.2.4.0-7.2.4.4" ], "issued": "20220728", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar", "cvss": [ "CVE-2022-35643:9.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-02", "7200-05-03", "7200-05-04" ], "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability", "aparNo": "IJ41396", "aparNoSet": [ "CVE-2022-34356", "IJ41396", "IJ41685", "IJ41795" ], "fixedIn": "7200-05-05", "ifixes": [ "IJ41685m3a.220810.epkg.Z", "IJ41685m3b.220812.epkg.Z", "IJ41685s4a.220809.epkg.Z", "IJ41795m2a.220812.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.5", "bos.mp64:7.2.5.100-7.2.5.105" ], "issued": "20220912", "updated": "20221010", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar", "cvss": [ "CVE-2022-34356:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40" ], "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability", "aparNo": "IJ41685", "aparNoSet": [ "CVE-2022-34356", "IJ41396", "IJ41685", "IJ41795" ], "fixedIn": "3.1.2.50", "ifixes": [ "IJ41795m2a.220812.epkg.Z", "IJ41795m3a.221010.epkg.Z", "IJ41795s4a.221010.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.5" ], "issued": "20220912", "updated": "20221010", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar", "cvss": [ "CVE-2022-34356:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability", "aparNo": "IJ41685", "aparNoSet": [ "CVE-2022-34356", "IJ41396", "IJ41685", "IJ41795" ], "fixedIn": "3.1.3.30", "ifixes": [ "IJ41685m3a.220810.epkg.Z", "IJ41685m3b.220812.epkg.Z", "IJ41685s4a.220809.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc", "filesets": [ "bos.mp64:7.2.5.100-7.2.5.105" ], "issued": "20220912", "updated": "20221010", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar", "cvss": [ "CVE-2022-34356:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02" ], "apAbstract": "AIX kernel is vulnerable to a privilege escalation vulnerability", "aparNo": "IJ41687", "aparNoSet": [ "CVE-2022-34356", "IJ41687" ], "fixedIn": "7300-00-03", "ifixes": [ "IJ41687m1a.220810.epkg.Z", "IJ41687s2a.220809.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc", "filesets": [ "bos.mp64:7.3.0.0-7.3.0.3" ], "issued": "20220912", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar", "cvss": [ "CVE-2022-34356:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10" ], "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability", "aparNo": "IJ41688", "aparNoSet": [ "CVE-2022-34356", "IJ41688" ], "fixedIn": "7100-05-11", "ifixes": [ "IJ41688m8a.220921.epkg.Z", "IJ41688m9a.220822.epkg.Z", "IJ41688m9b.220822.epkg.Z", "IJ41688sAa.220913.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.46" ], "issued": "20220912", "updated": "20221010", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar", "cvss": [ "CVE-2022-34356:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.40", "3.1.1.50", "3.1.1.60" ], "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability", "aparNo": "IJ41706", "aparNoSet": [ "CVE-2022-34356", "IJ41706" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ41706m4a.220812.epkg.Z", "IJ41706m5a.220810.epkg.Z", "IJ41706s6a.220912.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc", "filesets": [ "bos.mp64:7.2.4.0-7.2.4.10" ], "issued": "20220912", "updated": "20221010", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar", "cvss": [ "CVE-2022-34356:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-04", "7200-04-05", "7200-04-06" ], "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability", "aparNo": "IJ41706", "aparNoSet": [ "CVE-2022-34356", "IJ41706" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ41706m4a.220812.epkg.Z", "IJ41706m5a.220810.epkg.Z", "IJ41706s6a.220912.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc", "filesets": [ "bos.mp64:7.2.4.0-7.2.4.10" ], "issued": "20220912", "updated": "20221010", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar", "cvss": [ "CVE-2022-34356:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - TCPIP", "aparNo": "IJ41974", "aparNoSet": [ "CVE-2022-40233", "IJ41974" ], "fixedIn": "3.1.3.30", "ifixes": [ "IJ41974s3a.221025.epkg.Z", "IJ41974s3b.221213.epkg.Z", "IJ41974s4a.221017.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.net.tcp.client_core:7.2.5.100-7.2.5.104" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-40233:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-02", "7200-05-03", "7200-05-04" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - TCPIP", "aparNo": "IJ41974", "aparNoSet": [ "CVE-2022-40233", "IJ41974", "IJ43598" ], "fixedIn": "7200-05-05", "ifixes": [ "IJ43598s2b.221027.epkg.Z", "IJ41974s3a.221025.epkg.Z", "IJ41974s3b.221213.epkg.Z", "IJ41974s4a.221017.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.net.tcp.client_core:7.2.5.0-7.2.5.4", "bos.net.tcp.client_core:7.2.5.100-7.2.5.104" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-40233:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - CAA", "aparNo": "IJ41975", "aparNoSet": [ "CVE-2022-39165", "IJ41975" ], "fixedIn": "3.1.3.30", "ifixes": [ "IJ41975m3a.221027.epkg.Z", "IJ41975m3b.221212.epkg.Z", "IJ41975s4a.221017.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.cluster.rte:7.2.5.100-7.2.5.102" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-39165:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-02", "7200-05-03", "7200-05-04" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - CAA", "aparNo": "IJ41975", "aparNoSet": [ "CVE-2022-39165", "IJ41975", "IJ44115" ], "fixedIn": "7200-05-05", "ifixes": [ "IJ44115m2a.221102.epkg.Z", "IJ41975m3a.221027.epkg.Z", "IJ41975m3b.221212.epkg.Z", "IJ41975s4a.221017.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.cluster.rte:7.2.5.0-7.2.5.2", "bos.cluster.rte:7.2.5.100-7.2.5.102" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-39165:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS", "aparNo": "IJ42159", "aparNoSet": [ "CVE-2022-43380", "IJ42159" ], "fixedIn": "3.1.3.30", "ifixes": [ "IJ42159s3a.221025.epkg.Z", "IJ42159s3b.221213.epkg.Z", "IJ42159s4a.221017.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.net.nfs.client:7.2.5.100-7.2.5.101" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-43380:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-02", "7200-05-03", "7200-05-04" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS", "aparNo": "IJ42159", "aparNoSet": [ "CVE-2022-43380", "IJ42159", "IJ43674" ], "fixedIn": "7200-05-05", "ifixes": [ "IJ43674s2b.221027.epkg.Z", "IJ42159s3a.221025.epkg.Z", "IJ42159s3b.221213.epkg.Z", "IJ42159s4a.221017.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.net.nfs.client:7.2.5.0-7.2.5.3", "bos.net.nfs.client:7.2.5.100-7.2.5.101" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-43380:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ42162", "aparNoSet": [ "CVE-2022-43382", "IJ42162" ], "fixedIn": "3.1.3.30", "ifixes": [ "IJ42162m4a.221208.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc", "filesets": [ "bos.rte.printers:7.2.5.100-7.2.5.100" ], "issued": "20221215", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar", "cvss": [ "CVE-2022-43382:6.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "AIX is affected by a root privilege escalation vulnerability", "aparNo": "IJ42163", "aparNoSet": [ "CVE-2022-41290", "IJ42163" ], "fixedIn": "3.1.3.30", "ifixes": [ "IJ42163m4a.221213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc", "filesets": [ "bos.rte.install:7.2.5.100-7.2.5.105" ], "issued": "20221214", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar", "cvss": [ "CVE-2022-41290:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-03", "7200-05-04" ], "apAbstract": "AIX is affected by a root privilege escalation vulnerability", "aparNo": "IJ42163", "aparNoSet": [ "CVE-2022-41290", "IJ42163" ], "fixedIn": "7200-05-05", "ifixes": [ "IJ42163m4a.221213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc", "filesets": [ "bos.rte.install:7.2.5.0-7.2.5.5", "bos.rte.install:7.2.5.100-7.2.5.105" ], "issued": "20221214", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar", "cvss": [ "CVE-2022-41290:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10" ], "apAbstract": "AIX is affected by a root privilege escalation vulnerability", "aparNo": "IJ42230", "aparNoSet": [ "CVE-2022-41290", "IJ42230" ], "fixedIn": "7100-05-11", "ifixes": [ "IJ42230mAa.221208.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc", "filesets": [ "bos.rte.install:7.1.5.0-7.1.5.48" ], "issued": "20221214", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar", "cvss": [ "CVE-2022-41290:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40" ], "apAbstract": "AIX is affected by a root privilege escalation vulnerability", "aparNo": "IJ42232", "aparNoSet": [ "CVE-2022-41290", "IJ42232" ], "fixedIn": "3.1.2.50", "ifixes": [ "IJ42232m2a.221213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc", "filesets": [ "bos.rte.install:7.2.5.0-7.2.5.5" ], "issued": "20221214", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar", "cvss": [ "CVE-2022-41290:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02" ], "apAbstract": "AIX is affected by a root privilege escalation vulnerability", "aparNo": "IJ42234", "aparNoSet": [ "CVE-2022-41290", "IJ42234" ], "fixedIn": "7300-00-03", "ifixes": [ "IJ42234m2a.221213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc", "filesets": [ "bos.rte.install:7.3.0.0-7.3.0.3" ], "issued": "20221214", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar", "cvss": [ "CVE-2022-41290:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ42341", "aparNoSet": [ "CVE-2022-29824", "IJ42341" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ42341s2a.220907.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc", "filesets": [ "bos.rte.control:7.3.0.0-7.3.0.1" ], "issued": "20220912", "updated": "20221212", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar", "cvss": [ "CVE-2022-29824:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ42379", "aparNoSet": [ "CVE-2022-29824", "IJ42339", "IJ42378", "IJ42379" ], "fixedIn": "3.1.2.60", "ifixes": [ "IJ42378s2a.220909.epkg.Z", "IJ42378s2a.221010.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc", "filesets": [ "bos.rte.control:7.2.5.0-7.2.5.4" ], "issued": "20220912", "updated": "20221212", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar", "cvss": [ "CVE-2022-29824:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ42379", "aparNoSet": [ "CVE-2022-29824", "IJ42339", "IJ42378", "IJ42379" ], "fixedIn": "3.1.3.40", "ifixes": [ "IJ42379s4a.220909.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc", "filesets": [ "bos.rte.control:7.2.5.100-7.2.5.101" ], "issued": "20220912", "updated": "20221212", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar", "cvss": [ "CVE-2022-29824:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ42379", "aparNoSet": [ "CVE-2022-29824", "IJ42339", "IJ42378", "IJ42379" ], "fixedIn": "3.1.4.20", "ifixes": [ "IJ42339s5a.221212.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc", "filesets": [ "bos.rte.control:7.2.5.200-7.2.5.200" ], "issued": "20220912", "updated": "20221212", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar", "cvss": [ "CVE-2022-29824:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-02", "7200-05-03", "7200-05-04", "7200-05-05" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ42379", "aparNoSet": [ "CVE-2022-29824", "IJ42339", "IJ42378", "IJ42379" ], "fixedIn": "7200-05-06", "ifixes": [ "IJ42339s2a.220909.epkg.Z", "IJ42339s4a.220907.epkg.Z", "IJ42339s5a.221212.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc", "filesets": [ "bos.rte.control:7.2.5.0-7.2.5.4", "bos.rte.control:7.2.5.100-7.2.5.101", "bos.rte.control:7.2.5.200-7.2.5.200" ], "issued": "20220912", "updated": "20221212", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar", "cvss": [ "CVE-2022-29824:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.1.40", "3.1.1.50", "3.1.1.60" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ42381", "aparNoSet": [ "CVE-2022-29824", "IJ42381" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ42381s6a.220909.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc", "filesets": [ "bos.rte.control:7.2.4.0-7.2.4.5" ], "issued": "20220912", "updated": "20221212", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar", "cvss": [ "CVE-2022-29824:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-04-04", "7200-04-05", "7200-04-06" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ42381", "aparNoSet": [ "CVE-2022-29824", "IJ42381" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ42381s6a.220909.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc", "filesets": [ "bos.rte.control:7.2.4.0-7.2.4.5" ], "issued": "20220912", "updated": "20221212", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar", "cvss": [ "CVE-2022-29824:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40" ], "apAbstract": "AIX is vulnerable to a buffer overflow due to X11", "aparNo": "IJ42677", "aparNoSet": [ "CVE-2022-47990", "IJ42677", "IJ43218", "IJ43599" ], "fixedIn": "3.1.2.50", "ifixes": [ "IJ43599s2a.221227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc", "filesets": [ "X11.base.lib:7.2.5.0-7.2.5.1" ], "issued": "20230117", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar", "cvss": [ "CVE-2022-47990:6.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21" ], "apAbstract": "AIX is vulnerable to a buffer overflow due to X11", "aparNo": "IJ42677", "aparNoSet": [ "CVE-2022-47990", "IJ42677", "IJ43218", "IJ43599" ], "fixedIn": "3.1.3.30", "ifixes": [ "IJ43218s4a.221227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc", "filesets": [ "X11.base.lib:7.2.5.100-7.2.5.100" ], "issued": "20230117", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar", "cvss": [ "CVE-2022-47990:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-03", "7200-05-04" ], "apAbstract": "AIX is vulnerable to a buffer overflow due to X11", "aparNo": "IJ42677", "aparNoSet": [ "CVE-2022-47990", "IJ42677", "IJ43218", "IJ43599" ], "fixedIn": "7200-05-05", "ifixes": [ "IJ42677s4a.221227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc", "filesets": [ "X11.base.lib:7.2.5.0-7.2.5.1", "X11.base.lib:7.2.5.100-7.2.5.100" ], "issued": "20230117", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar", "cvss": [ "CVE-2022-47990:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02", "7300-00-03" ], "apAbstract": "IX is vulnerable to a denial of service due to lpd", "aparNo": "IJ42800", "aparNoSet": [ "CVE-2022-43382", "IJ42800", "IJ44562" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ42800m2a.221208.epkg.Z", "IJ44562s3a.230314.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc", "filesets": [ "bos.rte.printers:7.3.0.0-7.3.0.0", "printers.rte:7.3.0.0-7.3.0.1" ], "issued": "20221215", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar", "cvss": [ "CVE-2022-43382:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - TCPIP", "aparNo": "IJ42937", "aparNoSet": [ "CVE-2022-40233", "IJ42937" ], "fixedIn": "7300-00-03", "ifixes": [ "IJ42937s1a.221027.epkg.Z", "IJ42937s2a.221018.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.net.tcp.client_core:7.3.0.0-7.3.0.2" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-40233:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - CAA", "aparNo": "IJ42938", "aparNoSet": [ "CVE-2022-39165", "IJ42938" ], "fixedIn": "7300-00-03", "ifixes": [ "IJ42938m1a.221027.epkg.Z", "IJ42938s2a.221018.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.cluster.rte:7.3.0.0-7.3.0.1" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-39165:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02" ], "apAbstract": "AIX is vulnerable to a buffer overflow due to X11", "aparNo": "IJ42939", "aparNoSet": [ "CVE-2022-47990", "IJ42939" ], "fixedIn": "7300-00-03", "ifixes": [ "IJ42939s2a.221227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc", "filesets": [ "X11.base.lib:7.3.0.0-7.3.0.0" ], "issued": "20230117", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar", "cvss": [ "CVE-2022-47990:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10", "7100-05-11" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS", "aparNo": "IJ43072", "aparNoSet": [ "CVE-2022-43380", "IJ43072" ], "fixedIn": "7100-05-11", "ifixes": [ "IJ43072s8a.221110.epkg.Z", "IJ43072sAa.221024.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.net.nfs.client:7.1.5.0-7.1.5.38" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-43380:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10" ], "apAbstract": "AIX is vulnerable to a buffer overflow due to X11", "aparNo": "IJ43073", "aparNoSet": [ "CVE-2022-47990", "IJ43073" ], "fixedIn": "7100-05-11", "ifixes": [ "IJ43073sAa.221227.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc", "filesets": [ "X11.base.lib:7.1.5.0-7.1.5.34" ], "issued": "20230117", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar", "cvss": [ "CVE-2022-47990:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - TCPIP", "aparNo": "IJ43098", "aparNoSet": [ "CVE-2022-40233", "IJ43098" ], "fixedIn": "7100-05-11", "ifixes": [ "IJ43098s8a.221110.epkg.Z", "IJ43098s9a.221102.epkg.Z", "IJ43098s9b.221213.epkg.Z", "IJ43098sAa.221024.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.41" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-40233:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - CAA", "aparNo": "IJ43099", "aparNoSet": [ "CVE-2022-39165", "IJ43099" ], "fixedIn": "7100-05-11", "ifixes": [ "IJ43099m8a.221110.epkg.Z", "IJ43099m9a.221102.epkg.Z", "IJ43099m9b.221213.epkg.Z", "IJ43099sAa.221024.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.cluster.rte:7.1.5.0-7.1.5.39" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-39165:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS", "aparNo": "IJ43468", "aparNoSet": [ "CVE-2022-43380", "IJ43468" ], "fixedIn": "7300-00-03", "ifixes": [ "IJ43468s1a.221025.epkg.Z", "IJ43468s2a.221017.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.net.nfs.client:7.3.0.0-7.3.0.1" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-43380:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - TCPIP", "aparNo": "IJ43598", "aparNoSet": [ "CVE-2022-40233", "IJ43598" ], "fixedIn": "3.1.2.50", "ifixes": [ "IJ43598s2b.221027.epkg.Z", "IJ43598s2c.221213.epkg.Z", "IJ43598s2d.221213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.net.tcp.client_core:7.2.5.0-7.2.5.4" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-40233:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS", "aparNo": "IJ43674", "aparNoSet": [ "CVE-2022-43380", "IJ43674" ], "fixedIn": "3.1.2.50", "ifixes": [ "IJ43674s2b.221027.epkg.Z", "IJ43674s2c.221213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.net.nfs.client:7.2.5.0-7.2.5.3" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-43380:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21", "3.1.3.30" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ43869", "aparNoSet": [ "CVE-2022-39164", "IJ43869", "IJ45541" ], "fixedIn": "3.1.3.40", "ifixes": [ "IJ43869m3a.221025.epkg.Z", "IJ43869m3b.221212.epkg.Z", "IJ43869m4a.221017.epkg.Z", "IJ45541s3b.230404.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.mp64:7.2.5.100-7.2.5.106" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-39164:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ43869", "aparNoSet": [ "CVE-2022-39164", "IJ43869" ], "fixedIn": "3.1.4.20", "ifixes": [ "IJ43869s5a.221212.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.mp64:7.2.5.200-7.2.5.201" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-39164:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-03", "7200-05-04", "7200-05-05" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ43869", "aparNoSet": [ "CVE-2022-39164", "IJ43869" ], "fixedIn": "7200-05-06", "ifixes": [ "IJ43869m3c.230216.epkg.Z", "IJ43869m3d.230216.epkg.Z", "IJ43869m4b.230216.epkg.Z", "IJ43869m5b.230216.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.5", "bos.mp64:7.2.5.100-7.2.5.105", "bos.mp64:7.2.5.200-7.2.5.200" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-39164:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02", "7300-00-03" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ43875", "aparNoSet": [ "CVE-2022-39164", "IJ43875" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ43875m1b.230216.epkg.Z", "IJ43875m2b.230216.epkg.Z", "IJ43875s3a.230314.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.mp64:7.3.0.0-7.3.0.4" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-39164:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21", "3.1.3.30" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat", "aparNo": "IJ43876", "aparNoSet": [ "CVE-2022-43848", "IJ43876" ], "fixedIn": "3.1.3.40", "ifixes": [ "IJ43876s3a.221025.epkg.Z", "IJ43876s3b.221213.epkg.Z", "IJ43876s4a.221017.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.perf.perfstat:7.2.5.100-7.2.5.101" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-43848:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat", "aparNo": "IJ43876", "aparNoSet": [ "CVE-2022-43848", "IJ43876" ], "fixedIn": "3.1.4.20", "ifixes": [ "IJ43876s5a.221212.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.perf.perfstat:7.2.5.200-7.2.5.200" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-43848:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-02", "7200-05-03", "7200-05-04", "7200-05-05" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat", "aparNo": "IJ43876", "aparNoSet": [ "CVE-2022-43848", "IJ43876", "IJ44114" ], "fixedIn": "7200-05-06", "ifixes": [ "IJ44114s2a.221102.epkg.Z", "IJ43876s3a.221025.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.perf.perfstat:7.2.5.0-7.2.5.0", "bos.perf.perfstat:7.2.5.100-7.2.5.101", "bos.perf.perfstat:7.2.5.200-7.2.5.200" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-43848:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21", "3.1.3.30" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd", "aparNo": "IJ43877", "aparNoSet": [ "CVE-2022-43849", "IJ43877", "IJ46068" ], "fixedIn": "3.1.3.40", "ifixes": [ "IJ43877s3a.221025.epkg.Z", "IJ43877s4a.221017.epkg.Z", "IJ46068s3a.230404.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.pfcdd.rte:7.2.5.100-7.2.5.102" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-43849:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd", "aparNo": "IJ43877", "aparNoSet": [ "CVE-2022-43849", "IJ43877" ], "fixedIn": "3.1.4.20", "ifixes": [ "IJ43877s5a.230123.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.pfcdd.rte:7.2.5.200-7.2.5.200" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-43849:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-02", "7200-05-03", "7200-05-04", "7200-05-05" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd", "aparNo": "IJ43877", "aparNoSet": [ "CVE-2022-43849", "IJ43877", "IJ44116" ], "fixedIn": "7200-05-06", "ifixes": [ "IJ44116s2a.221102.epkg.Z", "IJ43877s3a.221025.epkg.Z", "IJ43877s4a.221017.epkg.Z", "IJ43877s5a.230123.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.pfcdd.rte:7.2.5.0-7.2.5.1", "bos.pfcdd.rte:7.2.5.100-7.2.5.101", "bos.pfcdd.rte:7.2.5.200-7.2.5.200" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-43849:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02", "7300-00-03" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat", "aparNo": "IJ43891", "aparNoSet": [ "CVE-2022-43848", "IJ43891" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ43891s2a.221018.epkg.Z", "IJ43891s3a.230314.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.perf.perfstat:7.3.0.0-7.3.0.1" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-43848:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02", "7300-00-03" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd", "aparNo": "IJ43893", "aparNoSet": [ "CVE-2022-43849", "IJ43893" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ43893s1a.221027.epkg.Z", "IJ43893s2a.221018.epkg.Z", "IJ43893s3a.230314.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.pfcdd.rte:7.3.0.0-7.3.0.2" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-43849:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10", "7100-05-11" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ43967", "aparNoSet": [ "CVE-2022-39164", "IJ43967" ], "fixedIn": "7100-05-12", "ifixes": [ "IJ43967m8a.221110.epkg.Z", "IJ43967m9a.221102.epkg.Z", "IJ43967m9b.221111.epkg.Z", "IJ43967mAa.221024.epkg.Z", "IJ43967sBa.230314.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.47" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-39164:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10", "7100-05-11" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat ", "aparNo": "IJ43970", "aparNoSet": [ "CVE-2022-43848", "IJ43970" ], "fixedIn": "7100-05-12", "ifixes": [ "IJ43970sAa.221024.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.perf.perfstat:7.1.5.0-7.1.5.32" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-43848:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10", "7100-05-11" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd", "aparNo": "IJ43980", "aparNoSet": [ "CVE-2022-43849", "IJ43980" ], "fixedIn": "7100-05-12", "ifixes": [ "IJ43980sAa.221024.epkg.Z", "IJ43980sBa.230314.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.pfcdd.rte:7.1.5.0-7.1.5.34" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-43849:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40", "3.1.2.50" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ43995", "aparNoSet": [ "CVE-2022-39164", "IJ43995" ], "fixedIn": "3.1.2.60", "ifixes": [ "IJ43995m2a.221025.epkg.Z", "IJ43995m2b.221027.epkg.Z", "IJ43995m2c.221212.epkg.Z", "IJ43995s5a.230404.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.6" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-39164:6.2" ], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.3.0", "3.1.3.30" ], "apAbstract": "Possible system crashes processing network traffic", "aparNo": "IJ44047", "aparNoSet": [ "IJ44047", "IJ44534" ], "fixedIn": "3.1.3.40", "ifixes": [ "IJ44047m4b.230213.AIX72TL05SP04.epkg.Z", "IJ44047m4b.230213.VIOS3.1.3.21.epkg.Z", "IJ44047m4e.230505.VIOS3.1.3.30.epkg.Z", "IJ44047m4f.230510.VIOS3.1.3.30.epkg.Z", "IJ44534m4a.230218.VIOS3.1.3.21.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545", "filesets": [ "bos.mp64:7.2.5.100-7.2.5.106", "bos.net.tcp.client_core:7.2.5.100-7.2.5.105" ], "issued": "20230217", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij44534/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40", "3.1.2.50" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat", "aparNo": "IJ44114", "aparNoSet": [ "CVE-2022-43848", "IJ44114" ], "fixedIn": "3.1.2.60", "ifixes": [ "IJ44114s2a.221102.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.perf.perfstat:7.2.5.0-7.2.5.0" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-43848:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - CAA", "aparNo": "IJ44115", "aparNoSet": [ "CVE-2022-39165", "IJ44115" ], "fixedIn": "3.1.2.50", "ifixes": [ "IJ44115m2a.221102.epkg.Z", "IJ44115m2b.221213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.cluster.rte:7.2.5.0-7.2.5.2" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-39165:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40", "3.1.2.50" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd", "aparNo": "IJ44116", "aparNoSet": [ "CVE-2022-43849", "IJ44116", "IJ46105" ], "fixedIn": "3.1.2.60", "ifixes": [ "IJ44116s2a.221102.epkg.Z", "IJ46105s5a.230404.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.pfcdd.rte:7.2.5.0-7.2.5.2" ], "issued": "20221214", "updated": "20230406", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar", "cvss": [ "CVE-2022-43849:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10", "7100-05-11" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "IJ44422", "aparNoSet": [ "CVE-2022-2795", "CVE-2022-3080", "CVE-2022-38177", "CVE-2022-38178", "IJ44422" ], "fixedIn": "7100-05-12", "ifixes": [ "IJ44422mAa.221220.epkg.Z", "IJ44422sBa.230317.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc", "filesets": [ "bos.net.tcp.client:7.1.5.0-7.1.5.42", "bos.net.tcp.server:7.1.5.0-7.1.5.35" ], "issued": "20221222", "updated": "20230405", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar", "cvss": [ "CVE-2022-38178:7.5", "CVE-2022-3080:7.5", "CVE-2022-38177:7.5", "CVE-2022-2795:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40", "3.1.2.50" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "IJ44423", "aparNoSet": [ "CVE-2022-2795", "CVE-2022-3080", "CVE-2022-38177", "CVE-2022-38178", "IJ44423" ], "fixedIn": "3.1.2.60", "ifixes": [ "IJ44423m2b.230217.epkg.Z", "IJ44423s5a.230404.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.0-7.2.5.1", "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.4" ], "issued": "20221222", "updated": "20230517", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar", "cvss": [ "CVE-2022-2795:5.3", "CVE-2022-3080:7.5", "CVE-2022-38177:7.5", "CVE-2022-38178:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21", "3.1.3.30" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "IJ44425", "aparNoSet": [ "CVE-2022-2795", "CVE-2022-3080", "CVE-2022-38177", "CVE-2022-38178", "IJ44424", "IJ44425" ], "fixedIn": "3.1.3.40", "ifixes": [ "IJ44424s3a.230404.epkg.Z", "IJ44425m4b.230217.epkg.Z", "IJ44424s5.221129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.100-7.2.5.101", "bos.net.tcp.bind_utils:7.2.5.100-7.2.5.102" ], "issued": "20221222", "updated": "20230517", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar", "cvss": [ "CVE-2022-2795:5.3", "CVE-2022-3080:7.5", "CVE-2022-38177:7.5", "CVE-2022-38178:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "IJ44425", "aparNoSet": [ "CVE-2022-2795", "CVE-2022-3080", "CVE-2022-38177", "CVE-2022-38178", "IJ44424", "IJ44425" ], "fixedIn": "3.1.4.20", "ifixes": [ "IJ44425s5b.230214.epkg.Z", "IJ44424s3a.230404.epkg.Z", "IJ44425m4b.230217.epkg.Z", "IJ44424s5.221129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.5.200-7.2.5.200" ], "issued": "20221222", "updated": "20230517", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar", "cvss": [ "CVE-2022-2795:5.3", "CVE-2022-3080:7.5", "CVE-2022-38177:7.5", "CVE-2022-38178:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05", "7200-05-03", "7200-05-04", "7200-05-05" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "IJ44425", "aparNoSet": [ "CVE-2022-2795", "CVE-2022-3080", "CVE-2022-38177", "CVE-2022-38178", "IJ44424", "IJ44425" ], "fixedIn": "7200-05-06", "ifixes": [ "IJ44424s3a.230404.epkg.Z", "IJ44425m4b.230217.epkg.Z", "IJ44424s5.221129.epkg.Z", "IJ44425s5b.230214.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.0-7.2.5.1", "bos.net.tcp.bind:7.2.5.100-7.2.5.101", "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.4", "bos.net.tcp.bind_utils:7.2.5.100-7.2.5.102", "bos.net.tcp.bind_utils:7.2.5.200-7.2.5.200" ], "issued": "20221222", "updated": "20230517", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar", "cvss": [ "CVE-2022-2795:5.3", "CVE-2022-3080:7.5", "CVE-2022-38177:7.5", "CVE-2022-38178:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-01" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "IJ44426", "aparNoSet": [ "CVE-2022-2795", "CVE-2022-3080", "CVE-2022-38177", "CVE-2022-38178", "IJ44426" ], "fixedIn": "7300-01-02", "ifixes": [ "IJ44426s2.221130.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc", "filesets": [], "issued": "20221222", "updated": "20230517", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar", "cvss": [ "CVE-2022-2795:5.3", "CVE-2022-3080:7.5", "CVE-2022-38177:7.5", "CVE-2022-38178:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02", "7300-00-03" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "IJ44427", "aparNoSet": [ "CVE-2022-2795", "CVE-2022-3080", "CVE-2022-38177", "CVE-2022-38178", "IJ44427" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ44427m2a.221220.epkg.Z", "IJ44427s3a.230317.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc", "filesets": [ "bos.net.tcp.bind_utils:7.3.0.0-7.3.0.2" ], "issued": "20221222", "updated": "20230517", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar", "cvss": [ "CVE-2022-2795:5.3", "CVE-2022-3080:7.5", "CVE-2022-38177:7.5", "CVE-2022-38178:7.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7300-00-00", "7300-00-03-2246" ], "apAbstract": "Possible system crashes processing network traffic", "aparNo": "IJ44513", "aparNoSet": [ "IJ44512", "IJ44513" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ44512m2b.230213.AIX73TL00SP02.epkg.Z", "IJ44512m3a.230423.AIX73TL00SP03.epkg.Z", "IJ44512m3b.230517.AIX73TL00SP03.epkg.Z", "IJ44513m2a.230217.AIX73TL00SP02.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545", "filesets": [ "bos.mp64:7.3.0.0-7.3.0.4", "bos.net.tcp.client_core:7.3.0.0-7.3.0.3" ], "issued": "20230217", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij44513/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-08", "7100-05-09", "7100-05-10", "7100-05-11" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ44552", "aparNoSet": [ "CVE-2022-43382", "IJ44552" ], "fixedIn": "7100-05-12", "ifixes": [ "IJ44552mAa.221208.epkg.Z", "IJ44552mBa.230313.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc", "filesets": [ "bos.rte.printers:7.1.5.0-7.1.5.34", "printers.rte:7.1.5.0-7.1.5.32" ], "issued": "20221215", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar", "cvss": [ "CVE-2022-43382:6.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ44559", "aparNoSet": [ "CVE-2022-43382", "IJ44559" ], "fixedIn": "3.1.4.20", "ifixes": [ "IJ44559m5a.221208.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc", "filesets": [ "printers.rte:7.2.5.200-7.2.5.200" ], "issued": "20221215", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar", "cvss": [ "CVE-2022-43382:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-03", "7200-05-04", "7200-05-05" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ44559", "aparNoSet": [ "CVE-2022-43382", "IJ44559" ], "fixedIn": "7200-05-06", "ifixes": [ "IJ44559m4a.221214.epkg.Z", "IJ44559m5a.221208.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc", "filesets": [ "bos.rte.printers:7.2.5.0-7.2.5.1", "bos.rte.printers:7.2.5.100-7.2.5.100", "printers.rte:7.2.5.200-7.2.5.200" ], "issued": "20221215", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar", "cvss": [ "CVE-2022-43382:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01" ], "apAbstract": "IX is vulnerable to a denial of service due to lpd", "aparNo": "IJ44564", "aparNoSet": [ "CVE-2022-43382", "IJ44564" ], "fixedIn": "7300-01-02", "ifixes": [ "IJ44564m1a.221208.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc", "filesets": [ "printers.rte:7.3.1.0-7.3.1.0" ], "issued": "20221215", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar", "cvss": [ "CVE-2022-43382:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ44594", "aparNoSet": [ "CVE-2022-39164", "IJ44594" ], "fixedIn": "7300-01-02", "ifixes": [ "IJ44594m1a.230216.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.mp64:7.3.1.0-7.3.1.1" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-39164:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat", "aparNo": "IJ44595", "aparNoSet": [ "CVE-2022-43848", "IJ44595" ], "fixedIn": "7300-01-02", "ifixes": [ "IJ44595s1a.221212.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc", "filesets": [ "bos.perf.perfstat:7.3.1.0-7.3.1.0" ], "issued": "20221214", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ", "cvss": [ "CVE-2022-43848:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40" ], "apAbstract": "AIX is vulnerable to a denial of service due to lpd", "aparNo": "IJ44615", "aparNoSet": [ "CVE-2022-43382", "IJ44615" ], "fixedIn": "3.1.2.50", "ifixes": [ "IJ44615m2a.221213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc", "filesets": [ "bos.rte.printers:7.2.5.0-7.2.5.1" ], "issued": "20221215", "updated": "20230317", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar", "cvss": [ "CVE-2022-43382:6.2" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7300-01-00", "7300-01-01-2246" ], "apAbstract": "Possible system crashes processing network traffic", "aparNo": "IJ44761", "aparNoSet": [ "IJ44749", "IJ44761" ], "fixedIn": "7300-01-02", "ifixes": [ "IJ44761m1a.230217.AIX73TL01SP01.epkg.Z", "IJ44749m1a.230210.AIX73TL01SP01.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545", "filesets": [ "bos.mp64:7.3.1.0-7.3.1.1", "bos.net.tcp.client_core:7.3.1.0-7.3.1.1" ], "issued": "20230217", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij44761/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.4.0", "3.1.4.10" ], "apAbstract": "Possible system crashes processing network traffic", "aparNo": "IJ44799", "aparNoSet": [ "IJ44047", "IJ44534", "IJ44786", "IJ44799" ], "fixedIn": "3.1.4.20", "ifixes": [ "IJ44047m4b.230213.AIX72TL05SP04.epkg.Z", "IJ44047m4b.230213.VIOS3.1.3.21.epkg.Z", "IJ44786m5b.230213.AIX72TL05SP05.epkg.Z", "IJ44786m5b.230213.VIOS3.1.4.10.epkg.Z", "IJ44534m3a.230412.AIX72TL05SP03.epkg.Z", "IJ44534m4a.230218.AIX72TL05SP04.epkg.Z", "IJ44534m4a.230218.VIOS3.1.3.21.epkg.Z", "IJ44799m5a.230218.AIX72TL05SP05.epkg.Z", "IJ44799m5a.230218.VIOS3.1.4.10.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545", "filesets": [ "bos.mp64:7.2.5.200-7.2.5.201", "bos.net.tcp.client_core:7.2.5.200-7.2.5.201" ], "issued": "20230217", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij44799/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-03-2135", "7200-05-05-2246" ], "apAbstract": "Possible system crashes processing network traffic", "aparNo": "IJ44799", "aparNoSet": [ "IJ44047", "IJ44534", "IJ44786", "IJ44799" ], "fixedIn": "7200-05-06", "ifixes": [ "IJ44047m4b.230213.AIX72TL05SP04.epkg.Z", "IJ44047m4b.230213.VIOS3.1.3.21.epkg.Z", "IJ44786m5b.230213.AIX72TL05SP05.epkg.Z", "IJ44786m5b.230213.VIOS3.1.4.10.epkg.Z", "IJ44534m3a.230412.AIX72TL05SP03.epkg.Z", "IJ44534m4a.230218.AIX72TL05SP04.epkg.Z", "IJ44534m4a.230218.VIOS3.1.3.21.epkg.Z", "IJ44799m5a.230218.AIX72TL05SP05.epkg.Z", "IJ44799m5a.230218.VIOS3.1.4.10.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545", "filesets": [ "bos.mp64:7.2.5.100-7.2.5.201", "bos.net.tcp.client_core:7.2.5.100-7.2.5.201" ], "issued": "20230217", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij44799/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01" ], "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient", "aparNo": "IJ44987", "aparNoSet": [ "CVE-2012-5783", "IJ44987" ], "fixedIn": "7300-01-02", "ifixes": [ "IJ44987s1a.230307.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc", "filesets": [ "bos.ecc_client.rte:7.3.1.0-7.3.1.0" ], "issued": "20230414", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar", "cvss": [ "CVE-2012-5783:4.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10" ], "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient", "aparNo": "IJ44994", "aparNoSet": [ "CVE-2012-5783", "IJ44994" ], "fixedIn": "3.1.4.20", "ifixes": [ "IJ44994s5a.230307.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc", "filesets": [ "bos.ecc_client.rte:7.2.5.200-7.2.5.200" ], "issued": "20230414", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar", "cvss": [ "CVE-2012-5783:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-03", "7200-05-04", "7200-05-05" ], "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient", "aparNo": "IJ44994", "aparNoSet": [ "CVE-2012-5783", "IJ44994" ], "fixedIn": "7200-05-06", "ifixes": [ "IJ44994s4a.230412.epkg.Z", "IJ44994s5a.230307.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc", "filesets": [ "bos.ecc_client.rte:7.2.5.0-7.2.5.1", "bos.ecc_client.rte:7.2.5.100-7.2.5.100", "bos.ecc_client.rte:7.2.5.200-7.2.5.200" ], "issued": "20230414", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar", "cvss": [ "CVE-2012-5783:4.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21" ], "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2", "aparNo": "IJ45056", "aparNoSet": [ "CVE-2022-40303", "CVE-2022-40304", "IJ45056" ], "fixedIn": "3.1.4.30", "ifixes": [ "IJ45056m5a.230125.epkg.Z", "IJ45056m6a.230504.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc", "filesets": [ "bos.rte.control:7.2.5.200-7.2.5.201" ], "issued": "20230208", "updated": "20230504", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar", "cvss": [ "CVE-2022-40303:7.8", "CVE-2022-40304:7.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.21", "3.1.2.30", "3.1.2.40", "3.1.2.50" ], "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2", "aparNo": "IJ45057", "aparNoSet": [ "CVE-2022-40303", "CVE-2022-40304", "IJ45057" ], "fixedIn": "3.1.2.60", "ifixes": [ "IJ45057m2a.230125.epkg.Z", "IJ45057m2b.230405.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc", "filesets": [ "bos.rte.control:7.2.5.0-7.2.5.5" ], "issued": "20230208", "updated": "20230504", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar", "cvss": [ "CVE-2022-40303:7.8", "CVE-2022-40304:7.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.10", "3.1.3.14", "3.1.3.21", "3.1.3.30" ], "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2", "aparNo": "IJ45058", "aparNoSet": [ "CVE-2022-40303", "CVE-2022-40304", "IJ45058" ], "fixedIn": "3.1.3.40", "ifixes": [ "IJ45058m4a.230125.epkg.Z", "IJ45058m4b.230405.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc", "filesets": [ "bos.rte.control:7.2.5.100-7.2.5.102" ], "issued": "20230208", "updated": "20230504", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar", "cvss": [ "CVE-2022-40303:7.8", "CVE-2022-40304:7.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-03", "7200-05-04", "7200-05-05" ], "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2", "aparNo": "IJ45058", "aparNoSet": [ "CVE-2022-40303", "CVE-2022-40304", "IJ45056", "IJ45057", "IJ45058" ], "fixedIn": "7200-05-06", "ifixes": [ "IJ45056m4a.230125.epkg.Z", "IJ45056m5a.230125.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc", "filesets": [ "bos.rte.control:7.2.5.0-7.2.5.4", "bos.rte.control:7.2.5.100-7.2.5.101", "bos.rte.control:7.2.5.200-7.2.5.200" ], "issued": "20230208", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar", "cvss": [ "CVE-2022-40303:7.8", "CVE-2022-40304:7.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02", "7300-00-03" ], "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2", "aparNo": "IJ45059", "aparNoSet": [ "CVE-2022-40303", "CVE-2022-40304", "IJ45059" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ45059m2a.230125.epkg.Z", "IJ45059m2b.230405.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc", "filesets": [ "bos.rte.control:7.3.0.0-7.3.0.2" ], "issued": "20230208", "updated": "20230405", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar", "cvss": [ "CVE-2022-40303:7.8", "CVE-2022-40304:7.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01" ], "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2", "aparNo": "IJ45060", "aparNoSet": [ "CVE-2022-40303", "CVE-2022-40304", "IJ45060" ], "fixedIn": "7300-01-03", "ifixes": [ "IJ45060s1a.230125.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc", "filesets": [ "bos.rte.control:7.3.1.0-7.3.1.0" ], "issued": "20230208", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar", "cvss": [ "CVE-2022-40303:7.8", "CVE-2022-40304:7.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-09", "7100-05-10", "7100-05-11" ], "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient", "aparNo": "IJ45221", "aparNoSet": [ "CVE-2012-5783", "IJ45221" ], "fixedIn": "7100-05-12", "ifixes": [ "IJ45221sAa.230309.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc", "filesets": [ "bos.ecc_client.rte:7.1.5.0-7.1.5.34" ], "issued": "20230414", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar", "cvss": [ "CVE-2012-5783:4.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.30", "3.1.2.40", "3.1.2.50" ], "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient", "aparNo": "IJ45222", "aparNoSet": [ "CVE-2012-5783", "IJ45222" ], "fixedIn": "3.1.2.60", "ifixes": [ "IJ45222s2a.230307.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc", "filesets": [ "bos.ecc_client.rte:7.2.5.0-7.2.5.1" ], "issued": "20230414", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar", "cvss": [ "CVE-2012-5783:4.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.14", "3.1.3.21", "3.1.3.30" ], "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient", "aparNo": "IJ45223", "aparNoSet": [ "CVE-2012-5783", "IJ45223" ], "fixedIn": "3.1.3.40", "ifixes": [ "IJ45223s4a.230307.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc", "filesets": [ "bos.ecc_client.rte:7.2.5.100-7.2.5.100" ], "issued": "20230414", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar", "cvss": [ "CVE-2012-5783:4.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02", "7300-00-03" ], "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient", "aparNo": "IJ45224", "aparNoSet": [ "CVE-2012-5783", "IJ45224" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ45224s2a.230309.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc", "filesets": [ "bos.ecc_client.rte:7.3.0.0-7.3.0.1" ], "issued": "20230414", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar", "cvss": [ "CVE-2012-5783:4.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.30", "3.1.2.40", "3.1.2.50" ], "apAbstract": "AIX is vulnerable to arbitrary command execution", "aparNo": "IJ45245", "aparNoSet": [ "CVE-2023-26286", "IJ45245", "IJ46051", "IJ46110" ], "fixedIn": "3.1.2.60", "ifixes": [ "IJ46110s3a.230323.epkg.Z", "IJ46110s4a.230323.epkg.Z", "IJ46110s5a.230407.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.6", "bos.rte.serv_aid:7.2.5.0-7.2.5.4", "bos.sysmgt.serv_aid:7.2.5.0-7.2.5.3" ], "issued": "20230412", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar", "cvss": [ "CVE-2023-26286:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.14", "3.1.3.21", "3.1.3.30" ], "apAbstract": "AIX is vulnerable to arbitrary command execution", "aparNo": "IJ45245", "aparNoSet": [ "CVE-2023-26286", "IJ45245", "IJ46051", "IJ46110" ], "fixedIn": "3.1.3.40", "ifixes": [ "IJ46051s1a.230323.epkg.Z", "IJ46051s2a.230323.epkg.Z", "IJ46051s3a.230323.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc", "filesets": [ "bos.mp64:7.2.5.100-7.2.5.106", "bos.rte.serv_aid:7.2.5.100-7.2.5.102", "bos.sysmgt.serv_aid:7.2.5.100-7.2.5.102" ], "issued": "20230412", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar", "cvss": [ "CVE-2023-26286:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10" ], "apAbstract": "AIX is vulnerable to arbitrary command execution", "aparNo": "IJ45245", "aparNoSet": [ "CVE-2023-26286", "IJ45245", "IJ46051", "IJ46110" ], "fixedIn": "3.1.4.20", "ifixes": [ "IJ45245s5a.230322.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc", "filesets": [ "bos.mp64:7.2.5.200-7.2.5.201", "bos.rte.serv_aid:7.2.5.200-7.2.5.200", "bos.sysmgt.serv_aid:7.2.5.200-7.2.5.200" ], "issued": "20230412", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar", "cvss": [ "CVE-2023-26286:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-03", "7200-05-04", "7200-05-05" ], "apAbstract": "AIX is vulnerable to arbitrary command execution", "aparNo": "IJ45245", "aparNoSet": [ "CVE-2023-26286", "IJ45245", "IJ46051", "IJ46110" ], "fixedIn": "7200-05-06", "ifixes": [ "IJ46051s1a.230323.epkg.Z", "IJ46051s2a.230323.epkg.Z", "IJ46051s3a.230323.epkg.Z", "IJ45245s3a.230324.epkg.Z", "IJ45245s4a.230324.epkg.Z", "IJ45245s5a.230322.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.6", "bos.mp64:7.2.5.100-7.2.5.106", "bos.mp64:7.2.5.200-7.2.5.201", "bos.rte.serv_aid:7.2.5.0-7.2.5.4", "bos.rte.serv_aid:7.2.5.100-7.2.5.102", "bos.rte.serv_aid:7.2.5.200-7.2.5.200", "bos.sysmgt.serv_aid:7.2.5.0-7.2.5.3", "bos.sysmgt.serv_aid:7.2.5.100-7.2.5.102", "bos.sysmgt.serv_aid:7.2.5.200-7.2.5.200" ], "issued": "20230412", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar", "cvss": [ "CVE-2023-26286:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01" ], "apAbstract": "AIX is vulnerable to arbitrary command execution", "aparNo": "IJ45246", "aparNoSet": [ "CVE-2023-26286", "IJ45246" ], "fixedIn": "7300-01-02", "ifixes": [ "IJ45246s1a.230322.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc", "filesets": [ "bos.mp64:7.3.1.0-7.3.1.1", "bos.rte.serv_aid:7.3.1.0-7.3.1.1", "bos.sysmgt.serv_aid:7.3.1.0-7.3.1.0" ], "issued": "20230412", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar", "cvss": [ "CVE-2023-26286:8.4" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-05-09-2135", "7100-05-11-2246" ], "apAbstract": "Possible system crashes processing network traffic", "aparNo": "IJ45294", "aparNoSet": [ "IJ45294", "IJ45295" ], "fixedIn": "7100-05-12", "ifixes": [ "IJ45294mBa.230410.AIX71TL05SP11.epkg.Z", "IJ45295mAa.230210.AIX71TL05SP10.epkg.Z", "IJ45294mAa.230218.AIX71TL05SP10.epkg.Z", "IJ45294mBa.230410.AIX71TL05SP11.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545", "filesets": [ "bos.mp64:7.1.5.43-7.1.5.47", "bos.net.tcp.client:7.1.5.38-7.1.5.42" ], "issued": "20230217", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/support/pages/apar/IJ45294/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.2.30", "3.1.2.50" ], "apAbstract": "Possible system crashes processing network traffic", "aparNo": "IJ45427", "aparNoSet": [ "IJ45427", "IJ45429" ], "fixedIn": "3.1.2.60", "ifixes": [ "IJ45427m4a.230217.VIOS3.1.2.40.epkg.Z", "IJ45427m2a.230509.VIOS3.1.2.50.epkg.Z", "IJ45429m4a.230218.VIOS3.1.2.40.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545", "filesets": [ "bos.mp64:7.2.5.4-7.2.5.6", "bos.net.tcp.client_core:7.2.5.5-7.2.5.7" ], "issued": "20230217", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij45429/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-05-09", "7100-05-10", "7100-05-11" ], "apAbstract": "AIX is vulnerable to arbitrary command execution", "aparNo": "IJ45981", "aparNoSet": [ "CVE-2023-26286", "IJ45981" ], "fixedIn": "7100-05-12", "ifixes": [ "IJ45981s9a.230324.epkg.Z", "IJ45981sAa.230323.epkg.Z", "IJ45981sBa.230407.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc", "filesets": [ "bos.mp64:7.1.5.0-7.1.5.47", "bos.rte.serv_aid:7.1.5.0-7.1.5.36" ], "issued": "20230412", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar", "cvss": [ "CVE-2023-26286:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-01", "7300-00-02", "7300-00-03" ], "apAbstract": "AIX is vulnerable to arbitrary command execution", "aparNo": "IJ45997", "aparNoSet": [ "CVE-2023-26286", "IJ45997" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ45997s1a.230322.epkg.Z", "IJ45997s2a.230322.epkg.Z", "IJ45997s3a.230322.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc", "filesets": [ "bos.mp64:7.3.0.0-7.3.0.4", "bos.rte.serv_aid:7.3.0.0-7.3.0.2", "bos.sysmgt.serv_aid:7.3.0.0-7.3.0.1" ], "issued": "20230412", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar", "cvss": [ "CVE-2023-26286:8.4" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7300-00-00", "7300-00-01-2038", "7300-00-02-2114", "7300-00-03-2136", "7300-00-03-2148", "7300-00-04-2220", "7300-00-03-2246", "7300-00-06-2320" ], "apAbstract": "Potential undetected data loss after running chvg -ky or chvg -g", "aparNo": "IJ46487", "aparNoSet": [ "IJ46487" ], "fixedIn": "7300-00-04", "ifixes": [ "IJ46487s1a.230425.AIX73TL00SP01.epkg.Z", "IJ46487s2a.230425.AIX73TL00SP02.epkg.Z", "IJ46487s3a.230424.AIX73TL00SP03.epkg.Z", "IJ46541s5a.230424.AIX72TL05SP05.epkg.Z", "IJ46541s6a.230503.AIX72TL05SP06.epkg.Z", "IJ46542s1a.230424.AIX73TL01SP01.epkg.Z", "IJ46542s2a.230503.AIX73TL01SP02.epkg.Z", "IJ46576s4a.230426.AIX72TL05SP04.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6985585", "filesets": [ "bos.rte.lvm:7.3.0.0-7.3.0.2" ], "issued": "20230424", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46487/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-00", "7200-05-01-2038", "7200-05-02-2114", "7200-05-03-2136", "7200-05-03-2148", "7200-05-04-2220", "7200-05-05-2246", "7200-05-06-2320" ], "apAbstract": "Potential undetected data loss after running chvg -ky or chvg -g", "aparNo": "IJ46541", "aparNoSet": [ "IJ46541" ], "fixedIn": "7200-05-07", "ifixes": [ "IJ46487s1a.230425.AIX73TL00SP01.epkg.Z", "IJ46487s2a.230425.AIX73TL00SP02.epkg.Z", "IJ46487s3a.230424.AIX73TL00SP03.epkg.Z", "IJ46541s5a.230424.AIX72TL05SP05.epkg.Z", "IJ46541s6a.230503.AIX72TL05SP06.epkg.Z", "IJ46542s1a.230424.AIX73TL01SP01.epkg.Z", "IJ46542s2a.230503.AIX73TL01SP02.epkg.Z", "IJ46576s4a.230426.AIX72TL05SP04.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6985585", "filesets": [ "bos.rte.lvm:7.2.5.0-7.2.5.201" ], "issued": "20230424", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46487/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7300-01-00", "7300-01-01-2246", "7300-01-02-2320" ], "apAbstract": "Potential undetected data loss after running chvg -ky or chvg -g", "aparNo": "IJ46542", "aparNoSet": [ "IJ46542" ], "fixedIn": "7300-01-03", "ifixes": [ "IJ46487s1a.230425.AIX73TL00SP01.epkg.Z", "IJ46487s2a.230425.AIX73TL00SP02.epkg.Z", "IJ46487s3a.230424.AIX73TL00SP03.epkg.Z", "IJ46541s5a.230424.AIX72TL05SP05.epkg.Z", "IJ46541s6a.230503.AIX72TL05SP06.epkg.Z", "IJ46542s1a.230424.AIX73TL01SP01.epkg.Z", "IJ46542s2a.230503.AIX73TL01SP02.epkg.Z", "IJ46576s4a.230426.AIX72TL05SP04.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/6985585", "filesets": [ "bos.rte.lvm:7.3.1.0-7.3.1.2" ], "issued": "20230424", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46487/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.4.20", "3.1.4.21" ], "apAbstract": "LDAP user logins or connections stop working", "aparNo": "IJ46694", "aparNoSet": [ "IJ46694" ], "fixedIn": "3.1.4.30", "ifixes": [ "IJ46694s6a.230509.AIX72TL05SP06.epkg.Z", "IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z", "IJ46727s2a.230509.AIX73TL01SP02.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7000043", "filesets": [ "bos.rte.security:7.2.5.201-7.2.5.201" ], "issued": "20230602", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46694/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-06-2319", "7200-05-06-2320" ], "apAbstract": "LDAP user logins or connections stop working", "aparNo": "IJ46694", "aparNoSet": [ "IJ46694" ], "fixedIn": "7200-05-07", "ifixes": [ "IJ46694s6a.230509.AIX72TL05SP06.epkg.Z", "IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z", "IJ46727s2a.230509.AIX73TL01SP02.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7000043", "filesets": [ "bos.rte.security:7.2.5.201-7.2.5.201" ], "issued": "20230602", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46694/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7300-01-02-2319", "AIX 7300-01-02-2320" ], "apAbstract": "LDAP user logins or connections stop working", "aparNo": "IJ46727", "aparNoSet": [ "IJ46727" ], "fixedIn": "7300-01-03", "ifixes": [ "IJ46694s6a.230509.AIX72TL05SP06.epkg.Z", "IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z", "IJ46727s2a.230509.AIX73TL01SP02.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7000043", "filesets": [ "bos.rte.security:7.3.1.1-7.3.1.1" ], "issued": "20230602", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46694/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ47597", "aparNoSet": [ "CVE-2023-28484", "CVE-2023-29469", "IJ47597" ], "fixedIn": "3.1.4.30", "ifixes": [ "IJ47597m6a.230717.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc", "filesets": [ "bos.rte.control:7.2.5.200-7.2.5.201" ], "issued": "20230725", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar", "cvss": [ "CVE-2023-28484:5.5", "CVE-2023-29469:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-04", "7200-05-05", "7200-05-06" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ47597", "aparNoSet": [ "CVE-2023-28484", "CVE-2023-29469", "IJ47597" ], "fixedIn": "7200-05-07", "ifixes": [ "IJ47597m4a.230718.epkg.Z", "IJ47597m6a.230717.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc", "filesets": [ "bos.rte.control:7.2.5.0-7.2.5.6", "bos.rte.control:7.2.5.100-7.2.5.103", "bos.rte.control:7.2.5.200-7.2.5.201" ], "issued": "20230725", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar", "cvss": [ "CVE-2023-28484:5.5", "CVE-2023-29469:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-02", "7300-00-03", "7300-00-04" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ47629", "aparNoSet": [ "CVE-2023-28484", "CVE-2023-29469", "IJ47629" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ47629m4a.230718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc", "filesets": [ "bos.rte.control:7.3.0.0-7.3.0.3" ], "issued": "20230725", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar", "cvss": [ "CVE-2023-28484:5.5", "CVE-2023-29469:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01", "7300-01-02" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ47630", "aparNoSet": [ "CVE-2023-28484", "CVE-2023-29469", "IJ47630" ], "fixedIn": "7300-01-03", "ifixes": [ "IJ47630m2a.230718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc", "filesets": [ "bos.rte.control:7.3.1.0-7.3.1.1" ], "issued": "20230725", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar", "cvss": [ "CVE-2023-28484:5.5", "CVE-2023-29469:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.2.40", "3.1.2.50", "3.1.2.60" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ47631", "aparNoSet": [ "CVE-2023-28484", "CVE-2023-29469", "IJ47631" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ47631m6a.230718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc", "filesets": [ "bos.rte.control:7.2.5.0-7.2.5.6" ], "issued": "20230725", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar", "cvss": [ "CVE-2023-28484:5.5", "CVE-2023-29469:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2", "aparNo": "IJ47632", "aparNoSet": [ "CVE-2023-28484", "CVE-2023-29469", "IJ47632" ], "fixedIn": "3.1.3.50", "ifixes": [ "IJ47632m4a.230718.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc", "filesets": [ "bos.rte.control:7.2.5.100-7.2.5.103" ], "issued": "20230725", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar", "cvss": [ "CVE-2023-28484:5.5", "CVE-2023-29469:5.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7300-01-00", "7300-01-02-2320" ], "apAbstract": "Potential undetected data loss by using zlibNX", "aparNo": "IJ47907", "aparNoSet": [ "IJ47907" ], "fixedIn": "7300-01-03", "ifixes": [ "IJ47907s2a.230907.AIX73TL01SP02.epkg.Z", "IJ48340s6a.230907.AIX72TL05SP06.epkg.Z", "IJ48416s4a.230907.AIX73TL00SP04.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7028659", "filesets": [ "zlibNX.rte:7.3.1.0-7.3.1.1" ], "issued": "20230911", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij47907/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21" ], "apAbstract": "AIX is vulnerable to denial of service due to AIXWindows", "aparNo": "IJ48252", "aparNoSet": [ "CVE-2023-45172", "IJ48252" ], "fixedIn": "3.1.4.30", "ifixes": [ "IJ48252s6a.230928.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc", "filesets": [ "X11.base.smt:7.2.3.0-7.2.3.15" ], "issued": "20231218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar", "cvss": [ "CVE-2023-45172:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-05", "7200-05-06" ], "apAbstract": "AIX is vulnerable to denial of service due to AIXWindows", "aparNo": "IJ48252", "aparNoSet": [ "CVE-2023-45172", "IJ48252" ], "fixedIn": "7200-05-07", "ifixes": [ "IJ48252s6a.230928.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc", "filesets": [ "X11.base.smt:7.2.3.0-7.2.3.15" ], "issued": "20231218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar", "cvss": [ "CVE-2023-45172:6.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "AIX is vulnerable to denial of service due to AIXWindows", "aparNo": "IJ48252", "aparNoSet": [ "CVE-2023-45172", "IJ48252" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ48252s6a.230928.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc", "filesets": [ "X11.base.smt:7.2.3.0-7.2.3.15" ], "issued": "20231218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar", "cvss": [ "CVE-2023-45172:6.2" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-00", "7200-05-06-2320" ], "apAbstract": "Potential undetected data loss by using zlibNX", "aparNo": "IJ48340", "aparNoSet": [ "IJ48340" ], "fixedIn": "7200-05-07", "ifixes": [ "IJ47907s2a.230907.AIX73TL01SP02.epkg.Z", "IJ48340s6a.230907.AIX72TL05SP06.epkg.Z", "IJ48416s4a.230907.AIX73TL00SP04.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7028659", "filesets": [ "zlibNX.rte:7.2.4.0-7.2.4.9" ], "issued": "20230911", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij47907/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7300-00-00", "7300-00-04-2320" ], "apAbstract": "Potential undetected data loss by using zlibNX", "aparNo": "IJ48416", "aparNoSet": [ "IJ48416" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ47907s2a.230907.AIX73TL01SP02.epkg.Z", "IJ48340s6a.230907.AIX72TL05SP06.epkg.Z", "IJ48416s4a.230907.AIX73TL00SP04.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7028659", "filesets": [ "zlibNX.rte:7.3.0.0-7.3.0.3" ], "issued": "20230911", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij47907/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21" ], "apAbstract": "AIX is vulnerable to privilege escalation and denial of service", "aparNo": "IJ48481", "aparNoSet": [ "CVE-2023-45166", "CVE-2023-45170", "CVE-2023-45174", "IJ48481" ], "fixedIn": "3.1.4.30", "ifixes": [ "IJ48481m5a.231207.epkg.Z", "IJ48481m5b.240202.epkg.Z", "IJ48481m6a.230927.epkg.Z", "IJ48481m6b.240130.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc", "filesets": [ "bos.rte.printers:7.2.5.200-7.2.5.201", "printers.rte:7.2.5.200-7.2.5.201" ], "issued": "20231212", "updated": "20240203", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar", "cvss": [ "CVE-2023-45166:8.4", "CVE-2023-45170:8.4", "CVE-2023-45174:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-05", "7200-05-06" ], "apAbstract": "AIX is vulnerable to privilege escalation and denial of service", "aparNo": "IJ48481", "aparNoSet": [ "CVE-2023-45166", "CVE-2023-45170", "CVE-2023-45174", "IJ48481" ], "fixedIn": "7200-05-07", "ifixes": [ "IJ48481m5a.231207.epkg.Z", "IJ48481m5b.240202.epkg.Z", "IJ48481m6a.230927.epkg.Z", "IJ48481m6b.240130.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc", "filesets": [ "bos.rte.printers:7.2.5.0-7.2.5.101", "bos.rte.printers:7.2.5.200-7.2.5.201", "printers.rte:7.2.5.200-7.2.5.201" ], "issued": "20231212", "updated": "20240203", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar", "cvss": [ "CVE-2023-45166:8.4", "CVE-2023-45170:8.4", "CVE-2023-45174:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01", "7300-01-02" ], "apAbstract": "AIX is vulnerable to privilege escalation and denial of service", "aparNo": "IJ48539", "aparNoSet": [ "CVE-2023-45166", "CVE-2023-45170", "CVE-2023-45174", "IJ48539" ], "fixedIn": "7300-01-03", "ifixes": [ "IJ48539m1a.231207.epkg.Z", "IJ48539m1b.240202.epkg.Z", "IJ48539m2a.230928.epkg.Z", "IJ48539m2b.240202.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc", "filesets": [ "bos.rte.printers:7.3.1.0-7.3.1.1", "printers.rte:7.3.1.0-7.3.1.1" ], "issued": "20231212", "updated": "20240203", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar", "cvss": [ "CVE-2023-45166:8.4", "CVE-2023-45170:8.4", "CVE-2023-45174:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01", "7300-01-02" ], "apAbstract": "AIX is vulnerable to denial of service due to AIXWindows", "aparNo": "IJ48540", "aparNoSet": [ "CVE-2023-45172", "IJ48540" ], "fixedIn": "7300-01-03", "ifixes": [ "IJ48540s2a.230928.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc", "filesets": [ "X11.base.smt:7.3.1.0-7.3.1.0" ], "issued": "20231218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar", "cvss": [ "CVE-2023-45172:6.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ48608", "aparNoSet": [ "CVE-2023-45171", "CVE-2023-45175", "IJ48608" ], "fixedIn": "3.1.4.30", "ifixes": [ "IJ48608m5a.231219.epkg.Z", "IJ48608m5b.240109.epkg.Z", "IJ48608s6a.230926.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.mp64:7.2.5.200-7.2.5.203" ], "issued": "20240104", "updated": "20240110", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45171:6.2", "CVE-2023-45175:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-05", "7200-05-06" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ48608", "aparNoSet": [ "CVE-2023-45171", "CVE-2023-45175", "IJ48608" ], "fixedIn": "7200-05-07", "ifixes": [ "IJ48608m5a.231219.epkg.Z", "IJ48608m5b.240109.epkg.Z", "IJ48608s6a.230926.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.7", "bos.mp64:7.2.5.100-7.2.5.107", "bos.mp64:7.2.5.200-7.2.5.203" ], "issued": "20240104", "updated": "20240110", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45171:6.2", "CVE-2023-45175:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01", "7300-01-02" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ48618", "aparNoSet": [ "CVE-2023-45171", "CVE-2023-45175", "IJ48618" ], "fixedIn": "7300-01-03", "ifixes": [ "IJ48618m1a.231219.epkg.Z", "IJ48618m1b.240109.epkg.Z", "IJ48618m2a.231213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.mp64:7.3.1.0-7.3.1.3" ], "issued": "20240104", "updated": "20240110", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45171:6.2", "CVE-2023-45175:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pmsvcs", "aparNo": "IJ48663", "aparNoSet": [ "CVE-2023-45169", "IJ48663" ], "fixedIn": "3.1.4.30", "ifixes": [ "IJ48663s5a.230926.epkg.Z", "IJ48663s6a.230926.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.pmapi.pmsvcs:7.2.5.200-7.2.5.201" ], "issued": "20240104", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45169:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-05", "7200-05-06" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pmsvcs", "aparNo": "IJ48663", "aparNoSet": [ "CVE-2023-45169", "IJ48663" ], "fixedIn": "7200-05-07", "ifixes": [ "IJ48663s5a.230926.epkg.Z", "IJ48663s6a.230926.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.pmapi.pmsvcs:7.2.5.0-7.2.5.4", "bos.pmapi.pmsvcs:7.2.5.100-7.2.5.102", "bos.pmapi.pmsvcs:7.2.5.200-7.2.5.201" ], "issued": "20240104", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45169:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS", "aparNo": "IJ48671", "aparNoSet": [ "CVE-2023-45173", "IJ48671" ], "fixedIn": "3.1.4.30", "ifixes": [ "IJ48671s6a.230927.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.net.nfs.client:7.2.5.200-7.2.5.201" ], "issued": "20240104", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45173:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-05", "7200-05-06" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS", "aparNo": "IJ48671", "aparNoSet": [ "CVE-2023-45173", "IJ48671" ], "fixedIn": "7200-05-07", "ifixes": [ "IJ48671s6a.230927.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.net.nfs.client:7.2.5.0-7.2.5.4", "bos.net.nfs.client:7.2.5.100-7.2.5.102", "bos.net.nfs.client:7.2.5.200-7.2.5.201" ], "issued": "20240104", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45173:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01", "7300-01-02" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pmsvcs", "aparNo": "IJ48724", "aparNoSet": [ "CVE-2023-45169", "IJ48724" ], "fixedIn": "7300-01-03", "ifixes": [ "IJ48724s1a.230926.epkg.Z", "IJ48724s2a.230926.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.pmapi.pmsvcs:7.3.1.0-7.3.1.1" ], "issued": "20240104", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45169:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01", "7300-01-02" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS", "aparNo": "IJ48725", "aparNoSet": [ "CVE-2023-45173", "IJ48725" ], "fixedIn": "7300-01-03", "ifixes": [ "IJ48725s1a.230927.epkg.Z", "IJ48725s2a.230927.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.net.nfs.client:7.3.1.0-7.3.1.1" ], "issued": "20240104", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45173:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-02", "7300-00-03", "7300-00-04" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ48735", "aparNoSet": [ "CVE-2023-45171", "CVE-2023-45175", "IJ48735" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ48735m2a.231219.epkg.Z", "IJ48735m2b.240109.epkg.Z", "IJ48735m3a.231219.epkg.Z", "IJ48735m3b.240109.epkg.Z", "IJ48735s4a.230926.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.mp64:7.3.0.0-7.3.0.5" ], "issued": "20240104", "updated": "20240110", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45171:6.2", "CVE-2023-45175:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-02", "7300-00-03", "7300-00-04" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pmsvcs", "aparNo": "IJ48737", "aparNoSet": [ "CVE-2023-45169", "IJ48737" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ48737s3a.230926.epkg.Z", "IJ48737s4a.230926.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.pmapi.pmsvcs:7.3.0.0-7.3.0.3" ], "issued": "20240104", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45169:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-02", "7300-00-03", "7300-00-04" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS", "aparNo": "IJ48741", "aparNoSet": [ "CVE-2023-45173", "IJ48741" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ48741m2a.231219.epkg.Z", "IJ48741s4a.230927.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.net.nfs.client:7.3.0.0-7.3.0.3" ], "issued": "20240104", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45173:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-02", "7300-00-03", "7300-00-04" ], "apAbstract": "AIX is vulnerable to denial of service due to AIXWindows", "aparNo": "IJ48758", "aparNoSet": [ "CVE-2023-45172", "IJ48758" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ48758s4a.230928.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc", "filesets": [ "X11.base.smt:7.3.0.0-7.3.0.0" ], "issued": "20231218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar", "cvss": [ "CVE-2023-45172:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-02", "7300-00-03", "7300-00-04" ], "apAbstract": "AIX is vulnerable to privilege escalation and denial of service", "aparNo": "IJ48784", "aparNoSet": [ "CVE-2023-45166", "CVE-2023-45170", "CVE-2023-45174", "IJ48784" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ48784m2a.231207.epkg.Z", "IJ48784m2b.240202.epkg.Z", "IJ48784m3a.231207.epkg.Z", "IJ48784m3b.240202.epkg.Z", "IJ48784m4a.231002.epkg.Z", "IJ48784m4b.240202.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc", "filesets": [ "bos.rte.printers:7.3.0.0-7.3.0.2", "printers.rte:7.3.0.0-7.3.0.2" ], "issued": "20231212", "updated": "20240203", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar", "cvss": [ "CVE-2023-45166:8.4", "CVE-2023-45170:8.4", "CVE-2023-45174:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21", "3.1.4.31" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "IJ49094", "aparNoSet": [ "CVE-2023-3341", "IJ49093", "IJ49094" ], "fixedIn": "3.1.4.40", "ifixes": [ "IJ49094s4.231110.epkg.Z", "IJ49093s7.231109.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.200-7.2.5.200" ], "issued": "20231218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar", "cvss": [ "CVE-2023-3341:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-05", "7200-05-06", "7200-05-07" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "IJ49094", "aparNoSet": [ "CVE-2023-3341", "IJ49093", "IJ49094" ], "fixedIn": "7200-05-08", "ifixes": [ "IJ49094s4.231110.epkg.Z", "IJ49093s7.231109.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.100-7.2.5.101", "bos.net.tcp.bind:7.2.5.200-7.2.5.200" ], "issued": "20231218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar", "cvss": [ "CVE-2023-3341:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND", "aparNo": "IJ49094", "aparNoSet": [ "CVE-2023-3341", "IJ49093", "IJ49094" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ49094s4.231110.epkg.Z", "IJ49093s7.231109.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc", "filesets": [ "bos.net.tcp.bind:7.2.5.100-7.2.5.101" ], "issued": "20231218", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar", "cvss": [ "CVE-2023-3341:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel", "aparNo": "IJ49202", "aparNoSet": [ "CVE-2023-45171", "CVE-2023-45175", "IJ49202" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ49202m2a.231219.epkg.Z", "IJ49202m2b.240109.epkg.Z", "IJ49202m3a.231219.epkg.Z", "IJ49202m3b.240109.epkg.Z", "IJ49202s4a.231120.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.mp64:7.2.5.100-7.2.5.107" ], "issued": "20240104", "updated": "20240110", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45171:6.2", "CVE-2023-45175:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "AIX is vulnerable to privilege escalation and denial of service", "aparNo": "IJ49461", "aparNoSet": [ "CVE-2023-45166", "CVE-2023-45170", "CVE-2023-45174", "IJ49461" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ49461m2a.231207.epkg.Z", "IJ49461m2c.240202.epkg.Z", "IJ49461m4a.231207.epkg.Z", "IJ49461m4b.240202.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc", "filesets": [ "bos.rte.printers:7.2.5.100-7.2.5.101" ], "issued": "20231212", "updated": "20240203", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar", "cvss": [ "CVE-2023-45166:8.4", "CVE-2023-45170:8.4", "CVE-2023-45174:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS", "aparNo": "IJ49533", "aparNoSet": [ "CVE-2023-45173", "IJ49533" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ49533m4a.231219.epkg.Z", "IJ49533s4a.231219.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.net.nfs.client:7.2.5.100-7.2.5.102" ], "issued": "20240104", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45173:6.2" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pmsvcs", "aparNo": "IJ49534", "aparNoSet": [ "CVE-2023-45169", "IJ49534" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ49534s3a.231213.epkg.Z", "IJ49534s4a.231213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc", "filesets": [ "bos.pmapi.pmsvcs:7.2.5.100-7.2.5.102" ], "issued": "20240104", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar", "cvss": [ "CVE-2023-45169:6.2" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7300-02-00", "7300-02-01" ], "apAbstract": "Print queue status does not update", "aparNo": "IJ49882", "aparNoSet": [ "IJ49882" ], "fixedIn": "7300-02-02", "ifixes": [ "IJ49882s1a.240129.AIX73TL02SP00-01.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7131625", "filesets": [ "bos.rte.printers:7.3.2.0-7.3.2.0" ], "issued": "20240312", "updated": "null", "siblings": [], "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij49737/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-07" ], "apAbstract": "Print queue status does not update", "aparNo": "IJ49883", "aparNoSet": [ "IJ49883" ], "fixedIn": "7200-05-08", "ifixes": [ "IJ49883s7a.240129.AIX72TL05SP07.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7131625", "filesets": [ "bos.rte.printers:7.2.5.202-7.2.5.202" ], "issued": "20240312", "updated": "null", "siblings": [], "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij49737/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7300-01-03" ], "apAbstract": "Print queue status does not update", "aparNo": "IJ49914", "aparNoSet": [ "IJ49914" ], "fixedIn": "7300-01-04", "ifixes": [ "IJ49914s3a.240311.AIX73TL01SP03.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7131625", "filesets": [ "bos.rte.printers:7.3.1.2-7.3.1.2" ], "issued": "20240312", "updated": "null", "siblings": [], "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij49737/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.4.0", "3.1.4.10", "3.1.4.20", "3.1.4.21", "3.1.4.30", "3.1.4.31" ], "apAbstract": "Unable to login as padmin after VIOS 4.1 upgrade", "aparNo": "IJ50326", "aparNoSet": [ "IJ50326" ], "fixedIn": "3.1.4.40", "ifixes": [ "IJ50326m5b.240402.VIOS3.1.4.10.epkg.Z", "IJ50326m6c.240402.VIOS3.1.4.21.epkg.Z", "IJ50326s7b.240401.VIOS.3.1.4.31.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7145269", "filesets": [ "ios.cli.rte:7.2.5.200-7.2.5.205" ], "issued": "20240402", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij50326/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21", "3.1.4.31" ], "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)", "aparNo": "IJ50424", "aparNoSet": [ "CVE-2023-51765", "IJ50424" ], "fixedIn": "3.1.4.40", "ifixes": [ "IJ50424s7a.240315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc", "filesets": [ "bos.net.tcp.sendmail:7.2.5.200-7.2.5.200" ], "issued": "20240411", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar", "cvss": [ "CVE-2023-51765:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-05", "7200-05-06", "7200-05-07" ], "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)", "aparNo": "IJ50424", "aparNoSet": [ "CVE-2023-51765", "IJ50424" ], "fixedIn": "7200-05-08", "ifixes": [ "IJ50424s7a.240315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc", "filesets": [ "bos.net.tcp.sendmail:7.2.5.0-7.2.5.101", "bos.net.tcp.sendmail:7.2.5.200-7.2.5.200" ], "issued": "20240411", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar", "cvss": [ "CVE-2023-51765:6.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "4.1.0.10" ], "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)", "aparNo": "IJ50428", "aparNoSet": [ "CVE-2023-51765", "IJ50428" ], "fixedIn": "4.1.0.20", "ifixes": [ "IJ50428s1a.240315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc", "filesets": [ "bos.net.tcp.sendmail:7.3.2.0-7.3.2.0" ], "issued": "20240411", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar", "cvss": [ "CVE-2023-51765:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-02-01" ], "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)", "aparNo": "IJ50428", "aparNoSet": [ "CVE-2023-51765", "IJ50428" ], "fixedIn": "7300-02-02", "ifixes": [ "IJ50428s1a.240315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc", "filesets": [ "bos.net.tcp.sendmail:7.3.2.0-7.3.2.0" ], "issued": "20240411", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar", "cvss": [ "CVE-2023-51765:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01", "7300-01-02", "7300-01-03" ], "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)", "aparNo": "IJ50432", "aparNoSet": [ "CVE-2023-51765", "IJ50432" ], "fixedIn": "7300-01-04", "ifixes": [ "IJ50432s3a.240315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc", "filesets": [ "bos.net.tcp.sendmail:7.3.1.0-7.3.1.0" ], "issued": "20240411", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar", "cvss": [ "CVE-2023-51765:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-02", "7300-00-03", "7300-00-04" ], "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)", "aparNo": "IJ50433", "aparNoSet": [ "CVE-2023-51765", "IJ50433" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ50433s4a.240315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc", "filesets": [ "bos.net.tcp.sendmail:7.3.0.0-7.3.0.0" ], "issued": "20240411", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar", "cvss": [ "CVE-2023-51765:6.5" ], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.3.0", "3.1.3.10", "3.1.3.14", "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "Unable to login as padmin after VIOS 4.1 upgrade", "aparNo": "IJ50453", "aparNoSet": [ "IJ50453" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ50453m4b.240401.VIOS3.1.3.40.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7145269", "filesets": [ "ios.cli.rte:7.2.5.0-7.2.5.107" ], "issued": "20240402", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij50326/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)", "aparNo": "IJ50508", "aparNoSet": [ "CVE-2023-51765", "IJ50508" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ50508s1a.240325.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc", "filesets": [ "bos.net.tcp.sendmail:7.2.5.100-7.2.5.101" ], "issued": "20240411", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar", "cvss": [ "CVE-2023-51765:6.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "4.1.0.10" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)", "aparNo": "IJ50601", "aparNoSet": [ "CVE-2024-25062", "IJ50601" ], "fixedIn": "4.1.0.20", "ifixes": [ "IJ50601s1a.240409.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc", "filesets": [ "bos.rte.control:7.3.2.0-7.3.2.0" ], "issued": "20240508", "updated": "20240604", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar", "cvss": [ "CVE-2024-25062:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-02-01" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)", "aparNo": "IJ50601", "aparNoSet": [ "CVE-2024-25062", "IJ50601" ], "fixedIn": "7300-02-02", "ifixes": [ "IJ50601s1a.240409.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc", "filesets": [ "bos.rte.control:7.3.2.0-7.3.2.0" ], "issued": "20240508", "updated": "20240604", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar", "cvss": [ "CVE-2024-25062:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21", "3.1.4.31" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)", "aparNo": "IJ50602", "aparNoSet": [ "CVE-2024-25062", "IJ50602" ], "fixedIn": "3.1.4.40", "ifixes": [ "IJ50602m7a.240409.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc", "filesets": [ "bos.rte.control:7.2.5.200-7.2.5.202" ], "issued": "20240508", "updated": "20240604", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar", "cvss": [ "CVE-2024-25062:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-05", "7200-05-06", "7200-05-07" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)", "aparNo": "IJ50602", "aparNoSet": [ "CVE-2024-25062", "IJ50602" ], "fixedIn": "7200-05-08", "ifixes": [ "IJ50602m7a.240409.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc", "filesets": [ "bos.rte.control:7.2.5.0-7.2.5.102", "bos.rte.control:7.2.5.200-7.2.5.202" ], "issued": "20240508", "updated": "20240604", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar", "cvss": [ "CVE-2024-25062:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01", "7300-01-02", "7300-01-03" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)", "aparNo": "IJ50635", "aparNoSet": [ "CVE-2024-25062", "IJ50635" ], "fixedIn": "7300-01-04", "ifixes": [ "IJ50635m3a.240409.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc", "filesets": [ "bos.rte.control:7.3.1.0-7.3.1.2" ], "issued": "20240508", "updated": "20240604", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar", "cvss": [ "CVE-2024-25062:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-02", "7300-00-03", "7300-00-04" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)", "aparNo": "IJ50827", "aparNoSet": [ "CVE-2024-25062", "IJ50827" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ50827m4a.240409.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc", "filesets": [ "bos.rte.control:7.3.0.0-7.3.0.3" ], "issued": "20240508", "updated": "20240604", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar", "cvss": [ "CVE-2024-25062:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)", "aparNo": "IJ50828", "aparNoSet": [ "CVE-2024-25062", "IJ50828" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ50828m4a.240409.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc", "filesets": [], "issued": "20240508", "updated": "20240604", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar", "cvss": [ "CVE-2024-25062:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "3.1.4.10", "3.1.4.21", "3.1.4.31" ], "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)", "aparNo": "IJ50910", "aparNoSet": [ "CVE-2024-27273", "IJ50910" ], "fixedIn": "3.1.4.40", "ifixes": [ "IJ50910m5a.240502.epkg.Z", "IJ50910m6a.240502.epkg.Z", "IJ50910s7a.240418.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc", "filesets": [ "bos.mp64:7.2.5.200-7.2.5.205" ], "issued": "20240506", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar", "cvss": [ "CVE-2024-27273:8.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-05-05", "7200-05-06", "7200-05-07" ], "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)", "aparNo": "IJ50910", "aparNoSet": [ "CVE-2024-27273", "IJ50910" ], "fixedIn": "7200-05-08", "ifixes": [ "IJ50910m5a.240502.epkg.Z", "IJ50910m6a.240502.epkg.Z", "IJ50910s7a.240418.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc", "filesets": [ "bos.mp64:7.2.5.0-7.2.5.107", "bos.mp64:7.2.5.200-7.2.5.205" ], "issued": "20240506", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar", "cvss": [ "CVE-2024-27273:8.1" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "4.1.0.10" ], "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)", "aparNo": "IJ50934", "aparNoSet": [ "CVE-2024-27273", "IJ50934" ], "fixedIn": "4.1.0.20", "ifixes": [ "IJ50934s1a.240418.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc", "filesets": [ "bos.mp64:7.3.2.0-7.3.2.1" ], "issued": "20240506", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar", "cvss": [ "CVE-2024-27273:8.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-02-01" ], "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)", "aparNo": "IJ50934", "aparNoSet": [ "CVE-2024-27273", "IJ50934" ], "fixedIn": "7300-02-02", "ifixes": [ "IJ50934s1a.240418.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc", "filesets": [ "bos.mp64:7.3.2.0-7.3.2.1" ], "issued": "20240506", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar", "cvss": [ "CVE-2024-27273:8.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-01-01", "7300-01-02", "7300-01-03" ], "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)", "aparNo": "IJ50935", "aparNoSet": [ "CVE-2024-27273", "IJ50935" ], "fixedIn": "7300-01-04", "ifixes": [ "IJ50935m1a.240502.epkg.Z", "IJ50935m2a.240502.epkg.Z", "IJ50935s3a.240418.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc", "filesets": [ "bos.mp64:7.3.1.0-7.3.1.4" ], "issued": "20240506", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar", "cvss": [ "CVE-2024-27273:8.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7300-00-02", "7300-00-03", "7300-00-04" ], "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)", "aparNo": "IJ50936", "aparNoSet": [ "CVE-2024-27273", "IJ50936" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ50936m2a.240502.epkg.Z", "IJ50936m3a.240502.epkg.Z", "IJ50936m4a.240502.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc", "filesets": [ "bos.mp64:7.3.0.0-7.3.0.5" ], "issued": "20240506", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar", "cvss": [ "CVE-2024-27273:8.1" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "3.1.3.21", "3.1.3.30", "3.1.3.40" ], "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)", "aparNo": "IJ50937", "aparNoSet": [ "CVE-2024-27273", "IJ50937" ], "fixedIn": "See Bulletin", "ifixes": [ "IJ50937m2a.240502.epkg.Z", "IJ50937m3a.240502.epkg.Z", "IJ50937m4a.240502.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc", "filesets": [], "issued": "20240506", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar", "cvss": [ "CVE-2024-27273:8.1" ], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.4.40", "3.1.4.41" ], "apAbstract": "Some 10GbE/40GbE RoCE adapters do not configure", "aparNo": "IJ51639", "aparNoSet": [ "IJ51639" ], "fixedIn": "3.1.4.50", "ifixes": [ "IJ51639s8a.240718.VIOS3.1.4.40-41.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7159650", "filesets": [ "devices.ethernet.mlx.rte:7.2.5.202-7.2.5.202" ], "issued": "20240730", "updated": "null", "siblings": [], "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij51639/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-05-08-2419", "7200-05-08-2420" ], "apAbstract": "Some 10GbE/40GbE RoCE adapters do not configure", "aparNo": "IJ51639", "aparNoSet": [ "IJ51639" ], "fixedIn": "7200-05-09", "ifixes": [ "IJ51639s8a.240718.AIX72TL05SP08.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7159650", "filesets": [ "devices.ethernet.mlx.rte:7.2.5.202-7.2.5.202" ], "issued": "20240730", "updated": "null", "siblings": [], "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij51639/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "4.1.0.20", "4.1.0.21" ], "apAbstract": "Some 10GbE/40GbE RoCE adapters do not configure", "aparNo": "IJ51842", "aparNoSet": [ "IJ51842" ], "fixedIn": "4.1.1.0", "ifixes": [ "IJ51842s2a.240718.VIOS4.1.0.20-21.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7159650", "filesets": [ "devices.ethernet.mlx.rte:7.3.2.1-7.3.2.1" ], "issued": "20240730", "updated": "null", "siblings": [], "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij51639/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7300-02-02-2419", "7300-02-02-2420" ], "apAbstract": "Some 10GbE/40GbE RoCE adapters do not configure", "aparNo": "IJ51842", "aparNoSet": [ "IJ51842" ], "fixedIn": "7300-02-03", "ifixes": [ "IJ51842s2a.240718.AIX73TL02SP02.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7159650", "filesets": [ "devices.ethernet.mlx.rte:7.3.2.1-7.3.2.1" ], "issued": "20240730", "updated": "null", "siblings": [], "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij51639/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-01-1543", "7200-00-02-1614", "7200-00-03-1642", "7200-00-04-1717", "7200-00-05-1720", "7200-00-06-1806", "7200-01-00-1642", "7200-01-01-1643", "7200-01-02-1717", "7200-01-03-1720", "7200-01-04-1806", "7200-01-05-1845", "7200-01-06-1914", "7200-02-00-1731", "7200-02-01-1731", "7200-02-01-1732", "7200-02-02-1810", "7200-02-02-1832", "7200-02-03-1845", "7200-02-04-1914", "7200-02-05-1938", "7200-02-06-2016", "7200-03-00-1837", "7200-03-01-1838", "7200-03-02-1846", "7200-03-03-1914", "7200-03-04-1938", "7200-03-05-2016", "7200-03-06-2038", "7200-03-07-2114", "7200-04-00-1939", "7200-04-01-1939", "7200-04-02-2016", "7200-04-02-2028", "7200-04-03-2038", "7200-04-04-2114", "7200-04-05-2148", "7200-04-06-2220", "7200-05-00-2028", "7200-05-00-2037", "7200-05-01-2038", "7200-05-02-2114", "7200-05-03-2136", "7200-05-03-2148", "7200-05-04-2220", "7200-05-05-2246", "7200-05-06-2320", "7200-05-07-2346", "7200-05-08-2420" ], "apAbstract": "Potential undetected data loss can occur when copying or writing to files on an SMB share using the AIX SMB Client", "aparNo": "IJ52123", "aparNoSet": [ "IJ52123" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7166703", "filesets": [ "smbc.rte:7.2.302.6-7.2.302.5000" ], "issued": "20241022", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7300-00-00", "7300-00-01-2148", "7300-00-02-2220", "7300-00-03-2246", "7300-00-04-2320", "7300-01-00", "7300-01-01-2246", "7300-01-02-2320", "7300-01-03-2346", "7300-01-04-2420", "7300-02-00", "7300-02-01-2346", "7300-02-02-2420" ], "apAbstract": "Potential undetected data loss can occur when copying or writing to files on an SMB share using the AIX SMB Client", "aparNo": "IJ52123", "aparNoSet": [ "IJ52123" ], "fixedIn": "See Bulletin", "ifixes": [ "See", "Bulletin" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7166703", "filesets": [ "smbc.rte:7.3.302.0-7.3.302.1" ], "issued": "20241022", "updated": "null", "siblings": [], "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06" ], "apAbstract": "SYSTEM CRASH IN NETINFO_UNIXDOMNLIST", "aparNo": "IV09793", "aparNoSet": [ "IV09793" ], "fixedIn": "6100-06-07", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV09793", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.17" ], "issued": "20111025", "updated": "20130226", "siblings": [ "6100-05:IV12592", "6100-06:IV09793", "6100-07:IV09981", "6100-08:IV10663", "7100-00:IV20295", "7100-01:IV09942" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00" ], "apAbstract": "SYSTEM CRASH IN NETINFO_UNIXDOMNLIST", "aparNo": "IV09942", "aparNoSet": [ "IV09942" ], "fixedIn": "7100-01-04", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV09942", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.15" ], "issued": "20111031", "updated": "20130226", "siblings": [ "6100-05:IV12592", "6100-06:IV09793", "6100-07:IV09981", "6100-08:IV10663", "7100-00:IV20295", "7100-01:IV09942" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01" ], "apAbstract": "SYSTEM CRASH IN NETINFO_UNIXDOMNLIST", "aparNo": "IV09981", "aparNoSet": [ "IV09981" ], "fixedIn": "6100-07-02", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV09981", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.1" ], "issued": "20111031", "updated": "20130226", "siblings": [ "6100-05:IV12592", "6100-06:IV09793", "6100-07:IV09981", "6100-08:IV10663", "7100-00:IV20295", "7100-01:IV09942" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08", "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10", "6100-06-11", "6100-05-00", "6100-05-01", "6100-05-02", "6100-05-03", "6100-05-04", "6100-05-05", "6100-05-06", "6100-05-07", "6100-05-08", "6100-05-09", "6100-05-10", "6100-05-11" ], "apAbstract": "Perl Digest Module Digest-\u003enew() Code Injection", "aparNo": "IV10197", "aparNoSet": [ "CVE-2011-3597", "IV10197" ], "fixedIn": "6100-09-00", "ifixes": [], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163800\u0026label\u003dUPDATE%20-%20AIX%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597", "filesets": [ "perl.rte:5.8.8.0-5.8.8.122" ], "issued": "20111122", "updated": "20130125", "siblings": [ "6100-08:IV10197", "7100-02:IV10197" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar", "cvss": [ "CVE-2011-3597:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08", "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09" ], "apAbstract": "Perl Digest Module Digest-\u003enew() Code Injection", "aparNo": "IV10197", "aparNoSet": [ "CVE-2011-3597", "IV10197" ], "fixedIn": "7100-03-00", "ifixes": [], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163800\u0026label\u003dUPDATE%20-%20AIX%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597", "filesets": [ "perl.rte:5.10.1.0-5.10.1.150" ], "issued": "20111122", "updated": "20130125", "siblings": [ "6100-08:IV10197", "7100-02:IV10197" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar", "cvss": [ "CVE-2011-3597:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2", "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7" ], "apAbstract": "Perl Digest Module Digest-\u003enew() Code Injection", "aparNo": "IV10197", "aparNoSet": [ "CVE-2011-3597", "IV10197" ], "fixedIn": "2.2.3.0", "ifixes": [], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201301/SECURITY/20130128/datafile163800\u0026label\u003dUPDATE%20-%20VIOS%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597", "filesets": [ "perl.rte:5.8.8.0-5.8.8.122" ], "issued": "20111122", "updated": "20130125", "siblings": [ "6100-08:IV10197", "7100-02:IV10197" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar", "cvss": [ "CVE-2011-3597:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06" ], "apAbstract": "AIX NFSv4 vulnerability", "aparNo": "IV10327", "aparNoSet": [ "CVE-2012-4817", "IV10327" ], "fixedIn": "6100-06-07", "ifixes": [ "6100-06-07" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dAIX%20NFSv4%20Vulnerability%20CVE-2012-4817", "filesets": [ "bos.net.nfs.client:6.1.6.0-6.1.6.17" ], "issued": "20120913", "updated": "null", "siblings": [ "6100-05:IV09495", "6100-06:IV10327", "6100-07:IV11629", "6100-08:IV11511", "7100-00:IV26436", "7100-01:IV12169", "7100-02:IV11502" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar", "cvss": [ "CVE-2012-4817:5" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02" ], "apAbstract": "AIX NFSv4 vulnerability", "aparNo": "IV11629", "aparNoSet": [ "CVE-2012-4817", "IV11629" ], "fixedIn": "6100-07-03", "ifixes": [ "6100-07-03" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dAIX%20NFSv4%20Vulnerability%20CVE-2012-4817", "filesets": [ "bos.net.nfs.client:6.1.7.0-6.1.7.2" ], "issued": "20120913", "updated": "null", "siblings": [ "6100-05:IV09495", "6100-06:IV10327", "6100-07:IV11629", "6100-08:IV11511", "7100-00:IV26436", "7100-01:IV12169", "7100-02:IV11502" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar", "cvss": [ "CVE-2012-4817:5" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03" ], "apAbstract": "AIX NFSv4 vulnerability", "aparNo": "IV12169", "aparNoSet": [ "CVE-2012-4817", "IV12169" ], "fixedIn": "7100-01-04", "ifixes": [ "IV26436s07.120907.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dAIX%20NFSv4%20Vulnerability%20CVE-2012-4817", "filesets": [ "bos.net.nfs.client:7.1.1.0-7.1.1.3" ], "issued": "20120913", "updated": "null", "siblings": [ "6100-05:IV09495", "6100-06:IV10327", "6100-07:IV11629", "6100-08:IV11511", "7100-00:IV26436", "7100-01:IV12169", "7100-02:IV11502" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar", "cvss": [ "CVE-2012-4817:5" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-05-00", "6100-05-01", "6100-05-02", "6100-05-03", "6100-05-04", "6100-05-05", "6100-05-06", "6100-05-07", "6100-05-08" ], "apAbstract": "SYSTEM CRASH IN NETINFO_UNIXDOMNLIST", "aparNo": "IV12592", "aparNoSet": [ "IV12592" ], "fixedIn": "6100-05-09", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV12592", "filesets": [ "bos.mp64:6.1.5.0-6.1.5.10" ], "issued": "20111228", "updated": "20130226", "siblings": [ "6100-05:IV12592", "6100-06:IV09793", "6100-07:IV09981", "6100-08:IV10663", "7100-00:IV20295", "7100-01:IV09942" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03" ], "apAbstract": "TCP RETRANSMIT PROCESSING IS VERY SLOW", "aparNo": "IV13121", "aparNoSet": [ "IV13121" ], "fixedIn": "7100-01-04", "ifixes": [ "IV20595m05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV13121", "filesets": [ "bos.net.tcp.client:7.1.1.0-7.1.1.3" ], "issued": "20120207", "updated": "20130226", "siblings": [ "6100-06:IV18483", "6100-07:IV14297", "6100-08:IV14524", "7100-01:IV13121", "7100-02:IV15184" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv13121/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07" ], "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().", "aparNo": "IV13404", "aparNoSet": [ "IV13404" ], "fixedIn": "6100-07-08", "ifixes": [ "U859173", "bos.mp64:6.1.7.19" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV13404", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.18" ], "issued": "20120118", "updated": "20131124", "siblings": [ "6100-06:IZ94647", "6100-07:IV13404", "6100-08:IV14309", "6100-09:IV42440", "7100-00:IV42334", "7100-01:IV27584", "7100-02:IV42324", "7100-03:IV42412" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv13404/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08" ], "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().", "aparNo": "IV13405", "aparNoSet": [ "IV13405" ], "fixedIn": "null", "ifixes": [ "IV13405s8a.130805.53TL12SP08.epkg.Z", "IV13405s8a.130805.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV13405", "filesets": [ "bos.mp:5.3.12.9", "bos.mp64:5.3.12.9" ], "issued": "20120118", "updated": "20130805", "siblings": [ "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo140901" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv13405/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-05-00", "6100-05-01", "6100-05-02", "6100-05-03", "6100-05-04", "6100-05-05", "6100-05-06", "6100-05-07", "6100-05-08" ], "apAbstract": "Vulnerability in AIX TCP stack", "aparNo": "IV13751", "aparNoSet": [ "CV-2012-0194", "IV13751" ], "fixedIn": "6100-05-09", "ifixes": [ "61JSP7_IV13751s07.120126.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.5.0-6.1.5.8" ], "issued": "20120203", "updated": "20131212", "siblings": [ "7100-01:IV14211", "7100-00:IV14210", "6100-07:IV14209", "6100-06:IV13820", "6100-05:IV13751", "5300-12:IV13827" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar", "cvss": [ "CVE-2012-0194:7.1" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.1.3.10", "2.1.3.0", "2.1.2.13", "2.1.2.12", "2.1.2.11", "2.1.2.0", "2.1.1.10", "2.1.1.0" ], "apAbstract": "Vulnerability in VIOS TCP stack", "aparNo": "IV13751", "aparNoSet": [ "CV-2012-0194", "IV13751" ], "fixedIn": "2.2.1.4", "ifixes": [ "61JVIOS_IV13751s01.120206.epkg.Z", "61HVIOS_IV13751s03.120204.epkg.Z", "61FVIOS_IV13751s1.120205.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.5.0-6.1.5.8" ], "issued": "20120203", "updated": "20131212", "siblings": [ "7100-01:IV14211", "7100-00:IV14210", "6100-07:IV14209", "6100-06:IV13820", "6100-05:IV13751", "5300-12:IV13827" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar", "cvss": [ "CVE-2012-0194:7.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07" ], "apAbstract": "Vulnerability in AIX TCP stack", "aparNo": "IV13820", "aparNoSet": [ "CV-2012-0194", "IV13820" ], "fixedIn": "6100-06-08", "ifixes": [ "61NSP6_IV13820s06.120126.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.6.0-6.1.6.17" ], "issued": "20120203", "updated": "20131212", "siblings": [ "7100-01:IV14211", "7100-00:IV14210", "6100-07:IV14209", "6100-06:IV13820", "6100-05:IV13751", "5300-12:IV13827" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar", "cvss": [ "CVE-2012-0194:7.1" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.0.0", "2.2.0.10", "2.2.0.11", "2.2.0.12", "2.2.0.13" ], "apAbstract": "Vulnerability in VIOS TCP stack", "aparNo": "IV13820", "aparNoSet": [ "CV-2012-0194", "IV13820" ], "fixedIn": "2.2.1.4", "ifixes": [ "61NVIOS_IV13820s.120204.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.6.0-6.1.6.17" ], "issued": "20120203", "updated": "20131212", "siblings": [ "7100-01:IV14211", "7100-00:IV14210", "6100-07:IV14209", "6100-06:IV13820", "6100-05:IV13751", "5300-12:IV13827" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar", "cvss": [ "CVE-2012-0194:7.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05" ], "apAbstract": "Vulnerability in AIX TCP stack", "aparNo": "IV13827", "aparNoSet": [ "CV-2012-0194", "IV13827" ], "fixedIn": "5300-12-06", "ifixes": [ "53XSP5_IV13827s05.120204.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.5" ], "issued": "20120203", "updated": "20131212", "siblings": [ "7100-01:IV14211", "7100-00:IV14210", "6100-07:IV14209", "6100-06:IV13820", "6100-05:IV13751", "5300-12:IV13827" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar", "cvss": [ "CVE-2012-0194:7.1" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3" ], "apAbstract": "Vulnerability in VIOS TCP stack", "aparNo": "IV13827", "aparNoSet": [ "CV-2012-0194", "IV13827" ], "fixedIn": "2.2.1.4", "ifixes": [ "61QS02_IV14209s02.120126.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.3" ], "issued": "20120203", "updated": "20131212", "siblings": [ "7100-01:IV14211", "7100-00:IV14210", "6100-07:IV14209", "6100-06:IV13820", "6100-05:IV13751", "5300-12:IV13827" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar", "cvss": [ "CVE-2012-0194:7.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03" ], "apAbstract": "Vulnerability in AIX TCP stack", "aparNo": "IV14209", "aparNoSet": [ "CV-2012-0194", "IV14209" ], "fixedIn": "6100-07-04", "ifixes": [ "61QS02_IV14209s02.120126.epkg.Z", "IV14209s03.120228.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.3" ], "issued": "20120203", "updated": "20131212", "siblings": [ "7100-01:IV14211", "7100-00:IV14210", "6100-07:IV14209", "6100-06:IV13820", "6100-05:IV13751", "5300-12:IV13827" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar", "cvss": [ "CVE-2012-0194:7.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04" ], "apAbstract": "Vulnerability in AIX TCP stack", "aparNo": "IV14210", "aparNoSet": [ "CV-2012-0194", "IV14210" ], "fixedIn": "7100-00-05", "ifixes": [ "71BSP4_IV14210s04.120129.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.0.0-7.1.0.17" ], "issued": "20120203", "updated": "20131212", "siblings": [ "7100-01:IV14211", "7100-00:IV14210", "6100-07:IV14209", "6100-06:IV13820", "6100-05:IV13751", "5300-12:IV13827" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar", "cvss": [ "CVE-2012-0194:7.1" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03" ], "apAbstract": "Vulnerability in AIX TCP stack", "aparNo": "IV14211", "aparNoSet": [ "CV-2012-0194", "IV14211" ], "fixedIn": "7100-01-04", "ifixes": [ "IV14211s03.120228.epkg.Z", "71DSP2_IV14211s02.120126.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.1.0-7.1.1.3" ], "issued": "20120203", "updated": "20131212", "siblings": [ "7100-01:IV14211", "7100-00:IV14210", "6100-07:IV14209", "6100-06:IV13820", "6100-05:IV13751", "5300-12:IV13827" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar", "cvss": [ "CVE-2012-0194:7.1" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03" ], "apAbstract": "TCP RETRANSMIT PROCESSING IS VERY SLOW", "aparNo": "IV14297", "aparNoSet": [ "IV14297" ], "fixedIn": "6100-07-04", "ifixes": [ "IV14297s03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV14297", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.14" ], "issued": "20120128", "updated": "20130226", "siblings": [ "6100-06:IV18483", "6100-07:IV14297", "6100-08:IV14524", "7100-01:IV13121", "7100-02:IV15184" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv14297/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02" ], "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().", "aparNo": "IV14309", "aparNoSet": [ "IV14309" ], "fixedIn": "6100-08-03", "ifixes": [ "U854277", "bos.mp64:6.1.8.16" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV14309", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.15" ], "issued": "20120130", "updated": "20131124", "siblings": [ "6100-06:IZ94647", "6100-07:IV13404", "6100-08:IV14309", "6100-09:IV42440", "7100-00:IV42334", "7100-01:IV27584", "7100-02:IV42324", "7100-03:IV42412" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv14309/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02" ], "apAbstract": "DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING", "aparNo": "IV16514", "aparNoSet": [ "IV16514" ], "fixedIn": "7100-01-03", "ifixes": [ "IV16514s01.epkg.Z", "IV16514s02.epkg.Z", "IV16514s03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV16514", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.2" ], "issued": "20120229", "updated": "20130413", "siblings": [ "6100-05:IV16568", "6100-06:IV16567", "6100-08:IV17105", "7100-00:IV23966", "7100-01:IV16514", "7100-02:IV17107" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv16514/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07" ], "apAbstract": "DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING", "aparNo": "IV16567", "aparNoSet": [ "IV16567" ], "fixedIn": "6100-06-08", "ifixes": [ "IV16567m72.epkg.Z", "IV16567s06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV16567", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.18" ], "issued": "20120301", "updated": "20130413", "siblings": [ "6100-05:IV16568", "6100-06:IV16567", "6100-08:IV17105", "7100-00:IV23966", "7100-01:IV16514", "7100-02:IV17107" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv16567/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-05-00", "6100-05-01", "6100-05-02", "6100-05-03", "6100-05-04", "6100-05-05", "6100-05-06", "6100-05-07", "6100-05-08" ], "apAbstract": "DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING", "aparNo": "IV16568", "aparNoSet": [ "IV16568" ], "fixedIn": "6100-05-09", "ifixes": [ "IV16568m08.epkg.Z", "IV16568s07.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV16568", "filesets": [ "bos.mp64:6.1.5.0-6.1.5.10" ], "issued": "20120301", "updated": "20130413", "siblings": [ "6100-05:IV16568", "6100-06:IV16567", "6100-08:IV17105", "7100-00:IV23966", "7100-01:IV16514", "7100-02:IV17107" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv16568/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08" ], "apAbstract": "SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED", "aparNo": "IV16603", "aparNoSet": [ "IV16603" ], "fixedIn": "6100-06-09", "ifixes": [ "IV16603s07.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV16603", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.19" ], "issued": "20120302", "updated": "20130326", "siblings": [ "6100-06:IV16603", "6100-07:IV21128", "6100-08:IV19341", "7100-00:IV21131", "7100-01:IV21235", "7100-02:IV19357" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv16603/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08" ], "apAbstract": "Vulnerability in use of socketpair", "aparNo": "IV16603", "aparNoSet": [ "CVE-2012-2192", "IV16603" ], "fixedIn": "6100-06-09", "ifixes": [ "IV16603s07.120514.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.18" ], "issued": "20120605", "updated": "null", "siblings": [ "6100-06:IV16603", "6100-07:IV21128", "6100-08:IV19341", "7100-00:IV21131", "7100-01:IV21235", "7100-02:IV19357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar", "cvss": [ "CVE-2012-2192:4.9" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08" ], "apAbstract": "JFS2 FILESYSTEM HANG IN BMASSIGN", "aparNo": "IV17291", "aparNoSet": [ "IV17291" ], "fixedIn": "6100-06-09", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV17291", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.19" ], "issued": "20120314", "updated": "20130327", "siblings": [ "6100-06:IV17291", "6100-07:IV17375", "6100-08:IV19995", "7100-00:IV17924", "7100-01:IV20607", "7100-02:IV20010" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04" ], "apAbstract": "JFS2 FILESYSTEM HANG IN BMASSIGN", "aparNo": "IV17375", "aparNoSet": [ "IV17375" ], "fixedIn": "6100-07-05", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV17375", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.15" ], "issued": "20120315", "updated": "20130328", "siblings": [ "6100-06:IV17291", "6100-07:IV17375", "6100-08:IV19995", "7100-00:IV17924", "7100-01:IV20607", "7100-02:IV20010" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05" ], "apAbstract": "AIX NFSv4 vulnerability", "aparNo": "IV17855", "aparNoSet": [ "CVE-2012-4817", "IV17855" ], "fixedIn": "5300-12-06", "ifixes": [], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dAIX%20NFSv4%20Vulnerability%20CVE-2012-4817", "filesets": [ "bos.net.nfs.client:5.3.12.0-5.3.12.5" ], "issued": "20120913", "updated": "null", "siblings": [ "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo134282" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar", "cvss": [ "CVE-2012-4817:5" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06" ], "apAbstract": "JFS2 FILESYSTEM HANG IN BMASSIGN", "aparNo": "IV17924", "aparNoSet": [ "IV17924" ], "fixedIn": "7100-00-07", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV17924", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.19" ], "issued": "20120320", "updated": "20130327", "siblings": [ "6100-06:IV17291", "6100-07:IV17375", "6100-08:IV19995", "7100-00:IV17924", "7100-01:IV20607", "7100-02:IV20010" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-05-00", "6100-05-01", "6100-05-02", "6100-05-03", "6100-05-04", "6100-05-05", "6100-05-06", "6100-05-07", "6100-05-08" ], "apAbstract": "LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR", "aparNo": "IV18317", "aparNoSet": [ "IV18317" ], "fixedIn": "6100-05-09", "ifixes": [ "IV18317s81.epkg.Z", "IV18317s72.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV18317", "filesets": [ "bos.mp64:6.1.5.0-6.1.5.10" ], "issued": "20120327", "updated": "20130413", "siblings": [ "6100-05:IV18317", "6100-06:IV18318", "6100-07:IV18127", "6100-08:IV18700", "7100-00:IV18319", "7100-01:IV18174", "7100-02:IV18249" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv18317/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07" ], "apAbstract": "LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR", "aparNo": "IV18318", "aparNoSet": [ "IV18318" ], "fixedIn": "6100-06-08", "ifixes": [ "IV18318s71.epkg.Z", "IV18318s61.epkg.Z", "IV18318s62.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV18318", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.18" ], "issued": "20120327", "updated": "20130413", "siblings": [ "6100-05:IV18317", "6100-06:IV18318", "6100-07:IV18127", "6100-08:IV18700", "7100-00:IV18319", "7100-01:IV18174", "7100-02:IV18249" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv18318/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05" ], "apAbstract": "LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR", "aparNo": "IV18319", "aparNoSet": [ "IV18319" ], "fixedIn": "7100-00-06", "ifixes": [ "IV18319s51.epkg.Z", "IV18319s41.epkg.Z", "IV18319s42.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV18319", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.18" ], "issued": "20120327", "updated": "20130413", "siblings": [ "6100-05:IV18317", "6100-06:IV18318", "6100-07:IV18127", "6100-08:IV18700", "7100-00:IV18319", "7100-01:IV18174", "7100-02:IV18249" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv18319/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07" ], "apAbstract": "TCP RETRANSMIT PROCESSING IS VERY SLOW", "aparNo": "IV18483", "aparNoSet": [ "IV18483" ], "fixedIn": "6100-06-08", "ifixes": [ "IV18483s07.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV18483", "filesets": [ "bos.net.tcp.client:6.1.6.0-6.1.6.18" ], "issued": "20120329", "updated": "20130326", "siblings": [ "6100-06:IV18483", "6100-07:IV14297", "6100-08:IV14524", "7100-01:IV13121", "7100-02:IV15184" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv18483/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05" ], "apAbstract": "Vulnerability in use of socketpair", "aparNo": "IV19178", "aparNoSet": [ "CVE-2012-2192", "IV19178" ], "fixedIn": "5300-12-06", "ifixes": [ "IV19178s05.120514.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair", "filesets": [ "bos.mp64:5.3.12.0-5.3.12.5" ], "issued": "20120605", "updated": "null", "siblings": [ "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo134316" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/socket_fix.tar", "cvss": [ "CVE-2012-2192:4.9" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05" ], "apAbstract": "SYSTEM CRASH IN NETINFO_UNIXDOMNLIST", "aparNo": "IV20295", "aparNoSet": [ "IV20295" ], "fixedIn": "7100-00-06", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV20295", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.18" ], "issued": "20120427", "updated": "20130226", "siblings": [ "6100-05:IV12592", "6100-06:IV09793", "6100-07:IV09981", "6100-08:IV10663", "7100-00:IV20295", "7100-01:IV09942" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07" ], "apAbstract": "TCP RETRANSMIT PROCESSING IS VERY SLOW", "aparNo": "IV20595", "aparNoSet": [ "IV20595" ], "fixedIn": "7100-00-08", "ifixes": [ "IV20595m05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV20595", "filesets": [ "bos.net.tcp.client:7.1.0.0-7.1.0.21" ], "issued": "20120503", "updated": "20130326", "siblings": [ "6100-06:IV18483", "6100-07:IV14297", "6100-08:IV14524", "7100-01:IV13121", "7100-02:IV15184" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv20595/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04" ], "apAbstract": "JFS2 FILESYSTEM HANG IN BMASSIGN", "aparNo": "IV20607", "aparNoSet": [ "IV20607" ], "fixedIn": "7100-01-05", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV20607", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.15" ], "issued": "20120503", "updated": "20130327", "siblings": [ "6100-06:IV17291", "6100-07:IV17375", "6100-08:IV19995", "7100-00:IV17924", "7100-01:IV20607", "7100-02:IV20010" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06" ], "apAbstract": "A tcp connection can hang and never send the last bytes", "aparNo": "IV20656", "aparNoSet": [ "IV20656" ], "fixedIn": "7100-01-07", "ifixes": [ "IV20656.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV20656", "filesets": [ "bos.net.tcp.client:7.1.1.0-7.1.1.17" ], "issued": "20120504", "updated": "20131123", "siblings": [ "7100-00:IV33484", "7100-01:IV20656", "7100-02:IV31960", "7100-03:IV32651", "6100-06:IV33483", "6100-07:IV32392", "6100-08:IV31959", "6100-09:IV32467", "5300-12:IV32615" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv20656/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04" ], "apAbstract": "SYSTEM HANGS OR CRASHES WHEN APP USES SHARED SYMTAB CAPABILITY.", "aparNo": "IV20880", "aparNoSet": [ "IV20880" ], "fixedIn": "6100-07-05", "ifixes": [ "IV20880s04.epkg.Z", "IV20880s03.epkg.Z", "IV20880s02.epkg.Z", "IV20880s01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV20880", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.15" ], "issued": "20120509", "updated": "20130409", "siblings": [ "6100-07:IV20880", "6100-08:IV21846", "7100-01:IV21116", "7100-02:IV21878" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv20880/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05" ], "apAbstract": "SYSTEM HANGS OR CRASHES WHEN APP USES SHARED SYMTAB CAPABILITY.", "aparNo": "IV21116", "aparNoSet": [ "IV21116" ], "fixedIn": "7100-01-06", "ifixes": [ "IV21116s04.epkg.Z", "IV21116s02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV21116", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.16" ], "issued": "20120514", "updated": "20130409", "siblings": [ "6100-07:IV20880", "6100-08:IV21846", "7100-01:IV21116", "7100-02:IV21878" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv21116/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04" ], "apAbstract": "SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED", "aparNo": "IV21128", "aparNoSet": [ "IV21128" ], "fixedIn": "6100-07-05", "ifixes": [ "IV21128s03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV21128", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.15" ], "issued": "20120514", "updated": "20130223", "siblings": [ "6100-06:IV16603", "6100-07:IV21128", "6100-08:IV19341", "7100-00:IV21131", "7100-01:IV21235", "7100-02:IV19357" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv21128/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04" ], "apAbstract": "Vulnerability in use of socketpair", "aparNo": "IV21128", "aparNoSet": [ "CVE-2012-2192", "IV21128" ], "fixedIn": "6100-07-05", "ifixes": [ "IV21128s03.120514.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.3" ], "issued": "20120605", "updated": "null", "siblings": [ "6100-06:IV16603", "6100-07:IV21128", "6100-08:IV19341", "7100-00:IV21131", "7100-01:IV21235", "7100-02:IV19357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar", "cvss": [ "CVE-2012-2192:4.9" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06" ], "apAbstract": "SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED", "aparNo": "IV21131", "aparNoSet": [ "IV21131" ], "fixedIn": "7100-00-07", "ifixes": [ "IV21131s05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV21131", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.19" ], "issued": "20120514", "updated": "20130326", "siblings": [ "6100-06:IV16603", "6100-07:IV21128", "6100-08:IV19341", "7100-00:IV21131", "7100-01:IV21235", "7100-02:IV19357" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv21131/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06" ], "apAbstract": "Vulnerability in use of socketpair", "aparNo": "IV21131", "aparNoSet": [ "CVE-2012-2192", "IV21131" ], "fixedIn": "7100-00-07", "ifixes": [ "IV21131s05.120515.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.3" ], "issued": "20120605", "updated": "null", "siblings": [ "6100-06:IV16603", "6100-07:IV21128", "6100-08:IV19341", "7100-00:IV21131", "7100-01:IV21235", "7100-02:IV19357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar", "cvss": [ "CVE-2012-2192:4.9" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04" ], "apAbstract": "SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED", "aparNo": "IV21235", "aparNoSet": [ "IV21235" ], "fixedIn": "7100-01-05", "ifixes": [ "IV21131s03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV21235", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.15" ], "issued": "20120515", "updated": "20130223", "siblings": [ "6100-06:IV16603", "6100-07:IV21128", "6100-08:IV19341", "7100-00:IV21131", "7100-01:IV21235", "7100-02:IV19357" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv21235/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03" ], "apAbstract": "Vulnerability in use of socketpair", "aparNo": "IV21235", "aparNoSet": [ "CVE-2012-2192", "IV21235" ], "fixedIn": "7100-01-04", "ifixes": [ "IV21235s03.120515.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.3" ], "issued": "20120605", "updated": "null", "siblings": [ "6100-06:IV16603", "6100-07:IV21128", "6100-08:IV19341", "7100-00:IV21131", "7100-01:IV21235", "7100-02:IV19357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar", "cvss": [ "CVE-2012-2192:4.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06" ], "apAbstract": "Arbitary file overwrite symlink in libodm", "aparNo": "IV21382", "aparNoSet": [ "CVE-2012-2179", "IV21382" ], "fixedIn": "7100-00-07", "ifixes": [ "IV21382.120613.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120620/datafile141524\u0026label\u003dArbitary%20file%20overwrite%20symlink%20in%20libodm", "filesets": [ "bos.rte.odm:7.1.0.0-7.1.0.15" ], "issued": "20120614", "updated": "null", "siblings": [ "6100-06:IV21379", "6100-07:IV21381", "6100-08:IV19369", "7100-00:IV21382", "7100-01:IV21383", "7100-02:IV19252" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_fix.tar", "cvss": [ "CVE-2012-2179:6.9" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04" ], "apAbstract": "APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY", "aparNo": "IV22062", "aparNoSet": [ "IV22062" ], "fixedIn": "6100-07-05", "ifixes": [ "IV22062s04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV22062", "filesets": [ "bos.64bit:6.1.7.15", "bos.adt.prof:6.1.7.15", "bos.rte.control:6.1.7.15", "bos.rte.libc:6.1.7.15", "bos.rte.shell:6.1.7.15", "mcr.rte:6.1.7.15" ], "issued": "20120602", "updated": "20130226", "siblings": [ "7100-01:IV22132", "7100-02:IV24288", "6100-07:IV22062", "6100-06:IV22982" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv22062/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-04" ], "apAbstract": "APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY", "aparNo": "IV22132", "aparNoSet": [ "IV22132" ], "fixedIn": "7100-01-05", "ifixes": [ "IV22132s04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV22132", "filesets": [ "bos.64bit:7.1.1.15", "bos.adt.prof:7.1.1.15", "bos.rte.control:7.1.1.15", "bos.rte.libc:7.1.1.15", "bos.rte.shell:7.1.1.15", "mcr.rte:7.1.1.15" ], "issued": "20120605", "updated": "20130226", "siblings": [ "7100-01:IV22132", "7100-02:IV24288", "6100-07:IV22062", "6100-06:IV22982" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv22132/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "IV22554", "aparNoSet": [ "CVE-2012-1667", "IV22554" ], "fixedIn": "6100-06-10", "ifixes": [ "IV22554m07.120713.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20AIX%20bind", "filesets": [ "bos.net.tcp.client:6.1.6.0-6.1.6.19", "bos.net.tcp.server:6.1.6.0-6.1.6.18" ], "issued": "20120713", "updated": "null", "siblings": [ "5300-12:IV22625", "6100-06:IV22554", "6100-07:IV22555", "7100-00:IV22556", "7100-01:IV22557" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar", "cvss": [ "CVE-2012-1667:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "IV22555", "aparNoSet": [ "CVE-2012-1667", "IV22555" ], "fixedIn": "6100-07-06", "ifixes": [ "IV22555m04.120713.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20AIX%20bind", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.16", "bos.net.tcp.server:6.1.7.0-6.1.7.16" ], "issued": "20120713", "updated": "null", "siblings": [ "5300-12:IV22625", "6100-06:IV22554", "6100-07:IV22555", "7100-00:IV22556", "7100-01:IV22557" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar", "cvss": [ "CVE-2012-1667:5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5" ], "apAbstract": "Vulnerability in VIOS bind", "aparNo": "IV22555", "aparNoSet": [ "CVE-2012-1667", "IV22555" ], "fixedIn": "2.2.1.7", "ifixes": [ "IV22555m04.120713.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20VIOS%20bind", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.16", "bos.net.tcp.server:6.1.7.0-6.1.7.16" ], "issued": "20120713", "updated": "null", "siblings": [ "5300-12:IV22625", "6100-06:IV22554", "6100-07:IV22555", "7100-00:IV22556", "7100-01:IV22557" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar", "cvss": [ "CVE-2012-1667:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "IV22556", "aparNoSet": [ "CVE-2012-1667", "IV22556" ], "fixedIn": "7100-00-08", "ifixes": [ "IV22556m05.120711.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20AIX%20bind", "filesets": [ "bos.net.tcp.client:7.1.0.0-7.1.0.20", "bos.net.tcp.server:7.1.0.0-7.1.0.18" ], "issued": "20120713", "updated": "null", "siblings": [ "5300-12:IV22625", "6100-06:IV22554", "6100-07:IV22555", "7100-00:IV22556", "7100-01:IV22557" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar", "cvss": [ "CVE-2012-1667:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "IV22557", "aparNoSet": [ "CVE-2012-1667", "IV22557" ], "fixedIn": "7100-01-05", "ifixes": [ "IV22557m04.120713.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20AIX%20bind", "filesets": [ "bos.net.tcp.client:7.1.1.0-7.1.1.16", "bos.net.tcp.server:7.1.1.0-7.1.1.16" ], "issued": "20120713", "updated": "null", "siblings": [ "5300-12:IV22625", "6100-06:IV22554", "6100-07:IV22555", "7100-00:IV22556", "7100-01:IV22557" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar", "cvss": [ "CVE-2012-1667:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "IV22625", "aparNoSet": [ "CVE-2012-1667", "IV22625" ], "fixedIn": "5300-12-07", "ifixes": [ "IV22625m05.120713.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20AIX%20bind", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.7", "bos.net.tcp.server:5.3.12.0-5.3.12.4" ], "issued": "20120713", "updated": "null", "siblings": [ "5300-12:IV22625", "6100-06:IV22554", "6100-07:IV22555", "7100-00:IV22556", "7100-01:IV22557" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar", "cvss": [ "CVE-2012-1667:5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09" ], "apAbstract": "Vulnerability in AIX system call", "aparNo": "IV22693", "aparNoSet": [ "CVE-2012-0723", "IV22693" ], "fixedIn": "6100-06-10", "ifixes": [ "IV22693s07.120713.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20AIX%20system%20call", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.19", "bos.rte.tty:6.1.6.0-6.1.6.18" ], "issued": "20120726", "updated": "null", "siblings": [ "5300-12:", "IV22694", "6100-06:IV22693", "6100-07:IV22695", "7100-00:IV22696", "7100-01:IV22697" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar", "cvss": [ "CVE-2012-0723:4.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06" ], "apAbstract": "Vulnerability in AIX system call", "aparNo": "IV22694", "aparNoSet": [ "CVE-2012-0723", "IV22694" ], "fixedIn": "5300-12-07", "ifixes": [ "IV53331s0a.131220.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20AIX%20system%20call", "filesets": [ "bos.rte.tty:5.3.12.0-5.3.12.4" ], "issued": "20120726", "updated": "null", "siblings": [ "5300-12:", "IV22694", "6100-06:IV22693", "6100-07:IV22695", "7100-00:IV22696", "7100-01:IV22697" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar", "cvss": [ "CVE-2012-0723:4.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05" ], "apAbstract": "Vulnerability in AIX system call", "aparNo": "IV22695", "aparNoSet": [ "CVE-2012-0723", "IV22695" ], "fixedIn": "6100-07-06", "ifixes": [ "IV22695s04.120724.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20AIX%20system%20call", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.16", "bos.rte.tty:6.1.7.0-6.1.7.16" ], "issued": "20120726", "updated": "null", "siblings": [ "5300-12:", "IV22694", "6100-06:IV22693", "6100-07:IV22695", "7100-00:IV22696", "7100-01:IV22697" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar", "cvss": [ "CVE-2012-0723:4.9" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5" ], "apAbstract": "Vulnerability in VIOS system call", "aparNo": "IV22695", "aparNoSet": [ "CVE-2012-0723", "IV22695" ], "fixedIn": "2.2.1.7", "ifixes": [ "IV22695s04.120628.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20VIOS%20system%20call", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.16", "bos.rte.tty:6.1.7.0-6.1.7.16" ], "issued": "20120726", "updated": "null", "siblings": [ "5300-12:", "IV22694", "6100-06:IV22693", "6100-07:IV22695", "7100-00:IV22696", "7100-01:IV22697" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar", "cvss": [ "CVE-2012-0723:4.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07" ], "apAbstract": "Vulnerability in AIX system call", "aparNo": "IV22696", "aparNoSet": [ "CVE-2012-0723", "IV22696" ], "fixedIn": "7100-00-08", "ifixes": [ "IV22696s05.120724.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20AIX%20system%20call", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.19", "bos.rte.tty:7.1.0.0-7.1.0.18" ], "issued": "20120726", "updated": "null", "siblings": [ "5300-12:IV22694", "6100-06:IV22693", "6100-07:IV22695", "7100-00:IV22696", "7100-01:IV22697" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar", "cvss": [ "CVE-2012-0723:4.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05" ], "apAbstract": "Vulnerability in AIX system call", "aparNo": "IV22697", "aparNoSet": [ "CVE-2012-0723", "IV22697" ], "fixedIn": "7100-01-06", "ifixes": [ "IV22697s04.120724.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20AIX%20system%20call", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.16", "bos.rte.tty:7.1.1.0-7.1.1.16" ], "issued": "20120726", "updated": "null", "siblings": [ "5300-12:IV22694", "6100-06:IV22693", "6100-07:IV22695", "7100-00:IV22696", "7100-01:IV22697" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar", "cvss": [ "CVE-2012-0723:4.9" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05" ], "apAbstract": "INACCURATE/INVALID RESULTS RETURNED BY SOME MATH LIBRARY APIS", "aparNo": "IV22812", "aparNoSet": [ "IV22812" ], "fixedIn": "7100-01-06", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV22812", "filesets": [ "bos.adt.prof:7.1.1.0-7.1.1.17", "bos.adt.libm:7.1.1.0-7.1.1.16" ], "issued": "20120612", "updated": "20130409", "siblings": [ "7100-00:IV23305", "7100-01:IV22812" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05" ], "apAbstract": "Vulnerability in AIX sendmail", "aparNo": "IV22963", "aparNoSet": [ "CVE-2012-2200", "IV22963" ], "fixedIn": "7100-01-06", "ifixes": [ "IV22963s04.120613.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120626/datafile151612\u0026label\u003dVulnerability%20in%20AIX%20sendmail", "filesets": [ "bos.net.tcp.client:7.1.1.0-7.1.1.16" ], "issued": "20120626", "updated": "null", "siblings": [ "6100-06:IV22965", "6100-07:IV22966", "6100-08:IV24454", "7100-00:IV22964", "7100-01:IV22963", "7100-02:IV24645" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar", "cvss": [ "CVE-2012-2200:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09" ], "apAbstract": "Vulnerability in AIX sendmail", "aparNo": "IV22964", "aparNoSet": [ "CVE-2012-2200", "IV22964" ], "fixedIn": "7100-00-10", "ifixes": [ "IV22964s05.120613.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120626/datafile151612\u0026label\u003dVulnerability%20in%20AIX%20sendmail", "filesets": [ "bos.net.tcp.client:7.1.0.0-7.1.0.21" ], "issued": "20120626", "updated": "null", "siblings": [ "6100-06:IV22965", "6100-07:IV22966", "6100-08:IV24454", "7100-00:IV22964", "7100-01:IV22963", "7100-02:IV24645" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar", "cvss": [ "CVE-2012-2200:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09" ], "apAbstract": "Vulnerability in AIX sendmail", "aparNo": "IV22965", "aparNoSet": [ "CVE-2012-2200", "IV22965" ], "fixedIn": "6100-06-10", "ifixes": [ "IV22965s07.120613.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120626/datafile151612\u0026label\u003dVulnerability%20in%20AIX%20sendmail", "filesets": [ "bos.net.tcp.client:6.1.6.0-6.1.6.20" ], "issued": "20120626", "updated": "null", "siblings": [ "6100-06:IV22965", "6100-07:IV22966", "6100-08:IV24454", "7100-00:IV22964", "7100-01:IV22963", "7100-02:IV24645" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar", "cvss": [ "CVE-2012-2200:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05" ], "apAbstract": "Vulnerability in AIX sendmail", "aparNo": "IV22966", "aparNoSet": [ "CVE-2012-2200", "IV22966" ], "fixedIn": "6100-07-06", "ifixes": [ "IV22966s04.120613.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120626/datafile151612\u0026label\u003dVulnerability%20in%20AIX%20sendmail", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.16" ], "issued": "20120626", "updated": "null", "siblings": [ "6100-06:IV22965", "6100-07:IV22966", "6100-08:IV24454", "7100-00:IV22964", "7100-01:IV22963", "7100-02:IV24645" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar", "cvss": [ "CVE-2012-2200:7.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5" ], "apAbstract": "Vulnerability in VIOS sendmail", "aparNo": "IV22966", "aparNoSet": [ "CVE-2012-2200", "IV22966" ], "fixedIn": "2.2.1.7", "ifixes": [ "IV22966s04.120613.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201206/SECURITY/20120626/datafile151612\u0026label\u003dVulnerability%20in%20VIOS%20sendmail", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.16" ], "issued": "20120626", "updated": "null", "siblings": [ "6100-06:IV22965", "6100-07:IV22966", "6100-08:IV24454", "7100-00:IV22964", "7100-01:IV22963", "7100-02:IV24645" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar", "cvss": [ "CVE-2012-2200:7.2" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08" ], "apAbstract": "APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY", "aparNo": "IV22982", "aparNoSet": [ "IV22982" ], "fixedIn": "6100-06-09", "ifixes": [ "IV22982s08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV22982", "filesets": [ "bos.64bit:6.1.6.18", "bos.adt.prof:6.1.6.18", "bos.rte.control:6.1.6.18", "bos.rte.libc:6.1.6.18", "bos.rte.shell:6.1.6.18", "mcr.rte:6.1.6.18" ], "issued": "20120613", "updated": "20130226", "siblings": [ "7100-01:IV22132", "7100-02:IV24288", "6100-07:IV22062", "6100-06:IV22982" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv22982/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07" ], "apAbstract": "INACCURATE/INVALID RESULTS RETURNED BY SOME MATH LIBRARY APIS", "aparNo": "IV23305", "aparNoSet": [ "IV23305" ], "fixedIn": "7100-00-08", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV23305", "filesets": [ "bos.adt.prof:7.1.0.0-7.1.0.19", "bos.adt.libm:7.1.0.0-7.1.0.16" ], "issued": "20120619", "updated": "20130409", "siblings": [ "7100-00:IV23305", "7100-01:IV22812" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06" ], "apAbstract": "AIX ftp vulnerability", "aparNo": "IV23331", "aparNoSet": [ "CVE-2012-4845", "IV23331" ], "fixedIn": "6100-07-07", "ifixes": [ "IV23331s6a.121226.epkg.Z", "IV23331m05.121003.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.17", "bos.rte.tty:6.1.7.0-6.1.7.16" ], "issued": "20120703", "updated": "20130208", "siblings": [ "6100-06:IV28715", "6100-07:IV23331", "6100-08:IV28651", "7100-00:IV28785", "7100-01:IV28787", "7100-02:IV30669" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar", "cvss": [ "CVE-2012-4845:6.8" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5" ], "apAbstract": "VIOS ftp vulnerability", "aparNo": "IV23331", "aparNoSet": [ "CVE-2012-4845", "IV23331" ], "fixedIn": "2.2.1.7", "ifixes": [ "IV23331m04.121003.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20VIOS%20FTP%20Vulnerability%20CVE-2012-4845", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.17", "bos.rte.tty:6.1.7.0-6.1.7.16" ], "issued": "20120703", "updated": "20130208", "siblings": [ "6100-06:IV28715", "6100-07:IV23331", "6100-08:IV28651", "7100-00:IV28785", "7100-01:IV28787", "7100-02:IV30669" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar", "cvss": [ "CVE-2012-4845:6.8" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06" ], "apAbstract": "DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING", "aparNo": "IV23966", "aparNoSet": [ "IV23966" ], "fixedIn": "7100-00-07", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV23966", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.18" ], "issued": "20120627", "updated": "20130413", "siblings": [ "6100-05:IV16568", "6100-06:IV16567", "6100-08:IV17105", "7100-00:IV23966", "7100-01:IV16514", "7100-02:IV17107" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05" ], "apAbstract": "ASSERT IN IOCP_INSQUEUE", "aparNo": "IV24569", "aparNoSet": [ "IV24569" ], "fixedIn": "6100-07-06", "ifixes": [ "IV24569s05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV24569", "filesets": [ "bos.iocp.rte:6.1.7.15-6.1.7.16" ], "issued": "20120710", "updated": "20131123", "siblings": [ "7100-00:IV29604", "7100-01:IV27204", "6100-06:IV27337", "6100-07:IV24569" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv24569/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06" ], "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS", "aparNo": "IV24610", "aparNoSet": [ "IV24610" ], "fixedIn": "7100-01-07", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV24610", "filesets": [ "bos.perf.perfstat:7.1.1.0-7.1.1.17", "bos.perf.tools:7.1.1.0-7.1.1.17" ], "issued": "20120710", "updated": "20131123", "siblings": [ "7100-00:IV35280", "7100-01:IV24610", "7100-02:IV30032", "7100-03:IV31489", "6100-06:IV24777", "6100-07:IV33521", "6100-08:IV30236", "6100-09:IV30081" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10" ], "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS", "aparNo": "IV24777", "aparNoSet": [ "IV24777" ], "fixedIn": "6100-06-11", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV24777", "filesets": [ "bos.perf.perfstat:6.1.6.0-6.1.7.20", "bos.perf.tools:6.1.6.0-6.1.6.20" ], "issued": "20120716", "updated": "20131123", "siblings": [ "7100-00:IV35280", "7100-01:IV24610", "7100-02:IV30032", "7100-03:IV31489", "6100-06:IV24777", "6100-07:IV33521", "6100-08:IV30236", "6100-09:IV30081" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05" ], "apAbstract": "REDUCE EARLY WORKING STORAGE PAGING", "aparNo": "IV26272", "aparNoSet": [ "IV26272" ], "fixedIn": "6100-07-06", "ifixes": [ "IV26272s05.epkg.Z", "IV26272s04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV26272", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.17" ], "issued": "20120814", "updated": "20130409", "siblings": [ "6100-06:IV27655", "6100-07:IV26272", "6100-08:IV26735", "7100-00:IV26581", "7100-01:IV27014", "7100-02:IV26731" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv26272/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07" ], "apAbstract": "AIX NFSv4 vulnerability", "aparNo": "IV26436", "aparNoSet": [ "CVE-2012-4817", "IV26436" ], "fixedIn": "7100-00-08", "ifixes": [ "IV26436s07.120907.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dAIX%20NFSv4%20Vulnerability%20CVE-2012-4817", "filesets": [ "bos.net.nfs.client:7.1.0.0-7.1.0.20" ], "issued": "20120913", "updated": "null", "siblings": [ "6100-05:IV09495", "6100-06:IV10327", "6100-07:IV11629", "6100-08:IV11511", "7100-00:IV26436", "7100-01:IV12169", "7100-02:IV11502" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar", "cvss": [ "CVE-2012-4817:5" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07" ], "apAbstract": "REDUCE EARLY WORKING STORAGE PAGING", "aparNo": "IV26581", "aparNoSet": [ "IV26581" ], "fixedIn": "7100-00-08", "ifixes": [ "IV26581s07.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV26581", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.20" ], "issued": "20120820", "updated": "20130409", "siblings": [ "6100-06:IV27655", "6100-07:IV26272", "6100-08:IV26735", "7100-00:IV26581", "7100-01:IV27014", "7100-02:IV26731" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv26581/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05" ], "apAbstract": "REDUCE EARLY WORKING STORAGE PAGING", "aparNo": "IV27014", "aparNoSet": [ "IV27014" ], "fixedIn": "7100-01-06", "ifixes": [ "IV27014s04.epkg.Z", "IV27014s05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27014", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.16" ], "issued": "20120824", "updated": "20130409", "siblings": [ "6100-06:IV27655", "6100-07:IV26272", "6100-08:IV26735", "7100-00:IV26581", "7100-01:IV27014", "7100-02:IV26731" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27014/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-04", "7100-01-05" ], "apAbstract": "ASSERT IN IOCP_INSQUEUE", "aparNo": "IV27204", "aparNoSet": [ "IV27204" ], "fixedIn": "7100-01-06", "ifixes": [ "IV27204s05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27204", "filesets": [ "bos.iocp.rte:7.1.1.15" ], "issued": "20120829", "updated": "20131123", "siblings": [ "7100-00:IV29604", "7100-01:IV27204", "6100-06:IV27337", "6100-07:IV24569" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27204/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-08", "6100-06-09" ], "apAbstract": "ASSERT IN IOCP_INSQUEUE", "aparNo": "IV27337", "aparNoSet": [ "IV27337" ], "fixedIn": "6100-06-10", "ifixes": [ "iV27337s09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27337", "filesets": [ "bos.iocp.rte:6.1.6.18-6.1.6.19" ], "issued": "20120831", "updated": "20131123", "siblings": [ "7100-00:IV29604", "7100-01:IV27204", "6100-06:IV27337", "6100-07:IV24569" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27337/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07" ], "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().", "aparNo": "IV27584", "aparNoSet": [ "IV27584" ], "fixedIn": "7100-01-08", "ifixes": [ "U855903", "bos.mp64:7.1.1.19" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27584", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.19" ], "issued": "20120905", "updated": "20131124", "siblings": [ "6100-06:IZ94647", "6100-07:IV13404", "6100-08:IV14309", "6100-09:IV42440", "7100-00:IV42334", "7100-01:IV27584", "7100-02:IV42324", "7100-03:IV42412" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27584/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09" ], "apAbstract": "REDUCE EARLY WORKING STORAGE PAGING", "aparNo": "IV27655", "aparNoSet": [ "IV27655" ], "fixedIn": "6100-06-10", "ifixes": [ "IV27655s07.epkg.Z", "IV27655s09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27655", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.20" ], "issued": "20120906", "updated": "20130409", "siblings": [ "6100-06:IV27655", "6100-07:IV26272", "6100-08:IV26735", "7100-00:IV26581", "7100-01:IV27014", "7100-02:IV26731" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27655/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06" ], "apAbstract": "SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES", "aparNo": "IV27680", "aparNoSet": [ "IV27680" ], "fixedIn": "6100-07-07", "ifixes": [ "IV27680.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27680", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.17" ], "issued": "20120927", "updated": "20131125", "siblings": [ "6100-07:IV27680", "6100-08:IV32845", "6100-08:IV32845", "7100-01:IV30075", "7100-02:IV33155" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27680/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10" ], "apAbstract": "AIX fuser vulnerability", "aparNo": "IV28151", "aparNoSet": [ "CVE-2012-4833", "IV28151" ], "fixedIn": "6100-06-11", "ifixes": [ "IV28151s09.120926.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120928/datafile160830\u0026label\u003dAIX%20fuser%20vulnerability%20CVE-2012-4833", "filesets": [ "bos.rte.filesystem:6.1.6.0-6.1.6.19" ], "issued": "20120923", "updated": "null", "siblings": [ "6100-06:IV28151", "6100-07:IV28749", "7100-00:IV28754", "7100-01:IV28756" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar", "cvss": [ "CVE-2012-4833:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01" ], "apAbstract": "AIX ftp vulnerability", "aparNo": "IV28651", "aparNoSet": [ "CVE-2012-4845", "IV28651" ], "fixedIn": "6100-08-02", "ifixes": [ "IV28651s1a.121204.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.1" ], "issued": "20120703", "updated": "20130208", "siblings": [ "6100-06:IV28715", "6100-07:IV23331", "6100-08:IV28651", "7100-00:IV28785", "7100-01:IV28787", "7100-02:IV30669" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar", "cvss": [ "CVE-2012-4845:6.8" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1" ], "apAbstract": "VIOS ftp vulnerability", "aparNo": "IV28651", "aparNoSet": [ "CVE-2012-4845", "IV28651" ], "fixedIn": "2.2.2.2", "ifixes": [ "IV28651s1a.121204.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20VIOS%20FTP%20Vulnerability%20CVE-2012-4845", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.1" ], "issued": "20120703", "updated": "20130208", "siblings": [ "6100-06:IV28715", "6100-07:IV23331", "6100-08:IV28651", "7100-00:IV28785", "7100-01:IV28787", "7100-02:IV30669" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar", "cvss": [ "CVE-2012-4845:6.8" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10" ], "apAbstract": "AIX ftp vulnerability", "aparNo": "IV28715", "aparNoSet": [ "CVE-2012-4845", "IV28715" ], "fixedIn": "6100-06-11", "ifixes": [ "IV28715sAa.130206.epkg.Z", "IV28715m09.121012.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.21", "bos.rte.tty:6.1.6.0-6.1.6.19" ], "issued": "20120703", "updated": "20130208", "siblings": [ "6100-06:IV28715", "6100-07:IV23331", "6100-08:IV28651", "7100-00:IV28785", "7100-01:IV28787", "7100-02:IV30669" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar", "cvss": [ "CVE-2012-4845:6.8" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06" ], "apAbstract": "AIX fuser vulnerability", "aparNo": "IV28749", "aparNoSet": [ "CVE-2012-4833", "IV28749" ], "fixedIn": "6100-07-07", "ifixes": [ "IV28749s05.120926.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/fuser_advisory.asc", "filesets": [ "bos.rte.filesystem:6.1.7.0-6.1.7.16" ], "issued": "20120923", "updated": "null", "siblings": [ "6100-06:IV28151", "6100-07:IV28749", "7100-00:IV28754", "7100-01:IV28756" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar", "cvss": [ "CVE-2012-4833:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07" ], "apAbstract": "AIX fuser vulnerability", "aparNo": "IV28754", "aparNoSet": [ "CVE-2012-4833", "IV28754" ], "fixedIn": "7100-00-08", "ifixes": [ "IV28754s07.120926.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120928/datafile160830\u0026label\u003dAIX%20fuser%20vulnerability%20CVE-2012-4833", "filesets": [ "bos.rte.filesystem:7.1.0.0-7.1.0.18" ], "issued": "20120923", "updated": "null", "siblings": [ "6100-06:IV28151", "6100-07:IV28749", "7100-00:IV28754", "7100-01:IV28756" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar", "cvss": [ "CVE-2012-4833:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06" ], "apAbstract": "AIX fuser vulnerability", "aparNo": "IV28756", "aparNoSet": [ "CVE-2012-4833", "IV28756" ], "fixedIn": "7100-01-07", "ifixes": [ "IV28756s05.120926.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120928/datafile160830\u0026label\u003dAIX%20fuser%20vulnerability%20CVE-2012-4833", "filesets": [ "bos.rte.filesystem:7.1.1.0-7.1.1.16" ], "issued": "20120923", "updated": "null", "siblings": [ "6100-06:IV28151", "6100-07:IV28749", "7100-00:IV28754", "7100-01:IV28756" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar", "cvss": [ "CVE-2012-4833:2.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08" ], "apAbstract": "AIX ftp vulnerability", "aparNo": "IV28785", "aparNoSet": [ "CVE-2012-4845", "IV28785" ], "fixedIn": "7100-00-09", "ifixes": [ "IV28785s8a.130206.epkg.Z", "IV28785m07.121002.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.1" ], "issued": "20120703", "updated": "20130208", "siblings": [ "6100-06:IV28715", "6100-07:IV23331", "6100-08:IV28651", "7100-00:IV28785", "7100-01:IV28787", "7100-02:IV30669" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar", "cvss": [ "CVE-2012-4845:6.8" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07" ], "apAbstract": "AIX ftp vulnerability", "aparNo": "IV28787", "aparNoSet": [ "CVE-2012-4845", "IV28787" ], "fixedIn": "7100-01-07", "ifixes": [ "IV28787s6a.130121.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.17", "bos.rte.tty:7.1.1.0-7.1.1.16" ], "issued": "20120703", "updated": "20130208", "siblings": [ "6100-06:IV28715", "6100-07:IV23331", "6100-08:IV28651", "7100-00:IV28785", "7100-01:IV28787", "7100-02:IV30669" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar", "cvss": [ "CVE-2012-4845:6.8" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-06", "7100-00-07" ], "apAbstract": "ASSERT IN IOCP_INSQUEUE", "aparNo": "IV29604", "aparNoSet": [ "IV29604" ], "fixedIn": "7100-00-08", "ifixes": [ "IV29604s07.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV29604", "filesets": [ "bos.iocp.rte:7.1.0.17" ], "issued": "20121005", "updated": "20131123", "siblings": [ "7100-00:IV29604", "7100-01:IV27204", "6100-06:IV27337", "6100-07:IV24569" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv29604/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01" ], "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS", "aparNo": "IV30032", "aparNoSet": [ "IV30032" ], "fixedIn": "7100-02-02", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV30032", "filesets": [ "bos.perf.perfstat:7.1.2.0-7.1.2.1", "bos.perf.tools:7.1.2.0-7.1.2.1" ], "issued": "20121011", "updated": "20131123", "siblings": [ "7100-00:IV35280", "7100-01:IV24610", "7100-02:IV30032", "7100-03:IV31489", "6100-06:IV24777", "6100-07:IV33521", "6100-08:IV30236", "6100-09:IV30081" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06" ], "apAbstract": "SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES", "aparNo": "IV30075", "aparNoSet": [ "IV30075" ], "fixedIn": "7100-01-07", "ifixes": [ "IV30075.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV30075", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.18" ], "issued": "20121012", "updated": "20131125", "siblings": [ "6100-07:IV27680", "6100-08:IV32845", "6100-08:IV32845", "7100-01:IV30075", "7100-02:IV33155" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv30075/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01" ], "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS", "aparNo": "IV30236", "aparNoSet": [ "IV30236" ], "fixedIn": "6100-08-02", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV30236", "filesets": [ "bos.perf.perfstat:6.1.8.0-6.1.8.14", "bos.perf.tools:6.1.8.0-6.1.8.14" ], "issued": "20121013", "updated": "20131123", "siblings": [ "7100-00:IV35280", "7100-01:IV24610", "7100-02:IV30032", "7100-03:IV31489", "6100-06:IV24777", "6100-07:IV33521", "6100-08:IV30236", "6100-09:IV30081" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "IV30364", "aparNoSet": [ "CVE-2012-5166", "IV30364" ], "fixedIn": "6100-06-11", "ifixes": [ "IV30364s10.130121.epkg.Z", "IV30364s09.121016.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163519\u0026label\u003dUPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166", "filesets": [ "bos.net.tcp.client:6.1.6.0-6.1.6.21", "bos.net.tcp.server:6.1.6.0-6.1.6.20" ], "issued": "20121023", "updated": "20130128", "siblings": [ "5300-12:IV30368", "6100-06:IV30364", "6100-07:IV30365", "6100-08:IV30247", "7100-00:IV30366", "7100-01:IV30367", "7100-02:IV30185" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar", "cvss": [ "CVE-2012-5166:7.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "IV30365", "aparNoSet": [ "CVE-2012-5166", "IV30365" ], "fixedIn": "6100-07-07", "ifixes": [ "IV30365s06.130121.epkg.Z", "IV30365s05.121016.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.17", "bos.net.tcp.server:6.1.7.0-6.1.7.17" ], "issued": "20121023", "updated": "20130128", "siblings": [ "5300-12:IV30368", "6100-06:IV30364", "6100-07:IV30365", "6100-08:IV30247", "7100-00:IV30366", "7100-01:IV30367", "7100-02:IV30185" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar", "cvss": [ "CVE-2012-5166:7.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5" ], "apAbstract": "Vulnerability in VIOS bind", "aparNo": "IV30365", "aparNoSet": [ "CVE-2012-5166", "IV30365" ], "fixedIn": "2.2.1.7", "ifixes": [ "IV30365s04.121018.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201301/SECURITY/20130128/datafile163519\u0026label\u003dUPDATE%20-%20Vulnerability%20in%20VIOS%20bind%20-%20CVE-2012-5166", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.17", "bos.net.tcp.server:6.1.7.0-6.1.7.17" ], "issued": "20121023", "updated": "20130128", "siblings": [ "5300-12:IV30368", "6100-06:IV30364", "6100-07:IV30365", "6100-08:IV30247", "7100-00:IV30366", "7100-01:IV30367", "7100-02:IV30185" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar", "cvss": [ "CVE-2012-5166:7.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "IV30366", "aparNoSet": [ "CVE-2012-5166", "IV30366" ], "fixedIn": "7100-00-09", "ifixes": [ "IV30366s08.130121.epkg.Z", "IV30366s07.121016.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163519\u0026label\u003dUPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166", "filesets": [ "bos.net.tcp.client:7.1.0.0-7.1.0.22", "bos.net.tcp.server:7.1.0.0-7.1.1.19" ], "issued": "20121023", "updated": "20130128", "siblings": [ "5300-12:IV30368", "6100-06:IV30364", "6100-07:IV30365", "6100-08:IV30247", "7100-00:IV30366", "7100-01:IV30367", "7100-02:IV30185" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar", "cvss": [ "CVE-2012-5166:7.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "IV30367", "aparNoSet": [ "CVE-2012-5166", "IV30367" ], "fixedIn": "7100-01-07", "ifixes": [ "IV30367s06.130121.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163519\u0026label\u003dUPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166", "filesets": [ "bos.net.tcp.client:7.1.1.0-7.1.1.17", "bos.net.tcp.server:7.1.1.0-7.1.1.17" ], "issued": "20121023", "updated": "20130128", "siblings": [ "5300-12:IV30368", "6100-06:IV30364", "6100-07:IV30365", "6100-08:IV30247", "7100-00:IV30366", "7100-01:IV30367", "7100-02:IV30185" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar", "cvss": [ "CVE-2012-5166:7.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06" ], "apAbstract": "Vulnerability in AIX bind", "aparNo": "IV30368", "aparNoSet": [ "CVE-2012-5166", "IV30368" ], "fixedIn": "5300-12-07", "ifixes": [ "IV30368s06.121016.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163519\u0026label\u003dUPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.7", "bos.net.tcp.server:5.3.12.0-5.3.12.7" ], "issued": "20121023", "updated": "20130128", "siblings": [ "5300-12:IV30368", "6100-06:IV30364", "6100-07:IV30365", "6100-08:IV30247", "7100-00:IV30366", "7100-01:IV30367", "7100-02:IV30185" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar", "cvss": [ "CVE-2012-5166:7.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "AIX ftp vulnerability", "aparNo": "IV30669", "aparNoSet": [ "CVE-2012-4845", "IV30669" ], "fixedIn": "7100-02-02", "ifixes": [ "IV30669s1a.130114.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.1" ], "issued": "20120703", "updated": "20130208", "siblings": [ "6100-06:IV28715", "6100-07:IV23331", "6100-08:IV28651", "7100-00:IV28785", "7100-01:IV28787", "7100-02:IV30669" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar", "cvss": [ "CVE-2012-4845:6.8" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10" ], "apAbstract": "SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES", "aparNo": "IV30703", "aparNoSet": [ "IV30703" ], "fixedIn": "6100-06-11", "ifixes": [ "IV30703.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV30703", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.21" ], "issued": "20121022", "updated": "20130410", "siblings": [ "6100-07:IV27680", "6100-08:IV32845", "6100-08:IV32845", "7100-01:IV30075", "7100-02:IV33155" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv30703/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01" ], "apAbstract": "A tcp connection can hang and never send the last bytes", "aparNo": "IV31960", "aparNoSet": [ "IV31960" ], "fixedIn": "7100-02-02", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV31960", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.1" ], "issued": "20121113", "updated": "20131123", "siblings": [ "7100-00:IV33484", "7100-01:IV20656", "7100-02:IV31960", "7100-03:IV32651", "6100-06:IV33483", "6100-07:IV32392", "6100-08:IV31959", "6100-09:IV32467", "5300-12:IV32615" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01" ], "apAbstract": "DATA PTR INCORRECTLY INCREMENTED IN UDP RECEIVE.", "aparNo": "IV31961", "aparNoSet": [ "IV31961" ], "fixedIn": "6100-08-02", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV31961", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.1" ], "issued": "20121113", "updated": "20131123", "siblings": [ "6100-08:IV31961", "6100-09:IV33210", "7100-02:IV31962", "7100-03:IV34454" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01" ], "apAbstract": "DATA PTR INCORRECTLY INCREMENTED IN UDP RECEIVE.", "aparNo": "IV31962", "aparNoSet": [ "IV31962" ], "fixedIn": "7100-02-02", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV31962", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.2", "bos.net.tcp.client:7.1.2.0-7.1.2.15" ], "issued": "20121113", "updated": "20131123", "siblings": [ "6100-08:IV31961", "6100-09:IV33210", "7100-02:IV31962", "7100-03:IV34454" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06" ], "apAbstract": "A tcp connection can hang and never send the last bytes", "aparNo": "IV32392", "aparNoSet": [ "IV32392" ], "fixedIn": "6100-07-07", "ifixes": [ "IV32392.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV32392", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.17" ], "issued": "20121122", "updated": "20131123", "siblings": [ "7100-00:IV33484", "7100-01:IV20656", "7100-02:IV31960", "7100-03:IV32651", "6100-06:IV33483", "6100-07:IV32392", "6100-08:IV31959", "6100-09:IV32467", "5300-12:IV32615" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv32392/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06" ], "apAbstract": "A tcp connection can hang and never send the last bytes", "aparNo": "IV32615", "aparNoSet": [ "IV32615" ], "fixedIn": "5300-12-07", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV32615", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.8" ], "issued": "20121127", "updated": "20131123", "siblings": [ "7100-00:IV33484", "7100-01:IV20656", "7100-02:IV31960", "7100-03:IV32651", "6100-06:IV33483", "6100-07:IV32392", "6100-08:IV31959", "6100-09:IV32467", "5300-12:IV32615" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01" ], "apAbstract": "SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES", "aparNo": "IV33155", "aparNoSet": [ "IV33155" ], "fixedIn": "7100-02-02", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV33155", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.1" ], "issued": "20131207", "updated": "20131125", "siblings": [ "6100-07:IV27680", "6100-08:IV32845", "6100-08:IV32845", "7100-01:IV30075", "7100-02:IV33155" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10" ], "apAbstract": "A tcp connection can hang and never send the last bytes", "aparNo": "IV33483", "aparNoSet": [ "IV33483" ], "fixedIn": "6100-06-11", "ifixes": [ "IV33483.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV33483", "filesets": [ "bos.net.tcp.client:6.1.6.0-6.1.6.21" ], "issued": "20121214", "updated": "20131123", "siblings": [ "7100-00:IV33484", "7100-01:IV20656", "7100-02:IV31960", "7100-03:IV32651", "6100-06:IV33483", "6100-07:IV32392", "6100-08:IV31959", "6100-09:IV32467", "5300-12:IV32615" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv33483/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08" ], "apAbstract": "A tcp connection can hang and never send the last bytes", "aparNo": "IV33484", "aparNoSet": [ "IV33484" ], "fixedIn": "7100-00-09", "ifixes": [ "IV33434.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV33484", "filesets": [ "bos.net.tcp.client:7.1.0.0-7.1.0.22" ], "issued": "20121214", "updated": "20131123", "siblings": [ "7100-00:IV33484", "7100-01:IV20656", "7100-02:IV31960", "7100-03:IV32651", "6100-06:IV33483", "6100-07:IV32392", "6100-08:IV31959", "6100-09:IV32467", "5300-12:IV32615" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv33484/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06" ], "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS", "aparNo": "IV33521", "aparNoSet": [ "IV33521" ], "fixedIn": "6100-07-07", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV33521", "filesets": [ "bos.perf.perfstat:6.1.7.0-6.1.7.17", "bos.perf.tools:6.1.7.0-6.1.7.17" ], "issued": "20121217", "updated": "20131123", "siblings": [ "7100-00:IV35280", "7100-01:IV24610", "7100-02:IV30032", "7100-03:IV31489", "6100-06:IV24777", "6100-07:IV33521", "6100-08:IV30236", "6100-09:IV30081" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-08", "6100-06-09", "6100-06-10", "6100-06-11" ], "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL", "aparNo": "IV33883", "aparNoSet": [ "IV33883" ], "fixedIn": "6100-06-12", "ifixes": [ "IV33883.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV33883", "filesets": [ "bos.adt.include:6.1.6.18-6.1.6.21", "bos.mp64:6.1.6.19-6.1.6.22" ], "issued": "20121220", "updated": "20131126", "siblings": [ "6100-06:IV33883", "6100-07:IV40614", "6100-08:IV38743", "7100-00:IV41813", "7100-01:IV41421", "7100-02:IV38915" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv33883/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01" ], "apAbstract": "CRASH IN LD_GETINFO_ALL32+000230", "aparNo": "IV34354", "aparNoSet": [ "IV34354" ], "fixedIn": "6100-08-02", "ifixes": [ "IV35680s6a.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV34354", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.1" ], "issued": "20130109", "updated": "20131126", "siblings": [ "6100-07:IV35680", "6100-08:IV34354" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv34354/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08" ], "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS", "aparNo": "IV35280", "aparNoSet": [ "IV35280" ], "fixedIn": "7100-00-09", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35280", "filesets": [ "bos.perf.perfstat:7.1.0.0-7.1.0.20", "bos.perf.tools:7.1.0.0-7.1.0.20" ], "issued": "20130116", "updated": "20131123", "siblings": [ "7100-00:IV35280", "7100-01:IV24610", "7100-02:IV30032", "7100-03:IV31489", "6100-06:IV24777", "6100-07:IV33521", "6100-08:IV30236", "6100-09:IV30081" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06" ], "apAbstract": "CRASH IN LD_GETINFO_ALL32+000230", "aparNo": "IV35680", "aparNoSet": [ "IV35680" ], "fixedIn": "6100-07-07", "ifixes": [ "IV35680s6a.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35680", "filesets": [ "bos.mp64:6.1.7.17" ], "issued": "20130122", "updated": "20131126", "siblings": [ "6100-07:IV35680", "6100-08:IV34354" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35680/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10" ], "apAbstract": "DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT", "aparNo": "IV35809", "aparNoSet": [ "IV35809" ], "fixedIn": "6100-06-11", "ifixes": [ "IV35809sAa.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35809", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.21" ], "issued": "20130123", "updated": "20131125", "siblings": [ "7100-00:IV35812", "7100-01:IV35813", "7100-02:IV35814", "6100-06:IV35809", "6100-07:IV35810", "6100-08:IV35811", "6100-09:IV33672" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35809/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06" ], "apAbstract": "DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT", "aparNo": "IV35810", "aparNoSet": [ "IV35810" ], "fixedIn": "6100-07-07", "ifixes": [ "IV35810s6a.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35810", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.17" ], "issued": "20130123", "updated": "20131125", "siblings": [ "7100-00:IV35812", "7100-01:IV35813", "7100-02:IV35814", "6100-06:IV35809", "6100-07:IV35810", "6100-08:IV35811", "6100-09:IV33672" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35810/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08" ], "apAbstract": "Data error in a file on an NFS server after a server reboot", "aparNo": "IV35812", "aparNoSet": [ "IV35812" ], "fixedIn": "7100-00-09", "ifixes": [ "IV35812s8a.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35812", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.21" ], "issued": "20130123", "updated": "20131125", "siblings": [ "7100-00:IV35812", "7100-01:IV35813", "7100-02:IV35814", "6100-06:IV35809", "6100-07:IV35810", "6100-08:IV35811", "6100-09:IV33672" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35812/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06" ], "apAbstract": "Data error in a file on an NFS server after a server reboot", "aparNo": "IV35813", "aparNoSet": [ "IV35813" ], "fixedIn": "7100-01-07", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35813", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.18" ], "issued": "20130123", "updated": "20131125", "siblings": [ "7100-00:IV35812", "7100-01:IV35813", "7100-02:IV35814", "6100-06:IV35809", "6100-07:IV35810", "6100-08:IV35811", "6100-09:IV33672" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35813/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01" ], "apAbstract": "DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT", "aparNo": "IV35814", "aparNoSet": [ "IV35814" ], "fixedIn": "7100-02-02", "ifixes": [ "IV35814s1a.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35814", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.1" ], "issued": "20130123", "updated": "20131125", "siblings": [ "7100-00:IV35812", "7100-01:IV35813", "7100-02:IV35814", "6100-06:IV35809", "6100-07:IV35810", "6100-08:IV35811", "6100-09:IV33672" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35814/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01" ], "apAbstract": "UDP MULTICAST: SHORT PACKET FOR SOME LISTENERS", "aparNo": "IV35888", "aparNoSet": [ "IV35888" ], "fixedIn": "6100-08-02", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35888", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.2" ], "issued": "20130125", "updated": "20131126", "siblings": [ "6100-08:IV35888", "6100-09:IV35644", "7100-02:IV35893", "7100-03:IV33047" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35888/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01" ], "apAbstract": "UDP MULTICAST: SHORT PACKET FOR SOME LISTENERS.", "aparNo": "IV35893", "aparNoSet": [ "IV35893" ], "fixedIn": "7100-02-02", "ifixes": [ "IV35893.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35893", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.1" ], "issued": "20130125", "updated": "20131126", "siblings": [ "6100-08:IV35888", "6100-09:IV35644", "7100-02:IV35893", "7100-03:IV33047" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35893/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07" ], "apAbstract": "RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP", "aparNo": "IV36524", "aparNoSet": [ "IV36524" ], "fixedIn": "7100-01-08", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV36524", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.20" ], "issued": "20130215", "updated": "20131124", "siblings": [ "6100-06:IV36527", "6100-07:IV34105", "6100-08:IV38589", "6100-09:IV36642", "7100-00:IV36835", "7100-01:IV36524", "7100-02:IV38251", "7100-03:IV36832" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09" ], "apAbstract": "RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP", "aparNo": "IV36835", "aparNoSet": [ "IV36835" ], "fixedIn": "7100-00-10", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV36835", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.22" ], "issued": "20130215", "updated": "20131124", "siblings": [ "6100-06:IV36527", "6100-07:IV34105", "6100-08:IV38589", "6100-09:IV36642", "7100-00:IV36835", "7100-01:IV36524", "7100-02:IV38251", "7100-03:IV36832" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "LD FAILING TO EXPORT UNREFERENCED SYMBOLS", "aparNo": "IV36875", "aparNoSet": [ "IV36875" ], "fixedIn": "7100-02-03", "ifixes": [ "IV36875.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV36875", "filesets": [ "bos.rte.bind_cmds:7.1.2.0" ], "issued": "20130218", "updated": "20131124", "siblings": [ "6100-08:IV36851", "7100-02:IV36875" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv36875/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08" ], "apAbstract": "SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES", "aparNo": "IV37083", "aparNoSet": [ "IV37083" ], "fixedIn": "7100-00-09", "ifixes": [ "IV37083.epkg.Z", "IV37083s8a.130225.71TL00SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV37083", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.21" ], "issued": "20130221", "updated": "20130430", "siblings": [ "6100-07:IV27680", "6100-08:IV32845", "6100-08:IV32845", "7100-01:IV30075", "7100-02:IV33155" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv37083/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02" ], "apAbstract": "ADDRESS FROM SORECEIVE NOT FILLED IN FOR UDP PACKETS", "aparNo": "IV37701", "aparNoSet": [ "IV37701" ], "fixedIn": "6100-08-03", "ifixes": [ "IV37701.epkg.Z", "IV37701s2a.130308.61TL08SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV37701", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.15" ], "issued": "20130307", "updated": "20131124", "siblings": [ "6100-08:IV37701", "6100-09:IV39175", "7100-02:IV37783", "7100-03:IV39176" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv37701/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "ADDRESS FROM SORECEIVE NOT FILLED IN FOR UDP PACKETS", "aparNo": "IV37783", "aparNoSet": [ "IV37783" ], "fixedIn": "7100-02-03", "ifixes": [ "IV37783.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV37783", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.15" ], "issued": "20130310", "updated": "20131124", "siblings": [ "6100-08:IV37701", "6100-09:IV39175", "7100-02:IV37783", "7100-03:IV39176" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv37783/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10", "6100-06-11" ], "apAbstract": "Vulnerability in AIX inet", "aparNo": "IV37925", "aparNoSet": [ "CVE-2013-3035", "IV37925" ], "fixedIn": "6100-06-12", "ifixes": [ "IV37925sBa.130508.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035", "filesets": [ "bos.net.tcp.client:6.1.6.0-6.1.6.22" ], "issued": "20130604", "updated": "20130605", "siblings": [ "6100-06:IV37925", "6100-07:IV42072", "6100-08:IV42124", "6100-09:IV41119", "7100-00:IV42264", "7100-01:IV42229", "7100-02:IV42095", "7100-03:IV41015" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar", "cvss": [ "CVE-2013-3035:7.1" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP", "aparNo": "IV38251", "aparNoSet": [ "IV38251" ], "fixedIn": "7100-02-03", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38251", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.15" ], "issued": "20130319", "updated": "20131124", "siblings": [ "6100-06:IV36527", "6100-07:IV34105", "6100-08:IV38589", "6100-09:IV36642", "7100-00:IV36835", "7100-01:IV36524", "7100-02:IV38251", "7100-03:IV36832" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02" ], "apAbstract": "USERDEL REMOVE -F FLAG", "aparNo": "IV38411", "aparNoSet": [ "IV38411" ], "fixedIn": "6100-08-03", "ifixes": [ "IV38411.epkg.Z", "IV38411m2a.130809.61TL08SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38411", "filesets": [ "bos.rte.security:6.1.8.0-6.1.8.15" ], "issued": "20130320", "updated": "20131126", "siblings": [ "6100-08:IV38411", "6100-09:IV39043", "7100-02:IV38414", "7100-03:IV38487" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv38411/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "USERDEL REMOVE -F FLAG", "aparNo": "IV38414", "aparNoSet": [ "IV38414" ], "fixedIn": "7100-02-03", "ifixes": [ "IV38414.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38414", "filesets": [ "bos.rte.security:7.1.2.0-7.1.2.15" ], "issued": "20130320", "updated": "20131126", "siblings": [ "6100-08:IV38411", "6100-09:IV39043", "7100-02:IV38414", "7100-03:IV38487" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv38414/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02" ], "apAbstract": "ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST", "aparNo": "IV38695", "aparNoSet": [ "IV38695" ], "fixedIn": "6100-08-03", "ifixes": [ "IV38695s1a.130603.61TL08SP01.epkg.Z", "IV38695s2a.130621.epkg.Z", "IV38695s2a.130621.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38695", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:6.1.8.0-6.1.8.15" ], "issued": "20130327", "updated": "20131124", "siblings": [ "6100-07:IV39384", "6100-08:IV38695", "6100-09:IV37549", "7100-01:IV41362", "7100-02:IV38879", "7100-03:IV37484" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv38695/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02" ], "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL", "aparNo": "IV38743", "aparNoSet": [ "IV38743" ], "fixedIn": "6100-08-03", "ifixes": [ "IV38743.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38743", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.15" ], "issued": "20130328", "updated": "20131126", "siblings": [ "6100-06:IV33883", "6100-07:IV40614", "6100-08:IV38743", "7100-00:IV41813", "7100-01:IV41421", "7100-02:IV38915" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv38743/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST", "aparNo": "IV38879", "aparNoSet": [ "IV38879" ], "fixedIn": "7100-02-03", "ifixes": [ "IV38879s2a.130603.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38879", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.1.2.0-7.1.2.15" ], "issued": "20130328", "updated": "20131124", "siblings": [ "6100-07:IV39384", "6100-08:IV38695", "6100-09:IV37549", "7100-01:IV41362", "7100-02:IV38879", "7100-03:IV37484" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv38879/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN FREE PROCESSORS IN POOL", "aparNo": "IV38915", "aparNoSet": [ "IV38915" ], "fixedIn": "7100-02-03", "ifixes": [ "IV38915.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38915", "filesets": [ "bos.adt.include:7.1.2.0-7.1.2.15", "bos.mp64:7.1.2.0-7.1.2.15" ], "issued": "20130328", "updated": "20131126", "siblings": [ "6100-06:IV33883", "6100-07:IV40614", "6100-08:IV38743", "7100-00:IV41813", "7100-01:IV41421", "7100-02:IV38915" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv41421/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07" ], "apAbstract": "ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST", "aparNo": "IV39384", "aparNoSet": [ "IV39384" ], "fixedIn": "6100-07-08", "ifixes": [ "IV39384s7a.130627.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV39384", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:6.1.7.0-6.1.7.18" ], "issued": "20130405", "updated": "20131124", "siblings": [ "6100-07:IV39384", "6100-08:IV38695", "6100-09:IV37549", "7100-01:IV41362", "7100-02:IV38879", "7100-03:IV37484" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv39384/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10", "6100-06-11" ], "apAbstract": "tftp Security Vulnerability", "aparNo": "IV40221", "aparNoSet": [ "CVE-2013-3005", "IV40221" ], "fixedIn": "6100-06-12", "ifixes": [ "IV40221s11.130617.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559", "filesets": [ "bos.net.tcp.client:6.1.6.0-6.1.6.22" ], "issued": "20130703", "updated": "null", "siblings": [ "6100-06:IV40221", "6100-07:IV42932", "6100-08:IV42933", "6100-09:IV42299", "7100-00:IV42934", "7100-01:IV42700", "7100-02:IV42935", "7100-03:IV43256" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar", "cvss": [ "CVE-2013-3005:7.9" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07" ], "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL", "aparNo": "IV40614", "aparNoSet": [ "IV40614" ], "fixedIn": "6100-07-08", "ifixes": [ "IV40614.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV40614", "filesets": [ "bos.adt.include:6.1.7.15-6.1.7.18", "bos.mp64:6.1.7.15-6.1.7.18" ], "issued": "20130424", "updated": "20131126", "siblings": [ "6100-06:IV33883", "6100-07:IV40614", "6100-08:IV38743", "7100-00:IV41813", "7100-01:IV41421", "7100-02:IV38915" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv40614/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07" ], "apAbstract": "ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST", "aparNo": "IV41362", "aparNoSet": [ "IV41362" ], "fixedIn": "7100-01-09", "ifixes": [ "IV41362s7a.130627.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV41362", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.1.1.0-7.1.1.19" ], "issued": "20130502", "updated": "20131124", "siblings": [ "6100-07:IV39384", "6100-08:IV38695", "6100-09:IV37549", "7100-01:IV41362", "7100-02:IV38879", "7100-03:IV37484" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv41362/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07" ], "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL 13/05/23 PTF PECHANGE", "aparNo": "IV41421", "aparNoSet": [ "IV41421" ], "fixedIn": "7100-01-08", "ifixes": [ "IV41412.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV41421", "filesets": [ "bos.adt.include:7.1.1.15-7.1.1.18", "bos.mp64:7.1.1.15-7.1.1.18" ], "issued": "20130502", "updated": "20131126", "siblings": [ "6100-06:IV33883", "6100-07:IV40614", "6100-08:IV38743", "7100-00:IV41813", "7100-01:IV41421", "7100-02:IV38915" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv41421/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09" ], "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL 13/05/23 PTF PECHANGE", "aparNo": "IV41813", "aparNoSet": [ "IV41813" ], "fixedIn": "7100-00-10", "ifixes": [ "IV41813.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV41813", "filesets": [ "bos.mp64:7.1.0.19-7.1.0.22" ], "issued": "20130506", "updated": "20131126", "siblings": [ "6100-06:IV33883", "6100-07:IV40614", "6100-08:IV38743", "7100-00:IV41813", "7100-01:IV41421", "7100-02:IV38915" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv41813/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07" ], "apAbstract": "Vulnerability in AIX inet", "aparNo": "IV42072", "aparNoSet": [ "CVE-2013-3035", "IV42072" ], "fixedIn": "6100-07-08", "ifixes": [ "IV42072s7a.130508.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.18" ], "issued": "20130604", "updated": "20130605", "siblings": [ "6100-06:IV37925", "6100-07:IV42072", "6100-08:IV42124", "6100-09:IV41119", "7100-00:IV42264", "7100-01:IV42229", "7100-02:IV42095", "7100-03:IV41015" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar", "cvss": [ "CVE-2013-3035:7.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7" ], "apAbstract": "Vulnerability in VIOS inet", "aparNo": "IV42072", "aparNoSet": [ "CVE-2013-3035", "IV42072" ], "fixedIn": "2.2.1.8", "ifixes": [ "IV42072s7a.130508.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20VIOS%20inet%20Vulnerability%20CVE-2013-3035", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.18" ], "issued": "20130604", "updated": "20130605", "siblings": [ "6100-06:IV37925", "6100-07:IV42072", "6100-08:IV42124", "6100-09:IV41119", "7100-00:IV42264", "7100-01:IV42229", "7100-02:IV42095", "7100-03:IV41015" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar", "cvss": [ "CVE-2013-3035:7.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "Vulnerability in AIX inet", "aparNo": "IV42095", "aparNoSet": [ "CVE-2013-3035", "IV42095" ], "fixedIn": "7100-02-03", "ifixes": [ "IV42095s2a.130514.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.15" ], "issued": "20130604", "updated": "20130605", "siblings": [ "6100-06:IV37925", "6100-07:IV42072", "6100-08:IV42124", "6100-09:IV41119", "7100-00:IV42264", "7100-01:IV42229", "7100-02:IV42095", "7100-03:IV41015" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar", "cvss": [ "CVE-2013-3035:7.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02" ], "apAbstract": "Vulnerability in AIX inet", "aparNo": "IV42124", "aparNoSet": [ "CVE-2013-3035", "IV42124" ], "fixedIn": "6100-08-03", "ifixes": [ "IV42124s2a.130514.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.15" ], "issued": "20130604", "updated": "20130605", "siblings": [ "6100-06:IV37925", "6100-07:IV42072", "6100-08:IV42124", "6100-09:IV41119", "7100-00:IV42264", "7100-01:IV42229", "7100-02:IV42095", "7100-03:IV41015" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar", "cvss": [ "CVE-2013-3035:7.1" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2" ], "apAbstract": "Vulnerability in VIOS inet", "aparNo": "IV42124", "aparNoSet": [ "CVE-2013-3035", "IV42124" ], "fixedIn": "2.2.2.3", "ifixes": [ "IV42124s2a.130514.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20VIOS%20inet%20Vulnerability%20CVE-2013-3035", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.15" ], "issued": "20130604", "updated": "20130605", "siblings": [ "6100-06:IV37925", "6100-07:IV42072", "6100-08:IV42124", "6100-09:IV41119", "7100-00:IV42264", "7100-01:IV42229", "7100-02:IV42095", "7100-03:IV41015" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar", "cvss": [ "CVE-2013-3035:7.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07" ], "apAbstract": "Vulnerability in AIX inet", "aparNo": "IV42229", "aparNoSet": [ "CVE-2013-3035", "IV42229" ], "fixedIn": "7100-01-08", "ifixes": [ "IV42229s7a.130522.epkg.Z", "IV42229s6a.130514.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035", "filesets": [ "bos.net.tcp.client:7.1.1.0-7.1.1.18" ], "issued": "20130604", "updated": "20130605", "siblings": [ "6100-06:IV37925", "6100-07:IV42072", "6100-08:IV42124", "6100-09:IV41119", "7100-00:IV42264", "7100-01:IV42229", "7100-02:IV42095", "7100-03:IV41015" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar", "cvss": [ "CVE-2013-3035:7.1" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09" ], "apAbstract": "Vulnerability in AIX inet", "aparNo": "IV42264", "aparNoSet": [ "CVE-2013-3035", "IV42264" ], "fixedIn": "7100-00-10", "ifixes": [ "IV42264s9a.130522.epkg.Z", "IV42264s8a.130514.epkg.Z" ], "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035", "filesets": [ "bos.net.tcp.client:7.1.0.0-7.1.0.23" ], "issued": "20130604", "updated": "20130605", "siblings": [ "6100-06:IV37925", "6100-07:IV42072", "6100-08:IV42124", "6100-09:IV41119", "7100-00:IV42264", "7100-01:IV42229", "7100-02:IV42095", "7100-03:IV41015" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar", "cvss": [ "CVE-2013-3035:7.1" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().", "aparNo": "IV42324", "aparNoSet": [ "IV42324" ], "fixedIn": "7100-02-03", "ifixes": [ "U857589", "bos.mp64:7.1.2.16" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV42324", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.15" ], "issued": "20130510", "updated": "20131124", "siblings": [ "6100-06:IZ94647", "6100-07:IV13404", "6100-08:IV14309", "6100-09:IV42440", "7100-00:IV42334", "7100-01:IV27584", "7100-02:IV42324", "7100-03:IV42412" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv42324/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09" ], "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().", "aparNo": "IV42334", "aparNoSet": [ "IV42334" ], "fixedIn": "7100-00-10", "ifixes": [ "IV42324s2a.130730.epkg.Z", "IV42324s2a.130730.71TL02SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV42334", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.22" ], "issued": "20130510", "updated": "20131124", "siblings": [ "6100-06:IZ94647", "6100-07:IV13404", "6100-08:IV14309", "6100-09:IV42440", "7100-00:IV42334", "7100-01:IV27584", "7100-02:IV42324", "7100-03:IV42412" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv42324/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07" ], "apAbstract": "tftp Security Vulnerability", "aparNo": "IV42700", "aparNoSet": [ "CVE-2013-3005", "IV42700" ], "fixedIn": "7100-01-08", "ifixes": [ "IV42700s7a.130617.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559", "filesets": [ "bos.net.tcp.client:7.1.1.0-7.1.1.18" ], "issued": "20130703", "updated": "20130703", "siblings": [ "6100-06:IV40221", "6100-07:IV42932", "6100-08:IV42933", "6100-09:IV42299", "7100-00:IV42934", "7100-01:IV42700", "7100-02:IV42935", "7100-03:IV43256" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar", "cvss": [ "CVE-2013-3005:7.9" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7" ], "apAbstract": "tftp Security Vulnerability", "aparNo": "IV42932", "aparNoSet": [ "CVE-2013-3005", "IV42932" ], "fixedIn": "2.2.1.8", "ifixes": [ "IV42933s2a.130617.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.18" ], "issued": "20130703", "updated": "null", "siblings": [ "6100-06:IV40221", "6100-07:IV42932", "6100-08:IV42933", "6100-09:IV42299", "7100-00:IV42934", "7100-01:IV42700", "7100-02:IV42935", "7100-03:IV43256" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar", "cvss": [ "CVE-2013-3005:7.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07" ], "apAbstract": "tftp Security Vulnerability", "aparNo": "IV42932", "aparNoSet": [ "CVE-2013-3005", "IV42932" ], "fixedIn": "6100-07-08", "ifixes": [ "IV42933s2a.130617.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559", "filesets": [ "bos.net.tcp.client:6.1.7.0-6.1.7.18" ], "issued": "20130703", "updated": "null", "siblings": [ "6100-06:IV40221", "6100-07:IV42932", "6100-08:IV42933", "6100-09:IV42299", "7100-00:IV42934", "7100-01:IV42700", "7100-02:IV42935", "7100-03:IV43256" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar", "cvss": [ "CVE-2013-3005:7.9" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2" ], "apAbstract": "tftp Security Vulnerability", "aparNo": "IV42933", "aparNoSet": [ "CVE-2013-3005", "IV42933" ], "fixedIn": "2.2.2.3", "ifixes": [ "IV42933s2a.130617.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.15" ], "issued": "20130703", "updated": "null", "siblings": [ "6100-06:IV40221", "6100-07:IV42932", "6100-08:IV42933", "6100-09:IV42299", "7100-00:IV42934", "7100-01:IV42700", "7100-02:IV42935", "7100-03:IV43256" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar", "cvss": [ "CVE-2013-3005:7.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02" ], "apAbstract": "tftp Security Vulnerability", "aparNo": "IV42933", "aparNoSet": [ "CVE-2013-3005", "IV42933" ], "fixedIn": "6100-08-03", "ifixes": [ "IV42933s2a.130617.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559", "filesets": [ "bos.net.tcp.client:6.1.8.0-6.1.8.15" ], "issued": "20130703", "updated": "null", "siblings": [ "6100-06:IV40221", "6100-07:IV42932", "6100-08:IV42933", "6100-09:IV42299", "7100-00:IV42934", "7100-01:IV42700", "7100-02:IV42935", "7100-03:IV43256" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar", "cvss": [ "CVE-2013-3005:7.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09" ], "apAbstract": "tftp Security Vulnerability", "aparNo": "IV42934", "aparNoSet": [ "CVE-2013-3005", "IV42934" ], "fixedIn": "7100-00-10", "ifixes": [ "IV42934s9a.130617.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559", "filesets": [ "bos.net.tcp.client:7.1.0.0-7.1.0.23" ], "issued": "20130703", "updated": "20130703", "siblings": [ "6100-06:IV40221", "6100-07:IV42932", "6100-08:IV42933", "6100-09:IV42299", "7100-00:IV42934", "7100-01:IV42700", "7100-02:IV42935", "7100-03:IV43256" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar", "cvss": [ "CVE-2013-3005:7.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "tftp Security Vulnerability", "aparNo": "IV42935", "aparNoSet": [ "CVE-2013-3005", "IV42935" ], "fixedIn": "7100-02-03", "ifixes": [ "IV42935s2a.130617.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559", "filesets": [ "bos.net.tcp.client:7.1.2.0-7.1.2.15" ], "issued": "20130703", "updated": "null", "siblings": [ "6100-06:IV40221", "6100-07:IV42932", "6100-08:IV42933", "6100-09:IV42299", "7100-00:IV42934", "7100-01:IV42700", "7100-02:IV42935", "7100-03:IV43256" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar", "cvss": [ "CVE-2013-3005:7.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "Security Vulnerabilities in AIX InfiniBand", "aparNo": "IV43561", "aparNoSet": [ "CVE-2013-4011", "IV43561" ], "fixedIn": "7100-02-03", "ifixes": [ "iv43561m2a.130626.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571", "filesets": [ "devices.common.IBM.ib.rte:7.1.2.0-7.1.2.15" ], "issued": "20130716", "updated": "null", "siblings": [ "6100-06:IV43582", "6100-07:IV43106", "6100-08:IV43580", "6100-09:IV43657", "7100-00:IV43562", "7100-01:IV43539", "7100-02:IV43561", "7100-03:IV43652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar", "cvss": [ "CVE-2013-4011:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09" ], "apAbstract": "Security Vulnerabilities in AIX InfiniBand", "aparNo": "IV43562", "aparNoSet": [ "CVE-2013-4011", "IV43562" ], "fixedIn": "7100-00-10", "ifixes": [ "iv43562m9.130626.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571", "filesets": [ "devices.common.IBM.ib.rte:7.1.0.0-7.1.0.21" ], "issued": "20130716", "updated": "null", "siblings": [ "6100-06:IV43582", "6100-07:IV43106", "6100-08:IV43580", "6100-09:IV43657", "7100-00:IV43562", "7100-01:IV43539", "7100-02:IV43561", "7100-03:IV43652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar", "cvss": [ "CVE-2013-4011:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02" ], "apAbstract": "Security Vulnerabilities in AIX InfiniBand", "aparNo": "IV43580", "aparNoSet": [ "CVE-2013-4011", "IV43580" ], "fixedIn": "6100-08-03", "ifixes": [ "iv43580m2a.130619.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571", "filesets": [ "devices.common.IBM.ib.rte:6.1.8.0-6.1.8.15" ], "issued": "20130716", "updated": "null", "siblings": [ "6100-06:IV43582", "6100-07:IV43106", "6100-08:IV43580", "6100-09:IV43657", "7100-00:IV43562", "7100-01:IV43539", "7100-02:IV43561", "7100-03:IV43652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar", "cvss": [ "CVE-2013-4011:7.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7" ], "apAbstract": "Security Vulnerabilities in VIOS InfiniBand", "aparNo": "IV43580", "aparNoSet": [ "CVE-2013-4011", "IV43580" ], "fixedIn": "2.2.1.8", "ifixes": [ "iv43827m7a.130614.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571", "filesets": [ "devices.common.IBM.ibm.rte:6.1.7.0-6.1.7.16" ], "issued": "20130716", "updated": "null", "siblings": [ "6100-06:IV43582", "6100-07:IV43106", "6100-08:IV43580", "6100-09:IV43657", "7100-00:IV43562", "7100-01:IV43539", "7100-02:IV43561", "7100-03:IV43652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar", "cvss": [ "CVE-2013-4011:7.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2" ], "apAbstract": "Security Vulnerabilities in VIOS InfiniBand", "aparNo": "IV43580", "aparNoSet": [ "CVE-2013-4011", "IV43580" ], "fixedIn": "2.2.2.3", "ifixes": [ "iv43580m2a.130619.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571", "filesets": [ "devices.common.IBM.ib.rte:6.1.8.0-6.1.8.15" ], "issued": "20130716", "updated": "null", "siblings": [ "6100-06:IV43582", "6100-07:IV43106", "6100-08:IV43580", "6100-09:IV43657", "7100-00:IV43562", "7100-01:IV43539", "7100-02:IV43561", "7100-03:IV43652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar", "cvss": [ "CVE-2013-4011:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10", "6100-06-11" ], "apAbstract": "Security Vulnerabilities in AIX InfiniBand", "aparNo": "IV43582", "aparNoSet": [ "CVE-2013-4011", "IV43582" ], "fixedIn": "6100-06-12", "ifixes": [ "iv43582mBa.130626.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571", "filesets": [ "devices.common.IBM.ib.rte:6.1.6.0-6.1.6.21" ], "issued": "20130716", "updated": "null", "siblings": [ "6100-06:IV43582", "6100-07:IV43106", "6100-08:IV43580", "6100-09:IV43657", "7100-00:IV43562", "7100-01:IV43539", "7100-02:IV43561", "7100-03:IV43652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar", "cvss": [ "CVE-2013-4011:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07" ], "apAbstract": "Security Vulnerabilities in AIX InfiniBand", "aparNo": "IV43756", "aparNoSet": [ "CVE-2013-4011", "IV43756" ], "fixedIn": "7100-01-08", "ifixes": [ "iv43756m7a.130612.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571", "filesets": [ "devices.common.IBM.ib.rte:7.1.1.0-7.1.1.18" ], "issued": "20130716", "updated": "null", "siblings": [ "6100-06:IV43582", "6100-07:IV43106", "6100-08:IV43580", "6100-09:IV43657", "7100-00:IV43562", "7100-01:IV43539", "7100-02:IV43561", "7100-03:IV43652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar", "cvss": [ "CVE-2013-4011:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07" ], "apAbstract": "Security Vulnerabilities in AIX InfiniBand", "aparNo": "IV43827", "aparNoSet": [ "CVE-2013-4011", "IV43827" ], "fixedIn": "6100-07-08", "ifixes": [ "iv43827m7a.130614.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571", "filesets": [ "devices.common.IBM.ibm.rte:6.1.7.0-6.1.7.16" ], "issued": "20130716", "updated": "null", "siblings": [ "6100-06:IV43582", "6100-07:IV43106", "6100-08:IV43580", "6100-09:IV43657", "7100-00:IV43562", "7100-01:IV43539", "7100-02:IV43561", "7100-03:IV43652" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar", "cvss": [ "CVE-2013-4011:7.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08" ], "apAbstract": "Security vulnerabilities in Perl for AIX", "aparNo": "IV43973", "aparNoSet": [ "CVE-2012-5526", "CVE-2013-1667", "IV43973" ], "fixedIn": "6100-09-00", "ifixes": [], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740761", "filesets": [ "perl.rte:5.8.8.0-5.8.8.244" ], "issued": "20131120", "updated": "20131204", "siblings": [ "7100-00:IV46765" ], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2012-5526:4.3", "CVE-2013-1667:4.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2", "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7" ], "apAbstract": "Security vulnerabilities in Perl for VIOS", "aparNo": "IV43973", "aparNoSet": [ "CVE-2012-5526", "CVE-2013-1667", "IV43973" ], "fixedIn": "2.2.3.0", "ifixes": [], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740761s", "filesets": [ "perl.rte:5.8.8.0-5.8.8.244" ], "issued": "20131120", "updated": "20131204", "siblings": [ "7100-00:IV46765" ], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2012-5526:4.3", "CVE-2013-1667:4.3" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03" ], "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP", "aparNo": "IV44039", "aparNoSet": [ "IV44039" ], "fixedIn": "7100-02-04", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV44039", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.16" ], "issued": "20140605", "updated": "null", "siblings": [ "6100-07:IV47865", "6100-08:IV46850", "6100-09:IV46897", "7100-01:IV49394", "7100-02:IV44039", "7100-03:IV46950" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10", "6100-06-11", "6100-06-12" ], "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT", "aparNo": "IV45736", "aparNoSet": [ "IV45736" ], "fixedIn": "6100-07-09", "ifixes": [ "IV45736sAa.130721.61TL06SP10.epkg.Z", "IV45736sAa.130721.epkg.Z", "IV45736sBa.130724.61TL06SP11.epkg.Z", "IV45736sBa.130724.epkg.Z", "IV45736sCa.130916.61TL06SP12.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV45736", "filesets": [ "bos.mp64:6.1.6.18-6.1.6.23" ], "issued": "20130716", "updated": "20130814", "siblings": [ "7100-00:IV46105", "7100-01:IV45899", "7100-02:IV46104", "6100-06:IV45736", "6100-07:IV45897", "6100-08:IV45898" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv45736/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08" ], "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT", "aparNo": "IV45897", "aparNoSet": [ "IV45897" ], "fixedIn": "6100-07-09", "ifixes": [ "IV45897s7a.130724.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV45897", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.19" ], "issued": "20130721", "updated": "20140217", "siblings": [ "7100-00:IV46105", "7100-01:IV45899", "7100-02:IV46104", "6100-06:IV45736", "6100-07:IV45897", "6100-08:IV45898" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv45897/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03" ], "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT", "aparNo": "IV45898", "aparNoSet": [ "IV45898" ], "fixedIn": "6100-08-04", "ifixes": [ "IV45898s2b.130724.epkg.Z", "IV45898s3a.130819.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV45898", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.16" ], "issued": "20130721", "updated": "20140217", "siblings": [ "7100-00:IV46105", "7100-01:IV45899", "7100-02:IV46104", "6100-06:IV45736", "6100-07:IV45897", "6100-08:IV45898" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv45898/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08" ], "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT", "aparNo": "IV45899", "aparNoSet": [ "IV45899" ], "fixedIn": "7100-01-09", "ifixes": [ "IV45899s7a.130724.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV45899", "filesets": [ "bos.mp64:7.1.1.1-7.1.1.19" ], "issued": "20130721", "updated": "20140217", "siblings": [ "7100-00:IV46105", "7100-01:IV45899", "7100-02:IV46104", "6100-06:IV45736", "6100-07:IV45897", "6100-08:IV45898" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv45899/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03" ], "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT", "aparNo": "IV46104", "aparNoSet": [ "IV46104" ], "fixedIn": "7100-02-04", "ifixes": [ "IV46104s2a.130725.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46104", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.16" ], "issued": "20130724", "updated": "20140217", "siblings": [ "7100-00:IV46105", "7100-01:IV45899", "7100-02:IV46104", "6100-06:IV45736", "6100-07:IV45897", "6100-08:IV45898" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv46104/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09" ], "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT", "aparNo": "IV46105", "aparNoSet": [ "IV46105" ], "fixedIn": "null", "ifixes": [ "IV46105s9a.130725.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46105", "filesets": [ "bos.mp64:7.1.0.0-7.1.0.23" ], "issued": "20130724", "updated": "20130814", "siblings": [ "7100-00:IV46105", "7100-01:IV45899", "7100-02:IV46104", "6100-06:IV45736", "6100-07:IV45897", "6100-08:IV45898" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv46105/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03" ], "apAbstract": "Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system", "aparNo": "IV46246", "aparNoSet": [ "IV46246" ], "fixedIn": "7100-02-04", "ifixes": [ "IV46246s3a.130821.71TL02SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46246", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.16" ], "issued": "20130729", "updated": "20140217", "siblings": [ "7100-02:IV46246", "7100-01:IV48042", "6100-08:IV47394" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv46246/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00" ], "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP", "aparNo": "IV46590", "aparNoSet": [ "IV46590" ], "fixedIn": "7100-03-01", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46950", "filesets": [ "bos.mp64:7.1.3.0" ], "issued": "20140605", "updated": "null", "siblings": [ "6100-07:IV47865", "6100-08:IV46850", "6100-09:IV46897", "7100-01:IV49394", "7100-02:IV44039", "7100-03:IV46950" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08" ], "apAbstract": "Security vulnerabilities in Perl for AIX", "aparNo": "IV46765", "aparNoSet": [ "CVE-2012-5526", "CVE-2013-1667", "IV46765" ], "fixedIn": "7100-03-00", "ifixes": [], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740761", "filesets": [ "perl.rte:5.10.1.0-5.10.1.150" ], "issued": "20121120", "updated": "20131204", "siblings": [ "6100-00:IV43973" ], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2012-5526:4.3", "CVE-2013-1667:4.3" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03" ], "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP", "aparNo": "IV46850", "aparNoSet": [ "IV46850" ], "fixedIn": "6100-08-04", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46850", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.16" ], "issued": "20140605", "updated": "null", "siblings": [ "6100-07:IV47865", "6100-08:IV46850", "6100-09:IV46897", "7100-01:IV49394", "7100-02:IV44039", "7100-03:IV46950" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00" ], "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP", "aparNo": "IV46897", "aparNoSet": [ "IV46897" ], "fixedIn": "6100-09-01", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46897", "filesets": [ "bos.mp64:\u003c6.1.9.15" ], "issued": "20140605", "updated": "null", "siblings": [ "6100-07:IV47865", "6100-08:IV46850", "6100-09:IV46897", "7100-01:IV49394", "7100-02:IV44039", "7100-03:IV46950" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03" ], "apAbstract": "VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS", "aparNo": "IV47037", "aparNoSet": [ "IV47037" ], "fixedIn": "6100-08-04", "ifixes": [ "IV47037s3a.130828.61TL08SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47037", "filesets": [ "devices.pci.77102224.com:6.1.8.0-6.1.8.17" ], "issued": "20130813", "updated": "20140217", "siblings": [ "6100-07:IV47348", "6100-08:IV47037", "6100-09:IV47532", "7100-01:IV47350", "7100-02:IV47351", "7100-03:IV47353" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv47037/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08" ], "apAbstract": "VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS", "aparNo": "IV47347", "aparNoSet": [ "IV47347" ], "fixedIn": "5300-12-09", "ifixes": [ "IV47347s8a.130925.53TL12SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47347", "filesets": [ "devices.pci.77102224.com:5.3.12.0-5.3.12.8" ], "issued": "20130821", "updated": "20131002", "siblings": [ "7100-01:IV47350", "7100-02:IV47351", "6100-07:IV47348", "6100-08:IV47037", "5300-12:IV47347" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/iv47347/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08" ], "apAbstract": "VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS", "aparNo": "IV47348", "aparNoSet": [ "IV47348" ], "fixedIn": "6100-07-09", "ifixes": [ "IV47348s8a.130917.61TL07SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47348", "filesets": [ "devices.pci.77102224.com:6.1.7.0-6.1.7.19" ], "issued": "20130821", "updated": "20140217", "siblings": [ "6100-07:IV47348", "6100-08:IV47037", "6100-09:IV47532", "7100-01:IV47350", "7100-02:IV47351", "7100-03:IV47353" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv47348/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08" ], "apAbstract": "VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS", "aparNo": "IV47350", "aparNoSet": [ "IV47350" ], "fixedIn": "7100-01-09", "ifixes": [ "IV47350s8a.130923.71TL01SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47350", "filesets": [ "devices.pci.77102224.com:7.1.1.0-7.1.1.20" ], "issued": "20130821", "updated": "20140217", "siblings": [ "6100-07:IV47348", "6100-08:IV47037", "6100-09:IV47532", "7100-01:IV47350", "7100-02:IV47351", "7100-03:IV47353" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv47350/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03" ], "apAbstract": "VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS", "aparNo": "IV47351", "aparNoSet": [ "IV47351" ], "fixedIn": "7100-02-04", "ifixes": [ "IV47351s3a.130925.71TL02SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47351", "filesets": [ "devices.pci.77102224.com:7.1.2.0-7.1.2.18" ], "issued": "20130821", "updated": "20140217", "siblings": [ "6100-07:IV47348", "6100-08:IV47037", "6100-09:IV47532", "7100-01:IV47350", "7100-02:IV47351", "7100-03:IV47353" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv47351/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03" ], "apAbstract": "Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system", "aparNo": "IV47394", "aparNoSet": [ "IV47394" ], "fixedIn": "6100-08-04", "ifixes": [ "IV47394s3a.130821.61TL08SP03.epkg.Z", "IV47394s2a.130821.61TL08SP02.epkg.Z", "IV47394s1a.131122.61TL08SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47394", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.16" ], "issued": "20130821", "updated": "20140217", "siblings": [ "7100-02:IV46246", "7100-01:IV48042", "6100-08:IV47394:", "6100-07:IV48041" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv47394/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08" ], "apAbstract": "AIX printer commands vulnerability", "aparNo": "IV47427", "aparNoSet": [ "CVE-2013-5419", "IV47427" ], "fixedIn": "6100-07-09", "ifixes": [ "IV47427s4a.130827.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3224\u0026myns\u003dpwraix61\u0026mync\u003dE", "filesets": [ "bos.rte.printers:6.1.7.0-6.1.7.16" ], "issued": "20130925", "updated": "20130925", "siblings": [ "6100-07:IV47427", "6100-08:IV47428", "7100-01:IV47429", "7100-02:IV47430" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar", "cvss": [ "CVE-2013-5419:6.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03" ], "apAbstract": "AIX printer commands vulnerability", "aparNo": "IV47428", "aparNoSet": [ "CVE-2013-5419", "IV47428" ], "fixedIn": "6100-08-04", "ifixes": [ "IV47428s2a.130827.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3224\u0026myns\u003dpwraix61\u0026mync\u003dE", "filesets": [ "bos.rte.printers:6.1.8.0-6.1.8.15" ], "issued": "20130925", "updated": "20130925", "siblings": [ "6100-07:IV47427", "6100-08:IV47428", "7100-01:IV47429", "7100-02:IV47430" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar", "cvss": [ "CVE-2013-5419:6.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08" ], "apAbstract": "AIX printer commands vulnerability", "aparNo": "IV47429", "aparNoSet": [ "CVE-2013-5419", "IV47429" ], "fixedIn": "7100-01-09", "ifixes": [ "IV47429s4a.130827.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3224\u0026myns\u003dpwraix61\u0026mync\u003dE", "filesets": [ "bos.rte.printers:7.1.1.0-7.1.1.16" ], "issued": "20130925", "updated": "20130925", "siblings": [ "6100-07:IV47427", "6100-08:IV47428", "7100-01:IV47429", "7100-02:IV47430" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar", "cvss": [ "CVE-2013-5419:6.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02" ], "apAbstract": "AIX printer commands vulnerability", "aparNo": "IV47430", "aparNoSet": [ "CVE-2013-5419", "IV47430" ], "fixedIn": "7100-02-04", "ifixes": [ "IV47430s2a.130827.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3224\u0026myns\u003dpwraix61\u0026mync\u003dE", "filesets": [ "bos.rte.printers:7.1.2.0-7.1.2.15" ], "issued": "20130925", "updated": "20130925", "siblings": [ "6100-07:IV47427", "6100-08:IV47428", "7100-01:IV47429", "7100-02:IV47430" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar", "cvss": [ "CVE-2013-5419:6.9" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08" ], "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP", "aparNo": "IV47865", "aparNoSet": [ "IV47865" ], "fixedIn": "6100-07-09", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47865", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.19" ], "issued": "20140605", "updated": "null", "siblings": [ "6100-07:IV47865", "6100-08:IV46850", "6100-09:IV46897", "7100-01:IV49394", "7100-02:IV44039", "7100-03:IV46950" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08" ], "apAbstract": "Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system", "aparNo": "IV48041", "aparNoSet": [ "IV48041" ], "fixedIn": "6100-07-09", "ifixes": [ "IV48041s6a.131002.61TL07SP06.epkg.Z", "IV48041s7a.131009.61TL07SP07.epkg.Z", "IV48041s8a.130910.61TL07SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV48041", "filesets": [ "bos.mp64:6.1.7.15-6.1.7.19" ], "issued": "20130813", "updated": "20140217", "siblings": [ "6100-07:IV48041", "6100-08:IV45898", "7100-01:IV48042", "7100-02:IV46246" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv48041/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08" ], "apAbstract": "Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system", "aparNo": "IV48041", "aparNoSet": [ "IV48041" ], "fixedIn": "6100-07-09", "ifixes": [ "IV48041s8a.130910.61TL07SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV48041", "filesets": [ "bos.mp64:6.1.7.15-6.1.7.19" ], "issued": "20130910", "updated": "20130927", "siblings": [ "7100-02:IV46246", "7100-01:IV48042", "6100-08:IV47394" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv48041/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08" ], "apAbstract": "Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system", "aparNo": "IV48042", "aparNoSet": [ "IV48042" ], "fixedIn": "7100-01-09", "ifixes": [ "IV48042s8a.130910.71TL01SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV48042", "filesets": [ "bos.mp64:7.1.1.15-7.1.1.19" ], "issued": "20130910", "updated": "20140217", "siblings": [ "7100-02:IV46246", "7100-01:IV48042", "6100-08:IV47394" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv48042/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08" ], "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP", "aparNo": "IV49394", "aparNoSet": [ "IV49394" ], "fixedIn": "7100-01-09", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV49394", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.19" ], "issued": "20140605", "updated": "null", "siblings": [ "6100-07:IV47865", "6100-08:IV46850", "6100-09:IV46897", "7100-01:IV49394", "7100-02:IV44039", "7100-03:IV46950" ], "downloadUrl": "null", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04" ], "apAbstract": "AIX WPAR vulnerability", "aparNo": "IV51421", "aparNoSet": [ "CVE-2014-0899", "IV51421" ], "fixedIn": "next vwpar update", "ifixes": [ "IV51420s52.131030.epkg.Z", "IV51420s53.131031.epkg.Z", "IV51421s52.131030.epkg.Z", "IV51421s53.131031.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5741691", "filesets": [ "vwpar.52.rte:1.1.0.0-1.1.1.19", "vwpar.52.rte:1.1.2.0-1.1.2.17", "wpar.53.rte:1.1.0.0-1.1.1.18", "vwpar.53.rte:1.1.2.0-1.1.2.15" ], "issued": "20140306", "updated": "20140408", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/wparcre_fix.tar", "cvss": [ "CVE-2014-0899:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08", "6100-07-09" ], "apAbstract": "Vulnerability in AIX X-Server", "aparNo": "IV52181", "aparNoSet": [ "CVE-2013-4396", "IV52181" ], "fixedIn": "6100-07-10", "ifixes": [ "IV52181s0a.131220.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773", "filesets": [ "Xll.base.rte:6.1.8.0" ], "issued": "20140121", "updated": "20140122", "siblings": [ "7100-03:IV53246", "7100-02:IV52186", "7100-01:IV52185", "6100-09:IV52978", "6100-08:IV52184", "6100-07:IV52181", "5300-12:IV53331" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar", "cvss": [ "CVE-2013-4396:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7", "2.2.1.8" ], "apAbstract": "Vulnerability in VIOS X-Server", "aparNo": "IV52181", "aparNoSet": [ "CVE-2013-4396", "IV52181" ], "fixedIn": "2.2.1.9", "ifixes": [ "IV52181s0a.131220.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773", "filesets": [ "Xll.base.rte:6.1.8.0" ], "issued": "20140121", "updated": "20140122", "siblings": [ "7100-03:IV53246", "7100-02:IV52186", "7100-01:IV52185", "6100-09:IV52978", "6100-08:IV52184", "6100-07:IV52181", "5300-12:IV53331" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar", "cvss": [ "CVE-2013-4396:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04" ], "apAbstract": "Vulnerability in AIX X-Server", "aparNo": "IV52184", "aparNoSet": [ "CVE-2013-4396", "IV52184" ], "fixedIn": "6100-08-05", "ifixes": [ "IV52184s0a.131220.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773", "filesets": [ "Xll.base.rte:6.1.8.0" ], "issued": "20140121", "updated": "20140122", "siblings": [ "7100-03:IV53246", "7100-02:IV52186", "7100-01:IV52185", "6100-09:IV52978", "6100-08:IV52184", "6100-07:IV52181", "5300-12:IV53331" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar", "cvss": [ "CVE-2013-4396:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2", "2.2.2.3", "2.2.2.4" ], "apAbstract": "Vulnerability in VIOS X-Server", "aparNo": "IV52184", "aparNoSet": [ "CVE-2013-4396", "IV52184" ], "fixedIn": "2.2.2.5", "ifixes": [ "IV52184s0a.131220.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773", "filesets": [ "Xll.base.rte:6.1.8.0" ], "issued": "20140121", "updated": "20140122", "siblings": [ "7100-03:IV53246", "7100-02:IV52186", "7100-01:IV52185", "6100-09:IV52978", "6100-08:IV52184", "6100-07:IV52181", "5300-12:IV53331" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar", "cvss": [ "CVE-2013-4396:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08", "7100-01-09" ], "apAbstract": "Vulnerability in AIX X-Server", "aparNo": "IV52185", "aparNoSet": [ "CVE-2013-4396", "IV52185" ], "fixedIn": "7100-01-10", "ifixes": [ "IV52185s0a.131220.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773", "filesets": [ "Xll.base.rte:7.1.1.0-7.1.1.15" ], "issued": "20140121", "updated": "20140122", "siblings": [ "7100-03:IV53246", "7100-02:IV52186", "7100-01:IV52185", "6100-09:IV52978", "6100-08:IV52184", "6100-07:IV52181", "5300-12:IV53331" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar", "cvss": [ "CVE-2013-4396:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04" ], "apAbstract": "Vulnerability in AIX X-Server", "aparNo": "IV52186", "aparNoSet": [ "CVE-2013-4396", "IV52186" ], "fixedIn": "7100-02-05", "ifixes": [ "IV52186s0a.131220.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773", "filesets": [ "Xll.base.rte:7.1.2.0" ], "issued": "20140121", "updated": "20140122", "siblings": [ "7100-03:IV53246", "7100-02:IV52186", "7100-01:IV52185", "6100-09:IV52978", "6100-08:IV52184", "6100-07:IV52181", "5300-12:IV53331" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar", "cvss": [ "CVE-2013-4396:5.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01" ], "apAbstract": "CREATING SEA OR ETHERCHANNEL ON FC 5899 ADAPTER IS NOT POSSIBLE", "aparNo": "IV52695", "aparNoSet": [ "IV52695" ], "fixedIn": "6100-09-02", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV52695", "filesets": [ "devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.1" ], "issued": "20140514", "updated": "null", "siblings": [ "6100-09:IV52695", "7100-03:IV52765" ], "downloadUrl": "http://www-933.ibm.com/support/fixcentral/aix/quickorder?release\u003d6.1\u0026function\u003dfixId\u0026fixids\u003dU865786\u0026includeSupersedes\u003d0\u0026source\u003dfc", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01" ], "apAbstract": "CREATING SEA OR ETHERCHANNEL ON FC 5899 ADAPTER IS NOT POSSIBLE", "aparNo": "IV52765", "aparNoSet": [ "IV52765" ], "fixedIn": "7100-03-02", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV52765", "filesets": [ "devices.pciex.e4145616e4140518.rte:7.1.3.0-7.1.3.1" ], "issued": "20140514", "updated": "null", "siblings": [ "6100-09:IV52695", "7100-03:IV52765" ], "downloadUrl": "http://www-933.ibm.com/support/fixcentral/aix/quickorder?release\u003d6.1\u0026function\u003dfixId\u0026fixids\u003dU865786\u0026includeSupersedes\u003d0\u0026source\u003dfc", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02" ], "apAbstract": "Vulnerability in AIX X-Server", "aparNo": "IV52978", "aparNoSet": [ "CVE-2013-4396", "IV52978" ], "fixedIn": "6100-09-03", "ifixes": [ "IV52978s0a.140128.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773", "filesets": [ "Xll.base.rte:6.1.9.0-6.1.9.2" ], "issued": "20140121", "updated": "20140122", "siblings": [ "7100-03:IV53246", "7100-02:IV52186", "7100-01:IV52185", "6100-09:IV52978", "6100-08:IV52184", "6100-07:IV52181", "5300-12:IV53331" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar", "cvss": [ "CVE-2013-4396:5.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2" ], "apAbstract": "Vulnerability in VIOS X-Server", "aparNo": "IV52978", "aparNoSet": [ "CVE-2013-4396", "IV52978" ], "fixedIn": "2.2.3.3", "ifixes": [ "IV52978s0a.140128.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773", "filesets": [ "Xll.base.rte:6.1.9.0-6.1.9.2" ], "issued": "20140121", "updated": "20140122", "siblings": [ "7100-03:IV53246", "7100-02:IV52186", "7100-01:IV52185", "6100-09:IV52978", "6100-08:IV52184", "6100-07:IV52181", "5300-12:IV53331" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar", "cvss": [ "CVE-2013-4396:5.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01" ], "apAbstract": "TAPE MKSYSB RESTORES FROM 6100-09 OR 7100-03 WILL FAIL.", "aparNo": "IV53002", "aparNoSet": [ "IV53002" ], "fixedIn": "6100-09-02", "ifixes": [ "IV53002s01.140107.61TL09SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV53002", "filesets": [ "bos.sysmgt.sysbr:6.1.9.0-6.1.9.1" ], "issued": "20131209", "updated": "null", "siblings": [ "6100-09:IV53002", "7100-03:IV53003" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53002/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01" ], "apAbstract": "TAPE MKSYSB RESTORES FROM 6100-09 OR 7100-03 WILL FAIL.", "aparNo": "IV53003", "aparNoSet": [ "IV53003" ], "fixedIn": "7100-03-02", "ifixes": [ "IV53003s1c.140122.71TL03SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV53002", "filesets": [ "bos.sysmgt.sysbr:7.1.3.0-7.1.3.1" ], "issued": "20131209", "updated": "null", "siblings": [ "6100-09:IV53002", "7100-03:IV53003" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53003/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02" ], "apAbstract": "Vulnerability in AIX X-Server", "aparNo": "IV53246", "aparNoSet": [ "CVE-2013-4396", "IV53246" ], "fixedIn": "7100-03-03", "ifixes": [ "IV53246s0a.140128.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773", "filesets": [ "Xll.base.rte:7.1.3.0-7.1.3.2" ], "issued": "20140121", "updated": "20140122", "siblings": [ "7100-03:IV53246", "7100-02:IV52186", "7100-01:IV52185", "6100-09:IV52978", "6100-08:IV52184", "6100-07:IV52181", "5300-12:IV53331" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar", "cvss": [ "CVE-2013-4396:5.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08" ], "apAbstract": "Vulnerability in AIX X-Server", "aparNo": "IV53331", "aparNoSet": [ "CVE-2013-4396", "IV53331" ], "fixedIn": "5300-12-09", "ifixes": [ "IV53331s0a.131220.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3353\u0026myns\u003dpwraix61\u0026mync\u003dE", "filesets": [ "Xll.base.rte:5.3.12.0-5.3.12.1" ], "issued": "20140121", "updated": "20140122", "siblings": [ "7100-02:IV52186", "7100-01:IV52185", "6100-08:IV52184", "6100-07:IV52181", "5300-12:IV53331" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar", "cvss": [ "CVE-2013-4396:5.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01" ], "apAbstract": "XMGC NOT TRAVERSING ALL KERNEL HEAPS.", "aparNo": "IV53582", "aparNoSet": [ "IV53582" ], "fixedIn": "6100-09-02", "ifixes": [ "IV53582s0a.140109.61TL9SP0.epkg.Z", "IV53582s0a.140109.epkg.Z", "IV53582s1b.140109.61TL9SP1.epkg.Z", "IV53582s1b.140109.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV53582", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.1" ], "issued": "20131226", "updated": "20140110", "siblings": [ "6100-09:IV53582", "7100-03:IV53587" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53582/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01" ], "apAbstract": "XMGC NOT TRAVERSING ALL KERNEL HEAPS.", "aparNo": "IV53587", "aparNoSet": [ "IV53587" ], "fixedIn": "7100-03-02", "ifixes": [ "IV53587s0a.140109.71TL3SP0.epkg.Z", "IV53587s0a.140109.epkg.Z", "IV53587s1b.140109.71TL3SP1.epkg.Z", "IV53587s1b.140109.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV53587", "filesets": [ "bos.mp64:7.1.3.0-7.1.3.1" ], "issued": "20131227", "updated": "20140110", "siblings": [ "6100-09:IV53582", "7100-03:IV53587" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53587/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02" ], "apAbstract": "UNABLE TO SU TO A NIS USER", "aparNo": "IV53884", "aparNoSet": [ "IV53884" ], "fixedIn": "7100-03-03", "ifixes": [ "IV53884s1a.140113.71TL03SP01.epkg.Z" ], "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IV58128", "filesets": [ "bos.rte.security:7.1.3.0-7.1.3.1" ], "issued": "20140328", "updated": "null", "siblings": [ "6100-09:IV53944", "7100-03:IV53884" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53884/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02" ], "apAbstract": "UNABLE TO SU TO A NIS USER", "aparNo": "IV53944", "aparNoSet": [ "IV53944" ], "fixedIn": "6100-09-03", "ifixes": [ "IV53944s1a.140113.61TL09SP01.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5752383", "filesets": [ "bos.rte.security:6.1.9.0-6.1.9.1" ], "issued": "20140328", "updated": "null", "siblings": [ "6100-09:IV53944", "7100-03:IV53884" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53944/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01" ], "apAbstract": "DISK I/O ERROR WITH ALGORITHM ROUND_ROBIN OR SHORTEST_QUEUE", "aparNo": "IV54905", "aparNoSet": [ "IV54905" ], "fixedIn": "7100-03-02", "ifixes": [ "IV54905s1a.140203.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV54905", "filesets": [ "devices.common.IBM.mpio.rte:7.1.3.0-7.1.3.1" ], "issued": "20140203", "updated": "20140204", "siblings": [ "6100-09:IV54907", "7100-03:IV54905" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv54905/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01" ], "apAbstract": "DISK I/O ERROR WITH ALGORITHM ROUND_ROBIN OR SHORTEST_QUEUE", "aparNo": "IV54907", "aparNoSet": [ "IV54907" ], "fixedIn": "6100-09-02", "ifixes": [ "IV54907s1a.140203.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV54907", "filesets": [ "devices.common.IBM.mpio.rte:6.1.9.0-6.1.9.1" ], "issued": "20140203", "updated": "20140204", "siblings": [ "6100-09:IV54907", "7100-03:IV54905" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv54907/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2", "2.2.2.0", "2.2.2.1", "2.2.2.2", "2.2.2.3", "2.2.2.4", "2.2.2.5", "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7", "2.2.1.8", "2.2.1.9" ], "apAbstract": "Security Vulnerability in Perl _compile", "aparNo": "IV56641", "aparNoSet": [ "CVE-2012-6329", "IV56641" ], "fixedIn": "2.2.3.3", "ifixes": [ "perl61.zip" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc", "filesets": [ "perl.rte:5.8.8.0-5.8.8.366" ], "issued": "20140423", "updated": "null", "siblings": [ "5300-12:IV56641", "6100-09:IV56641", "7100-03:IV56642" ], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2012-6329:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Security Vulnerability in Perl _compile", "aparNo": "IV56641", "aparNoSet": [ "CVE-2012-6329", "IV56641" ], "fixedIn": "perl.rte:5.8.8.488", "ifixes": [ "perl61.zip" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc", "filesets": [ "perl.rte:5.8.8.0-5.8.8.123" ], "issued": "20140423", "updated": "null", "siblings": [ "5300-12:IV56641", "6100-09:IV56641", "7100-03:IV56642" ], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2012-6329:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08", "6100-07-09" ], "apAbstract": "Security Vulnerability in Perl _compile", "aparNo": "IV56641", "aparNoSet": [ "CVE-2012-6329", "IV56641" ], "fixedIn": "perl.rte:5.8.8.488", "ifixes": [ "perl61.zip" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc", "filesets": [ "perl.rte:5.8.8.0-5.8.8.366" ], "issued": "20140423", "updated": "null", "siblings": [ "5300-12:IV56641", "6100-09:IV56641", "7100-03:IV56642" ], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2012-6329:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08", "7100-01-09", "7100-01-10" ], "apAbstract": "Security Vulnerability in Perl _compile", "aparNo": "IV56642", "aparNoSet": [ "CVE-2012-6329", "IV56642" ], "fixedIn": "perl.rte:5.10.1.250", "ifixes": [ "perl71.zip" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc", "filesets": [ "perl.rte:5.10.10.-5.10.1.200" ], "issued": "20140423", "updated": "null", "siblings": [ "5300-12:IV56641", "6100-09:IV56641", "7100-03:IV56642" ], "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp", "cvss": [ "CVE-2012-6329:7.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02" ], "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN", "aparNo": "IV57361", "aparNoSet": [ "IV57361" ], "fixedIn": "7100-03-03", "ifixes": [ "IV57361s2a.140505.71TL03SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV57361", "filesets": [ "bos.mp64:7.1.3.0-7.1.3.2" ], "issued": "20140509", "updated": "20140602", "siblings": [ "7100-01:IV59232", "7100-02:IV59229", "7100-03:IV57361", "6100-09:IV59100", "6100-08:IV59225", "6100-07:IV59227", "5300-12:IV60235" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv57361/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04" ], "apAbstract": "AIX ptrace Vulnerability", "aparNo": "IV58861", "aparNoSet": [ "CVE-2014-0930", "IV58861" ], "fixedIn": "7100-02-05", "ifixes": [ "IV58861s4a.140422.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.17" ], "issued": "20140502", "updated": "20140520", "siblings": [ "5300-12:IV59675", "6100-07:IV59045", "6100-08:IV58948", "6100-09:IV59615", "7100-01:IV58888", "7100-02:IV58861", "7100-03:IV59607" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar", "cvss": [ "CVE-2014-0930:4.7" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08", "7100-01-09" ], "apAbstract": "AIX ptrace Vulnerability", "aparNo": "IV58888", "aparNoSet": [ "CVE-2014-0930", "IV58888" ], "fixedIn": "7100-01-10", "ifixes": [ "IV58888s9a.140422.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29", "filesets": [ "bos.mp64:7.1.1.0-7.1.1.20" ], "issued": "20140502", "updated": "20140520", "siblings": [ "5300-12:IV59675", "6100-07:IV59045", "6100-08:IV58948", "6100-09:IV59615", "7100-01:IV58888", "7100-02:IV58861", "7100-03:IV59607" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar", "cvss": [ "CVE-2014-0930:4.7" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04" ], "apAbstract": "AIX ptrace Vulnerability", "aparNo": "IV58948", "aparNoSet": [ "CVE-2014-0930", "IV58948" ], "fixedIn": "6100-08-05", "ifixes": [ "IV58948s4a.140423.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.17" ], "issued": "20140502", "updated": "20140520", "siblings": [ "5300-12:IV59675", "6100-07:IV59045", "6100-08:IV58948", "6100-09:IV59615", "7100-01:IV58888", "7100-02:IV58861", "7100-03:IV59607" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar", "cvss": [ "CVE-2014-0930:4.7" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.2.0", "2.2.2.1", "2.2.2.2", "2.2.2.3", "2.2.2.4" ], "apAbstract": "VIOS ptrace Vulnerability", "aparNo": "IV58948", "aparNoSet": [ "CVE-2014-0930", "IV58948" ], "fixedIn": "2.2.2.5", "ifixes": [ "IV58948s4a.140423.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dVIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.17" ], "issued": "20140502", "updated": "null", "siblings": [ "5300-12:IV59675", "6100-07:IV59045", "6100-08:IV58948", "6100-09:IV58766", "7100-01:IV58888", "7100-02:IV58861", "7100-03:IV58840" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar", "cvss": [ "CVE-2014-0930:4.7" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08", "6100-07-09" ], "apAbstract": "AIX ptrace Vulnerability", "aparNo": "IV59045", "aparNoSet": [ "CVE-2014-0930", "IV59045" ], "fixedIn": "6100-07-10", "ifixes": [ "IV59045s9a.140425.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.20" ], "issued": "20140502", "updated": "20140520", "siblings": [ "5300-12:IV59675", "6100-07:IV59045", "6100-08:IV58948", "6100-09:IV59615", "7100-01:IV58888", "7100-02:IV58861", "7100-03:IV59607" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar", "cvss": [ "CVE-2014-0930:4.7" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.1.0", "2.2.1.1", "2.2.1.2", "2.2.1.3", "2.2.1.4", "2.2.1.5", "2.2.1.6", "2.2.1.7", "2.2.1.8" ], "apAbstract": "VIOS ptrace Vulnerability", "aparNo": "IV59045", "aparNoSet": [ "CVE-2014-0930", "IV59045" ], "fixedIn": "2.2.1.9", "ifixes": [ "IV59045s9a.140425.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dVIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29", "filesets": [ "bos.mp64:6.1.7.0-6.1.7.20" ], "issued": "20140502", "updated": "null", "siblings": [ "5300-12:IV59675", "6100-07:IV59045", "6100-08:IV58948", "6100-09:IV58766", "7100-01:IV58888", "7100-02:IV58861", "7100-03:IV58840" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar", "cvss": [ "CVE-2014-0930:4.7" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02" ], "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN", "aparNo": "IV59100", "aparNoSet": [ "IV59100" ], "fixedIn": "6100-09-03", "ifixes": [ "IV59100s2a.140507.61TL09SP02.epkg.Z" ], "bulletinUrl": "https://www-304.ibm.com/support/docview.wss?uid\u003disg1IV59100", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.2" ], "issued": "20140509", "updated": "20140602", "siblings": [ "7100-01:IV59232", "7100-02:IV59229", "7100-03:IV57361", "6100-09:IV59100", "6100-08:IV59225", "6100-07:IV59227", "5300-12:IV60235" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59100/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04" ], "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN", "aparNo": "IV59225", "aparNoSet": [ "IV59225" ], "fixedIn": "6100-08-05", "ifixes": [ "IV59225s4a.140507.61TL08SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV59225", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.17" ], "issued": "20140509", "updated": "20140602", "siblings": [ "7100-01:IV59232", "7100-02:IV59229", "7100-03:IV57361", "6100-09:IV59100", "6100-08:IV59225", "6100-07:IV59227", "5300-12:IV60235" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59225", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-07-06", "6100-07-07", "6100-07-08", "6100-07-09" ], "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN", "aparNo": "IV59227", "aparNoSet": [ "IV59227" ], "fixedIn": "6100-07-10", "ifixes": [ "IV59227s9a.140508.61TL07SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV59227", "filesets": [ "bos.mp64:6.1.7.17-6.1.7.20" ], "issued": "20140509", "updated": "20140602", "siblings": [ "7100-01:IV59232", "7100-02:IV59229", "7100-03:IV57361", "6100-09:IV59100", "6100-08:IV59225", "6100-07:IV59227", "5300-12:IV60235" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59227/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04" ], "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN", "aparNo": "IV59229", "aparNoSet": [ "IV59229" ], "fixedIn": "7100-02-05", "ifixes": [ "IV59229s2a.140507.71TL02SP02.epkg.Z", "IV59229s2a.140507.71TL02SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV59229", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.17" ], "issued": "20140509", "updated": "null", "siblings": [ "7100-01:IV59232", "7100-02:IV59229", "7100-03:IV57361", "6100-09:IV59100", "6100-08:IV59225", "6100-07:IV59227", "5300-12:IV60235" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59229/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-01-06", "7100-01-07", "7100-01-08", "7100-01-09" ], "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN", "aparNo": "IV59232", "aparNoSet": [ "IV59232" ], "fixedIn": "7100-01-10", "ifixes": [ "IV59232s9a.140507.71TL01SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV59232", "filesets": [ "bos.mp64:7.1.1.17-7.1.1.1" ], "issued": "20140509", "updated": "null", "siblings": [ "7100-01:IV59232", "7100-02:IV59229", "7100-03:IV57361", "6100-09:IV59100", "6100-08:IV59225", "6100-07:IV59227", "5300-12:IV60235" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59232/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04" ], "apAbstract": "LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR", "aparNo": "IV59492", "aparNoSet": [ "IV59492" ], "fixedIn": "6100-09-05", "ifixes": [ "IV59492s3b.150330.61TL09SP03.epkg.Z", "IV59492s4c.150323.61TL09SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV59492", "filesets": [ "devices.chrp.base.rte:6.1.9.0-6.1.9.45" ], "issued": "20150317", "updated": "null", "siblings": [ "6100-08:IV71109", "6100-09:IV59492", "7100-02:IV71110", "7100-03:IV67876" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59492/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02" ], "apAbstract": "AIX ptrace Vulnerability", "aparNo": "IV59607", "aparNoSet": [ "CVE-2014-0930", "IV59607" ], "fixedIn": "7100-03-03", "ifixes": [ "IV59607s2a.140422.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29", "filesets": [ "bos.mp64:7.1.3.0-7.1.3.2" ], "issued": "20140502", "updated": "20140520", "siblings": [ "5300-12:IV59675", "6100-07:IV59045", "6100-08:IV58948", "6100-09:IV59615", "7100-01:IV58888", "7100-02:IV58861", "7100-03:IV59607" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar", "cvss": [ "CVE-2014-0930:4.7" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02" ], "apAbstract": "AIX ptrace Vulnerability", "aparNo": "IV59615", "aparNoSet": [ "CVE-2014-0930", "IV59615" ], "fixedIn": "6100-09-03", "ifixes": [ "IV59615s2a.140422.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.2" ], "issued": "20140502", "updated": "20140520", "siblings": [ "5300-12:IV59675", "6100-07:IV59045", "6100-08:IV58948", "6100-09:IV59615", "7100-01:IV58888", "7100-02:IV58861", "7100-03:IV59607" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar", "cvss": [ "CVE-2014-0930:4.7" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2" ], "apAbstract": "VIOS ptrace Vulnerability", "aparNo": "IV59615", "aparNoSet": [ "CVE-2014-0930", "IV59615" ], "fixedIn": "2.2.3.3", "ifixes": [ "IV59615s2a.140422.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dVIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29", "filesets": [ "bos.mp64:6.1.9.0-6.1.9.2" ], "issued": "20140502", "updated": "null", "siblings": [ "5300-12:IV59675", "6100-07:IV59045", "6100-08:IV58948", "6100-09:IV59615", "7100-01:IV58888", "7100-02:IV58861", "7100-03:IV59607" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar", "cvss": [ "CVE-2014-0930:4.7" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "AIX ptrace Vulnerability", "aparNo": "IV59675", "aparNoSet": [ "CVE-2014-0930", "IV59675" ], "fixedIn": "interim fix only", "ifixes": [ "IV59675s9.140425.epkg.Z" ], "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29", "filesets": [ "bos.mp64:5.3.12.0-5.3.12.9" ], "issued": "20140502", "updated": "20140520", "siblings": [ "5300-12:IV59675", "6100-07:IV59045", "6100-08:IV58948", "6100-09:IV59615", "7100-01:IV58888", "7100-02:IV58861", "7100-03:IV59607" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar", "cvss": [ "CVE-2014-0930:4.7" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN", "aparNo": "IV60235", "aparNoSet": [ "IV60235" ], "fixedIn": "interim fix only", "ifixes": [ "IV60235s9a.140508.53TL12SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV60235", "filesets": [ "bos.mp64:5.3.12.7-5.3.12.9" ], "issued": "20140509", "updated": "20140602", "siblings": [ "7100-01:IV59232", "7100-02:IV59229", "7100-03:IV57361", "6100-09:IV59100", "6100-08:IV59225", "6100-07:IV59227", "5300-12:IV60235" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv60235/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02" ], "apAbstract": "Arbitary file overwrite symlink in libodm", "aparNo": "IV60299", "aparNoSet": [ "CVE-2012-2179", "IV60299" ], "fixedIn": "6100-09-03", "ifixes": [ "IV60299s2a.140515.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875", "filesets": [ "bos.rte.odm:6.1.9.0" ], "issued": "20120614", "updated": "20140523", "siblings": [ "6100-07:IV60313", "6100-08:IV60311", "6100-09:IV60299", "7100-01:IV60312", "7100-02:IV60314", "7100-03:IV60303" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar", "cvss": [ "CVE-2012-2179:6.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02" ], "apAbstract": "Arbitary file overwrite symlink in libodm", "aparNo": "IV60303", "aparNoSet": [ "CVE-2012-2179", "IV60303" ], "fixedIn": "7100-03-03", "ifixes": [ "IV60303s2a.140515.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875", "filesets": [ "bos.rte.odm:7.1.3.0" ], "issued": "20120614", "updated": "20140523", "siblings": [ "6100-07:IV60313", "6100-08:IV60311", "6100-09:IV60299", "7100-01:IV60312", "7100-02:IV60314", "7100-03:IV60303" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar", "cvss": [ "CVE-2012-2179:6.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04" ], "apAbstract": "Arbitary file overwrite symlink in libodm", "aparNo": "IV60311", "aparNoSet": [ "CVE-2012-2179", "IV60311" ], "fixedIn": "6100-08-05", "ifixes": [ "IV60311s4a.140515.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875", "filesets": [ "bos.rte.odm:6.1.8.0" ], "issued": "20120614", "updated": "20140523", "siblings": [ "6100-07:IV60313", "6100-08:IV60311", "6100-09:IV60299", "7100-01:IV60312", "7100-02:IV60314", "7100-03:IV60303" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar", "cvss": [ "CVE-2012-2179:6.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08", "7100-01-09" ], "apAbstract": "Arbitary file overwrite symlink in libodm", "aparNo": "IV60312", "aparNoSet": [ "CVE-2012-2179", "IV60312" ], "fixedIn": "7100-01-10", "ifixes": [ "IV60312s9a.140515.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875", "filesets": [ "bos.rte.odm:7.1.1.0-7.1.1.16" ], "issued": "20120614", "updated": "20140523", "siblings": [ "6100-07:IV60313", "6100-08:IV60311", "6100-09:IV60299", "7100-01:IV60312", "7100-02:IV60314", "7100-03:IV60303" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar", "cvss": [ "CVE-2012-2179:6.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08", "6100-07-09" ], "apAbstract": "Arbitary file overwrite symlink in libodm", "aparNo": "IV60313", "aparNoSet": [ "CVE-2012-2179", "IV60313" ], "fixedIn": "6100-07-10", "ifixes": [ "IV60313s9a.140515.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875", "filesets": [ "bos.rte.odm:6.1.7.0-6.1.7.16" ], "issued": "20120614", "updated": "20140523", "siblings": [ "6100-07:IV60313", "6100-08:IV60311", "6100-09:IV60299", "7100-01:IV60312", "7100-02:IV60314", "7100-03:IV60303" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar", "cvss": [ "CVE-2012-2179:6.9" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04" ], "apAbstract": "Arbitary file overwrite symlink in libodm", "aparNo": "IV60314", "aparNoSet": [ "CVE-2012-2179", "IV60314" ], "fixedIn": "7100-02-05", "ifixes": [ "IV60314s4a.140515.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875", "filesets": [ "bos.rte.odm:7.1.2.0-7.1.2.15" ], "issued": "20120614", "updated": "20140523", "siblings": [ "6100-07:IV60313", "6100-08:IV60311", "6100-09:IV60299", "7100-01:IV60312", "7100-02:IV60314", "7100-03:IV60303" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar", "cvss": [ "CVE-2012-2179:6.9" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03" ], "apAbstract": "VIOS USING NPIV CAN CRASH SYSTEM", "aparNo": "IV61759", "aparNoSet": [ "IV61759" ], "fixedIn": "6100-09-04", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV61759", "filesets": [ "devices.pciex.df1060e214103404.com:\u003c6.1.9.30" ], "issued": "20150213", "updated": "null", "siblings": [ "6100-08:IV64465", "6100-09:IV61759", "7100-02:IV64283", "7100-03:IV61764" ], "downloadUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo149944", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03" ], "apAbstract": "VIOS USING NPIV CAN CRASH SYSTEM", "aparNo": "IV61764", "aparNoSet": [ "IV61764" ], "fixedIn": "7100-03-04", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV61764", "filesets": [ "devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.16" ], "issued": "20150213", "updated": "null", "siblings": [ "6100-08:IV64465", "6100-09:IV61759", "7100-02:IV64283", "7100-03:IV61764" ], "downloadUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo149944", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03" ], "apAbstract": "UNEXPECTED APPLICATION BEHAVIOR WHEN USING TM POWER8 MODE ONLY", "aparNo": "IV62820", "aparNoSet": [ "IV62820" ], "fixedIn": "7100-03-04", "ifixes": [ "IV62820s3a.140808.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV62820", "filesets": [ "bos.mp64:7.1.3.0-7.1.3.30" ], "issued": "20140818", "updated": "null", "siblings": [ "7100-03:IV62820" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv62820/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05" ], "apAbstract": "VIOS USING NPIV CAN CRASH SYSTEM", "aparNo": "IV64283", "aparNoSet": [ "IV64283" ], "fixedIn": "7100-02-06", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV64283", "filesets": [ "devices.pciex.df1060e214103404.com:7.1.2.15-7.1.2.19" ], "issued": "20150213", "updated": "null", "siblings": [ "6100-08:IV64465", "6100-09:IV61759", "7100-02:IV64283", "7100-03:IV61764" ], "downloadUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo149944", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05" ], "apAbstract": "VIOS USING NPIV CAN CRASH SYSTEM", "aparNo": "IV64465", "aparNoSet": [ "IV64465" ], "fixedIn": "6100-08-06", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV64465", "filesets": [ "devices.pciex.df1060e214103404.com:6.1.8.15-6.1.8.19" ], "issued": "20150213", "updated": "null", "siblings": [ "6100-08:IV64465", "6100-09:IV61759", "7100-02:IV64283", "7100-03:IV61764" ], "downloadUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo149944", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04" ], "apAbstract": "SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF", "aparNo": "IV65814", "aparNoSet": [ "IV65814" ], "fixedIn": "6100-09-05", "ifixes": [ "IV65814m3b.141230.61TL09SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV65814", "filesets": [ "bos.mp64:\u003c6.1.9.100" ], "issued": "20150215", "updated": "null", "siblings": [ "6100-08:IV66677", "6100-09:IV65814", "7100-02:IV69445", "7100-03:IV66484" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv65814/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04" ], "apAbstract": "SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF", "aparNo": "IV66484", "aparNoSet": [ "IV66484" ], "fixedIn": "7100-03-05", "ifixes": [ "IV66484m04.141230.71TL03SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV66484", "filesets": [ "bos.mp64:7.1.3.0-7.1.3.30" ], "issued": "20150215", "updated": "null", "siblings": [ "6100-08:IV66677", "6100-09:IV65814", "7100-02:IV69445", "7100-03:IV66484" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv66484/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-04", "7100-03-03" ], "apAbstract": "REGISTER CORRUPTION WHEN USING TRANSACTIONAL MEMORY ON POWER8", "aparNo": "IV66636", "aparNoSet": [ "IV66636" ], "fixedIn": "7100-03-05", "ifixes": [ "IV66636m3a.141106.71TL03SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV66636", "filesets": [ "bos.mp64:7.1.3.16-7.1.3.30" ], "issued": "20141111", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv66636/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF", "aparNo": "IV66677", "aparNoSet": [ "IV66677" ], "fixedIn": "6100-08-07", "ifixes": [ "IV66677m6k.150211.61TL08SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV66677", "filesets": [ "bos.mp64:6.1.8.0-6.1.8.19" ], "issued": "20150215", "updated": "null", "siblings": [ "6100-08:IV66677", "6100-09:IV65814", "7100-02:IV69445", "7100-03:IV66484" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv66677/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04" ], "apAbstract": "LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR", "aparNo": "IV67876", "aparNoSet": [ "IV67876" ], "fixedIn": "7100-03-05", "ifixes": [ "IV67876s3a.150330.71TL03SP03.epkg.Z", "IV67876s4b.150323.71TL03SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV67876", "filesets": [ "devices.chrp.base.rte:7.1.3.0-7.1.3.45" ], "issued": "20150317", "updated": "null", "siblings": [ "6100-08:IV71109", "6100-09:IV59492", "7100-02:IV71110", "7100-03:IV67876" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv67876/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02" ], "apAbstract": "EEH EVENTS FOLLOWED BY INACCESSIBLE PCI / CFFH ADAPTER", "aparNo": "IV68712", "aparNoSet": [ "IV68712" ], "fixedIn": "6100-09-05", "ifixes": [ "IV68547m4a.150123.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV68712", "filesets": [ "devices.chrp.pci.rte:6.1.9.0-6.1.9.30" ], "issued": "20150205", "updated": "null", "siblings": [ "7100-03:IV68730", "6100-09:IV68712" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv68712/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04" ], "apAbstract": "EEH EVENTS FOLLOWED BY INACCESSIBLE PCI / CFFH ADAPTER", "aparNo": "IV68730", "aparNoSet": [ "IV68730" ], "fixedIn": "7100-03-05", "ifixes": [ "IV68678m4d.150204.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV68730", "filesets": [ "devices.chrp.pci.rte:7.1.3.0-7.1.3.30" ], "issued": "20150205", "updated": "null", "siblings": [ "7100-03:IV68730", "6100-09:IV68712" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv68730/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF", "aparNo": "IV69445", "aparNoSet": [ "IV69445" ], "fixedIn": "7100-02-07", "ifixes": [ "IV69445m6k.150213.71TL02SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV69445", "filesets": [ "bos.mp64:7.1.2.0-7.1.2.19" ], "issued": "20150215", "updated": "null", "siblings": [ "6100-08:IV66677", "6100-09:IV65814", "7100-02:IV69445", "7100-03:IV66484" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv69445/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2", "2.2.3.3", "2.2.3.4" ], "apAbstract": "NEAR FULL SHARED STORAGE POOL CAN OVERWRITE FILESYSTEM METADATA.", "aparNo": "IV70381", "aparNoSet": [ "IV70381" ], "fixedIn": "2.2.3.50", "ifixes": [ "IV70381m4a.150527.61TL09SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV70381", "filesets": [ "pool.basic.rte:\u003c6.1.9.45" ], "issued": "20150603", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv70381/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06" ], "apAbstract": "LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR", "aparNo": "IV71109", "aparNoSet": [ "IV71109" ], "fixedIn": "6100-08-07", "ifixes": [ "IV71109s2a.150420.61TL08SP02.epkg.Z", "IV71109s6b.150323.61TL08SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV71109", "filesets": [ "devices.chrp.base.rte:6.1.8.0-6.1.8.21" ], "issued": "20150317", "updated": "null", "siblings": [ "6100-08:IV71109", "6100-09:IV59492", "7100-02:IV71110", "7100-03:IV67876" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv71109/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06" ], "apAbstract": "LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR", "aparNo": "IV71110", "aparNoSet": [ "IV71110" ], "fixedIn": "7100-02-07", "ifixes": [ "IV71110s4a.150420.71TL02SP04.epkg.Z", "IV71110s6a.150323.71TL02SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV71110", "filesets": [ "devices.chrp.base.rte:7.1.2.0-7.1.2.21" ], "issued": "20150317", "updated": "null", "siblings": [ "6100-08:IV71109", "6100-09:IV59492", "7100-02:IV71110", "7100-03:IV67876" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv71110/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2", "2.2.3.3", "2.2.3.4" ], "apAbstract": "NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK", "aparNo": "IV71217", "aparNoSet": [ "IV71217" ], "fixedIn": "2.2.3.50", "ifixes": [ "IV69760.fix.tar" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV69760", "filesets": [ "rsct.core.rmc:3.2.0.0-3.2.0.4" ], "issued": "20150319", "updated": "20150512", "siblings": [ "6100-09:IV71217", "7100-03:IV71219" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv69760/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04" ], "apAbstract": "NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK", "aparNo": "IV71217", "aparNoSet": [ "IV71217" ], "fixedIn": "6100-09-05", "ifixes": [ "IV69760.fix.tar" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV69760", "filesets": [ "rsct.core.rmc:3.2.0.0-3.2.0.4" ], "issued": "20150319", "updated": "20150512", "siblings": [ "6100-09:IV71217", "7100-03:IV71219" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv69760/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04" ], "apAbstract": "NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK", "aparNo": "IV71219", "aparNoSet": [ "IV71219" ], "fixedIn": "7100-03-05", "ifixes": [ "IV69760.fix.tar" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV71219", "filesets": [ "rsct.core.rmc:3.2.0.0-3.2.0.4" ], "issued": "20150319", "updated": "20150512", "siblings": [ "6100-09:IV71217", "7100-03:IV71219" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv69760/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06" ], "apAbstract": " Cluster node halt due to Group Services client errors", "aparNo": "IV74438", "aparNoSet": [ "IV74438" ], "fixedIn": "7100-03-07", "ifixes": [ "ctHA_M1r.160808.71TL03SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV74438", "filesets": [ "rsct.basic.rte:3.1.5.0-3.2.0.7", "rsct.core.rmc:3.1.5.0-3.2.0.9" ], "issued": "20160628", "updated": "null", "siblings": [ "7100-04:IV85983", "7200-00:IV85983" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv74438/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07" ], "apAbstract": "Cluster node halt due to Group Services client errors", "aparNo": "IV74438", "aparNoSet": [ "IV74438" ], "fixedIn": "6100-09-08", "ifixes": [ "ctHA_M1r.160808.61TL09SP05.epkg.Z", "ctHA_M2r.160809.61TL09SP06.epkg.Z", "ctHA_M2r.160809.61TL09SP07.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV74438", "filesets": [ "rsct.basic.rte:3.1.5.0-3.2.0.7", "rsct.core.rmc:3.1.5.0-3.2.0.9" ], "issued": "20160628", "updated": "null", "siblings": [ "7100-04:IV85983", "7200-00:IV85983" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv74438/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.51", "2.2.3.52" ], "apAbstract": "CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL", "aparNo": "IV74711", "aparNoSet": [ "IV74711" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV74711s5a.150716.61TL09SP05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV74711", "filesets": [ "bos.rte.tty:6.1.9.0-6.1.9.45" ], "issued": "20150720", "updated": "null", "siblings": [ "6100-09:IV74711", "7100-03:IV75031" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv74711/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-05" ], "apAbstract": "CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL", "aparNo": "IV74711", "aparNoSet": [ "IV74711" ], "fixedIn": "6100-09-06", "ifixes": [ "IV74711s5a.150716.61TL09SP05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV74711", "filesets": [ "bos.rte.tty:6.1.9.0-6.1.9.45" ], "issued": "20150720", "updated": "null", "siblings": [ "6100-09:IV74711", "7100-03:IV75031" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv74711/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-05" ], "apAbstract": "CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL", "aparNo": "IV75031", "aparNoSet": [ "IV75031" ], "fixedIn": "7100-03-06", "ifixes": [ "IV75031s5a.150716.71TL03SP05.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV75031", "filesets": [ "bos.rte.tty:7.1.3.0-7.1.3.45" ], "issued": "20150720", "updated": "null", "siblings": [ "6100-09:IV74711", "7100-03:IV75031" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv75031/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00" ], "apAbstract": "POSSIBLE SYSTEM CRASH USING PROCFS TO READ 32BIT PROCESS MAP FIL", "aparNo": "IV79262", "aparNoSet": [ "IV79262" ], "fixedIn": "7100-04-00", "ifixes": [ "IV79262m1a.151211.71TL04SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV79262", "filesets": [ "bos.mp64:7.1.4.0" ], "issued": "20151219", "updated": "null", "siblings": [ "7200-00:IV79441", "7100-04:IV79262" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv79262/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "POSSIBLE SYSTEM CRASH USING PROCFS TO READ 32BIT PROCESS MAP FIL", "aparNo": "IV79441", "aparNoSet": [ "IV79441" ], "fixedIn": "7200-00-02", "ifixes": [ "IV79441m1a.151214.72TL00SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV79441", "filesets": [ "bos.mp64:7.2.0.0-7.2.0.1" ], "issued": "20151204", "updated": "null", "siblings": [ "7200-00:IV79441", "7100-04:IV79262" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv79441/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "AFTER LIVE UPDATE IFIX STATE MAY BE LEFT AS Q; REBOOT REQUIRED", "aparNo": "IV79639", "aparNoSet": [ "IV79639" ], "fixedIn": "7200-00-02", "ifixes": [ "IV79639s0a.151210.72TL00SP00.epkg.Z", "IV79639s0a.151210.72TL00SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV79639", "filesets": [ "bos.liveupdate.rte:7.2.0.0-7.2.0.1" ], "issued": "20151210", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv79639/", "cvss": [], "reboot": "LU" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "MIRRORVG/SYNCVG ON MIMIMAL AND MIGRATION INSTALL FAILS", "aparNo": "IV79848", "aparNoSet": [ "IV79848" ], "fixedIn": "7200-00-02", "ifixes": [ "IV79848s1a.151217.72TL00SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV79848", "filesets": [ "bos.rte.lvm:7.2.0.0-7.2.0.1" ], "issued": "20151217", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv79848/", "cvss": [], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV79942", "aparNoSet": [ "CVE-2015-5219", "CVE-2015-7691", "CVE-2015-7692", "CVE-2015-7701", "CVE-2015-7702", "CVE-2015-7850", "CVE-2015-7853", "CVE-2015-7855", "IV79942" ], "fixedIn": "6100-09-07", "ifixes": [ "IV79942s6a.160119.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.101", "ntp.rte:6.1.6.0-6.1.6.4" ], "issued": "20160121", "updated": "null", "siblings": [ "5300-12:IV79946", "6100-09:IV79942", "7100-03:IV79943", "7100-04:IV79944", "7200-00:IV79945" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar", "cvss": [ "CVE-2015-5219:4.3", "CVE-2015-7691:5.3", "CVE-2015-7692:5.3", "CVE-2015-7701:5.3", "CVE-2015-7702:5.3", "CVE-2015-7850:5.3", "CVE-2015-7853:7.3", "CVE-2015-7855:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.0" ], "apAbstract": "Vulnerabilities in NTP affect VIOS", "aparNo": "IV79942", "aparNoSet": [ "CVE-2015-5219", "CVE-2015-7691", "CVE-2015-7692", "CVE-2015-7701", "CVE-2015-7702", "CVE-2015-7850", "CVE-2015-7853", "CVE-2015-7855", "IV79942" ], "fixedIn": "2.2.4.20", "ifixes": [ "IV79942s6a.160119.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.101", "ntp.rte:6.1.6.0-6.1.6.4" ], "issued": "20160121", "updated": "null", "siblings": [ "See", "advisory" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar", "cvss": [ "CVE-2015-5219:4.3", "CVE-2015-7691:5.3", "CVE-2015-7692:5.3", "CVE-2015-7701:5.3", "CVE-2015-7702:5.3", "CVE-2015-7850:5.3", "CVE-2015-7853:7.3", "CVE-2015-7855:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV79943", "aparNoSet": [ "CVE-2015-5219", "CVE-2015-7691", "CVE-2015-7692", "CVE-2015-7701", "CVE-2015-7702", "CVE-2015-7850", "CVE-2015-7853", "CVE-2015-7855", "IV79943" ], "fixedIn": "7100-03-07", "ifixes": [ "IV79943s5b.160119.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.45", "ntp.rte:7.1.0.0-7.1.0.4" ], "issued": "20160121", "updated": "null", "siblings": [ "5300-12:IV79946", "6100-09:IV79942", "7100-03:IV79943", "7100-04:IV79944", "7200-00:IV79945" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar", "cvss": [ "CVE-2015-5219:4.3", "CVE-2015-7691:5.3", "CVE-2015-7692:5.3", "CVE-2015-7701:5.3", "CVE-2015-7702:5.3", "CVE-2015-7850:5.3", "CVE-2015-7853:7.3", "CVE-2015-7855:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV79944", "aparNoSet": [ "CVE-2015-5219", "CVE-2015-7691", "CVE-2015-7692", "CVE-2015-7701", "CVE-2015-7702", "CVE-2015-7850", "CVE-2015-7853", "CVE-2015-7855", "IV79944" ], "fixedIn": "7100-04-02", "ifixes": [ "IV79944s1a.160119.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0", "ntp.rte:7.1.0.0-7.1.0.4" ], "issued": "20160121", "updated": "null", "siblings": [ "5300-12:IV79946", "6100-09:IV79942", "7100-03:IV79943", "7100-04:IV79944", "7200-00:IV79945" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar", "cvss": [ "CVE-2015-5219:4.3", "CVE-2015-7691:5.3", "CVE-2015-7692:5.3", "CVE-2015-7701:5.3", "CVE-2015-7702:5.3", "CVE-2015-7850:5.3", "CVE-2015-7853:7.3", "CVE-2015-7855:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV79944", "aparNoSet": [ "CVE-2015-5219", "CVE-2015-7691", "CVE-2015-7692", "CVE-2015-7701", "CVE-2015-7702", "CVE-2015-7850", "CVE-2015-7853", "CVE-2015-7855", "IV79944" ], "fixedIn": "7200-00-02", "ifixes": [ "IV79945s1a.160119.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc", "filesets": [ "bos.net.tcp.bind:7.2.0.0", "ntp.rte:7.1.0.0-7.1.0.4" ], "issued": "20160121", "updated": "null", "siblings": [ "5300-12:IV79946", "6100-09:IV79942", "7100-03:IV79943", "7100-04:IV79944", "7200-00:IV79945" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar", "cvss": [ "CVE-2015-5219:4.3", "CVE-2015-7691:5.3", "CVE-2015-7692:5.3", "CVE-2015-7701:5.3", "CVE-2015-7702:5.3", "CVE-2015-7850:5.3", "CVE-2015-7853:7.3", "CVE-2015-7855:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV79946", "aparNoSet": [ "CVE-2015-5219", "CVE-2015-7691", "CVE-2015-7692", "CVE-2015-7701", "CVE-2015-7702", "CVE-2015-7850", "CVE-2015-7853", "CVE-2015-7855", "IV79946" ], "fixedIn": "6100-09-07", "ifixes": [ "IV79946s9a.160119.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20160121", "updated": "null", "siblings": [ "5300-12:IV79946", "6100-09:IV79942", "7100-03:IV79943", "7100-04:IV79944", "7200-00:IV79945" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar", "cvss": [ "CVE-2015-5219:4.3", "CVE-2015-7691:5.3", "CVE-2015-7692:5.3", "CVE-2015-7701:5.3", "CVE-2015-7702:5.3", "CVE-2015-7850:5.3", "CVE-2015-7853:7.3", "CVE-2015-7855:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV80187", "aparNoSet": [ "CVE-2015-8000", "IV80187" ], "fixedIn": "6100-09-07", "ifixes": [ "IV80187m9a.160120.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20160224", "updated": "null", "siblings": [ "5300-12:IV80187", "6100-09:IV80188", "7100-03:IV80189", "7100-04:IV80191", "7200-00:IV80192" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar", "cvss": [ "CVE-2015-8000:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV80188", "aparNoSet": [ "CVE-2015-8000", "IV80188" ], "fixedIn": "6100-09-07", "ifixes": [ "IV80188s6a.160119.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.101" ], "issued": "20160224", "updated": "null", "siblings": [ "5300-12:IV80187", "6100-09:IV80188", "7100-03:IV80189", "7100-04:IV80191", "7200-00:IV80192" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar", "cvss": [ "CVE-2015-8000:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.0" ], "apAbstract": "Vulnerability in BIND affects VIOS", "aparNo": "IV80188", "aparNoSet": [ "CVE-2015-8000", "IV80188" ], "fixedIn": "2.2.4.20", "ifixes": [ "IV80188s6a.160119.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.101" ], "issued": "20160224", "updated": "null", "siblings": [ "5300-12:IV80187", "6100-09:IV80188", "7100-03:IV80189", "7100-04:IV80191", "7200-00:IV80192" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar", "cvss": [ "CVE-2015-8000:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV80189", "aparNoSet": [ "CVE-2015-8000", "IV80189" ], "fixedIn": "7100-03-07", "ifixes": [ "IV80189m5a.160119.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.45" ], "issued": "20160224", "updated": "null", "siblings": [ "5300-12:IV80187", "6100-09:IV80188", "7100-03:IV80189", "7100-04:IV80191", "7200-00:IV80192" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar", "cvss": [ "CVE-2015-8000:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV80191", "aparNoSet": [ "CVE-2015-8000", "IV80191" ], "fixedIn": "7100-04-02", "ifixes": [ "IV80191s1a.160113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0" ], "issued": "20160224", "updated": "null", "siblings": [ "5300-12:IV80187", "6100-09:IV80188", "7100-03:IV80189", "7100-04:IV80191", "7200-00:IV80192" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar", "cvss": [ "CVE-2015-8000:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV80192", "aparNoSet": [ "CVE-2015-8000", "IV80192" ], "fixedIn": "7200-00-02", "ifixes": [ "IV80192s1a.160113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc", "filesets": [ "bos.net.tcp.bind:7.2.0.0" ], "issued": "20160224", "updated": "null", "siblings": [ "5300-12:IV80187", "6100-09:IV80188", "7100-03:IV80189", "7100-04:IV80191", "7200-00:IV80192" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar", "cvss": [ "CVE-2015-8000:7.5" ], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2", "2.2.3.3", "2.2.3.4", "2.2.3.51", "2.2.3.52" ], "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION", "aparNo": "IV80334", "aparNoSet": [ "IV80334" ], "fixedIn": "2.2.3.60", "ifixes": [ "IV80334s6a.61TL09SP06.160205.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80334", "filesets": [ "bos.cifs_fs.rte:6.1.9.0-6.1.9.100" ], "issued": "20160330", "updated": "null", "siblings": [ "7100-03:IV82410", "7100-04:IV81060", "7200-00:IV80957", "6100-09:IV80334" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80334/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10" ], "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION", "aparNo": "IV80334", "aparNoSet": [ "IV80334" ], "fixedIn": "2.2.4.20", "ifixes": [ "IV80334s6a.61TL09SP06.160205.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80334", "filesets": [ "bos.cifs_fs.rte:6.1.9.0-6.1.9.100" ], "issued": "20160330", "updated": "null", "siblings": [ "7100-03:IV82410", "7100-04:IV81060", "7200-00:IV80957" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80334/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06" ], "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION", "aparNo": "IV80334", "aparNoSet": [ "IV80334" ], "fixedIn": "6100-09-07", "ifixes": [ "IV80334s6a.61TL09SP06.160205.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80334", "filesets": [ "bos.cifs_fs.rte:6.1.9.0-6.1.9.100" ], "issued": "20160330", "updated": "null", "siblings": [ "7100-03:IV82410", "7100-04:IV81060", "7200-00:IV80957" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80334/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "SYSTEM CRASH AFTER APPLICATION SETS SIGNAL MASK", "aparNo": "IV80412", "aparNoSet": [ "IV80412" ], "fixedIn": "7200-00-02", "ifixes": [ "IV80412s0b.160122.72TL00SP00.epkg.Z", "IV80412s0c.160125.72TL00SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80412", "filesets": [ "bos.mp64:7.2.0.0-7.2.0.1" ], "issued": "20160125", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80412/", "cvss": [], "reboot": "LU" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06" ], "apAbstract": "Vulnerability in mustendd device driver impacts AIX", "aparNo": "IV80569", "aparNoSet": [ "CVE-2016-0281", "IV80569" ], "fixedIn": "6100-09-07", "ifixes": [ "IV80569s4a.160222.epkg.Z", "IV80569s5a.160222.epkg.Z", "IV80569s6a.160415.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc", "filesets": [ "devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.100" ], "issued": "20160728", "updated": "null", "siblings": [ "5300-12:IV84184", "6100-09:IV80569", "7100-03:IV82421", "7100-04:IV81459", "7200-00:IV81357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar", "cvss": [ "CVE-2016-0281:3.7" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.0" ], "apAbstract": "Vulnerability in mustendd device driver impacts VIOS", "aparNo": "IV80569", "aparNoSet": [ "CVE-2016-0281", "IV80569" ], "fixedIn": "2.2.4.20", "ifixes": [ "IV80569s4a.160222.epkg.Z", "IV80569s5a.160222.epkg.Z", "IV80569s6a.160415.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc", "filesets": [ "devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.100" ], "issued": "20160728", "updated": "null", "siblings": [ "5300-12:IV84184", "6100-09:IV80569", "7100-03:IV82421", "7100-04:IV81459", "7200-00:IV81357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar", "cvss": [ "CVE-2016-0281:3.7" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06" ], "apAbstract": "Vulnerabilities in LibXML2 affect AIX", "aparNo": "IV80586", "aparNoSet": [ "CVE-2015-7941", "CVE-2015-7942", "CVE-2015-8241", "IV80586" ], "fixedIn": "7100-03-07", "ifixes": [ "IV80586s1a.160713.epkg.Z", "IV80586s1a.160121.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc", "filesets": [ "bos.rte.control:7.1.3.0-7.1.3.46" ], "issued": "20160222", "updated": "20160811", "siblings": [ "5300-12:IV80617", "6100-09:IV80588", "7100-03:IV80586", "7100-04:IV80586", "7200-00:IV80616" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar", "cvss": [ "CVE-2015-7941:4.3", "CVE-2015-7942:4.3", "CVE-2015-8241:", "5.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "Vulnerabilities in LibXML2 affect AIX", "aparNo": "IV80586", "aparNoSet": [ "CVE-2015-7941", "CVE-2015-7942", "CVE-2015-8241", "IV80586" ], "fixedIn": "7100-04-02", "ifixes": [ "IV80586s1a.160713.epkg.Z", "IV80586s1a.160121.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc", "filesets": [ "bos.rte.control:7.1.4.0" ], "issued": "20160222", "updated": "20160722", "siblings": [ "5300-12:IV80617", "6100-09:IV80588", "7100-03:IV80586", "7100-04:IV80586", "7200-00:IV80616" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar", "cvss": [ "CVE-2015-7941:4.3", "CVE-2015-7942:4.3", "CVE-2015-8241:", "5.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06" ], "apAbstract": "Vulnerabilities in LibXML2 affect AIX", "aparNo": "IV80588", "aparNoSet": [ "CVE-2015-7941", "CVE-2015-7942", "CVE-2015-8241", "IV80588" ], "fixedIn": "6100-09-07", "ifixes": [ "IV80588s6a.160121.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc", "filesets": [ "bos.rte.control:6.1.9.0-6.1.9.100" ], "issued": "20160222", "updated": "null", "siblings": [ "5300-12:IV80617", "6100-09:IV80588", "7100-03:IV80586", "7100-04:IV80586", "7200-00:IV80616" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar", "cvss": [ "CVE-2015-7941:4.3", "CVE-2015-7942:4.3", "CVE-2015-8241:", "5.9" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.0" ], "apAbstract": "Vulnerabilities in LibXML2 affect VIOS", "aparNo": "IV80588", "aparNoSet": [ "CVE-2015-7941", "CVE-2015-7942", "CVE-2015-8241", "IV80588" ], "fixedIn": "2.2.4.20", "ifixes": [ "IV80588s6a.160121.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc", "filesets": [ "bos.rte.control:6.1.9.0-6.1.9.100" ], "issued": "20160222", "updated": "null", "siblings": [ "5300-12:IV80617", "6100-09:IV80588", "7100-03:IV80586", "7100-04:IV80586", "7200-00:IV80616" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar", "cvss": [ "CVE-2015-7941:4.3", "CVE-2015-7942:4.3", "CVE-2015-8241:", "5.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "Vulnerabilities in LibXML2 affect AIX", "aparNo": "IV80616", "aparNoSet": [ "CVE-2015-7941", "CVE-2015-7942", "CVE-2015-8241", "IV80616" ], "fixedIn": "7200-00-02", "ifixes": [ "IV80616s1a.160722.epkg.Z", "IV80616s1a.160121.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc", "filesets": [ "bos.rte.control:7.2.0.0" ], "issued": "20160222", "updated": "20160722", "siblings": [ "5300-12:IV80617", "6100-09:IV80588", "7100-03:IV80586", "7100-04:IV80586", "7200-00:IV80616" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar", "cvss": [ "CVE-2015-7941:4.3", "CVE-2015-7942:4.3", "CVE-2015-8241:", "5.9" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerabilities in LibXML2 affect AIX", "aparNo": "IV80617", "aparNoSet": [ "CVE-2015-7941", "CVE-2015-7942", "CVE-2015-8241", "IV80617" ], "fixedIn": "6100-09-07", "ifixes": [ "IV80617s9a.160120.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc", "filesets": [ "bos.rte.control:5.3.12.0-5.3.12.9" ], "issued": "20160222", "updated": "null", "siblings": [ "5300-12:IV80617", "6100-09:IV80588", "7100-03:IV80586", "7100-04:IV80586", "7200-00:IV80616" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar", "cvss": [ "CVE-2015-7941:4.3", "CVE-2015-7942:4.3", "CVE-2015-8241:", "5.9" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "ROOTVG LOSS IS NOT DETECTED", "aparNo": "IV80637", "aparNoSet": [ "IV80637" ], "fixedIn": "7100-04-02", "ifixes": [ "IV80637s1a.160125.71TL04SP00.epkg.Z", "IV80637s1a.160125.71TL04SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80637", "filesets": [ "bos.cluster.rte:7.1.4.0-7.1.4.1" ], "issued": "20160226", "updated": "null", "siblings": [ "7200-00:IV80883" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80637/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "POWERHA FAILOVERS TIMES MAY BE LONG DUE TO DNS QUERY TIMEOUTS", "aparNo": "IV80778", "aparNoSet": [ "IV80778" ], "fixedIn": "7100-04-02", "ifixes": [ "IV80778s1a.160222.71TL04SP00.epkg.Z", "IV80778s1a.160222.71TL04SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80778", "filesets": [ "bos.cluster.rte:7.1.4.0-7.1.4.1" ], "issued": "20160226", "updated": "null", "siblings": [ "7200-00:IV80882" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80778/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "POWERHA FAILOVERS TIMES MAY BE LONG DUE TO DNS QUERY TIMEOUTS", "aparNo": "IV80882", "aparNoSet": [ "IV80882" ], "fixedIn": "7200-00-02", "ifixes": [ "IV80882s1a.160222.72TL00SP00.epkg.Z", "IV80882s1a.160222.72TL00SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80882", "filesets": [ "bos.cluster.rte:7.2.0.0-7.2.0.1" ], "issued": "20160226", "updated": "null", "siblings": [ "7100-04:IV80778" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80882/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "ROOTVG LOSS IS NOT DETECTED", "aparNo": "IV80883", "aparNoSet": [ "IV80883" ], "fixedIn": "7200-00-02", "ifixes": [ "IV80883s1a.160218.72TL00SP00.epkg.Z", "IV80883s1a.160218.72TL00SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80883", "filesets": [ "bos.cluster.rte:7.2.0.0-7.2.0.1" ], "issued": "20160226", "updated": "null", "siblings": [ "7100-04:IV80637" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80883/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION", "aparNo": "IV80957", "aparNoSet": [ "IV80957" ], "fixedIn": "7200-00-02", "ifixes": [ "IV80957s1a.72TL00SP00.160329.epkg.Z", "IV80957s1a.72TL00SP01.160329.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80957", "filesets": [ "bos.cifs_fs.rte:7.2.0.0" ], "issued": "20160330", "updated": "null", "siblings": [ "6100-09:IV80334", "7100-03:IV82410", "7100-04:IV81060" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80957/", "cvss": [], "reboot": "LU" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION", "aparNo": "IV81060", "aparNoSet": [ "IV81060" ], "fixedIn": "7100-04-02", "ifixes": [ "IV81060s1b.71TL04SP01.160202.epkg.Z", "IV81060s1b.71TL04SP01.160202.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81060", "filesets": [ "bos.cifs_fs.rte:7.1.4.0" ], "issued": "20160330", "updated": "null", "siblings": [ "6100-09:IV80334", "7100-03:IV82410", "7200-00:IV80957" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81060/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV81278", "aparNoSet": [ "CVE-2015-8704", "IV81278" ], "fixedIn": "6100-09-07", "ifixes": [ "IV81278m9a.160315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20160422", "updated": "null", "siblings": [ "5300-12:IV81278", "6100-09:IV81279", "7100-03:IV81280", "7100-04:IV81281", "7200-00:IV81282" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar", "cvss": [ "CVE-2015-8704:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV81279", "aparNoSet": [ "CVE-2015-8704", "IV81279" ], "fixedIn": "6100-09-07", "ifixes": [ "IV81279m4c.160331.epkg.Z", "IV81279m5a.160329.epkg.Z", "IV81279s6a.160308.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.101" ], "issued": "20160422", "updated": "null", "siblings": [ "5300-12:IV81278", "6100-09:IV81279", "7100-03:IV81280", "7100-04:IV81281", "7200-00:IV81282" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar", "cvss": [ "CVE-2015-8704:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV81280", "aparNoSet": [ "CVE-2015-8704", "IV81280" ], "fixedIn": "7100-03-07", "ifixes": [ "IV81280m4b.160329.epkg.Z", "IV81280m5a.160330.epkg.Z", "IV81280m6a.160315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.46" ], "issued": "20160422", "updated": "null", "siblings": [ "5300-12:IV81278", "6100-09:IV81279", "7100-03:IV81280", "7100-04:IV81281", "7200-00:IV81282" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar", "cvss": [ "CVE-2015-8704:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV81281", "aparNoSet": [ "CVE-2015-8704", "IV81281" ], "fixedIn": "7100-04-02", "ifixes": [ "IV81281m0b.160331.epkg.Z", "IV81281m1a.160315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0" ], "issued": "20160422", "updated": "null", "siblings": [ "5300-12:IV81278", "6100-09:IV81279", "7100-03:IV81280", "7100-04:IV81281", "7200-00:IV81282" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar", "cvss": [ "CVE-2015-8704:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV81282", "aparNoSet": [ "CVE-2015-8704", "IV81282" ], "fixedIn": "7200-00-02", "ifixes": [ "IV81282m0a.160401.epkg.Z", "IV81282m1a.160315.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc", "filesets": [ "bos.net.tcp.bind:7.2.0.0" ], "issued": "20160422", "updated": "null", "siblings": [ "5300-12:IV81278", "6100-09:IV81279", "7100-03:IV81280", "7100-04:IV81281", "7200-00:IV81282" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar", "cvss": [ "CVE-2015-8704:6.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.0" ], "apAbstract": "Vulnerability in BIND affects VIOS", "aparNo": "IV81282", "aparNoSet": [ "CVE-2015-8704", "IV81282" ], "fixedIn": "2.2.4.20", "ifixes": [ "IV81279s6a.160308.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.101" ], "issued": "20160422", "updated": "null", "siblings": [ "5300-12:IV81278", "6100-09:IV81279", "7100-03:IV81280", "7100-04:IV81281", "7200-00:IV81282" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar", "cvss": [ "CVE-2015-8704:6.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "Core dump in many commands when using NIS", "aparNo": "IV81303", "aparNoSet": [ "IV81303" ], "fixedIn": "7100-04-02", "ifixes": [ "IV81303s1a.160224.71TL04SP00.epkg.Z", "IV81303s1a.160224.71TL04SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81303", "filesets": [ "bos.rte.libc:7.1.4.0" ], "issued": "20160307", "updated": "null", "siblings": [ "6100-09:IV82196", "7200-00:IV82224" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81303/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "Vulnerability in mustendd device driver impacts AIX", "aparNo": "IV81357", "aparNoSet": [ "CVE-2016-0281", "IV81357" ], "fixedIn": "7200-00-02", "ifixes": [ "IV81357s0a.160511.epkg.Z", "IV81357s1a.160414.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc", "filesets": [ "devices.pciex.e4145616e4140518.rte:7.2.0.0" ], "issued": "20160728", "updated": "null", "siblings": [ "5300-12:IV84184", "6100-09:IV80569", "7100-03:IV82421", "7100-04:IV81459", "7200-00:IV81357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar", "cvss": [ "CVE-2016-0281:3.7" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "Vulnerability in mustendd device driver impacts AIX", "aparNo": "IV81459", "aparNoSet": [ "CVE-2016-0281", "IV81459" ], "fixedIn": "7100-04-02", "ifixes": [ "IV81459s1b.160512.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc", "filesets": [ "devices.pciex.e4145616e4140518.rte:7.1.4.0" ], "issued": "20160728", "updated": "null", "siblings": [ "5300-12:IV84184", "6100-09:IV80569", "7100-03:IV82421", "7100-04:IV81459", "7200-00:IV81357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar", "cvss": [ "CVE-2016-0281:3.7" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "MULTIBOS MAY FAIL TO MOUNT OR REMOVE A STANDBY INSTANCE", "aparNo": "IV81482", "aparNoSet": [ "IV81482" ], "fixedIn": "7200-00-02", "ifixes": [ "IV81482s1a.160224.72TL00SP00.epkg.Z", "IV81482s1a.160224.72TL00SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81482", "filesets": [ "bos.rte.bosinst:7.2.0.0" ], "issued": "20160307", "updated": "null", "siblings": [ "6100-09:IV81503", "7100-04:IV81493" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81482/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "multibos may fail to mount or remove a standby instance", "aparNo": "IV81493", "aparNoSet": [ "IV81493" ], "fixedIn": "7100-04-02", "ifixes": [ "IV81493s1a.160223.71TL04SP00.epkg.Z", "IV81493s1a.160223.71TL04SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81493", "filesets": [ "bos.rte.bosinst:7.1.4.0" ], "issued": "20160307", "updated": "null", "siblings": [ "6100-09:IV81503", "7200-00:IV81482" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81493/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10" ], "apAbstract": "multibos may fail to mount or remove a standby instance", "aparNo": "IV81503", "aparNoSet": [ "IV81503" ], "fixedIn": "2.2.4.20", "ifixes": [ "IV81503s6a.160223.61TL09SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81503", "filesets": [ "bos.rte.bosinst:6.1.9.100" ], "issued": "20160307", "updated": "null", "siblings": [ "7100-04:IV81493", "7200-00:IV81482" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81503/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-06" ], "apAbstract": "multibos may fail to mount or remove a standby instance", "aparNo": "IV81503", "aparNoSet": [ "IV81503" ], "fixedIn": "6100-09-07", "ifixes": [ "IV81503s6a.160223.61TL09SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81503", "filesets": [ "bos.rte.bosinst:6.1.9.0-6.1.9.100" ], "issued": "20160307", "updated": "null", "siblings": [ "7100-04:IV81493", "7200-00:IV81482" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81503/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10" ], "apAbstract": "Core dump in many commands when using NIS", "aparNo": "IV82196", "aparNoSet": [ "IV82196" ], "fixedIn": "2.2.4.20", "ifixes": [ "IV82196s6a.160308.61TL09SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82196", "filesets": [ "bos.rte.libc:6.1.9.100" ], "issued": "20160307", "updated": "null", "siblings": [ "6100-09:IV82196", "7100-04:IV81303", "7200-00:IV82224" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82196/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-06" ], "apAbstract": "Core dump in many commands when using NIS", "aparNo": "IV82196", "aparNoSet": [ "IV82196" ], "fixedIn": "6100-09-07", "ifixes": [ "IV82196s6a.160308.61TL09SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82196", "filesets": [ "bos.rte.libc:6.1.9.0-6.1.9.100" ], "issued": "20160307", "updated": "null", "siblings": [ "7100-04:IV81303", "7200-00:IV82224" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82196/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "Core dump in many commands when using NIS", "aparNo": "IV82224", "aparNoSet": [ "IV82224" ], "fixedIn": "7200-00-02", "ifixes": [ "IV82224s1a.160308.72TL00SP00.epkg.Z", "IV82224s1a.160308.72TL00SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82224", "filesets": [ "bos.rte.libc:7.2.0.0" ], "issued": "20160307", "updated": "null", "siblings": [ "6100-09:IV82196", "7100-04:IV81303" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82224/", "cvss": [], "reboot": "LU" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-06", "7100-03-05", "7100-03-04", "7100-03-03", "7100-03-02", "7100-03-01", "7100-03-00" ], "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION", "aparNo": "IV82410", "aparNoSet": [ "IV82410" ], "fixedIn": "7100-03-07", "ifixes": [ "IV82410s6a.71TL03SP06.160324.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82410", "filesets": [ "bos.cifs_fs.rte:7.1.3.0-7.1.3.46" ], "issued": "20160330", "updated": "null", "siblings": [ "6100-09:IV80334", "7100-04:IV81060", "7200-00:IV80957" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82410/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06" ], "apAbstract": "Vulnerability in mustendd device driver impacts AIX", "aparNo": "IV82421", "aparNoSet": [ "CVE-2016-0281", "IV82421" ], "fixedIn": "7100-03-07", "ifixes": [ "IV82421s4a.160505.epkg.Z", "IV82421s5a.160505.epkg.Z", "IV82421s6a.160415.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc", "filesets": [ "devices.pciex.e4145616e4140518.rte:7.1.3.0-7.1.3.46" ], "issued": "20160728", "updated": "null", "siblings": [ "5300-12:IV84184", "6100-09:IV80569", "7100-03:IV82421", "7100-04:IV81459", "7200-00:IV81357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar", "cvss": [ "CVE-2016-0281:3.7" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06" ], "apAbstract": "Cluster split-brain issues when rebooting a node", "aparNo": "IV82494", "aparNoSet": [ "IV82494" ], "fixedIn": "7100-03-07", "ifixes": [ "MIG4_7134.160620.71TL03SP04.epkg.Z", "MIG4_7135.160620.71TL03SP05.epkg.Z", "MIG_7136.160429.71TL03SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82494", "filesets": [ "rsct.basic.rte:7.1.3.0-7.1.3.47" ], "issued": "20160625", "updated": "null", "siblings": [ "6100-09:IV82627", "7100-04:IV82624", "7200-00:IV82561" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82494/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01" ], "apAbstract": "Cluster split-brain issues when rebooting a node", "aparNo": "IV82624", "aparNoSet": [ "IV82624" ], "fixedIn": "7100-04-02", "ifixes": [ "MIG3_7141.160607.71TL04SP01.epkg.Z", "MIG_7142.160607.71TL04SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82624", "filesets": [ "rsct.basic.rte:7.1.4.0-7.1.4.1" ], "issued": "20160625", "updated": "null", "siblings": [ "6100-09:IV82627", "7100-03:IV82494", "7200-00:IV82561" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82494/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06" ], "apAbstract": "Cluster split-brain issues when rebooting a node", "aparNo": "IV82627", "aparNoSet": [ "IV82627" ], "fixedIn": "6100-09-07", "ifixes": [ "MIG4_6194.160620.61TL09SP04.epkg.Z", "MIG4_6195.160620.61TL09SP05.epkg.Z", "MIG_6196.160429.61TL09SP06.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82627", "filesets": [ "rsct.basic.rte:6.1.9.0-6.1.9.100" ], "issued": "20160625", "updated": "null", "siblings": [ "7100-03:IV82494", "7100-04:IV82624", "7200-00:IV82561" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82627/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "Cluster split-brain issues when rebooting a node", "aparNo": "IV82651", "aparNoSet": [ "IV82651" ], "fixedIn": "7200-00-02", "ifixes": [ "MIG3_7201.160607.72TL00SP01.epkg.Z", "MIG_7202.160607.72TL00SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82651", "filesets": [ "rsct.basic.rte:7.2.0.0-7.2.0.1" ], "issued": "20160625", "updated": "null", "siblings": [ "6100-09:IV82627", "7100-03:IV82494", "7100-04:IV82624" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82651/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20" ], "apAbstract": "Server using 10 GB PCIE adapters and large_send may crash", "aparNo": "IV82694", "aparNoSet": [ "IV82694" ], "fixedIn": "2.2.4.30", "ifixes": [ "IV82694s6a.160510.61TL09SP06.epkg.Z", "IV82694s7a.160531.61TL09SP07.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/docview.wss?uid\u003disg1IV82694", "filesets": [ "bos.net.tcp.client:6.1.9.100-6.1.9.102" ], "issued": "20160816", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82694/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07" ], "apAbstract": "Server using 10 GB PCIE adapters and large_send may crash", "aparNo": "IV82694", "aparNoSet": [ "IV82694" ], "fixedIn": "6100-09-08", "ifixes": [ "IV82694s6a.160510.61TL09SP06.epkg.Z", "IV82694s7a.160531.61TL09SP07.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/docview.wss?uid\u003disg1IV82694", "filesets": [ "bos.net.tcp.client:6.1.9.100-6.1.9.102" ], "issued": "20160816", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82694/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.10", "2.2.3.20", "2.2.3.30", "2.2.3.40", "2.2.3.50", "2.2.3.60", "2.2.3.70" ], "apAbstract": "I/O HANG OR CRASH IN EFC_FREE_LOGIN _TBLE WITH SOME FC ADAPTERS", "aparNo": "IV83143", "aparNoSet": [ "IV83143" ], "fixedIn": "2.2.3.80", "ifixes": [ "IV83143s0a.161018.epkg.Z", "IV83143s2a.161014.epkg.Z", "IV83143s3a.160915.61TL09SP03.epkg.Z", "IV83143s4a.160921.61TL09SP04.epkg.Z", "IV83143s5a.160502.61TL09SP05.epkg.Z", "IV83143s5a.160502.VIOS.2.2.3.5x.epkg.Z", "IV83143s6a.160523.61TL09SP06.epkg.Z", "IV83143s6a.160523.VIOS.2.2.3.60.epkg.Z", "IV83143s6a.160523.VIOS.2.2.4.0.epkg.Z", "IV83143s6a.160523.VIOS.2.2.4.10.epkg.Z", "IV83143s7a.160705.61TL09SP07.epkg.Z", "IV83143s7a.1607" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV83143", "filesets": [ "devices.pci.df1000f7.com:6.1.9.0-6.1.9.101" ], "issued": "20160917", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv83143/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.21", "2.2.4.22", "2.2.4.23" ], "apAbstract": "I/O HANG OR CRASH IN EFC_FREE_LOGIN _TBLE WITH SOME FC ADAPTERS", "aparNo": "IV83143", "aparNoSet": [ "IV83143" ], "fixedIn": "2.2.4.30", "ifixes": [ "IV83143s0a.161018.epkg.Z", "IV83143s2a.161014.epkg.Z", "IV83143s3a.160915.61TL09SP03.epkg.Z", "IV83143s4a.160921.61TL09SP04.epkg.Z", "IV83143s5a.160502.61TL09SP05.epkg.Z", "IV83143s5a.160502.VIOS.2.2.3.5x.epkg.Z", "IV83143s6a.160523.61TL09SP06.epkg.Z", "IV83143s6a.160523.VIOS.2.2.3.60.epkg.Z", "IV83143s6a.160523.VIOS.2.2.4.0.epkg.Z", "IV83143s6a.160523.VIOS.2.2.4.10.epkg.Z", "IV83143s7a.160705.61TL09SP07.epkg.Z", "IV83143s7a.1607" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV83143", "filesets": [ "devices.pci.df1000f7.com:6.1.9.100-6.1.9.101" ], "issued": "20160917", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv83143/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV83984", "aparNoSet": [ "CVE-2015-7972", "CVE-2015-7977", "CVE-2015-7979", "CVE-2015-8139", "CVE-2015-8140", "CVE-2015-8158", "IV83984" ], "fixedIn": "6100-09-08", "ifixes": [ "IV83984m4a.160506.epkg.Z", "IV83984m5a.160510.epkg.Z", "IV83984m6a.160504.epkg.Z", "IV83984s7a.160622.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.102" ], "issued": "20160608", "updated": "20160622", "siblings": [ "5300-12:IV84269", "6100-09:IV83984", "7100-03:IV83993", "7100-04:IV83994", "7200-00:IV83995" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar", "cvss": [ "CVE-2015-7973:5.4", "CVE-2015-7977:5.3", "CVE-2015-7979:6.5", "CVE-2015-8158:5.3", "CVE-2015-8139:5.3", "CVE-2015-8140:5.3" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.20" ], "apAbstract": "Vulnerabilities in NTP affect VIOS", "aparNo": "IV83984", "aparNoSet": [ "CVE-2015-7972", "CVE-2015-7977", "CVE-2015-7979", "CVE-2015-8139", "CVE-2015-8140", "CVE-2015-8158", "IV83984" ], "fixedIn": "2.2.4.30", "ifixes": [ "IV83984m6a.160504.epkg.Z", "IV83984s7a.160622.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.102" ], "issued": "20160608", "updated": "20160622", "siblings": [ "5300-12:IV84269", "6100-09:IV83984", "7100-03:IV83993", "7100-04:IV83994", "7200-00:IV83995" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar", "cvss": [ "CVE-2015-7973:5.4", "CVE-2015-7977:5.3", "CVE-2015-7979:6.5", "CVE-2015-8158:5.3", "CVE-2015-8139:5.3", "CVE-2015-8140:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV83993", "aparNoSet": [ "CVE-2015-7972", "CVE-2015-7977", "CVE-2015-7979", "CVE-2015-8139", "CVE-2015-8140", "CVE-2015-8158", "IV83993" ], "fixedIn": "7100-03-08", "ifixes": [ "IV83993m4b.160510.epkg.Z", "IV83993m5a.160510.epkg.Z", "IV83993m6a.160505.epkg.Z", "IV83993s7a.160714.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.47" ], "issued": "20160608", "updated": "20160719", "siblings": [ "5300-12:IV84269", "6100-09:IV83984", "7100-03:IV83993", "7100-04:IV83994", "7200-00:IV83995" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar", "cvss": [ "CVE-2015-7973:5.4", "CVE-2015-7977:5.3", "CVE-2015-7979:6.5", "CVE-2015-8158:5.3", "CVE-2015-8139:5.3", "CVE-2015-8140:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV83994", "aparNoSet": [ "CVE-2015-7972", "CVE-2015-7977", "CVE-2015-7979", "CVE-2015-8139", "CVE-2015-8140", "CVE-2015-8158", "IV83994" ], "fixedIn": "7100-04-03", "ifixes": [ "IV83994m1a.160505.epkg.Z", "IV83994m1a.160505.epkg.Z", "IV83994s2a.160620.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.1" ], "issued": "20160608", "updated": "20160620", "siblings": [ "5300-12:IV84269", "6100-09:IV83984", "7100-03:IV83993", "7100-04:IV83994", "7200-00:IV83995" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar", "cvss": [ "CVE-2015-7973:5.4", "CVE-2015-7977:5.3", "CVE-2015-7979:6.5", "CVE-2015-8158:5.3", "CVE-2015-8139:5.3", "CVE-2015-8140:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV83995", "aparNoSet": [ "CVE-2015-7972", "CVE-2015-7977", "CVE-2015-7979", "CVE-2015-8139", "CVE-2015-8140", "CVE-2015-8158", "IV83995" ], "fixedIn": "7200-00-03", "ifixes": [ "IV83995m0a.160510.epkg.Z", "IV83995m1a.160601.epkg.Z", "IV83995s2b.160713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc", "filesets": [ "bos.net.tcp.ntp:7.2.0.0-7.2.0.2", "bos.net.tcp.ntpd:7.2.0.0-7.2.0.2" ], "issued": "20160608", "updated": "20160816", "siblings": [ "5300-12:IV84269", "6100-09:IV83984", "7100-03:IV83993", "7100-04:IV83994", "7200-00:IV83995" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar", "cvss": [ "CVE-2015-7973:5.4", "CVE-2015-7977:5.3", "CVE-2015-7979:6.5", "CVE-2015-8158:5.3", "CVE-2015-8139:5.3", "CVE-2015-8140:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerability in mustendd device driver impacts AIX", "aparNo": "IV84184", "aparNoSet": [ "CVE-2016-0281", "IV84184" ], "fixedIn": "6100-09-07", "ifixes": [ "IV81357s0a.160511.epkg.Z", "IV81357s1a.160414.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc", "filesets": [ "devices.pciex.e4145616e4140518.rte:5.3.12.0-5.3.12.3" ], "issued": "20160728", "updated": "null", "siblings": [ "5300-12:IV84184", "6100-09:IV80569", "7100-03:IV82421", "7100-04:IV81459", "7200-00:IV81357" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar", "cvss": [ "CVE-2016-0281:3.7" ], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.10", "2.2.3.20", "2.2.3.30", "2.2.3.40", "2.2.3.50", "2.2.3.60", "2.2.3.70" ], "apAbstract": "LU READS MAY DETECT BAD DATA WHILE LU MOVE IN PROGRESS", "aparNo": "IV84212", "aparNoSet": [ "IV84212" ], "fixedIn": "2.2.3.80", "ifixes": [ "IV84212s6a.160509.61TL09SP06.epkg.Z", "IV84212s6a.160509.VIOS2.2.4.10.epkg.Z", "IV84212s7a.160509.61TL09SP07.epkg.Z", "IV84212s7a.160509.VIOS2.2.4.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV84212", "filesets": [ "pool.basic.rte:6.1.9.0-6.1.9.46" ], "issued": "20160527", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv84212/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20" ], "apAbstract": "LU READS MAY DETECT BAD DATA WHILE LU MOVE IN PROGRESS", "aparNo": "IV84212", "aparNoSet": [ "IV84212" ], "fixedIn": "2.2.4.30", "ifixes": [ "IV84212s6a.160509.61TL09SP06.epkg.Z", "IV84212s6a.160509.VIOS2.2.4.10.epkg.Z", "IV84212s7a.160509.61TL09SP07.epkg.Z", "IV84212s7a.160509.VIOS2.2.4.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV84212", "filesets": [ "pool.basic.rte:6.1.9.100-6.1.9.101" ], "issued": "20160527", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv84212/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV84269", "aparNoSet": [ "CVE-2015-7972", "CVE-2015-7977", "CVE-2015-7979", "CVE-2015-8139", "CVE-2015-8140", "CVE-2015-8158", "IV84269" ], "fixedIn": "6100-09-08", "ifixes": [ "IV84269m9a.160522.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20160608", "updated": "20160609", "siblings": [ "5300-12:IV84269", "6100-09:IV83984", "7100-03:IV83993", "7100-04:IV83994", "7200-00:IV83995" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar", "cvss": [ "CVE-2015-7973:5.4", "CVE-2015-7977:5.3", "CVE-2015-7979:6.5", "CVE-2015-8158:5.3", "CVE-2015-8139:5.3", "CVE-2015-8140:5.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02" ], "apAbstract": "Vulnerability in BIND affects AIX", "aparNo": "IV84947", "aparNoSet": [ "CVE-2016-1285", "CVE-2016-1286", "IV84947" ], "fixedIn": "7100-04-03", "ifixes": [ "IV84458s1a.160519.epkg.Z", "IV84947m1a.160531.epkg.Z", "IV84458s2a.160608.epkg.Z", "IV85296s2a.160616.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.1", "bos.net.tcp.server:7.1.4.0-7.1.4.1" ], "issued": "20160616", "updated": "null", "siblings": [ "5300-12:IV85298", "6100-09:IV84984", "7100-03:IV85296", "7100-04:IV84947", "7200-00:IV85297" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar", "cvss": [ "CVE-2016-1285:7.5", "CVE-2016-1286:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07" ], "apAbstract": "Vulnerabilities in BIND affects AIX", "aparNo": "IV84984", "aparNoSet": [ "CVE-2016-1285", "CVE-2016-1286", "IV84984" ], "fixedIn": "6100-09-08", "ifixes": [ "IV84456s5b.160607.epkg.Z", "IV84984m5b.160708.epkg.Z", "IV84456s6a.160517.epkg.Z", "IV84984m6a.160530.epkg.Z", "IV84456s7a.160608.epkg.Z", "IV84984s7a.160616.epkg.Z", "DEPRECATED::IV84984m5a.160616.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.102", "bos.net.tcp.server:6.1.9.0-6.1.9.101" ], "issued": "20160616", "updated": "20160708", "siblings": [ "5300-12:IV85298", "6100-09:IV84984", "7100-03:IV85296", "7100-04:IV84947", "7200-00:IV85297" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar", "cvss": [ "CVE-2016-1285:7.5", "CVE-2016-1286:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.0" ], "apAbstract": "Vulnerabilities in BIND affects VIOS", "aparNo": "IV84984", "aparNoSet": [ "CVE-2016-1285", "CVE-2016-1286", "IV84984" ], "fixedIn": "2.2.4.30", "ifixes": [ "IV84456s5b.160607.epkg.Z", "IV84984m5a.160616.epkg.Z", "IV84456s6a.160517.epkg.Z", "IV84984m6a.160530.epkg.Z", "IV84456s7a.160608.epkg.Z", "IV84984s7a.160616.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.102", "bos.net.tcp.server:6.1.9.0-6.1.9.101" ], "issued": "20160616", "updated": "null", "siblings": [ "5300-12:IV85298", "6100-09:IV84984", "7100-03:IV85296", "7100-04:IV84947", "7200-00:IV85297" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar", "cvss": [ "CVE-2016-1285:7.5", "CVE-2016-1286:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "Vulnerabilities in BIND affects AIX", "aparNo": "IV85296", "aparNoSet": [ "CVE-2016-1285", "CVE-2016-1286", "IV85296" ], "fixedIn": "7100-03-08", "ifixes": [ "IV84457s6a.160517.epkg.Z", "IV85296m6a.160601.epkg.Z", "IV84457s5a.160613.epkg.Z", "IV85296m5a.160617.epkg.Z", "IV84457s7a.160726.epkg.Z", "IV85296s7a.160809.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.47", "bos.net.tcp.server:7.1.3.0-7.1.3.47" ], "issued": "20160616", "updated": "20160817", "siblings": [ "5300-12:IV85298", "6100-09:IV84984", "7100-03:IV85296", "7100-04:IV84947", "7200-00:IV85297" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar", "cvss": [ "CVE-2016-1285:7.5", "CVE-2016-1286:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "Vulnerabilities in BIND affects AIX", "aparNo": "IV85297", "aparNoSet": [ "CVE-2016-1285", "CVE-2016-1286", "IV85297" ], "fixedIn": "7200-00-03", "ifixes": [ "IV84459s1a.160519.epkg.Z", "IV85297m1a.160601.epkg.Z", "IV84459s2a.160613.epkg.Z", "IV85297s2a.160614.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc", "filesets": [ "bos.net.tcp.bind:7.2.0.0", "bos.net.tcp.bind_utils:7.2.0.0-7.2.0.1" ], "issued": "20160616", "updated": "null", "siblings": [ "5300-12:IV85298", "6100-09:IV84984", "7100-03:IV85296", "7100-04:IV84947", "7200-00:IV85297" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar", "cvss": [ "CVE-2016-1285:7.5", "CVE-2016-1286:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerabilities in BIND affects AIX", "aparNo": "IV85298", "aparNoSet": [ "CVE-2016-1285", "CVE-2016-1286", "IV85298" ], "fixedIn": "6100-09-08", "ifixes": [ "IV85298m9a.160602.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10", "bos.net.tcp.server:5.3.12.0-5.3.12.6" ], "issued": "20160616", "updated": "null", "siblings": [ "5300-12:IV85298", "6100-09:IV84984", "7100-03:IV85296", "7100-04:IV84947", "7200-00:IV85297" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar", "cvss": [ "CVE-2016-1285:7.5", "CVE-2016-1286:7.5" ], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.50", "2.2.3.60", "2.2.3.70" ], "apAbstract": "Malformed network packets can cause system crash", "aparNo": "IV85460", "aparNoSet": [ "IV85460" ], "fixedIn": "2.2.3.80", "ifixes": [ "IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z", "IV85460s7a.160823.VIOS2.2.3.70.devices.ethernet.mlx.rte.epkg.Z", "IV85460s7a.160823.VIOS2.2.4.23.devices.ethernet.mlx.rte.epkg.Z", "IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z", "IV85460s7c.161214.VIOS2.2.3.70.devices.ethernet.shi.rte.epkg.Z", "IV85460s7c.161214.VIOS2.2.4.23.devices.ethernet.shi.rte.epkg.Z", "IV854" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV85460", "filesets": [ "devices.ethernet.shi.rte:6.1.9.101-6.1.9.103", "devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102", "devices.ethernet.lnc2.rte:6.1.9.45-6.1.9.103" ], "issued": "20160606", "updated": "20170106", "siblings": [ "7100-03:IV88430", "7100-04:IV86787", "7200-00:IV88136" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv85460/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.21", "2.2.4.22", "2.2.4.23" ], "apAbstract": "Malformed network packets can cause system crash", "aparNo": "IV85460", "aparNoSet": [ "IV85460" ], "fixedIn": "2.2.4.24", "ifixes": [ "IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z", "IV85460s7a.160823.VIOS2.2.3.70.devices.ethernet.mlx.rte.epkg.Z", "IV85460s7a.160823.VIOS2.2.4.23.devices.ethernet.mlx.rte.epkg.Z", "IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z", "IV85460s7c.161214.VIOS2.2.3.70.devices.ethernet.shi.rte.epkg.Z", "IV85460s7c.161214.VIOS2.2.4.23.devices.ethernet.shi.rte.epkg.Z", "IV854" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV85460", "filesets": [ "devices.ethernet.shi.rte:6.1.9.101-6.1.9.103", "devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102", "devices.ethernet.lnc2.rte:6.1.9.101-6.1.9.103" ], "issued": "20160606", "updated": "20170106", "siblings": [ "7100-03:IV88430", "7100-04:IV86787", "7200-00:IV88136" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv85460/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-05", "6100-09-06", "6100-09-07" ], "apAbstract": "Malformed network packets can cause system crash", "aparNo": "IV85460", "aparNoSet": [ "IV85460" ], "fixedIn": "6100-09-08", "ifixes": [ "IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z", "IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z", "IV85460s7d.161215.AIX61TL09SP07.devices.ethernet.lnc2.rte.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV85460", "filesets": [ "devices.ethernet.shi.rte:6.1.9.101-6.1.9.103", "devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102", "devices.ethernet.lnc2.rte:6.1.9.45-6.1.9.103" ], "issued": "20160606", "updated": "20170106", "siblings": [ "7100-03:IV88430", "7100-04:IV86787", "7200-00:IV88136" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv85460/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02" ], "apAbstract": "Cluster node halt due to Group Services client errors", "aparNo": "IV85983", "aparNoSet": [ "IV85983" ], "fixedIn": "7100-04-03", "ifixes": [ "ctHA_O1r.160808.71TL04SP01.epkg.Z", "ctHA_O2r.160810.71TL04SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV85983", "filesets": [ "rsct.basic.rte:3.2.1.0-3.2.1.10", "rsct.core.rmc:3.2.1.0-3.2.1.10" ], "issued": "20160628", "updated": "null", "siblings": [ "7100-03:IV74438" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv85893/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "Cluster node halt due to Group Services client errors", "aparNo": "IV85983", "aparNoSet": [ "IV85983" ], "fixedIn": "7200-00-03", "ifixes": [ "ctHA_O1r.160808.72TL00SP01.epkg.Z", "ctHA_O2r.160810.72TL00SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV85983", "filesets": [ "rsct.basic.rte:3.2.1.0-3.2.1.10", "rsct.core.rmc:3.2.1.0-3.2.1.10" ], "issued": "20160628", "updated": "null", "siblings": [ "6100-09:IV74438", "7100-03:IV74438" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv85893/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.20" ], "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on VIOS", "aparNo": "IV86116", "aparNoSet": [ "CVE-2015-7575", "CVE-2016-0266", "IV86116" ], "fixedIn": "2.2.4.30", "ifixes": [ "IV86116m7a.160701.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.102", "bos.net.tcp.server:6.1.9.0-6.1.9.101" ], "issued": "20160726", "updated": "null", "siblings": [ "5300-12:IV86120", "6100-09:IV86116", "7100-03:IV86117", "7100-04:IV86118", "7200-00:IV86119", "7200-00:IV86132" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar", "cvss": [ "CVE-2015-7575:7.1", "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07" ], "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX", "aparNo": "IV86116", "aparNoSet": [ "CVE-2015-7575", "CVE-2016-0266", "IV86116" ], "fixedIn": "6100-09-08", "ifixes": [ "IV86116s6a.160812.epkg.Z", "IV78625m5a.160901.epkg.Z", "IV79072s6a.160902.epkg.Z", "IV79072s5a.160830.epkg.Z", "IV79070m6a.160902.epkg.Z", "IV79070m5a.160901.epkg.Z", "IV78624m5a.160830.epkg.Z", "IV79071m6a.161017.epkg.Z", "IV79071m5a.160901.epkg.Z", "IV86116m7a.160701.epkg.Z", "DEPRECATED::IV86116m5b.160701.epkg.Z", "DEPRECATED::IV86116m6a.160701.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.102", "bos.net.tcp.server:6.1.9.0-6.1.9.101" ], "issued": "20160726", "updated": "20161020", "siblings": [ "5300-12:IV86120", "6100-09:IV86116", "7100-03:IV86117", "7100-04:IV86118", "7200-00:IV86119", "7200-00:IV86132" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar", "cvss": [ "CVE-2015-7575:7.1", "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX", "aparNo": "IV86117", "aparNoSet": [ "CVE-2015-7575", "CVE-2016-0266", "IV86117" ], "fixedIn": "7100-03-08", "ifixes": [ "IV82328m6a.160901.epkg.Z", "IV82328m5a.160830.epkg.Z", "IV82412s6a.160901.epkg.Z", "IV82412s5a.160829.epkg.Z", "IV82330m6a.160831.epkg.Z", "IV82330m5a.160831.epkg.Z", "IV82327s6a.160901.epkg.Z", "IV82327m5a.160830.epkg.Z", "IV82331m6a.160901.epkg.Z", "IV82331m5a.160830.epkg.Z", "IV86117m7a.160725.epkg.Z", "DEPRECATED::IV86117m5a.160701.epkg.Z", "DEPRECATED::IV86117m6a.160701.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.47", "bos.net.tcp.server:7.1.3.0-7.1.3.47" ], "issued": "20160726", "updated": "20161020", "siblings": [ "5300-12:IV86120", "6100-09:IV86116", "7100-03:IV86117", "7100-04:IV86118", "7200-00:IV86119", "7200-00:IV86132" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar", "cvss": [ "CVE-2015-7575:7.1", "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02" ], "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on AIX", "aparNo": "IV86118", "aparNoSet": [ "CVE-2015-7575", "CVE-2016-0266", "IV86118" ], "fixedIn": "7100-04-03", "ifixes": [ "IV86118m2a.160701.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.1", "bos.net.tcp.server:7.1.4.0-7.1.4.1" ], "issued": "20160726", "updated": "null", "siblings": [ "5300-12:IV86120", "6100-09:IV86116", "7100-03:IV86117", "7100-04:IV86118", "7200-00:IV86119", "7200-00:IV86132" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar", "cvss": [ "CVE-2015-7575:7.1", "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on AIX", "aparNo": "IV86119", "aparNoSet": [ "CVE-2015-7575", "CVE-2016-0266", "IV86119", "IV86132" ], "fixedIn": "7200-00-03", "ifixes": [ "IV86119s0a.160701.epkg.Z", "IV86132s0a.160701.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc", "filesets": [ "bos.net.tcp.imapd:7.2.0.0", "bos.net.tcp.pop3d:7.2.0.0", "bos.net.tcp.sendmail:7.2.0.0" ], "issued": "20160726", "updated": "null", "siblings": [ "5300-12:IV86120", "6100-09:IV86116", "7100-03:IV86117", "7100-04:IV86118", "7200-00:IV86119", "7200-00:IV86132" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar", "cvss": [ "CVE-2015-7575:7.1", "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX", "aparNo": "IV86120", "aparNoSet": [ "CVE-2015-7575", "CVE-2016-0266", "IV86120" ], "fixedIn": "6100-09-08", "ifixes": [ "IV88960m9a.160913.epkg.Z", "IV88959m9a.160915.epkg.Z", "IV88957m9a.160910.epkg.Z", "DEPRECATED::IV86120m9a.160705.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10", "bos.net.tcp.server:5.3.12.0-5.3.12.6" ], "issued": "20160726", "updated": "20161020", "siblings": [ "5300-12:IV86120", "6100-09:IV86116", "7100-03:IV86117", "7100-04:IV86118", "7200-00:IV86119", "7200-00:IV86132" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar", "cvss": [ "CVE-2015-7575:7.1", "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-02" ], "apAbstract": "Performance regression when using Olson timezone format", "aparNo": "IV86730", "aparNoSet": [ "IV86730" ], "fixedIn": "7100-04-03", "ifixes": [ "IV86730m2a.160812.71TL04SP01.epkg.Z", "IV86730m2a.160812.71TL04SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV86730", "filesets": [ "bos.rte.libc:7.1.4.1" ], "issued": "20160901", "updated": "null", "siblings": [ "6100-09:IV86773", "7100-03:IV87788", "7100-04:IV86730", "7200-00:IV87789" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv86730/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-07" ], "apAbstract": "Performance regression when using Olson timezone format", "aparNo": "IV86773", "aparNoSet": [ "IV86773" ], "fixedIn": "6100-09-08", "ifixes": [ "IV86773s9a.160831.61TL09SP07.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV86773", "filesets": [ "bos.rte.libc:6.1.9.101" ], "issued": "20160901", "updated": "null", "siblings": [ "6100-09:IV86773", "7100-03:IV87788", "7100-04:IV86730", "7200-00:IV87789" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv86773/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02" ], "apAbstract": "Malformed network packets can cause system crash", "aparNo": "IV86787", "aparNoSet": [ "IV86787" ], "fixedIn": "7100-04-03", "ifixes": [ "IV86787s2a.161222.AIX71TL04SP02.devices.ethernet.mlx.rte.epkg.Z", "IV86787s2b.161222.AIX71TL04SP02.devices.ethernet.lnc2.rte.epkg.Z", "IV86787s2c.161222.AIX71TL04SP02.devices.ethernet.shi.rte.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV86787", "filesets": [ "devices.ethernet.shi.rte:7.1.4.0-7.1.4.2", "devices.ethernet.mlx.rte:7.1.4.0-7.1.4.2", "devices.ethernet.lnc2.rte:7.1.4.0-7.1.4.2" ], "issued": "20160711", "updated": "20170106", "siblings": [ "6100-09:IV85460", "7100-03:IV88430", "7200-00:IV88136" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv86787/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV87419", "aparNoSet": [ "CVE-2015-7974", "CVE-2016-1550", "CVE-2016-1551", "CVE-2016-2517", "CVE-2016-2518", "CVE-2016-2519", "IV87419" ], "fixedIn": "6100-09-08", "ifixes": [ "IV87419m5d.160823.epkg.Z", "IV87419m6a.160823.epkg.Z", "IV87419m7a.160901.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.102" ], "issued": "20160906", "updated": "null", "siblings": [ "5300-12:IV87614", "6100-09:IV87419", "7100-03:IV87615", "7100-04:IV87420", "7200-00:IV87939" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar", "cvss": [ "CVE-2015-7974:5.3", "CVE-2016-1550:4.0", "CVE-2016-1551:3.7", "CVE-2016-2517:4.2", "CVE-2016-2518:2.0", "CVE-2016-2519:4.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.20" ], "apAbstract": "Vulnerabilities in NTP affect VIOS", "aparNo": "IV87419", "aparNoSet": [ "CVE-2015-7974", "CVE-2016-1550", "CVE-2016-1551", "CVE-2016-2517", "CVE-2016-2518", "CVE-2016-2519", "IV87419" ], "fixedIn": "2.2.4.30", "ifixes": [ "IV87419m6a.160823.epkg.Z", "IV87419m7a.160901.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.102" ], "issued": "20160906", "updated": "null", "siblings": [ "5300-12:IV87614", "6100-09:IV87419", "7100-03:IV87615", "7100-04:IV87420", "7200-00:IV87939" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar", "cvss": [ "CVE-2015-7974:5.3", "CVE-2016-1550:4.0", "CVE-2016-1551:3.7", "CVE-2016-2517:4.2", "CVE-2016-2518:2.0", "CVE-2016-2519:4.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV87420", "aparNoSet": [ "CVE-2015-7974", "CVE-2016-1550", "CVE-2016-1551", "CVE-2016-2517", "CVE-2016-2518", "CVE-2016-2519", "IV87420" ], "fixedIn": "7100-04-03", "ifixes": [ "IV87420m0a.160825.epkg.Z", "IV87420m2a.160901.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.1" ], "issued": "20160906", "updated": "null", "siblings": [ "5300-12:IV87614", "6100-09:IV87419", "7100-03:IV87615", "7100-04:IV87420", "7200-00:IV87939" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar", "cvss": [ "CVE-2015-7974:5.3", "CVE-2016-1550:4.0", "CVE-2016-1551:3.7", "CVE-2016-2517:4.2", "CVE-2016-2518:2.0", "CVE-2016-2519:4.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV87614", "aparNoSet": [ "CVE-2015-7974", "CVE-2016-1550", "CVE-2016-1551", "CVE-2016-2517", "CVE-2016-2518", "CVE-2016-2519", "IV87614" ], "fixedIn": "6100-09-08", "ifixes": [ "IV87614m9a.160901.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20160906", "updated": "null", "siblings": [ "5300-12:IV87614", "6100-09:IV87419", "7100-03:IV87615", "7100-04:IV87420", "7200-00:IV87939" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar", "cvss": [ "CVE-2015-7974:5.3", "CVE-2016-1550:4.0", "CVE-2016-1551:3.7", "CVE-2016-2517:4.2", "CVE-2016-2518:2.0", "CVE-2016-2519:4.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV87615", "aparNoSet": [ "CVE-2015-7974", "CVE-2016-1550", "CVE-2016-1551", "CVE-2016-2517", "CVE-2016-2518", "CVE-2016-2519", "IV87615" ], "fixedIn": "7100-03-08", "ifixes": [ "IV87615m5a.160823.epkg.Z", "IV87615m6a.160824.epkg.Z", "IV87615m7a.160901.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.47" ], "issued": "20160906", "updated": "null", "siblings": [ "5300-12:IV87614", "6100-09:IV87419", "7100-03:IV87615", "7100-04:IV87420", "7200-00:IV87939" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar", "cvss": [ "CVE-2015-7974:5.3", "CVE-2016-1550:4.0", "CVE-2016-1551:3.7", "CVE-2016-2517:4.2", "CVE-2016-2518:2.0", "CVE-2016-2519:4.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02" ], "apAbstract": "Vulnerability in lquerylv in LVM impacts AIX", "aparNo": "IV87640", "aparNoSet": [ "CVE-2016-6079", "IV87640" ], "fixedIn": "7100-04-03", "ifixes": [ "IV87640s2a.160825.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc", "filesets": [ "bos.rte.lvm:7.1.4.0-7.1.4.1" ], "issued": "20161031", "updated": "null", "siblings": [ "5300-12:IV88658", "6100-09:IV87981", "7100-03:IV88419", "7100-04:IV87640", "7200-00:IV88053" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar", "cvss": [ "CVE-2016-6079:9.8" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-07" ], "apAbstract": "Performance regression when using Olson timezone format", "aparNo": "IV87788", "aparNoSet": [ "IV87788" ], "fixedIn": "7100-03-08", "ifixes": [ "IV87788s1a.160831.71TL03SP07.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV87788", "filesets": [ "bos.rte.libc:7.1.3.47" ], "issued": "20160901", "updated": "null", "siblings": [ "6100-09:IV86773", "7100-03:IV87788", "7100-04:IV86730", "7200-00:IV87789" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv87788/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-02" ], "apAbstract": "Performance regression when using Olson timezone format", "aparNo": "IV87789", "aparNoSet": [ "IV87789" ], "fixedIn": "7200-00-03", "ifixes": [ "IV87789s2a.160830.72TL00SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV87789", "filesets": [ "bos.rte.libc:7.2.0.1" ], "issued": "20160901", "updated": "null", "siblings": [ "6100-09:IV86773", "7100-03:IV87788", "7100-04:IV86730", "7200-00:IV87789" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv87789/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07" ], "apAbstract": "Vulnerability in lsmcode affects AIX", "aparNo": "IV87794", "aparNoSet": [ "CVE-2016-3053", "IV87794" ], "fixedIn": "6100-09-08", "ifixes": [ "IV87794s5a.160913.epkg.Z", "IV87794s6a.160912.epkg.Z", "IV87794s7b.160822.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc", "filesets": [ "bos.rte.shell:6.1.9.0-6.1.9.101", "bos.rte.libc:6.1.9.0-6.1.9.101" ], "issued": "20161017", "updated": "null", "siblings": [ "6100-09:IV87794", "7100-03:IV88457", "7100-04:IV88007", "7200-00:IV88042" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar", "cvss": [ "CVE-2016-3053:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50", "2.2.3.60", "2.2.3.70", "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.21", "2.2.4.22", "2.2.4.23" ], "apAbstract": "Vulnerability in lsmcode affects VIOS", "aparNo": "IV87794", "aparNoSet": [ "CVE-2016-3053", "IV87794" ], "fixedIn": "2.2.4.30", "ifixes": [ "IV87794s6a.160912.epkg.Z", "IV87794s7b.160822.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc", "filesets": [ "bos.rte.shell:6.1.9.0-6.1.9.101", "bos.rte.libc:6.1.9.0-6.1.9.101" ], "issued": "20161017", "updated": "null", "siblings": [ "6100-09:IV87794", "7100-03:IV88457", "7100-04:IV88007", "7200-00:IV88042" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar", "cvss": [ "CVE-2016-3053:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "Vulnerabilities in NTP affect AIX", "aparNo": "IV87939", "aparNoSet": [ "CVE-2015-7974", "CVE-2016-1550", "CVE-2016-1551", "CVE-2016-2517", "CVE-2016-2518", "CVE-2016-2519", "IV87939" ], "fixedIn": "7200-00-03", "ifixes": [ "IV87939m0b.160830.epkg.Z", "IV87939m2a.160901.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc", "filesets": [ "bos.net.tcp.ntp:7.2.0.0-7.2.0.2", "bos.net.tcp.ntpd:7.2.0.0-7.2.0.2" ], "issued": "20160906", "updated": "null", "siblings": [ "5300-12:IV87614", "6100-09:IV87419", "7100-03:IV87615", "7100-04:IV87420", "7200-00:IV87939" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar", "cvss": [ "CVE-2015-7974:5.3", "CVE-2016-1550:4.0", "CVE-2016-1551:3.7", "CVE-2016-2517:4.2", "CVE-2016-2518:2.0", "CVE-2016-2519:4.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07" ], "apAbstract": "Vulnerability in lquerylv in LVM impacts AIX", "aparNo": "IV87981", "aparNoSet": [ "CVE-2016-6079", "IV87981" ], "fixedIn": "6100-09-08", "ifixes": [ "IV87981s7a.160825.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc", "filesets": [ "bos.rte.lvm:6.1.9.0-6.1.9.101" ], "issued": "20161031", "updated": "null", "siblings": [ "5300-12:IV88658", "6100-09:IV87981", "7100-03:IV88419", "7100-04:IV87640", "7200-00:IV88053" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar", "cvss": [ "CVE-2016-6079:9.8" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50", "2.2.3.60", "2.2.3.70", "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.21", "2.2.4.22", "2.2.4.23" ], "apAbstract": "Vulnerability in lquerylv in LVM impacts VIOS", "aparNo": "IV87981", "aparNoSet": [ "CVE-2016-6079", "IV87981" ], "fixedIn": "2.2.4.30", "ifixes": [ "IV87981s7a.160825.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc", "filesets": [ "bos.rte.lvm:6.1.9.0-6.1.9.101" ], "issued": "20161031", "updated": "null", "siblings": [ "5300-12:IV88658", "6100-09:IV87981", "7100-03:IV88419", "7100-04:IV87640", "7200-00:IV88053" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar", "cvss": [ "CVE-2016-6079:9.8" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02" ], "apAbstract": "Vulnerability in lsmcode affects AIX", "aparNo": "IV88007", "aparNoSet": [ "CVE-2016-3053", "IV88007" ], "fixedIn": "7100-04-03", "ifixes": [ "IV88007s2a.161110.epkg.Z", "IV88007s0a.160913.epkg.Z", "IV88007s2a.160819.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc", "filesets": [ "bos.rte.shell:7.1.4.0-7.1.4.1", "bos.rte.libc:7.1.4.0-7.1.4.1" ], "issued": "20161017", "updated": "20161111", "siblings": [ "6100-09:IV87794", "7100-03:IV88457", "7100-04:IV88007", "7200-00:IV88042" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar", "cvss": [ "CVE-2016-3053:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "Vulnerability in lsmcode affects AIX", "aparNo": "IV88042", "aparNoSet": [ "CVE-2016-3053", "IV88042" ], "fixedIn": "7200-00-03", "ifixes": [ "IV88042s2a.161110.epkg.Z", "IV88042s0a.160914.epkg.Z", "IV88042s2a.160819.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc", "filesets": [ "bos.rte.shell:7.2.0.0-7.2.0.1", "bos.rte.libc:7.2.0.0-7.2.0.1" ], "issued": "20161017", "updated": "20161111", "siblings": [ "6100-09:IV87794", "7100-03:IV88457", "7100-04:IV88007", "7200-00:IV88042" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar", "cvss": [ "CVE-2016-3053:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "Vulnerability in lquerylv in LVM impacts AIX", "aparNo": "IV88053", "aparNoSet": [ "CVE-2016-6079", "IV88053" ], "fixedIn": "7200-00-03", "ifixes": [ "IV88053s2a.160825.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc", "filesets": [ "bos.rte.lvm:7.2.0.0-7.2.0.1" ], "issued": "20161031", "updated": "null", "siblings": [ "5300-12:IV88658", "6100-09:IV87981", "7100-03:IV88419", "7100-04:IV87640", "7200-00:IV88053" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar", "cvss": [ "CVE-2016-6079:9.8" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "Malformed network packets can cause system crash", "aparNo": "IV88136", "aparNoSet": [ "IV88136" ], "fixedIn": "7200-01-03", "ifixes": [ "IV88136s2a.161215.AIX72TL00SP02.devices.ethernet.mlx.rte.epkg.Z", "IV88136s2b.161215.AIX72TL00SP02.devices.ethernet.lnc2.rte.epkg.Z", "IV88136s2c.161215.AIX72TL00SP02.devices.ethernet.shi.rte.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV88136", "filesets": [ "devices.ethernet.shi.rte:7.2.0.0-7.2.0.2", "Devices.ethernet.mlx.rte:7.2.0.0-7.2.0.2", "devices.ethernet.lnc2.rte:7.2.0.0-7.2.0.2" ], "issued": "20160816", "updated": "20170106", "siblings": [ "7100-03:IV88430", "7100-04:IV86787", "6100-09:IV85460" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv88136/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "Vulnerability in lquerylv in LVM impacts AIX", "aparNo": "IV88419", "aparNoSet": [ "CVE-2016-6079", "IV88419" ], "fixedIn": "7100-03-08", "ifixes": [ "IV88419s7a.160825.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc", "filesets": [ "bos.rte.lvm:7.1.3.0-7.1.3.47" ], "issued": "20161031", "updated": "null", "siblings": [ "5300-12:IV88658", "6100-09:IV87981", "7100-03:IV88419", "7100-04:IV87640", "7200-00:IV88053" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar", "cvss": [ "CVE-2016-6079:9.8" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "Malformed network packets can cause system crash ", "aparNo": "IV88430", "aparNoSet": [ "IV88430" ], "fixedIn": "7100-04-08", "ifixes": [ "IV88430s7a.170105.AIX71TL03SP07.devices.ethernet.lnc2.rte.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV88430", "filesets": [ "devices.ethernet.lnc2.rte:7.1.3.45-7.1.3.48" ], "issued": "20170106", "updated": "null", "siblings": [ "6100-09:IV85460", "7100-04:IV86787", "7200-00:IV88136" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv88430/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "Vulnerability in lsmcode affects AIX", "aparNo": "IV88457", "aparNoSet": [ "CVE-2016-3053", "IV88457" ], "fixedIn": "7100-03-08", "ifixes": [ "IV88457s5a.160912.epkg.Z", "IV88457s6a.160912.epkg.Z", "IV88457s7a.160822.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc", "filesets": [ "bos.rte.shell:7.1.3.0-7.1.3.47", "bos.rte.libc:7.1.3.0-7.1.3.47" ], "issued": "20161017", "updated": "null", "siblings": [ "6100-09:IV87794", "7100-03:IV88457", "7100-04:IV88007", "7200-00:IV88042" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar", "cvss": [ "CVE-2016-3053:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerability in lquerylv in LVM impacts AIX", "aparNo": "IV88658", "aparNoSet": [ "CVE-2016-6079", "IV88658" ], "fixedIn": "6100-09-08", "ifixes": [ "IV88658s9a.160825.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc", "filesets": [ "bos.rte.lvm:5.3.12.0-5.3.12.8" ], "issued": "20161031", "updated": "null", "siblings": [ "5300-12:IV88658", "6100-09:IV87981", "7100-03:IV88419", "7100-04:IV87640", "7200-00:IV88053" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar", "cvss": [ "CVE-2016-6079:9.8" ], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.20", "2.2.4.21", "2.2.4.22", "2.2.4.23" ], "apAbstract": "POTENTIAL DATA LOSS IN VIOS SSP WITH AN UN-INITIALIZED THICK LU", "aparNo": "IV89070", "aparNoSet": [ "IV89070" ], "fixedIn": "2.2.4.30", "ifixes": [ "IV89070s7a.161005.VIOS.2.2.4.20.epkg.Z", "IV89070s7a.161005.VIOS.2.2.4.21.epkg.Z", "IV89070s7b.161005.VIOS.2.2.4.22.epkg.Z", "IV89070s7b.161005.VIOS.2.2.4.23.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV89070", "filesets": [ "pool.basic.rte:6.1.9.101-6.1.9.103" ], "issued": "20161015", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv89070/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX", "aparNo": "IV89385", "aparNoSet": [ "CVE-2016-6038", "IV89385" ], "fixedIn": "7100-03-08", "ifixes": [ "IV89385s7a.160927.epkg.Z", "IV89385s7a.160927.epkg.Z", "IV89385s7a.160927.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory.asc", "filesets": [ "lwi.runtime:7.1.3.0-7.1.3.7" ], "issued": "20160922", "updated": "20160930", "siblings": [ "5300-12:IV89386", "6100-09:IV89418", "7100-03:IV89385" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar", "cvss": [ "CVE-2016-6038:6.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07", "7100-03-08" ], "apAbstract": "Vulnerability in pConsole impacts AIX", "aparNo": "IV89737", "aparNoSet": [ "CVE-2016-0266", "IV89737" ], "fixedIn": "7100-04-03", "ifixes": [], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc", "filesets": [ "sysmgt.pconsole.rte:7.1.3.0-7.1.3.99" ], "issued": "20161202", "updated": "null", "siblings": [ "6100-09:IV89739", "7100-04:IV89737" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar", "cvss": [ "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02" ], "apAbstract": "Vulnerability in pConsole impacts AIX", "aparNo": "IV89737", "aparNoSet": [ "CVE-2016-0266", "IV89737" ], "fixedIn": "7100-04-03", "ifixes": [ "IV89737s2a.161024.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc", "filesets": [ "sysmgt.pconsole.rte:7.1.4.0" ], "issued": "20161202", "updated": "null", "siblings": [ "6100-09:IV89739", "7100-04:IV89737" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar", "cvss": [ "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02" ], "apAbstract": "pConsole on AIX does not support TLS 1.2.", "aparNo": "IV89737", "aparNoSet": [ "CVE-2016-0266", "IV89737" ], "fixedIn": "7100-04-03", "ifixes": [ "IV89737s2a.161024.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc", "filesets": [ "sysmgt.pconsole.rte:7.1.4.0-7.1.4.0" ], "issued": "20161202", "updated": "null", "siblings": [ "6100-09:IV89739" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar", "cvss": [ "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07" ], "apAbstract": "Vulnerability in pConsole impacts AIX", "aparNo": "IV89739", "aparNoSet": [ "CVE-2016-0266", "IV89739" ], "fixedIn": "6100-09-08", "ifixes": [ "IV89739s7a.161024.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc", "filesets": [ "sysmgt.pconsole.rte:6.1.9.0-6.1.9.100" ], "issued": "20161202", "updated": "null", "siblings": [ "6100-09:IV89739", "7100-04:IV89737" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar", "cvss": [ "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-06", "6100-09-07" ], "apAbstract": "pConsole on AIX does not support TLS 1.2.", "aparNo": "IV89739", "aparNoSet": [ "CVE-2016-0266", "IV89739" ], "fixedIn": "6100-09-08", "ifixes": [ "IV89739s7a.161024.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc", "filesets": [ "sysmgt.pconsole.rte:6.1.9.0-6.1.9.100" ], "issued": "20161202", "updated": "null", "siblings": [ "7100-04:IV89737" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar", "cvss": [ "CVE-2016-0266:3.7" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07", "6100-09-08" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "IV89828", "aparNoSet": [ "CVE-2016-2775", "CVE-2016-2776", "IV89828" ], "fixedIn": "6100-09-09", "ifixes": [ "IV89828m5a.161017.epkg.Z", "IV89828m6a.161013.epkg.Z", "IV89828m7a.161013.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.200", "bos.net.tcp.server:6.1.9.0-6.1.9.200" ], "issued": "20161118", "updated": "null", "siblings": [ "5300-12:IV90056", "6100-09:IV89828", "7100-03:IV89830", "7100-04:IV89829", "7200-00:IV89831" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar", "cvss": [ "CVE-2016-2776:7.5", "CVE-2016-2775:7.5" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50", "2.2.3.60", "2.2.3.70", "2.2.3.80", "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.21", "2.2.4.22", "2.2.4.23", "2.2.4.30", "2.2.5.0", "2.2.5.10" ], "apAbstract": "Vulnerabilities in BIND impact VIOS", "aparNo": "IV89828", "aparNoSet": [ "CVE-2016-2775", "CVE-2016-2776", "IV89828" ], "fixedIn": "2.2.5.20", "ifixes": [ "IV89828m7a.161013.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.200", "bos.net.tcp.server:6.1.9.0-6.1.9.200" ], "issued": "20161118", "updated": "null", "siblings": [ "5300-12:IV90056", "6100-09:IV89828", "7100-03:IV89830", "7100-04:IV89829", "7200-00:IV89831" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar", "cvss": [ "CVE-2016-2776:7.5", "CVE-2016-2775:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "IV89829", "aparNoSet": [ "CVE-2016-2775", "CVE-2016-2776", "IV89829" ], "fixedIn": "7100-04-04", "ifixes": [ "IV89829m1a.161013.epkg.Z", "IV89829m2a.161010.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.30", "bos.net.tcp.server:7.1.4.0-7.1.4.30" ], "issued": "20161118", "updated": "null", "siblings": [ "5300-12:IV90056", "6100-09:IV89828", "7100-03:IV89830", "7100-04:IV89829", "7200-00:IV89831" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar", "cvss": [ "CVE-2016-2776:7.5", "CVE-2016-2775:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07", "7100-03-08" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "IV89830", "aparNoSet": [ "CVE-2016-2775", "CVE-2016-2776", "IV89830" ], "fixedIn": "7100-03-09", "ifixes": [ "IV89830m5a.161010.epkg.Z", "IV89830m6d.161012.epkg.Z", "IV89830m7a.161013.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.48", "bos.net.tcp.server:7.1.3.0-7.1.3.48" ], "issued": "20161118", "updated": "null", "siblings": [ "5300-12:IV90056", "6100-09:IV89828", "7100-03:IV89830", "7100-04:IV89829", "7200-00:IV89831" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar", "cvss": [ "CVE-2016-2776:7.5", "CVE-2016-2775:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "IV89831", "aparNoSet": [ "CVE-2016-2775", "CVE-2016-2776", "IV89831" ], "fixedIn": "7200-00-03", "ifixes": [ "IV89831m1a.161017.epkg.Z", "IV89831m2a.161018.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc", "filesets": [ "bos.net.tcp.bind:7.2.0.0", "bos.net.tcp.bind_utils:7.2.0.0-7.2.0.1" ], "issued": "20161118", "updated": "null", "siblings": [ "5300-12:IV90056", "6100-09:IV89828", "7100-03:IV89830", "7100-04:IV89829", "7200-00:IV89831" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar", "cvss": [ "CVE-2016-2776:7.5", "CVE-2016-2775:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-00", "5300-12-01", "5300-12-02", "5300-12-03", "5300-12-04", "5300-12-05", "5300-12-06", "5300-12-07", "5300-12-08", "5300-12-09" ], "apAbstract": "Vulnerabilities in BIND impact AIX", "aparNo": "IV90056", "aparNoSet": [ "CVE-2016-2775", "CVE-2016-2776", "IV90056" ], "fixedIn": "6100-09-09", "ifixes": [ "IV90056m9a.161020.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10", "bos.net.tcp.server:5.3.12.0-5.3.12.6" ], "issued": "20161118", "updated": "null", "siblings": [ "5300-12:IV90056", "6100-09:IV89828", "7100-03:IV89830", "7100-04:IV89829", "7200-00:IV89831" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar", "cvss": [ "CVE-2016-2776:7.5", "CVE-2016-2775:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00" ], "apAbstract": "There is a vulnerability in sysproc that impacts AIX.", "aparNo": "IV90234", "aparNoSet": [ "CVE-2016-8944", "IV90234" ], "fixedIn": "7200-01-02", "ifixes": [ "IV90234s0a.161212.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc", "filesets": [ "bos.mp64:7.2.1.0-7.2.1.0" ], "issued": "20170130", "updated": "null", "siblings": [ "7200-00:IV91456", "7100-03:IV91488", "7100-04:IV91487" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar", "cvss": [ "CVE-2016-8944:6.2" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-01", "7100-04-02", "7100-04-03", "7100-04-04" ], "apAbstract": "POWERHA NODE FAILURE DURING AIX UPDATE", "aparNo": "IV90451", "aparNoSet": [ "IV90451" ], "fixedIn": "7100-04-05", "ifixes": [ "IV90451m1a.161110.71TL4SP1.epkg.Z", "IV90451s0a.161108.71TL4SP2-4.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV90451", "filesets": [ "rsct.basic.rte:3.2.1.1-3.2.1.11" ], "issued": "20161111", "updated": "20170411", "siblings": [ "7200-00:IV90451", "7200-01:IV90485" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv90451/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02", "7200-00-03" ], "apAbstract": "POWERHA NODE FAILURE DURING AIX UPDATE", "aparNo": "IV90451", "aparNoSet": [ "IV90451" ], "fixedIn": "7200-00-04", "ifixes": [ "IV90451m1a.161110.72TL0SP1.epkg.Z", "IV90451s0a.161108.72TL0SP2-3.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV90451", "filesets": [ "rsct.basic.rte:3.2.1.0-3.2.1.11" ], "issued": "20161111", "updated": "null", "siblings": [ "7200-01:IV90485", "7100-04:IV90451" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv90451/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02" ], "apAbstract": "POWERHA NODE FAILURE DURING AIX UPDATE", "aparNo": "IV90485", "aparNoSet": [ "IV90485" ], "fixedIn": "7200-01-03", "ifixes": [ "IV90451m1a.161110.72TL0SP1.epkg.Z", "IV90451s0a.161108.72TL0SP2-4.epkg.Z", "IV90485s0a.161104.72TL1SP0-2.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV90485", "filesets": [ "rsct.basic.rte:3.2.2.0-3.2.2.0" ], "issued": "20161111", "updated": "20170411", "siblings": [ "7200-00:IV90451", "7100-04:IV90451" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv90485/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "Potential data loss using Virtual FC with num_cmd_elems greater than 256", "aparNo": "IV90915", "aparNoSet": [ "IV90915" ], "fixedIn": "7100-04-04", "ifixes": [ "IV90915s1a.161214.71TL04SP00-01.epkg.Z", "IV90915s2a.161205.71TL04SP02.epkg.Z", "IV90915s3a.161219.71TL04SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV90915", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.1.4.0-7.1.4.30" ], "issued": "20170202", "updated": "null", "siblings": [ "6100-09:IV91199", "7100-03:IV91042", "7200-00:IV92284", "7200-01:IV91511" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv90915/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-08" ], "apAbstract": "CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK\u003dYES", "aparNo": "IV91004", "aparNoSet": [ "IV91004" ], "fixedIn": "6100-09-09", "ifixes": [ "IV91004s8a.161125.AIX61TL09SP08.epkg.Z", "IV91004s8a.161125.61TL09SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91004", "filesets": [ "devices.vdevice.IBM.l-lan.rte:6.1.9.200" ], "issued": "20161206", "updated": "null", "siblings": [ "7200-01:IV91020", "7100-04:IV91019" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91004/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-06", "6100-09-07", "6100-09-08" ], "apAbstract": "Vulnerability in bellmail affects AIX", "aparNo": "IV91006", "aparNoSet": [ "CVE-2016-8972", "IV91006" ], "fixedIn": "6100-09-09", "ifixes": [ "IV91006s8a.161125.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.200" ], "issued": "20161215", "updated": "null", "siblings": [ "7100-03:IV91007", "7100-04:IV91008", "7200-00:IV91010", "7200-01:IV91011" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar", "cvss": [ "CVE-2016-8972:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2:: 2.2.3.3", "2.2.3.4", "2.2.3.50", "2.2.3.60", "2.2.3.70", "2.2.3.80", "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.21", "2.2.4.22", "2.2.4.23", "2.2.4.30", "2.2.5.0", "2.2.5.10" ], "apAbstract": "Vulnerability in bellmail affects VIOS", "aparNo": "IV91006", "aparNoSet": [ "CVE-2016-8972", "IV91006" ], "fixedIn": "2.2.5.20", "ifixes": [ "IV91006s8a.161125.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.200" ], "issued": "20161215", "updated": "null", "siblings": [ "7100-03:IV91007", "7100-04:IV91008", "7200-00:IV91010", "7200-01:IV91011" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar", "cvss": [ "CVE-2016-8972:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "Vulnerability in bellmail affects AIX", "aparNo": "IV91007", "aparNoSet": [ "CVE-2016-8972", "IV91007" ], "fixedIn": "7100-03-08", "ifixes": [ "IV91008s3a.161125.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.47" ], "issued": "20161215", "updated": "null", "siblings": [ "6100-09:IV91006", "7100-04:IV91008", "7200-00:IV91010", "7200-01:IV91011" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar", "cvss": [ "CVE-2016-8972:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "Vulnerability in bellmail affects AIX", "aparNo": "IV91008", "aparNoSet": [ "CVE-2016-8972", "IV91008" ], "fixedIn": "7100-04-04", "ifixes": [ "IV91008s3a.161125.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.30" ], "issued": "20161215", "updated": "null", "siblings": [ "6100-09:IV91006", "7100-03:IV91007", "7200-00:IV91010", "7200-01:IV91011" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar", "cvss": [ "CVE-2016-8972:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01" ], "apAbstract": "Vulnerability in bellmail affects AIX", "aparNo": "IV91010", "aparNoSet": [ "CVE-2016-8972", "IV91010" ], "fixedIn": "7200-00-02", "ifixes": [ "IV91010s2a.161125.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.0.0-7.2.0.1" ], "issued": "20161215", "updated": "null", "siblings": [ "6100-09:IV91006", "7100-03:IV91007", "7100-04:IV91008", "7200-00:IV91010", "7200-01:IV91011" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar", "cvss": [ "CVE-2016-8972:8.4" ], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "Vulnerability in bellmail affects AIX", "aparNo": "IV91011", "aparNoSet": [ "CVE-2016-8972", "IV91011" ], "fixedIn": "7200-01-02", "ifixes": [ "IV91011s1a.161125.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.1.0-7.2.1.0" ], "issued": "20161215", "updated": "null", "siblings": [ "6100-09:IV91006", "7100-03:IV91007", "7100-04:IV91008", "7200-00:IV91010" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar", "cvss": [ "CVE-2016-8972:8.4" ], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-03" ], "apAbstract": "CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK\u003dYES", "aparNo": "IV91019", "aparNoSet": [ "IV91019" ], "fixedIn": "7100-04-04", "ifixes": [ "IV91019s3a.161125.71TL04SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91019", "filesets": [ "devices.vdevice.IBM.l-lan.rte:7.1.4.30" ], "issued": "20161206", "updated": "null", "siblings": [ "7200-01:IV91020", "7100-04:IV91019", "6100-09:IV91004" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91019/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK\u003dYES", "aparNo": "IV91020", "aparNoSet": [ "IV91020" ], "fixedIn": "7200-01-02", "ifixes": [ "IV91020s0a.161125.72TL01SP00.epkg.Z", "IV91020s0a.161125.72TL01SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91020", "filesets": [ "devices.vdevice.IBM.l-lan.rte:7.2.1.0" ], "issued": "20161206", "updated": "null", "siblings": [ "6100-09:IV91004", "7100-04:IV91019" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91020/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-07", "7100-03-08" ], "apAbstract": "Potential data loss using Virtual FC with num_cmd_elems greater than 256", "aparNo": "IV91042", "aparNoSet": [ "IV91042" ], "fixedIn": "7100-03-09", "ifixes": [ "IV91042s7a.170125.71TL03SP07.epkg.Z", "IV91042s8a.170201.71TL03SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91042", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.1.3.46-7.1.3.47" ], "issued": "20170202", "updated": "null", "siblings": [ "6100-09:IV91199", "7100-04:IV90915", "7200-00:IV92284", "7200-01:IV91511" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91042/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-06", "6100-09-07", "6100-09-08" ], "apAbstract": "Potential data loss using Virtual FC with num_cmd_elems greater than 256", "aparNo": "IV91199", "aparNoSet": [ "IV91199" ], "fixedIn": "6100-09-09", "ifixes": [ "IV91199s8a.170120.61TL09SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91199", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:6.1.9.100-6.1.9.200" ], "issued": "20170202", "updated": "null", "siblings": [ "7100-03:IV91042", "7100-04:IV90915", "7200-00:IV92284", "7200-01:IV91511" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91199/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "There are two vulnerabilities in BIND that impact AIX.", "aparNo": "IV91214", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91214" ], "fixedIn": "7100-03-09", "ifixes": [ "IV91214m4b.161209.epkg.Z", "IV91214m5b.161209.epkg.Z", "IV91214m6a.161209.epkg.Z", "IV91214m7b.170202.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.48" ], "issued": "20161215", "updated": "20161229", "siblings": [ "7200-01:IV91257", "5300-12:IV91253", "7200-00:IV91256", "7100-04:IV91255", "6100-09:IV91254" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "There are two vulnerabilities in BIND that impact AIX.", "aparNo": "IV91253", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91253" ], "fixedIn": "See Advisory", "ifixes": [ "IV91253m9b.161209.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20161215", "updated": "20161229", "siblings": [ "7200-01:IV91257", "7200-00:IV91256", "7100-03:IV91214", "7100-04:IV91255", "6100-09:IV91254" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-06", "6100-09-07", "6100-09-08" ], "apAbstract": "There are two vulnerabilities in BIND that impact AIX.", "aparNo": "IV91254", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91254" ], "fixedIn": "6100-09-09", "ifixes": [ "IV91254m6b.161213.epkg.Z", "IV91254m7b.161209.epkg.Z", "IV91254m8b.161209.epkg.z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.200" ], "issued": "20161215", "updated": "20161229", "siblings": [ "7200-01:IV91257", "5300-12:IV91253", "7200-00:IV91256", "7100-03:IV91214", "7100-04:IV91255" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "There are two vulnerabilities in BIND that impact AIX.", "aparNo": "IV91255", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91255" ], "fixedIn": "7100-04-04", "ifixes": [ "IV91255m1b.161213.epkg.Z", "IV91255m2a.161213.epkg.Z", "IV91255m3c.161213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.30" ], "issued": "20161215", "updated": "20161229", "siblings": [ "7200-01:IV91257", "5300-12:IV91253", "7200-00:IV91256", "7100-03:IV91214", "6100-09:IV91254" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "There are two vulnerabilities in BIND that impact AIX.", "aparNo": "IV91256", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91256" ], "fixedIn": "7200-00-04", "ifixes": [ "IV91256m1b.161212.epkg.Z", "IV91256m2b.161209.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client_core:7.2.0.0-7.2.0.2" ], "issued": "20161215", "updated": "20161229", "siblings": [ "7200-01:IV91257", "5300-12:IV91253", "7100-03:IV91214", "7100-04:IV91255", "6100-09:IV91254" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "There are two vulnerabilities in BIND that impact AIX.", "aparNo": "IV91257", "aparNoSet": [ "CVE-2016-2848", "CVE-2016-8864", "IV91257" ], "fixedIn": "7200-01-02", "ifixes": [ "IV91257m0a.161212.epkg.Z", "IV91257m1a.161213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc", "filesets": [ "bos.net.tcp.client_core:7.2.1.0-7.2.1.0" ], "issued": "20161215", "updated": "20161229", "siblings": [ "5300-12:IV91253", "7200-00:IV91256", "7100-03:IV91214", "7100-04:IV91255", "6100-09:IV91254" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar", "cvss": [ "CVE-2016-8864:7.5", "CVE-2016-2848:7.5" ], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.1", "2.2.3.2", "2.2.3.3", "2.2.3.4", "2.2.3.50", "2.2.3.51", "2.2.3.52", "2.2.3.60", "2.2.3.70", "2.2.3.80" ], "apAbstract": "possible data corruption after LPM failure", "aparNo": "IV91339", "aparNoSet": [ "IV91339" ], "fixedIn": "2.2.3.90", "ifixes": [ "IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z", "IV91339s7b.170112.VIOS2.2.3.70.epkg.Z", "IV91339s8b.170118.VIOS2.2.5.10.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91339", "filesets": [ "devices.vdevice.IBM.v-scsi-host.rte:6.1.9.0-6.1.9.48" ], "issued": "20161207", "updated": "20170119", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91339/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.21", "2.2.4.22", "2.2.4.23", "2.2.4.30" ], "apAbstract": "possible data corruption after LPM failure", "aparNo": "IV91339", "aparNoSet": [ "IV91339" ], "fixedIn": "2.2.4.40", "ifixes": [ "IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z", "IV91339s7b.170112.VIOS2.2.3.70.epkg.Z", "IV91339s8b.170118.VIOS2.2.5.10.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91339", "filesets": [ "devices.vdevice.IBM.v-scsi-host.rte:6.1.9.100-6.1.9.102" ], "issued": "20161207", "updated": "20170119", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91339/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.0", "2.2.5.10" ], "apAbstract": "possible data corruption after LPM failure ", "aparNo": "IV91339", "aparNoSet": [ "IV91339" ], "fixedIn": "2.2.5.20", "ifixes": [ "IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z", "IV91339s7b.170112.VIOS2.2.3.70.epkg.Z", "IV91339s8b.170118.VIOS2.2.5.10.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91339", "filesets": [ "devices.vdevice.IBM.v-scsi-host.rte:6.1.9.200" ], "issued": "20161207", "updated": "20170119", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91339/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-03" ], "apAbstract": "getsockname() returns incorrect NameLength", "aparNo": "IV91431", "aparNoSet": [ "IV91431" ], "fixedIn": "7100-04-04", "ifixes": [ "IV91431s3a.161209.71TL04SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91431", "filesets": [ "bos.mp64:7.1.4.30" ], "issued": "20161209", "updated": "null", "siblings": [ "7200-00:IV91432" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91431/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "getsockname() returns incorrect NameLength", "aparNo": "IV91432", "aparNoSet": [ "IV91432" ], "fixedIn": "7200-01-02", "ifixes": [ "IV91432s1a.161209.72TL01SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91432", "filesets": [ "bos.mp64:7.2.1.0-7.2.1.1" ], "issued": "20161209", "updated": "null", "siblings": [ "7100-04:IV91431" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91432/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "There is a vulnerability in sysproc that impacts AIX.", "aparNo": "IV91456", "aparNoSet": [ "CVE-2016-8944", "IV91456" ], "fixedIn": "7200-00-04", "ifixes": [ "IV91456s0a.161212.epkg.Z", "IV91456s1a.161212.epkg.Z", "IV91456s2a.161212.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc", "filesets": [ "bos.mp64:7.2.0.0-7.2.0.1" ], "issued": "20170130", "updated": "null", "siblings": [ "7200-01:IV90234", "7100-03:IV91488", "7100-04:IV91487" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar", "cvss": [ "CVE-2016-8944:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "There is a vulnerability in sysproc that impacts AIX.", "aparNo": "IV91487", "aparNoSet": [ "CVE-2016-8944", "IV91487" ], "fixedIn": "7100-04-04", "ifixes": [ "IV91487s1a.161212.epkg.Z", "IV91487s2a.161213.epkg.Z", "IV91487s3a.161213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc", "filesets": [ "bos.mp64:7.1.4.0-7.1.4.30" ], "issued": "20170130", "updated": "null", "siblings": [ "7200-01:IV90234", "7200-00:IV91456", "7100-03:IV91488" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar", "cvss": [ "CVE-2016-8944:6.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "There is a vulnerability in sysproc that impacts AIX.", "aparNo": "IV91488", "aparNoSet": [ "CVE-2016-8944", "IV91488" ], "fixedIn": "7100-03-09", "ifixes": [ "IV91488s5a.161212.epkg.Z", "IV91488s6a.161212.epkg.Z", "IV91488s7a.161213.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc", "filesets": [ "bos.mp64:7.1.3.0-7.1.3.48" ], "issued": "20170130", "updated": "null", "siblings": [ "7200-01:IV90234", "7200-00:IV91456", "7100-04:IV91487" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar", "cvss": [ "CVE-2016-8944:6.2" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "Potential data loss using Virtual FC with num_cmd_elems greater than 256", "aparNo": "IV91511", "aparNoSet": [ "IV91511" ], "fixedIn": "7200-01-02", "ifixes": [ "IV91511s1a.161214.72TL01SP00-01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91511", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.2.1.0-7.2.1.0" ], "issued": "20170202", "updated": "null", "siblings": [ "6100-09:IV91199", "7100-03:IV91042", "7100-04:IV90915", "7200-00:IV92284" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91511/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-06", "6100-09-06", "6100-09-07", "6100-09-08" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV91803", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV91803" ], "fixedIn": "6100-09-09", "ifixes": [ "IV91803m6a.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.200" ], "issued": "20170213", "updated": "20170217", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-06", "6100-09-07", "6100-09-08" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV91803", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV91803" ], "fixedIn": "6100-09-09", "ifixes": [ "IV91803m6a.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.200" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "Possible data loss with CAPI adapter after EEH", "aparNo": "IV91922", "aparNoSet": [ "IV91922" ], "fixedIn": "7200-01-02", "ifixes": [ "IV91922s1a.170202.72TL01SP00-01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91922", "filesets": [ "devices.capi.1410f0041410f004.com:7.2.1.0" ], "issued": "20170210", "updated": "null", "siblings": [ "7200-00:IV92666" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91922/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV91951", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV91951" ], "fixedIn": "7100-04-04", "ifixes": [ "IV91951m3a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.30" ], "issued": "20170213", "updated": "20170217", "siblings": [ "7200-00:IV92192", "7100-03:IV92193", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV91951", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV91951" ], "fixedIn": "7100-04-04", "ifixes": [ "IV91951m3a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.30" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92067", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92067" ], "fixedIn": "7200-01-02", "ifixes": [ "IV92067s1a.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "bos.net.tcp.ntpd:7.2.1.0-7.2.1.0" ], "issued": "20170213", "updated": "20170217", "siblings": [ "7100-04:IV91951", "6100-09:IV91803", "5300-12:IV92194" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07", "7100-03-08" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92126", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92126" ], "fixedIn": "7100-03-09", "ifixes": [ "IV92126m3a.170106.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:7.1.0.0-7.1.0.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-00-00", "7100-00-01", "7100-00-02", "7100-00-03", "7100-00-04", "7100-00-05", "7100-00-06", "7100-00-07", "7100-00-08", "7100-00-09", "7100-00-10" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92126", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92126" ], "fixedIn": "7100-04-04", "ifixes": [], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:7.1.0.0-7.1.0.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "See Bulletin", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-01-00", "7100-01-01", "7100-01-02", "7100-01-03", "7100-01-04", "7100-01-05", "7100-01-06", "7100-01-07", "7100-01-08", "7100-01-09", "7100-01-10" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92126", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92126" ], "fixedIn": "7100-04-04", "ifixes": [], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:7.1.0.0-7.1.0.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "See Bulletin", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-02-00", "7100-02-01", "7100-02-02", "7100-02-03", "7100-02-04", "7100-02-05", "7100-02-06", "7100-02-07" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92126", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92126" ], "fixedIn": "7100-04-04", "ifixes": [], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:7.1.0.0-7.1.0.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "See Bulletin", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92126", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92126" ], "fixedIn": "7100-04-04", "ifixes": [ "IV92126m3a.170106.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:7.1.0.0-7.1.0.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-01", "7200-00-02" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92126", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92126" ], "fixedIn": "7200-00-04", "ifixes": [ "IV92126m3a.170106.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:7.1.0.0-7.1.0.7" ], "issued": "20170213", "updated": "20170217", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92126", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92126" ], "fixedIn": "7200-01-02", "ifixes": [ "IV92126m3a.170106.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:7.1.0.0-7.1.0.7" ], "issued": "20170213", "updated": "20170217", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92192", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92192" ], "fixedIn": "7200-00-04", "ifixes": [ "IV92192m2a.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "bos.net.tcp.ntp:7.2.0.0-7.2.0.2", "bos.net.tcp.ntpd:7.2.0.0-7.2.0.2" ], "issued": "20170213", "updated": "20170217", "siblings": [ "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-05", "7100-03-06", "7100-03-07", "7100-03-08" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92193", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92193" ], "fixedIn": "7100-03-09", "ifixes": [ "IV92193m5a.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.48" ], "issued": "20170213", "updated": "20170217", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92194", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92194" ], "fixedIn": "See Bulletin", "ifixes": [ "IV92194m9a.170113.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20170213", "updated": "20170217", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "There is a vulnerability in bellmail that impacts AIX.", "aparNo": "IV92240", "aparNoSet": [ "CVE-2017-1093", "IV92240" ], "fixedIn": "7100-04-04", "ifixes": [ "IV92240m3a.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.30" ], "issued": "20170129", "updated": "null", "siblings": [ "7200-01:IV92242", "7200-00:IV92241", "7100-03:IV92250" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar", "cvss": [ "CVE-2017-1093:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02" ], "apAbstract": "There is a vulnerability in bellmail that impacts AIX.", "aparNo": "IV92241", "aparNoSet": [ "CVE-2017-1093", "IV92241" ], "fixedIn": "7200-00-04", "ifixes": [ "IV92241m2a.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc", "filesets": [ "bos.net.tcp.client_core:7.2.0.0-7.2.0.2" ], "issued": "20170129", "updated": "null", "siblings": [ "7200-01:IV92242", "7100-03:IV92250", "7100-04:IV92240" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar", "cvss": [ "CVE-2017-1093:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "There is a vulnerability in bellmail that impacts AIX.", "aparNo": "IV92242", "aparNoSet": [ "CVE-2017-1093", "IV92242" ], "fixedIn": "7200-01-02", "ifixes": [ "IV92242m1a.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc", "filesets": [ "bos.net.tcp.client_core:7.2.1.0" ], "issued": "20170129", "updated": "null", "siblings": [ "7200-00:IV92241", "7100-03:IV92250", "7100-04:IV92240" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar", "cvss": [ "CVE-2017-1093:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-05", "7100-03-06", "7100-03-07" ], "apAbstract": "There is a vulnerability in bellmail that impacts AIX.", "aparNo": "IV92250", "aparNoSet": [ "CVE-2017-1093", "IV92250" ], "fixedIn": "7100-03-09", "ifixes": [ "IV92250m71.170112.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.48" ], "issued": "20170129", "updated": "null", "siblings": [ "7200-01:IV92242", "7200-00:IV92241", "7100-04:IV92240" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar", "cvss": [ "CVE-2017-1093:8.4" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02", "7200-00-03" ], "apAbstract": "Potential data loss using Virtual FC with num_cmd_elems greater than 256", "aparNo": "IV92284", "aparNoSet": [ "IV92284" ], "fixedIn": "7200-00-04", "ifixes": [ "IV92284s2a.170116.72TL00SP00-02.epkg.Z", "IV92284s3a.170116.72TL00SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV92284", "filesets": [ "devices.vdevice.IBM.vfc-client.rte:7.2.0.0-7.2.0.1" ], "issued": "20170202", "updated": "null", "siblings": [ "6100-09:IV91199", "7100-03:IV91042", "7100-04:IV90915", "7200-01:IV91511" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv92284/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-00-00", "6100-00-01", "6100-00-02", "6100-00-03", "6100-00-04", "6100-00-05", "6100-00-06", "6100-00-07", "6100-00-08", "6100-00-09", "6100-00-10", "6100-00-11" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92287", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92287" ], "fixedIn": "6100-09-09", "ifixes": [ "IV92287m5a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-01-00", "6100-01-01", "6100-01-02", "6100-01-03", "6100-01-04", "6100-01-05", "6100-01-06", "6100-01-07", "6100-01-08", "6100-01-09" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92287", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92287" ], "fixedIn": "6100-09-09", "ifixes": [ "IV92287m5a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-02-00", "6100-02-01", "6100-02-02", "6100-02-03", "6100-02-04", "6100-02-05", "6100-02-06", "6100-02-07", "6100-02-08", "6100-02-09", "6100-02-10" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92287", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92287" ], "fixedIn": "6100-09-09", "ifixes": [ "IV92287m5a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-03-00", "6100-03-01", "6100-03-02", "6100-03-03", "6100-03-04", "6100-03-05", "6100-03-06", "6100-03-07", "6100-03-08", "6100-03-09", "6100-03-10" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92287", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92287" ], "fixedIn": "6100-09-09", "ifixes": [ "IV92287m5a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-04-00", "6100-04-01", "6100-04-02", "6100-04-03", "6100-04-04", "6100-04-05", "6100-04-06", "6100-04-07", "6100-04-08", "6100-04-09", "6100-04-10", "6100-04-11" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92287", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92287" ], "fixedIn": "6100-09-09", "ifixes": [ "IV92287m5a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-05-00", "6100-05-01", "6100-05-02", "6100-05-03", "6100-05-04", "6100-05-05", "6100-05-06", "6100-05-07", "6100-05-08", "6100-05-09" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92287", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92287" ], "fixedIn": "6100-09-09", "ifixes": [ "IV92287m5a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10", "6100-06-11", "6100-06-12" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92287", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92287" ], "fixedIn": "6100-09-09", "ifixes": [ "IV92287m5a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-07-00", "6100-07-01", "6100-07-02", "6100-07-03", "6100-07-04", "6100-07-05", "6100-07-06", "6100-07-07", "6100-07-08", "6100-07-09", "6100-07-10" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92287", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92287" ], "fixedIn": "6100-09-09", "ifixes": [ "IV92287m5a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-08-00", "6100-08-01", "6100-08-02", "6100-08-03", "6100-08-04", "6100-08-05", "6100-08-06", "6100-08-07" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92287", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92287" ], "fixedIn": "6100-09-09", "ifixes": [ "IV92287m5a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07", "6100-09-08", "6100-09-09" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV92287", "aparNoSet": [ "CVE-2016-7427", "CVE-2016-7428", "CVE-2016-9310", "CVE-2016-9311", "IV92287" ], "fixedIn": "6100-09-09", "ifixes": [ "IV92287m5a.170113.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.7" ], "issued": "20170213", "updated": "null", "siblings": [ "7200-00:IV92192", "7100-04:IV91951", "6100-09:IV91803" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar", "cvss": [ "CVE-2016-7427:4", "CVE-2016-7428:4.3", "CVE-2016-9310:6.5", "CVE-2016-9311:4.4" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02", "7200-00-03" ], "apAbstract": "Possible data loss with CAPI adapter after EEH", "aparNo": "IV92666", "aparNoSet": [ "IV92666" ], "fixedIn": "7200-00-04", "ifixes": [ "IV92666s2a.170201.72TL00SP02.epkg.Z", "IV92666s3a.170202.72TL00SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV92666", "filesets": [ "devices.capi.1410f0041410f004.com:7.2.0.0-7.2.0.3" ], "issued": "20170210", "updated": "null", "siblings": [ "7200-01:IV91922" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv92666/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02" ], "apAbstract": "CRASH OR POTENTIAL DATA LOSS AFTER REMOVING LARGE JFS2 FILES ON AIX 7.2.1", "aparNo": "IV93320", "aparNoSet": [ "IV93320" ], "fixedIn": "7200-01-03", "ifixes": [ "IV93320s0c.170411.72TL01SP00.epkg.Z", "IV93320s1e.170411.72TL01SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93320", "filesets": [ "bos.mp64:7.2.1.0-7.2.1.3" ], "issued": "20170413", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93320/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-06", "6100-09-07", "6100-09-08" ], "apAbstract": "There is a vulnerability in BIND that impacts AIX.", "aparNo": "IV93361", "aparNoSet": [ "CVE-2016-9131", "IV93361" ], "fixedIn": "6100-09-09", "ifixes": [ "IV93361m8a.170215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.200" ], "issued": "20170307", "updated": "null", "siblings": [ "7200-01:IV93365", "5300-12:IV93366", "7200-00:IV93403", "7100-03:IV93362", "7100-04:IV93363" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar", "cvss": [ "CVE-2016-9131:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-06", "7100-03-07", "7100-03-08" ], "apAbstract": "There is a vulnerability in BIND that impacts AIX.", "aparNo": "IV93362", "aparNoSet": [ "CVE-2016-9131", "IV93362" ], "fixedIn": "7100-03-09", "ifixes": [ "IV93362m8a.170215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.48" ], "issued": "20170307", "updated": "null", "siblings": [ "7200-01:IV93365", "5300-12:IV93366", "7200-00:IV93403", "7100-04:IV93363", "6100-09:IV93361" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar", "cvss": [ "CVE-2016-9131:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-01", "7100-04-02", "7100-04-03" ], "apAbstract": "There is a vulnerability in BIND that impacts AIX.", "aparNo": "IV93363", "aparNoSet": [ "CVE-2016-9131", "IV93363" ], "fixedIn": "7100-04-04", "ifixes": [ "IV93363m3a.170215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.30" ], "issued": "20170307", "updated": "null", "siblings": [ "7200-01:IV93365", "5300-12:IV93366", "7200-00:IV93403", "7100-03:IV93362", "6100-09:IV93361" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar", "cvss": [ "CVE-2016-9131:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "There is a vulnerability in BIND that impacts AIX.", "aparNo": "IV93365", "aparNoSet": [ "CVE-2016-9131", "IV93365" ], "fixedIn": "7200-01-02", "ifixes": [ "IV93365m1a.170215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc", "filesets": [ "bos.net.tcp.bind_utils:7.2.1.0-7.2.1.1" ], "issued": "20170307", "updated": "null", "siblings": [ "5300-12:IV93366", "7200-00:IV93403", "7100-03:IV93362", "7100-04:IV93363", "6100-09:IV93361" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar", "cvss": [ "CVE-2016-9131:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "There is a vulnerability in BIND that impacts AIX.", "aparNo": "IV93366", "aparNoSet": [ "CVE-2016-9131", "IV93366" ], "fixedIn": "See Advisory", "ifixes": [ "IV93366m9a.170215.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20170307", "updated": "null", "siblings": [ "7200-01:IV93365", "7200-00:IV93403", "7100-03:IV93362", "7100-04:IV93363", "6100-09:IV93361" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar", "cvss": [ "CVE-2016-9131:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-01", "7200-00-02", "7200-00-03" ], "apAbstract": "There is a vulnerability in BIND that impacts AIX.", "aparNo": "IV93403", "aparNoSet": [ "CVE-2016-9131", "IV93403" ], "fixedIn": "7200-00-04", "ifixes": [ "IV93403m3a.170215.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc", "filesets": [ "bos.net.tcp.client_core:7.2.0.0-7.2.0.3" ], "issued": "20170307", "updated": "null", "siblings": [ "7200-01:IV93365", "5300-12:IV93366", "7100-03:IV93362", "7100-04:IV93363", "6100-09:IV93361" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar", "cvss": [ "CVE-2016-9131:7.5" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-08" ], "apAbstract": "PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST", "aparNo": "IV93840", "aparNoSet": [ "IV93840" ], "fixedIn": "6100-09-09", "ifixes": [ "IV93840s1a.170301.61TL09SP08epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93840", "filesets": [ "bos.mp64:6.1.9.200-6.1.9.200" ], "issued": "20170303", "updated": "20170323", "siblings": [ "7100-03:IV93884", "7100-04:IV93845", "7200-00:IV93883", "7200-01:IV93885" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93840/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-03" ], "apAbstract": "PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST", "aparNo": "IV93845", "aparNoSet": [ "IV93845" ], "fixedIn": "7100-04-04", "ifixes": [ "IV93845s3a.170302.71TL04SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93845", "filesets": [ "bos.mp64:7.1.4.30-7.1.4.31" ], "issued": "20170303", "updated": "20170323", "siblings": [ "6100-09:IV93840", "7100-03:IV93884", "7200-00:IV93883", "7200-01:IV93885" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93845/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-03" ], "apAbstract": "PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST", "aparNo": "IV93883", "aparNoSet": [ "IV93883" ], "fixedIn": "7200-00-04", "ifixes": [ "IV93883s3.170302.72TL00SP03.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93883", "filesets": [ "bos.mp64:7.2.0.3-7.2.0.3" ], "issued": "20170303", "updated": "20170323", "siblings": [ "6100-09:IV93840", "7100-03:IV93884", "7100-04:IV93845", "7200-01:IV93885" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93883/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-08" ], "apAbstract": "PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST", "aparNo": "IV93884", "aparNoSet": [ "IV93884" ], "fixedIn": "7100-03-09", "ifixes": [ "IV93884s8a.170302.71TL03SP08.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93884", "filesets": [ "bos.mp64:7.1.3.49" ], "issued": "20170303", "updated": "20170323", "siblings": [ "6100-09:IV93840", "7100-04:IV93845", "7200-00:IV93883", "7200-01:IV93885" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93884/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01" ], "apAbstract": "PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST", "aparNo": "IV93885", "aparNoSet": [ "IV93885" ], "fixedIn": "7200-01-02", "ifixes": [ "IV93885s1.170302.72TL01SP01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93885", "filesets": [ "bos.mp64:7.2.1.0-7.2.1.2" ], "issued": "20170303", "updated": "20170323", "siblings": [ "6100-09:IV93840", "7100-03:IV93884", "7100-04:IV93845", "7200-00:IV93883" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93885/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.30", "2.2.4.40" ], "apAbstract": "VIOS update and rulescfgset can save/deploy incorrect settings ", "aparNo": "IV94438", "aparNoSet": [ "IV94438" ], "fixedIn": "2.2.4.50", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV94438", "filesets": [ "ios.artex_profile.rte:6.1.9.0-6.1.9.202" ], "issued": "20170513", "updated": "null", "siblings": [], "downloadUrl": "null", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.0", "2.2.5.10", "2.2.5.20" ], "apAbstract": "VIOS update and rulescfgset can save/deploy incorrect settings ", "aparNo": "IV94438", "aparNoSet": [ "IV94438" ], "fixedIn": "2.2.5.30", "ifixes": [], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV94438", "filesets": [ "ios.artex_profile.rte:6.1.9.0-6.1.9.202" ], "issued": "20170513", "updated": "null", "siblings": [], "downloadUrl": "null", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IV94723", "aparNoSet": [ "CVE-2016-7922", "CVE-2016-7923", "CVE-2016-7924", "CVE-2016-7925", "CVE-2016-7926", "CVE-2016-7927", "CVE-2016-7928", "CVE-2016-7930", "CVE-2016-7931", "CVE-2016-7932", "CVE-2016-7933", "CVE-2016-7934", "CVE-2016-7935", "CVE-2016-7936", "CVE-2016-7937", "CVE-2016-7939", "CVE-2016-7940", "CVE-2016-7973", "CVE-2016-7974", "CVE-2016-7975", "CVE-2016-7983", "CVE-2016-7984", "CVE-2016-7992", "CVE-2016-7993", "CVE-2016-8574", "CVE-2016-8575", "CVE-2017-5202", "CVE-2017-5203", "CVE-2017-5204", "CVE-2017-5482", "CVE-2017-5483", "CVE-2017-5484", "CVE-2017-5485", "CVE-2017-5486", "IV94723" ], "fixedIn": "7200-01-04", "ifixes": [ "IV94723s2a.170414.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.1.0-7.2.1.0" ], "issued": "20170525", "updated": "null", "siblings": [ "5300-12:IV94729", "7200-00:IV94724", "7100-03:IV94727", "7100-04:IV94726", "6100-09:IV94728" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar", "cvss": [ "CVE-2016-7922:7.3", "CVE-2016-7923:7.3", "CVE-2016-7924:7.3", "CVE-2016-7925:7.3", "CVE-2016-7926:7.3", "CVE-2016-7927:7.3", "CVE-2016-7928:7.3", "CVE-2016-7930:7.3", "CVE-2016-7931:7.3", "CVE-2016-7932:7.3", "CVE-2016-7933:7.3", "CVE-2016-7934:7.3", "CVE-2016-7935:7.3", "CVE-2016-7936:7.3", "CVE-2016-7937:7.3", "CVE-2016-7939:7.3", "CVE-2016-7940:7.3", "CVE-2016-7973:7.3", "CVE-2016-7974:7.3", "CVE-2016-7975:7.3", "CVE-2016-7983:7.3", "CVE-2016-7984:7.3", "CVE-2016-7992:7.3", "CVE-2016-7993:7.3", "CVE-2016-8574:7.3", "CVE-2016-8575:7.3", "CVE-2017-5202:7.3", "CVE-2017-5203:7.3", "CVE-2017-5204:7.3", "CVE-2017-5482:7.3", "CVE-2017-5483:7.3", "CVE-2017-5484:7.3", "CVE-2017-5485:7.3", "CVE-2017-5486:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-01", "7200-00-02", "7200-00-03" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IV94724", "aparNoSet": [ "CVE-2016-7922", "CVE-2016-7923", "CVE-2016-7924", "CVE-2016-7925", "CVE-2016-7926", "CVE-2016-7927", "CVE-2016-7928", "CVE-2016-7930", "CVE-2016-7931", "CVE-2016-7932", "CVE-2016-7933", "CVE-2016-7934", "CVE-2016-7935", "CVE-2016-7936", "CVE-2016-7937", "CVE-2016-7939", "CVE-2016-7940", "CVE-2016-7973", "CVE-2016-7974", "CVE-2016-7975", "CVE-2016-7983", "CVE-2016-7984", "CVE-2016-7992", "CVE-2016-7993", "CVE-2016-8574", "CVE-2016-8575", "CVE-2017-5202", "CVE-2017-5203", "CVE-2017-5204", "CVE-2017-5482", "CVE-2017-5483", "CVE-2017-5484", "CVE-2017-5485", "CVE-2017-5486", "IV94724" ], "fixedIn": "7200-00-04", "ifixes": [ "IV94724s4b.170417.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc", "filesets": [ "bos.net.tcp.tcpdump:7.2.0.0-7.2.0.2" ], "issued": "20170525", "updated": "null", "siblings": [ "7200-01:IV94723", "5300-12:IV94729", "7100-03:IV94727", "7100-04:IV94726", "6100-09:IV94728" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar", "cvss": [ "CVE-2016-7922:7.3", "CVE-2016-7923:7.3", "CVE-2016-7924:7.3", "CVE-2016-7925:7.3", "CVE-2016-7926:7.3", "CVE-2016-7927:7.3", "CVE-2016-7928:7.3", "CVE-2016-7930:7.3", "CVE-2016-7931:7.3", "CVE-2016-7932:7.3", "CVE-2016-7933:7.3", "CVE-2016-7934:7.3", "CVE-2016-7935:7.3", "CVE-2016-7936:7.3", "CVE-2016-7937:7.3", "CVE-2016-7939:7.3", "CVE-2016-7940:7.3", "CVE-2016-7973:7.3", "CVE-2016-7974:7.3", "CVE-2016-7975:7.3", "CVE-2016-7983:7.3", "CVE-2016-7984:7.3", "CVE-2016-7992:7.3", "CVE-2016-7993:7.3", "CVE-2016-8574:7.3", "CVE-2016-8575:7.3", "CVE-2017-5202:7.3", "CVE-2017-5203:7.3", "CVE-2017-5204:7.3", "CVE-2017-5482:7.3", "CVE-2017-5483:7.3", "CVE-2017-5484:7.3", "CVE-2017-5485:7.3", "CVE-2017-5486:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-02", "7100-04-03", "7100-04-04" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IV94726", "aparNoSet": [ "CVE-2016-7922", "CVE-2016-7923", "CVE-2016-7924", "CVE-2016-7925", "CVE-2016-7926", "CVE-2016-7927", "CVE-2016-7928", "CVE-2016-7930", "CVE-2016-7931", "CVE-2016-7932", "CVE-2016-7933", "CVE-2016-7934", "CVE-2016-7935", "CVE-2016-7936", "CVE-2016-7937", "CVE-2016-7939", "CVE-2016-7940", "CVE-2016-7973", "CVE-2016-7974", "CVE-2016-7975", "CVE-2016-7983", "CVE-2016-7984", "CVE-2016-7992", "CVE-2016-7993", "CVE-2016-8574", "CVE-2016-8575", "CVE-2017-5202", "CVE-2017-5203", "CVE-2017-5204", "CVE-2017-5482", "CVE-2017-5483", "CVE-2017-5484", "CVE-2017-5485", "CVE-2017-5486", "IV94726" ], "fixedIn": "7100-04-05", "ifixes": [ "IV94726s4c.170417.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc", "filesets": [ "bos.net.tcp.server:7.1.4.0-7.1.4.31" ], "issued": "20170525", "updated": "null", "siblings": [ "7200-01:IV94723", "5300-12:IV94729", "7200-00:IV94724", "7100-03:IV94727", "6100-09:IV94728" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar", "cvss": [ "CVE-2016-7922:7.3", "CVE-2016-7923:7.3", "CVE-2016-7924:7.3", "CVE-2016-7925:7.3", "CVE-2016-7926:7.3", "CVE-2016-7927:7.3", "CVE-2016-7928:7.3", "CVE-2016-7930:7.3", "CVE-2016-7931:7.3", "CVE-2016-7932:7.3", "CVE-2016-7933:7.3", "CVE-2016-7934:7.3", "CVE-2016-7935:7.3", "CVE-2016-7936:7.3", "CVE-2016-7937:7.3", "CVE-2016-7939:7.3", "CVE-2016-7940:7.3", "CVE-2016-7973:7.3", "CVE-2016-7974:7.3", "CVE-2016-7975:7.3", "CVE-2016-7983:7.3", "CVE-2016-7984:7.3", "CVE-2016-7992:7.3", "CVE-2016-7993:7.3", "CVE-2016-8574:7.3", "CVE-2016-8575:7.3", "CVE-2017-5202:7.3", "CVE-2017-5203:7.3", "CVE-2017-5204:7.3", "CVE-2017-5482:7.3", "CVE-2017-5483:7.3", "CVE-2017-5484:7.3", "CVE-2017-5485:7.3", "CVE-2017-5486:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-07", "7100-03-08", "7100-03-09" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IV94727", "aparNoSet": [ "CVE-2016-7922", "CVE-2016-7923", "CVE-2016-7924", "CVE-2016-7925", "CVE-2016-7926", "CVE-2016-7927", "CVE-2016-7928", "CVE-2016-7930", "CVE-2016-7931", "CVE-2016-7932", "CVE-2016-7933", "CVE-2016-7934", "CVE-2016-7935", "CVE-2016-7936", "CVE-2016-7937", "CVE-2016-7939", "CVE-2016-7940", "CVE-2016-7973", "CVE-2016-7974", "CVE-2016-7975", "CVE-2016-7983", "CVE-2016-7984", "CVE-2016-7992", "CVE-2016-7993", "CVE-2016-8574", "CVE-2016-8575", "CVE-2017-5202", "CVE-2017-5203", "CVE-2017-5204", "CVE-2017-5482", "CVE-2017-5483", "CVE-2017-5484", "CVE-2017-5485", "CVE-2017-5486", "IV94727" ], "fixedIn": "7100-03-10", "ifixes": [ "IV94727s9b.170417.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc", "filesets": [ "bos.net.tcp.server:7.1.3.0-7.1.3.49" ], "issued": "20170525", "updated": "null", "siblings": [ "7200-01:IV94723", "5300-12:IV94729", "7200-00:IV94724", "7100-04:IV94726", "6100-09:IV94728" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar", "cvss": [ "CVE-2016-7922:7.3", "CVE-2016-7923:7.3", "CVE-2016-7924:7.3", "CVE-2016-7925:7.3", "CVE-2016-7926:7.3", "CVE-2016-7927:7.3", "CVE-2016-7928:7.3", "CVE-2016-7930:7.3", "CVE-2016-7931:7.3", "CVE-2016-7932:7.3", "CVE-2016-7933:7.3", "CVE-2016-7934:7.3", "CVE-2016-7935:7.3", "CVE-2016-7936:7.3", "CVE-2016-7937:7.3", "CVE-2016-7939:7.3", "CVE-2016-7940:7.3", "CVE-2016-7973:7.3", "CVE-2016-7974:7.3", "CVE-2016-7975:7.3", "CVE-2016-7983:7.3", "CVE-2016-7984:7.3", "CVE-2016-7992:7.3", "CVE-2016-7993:7.3", "CVE-2016-8574:7.3", "CVE-2016-8575:7.3", "CVE-2017-5202:7.3", "CVE-2017-5203:7.3", "CVE-2017-5204:7.3", "CVE-2017-5482:7.3", "CVE-2017-5483:7.3", "CVE-2017-5484:7.3", "CVE-2017-5485:7.3", "CVE-2017-5486:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-07", "6100-09-08", "6100-09-09" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IV94728", "aparNoSet": [ "CVE-2016-7922", "CVE-2016-7923", "CVE-2016-7924", "CVE-2016-7925", "CVE-2016-7926", "CVE-2016-7927", "CVE-2016-7928", "CVE-2016-7930", "CVE-2016-7931", "CVE-2016-7932", "CVE-2016-7933", "CVE-2016-7934", "CVE-2016-7935", "CVE-2016-7936", "CVE-2016-7937", "CVE-2016-7939", "CVE-2016-7940", "CVE-2016-7973", "CVE-2016-7974", "CVE-2016-7975", "CVE-2016-7983", "CVE-2016-7984", "CVE-2016-7992", "CVE-2016-7993", "CVE-2016-8574", "CVE-2016-8575", "CVE-2017-5202", "CVE-2017-5203", "CVE-2017-5204", "CVE-2017-5482", "CVE-2017-5483", "CVE-2017-5484", "CVE-2017-5485", "CVE-2017-5486", "IV94728" ], "fixedIn": "6100-09", "ifixes": [ "IV94728s9c.170420.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc", "filesets": [ "bos.net.tcp.server:6.1.9.0-6.1.9.201" ], "issued": "20170525", "updated": "null", "siblings": [ "7200-01:IV94723", "5300-12:IV94729", "7200-00:IV94724", "7100-03:IV94727", "7100-04:IV94726" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar", "cvss": [ "CVE-2016-7922:7.3", "CVE-2016-7923:7.3", "CVE-2016-7924:7.3", "CVE-2016-7925:7.3", "CVE-2016-7926:7.3", "CVE-2016-7927:7.3", "CVE-2016-7928:7.3", "CVE-2016-7930:7.3", "CVE-2016-7931:7.3", "CVE-2016-7932:7.3", "CVE-2016-7933:7.3", "CVE-2016-7934:7.3", "CVE-2016-7935:7.3", "CVE-2016-7936:7.3", "CVE-2016-7937:7.3", "CVE-2016-7939:7.3", "CVE-2016-7940:7.3", "CVE-2016-7973:7.3", "CVE-2016-7974:7.3", "CVE-2016-7975:7.3", "CVE-2016-7983:7.3", "CVE-2016-7984:7.3", "CVE-2016-7992:7.3", "CVE-2016-7993:7.3", "CVE-2016-8574:7.3", "CVE-2016-8575:7.3", "CVE-2017-5202:7.3", "CVE-2017-5203:7.3", "CVE-2017-5204:7.3", "CVE-2017-5482:7.3", "CVE-2017-5483:7.3", "CVE-2017-5484:7.3", "CVE-2017-5485:7.3", "CVE-2017-5486:7.3" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.", "aparNo": "IV94729", "aparNoSet": [ "CVE-2016-7922", "CVE-2016-7923", "CVE-2016-7924", "CVE-2016-7925", "CVE-2016-7926", "CVE-2016-7927", "CVE-2016-7928", "CVE-2016-7930", "CVE-2016-7931", "CVE-2016-7932", "CVE-2016-7933", "CVE-2016-7934", "CVE-2016-7935", "CVE-2016-7936", "CVE-2016-7937", "CVE-2016-7939", "CVE-2016-7940", "CVE-2016-7973", "CVE-2016-7974", "CVE-2016-7975", "CVE-2016-7983", "CVE-2016-7984", "CVE-2016-7992", "CVE-2016-7993", "CVE-2016-8574", "CVE-2016-8575", "CVE-2017-5202", "CVE-2017-5203", "CVE-2017-5204", "CVE-2017-5482", "CVE-2017-5483", "CVE-2017-5484", "CVE-2017-5485", "CVE-2017-5486", "IV94729" ], "fixedIn": "5300-12", "ifixes": [ "IV94729s9b.170425.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc", "filesets": [ "bos.net.tcp.server:5.3.12.0-5.3.12.6" ], "issued": "20170525", "updated": "null", "siblings": [ "7200-01:IV94723", "7200-00:IV94724", "7100-03:IV94727", "7100-04:IV94726", "6100-09:IV94728" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar", "cvss": [ "CVE-2016-7922:7.3", "CVE-2016-7923:7.3", "CVE-2016-7924:7.3", "CVE-2016-7925:7.3", "CVE-2016-7926:7.3", "CVE-2016-7927:7.3", "CVE-2016-7928:7.3", "CVE-2016-7930:7.3", "CVE-2016-7931:7.3", "CVE-2016-7932:7.3", "CVE-2016-7933:7.3", "CVE-2016-7934:7.3", "CVE-2016-7935:7.3", "CVE-2016-7936:7.3", "CVE-2016-7937:7.3", "CVE-2016-7939:7.3", "CVE-2016-7940:7.3", "CVE-2016-7973:7.3", "CVE-2016-7974:7.3", "CVE-2016-7975:7.3", "CVE-2016-7983:7.3", "CVE-2016-7984:7.3", "CVE-2016-7992:7.3", "CVE-2016-7993:7.3", "CVE-2016-8574:7.3", "CVE-2016-8575:7.3", "CVE-2017-5202:7.3", "CVE-2017-5203:7.3", "CVE-2017-5204:7.3", "CVE-2017-5482:7.3", "CVE-2017-5483:7.3", "CVE-2017-5484:7.3", "CVE-2017-5485:7.3", "CVE-2017-5486:7.3" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03", "7100-04-04" ], "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES", "aparNo": "IV95012", "aparNoSet": [ "IV95012" ], "fixedIn": "7100-04-05", "ifixes": [ "IV95012s1a.170511.71TL04SP00.epkg.Z", "IV95012s3a.170414.71TL04SP03.epkg.Z", "IV95012s4a.170526.71TL04SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95012", "filesets": [ "bos.mp64:7.1.4.0-7.1.4.32" ], "issued": "20170602", "updated": "null", "siblings": [ "6100-09:IV95102", "7100-03:IV95111", "7200-00:IV95858", "7200-01:IV95590" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95012/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.30", "2.2.4.40" ], "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES", "aparNo": "IV95102", "aparNoSet": [ "IV95102" ], "fixedIn": "2.2.4.50", "ifixes": [ "IV95102s5a.61TL09SP05.170526.epkg.Z", "IV95102s5a.VIOS2.2.3.90.170526.epkg.Z", "IV95102s9a.61TL09SP09.170526.epkg.Z", "IV95102s9a.VIOS2.2.4.40.170526.epkg.Z", "IV95102s9a.VIOS2.2.5.20.170526.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95102", "filesets": [ "bos.mp64:6.1.9.100-6.1.9.201" ], "issued": "20170602", "updated": "null", "siblings": [ "6100-09:IV95102", "7100-03:IV95111", "7100-04:IV95012", "7200-00:IV95858", "7200-01:IV95590" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95102/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.0", "2.2.5.10", "2.2.5.20" ], "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES", "aparNo": "IV95102", "aparNoSet": [ "IV95102" ], "fixedIn": "2.2.5.30", "ifixes": [ "IV95102s5a.61TL09SP05.170526.epkg.Z", "IV95102s5a.VIOS2.2.3.90.170526.epkg.Z", "IV95102s9a.61TL09SP09.170526.epkg.Z", "IV95102s9a.VIOS2.2.4.40.170526.epkg.Z", "IV95102s9a.VIOS2.2.5.20.170526.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95102", "filesets": [ "bos.mp64:6.1.9.200-6.1.9.201" ], "issued": "20170602", "updated": "null", "siblings": [ "6100-09:IV95102", "7100-03:IV95111", "7100-04:IV95012", "7200-00:IV95858", "7200-01:IV95590" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95102/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07", "6100-09-08", "6100-09-09" ], "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES", "aparNo": "IV95102", "aparNoSet": [ "IV95102" ], "fixedIn": "6100-09-10", "ifixes": [ "IV95102s5a.61TL09SP05.170526.epkg.Z", "IV95102s9a.61TL09SP09.170526.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95102", "filesets": [ "bos.mp64:6.1.9.15-6.1.9.201" ], "issued": "20170602", "updated": "null", "siblings": [ "7100-03:IV95111", "7100-04:IV95012", "7200-00:IV95858", "7200-01:IV95590" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95102/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.3", "2.2.3.13", "2.2.3.23", "2.2.3.33", "2.2.3.43", "2.2.3.53", "2.2.3.63", "2.2.3.73", "2.2.3.83", "2.2.3.84", "2.2.3.85", "2.2.3.86", "2.2.3.87", "2.2.3.88", "2.2.3.89", "2.2.3.90" ], "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES", "aparNo": "IV95102", "aparNoSet": [ "IV95102" ], "fixedIn": "null", "ifixes": [ "IV95102s5a.61TL09SP05.170526.epkg.Z", "IV95102s5a.VIOS2.2.3.90.170526.epkg.Z", "IV95102s9a.61TL09SP09.170526.epkg.Z", "IV95102s9a.VIOS2.2.4.40.170526.epkg.Z", "IV95102s9a.VIOS2.2.5.20.170526.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95102", "filesets": [ "bos.mp64:6.1.9.15-6.1.9.201" ], "issued": "20170602", "updated": "null", "siblings": [ "6100-09:IV95102", "n/a:IV95111", "7100-04:IV95012", "7200-00:IV95858", "7200-01:IV95590" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95102/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07", "7100-03-08", "7100-03-09" ], "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES", "aparNo": "IV95111", "aparNoSet": [ "IV95111" ], "fixedIn": "null", "ifixes": [ "IV95111s9a.170526.71TL03SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95111", "filesets": [ "bos.mp64:7.1.3.15-7.1.3.50" ], "issued": "20170602", "updated": "null", "siblings": [ "6100-09:IV95102", "7100-04:IV95012", "7200-00:IV95858", "7200-01:IV95590" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95111/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.40" ], "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS", "aparNo": "IV95372", "aparNoSet": [ "IV95372" ], "fixedIn": "2.2.4.50", "ifixes": [ "IV95372s9a.170427.epkg.Z", "IV95372s9a.AIX61TL09SP09.170427.epkg.Z", "IV95372s9a.VIOS2.2.3.90.170427.epkg.Z", "IV95372s9a.VIOS2.2.4.40.170427.epkg.Z", "IV95372s9a.VIOS2.2.5.20.170427.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95372", "filesets": [ "devices.ethernet.lnc.rte:6.1.9.201" ], "issued": "20170516", "updated": "null", "siblings": [ "7100-03:IV95638", "7100-04:IV95637" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95372/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.20" ], "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS", "aparNo": "IV95372", "aparNoSet": [ "IV95372" ], "fixedIn": "2.2.5.30", "ifixes": [ "IV95372s9a.170427.epkg.Z", "IV95372s9a.AIX61TL09SP09.170427.epkg.Z", "IV95372s9a.VIOS2.2.3.90.170427.epkg.Z", "IV95372s9a.VIOS2.2.4.40.170427.epkg.Z", "IV95372s9a.VIOS2.2.5.20.170427.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95372", "filesets": [ "devices.ethernet.lnc.rte:6.1.9.201" ], "issued": "20170516", "updated": "null", "siblings": [ "7100-03:IV95638", "7100-04:IV95637" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95372/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-09" ], "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS", "aparNo": "IV95372", "aparNoSet": [ "IV95372" ], "fixedIn": "6100-09-10", "ifixes": [ "IV95372s9a.AIX61TL09SP09.170427.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95372", "filesets": [ "devices.ethernet.lnc.rte:6.1.9.201-6.1.9.201" ], "issued": "20170516", "updated": "null", "siblings": [ "7100-03:IV95638", "7100-04:IV95637" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95372/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.90" ], "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS", "aparNo": "IV95372", "aparNoSet": [ "IV95372" ], "fixedIn": "null", "ifixes": [ "IV95372s9a.170427.epkg.Z", "IV95372s9a.AIX61TL09SP09.170427.epkg.Z", "IV95372s9a.VIOS2.2.3.90.170427.epkg.Z", "IV95372s9a.VIOS2.2.4.40.170427.epkg.Z", "IV95372s9a.VIOS2.2.5.20.170427.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95372", "filesets": [ "devices.ethernet.lnc.rte:6.1.9.201" ], "issued": "20170516", "updated": "null", "siblings": [ "7100-03:IV95638", "7100-04:IV95637" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95372/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-04" ], "apAbstract": " VLAN tagged largesend packets are dropped for some adapters ", "aparNo": "IV95372", "aparNoSet": [ "IV95372" ], "fixedIn": "7100-04-05", "ifixes": [ "IV95637s4a.170509.71TL04SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95637", "filesets": [ "devices.ethernet.lnc.rte:7.1.4.31" ], "issued": "20170516", "updated": "null", "siblings": [ "6100-09:IV95372", "7100-03:IV95638" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95637/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02" ], "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES", "aparNo": "IV95590", "aparNoSet": [ "IV95590" ], "fixedIn": "7200-01-03", "ifixes": [ "IV95590s2b.170525.72TL01SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95590", "filesets": [ "bos.mp64:7.2.1.0-7.2.1.3" ], "issued": "20170602", "updated": "null", "siblings": [ "6100-09:IV95102", "7100-03:IV95111", "7100-04:IV95012", "7200-00:IV95858" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95590/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-04" ], "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS", "aparNo": "IV95637", "aparNoSet": [ "IV95637" ], "fixedIn": "7100-04-05", "ifixes": [ "IV95637s4a.170509.71TL04SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95637", "filesets": [ "devices.ethernet.lnc.rte:7.1.4.31" ], "issued": "20170516", "updated": "null", "siblings": [ "6100-09:IV95372", "7100-03:IV95638" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95637/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-09" ], "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS", "aparNo": "IV95638", "aparNoSet": [ "IV95638" ], "fixedIn": "7100-03-10", "ifixes": [ "IV95638s9a.170510.71TL03SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95638", "filesets": [ "devices.ethernet.lnc.rte:7.1.3.49", "devices.ethernet.mlx.rte:7.1.3.49" ], "issued": "20170516", "updated": "null", "siblings": [ "6100-09:IV95372", "7100-04:IV95637" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95638/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02", "7200-00-03", "7200-00-04" ], "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES", "aparNo": "IV95858", "aparNoSet": [ "IV95858" ], "fixedIn": "7200-00-05", "ifixes": [ "IV95858s4b.170525.72TL00SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95858", "filesets": [ "bos.mp64:7.2.0.0-7.2.0.4" ], "issued": "20170602", "updated": "null", "siblings": [ "6100-09:IV95102", "7100-03:IV95111", "7100-04:IV95012", "7200-01:IV95590" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95858/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV96305", "aparNoSet": [ "CVE-2017-6451", "CVE-2017-6458", "CVE-2017-6462", "CVE-2017-6464", "IV96305" ], "fixedIn": "See Bulletin", "ifixes": [ "IV96305m9a.170518.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20170706", "updated": "20171113", "siblings": [ "7200-01:IV96310", "7200-00:IV96309", "7100-03:IV96307", "7100-04:IV96308", "6100-09:IV96306" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar", "cvss": [ "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2", "CVE-2017-6451:1.8", "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.20", "2.2.4.21", "2.2.4.22", "2.2.4.23" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact VIOS", "aparNo": "IV96306", "aparNoSet": [ "CVE-2017-6451", "CVE-2017-6458", "CVE-2017-6462", "CVE-2017-6464", "IV96306" ], "fixedIn": "6100-09-10", "ifixes": [ "IV96306m9a.170519.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.200" ], "issued": "20170707", "updated": "null", "siblings": [ "5300-03::IV96305", "7100-03::IV96307", "7100-04::IV96308", "7200-00::IV96309", "7200-01::IV96310" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar", "cvss": [ "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2", "CVE-2017-6451:1.8", "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-07", "7100-03-08", "7100-03-09" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX", "aparNo": "IV96307", "aparNoSet": [ "CVE-2017-6451", "CVE-2017-6458", "CVE-2017-6462", "CVE-2017-6464", "IV96307" ], "fixedIn": "See Bulletin", "ifixes": [ "IV96307m9a.170518.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.49" ], "issued": "20170707", "updated": "20171113", "siblings": [ "5300-03::IV96305", "6100-09::IV96306", "7100-04::IV96308", "7200-00::IV96309", "7200-01::IV96310" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar", "cvss": [ "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2", "CVE-2017-6451:1.8", "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-02", "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX", "aparNo": "IV96308", "aparNoSet": [ "CVE-2017-6451", "CVE-2017-6458", "CVE-2017-6462", "CVE-2017-6464", "IV96308" ], "fixedIn": "7100-04-06", "ifixes": [ "IV96308m4a.170518.epkg.Z", "IV96308m4b.171107.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.31" ], "issued": "20170707", "updated": "20171113", "siblings": [ "5300-03::IV96305", "6100-09::IV96306", "7100-03::IV96307", "7200-00::IV96309", "7200-01::IV96310" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar", "cvss": [ "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2", "CVE-2017-6451:1.8", "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-02", "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV96309", "aparNoSet": [ "CVE-2017-6451", "CVE-2017-6458", "CVE-2017-6462", "CVE-2017-6464", "IV96309" ], "fixedIn": "7200-00-06", "ifixes": [ "IV96309m4a.170518.epkg.Z", "IV96312m5a.170518.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc", "filesets": [ "bos.net.tcp.ntp:7.2.0.0-7.2.0.2", "bos.net.tcp.ntpd:7.2.0.0-7.2.0.3" ], "issued": "20170706", "updated": "20171113", "siblings": [ "7200-01:IV96310", "5300-12:IV96305", "7100-03:IV96307", "7100-04:IV96308", "6100-09:IV96306" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar", "cvss": [ "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2", "CVE-2017-6451:1.8", "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.", "aparNo": "IV96310", "aparNoSet": [ "CVE-2017-6451", "CVE-2017-6458", "CVE-2017-6462", "CVE-2017-6464", "IV96310" ], "fixedIn": "7200-01-04", "ifixes": [ "IV96310m2a.170519.epkg.Z", "IV96312m5a.170518.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc", "filesets": [ "bos.net.tcp.ntp:7.2.1.0-7.2.1.0", "bos.net.tcp.ntpd:7.2.1.0-7.2.1.1" ], "issued": "20170706", "updated": "20171113", "siblings": [ "5300-12:IV96305", "7200-00:IV96309", "7100-03:IV96307", "7100-04:IV96308", "6100-09:IV96306" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar", "cvss": [ "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2", "CVE-2017-6451:1.8", "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "NTPv4" ], "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX", "aparNo": "IV96311", "aparNoSet": [ "CVE-2017-6451", "CVE-2017-6458", "CVE-2017-6462", "CVE-2017-6464", "IV96311", "IV96312" ], "fixedIn": "See Advisory", "ifixes": [ "IV96311m5a.170518.epkg.Z", "IV96312m5a.170518.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc", "filesets": [ "ntp.rte:6.1.6.0-6.1.6.9", "ntp.rte:7.1.0.0-7.1.0.9" ], "issued": "20170707", "updated": "null", "siblings": [ "6100-09:IV96311", "7100-03:IV96312", "7100-04:IV96312", "7200-00:IV96312", "7200-01:IV96312" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar", "cvss": [ "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2", "CVE-2017-6451:1.8", "CVE-2017-6458:4.2", "CVE-2017-6462:1.6", "CVE-2017-6464:4.2" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-04" ], "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP", "aparNo": "IV96345", "aparNoSet": [ "IV96345" ], "fixedIn": "7100-04-05", "ifixes": [ "IV96345s4b.170525.71TL04SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96345", "filesets": [ "bos.rte.libc:7.1.4.31" ], "issued": "20170527", "updated": "null", "siblings": [ "6100-10:IV96351", "7100-03:IV96352", "7200-00:IV96347", "7200-01:IV96348" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96345/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-04" ], "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP", "aparNo": "IV96347", "aparNoSet": [ "IV96347" ], "fixedIn": "7200-00-05", "ifixes": [ "IV96347s4a.170525.72TL00SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96347", "filesets": [ "bos.rte.libc:7.2.0.3-7.2.0.3" ], "issued": "20170527", "updated": "null", "siblings": [ "6100-10:IV96351", "7100-03:IV96352", "7100-04:IV96345", "7200-01:IV96348" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96347/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-02" ], "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP", "aparNo": "IV96348", "aparNoSet": [ "IV96348" ], "fixedIn": "7200-01-03", "ifixes": [ "IV96348s2b.170525.72TL01SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96348", "filesets": [ "bos.rte.libc:7.2.1.1-7.2.1.1" ], "issued": "20170527", "updated": "null", "siblings": [ "6100-10:IV96351", "7100-03:IV96352", "7100-04:IV96345", "7200-00:IV96347" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96348/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.40" ], "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP", "aparNo": "IV96351", "aparNoSet": [ "IV96351" ], "fixedIn": "2.2.4.50", "ifixes": [ "IV96351s9d.170525.61TL09SP09.epkg.Z", "IV96351s9d.170525.VIOS2.2.3.90.epkg.Z", "IV96351s9d.170525.VIOS2.2.4.40.epkg.Z", "IV96351s9d.170525.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96351", "filesets": [ "bos.rte.libc:6.1.9.201" ], "issued": "20170527", "updated": "null", "siblings": [ "6100-09:IV96351", "7100-04:IV96345", "7200-00:IV96347", "7200-01:IV96348" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96351/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.20" ], "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP", "aparNo": "IV96351", "aparNoSet": [ "IV96351" ], "fixedIn": "2.2.5.30", "ifixes": [ "IV96351s9d.170525.61TL09SP09.epkg.Z", "IV96351s9d.170525.VIOS2.2.3.90.epkg.Z", "IV96351s9d.170525.VIOS2.2.4.40.epkg.Z", "IV96351s9d.170525.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96351", "filesets": [ "bos.rte.libc:6.1.9.201" ], "issued": "20170527", "updated": "null", "siblings": [ "6100-09:IV96351", "7100-04:IV96345", "7200-00:IV96347", "7200-01:IV96348" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96351/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-09" ], "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP", "aparNo": "IV96351", "aparNoSet": [ "IV96351" ], "fixedIn": "6100-09-10", "ifixes": [ "IV96351s9d.170525.61TL09SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96351", "filesets": [ "bos.rte.libc:6.1.9.201" ], "issued": "20170527", "updated": "null", "siblings": [ "7100-03:IV96352", "7100-04:IV96345", "7200-00:IV96347", "7200-01:IV96348" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96351/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.90" ], "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP", "aparNo": "IV96351", "aparNoSet": [ "IV96351" ], "fixedIn": "null", "ifixes": [ "IV96351s9d.170525.61TL09SP09.epkg.Z", "IV96351s9d.170525.VIOS2.2.3.90.epkg.Z", "IV96351s9d.170525.VIOS2.2.4.40.epkg.Z", "IV96351s9d.170525.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96351", "filesets": [ "bos.rte.libc:6.1.9.201" ], "issued": "20170527", "updated": "null", "siblings": [ "6100-09:IV96351", "7100-04:IV96345", "7200-00:IV96347", "7200-01:IV96348" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96351/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-09" ], "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP", "aparNo": "IV96352", "aparNoSet": [ "IV96352" ], "fixedIn": "null", "ifixes": [ "iv96352s9b.170524.71TL03SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96352", "filesets": [ "bos.rte.libc:7.1.3.49" ], "issued": "20170527", "updated": "null", "siblings": [ "6100-10:IV96351", "7100-04:IV96345", "7200-00:IV96347", "7200-01:IV96348" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96352/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS", "aparNo": "IV96360", "aparNoSet": [ "IV96360" ], "fixedIn": "7200-01-04", "ifixes": [ "IV96360s3a.171227.72TL01SP03.epkg.Z", "IV97423m0a.180328.72TL01SP00-01.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96360", "filesets": [ "devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.2" ], "issued": "20180331", "updated": "null", "siblings": [ "6100-09:IJ00360", "7100-04:IJ00519", "7100-05:IJ01304", "7200-02:IJ01262" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96360/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.30", "2.2.4.40" ], "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS", "aparNo": "IV96553", "aparNoSet": [ "IV96553" ], "fixedIn": "2.2.4.50", "ifixes": [ "IV96553s9a.170704.61TL09SP09.epkg.Z", "IV96553s9a.170704.VIOS2.2.3.90.epkg.Z", "IV96553s9a.170704.VIOS2.2.4.40.epkg.Z", "IV96553s9a.170704.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96553", "filesets": [ "devices.fcp.disk.rte:6.1.9.100-6.1.9.201", "devices.pci.77102224.com:6.1.9.100-6.1.9.201", "devices.pci.df1000f7.com:6.1.9.100-6.1.9.201", "devices.pciex.df1060e214103404.com:6.1.9.100-6.1.9.201" ], "issued": "20170715", "updated": "null", "siblings": [ "7100-04:IV96603", "7200-00:IV96606", "7200-01:IV96604" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96553/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.0", "2.2.5.10", "2.2.5.20" ], "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS", "aparNo": "IV96553", "aparNoSet": [ "IV96553" ], "fixedIn": "2.2.5.30", "ifixes": [ "IV96553s9a.170704.61TL09SP09.epkg.Z", "IV96553s9a.170704.VIOS2.2.3.90.epkg.Z", "IV96553s9a.170704.VIOS2.2.4.40.epkg.Z", "IV96553s9a.170704.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96553", "filesets": [ "devices.fcp.disk.rte:6.1.9.200-6.1.9.201", "devices.pci.77102224.com:6.1.9.200-6.1.9.201", "devices.pci.df1000f7.com:6.1.9.200-6.1.9.201", "devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.201" ], "issued": "20170715", "updated": "20170721", "siblings": [ "7100-04:IV96603", "7200-00:IV96606", "7200-01:IV96604" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96553/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-00", "6100-09-01", "6100-09-02", "6100-09-03", "6100-09-04", "6100-09-05", "6100-09-06", "6100-09-07", "6100-09-08", "6100-09-09" ], "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS", "aparNo": "IV96553", "aparNoSet": [ "IV96553" ], "fixedIn": "6100-09-10", "ifixes": [ "IV96553s9a.170704.61TL09SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96553", "filesets": [ "devices.fcp.disk.rte:6.1.9.0-6.1.9.201", "devices.pci.77102224.com:6.1.9.0-6.1.9.201", "devices.pci.df1000f7.com:6.1.9.0-6.1.9.201", "devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201" ], "issued": "20170715", "updated": "20170721", "siblings": [ "7100-04:IV96603", "7200-00:IV96606", "7200-01:IV96604" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96553/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.10", "2.2.3.20", "2.2.3.30", "2.2.3.40", "2.2.3.50", "2.2.3.60", "2.2.3.70", "2.2.3.80", "2.2.3.90" ], "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS", "aparNo": "IV96553", "aparNoSet": [ "IV96553" ], "fixedIn": "See Advisory", "ifixes": [ "IV96553s9a.170704.61TL09SP09.epkg.Z", "IV96553s9a.170704.VIOS2.2.3.90.epkg.Z", "IV96553s9a.170704.VIOS2.2.4.40.epkg.Z", "IV96553s9a.170704.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96553", "filesets": [ "devices.fcp.disk.rte:6.1.9.0-6.1.9.201", "devices.pci.77102224.com:6.1.9.0-6.1.9.201", "devices.pci.df1000f7.com:6.1.9.0-6.1.9.201", "devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201" ], "issued": "20170715", "updated": "null", "siblings": [ "6100-09:IV96553", "7100-04:IV96603", "7200-00:IV96606", "7200-01:IV96604" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96553/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.0", "2.2.3.10", "2.2.3.20", "2.2.3.30", "2.2.3.40", "2.2.3.50", "2.2.3.60", "2.2.3.70", "2.2.3.80", "2.2.3.90" ], "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS", "aparNo": "IV96553", "aparNoSet": [ "IV96553" ], "fixedIn": "See Advisory", "ifixes": [ "IV96553s9a.170704.61TL09SP09.epkg.Z", "IV96553s9a.170704.VIOS2.2.3.90.epkg.Z", "IV96553s9a.170704.VIOS2.2.4.40.epkg.Z", "IV96553s9a.170704.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96553", "filesets": [ "devices.fcp.disk.rte:6.1.9.0-6.1.9.201", "devices.pci.77102224.com:6.1.9.0-6.1.9.201", "devices.pci.df1000f7.com:6.1.9.0-6.1.9.201", "devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201" ], "issued": "20170721", "updated": "20170721", "siblings": [ "6100-09:IV96553", "7100-03:IV97772", "7100-04:IV96603", "7200-00:IV96606", "7200-01:IV96604" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96553/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-00", "7100-04-01", "7100-04-02", "7100-04-03", "7100-04-04" ], "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS", "aparNo": "IV96603", "aparNoSet": [ "IV96603" ], "fixedIn": "7100-04-05", "ifixes": [ "IV96603s4a.170704.71TL04SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96603", "filesets": [ "devices.fcp.disk.rte:7.1.4.0-7.1.4.31", "devices.pci.77102224.com:7.1.4.0-7.1.4.31", "devices.pci.df1000f7.com:7.1.4.0-7.1.4.31", "devices.pciex.df1060e214103404.com:7.1.4.0-7.1.4.31" ], "issued": "20170715", "updated": "20170721", "siblings": [ "6100-09:IV96553", "7200-00:IV96606", "7200-01:IV96604" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96603/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02" ], "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS", "aparNo": "IV96604", "aparNoSet": [ "IV96604" ], "fixedIn": "7200-01-03", "ifixes": [ "IV96604s2a.170705.72TL01SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96604", "filesets": [ "devices.fcp.disk.rte:7.2.1.0-7.2.1.1", "devices.pci.77102224.com:7.2.1.0-7.2.1.1", "devices.pci.df1000f7.com:7.2.1.0-7.2.1.1", "devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.1" ], "issued": "20170715", "updated": "20170721", "siblings": [ "6100-09:IV96553", "7100-04:IV96603", "7100-03:IV97772", "7200-00:IV96606" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96604/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-00-00", "7200-00-01", "7200-00-02", "7200-00-03", "7200-00-04" ], "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS", "aparNo": "IV96606", "aparNoSet": [ "IV96606" ], "fixedIn": "7200-00-05", "ifixes": [ "IV96606s4a.170713.72TL00SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96606", "filesets": [ "devices.fcp.disk.rte:7.2.0.0-7.2.0.3", "devices.pci.77102224.com:7.2.0.0-7.2.0.3", "devices.pci.df1000f7.com:7.2.0.0-7.2.0.3", "devices.pciex.df1060e214103404.com:7.2.0.0-7.2.0.3" ], "issued": "20170715", "updated": "20170721", "siblings": [ "6100-09:IV96553", "7100-04:IV96603", "7100-03:IV97772", "7200-01:IV96604" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96606/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.40" ], "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER", "aparNo": "IV97135", "aparNoSet": [ "IV97135" ], "fixedIn": "2.2.4.50", "ifixes": [ "IV97135s9a.170714.61TL09SP09.epkg.Z", "IV97135s9a.170714.VIOS2.2.3.90.epkg.Z", "IV97135s9a.170714.VIOS2.2.4.40.epkg.Z", "IV97135s9a.170714.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97135", "filesets": [ "devices.common.IBM.ethernet.rte:6.1.9.201" ], "issued": "20170718", "updated": "null", "siblings": [ "6100-09:IV97135", "7100-03:IV97772", "7100-04:IV97586", "7200-01:IV97588" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97135/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.20" ], "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER", "aparNo": "IV97135", "aparNoSet": [ "IV97135" ], "fixedIn": "2.2.5.30", "ifixes": [ "IV97135s9a.170714.61TL09SP09.epkg.Z", "IV97135s9a.170714.VIOS2.2.3.90.epkg.Z", "IV97135s9a.170714.VIOS2.2.4.40.epkg.Z", "IV97135s9a.170714.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97135", "filesets": [ "devices.common.IBM.ethernet.rte:6.1.9.201" ], "issued": "20170718", "updated": "null", "siblings": [ "6100-09:IV97135", "7100-03:IV97772", "7100-04:IV97586", "7200-01:IV97588" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97135/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-09" ], "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER", "aparNo": "IV97135", "aparNoSet": [ "IV97135" ], "fixedIn": "6100-09-10", "ifixes": [ "IV97135s9a.170714.61TL09SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97135", "filesets": [ "devices.common.IBM.ethernet.rte:6.1.9.201" ], "issued": "20170718", "updated": "null", "siblings": [ "7100-04:IV97586", "7200-01:IV97588" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97135/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.90" ], "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER", "aparNo": "IV97135", "aparNoSet": [ "IV97135" ], "fixedIn": "See Advisory", "ifixes": [ "IV97135s9a.170714.61TL09SP09.epkg.Z", "IV97135s9a.170714.VIOS2.2.3.90.epkg.Z", "IV97135s9a.170714.VIOS2.2.4.40.epkg.Z", "IV97135s9a.170714.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97135", "filesets": [ "devices.common.IBM.ethernet.rte:6.1.9.201" ], "issued": "20170718", "updated": "null", "siblings": [ "6100-09:IV97135", "7100-03:IV97772", "7100-04:IV97586", "7200-01:IV97588" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97135/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.30", "2.2.4.40" ], "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER", "aparNo": "IV97148", "aparNoSet": [ "IV97148" ], "fixedIn": "2.2.4.50", "ifixes": [ "IV97148s8a.170613.61TL09SP08.epkg.Z", "IV97148s8a.170613.epkg.Z", "IV97148s9b.171030.61TL09SP09.epkg.Z", "IV97148s9b.171030.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97148", "filesets": [ "bos.cluster.rte:6.1.9.200-6.1.9.201" ], "issued": "20171108", "updated": "null", "siblings": [ "6100-09:IV97148", "7100-04:IV97265", "7200-01:IV97266" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97148/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.0", "2.2.5.10", "2.2.5.20" ], "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER", "aparNo": "IV97148", "aparNoSet": [ "IV97148" ], "fixedIn": "2.2.5.30", "ifixes": [ "IV97148s8a.170613.61TL09SP08.epkg.Z", "IV97148s8a.170613.epkg.Z", "IV97148s9b.171030.61TL09SP09.epkg.Z", "IV97148s9b.171030.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97148", "filesets": [ "bos.cluster.rte:6.1.9.200-6.1.9.201" ], "issued": "20171108", "updated": "null", "siblings": [ "6100-09:IV97148", "7100-04:IV97265", "7200-01:IV97266" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97148/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "6100-09-08", "6100-09-09" ], "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER", "aparNo": "IV97148", "aparNoSet": [ "IV97148" ], "fixedIn": "6100-09-10", "ifixes": [ "IV97148s8a.170613.61TL09SP08.epkg.Z", "IV97148s8a.170613.epkg.Z", "IV97148s9b.171030.61TL09SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97148", "filesets": [ "bos.cluster.rte:6.1.9.200-6.1.9.201" ], "issued": "20171108", "updated": "null", "siblings": [ "7100-04:IV97265", "7200-01:IV97266" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97148/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.3.80", "2.2.3.90" ], "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER", "aparNo": "IV97148", "aparNoSet": [ "IV97148" ], "fixedIn": "See Advisory", "ifixes": [ "IV97148s8a.170613.61TL09SP08.epkg.Z", "IV97148s8a.170613.epkg.Z", "IV97148s9b.171030.61TL09SP09.epkg.Z", "IV97148s9b.171030.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97148", "filesets": [ "bos.cluster.rte:6.1.9.200-6.1.9.201" ], "issued": "20171108", "updated": "null", "siblings": [ "6100-09:IV97148", "7100-04:IV97265", "7200-01:IV97266" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97148/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-03", "7100-04-04" ], "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER", "aparNo": "IV97265", "aparNoSet": [ "IV97265" ], "fixedIn": "7100-04-05", "ifixes": [ "IV97265s3a.171101.71TL04SP03.epkg.Z", "IV97265s4a.170823.71TL04SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97265", "filesets": [ "bos.cluster.rte:7.1.4.30-7.1.4.31" ], "issued": "20171108", "updated": "null", "siblings": [ "6100-09:IV97148", "7200-01:IV97266" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97265/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02" ], "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER", "aparNo": "IV97266", "aparNoSet": [ "IV97266" ], "fixedIn": "7200-01-03", "ifixes": [ "IV97266s1a.171101.72TL01SP00.epkg.Z", "IV97266s1a.171101.72TL01SP01.epkg.Z", "IV97266s2a.170920.72TL01SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97266", "filesets": [ "bos.cluster.rte:7.2.1.0-7.2.1.1" ], "issued": "20171108", "updated": "null", "siblings": [ "6100-09:IV97148", "7100-04:IV97265" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97266/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-07", "6100-09-08", "6100-09-09" ], "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97356", "aparNoSet": [ "CVE-2017-1692", "IV97356" ], "fixedIn": "6100-09-10", "ifixes": [ "IV97356m9a.170830.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.201" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.70", "2.2.3.80", "2.2.3.90" ], "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)", "aparNo": "IV97356", "aparNoSet": [ "CVE-2017-1692", "IV97356" ], "fixedIn": "6100-09-10", "ifixes": [ "IV97356m9a.170830.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.201" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.30", "2.2.4.40", "2.2.4.50" ], "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)", "aparNo": "IV97356", "aparNoSet": [ "CVE-2017-1692", "IV97356" ], "fixedIn": "6100-09-10", "ifixes": [ "IV97356m9a.170830.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.201" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "7100-04-04" ], "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER", "aparNo": "IV97586", "aparNoSet": [ "IV97586" ], "fixedIn": "7100-04-05", "ifixes": [ "IV97586s4a.170714.71TL04SP04.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97586", "filesets": [ "devices.common.IBM.ethernet.rte:7.1.4.31" ], "issued": "20170718", "updated": "null", "siblings": [ "6100-09:IV97135", "7200-01:IV97588" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97586/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7200-01-02" ], "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER", "aparNo": "IV97588", "aparNoSet": [ "IV97588" ], "fixedIn": "7200-01-03", "ifixes": [ "IV97588s2a.170714.72TL01SP02.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97588", "filesets": [ "devices.common.IBM.ethernet.rte:7.2.1.1" ], "issued": "20170718", "updated": "null", "siblings": [ "6100-09:IV97135", "7100-04:IV97586" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97588/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07", "7100-03-08", "7100-03-09" ], "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS", "aparNo": "IV97772", "aparNoSet": [ "IV97772" ], "fixedIn": "See Advisory", "ifixes": [ "IV97772s9a.170713.71TL03SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97772", "filesets": [ "devices.fcp.disk.rte:7.1.3.0-7.1.3.49", "devices.pci.77102224.com:7.1.3.0-7.1.3.49", "devices.pci.df1000f7.com:7.1.3.0-7.1.3.49", "devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.49" ], "issued": "20170715", "updated": "null", "siblings": [ "6100-09:IV96553", "7100-04:IV96603", "7200-00:IV96606", "7200-01:IV96604" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97772/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "aix", "versions": [ "7100-03-00", "7100-03-01", "7100-03-02", "7100-03-03", "7100-03-04", "7100-03-05", "7100-03-06", "7100-03-07", "7100-03-08", "7100-03-09" ], "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS", "aparNo": "IV97772", "aparNoSet": [ "IV97772" ], "fixedIn": "See Advisory", "ifixes": [ "IV97772s9a.170713.71TL03SP09.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97772", "filesets": [ "devices.fcp.disk.rte:7.1.3.0-7.1.3.49", "devices.pci.77102224.com:7.1.3.0-7.1.3.49", "devices.pci.df1000f7.com:7.1.3.0-7.1.3.49", "devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.49" ], "issued": "20170721", "updated": "20170721", "siblings": [ "6100-09:IV96553", "7100-04:IV96603", "7200-00:IV96606", "7200-01:IV96604" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97772/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "(caccelstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97811", "aparNoSet": [ "CVE-2017-1692", "IV97811" ], "fixedIn": "7200-00-06", "ifixes": [ "IV97811s2a.170712.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.acct:7.2.0.0-7.2.0.2" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "(caccelstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97811", "aparNoSet": [ "CVE-2017-1692", "IV97811" ], "fixedIn": "7200-01-04", "ifixes": [ "IV97811s2a.170712.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.acct:7.2.1.0-7.2.1.0" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-07", "6100-09-08", "6100-09-09" ], "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97852", "aparNoSet": [ "CVE-2017-1692", "IV97852" ], "fixedIn": "6100-09-10", "ifixes": [ "IV97852s7a.170713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.archive:6.1.9.0-6.1.9.201" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.70", "2.2.3.80", "2.2.3.90" ], "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)", "aparNo": "IV97852", "aparNoSet": [ "CVE-2017-1692", "IV97852" ], "fixedIn": "6100-09-10", "ifixes": [ "IV97852s7a.170713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.archive:6.1.9.0-6.1.9.201" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.30", "2.2.4.40", "2.2.4.50" ], "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)", "aparNo": "IV97852", "aparNoSet": [ "CVE-2017-1692", "IV97852" ], "fixedIn": "6100-09-10", "ifixes": [ "IV97852s7a.170713.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.archive:6.1.9.0-6.1.9.201" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97896", "aparNoSet": [ "CVE-2017-1692", "IV97896" ], "fixedIn": "7100-04-06", "ifixes": [ "IV97896s4a.170712.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.acct:7.1.4.0-7.1.4.30" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97898", "aparNoSet": [ "CVE-2017-1692", "IV97898" ], "fixedIn": "7200-00-06", "ifixes": [ "IV97898s2a.171201.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.acct:7.2.0.0-7.2.0.3" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97898", "aparNoSet": [ "CVE-2017-1692", "IV97898" ], "fixedIn": "7200-01-04", "ifixes": [ "IV97898s2a.171201.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.acct:7.2.1.0-7.2.1.1" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97899", "aparNoSet": [ "CVE-2017-1692", "IV97899" ], "fixedIn": "7100-04-06", "ifixes": [ "IV97899s4a.170712.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.acct:7.1.4.0-7.1.4.30" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97901", "aparNoSet": [ "CVE-2017-1692", "IV97901" ], "fixedIn": "7200-00-06", "ifixes": [ "IV97901s2a.171201.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.acct:7.2.0.0-7.2.0.3" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97901", "aparNoSet": [ "CVE-2017-1692", "IV97901" ], "fixedIn": "7200-01-04", "ifixes": [ "IV97901s2a.171201.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.acct:7.2.1.0-7.2.1.1" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97957", "aparNoSet": [ "CVE-2017-1692", "IV97957" ], "fixedIn": "7100-04-06", "ifixes": [ "IV97957s2b.171205.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.archive:7.1.4.0-7.1.4.31" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97958", "aparNoSet": [ "CVE-2017-1692", "IV97958" ], "fixedIn": "7200-01-04", "ifixes": [ "IV97958s0b.171205.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.archive:7.2.1.0-7.2.1.1" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV97959", "aparNoSet": [ "CVE-2017-1692", "IV97959" ], "fixedIn": "7200-00-06", "ifixes": [ "IV97959s2b.171205.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.archive:7.2.0.0-7.2.0.3" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.5.0", "2.2.5.10", "2.2.5.20" ], "apAbstract": "LPARS USING SEA MAY LOSE NETWORK AFTER REBOOTING PRIMARY AND SECONDARY VIOS", "aparNo": "IV97991", "aparNoSet": [ "IV97991" ], "fixedIn": "2.2.5.30", "ifixes": [ "IV97991s8a.170714.VIOS2.2.5.0-10.epkg.Z", "IV97991s9a.170713.VIOS2.2.5.20.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97991", "filesets": [ "ios.sea:6.1.9.200-6.1.9.201" ], "issued": "20170908", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97991/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV98013", "aparNoSet": [ "CVE-2017-1692", "IV98013" ], "fixedIn": "See Bulletin", "ifixes": [ "IV98013s9a.170717.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.archive:5.3.12.0-5.3.12.7" ], "issued": "20180205", "updated": "null", "siblings": [ "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "5300-12-09" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IV98825", "aparNoSet": [ "CVE-2017-3142", "CVE-2017-3143", "IV98825" ], "fixedIn": "See Bulletin", "ifixes": [ "IV98825m9a.170830.epkg.Z" ], "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc", "filesets": [ "bos.net.tcp.client:5.3.12.0-5.3.12.10" ], "issued": "20170823", "updated": "20171113", "siblings": [ "7200-01:IV98830", "7200-00:IV98829", "7100-03:IV98827", "7100-04:IV98828", "6100-09:IV98826" ], "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar", "cvss": [ "CVE-2017-3142:5.3", "CVE-2017-3143:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-10", "6100-09-07", "6100-09-08", "6100-09-09" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IV98826", "aparNoSet": [ "CVE-2017-3142", "CVE-2017-3143", "IV98826" ], "fixedIn": "6100-09-11", "ifixes": [ "IV98826m9a.170809.epkg.Z", "IV98826m0a.171105.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc", "filesets": [ "bos.net.tcp.client:6.1.9.0-6.1.9.300" ], "issued": "20170823", "updated": "20171113", "siblings": [ "7200-01:IV98830", "5300-12:IV98825", "7200-00:IV98829", "7100-03:IV98827", "7100-04:IV98828" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar", "cvss": [ "CVE-2017-3142:5.3", "CVE-2017-3143:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-03-07", "7100-03-08", "7100-03-09" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IV98827", "aparNoSet": [ "CVE-2017-3142", "CVE-2017-3143", "IV98827" ], "fixedIn": "See Bulletin", "ifixes": [ "IV98827m3a.170808.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc", "filesets": [ "bos.net.tcp.client:7.1.3.0-7.1.3.49" ], "issued": "20170823", "updated": "20171113", "siblings": [ "7200-01:IV98830", "5300-12:IV98825", "7200-00:IV98829", "7100-04:IV98828", "6100-09:IV98826" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar", "cvss": [ "CVE-2017-3142:5.3", "CVE-2017-3143:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-02", "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IV98828", "aparNoSet": [ "CVE-2017-3142", "CVE-2017-3143", "IV98828" ], "fixedIn": "7100-04-06", "ifixes": [ "IV98828m4a.170808.epkg.Z", "IV98828m5b.171110.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.32" ], "issued": "20170823", "updated": "20171113", "siblings": [ "7200-01:IV98830", "5300-12:IV98825", "7200-00:IV98829", "7100-03:IV98827", "6100-09:IV98826" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar", "cvss": [ "CVE-2017-3142:5.3", "CVE-2017-3143:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-02", "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IV98829", "aparNoSet": [ "CVE-2017-3142", "CVE-2017-3143", "IV98829" ], "fixedIn": "7200-00-06", "ifixes": [ "IV98829m0a.170809.epkg.Z", "IV98829m0b.171106.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc", "filesets": [ "bos.net.tcp.client_core:7.2.0.0-7.2.0.4" ], "issued": "20170823", "updated": "20171113", "siblings": [ "7200-01:IV98830", "5300-12:IV98825", "7100-03:IV98827", "7100-04:IV98828", "6100-09:IV98826" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar", "cvss": [ "CVE-2017-3142:5.3", "CVE-2017-3143:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-00", "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "There are vulnerabilities in BIND that impact AIX.", "aparNo": "IV98830", "aparNoSet": [ "CVE-2017-3142", "CVE-2017-3143", "IV98830" ], "fixedIn": "7200-01-04", "ifixes": [ "IV98830m1a.170809.epkg.Z", "IV98830m1b.171106.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc", "filesets": [ "bos.net.tcp.client_core:7.2.1.0-7.2.1.2" ], "issued": "20170823", "updated": "20171113", "siblings": [ "5300-12:IV98825", "7200-00:IV98829", "7100-03:IV98827", "7100-04:IV98828", "6100-09:IV98826" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar", "cvss": [ "CVE-2017-3142:5.3", "CVE-2017-3143:7.5" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV99497", "aparNoSet": [ "CVE-2017-1692", "IV99497" ], "fixedIn": "7100-04-06", "ifixes": [ "IV99497m5a.171115.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.net.tcp.client:7.1.4.0-7.1.4.32" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV99498", "aparNoSet": [ "CVE-2017-1692", "IV99498" ], "fixedIn": "7200-00-06", "ifixes": [ "IV99498m5a.171115.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.0.0-7.2.0.4" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV99499", "aparNoSet": [ "CVE-2017-1692", "IV99499" ], "fixedIn": "7200-01-04", "ifixes": [ "IV99499m3a.171115.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.net.tcp.client_core:7.2.1.0-7.2.1.2" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "6100-09-07", "6100-09-08", "6100-09-09" ], "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV99548", "aparNoSet": [ "CVE-2017-1692", "IV99548" ], "fixedIn": "6100-09-10", "ifixes": [ "IV99548m9a.171031.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.lvm:6.1.9.0-6.1.9.201" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.3.70", "2.2.3.80", "2.2.3.90" ], "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)", "aparNo": "IV99548", "aparNoSet": [ "CVE-2017-1692", "IV99548" ], "fixedIn": "6100-09-10", "ifixes": [ "IV99548m9a.171031.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.lvm:6.1.9.0-6.1.9.201" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "vios", "versions": [ "2.2.4.30", "2.2.4.40", "2.2.4.50" ], "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)", "aparNo": "IV99548", "aparNoSet": [ "CVE-2017-1692", "IV99548" ], "fixedIn": "6100-09-10", "ifixes": [ "IV99548m9a.171031.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.lvm:6.1.9.0-6.1.9.201" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7100-04-03", "7100-04-04", "7100-04-05" ], "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV99550", "aparNoSet": [ "CVE-2017-1692", "IV99550" ], "fixedIn": "7100-04-06", "ifixes": [ "IV99550m5a.171031.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.lvm:7.1.4.0-7.1.4.32" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7200-00:IV99498", "7100-03:IV99496", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-00-03", "7200-00-04", "7200-00-05" ], "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV99551", "aparNoSet": [ "CVE-2017-1692", "IV99551" ], "fixedIn": "7200-00-06", "ifixes": [ "IV99551m5a.171031.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.lvm:7.2.0.0-7.2.0.4" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-01:IV99499", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "sec", "product": "aix", "versions": [ "7200-01-01", "7200-01-02", "7200-01-03" ], "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)", "aparNo": "IV99552", "aparNoSet": [ "CVE-2017-1692", "IV99552" ], "fixedIn": "7200-01-04", "ifixes": [ "IV99552m3a.171031.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc", "filesets": [ "bos.rte.lvm:7.2.1.0-7.2.1.2" ], "issued": "20180205", "updated": "null", "siblings": [ "5300-12:IJ00951", "7200-00:IV99498", "7100-03:IV99496", "7100-04:IV99497", "6100-09:IV97356" ], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar", "cvss": [ "CVE-2017-1692:8.4" ], "reboot": "no" }, { "type": "hiper", "product": "aix", "versions": [ "6100-06-00", "6100-06-01", "6100-06-02", "6100-06-03", "6100-06-04", "6100-06-05", "6100-06-06", "6100-06-07", "6100-06-08", "6100-06-09", "6100-06-10", "6100-06-11" ], "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().", "aparNo": "IZ94647", "aparNoSet": [ "IZ94647" ], "fixedIn": "6100-06-12", "ifixes": [ "IZ94647s1a.130730.epkg.Z", "IZ94647s1a.130730.61TL06SP11.epkg.Z" ], "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IZ94647", "filesets": [ "bos.mp64:6.1.6.0-6.1.6.22" ], "issued": "20110208", "updated": "20131124", "siblings": [ "6100-06:IZ94647", "6100-07:IV13404", "6100-08:IV14309", "6100-09:IV42440", "7100-00:IV42334", "7100-01:IV27584", "7100-02:IV42324", "7100-03:IV42412" ], "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iz94647/", "cvss": [], "reboot": "no" }, { "type": "hiper", "product": "vios", "versions": [ "2.2.4.0", "2.2.4.10", "2.2.4.20", "2.2.4.30", "2.2.4.40", "2.2.4.50", "2.2.4.60" ], "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable", "aparNo": "See", "aparNoSet": [ "Advisory", "See" ], "fixedIn": "See Advisory", "ifixes": [ "IJ06644sAa.180917.AIX61TL09SP10.epkg.Z", "IJ06644sBa.180615.AIX61TL09SP11.epkg.Z", "IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z", "IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z", "IJ06644sCa.180917.AIX61TL09SP12.epkg.Z", "IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z" ], "bulletinUrl": "", "filesets": [ "devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201" ], "issued": "20181013", "updated": "null", "siblings": [ "6100-09:IJ06644", "7100-04:IJ09173", "7100-05:IJ09174", "7200-01:IJ09175", "7200-02:IJ09176", "7200-03:IJ08641" ], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij06644/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "3.1.4.40", "3.1.4.41" ], "apAbstract": "Potential undetected data loss can occur on LPARs using NPIV with certain Fibre Channel adapters", "aparNo": "cv31441s1a", "aparNoSet": [ "cv31441s1a" ], "fixedIn": "3.1.4.50", "ifixes": [ "cv31441s1a.241015.VIOS3.1.4.4x.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7172778", "filesets": [ "devices.pciex.7710612214105006.com:7.2.5.203-7.2.5.203" ], "issued": "20241016", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/cv31141/", "cvss": [], "reboot": "yes" }, { "type": "hiper", "product": "vios", "versions": [ "4.1.0.20", "4.1.0.21" ], "apAbstract": "Potential undetected data loss can occur on LPARs using NPIV with certain Fibre Channel adapters", "aparNo": "cv41021s1a", "aparNoSet": [ "cv41021s1a" ], "fixedIn": "4.1.0.30", "ifixes": [ "cv41021s1a.241015.VIOS4.1.0.2x.epkg.Z" ], "bulletinUrl": "https://www.ibm.com/support/pages/node/7172778", "filesets": [ "devices.pciex.7710612214105006.com:7.3.2.1-7.3.2.1" ], "issued": "20241016", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/cv41021/", "cvss": [], "reboot": "yes" }, { "type": "sec", "product": "aix", "versions": [ "invScout" ], "apAbstract": "AIX is vulnerable to arbitrary command execution due to invscout (CVE-2024-27260)", "aparNo": "is22026s1a", "aparNoSet": [ "CVE-2024-27260", "is22026s1a" ], "fixedIn": "See Bulletin", "ifixes": [ "is22026s1a.240514.epkg.Z" ], "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_advisory6.asc", "filesets": [ "invscout.rte:2.2.0.0-2.2.0.26" ], "issued": "20240515", "updated": "null", "siblings": [], "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_fix6.tar", "cvss": [ "CVE-2024-27260:8.4" ], "reboot": "no" } ]