[
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution (CVE-2024-4741) and denial of service (CVE-2024-5535 CVE-2024-4603) due to OpenSSL",
    "aparNo": "1112400a",
    "aparNoSet": [
      "1112400a",
      "1122400a",
      "3013ma",
      "3013sa",
      "CVE-2024-4603",
      "CVE-2024-4741",
      "CVE-2024-5535"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "1112400a.240722.epkg.Z",
      "1122400a.240722.epkg.Z",
      "3013sa.240722.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory42.asc",
    "filesets": [
      "openssl.base:1.1.1.0-1.1.1.2400",
      "openssl.base:1.1.2.0-1.1.2.2400",
      "openssl.base:3.0.0.0-3.0.13.1000"
    ],
    "issued": "20240730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix42.tar",
    "cvss": [
      "CVE-2024-4603:3.7",
      "CVE-2024-4741:8.1",
      "CVE-2024-5535:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "AIX is vulnerable to information disclosure (CVE-2024-13176) or arbitrary code execution or a denial of service (CVE-2024-9143) due to OpenSSL",
    "aparNo": "112401sa",
    "aparNoSet": [
      "112401sa",
      "301510sa",
      "CVE-2024-13176",
      "CVE-2024-9143"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "112401sa.250204.epkg.Z",
      "301510sa.250212.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory44.asc",
    "filesets": [
      "openssl.base:1.1.2.0-1.1.2.2401",
      "openssl.base:3.0.0.0-3.0.15.1000"
    ],
    "issued": "20250224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix44.tar",
    "cvss": [
      "CVE-2024-13176:4.1",
      "CVE-2024-9143:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "cURL"
    ],
    "apAbstract": "AIX is vulnerable to security restrictions bypass due to curl",
    "aparNo": "2466ma",
    "aparNoSet": [
      "2466ma",
      "32221a",
      "46218ma",
      "CVE-2022-32221",
      "curl7791a",
      "curl7791mb",
      "curl812sa"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "32221a.230524.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory.asc",
    "filesets": [
      "oss.lib.libcurl:7.79.1.0-7.79.1.0"
    ],
    "issued": "20230526",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix.tar",
    "cvss": [
      "CVE-2022-32221:8.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "cURL"
    ],
    "apAbstract": "Multiple vulnerabilities cURL libcurl affect AIX",
    "aparNo": "2466ma",
    "aparNoSet": [
      "2466ma",
      "46218ma",
      "CVE-2022-27782",
      "CVE-2022-32206",
      "CVE-2022-43551",
      "CVE-2022-43552",
      "CVE-2023-23916",
      "CVE-2023-27533",
      "CVE-2023-27534",
      "CVE-2023-27535",
      "CVE-2023-27536",
      "CVE-2023-27537",
      "CVE-2023-27538",
      "curl7791a",
      "curl7791mb",
      "curl812sa"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "curl7791a.230622.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory2.asc",
    "filesets": [
      "oss.lib.libcurl:7.79.1.0-7.79.1.0"
    ],
    "issued": "20230629",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix2.tar",
    "cvss": [
      "CVE-2022-27782:9.8",
      "CVE-2022-32206:4.3",
      "CVE-2022-43551:7.5",
      "CVE-2022-43552:5.9",
      "CVE-2023-23916:7.5",
      "CVE-2023-27533:8.2",
      "CVE-2023-27534:7.5",
      "CVE-2023-27535:5.9",
      "CVE-2023-27536:5.9",
      "CVE-2023-27537:7.5",
      "CVE-2023-27538:4.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "cURL"
    ],
    "apAbstract": "Multiple vulnerabilities in cURL libcurl affect AIX",
    "aparNo": "2466ma",
    "aparNoSet": [
      "2466ma",
      "46218ma",
      "CVE-2023-38545",
      "CVE-2023-38546",
      "curl7791mb",
      "curl812sa"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "curl7791mb.231120.epkg.Z",
      "curl812sa.231120.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory3.asc",
    "filesets": [
      "oss.lib.libcurl:7.79.1.0-7.79.1.0",
      "oss.lib.libcurl:8.1.2.0-8.1.2.0"
    ],
    "issued": "20231212",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix3.tar",
    "cvss": [
      "CVE-2023-38545:8.1",
      "CVE-2023-38546:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "cURL"
    ],
    "apAbstract": "AIX is vulnerable to security restrictions bypass due to cURL libcurl (CVE-2023-46218)",
    "aparNo": "2466ma",
    "aparNoSet": [
      "2466ma",
      "46218ma",
      "CVE-2023-46218"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "46218ma.240227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory4.asc",
    "filesets": [
      "oss.lib.libcurl:7.79.1.0-7.79.1.0",
      "oss.lib.libcurl:8.1.2.0-8.1.2.0"
    ],
    "issued": "20240306",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix4.tar",
    "cvss": [
      "CVE-2023-46218:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "cURL"
    ],
    "apAbstract": "AIX is vulnerable to security restrictions bypass due to cURL libcurl (CVE-2024-0853)",
    "aparNo": "2466ma",
    "aparNoSet": [
      "2466ma",
      "853sa",
      "CVE-2024-0853"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "853sa.240503.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory5.asc",
    "filesets": [
      "oss.lib.libcurl:8.5.0.0-8.5.0.0"
    ],
    "issued": "20240620",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix5.tar",
    "cvss": [
      "CVE-2024-0853:3.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "cURL"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service (CVE-2024-2398) and security restrictions bypass (CVE-2024-2466 CVE-2024-2004) due to cURL libcurl",
    "aparNo": "2466ma",
    "aparNoSet": [
      "2466ma",
      "CVE-2024-2004",
      "CVE-2024-2398",
      "CVE-2024-2466"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "2466ma.240719.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_advisory6.asc",
    "filesets": [
      "oss.lib.libcurl:7.79.1.0-7.79.1.0",
      "oss.lib.libcurl:8.1.2.0-8.1.2.0",
      "oss.lib.libcurl:8.5.0.0-8.5.0.0"
    ],
    "issued": "20240820",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/curl_fix6.tar",
    "cvss": [
      "CVE-2024-2004:3.7",
      "CVE-2024-2398:5.3",
      "CVE-2024-2466:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service (CVE-2024-6119) due to OpenSSL",
    "aparNo": "3013ma",
    "aparNoSet": [
      "3013ma",
      "CVE-2024-6119"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "3013ma.240923.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory43.asc",
    "filesets": [
      "openssl.base:3.0.5.101-3.0.13.1000"
    ],
    "issued": "20240930",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix43.tar",
    "cvss": [
      "CVE-2024-6119:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "AIX is vulnerable to unauthorized file access and arbitrary code execution due to OpenSSH",
    "aparNo": "38408m9a",
    "aparNoSet": [
      "38408m9a",
      "38408m9b",
      "38408m9c",
      "81112ma",
      "92112ma",
      "CVE-2023-38408",
      "CVE-2023-40371"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "38408m9a.230811.epkg.Z",
      "38408m9b.230811.epkg.Z",
      "38408m9c.230811.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory15.asc",
    "filesets": [
      "openssh.base.client:8.1.102.0-8.1.102.2106",
      "openssh.base.server:8.1.102.0-8.1.102.2106",
      "openssh.base.client:8.1.112.0-8.1.112.2000",
      "openssh.base.server:8.1.112.0-8.1.112.2000",
      "openssh.base.client:9.2.112.0-9.2.112.2000",
      "openssh.base.server:9.2.112.0-9.2.112.2000"
    ],
    "issued": "20230823",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix15.tar",
    "cvss": [
      "CVE-2023-38408:8.1",
      "CVE-2023-40371:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "AIX is vulnerable to a machine-in-the-middle attack (CVE-2023-48795) arbitrary command execution (CVE-2023-51385) and information disclosure (CVE-2023-51384) due to OpenSSH",
    "aparNo": "81112ma",
    "aparNoSet": [
      "81112ma",
      "92112ma",
      "CVE-2023-48795",
      "CVE-2023-51384",
      "CVE-2023-51385"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "81112ma.240224.epkg.Z",
      "92112ma.240223.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory16.asc",
    "filesets": [
      "openssh.base.client:8.1.112.0-8.1.112.2200",
      "openssh.base.server:8.1.112.0-8.1.112.2200",
      "openssh.base.client:9.2.112.0-9.2.112.2200",
      "openssh.base.server:9.2.112.0-9.2.112.2200"
    ],
    "issued": "20240228",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix16.tar",
    "cvss": [
      "CVE-2023-48795:5.9",
      "CVE-2023-51384:4.4",
      "CVE-2023-51385:9.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution (CVE-2024-6387) due to OpenSSH",
    "aparNo": "9211224a",
    "aparNoSet": [
      "9211224a",
      "CVE-2024-6387"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "9211224a.240708.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory17.asc",
    "filesets": [
      "openssh.base.client:9.2.112.0-9.2.112.2400",
      "openssh.base.server:9.2.112.0-9.2.112.2400"
    ],
    "issued": "20240709",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix17.tar",
    "cvss": [
      "CVE-2024-6387:8.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service (CVE-2025-26466) and a machine-in-the-middle attack (CVE-2025-26465) due to OpenSSH",
    "aparNo": "973013sa",
    "aparNoSet": [
      "973013sa",
      "993015sa",
      "CVE-2025-26465",
      "CVE-2025-26466"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "973013sa.250306.epkg.Z",
      "993015sa.250306.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory18.asc",
    "filesets": [
      "openssh.base.client:9.2.112.0-9.7.3013.1000",
      "openssh.base.server:9.2.112.0-9.7.3013.1000",
      "openssh.base.client:9.9.3015.1000-9.9.3015.1000",
      "openssh.base.server:9.9.3015.1000-9.9.3015.1000"
    ],
    "issued": "20250317",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix18.tar",
    "cvss": [
      "CVE-2025-26465:6.8",
      "CVE-2025-26466:5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2006-0987",
    "aparNoSet": [
      "CVE-2006-0987",
      "IV62327"
    ],
    "fixedIn": "interim fix only",
    "ifixes": [
      "IV62327m9a.140709.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc",
    "filesets": [
      "bos.net.tcp.server:5.3.12.0-5.3.12.6"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "5300-12:IV62327",
      "6100-07:IV62224",
      "6100-08:IV62146",
      "6100-09:IV62225",
      "7100-01:IV61093",
      "7100-02:IV61090",
      "7100-03:IV61027"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar",
    "cvss": [
      "CVE-2006-0987:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2006-0987",
    "aparNoSet": [
      "CVE-2006-0987",
      "IV62146"
    ],
    "fixedIn": "6100-08-06",
    "ifixes": [
      "IV62146m4a.140709.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.8.0-6.1.8.17"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "5300-12:IV62327",
      "6100-07:IV62224",
      "6100-08:IV62146",
      "6100-09:IV62225",
      "7100-01:IV61093",
      "7100-02:IV61090",
      "7100-03:IV61027"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar",
    "cvss": [
      "CVE-2006-0987:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2006-0987",
    "aparNoSet": [
      "CVE-2006-0987",
      "IV61090"
    ],
    "fixedIn": "7100-02-06",
    "ifixes": [
      "IV61090s4a.140603.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.2.0-7.1.2.17"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "5300-12:IV62327",
      "6100-07:IV62224",
      "6100-08:IV62146",
      "6100-09:IV62225",
      "7100-01:IV61093",
      "7100-02:IV61090",
      "7100-03:IV61027"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar",
    "cvss": [
      "CVE-2006-0987:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2006-0987",
    "aparNoSet": [
      "CVE-2006-0987",
      "IV61027"
    ],
    "fixedIn": "7100-03-04",
    "ifixes": [
      "IV61027s3a.140611.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.3.0-7.1.3.15"
    ],
    "issued": "20140815",
    "updated": "20150822",
    "siblings": [
      "5300-12:IV62327",
      "6100-07:IV62224",
      "6100-08:IV62146",
      "6100-09:IV62225",
      "7100-01:IV61093",
      "7100-02:IV61090",
      "7100-03:IV61027"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar",
    "cvss": [
      "CVE-2006-0987:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08",
      "6100-07-09"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2006-0987",
    "aparNoSet": [
      "CVE-2006-0987",
      "IV62224"
    ],
    "fixedIn": "interim fix only",
    "ifixes": [
      "IV62224m9a.140709.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.7.0-6.1.7.20"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "5300-12:IV62327",
      "6100-07:IV62224",
      "6100-08:IV62146",
      "6100-09:IV62225",
      "7100-01:IV61093",
      "7100-02:IV61090",
      "7100-03:IV61027"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar",
    "cvss": [
      "CVE-2006-0987:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-01-09"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2006-0987",
    "aparNoSet": [
      "CVE-2006-0987",
      "IV61093"
    ],
    "fixedIn": "interim fix only",
    "ifixes": [
      "IV61093s9a.140603.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.1.0-7.1.1.20"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "5300-12:IV62327",
      "6100-07:IV62224",
      "6100-08:IV62146",
      "6100-09:IV62225",
      "7100-01:IV61093",
      "7100-02:IV61090",
      "7100-03:IV61027"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar",
    "cvss": [
      "CVE-2006-0987:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2",
      "2.2.2.3",
      "2.2.2.4",
      "2.2.2.5"
    ],
    "apAbstract": "Vulnerability in VIOS bind",
    "aparNo": "CVE-2006-0987",
    "aparNoSet": [
      "CVE-2006-0987"
    ],
    "fixedIn": "2.2.2.6",
    "ifixes": [
      "IV62146m4a.140709.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.8.0-6.1.8.17"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "5300-12:IV62327",
      "6100-07:IV62224",
      "6100-08:IV62146",
      "6100-09:IV62225",
      "7100-01:IV61093",
      "7100-02:IV61090",
      "7100-03:IV61027"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar",
    "cvss": [
      "CVE-2006-0987:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2",
      "2.2.3.3"
    ],
    "apAbstract": "Vulnerability in VIOS bind",
    "aparNo": "CVE-2006-0987",
    "aparNoSet": [
      "CVE-2006-0987"
    ],
    "fixedIn": "2.2.3.4",
    "ifixes": [
      "IV62225m3a.140708.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.3"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "5300-12:IV62327",
      "6100-07:IV62224",
      "6100-08:IV62146",
      "6100-09:IV62225",
      "7100-01:IV61093",
      "7100-02:IV61090",
      "7100-03:IV61027"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar",
    "cvss": [
      "CVE-2006-0987:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7",
      "2.2.1.8"
    ],
    "apAbstract": "Vulnerability in VIOS bind",
    "aparNo": "CVE-2006-0987",
    "aparNoSet": [
      "CVE-2006-0987"
    ],
    "fixedIn": "interim fix only",
    "ifixes": [
      "IV62224m9a.140709.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.7.0-6.1.7.20"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "5300-12:IV62327",
      "6100-07:IV62224",
      "6100-08:IV62146",
      "6100-09:IV62225",
      "7100-01:IV61093",
      "7100-02:IV61090",
      "7100-03:IV61027"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar",
    "cvss": [
      "CVE-2006-0987:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssh"
    ],
    "apAbstract": "AIX OpenSSH Vulnerability",
    "aparNo": "CVE-2010-5107",
    "aparNoSet": [
      "CVE-2010-5107"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "OpenSSH_6.0.0.6102.tar.Z",
      "DEPRECATED::6201_mfix"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory2.asc",
    "filesets": [
      "openssh.base.server:6.0.0.0-6.0.0.6101"
    ],
    "issued": "20130408",
    "updated": "20130802",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2010-5107:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "AIX OpenSSL Vulnerability",
    "aparNo": "CVE-2010-5298",
    "aparNoSet": [
      "CVE-2010-5298"
    ],
    "fixedIn": "Openssl-1.0.1.503",
    "ifixes": [
      "openssl-1.0.1.503.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory8.asc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.502"
    ],
    "issued": "20140606",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2010-5298:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "AIX OpenSSL Vulnerability",
    "aparNo": "CVE-2010-5298",
    "aparNoSet": [
      "CVE-2010-5298"
    ],
    "fixedIn": "Openssl-1.0.1.503",
    "ifixes": [
      "openssl-1.0.1.503.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory8.asc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.502"
    ],
    "issued": "20140606",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2010-5298:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Multiple OpenSSL vulnerabilities",
    "aparNo": "CVE-2011-4108",
    "aparNoSet": [
      "CVE-2011-4108",
      "CVE-2011-4109",
      "CVE-2011-4576",
      "CVE-2011-4619"
    ],
    "fixedIn": "7100-02-00",
    "ifixes": [
      "openssl.0.9.8.1801.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory3.asc",
    "filesets": [
      "openssl.base:0.9.8.0-0.9.8.1800",
      "openssl.base:12.9.8.0-12.9.8.1800"
    ],
    "issued": "20120321",
    "updated": "20120605",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2011-4108:4.3",
      "CVE-2011-4109:9.3",
      "CVE-2011-4576:5.0",
      "CVE-2011-4619:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "openssl"
    ],
    "apAbstract": "Multiple OpenSSL vulnerabilities",
    "aparNo": "CVE-2012-0884",
    "aparNoSet": [
      "CVE-2012-0884",
      "CVE-2012-1165",
      "CVE-2012-2110",
      "CVE-2012-2131",
      "CVE-2012-2333"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "openssl-0.9.8.1802.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory4.asc",
    "filesets": [
      "openssl.base:0.9.8.0-0.9.8.1801",
      "openssl.base:12.9.8.0-12.9.8.1801"
    ],
    "issued": "20120801",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2012-0884:5.0",
      "CVE-2012-1165:5.0",
      "CVE-2012-2110:7.5",
      "CVE-2012-2131:7.5",
      "CVE-2012-2333:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7",
      "2.2.1.8",
      "2.2.1.9"
    ],
    "apAbstract": "Arbitary file overwrite symlink in libodm",
    "aparNo": "CVE-2012-2179",
    "aparNoSet": [
      "CVE-2012-2179"
    ],
    "fixedIn": "2.2.1.10",
    "ifixes": [
      "IV60313s9a.140515.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875",
    "filesets": [
      "bos.rte.odm:6.1.7.0-6.1.7.15"
    ],
    "issued": "20120614",
    "updated": "null",
    "siblings": [
      "6100-07:IV60313",
      "6100-08:IV60311",
      "6100-09:IV60299",
      "7100-01:IV60312",
      "7100-02:IV60314",
      "7100-03:IV60303"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar",
    "cvss": [
      "CVE-2012-2179:6.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2",
      "2.2.2.3",
      "2.2.2.4"
    ],
    "apAbstract": "Arbitary file overwrite symlink in libodm",
    "aparNo": "CVE-2012-2179",
    "aparNoSet": [
      "CVE-2012-2179"
    ],
    "fixedIn": "2.2.2.5",
    "ifixes": [
      "IV60311s4a.140515.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875",
    "filesets": [
      "bos.rte.odm:6.1.8.0"
    ],
    "issued": "20120614",
    "updated": "null",
    "siblings": [
      "6100-07:IV60313",
      "6100-08:IV60311",
      "6100-09:IV60299",
      "7100-01:IV60312",
      "7100-02:IV60314",
      "7100-03:IV60303"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar",
    "cvss": [
      "CVE-2012-2179:6.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2"
    ],
    "apAbstract": "Arbitary file overwrite symlink in libodm",
    "aparNo": "CVE-2012-2179",
    "aparNoSet": [
      "CVE-2012-2179"
    ],
    "fixedIn": "2.2.3.3",
    "ifixes": [
      "IV60299s2a.140515.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875",
    "filesets": [
      "bos.rte.odm:6.1.9.0"
    ],
    "issued": "20120614",
    "updated": "null",
    "siblings": [
      "6100-07:IV60313",
      "6100-08:IV60311",
      "6100-09:IV60299",
      "7100-01:IV60312",
      "7100-02:IV60314",
      "7100-03:IV60303"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar",
    "cvss": [
      "CVE-2012-2179:6.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4"
    ],
    "apAbstract": "Vulnerability in use of socketpair",
    "aparNo": "CVE-2012-2192",
    "aparNoSet": [
      "CVE-2012-2192"
    ],
    "fixedIn": "2.2.1.5",
    "ifixes": [
      "IV21128s04.VIOS2214.120531.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.3"
    ],
    "issued": "20120605",
    "updated": "null",
    "siblings": [
      "6100-06:IV16603",
      "6100-07:IV21128",
      "6100-08:IV19341",
      "7100-00:IV21131",
      "7100-01:IV21235",
      "7100-02:IV19357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar",
    "cvss": [
      "CVE-2012-2192:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3"
    ],
    "apAbstract": "VIOS NFSv4 vulnerability",
    "aparNo": "CVE-2012-4817",
    "aparNoSet": [
      "CVE-2012-4817"
    ],
    "fixedIn": "2.2.1.4",
    "ifixes": [],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dVIOS%20NFSv4%20Vulnerability%20CVE-2012-4817",
    "filesets": [
      "bos.net.nfs.client:6.1.7.0-6.1.7.2"
    ],
    "issued": "20120913",
    "updated": "null",
    "siblings": [
      "6100-06:IV16603",
      "6100-07:IV21128",
      "6100-08:IV19341",
      "7100-00:IV21131",
      "7100-01:IV21235",
      "7100-02:IV19357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar",
    "cvss": [
      "CVE-2012-4817:5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Multiple OpenSSL vulnerabilities",
    "aparNo": "CVE-2013-0169",
    "aparNoSet": [
      "CVE-2013-0166",
      "CVE-2013-0169"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "openssl-0.9.8.2500.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory5.asc",
    "filesets": [
      "openssl.base:0.9.8.0-0.9.8.2400",
      "openssl.base:12.9.8.0-12.9.8.2400"
    ],
    "issued": "20130315",
    "updated": "20130605",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2013-0169:4.3",
      "CVE-2013-0166:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Multiple OpenSSL vulnerabilities",
    "aparNo": "CVE-2013-4353",
    "aparNoSet": [
      "CVE-2013-4353",
      "CVE-2013-6449",
      "CVE-2013-6450"
    ],
    "fixedIn": "7100-04-00",
    "ifixes": [
      "openssl-1.0.1.501.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory6.asc",
    "filesets": [
      "openssl.base:1.0.1.500"
    ],
    "issued": "20140225",
    "updated": "20140303",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2013-4353:5",
      "CVE-2013-6450:4.3",
      "CVE-2013-6449:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssh"
    ],
    "apAbstract": "AIX OpenSSH Vulnerability",
    "aparNo": "CVE-2013-4548",
    "aparNoSet": [
      "CVE-2013-4548"
    ],
    "fixedIn": "7100-04-00",
    "ifixes": [
      "OpenSSH_6.0.0.6104.tar.Z",
      "DEPRECATED::6201_mfix"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory3.asc",
    "filesets": [
      "openssh.base.server:6.0.0.6103"
    ],
    "issued": "20140221",
    "updated": "20140416",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2013-4548:6.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08",
      "6100-07-09"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "IV58413"
    ],
    "fixedIn": "6100-07-10",
    "ifixes": [
      "IV58413s9a.140421.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.20",
      "ntp.rte:6.1.6.0-6.1.6.1"
    ],
    "issued": "20140612",
    "updated": "null",
    "siblings": [
      "5300-12:IV59636",
      "6100-07:IV58413",
      "6100-08:IV58068",
      "6100-09:IV56213",
      "7100-01:IV56575",
      "7100-02:IV55365",
      "7100-03:IV56324"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar",
    "cvss": [
      "CVE-2013-5211:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "IV58068"
    ],
    "fixedIn": "6100-08-05",
    "ifixes": [
      "IV58068s4a.140421.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.17",
      "ntp.rte:6.1.6.0-6.1.6.1"
    ],
    "issued": "20140612",
    "updated": "null",
    "siblings": [
      "5300-12:IV59636",
      "6100-07:IV58413",
      "6100-08:IV58068",
      "6100-09:IV56213",
      "7100-01:IV56575",
      "7100-02:IV55365",
      "7100-03:IV56324"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar",
    "cvss": [
      "CVE-2013-5211:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "IV56213"
    ],
    "fixedIn": "6100-09-03",
    "ifixes": [
      "IV56213s1a.140421.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.1",
      "ntp.rte:6.1.6.0-6.1.6.1"
    ],
    "issued": "20140612",
    "updated": "null",
    "siblings": [
      "5300-12:IV59636",
      "6100-07:IV58413",
      "6100-08:IV58068",
      "6100-09:IV56213",
      "7100-01:IV56575",
      "7100-02:IV55365",
      "7100-03:IV56324"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar",
    "cvss": [
      "CVE-2013-5211:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-01-09"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "IV56573"
    ],
    "fixedIn": "7100-01-10",
    "ifixes": [
      "IV56575s9a.140421.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.1.0-7.1.1.20",
      "ntp.rte:7.1.0.0-7.1.0.1"
    ],
    "issued": "20140612",
    "updated": "null",
    "siblings": [
      "5300-12:IV59636",
      "6100-07:IV58413",
      "6100-08:IV58068",
      "6100-09:IV56213",
      "7100-01:IV56575",
      "7100-02:IV55365",
      "7100-03:IV56324"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar",
    "cvss": [
      "CVE-2013-5211:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "IV55365"
    ],
    "fixedIn": "7100-02-05",
    "ifixes": [
      "IV55365s4a.140421.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.17",
      "ntp.rte:7.1.0.0-7.1.0.1"
    ],
    "issued": "20140612",
    "updated": "null",
    "siblings": [
      "5300-12:IV59636",
      "6100-07:IV58413",
      "6100-08:IV58068",
      "6100-09:IV56213",
      "7100-01:IV56575",
      "7100-02:IV55365",
      "7100-03:IV56324"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar",
    "cvss": [
      "CVE-2013-5211:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "IV56324"
    ],
    "fixedIn": "7100-03-03",
    "ifixes": [
      "IV56324s2a.140522.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.2",
      "ntp.rte:7.1.0.0-7.1.0.1"
    ],
    "issued": "20140612",
    "updated": "null",
    "siblings": [
      "5300-12:IV59636",
      "6100-07:IV58413",
      "6100-08:IV58068",
      "6100-09:IV56213",
      "7100-01:IV56575",
      "7100-02:IV55365",
      "7100-03:IV56324"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar",
    "cvss": [
      "CVE-2013-5211:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "IV59636"
    ],
    "fixedIn": "interim fix only",
    "ifixes": [
      "IV59636s9a.140423.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10",
      "ntp.rte:6.1.6.0-6.1.6.1"
    ],
    "issued": "20140612",
    "updated": "null",
    "siblings": [
      "5300-12:IV59636",
      "6100-07:IV58413",
      "6100-08:IV58068",
      "6100-09:IV56213",
      "7100-01:IV56575",
      "7100-02:IV55365",
      "7100-03:IV56324"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar",
    "cvss": [
      "CVE-2013-5211:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7",
      "2.2.1.8"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in VIOS",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "IV58413"
    ],
    "fixedIn": "2.2.1.9",
    "ifixes": [
      "IV58413s9a.140421.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.20",
      "ntp.rte:6.1.6.0-6.1.6.1"
    ],
    "issued": "20140612",
    "updated": "null",
    "siblings": [
      "5300-12:IV59636",
      "6100-07:IV58413",
      "6100-08:IV58068",
      "6100-09:IV56213",
      "7100-01:IV56575",
      "7100-02:IV55365",
      "7100-03:IV56324"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar",
    "cvss": [
      "CVE-2013-5211:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2",
      "2.2.2.3",
      "2.2.2.4"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in VIOS",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "IV58068"
    ],
    "fixedIn": "2.2.2.5",
    "ifixes": [
      "IV58068s4a.140421.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.17",
      "ntp.rte:6.1.6.0-6.1.6.1"
    ],
    "issued": "20140612",
    "updated": "null",
    "siblings": [
      "5300-12:IV59636",
      "6100-07:IV58413",
      "6100-08:IV58068",
      "6100-09:IV56213",
      "7100-01:IV56575",
      "7100-02:IV55365",
      "7100-03:IV56324"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar",
    "cvss": [
      "CVE-2013-5211:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in VIOS",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "IV56213"
    ],
    "fixedIn": "2.2.3.3",
    "ifixes": [
      "IV56213s1a.140421.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.1",
      "ntp.rte:6.1.6.0-6.1.6.1"
    ],
    "issued": "20140612",
    "updated": "null",
    "siblings": [
      "5300-12:IV59636",
      "6100-07:IV58413",
      "6100-08:IV58068",
      "6100-09:IV56213",
      "7100-01:IV56575",
      "7100-02:IV55365",
      "7100-03:IV56324"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_ifix.tar",
    "cvss": [
      "CVE-2013-5211:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "CVE-2014-9294",
      "CVE-2014-9295"
    ],
    "fixedIn": "6100-08-07",
    "ifixes": [
      "IV68426m5b.150204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.18",
      "ntp.rte:6.1.6.0-6.1.6.2"
    ],
    "issued": "20150210",
    "updated": "null",
    "siblings": [
      "5300-12:IV68427",
      "6100-08:IV68426",
      "6100-09:IV68428",
      "7100-02:IV68429",
      "7100-03:IV68430"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar",
    "cvss": [
      "CVE-2014-9293:5.0",
      "CVE-2014-9294:5.0",
      "CVE-2014-9295:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "CVE-2014-9294",
      "CVE-2014-9295"
    ],
    "fixedIn": "6100-09-05",
    "ifixes": [
      "IV68428s4a.150109.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.30",
      "ntp.rte:6.1.6.0-6.1.6.2"
    ],
    "issued": "20150210",
    "updated": "null",
    "siblings": [
      "5300-12:IV68427",
      "6100-08:IV68426",
      "6100-09:IV68428",
      "7100-02:IV68429",
      "7100-03:IV68430"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar",
    "cvss": [
      "CVE-2014-9293:5.0",
      "CVE-2014-9294:5.0",
      "CVE-2014-9295:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "CVE-2014-9294",
      "CVE-2014-9295"
    ],
    "fixedIn": "7100-02-07",
    "ifixes": [
      "IV68429m5b.150204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.18",
      "ntp.rte:7.1.0.0-7.1.0.2"
    ],
    "issued": "20150210",
    "updated": "null",
    "siblings": [
      "5300-12:IV68427",
      "6100-08:IV68426",
      "6100-09:IV68428",
      "7100-02:IV68429",
      "7100-03:IV68430"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar",
    "cvss": [
      "CVE-2014-9293:5.0",
      "CVE-2014-9294:5.0",
      "CVE-2014-9295:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "CVE-2014-9294",
      "CVE-2014-9295"
    ],
    "fixedIn": "7100-03-05",
    "ifixes": [
      "IV68430s4a.150109.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.30",
      "ntp.rte:7.1.0.0-7.1.0.2"
    ],
    "issued": "20150210",
    "updated": "null",
    "siblings": [
      "5300-12:IV68427",
      "6100-08:IV68426",
      "6100-09:IV68428",
      "7100-02:IV68429",
      "7100-03:IV68430"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar",
    "cvss": [
      "CVE-2014-9293:5.0",
      "CVE-2014-9294:5.0",
      "CVE-2014-9295:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in AIX",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "CVE-2014-9294",
      "CVE-2014-9295"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IV68427m9a.150203.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20150210",
    "updated": "null",
    "siblings": [
      "5300-12:IV68427",
      "6100-08:IV68426",
      "6100-09:IV68428",
      "7100-02:IV68429",
      "7100-03:IV68430"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar",
    "cvss": [
      "CVE-2014-9293:5.0",
      "CVE-2014-9294:5.0",
      "CVE-2014-9295:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in VIOS",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "CVE-2014-9294",
      "CVE-2014-9295"
    ],
    "fixedIn": "2.2.2.7",
    "ifixes": [
      "IV68426m5b.150204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.18",
      "ntp.rte:6.1.6.0-6.1.6.2"
    ],
    "issued": "20150210",
    "updated": "null",
    "siblings": [
      "5300-12:IV68427",
      "6100-08:IV68426",
      "6100-09:IV68428",
      "7100-02:IV68429",
      "7100-03:IV68430"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar",
    "cvss": [
      "CVE-2014-9293:5.0",
      "CVE-2014-9294:5.0",
      "CVE-2014-9295:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4"
    ],
    "apAbstract": "Network Time Protocol (NTP) vulnerability in VIOS",
    "aparNo": "CVE-2013-5211",
    "aparNoSet": [
      "CVE-2013-5211",
      "CVE-2014-9294",
      "CVE-2014-9295"
    ],
    "fixedIn": "2.2.3.5",
    "ifixes": [
      "IV68428s4a.150109.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.30",
      "ntp.rte:6.1.6.0-6.1.6.2"
    ],
    "issued": "20150210",
    "updated": "null",
    "siblings": [
      "5300-12:IV68427",
      "6100-08:IV68426",
      "6100-09:IV68428",
      "7100-02:IV68429",
      "7100-03:IV68430"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix2.tar",
    "cvss": [
      "CVE-2014-9293:5.0",
      "CVE-2014-9294:5.0",
      "CVE-2014-9295:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java"
    ],
    "apAbstract": "Multiple Java vulnerabilities",
    "aparNo": "CVE-2013-5456",
    "aparNoSet": [
      "CVE-2013-3829",
      "CVE-2013-4041",
      "CVE-2013-5372",
      "CVE-2013-5375",
      "CVE-2013-5456",
      "CVE-2013-5457",
      "CVE-2013-5458",
      "CVE-2013-5772",
      "CVE-2013-5774",
      "CVE-2013-5776",
      "CVE-2013-5778",
      "CVE-2013-5780",
      "CVE-2013-5782",
      "CVE-2013-5783",
      "CVE-2013-5784",
      "CVE-2013-5787",
      "CVE-2013-5788",
      "CVE-2013-5789",
      "CVE-2013-5790",
      "CVE-2013-5797",
      "CVE-2013-5800",
      "CVE-2013-5801",
      "CVE-2013-5802",
      "CVE-2013-5803",
      "CVE-2013-5804",
      "CVE-2013-5809",
      "CVE-2013-5812",
      "CVE-2013-5814",
      "CVE-2013-5817",
      "CVE-2013-5818",
      "CVE-2013-5819",
      "CVE-2013-5820",
      "CVE-2013-5823",
      "CVE-2013-5824",
      "CVE-2013-5825",
      "CVE-2013-5829",
      "CVE-2013-5830",
      "CVE-2013-5831",
      "CVE-2013-5832",
      "CVE-2013-5838",
      "CVE-2013-5840",
      "CVE-2013-5842",
      "CVE-2013-5843",
      "CVE-2013-5848",
      "CVE-2013-5849",
      "CVE-2013-5850",
      "CVE-2013-5851"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "see",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_advisory.asc",
    "filesets": [
      "Java5:5.0.0.0-5.0.0.560",
      "Java6:6.0.0.0-6.0.0.435",
      "Java7:7.0.0.0-7.0.0.110"
    ],
    "issued": "20131211",
    "updated": "20140203",
    "siblings": [],
    "downloadUrl": "see advisory",
    "cvss": [
      "CVE-2013-5456:9.3",
      "CVE-2013-5457:9.3",
      "CVE-2013-5458:9.3",
      "CVE-2013-4041:6.8",
      "CVE-2013-5375:4.3",
      "CVE-2013-5372:4.3",
      "CVE-2013-5843:10",
      "CVE-2013-5789:10",
      "CVE-2013-5830:10",
      "CVE-2013-5829:10",
      "CVE-2013-5787:10",
      "CVE-2013-5788:10",
      "CVE-2013-5824:10",
      "CVE-2013-5842:10",
      "CVE-2013-5782:10",
      "CVE-2013-5817:10",
      "CVE-2013-5809:10",
      "CVE-2013-5814:10",
      "CVE-2013-5832:9.3",
      "CVE-2013-5850:9.3",
      "CVE-2013-5838:9.3",
      "CVE-2013-5802:7.5",
      "CVE-2013-5812:6.4",
      "CVE-2013-5804:6.4",
      "CVE-2013-5783:6.4",
      "CVE-2013-3829:6.4",
      "CVE-2013-5823:5",
      "CVE-2013-5831:5",
      "CVE-2013-5820:5",
      "CVE-2013-5819:5",
      "CVE-2013-5818:5",
      "CVE-2013-5848:5",
      "CVE-2013-5776:5",
      "CVE-2013-5774:5",
      "CVE-2013-5825:5",
      "CVE-2013-5840:5",
      "CVE-2013-5801:5",
      "CVE-2013-5778:5",
      "CVE-2013-5851:5",
      "CVE-2013-5800:4.3",
      "CVE-2013-5784:4.3",
      "CVE-2013-5849:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Openssl Heartbleed vulnerability",
    "aparNo": "CVE-2014-0160",
    "aparNoSet": [
      "CVE-2014-0160"
    ],
    "fixedIn": "Openssl-1.0.1.502",
    "ifixes": [
      "Openssl-1.0.1.502"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory7.doc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.501"
    ],
    "issued": "20140410",
    "updated": "20140415",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source\u003daixbp\u0026lang\u003den_US\u0026S_PKG\u003dopenssl\u0026cp\u003dUTF-8",
    "cvss": [
      "CVE-2014-0160:5.0",
      "CVE-2014-0076:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2014-0191",
    "aparNoSet": [
      "CVE-2014-0191",
      "IV62225"
    ],
    "fixedIn": "6100-09-04",
    "ifixes": [
      "IV62225m3a.140708.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory6.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.3"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "5300-12:IV62327",
      "6100-07:IV62224",
      "6100-08:IV62146",
      "6100-09:IV62225",
      "7100-01:IV61093",
      "7100-02:IV61090",
      "7100-03:IV61027"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix6.tar",
    "cvss": [
      "CVE-2006-0987:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04"
    ],
    "apAbstract": "AIX libxml2 vulnerability",
    "aparNo": "CVE-2014-0191",
    "aparNoSet": [
      "CVE-2014-0191",
      "IV62447"
    ],
    "fixedIn": "6100-08-05",
    "ifixes": [
      "IV62447s4a.140715.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc",
    "filesets": [
      "bos.rte.control:6.1.8.0-6.1.8.17"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "6100-08:IV62447",
      "6100-09:IV62448",
      "7100-02:IV62449",
      "7100-03:IV62450"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar",
    "cvss": [
      "CVE-2014-0191:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03"
    ],
    "apAbstract": "AIX libxml2 vulnerability",
    "aparNo": "CVE-2014-0191",
    "aparNoSet": [
      "CVE-2014-0191",
      "IV62448"
    ],
    "fixedIn": "6100-09-04",
    "ifixes": [
      "IV62448s3a.140715.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc",
    "filesets": [
      "bos.rte.control:6.1.9.0-6.1.9.15"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "6100-08:IV62447",
      "6100-09:IV62448",
      "7100-02:IV62449",
      "7100-03:IV62450"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar",
    "cvss": [
      "CVE-2014-0191:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04"
    ],
    "apAbstract": "AIX libxml2 vulnerability",
    "aparNo": "CVE-2014-0191",
    "aparNoSet": [
      "CVE-2014-0191",
      "IV62449"
    ],
    "fixedIn": "7100-02-05",
    "ifixes": [
      "IV62449s4a.140715.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc",
    "filesets": [
      "bos.rte.control:7.1.2.0-7.1.2.17"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "6100-08:IV62447",
      "6100-09:IV62448",
      "7100-02:IV62449",
      "7100-03:IV62450"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar",
    "cvss": [
      "CVE-2014-0191:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03"
    ],
    "apAbstract": "AIX libxml2 vulnerability",
    "aparNo": "CVE-2014-0191",
    "aparNoSet": [
      "CVE-2014-0191",
      "IV62450"
    ],
    "fixedIn": "7100-03-04",
    "ifixes": [
      "IV62450s3a.140715.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc",
    "filesets": [
      "bos.rte.control:7.1.3.0-7.1.3.15"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "6100-08:IV62447",
      "6100-09:IV62448",
      "7100-02:IV62449",
      "7100-03:IV62450"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar",
    "cvss": [
      "CVE-2014-0191:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4"
    ],
    "apAbstract": "VIOS libxml2 vulnerability",
    "aparNo": "CVE-2014-0191",
    "aparNoSet": [
      "CVE-2014-0191"
    ],
    "fixedIn": "2.2.2.5",
    "ifixes": [
      "IV62447s4a.140715.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc",
    "filesets": [
      "bos.rte.control:6.1.8.0-6.1.8.17"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "6100-08:IV62447",
      "6100-09:IV62448",
      "7100-02:IV62449",
      "7100-03:IV62450"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar",
    "cvss": [
      "CVE-2014-0191:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3"
    ],
    "apAbstract": "VIOS libxml2 vulnerability",
    "aparNo": "CVE-2014-0191",
    "aparNoSet": [
      "CVE-2014-0191"
    ],
    "fixedIn": "2.3.3.4",
    "ifixes": [
      "IV62448s3a.140715.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory.asc",
    "filesets": [
      "bos.rte.control:6.1.9.0-6.1.9.15"
    ],
    "issued": "20140815",
    "updated": "null",
    "siblings": [
      "6100-08:IV62447",
      "6100-09:IV62448",
      "7100-02:IV62449",
      "7100-03:IV62450"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix.tar",
    "cvss": [
      "CVE-2014-0191:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "AIX OpenSSL Vulnerabilities (Multiple CVEs)",
    "aparNo": "CVE-2014-0224",
    "aparNoSet": [
      "CVE-2014-0195",
      "CVE-2014-0198",
      "CVE-2014-0221",
      "CVE-2014-0224",
      "CVE-2014-3470"
    ],
    "fixedIn": "Openssl-1.0.1.511 openssl-0.9.8.2502 openssl-12.9.8.2502",
    "ifixes": [
      "openssl-1.0.1.511.tar.Z",
      "openssl-0.9.8.2502.tar.Z",
      "openssl-12.9.8.2502.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory9.asc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.510",
      "openssl.base:0.9.8.401-0.9.8.2501",
      "openssl.base:12.9.8.1100-12.9.8.2501"
    ],
    "issued": "20140611",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2014-0224:5.8",
      "CVE-2014-0221:4.3",
      "CVE-2014-0195:7.5",
      "CVE-2014-0198:4.3",
      "CVE-2014-3470:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java"
    ],
    "apAbstract": "AIX Java Multiple Vulnerabilities (Oracle Java 2014 CPU)",
    "aparNo": "CVE-2014-0428",
    "aparNoSet": [
      "CVE-2013-5878",
      "CVE-2013-5884",
      "CVE-2013-5887",
      "CVE-2013-5888",
      "CVE-2013-5889",
      "CVE-2013-5896",
      "CVE-2013-5898",
      "CVE-2013-5899",
      "CVE-2013-5907",
      "CVE-2013-5910",
      "CVE-2014-0368",
      "CVE-2014-0373",
      "CVE-2014-0375",
      "CVE-2014-0376",
      "CVE-2014-0387",
      "CVE-2014-0403",
      "CVE-2014-0410",
      "CVE-2014-0411",
      "CVE-2014-0415",
      "CVE-2014-0416",
      "CVE-2014-0417",
      "CVE-2014-0422",
      "CVE-2014-0423",
      "CVE-2014-0424",
      "CVE-2014-0428"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "see",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2014_advisory.asc",
    "filesets": [
      "Java5:5.0.0.0-5.0.0.559",
      "Java6:6.0.0.0-6.0.0.434",
      "Java7:7.0.0.0-7.0.0.109"
    ],
    "issued": "20140306",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003ddka\u0026S_PKG\u003daix64j7b\u0026S_TACT\u003d105AGX05\u0026S_CMP\u003dJDK",
    "cvss": [
      "CVE-2014-0428:10",
      "CVE-2014-0422:10",
      "CVE-2013-5907:10",
      "CVE-2014-0415:10",
      "CVE-2014-0410:10",
      "CVE-2013-5889:9.3",
      "CVE-2014-0417:9.3",
      "CVE-2014-0387:7.6",
      "CVE-2014-0424:7.5",
      "CVE-2013-5878:7.5",
      "CVE-2014-0373:7.5",
      "CVE-2014-0375:5.8",
      "CVE-2014-0403:5.8",
      "CVE-2014-0423:5.5",
      "CVE-2014-0376:5",
      "CVE-2013-5910:5",
      "CVE-2013-5884:5",
      "CVE-2013-5896:5",
      "CVE-2013-5899:5",
      "CVE-2014-0416:5",
      "CVE-2013-5887:5",
      "CVE-2014-0368:5",
      "CVE-2013-5888:4.6",
      "CVE-2013-5898:4",
      "CVE-2014-0411:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java"
    ],
    "apAbstract": "Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition",
    "aparNo": "CVE-2014-0457",
    "aparNoSet": [
      "CVE-2013-6629",
      "CVE-2013-6954",
      "CVE-2014-0429",
      "CVE-2014-0446",
      "CVE-2014-0448",
      "CVE-2014-0449",
      "CVE-2014-0451",
      "CVE-2014-0452",
      "CVE-2014-0453",
      "CVE-2014-0454",
      "CVE-2014-0455",
      "CVE-2014-0457",
      "CVE-2014-0458",
      "CVE-2014-0459",
      "CVE-2014-0460",
      "CVE-2014-0461",
      "CVE-2014-0878",
      "CVE-2014-1876",
      "CVE-2014-2398",
      "CVE-2014-2401",
      "CVE-2014-2402",
      "CVE-2014-2409",
      "CVE-2014-2412",
      "CVE-2014-2414",
      "CVE-2014-2420",
      "CVE-2014-2421",
      "CVE-2014-2423",
      "CVE-2014-2427",
      "CVE-2014-2428"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "see",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_apr2014_advisory.asc",
    "filesets": [
      "Java5:5.0.0.0-5.0.0.575",
      "Java6:6.0.0.0-6.0.0.455",
      "Java7:7.0.0.0-7.0.0.130",
      "Java7:7.1.0.0-7.1.0.10"
    ],
    "issued": "20140619",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003ddka",
    "cvss": [
      "CVE-2014-0457:10",
      "CVE-2014-2421:10",
      "CVE-2014-0429:10",
      "CVE-2014-0461:9.3",
      "CVE-2014-0455:9.3",
      "CVE-2014-2428:7.6",
      "CVE-2014-0448:7.6",
      "CVE-2014-0454:7.5",
      "CVE-2014-0446:7.5",
      "CVE-2014-0452:7.5",
      "CVE-2014-0451:7.5",
      "CVE-2014-2402:7.5",
      "CVE-2014-2423:7.5",
      "CVE-2014-2427:7.5",
      "CVE-2014-0458:7.5",
      "CVE-2014-2414:7.5",
      "CVE-2014-2412:7.5",
      "CVE-2014-2409:6.4",
      "CVE-2014-0460:5.8",
      "CVE-2013-6954:5",
      "CVE-2013-6629:5",
      "CVE-2014-2401:5",
      "CVE-2014-0449:5",
      "CVE-2014-0459:4.3",
      "CVE-2014-0453:4",
      "CVE-2014-2398:3.5",
      "CVE-2014-1876:2.6",
      "CVE-2014-2420:2.6",
      "CVE-2014-0878:5.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "AIX OpenSSH Vulnerability",
    "aparNo": "CVE-2014-2532",
    "aparNoSet": [
      "CVE-2014-2532",
      "CVE-2014-2653"
    ],
    "fixedIn": "Openssh-6.0.0.6107",
    "ifixes": [
      "OpenSSH_6.0.0.6107.tar.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3619\u0026myns\u003dpwraix71\u0026mync\u003dE",
    "filesets": [
      "openssh.base:4.0.0.5200-6.0.0.6106"
    ],
    "issued": "20140617",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2014-2532:5",
      "CVE-2014-2653:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssh"
    ],
    "apAbstract": "AIX OpenSSH Vulnerability",
    "aparNo": "CVE-2014-2532",
    "aparNoSet": [
      "CVE-2014-2532",
      "CVE-2014-2653"
    ],
    "fixedIn": "Openssh-6.0.0.6107",
    "ifixes": [
      "OpenSSH_6.0.0.6107.tar.Z",
      "DEPRECATED::6201_mfix"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory4.asc",
    "filesets": [
      "openssh.base:4.0.0.5200-6.0.0.6106"
    ],
    "issued": "20140617",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2014-2532:5",
      "CVE-2014-2653:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "AIX Malloc vulnerability",
    "aparNo": "CVE-2014-3074",
    "aparNoSet": [
      "CVE-2014-3074",
      "IV62812"
    ],
    "fixedIn": "interim fix only",
    "ifixes": [
      "IV62812s9a.140728.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc",
    "filesets": [
      "bos.rte.libc:5.3.12.0-5.3.12.9"
    ],
    "issued": "20140630",
    "updated": "20150311",
    "siblings": [
      "5300-12:IV62812",
      "6100-07:IV62802",
      "6100-08:IV62803",
      "6100-09:IV62805",
      "7100-01:IV62806",
      "7100-02:IV62807",
      "7100-03:IV62808"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar",
    "cvss": [
      "CVE-2014-3074:7.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08",
      "6100-07-09"
    ],
    "apAbstract": "AIX Malloc vulnerability",
    "aparNo": "CVE-2014-3074",
    "aparNoSet": [
      "CVE-2014-3074",
      "IV62802"
    ],
    "fixedIn": "6100-07-10",
    "ifixes": [
      "IV62802s9a.140730.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc",
    "filesets": [
      "bos.rte.libc:6.1.7.0-6.1.7.20"
    ],
    "issued": "20140630",
    "updated": "20150311",
    "siblings": [
      "5300-12:IV62812",
      "6100-07:IV62802",
      "6100-08:IV62803",
      "6100-09:IV62805",
      "7100-01:IV62806",
      "7100-02:IV62807",
      "7100-03:IV62808"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar",
    "cvss": [
      "CVE-2014-3074:7.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05"
    ],
    "apAbstract": "AIX Malloc vulnerability",
    "aparNo": "CVE-2014-3074",
    "aparNoSet": [
      "CVE-2014-3074",
      "IV62803"
    ],
    "fixedIn": "6100-08-06",
    "ifixes": [
      "IV62803s4a.140730.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc",
    "filesets": [
      "bos.rte.libc:6.1.8.0-6.1.8.18"
    ],
    "issued": "20140630",
    "updated": "20150311",
    "siblings": [
      "5300-12:IV62812",
      "6100-07:IV62802",
      "6100-08:IV62803",
      "6100-09:IV62805",
      "7100-01:IV62806",
      "7100-02:IV62807",
      "7100-03:IV62808"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar",
    "cvss": [
      "CVE-2014-3074:7.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03"
    ],
    "apAbstract": "AIX Malloc vulnerability",
    "aparNo": "CVE-2014-3074",
    "aparNoSet": [
      "CVE-2014-3074",
      "IV62805"
    ],
    "fixedIn": "6100-09-04",
    "ifixes": [
      "IV62805s3a.140731.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc",
    "filesets": [
      "bos.rte.libc:6.1.9.0-6.1.9.15"
    ],
    "issued": "20140630",
    "updated": "20150311",
    "siblings": [
      "5300-12:IV62812",
      "6100-07:IV62802",
      "6100-08:IV62803",
      "6100-09:IV62805",
      "7100-01:IV62806",
      "7100-02:IV62807",
      "7100-03:IV62808"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar",
    "cvss": [
      "CVE-2014-3074:7.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-01-09"
    ],
    "apAbstract": "AIX Malloc vulnerability",
    "aparNo": "CVE-2014-3074",
    "aparNoSet": [
      "CVE-2014-3074",
      "IV62806"
    ],
    "fixedIn": "7100-01-10",
    "ifixes": [
      "IV62806s9a.140730.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc",
    "filesets": [
      "bos.rte.libc:7.1.1.0-7.1.1.20"
    ],
    "issued": "20140630",
    "updated": "20150311",
    "siblings": [
      "5300-12:IV62812",
      "6100-07:IV62802",
      "6100-08:IV62803",
      "6100-09:IV62805",
      "7100-01:IV62806",
      "7100-02:IV62807",
      "7100-03:IV62808"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar",
    "cvss": [
      "CVE-2014-3074:7.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05"
    ],
    "apAbstract": "AIX Malloc vulnerability",
    "aparNo": "CVE-2014-3074",
    "aparNoSet": [
      "CVE-2014-3074",
      "IV62807"
    ],
    "fixedIn": "7100-02-06",
    "ifixes": [
      "IV62807s4a.140730.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc",
    "filesets": [
      "bos.rte.libc:7.1.2.0-7.1.2.18"
    ],
    "issued": "20140630",
    "updated": "20150310",
    "siblings": [
      "5300-12:IV62812",
      "6100-07:IV62802",
      "6100-08:IV62803",
      "6100-09:IV62805",
      "7100-01:IV62806",
      "7100-02:IV62807",
      "7100-03:IV62808"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar",
    "cvss": [
      "CVE-2014-3074:7.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03"
    ],
    "apAbstract": "AIX Malloc vulnerability",
    "aparNo": "CVE-2014-3074",
    "aparNoSet": [
      "CVE-2014-3074",
      "IV62808"
    ],
    "fixedIn": "7100-03-04",
    "ifixes": [
      "IV62808s3a.140731.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc",
    "filesets": [
      "bos.rte.libc:7.1.3.0-7.1.3.15"
    ],
    "issued": "20140630",
    "updated": "20150311",
    "siblings": [
      "5300-12:IV62812",
      "6100-07:IV62802",
      "6100-08:IV62803",
      "6100-09:IV62805",
      "7100-01:IV62806",
      "7100-02:IV62807",
      "7100-03:IV62808"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_fix.tar",
    "cvss": [
      "CVE-2014-3074:7.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7",
      "2.2.1.8"
    ],
    "apAbstract": "VIOS Malloc vulnerability",
    "aparNo": "CVE-2014-3074",
    "aparNoSet": [
      "CVE-2014-3074",
      "IV62802"
    ],
    "fixedIn": "2.2.1.9",
    "ifixes": [
      "IV62802s9a.140730.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc",
    "filesets": [
      "bos.rte.libc:6.1.7.0-6.1.7.20"
    ],
    "issued": "20140630",
    "updated": "20150311",
    "siblings": [
      "6100-07:IV61313",
      "6100-08:IV61311",
      "6100-09:IV60935",
      "7100-01:IV61315",
      "7100-02:IV61314",
      "7100-03:IV60940"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar",
    "cvss": [
      "CVE-2014-3074:7.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2",
      "2.2.2.3",
      "2.2.2.4"
    ],
    "apAbstract": "VIOS Malloc vulnerability",
    "aparNo": "CVE-2014-3074",
    "aparNoSet": [
      "CVE-2014-3074",
      "IV62803"
    ],
    "fixedIn": "2.2.2.5",
    "ifixes": [
      "IV62803s4a.140730.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc",
    "filesets": [
      "bos.rte.libc:6.1.8.0-6.1.8.18"
    ],
    "issued": "20140630",
    "updated": "20150311",
    "siblings": [
      "5300-12:IV62812",
      "6100-07:IV62802",
      "6100-08:IV62803",
      "6100-09:IV62805",
      "7100-01:IV62806",
      "7100-02:IV62807",
      "7100-03:IV62808"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar",
    "cvss": [
      "CVE-2014-3074:7.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2",
      "2.2.3.3"
    ],
    "apAbstract": "VIOS Malloc vulnerability",
    "aparNo": "CVE-2014-3074",
    "aparNoSet": [
      "CVE-2014-3074",
      "IV62805"
    ],
    "fixedIn": "2.2.3.4",
    "ifixes": [
      "IV62805s3a.140731.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_advisory.asc",
    "filesets": [
      "bos.rte.libc:6.1.9.0-6.1.9.15"
    ],
    "issued": "20140630",
    "updated": "20150311",
    "siblings": [
      "5300-12:IV62812",
      "6100-07:IV62802",
      "6100-08:IV62803",
      "6100-09:IV62805",
      "7100-01:IV62806",
      "7100-02:IV62807",
      "7100-03:IV62808"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/malloc_ifix.tar",
    "cvss": [
      "CVE-2014-3074:7.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "AIX OpenSSL Denial of Service due to double free and others",
    "aparNo": "CVE-2014-3505",
    "aparNoSet": [
      "CVE-2014-3505",
      "CVE-2014-3506",
      "CVE-2014-3507",
      "CVE-2014-3508",
      "CVE-2014-3509",
      "CVE-2014-3510",
      "CVE-2014-3511",
      "CVE-2014-3512",
      "CVE-2014-5139"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "101_fix.140902.epkg.Z",
      "098_fix.140902.epkg.Z",
      "1298_fix.140902.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory10.asc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.511",
      "openssl.base:0.9.8.401-0.9.8.2502",
      "openssl.base:12.9.8.1100-12.9.8.2502"
    ],
    "issued": "20140909",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix10.tar",
    "cvss": [
      "CVE-2014-3505:5",
      "CVE-2014-3506:5",
      "CVE-2014-3507:5",
      "CVE-2014-3508:4.3",
      "CVE-2014-3509:4.3",
      "CVE-2014-3510:4.3",
      "CVE-2014-3511:4.3",
      "CVE-2014-3512:5",
      "CVE-2014-5139:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "AIX OpenSSL Denial of Service due to memory leak in  DTLS / AIX OpenSSL Patch to mitigate CVE-2014-3566 / AIX OpenSSL Denial of Service due to memory consumption",
    "aparNo": "CVE-2014-3513",
    "aparNoSet": [
      "CVE-2014-3513",
      "CVE-2014-3566",
      "CVE-2014-3567"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV66250s9a.141027.epkg.Z",
      "IV66250s9b.141027.epkg.Z",
      "IV66250s9c.141027.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.512",
      "openssl.base:0.9.8.401-0.9.8.2503",
      "openssl.base:12.9.8.1100-12.9.8.2503"
    ],
    "issued": "20141029",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix11.tar",
    "cvss": [
      "CVE-2014-3513:5",
      "CVE-2014-3566:4.3",
      "CVE-2014-3567:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Tivoli Directory Server"
    ],
    "apAbstract": "A security vulnerability has been identified in IBM Tivoli Directory Server shipped with AIX/VIOS",
    "aparNo": "CVE-2014-3566",
    "aparNoSet": [
      "CVE-2014-3566"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003dswg21687611",
    "filesets": [
      "Idsldap.*:6.0:6.1:6.2:6.3:6.3.1"
    ],
    "issued": "20141021",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "null",
    "cvss": [
      "CVE-2014-3566:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "Vulnerability in SSLv3 affects AIX",
    "aparNo": "CVE-2014-3566",
    "aparNoSet": [
      "CVE-2014-3566",
      "IV69768"
    ],
    "fixedIn": "6100-08-07",
    "ifixes": [
      "IV69768s6a.150515.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.0.0-6.1.8.18",
      "bos.net.tcp.client:6.1.0.0-6.1.8.19"
    ],
    "issued": "20150617",
    "updated": "20150626",
    "siblings": [
      "6100-08:IV69768",
      "6100-09:IV73324",
      "7100-02:IV73319",
      "7100-03:IV73316"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar",
    "cvss": [
      "CVE-2014-3566:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05"
    ],
    "apAbstract": "Vulnerability in SSLv3 affects AIX",
    "aparNo": "CVE-2014-3566",
    "aparNoSet": [
      "CVE-2014-3566",
      "IV73324"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV73324s5a.150515.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.0.0-6.1.9.45",
      "bos.net.tcp.client:6.1.0.0-6.1.9.48"
    ],
    "issued": "20150617",
    "updated": "20150626",
    "siblings": [
      "6100-08:IV69768",
      "6100-09:IV73324",
      "7100-02:IV73319",
      "7100-03:IV73316"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar",
    "cvss": [
      "CVE-2014-3566:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "Vulnerability in SSLv3 affects AIX",
    "aparNo": "CVE-2014-3566",
    "aparNoSet": [
      "CVE-2014-3566",
      "IV73319"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV73319s6a.150515.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.3.0-7.1.2.18",
      "bos.net.tcp.client:7.1.3.0-7.1.2.19"
    ],
    "issued": "20150617",
    "updated": "20150626",
    "siblings": [
      "6100-08:IV69768",
      "6100-09:IV73324",
      "7100-02:IV73319",
      "7100-03:IV73316"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar",
    "cvss": [
      "CVE-2014-3566:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05"
    ],
    "apAbstract": "Vulnerability in SSLv3 affects AIX",
    "aparNo": "CVE-2014-3566",
    "aparNoSet": [
      "CVE-2014-3566",
      "IV73316"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV73316s5a.150515.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.3.0-7.1.3.45",
      "bos.net.tcp.client:7.1.3.0-7.1.3.48"
    ],
    "issued": "20150617",
    "updated": "20150626",
    "siblings": [
      "6100-08:IV69768",
      "6100-09:IV73324",
      "7100-02:IV73319",
      "7100-03:IV73316"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar",
    "cvss": [
      "CVE-2014-3566:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6"
    ],
    "apAbstract": "Vulnerability in SSLv3 affects VIOS",
    "aparNo": "CVE-2014-3566",
    "aparNoSet": [
      "CVE-2014-3566",
      "IV69768"
    ],
    "fixedIn": "2.2.2.7",
    "ifixes": [
      "IV69768s6a.150515.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.0.0-6.1.8.18",
      "bos.net.tcp.client:6.1.0.0-6.1.8.19"
    ],
    "issued": "20150617",
    "updated": "20150618",
    "siblings": [
      "6100-08:IV69768",
      "6100-09:IV73324",
      "7100-02:IV73319",
      "7100-03:IV73316"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar",
    "cvss": [
      "CVE-2014-3566:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50"
    ],
    "apAbstract": "Vulnerability in SSLv3 affects VIOS",
    "aparNo": "CVE-2014-3566",
    "aparNoSet": [
      "CVE-2014-3566",
      "IV73324"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV73324s5a.150515.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.45",
      "bos.net.tcp.client:6.1.9.0-6.1.9.48"
    ],
    "issued": "20150617",
    "updated": "20150618",
    "siblings": [
      "6100-08:IV69768",
      "6100-09:IV73324",
      "7100-02:IV73319",
      "7100-03:IV73316"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix.tar",
    "cvss": [
      "CVE-2014-3566:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Multiple Security vulnerabilities in AIX OpenSSL",
    "aparNo": "CVE-2014-3570",
    "aparNoSet": [
      "CVE-2014-3570",
      "CVE-2014-3571",
      "CVE-2014-3572",
      "CVE-2014-8275",
      "CVE-2015-0204",
      "CVE-2015-0205",
      "CVE-2015-0206"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV69033s9a.150129.epkg.Z",
      "IV69033s9b.150129.epkg.Z",
      "IV69033s9c.150129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory12.asc",
    "filesets": [
      "openssl.base:0.9.8.401-0.9.8.2504",
      "openssl.base:1.0.1.500-1.0.1.513",
      "openssl.base:12.9.8.1100-12.9.8.2504"
    ],
    "issued": "20150204",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix12.tar",
    "cvss": [
      "CVE-2014-3570:2.6",
      "CVE-2014-3571:5",
      "CVE-2014-3572:1.2",
      "CVE-2014-8275:1.2",
      "CVE-2015-0204:1.2",
      "CVE-2015-0205:2.1",
      "CVE-2015-0206:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "rsyslog"
    ],
    "apAbstract": "Open Source RSyslog  vulnerability",
    "aparNo": "CVE-2014-3634",
    "aparNoSet": [
      "CVE-2014-3634",
      "CVE-2014-3683"
    ],
    "fixedIn": "next level",
    "ifixes": [
      "IV66633s0a.141107.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rsyslog_advisory.asc",
    "filesets": [
      "rsyslog.base:5.8.6.1-5.8.6.3"
    ],
    "issued": "20141114",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rsyslog_fix.tar",
    "cvss": [
      "CVE-2014-3634:5.0",
      "CVE-2014-3683:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java"
    ],
    "apAbstract": "Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition",
    "aparNo": "CVE-2014-4227",
    "aparNoSet": [
      "CVE-2014-3086",
      "CVE-2014-4208",
      "CVE-2014-4209",
      "CVE-2014-4218",
      "CVE-2014-4219",
      "CVE-2014-4220",
      "CVE-2014-4221",
      "CVE-2014-4227",
      "CVE-2014-4244",
      "CVE-2014-4252",
      "CVE-2014-4262",
      "CVE-2014-4263",
      "CVE-2014-4265",
      "CVE-2014-4266",
      "CVE-2014-4268"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "see",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jul2014_advisory.asc",
    "filesets": [
      "Java5:5.0.0.0-5.0.0.579",
      "Java6:6.0.0.0-6.0.0.459",
      "Java7:7.0.0.0-7.0.0.134",
      "Java7:7.1.0.0-7.1.0.14"
    ],
    "issued": "20140818",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003ddka",
    "cvss": [
      "CVE-2014-4227:10",
      "CVE-2014-4262:9.3",
      "CVE-2014-4219:9.3",
      "CVE-2014-4209:6.4",
      "CVE-2014-4220:5",
      "CVE-2014-4268:5",
      "CVE-2014-4218:5",
      "CVE-2014-4252:5",
      "CVE-2014-4266:5",
      "CVE-2014-4265:5",
      "CVE-2014-4221:4.3",
      "CVE-2014-4263:4",
      "CVE-2014-4244:4",
      "CVE-2014-4208:2.6",
      "CVE-2014-3086:9.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Kerberos"
    ],
    "apAbstract": "Multiple Security vulnerabilities in IBM NAS",
    "aparNo": "CVE-2014-4341",
    "aparNoSet": [
      "CVE-2014-4341",
      "CVE-2014-4343",
      "CVE-2014-4344"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "1506_fix.140813.epkg.Z",
      "1601_fix.140813.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nas_advisory1.asc",
    "filesets": [
      "krb5.server.rte:1.5.0.0-1.6.0.1",
      "krb5.client.rte:1.5.0.0-1.6.0.1"
    ],
    "issued": "20140828",
    "updated": "20140905",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nas1_fix.tar",
    "cvss": [
      "CVE-2014-4341:5.0",
      "CVE-2014-4343:5.0",
      "CVE-2014-4344:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-10",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09",
      "7100-01-00",
      "7100-01-01",
      "7100-01-10",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-01-09",
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06",
      "7100-02-07",
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07",
      "7100-03-08",
      "7100-03-09",
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03",
      "7100-04-04",
      "7100-04-05",
      "7100-04-06",
      "7100-05-01",
      "7100-05-02"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "CVE-2014-5209",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ06400s9a.180514.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-01",
      "7200-00-02",
      "7200-00-03",
      "7200-00-04",
      "7200-00-05",
      "7200-00-06",
      "7200-01-00",
      "7200-01-01",
      "7200-01-02",
      "7200-01-03",
      "7200-01-04",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "CVE-2014-5209",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ06400s9a.180514.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.0.10",
      "2.2.0.11",
      "2.2.0.12",
      "2.2.0.13",
      "2.2.1.1",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7",
      "2.2.1.8",
      "2.2.1.9",
      "2.2.2.1",
      "2.2.2.2",
      "2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6",
      "2.2.2.70",
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2",
      "2.2.3.3",
      "2.2.3.4",
      "2.2.3.50",
      "2.2.3.51",
      "2.2.3.52",
      "2.2.3.60",
      "2.2.3.70",
      "2.2.3.80",
      "2.2.3.90",
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.21",
      "2.2.4.22",
      "2.2.4.23",
      "2.2.4.30",
      "2.2.4.40",
      "2.2.4.50",
      "2.2.4.60",
      "2.2.5.0",
      "2.2.5.10",
      "2.2.5.20",
      "2.2.5.30",
      "2.2.5.40",
      "2.2.6.10",
      "2.2.6.21"
    ],
    "apAbstract": "Vulnerabilities in NTP affect VIOS",
    "aparNo": "CVE-2014-5209",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ06400s9a.180514.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Kerberos"
    ],
    "apAbstract": "AIX NAS vulnerability",
    "aparNo": "CVE-2014-5351",
    "aparNoSet": [
      "CVE-2014-5351"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "NAS_1.X.0.X_aix_image.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nas_advisory2.asc",
    "filesets": [
      "krb5.client.rte:1.5.0.7-1.6.0.2",
      "krb5.server.rte:1.5.0.7-1.6.0.2"
    ],
    "issued": "20150120",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2014-5351:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "AIX NAS (kerberos)"
    ],
    "apAbstract": "Multiple Security vulnerabilities in IBM NAS(kerberos)",
    "aparNo": "CVE-2014-5352",
    "aparNoSet": [
      "CVE-2014-5352",
      "CVE-2014-5355",
      "CVE-2014-9421",
      "CVE-2014-9422",
      "CVE-2014-9423"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "1507c_fix.150404.epkg.Z",
      "1507s_fix.150407.epkg.Z",
      "1602c_fix.150404.epkg.Z",
      "1602s_fix.150404.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nas_advisory3.asc",
    "filesets": [
      "krb5.client.rte:1.4.0.8-1.6.0.2",
      "krb5.server.rte:1.4.0.8-1.6.0.2"
    ],
    "issued": "20150521",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nas3_fix.tar",
    "cvss": [
      "CVE-2014-5352:9.0",
      "CVE-2014-5355:5.0",
      "CVE-2014-9421:9.0",
      "CVE-2014-9422:6.1",
      "CVE-2014-9423:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java"
    ],
    "apAbstract": "Multiple vulnerabilities in current releases of the IBM SDK Java Technology Edition; issues in the Oracle October 2014 Critical Patch Update plus the POODLE SSLv3 vulnerability and",
    "aparNo": "CVE-2014-6513",
    "aparNoSet": [
      "CVE-2014-3065",
      "CVE-2014-3566",
      "CVE-2014-4288",
      "CVE-2014-6457",
      "CVE-2014-6458",
      "CVE-2014-6466",
      "CVE-2014-6476",
      "CVE-2014-6492",
      "CVE-2014-6493",
      "CVE-2014-6502",
      "CVE-2014-6503",
      "CVE-2014-6506",
      "CVE-2014-6511",
      "CVE-2014-6512",
      "CVE-2014-6513",
      "CVE-2014-6515",
      "CVE-2014-6527",
      "CVE-2014-6531",
      "CVE-2014-6532",
      "CVE-2014-6558"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_oct2014_advisory.asc",
    "filesets": [
      "Java5.sdk:\u003c5.0.0.580",
      "Java6.sdk:\u003c6.0.0.460",
      "Java7.sdk:\u003c7.0.0.135",
      "Java71.sdk:\u003c7.1.0.15",
      "Java5_64.sdk:\u003c5.0.0.580",
      "Java6_64.sdk:\u003c6.0.0.460",
      "Java7_64.sdk:\u003c7.0.0.135",
      "Java71_64.sdk:\u003c7.1.0.15"
    ],
    "issued": "20141026",
    "updated": "20141114",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/developerworks/java/jdk/aix/service.html#levels",
    "cvss": [
      "CVE-2014-6513:10",
      "CVE-2014-6503:9.3",
      "CVE-2014-6532:9.3",
      "CVE-2014-4288:7.6",
      "CVE-2014-6493:7.6",
      "CVE-2014-6492:7.6",
      "CVE-2014-6458:6.9",
      "CVE-2014-6466:6.9",
      "CVE-2014-6506:6.8",
      "CVE-2014-6476:5",
      "CVE-2014-6515:5",
      "CVE-2014-6511:5",
      "CVE-2014-6531:4.3",
      "CVE-2014-6512:4.3",
      "CVE-2014-6457:4",
      "CVE-2014-6527:2.6",
      "CVE-2014-6502:2.6",
      "CVE-2014-6558:2.6",
      "CVE-2014-3065:6",
      "CVE-2014-3566:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java"
    ],
    "apAbstract": "Multiple vulnerabilities in current releases of IBM SDK Java Technology Edition; issues disclosed in the Oracle Feb 2015 Critical Patch Update vulnerability and two additional Vuln",
    "aparNo": "CVE-2014-6549",
    "aparNoSet": [
      "CVE-2014-3566",
      "CVE-2014-6549",
      "CVE-2014-6585",
      "CVE-2014-6587",
      "CVE-2014-6591",
      "CVE-2014-6593",
      "CVE-2014-8891",
      "CVE-2015-0400",
      "CVE-2015-0403",
      "CVE-2015-0406",
      "CVE-2015-0407",
      "CVE-2015-0408",
      "CVE-2015-0410",
      "CVE-2015-0412"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_feb2015_advisory.asc",
    "filesets": [
      "Java5.sdk:\u003c5.0.0.590",
      "Java6.sdk:\u003c6.0.0.470",
      "Java7.sdk:\u003c7.0.0.195",
      "Java71.sdk:\u003c7.1.0.75",
      "Java5_64.sdk:\u003c5.0.0.590",
      "Java6_64.sdk:\u003c6.0.0.470",
      "Java7_64.sdk:\u003c7.0.0.195",
      "Java71_64.sdk:\u003c7.1.0.75"
    ],
    "issued": "20150219",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2014-6549:10",
      "CVE-2015-0408:10",
      "CVE-2015-0412:10",
      "CVE-2015-0403:6.9",
      "CVE-2015-0406:5.8",
      "CVE-2015-0407:5",
      "CVE-2015-0400:5",
      "CVE-2014-3566:4.3",
      "CVE-2014-6587:4.3",
      "CVE-2014-6593:4",
      "CVE-2014-6591:2.6",
      "CVE-2014-6585:2.6",
      "CVE-2014-8891:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2014-8500",
    "aparNoSet": [
      "CVE-2014-8500"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IV68997m9a.150129.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10",
      "bos.net.tcp.server:5.3.12.0-5.3.12.6"
    ],
    "issued": "20150227",
    "updated": "null",
    "siblings": [
      "5300-12:IV68997",
      "6100-07:IV68994",
      "6100-08:IV68993",
      "7100-02:IV68995",
      "7100-03:IV68996"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar",
    "cvss": [
      "CVE-2014-8500:7.80"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2014-8500",
    "aparNoSet": [
      "CVE-2014-8500"
    ],
    "fixedIn": "6100-08-07",
    "ifixes": [
      "IV68993s6a.150129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.19",
      "bos.net.tcp.server:6.1.8.0-6.1.8.18"
    ],
    "issued": "20150227",
    "updated": "null",
    "siblings": [
      "5300-12:IV68997",
      "6100-07:IV68994",
      "6100-08:IV68993",
      "7100-02:IV68995",
      "7100-03:IV68996"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar",
    "cvss": [
      "CVE-2014-8500:7.80"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2014-8500",
    "aparNoSet": [
      "CVE-2014-8500"
    ],
    "fixedIn": "6100-09-05",
    "ifixes": [
      "IV68994s4a.150129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.30",
      "bos.net.tcp.server:6.1.9.0-6.1.9.30"
    ],
    "issued": "20150227",
    "updated": "null",
    "siblings": [
      "5300-12:IV68997",
      "6100-07:IV68994",
      "6100-08:IV68993",
      "7100-02:IV68995",
      "7100-03:IV68996"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar",
    "cvss": [
      "CVE-2014-8500:7.80"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2014-8500",
    "aparNoSet": [
      "CVE-2014-8500"
    ],
    "fixedIn": "7100-02-07",
    "ifixes": [
      "IV68996s4a.150129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.30",
      "bos.net.tcp.server:7.1.3.0-7.1.3.30"
    ],
    "issued": "20150227",
    "updated": "null",
    "siblings": [
      "5300-12:IV68997",
      "6100-07:IV68994",
      "6100-08:IV68993",
      "7100-02:IV68995",
      "7100-03:IV68996"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar",
    "cvss": [
      "CVE-2014-8500:7.80"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "CVE-2014-8500",
    "aparNoSet": [
      "CVE-2014-8500"
    ],
    "fixedIn": "7100-03-05",
    "ifixes": [
      "IV68995s6a.150129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.19",
      "bos.net.tcp.server:7.1.2.0-7.1.2.18"
    ],
    "issued": "20150227",
    "updated": "null",
    "siblings": [
      "5300-12:IV68997",
      "6100-07:IV68994",
      "6100-08:IV68993",
      "7100-02:IV68995",
      "7100-03:IV68996"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar",
    "cvss": [
      "CVE-2014-8500:7.80"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6"
    ],
    "apAbstract": "Vulnerability in VIOS bind",
    "aparNo": "CVE-2014-8500",
    "aparNoSet": [
      "CVE-2014-8500"
    ],
    "fixedIn": "2.2.2.7",
    "ifixes": [
      "IV68993s6a.150129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.19",
      "bos.net.tcp.server:6.1.8.0-6.1.8.18"
    ],
    "issued": "20150227",
    "updated": "null",
    "siblings": [
      "5300-12:IV68997",
      "6100-07:IV68994",
      "6100-08:IV68993",
      "7100-02:IV68995",
      "7100-03:IV68996"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar",
    "cvss": [
      "CVE-2014-8500:7.80"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4"
    ],
    "apAbstract": "Vulnerability in VIOS bind",
    "aparNo": "CVE-2014-8500",
    "aparNoSet": [
      "CVE-2014-8500"
    ],
    "fixedIn": "2.2.3.5",
    "ifixes": [
      "IV68994s4a.150129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.30",
      "bos.net.tcp.server:6.1.9.0-6.1.9.30"
    ],
    "issued": "20150227",
    "updated": "null",
    "siblings": [
      "5300-12:IV68997",
      "6100-07:IV68994",
      "6100-08:IV68993",
      "7100-02:IV68995",
      "7100-03:IV68996"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix7.tar",
    "cvss": [
      "CVE-2014-8500:7.80"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Tivoli Directory Server"
    ],
    "apAbstract": "Security TLS padding vulnerability affects IBM Tivoli/Security Directory Server",
    "aparNo": "CVE-2014-8730",
    "aparNoSet": [
      "CVE-2014-8730"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003dswg21692906",
    "filesets": [
      "ITDS"
    ],
    "issued": "20150123",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "http://www-933.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dSecurity%2BSystems\u0026product\u003dibm/Tivoli/Tivoli+Directory+Server\u0026release\u003d6.0.0.73\u0026platform\u003dAll\u0026function\u003dall",
    "cvss": [
      "CVE-2014-8730:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "Vulnerability in AIX tcpdump",
    "aparNo": "CVE-2014-8769",
    "aparNoSet": [
      "CVE-2014-8769",
      "IV68950"
    ],
    "fixedIn": "6100-08-07",
    "ifixes": [
      "IV68950s5a.150205.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.8.0-6.1.8.18"
    ],
    "issued": "20150318",
    "updated": "null",
    "siblings": [
      "6100-08:IV68950",
      "6100-09:IV68992",
      "7100-02:IV68951",
      "7100-03:IV67588"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar",
    "cvss": [
      "CVE-2014-8769:5.00"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04"
    ],
    "apAbstract": "Vulnerability in AIX tcpdump",
    "aparNo": "CVE-2014-8769",
    "aparNoSet": [
      "CVE-2014-8769",
      "IV68992"
    ],
    "fixedIn": "6100-09-05",
    "ifixes": [
      "IV68992s4a.150204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.30"
    ],
    "issued": "20150318",
    "updated": "null",
    "siblings": [
      "6100-08:IV68950",
      "6100-09:IV68992",
      "7100-02:IV68951",
      "7100-03:IV67588"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar",
    "cvss": [
      "CVE-2014-8769:5.00"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "Vulnerability in AIX tcpdump",
    "aparNo": "CVE-2014-8769",
    "aparNoSet": [
      "CVE-2014-8769",
      "IV68951"
    ],
    "fixedIn": "7100-02-07",
    "ifixes": [
      "IV68951s5a.150205.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.2.0-7.1.2.18"
    ],
    "issued": "20150318",
    "updated": "null",
    "siblings": [
      "6100-08:IV68950",
      "6100-09:IV68992",
      "7100-02:IV68951",
      "7100-03:IV67588"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar",
    "cvss": [
      "CVE-2014-8769:5.00"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04"
    ],
    "apAbstract": "Vulnerability in AIX tcpdump",
    "aparNo": "CVE-2014-8769",
    "aparNoSet": [
      "CVE-2014-8769",
      "IV67588"
    ],
    "fixedIn": "7100-03-05",
    "ifixes": [
      "IV67588s4a.150204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.3.0-7.1.3.30"
    ],
    "issued": "20150318",
    "updated": "null",
    "siblings": [
      "6100-08:IV68950",
      "6100-09:IV68992",
      "7100-02:IV68951",
      "7100-03:IV67588"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix.tar",
    "cvss": [
      "CVE-2014-8769:5.00"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "AIX cmdlvm vulnerability",
    "aparNo": "CVE-2014-8904",
    "aparNoSet": [
      "CVE-2014-8904",
      "IV68082"
    ],
    "fixedIn": "6100-08-07",
    "ifixes": [
      "IV68082s5b.150122.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc",
    "filesets": [
      "bos.rte.lvm:6.1.8.0-6.1.8.19"
    ],
    "issued": "20150113",
    "updated": "20150217",
    "siblings": [
      "5300-12:IV68070",
      "6100-08:IV68082",
      "6100-09:IV67907",
      "7100-02:IV68478",
      "7100-03:IV67908"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar",
    "cvss": [
      "CVE-2014-8904:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04"
    ],
    "apAbstract": "AIX cmdlvm vulnerability",
    "aparNo": "CVE-2014-8904",
    "aparNoSet": [
      "CVE-2014-8904",
      "IV67907"
    ],
    "fixedIn": "6100-09-05",
    "ifixes": [
      "IV67907s4b.150122.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc",
    "filesets": [
      "bos.rte.lvm:6.1.9.0-6.1.9.30"
    ],
    "issued": "20150113",
    "updated": "20150217",
    "siblings": [
      "5300-12:IV68070",
      "6100-08:IV68082",
      "6100-09:IV67907",
      "7100-02:IV68478",
      "7100-03:IV67908"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar",
    "cvss": [
      "CVE-2014-8904:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "AIX cmdlvm vulnerability",
    "aparNo": "CVE-2014-8904",
    "aparNoSet": [
      "CVE-2014-8904",
      "IV68478"
    ],
    "fixedIn": "7100-02-07",
    "ifixes": [
      "IV68478s5b.150122.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc",
    "filesets": [
      "bos.rte.lvm:7.1.2.0-7.1.2.18"
    ],
    "issued": "20150113",
    "updated": "20150217",
    "siblings": [
      "5300-12:IV68070",
      "6100-08:IV68082",
      "6100-09:IV67907",
      "7100-02:IV68478",
      "7100-03:IV67908"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar",
    "cvss": [
      "CVE-2014-8904:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04"
    ],
    "apAbstract": "AIX cmdlvm vulnerability",
    "aparNo": "CVE-2014-8904",
    "aparNoSet": [
      "CVE-2014-8904",
      "IV67908"
    ],
    "fixedIn": "7100-03-05",
    "ifixes": [
      "IV67908s4b.150122.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc",
    "filesets": [
      "bos.rte.lvm:7.1.3.0-7.1.3.30"
    ],
    "issued": "20150113",
    "updated": "20150217",
    "siblings": [
      "5300-12:IV68070",
      "6100-08:IV68082",
      "6100-09:IV67907",
      "7100-02:IV68478",
      "7100-03:IV67908"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar",
    "cvss": [
      "CVE-2014-8904:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "AIX cmdlvm vulnerability",
    "aparNo": "CVE-2014-8904",
    "aparNoSet": [
      "CVE-2014-8904",
      "IV68070"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IV68070s9b.150122.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc",
    "filesets": [
      "bos.rte.lvm:5.3.12.0-5.3.12.9"
    ],
    "issued": "20150113",
    "updated": "20150120",
    "siblings": [
      "5300-12:IV68070",
      "6100-08:IV68082",
      "6100-09:IV67907",
      "7100-02:IV68478",
      "7100-03:IV67908"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar",
    "cvss": [
      "CVE-2014-8904:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6"
    ],
    "apAbstract": "VIOS cmdlvm vulnerability",
    "aparNo": "CVE-2014-8904",
    "aparNoSet": [
      "CVE-2014-8904",
      "IV68082"
    ],
    "fixedIn": "2.2.2.7",
    "ifixes": [
      "IV68082s5b.150122.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc",
    "filesets": [
      "bos.rte.lvm:6.1.8.0-6.1.8.19"
    ],
    "issued": "20150113",
    "updated": "20150217",
    "siblings": [
      "5300-12:IV68070",
      "6100-08:IV68082",
      "6100-09:IV67907",
      "7100-02:IV68478",
      "7100-03:IV67908"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar",
    "cvss": [
      "CVE-2014-8904:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4"
    ],
    "apAbstract": "VIOS cmdlvm vulnerability",
    "aparNo": "CVE-2014-8904",
    "aparNoSet": [
      "CVE-2014-8904",
      "IV67907"
    ],
    "fixedIn": "2.2.3.5",
    "ifixes": [
      "IV67907s4b.150122.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_advisory.asc",
    "filesets": [
      "bos.rte.lvm:6.1.9.0-6.1.9.30"
    ],
    "issued": "20150113",
    "updated": "20150217",
    "siblings": [
      "5300-12:IV68070",
      "6100-08:IV68082",
      "6100-09:IV67907",
      "7100-02:IV68478",
      "7100-03:IV67908"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lvm_fix.tar",
    "cvss": [
      "CVE-2014-8904:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05"
    ],
    "apAbstract": "Vulnerabilities in NTPv4 affect AIX",
    "aparNo": "CVE-2014-9297",
    "aparNoSet": [
      "CVE-2014-9297",
      "CVE-2015-1799"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV71094s0a.150618.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.4"
    ],
    "issued": "20150629",
    "updated": "null",
    "siblings": [
      "6100-09:IV71094",
      "7100-03:IV71096"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar",
    "cvss": [
      "CVE-2014-9297:5.00",
      "CVE-2015-1799:5.40"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05"
    ],
    "apAbstract": "Vulnerabilities in NTPv4 affect AIX",
    "aparNo": "CVE-2014-9297",
    "aparNoSet": [
      "CVE-2014-9297",
      "CVE-2015-1799"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV71096s0a.150618.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc",
    "filesets": [
      "ntp.rte:7.1.0.0-7.1.0.4"
    ],
    "issued": "20150629",
    "updated": "null",
    "siblings": [
      "6100-09:IV71094",
      "7100-03:IV71096"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar",
    "cvss": [
      "CVE-2014-9297:5.00",
      "CVE-2015-1799:5.40"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50"
    ],
    "apAbstract": "Vulnerabilities in NTPv4 affect VIOS",
    "aparNo": "CVE-2014-9297",
    "aparNoSet": [
      "CVE-2014-9297",
      "CVE-2015-1799"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV71094s0a.150618.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_advisory.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.4"
    ],
    "issued": "20150629",
    "updated": "null",
    "siblings": [
      "6100-09:IV71094",
      "7100-03:IV71096"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp4_fix.tar",
    "cvss": [
      "CVE-2014-9297:5.00",
      "CVE-2015-1799:5.40"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "GSKit"
    ],
    "apAbstract": "The GSKit that is shipped with IBM Security/Tivoli Directory Server contains multiple security vulnerabilities including the FREAK: Factoring Attack on RSA-EXPORT keys TLS/SSL clie",
    "aparNo": "CVE-2015-0138",
    "aparNoSet": [
      "CVE-2015-0138",
      "CVE-2015-0159"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg3T1022075",
    "filesets": [
      "ISDS:6.3.1",
      "ITDS:6.3",
      "ITDS:6.2",
      "ITDS:6.1",
      "ITDS:6.0",
      "GSKit:\u003c8.0.50.41",
      "GSKit:\u003c7.0.5.5"
    ],
    "issued": "20150313",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2015-0159:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java"
    ],
    "apAbstract": "AIX IBM SDK Java JSSE vulnerability",
    "aparNo": "CVE-2015-0138",
    "aparNoSet": [
      "CVE-2015-0138"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/javajsse_advisory.asc",
    "filesets": [
      "Java5.sdk:\u003c5.0.0.590",
      "Java6.sdk:\u003c6.0.0.470",
      "Java7.sdk:\u003c7.0.0.195",
      "Java71.sdk:\u003c7.1.0.75",
      "Java5_64.sdk:\u003c5.0.0.590",
      "Java6_64.sdk:\u003c6.0.0.470",
      "Java7_64.sdk:\u003c7.0.0.195",
      "Java71_64.sdk:\u003c7.1.0.75"
    ],
    "issued": "20150413",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2015-0138:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Multiple Security vulnerabilities in AIX OpenSSL",
    "aparNo": "CVE-2015-0209",
    "aparNoSet": [
      "CVE-2015-0209",
      "CVE-2015-0286",
      "CVE-2015-0287",
      "CVE-2015-0288",
      "CVE-2015-0289",
      "CVE-2015-0292",
      "CVE-2015-0293"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV71446m9a.150410.epkg.Z",
      "IV71446m9b.150410.epkg.Z",
      "IV71446m9c.150410.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory13.asc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.513",
      "openssl.base:0.9.8.401-0.9.8.2504",
      "openssl.base:12.9.8.1100-12.9.8.2504"
    ],
    "issued": "20150413",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2015-0209:7.5",
      "CVE-2015-0286:5",
      "CVE-2015-0287:7.5",
      "CVE-2015-0288:5",
      "CVE-2015-0289:5",
      "CVE-2015-0292:7.5",
      "CVE-2015-0293:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2015-0491",
    "aparNoSet": [
      "CVE-2015-0192",
      "CVE-2015-0204",
      "CVE-2015-0458",
      "CVE-2015-0459",
      "CVE-2015-0469",
      "CVE-2015-0477",
      "CVE-2015-0478",
      "CVE-2015-0480",
      "CVE-2015-0486",
      "CVE-2015-0488",
      "CVE-2015-0491",
      "CVE-2015-1914",
      "CVE-2015-1916",
      "CVE-2015-2808"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_april2015_advisory.asc",
    "filesets": [
      "Java5.sdk:\u003c5.0.0.600",
      "Java6.sdk:\u003c6.0.0.480",
      "Java7.sdk:\u003c7.0.0.205",
      "Java71.sdk:\u003c7.1.0.85",
      "Java5_64.sdk:\u003c5.0.0.600",
      "Java6_64.sdk:\u003c6.0.0.480",
      "Java7_64.sdk:\u003c7.0.0.205",
      "Java71_64.sdk:\u003c7.1.0.85"
    ],
    "issued": "20150603",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2015-0491:10",
      "CVE-2015-0459:10",
      "CVE-2015-0469:10",
      "CVE-2015-0458:7.6",
      "CVE-2015-0480:5.8",
      "CVE-2015-0488:5",
      "CVE-2015-0478:4.3",
      "CVE-2015-0477:4.3",
      "CVE-2015-0204:4.3",
      "CVE-2015-0192:6.8",
      "CVE-2015-0486:5",
      "CVE-2015-2808:5",
      "CVE-2015-1916:5",
      "CVE-2015-1914:4.3",
      "CVE-2015-0138:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05"
    ],
    "apAbstract": "Vulnerability in NTPv3 affects AIX",
    "aparNo": "CVE-2015-1799",
    "aparNoSet": [
      "CVE-2015-1799",
      "IV73783"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV73783s5a.150714.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150821",
    "updated": "null",
    "siblings": [
      "6100-09:IV73783",
      "7100-03:IV74261"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar",
    "cvss": [
      "CVE-2015-1799:5.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05"
    ],
    "apAbstract": "Vulnerability in NTPv3 affects AIX",
    "aparNo": "CVE-2015-1799",
    "aparNoSet": [
      "CVE-2015-1799",
      "IV74261"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV74261s5a.150714.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.45"
    ],
    "issued": "20150821",
    "updated": "null",
    "siblings": [
      "6100-09:IV73783",
      "7100-03:IV74261"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar",
    "cvss": [
      "CVE-2015-1799:5.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "Vulnerability in NTPv3 affects AIX",
    "aparNo": "CVE-2015-1799",
    "aparNoSet": [
      "CVE-2015-1799",
      "IV74263"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV74263s6a.150714.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.19"
    ],
    "issued": "20150821",
    "updated": "null",
    "siblings": [
      "6100-09:IV73783",
      "7100-03:IV74261"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar",
    "cvss": [
      "CVE-2015-1799:5.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "Vulnerability in NTPv3 affects AIX",
    "aparNo": "CVE-2015-1799",
    "aparNoSet": [
      "CVE-2015-1799",
      "IV74261"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV74262s6a.150714.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.19"
    ],
    "issued": "20150821",
    "updated": "null",
    "siblings": [
      "6100-09:IV73783",
      "7100-03:IV74261"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar",
    "cvss": [
      "CVE-2015-1799:5.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50"
    ],
    "apAbstract": "Vulnerability in NTPv3 affects VIOS",
    "aparNo": "CVE-2015-1799",
    "aparNoSet": [
      "CVE-2015-1799",
      "IV73783"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV73783s5a.150714.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150821",
    "updated": "null",
    "siblings": [
      "6100-09:IV73783",
      "7100-03:IV74261"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar",
    "cvss": [
      "CVE-2015-1799:5.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6"
    ],
    "apAbstract": "Vulnerability in NTPv3 affects VIOS",
    "aparNo": "CVE-2015-1799",
    "aparNoSet": [
      "CVE-2015-1799",
      "IV74263"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV74263s6a.150714.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.19"
    ],
    "issued": "20150821",
    "updated": "null",
    "siblings": [
      "6100-09:IV73783",
      "7100-03:IV74261"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix3.tar",
    "cvss": [
      "CVE-2015-1799:5.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6",
      "2.2.2.70"
    ],
    "apAbstract": "Vulnerability in netstat affects VIOS",
    "aparNo": "CVE-2015-1799",
    "aparNoSet": [
      "CVE-2015-1799",
      "IV77037"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV77037s7a.150924.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.20"
    ],
    "issued": "20151012",
    "updated": "null",
    "siblings": [
      "6100-09:IV75940",
      "7100-03:IV77299"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar",
    "cvss": [
      "CVE-2015-4948:7.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2015-2638",
    "aparNoSet": [
      "CVE-2015-1931",
      "CVE-2015-2590",
      "CVE-2015-2601",
      "CVE-2015-2613",
      "CVE-2015-2619",
      "CVE-2015-2621",
      "CVE-2015-2625",
      "CVE-2015-2632",
      "CVE-2015-2637",
      "CVE-2015-2638",
      "CVE-2015-2664",
      "CVE-2015-4729",
      "CVE-2015-4731",
      "CVE-2015-4732",
      "CVE-2015-4733",
      "CVE-2015-4736",
      "CVE-2015-4748",
      "CVE-2015-4749",
      "CVE-2015-4760"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2015_advisory.asc",
    "filesets": [
      "Java5.sdk:\u003c5.0.0.615",
      "Java6.sdk:\u003c6.0.0.495",
      "Java7.sdk:\u003c7.0.0.255",
      "Java71.sdk:\u003c7.1.0.135",
      "Java5_64.sdk:\u003c5.0.0.615",
      "Java6_64.sdk:\u003c6.0.0.495",
      "Java7_64.sdk:\u003c7.0.0.255",
      "Java71_64.sdk:\u003c7.1.0.135"
    ],
    "issued": "20150731",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2015-4000:4.3",
      "CVE-2015-2638:10",
      "CVE-2015-4733:10",
      "CVE-2015-4732:10",
      "CVE-2015-2590:10",
      "CVE-2015-4731:10",
      "CVE-2015-4760:10",
      "CVE-2015-4736:9.3",
      "CVE-2015-4748:7.6",
      "CVE-2015-2664:6.9",
      "CVE-2015-2632:5",
      "CVE-2015-2637:5",
      "CVE-2015-2619:5",
      "CVE-2015-2621:5",
      "CVE-2015-2613:5",
      "CVE-2015-2601:5",
      "CVE-2015-4749:4.3",
      "CVE-2015-4729:4",
      "CVE-2015-2625:2.6",
      "CVE-2015-1931:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "GSKit \u0026 IBM SDK for Java \u0026 IBM SDK for Node.js"
    ],
    "apAbstract": "Vulnerability in RC4 stream cipher affects AIX",
    "aparNo": "CVE-2015-2808",
    "aparNoSet": [
      "CVE-2015-2808"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc",
    "filesets": [
      "Java71:\u003c\u003d7.1.0.75",
      "Java7:\u003c\u003d7.0.0.195",
      "Java6:\u003c\u003d6.0.0.470",
      "Java5:\u003c\u003d5.0.0.590",
      "Node.js:\u003c1.1.0.13"
    ],
    "issued": "20150427",
    "updated": "20150429",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2015-2808:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX",
    "aparNo": "CVE-2015-2808",
    "aparNoSet": [
      "CVE-2015-2808"
    ],
    "fixedIn": "6100-08-07",
    "ifixes": [
      "IV74915m6a.150727.epkg.Z",
      "IV74919m6a.150713.epkg.Z",
      "IV74926m6a.150711.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.8.0-6.1.8.18",
      "bos.net.tcp.client:6.1.8.0-6.1.8.19"
    ],
    "issued": "20150427",
    "updated": "20151215",
    "siblings": [
      "See",
      "advisory"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar",
    "cvss": [
      "CVE-2015-2808:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05"
    ],
    "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX",
    "aparNo": "CVE-2015-2808",
    "aparNoSet": [
      "CVE-2015-2808"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV74916m5a.150727.epkg.Z",
      "IV74920m5a.150713.epkg.Z",
      "IV74927m5a.150711.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.45",
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150427",
    "updated": "20151215",
    "siblings": [
      "See",
      "advisory"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar",
    "cvss": [
      "CVE-2015-2808:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX",
    "aparNo": "CVE-2015-2808",
    "aparNoSet": [
      "CVE-2015-2808"
    ],
    "fixedIn": "7100-02-07",
    "ifixes": [
      "IV74917m6a.150727.epkg.Z",
      "IV74921m6a.150713.epkg.Z",
      "IV74928m6a.150710.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.2.0-7.1.2.18",
      "bos.net.tcp.client:7.1.2.0-7.1.2.19"
    ],
    "issued": "20150427",
    "updated": "20151215",
    "siblings": [
      "See",
      "advisory"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar",
    "cvss": [
      "CVE-2015-2808:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05"
    ],
    "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on AIX",
    "aparNo": "CVE-2015-2808",
    "aparNoSet": [
      "CVE-2015-2808"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV74458m5a.150727.epkg.Z",
      "IV74922m5a.150713.epkg.Z",
      "IV74929m5a.150711.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.3.0-7.1.3.45",
      "bos.net.tcp.client:7.1.3.0-7.1.3.45"
    ],
    "issued": "20150427",
    "updated": "20151215",
    "siblings": [
      "See",
      "advisory"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar",
    "cvss": [
      "CVE-2015-2808:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6"
    ],
    "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on VIOS",
    "aparNo": "CVE-2015-2808",
    "aparNoSet": [
      "CVE-2015-2808"
    ],
    "fixedIn": "2.2.2.7",
    "ifixes": [
      "IV74915m6a.150727.epkg.Z",
      "IV74919m6a.150713.epkg.Z",
      "IV74926m6a.150711.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.8.0-6.1.8.18",
      "bos.net.tcp.client:6.1.8.0-6.1.8.19"
    ],
    "issued": "20150427",
    "updated": "20151215",
    "siblings": [
      "See",
      "advisory"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar",
    "cvss": [
      "CVE-2015-2808:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50"
    ],
    "apAbstract": "Vulnerability in RC4 stream cipher affects ftpd/sendmail_ssl/imapd/popd on VIOS",
    "aparNo": "CVE-2015-2808",
    "aparNoSet": [
      "CVE-2015-2808"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV74916m5a.150727.epkg.Z",
      "IV74920m5a.150713.epkg.Z",
      "IV74927m5a.150711.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_advisory.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.45",
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150427",
    "updated": "20151215",
    "siblings": [
      "See",
      "advisory"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rc4_fix.tar",
    "cvss": [
      "CVE-2015-2808:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Vulnerabilities in OpenSSL impact AIX",
    "aparNo": "CVE-2015-3194",
    "aparNoSet": [
      "CVE-2015-3194",
      "CVE-2015-3195",
      "CVE-2015-3196"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "101_ifix.151218.epkg.Z",
      "098_ifix.151218.epkg.Z",
      "1298_ifix.151218.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory15.asc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.515",
      "openssl.base:0.9.8.401-0.9.8.2506",
      "openssl.base:12.9.8.1100-12.9.8.2506"
    ],
    "issued": "20160115",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix15.tar",
    "cvss": [
      "CVE-2015-3194:5.3",
      "CVE-2015-3195:5.3",
      "CVE-2015-3196:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Vulnerabilities in OpenSSL affect AIX",
    "aparNo": "CVE-2015-3197",
    "aparNoSet": [
      "CVE-2015-3197",
      "CVE-2015-4000"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV81287m9b.160217.epkg.Z",
      "IV81287m9a.160217.epkg.Z",
      "IV81287m9c.160217.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory17.asc",
    "filesets": [
      "openssl.base:0.9.8.401-0.9.8.2506",
      "openssl.base:1.0.1.500-1.0.1.515",
      "openssl.base:12.9.8.1100-12.9.8.2506"
    ],
    "issued": "20160226",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix17.tar",
    "cvss": [
      "CVE-2015-3197:5.4",
      "CVE-2015-4000:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Multiple Security vulnerabilities in AIX OpenSSL",
    "aparNo": "CVE-2015-4000",
    "aparNoSet": [
      "CVE-2014-8176",
      "CVE-2015-1788",
      "CVE-2015-1789",
      "CVE-2015-1790",
      "CVE-2015-1791",
      "CVE-2015-1792",
      "CVE-2015-4000"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV74809s9a.150710.epkg.Z",
      "IV75570m9a.150729.epkg.Z",
      "IV74809s9b.150710.epkg.Z",
      "IV74809s9c.150710.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory14.asc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.514",
      "openssl.base:0.9.8.401-0.9.8.2505",
      "openssl.base:12.9.8.1100-12.9.8.2505"
    ],
    "issued": "20150715",
    "updated": "20150812",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix14.tar",
    "cvss": [
      "CVE-2015-4000:4.3",
      "CVE-2015-1788:5",
      "CVE-2015-1789:5",
      "CVE-2015-1790:5",
      "CVE-2015-1791:5",
      "CVE-2015-1792:5",
      "CVE-2014-8176:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50"
    ],
    "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on VIOS",
    "aparNo": "CVE-2015-4000",
    "aparNoSet": [
      "CVE-2015-4000"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV75643m5a.150731.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150807",
    "updated": "null",
    "siblings": [
      "6100-08:IV75644",
      "6100-09:IV75643",
      "7100-02:IV75645",
      "7100-03:IV75646"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar",
    "cvss": [
      "CVE-2015-4000:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX",
    "aparNo": "CVE-2015-4000",
    "aparNoSet": [
      "CVE-2015-4000"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV75644m6a.150731.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.19"
    ],
    "issued": "20150807",
    "updated": "null",
    "siblings": [
      "6100-08:IV75644",
      "6100-09:IV75643",
      "7100-02:IV75645",
      "7100-03:IV75646"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar",
    "cvss": [
      "CVE-2015-4000:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05"
    ],
    "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX",
    "aparNo": "CVE-2015-4000",
    "aparNoSet": [
      "CVE-2015-4000"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV75643m5a.150731.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150807",
    "updated": "null",
    "siblings": [
      "6100-08:IV75644",
      "6100-09:IV75643",
      "7100-02:IV75645",
      "7100-03:IV75646"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar",
    "cvss": [
      "CVE-2015-4000:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX",
    "aparNo": "CVE-2015-4000",
    "aparNoSet": [
      "CVE-2015-4000"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV75645m6a.150731.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.19"
    ],
    "issued": "20150807",
    "updated": "null",
    "siblings": [
      "6100-08:IV75644",
      "6100-09:IV75643",
      "7100-02:IV75645",
      "7100-03:IV75646"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar",
    "cvss": [
      "CVE-2015-4000:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05"
    ],
    "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on AIX",
    "aparNo": "CVE-2015-4000",
    "aparNoSet": [
      "CVE-2015-4000"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV75646m5a.150731.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.45"
    ],
    "issued": "20150807",
    "updated": "null",
    "siblings": [
      "6100-08:IV75644",
      "6100-09:IV75643",
      "7100-02:IV75645",
      "7100-03:IV75646"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar",
    "cvss": [
      "CVE-2015-4000:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6"
    ],
    "apAbstract": "Vulnerability in Diffie-Hellman ciphers affects sendmail on VIOS",
    "aparNo": "CVE-2015-4000",
    "aparNoSet": [
      "CVE-2015-4000"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV75644m6a.150731.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.8.19"
    ],
    "issued": "20150807",
    "updated": "null",
    "siblings": [
      "6100-08:IV75644",
      "6100-09:IV75643",
      "7100-02:IV75645",
      "7100-03:IV75646"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix.tar",
    "cvss": [
      "CVE-2015-4000:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2015-4844",
    "aparNoSet": [
      "CVE-2015-4734",
      "CVE-2015-4803",
      "CVE-2015-4805",
      "CVE-2015-4806",
      "CVE-2015-4810",
      "CVE-2015-4835",
      "CVE-2015-4840",
      "CVE-2015-4842",
      "CVE-2015-4843",
      "CVE-2015-4844",
      "CVE-2015-4860",
      "CVE-2015-4871",
      "CVE-2015-4872",
      "CVE-2015-4882",
      "CVE-2015-4883",
      "CVE-2015-4893",
      "CVE-2015-4902",
      "CVE-2015-4903",
      "CVE-2015-4911",
      "CVE-2015-5006"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_oct2015_advisory.asc",
    "filesets": [
      "Java5.sdk:\u003c5.0.0.620",
      "Java6.sdk:\u003c6.0.0.510",
      "Java7.sdk:\u003c7.0.0.270",
      "Java71.sdk:\u003c7.1.0.150",
      "Java8.sdk:\u003c8.0.0.70",
      "Java5_64.sdk:\u003c5.0.0.620",
      "Java6_64.sdk:\u003c6.0.0.510",
      "Java7_64.sdk:\u003c7.0.0.270",
      "Java71_64.sdk:\u003c7.1.0.150",
      "Java8_64.sdk:\u003c8.0.0.70"
    ],
    "issued": "20151210",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2015-4844:10",
      "CVE-2015-4843:10",
      "CVE-2015-4805:10",
      "CVE-2015-4860:10",
      "CVE-2015-4883:10",
      "CVE-2015-4835:10",
      "CVE-2015-4810:6.9",
      "CVE-2015-4806:6.4",
      "CVE-2015-4871:5.8",
      "CVE-2015-4902:5",
      "CVE-2015-4872:5",
      "CVE-2015-4911:5",
      "CVE-2015-4893:5",
      "CVE-2015-4840:5",
      "CVE-2015-4842:5",
      "CVE-2015-4882:5",
      "CVE-2015-4903:5",
      "CVE-2015-4803:5",
      "CVE-2015-4734:5",
      "CVE-2015-5006:4.6"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in netstat affects AIX",
    "aparNo": "CVE-2015-4948",
    "aparNoSet": [
      "CVE-2015-4948",
      "IV77039"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV77039s9b.151016.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20151012",
    "updated": "20151016",
    "siblings": [
      "6100-09:IV75940",
      "7100-03:IV77299"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar",
    "cvss": [
      "CVE-2015-4948:7.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05"
    ],
    "apAbstract": "Vulnerability in netstat affects AIX",
    "aparNo": "CVE-2015-4948",
    "aparNoSet": [
      "CVE-2015-4948",
      "IV75940"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV75940s5b.151016.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20151012",
    "updated": "20151016",
    "siblings": [
      "6100-09:IV75940",
      "7100-03:IV77299"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar",
    "cvss": [
      "CVE-2015-4948:7.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05"
    ],
    "apAbstract": "Vulnerability in netstat affects AIX",
    "aparNo": "CVE-2015-4948",
    "aparNoSet": [
      "CVE-2015-4948",
      "IV77299"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV77299s5b.151016.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.45"
    ],
    "issued": "20151012",
    "updated": "20151016",
    "siblings": [
      "6100-09:IV75940",
      "7100-03:IV77299"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar",
    "cvss": [
      "CVE-2015-4948:7.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06",
      "6100-08-07"
    ],
    "apAbstract": "Vulnerability in netstat affects AIX",
    "aparNo": "CVE-2015-4948",
    "aparNoSet": [
      "CVE-2015-4948",
      "IV77037"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV77037s7a.150924.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.20"
    ],
    "issued": "20151012",
    "updated": "null",
    "siblings": [
      "6100-09:IV75940",
      "7100-03:IV77299"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar",
    "cvss": [
      "CVE-2015-4948:7.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06",
      "7100-02-07"
    ],
    "apAbstract": "Vulnerability in netstat affects AIX",
    "aparNo": "CVE-2015-4948",
    "aparNoSet": [
      "CVE-2015-4948",
      "IV77038"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV77038s7a.150924.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.20"
    ],
    "issued": "20151012",
    "updated": "null",
    "siblings": [
      "6100-09:IV75940",
      "7100-03:IV77299"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar",
    "cvss": [
      "CVE-2015-4948:7.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50"
    ],
    "apAbstract": "Vulnerability in netstat affects VIOS",
    "aparNo": "CVE-2015-4948",
    "aparNoSet": [
      "CVE-2015-4948",
      "IV75940"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV75940s5b.151016.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20151012",
    "updated": "20151016",
    "siblings": [
      "6100-09:IV75940",
      "7100-03:IV77299"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/netstat_fix.tar",
    "cvss": [
      "CVE-2015-4948:7.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "NTPv4"
    ],
    "apAbstract": "Vulnerability in NTPv4 affects AIX",
    "aparNo": "CVE-2015-5300",
    "aparNoSet": [
      "CVE-2015-5300"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV81129m6a.160204.epkg.Z",
      "IV81130m5a.160204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory5.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.4",
      "ntp.rte:7.1.0.0-7.1.0.4"
    ],
    "issued": "20160222",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix5.tar",
    "cvss": [
      "CVE-2015-5300:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "AIX OpenSSH Vulnerability",
    "aparNo": "CVE-2015-5352",
    "aparNoSet": [
      "CVE-2015-5352"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "OpenSSH_6.0.0.6110.tar.Z",
      "OpenSSH_6.0.0.6201.tar.Z",
      "DEPRECATED::6201_mfix"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory5.asc",
    "filesets": [
      "openssh.base.client:4.0.0.5200-6.0.0.6200",
      "openssh.base.server:4.0.0.5200-6.0.0.6200"
    ],
    "issued": "20150904",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2015-5352:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "CVE-2015-5477",
    "aparNoSet": [
      "CVE-2015-5477",
      "IV75966"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV75966s9a.150813.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20150813",
    "updated": "20150817",
    "siblings": [
      "6100-09:IV75692",
      "7100-03:IV75693"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar",
    "cvss": [
      "CVE-2015-5477:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "CVE-2015-5477",
    "aparNoSet": [
      "CVE-2015-5477",
      "IV75692"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV75692s5a.150803.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150813",
    "updated": "20150817",
    "siblings": [
      "6100-09:IV75692",
      "7100-03:IV75693"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar",
    "cvss": [
      "CVE-2015-5477:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "CVE-2015-5477",
    "aparNoSet": [
      "CVE-2015-5477",
      "IV75693"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV75693s5a.150803.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.45"
    ],
    "issued": "20150813",
    "updated": "20150817",
    "siblings": [
      "6100-09:IV75692",
      "7100-03:IV75693"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar",
    "cvss": [
      "CVE-2015-5477:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "CVE-2015-5477",
    "aparNoSet": [
      "CVE-2015-5477",
      "IV75694"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV75694s6a.150803.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.19"
    ],
    "issued": "20150813",
    "updated": "20150817",
    "siblings": [
      "6100-09:IV75692",
      "7100-03:IV75693"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar",
    "cvss": [
      "CVE-2015-5477:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "CVE-2015-5477",
    "aparNoSet": [
      "CVE-2015-5477",
      "IV75690"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV75690s6a.150803.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.19"
    ],
    "issued": "20150813",
    "updated": "20150817",
    "siblings": [
      "6100-09:IV75692",
      "7100-03:IV75693"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar",
    "cvss": [
      "CVE-2015-5477:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50"
    ],
    "apAbstract": "Vulnerability in BIND affects VIOS",
    "aparNo": "CVE-2015-5477",
    "aparNoSet": [
      "CVE-2015-5477",
      "IV75692"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV75692s5a.150803.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150813",
    "updated": "20150817",
    "siblings": [
      "6100-09:IV75692",
      "7100-03:IV75693"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar",
    "cvss": [
      "CVE-2015-5477:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6"
    ],
    "apAbstract": "Vulnerability in BIND affects VIOS",
    "aparNo": "CVE-2015-5477",
    "aparNoSet": [
      "CVE-2015-5477",
      "IV75694"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV75694s6a.150803.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.19"
    ],
    "issued": "20150813",
    "updated": "20150817",
    "siblings": [
      "6100-09:IV75692",
      "7100-03:IV75693"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix8.tar",
    "cvss": [
      "CVE-2015-5477:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "CVE-2015-5722",
    "aparNoSet": [
      "CVE-2015-5722",
      "IV78092"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV78092m9a.151103.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20151104",
    "updated": "null",
    "siblings": [
      "6100-09:IV78091",
      "7100-03:IV78095"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar",
    "cvss": [
      "CVE-2015-5722:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "CVE-2015-5722",
    "aparNoSet": [
      "CVE-2015-5722",
      "IV78091"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV78091m5a.151020.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20151104",
    "updated": "null",
    "siblings": [
      "6100-09:IV78091",
      "7100-03:IV78095"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar",
    "cvss": [
      "CVE-2015-5722:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "CVE-2015-5722",
    "aparNoSet": [
      "CVE-2015-5722",
      "IV78095"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV78095m5a.151019.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.45"
    ],
    "issued": "20151104",
    "updated": "null",
    "siblings": [
      "6100-09:IV78091",
      "7100-03:IV78095"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar",
    "cvss": [
      "CVE-2015-5722:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06",
      "6100-08-07"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "CVE-2015-5722",
    "aparNoSet": [
      "CVE-2015-5722",
      "IV78096"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV78096m7a.151021.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.20"
    ],
    "issued": "20151104",
    "updated": "null",
    "siblings": [
      "6100-09:IV78091",
      "7100-03:IV78095"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar",
    "cvss": [
      "CVE-2015-5722:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06",
      "7100-02-07"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "CVE-2015-5722",
    "aparNoSet": [
      "CVE-2015-5722",
      "IV78094"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV78094m7a.151020.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.20"
    ],
    "issued": "20151104",
    "updated": "null",
    "siblings": [
      "6100-09:IV78091",
      "7100-03:IV78095"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar",
    "cvss": [
      "CVE-2015-5722:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50"
    ],
    "apAbstract": "Vulnerability in BIND affects VIOS",
    "aparNo": "CVE-2015-5722",
    "aparNoSet": [
      "CVE-2015-5722",
      "IV78091"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV78091m5a.151020.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.45"
    ],
    "issued": "20151104",
    "updated": "null",
    "siblings": [
      "6100-09:IV78091",
      "7100-03:IV78095"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar",
    "cvss": [
      "CVE-2015-5722:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2:: 2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.2.6",
      "2.2.2.70"
    ],
    "apAbstract": "Vulnerability in BIND affects VIOS",
    "aparNo": "CVE-2015-5722",
    "aparNoSet": [
      "CVE-2015-5722",
      "IV78096"
    ],
    "fixedIn": "next TL",
    "ifixes": [
      "IV78096m7a.151021.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.20"
    ],
    "issued": "20151104",
    "updated": "null",
    "siblings": [
      "6100-09:IV78091",
      "7100-03:IV78095"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix9.tar",
    "cvss": [
      "CVE-2015-5722:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "AIX OpenSSH Vulnerability",
    "aparNo": "CVE-2015-6563",
    "aparNoSet": [
      "CVE-2015-6563",
      "CVE-2015-6564"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "6110_ifix.151009.epkg.Z",
      "6201_ifix.151009.epkg.Z",
      "DEPRECATED::6201_mfix"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory6.asc",
    "filesets": [
      "openssh.base.client:4.0.0.5200-6.0.0.6201",
      "openssh.base.server:4.0.0.5200-6.0.0.6201"
    ],
    "issued": "20151019",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix6.tar",
    "cvss": [
      "CVE-2015-6563:4",
      "CVE-2015-6564:7.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "GSKit"
    ],
    "apAbstract": "Vulnerabilities in GSKit affect Tivoli Directory Server/IBM Security Directory Server on AIX",
    "aparNo": "CVE-2015-7421",
    "aparNoSet": [
      "CVE-2015-7420",
      "CVE-2015-7421"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "http://www.ibm.com/support/docview.wss?uid\u003disg3T1023277",
    "filesets": [
      "ISDS:6.4",
      "ISDS:6.3.1",
      "ITDS:6.3",
      "GSKit:\u003c8.0.50.53"
    ],
    "issued": "20151221",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2015-7420:3.7",
      "CVE-2015-7421:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Vulnerability in MD5 Signature and Hash Algorithm affects OpenSSL on AIX",
    "aparNo": "CVE-2015-7575",
    "aparNoSet": [
      "CVE-2015-7575"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "101a_fix.160129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory16.asc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.515"
    ],
    "issued": "20160129",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix16.tar",
    "cvss": [
      "CVE-2015-7575:7.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "NTPv4"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "CVE-2015-7973",
    "aparNoSet": [
      "CVE-2015-7973",
      "CVE-2015-7977",
      "CVE-2015-7979",
      "CVE-2015-8139",
      "CVE-2015-8140",
      "CVE-2015-8158"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV83992s5a.160602.epkg.Z",
      "IV83983s5a.160602.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.5",
      "ntp.rte:7.1.0.0-7.1.0.5"
    ],
    "issued": "20160608",
    "updated": "20160609",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar",
    "cvss": [
      "CVE-2015-7973:5.4",
      "CVE-2015-7977:5.3",
      "CVE-2015-7979:6.5",
      "CVE-2015-8158:5.3",
      "CVE-2015-8139:5.3",
      "CVE-2015-8140:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "NTPv4"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "CVE-2015-7974",
    "aparNoSet": [
      "CVE-2015-7974",
      "CVE-2016-1547",
      "CVE-2016-1550",
      "CVE-2016-1551",
      "CVE-2016-2517",
      "CVE-2016-2518",
      "CVE-2016-2519",
      "CVE-2016-4953",
      "CVE-2016-4954",
      "CVE-2016-4955",
      "CVE-2016-4957"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV87278s7a.160901.epkg.Z",
      "IV87279s7a.160901.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7",
      "ntp.rte:7.1.0.0-7.1.0.7"
    ],
    "issued": "20160906",
    "updated": "20160913",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar",
    "cvss": [
      "CVE-2015-7974:5.3",
      "CVE-2016-1550:4.0",
      "CVE-2016-1551:3.7",
      "CVE-2016-2517:4.2",
      "CVE-2016-2518:2.0",
      "CVE-2016-2519:4.2",
      "CVE-2016-1547:3.7",
      "CVE-2016-4957:7.5",
      "CVE-2016-4953:3.7",
      "CVE-2016-4954:3.7",
      "CVE-2016-4955:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "AIX OpenSSH Vulnerability",
    "aparNo": "CVE-2015-8325",
    "aparNoSet": [
      "CVE-2015-8325",
      "CVE-2016-6210",
      "CVE-2016-6515"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "6202_ifix.160830.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory9.asc",
    "filesets": [
      "openssh.base.client:4.0.0.5200-6.0.0.6202",
      "openssh.base.server:4.0.0.5200-6.0.0.6202"
    ],
    "issued": "20160906",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix9.tar",
    "cvss": [
      "CVE-2015-8325:7.4",
      "CVE-2016-6210:4.3",
      "CVE-2016-6515:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2015-8472",
    "aparNoSet": [
      "CVE-2015-5041",
      "CVE-2015-7575",
      "CVE-2015-7981",
      "CVE-2015-8126",
      "CVE-2015-8472",
      "CVE-2015-8540",
      "CVE-2016-0402",
      "CVE-2016-0448",
      "CVE-2016-0466",
      "CVE-2016-0475",
      "CVE-2016-0483",
      "CVE-2016-0494"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2016_advisory.asc",
    "filesets": [
      "Java6.sdk:\u003c6.0.0.535",
      "Java7.sdk:\u003c7.0.0.320",
      "Java71.sdk:\u003c7.1.0.200",
      "Java8.sdk:\u003c8.0.0.120",
      "Java6_64.sdk:\u003c6.0.0.535",
      "Java7_64.sdk:\u003c7.0.0.320",
      "Java71_64.sdk:\u003c7.1.0.200",
      "Java8_64.sdk:\u003c8.0.0.120"
    ],
    "issued": "20160224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2015-8472:6.3",
      "CVE-2016-0475:5.8",
      "CVE-2016-0466:5.0",
      "CVE-2016-0402:5.0",
      "CVE-2015-7575:7.1",
      "CVE-2016-0448:4.0",
      "CVE-2016-0494:10.0",
      "CVE-2016-0483:10.0",
      "CVE-2015-5041:4.8",
      "CVE-2015-7981:5.3",
      "CVE-2015-8126:7.8",
      "CVE-2015-8540:9.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "GSKit"
    ],
    "apAbstract": "Vulnerability in GSKit affects Tivoli Directory Server/IBM Security Directory Server on AIX",
    "aparNo": "CVE-2016-0201",
    "aparNoSet": [
      "CVE-2016-0201"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "http://www.ibm.com/support/docview.wss?uid\u003disg3T1023296",
    "filesets": [
      "ISDS:6.4",
      "ISDS:6.3.1",
      "ITDS:6.3",
      "GSKit:\u003c8.0.50.57"
    ],
    "issued": "20160127",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2016-0201:5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "AIX OpenSSH Vulnerability",
    "aparNo": "CVE-2016-0777",
    "aparNoSet": [
      "CVE-2016-0777",
      "CVE-2016-0778"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV80743m9a.160127.epkg.Z",
      "IV80743m9b.160127.epkg.Z",
      "DEPRECATED::6201_mfix"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory7.asc",
    "filesets": [
      "openssh.base.client:4.0.0.5200-6.0.0.6201",
      "openssh.base.server:4.0.0.5200-6.0.0.6201"
    ],
    "issued": "20160129",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix7.tar",
    "cvss": [
      "CVE-2016-0777:6.5",
      "CVE-2016-0778:5.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Multiple vulnerabilities in OpenSSL affect AIX",
    "aparNo": "CVE-2016-0800",
    "aparNoSet": [
      "CVE-2016-0702",
      "CVE-2016-0705",
      "CVE-2016-0797",
      "CVE-2016-0798",
      "CVE-2016-0799",
      "CVE-2016-0800"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV83169m9b.160401.epkg.Z",
      "IV83169m9a.160401.epkg.Z",
      "IV83169s9d.160401.epkg.Z",
      "IV83169m9c.160401.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory18.asc",
    "filesets": [
      "openssl.base:0.9.8.401-0.9.8.2506",
      "openssl.base:1.0.1.500-1.0.1.515",
      "openssl.base:1.0.2.500-1.0.2.500",
      "openssl.base:12.9.8.1100-12.9.8.2506"
    ],
    "issued": "20160404",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix18.tar",
    "cvss": [
      "CVE-2016-0800:7.4",
      "CVE-2016-0799:3.7",
      "CVE-2016-0798:7.1",
      "CVE-2016-0797:3.7",
      "CVE-2016-0705:3.7",
      "CVE-2016-0702:2.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Vulnerabilities in OpenSSL affect AIX",
    "aparNo": "CVE-2016-2176",
    "aparNoSet": [
      "CVE-2016-2105",
      "CVE-2016-2106",
      "CVE-2016-2108",
      "CVE-2016-2109",
      "CVE-2016-2176"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory20.asc",
    "filesets": [
      "openssl.base:0.9.8.401-0.9.8.2506",
      "openssl.base:1.0.1.500-1.0.1.515",
      "openssl.base:1.0.2.500",
      "openssl.base:12.9.8.1100-12.9.8.2506",
      "openssl.base:20.11.101.500"
    ],
    "issued": "20160712",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2016-2176:5.3",
      "CVE-2016-2109:5.3",
      "CVE-2016-2108:8.1",
      "CVE-2016-2106:5.6",
      "CVE-2016-2105:5.6"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Vulnerabilities in OpenSSL affect AIX",
    "aparNo": "CVE-2016-2177",
    "aparNoSet": [
      "CVE-2016-2177",
      "CVE-2016-2178",
      "CVE-2016-2179",
      "CVE-2016-2180",
      "CVE-2016-2181",
      "CVE-2016-2182",
      "CVE-2016-2183",
      "CVE-2016-6302",
      "CVE-2016-6303",
      "CVE-2016-6304",
      "CVE-2016-6306",
      "CVE-2016-7052"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory21.asc",
    "filesets": [
      "openssl.base:1.0.1.500-1.0.1.516",
      "openssl.base:1.0.2.500-1.0.2.800",
      "openssl.base:20.11.101.500-20.11.101.501"
    ],
    "issued": "20161114",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2016-2177:5.9",
      "CVE-2016-2178:5.3",
      "CVE-2016-2179:5.3",
      "CVE-2016-2180:7.5",
      "CVE-2016-2181:5.3",
      "CVE-2016-2182:4.3",
      "CVE-2016-2183:3.7",
      "CVE-2016-6302:5.3",
      "CVE-2016-6303:5.3",
      "CVE-2016-6304:7.5",
      "CVE-2016-2016-6306:4.3",
      "CVE-2016-7052:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Openssl"
    ],
    "apAbstract": "Vulnerability in OpenSSL affects AIX",
    "aparNo": "CVE-2016-2842",
    "aparNoSet": [
      "CVE-2016-2842"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV83169m9b.160401.epkg.Z",
      "IV83169m9a.160401.epkg.Z",
      "IV83169s9d.160401.epkg.Z",
      "IV83169m9c.160401.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory19.asc",
    "filesets": [
      "openssl.base:0.9.8.401-0.9.8.2506",
      "openssl.base:1.0.1.500-1.0.1.515",
      "openssl.base:1.0.2.500-1.0.2.500",
      "openssl.base:12.9.8.1100-12.9.8.2506"
    ],
    "issued": "20160418",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix18.tar",
    "cvss": [
      "CVE-2016-2842:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "Vulnerabilities in OpenSSH affect AIX",
    "aparNo": "CVE-2016-3115",
    "aparNoSet": [
      "CVE-2016-1908",
      "CVE-2016-3115"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IV84698m9b.160513.epkg.Z",
      "IV84698m9a.160513.epkg.Z",
      "DEPRECATED::6201_mfix"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory8.asc",
    "filesets": [
      "openssh.base.client:4.0.0.5200-6.0.0.6201",
      "openssh.base.server:4.0.0.5200-6.0.0.6201"
    ],
    "issued": "20160503",
    "updated": "20160513",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix8.tar",
    "cvss": [
      "CVE-2016-3115:8.8",
      "CVE-2016-1908:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2016-3443",
    "aparNoSet": [
      "CVE-2016-0264",
      "CVE-2016-0363",
      "CVE-2016-0376",
      "CVE-2016-0686",
      "CVE-2016-0687",
      "CVE-2016-3422",
      "CVE-2016-3426",
      "CVE-2016-3427",
      "CVE-2016-3443",
      "CVE-2016-3449"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_april2016_advisory.asc",
    "filesets": [
      "Java6.sdk:\u003c6.0.0.561",
      "Java7.sdk:\u003c7.0.0.370",
      "Java71.sdk:\u003c7.1.0.250",
      "Java8.sdk:\u003c8.0.0.130",
      "Java6_64.sdk:\u003c6.0.0.560",
      "Java7_64.sdk:\u003c7.0.0.370",
      "Java71_64.sdk:\u003c7.1.0.250",
      "Java8_64.sdk:\u003c8.0.0.130"
    ],
    "issued": "20160506",
    "updated": "20160518",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2016-3443:10.0",
      "CVE-2016-0687:10.0",
      "CVE-2016-0686:10.0",
      "CVE-2016-3427:10.0",
      "CVE-2016-3449:7.6",
      "CVE-2016-3422:5.0",
      "CVE-2016-3426:4.3",
      "CVE-2016-0264:5.6",
      "CVE-2016-0363:8.1",
      "CVE-2016-0376:8.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2016-3598",
    "aparNoSet": [
      "CVE-2016-3485",
      "CVE-2016-3511",
      "CVE-2016-3598"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2016_advisory.asc",
    "filesets": [
      "Java6.sdk:\u003c6.0.0.585",
      "Java7.sdk:\u003c7.0.0.450",
      "Java71.sdk:\u003c7.1.0.350",
      "Java8.sdk:\u003c8.0.0.310",
      "Java6_64.sdk:\u003c6.0.0.585",
      "Java7_64.sdk:\u003c7.0.0.450",
      "Java71_64.sdk:\u003c7.1.0.350",
      "Java8_64.sdk:\u003c8.0.0.310"
    ],
    "issued": "20160819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2016-3598:9.6",
      "CVE-2016-3511:7.7",
      "CVE-2016-3485:2.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2016-5582",
    "aparNoSet": [
      "CVE-2016-5542",
      "CVE-2016-5554",
      "CVE-2016-5556",
      "CVE-2016-5568",
      "CVE-2016-5573",
      "CVE-2016-5582",
      "CVE-2016-5597"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_oct2016_advisory.asc",
    "filesets": [
      "Java6.sdk:\u003c6.0.0.635",
      "Java7.sdk:\u003c7.0.0.560",
      "Java71.sdk:\u003c7.1.0.360",
      "Java8.sdk:\u003c8.0.0.321",
      "Java6_64.sdk:\u003c6.0.0.635",
      "Java7_64.sdk:\u003c7.0.0.560",
      "Java71_64.sdk:\u003c7.1.0.360",
      "Java8_64.sdk:\u003c8.0.0.321"
    ],
    "issued": "20161221",
    "updated": "20161223",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2016-5582:9.6",
      "CVE-2016-5568:9.6",
      "CVE-2016-5556:9.6",
      "CVE-2016-5573:8.3",
      "CVE-2016-5597:5.9",
      "CVE-2016-5554:4.3",
      "CVE-2016-5542:3.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX",
    "aparNo": "CVE-2016-6038",
    "aparNoSet": [
      "CVE-2016-6038"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV89386s9c.160923.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_mitigation.asc",
    "filesets": [
      "lwi.runtime:5.3.12.0-5.3.12.9"
    ],
    "issued": "20160922",
    "updated": "20160930",
    "siblings": [
      "5300-12:IV89386",
      "6100-09:IV89418",
      "7100-03:IV89385"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar",
    "cvss": [
      "CVE-2016-6038:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05"
    ],
    "apAbstract": "Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX",
    "aparNo": "CVE-2016-6038",
    "aparNoSet": [
      "CVE-2016-6038"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV89418s5a.160927.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_mitigation.asc",
    "filesets": [
      "lwi.runtime:6.1.9.0-6.1.9.99"
    ],
    "issued": "20160922",
    "updated": "20160930",
    "siblings": [
      "5300-12:IV89386",
      "6100-09:IV89418",
      "7100-03:IV89385"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar",
    "cvss": [
      "CVE-2016-6038:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "Vulnerabilities in OpenSSH affect AIX.",
    "aparNo": "CVE-2016-8858",
    "aparNoSet": [
      "CVE-2016-10009",
      "CVE-2016-10011",
      "CVE-2016-10012",
      "CVE-2016-8858"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "6203_ifix.170124.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory10.asc",
    "filesets": [
      "openssh.base.client:4.0.0.5200-6.0.0.6203",
      "openssh.base.server:4.0.0.5200-6.0.0.6203"
    ],
    "issued": "20170205",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "null",
    "cvss": [
      "CVE-2016-8858:5.3",
      "CVE-2016-10009:6.3",
      "CVE-2016-10011:5.5",
      "CVE-2016-10012:5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "CVE-2016-8864",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91253"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV91253m9b.161209.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client_core:5.3.12.0-5.3.12.10"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "6100-09:IV91254",
      "7100-03:IV91214",
      "7100-04:IV91255",
      "7200-00:IV91256",
      "7200-01:IV91257"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-06",
      "6100-09-07",
      "6100-09-08"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "CVE-2016-8864",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91254"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV91254m6b.161213.epkg.Z",
      "IV91254m7b.161209.epkg.Z",
      "IV91254m8b.161209.epkg.z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client_core:6.1.9.0-6.1.9.200"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "5300-12:IV91253",
      "7100-03:IV91214",
      "7100-04:IV91255",
      "7200-00:IV91256",
      "7200-01:IV91257"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-04",
      "7100-03-05",
      "7100-03-06"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "CVE-2016-8864",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91214"
    ],
    "fixedIn": "7100-03-07",
    "ifixes": [
      "IV91214m4b.161209.epkg.Z",
      "IV91214m5b.161209.epkg.Z",
      "IV91214m6a.161209.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.1.3.0-7.1.3.48"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "5300-12:IV91253",
      "6100-09:IV91254",
      "7100-04:IV91255",
      "7200-00:IV91256",
      "7200-01:IV91257"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "CVE-2016-8864",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91255"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV91255m1b.161213.epkg.Z",
      "IV91255m2a.161213.epkg.Z",
      "IV91255m3c.161213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.1.4.0-7.1.4.30"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "5300-12:IV91253",
      "6100-09:IV91254",
      "7100-03:IV91214",
      "7200-00:IV91256",
      "7200-01:IV91257"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "CVE-2016-8864",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91256"
    ],
    "fixedIn": "7200-00-03",
    "ifixes": [
      "IV91256m1b.161212.epkg.Z",
      "IV91256m2b.161209.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.0.0-7.2.0.2"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "5300-12:IV91253",
      "6100-09:IV91254",
      "7100-03:IV91214",
      "7100-04:IV91255",
      "7200-01:IV91257"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "CVE-2016-8864",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91257"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV91257m0a.161212.epkg.Z",
      "IV91257m1a.161213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.1.0"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "5300-12:IV91253",
      "6100-09:IV91254",
      "7100-03:IV91214",
      "7100-04:IV91255",
      "7200-00:IV91256"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "There are multiple vulnerabilities in IBM SDK Java Technology Edition",
    "aparNo": "CVE-2017-10345",
    "aparNoSet": [
      "CVE-2017-10165",
      "CVE-2017-10281",
      "CVE-2017-10285",
      "CVE-2017-10295",
      "CVE-2017-10309",
      "CVE-2017-10345",
      "CVE-2017-10346",
      "CVE-2017-10347",
      "CVE-2017-10348",
      "CVE-2017-10349",
      "CVE-2017-10350",
      "CVE-2017-10355",
      "CVE-2017-10356",
      "CVE-2017-10357",
      "CVE-2017-10388"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_oct2017_advisory.asc",
    "filesets": [
      "Java6:\u003c6.0.0.655",
      "Java6.jre:\u003c6.0.0.655",
      "Java6_64.jre:\u003c6.0.0.655",
      "Java6_64.sdk:\u003c6.0.0.655",
      "Java6.sdk:\u003c6.0.0.655",
      "Java7:\u003c7.0.0.615",
      "Java7_64.jre:\u003c7.0.0.615",
      "Java7.jre:\u003c7.0.0.615",
      "Java7_64.sdk:\u003c7.0.0.615",
      "Java7.sdk:\u003c7.0.0.615",
      "Java7.1.jre:\u003c7.1.0.415",
      "Java7.1_64.jre:\u003c7.1.0.415",
      "Java7.1:\u003c7.1.0.415",
      "Java7.1.sdk:\u003c7.1.0.415",
      "Java7.1_64.sdk:\u003c7.1.0.415",
      "Java8:\u003c8.0.0.505",
      "Java8.jre:\u003c8.0.0.505",
      "Java8_64.jr"
    ],
    "issued": "20171207",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2017-10345:3.1",
      "CVE-2017-10295:4",
      "CVE-2017-10281:5.3",
      "CVE-2017-10350:5.3",
      "CVE-2017-10347:5.3",
      "CVE-2017-10349:5.3",
      "CVE-2017-10348:5.3",
      "CVE-2017-10357:5.3",
      "CVE-2017-10355:5.3",
      "CVE-2017-10356:6.2",
      "CVE-2017-10309:7.1",
      "CVE-2017-10388:7.5",
      "CVE-2017-10285:9.6",
      "CVE-2017-10346:9.6",
      "CVE-2017-10165:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-06",
      "6100-09-07",
      "6100-09-08"
    ],
    "apAbstract": "There is a vulnerability in bellmail that impacts AIX.",
    "aparNo": "CVE-2017-1093",
    "aparNoSet": [
      "CVE-2017-1093"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IV92238m8a.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.200"
    ],
    "issued": "20170129",
    "updated": "null",
    "siblings": [
      "7200-01:IV92242",
      "7200-00:IV92241",
      "7100-03:IV92250",
      "7100-04:IV92240"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar",
    "cvss": [
      "CVE-2017-1093:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2",
      "2.2.3.3",
      "2.2.3.4",
      "2.2.3.50",
      "2.2.3.51",
      "2.2.3.52",
      "2.2.3.60",
      "2.2.3.70",
      "2.2.3.80"
    ],
    "apAbstract": "There is a vulnerability in bellmail that impacts VIOS.",
    "aparNo": "CVE-2017-1093",
    "aparNoSet": [
      "CVE-2017-1093"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IV92238m8a.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20170129",
    "updated": "null",
    "siblings": [
      "7200-01:IV92242",
      "7200-00:IV92241",
      "7100-03:IV92250",
      "7100-04:IV92240"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar",
    "cvss": [
      "CVE-2017-1093:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "There are multiple vulnerabilities in IBM SDK Java Technology Edition",
    "aparNo": "CVE-2017-1376",
    "aparNoSet": [
      "CVE-2017-10053",
      "CVE-2017-10067",
      "CVE-2017-10078",
      "CVE-2017-10087",
      "CVE-2017-10089",
      "CVE-2017-10090",
      "CVE-2017-10096",
      "CVE-2017-10101",
      "CVE-2017-10102",
      "CVE-2017-10105",
      "CVE-2017-10107",
      "CVE-2017-10108",
      "CVE-2017-10109",
      "CVE-2017-10110",
      "CVE-2017-10115",
      "CVE-2017-10116",
      "CVE-2017-10125",
      "CVE-2017-10243",
      "CVE-2017-1376",
      "CVE-2017-1541"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2017_advisory.asc",
    "filesets": [
      "Java6:\u003c6.0.0.650",
      "Java6.jre:\u003c6.0.0.650",
      "Java6_64.jre:\u003c6.0.0.650",
      "Java6_64.sdk:\u003c6.0.0.650",
      "Java6.sdk:\u003c6.0.0.650",
      "Java7:\u003c7.0.0.610",
      "Java7_64.jre:\u003c7.0.0.610",
      "Java7.jre:\u003c7.0.0.610",
      "Java7_64.sdk:\u003c7.0.0.610",
      "Java7.sdk:\u003c7.0.0.610",
      "Java7.1.jre:\u003c7.1.0.410",
      "Java7.1_64.jre:\u003c7.1.0.410",
      "Java7.1:\u003c7.1.0.410",
      "Java7.1.sdk:\u003c7.1.0.410",
      "Java7.1_64.sdk:\u003c7.1.0.410",
      "Java8:\u003c8.0.0.410",
      "Java8.jre:\u003c8.0.0.410",
      "Java8_64.jr"
    ],
    "issued": "20170901",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2017-1376:9.8",
      "CVE-2017-1541:7.3",
      "CVE-2017-10053:5.3",
      "CVE-2017-10067:7.5",
      "CVE-2017-10078:8.1",
      "CVE-2017-10087:9.6",
      "CVE-2017-10089:9.6",
      "CVE-2017-10090:9.6",
      "CVE-2017-10096:9.6",
      "CVE-2017-10101:9.6",
      "CVE-2017-10102:9",
      "CVE-2017-10105:4.3",
      "CVE-2017-10107:9.6",
      "CVE-2017-10108:5.3",
      "CVE-2017-10109:5.3",
      "CVE-2017-10110:9.6",
      "CVE-2017-10115:7.5",
      "CVE-2017-10116:8.3",
      "CVE-2017-10125:7.1",
      "CVE-2017-10243:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "There is a vulnerability in the AIX IBM Java 6 SDK installp and updatep packages",
    "aparNo": "CVE-2017-1541",
    "aparNoSet": [
      "CVE-2017-1541"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java6_advisory.asc",
    "filesets": [
      "Java6:6.0.0.215-6.0.0.645",
      "Java6.jre:6.0.0.215-6.0.0.645",
      "Java6_64.jre:6.0.0.215-6.0.0.645",
      "Java6_64.sdk:6.0.0.215-6.0.0.645",
      "Java6.sdk:6.0.0.215-6.0.0.645"
    ],
    "issued": "20171002",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2017-1541:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "Vulnerabilities in OpenSSH affect AIX.",
    "aparNo": "CVE-2017-15906",
    "aparNoSet": [
      "CVE-2017-15906"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "openssh-7.5.102.1100.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory11.asc",
    "filesets": [
      "openssh.base.client:4.0.0.5200-7.1.102.1100",
      "openssh.base.server:4.0.0.5200-7.1.102.1100"
    ],
    "issued": "20171114",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/reg/download.do?source\u003daixbp\u0026lang\u003den_US\u0026S_PKG\u003dopenssh\u0026cp\u003dUTF-8",
    "cvss": [
      "CVE-2017-15906:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "There are multiple vulnerabilities in IBM SDK Java Technology Edition",
    "aparNo": "CVE-2017-3289",
    "aparNoSet": [
      "CVE-2016-2183",
      "CVE-2016-5546",
      "CVE-2016-5547",
      "CVE-2016-5548",
      "CVE-2016-5549",
      "CVE-2016-5552",
      "CVE-2017-3231",
      "CVE-2017-3241",
      "CVE-2017-3252",
      "CVE-2017-3253",
      "CVE-2017-3259",
      "CVE-2017-3261",
      "CVE-2017-3272",
      "CVE-2017-3289"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2017_advisory.asc",
    "filesets": [
      "Java6:\u003c6.0.0.641",
      "Java7:\u003c7.0.0.601",
      "Java7.1:\u003c7.1.0.401",
      "Java8.sdk:\u003c8.0.0.401"
    ],
    "issued": "20170405",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2017-3289:9.6",
      "CVE-2017-3272:9.6",
      "CVE-2017-3241:9",
      "CVE-2017-3253:7.5",
      "CVE-2016-5546:7.5",
      "CVE-2016-5548:6.5",
      "CVE-2016-5549:6.5",
      "CVE-2017-3252:5.8",
      "CVE-2016-5547:5.3",
      "CVE-2016-5552:5.3",
      "CVE-2017-3261:4.3",
      "CVE-2017-3231:4.3",
      "CVE-2017-3259:3.7",
      "CVE-2016-2183:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "There are multiple vulnerabilities in IBM SDK Java Technology Edition",
    "aparNo": "CVE-2017-3514",
    "aparNoSet": [
      "CVE-2016-9840",
      "CVE-2016-9841",
      "CVE-2016-9842",
      "CVE-2016-9843",
      "CVE-2017-1289",
      "CVE-2017-3509",
      "CVE-2017-3511",
      "CVE-2017-3512",
      "CVE-2017-3514",
      "CVE-2017-3533",
      "CVE-2017-3539",
      "CVE-2017-3544"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_apr2017_advisory.asc",
    "filesets": [
      "Java6:\u003c6.0.0.645",
      "Java6.jre:\u003c6.0.0.645",
      "Java6_64.jre:\u003c6.0.0.645",
      "Java6_64.sdk:\u003c6.0.0.645",
      "Java6.sdk:\u003c6.0.0.645",
      "Java7:\u003c7.0.0.605",
      "Java7_64.jre:\u003c7.0.0.605",
      "Java7.jre:\u003c7.0.0.605",
      "Java7_64.sdk:\u003c7.0.0.605",
      "Java7.sdk:\u003c7.0.0.605",
      "Java7.1.jre:\u003c7.1.0.405",
      "Java7.1_64.jre:\u003c7.1.0.405",
      "Java7.1:\u003c7.1.0.405",
      "Java7.1.sdk:\u003c7.1.0.405",
      "Java7.1_64.sdk:\u003c7.1.0.405",
      "Java8:\u003c8.0.0.406",
      "Java8.jre:\u003c8.0.0.406",
      "Java8_64.jr"
    ],
    "issued": "20170621",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2017-3514:8.3",
      "CVE-2017-3512:8.3",
      "CVE-2017-3511:7.7",
      "CVE-2017-3509:4.2",
      "CVE-2017-3544:3.7",
      "CVE-2017-3533:3.7",
      "CVE-2017-3539:3.1",
      "CVE-2017-1289:8.2",
      "CVE-2016-9840:3.3",
      "CVE-2016-9841:3.3",
      "CVE-2016-9842:3.3",
      "CVE-2016-9843:3.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "There is a vulnerability in OpenSSL used by AIX",
    "aparNo": "CVE-2017-3731",
    "aparNoSet": [
      "CVE-2017-3731"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "102j_ifix.170207.epkg.Z",
      "fips_102j.170207.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory23.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.1000",
      "openssl.base:20.13.102.1000-20.13.102.1000"
    ],
    "issued": "20170217",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix23.tar",
    "cvss": [
      "CVE-2017-3731:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "Vulnerability in OpenSSL affects AIX",
    "aparNo": "CVE-2017-3735",
    "aparNoSet": [
      "CVE-2017-3735"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "openssl-1.0.2.1300.tar.Z",
      "openssl-20.13.102.1300.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory24.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.1100",
      "openssl.base:20.13.102.1000-20.13.102.1100"
    ],
    "issued": "20171214",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source\u003daixbp\u0026lang\u003den_US\u0026S_PKG\u003dopenssl\u0026cp\u003dUTF-8",
    "cvss": [
      "CVE-2017-3735:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "Vulnerability in OpenSSL affects AIX (CVE-2017-3737)",
    "aparNo": "CVE-2017-3737",
    "aparNoSet": [
      "CVE-2017-3737"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "102m_ifix.180105.epkg.Z",
      "fips_102m.180105.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory25.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.1300",
      "openssl.base:20.13.102.1000-20.13.102.1300"
    ],
    "issued": "20180129",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix25.tar",
    "cvss": [
      "CVE-2017-3737:5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "Vulnerability in OpenSSL affects AIX (CVE-2018-0732)",
    "aparNo": "CVE-2018-0732",
    "aparNoSet": [
      "CVE-2018-0732"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "102oa_ifix.180906.epkg.Z",
      "fips_102oa.180910.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory28.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.1500",
      "openssl.base:20.13.102.1000-20.13.102.1500"
    ],
    "issued": "20180919",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "http://www14.software.ibm.com/webapp/set2/sas/f/aix.efixmgmt/home.html",
    "cvss": [
      "CVE-2018-0732:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "There are vulnerabilities in OpenSSL used by AIX.",
    "aparNo": "CVE-2018-0734",
    "aparNoSet": [
      "CVE-2018-0734",
      "CVE-2018-5407"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "102p_fix.181127.epkg.Z",
      "fips_102p.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory29.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.1600",
      "openssl.base:20.13.102.1000-20.16.102.1600"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix29.tar",
    "cvss": [
      "CVE-2018-0734:3.7",
      "CVE-2018-5407:5.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "Vulnerability in OpenSSL affects AIX (CVE-2018-0737)",
    "aparNo": "CVE-2018-0737",
    "aparNoSet": [
      "CVE-2018-0737"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "openssl-1.0.2.1500.tar.Z",
      "openssl-20.13.102.1500.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory27.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.1300",
      "openssl.base:20.13.102.1000-20.13.102.1300"
    ],
    "issued": "20180702",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2018-0737:3.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "Vulnerability in OpenSSL affects AIX (CVE-2018-0739)",
    "aparNo": "CVE-2018-0739",
    "aparNoSet": [
      "CVE-2018-0739"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "102ma_ifix.180410.epkg.Z",
      "fips_102ma.180410.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory26.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.1300",
      "openssl.base:20.13.102.1000-20.13.102.1300"
    ],
    "issued": "20180501",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix26.tar",
    "cvss": [
      "CVE-2018-0739:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Tivoli Directory Server"
    ],
    "apAbstract": "Vulnerabilities in GSKit affect IBM Tivoli Directory Server and IBM Security Directory Server for AIX",
    "aparNo": "CVE-2018-1388",
    "aparNoSet": [
      "CVE-2016-0702",
      "CVE-2018-1388",
      "CVE-2018-1426",
      "CVE-2018-1427",
      "CVE-2018-1447"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "ITDS"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/itds_advisory2.asc",
    "filesets": [
      "ITDS:6.2.0.0-6.2.0.56",
      "ITDS:6.3.0.0-6.3.0.49",
      "ITDS:6.3.1.0-6.3.1.24",
      "ITDS:6.4.0.0-6.4.0.16"
    ],
    "issued": "20181214",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See Bulletin",
    "cvss": [
      "CVE-2018-1388:9.1",
      "CVE-2018-1427:6.2",
      "CVE-2018-1426:7.4",
      "CVE-2016-0702:2.9",
      "CVE-2018-1447:5.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2018-1517",
    "aparNoSet": [
      "CVE-2018-12539",
      "CVE-2018-1517",
      "CVE-2018-1656",
      "CVE-2018-2940",
      "CVE-2018-2952",
      "CVE-2018-2964",
      "CVE-2018-2973"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2018_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.630",
      "Java7_64.jre:\u003c7.0.0.630",
      "Java7.jre:\u003c7.0.0.630",
      "Java7_64.sdk:\u003c7.0.0.630",
      "Java7.sdk:\u003c7.0.0.630",
      "Java7.1.jre:\u003c7.1.0.430",
      "Java7.1_64.jre:\u003c7.1.0.430",
      "Java7.1:\u003c7.1.0.430",
      "Java7.1.sdk:\u003c7.1.0.430",
      "Java7.1_64.sdk:\u003c7.1.0.430",
      "Java8:\u003c8.0.0.521",
      "Java8.jre:\u003c8.0.0.521",
      "Java8_64.jre:\u003c8.0.0.521",
      "Java8.sdk:\u003c8.0.0.521",
      "Java8_64.sdk:\u003c8.0.0.521"
    ],
    "issued": "20180919",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2018-1517:5.9",
      "CVE-2018-1656:7.4",
      "CVE-2018-2973:5.9",
      "CVE-2018-2952:3.7",
      "CVE-2018-2940:4.3",
      "CVE-2018-2964:8.3",
      "CVE-2018-12539:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "Vulnerabilities in OpenSSH affect AIX.",
    "aparNo": "CVE-2018-15473",
    "aparNoSet": [
      "CVE-2018-15473"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "15473_fix.180919.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory12.asc",
    "filesets": [
      "openssh.base.client:4.0.0.5200-7.5.102.1500",
      "openssh.base.server:4.0.0.5200-7.5.102.1500"
    ],
    "issued": "20181024",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/reg/download.do?source\u003daixbp\u0026lang\u003den_US\u0026S_PKG\u003dopenssh\u0026cp\u003dUTF-8",
    "cvss": [
      "CVE-2018-15473:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2018-1890",
    "aparNoSet": [
      "CVE-2018-11212",
      "CVE-2018-12547",
      "CVE-2018-12549",
      "CVE-2018-1890",
      "CVE-2019-2422",
      "CVE-2019-2426",
      "CVE-2019-2449"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2019_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.640",
      "Java7_64.jre:\u003c7.0.0.640",
      "Java7.jre:\u003c7.0.0.640",
      "Java7_64.sdk:\u003c7.0.0.640",
      "Java7.sdk:\u003c7.0.0.640",
      "Java7.1.jre:\u003c7.1.0.440",
      "Java7.1_64.jre:\u003c7.1.0.440",
      "Java7.1:\u003c7.1.0.440",
      "Java7.1.sdk:\u003c7.1.0.440",
      "Java7.1_64.sdk:\u003c7.1.0.440",
      "Java8:\u003c8.0.0.530",
      "Java8.jre:\u003c8.0.0.530",
      "Java8_64.jre:\u003c8.0.0.530",
      "Java8.sdk:\u003c8.0.0.530",
      "Java8_64.sdk:\u003c8.0.0.530"
    ],
    "issued": "20180416",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2018-1890:5.6",
      "CVE-2018-12549:9.8",
      "CVE-2018-12547:9.8",
      "CVE-2019-2422:3.1",
      "CVE-2019-2449:3.1",
      "CVE-2019-2426:3.7",
      "CVE-2018-11212:3.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "zlib",
      "zlibNX"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to zlib and zlibNX",
    "aparNo": "CVE-2018-25032",
    "aparNoSet": [
      "CVE-2018-25032"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ41754s4a.220829.epkg.Z",
      "IJ42198s2a.220829.epkg.Z",
      "rpm.rte.4.15.1.1006",
      "rpm.rte.4.15.1.2006"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/zlib_advisory.asc",
    "filesets": [
      "rpm.rte:4.15.1.2000-4.15.1.2005",
      "rpm.rte:4.9.1.3-4.15.1.1005",
      "zlibNX.rte:7.2.4.0-7.2.4.7",
      "zlibNX.rte:7.3.0.0-7.3.0.1"
    ],
    "issued": "20220928",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/zlib_fix.tar ",
    "cvss": [
      "CVE-2018-25032:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2018-2579",
    "aparNoSet": [
      "CVE-2018-1417",
      "CVE-2018-2579",
      "CVE-2018-2582",
      "CVE-2018-2588",
      "CVE-2018-2599",
      "CVE-2018-2602",
      "CVE-2018-2603",
      "CVE-2018-2618",
      "CVE-2018-2633",
      "CVE-2018-2634",
      "CVE-2018-2637",
      "CVE-2018-2638",
      "CVE-2018-2639",
      "CVE-2018-2641",
      "CVE-2018-2657",
      "CVE-2018-2663",
      "CVE-2018-2677",
      "CVE-2018-2678"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2018_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.620",
      "Java7_64.jre:\u003c7.0.0.620",
      "Java7.jre:\u003c7.0.0.620",
      "Java7_64.sdk:\u003c7.0.0.620",
      "Java7.sdk:\u003c7.0.0.620",
      "Java7.1.jre:\u003c7.1.0.420",
      "Java7.1_64.jre:\u003c7.1.0.420",
      "Java7.1:\u003c7.1.0.420",
      "Java7.1.sdk:\u003c7.1.0.420",
      "Java7.1_64.sdk:\u003c7.1.0.420",
      "Java8:\u003c8.0.0.510",
      "Java8.jre:\u003c8.0.0.510",
      "Java8_64.jre:\u003c8.0.0.510",
      "Java8.sdk:\u003c8.0.0.510",
      "Java8_64.sdk:\u003c8.0.0.510"
    ],
    "issued": "20180501",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2018-2579:3.7",
      "CVE-2018-2588:4.3",
      "CVE-2018-2663:4.3",
      "CVE-2018-2677:4.3",
      "CVE-2018-2678:4.3",
      "CVE-2018-2602:4.5",
      "CVE-2018-2599:4.8",
      "CVE-2018-2603:5.3",
      "CVE-2018-2657:5.3",
      "CVE-2018-2618:5.9",
      "CVE-2018-2641:6.1",
      "CVE-2018-2582:6.5",
      "CVE-2018-2634:6.8",
      "CVE-2018-2637:7.4",
      "CVE-2018-2633:8.3",
      "CVE-2018-2638:8.3",
      "CVE-2018-2639:8.3",
      "CVE-2018-1417:8.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2018-2800",
    "aparNoSet": [
      "CVE-2018-2783",
      "CVE-2018-2790",
      "CVE-2018-2794",
      "CVE-2018-2795",
      "CVE-2018-2796",
      "CVE-2018-2797",
      "CVE-2018-2798",
      "CVE-2018-2799",
      "CVE-2018-2800"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_apr2018_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.625",
      "Java7_64.jre:\u003c7.0.0.625",
      "Java7.jre:\u003c7.0.0.625",
      "Java7_64.sdk:\u003c7.0.0.625",
      "Java7.sdk:\u003c7.0.0.625",
      "Java7.1.jre:\u003c7.1.0.425",
      "Java7.1_64.jre:\u003c7.1.0.425",
      "Java7.1:\u003c7.1.0.425",
      "Java7.1.sdk:\u003c7.1.0.425",
      "Java7.1_64.sdk:\u003c7.1.0.425",
      "Java8:\u003c8.0.0.515",
      "Java8.jre:\u003c8.0.0.515",
      "Java8_64.jre:\u003c8.0.0.515",
      "Java8.sdk:\u003c8.0.0.515",
      "Java8_64.sdk:\u003c8.0.0.515"
    ],
    "issued": "20180612",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2018-2800:4.2",
      "CVE-2018-2795:5.3",
      "CVE-2018-2796:5.3",
      "CVE-2018-2797:5.3",
      "CVE-2018-2798:5.3",
      "CVE-2018-2799:5.3",
      "CVE-2018-2783:7.4",
      "CVE-2018-2794:7.7",
      "CVE-2018-2790:3.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2018-3139",
    "aparNoSet": [
      "CVE-2018-13785",
      "CVE-2018-3136",
      "CVE-2018-3139",
      "CVE-2018-3149",
      "CVE-2018-3169",
      "CVE-2018-3180",
      "CVE-2018-3183",
      "CVE-2018-3214"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_oct2018_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.635",
      "Java7_64.jre:\u003c7.0.0.635",
      "Java7.jre:\u003c7.0.0.635",
      "Java7_64.sdk:\u003c7.0.0.635",
      "Java7.sdk:\u003c7.0.0.635",
      "Java7.1.jre:\u003c7.1.0.435",
      "Java7.1_64.jre:\u003c7.1.0.435",
      "Java7.1:\u003c7.1.0.435",
      "Java7.1.sdk:\u003c7.1.0.435",
      "Java7.1_64.sdk:\u003c7.1.0.435",
      "Java8:\u003c8.0.0.525",
      "Java8.jre:\u003c8.0.0.525",
      "Java8_64.jre:\u003c8.0.0.525",
      "Java8.sdk:\u003c8.0.0.525",
      "Java8_64.sdk:\u003c8.0.0.525"
    ],
    "issued": "20181214",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2018-3139:3.1",
      "CVE-2018-3136:3.4",
      "CVE-2018-13785:5.5",
      "CVE-2018-3214:5.3",
      "CVE-2018-3180:5.6",
      "CVE-2018-3149:8.3",
      "CVE-2018-3169:8.3",
      "CVE-2018-3183:9.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2019-10245",
    "aparNoSet": [
      "CVE-2019-10245",
      "CVE-2019-2602",
      "CVE-2019-2684",
      "CVE-2019-2697",
      "CVE-2019-2698"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_apr2019_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.645",
      "Java7_64.jre:\u003c7.0.0.645",
      "Java7.jre:\u003c7.0.0.645",
      "Java7_64.sdk:\u003c7.0.0.645",
      "Java7.sdk:\u003c7.0.0.645",
      "Java7.1.jre:\u003c7.1.0.445",
      "Java7.1_64.jre:\u003c7.1.0.445",
      "Java7.1:\u003c7.1.0.445",
      "Java7.1.sdk:\u003c7.1.0.445",
      "Java7.1_64.sdk:\u003c7.1.0.445",
      "Java8:\u003c8.0.0.535",
      "Java8.jre:\u003c8.0.0.535",
      "Java8_64.jre:\u003c8.0.0.535",
      "Java8.sdk:\u003c8.0.0.535",
      "Java8_64.sdk:\u003c8.0.0.535"
    ],
    "issued": "20190628",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2019-10245:7.5",
      "CVE-2019-2684:5.9",
      "CVE-2019-2602:7.5",
      "CVE-2019-2697:8.1",
      "CVE-2019-2698:8.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2019-11775",
    "aparNoSet": [
      "CVE-2019-11771",
      "CVE-2019-11772",
      "CVE-2019-11775",
      "CVE-2019-2762",
      "CVE-2019-2766",
      "CVE-2019-2769",
      "CVE-2019-2786",
      "CVE-2019-2816",
      "CVE-2019-4473",
      "CVE-2019-7317"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2019_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.650",
      "Java7_64.jre:\u003c7.0.0.650",
      "Java7.jre:\u003c7.0.0.650",
      "Java7_64.sdk:\u003c7.0.0.650",
      "Java7.sdk:\u003c7.0.0.650",
      "Java7.1.jre:\u003c7.1.0.450",
      "Java7.1_64.jre:\u003c7.1.0.450",
      "Java7.1:\u003c7.1.0.450",
      "Java7.1.sdk:\u003c7.1.0.450",
      "Java7.1_64.sdk:\u003c7.1.0.450",
      "Java8:\u003c8.0.0.540",
      "Java8.jre:\u003c8.0.0.540",
      "Java8_64.jre:\u003c8.0.0.540",
      "Java8.sdk:\u003c8.0.0.540",
      "Java8_64.sdk:\u003c8.0.0.540"
    ],
    "issued": "20191009",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2019-11775:8.4",
      "CVE-2019-11772:8.4",
      "CVE-2019-2766:3.1",
      "CVE-2019-2786:3.4",
      "CVE-2019-2816:4.8",
      "CVE-2019-2762:5.3",
      "CVE-2019-2769:5.3",
      "CVE-2019-7317:6.5",
      "CVE-2019-4473:8.4",
      "CVE-2019-11771:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "There is a vulnerability in OpenSSL used by AIX.",
    "aparNo": "CVE-2019-1547",
    "aparNoSet": [
      "CVE-2019-1547",
      "CVE-2019-1563"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "openssl-1.0.2.2000.tar.Z",
      "openssl-20.16.102.2000.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory31.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.1801",
      "openssl.base:20.13.102.1000-20.16.102.1801"
    ],
    "issued": "20191126",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp\u0026S_PKG\u003dopenssl",
    "cvss": [
      "CVE-2019-1547:5.5",
      "CVE-2019-1563:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "There is a vulnerability in OpenSSL used by AIX.",
    "aparNo": "CVE-2019-1559",
    "aparNoSet": [
      "CVE-2019-1559"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "102pa_mfix.190318.epkg.Z",
      "fips_102pa.190318.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory30.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.1601",
      "openssl.base:20.13.102.1000-20.16.102.1600"
    ],
    "issued": "20190416",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix30.tar",
    "cvss": [
      "CVE-2019-1559:5.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2019-2989",
    "aparNoSet": [
      "CVE-2019-17631",
      "CVE-2019-2933",
      "CVE-2019-2945",
      "CVE-2019-2958",
      "CVE-2019-2962",
      "CVE-2019-2964",
      "CVE-2019-2973",
      "CVE-2019-2975",
      "CVE-2019-2978",
      "CVE-2019-2981",
      "CVE-2019-2983",
      "CVE-2019-2988",
      "CVE-2019-2989",
      "CVE-2019-2992",
      "CVE-2019-2996",
      "CVE-2019-2999",
      "CVE-2020-2583",
      "CVE-2020-2593",
      "CVE-2020-2604",
      "CVE-2020-2659"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jan2020_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.660",
      "Java7_64.jre:\u003c7.0.0.660",
      "Java7.jre:\u003c7.0.0.660",
      "Java7_64.sdk:\u003c7.0.0.660",
      "Java7.sdk:\u003c7.0.0.660",
      "Java7.1.jre:\u003c7.1.0.460",
      "Java7.1_64.jre:\u003c7.1.0.460",
      "Java7.1:\u003c7.1.0.460",
      "Java7.1.sdk:\u003c7.1.0.460",
      "Java7.1_64.sdk:\u003c7.1.0.460",
      "Java8:\u003c8.0.0.605",
      "Java8.jre:\u003c8.0.0.605",
      "Java8_64.jre:\u003c8.0.0.605",
      "Java8.sdk:\u003c8.0.0.605",
      "Java8_64.sdk:\u003c8.0.0.605"
    ],
    "issued": "20200217",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2019-2989:6.8",
      "CVE-2019-2958:5.9",
      "CVE-2019-2975:4.8",
      "CVE-2019-2999:4.7",
      "CVE-2019-2996:4.2",
      "CVE-2019-2992:3.7",
      "CVE-2019-2988:3.7",
      "CVE-2019-2983:3.7",
      "CVE-2019-2981:3.7",
      "CVE-2019-2978:3.7",
      "CVE-2019-2973:3.7",
      "CVE-2019-2962:3.7",
      "CVE-2019-2964:3.7",
      "CVE-2019-2945:3.1",
      "CVE-2019-2933:3.1",
      "CVE-2019-17631:8.4",
      "CVE-2020-2604:8.1",
      "CVE-2020-2593:4.8",
      "CVE-2020-2659:3.7",
      "CVE-2020-2583:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "Vulnerabilities in OpenSSH affect AIX.",
    "aparNo": "CVE-2019-6109",
    "aparNoSet": [
      "CVE-2018-20685",
      "CVE-2019-6109",
      "CVE-2019-6110",
      "CVE-2019-6111"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "OpenSSH_7.5.102.1800.tar.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory13.asc",
    "filesets": [
      "openssh.base.client:4.0.0.5200-7.5.102.1600",
      "openssh.base.server:4.0.0.5200-7.5.102.1600"
    ],
    "issued": "20190716",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp\u0026S_PKG\u003dopenssh",
    "cvss": [
      "CVE-2019-6109:3.1",
      "CVE-2019-6110:3.1",
      "CVE-2019-6111:5.3",
      "CVE-2018-20685:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-02",
      "7100-05-03",
      "7100-05-04"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "CVE-2019-8936",
    "aparNoSet": [
      "CVE-2019-8936"
    ],
    "fixedIn": "7100-05-05",
    "ifixes": [
      "IJ17062m4a.190628.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.33"
    ],
    "issued": "20190819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar",
    "cvss": [
      "CVE-2019-8936:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-02",
      "7200-02-03",
      "7200-02-04"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "CVE-2019-8936",
    "aparNoSet": [
      "CVE-2019-8936"
    ],
    "fixedIn": "7200-02-05",
    "ifixes": [
      "IJ17064m4a.190701.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc",
    "filesets": [
      "bos.net.tcp.ntp:7.2.2.0-7.2.2.17",
      "bos.net.tcp.ntpd:7.2.2.0-7.2.2.17"
    ],
    "issued": "20190819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar",
    "cvss": [
      "CVE-2019-8936:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-01",
      "7200-03-02",
      "7200-03-03"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "CVE-2019-8936",
    "aparNoSet": [
      "CVE-2019-8936"
    ],
    "fixedIn": "7200-03-04",
    "ifixes": [
      "IJ17065m3a.190701.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc",
    "filesets": [
      "bos.net.tcp.ntp:7.2.3.0-7.2.3.15",
      "bos.net.tcp.ntpd:7.2.3.0-7.2.3.15"
    ],
    "issued": "20190819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar",
    "cvss": [
      "CVE-2019-8936:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-06",
      "7100-04-07",
      "7100-04-08"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "CVE-2019-8936",
    "aparNoSet": [
      "CVE-2019-8936"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ17061m8a.190628.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.35"
    ],
    "issued": "20190819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar",
    "cvss": [
      "CVE-2019-8936:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-04",
      "7200-01-05",
      "7200-01-06"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "CVE-2019-8936",
    "aparNoSet": [
      "CVE-2019-8936"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ17063m6a.190701.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc",
    "filesets": [
      "bos.net.tcp.ntp:7.2.1.0-7.2.1.2",
      "bos.net.tcp.ntpd:7.2.1.0-7.2.1.3"
    ],
    "issued": "20190819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar",
    "cvss": [
      "CVE-2019-8936:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2020-14621",
    "aparNoSet": [
      "CVE-2019-17639",
      "CVE-2020-14556",
      "CVE-2020-14577",
      "CVE-2020-14578",
      "CVE-2020-14579",
      "CVE-2020-14583",
      "CVE-2020-14593",
      "CVE-2020-14621",
      "CVE-2020-2590",
      "CVE-2020-2601"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_july2020_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.670",
      "Java7_64.jre:\u003c7.0.0.670",
      "Java7.jre:\u003c7.0.0.670",
      "Java7_64.sdk:\u003c7.0.0.670",
      "Java7.sdk:\u003c7.0.0.670",
      "Java7.1.jre:\u003c7.1.0.470",
      "Java7.1_64.jre:\u003c7.1.0.470",
      "Java7.1:\u003c7.1.0.470",
      "Java7.1.sdk:\u003c7.1.0.470",
      "Java7.1_64.sdk:\u003c7.1.0.470",
      "Java8:\u003c8.0.0.616",
      "Java8.jre:\u003c8.0.0.616",
      "Java8_64.jre:\u003c8.0.0.616",
      "Java8.sdk:\u003c8.0.0.616",
      "Java8_64.sdk:\u003c8.0.0.616"
    ],
    "issued": "20201103",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2020-14621:5.3",
      "CVE-2020-14593:7.4",
      "CVE-2020-14583:8.3",
      "CVE-2020-14579:3.7",
      "CVE-2020-14578:3.7",
      "CVE-2020-14577:3.7",
      "CVE-2020-14556:4.8",
      "CVE-2019-17639:5.3",
      "CVE-2020-2601:6.8",
      "CVE-2020-2590:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2020-14779",
    "aparNoSet": [
      "CVE-2020-14779",
      "CVE-2020-14781",
      "CVE-2020-14782",
      "CVE-2020-14796",
      "CVE-2020-14797",
      "CVE-2020-14798",
      "CVE-2020-14803",
      "CVE-2020-27221",
      "CVE-2020-2773"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_mar2021_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.680",
      "Java7_64.jre:\u003c7.0.0.680",
      "Java7.jre:\u003c7.0.0.680",
      "Java7_64.sdk:\u003c7.0.0.680",
      "Java7.sdk:\u003c7.0.0.680",
      "Java7.1.jre:\u003c7.1.0.480",
      "Java7.1_64.jre:\u003c7.1.0.480",
      "Java7.1:\u003c7.1.0.480",
      "Java7.1.sdk:\u003c7.1.0.480",
      "Java7.1_64.sdk:\u003c7.1.0.480",
      "Java8:\u003c8.0.0.625",
      "Java8.jre:\u003c8.0.0.625",
      "Java8_64.jre:\u003c8.0.0.625",
      "Java8.sdk:\u003c8.0.0.625",
      "Java8_64.sdk:\u003c8.0.0.625"
    ],
    "issued": "20210315",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2020-14779:3.7",
      "CVE-2020-14796:3.1",
      "CVE-2020-14797:3.7",
      "CVE-2020-14798:3.1",
      "CVE-2020-14782:3.7",
      "CVE-2020-2773:3.7",
      "CVE-2020-14803:5.3",
      "CVE-2020-27221:9.8",
      "CVE-2020-14781:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2020-2830",
    "aparNoSet": [
      "CVE-2019-2949",
      "CVE-2020-2654",
      "CVE-2020-2754",
      "CVE-2020-2755",
      "CVE-2020-2756",
      "CVE-2020-2757",
      "CVE-2020-2781",
      "CVE-2020-2800",
      "CVE-2020-2803",
      "CVE-2020-2805",
      "CVE-2020-2830"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_apr2020_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.665",
      "Java7_64.jre:\u003c7.0.0.665",
      "Java7.jre:\u003c7.0.0.665",
      "Java7_64.sdk:\u003c7.0.0.665",
      "Java7.sdk:\u003c7.0.0.665",
      "Java7.1.jre:\u003c7.1.0.465",
      "Java7.1_64.jre:\u003c7.1.0.465",
      "Java7.1:\u003c7.1.0.465",
      "Java7.1.sdk:\u003c7.1.0.465",
      "Java7.1_64.sdk:\u003c7.1.0.465",
      "Java8:\u003c8.0.0.610",
      "Java8.jre:\u003c8.0.0.610",
      "Java8_64.jre:\u003c8.0.0.610",
      "Java8.sdk:\u003c8.0.0.610",
      "Java8_64.sdk:\u003c8.0.0.610"
    ],
    "issued": "20200731",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See advisory",
    "cvss": [
      "CVE-2020-2830:5.3",
      "CVE-2020-2805:8.3",
      "CVE-2020-2803:8.3",
      "CVE-2020-2800:4.8",
      "CVE-2020-2781:5.3",
      "CVE-2020-2757:3.7",
      "CVE-2020-2756:3.7",
      "CVE-2020-2755:3.7",
      "CVE-2020-2754:3.7",
      "CVE-2019-2949:6.8",
      "CVE-2020-2654:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "RPM"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution and RPM database corruption and denial of service due to RPM.",
    "aparNo": "CVE-2021-20271",
    "aparNoSet": [
      "CVE-2021-20266",
      "CVE-2021-20271",
      "CVE-2021-3421"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "rpm.rte.4.15.1.1006",
      "rpm.rte.4.15.1.2006"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rpm_advisory.asc",
    "filesets": [
      "rpm.rte:4.9.1.3-4.15.1.1005",
      "rpm.rte:4.15.1.2000-4.15.1.2005"
    ],
    "issued": "20220923",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rpm_fix.tar",
    "cvss": [
      "CVE-2021-20271:6.7",
      "CVE-2021-3421:6.1",
      "CVE-2021-20266:3.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2021-2161",
    "aparNoSet": [
      "CVE-2021-2161",
      "CVE-2021-2369",
      "CVE-2021-2432"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_sep2021_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.690",
      "Java7_64.jre:\u003c7.0.0.690",
      "Java7.jre:\u003c7.0.0.690",
      "Java7_64.sdk:\u003c7.0.0.690",
      "Java7.sdk:\u003c7.0.0.690",
      "Java7.1.jre:\u003c7.1.0.490",
      "Java7.1_64.jre:\u003c7.1.0.490",
      "Java7.1:\u003c7.1.0.490",
      "Java7.1.sdk:\u003c7.1.0.490",
      "Java7.1_64.sdk:\u003c7.1.0.490",
      "Java8:\u003c8.0.0.635",
      "Java8.jre:\u003c8.0.0.635",
      "Java8_64.jre:\u003c8.0.0.635",
      "Java8.sdk:\u003c8.0.0.635",
      "Java8_64.sdk:\u003c8.0.0.635"
    ],
    "issued": "20210915",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/java_sep2021_fix.tar",
    "cvss": [
      "CVE-2021-2161:5.9",
      "CVE-2021-2432:3.7",
      "CVE-2021-2369:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java7",
      "Java7.1",
      "Java8"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2021-2163",
    "aparNoSet": [
      "CVE-2021-2163",
      "CVE-2021-28167",
      "CVE-2021-41041",
      "CVE-2022-21619",
      "CVE-2022-21624",
      "CVE-2022-21626",
      "CVE-2022-21628",
      "CVE-2022-3676"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "null"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_dec2022_advisory.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20221222",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "null",
    "cvss": [
      "CVE-2021-2163:5.3",
      "CVE-2021-28167:6.5",
      "CVE-2021-41041:5.3",
      "CVE-2022-21619:3.7",
      "CVE-2022-21624:3.7",
      "CVE-2022-21626:5.3",
      "CVE-2022-21628:5.3",
      "CVE-2022-3676:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "Vulnerabilities in OpenSSL affect AIX",
    "aparNo": "CVE-2021-23839",
    "aparNoSet": [
      "CVE-2021-23839",
      "CVE-2021-23840",
      "CVE-2021-23841"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "1022100b.210323.epkg.Z",
      "fips2100b.210323.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory33.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.2100",
      "openssl.base:20.13.102.1000-20.16.102.2100"
    ],
    "issued": "20210415",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix33.tar",
    "cvss": [
      "CVE-2021-23839:5.9",
      "CVE-2021-23840:7.5",
      "CVE-2021-23841:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2021-35560",
    "aparNoSet": [
      "CVE-2021-2341",
      "CVE-2021-35556",
      "CVE-2021-35559",
      "CVE-2021-35560",
      "CVE-2021-35564",
      "CVE-2021-35565",
      "CVE-2021-35578",
      "CVE-2021-35586",
      "CVE-2021-41035"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_feb2022_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.700",
      "Java7_64.jre:\u003c7.0.0.700",
      "Java7.jre:\u003c7.0.0.700",
      "Java7_64.sdk:\u003c7.0.0.700",
      "Java7.sdk:\u003c7.0.0.700",
      "Java7.1.jre:\u003c7.1.0.500",
      "Java7.1_64.jre:\u003c7.1.0.500",
      "Java7.1:\u003c7.1.0.500",
      "Java7.1.sdk:\u003c7.1.0.500",
      "Java7.1_64.sdk:\u003c7.1.0.500",
      "Java8:\u003c8.0.0.700",
      "Java8.jre:\u003c8.0.0.700",
      "Java8_64.jre:\u003c8.0.0.700",
      "Java8.sdk:\u003c8.0.0.700",
      "Java8_64.sdk:\u003c8.0.0.700"
    ],
    "issued": "20220223",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/java_feb2022_fix.tar",
    "cvss": [
      "CVE-2021-35560:7.5",
      "CVE-2021-35586:5.3",
      "CVE-2021-35578:5.3",
      "CVE-2021-35564:5.3",
      "CVE-2021-35559:5.3",
      "CVE-2021-35556:5.3",
      "CVE-2021-35565:5.3",
      "CVE-2021-41035:7.7",
      "CVE-2021-2341:3.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "There is a vulnerability in OpenSSL used by AIX.",
    "aparNo": "CVE-2021-3712",
    "aparNoSet": [
      "CVE-2021-3712"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "1022102a.210927.epkg.Z",
      "fips2102a.210927.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory34.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.2102",
      "openssl.base:20.13.102.1000-20.16.102.2103"
    ],
    "issued": "20220106",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix34.tar",
    "cvss": [
      "CVE-2021-3712:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "smbcd"
    ],
    "apAbstract": "There is a vulnerability in the AIX smbcd daemon.",
    "aparNo": "CVE-2021-38993",
    "aparNoSet": [
      "CVE-2021-38993"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "smbcd_fix.tar",
      "smbc_302_fileset_71.tar.gz",
      "smbc_302_fileset_72.tar.gz"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory.asc",
    "filesets": [
      "smbc.rte:7.1.0.0-7.1.302.6",
      "smbc.rte:7.2.0.0-7.2.302.6"
    ],
    "issued": "20220224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/smbcd_fix.tar",
    "cvss": [
      "CVE-2021-38993:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSH"
    ],
    "apAbstract": "Vulnerabilities in OpenSSH affect AIX.",
    "aparNo": "CVE-2021-41617",
    "aparNoSet": [
      "CVE-2021-41617"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "41617s9a.211029.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_advisory14.asc",
    "filesets": [
      "openssh.base.client:4.0.0.5200-8.1.102.2104",
      "openssh.base.server:4.0.0.5200-8.1.102.2104"
    ],
    "issued": "20220106",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssh_fix14.tar",
    "cvss": [
      "CVE-2021-41617:7.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to OpenSSL",
    "aparNo": "CVE-2022-0778",
    "aparNoSet": [
      "CVE-2022-0778"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "1022103a.220422.epkg.Z",
      "1111200a.220422.epkg.Z",
      "1121200a.220422.epkg.Z",
      "fips2104a.220425.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory35.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.2103",
      "openssl.base:20.13.102.1000-20.16.102.2104",
      "openssl.base:1.1.1.0-1.1.1.1200",
      "openssl.base:1.1.2.0-1.1.2.1200"
    ],
    "issued": "20220513",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix35.tar",
    "cvss": [
      "CVE-2022-0778:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution due to OpenSSL",
    "aparNo": "CVE-2022-1292",
    "aparNoSet": [
      "CVE-2022-1292",
      "CVE-2022-2068",
      "CVE-2022-2097"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "1022104a.220804.epkg.Z",
      "1111201a.220804.epkg.Z",
      "1121201a.220804.epkg.Z",
      "fips2105a.220804.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory36.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.2104",
      "openssl.base:20.13.102.1000-20.16.102.2105",
      "openssl.base:1.1.1.0-1.1.1.1201",
      "openssl.base:1.1.2.0-1.1.2.1201"
    ],
    "issued": "20220817",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix36.tar",
    "cvss": [
      "CVE-2022-1292:6.3",
      "CVE-2022-2068:7.3",
      "CVE-2022-2097:6.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2022-21365",
    "aparNoSet": [
      "CVE-2021-35550",
      "CVE-2021-35561",
      "CVE-2021-35603",
      "CVE-2022-21248",
      "CVE-2022-21293",
      "CVE-2022-21294",
      "CVE-2022-21299",
      "CVE-2022-21340",
      "CVE-2022-21341",
      "CVE-2022-21360",
      "CVE-2022-21365",
      "CVE-2022-21434",
      "CVE-2022-21443",
      "CVE-2022-21496"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "See",
      "advisory"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jun2022_advisory.asc",
    "filesets": [
      "Java7:\u003c7.0.0.705",
      "Java7_64.jre:\u003c7.0.0.705",
      "Java7.jre:\u003c7.0.0.705",
      "Java7_64.sdk:\u003c7.0.0.705",
      "Java7.sdk:\u003c7.0.0.705",
      "Java7.1.jre:\u003c7.1.0.505",
      "Java7.1_64.jre:\u003c7.1.0.505",
      "Java7.1:\u003c7.1.0.505",
      "Java7.1.sdk:\u003c7.1.0.505",
      "Java7.1_64.sdk:\u003c7.1.0.505",
      "Java8:\u003c8.0.0.706",
      "Java8.jre:\u003c8.0.0.706",
      "Java8_64.jre:\u003c8.0.0.706",
      "Java8.sdk:\u003c8.0.0.706",
      "Java8_64.sdk:\u003c8.0.0.706"
    ],
    "issued": "20220614",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jun2022_fix.tar",
    "cvss": [
      "CVE-2022-21365:5.3",
      "CVE-2022-21360:5.3",
      "CVE-2022-21341:5.3",
      "CVE-2022-21340:5.3",
      "CVE-2022-21294:5.3",
      "CVE-2022-21293:5.3",
      "CVE-2022-21248:3.7",
      "CVE-2021-35550:5.9",
      "CVE-2021-35603:3.7",
      "CVE-2022-21299:5.3",
      "CVE-2022-21496:5.3",
      "CVE-2022-21434:5.3",
      "CVE-2022-21443:3.7",
      "CVE-2021-35561:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2022-21426",
    "aparNoSet": [
      "CVE-2022-21426",
      "CVE-2023-21830",
      "CVE-2023-21843",
      "CVE-2023-30441"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_may2023_advisory.asc",
    "filesets": [],
    "issued": "20230519",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere",
    "cvss": [
      "CVE-2022-21426:5.3",
      "CVE-2023-21830:5.3",
      "CVE-2023-21843:3.7",
      "CVE-2023-30441:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python39"
    ],
    "apAbstract": "AIX is affected by multiple vulnerabilities in Python",
    "aparNo": "CVE-2022-22827",
    "aparNoSet": [
      "CVE-2021-45960",
      "CVE-2021-46143",
      "CVE-2022-22822",
      "CVE-2022-22823",
      "CVE-2022-22824",
      "CVE-2022-22825",
      "CVE-2022-22826",
      "CVE-2022-22827",
      "CVE-2022-23852",
      "CVE-2022-23990",
      "CVE-2022-25235",
      "CVE-2022-25236",
      "CVE-2022-25313",
      "CVE-2022-25314",
      "CVE-2022-25315"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.11.99"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp",
    "cvss": [
      "CVE-2022-22827:7.8",
      "CVE-2022-25236:5.3",
      "CVE-2022-25235:3.3",
      "CVE-2022-25315:7.8",
      "CVE-2022-22824:7.8",
      "CVE-2022-22825:7.8",
      "CVE-2022-22823:7.8",
      "CVE-2021-46143:7.8",
      "CVE-2022-23990:9.8",
      "CVE-2022-22826:7.8",
      "CVE-2022-25314:7.3",
      "CVE-2022-25313:5.5",
      "CVE-2022-23852:9.8",
      "CVE-2021-45960:5.5",
      "CVE-2022-22822:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "BIND"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "CVE-2022-3094",
    "aparNoSet": [
      "CVE-2022-3094",
      "CVE-2022-3736",
      "CVE-2022-3924"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory23.asc",
    "filesets": [
      "bind.rte:7.1.916.0-7.1.916.2601"
    ],
    "issued": "20230718",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2022-3094:7.5",
      "CVE-2022-3736:7.5",
      "CVE-2022-3924:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Perl"
    ],
    "apAbstract": "AIX is vulnerable to HTTP request smuggling due to Perl",
    "aparNo": "CVE-2022-31081",
    "aparNoSet": [
      "CVE-2022-31081"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory6.asc",
    "filesets": [
      "perl.rte:5.28.0.0-5.28.1.4",
      "perl.rte:5.34.0.0-5.34.1.1"
    ],
    "issued": "20230503",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2022-31081:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "Multiple vulnerabilities in OpenSSL affect AIX",
    "aparNo": "CVE-2022-3358",
    "aparNoSet": [
      "CVE-2022-3358",
      "CVE-2022-3602",
      "CVE-2022-3786"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory37.asc",
    "filesets": [
      "openssl.base:3.0.5.101-3.0.5.101"
    ],
    "issued": "20230124",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp",
    "cvss": [
      "CVE-2022-3358:5.3",
      "CVE-2022-3602:7.5",
      "CVE-2022-3786:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "InvScout"
    ],
    "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability due to invscout",
    "aparNo": "CVE-2022-36768",
    "aparNoSet": [
      "CVE-2022-36768"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "invscout_fix3"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_advisory3.asc",
    "filesets": [
      "invscout.rte:2.2.0.0-2.2.0.22"
    ],
    "issued": "20220912",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_fix3.tar",
    "cvss": [
      "CVE-2022-36768:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "zlib",
      "zlibNX"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to zlib and zlibNX",
    "aparNo": "CVE-2022-37434",
    "aparNoSet": [
      "CVE-2022-37434"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "rpm.rte.4.15.1.1007",
      "rpm.rte.4.15.1.2007",
      "IJ47324m5a.230623.epkg.Z",
      "IJ46030m3a.230623.epkg.Z",
      "IJ44986s1a.230623.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/zlib_advisory2.asc",
    "filesets": [
      "rpm.rte:4.9.1.3-4.15.1.1006",
      "rpm.rte:4.15.1.2000-4.15.1.2006",
      "zlibNX.rte:7.2.4.0-7.2.4.8",
      "zlibNX.rte:7.3.0.0-7.3.0.2",
      "zlibNX.rte:7.3.1.0-7.3.1.0"
    ],
    "issued": "20230725",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/zlib_fix2.tar",
    "cvss": [
      "CVE-2022-37434:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "Multiple vulnerabilities in OpenSSL affect AIX",
    "aparNo": "CVE-2022-3996",
    "aparNoSet": [
      "CVE-2022-3996",
      "CVE-2022-4203",
      "CVE-2022-4304",
      "CVE-2022-4450",
      "CVE-2023-0215",
      "CVE-2023-0216",
      "CVE-2023-0217",
      "CVE-2023-0286",
      "CVE-2023-0401"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory38.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.2105",
      "openssl.base:1.1.1.0-1.1.1.1202",
      "openssl.base:1.1.2.0-1.1.2.1202",
      "openssl.base:20.13.102.1000-20.16.102.2106",
      "openssl.base:3.0.5.101-3.0.7.1000"
    ],
    "issued": "20230321",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp\u0026S_PKG\u003dopenssl",
    "cvss": [
      "CVE-2023-3996:3.7",
      "CVE-2023-0401:7.5",
      "CVE-2022-4304:7.5",
      "CVE-2022-4203:7.5",
      "CVE-2023-0216:7.5",
      "CVE-2023-0215:7.5",
      "CVE-2023-0217:7.5",
      "CVE-2023-0286:8.2",
      "CVE-2022-4450:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2022-40609",
    "aparNoSet": [
      "CVE-2022-40609",
      "CVE-2023-22049"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_aug2023_advisory.asc",
    "filesets": [
      "Java8:\u003c8.0.0.810",
      "Java8.jre:\u003c8.0.0.810",
      "Java8.sdk:\u003c8.0.0.81",
      "Java8_64.sdk:\u003c8.0.0.810",
      "Java8_64.jre:\u003c8.0.0.810"
    ],
    "issued": "20230831",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere\u0026product\u003dibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29\u0026release\u003d8.0.0.0",
    "cvss": [
      "CVE-2022-40609:8.1",
      "CVE-2023-22049:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python39"
    ],
    "apAbstract": "AIX is affected by arbitrary code execution and denial of service due to Python",
    "aparNo": "CVE-2022-40674",
    "aparNoSet": [
      "CVE-2020-10735",
      "CVE-2022-40674"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory2.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.13.99"
    ],
    "issued": "20221101",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp",
    "cvss": [
      "CVE-2022-40674:9.8",
      "CVE-2020-10735:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "SMB"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to the AIX SMB client",
    "aparNo": "CVE-2022-43381",
    "aparNoSet": [
      "CVE-2022-43381"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "null"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory2.asc",
    "filesets": [
      "smbc.rte:7.1.0.0-7.1.302.8",
      "smbc.rte:7.2.0.0-7.2.302.8"
    ],
    "issued": "20221222",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/smbcd_fix2.tar",
    "cvss": [
      "CVE-2022-43381:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python"
    ],
    "apAbstract": "AIX is affected by a denial of service due to Python",
    "aparNo": "CVE-2022-43680",
    "aparNoSet": [
      "CVE-2022-43680"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory3.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.14.0"
    ],
    "issued": "20221222",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp",
    "cvss": [
      "CVE-2022-43680:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python"
    ],
    "apAbstract": "AIX is affected by a denial of service due to Python",
    "aparNo": "CVE-2022-45061",
    "aparNoSet": [
      "CVE-2022-45061"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory4.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.14.1"
    ],
    "issued": "20230314",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-01.ibm.com/marketing/iwm/iwm/web/pickUrxNew.do?source\u003daixbp",
    "cvss": [
      "CVE-2022-45061:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "Multiple vulnerabilities in OpenSSL affect AIX",
    "aparNo": "CVE-2023-0464",
    "aparNoSet": [
      "CVE-2023-0464",
      "CVE-2023-0465",
      "CVE-2023-0466",
      "CVE-2023-2650",
      "CVE-2023-2975",
      "CVE-2023-3446",
      "CVE-2023-3817"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory39.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.2106",
      "openssl.base:1.1.1.0-1.1.1.2000",
      "openssl.base:1.1.2.0-1.1.2.2000",
      "openssl.base:20.13.102.1000-20.16.102.2107",
      "openssl.base:3.0.5.101-3.0.8.1000"
    ],
    "issued": "20230911",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp\u0026S_PKG\u003dopenssl",
    "cvss": [
      "CVE-2023-0464:5.3",
      "CVE-2023-0465:3.7",
      "CVE-2023-0466:3.7",
      "CVE-2023-2650:7.5",
      "CVE-2023-2975:5.3",
      "CVE-2023-3446:3.7",
      "CVE-2023-3817:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2023-21930",
    "aparNoSet": [
      "CVE-2023-21930",
      "CVE-2023-21937",
      "CVE-2023-21938",
      "CVE-2023-21939",
      "CVE-2023-21967",
      "CVE-2023-21968",
      "CVE-2023-2597"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jul2023_advisory.asc",
    "filesets": [
      "Java8:\u003c8.0.0.805"
    ],
    "issued": "20230711",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere",
    "cvss": [
      "CVE-2023-21930:7.4",
      "CVE-2023-21937:3.7",
      "CVE-2023-21938:3.7",
      "CVE-2023-21939:5.3",
      "CVE-2023-21967:5.9",
      "CVE-2023-21968:3.7",
      "CVE-2023-2597:7.0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2023-22067",
    "aparNoSet": [
      "CVE-2023-22067",
      "CVE-2023-22081",
      "CVE-2023-5676"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_dec2023_advisory.asc",
    "filesets": [
      "Java8:\u003c8.0.0.815",
      "Java8.jre:\u003c8.0.0.815",
      "Java8.sdk:\u003c8.0.0.815",
      "Java8_64.sdk:\u003c8.0.0.815",
      "Java8_64.jre:\u003c8.0.0.815"
    ],
    "issued": "20231218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere\u0026product\u003dibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29\u0026release\u003d8.0.0.0\u0026function\u003dall",
    "cvss": [
      "CVE-2023-22067:5.3",
      "CVE-2023-22081:5.3",
      "CVE-2023-5676:4.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python"
    ],
    "apAbstract": "AIX is affected by security restrictions bypass due to Python",
    "aparNo": "CVE-2023-24329",
    "aparNoSet": [
      "CVE-2023-24329"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory5.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.16.0"
    ],
    "issued": "20230818",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-24329:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "NTPv4"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to NTP",
    "aparNo": "CVE-2023-26551",
    "aparNoSet": [
      "CVE-2023-26551",
      "CVE-2023-26552",
      "CVE-2023-26553",
      "CVE-2023-26554"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ47973s6a.230829.epkg.Z",
      "IJ47974s4a.230829.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory14.asc",
    "filesets": [
      "ntp.rte:7.4.2.8100-7.4.2.8153",
      "ntp.rte:73.4.2.8151-73.4.2.8154"
    ],
    "issued": "20231005",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix14.tar",
    "cvss": [
      "CVE-2023-26551:5.3",
      "CVE-2023-26552:5.3",
      "CVE-2023-26553:5.3",
      "CVE-2023-26554:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "BIND"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "CVE-2023-2828",
    "aparNoSet": [
      "CVE-2023-2828"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory24.asc",
    "filesets": [
      "bind.rte:7.1.916.0-7.1.916.2602"
    ],
    "issued": "20230907",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-2828:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "invScout"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution due to invscout",
    "aparNo": "CVE-2023-28528",
    "aparNoSet": [
      "CVE-2023-28528"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_advisory4.asc",
    "filesets": [
      "invscout.rte:2.2.0.0-2.2.0.23",
      "invscout.rte:2.2.0.0-2.2.0.23"
    ],
    "issued": "20230412",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_fix4.tar",
    "cvss": [
      "CVE-2023-28528:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Perl"
    ],
    "apAbstract": "AIX is vulnerable to sensitive information exposure due to Perl - CVE-2023-31484",
    "aparNo": "CVE-2023-31484",
    "aparNoSet": [
      "CVE-2023-31484"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "31484s6a.231017.epkg.Z",
      "31484m6a.231020.epkg.Z",
      "31484s2a.231018.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory7.asc",
    "filesets": [
      "perl.rte:5.28.0.0-5.28.1.6",
      "perl.rte:5.34.0.0-5.34.1.3"
    ],
    "issued": "20231005",
    "updated": "20231102",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-31484:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Perl"
    ],
    "apAbstract": "AIX is vulnerable to sensitive information exposure due to Perl - CVE-2023-2331486",
    "aparNo": "CVE-2023-31486",
    "aparNoSet": [
      "CVE-2023-31486"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "31486s6a.231017.epkg.Z",
      "31484m6a.231020.epkg.Z",
      "31486s6b.231020.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory7.asc",
    "filesets": [
      "perl.rte:5.28.0.0-5.28.1.7"
    ],
    "issued": "20231005",
    "updated": "20231102",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-31486:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "BIND"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "CVE-2023-3341",
    "aparNoSet": [
      "CVE-2023-3341"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ49093s7.231109.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc",
    "filesets": [
      "bind.rte:7.1.916.0-7.1.916.2603",
      "bind.rte:7.3.916.0-7.3.916.2600"
    ],
    "issued": "20231218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-3341:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2023-33850",
    "aparNoSet": [
      "CVE-2023-33850",
      "CVE-2024-20918",
      "CVE-2024-20921",
      "CVE-2024-20926",
      "CVE-2024-20945",
      "CVE-2024-20952"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_feb2024_advisory.asc",
    "filesets": [
      "Java8:\u003c8.0.0.820",
      "Java8.jre:\u003c8.0.0.820",
      "Java8.sdk:\u003c8.0.0.820",
      "Java8_64.sdk:\u003c8.0.0.820",
      "Java8_64.jre:\u003c8.0.0.820"
    ],
    "issued": "20240307",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere\u0026product\u003dibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29\u0026release\u003d8.0.0.0\u0026function\u003dall",
    "cvss": [
      "CVE-2023-33850:7.5",
      "CVE-2024-20918:7.4",
      "CVE-2024-20921:5.9",
      "CVE-2024-20926:5.9",
      "CVE-2024-20945:4.7",
      "CVE-2024-20952:7.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "tcl"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution (CVE-2023-36328) due to tcl",
    "aparNo": "CVE-2023-36328",
    "aparNoSet": [
      "CVE-2023-36328"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcl_advisory.asc",
    "filesets": [
      "tcl.base:8.6.10.0-8.6.10.0"
    ],
    "issued": "20241107",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcl_fix.tar",
    "cvss": [
      "CVE-2023-36328:9.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python"
    ],
    "apAbstract": "AIX is affected by multiple vulnerabilities due to Python",
    "aparNo": "CVE-2023-37920",
    "aparNoSet": [
      "CVE-2023-37920",
      "CVE-2023-43804"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory7.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.18.0"
    ],
    "issued": "20231221",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-37920:7.5",
      "CVE-2023-43804:5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2023-38264",
    "aparNoSet": [
      "CVE-2023-38264",
      "CVE-2024-21085"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_jun2024_advisory.asc",
    "filesets": [
      "Java8:\u003c8.0.0.825",
      "Java8.jre:\u003c8.0.0.825",
      "Java8.sdk:\u003c8.0.0.825",
      "Java8_64.sdk:\u003c8.0.0.825",
      "Java8_64.jre:\u003c8.0.0.825"
    ],
    "issued": "20240624",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere\u0026product\u003dibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29\u0026release\u003d8.0.0.0\u0026function\u003dall",
    "cvss": [
      "CVE-2023-38264:5.9",
      "CVE-2024-21085:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python"
    ],
    "apAbstract": "AIX is affected by a denial of service (CVE-2023-45167) and a security restrictions bypass (CVE-2023-40217) due to Python",
    "aparNo": "CVE-2023-40217",
    "aparNoSet": [
      "CVE-2023-40217",
      "CVE-2023-45167"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory6.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.17.1"
    ],
    "issued": "20231107",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-40217:7.4",
      "CVE-2023-45167:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "BIND"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "CVE-2023-4408",
    "aparNoSet": [
      "CVE-2023-4408",
      "CVE-2023-50387",
      "CVE-2023-50868",
      "CVE-2023-5517",
      "CVE-2023-5679",
      "CVE-2023-6516"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory26.asc",
    "filesets": [
      "bind.rte:7.1.916.0-7.1.916.2604",
      "bind.rte:7.2.916.0-7.2.916.2600",
      "bind.rte:7.3.916.0-7.3.916.2601"
    ],
    "issued": "20240604",
    "updated": "20240605",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix26.tar",
    "cvss": [
      "CVE-2023-4408:7.5",
      "CVE-2023-50387:7.5",
      "CVE-2023-50868:7.5",
      "CVE-2023-5517:7.5",
      "CVE-2023-5679:7.5",
      "CVE-2023-6516:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "smbcd"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to the AIX SMB client",
    "aparNo": "CVE-2023-45165",
    "aparNoSet": [
      "CVE-2023-45165"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "smbc_302_fileset_72.tar.gz",
      "smbc_302_fileset_73.tar.gz"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/smbcd_advisory3.asc",
    "filesets": [
      "smbc.rte:7.2.0.0-7.2.302.10"
    ],
    "issued": "20231221",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-45165:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "invScout"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution due to invscout",
    "aparNo": "CVE-2023-45168",
    "aparNoSet": [
      "CVE-2023-45168"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_advisory5.asc",
    "filesets": [
      "invscout.rte:2.2.0.0-2.2.0.24"
    ],
    "issued": "20231130",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_fix5.tar",
    "cvss": [
      "CVE-2023-45168:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python39"
    ],
    "apAbstract": "AIX is affected by information disclosure (CVE-2023-45803) and arbitrary code execution (CVE-2024-6345) due to Python",
    "aparNo": "CVE-2023-45803",
    "aparNoSet": [
      "CVE-2023-45803",
      "CVE-2024-6345"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory11.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.19.1"
    ],
    "issued": "20240812",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-45803:4.2",
      "CVE-2024-6345:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Perl"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution due to Perl (CVE-2024-25021 CVE-2023-47038 CVE-2023-47100)",
    "aparNo": "CVE-2023-47038",
    "aparNoSet": [
      "CVE-2023-47038",
      "CVE-2023-47100",
      "CVE-2024-25021"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "perl5345ma.240213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory8.asc",
    "filesets": [
      "perl.rte:5.34.0.0-5.34.1.5"
    ],
    "issued": "20240221",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-47038:7.8",
      "CVE-2023-47100:9.8",
      "CVE-2024-25021:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python39"
    ],
    "apAbstract": "AIX is affected by multiple vulnerabilities due to Python (CVE-2023-52425 CVE-2023-52426 CVE-2023-6597)",
    "aparNo": "CVE-2023-52425",
    "aparNoSet": [
      "CVE-2023-52425",
      "CVE-2023-52426",
      "CVE-2023-6597"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory8.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.18.1"
    ],
    "issued": "20240411",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-52425:7.5",
      "CVE-2023-52426:5.1",
      "CVE-2023-6597:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service (CVE-2023-5678 CVE-2023-6129 CVE-2023-6237) and an attacker may obtain sensitive information (CVE-2023-5363) due to OpenSSL",
    "aparNo": "CVE-2023-5363",
    "aparNoSet": [
      "CVE-2023-5363",
      "CVE-2023-5678",
      "CVE-2023-6129",
      "CVE-2023-6237"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "1022107a.240107.epkg.Z",
      "1112200a.240109.epkg.Z",
      "1122200a.240110.epkg.Z",
      "fips2108a.240108.epkg.Z",
      "301002sa.240122.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory40.asc",
    "filesets": [
      "openssl.base:1.0.2.500-1.0.2.2107",
      "openssl.base:1.1.1.0-1.1.1.2200",
      "openssl.base:1.1.2.0-1.1.2.2200",
      "openssl.base:20.13.102.1000-20.16.102.2108",
      "openssl.base:3.0.0.0-3.0.10.1002"
    ],
    "issued": "20240126",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_fix40.tar",
    "cvss": [
      "CVE-2023-5363:5.9",
      "CVE-2023-5678:3.7",
      "CVE-2023-6129:5.9",
      "CVE-2023-6237:3.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "RPM"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution due to RPM (CVE-2023-7104)",
    "aparNo": "CVE-2023-7104",
    "aparNoSet": [
      "CVE-2023-7104"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rpm_advisory2.asc",
    "filesets": [
      "rpm.rte:4.15.1.1000-4.15.1.1012",
      "rpm.rte:4.15.1.2000-4.15.1.2010",
      "rpm.rte:4.18.1.2000-4.18.1.2002"
    ],
    "issued": "20240424",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2023-7104:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python39"
    ],
    "apAbstract": "AIX is affected by a denial of service (CVE-2024-0397) and information disclosure (CVE-2024-4032 CVE-2024-37891) due to Python",
    "aparNo": "CVE-2024-0397",
    "aparNoSet": [
      "CVE-2024-0397",
      "CVE-2024-37891",
      "CVE-2024-4032"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory12.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.19.2"
    ],
    "issued": "20240917",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2024-0397:7.5",
      "CVE-2024-37891:4.4",
      "CVE-2024-4032:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python39"
    ],
    "apAbstract": "AIX is affected by a denial of service due to Python (CVE-2024-0450)",
    "aparNo": "CVE-2024-0450",
    "aparNoSet": [
      "CVE-2024-0450"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory10.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.18.3"
    ],
    "issued": "20240624",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2024-0450:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "OpenSSL"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service (CVE-2024-2511 CVE-2024-0727) due to OpenSSL",
    "aparNo": "CVE-2024-0727",
    "aparNoSet": [
      "CVE-2024-0727",
      "CVE-2024-2511"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/openssl_advisory41.asc",
    "filesets": [
      "openssl.base:1.1.1.0-1.1.1.2200",
      "openssl.base:1.1.2.0-1.1.2.2200",
      "openssl.base:3.0.5.101-3.0.10.1002"
    ],
    "issued": "20240716",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp\u0026S_PKG\u003dopenssl",
    "cvss": [
      "CVE-2024-0727:3.1",
      "CVE-2024-2511:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "BIND"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to ISC BIND",
    "aparNo": "CVE-2024-0760",
    "aparNoSet": [
      "CVE-2024-0760",
      "CVE-2024-1737",
      "CVE-2024-1975",
      "CVE-2024-4076"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory27.asc",
    "filesets": [
      "bind.rte:7.1.916.0-7.1.916.4800",
      "bind.rte:7.2.916.0-7.2.916.4801",
      "bind.rte:7.3.916.0-7.3.916.4800"
    ],
    "issued": "20241118",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix27.tar",
    "cvss": [
      "CVE-2024-0760:7.5",
      "CVE-2024-1737:7.5",
      "CVE-2024-1975:7.5",
      "CVE-2024-4076:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "opencryptoki"
    ],
    "apAbstract": "AIX is vulnerable to information disclosure due to openCryptoki (CVE-2024-0914)",
    "aparNo": "CVE-2024-0914",
    "aparNoSet": [
      "CVE-2024-0914"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/opencryptoki_advisory.asc",
    "filesets": [
      "opencki.base:3.21.0.0-3.21.0.1000"
    ],
    "issued": "20240603",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp\u0026S_PKG\u003dopencryptoki",
    "cvss": [
      "CVE-2024-0914:5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Java SDK"
    ],
    "apAbstract": "Multiple vulnerabilities in IBM Java SDK affect AIX",
    "aparNo": "CVE-2024-21131",
    "aparNoSet": [
      "CVE-2024-21131",
      "CVE-2024-21144",
      "CVE-2024-21145",
      "CVE-2024-27267"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/java_nov2024_advisory.asc",
    "filesets": [
      "Java8:\u003c8.0.0.830",
      "Java8.jre:\u003c8.0.0.830",
      "Java8.sdk:\u003c8.0.0.830",
      "Java8_64.sdk:\u003c8.0.0.830",
      "Java8_64.jre:\u003c8.0.0.830"
    ],
    "issued": "20241111",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent\u003dibm~WebSphere\u0026product\u003dibm/IBM+SDKs+for+Java+Technology/Java+Standard+Edition+%28Java+SE%29\u0026release\u003d8.0.0.0\u0026function\u003dall",
    "cvss": [
      "CVE-2024-21131:3.7",
      "CVE-2024-21144:3.7",
      "CVE-2024-21145:4.8",
      "CVE-2024-27267:5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python39"
    ],
    "apAbstract": "AIX is affected by information disclosure due to Python (CVE-2024-28757)",
    "aparNo": "CVE-2024-28757",
    "aparNoSet": [
      "CVE-2024-28757"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory9.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.18.2"
    ],
    "issued": "20240613",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [
      "CVE-2024-28757:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python39"
    ],
    "apAbstract": "AIX is affected by multiple vulnerabilities due to Python",
    "aparNo": "CVE-2024-45490",
    "aparNoSet": [
      "CVE-2024-45490",
      "CVE-2024-45491",
      "CVE-2024-45492",
      "CVE-2024-6923",
      "CVE-2024-7592",
      "CVE-2024-8088"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory13.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.19.3"
    ],
    "issued": "20241105",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/python_fix13.tar",
    "cvss": [
      "CVE-2024-45490:7.5",
      "CVE-2024-45491:7.3",
      "CVE-2024-45492:7.3",
      "CVE-2024-6923:5.5",
      "CVE-2024-7592:7.5",
      "CVE-2024-8088:8.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "invScout"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution due to invscout (CVE-2024-47115)",
    "aparNo": "CVE-2024-47115",
    "aparNoSet": [
      "CVE-2024-47115"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_advisory7.asc",
    "filesets": [
      "invscout.rte:2.2.0.0-2.2.0.26"
    ],
    "issued": "20241205",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_fix7.tar",
    "cvss": [
      "CVE-2024-47115:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Python39"
    ],
    "apAbstract": "AIX is affected by a denial of service (CVE-2024-50602) due to Python",
    "aparNo": "CVE-2024-50602",
    "aparNoSet": [
      "CVE-2024-50602"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/python_advisory14.asc",
    "filesets": [
      "python3.9.base:3.9.0.0-3.9.20.0"
    ],
    "issued": "20250306",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/python_fix14.tar",
    "cvss": [
      "CVE-2024-50602:5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.30",
      "2.2.4.40",
      "2.2.4.50"
    ],
    "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS",
    "aparNo": "IJ00360",
    "aparNoSet": [
      "IJ00360"
    ],
    "fixedIn": "2.2.4.60",
    "ifixes": [
      "IJ00360m9a.180313.AIX61TL09SP09.epkg.Z",
      "IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z",
      "IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z",
      "IJ00360sAa.171228.AIX61TL09SP10.epkg.Z",
      "IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z",
      "IV97339m7a.180329.VIOS2.2.4.40.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ00360",
    "filesets": [],
    "issued": "20180331",
    "updated": "null",
    "siblings": [
      "7100-04:IJ00519",
      "7100-05:IJ01304",
      "7200-01:IV96360",
      "7200-02:IJ01262"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij00360/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.0",
      "2.2.5.10",
      "2.2.5.20",
      "2.2.5.30"
    ],
    "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS",
    "aparNo": "IJ00360",
    "aparNoSet": [
      "IJ00360"
    ],
    "fixedIn": "2.2.5.40",
    "ifixes": [
      "IJ00360m9a.180313.AIX61TL09SP09.epkg.Z",
      "IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z",
      "IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z",
      "IJ00360sAa.171228.AIX61TL09SP10.epkg.Z",
      "IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z",
      "IV97339m7a.180329.VIOS2.2.4.40.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ00360",
    "filesets": [],
    "issued": "20180331",
    "updated": "null",
    "siblings": [
      "7100-04:IJ00519",
      "7100-05:IJ01304",
      "7200-01:IV96360",
      "7200-02:IJ01262"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij00360/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10"
    ],
    "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS",
    "aparNo": "IJ00360",
    "aparNoSet": [
      "IJ00360"
    ],
    "fixedIn": "2.2.6.20",
    "ifixes": [
      "IJ00360m9a.180313.AIX61TL09SP09.epkg.Z",
      "IJ00360s9b.180330.VIOS2.2.4.50.epkg.Z",
      "IJ00360s9b.180330.VIOS2.2.5.30.epkg.Z",
      "IJ00360sAa.171228.AIX61TL09SP10.epkg.Z",
      "IJ00360sAa.171228.VIOS2.2.6.10.epkg.Z",
      "IV97339m7a.180329.VIOS2.2.4.40.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ00360",
    "filesets": [],
    "issued": "20180331",
    "updated": "null",
    "siblings": [
      "7100-04:IJ00519",
      "7100-05:IJ01304",
      "7200-01:IV96360",
      "7200-02:IJ01262"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij00360/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-08",
      "6100-09-09",
      "6100-09-10"
    ],
    "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS",
    "aparNo": "IJ00360",
    "aparNoSet": [
      "IJ00360"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IJ00360m9a.180313.AIX61TL09SP09.epkg.Z",
      "IJ00360sAa.171228.AIX61TL09SP10.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ00360",
    "filesets": [
      "devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.300"
    ],
    "issued": "20180331",
    "updated": "null",
    "siblings": [
      "7100-04:IJ00519",
      "7100-05:IJ01304",
      "7200-01:IV96360",
      "7200-02:IJ01262"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij00360/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS",
    "aparNo": "IJ00519",
    "aparNoSet": [
      "IJ00519"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IJ00519s5a.171222.AIX71TL04SP05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ00519",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.1.4.30-7.1.4.32"
    ],
    "issued": "20180331",
    "updated": "null",
    "siblings": [
      "6100-09:IJ00360",
      "7100-05:IJ01304",
      "7200-01:IV96360",
      "7200-02:IJ01262"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij00519/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-10",
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IJ00563",
    "aparNoSet": [
      "CVE-",
      "CVE-2017-11541",
      "CVE-2017-11542",
      "CVE-2017-11543",
      "CVE-2017-12893",
      "CVE-2017-12894",
      "CVE-2017-12895",
      "CVE-2017-12896",
      "CVE-2017-12897",
      "CVE-2017-12898",
      "CVE-2017-12899",
      "CVE-2017-12900",
      "CVE-2017-12901",
      "CVE-2017-12902",
      "CVE-2017-12985",
      "CVE-2017-12986",
      "CVE-2017-12987",
      "CVE-2017-12988",
      "CVE-2017-12989",
      "CVE-2017-12990",
      "CVE-2017-12991",
      "CVE-2017-12992",
      "CVE-2017-12993",
      "CVE-2017-12994",
      "CVE-2017-12995",
      "CVE-2017-12996",
      "CVE-2017-12997",
      "CVE-2017-12998",
      "CVE-2017-12999",
      "CVE-2017-13000",
      "CVE-2017-13001",
      "CVE-2017-13002",
      "CVE-2017-13003",
      "CVE-2017-13004",
      "CVE-2017-13005",
      "CVE-2017-13006",
      "CVE-2017-13008",
      "CVE-2017-13009",
      "CVE-2017-13010",
      "CVE-2017-13011",
      "CVE-2017-13012",
      "CVE-2017-13013",
      "CVE-2017-13014",
      "CVE-2017-13015",
      "CVE-2017-13016",
      "CVE-2017-13017",
      "CVE-2017-13018",
      "CVE-2017-13035",
      "CVE-2017-13036",
      "CVE-2017-13037",
      "CVE-2017-13038",
      "CVE-2017-13039",
      "CVE-2017-13040",
      "CVE-2017-13041",
      "CVE-2017-13042",
      "CVE-2017-13043",
      "IJ00563"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IV94728mAa.171008.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.300"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00568",
      "7200-00:IJ00567",
      "7100-03:IJ00564",
      "7100-04:IJ00565",
      "7200-01:IJ00567"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar",
    "cvss": [
      "CVE-2017-12993:5.3",
      "CVE-2017-12992:5.3",
      "CVE-2017-12991:5.3",
      "CVE-2017-12988:5.3",
      "CVE-2017-12987:5.3",
      "CVE-2017-12986:5.3",
      "CVE-2017-12985:5.3",
      "CVE-2017-12902:5.3",
      "CVE-2017-12901:5.3",
      "CVE-2017-12900:5.3",
      "CVE-2017-12899:5.3",
      "CVE-2017-12898:5.3",
      "CVE-2017-12897:5.3",
      "CVE-2017-12896:5.3",
      "CVE-2017-12895:5.3",
      "CVE-2017-12894:5.3",
      "CVE-2017-12893:5.3",
      "CVE-2017-11542:7.5",
      "CVE-2017-11541:7.5",
      "CVE-2017-12997:7.5",
      "CVE-2017-12995:7.5",
      "CVE-2017-12990:7.5",
      "CVE-2017-12989:7.5",
      "CVE-2017-13011:7.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13018:5.3",
      "CVE-2017-13017:5.3",
      "CVE-2017-13016:5.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13015:5.3",
      "CVE-2017-13014:5.3",
      "CVE-2017-13013:5.3",
      "CVE-2017-13012:5.3",
      "CVE-2017-13010:5.3",
      "CVE-2017-13009:5.3",
      "CVE-2017-13008:5.3",
      "CVE-2017-13006:5.3",
      "CVE-2017-13005:5.3",
      "CV"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-07",
      "7100-03-08",
      "7100-03-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IJ00564",
    "aparNoSet": [
      "CVE-",
      "CVE-2017-11541",
      "CVE-2017-11542",
      "CVE-2017-11543",
      "CVE-2017-12893",
      "CVE-2017-12894",
      "CVE-2017-12895",
      "CVE-2017-12896",
      "CVE-2017-12897",
      "CVE-2017-12898",
      "CVE-2017-12899",
      "CVE-2017-12900",
      "CVE-2017-12901",
      "CVE-2017-12902",
      "CVE-2017-12985",
      "CVE-2017-12986",
      "CVE-2017-12987",
      "CVE-2017-12988",
      "CVE-2017-12989",
      "CVE-2017-12990",
      "CVE-2017-12991",
      "CVE-2017-12992",
      "CVE-2017-12993",
      "CVE-2017-12994",
      "CVE-2017-12995",
      "CVE-2017-12996",
      "CVE-2017-12997",
      "CVE-2017-12998",
      "CVE-2017-12999",
      "CVE-2017-13000",
      "CVE-2017-13001",
      "CVE-2017-13002",
      "CVE-2017-13003",
      "CVE-2017-13004",
      "CVE-2017-13005",
      "CVE-2017-13006",
      "CVE-2017-13008",
      "CVE-2017-13009",
      "CVE-2017-13010",
      "CVE-2017-13011",
      "CVE-2017-13012",
      "CVE-2017-13013",
      "CVE-2017-13014",
      "CVE-2017-13015",
      "CVE-2017-13016",
      "CVE-2017-13017",
      "CVE-2017-13018",
      "CVE-2017-13035",
      "CVE-2017-13036",
      "CVE-2017-13037",
      "CVE-2017-13038",
      "CVE-2017-13039",
      "CVE-2017-13040",
      "CVE-2017-13041",
      "CVE-2017-13042",
      "CVE-2017-13043",
      "IJ00564"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IV94727m9a.171009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.3.0-7.1.3.49"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00568",
      "7200-00:IJ00567",
      "7100-04:IJ00565",
      "6100-09:IJ00563",
      "7200-01:IJ00567"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar",
    "cvss": [
      "CVE-2017-12993:5.3",
      "CVE-2017-12992:5.3",
      "CVE-2017-12991:5.3",
      "CVE-2017-12988:5.3",
      "CVE-2017-12987:5.3",
      "CVE-2017-12986:5.3",
      "CVE-2017-12985:5.3",
      "CVE-2017-12902:5.3",
      "CVE-2017-12901:5.3",
      "CVE-2017-12900:5.3",
      "CVE-2017-12899:5.3",
      "CVE-2017-12898:5.3",
      "CVE-2017-12897:5.3",
      "CVE-2017-12896:5.3",
      "CVE-2017-12895:5.3",
      "CVE-2017-12894:5.3",
      "CVE-2017-12893:5.3",
      "CVE-2017-11542:7.5",
      "CVE-2017-11541:7.5",
      "CVE-2017-12997:7.5",
      "CVE-2017-12995:7.5",
      "CVE-2017-12990:7.5",
      "CVE-2017-12989:7.5",
      "CVE-2017-13011:7.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13018:5.3",
      "CVE-2017-13017:5.3",
      "CVE-2017-13016:5.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13015:5.3",
      "CVE-2017-13014:5.3",
      "CVE-2017-13013:5.3",
      "CVE-2017-13012:5.3",
      "CVE-2017-13010:5.3",
      "CVE-2017-13009:5.3",
      "CVE-2017-13008:5.3",
      "CVE-2017-13006:5.3",
      "CVE-2017-13005:5.3",
      "CV"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IJ00565",
    "aparNoSet": [
      "CVE-",
      "CVE-2017-11541",
      "CVE-2017-11542",
      "CVE-2017-11543",
      "CVE-2017-12893",
      "CVE-2017-12894",
      "CVE-2017-12895",
      "CVE-2017-12896",
      "CVE-2017-12897",
      "CVE-2017-12898",
      "CVE-2017-12899",
      "CVE-2017-12900",
      "CVE-2017-12901",
      "CVE-2017-12902",
      "CVE-2017-12985",
      "CVE-2017-12986",
      "CVE-2017-12987",
      "CVE-2017-12988",
      "CVE-2017-12989",
      "CVE-2017-12990",
      "CVE-2017-12991",
      "CVE-2017-12992",
      "CVE-2017-12993",
      "CVE-2017-12994",
      "CVE-2017-12995",
      "CVE-2017-12996",
      "CVE-2017-12997",
      "CVE-2017-12998",
      "CVE-2017-12999",
      "CVE-2017-13000",
      "CVE-2017-13001",
      "CVE-2017-13002",
      "CVE-2017-13003",
      "CVE-2017-13004",
      "CVE-2017-13005",
      "CVE-2017-13006",
      "CVE-2017-13008",
      "CVE-2017-13009",
      "CVE-2017-13010",
      "CVE-2017-13011",
      "CVE-2017-13012",
      "CVE-2017-13013",
      "CVE-2017-13014",
      "CVE-2017-13015",
      "CVE-2017-13016",
      "CVE-2017-13017",
      "CVE-2017-13018",
      "CVE-2017-13035",
      "CVE-2017-13036",
      "CVE-2017-13037",
      "CVE-2017-13038",
      "CVE-2017-13039",
      "CVE-2017-13040",
      "CVE-2017-13041",
      "CVE-2017-13042",
      "CVE-2017-13043",
      "IJ00565"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IV94726m5a.171009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.4.0-7.1.4.32"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00568",
      "7200-00:IJ00567",
      "7100-03:IJ00564",
      "6100-09:IJ00563",
      "7200-01:IJ00567"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar",
    "cvss": [
      "CVE-2017-12993:5.3",
      "CVE-2017-12992:5.3",
      "CVE-2017-12991:5.3",
      "CVE-2017-12988:5.3",
      "CVE-2017-12987:5.3",
      "CVE-2017-12986:5.3",
      "CVE-2017-12985:5.3",
      "CVE-2017-12902:5.3",
      "CVE-2017-12901:5.3",
      "CVE-2017-12900:5.3",
      "CVE-2017-12899:5.3",
      "CVE-2017-12898:5.3",
      "CVE-2017-12897:5.3",
      "CVE-2017-12896:5.3",
      "CVE-2017-12895:5.3",
      "CVE-2017-12894:5.3",
      "CVE-2017-12893:5.3",
      "CVE-2017-11542:7.5",
      "CVE-2017-11541:7.5",
      "CVE-2017-12997:7.5",
      "CVE-2017-12995:7.5",
      "CVE-2017-12990:7.5",
      "CVE-2017-12989:7.5",
      "CVE-2017-13011:7.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13018:5.3",
      "CVE-2017-13017:5.3",
      "CVE-2017-13016:5.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13015:5.3",
      "CVE-2017-13014:5.3",
      "CVE-2017-13013:5.3",
      "CVE-2017-13012:5.3",
      "CVE-2017-13010:5.3",
      "CVE-2017-13009:5.3",
      "CVE-2017-13008:5.3",
      "CVE-2017-13006:5.3",
      "CVE-2017-13005:5.3",
      "CV"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IJ00566",
    "aparNoSet": [
      "CVE-",
      "CVE-2017-11541",
      "CVE-2017-11542",
      "CVE-2017-11543",
      "CVE-2017-12893",
      "CVE-2017-12894",
      "CVE-2017-12895",
      "CVE-2017-12896",
      "CVE-2017-12897",
      "CVE-2017-12898",
      "CVE-2017-12899",
      "CVE-2017-12900",
      "CVE-2017-12901",
      "CVE-2017-12902",
      "CVE-2017-12985",
      "CVE-2017-12986",
      "CVE-2017-12987",
      "CVE-2017-12988",
      "CVE-2017-12989",
      "CVE-2017-12990",
      "CVE-2017-12991",
      "CVE-2017-12992",
      "CVE-2017-12993",
      "CVE-2017-12994",
      "CVE-2017-12995",
      "CVE-2017-12996",
      "CVE-2017-12997",
      "CVE-2017-12998",
      "CVE-2017-12999",
      "CVE-2017-13000",
      "CVE-2017-13001",
      "CVE-2017-13002",
      "CVE-2017-13003",
      "CVE-2017-13004",
      "CVE-2017-13005",
      "CVE-2017-13006",
      "CVE-2017-13008",
      "CVE-2017-13009",
      "CVE-2017-13010",
      "CVE-2017-13011",
      "CVE-2017-13012",
      "CVE-2017-13013",
      "CVE-2017-13014",
      "CVE-2017-13015",
      "CVE-2017-13016",
      "CVE-2017-13017",
      "CVE-2017-13018",
      "CVE-2017-13035",
      "CVE-2017-13036",
      "CVE-2017-13037",
      "CVE-2017-13038",
      "CVE-2017-13039",
      "CVE-2017-13040",
      "CVE-2017-13041",
      "CVE-2017-13042",
      "CVE-2017-13043",
      "IJ00566"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IV94724m5a.171009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.0.0-7.2.0.3"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00568",
      "7100-03:IJ00564",
      "7100-04:IJ00565",
      "6100-09:IJ00563",
      "7200-01:IJ00567"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar",
    "cvss": [
      "CVE-2017-12993:5.3",
      "CVE-2017-12992:5.3",
      "CVE-2017-12991:5.3",
      "CVE-2017-12988:5.3",
      "CVE-2017-12987:5.3",
      "CVE-2017-12986:5.3",
      "CVE-2017-12985:5.3",
      "CVE-2017-12902:5.3",
      "CVE-2017-12901:5.3",
      "CVE-2017-12900:5.3",
      "CVE-2017-12899:5.3",
      "CVE-2017-12898:5.3",
      "CVE-2017-12897:5.3",
      "CVE-2017-12896:5.3",
      "CVE-2017-12895:5.3",
      "CVE-2017-12894:5.3",
      "CVE-2017-12893:5.3",
      "CVE-2017-11542:7.5",
      "CVE-2017-11541:7.5",
      "CVE-2017-12997:7.5",
      "CVE-2017-12995:7.5",
      "CVE-2017-12990:7.5",
      "CVE-2017-12989:7.5",
      "CVE-2017-13011:7.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13018:5.3",
      "CVE-2017-13017:5.3",
      "CVE-2017-13016:5.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13015:5.3",
      "CVE-2017-13014:5.3",
      "CVE-2017-13013:5.3",
      "CVE-2017-13012:5.3",
      "CVE-2017-13010:5.3",
      "CVE-2017-13009:5.3",
      "CVE-2017-13008:5.3",
      "CVE-2017-13006:5.3",
      "CVE-2017-13005:5.3",
      "CV"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IJ00567",
    "aparNoSet": [
      "CVE-",
      "CVE-2017-11541",
      "CVE-2017-11542",
      "CVE-2017-11543",
      "CVE-2017-12893",
      "CVE-2017-12894",
      "CVE-2017-12895",
      "CVE-2017-12896",
      "CVE-2017-12897",
      "CVE-2017-12898",
      "CVE-2017-12899",
      "CVE-2017-12900",
      "CVE-2017-12901",
      "CVE-2017-12902",
      "CVE-2017-12985",
      "CVE-2017-12986",
      "CVE-2017-12987",
      "CVE-2017-12988",
      "CVE-2017-12989",
      "CVE-2017-12990",
      "CVE-2017-12991",
      "CVE-2017-12992",
      "CVE-2017-12993",
      "CVE-2017-12994",
      "CVE-2017-12995",
      "CVE-2017-12996",
      "CVE-2017-12997",
      "CVE-2017-12998",
      "CVE-2017-12999",
      "CVE-2017-13000",
      "CVE-2017-13001",
      "CVE-2017-13002",
      "CVE-2017-13003",
      "CVE-2017-13004",
      "CVE-2017-13005",
      "CVE-2017-13006",
      "CVE-2017-13008",
      "CVE-2017-13009",
      "CVE-2017-13010",
      "CVE-2017-13011",
      "CVE-2017-13012",
      "CVE-2017-13013",
      "CVE-2017-13014",
      "CVE-2017-13015",
      "CVE-2017-13016",
      "CVE-2017-13017",
      "CVE-2017-13018",
      "CVE-2017-13035",
      "CVE-2017-13036",
      "CVE-2017-13037",
      "CVE-2017-13038",
      "CVE-2017-13039",
      "CVE-2017-13040",
      "CVE-2017-13041",
      "CVE-2017-13042",
      "CVE-2017-13043",
      "IJ00567"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV94723m3a.171009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.1.0-7.2.1.1"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00568",
      "7200-00:IJ00567",
      "7100-03:IJ00564",
      "7100-04:IJ00565",
      "6100-09:IJ00563"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar",
    "cvss": [
      "CVE-2017-12993:5.3",
      "CVE-2017-12992:5.3",
      "CVE-2017-12991:5.3",
      "CVE-2017-12988:5.3",
      "CVE-2017-12987:5.3",
      "CVE-2017-12986:5.3",
      "CVE-2017-12985:5.3",
      "CVE-2017-12902:5.3",
      "CVE-2017-12901:5.3",
      "CVE-2017-12900:5.3",
      "CVE-2017-12899:5.3",
      "CVE-2017-12898:5.3",
      "CVE-2017-12897:5.3",
      "CVE-2017-12896:5.3",
      "CVE-2017-12895:5.3",
      "CVE-2017-12894:5.3",
      "CVE-2017-12893:5.3",
      "CVE-2017-11542:7.5",
      "CVE-2017-11541:7.5",
      "CVE-2017-12997:7.5",
      "CVE-2017-12995:7.5",
      "CVE-2017-12990:7.5",
      "CVE-2017-12989:7.5",
      "CVE-2017-13011:7.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13018:5.3",
      "CVE-2017-13017:5.3",
      "CVE-2017-13016:5.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13015:5.3",
      "CVE-2017-13014:5.3",
      "CVE-2017-13013:5.3",
      "CVE-2017-13012:5.3",
      "CVE-2017-13010:5.3",
      "CVE-2017-13009:5.3",
      "CVE-2017-13008:5.3",
      "CVE-2017-13006:5.3",
      "CVE-2017-13005:5.3",
      "CV"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IJ00568",
    "aparNoSet": [
      "CVE-",
      "CVE-2017-11541",
      "CVE-2017-11542",
      "CVE-2017-11543",
      "CVE-2017-12893",
      "CVE-2017-12894",
      "CVE-2017-12895",
      "CVE-2017-12896",
      "CVE-2017-12897",
      "CVE-2017-12898",
      "CVE-2017-12899",
      "CVE-2017-12900",
      "CVE-2017-12901",
      "CVE-2017-12902",
      "CVE-2017-12985",
      "CVE-2017-12986",
      "CVE-2017-12987",
      "CVE-2017-12988",
      "CVE-2017-12989",
      "CVE-2017-12990",
      "CVE-2017-12991",
      "CVE-2017-12992",
      "CVE-2017-12993",
      "CVE-2017-12994",
      "CVE-2017-12995",
      "CVE-2017-12996",
      "CVE-2017-12997",
      "CVE-2017-12998",
      "CVE-2017-12999",
      "CVE-2017-13000",
      "CVE-2017-13001",
      "CVE-2017-13002",
      "CVE-2017-13003",
      "CVE-2017-13004",
      "CVE-2017-13005",
      "CVE-2017-13006",
      "CVE-2017-13008",
      "CVE-2017-13009",
      "CVE-2017-13010",
      "CVE-2017-13011",
      "CVE-2017-13012",
      "CVE-2017-13013",
      "CVE-2017-13014",
      "CVE-2017-13015",
      "CVE-2017-13016",
      "CVE-2017-13017",
      "CVE-2017-13018",
      "CVE-2017-13035",
      "CVE-2017-13036",
      "CVE-2017-13037",
      "CVE-2017-13038",
      "CVE-2017-13039",
      "CVE-2017-13040",
      "CVE-2017-13041",
      "CVE-2017-13042",
      "CVE-2017-13043",
      "IJ00568"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IV94729m9a.171009.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory3.asc",
    "filesets": [
      "bos.net.tcp.server:5.3.12.0-5.3.12.6"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "7200-00:IJ00567",
      "7100-03:IJ00564",
      "7100-04:IJ00565",
      "6100-09:IJ00563",
      "7200-01:IJ00567"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/tcpdump_fix3.tar",
    "cvss": [
      "CVE-2017-12993:5.3",
      "CVE-2017-12992:5.3",
      "CVE-2017-12991:5.3",
      "CVE-2017-12988:5.3",
      "CVE-2017-12987:5.3",
      "CVE-2017-12986:5.3",
      "CVE-2017-12985:5.3",
      "CVE-2017-12902:5.3",
      "CVE-2017-12901:5.3",
      "CVE-2017-12900:5.3",
      "CVE-2017-12899:5.3",
      "CVE-2017-12898:5.3",
      "CVE-2017-12897:5.3",
      "CVE-2017-12896:5.3",
      "CVE-2017-12895:5.3",
      "CVE-2017-12894:5.3",
      "CVE-2017-12893:5.3",
      "CVE-2017-11542:7.5",
      "CVE-2017-11541:7.5",
      "CVE-2017-12997:7.5",
      "CVE-2017-12995:7.5",
      "CVE-2017-12990:7.5",
      "CVE-2017-12989:7.5",
      "CVE-2017-13011:7.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13018:5.3",
      "CVE-2017-13017:5.3",
      "CVE-2017-13016:5.3",
      "CVE-2017-11543:7.5",
      "CVE-2017-13015:5.3",
      "CVE-2017-13014:5.3",
      "CVE-2017-13013:5.3",
      "CVE-2017-13012:5.3",
      "CVE-2017-13010:5.3",
      "CVE-2017-13009:5.3",
      "CVE-2017-13008:5.3",
      "CVE-2017-13006:5.3",
      "CVE-2017-13005:5.3",
      "CV"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IJ00951",
    "aparNoSet": [
      "CVE-2017-1692",
      "IJ00951"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ00951s9a.171031.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.lvm:5.3.12.0-5.3.12.8"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01"
    ],
    "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS",
    "aparNo": "IJ01262",
    "aparNoSet": [
      "IJ01262"
    ],
    "fixedIn": "7200-02-02",
    "ifixes": [
      "IJ01262s1a.180328.AIX72TL02SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ01262",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.2.2.0"
    ],
    "issued": "20180331",
    "updated": "null",
    "siblings": [
      "6100-09:IJ00360",
      "7100-04:IJ00519",
      "7100-05:IJ01304",
      "7200-01:IV96360"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij01262/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01"
    ],
    "apAbstract": "ETHERCHANNEL NIB MODE COMMUNICATION FAILURE ON BACKUP ADAPTER",
    "aparNo": "IJ01263",
    "aparNoSet": [
      "IJ01263"
    ],
    "fixedIn": "7200-02-02",
    "ifixes": [
      "IJ01263s1c.AIX72TL02SP00-01.180119.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ01263",
    "filesets": [
      "devices.common.IBM.ethernet.rte:7.2.2.0"
    ],
    "issued": "20180123",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij01263/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01"
    ],
    "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS",
    "aparNo": "IJ01304",
    "aparNoSet": [
      "IJ01304"
    ],
    "fixedIn": "7100-05-02",
    "ifixes": [
      "IJ01304s1a.180328.AIX71TL05SP00-01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ01304",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.1.5.0"
    ],
    "issued": "20180331",
    "updated": "null",
    "siblings": [
      "6100-09:IJ00360",
      "7100-04:IJ00519",
      "7200-01:IV96360",
      "7200-02:IJ01262"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij01304/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10"
    ],
    "apAbstract": "After updating all VIOS SSP nodes -- Node Upgrade Status still shows UP_LEVEL",
    "aparNo": "IJ02674",
    "aparNoSet": [
      "IJ02674"
    ],
    "fixedIn": "2.2.6.20",
    "ifixes": [
      "IJ02674sAa.VIOS2.2.6.0.171215.epkg.Z",
      "IJ02674sAa.VIOS2.2.6.10.171215.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ02674",
    "filesets": [
      "pool.basic.rte:6.1.9.300"
    ],
    "issued": "20171219",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij02674/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-10",
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)",
    "aparNo": "IJ02726",
    "aparNoSet": [
      "CVE-2018-1383",
      "IJ02726"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IJ02726s8a.171221.epkg.Z",
      "IJ02726s9a.171221.epkg.Z",
      "IJ02726sAa.171221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
    "filesets": [
      "bos.cluster.rte:6.1.9.0-6.1.9.300"
    ],
    "issued": "20180208",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02729",
      "7200-01:IJ02828",
      "7200-00:IJ02827",
      "7100-05:IJ02727",
      "7100-04:IJ02825"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar",
    "cvss": [
      "CVE-2018-1383:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.30",
      "2.2.4.40"
    ],
    "apAbstract": "Vulnerability impacts VIOS and VIOS (CVE-2018-1383)",
    "aparNo": "IJ02726",
    "aparNoSet": [
      "CVE-2018-1383",
      "IJ02726"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IJ02726s8a.171221.epkg.Z",
      "IJ02726s9a.171221.epkg.Z",
      "IJ02726sAa.171221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
    "filesets": [
      "bos.cluster.rte:6.1.9.0-6.1.9.300"
    ],
    "issued": "20180208",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02729",
      "7200-01:IJ02828",
      "7200-00:IJ02827",
      "7100-05:IJ02727",
      "7100-04:IJ02825"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar",
    "cvss": [
      "CVE-2018-1383:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.10",
      "2.2.5.20",
      "2.2.5.30"
    ],
    "apAbstract": "Vulnerability impacts VIOS and VIOS (CVE-2018-1383)",
    "aparNo": "IJ02726",
    "aparNoSet": [
      "CVE-2018-1383",
      "IJ02726"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IJ02726s8a.171221.epkg.Z",
      "IJ02726s9a.171221.epkg.Z",
      "IJ02726sAa.171221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
    "filesets": [
      "bos.cluster.rte:6.1.9.0-6.1.9.300"
    ],
    "issued": "20180208",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02729",
      "7200-01:IJ02828",
      "7200-00:IJ02827",
      "7100-05:IJ02727",
      "7100-04:IJ02825"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar",
    "cvss": [
      "CVE-2018-1383:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10"
    ],
    "apAbstract": "Vulnerability impacts VIOS and VIOS (CVE-2018-1383)",
    "aparNo": "IJ02726",
    "aparNoSet": [
      "CVE-2018-1383",
      "IJ02726"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IJ02726s8a.171221.epkg.Z",
      "IJ02726s9a.171221.epkg.Z",
      "IJ02726sAa.171221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
    "filesets": [
      "bos.cluster.rte:6.1.9.0-6.1.9.300"
    ],
    "issued": "20180208",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02729",
      "7200-01:IJ02828",
      "7200-00:IJ02827",
      "7100-05:IJ02727",
      "7100-04:IJ02825"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar",
    "cvss": [
      "CVE-2018-1383:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01"
    ],
    "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)",
    "aparNo": "IJ02727",
    "aparNoSet": [
      "CVE-2018-1383",
      "IJ02727"
    ],
    "fixedIn": "7100-05-02",
    "ifixes": [
      "IJ02727s1a.171221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
    "filesets": [
      "bos.cluster.rte:7.1.5.0-7.1.5.0"
    ],
    "issued": "20180208",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02729",
      "7200-01:IJ02828",
      "7200-00:IJ02827",
      "7100-04:IJ02825",
      "6100-09:IJ02726"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar",
    "cvss": [
      "CVE-2018-1383:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01"
    ],
    "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)",
    "aparNo": "IJ02729",
    "aparNoSet": [
      "CVE-2018-1383",
      "IJ02729"
    ],
    "fixedIn": "7200-02-02",
    "ifixes": [
      "IJ02729s1a.171221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
    "filesets": [
      "bos.cluster.rte:7.2.2.0-7.2.2.0"
    ],
    "issued": "20180208",
    "updated": "null",
    "siblings": [
      "7200-01:IJ02828",
      "7200-00:IJ02827",
      "7100-05:IJ02727",
      "7100-04:IJ02825",
      "6100-09:IJ02726"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar",
    "cvss": [
      "CVE-2018-1383:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)",
    "aparNo": "IJ02825",
    "aparNoSet": [
      "CVE-2018-1383",
      "IJ02825"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IJ02825s3a.171221.epkg.Z",
      "IJ02825s4a.171221.epkg.Z",
      "IJ02825s5a.171221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
    "filesets": [
      "bos.cluster.rte:7.1.4.0-7.1.4.32"
    ],
    "issued": "20180208",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02729",
      "7200-01:IJ02828",
      "7200-00:IJ02827",
      "7100-05:IJ02727",
      "6100-09:IJ02726"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar",
    "cvss": [
      "CVE-2018-1383:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)",
    "aparNo": "IJ02827",
    "aparNoSet": [
      "CVE-2018-1383",
      "IJ02827"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IJ02827s3a.171221.epkg.Z",
      "IJ02827s4a.171221.epkg.Z",
      "IJ02827s5a.171221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
    "filesets": [
      "bos.cluster.rte:7.2.0.0-7.2.0.5"
    ],
    "issued": "20180208",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02729",
      "7200-01:IJ02828",
      "7100-05:IJ02727",
      "7100-04:IJ02825",
      "6100-09:IJ02726"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar",
    "cvss": [
      "CVE-2018-1383:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "Vulnerability impacts AIX and VIOS (CVE-2018-1383)",
    "aparNo": "IJ02828",
    "aparNoSet": [
      "CVE-2018-1383",
      "IJ02828"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IJ02828s1a.171221.epkg.Z",
      "IJ02828s2a.171221.epkg.Z",
      "IJ02828s3a.171221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_advisory.asc",
    "filesets": [
      "bos.cluster.rte:7.2.1.0-7.2.1.2"
    ],
    "issued": "20180208",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02729",
      "7200-00:IJ02827",
      "7100-05:IJ02727",
      "7100-04:IJ02825",
      "6100-09:IJ02726"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixbase_fix.tar",
    "cvss": [
      "CVE-2018-1383:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01",
      "7100-05-02"
    ],
    "apAbstract": "POWERHA NODE HALT DURING IP CHANGES",
    "aparNo": "IJ02843",
    "aparNoSet": [
      "IJ02843"
    ],
    "fixedIn": "7100-05-03",
    "ifixes": [
      "IJ02843s0a.180215.71TL05SP00-02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ02843",
    "filesets": [
      "rsct.basic.rte:3.2.3.0-3.2.3.0"
    ],
    "issued": "20180228",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02843"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij02843/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "POWERHA NODE HALT DURING IP CHANGES",
    "aparNo": "IJ02843",
    "aparNoSet": [
      "IJ02843"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ02843s0a.180215.72TL00SP00-02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ02843",
    "filesets": [
      "rsct.basic.rte:3.2.3.0-3.2.3.0"
    ],
    "issued": "20180228",
    "updated": "null",
    "siblings": [
      "7100-05:IJ02843"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij02843/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-10",
      "6100-09-11",
      "6100-09-09"
    ],
    "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)",
    "aparNo": "IJ02915",
    "aparNoSet": [
      "CVE-2014-3956",
      "IJ02915"
    ],
    "fixedIn": "6100-09-12",
    "ifixes": [
      "IJ02915s9a.180110.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.315"
    ],
    "issued": "20180406",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02920",
      "7200-01:IJ02919",
      "5300-12:IJ03273",
      "7200-00:IJ02918",
      "7100-05:IJ03121",
      "7100-04:IJ02917"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar",
    "cvss": [
      "CVE-2014-3956:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.20",
      "2.2.5.30"
    ],
    "apAbstract": "Vulnerability in sendmail impacts VIOS (CVE-2014-3956)",
    "aparNo": "IJ02915",
    "aparNoSet": [
      "CVE-2014-3956",
      "IJ02915"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ02915s9a.180110.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.315"
    ],
    "issued": "20180406",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02920",
      "7200-01:IJ02919",
      "5300-12:IJ03273",
      "7200-00:IJ02918",
      "7100-05:IJ03121",
      "7100-04:IJ02917"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar",
    "cvss": [
      "CVE-2014-3956:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.10",
      "2.2.6.20",
      "2.2.6.21"
    ],
    "apAbstract": "Vulnerability in sendmail impacts VIOS (CVE-2014-3956)",
    "aparNo": "IJ02915",
    "aparNoSet": [
      "CVE-2014-3956",
      "IJ02915"
    ],
    "fixedIn": "2.2.6.30",
    "ifixes": [
      "IJ02915s9a.180110.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.315"
    ],
    "issued": "20180406",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02920",
      "7200-01:IJ02919",
      "5300-12:IJ03273",
      "7200-00:IJ02918",
      "7100-05:IJ03121",
      "7100-04:IJ02917"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar",
    "cvss": [
      "CVE-2014-3956:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.40",
      "2.2.4.50"
    ],
    "apAbstract": "Vulnerability in sendmail impacts VIOS (CVE-2014-3956)",
    "aparNo": "IJ02915",
    "aparNoSet": [
      "CVE-2014-3956",
      "IJ02915"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ02915s9a.180110.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.315"
    ],
    "issued": "20180406",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02920",
      "7200-01:IJ02919",
      "5300-12:IJ03273",
      "7200-00:IJ02918",
      "7100-05:IJ03121",
      "7100-04:IJ02917"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar",
    "cvss": [
      "CVE-2014-3956:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)",
    "aparNo": "IJ02917",
    "aparNoSet": [
      "CVE-2014-3956",
      "IJ02917"
    ],
    "fixedIn": "7100-04-07",
    "ifixes": [
      "IJ02917s3a.180105.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.32"
    ],
    "issued": "20180406",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02920",
      "7200-01:IJ02919",
      "5300-12:IJ03273",
      "7200-00:IJ02918",
      "7100-05:IJ03121",
      "6100-09:IJ02915"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar",
    "cvss": [
      "CVE-2014-3956:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)",
    "aparNo": "IJ02918",
    "aparNoSet": [
      "CVE-2014-3956",
      "IJ02918"
    ],
    "fixedIn": "7200-00-07",
    "ifixes": [
      "IJ02918s3a.180108.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc",
    "filesets": [
      "bos.net.tcp.sendmail:7.2.0.0-7.2.0.2"
    ],
    "issued": "20180406",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02920",
      "7200-01:IJ02919",
      "5300-12:IJ03273",
      "7100-05:IJ03121",
      "7100-04:IJ02917",
      "6100-09:IJ02915"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar",
    "cvss": [
      "CVE-2014-3956:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)",
    "aparNo": "IJ02919",
    "aparNoSet": [
      "CVE-2014-3956",
      "IJ02919"
    ],
    "fixedIn": "7200-01-05",
    "ifixes": [
      "IJ02919s1a.180108.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc",
    "filesets": [
      "bos.net.tcp.sendmail:7.2.1.0-7.2.1.1"
    ],
    "issued": "20180406",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02920",
      "5300-12:IJ03273",
      "7200-00:IJ02918",
      "7100-05:IJ03121",
      "7100-04:IJ02917",
      "6100-09:IJ02915"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar",
    "cvss": [
      "CVE-2014-3956:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)",
    "aparNo": "IJ02920",
    "aparNoSet": [
      "CVE-2014-3956",
      "IJ02920"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ02920s0a.180110.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc",
    "filesets": [
      "bos.net.tcp.sendmail:7.2.2.0-7.2.2.15"
    ],
    "issued": "20180406",
    "updated": "null",
    "siblings": [
      "7200-01:IJ02919",
      "5300-12:IJ03273",
      "7200-00:IJ02918",
      "7100-05:IJ03121",
      "7100-04:IJ02917",
      "6100-09:IJ02915"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar",
    "cvss": [
      "CVE-2014-3956:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.",
    "aparNo": "IJ03029",
    "aparNoSet": [
      "CVE-2017-5715",
      "CVE-2017-5753",
      "CVE-2017-5754",
      "IJ03029"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ03029m9c.180124.epkg.Z",
      "IJ03029m9a.180117.epkg.Z",
      "IJ03029m9b.180117.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc",
    "filesets": [
      "bos.mp:5.3.12.0-5.3.12.9",
      "bos.mp64:5.3.12.0-5.3.12.10"
    ],
    "issued": "20180125",
    "updated": "20180209",
    "siblings": [
      "2.2.6:IJ03030",
      "2.2.5:IJ03030",
      "2.2.4:IJ03030",
      "7200-02:IJ03036",
      "7200-01:IJ03035",
      "7200-00:IJ03034",
      "7100-05:IJ03033",
      "7100-04:IJ03032",
      "6100-09:IJ03030"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar",
    "cvss": [
      "CVE-2017-5715:0",
      "CVE-2017-5753:0",
      "CVE-2017-5754:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-08",
      "6100-09-09",
      "6100-09-10"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.",
    "aparNo": "IJ03030",
    "aparNoSet": [
      "CVE-2017-5715",
      "CVE-2017-5753",
      "CVE-2017-5754",
      "IJ03030"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IJ03030m8a.180117.epkg.Z",
      "IJ03030m9a.180116.epkg.Z",
      "IJ03030mAa.180116.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.300"
    ],
    "issued": "20180125",
    "updated": "20180209",
    "siblings": [
      "2.2.6:IJ03030",
      "2.2.5:IJ03030",
      "2.2.4:IJ03030",
      "7200-02:IJ03036",
      "7200-01:IJ03035",
      "5300-12:IJ03029",
      "7200-00:IJ03034",
      "7100-05:IJ03033",
      "7100-04:IJ03032"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar",
    "cvss": [
      "CVE-2017-5715:0",
      "CVE-2017-5753:0",
      "CVE-2017-5754:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.30",
      "2.2.4.40",
      "2.2.4.50"
    ],
    "apAbstract": "IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.",
    "aparNo": "IJ03030",
    "aparNoSet": [
      "CVE-2017-5715",
      "CVE-2017-5753",
      "CVE-2017-5754",
      "IJ03030"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IJ03030m8a.180117.epkg.Z",
      "IJ03030m9a.180116.epkg.Z",
      "IJ03030m9b.180116.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.300"
    ],
    "issued": "20180125",
    "updated": "20180209",
    "siblings": [
      "2.2.6:IJ03030",
      "2.2.5:IJ03030",
      "2.2.4:IJ03030",
      "7200-02:IJ03036",
      "7200-01:IJ03035",
      "5300-12:IJ03029",
      "7200-00:IJ03034",
      "7100-05:IJ03033",
      "7100-04:IJ03032"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar",
    "cvss": [
      "CVE-2017-5715:0",
      "CVE-2017-5753:0",
      "CVE-2017-5754:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.10",
      "2.2.5.20",
      "2.2.5.30"
    ],
    "apAbstract": "IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.",
    "aparNo": "IJ03030",
    "aparNoSet": [
      "CVE-2017-5715",
      "CVE-2017-5753",
      "CVE-2017-5754",
      "IJ03030"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IJ03030m8a.180117.epkg.Z",
      "IJ03030m9a.180116.epkg.Z",
      "IJ03030m9b.180116.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.300"
    ],
    "issued": "20180125",
    "updated": "20180209",
    "siblings": [
      "2.2.6:IJ03030",
      "2.2.5:IJ03030",
      "2.2.4:IJ03030",
      "7200-02:IJ03036",
      "7200-01:IJ03035",
      "5300-12:IJ03029",
      "7200-00:IJ03034",
      "7100-05:IJ03033",
      "7100-04:IJ03032"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar",
    "cvss": [
      "CVE-2017-5715:0",
      "CVE-2017-5753:0",
      "CVE-2017-5754:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10"
    ],
    "apAbstract": "IBM has released VIOS and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.",
    "aparNo": "IJ03030",
    "aparNoSet": [
      "CVE-2017-5715",
      "CVE-2017-5753",
      "CVE-2017-5754",
      "IJ03030"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IJ03030mAa.180116.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.300"
    ],
    "issued": "20180125",
    "updated": "20180209",
    "siblings": [
      "2.2.6:IJ03030",
      "2.2.5:IJ03030",
      "2.2.4:IJ03030",
      "7200-02:IJ03036",
      "7200-01:IJ03035",
      "5300-12:IJ03029",
      "7200-00:IJ03034",
      "7100-05:IJ03033",
      "7100-04:IJ03032"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar",
    "cvss": [
      "CVE-2017-5715:0",
      "CVE-2017-5753:0",
      "CVE-2017-5754:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.",
    "aparNo": "IJ03032",
    "aparNoSet": [
      "CVE-2017-5715",
      "CVE-2017-5753",
      "CVE-2017-5754",
      "IJ03032"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IJ03032m3a.180125.epkg.Z",
      "IJ03032m3b.180125.epkg.Z",
      "IJ03032m4a.180125.epkg.Z",
      "IJ03032m5a.180116.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.4.0-7.1.4.33"
    ],
    "issued": "20180125",
    "updated": "20180209",
    "siblings": [
      "2.2.6:IJ03030",
      "2.2.5:IJ03030",
      "2.2.4:IJ03030",
      "7200-02:IJ03036",
      "7200-01:IJ03035",
      "5300-12:IJ03029",
      "7200-00:IJ03034",
      "7100-05:IJ03033",
      "6100-09:IJ03030"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar",
    "cvss": [
      "CVE-2017-5715:0",
      "CVE-2017-5753:0",
      "CVE-2017-5754:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.",
    "aparNo": "IJ03033",
    "aparNoSet": [
      "CVE-2017-5715",
      "CVE-2017-5753",
      "CVE-2017-5754",
      "IJ03033"
    ],
    "fixedIn": "7100-05-02",
    "ifixes": [
      "IJ03033m1a.180116.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.0"
    ],
    "issued": "20180125",
    "updated": "20180209",
    "siblings": [
      "2.2.6:IJ03030",
      "2.2.5:IJ03030",
      "2.2.4:IJ03030",
      "7200-02:IJ03036",
      "7200-01:IJ03035",
      "5300-12:IJ03029",
      "7200-00:IJ03034",
      "7100-04:IJ03032",
      "6100-09:IJ03030"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar",
    "cvss": [
      "CVE-2017-5715:0",
      "CVE-2017-5753:0",
      "CVE-2017-5754:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.",
    "aparNo": "IJ03034",
    "aparNoSet": [
      "CVE-2017-5715",
      "CVE-2017-5753",
      "CVE-2017-5754",
      "IJ03034"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IJ03034m3a.180117.epkg.Z",
      "IJ03034m4a.180117.epkg.Z",
      "IJ03034m5a.180117.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.0.0-7.2.0.5"
    ],
    "issued": "20180125",
    "updated": "20180209",
    "siblings": [
      "2.2.6:IJ03030",
      "2.2.5:IJ03030",
      "2.2.4:IJ03030",
      "7200-02:IJ03036",
      "7200-01:IJ03035",
      "5300-12:IJ03029",
      "7100-05:IJ03033",
      "7100-04:IJ03032",
      "6100-09:IJ03030"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar",
    "cvss": [
      "CVE-2017-5715:0",
      "CVE-2017-5753:0",
      "CVE-2017-5754:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.",
    "aparNo": "IJ03035",
    "aparNoSet": [
      "CVE-2017-5715",
      "CVE-2017-5753",
      "CVE-2017-5754",
      "IJ03035"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IJ03035m1a.180118.epkg.Z",
      "IJ03035m1b.180118.epkg.Z",
      "IJ03035m2a.180118.epkg.Z",
      "IJ03035m3a.180117.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.1.0-7.2.1.4"
    ],
    "issued": "20180125",
    "updated": "20180209",
    "siblings": [
      "2.2.6:IJ03030",
      "2.2.5:IJ03030",
      "2.2.4:IJ03030",
      "7200-02:IJ03036",
      "5300-12:IJ03029",
      "7200-00:IJ03034",
      "7100-05:IJ03033",
      "7100-04:IJ03032",
      "6100-09:IJ03030"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar",
    "cvss": [
      "CVE-2017-5715:0",
      "CVE-2017-5753:0",
      "CVE-2017-5754:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to the vulnerabilities known as Spectre and Meltdown.",
    "aparNo": "IJ03036",
    "aparNoSet": [
      "CVE-2017-5715",
      "CVE-2017-5753",
      "CVE-2017-5754",
      "IJ03036"
    ],
    "fixedIn": "7200-02-02",
    "ifixes": [
      "IJ03036m1a.180116.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.2.0-7.2.2.0"
    ],
    "issued": "20180125",
    "updated": "20180209",
    "siblings": [
      "2.2.6:IJ03030",
      "2.2.5:IJ03030",
      "2.2.4:IJ03030",
      "7200-01:IJ03035",
      "5300-12:IJ03029",
      "7200-00:IJ03034",
      "7100-05:IJ03033",
      "7100-04:IJ03032",
      "6100-09:IJ03030"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_meltdown_fix.tar",
    "cvss": [
      "CVE-2017-5715:0",
      "CVE-2017-5753:0",
      "CVE-2017-5754:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01",
      "7100-05-02"
    ],
    "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)",
    "aparNo": "IJ03121",
    "aparNoSet": [
      "CVE-2014-3956",
      "IJ03121"
    ],
    "fixedIn": "7100-05-04",
    "ifixes": [
      "IJ03121s0a.180110.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.15"
    ],
    "issued": "20180406",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02920",
      "7200-01:IJ02919",
      "5300-12:IJ03273",
      "7200-00:IJ02918",
      "7100-04:IJ02917",
      "6100-09:IJ02915"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar",
    "cvss": [
      "CVE-2014-3956:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.40"
    ],
    "apAbstract": "SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED",
    "aparNo": "IJ03186",
    "aparNoSet": [
      "IJ03186"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z",
      "IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z",
      "IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z",
      "IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ03186",
    "filesets": [
      "devices.ethernet.mlx.rte:6.1.9.315"
    ],
    "issued": "20180428",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij03186/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10",
      "2.2.6.20",
      "2.2.6.21"
    ],
    "apAbstract": "SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED",
    "aparNo": "IJ03186",
    "aparNoSet": [
      "IJ03186"
    ],
    "fixedIn": "2.2.6.30",
    "ifixes": [
      "IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z",
      "IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z",
      "IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z",
      "IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ03186",
    "filesets": [
      "devices.ethernet.mlx.rte:6.1.9.300-6.1.9.315"
    ],
    "issued": "20180428",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij03186/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.60"
    ],
    "apAbstract": "SMALL TCP PACKETS SENT VIA SEA MAY BE DROPPED",
    "aparNo": "IJ03186",
    "aparNoSet": [
      "IJ03186"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ03186sAa.180220.VIOS2.2.6.0-20.epkg.Z",
      "IJ03186sBa.180410.VIOS.2.2.4.60.epkg.Z",
      "IJ03186sBa.180410.VIOS.2.2.5.40.epkg.Z",
      "IJ03186sBa.180410.VIOS.2.2.6.21.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ03186",
    "filesets": [
      "devices.ethernet.mlx.rte:6.1.9.315"
    ],
    "issued": "20180428",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij03186/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in sendmail impacts AIX (CVE-2014-3956)",
    "aparNo": "IJ03273",
    "aparNoSet": [
      "CVE-2014-3956",
      "IJ03273"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ03273s9a.180116.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/sendmail_advisory3.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10",
      "bos.net.tcp.server:5.3.12.0-5.3.12.6"
    ],
    "issued": "20180406",
    "updated": "null",
    "siblings": [
      "7200-02:IJ02920",
      "7200-01:IJ02919",
      "7200-00:IJ02918",
      "7100-05:IJ03121",
      "7100-04:IJ02917",
      "6100-09:IJ02915"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/sendmail_fix3.tar",
    "cvss": [
      "CVE-2014-3956:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01"
    ],
    "apAbstract": "APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP",
    "aparNo": "IJ04075",
    "aparNoSet": [
      "IJ04075"
    ],
    "fixedIn": "7200-02-02",
    "ifixes": [
      "IJ04075s1a.180306.72TL02SP00-01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04075",
    "filesets": [
      "bos.rte.libc:7.2.2.0-7.2.2.0"
    ],
    "issued": "20180310",
    "updated": "null",
    "siblings": [
      "6100-09:IJ04511",
      "7100-05:IJ04510"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04075/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01",
      "7100-05-02"
    ],
    "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES",
    "aparNo": "IJ04266",
    "aparNoSet": [
      "IJ04266"
    ],
    "fixedIn": "7100-05-03",
    "ifixes": [
      "IJ04266m1a.180226.AIX71TL05SP00-01.epkg.Z",
      "IJ04266s2a.180403.AIX71TL05SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04266",
    "filesets": [
      "bos.cluster.rte:7.1.5.0-7.1.5.15"
    ],
    "issued": "20180405",
    "updated": "null",
    "siblings": [
      "6100-09:IJ04279",
      "7100-04:IJ04512",
      "7200-01:IJ04267",
      "7200-02:IJ04268"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04266/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES",
    "aparNo": "IJ04267",
    "aparNoSet": [
      "IJ04267"
    ],
    "fixedIn": "7200-01-05",
    "ifixes": [
      "IJ04267m2a.180403.AIX72TL01SP02.epkg.Z",
      "IJ04267m3a.180403.AIX72TL01SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04267",
    "filesets": [
      "bos.cluster.rte:7.2.1.0-7.2.1.3"
    ],
    "issued": "20180405",
    "updated": "null",
    "siblings": [
      "6100-09:IJ04279",
      "7100-04:IJ04512",
      "7100-05:IJ04266",
      "7200-02:IJ04268"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04267/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES",
    "aparNo": "IJ04268",
    "aparNoSet": [
      "IJ04268"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ04268s2a.180403.AIX72TL02SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04268",
    "filesets": [
      "bos.cluster.rte:7.2.2.0-7.2.2.15"
    ],
    "issued": "20180405",
    "updated": "null",
    "siblings": [
      "6100-09:IJ04279",
      "7100-04:IJ04512",
      "7100-05:IJ04266",
      "7200-01:IJ04267"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04268/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07",
      "6100-09-08",
      "6100-09-09",
      "6100-09-10",
      "6100-09-11"
    ],
    "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES",
    "aparNo": "IJ04279",
    "aparNoSet": [
      "IJ04279"
    ],
    "fixedIn": "6100-09-12",
    "ifixes": [
      "IJ04279m9a.180404.AIX61TL09SP09.epkg.Z",
      "IJ04279mAa.180220.AIX61TL09SP10.epkg.Z",
      "IJ04279sBa.180419.AIX61TL09SP11.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04279",
    "filesets": [
      "bos.cluster.rte:6.1.9.0-6.1.9.315"
    ],
    "issued": "20180405",
    "updated": "null",
    "siblings": [
      "7100-04:IJ04512",
      "7100-05:IJ04266",
      "7200-01:IJ04267",
      "7200-02:IJ04268"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04279/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01"
    ],
    "apAbstract": "APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP",
    "aparNo": "IJ04510",
    "aparNoSet": [
      "IJ04510"
    ],
    "fixedIn": "7100-05-02",
    "ifixes": [
      "IJ04510s1a.180306.71TL05SP00-01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04510",
    "filesets": [
      "bos.rte.libc:7.1.5.0-7.1.5.0"
    ],
    "issued": "20180310",
    "updated": "null",
    "siblings": [
      "6100-09:IJ04511",
      "7200-02:IJ04075"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04510/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10"
    ],
    "apAbstract": "APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP",
    "aparNo": "IJ04511",
    "aparNoSet": [
      "IJ04511"
    ],
    "fixedIn": "2.2.6.20",
    "ifixes": [
      "IJ04511sAa.180308.AIX61TL09SP10.epkg.Z",
      "IJ04511sAa.180308.VIOS2.2.6.0-10.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04511",
    "filesets": [
      "bos.rte.libc:6.1.9.300-6.1.9.300"
    ],
    "issued": "20180310",
    "updated": "null",
    "siblings": [
      "7100-05:IJ04510",
      "7200-02:IJ04075"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04511/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-10"
    ],
    "apAbstract": "APPLICATIONS CALLING __XMBRTOWC() MAY CORE DUMP",
    "aparNo": "IJ04511",
    "aparNoSet": [
      "IJ04511"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IJ04511sAa.180308.AIX61TL09SP10.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04511",
    "filesets": [
      "bos.rte.libc:6.1.9.300-6.1.9.300"
    ],
    "issued": "20180310",
    "updated": "null",
    "siblings": [
      "7100-05:IJ04510",
      "7200-02:IJ04075"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04511/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03",
      "7100-04-04",
      "7100-04-05",
      "7100-04-06"
    ],
    "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES",
    "aparNo": "IJ04512",
    "aparNoSet": [
      "IJ04512"
    ],
    "fixedIn": "7100-04-07",
    "ifixes": [
      "IJ04512m5a.180313.AIX71TL04SP05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04512",
    "filesets": [
      "bos.cluster.rte:7.1.4.0-7.1.4.33"
    ],
    "issued": "20180405",
    "updated": "null",
    "siblings": [
      "6100-09:IJ04279",
      "7100-05:IJ04266",
      "7200-01:IJ04267",
      "7200-02:IJ04268"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04512/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.0",
      "2.2.5.10",
      "2.2.5.20",
      "2.2.5.30",
      "2.2.5.40"
    ],
    "apAbstract": "Multiple issues with VIOS SSP poolfs including potential data loss",
    "aparNo": "IJ04826",
    "aparNoSet": [
      "IJ04826"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z",
      "IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z",
      "IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04826",
    "filesets": [
      "pool.basic.rte:6.1.9.200-6.1.9.203"
    ],
    "issued": "20180605",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04826/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10",
      "2.2.6.20",
      "2.2.6.21"
    ],
    "apAbstract": "Multiple issues with VIOS SSP poolfs including potential data loss",
    "aparNo": "IJ04826",
    "aparNoSet": [
      "IJ04826"
    ],
    "fixedIn": "2.2.6.30",
    "ifixes": [
      "IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z",
      "IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z",
      "IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04826",
    "filesets": [
      "pool.basic.rte:6.1.9.300-6.1.9.315"
    ],
    "issued": "20180605",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04826/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.30",
      "2.2.4.40",
      "2.2.4.50",
      "2.2.4.60"
    ],
    "apAbstract": "Multiple issues with VIOS SSP poolfs including potential data loss",
    "aparNo": "IJ04826",
    "aparNoSet": [
      "IJ04826"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ04826mBa.180531.VIOS2.2.4.60.epkg.Z",
      "IJ04826mBb.180531.VIOS2.2.5.40.epkg.Z",
      "IJ04826mBc.180531.VIOS2.2.6.21.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ04826",
    "filesets": [
      "pool.basic.rte:6.1.9.100-6.1.9.107"
    ],
    "issued": "20180605",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij04826/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02",
      "7200-00-03",
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "POSSIBLE HANG DURING POWERHA VERIFY \u0026 SYNC AND OTHER PROCESSES",
    "aparNo": "IJ05429",
    "aparNoSet": [
      "IJ05429"
    ],
    "fixedIn": "7200-00-07",
    "ifixes": [
      "IJ05429m5b.180403.AIX72TL00SP05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ05429",
    "filesets": [
      "bos.cluster.rte:7.2.0.0-7.2.0.6"
    ],
    "issued": "20180405",
    "updated": "null",
    "siblings": [
      "6100-09:IJ04279",
      "7100-04:IJ04512",
      "7100-05:IJ04266",
      "7200-01:IJ04267",
      "7200-02:IJ04268"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij05429/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05818",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05818"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ05818m1a.180423.epkg.Z",
      "IJ05818s2a.180420.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.2.0-7.2.2.16"
    ],
    "issued": "20180522",
    "updated": "20180606",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-02"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05818",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05818"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ05818s2a.180420.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.2.0-7.2.2.16"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05820",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05820"
    ],
    "fixedIn": "7200-01-05",
    "ifixes": [
      "IJ05820m2a.180430.epkg.Z",
      "IJ05820m3a.180430.epkg.Z",
      "IJ05820m4a.180423.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.1.0-7.2.1.5"
    ],
    "issued": "20180522",
    "updated": "20180606",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-04"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05820",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05820"
    ],
    "fixedIn": "7200-01-05",
    "ifixes": [
      "IJ05820m4a.180423.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.1.0-7.2.1.5"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05821",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05821"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ05821m4a.180430.epkg.Z",
      "IJ05821m5a.180430.epkg.Z",
      "IJ05821m6a.180424.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.0.0-7.2.0.6"
    ],
    "issued": "20180522",
    "updated": "20180606",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-06"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05821",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05821"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ05821m6a.180424.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.0.0-7.2.0.6"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01",
      "7100-05-02"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB)  also known as Variant 4.",
    "aparNo": "IJ05822",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05822"
    ],
    "fixedIn": "7100-05-03",
    "ifixes": [
      "IJ05822m1a.180430.epkg.Z",
      "IJ05822s2a.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.16"
    ],
    "issued": "20180522",
    "updated": "20180606",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-02"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05822",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05822"
    ],
    "fixedIn": "7100-05-03",
    "ifixes": [
      "IJ05822s2a.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.16"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-04",
      "7100-04-05",
      "7100-04-06"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05823",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05823"
    ],
    "fixedIn": "7100-04-07",
    "ifixes": [
      "IJ05823m4a.180501.epkg.Z",
      "IJ05823m5a.180430.epkg.Z",
      "IJ05823m6a.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.4.0-7.1.4.34"
    ],
    "issued": "20180522",
    "updated": "20180606",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-06"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05823",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05823"
    ],
    "fixedIn": "7100-04-07",
    "ifixes": [
      "IJ05823m6a.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.4.0-7.1.4.34"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-09",
      "6100-09-10",
      "6100-09-11"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05824",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05824"
    ],
    "fixedIn": "6100-09-12",
    "ifixes": [
      "IJ05824m9a.180501.epkg.Z",
      "IJ05824mAa.180501.epkg.Z",
      "IJ05824sBa.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.316"
    ],
    "issued": "20180522",
    "updated": "20180606",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-11"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05824",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05824"
    ],
    "fixedIn": "6100-09-12",
    "ifixes": [
      "IJ05824sBa.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.316"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10",
      "2.2.6.20",
      "2.2.6.21"
    ],
    "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05824",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05824"
    ],
    "fixedIn": "2.2.6.22",
    "ifixes": [
      "IJ05824mAa.180501.epkg.Z",
      "IJ05824sBa.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.316"
    ],
    "issued": "20180522",
    "updated": "20180606",
    "siblings": [
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.20",
      "2.2.6.21"
    ],
    "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05824",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05824"
    ],
    "fixedIn": "2.2.6.22",
    "ifixes": [
      "IJ05824sBa.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.316"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.20",
      "2.2.6.40",
      "2.2.6.60"
    ],
    "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05824",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05824"
    ],
    "fixedIn": "6100-09-12",
    "ifixes": [
      "IJ05824sBa.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.316"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.40",
      "2.2.4.50",
      "2.2.4.60"
    ],
    "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05824",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05824"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ05824m9a.180501.epkg.Z",
      "IJ05824m9b.180502.epkg.Z",
      "IJ05824sBa.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.316"
    ],
    "issued": "20180522",
    "updated": "20180606",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.60"
    ],
    "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05824",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05824"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ05824sBa.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.316"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.20",
      "2.2.5.30",
      "2.2.5.40"
    ],
    "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05824",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05824"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ05824m9a.180501.epkg.Z",
      "IJ05824m9b.180502.epkg.Z",
      "IJ05824sBa.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.316"
    ],
    "issued": "20180522",
    "updated": "20180606",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.40"
    ],
    "apAbstract": "IBM has released VIOS and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05824",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05824"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ05824sBa.180426.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.316"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "5300-12:IJ05826",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "IBM has released AIX and VIOS iFixes in response to Speculative Store Bypass (SSB) also known as Variant 4.",
    "aparNo": "IJ05826",
    "aparNoSet": [
      "CVE-2018-3639",
      "IJ05826"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ05826m9b.180427.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc",
    "filesets": [
      "bos.mp64:5.3.12.0-5.3.12.10"
    ],
    "issued": "20180522",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ05824",
      "2.2.5:IJ05824",
      "2.2.4:IJ05824",
      "7200-02:IJ05818",
      "7200-01:IJ05820",
      "7200-00:IJ05821",
      "7100-05:IJ05822",
      "7100-04:IJ05823",
      "6100-09:IJ05824"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/variant4_fix.tar",
    "cvss": [
      "CVE-2018-3639:0"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "UNDETECTED DATA CORRUPTION POSSIBLE WITH DEFRAGFS -F COMMAND",
    "aparNo": "IJ06486",
    "aparNoSet": [
      "IJ06486"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ06486s2b.72TL02SP02.180524.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ06486",
    "filesets": [
      "bos.mp64:7.2.2.0-7.2.2.17"
    ],
    "issued": "20180525",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij06486/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.0",
      "2.2.5.10",
      "2.2.5.20",
      "2.2.5.30",
      "2.2.5.40"
    ],
    "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable",
    "aparNo": "IJ06644",
    "aparNoSet": [
      "IJ06644"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ06644sAa.180917.AIX61TL09SP10.epkg.Z",
      "IJ06644sBa.180615.AIX61TL09SP11.epkg.Z",
      "IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z",
      "IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z",
      "IJ06644sCa.180917.AIX61TL09SP12.epkg.Z",
      "IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ06644",
    "filesets": [
      "devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.315"
    ],
    "issued": "20181013",
    "updated": "null",
    "siblings": [
      "6100-09:IJ06644",
      "7100-04:IJ09173",
      "7100-05:IJ09174",
      "7200-01:IJ09175",
      "7200-02:IJ09176",
      "7200-03:IJ08641"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij06644/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10",
      "2.2.6.20",
      "2.2.6.30",
      "2.2.6.31"
    ],
    "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable",
    "aparNo": "IJ06644",
    "aparNoSet": [
      "IJ06644"
    ],
    "fixedIn": "2.2.6.32",
    "ifixes": [
      "IJ06644sAa.180917.AIX61TL09SP10.epkg.Z",
      "IJ06644sBa.180615.AIX61TL09SP11.epkg.Z",
      "IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z",
      "IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z",
      "IJ06644sCa.180917.AIX61TL09SP12.epkg.Z",
      "IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ06644",
    "filesets": [
      "devices.pciex.df1060e214103404.com:6.1.9.300-6.1.9.400"
    ],
    "issued": "20181013",
    "updated": "null",
    "siblings": [
      "6100-09:IJ06644",
      "7100-04:IJ09173",
      "7100-05:IJ09174",
      "7200-01:IJ09175",
      "7200-02:IJ09176",
      "7200-03:IJ08641"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij06644/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07",
      "6100-09-08",
      "6100-09-09",
      "6100-09-10",
      "6100-09-11",
      "6100-09-12"
    ],
    "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable",
    "aparNo": "IJ06644",
    "aparNoSet": [
      "IJ06644"
    ],
    "fixedIn": "6100-09-12-1838",
    "ifixes": [
      "IJ06644sAa.180917.AIX61TL09SP10.epkg.Z",
      "IJ06644sBa.180615.AIX61TL09SP11.epkg.Z",
      "IJ06644sCa.180917.AIX61TL09SP12.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ06644",
    "filesets": [
      "devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.400"
    ],
    "issued": "20181013",
    "updated": "null",
    "siblings": [
      "7100-04:IJ09173",
      "7100-05:IJ09174",
      "7200-01:IJ09175",
      "7200-02:IJ09176",
      "7200-03:IJ08641"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij06644/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-09",
      "6100-09-10",
      "6100-09-11"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IJ06651",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06651"
    ],
    "fixedIn": "6100-09-12",
    "ifixes": [
      "IJ06651m9a.180528.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.315"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-09",
      "6100-09-10",
      "6100-09-11"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IJ06651",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06651"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ06400s9a.180514.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.20",
      "2.2.5.30",
      "2.2.5.40"
    ],
    "apAbstract": "Vulnerabilities in NTP affect VIOS",
    "aparNo": "IJ06651",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06651"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ06651m9a.180528.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10",
      "2.2.6.21"
    ],
    "apAbstract": "Vulnerabilities in NTP affect VIOS",
    "aparNo": "IJ06651",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06651"
    ],
    "fixedIn": "2.2.6.30",
    "ifixes": [
      "IJ06651m9a.180528.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.40",
      "2.2.4.50",
      "2.2.4.60"
    ],
    "apAbstract": "Vulnerabilities in NTP affect VIOS",
    "aparNo": "IJ06651",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06651"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ06651m9a.180528.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-04",
      "7100-04-05",
      "7100-04-06"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IJ06652",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06652"
    ],
    "fixedIn": "7100-04-07",
    "ifixes": [
      "IJ06652m4a.180528.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.33"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01",
      "7100-05-02"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IJ06653",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06653"
    ],
    "fixedIn": "7100-05-03",
    "ifixes": [
      "IJ06653m0a.180527.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.15"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IJ06654",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06654"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ06654m4a.180527.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "bos.net.tcp.ntpd:7.2.0.0-7.2.0.4"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IJ06655",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06655"
    ],
    "fixedIn": "7200-01-05",
    "ifixes": [
      "IJ06655m2a.180527.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "bos.net.tcp.ntpd:7.2.1.0-7.2.1.2"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IJ06656",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06656"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ06656m0a.180527.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "bos.net.tcp.ntpd:7.2.2.0-7.2.2.15"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "5300-12:IJ06657",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IJ06657",
    "aparNoSet": [
      "CVE-2014-5209",
      "CVE-2016-1549",
      "CVE-2018-7170",
      "CVE-2018-7182",
      "CVE-2018-7183",
      "CVE-2018-7184",
      "CVE-2018-7185",
      "IJ06657"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ06657m9a.180529.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/ntp_advisory10.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20180814",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ06651",
      "2.2.5:IJ06651",
      "2.2.4:IJ06651",
      "7200-02:IJ06656",
      "7200-01:IJ06655",
      "7200-00:IJ06654",
      "6100-09:IJ06651",
      "7100-05:IJ06653",
      "7100-04:IJ06652"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix10.tar",
    "cvss": [
      "CVE-2014-5209:5.0",
      "CVE-2018-7182:5.3",
      "CVE-2018-7183:5.6",
      "CVE-2018-7170:3.1",
      "CVE-2018-7184:3.1",
      "CVE-2018-7185:3.1",
      "CVE-2016-1549:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01",
      "7100-05-02"
    ],
    "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)",
    "aparNo": "IJ06904",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06904"
    ],
    "fixedIn": "7100-05-03",
    "ifixes": [
      "IJ06904s5a.180607.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.15"
    ],
    "issued": "20180621",
    "updated": "20180703",
    "siblings": [
      "2.2.6:IJ06905",
      "2.2.5:IJ06905",
      "2.2.4:IJ06905",
      "7200-02:IJ06908",
      "7200-01:IJ06907",
      "5300-12:IJ06935",
      "7200-00:IJ06934",
      "7100-04:IJ06906",
      "6100-09:IJ06905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-09",
      "6100-09-10",
      "6100-09-11"
    ],
    "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)",
    "aparNo": "IJ06905",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06905"
    ],
    "fixedIn": "6100-09-12",
    "ifixes": [
      "IJ06905s9a.180608.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.315"
    ],
    "issued": "20180621",
    "updated": "20180703",
    "siblings": [
      "2.2.6:IJ06905",
      "2.2.5:IJ06905",
      "2.2.4:IJ06905",
      "7200-02:IJ06908",
      "7200-01:IJ06907",
      "5300-12:IJ06935",
      "7200-00:IJ06934",
      "7100-05:IJ06904",
      "7100-04:IJ06906"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.20",
      "2.2.5.30",
      "2.2.5.40"
    ],
    "apAbstract": "Vulnerability in rmsock affects VIOS (CVE-2018-1655)",
    "aparNo": "IJ06905",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06905"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ06905s9a.180608.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180621",
    "updated": "20180703",
    "siblings": [
      "2.2.6:IJ06905",
      "2.2.4:IJ06905",
      "7200-02:IJ06908",
      "7200-01:IJ06907",
      "5300-12:IJ06935",
      "7200-00:IJ06934",
      "7100-05:IJ06904",
      "7100-04:IJ06906",
      "6100-09:IJ06905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.10",
      "2.2.6.20",
      "2.2.6.21"
    ],
    "apAbstract": "Vulnerability in rmsock affects VIOS (CVE-2018-1655)",
    "aparNo": "IJ06905",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06905"
    ],
    "fixedIn": "2.2.6.30",
    "ifixes": [
      "IJ06905s9a.180608.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180621",
    "updated": "20180703",
    "siblings": [
      "2.2.5:IJ06905",
      "2.2.4:IJ06905",
      "7200-02:IJ06908",
      "7200-01:IJ06907",
      "5300-12:IJ06935",
      "7200-00:IJ06934",
      "7100-05:IJ06904",
      "7100-04:IJ06906",
      "6100-09:IJ06905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.20",
      "2.2.6.21"
    ],
    "apAbstract": "Vulnerability in rmsock affects VIOS (CVE-2018-1655)",
    "aparNo": "IJ06905",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06905"
    ],
    "fixedIn": "2.2.6.30",
    "ifixes": [
      "IJ06905s9a.180608.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180621",
    "updated": "null",
    "siblings": [
      "7200-02:IJ06908",
      "7200-01:IJ06907",
      "5300-12:IJ06935",
      "7200-00:IJ06934",
      "7100-05:IJ06904",
      "7100-04:IJ06906",
      "6100-09:IJ06905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.40",
      "2.2.4.50",
      "2.2.4.60"
    ],
    "apAbstract": "Vulnerability in rmsock affects VIOS (CVE-2018-1655)",
    "aparNo": "IJ06905",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06905"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ06905s9a.180608.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180621",
    "updated": "20180703",
    "siblings": [
      "2.2.6:IJ06905",
      "2.2.5:IJ06905",
      "7200-02:IJ06908",
      "7200-01:IJ06907",
      "5300-12:IJ06935",
      "7200-00:IJ06934",
      "7100-05:IJ06904",
      "7100-04:IJ06906",
      "6100-09:IJ06905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-04",
      "7100-04-05",
      "7100-04-06"
    ],
    "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)",
    "aparNo": "IJ06906",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06906"
    ],
    "fixedIn": "7100-04-07",
    "ifixes": [
      "IJ06906s4a.180607.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.33"
    ],
    "issued": "20180621",
    "updated": "20180703",
    "siblings": [
      "2.2.6:IJ06905",
      "2.2.5:IJ06905",
      "2.2.4:IJ06905",
      "7200-02:IJ06908",
      "7200-01:IJ06907",
      "5300-12:IJ06935",
      "7200-00:IJ06934",
      "7100-05:IJ06904",
      "6100-09:IJ06905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)",
    "aparNo": "IJ06907",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06907"
    ],
    "fixedIn": "7200-01-05",
    "ifixes": [
      "IJ06907s1a.180607.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.1.0-7.2.1.3"
    ],
    "issued": "20180621",
    "updated": "20180703",
    "siblings": [
      "2.2.6:IJ06905",
      "2.2.5:IJ06905",
      "2.2.4:IJ06905",
      "7200-02:IJ06908",
      "5300-12:IJ06935",
      "7200-00:IJ06934",
      "7100-05:IJ06904",
      "7100-04:IJ06906",
      "6100-09:IJ06905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)",
    "aparNo": "IJ06908",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06908"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ06908s2a.180607.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.2.0-7.2.2.16"
    ],
    "issued": "20180621",
    "updated": "20180703",
    "siblings": [
      "2.2.6:IJ06905",
      "2.2.5:IJ06905",
      "2.2.4:IJ06905",
      "7200-01:IJ06907",
      "5300-12:IJ06935",
      "7200-00:IJ06934",
      "7100-05:IJ06904",
      "7100-04:IJ06906",
      "6100-09:IJ06905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)",
    "aparNo": "IJ06934",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06934"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ06934s0a.180607.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.0.0-7.2.0.5"
    ],
    "issued": "20180621",
    "updated": "20180703",
    "siblings": [
      "2.2.6:IJ06905",
      "2.2.5:IJ06905",
      "2.2.4:IJ06905",
      "7200-02:IJ06908",
      "7200-01:IJ06907",
      "5300-12:IJ06935",
      "7100-05:IJ06904",
      "7100-04:IJ06906",
      "6100-09:IJ06905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in rmsock affects AIX (CVE-2018-1655)",
    "aparNo": "IJ06935",
    "aparNoSet": [
      "CVE-2018-1655",
      "IJ06935"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ06935s1a.180611.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/rmsock_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20180621",
    "updated": "20180703",
    "siblings": [
      "2.2.6:IJ06905",
      "2.2.5:IJ06905",
      "2.2.4:IJ06905",
      "7200-02:IJ06908",
      "7200-01:IJ06907",
      "7200-00:IJ06934",
      "7100-05:IJ06904",
      "7100-04:IJ06906",
      "6100-09:IJ06905"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/rmsock_fix2.tar",
    "cvss": [
      "CVE-2018-1655:4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.",
    "aparNo": "IJ07497",
    "aparNoSet": [
      "CVE-2017-5715",
      "IJ07497"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ07497m1a.180717.epkg.Z",
      "IJ07497m2a.180713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.2.0-7.2.2.16"
    ],
    "issued": "20180817",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ07498",
      "2.2.5:IJ07498",
      "2.2.4:IJ07498",
      "7200-01:IJ07501",
      "7100-05:IJ07500",
      "7100-04:IJ07499",
      "6100-09:IJ07498"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar",
    "cvss": [
      "CVE-2017-5715:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-09",
      "6100-09-10",
      "6100-09-11"
    ],
    "apAbstract": "IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.",
    "aparNo": "IJ07498",
    "aparNoSet": [
      "CVE-2017-5715",
      "IJ07498"
    ],
    "fixedIn": "6100-09-12",
    "ifixes": [
      "IJ07498m9a.180726.epkg.Z",
      "IJ07498mAa.180717.epkg.Z",
      "IJ07498mBa.180713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.316"
    ],
    "issued": "20180817",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ07498",
      "2.2.5:IJ07498",
      "2.2.4:IJ07498",
      "7200-02:IJ07497",
      "7200-01:IJ07501",
      "7100-05:IJ07500",
      "7100-04:IJ07499"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar",
    "cvss": [
      "CVE-2017-5715:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.20",
      "2.2.5.30",
      "2.2.5.40"
    ],
    "apAbstract": "IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.",
    "aparNo": "IJ07498",
    "aparNoSet": [
      "CVE-2017-5715",
      "IJ07498"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ07498m9a.180726.epkg.Z",
      "IJ07498m9b.180726.epkg.Z",
      "IJ07498mBa.180713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180817",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ07498",
      "2.2.4:IJ07498",
      "7200-02:IJ07497",
      "7200-01:IJ07501",
      "7100-05:IJ07500",
      "7100-04:IJ07499",
      "6100-09:IJ07498"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar",
    "cvss": [
      "CVE-2017-5715:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10",
      "2.2.6.20",
      "2.2.6.21"
    ],
    "apAbstract": "IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.",
    "aparNo": "IJ07498",
    "aparNoSet": [
      "CVE-2017-5715",
      "IJ07498"
    ],
    "fixedIn": "2.2.6.23",
    "ifixes": [
      "IJ07498mAa.180717.epkg.Z",
      "IJ07498mBa.180713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180817",
    "updated": "null",
    "siblings": [
      "2.2.5:IJ07498",
      "2.2.4:IJ07498",
      "7200-02:IJ07497",
      "7200-01:IJ07501",
      "7100-05:IJ07500",
      "7100-04:IJ07499",
      "6100-09:IJ07498"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar",
    "cvss": [
      "CVE-2017-5715:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.40",
      "2.2.4.50",
      "2.2.4.60"
    ],
    "apAbstract": "IBM has released updated VIOS and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.",
    "aparNo": "IJ07498",
    "aparNoSet": [
      "CVE-2017-5715",
      "IJ07498"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ07498m9a.180726.epkg.Z",
      "IJ07498m9b.180726.epkg.Z",
      "IJ07498mBa.180713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20180817",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ07498",
      "2.2.5:IJ07498",
      "7200-02:IJ07497",
      "7200-01:IJ07501",
      "7100-05:IJ07500",
      "7100-04:IJ07499",
      "6100-09:IJ07498"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar",
    "cvss": [
      "CVE-2017-5715:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-04",
      "7100-04-05",
      "7100-04-06"
    ],
    "apAbstract": "IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.",
    "aparNo": "IJ07499",
    "aparNoSet": [
      "CVE-2017-5715",
      "IJ07499"
    ],
    "fixedIn": "7100-04-07",
    "ifixes": [
      "IJ07499m4a.180719.epkg.Z",
      "IJ07499m5a.180809.epkg.Z",
      "IJ07499m6a.180713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.4.0-7.1.4.34"
    ],
    "issued": "20180817",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ07498",
      "2.2.5:IJ07498",
      "2.2.4:IJ07498",
      "7200-02:IJ07497",
      "7200-01:IJ07501",
      "7100-05:IJ07500",
      "6100-09:IJ07498"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar",
    "cvss": [
      "CVE-2017-5715:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-01",
      "7100-05-02"
    ],
    "apAbstract": "IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.",
    "aparNo": "IJ07500",
    "aparNoSet": [
      "CVE-2017-5715",
      "IJ07500"
    ],
    "fixedIn": "7100-05-03",
    "ifixes": [
      "IJ07500m1a.180718.epkg.Z",
      "IJ07500m2a.180713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.16"
    ],
    "issued": "20180817",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ07498",
      "2.2.5:IJ07498",
      "2.2.4:IJ07498",
      "7200-02:IJ07497",
      "7200-01:IJ07501",
      "7100-04:IJ07499",
      "6100-09:IJ07498"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar",
    "cvss": [
      "CVE-2017-5715:0"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "IBM has released updated AIX and VIOS fixes for CVE-2017-5715 known as Spectre that are only applicable to some POWER9 systems.",
    "aparNo": "IJ07501",
    "aparNoSet": [
      "CVE-2017-5715",
      "IJ07501"
    ],
    "fixedIn": "7200-01-05",
    "ifixes": [
      "IJ07501m2a.180719.epkg.Z",
      "IJ07501m3a.180717.epkg.Z",
      "IJ07501m4a.180716.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.1.0-7.2.1.5"
    ],
    "issued": "20180817",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ07498",
      "2.2.5:IJ07498",
      "2.2.4:IJ07498",
      "7200-02:IJ07497",
      "7100-05:IJ07500",
      "7100-04:IJ07499",
      "6100-09:IJ07498"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/spectre_update_fix.tar",
    "cvss": [
      "CVE-2017-5715:0"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "Possible network outage with adapters using shientdd driver",
    "aparNo": "IJ08410",
    "aparNoSet": [
      "IJ08410"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ08410s2a.180816.AIX72TL02SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08410",
    "filesets": [
      "devices.ethernet.shi.rte:7.2.2.0-7.2.2.16"
    ],
    "issued": "20180830",
    "updated": "null",
    "siblings": [
      "6100-09:IJ08482",
      "7100-05:IJ08480",
      "7200-00:IJ08785",
      "7200-01:IJ08779"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08410/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-10",
      "6100-09-11"
    ],
    "apAbstract": "Possible network outage with adapters using shientdd driver",
    "aparNo": "IJ08410",
    "aparNoSet": [
      "IJ08410"
    ],
    "fixedIn": "6100-09-12",
    "ifixes": [
      "IJ08482sBa.180817.AIX61TL09SP11.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08482",
    "filesets": [
      "devices.ethernet.shi.rte:6.1.9.300-6.1.9.316"
    ],
    "issued": "20180830",
    "updated": "null",
    "siblings": [
      "7100-05:IJ08480",
      "7200-00:IJ08785",
      "7200-01:IJ08779",
      "7200-02:IJ08410"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08482/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01",
      "7100-05-02"
    ],
    "apAbstract": "Possible network outage with adapters using shientdd driver",
    "aparNo": "IJ08480",
    "aparNoSet": [
      "IJ08480"
    ],
    "fixedIn": "7100-05-03",
    "ifixes": [
      "IJ08480s2a.180817.AIX71TL05SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08480",
    "filesets": [
      "devices.ethernet.shi.rte:7.1.5.0-7.1.5.16"
    ],
    "issued": "20180830",
    "updated": "null",
    "siblings": [
      "6100-09:IJ08482",
      "7200-00:IJ08785",
      "7200-01:IJ08779",
      "7200-02:IJ08410"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08480/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.40"
    ],
    "apAbstract": "Possible network outage with adapters using shientdd driver ",
    "aparNo": "IJ08482",
    "aparNoSet": [
      "IJ08482"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z",
      "IJ08482sBa.180817.AIX61TL09SP11.epkg.Z",
      "IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z",
      "IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08482",
    "filesets": [
      "devices.ethernet.shi.rte:6.1.9.315"
    ],
    "issued": "20180830",
    "updated": "null",
    "siblings": [
      "6100-09:IJ08482",
      "7100-05:IJ08480",
      "7200-00:IJ08785",
      "7200-01:IJ08779",
      "7200-02:IJ08410"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08482/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10",
      "2.2.6.20",
      "2.2.6.21",
      "2.2.6.22",
      "2.2.6.23"
    ],
    "apAbstract": "Possible network outage with adapters using shientdd driver ",
    "aparNo": "IJ08482",
    "aparNoSet": [
      "IJ08482"
    ],
    "fixedIn": "2.2.6.30",
    "ifixes": [
      "IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z",
      "IJ08482sBa.180817.AIX61TL09SP11.epkg.Z",
      "IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z",
      "IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08482",
    "filesets": [
      "devices.ethernet.shi.rte:6.1.9.300-6.1.9.316"
    ],
    "issued": "20180830",
    "updated": "null",
    "siblings": [
      "6100-09:IJ08482",
      "7100-05:IJ08480",
      "7200-00:IJ08785",
      "7200-01:IJ08779",
      "7200-02:IJ08410"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08482/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.60"
    ],
    "apAbstract": "Possible network outage with adapters using shientdd driver ",
    "aparNo": "IJ08482",
    "aparNoSet": [
      "IJ08482"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ08482sAa.180817.VIOS2.2.4.60.epkg.Z",
      "IJ08482sBa.180817.AIX61TL09SP11.epkg.Z",
      "IJ08482sBa.180817.VIOS.2.2.5.40.epkg.Z",
      "IJ08482sBb.180828.VIOS2.2.6.23.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08482",
    "filesets": [
      "devices.ethernet.shi.rte:6.1.9.300"
    ],
    "issued": "20180830",
    "updated": "null",
    "siblings": [
      "6100-09:IJ08482",
      "7100-05:IJ08480",
      "7200-00:IJ08785",
      "7200-01:IJ08779",
      "7200-02:IJ08410"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08482/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-03-00",
      "7200-03-01"
    ],
    "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable",
    "aparNo": "IJ08641",
    "aparNoSet": [
      "IJ08641"
    ],
    "fixedIn": "7200-03-02-1845",
    "ifixes": [
      "IJ08641s1a.181004.AIX72TL03SP00-01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08641",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.2.3.0"
    ],
    "issued": "20181013",
    "updated": "null",
    "siblings": [
      "6100-09:IJ06644",
      "7100-04:IJ09173",
      "7100-05:IJ09174",
      "7200-01:IJ09175",
      "7200-02:IJ09176"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08641/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-04"
    ],
    "apAbstract": "Possible network outage with adapters using shientdd driver",
    "aparNo": "IJ08779",
    "aparNoSet": [
      "IJ08779"
    ],
    "fixedIn": "7200-01-06",
    "ifixes": [
      "IJ08779s4a.180827.72TL01SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08779",
    "filesets": [
      "devices.ethernet.shi.rte:7.2.1.3-7.2.1.3"
    ],
    "issued": "20180830",
    "updated": "null",
    "siblings": [
      "6100-09:IJ08482",
      "7100-00:IJ08480",
      "7200-00:IJ08785",
      "7200-02:IJ08410"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08779/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02",
      "7200-00-03",
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "Possible network outage with adapters using shientdd driver",
    "aparNo": "IJ08785",
    "aparNoSet": [
      "IJ08785"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ08785s6a.180828.72TL00SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ08785",
    "filesets": [
      "devices.ethernet.shi.rte:7.2.0.6-7.2.0.6"
    ],
    "issued": "20180830",
    "updated": "null",
    "siblings": [
      "6100-09:IJ08482",
      "7100-05:IJ08480",
      "7200-01:IJ08779",
      "7200-02:IJ08410"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij08785/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03",
      "7100-04-04",
      "7100-04-05",
      "7100-04-06"
    ],
    "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable",
    "aparNo": "IJ09173",
    "aparNoSet": [
      "IJ09173"
    ],
    "fixedIn": "7100-04-07-1845",
    "ifixes": [
      "IJ09173s6a.180917.71TL04SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09173",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.1.4.0-7.1.4.33"
    ],
    "issued": "20181013",
    "updated": "null",
    "siblings": [
      "6100-09:IJ06644",
      "7100-05:IJ09174",
      "7200-01:IJ09175",
      "7200-02:IJ09176",
      "7200-03:IJ08641"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09173/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01",
      "7100-05-02",
      "7100-05-03"
    ],
    "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable",
    "aparNo": "IJ09174",
    "aparNoSet": [
      "IJ09174"
    ],
    "fixedIn": "7100-05-03-1846",
    "ifixes": [
      "IJ09174s3a.180921.AIX71TL05SP03-1838.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09174",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.1.5.0-7.1.5.30"
    ],
    "issued": "20181013",
    "updated": "null",
    "siblings": [
      "6100-09:IJ06644",
      "7100-04:IJ09173",
      "7200-01:IJ09175",
      "7200-02:IJ09176",
      "7200-03:IJ08641"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09174/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable",
    "aparNo": "IJ09175",
    "aparNoSet": [
      "IJ09175"
    ],
    "fixedIn": "7200-01-05-1845",
    "ifixes": [
      "IJ09175s4a.180917.72TL01SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09175",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.3"
    ],
    "issued": "20181013",
    "updated": "null",
    "siblings": [
      "6100-09:IJ06644",
      "7100-04:IJ09173",
      "7100-05:IJ09174",
      "7200-02:IJ09176",
      "7200-03:IJ08641"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09175/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable",
    "aparNo": "IJ09176",
    "aparNoSet": [
      "IJ09176"
    ],
    "fixedIn": "7200-02-03-1845",
    "ifixes": [
      "IJ09176s2a.180917.AIX72TL02SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09176",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.2.2.0-7.2.2.15"
    ],
    "issued": "20181013",
    "updated": "null",
    "siblings": [
      "6100-09:IJ06644",
      "7100-04:IJ09173",
      "7100-05:IJ09174",
      "7200-01:IJ09175",
      "7200-03:IJ08641"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09176/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02",
      "7200-00-03",
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable",
    "aparNo": "IJ09583",
    "aparNoSet": [
      "IJ09583"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ09583s6a.181004.72TL00SP06.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09583",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.2.0.0-7.2.0.5"
    ],
    "issued": "20181013",
    "updated": "null",
    "siblings": [
      "6100-09:IJ06644",
      "7100-04:IJ09173",
      "7200-01:IJ09175",
      "7200-02:IJ09176",
      "7200-03:IJ08641"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09583/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.",
    "aparNo": "IJ09618",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09618"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ09618s9a.181031.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.rte:5.3.12.0-5.3.12.1"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "7200-01:IJ09623",
      "7200-00:IJ09622",
      "7100-05:IJ09621",
      "7100-04:IJ09620",
      "6100-09:IJ09619",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "null",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-10",
      "6100-09-11",
      "6100-09-12"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.",
    "aparNo": "IJ09619",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09619"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ09619sAa.181004.epkg.Z",
      "IJ09619sBa.181004.epkg.Z",
      "IJ09619sCa.181009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.401"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "7200-01:IJ09623",
      "5300-12:IJ09618",
      "7200-00:IJ09622",
      "7100-05:IJ09621",
      "7100-04:IJ09620",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.40"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects VIOS.",
    "aparNo": "IJ09619",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09619"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ09619sBa.181004.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.401"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "7200-01:IJ09623",
      "5300-12:IJ09618",
      "7200-00:IJ09622",
      "7100-05:IJ09621",
      "7100-04:IJ09620",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.23",
      "2.2.6.30",
      "2.2.6.31",
      "2.2.6.32"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects VIOS.",
    "aparNo": "IJ09619",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09619"
    ],
    "fixedIn": "2.2.6.40",
    "ifixes": [
      "IJ09619sCa.181004.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.401"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "7200-01:IJ09623",
      "5300-12:IJ09618",
      "7200-00:IJ09622",
      "7100-05:IJ09621",
      "7100-04:IJ09620",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.60"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects VIOS.",
    "aparNo": "IJ09619",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09619"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ09619sBa.181004.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.401"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "7200-01:IJ09623",
      "5300-12:IJ09618",
      "7200-00:IJ09622",
      "7100-05:IJ09621",
      "7100-04:IJ09620",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-04",
      "7100-04-05",
      "7100-04-06"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.",
    "aparNo": "IJ09620",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09620"
    ],
    "fixedIn": "7100-04-07",
    "ifixes": [
      "IJ09620s4a.180927.epkg.Z",
      "IJ09620s5a.180927.epkg.Z",
      "IJ09620s6a.180926.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.34"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "7200-01:IJ09623",
      "5300-12:IJ09618",
      "7200-00:IJ09622",
      "7100-05:IJ09621",
      "6100-09:IJ09619",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-01",
      "7100-05-02",
      "7100-05-03"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.",
    "aparNo": "IJ09621",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09621"
    ],
    "fixedIn": "7100-05-04",
    "ifixes": [
      "IJ09621s1a.180926.epkg.Z",
      "IJ09621s2a.180925.epkg.Z",
      "IJ09621s3a.181001.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.31"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "7200-01:IJ09623",
      "5300-12:IJ09618",
      "7200-00:IJ09622",
      "7100-04:IJ09620",
      "6100-09:IJ09619",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.",
    "aparNo": "IJ09622",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09622"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ09622s4a.181001.epkg.Z",
      "IJ09622s5a.181001.epkg.Z",
      "IJ09622s6a.181001.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.0.0-7.2.0.5"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "7200-01:IJ09623",
      "5300-12:IJ09618",
      "7100-05:IJ09621",
      "7100-04:IJ09620",
      "6100-09:IJ09619",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.",
    "aparNo": "IJ09623",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09623"
    ],
    "fixedIn": "7200-01-05",
    "ifixes": [
      "IJ09623s2a.181002.epkg.Z",
      "IJ09623s3a.181002.epkg.Z",
      "IJ09623s4a.181002.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.1.0-7.2.1.4"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "5300-12:IJ09618",
      "7200-00:IJ09622",
      "7100-05:IJ09621",
      "7100-04:IJ09620",
      "6100-09:IJ09619",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.",
    "aparNo": "IJ09624",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09624"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ09624s0a.181002.epkg.Z",
      "IJ09624s1a.181003.epkg.Z",
      "IJ09624s2a.181003.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.2.0-7.2.2.17"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-01:IJ09623",
      "5300-12:IJ09618",
      "7200-00:IJ09622",
      "7100-05:IJ09621",
      "7100-04:IJ09620",
      "6100-09:IJ09619",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-00",
      "7200-03-01",
      "7200-03-02"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects AIX.",
    "aparNo": "IJ09625",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09625"
    ],
    "fixedIn": "7200-03-03",
    "ifixes": [
      "IJ09625s0a.181010.epkg.Z",
      "IJ09625s2a.181203.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.3.0-7.2.3.15"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "7200-01:IJ09623",
      "5300-12:IJ09618",
      "7200-00:IJ09622",
      "7100-05:IJ09621",
      "7100-04:IJ09620",
      "6100-09:IJ09619"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.0",
      "3.1.0.10"
    ],
    "apAbstract": "There is a vulnerability in FreeBSD that affects VIOS.",
    "aparNo": "IJ09625",
    "aparNoSet": [
      "CVE-2018-6922",
      "IJ09625"
    ],
    "fixedIn": "3.1.0.20",
    "ifixes": [
      "IJ09625s2a.181203.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.3.0-7.2.3.15"
    ],
    "issued": "20181108",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ09619",
      "2.2.5:IJ09619",
      "2.2.4:IJ09619",
      "3100-00:IJ09625",
      "7200-02:IJ09624",
      "7200-01:IJ09623",
      "5300-12:IJ09618",
      "7200-00:IJ09622",
      "7100-05:IJ09621",
      "7100-04:IJ09620",
      "7200-03:IJ09625"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/freebsd_fix.tar",
    "cvss": [
      "CVE-2018-6922:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-03-00",
      "7200-03-01"
    ],
    "apAbstract": "Possible undetected data loss with Power9 NVMe",
    "aparNo": "IJ09686",
    "aparNoSet": [
      "IJ09686"
    ],
    "fixedIn": "7200-03-02-1845",
    "ifixes": [
      "IJ09686s1a.181113.AIX72TL03SP00-01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09686",
    "filesets": [
      "devices.chrp.vdevice.rte:7.2.3.0",
      "devices.chrp.pci.rte:7.2.3.0"
    ],
    "issued": "20181117",
    "updated": "null",
    "siblings": [
      "6100-09:IJ09710",
      "7100-04:IJ10350",
      "7100-05:IJ09705",
      "7200-01:IJ09894",
      "7200-02:IJ10127"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/IJ09686/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-02",
      "7100-05-03"
    ],
    "apAbstract": "Possible undetected data loss with Power9 NVMe",
    "aparNo": "IJ09705",
    "aparNoSet": [
      "IJ09705"
    ],
    "fixedIn": "7100-05-03-1846",
    "ifixes": [
      "IJ09705s3a.181115.AIX71TL05SP03-1838.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09705",
    "filesets": [
      "devices.chrp.vdevice.rte:7.1.5.0-7.1.5.30",
      "devices.chrp.pci.rte:7.1.5.16-7.1.5.30"
    ],
    "issued": "20181117",
    "updated": "null",
    "siblings": [
      "6100-09:IJ09710",
      "7100-04:IJ10350",
      "7200-01:IJ09894",
      "7200-02:IJ10127",
      "7200-03:IJ09686"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09705/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.40"
    ],
    "apAbstract": "Possible undetected data loss with Power9 NVMe",
    "aparNo": "IJ09710",
    "aparNoSet": [
      "IJ09710"
    ],
    "fixedIn": "2.2.5.40",
    "ifixes": [
      "IJ09710sBa.181115.AIX61TL09SP11.epkg.Z",
      "IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z",
      "IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z",
      "IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z",
      "IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09710",
    "filesets": [
      "devices.chrp.vdevice.rte:6.1.9.315",
      "devices.chrp.pci.rte:6.1.9.316"
    ],
    "issued": "20181117",
    "updated": "null",
    "siblings": [
      "6100-09:IJ09710",
      "7100-04:IJ10350",
      "7100-05:IJ09705",
      "7200-01:IJ09894",
      "7200-02:IJ10127",
      "7200-03:IJ09686"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09710/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.21",
      "2.2.6.30",
      "2.2.6.31"
    ],
    "apAbstract": "Possible undetected data loss with Power9 NVMe",
    "aparNo": "IJ09710",
    "aparNoSet": [
      "IJ09710"
    ],
    "fixedIn": "2.2.6.32",
    "ifixes": [
      "IJ09710sBa.181115.AIX61TL09SP11.epkg.Z",
      "IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z",
      "IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z",
      "IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z",
      "IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09710",
    "filesets": [
      "devices.chrp.vdevice.rte:6.1.9.315-6.1.9.400",
      "devices.chrp.pci.rte:6.1.9.316-6.1.9.400"
    ],
    "issued": "20181117",
    "updated": "null",
    "siblings": [
      "6100-09:IJ09710",
      "7100-04:IJ10350",
      "7100-05:IJ09705",
      "7200-01:IJ09894",
      "7200-02:IJ10127",
      "7200-03:IJ09686"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09710/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.60"
    ],
    "apAbstract": "Possible undetected data loss with Power9 NVMe",
    "aparNo": "IJ09710",
    "aparNoSet": [
      "IJ09710"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ09710sBa.181115.AIX61TL09SP11.epkg.Z",
      "IJ09710sBa.181115.VIOS2.2.4.60.epkg.Z",
      "IJ09710sBa.181115.VIOS2.2.5.40.epkg.Z",
      "IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z",
      "IJ09710sCa.181115.VIOS2.2.6.31.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09710",
    "filesets": [
      "devices.chrp.vdevice.rte:6.1.9.315",
      "devices.chrp.pci.rte:6.1.9.316"
    ],
    "issued": "20181117",
    "updated": "null",
    "siblings": [
      "6100-09:IJ09710",
      "7100-04:IJ10350",
      "7100-05:IJ09705",
      "7200-01:IJ09894",
      "7200-02:IJ10127",
      "7200-03:IJ09686"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09710/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-11",
      "6100-09-12"
    ],
    "apAbstract": "Possible undetected data loss with Power9 NVMe ",
    "aparNo": "IJ09710",
    "aparNoSet": [
      "IJ09710"
    ],
    "fixedIn": "6100-09-12-1846",
    "ifixes": [
      "IJ09710sBa.181115.AIX61TL09SP11.epkg.Z",
      "IJ09710sCa.181115.AIX61TL09SP12-1838.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09710",
    "filesets": [
      "devices.chrp.vdevice.rte:6.1.9.315-6.1.9.400",
      "devices.chrp.pci.rte:6.1.9.316-6.1.9.400"
    ],
    "issued": "20181117",
    "updated": "null",
    "siblings": [
      "7100-04:IJ10350",
      "7100-05:IJ09705",
      "7200-01:IJ09894",
      "7200-02:IJ10127",
      "7200-03:IJ09686"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09710/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-00",
      "7200-03-01"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.",
    "aparNo": "IJ09805",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ09805"
    ],
    "fixedIn": "7200-03-02-1845",
    "ifixes": [
      "IJ09805s0a.181012.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.3.0-7.2.3.0"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ10134",
      "2.2.5:IJ10134",
      "2.2.4:IJ10134",
      "7200-02:IJ10130",
      "7200-01:IJ10552",
      "5300-12:IJ10554",
      "7200-00:IJ10553",
      "7100-05:IJ10132",
      "7100-04:IJ10275",
      "6100-09:IJ10134"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-04"
    ],
    "apAbstract": "Possible undetected data loss with Power9 NVMe",
    "aparNo": "IJ09894",
    "aparNoSet": [
      "IJ09894"
    ],
    "fixedIn": "7200-01-05-1845",
    "ifixes": [
      "IJ09894s4a.181113.AIX72TL01SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ09894",
    "filesets": [
      "devices.chrp.vdevice.rte:7.2.1.0",
      "devices.chrp.pci.rte:7.2.1.0"
    ],
    "issued": "20181117",
    "updated": "null",
    "siblings": [
      "6100-09:IJ09710",
      "7100-04:IJ10350",
      "7100-05:IJ09705",
      "7200-02:IJ10127",
      "7200-03:IJ09686"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09894/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-02"
    ],
    "apAbstract": "Possible undetected data loss with Power9 NVMe",
    "aparNo": "IJ10127",
    "aparNoSet": [
      "IJ10127"
    ],
    "fixedIn": "7200-02-03-1845",
    "ifixes": [
      "IJ10127s2a.181113.AIX72TL02SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10127",
    "filesets": [
      "devices.chrp.vdevice.rte:7.2.2.0",
      "devices.chrp.pci.rte:7.2.2.16"
    ],
    "issued": "20181117",
    "updated": "null",
    "siblings": [
      "6100-09:IJ09710",
      "7100-04:IJ10350",
      "7100-05:IJ09705",
      "7200-01:IJ09894",
      "7200-03:IJ09686"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10127/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.",
    "aparNo": "IJ10130",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ10130"
    ],
    "fixedIn": "7200-02-03-1845",
    "ifixes": [
      "IJ10130s0a.181011.epkg.Z",
      "IJ10130s2a.181011.epkg.Z",
      "IJ10130s2b.181011.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.2.0-7.2.2.16"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ10134",
      "2.2.5:IJ10134",
      "2.2.4:IJ10134",
      "7200-01:IJ10552",
      "5300-12:IJ10554",
      "7200-00:IJ10553",
      "7100-05:IJ10132",
      "7100-04:IJ10275",
      "6100-09:IJ10134",
      "7200-03:IJ09805"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-01",
      "7100-05-02",
      "7100-05-03"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.",
    "aparNo": "IJ10132",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ10132"
    ],
    "fixedIn": "7100-05-03-1846",
    "ifixes": [
      "IJ10132s1a.181009.epkg.Z",
      "IJ10132s2a.181009.epkg.Z",
      "IJ10132s2b.181009.epkg.Z",
      "IJ10132s3a.181009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.30"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ10134",
      "2.2.5:IJ10134",
      "2.2.4:IJ10134",
      "7200-02:IJ10130",
      "7200-01:IJ10552",
      "5300-12:IJ10554",
      "7200-00:IJ10553",
      "7100-04:IJ10275",
      "6100-09:IJ10134",
      "7200-03:IJ09805"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-10",
      "6100-09-11",
      "6100-09-12"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.",
    "aparNo": "IJ10134",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ10134"
    ],
    "fixedIn": "6100-09-12-1846",
    "ifixes": [
      "IJ10134sAa.181009.epkg.Z",
      "IJ10134sBa.181009.epkg.Z",
      "IJ10134sBb.181009.epkg.Z",
      "IJ10134sCa.181009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.400"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ10134",
      "2.2.5:IJ10134",
      "2.2.4:IJ10134",
      "7200-02:IJ10130",
      "7200-01:IJ10552",
      "5300-12:IJ10554",
      "7200-00:IJ10553",
      "7100-05:IJ10132",
      "7100-04:IJ10275",
      "7200-03:IJ09805"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.40"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects VIOS.",
    "aparNo": "IJ10134",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ10134"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ10134sBa.181009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ10134",
      "2.2.4:IJ10134",
      "7200-02:IJ10130",
      "7200-01:IJ10552",
      "5300-12:IJ10554",
      "7200-00:IJ10553",
      "7100-05:IJ10132",
      "7100-04:IJ10275",
      "6100-09:IJ10134",
      "7200-03:IJ09805"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.20",
      "2.2.6.21",
      "2.2.6.23",
      "2.2.6.30",
      "2.2.6.31"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects VIOS.",
    "aparNo": "IJ10134",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ10134"
    ],
    "fixedIn": "2.2.6.32",
    "ifixes": [
      "IJ10134sBa.181009.epkg.Z",
      "IJ10134sBb.181009.epkg.Z",
      "IJ10134sCa.181009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.5:IJ10134",
      "2.2.4:IJ10134",
      "7200-02:IJ10130",
      "7200-01:IJ10552",
      "5300-12:IJ10554",
      "7200-00:IJ10553",
      "7100-05:IJ10132",
      "7100-04:IJ10275",
      "6100-09:IJ10134",
      "7200-03:IJ09805"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.60"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects VIOS.",
    "aparNo": "IJ10134",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ10134"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ10134sBa.181009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "See",
      "Bulletin"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ10134",
      "2.2.5:IJ10134",
      "7200-02:IJ10130",
      "7200-01:IJ10552",
      "5300-12:IJ10554",
      "7200-00:IJ10553",
      "7100-05:IJ10132",
      "7100-04:IJ10275",
      "6100-09:IJ10134",
      "7200-03:IJ09805"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-04",
      "7100-04-05",
      "7100-04-06"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.",
    "aparNo": "IJ10275",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ10275"
    ],
    "fixedIn": "7100-04-07-1845",
    "ifixes": [
      "IJ10275s4a.181009.epkg.Z",
      "IJ10275s5a.181009.epkg.Z",
      "IJ10275s6a.181009.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.33"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ10134",
      "2.2.5:IJ10134",
      "2.2.4:IJ10134",
      "7200-02:IJ10130",
      "7200-01:IJ10552",
      "5300-12:IJ10554",
      "7200-00:IJ10553",
      "7100-05:IJ10132",
      "6100-09:IJ10134",
      "7200-03:IJ09805"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "NTPv4"
    ],
    "apAbstract": "There are vulnerabilities in NTPv4 that affect AIX.",
    "aparNo": "IJ10280",
    "aparNoSet": [
      "CVE-2018-12327",
      "CVE-2018-7170",
      "IJ10280"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ10280s3b.181206.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory11.asc",
    "filesets": [
      "ntp.rte:7.4.2.8100-7.4.2.8110"
    ],
    "issued": "20181214",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See Bulletin",
    "cvss": [
      "CVE-2018-12327:5.9",
      "CVE-2018-7170:3.1"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-03-00",
      "7200-03-01"
    ],
    "apAbstract": "Possible errors in certain network adapters",
    "aparNo": "IJ10293",
    "aparNoSet": [
      "IJ10293"
    ],
    "fixedIn": "7200-03-02-1845",
    "ifixes": [
      "IJ10293s1a.181109.AIX72TL03SP00-01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10293",
    "filesets": [
      "devices.ethernet.lnc.rte:7.2.3.0",
      "devices.ethernet.lnc2.rte:7.2.3.0"
    ],
    "issued": "20181110",
    "updated": "null",
    "siblings": [
      "7100-04:IJ10369",
      "7100-05:IJ10295",
      "7200-01:IJ10370",
      "7200-02:IJ10371"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10293/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-01",
      "7100-05-02"
    ],
    "apAbstract": "Possible errors in certain network adapters",
    "aparNo": "IJ10295",
    "aparNoSet": [
      "IJ10295"
    ],
    "fixedIn": "7100-05-03-1846",
    "ifixes": [
      "IJ10295m3a.181109.AIX71TL05SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10295",
    "filesets": [
      "devices.ethernet.lnc.rte:7.1.5.0-7.1.5.30",
      "devices.ethernet.lnc2.rte:7.1.5.0-7.1.5.30"
    ],
    "issued": "20181110",
    "updated": "null",
    "siblings": [
      "7100-04:IJ10369",
      "7200-01:IJ10370",
      "7200-02:IJ10371",
      "7200-03:IJ10293"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10295/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.0",
      "2.2.5.10",
      "2.2.5.20",
      "2.2.5.30",
      "2.2.5.40"
    ],
    "apAbstract": "Possible errors in certain network adapters",
    "aparNo": "IJ10300",
    "aparNoSet": [
      "IJ10300"
    ],
    "fixedIn": "2.2.5.50",
    "ifixes": [
      "IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z",
      "IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z",
      "IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10300",
    "filesets": [
      "devices.ethernet.lnc.rte:6.1.9.200-6.1.9.315",
      "devices.ethernet.lnc2.rte:6.1.9.200-6.1.9.315"
    ],
    "issued": "20181110",
    "updated": "null",
    "siblings": [
      "7100-04:IJ10369",
      "7100-05:IJ10295",
      "7200-01:IJ10370",
      "7200-02:IJ10371",
      "7200-03:IJ10293"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10300/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10",
      "2.2.5.60",
      "2.2.6.30",
      "2.2.6.31"
    ],
    "apAbstract": "Possible errors in certain network adapters",
    "aparNo": "IJ10300",
    "aparNoSet": [
      "IJ10300"
    ],
    "fixedIn": "2.2.6.32",
    "ifixes": [
      "IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z",
      "IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z",
      "IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10300",
    "filesets": [
      "devices.ethernet.lnc.rte:6.1.9.300-6.1.9.400",
      "devices.ethernet.lnc2.rte:6.1.9.300-6.1.9.400"
    ],
    "issued": "20181110",
    "updated": "null",
    "siblings": [
      "7100-04:IJ10369",
      "7100-05:IJ10295",
      "7200-01:IJ10370",
      "7200-02:IJ10371",
      "7200-03:IJ10293"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10300/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.30",
      "2.2.4.40",
      "2.2.4.50",
      "2.2.4.60"
    ],
    "apAbstract": "Possible errors in certain network adapters",
    "aparNo": "IJ10300",
    "aparNoSet": [
      "IJ10300"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ10300mBa.181109.VIOS2.2.4.60.epkg.Z",
      "IJ10300mBa.181109.VIOS2.2.5.40.epkg.Z",
      "IJ10300mCa.181109.VIOS2.2.6.31.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10300",
    "filesets": [
      "devices.ethernet.lnc.rte:6.1.9.100-6.1.9.315",
      "devices.ethernet.lnc2.rte:6.1.9.100-6.1.9.315"
    ],
    "issued": "20181110",
    "updated": "null",
    "siblings": [
      "7100-04:IJ10369",
      "7100-05:IJ10295",
      "7200-01:IJ10370",
      "7200-02:IJ10371",
      "7200-03:IJ10293"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10300/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-06"
    ],
    "apAbstract": "Possible undetected data loss with Power9 NVMe",
    "aparNo": "IJ10350",
    "aparNoSet": [
      "IJ10350"
    ],
    "fixedIn": "7100-04-07-1845",
    "ifixes": [
      "IJ10350s6a.181115.AIX71TL04SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10350",
    "filesets": [
      "devices.chrp.vdevice.rte:7.1.4.30",
      "devices.chrp.pci.rte:7.1.4.30"
    ],
    "issued": "20181117",
    "updated": "null",
    "siblings": [
      "6100-09:IJ09710",
      "7100-05:IJ09705",
      "7200-01:IJ09894",
      "7200-02:IJ10127",
      "7200-03:IJ09686"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10350/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03",
      "7100-04-04",
      "7100-04-05",
      "7100-04-06"
    ],
    "apAbstract": "Possible errors in certain network adapters",
    "aparNo": "IJ10369",
    "aparNoSet": [
      "IJ10369"
    ],
    "fixedIn": "7100-04-07-1845",
    "ifixes": [
      "IJ10369m6a.181109.AIX71TL04SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10369",
    "filesets": [
      "devices.ethernet.lnc.rte:7.1.4.0-7.1.4.33",
      "devices.ethernet.lnc2.rte:7.1.4.0-7.1.4.33"
    ],
    "issued": "20181110",
    "updated": "null",
    "siblings": [
      "7100-05:IJ10295",
      "7200-01:IJ10370",
      "7200-02:IJ10371",
      "7200-03:IJ10293"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10369/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "Possible errors in certain network adapters",
    "aparNo": "IJ10370",
    "aparNoSet": [
      "IJ10370"
    ],
    "fixedIn": "7200-01-05-1845",
    "ifixes": [
      "IJ10370m4a.181109.AIX72TL01SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10370",
    "filesets": [
      "devices.ethernet.lnc.rte:7.2.1.0-7.2.1.3",
      "devices.ethernet.lnc2.rte:7.2.1.0-7.2.1.3"
    ],
    "issued": "20181110",
    "updated": "null",
    "siblings": [
      "7100-04:IJ10369",
      "7100-05:IJ10295",
      "7200-02:IJ10371",
      "7200-03:IJ10293"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10370/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "Possible errors in certain network adapters",
    "aparNo": "IJ10371",
    "aparNoSet": [
      "IJ10371"
    ],
    "fixedIn": "7200-02-03-1845",
    "ifixes": [
      "IJ10371m2a.181109.AIX72TL02SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ10371",
    "filesets": [
      "devices.ethernet.lnc.rte:7.2.2.0-7.2.2.16",
      "devices.ethernet.lnc2.rte:7.2.2.0-7.2.2.16"
    ],
    "issued": "20181110",
    "updated": "null",
    "siblings": [
      "7100-04:IJ10369",
      "7100-05:IJ10295",
      "7200-01:IJ10370",
      "7200-03:IJ10293"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10371/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.",
    "aparNo": "IJ10552",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ10552"
    ],
    "fixedIn": "7200-01-05-1845",
    "ifixes": [
      "IJ10552s2a.181016.epkg.Z",
      "IJ10552s3a.181016.epkg.Z",
      "IJ10552s4a.181016.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.1.0-7.2.1.3"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ10134",
      "2.2.5:IJ10134",
      "2.2.4:IJ10134",
      "7200-02:IJ10130",
      "5300-12:IJ10554",
      "7200-00:IJ10553",
      "7100-05:IJ10132",
      "7100-04:IJ10275",
      "6100-09:IJ10134",
      "7200-03:IJ09805"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.",
    "aparNo": "IJ10553",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ10553"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ10553s4a.181016.epkg.Z",
      "IJ10553s5a.181016.epkg.Z",
      "IJ10553s6a.181016.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.0.0-7.2.0.5"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ10134",
      "2.2.5:IJ10134",
      "2.2.4:IJ10134",
      "7200-02:IJ10130",
      "7200-01:IJ10552",
      "5300-12:IJ10554",
      "7100-05:IJ10132",
      "7100-04:IJ10275",
      "6100-09:IJ10134",
      "7200-03:IJ09805"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/solaris_fix.tar",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "There is a vulnerability in Oracle Solaris that affects AIX.",
    "aparNo": "IJ10554",
    "aparNoSet": [
      "CVE-2017-3623",
      "IJ10554"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ10554s9a.181017.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/solaris_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ10134",
      "2.2.5:IJ10134",
      "2.2.4:IJ10134",
      "7200-02:IJ10130",
      "7200-01:IJ10552",
      "7200-00:IJ10553",
      "7100-05:IJ10132",
      "7100-04:IJ10275",
      "6100-09:IJ10134",
      "7200-03:IJ09805"
    ],
    "downloadUrl": "null",
    "cvss": [
      "CVE-2017-3623:10"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-10",
      "6100-09-11",
      "6100-09-12"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects AIX.",
    "aparNo": "IJ11000",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11000"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ11000s0b.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7100-04:IJ11544",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.40",
      "2.2.4.50",
      "2.2.4.60"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects VIOS.",
    "aparNo": "IJ11000",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11000"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ11000s0b.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7100-04:IJ11544",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.20",
      "2.2.5.30",
      "2.2.5.40"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects VIOS.",
    "aparNo": "IJ11000",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11000"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ11000s0b.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7100-04:IJ11544",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.23",
      "2.2.6.30",
      "2.2.6.31",
      "2.2.6.32"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects VIOS.",
    "aparNo": "IJ11000",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11000"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ11000s0b.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7100-04:IJ11544",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02",
      "7200-00-03",
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "Possible errors in certain network adapters",
    "aparNo": "IJ11207",
    "aparNoSet": [
      "IJ11207"
    ],
    "fixedIn": "See advisory",
    "ifixes": [
      "IJ11207m6a.181109.AIX72TL00SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ11207",
    "filesets": [
      "devices.ethernet.lnc.rte:7.2.0.0-7.2.0.6",
      "devices.ethernet.lnc2.rte:7.2.0.0-7.2.0.6"
    ],
    "issued": "20181110",
    "updated": "null",
    "siblings": [
      "7100-04:IJ10369",
      "7100-05:IJ10295",
      "7200-01:IJ10370",
      "7200-02:IJ10371",
      "7200-03:IJ10293"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij11207/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-06"
    ],
    "apAbstract": "Possible undetected data loss with Power9 NVMe",
    "aparNo": "IJ11253",
    "aparNoSet": [
      "IJ11253"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ11253s6a.181113.AIX72TL00SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ11253",
    "filesets": [
      "devices.chrp.vdevice.rte:7.2.0.0",
      "devices.chrp.pci.rte:7.2.0.0"
    ],
    "issued": "20181117",
    "updated": "null",
    "siblings": [
      "6100-09:IJ09710",
      "7100-04:IJ10350",
      "7100-05:IJ09705",
      "7200-01:IJ09894",
      "7200-02:IJ10127",
      "7200-03:IJ09686"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij11253/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-04",
      "7100-04-05",
      "7100-04-06"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects AIX.",
    "aparNo": "IJ11544",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11544"
    ],
    "fixedIn": "7100-04-08",
    "ifixes": [
      "IJ11544s0a.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:7.1.4.0-7.1.4.30"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "6100-09:IJ11000",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-04",
      "7100-04-05",
      "7100-04-06",
      "7100-04-07"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects AIX.",
    "aparNo": "IJ11544",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11544"
    ],
    "fixedIn": "7100-04-08",
    "ifixes": [
      "IJ11544s0a.181127.epkg.Z",
      "IJ11544s0a.190312.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:7.1.4.0-7.1.4.30"
    ],
    "issued": "20181211",
    "updated": "20190409",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "6100-09:IJ11000",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-01",
      "7100-05-02",
      "7100-05-03"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects AIX.",
    "aparNo": "IJ11545",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11545"
    ],
    "fixedIn": "7100-05-04",
    "ifixes": [
      "IJ11545s0a.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:7.1.5.0-7.1.5.31"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "6100-09:IJ11000",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-04:IJ11544",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-01",
      "7200-00-02",
      "7200-00-03",
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects AIX.",
    "aparNo": "IJ11546",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11546"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ11546s0a.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:7.2.0.0-7.2.0.1"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "6100-09:IJ11000",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7100-04:IJ11544",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects AIX.",
    "aparNo": "IJ11547",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11547"
    ],
    "fixedIn": "7200-01-06",
    "ifixes": [
      "IJ11547s0a.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:7.2.1.0-7.2.1.0"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-00:IJ11546",
      "6100-09:IJ11000",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7100-04:IJ11544",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-01",
      "7200-02-02",
      "7200-02-03"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects AIX.",
    "aparNo": "IJ11549",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11549"
    ],
    "fixedIn": "7200-02-04",
    "ifixes": [
      "IJ11549s0a.181127.epkg.Z",
      "IJ11549s0a.190312.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:7.2.2.0-7.2.2.0"
    ],
    "issued": "20181211",
    "updated": "20190409",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "6100-09:IJ11000",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7100-04:IJ11544",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-01",
      "7200-03-02"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects AIX.",
    "aparNo": "IJ11550",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11550"
    ],
    "fixedIn": "7200-03-03",
    "ifixes": [
      "IJ11550s0a.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:7.2.3.0-7.2.3.15"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "6100-09:IJ11000",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7100-04:IJ11544"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.0",
      "3.1.0.10"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects VIOS.",
    "aparNo": "IJ11550",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11550"
    ],
    "fixedIn": "7200-03-03",
    "ifixes": [
      "IJ11550s0a.181127.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:7.2.3.0-7.2.3.15"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "6100-09:IJ11000",
      "3100-00:IJ11550",
      "5300-12:IJ11551",
      "7100-05:IJ11545",
      "7100-04:IJ11544"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_fix3.tar",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "There is a vulnerability in Xorg that affects AIX.",
    "aparNo": "IJ11551",
    "aparNoSet": [
      "CVE-2018-14665",
      "IJ11551"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ11551s0a.181127.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/xorg_advisory3.asc",
    "filesets": [
      "X11.base.rte:5.3.12.0-5.3.12.2"
    ],
    "issued": "20181211",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ11000",
      "2.2.5:IJ11000",
      "2.2.4:IJ11000",
      "7200-02:IJ11549",
      "7200-01:IJ11547",
      "7200-00:IJ11546",
      "6100-09:IJ11000",
      "3100-00:IJ11550",
      "7100-05:IJ11545",
      "7100-04:IJ11544",
      "7200-03:IJ11550"
    ],
    "downloadUrl": "null",
    "cvss": [
      "CVE-2018-14665:8.8"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.50"
    ],
    "apAbstract": "TCP session hang/timeout or possible undetected data corruption",
    "aparNo": "IJ12143",
    "aparNoSet": [
      "IJ12143"
    ],
    "fixedIn": "2.2.5.51",
    "ifixes": [
      "IJ12143sCd.190221.VIOS2.2.5.50.epkg.Z",
      "IJ12143sCd.190221.VIOS2.2.6.30-32.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ12143",
    "filesets": [
      "devices.common.IBM.ethernet.rte:6.1.9.400"
    ],
    "issued": "20190119",
    "updated": "20190228",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij12143/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.30",
      "2.2.6.31",
      "2.2.6.32"
    ],
    "apAbstract": "TCP session hang/timeout or possible undetected data corruption",
    "aparNo": "IJ12143",
    "aparNoSet": [
      "IJ12143"
    ],
    "fixedIn": "2.2.6.33",
    "ifixes": [
      "IJ12143sCd.190221.VIOS2.2.5.50.epkg.Z",
      "IJ12143sCd.190221.VIOS2.2.6.30-32.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ12143",
    "filesets": [
      "devices.common.IBM.ethernet.rte:6.1.9.400"
    ],
    "issued": "20190119",
    "updated": "20190228",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij12143/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.0.0",
      "3.1.0.10",
      "3.1.0.11"
    ],
    "apAbstract": "TCP session hang/timeout or possible undetected data corruption",
    "aparNo": "IJ12809",
    "aparNoSet": [
      "IJ12809"
    ],
    "fixedIn": "3.1.0.12",
    "ifixes": [
      "IJ12809s2b.190225.VIOS3.1.0.0-11.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ12809",
    "filesets": [
      "devices.common.IBM.ethernet.rte:7.2.3.15"
    ],
    "issued": "20190119",
    "updated": "20190228",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij12809/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-12"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ12978",
    "aparNoSet": [
      "CVE-2018-19519",
      "IJ12978",
      "IJ20781"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.300-6.1.9.400"
    ],
    "issued": "20190225",
    "updated": "20190409",
    "siblings": [
      "2.2.6:IJ12978",
      "2.2.5:IJ12978",
      "3.1.0:IJ12983",
      "7200-02:IJ12982",
      "7200-01:IJ12981",
      "7100-05:IJ12980",
      "7100-04:IJ12979",
      "7200-03:IJ12983"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar",
    "cvss": [
      "CVE-2018-19519:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.40",
      "2.2.5.50"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.",
    "aparNo": "IJ12978",
    "aparNoSet": [
      "CVE-2018-19519",
      "IJ12978",
      "IJ20781"
    ],
    "fixedIn": "2.2.5.60",
    "ifixes": [
      "IJ12978s9a.190215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.400"
    ],
    "issued": "20190225",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ12978",
      "3.1.0:IJ12983",
      "7200-02:IJ12982",
      "7200-01:IJ12981",
      "7100-05:IJ12980",
      "7100-04:IJ12979",
      "7200-03:IJ12983"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar",
    "cvss": [
      "CVE-2018-19519:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.21",
      "2.2.6.23",
      "2.2.6.32"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.",
    "aparNo": "IJ12978",
    "aparNoSet": [
      "CVE-2018-19519",
      "IJ12978",
      "IJ20781"
    ],
    "fixedIn": "2.2.6.40",
    "ifixes": [
      "IJ12978sBa.190215.epkg.Z",
      "IJ12978sCa.190215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.400"
    ],
    "issued": "20190225",
    "updated": "null",
    "siblings": [
      "2.2.5:IJ12978",
      "3.1.0:IJ12983",
      "7200-02:IJ12982",
      "7200-01:IJ12981",
      "7100-05:IJ12980",
      "7100-04:IJ12979",
      "7200-03:IJ12983"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar",
    "cvss": [
      "CVE-2018-19519:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-05",
      "7100-04-06",
      "7100-04-07"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ12979",
    "aparNoSet": [
      "CVE-2018-19519",
      "IJ12979"
    ],
    "fixedIn": "7100-04-08-1914",
    "ifixes": [
      "IJ12979m5a.190304.epkg.Z",
      "IJ12979m6a.190304.epkg.Z",
      "IJ12979m7a.190205.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.4.32-7.1.4.34"
    ],
    "issued": "20190225",
    "updated": "20190409",
    "siblings": [
      "2.2.6:IJ12978",
      "2.2.5:IJ12978",
      "3.1.0:IJ12983",
      "7200-02:IJ12982",
      "7200-01:IJ12981",
      "7100-05:IJ12980",
      "7200-03:IJ12983"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar",
    "cvss": [
      "CVE-2018-19519:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-03",
      "7200-01-04",
      "7200-01-05"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ12981",
    "aparNoSet": [
      "CVE-2018-19519",
      "IJ12981"
    ],
    "fixedIn": "7200-01-06-1914",
    "ifixes": [
      "IJ12981m3a.190214.epkg.Z",
      "IJ12981m4a.190215.epkg.Z",
      "IJ12981m5a.190225.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.1.1-7.2.1.3"
    ],
    "issued": "20190225",
    "updated": "20190409",
    "siblings": [
      "2.2.6:IJ12978",
      "2.2.5:IJ12978",
      "3.1.0:IJ12983",
      "7200-02:IJ12982",
      "7100-05:IJ12980",
      "7100-04:IJ12979",
      "7200-03:IJ12983"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar",
    "cvss": [
      "CVE-2018-19519:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-03"
    ],
    "apAbstract": "Opening Mellanox Infiniband adapters will fail",
    "aparNo": "IJ13283",
    "aparNoSet": [
      "IJ13283"
    ],
    "fixedIn": "7100-05-04-1914",
    "ifixes": [
      "IJ13283s3a.190225.AIX71TL05SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13283",
    "filesets": [
      "bos.mp64:7.1.5.30",
      "devices.pciex.b3154a63.rte:7.1.5.30"
    ],
    "issued": "20190309",
    "updated": "null",
    "siblings": [
      "6100-09:IJ13293",
      "7100-04:IJ13688",
      "7200-01:IJ13856",
      "7200-02:IJ13458",
      "7200-03:IJ13334"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13283/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-12-1837",
      "6100-09-12-1846"
    ],
    "apAbstract": "Opening Mellanox Infiniband adapters will fail",
    "aparNo": "IJ13283",
    "aparNoSet": [
      "IJ13283"
    ],
    "fixedIn": "6100-09-12-1913",
    "ifixes": [
      "IJ13293sCa.190306.AIX61TL09SP12.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13293",
    "filesets": [
      "bos.mp64:6.1.9.400-6.1.9.402",
      "devices.pciex.b3154a63.rte:6.1.9.400"
    ],
    "issued": "20190309",
    "updated": "null",
    "siblings": [
      "7100-04:IJ13688",
      "7100-05:IJ13283",
      "7200-01:IJ13856",
      "7200-02:IJ13458",
      "7200-03:IJ13334"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13293/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.50"
    ],
    "apAbstract": "Opening Mellanox Infiniband adapters will fail",
    "aparNo": "IJ13293",
    "aparNoSet": [
      "IJ13293"
    ],
    "fixedIn": "2.2.5.60",
    "ifixes": [
      "IJ13293sCa.190306.VIOS2.2.5.50.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13293",
    "filesets": [
      "bos.mp64:6.1.9.400",
      "devices.pciex.b3154a63.rte:6.1.9.400"
    ],
    "issued": "20190309",
    "updated": "null",
    "siblings": [
      "6100-09:IJ13293",
      "7100-04:IJ13688",
      "7100-05:IJ13283",
      "7200-01:IJ13856",
      "7200-02:IJ13458",
      "7200-03:IJ13334"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13293/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.30",
      "2.2.6.31",
      "2.2.6.32"
    ],
    "apAbstract": "Opening Mellanox Infiniband adapters will fail",
    "aparNo": "IJ13293",
    "aparNoSet": [
      "IJ13293"
    ],
    "fixedIn": "2.2.6.40",
    "ifixes": [
      "IJ13293sCa.190306.VIOS2.2.6.30-32.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13293",
    "filesets": [
      "bos.mp64:6.1.9.400",
      "devices.pciex.b3154a63.rte:6.1.9.400"
    ],
    "issued": "20190309",
    "updated": "null",
    "siblings": [
      "6100-09:IJ13293",
      "7100-04:IJ13688",
      "7100-05:IJ13283",
      "7200-01:IJ13856",
      "7200-02:IJ13458",
      "7200-03:IJ13334"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13293/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.0.0",
      "3.1.0.10",
      "3.1.0.11"
    ],
    "apAbstract": "Opening Mellanox Infiniband adapters will fail",
    "aparNo": "IJ13334",
    "aparNoSet": [
      "IJ13334"
    ],
    "fixedIn": "3.1.0.20",
    "ifixes": [
      "IJ13334s2a.190306.VIOS3.1.0.0-11.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13334",
    "filesets": [
      "bos.mp64:7.2.3.0-7.2.3.16",
      "devices.pciex.b3154a63.rte:7.2.3.0"
    ],
    "issued": "20190309",
    "updated": "null",
    "siblings": [
      "6100-09:IJ13293",
      "7100-04:IJ13688",
      "7100-05:IJ13283",
      "7200-01:IJ13856",
      "7200-02:IJ13458",
      "7200-03:IJ13334"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13334/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "Opening Mellanox Infiniband adapters will fail",
    "aparNo": "IJ13334",
    "aparNoSet": [
      "IJ13334"
    ],
    "fixedIn": "7200-03-03-1913",
    "ifixes": [
      "IJ13334s2a.190306.AIX72TL03SP00-02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13334",
    "filesets": [
      "bos.mp64:7.2.3.0-7.2.3.16",
      "devices.pciex.b3154a63.rte:7.2.3.0"
    ],
    "issued": "20190309",
    "updated": "null",
    "siblings": [
      "6100-09:IJ13293",
      "7100-04:IJ13688",
      "7100-05:IJ13283",
      "7200-01:IJ13856",
      "7200-02:IJ13458"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13334/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-03"
    ],
    "apAbstract": "Opening Mellanox Infiniband adapters will fail",
    "aparNo": "IJ13458",
    "aparNoSet": [
      "IJ13458"
    ],
    "fixedIn": "7200-01-04-1914",
    "ifixes": [
      "IJ13458s3a.190225.AIX72TL02SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13458",
    "filesets": [
      "bos.mp64:7.2.2.19",
      "devices.pciex.b3154a63.rte:7.2.2.15"
    ],
    "issued": "20190309",
    "updated": "null",
    "siblings": [
      "6100-09:IJ13293",
      "7100-04:IJ13688",
      "7100-05:IJ13283",
      "7200-01:IJ13856",
      "7200-03:IJ13334"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13458/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-07"
    ],
    "apAbstract": "Opening Mellanox Infiniband adapters will fail",
    "aparNo": "IJ13688",
    "aparNoSet": [
      "IJ13688"
    ],
    "fixedIn": "7100-04-08-1914",
    "ifixes": [
      "IJ13688s7a.190225.AIX71TL04SP07.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13688",
    "filesets": [
      "bos.mp64:7.1.4.35",
      "devices.pciex.b3154a63.rte:7.1.4.31"
    ],
    "issued": "20190309",
    "updated": "null",
    "siblings": [
      "6100-09:IJ13293",
      "7100-05:IJ13283",
      "7200-01:IJ13856",
      "7200-02:IJ13458",
      "7200-03:IJ13334"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13688/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-05"
    ],
    "apAbstract": "Opening Mellanox Infiniband adapters will fail",
    "aparNo": "IJ13856",
    "aparNoSet": [
      "IJ13856"
    ],
    "fixedIn": "7200-01-06-1914",
    "ifixes": [
      "IJ13856s5a.190225.AIX72TL01SP05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ13856",
    "filesets": [
      "bos.mp64:7.2.1.6",
      "devices.pciex.b3154a63.rte:7.2.1.1"
    ],
    "issued": "20190309",
    "updated": "null",
    "siblings": [
      "6100-09:IJ13293",
      "7100-04:IJ13688",
      "7100-05:IJ13283",
      "7200-02:IJ13458",
      "7200-03:IJ13334"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij13856/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02",
      "7200-00-03",
      "7200-00-04",
      "7200-00-05",
      "7200-00-06"
    ],
    "apAbstract": "Affected PowerHA SystemMirror Levels and Recommended Fixes",
    "aparNo": "IJ15739",
    "aparNoSet": [
      "IJ15739"
    ],
    "fixedIn": "7200-00-07",
    "ifixes": [
      "IJ15885m2a.190604.PowerHA7.2.0SP02.epkg.Z",
      "IJ15885m5a.190604.PowerHA7.2.0SP05.epkg.Z",
      "IJ15885s6b.190604.PowerHA7.2.0SP06.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ15739",
    "filesets": [
      "cluster.es.server.rte:7.2.0.0-7.2.0.6",
      "cluster.es.client.lib:7.2.0.0-7.2.0.6"
    ],
    "issued": "20190430",
    "updated": "20190612",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij15885/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02",
      "7200-01-03",
      "7200-01-04"
    ],
    "apAbstract": "Affected PowerHA SystemMirror Levels and Recommended Fixes",
    "aparNo": "IJ15739",
    "aparNoSet": [
      "IJ15739"
    ],
    "fixedIn": "7200-01-05",
    "ifixes": [
      "IJ09170m0c.190603.PowerHA7.2.1SP00.epkg.Z",
      "IJ09170m1c.190603.PowerHA7.2.1SP01.epkg.Z",
      "IJ09170m2c.190603.PowerHA7.2.1SP02.epkg.Z",
      "IJ09170m3c.190603.PowerHA7.2.1SP03.epkg.Z",
      "IJ09170s4b.190603.PowerHA7.2.1SP04.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ15739",
    "filesets": [
      "cluster.es.server.rte:7.2.1.0-7.2.1.4",
      "cluster.es.client.lib:7.2.1.0-7.2.1.4"
    ],
    "issued": "20190430",
    "updated": "20190612",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij09170/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00",
      "7200-02-01",
      "7200-02-02"
    ],
    "apAbstract": "Affected PowerHA SystemMirror Levels and Recommended Fixes",
    "aparNo": "IJ15739",
    "aparNoSet": [
      "IJ15739"
    ],
    "fixedIn": "7200-02-03",
    "ifixes": [
      "IJ10601m0c.190603.PowerHA7.2.2SP00.epkg.Z",
      "IJ10601m1c.190603.PowerHA7.2.2SP01.epkg.Z",
      "IJ10601s2c.190603.PowerHA7.2.2SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ15739",
    "filesets": [
      "cluster.es.server.rte:7.2.2.0-7.2.2.2",
      "cluster.es.client.lib:7.2.2.0-7.2.2.2"
    ],
    "issued": "20190430",
    "updated": "20190612",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij10601/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-03-00"
    ],
    "apAbstract": "Affected PowerHA SystemMirror Levels and Recommended Fixes",
    "aparNo": "IJ15739",
    "aparNoSet": [
      "IJ15739"
    ],
    "fixedIn": "7200-03-01",
    "ifixes": [
      "IJ15739m0a.190603.PowerHA7.2.3SP00.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ15739",
    "filesets": [
      "cluster.es.server.rte:7.2.3.0",
      "cluster.es.client.lib:7.2.3.0"
    ],
    "issued": "20190430",
    "updated": "20190612",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij15739/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.0.20",
      "3.1.0.21"
    ],
    "apAbstract": "NETSTAT PRINTS SOME MESSAGES INCORRECTLY",
    "aparNo": "IJ16586",
    "aparNoSet": [
      "IJ16586"
    ],
    "fixedIn": "3.1.0.30",
    "ifixes": [
      "IJ16586s3a.190607.VIOS3.1.0.21.epkg.Z",
      "IJ16586s3b.190614.VIOS3.1.0.20.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ16586",
    "filesets": [
      "bos.net.tcp.client_core:7.2.3.16-7.2.3.17"
    ],
    "issued": "20190614",
    "updated": "null",
    "siblings": [
      "7100-04:IJ16623",
      "7100-05:IJ16622",
      "7200-03:IJ16524"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij16586/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-03-03-1913",
      "7200-03-03-1914"
    ],
    "apAbstract": "netstat prints some messages incorrectly",
    "aparNo": "IJ16586",
    "aparNoSet": [
      "IJ16586"
    ],
    "fixedIn": "7200-03-04-1938",
    "ifixes": [
      "IJ16586s3a.190607.AIX72TL03SP03-1913.epkg.Z",
      "IJ16586s3a.190607.AIX72TL03SP03-1914.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ16586",
    "filesets": [
      "bos.net.tcp.client_core:7.2.3.16-7.2.3.17"
    ],
    "issued": "20190614",
    "updated": "null",
    "siblings": [
      "7100-04:IJ16623",
      "7100-05:IJ16622"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij16586/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-04-1913",
      "7100-05-04-1914"
    ],
    "apAbstract": "netstat prints some messages incorrectly",
    "aparNo": "IJ16622",
    "aparNoSet": [
      "IJ16622"
    ],
    "fixedIn": "7100-05-05-1937",
    "ifixes": [
      "IJ16622s4a.190614.AIX71TL05SP04-1913.epkg.Z",
      "IJ16622s4b.190614.AIX71TL05SP04-1914.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ16622",
    "filesets": [
      "bos.net.tcp.client:7.1.5.32-7.1.5.33"
    ],
    "issued": "20190614",
    "updated": "null",
    "siblings": [
      "7100-04:IJ16623",
      "7200-03:IJ16586"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij16622/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-08-1914"
    ],
    "apAbstract": "netstat prints some messages incorrectly",
    "aparNo": "IJ16623",
    "aparNoSet": [
      "IJ16623"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ16623",
    "filesets": [
      "bos.net.tcp.client:7.1.4.35"
    ],
    "issued": "20190614",
    "updated": "null",
    "siblings": [
      "7100-05:IJ16622",
      "7200-03:IJ16586"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij16623/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.40",
      "2.2.6.41"
    ],
    "apAbstract": "NETSTAT PRINTS SOME MESSAGES INCORRECTLY",
    "aparNo": "IJ16624",
    "aparNoSet": [
      "IJ16624"
    ],
    "fixedIn": "2.2.6.50",
    "ifixes": [
      "IJ16624sDa.190613.VIOS2.2.6.40.epkg.Z",
      "IJ16624sDb.190613.VIOS2.2.6.41.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ16624",
    "filesets": [
      "bos.net.tcp.client:6.1.9.402-6.1.9.403"
    ],
    "issued": "20190614",
    "updated": "null",
    "siblings": [
      "7100-04:IJ16623",
      "7100-05:IJ16622",
      "7200-03:IJ16524"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij16624/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "NTPv4"
    ],
    "apAbstract": "There are vulnerabilities in NTPv4 that affect AIX.",
    "aparNo": "IJ17059",
    "aparNoSet": [
      "CVE-2019-8936",
      "IJ17059"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ17059m9b.190719.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc",
    "filesets": [
      "ntp.rte:7.4.2.8100-7.4.2.8121"
    ],
    "issued": "20190819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar",
    "cvss": [
      "CVE-2019-8936:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-12"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IJ17060",
    "aparNoSet": [
      "CVE-2019-8936",
      "IJ17060"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ17060m9a.190628.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.403"
    ],
    "issued": "20190819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "Out of Support",
    "cvss": [
      "CVE-2019-8936:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.20",
      "2.2.6.21",
      "2.2.6.23",
      "2.2.6.30",
      "2.2.6.31",
      "2.2.6.32",
      "2.2.6.40",
      "2.2.6.41"
    ],
    "apAbstract": "Vulnerabilities in NTP affect VIOS",
    "aparNo": "IJ17060",
    "aparNoSet": [
      "CVE-2019-8936",
      "IJ17060"
    ],
    "fixedIn": "2.2.6.50",
    "ifixes": [
      "IJ17060m9a.190628.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.403"
    ],
    "issued": "20190819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar",
    "cvss": [
      "CVE-2019-8936:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.5.40",
      "2.2.5.50",
      "2.2.5.60"
    ],
    "apAbstract": "Vulnerabilities in NTP affect VIOS",
    "aparNo": "IJ17060",
    "aparNoSet": [
      "CVE-2019-8936",
      "IJ17060"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ17060m9a.190628.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.403"
    ],
    "issued": "20190819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar",
    "cvss": [
      "CVE-2019-8936:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.0",
      "3.1.0.10",
      "3.1.0.20",
      "3.1.0.21"
    ],
    "apAbstract": "Vulnerabilities in NTP affect VIOS",
    "aparNo": "IJ17065",
    "aparNoSet": [
      "CVE-2019-8936",
      "IJ17065"
    ],
    "fixedIn": "3.1.0.30",
    "ifixes": [
      "IJ17065m3a.190701.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory12.asc",
    "filesets": [
      "bos.net.tcp.ntp:7.2.3.0-7.2.3.15",
      "bos.net.tcp.ntpd:7.2.3.0-7.2.3.15"
    ],
    "issued": "20190819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix12.tar",
    "cvss": [
      "CVE-2019-8936:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-03-03"
    ],
    "apAbstract": "Live Update fails when applying 7200-03-03 or IJ09625",
    "aparNo": "IJ17505",
    "aparNoSet": [
      "IJ17505"
    ],
    "fixedIn": "7200-03-04-1938",
    "ifixes": [
      "IJ17505s3a.190911.AIX72TL03SP03.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ17505",
    "filesets": [
      "bos.net.tcp.client_core:7.2.3.16-7.2.3.17"
    ],
    "issued": "20190913",
    "updated": "20190917",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij17505/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-12"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ20781",
    "aparNoSet": [
      "CVE-2017-16808",
      "CVE-2018-10103",
      "CVE-2018-10105",
      "CVE-2018-14461",
      "CVE-2018-14462",
      "CVE-2018-14463",
      "CVE-2018-14464",
      "CVE-2018-14465",
      "CVE-2018-14466",
      "CVE-2018-14467",
      "CVE-2018-14468",
      "CVE-2018-14469",
      "CVE-2018-14470",
      "CVE-2018-14879",
      "CVE-2018-14880",
      "CVE-2018-14881",
      "CVE-2018-14882",
      "CVE-2018-16227",
      "CVE-2018-16228",
      "CVE-2018-16229",
      "CVE-2018-16230",
      "CVE-2018-16300",
      "CVE-2018-16451",
      "CVE-2018-16452",
      "CVE-2019-15166",
      "CVE-2019-15167",
      "IJ20781"
    ],
    "fixedIn": "Out of Support",
    "ifixes": [
      "IJ20781sCc.191121.epkg.Z",
      "IJ20781sCd.191121.epkg.Z",
      "IJ20781sDa.191121.epkg.Z",
      "IJ20781sDb.191121.epkg.Z",
      "IJ20781sEa.191121.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.401"
    ],
    "issued": "20200108",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar",
    "cvss": [
      "CVE-2018-14467:6.5",
      "CVE-2018-14463:6.5",
      "CVE-2018-14464:6.5",
      "CVE-2018-14470:6.5",
      "CVE-2018-10105:8.8",
      "CVE-2018-14461:6.5",
      "CVE-2018-10103:8.8",
      "CVE-2019-15167:6.5",
      "CVE-2018-14466:6.5",
      "CVE-2018-14469:6.5",
      "CVE-2018-14468:6.5",
      "CVE-2018-14881:6.5",
      "CVE-2018-14462:6.5",
      "CVE-2018-14880:6.5",
      "CVE-2018-14465:6.5",
      "CVE-2018-16451:5.5",
      "CVE-2018-16452:5.5",
      "CVE-2018-16230:5.5",
      "CVE-2019-15166:5.5",
      "CVE-2018-14879:6.1",
      "CVE-2018-16228:5.5",
      "CVE-2018-16229:5.5",
      "CVE-2018-16227:5.5",
      "CVE-2018-16300:5.5",
      "CVE-2018-14882:5.5",
      "CVE-2017-16808:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.31",
      "2.2.6.32",
      "2.2.6.40",
      "2.2.6.41",
      "2.2.6.50"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.",
    "aparNo": "IJ20781",
    "aparNoSet": [
      "CVE-2017-16808",
      "CVE-2018-10103",
      "CVE-2018-10105",
      "CVE-2018-14461",
      "CVE-2018-14462",
      "CVE-2018-14463",
      "CVE-2018-14464",
      "CVE-2018-14465",
      "CVE-2018-14466",
      "CVE-2018-14467",
      "CVE-2018-14468",
      "CVE-2018-14469",
      "CVE-2018-14470",
      "CVE-2018-14879",
      "CVE-2018-14880",
      "CVE-2018-14881",
      "CVE-2018-14882",
      "CVE-2018-16227",
      "CVE-2018-16228",
      "CVE-2018-16229",
      "CVE-2018-16230",
      "CVE-2018-16300",
      "CVE-2018-16451",
      "CVE-2018-16452",
      "CVE-2019-15166",
      "CVE-2019-15167",
      "IJ20781"
    ],
    "fixedIn": "2.2.6.60",
    "ifixes": [
      "IJ20781sCc.191121.epkg.Z",
      "IJ20781sCd.191121.epkg.Z",
      "IJ20781sDa.191121.epkg.Z",
      "IJ20781sDb.191121.epkg.Z",
      "IJ20781sEa.191121.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.401"
    ],
    "issued": "20200108",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar",
    "cvss": [
      "CVE-2018-14467:6.5",
      "CVE-2018-14463:6.5",
      "CVE-2018-14464:6.5",
      "CVE-2018-14470:6.5",
      "CVE-2018-10105:8.8",
      "CVE-2018-14461:6.5",
      "CVE-2018-10103:8.8",
      "CVE-2019-15167:6.5",
      "CVE-2018-14466:6.5",
      "CVE-2018-14469:6.5",
      "CVE-2018-14468:6.5",
      "CVE-2018-14881:6.5",
      "CVE-2018-14462:6.5",
      "CVE-2018-14880:6.5",
      "CVE-2018-14465:6.5",
      "CVE-2018-16451:5.5",
      "CVE-2018-16452:5.5",
      "CVE-2018-16230:5.5",
      "CVE-2019-15166:5.5",
      "CVE-2018-14879:6.1",
      "CVE-2018-16228:5.5",
      "CVE-2018-16229:5.5",
      "CVE-2018-16227:5.5",
      "CVE-2018-16300:5.5",
      "CVE-2018-14882:5.5",
      "CVE-2017-16808:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-01",
      "7100-05-02",
      "7100-05-03"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ20783",
    "aparNoSet": [
      "CVE-2018-19519",
      "IJ12980",
      "IJ20783"
    ],
    "fixedIn": "7100-05-04-1913",
    "ifixes": [
      "IJ12980m1a.190207.epkg.Z",
      "IJ12980m1a.190207.epkg.Z",
      "IJ12980m3a.190212.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.5.0-7.1.5.31"
    ],
    "issued": "20190225",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ12978",
      "2.2.5:IJ12978",
      "3.1.0:IJ12983",
      "7200-02:IJ12982",
      "7200-01:IJ12981",
      "7100-04:IJ12979",
      "7200-03:IJ12983"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar",
    "cvss": [
      "CVE-2018-19519:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-03",
      "7100-05-04",
      "7100-05-05"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ20783",
    "aparNoSet": [
      "CVE-2017-16808",
      "CVE-2018-10103",
      "CVE-2018-10105",
      "CVE-2018-14461",
      "CVE-2018-14462",
      "CVE-2018-14463",
      "CVE-2018-14464",
      "CVE-2018-14465",
      "CVE-2018-14466",
      "CVE-2018-14467",
      "CVE-2018-14468",
      "CVE-2018-14469",
      "CVE-2018-14470",
      "CVE-2018-14879",
      "CVE-2018-14880",
      "CVE-2018-14881",
      "CVE-2018-14882",
      "CVE-2018-16227",
      "CVE-2018-16228",
      "CVE-2018-16229",
      "CVE-2018-16230",
      "CVE-2018-16300",
      "CVE-2018-16451",
      "CVE-2018-16452",
      "CVE-2019-15166",
      "CVE-2019-15167",
      "IJ20783"
    ],
    "fixedIn": "7100-05-06-2015",
    "ifixes": [
      "IJ20783s4a.191118.epkg.Z",
      "IJ20783s5a.191115.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.5.0-7.1.5.32"
    ],
    "issued": "20200108",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar",
    "cvss": [
      "CVE-2018-14467:6.5",
      "CVE-2018-14463:6.5",
      "CVE-2018-14464:6.5",
      "CVE-2018-14470:6.5",
      "CVE-2018-10105:8.8",
      "CVE-2018-14461:6.5",
      "CVE-2018-10103:8.8",
      "CVE-2019-15167:6.5",
      "CVE-2018-14466:6.5",
      "CVE-2018-14469:6.5",
      "CVE-2018-14468:6.5",
      "CVE-2018-14881:6.5",
      "CVE-2018-14462:6.5",
      "CVE-2018-14880:6.5",
      "CVE-2018-14465:6.5",
      "CVE-2018-16451:5.5",
      "CVE-2018-16452:5.5",
      "CVE-2018-16230:5.5",
      "CVE-2019-15166:5.5",
      "CVE-2018-14879:6.1",
      "CVE-2018-16228:5.5",
      "CVE-2018-16229:5.5",
      "CVE-2018-16227:5.5",
      "CVE-2018-16300:5.5",
      "CVE-2018-14882:5.5",
      "CVE-2017-16808:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-01",
      "7200-02-02",
      "7200-02-03"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ20784",
    "aparNoSet": [
      "CVE-2018-19519",
      "IJ12982",
      "IJ20784"
    ],
    "fixedIn": "7200-02-04-1914",
    "ifixes": [
      "IJ12982m1a.190215.epkg.Z",
      "IJ12982m2a.190215.epkg.Z",
      "IJ12982m3a.190215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.2.0-7.2.2.16"
    ],
    "issued": "20190225",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ12978",
      "2.2.5:IJ12978",
      "3100-00:IJ12983",
      "7200-01:IJ12981",
      "7100-05:IJ12980",
      "7100-04:IJ12979",
      "7200-03:IJ12983"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar",
    "cvss": [
      "CVE-2018-19519:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-02",
      "7200-02-03",
      "7200-02-04"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ20784",
    "aparNoSet": [
      "CVE-2017-16808",
      "CVE-2018-10103",
      "CVE-2018-10105",
      "CVE-2018-14461",
      "CVE-2018-14462",
      "CVE-2018-14463",
      "CVE-2018-14464",
      "CVE-2018-14465",
      "CVE-2018-14466",
      "CVE-2018-14467",
      "CVE-2018-14468",
      "CVE-2018-14469",
      "CVE-2018-14470",
      "CVE-2018-14879",
      "CVE-2018-14880",
      "CVE-2018-14881",
      "CVE-2018-14882",
      "CVE-2018-16227",
      "CVE-2018-16228",
      "CVE-2018-16229",
      "CVE-2018-16230",
      "CVE-2018-16300",
      "CVE-2018-16451",
      "CVE-2018-16452",
      "CVE-2019-15166",
      "CVE-2019-15167",
      "IJ20784"
    ],
    "fixedIn": "7200-02-06-2015",
    "ifixes": [
      "IJ20784s2a.191118.epkg.Z",
      "IJ20784s3a.191118.epkg.Z",
      "IJ20784s4a.191115.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.2.0-7.2.2.17"
    ],
    "issued": "20200108",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar",
    "cvss": [
      "CVE-2018-14467:6.5",
      "CVE-2018-14463:6.5",
      "CVE-2018-14464:6.5",
      "CVE-2018-14470:6.5",
      "CVE-2018-10105:8.8",
      "CVE-2018-14461:6.5",
      "CVE-2018-10103:8.8",
      "CVE-2019-15167:6.5",
      "CVE-2018-14466:6.5",
      "CVE-2018-14469:6.5",
      "CVE-2018-14468:6.5",
      "CVE-2018-14881:6.5",
      "CVE-2018-14462:6.5",
      "CVE-2018-14880:6.5",
      "CVE-2018-14465:6.5",
      "CVE-2018-16451:5.5",
      "CVE-2018-16452:5.5",
      "CVE-2018-16230:5.5",
      "CVE-2019-15166:5.5",
      "CVE-2018-14879:6.1",
      "CVE-2018-16228:5.5",
      "CVE-2018-16229:5.5",
      "CVE-2018-16227:5.5",
      "CVE-2018-16300:5.5",
      "CVE-2018-14882:5.5",
      "CVE-2017-16808:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-00",
      "7200-03-01",
      "7200-03-02"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ20785",
    "aparNoSet": [
      "CVE-2018-19519",
      "IJ12983",
      "IJ20785"
    ],
    "fixedIn": "7200-03-03-1913",
    "ifixes": [
      "IJ12983m0a.190215.epkg.Z",
      "IJ12983m1a.190215.epkg.Z",
      "IJ12983m2a.190215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.3.0-7.2.3.15"
    ],
    "issued": "20190225",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ12978",
      "2.2.5:IJ12978",
      "3.1.0:IJ12983",
      "7200-02:IJ12982",
      "7200-01:IJ12981",
      "7100-05:IJ12980",
      "7100-04:IJ12979"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar",
    "cvss": [
      "CVE-2018-19519:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.10"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.",
    "aparNo": "IJ20785",
    "aparNoSet": [
      "CVE-2018-19519",
      "IJ12983",
      "IJ20785"
    ],
    "fixedIn": "3.1.0.20",
    "ifixes": [
      "IJ12983m2a.190215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory4.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.3.0-7.2.3.15"
    ],
    "issued": "20190225",
    "updated": "null",
    "siblings": [
      "2.2.6:IJ12978",
      "2.2.5:IJ12978",
      "7200-02:IJ12982",
      "7200-01:IJ12981",
      "7100-05:IJ12980",
      "7100-04:IJ12979",
      "7200-03:IJ12983"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix4.tar",
    "cvss": [
      "CVE-2018-19519:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-01",
      "7200-03-02",
      "7200-03-03"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ20785",
    "aparNoSet": [
      "CVE-2017-16808",
      "CVE-2018-10103",
      "CVE-2018-10105",
      "CVE-2018-14461",
      "CVE-2018-14462",
      "CVE-2018-14463",
      "CVE-2018-14464",
      "CVE-2018-14465",
      "CVE-2018-14466",
      "CVE-2018-14467",
      "CVE-2018-14468",
      "CVE-2018-14469",
      "CVE-2018-14470",
      "CVE-2018-14879",
      "CVE-2018-14880",
      "CVE-2018-14881",
      "CVE-2018-14882",
      "CVE-2018-16227",
      "CVE-2018-16228",
      "CVE-2018-16229",
      "CVE-2018-16230",
      "CVE-2018-16300",
      "CVE-2018-16451",
      "CVE-2018-16452",
      "CVE-2019-15166",
      "CVE-2019-15167",
      "IJ20785"
    ],
    "fixedIn": "7200-03-05-2016",
    "ifixes": [
      "IJ20785s1a.191120.epkg.Z",
      "IJ20785s2a.191119.epkg.Z",
      "IJ20785s3a.191115.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.3.0-7.2.3.16"
    ],
    "issued": "20200108",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar",
    "cvss": [
      "CVE-2018-14467:6.5",
      "CVE-2018-14463:6.5",
      "CVE-2018-14464:6.5",
      "CVE-2018-14470:6.5",
      "CVE-2018-10105:8.8",
      "CVE-2018-14461:6.5",
      "CVE-2018-10103:8.8",
      "CVE-2019-15167:6.5",
      "CVE-2018-14466:6.5",
      "CVE-2018-14469:6.5",
      "CVE-2018-14468:6.5",
      "CVE-2018-14881:6.5",
      "CVE-2018-14462:6.5",
      "CVE-2018-14880:6.5",
      "CVE-2018-14465:6.5",
      "CVE-2018-16451:5.5",
      "CVE-2018-16452:5.5",
      "CVE-2018-16230:5.5",
      "CVE-2019-15166:5.5",
      "CVE-2018-14879:6.1",
      "CVE-2018-16228:5.5",
      "CVE-2018-16229:5.5",
      "CVE-2018-16227:5.5",
      "CVE-2018-16300:5.5",
      "CVE-2018-14882:5.5",
      "CVE-2017-16808:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.0",
      "3.1.0.10",
      "3.1.0.20"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.",
    "aparNo": "IJ20785",
    "aparNoSet": [
      "CVE-2017-16808",
      "CVE-2018-10103",
      "CVE-2018-10105",
      "CVE-2018-14461",
      "CVE-2018-14462",
      "CVE-2018-14463",
      "CVE-2018-14464",
      "CVE-2018-14465",
      "CVE-2018-14466",
      "CVE-2018-14467",
      "CVE-2018-14468",
      "CVE-2018-14469",
      "CVE-2018-14470",
      "CVE-2018-14879",
      "CVE-2018-14880",
      "CVE-2018-14881",
      "CVE-2018-14882",
      "CVE-2018-16227",
      "CVE-2018-16228",
      "CVE-2018-16229",
      "CVE-2018-16230",
      "CVE-2018-16300",
      "CVE-2018-16451",
      "CVE-2018-16452",
      "CVE-2019-15166",
      "CVE-2019-15167",
      "IJ20785"
    ],
    "fixedIn": "3.1.0.40",
    "ifixes": [
      "IJ20785s2a.191119.epkg.Z",
      "IJ20785s2a.191119.epkg.Z",
      "IJ20785s3a.191115.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.3.0-7.2.3.16"
    ],
    "issued": "20200108",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar",
    "cvss": [
      "CVE-2018-14467:6.5",
      "CVE-2018-14463:6.5",
      "CVE-2018-14464:6.5",
      "CVE-2018-14470:6.5",
      "CVE-2018-10105:8.8",
      "CVE-2018-14461:6.5",
      "CVE-2018-10103:8.8",
      "CVE-2019-15167:6.5",
      "CVE-2018-14466:6.5",
      "CVE-2018-14469:6.5",
      "CVE-2018-14468:6.5",
      "CVE-2018-14881:6.5",
      "CVE-2018-14462:6.5",
      "CVE-2018-14880:6.5",
      "CVE-2018-14465:6.5",
      "CVE-2018-16451:5.5",
      "CVE-2018-16452:5.5",
      "CVE-2018-16230:5.5",
      "CVE-2019-15166:5.5",
      "CVE-2018-14879:6.1",
      "CVE-2018-16228:5.5",
      "CVE-2018-16229:5.5",
      "CVE-2018-16227:5.5",
      "CVE-2018-16300:5.5",
      "CVE-2018-14882:5.5",
      "CVE-2017-16808:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects AIX.",
    "aparNo": "IJ20786",
    "aparNoSet": [
      "CVE-2017-16808",
      "CVE-2018-10103",
      "CVE-2018-10105",
      "CVE-2018-14461",
      "CVE-2018-14462",
      "CVE-2018-14463",
      "CVE-2018-14464",
      "CVE-2018-14465",
      "CVE-2018-14466",
      "CVE-2018-14467",
      "CVE-2018-14468",
      "CVE-2018-14469",
      "CVE-2018-14470",
      "CVE-2018-14879",
      "CVE-2018-14880",
      "CVE-2018-14881",
      "CVE-2018-14882",
      "CVE-2018-16227",
      "CVE-2018-16228",
      "CVE-2018-16229",
      "CVE-2018-16230",
      "CVE-2018-16300",
      "CVE-2018-16451",
      "CVE-2018-16452",
      "CVE-2019-15166",
      "CVE-2019-15167",
      "IJ20786"
    ],
    "fixedIn": "7200-04-02-2015",
    "ifixes": [
      "IJ20786s1a.191120.epkg.Z",
      "IJ20786s1a.191120.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.4.0"
    ],
    "issued": "20200108",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar",
    "cvss": [
      "CVE-2018-14467:6.5",
      "CVE-2018-14463:6.5",
      "CVE-2018-14464:6.5",
      "CVE-2018-14470:6.5",
      "CVE-2018-10105:8.8",
      "CVE-2018-14461:6.5",
      "CVE-2018-10103:8.8",
      "CVE-2019-15167:6.5",
      "CVE-2018-14466:6.5",
      "CVE-2018-14469:6.5",
      "CVE-2018-14468:6.5",
      "CVE-2018-14881:6.5",
      "CVE-2018-14462:6.5",
      "CVE-2018-14880:6.5",
      "CVE-2018-14465:6.5",
      "CVE-2018-16451:5.5",
      "CVE-2018-16452:5.5",
      "CVE-2018-16230:5.5",
      "CVE-2019-15166:5.5",
      "CVE-2018-14879:6.1",
      "CVE-2018-16228:5.5",
      "CVE-2018-16229:5.5",
      "CVE-2018-16227:5.5",
      "CVE-2018-16300:5.5",
      "CVE-2018-14882:5.5",
      "CVE-2017-16808:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.0",
      "3.1.1.10"
    ],
    "apAbstract": "There is a vulnerability in tcpdump that affects VIOS.",
    "aparNo": "IJ20786",
    "aparNoSet": [
      "CVE-2017-16808",
      "CVE-2018-10103",
      "CVE-2018-10105",
      "CVE-2018-14461",
      "CVE-2018-14462",
      "CVE-2018-14463",
      "CVE-2018-14464",
      "CVE-2018-14465",
      "CVE-2018-14466",
      "CVE-2018-14467",
      "CVE-2018-14468",
      "CVE-2018-14469",
      "CVE-2018-14470",
      "CVE-2018-14879",
      "CVE-2018-14880",
      "CVE-2018-14881",
      "CVE-2018-14882",
      "CVE-2018-16227",
      "CVE-2018-16228",
      "CVE-2018-16229",
      "CVE-2018-16230",
      "CVE-2018-16300",
      "CVE-2018-16451",
      "CVE-2018-16452",
      "CVE-2019-15166",
      "CVE-2019-15167",
      "IJ20786"
    ],
    "fixedIn": "3.1.1.20",
    "ifixes": [
      "IJ20786s1a.191120.epkg.Z",
      "IJ20786s1a.191120.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory5.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.4.0"
    ],
    "issued": "20200108",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix5.tar",
    "cvss": [
      "CVE-2018-14467:6.5",
      "CVE-2018-14463:6.5",
      "CVE-2018-14464:6.5",
      "CVE-2018-14470:6.5",
      "CVE-2018-10105:8.8",
      "CVE-2018-14461:6.5",
      "CVE-2018-10103:8.8",
      "CVE-2019-15167:6.5",
      "CVE-2018-14466:6.5",
      "CVE-2018-14469:6.5",
      "CVE-2018-14468:6.5",
      "CVE-2018-14881:6.5",
      "CVE-2018-14462:6.5",
      "CVE-2018-14880:6.5",
      "CVE-2018-14465:6.5",
      "CVE-2018-16451:5.5",
      "CVE-2018-16452:5.5",
      "CVE-2018-16230:5.5",
      "CVE-2019-15166:5.5",
      "CVE-2018-14879:6.1",
      "CVE-2018-16228:5.5",
      "CVE-2018-16229:5.5",
      "CVE-2018-16227:5.5",
      "CVE-2018-16300:5.5",
      "CVE-2018-14882:5.5",
      "CVE-2017-16808:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-01-1939"
    ],
    "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters",
    "aparNo": "IJ21527",
    "aparNoSet": [
      "IJ21527"
    ],
    "fixedIn": "7200-04-02",
    "ifixes": [
      "IJ21527s1a.191216.AIX72TL04SP00.epkg.Z",
      "IJ21527s1a.191216.AIX72TL04SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21527",
    "filesets": [
      "devices.pci.df1000f7.com:7.2.4.0"
    ],
    "issued": "20191218",
    "updated": "null",
    "siblings": [
      "7100-04:IJ21581",
      "7100-05:IJ21577",
      "7200-02:IJ21578"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21527/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.1.0",
      "3.1.1.10"
    ],
    "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters",
    "aparNo": "IJ21527",
    "aparNoSet": [
      "IJ21527"
    ],
    "fixedIn": "3.1.1.20",
    "ifixes": [
      "IJ21527s1a.191216.VIOS3.1.1.0.epkg.Z",
      "IJ21527s1a.191216.VIOS3.1.1.10.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21527",
    "filesets": [
      "devices.pci.df1000f7.com:7.2.4.0"
    ],
    "issued": "20191218",
    "updated": "null",
    "siblings": [
      "7100-04:IJ21581",
      "7100-05:IJ21577",
      "7200-02:IJ21578",
      "7200-03:IJ21580",
      "7200-04:IJ21527"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21527/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.1.10"
    ],
    "apAbstract": "VIOS 3.1.1 SSP may not recover from network loss",
    "aparNo": "IJ21564",
    "aparNoSet": [
      "IJ21564"
    ],
    "fixedIn": "3.1.1.20",
    "ifixes": [
      "IJ21564s1a.191211.VIOS3.1.1.10.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21564",
    "filesets": [
      "pool.basic.rte:7.2.4.1"
    ],
    "issued": "20191214",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21564/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.0",
      "2.2.6.10",
      "2.2.6.20",
      "2.2.6.30",
      "2.2.6.40",
      "2.2.6.50",
      "2.2.6.51"
    ],
    "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters",
    "aparNo": "IJ21576",
    "aparNoSet": [
      "IJ21576"
    ],
    "fixedIn": "2.2.6.60",
    "ifixes": [
      "IJ21576sea.191216.VIOS2.2.6.51.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21576",
    "filesets": [
      "devices.pci.df1000f7.com:6.1.9.300-6.1.9.401"
    ],
    "issued": "20191218",
    "updated": "null",
    "siblings": [
      "7100-04:IJ21581",
      "7100-05:IJ21577",
      "7200-02:IJ21578",
      "7200-03:IJ21580",
      "7200-04:IJ21527"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21576/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-00-1731",
      "7100-05-01",
      "7100-05-02",
      "7100-05-03",
      "7100-05-04",
      "7100-05-05",
      "7100-05-05-1939"
    ],
    "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters",
    "aparNo": "IJ21577",
    "aparNoSet": [
      "IJ21577"
    ],
    "fixedIn": "7100-05-06",
    "ifixes": [
      "IJ21577s5a.191216.AIX71TL05SP05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21577",
    "filesets": [
      "devices.pci.df1000f7.com:7.1.5.0-7.1.5.32"
    ],
    "issued": "20191218",
    "updated": "null",
    "siblings": [
      "7100-04:IJ21581",
      "7200-02:IJ21578",
      "7200-03:IJ21580",
      "7200-04:IJ21527"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21577/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-02-00-1731",
      "7200-02-01",
      "7200-02-02",
      "7200-02-03",
      "7200-02-04",
      "7200-02-05",
      "7200-02-05-1938"
    ],
    "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters",
    "aparNo": "IJ21578",
    "aparNoSet": [
      "IJ21578"
    ],
    "fixedIn": "7200-02-06",
    "ifixes": [
      "IJ21578s4a.191216.AIX72TL02SP03.epkg.Z",
      "IJ21578s4a.191216.AIX72TL02SP04.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21578",
    "filesets": [
      "devices.pci.df1000f7.com:7.2.2.0-7.2.2.17"
    ],
    "issued": "20191218",
    "updated": "null",
    "siblings": [
      "7100-04:IJ21581",
      "7100-05:IJ21577",
      "7200-03:IJ21580",
      "7200-04:IJ21527"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21578/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.0.0",
      "3.1.0.10",
      "3.1.0.20",
      "3.1.0.30"
    ],
    "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters",
    "aparNo": "IJ21580",
    "aparNoSet": [
      "IJ21580"
    ],
    "fixedIn": "3.1.0.40",
    "ifixes": [
      "IJ21580s3a.191216.VIOS3.1.0.21.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21580",
    "filesets": [
      "devices.pci.df1000f7.com:7.2.3.15-7.2.3.16"
    ],
    "issued": "20191218",
    "updated": "null",
    "siblings": [
      "7100-04:IJ21581",
      "7100-05:IJ21577",
      "7200-02:IJ21578",
      "7200-03:IJ21580",
      "7200-04:IJ21527"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21580/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-03-00",
      "7200-03-01",
      "7200-03-02",
      "7200-03-03",
      "7200-03-04",
      "7200-03-04-1938"
    ],
    "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters",
    "aparNo": "IJ21580",
    "aparNoSet": [
      "IJ21580"
    ],
    "fixedIn": "7200-03-05",
    "ifixes": [
      "IJ21580s3a.191216.AIX72TL03SP02.epkg.Z",
      "IJ21580s3a.191216.AIX7wloW7JyDy0FcCNvo2TL03SP03.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21580",
    "filesets": [
      "devices.pci.df1000f7.com:7.2.3.0-7.2.3.16"
    ],
    "issued": "20191218",
    "updated": "null",
    "siblings": [
      "7100-04:IJ21581",
      "7100-05:IJ21577",
      "7200-02:IJ21578",
      "7200-04:IJ21527"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21580/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00-1543",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03",
      "7100-04-04",
      "7100-04-05",
      "7100-04-06",
      "7100-04-07",
      "7100-04-08",
      "7100-04-08-1914"
    ],
    "apAbstract": "Possible undetected data corruption with certain Fibre Channel adapters",
    "aparNo": "IJ21581",
    "aparNoSet": [
      "IJ21581"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ21581s8a.191216.AIX71TL04SP07.epkg.Z",
      "IJ21581s8a.191216.AIX71TL04SP08.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ21581",
    "filesets": [
      "devices.pci.df1000f7.com:7.1.4.0-7.1.4.34"
    ],
    "issued": "20191218",
    "updated": "null",
    "siblings": [
      "7100-05:IJ21577",
      "7200-02:IJ21578",
      "7200-03:IJ21580",
      "7200-04:IJ21527"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij21581/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-01-1939"
    ],
    "apAbstract": "I/O failures on LPARs using certain FC adapters",
    "aparNo": "IJ22290",
    "aparNoSet": [
      "IJ22290"
    ],
    "fixedIn": "7200-04-02",
    "ifixes": [
      "IJ22290s1a.200124.AIX72TL04SP00-01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ22290",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.2.4.0"
    ],
    "issued": "20200125",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij22290/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.1.0",
      "3.1.1.10"
    ],
    "apAbstract": "I/O failures on LPARs using certain FC adapters",
    "aparNo": "IJ22290",
    "aparNoSet": [
      "IJ22290"
    ],
    "fixedIn": "3.1.1.20",
    "ifixes": [
      "IJ22290s1a.200124.VIOS3.1.1.0.epkg.Z",
      "IJ22290s1a.200124.VIOS3.1.1.10.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ22290",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.2.4.0"
    ],
    "issued": "20200125",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij22290/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.1.0",
      "3.1.1.10"
    ],
    "apAbstract": "Possible undetected data corruption when disk attribute rw_max_time is non-zero",
    "aparNo": "IJ22714",
    "aparNoSet": [
      "IJ22714"
    ],
    "fixedIn": "3.1.1.20",
    "ifixes": [
      "IJ22714s1a.200212.VIOS3.1.1.0.epkg.Z",
      "IJ22714s1a.200212.VIOS3.1.1.10.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ22714",
    "filesets": [
      "devices.fcp.disk.rte:7.2.4.0"
    ],
    "issued": "20200213",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij22714/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-01-1939"
    ],
    "apAbstract": "Possible undetected data corruption when disk attribute rw_max_time is non-zero",
    "aparNo": "IJ22714",
    "aparNoSet": [
      "IJ22714"
    ],
    "fixedIn": "7200-04-02",
    "ifixes": [
      "IJ22714s1a.200212.AIX72TL04SP00-01.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ22714",
    "filesets": [
      "devices.fcp.disk.rte:7.2.4.0"
    ],
    "issued": "20200213",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij22714/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.1.0",
      "3.1.1.10"
    ],
    "apAbstract": "NPIV I/O hangs and/or timeouts on VIOS 3.1.1",
    "aparNo": "IJ23222",
    "aparNoSet": [
      "IJ23222"
    ],
    "fixedIn": "3.1.1.20",
    "ifixes": [
      "IJ23222s1a.200306.VIOS3.1.1.0.epkg.Z",
      "IJ23222s1a.200306.VIOS3.1.1.10.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IJ23222",
    "filesets": [
      "devices.vdevice.IBM.vfc-server.rte:7.2.4.0"
    ],
    "issued": "20200311",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij23222/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-01-1939"
    ],
    "apAbstract": "Issues with \u0027sendmail\u0027 as non-root user on 7200-04 ",
    "aparNo": "IJ24059",
    "aparNoSet": [
      "IJ24059"
    ],
    "fixedIn": "7200-04-02",
    "ifixes": [
      "IJ24059m1a.200409.AIX72TL04SP00-01.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ24059",
    "filesets": [
      "bos.net.tcp.sendmail:7.2.4.0"
    ],
    "issued": "20200430",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij24059/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.1.0",
      "3.1.1.10",
      "3.1.1.20",
      "3.1.1.21"
    ],
    "apAbstract": "Using NPIV with VIOS 3.1.1 can cause a crash",
    "aparNo": "IJ24885",
    "aparNoSet": [
      "IJ24885"
    ],
    "fixedIn": "3.1.1.22",
    "ifixes": [
      "IJ24885m1a.200513.VIOS3.1.1.0-3.1.1.10.epkg.Z",
      "IJ24885m2a.200512.VIOS3.1.1.20-3.1.1.21.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ24885",
    "filesets": [
      "devices.vdevice.IBM.vfc-server.rte:7.2.4.0-7.2.4.1",
      "devices.vdevice.IBM.v-scsi-host.rte:7.2.4.0-7.2.4.1"
    ],
    "issued": "20200529",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij24885/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.1.20",
      "3.1.1.21"
    ],
    "apAbstract": "Slow TCP performance with Virtual Ethernet Adapter and largesend packets",
    "aparNo": "IJ25390",
    "aparNoSet": [
      "IJ25390"
    ],
    "fixedIn": "3.1.1.22",
    "ifixes": [
      "IJ25390s2b.200608.VIOS.3.1.1.21.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ25390",
    "filesets": [
      "devices.vdevice.IBM.l-lan.rte:7.2.4.1-7.2.4.2"
    ],
    "issued": "20200613",
    "updated": "null",
    "siblings": [
      "7100-05:IJ25443"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij25390/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-04-02-2015",
      "7200-04-02-2016"
    ],
    "apAbstract": "Slow TCP performance with Virtual Ethernet Adapter and largesend packets",
    "aparNo": "IJ25390",
    "aparNoSet": [
      "IJ25390"
    ],
    "fixedIn": "7200-04-02-2027",
    "ifixes": [
      "IJ25390s2b.200608.AIX72TL04SP02-2016.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ25390",
    "filesets": [
      "devices.vdevice.IBM.l-lan.rte:7.2.4.1-7.2.4.2"
    ],
    "issued": "20200613",
    "updated": "null",
    "siblings": [
      "7100-05:IJ25443"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij25390/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.6.60",
      "2.2.6.61"
    ],
    "apAbstract": "Slow TCP performance with Virtual Ethernet Adapter and largesend packets",
    "aparNo": "IJ25442",
    "aparNoSet": [
      "IJ25442"
    ],
    "fixedIn": "2.2.6.62",
    "ifixes": [
      "IJ25442sFa.200611.VIOS2.2.6.60.epkg.Z",
      "IJ25442sFa.200611.VIOS2.2.6.61.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ25442",
    "filesets": [
      "devices.vdevice.IBM.l-lan.rte:6.1.9.402"
    ],
    "issued": "20200613",
    "updated": "null",
    "siblings": [
      "7100-05:IJ25443",
      "7200-04:IJ25390"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij25442/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-06-2015",
      "7100-05-06-2016"
    ],
    "apAbstract": "Slow TCP performance with Virtual Ethernet Adapter and largesend packets",
    "aparNo": "IJ25443",
    "aparNoSet": [
      "IJ25443"
    ],
    "fixedIn": "7100-05-06-2028",
    "ifixes": [
      "IJ25443s6a.200611.AIX71TL05SP06-2015.epkg.Z",
      "IJ25443s6a.200611.AIX71TL05SP06-2016.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ25443",
    "filesets": [
      "devices.vdevice.IBM.l-lan.rte:7.1.5.33"
    ],
    "issued": "20200613",
    "updated": "null",
    "siblings": [
      "7200-04:IJ25390"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij25443/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-04",
      "7100-05-05",
      "7100-05-06"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IJ25924",
    "aparNoSet": [
      "CVE-2020-8616",
      "CVE-2020-8617",
      "IJ25924"
    ],
    "fixedIn": "7100-05-07-2037",
    "ifixes": [
      "IJ25924s6a.200708.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.35"
    ],
    "issued": "20200821",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar",
    "cvss": [
      "CVE-2020-8616:8.6",
      "CVE-2020-8617:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-02-04",
      "7200-02-05",
      "7200-02-06"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IJ25925",
    "aparNoSet": [
      "CVE-2020-8616",
      "CVE-2020-8617",
      "IJ25925"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IJ25925s6a.200708.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.2.0-7.2.2.18"
    ],
    "issued": "20200821",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar",
    "cvss": [
      "CVE-2020-8616:8.6",
      "CVE-2020-8617:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-03",
      "7200-03-04",
      "7200-03-05"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IJ25926",
    "aparNoSet": [
      "CVE-2020-8616",
      "CVE-2020-8617",
      "IJ25926"
    ],
    "fixedIn": "7200-03-06-2038",
    "ifixes": [
      "IJ25926s5a.200708.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16"
    ],
    "issued": "20200821",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar",
    "cvss": [
      "CVE-2020-8616:8.6",
      "CVE-2020-8617:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.20",
      "3.1.0.30",
      "3.1.0.40"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact VIOS.",
    "aparNo": "IJ25926",
    "aparNoSet": [
      "CVE-2020-8616",
      "CVE-2020-8617",
      "IJ25926"
    ],
    "fixedIn": "3.1.0.50",
    "ifixes": [
      "IJ25926s5a.200708.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16"
    ],
    "issued": "20200821",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar",
    "cvss": [
      "CVE-2020-8616:8.6",
      "CVE-2020-8617:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-02"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IJ25927",
    "aparNoSet": [
      "CVE-2020-8616",
      "CVE-2020-8617",
      "IJ25927"
    ],
    "fixedIn": "7200-04-03-2038",
    "ifixes": [
      "IJ25927s2a.200708.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.1"
    ],
    "issued": "20200821",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar",
    "cvss": [
      "CVE-2020-8616:8.6",
      "CVE-2020-8617:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.10",
      "3.1.1.20",
      "3.1.1.21",
      "3.1.1.22",
      "3.1.1.25"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact VIOS.",
    "aparNo": "IJ25927",
    "aparNoSet": [
      "CVE-2020-8616",
      "CVE-2020-8617",
      "IJ25927"
    ],
    "fixedIn": "3.1.1.30",
    "ifixes": [
      "IJ25927s2a.200708.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.1"
    ],
    "issued": "20200821",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar",
    "cvss": [
      "CVE-2020-8616:8.6",
      "CVE-2020-8617:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.6.40",
      "2.2.6.41",
      "2.2.6.50",
      "2.2.6.51",
      "2.2.6.60",
      "2.2.6.61",
      "2.2.6.65"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact VIOS.",
    "aparNo": "IJ26021",
    "aparNoSet": [
      "CVE-2020-8616",
      "CVE-2020-8617",
      "IJ26021"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IJ26021sDa.200708.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory17.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.404"
    ],
    "issued": "20200821",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix17.tar",
    "cvss": [
      "CVE-2020-8616:8.6",
      "CVE-2020-8617:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "NTPv4"
    ],
    "apAbstract": "There are vulnerabilities in NTPv4 that affect AIX.",
    "aparNo": "IJ26684",
    "aparNoSet": [
      "CVE-2020-11868",
      "CVE-2020-13817",
      "CVE-2020-15025",
      "IJ26684"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ26684s9a.200806.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory13.asc",
    "filesets": [
      "ntp.rte:7.4.2.8100-7.4.2.8130"
    ],
    "issued": "20201026",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix13.tar",
    "cvss": [
      "CVE-2020-11868:5.9",
      "CVE-2020-13817:7.4",
      "CVE-2020-15025:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "Perl"
    ],
    "apAbstract": "There are vulnerabilities in Perl that affect AIX.",
    "aparNo": "IJ26985",
    "aparNoSet": [
      "CVE-2020-10543",
      "CVE-2020-10878",
      "CVE-2020-12723",
      "IJ26985",
      "IJ26986"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ26985s1a.200812.epkg.Z",
      "IJ26986s1a.200813.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory5.asc",
    "filesets": [
      "perl.rte:5.20.1.0-5.20.1.3",
      "perl.rte:5.28.1.0-5.28.1.3"
    ],
    "issued": "20201209",
    "updated": "20210304",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_fix5.tar",
    "cvss": [
      "CVE-2020-10543:9.8",
      "CVE-2020-10878:9.8",
      "CVE-2020-12723:9.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01"
    ],
    "apAbstract": "IBM has released AIX iFixes in response to a vulnerability in IBM POWER9",
    "aparNo": "IJ28226",
    "aparNoSet": [
      "CVE-2020-4788",
      "IJ28226"
    ],
    "fixedIn": "7200-05-02",
    "ifixes": [
      "IJ28226s1b.201117.epkg.Z",
      "IJ28226s1a.201117.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.1"
    ],
    "issued": "20201119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar",
    "cvss": [
      "CVE-2020-4788:5.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.0",
      "3.1.2.10"
    ],
    "apAbstract": "IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9",
    "aparNo": "IJ28226",
    "aparNoSet": [
      "CVE-2020-4788",
      "IJ28226"
    ],
    "fixedIn": "3.1.2.20",
    "ifixes": [
      "IJ28226s1b.201117.epkg.Z",
      "IJ28226s1a.201117.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.1"
    ],
    "issued": "20201119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar",
    "cvss": [
      "CVE-2020-4788:5.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-02"
    ],
    "apAbstract": "IBM has released AIX iFixes in response to a vulnerability in IBM POWER9",
    "aparNo": "IJ28227",
    "aparNoSet": [
      "CVE-2020-4788",
      "IJ28227"
    ],
    "fixedIn": "7200-04-04",
    "ifixes": [
      "IJ28227s0a.200922.epkg.Z",
      "IJ28227s1a.200922.epkg.Z",
      "IJ28227s2a.200922.epkg.Z",
      "IJ28227s2b.200922.epkg.Z",
      "IJ28227s2c.200922.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.4.0-7.2.4.6"
    ],
    "issued": "20201119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar",
    "cvss": [
      "CVE-2020-4788:5.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.0",
      "3.1.1.10",
      "3.1.1.21",
      "3.1.1.25"
    ],
    "apAbstract": "IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9",
    "aparNo": "IJ28227",
    "aparNoSet": [
      "CVE-2020-4788",
      "IJ28227"
    ],
    "fixedIn": "3.1.1.40",
    "ifixes": [
      "IJ28227s0a.200922.epkg.Z",
      "IJ28227s1a.200922.epkg.Z",
      "IJ28227s2a.200922.epkg.Z",
      "IJ28227s2b.200922.epkg.Z",
      "IJ28227s2c.200922.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.4.0-7.2.4.6"
    ],
    "issued": "20201119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar",
    "cvss": [
      "CVE-2020-4788:5.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-03",
      "7200-03-04",
      "7200-03-05"
    ],
    "apAbstract": "IBM has released AIX iFixes in response to a vulnerability in IBM POWER9",
    "aparNo": "IJ28228",
    "aparNoSet": [
      "CVE-2020-4788",
      "IJ28228"
    ],
    "fixedIn": "7200-03-07",
    "ifixes": [
      "IJ28228s3a.200921.epkg.Z",
      "IJ28228s4a.200921.epkg.Z",
      "IJ28228s5a.200921.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.3.0-7.2.3.19"
    ],
    "issued": "20201119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar",
    "cvss": [
      "CVE-2020-4788:5.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.20",
      "3.1.0.30",
      "3.1.0.40"
    ],
    "apAbstract": "IBM has released VIOS iFixes in response to a vulnerability in IBM POWER9",
    "aparNo": "IJ28228",
    "aparNoSet": [
      "CVE-2020-4788",
      "IJ28228"
    ],
    "fixedIn": "3.1.0.60",
    "ifixes": [
      "IJ28228s3a.200921.epkg.Z",
      "IJ28228s4a.200921.epkg.Z",
      "IJ28228s5a.200921.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.3.0-7.2.3.19"
    ],
    "issued": "20201119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar",
    "cvss": [
      "CVE-2020-4788:5.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-05",
      "7100-05-06",
      "7100-05-07"
    ],
    "apAbstract": "IBM has released AIX iFixes in response to a vulnerability in IBM POWER9",
    "aparNo": "IJ28229",
    "aparNoSet": [
      "CVE-2020-4788",
      "IJ28229"
    ],
    "fixedIn": "7100-05-08",
    "ifixes": [
      "IJ28229s5a.200921.epkg.Z",
      "IJ28229s5b.200922.epkg.Z",
      "IJ28229s6a.200921.epkg.Z",
      "IJ28229s6b.200922.epkg.Z",
      "IJ28229s6c.200922.epkg.Z",
      "IJ28229s7a.201117.epkg.Z",
      "IJ28229s7b.201117.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.40"
    ],
    "issued": "20201119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/power9_fix.tar",
    "cvss": [
      "CVE-2020-4788:5.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-02-2016",
      "7200-04-02-2028"
    ],
    "apAbstract": "For Power9 Multiple issues seen while using NPIV adapters with VIOS",
    "aparNo": "IJ28565",
    "aparNoSet": [
      "IJ28565"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.2.4.0-7.2.4.3"
    ],
    "issued": "20210415",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/support/pages/node/6404772",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-02-2015",
      "7200-04-02-2016",
      "7200-04-02-2027",
      "7200-04-02-2028"
    ],
    "apAbstract": "Possible data loss using zlibNX library",
    "aparNo": "IJ28579",
    "aparNoSet": [
      "IJ28579"
    ],
    "fixedIn": "7.2 Exp 10/2020",
    "ifixes": [
      "IJ28579s0a.201006.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ28579",
    "filesets": [
      "zlibNX.rte:7.2.4.0-7.2.4.2"
    ],
    "issued": "20201009",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij28579/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-00-1731",
      "7100-05-01",
      "7100-05-02",
      "7100-05-02-1810",
      "7100-05-03",
      "7100-05-03-1838",
      "7100-05-03-1846",
      "7100-05-04",
      "7100-05-05",
      "7100-05-05-1939",
      "7100-05-06-2016",
      "7100-05-06-2028"
    ],
    "apAbstract": "For Power9 Multiple issues seen while using NPIV adapters with VIOS",
    "aparNo": "IJ28592",
    "aparNoSet": [
      "IJ28592"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.1.5.0-7.1.5.36"
    ],
    "issued": "20210415",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "See Bulletin",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-03-00",
      "7200-03-01",
      "7200-03-02",
      "7200-03-03",
      "7200-03-04",
      "7200-03-05"
    ],
    "apAbstract": "For Power9 Multiple issues seen while using NPIV adapters with VIOS",
    "aparNo": "IJ28596",
    "aparNoSet": [
      "IJ28596"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.2.3.0-7.2.3.18"
    ],
    "issued": "20210415",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/support/pages/node/6404772",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-05",
      "7100-05-06",
      "7100-05-07"
    ],
    "apAbstract": "Vulnerability in gencore affects AIX",
    "aparNo": "IJ28825",
    "aparNoSet": [
      "CVE-2020-4887",
      "IJ28825"
    ],
    "fixedIn": "7100-05-08",
    "ifixes": [
      "IJ28825m5a.201221.epkg.Z",
      "IJ28825m5b.201221.epkg.Z",
      "IJ28825m6a.201221.epkg.Z",
      "IJ28825m6b.201221.epkg.Z",
      "IJ28825m6c.201221.epkg.Z",
      "IJ28825m7a.201221.epkg.Z",
      "IJ28825m7b.201221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.40"
    ],
    "issued": "20210119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar",
    "cvss": [
      "CVE-2020-4887:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-03",
      "7200-03-04",
      "7200-03-05"
    ],
    "apAbstract": "Vulnerability in gencore affects AIX",
    "aparNo": "IJ28826",
    "aparNoSet": [
      "CVE-2020-4887",
      "IJ28826"
    ],
    "fixedIn": "7200-03-07",
    "ifixes": [
      "IJ28826m3a.201221.epkg.Z",
      "IJ28826m4a.201221.epkg.Z",
      "IJ28826m5a.201221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.3.0-7.2.3.19"
    ],
    "issued": "20210119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar",
    "cvss": [
      "CVE-2020-4887:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.20",
      "3.1.0.21",
      "3.1.0.30",
      "3.1.0.40"
    ],
    "apAbstract": "Vulnerability in gencore affects VIOS",
    "aparNo": "IJ28826",
    "aparNoSet": [
      "CVE-2020-4887",
      "IJ28826"
    ],
    "fixedIn": "3.1.0.60",
    "ifixes": [
      "IJ28826m3a.201221.epkg.Z",
      "IJ28826m4a.201221.epkg.Z",
      "IJ28826m5a.201221.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.3.0-7.2.3.19"
    ],
    "issued": "20210119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar",
    "cvss": [
      "CVE-2020-4887:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-02",
      "7200-04-03"
    ],
    "apAbstract": "Vulnerability in gencore affects AIX",
    "aparNo": "IJ28827",
    "aparNoSet": [
      "CVE-2020-4887",
      "IJ28827"
    ],
    "fixedIn": "7200-04-04",
    "ifixes": [
      "IJ28827m0a.201222.epkg.Z",
      "IJ28827m1a.201222.epkg.Z",
      "IJ28827m2a.201222.epkg.Z",
      "IJ28827m2b.201222.epkg.Z",
      "IJ28827m2c.201222.epkg.Z",
      "IJ28827m3a.210306.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.4.0-7.2.4.7"
    ],
    "issued": "20210119",
    "updated": "20210330",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar",
    "cvss": [
      "CVE-2020-4887:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.0",
      "3.1.1.10",
      "3.1.1.20",
      "3.1.1.21",
      "3.1.1.22",
      "3.1.1.25",
      "3.1.1.30"
    ],
    "apAbstract": "Vulnerability in gencore affects VIOS",
    "aparNo": "IJ28827",
    "aparNoSet": [
      "CVE-2020-4887",
      "IJ28827"
    ],
    "fixedIn": "3.1.1.40",
    "ifixes": [
      "IJ28827m0a.201222.epkg.Z",
      "IJ28827m1b.201222.epkg.Z",
      "IJ28827m2c.201222.epkg.Z",
      "IJ28827m2b.201222.epkg.Z",
      "IJ28827m2a.201222.epkg.Z",
      "IJ28827m3a.210306.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.4.0-7.2.4.7"
    ],
    "issued": "20210119",
    "updated": "20210330",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar",
    "cvss": [
      "CVE-2020-4887:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01"
    ],
    "apAbstract": "Vulnerability in gencore affects AIX",
    "aparNo": "IJ28828",
    "aparNoSet": [
      "CVE-2020-4887",
      "IJ28828"
    ],
    "fixedIn": "7200-05-02",
    "ifixes": [
      "IJ28828m1a.201222.epkg.Z",
      "IJ28828m1a.201222.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.1"
    ],
    "issued": "20210119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar",
    "cvss": [
      "CVE-2020-4887:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.0",
      "3.1.2.10"
    ],
    "apAbstract": "Vulnerability in gencore affects VIOS",
    "aparNo": "IJ28828",
    "aparNoSet": [
      "CVE-2020-4887",
      "IJ28828"
    ],
    "fixedIn": "3.1.2.20",
    "ifixes": [
      "IJ28828m1a.201222.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.1"
    ],
    "issued": "20210119",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/gencore_fix.tar",
    "cvss": [
      "CVE-2020-4887:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-03",
      "7200-03-04",
      "7200-03-05"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IJ29229",
    "aparNoSet": [
      "CVE-2020-8622",
      "IJ29229"
    ],
    "fixedIn": "7200-03-07",
    "ifixes": [
      "IJ29229m5a.201117.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16"
    ],
    "issued": "20201218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar",
    "cvss": [
      "CVE-2020-8622:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.20",
      "3.1.0.21",
      "3.1.0.30",
      "3.1.0.40"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact VIOS.",
    "aparNo": "IJ29229",
    "aparNoSet": [
      "CVE-2020-8622",
      "IJ29229"
    ],
    "fixedIn": "3.1.0.60",
    "ifixes": [
      "IJ29229m5a.201117.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.3.0-7.2.3.16"
    ],
    "issued": "20201218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar",
    "cvss": [
      "CVE-2020-8622:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-05",
      "7100-05-06",
      "7100-05-07"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IJ29230",
    "aparNoSet": [
      "CVE-2020-8622",
      "IJ29230"
    ],
    "fixedIn": "7100-05-08",
    "ifixes": [
      "IJ29230m7a.201117.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.36"
    ],
    "issued": "20201218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar",
    "cvss": [
      "CVE-2020-8622:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-02",
      "7200-04-03"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IJ29231",
    "aparNoSet": [
      "CVE-2020-8622",
      "IJ29231"
    ],
    "fixedIn": "7200-04-04",
    "ifixes": [
      "IJ29231m2a.201117.epkg.Z",
      "IJ29231s3a.210314.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.2"
    ],
    "issued": "20201218",
    "updated": "20210330",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar",
    "cvss": [
      "CVE-2020-8622:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.0",
      "3.1.1.10",
      "3.1.1.20",
      "3.1.1.21",
      "3.1.1.22",
      "3.1.1.25",
      "3.1.1.30"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact VIOS.",
    "aparNo": "IJ29231",
    "aparNoSet": [
      "CVE-2020-8622",
      "IJ29231"
    ],
    "fixedIn": "3.1.1.40",
    "ifixes": [
      "IJ29231m2a.201117.epkg.Z",
      "IJ29231s3a.210314.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.2"
    ],
    "issued": "20201218",
    "updated": "20210330",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar",
    "cvss": [
      "CVE-2020-8622:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IJ29232",
    "aparNoSet": [
      "CVE-2020-8622",
      "IJ29232"
    ],
    "fixedIn": "7200-05-02",
    "ifixes": [
      "IJ29232s1a.201117.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.1"
    ],
    "issued": "20201218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar",
    "cvss": [
      "CVE-2020-8622:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.0",
      "3.1.2.10"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact VIOS.",
    "aparNo": "IJ29232",
    "aparNoSet": [
      "CVE-2020-8622",
      "IJ29232"
    ],
    "fixedIn": "3.1.2.20",
    "ifixes": [
      "IJ29232s1a.201117.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory18.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.1"
    ],
    "issued": "20201218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix18.tar",
    "cvss": [
      "CVE-2020-8622:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-07-2037"
    ],
    "apAbstract": "Users unable to login with LAM authentication",
    "aparNo": "IJ29552",
    "aparNoSet": [
      "IJ29552"
    ],
    "fixedIn": "7100-05-08",
    "ifixes": [
      "IJ29552s7b.201209.AIX71TL05SP07.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6409904",
    "filesets": [
      "bos.rte.libc:7.1.5.35"
    ],
    "issued": "20210129",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij29552/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01-2038"
    ],
    "apAbstract": "Users unable to login with LAM authentication",
    "aparNo": "IJ29730",
    "aparNoSet": [
      "IJ29730"
    ],
    "fixedIn": "7200-05-02",
    "ifixes": [
      "IJ29730s1b.201209.AIX72TL05SP00-01.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6409904",
    "filesets": [
      "bos.rte.libc:7.2.5.0"
    ],
    "issued": "20210129",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij29730/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.2.0",
      "3.1.2.10"
    ],
    "apAbstract": "TAPE BACKUP OR RESTORE MAY FAIL OR BE SLOW WITH VIOS 3.1.2",
    "aparNo": "IJ30090",
    "aparNoSet": [
      "IJ30090"
    ],
    "fixedIn": "3.1.2.20",
    "ifixes": [
      "IJ30090s1a.201231.VIOS3.1.2.10.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/apar/IJ30090",
    "filesets": [
      "devices.vdevice.IBM.vfc-server.rte:7.2.5.0-7.2.5.1"
    ],
    "issued": "20210108",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij30090/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01"
    ],
    "apAbstract": "ksh failures on AIX 7.2 TL05",
    "aparNo": "IJ30108",
    "aparNoSet": [
      "IJ30108"
    ],
    "fixedIn": "7200-05-02",
    "ifixes": [
      "IJ30108s1a.210205.AIX72TL05SP00-01.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6412997",
    "filesets": [
      "bos.rte.shell:7.2.5.0"
    ],
    "issued": "20210206",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij30108/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-06",
      "7100-05-07"
    ],
    "apAbstract": "There is a vulnerability in the lpd daemon that affects AIX.",
    "aparNo": "IJ30372",
    "aparNoSet": [
      "CVE-2021-29693",
      "IJ30372"
    ],
    "fixedIn": "7100-05-08",
    "ifixes": [
      "IJ30372s5a.210210.epkg.Z",
      "IJ30372s5a.210210.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.1.5.0-7.1.5.32"
    ],
    "issued": "20210625",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar",
    "cvss": [
      "CVE-2021-29693:4.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01"
    ],
    "apAbstract": "There is a vulnerability in the lpd daemon that affects AIX.",
    "aparNo": "IJ30447",
    "aparNoSet": [
      "CVE-2021-29693",
      "IJ30447"
    ],
    "fixedIn": "7200-05-02",
    "ifixes": [
      "IJ30447s1a.210210.epkg.Z",
      "IJ30447s1a.210210.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.0"
    ],
    "issued": "20210625",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar",
    "cvss": [
      "CVE-2021-29693:4.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.0",
      "3.1.2.10"
    ],
    "apAbstract": "There is a vulnerability in the lpd daemon that affects VIOS.",
    "aparNo": "IJ30447",
    "aparNoSet": [
      "CVE-2021-29693",
      "IJ30447"
    ],
    "fixedIn": "3.1.2.20",
    "ifixes": [
      "IJ30447s1a.210210.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.0"
    ],
    "issued": "20210625",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar",
    "cvss": [
      "CVE-2021-29693:4.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01",
      "7200-05-02"
    ],
    "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects AIX",
    "aparNo": "IJ30557",
    "aparNoSet": [
      "CVE-2021-29741",
      "IJ30557"
    ],
    "fixedIn": "7200-05-03",
    "ifixes": [
      "IJ30557s2a.210427.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc",
    "filesets": [
      "bos.rte.shell:7.2.5.0-7.2.5.2"
    ],
    "issued": "20210730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar",
    "cvss": [
      "CVE-2021-29741:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.0",
      "3.1.2.10",
      "3.1.2.20",
      "3.1.2.21"
    ],
    "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects VIOS",
    "aparNo": "IJ30557",
    "aparNoSet": [
      "CVE-2021-29741",
      "IJ30557"
    ],
    "fixedIn": "7200-05-03",
    "ifixes": [
      "IJ30557s2a.210427.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc",
    "filesets": [
      "bos.rte.shell:7.2.5.0-7.2.5.2"
    ],
    "issued": "20210730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar",
    "cvss": [
      "CVE-2021-29741:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-05",
      "7200-03-06"
    ],
    "apAbstract": "There is a vulnerability in the lpd daemon that affects AIX.",
    "aparNo": "IJ30799",
    "aparNoSet": [
      "CVE-2021-29693",
      "IJ30799"
    ],
    "fixedIn": "7200-03-07",
    "ifixes": [
      "IJ30799s4a.210209.epkg.Z",
      "IJ30799s4a.210209.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.2.3.0-7.2.3.17"
    ],
    "issued": "20210625",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar",
    "cvss": [
      "CVE-2021-29693:4.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.40",
      "3.1.0.50"
    ],
    "apAbstract": "There is a vulnerability in the lpd daemon that affects VIOS.",
    "aparNo": "IJ30799",
    "aparNoSet": [
      "CVE-2021-29693",
      "IJ30799"
    ],
    "fixedIn": "3.1.0.60",
    "ifixes": [
      "IJ30799s4a.210209.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.2.3.0-7.2.3.17"
    ],
    "issued": "20210625",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar",
    "cvss": [
      "CVE-2021-29693:4.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-02",
      "7200-04-03"
    ],
    "apAbstract": "There is a vulnerability in the lpd daemon that affects AIX.",
    "aparNo": "IJ30800",
    "aparNoSet": [
      "CVE-2021-29693",
      "IJ30800"
    ],
    "fixedIn": "7200-04-04",
    "ifixes": [
      "IJ30799s4a.210209.epkg.Z",
      "IJ30799s4a.210209.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.2.4.0"
    ],
    "issued": "20210625",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar",
    "cvss": [
      "CVE-2021-29693:4.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.20",
      "3.1.1.21",
      "3.1.1.25",
      "3.1.1.30"
    ],
    "apAbstract": "There is a vulnerability in the lpd daemon that affects VIOS.",
    "aparNo": "IJ30800",
    "aparNoSet": [
      "CVE-2021-29693",
      "IJ30800"
    ],
    "fixedIn": "3.1.1.40",
    "ifixes": [
      "IJ30800s1a.210210.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.2.4.0"
    ],
    "issued": "20210625",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix.tar",
    "cvss": [
      "CVE-2021-29693:4.9"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01-2038"
    ],
    "apAbstract": "Multithreaded applications core dump or hang",
    "aparNo": "IJ30808",
    "aparNoSet": [
      "IJ30808"
    ],
    "fixedIn": "7200-05-02",
    "ifixes": [
      "IJ30808s1a.210212.AIX72TL05SP00-01.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6415421",
    "filesets": [
      "bos.rte.libpthreads:7.2.5.0"
    ],
    "issued": "20210213",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij30808/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01-2038",
      "7200-05-01-2039",
      "7200-05-02-2113"
    ],
    "apAbstract": "plain2crypt or crypt2plain on an active logical volume can cause potential undetected data corruption",
    "aparNo": "IJ30848",
    "aparNoSet": [
      "IJ30848"
    ],
    "fixedIn": "7200-05-02-2114",
    "ifixes": [
      "IJ30848s1a.210329.AIX72TL05SP01.epkg.Z",
      "IJ31743s2a.210406.AIX72TL05SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6441009",
    "filesets": [
      "bos.hdcrypt:7.2.5.0-7.2.5.1"
    ],
    "issued": "20210407",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij30848/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01-2038",
      "7200-05-01-2039"
    ],
    "apAbstract": "applications may fail unexpectedly with permission errors with setreuid",
    "aparNo": "IJ31049",
    "aparNoSet": [
      "IJ31049"
    ],
    "fixedIn": "7200-05-02",
    "ifixes": [
      "IJ31049m1a.210308.AIX72TL05SP01.epkg.Z",
      "IJ31049s1a.210308.AIX72TL05SP01.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6430903",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.1"
    ],
    "issued": "20210308",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij31049/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01-2038",
      "7200-05-01-2039"
    ],
    "apAbstract": "Multiple issues seen while using NPIV adapters with AIX",
    "aparNo": "IJ31191",
    "aparNoSet": [
      "IJ31191"
    ],
    "fixedIn": "7200-05-03",
    "ifixes": [
      "IJ31604m1b.210322.AIX72TL05SP01.epkg.Z",
      "IJ31604s2a.210414.AIX72TL05SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.2.5.1-7.2.5.3"
    ],
    "issued": "20210415",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij31191/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-02-2113",
      "7200-05-02-2114"
    ],
    "apAbstract": "Multiple issues seen while using NPIV adapters with AIX",
    "aparNo": "IJ31604",
    "aparNoSet": [
      "IJ31604"
    ],
    "fixedIn": "7200-05-03",
    "ifixes": [
      "IJ31604m1b.210322.AIX72TL05SP01.epkg.Z",
      "IJ31604s2a.210414.AIX72TL05SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.2.5.1-7.2.5.3"
    ],
    "issued": "20210415",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij31191/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-06",
      "7100-05-07",
      "7100-05-08"
    ],
    "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects AIX",
    "aparNo": "IJ31606",
    "aparNoSet": [
      "CVE-2021-29741",
      "IJ31606"
    ],
    "fixedIn": "7100-05-09",
    "ifixes": [
      "IJ31606s6a.210628.epkg.Z",
      "IJ31606s7a.210628.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc",
    "filesets": [
      "bos.rte.shell:7.1.5.0-7.1.5.36"
    ],
    "issued": "20210730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar",
    "cvss": [
      "CVE-2021-29741:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-02",
      "7200-04-03",
      "7200-04-04"
    ],
    "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects AIX",
    "aparNo": "IJ31614",
    "aparNoSet": [
      "CVE-2021-29741",
      "IJ31614"
    ],
    "fixedIn": "7200-04-05",
    "ifixes": [
      "IJ31614s1a.210427.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc",
    "filesets": [
      "bos.rte.shell:7.2.4.0-7.2.4.3"
    ],
    "issued": "20210730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar",
    "cvss": [
      "CVE-2021-29741:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.20",
      "3.1.1.21",
      "3.1.1.22",
      "3.1.1.25",
      "3.1.1.30",
      "3.1.1.40"
    ],
    "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects VIOS",
    "aparNo": "IJ31614",
    "aparNoSet": [
      "CVE-2021-29741",
      "IJ31614"
    ],
    "fixedIn": "7200-04-05",
    "ifixes": [
      "IJ31614s1a.210427.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc",
    "filesets": [
      "bos.rte.shell:7.2.4.0-7.2.4.3"
    ],
    "issued": "20210730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar",
    "cvss": [
      "CVE-2021-29741:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.2.0",
      "3.1.2.10",
      "3.1.2.20",
      "3.1.2.21"
    ],
    "apAbstract": "For Power9 Multiple issues seen while using NPIV adapters with VIOS",
    "aparNo": "IJ31936",
    "aparNoSet": [
      "IJ31936"
    ],
    "fixedIn": "3.1.2.30",
    "ifixes": [
      "IJ31936m1a.210409.VIOS3.1.2.10.epkg.Z",
      "IJ31936s2a.210414.VIOS3.1.2.21.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6443731",
    "filesets": [
      "devices.vdevice.IBM.vfc-server.rte:7.2.5.0-7.2.5.2"
    ],
    "issued": "20210415",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij31936/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-05",
      "7200-03-06",
      "7200-03-07"
    ],
    "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects AIX",
    "aparNo": "IJ32285",
    "aparNoSet": [
      "CVE-2021-29741",
      "IJ32285"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ32285s4a.210628.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc",
    "filesets": [
      "bos.rte.shell:7.2.3.0-7.2.3.20"
    ],
    "issued": "20210730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar",
    "cvss": [
      "CVE-2021-29741:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.40",
      "3.1.0.50",
      "3.1.0.60"
    ],
    "apAbstract": "There is a vulnerability in Korn Shell (ksh) that affects VIOS",
    "aparNo": "IJ32285",
    "aparNoSet": [
      "CVE-2021-29741",
      "IJ32285"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ32285s4a.210628.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_advisory.asc",
    "filesets": [
      "bos.rte.shell:7.2.3.0-7.2.3.20"
    ],
    "issued": "20210730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ksh_fix.tar",
    "cvss": [
      "CVE-2021-29741:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-05",
      "7200-03-06",
      "7200-03-07"
    ],
    "apAbstract": "There are multiple vulnerabilities in the AIX kernel",
    "aparNo": "IJ32629",
    "aparNoSet": [
      "CVE-2021-29727",
      "CVE-2021-29801",
      "CVE-2021-29862",
      "IJ32629"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ32629m5a.210805.epkg.Z",
      "IJ32629m6a.210805.epkg.Z",
      "IJ32629s7a.210805.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc",
    "filesets": [
      "bos.mp64:7.2.3.0-7.2.3.21"
    ],
    "issued": "20210825",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar",
    "cvss": [
      "CVE-2021-29727:6.2",
      "CVE-2021-29801:8.4",
      "CVE-2021-29862:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.40",
      "3.1.0.50",
      "3.1.0.60"
    ],
    "apAbstract": "There are multiple vulnerabilities in the AIX kernel for VIOS",
    "aparNo": "IJ32629",
    "aparNoSet": [
      "CVE-2021-29727",
      "CVE-2021-29801",
      "CVE-2021-29862",
      "IJ32629"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ32629m5a.210805.epkg.Z",
      "IJ32629m6a.210805.epkg.Z",
      "IJ32629s7a.210805.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc",
    "filesets": [
      "bos.mp64:7.2.3.0-7.2.3.21"
    ],
    "issued": "20210825",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar",
    "cvss": [
      "CVE-2021-29727:6.2",
      "CVE-2021-29801:8.4",
      "CVE-2021-29862:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-02",
      "7200-04-03",
      "7200-04-04"
    ],
    "apAbstract": "There are multiple vulnerabilities in the AIX kernel",
    "aparNo": "IJ32630",
    "aparNoSet": [
      "CVE-2021-29727",
      "CVE-2021-29801",
      "CVE-2021-29862",
      "IJ32630"
    ],
    "fixedIn": "7200-04-05",
    "ifixes": [
      "IJ32630m2e.210901.epkg.Z",
      "IJ32630m2f.210901.epkg.Z",
      "IJ32630m3b.210901.epkg.Z",
      "IJ32630s4a.210813.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc",
    "filesets": [
      "bos.mp64:7.2.4.0-7.2.4.8"
    ],
    "issued": "20210825",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar",
    "cvss": [
      "CVE-2021-29727:6.2",
      "CVE-2021-29801:8.4",
      "CVE-2021-29862:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.21",
      "3.1.1.25",
      "3.1.1.30",
      "3.1.1.40"
    ],
    "apAbstract": "There are multiple vulnerabilities in the AIX kernel for VIOS",
    "aparNo": "IJ32630",
    "aparNoSet": [
      "CVE-2021-29727",
      "CVE-2021-29801",
      "CVE-2021-29862",
      "IJ32630"
    ],
    "fixedIn": "3.1.1.50",
    "ifixes": [
      "IJ32630m2f.210901.epkg.Z",
      "IJ32630m2e.210901.epkg.Z",
      "IJ32630m3b.210901.epkg.Z",
      "IJ32630s4a.210813.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc",
    "filesets": [
      "bos.mp64:7.2.4.0-7.2.4.8"
    ],
    "issued": "20210825",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar",
    "cvss": [
      "CVE-2021-29727:6.2",
      "CVE-2021-29801:8.4",
      "CVE-2021-29862:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-02"
    ],
    "apAbstract": "There are multiple vulnerabilities in the AIX kernel",
    "aparNo": "IJ32631",
    "aparNoSet": [
      "CVE-2021-29727",
      "CVE-2021-29801",
      "CVE-2021-29862",
      "IJ32631"
    ],
    "fixedIn": "7200-05-03",
    "ifixes": [
      "IJ32631m1a.210805.epkg.Z",
      "IJ32631s2a.210805.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.3"
    ],
    "issued": "20210825",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar",
    "cvss": [
      "CVE-2021-29727:6.2",
      "CVE-2021-29801:8.4",
      "CVE-2021-29862:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "There are multiple vulnerabilities in the AIX kernel for VIOS",
    "aparNo": "IJ32631",
    "aparNoSet": [
      "CVE-2021-29727",
      "CVE-2021-29801",
      "CVE-2021-29862",
      "IJ32631"
    ],
    "fixedIn": "3.1.2.30",
    "ifixes": [
      "IJ32631m1a.210805.epkg.Z",
      "IJ32631s2a.210805.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.3"
    ],
    "issued": "20210825",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar",
    "cvss": [
      "CVE-2021-29727:6.2",
      "CVE-2021-29801:8.4",
      "CVE-2021-29862:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "Vulnerability in libc affects AIX",
    "aparNo": "IJ32714",
    "aparNoSet": [
      "CVE-2021-29860",
      "IJ32714"
    ],
    "fixedIn": "3.1.2.30",
    "ifixes": [
      "IJ34081m1a.211112.epkg.Z",
      "IJ34081m2b.211112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc",
    "filesets": [
      "bos.rte.libc:7.2.5.0-7.2.5.2"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ",
    "cvss": [
      "CVE-2021-29860:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-02"
    ],
    "apAbstract": "Vulnerability in libc affects AIX",
    "aparNo": "IJ32736",
    "aparNoSet": [
      "CVE-2021-29860",
      "IJ32736",
      "IJ34081"
    ],
    "fixedIn": "7.2.5.03-2135",
    "ifixes": [
      "IJ34081m1a.211112.epkg.Z",
      "IJ34081m2b.211112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc",
    "filesets": [
      "bos.rte.libc:7.2.5.0-7.2.5.2"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ",
    "cvss": [
      "CVE-2021-29860:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-06",
      "7100-05-07",
      "7100-05-08"
    ],
    "apAbstract": "There is a vulnerability in the AIX trace facility.",
    "aparNo": "IJ32940",
    "aparNoSet": [
      "CVE-2021-29706",
      "IJ32940"
    ],
    "fixedIn": "7100-05-09",
    "ifixes": [
      "IJ32940m6a.210615.epkg.Z",
      "IJ32940m6b.210615.epkg.Z",
      "IJ32940m7a.210615.epkg.Z",
      "IJ32940m7b.210615.epkg.Z",
      "IJ32940s8a.210615.epkg.Z",
      "IJ32940s8b.210615.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/trace_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.42"
    ],
    "issued": "20210615",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/trace_fix.tar",
    "cvss": [
      "CVE-2021-29706:6.8"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-06",
      "7100-05-07",
      "7100-05-08"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX.",
    "aparNo": "IJ33276",
    "aparNoSet": [
      "CVE-2021-25215",
      "IJ33276"
    ],
    "fixedIn": "7100-05-09",
    "ifixes": [
      "IJ33276s8a.210622.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.5.0-7.1.5.34"
    ],
    "issued": "20210729",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar",
    "cvss": [
      "CVE-2021-25215:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-03-05",
      "7200-03-06",
      "7200-03-07"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX.",
    "aparNo": "IJ33277",
    "aparNoSet": [
      "CVE-2021-25215",
      "IJ33277"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ33277s7a.210622.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.3.0-7.2.3.15"
    ],
    "issued": "20210729",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar",
    "cvss": [
      "CVE-2021-25215:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.40",
      "3.1.0.50",
      "3.1.0.60"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects VIOS.",
    "aparNo": "IJ33277",
    "aparNoSet": [
      "CVE-2021-25215",
      "IJ33277"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ33277s7a.210622.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.3.0-7.2.3.15"
    ],
    "issued": "20210729",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar",
    "cvss": [
      "CVE-2021-25215:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-02",
      "7200-04-03",
      "7200-04-04"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX.",
    "aparNo": "IJ33278",
    "aparNoSet": [
      "CVE-2021-25215",
      "IJ33278"
    ],
    "fixedIn": "7200-04-05",
    "ifixes": [
      "IJ33278s4a.210622.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.4.0"
    ],
    "issued": "20210729",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar",
    "cvss": [
      "CVE-2021-25215:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.20",
      "3.1.1.21",
      "3.1.1.22",
      "3.1.1.25",
      "3.1.1.30",
      "3.1.1.40"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects VIOS.",
    "aparNo": "IJ33278",
    "aparNoSet": [
      "CVE-2021-25215",
      "IJ33278"
    ],
    "fixedIn": "3.1.1.50",
    "ifixes": [
      "IJ33278s4a.210622.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.4.0"
    ],
    "issued": "20210729",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar",
    "cvss": [
      "CVE-2021-25215:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01",
      "7200-05-02"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX.",
    "aparNo": "IJ33279",
    "aparNoSet": [
      "CVE-2021-25215",
      "IJ33279"
    ],
    "fixedIn": "7200-05-03",
    "ifixes": [
      "IJ33279s2a.210621.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.0-7.2.5.1"
    ],
    "issued": "20210729",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar",
    "cvss": [
      "CVE-2021-25215:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.0",
      "3.1.2.10",
      "3.1.2.20",
      "3.1.2.21"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects VIOS.",
    "aparNo": "IJ33279",
    "aparNoSet": [
      "CVE-2021-25215",
      "IJ33279"
    ],
    "fixedIn": "3.1.2.30",
    "ifixes": [
      "IJ33279s2a.210621.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory19.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.0-7.2.5.1"
    ],
    "issued": "20210729",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix19.tar",
    "cvss": [
      "CVE-2021-25215:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-06",
      "7100-05-07",
      "7100-05-08"
    ],
    "apAbstract": "There are multiple vulnerabilities in the AIX kernel",
    "aparNo": "IJ33318",
    "aparNoSet": [
      "CVE-2021-29727",
      "CVE-2021-29801",
      "CVE-2021-29862",
      "IJ33318"
    ],
    "fixedIn": "7100-05-09",
    "ifixes": [
      "IJ33318m6a.210816.epkg.Z",
      "IJ33318m7a.210813.epkg.Z",
      "IJ33318m8a.210813.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory2.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.42"
    ],
    "issued": "20210825",
    "updated": "20210901",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix2.tar",
    "cvss": [
      "CVE-2021-29727:6.2",
      "CVE-2021-29801:8.4",
      "CVE-2021-29862:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09",
      "7100-05-10",
      "7100-05-11"
    ],
    "apAbstract": "Vulnerability in libc affects AIX",
    "aparNo": "IJ33560",
    "aparNoSet": [
      "CVE-2021-29860",
      "IJ33560",
      "IJ35673"
    ],
    "fixedIn": "7100-05-12",
    "ifixes": [
      "IJ33560m7b.211112.epkg.Z",
      "IJ33560m8b.211112.epkg.Z",
      "IJ35673s9a.211115.epkg.Z",
      "IJ35673sAa.221206.epkg.Z",
      "IJ35673sBa.230314.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc",
    "filesets": [
      "bos.rte.libc:7.1.5.0-7.1.5.39"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ",
    "cvss": [
      "CVE-2021-29860:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-04-00",
      "7200-04-01",
      "7200-04-02-2016",
      "7200-04-02-2028",
      "7200-04-03",
      "7200-04-04-2114"
    ],
    "apAbstract": "Applications can terminate on systems with active IPv6 traffic",
    "aparNo": "IJ34301",
    "aparNoSet": [
      "IJ34301"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ34301s1a.210808.AIX72TL04SP00-01.epkg.Z",
      "IJ34301s2a.210807.AIX72TL04SP02.epkg.Z",
      "IJ34301s3a.210809.AIX72TL04SP03.epkg.Z",
      "IJ34301s4a.210811.AIX72TL04SP04.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6480733",
    "filesets": [
      "bos.net.tcp.client_core:7.2.4.0-7.2.4.3"
    ],
    "issued": "20210819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij34301/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-03-00",
      "7200-03-01",
      "7200-03-02",
      "7200-03-03",
      "7200-03-04",
      "7200-03-05",
      "7200-03-06",
      "7200-03-07",
      "7200-03-07-2114"
    ],
    "apAbstract": "Applications can terminate on systems with active IPv6 traffic",
    "aparNo": "IJ34340",
    "aparNoSet": [
      "IJ34340"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ34340s3a.210810.AIX72TL03SP03.epkg.Z",
      "IJ34340s7a.210811.AIX72TL03SP07.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6480733",
    "filesets": [
      "bos.net.tcp.client_core:7.2.3.0-7.2.3.21"
    ],
    "issued": "20210819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij34340/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-00",
      "7100-05-00-1731",
      "7100-05-01",
      "7100-05-02",
      "7100-05-02-1810",
      "7100-05-03",
      "7100-05-03-1838",
      "7100-05-03-1846",
      "7100-05-04",
      "7100-05-05",
      "7100-05-05-1939",
      "7100-05-06-2016",
      "7100-05-06-2028",
      "7100-05-07",
      "7100-05-08"
    ],
    "apAbstract": "Applications can terminate on systems with active IPv6 traffic",
    "aparNo": "IJ34375",
    "aparNoSet": [
      "IJ34375"
    ],
    "fixedIn": "7100-05-09-2136",
    "ifixes": [
      "IJ34375s8a.210813.AIX71TL05SP08.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6480733",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.37"
    ],
    "issued": "20210819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij34375/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01-2038",
      "7200-05-01-2039",
      "7200-05-02",
      "7200-05-02-2114"
    ],
    "apAbstract": "Applications can terminate on systems with active IPv6 traffic",
    "aparNo": "IJ34376",
    "aparNoSet": [
      "IJ34376"
    ],
    "fixedIn": "7200-05-03-2136",
    "ifixes": [
      "IJ34376s2a.210813.AIX72TL05SP02-2114.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6480733",
    "filesets": [
      "bos.net.tcp.client_core:7.2.5.0-7.2.5.4"
    ],
    "issued": "20210819",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij34376/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-02",
      "7200-04-03",
      "7200-04-04"
    ],
    "apAbstract": "Vulnerability in libc affects AIX",
    "aparNo": "IJ34512",
    "aparNoSet": [
      "CVE-2021-29860",
      "IJ34512",
      "IJ35675"
    ],
    "fixedIn": "7200-04-05",
    "ifixes": [
      "IJ34512m2a.211112.epkg.Z",
      "IJ34512m3a.211112.epkg.Z",
      "IJ34512m4a.211112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc",
    "filesets": [
      "bos.rte.libc:7.2.4.0-7.2.4.3"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ",
    "cvss": [
      "CVE-2021-29860:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10"
    ],
    "apAbstract": "Vulnerability in EFS affects AIX",
    "aparNo": "IJ35078",
    "aparNoSet": [
      "CVE-2021-29861",
      "IJ35078"
    ],
    "fixedIn": "3.1.3.14",
    "ifixes": [
      "IJ35078s3a.211026.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.5.100-7.2.5.100"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ",
    "cvss": [
      "CVE-2021-29861:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-02",
      "7200-05-03"
    ],
    "apAbstract": "Vulnerability in EFS affects AIX",
    "aparNo": "IJ35078",
    "aparNoSet": [
      "CVE-2021-29861",
      "IJ35078",
      "IJ35211"
    ],
    "fixedIn": "7.2.5.03-2147",
    "ifixes": [
      "IJ35078s3a.211026.epkg.Z",
      "IJ35211m1a.211110.epkg.Z",
      "IJ35211m2a.211103.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.5.0-7.2.5.1",
      "bos.rte.security:7.2.5.100-7.2.5.100"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ",
    "cvss": [
      "CVE-2021-29861:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01-2038",
      "7200-05-01-2039",
      "7200-05-02",
      "7200-05-02-2114",
      "7200-05-03-2135",
      "7200-05-03-2136",
      "7200-05-03-2147",
      "7200-05-03-2148"
    ],
    "apAbstract": "Encrypted logical volumes unable to mount",
    "aparNo": "IJ35178",
    "aparNoSet": [
      "IJ35178"
    ],
    "fixedIn": "7200-05-04-2219",
    "ifixes": [
      "IJ35178m3b.211209.AIX72TL05SP03-2136.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6494777",
    "filesets": [
      "bos.hdcrypt:7.2.5.0-7.2.5.102"
    ],
    "issued": "20211111",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij35178/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "Vulnerability in EFS affects AIX",
    "aparNo": "IJ35211",
    "aparNoSet": [
      "CVE-2021-29861",
      "IJ35211"
    ],
    "fixedIn": "3.1.2.30",
    "ifixes": [
      "IJ35211m1a.211110.epkg.Z",
      "IJ35211m2a.211103.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.5.0-7.2.5.1"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ",
    "cvss": [
      "CVE-2021-29861:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.21",
      "3.1.1.25",
      "3.1.1.30",
      "3.1.1.40"
    ],
    "apAbstract": "Vulnerability in EFS affects AIX",
    "aparNo": "IJ35226",
    "aparNoSet": [
      "CVE-2021-29861",
      "IJ35226"
    ],
    "fixedIn": "3.1.1.50",
    "ifixes": [
      "IJ35226m2a.211103.epkg.Z",
      "IJ35226m3a.211103.epkg.Z",
      "IJ35226m4a.211103.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.4.0-7.2.4.3"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ",
    "cvss": [
      "CVE-2021-29861:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-02",
      "7200-04-03",
      "7200-04-04"
    ],
    "apAbstract": "Vulnerability in EFS affects AIX",
    "aparNo": "IJ35226",
    "aparNoSet": [
      "CVE-2021-29861",
      "IJ35226"
    ],
    "fixedIn": "7200-04-05",
    "ifixes": [
      "IJ35226m2a.211103.epkg.Z",
      "IJ35226m3a.211103.epkg.Z",
      "IJ35226m4a.211103.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.4.0-7.2.4.3"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ",
    "cvss": [
      "CVE-2021-29861:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.40",
      "3.1.0.50",
      "3.1.0.60"
    ],
    "apAbstract": "Vulnerability in EFS affects AIX",
    "aparNo": "IJ35505",
    "aparNoSet": [
      "CVE-2021-29861",
      "IJ35505"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ35505m5a.211103.epkg.Z",
      "IJ35505m6a.211103.epkg.Z",
      "IJ35505m7a.211103.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc",
    "filesets": [],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ",
    "cvss": [
      "CVE-2021-29861:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-09-2135",
      "7100-05-09-2136"
    ],
    "apAbstract": "Etherchannel failure with CAA and LACP",
    "aparNo": "IJ35577",
    "aparNoSet": [
      "IJ35577"
    ],
    "fixedIn": "7100-05-09-2148",
    "ifixes": [
      "IJ35577s9a.211015.AIX71TL05SP09-213x.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6507119",
    "filesets": [
      "bos.cluster.rte:7.1.5.37"
    ],
    "issued": "20211022",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij35577/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-03-2135",
      "7200-05-03-2136"
    ],
    "apAbstract": "Etherchannel failure with CAA and LACP",
    "aparNo": "IJ35588",
    "aparNoSet": [
      "IJ35588"
    ],
    "fixedIn": "7200-05-03-2147",
    "ifixes": [
      "IJ35588s3a.211015.AIX72TL05SP03-213x.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6507119",
    "filesets": [
      "bos.cluster.rte:7.2.5.100"
    ],
    "issued": "20211022",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij35588/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.3.0",
      "3.1.3.10"
    ],
    "apAbstract": "Etherchannel failure with CAA and LACP on VIOS",
    "aparNo": "IJ35588",
    "aparNoSet": [
      "IJ35588"
    ],
    "fixedIn": "3.1.3.13",
    "ifixes": [
      "IJ35588s3a.211015.VIOS3.1.3.0.epkg.Z",
      "IJ35588s3a.211015.VIOS3.1.3.10.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6507119",
    "filesets": [
      "bos.cluster.rte:7.2.5.100"
    ],
    "issued": "20211022",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij35588/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09-2136"
    ],
    "apAbstract": "There is a vulnerability in the mount command that affects AIX.",
    "aparNo": "IJ35620",
    "aparNoSet": [
      "CVE-2021-38990",
      "IJ35620"
    ],
    "fixedIn": "7100-05-09-2148",
    "ifixes": [
      "IJ35620s9a.211130.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc",
    "filesets": [
      "bos.rte.filesystem:7.1.5.0-7.1.5.36"
    ],
    "issued": "20220106",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar",
    "cvss": [
      "CVE-2021-38990:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-01-2038",
      "7200-05-01-2039",
      "7200-05-02",
      "7200-05-02-2114",
      "7200-05-03-2135",
      "7200-05-03-2136"
    ],
    "apAbstract": "There is a vulnerability in the mount command that affects AIX.",
    "aparNo": "IJ35623",
    "aparNoSet": [
      "CVE-2021-38990",
      "IJ35623",
      "IJ36125"
    ],
    "fixedIn": "7200-05-03-2147",
    "ifixes": [
      "IJ36125s2a.211130.epkg.Z",
      "IJ35623s3a.211130.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc",
    "filesets": [
      "bos.rte.filesystem:7.2.5.0-7.2.5.1",
      "bos.rte.filesystem:7.2.5.100"
    ],
    "issued": "20220106",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar",
    "cvss": [
      "CVE-2021-38990:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10"
    ],
    "apAbstract": "There is a vulnerability in the mount command that affects VIOS.",
    "aparNo": "IJ35623",
    "aparNoSet": [
      "CVE-2021-38990",
      "IJ35623"
    ],
    "fixedIn": "3.1.3.13",
    "ifixes": [
      "IJ35623s3a.211130.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc",
    "filesets": [
      "bos.rte.filesystem:7.2.5.100"
    ],
    "issued": "20220106",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar",
    "cvss": [
      "CVE-2021-38990:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.0.40",
      "3.1.0.50",
      "3.1.0.60"
    ],
    "apAbstract": "Vulnerability in libc affects AIX",
    "aparNo": "IJ35674",
    "aparNoSet": [
      "CVE-2021-29860",
      "IJ35674"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ35681m5a.211112.epkg.Z",
      "IJ35681m6a.211112.epkg.Z",
      "IJ35681m7a.211112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc",
    "filesets": [],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ",
    "cvss": [
      "CVE-2021-29860:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.21",
      "3.1.1.25",
      "3.1.1.30",
      "3.1.1.40"
    ],
    "apAbstract": "Vulnerability in libc affects AIX",
    "aparNo": "IJ35675",
    "aparNoSet": [
      "CVE-2021-29860",
      "IJ35675"
    ],
    "fixedIn": "3.1.1.50",
    "ifixes": [
      "IJ34512m2a.211112.epkg.Z",
      "IJ34512m3a.211112.epkg.Z",
      "IJ34512m4a.211112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_advisory2.asc",
    "filesets": [
      "bos.rte.libc:7.2.4.0-7.2.4.3"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libc_fix2.tar ",
    "cvss": [
      "CVE-2021-29860:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09",
      "7100-05-10",
      "7100-05-11"
    ],
    "apAbstract": "Vulnerability in EFS affects AIX",
    "aparNo": "IJ35780",
    "aparNoSet": [
      "CVE-2021-29861",
      "IJ35780"
    ],
    "fixedIn": "7100-05-12",
    "ifixes": [
      "IJ35780m7a.211103.epkg.Z",
      "IJ35780m8a.211103.epkg.Z",
      "IJ35780m9a.211103.epkg.Z",
      "IJ35780mBa.230314.epkg.Z",
      "IJ35780sAa.221206.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_advisory.asc",
    "filesets": [
      "bos.rte.security:7.1.5.0-7.1.5.39"
    ],
    "issued": "20211116",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/efs_fix.tar ",
    "cvss": [
      "CVE-2021-29861:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-02",
      "7200-04-02-2016",
      "7200-04-02-2028",
      "7200-04-03",
      "7200-04-04"
    ],
    "apAbstract": "There is a vulnerability in the mount command that affects AIX.",
    "aparNo": "IJ35826",
    "aparNoSet": [
      "CVE-2021-38990",
      "IJ35826"
    ],
    "fixedIn": "7200-04-05",
    "ifixes": [
      "IJ35826s2a.211130.epkg.Z",
      "IJ35826s4a.211130.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc",
    "filesets": [
      "bos.rte.filesystem:7.2.4.0-7.2.4.2"
    ],
    "issued": "20220106",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar",
    "cvss": [
      "CVE-2021-38990:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.21",
      "3.1.1.25",
      "3.1.1.30",
      "3.1.1.40"
    ],
    "apAbstract": "There is a vulnerability in the mount command that affects VIOS.",
    "aparNo": "IJ35826",
    "aparNoSet": [
      "CVE-2021-38990",
      "IJ35826"
    ],
    "fixedIn": "3.1.1.50",
    "ifixes": [
      "IJ35826s2a.211130.epkg.Z",
      "IJ35826s4a.211130.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc",
    "filesets": [
      "bos.rte.filesystem:7.2.4.0-7.2.4.2"
    ],
    "issued": "20220106",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar",
    "cvss": [
      "CVE-2021-38990:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "There is a vulnerability in the mount command that affects VIOS.",
    "aparNo": "IJ36125",
    "aparNoSet": [
      "CVE-2021-38990",
      "IJ36125"
    ],
    "fixedIn": "3.1.2.30",
    "ifixes": [
      "IJ36125s2a.211130.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_advisory.asc",
    "filesets": [
      "bos.rte.filesystem:7.2.5.0-7.2.5.1"
    ],
    "issued": "20220106",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mount_fix.tar",
    "cvss": [
      "CVE-2021-38990:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01"
    ],
    "apAbstract": "There is a vulnerability in the AIX nimsh daemon.",
    "aparNo": "IJ36593",
    "aparNoSet": [
      "CVE-2022-22351",
      "IJ36593"
    ],
    "fixedIn": "7300-00-02",
    "ifixes": [
      "DEPRECATED::IJ36593s1a.220208.epkg.Z",
      "IJ36593m1a.220324.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.3.0.0"
    ],
    "issued": "20220304",
    "updated": "20220324",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar",
    "cvss": [
      "CVE-2022-22351:6.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01"
    ],
    "apAbstract": "Vulnerabilities in AIX CAA",
    "aparNo": "IJ36596",
    "aparNoSet": [
      "CVE-2021-38996",
      "CVE-2022-22350",
      "IJ36596"
    ],
    "fixedIn": "7300-00-02",
    "ifixes": [
      "IJ36596s1a.220228.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc",
    "filesets": [
      "bos.cluster.rte:7.3.0.0-7.3.0.0"
    ],
    "issued": "20220301",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar",
    "cvss": [
      "CVE-2022-22350:6.2",
      "CVE-2021-38996:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "There is a vulnerability in the AIX nimsh daemon for VIOS.",
    "aparNo": "IJ36681",
    "aparNoSet": [
      "CVE-2022-22351",
      "IJ36681",
      "IJ37706"
    ],
    "fixedIn": "3.1.2.40",
    "ifixes": [
      "DEPRECATED::IJ37706s2a.220208.epkg.Z",
      "IJ37706m2a.220324.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.2.5.0-7.2.5.1",
      "bos.sysmgt.nim.client:7.2.5.100"
    ],
    "issued": "20220304",
    "updated": "20220324",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar",
    "cvss": [
      "CVE-2022-22351:6.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14"
    ],
    "apAbstract": "There is a vulnerability in the AIX nimsh daemon for VIOS.",
    "aparNo": "IJ36681",
    "aparNoSet": [
      "CVE-2022-22351",
      "IJ36681",
      "IJ37706"
    ],
    "fixedIn": "3.1.3.20",
    "ifixes": [
      "DEPRECATED::IJ36681s3a.220208.epkg.Z",
      "IJ36681m3a.220324.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.2.5.0-7.2.5.1",
      "bos.sysmgt.nim.client:7.2.5.100"
    ],
    "issued": "20220304",
    "updated": "20220324",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar",
    "cvss": [
      "CVE-2022-22351:6.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-01-2038",
      "7200-05-01-2039",
      "7200-05-02",
      "7200-05-02-2114",
      "7200-05-03-2135",
      "7200-05-03-2136",
      "7200-05-03-2148"
    ],
    "apAbstract": "There is a vulnerability in the AIX nimsh daemon.",
    "aparNo": "IJ36681",
    "aparNoSet": [
      "CVE-2022-22351",
      "IJ36681",
      "IJ37706"
    ],
    "fixedIn": "7200-05-04",
    "ifixes": [
      "DEPRECATED::IJ37706s2a.220208.epkg.Z",
      "DEPRECATED::IJ36681s3a.220208.epkg.Z",
      "IJ37706m2a.220324.epkg.Z",
      "IJ36681m3a.220324.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.2.5.0-7.2.5.1",
      "bos.sysmgt.nim.client:7.2.5.100"
    ],
    "issued": "20220304",
    "updated": "20220324",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar",
    "cvss": [
      "CVE-2022-22351:6.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "Vulnerabilities in AIX CAA",
    "aparNo": "IJ36682",
    "aparNoSet": [
      "CVE-2021-38996",
      "CVE-2022-22350",
      "IJ35657",
      "IJ36682",
      "IJ37512"
    ],
    "fixedIn": "3.1.2.40",
    "ifixes": [
      "IJ37512s1a.220228.epkg.Z",
      "IJ37512s2a.220228.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc",
    "filesets": [
      "bos.cluster.rte:7.2.5.0-7.2.5.1"
    ],
    "issued": "20220301",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar",
    "cvss": [
      "CVE-2022-22350:6.2",
      "CVE-2021-38996:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14"
    ],
    "apAbstract": "Vulnerabilities in AIX CAA",
    "aparNo": "IJ36682",
    "aparNoSet": [
      "CVE-2021-38996",
      "CVE-2022-22350",
      "IJ35657",
      "IJ36682",
      "IJ37512"
    ],
    "fixedIn": "3.1.3.20",
    "ifixes": [
      "IJ36682s3a.220228.epkg.Z",
      "IJ36682s3b.220228.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc",
    "filesets": [
      "bos.cluster.rte:7.2.5.100-7.2.5.101"
    ],
    "issued": "20220301",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar",
    "cvss": [
      "CVE-2022-22350:6.2",
      "CVE-2021-38996:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-02",
      "7200-05-03"
    ],
    "apAbstract": "Vulnerabilities in AIX CAA",
    "aparNo": "IJ36682",
    "aparNoSet": [
      "CVE-2021-38996",
      "CVE-2022-22350",
      "IJ35657",
      "IJ36682",
      "IJ37512"
    ],
    "fixedIn": "7200-05-04",
    "ifixes": [
      "IJ36682s3a.220228.epkg.Z",
      "IJ36682s3b.220228.epkg.Z",
      "IJ37512s1a.220228.epkg.Z",
      "IJ37512s2a.220228.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc",
    "filesets": [
      "bos.cluster.rte:7.2.5.0-7.2.5.1",
      "bos.cluster.rte:7.2.5.100-7.2.5.101"
    ],
    "issued": "20220301",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar",
    "cvss": [
      "CVE-2022-22350:6.2",
      "CVE-2021-38996:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09-2136",
      "7100-05-09-2148"
    ],
    "apAbstract": "There is a vulnerability in the lscore command that affects AIX.",
    "aparNo": "IJ36805",
    "aparNoSet": [
      "CVE-2021-38991",
      "IJ36805"
    ],
    "fixedIn": "7100-05-10",
    "ifixes": [
      "IJ36805s9a.211217.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc",
    "filesets": [
      "bos.rte.security:7.1.5.0-7.1.5.37"
    ],
    "issued": "20220110",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar",
    "cvss": [
      "CVE-2021-38991:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-02",
      "7200-04-02-2016",
      "7200-04-02-2028",
      "7200-04-03",
      "7200-04-04"
    ],
    "apAbstract": "There is a vulnerability in the lscore command that affects AIX.",
    "aparNo": "IJ36806",
    "aparNoSet": [
      "CVE-2021-38991",
      "IJ36806"
    ],
    "fixedIn": "7200-04-06",
    "ifixes": [
      "IJ36806s2a.211217.epkg.Z",
      "IJ36806s4a.211217.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.4.0-7.2.4.3"
    ],
    "issued": "20220110",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar",
    "cvss": [
      "CVE-2021-38991:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.21",
      "3.1.1.25",
      "3.1.1.30",
      "3.1.1.40"
    ],
    "apAbstract": "There is a vulnerability in the lscore command that affects VIOS.",
    "aparNo": "IJ36806",
    "aparNoSet": [
      "CVE-2021-38991",
      "IJ36806"
    ],
    "fixedIn": "3.1.1.60",
    "ifixes": [
      "IJ36806s2a.211217.epkg.Z",
      "IJ36806s4a.211217.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.4.0-7.2.4.3"
    ],
    "issued": "20220110",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar",
    "cvss": [
      "CVE-2021-38991:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-01-2038",
      "7200-05-01-2039",
      "7200-05-02",
      "7200-05-02-2114",
      "7200-05-03-2135",
      "7200-05-03-2136"
    ],
    "apAbstract": "There is a vulnerability in the lscore command that affects AIX.",
    "aparNo": "IJ36810",
    "aparNoSet": [
      "CVE-2021-38991",
      "IJ36810",
      "IJ36815"
    ],
    "fixedIn": "7200-05-04",
    "ifixes": [
      "IJ36815s2a.211217.epkg.Z",
      "IJ36810s3a.211217.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.5.0-7.2.5.1",
      "bos.rte.security:7.2.5.100-7.2.5.101"
    ],
    "issued": "20220110",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar",
    "cvss": [
      "CVE-2021-38991:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14"
    ],
    "apAbstract": "There is a vulnerability in the lscore command that affects VIOS.",
    "aparNo": "IJ36810",
    "aparNoSet": [
      "CVE-2021-38991",
      "IJ36810"
    ],
    "fixedIn": "3.1.3.20",
    "ifixes": [
      "IJ36810s3a.211217.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.5.100-7.2.5.101"
    ],
    "issued": "20220110",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar",
    "cvss": [
      "CVE-2021-38991:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "There is a vulnerability in the lscore command that affects VIOS.",
    "aparNo": "IJ36815",
    "aparNoSet": [
      "CVE-2021-38991",
      "IJ36815"
    ],
    "fixedIn": "3.1.2.40",
    "ifixes": [
      "IJ36815s2a.211217.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.5.0-7.2.5.1"
    ],
    "issued": "20220110",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar",
    "cvss": [
      "CVE-2021-38991:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01"
    ],
    "apAbstract": "There is a vulnerability in the lscore command that affects AIX.",
    "aparNo": "IJ36816",
    "aparNoSet": [
      "CVE-2021-38991",
      "IJ36816"
    ],
    "fixedIn": "7300-00-02",
    "ifixes": [
      "IJ36816s1a.211217.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_advisory.asc",
    "filesets": [
      "bos.rte.security:7.3.0.0"
    ],
    "issued": "20220110",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lscore_fix.tar",
    "cvss": [
      "CVE-2021-38991:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01"
    ],
    "apAbstract": "Vulnerabilities in the AIX kernel",
    "aparNo": "IJ37001",
    "aparNoSet": [
      "CVE-2021-38994",
      "CVE-2021-38995",
      "IJ37001"
    ],
    "fixedIn": "7300-00-02",
    "ifixes": [
      "IJ37001m1a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc",
    "filesets": [
      "bos.mp64:7.3.0.0-7.3.0.1"
    ],
    "issued": "20220223",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar",
    "cvss": [
      "CVE-2021-38994:6.2",
      "CVE-2021-38995:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "Vulnerabilities in the AIX kernel",
    "aparNo": "IJ37012",
    "aparNoSet": [
      "CVE-2021-38994",
      "CVE-2021-38995",
      "IJ37012",
      "IJ37053",
      "IJ37776"
    ],
    "fixedIn": "3.1.2.40",
    "ifixes": [
      "IJ37776m1a.220215.epkg.Z",
      "IJ37776m2a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.3"
    ],
    "issued": "20220223",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar",
    "cvss": [
      "CVE-2021-38994:6.2",
      "CVE-2021-38995:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14"
    ],
    "apAbstract": "Vulnerabilities in the AIX kernel",
    "aparNo": "IJ37012",
    "aparNoSet": [
      "CVE-2021-38994",
      "CVE-2021-38995",
      "IJ37012",
      "IJ37053",
      "IJ37776"
    ],
    "fixedIn": "3.1.3.20",
    "ifixes": [
      "IJ37012m3a.220215.epkg.Z",
      "IJ37012m3b.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc",
    "filesets": [
      "bos.mp64:7.2.5.100-7.2.5.103"
    ],
    "issued": "20220223",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar",
    "cvss": [
      "CVE-2021-38994:6.2",
      "CVE-2021-38995:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-02",
      "7200-05-03"
    ],
    "apAbstract": "Vulnerabilities in the AIX kernel",
    "aparNo": "IJ37012",
    "aparNoSet": [
      "CVE-2021-38994",
      "CVE-2021-38995",
      "IJ37012",
      "IJ37053",
      "IJ37776"
    ],
    "fixedIn": "7200-05-04",
    "ifixes": [
      "IJ37012m3a.220215.epkg.Z",
      "IJ37012m3b.220215.epkg.Z",
      "IJ37776m1a.220215.epkg.Z",
      "IJ37776m2a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.3",
      "bos.mp64:7.2.5.100-7.2.5.103"
    ],
    "issued": "20220223",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar",
    "cvss": [
      "CVE-2021-38994:6.2",
      "CVE-2021-38995:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09-2136",
      "7100-05-09-2148"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX.",
    "aparNo": "IJ37222",
    "aparNoSet": [
      "CVE-2021-25219",
      "IJ37222"
    ],
    "fixedIn": "7100-05-10",
    "ifixes": [
      "DEPRECATED::IJ37222s9a.220120.epkg.Z",
      "IJ37222m9c.220315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.5.0-7.1.5.35",
      "bos.net.tcp.client:7.1.5.0-7.1.5.40"
    ],
    "issued": "20220301",
    "updated": "20220316",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar",
    "cvss": [
      "CVE-2021-25219:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX for VIOS.",
    "aparNo": "IJ37223",
    "aparNoSet": [
      "CVE-2021-25219",
      "IJ37223",
      "IJ37224",
      "IJ37325"
    ],
    "fixedIn": "3.1.2.40",
    "ifixes": [
      "DEPRECATED::IJ37224s3a.220120.epkg.Z",
      "IJ37224m3c.220315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.0-7.2.5.1",
      "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2",
      "bos.net.tcp.bind:7.2.5.100",
      "bos.net.tcp.bind_utils:7.2.5.100"
    ],
    "issued": "20220301",
    "updated": "20220316",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar",
    "cvss": [
      "CVE-2021-25219:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX for VIOS.",
    "aparNo": "IJ37223",
    "aparNoSet": [
      "CVE-2021-25219",
      "IJ37223",
      "IJ37224",
      "IJ37325"
    ],
    "fixedIn": "3.1.2.40",
    "ifixes": [
      "DEPRECATED::IJ37224s3a.220120.epkg.Z",
      "IJ37224m3c.220315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.0-7.2.5.1",
      "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2",
      "bos.net.tcp.bind:7.2.5.100",
      "bos.net.tcp.bind_utils:7.2.5.100"
    ],
    "issued": "20220301",
    "updated": "20220316",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar",
    "cvss": [
      "CVE-2021-25219:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-01-2038",
      "7200-05-01-2039",
      "7200-05-02",
      "7200-05-02-2114",
      "7200-05-03-2135",
      "7200-05-03-2136",
      "7200-05-03-2148"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX.",
    "aparNo": "IJ37223",
    "aparNoSet": [
      "CVE-2021-25219",
      "IJ37223",
      "IJ37224",
      "IJ37325"
    ],
    "fixedIn": "7200-05-04",
    "ifixes": [
      "DEPRECATED::IJ37224s3a.220120.epkg.Z",
      "IJ37224m3c.220315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.0-7.2.5.1",
      "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2",
      "bos.net.tcp.bind:7.2.5.100",
      "bos.net.tcp.bind_utils:7.2.5.100"
    ],
    "issued": "20220301",
    "updated": "20220316",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar",
    "cvss": [
      "CVE-2021-25219:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.30",
      "3.1.1.40",
      "3.1.1.50"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX for VIOS.",
    "aparNo": "IJ37225",
    "aparNoSet": [
      "CVE-2021-25219",
      "IJ37225"
    ],
    "fixedIn": "3.1.1.60",
    "ifixes": [
      "DEPRECATED::IJ37225s5a.220223.epkg.Z",
      "IJ37225m5c.220315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.4.0-7.2.4.1",
      "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3"
    ],
    "issued": "20220301",
    "updated": "20220316",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar",
    "cvss": [
      "CVE-2021-25219:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-03",
      "7200-04-04",
      "7200-04-05"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX.",
    "aparNo": "IJ37225",
    "aparNoSet": [
      "CVE-2021-25219",
      "IJ37225"
    ],
    "fixedIn": "7200-04-06",
    "ifixes": [
      "DEPRECATED::IJ37225s5a.220223.epkg.Z",
      "IJ37225m5c.220315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.4.0-7.2.4.1",
      "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3"
    ],
    "issued": "20220301",
    "updated": "20220316",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar",
    "cvss": [
      "CVE-2021-25219:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01"
    ],
    "apAbstract": "There is a vulnerability in BIND that affects AIX.",
    "aparNo": "IJ37226",
    "aparNoSet": [
      "CVE-2021-25219",
      "IJ37226"
    ],
    "fixedIn": "7300-00-02",
    "ifixes": [
      "DEPRECATED::IJ37226s1a.220120.epkg.Z",
      "IJ37226s1b.220315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory20.asc",
    "filesets": [
      "bos.net.tcp.bind:7.3.0.0",
      "bos.net.tcp.bind:7.3.0.0"
    ],
    "issued": "20220301",
    "updated": "20220316",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix20.tar",
    "cvss": [
      "CVE-2021-25219:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09"
    ],
    "apAbstract": "Vulnerabilities in AIX CAA",
    "aparNo": "IJ37355",
    "aparNoSet": [
      "CVE-2021-38996",
      "CVE-2022-22350",
      "IJ37355"
    ],
    "fixedIn": "7100-05-10",
    "ifixes": [
      "IJ37355s7a.220228.epkg.Z",
      "IJ37355s8a.220228.epkg.Z",
      "IJ37355s9a.220228.epkg.Z",
      "IJ37355s9b.220228.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc",
    "filesets": [
      "bos.cluster.rte:7.1.5.0-7.1.5.38"
    ],
    "issued": "20220301",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar",
    "cvss": [
      "CVE-2022-22350:6.2",
      "CVE-2021-38996:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01"
    ],
    "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension.",
    "aparNo": "IJ37403",
    "aparNoSet": [
      "CVE-2021-38988",
      "IJ37403"
    ],
    "fixedIn": "7300-00-02",
    "ifixes": [
      "IJ37504s5a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc",
    "filesets": [
      "bos.pfcdd.rte:7.3.0.0"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar",
    "cvss": [
      "CVE-2021-38988:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01"
    ],
    "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension.",
    "aparNo": "IJ37411",
    "aparNoSet": [
      "CVE-2021-38989",
      "IJ37411"
    ],
    "fixedIn": "7300-00-02",
    "ifixes": [
      "IJ37411s1a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.3.0.0"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar",
    "cvss": [
      "CVE-2021-38989:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09-2136",
      "7100-05-09-2148"
    ],
    "apAbstract": "There is a vulnerability in the AIX nimsh daemon.",
    "aparNo": "IJ37419",
    "aparNoSet": [
      "CVE-2022-22351",
      "IJ37419"
    ],
    "fixedIn": "7100-05-10",
    "ifixes": [
      "DEPRECATED::IJ37419s9a.220208.epkg.Z",
      "IJ37419m9a.220324.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.1.5.0-7.1.5.37"
    ],
    "issued": "20220304",
    "updated": "20220324",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar",
    "cvss": [
      "CVE-2022-22351:6.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09"
    ],
    "apAbstract": "Vulnerabilities in the AIX kernel",
    "aparNo": "IJ37452",
    "aparNoSet": [
      "CVE-2021-38994",
      "CVE-2021-38995",
      "IJ37452"
    ],
    "fixedIn": "7100-05-10",
    "ifixes": [
      "IJ37452m7a.220215.epkg.Z",
      "IJ37452m8a.220215.epkg.Z",
      "IJ37452s9a.220215.epkg.Z",
      "IJ37452s9b.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.45"
    ],
    "issued": "20220223",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar",
    "cvss": [
      "CVE-2021-38994:6.2",
      "CVE-2021-38995:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.",
    "aparNo": "IJ37488",
    "aparNoSet": [
      "CVE-2021-38989",
      "IJ37488",
      "IJ37778"
    ],
    "fixedIn": "3.1.2.40",
    "ifixes": [
      "IJ37778s1a.220215.epkg.Z",
      "IJ37778s2a.220215.epkg.Z",
      "IJ37488s3a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1",
      "bos.pmapi.pmsvcs:7.2.5.100"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar",
    "cvss": [
      "CVE-2021-38989:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14"
    ],
    "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.",
    "aparNo": "IJ37488",
    "aparNoSet": [
      "CVE-2021-38989",
      "IJ37488",
      "IJ37778"
    ],
    "fixedIn": "3.1.3.20",
    "ifixes": [
      "IJ37778s1a.220215.epkg.Z",
      "IJ37778s2a.220215.epkg.Z",
      "IJ37488s3a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1",
      "bos.pmapi.pmsvcs:7.2.5.100"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar",
    "cvss": [
      "CVE-2021-38989:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-01-2038",
      "7200-05-01-2039",
      "7200-05-02",
      "7200-05-02-2114",
      "7200-05-03-2135",
      "7200-05-03-2136",
      "7200-05-03-2148"
    ],
    "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension.",
    "aparNo": "IJ37488",
    "aparNoSet": [
      "CVE-2021-38989",
      "IJ37488",
      "IJ37778"
    ],
    "fixedIn": "7200-05-04",
    "ifixes": [
      "IJ37778s1a.220215.epkg.Z",
      "IJ37778s2a.220215.epkg.Z",
      "IJ37488s3a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.2.5.0-7.2.5.1",
      "bos.pmapi.pmsvcs:7.2.5.100"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar",
    "cvss": [
      "CVE-2021-38989:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14"
    ],
    "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension for VIOS.",
    "aparNo": "IJ37494",
    "aparNoSet": [
      "CVE-2021-38988",
      "IJ37494",
      "IJ37779"
    ],
    "fixedIn": "3.1.3.20",
    "ifixes": [
      "IJ37494s3a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc",
    "filesets": [
      "bos.pfcdd.rte:7.2.5.0"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar",
    "cvss": [
      "CVE-2021-38988:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-01-2038",
      "7200-05-01-2039",
      "7200-05-02",
      "7200-05-02-2114",
      "7200-05-03-2135",
      "7200-05-03-2136",
      "7200-05-03-2148"
    ],
    "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension.",
    "aparNo": "IJ37494",
    "aparNoSet": [
      "CVE-2021-38988",
      "IJ37494",
      "IJ37779"
    ],
    "fixedIn": "7200-05-04",
    "ifixes": [
      "IJ37494s3a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc",
    "filesets": [
      "bos.pfcdd.rte:7.2.5.0"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar",
    "cvss": [
      "CVE-2021-38988:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.30",
      "3.1.1.40",
      "3.1.1.50"
    ],
    "apAbstract": "Vulnerabilities in AIX CAA",
    "aparNo": "IJ37496",
    "aparNoSet": [
      "CVE-2021-38996",
      "CVE-2022-22350",
      "IJ37496"
    ],
    "fixedIn": "3.1.1.60",
    "ifixes": [
      "IJ37496s3a.220228.epkg.Z",
      "IJ37496s4a.220228.epkg.Z",
      "IJ37496s5a.220228.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc",
    "filesets": [
      "bos.cluster.rte:7.2.4.0-7.2.4.4"
    ],
    "issued": "20220301",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar",
    "cvss": [
      "CVE-2022-22350:6.2",
      "CVE-2021-38996:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-03",
      "7200-04-04",
      "7200-04-05"
    ],
    "apAbstract": "Vulnerabilities in AIX CAA",
    "aparNo": "IJ37496",
    "aparNoSet": [
      "CVE-2021-38996",
      "CVE-2022-22350",
      "IJ37496"
    ],
    "fixedIn": "7200-04-06",
    "ifixes": [
      "IJ37496s3a.220228.epkg.Z",
      "IJ37496s4a.220228.epkg.Z",
      "IJ37496s5a.220228.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_advisory2.asc",
    "filesets": [
      "bos.cluster.rte:7.2.4.0-7.2.4.4"
    ],
    "issued": "20220301",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/caa_fix2.tar",
    "cvss": [
      "CVE-2022-22350:6.2",
      "CVE-2021-38996:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.30",
      "3.1.1.40",
      "3.1.1.50"
    ],
    "apAbstract": "Vulnerabilities in the AIX kernel",
    "aparNo": "IJ37501",
    "aparNoSet": [
      "CVE-2021-38994",
      "CVE-2021-38995",
      "IJ37501"
    ],
    "fixedIn": "3.1.1.60",
    "ifixes": [
      "IJ37501m3a.220215.epkg.Z",
      "IJ37501m4a.220215.epkg.Z",
      "IJ37501m5a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc",
    "filesets": [
      "bos.mp64:7.2.4.0-7.2.4.9"
    ],
    "issued": "20220223",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar",
    "cvss": [
      "CVE-2021-38994:6.2",
      "CVE-2021-38995:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-03",
      "7200-04-04",
      "7200-04-05"
    ],
    "apAbstract": "Vulnerabilities in the AIX kernel",
    "aparNo": "IJ37501",
    "aparNoSet": [
      "CVE-2021-38994",
      "CVE-2021-38995",
      "IJ37501"
    ],
    "fixedIn": "7200-04-06",
    "ifixes": [
      "IJ37501m3a.220215.epkg.Z",
      "IJ37501m4a.220215.epkg.Z",
      "IJ37501m5a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory3.asc",
    "filesets": [
      "bos.mp64:7.2.4.0-7.2.4.9"
    ],
    "issued": "20220223",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix3.tar",
    "cvss": [
      "CVE-2021-38994:6.2",
      "CVE-2021-38995:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.30",
      "3.1.1.40",
      "3.1.1.50"
    ],
    "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension for VIOS.",
    "aparNo": "IJ37503",
    "aparNoSet": [
      "CVE-2021-38989",
      "IJ37503"
    ],
    "fixedIn": "3.1.1.60",
    "ifixes": [
      "IJ37503s3a.220215.epkg.Z",
      "IJ37503s4a.220215.epkg.Z",
      "IJ37503s5a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.2.4.0-7.2.4.4"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar",
    "cvss": [
      "CVE-2021-38989:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-03",
      "7200-04-04",
      "7200-04-05"
    ],
    "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension.",
    "aparNo": "IJ37503",
    "aparNoSet": [
      "CVE-2021-38989",
      "IJ37503"
    ],
    "fixedIn": "7200-04-06",
    "ifixes": [
      "IJ37503s3a.220215.epkg.Z",
      "IJ37503s4a.220215.epkg.Z",
      "IJ37503s5a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.2.4.0-7.2.4.4"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar",
    "cvss": [
      "CVE-2021-38989:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.30",
      "3.1.1.40",
      "3.1.1.50"
    ],
    "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension for VIOS.",
    "aparNo": "IJ37504",
    "aparNoSet": [
      "CVE-2021-38988",
      "IJ37504"
    ],
    "fixedIn": "3.1.1.60",
    "ifixes": [
      "IJ37504s5a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc",
    "filesets": [
      "bos.pfcdd.rte:7.2.4.0"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar",
    "cvss": [
      "CVE-2021-38988:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-03",
      "7200-04-04",
      "7200-04-05"
    ],
    "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension.",
    "aparNo": "IJ37504",
    "aparNoSet": [
      "CVE-2021-38988",
      "IJ37504"
    ],
    "fixedIn": "7200-04-06",
    "ifixes": [
      "IJ37504s5a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc",
    "filesets": [
      "bos.pfcdd.rte:7.2.4.0"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar",
    "cvss": [
      "CVE-2021-38988:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09-2136",
      "7100-05-09-2148"
    ],
    "apAbstract": "There is a vulnerability in the AIX pmsvcs kernel extension.",
    "aparNo": "IJ37507",
    "aparNoSet": [
      "CVE-2021-38989",
      "IJ37507"
    ],
    "fixedIn": "7100-05-10",
    "ifixes": [
      "IJ37507s7a.220215.epkg.Z",
      "IJ37507s9a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_advisory.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.1.5.0-7.1.5.36"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pmsvcs_fix.tar",
    "cvss": [
      "CVE-2021-38989:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09-2136",
      "7100-05-09-2148"
    ],
    "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension.",
    "aparNo": "IJ37508",
    "aparNoSet": [
      "CVE-2021-38988",
      "IJ37508"
    ],
    "fixedIn": "7100-05-10",
    "ifixes": [
      "IJ37508s9a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc",
    "filesets": [
      "bos.pfcdd.rte:7.1.5.0-7.1.5.32"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar",
    "cvss": [
      "CVE-2021-38988:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.30",
      "3.1.1.40",
      "3.1.1.50"
    ],
    "apAbstract": "There is a vulnerability in the AIX nimsh daemon for VIOS.",
    "aparNo": "IJ37705",
    "aparNoSet": [
      "CVE-2022-22351",
      "IJ37705"
    ],
    "fixedIn": "3.1.1.60",
    "ifixes": [
      "DEPRECATED::IJ37705s4a.220208.epkg.Z",
      "DEPRECATED::IJ37705s5a.220208.epkg.Z",
      "IJ37705m4a.220324.epkg.Z",
      "IJ37705m5a.220324.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.2.4.0-7.2.4.4"
    ],
    "issued": "20220304",
    "updated": "20220324",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar",
    "cvss": [
      "CVE-2022-22351:6.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-03",
      "7200-04-04",
      "7200-04-05"
    ],
    "apAbstract": "There is a vulnerability in the AIX nimsh daemon.",
    "aparNo": "IJ37705",
    "aparNoSet": [
      "CVE-2022-22351",
      "IJ37705"
    ],
    "fixedIn": "7200-04-06",
    "ifixes": [
      "DEPRECATED::IJ37705s4a.220208.epkg.Z",
      "DEPRECATED::IJ37705s5a.220208.epkg.Z",
      "IJ37705m4a.220324.epkg.Z",
      "IJ37705m5a.220324.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.2.4.0-7.2.4.4"
    ],
    "issued": "20220304",
    "updated": "20220324",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nimsh_fix.tar",
    "cvss": [
      "CVE-2022-22351:6.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "There is a vulnerability in the AIX pfcdd kernel extension for VIOS.",
    "aparNo": "IJ37779",
    "aparNoSet": [
      "CVE-2021-38988",
      "IJ37494",
      "IJ37779"
    ],
    "fixedIn": "3.1.2.40",
    "ifixes": [
      "IJ37494s3a.220215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_advisory.asc",
    "filesets": [
      "bos.pfcdd.rte:7.2.5.0"
    ],
    "issued": "20220304",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pfcdd_fix.tar",
    "cvss": [
      "CVE-2021-38988:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09-2136",
      "7100-05-09-2148"
    ],
    "apAbstract": "There is a vulnerability in the AIX audit user commands.",
    "aparNo": "IJ38113",
    "aparNoSet": [
      "CVE-2021-38955",
      "IJ38113"
    ],
    "fixedIn": "7100-05-10",
    "ifixes": [
      "IJ38113m9a.220227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc",
    "filesets": [
      "bos.rte.security:7.1.5.0-7.1.5.37"
    ],
    "issued": "20220228",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar",
    "cvss": [
      "CVE-2021-38955:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.30",
      "3.1.1.40",
      "3.1.1.50"
    ],
    "apAbstract": "There is a vulnerability in the AIX audit user commands for VIOS.",
    "aparNo": "IJ38115",
    "aparNoSet": [
      "CVE-2021-38955",
      "IJ38115"
    ],
    "fixedIn": "3.1.1.60",
    "ifixes": [
      "IJ38115m5a.220227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.4.0-7.2.4.4"
    ],
    "issued": "20220228",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar",
    "cvss": [
      "CVE-2021-38955:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-03",
      "7200-04-04",
      "7200-04-05"
    ],
    "apAbstract": "There is a vulnerability in the AIX audit user commands.",
    "aparNo": "IJ38115",
    "aparNoSet": [
      "CVE-2021-38955",
      "IJ38115"
    ],
    "fixedIn": "7200-04-06",
    "ifixes": [
      "IJ38115m5a.220227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.4.0-7.2.4.4"
    ],
    "issued": "20220228",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar",
    "cvss": [
      "CVE-2021-38955:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "There is a vulnerability in the AIX audit user commands.",
    "aparNo": "IJ38117",
    "aparNoSet": [
      "CVE-2021-38955",
      "IJ38117",
      "IJ38119"
    ],
    "fixedIn": "3.1.2.40",
    "ifixes": [
      "IJ38119m2a.220227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.5.0-7.2.5.2"
    ],
    "issued": "20220228",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar",
    "cvss": [
      "CVE-2021-38955:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-01-2038",
      "7200-05-01-2039",
      "7200-05-02",
      "7200-05-02-2114",
      "7200-05-03-2135",
      "7200-05-03-2136",
      "7200-05-03-2148"
    ],
    "apAbstract": "There is a vulnerability in the AIX audit user commands.",
    "aparNo": "IJ38117",
    "aparNoSet": [
      "CVE-2021-38955",
      "IJ38117",
      "IJ38119"
    ],
    "fixedIn": "7200-05-04",
    "ifixes": [
      "IJ38119m2a.220227.epkg.Z",
      "IJ38117m3a.220227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.5.0-7.2.5.2",
      "bos.rte.security:7.2.5.100-7.2.5.101"
    ],
    "issued": "20220228",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar",
    "cvss": [
      "CVE-2021-38955:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14"
    ],
    "apAbstract": "There is a vulnerability in the AIX audit user commands.",
    "aparNo": "IJ38119",
    "aparNoSet": [
      "CVE-2021-38955",
      "IJ38117",
      "IJ38119"
    ],
    "fixedIn": "3.1.3.20",
    "ifixes": [
      "IJ38117m3a.220227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc",
    "filesets": [
      "bos.rte.security:7.2.5.100-7.2.5.101"
    ],
    "issued": "20220228",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar",
    "cvss": [
      "CVE-2021-38955:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01"
    ],
    "apAbstract": "There is a vulnerability in the AIX audit user commands.",
    "aparNo": "IJ38121",
    "aparNoSet": [
      "CVE-2021-38955",
      "IJ38121"
    ],
    "fixedIn": "7300-00-02",
    "ifixes": [
      "IJ38121m1a.220227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_advisory.asc",
    "filesets": [
      "bos.rte.security:7.3.0.0"
    ],
    "issued": "20220228",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/audit_fix.tar",
    "cvss": [
      "CVE-2021-38955:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-00-00",
      "7300-00-01",
      "7300-00-01-2148"
    ],
    "apAbstract": "AIX 7.3 changed some performance tuning commands default output",
    "aparNo": "IJ38518",
    "aparNoSet": [
      "IJ38518"
    ],
    "fixedIn": "7300-00-02",
    "ifixes": [
      "IJ38518s1b.220314.AIX73TL00SP00-01.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6563017",
    "filesets": [
      "bos.perf.tune:7.3.0.0"
    ],
    "issued": "20220323",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij38518/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09",
      "7100-05-10"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ39868",
    "aparNoSet": [
      "CVE-2022-22444",
      "IJ39868",
      "IJ44552"
    ],
    "fixedIn": "7100-05-11",
    "ifixes": [
      "IJ39868s9a.220506.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc",
    "filesets": [
      "bos.rte.printers:7.1.5.0-7.1.5.33"
    ],
    "issued": "20220615",
    "updated": "20220913",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar",
    "cvss": [
      "CVE-2022-22444:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.30",
      "3.1.1.40",
      "3.1.1.50"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ39875",
    "aparNoSet": [
      "CVE-2022-22444",
      "IJ39875"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ39875s5a.220506.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc",
    "filesets": [
      "bos.rte.printers:7.2.4.0-7.2.4.1"
    ],
    "issued": "20220615",
    "updated": "20220913",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar",
    "cvss": [
      "CVE-2022-22444:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-03",
      "7200-04-04",
      "7200-04-05",
      "7200-04-06"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ39875",
    "aparNoSet": [
      "CVE-2022-22444",
      "IJ39875"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ39875s5a.220506.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc",
    "filesets": [
      "bos.rte.printers:7.2.4.0-7.2.4.1"
    ],
    "issued": "20220615",
    "updated": "20220913",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar",
    "cvss": [
      "CVE-2022-22444:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ39876",
    "aparNoSet": [
      "CVE-2022-22444",
      "IJ39876",
      "IJ39878",
      "IJ42162",
      "IJ44559",
      "IJ44615"
    ],
    "fixedIn": "3.1.2.50",
    "ifixes": [
      "IJ39878s2a.220506.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.0-7.2.5.1"
    ],
    "issued": "20220615",
    "updated": "20220913",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar",
    "cvss": [
      "CVE-2022-22444:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ39876",
    "aparNoSet": [
      "CVE-2022-22444",
      "IJ39876",
      "IJ39878",
      "IJ42162",
      "IJ44559",
      "IJ44615"
    ],
    "fixedIn": "3.1.3.30",
    "ifixes": [
      "IJ39876s3a.220506.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.100-7.2.5.100"
    ],
    "issued": "20220615",
    "updated": "20220913",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar",
    "cvss": [
      "CVE-2022-22444:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-01",
      "7200-05-02",
      "7200-05-03",
      "7200-05-04"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ39876",
    "aparNoSet": [
      "CVE-2022-22444",
      "IJ39876",
      "IJ39878",
      "IJ42162",
      "IJ44559",
      "IJ44615"
    ],
    "fixedIn": "7200-05-05",
    "ifixes": [
      "IJ39876s3a.220506.epkg.Z",
      "IJ39878s2a.220506.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.0-7.2.5.1",
      "bos.rte.printers:7.2.5.100-7.2.5.100"
    ],
    "issued": "20220615",
    "updated": "20220913",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar",
    "cvss": [
      "CVE-2022-22444:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ39877",
    "aparNoSet": [
      "CVE-2022-22444",
      "IJ39877",
      "IJ42800",
      "IJ44562"
    ],
    "fixedIn": "7300-00-03",
    "ifixes": [
      "IJ39877s1a.220506.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory2.asc",
    "filesets": [
      "bos.rte.printers:7.3.0.0-7.3.0.0"
    ],
    "issued": "20220615",
    "updated": "20220913",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix2.tar",
    "cvss": [
      "CVE-2022-22444:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02"
    ],
    "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND",
    "aparNo": "IJ40614",
    "aparNoSet": [
      "CVE-2021-25220",
      "IJ40614"
    ],
    "fixedIn": "7300-00-03",
    "ifixes": [
      "IJ40614m2b.220718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.3.0.0-7.3.0.1"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar",
    "cvss": [
      "CVE-2021-25220:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-02",
      "7200-05-02-2114",
      "7200-05-03-2135",
      "7200-05-03-2136",
      "7200-05-03-2148",
      "7200-05-04"
    ],
    "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND",
    "aparNo": "IJ40615",
    "aparNoSet": [
      "CVE-2021-25220",
      "IJ40615",
      "IJ40674"
    ],
    "fixedIn": "7200-05-05",
    "ifixes": [
      "IJ40615m4b.220718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.0-7.2.5.1",
      "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2",
      "bos.net.tcp.bind:7.2.5.100-7.2.5.101",
      "bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar",
    "cvss": [
      "CVE-2021-25220:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21",
      "3.1.2.30"
    ],
    "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND",
    "aparNo": "IJ40616",
    "aparNoSet": [
      "CVE-2021-25220",
      "IJ40615",
      "IJ40616",
      "IJ40674",
      "IJ41139"
    ],
    "fixedIn": "3.1.2.40",
    "ifixes": [
      "IJ40615m4b.220718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.0-7.2.5.1",
      "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2",
      "bos.net.tcp.bind:7.2.5.100-7.2.5.101",
      "bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar",
    "cvss": [
      "CVE-2021-25220:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND",
    "aparNo": "IJ40616",
    "aparNoSet": [
      "CVE-2021-25220",
      "IJ40615",
      "IJ40616",
      "IJ40674",
      "IJ41139"
    ],
    "fixedIn": "3.1.3.30",
    "ifixes": [
      "IJ40615m4b.220718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.0-7.2.5.1",
      "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.2",
      "bos.net.tcp.bind:7.2.5.100-7.2.5.101",
      "bos.net.tcp.bind_utils:7.2.5.100-7.2.5.101"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar",
    "cvss": [
      "CVE-2021-25220:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.30",
      "3.1.1.40",
      "3.1.1.50"
    ],
    "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND",
    "aparNo": "IJ40616",
    "aparNoSet": [
      "CVE-2021-25220",
      "IJ40615",
      "IJ40616",
      "IJ41139"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ40616m5b.220718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.4.0-7.2.4.1",
      "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar",
    "cvss": [
      "CVE-2021-25220:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-03",
      "7200-04-04",
      "7200-04-05"
    ],
    "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND",
    "aparNo": "IJ40616",
    "aparNoSet": [
      "CVE-2021-25220",
      "IJ40616"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ40616m5b.220718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.4.0-7.2.4.1",
      "bos.net.tcp.bind_utils:7.2.4.0-7.2.4.3"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar",
    "cvss": [
      "CVE-2021-25220:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-07",
      "7100-05-08",
      "7100-05-09-2136",
      "7100-05-09-2148"
    ],
    "apAbstract": "AIX is vulnerable to cache poisoning due to ISC BIND",
    "aparNo": "IJ40617",
    "aparNoSet": [
      "CVE-2021-25220",
      "IJ40617"
    ],
    "fixedIn": "7100-05-11",
    "ifixes": [
      "IJ40617m9b.220718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory21.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.5.0-7.1.5.35",
      "bos.net.tcp.client:7.1.5.0-7.1.5.40"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix21.tar",
    "cvss": [
      "CVE-2021-25220:6.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.10",
      "3.1.2.21",
      "3.1.2.30"
    ],
    "apAbstract": "IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service",
    "aparNo": "IJ40951",
    "aparNoSet": [
      "CVE-2022-35643",
      "IJ40951"
    ],
    "fixedIn": "3.1.2.50",
    "ifixes": [
      "IJ40951s1a.220711.epkg.Z",
      "IJ40951s2a.220711.epkg.Z",
      "IJ40951s3a.220711.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc",
    "filesets": [
      "devices.vtdev.scsi.rte:7.2.5.0-7.2.5.3"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar",
    "cvss": [
      "CVE-2022-35643:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service",
    "aparNo": "IJ40952",
    "aparNoSet": [
      "CVE-2022-35643",
      "IJ40952"
    ],
    "fixedIn": "3.1.3.30",
    "ifixes": [
      "IJ40952s3b.220712.epkg.Z",
      "IJ40952s3a.220712.epkg.Z",
      "IJ40952s4a.220712.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc",
    "filesets": [
      "devices.vtdev.scsi.rte:7.2.5.100",
      "devices.vtdev.scsi.rte:7.2.5.102"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar",
    "cvss": [
      "CVE-2022-35643:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.30",
      "3.1.1.40",
      "3.1.1.50"
    ],
    "apAbstract": "IBM PowerVM VIOS could allow a remote attacker to tamper with system configuration or cause a denial of service",
    "aparNo": "IJ40954",
    "aparNoSet": [
      "CVE-2022-35643",
      "IJ40954"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ40954s3a.220711.epkg.Z",
      "IJ40954s4a.220711.epkg.Z",
      "IJ40954s5a.220711.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_advisory.asc",
    "filesets": [
      "devices.vtdev.scsi.rte:7.2.4.0-7.2.4.4"
    ],
    "issued": "20220728",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/vios_fix.tar",
    "cvss": [
      "CVE-2022-35643:9.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-02",
      "7200-05-03",
      "7200-05-04"
    ],
    "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability",
    "aparNo": "IJ41396",
    "aparNoSet": [
      "CVE-2022-34356",
      "IJ41396",
      "IJ41685",
      "IJ41795"
    ],
    "fixedIn": "7200-05-05",
    "ifixes": [
      "IJ41685m3a.220810.epkg.Z",
      "IJ41685m3b.220812.epkg.Z",
      "IJ41685s4a.220809.epkg.Z",
      "IJ41795m2a.220812.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.5",
      "bos.mp64:7.2.5.100-7.2.5.105"
    ],
    "issued": "20220912",
    "updated": "20221010",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar",
    "cvss": [
      "CVE-2022-34356:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40"
    ],
    "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability",
    "aparNo": "IJ41685",
    "aparNoSet": [
      "CVE-2022-34356",
      "IJ41396",
      "IJ41685",
      "IJ41795"
    ],
    "fixedIn": "3.1.2.50",
    "ifixes": [
      "IJ41795m2a.220812.epkg.Z",
      "IJ41795m3a.221010.epkg.Z",
      "IJ41795s4a.221010.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.5"
    ],
    "issued": "20220912",
    "updated": "20221010",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar",
    "cvss": [
      "CVE-2022-34356:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability",
    "aparNo": "IJ41685",
    "aparNoSet": [
      "CVE-2022-34356",
      "IJ41396",
      "IJ41685",
      "IJ41795"
    ],
    "fixedIn": "3.1.3.30",
    "ifixes": [
      "IJ41685m3a.220810.epkg.Z",
      "IJ41685m3b.220812.epkg.Z",
      "IJ41685s4a.220809.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc",
    "filesets": [
      "bos.mp64:7.2.5.100-7.2.5.105"
    ],
    "issued": "20220912",
    "updated": "20221010",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar",
    "cvss": [
      "CVE-2022-34356:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02"
    ],
    "apAbstract": "AIX kernel is vulnerable to a privilege escalation vulnerability",
    "aparNo": "IJ41687",
    "aparNoSet": [
      "CVE-2022-34356",
      "IJ41687"
    ],
    "fixedIn": "7300-00-03",
    "ifixes": [
      "IJ41687m1a.220810.epkg.Z",
      "IJ41687s2a.220809.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc",
    "filesets": [
      "bos.mp64:7.3.0.0-7.3.0.3"
    ],
    "issued": "20220912",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar",
    "cvss": [
      "CVE-2022-34356:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10"
    ],
    "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability",
    "aparNo": "IJ41688",
    "aparNoSet": [
      "CVE-2022-34356",
      "IJ41688"
    ],
    "fixedIn": "7100-05-11",
    "ifixes": [
      "IJ41688m8a.220921.epkg.Z",
      "IJ41688m9a.220822.epkg.Z",
      "IJ41688m9b.220822.epkg.Z",
      "IJ41688sAa.220913.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.46"
    ],
    "issued": "20220912",
    "updated": "20221010",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar",
    "cvss": [
      "CVE-2022-34356:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.40",
      "3.1.1.50",
      "3.1.1.60"
    ],
    "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability",
    "aparNo": "IJ41706",
    "aparNoSet": [
      "CVE-2022-34356",
      "IJ41706"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ41706m4a.220812.epkg.Z",
      "IJ41706m5a.220810.epkg.Z",
      "IJ41706s6a.220912.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc",
    "filesets": [
      "bos.mp64:7.2.4.0-7.2.4.10"
    ],
    "issued": "20220912",
    "updated": "20221010",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar",
    "cvss": [
      "CVE-2022-34356:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-04",
      "7200-04-05",
      "7200-04-06"
    ],
    "apAbstract": "AIX is vulnerable to a privilege escalation vulnerability",
    "aparNo": "IJ41706",
    "aparNoSet": [
      "CVE-2022-34356",
      "IJ41706"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ41706m4a.220812.epkg.Z",
      "IJ41706m5a.220810.epkg.Z",
      "IJ41706s6a.220912.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory4.asc",
    "filesets": [
      "bos.mp64:7.2.4.0-7.2.4.10"
    ],
    "issued": "20220912",
    "updated": "20221010",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix4.tar",
    "cvss": [
      "CVE-2022-34356:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - TCPIP",
    "aparNo": "IJ41974",
    "aparNoSet": [
      "CVE-2022-40233",
      "IJ41974"
    ],
    "fixedIn": "3.1.3.30",
    "ifixes": [
      "IJ41974s3a.221025.epkg.Z",
      "IJ41974s3b.221213.epkg.Z",
      "IJ41974s4a.221017.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.5.100-7.2.5.104"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-40233:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-02",
      "7200-05-03",
      "7200-05-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - TCPIP",
    "aparNo": "IJ41974",
    "aparNoSet": [
      "CVE-2022-40233",
      "IJ41974",
      "IJ43598"
    ],
    "fixedIn": "7200-05-05",
    "ifixes": [
      "IJ43598s2b.221027.epkg.Z",
      "IJ41974s3a.221025.epkg.Z",
      "IJ41974s3b.221213.epkg.Z",
      "IJ41974s4a.221017.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.5.0-7.2.5.4",
      "bos.net.tcp.client_core:7.2.5.100-7.2.5.104"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-40233:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - CAA",
    "aparNo": "IJ41975",
    "aparNoSet": [
      "CVE-2022-39165",
      "IJ41975"
    ],
    "fixedIn": "3.1.3.30",
    "ifixes": [
      "IJ41975m3a.221027.epkg.Z",
      "IJ41975m3b.221212.epkg.Z",
      "IJ41975s4a.221017.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.cluster.rte:7.2.5.100-7.2.5.102"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-39165:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-02",
      "7200-05-03",
      "7200-05-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - CAA",
    "aparNo": "IJ41975",
    "aparNoSet": [
      "CVE-2022-39165",
      "IJ41975",
      "IJ44115"
    ],
    "fixedIn": "7200-05-05",
    "ifixes": [
      "IJ44115m2a.221102.epkg.Z",
      "IJ41975m3a.221027.epkg.Z",
      "IJ41975m3b.221212.epkg.Z",
      "IJ41975s4a.221017.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.cluster.rte:7.2.5.0-7.2.5.2",
      "bos.cluster.rte:7.2.5.100-7.2.5.102"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-39165:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS",
    "aparNo": "IJ42159",
    "aparNoSet": [
      "CVE-2022-43380",
      "IJ42159"
    ],
    "fixedIn": "3.1.3.30",
    "ifixes": [
      "IJ42159s3a.221025.epkg.Z",
      "IJ42159s3b.221213.epkg.Z",
      "IJ42159s4a.221017.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.net.nfs.client:7.2.5.100-7.2.5.101"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-43380:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-02",
      "7200-05-03",
      "7200-05-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS",
    "aparNo": "IJ42159",
    "aparNoSet": [
      "CVE-2022-43380",
      "IJ42159",
      "IJ43674"
    ],
    "fixedIn": "7200-05-05",
    "ifixes": [
      "IJ43674s2b.221027.epkg.Z",
      "IJ42159s3a.221025.epkg.Z",
      "IJ42159s3b.221213.epkg.Z",
      "IJ42159s4a.221017.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.net.nfs.client:7.2.5.0-7.2.5.3",
      "bos.net.nfs.client:7.2.5.100-7.2.5.101"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-43380:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ42162",
    "aparNoSet": [
      "CVE-2022-43382",
      "IJ42162"
    ],
    "fixedIn": "3.1.3.30",
    "ifixes": [
      "IJ42162m4a.221208.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.100-7.2.5.100"
    ],
    "issued": "20221215",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar",
    "cvss": [
      "CVE-2022-43382:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "AIX is affected by a root privilege escalation vulnerability",
    "aparNo": "IJ42163",
    "aparNoSet": [
      "CVE-2022-41290",
      "IJ42163"
    ],
    "fixedIn": "3.1.3.30",
    "ifixes": [
      "IJ42163m4a.221213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc",
    "filesets": [
      "bos.rte.install:7.2.5.100-7.2.5.105"
    ],
    "issued": "20221214",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar",
    "cvss": [
      "CVE-2022-41290:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-03",
      "7200-05-04"
    ],
    "apAbstract": "AIX is affected by a root privilege escalation vulnerability",
    "aparNo": "IJ42163",
    "aparNoSet": [
      "CVE-2022-41290",
      "IJ42163"
    ],
    "fixedIn": "7200-05-05",
    "ifixes": [
      "IJ42163m4a.221213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc",
    "filesets": [
      "bos.rte.install:7.2.5.0-7.2.5.5",
      "bos.rte.install:7.2.5.100-7.2.5.105"
    ],
    "issued": "20221214",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar",
    "cvss": [
      "CVE-2022-41290:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10"
    ],
    "apAbstract": "AIX is affected by a root privilege escalation vulnerability",
    "aparNo": "IJ42230",
    "aparNoSet": [
      "CVE-2022-41290",
      "IJ42230"
    ],
    "fixedIn": "7100-05-11",
    "ifixes": [
      "IJ42230mAa.221208.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc",
    "filesets": [
      "bos.rte.install:7.1.5.0-7.1.5.48"
    ],
    "issued": "20221214",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar",
    "cvss": [
      "CVE-2022-41290:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40"
    ],
    "apAbstract": "AIX is affected by a root privilege escalation vulnerability",
    "aparNo": "IJ42232",
    "aparNoSet": [
      "CVE-2022-41290",
      "IJ42232"
    ],
    "fixedIn": "3.1.2.50",
    "ifixes": [
      "IJ42232m2a.221213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc",
    "filesets": [
      "bos.rte.install:7.2.5.0-7.2.5.5"
    ],
    "issued": "20221214",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar",
    "cvss": [
      "CVE-2022-41290:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02"
    ],
    "apAbstract": "AIX is affected by a root privilege escalation vulnerability",
    "aparNo": "IJ42234",
    "aparNoSet": [
      "CVE-2022-41290",
      "IJ42234"
    ],
    "fixedIn": "7300-00-03",
    "ifixes": [
      "IJ42234m2a.221213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_advisory.asc",
    "filesets": [
      "bos.rte.install:7.3.0.0-7.3.0.3"
    ],
    "issued": "20221214",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/rmmlcache_fix.tar",
    "cvss": [
      "CVE-2022-41290:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ42341",
    "aparNoSet": [
      "CVE-2022-29824",
      "IJ42341"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ42341s2a.220907.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc",
    "filesets": [
      "bos.rte.control:7.3.0.0-7.3.0.1"
    ],
    "issued": "20220912",
    "updated": "20221212",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar",
    "cvss": [
      "CVE-2022-29824:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ42379",
    "aparNoSet": [
      "CVE-2022-29824",
      "IJ42339",
      "IJ42378",
      "IJ42379"
    ],
    "fixedIn": "3.1.2.60",
    "ifixes": [
      "IJ42378s2a.220909.epkg.Z",
      "IJ42378s2a.221010.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc",
    "filesets": [
      "bos.rte.control:7.2.5.0-7.2.5.4"
    ],
    "issued": "20220912",
    "updated": "20221212",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar",
    "cvss": [
      "CVE-2022-29824:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ42379",
    "aparNoSet": [
      "CVE-2022-29824",
      "IJ42339",
      "IJ42378",
      "IJ42379"
    ],
    "fixedIn": "3.1.3.40",
    "ifixes": [
      "IJ42379s4a.220909.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc",
    "filesets": [
      "bos.rte.control:7.2.5.100-7.2.5.101"
    ],
    "issued": "20220912",
    "updated": "20221212",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar",
    "cvss": [
      "CVE-2022-29824:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ42379",
    "aparNoSet": [
      "CVE-2022-29824",
      "IJ42339",
      "IJ42378",
      "IJ42379"
    ],
    "fixedIn": "3.1.4.20",
    "ifixes": [
      "IJ42339s5a.221212.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc",
    "filesets": [
      "bos.rte.control:7.2.5.200-7.2.5.200"
    ],
    "issued": "20220912",
    "updated": "20221212",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar",
    "cvss": [
      "CVE-2022-29824:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-02",
      "7200-05-03",
      "7200-05-04",
      "7200-05-05"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ42379",
    "aparNoSet": [
      "CVE-2022-29824",
      "IJ42339",
      "IJ42378",
      "IJ42379"
    ],
    "fixedIn": "7200-05-06",
    "ifixes": [
      "IJ42339s2a.220909.epkg.Z",
      "IJ42339s4a.220907.epkg.Z",
      "IJ42339s5a.221212.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc",
    "filesets": [
      "bos.rte.control:7.2.5.0-7.2.5.4",
      "bos.rte.control:7.2.5.100-7.2.5.101",
      "bos.rte.control:7.2.5.200-7.2.5.200"
    ],
    "issued": "20220912",
    "updated": "20221212",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar",
    "cvss": [
      "CVE-2022-29824:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.1.40",
      "3.1.1.50",
      "3.1.1.60"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ42381",
    "aparNoSet": [
      "CVE-2022-29824",
      "IJ42381"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ42381s6a.220909.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc",
    "filesets": [
      "bos.rte.control:7.2.4.0-7.2.4.5"
    ],
    "issued": "20220912",
    "updated": "20221212",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar",
    "cvss": [
      "CVE-2022-29824:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-04-04",
      "7200-04-05",
      "7200-04-06"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ42381",
    "aparNoSet": [
      "CVE-2022-29824",
      "IJ42381"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ42381s6a.220909.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory3.asc",
    "filesets": [
      "bos.rte.control:7.2.4.0-7.2.4.5"
    ],
    "issued": "20220912",
    "updated": "20221212",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix3.tar",
    "cvss": [
      "CVE-2022-29824:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40"
    ],
    "apAbstract": "AIX is vulnerable to a buffer overflow due to X11",
    "aparNo": "IJ42677",
    "aparNoSet": [
      "CVE-2022-47990",
      "IJ42677",
      "IJ43218",
      "IJ43599"
    ],
    "fixedIn": "3.1.2.50",
    "ifixes": [
      "IJ43599s2a.221227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc",
    "filesets": [
      "X11.base.lib:7.2.5.0-7.2.5.1"
    ],
    "issued": "20230117",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar",
    "cvss": [
      "CVE-2022-47990:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21"
    ],
    "apAbstract": "AIX is vulnerable to a buffer overflow due to X11",
    "aparNo": "IJ42677",
    "aparNoSet": [
      "CVE-2022-47990",
      "IJ42677",
      "IJ43218",
      "IJ43599"
    ],
    "fixedIn": "3.1.3.30",
    "ifixes": [
      "IJ43218s4a.221227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc",
    "filesets": [
      "X11.base.lib:7.2.5.100-7.2.5.100"
    ],
    "issued": "20230117",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar",
    "cvss": [
      "CVE-2022-47990:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-03",
      "7200-05-04"
    ],
    "apAbstract": "AIX is vulnerable to a buffer overflow due to X11",
    "aparNo": "IJ42677",
    "aparNoSet": [
      "CVE-2022-47990",
      "IJ42677",
      "IJ43218",
      "IJ43599"
    ],
    "fixedIn": "7200-05-05",
    "ifixes": [
      "IJ42677s4a.221227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc",
    "filesets": [
      "X11.base.lib:7.2.5.0-7.2.5.1",
      "X11.base.lib:7.2.5.100-7.2.5.100"
    ],
    "issued": "20230117",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar",
    "cvss": [
      "CVE-2022-47990:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02",
      "7300-00-03"
    ],
    "apAbstract": "IX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ42800",
    "aparNoSet": [
      "CVE-2022-43382",
      "IJ42800",
      "IJ44562"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ42800m2a.221208.epkg.Z",
      "IJ44562s3a.230314.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc",
    "filesets": [
      "bos.rte.printers:7.3.0.0-7.3.0.0",
      "printers.rte:7.3.0.0-7.3.0.1"
    ],
    "issued": "20221215",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar",
    "cvss": [
      "CVE-2022-43382:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - TCPIP",
    "aparNo": "IJ42937",
    "aparNoSet": [
      "CVE-2022-40233",
      "IJ42937"
    ],
    "fixedIn": "7300-00-03",
    "ifixes": [
      "IJ42937s1a.221027.epkg.Z",
      "IJ42937s2a.221018.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.3.0.0-7.3.0.2"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-40233:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - CAA",
    "aparNo": "IJ42938",
    "aparNoSet": [
      "CVE-2022-39165",
      "IJ42938"
    ],
    "fixedIn": "7300-00-03",
    "ifixes": [
      "IJ42938m1a.221027.epkg.Z",
      "IJ42938s2a.221018.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.cluster.rte:7.3.0.0-7.3.0.1"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-39165:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02"
    ],
    "apAbstract": "AIX is vulnerable to a buffer overflow due to X11",
    "aparNo": "IJ42939",
    "aparNoSet": [
      "CVE-2022-47990",
      "IJ42939"
    ],
    "fixedIn": "7300-00-03",
    "ifixes": [
      "IJ42939s2a.221227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc",
    "filesets": [
      "X11.base.lib:7.3.0.0-7.3.0.0"
    ],
    "issued": "20230117",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar",
    "cvss": [
      "CVE-2022-47990:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10",
      "7100-05-11"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS",
    "aparNo": "IJ43072",
    "aparNoSet": [
      "CVE-2022-43380",
      "IJ43072"
    ],
    "fixedIn": "7100-05-11",
    "ifixes": [
      "IJ43072s8a.221110.epkg.Z",
      "IJ43072sAa.221024.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.net.nfs.client:7.1.5.0-7.1.5.38"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-43380:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10"
    ],
    "apAbstract": "AIX is vulnerable to a buffer overflow due to X11",
    "aparNo": "IJ43073",
    "aparNoSet": [
      "CVE-2022-47990",
      "IJ43073"
    ],
    "fixedIn": "7100-05-11",
    "ifixes": [
      "IJ43073sAa.221227.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_advisory.asc",
    "filesets": [
      "X11.base.lib:7.1.5.0-7.1.5.34"
    ],
    "issued": "20230117",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/x11_fix.tar",
    "cvss": [
      "CVE-2022-47990:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - TCPIP",
    "aparNo": "IJ43098",
    "aparNoSet": [
      "CVE-2022-40233",
      "IJ43098"
    ],
    "fixedIn": "7100-05-11",
    "ifixes": [
      "IJ43098s8a.221110.epkg.Z",
      "IJ43098s9a.221102.epkg.Z",
      "IJ43098s9b.221213.epkg.Z",
      "IJ43098sAa.221024.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.41"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-40233:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - CAA",
    "aparNo": "IJ43099",
    "aparNoSet": [
      "CVE-2022-39165",
      "IJ43099"
    ],
    "fixedIn": "7100-05-11",
    "ifixes": [
      "IJ43099m8a.221110.epkg.Z",
      "IJ43099m9a.221102.epkg.Z",
      "IJ43099m9b.221213.epkg.Z",
      "IJ43099sAa.221024.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.cluster.rte:7.1.5.0-7.1.5.39"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-39165:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS",
    "aparNo": "IJ43468",
    "aparNoSet": [
      "CVE-2022-43380",
      "IJ43468"
    ],
    "fixedIn": "7300-00-03",
    "ifixes": [
      "IJ43468s1a.221025.epkg.Z",
      "IJ43468s2a.221017.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.net.nfs.client:7.3.0.0-7.3.0.1"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-43380:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - TCPIP",
    "aparNo": "IJ43598",
    "aparNoSet": [
      "CVE-2022-40233",
      "IJ43598"
    ],
    "fixedIn": "3.1.2.50",
    "ifixes": [
      "IJ43598s2b.221027.epkg.Z",
      "IJ43598s2c.221213.epkg.Z",
      "IJ43598s2d.221213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.5.0-7.2.5.4"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-40233:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS",
    "aparNo": "IJ43674",
    "aparNoSet": [
      "CVE-2022-43380",
      "IJ43674"
    ],
    "fixedIn": "3.1.2.50",
    "ifixes": [
      "IJ43674s2b.221027.epkg.Z",
      "IJ43674s2c.221213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.net.nfs.client:7.2.5.0-7.2.5.3"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-43380:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21",
      "3.1.3.30"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ43869",
    "aparNoSet": [
      "CVE-2022-39164",
      "IJ43869",
      "IJ45541"
    ],
    "fixedIn": "3.1.3.40",
    "ifixes": [
      "IJ43869m3a.221025.epkg.Z",
      "IJ43869m3b.221212.epkg.Z",
      "IJ43869m4a.221017.epkg.Z",
      "IJ45541s3b.230404.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.mp64:7.2.5.100-7.2.5.106"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-39164:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ43869",
    "aparNoSet": [
      "CVE-2022-39164",
      "IJ43869"
    ],
    "fixedIn": "3.1.4.20",
    "ifixes": [
      "IJ43869s5a.221212.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.mp64:7.2.5.200-7.2.5.201"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-39164:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-03",
      "7200-05-04",
      "7200-05-05"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ43869",
    "aparNoSet": [
      "CVE-2022-39164",
      "IJ43869"
    ],
    "fixedIn": "7200-05-06",
    "ifixes": [
      "IJ43869m3c.230216.epkg.Z",
      "IJ43869m3d.230216.epkg.Z",
      "IJ43869m4b.230216.epkg.Z",
      "IJ43869m5b.230216.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.5",
      "bos.mp64:7.2.5.100-7.2.5.105",
      "bos.mp64:7.2.5.200-7.2.5.200"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-39164:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02",
      "7300-00-03"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ43875",
    "aparNoSet": [
      "CVE-2022-39164",
      "IJ43875"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ43875m1b.230216.epkg.Z",
      "IJ43875m2b.230216.epkg.Z",
      "IJ43875s3a.230314.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.mp64:7.3.0.0-7.3.0.4"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-39164:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21",
      "3.1.3.30"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat",
    "aparNo": "IJ43876",
    "aparNoSet": [
      "CVE-2022-43848",
      "IJ43876"
    ],
    "fixedIn": "3.1.3.40",
    "ifixes": [
      "IJ43876s3a.221025.epkg.Z",
      "IJ43876s3b.221213.epkg.Z",
      "IJ43876s4a.221017.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.perf.perfstat:7.2.5.100-7.2.5.101"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-43848:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat",
    "aparNo": "IJ43876",
    "aparNoSet": [
      "CVE-2022-43848",
      "IJ43876"
    ],
    "fixedIn": "3.1.4.20",
    "ifixes": [
      "IJ43876s5a.221212.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.perf.perfstat:7.2.5.200-7.2.5.200"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-43848:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-02",
      "7200-05-03",
      "7200-05-04",
      "7200-05-05"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat",
    "aparNo": "IJ43876",
    "aparNoSet": [
      "CVE-2022-43848",
      "IJ43876",
      "IJ44114"
    ],
    "fixedIn": "7200-05-06",
    "ifixes": [
      "IJ44114s2a.221102.epkg.Z",
      "IJ43876s3a.221025.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.perf.perfstat:7.2.5.0-7.2.5.0",
      "bos.perf.perfstat:7.2.5.100-7.2.5.101",
      "bos.perf.perfstat:7.2.5.200-7.2.5.200"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-43848:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21",
      "3.1.3.30"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd",
    "aparNo": "IJ43877",
    "aparNoSet": [
      "CVE-2022-43849",
      "IJ43877",
      "IJ46068"
    ],
    "fixedIn": "3.1.3.40",
    "ifixes": [
      "IJ43877s3a.221025.epkg.Z",
      "IJ43877s4a.221017.epkg.Z",
      "IJ46068s3a.230404.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.pfcdd.rte:7.2.5.100-7.2.5.102"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-43849:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd",
    "aparNo": "IJ43877",
    "aparNoSet": [
      "CVE-2022-43849",
      "IJ43877"
    ],
    "fixedIn": "3.1.4.20",
    "ifixes": [
      "IJ43877s5a.230123.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.pfcdd.rte:7.2.5.200-7.2.5.200"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-43849:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-02",
      "7200-05-03",
      "7200-05-04",
      "7200-05-05"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd",
    "aparNo": "IJ43877",
    "aparNoSet": [
      "CVE-2022-43849",
      "IJ43877",
      "IJ44116"
    ],
    "fixedIn": "7200-05-06",
    "ifixes": [
      "IJ44116s2a.221102.epkg.Z",
      "IJ43877s3a.221025.epkg.Z",
      "IJ43877s4a.221017.epkg.Z",
      "IJ43877s5a.230123.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.pfcdd.rte:7.2.5.0-7.2.5.1",
      "bos.pfcdd.rte:7.2.5.100-7.2.5.101",
      "bos.pfcdd.rte:7.2.5.200-7.2.5.200"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-43849:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02",
      "7300-00-03"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat",
    "aparNo": "IJ43891",
    "aparNoSet": [
      "CVE-2022-43848",
      "IJ43891"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ43891s2a.221018.epkg.Z",
      "IJ43891s3a.230314.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.perf.perfstat:7.3.0.0-7.3.0.1"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-43848:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02",
      "7300-00-03"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd",
    "aparNo": "IJ43893",
    "aparNoSet": [
      "CVE-2022-43849",
      "IJ43893"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ43893s1a.221027.epkg.Z",
      "IJ43893s2a.221018.epkg.Z",
      "IJ43893s3a.230314.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.pfcdd.rte:7.3.0.0-7.3.0.2"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-43849:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10",
      "7100-05-11"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ43967",
    "aparNoSet": [
      "CVE-2022-39164",
      "IJ43967"
    ],
    "fixedIn": "7100-05-12",
    "ifixes": [
      "IJ43967m8a.221110.epkg.Z",
      "IJ43967m9a.221102.epkg.Z",
      "IJ43967m9b.221111.epkg.Z",
      "IJ43967mAa.221024.epkg.Z",
      "IJ43967sBa.230314.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.47"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-39164:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10",
      "7100-05-11"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat ",
    "aparNo": "IJ43970",
    "aparNoSet": [
      "CVE-2022-43848",
      "IJ43970"
    ],
    "fixedIn": "7100-05-12",
    "ifixes": [
      "IJ43970sAa.221024.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.perf.perfstat:7.1.5.0-7.1.5.32"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-43848:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10",
      "7100-05-11"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd",
    "aparNo": "IJ43980",
    "aparNoSet": [
      "CVE-2022-43849",
      "IJ43980"
    ],
    "fixedIn": "7100-05-12",
    "ifixes": [
      "IJ43980sAa.221024.epkg.Z",
      "IJ43980sBa.230314.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.pfcdd.rte:7.1.5.0-7.1.5.34"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-43849:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40",
      "3.1.2.50"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ43995",
    "aparNoSet": [
      "CVE-2022-39164",
      "IJ43995"
    ],
    "fixedIn": "3.1.2.60",
    "ifixes": [
      "IJ43995m2a.221025.epkg.Z",
      "IJ43995m2b.221027.epkg.Z",
      "IJ43995m2c.221212.epkg.Z",
      "IJ43995s5a.230404.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.6"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-39164:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.3.0",
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21",
      "3.1.3.30"
    ],
    "apAbstract": "Possible system crashes processing network traffic",
    "aparNo": "IJ44047",
    "aparNoSet": [
      "IJ44047",
      "IJ44534"
    ],
    "fixedIn": "3.1.3.40",
    "ifixes": [
      "IJ44047m4b.230213.VIOS3.1.3.21.epkg.Z",
      "IJ44047m4e.230505.VIOS3.1.3.30.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545",
    "filesets": [
      "bos.mp64:7.2.5.100-7.2.5.106",
      "bos.net.tcp.client_core:7.2.5.100-7.2.5.105"
    ],
    "issued": "20230217",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij44534/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40",
      "3.1.2.50"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat",
    "aparNo": "IJ44114",
    "aparNoSet": [
      "CVE-2022-43848",
      "IJ44114"
    ],
    "fixedIn": "3.1.2.60",
    "ifixes": [
      "IJ44114s2a.221102.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.perf.perfstat:7.2.5.0-7.2.5.0"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-43848:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - CAA",
    "aparNo": "IJ44115",
    "aparNoSet": [
      "CVE-2022-39165",
      "IJ44115"
    ],
    "fixedIn": "3.1.2.50",
    "ifixes": [
      "IJ44115m2a.221102.epkg.Z",
      "IJ44115m2b.221213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.cluster.rte:7.2.5.0-7.2.5.2"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-39165:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40",
      "3.1.2.50"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pfcdd",
    "aparNo": "IJ44116",
    "aparNoSet": [
      "CVE-2022-43849",
      "IJ44116",
      "IJ46105"
    ],
    "fixedIn": "3.1.2.60",
    "ifixes": [
      "IJ44116s2a.221102.epkg.Z",
      "IJ46105s5a.230404.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.pfcdd.rte:7.2.5.0-7.2.5.2"
    ],
    "issued": "20221214",
    "updated": "20230406",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar",
    "cvss": [
      "CVE-2022-43849:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10",
      "7100-05-11"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "IJ44422",
    "aparNoSet": [
      "CVE-2022-2795",
      "CVE-2022-3080",
      "CVE-2022-38177",
      "CVE-2022-38178",
      "IJ44422"
    ],
    "fixedIn": "7100-05-12",
    "ifixes": [
      "IJ44422mAa.221220.epkg.Z",
      "IJ44422sBa.230317.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.5.0-7.1.5.42",
      "bos.net.tcp.server:7.1.5.0-7.1.5.35"
    ],
    "issued": "20221222",
    "updated": "20230405",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar",
    "cvss": [
      "CVE-2022-38178:7.5",
      "CVE-2022-3080:7.5",
      "CVE-2022-38177:7.5",
      "CVE-2022-2795:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40",
      "3.1.2.50"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "IJ44423",
    "aparNoSet": [
      "CVE-2022-2795",
      "CVE-2022-3080",
      "CVE-2022-38177",
      "CVE-2022-38178",
      "IJ44423"
    ],
    "fixedIn": "3.1.2.60",
    "ifixes": [
      "IJ44423m2b.230217.epkg.Z",
      "IJ44423s5a.230404.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.0-7.2.5.1",
      "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.4"
    ],
    "issued": "20221222",
    "updated": "20230517",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar",
    "cvss": [
      "CVE-2022-2795:5.3",
      "CVE-2022-3080:7.5",
      "CVE-2022-38177:7.5",
      "CVE-2022-38178:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21",
      "3.1.3.30"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "IJ44425",
    "aparNoSet": [
      "CVE-2022-2795",
      "CVE-2022-3080",
      "CVE-2022-38177",
      "CVE-2022-38178",
      "IJ44424",
      "IJ44425"
    ],
    "fixedIn": "3.1.3.40",
    "ifixes": [
      "IJ44424s3a.230404.epkg.Z",
      "IJ44425m4b.230217.epkg.Z",
      "IJ44424s5.221129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.100-7.2.5.101",
      "bos.net.tcp.bind_utils:7.2.5.100-7.2.5.102"
    ],
    "issued": "20221222",
    "updated": "20230517",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar",
    "cvss": [
      "CVE-2022-2795:5.3",
      "CVE-2022-3080:7.5",
      "CVE-2022-38177:7.5",
      "CVE-2022-38178:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "IJ44425",
    "aparNoSet": [
      "CVE-2022-2795",
      "CVE-2022-3080",
      "CVE-2022-38177",
      "CVE-2022-38178",
      "IJ44424",
      "IJ44425"
    ],
    "fixedIn": "3.1.4.20",
    "ifixes": [
      "IJ44425s5b.230214.epkg.Z",
      "IJ44424s3a.230404.epkg.Z",
      "IJ44425m4b.230217.epkg.Z",
      "IJ44424s5.221129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.5.200-7.2.5.200"
    ],
    "issued": "20221222",
    "updated": "20230517",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar",
    "cvss": [
      "CVE-2022-2795:5.3",
      "CVE-2022-3080:7.5",
      "CVE-2022-38177:7.5",
      "CVE-2022-38178:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05",
      "7200-05-03",
      "7200-05-04",
      "7200-05-05"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "IJ44425",
    "aparNoSet": [
      "CVE-2022-2795",
      "CVE-2022-3080",
      "CVE-2022-38177",
      "CVE-2022-38178",
      "IJ44424",
      "IJ44425"
    ],
    "fixedIn": "7200-05-06",
    "ifixes": [
      "IJ44424s3a.230404.epkg.Z",
      "IJ44425m4b.230217.epkg.Z",
      "IJ44424s5.221129.epkg.Z",
      "IJ44425s5b.230214.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.0-7.2.5.1",
      "bos.net.tcp.bind:7.2.5.100-7.2.5.101",
      "bos.net.tcp.bind_utils:7.2.5.0-7.2.5.4",
      "bos.net.tcp.bind_utils:7.2.5.100-7.2.5.102",
      "bos.net.tcp.bind_utils:7.2.5.200-7.2.5.200"
    ],
    "issued": "20221222",
    "updated": "20230517",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar",
    "cvss": [
      "CVE-2022-2795:5.3",
      "CVE-2022-3080:7.5",
      "CVE-2022-38177:7.5",
      "CVE-2022-38178:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "IJ44426",
    "aparNoSet": [
      "CVE-2022-2795",
      "CVE-2022-3080",
      "CVE-2022-38177",
      "CVE-2022-38178",
      "IJ44426"
    ],
    "fixedIn": "7300-01-02",
    "ifixes": [
      "IJ44426s2.221130.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc",
    "filesets": [],
    "issued": "20221222",
    "updated": "20230517",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar",
    "cvss": [
      "CVE-2022-2795:5.3",
      "CVE-2022-3080:7.5",
      "CVE-2022-38177:7.5",
      "CVE-2022-38178:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02",
      "7300-00-03"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "IJ44427",
    "aparNoSet": [
      "CVE-2022-2795",
      "CVE-2022-3080",
      "CVE-2022-38177",
      "CVE-2022-38178",
      "IJ44427"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ44427m2a.221220.epkg.Z",
      "IJ44427s3a.230317.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory22.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.3.0.0-7.3.0.2"
    ],
    "issued": "20221222",
    "updated": "20230517",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix22.tar",
    "cvss": [
      "CVE-2022-2795:5.3",
      "CVE-2022-3080:7.5",
      "CVE-2022-38177:7.5",
      "CVE-2022-38178:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-00-00",
      "7300-00-01-2148",
      "7300-00-02-2220",
      "7300-00-03-2246"
    ],
    "apAbstract": "Possible system crashes processing network traffic",
    "aparNo": "IJ44513",
    "aparNoSet": [
      "IJ44512",
      "IJ44513"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ44512m2b.230213.AIX73TL00SP02.epkg.Z",
      "IJ44512m3a.230423.AIX73TL00SP03.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545",
    "filesets": [
      "bos.mp64:7.3.0.0-7.3.0.4",
      "bos.net.tcp.client_core:7.3.0.0-7.3.0.3"
    ],
    "issued": "20230217",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij44513/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-08",
      "7100-05-09",
      "7100-05-10",
      "7100-05-11"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ44552",
    "aparNoSet": [
      "CVE-2022-43382",
      "IJ44552"
    ],
    "fixedIn": "7100-05-12",
    "ifixes": [
      "IJ44552mAa.221208.epkg.Z",
      "IJ44552mBa.230313.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc",
    "filesets": [
      "bos.rte.printers:7.1.5.0-7.1.5.34",
      "printers.rte:7.1.5.0-7.1.5.32"
    ],
    "issued": "20221215",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar",
    "cvss": [
      "CVE-2022-43382:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ44559",
    "aparNoSet": [
      "CVE-2022-43382",
      "IJ44559"
    ],
    "fixedIn": "3.1.4.20",
    "ifixes": [
      "IJ44559m5a.221208.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc",
    "filesets": [
      "printers.rte:7.2.5.200-7.2.5.200"
    ],
    "issued": "20221215",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar",
    "cvss": [
      "CVE-2022-43382:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-03",
      "7200-05-04",
      "7200-05-05"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ44559",
    "aparNoSet": [
      "CVE-2022-43382",
      "IJ44559"
    ],
    "fixedIn": "7200-05-06",
    "ifixes": [
      "IJ44559m4a.221214.epkg.Z",
      "IJ44559m5a.221208.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.0-7.2.5.1",
      "bos.rte.printers:7.2.5.100-7.2.5.100",
      "printers.rte:7.2.5.200-7.2.5.200"
    ],
    "issued": "20221215",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar",
    "cvss": [
      "CVE-2022-43382:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01"
    ],
    "apAbstract": "IX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ44564",
    "aparNoSet": [
      "CVE-2022-43382",
      "IJ44564"
    ],
    "fixedIn": "7300-01-02",
    "ifixes": [
      "IJ44564m1a.221208.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc",
    "filesets": [
      "printers.rte:7.3.1.0-7.3.1.0"
    ],
    "issued": "20221215",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar",
    "cvss": [
      "CVE-2022-43382:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ44594",
    "aparNoSet": [
      "CVE-2022-39164",
      "IJ44594"
    ],
    "fixedIn": "7300-01-02",
    "ifixes": [
      "IJ44594m1a.230216.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.mp64:7.3.1.0-7.3.1.1"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-39164:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - perfstat",
    "aparNo": "IJ44595",
    "aparNoSet": [
      "CVE-2022-43848",
      "IJ44595"
    ],
    "fixedIn": "7300-01-02",
    "ifixes": [
      "IJ44595s1a.221212.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory5.asc",
    "filesets": [
      "bos.perf.perfstat:7.3.1.0-7.3.1.0"
    ],
    "issued": "20221214",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix5.tar ",
    "cvss": [
      "CVE-2022-43848:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to lpd",
    "aparNo": "IJ44615",
    "aparNoSet": [
      "CVE-2022-43382",
      "IJ44615"
    ],
    "fixedIn": "3.1.2.50",
    "ifixes": [
      "IJ44615m2a.221213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_advisory3.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.0-7.2.5.1"
    ],
    "issued": "20221215",
    "updated": "20230317",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lpd_fix3.tar",
    "cvss": [
      "CVE-2022-43382:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-01-00",
      "7300-01-01-2246"
    ],
    "apAbstract": "Possible system crashes processing network traffic",
    "aparNo": "IJ44761",
    "aparNoSet": [
      "IJ44749",
      "IJ44761"
    ],
    "fixedIn": "7300-01-02",
    "ifixes": [
      "IJ44749m1a.230210.AIX73TL01SP01.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545",
    "filesets": [
      "bos.mp64:7.3.1.0-7.3.1.1",
      "bos.net.tcp.client_core:7.3.1.0-7.3.1.1"
    ],
    "issued": "20230217",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij44761/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.4.0",
      "3.1.4.10"
    ],
    "apAbstract": "Possible system crashes processing network traffic",
    "aparNo": "IJ44799",
    "aparNoSet": [
      "IJ44786",
      "IJ44799"
    ],
    "fixedIn": "3.1.4.20",
    "ifixes": [
      "IJ44786m5b.230213.VIOS3.1.4.10.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545",
    "filesets": [
      "bos.mp64:7.2.5.200-7.2.5.201",
      "bos.net.tcp.client_core:7.2.5.200-7.2.5.201"
    ],
    "issued": "20230217",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij44799/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-03-2135",
      "7200-05-03-2136",
      "7200-05-03-2148",
      "7200-05-04-2220",
      "7200-05-05-2246"
    ],
    "apAbstract": "Possible system crashes processing network traffic",
    "aparNo": "IJ44799",
    "aparNoSet": [
      "IJ44047",
      "IJ44786",
      "IJ44799"
    ],
    "fixedIn": "7200-05-06",
    "ifixes": [
      "IJ44047m4b.230213.AIX72TL05SP04.epkg.Z",
      "IJ44786m5b.230213.AIX72TL05SP05.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545",
    "filesets": [
      "bos.mp64:7.2.5.100-7.2.5.201",
      "bos.net.tcp.client_core:7.2.5.100-7.2.5.201"
    ],
    "issued": "20230217",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij44799/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01"
    ],
    "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient",
    "aparNo": "IJ44987",
    "aparNoSet": [
      "CVE-2012-5783",
      "IJ44987"
    ],
    "fixedIn": "7300-01-02",
    "ifixes": [
      "IJ44987s1a.230307.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc",
    "filesets": [
      "bos.ecc_client.rte:7.3.1.0-7.3.1.0"
    ],
    "issued": "20230414",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar",
    "cvss": [
      "CVE-2012-5783:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10"
    ],
    "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient",
    "aparNo": "IJ44994",
    "aparNoSet": [
      "CVE-2012-5783",
      "IJ44994"
    ],
    "fixedIn": "3.1.4.20",
    "ifixes": [
      "IJ44994s5a.230307.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc",
    "filesets": [
      "bos.ecc_client.rte:7.2.5.200-7.2.5.200"
    ],
    "issued": "20230414",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar",
    "cvss": [
      "CVE-2012-5783:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-03",
      "7200-05-04",
      "7200-05-05"
    ],
    "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient",
    "aparNo": "IJ44994",
    "aparNoSet": [
      "CVE-2012-5783",
      "IJ44994"
    ],
    "fixedIn": "7200-05-06",
    "ifixes": [
      "IJ44994s4a.230412.epkg.Z",
      "IJ44994s5a.230307.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc",
    "filesets": [
      "bos.ecc_client.rte:7.2.5.0-7.2.5.1",
      "bos.ecc_client.rte:7.2.5.100-7.2.5.100",
      "bos.ecc_client.rte:7.2.5.200-7.2.5.200"
    ],
    "issued": "20230414",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar",
    "cvss": [
      "CVE-2012-5783:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2",
    "aparNo": "IJ45056",
    "aparNoSet": [
      "CVE-2022-40303",
      "CVE-2022-40304",
      "IJ45056"
    ],
    "fixedIn": "3.1.4.30",
    "ifixes": [
      "IJ45056m5a.230125.epkg.Z",
      "IJ45056m6a.230504.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc",
    "filesets": [
      "bos.rte.control:7.2.5.200-7.2.5.201"
    ],
    "issued": "20230208",
    "updated": "20230504",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar",
    "cvss": [
      "CVE-2022-40303:7.8",
      "CVE-2022-40304:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.21",
      "3.1.2.30",
      "3.1.2.40",
      "3.1.2.50"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2",
    "aparNo": "IJ45057",
    "aparNoSet": [
      "CVE-2022-40303",
      "CVE-2022-40304",
      "IJ45057"
    ],
    "fixedIn": "3.1.2.60",
    "ifixes": [
      "IJ45057m2a.230125.epkg.Z",
      "IJ45057m2b.230405.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc",
    "filesets": [
      "bos.rte.control:7.2.5.0-7.2.5.5"
    ],
    "issued": "20230208",
    "updated": "20230504",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar",
    "cvss": [
      "CVE-2022-40303:7.8",
      "CVE-2022-40304:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21",
      "3.1.3.30"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2",
    "aparNo": "IJ45058",
    "aparNoSet": [
      "CVE-2022-40303",
      "CVE-2022-40304",
      "IJ45058"
    ],
    "fixedIn": "3.1.3.40",
    "ifixes": [
      "IJ45058m4a.230125.epkg.Z",
      "IJ45058m4b.230405.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc",
    "filesets": [
      "bos.rte.control:7.2.5.100-7.2.5.102"
    ],
    "issued": "20230208",
    "updated": "20230504",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar",
    "cvss": [
      "CVE-2022-40303:7.8",
      "CVE-2022-40304:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-03",
      "7200-05-04",
      "7200-05-05"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2",
    "aparNo": "IJ45058",
    "aparNoSet": [
      "CVE-2022-40303",
      "CVE-2022-40304",
      "IJ45056",
      "IJ45057",
      "IJ45058"
    ],
    "fixedIn": "7200-05-06",
    "ifixes": [
      "IJ45056m4a.230125.epkg.Z",
      "IJ45056m5a.230125.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc",
    "filesets": [
      "bos.rte.control:7.2.5.0-7.2.5.4",
      "bos.rte.control:7.2.5.100-7.2.5.101",
      "bos.rte.control:7.2.5.200-7.2.5.200"
    ],
    "issued": "20230208",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar",
    "cvss": [
      "CVE-2022-40303:7.8",
      "CVE-2022-40304:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02",
      "7300-00-03"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2",
    "aparNo": "IJ45059",
    "aparNoSet": [
      "CVE-2022-40303",
      "CVE-2022-40304",
      "IJ45059"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ45059m2a.230125.epkg.Z",
      "IJ45059m2b.230405.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc",
    "filesets": [
      "bos.rte.control:7.3.0.0-7.3.0.2"
    ],
    "issued": "20230208",
    "updated": "20230405",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar",
    "cvss": [
      "CVE-2022-40303:7.8",
      "CVE-2022-40304:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary code execution due to libxml2",
    "aparNo": "IJ45060",
    "aparNoSet": [
      "CVE-2022-40303",
      "CVE-2022-40304",
      "IJ45060"
    ],
    "fixedIn": "7300-01-03",
    "ifixes": [
      "IJ45060s1a.230125.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory4.asc",
    "filesets": [
      "bos.rte.control:7.3.1.0-7.3.1.0"
    ],
    "issued": "20230208",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix4.tar",
    "cvss": [
      "CVE-2022-40303:7.8",
      "CVE-2022-40304:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-09",
      "7100-05-10",
      "7100-05-11"
    ],
    "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient",
    "aparNo": "IJ45221",
    "aparNoSet": [
      "CVE-2012-5783",
      "IJ45221"
    ],
    "fixedIn": "7100-05-12",
    "ifixes": [
      "IJ45221sAa.230309.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc",
    "filesets": [
      "bos.ecc_client.rte:7.1.5.0-7.1.5.34"
    ],
    "issued": "20230414",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar",
    "cvss": [
      "CVE-2012-5783:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.30",
      "3.1.2.40",
      "3.1.2.50"
    ],
    "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient",
    "aparNo": "IJ45222",
    "aparNoSet": [
      "CVE-2012-5783",
      "IJ45222"
    ],
    "fixedIn": "3.1.2.60",
    "ifixes": [
      "IJ45222s2a.230307.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc",
    "filesets": [
      "bos.ecc_client.rte:7.2.5.0-7.2.5.1"
    ],
    "issued": "20230414",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar",
    "cvss": [
      "CVE-2012-5783:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.14",
      "3.1.3.21",
      "3.1.3.30"
    ],
    "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient",
    "aparNo": "IJ45223",
    "aparNoSet": [
      "CVE-2012-5783",
      "IJ45223"
    ],
    "fixedIn": "3.1.3.40",
    "ifixes": [
      "IJ45223s4a.230307.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc",
    "filesets": [
      "bos.ecc_client.rte:7.2.5.100-7.2.5.100"
    ],
    "issued": "20230414",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar",
    "cvss": [
      "CVE-2012-5783:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02",
      "7300-00-03"
    ],
    "apAbstract": "AIX is vulnerable to an SSL server spoof due to Apache Commons HttpClient",
    "aparNo": "IJ45224",
    "aparNoSet": [
      "CVE-2012-5783",
      "IJ45224"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ45224s2a.230309.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_advisory.asc",
    "filesets": [
      "bos.ecc_client.rte:7.3.0.0-7.3.0.1"
    ],
    "issued": "20230414",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/commonshttp_fix.tar",
    "cvss": [
      "CVE-2012-5783:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.30",
      "3.1.2.40",
      "3.1.2.50"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution",
    "aparNo": "IJ45245",
    "aparNoSet": [
      "CVE-2023-26286",
      "IJ45245",
      "IJ46051",
      "IJ46110"
    ],
    "fixedIn": "3.1.2.60",
    "ifixes": [
      "IJ46110s3a.230323.epkg.Z",
      "IJ46110s4a.230323.epkg.Z",
      "IJ46110s5a.230407.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.6",
      "bos.rte.serv_aid:7.2.5.0-7.2.5.4",
      "bos.sysmgt.serv_aid:7.2.5.0-7.2.5.3"
    ],
    "issued": "20230412",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar",
    "cvss": [
      "CVE-2023-26286:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.14",
      "3.1.3.21",
      "3.1.3.30"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution",
    "aparNo": "IJ45245",
    "aparNoSet": [
      "CVE-2023-26286",
      "IJ45245",
      "IJ46051",
      "IJ46110"
    ],
    "fixedIn": "3.1.3.40",
    "ifixes": [
      "IJ46051s1a.230323.epkg.Z",
      "IJ46051s2a.230323.epkg.Z",
      "IJ46051s3a.230323.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.5.100-7.2.5.106",
      "bos.rte.serv_aid:7.2.5.100-7.2.5.102",
      "bos.sysmgt.serv_aid:7.2.5.100-7.2.5.102"
    ],
    "issued": "20230412",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar",
    "cvss": [
      "CVE-2023-26286:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution",
    "aparNo": "IJ45245",
    "aparNoSet": [
      "CVE-2023-26286",
      "IJ45245",
      "IJ46051",
      "IJ46110"
    ],
    "fixedIn": "3.1.4.20",
    "ifixes": [
      "IJ45245s5a.230322.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.5.200-7.2.5.201",
      "bos.rte.serv_aid:7.2.5.200-7.2.5.200",
      "bos.sysmgt.serv_aid:7.2.5.200-7.2.5.200"
    ],
    "issued": "20230412",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar",
    "cvss": [
      "CVE-2023-26286:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-03",
      "7200-05-04",
      "7200-05-05"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution",
    "aparNo": "IJ45245",
    "aparNoSet": [
      "CVE-2023-26286",
      "IJ45245",
      "IJ46051",
      "IJ46110"
    ],
    "fixedIn": "7200-05-06",
    "ifixes": [
      "IJ46051s1a.230323.epkg.Z",
      "IJ46051s2a.230323.epkg.Z",
      "IJ46051s3a.230323.epkg.Z",
      "IJ45245s3a.230324.epkg.Z",
      "IJ45245s4a.230324.epkg.Z",
      "IJ45245s5a.230322.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.6",
      "bos.mp64:7.2.5.100-7.2.5.106",
      "bos.mp64:7.2.5.200-7.2.5.201",
      "bos.rte.serv_aid:7.2.5.0-7.2.5.4",
      "bos.rte.serv_aid:7.2.5.100-7.2.5.102",
      "bos.rte.serv_aid:7.2.5.200-7.2.5.200",
      "bos.sysmgt.serv_aid:7.2.5.0-7.2.5.3",
      "bos.sysmgt.serv_aid:7.2.5.100-7.2.5.102",
      "bos.sysmgt.serv_aid:7.2.5.200-7.2.5.200"
    ],
    "issued": "20230412",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar",
    "cvss": [
      "CVE-2023-26286:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution",
    "aparNo": "IJ45246",
    "aparNoSet": [
      "CVE-2023-26286",
      "IJ45246"
    ],
    "fixedIn": "7300-01-02",
    "ifixes": [
      "IJ45246s1a.230322.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc",
    "filesets": [
      "bos.mp64:7.3.1.0-7.3.1.1",
      "bos.rte.serv_aid:7.3.1.0-7.3.1.1",
      "bos.sysmgt.serv_aid:7.3.1.0-7.3.1.0"
    ],
    "issued": "20230412",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar",
    "cvss": [
      "CVE-2023-26286:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-05-09-2135",
      "7100-05-09-2136",
      "7100-05-09-2148",
      "7100-05-10-2220",
      "7100-05-11-2246"
    ],
    "apAbstract": "Possible system crashes processing network traffic",
    "aparNo": "IJ45294",
    "aparNoSet": [
      "IJ45294",
      "IJ45295"
    ],
    "fixedIn": "7100-05-12",
    "ifixes": [
      "IJ45294mBa.230410.AIX71TL05SP11.epkg.Z",
      "IJ45295mAa.230210.AIX71TL05SP10.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545",
    "filesets": [
      "bos.mp64:7.1.5.43-7.1.5.47",
      "bos.net.tcp.client:7.1.5.38-7.1.5.42"
    ],
    "issued": "20230217",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/support/pages/apar/IJ45294/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.2.30",
      "3.1.2.40",
      "3.1.2.50"
    ],
    "apAbstract": "Possible system crashes processing network traffic",
    "aparNo": "IJ45427",
    "aparNoSet": [
      "IJ45427",
      "IJ45429"
    ],
    "fixedIn": "3.1.2.60",
    "ifixes": [
      "IJ45427m4a.230217.VIOS3.1.2.40.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6857545",
    "filesets": [
      "bos.mp64:7.2.5.4-7.2.5.6",
      "bos.net.tcp.client_core:7.2.5.5-7.2.5.7"
    ],
    "issued": "20230217",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij45429/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-05-09",
      "7100-05-10",
      "7100-05-11"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution",
    "aparNo": "IJ45981",
    "aparNoSet": [
      "CVE-2023-26286",
      "IJ45981"
    ],
    "fixedIn": "7100-05-12",
    "ifixes": [
      "IJ45981s9a.230324.epkg.Z",
      "IJ45981sAa.230323.epkg.Z",
      "IJ45981sBa.230407.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.5.0-7.1.5.47",
      "bos.rte.serv_aid:7.1.5.0-7.1.5.36"
    ],
    "issued": "20230412",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar",
    "cvss": [
      "CVE-2023-26286:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-01",
      "7300-00-02",
      "7300-00-03"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution",
    "aparNo": "IJ45997",
    "aparNoSet": [
      "CVE-2023-26286",
      "IJ45997"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ45997s1a.230322.epkg.Z",
      "IJ45997s2a.230322.epkg.Z",
      "IJ45997s3a.230322.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_advisory.asc",
    "filesets": [
      "bos.mp64:7.3.0.0-7.3.0.4",
      "bos.rte.serv_aid:7.3.0.0-7.3.0.2",
      "bos.sysmgt.serv_aid:7.3.0.0-7.3.0.1"
    ],
    "issued": "20230412",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/librts_fix.tar",
    "cvss": [
      "CVE-2023-26286:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-00-00",
      "7300-00-01-2148",
      "7300-00-02-2220",
      "7300-00-03-2246"
    ],
    "apAbstract": "Potential undetected data loss after running chvg -ky or chvg -g",
    "aparNo": "IJ46487",
    "aparNoSet": [
      "IJ46487"
    ],
    "fixedIn": "7300-00-04",
    "ifixes": [
      "IJ46487s1a.230425.AIX73TL00SP01.epkg.Z",
      "IJ46487s2a.230425.AIX73TL00SP02.epkg.Z",
      "IJ46487s3a.230424.AIX73TL00SP03.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6985585",
    "filesets": [
      "bos.rte.lvm:7.3.0.0-7.3.0.2"
    ],
    "issued": "20230424",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46487/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-01-2038",
      "7200-05-02-2114",
      "7200-05-03-2136",
      "7200-05-03-2148",
      "7200-05-04-2220",
      "7200-05-05-2246",
      "7200-05-06-2320"
    ],
    "apAbstract": "Potential undetected data loss after running chvg -ky or chvg -g",
    "aparNo": "IJ46541",
    "aparNoSet": [
      "IJ46541"
    ],
    "fixedIn": "7200-05-07",
    "ifixes": [
      "IJ46541s5a.230424.AIX72TL05SP05.epkg.Z",
      "IJ46541s6a.230503.AIX72TL05SP06.epkg.Z",
      "IJ46576s4a.230426.AIX72TL05SP04.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6985585",
    "filesets": [
      "bos.rte.lvm:7.2.5.0-7.2.5.201"
    ],
    "issued": "20230424",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46487/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-01-00",
      "7300-01-01-2246",
      "7300-01-02-2320"
    ],
    "apAbstract": "Potential undetected data loss after running chvg -ky or chvg -g",
    "aparNo": "IJ46542",
    "aparNoSet": [
      "IJ46542"
    ],
    "fixedIn": "7300-01-03",
    "ifixes": [
      "IJ46542s1a.230424.AIX73TL01SP01.epkg.Z",
      "IJ46542s2a.230503.AIX73TL01SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/6985585",
    "filesets": [
      "bos.rte.lvm:7.3.1.0-7.3.1.2"
    ],
    "issued": "20230424",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46487/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.4.20",
      "3.1.4.21"
    ],
    "apAbstract": "LDAP user logins or connections stop working",
    "aparNo": "IJ46694",
    "aparNoSet": [
      "IJ46694"
    ],
    "fixedIn": "3.1.4.30",
    "ifixes": [
      "IJ46694s6a.230509.AIX72TL05SP06.epkg.Z",
      "IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z",
      "IJ46727s2a.230509.AIX73TL01SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7000043",
    "filesets": [
      "bos.rte.security:7.2.5.201-7.2.5.201"
    ],
    "issued": "20230602",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46694/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-06-2319",
      "7200-05-06-2320"
    ],
    "apAbstract": "LDAP user logins or connections stop working",
    "aparNo": "IJ46694",
    "aparNoSet": [
      "IJ46694"
    ],
    "fixedIn": "7200-05-07",
    "ifixes": [
      "IJ46694s6a.230509.AIX72TL05SP06.epkg.Z",
      "IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z",
      "IJ46727s2a.230509.AIX73TL01SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7000043",
    "filesets": [
      "bos.rte.security:7.2.5.201-7.2.5.201"
    ],
    "issued": "20230602",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46694/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-01-02-2319",
      "AIX 7300-01-02-2320"
    ],
    "apAbstract": "LDAP user logins or connections stop working",
    "aparNo": "IJ46727",
    "aparNoSet": [
      "IJ46727"
    ],
    "fixedIn": "7300-01-03",
    "ifixes": [
      "IJ46694s6a.230509.AIX72TL05SP06.epkg.Z",
      "IJ46694s6a.230509.VIOS3.1.4.20-21.epkg.Z",
      "IJ46727s2a.230509.AIX73TL01SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7000043",
    "filesets": [
      "bos.rte.security:7.3.1.1-7.3.1.1"
    ],
    "issued": "20230602",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij46694/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ47597",
    "aparNoSet": [
      "CVE-2023-28484",
      "CVE-2023-29469",
      "IJ47597"
    ],
    "fixedIn": "3.1.4.30",
    "ifixes": [
      "IJ47597m6a.230717.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc",
    "filesets": [
      "bos.rte.control:7.2.5.200-7.2.5.201"
    ],
    "issued": "20230725",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar",
    "cvss": [
      "CVE-2023-28484:5.5",
      "CVE-2023-29469:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-04",
      "7200-05-05",
      "7200-05-06"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ47597",
    "aparNoSet": [
      "CVE-2023-28484",
      "CVE-2023-29469",
      "IJ47597"
    ],
    "fixedIn": "7200-05-07",
    "ifixes": [
      "IJ47597m4a.230718.epkg.Z",
      "IJ47597m6a.230717.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc",
    "filesets": [
      "bos.rte.control:7.2.5.0-7.2.5.6",
      "bos.rte.control:7.2.5.100-7.2.5.103",
      "bos.rte.control:7.2.5.200-7.2.5.201"
    ],
    "issued": "20230725",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar",
    "cvss": [
      "CVE-2023-28484:5.5",
      "CVE-2023-29469:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ47629",
    "aparNoSet": [
      "CVE-2023-28484",
      "CVE-2023-29469",
      "IJ47629"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ47629m4a.230718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc",
    "filesets": [
      "bos.rte.control:7.3.0.0-7.3.0.3"
    ],
    "issued": "20230725",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar",
    "cvss": [
      "CVE-2023-28484:5.5",
      "CVE-2023-29469:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01",
      "7300-01-02"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ47630",
    "aparNoSet": [
      "CVE-2023-28484",
      "CVE-2023-29469",
      "IJ47630"
    ],
    "fixedIn": "7300-01-03",
    "ifixes": [
      "IJ47630m2a.230718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc",
    "filesets": [
      "bos.rte.control:7.3.1.0-7.3.1.1"
    ],
    "issued": "20230725",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar",
    "cvss": [
      "CVE-2023-28484:5.5",
      "CVE-2023-29469:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.2.40",
      "3.1.2.50",
      "3.1.2.60"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ47631",
    "aparNoSet": [
      "CVE-2023-28484",
      "CVE-2023-29469",
      "IJ47631"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ47631m6a.230718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc",
    "filesets": [
      "bos.rte.control:7.2.5.0-7.2.5.6"
    ],
    "issued": "20230725",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar",
    "cvss": [
      "CVE-2023-28484:5.5",
      "CVE-2023-29469:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2",
    "aparNo": "IJ47632",
    "aparNoSet": [
      "CVE-2023-28484",
      "CVE-2023-29469",
      "IJ47632"
    ],
    "fixedIn": "3.1.3.50",
    "ifixes": [
      "IJ47632m4a.230718.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory5.asc",
    "filesets": [
      "bos.rte.control:7.2.5.100-7.2.5.103"
    ],
    "issued": "20230725",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix5.tar",
    "cvss": [
      "CVE-2023-28484:5.5",
      "CVE-2023-29469:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-01-00",
      "7300-01-01-2246",
      "7300-01-02-2320"
    ],
    "apAbstract": "Potential undetected data loss by using zlibNX",
    "aparNo": "IJ47907",
    "aparNoSet": [
      "IJ47907"
    ],
    "fixedIn": "7300-01-03",
    "ifixes": [
      "IJ47907s2a.230907.AIX73TL01SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7028659",
    "filesets": [
      "zlibNX.rte:7.3.1.0-7.3.1.1"
    ],
    "issued": "20230911",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij47907/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to AIXWindows",
    "aparNo": "IJ48252",
    "aparNoSet": [
      "CVE-2023-45172",
      "IJ48252"
    ],
    "fixedIn": "3.1.4.30",
    "ifixes": [
      "IJ48252s6a.230928.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc",
    "filesets": [
      "X11.base.smt:7.2.3.0-7.2.3.15"
    ],
    "issued": "20231218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar",
    "cvss": [
      "CVE-2023-45172:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-05",
      "7200-05-06"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to AIXWindows",
    "aparNo": "IJ48252",
    "aparNoSet": [
      "CVE-2023-45172",
      "IJ48252"
    ],
    "fixedIn": "7200-05-07",
    "ifixes": [
      "IJ48252s6a.230928.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc",
    "filesets": [
      "X11.base.smt:7.2.3.0-7.2.3.15"
    ],
    "issued": "20231218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar",
    "cvss": [
      "CVE-2023-45172:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to AIXWindows",
    "aparNo": "IJ48252",
    "aparNoSet": [
      "CVE-2023-45172",
      "IJ48252"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ48252s6a.230928.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc",
    "filesets": [
      "X11.base.smt:7.2.3.0-7.2.3.15"
    ],
    "issued": "20231218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar",
    "cvss": [
      "CVE-2023-45172:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-00",
      "7200-05-00-2028",
      "7200-05-00-2037",
      "7200-05-01-2038",
      "7200-05-02-2114",
      "7200-05-03-2136",
      "7200-05-03-2148",
      "7200-05-04-2220",
      "7200-05-05-2246",
      "7200-05-06-2320"
    ],
    "apAbstract": "Potential undetected data loss by using zlibNX",
    "aparNo": "IJ48340",
    "aparNoSet": [
      "IJ48340"
    ],
    "fixedIn": "7200-05-07",
    "ifixes": [
      "IJ48340s6a.230907.AIX72TL05SP06.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7028659",
    "filesets": [
      "zlibNX.rte:7.2.4.0-7.2.4.9"
    ],
    "issued": "20230911",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij47907/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-00-00",
      "7300-00-01-2148",
      "7300-00-02-2220",
      "7300-00-03-2246",
      "7300-00-04-2320"
    ],
    "apAbstract": "Potential undetected data loss by using zlibNX",
    "aparNo": "IJ48416",
    "aparNoSet": [
      "IJ48416"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ48416s4a.230907.AIX73TL00SP04.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7028659",
    "filesets": [
      "zlibNX.rte:7.3.0.0-7.3.0.3"
    ],
    "issued": "20230911",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij47907/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation and denial of service",
    "aparNo": "IJ48481",
    "aparNoSet": [
      "CVE-2023-45166",
      "CVE-2023-45170",
      "CVE-2023-45174",
      "IJ48481"
    ],
    "fixedIn": "3.1.4.30",
    "ifixes": [
      "IJ48481m5a.231207.epkg.Z",
      "IJ48481m5b.240202.epkg.Z",
      "IJ48481m6a.230927.epkg.Z",
      "IJ48481m6b.240130.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.200-7.2.5.201",
      "printers.rte:7.2.5.200-7.2.5.201"
    ],
    "issued": "20231212",
    "updated": "20240203",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar",
    "cvss": [
      "CVE-2023-45166:8.4",
      "CVE-2023-45170:8.4",
      "CVE-2023-45174:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-05",
      "7200-05-06"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation and denial of service",
    "aparNo": "IJ48481",
    "aparNoSet": [
      "CVE-2023-45166",
      "CVE-2023-45170",
      "CVE-2023-45174",
      "IJ48481"
    ],
    "fixedIn": "7200-05-07",
    "ifixes": [
      "IJ48481m5a.231207.epkg.Z",
      "IJ48481m5b.240202.epkg.Z",
      "IJ48481m6a.230927.epkg.Z",
      "IJ48481m6b.240130.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.0-7.2.5.101",
      "bos.rte.printers:7.2.5.200-7.2.5.201",
      "printers.rte:7.2.5.200-7.2.5.201"
    ],
    "issued": "20231212",
    "updated": "20240203",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar",
    "cvss": [
      "CVE-2023-45166:8.4",
      "CVE-2023-45170:8.4",
      "CVE-2023-45174:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01",
      "7300-01-02"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation and denial of service",
    "aparNo": "IJ48539",
    "aparNoSet": [
      "CVE-2023-45166",
      "CVE-2023-45170",
      "CVE-2023-45174",
      "IJ48539"
    ],
    "fixedIn": "7300-01-03",
    "ifixes": [
      "IJ48539m1a.231207.epkg.Z",
      "IJ48539m1b.240202.epkg.Z",
      "IJ48539m2a.230928.epkg.Z",
      "IJ48539m2b.240202.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.3.1.0-7.3.1.1",
      "printers.rte:7.3.1.0-7.3.1.1"
    ],
    "issued": "20231212",
    "updated": "20240203",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar",
    "cvss": [
      "CVE-2023-45166:8.4",
      "CVE-2023-45170:8.4",
      "CVE-2023-45174:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01",
      "7300-01-02"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to AIXWindows",
    "aparNo": "IJ48540",
    "aparNoSet": [
      "CVE-2023-45172",
      "IJ48540"
    ],
    "fixedIn": "7300-01-03",
    "ifixes": [
      "IJ48540s2a.230928.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc",
    "filesets": [
      "X11.base.smt:7.3.1.0-7.3.1.0"
    ],
    "issued": "20231218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar",
    "cvss": [
      "CVE-2023-45172:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ48608",
    "aparNoSet": [
      "CVE-2023-45171",
      "CVE-2023-45175",
      "IJ48608"
    ],
    "fixedIn": "3.1.4.30",
    "ifixes": [
      "IJ48608m5a.231219.epkg.Z",
      "IJ48608m5b.240109.epkg.Z",
      "IJ48608s6a.230926.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.mp64:7.2.5.200-7.2.5.203"
    ],
    "issued": "20240104",
    "updated": "20240110",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45171:6.2",
      "CVE-2023-45175:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-05",
      "7200-05-06"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ48608",
    "aparNoSet": [
      "CVE-2023-45171",
      "CVE-2023-45175",
      "IJ48608"
    ],
    "fixedIn": "7200-05-07",
    "ifixes": [
      "IJ48608m5a.231219.epkg.Z",
      "IJ48608m5b.240109.epkg.Z",
      "IJ48608s6a.230926.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.7",
      "bos.mp64:7.2.5.100-7.2.5.107",
      "bos.mp64:7.2.5.200-7.2.5.203"
    ],
    "issued": "20240104",
    "updated": "20240110",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45171:6.2",
      "CVE-2023-45175:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01",
      "7300-01-02"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ48618",
    "aparNoSet": [
      "CVE-2023-45171",
      "CVE-2023-45175",
      "IJ48618"
    ],
    "fixedIn": "7300-01-03",
    "ifixes": [
      "IJ48618m1a.231219.epkg.Z",
      "IJ48618m1b.240109.epkg.Z",
      "IJ48618m2a.231213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.mp64:7.3.1.0-7.3.1.3"
    ],
    "issued": "20240104",
    "updated": "20240110",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45171:6.2",
      "CVE-2023-45175:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pmsvcs",
    "aparNo": "IJ48663",
    "aparNoSet": [
      "CVE-2023-45169",
      "IJ48663"
    ],
    "fixedIn": "3.1.4.30",
    "ifixes": [
      "IJ48663s5a.230926.epkg.Z",
      "IJ48663s6a.230926.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.2.5.200-7.2.5.201"
    ],
    "issued": "20240104",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45169:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-05",
      "7200-05-06"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pmsvcs",
    "aparNo": "IJ48663",
    "aparNoSet": [
      "CVE-2023-45169",
      "IJ48663"
    ],
    "fixedIn": "7200-05-07",
    "ifixes": [
      "IJ48663s5a.230926.epkg.Z",
      "IJ48663s6a.230926.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.2.5.0-7.2.5.4",
      "bos.pmapi.pmsvcs:7.2.5.100-7.2.5.102",
      "bos.pmapi.pmsvcs:7.2.5.200-7.2.5.201"
    ],
    "issued": "20240104",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45169:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS",
    "aparNo": "IJ48671",
    "aparNoSet": [
      "CVE-2023-45173",
      "IJ48671"
    ],
    "fixedIn": "3.1.4.30",
    "ifixes": [
      "IJ48671s6a.230927.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.net.nfs.client:7.2.5.200-7.2.5.201"
    ],
    "issued": "20240104",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45173:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-05",
      "7200-05-06"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS",
    "aparNo": "IJ48671",
    "aparNoSet": [
      "CVE-2023-45173",
      "IJ48671"
    ],
    "fixedIn": "7200-05-07",
    "ifixes": [
      "IJ48671s6a.230927.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.net.nfs.client:7.2.5.0-7.2.5.4",
      "bos.net.nfs.client:7.2.5.100-7.2.5.102",
      "bos.net.nfs.client:7.2.5.200-7.2.5.201"
    ],
    "issued": "20240104",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45173:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01",
      "7300-01-02"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pmsvcs",
    "aparNo": "IJ48724",
    "aparNoSet": [
      "CVE-2023-45169",
      "IJ48724"
    ],
    "fixedIn": "7300-01-03",
    "ifixes": [
      "IJ48724s1a.230926.epkg.Z",
      "IJ48724s2a.230926.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.3.1.0-7.3.1.1"
    ],
    "issued": "20240104",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45169:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01",
      "7300-01-02"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS",
    "aparNo": "IJ48725",
    "aparNoSet": [
      "CVE-2023-45173",
      "IJ48725"
    ],
    "fixedIn": "7300-01-03",
    "ifixes": [
      "IJ48725s1a.230927.epkg.Z",
      "IJ48725s2a.230927.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.net.nfs.client:7.3.1.0-7.3.1.1"
    ],
    "issued": "20240104",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45173:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ48735",
    "aparNoSet": [
      "CVE-2023-45171",
      "CVE-2023-45175",
      "IJ48735"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ48735m2a.231219.epkg.Z",
      "IJ48735m2b.240109.epkg.Z",
      "IJ48735m3a.231219.epkg.Z",
      "IJ48735m3b.240109.epkg.Z",
      "IJ48735s4a.230926.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.mp64:7.3.0.0-7.3.0.5"
    ],
    "issued": "20240104",
    "updated": "20240110",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45171:6.2",
      "CVE-2023-45175:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pmsvcs",
    "aparNo": "IJ48737",
    "aparNoSet": [
      "CVE-2023-45169",
      "IJ48737"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ48737s3a.230926.epkg.Z",
      "IJ48737s4a.230926.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.3.0.0-7.3.0.3"
    ],
    "issued": "20240104",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45169:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS",
    "aparNo": "IJ48741",
    "aparNoSet": [
      "CVE-2023-45173",
      "IJ48741"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ48741m2a.231219.epkg.Z",
      "IJ48741s4a.230927.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.net.nfs.client:7.3.0.0-7.3.0.3"
    ],
    "issued": "20240104",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45173:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to AIXWindows",
    "aparNo": "IJ48758",
    "aparNoSet": [
      "CVE-2023-45172",
      "IJ48758"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ48758s4a.230928.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_advisory.asc",
    "filesets": [
      "X11.base.smt:7.3.0.0-7.3.0.0"
    ],
    "issued": "20231218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/aixwindows_fix.tar",
    "cvss": [
      "CVE-2023-45172:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation and denial of service",
    "aparNo": "IJ48784",
    "aparNoSet": [
      "CVE-2023-45166",
      "CVE-2023-45170",
      "CVE-2023-45174",
      "IJ48784"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ48784m2a.231207.epkg.Z",
      "IJ48784m2b.240202.epkg.Z",
      "IJ48784m3a.231207.epkg.Z",
      "IJ48784m3b.240202.epkg.Z",
      "IJ48784m4a.231002.epkg.Z",
      "IJ48784m4b.240202.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.3.0.0-7.3.0.2",
      "printers.rte:7.3.0.0-7.3.0.2"
    ],
    "issued": "20231212",
    "updated": "20240203",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar",
    "cvss": [
      "CVE-2023-45166:8.4",
      "CVE-2023-45170:8.4",
      "CVE-2023-45174:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21",
      "3.1.4.31"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "IJ49094",
    "aparNoSet": [
      "CVE-2023-3341",
      "IJ49093",
      "IJ49094"
    ],
    "fixedIn": "3.1.4.40",
    "ifixes": [
      "IJ49094s4.231110.epkg.Z",
      "IJ49093s7.231109.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.200-7.2.5.200"
    ],
    "issued": "20231218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar",
    "cvss": [
      "CVE-2023-3341:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-05",
      "7200-05-06",
      "7200-05-07"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "IJ49094",
    "aparNoSet": [
      "CVE-2023-3341",
      "IJ49093",
      "IJ49094"
    ],
    "fixedIn": "7200-05-08",
    "ifixes": [
      "IJ49094s4.231110.epkg.Z",
      "IJ49093s7.231109.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.100-7.2.5.101",
      "bos.net.tcp.bind:7.2.5.200-7.2.5.200"
    ],
    "issued": "20231218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar",
    "cvss": [
      "CVE-2023-3341:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "AIX is vulnerable to denial of service due to ISC BIND",
    "aparNo": "IJ49094",
    "aparNoSet": [
      "CVE-2023-3341",
      "IJ49093",
      "IJ49094"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ49094s4.231110.epkg.Z",
      "IJ49093s7.231109.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory25.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.5.100-7.2.5.101"
    ],
    "issued": "20231218",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix25.tar",
    "cvss": [
      "CVE-2023-3341:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - kernel",
    "aparNo": "IJ49202",
    "aparNoSet": [
      "CVE-2023-45171",
      "CVE-2023-45175",
      "IJ49202"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ49202m2a.231219.epkg.Z",
      "IJ49202m2b.240109.epkg.Z",
      "IJ49202m3a.231219.epkg.Z",
      "IJ49202m3b.240109.epkg.Z",
      "IJ49202s4a.231120.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.mp64:7.2.5.100-7.2.5.107"
    ],
    "issued": "20240104",
    "updated": "20240110",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45171:6.2",
      "CVE-2023-45175:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation and denial of service",
    "aparNo": "IJ49461",
    "aparNoSet": [
      "CVE-2023-45166",
      "CVE-2023-45170",
      "CVE-2023-45174",
      "IJ49461"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ49461m2a.231207.epkg.Z",
      "IJ49461m2c.240202.epkg.Z",
      "IJ49461m4a.231207.epkg.Z",
      "IJ49461m4b.240202.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_advisory.asc",
    "filesets": [
      "bos.rte.printers:7.2.5.100-7.2.5.101"
    ],
    "issued": "20231212",
    "updated": "20240203",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/printers_fix.tar",
    "cvss": [
      "CVE-2023-45166:8.4",
      "CVE-2023-45170:8.4",
      "CVE-2023-45174:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - NFS",
    "aparNo": "IJ49533",
    "aparNoSet": [
      "CVE-2023-45173",
      "IJ49533"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ49533m4a.231219.epkg.Z",
      "IJ49533s4a.231219.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.net.nfs.client:7.2.5.100-7.2.5.102"
    ],
    "issued": "20240104",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45173:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "AIX is vulnerable to denial of service vulnerabilities - pmsvcs",
    "aparNo": "IJ49534",
    "aparNoSet": [
      "CVE-2023-45169",
      "IJ49534"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ49534s3a.231213.epkg.Z",
      "IJ49534s4a.231213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory6.asc",
    "filesets": [
      "bos.pmapi.pmsvcs:7.2.5.100-7.2.5.102"
    ],
    "issued": "20240104",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix6.tar",
    "cvss": [
      "CVE-2023-45169:6.2"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-02-00",
      "7300-02-01"
    ],
    "apAbstract": "Print queue status does not update",
    "aparNo": "IJ49882",
    "aparNoSet": [
      "IJ49882"
    ],
    "fixedIn": "7300-02-02",
    "ifixes": [
      "IJ49882s1a.240129.AIX73TL02SP00-01.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7131625",
    "filesets": [
      "bos.rte.printers:7.3.2.0-7.3.2.0"
    ],
    "issued": "20240312",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij49737/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-07"
    ],
    "apAbstract": "Print queue status does not update",
    "aparNo": "IJ49883",
    "aparNoSet": [
      "IJ49883"
    ],
    "fixedIn": "7200-05-08",
    "ifixes": [
      "IJ49883s7a.240129.AIX72TL05SP07.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7131625",
    "filesets": [
      "bos.rte.printers:7.2.5.202-7.2.5.202"
    ],
    "issued": "20240312",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij49737/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-01-03"
    ],
    "apAbstract": "Print queue status does not update",
    "aparNo": "IJ49914",
    "aparNoSet": [
      "IJ49914"
    ],
    "fixedIn": "7300-01-04",
    "ifixes": [
      "IJ49914s3a.240311.AIX73TL01SP03.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7131625",
    "filesets": [
      "bos.rte.printers:7.3.1.2-7.3.1.2"
    ],
    "issued": "20240312",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij49737/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.4.0",
      "3.1.4.10",
      "3.1.4.20",
      "3.1.4.21",
      "3.1.4.30",
      "3.1.4.31"
    ],
    "apAbstract": "Unable to login as padmin after VIOS 4.1 upgrade",
    "aparNo": "IJ50326",
    "aparNoSet": [
      "IJ50326"
    ],
    "fixedIn": "3.1.4.40",
    "ifixes": [
      "IJ50326m5b.240402.VIOS3.1.4.10.epkg.Z",
      "IJ50326m6c.240402.VIOS3.1.4.21.epkg.Z",
      "IJ50326s7b.240401.VIOS.3.1.4.31.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7145269",
    "filesets": [
      "ios.cli.rte:7.2.5.200-7.2.5.205"
    ],
    "issued": "20240402",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij50326/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21",
      "3.1.4.31"
    ],
    "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)",
    "aparNo": "IJ50424",
    "aparNoSet": [
      "CVE-2023-51765",
      "IJ50424"
    ],
    "fixedIn": "3.1.4.40",
    "ifixes": [
      "IJ50424s7a.240315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc",
    "filesets": [
      "bos.net.tcp.sendmail:7.2.5.200-7.2.5.200"
    ],
    "issued": "20240411",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar",
    "cvss": [
      "CVE-2023-51765:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-05",
      "7200-05-06",
      "7200-05-07"
    ],
    "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)",
    "aparNo": "IJ50424",
    "aparNoSet": [
      "CVE-2023-51765",
      "IJ50424"
    ],
    "fixedIn": "7200-05-08",
    "ifixes": [
      "IJ50424s7a.240315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc",
    "filesets": [
      "bos.net.tcp.sendmail:7.2.5.0-7.2.5.101",
      "bos.net.tcp.sendmail:7.2.5.200-7.2.5.200"
    ],
    "issued": "20240411",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar",
    "cvss": [
      "CVE-2023-51765:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "4.1.0.10"
    ],
    "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)",
    "aparNo": "IJ50428",
    "aparNoSet": [
      "CVE-2023-51765",
      "IJ50428"
    ],
    "fixedIn": "4.1.0.20",
    "ifixes": [
      "IJ50428s1a.240315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc",
    "filesets": [
      "bos.net.tcp.sendmail:7.3.2.0-7.3.2.0"
    ],
    "issued": "20240411",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar",
    "cvss": [
      "CVE-2023-51765:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-02-01"
    ],
    "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)",
    "aparNo": "IJ50428",
    "aparNoSet": [
      "CVE-2023-51765",
      "IJ50428"
    ],
    "fixedIn": "7300-02-02",
    "ifixes": [
      "IJ50428s1a.240315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc",
    "filesets": [
      "bos.net.tcp.sendmail:7.3.2.0-7.3.2.0"
    ],
    "issued": "20240411",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar",
    "cvss": [
      "CVE-2023-51765:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01",
      "7300-01-02",
      "7300-01-03"
    ],
    "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)",
    "aparNo": "IJ50432",
    "aparNoSet": [
      "CVE-2023-51765",
      "IJ50432"
    ],
    "fixedIn": "7300-01-04",
    "ifixes": [
      "IJ50432s3a.240315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc",
    "filesets": [
      "bos.net.tcp.sendmail:7.3.1.0-7.3.1.0"
    ],
    "issued": "20240411",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar",
    "cvss": [
      "CVE-2023-51765:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)",
    "aparNo": "IJ50433",
    "aparNoSet": [
      "CVE-2023-51765",
      "IJ50433"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ50433s4a.240315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc",
    "filesets": [
      "bos.net.tcp.sendmail:7.3.0.0-7.3.0.0"
    ],
    "issued": "20240411",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar",
    "cvss": [
      "CVE-2023-51765:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.3.0",
      "3.1.3.10",
      "3.1.3.14",
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "Unable to login as padmin after VIOS 4.1 upgrade",
    "aparNo": "IJ50453",
    "aparNoSet": [
      "IJ50453"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ50453m4b.240401.VIOS3.1.3.40.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7145269",
    "filesets": [
      "ios.cli.rte:7.2.5.0-7.2.5.107"
    ],
    "issued": "20240402",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij50326/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "AIX is vulnerable to email spoofing due to sendmail (CVE-2023-51765)",
    "aparNo": "IJ50508",
    "aparNoSet": [
      "CVE-2023-51765",
      "IJ50508"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ50508s1a.240325.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_advisory4.asc",
    "filesets": [
      "bos.net.tcp.sendmail:7.2.5.100-7.2.5.101"
    ],
    "issued": "20240411",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail_fix4.tar",
    "cvss": [
      "CVE-2023-51765:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "4.1.0.10"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)",
    "aparNo": "IJ50601",
    "aparNoSet": [
      "CVE-2024-25062",
      "IJ50601"
    ],
    "fixedIn": "4.1.0.20",
    "ifixes": [
      "IJ50601s1a.240409.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc",
    "filesets": [
      "bos.rte.control:7.3.2.0-7.3.2.0"
    ],
    "issued": "20240508",
    "updated": "20240604",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar",
    "cvss": [
      "CVE-2024-25062:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-02-01"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)",
    "aparNo": "IJ50601",
    "aparNoSet": [
      "CVE-2024-25062",
      "IJ50601"
    ],
    "fixedIn": "7300-02-02",
    "ifixes": [
      "IJ50601s1a.240409.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc",
    "filesets": [
      "bos.rte.control:7.3.2.0-7.3.2.0"
    ],
    "issued": "20240508",
    "updated": "20240604",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar",
    "cvss": [
      "CVE-2024-25062:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21",
      "3.1.4.31"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)",
    "aparNo": "IJ50602",
    "aparNoSet": [
      "CVE-2024-25062",
      "IJ50602"
    ],
    "fixedIn": "3.1.4.40",
    "ifixes": [
      "IJ50602m7a.240409.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc",
    "filesets": [
      "bos.rte.control:7.2.5.200-7.2.5.202"
    ],
    "issued": "20240508",
    "updated": "20240604",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar",
    "cvss": [
      "CVE-2024-25062:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-05",
      "7200-05-06",
      "7200-05-07"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)",
    "aparNo": "IJ50602",
    "aparNoSet": [
      "CVE-2024-25062",
      "IJ50602"
    ],
    "fixedIn": "7200-05-08",
    "ifixes": [
      "IJ50602m7a.240409.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc",
    "filesets": [
      "bos.rte.control:7.2.5.0-7.2.5.102",
      "bos.rte.control:7.2.5.200-7.2.5.202"
    ],
    "issued": "20240508",
    "updated": "20240604",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar",
    "cvss": [
      "CVE-2024-25062:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01",
      "7300-01-02",
      "7300-01-03"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)",
    "aparNo": "IJ50635",
    "aparNoSet": [
      "CVE-2024-25062",
      "IJ50635"
    ],
    "fixedIn": "7300-01-04",
    "ifixes": [
      "IJ50635m3a.240409.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc",
    "filesets": [
      "bos.rte.control:7.3.1.0-7.3.1.2"
    ],
    "issued": "20240508",
    "updated": "20240604",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar",
    "cvss": [
      "CVE-2024-25062:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)",
    "aparNo": "IJ50827",
    "aparNoSet": [
      "CVE-2024-25062",
      "IJ50827"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ50827m4a.240409.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc",
    "filesets": [
      "bos.rte.control:7.3.0.0-7.3.0.3"
    ],
    "issued": "20240508",
    "updated": "20240604",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar",
    "cvss": [
      "CVE-2024-25062:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "AIX is vulnerable to a denial of service due to libxml2 (CVE-2024-25062)",
    "aparNo": "IJ50828",
    "aparNoSet": [
      "CVE-2024-25062",
      "IJ50828"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ50828m4a.240409.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory6.asc",
    "filesets": [],
    "issued": "20240508",
    "updated": "20240604",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix6.tar",
    "cvss": [
      "CVE-2024-25062:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.10",
      "3.1.4.21",
      "3.1.4.31"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)",
    "aparNo": "IJ50910",
    "aparNoSet": [
      "CVE-2024-27273",
      "IJ50910"
    ],
    "fixedIn": "3.1.4.40",
    "ifixes": [
      "IJ50910m5a.240502.epkg.Z",
      "IJ50910m6a.240502.epkg.Z",
      "IJ50910s7a.240418.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc",
    "filesets": [
      "bos.mp64:7.2.5.200-7.2.5.205"
    ],
    "issued": "20240506",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar",
    "cvss": [
      "CVE-2024-27273:8.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-05",
      "7200-05-06",
      "7200-05-07"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)",
    "aparNo": "IJ50910",
    "aparNoSet": [
      "CVE-2024-27273",
      "IJ50910"
    ],
    "fixedIn": "7200-05-08",
    "ifixes": [
      "IJ50910m5a.240502.epkg.Z",
      "IJ50910m6a.240502.epkg.Z",
      "IJ50910s7a.240418.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc",
    "filesets": [
      "bos.mp64:7.2.5.0-7.2.5.107",
      "bos.mp64:7.2.5.200-7.2.5.205"
    ],
    "issued": "20240506",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar",
    "cvss": [
      "CVE-2024-27273:8.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "4.1.0.10"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)",
    "aparNo": "IJ50934",
    "aparNoSet": [
      "CVE-2024-27273",
      "IJ50934"
    ],
    "fixedIn": "4.1.0.20",
    "ifixes": [
      "IJ50934s1a.240418.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc",
    "filesets": [
      "bos.mp64:7.3.2.0-7.3.2.1"
    ],
    "issued": "20240506",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar",
    "cvss": [
      "CVE-2024-27273:8.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-02-01"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)",
    "aparNo": "IJ50934",
    "aparNoSet": [
      "CVE-2024-27273",
      "IJ50934"
    ],
    "fixedIn": "7300-02-02",
    "ifixes": [
      "IJ50934s1a.240418.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc",
    "filesets": [
      "bos.mp64:7.3.2.0-7.3.2.1"
    ],
    "issued": "20240506",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar",
    "cvss": [
      "CVE-2024-27273:8.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-01",
      "7300-01-02",
      "7300-01-03"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)",
    "aparNo": "IJ50935",
    "aparNoSet": [
      "CVE-2024-27273",
      "IJ50935"
    ],
    "fixedIn": "7300-01-04",
    "ifixes": [
      "IJ50935m1a.240502.epkg.Z",
      "IJ50935m2a.240502.epkg.Z",
      "IJ50935s3a.240418.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc",
    "filesets": [
      "bos.mp64:7.3.1.0-7.3.1.4"
    ],
    "issued": "20240506",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar",
    "cvss": [
      "CVE-2024-27273:8.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)",
    "aparNo": "IJ50936",
    "aparNoSet": [
      "CVE-2024-27273",
      "IJ50936"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ50936m2a.240502.epkg.Z",
      "IJ50936m3a.240502.epkg.Z",
      "IJ50936m4a.240502.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc",
    "filesets": [
      "bos.mp64:7.3.0.0-7.3.0.5"
    ],
    "issued": "20240506",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar",
    "cvss": [
      "CVE-2024-27273:8.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.3.21",
      "3.1.3.30",
      "3.1.3.40"
    ],
    "apAbstract": "AIX is vulnerable to privilege escalation (CVE-2024-27273)",
    "aparNo": "IJ50937",
    "aparNoSet": [
      "CVE-2024-27273",
      "IJ50937"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ50937m2a.240502.epkg.Z",
      "IJ50937m3a.240502.epkg.Z",
      "IJ50937m4a.240502.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_advisory7.asc",
    "filesets": [],
    "issued": "20240506",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernel_fix7.tar",
    "cvss": [
      "CVE-2024-27273:8.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.4.40",
      "3.1.4.41"
    ],
    "apAbstract": "Some 10GbE/40GbE RoCE adapters do not configure",
    "aparNo": "IJ51639",
    "aparNoSet": [
      "IJ51639"
    ],
    "fixedIn": "3.1.4.50",
    "ifixes": [
      "IJ51639s8a.240718.VIOS3.1.4.40-41.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7159650",
    "filesets": [
      "devices.ethernet.mlx.rte:7.2.5.202-7.2.5.202"
    ],
    "issued": "20240730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij51639/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-05-08-2419",
      "7200-05-08-2420"
    ],
    "apAbstract": "Some 10GbE/40GbE RoCE adapters do not configure",
    "aparNo": "IJ51639",
    "aparNoSet": [
      "IJ51639"
    ],
    "fixedIn": "7200-05-09",
    "ifixes": [
      "IJ51639s8a.240718.AIX72TL05SP08.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7159650",
    "filesets": [
      "devices.ethernet.mlx.rte:7.2.5.202-7.2.5.202"
    ],
    "issued": "20240730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij51639/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "4.1.0.20",
      "4.1.0.21"
    ],
    "apAbstract": "Some 10GbE/40GbE RoCE adapters do not configure",
    "aparNo": "IJ51842",
    "aparNoSet": [
      "IJ51842"
    ],
    "fixedIn": "4.1.1.0",
    "ifixes": [
      "IJ51842s2a.240718.VIOS4.1.0.20-21.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7159650",
    "filesets": [
      "devices.ethernet.mlx.rte:7.3.2.1-7.3.2.1"
    ],
    "issued": "20240730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij51639/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-02-02-2419",
      "7300-02-02-2420"
    ],
    "apAbstract": "Some 10GbE/40GbE RoCE adapters do not configure",
    "aparNo": "IJ51842",
    "aparNoSet": [
      "IJ51842"
    ],
    "fixedIn": "7300-02-03",
    "ifixes": [
      "IJ51842s2a.240718.AIX73TL02SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7159650",
    "filesets": [
      "devices.ethernet.mlx.rte:7.3.2.1-7.3.2.1"
    ],
    "issued": "20240730",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "http://aix.software.ibm.com/aix/ifixes/ij51639/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-01-1543",
      "7200-00-02-1614",
      "7200-00-03-1642",
      "7200-00-04-1717",
      "7200-00-05-1720",
      "7200-00-06-1806",
      "7200-01-00-1642",
      "7200-01-01-1643",
      "7200-01-02-1717",
      "7200-01-03-1720",
      "7200-01-04-1806",
      "7200-01-05-1845",
      "7200-01-06-1914",
      "7200-02-00-1731",
      "7200-02-01-1731",
      "7200-02-01-1732",
      "7200-02-02-1810",
      "7200-02-02-1832",
      "7200-02-03-1845",
      "7200-02-04-1914",
      "7200-02-05-1938",
      "7200-02-06-2016",
      "7200-03-00-1837",
      "7200-03-01-1838",
      "7200-03-02-1846",
      "7200-03-03-1914",
      "7200-03-04-1938",
      "7200-03-05-2016",
      "7200-03-06-2038",
      "7200-03-07-2114",
      "7200-04-00-1939",
      "7200-04-01-1939",
      "7200-04-02-2016",
      "7200-04-02-2028",
      "7200-04-03-2038",
      "7200-04-04-2114",
      "7200-04-05-2148",
      "7200-04-06-2220",
      "7200-05-00-2028",
      "7200-05-00-2037",
      "7200-05-01-2038",
      "7200-05-02-2114",
      "7200-05-03-2136",
      "7200-05-03-2148",
      "7200-05-04-2220",
      "7200-05-05-2246",
      "7200-05-06-2320",
      "7200-05-07-2346",
      "7200-05-08-2420"
    ],
    "apAbstract": "Potential undetected data loss can occur when copying or writing to files on an SMB share using the AIX SMB Client",
    "aparNo": "IJ52123",
    "aparNoSet": [
      "IJ52123"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7166703",
    "filesets": [
      "smbc.rte:7.2.302.6-7.2.302.5000"
    ],
    "issued": "20241022",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7300-00-00",
      "7300-00-01-2148",
      "7300-00-02-2220",
      "7300-00-03-2246",
      "7300-00-04-2320",
      "7300-01-00",
      "7300-01-01-2246",
      "7300-01-02-2320",
      "7300-01-03-2346",
      "7300-01-04-2420",
      "7300-02-00",
      "7300-02-01-2346",
      "7300-02-02-2420"
    ],
    "apAbstract": "Potential undetected data loss can occur when copying or writing to files on an SMB share using the AIX SMB Client",
    "aparNo": "IJ52123",
    "aparNoSet": [
      "IJ52123"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "See",
      "Bulletin"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7166703",
    "filesets": [
      "smbc.rte:7.3.302.0-7.3.302.1"
    ],
    "issued": "20241022",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://www.ibm.com/resources/mrs/assets?source\u003daixbp",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.21",
      "3.1.4.31",
      "3.1.4.41"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - TCPIP",
    "aparNo": "IJ52366",
    "aparNoSet": [
      "CVE-2024-52906",
      "IJ52366"
    ],
    "fixedIn": "3.1.4.50",
    "ifixes": [
      "IJ52366s6a.241113.epkg.Z",
      "IJ52366s7a.241113.epkg.Z",
      "IJ52366s8a.241031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.5.0-7.2.5.205"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-52906:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-06",
      "7200-05-07",
      "7200-05-08"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - TCPIP",
    "aparNo": "IJ52366",
    "aparNoSet": [
      "CVE-2024-52906",
      "IJ52366"
    ],
    "fixedIn": "7200-05-09",
    "ifixes": [
      "IJ52366s6a.241113.epkg.Z",
      "IJ52366s7a.241113.epkg.Z",
      "IJ52366s8a.241031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.5.0-7.2.5.205"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-52906:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "4.1.0.10",
      "4.1.0.21"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - TCPIP",
    "aparNo": "IJ52421",
    "aparNoSet": [
      "CVE-2024-52906",
      "IJ52421"
    ],
    "fixedIn": "4.1.0.30",
    "ifixes": [
      "IJ52421s1a.241112.epkg.Z",
      "IJ52421s2a.241031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.3.2.0-7.3.2.1"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-52906:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-02-01",
      "7300-02-02"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - TCPIP",
    "aparNo": "IJ52421",
    "aparNoSet": [
      "CVE-2024-52906",
      "IJ52421"
    ],
    "fixedIn": "7300-02-03",
    "ifixes": [
      "IJ52421s1a.241112.epkg.Z",
      "IJ52421s2a.241031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.3.2.0-7.3.2.1"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-52906:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.21",
      "3.1.4.31",
      "3.1.4.41"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - perfstat",
    "aparNo": "IJ52533",
    "aparNoSet": [
      "CVE-2024-47102",
      "IJ52533"
    ],
    "fixedIn": "3.1.4.50",
    "ifixes": [
      "IJ52533m8a.241204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.perf.perfstat:7.2.5.0-7.2.5.202"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-47102:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-06",
      "7200-05-07",
      "7200-05-08"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - perfstat",
    "aparNo": "IJ52533",
    "aparNoSet": [
      "CVE-2024-47102",
      "IJ52533"
    ],
    "fixedIn": "7200-05-09",
    "ifixes": [
      "IJ52533m8a.241204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.perf.perfstat:7.2.5.0-7.2.5.202"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-47102:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "4.1.0.10",
      "4.1.0.21"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - perfstat",
    "aparNo": "IJ52610",
    "aparNoSet": [
      "CVE-2024-47102",
      "IJ52610"
    ],
    "fixedIn": "4.1.0.30",
    "ifixes": [
      "IJ52610m2a.241204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.perf.perfstat:7.3.2.0-7.3.2.0"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-47102:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-02-01",
      "7300-02-02"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - perfstat",
    "aparNo": "IJ52610",
    "aparNoSet": [
      "CVE-2024-47102",
      "IJ52610"
    ],
    "fixedIn": "7300-02-03",
    "ifixes": [
      "IJ52610m2a.241204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.perf.perfstat:7.3.2.0-7.3.2.0"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-47102:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-02",
      "7300-01-03",
      "7300-01-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - TCPIP",
    "aparNo": "IJ52977",
    "aparNoSet": [
      "CVE-2024-52906",
      "IJ52977"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ52977s2a.241113.epkg.Z",
      "IJ52977s3a.241113.epkg.Z",
      "IJ52977s4a.241031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.3.1.0-7.3.1.5"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-52906:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-02",
      "7300-01-03",
      "7300-01-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - perfstat",
    "aparNo": "IJ52978",
    "aparNoSet": [
      "CVE-2024-47102",
      "IJ52978"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ52978m4a.241204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.perf.perfstat:7.3.1.0-7.3.1.1"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-47102:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - TCPIP",
    "aparNo": "IJ52999",
    "aparNoSet": [
      "CVE-2024-52906",
      "IJ52999"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ52999m2a.241216.epkg.Z",
      "IJ52999m3a.241216.epkg.Z",
      "IJ52999s4a.241105.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.3.0.0-7.3.0.4"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-52906:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-00-02",
      "7300-00-03",
      "7300-00-04"
    ],
    "apAbstract": "AIX is vulnerable to denial of service (CVE-2024-47102 CVE-2024-52906) - perfstat",
    "aparNo": "IJ53001",
    "aparNoSet": [
      "CVE-2024-47102",
      "IJ53001"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ53001m2a.241216.epkg.Z",
      "IJ53001m3a.241216.epkg.Z",
      "IJ53001m4a.241204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_advisory.asc",
    "filesets": [
      "bos.perf.perfstat:7.3.0.0-7.3.0.2"
    ],
    "issued": "20241224",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/kernext_fix.tar",
    "cvss": [
      "CVE-2024-47102:5.5"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "4.1.1.0"
    ],
    "apAbstract": "VIO client I/O may hang or fail",
    "aparNo": "IJ53478",
    "aparNoSet": [
      "IJ53478"
    ],
    "fixedIn": "4.1.1.10",
    "ifixes": [
      "IJ53478s0c.250210.VIOS4.1.1.0.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7185541",
    "filesets": [
      "devices.vdevice.IBM.vfc-server.rte:7.3.3.0-7.3.3.0"
    ],
    "issued": "20250324",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij53478/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "3.1.4.31",
      "3.1.4.41",
      "3.1.4.50"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution (CVE-2024-56346 CVE-2024-56347)",
    "aparNo": "IJ53757",
    "aparNoSet": [
      "CVE-2024-56346",
      "CVE-2024-56347",
      "IJ53757"
    ],
    "fixedIn": "3.1.4.60",
    "ifixes": [
      "IJ53757m7a.250317.epkg.Z",
      "IJ53757m7b.250317.epkg.Z",
      "IJ53757m8a.250318.epkg.Z",
      "IJ53757m8b.250318.epkg.Z",
      "IJ53757m9a.250317.epkg.Z",
      "IJ53757m9b.250317.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.2.5.0-7.2.5.203",
      "bos.sysmgt.nim.master:7.2.5.0-7.2.5.204",
      "bos.sysmgt.sysbr:7.2.5.0-7.2.5.203"
    ],
    "issued": "20250318",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_fix.tar",
    "cvss": [
      "CVE-2024-56346:10",
      "CVE-2024-56347:9.6"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-05-07",
      "7200-05-08",
      "7200-05-09"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution (CVE-2024-56346 CVE-2024-56347)",
    "aparNo": "IJ53757",
    "aparNoSet": [
      "CVE-2024-56346",
      "CVE-2024-56347",
      "IJ53757"
    ],
    "fixedIn": "7200-05-10",
    "ifixes": [
      "IJ53757m7a.250317.epkg.Z",
      "IJ53757m7b.250317.epkg.Z",
      "IJ53757m8a.250318.epkg.Z",
      "IJ53757m8b.250318.epkg.Z",
      "IJ53757m9a.250317.epkg.Z",
      "IJ53757m9b.250317.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.2.5.0-7.2.5.203",
      "bos.sysmgt.nim.master:7.2.5.0-7.2.5.204",
      "bos.sysmgt.sysbr:7.2.5.0-7.2.5.203"
    ],
    "issued": "20250318",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_fix.tar",
    "cvss": [
      "CVE-2024-56346:10",
      "CVE-2024-56347:9.6"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "4.1.1.0"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution (CVE-2024-56346 CVE-2024-56347)",
    "aparNo": "IJ53792",
    "aparNoSet": [
      "CVE-2024-56346",
      "CVE-2024-56347",
      "IJ53792"
    ],
    "fixedIn": "4.1.1.10",
    "ifixes": [
      "IJ53792m0a.250317.epkg.Z",
      "IJ53792m0b.250317.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.3.3.0-7.3.3.0",
      "bos.sysmgt.nim.master:7.3.3.0-7.3.3.0",
      "bos.sysmgt.sysbr:7.3.3.0-7.3.3.0"
    ],
    "issued": "20250318",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_fix.tar",
    "cvss": [
      "CVE-2024-56346:10",
      "CVE-2024-56347:9.6"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-03-00"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution (CVE-2024-56346 CVE-2024-56347)",
    "aparNo": "IJ53792",
    "aparNoSet": [
      "CVE-2024-56346",
      "CVE-2024-56347",
      "IJ53792"
    ],
    "fixedIn": "7300-03-01",
    "ifixes": [
      "IJ53792m0a.250317.epkg.Z",
      "IJ53792m0b.250317.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.3.3.0-7.3.3.0",
      "bos.sysmgt.nim.master:7.3.3.0-7.3.3.0",
      "bos.sysmgt.sysbr:7.3.3.0-7.3.3.0"
    ],
    "issued": "20250318",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_fix.tar",
    "cvss": [
      "CVE-2024-56346:10",
      "CVE-2024-56347:9.6"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "4.1.0.10",
      "4.1.0.21",
      "4.1.0.30"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution (CVE-2024-56346 CVE-2024-56347)",
    "aparNo": "IJ53923",
    "aparNoSet": [
      "CVE-2024-56346",
      "CVE-2024-56347",
      "IJ53923"
    ],
    "fixedIn": "4.1.0.40",
    "ifixes": [
      "IJ53923m1a.250317.epkg.Z",
      "IJ53923m1b.250317.epkg.Z",
      "IJ53923m2a.250317.epkg.Z",
      "IJ53923m2b.250317.epkg.Z",
      "IJ53923m3a.250317.epkg.Z",
      "IJ53923m3b.250317.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.3.2.0-7.3.2.2",
      "bos.sysmgt.nim.master:7.3.2.0-7.3.2.2",
      "bos.sysmgt.sysbr:7.3.2.0-7.3.2.2"
    ],
    "issued": "20250318",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_fix.tar",
    "cvss": [
      "CVE-2024-56346:10",
      "CVE-2024-56347:9.6"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-02-01",
      "7300-02-02",
      "7300-02-03"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution (CVE-2024-56346 CVE-2024-56347)",
    "aparNo": "IJ53923",
    "aparNoSet": [
      "CVE-2024-56346",
      "CVE-2024-56347",
      "IJ53923"
    ],
    "fixedIn": "7300-02-04",
    "ifixes": [
      "IJ53923m1a.250317.epkg.Z",
      "IJ53923m1b.250317.epkg.Z",
      "IJ53923m2a.250317.epkg.Z",
      "IJ53923m2b.250317.epkg.Z",
      "IJ53923m3a.250317.epkg.Z",
      "IJ53923m3b.250317.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.3.2.0-7.3.2.2",
      "bos.sysmgt.nim.master:7.3.2.0-7.3.2.2",
      "bos.sysmgt.sysbr:7.3.2.0-7.3.2.2"
    ],
    "issued": "20250318",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_fix.tar",
    "cvss": [
      "CVE-2024-56346:10",
      "CVE-2024-56347:9.6"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7300-01-03",
      "7300-01-04"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution (CVE-2024-56346 CVE-2024-56347)",
    "aparNo": "IJ53929",
    "aparNoSet": [
      "CVE-2024-56346",
      "CVE-2024-56347",
      "IJ53929"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IJ53929m3a.250317.epkg.Z",
      "IJ53929m3b.250317.epkg.Z",
      "IJ53929m4a.250317.epkg.Z",
      "IJ53929m4b.250317.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_advisory.asc",
    "filesets": [
      "bos.sysmgt.nim.client:7.3.1.0-7.3.1.3",
      "bos.sysmgt.nim.master:7.3.1.0-7.3.1.3",
      "bos.sysmgt.sysbr:7.3.1.0-7.3.1.3"
    ],
    "issued": "20250318",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nim_fix.tar",
    "cvss": [
      "CVE-2024-56346:10",
      "CVE-2024-56347:9.6"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06"
    ],
    "apAbstract": "SYSTEM CRASH IN NETINFO_UNIXDOMNLIST",
    "aparNo": "IV09793",
    "aparNoSet": [
      "IV09793"
    ],
    "fixedIn": "6100-06-07",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV09793",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.17"
    ],
    "issued": "20111025",
    "updated": "20130226",
    "siblings": [
      "6100-05:IV12592",
      "6100-06:IV09793",
      "6100-07:IV09981",
      "6100-08:IV10663",
      "7100-00:IV20295",
      "7100-01:IV09942"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00"
    ],
    "apAbstract": "SYSTEM CRASH IN NETINFO_UNIXDOMNLIST",
    "aparNo": "IV09942",
    "aparNoSet": [
      "IV09942"
    ],
    "fixedIn": "7100-01-04",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV09942",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.15"
    ],
    "issued": "20111031",
    "updated": "20130226",
    "siblings": [
      "6100-05:IV12592",
      "6100-06:IV09793",
      "6100-07:IV09981",
      "6100-08:IV10663",
      "7100-00:IV20295",
      "7100-01:IV09942"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01"
    ],
    "apAbstract": "SYSTEM CRASH IN NETINFO_UNIXDOMNLIST",
    "aparNo": "IV09981",
    "aparNoSet": [
      "IV09981"
    ],
    "fixedIn": "6100-07-02",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV09981",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.1"
    ],
    "issued": "20111031",
    "updated": "20130226",
    "siblings": [
      "6100-05:IV12592",
      "6100-06:IV09793",
      "6100-07:IV09981",
      "6100-08:IV10663",
      "7100-00:IV20295",
      "7100-01:IV09942"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08",
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10",
      "6100-06-11",
      "6100-05-00",
      "6100-05-01",
      "6100-05-02",
      "6100-05-03",
      "6100-05-04",
      "6100-05-05",
      "6100-05-06",
      "6100-05-07",
      "6100-05-08",
      "6100-05-09",
      "6100-05-10",
      "6100-05-11"
    ],
    "apAbstract": "Perl Digest Module Digest-\u003enew() Code Injection",
    "aparNo": "IV10197",
    "aparNoSet": [
      "CVE-2011-3597",
      "IV10197"
    ],
    "fixedIn": "6100-09-00",
    "ifixes": [],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163800\u0026label\u003dUPDATE%20-%20AIX%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597",
    "filesets": [
      "perl.rte:5.8.8.0-5.8.8.122"
    ],
    "issued": "20111122",
    "updated": "20130125",
    "siblings": [
      "6100-08:IV10197",
      "7100-02:IV10197"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar",
    "cvss": [
      "CVE-2011-3597:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09"
    ],
    "apAbstract": "Perl Digest Module Digest-\u003enew() Code Injection",
    "aparNo": "IV10197",
    "aparNoSet": [
      "CVE-2011-3597",
      "IV10197"
    ],
    "fixedIn": "7100-03-00",
    "ifixes": [],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163800\u0026label\u003dUPDATE%20-%20AIX%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597",
    "filesets": [
      "perl.rte:5.10.1.0-5.10.1.150"
    ],
    "issued": "20111122",
    "updated": "20130125",
    "siblings": [
      "6100-08:IV10197",
      "7100-02:IV10197"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar",
    "cvss": [
      "CVE-2011-3597:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2",
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7"
    ],
    "apAbstract": "Perl Digest Module Digest-\u003enew() Code Injection",
    "aparNo": "IV10197",
    "aparNoSet": [
      "CVE-2011-3597",
      "IV10197"
    ],
    "fixedIn": "2.2.3.0",
    "ifixes": [],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201301/SECURITY/20130128/datafile163800\u0026label\u003dUPDATE%20-%20VIOS%20Perl%20Digest%20Module%20%22Digest-%3Enew%28%29%22%20Vulnerability%20CVE-2011-3597",
    "filesets": [
      "perl.rte:5.8.8.0-5.8.8.122"
    ],
    "issued": "20111122",
    "updated": "20130125",
    "siblings": [
      "6100-08:IV10197",
      "7100-02:IV10197"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_ifix2.tar",
    "cvss": [
      "CVE-2011-3597:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06"
    ],
    "apAbstract": "AIX NFSv4 vulnerability",
    "aparNo": "IV10327",
    "aparNoSet": [
      "CVE-2012-4817",
      "IV10327"
    ],
    "fixedIn": "6100-06-07",
    "ifixes": [
      "6100-06-07"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dAIX%20NFSv4%20Vulnerability%20CVE-2012-4817",
    "filesets": [
      "bos.net.nfs.client:6.1.6.0-6.1.6.17"
    ],
    "issued": "20120913",
    "updated": "null",
    "siblings": [
      "6100-05:IV09495",
      "6100-06:IV10327",
      "6100-07:IV11629",
      "6100-08:IV11511",
      "7100-00:IV26436",
      "7100-01:IV12169",
      "7100-02:IV11502"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar",
    "cvss": [
      "CVE-2012-4817:5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02"
    ],
    "apAbstract": "AIX NFSv4 vulnerability",
    "aparNo": "IV11629",
    "aparNoSet": [
      "CVE-2012-4817",
      "IV11629"
    ],
    "fixedIn": "6100-07-03",
    "ifixes": [
      "6100-07-03"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dAIX%20NFSv4%20Vulnerability%20CVE-2012-4817",
    "filesets": [
      "bos.net.nfs.client:6.1.7.0-6.1.7.2"
    ],
    "issued": "20120913",
    "updated": "null",
    "siblings": [
      "6100-05:IV09495",
      "6100-06:IV10327",
      "6100-07:IV11629",
      "6100-08:IV11511",
      "7100-00:IV26436",
      "7100-01:IV12169",
      "7100-02:IV11502"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar",
    "cvss": [
      "CVE-2012-4817:5"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03"
    ],
    "apAbstract": "AIX NFSv4 vulnerability",
    "aparNo": "IV12169",
    "aparNoSet": [
      "CVE-2012-4817",
      "IV12169"
    ],
    "fixedIn": "7100-01-04",
    "ifixes": [
      "IV26436s07.120907.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dAIX%20NFSv4%20Vulnerability%20CVE-2012-4817",
    "filesets": [
      "bos.net.nfs.client:7.1.1.0-7.1.1.3"
    ],
    "issued": "20120913",
    "updated": "null",
    "siblings": [
      "6100-05:IV09495",
      "6100-06:IV10327",
      "6100-07:IV11629",
      "6100-08:IV11511",
      "7100-00:IV26436",
      "7100-01:IV12169",
      "7100-02:IV11502"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar",
    "cvss": [
      "CVE-2012-4817:5"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-05-00",
      "6100-05-01",
      "6100-05-02",
      "6100-05-03",
      "6100-05-04",
      "6100-05-05",
      "6100-05-06",
      "6100-05-07",
      "6100-05-08"
    ],
    "apAbstract": "SYSTEM CRASH IN NETINFO_UNIXDOMNLIST",
    "aparNo": "IV12592",
    "aparNoSet": [
      "IV12592"
    ],
    "fixedIn": "6100-05-09",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV12592",
    "filesets": [
      "bos.mp64:6.1.5.0-6.1.5.10"
    ],
    "issued": "20111228",
    "updated": "20130226",
    "siblings": [
      "6100-05:IV12592",
      "6100-06:IV09793",
      "6100-07:IV09981",
      "6100-08:IV10663",
      "7100-00:IV20295",
      "7100-01:IV09942"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03"
    ],
    "apAbstract": "TCP RETRANSMIT PROCESSING IS VERY SLOW",
    "aparNo": "IV13121",
    "aparNoSet": [
      "IV13121"
    ],
    "fixedIn": "7100-01-04",
    "ifixes": [
      "IV20595m05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV13121",
    "filesets": [
      "bos.net.tcp.client:7.1.1.0-7.1.1.3"
    ],
    "issued": "20120207",
    "updated": "20130226",
    "siblings": [
      "6100-06:IV18483",
      "6100-07:IV14297",
      "6100-08:IV14524",
      "7100-01:IV13121",
      "7100-02:IV15184"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv13121/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07"
    ],
    "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().",
    "aparNo": "IV13404",
    "aparNoSet": [
      "IV13404"
    ],
    "fixedIn": "6100-07-08",
    "ifixes": [
      "U859173",
      "bos.mp64:6.1.7.19"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV13404",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.18"
    ],
    "issued": "20120118",
    "updated": "20131124",
    "siblings": [
      "6100-06:IZ94647",
      "6100-07:IV13404",
      "6100-08:IV14309",
      "6100-09:IV42440",
      "7100-00:IV42334",
      "7100-01:IV27584",
      "7100-02:IV42324",
      "7100-03:IV42412"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv13404/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08"
    ],
    "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().",
    "aparNo": "IV13405",
    "aparNoSet": [
      "IV13405"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IV13405s8a.130805.53TL12SP08.epkg.Z",
      "IV13405s8a.130805.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV13405",
    "filesets": [
      "bos.mp:5.3.12.9",
      "bos.mp64:5.3.12.9"
    ],
    "issued": "20120118",
    "updated": "20130805",
    "siblings": [
      "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo140901"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv13405/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-05-00",
      "6100-05-01",
      "6100-05-02",
      "6100-05-03",
      "6100-05-04",
      "6100-05-05",
      "6100-05-06",
      "6100-05-07",
      "6100-05-08"
    ],
    "apAbstract": "Vulnerability in AIX TCP stack",
    "aparNo": "IV13751",
    "aparNoSet": [
      "CV-2012-0194",
      "IV13751"
    ],
    "fixedIn": "6100-05-09",
    "ifixes": [
      "61JSP7_IV13751s07.120126.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.5.0-6.1.5.8"
    ],
    "issued": "20120203",
    "updated": "20131212",
    "siblings": [
      "7100-01:IV14211",
      "7100-00:IV14210",
      "6100-07:IV14209",
      "6100-06:IV13820",
      "6100-05:IV13751",
      "5300-12:IV13827"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar",
    "cvss": [
      "CVE-2012-0194:7.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.1.3.10",
      "2.1.3.0",
      "2.1.2.13",
      "2.1.2.12",
      "2.1.2.11",
      "2.1.2.0",
      "2.1.1.10",
      "2.1.1.0"
    ],
    "apAbstract": "Vulnerability in VIOS TCP stack",
    "aparNo": "IV13751",
    "aparNoSet": [
      "CV-2012-0194",
      "IV13751"
    ],
    "fixedIn": "2.2.1.4",
    "ifixes": [
      "61JVIOS_IV13751s01.120206.epkg.Z",
      "61HVIOS_IV13751s03.120204.epkg.Z",
      "61FVIOS_IV13751s1.120205.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.5.0-6.1.5.8"
    ],
    "issued": "20120203",
    "updated": "20131212",
    "siblings": [
      "7100-01:IV14211",
      "7100-00:IV14210",
      "6100-07:IV14209",
      "6100-06:IV13820",
      "6100-05:IV13751",
      "5300-12:IV13827"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar",
    "cvss": [
      "CVE-2012-0194:7.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07"
    ],
    "apAbstract": "Vulnerability in AIX TCP stack",
    "aparNo": "IV13820",
    "aparNoSet": [
      "CV-2012-0194",
      "IV13820"
    ],
    "fixedIn": "6100-06-08",
    "ifixes": [
      "61NSP6_IV13820s06.120126.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.6.0-6.1.6.17"
    ],
    "issued": "20120203",
    "updated": "20131212",
    "siblings": [
      "7100-01:IV14211",
      "7100-00:IV14210",
      "6100-07:IV14209",
      "6100-06:IV13820",
      "6100-05:IV13751",
      "5300-12:IV13827"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar",
    "cvss": [
      "CVE-2012-0194:7.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.0.0",
      "2.2.0.10",
      "2.2.0.11",
      "2.2.0.12",
      "2.2.0.13"
    ],
    "apAbstract": "Vulnerability in VIOS TCP stack",
    "aparNo": "IV13820",
    "aparNoSet": [
      "CV-2012-0194",
      "IV13820"
    ],
    "fixedIn": "2.2.1.4",
    "ifixes": [
      "61NVIOS_IV13820s.120204.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.6.0-6.1.6.17"
    ],
    "issued": "20120203",
    "updated": "20131212",
    "siblings": [
      "7100-01:IV14211",
      "7100-00:IV14210",
      "6100-07:IV14209",
      "6100-06:IV13820",
      "6100-05:IV13751",
      "5300-12:IV13827"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar",
    "cvss": [
      "CVE-2012-0194:7.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05"
    ],
    "apAbstract": "Vulnerability in AIX TCP stack",
    "aparNo": "IV13827",
    "aparNoSet": [
      "CV-2012-0194",
      "IV13827"
    ],
    "fixedIn": "5300-12-06",
    "ifixes": [
      "53XSP5_IV13827s05.120204.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.5"
    ],
    "issued": "20120203",
    "updated": "20131212",
    "siblings": [
      "7100-01:IV14211",
      "7100-00:IV14210",
      "6100-07:IV14209",
      "6100-06:IV13820",
      "6100-05:IV13751",
      "5300-12:IV13827"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar",
    "cvss": [
      "CVE-2012-0194:7.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3"
    ],
    "apAbstract": "Vulnerability in VIOS TCP stack",
    "aparNo": "IV13827",
    "aparNoSet": [
      "CV-2012-0194",
      "IV13827"
    ],
    "fixedIn": "2.2.1.4",
    "ifixes": [
      "61QS02_IV14209s02.120126.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.3"
    ],
    "issued": "20120203",
    "updated": "20131212",
    "siblings": [
      "7100-01:IV14211",
      "7100-00:IV14210",
      "6100-07:IV14209",
      "6100-06:IV13820",
      "6100-05:IV13751",
      "5300-12:IV13827"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar",
    "cvss": [
      "CVE-2012-0194:7.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03"
    ],
    "apAbstract": "Vulnerability in AIX TCP stack",
    "aparNo": "IV14209",
    "aparNoSet": [
      "CV-2012-0194",
      "IV14209"
    ],
    "fixedIn": "6100-07-04",
    "ifixes": [
      "61QS02_IV14209s02.120126.epkg.Z",
      "IV14209s03.120228.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.3"
    ],
    "issued": "20120203",
    "updated": "20131212",
    "siblings": [
      "7100-01:IV14211",
      "7100-00:IV14210",
      "6100-07:IV14209",
      "6100-06:IV13820",
      "6100-05:IV13751",
      "5300-12:IV13827"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar",
    "cvss": [
      "CVE-2012-0194:7.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04"
    ],
    "apAbstract": "Vulnerability in AIX TCP stack",
    "aparNo": "IV14210",
    "aparNoSet": [
      "CV-2012-0194",
      "IV14210"
    ],
    "fixedIn": "7100-00-05",
    "ifixes": [
      "71BSP4_IV14210s04.120129.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.0.0-7.1.0.17"
    ],
    "issued": "20120203",
    "updated": "20131212",
    "siblings": [
      "7100-01:IV14211",
      "7100-00:IV14210",
      "6100-07:IV14209",
      "6100-06:IV13820",
      "6100-05:IV13751",
      "5300-12:IV13827"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar",
    "cvss": [
      "CVE-2012-0194:7.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03"
    ],
    "apAbstract": "Vulnerability in AIX TCP stack",
    "aparNo": "IV14211",
    "aparNoSet": [
      "CV-2012-0194",
      "IV14211"
    ],
    "fixedIn": "7100-01-04",
    "ifixes": [
      "IV14211s03.120228.epkg.Z",
      "71DSP2_IV14211s02.120126.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.1.0-7.1.1.3"
    ],
    "issued": "20120203",
    "updated": "20131212",
    "siblings": [
      "7100-01:IV14211",
      "7100-00:IV14210",
      "6100-07:IV14209",
      "6100-06:IV13820",
      "6100-05:IV13751",
      "5300-12:IV13827"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/large_send_fix.tar",
    "cvss": [
      "CVE-2012-0194:7.1"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03"
    ],
    "apAbstract": "TCP RETRANSMIT PROCESSING IS VERY SLOW",
    "aparNo": "IV14297",
    "aparNoSet": [
      "IV14297"
    ],
    "fixedIn": "6100-07-04",
    "ifixes": [
      "IV14297s03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV14297",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.14"
    ],
    "issued": "20120128",
    "updated": "20130226",
    "siblings": [
      "6100-06:IV18483",
      "6100-07:IV14297",
      "6100-08:IV14524",
      "7100-01:IV13121",
      "7100-02:IV15184"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv14297/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02"
    ],
    "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().",
    "aparNo": "IV14309",
    "aparNoSet": [
      "IV14309"
    ],
    "fixedIn": "6100-08-03",
    "ifixes": [
      "U854277",
      "bos.mp64:6.1.8.16"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV14309",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.15"
    ],
    "issued": "20120130",
    "updated": "20131124",
    "siblings": [
      "6100-06:IZ94647",
      "6100-07:IV13404",
      "6100-08:IV14309",
      "6100-09:IV42440",
      "7100-00:IV42334",
      "7100-01:IV27584",
      "7100-02:IV42324",
      "7100-03:IV42412"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv14309/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02"
    ],
    "apAbstract": "DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING",
    "aparNo": "IV16514",
    "aparNoSet": [
      "IV16514"
    ],
    "fixedIn": "7100-01-03",
    "ifixes": [
      "IV16514s01.epkg.Z",
      "IV16514s02.epkg.Z",
      "IV16514s03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV16514",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.2"
    ],
    "issued": "20120229",
    "updated": "20130413",
    "siblings": [
      "6100-05:IV16568",
      "6100-06:IV16567",
      "6100-08:IV17105",
      "7100-00:IV23966",
      "7100-01:IV16514",
      "7100-02:IV17107"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv16514/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07"
    ],
    "apAbstract": "DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING",
    "aparNo": "IV16567",
    "aparNoSet": [
      "IV16567"
    ],
    "fixedIn": "6100-06-08",
    "ifixes": [
      "IV16567m72.epkg.Z",
      "IV16567s06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV16567",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.18"
    ],
    "issued": "20120301",
    "updated": "20130413",
    "siblings": [
      "6100-05:IV16568",
      "6100-06:IV16567",
      "6100-08:IV17105",
      "7100-00:IV23966",
      "7100-01:IV16514",
      "7100-02:IV17107"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv16567/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-05-00",
      "6100-05-01",
      "6100-05-02",
      "6100-05-03",
      "6100-05-04",
      "6100-05-05",
      "6100-05-06",
      "6100-05-07",
      "6100-05-08"
    ],
    "apAbstract": "DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING",
    "aparNo": "IV16568",
    "aparNoSet": [
      "IV16568"
    ],
    "fixedIn": "6100-05-09",
    "ifixes": [
      "IV16568m08.epkg.Z",
      "IV16568s07.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV16568",
    "filesets": [
      "bos.mp64:6.1.5.0-6.1.5.10"
    ],
    "issued": "20120301",
    "updated": "20130413",
    "siblings": [
      "6100-05:IV16568",
      "6100-06:IV16567",
      "6100-08:IV17105",
      "7100-00:IV23966",
      "7100-01:IV16514",
      "7100-02:IV17107"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv16568/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08"
    ],
    "apAbstract": "SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED",
    "aparNo": "IV16603",
    "aparNoSet": [
      "IV16603"
    ],
    "fixedIn": "6100-06-09",
    "ifixes": [
      "IV16603s07.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV16603",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.19"
    ],
    "issued": "20120302",
    "updated": "20130326",
    "siblings": [
      "6100-06:IV16603",
      "6100-07:IV21128",
      "6100-08:IV19341",
      "7100-00:IV21131",
      "7100-01:IV21235",
      "7100-02:IV19357"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv16603/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08"
    ],
    "apAbstract": "Vulnerability in use of socketpair",
    "aparNo": "IV16603",
    "aparNoSet": [
      "CVE-2012-2192",
      "IV16603"
    ],
    "fixedIn": "6100-06-09",
    "ifixes": [
      "IV16603s07.120514.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.18"
    ],
    "issued": "20120605",
    "updated": "null",
    "siblings": [
      "6100-06:IV16603",
      "6100-07:IV21128",
      "6100-08:IV19341",
      "7100-00:IV21131",
      "7100-01:IV21235",
      "7100-02:IV19357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar",
    "cvss": [
      "CVE-2012-2192:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08"
    ],
    "apAbstract": "JFS2 FILESYSTEM HANG IN BMASSIGN",
    "aparNo": "IV17291",
    "aparNoSet": [
      "IV17291"
    ],
    "fixedIn": "6100-06-09",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV17291",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.19"
    ],
    "issued": "20120314",
    "updated": "20130327",
    "siblings": [
      "6100-06:IV17291",
      "6100-07:IV17375",
      "6100-08:IV19995",
      "7100-00:IV17924",
      "7100-01:IV20607",
      "7100-02:IV20010"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04"
    ],
    "apAbstract": "JFS2 FILESYSTEM HANG IN BMASSIGN",
    "aparNo": "IV17375",
    "aparNoSet": [
      "IV17375"
    ],
    "fixedIn": "6100-07-05",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV17375",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.15"
    ],
    "issued": "20120315",
    "updated": "20130328",
    "siblings": [
      "6100-06:IV17291",
      "6100-07:IV17375",
      "6100-08:IV19995",
      "7100-00:IV17924",
      "7100-01:IV20607",
      "7100-02:IV20010"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05"
    ],
    "apAbstract": "AIX NFSv4 vulnerability",
    "aparNo": "IV17855",
    "aparNoSet": [
      "CVE-2012-4817",
      "IV17855"
    ],
    "fixedIn": "5300-12-06",
    "ifixes": [],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dAIX%20NFSv4%20Vulnerability%20CVE-2012-4817",
    "filesets": [
      "bos.net.nfs.client:5.3.12.0-5.3.12.5"
    ],
    "issued": "20120913",
    "updated": "null",
    "siblings": [
      "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo134282"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar",
    "cvss": [
      "CVE-2012-4817:5"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06"
    ],
    "apAbstract": "JFS2 FILESYSTEM HANG IN BMASSIGN",
    "aparNo": "IV17924",
    "aparNoSet": [
      "IV17924"
    ],
    "fixedIn": "7100-00-07",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV17924",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.19"
    ],
    "issued": "20120320",
    "updated": "20130327",
    "siblings": [
      "6100-06:IV17291",
      "6100-07:IV17375",
      "6100-08:IV19995",
      "7100-00:IV17924",
      "7100-01:IV20607",
      "7100-02:IV20010"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-05-00",
      "6100-05-01",
      "6100-05-02",
      "6100-05-03",
      "6100-05-04",
      "6100-05-05",
      "6100-05-06",
      "6100-05-07",
      "6100-05-08"
    ],
    "apAbstract": "LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR",
    "aparNo": "IV18317",
    "aparNoSet": [
      "IV18317"
    ],
    "fixedIn": "6100-05-09",
    "ifixes": [
      "IV18317s81.epkg.Z",
      "IV18317s72.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV18317",
    "filesets": [
      "bos.mp64:6.1.5.0-6.1.5.10"
    ],
    "issued": "20120327",
    "updated": "20130413",
    "siblings": [
      "6100-05:IV18317",
      "6100-06:IV18318",
      "6100-07:IV18127",
      "6100-08:IV18700",
      "7100-00:IV18319",
      "7100-01:IV18174",
      "7100-02:IV18249"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv18317/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07"
    ],
    "apAbstract": "LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR",
    "aparNo": "IV18318",
    "aparNoSet": [
      "IV18318"
    ],
    "fixedIn": "6100-06-08",
    "ifixes": [
      "IV18318s71.epkg.Z",
      "IV18318s61.epkg.Z",
      "IV18318s62.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV18318",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.18"
    ],
    "issued": "20120327",
    "updated": "20130413",
    "siblings": [
      "6100-05:IV18317",
      "6100-06:IV18318",
      "6100-07:IV18127",
      "6100-08:IV18700",
      "7100-00:IV18319",
      "7100-01:IV18174",
      "7100-02:IV18249"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv18318/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05"
    ],
    "apAbstract": "LIVE PARTITION MOBILIY MAY FAIL ON DEDICATED MEMORY LPAR",
    "aparNo": "IV18319",
    "aparNoSet": [
      "IV18319"
    ],
    "fixedIn": "7100-00-06",
    "ifixes": [
      "IV18319s51.epkg.Z",
      "IV18319s41.epkg.Z",
      "IV18319s42.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV18319",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.18"
    ],
    "issued": "20120327",
    "updated": "20130413",
    "siblings": [
      "6100-05:IV18317",
      "6100-06:IV18318",
      "6100-07:IV18127",
      "6100-08:IV18700",
      "7100-00:IV18319",
      "7100-01:IV18174",
      "7100-02:IV18249"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv18319/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07"
    ],
    "apAbstract": "TCP RETRANSMIT PROCESSING IS VERY SLOW",
    "aparNo": "IV18483",
    "aparNoSet": [
      "IV18483"
    ],
    "fixedIn": "6100-06-08",
    "ifixes": [
      "IV18483s07.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV18483",
    "filesets": [
      "bos.net.tcp.client:6.1.6.0-6.1.6.18"
    ],
    "issued": "20120329",
    "updated": "20130326",
    "siblings": [
      "6100-06:IV18483",
      "6100-07:IV14297",
      "6100-08:IV14524",
      "7100-01:IV13121",
      "7100-02:IV15184"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv18483/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05"
    ],
    "apAbstract": "Vulnerability in use of socketpair",
    "aparNo": "IV19178",
    "aparNoSet": [
      "CVE-2012-2192",
      "IV19178"
    ],
    "fixedIn": "5300-12-06",
    "ifixes": [
      "IV19178s05.120514.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair",
    "filesets": [
      "bos.mp64:5.3.12.0-5.3.12.5"
    ],
    "issued": "20120605",
    "updated": "null",
    "siblings": [
      "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo134316"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/socket_fix.tar",
    "cvss": [
      "CVE-2012-2192:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05"
    ],
    "apAbstract": "SYSTEM CRASH IN NETINFO_UNIXDOMNLIST",
    "aparNo": "IV20295",
    "aparNoSet": [
      "IV20295"
    ],
    "fixedIn": "7100-00-06",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV20295",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.18"
    ],
    "issued": "20120427",
    "updated": "20130226",
    "siblings": [
      "6100-05:IV12592",
      "6100-06:IV09793",
      "6100-07:IV09981",
      "6100-08:IV10663",
      "7100-00:IV20295",
      "7100-01:IV09942"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07"
    ],
    "apAbstract": "TCP RETRANSMIT PROCESSING IS VERY SLOW",
    "aparNo": "IV20595",
    "aparNoSet": [
      "IV20595"
    ],
    "fixedIn": "7100-00-08",
    "ifixes": [
      "IV20595m05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV20595",
    "filesets": [
      "bos.net.tcp.client:7.1.0.0-7.1.0.21"
    ],
    "issued": "20120503",
    "updated": "20130326",
    "siblings": [
      "6100-06:IV18483",
      "6100-07:IV14297",
      "6100-08:IV14524",
      "7100-01:IV13121",
      "7100-02:IV15184"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv20595/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04"
    ],
    "apAbstract": "JFS2 FILESYSTEM HANG IN BMASSIGN",
    "aparNo": "IV20607",
    "aparNoSet": [
      "IV20607"
    ],
    "fixedIn": "7100-01-05",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV20607",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.15"
    ],
    "issued": "20120503",
    "updated": "20130327",
    "siblings": [
      "6100-06:IV17291",
      "6100-07:IV17375",
      "6100-08:IV19995",
      "7100-00:IV17924",
      "7100-01:IV20607",
      "7100-02:IV20010"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06"
    ],
    "apAbstract": "A tcp connection can hang and never send the last bytes",
    "aparNo": "IV20656",
    "aparNoSet": [
      "IV20656"
    ],
    "fixedIn": "7100-01-07",
    "ifixes": [
      "IV20656.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV20656",
    "filesets": [
      "bos.net.tcp.client:7.1.1.0-7.1.1.17"
    ],
    "issued": "20120504",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV33484",
      "7100-01:IV20656",
      "7100-02:IV31960",
      "7100-03:IV32651",
      "6100-06:IV33483",
      "6100-07:IV32392",
      "6100-08:IV31959",
      "6100-09:IV32467",
      "5300-12:IV32615"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv20656/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04"
    ],
    "apAbstract": "SYSTEM HANGS OR CRASHES WHEN APP USES SHARED SYMTAB CAPABILITY.",
    "aparNo": "IV20880",
    "aparNoSet": [
      "IV20880"
    ],
    "fixedIn": "6100-07-05",
    "ifixes": [
      "IV20880s04.epkg.Z",
      "IV20880s03.epkg.Z",
      "IV20880s02.epkg.Z",
      "IV20880s01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV20880",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.15"
    ],
    "issued": "20120509",
    "updated": "20130409",
    "siblings": [
      "6100-07:IV20880",
      "6100-08:IV21846",
      "7100-01:IV21116",
      "7100-02:IV21878"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv20880/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05"
    ],
    "apAbstract": "SYSTEM HANGS OR CRASHES WHEN APP USES SHARED SYMTAB CAPABILITY.",
    "aparNo": "IV21116",
    "aparNoSet": [
      "IV21116"
    ],
    "fixedIn": "7100-01-06",
    "ifixes": [
      "IV21116s04.epkg.Z",
      "IV21116s02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV21116",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.16"
    ],
    "issued": "20120514",
    "updated": "20130409",
    "siblings": [
      "6100-07:IV20880",
      "6100-08:IV21846",
      "7100-01:IV21116",
      "7100-02:IV21878"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv21116/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04"
    ],
    "apAbstract": "SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED",
    "aparNo": "IV21128",
    "aparNoSet": [
      "IV21128"
    ],
    "fixedIn": "6100-07-05",
    "ifixes": [
      "IV21128s03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV21128",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.15"
    ],
    "issued": "20120514",
    "updated": "20130223",
    "siblings": [
      "6100-06:IV16603",
      "6100-07:IV21128",
      "6100-08:IV19341",
      "7100-00:IV21131",
      "7100-01:IV21235",
      "7100-02:IV19357"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv21128/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04"
    ],
    "apAbstract": "Vulnerability in use of socketpair",
    "aparNo": "IV21128",
    "aparNoSet": [
      "CVE-2012-2192",
      "IV21128"
    ],
    "fixedIn": "6100-07-05",
    "ifixes": [
      "IV21128s03.120514.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.3"
    ],
    "issued": "20120605",
    "updated": "null",
    "siblings": [
      "6100-06:IV16603",
      "6100-07:IV21128",
      "6100-08:IV19341",
      "7100-00:IV21131",
      "7100-01:IV21235",
      "7100-02:IV19357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar",
    "cvss": [
      "CVE-2012-2192:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06"
    ],
    "apAbstract": "SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED",
    "aparNo": "IV21131",
    "aparNoSet": [
      "IV21131"
    ],
    "fixedIn": "7100-00-07",
    "ifixes": [
      "IV21131s05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV21131",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.19"
    ],
    "issued": "20120514",
    "updated": "20130326",
    "siblings": [
      "6100-06:IV16603",
      "6100-07:IV21128",
      "6100-08:IV19341",
      "7100-00:IV21131",
      "7100-01:IV21235",
      "7100-02:IV19357"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv21131/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06"
    ],
    "apAbstract": "Vulnerability in use of socketpair",
    "aparNo": "IV21131",
    "aparNoSet": [
      "CVE-2012-2192",
      "IV21131"
    ],
    "fixedIn": "7100-00-07",
    "ifixes": [
      "IV21131s05.120515.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.3"
    ],
    "issued": "20120605",
    "updated": "null",
    "siblings": [
      "6100-06:IV16603",
      "6100-07:IV21128",
      "6100-08:IV19341",
      "7100-00:IV21131",
      "7100-01:IV21235",
      "7100-02:IV19357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar",
    "cvss": [
      "CVE-2012-2192:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04"
    ],
    "apAbstract": "SYSTEM CRASH DUE TO FREED SOCKET WHEN SOCKETPAIR() CALL USED",
    "aparNo": "IV21235",
    "aparNoSet": [
      "IV21235"
    ],
    "fixedIn": "7100-01-05",
    "ifixes": [
      "IV21131s03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV21235",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.15"
    ],
    "issued": "20120515",
    "updated": "20130223",
    "siblings": [
      "6100-06:IV16603",
      "6100-07:IV21128",
      "6100-08:IV19341",
      "7100-00:IV21131",
      "7100-01:IV21235",
      "7100-02:IV19357"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv21235/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03"
    ],
    "apAbstract": "Vulnerability in use of socketpair",
    "aparNo": "IV21235",
    "aparNoSet": [
      "CVE-2012-2192",
      "IV21235"
    ],
    "fixedIn": "7100-01-04",
    "ifixes": [
      "IV21235s03.120515.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120605/datafile162839\u0026label\u003dVulnerability%20in%20use%20of%20socketpair",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.3"
    ],
    "issued": "20120605",
    "updated": "null",
    "siblings": [
      "6100-06:IV16603",
      "6100-07:IV21128",
      "6100-08:IV19341",
      "7100-00:IV21131",
      "7100-01:IV21235",
      "7100-02:IV19357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/socket_fix.tar",
    "cvss": [
      "CVE-2012-2192:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06"
    ],
    "apAbstract": "Arbitary file overwrite symlink in libodm",
    "aparNo": "IV21382",
    "aparNoSet": [
      "CVE-2012-2179",
      "IV21382"
    ],
    "fixedIn": "7100-00-07",
    "ifixes": [
      "IV21382.120613.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120620/datafile141524\u0026label\u003dArbitary%20file%20overwrite%20symlink%20in%20libodm",
    "filesets": [
      "bos.rte.odm:7.1.0.0-7.1.0.15"
    ],
    "issued": "20120614",
    "updated": "null",
    "siblings": [
      "6100-06:IV21379",
      "6100-07:IV21381",
      "6100-08:IV19369",
      "7100-00:IV21382",
      "7100-01:IV21383",
      "7100-02:IV19252"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_fix.tar",
    "cvss": [
      "CVE-2012-2179:6.9"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04"
    ],
    "apAbstract": "APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY",
    "aparNo": "IV22062",
    "aparNoSet": [
      "IV22062"
    ],
    "fixedIn": "6100-07-05",
    "ifixes": [
      "IV22062s04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV22062",
    "filesets": [
      "bos.64bit:6.1.7.15",
      "bos.adt.prof:6.1.7.15",
      "bos.rte.control:6.1.7.15",
      "bos.rte.libc:6.1.7.15",
      "bos.rte.shell:6.1.7.15",
      "mcr.rte:6.1.7.15"
    ],
    "issued": "20120602",
    "updated": "20130226",
    "siblings": [
      "7100-01:IV22132",
      "7100-02:IV24288",
      "6100-07:IV22062",
      "6100-06:IV22982"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv22062/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-04"
    ],
    "apAbstract": "APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY",
    "aparNo": "IV22132",
    "aparNoSet": [
      "IV22132"
    ],
    "fixedIn": "7100-01-05",
    "ifixes": [
      "IV22132s04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV22132",
    "filesets": [
      "bos.64bit:7.1.1.15",
      "bos.adt.prof:7.1.1.15",
      "bos.rte.control:7.1.1.15",
      "bos.rte.libc:7.1.1.15",
      "bos.rte.shell:7.1.1.15",
      "mcr.rte:7.1.1.15"
    ],
    "issued": "20120605",
    "updated": "20130226",
    "siblings": [
      "7100-01:IV22132",
      "7100-02:IV24288",
      "6100-07:IV22062",
      "6100-06:IV22982"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv22132/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "IV22554",
    "aparNoSet": [
      "CVE-2012-1667",
      "IV22554"
    ],
    "fixedIn": "6100-06-10",
    "ifixes": [
      "IV22554m07.120713.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20AIX%20bind",
    "filesets": [
      "bos.net.tcp.client:6.1.6.0-6.1.6.19",
      "bos.net.tcp.server:6.1.6.0-6.1.6.18"
    ],
    "issued": "20120713",
    "updated": "null",
    "siblings": [
      "5300-12:IV22625",
      "6100-06:IV22554",
      "6100-07:IV22555",
      "7100-00:IV22556",
      "7100-01:IV22557"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar",
    "cvss": [
      "CVE-2012-1667:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "IV22555",
    "aparNoSet": [
      "CVE-2012-1667",
      "IV22555"
    ],
    "fixedIn": "6100-07-06",
    "ifixes": [
      "IV22555m04.120713.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20AIX%20bind",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.16",
      "bos.net.tcp.server:6.1.7.0-6.1.7.16"
    ],
    "issued": "20120713",
    "updated": "null",
    "siblings": [
      "5300-12:IV22625",
      "6100-06:IV22554",
      "6100-07:IV22555",
      "7100-00:IV22556",
      "7100-01:IV22557"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar",
    "cvss": [
      "CVE-2012-1667:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5"
    ],
    "apAbstract": "Vulnerability in VIOS bind",
    "aparNo": "IV22555",
    "aparNoSet": [
      "CVE-2012-1667",
      "IV22555"
    ],
    "fixedIn": "2.2.1.7",
    "ifixes": [
      "IV22555m04.120713.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20VIOS%20bind",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.16",
      "bos.net.tcp.server:6.1.7.0-6.1.7.16"
    ],
    "issued": "20120713",
    "updated": "null",
    "siblings": [
      "5300-12:IV22625",
      "6100-06:IV22554",
      "6100-07:IV22555",
      "7100-00:IV22556",
      "7100-01:IV22557"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar",
    "cvss": [
      "CVE-2012-1667:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "IV22556",
    "aparNoSet": [
      "CVE-2012-1667",
      "IV22556"
    ],
    "fixedIn": "7100-00-08",
    "ifixes": [
      "IV22556m05.120711.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20AIX%20bind",
    "filesets": [
      "bos.net.tcp.client:7.1.0.0-7.1.0.20",
      "bos.net.tcp.server:7.1.0.0-7.1.0.18"
    ],
    "issued": "20120713",
    "updated": "null",
    "siblings": [
      "5300-12:IV22625",
      "6100-06:IV22554",
      "6100-07:IV22555",
      "7100-00:IV22556",
      "7100-01:IV22557"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar",
    "cvss": [
      "CVE-2012-1667:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "IV22557",
    "aparNoSet": [
      "CVE-2012-1667",
      "IV22557"
    ],
    "fixedIn": "7100-01-05",
    "ifixes": [
      "IV22557m04.120713.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20AIX%20bind",
    "filesets": [
      "bos.net.tcp.client:7.1.1.0-7.1.1.16",
      "bos.net.tcp.server:7.1.1.0-7.1.1.16"
    ],
    "issued": "20120713",
    "updated": "null",
    "siblings": [
      "5300-12:IV22625",
      "6100-06:IV22554",
      "6100-07:IV22555",
      "7100-00:IV22556",
      "7100-01:IV22557"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar",
    "cvss": [
      "CVE-2012-1667:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "IV22625",
    "aparNoSet": [
      "CVE-2012-1667",
      "IV22625"
    ],
    "fixedIn": "5300-12-07",
    "ifixes": [
      "IV22625m05.120713.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120713/datafile152434\u0026label\u003dVulnerability%20in%20AIX%20bind",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.7",
      "bos.net.tcp.server:5.3.12.0-5.3.12.4"
    ],
    "issued": "20120713",
    "updated": "null",
    "siblings": [
      "5300-12:IV22625",
      "6100-06:IV22554",
      "6100-07:IV22555",
      "7100-00:IV22556",
      "7100-01:IV22557"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix4.tar",
    "cvss": [
      "CVE-2012-1667:5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09"
    ],
    "apAbstract": "Vulnerability in AIX system call",
    "aparNo": "IV22693",
    "aparNoSet": [
      "CVE-2012-0723",
      "IV22693"
    ],
    "fixedIn": "6100-06-10",
    "ifixes": [
      "IV22693s07.120713.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20AIX%20system%20call",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.19",
      "bos.rte.tty:6.1.6.0-6.1.6.18"
    ],
    "issued": "20120726",
    "updated": "null",
    "siblings": [
      "5300-12:",
      "IV22694",
      "6100-06:IV22693",
      "6100-07:IV22695",
      "7100-00:IV22696",
      "7100-01:IV22697"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar",
    "cvss": [
      "CVE-2012-0723:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06"
    ],
    "apAbstract": "Vulnerability in AIX system call",
    "aparNo": "IV22694",
    "aparNoSet": [
      "CVE-2012-0723",
      "IV22694"
    ],
    "fixedIn": "5300-12-07",
    "ifixes": [
      "IV53331s0a.131220.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20AIX%20system%20call",
    "filesets": [
      "bos.rte.tty:5.3.12.0-5.3.12.4"
    ],
    "issued": "20120726",
    "updated": "null",
    "siblings": [
      "5300-12:",
      "IV22694",
      "6100-06:IV22693",
      "6100-07:IV22695",
      "7100-00:IV22696",
      "7100-01:IV22697"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar",
    "cvss": [
      "CVE-2012-0723:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05"
    ],
    "apAbstract": "Vulnerability in AIX system call",
    "aparNo": "IV22695",
    "aparNoSet": [
      "CVE-2012-0723",
      "IV22695"
    ],
    "fixedIn": "6100-07-06",
    "ifixes": [
      "IV22695s04.120724.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20AIX%20system%20call",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.16",
      "bos.rte.tty:6.1.7.0-6.1.7.16"
    ],
    "issued": "20120726",
    "updated": "null",
    "siblings": [
      "5300-12:",
      "IV22694",
      "6100-06:IV22693",
      "6100-07:IV22695",
      "7100-00:IV22696",
      "7100-01:IV22697"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar",
    "cvss": [
      "CVE-2012-0723:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5"
    ],
    "apAbstract": "Vulnerability in VIOS system call",
    "aparNo": "IV22695",
    "aparNoSet": [
      "CVE-2012-0723",
      "IV22695"
    ],
    "fixedIn": "2.2.1.7",
    "ifixes": [
      "IV22695s04.120628.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20VIOS%20system%20call",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.16",
      "bos.rte.tty:6.1.7.0-6.1.7.16"
    ],
    "issued": "20120726",
    "updated": "null",
    "siblings": [
      "5300-12:",
      "IV22694",
      "6100-06:IV22693",
      "6100-07:IV22695",
      "7100-00:IV22696",
      "7100-01:IV22697"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar",
    "cvss": [
      "CVE-2012-0723:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07"
    ],
    "apAbstract": "Vulnerability in AIX system call",
    "aparNo": "IV22696",
    "aparNoSet": [
      "CVE-2012-0723",
      "IV22696"
    ],
    "fixedIn": "7100-00-08",
    "ifixes": [
      "IV22696s05.120724.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20AIX%20system%20call",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.19",
      "bos.rte.tty:7.1.0.0-7.1.0.18"
    ],
    "issued": "20120726",
    "updated": "null",
    "siblings": [
      "5300-12:IV22694",
      "6100-06:IV22693",
      "6100-07:IV22695",
      "7100-00:IV22696",
      "7100-01:IV22697"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar",
    "cvss": [
      "CVE-2012-0723:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05"
    ],
    "apAbstract": "Vulnerability in AIX system call",
    "aparNo": "IV22697",
    "aparNoSet": [
      "CVE-2012-0723",
      "IV22697"
    ],
    "fixedIn": "7100-01-06",
    "ifixes": [
      "IV22697s04.120724.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201207/SECURITY/20120726/datafile140753\u0026label\u003dVulnerability%20in%20AIX%20system%20call",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.16",
      "bos.rte.tty:7.1.1.0-7.1.1.16"
    ],
    "issued": "20120726",
    "updated": "null",
    "siblings": [
      "5300-12:IV22694",
      "6100-06:IV22693",
      "6100-07:IV22695",
      "7100-00:IV22696",
      "7100-01:IV22697"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/syscall_fix.tar",
    "cvss": [
      "CVE-2012-0723:4.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05"
    ],
    "apAbstract": "INACCURATE/INVALID RESULTS RETURNED BY SOME MATH LIBRARY APIS",
    "aparNo": "IV22812",
    "aparNoSet": [
      "IV22812"
    ],
    "fixedIn": "7100-01-06",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV22812",
    "filesets": [
      "bos.adt.prof:7.1.1.0-7.1.1.17",
      "bos.adt.libm:7.1.1.0-7.1.1.16"
    ],
    "issued": "20120612",
    "updated": "20130409",
    "siblings": [
      "7100-00:IV23305",
      "7100-01:IV22812"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05"
    ],
    "apAbstract": "Vulnerability in AIX sendmail",
    "aparNo": "IV22963",
    "aparNoSet": [
      "CVE-2012-2200",
      "IV22963"
    ],
    "fixedIn": "7100-01-06",
    "ifixes": [
      "IV22963s04.120613.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120626/datafile151612\u0026label\u003dVulnerability%20in%20AIX%20sendmail",
    "filesets": [
      "bos.net.tcp.client:7.1.1.0-7.1.1.16"
    ],
    "issued": "20120626",
    "updated": "null",
    "siblings": [
      "6100-06:IV22965",
      "6100-07:IV22966",
      "6100-08:IV24454",
      "7100-00:IV22964",
      "7100-01:IV22963",
      "7100-02:IV24645"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar",
    "cvss": [
      "CVE-2012-2200:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09"
    ],
    "apAbstract": "Vulnerability in AIX sendmail",
    "aparNo": "IV22964",
    "aparNoSet": [
      "CVE-2012-2200",
      "IV22964"
    ],
    "fixedIn": "7100-00-10",
    "ifixes": [
      "IV22964s05.120613.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120626/datafile151612\u0026label\u003dVulnerability%20in%20AIX%20sendmail",
    "filesets": [
      "bos.net.tcp.client:7.1.0.0-7.1.0.21"
    ],
    "issued": "20120626",
    "updated": "null",
    "siblings": [
      "6100-06:IV22965",
      "6100-07:IV22966",
      "6100-08:IV24454",
      "7100-00:IV22964",
      "7100-01:IV22963",
      "7100-02:IV24645"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar",
    "cvss": [
      "CVE-2012-2200:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09"
    ],
    "apAbstract": "Vulnerability in AIX sendmail",
    "aparNo": "IV22965",
    "aparNoSet": [
      "CVE-2012-2200",
      "IV22965"
    ],
    "fixedIn": "6100-06-10",
    "ifixes": [
      "IV22965s07.120613.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120626/datafile151612\u0026label\u003dVulnerability%20in%20AIX%20sendmail",
    "filesets": [
      "bos.net.tcp.client:6.1.6.0-6.1.6.20"
    ],
    "issued": "20120626",
    "updated": "null",
    "siblings": [
      "6100-06:IV22965",
      "6100-07:IV22966",
      "6100-08:IV24454",
      "7100-00:IV22964",
      "7100-01:IV22963",
      "7100-02:IV24645"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar",
    "cvss": [
      "CVE-2012-2200:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05"
    ],
    "apAbstract": "Vulnerability in AIX sendmail",
    "aparNo": "IV22966",
    "aparNoSet": [
      "CVE-2012-2200",
      "IV22966"
    ],
    "fixedIn": "6100-07-06",
    "ifixes": [
      "IV22966s04.120613.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201206/SECURITY/20120626/datafile151612\u0026label\u003dVulnerability%20in%20AIX%20sendmail",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.16"
    ],
    "issued": "20120626",
    "updated": "null",
    "siblings": [
      "6100-06:IV22965",
      "6100-07:IV22966",
      "6100-08:IV24454",
      "7100-00:IV22964",
      "7100-01:IV22963",
      "7100-02:IV24645"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar",
    "cvss": [
      "CVE-2012-2200:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5"
    ],
    "apAbstract": "Vulnerability in VIOS sendmail",
    "aparNo": "IV22966",
    "aparNoSet": [
      "CVE-2012-2200",
      "IV22966"
    ],
    "fixedIn": "2.2.1.7",
    "ifixes": [
      "IV22966s04.120613.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201206/SECURITY/20120626/datafile151612\u0026label\u003dVulnerability%20in%20VIOS%20sendmail",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.16"
    ],
    "issued": "20120626",
    "updated": "null",
    "siblings": [
      "6100-06:IV22965",
      "6100-07:IV22966",
      "6100-08:IV24454",
      "7100-00:IV22964",
      "7100-01:IV22963",
      "7100-02:IV24645"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sendmail1_fix.tar",
    "cvss": [
      "CVE-2012-2200:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08"
    ],
    "apAbstract": "APPLICATION CAN CRASH WHEN UNLOADING / RELOADING A LIBRARY",
    "aparNo": "IV22982",
    "aparNoSet": [
      "IV22982"
    ],
    "fixedIn": "6100-06-09",
    "ifixes": [
      "IV22982s08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV22982",
    "filesets": [
      "bos.64bit:6.1.6.18",
      "bos.adt.prof:6.1.6.18",
      "bos.rte.control:6.1.6.18",
      "bos.rte.libc:6.1.6.18",
      "bos.rte.shell:6.1.6.18",
      "mcr.rte:6.1.6.18"
    ],
    "issued": "20120613",
    "updated": "20130226",
    "siblings": [
      "7100-01:IV22132",
      "7100-02:IV24288",
      "6100-07:IV22062",
      "6100-06:IV22982"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv22982/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07"
    ],
    "apAbstract": "INACCURATE/INVALID RESULTS RETURNED BY SOME MATH LIBRARY APIS",
    "aparNo": "IV23305",
    "aparNoSet": [
      "IV23305"
    ],
    "fixedIn": "7100-00-08",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV23305",
    "filesets": [
      "bos.adt.prof:7.1.0.0-7.1.0.19",
      "bos.adt.libm:7.1.0.0-7.1.0.16"
    ],
    "issued": "20120619",
    "updated": "20130409",
    "siblings": [
      "7100-00:IV23305",
      "7100-01:IV22812"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06"
    ],
    "apAbstract": "AIX ftp vulnerability",
    "aparNo": "IV23331",
    "aparNoSet": [
      "CVE-2012-4845",
      "IV23331"
    ],
    "fixedIn": "6100-07-07",
    "ifixes": [
      "IV23331s6a.121226.epkg.Z",
      "IV23331m05.121003.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.17",
      "bos.rte.tty:6.1.7.0-6.1.7.16"
    ],
    "issued": "20120703",
    "updated": "20130208",
    "siblings": [
      "6100-06:IV28715",
      "6100-07:IV23331",
      "6100-08:IV28651",
      "7100-00:IV28785",
      "7100-01:IV28787",
      "7100-02:IV30669"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar",
    "cvss": [
      "CVE-2012-4845:6.8"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5"
    ],
    "apAbstract": "VIOS ftp vulnerability",
    "aparNo": "IV23331",
    "aparNoSet": [
      "CVE-2012-4845",
      "IV23331"
    ],
    "fixedIn": "2.2.1.7",
    "ifixes": [
      "IV23331m04.121003.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20VIOS%20FTP%20Vulnerability%20CVE-2012-4845",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.17",
      "bos.rte.tty:6.1.7.0-6.1.7.16"
    ],
    "issued": "20120703",
    "updated": "20130208",
    "siblings": [
      "6100-06:IV28715",
      "6100-07:IV23331",
      "6100-08:IV28651",
      "7100-00:IV28785",
      "7100-01:IV28787",
      "7100-02:IV30669"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar",
    "cvss": [
      "CVE-2012-4845:6.8"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06"
    ],
    "apAbstract": "DATE COMMAND IS FAILING WHILE SWITCHING OVER DAY LIGHT SAVING",
    "aparNo": "IV23966",
    "aparNoSet": [
      "IV23966"
    ],
    "fixedIn": "7100-00-07",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV23966",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.18"
    ],
    "issued": "20120627",
    "updated": "20130413",
    "siblings": [
      "6100-05:IV16568",
      "6100-06:IV16567",
      "6100-08:IV17105",
      "7100-00:IV23966",
      "7100-01:IV16514",
      "7100-02:IV17107"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05"
    ],
    "apAbstract": "ASSERT IN IOCP_INSQUEUE",
    "aparNo": "IV24569",
    "aparNoSet": [
      "IV24569"
    ],
    "fixedIn": "6100-07-06",
    "ifixes": [
      "IV24569s05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV24569",
    "filesets": [
      "bos.iocp.rte:6.1.7.15-6.1.7.16"
    ],
    "issued": "20120710",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV29604",
      "7100-01:IV27204",
      "6100-06:IV27337",
      "6100-07:IV24569"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv24569/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06"
    ],
    "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS",
    "aparNo": "IV24610",
    "aparNoSet": [
      "IV24610"
    ],
    "fixedIn": "7100-01-07",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV24610",
    "filesets": [
      "bos.perf.perfstat:7.1.1.0-7.1.1.17",
      "bos.perf.tools:7.1.1.0-7.1.1.17"
    ],
    "issued": "20120710",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV35280",
      "7100-01:IV24610",
      "7100-02:IV30032",
      "7100-03:IV31489",
      "6100-06:IV24777",
      "6100-07:IV33521",
      "6100-08:IV30236",
      "6100-09:IV30081"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10"
    ],
    "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS",
    "aparNo": "IV24777",
    "aparNoSet": [
      "IV24777"
    ],
    "fixedIn": "6100-06-11",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV24777",
    "filesets": [
      "bos.perf.perfstat:6.1.6.0-6.1.7.20",
      "bos.perf.tools:6.1.6.0-6.1.6.20"
    ],
    "issued": "20120716",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV35280",
      "7100-01:IV24610",
      "7100-02:IV30032",
      "7100-03:IV31489",
      "6100-06:IV24777",
      "6100-07:IV33521",
      "6100-08:IV30236",
      "6100-09:IV30081"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05"
    ],
    "apAbstract": "REDUCE EARLY WORKING STORAGE PAGING",
    "aparNo": "IV26272",
    "aparNoSet": [
      "IV26272"
    ],
    "fixedIn": "6100-07-06",
    "ifixes": [
      "IV26272s05.epkg.Z",
      "IV26272s04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV26272",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.17"
    ],
    "issued": "20120814",
    "updated": "20130409",
    "siblings": [
      "6100-06:IV27655",
      "6100-07:IV26272",
      "6100-08:IV26735",
      "7100-00:IV26581",
      "7100-01:IV27014",
      "7100-02:IV26731"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv26272/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07"
    ],
    "apAbstract": "AIX NFSv4 vulnerability",
    "aparNo": "IV26436",
    "aparNoSet": [
      "CVE-2012-4817",
      "IV26436"
    ],
    "fixedIn": "7100-00-08",
    "ifixes": [
      "IV26436s07.120907.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120913/datafile151835\u0026label\u003dAIX%20NFSv4%20Vulnerability%20CVE-2012-4817",
    "filesets": [
      "bos.net.nfs.client:7.1.0.0-7.1.0.20"
    ],
    "issued": "20120913",
    "updated": "null",
    "siblings": [
      "6100-05:IV09495",
      "6100-06:IV10327",
      "6100-07:IV11629",
      "6100-08:IV11511",
      "7100-00:IV26436",
      "7100-01:IV12169",
      "7100-02:IV11502"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nfsv4_fix1.tar",
    "cvss": [
      "CVE-2012-4817:5"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07"
    ],
    "apAbstract": "REDUCE EARLY WORKING STORAGE PAGING",
    "aparNo": "IV26581",
    "aparNoSet": [
      "IV26581"
    ],
    "fixedIn": "7100-00-08",
    "ifixes": [
      "IV26581s07.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV26581",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.20"
    ],
    "issued": "20120820",
    "updated": "20130409",
    "siblings": [
      "6100-06:IV27655",
      "6100-07:IV26272",
      "6100-08:IV26735",
      "7100-00:IV26581",
      "7100-01:IV27014",
      "7100-02:IV26731"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv26581/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05"
    ],
    "apAbstract": "REDUCE EARLY WORKING STORAGE PAGING",
    "aparNo": "IV27014",
    "aparNoSet": [
      "IV27014"
    ],
    "fixedIn": "7100-01-06",
    "ifixes": [
      "IV27014s04.epkg.Z",
      "IV27014s05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27014",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.16"
    ],
    "issued": "20120824",
    "updated": "20130409",
    "siblings": [
      "6100-06:IV27655",
      "6100-07:IV26272",
      "6100-08:IV26735",
      "7100-00:IV26581",
      "7100-01:IV27014",
      "7100-02:IV26731"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27014/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-04",
      "7100-01-05"
    ],
    "apAbstract": "ASSERT IN IOCP_INSQUEUE",
    "aparNo": "IV27204",
    "aparNoSet": [
      "IV27204"
    ],
    "fixedIn": "7100-01-06",
    "ifixes": [
      "IV27204s05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27204",
    "filesets": [
      "bos.iocp.rte:7.1.1.15"
    ],
    "issued": "20120829",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV29604",
      "7100-01:IV27204",
      "6100-06:IV27337",
      "6100-07:IV24569"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27204/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-08",
      "6100-06-09"
    ],
    "apAbstract": "ASSERT IN IOCP_INSQUEUE",
    "aparNo": "IV27337",
    "aparNoSet": [
      "IV27337"
    ],
    "fixedIn": "6100-06-10",
    "ifixes": [
      "iV27337s09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27337",
    "filesets": [
      "bos.iocp.rte:6.1.6.18-6.1.6.19"
    ],
    "issued": "20120831",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV29604",
      "7100-01:IV27204",
      "6100-06:IV27337",
      "6100-07:IV24569"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27337/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07"
    ],
    "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().",
    "aparNo": "IV27584",
    "aparNoSet": [
      "IV27584"
    ],
    "fixedIn": "7100-01-08",
    "ifixes": [
      "U855903",
      "bos.mp64:7.1.1.19"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27584",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.19"
    ],
    "issued": "20120905",
    "updated": "20131124",
    "siblings": [
      "6100-06:IZ94647",
      "6100-07:IV13404",
      "6100-08:IV14309",
      "6100-09:IV42440",
      "7100-00:IV42334",
      "7100-01:IV27584",
      "7100-02:IV42324",
      "7100-03:IV42412"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27584/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09"
    ],
    "apAbstract": "REDUCE EARLY WORKING STORAGE PAGING",
    "aparNo": "IV27655",
    "aparNoSet": [
      "IV27655"
    ],
    "fixedIn": "6100-06-10",
    "ifixes": [
      "IV27655s07.epkg.Z",
      "IV27655s09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27655",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.20"
    ],
    "issued": "20120906",
    "updated": "20130409",
    "siblings": [
      "6100-06:IV27655",
      "6100-07:IV26272",
      "6100-08:IV26735",
      "7100-00:IV26581",
      "7100-01:IV27014",
      "7100-02:IV26731"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27655/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06"
    ],
    "apAbstract": "SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES",
    "aparNo": "IV27680",
    "aparNoSet": [
      "IV27680"
    ],
    "fixedIn": "6100-07-07",
    "ifixes": [
      "IV27680.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV27680",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.17"
    ],
    "issued": "20120927",
    "updated": "20131125",
    "siblings": [
      "6100-07:IV27680",
      "6100-08:IV32845",
      "6100-08:IV32845",
      "7100-01:IV30075",
      "7100-02:IV33155"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv27680/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10"
    ],
    "apAbstract": "AIX fuser vulnerability",
    "aparNo": "IV28151",
    "aparNoSet": [
      "CVE-2012-4833",
      "IV28151"
    ],
    "fixedIn": "6100-06-11",
    "ifixes": [
      "IV28151s09.120926.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120928/datafile160830\u0026label\u003dAIX%20fuser%20vulnerability%20CVE-2012-4833",
    "filesets": [
      "bos.rte.filesystem:6.1.6.0-6.1.6.19"
    ],
    "issued": "20120923",
    "updated": "null",
    "siblings": [
      "6100-06:IV28151",
      "6100-07:IV28749",
      "7100-00:IV28754",
      "7100-01:IV28756"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar",
    "cvss": [
      "CVE-2012-4833:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01"
    ],
    "apAbstract": "AIX ftp vulnerability",
    "aparNo": "IV28651",
    "aparNoSet": [
      "CVE-2012-4845",
      "IV28651"
    ],
    "fixedIn": "6100-08-02",
    "ifixes": [
      "IV28651s1a.121204.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.1"
    ],
    "issued": "20120703",
    "updated": "20130208",
    "siblings": [
      "6100-06:IV28715",
      "6100-07:IV23331",
      "6100-08:IV28651",
      "7100-00:IV28785",
      "7100-01:IV28787",
      "7100-02:IV30669"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar",
    "cvss": [
      "CVE-2012-4845:6.8"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1"
    ],
    "apAbstract": "VIOS ftp vulnerability",
    "aparNo": "IV28651",
    "aparNoSet": [
      "CVE-2012-4845",
      "IV28651"
    ],
    "fixedIn": "2.2.2.2",
    "ifixes": [
      "IV28651s1a.121204.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20VIOS%20FTP%20Vulnerability%20CVE-2012-4845",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.1"
    ],
    "issued": "20120703",
    "updated": "20130208",
    "siblings": [
      "6100-06:IV28715",
      "6100-07:IV23331",
      "6100-08:IV28651",
      "7100-00:IV28785",
      "7100-01:IV28787",
      "7100-02:IV30669"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar",
    "cvss": [
      "CVE-2012-4845:6.8"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10"
    ],
    "apAbstract": "AIX ftp vulnerability",
    "aparNo": "IV28715",
    "aparNoSet": [
      "CVE-2012-4845",
      "IV28715"
    ],
    "fixedIn": "6100-06-11",
    "ifixes": [
      "IV28715sAa.130206.epkg.Z",
      "IV28715m09.121012.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.21",
      "bos.rte.tty:6.1.6.0-6.1.6.19"
    ],
    "issued": "20120703",
    "updated": "20130208",
    "siblings": [
      "6100-06:IV28715",
      "6100-07:IV23331",
      "6100-08:IV28651",
      "7100-00:IV28785",
      "7100-01:IV28787",
      "7100-02:IV30669"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar",
    "cvss": [
      "CVE-2012-4845:6.8"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06"
    ],
    "apAbstract": "AIX fuser vulnerability",
    "aparNo": "IV28749",
    "aparNoSet": [
      "CVE-2012-4833",
      "IV28749"
    ],
    "fixedIn": "6100-07-07",
    "ifixes": [
      "IV28749s05.120926.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/fuser_advisory.asc",
    "filesets": [
      "bos.rte.filesystem:6.1.7.0-6.1.7.16"
    ],
    "issued": "20120923",
    "updated": "null",
    "siblings": [
      "6100-06:IV28151",
      "6100-07:IV28749",
      "7100-00:IV28754",
      "7100-01:IV28756"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar",
    "cvss": [
      "CVE-2012-4833:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07"
    ],
    "apAbstract": "AIX fuser vulnerability",
    "aparNo": "IV28754",
    "aparNoSet": [
      "CVE-2012-4833",
      "IV28754"
    ],
    "fixedIn": "7100-00-08",
    "ifixes": [
      "IV28754s07.120926.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120928/datafile160830\u0026label\u003dAIX%20fuser%20vulnerability%20CVE-2012-4833",
    "filesets": [
      "bos.rte.filesystem:7.1.0.0-7.1.0.18"
    ],
    "issued": "20120923",
    "updated": "null",
    "siblings": [
      "6100-06:IV28151",
      "6100-07:IV28749",
      "7100-00:IV28754",
      "7100-01:IV28756"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar",
    "cvss": [
      "CVE-2012-4833:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06"
    ],
    "apAbstract": "AIX fuser vulnerability",
    "aparNo": "IV28756",
    "aparNoSet": [
      "CVE-2012-4833",
      "IV28756"
    ],
    "fixedIn": "7100-01-07",
    "ifixes": [
      "IV28756s05.120926.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201209/SECURITY/20120928/datafile160830\u0026label\u003dAIX%20fuser%20vulnerability%20CVE-2012-4833",
    "filesets": [
      "bos.rte.filesystem:7.1.1.0-7.1.1.16"
    ],
    "issued": "20120923",
    "updated": "null",
    "siblings": [
      "6100-06:IV28151",
      "6100-07:IV28749",
      "7100-00:IV28754",
      "7100-01:IV28756"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/fuser_fix.tar",
    "cvss": [
      "CVE-2012-4833:2.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08"
    ],
    "apAbstract": "AIX ftp vulnerability",
    "aparNo": "IV28785",
    "aparNoSet": [
      "CVE-2012-4845",
      "IV28785"
    ],
    "fixedIn": "7100-00-09",
    "ifixes": [
      "IV28785s8a.130206.epkg.Z",
      "IV28785m07.121002.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.1"
    ],
    "issued": "20120703",
    "updated": "20130208",
    "siblings": [
      "6100-06:IV28715",
      "6100-07:IV23331",
      "6100-08:IV28651",
      "7100-00:IV28785",
      "7100-01:IV28787",
      "7100-02:IV30669"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar",
    "cvss": [
      "CVE-2012-4845:6.8"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07"
    ],
    "apAbstract": "AIX ftp vulnerability",
    "aparNo": "IV28787",
    "aparNoSet": [
      "CVE-2012-4845",
      "IV28787"
    ],
    "fixedIn": "7100-01-07",
    "ifixes": [
      "IV28787s6a.130121.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.17",
      "bos.rte.tty:7.1.1.0-7.1.1.16"
    ],
    "issued": "20120703",
    "updated": "20130208",
    "siblings": [
      "6100-06:IV28715",
      "6100-07:IV23331",
      "6100-08:IV28651",
      "7100-00:IV28785",
      "7100-01:IV28787",
      "7100-02:IV30669"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar",
    "cvss": [
      "CVE-2012-4845:6.8"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-06",
      "7100-00-07"
    ],
    "apAbstract": "ASSERT IN IOCP_INSQUEUE",
    "aparNo": "IV29604",
    "aparNoSet": [
      "IV29604"
    ],
    "fixedIn": "7100-00-08",
    "ifixes": [
      "IV29604s07.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV29604",
    "filesets": [
      "bos.iocp.rte:7.1.0.17"
    ],
    "issued": "20121005",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV29604",
      "7100-01:IV27204",
      "6100-06:IV27337",
      "6100-07:IV24569"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv29604/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01"
    ],
    "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS",
    "aparNo": "IV30032",
    "aparNoSet": [
      "IV30032"
    ],
    "fixedIn": "7100-02-02",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV30032",
    "filesets": [
      "bos.perf.perfstat:7.1.2.0-7.1.2.1",
      "bos.perf.tools:7.1.2.0-7.1.2.1"
    ],
    "issued": "20121011",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV35280",
      "7100-01:IV24610",
      "7100-02:IV30032",
      "7100-03:IV31489",
      "6100-06:IV24777",
      "6100-07:IV33521",
      "6100-08:IV30236",
      "6100-09:IV30081"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06"
    ],
    "apAbstract": "SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES",
    "aparNo": "IV30075",
    "aparNoSet": [
      "IV30075"
    ],
    "fixedIn": "7100-01-07",
    "ifixes": [
      "IV30075.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV30075",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.18"
    ],
    "issued": "20121012",
    "updated": "20131125",
    "siblings": [
      "6100-07:IV27680",
      "6100-08:IV32845",
      "6100-08:IV32845",
      "7100-01:IV30075",
      "7100-02:IV33155"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv30075/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01"
    ],
    "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS",
    "aparNo": "IV30236",
    "aparNoSet": [
      "IV30236"
    ],
    "fixedIn": "6100-08-02",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV30236",
    "filesets": [
      "bos.perf.perfstat:6.1.8.0-6.1.8.14",
      "bos.perf.tools:6.1.8.0-6.1.8.14"
    ],
    "issued": "20121013",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV35280",
      "7100-01:IV24610",
      "7100-02:IV30032",
      "7100-03:IV31489",
      "6100-06:IV24777",
      "6100-07:IV33521",
      "6100-08:IV30236",
      "6100-09:IV30081"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "IV30364",
    "aparNoSet": [
      "CVE-2012-5166",
      "IV30364"
    ],
    "fixedIn": "6100-06-11",
    "ifixes": [
      "IV30364s10.130121.epkg.Z",
      "IV30364s09.121016.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163519\u0026label\u003dUPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166",
    "filesets": [
      "bos.net.tcp.client:6.1.6.0-6.1.6.21",
      "bos.net.tcp.server:6.1.6.0-6.1.6.20"
    ],
    "issued": "20121023",
    "updated": "20130128",
    "siblings": [
      "5300-12:IV30368",
      "6100-06:IV30364",
      "6100-07:IV30365",
      "6100-08:IV30247",
      "7100-00:IV30366",
      "7100-01:IV30367",
      "7100-02:IV30185"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar",
    "cvss": [
      "CVE-2012-5166:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "IV30365",
    "aparNoSet": [
      "CVE-2012-5166",
      "IV30365"
    ],
    "fixedIn": "6100-07-07",
    "ifixes": [
      "IV30365s06.130121.epkg.Z",
      "IV30365s05.121016.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_advisory5.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.17",
      "bos.net.tcp.server:6.1.7.0-6.1.7.17"
    ],
    "issued": "20121023",
    "updated": "20130128",
    "siblings": [
      "5300-12:IV30368",
      "6100-06:IV30364",
      "6100-07:IV30365",
      "6100-08:IV30247",
      "7100-00:IV30366",
      "7100-01:IV30367",
      "7100-02:IV30185"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar",
    "cvss": [
      "CVE-2012-5166:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5"
    ],
    "apAbstract": "Vulnerability in VIOS bind",
    "aparNo": "IV30365",
    "aparNoSet": [
      "CVE-2012-5166",
      "IV30365"
    ],
    "fixedIn": "2.2.1.7",
    "ifixes": [
      "IV30365s04.121018.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS61\u0026path\u003d/201301/SECURITY/20130128/datafile163519\u0026label\u003dUPDATE%20-%20Vulnerability%20in%20VIOS%20bind%20-%20CVE-2012-5166",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.17",
      "bos.net.tcp.server:6.1.7.0-6.1.7.17"
    ],
    "issued": "20121023",
    "updated": "20130128",
    "siblings": [
      "5300-12:IV30368",
      "6100-06:IV30364",
      "6100-07:IV30365",
      "6100-08:IV30247",
      "7100-00:IV30366",
      "7100-01:IV30367",
      "7100-02:IV30185"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar",
    "cvss": [
      "CVE-2012-5166:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "IV30366",
    "aparNoSet": [
      "CVE-2012-5166",
      "IV30366"
    ],
    "fixedIn": "7100-00-09",
    "ifixes": [
      "IV30366s08.130121.epkg.Z",
      "IV30366s07.121016.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163519\u0026label\u003dUPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166",
    "filesets": [
      "bos.net.tcp.client:7.1.0.0-7.1.0.22",
      "bos.net.tcp.server:7.1.0.0-7.1.1.19"
    ],
    "issued": "20121023",
    "updated": "20130128",
    "siblings": [
      "5300-12:IV30368",
      "6100-06:IV30364",
      "6100-07:IV30365",
      "6100-08:IV30247",
      "7100-00:IV30366",
      "7100-01:IV30367",
      "7100-02:IV30185"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar",
    "cvss": [
      "CVE-2012-5166:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "IV30367",
    "aparNoSet": [
      "CVE-2012-5166",
      "IV30367"
    ],
    "fixedIn": "7100-01-07",
    "ifixes": [
      "IV30367s06.130121.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163519\u0026label\u003dUPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166",
    "filesets": [
      "bos.net.tcp.client:7.1.1.0-7.1.1.17",
      "bos.net.tcp.server:7.1.1.0-7.1.1.17"
    ],
    "issued": "20121023",
    "updated": "20130128",
    "siblings": [
      "5300-12:IV30368",
      "6100-06:IV30364",
      "6100-07:IV30365",
      "6100-08:IV30247",
      "7100-00:IV30366",
      "7100-01:IV30367",
      "7100-02:IV30185"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar",
    "cvss": [
      "CVE-2012-5166:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06"
    ],
    "apAbstract": "Vulnerability in AIX bind",
    "aparNo": "IV30368",
    "aparNoSet": [
      "CVE-2012-5166",
      "IV30368"
    ],
    "fixedIn": "5300-12-07",
    "ifixes": [
      "IV30368s06.121016.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201301/SECURITY/20130128/datafile163519\u0026label\u003dUPDATE%20-%20Vulnerability%20in%20AIX%20bind%20-%20CVE-2012-5166",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.7",
      "bos.net.tcp.server:5.3.12.0-5.3.12.7"
    ],
    "issued": "20121023",
    "updated": "20130128",
    "siblings": [
      "5300-12:IV30368",
      "6100-06:IV30364",
      "6100-07:IV30365",
      "6100-08:IV30247",
      "7100-00:IV30366",
      "7100-01:IV30367",
      "7100-02:IV30185"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind9_fix5.tar",
    "cvss": [
      "CVE-2012-5166:7.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "AIX ftp vulnerability",
    "aparNo": "IV30669",
    "aparNoSet": [
      "CVE-2012-4845",
      "IV30669"
    ],
    "fixedIn": "7100-02-02",
    "ifixes": [
      "IV30669s1a.130114.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX61\u0026path\u003d/201302/SECURITY/20130208/datafile133630\u0026label\u003dUPDATE%20AIX%20FTP%20Vulnerability%20CVE-2012-4845",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.1"
    ],
    "issued": "20120703",
    "updated": "20130208",
    "siblings": [
      "6100-06:IV28715",
      "6100-07:IV23331",
      "6100-08:IV28651",
      "7100-00:IV28785",
      "7100-01:IV28787",
      "7100-02:IV30669"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ftp_fix1.tar",
    "cvss": [
      "CVE-2012-4845:6.8"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10"
    ],
    "apAbstract": "SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES",
    "aparNo": "IV30703",
    "aparNoSet": [
      "IV30703"
    ],
    "fixedIn": "6100-06-11",
    "ifixes": [
      "IV30703.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV30703",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.21"
    ],
    "issued": "20121022",
    "updated": "20130410",
    "siblings": [
      "6100-07:IV27680",
      "6100-08:IV32845",
      "6100-08:IV32845",
      "7100-01:IV30075",
      "7100-02:IV33155"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv30703/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01"
    ],
    "apAbstract": "A tcp connection can hang and never send the last bytes",
    "aparNo": "IV31960",
    "aparNoSet": [
      "IV31960"
    ],
    "fixedIn": "7100-02-02",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV31960",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.1"
    ],
    "issued": "20121113",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV33484",
      "7100-01:IV20656",
      "7100-02:IV31960",
      "7100-03:IV32651",
      "6100-06:IV33483",
      "6100-07:IV32392",
      "6100-08:IV31959",
      "6100-09:IV32467",
      "5300-12:IV32615"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01"
    ],
    "apAbstract": "DATA PTR INCORRECTLY INCREMENTED IN UDP RECEIVE.",
    "aparNo": "IV31961",
    "aparNoSet": [
      "IV31961"
    ],
    "fixedIn": "6100-08-02",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV31961",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.1"
    ],
    "issued": "20121113",
    "updated": "20131123",
    "siblings": [
      "6100-08:IV31961",
      "6100-09:IV33210",
      "7100-02:IV31962",
      "7100-03:IV34454"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01"
    ],
    "apAbstract": "DATA PTR INCORRECTLY INCREMENTED IN UDP RECEIVE.",
    "aparNo": "IV31962",
    "aparNoSet": [
      "IV31962"
    ],
    "fixedIn": "7100-02-02",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV31962",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.2",
      "bos.net.tcp.client:7.1.2.0-7.1.2.15"
    ],
    "issued": "20121113",
    "updated": "20131123",
    "siblings": [
      "6100-08:IV31961",
      "6100-09:IV33210",
      "7100-02:IV31962",
      "7100-03:IV34454"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06"
    ],
    "apAbstract": "A tcp connection can hang and never send the last bytes",
    "aparNo": "IV32392",
    "aparNoSet": [
      "IV32392"
    ],
    "fixedIn": "6100-07-07",
    "ifixes": [
      "IV32392.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV32392",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.17"
    ],
    "issued": "20121122",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV33484",
      "7100-01:IV20656",
      "7100-02:IV31960",
      "7100-03:IV32651",
      "6100-06:IV33483",
      "6100-07:IV32392",
      "6100-08:IV31959",
      "6100-09:IV32467",
      "5300-12:IV32615"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv32392/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06"
    ],
    "apAbstract": "A tcp connection can hang and never send the last bytes",
    "aparNo": "IV32615",
    "aparNoSet": [
      "IV32615"
    ],
    "fixedIn": "5300-12-07",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV32615",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.8"
    ],
    "issued": "20121127",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV33484",
      "7100-01:IV20656",
      "7100-02:IV31960",
      "7100-03:IV32651",
      "6100-06:IV33483",
      "6100-07:IV32392",
      "6100-08:IV31959",
      "6100-09:IV32467",
      "5300-12:IV32615"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01"
    ],
    "apAbstract": "SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES",
    "aparNo": "IV33155",
    "aparNoSet": [
      "IV33155"
    ],
    "fixedIn": "7100-02-02",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV33155",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.1"
    ],
    "issued": "20131207",
    "updated": "20131125",
    "siblings": [
      "6100-07:IV27680",
      "6100-08:IV32845",
      "6100-08:IV32845",
      "7100-01:IV30075",
      "7100-02:IV33155"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10"
    ],
    "apAbstract": "A tcp connection can hang and never send the last bytes",
    "aparNo": "IV33483",
    "aparNoSet": [
      "IV33483"
    ],
    "fixedIn": "6100-06-11",
    "ifixes": [
      "IV33483.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV33483",
    "filesets": [
      "bos.net.tcp.client:6.1.6.0-6.1.6.21"
    ],
    "issued": "20121214",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV33484",
      "7100-01:IV20656",
      "7100-02:IV31960",
      "7100-03:IV32651",
      "6100-06:IV33483",
      "6100-07:IV32392",
      "6100-08:IV31959",
      "6100-09:IV32467",
      "5300-12:IV32615"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv33483/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08"
    ],
    "apAbstract": "A tcp connection can hang and never send the last bytes",
    "aparNo": "IV33484",
    "aparNoSet": [
      "IV33484"
    ],
    "fixedIn": "7100-00-09",
    "ifixes": [
      "IV33434.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV33484",
    "filesets": [
      "bos.net.tcp.client:7.1.0.0-7.1.0.22"
    ],
    "issued": "20121214",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV33484",
      "7100-01:IV20656",
      "7100-02:IV31960",
      "7100-03:IV32651",
      "6100-06:IV33483",
      "6100-07:IV32392",
      "6100-08:IV31959",
      "6100-09:IV32467",
      "5300-12:IV32615"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv33484/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06"
    ],
    "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS",
    "aparNo": "IV33521",
    "aparNoSet": [
      "IV33521"
    ],
    "fixedIn": "6100-07-07",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV33521",
    "filesets": [
      "bos.perf.perfstat:6.1.7.0-6.1.7.17",
      "bos.perf.tools:6.1.7.0-6.1.7.17"
    ],
    "issued": "20121217",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV35280",
      "7100-01:IV24610",
      "7100-02:IV30032",
      "7100-03:IV31489",
      "6100-06:IV24777",
      "6100-07:IV33521",
      "6100-08:IV30236",
      "6100-09:IV30081"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-08",
      "6100-06-09",
      "6100-06-10",
      "6100-06-11"
    ],
    "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL",
    "aparNo": "IV33883",
    "aparNoSet": [
      "IV33883"
    ],
    "fixedIn": "6100-06-12",
    "ifixes": [
      "IV33883.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV33883",
    "filesets": [
      "bos.adt.include:6.1.6.18-6.1.6.21",
      "bos.mp64:6.1.6.19-6.1.6.22"
    ],
    "issued": "20121220",
    "updated": "20131126",
    "siblings": [
      "6100-06:IV33883",
      "6100-07:IV40614",
      "6100-08:IV38743",
      "7100-00:IV41813",
      "7100-01:IV41421",
      "7100-02:IV38915"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv33883/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01"
    ],
    "apAbstract": "CRASH IN LD_GETINFO_ALL32+000230",
    "aparNo": "IV34354",
    "aparNoSet": [
      "IV34354"
    ],
    "fixedIn": "6100-08-02",
    "ifixes": [
      "IV35680s6a.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV34354",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.1"
    ],
    "issued": "20130109",
    "updated": "20131126",
    "siblings": [
      "6100-07:IV35680",
      "6100-08:IV34354"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv34354/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08"
    ],
    "apAbstract": "SVMON -P OPTION TAKES A LOT TIME TO RETURN OR HANGS",
    "aparNo": "IV35280",
    "aparNoSet": [
      "IV35280"
    ],
    "fixedIn": "7100-00-09",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35280",
    "filesets": [
      "bos.perf.perfstat:7.1.0.0-7.1.0.20",
      "bos.perf.tools:7.1.0.0-7.1.0.20"
    ],
    "issued": "20130116",
    "updated": "20131123",
    "siblings": [
      "7100-00:IV35280",
      "7100-01:IV24610",
      "7100-02:IV30032",
      "7100-03:IV31489",
      "6100-06:IV24777",
      "6100-07:IV33521",
      "6100-08:IV30236",
      "6100-09:IV30081"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06"
    ],
    "apAbstract": "CRASH IN LD_GETINFO_ALL32+000230",
    "aparNo": "IV35680",
    "aparNoSet": [
      "IV35680"
    ],
    "fixedIn": "6100-07-07",
    "ifixes": [
      "IV35680s6a.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35680",
    "filesets": [
      "bos.mp64:6.1.7.17"
    ],
    "issued": "20130122",
    "updated": "20131126",
    "siblings": [
      "6100-07:IV35680",
      "6100-08:IV34354"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35680/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10"
    ],
    "apAbstract": "DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT",
    "aparNo": "IV35809",
    "aparNoSet": [
      "IV35809"
    ],
    "fixedIn": "6100-06-11",
    "ifixes": [
      "IV35809sAa.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35809",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.21"
    ],
    "issued": "20130123",
    "updated": "20131125",
    "siblings": [
      "7100-00:IV35812",
      "7100-01:IV35813",
      "7100-02:IV35814",
      "6100-06:IV35809",
      "6100-07:IV35810",
      "6100-08:IV35811",
      "6100-09:IV33672"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35809/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06"
    ],
    "apAbstract": "DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT",
    "aparNo": "IV35810",
    "aparNoSet": [
      "IV35810"
    ],
    "fixedIn": "6100-07-07",
    "ifixes": [
      "IV35810s6a.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35810",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.17"
    ],
    "issued": "20130123",
    "updated": "20131125",
    "siblings": [
      "7100-00:IV35812",
      "7100-01:IV35813",
      "7100-02:IV35814",
      "6100-06:IV35809",
      "6100-07:IV35810",
      "6100-08:IV35811",
      "6100-09:IV33672"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35810/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08"
    ],
    "apAbstract": "Data error in a file on an NFS server after a server reboot",
    "aparNo": "IV35812",
    "aparNoSet": [
      "IV35812"
    ],
    "fixedIn": "7100-00-09",
    "ifixes": [
      "IV35812s8a.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35812",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.21"
    ],
    "issued": "20130123",
    "updated": "20131125",
    "siblings": [
      "7100-00:IV35812",
      "7100-01:IV35813",
      "7100-02:IV35814",
      "6100-06:IV35809",
      "6100-07:IV35810",
      "6100-08:IV35811",
      "6100-09:IV33672"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35812/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06"
    ],
    "apAbstract": "Data error in a file on an NFS server after a server reboot",
    "aparNo": "IV35813",
    "aparNoSet": [
      "IV35813"
    ],
    "fixedIn": "7100-01-07",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35813",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.18"
    ],
    "issued": "20130123",
    "updated": "20131125",
    "siblings": [
      "7100-00:IV35812",
      "7100-01:IV35813",
      "7100-02:IV35814",
      "6100-06:IV35809",
      "6100-07:IV35810",
      "6100-08:IV35811",
      "6100-09:IV33672"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35813/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01"
    ],
    "apAbstract": "DATA ERROR IN A FILE ON AN NFS SERVER AFTER A SERVER REBOOT",
    "aparNo": "IV35814",
    "aparNoSet": [
      "IV35814"
    ],
    "fixedIn": "7100-02-02",
    "ifixes": [
      "IV35814s1a.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35814",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.1"
    ],
    "issued": "20130123",
    "updated": "20131125",
    "siblings": [
      "7100-00:IV35812",
      "7100-01:IV35813",
      "7100-02:IV35814",
      "6100-06:IV35809",
      "6100-07:IV35810",
      "6100-08:IV35811",
      "6100-09:IV33672"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35814/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01"
    ],
    "apAbstract": "UDP MULTICAST: SHORT PACKET FOR SOME LISTENERS",
    "aparNo": "IV35888",
    "aparNoSet": [
      "IV35888"
    ],
    "fixedIn": "6100-08-02",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35888",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.2"
    ],
    "issued": "20130125",
    "updated": "20131126",
    "siblings": [
      "6100-08:IV35888",
      "6100-09:IV35644",
      "7100-02:IV35893",
      "7100-03:IV33047"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35888/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01"
    ],
    "apAbstract": "UDP MULTICAST: SHORT PACKET FOR SOME LISTENERS.",
    "aparNo": "IV35893",
    "aparNoSet": [
      "IV35893"
    ],
    "fixedIn": "7100-02-02",
    "ifixes": [
      "IV35893.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV35893",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.1"
    ],
    "issued": "20130125",
    "updated": "20131126",
    "siblings": [
      "6100-08:IV35888",
      "6100-09:IV35644",
      "7100-02:IV35893",
      "7100-03:IV33047"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv35893/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07"
    ],
    "apAbstract": "RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP",
    "aparNo": "IV36524",
    "aparNoSet": [
      "IV36524"
    ],
    "fixedIn": "7100-01-08",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV36524",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.20"
    ],
    "issued": "20130215",
    "updated": "20131124",
    "siblings": [
      "6100-06:IV36527",
      "6100-07:IV34105",
      "6100-08:IV38589",
      "6100-09:IV36642",
      "7100-00:IV36835",
      "7100-01:IV36524",
      "7100-02:IV38251",
      "7100-03:IV36832"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09"
    ],
    "apAbstract": "RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP",
    "aparNo": "IV36835",
    "aparNoSet": [
      "IV36835"
    ],
    "fixedIn": "7100-00-10",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV36835",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.22"
    ],
    "issued": "20130215",
    "updated": "20131124",
    "siblings": [
      "6100-06:IV36527",
      "6100-07:IV34105",
      "6100-08:IV38589",
      "6100-09:IV36642",
      "7100-00:IV36835",
      "7100-01:IV36524",
      "7100-02:IV38251",
      "7100-03:IV36832"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "LD FAILING TO EXPORT UNREFERENCED SYMBOLS",
    "aparNo": "IV36875",
    "aparNoSet": [
      "IV36875"
    ],
    "fixedIn": "7100-02-03",
    "ifixes": [
      "IV36875.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV36875",
    "filesets": [
      "bos.rte.bind_cmds:7.1.2.0"
    ],
    "issued": "20130218",
    "updated": "20131124",
    "siblings": [
      "6100-08:IV36851",
      "7100-02:IV36875"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv36875/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08"
    ],
    "apAbstract": "SYSTEM CRASH IN SEMSLEEP() WHEN CREATING/DELETING SEMAPHORES",
    "aparNo": "IV37083",
    "aparNoSet": [
      "IV37083"
    ],
    "fixedIn": "7100-00-09",
    "ifixes": [
      "IV37083.epkg.Z",
      "IV37083s8a.130225.71TL00SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV37083",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.21"
    ],
    "issued": "20130221",
    "updated": "20130430",
    "siblings": [
      "6100-07:IV27680",
      "6100-08:IV32845",
      "6100-08:IV32845",
      "7100-01:IV30075",
      "7100-02:IV33155"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv37083/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02"
    ],
    "apAbstract": "ADDRESS FROM SORECEIVE NOT FILLED IN FOR UDP PACKETS",
    "aparNo": "IV37701",
    "aparNoSet": [
      "IV37701"
    ],
    "fixedIn": "6100-08-03",
    "ifixes": [
      "IV37701.epkg.Z",
      "IV37701s2a.130308.61TL08SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV37701",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130307",
    "updated": "20131124",
    "siblings": [
      "6100-08:IV37701",
      "6100-09:IV39175",
      "7100-02:IV37783",
      "7100-03:IV39176"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv37701/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "ADDRESS FROM SORECEIVE NOT FILLED IN FOR UDP PACKETS",
    "aparNo": "IV37783",
    "aparNoSet": [
      "IV37783"
    ],
    "fixedIn": "7100-02-03",
    "ifixes": [
      "IV37783.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV37783",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.15"
    ],
    "issued": "20130310",
    "updated": "20131124",
    "siblings": [
      "6100-08:IV37701",
      "6100-09:IV39175",
      "7100-02:IV37783",
      "7100-03:IV39176"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv37783/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10",
      "6100-06-11"
    ],
    "apAbstract": "Vulnerability in AIX inet",
    "aparNo": "IV37925",
    "aparNoSet": [
      "CVE-2013-3035",
      "IV37925"
    ],
    "fixedIn": "6100-06-12",
    "ifixes": [
      "IV37925sBa.130508.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035",
    "filesets": [
      "bos.net.tcp.client:6.1.6.0-6.1.6.22"
    ],
    "issued": "20130604",
    "updated": "20130605",
    "siblings": [
      "6100-06:IV37925",
      "6100-07:IV42072",
      "6100-08:IV42124",
      "6100-09:IV41119",
      "7100-00:IV42264",
      "7100-01:IV42229",
      "7100-02:IV42095",
      "7100-03:IV41015"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar",
    "cvss": [
      "CVE-2013-3035:7.1"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "RUNNING MULTIPLE FUSER COMMANDS CAN HANG OR CRASH THE SYSTEM APP",
    "aparNo": "IV38251",
    "aparNoSet": [
      "IV38251"
    ],
    "fixedIn": "7100-02-03",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38251",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.15"
    ],
    "issued": "20130319",
    "updated": "20131124",
    "siblings": [
      "6100-06:IV36527",
      "6100-07:IV34105",
      "6100-08:IV38589",
      "6100-09:IV36642",
      "7100-00:IV36835",
      "7100-01:IV36524",
      "7100-02:IV38251",
      "7100-03:IV36832"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02"
    ],
    "apAbstract": "USERDEL REMOVE -F FLAG",
    "aparNo": "IV38411",
    "aparNoSet": [
      "IV38411"
    ],
    "fixedIn": "6100-08-03",
    "ifixes": [
      "IV38411.epkg.Z",
      "IV38411m2a.130809.61TL08SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38411",
    "filesets": [
      "bos.rte.security:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130320",
    "updated": "20131126",
    "siblings": [
      "6100-08:IV38411",
      "6100-09:IV39043",
      "7100-02:IV38414",
      "7100-03:IV38487"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv38411/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "USERDEL REMOVE -F FLAG",
    "aparNo": "IV38414",
    "aparNoSet": [
      "IV38414"
    ],
    "fixedIn": "7100-02-03",
    "ifixes": [
      "IV38414.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38414",
    "filesets": [
      "bos.rte.security:7.1.2.0-7.1.2.15"
    ],
    "issued": "20130320",
    "updated": "20131126",
    "siblings": [
      "6100-08:IV38411",
      "6100-09:IV39043",
      "7100-02:IV38414",
      "7100-03:IV38487"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv38414/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02"
    ],
    "apAbstract": "ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST",
    "aparNo": "IV38695",
    "aparNoSet": [
      "IV38695"
    ],
    "fixedIn": "6100-08-03",
    "ifixes": [
      "IV38695s1a.130603.61TL08SP01.epkg.Z",
      "IV38695s2a.130621.epkg.Z",
      "IV38695s2a.130621.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38695",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130327",
    "updated": "20131124",
    "siblings": [
      "6100-07:IV39384",
      "6100-08:IV38695",
      "6100-09:IV37549",
      "7100-01:IV41362",
      "7100-02:IV38879",
      "7100-03:IV37484"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv38695/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02"
    ],
    "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL",
    "aparNo": "IV38743",
    "aparNoSet": [
      "IV38743"
    ],
    "fixedIn": "6100-08-03",
    "ifixes": [
      "IV38743.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38743",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130328",
    "updated": "20131126",
    "siblings": [
      "6100-06:IV33883",
      "6100-07:IV40614",
      "6100-08:IV38743",
      "7100-00:IV41813",
      "7100-01:IV41421",
      "7100-02:IV38915"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv38743/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST",
    "aparNo": "IV38879",
    "aparNoSet": [
      "IV38879"
    ],
    "fixedIn": "7100-02-03",
    "ifixes": [
      "IV38879s2a.130603.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38879",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.1.2.0-7.1.2.15"
    ],
    "issued": "20130328",
    "updated": "20131124",
    "siblings": [
      "6100-07:IV39384",
      "6100-08:IV38695",
      "6100-09:IV37549",
      "7100-01:IV41362",
      "7100-02:IV38879",
      "7100-03:IV37484"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv38879/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN FREE PROCESSORS IN POOL",
    "aparNo": "IV38915",
    "aparNoSet": [
      "IV38915"
    ],
    "fixedIn": "7100-02-03",
    "ifixes": [
      "IV38915.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV38915",
    "filesets": [
      "bos.adt.include:7.1.2.0-7.1.2.15",
      "bos.mp64:7.1.2.0-7.1.2.15"
    ],
    "issued": "20130328",
    "updated": "20131126",
    "siblings": [
      "6100-06:IV33883",
      "6100-07:IV40614",
      "6100-08:IV38743",
      "7100-00:IV41813",
      "7100-01:IV41421",
      "7100-02:IV38915"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv41421/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07"
    ],
    "apAbstract": "ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST",
    "aparNo": "IV39384",
    "aparNoSet": [
      "IV39384"
    ],
    "fixedIn": "6100-07-08",
    "ifixes": [
      "IV39384s7a.130627.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV39384",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:6.1.7.0-6.1.7.18"
    ],
    "issued": "20130405",
    "updated": "20131124",
    "siblings": [
      "6100-07:IV39384",
      "6100-08:IV38695",
      "6100-09:IV37549",
      "7100-01:IV41362",
      "7100-02:IV38879",
      "7100-03:IV37484"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv39384/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10",
      "6100-06-11"
    ],
    "apAbstract": "tftp Security Vulnerability",
    "aparNo": "IV40221",
    "aparNoSet": [
      "CVE-2013-3005",
      "IV40221"
    ],
    "fixedIn": "6100-06-12",
    "ifixes": [
      "IV40221s11.130617.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559",
    "filesets": [
      "bos.net.tcp.client:6.1.6.0-6.1.6.22"
    ],
    "issued": "20130703",
    "updated": "null",
    "siblings": [
      "6100-06:IV40221",
      "6100-07:IV42932",
      "6100-08:IV42933",
      "6100-09:IV42299",
      "7100-00:IV42934",
      "7100-01:IV42700",
      "7100-02:IV42935",
      "7100-03:IV43256"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar",
    "cvss": [
      "CVE-2013-3005:7.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07"
    ],
    "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL",
    "aparNo": "IV40614",
    "aparNoSet": [
      "IV40614"
    ],
    "fixedIn": "6100-07-08",
    "ifixes": [
      "IV40614.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV40614",
    "filesets": [
      "bos.adt.include:6.1.7.15-6.1.7.18",
      "bos.mp64:6.1.7.15-6.1.7.18"
    ],
    "issued": "20130424",
    "updated": "20131126",
    "siblings": [
      "6100-06:IV33883",
      "6100-07:IV40614",
      "6100-08:IV38743",
      "7100-00:IV41813",
      "7100-01:IV41421",
      "7100-02:IV38915"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv40614/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07"
    ],
    "apAbstract": "ATTEMPT FAILED.OPENED STATE DOES NOT RETRY NPIV LOGIN IF FIRST",
    "aparNo": "IV41362",
    "aparNoSet": [
      "IV41362"
    ],
    "fixedIn": "7100-01-09",
    "ifixes": [
      "IV41362s7a.130627.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV41362",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.1.1.0-7.1.1.19"
    ],
    "issued": "20130502",
    "updated": "20131124",
    "siblings": [
      "6100-07:IV39384",
      "6100-08:IV38695",
      "6100-09:IV37549",
      "7100-01:IV41362",
      "7100-02:IV38879",
      "7100-03:IV37484"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv41362/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07"
    ],
    "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL 13/05/23 PTF PECHANGE",
    "aparNo": "IV41421",
    "aparNoSet": [
      "IV41421"
    ],
    "fixedIn": "7100-01-08",
    "ifixes": [
      "IV41412.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV41421",
    "filesets": [
      "bos.adt.include:7.1.1.15-7.1.1.18",
      "bos.mp64:7.1.1.15-7.1.1.18"
    ],
    "issued": "20130502",
    "updated": "20131126",
    "siblings": [
      "6100-06:IV33883",
      "6100-07:IV40614",
      "6100-08:IV38743",
      "7100-00:IV41813",
      "7100-01:IV41421",
      "7100-02:IV38915"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv41421/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09"
    ],
    "apAbstract": "LPARSTAT APP VALUE REPORTS 0 WHEN PROCESSORS IN POOL 13/05/23 PTF PECHANGE",
    "aparNo": "IV41813",
    "aparNoSet": [
      "IV41813"
    ],
    "fixedIn": "7100-00-10",
    "ifixes": [
      "IV41813.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV41813",
    "filesets": [
      "bos.mp64:7.1.0.19-7.1.0.22"
    ],
    "issued": "20130506",
    "updated": "20131126",
    "siblings": [
      "6100-06:IV33883",
      "6100-07:IV40614",
      "6100-08:IV38743",
      "7100-00:IV41813",
      "7100-01:IV41421",
      "7100-02:IV38915"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv41813/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07"
    ],
    "apAbstract": "Vulnerability in AIX inet",
    "aparNo": "IV42072",
    "aparNoSet": [
      "CVE-2013-3035",
      "IV42072"
    ],
    "fixedIn": "6100-07-08",
    "ifixes": [
      "IV42072s7a.130508.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.18"
    ],
    "issued": "20130604",
    "updated": "20130605",
    "siblings": [
      "6100-06:IV37925",
      "6100-07:IV42072",
      "6100-08:IV42124",
      "6100-09:IV41119",
      "7100-00:IV42264",
      "7100-01:IV42229",
      "7100-02:IV42095",
      "7100-03:IV41015"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar",
    "cvss": [
      "CVE-2013-3035:7.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7"
    ],
    "apAbstract": "Vulnerability in VIOS inet",
    "aparNo": "IV42072",
    "aparNoSet": [
      "CVE-2013-3035",
      "IV42072"
    ],
    "fixedIn": "2.2.1.8",
    "ifixes": [
      "IV42072s7a.130508.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20VIOS%20inet%20Vulnerability%20CVE-2013-3035",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.18"
    ],
    "issued": "20130604",
    "updated": "20130605",
    "siblings": [
      "6100-06:IV37925",
      "6100-07:IV42072",
      "6100-08:IV42124",
      "6100-09:IV41119",
      "7100-00:IV42264",
      "7100-01:IV42229",
      "7100-02:IV42095",
      "7100-03:IV41015"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar",
    "cvss": [
      "CVE-2013-3035:7.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "Vulnerability in AIX inet",
    "aparNo": "IV42095",
    "aparNoSet": [
      "CVE-2013-3035",
      "IV42095"
    ],
    "fixedIn": "7100-02-03",
    "ifixes": [
      "IV42095s2a.130514.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.15"
    ],
    "issued": "20130604",
    "updated": "20130605",
    "siblings": [
      "6100-06:IV37925",
      "6100-07:IV42072",
      "6100-08:IV42124",
      "6100-09:IV41119",
      "7100-00:IV42264",
      "7100-01:IV42229",
      "7100-02:IV42095",
      "7100-03:IV41015"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar",
    "cvss": [
      "CVE-2013-3035:7.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02"
    ],
    "apAbstract": "Vulnerability in AIX inet",
    "aparNo": "IV42124",
    "aparNoSet": [
      "CVE-2013-3035",
      "IV42124"
    ],
    "fixedIn": "6100-08-03",
    "ifixes": [
      "IV42124s2a.130514.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130604",
    "updated": "20130605",
    "siblings": [
      "6100-06:IV37925",
      "6100-07:IV42072",
      "6100-08:IV42124",
      "6100-09:IV41119",
      "7100-00:IV42264",
      "7100-01:IV42229",
      "7100-02:IV42095",
      "7100-03:IV41015"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar",
    "cvss": [
      "CVE-2013-3035:7.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2"
    ],
    "apAbstract": "Vulnerability in VIOS inet",
    "aparNo": "IV42124",
    "aparNoSet": [
      "CVE-2013-3035",
      "IV42124"
    ],
    "fixedIn": "2.2.2.3",
    "ifixes": [
      "IV42124s2a.130514.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20VIOS%20inet%20Vulnerability%20CVE-2013-3035",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130604",
    "updated": "20130605",
    "siblings": [
      "6100-06:IV37925",
      "6100-07:IV42072",
      "6100-08:IV42124",
      "6100-09:IV41119",
      "7100-00:IV42264",
      "7100-01:IV42229",
      "7100-02:IV42095",
      "7100-03:IV41015"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar",
    "cvss": [
      "CVE-2013-3035:7.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07"
    ],
    "apAbstract": "Vulnerability in AIX inet",
    "aparNo": "IV42229",
    "aparNoSet": [
      "CVE-2013-3035",
      "IV42229"
    ],
    "fixedIn": "7100-01-08",
    "ifixes": [
      "IV42229s7a.130522.epkg.Z",
      "IV42229s6a.130514.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035",
    "filesets": [
      "bos.net.tcp.client:7.1.1.0-7.1.1.18"
    ],
    "issued": "20130604",
    "updated": "20130605",
    "siblings": [
      "6100-06:IV37925",
      "6100-07:IV42072",
      "6100-08:IV42124",
      "6100-09:IV41119",
      "7100-00:IV42264",
      "7100-01:IV42229",
      "7100-02:IV42095",
      "7100-03:IV41015"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar",
    "cvss": [
      "CVE-2013-3035:7.1"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09"
    ],
    "apAbstract": "Vulnerability in AIX inet",
    "aparNo": "IV42264",
    "aparNoSet": [
      "CVE-2013-3035",
      "IV42264"
    ],
    "fixedIn": "7100-00-10",
    "ifixes": [
      "IV42264s9a.130522.epkg.Z",
      "IV42264s8a.130514.epkg.Z"
    ],
    "bulletinUrl": "https://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201306/SECURITY/20130605/datafile060613\u0026label\u003dUPDATE%20AIX%20inet%20Vulnerability%20CVE-2013-3035",
    "filesets": [
      "bos.net.tcp.client:7.1.0.0-7.1.0.23"
    ],
    "issued": "20130604",
    "updated": "20130605",
    "siblings": [
      "6100-06:IV37925",
      "6100-07:IV42072",
      "6100-08:IV42124",
      "6100-09:IV41119",
      "7100-00:IV42264",
      "7100-01:IV42229",
      "7100-02:IV42095",
      "7100-03:IV41015"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/inet_fix.tar",
    "cvss": [
      "CVE-2013-3035:7.1"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().",
    "aparNo": "IV42324",
    "aparNoSet": [
      "IV42324"
    ],
    "fixedIn": "7100-02-03",
    "ifixes": [
      "U857589",
      "bos.mp64:7.1.2.16"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV42324",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.15"
    ],
    "issued": "20130510",
    "updated": "20131124",
    "siblings": [
      "6100-06:IZ94647",
      "6100-07:IV13404",
      "6100-08:IV14309",
      "6100-09:IV42440",
      "7100-00:IV42334",
      "7100-01:IV27584",
      "7100-02:IV42324",
      "7100-03:IV42412"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv42324/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09"
    ],
    "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().",
    "aparNo": "IV42334",
    "aparNoSet": [
      "IV42334"
    ],
    "fixedIn": "7100-00-10",
    "ifixes": [
      "IV42324s2a.130730.epkg.Z",
      "IV42324s2a.130730.71TL02SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV42334",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.22"
    ],
    "issued": "20130510",
    "updated": "20131124",
    "siblings": [
      "6100-06:IZ94647",
      "6100-07:IV13404",
      "6100-08:IV14309",
      "6100-09:IV42440",
      "7100-00:IV42334",
      "7100-01:IV27584",
      "7100-02:IV42324",
      "7100-03:IV42412"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv42324/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07"
    ],
    "apAbstract": "tftp Security Vulnerability",
    "aparNo": "IV42700",
    "aparNoSet": [
      "CVE-2013-3005",
      "IV42700"
    ],
    "fixedIn": "7100-01-08",
    "ifixes": [
      "IV42700s7a.130617.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559",
    "filesets": [
      "bos.net.tcp.client:7.1.1.0-7.1.1.18"
    ],
    "issued": "20130703",
    "updated": "20130703",
    "siblings": [
      "6100-06:IV40221",
      "6100-07:IV42932",
      "6100-08:IV42933",
      "6100-09:IV42299",
      "7100-00:IV42934",
      "7100-01:IV42700",
      "7100-02:IV42935",
      "7100-03:IV43256"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar",
    "cvss": [
      "CVE-2013-3005:7.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7"
    ],
    "apAbstract": "tftp Security Vulnerability",
    "aparNo": "IV42932",
    "aparNoSet": [
      "CVE-2013-3005",
      "IV42932"
    ],
    "fixedIn": "2.2.1.8",
    "ifixes": [
      "IV42933s2a.130617.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.18"
    ],
    "issued": "20130703",
    "updated": "null",
    "siblings": [
      "6100-06:IV40221",
      "6100-07:IV42932",
      "6100-08:IV42933",
      "6100-09:IV42299",
      "7100-00:IV42934",
      "7100-01:IV42700",
      "7100-02:IV42935",
      "7100-03:IV43256"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar",
    "cvss": [
      "CVE-2013-3005:7.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07"
    ],
    "apAbstract": "tftp Security Vulnerability",
    "aparNo": "IV42932",
    "aparNoSet": [
      "CVE-2013-3005",
      "IV42932"
    ],
    "fixedIn": "6100-07-08",
    "ifixes": [
      "IV42933s2a.130617.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559",
    "filesets": [
      "bos.net.tcp.client:6.1.7.0-6.1.7.18"
    ],
    "issued": "20130703",
    "updated": "null",
    "siblings": [
      "6100-06:IV40221",
      "6100-07:IV42932",
      "6100-08:IV42933",
      "6100-09:IV42299",
      "7100-00:IV42934",
      "7100-01:IV42700",
      "7100-02:IV42935",
      "7100-03:IV43256"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar",
    "cvss": [
      "CVE-2013-3005:7.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2"
    ],
    "apAbstract": "tftp Security Vulnerability",
    "aparNo": "IV42933",
    "aparNoSet": [
      "CVE-2013-3005",
      "IV42933"
    ],
    "fixedIn": "2.2.2.3",
    "ifixes": [
      "IV42933s2a.130617.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130703",
    "updated": "null",
    "siblings": [
      "6100-06:IV40221",
      "6100-07:IV42932",
      "6100-08:IV42933",
      "6100-09:IV42299",
      "7100-00:IV42934",
      "7100-01:IV42700",
      "7100-02:IV42935",
      "7100-03:IV43256"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar",
    "cvss": [
      "CVE-2013-3005:7.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02"
    ],
    "apAbstract": "tftp Security Vulnerability",
    "aparNo": "IV42933",
    "aparNoSet": [
      "CVE-2013-3005",
      "IV42933"
    ],
    "fixedIn": "6100-08-03",
    "ifixes": [
      "IV42933s2a.130617.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559",
    "filesets": [
      "bos.net.tcp.client:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130703",
    "updated": "null",
    "siblings": [
      "6100-06:IV40221",
      "6100-07:IV42932",
      "6100-08:IV42933",
      "6100-09:IV42299",
      "7100-00:IV42934",
      "7100-01:IV42700",
      "7100-02:IV42935",
      "7100-03:IV43256"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar",
    "cvss": [
      "CVE-2013-3005:7.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09"
    ],
    "apAbstract": "tftp Security Vulnerability",
    "aparNo": "IV42934",
    "aparNoSet": [
      "CVE-2013-3005",
      "IV42934"
    ],
    "fixedIn": "7100-00-10",
    "ifixes": [
      "IV42934s9a.130617.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559",
    "filesets": [
      "bos.net.tcp.client:7.1.0.0-7.1.0.23"
    ],
    "issued": "20130703",
    "updated": "20130703",
    "siblings": [
      "6100-06:IV40221",
      "6100-07:IV42932",
      "6100-08:IV42933",
      "6100-09:IV42299",
      "7100-00:IV42934",
      "7100-01:IV42700",
      "7100-02:IV42935",
      "7100-03:IV43256"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar",
    "cvss": [
      "CVE-2013-3005:7.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "tftp Security Vulnerability",
    "aparNo": "IV42935",
    "aparNoSet": [
      "CVE-2013-3005",
      "IV42935"
    ],
    "fixedIn": "7100-02-03",
    "ifixes": [
      "IV42935s2a.130617.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741559",
    "filesets": [
      "bos.net.tcp.client:7.1.2.0-7.1.2.15"
    ],
    "issued": "20130703",
    "updated": "null",
    "siblings": [
      "6100-06:IV40221",
      "6100-07:IV42932",
      "6100-08:IV42933",
      "6100-09:IV42299",
      "7100-00:IV42934",
      "7100-01:IV42700",
      "7100-02:IV42935",
      "7100-03:IV43256"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tftp_fix.tar",
    "cvss": [
      "CVE-2013-3005:7.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "Security Vulnerabilities in AIX InfiniBand",
    "aparNo": "IV43561",
    "aparNoSet": [
      "CVE-2013-4011",
      "IV43561"
    ],
    "fixedIn": "7100-02-03",
    "ifixes": [
      "iv43561m2a.130626.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571",
    "filesets": [
      "devices.common.IBM.ib.rte:7.1.2.0-7.1.2.15"
    ],
    "issued": "20130716",
    "updated": "null",
    "siblings": [
      "6100-06:IV43582",
      "6100-07:IV43106",
      "6100-08:IV43580",
      "6100-09:IV43657",
      "7100-00:IV43562",
      "7100-01:IV43539",
      "7100-02:IV43561",
      "7100-03:IV43652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar",
    "cvss": [
      "CVE-2013-4011:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09"
    ],
    "apAbstract": "Security Vulnerabilities in AIX InfiniBand",
    "aparNo": "IV43562",
    "aparNoSet": [
      "CVE-2013-4011",
      "IV43562"
    ],
    "fixedIn": "7100-00-10",
    "ifixes": [
      "iv43562m9.130626.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571",
    "filesets": [
      "devices.common.IBM.ib.rte:7.1.0.0-7.1.0.21"
    ],
    "issued": "20130716",
    "updated": "null",
    "siblings": [
      "6100-06:IV43582",
      "6100-07:IV43106",
      "6100-08:IV43580",
      "6100-09:IV43657",
      "7100-00:IV43562",
      "7100-01:IV43539",
      "7100-02:IV43561",
      "7100-03:IV43652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar",
    "cvss": [
      "CVE-2013-4011:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02"
    ],
    "apAbstract": "Security Vulnerabilities in AIX InfiniBand",
    "aparNo": "IV43580",
    "aparNoSet": [
      "CVE-2013-4011",
      "IV43580"
    ],
    "fixedIn": "6100-08-03",
    "ifixes": [
      "iv43580m2a.130619.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571",
    "filesets": [
      "devices.common.IBM.ib.rte:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130716",
    "updated": "null",
    "siblings": [
      "6100-06:IV43582",
      "6100-07:IV43106",
      "6100-08:IV43580",
      "6100-09:IV43657",
      "7100-00:IV43562",
      "7100-01:IV43539",
      "7100-02:IV43561",
      "7100-03:IV43652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar",
    "cvss": [
      "CVE-2013-4011:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7"
    ],
    "apAbstract": "Security Vulnerabilities in VIOS InfiniBand",
    "aparNo": "IV43580",
    "aparNoSet": [
      "CVE-2013-4011",
      "IV43580"
    ],
    "fixedIn": "2.2.1.8",
    "ifixes": [
      "iv43827m7a.130614.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571",
    "filesets": [
      "devices.common.IBM.ibm.rte:6.1.7.0-6.1.7.16"
    ],
    "issued": "20130716",
    "updated": "null",
    "siblings": [
      "6100-06:IV43582",
      "6100-07:IV43106",
      "6100-08:IV43580",
      "6100-09:IV43657",
      "7100-00:IV43562",
      "7100-01:IV43539",
      "7100-02:IV43561",
      "7100-03:IV43652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar",
    "cvss": [
      "CVE-2013-4011:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2"
    ],
    "apAbstract": "Security Vulnerabilities in VIOS InfiniBand",
    "aparNo": "IV43580",
    "aparNoSet": [
      "CVE-2013-4011",
      "IV43580"
    ],
    "fixedIn": "2.2.2.3",
    "ifixes": [
      "iv43580m2a.130619.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571",
    "filesets": [
      "devices.common.IBM.ib.rte:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130716",
    "updated": "null",
    "siblings": [
      "6100-06:IV43582",
      "6100-07:IV43106",
      "6100-08:IV43580",
      "6100-09:IV43657",
      "7100-00:IV43562",
      "7100-01:IV43539",
      "7100-02:IV43561",
      "7100-03:IV43652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar",
    "cvss": [
      "CVE-2013-4011:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10",
      "6100-06-11"
    ],
    "apAbstract": "Security Vulnerabilities in AIX InfiniBand",
    "aparNo": "IV43582",
    "aparNoSet": [
      "CVE-2013-4011",
      "IV43582"
    ],
    "fixedIn": "6100-06-12",
    "ifixes": [
      "iv43582mBa.130626.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571",
    "filesets": [
      "devices.common.IBM.ib.rte:6.1.6.0-6.1.6.21"
    ],
    "issued": "20130716",
    "updated": "null",
    "siblings": [
      "6100-06:IV43582",
      "6100-07:IV43106",
      "6100-08:IV43580",
      "6100-09:IV43657",
      "7100-00:IV43562",
      "7100-01:IV43539",
      "7100-02:IV43561",
      "7100-03:IV43652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar",
    "cvss": [
      "CVE-2013-4011:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07"
    ],
    "apAbstract": "Security Vulnerabilities in AIX InfiniBand",
    "aparNo": "IV43756",
    "aparNoSet": [
      "CVE-2013-4011",
      "IV43756"
    ],
    "fixedIn": "7100-01-08",
    "ifixes": [
      "iv43756m7a.130612.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571",
    "filesets": [
      "devices.common.IBM.ib.rte:7.1.1.0-7.1.1.18"
    ],
    "issued": "20130716",
    "updated": "null",
    "siblings": [
      "6100-06:IV43582",
      "6100-07:IV43106",
      "6100-08:IV43580",
      "6100-09:IV43657",
      "7100-00:IV43562",
      "7100-01:IV43539",
      "7100-02:IV43561",
      "7100-03:IV43652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar",
    "cvss": [
      "CVE-2013-4011:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07"
    ],
    "apAbstract": "Security Vulnerabilities in AIX InfiniBand",
    "aparNo": "IV43827",
    "aparNoSet": [
      "CVE-2013-4011",
      "IV43827"
    ],
    "fixedIn": "6100-07-08",
    "ifixes": [
      "iv43827m7a.130614.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741571",
    "filesets": [
      "devices.common.IBM.ibm.rte:6.1.7.0-6.1.7.16"
    ],
    "issued": "20130716",
    "updated": "null",
    "siblings": [
      "6100-06:IV43582",
      "6100-07:IV43106",
      "6100-08:IV43580",
      "6100-09:IV43657",
      "7100-00:IV43562",
      "7100-01:IV43539",
      "7100-02:IV43561",
      "7100-03:IV43652"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/infiniband_fix.tar",
    "cvss": [
      "CVE-2013-4011:7.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08"
    ],
    "apAbstract": "Security vulnerabilities in Perl for AIX",
    "aparNo": "IV43973",
    "aparNoSet": [
      "CVE-2012-5526",
      "CVE-2013-1667",
      "IV43973"
    ],
    "fixedIn": "6100-09-00",
    "ifixes": [],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740761",
    "filesets": [
      "perl.rte:5.8.8.0-5.8.8.244"
    ],
    "issued": "20131120",
    "updated": "20131204",
    "siblings": [
      "7100-00:IV46765"
    ],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2012-5526:4.3",
      "CVE-2013-1667:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2",
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7"
    ],
    "apAbstract": "Security vulnerabilities in Perl for VIOS",
    "aparNo": "IV43973",
    "aparNoSet": [
      "CVE-2012-5526",
      "CVE-2013-1667",
      "IV43973"
    ],
    "fixedIn": "2.2.3.0",
    "ifixes": [],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740761s",
    "filesets": [
      "perl.rte:5.8.8.0-5.8.8.244"
    ],
    "issued": "20131120",
    "updated": "20131204",
    "siblings": [
      "7100-00:IV46765"
    ],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2012-5526:4.3",
      "CVE-2013-1667:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03"
    ],
    "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP",
    "aparNo": "IV44039",
    "aparNoSet": [
      "IV44039"
    ],
    "fixedIn": "7100-02-04",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV44039",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.16"
    ],
    "issued": "20140605",
    "updated": "null",
    "siblings": [
      "6100-07:IV47865",
      "6100-08:IV46850",
      "6100-09:IV46897",
      "7100-01:IV49394",
      "7100-02:IV44039",
      "7100-03:IV46950"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10",
      "6100-06-11",
      "6100-06-12"
    ],
    "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT",
    "aparNo": "IV45736",
    "aparNoSet": [
      "IV45736"
    ],
    "fixedIn": "6100-07-09",
    "ifixes": [
      "IV45736sAa.130721.61TL06SP10.epkg.Z",
      "IV45736sAa.130721.epkg.Z",
      "IV45736sBa.130724.61TL06SP11.epkg.Z",
      "IV45736sBa.130724.epkg.Z",
      "IV45736sCa.130916.61TL06SP12.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV45736",
    "filesets": [
      "bos.mp64:6.1.6.18-6.1.6.23"
    ],
    "issued": "20130716",
    "updated": "20130814",
    "siblings": [
      "7100-00:IV46105",
      "7100-01:IV45899",
      "7100-02:IV46104",
      "6100-06:IV45736",
      "6100-07:IV45897",
      "6100-08:IV45898"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv45736/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08"
    ],
    "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT",
    "aparNo": "IV45897",
    "aparNoSet": [
      "IV45897"
    ],
    "fixedIn": "6100-07-09",
    "ifixes": [
      "IV45897s7a.130724.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV45897",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.19"
    ],
    "issued": "20130721",
    "updated": "20140217",
    "siblings": [
      "7100-00:IV46105",
      "7100-01:IV45899",
      "7100-02:IV46104",
      "6100-06:IV45736",
      "6100-07:IV45897",
      "6100-08:IV45898"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv45897/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03"
    ],
    "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT",
    "aparNo": "IV45898",
    "aparNoSet": [
      "IV45898"
    ],
    "fixedIn": "6100-08-04",
    "ifixes": [
      "IV45898s2b.130724.epkg.Z",
      "IV45898s3a.130819.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV45898",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.16"
    ],
    "issued": "20130721",
    "updated": "20140217",
    "siblings": [
      "7100-00:IV46105",
      "7100-01:IV45899",
      "7100-02:IV46104",
      "6100-06:IV45736",
      "6100-07:IV45897",
      "6100-08:IV45898"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv45898/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08"
    ],
    "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT",
    "aparNo": "IV45899",
    "aparNoSet": [
      "IV45899"
    ],
    "fixedIn": "7100-01-09",
    "ifixes": [
      "IV45899s7a.130724.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV45899",
    "filesets": [
      "bos.mp64:7.1.1.1-7.1.1.19"
    ],
    "issued": "20130721",
    "updated": "20140217",
    "siblings": [
      "7100-00:IV46105",
      "7100-01:IV45899",
      "7100-02:IV46104",
      "6100-06:IV45736",
      "6100-07:IV45897",
      "6100-08:IV45898"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv45899/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03"
    ],
    "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT",
    "aparNo": "IV46104",
    "aparNoSet": [
      "IV46104"
    ],
    "fixedIn": "7100-02-04",
    "ifixes": [
      "IV46104s2a.130725.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46104",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.16"
    ],
    "issued": "20130724",
    "updated": "20140217",
    "siblings": [
      "7100-00:IV46105",
      "7100-01:IV45899",
      "7100-02:IV46104",
      "6100-06:IV45736",
      "6100-07:IV45897",
      "6100-08:IV45898"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv46104/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09"
    ],
    "apAbstract": "SYSTEM CRASHES DUE TO AN IMPROPER ASSERT IN TXCOMMIT",
    "aparNo": "IV46105",
    "aparNoSet": [
      "IV46105"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IV46105s9a.130725.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46105",
    "filesets": [
      "bos.mp64:7.1.0.0-7.1.0.23"
    ],
    "issued": "20130724",
    "updated": "20130814",
    "siblings": [
      "7100-00:IV46105",
      "7100-01:IV45899",
      "7100-02:IV46104",
      "6100-06:IV45736",
      "6100-07:IV45897",
      "6100-08:IV45898"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv46105/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03"
    ],
    "apAbstract": "Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system",
    "aparNo": "IV46246",
    "aparNoSet": [
      "IV46246"
    ],
    "fixedIn": "7100-02-04",
    "ifixes": [
      "IV46246s3a.130821.71TL02SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46246",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.16"
    ],
    "issued": "20130729",
    "updated": "20140217",
    "siblings": [
      "7100-02:IV46246",
      "7100-01:IV48042",
      "6100-08:IV47394"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv46246/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00"
    ],
    "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP",
    "aparNo": "IV46590",
    "aparNoSet": [
      "IV46590"
    ],
    "fixedIn": "7100-03-01",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46950",
    "filesets": [
      "bos.mp64:7.1.3.0"
    ],
    "issued": "20140605",
    "updated": "null",
    "siblings": [
      "6100-07:IV47865",
      "6100-08:IV46850",
      "6100-09:IV46897",
      "7100-01:IV49394",
      "7100-02:IV44039",
      "7100-03:IV46950"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08"
    ],
    "apAbstract": "Security vulnerabilities in Perl for AIX",
    "aparNo": "IV46765",
    "aparNoSet": [
      "CVE-2012-5526",
      "CVE-2013-1667",
      "IV46765"
    ],
    "fixedIn": "7100-03-00",
    "ifixes": [],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740761",
    "filesets": [
      "perl.rte:5.10.1.0-5.10.1.150"
    ],
    "issued": "20121120",
    "updated": "20131204",
    "siblings": [
      "6100-00:IV43973"
    ],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2012-5526:4.3",
      "CVE-2013-1667:4.3"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03"
    ],
    "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP",
    "aparNo": "IV46850",
    "aparNoSet": [
      "IV46850"
    ],
    "fixedIn": "6100-08-04",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46850",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.16"
    ],
    "issued": "20140605",
    "updated": "null",
    "siblings": [
      "6100-07:IV47865",
      "6100-08:IV46850",
      "6100-09:IV46897",
      "7100-01:IV49394",
      "7100-02:IV44039",
      "7100-03:IV46950"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00"
    ],
    "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP",
    "aparNo": "IV46897",
    "aparNoSet": [
      "IV46897"
    ],
    "fixedIn": "6100-09-01",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV46897",
    "filesets": [
      "bos.mp64:\u003c6.1.9.15"
    ],
    "issued": "20140605",
    "updated": "null",
    "siblings": [
      "6100-07:IV47865",
      "6100-08:IV46850",
      "6100-09:IV46897",
      "7100-01:IV49394",
      "7100-02:IV44039",
      "7100-03:IV46950"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03"
    ],
    "apAbstract": "VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS",
    "aparNo": "IV47037",
    "aparNoSet": [
      "IV47037"
    ],
    "fixedIn": "6100-08-04",
    "ifixes": [
      "IV47037s3a.130828.61TL08SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47037",
    "filesets": [
      "devices.pci.77102224.com:6.1.8.0-6.1.8.17"
    ],
    "issued": "20130813",
    "updated": "20140217",
    "siblings": [
      "6100-07:IV47348",
      "6100-08:IV47037",
      "6100-09:IV47532",
      "7100-01:IV47350",
      "7100-02:IV47351",
      "7100-03:IV47353"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv47037/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08"
    ],
    "apAbstract": "VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS",
    "aparNo": "IV47347",
    "aparNoSet": [
      "IV47347"
    ],
    "fixedIn": "5300-12-09",
    "ifixes": [
      "IV47347s8a.130925.53TL12SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47347",
    "filesets": [
      "devices.pci.77102224.com:5.3.12.0-5.3.12.8"
    ],
    "issued": "20130821",
    "updated": "20131002",
    "siblings": [
      "7100-01:IV47350",
      "7100-02:IV47351",
      "6100-07:IV47348",
      "6100-08:IV47037",
      "5300-12:IV47347"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/iv47347/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08"
    ],
    "apAbstract": "VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS",
    "aparNo": "IV47348",
    "aparNoSet": [
      "IV47348"
    ],
    "fixedIn": "6100-07-09",
    "ifixes": [
      "IV47348s8a.130917.61TL07SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47348",
    "filesets": [
      "devices.pci.77102224.com:6.1.7.0-6.1.7.19"
    ],
    "issued": "20130821",
    "updated": "20140217",
    "siblings": [
      "6100-07:IV47348",
      "6100-08:IV47037",
      "6100-09:IV47532",
      "7100-01:IV47350",
      "7100-02:IV47351",
      "7100-03:IV47353"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv47348/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08"
    ],
    "apAbstract": "VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS",
    "aparNo": "IV47350",
    "aparNoSet": [
      "IV47350"
    ],
    "fixedIn": "7100-01-09",
    "ifixes": [
      "IV47350s8a.130923.71TL01SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47350",
    "filesets": [
      "devices.pci.77102224.com:7.1.1.0-7.1.1.20"
    ],
    "issued": "20130821",
    "updated": "20140217",
    "siblings": [
      "6100-07:IV47348",
      "6100-08:IV47037",
      "6100-09:IV47532",
      "7100-01:IV47350",
      "7100-02:IV47351",
      "7100-03:IV47353"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv47350/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03"
    ],
    "apAbstract": "VARIOUS I/O AND LINK ISSUES IN PUREFLEX/BLADE SYSTEMS",
    "aparNo": "IV47351",
    "aparNoSet": [
      "IV47351"
    ],
    "fixedIn": "7100-02-04",
    "ifixes": [
      "IV47351s3a.130925.71TL02SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47351",
    "filesets": [
      "devices.pci.77102224.com:7.1.2.0-7.1.2.18"
    ],
    "issued": "20130821",
    "updated": "20140217",
    "siblings": [
      "6100-07:IV47348",
      "6100-08:IV47037",
      "6100-09:IV47532",
      "7100-01:IV47350",
      "7100-02:IV47351",
      "7100-03:IV47353"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv47351/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03"
    ],
    "apAbstract": "Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system",
    "aparNo": "IV47394",
    "aparNoSet": [
      "IV47394"
    ],
    "fixedIn": "6100-08-04",
    "ifixes": [
      "IV47394s3a.130821.61TL08SP03.epkg.Z",
      "IV47394s2a.130821.61TL08SP02.epkg.Z",
      "IV47394s1a.131122.61TL08SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47394",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.16"
    ],
    "issued": "20130821",
    "updated": "20140217",
    "siblings": [
      "7100-02:IV46246",
      "7100-01:IV48042",
      "6100-08:IV47394:",
      "6100-07:IV48041"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv47394/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08"
    ],
    "apAbstract": "AIX printer commands vulnerability",
    "aparNo": "IV47427",
    "aparNoSet": [
      "CVE-2013-5419",
      "IV47427"
    ],
    "fixedIn": "6100-07-09",
    "ifixes": [
      "IV47427s4a.130827.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3224\u0026myns\u003dpwraix61\u0026mync\u003dE",
    "filesets": [
      "bos.rte.printers:6.1.7.0-6.1.7.16"
    ],
    "issued": "20130925",
    "updated": "20130925",
    "siblings": [
      "6100-07:IV47427",
      "6100-08:IV47428",
      "7100-01:IV47429",
      "7100-02:IV47430"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar",
    "cvss": [
      "CVE-2013-5419:6.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03"
    ],
    "apAbstract": "AIX printer commands vulnerability",
    "aparNo": "IV47428",
    "aparNoSet": [
      "CVE-2013-5419",
      "IV47428"
    ],
    "fixedIn": "6100-08-04",
    "ifixes": [
      "IV47428s2a.130827.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3224\u0026myns\u003dpwraix61\u0026mync\u003dE",
    "filesets": [
      "bos.rte.printers:6.1.8.0-6.1.8.15"
    ],
    "issued": "20130925",
    "updated": "20130925",
    "siblings": [
      "6100-07:IV47427",
      "6100-08:IV47428",
      "7100-01:IV47429",
      "7100-02:IV47430"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar",
    "cvss": [
      "CVE-2013-5419:6.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08"
    ],
    "apAbstract": "AIX printer commands vulnerability",
    "aparNo": "IV47429",
    "aparNoSet": [
      "CVE-2013-5419",
      "IV47429"
    ],
    "fixedIn": "7100-01-09",
    "ifixes": [
      "IV47429s4a.130827.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3224\u0026myns\u003dpwraix61\u0026mync\u003dE",
    "filesets": [
      "bos.rte.printers:7.1.1.0-7.1.1.16"
    ],
    "issued": "20130925",
    "updated": "20130925",
    "siblings": [
      "6100-07:IV47427",
      "6100-08:IV47428",
      "7100-01:IV47429",
      "7100-02:IV47430"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar",
    "cvss": [
      "CVE-2013-5419:6.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02"
    ],
    "apAbstract": "AIX printer commands vulnerability",
    "aparNo": "IV47430",
    "aparNoSet": [
      "CVE-2013-5419",
      "IV47430"
    ],
    "fixedIn": "7100-02-04",
    "ifixes": [
      "IV47430s2a.130827.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3224\u0026myns\u003dpwraix61\u0026mync\u003dE",
    "filesets": [
      "bos.rte.printers:7.1.2.0-7.1.2.15"
    ],
    "issued": "20130925",
    "updated": "20130925",
    "siblings": [
      "6100-07:IV47427",
      "6100-08:IV47428",
      "7100-01:IV47429",
      "7100-02:IV47430"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/cmdque_ifix1.tar",
    "cvss": [
      "CVE-2013-5419:6.9"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08"
    ],
    "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP",
    "aparNo": "IV47865",
    "aparNoSet": [
      "IV47865"
    ],
    "fixedIn": "6100-07-09",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV47865",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.19"
    ],
    "issued": "20140605",
    "updated": "null",
    "siblings": [
      "6100-07:IV47865",
      "6100-08:IV46850",
      "6100-09:IV46897",
      "7100-01:IV49394",
      "7100-02:IV44039",
      "7100-03:IV46950"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08"
    ],
    "apAbstract": "Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system",
    "aparNo": "IV48041",
    "aparNoSet": [
      "IV48041"
    ],
    "fixedIn": "6100-07-09",
    "ifixes": [
      "IV48041s6a.131002.61TL07SP06.epkg.Z",
      "IV48041s7a.131009.61TL07SP07.epkg.Z",
      "IV48041s8a.130910.61TL07SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV48041",
    "filesets": [
      "bos.mp64:6.1.7.15-6.1.7.19"
    ],
    "issued": "20130813",
    "updated": "20140217",
    "siblings": [
      "6100-07:IV48041",
      "6100-08:IV45898",
      "7100-01:IV48042",
      "7100-02:IV46246"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv48041/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08"
    ],
    "apAbstract": "Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system",
    "aparNo": "IV48041",
    "aparNoSet": [
      "IV48041"
    ],
    "fixedIn": "6100-07-09",
    "ifixes": [
      "IV48041s8a.130910.61TL07SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV48041",
    "filesets": [
      "bos.mp64:6.1.7.15-6.1.7.19"
    ],
    "issued": "20130910",
    "updated": "20130927",
    "siblings": [
      "7100-02:IV46246",
      "7100-01:IV48042",
      "6100-08:IV47394"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv48041/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08"
    ],
    "apAbstract": "Crash in vm_cmem_get_cop_prop after dlpar_cpu_add on AME system",
    "aparNo": "IV48042",
    "aparNoSet": [
      "IV48042"
    ],
    "fixedIn": "7100-01-09",
    "ifixes": [
      "IV48042s8a.130910.71TL01SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV48042",
    "filesets": [
      "bos.mp64:7.1.1.15-7.1.1.19"
    ],
    "issued": "20130910",
    "updated": "20140217",
    "siblings": [
      "7100-02:IV46246",
      "7100-01:IV48042",
      "6100-08:IV47394"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iv48042/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08"
    ],
    "apAbstract": "CRASH IN V_PFEND_FSEG_PGOUT WHILE VMM IS PROCESSING NFS PAGE APP",
    "aparNo": "IV49394",
    "aparNoSet": [
      "IV49394"
    ],
    "fixedIn": "7100-01-09",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV49394",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.19"
    ],
    "issued": "20140605",
    "updated": "null",
    "siblings": [
      "6100-07:IV47865",
      "6100-08:IV46850",
      "6100-09:IV46897",
      "7100-01:IV49394",
      "7100-02:IV44039",
      "7100-03:IV46950"
    ],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04"
    ],
    "apAbstract": "AIX WPAR vulnerability",
    "aparNo": "IV51421",
    "aparNoSet": [
      "CVE-2014-0899",
      "IV51421"
    ],
    "fixedIn": "next vwpar update",
    "ifixes": [
      "IV51420s52.131030.epkg.Z",
      "IV51420s53.131031.epkg.Z",
      "IV51421s52.131030.epkg.Z",
      "IV51421s53.131031.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5741691",
    "filesets": [
      "vwpar.52.rte:1.1.0.0-1.1.1.19",
      "vwpar.52.rte:1.1.2.0-1.1.2.17",
      "wpar.53.rte:1.1.0.0-1.1.1.18",
      "vwpar.53.rte:1.1.2.0-1.1.2.15"
    ],
    "issued": "20140306",
    "updated": "20140408",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/wparcre_fix.tar",
    "cvss": [
      "CVE-2014-0899:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08",
      "6100-07-09"
    ],
    "apAbstract": "Vulnerability in AIX X-Server",
    "aparNo": "IV52181",
    "aparNoSet": [
      "CVE-2013-4396",
      "IV52181"
    ],
    "fixedIn": "6100-07-10",
    "ifixes": [
      "IV52181s0a.131220.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773",
    "filesets": [
      "Xll.base.rte:6.1.8.0"
    ],
    "issued": "20140121",
    "updated": "20140122",
    "siblings": [
      "7100-03:IV53246",
      "7100-02:IV52186",
      "7100-01:IV52185",
      "6100-09:IV52978",
      "6100-08:IV52184",
      "6100-07:IV52181",
      "5300-12:IV53331"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar",
    "cvss": [
      "CVE-2013-4396:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7",
      "2.2.1.8"
    ],
    "apAbstract": "Vulnerability in VIOS X-Server",
    "aparNo": "IV52181",
    "aparNoSet": [
      "CVE-2013-4396",
      "IV52181"
    ],
    "fixedIn": "2.2.1.9",
    "ifixes": [
      "IV52181s0a.131220.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773",
    "filesets": [
      "Xll.base.rte:6.1.8.0"
    ],
    "issued": "20140121",
    "updated": "20140122",
    "siblings": [
      "7100-03:IV53246",
      "7100-02:IV52186",
      "7100-01:IV52185",
      "6100-09:IV52978",
      "6100-08:IV52184",
      "6100-07:IV52181",
      "5300-12:IV53331"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar",
    "cvss": [
      "CVE-2013-4396:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04"
    ],
    "apAbstract": "Vulnerability in AIX X-Server",
    "aparNo": "IV52184",
    "aparNoSet": [
      "CVE-2013-4396",
      "IV52184"
    ],
    "fixedIn": "6100-08-05",
    "ifixes": [
      "IV52184s0a.131220.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773",
    "filesets": [
      "Xll.base.rte:6.1.8.0"
    ],
    "issued": "20140121",
    "updated": "20140122",
    "siblings": [
      "7100-03:IV53246",
      "7100-02:IV52186",
      "7100-01:IV52185",
      "6100-09:IV52978",
      "6100-08:IV52184",
      "6100-07:IV52181",
      "5300-12:IV53331"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar",
    "cvss": [
      "CVE-2013-4396:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2",
      "2.2.2.3",
      "2.2.2.4"
    ],
    "apAbstract": "Vulnerability in VIOS X-Server",
    "aparNo": "IV52184",
    "aparNoSet": [
      "CVE-2013-4396",
      "IV52184"
    ],
    "fixedIn": "2.2.2.5",
    "ifixes": [
      "IV52184s0a.131220.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773",
    "filesets": [
      "Xll.base.rte:6.1.8.0"
    ],
    "issued": "20140121",
    "updated": "20140122",
    "siblings": [
      "7100-03:IV53246",
      "7100-02:IV52186",
      "7100-01:IV52185",
      "6100-09:IV52978",
      "6100-08:IV52184",
      "6100-07:IV52181",
      "5300-12:IV53331"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar",
    "cvss": [
      "CVE-2013-4396:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-01-09"
    ],
    "apAbstract": "Vulnerability in AIX X-Server",
    "aparNo": "IV52185",
    "aparNoSet": [
      "CVE-2013-4396",
      "IV52185"
    ],
    "fixedIn": "7100-01-10",
    "ifixes": [
      "IV52185s0a.131220.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773",
    "filesets": [
      "Xll.base.rte:7.1.1.0-7.1.1.15"
    ],
    "issued": "20140121",
    "updated": "20140122",
    "siblings": [
      "7100-03:IV53246",
      "7100-02:IV52186",
      "7100-01:IV52185",
      "6100-09:IV52978",
      "6100-08:IV52184",
      "6100-07:IV52181",
      "5300-12:IV53331"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar",
    "cvss": [
      "CVE-2013-4396:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04"
    ],
    "apAbstract": "Vulnerability in AIX X-Server",
    "aparNo": "IV52186",
    "aparNoSet": [
      "CVE-2013-4396",
      "IV52186"
    ],
    "fixedIn": "7100-02-05",
    "ifixes": [
      "IV52186s0a.131220.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773",
    "filesets": [
      "Xll.base.rte:7.1.2.0"
    ],
    "issued": "20140121",
    "updated": "20140122",
    "siblings": [
      "7100-03:IV53246",
      "7100-02:IV52186",
      "7100-01:IV52185",
      "6100-09:IV52978",
      "6100-08:IV52184",
      "6100-07:IV52181",
      "5300-12:IV53331"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar",
    "cvss": [
      "CVE-2013-4396:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01"
    ],
    "apAbstract": "CREATING SEA OR ETHERCHANNEL ON FC 5899 ADAPTER IS NOT POSSIBLE",
    "aparNo": "IV52695",
    "aparNoSet": [
      "IV52695"
    ],
    "fixedIn": "6100-09-02",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV52695",
    "filesets": [
      "devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.1"
    ],
    "issued": "20140514",
    "updated": "null",
    "siblings": [
      "6100-09:IV52695",
      "7100-03:IV52765"
    ],
    "downloadUrl": "http://www-933.ibm.com/support/fixcentral/aix/quickorder?release\u003d6.1\u0026function\u003dfixId\u0026fixids\u003dU865786\u0026includeSupersedes\u003d0\u0026source\u003dfc",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01"
    ],
    "apAbstract": "CREATING SEA OR ETHERCHANNEL ON FC 5899 ADAPTER IS NOT POSSIBLE",
    "aparNo": "IV52765",
    "aparNoSet": [
      "IV52765"
    ],
    "fixedIn": "7100-03-02",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV52765",
    "filesets": [
      "devices.pciex.e4145616e4140518.rte:7.1.3.0-7.1.3.1"
    ],
    "issued": "20140514",
    "updated": "null",
    "siblings": [
      "6100-09:IV52695",
      "7100-03:IV52765"
    ],
    "downloadUrl": "http://www-933.ibm.com/support/fixcentral/aix/quickorder?release\u003d6.1\u0026function\u003dfixId\u0026fixids\u003dU865786\u0026includeSupersedes\u003d0\u0026source\u003dfc",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02"
    ],
    "apAbstract": "Vulnerability in AIX X-Server",
    "aparNo": "IV52978",
    "aparNoSet": [
      "CVE-2013-4396",
      "IV52978"
    ],
    "fixedIn": "6100-09-03",
    "ifixes": [
      "IV52978s0a.140128.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773",
    "filesets": [
      "Xll.base.rte:6.1.9.0-6.1.9.2"
    ],
    "issued": "20140121",
    "updated": "20140122",
    "siblings": [
      "7100-03:IV53246",
      "7100-02:IV52186",
      "7100-01:IV52185",
      "6100-09:IV52978",
      "6100-08:IV52184",
      "6100-07:IV52181",
      "5300-12:IV53331"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar",
    "cvss": [
      "CVE-2013-4396:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2"
    ],
    "apAbstract": "Vulnerability in VIOS X-Server",
    "aparNo": "IV52978",
    "aparNoSet": [
      "CVE-2013-4396",
      "IV52978"
    ],
    "fixedIn": "2.2.3.3",
    "ifixes": [
      "IV52978s0a.140128.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773",
    "filesets": [
      "Xll.base.rte:6.1.9.0-6.1.9.2"
    ],
    "issued": "20140121",
    "updated": "20140122",
    "siblings": [
      "7100-03:IV53246",
      "7100-02:IV52186",
      "7100-01:IV52185",
      "6100-09:IV52978",
      "6100-08:IV52184",
      "6100-07:IV52181",
      "5300-12:IV53331"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar",
    "cvss": [
      "CVE-2013-4396:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01"
    ],
    "apAbstract": "TAPE MKSYSB RESTORES FROM 6100-09 OR 7100-03 WILL FAIL.",
    "aparNo": "IV53002",
    "aparNoSet": [
      "IV53002"
    ],
    "fixedIn": "6100-09-02",
    "ifixes": [
      "IV53002s01.140107.61TL09SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV53002",
    "filesets": [
      "bos.sysmgt.sysbr:6.1.9.0-6.1.9.1"
    ],
    "issued": "20131209",
    "updated": "null",
    "siblings": [
      "6100-09:IV53002",
      "7100-03:IV53003"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53002/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01"
    ],
    "apAbstract": "TAPE MKSYSB RESTORES FROM 6100-09 OR 7100-03 WILL FAIL.",
    "aparNo": "IV53003",
    "aparNoSet": [
      "IV53003"
    ],
    "fixedIn": "7100-03-02",
    "ifixes": [
      "IV53003s1c.140122.71TL03SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV53002",
    "filesets": [
      "bos.sysmgt.sysbr:7.1.3.0-7.1.3.1"
    ],
    "issued": "20131209",
    "updated": "null",
    "siblings": [
      "6100-09:IV53002",
      "7100-03:IV53003"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53003/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02"
    ],
    "apAbstract": "Vulnerability in AIX X-Server",
    "aparNo": "IV53246",
    "aparNoSet": [
      "CVE-2013-4396",
      "IV53246"
    ],
    "fixedIn": "7100-03-03",
    "ifixes": [
      "IV53246s0a.140128.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740773",
    "filesets": [
      "Xll.base.rte:7.1.3.0-7.1.3.2"
    ],
    "issued": "20140121",
    "updated": "20140122",
    "siblings": [
      "7100-03:IV53246",
      "7100-02:IV52186",
      "7100-01:IV52185",
      "6100-09:IV52978",
      "6100-08:IV52184",
      "6100-07:IV52181",
      "5300-12:IV53331"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar",
    "cvss": [
      "CVE-2013-4396:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08"
    ],
    "apAbstract": "Vulnerability in AIX X-Server",
    "aparNo": "IV53331",
    "aparNoSet": [
      "CVE-2013-4396",
      "IV53331"
    ],
    "fixedIn": "5300-12-09",
    "ifixes": [
      "IV53331s0a.131220.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d18\u0026ID\u003d3353\u0026myns\u003dpwraix61\u0026mync\u003dE",
    "filesets": [
      "Xll.base.rte:5.3.12.0-5.3.12.1"
    ],
    "issued": "20140121",
    "updated": "20140122",
    "siblings": [
      "7100-02:IV52186",
      "7100-01:IV52185",
      "6100-08:IV52184",
      "6100-07:IV52181",
      "5300-12:IV53331"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/xorg_ifix2.tar",
    "cvss": [
      "CVE-2013-4396:5.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01"
    ],
    "apAbstract": "XMGC NOT TRAVERSING ALL KERNEL HEAPS.",
    "aparNo": "IV53582",
    "aparNoSet": [
      "IV53582"
    ],
    "fixedIn": "6100-09-02",
    "ifixes": [
      "IV53582s0a.140109.61TL9SP0.epkg.Z",
      "IV53582s0a.140109.epkg.Z",
      "IV53582s1b.140109.61TL9SP1.epkg.Z",
      "IV53582s1b.140109.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV53582",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.1"
    ],
    "issued": "20131226",
    "updated": "20140110",
    "siblings": [
      "6100-09:IV53582",
      "7100-03:IV53587"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53582/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01"
    ],
    "apAbstract": "XMGC NOT TRAVERSING ALL KERNEL HEAPS.",
    "aparNo": "IV53587",
    "aparNoSet": [
      "IV53587"
    ],
    "fixedIn": "7100-03-02",
    "ifixes": [
      "IV53587s0a.140109.71TL3SP0.epkg.Z",
      "IV53587s0a.140109.epkg.Z",
      "IV53587s1b.140109.71TL3SP1.epkg.Z",
      "IV53587s1b.140109.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV53587",
    "filesets": [
      "bos.mp64:7.1.3.0-7.1.3.1"
    ],
    "issued": "20131227",
    "updated": "20140110",
    "siblings": [
      "6100-09:IV53582",
      "7100-03:IV53587"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53587/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02"
    ],
    "apAbstract": "UNABLE TO SU TO A NIS USER",
    "aparNo": "IV53884",
    "aparNoSet": [
      "IV53884"
    ],
    "fixedIn": "7100-03-03",
    "ifixes": [
      "IV53884s1a.140113.71TL03SP01.epkg.Z"
    ],
    "bulletinUrl": "https://www-01.ibm.com/support/docview.wss?uid\u003disg1IV58128",
    "filesets": [
      "bos.rte.security:7.1.3.0-7.1.3.1"
    ],
    "issued": "20140328",
    "updated": "null",
    "siblings": [
      "6100-09:IV53944",
      "7100-03:IV53884"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53884/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02"
    ],
    "apAbstract": "UNABLE TO SU TO A NIS USER",
    "aparNo": "IV53944",
    "aparNoSet": [
      "IV53944"
    ],
    "fixedIn": "6100-09-03",
    "ifixes": [
      "IV53944s1a.140113.61TL09SP01.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5752383",
    "filesets": [
      "bos.rte.security:6.1.9.0-6.1.9.1"
    ],
    "issued": "20140328",
    "updated": "null",
    "siblings": [
      "6100-09:IV53944",
      "7100-03:IV53884"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv53944/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01"
    ],
    "apAbstract": "DISK I/O ERROR WITH ALGORITHM ROUND_ROBIN OR SHORTEST_QUEUE",
    "aparNo": "IV54905",
    "aparNoSet": [
      "IV54905"
    ],
    "fixedIn": "7100-03-02",
    "ifixes": [
      "IV54905s1a.140203.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV54905",
    "filesets": [
      "devices.common.IBM.mpio.rte:7.1.3.0-7.1.3.1"
    ],
    "issued": "20140203",
    "updated": "20140204",
    "siblings": [
      "6100-09:IV54907",
      "7100-03:IV54905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv54905/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01"
    ],
    "apAbstract": "DISK I/O ERROR WITH ALGORITHM ROUND_ROBIN OR SHORTEST_QUEUE",
    "aparNo": "IV54907",
    "aparNoSet": [
      "IV54907"
    ],
    "fixedIn": "6100-09-02",
    "ifixes": [
      "IV54907s1a.140203.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV54907",
    "filesets": [
      "devices.common.IBM.mpio.rte:6.1.9.0-6.1.9.1"
    ],
    "issued": "20140203",
    "updated": "20140204",
    "siblings": [
      "6100-09:IV54907",
      "7100-03:IV54905"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv54907/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2",
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2",
      "2.2.2.3",
      "2.2.2.4",
      "2.2.2.5",
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7",
      "2.2.1.8",
      "2.2.1.9"
    ],
    "apAbstract": "Security Vulnerability in Perl _compile",
    "aparNo": "IV56641",
    "aparNoSet": [
      "CVE-2012-6329",
      "IV56641"
    ],
    "fixedIn": "2.2.3.3",
    "ifixes": [
      "perl61.zip"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc",
    "filesets": [
      "perl.rte:5.8.8.0-5.8.8.366"
    ],
    "issued": "20140423",
    "updated": "null",
    "siblings": [
      "5300-12:IV56641",
      "6100-09:IV56641",
      "7100-03:IV56642"
    ],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2012-6329:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Security Vulnerability in Perl _compile",
    "aparNo": "IV56641",
    "aparNoSet": [
      "CVE-2012-6329",
      "IV56641"
    ],
    "fixedIn": "perl.rte:5.8.8.488",
    "ifixes": [
      "perl61.zip"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc",
    "filesets": [
      "perl.rte:5.8.8.0-5.8.8.123"
    ],
    "issued": "20140423",
    "updated": "null",
    "siblings": [
      "5300-12:IV56641",
      "6100-09:IV56641",
      "7100-03:IV56642"
    ],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2012-6329:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08",
      "6100-07-09"
    ],
    "apAbstract": "Security Vulnerability in Perl _compile",
    "aparNo": "IV56641",
    "aparNoSet": [
      "CVE-2012-6329",
      "IV56641"
    ],
    "fixedIn": "perl.rte:5.8.8.488",
    "ifixes": [
      "perl61.zip"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc",
    "filesets": [
      "perl.rte:5.8.8.0-5.8.8.366"
    ],
    "issued": "20140423",
    "updated": "null",
    "siblings": [
      "5300-12:IV56641",
      "6100-09:IV56641",
      "7100-03:IV56642"
    ],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2012-6329:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-01-09",
      "7100-01-10"
    ],
    "apAbstract": "Security Vulnerability in Perl _compile",
    "aparNo": "IV56642",
    "aparNoSet": [
      "CVE-2012-6329",
      "IV56642"
    ],
    "fixedIn": "perl.rte:5.10.1.250",
    "ifixes": [
      "perl71.zip"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/perl_advisory4.asc",
    "filesets": [
      "perl.rte:5.10.10.-5.10.1.200"
    ],
    "issued": "20140423",
    "updated": "null",
    "siblings": [
      "5300-12:IV56641",
      "6100-09:IV56641",
      "7100-03:IV56642"
    ],
    "downloadUrl": "https://www14.software.ibm.com/webapp/iwm/web/preLogin.do?source\u003daixbp",
    "cvss": [
      "CVE-2012-6329:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02"
    ],
    "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN",
    "aparNo": "IV57361",
    "aparNoSet": [
      "IV57361"
    ],
    "fixedIn": "7100-03-03",
    "ifixes": [
      "IV57361s2a.140505.71TL03SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV57361",
    "filesets": [
      "bos.mp64:7.1.3.0-7.1.3.2"
    ],
    "issued": "20140509",
    "updated": "20140602",
    "siblings": [
      "7100-01:IV59232",
      "7100-02:IV59229",
      "7100-03:IV57361",
      "6100-09:IV59100",
      "6100-08:IV59225",
      "6100-07:IV59227",
      "5300-12:IV60235"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv57361/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04"
    ],
    "apAbstract": "AIX ptrace Vulnerability",
    "aparNo": "IV58861",
    "aparNoSet": [
      "CVE-2014-0930",
      "IV58861"
    ],
    "fixedIn": "7100-02-05",
    "ifixes": [
      "IV58861s4a.140422.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.17"
    ],
    "issued": "20140502",
    "updated": "20140520",
    "siblings": [
      "5300-12:IV59675",
      "6100-07:IV59045",
      "6100-08:IV58948",
      "6100-09:IV59615",
      "7100-01:IV58888",
      "7100-02:IV58861",
      "7100-03:IV59607"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar",
    "cvss": [
      "CVE-2014-0930:4.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-01-09"
    ],
    "apAbstract": "AIX ptrace Vulnerability",
    "aparNo": "IV58888",
    "aparNoSet": [
      "CVE-2014-0930",
      "IV58888"
    ],
    "fixedIn": "7100-01-10",
    "ifixes": [
      "IV58888s9a.140422.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29",
    "filesets": [
      "bos.mp64:7.1.1.0-7.1.1.20"
    ],
    "issued": "20140502",
    "updated": "20140520",
    "siblings": [
      "5300-12:IV59675",
      "6100-07:IV59045",
      "6100-08:IV58948",
      "6100-09:IV59615",
      "7100-01:IV58888",
      "7100-02:IV58861",
      "7100-03:IV59607"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar",
    "cvss": [
      "CVE-2014-0930:4.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04"
    ],
    "apAbstract": "AIX ptrace Vulnerability",
    "aparNo": "IV58948",
    "aparNoSet": [
      "CVE-2014-0930",
      "IV58948"
    ],
    "fixedIn": "6100-08-05",
    "ifixes": [
      "IV58948s4a.140423.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.17"
    ],
    "issued": "20140502",
    "updated": "20140520",
    "siblings": [
      "5300-12:IV59675",
      "6100-07:IV59045",
      "6100-08:IV58948",
      "6100-09:IV59615",
      "7100-01:IV58888",
      "7100-02:IV58861",
      "7100-03:IV59607"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar",
    "cvss": [
      "CVE-2014-0930:4.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.2.0",
      "2.2.2.1",
      "2.2.2.2",
      "2.2.2.3",
      "2.2.2.4"
    ],
    "apAbstract": "VIOS ptrace Vulnerability",
    "aparNo": "IV58948",
    "aparNoSet": [
      "CVE-2014-0930",
      "IV58948"
    ],
    "fixedIn": "2.2.2.5",
    "ifixes": [
      "IV58948s4a.140423.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dVIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.17"
    ],
    "issued": "20140502",
    "updated": "null",
    "siblings": [
      "5300-12:IV59675",
      "6100-07:IV59045",
      "6100-08:IV58948",
      "6100-09:IV58766",
      "7100-01:IV58888",
      "7100-02:IV58861",
      "7100-03:IV58840"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar",
    "cvss": [
      "CVE-2014-0930:4.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08",
      "6100-07-09"
    ],
    "apAbstract": "AIX ptrace Vulnerability",
    "aparNo": "IV59045",
    "aparNoSet": [
      "CVE-2014-0930",
      "IV59045"
    ],
    "fixedIn": "6100-07-10",
    "ifixes": [
      "IV59045s9a.140425.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.20"
    ],
    "issued": "20140502",
    "updated": "20140520",
    "siblings": [
      "5300-12:IV59675",
      "6100-07:IV59045",
      "6100-08:IV58948",
      "6100-09:IV59615",
      "7100-01:IV58888",
      "7100-02:IV58861",
      "7100-03:IV59607"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar",
    "cvss": [
      "CVE-2014-0930:4.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.1.0",
      "2.2.1.1",
      "2.2.1.2",
      "2.2.1.3",
      "2.2.1.4",
      "2.2.1.5",
      "2.2.1.6",
      "2.2.1.7",
      "2.2.1.8"
    ],
    "apAbstract": "VIOS ptrace Vulnerability",
    "aparNo": "IV59045",
    "aparNoSet": [
      "CVE-2014-0930",
      "IV59045"
    ],
    "fixedIn": "2.2.1.9",
    "ifixes": [
      "IV59045s9a.140425.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dVIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29",
    "filesets": [
      "bos.mp64:6.1.7.0-6.1.7.20"
    ],
    "issued": "20140502",
    "updated": "null",
    "siblings": [
      "5300-12:IV59675",
      "6100-07:IV59045",
      "6100-08:IV58948",
      "6100-09:IV58766",
      "7100-01:IV58888",
      "7100-02:IV58861",
      "7100-03:IV58840"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar",
    "cvss": [
      "CVE-2014-0930:4.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02"
    ],
    "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN",
    "aparNo": "IV59100",
    "aparNoSet": [
      "IV59100"
    ],
    "fixedIn": "6100-09-03",
    "ifixes": [
      "IV59100s2a.140507.61TL09SP02.epkg.Z"
    ],
    "bulletinUrl": "https://www-304.ibm.com/support/docview.wss?uid\u003disg1IV59100",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.2"
    ],
    "issued": "20140509",
    "updated": "20140602",
    "siblings": [
      "7100-01:IV59232",
      "7100-02:IV59229",
      "7100-03:IV57361",
      "6100-09:IV59100",
      "6100-08:IV59225",
      "6100-07:IV59227",
      "5300-12:IV60235"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59100/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04"
    ],
    "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN",
    "aparNo": "IV59225",
    "aparNoSet": [
      "IV59225"
    ],
    "fixedIn": "6100-08-05",
    "ifixes": [
      "IV59225s4a.140507.61TL08SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV59225",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.17"
    ],
    "issued": "20140509",
    "updated": "20140602",
    "siblings": [
      "7100-01:IV59232",
      "7100-02:IV59229",
      "7100-03:IV57361",
      "6100-09:IV59100",
      "6100-08:IV59225",
      "6100-07:IV59227",
      "5300-12:IV60235"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59225",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-07-06",
      "6100-07-07",
      "6100-07-08",
      "6100-07-09"
    ],
    "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN",
    "aparNo": "IV59227",
    "aparNoSet": [
      "IV59227"
    ],
    "fixedIn": "6100-07-10",
    "ifixes": [
      "IV59227s9a.140508.61TL07SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV59227",
    "filesets": [
      "bos.mp64:6.1.7.17-6.1.7.20"
    ],
    "issued": "20140509",
    "updated": "20140602",
    "siblings": [
      "7100-01:IV59232",
      "7100-02:IV59229",
      "7100-03:IV57361",
      "6100-09:IV59100",
      "6100-08:IV59225",
      "6100-07:IV59227",
      "5300-12:IV60235"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59227/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04"
    ],
    "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN",
    "aparNo": "IV59229",
    "aparNoSet": [
      "IV59229"
    ],
    "fixedIn": "7100-02-05",
    "ifixes": [
      "IV59229s2a.140507.71TL02SP02.epkg.Z",
      "IV59229s2a.140507.71TL02SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV59229",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.17"
    ],
    "issued": "20140509",
    "updated": "null",
    "siblings": [
      "7100-01:IV59232",
      "7100-02:IV59229",
      "7100-03:IV57361",
      "6100-09:IV59100",
      "6100-08:IV59225",
      "6100-07:IV59227",
      "5300-12:IV60235"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59229/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-01-09"
    ],
    "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN",
    "aparNo": "IV59232",
    "aparNoSet": [
      "IV59232"
    ],
    "fixedIn": "7100-01-10",
    "ifixes": [
      "IV59232s9a.140507.71TL01SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV59232",
    "filesets": [
      "bos.mp64:7.1.1.17-7.1.1.1"
    ],
    "issued": "20140509",
    "updated": "null",
    "siblings": [
      "7100-01:IV59232",
      "7100-02:IV59229",
      "7100-03:IV57361",
      "6100-09:IV59100",
      "6100-08:IV59225",
      "6100-07:IV59227",
      "5300-12:IV60235"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59232/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04"
    ],
    "apAbstract": "LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR",
    "aparNo": "IV59492",
    "aparNoSet": [
      "IV59492"
    ],
    "fixedIn": "6100-09-05",
    "ifixes": [
      "IV59492s3b.150330.61TL09SP03.epkg.Z",
      "IV59492s4c.150323.61TL09SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV59492",
    "filesets": [
      "devices.chrp.base.rte:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150317",
    "updated": "null",
    "siblings": [
      "6100-08:IV71109",
      "6100-09:IV59492",
      "7100-02:IV71110",
      "7100-03:IV67876"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv59492/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02"
    ],
    "apAbstract": "AIX ptrace Vulnerability",
    "aparNo": "IV59607",
    "aparNoSet": [
      "CVE-2014-0930",
      "IV59607"
    ],
    "fixedIn": "7100-03-03",
    "ifixes": [
      "IV59607s2a.140422.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29",
    "filesets": [
      "bos.mp64:7.1.3.0-7.1.3.2"
    ],
    "issued": "20140502",
    "updated": "20140520",
    "siblings": [
      "5300-12:IV59675",
      "6100-07:IV59045",
      "6100-08:IV58948",
      "6100-09:IV59615",
      "7100-01:IV58888",
      "7100-02:IV58861",
      "7100-03:IV59607"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar",
    "cvss": [
      "CVE-2014-0930:4.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02"
    ],
    "apAbstract": "AIX ptrace Vulnerability",
    "aparNo": "IV59615",
    "aparNoSet": [
      "CVE-2014-0930",
      "IV59615"
    ],
    "fixedIn": "6100-09-03",
    "ifixes": [
      "IV59615s2a.140422.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.2"
    ],
    "issued": "20140502",
    "updated": "20140520",
    "siblings": [
      "5300-12:IV59675",
      "6100-07:IV59045",
      "6100-08:IV58948",
      "6100-09:IV59615",
      "7100-01:IV58888",
      "7100-02:IV58861",
      "7100-03:IV59607"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar",
    "cvss": [
      "CVE-2014-0930:4.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2"
    ],
    "apAbstract": "VIOS ptrace Vulnerability",
    "aparNo": "IV59615",
    "aparNoSet": [
      "CVE-2014-0930",
      "IV59615"
    ],
    "fixedIn": "2.2.3.3",
    "ifixes": [
      "IV59615s2a.140422.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dVIOS71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dVIOS%20ptrace%20Vulnerability%20%28CVE-2014-0930%29",
    "filesets": [
      "bos.mp64:6.1.9.0-6.1.9.2"
    ],
    "issued": "20140502",
    "updated": "null",
    "siblings": [
      "5300-12:IV59675",
      "6100-07:IV59045",
      "6100-08:IV58948",
      "6100-09:IV59615",
      "7100-01:IV58888",
      "7100-02:IV58861",
      "7100-03:IV59607"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar",
    "cvss": [
      "CVE-2014-0930:4.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "AIX ptrace Vulnerability",
    "aparNo": "IV59675",
    "aparNoSet": [
      "CVE-2014-0930",
      "IV59675"
    ],
    "fixedIn": "interim fix only",
    "ifixes": [
      "IV59675s9.140425.epkg.Z"
    ],
    "bulletinUrl": "http://www14.software.ibm.com/webapp/set2/subscriptions/onvdq?mode\u003d7\u0026heading\u003dAIX71\u0026path\u003d/201405/SECURITY/20140505/datafile095150\u0026label\u003dAIX%20ptrace%20Vulnerability%20%28CVE-2014-0930%29",
    "filesets": [
      "bos.mp64:5.3.12.0-5.3.12.9"
    ],
    "issued": "20140502",
    "updated": "20140520",
    "siblings": [
      "5300-12:IV59675",
      "6100-07:IV59045",
      "6100-08:IV58948",
      "6100-09:IV59615",
      "7100-01:IV58888",
      "7100-02:IV58861",
      "7100-03:IV59607"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/ptrace_ifix.tar",
    "cvss": [
      "CVE-2014-0930:4.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "JFS2 FS MARKED CORRUPT WHEN USING FIND COMMAND NEEDING FSCK RUN",
    "aparNo": "IV60235",
    "aparNoSet": [
      "IV60235"
    ],
    "fixedIn": "interim fix only",
    "ifixes": [
      "IV60235s9a.140508.53TL12SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV60235",
    "filesets": [
      "bos.mp64:5.3.12.7-5.3.12.9"
    ],
    "issued": "20140509",
    "updated": "20140602",
    "siblings": [
      "7100-01:IV59232",
      "7100-02:IV59229",
      "7100-03:IV57361",
      "6100-09:IV59100",
      "6100-08:IV59225",
      "6100-07:IV59227",
      "5300-12:IV60235"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv60235/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02"
    ],
    "apAbstract": "Arbitary file overwrite symlink in libodm",
    "aparNo": "IV60299",
    "aparNoSet": [
      "CVE-2012-2179",
      "IV60299"
    ],
    "fixedIn": "6100-09-03",
    "ifixes": [
      "IV60299s2a.140515.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875",
    "filesets": [
      "bos.rte.odm:6.1.9.0"
    ],
    "issued": "20120614",
    "updated": "20140523",
    "siblings": [
      "6100-07:IV60313",
      "6100-08:IV60311",
      "6100-09:IV60299",
      "7100-01:IV60312",
      "7100-02:IV60314",
      "7100-03:IV60303"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar",
    "cvss": [
      "CVE-2012-2179:6.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02"
    ],
    "apAbstract": "Arbitary file overwrite symlink in libodm",
    "aparNo": "IV60303",
    "aparNoSet": [
      "CVE-2012-2179",
      "IV60303"
    ],
    "fixedIn": "7100-03-03",
    "ifixes": [
      "IV60303s2a.140515.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875",
    "filesets": [
      "bos.rte.odm:7.1.3.0"
    ],
    "issued": "20120614",
    "updated": "20140523",
    "siblings": [
      "6100-07:IV60313",
      "6100-08:IV60311",
      "6100-09:IV60299",
      "7100-01:IV60312",
      "7100-02:IV60314",
      "7100-03:IV60303"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar",
    "cvss": [
      "CVE-2012-2179:6.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04"
    ],
    "apAbstract": "Arbitary file overwrite symlink in libodm",
    "aparNo": "IV60311",
    "aparNoSet": [
      "CVE-2012-2179",
      "IV60311"
    ],
    "fixedIn": "6100-08-05",
    "ifixes": [
      "IV60311s4a.140515.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875",
    "filesets": [
      "bos.rte.odm:6.1.8.0"
    ],
    "issued": "20120614",
    "updated": "20140523",
    "siblings": [
      "6100-07:IV60313",
      "6100-08:IV60311",
      "6100-09:IV60299",
      "7100-01:IV60312",
      "7100-02:IV60314",
      "7100-03:IV60303"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar",
    "cvss": [
      "CVE-2012-2179:6.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-01-09"
    ],
    "apAbstract": "Arbitary file overwrite symlink in libodm",
    "aparNo": "IV60312",
    "aparNoSet": [
      "CVE-2012-2179",
      "IV60312"
    ],
    "fixedIn": "7100-01-10",
    "ifixes": [
      "IV60312s9a.140515.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875",
    "filesets": [
      "bos.rte.odm:7.1.1.0-7.1.1.16"
    ],
    "issued": "20120614",
    "updated": "20140523",
    "siblings": [
      "6100-07:IV60313",
      "6100-08:IV60311",
      "6100-09:IV60299",
      "7100-01:IV60312",
      "7100-02:IV60314",
      "7100-03:IV60303"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar",
    "cvss": [
      "CVE-2012-2179:6.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08",
      "6100-07-09"
    ],
    "apAbstract": "Arbitary file overwrite symlink in libodm",
    "aparNo": "IV60313",
    "aparNoSet": [
      "CVE-2012-2179",
      "IV60313"
    ],
    "fixedIn": "6100-07-10",
    "ifixes": [
      "IV60313s9a.140515.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875",
    "filesets": [
      "bos.rte.odm:6.1.7.0-6.1.7.16"
    ],
    "issued": "20120614",
    "updated": "20140523",
    "siblings": [
      "6100-07:IV60313",
      "6100-08:IV60311",
      "6100-09:IV60299",
      "7100-01:IV60312",
      "7100-02:IV60314",
      "7100-03:IV60303"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar",
    "cvss": [
      "CVE-2012-2179:6.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04"
    ],
    "apAbstract": "Arbitary file overwrite symlink in libodm",
    "aparNo": "IV60314",
    "aparNoSet": [
      "CVE-2012-2179",
      "IV60314"
    ],
    "fixedIn": "7100-02-05",
    "ifixes": [
      "IV60314s4a.140515.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/5740875",
    "filesets": [
      "bos.rte.odm:7.1.2.0-7.1.2.15"
    ],
    "issued": "20120614",
    "updated": "20140523",
    "siblings": [
      "6100-07:IV60313",
      "6100-08:IV60311",
      "6100-09:IV60299",
      "7100-01:IV60312",
      "7100-02:IV60314",
      "7100-03:IV60303"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libodm_ifix.tar",
    "cvss": [
      "CVE-2012-2179:6.9"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03"
    ],
    "apAbstract": "VIOS USING NPIV CAN CRASH SYSTEM",
    "aparNo": "IV61759",
    "aparNoSet": [
      "IV61759"
    ],
    "fixedIn": "6100-09-04",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV61759",
    "filesets": [
      "devices.pciex.df1060e214103404.com:\u003c6.1.9.30"
    ],
    "issued": "20150213",
    "updated": "null",
    "siblings": [
      "6100-08:IV64465",
      "6100-09:IV61759",
      "7100-02:IV64283",
      "7100-03:IV61764"
    ],
    "downloadUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo149944",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03"
    ],
    "apAbstract": "VIOS USING NPIV CAN CRASH SYSTEM",
    "aparNo": "IV61764",
    "aparNoSet": [
      "IV61764"
    ],
    "fixedIn": "7100-03-04",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV61764",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.16"
    ],
    "issued": "20150213",
    "updated": "null",
    "siblings": [
      "6100-08:IV64465",
      "6100-09:IV61759",
      "7100-02:IV64283",
      "7100-03:IV61764"
    ],
    "downloadUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo149944",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03"
    ],
    "apAbstract": "UNEXPECTED APPLICATION BEHAVIOR WHEN USING TM POWER8 MODE ONLY",
    "aparNo": "IV62820",
    "aparNoSet": [
      "IV62820"
    ],
    "fixedIn": "7100-03-04",
    "ifixes": [
      "IV62820s3a.140808.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV62820",
    "filesets": [
      "bos.mp64:7.1.3.0-7.1.3.30"
    ],
    "issued": "20140818",
    "updated": "null",
    "siblings": [
      "7100-03:IV62820"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv62820/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05"
    ],
    "apAbstract": "VIOS USING NPIV CAN CRASH SYSTEM",
    "aparNo": "IV64283",
    "aparNoSet": [
      "IV64283"
    ],
    "fixedIn": "7100-02-06",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV64283",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.1.2.15-7.1.2.19"
    ],
    "issued": "20150213",
    "updated": "null",
    "siblings": [
      "6100-08:IV64465",
      "6100-09:IV61759",
      "7100-02:IV64283",
      "7100-03:IV61764"
    ],
    "downloadUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo149944",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05"
    ],
    "apAbstract": "VIOS USING NPIV CAN CRASH SYSTEM",
    "aparNo": "IV64465",
    "aparNoSet": [
      "IV64465"
    ],
    "fixedIn": "6100-08-06",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV64465",
    "filesets": [
      "devices.pciex.df1060e214103404.com:6.1.8.15-6.1.8.19"
    ],
    "issued": "20150213",
    "updated": "null",
    "siblings": [
      "6100-08:IV64465",
      "6100-09:IV61759",
      "7100-02:IV64283",
      "7100-03:IV61764"
    ],
    "downloadUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1fixinfo149944",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04"
    ],
    "apAbstract": "SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF",
    "aparNo": "IV65814",
    "aparNoSet": [
      "IV65814"
    ],
    "fixedIn": "6100-09-05",
    "ifixes": [
      "IV65814m3b.141230.61TL09SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV65814",
    "filesets": [
      "bos.mp64:\u003c6.1.9.100"
    ],
    "issued": "20150215",
    "updated": "null",
    "siblings": [
      "6100-08:IV66677",
      "6100-09:IV65814",
      "7100-02:IV69445",
      "7100-03:IV66484"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv65814/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04"
    ],
    "apAbstract": "SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF",
    "aparNo": "IV66484",
    "aparNoSet": [
      "IV66484"
    ],
    "fixedIn": "7100-03-05",
    "ifixes": [
      "IV66484m04.141230.71TL03SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV66484",
    "filesets": [
      "bos.mp64:7.1.3.0-7.1.3.30"
    ],
    "issued": "20150215",
    "updated": "null",
    "siblings": [
      "6100-08:IV66677",
      "6100-09:IV65814",
      "7100-02:IV69445",
      "7100-03:IV66484"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv66484/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-04",
      "7100-03-03"
    ],
    "apAbstract": "REGISTER CORRUPTION WHEN USING TRANSACTIONAL MEMORY ON POWER8",
    "aparNo": "IV66636",
    "aparNoSet": [
      "IV66636"
    ],
    "fixedIn": "7100-03-05",
    "ifixes": [
      "IV66636m3a.141106.71TL03SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV66636",
    "filesets": [
      "bos.mp64:7.1.3.16-7.1.3.30"
    ],
    "issued": "20141111",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv66636/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF",
    "aparNo": "IV66677",
    "aparNoSet": [
      "IV66677"
    ],
    "fixedIn": "6100-08-07",
    "ifixes": [
      "IV66677m6k.150211.61TL08SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV66677",
    "filesets": [
      "bos.mp64:6.1.8.0-6.1.8.19"
    ],
    "issued": "20150215",
    "updated": "null",
    "siblings": [
      "6100-08:IV66677",
      "6100-09:IV65814",
      "7100-02:IV69445",
      "7100-03:IV66484"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv66677/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04"
    ],
    "apAbstract": "LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR",
    "aparNo": "IV67876",
    "aparNoSet": [
      "IV67876"
    ],
    "fixedIn": "7100-03-05",
    "ifixes": [
      "IV67876s3a.150330.71TL03SP03.epkg.Z",
      "IV67876s4b.150323.71TL03SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV67876",
    "filesets": [
      "devices.chrp.base.rte:7.1.3.0-7.1.3.45"
    ],
    "issued": "20150317",
    "updated": "null",
    "siblings": [
      "6100-08:IV71109",
      "6100-09:IV59492",
      "7100-02:IV71110",
      "7100-03:IV67876"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv67876/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02"
    ],
    "apAbstract": "EEH EVENTS FOLLOWED BY INACCESSIBLE PCI / CFFH ADAPTER",
    "aparNo": "IV68712",
    "aparNoSet": [
      "IV68712"
    ],
    "fixedIn": "6100-09-05",
    "ifixes": [
      "IV68547m4a.150123.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV68712",
    "filesets": [
      "devices.chrp.pci.rte:6.1.9.0-6.1.9.30"
    ],
    "issued": "20150205",
    "updated": "null",
    "siblings": [
      "7100-03:IV68730",
      "6100-09:IV68712"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv68712/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04"
    ],
    "apAbstract": "EEH EVENTS FOLLOWED BY INACCESSIBLE PCI / CFFH ADAPTER",
    "aparNo": "IV68730",
    "aparNoSet": [
      "IV68730"
    ],
    "fixedIn": "7100-03-05",
    "ifixes": [
      "IV68678m4d.150204.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV68730",
    "filesets": [
      "devices.chrp.pci.rte:7.1.3.0-7.1.3.30"
    ],
    "issued": "20150205",
    "updated": "null",
    "siblings": [
      "7100-03:IV68730",
      "6100-09:IV68712"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv68730/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "SYSTEM HANGS AFTER PROCESS USES PSINFO ON ITSELF",
    "aparNo": "IV69445",
    "aparNoSet": [
      "IV69445"
    ],
    "fixedIn": "7100-02-07",
    "ifixes": [
      "IV69445m6k.150213.71TL02SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV69445",
    "filesets": [
      "bos.mp64:7.1.2.0-7.1.2.19"
    ],
    "issued": "20150215",
    "updated": "null",
    "siblings": [
      "6100-08:IV66677",
      "6100-09:IV65814",
      "7100-02:IV69445",
      "7100-03:IV66484"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv69445/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2",
      "2.2.3.3",
      "2.2.3.4"
    ],
    "apAbstract": "NEAR FULL SHARED STORAGE POOL CAN OVERWRITE FILESYSTEM METADATA.",
    "aparNo": "IV70381",
    "aparNoSet": [
      "IV70381"
    ],
    "fixedIn": "2.2.3.50",
    "ifixes": [
      "IV70381m4a.150527.61TL09SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV70381",
    "filesets": [
      "pool.basic.rte:\u003c6.1.9.45"
    ],
    "issued": "20150603",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv70381/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06"
    ],
    "apAbstract": "LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR",
    "aparNo": "IV71109",
    "aparNoSet": [
      "IV71109"
    ],
    "fixedIn": "6100-08-07",
    "ifixes": [
      "IV71109s2a.150420.61TL08SP02.epkg.Z",
      "IV71109s6b.150323.61TL08SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV71109",
    "filesets": [
      "devices.chrp.base.rte:6.1.8.0-6.1.8.21"
    ],
    "issued": "20150317",
    "updated": "null",
    "siblings": [
      "6100-08:IV71109",
      "6100-09:IV59492",
      "7100-02:IV71110",
      "7100-03:IV67876"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv71109/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06"
    ],
    "apAbstract": "LPM TO P7+ OR P8 FOLLOWED BY DLPAR CAN CRASH THE LPAR",
    "aparNo": "IV71110",
    "aparNoSet": [
      "IV71110"
    ],
    "fixedIn": "7100-02-07",
    "ifixes": [
      "IV71110s4a.150420.71TL02SP04.epkg.Z",
      "IV71110s6a.150323.71TL02SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV71110",
    "filesets": [
      "devices.chrp.base.rte:7.1.2.0-7.1.2.21"
    ],
    "issued": "20150317",
    "updated": "null",
    "siblings": [
      "6100-08:IV71109",
      "6100-09:IV59492",
      "7100-02:IV71110",
      "7100-03:IV67876"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv71110/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2",
      "2.2.3.3",
      "2.2.3.4"
    ],
    "apAbstract": "NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK",
    "aparNo": "IV71217",
    "aparNoSet": [
      "IV71217"
    ],
    "fixedIn": "2.2.3.50",
    "ifixes": [
      "IV69760.fix.tar"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV69760",
    "filesets": [
      "rsct.core.rmc:3.2.0.0-3.2.0.4"
    ],
    "issued": "20150319",
    "updated": "20150512",
    "siblings": [
      "6100-09:IV71217",
      "7100-03:IV71219"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv69760/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04"
    ],
    "apAbstract": "NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK",
    "aparNo": "IV71217",
    "aparNoSet": [
      "IV71217"
    ],
    "fixedIn": "6100-09-05",
    "ifixes": [
      "IV69760.fix.tar"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV69760",
    "filesets": [
      "rsct.core.rmc:3.2.0.0-3.2.0.4"
    ],
    "issued": "20150319",
    "updated": "20150512",
    "siblings": [
      "6100-09:IV71217",
      "7100-03:IV71219"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv69760/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04"
    ],
    "apAbstract": "NODE DOWN IN CAA CLUSTER DUE TO CONFIGRM MEMORY LEAK",
    "aparNo": "IV71219",
    "aparNoSet": [
      "IV71219"
    ],
    "fixedIn": "7100-03-05",
    "ifixes": [
      "IV69760.fix.tar"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV71219",
    "filesets": [
      "rsct.core.rmc:3.2.0.0-3.2.0.4"
    ],
    "issued": "20150319",
    "updated": "20150512",
    "siblings": [
      "6100-09:IV71217",
      "7100-03:IV71219"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv69760/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06"
    ],
    "apAbstract": " Cluster node halt due to Group Services client errors",
    "aparNo": "IV74438",
    "aparNoSet": [
      "IV74438"
    ],
    "fixedIn": "7100-03-07",
    "ifixes": [
      "ctHA_M1r.160808.71TL03SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV74438",
    "filesets": [
      "rsct.basic.rte:3.1.5.0-3.2.0.7",
      "rsct.core.rmc:3.1.5.0-3.2.0.9"
    ],
    "issued": "20160628",
    "updated": "null",
    "siblings": [
      "7100-04:IV85983",
      "7200-00:IV85983"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv74438/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "Cluster node halt due to Group Services client errors",
    "aparNo": "IV74438",
    "aparNoSet": [
      "IV74438"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "ctHA_M1r.160808.61TL09SP05.epkg.Z",
      "ctHA_M2r.160809.61TL09SP06.epkg.Z",
      "ctHA_M2r.160809.61TL09SP07.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV74438",
    "filesets": [
      "rsct.basic.rte:3.1.5.0-3.2.0.7",
      "rsct.core.rmc:3.1.5.0-3.2.0.9"
    ],
    "issued": "20160628",
    "updated": "null",
    "siblings": [
      "7100-04:IV85983",
      "7200-00:IV85983"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv74438/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.51",
      "2.2.3.52"
    ],
    "apAbstract": "CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL",
    "aparNo": "IV74711",
    "aparNoSet": [
      "IV74711"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV74711s5a.150716.61TL09SP05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV74711",
    "filesets": [
      "bos.rte.tty:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150720",
    "updated": "null",
    "siblings": [
      "6100-09:IV74711",
      "7100-03:IV75031"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv74711/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-05"
    ],
    "apAbstract": "CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL",
    "aparNo": "IV74711",
    "aparNoSet": [
      "IV74711"
    ],
    "fixedIn": "6100-09-06",
    "ifixes": [
      "IV74711s5a.150716.61TL09SP05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV74711",
    "filesets": [
      "bos.rte.tty:6.1.9.0-6.1.9.45"
    ],
    "issued": "20150720",
    "updated": "null",
    "siblings": [
      "6100-09:IV74711",
      "7100-03:IV75031"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv74711/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-05"
    ],
    "apAbstract": "CSH CAN HANG IF THERE IS NO CONTROLLING TERMINAL",
    "aparNo": "IV75031",
    "aparNoSet": [
      "IV75031"
    ],
    "fixedIn": "7100-03-06",
    "ifixes": [
      "IV75031s5a.150716.71TL03SP05.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV75031",
    "filesets": [
      "bos.rte.tty:7.1.3.0-7.1.3.45"
    ],
    "issued": "20150720",
    "updated": "null",
    "siblings": [
      "6100-09:IV74711",
      "7100-03:IV75031"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv75031/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00"
    ],
    "apAbstract": "POSSIBLE SYSTEM CRASH USING PROCFS TO READ 32BIT PROCESS MAP FIL",
    "aparNo": "IV79262",
    "aparNoSet": [
      "IV79262"
    ],
    "fixedIn": "7100-04-00",
    "ifixes": [
      "IV79262m1a.151211.71TL04SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV79262",
    "filesets": [
      "bos.mp64:7.1.4.0"
    ],
    "issued": "20151219",
    "updated": "null",
    "siblings": [
      "7200-00:IV79441",
      "7100-04:IV79262"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv79262/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "POSSIBLE SYSTEM CRASH USING PROCFS TO READ 32BIT PROCESS MAP FIL",
    "aparNo": "IV79441",
    "aparNoSet": [
      "IV79441"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV79441m1a.151214.72TL00SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV79441",
    "filesets": [
      "bos.mp64:7.2.0.0-7.2.0.1"
    ],
    "issued": "20151204",
    "updated": "null",
    "siblings": [
      "7200-00:IV79441",
      "7100-04:IV79262"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv79441/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "AFTER LIVE UPDATE IFIX STATE MAY BE LEFT AS Q; REBOOT REQUIRED",
    "aparNo": "IV79639",
    "aparNoSet": [
      "IV79639"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV79639s0a.151210.72TL00SP00.epkg.Z",
      "IV79639s0a.151210.72TL00SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV79639",
    "filesets": [
      "bos.liveupdate.rte:7.2.0.0-7.2.0.1"
    ],
    "issued": "20151210",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv79639/",
    "cvss": [],
    "reboot": "LU"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "MIRRORVG/SYNCVG ON MIMIMAL AND MIGRATION INSTALL FAILS",
    "aparNo": "IV79848",
    "aparNoSet": [
      "IV79848"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV79848s1a.151217.72TL00SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV79848",
    "filesets": [
      "bos.rte.lvm:7.2.0.0-7.2.0.1"
    ],
    "issued": "20151217",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv79848/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV79942",
    "aparNoSet": [
      "CVE-2015-5219",
      "CVE-2015-7691",
      "CVE-2015-7692",
      "CVE-2015-7701",
      "CVE-2015-7702",
      "CVE-2015-7850",
      "CVE-2015-7853",
      "CVE-2015-7855",
      "IV79942"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV79942s6a.160119.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.101",
      "ntp.rte:6.1.6.0-6.1.6.4"
    ],
    "issued": "20160121",
    "updated": "null",
    "siblings": [
      "5300-12:IV79946",
      "6100-09:IV79942",
      "7100-03:IV79943",
      "7100-04:IV79944",
      "7200-00:IV79945"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar",
    "cvss": [
      "CVE-2015-5219:4.3",
      "CVE-2015-7691:5.3",
      "CVE-2015-7692:5.3",
      "CVE-2015-7701:5.3",
      "CVE-2015-7702:5.3",
      "CVE-2015-7850:5.3",
      "CVE-2015-7853:7.3",
      "CVE-2015-7855:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.0"
    ],
    "apAbstract": "Vulnerabilities in NTP affect VIOS",
    "aparNo": "IV79942",
    "aparNoSet": [
      "CVE-2015-5219",
      "CVE-2015-7691",
      "CVE-2015-7692",
      "CVE-2015-7701",
      "CVE-2015-7702",
      "CVE-2015-7850",
      "CVE-2015-7853",
      "CVE-2015-7855",
      "IV79942"
    ],
    "fixedIn": "2.2.4.20",
    "ifixes": [
      "IV79942s6a.160119.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.101",
      "ntp.rte:6.1.6.0-6.1.6.4"
    ],
    "issued": "20160121",
    "updated": "null",
    "siblings": [
      "See",
      "advisory"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar",
    "cvss": [
      "CVE-2015-5219:4.3",
      "CVE-2015-7691:5.3",
      "CVE-2015-7692:5.3",
      "CVE-2015-7701:5.3",
      "CVE-2015-7702:5.3",
      "CVE-2015-7850:5.3",
      "CVE-2015-7853:7.3",
      "CVE-2015-7855:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV79943",
    "aparNoSet": [
      "CVE-2015-5219",
      "CVE-2015-7691",
      "CVE-2015-7692",
      "CVE-2015-7701",
      "CVE-2015-7702",
      "CVE-2015-7850",
      "CVE-2015-7853",
      "CVE-2015-7855",
      "IV79943"
    ],
    "fixedIn": "7100-03-07",
    "ifixes": [
      "IV79943s5b.160119.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.45",
      "ntp.rte:7.1.0.0-7.1.0.4"
    ],
    "issued": "20160121",
    "updated": "null",
    "siblings": [
      "5300-12:IV79946",
      "6100-09:IV79942",
      "7100-03:IV79943",
      "7100-04:IV79944",
      "7200-00:IV79945"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar",
    "cvss": [
      "CVE-2015-5219:4.3",
      "CVE-2015-7691:5.3",
      "CVE-2015-7692:5.3",
      "CVE-2015-7701:5.3",
      "CVE-2015-7702:5.3",
      "CVE-2015-7850:5.3",
      "CVE-2015-7853:7.3",
      "CVE-2015-7855:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV79944",
    "aparNoSet": [
      "CVE-2015-5219",
      "CVE-2015-7691",
      "CVE-2015-7692",
      "CVE-2015-7701",
      "CVE-2015-7702",
      "CVE-2015-7850",
      "CVE-2015-7853",
      "CVE-2015-7855",
      "IV79944"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "IV79944s1a.160119.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0",
      "ntp.rte:7.1.0.0-7.1.0.4"
    ],
    "issued": "20160121",
    "updated": "null",
    "siblings": [
      "5300-12:IV79946",
      "6100-09:IV79942",
      "7100-03:IV79943",
      "7100-04:IV79944",
      "7200-00:IV79945"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar",
    "cvss": [
      "CVE-2015-5219:4.3",
      "CVE-2015-7691:5.3",
      "CVE-2015-7692:5.3",
      "CVE-2015-7701:5.3",
      "CVE-2015-7702:5.3",
      "CVE-2015-7850:5.3",
      "CVE-2015-7853:7.3",
      "CVE-2015-7855:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV79944",
    "aparNoSet": [
      "CVE-2015-5219",
      "CVE-2015-7691",
      "CVE-2015-7692",
      "CVE-2015-7701",
      "CVE-2015-7702",
      "CVE-2015-7850",
      "CVE-2015-7853",
      "CVE-2015-7855",
      "IV79944"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV79945s1a.160119.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.0.0",
      "ntp.rte:7.1.0.0-7.1.0.4"
    ],
    "issued": "20160121",
    "updated": "null",
    "siblings": [
      "5300-12:IV79946",
      "6100-09:IV79942",
      "7100-03:IV79943",
      "7100-04:IV79944",
      "7200-00:IV79945"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar",
    "cvss": [
      "CVE-2015-5219:4.3",
      "CVE-2015-7691:5.3",
      "CVE-2015-7692:5.3",
      "CVE-2015-7701:5.3",
      "CVE-2015-7702:5.3",
      "CVE-2015-7850:5.3",
      "CVE-2015-7853:7.3",
      "CVE-2015-7855:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV79946",
    "aparNoSet": [
      "CVE-2015-5219",
      "CVE-2015-7691",
      "CVE-2015-7692",
      "CVE-2015-7701",
      "CVE-2015-7702",
      "CVE-2015-7850",
      "CVE-2015-7853",
      "CVE-2015-7855",
      "IV79946"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV79946s9a.160119.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory4.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20160121",
    "updated": "null",
    "siblings": [
      "5300-12:IV79946",
      "6100-09:IV79942",
      "7100-03:IV79943",
      "7100-04:IV79944",
      "7200-00:IV79945"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix4.tar",
    "cvss": [
      "CVE-2015-5219:4.3",
      "CVE-2015-7691:5.3",
      "CVE-2015-7692:5.3",
      "CVE-2015-7701:5.3",
      "CVE-2015-7702:5.3",
      "CVE-2015-7850:5.3",
      "CVE-2015-7853:7.3",
      "CVE-2015-7855:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV80187",
    "aparNoSet": [
      "CVE-2015-8000",
      "IV80187"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV80187m9a.160120.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20160224",
    "updated": "null",
    "siblings": [
      "5300-12:IV80187",
      "6100-09:IV80188",
      "7100-03:IV80189",
      "7100-04:IV80191",
      "7200-00:IV80192"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar",
    "cvss": [
      "CVE-2015-8000:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV80188",
    "aparNoSet": [
      "CVE-2015-8000",
      "IV80188"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV80188s6a.160119.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.101"
    ],
    "issued": "20160224",
    "updated": "null",
    "siblings": [
      "5300-12:IV80187",
      "6100-09:IV80188",
      "7100-03:IV80189",
      "7100-04:IV80191",
      "7200-00:IV80192"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar",
    "cvss": [
      "CVE-2015-8000:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.0"
    ],
    "apAbstract": "Vulnerability in BIND affects VIOS",
    "aparNo": "IV80188",
    "aparNoSet": [
      "CVE-2015-8000",
      "IV80188"
    ],
    "fixedIn": "2.2.4.20",
    "ifixes": [
      "IV80188s6a.160119.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.101"
    ],
    "issued": "20160224",
    "updated": "null",
    "siblings": [
      "5300-12:IV80187",
      "6100-09:IV80188",
      "7100-03:IV80189",
      "7100-04:IV80191",
      "7200-00:IV80192"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar",
    "cvss": [
      "CVE-2015-8000:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV80189",
    "aparNoSet": [
      "CVE-2015-8000",
      "IV80189"
    ],
    "fixedIn": "7100-03-07",
    "ifixes": [
      "IV80189m5a.160119.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.45"
    ],
    "issued": "20160224",
    "updated": "null",
    "siblings": [
      "5300-12:IV80187",
      "6100-09:IV80188",
      "7100-03:IV80189",
      "7100-04:IV80191",
      "7200-00:IV80192"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar",
    "cvss": [
      "CVE-2015-8000:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV80191",
    "aparNoSet": [
      "CVE-2015-8000",
      "IV80191"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "IV80191s1a.160113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0"
    ],
    "issued": "20160224",
    "updated": "null",
    "siblings": [
      "5300-12:IV80187",
      "6100-09:IV80188",
      "7100-03:IV80189",
      "7100-04:IV80191",
      "7200-00:IV80192"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar",
    "cvss": [
      "CVE-2015-8000:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV80192",
    "aparNoSet": [
      "CVE-2015-8000",
      "IV80192"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV80192s1a.160113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory10.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.0.0"
    ],
    "issued": "20160224",
    "updated": "null",
    "siblings": [
      "5300-12:IV80187",
      "6100-09:IV80188",
      "7100-03:IV80189",
      "7100-04:IV80191",
      "7200-00:IV80192"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix10.tar",
    "cvss": [
      "CVE-2015-8000:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2",
      "2.2.3.3",
      "2.2.3.4",
      "2.2.3.51",
      "2.2.3.52"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION",
    "aparNo": "IV80334",
    "aparNoSet": [
      "IV80334"
    ],
    "fixedIn": "2.2.3.60",
    "ifixes": [
      "IV80334s6a.61TL09SP06.160205.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80334",
    "filesets": [
      "bos.cifs_fs.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20160330",
    "updated": "null",
    "siblings": [
      "7100-03:IV82410",
      "7100-04:IV81060",
      "7200-00:IV80957",
      "6100-09:IV80334"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80334/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION",
    "aparNo": "IV80334",
    "aparNoSet": [
      "IV80334"
    ],
    "fixedIn": "2.2.4.20",
    "ifixes": [
      "IV80334s6a.61TL09SP06.160205.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80334",
    "filesets": [
      "bos.cifs_fs.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20160330",
    "updated": "null",
    "siblings": [
      "7100-03:IV82410",
      "7100-04:IV81060",
      "7200-00:IV80957"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80334/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION",
    "aparNo": "IV80334",
    "aparNoSet": [
      "IV80334"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV80334s6a.61TL09SP06.160205.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80334",
    "filesets": [
      "bos.cifs_fs.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20160330",
    "updated": "null",
    "siblings": [
      "7100-03:IV82410",
      "7100-04:IV81060",
      "7200-00:IV80957"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80334/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "SYSTEM CRASH AFTER APPLICATION SETS SIGNAL MASK",
    "aparNo": "IV80412",
    "aparNoSet": [
      "IV80412"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV80412s0b.160122.72TL00SP00.epkg.Z",
      "IV80412s0c.160125.72TL00SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80412",
    "filesets": [
      "bos.mp64:7.2.0.0-7.2.0.1"
    ],
    "issued": "20160125",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80412/",
    "cvss": [],
    "reboot": "LU"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06"
    ],
    "apAbstract": "Vulnerability in mustendd device driver impacts AIX",
    "aparNo": "IV80569",
    "aparNoSet": [
      "CVE-2016-0281",
      "IV80569"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV80569s4a.160222.epkg.Z",
      "IV80569s5a.160222.epkg.Z",
      "IV80569s6a.160415.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc",
    "filesets": [
      "devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20160728",
    "updated": "null",
    "siblings": [
      "5300-12:IV84184",
      "6100-09:IV80569",
      "7100-03:IV82421",
      "7100-04:IV81459",
      "7200-00:IV81357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar",
    "cvss": [
      "CVE-2016-0281:3.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.0"
    ],
    "apAbstract": "Vulnerability in mustendd device driver impacts VIOS",
    "aparNo": "IV80569",
    "aparNoSet": [
      "CVE-2016-0281",
      "IV80569"
    ],
    "fixedIn": "2.2.4.20",
    "ifixes": [
      "IV80569s4a.160222.epkg.Z",
      "IV80569s5a.160222.epkg.Z",
      "IV80569s6a.160415.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc",
    "filesets": [
      "devices.pciex.e4145616e4140518.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20160728",
    "updated": "null",
    "siblings": [
      "5300-12:IV84184",
      "6100-09:IV80569",
      "7100-03:IV82421",
      "7100-04:IV81459",
      "7200-00:IV81357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar",
    "cvss": [
      "CVE-2016-0281:3.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06"
    ],
    "apAbstract": "Vulnerabilities in LibXML2 affect AIX",
    "aparNo": "IV80586",
    "aparNoSet": [
      "CVE-2015-7941",
      "CVE-2015-7942",
      "CVE-2015-8241",
      "IV80586"
    ],
    "fixedIn": "7100-03-07",
    "ifixes": [
      "IV80586s1a.160713.epkg.Z",
      "IV80586s1a.160121.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc",
    "filesets": [
      "bos.rte.control:7.1.3.0-7.1.3.46"
    ],
    "issued": "20160222",
    "updated": "20160811",
    "siblings": [
      "5300-12:IV80617",
      "6100-09:IV80588",
      "7100-03:IV80586",
      "7100-04:IV80586",
      "7200-00:IV80616"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar",
    "cvss": [
      "CVE-2015-7941:4.3",
      "CVE-2015-7942:4.3",
      "CVE-2015-8241:",
      "5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "Vulnerabilities in LibXML2 affect AIX",
    "aparNo": "IV80586",
    "aparNoSet": [
      "CVE-2015-7941",
      "CVE-2015-7942",
      "CVE-2015-8241",
      "IV80586"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "IV80586s1a.160713.epkg.Z",
      "IV80586s1a.160121.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc",
    "filesets": [
      "bos.rte.control:7.1.4.0"
    ],
    "issued": "20160222",
    "updated": "20160722",
    "siblings": [
      "5300-12:IV80617",
      "6100-09:IV80588",
      "7100-03:IV80586",
      "7100-04:IV80586",
      "7200-00:IV80616"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar",
    "cvss": [
      "CVE-2015-7941:4.3",
      "CVE-2015-7942:4.3",
      "CVE-2015-8241:",
      "5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06"
    ],
    "apAbstract": "Vulnerabilities in LibXML2 affect AIX",
    "aparNo": "IV80588",
    "aparNoSet": [
      "CVE-2015-7941",
      "CVE-2015-7942",
      "CVE-2015-8241",
      "IV80588"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV80588s6a.160121.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc",
    "filesets": [
      "bos.rte.control:6.1.9.0-6.1.9.100"
    ],
    "issued": "20160222",
    "updated": "null",
    "siblings": [
      "5300-12:IV80617",
      "6100-09:IV80588",
      "7100-03:IV80586",
      "7100-04:IV80586",
      "7200-00:IV80616"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar",
    "cvss": [
      "CVE-2015-7941:4.3",
      "CVE-2015-7942:4.3",
      "CVE-2015-8241:",
      "5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.0"
    ],
    "apAbstract": "Vulnerabilities in LibXML2 affect VIOS",
    "aparNo": "IV80588",
    "aparNoSet": [
      "CVE-2015-7941",
      "CVE-2015-7942",
      "CVE-2015-8241",
      "IV80588"
    ],
    "fixedIn": "2.2.4.20",
    "ifixes": [
      "IV80588s6a.160121.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc",
    "filesets": [
      "bos.rte.control:6.1.9.0-6.1.9.100"
    ],
    "issued": "20160222",
    "updated": "null",
    "siblings": [
      "5300-12:IV80617",
      "6100-09:IV80588",
      "7100-03:IV80586",
      "7100-04:IV80586",
      "7200-00:IV80616"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar",
    "cvss": [
      "CVE-2015-7941:4.3",
      "CVE-2015-7942:4.3",
      "CVE-2015-8241:",
      "5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "Vulnerabilities in LibXML2 affect AIX",
    "aparNo": "IV80616",
    "aparNoSet": [
      "CVE-2015-7941",
      "CVE-2015-7942",
      "CVE-2015-8241",
      "IV80616"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV80616s1a.160722.epkg.Z",
      "IV80616s1a.160121.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc",
    "filesets": [
      "bos.rte.control:7.2.0.0"
    ],
    "issued": "20160222",
    "updated": "20160722",
    "siblings": [
      "5300-12:IV80617",
      "6100-09:IV80588",
      "7100-03:IV80586",
      "7100-04:IV80586",
      "7200-00:IV80616"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar",
    "cvss": [
      "CVE-2015-7941:4.3",
      "CVE-2015-7942:4.3",
      "CVE-2015-8241:",
      "5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerabilities in LibXML2 affect AIX",
    "aparNo": "IV80617",
    "aparNoSet": [
      "CVE-2015-7941",
      "CVE-2015-7942",
      "CVE-2015-8241",
      "IV80617"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV80617s9a.160120.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_advisory2.asc",
    "filesets": [
      "bos.rte.control:5.3.12.0-5.3.12.9"
    ],
    "issued": "20160222",
    "updated": "null",
    "siblings": [
      "5300-12:IV80617",
      "6100-09:IV80588",
      "7100-03:IV80586",
      "7100-04:IV80586",
      "7200-00:IV80616"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/libxml2_fix2.tar",
    "cvss": [
      "CVE-2015-7941:4.3",
      "CVE-2015-7942:4.3",
      "CVE-2015-8241:",
      "5.9"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "ROOTVG LOSS IS NOT DETECTED",
    "aparNo": "IV80637",
    "aparNoSet": [
      "IV80637"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "IV80637s1a.160125.71TL04SP00.epkg.Z",
      "IV80637s1a.160125.71TL04SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80637",
    "filesets": [
      "bos.cluster.rte:7.1.4.0-7.1.4.1"
    ],
    "issued": "20160226",
    "updated": "null",
    "siblings": [
      "7200-00:IV80883"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80637/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "POWERHA FAILOVERS TIMES MAY BE LONG DUE TO DNS QUERY TIMEOUTS",
    "aparNo": "IV80778",
    "aparNoSet": [
      "IV80778"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "IV80778s1a.160222.71TL04SP00.epkg.Z",
      "IV80778s1a.160222.71TL04SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80778",
    "filesets": [
      "bos.cluster.rte:7.1.4.0-7.1.4.1"
    ],
    "issued": "20160226",
    "updated": "null",
    "siblings": [
      "7200-00:IV80882"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80778/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "POWERHA FAILOVERS TIMES MAY BE LONG DUE TO DNS QUERY TIMEOUTS",
    "aparNo": "IV80882",
    "aparNoSet": [
      "IV80882"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV80882s1a.160222.72TL00SP00.epkg.Z",
      "IV80882s1a.160222.72TL00SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80882",
    "filesets": [
      "bos.cluster.rte:7.2.0.0-7.2.0.1"
    ],
    "issued": "20160226",
    "updated": "null",
    "siblings": [
      "7100-04:IV80778"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80882/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "ROOTVG LOSS IS NOT DETECTED",
    "aparNo": "IV80883",
    "aparNoSet": [
      "IV80883"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV80883s1a.160218.72TL00SP00.epkg.Z",
      "IV80883s1a.160218.72TL00SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80883",
    "filesets": [
      "bos.cluster.rte:7.2.0.0-7.2.0.1"
    ],
    "issued": "20160226",
    "updated": "null",
    "siblings": [
      "7100-04:IV80637"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80883/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION",
    "aparNo": "IV80957",
    "aparNoSet": [
      "IV80957"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV80957s1a.72TL00SP00.160329.epkg.Z",
      "IV80957s1a.72TL00SP01.160329.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV80957",
    "filesets": [
      "bos.cifs_fs.rte:7.2.0.0"
    ],
    "issued": "20160330",
    "updated": "null",
    "siblings": [
      "6100-09:IV80334",
      "7100-03:IV82410",
      "7100-04:IV81060"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv80957/",
    "cvss": [],
    "reboot": "LU"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION",
    "aparNo": "IV81060",
    "aparNoSet": [
      "IV81060"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "IV81060s1b.71TL04SP01.160202.epkg.Z",
      "IV81060s1b.71TL04SP01.160202.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81060",
    "filesets": [
      "bos.cifs_fs.rte:7.1.4.0"
    ],
    "issued": "20160330",
    "updated": "null",
    "siblings": [
      "6100-09:IV80334",
      "7100-03:IV82410",
      "7200-00:IV80957"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81060/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV81278",
    "aparNoSet": [
      "CVE-2015-8704",
      "IV81278"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV81278m9a.160315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20160422",
    "updated": "null",
    "siblings": [
      "5300-12:IV81278",
      "6100-09:IV81279",
      "7100-03:IV81280",
      "7100-04:IV81281",
      "7200-00:IV81282"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar",
    "cvss": [
      "CVE-2015-8704:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV81279",
    "aparNoSet": [
      "CVE-2015-8704",
      "IV81279"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV81279m4c.160331.epkg.Z",
      "IV81279m5a.160329.epkg.Z",
      "IV81279s6a.160308.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.101"
    ],
    "issued": "20160422",
    "updated": "null",
    "siblings": [
      "5300-12:IV81278",
      "6100-09:IV81279",
      "7100-03:IV81280",
      "7100-04:IV81281",
      "7200-00:IV81282"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar",
    "cvss": [
      "CVE-2015-8704:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV81280",
    "aparNoSet": [
      "CVE-2015-8704",
      "IV81280"
    ],
    "fixedIn": "7100-03-07",
    "ifixes": [
      "IV81280m4b.160329.epkg.Z",
      "IV81280m5a.160330.epkg.Z",
      "IV81280m6a.160315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.46"
    ],
    "issued": "20160422",
    "updated": "null",
    "siblings": [
      "5300-12:IV81278",
      "6100-09:IV81279",
      "7100-03:IV81280",
      "7100-04:IV81281",
      "7200-00:IV81282"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar",
    "cvss": [
      "CVE-2015-8704:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV81281",
    "aparNoSet": [
      "CVE-2015-8704",
      "IV81281"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "IV81281m0b.160331.epkg.Z",
      "IV81281m1a.160315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0"
    ],
    "issued": "20160422",
    "updated": "null",
    "siblings": [
      "5300-12:IV81278",
      "6100-09:IV81279",
      "7100-03:IV81280",
      "7100-04:IV81281",
      "7200-00:IV81282"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar",
    "cvss": [
      "CVE-2015-8704:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV81282",
    "aparNoSet": [
      "CVE-2015-8704",
      "IV81282"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV81282m0a.160401.epkg.Z",
      "IV81282m1a.160315.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.0.0"
    ],
    "issued": "20160422",
    "updated": "null",
    "siblings": [
      "5300-12:IV81278",
      "6100-09:IV81279",
      "7100-03:IV81280",
      "7100-04:IV81281",
      "7200-00:IV81282"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar",
    "cvss": [
      "CVE-2015-8704:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.0"
    ],
    "apAbstract": "Vulnerability in BIND affects VIOS",
    "aparNo": "IV81282",
    "aparNoSet": [
      "CVE-2015-8704",
      "IV81282"
    ],
    "fixedIn": "2.2.4.20",
    "ifixes": [
      "IV81279s6a.160308.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory11.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.101"
    ],
    "issued": "20160422",
    "updated": "null",
    "siblings": [
      "5300-12:IV81278",
      "6100-09:IV81279",
      "7100-03:IV81280",
      "7100-04:IV81281",
      "7200-00:IV81282"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix11.tar",
    "cvss": [
      "CVE-2015-8704:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "Core dump in many commands when using NIS",
    "aparNo": "IV81303",
    "aparNoSet": [
      "IV81303"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "IV81303s1a.160224.71TL04SP00.epkg.Z",
      "IV81303s1a.160224.71TL04SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81303",
    "filesets": [
      "bos.rte.libc:7.1.4.0"
    ],
    "issued": "20160307",
    "updated": "null",
    "siblings": [
      "6100-09:IV82196",
      "7200-00:IV82224"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81303/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "Vulnerability in mustendd device driver impacts AIX",
    "aparNo": "IV81357",
    "aparNoSet": [
      "CVE-2016-0281",
      "IV81357"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV81357s0a.160511.epkg.Z",
      "IV81357s1a.160414.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc",
    "filesets": [
      "devices.pciex.e4145616e4140518.rte:7.2.0.0"
    ],
    "issued": "20160728",
    "updated": "null",
    "siblings": [
      "5300-12:IV84184",
      "6100-09:IV80569",
      "7100-03:IV82421",
      "7100-04:IV81459",
      "7200-00:IV81357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar",
    "cvss": [
      "CVE-2016-0281:3.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "Vulnerability in mustendd device driver impacts AIX",
    "aparNo": "IV81459",
    "aparNoSet": [
      "CVE-2016-0281",
      "IV81459"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "IV81459s1b.160512.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc",
    "filesets": [
      "devices.pciex.e4145616e4140518.rte:7.1.4.0"
    ],
    "issued": "20160728",
    "updated": "null",
    "siblings": [
      "5300-12:IV84184",
      "6100-09:IV80569",
      "7100-03:IV82421",
      "7100-04:IV81459",
      "7200-00:IV81357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar",
    "cvss": [
      "CVE-2016-0281:3.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "MULTIBOS MAY FAIL TO MOUNT OR REMOVE A STANDBY INSTANCE",
    "aparNo": "IV81482",
    "aparNoSet": [
      "IV81482"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV81482s1a.160224.72TL00SP00.epkg.Z",
      "IV81482s1a.160224.72TL00SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81482",
    "filesets": [
      "bos.rte.bosinst:7.2.0.0"
    ],
    "issued": "20160307",
    "updated": "null",
    "siblings": [
      "6100-09:IV81503",
      "7100-04:IV81493"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81482/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "multibos may fail to mount or remove a standby instance",
    "aparNo": "IV81493",
    "aparNoSet": [
      "IV81493"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "IV81493s1a.160223.71TL04SP00.epkg.Z",
      "IV81493s1a.160223.71TL04SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81493",
    "filesets": [
      "bos.rte.bosinst:7.1.4.0"
    ],
    "issued": "20160307",
    "updated": "null",
    "siblings": [
      "6100-09:IV81503",
      "7200-00:IV81482"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81493/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10"
    ],
    "apAbstract": "multibos may fail to mount or remove a standby instance",
    "aparNo": "IV81503",
    "aparNoSet": [
      "IV81503"
    ],
    "fixedIn": "2.2.4.20",
    "ifixes": [
      "IV81503s6a.160223.61TL09SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81503",
    "filesets": [
      "bos.rte.bosinst:6.1.9.100"
    ],
    "issued": "20160307",
    "updated": "null",
    "siblings": [
      "7100-04:IV81493",
      "7200-00:IV81482"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81503/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-06"
    ],
    "apAbstract": "multibos may fail to mount or remove a standby instance",
    "aparNo": "IV81503",
    "aparNoSet": [
      "IV81503"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV81503s6a.160223.61TL09SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV81503",
    "filesets": [
      "bos.rte.bosinst:6.1.9.0-6.1.9.100"
    ],
    "issued": "20160307",
    "updated": "null",
    "siblings": [
      "7100-04:IV81493",
      "7200-00:IV81482"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv81503/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10"
    ],
    "apAbstract": "Core dump in many commands when using NIS",
    "aparNo": "IV82196",
    "aparNoSet": [
      "IV82196"
    ],
    "fixedIn": "2.2.4.20",
    "ifixes": [
      "IV82196s6a.160308.61TL09SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82196",
    "filesets": [
      "bos.rte.libc:6.1.9.100"
    ],
    "issued": "20160307",
    "updated": "null",
    "siblings": [
      "6100-09:IV82196",
      "7100-04:IV81303",
      "7200-00:IV82224"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82196/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-06"
    ],
    "apAbstract": "Core dump in many commands when using NIS",
    "aparNo": "IV82196",
    "aparNoSet": [
      "IV82196"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV82196s6a.160308.61TL09SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82196",
    "filesets": [
      "bos.rte.libc:6.1.9.0-6.1.9.100"
    ],
    "issued": "20160307",
    "updated": "null",
    "siblings": [
      "7100-04:IV81303",
      "7200-00:IV82224"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82196/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "Core dump in many commands when using NIS",
    "aparNo": "IV82224",
    "aparNoSet": [
      "IV82224"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV82224s1a.160308.72TL00SP00.epkg.Z",
      "IV82224s1a.160308.72TL00SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82224",
    "filesets": [
      "bos.rte.libc:7.2.0.0"
    ],
    "issued": "20160307",
    "updated": "null",
    "siblings": [
      "6100-09:IV82196",
      "7100-04:IV81303"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82224/",
    "cvss": [],
    "reboot": "LU"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-06",
      "7100-03-05",
      "7100-03-04",
      "7100-03-03",
      "7100-03-02",
      "7100-03-01",
      "7100-03-00"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING CIFS_FS DUE TO TREE CORRUPTION",
    "aparNo": "IV82410",
    "aparNoSet": [
      "IV82410"
    ],
    "fixedIn": "7100-03-07",
    "ifixes": [
      "IV82410s6a.71TL03SP06.160324.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82410",
    "filesets": [
      "bos.cifs_fs.rte:7.1.3.0-7.1.3.46"
    ],
    "issued": "20160330",
    "updated": "null",
    "siblings": [
      "6100-09:IV80334",
      "7100-04:IV81060",
      "7200-00:IV80957"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82410/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06"
    ],
    "apAbstract": "Vulnerability in mustendd device driver impacts AIX",
    "aparNo": "IV82421",
    "aparNoSet": [
      "CVE-2016-0281",
      "IV82421"
    ],
    "fixedIn": "7100-03-07",
    "ifixes": [
      "IV82421s4a.160505.epkg.Z",
      "IV82421s5a.160505.epkg.Z",
      "IV82421s6a.160415.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc",
    "filesets": [
      "devices.pciex.e4145616e4140518.rte:7.1.3.0-7.1.3.46"
    ],
    "issued": "20160728",
    "updated": "null",
    "siblings": [
      "5300-12:IV84184",
      "6100-09:IV80569",
      "7100-03:IV82421",
      "7100-04:IV81459",
      "7200-00:IV81357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar",
    "cvss": [
      "CVE-2016-0281:3.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06"
    ],
    "apAbstract": "Cluster split-brain issues when rebooting a node",
    "aparNo": "IV82494",
    "aparNoSet": [
      "IV82494"
    ],
    "fixedIn": "7100-03-07",
    "ifixes": [
      "MIG4_7134.160620.71TL03SP04.epkg.Z",
      "MIG4_7135.160620.71TL03SP05.epkg.Z",
      "MIG_7136.160429.71TL03SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82494",
    "filesets": [
      "rsct.basic.rte:7.1.3.0-7.1.3.47"
    ],
    "issued": "20160625",
    "updated": "null",
    "siblings": [
      "6100-09:IV82627",
      "7100-04:IV82624",
      "7200-00:IV82561"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82494/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01"
    ],
    "apAbstract": "Cluster split-brain issues when rebooting a node",
    "aparNo": "IV82624",
    "aparNoSet": [
      "IV82624"
    ],
    "fixedIn": "7100-04-02",
    "ifixes": [
      "MIG3_7141.160607.71TL04SP01.epkg.Z",
      "MIG_7142.160607.71TL04SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82624",
    "filesets": [
      "rsct.basic.rte:7.1.4.0-7.1.4.1"
    ],
    "issued": "20160625",
    "updated": "null",
    "siblings": [
      "6100-09:IV82627",
      "7100-03:IV82494",
      "7200-00:IV82561"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82494/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06"
    ],
    "apAbstract": "Cluster split-brain issues when rebooting a node",
    "aparNo": "IV82627",
    "aparNoSet": [
      "IV82627"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "MIG4_6194.160620.61TL09SP04.epkg.Z",
      "MIG4_6195.160620.61TL09SP05.epkg.Z",
      "MIG_6196.160429.61TL09SP06.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82627",
    "filesets": [
      "rsct.basic.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20160625",
    "updated": "null",
    "siblings": [
      "7100-03:IV82494",
      "7100-04:IV82624",
      "7200-00:IV82561"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82627/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "Cluster split-brain issues when rebooting a node",
    "aparNo": "IV82651",
    "aparNoSet": [
      "IV82651"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "MIG3_7201.160607.72TL00SP01.epkg.Z",
      "MIG_7202.160607.72TL00SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV82651",
    "filesets": [
      "rsct.basic.rte:7.2.0.0-7.2.0.1"
    ],
    "issued": "20160625",
    "updated": "null",
    "siblings": [
      "6100-09:IV82627",
      "7100-03:IV82494",
      "7100-04:IV82624"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82651/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20"
    ],
    "apAbstract": "Server using 10 GB PCIE adapters and large_send may crash",
    "aparNo": "IV82694",
    "aparNoSet": [
      "IV82694"
    ],
    "fixedIn": "2.2.4.30",
    "ifixes": [
      "IV82694s6a.160510.61TL09SP06.epkg.Z",
      "IV82694s7a.160531.61TL09SP07.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/docview.wss?uid\u003disg1IV82694",
    "filesets": [
      "bos.net.tcp.client:6.1.9.100-6.1.9.102"
    ],
    "issued": "20160816",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82694/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "Server using 10 GB PCIE adapters and large_send may crash",
    "aparNo": "IV82694",
    "aparNoSet": [
      "IV82694"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV82694s6a.160510.61TL09SP06.epkg.Z",
      "IV82694s7a.160531.61TL09SP07.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/docview.wss?uid\u003disg1IV82694",
    "filesets": [
      "bos.net.tcp.client:6.1.9.100-6.1.9.102"
    ],
    "issued": "20160816",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv82694/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.10",
      "2.2.3.20",
      "2.2.3.30",
      "2.2.3.40",
      "2.2.3.50",
      "2.2.3.60",
      "2.2.3.70"
    ],
    "apAbstract": "I/O HANG OR CRASH IN EFC_FREE_LOGIN _TBLE WITH SOME FC ADAPTERS",
    "aparNo": "IV83143",
    "aparNoSet": [
      "IV83143"
    ],
    "fixedIn": "2.2.3.80",
    "ifixes": [
      "IV83143s0a.161018.epkg.Z",
      "IV83143s2a.161014.epkg.Z",
      "IV83143s3a.160915.61TL09SP03.epkg.Z",
      "IV83143s4a.160921.61TL09SP04.epkg.Z",
      "IV83143s5a.160502.61TL09SP05.epkg.Z",
      "IV83143s5a.160502.VIOS.2.2.3.5x.epkg.Z",
      "IV83143s6a.160523.61TL09SP06.epkg.Z",
      "IV83143s6a.160523.VIOS.2.2.3.60.epkg.Z",
      "IV83143s6a.160523.VIOS.2.2.4.0.epkg.Z",
      "IV83143s6a.160523.VIOS.2.2.4.10.epkg.Z",
      "IV83143s7a.160705.61TL09SP07.epkg.Z",
      "IV83143s7a.1607"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV83143",
    "filesets": [
      "devices.pci.df1000f7.com:6.1.9.0-6.1.9.101"
    ],
    "issued": "20160917",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv83143/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.21",
      "2.2.4.22",
      "2.2.4.23"
    ],
    "apAbstract": "I/O HANG OR CRASH IN EFC_FREE_LOGIN _TBLE WITH SOME FC ADAPTERS",
    "aparNo": "IV83143",
    "aparNoSet": [
      "IV83143"
    ],
    "fixedIn": "2.2.4.30",
    "ifixes": [
      "IV83143s0a.161018.epkg.Z",
      "IV83143s2a.161014.epkg.Z",
      "IV83143s3a.160915.61TL09SP03.epkg.Z",
      "IV83143s4a.160921.61TL09SP04.epkg.Z",
      "IV83143s5a.160502.61TL09SP05.epkg.Z",
      "IV83143s5a.160502.VIOS.2.2.3.5x.epkg.Z",
      "IV83143s6a.160523.61TL09SP06.epkg.Z",
      "IV83143s6a.160523.VIOS.2.2.3.60.epkg.Z",
      "IV83143s6a.160523.VIOS.2.2.4.0.epkg.Z",
      "IV83143s6a.160523.VIOS.2.2.4.10.epkg.Z",
      "IV83143s7a.160705.61TL09SP07.epkg.Z",
      "IV83143s7a.1607"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV83143",
    "filesets": [
      "devices.pci.df1000f7.com:6.1.9.100-6.1.9.101"
    ],
    "issued": "20160917",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv83143/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV83984",
    "aparNoSet": [
      "CVE-2015-7972",
      "CVE-2015-7977",
      "CVE-2015-7979",
      "CVE-2015-8139",
      "CVE-2015-8140",
      "CVE-2015-8158",
      "IV83984"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV83984m4a.160506.epkg.Z",
      "IV83984m5a.160510.epkg.Z",
      "IV83984m6a.160504.epkg.Z",
      "IV83984s7a.160622.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.102"
    ],
    "issued": "20160608",
    "updated": "20160622",
    "siblings": [
      "5300-12:IV84269",
      "6100-09:IV83984",
      "7100-03:IV83993",
      "7100-04:IV83994",
      "7200-00:IV83995"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar",
    "cvss": [
      "CVE-2015-7973:5.4",
      "CVE-2015-7977:5.3",
      "CVE-2015-7979:6.5",
      "CVE-2015-8158:5.3",
      "CVE-2015-8139:5.3",
      "CVE-2015-8140:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.20"
    ],
    "apAbstract": "Vulnerabilities in NTP affect VIOS",
    "aparNo": "IV83984",
    "aparNoSet": [
      "CVE-2015-7972",
      "CVE-2015-7977",
      "CVE-2015-7979",
      "CVE-2015-8139",
      "CVE-2015-8140",
      "CVE-2015-8158",
      "IV83984"
    ],
    "fixedIn": "2.2.4.30",
    "ifixes": [
      "IV83984m6a.160504.epkg.Z",
      "IV83984s7a.160622.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.102"
    ],
    "issued": "20160608",
    "updated": "20160622",
    "siblings": [
      "5300-12:IV84269",
      "6100-09:IV83984",
      "7100-03:IV83993",
      "7100-04:IV83994",
      "7200-00:IV83995"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar",
    "cvss": [
      "CVE-2015-7973:5.4",
      "CVE-2015-7977:5.3",
      "CVE-2015-7979:6.5",
      "CVE-2015-8158:5.3",
      "CVE-2015-8139:5.3",
      "CVE-2015-8140:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV83993",
    "aparNoSet": [
      "CVE-2015-7972",
      "CVE-2015-7977",
      "CVE-2015-7979",
      "CVE-2015-8139",
      "CVE-2015-8140",
      "CVE-2015-8158",
      "IV83993"
    ],
    "fixedIn": "7100-03-08",
    "ifixes": [
      "IV83993m4b.160510.epkg.Z",
      "IV83993m5a.160510.epkg.Z",
      "IV83993m6a.160505.epkg.Z",
      "IV83993s7a.160714.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.47"
    ],
    "issued": "20160608",
    "updated": "20160719",
    "siblings": [
      "5300-12:IV84269",
      "6100-09:IV83984",
      "7100-03:IV83993",
      "7100-04:IV83994",
      "7200-00:IV83995"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar",
    "cvss": [
      "CVE-2015-7973:5.4",
      "CVE-2015-7977:5.3",
      "CVE-2015-7979:6.5",
      "CVE-2015-8158:5.3",
      "CVE-2015-8139:5.3",
      "CVE-2015-8140:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV83994",
    "aparNoSet": [
      "CVE-2015-7972",
      "CVE-2015-7977",
      "CVE-2015-7979",
      "CVE-2015-8139",
      "CVE-2015-8140",
      "CVE-2015-8158",
      "IV83994"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "IV83994m1a.160505.epkg.Z",
      "IV83994m1a.160505.epkg.Z",
      "IV83994s2a.160620.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.1"
    ],
    "issued": "20160608",
    "updated": "20160620",
    "siblings": [
      "5300-12:IV84269",
      "6100-09:IV83984",
      "7100-03:IV83993",
      "7100-04:IV83994",
      "7200-00:IV83995"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar",
    "cvss": [
      "CVE-2015-7973:5.4",
      "CVE-2015-7977:5.3",
      "CVE-2015-7979:6.5",
      "CVE-2015-8158:5.3",
      "CVE-2015-8139:5.3",
      "CVE-2015-8140:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV83995",
    "aparNoSet": [
      "CVE-2015-7972",
      "CVE-2015-7977",
      "CVE-2015-7979",
      "CVE-2015-8139",
      "CVE-2015-8140",
      "CVE-2015-8158",
      "IV83995"
    ],
    "fixedIn": "7200-00-03",
    "ifixes": [
      "IV83995m0a.160510.epkg.Z",
      "IV83995m1a.160601.epkg.Z",
      "IV83995s2b.160713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc",
    "filesets": [
      "bos.net.tcp.ntp:7.2.0.0-7.2.0.2",
      "bos.net.tcp.ntpd:7.2.0.0-7.2.0.2"
    ],
    "issued": "20160608",
    "updated": "20160816",
    "siblings": [
      "5300-12:IV84269",
      "6100-09:IV83984",
      "7100-03:IV83993",
      "7100-04:IV83994",
      "7200-00:IV83995"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar",
    "cvss": [
      "CVE-2015-7973:5.4",
      "CVE-2015-7977:5.3",
      "CVE-2015-7979:6.5",
      "CVE-2015-8158:5.3",
      "CVE-2015-8139:5.3",
      "CVE-2015-8140:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in mustendd device driver impacts AIX",
    "aparNo": "IV84184",
    "aparNoSet": [
      "CVE-2016-0281",
      "IV84184"
    ],
    "fixedIn": "6100-09-07",
    "ifixes": [
      "IV81357s0a.160511.epkg.Z",
      "IV81357s1a.160414.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_advisory.asc",
    "filesets": [
      "devices.pciex.e4145616e4140518.rte:5.3.12.0-5.3.12.3"
    ],
    "issued": "20160728",
    "updated": "null",
    "siblings": [
      "5300-12:IV84184",
      "6100-09:IV80569",
      "7100-03:IV82421",
      "7100-04:IV81459",
      "7200-00:IV81357"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/mustendd_fix.tar",
    "cvss": [
      "CVE-2016-0281:3.7"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.10",
      "2.2.3.20",
      "2.2.3.30",
      "2.2.3.40",
      "2.2.3.50",
      "2.2.3.60",
      "2.2.3.70"
    ],
    "apAbstract": "LU READS MAY DETECT BAD DATA WHILE LU MOVE IN PROGRESS",
    "aparNo": "IV84212",
    "aparNoSet": [
      "IV84212"
    ],
    "fixedIn": "2.2.3.80",
    "ifixes": [
      "IV84212s6a.160509.61TL09SP06.epkg.Z",
      "IV84212s6a.160509.VIOS2.2.4.10.epkg.Z",
      "IV84212s7a.160509.61TL09SP07.epkg.Z",
      "IV84212s7a.160509.VIOS2.2.4.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV84212",
    "filesets": [
      "pool.basic.rte:6.1.9.0-6.1.9.46"
    ],
    "issued": "20160527",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv84212/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20"
    ],
    "apAbstract": "LU READS MAY DETECT BAD DATA WHILE LU MOVE IN PROGRESS",
    "aparNo": "IV84212",
    "aparNoSet": [
      "IV84212"
    ],
    "fixedIn": "2.2.4.30",
    "ifixes": [
      "IV84212s6a.160509.61TL09SP06.epkg.Z",
      "IV84212s6a.160509.VIOS2.2.4.10.epkg.Z",
      "IV84212s7a.160509.61TL09SP07.epkg.Z",
      "IV84212s7a.160509.VIOS2.2.4.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV84212",
    "filesets": [
      "pool.basic.rte:6.1.9.100-6.1.9.101"
    ],
    "issued": "20160527",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv84212/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV84269",
    "aparNoSet": [
      "CVE-2015-7972",
      "CVE-2015-7977",
      "CVE-2015-7979",
      "CVE-2015-8139",
      "CVE-2015-8140",
      "CVE-2015-8158",
      "IV84269"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV84269m9a.160522.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory6.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20160608",
    "updated": "20160609",
    "siblings": [
      "5300-12:IV84269",
      "6100-09:IV83984",
      "7100-03:IV83993",
      "7100-04:IV83994",
      "7200-00:IV83995"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix6.tar",
    "cvss": [
      "CVE-2015-7973:5.4",
      "CVE-2015-7977:5.3",
      "CVE-2015-7979:6.5",
      "CVE-2015-8158:5.3",
      "CVE-2015-8139:5.3",
      "CVE-2015-8140:5.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02"
    ],
    "apAbstract": "Vulnerability in BIND affects AIX",
    "aparNo": "IV84947",
    "aparNoSet": [
      "CVE-2016-1285",
      "CVE-2016-1286",
      "IV84947"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "IV84458s1a.160519.epkg.Z",
      "IV84947m1a.160531.epkg.Z",
      "IV84458s2a.160608.epkg.Z",
      "IV85296s2a.160616.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.1",
      "bos.net.tcp.server:7.1.4.0-7.1.4.1"
    ],
    "issued": "20160616",
    "updated": "null",
    "siblings": [
      "5300-12:IV85298",
      "6100-09:IV84984",
      "7100-03:IV85296",
      "7100-04:IV84947",
      "7200-00:IV85297"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar",
    "cvss": [
      "CVE-2016-1285:7.5",
      "CVE-2016-1286:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "Vulnerabilities in BIND affects AIX",
    "aparNo": "IV84984",
    "aparNoSet": [
      "CVE-2016-1285",
      "CVE-2016-1286",
      "IV84984"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV84456s5b.160607.epkg.Z",
      "IV84984m5b.160708.epkg.Z",
      "IV84456s6a.160517.epkg.Z",
      "IV84984m6a.160530.epkg.Z",
      "IV84456s7a.160608.epkg.Z",
      "IV84984s7a.160616.epkg.Z",
      "DEPRECATED::IV84984m5a.160616.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.102",
      "bos.net.tcp.server:6.1.9.0-6.1.9.101"
    ],
    "issued": "20160616",
    "updated": "20160708",
    "siblings": [
      "5300-12:IV85298",
      "6100-09:IV84984",
      "7100-03:IV85296",
      "7100-04:IV84947",
      "7200-00:IV85297"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar",
    "cvss": [
      "CVE-2016-1285:7.5",
      "CVE-2016-1286:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.0"
    ],
    "apAbstract": "Vulnerabilities in BIND affects VIOS",
    "aparNo": "IV84984",
    "aparNoSet": [
      "CVE-2016-1285",
      "CVE-2016-1286",
      "IV84984"
    ],
    "fixedIn": "2.2.4.30",
    "ifixes": [
      "IV84456s5b.160607.epkg.Z",
      "IV84984m5a.160616.epkg.Z",
      "IV84456s6a.160517.epkg.Z",
      "IV84984m6a.160530.epkg.Z",
      "IV84456s7a.160608.epkg.Z",
      "IV84984s7a.160616.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.102",
      "bos.net.tcp.server:6.1.9.0-6.1.9.101"
    ],
    "issued": "20160616",
    "updated": "null",
    "siblings": [
      "5300-12:IV85298",
      "6100-09:IV84984",
      "7100-03:IV85296",
      "7100-04:IV84947",
      "7200-00:IV85297"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar",
    "cvss": [
      "CVE-2016-1285:7.5",
      "CVE-2016-1286:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "Vulnerabilities in BIND affects AIX",
    "aparNo": "IV85296",
    "aparNoSet": [
      "CVE-2016-1285",
      "CVE-2016-1286",
      "IV85296"
    ],
    "fixedIn": "7100-03-08",
    "ifixes": [
      "IV84457s6a.160517.epkg.Z",
      "IV85296m6a.160601.epkg.Z",
      "IV84457s5a.160613.epkg.Z",
      "IV85296m5a.160617.epkg.Z",
      "IV84457s7a.160726.epkg.Z",
      "IV85296s7a.160809.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.47",
      "bos.net.tcp.server:7.1.3.0-7.1.3.47"
    ],
    "issued": "20160616",
    "updated": "20160817",
    "siblings": [
      "5300-12:IV85298",
      "6100-09:IV84984",
      "7100-03:IV85296",
      "7100-04:IV84947",
      "7200-00:IV85297"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar",
    "cvss": [
      "CVE-2016-1285:7.5",
      "CVE-2016-1286:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "Vulnerabilities in BIND affects AIX",
    "aparNo": "IV85297",
    "aparNoSet": [
      "CVE-2016-1285",
      "CVE-2016-1286",
      "IV85297"
    ],
    "fixedIn": "7200-00-03",
    "ifixes": [
      "IV84459s1a.160519.epkg.Z",
      "IV85297m1a.160601.epkg.Z",
      "IV84459s2a.160613.epkg.Z",
      "IV85297s2a.160614.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.0.0",
      "bos.net.tcp.bind_utils:7.2.0.0-7.2.0.1"
    ],
    "issued": "20160616",
    "updated": "null",
    "siblings": [
      "5300-12:IV85298",
      "6100-09:IV84984",
      "7100-03:IV85296",
      "7100-04:IV84947",
      "7200-00:IV85297"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar",
    "cvss": [
      "CVE-2016-1285:7.5",
      "CVE-2016-1286:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerabilities in BIND affects AIX",
    "aparNo": "IV85298",
    "aparNoSet": [
      "CVE-2016-1285",
      "CVE-2016-1286",
      "IV85298"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV85298m9a.160602.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory12.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10",
      "bos.net.tcp.server:5.3.12.0-5.3.12.6"
    ],
    "issued": "20160616",
    "updated": "null",
    "siblings": [
      "5300-12:IV85298",
      "6100-09:IV84984",
      "7100-03:IV85296",
      "7100-04:IV84947",
      "7200-00:IV85297"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix12.tar",
    "cvss": [
      "CVE-2016-1285:7.5",
      "CVE-2016-1286:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.50",
      "2.2.3.60",
      "2.2.3.70"
    ],
    "apAbstract": "Malformed network packets can cause system crash",
    "aparNo": "IV85460",
    "aparNoSet": [
      "IV85460"
    ],
    "fixedIn": "2.2.3.80",
    "ifixes": [
      "IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z",
      "IV85460s7a.160823.VIOS2.2.3.70.devices.ethernet.mlx.rte.epkg.Z",
      "IV85460s7a.160823.VIOS2.2.4.23.devices.ethernet.mlx.rte.epkg.Z",
      "IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z",
      "IV85460s7c.161214.VIOS2.2.3.70.devices.ethernet.shi.rte.epkg.Z",
      "IV85460s7c.161214.VIOS2.2.4.23.devices.ethernet.shi.rte.epkg.Z",
      "IV854"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV85460",
    "filesets": [
      "devices.ethernet.shi.rte:6.1.9.101-6.1.9.103",
      "devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102",
      "devices.ethernet.lnc2.rte:6.1.9.45-6.1.9.103"
    ],
    "issued": "20160606",
    "updated": "20170106",
    "siblings": [
      "7100-03:IV88430",
      "7100-04:IV86787",
      "7200-00:IV88136"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv85460/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.21",
      "2.2.4.22",
      "2.2.4.23"
    ],
    "apAbstract": "Malformed network packets can cause system crash",
    "aparNo": "IV85460",
    "aparNoSet": [
      "IV85460"
    ],
    "fixedIn": "2.2.4.24",
    "ifixes": [
      "IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z",
      "IV85460s7a.160823.VIOS2.2.3.70.devices.ethernet.mlx.rte.epkg.Z",
      "IV85460s7a.160823.VIOS2.2.4.23.devices.ethernet.mlx.rte.epkg.Z",
      "IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z",
      "IV85460s7c.161214.VIOS2.2.3.70.devices.ethernet.shi.rte.epkg.Z",
      "IV85460s7c.161214.VIOS2.2.4.23.devices.ethernet.shi.rte.epkg.Z",
      "IV854"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV85460",
    "filesets": [
      "devices.ethernet.shi.rte:6.1.9.101-6.1.9.103",
      "devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102",
      "devices.ethernet.lnc2.rte:6.1.9.101-6.1.9.103"
    ],
    "issued": "20160606",
    "updated": "20170106",
    "siblings": [
      "7100-03:IV88430",
      "7100-04:IV86787",
      "7200-00:IV88136"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv85460/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-05",
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "Malformed network packets can cause system crash",
    "aparNo": "IV85460",
    "aparNoSet": [
      "IV85460"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV85460s7a.160823.AIX61TL09SP07.devices.ethernet.mlx.rte.epkg.Z",
      "IV85460s7c.161214.AIX61TL09SP07.devices.ethernet.shi.rte.epkg.Z",
      "IV85460s7d.161215.AIX61TL09SP07.devices.ethernet.lnc2.rte.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV85460",
    "filesets": [
      "devices.ethernet.shi.rte:6.1.9.101-6.1.9.103",
      "devices.ethernet.mlx.rte:6.1.9.100-6.1.9.102",
      "devices.ethernet.lnc2.rte:6.1.9.45-6.1.9.103"
    ],
    "issued": "20160606",
    "updated": "20170106",
    "siblings": [
      "7100-03:IV88430",
      "7100-04:IV86787",
      "7200-00:IV88136"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv85460/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02"
    ],
    "apAbstract": "Cluster node halt due to Group Services client errors",
    "aparNo": "IV85983",
    "aparNoSet": [
      "IV85983"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "ctHA_O1r.160808.71TL04SP01.epkg.Z",
      "ctHA_O2r.160810.71TL04SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV85983",
    "filesets": [
      "rsct.basic.rte:3.2.1.0-3.2.1.10",
      "rsct.core.rmc:3.2.1.0-3.2.1.10"
    ],
    "issued": "20160628",
    "updated": "null",
    "siblings": [
      "7100-03:IV74438"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv85893/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "Cluster node halt due to Group Services client errors",
    "aparNo": "IV85983",
    "aparNoSet": [
      "IV85983"
    ],
    "fixedIn": "7200-00-03",
    "ifixes": [
      "ctHA_O1r.160808.72TL00SP01.epkg.Z",
      "ctHA_O2r.160810.72TL00SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV85983",
    "filesets": [
      "rsct.basic.rte:3.2.1.0-3.2.1.10",
      "rsct.core.rmc:3.2.1.0-3.2.1.10"
    ],
    "issued": "20160628",
    "updated": "null",
    "siblings": [
      "6100-09:IV74438",
      "7100-03:IV74438"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv85893/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.20"
    ],
    "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on VIOS",
    "aparNo": "IV86116",
    "aparNoSet": [
      "CVE-2015-7575",
      "CVE-2016-0266",
      "IV86116"
    ],
    "fixedIn": "2.2.4.30",
    "ifixes": [
      "IV86116m7a.160701.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.102",
      "bos.net.tcp.server:6.1.9.0-6.1.9.101"
    ],
    "issued": "20160726",
    "updated": "null",
    "siblings": [
      "5300-12:IV86120",
      "6100-09:IV86116",
      "7100-03:IV86117",
      "7100-04:IV86118",
      "7200-00:IV86119",
      "7200-00:IV86132"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar",
    "cvss": [
      "CVE-2015-7575:7.1",
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX",
    "aparNo": "IV86116",
    "aparNoSet": [
      "CVE-2015-7575",
      "CVE-2016-0266",
      "IV86116"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV86116s6a.160812.epkg.Z",
      "IV78625m5a.160901.epkg.Z",
      "IV79072s6a.160902.epkg.Z",
      "IV79072s5a.160830.epkg.Z",
      "IV79070m6a.160902.epkg.Z",
      "IV79070m5a.160901.epkg.Z",
      "IV78624m5a.160830.epkg.Z",
      "IV79071m6a.161017.epkg.Z",
      "IV79071m5a.160901.epkg.Z",
      "IV86116m7a.160701.epkg.Z",
      "DEPRECATED::IV86116m5b.160701.epkg.Z",
      "DEPRECATED::IV86116m6a.160701.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.102",
      "bos.net.tcp.server:6.1.9.0-6.1.9.101"
    ],
    "issued": "20160726",
    "updated": "20161020",
    "siblings": [
      "5300-12:IV86120",
      "6100-09:IV86116",
      "7100-03:IV86117",
      "7100-04:IV86118",
      "7200-00:IV86119",
      "7200-00:IV86132"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar",
    "cvss": [
      "CVE-2015-7575:7.1",
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX",
    "aparNo": "IV86117",
    "aparNoSet": [
      "CVE-2015-7575",
      "CVE-2016-0266",
      "IV86117"
    ],
    "fixedIn": "7100-03-08",
    "ifixes": [
      "IV82328m6a.160901.epkg.Z",
      "IV82328m5a.160830.epkg.Z",
      "IV82412s6a.160901.epkg.Z",
      "IV82412s5a.160829.epkg.Z",
      "IV82330m6a.160831.epkg.Z",
      "IV82330m5a.160831.epkg.Z",
      "IV82327s6a.160901.epkg.Z",
      "IV82327m5a.160830.epkg.Z",
      "IV82331m6a.160901.epkg.Z",
      "IV82331m5a.160830.epkg.Z",
      "IV86117m7a.160725.epkg.Z",
      "DEPRECATED::IV86117m5a.160701.epkg.Z",
      "DEPRECATED::IV86117m6a.160701.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.47",
      "bos.net.tcp.server:7.1.3.0-7.1.3.47"
    ],
    "issued": "20160726",
    "updated": "20161020",
    "siblings": [
      "5300-12:IV86120",
      "6100-09:IV86116",
      "7100-03:IV86117",
      "7100-04:IV86118",
      "7200-00:IV86119",
      "7200-00:IV86132"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar",
    "cvss": [
      "CVE-2015-7575:7.1",
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02"
    ],
    "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap  and pop3d on AIX",
    "aparNo": "IV86118",
    "aparNoSet": [
      "CVE-2015-7575",
      "CVE-2016-0266",
      "IV86118"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "IV86118m2a.160701.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.1",
      "bos.net.tcp.server:7.1.4.0-7.1.4.1"
    ],
    "issued": "20160726",
    "updated": "null",
    "siblings": [
      "5300-12:IV86120",
      "6100-09:IV86116",
      "7100-03:IV86117",
      "7100-04:IV86118",
      "7200-00:IV86119",
      "7200-00:IV86132"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar",
    "cvss": [
      "CVE-2015-7575:7.1",
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap and pop3d on AIX",
    "aparNo": "IV86119",
    "aparNoSet": [
      "CVE-2015-7575",
      "CVE-2016-0266",
      "IV86119",
      "IV86132"
    ],
    "fixedIn": "7200-00-03",
    "ifixes": [
      "IV86119s0a.160701.epkg.Z",
      "IV86132s0a.160701.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.imapd:7.2.0.0",
      "bos.net.tcp.pop3d:7.2.0.0",
      "bos.net.tcp.sendmail:7.2.0.0"
    ],
    "issued": "20160726",
    "updated": "null",
    "siblings": [
      "5300-12:IV86120",
      "6100-09:IV86116",
      "7100-03:IV86117",
      "7100-04:IV86118",
      "7200-00:IV86119",
      "7200-00:IV86132"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar",
    "cvss": [
      "CVE-2015-7575:7.1",
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerabilities in MD5 Signature and Hash Algorithm and TLS 1.2 affects sendmail imap pop3d ftp/ftpd and ndpd-host/ndpd-router on AIX",
    "aparNo": "IV86120",
    "aparNoSet": [
      "CVE-2015-7575",
      "CVE-2016-0266",
      "IV86120"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV88960m9a.160913.epkg.Z",
      "IV88959m9a.160915.epkg.Z",
      "IV88957m9a.160910.epkg.Z",
      "DEPRECATED::IV86120m9a.160705.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10",
      "bos.net.tcp.server:5.3.12.0-5.3.12.6"
    ],
    "issued": "20160726",
    "updated": "20161020",
    "siblings": [
      "5300-12:IV86120",
      "6100-09:IV86116",
      "7100-03:IV86117",
      "7100-04:IV86118",
      "7200-00:IV86119",
      "7200-00:IV86132"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/nettcp_fix2.tar",
    "cvss": [
      "CVE-2015-7575:7.1",
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-02"
    ],
    "apAbstract": "Performance regression when using Olson timezone format",
    "aparNo": "IV86730",
    "aparNoSet": [
      "IV86730"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "IV86730m2a.160812.71TL04SP01.epkg.Z",
      "IV86730m2a.160812.71TL04SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV86730",
    "filesets": [
      "bos.rte.libc:7.1.4.1"
    ],
    "issued": "20160901",
    "updated": "null",
    "siblings": [
      "6100-09:IV86773",
      "7100-03:IV87788",
      "7100-04:IV86730",
      "7200-00:IV87789"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv86730/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-07"
    ],
    "apAbstract": "Performance regression when using Olson timezone format",
    "aparNo": "IV86773",
    "aparNoSet": [
      "IV86773"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV86773s9a.160831.61TL09SP07.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV86773",
    "filesets": [
      "bos.rte.libc:6.1.9.101"
    ],
    "issued": "20160901",
    "updated": "null",
    "siblings": [
      "6100-09:IV86773",
      "7100-03:IV87788",
      "7100-04:IV86730",
      "7200-00:IV87789"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv86773/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02"
    ],
    "apAbstract": "Malformed network packets can cause system crash",
    "aparNo": "IV86787",
    "aparNoSet": [
      "IV86787"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "IV86787s2a.161222.AIX71TL04SP02.devices.ethernet.mlx.rte.epkg.Z",
      "IV86787s2b.161222.AIX71TL04SP02.devices.ethernet.lnc2.rte.epkg.Z",
      "IV86787s2c.161222.AIX71TL04SP02.devices.ethernet.shi.rte.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV86787",
    "filesets": [
      "devices.ethernet.shi.rte:7.1.4.0-7.1.4.2",
      "devices.ethernet.mlx.rte:7.1.4.0-7.1.4.2",
      "devices.ethernet.lnc2.rte:7.1.4.0-7.1.4.2"
    ],
    "issued": "20160711",
    "updated": "20170106",
    "siblings": [
      "6100-09:IV85460",
      "7100-03:IV88430",
      "7200-00:IV88136"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv86787/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV87419",
    "aparNoSet": [
      "CVE-2015-7974",
      "CVE-2016-1550",
      "CVE-2016-1551",
      "CVE-2016-2517",
      "CVE-2016-2518",
      "CVE-2016-2519",
      "IV87419"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV87419m5d.160823.epkg.Z",
      "IV87419m6a.160823.epkg.Z",
      "IV87419m7a.160901.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.102"
    ],
    "issued": "20160906",
    "updated": "null",
    "siblings": [
      "5300-12:IV87614",
      "6100-09:IV87419",
      "7100-03:IV87615",
      "7100-04:IV87420",
      "7200-00:IV87939"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar",
    "cvss": [
      "CVE-2015-7974:5.3",
      "CVE-2016-1550:4.0",
      "CVE-2016-1551:3.7",
      "CVE-2016-2517:4.2",
      "CVE-2016-2518:2.0",
      "CVE-2016-2519:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.20"
    ],
    "apAbstract": "Vulnerabilities in NTP affect VIOS",
    "aparNo": "IV87419",
    "aparNoSet": [
      "CVE-2015-7974",
      "CVE-2016-1550",
      "CVE-2016-1551",
      "CVE-2016-2517",
      "CVE-2016-2518",
      "CVE-2016-2519",
      "IV87419"
    ],
    "fixedIn": "2.2.4.30",
    "ifixes": [
      "IV87419m6a.160823.epkg.Z",
      "IV87419m7a.160901.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.102"
    ],
    "issued": "20160906",
    "updated": "null",
    "siblings": [
      "5300-12:IV87614",
      "6100-09:IV87419",
      "7100-03:IV87615",
      "7100-04:IV87420",
      "7200-00:IV87939"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar",
    "cvss": [
      "CVE-2015-7974:5.3",
      "CVE-2016-1550:4.0",
      "CVE-2016-1551:3.7",
      "CVE-2016-2517:4.2",
      "CVE-2016-2518:2.0",
      "CVE-2016-2519:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV87420",
    "aparNoSet": [
      "CVE-2015-7974",
      "CVE-2016-1550",
      "CVE-2016-1551",
      "CVE-2016-2517",
      "CVE-2016-2518",
      "CVE-2016-2519",
      "IV87420"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "IV87420m0a.160825.epkg.Z",
      "IV87420m2a.160901.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.1"
    ],
    "issued": "20160906",
    "updated": "null",
    "siblings": [
      "5300-12:IV87614",
      "6100-09:IV87419",
      "7100-03:IV87615",
      "7100-04:IV87420",
      "7200-00:IV87939"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar",
    "cvss": [
      "CVE-2015-7974:5.3",
      "CVE-2016-1550:4.0",
      "CVE-2016-1551:3.7",
      "CVE-2016-2517:4.2",
      "CVE-2016-2518:2.0",
      "CVE-2016-2519:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV87614",
    "aparNoSet": [
      "CVE-2015-7974",
      "CVE-2016-1550",
      "CVE-2016-1551",
      "CVE-2016-2517",
      "CVE-2016-2518",
      "CVE-2016-2519",
      "IV87614"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV87614m9a.160901.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20160906",
    "updated": "null",
    "siblings": [
      "5300-12:IV87614",
      "6100-09:IV87419",
      "7100-03:IV87615",
      "7100-04:IV87420",
      "7200-00:IV87939"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar",
    "cvss": [
      "CVE-2015-7974:5.3",
      "CVE-2016-1550:4.0",
      "CVE-2016-1551:3.7",
      "CVE-2016-2517:4.2",
      "CVE-2016-2518:2.0",
      "CVE-2016-2519:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV87615",
    "aparNoSet": [
      "CVE-2015-7974",
      "CVE-2016-1550",
      "CVE-2016-1551",
      "CVE-2016-2517",
      "CVE-2016-2518",
      "CVE-2016-2519",
      "IV87615"
    ],
    "fixedIn": "7100-03-08",
    "ifixes": [
      "IV87615m5a.160823.epkg.Z",
      "IV87615m6a.160824.epkg.Z",
      "IV87615m7a.160901.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.47"
    ],
    "issued": "20160906",
    "updated": "null",
    "siblings": [
      "5300-12:IV87614",
      "6100-09:IV87419",
      "7100-03:IV87615",
      "7100-04:IV87420",
      "7200-00:IV87939"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar",
    "cvss": [
      "CVE-2015-7974:5.3",
      "CVE-2016-1550:4.0",
      "CVE-2016-1551:3.7",
      "CVE-2016-2517:4.2",
      "CVE-2016-2518:2.0",
      "CVE-2016-2519:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02"
    ],
    "apAbstract": "Vulnerability in lquerylv in LVM impacts AIX",
    "aparNo": "IV87640",
    "aparNoSet": [
      "CVE-2016-6079",
      "IV87640"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "IV87640s2a.160825.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc",
    "filesets": [
      "bos.rte.lvm:7.1.4.0-7.1.4.1"
    ],
    "issued": "20161031",
    "updated": "null",
    "siblings": [
      "5300-12:IV88658",
      "6100-09:IV87981",
      "7100-03:IV88419",
      "7100-04:IV87640",
      "7200-00:IV88053"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar",
    "cvss": [
      "CVE-2016-6079:9.8"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-07"
    ],
    "apAbstract": "Performance regression when using Olson timezone format",
    "aparNo": "IV87788",
    "aparNoSet": [
      "IV87788"
    ],
    "fixedIn": "7100-03-08",
    "ifixes": [
      "IV87788s1a.160831.71TL03SP07.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV87788",
    "filesets": [
      "bos.rte.libc:7.1.3.47"
    ],
    "issued": "20160901",
    "updated": "null",
    "siblings": [
      "6100-09:IV86773",
      "7100-03:IV87788",
      "7100-04:IV86730",
      "7200-00:IV87789"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv87788/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-02"
    ],
    "apAbstract": "Performance regression when using Olson timezone format",
    "aparNo": "IV87789",
    "aparNoSet": [
      "IV87789"
    ],
    "fixedIn": "7200-00-03",
    "ifixes": [
      "IV87789s2a.160830.72TL00SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV87789",
    "filesets": [
      "bos.rte.libc:7.2.0.1"
    ],
    "issued": "20160901",
    "updated": "null",
    "siblings": [
      "6100-09:IV86773",
      "7100-03:IV87788",
      "7100-04:IV86730",
      "7200-00:IV87789"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv87789/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "Vulnerability in lsmcode affects AIX",
    "aparNo": "IV87794",
    "aparNoSet": [
      "CVE-2016-3053",
      "IV87794"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV87794s5a.160913.epkg.Z",
      "IV87794s6a.160912.epkg.Z",
      "IV87794s7b.160822.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc",
    "filesets": [
      "bos.rte.shell:6.1.9.0-6.1.9.101",
      "bos.rte.libc:6.1.9.0-6.1.9.101"
    ],
    "issued": "20161017",
    "updated": "null",
    "siblings": [
      "6100-09:IV87794",
      "7100-03:IV88457",
      "7100-04:IV88007",
      "7200-00:IV88042"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar",
    "cvss": [
      "CVE-2016-3053:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50",
      "2.2.3.60",
      "2.2.3.70",
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.21",
      "2.2.4.22",
      "2.2.4.23"
    ],
    "apAbstract": "Vulnerability in lsmcode affects VIOS",
    "aparNo": "IV87794",
    "aparNoSet": [
      "CVE-2016-3053",
      "IV87794"
    ],
    "fixedIn": "2.2.4.30",
    "ifixes": [
      "IV87794s6a.160912.epkg.Z",
      "IV87794s7b.160822.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc",
    "filesets": [
      "bos.rte.shell:6.1.9.0-6.1.9.101",
      "bos.rte.libc:6.1.9.0-6.1.9.101"
    ],
    "issued": "20161017",
    "updated": "null",
    "siblings": [
      "6100-09:IV87794",
      "7100-03:IV88457",
      "7100-04:IV88007",
      "7200-00:IV88042"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar",
    "cvss": [
      "CVE-2016-3053:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "Vulnerabilities in NTP affect AIX",
    "aparNo": "IV87939",
    "aparNoSet": [
      "CVE-2015-7974",
      "CVE-2016-1550",
      "CVE-2016-1551",
      "CVE-2016-2517",
      "CVE-2016-2518",
      "CVE-2016-2519",
      "IV87939"
    ],
    "fixedIn": "7200-00-03",
    "ifixes": [
      "IV87939m0b.160830.epkg.Z",
      "IV87939m2a.160901.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory7.asc",
    "filesets": [
      "bos.net.tcp.ntp:7.2.0.0-7.2.0.2",
      "bos.net.tcp.ntpd:7.2.0.0-7.2.0.2"
    ],
    "issued": "20160906",
    "updated": "null",
    "siblings": [
      "5300-12:IV87614",
      "6100-09:IV87419",
      "7100-03:IV87615",
      "7100-04:IV87420",
      "7200-00:IV87939"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix7.tar",
    "cvss": [
      "CVE-2015-7974:5.3",
      "CVE-2016-1550:4.0",
      "CVE-2016-1551:3.7",
      "CVE-2016-2517:4.2",
      "CVE-2016-2518:2.0",
      "CVE-2016-2519:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "Vulnerability in lquerylv in LVM impacts AIX",
    "aparNo": "IV87981",
    "aparNoSet": [
      "CVE-2016-6079",
      "IV87981"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV87981s7a.160825.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc",
    "filesets": [
      "bos.rte.lvm:6.1.9.0-6.1.9.101"
    ],
    "issued": "20161031",
    "updated": "null",
    "siblings": [
      "5300-12:IV88658",
      "6100-09:IV87981",
      "7100-03:IV88419",
      "7100-04:IV87640",
      "7200-00:IV88053"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar",
    "cvss": [
      "CVE-2016-6079:9.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50",
      "2.2.3.60",
      "2.2.3.70",
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.21",
      "2.2.4.22",
      "2.2.4.23"
    ],
    "apAbstract": "Vulnerability in lquerylv in LVM impacts VIOS",
    "aparNo": "IV87981",
    "aparNoSet": [
      "CVE-2016-6079",
      "IV87981"
    ],
    "fixedIn": "2.2.4.30",
    "ifixes": [
      "IV87981s7a.160825.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc",
    "filesets": [
      "bos.rte.lvm:6.1.9.0-6.1.9.101"
    ],
    "issued": "20161031",
    "updated": "null",
    "siblings": [
      "5300-12:IV88658",
      "6100-09:IV87981",
      "7100-03:IV88419",
      "7100-04:IV87640",
      "7200-00:IV88053"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar",
    "cvss": [
      "CVE-2016-6079:9.8"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02"
    ],
    "apAbstract": "Vulnerability in lsmcode affects AIX",
    "aparNo": "IV88007",
    "aparNoSet": [
      "CVE-2016-3053",
      "IV88007"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "IV88007s2a.161110.epkg.Z",
      "IV88007s0a.160913.epkg.Z",
      "IV88007s2a.160819.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc",
    "filesets": [
      "bos.rte.shell:7.1.4.0-7.1.4.1",
      "bos.rte.libc:7.1.4.0-7.1.4.1"
    ],
    "issued": "20161017",
    "updated": "20161111",
    "siblings": [
      "6100-09:IV87794",
      "7100-03:IV88457",
      "7100-04:IV88007",
      "7200-00:IV88042"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar",
    "cvss": [
      "CVE-2016-3053:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "Vulnerability in lsmcode affects AIX",
    "aparNo": "IV88042",
    "aparNoSet": [
      "CVE-2016-3053",
      "IV88042"
    ],
    "fixedIn": "7200-00-03",
    "ifixes": [
      "IV88042s2a.161110.epkg.Z",
      "IV88042s0a.160914.epkg.Z",
      "IV88042s2a.160819.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc",
    "filesets": [
      "bos.rte.shell:7.2.0.0-7.2.0.1",
      "bos.rte.libc:7.2.0.0-7.2.0.1"
    ],
    "issued": "20161017",
    "updated": "20161111",
    "siblings": [
      "6100-09:IV87794",
      "7100-03:IV88457",
      "7100-04:IV88007",
      "7200-00:IV88042"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar",
    "cvss": [
      "CVE-2016-3053:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "Vulnerability in lquerylv in LVM impacts AIX",
    "aparNo": "IV88053",
    "aparNoSet": [
      "CVE-2016-6079",
      "IV88053"
    ],
    "fixedIn": "7200-00-03",
    "ifixes": [
      "IV88053s2a.160825.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc",
    "filesets": [
      "bos.rte.lvm:7.2.0.0-7.2.0.1"
    ],
    "issued": "20161031",
    "updated": "null",
    "siblings": [
      "5300-12:IV88658",
      "6100-09:IV87981",
      "7100-03:IV88419",
      "7100-04:IV87640",
      "7200-00:IV88053"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar",
    "cvss": [
      "CVE-2016-6079:9.8"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "Malformed network packets can cause system crash",
    "aparNo": "IV88136",
    "aparNoSet": [
      "IV88136"
    ],
    "fixedIn": "7200-01-03",
    "ifixes": [
      "IV88136s2a.161215.AIX72TL00SP02.devices.ethernet.mlx.rte.epkg.Z",
      "IV88136s2b.161215.AIX72TL00SP02.devices.ethernet.lnc2.rte.epkg.Z",
      "IV88136s2c.161215.AIX72TL00SP02.devices.ethernet.shi.rte.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV88136",
    "filesets": [
      "devices.ethernet.shi.rte:7.2.0.0-7.2.0.2",
      "Devices.ethernet.mlx.rte:7.2.0.0-7.2.0.2",
      "devices.ethernet.lnc2.rte:7.2.0.0-7.2.0.2"
    ],
    "issued": "20160816",
    "updated": "20170106",
    "siblings": [
      "7100-03:IV88430",
      "7100-04:IV86787",
      "6100-09:IV85460"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv88136/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "Vulnerability in lquerylv in LVM impacts AIX",
    "aparNo": "IV88419",
    "aparNoSet": [
      "CVE-2016-6079",
      "IV88419"
    ],
    "fixedIn": "7100-03-08",
    "ifixes": [
      "IV88419s7a.160825.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc",
    "filesets": [
      "bos.rte.lvm:7.1.3.0-7.1.3.47"
    ],
    "issued": "20161031",
    "updated": "null",
    "siblings": [
      "5300-12:IV88658",
      "6100-09:IV87981",
      "7100-03:IV88419",
      "7100-04:IV87640",
      "7200-00:IV88053"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar",
    "cvss": [
      "CVE-2016-6079:9.8"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "Malformed network packets can cause system crash ",
    "aparNo": "IV88430",
    "aparNoSet": [
      "IV88430"
    ],
    "fixedIn": "7100-04-08",
    "ifixes": [
      "IV88430s7a.170105.AIX71TL03SP07.devices.ethernet.lnc2.rte.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV88430",
    "filesets": [
      "devices.ethernet.lnc2.rte:7.1.3.45-7.1.3.48"
    ],
    "issued": "20170106",
    "updated": "null",
    "siblings": [
      "6100-09:IV85460",
      "7100-04:IV86787",
      "7200-00:IV88136"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv88430/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "Vulnerability in lsmcode affects AIX",
    "aparNo": "IV88457",
    "aparNoSet": [
      "CVE-2016-3053",
      "IV88457"
    ],
    "fixedIn": "7100-03-08",
    "ifixes": [
      "IV88457s5a.160912.epkg.Z",
      "IV88457s6a.160912.epkg.Z",
      "IV88457s7a.160822.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_advisory2.asc",
    "filesets": [
      "bos.rte.shell:7.1.3.0-7.1.3.47",
      "bos.rte.libc:7.1.3.0-7.1.3.47"
    ],
    "issued": "20161017",
    "updated": "null",
    "siblings": [
      "6100-09:IV87794",
      "7100-03:IV88457",
      "7100-04:IV88007",
      "7200-00:IV88042"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lsmcode_fix2.tar",
    "cvss": [
      "CVE-2016-3053:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerability in lquerylv in LVM impacts AIX",
    "aparNo": "IV88658",
    "aparNoSet": [
      "CVE-2016-6079",
      "IV88658"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV88658s9a.160825.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_advisory.asc",
    "filesets": [
      "bos.rte.lvm:5.3.12.0-5.3.12.8"
    ],
    "issued": "20161031",
    "updated": "null",
    "siblings": [
      "5300-12:IV88658",
      "6100-09:IV87981",
      "7100-03:IV88419",
      "7100-04:IV87640",
      "7200-00:IV88053"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/lquerylv_fix.tar",
    "cvss": [
      "CVE-2016-6079:9.8"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.20",
      "2.2.4.21",
      "2.2.4.22",
      "2.2.4.23"
    ],
    "apAbstract": "POTENTIAL DATA LOSS IN VIOS SSP WITH AN UN-INITIALIZED THICK LU",
    "aparNo": "IV89070",
    "aparNoSet": [
      "IV89070"
    ],
    "fixedIn": "2.2.4.30",
    "ifixes": [
      "IV89070s7a.161005.VIOS.2.2.4.20.epkg.Z",
      "IV89070s7a.161005.VIOS.2.2.4.21.epkg.Z",
      "IV89070s7b.161005.VIOS.2.2.4.22.epkg.Z",
      "IV89070s7b.161005.VIOS.2.2.4.23.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV89070",
    "filesets": [
      "pool.basic.rte:6.1.9.101-6.1.9.103"
    ],
    "issued": "20161015",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv89070/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "Vulnerability in Tivoli LWI impacts pConsole and WebSM for AIX",
    "aparNo": "IV89385",
    "aparNoSet": [
      "CVE-2016-6038",
      "IV89385"
    ],
    "fixedIn": "7100-03-08",
    "ifixes": [
      "IV89385s7a.160927.epkg.Z",
      "IV89385s7a.160927.epkg.Z",
      "IV89385s7a.160927.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory.asc",
    "filesets": [
      "lwi.runtime:7.1.3.0-7.1.3.7"
    ],
    "issued": "20160922",
    "updated": "20160930",
    "siblings": [
      "5300-12:IV89386",
      "6100-09:IV89418",
      "7100-03:IV89385"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix.tar",
    "cvss": [
      "CVE-2016-6038:6.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07",
      "7100-03-08"
    ],
    "apAbstract": "Vulnerability in pConsole impacts AIX",
    "aparNo": "IV89737",
    "aparNoSet": [
      "CVE-2016-0266",
      "IV89737"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc",
    "filesets": [
      "sysmgt.pconsole.rte:7.1.3.0-7.1.3.99"
    ],
    "issued": "20161202",
    "updated": "null",
    "siblings": [
      "6100-09:IV89739",
      "7100-04:IV89737"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar",
    "cvss": [
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02"
    ],
    "apAbstract": "Vulnerability in pConsole impacts AIX",
    "aparNo": "IV89737",
    "aparNoSet": [
      "CVE-2016-0266",
      "IV89737"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "IV89737s2a.161024.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc",
    "filesets": [
      "sysmgt.pconsole.rte:7.1.4.0"
    ],
    "issued": "20161202",
    "updated": "null",
    "siblings": [
      "6100-09:IV89739",
      "7100-04:IV89737"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar",
    "cvss": [
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02"
    ],
    "apAbstract": "pConsole on AIX does not support TLS 1.2.",
    "aparNo": "IV89737",
    "aparNoSet": [
      "CVE-2016-0266",
      "IV89737"
    ],
    "fixedIn": "7100-04-03",
    "ifixes": [
      "IV89737s2a.161024.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc",
    "filesets": [
      "sysmgt.pconsole.rte:7.1.4.0-7.1.4.0"
    ],
    "issued": "20161202",
    "updated": "null",
    "siblings": [
      "6100-09:IV89739"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar",
    "cvss": [
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "Vulnerability in pConsole impacts AIX",
    "aparNo": "IV89739",
    "aparNoSet": [
      "CVE-2016-0266",
      "IV89739"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV89739s7a.161024.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc",
    "filesets": [
      "sysmgt.pconsole.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20161202",
    "updated": "null",
    "siblings": [
      "6100-09:IV89739",
      "7100-04:IV89737"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar",
    "cvss": [
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-06",
      "6100-09-07"
    ],
    "apAbstract": "pConsole on AIX does not support TLS 1.2.",
    "aparNo": "IV89739",
    "aparNoSet": [
      "CVE-2016-0266",
      "IV89739"
    ],
    "fixedIn": "6100-09-08",
    "ifixes": [
      "IV89739s7a.161024.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_advisory2.asc",
    "filesets": [
      "sysmgt.pconsole.rte:6.1.9.0-6.1.9.100"
    ],
    "issued": "20161202",
    "updated": "null",
    "siblings": [
      "7100-04:IV89737"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/pconsole_fix2.tar",
    "cvss": [
      "CVE-2016-0266:3.7"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07",
      "6100-09-08"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "IV89828",
    "aparNoSet": [
      "CVE-2016-2775",
      "CVE-2016-2776",
      "IV89828"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV89828m5a.161017.epkg.Z",
      "IV89828m6a.161013.epkg.Z",
      "IV89828m7a.161013.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.200",
      "bos.net.tcp.server:6.1.9.0-6.1.9.200"
    ],
    "issued": "20161118",
    "updated": "null",
    "siblings": [
      "5300-12:IV90056",
      "6100-09:IV89828",
      "7100-03:IV89830",
      "7100-04:IV89829",
      "7200-00:IV89831"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar",
    "cvss": [
      "CVE-2016-2776:7.5",
      "CVE-2016-2775:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50",
      "2.2.3.60",
      "2.2.3.70",
      "2.2.3.80",
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.21",
      "2.2.4.22",
      "2.2.4.23",
      "2.2.4.30",
      "2.2.5.0",
      "2.2.5.10"
    ],
    "apAbstract": "Vulnerabilities in BIND impact VIOS",
    "aparNo": "IV89828",
    "aparNoSet": [
      "CVE-2016-2775",
      "CVE-2016-2776",
      "IV89828"
    ],
    "fixedIn": "2.2.5.20",
    "ifixes": [
      "IV89828m7a.161013.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.200",
      "bos.net.tcp.server:6.1.9.0-6.1.9.200"
    ],
    "issued": "20161118",
    "updated": "null",
    "siblings": [
      "5300-12:IV90056",
      "6100-09:IV89828",
      "7100-03:IV89830",
      "7100-04:IV89829",
      "7200-00:IV89831"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar",
    "cvss": [
      "CVE-2016-2776:7.5",
      "CVE-2016-2775:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "IV89829",
    "aparNoSet": [
      "CVE-2016-2775",
      "CVE-2016-2776",
      "IV89829"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV89829m1a.161013.epkg.Z",
      "IV89829m2a.161010.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.30",
      "bos.net.tcp.server:7.1.4.0-7.1.4.30"
    ],
    "issued": "20161118",
    "updated": "null",
    "siblings": [
      "5300-12:IV90056",
      "6100-09:IV89828",
      "7100-03:IV89830",
      "7100-04:IV89829",
      "7200-00:IV89831"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar",
    "cvss": [
      "CVE-2016-2776:7.5",
      "CVE-2016-2775:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07",
      "7100-03-08"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "IV89830",
    "aparNoSet": [
      "CVE-2016-2775",
      "CVE-2016-2776",
      "IV89830"
    ],
    "fixedIn": "7100-03-09",
    "ifixes": [
      "IV89830m5a.161010.epkg.Z",
      "IV89830m6d.161012.epkg.Z",
      "IV89830m7a.161013.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.48",
      "bos.net.tcp.server:7.1.3.0-7.1.3.48"
    ],
    "issued": "20161118",
    "updated": "null",
    "siblings": [
      "5300-12:IV90056",
      "6100-09:IV89828",
      "7100-03:IV89830",
      "7100-04:IV89829",
      "7200-00:IV89831"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar",
    "cvss": [
      "CVE-2016-2776:7.5",
      "CVE-2016-2775:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "IV89831",
    "aparNoSet": [
      "CVE-2016-2775",
      "CVE-2016-2776",
      "IV89831"
    ],
    "fixedIn": "7200-00-03",
    "ifixes": [
      "IV89831m1a.161017.epkg.Z",
      "IV89831m2a.161018.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc",
    "filesets": [
      "bos.net.tcp.bind:7.2.0.0",
      "bos.net.tcp.bind_utils:7.2.0.0-7.2.0.1"
    ],
    "issued": "20161118",
    "updated": "null",
    "siblings": [
      "5300-12:IV90056",
      "6100-09:IV89828",
      "7100-03:IV89830",
      "7100-04:IV89829",
      "7200-00:IV89831"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar",
    "cvss": [
      "CVE-2016-2776:7.5",
      "CVE-2016-2775:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-00",
      "5300-12-01",
      "5300-12-02",
      "5300-12-03",
      "5300-12-04",
      "5300-12-05",
      "5300-12-06",
      "5300-12-07",
      "5300-12-08",
      "5300-12-09"
    ],
    "apAbstract": "Vulnerabilities in BIND impact AIX",
    "aparNo": "IV90056",
    "aparNoSet": [
      "CVE-2016-2775",
      "CVE-2016-2776",
      "IV90056"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV90056m9a.161020.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory13.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10",
      "bos.net.tcp.server:5.3.12.0-5.3.12.6"
    ],
    "issued": "20161118",
    "updated": "null",
    "siblings": [
      "5300-12:IV90056",
      "6100-09:IV89828",
      "7100-03:IV89830",
      "7100-04:IV89829",
      "7200-00:IV89831"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix13.tar",
    "cvss": [
      "CVE-2016-2776:7.5",
      "CVE-2016-2775:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00"
    ],
    "apAbstract": "There is a vulnerability in sysproc that impacts AIX.",
    "aparNo": "IV90234",
    "aparNoSet": [
      "CVE-2016-8944",
      "IV90234"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV90234s0a.161212.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.1.0-7.2.1.0"
    ],
    "issued": "20170130",
    "updated": "null",
    "siblings": [
      "7200-00:IV91456",
      "7100-03:IV91488",
      "7100-04:IV91487"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar",
    "cvss": [
      "CVE-2016-8944:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-01",
      "7100-04-02",
      "7100-04-03",
      "7100-04-04"
    ],
    "apAbstract": "POWERHA NODE FAILURE DURING AIX UPDATE",
    "aparNo": "IV90451",
    "aparNoSet": [
      "IV90451"
    ],
    "fixedIn": "7100-04-05",
    "ifixes": [
      "IV90451m1a.161110.71TL4SP1.epkg.Z",
      "IV90451s0a.161108.71TL4SP2-4.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV90451",
    "filesets": [
      "rsct.basic.rte:3.2.1.1-3.2.1.11"
    ],
    "issued": "20161111",
    "updated": "20170411",
    "siblings": [
      "7200-00:IV90451",
      "7200-01:IV90485"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv90451/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02",
      "7200-00-03"
    ],
    "apAbstract": "POWERHA NODE FAILURE DURING AIX UPDATE",
    "aparNo": "IV90451",
    "aparNoSet": [
      "IV90451"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV90451m1a.161110.72TL0SP1.epkg.Z",
      "IV90451s0a.161108.72TL0SP2-3.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV90451",
    "filesets": [
      "rsct.basic.rte:3.2.1.0-3.2.1.11"
    ],
    "issued": "20161111",
    "updated": "null",
    "siblings": [
      "7200-01:IV90485",
      "7100-04:IV90451"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv90451/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02"
    ],
    "apAbstract": "POWERHA NODE FAILURE DURING AIX UPDATE",
    "aparNo": "IV90485",
    "aparNoSet": [
      "IV90485"
    ],
    "fixedIn": "7200-01-03",
    "ifixes": [
      "IV90451m1a.161110.72TL0SP1.epkg.Z",
      "IV90451s0a.161108.72TL0SP2-4.epkg.Z",
      "IV90485s0a.161104.72TL1SP0-2.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV90485",
    "filesets": [
      "rsct.basic.rte:3.2.2.0-3.2.2.0"
    ],
    "issued": "20161111",
    "updated": "20170411",
    "siblings": [
      "7200-00:IV90451",
      "7100-04:IV90451"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv90485/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "Potential data loss using Virtual FC with num_cmd_elems greater than 256",
    "aparNo": "IV90915",
    "aparNoSet": [
      "IV90915"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV90915s1a.161214.71TL04SP00-01.epkg.Z",
      "IV90915s2a.161205.71TL04SP02.epkg.Z",
      "IV90915s3a.161219.71TL04SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV90915",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.1.4.0-7.1.4.30"
    ],
    "issued": "20170202",
    "updated": "null",
    "siblings": [
      "6100-09:IV91199",
      "7100-03:IV91042",
      "7200-00:IV92284",
      "7200-01:IV91511"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv90915/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-08"
    ],
    "apAbstract": "CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK\u003dYES",
    "aparNo": "IV91004",
    "aparNoSet": [
      "IV91004"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV91004s8a.161125.AIX61TL09SP08.epkg.Z",
      "IV91004s8a.161125.61TL09SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91004",
    "filesets": [
      "devices.vdevice.IBM.l-lan.rte:6.1.9.200"
    ],
    "issued": "20161206",
    "updated": "null",
    "siblings": [
      "7200-01:IV91020",
      "7100-04:IV91019"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91004/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-06",
      "6100-09-07",
      "6100-09-08"
    ],
    "apAbstract": "Vulnerability in bellmail affects AIX",
    "aparNo": "IV91006",
    "aparNoSet": [
      "CVE-2016-8972",
      "IV91006"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV91006s8a.161125.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.200"
    ],
    "issued": "20161215",
    "updated": "null",
    "siblings": [
      "7100-03:IV91007",
      "7100-04:IV91008",
      "7200-00:IV91010",
      "7200-01:IV91011"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar",
    "cvss": [
      "CVE-2016-8972:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2:: 2.2.3.3",
      "2.2.3.4",
      "2.2.3.50",
      "2.2.3.60",
      "2.2.3.70",
      "2.2.3.80",
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.21",
      "2.2.4.22",
      "2.2.4.23",
      "2.2.4.30",
      "2.2.5.0",
      "2.2.5.10"
    ],
    "apAbstract": "Vulnerability in bellmail affects VIOS",
    "aparNo": "IV91006",
    "aparNoSet": [
      "CVE-2016-8972",
      "IV91006"
    ],
    "fixedIn": "2.2.5.20",
    "ifixes": [
      "IV91006s8a.161125.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.200"
    ],
    "issued": "20161215",
    "updated": "null",
    "siblings": [
      "7100-03:IV91007",
      "7100-04:IV91008",
      "7200-00:IV91010",
      "7200-01:IV91011"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar",
    "cvss": [
      "CVE-2016-8972:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "Vulnerability in bellmail affects AIX",
    "aparNo": "IV91007",
    "aparNoSet": [
      "CVE-2016-8972",
      "IV91007"
    ],
    "fixedIn": "7100-03-08",
    "ifixes": [
      "IV91008s3a.161125.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.47"
    ],
    "issued": "20161215",
    "updated": "null",
    "siblings": [
      "6100-09:IV91006",
      "7100-04:IV91008",
      "7200-00:IV91010",
      "7200-01:IV91011"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar",
    "cvss": [
      "CVE-2016-8972:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "Vulnerability in bellmail affects AIX",
    "aparNo": "IV91008",
    "aparNoSet": [
      "CVE-2016-8972",
      "IV91008"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV91008s3a.161125.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.30"
    ],
    "issued": "20161215",
    "updated": "null",
    "siblings": [
      "6100-09:IV91006",
      "7100-03:IV91007",
      "7200-00:IV91010",
      "7200-01:IV91011"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar",
    "cvss": [
      "CVE-2016-8972:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01"
    ],
    "apAbstract": "Vulnerability in bellmail affects AIX",
    "aparNo": "IV91010",
    "aparNoSet": [
      "CVE-2016-8972",
      "IV91010"
    ],
    "fixedIn": "7200-00-02",
    "ifixes": [
      "IV91010s2a.161125.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.0.0-7.2.0.1"
    ],
    "issued": "20161215",
    "updated": "null",
    "siblings": [
      "6100-09:IV91006",
      "7100-03:IV91007",
      "7100-04:IV91008",
      "7200-00:IV91010",
      "7200-01:IV91011"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar",
    "cvss": [
      "CVE-2016-8972:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "Vulnerability in bellmail affects AIX",
    "aparNo": "IV91011",
    "aparNoSet": [
      "CVE-2016-8972",
      "IV91011"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV91011s1a.161125.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.1.0-7.2.1.0"
    ],
    "issued": "20161215",
    "updated": "null",
    "siblings": [
      "6100-09:IV91006",
      "7100-03:IV91007",
      "7100-04:IV91008",
      "7200-00:IV91010"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix.tar",
    "cvss": [
      "CVE-2016-8972:8.4"
    ],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-03"
    ],
    "apAbstract": "CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK\u003dYES",
    "aparNo": "IV91019",
    "aparNoSet": [
      "IV91019"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV91019s3a.161125.71TL04SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91019",
    "filesets": [
      "devices.vdevice.IBM.l-lan.rte:7.1.4.30"
    ],
    "issued": "20161206",
    "updated": "null",
    "siblings": [
      "7200-01:IV91020",
      "7100-04:IV91019",
      "6100-09:IV91004"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91019/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "CRASH IN VIOENT_INIT_LS_TIMER WHEN POLL_UPLINK\u003dYES",
    "aparNo": "IV91020",
    "aparNoSet": [
      "IV91020"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV91020s0a.161125.72TL01SP00.epkg.Z",
      "IV91020s0a.161125.72TL01SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91020",
    "filesets": [
      "devices.vdevice.IBM.l-lan.rte:7.2.1.0"
    ],
    "issued": "20161206",
    "updated": "null",
    "siblings": [
      "6100-09:IV91004",
      "7100-04:IV91019"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91020/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-07",
      "7100-03-08"
    ],
    "apAbstract": "Potential data loss using Virtual FC with num_cmd_elems greater than 256",
    "aparNo": "IV91042",
    "aparNoSet": [
      "IV91042"
    ],
    "fixedIn": "7100-03-09",
    "ifixes": [
      "IV91042s7a.170125.71TL03SP07.epkg.Z",
      "IV91042s8a.170201.71TL03SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91042",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.1.3.46-7.1.3.47"
    ],
    "issued": "20170202",
    "updated": "null",
    "siblings": [
      "6100-09:IV91199",
      "7100-04:IV90915",
      "7200-00:IV92284",
      "7200-01:IV91511"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91042/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-06",
      "6100-09-07",
      "6100-09-08"
    ],
    "apAbstract": "Potential data loss using Virtual FC with num_cmd_elems greater than 256",
    "aparNo": "IV91199",
    "aparNoSet": [
      "IV91199"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV91199s8a.170120.61TL09SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91199",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:6.1.9.100-6.1.9.200"
    ],
    "issued": "20170202",
    "updated": "null",
    "siblings": [
      "7100-03:IV91042",
      "7100-04:IV90915",
      "7200-00:IV92284",
      "7200-01:IV91511"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91199/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "There are two vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV91214",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91214"
    ],
    "fixedIn": "7100-03-09",
    "ifixes": [
      "IV91214m4b.161209.epkg.Z",
      "IV91214m5b.161209.epkg.Z",
      "IV91214m6a.161209.epkg.Z",
      "IV91214m7b.170202.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.48"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "7200-01:IV91257",
      "5300-12:IV91253",
      "7200-00:IV91256",
      "7100-04:IV91255",
      "6100-09:IV91254"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "There are two vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV91253",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91253"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IV91253m9b.161209.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "7200-01:IV91257",
      "7200-00:IV91256",
      "7100-03:IV91214",
      "7100-04:IV91255",
      "6100-09:IV91254"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-06",
      "6100-09-07",
      "6100-09-08"
    ],
    "apAbstract": "There are two vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV91254",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91254"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV91254m6b.161213.epkg.Z",
      "IV91254m7b.161209.epkg.Z",
      "IV91254m8b.161209.epkg.z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.200"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "7200-01:IV91257",
      "5300-12:IV91253",
      "7200-00:IV91256",
      "7100-03:IV91214",
      "7100-04:IV91255"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "There are two vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV91255",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91255"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV91255m1b.161213.epkg.Z",
      "IV91255m2a.161213.epkg.Z",
      "IV91255m3c.161213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.30"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "7200-01:IV91257",
      "5300-12:IV91253",
      "7200-00:IV91256",
      "7100-03:IV91214",
      "6100-09:IV91254"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "There are two vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV91256",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91256"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV91256m1b.161212.epkg.Z",
      "IV91256m2b.161209.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.0.0-7.2.0.2"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "7200-01:IV91257",
      "5300-12:IV91253",
      "7100-03:IV91214",
      "7100-04:IV91255",
      "6100-09:IV91254"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "There are two vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV91257",
    "aparNoSet": [
      "CVE-2016-2848",
      "CVE-2016-8864",
      "IV91257"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV91257m0a.161212.epkg.Z",
      "IV91257m1a.161213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory14.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.1.0-7.2.1.0"
    ],
    "issued": "20161215",
    "updated": "20161229",
    "siblings": [
      "5300-12:IV91253",
      "7200-00:IV91256",
      "7100-03:IV91214",
      "7100-04:IV91255",
      "6100-09:IV91254"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix14.tar",
    "cvss": [
      "CVE-2016-8864:7.5",
      "CVE-2016-2848:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.1",
      "2.2.3.2",
      "2.2.3.3",
      "2.2.3.4",
      "2.2.3.50",
      "2.2.3.51",
      "2.2.3.52",
      "2.2.3.60",
      "2.2.3.70",
      "2.2.3.80"
    ],
    "apAbstract": "possible data corruption after LPM failure",
    "aparNo": "IV91339",
    "aparNoSet": [
      "IV91339"
    ],
    "fixedIn": "2.2.3.90",
    "ifixes": [
      "IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z",
      "IV91339s7b.170112.VIOS2.2.3.70.epkg.Z",
      "IV91339s8b.170118.VIOS2.2.5.10.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91339",
    "filesets": [
      "devices.vdevice.IBM.v-scsi-host.rte:6.1.9.0-6.1.9.48"
    ],
    "issued": "20161207",
    "updated": "20170119",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91339/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.21",
      "2.2.4.22",
      "2.2.4.23",
      "2.2.4.30"
    ],
    "apAbstract": "possible data corruption after LPM failure",
    "aparNo": "IV91339",
    "aparNoSet": [
      "IV91339"
    ],
    "fixedIn": "2.2.4.40",
    "ifixes": [
      "IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z",
      "IV91339s7b.170112.VIOS2.2.3.70.epkg.Z",
      "IV91339s8b.170118.VIOS2.2.5.10.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91339",
    "filesets": [
      "devices.vdevice.IBM.v-scsi-host.rte:6.1.9.100-6.1.9.102"
    ],
    "issued": "20161207",
    "updated": "20170119",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91339/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.0",
      "2.2.5.10"
    ],
    "apAbstract": "possible data corruption after LPM failure ",
    "aparNo": "IV91339",
    "aparNoSet": [
      "IV91339"
    ],
    "fixedIn": "2.2.5.20",
    "ifixes": [
      "IV91339s7a.170110.VIOS2.2.4.2x.epkg.Z",
      "IV91339s7b.170112.VIOS2.2.3.70.epkg.Z",
      "IV91339s8b.170118.VIOS2.2.5.10.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91339",
    "filesets": [
      "devices.vdevice.IBM.v-scsi-host.rte:6.1.9.200"
    ],
    "issued": "20161207",
    "updated": "20170119",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91339/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-03"
    ],
    "apAbstract": "getsockname() returns incorrect NameLength",
    "aparNo": "IV91431",
    "aparNoSet": [
      "IV91431"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV91431s3a.161209.71TL04SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91431",
    "filesets": [
      "bos.mp64:7.1.4.30"
    ],
    "issued": "20161209",
    "updated": "null",
    "siblings": [
      "7200-00:IV91432"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91431/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "getsockname() returns incorrect NameLength",
    "aparNo": "IV91432",
    "aparNoSet": [
      "IV91432"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV91432s1a.161209.72TL01SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91432",
    "filesets": [
      "bos.mp64:7.2.1.0-7.2.1.1"
    ],
    "issued": "20161209",
    "updated": "null",
    "siblings": [
      "7100-04:IV91431"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91432/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "There is a vulnerability in sysproc that impacts AIX.",
    "aparNo": "IV91456",
    "aparNoSet": [
      "CVE-2016-8944",
      "IV91456"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV91456s0a.161212.epkg.Z",
      "IV91456s1a.161212.epkg.Z",
      "IV91456s2a.161212.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc",
    "filesets": [
      "bos.mp64:7.2.0.0-7.2.0.1"
    ],
    "issued": "20170130",
    "updated": "null",
    "siblings": [
      "7200-01:IV90234",
      "7100-03:IV91488",
      "7100-04:IV91487"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar",
    "cvss": [
      "CVE-2016-8944:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "There is a vulnerability in sysproc that impacts AIX.",
    "aparNo": "IV91487",
    "aparNoSet": [
      "CVE-2016-8944",
      "IV91487"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV91487s1a.161212.epkg.Z",
      "IV91487s2a.161213.epkg.Z",
      "IV91487s3a.161213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.4.0-7.1.4.30"
    ],
    "issued": "20170130",
    "updated": "null",
    "siblings": [
      "7200-01:IV90234",
      "7200-00:IV91456",
      "7100-03:IV91488"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar",
    "cvss": [
      "CVE-2016-8944:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "There is a vulnerability in sysproc that impacts AIX.",
    "aparNo": "IV91488",
    "aparNoSet": [
      "CVE-2016-8944",
      "IV91488"
    ],
    "fixedIn": "7100-03-09",
    "ifixes": [
      "IV91488s5a.161212.epkg.Z",
      "IV91488s6a.161212.epkg.Z",
      "IV91488s7a.161213.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_advisory.asc",
    "filesets": [
      "bos.mp64:7.1.3.0-7.1.3.48"
    ],
    "issued": "20170130",
    "updated": "null",
    "siblings": [
      "7200-01:IV90234",
      "7200-00:IV91456",
      "7100-04:IV91487"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/sysproc_fix.tar",
    "cvss": [
      "CVE-2016-8944:6.2"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "Potential data loss using Virtual FC with num_cmd_elems greater than 256",
    "aparNo": "IV91511",
    "aparNoSet": [
      "IV91511"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV91511s1a.161214.72TL01SP00-01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91511",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.2.1.0-7.2.1.0"
    ],
    "issued": "20170202",
    "updated": "null",
    "siblings": [
      "6100-09:IV91199",
      "7100-03:IV91042",
      "7100-04:IV90915",
      "7200-00:IV92284"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91511/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-06",
      "6100-09-06",
      "6100-09-07",
      "6100-09-08"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV91803",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV91803"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV91803m6a.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.200"
    ],
    "issued": "20170213",
    "updated": "20170217",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-06",
      "6100-09-07",
      "6100-09-08"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV91803",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV91803"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV91803m6a.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.200"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "Possible data loss with CAPI adapter after EEH",
    "aparNo": "IV91922",
    "aparNoSet": [
      "IV91922"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV91922s1a.170202.72TL01SP00-01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV91922",
    "filesets": [
      "devices.capi.1410f0041410f004.com:7.2.1.0"
    ],
    "issued": "20170210",
    "updated": "null",
    "siblings": [
      "7200-00:IV92666"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv91922/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV91951",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV91951"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV91951m3a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.30"
    ],
    "issued": "20170213",
    "updated": "20170217",
    "siblings": [
      "7200-00:IV92192",
      "7100-03:IV92193",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV91951",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV91951"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV91951m3a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.30"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92067",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92067"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV92067s1a.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "bos.net.tcp.ntpd:7.2.1.0-7.2.1.0"
    ],
    "issued": "20170213",
    "updated": "20170217",
    "siblings": [
      "7100-04:IV91951",
      "6100-09:IV91803",
      "5300-12:IV92194"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07",
      "7100-03-08"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92126",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92126"
    ],
    "fixedIn": "7100-03-09",
    "ifixes": [
      "IV92126m3a.170106.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:7.1.0.0-7.1.0.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-00-00",
      "7100-00-01",
      "7100-00-02",
      "7100-00-03",
      "7100-00-04",
      "7100-00-05",
      "7100-00-06",
      "7100-00-07",
      "7100-00-08",
      "7100-00-09",
      "7100-00-10"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92126",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92126"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:7.1.0.0-7.1.0.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "See Bulletin",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-01-00",
      "7100-01-01",
      "7100-01-02",
      "7100-01-03",
      "7100-01-04",
      "7100-01-05",
      "7100-01-06",
      "7100-01-07",
      "7100-01-08",
      "7100-01-09",
      "7100-01-10"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92126",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92126"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:7.1.0.0-7.1.0.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "See Bulletin",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-02-00",
      "7100-02-01",
      "7100-02-02",
      "7100-02-03",
      "7100-02-04",
      "7100-02-05",
      "7100-02-06",
      "7100-02-07"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92126",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92126"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:7.1.0.0-7.1.0.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "See Bulletin",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92126",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92126"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV92126m3a.170106.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:7.1.0.0-7.1.0.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92126",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92126"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV92126m3a.170106.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:7.1.0.0-7.1.0.7"
    ],
    "issued": "20170213",
    "updated": "20170217",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92126",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92126"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV92126m3a.170106.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:7.1.0.0-7.1.0.7"
    ],
    "issued": "20170213",
    "updated": "20170217",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92192",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92192"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV92192m2a.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "bos.net.tcp.ntp:7.2.0.0-7.2.0.2",
      "bos.net.tcp.ntpd:7.2.0.0-7.2.0.2"
    ],
    "issued": "20170213",
    "updated": "20170217",
    "siblings": [
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-05",
      "7100-03-06",
      "7100-03-07",
      "7100-03-08"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92193",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92193"
    ],
    "fixedIn": "7100-03-09",
    "ifixes": [
      "IV92193m5a.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.48"
    ],
    "issued": "20170213",
    "updated": "20170217",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92194",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92194"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IV92194m9a.170113.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20170213",
    "updated": "20170217",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "There is a vulnerability in bellmail that impacts AIX.",
    "aparNo": "IV92240",
    "aparNoSet": [
      "CVE-2017-1093",
      "IV92240"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV92240m3a.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.30"
    ],
    "issued": "20170129",
    "updated": "null",
    "siblings": [
      "7200-01:IV92242",
      "7200-00:IV92241",
      "7100-03:IV92250"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar",
    "cvss": [
      "CVE-2017-1093:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02"
    ],
    "apAbstract": "There is a vulnerability in bellmail that impacts AIX.",
    "aparNo": "IV92241",
    "aparNoSet": [
      "CVE-2017-1093",
      "IV92241"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV92241m2a.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.0.0-7.2.0.2"
    ],
    "issued": "20170129",
    "updated": "null",
    "siblings": [
      "7200-01:IV92242",
      "7100-03:IV92250",
      "7100-04:IV92240"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar",
    "cvss": [
      "CVE-2017-1093:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "There is a vulnerability in bellmail that impacts AIX.",
    "aparNo": "IV92242",
    "aparNoSet": [
      "CVE-2017-1093",
      "IV92242"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV92242m1a.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.1.0"
    ],
    "issued": "20170129",
    "updated": "null",
    "siblings": [
      "7200-00:IV92241",
      "7100-03:IV92250",
      "7100-04:IV92240"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar",
    "cvss": [
      "CVE-2017-1093:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-05",
      "7100-03-06",
      "7100-03-07"
    ],
    "apAbstract": "There is a vulnerability in bellmail that impacts AIX.",
    "aparNo": "IV92250",
    "aparNoSet": [
      "CVE-2017-1093",
      "IV92250"
    ],
    "fixedIn": "7100-03-09",
    "ifixes": [
      "IV92250m71.170112.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_advisory2.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.48"
    ],
    "issued": "20170129",
    "updated": "null",
    "siblings": [
      "7200-01:IV92242",
      "7200-00:IV92241",
      "7100-04:IV92240"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bellmail_fix2.tar",
    "cvss": [
      "CVE-2017-1093:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02",
      "7200-00-03"
    ],
    "apAbstract": "Potential data loss using Virtual FC with num_cmd_elems greater than 256",
    "aparNo": "IV92284",
    "aparNoSet": [
      "IV92284"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV92284s2a.170116.72TL00SP00-02.epkg.Z",
      "IV92284s3a.170116.72TL00SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV92284",
    "filesets": [
      "devices.vdevice.IBM.vfc-client.rte:7.2.0.0-7.2.0.1"
    ],
    "issued": "20170202",
    "updated": "null",
    "siblings": [
      "6100-09:IV91199",
      "7100-03:IV91042",
      "7100-04:IV90915",
      "7200-01:IV91511"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv92284/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-00-00",
      "6100-00-01",
      "6100-00-02",
      "6100-00-03",
      "6100-00-04",
      "6100-00-05",
      "6100-00-06",
      "6100-00-07",
      "6100-00-08",
      "6100-00-09",
      "6100-00-10",
      "6100-00-11"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92287",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92287"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV92287m5a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-01-00",
      "6100-01-01",
      "6100-01-02",
      "6100-01-03",
      "6100-01-04",
      "6100-01-05",
      "6100-01-06",
      "6100-01-07",
      "6100-01-08",
      "6100-01-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92287",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92287"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV92287m5a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-02-00",
      "6100-02-01",
      "6100-02-02",
      "6100-02-03",
      "6100-02-04",
      "6100-02-05",
      "6100-02-06",
      "6100-02-07",
      "6100-02-08",
      "6100-02-09",
      "6100-02-10"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92287",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92287"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV92287m5a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-03-00",
      "6100-03-01",
      "6100-03-02",
      "6100-03-03",
      "6100-03-04",
      "6100-03-05",
      "6100-03-06",
      "6100-03-07",
      "6100-03-08",
      "6100-03-09",
      "6100-03-10"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92287",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92287"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV92287m5a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-04-00",
      "6100-04-01",
      "6100-04-02",
      "6100-04-03",
      "6100-04-04",
      "6100-04-05",
      "6100-04-06",
      "6100-04-07",
      "6100-04-08",
      "6100-04-09",
      "6100-04-10",
      "6100-04-11"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92287",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92287"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV92287m5a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-05-00",
      "6100-05-01",
      "6100-05-02",
      "6100-05-03",
      "6100-05-04",
      "6100-05-05",
      "6100-05-06",
      "6100-05-07",
      "6100-05-08",
      "6100-05-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92287",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92287"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV92287m5a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10",
      "6100-06-11",
      "6100-06-12"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92287",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92287"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV92287m5a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-07-00",
      "6100-07-01",
      "6100-07-02",
      "6100-07-03",
      "6100-07-04",
      "6100-07-05",
      "6100-07-06",
      "6100-07-07",
      "6100-07-08",
      "6100-07-09",
      "6100-07-10"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92287",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92287"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV92287m5a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-08-00",
      "6100-08-01",
      "6100-08-02",
      "6100-08-03",
      "6100-08-04",
      "6100-08-05",
      "6100-08-06",
      "6100-08-07"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92287",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92287"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV92287m5a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07",
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV92287",
    "aparNoSet": [
      "CVE-2016-7427",
      "CVE-2016-7428",
      "CVE-2016-9310",
      "CVE-2016-9311",
      "IV92287"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV92287m5a.170113.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory8.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.7"
    ],
    "issued": "20170213",
    "updated": "null",
    "siblings": [
      "7200-00:IV92192",
      "7100-04:IV91951",
      "6100-09:IV91803"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix8.tar",
    "cvss": [
      "CVE-2016-7427:4",
      "CVE-2016-7428:4.3",
      "CVE-2016-9310:6.5",
      "CVE-2016-9311:4.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02",
      "7200-00-03"
    ],
    "apAbstract": "Possible data loss with CAPI adapter after EEH",
    "aparNo": "IV92666",
    "aparNoSet": [
      "IV92666"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV92666s2a.170201.72TL00SP02.epkg.Z",
      "IV92666s3a.170202.72TL00SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV92666",
    "filesets": [
      "devices.capi.1410f0041410f004.com:7.2.0.0-7.2.0.3"
    ],
    "issued": "20170210",
    "updated": "null",
    "siblings": [
      "7200-01:IV91922"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv92666/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02"
    ],
    "apAbstract": "CRASH OR POTENTIAL DATA LOSS AFTER REMOVING LARGE JFS2 FILES ON AIX 7.2.1",
    "aparNo": "IV93320",
    "aparNoSet": [
      "IV93320"
    ],
    "fixedIn": "7200-01-03",
    "ifixes": [
      "IV93320s0c.170411.72TL01SP00.epkg.Z",
      "IV93320s1e.170411.72TL01SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93320",
    "filesets": [
      "bos.mp64:7.2.1.0-7.2.1.3"
    ],
    "issued": "20170413",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93320/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-06",
      "6100-09-07",
      "6100-09-08"
    ],
    "apAbstract": "There is a vulnerability in BIND that impacts AIX.",
    "aparNo": "IV93361",
    "aparNoSet": [
      "CVE-2016-9131",
      "IV93361"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV93361m8a.170215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.200"
    ],
    "issued": "20170307",
    "updated": "null",
    "siblings": [
      "7200-01:IV93365",
      "5300-12:IV93366",
      "7200-00:IV93403",
      "7100-03:IV93362",
      "7100-04:IV93363"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar",
    "cvss": [
      "CVE-2016-9131:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-06",
      "7100-03-07",
      "7100-03-08"
    ],
    "apAbstract": "There is a vulnerability in BIND that impacts AIX.",
    "aparNo": "IV93362",
    "aparNoSet": [
      "CVE-2016-9131",
      "IV93362"
    ],
    "fixedIn": "7100-03-09",
    "ifixes": [
      "IV93362m8a.170215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.48"
    ],
    "issued": "20170307",
    "updated": "null",
    "siblings": [
      "7200-01:IV93365",
      "5300-12:IV93366",
      "7200-00:IV93403",
      "7100-04:IV93363",
      "6100-09:IV93361"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar",
    "cvss": [
      "CVE-2016-9131:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-01",
      "7100-04-02",
      "7100-04-03"
    ],
    "apAbstract": "There is a vulnerability in BIND that impacts AIX.",
    "aparNo": "IV93363",
    "aparNoSet": [
      "CVE-2016-9131",
      "IV93363"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV93363m3a.170215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.30"
    ],
    "issued": "20170307",
    "updated": "null",
    "siblings": [
      "7200-01:IV93365",
      "5300-12:IV93366",
      "7200-00:IV93403",
      "7100-03:IV93362",
      "6100-09:IV93361"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar",
    "cvss": [
      "CVE-2016-9131:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "There is a vulnerability in BIND that impacts AIX.",
    "aparNo": "IV93365",
    "aparNoSet": [
      "CVE-2016-9131",
      "IV93365"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV93365m1a.170215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc",
    "filesets": [
      "bos.net.tcp.bind_utils:7.2.1.0-7.2.1.1"
    ],
    "issued": "20170307",
    "updated": "null",
    "siblings": [
      "5300-12:IV93366",
      "7200-00:IV93403",
      "7100-03:IV93362",
      "7100-04:IV93363",
      "6100-09:IV93361"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar",
    "cvss": [
      "CVE-2016-9131:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "There is a vulnerability in BIND that impacts AIX.",
    "aparNo": "IV93366",
    "aparNoSet": [
      "CVE-2016-9131",
      "IV93366"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IV93366m9a.170215.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20170307",
    "updated": "null",
    "siblings": [
      "7200-01:IV93365",
      "7200-00:IV93403",
      "7100-03:IV93362",
      "7100-04:IV93363",
      "6100-09:IV93361"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar",
    "cvss": [
      "CVE-2016-9131:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-01",
      "7200-00-02",
      "7200-00-03"
    ],
    "apAbstract": "There is a vulnerability in BIND that impacts AIX.",
    "aparNo": "IV93403",
    "aparNoSet": [
      "CVE-2016-9131",
      "IV93403"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV93403m3a.170215.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory15.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.0.0-7.2.0.3"
    ],
    "issued": "20170307",
    "updated": "null",
    "siblings": [
      "7200-01:IV93365",
      "5300-12:IV93366",
      "7100-03:IV93362",
      "7100-04:IV93363",
      "6100-09:IV93361"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix15.tar",
    "cvss": [
      "CVE-2016-9131:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-08"
    ],
    "apAbstract": "PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST",
    "aparNo": "IV93840",
    "aparNoSet": [
      "IV93840"
    ],
    "fixedIn": "6100-09-09",
    "ifixes": [
      "IV93840s1a.170301.61TL09SP08epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93840",
    "filesets": [
      "bos.mp64:6.1.9.200-6.1.9.200"
    ],
    "issued": "20170303",
    "updated": "20170323",
    "siblings": [
      "7100-03:IV93884",
      "7100-04:IV93845",
      "7200-00:IV93883",
      "7200-01:IV93885"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93840/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-03"
    ],
    "apAbstract": "PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST",
    "aparNo": "IV93845",
    "aparNoSet": [
      "IV93845"
    ],
    "fixedIn": "7100-04-04",
    "ifixes": [
      "IV93845s3a.170302.71TL04SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93845",
    "filesets": [
      "bos.mp64:7.1.4.30-7.1.4.31"
    ],
    "issued": "20170303",
    "updated": "20170323",
    "siblings": [
      "6100-09:IV93840",
      "7100-03:IV93884",
      "7200-00:IV93883",
      "7200-01:IV93885"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93845/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-03"
    ],
    "apAbstract": "PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST",
    "aparNo": "IV93883",
    "aparNoSet": [
      "IV93883"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV93883s3.170302.72TL00SP03.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93883",
    "filesets": [
      "bos.mp64:7.2.0.3-7.2.0.3"
    ],
    "issued": "20170303",
    "updated": "20170323",
    "siblings": [
      "6100-09:IV93840",
      "7100-03:IV93884",
      "7100-04:IV93845",
      "7200-01:IV93885"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93883/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-08"
    ],
    "apAbstract": "PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST",
    "aparNo": "IV93884",
    "aparNoSet": [
      "IV93884"
    ],
    "fixedIn": "7100-03-09",
    "ifixes": [
      "IV93884s8a.170302.71TL03SP08.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93884",
    "filesets": [
      "bos.mp64:7.1.3.49"
    ],
    "issued": "20170303",
    "updated": "20170323",
    "siblings": [
      "6100-09:IV93840",
      "7100-04:IV93845",
      "7200-00:IV93883",
      "7200-01:IV93885"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93884/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01"
    ],
    "apAbstract": "PROBLEMS CAN OCCUR WITH THREAD_CPUTIME AND THREAD_CPUTIME_FAST",
    "aparNo": "IV93885",
    "aparNoSet": [
      "IV93885"
    ],
    "fixedIn": "7200-01-02",
    "ifixes": [
      "IV93885s1.170302.72TL01SP01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV93885",
    "filesets": [
      "bos.mp64:7.2.1.0-7.2.1.2"
    ],
    "issued": "20170303",
    "updated": "20170323",
    "siblings": [
      "6100-09:IV93840",
      "7100-03:IV93884",
      "7100-04:IV93845",
      "7200-00:IV93883"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv93885/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.30",
      "2.2.4.40"
    ],
    "apAbstract": "VIOS update and rulescfgset can save/deploy incorrect settings ",
    "aparNo": "IV94438",
    "aparNoSet": [
      "IV94438"
    ],
    "fixedIn": "2.2.4.50",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV94438",
    "filesets": [
      "ios.artex_profile.rte:6.1.9.0-6.1.9.202"
    ],
    "issued": "20170513",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.0",
      "2.2.5.10",
      "2.2.5.20"
    ],
    "apAbstract": "VIOS update and rulescfgset can save/deploy incorrect settings ",
    "aparNo": "IV94438",
    "aparNoSet": [
      "IV94438"
    ],
    "fixedIn": "2.2.5.30",
    "ifixes": [],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV94438",
    "filesets": [
      "ios.artex_profile.rte:6.1.9.0-6.1.9.202"
    ],
    "issued": "20170513",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "null",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IV94723",
    "aparNoSet": [
      "CVE-2016-7922",
      "CVE-2016-7923",
      "CVE-2016-7924",
      "CVE-2016-7925",
      "CVE-2016-7926",
      "CVE-2016-7927",
      "CVE-2016-7928",
      "CVE-2016-7930",
      "CVE-2016-7931",
      "CVE-2016-7932",
      "CVE-2016-7933",
      "CVE-2016-7934",
      "CVE-2016-7935",
      "CVE-2016-7936",
      "CVE-2016-7937",
      "CVE-2016-7939",
      "CVE-2016-7940",
      "CVE-2016-7973",
      "CVE-2016-7974",
      "CVE-2016-7975",
      "CVE-2016-7983",
      "CVE-2016-7984",
      "CVE-2016-7992",
      "CVE-2016-7993",
      "CVE-2016-8574",
      "CVE-2016-8575",
      "CVE-2017-5202",
      "CVE-2017-5203",
      "CVE-2017-5204",
      "CVE-2017-5482",
      "CVE-2017-5483",
      "CVE-2017-5484",
      "CVE-2017-5485",
      "CVE-2017-5486",
      "IV94723"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV94723s2a.170414.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.1.0-7.2.1.0"
    ],
    "issued": "20170525",
    "updated": "null",
    "siblings": [
      "5300-12:IV94729",
      "7200-00:IV94724",
      "7100-03:IV94727",
      "7100-04:IV94726",
      "6100-09:IV94728"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar",
    "cvss": [
      "CVE-2016-7922:7.3",
      "CVE-2016-7923:7.3",
      "CVE-2016-7924:7.3",
      "CVE-2016-7925:7.3",
      "CVE-2016-7926:7.3",
      "CVE-2016-7927:7.3",
      "CVE-2016-7928:7.3",
      "CVE-2016-7930:7.3",
      "CVE-2016-7931:7.3",
      "CVE-2016-7932:7.3",
      "CVE-2016-7933:7.3",
      "CVE-2016-7934:7.3",
      "CVE-2016-7935:7.3",
      "CVE-2016-7936:7.3",
      "CVE-2016-7937:7.3",
      "CVE-2016-7939:7.3",
      "CVE-2016-7940:7.3",
      "CVE-2016-7973:7.3",
      "CVE-2016-7974:7.3",
      "CVE-2016-7975:7.3",
      "CVE-2016-7983:7.3",
      "CVE-2016-7984:7.3",
      "CVE-2016-7992:7.3",
      "CVE-2016-7993:7.3",
      "CVE-2016-8574:7.3",
      "CVE-2016-8575:7.3",
      "CVE-2017-5202:7.3",
      "CVE-2017-5203:7.3",
      "CVE-2017-5204:7.3",
      "CVE-2017-5482:7.3",
      "CVE-2017-5483:7.3",
      "CVE-2017-5484:7.3",
      "CVE-2017-5485:7.3",
      "CVE-2017-5486:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-01",
      "7200-00-02",
      "7200-00-03"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IV94724",
    "aparNoSet": [
      "CVE-2016-7922",
      "CVE-2016-7923",
      "CVE-2016-7924",
      "CVE-2016-7925",
      "CVE-2016-7926",
      "CVE-2016-7927",
      "CVE-2016-7928",
      "CVE-2016-7930",
      "CVE-2016-7931",
      "CVE-2016-7932",
      "CVE-2016-7933",
      "CVE-2016-7934",
      "CVE-2016-7935",
      "CVE-2016-7936",
      "CVE-2016-7937",
      "CVE-2016-7939",
      "CVE-2016-7940",
      "CVE-2016-7973",
      "CVE-2016-7974",
      "CVE-2016-7975",
      "CVE-2016-7983",
      "CVE-2016-7984",
      "CVE-2016-7992",
      "CVE-2016-7993",
      "CVE-2016-8574",
      "CVE-2016-8575",
      "CVE-2017-5202",
      "CVE-2017-5203",
      "CVE-2017-5204",
      "CVE-2017-5482",
      "CVE-2017-5483",
      "CVE-2017-5484",
      "CVE-2017-5485",
      "CVE-2017-5486",
      "IV94724"
    ],
    "fixedIn": "7200-00-04",
    "ifixes": [
      "IV94724s4b.170417.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc",
    "filesets": [
      "bos.net.tcp.tcpdump:7.2.0.0-7.2.0.2"
    ],
    "issued": "20170525",
    "updated": "null",
    "siblings": [
      "7200-01:IV94723",
      "5300-12:IV94729",
      "7100-03:IV94727",
      "7100-04:IV94726",
      "6100-09:IV94728"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar",
    "cvss": [
      "CVE-2016-7922:7.3",
      "CVE-2016-7923:7.3",
      "CVE-2016-7924:7.3",
      "CVE-2016-7925:7.3",
      "CVE-2016-7926:7.3",
      "CVE-2016-7927:7.3",
      "CVE-2016-7928:7.3",
      "CVE-2016-7930:7.3",
      "CVE-2016-7931:7.3",
      "CVE-2016-7932:7.3",
      "CVE-2016-7933:7.3",
      "CVE-2016-7934:7.3",
      "CVE-2016-7935:7.3",
      "CVE-2016-7936:7.3",
      "CVE-2016-7937:7.3",
      "CVE-2016-7939:7.3",
      "CVE-2016-7940:7.3",
      "CVE-2016-7973:7.3",
      "CVE-2016-7974:7.3",
      "CVE-2016-7975:7.3",
      "CVE-2016-7983:7.3",
      "CVE-2016-7984:7.3",
      "CVE-2016-7992:7.3",
      "CVE-2016-7993:7.3",
      "CVE-2016-8574:7.3",
      "CVE-2016-8575:7.3",
      "CVE-2017-5202:7.3",
      "CVE-2017-5203:7.3",
      "CVE-2017-5204:7.3",
      "CVE-2017-5482:7.3",
      "CVE-2017-5483:7.3",
      "CVE-2017-5484:7.3",
      "CVE-2017-5485:7.3",
      "CVE-2017-5486:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-02",
      "7100-04-03",
      "7100-04-04"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IV94726",
    "aparNoSet": [
      "CVE-2016-7922",
      "CVE-2016-7923",
      "CVE-2016-7924",
      "CVE-2016-7925",
      "CVE-2016-7926",
      "CVE-2016-7927",
      "CVE-2016-7928",
      "CVE-2016-7930",
      "CVE-2016-7931",
      "CVE-2016-7932",
      "CVE-2016-7933",
      "CVE-2016-7934",
      "CVE-2016-7935",
      "CVE-2016-7936",
      "CVE-2016-7937",
      "CVE-2016-7939",
      "CVE-2016-7940",
      "CVE-2016-7973",
      "CVE-2016-7974",
      "CVE-2016-7975",
      "CVE-2016-7983",
      "CVE-2016-7984",
      "CVE-2016-7992",
      "CVE-2016-7993",
      "CVE-2016-8574",
      "CVE-2016-8575",
      "CVE-2017-5202",
      "CVE-2017-5203",
      "CVE-2017-5204",
      "CVE-2017-5482",
      "CVE-2017-5483",
      "CVE-2017-5484",
      "CVE-2017-5485",
      "CVE-2017-5486",
      "IV94726"
    ],
    "fixedIn": "7100-04-05",
    "ifixes": [
      "IV94726s4c.170417.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.4.0-7.1.4.31"
    ],
    "issued": "20170525",
    "updated": "null",
    "siblings": [
      "7200-01:IV94723",
      "5300-12:IV94729",
      "7200-00:IV94724",
      "7100-03:IV94727",
      "6100-09:IV94728"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar",
    "cvss": [
      "CVE-2016-7922:7.3",
      "CVE-2016-7923:7.3",
      "CVE-2016-7924:7.3",
      "CVE-2016-7925:7.3",
      "CVE-2016-7926:7.3",
      "CVE-2016-7927:7.3",
      "CVE-2016-7928:7.3",
      "CVE-2016-7930:7.3",
      "CVE-2016-7931:7.3",
      "CVE-2016-7932:7.3",
      "CVE-2016-7933:7.3",
      "CVE-2016-7934:7.3",
      "CVE-2016-7935:7.3",
      "CVE-2016-7936:7.3",
      "CVE-2016-7937:7.3",
      "CVE-2016-7939:7.3",
      "CVE-2016-7940:7.3",
      "CVE-2016-7973:7.3",
      "CVE-2016-7974:7.3",
      "CVE-2016-7975:7.3",
      "CVE-2016-7983:7.3",
      "CVE-2016-7984:7.3",
      "CVE-2016-7992:7.3",
      "CVE-2016-7993:7.3",
      "CVE-2016-8574:7.3",
      "CVE-2016-8575:7.3",
      "CVE-2017-5202:7.3",
      "CVE-2017-5203:7.3",
      "CVE-2017-5204:7.3",
      "CVE-2017-5482:7.3",
      "CVE-2017-5483:7.3",
      "CVE-2017-5484:7.3",
      "CVE-2017-5485:7.3",
      "CVE-2017-5486:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-07",
      "7100-03-08",
      "7100-03-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IV94727",
    "aparNoSet": [
      "CVE-2016-7922",
      "CVE-2016-7923",
      "CVE-2016-7924",
      "CVE-2016-7925",
      "CVE-2016-7926",
      "CVE-2016-7927",
      "CVE-2016-7928",
      "CVE-2016-7930",
      "CVE-2016-7931",
      "CVE-2016-7932",
      "CVE-2016-7933",
      "CVE-2016-7934",
      "CVE-2016-7935",
      "CVE-2016-7936",
      "CVE-2016-7937",
      "CVE-2016-7939",
      "CVE-2016-7940",
      "CVE-2016-7973",
      "CVE-2016-7974",
      "CVE-2016-7975",
      "CVE-2016-7983",
      "CVE-2016-7984",
      "CVE-2016-7992",
      "CVE-2016-7993",
      "CVE-2016-8574",
      "CVE-2016-8575",
      "CVE-2017-5202",
      "CVE-2017-5203",
      "CVE-2017-5204",
      "CVE-2017-5482",
      "CVE-2017-5483",
      "CVE-2017-5484",
      "CVE-2017-5485",
      "CVE-2017-5486",
      "IV94727"
    ],
    "fixedIn": "7100-03-10",
    "ifixes": [
      "IV94727s9b.170417.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc",
    "filesets": [
      "bos.net.tcp.server:7.1.3.0-7.1.3.49"
    ],
    "issued": "20170525",
    "updated": "null",
    "siblings": [
      "7200-01:IV94723",
      "5300-12:IV94729",
      "7200-00:IV94724",
      "7100-04:IV94726",
      "6100-09:IV94728"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar",
    "cvss": [
      "CVE-2016-7922:7.3",
      "CVE-2016-7923:7.3",
      "CVE-2016-7924:7.3",
      "CVE-2016-7925:7.3",
      "CVE-2016-7926:7.3",
      "CVE-2016-7927:7.3",
      "CVE-2016-7928:7.3",
      "CVE-2016-7930:7.3",
      "CVE-2016-7931:7.3",
      "CVE-2016-7932:7.3",
      "CVE-2016-7933:7.3",
      "CVE-2016-7934:7.3",
      "CVE-2016-7935:7.3",
      "CVE-2016-7936:7.3",
      "CVE-2016-7937:7.3",
      "CVE-2016-7939:7.3",
      "CVE-2016-7940:7.3",
      "CVE-2016-7973:7.3",
      "CVE-2016-7974:7.3",
      "CVE-2016-7975:7.3",
      "CVE-2016-7983:7.3",
      "CVE-2016-7984:7.3",
      "CVE-2016-7992:7.3",
      "CVE-2016-7993:7.3",
      "CVE-2016-8574:7.3",
      "CVE-2016-8575:7.3",
      "CVE-2017-5202:7.3",
      "CVE-2017-5203:7.3",
      "CVE-2017-5204:7.3",
      "CVE-2017-5482:7.3",
      "CVE-2017-5483:7.3",
      "CVE-2017-5484:7.3",
      "CVE-2017-5485:7.3",
      "CVE-2017-5486:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-07",
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IV94728",
    "aparNoSet": [
      "CVE-2016-7922",
      "CVE-2016-7923",
      "CVE-2016-7924",
      "CVE-2016-7925",
      "CVE-2016-7926",
      "CVE-2016-7927",
      "CVE-2016-7928",
      "CVE-2016-7930",
      "CVE-2016-7931",
      "CVE-2016-7932",
      "CVE-2016-7933",
      "CVE-2016-7934",
      "CVE-2016-7935",
      "CVE-2016-7936",
      "CVE-2016-7937",
      "CVE-2016-7939",
      "CVE-2016-7940",
      "CVE-2016-7973",
      "CVE-2016-7974",
      "CVE-2016-7975",
      "CVE-2016-7983",
      "CVE-2016-7984",
      "CVE-2016-7992",
      "CVE-2016-7993",
      "CVE-2016-8574",
      "CVE-2016-8575",
      "CVE-2017-5202",
      "CVE-2017-5203",
      "CVE-2017-5204",
      "CVE-2017-5482",
      "CVE-2017-5483",
      "CVE-2017-5484",
      "CVE-2017-5485",
      "CVE-2017-5486",
      "IV94728"
    ],
    "fixedIn": "6100-09",
    "ifixes": [
      "IV94728s9c.170420.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc",
    "filesets": [
      "bos.net.tcp.server:6.1.9.0-6.1.9.201"
    ],
    "issued": "20170525",
    "updated": "null",
    "siblings": [
      "7200-01:IV94723",
      "5300-12:IV94729",
      "7200-00:IV94724",
      "7100-03:IV94727",
      "7100-04:IV94726"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar",
    "cvss": [
      "CVE-2016-7922:7.3",
      "CVE-2016-7923:7.3",
      "CVE-2016-7924:7.3",
      "CVE-2016-7925:7.3",
      "CVE-2016-7926:7.3",
      "CVE-2016-7927:7.3",
      "CVE-2016-7928:7.3",
      "CVE-2016-7930:7.3",
      "CVE-2016-7931:7.3",
      "CVE-2016-7932:7.3",
      "CVE-2016-7933:7.3",
      "CVE-2016-7934:7.3",
      "CVE-2016-7935:7.3",
      "CVE-2016-7936:7.3",
      "CVE-2016-7937:7.3",
      "CVE-2016-7939:7.3",
      "CVE-2016-7940:7.3",
      "CVE-2016-7973:7.3",
      "CVE-2016-7974:7.3",
      "CVE-2016-7975:7.3",
      "CVE-2016-7983:7.3",
      "CVE-2016-7984:7.3",
      "CVE-2016-7992:7.3",
      "CVE-2016-7993:7.3",
      "CVE-2016-8574:7.3",
      "CVE-2016-8575:7.3",
      "CVE-2017-5202:7.3",
      "CVE-2017-5203:7.3",
      "CVE-2017-5204:7.3",
      "CVE-2017-5482:7.3",
      "CVE-2017-5483:7.3",
      "CVE-2017-5484:7.3",
      "CVE-2017-5485:7.3",
      "CVE-2017-5486:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in tcpdump that impact AIX.",
    "aparNo": "IV94729",
    "aparNoSet": [
      "CVE-2016-7922",
      "CVE-2016-7923",
      "CVE-2016-7924",
      "CVE-2016-7925",
      "CVE-2016-7926",
      "CVE-2016-7927",
      "CVE-2016-7928",
      "CVE-2016-7930",
      "CVE-2016-7931",
      "CVE-2016-7932",
      "CVE-2016-7933",
      "CVE-2016-7934",
      "CVE-2016-7935",
      "CVE-2016-7936",
      "CVE-2016-7937",
      "CVE-2016-7939",
      "CVE-2016-7940",
      "CVE-2016-7973",
      "CVE-2016-7974",
      "CVE-2016-7975",
      "CVE-2016-7983",
      "CVE-2016-7984",
      "CVE-2016-7992",
      "CVE-2016-7993",
      "CVE-2016-8574",
      "CVE-2016-8575",
      "CVE-2017-5202",
      "CVE-2017-5203",
      "CVE-2017-5204",
      "CVE-2017-5482",
      "CVE-2017-5483",
      "CVE-2017-5484",
      "CVE-2017-5485",
      "CVE-2017-5486",
      "IV94729"
    ],
    "fixedIn": "5300-12",
    "ifixes": [
      "IV94729s9b.170425.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/tcpdump_advisory2.asc",
    "filesets": [
      "bos.net.tcp.server:5.3.12.0-5.3.12.6"
    ],
    "issued": "20170525",
    "updated": "null",
    "siblings": [
      "7200-01:IV94723",
      "7200-00:IV94724",
      "7100-03:IV94727",
      "7100-04:IV94726",
      "6100-09:IV94728"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/tcpdump_fix2.tar",
    "cvss": [
      "CVE-2016-7922:7.3",
      "CVE-2016-7923:7.3",
      "CVE-2016-7924:7.3",
      "CVE-2016-7925:7.3",
      "CVE-2016-7926:7.3",
      "CVE-2016-7927:7.3",
      "CVE-2016-7928:7.3",
      "CVE-2016-7930:7.3",
      "CVE-2016-7931:7.3",
      "CVE-2016-7932:7.3",
      "CVE-2016-7933:7.3",
      "CVE-2016-7934:7.3",
      "CVE-2016-7935:7.3",
      "CVE-2016-7936:7.3",
      "CVE-2016-7937:7.3",
      "CVE-2016-7939:7.3",
      "CVE-2016-7940:7.3",
      "CVE-2016-7973:7.3",
      "CVE-2016-7974:7.3",
      "CVE-2016-7975:7.3",
      "CVE-2016-7983:7.3",
      "CVE-2016-7984:7.3",
      "CVE-2016-7992:7.3",
      "CVE-2016-7993:7.3",
      "CVE-2016-8574:7.3",
      "CVE-2016-8575:7.3",
      "CVE-2017-5202:7.3",
      "CVE-2017-5203:7.3",
      "CVE-2017-5204:7.3",
      "CVE-2017-5482:7.3",
      "CVE-2017-5483:7.3",
      "CVE-2017-5484:7.3",
      "CVE-2017-5485:7.3",
      "CVE-2017-5486:7.3"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03",
      "7100-04-04"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES",
    "aparNo": "IV95012",
    "aparNoSet": [
      "IV95012"
    ],
    "fixedIn": "7100-04-05",
    "ifixes": [
      "IV95012s1a.170511.71TL04SP00.epkg.Z",
      "IV95012s3a.170414.71TL04SP03.epkg.Z",
      "IV95012s4a.170526.71TL04SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95012",
    "filesets": [
      "bos.mp64:7.1.4.0-7.1.4.32"
    ],
    "issued": "20170602",
    "updated": "null",
    "siblings": [
      "6100-09:IV95102",
      "7100-03:IV95111",
      "7200-00:IV95858",
      "7200-01:IV95590"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95012/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.30",
      "2.2.4.40"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES",
    "aparNo": "IV95102",
    "aparNoSet": [
      "IV95102"
    ],
    "fixedIn": "2.2.4.50",
    "ifixes": [
      "IV95102s5a.61TL09SP05.170526.epkg.Z",
      "IV95102s5a.VIOS2.2.3.90.170526.epkg.Z",
      "IV95102s9a.61TL09SP09.170526.epkg.Z",
      "IV95102s9a.VIOS2.2.4.40.170526.epkg.Z",
      "IV95102s9a.VIOS2.2.5.20.170526.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95102",
    "filesets": [
      "bos.mp64:6.1.9.100-6.1.9.201"
    ],
    "issued": "20170602",
    "updated": "null",
    "siblings": [
      "6100-09:IV95102",
      "7100-03:IV95111",
      "7100-04:IV95012",
      "7200-00:IV95858",
      "7200-01:IV95590"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95102/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.0",
      "2.2.5.10",
      "2.2.5.20"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES",
    "aparNo": "IV95102",
    "aparNoSet": [
      "IV95102"
    ],
    "fixedIn": "2.2.5.30",
    "ifixes": [
      "IV95102s5a.61TL09SP05.170526.epkg.Z",
      "IV95102s5a.VIOS2.2.3.90.170526.epkg.Z",
      "IV95102s9a.61TL09SP09.170526.epkg.Z",
      "IV95102s9a.VIOS2.2.4.40.170526.epkg.Z",
      "IV95102s9a.VIOS2.2.5.20.170526.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95102",
    "filesets": [
      "bos.mp64:6.1.9.200-6.1.9.201"
    ],
    "issued": "20170602",
    "updated": "null",
    "siblings": [
      "6100-09:IV95102",
      "7100-03:IV95111",
      "7100-04:IV95012",
      "7200-00:IV95858",
      "7200-01:IV95590"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95102/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07",
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES",
    "aparNo": "IV95102",
    "aparNoSet": [
      "IV95102"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV95102s5a.61TL09SP05.170526.epkg.Z",
      "IV95102s9a.61TL09SP09.170526.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95102",
    "filesets": [
      "bos.mp64:6.1.9.15-6.1.9.201"
    ],
    "issued": "20170602",
    "updated": "null",
    "siblings": [
      "7100-03:IV95111",
      "7100-04:IV95012",
      "7200-00:IV95858",
      "7200-01:IV95590"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95102/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.3",
      "2.2.3.13",
      "2.2.3.23",
      "2.2.3.33",
      "2.2.3.43",
      "2.2.3.53",
      "2.2.3.63",
      "2.2.3.73",
      "2.2.3.83",
      "2.2.3.84",
      "2.2.3.85",
      "2.2.3.86",
      "2.2.3.87",
      "2.2.3.88",
      "2.2.3.89",
      "2.2.3.90"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES",
    "aparNo": "IV95102",
    "aparNoSet": [
      "IV95102"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IV95102s5a.61TL09SP05.170526.epkg.Z",
      "IV95102s5a.VIOS2.2.3.90.170526.epkg.Z",
      "IV95102s9a.61TL09SP09.170526.epkg.Z",
      "IV95102s9a.VIOS2.2.4.40.170526.epkg.Z",
      "IV95102s9a.VIOS2.2.5.20.170526.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95102",
    "filesets": [
      "bos.mp64:6.1.9.15-6.1.9.201"
    ],
    "issued": "20170602",
    "updated": "null",
    "siblings": [
      "6100-09:IV95102",
      "n/a:IV95111",
      "7100-04:IV95012",
      "7200-00:IV95858",
      "7200-01:IV95590"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95102/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07",
      "7100-03-08",
      "7100-03-09"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES",
    "aparNo": "IV95111",
    "aparNoSet": [
      "IV95111"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IV95111s9a.170526.71TL03SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95111",
    "filesets": [
      "bos.mp64:7.1.3.15-7.1.3.50"
    ],
    "issued": "20170602",
    "updated": "null",
    "siblings": [
      "6100-09:IV95102",
      "7100-04:IV95012",
      "7200-00:IV95858",
      "7200-01:IV95590"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95111/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.40"
    ],
    "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS",
    "aparNo": "IV95372",
    "aparNoSet": [
      "IV95372"
    ],
    "fixedIn": "2.2.4.50",
    "ifixes": [
      "IV95372s9a.170427.epkg.Z",
      "IV95372s9a.AIX61TL09SP09.170427.epkg.Z",
      "IV95372s9a.VIOS2.2.3.90.170427.epkg.Z",
      "IV95372s9a.VIOS2.2.4.40.170427.epkg.Z",
      "IV95372s9a.VIOS2.2.5.20.170427.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95372",
    "filesets": [
      "devices.ethernet.lnc.rte:6.1.9.201"
    ],
    "issued": "20170516",
    "updated": "null",
    "siblings": [
      "7100-03:IV95638",
      "7100-04:IV95637"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95372/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.20"
    ],
    "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS",
    "aparNo": "IV95372",
    "aparNoSet": [
      "IV95372"
    ],
    "fixedIn": "2.2.5.30",
    "ifixes": [
      "IV95372s9a.170427.epkg.Z",
      "IV95372s9a.AIX61TL09SP09.170427.epkg.Z",
      "IV95372s9a.VIOS2.2.3.90.170427.epkg.Z",
      "IV95372s9a.VIOS2.2.4.40.170427.epkg.Z",
      "IV95372s9a.VIOS2.2.5.20.170427.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95372",
    "filesets": [
      "devices.ethernet.lnc.rte:6.1.9.201"
    ],
    "issued": "20170516",
    "updated": "null",
    "siblings": [
      "7100-03:IV95638",
      "7100-04:IV95637"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95372/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-09"
    ],
    "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS",
    "aparNo": "IV95372",
    "aparNoSet": [
      "IV95372"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV95372s9a.AIX61TL09SP09.170427.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95372",
    "filesets": [
      "devices.ethernet.lnc.rte:6.1.9.201-6.1.9.201"
    ],
    "issued": "20170516",
    "updated": "null",
    "siblings": [
      "7100-03:IV95638",
      "7100-04:IV95637"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95372/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.90"
    ],
    "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS",
    "aparNo": "IV95372",
    "aparNoSet": [
      "IV95372"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IV95372s9a.170427.epkg.Z",
      "IV95372s9a.AIX61TL09SP09.170427.epkg.Z",
      "IV95372s9a.VIOS2.2.3.90.170427.epkg.Z",
      "IV95372s9a.VIOS2.2.4.40.170427.epkg.Z",
      "IV95372s9a.VIOS2.2.5.20.170427.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95372",
    "filesets": [
      "devices.ethernet.lnc.rte:6.1.9.201"
    ],
    "issued": "20170516",
    "updated": "null",
    "siblings": [
      "7100-03:IV95638",
      "7100-04:IV95637"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95372/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-04"
    ],
    "apAbstract": " VLAN tagged largesend packets are dropped for some adapters ",
    "aparNo": "IV95372",
    "aparNoSet": [
      "IV95372"
    ],
    "fixedIn": "7100-04-05",
    "ifixes": [
      "IV95637s4a.170509.71TL04SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95637",
    "filesets": [
      "devices.ethernet.lnc.rte:7.1.4.31"
    ],
    "issued": "20170516",
    "updated": "null",
    "siblings": [
      "6100-09:IV95372",
      "7100-03:IV95638"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95637/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES",
    "aparNo": "IV95590",
    "aparNoSet": [
      "IV95590"
    ],
    "fixedIn": "7200-01-03",
    "ifixes": [
      "IV95590s2b.170525.72TL01SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95590",
    "filesets": [
      "bos.mp64:7.2.1.0-7.2.1.3"
    ],
    "issued": "20170602",
    "updated": "null",
    "siblings": [
      "6100-09:IV95102",
      "7100-03:IV95111",
      "7100-04:IV95012",
      "7200-00:IV95858"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95590/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-04"
    ],
    "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS",
    "aparNo": "IV95637",
    "aparNoSet": [
      "IV95637"
    ],
    "fixedIn": "7100-04-05",
    "ifixes": [
      "IV95637s4a.170509.71TL04SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95637",
    "filesets": [
      "devices.ethernet.lnc.rte:7.1.4.31"
    ],
    "issued": "20170516",
    "updated": "null",
    "siblings": [
      "6100-09:IV95372",
      "7100-03:IV95638"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95637/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-09"
    ],
    "apAbstract": "VLAN TAGGED LARGESEND PACKETS ARE DROPPED FOR SOME ADAPTERS",
    "aparNo": "IV95638",
    "aparNoSet": [
      "IV95638"
    ],
    "fixedIn": "7100-03-10",
    "ifixes": [
      "IV95638s9a.170510.71TL03SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95638",
    "filesets": [
      "devices.ethernet.lnc.rte:7.1.3.49",
      "devices.ethernet.mlx.rte:7.1.3.49"
    ],
    "issued": "20170516",
    "updated": "null",
    "siblings": [
      "6100-09:IV95372",
      "7100-04:IV95637"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95638/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02",
      "7200-00-03",
      "7200-00-04"
    ],
    "apAbstract": "SYSTEM CRASH WHEN USING PROCFS FOR PROCESSES CLOSING MANY FILES",
    "aparNo": "IV95858",
    "aparNoSet": [
      "IV95858"
    ],
    "fixedIn": "7200-00-05",
    "ifixes": [
      "IV95858s4b.170525.72TL00SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV95858",
    "filesets": [
      "bos.mp64:7.2.0.0-7.2.0.4"
    ],
    "issued": "20170602",
    "updated": "null",
    "siblings": [
      "6100-09:IV95102",
      "7100-03:IV95111",
      "7100-04:IV95012",
      "7200-01:IV95590"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv95858/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV96305",
    "aparNoSet": [
      "CVE-2017-6451",
      "CVE-2017-6458",
      "CVE-2017-6462",
      "CVE-2017-6464",
      "IV96305"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IV96305m9a.170518.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20170706",
    "updated": "20171113",
    "siblings": [
      "7200-01:IV96310",
      "7200-00:IV96309",
      "7100-03:IV96307",
      "7100-04:IV96308",
      "6100-09:IV96306"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar",
    "cvss": [
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2",
      "CVE-2017-6451:1.8",
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.20",
      "2.2.4.21",
      "2.2.4.22",
      "2.2.4.23"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact VIOS",
    "aparNo": "IV96306",
    "aparNoSet": [
      "CVE-2017-6451",
      "CVE-2017-6458",
      "CVE-2017-6462",
      "CVE-2017-6464",
      "IV96306"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV96306m9a.170519.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.200"
    ],
    "issued": "20170707",
    "updated": "null",
    "siblings": [
      "5300-03::IV96305",
      "7100-03::IV96307",
      "7100-04::IV96308",
      "7200-00::IV96309",
      "7200-01::IV96310"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar",
    "cvss": [
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2",
      "CVE-2017-6451:1.8",
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-07",
      "7100-03-08",
      "7100-03-09"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX",
    "aparNo": "IV96307",
    "aparNoSet": [
      "CVE-2017-6451",
      "CVE-2017-6458",
      "CVE-2017-6462",
      "CVE-2017-6464",
      "IV96307"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IV96307m9a.170518.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.49"
    ],
    "issued": "20170707",
    "updated": "20171113",
    "siblings": [
      "5300-03::IV96305",
      "6100-09::IV96306",
      "7100-04::IV96308",
      "7200-00::IV96309",
      "7200-01::IV96310"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar",
    "cvss": [
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2",
      "CVE-2017-6451:1.8",
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-02",
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX",
    "aparNo": "IV96308",
    "aparNoSet": [
      "CVE-2017-6451",
      "CVE-2017-6458",
      "CVE-2017-6462",
      "CVE-2017-6464",
      "IV96308"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IV96308m4a.170518.epkg.Z",
      "IV96308m4b.171107.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.31"
    ],
    "issued": "20170707",
    "updated": "20171113",
    "siblings": [
      "5300-03::IV96305",
      "6100-09::IV96306",
      "7100-03::IV96307",
      "7200-00::IV96309",
      "7200-01::IV96310"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar",
    "cvss": [
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2",
      "CVE-2017-6451:1.8",
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-02",
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV96309",
    "aparNoSet": [
      "CVE-2017-6451",
      "CVE-2017-6458",
      "CVE-2017-6462",
      "CVE-2017-6464",
      "IV96309"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IV96309m4a.170518.epkg.Z",
      "IV96312m5a.170518.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc",
    "filesets": [
      "bos.net.tcp.ntp:7.2.0.0-7.2.0.2",
      "bos.net.tcp.ntpd:7.2.0.0-7.2.0.3"
    ],
    "issued": "20170706",
    "updated": "20171113",
    "siblings": [
      "7200-01:IV96310",
      "5300-12:IV96305",
      "7100-03:IV96307",
      "7100-04:IV96308",
      "6100-09:IV96306"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar",
    "cvss": [
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2",
      "CVE-2017-6451:1.8",
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX.",
    "aparNo": "IV96310",
    "aparNoSet": [
      "CVE-2017-6451",
      "CVE-2017-6458",
      "CVE-2017-6462",
      "CVE-2017-6464",
      "IV96310"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV96310m2a.170519.epkg.Z",
      "IV96312m5a.170518.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc",
    "filesets": [
      "bos.net.tcp.ntp:7.2.1.0-7.2.1.0",
      "bos.net.tcp.ntpd:7.2.1.0-7.2.1.1"
    ],
    "issued": "20170706",
    "updated": "20171113",
    "siblings": [
      "5300-12:IV96305",
      "7200-00:IV96309",
      "7100-03:IV96307",
      "7100-04:IV96308",
      "6100-09:IV96306"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar",
    "cvss": [
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2",
      "CVE-2017-6451:1.8",
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "NTPv4"
    ],
    "apAbstract": "There are multiple vulnerabilities in NTPv3 and NTPv4 that impact AIX",
    "aparNo": "IV96311",
    "aparNoSet": [
      "CVE-2017-6451",
      "CVE-2017-6458",
      "CVE-2017-6462",
      "CVE-2017-6464",
      "IV96311",
      "IV96312"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IV96311m5a.170518.epkg.Z",
      "IV96312m5a.170518.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_advisory9.asc",
    "filesets": [
      "ntp.rte:6.1.6.0-6.1.6.9",
      "ntp.rte:7.1.0.0-7.1.0.9"
    ],
    "issued": "20170707",
    "updated": "null",
    "siblings": [
      "6100-09:IV96311",
      "7100-03:IV96312",
      "7100-04:IV96312",
      "7200-00:IV96312",
      "7200-01:IV96312"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/ntp_fix9.tar",
    "cvss": [
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2",
      "CVE-2017-6451:1.8",
      "CVE-2017-6458:4.2",
      "CVE-2017-6462:1.6",
      "CVE-2017-6464:4.2"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-04"
    ],
    "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP",
    "aparNo": "IV96345",
    "aparNoSet": [
      "IV96345"
    ],
    "fixedIn": "7100-04-05",
    "ifixes": [
      "IV96345s4b.170525.71TL04SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96345",
    "filesets": [
      "bos.rte.libc:7.1.4.31"
    ],
    "issued": "20170527",
    "updated": "null",
    "siblings": [
      "6100-10:IV96351",
      "7100-03:IV96352",
      "7200-00:IV96347",
      "7200-01:IV96348"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96345/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-04"
    ],
    "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP",
    "aparNo": "IV96347",
    "aparNoSet": [
      "IV96347"
    ],
    "fixedIn": "7200-00-05",
    "ifixes": [
      "IV96347s4a.170525.72TL00SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96347",
    "filesets": [
      "bos.rte.libc:7.2.0.3-7.2.0.3"
    ],
    "issued": "20170527",
    "updated": "null",
    "siblings": [
      "6100-10:IV96351",
      "7100-03:IV96352",
      "7100-04:IV96345",
      "7200-01:IV96348"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96347/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-02"
    ],
    "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP",
    "aparNo": "IV96348",
    "aparNoSet": [
      "IV96348"
    ],
    "fixedIn": "7200-01-03",
    "ifixes": [
      "IV96348s2b.170525.72TL01SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96348",
    "filesets": [
      "bos.rte.libc:7.2.1.1-7.2.1.1"
    ],
    "issued": "20170527",
    "updated": "null",
    "siblings": [
      "6100-10:IV96351",
      "7100-03:IV96352",
      "7100-04:IV96345",
      "7200-00:IV96347"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96348/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.40"
    ],
    "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP",
    "aparNo": "IV96351",
    "aparNoSet": [
      "IV96351"
    ],
    "fixedIn": "2.2.4.50",
    "ifixes": [
      "IV96351s9d.170525.61TL09SP09.epkg.Z",
      "IV96351s9d.170525.VIOS2.2.3.90.epkg.Z",
      "IV96351s9d.170525.VIOS2.2.4.40.epkg.Z",
      "IV96351s9d.170525.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96351",
    "filesets": [
      "bos.rte.libc:6.1.9.201"
    ],
    "issued": "20170527",
    "updated": "null",
    "siblings": [
      "6100-09:IV96351",
      "7100-04:IV96345",
      "7200-00:IV96347",
      "7200-01:IV96348"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96351/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.20"
    ],
    "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP",
    "aparNo": "IV96351",
    "aparNoSet": [
      "IV96351"
    ],
    "fixedIn": "2.2.5.30",
    "ifixes": [
      "IV96351s9d.170525.61TL09SP09.epkg.Z",
      "IV96351s9d.170525.VIOS2.2.3.90.epkg.Z",
      "IV96351s9d.170525.VIOS2.2.4.40.epkg.Z",
      "IV96351s9d.170525.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96351",
    "filesets": [
      "bos.rte.libc:6.1.9.201"
    ],
    "issued": "20170527",
    "updated": "null",
    "siblings": [
      "6100-09:IV96351",
      "7100-04:IV96345",
      "7200-00:IV96347",
      "7200-01:IV96348"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96351/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-09"
    ],
    "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP",
    "aparNo": "IV96351",
    "aparNoSet": [
      "IV96351"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV96351s9d.170525.61TL09SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96351",
    "filesets": [
      "bos.rte.libc:6.1.9.201"
    ],
    "issued": "20170527",
    "updated": "null",
    "siblings": [
      "7100-03:IV96352",
      "7100-04:IV96345",
      "7200-00:IV96347",
      "7200-01:IV96348"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96351/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.90"
    ],
    "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP",
    "aparNo": "IV96351",
    "aparNoSet": [
      "IV96351"
    ],
    "fixedIn": "null",
    "ifixes": [
      "IV96351s9d.170525.61TL09SP09.epkg.Z",
      "IV96351s9d.170525.VIOS2.2.3.90.epkg.Z",
      "IV96351s9d.170525.VIOS2.2.4.40.epkg.Z",
      "IV96351s9d.170525.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96351",
    "filesets": [
      "bos.rte.libc:6.1.9.201"
    ],
    "issued": "20170527",
    "updated": "null",
    "siblings": [
      "6100-09:IV96351",
      "7100-04:IV96345",
      "7200-00:IV96347",
      "7200-01:IV96348"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96351/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-09"
    ],
    "apAbstract": "LOGIN HANGS TRYING TO WRITE TO /ETC/UTMP",
    "aparNo": "IV96352",
    "aparNoSet": [
      "IV96352"
    ],
    "fixedIn": "null",
    "ifixes": [
      "iv96352s9b.170524.71TL03SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96352",
    "filesets": [
      "bos.rte.libc:7.1.3.49"
    ],
    "issued": "20170527",
    "updated": "null",
    "siblings": [
      "6100-10:IV96351",
      "7100-04:IV96345",
      "7200-00:IV96347",
      "7200-01:IV96348"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96352/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "SYSTEM CRASH OR HANG DURING ERROR RECOVERY ON SOME FC ADAPTERS",
    "aparNo": "IV96360",
    "aparNoSet": [
      "IV96360"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV96360s3a.171227.72TL01SP03.epkg.Z",
      "IV97423m0a.180328.72TL01SP00-01.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96360",
    "filesets": [
      "devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.2"
    ],
    "issued": "20180331",
    "updated": "null",
    "siblings": [
      "6100-09:IJ00360",
      "7100-04:IJ00519",
      "7100-05:IJ01304",
      "7200-02:IJ01262"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96360/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.30",
      "2.2.4.40"
    ],
    "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS",
    "aparNo": "IV96553",
    "aparNoSet": [
      "IV96553"
    ],
    "fixedIn": "2.2.4.50",
    "ifixes": [
      "IV96553s9a.170704.61TL09SP09.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.3.90.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.4.40.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96553",
    "filesets": [
      "devices.fcp.disk.rte:6.1.9.100-6.1.9.201",
      "devices.pci.77102224.com:6.1.9.100-6.1.9.201",
      "devices.pci.df1000f7.com:6.1.9.100-6.1.9.201",
      "devices.pciex.df1060e214103404.com:6.1.9.100-6.1.9.201"
    ],
    "issued": "20170715",
    "updated": "null",
    "siblings": [
      "7100-04:IV96603",
      "7200-00:IV96606",
      "7200-01:IV96604"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96553/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.0",
      "2.2.5.10",
      "2.2.5.20"
    ],
    "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS",
    "aparNo": "IV96553",
    "aparNoSet": [
      "IV96553"
    ],
    "fixedIn": "2.2.5.30",
    "ifixes": [
      "IV96553s9a.170704.61TL09SP09.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.3.90.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.4.40.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96553",
    "filesets": [
      "devices.fcp.disk.rte:6.1.9.200-6.1.9.201",
      "devices.pci.77102224.com:6.1.9.200-6.1.9.201",
      "devices.pci.df1000f7.com:6.1.9.200-6.1.9.201",
      "devices.pciex.df1060e214103404.com:6.1.9.200-6.1.9.201"
    ],
    "issued": "20170715",
    "updated": "20170721",
    "siblings": [
      "7100-04:IV96603",
      "7200-00:IV96606",
      "7200-01:IV96604"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96553/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-00",
      "6100-09-01",
      "6100-09-02",
      "6100-09-03",
      "6100-09-04",
      "6100-09-05",
      "6100-09-06",
      "6100-09-07",
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS",
    "aparNo": "IV96553",
    "aparNoSet": [
      "IV96553"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV96553s9a.170704.61TL09SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96553",
    "filesets": [
      "devices.fcp.disk.rte:6.1.9.0-6.1.9.201",
      "devices.pci.77102224.com:6.1.9.0-6.1.9.201",
      "devices.pci.df1000f7.com:6.1.9.0-6.1.9.201",
      "devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201"
    ],
    "issued": "20170715",
    "updated": "20170721",
    "siblings": [
      "7100-04:IV96603",
      "7200-00:IV96606",
      "7200-01:IV96604"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96553/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.10",
      "2.2.3.20",
      "2.2.3.30",
      "2.2.3.40",
      "2.2.3.50",
      "2.2.3.60",
      "2.2.3.70",
      "2.2.3.80",
      "2.2.3.90"
    ],
    "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS",
    "aparNo": "IV96553",
    "aparNoSet": [
      "IV96553"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IV96553s9a.170704.61TL09SP09.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.3.90.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.4.40.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96553",
    "filesets": [
      "devices.fcp.disk.rte:6.1.9.0-6.1.9.201",
      "devices.pci.77102224.com:6.1.9.0-6.1.9.201",
      "devices.pci.df1000f7.com:6.1.9.0-6.1.9.201",
      "devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201"
    ],
    "issued": "20170715",
    "updated": "null",
    "siblings": [
      "6100-09:IV96553",
      "7100-04:IV96603",
      "7200-00:IV96606",
      "7200-01:IV96604"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96553/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.0",
      "2.2.3.10",
      "2.2.3.20",
      "2.2.3.30",
      "2.2.3.40",
      "2.2.3.50",
      "2.2.3.60",
      "2.2.3.70",
      "2.2.3.80",
      "2.2.3.90"
    ],
    "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS",
    "aparNo": "IV96553",
    "aparNoSet": [
      "IV96553"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IV96553s9a.170704.61TL09SP09.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.3.90.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.4.40.epkg.Z",
      "IV96553s9a.170704.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96553",
    "filesets": [
      "devices.fcp.disk.rte:6.1.9.0-6.1.9.201",
      "devices.pci.77102224.com:6.1.9.0-6.1.9.201",
      "devices.pci.df1000f7.com:6.1.9.0-6.1.9.201",
      "devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201"
    ],
    "issued": "20170721",
    "updated": "20170721",
    "siblings": [
      "6100-09:IV96553",
      "7100-03:IV97772",
      "7100-04:IV96603",
      "7200-00:IV96606",
      "7200-01:IV96604"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96553/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-00",
      "7100-04-01",
      "7100-04-02",
      "7100-04-03",
      "7100-04-04"
    ],
    "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS",
    "aparNo": "IV96603",
    "aparNoSet": [
      "IV96603"
    ],
    "fixedIn": "7100-04-05",
    "ifixes": [
      "IV96603s4a.170704.71TL04SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96603",
    "filesets": [
      "devices.fcp.disk.rte:7.1.4.0-7.1.4.31",
      "devices.pci.77102224.com:7.1.4.0-7.1.4.31",
      "devices.pci.df1000f7.com:7.1.4.0-7.1.4.31",
      "devices.pciex.df1060e214103404.com:7.1.4.0-7.1.4.31"
    ],
    "issued": "20170715",
    "updated": "20170721",
    "siblings": [
      "6100-09:IV96553",
      "7200-00:IV96606",
      "7200-01:IV96604"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96603/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02"
    ],
    "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS",
    "aparNo": "IV96604",
    "aparNoSet": [
      "IV96604"
    ],
    "fixedIn": "7200-01-03",
    "ifixes": [
      "IV96604s2a.170705.72TL01SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96604",
    "filesets": [
      "devices.fcp.disk.rte:7.2.1.0-7.2.1.1",
      "devices.pci.77102224.com:7.2.1.0-7.2.1.1",
      "devices.pci.df1000f7.com:7.2.1.0-7.2.1.1",
      "devices.pciex.df1060e214103404.com:7.2.1.0-7.2.1.1"
    ],
    "issued": "20170715",
    "updated": "20170721",
    "siblings": [
      "6100-09:IV96553",
      "7100-04:IV96603",
      "7100-03:IV97772",
      "7200-00:IV96606"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96604/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-00-00",
      "7200-00-01",
      "7200-00-02",
      "7200-00-03",
      "7200-00-04"
    ],
    "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS",
    "aparNo": "IV96606",
    "aparNoSet": [
      "IV96606"
    ],
    "fixedIn": "7200-00-05",
    "ifixes": [
      "IV96606s4a.170713.72TL00SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV96606",
    "filesets": [
      "devices.fcp.disk.rte:7.2.0.0-7.2.0.3",
      "devices.pci.77102224.com:7.2.0.0-7.2.0.3",
      "devices.pci.df1000f7.com:7.2.0.0-7.2.0.3",
      "devices.pciex.df1060e214103404.com:7.2.0.0-7.2.0.3"
    ],
    "issued": "20170715",
    "updated": "20170721",
    "siblings": [
      "6100-09:IV96553",
      "7100-04:IV96603",
      "7100-03:IV97772",
      "7200-01:IV96604"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv96606/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.40"
    ],
    "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER",
    "aparNo": "IV97135",
    "aparNoSet": [
      "IV97135"
    ],
    "fixedIn": "2.2.4.50",
    "ifixes": [
      "IV97135s9a.170714.61TL09SP09.epkg.Z",
      "IV97135s9a.170714.VIOS2.2.3.90.epkg.Z",
      "IV97135s9a.170714.VIOS2.2.4.40.epkg.Z",
      "IV97135s9a.170714.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97135",
    "filesets": [
      "devices.common.IBM.ethernet.rte:6.1.9.201"
    ],
    "issued": "20170718",
    "updated": "null",
    "siblings": [
      "6100-09:IV97135",
      "7100-03:IV97772",
      "7100-04:IV97586",
      "7200-01:IV97588"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97135/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.20"
    ],
    "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER",
    "aparNo": "IV97135",
    "aparNoSet": [
      "IV97135"
    ],
    "fixedIn": "2.2.5.30",
    "ifixes": [
      "IV97135s9a.170714.61TL09SP09.epkg.Z",
      "IV97135s9a.170714.VIOS2.2.3.90.epkg.Z",
      "IV97135s9a.170714.VIOS2.2.4.40.epkg.Z",
      "IV97135s9a.170714.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97135",
    "filesets": [
      "devices.common.IBM.ethernet.rte:6.1.9.201"
    ],
    "issued": "20170718",
    "updated": "null",
    "siblings": [
      "6100-09:IV97135",
      "7100-03:IV97772",
      "7100-04:IV97586",
      "7200-01:IV97588"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97135/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-09"
    ],
    "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER",
    "aparNo": "IV97135",
    "aparNoSet": [
      "IV97135"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV97135s9a.170714.61TL09SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97135",
    "filesets": [
      "devices.common.IBM.ethernet.rte:6.1.9.201"
    ],
    "issued": "20170718",
    "updated": "null",
    "siblings": [
      "7100-04:IV97586",
      "7200-01:IV97588"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97135/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.90"
    ],
    "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER",
    "aparNo": "IV97135",
    "aparNoSet": [
      "IV97135"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IV97135s9a.170714.61TL09SP09.epkg.Z",
      "IV97135s9a.170714.VIOS2.2.3.90.epkg.Z",
      "IV97135s9a.170714.VIOS2.2.4.40.epkg.Z",
      "IV97135s9a.170714.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97135",
    "filesets": [
      "devices.common.IBM.ethernet.rte:6.1.9.201"
    ],
    "issued": "20170718",
    "updated": "null",
    "siblings": [
      "6100-09:IV97135",
      "7100-03:IV97772",
      "7100-04:IV97586",
      "7200-01:IV97588"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97135/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.30",
      "2.2.4.40"
    ],
    "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER",
    "aparNo": "IV97148",
    "aparNoSet": [
      "IV97148"
    ],
    "fixedIn": "2.2.4.50",
    "ifixes": [
      "IV97148s8a.170613.61TL09SP08.epkg.Z",
      "IV97148s8a.170613.epkg.Z",
      "IV97148s9b.171030.61TL09SP09.epkg.Z",
      "IV97148s9b.171030.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97148",
    "filesets": [
      "bos.cluster.rte:6.1.9.200-6.1.9.201"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "6100-09:IV97148",
      "7100-04:IV97265",
      "7200-01:IV97266"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97148/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.0",
      "2.2.5.10",
      "2.2.5.20"
    ],
    "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER",
    "aparNo": "IV97148",
    "aparNoSet": [
      "IV97148"
    ],
    "fixedIn": "2.2.5.30",
    "ifixes": [
      "IV97148s8a.170613.61TL09SP08.epkg.Z",
      "IV97148s8a.170613.epkg.Z",
      "IV97148s9b.171030.61TL09SP09.epkg.Z",
      "IV97148s9b.171030.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97148",
    "filesets": [
      "bos.cluster.rte:6.1.9.200-6.1.9.201"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "6100-09:IV97148",
      "7100-04:IV97265",
      "7200-01:IV97266"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97148/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER",
    "aparNo": "IV97148",
    "aparNoSet": [
      "IV97148"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV97148s8a.170613.61TL09SP08.epkg.Z",
      "IV97148s8a.170613.epkg.Z",
      "IV97148s9b.171030.61TL09SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97148",
    "filesets": [
      "bos.cluster.rte:6.1.9.200-6.1.9.201"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "7100-04:IV97265",
      "7200-01:IV97266"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97148/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.3.80",
      "2.2.3.90"
    ],
    "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER",
    "aparNo": "IV97148",
    "aparNoSet": [
      "IV97148"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IV97148s8a.170613.61TL09SP08.epkg.Z",
      "IV97148s8a.170613.epkg.Z",
      "IV97148s9b.171030.61TL09SP09.epkg.Z",
      "IV97148s9b.171030.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97148",
    "filesets": [
      "bos.cluster.rte:6.1.9.200-6.1.9.201"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "6100-09:IV97148",
      "7100-04:IV97265",
      "7200-01:IV97266"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97148/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04"
    ],
    "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER",
    "aparNo": "IV97265",
    "aparNoSet": [
      "IV97265"
    ],
    "fixedIn": "7100-04-05",
    "ifixes": [
      "IV97265s3a.171101.71TL04SP03.epkg.Z",
      "IV97265s4a.170823.71TL04SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97265",
    "filesets": [
      "bos.cluster.rte:7.1.4.30-7.1.4.31"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "6100-09:IV97148",
      "7200-01:IV97266"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97265/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02"
    ],
    "apAbstract": "CAA:SLOW GOSSIP RECEIPT ON BOOT MAY CAUSE PARTITIONED CLUSTER",
    "aparNo": "IV97266",
    "aparNoSet": [
      "IV97266"
    ],
    "fixedIn": "7200-01-03",
    "ifixes": [
      "IV97266s1a.171101.72TL01SP00.epkg.Z",
      "IV97266s1a.171101.72TL01SP01.epkg.Z",
      "IV97266s2a.170920.72TL01SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97266",
    "filesets": [
      "bos.cluster.rte:7.2.1.0-7.2.1.1"
    ],
    "issued": "20171108",
    "updated": "null",
    "siblings": [
      "6100-09:IV97148",
      "7100-04:IV97265"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97266/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-07",
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97356",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97356"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV97356m9a.170830.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.201"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.70",
      "2.2.3.80",
      "2.2.3.90"
    ],
    "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)",
    "aparNo": "IV97356",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97356"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV97356m9a.170830.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.201"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.30",
      "2.2.4.40",
      "2.2.4.50"
    ],
    "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)",
    "aparNo": "IV97356",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97356"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV97356m9a.170830.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.201"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-04-04"
    ],
    "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER",
    "aparNo": "IV97586",
    "aparNoSet": [
      "IV97586"
    ],
    "fixedIn": "7100-04-05",
    "ifixes": [
      "IV97586s4a.170714.71TL04SP04.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97586",
    "filesets": [
      "devices.common.IBM.ethernet.rte:7.1.4.31"
    ],
    "issued": "20170718",
    "updated": "null",
    "siblings": [
      "6100-09:IV97135",
      "7200-01:IV97588"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97586/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7200-01-02"
    ],
    "apAbstract": "ETHERCHANNEL LINK PORT IN LACP MODE MAY NOT RECOVER",
    "aparNo": "IV97588",
    "aparNoSet": [
      "IV97588"
    ],
    "fixedIn": "7200-01-03",
    "ifixes": [
      "IV97588s2a.170714.72TL01SP02.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97588",
    "filesets": [
      "devices.common.IBM.ethernet.rte:7.2.1.1"
    ],
    "issued": "20170718",
    "updated": "null",
    "siblings": [
      "6100-09:IV97135",
      "7100-04:IV97586"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97588/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07",
      "7100-03-08",
      "7100-03-09"
    ],
    "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS",
    "aparNo": "IV97772",
    "aparNoSet": [
      "IV97772"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IV97772s9a.170713.71TL03SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97772",
    "filesets": [
      "devices.fcp.disk.rte:7.1.3.0-7.1.3.49",
      "devices.pci.77102224.com:7.1.3.0-7.1.3.49",
      "devices.pci.df1000f7.com:7.1.3.0-7.1.3.49",
      "devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.49"
    ],
    "issued": "20170715",
    "updated": "null",
    "siblings": [
      "6100-09:IV96553",
      "7100-04:IV96603",
      "7200-00:IV96606",
      "7200-01:IV96604"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97772/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "7100-03-00",
      "7100-03-01",
      "7100-03-02",
      "7100-03-03",
      "7100-03-04",
      "7100-03-05",
      "7100-03-06",
      "7100-03-07",
      "7100-03-08",
      "7100-03-09"
    ],
    "apAbstract": "UNDETECTED DATA LOSS AFTER STORAGE ERRORS WITH CERTAIN ADAPTERS",
    "aparNo": "IV97772",
    "aparNoSet": [
      "IV97772"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IV97772s9a.170713.71TL03SP09.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97772",
    "filesets": [
      "devices.fcp.disk.rte:7.1.3.0-7.1.3.49",
      "devices.pci.77102224.com:7.1.3.0-7.1.3.49",
      "devices.pci.df1000f7.com:7.1.3.0-7.1.3.49",
      "devices.pciex.df1060e214103404.com:7.1.3.0-7.1.3.49"
    ],
    "issued": "20170721",
    "updated": "20170721",
    "siblings": [
      "6100-09:IV96553",
      "7100-04:IV96603",
      "7200-00:IV96606",
      "7200-01:IV96604"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97772/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "(caccelstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97811",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97811"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IV97811s2a.170712.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.acct:7.2.0.0-7.2.0.2"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "(caccelstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97811",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97811"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV97811s2a.170712.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.acct:7.2.1.0-7.2.1.0"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-07",
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97852",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97852"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV97852s7a.170713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.archive:6.1.9.0-6.1.9.201"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.70",
      "2.2.3.80",
      "2.2.3.90"
    ],
    "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)",
    "aparNo": "IV97852",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97852"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV97852s7a.170713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.archive:6.1.9.0-6.1.9.201"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.30",
      "2.2.4.40",
      "2.2.4.50"
    ],
    "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)",
    "aparNo": "IV97852",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97852"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV97852s7a.170713.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.archive:6.1.9.0-6.1.9.201"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97896",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97896"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IV97896s4a.170712.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.acct:7.1.4.0-7.1.4.30"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97898",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97898"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IV97898s2a.171201.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.acct:7.2.0.0-7.2.0.3"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "(iostat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97898",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97898"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV97898s2a.171201.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.acct:7.2.1.0-7.2.1.1"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97899",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97899"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IV97899s4a.170712.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.acct:7.1.4.0-7.1.4.30"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97901",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97901"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IV97901s2a.171201.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.acct:7.2.0.0-7.2.0.3"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "(vmstat) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97901",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97901"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV97901s2a.171201.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.acct:7.2.1.0-7.2.1.1"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97957",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97957"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IV97957s2b.171205.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.archive:7.1.4.0-7.1.4.31"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97958",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97958"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV97958s0b.171205.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.archive:7.2.1.0-7.2.1.1"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV97959",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV97959"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IV97959s2b.171205.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.archive:7.2.0.0-7.2.0.3"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.5.0",
      "2.2.5.10",
      "2.2.5.20"
    ],
    "apAbstract": "LPARS USING SEA MAY LOSE NETWORK AFTER REBOOTING PRIMARY AND SECONDARY VIOS",
    "aparNo": "IV97991",
    "aparNoSet": [
      "IV97991"
    ],
    "fixedIn": "2.2.5.30",
    "ifixes": [
      "IV97991s8a.170714.VIOS2.2.5.0-10.epkg.Z",
      "IV97991s9a.170713.VIOS2.2.5.20.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IV97991",
    "filesets": [
      "ios.sea:6.1.9.200-6.1.9.201"
    ],
    "issued": "20170908",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/iv97991/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "(restbyinode) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV98013",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV98013"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IV98013s9a.170717.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.archive:5.3.12.0-5.3.12.7"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "5300-12-09"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV98825",
    "aparNoSet": [
      "CVE-2017-3142",
      "CVE-2017-3143",
      "IV98825"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IV98825m9a.170830.epkg.Z"
    ],
    "bulletinUrl": "http://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc",
    "filesets": [
      "bos.net.tcp.client:5.3.12.0-5.3.12.10"
    ],
    "issued": "20170823",
    "updated": "20171113",
    "siblings": [
      "7200-01:IV98830",
      "7200-00:IV98829",
      "7100-03:IV98827",
      "7100-04:IV98828",
      "6100-09:IV98826"
    ],
    "downloadUrl": "ftp://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar",
    "cvss": [
      "CVE-2017-3142:5.3",
      "CVE-2017-3143:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-10",
      "6100-09-07",
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV98826",
    "aparNoSet": [
      "CVE-2017-3142",
      "CVE-2017-3143",
      "IV98826"
    ],
    "fixedIn": "6100-09-11",
    "ifixes": [
      "IV98826m9a.170809.epkg.Z",
      "IV98826m0a.171105.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc",
    "filesets": [
      "bos.net.tcp.client:6.1.9.0-6.1.9.300"
    ],
    "issued": "20170823",
    "updated": "20171113",
    "siblings": [
      "7200-01:IV98830",
      "5300-12:IV98825",
      "7200-00:IV98829",
      "7100-03:IV98827",
      "7100-04:IV98828"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar",
    "cvss": [
      "CVE-2017-3142:5.3",
      "CVE-2017-3143:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-03-07",
      "7100-03-08",
      "7100-03-09"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV98827",
    "aparNoSet": [
      "CVE-2017-3142",
      "CVE-2017-3143",
      "IV98827"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "IV98827m3a.170808.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.3.0-7.1.3.49"
    ],
    "issued": "20170823",
    "updated": "20171113",
    "siblings": [
      "7200-01:IV98830",
      "5300-12:IV98825",
      "7200-00:IV98829",
      "7100-04:IV98828",
      "6100-09:IV98826"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar",
    "cvss": [
      "CVE-2017-3142:5.3",
      "CVE-2017-3143:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-02",
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV98828",
    "aparNoSet": [
      "CVE-2017-3142",
      "CVE-2017-3143",
      "IV98828"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IV98828m4a.170808.epkg.Z",
      "IV98828m5b.171110.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.32"
    ],
    "issued": "20170823",
    "updated": "20171113",
    "siblings": [
      "7200-01:IV98830",
      "5300-12:IV98825",
      "7200-00:IV98829",
      "7100-03:IV98827",
      "6100-09:IV98826"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar",
    "cvss": [
      "CVE-2017-3142:5.3",
      "CVE-2017-3143:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-02",
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV98829",
    "aparNoSet": [
      "CVE-2017-3142",
      "CVE-2017-3143",
      "IV98829"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IV98829m0a.170809.epkg.Z",
      "IV98829m0b.171106.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.0.0-7.2.0.4"
    ],
    "issued": "20170823",
    "updated": "20171113",
    "siblings": [
      "7200-01:IV98830",
      "5300-12:IV98825",
      "7100-03:IV98827",
      "7100-04:IV98828",
      "6100-09:IV98826"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar",
    "cvss": [
      "CVE-2017-3142:5.3",
      "CVE-2017-3143:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-00",
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "There are vulnerabilities in BIND that impact AIX.",
    "aparNo": "IV98830",
    "aparNoSet": [
      "CVE-2017-3142",
      "CVE-2017-3143",
      "IV98830"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV98830m1a.170809.epkg.Z",
      "IV98830m1b.171106.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_advisory16.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.1.0-7.2.1.2"
    ],
    "issued": "20170823",
    "updated": "20171113",
    "siblings": [
      "5300-12:IV98825",
      "7200-00:IV98829",
      "7100-03:IV98827",
      "7100-04:IV98828",
      "6100-09:IV98826"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/bind_fix16.tar",
    "cvss": [
      "CVE-2017-3142:5.3",
      "CVE-2017-3143:7.5"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV99497",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV99497"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IV99497m5a.171115.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.net.tcp.client:7.1.4.0-7.1.4.32"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV99498",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV99498"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IV99498m5a.171115.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.0.0-7.2.0.4"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "(bellmail) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV99499",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV99499"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV99499m3a.171115.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.net.tcp.client_core:7.2.1.0-7.2.1.2"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "6100-09-07",
      "6100-09-08",
      "6100-09-09"
    ],
    "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV99548",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV99548"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV99548m9a.171031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.lvm:6.1.9.0-6.1.9.201"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.3.70",
      "2.2.3.80",
      "2.2.3.90"
    ],
    "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)",
    "aparNo": "IV99548",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV99548"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV99548m9a.171031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.lvm:6.1.9.0-6.1.9.201"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "vios",
    "versions": [
      "2.2.4.30",
      "2.2.4.40",
      "2.2.4.50"
    ],
    "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect VIOS (CVE-2017-1692)",
    "aparNo": "IV99548",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV99548"
    ],
    "fixedIn": "6100-09-10",
    "ifixes": [
      "IV99548m9a.171031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.lvm:6.1.9.0-6.1.9.201"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7100-04-03",
      "7100-04-04",
      "7100-04-05"
    ],
    "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV99550",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV99550"
    ],
    "fixedIn": "7100-04-06",
    "ifixes": [
      "IV99550m5a.171031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.lvm:7.1.4.0-7.1.4.32"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-00-03",
      "7200-00-04",
      "7200-00-05"
    ],
    "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV99551",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV99551"
    ],
    "fixedIn": "7200-00-06",
    "ifixes": [
      "IV99551m5a.171031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.lvm:7.2.0.0-7.2.0.4"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-01:IV99499",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "7200-01-01",
      "7200-01-02",
      "7200-01-03"
    ],
    "apAbstract": "(lquerypv) Vulnerabilities in bellmail / caccelstat / iostat / lquerypv / restbyinode / vmstat affect AIX (CVE-2017-1692)",
    "aparNo": "IV99552",
    "aparNoSet": [
      "CVE-2017-1692",
      "IV99552"
    ],
    "fixedIn": "7200-01-04",
    "ifixes": [
      "IV99552m3a.171031.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_advisory.asc",
    "filesets": [
      "bos.rte.lvm:7.2.1.0-7.2.1.2"
    ],
    "issued": "20180205",
    "updated": "null",
    "siblings": [
      "5300-12:IJ00951",
      "7200-00:IV99498",
      "7100-03:IV99496",
      "7100-04:IV99497",
      "6100-09:IV97356"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/suid_fix.tar",
    "cvss": [
      "CVE-2017-1692:8.4"
    ],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "aix",
    "versions": [
      "6100-06-00",
      "6100-06-01",
      "6100-06-02",
      "6100-06-03",
      "6100-06-04",
      "6100-06-05",
      "6100-06-06",
      "6100-06-07",
      "6100-06-08",
      "6100-06-09",
      "6100-06-10",
      "6100-06-11"
    ],
    "apAbstract": "SYSTEM CRASH IN E_CLEAR_WAIT().",
    "aparNo": "IZ94647",
    "aparNoSet": [
      "IZ94647"
    ],
    "fixedIn": "6100-06-12",
    "ifixes": [
      "IZ94647s1a.130730.epkg.Z",
      "IZ94647s1a.130730.61TL06SP11.epkg.Z"
    ],
    "bulletinUrl": "http://www-01.ibm.com/support/docview.wss?uid\u003disg1IZ94647",
    "filesets": [
      "bos.mp64:6.1.6.0-6.1.6.22"
    ],
    "issued": "20110208",
    "updated": "20131124",
    "siblings": [
      "6100-06:IZ94647",
      "6100-07:IV13404",
      "6100-08:IV14309",
      "6100-09:IV42440",
      "7100-00:IV42334",
      "7100-01:IV27584",
      "7100-02:IV42324",
      "7100-03:IV42412"
    ],
    "downloadUrl": "ftp://public.dhe.ibm.com/aix/ifixes/iz94647/",
    "cvss": [],
    "reboot": "no"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "2.2.4.0",
      "2.2.4.10",
      "2.2.4.20",
      "2.2.4.30",
      "2.2.4.40",
      "2.2.4.50",
      "2.2.4.60"
    ],
    "apAbstract": "Adapter firmware upgrade can fail or adapter may become unusable",
    "aparNo": "See",
    "aparNoSet": [
      "Advisory",
      "See"
    ],
    "fixedIn": "See Advisory",
    "ifixes": [
      "IJ06644sAa.180917.AIX61TL09SP10.epkg.Z",
      "IJ06644sBa.180615.AIX61TL09SP11.epkg.Z",
      "IJ06644sBa.180615.VIOS2.2.4.60.epkg.Z",
      "IJ06644sBa.180615.VIOS2.2.5.40.epkg.Z",
      "IJ06644sCa.180917.AIX61TL09SP12.epkg.Z",
      "IJ06644sCa.180917.VIOS2.2.6.31.epkg.Z"
    ],
    "bulletinUrl": "",
    "filesets": [
      "devices.pciex.df1060e214103404.com:6.1.9.0-6.1.9.201"
    ],
    "issued": "20181013",
    "updated": "null",
    "siblings": [
      "6100-09:IJ06644",
      "7100-04:IJ09173",
      "7100-05:IJ09174",
      "7200-01:IJ09175",
      "7200-02:IJ09176",
      "7200-03:IJ08641"
    ],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/ij06644/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "3.1.4.40",
      "3.1.4.41"
    ],
    "apAbstract": "Potential undetected data loss can occur on LPARs using NPIV with certain Fibre Channel adapters",
    "aparNo": "cv31441s1a",
    "aparNoSet": [
      "cv31441s1a"
    ],
    "fixedIn": "3.1.4.50",
    "ifixes": [
      "cv31441s1a.241015.VIOS3.1.4.4x.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7172778",
    "filesets": [
      "devices.pciex.7710612214105006.com:7.2.5.203-7.2.5.203"
    ],
    "issued": "20241016",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/cv31141/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "hiper",
    "product": "vios",
    "versions": [
      "4.1.0.20",
      "4.1.0.21"
    ],
    "apAbstract": "Potential undetected data loss can occur on LPARs using NPIV with certain Fibre Channel adapters",
    "aparNo": "cv41021s1a",
    "aparNoSet": [
      "cv41021s1a"
    ],
    "fixedIn": "4.1.0.30",
    "ifixes": [
      "cv41021s1a.241015.VIOS4.1.0.2x.epkg.Z"
    ],
    "bulletinUrl": "https://www.ibm.com/support/pages/node/7172778",
    "filesets": [
      "devices.pciex.7710612214105006.com:7.3.2.1-7.3.2.1"
    ],
    "issued": "20241016",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/ifixes/cv41021/",
    "cvss": [],
    "reboot": "yes"
  },
  {
    "type": "sec",
    "product": "aix",
    "versions": [
      "invScout"
    ],
    "apAbstract": "AIX is vulnerable to arbitrary command execution due to invscout (CVE-2024-27260)",
    "aparNo": "is22026s1a",
    "aparNoSet": [
      "CVE-2024-27260",
      "is22026s1a"
    ],
    "fixedIn": "See Bulletin",
    "ifixes": [
      "is22026s1a.240514.epkg.Z"
    ],
    "bulletinUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_advisory6.asc",
    "filesets": [
      "invscout.rte:2.2.0.0-2.2.0.26"
    ],
    "issued": "20240515",
    "updated": "null",
    "siblings": [],
    "downloadUrl": "https://aix.software.ibm.com/aix/efixes/security/invscout_fix6.tar",
    "cvss": [
      "CVE-2024-27260:8.4"
    ],
    "reboot": "no"
  }
]