The OVAL Repository5.42015-09-03T07:03:39.823-04:00Stack-based buffer overflow in muxatmd.IBM AIX 5.2IBM AIX 5.3IBM AIX 6.1Stack-based buffer overflow in muxatmd in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via a long filename.Aharon CherninDRAFTINTERIMACCEPTEDACCEPTEDAIX NFSv4 nfs_portmon vulnerabilityIBM AIX 5.3IBM AIX 6.1nfs.ext in IBM AIX 5.3.x through 5.3.9 and 6.1.0 through 6.1.2 does not properly use the nfs_portmon setting, which allows remote attackers to bypass intended access restrictions for NFSv4 shares via unspecified vectors.Pai PengDRAFTINTERIMACCEPTEDACCEPTEDAIX NFSv4 Kerberos vulnerabilityIBM AIX 5.3IBM AIX 6.1gssd in IBM AIX 5.3.x through 5.3.9 and 6.1.0 through 6.1.2 does not properly handle the NFSv4 Kerberos credential cache, which allows local users to bypass intended access restrictions for Kerberized NFSv4 shares via unspecified vectors.Pai PengDRAFTINTERIMACCEPTEDACCEPTEDBuffer overflow in autoconf6.IBM AIX 5.3IBM AIX 6.1Buffer overflow in autoconf6 in IBM AIX 6.1.0 through 6.1.2, when Role-Based Access Control is enabled, allows local users with aix.network.config.tcpip authorization to gain privileges via unspecified vectors.Aharon CherninDRAFTINTERIMACCEPTEDShane ShafferINTERIMACCEPTEDACCEPTEDMalloc subsystem in libc in IBM AIX 5.3 and 6.1 vulnerability.IBM AIX 5.3IBM AIX 6.1The malloc subsystem in libc in IBM AIX 5.3 and 6.1 allows local users to create or overwrite arbitrary files via a symlink attack on the log file associated with the MALLOCDEBUG environment variable.Aharon CherninDRAFTINTERIMACCEPTEDACCEPTEDat allows local users to read arbitrary files.IBM AIX 5.2IBM AIX 5.3IBM AIX 6.1at in bos.rte.cron on IBM AIX 5.2.0, 5.3.0 through 5.3.9, and 6.1.0 through 6.1.2 allows local users to read arbitrary files via unspecified vectors, related to failure to drop root privileges.Aharon CherninDRAFTINTERIMACCEPTEDACCEPTEDMultiple unspecified vulnerabilities in IBM AIX rmsock."IBM AIX 5.2IBM AIX 5.3IBM AIX 6.1Multiple unspecified vulnerabilities in IBM AIX 5.2.0 through 6.1.2 allow local users to append data to arbitrary files, related to (1) rmsock and (2) rmsock64 not creating "secure log files."Aharon CherninDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 5300-00 is installedIBM AIX 5.3The operating system installed on the system is IBM AIX version 5300-00.Aharon CherninDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 5300-01 through 5300-06 is installedIBM AIX 5.3The operating system installed on the system is IBM AIX version 5300-01 through 5300-06.Aharon CherninDRAFTINTERIMACCEPTEDACCEPTEDtftp buffer overflow allows local users to gain privilegesIBM AIX 5.2IBM AIX 5.3Buffer overflow in tftp in bos.net.tcp.client in IBM AIX 5.2.0 and 5.3.0 allows local users to gain privileges via unspecified vectors.Michael WoodDRAFTINTERIMACCEPTEDJerome AthiasINTERIMACCEPTEDACCEPTEDIBM AIX 'swcons' Insecure File Creation VulnerabilityIBM AIX 5.2IBM AIX 5.3IBM AIX 6.1swcons in bos.rte.console in IBM AIX 5.2.0 through 6.1.1 allows local users in the system group to create or overwrite an arbitrary file, and establish weak permissions and root ownership for this file, via unspecified vectors. NOTE: this can be leveraged to gain privileges. NOTE: this issue exists because of an incomplete fix for CVE-2007-5805.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDAIX swap commands buffer overflowIBM AIX 5.2IBM AIX 5.3Multiple buffer overflows in bos.rte.control in IBM AIX 5.2 and 5.3 allow local users to gain privileges via unspecified vectors related to the (1) swap, (2) swapoff, and (3) swapon programs.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDAIX Logical Volume Manager buffer overflowIBM AIX 5.2IBM AIX 5.3Multiple buffer overflows in IBM AIX 5.2 and 5.3 allow local users to gain privileges via unspecified vectors related to the (1) lchangevg, (2) ldeletepv, (3) putlvodm, (4) lvaryoffvg, and (5) lvgenminor programs in bos.rte.lvm; and the (6) tellclvmd program in bos.clvm.enh.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDAIX uspchrp buffer overflowIBM AIX 5.2IBM AIX 5.3IBM AIX 6.1Buffer overflow in the uspchrp program in devices.chrp.base.diag in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX Kernel Buffer Overflow Lets Local Users Gain Elevated Privileges or Deny ServiceIBM AIX 5.3IBM AIX 6.1Buffer overflow in the kernel in IBM AIX 5.2, 5.3, and 6.1 allows local users to execute arbitrary code in kernel mode via unknown attack vectors.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX lquerypv Local Privilege Escalation VulnerabilityIBM AIX 5.2IBM AIX 5.3Multiple stack-based buffer overflows in IBM AIX 5.2 and 5.3 allow local users to gain privileges via a long argument to the (1) "-p" option to lqueryvg or (2) the "-V" option to lquerypv.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX Buffer Overflow in errpt Command May Let Local Users Gain Elevated PrivilegesIBM AIX 5.3IBM AIX 6.1Buffer overflow in errpt in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via unknown attack vectors.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDAIX pioout buffer overflowIBM AIX 5.2IBM AIX 5.3IBM AIX 6.1Buffer overflow in the pioout program in printers.rte in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via a long command line option.Michael WoodDRAFTINTERIMACCEPTEDAharon CherninINTERIMACCEPTEDACCEPTEDAIX utape buffer overflowIBM AIX 5.2IBM AIX 5.3IBM AIX 6.1Buffer overflow in the utape program in devices.scsi.tape.diag in IBM AIX 5.2 and 5.3 allows local users to gain privileges via unspecified vectors.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX lsmcode Environment Variable Bug Lets Local Users Gain Root PrivilegesIBM AIX 5.2IBM AIX 5.3IBM AIX 6.1The lsmcode program on IBM AIX 5.2, 5.3, and 6.1 does not properly handle environment variables, which allows local users to gain privileges, a different vulnerability than CVE-2004-1329.Michael WoodDRAFTINTERIMACCEPTEDMichael WoodINTERIMACCEPTEDACCEPTEDIBM AIX Buffer Overflow in 'reboot' Command Lets Local Users Execute Arbitrary CodeIBM AIX 5.2IBM AIX 5.3Stack-based buffer overflow in the reboot program on IBM AIX 5.2 and 5.3 allows local users in the shutdown group to gain privileges.Michael WoodDRAFTINTERIMACCEPTEDMichael WoodINTERIMACCEPTEDACCEPTEDIBM AIX buffer overflow in chcon command has unspecified impactIBM AIX 5.2IBM AIX 5.3Buffer overflow in the chcons (chcon) command in IBM AIX 5.2 and 5.3, when DEBUG MALLOC is enabled, might allow attackers to execute arbitrary code via a long command line argument.Yuzheng ZhouDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 'nddstat' Commands Let Local Users Gain Root PrivilegesIBM AIX 5.2IBM AIX 5.3IBM AIX 6.1The nddstat programs on IBM AIX 5.2, 5.3, and 6.1 do not properly handle environment variables, which allows local users to gain privileges by invoking (1) atmstat, (2) entstat, (3) fddistat, (4) hdlcstat, or (5) tokstat.Michael WoodDRAFTINTERIMACCEPTEDMichael WoodINTERIMACCEPTEDACCEPTEDIBM AIX Multiple Privilege Escalation and Security Bypass VulnerabilitiesIBM AIX 5.2IBM AIX 5.3The kernel in IBM AIX 5.2 and 5.3 does not properly handle resizing JFS2 filesystems on concurrent volume groups spread across multiple nodes, which allows local users of one node to cause a denial of service (remote node crash) by using chfs or lreducelv to reduce a filesystem's size.Michael WoodDRAFTINTERIMACCEPTEDMichael WoodINTERIMACCEPTEDACCEPTEDIBM AIX Input Validation Flaw in iostat Command Lets Local Users Gain Root PrivilegesIBM AIX 5.3IBM AIX 6.1Unspecified vulnerability in iostat in IBM AIX 5.2, 5.3, and 6.1 allows local users to gain privileges via unknown vectors related to an "environment variable handling error."Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX Multiple Privilege Escalation and Security Bypass VulnerabilitiesIBM AIX 5.2IBM AIX 5.3The proc filesystem in the kernel in IBM AIX 5.2 and 5.3 does not properly enforce directory permissions when a file executing from a directory has weaker permissions than the directory itself, which allows local users to obtain sensitive information.Michael WoodDRAFTINTERIMACCEPTEDMichael WoodINTERIMACCEPTEDACCEPTEDIBM AIX "man" Untrusted Binaries Path Privilege Escalation VulnerabilityIBM AIX 5.3IBM AIX 6.1Untrusted search path vulnerability in man in IBM AIX 6.1.0 allows local users to execute arbitrary code via a malicious program in the man directory.Yuzheng ZhouDRAFTINTERIMACCEPTEDMichael WoodINTERIMACCEPTEDACCEPTEDAIX bellmail buffer overflow vulnerabilityIBM AIX 5.2IBM AIX 5.3Stack-based buffer overflow in the sendrmt function in bellmail in IBM AIX 5.2 and 5.3 allows local users to execute arbitrary code via a long parameter to the m command.Yuzheng ZhouDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX Kernel Bugs Let Local Users Execute Arbitrary Code, Access Data, and Deny ServiceIBM AIX 5.2IBM AIX 5.3IBM AIX 6.1The checkpoint and restart feature in the kernel in IBM AIX 5.2, 5.3, and 6.1 does not properly protect kernel memory, which allows local users to read and modify portions of memory and gain privileges via unspecified vectors involving a restart of a 64-bit process, probably related to the as_getadsp64 function.Michael WoodDRAFTINTERIMACCEPTEDMichael WoodINTERIMACCEPTEDACCEPTEDIBM AIX 6100-00 is installedIBM AIX 6.1The operating system installed on the system is IBM AIX version 6100-00.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDAIX OpenSSH VulnerabilityIBM AIX 5.3IBM AIX 6.1IBM AIX 7.1The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.Sushant Kumar SinghDRAFTINTERIMACCEPTEDACCEPTEDAIX OpenSSH VulnerabilityIBM AIX 5.3IBM AIX 6.1IBM AIX 7.1The mm_newkeys_from_blob function in monitor_wrap.c in sshd in OpenSSH 6.2 and 6.3, when an AES-GCM cipher is used, does not properly initialize memory for a MAC context data structure, which allows remote authenticated users to bypass intended ForceCommand and login-shell restrictions via packet data that provides a crafted callback address.Sushant Kumar SinghDRAFTINTERIMACCEPTEDACCEPTEDAIX OpenSSH VulnerabilityIBM AIX 5.3IBM AIX 6.1IBM AIX 7.1The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.Sushant Kumar SinghDRAFTINTERIMACCEPTEDACCEPTEDAIX OpenSSH VulnerabilityIBM AIX 5.3IBM AIX 6.1IBM AIX 7.1The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.Sushant Kumar SinghDRAFTINTERIMACCEPTEDACCEPTEDVulnerability in AIX bindIBM AIX 5.3IBM AIX 6.1IBM AIX 7.1ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDACCEPTEDMultiple OpenSSL vulnerabilitiesIBM AIX 5.3IBM AIX 6.1IBM AIX 7.1The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.Chandan M CDRAFTChandan M CINTERIMACCEPTEDACCEPTEDAIX OpenSSH VulnerabilityIBM AIX 5.3IBM AIX 6.1IBM AIX 7.1The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDACCEPTEDPerl Digest Module Code Injection VulnerabilityIBM AIX 5.3IBM AIX 6.1IBM AIX 7.1Eval injection vulnerability in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDACCEPTEDIBM AIX 6100-06 is installedIBM AIX 6.1The operating system installed on the system is IBM AIX version 6100-06.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 7100-00 is installedIBM AIX 7.1The operating system installed on the system is IBM AIX version 7100-00.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 6100-05 is installedIBM AIX 6.1The operating system installed on the system is IBM AIX version 6100-05.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDMultiple OpenSSL vulnerabilitiesIBM AIX 5.3IBM AIX 6.1IBM AIX 7.1OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.Chandan M CDRAFTChandan M CINTERIMACCEPTEDACCEPTEDIBM AIX 6.1 is installedIBM AIX 6.1The operating system installed on the system is IBM AIX 6.1.Michael WoodMichael WoodDRAFTMichael WoodINTERIMACCEPTEDChandan M CINTERIMACCEPTEDACCEPTEDIBM AIX 7.1 is installedIBM AIX 7.1The operating system installed on the system is IBM AIX 7.1.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDAIX printer commands vulnerabilityIBM AIX 5.3IBM AIX 6.1IBM AIX 7.1Multiple buffer overflows in (1) mkque and (2) mkquedev in bos.rte.printers in IBM AIX 6.1 and 7.1 allow local users to gain privileges by leveraging printq group membership.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 7100-02 is installedIBM AIX 7.1The operating system installed on the system is IBM AIX version 7100-02.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 6100-08 is installedIBM AIX 6.1The operating system installed on the system is IBM AIX version 6100-08.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 6100-07 is installedIBM AIX 6.1The operating system installed on the system is IBM AIX version 6100-07.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 7100-01 is installedIBM AIX 7.1The operating system installed on the system is IBM AIX version 7100-01.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 5300-12 is installedIBM AIX 5.3The operating system installed on the system is IBM AIX version 7100-02.Chandan M CDRAFTINTERIMACCEPTEDACCEPTEDBuffer overflow in the drmgr command in IBM AIX 5.2 and 5.3 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long path name.IBM AIX 5.3IBM AIX 5.2Buffer overflow in the drmgr command in IBM AIX 5.2 and 5.3 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long path name.Aharon CherninDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 5300-00 through 5300-05 is installedIBM AIX 5.3The operating system installed on the system is IBM AIX version 5300-00 through 5300-05.Aharon CherninDRAFTINTERIMACCEPTEDShane ShafferINTERIMACCEPTEDACCEPTEDIBM AIX 5300-07 is installedIBM AIX 5.3The operating system installed on the system is IBM AIX version 5300-07.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 5200-10 is installedIBM AIX 5.2The operating system installed on the system is IBM AIX version 5200-10.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 5300-06 is installedIBM AIX 5.3The operating system installed on the system is IBM AIX version 5300-06.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDAIX security vulnerabilities in sa_snapIBM AIX 5.3Unspecified vulnerability in sa_snap in the bos.esagent fileset in IBM AIX 5.3 allows local users to leverage system group membership and delete files via unknown vectors.Yamini Mohan RDRAFTINTERIMACCEPTEDACCEPTEDAIX security vulnerabilities in sa_snapIBM AIX 5.3IBM AIX 6.1Buffer overflow in sa_snap in the bos.esagent fileset in IBM AIX 6.1, 5.3, and earlier and VIOS 2.1, 1.5, and earlier allows local users to leverage system group membership and gain privileges via unspecified vectors.Yamini Mohan RDRAFTINTERIMACCEPTEDACCEPTEDAIX xntpd denial-of-service vulnerabilityIBM AIX 5.3IBM AIX 6.1ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.Yamini Mohan RDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 6100-01 is installedIBM AIX 6.1The operating system installed on the system is IBM AIX version 6100-01.Aharon CherninDRAFTAharon CherninINTERIMACCEPTEDACCEPTEDIBM AIX 5300-08 is installedIBM AIX 5.3The operating system installed on the system is IBM AIX version 5300-08.Michael WoodDRAFTINTERIMACCEPTEDACCEPTEDAIX rpc.pcnfsd integer overflow vulnerability.IBM AIX 5.3IBM AIX 6.1Format string vulnerability in the _msgout function in rpc.pcnfsd in IBM AIX 6.1, 5.3, and earlier; IBM VIOS 2.1, 1.5, and earlier; NFS/ONCplus B.11.31_09 and earlier on HP HP-UX B.11.11, B.11.23, and B.11.31; and SGI IRIX 6.5 allows remote attackers to execute arbitrary code via an RPC request containing format string specifiers in an invalid directory name.Varun NarulaDRAFTINTERIMACCEPTEDR, Yamini MohanINTERIMACCEPTEDACCEPTEDIBM AIX 6100-04 is installedIBM AIX 6.1The operating system installed on the system is IBM AIX version 6100-04.J. Daniel BrownDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 6100-03 is installedIBM AIX 6.1The operating system installed on the system is IBM AIX version 6100-03.J. Daniel BrownDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 6100-02 is installedIBM AIX 6.1The operating system installed on the system is IBM AIX version 6100-02.Aharon CherninDRAFTAharon CherninINTERIMACCEPTEDACCEPTEDAIX ftpd buffer overflow vulnerability.IBM AIX 5.3Buffer overflow in ftpd in IBM AIX 5.3 and earlier allows remote attackers to execute arbitrary code via a long NLST command.Varun NarulaDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 5300-09 is installedIBM AIX 5.3The operating system installed on the system is IBM AIX version 5300-09.Aharon CherninDRAFTINTERIMACCEPTEDACCEPTEDAIX OpenSSL session renegotiation vulnerabilityIBM AIX 5.2IBM AIX 5.3IBM AIX 6.1The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.Yamini Mohan RDRAFTINTERIMACCEPTEDACCEPTEDIBM AIX 5.3 is installedIBM AIX 5.3The operating system installed on the system is IBM AIX 5.3.Yuzheng ZhouDRAFTINTERIMACCEPTEDMichael WoodINTERIMMichael WoodACCEPTEDACCEPTEDIBM AIX 5.2 is installedIBM AIX 5.2The operating system installed on the system is IBM AIX 5.2.Yuzheng ZhouDRAFTINTERIMACCEPTEDMichael WoodINTERIMMichael WoodACCEPTEDACCEPTEDIZ48495IZ48501IZ48562IZ48561IZ48496IZ48499IZ48500devices.common.IBM.atm.rteIZ48502IZ50399IZ50444IZ49024IZ50496IZ49278IZ49096IZ32051IZ32016IZ30238IZ34753IZ32172IZ34393IZ30231IZ50129IZ50139IZ50121IZ50445IZ50500IZ50447IZ50517bos.rte.libcbos.adt.profIZ43456IZ43458IZ43454IZ43453IZ43457IZ43455IZ43459IZ43452bos.rte.cronIZ41599IZ41510IZ42788IZ41593/usr/sbinrmsock/usr/sbinrmsock64IZ42786IZ42787IZ40386IZ42785IZ03060IZ03054IZ03392IZ28943IZ18334IZ18338IZ18335IZ18341IZ18339IY96101IY95874IY96905IY98340IY99517IY98448IY99537IZ00559IY98450IY98331IZ10828IZ07042IZ06317IZ06621IZ06261IZ06489IZ22369IZ22368IZ22370IZ05349IZ05971IZ05200IZ05877IZ06079IZ05129IZ21494IZ19905IZ22348IZ22347IZ22346IZ10844IZ10841IZ10843IZ10840IZ10842IZ11328/usr/lib/lpd/pio/etcpiooutIZ11687printers.rteIZ11214IZ06260IZ06315IZ06620IZ06488IZ07041IZ15277IZ15100IZ15276IZ14526IZ15057IZ06199IZ06078IZ15479IZ15480IY78241IY78253IZ14508IZ16975IZ17059IZ16991IZ17058IZ05246IZ04946IZ04953IZ22351IZ21506IZ22350IZ20635IZ22349IZ06663IZ06505IZ06022IZ17390IZ17372IZ17360IZ17177IZ12794IZ10749IZ16992IZ17111IZ11820openssh.base.serveropenssl.baseIV30247IV30367IV30368IV30364IV30185IV30365IV30366openssh.base.serverperl.rteopenssl.baseopenssl-fips.baseIV47428IV47427IV51388IV47430IV47429IY96753IY96772IY95054IZ82630IZ81819IZ82245bos.esagentIZ83975IZ84167IZ81819IZ82630IZ83942IZ82245IZ83909bos.esagentIZ71608IZ71614IZ71093IZ71611IZ68659IZ71613IZ71610IZ73681IZ73590IZ73599IZ75440IZ73874IZ73757IZ75465IZ75369bos.net.nfs.clientIZ83252IZ83276IZ83275IZ83274bos.net.tcp.clientopenssl.base6.1.1.06.1.0.05.3.0.605.3.8.05.3.9.05.2.0.515.2.0.976.1.2.05.3.0.635.3.7.26.1.0.15.3.7.05.3.8.06.1.0.05.3.9.26.1.1.06.1.0.86.1.2.35.3.7.06.1.1.45.3.8.65.3.7.86.1.1.06.1.0.95.3.8.55.3.9.25.3.7.86.1.2.35.3.9.05.3.0.06.1.0.06.1.1.46.1.2.05.3.7.05.3.8.05.3.0.715.3.0.636.1.1.26.1.2.06.1.1.05.3.0.05.3.7.06.1.0.05.3.8.16.1.0.15.2.0.1065.3.7.15.2.0.05.3.8.05.3.9.05300-005300-015300-066.1.0.05.3.7.06.1.2.26.1.1.3true5.3.0.725.3.9.25.3.7.75.3.8.66.1.0.7trueCOMMITTED5.3.0.05.3.0.645.2.0.1085.2.0.06100-006.0.0.61031.0.1.5006.0.0.61016100-067100-006100-055.8.8.05.10.1.05.10.1.505.8.8.1227100-006100-008100-007100-000.9.8.240012.9.8.24007100-026100-086100-077100-015300-125300-055300-075200-105300-06ALL_INSTALLED06.05.0012.000006.05.0012.00015300-1006.05.0011.0000ALL_INSTALLED06.05.0010.000306.05.0011.000406.05.0010.00005300-125300-1106.06.0005.000206.05.0010.00005300-1106.05.0010.000306.06.0004.000706.06.0002.000506.06.0003.000006.06.0004.000006.06.0005.000006.06.0003.000506.05.0012.000106.05.0011.00005300-1006.05.0012.0000ALL_INSTALLED5300-126100-0506.05.0011.000406.06.0002.00006100-015300-085.3.10.25.3.9.75.3.11.05.3.10.06.1.4.05300-105300-116.1.3.06.1.1.76.1.4.35.3.8.116.1.3.35.3.11.26.1.2.6ALL_INSTALLED6.1.1.06.1.2.05.3.8.06100-046100-036100-026100-055300-106.1.3.35300-115.3.11.06.1.4.05.3.11.35.3.10.35.3.10.05.3.12.06.1.3.06.1.2.76.1.5.06.1.5.05.3.12.05300-126.1.4.4ALL_INSTALLED5.3.9.55.3.9.06.1.2.05300-095.3.12.05.3.12.15.3.11.45300-115300-125300-10ALL_INSTALLED5.3.9.95.3.11.05.3.10.45.3.10.05.3.9.05300-005400-005200-005300-000.9.8.11020.9.8.80512.9.8.11026200-006100-00