Latest production System Updates for Red Hat Enterprise Linux 9 (RHEL9)¶
Please verify that your system is up to date, running as root:
/usr/bin/dnf check-update
If the above command shows you available updates apply these, running as root:
/usr/bin/dnf update
or if you only want to apply security updates, run as root:
/usr/bin/dnf --security update
To receive notifications of updates, please sign up to the e-group linux-announce-rhel.
For more information about software repositories please check: RHEL9 software repositories
2024-04-17¶
baseos x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
less | 590-3.el9_3 | RHSA-2024:1692 | Security Advisory (CVE-2022-48624) |
less-debuginfo | 590-3.el9_3 | ||
less-debugsource | 590-3.el9_3 | ||
sos | 4.7.0-1.el9 | RHBA-2024:1739 | Bug Fix Advisory |
sos-audit | 4.7.0-1.el9 | RHBA-2024:1739 | Bug Fix Advisory |
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
aspnetcore-runtime-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
aspnetcore-runtime-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
aspnetcore-runtime-dbg-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
aspnetcore-targeting-pack-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
aspnetcore-targeting-pack-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
aspnetcore-targeting-pack-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-apphost-pack-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-apphost-pack-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-apphost-pack-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-apphost-pack-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-apphost-pack-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-apphost-pack-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-host | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-host-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-hostfxr-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-hostfxr-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-hostfxr-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-hostfxr-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-hostfxr-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-hostfxr-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-runtime-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-runtime-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-runtime-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-runtime-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-runtime-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-runtime-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-runtime-dbg-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-sdk-6.0 | 6.0.129-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-sdk-6.0-debuginfo | 6.0.129-1.el9_3 | ||
dotnet-sdk-7.0 | 7.0.118-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-sdk-7.0-debuginfo | 7.0.118-1.el9_3 | ||
dotnet-sdk-8.0 | 8.0.104-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-sdk-8.0-debuginfo | 8.0.104-1.el9_3 | ||
dotnet-sdk-dbg-8.0 | 8.0.104-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-targeting-pack-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-targeting-pack-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-targeting-pack-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-templates-6.0 | 6.0.129-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-templates-7.0 | 7.0.118-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-templates-8.0 | 8.0.104-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet6.0-debuginfo | 6.0.129-1.el9_3 | ||
dotnet6.0-debugsource | 6.0.129-1.el9_3 | ||
dotnet7.0-debuginfo | 7.0.118-1.el9_3 | ||
dotnet7.0-debugsource | 7.0.118-1.el9_3 | ||
dotnet8.0-debuginfo | 8.0.104-1.el9_3 | ||
dotnet8.0-debugsource | 8.0.104-1.el9_3 | ||
netstandard-targeting-pack-2.1 | 8.0.104-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
nodejs | 20.11.1-1.module+el9.3.0+21385+bac43d5a | RHSA-2024:1688 | Security Advisory (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019) |
nodejs-debuginfo | 20.11.1-1.module+el9.3.0+21385+bac43d5a | ||
nodejs-debugsource | 20.11.1-1.module+el9.3.0+21385+bac43d5a | ||
nodejs-devel | 20.11.1-1.module+el9.3.0+21385+bac43d5a | RHSA-2024:1688 | Security Advisory (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019) |
nodejs-docs | 20.11.1-1.module+el9.3.0+21385+bac43d5a | RHSA-2024:1688 | Security Advisory (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019) |
nodejs-full-i18n | 20.11.1-1.module+el9.3.0+21385+bac43d5a | RHSA-2024:1688 | Security Advisory (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019) |
npm | 10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a | RHSA-2024:1688 | Security Advisory (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019) |
varnish | 6.6.2-4.el9_3.1 | RHSA-2024:1691 | Security Advisory (CVE-2024-30156) |
varnish-docs | 6.6.2-4.el9_3.1 | RHSA-2024:1691 | Security Advisory (CVE-2024-30156) |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-apphost-pack-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-apphost-pack-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-host-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-hostfxr-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-hostfxr-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-hostfxr-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-runtime-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-runtime-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-runtime-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-sdk-6.0-debuginfo | 6.0.129-1.el9_3 | ||
dotnet-sdk-6.0-source-built-artifacts | 6.0.129-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-sdk-7.0-debuginfo | 7.0.118-1.el9_3 | ||
dotnet-sdk-7.0-source-built-artifacts | 7.0.118-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-sdk-8.0-debuginfo | 8.0.104-1.el9_3 | ||
dotnet-sdk-8.0-source-built-artifacts | 8.0.104-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet6.0-debuginfo | 6.0.129-1.el9_3 | ||
dotnet6.0-debugsource | 6.0.129-1.el9_3 | ||
dotnet7.0-debuginfo | 7.0.118-1.el9_3 | ||
dotnet7.0-debugsource | 7.0.118-1.el9_3 | ||
dotnet8.0-debuginfo | 8.0.104-1.el9_3 | ||
dotnet8.0-debugsource | 8.0.104-1.el9_3 | ||
varnish-devel | 6.6.2-4.el9_3.1 | RHSA-2024:1691 | Security Advisory (CVE-2024-30156) |
baseos aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
expat | 2.5.0-1.el9_3.1 | RHSA-2024:1530 | Security Advisory (CVE-2023-52425, CVE-2024-28757) |
expat-debuginfo | 2.5.0-1.el9_3.1 | ||
expat-debugsource | 2.5.0-1.el9_3.1 | ||
less | 590-3.el9_3 | RHSA-2024:1692 | Security Advisory (CVE-2022-48624) |
less-debuginfo | 590-3.el9_3 | ||
less-debugsource | 590-3.el9_3 | ||
sos | 4.7.0-1.el9 | RHBA-2024:1739 | Bug Fix Advisory |
sos-audit | 4.7.0-1.el9 | RHBA-2024:1739 | Bug Fix Advisory |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
aspnetcore-runtime-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
aspnetcore-runtime-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
aspnetcore-runtime-dbg-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
aspnetcore-targeting-pack-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
aspnetcore-targeting-pack-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
aspnetcore-targeting-pack-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-apphost-pack-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-apphost-pack-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-apphost-pack-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-apphost-pack-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-apphost-pack-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-apphost-pack-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-host | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-host-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-hostfxr-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-hostfxr-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-hostfxr-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-hostfxr-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-hostfxr-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-hostfxr-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-runtime-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-runtime-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-runtime-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-runtime-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-runtime-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-runtime-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-runtime-dbg-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-sdk-6.0 | 6.0.129-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-sdk-6.0-debuginfo | 6.0.129-1.el9_3 | ||
dotnet-sdk-7.0 | 7.0.118-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-sdk-7.0-debuginfo | 7.0.118-1.el9_3 | ||
dotnet-sdk-8.0 | 8.0.104-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-sdk-8.0-debuginfo | 8.0.104-1.el9_3 | ||
dotnet-sdk-dbg-8.0 | 8.0.104-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-targeting-pack-6.0 | 6.0.29-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-targeting-pack-7.0 | 7.0.18-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-targeting-pack-8.0 | 8.0.4-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet-templates-6.0 | 6.0.129-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-templates-7.0 | 7.0.118-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-templates-8.0 | 8.0.104-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet6.0-debuginfo | 6.0.129-1.el9_3 | ||
dotnet6.0-debugsource | 6.0.129-1.el9_3 | ||
dotnet7.0-debuginfo | 7.0.118-1.el9_3 | ||
dotnet7.0-debugsource | 7.0.118-1.el9_3 | ||
dotnet8.0-debuginfo | 8.0.104-1.el9_3 | ||
dotnet8.0-debugsource | 8.0.104-1.el9_3 | ||
expat-debuginfo | 2.5.0-1.el9_3.1 | ||
expat-debugsource | 2.5.0-1.el9_3.1 | ||
expat-devel | 2.5.0-1.el9_3.1 | RHSA-2024:1530 | Security Advisory (CVE-2023-52425, CVE-2024-28757) |
firefox | 115.9.1-1.el9_3 | RHSA-2024:1485 | Security Advisory (CVE-2023-5388, CVE-2024-0743, CVE-2024-2607, CVE-2024-2608, CVE-2024-2610, CVE-2024-2611, CVE-2024-2612, CVE-2024-2614, CVE-2024-2616, CVE-2024-29944) |
firefox-debuginfo | 115.9.1-1.el9_3 | ||
firefox-debugsource | 115.9.1-1.el9_3 | ||
firefox-x11 | 115.9.1-1.el9_3 | RHSA-2024:1485 | Security Advisory (CVE-2023-5388, CVE-2024-0743, CVE-2024-2607, CVE-2024-2608, CVE-2024-2610, CVE-2024-2611, CVE-2024-2612, CVE-2024-2614, CVE-2024-2616, CVE-2024-29944) |
go-toolset | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang-bin | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang-docs | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang-misc | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang-src | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang-tests | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
grafana | 9.2.10-8.el9_3 | RHSA-2024:1501 | Security Advisory (CVE-2024-1394) |
grafana-debuginfo | 9.2.10-8.el9_3 | ||
grafana-debugsource | 9.2.10-8.el9_3 | ||
grafana-pcp | 5.1.1-2.el9_3 | RHSA-2024:1502 | Security Advisory (CVE-2024-1394) |
grafana-pcp-debuginfo | 5.1.1-2.el9_3 | ||
grafana-pcp-debugsource | 5.1.1-2.el9_3 | ||
netstandard-targeting-pack-2.1 | 8.0.104-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
nodejs | 18.19.1-1.module+el9.3.0+21388+22892fb9 | RHSA-2024:1503 | Security Advisory (CVE-2023-46809, CVE-2024-21892, CVE-2024-22019) |
nodejs | 20.11.1-1.module+el9.3.0+21385+bac43d5a | RHSA-2024:1688 | Security Advisory (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019) |
nodejs-debuginfo | 18.19.1-1.module+el9.3.0+21388+22892fb9 | ||
nodejs-debuginfo | 20.11.1-1.module+el9.3.0+21385+bac43d5a | ||
nodejs-debugsource | 18.19.1-1.module+el9.3.0+21388+22892fb9 | ||
nodejs-debugsource | 20.11.1-1.module+el9.3.0+21385+bac43d5a | ||
nodejs-devel | 18.19.1-1.module+el9.3.0+21388+22892fb9 | RHSA-2024:1503 | Security Advisory (CVE-2023-46809, CVE-2024-21892, CVE-2024-22019) |
nodejs-devel | 20.11.1-1.module+el9.3.0+21385+bac43d5a | RHSA-2024:1688 | Security Advisory (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019) |
nodejs-docs | 18.19.1-1.module+el9.3.0+21388+22892fb9 | RHSA-2024:1503 | Security Advisory (CVE-2023-46809, CVE-2024-21892, CVE-2024-22019) |
nodejs-docs | 20.11.1-1.module+el9.3.0+21385+bac43d5a | RHSA-2024:1688 | Security Advisory (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019) |
nodejs-full-i18n | 18.19.1-1.module+el9.3.0+21388+22892fb9 | RHSA-2024:1503 | Security Advisory (CVE-2023-46809, CVE-2024-21892, CVE-2024-22019) |
nodejs-full-i18n | 20.11.1-1.module+el9.3.0+21385+bac43d5a | RHSA-2024:1688 | Security Advisory (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019) |
npm | 10.2.4-1.18.19.1.1.module+el9.3.0+21388+22892fb9 | RHSA-2024:1503 | Security Advisory (CVE-2023-46809, CVE-2024-21892, CVE-2024-22019) |
npm | 10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a | RHSA-2024:1688 | Security Advisory (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019) |
ruby | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-bundled-gems | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-bundled-gems-debuginfo | 3.1.4-143.module+el9.3.0+21558+96b51efd | ||
ruby-debuginfo | 3.1.4-143.module+el9.3.0+21558+96b51efd | ||
ruby-debugsource | 3.1.4-143.module+el9.3.0+21558+96b51efd | ||
ruby-default-gems | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-devel | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-doc | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-libs | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-libs-debuginfo | 3.1.4-143.module+el9.3.0+21558+96b51efd | ||
rubygem-bigdecimal | 3.1.1-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-bigdecimal-debuginfo | 3.1.1-143.module+el9.3.0+21558+96b51efd | ||
rubygem-bundler | 2.3.26-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-io-console | 0.5.11-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-io-console-debuginfo | 0.5.11-143.module+el9.3.0+21558+96b51efd | ||
rubygem-irb | 1.4.1-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-json | 2.6.1-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-json-debuginfo | 2.6.1-143.module+el9.3.0+21558+96b51efd | ||
rubygem-minitest | 5.15.0-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-power_assert | 2.0.1-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-psych | 4.0.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-psych-debuginfo | 4.0.4-143.module+el9.3.0+21558+96b51efd | ||
rubygem-rake | 13.0.6-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rbs | 2.7.0-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rbs-debuginfo | 2.7.0-143.module+el9.3.0+21558+96b51efd | ||
rubygem-rdoc | 6.4.0-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rexml | 3.2.5-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rss | 0.2.9-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-test-unit | 3.5.3-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-typeprof | 0.21.3-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygems | 3.3.26-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygems-devel | 3.3.26-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
thunderbird | 115.9.0-1.el9_3 | RHSA-2024:1493 | Security Advisory (CVE-2023-5388, CVE-2024-0743, CVE-2024-1936, CVE-2024-2607, CVE-2024-2608, CVE-2024-2610, CVE-2024-2611, CVE-2024-2612, CVE-2024-2614) |
thunderbird-debuginfo | 115.9.0-1.el9_3 | ||
thunderbird-debugsource | 115.9.0-1.el9_3 | ||
varnish | 6.6.2-4.el9_3.1 | RHSA-2024:1691 | Security Advisory (CVE-2024-30156) |
varnish-docs | 6.6.2-4.el9_3.1 | RHSA-2024:1691 | Security Advisory (CVE-2024-30156) |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-apphost-pack-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-apphost-pack-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-host-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-hostfxr-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-hostfxr-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-hostfxr-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-runtime-6.0-debuginfo | 6.0.29-1.el9_3 | ||
dotnet-runtime-7.0-debuginfo | 7.0.18-1.el9_3 | ||
dotnet-runtime-8.0-debuginfo | 8.0.4-1.el9_3 | ||
dotnet-sdk-6.0-debuginfo | 6.0.129-1.el9_3 | ||
dotnet-sdk-6.0-source-built-artifacts | 6.0.129-1.el9_3 | RHBA-2024:1738 | Bug Fix Advisory |
dotnet-sdk-7.0-debuginfo | 7.0.118-1.el9_3 | ||
dotnet-sdk-7.0-source-built-artifacts | 7.0.118-1.el9_3 | RHBA-2024:1736 | Bug Fix Advisory |
dotnet-sdk-8.0-debuginfo | 8.0.104-1.el9_3 | ||
dotnet-sdk-8.0-source-built-artifacts | 8.0.104-1.el9_3 | RHBA-2024:1734 | Bug Fix Advisory |
dotnet6.0-debuginfo | 6.0.129-1.el9_3 | ||
dotnet6.0-debugsource | 6.0.129-1.el9_3 | ||
dotnet7.0-debuginfo | 7.0.118-1.el9_3 | ||
dotnet7.0-debugsource | 7.0.118-1.el9_3 | ||
dotnet8.0-debuginfo | 8.0.104-1.el9_3 | ||
dotnet8.0-debugsource | 8.0.104-1.el9_3 | ||
varnish-devel | 6.6.2-4.el9_3.1 | RHSA-2024:1691 | Security Advisory (CVE-2024-30156) |
2024-04-10¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
ruby | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-bundled-gems | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-bundled-gems-debuginfo | 3.1.4-143.module+el9.3.0+21558+96b51efd | ||
ruby-debuginfo | 3.1.4-143.module+el9.3.0+21558+96b51efd | ||
ruby-debugsource | 3.1.4-143.module+el9.3.0+21558+96b51efd | ||
ruby-default-gems | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-devel | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-doc | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-libs | 3.1.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-libs-debuginfo | 3.1.4-143.module+el9.3.0+21558+96b51efd | ||
rubygem-bigdecimal | 3.1.1-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-bigdecimal-debuginfo | 3.1.1-143.module+el9.3.0+21558+96b51efd | ||
rubygem-bundler | 2.3.26-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-io-console | 0.5.11-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-io-console-debuginfo | 0.5.11-143.module+el9.3.0+21558+96b51efd | ||
rubygem-irb | 1.4.1-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-json | 2.6.1-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-json-debuginfo | 2.6.1-143.module+el9.3.0+21558+96b51efd | ||
rubygem-minitest | 5.15.0-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-power_assert | 2.0.1-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-psych | 4.0.4-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-psych-debuginfo | 4.0.4-143.module+el9.3.0+21558+96b51efd | ||
rubygem-rake | 13.0.6-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rbs | 2.7.0-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rbs-debuginfo | 2.7.0-143.module+el9.3.0+21558+96b51efd | ||
rubygem-rdoc | 6.4.0-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rexml | 3.2.5-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rss | 0.2.9-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-test-unit | 3.5.3-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-typeprof | 0.21.3-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygems | 3.3.26-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygems-devel | 3.3.26-143.module+el9.3.0+21558+96b51efd | RHSA-2024:1576 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
2024-04-03¶
baseos x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
expat | 2.5.0-1.el9_3.1 | RHSA-2024:1530 | Security Advisory (CVE-2023-52425, CVE-2024-28757) |
expat-debuginfo | 2.5.0-1.el9_3.1 | ||
expat-debugsource | 2.5.0-1.el9_3.1 |
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
expat-debuginfo | 2.5.0-1.el9_3.1 | ||
expat-debugsource | 2.5.0-1.el9_3.1 | ||
expat-devel | 2.5.0-1.el9_3.1 | RHSA-2024:1530 | Security Advisory (CVE-2023-52425, CVE-2024-28757) |
firefox | 115.9.1-1.el9_3 | RHSA-2024:1485 | Security Advisory (CVE-2023-5388, CVE-2024-0743, CVE-2024-2607, CVE-2024-2608, CVE-2024-2610, CVE-2024-2611, CVE-2024-2612, CVE-2024-2614, CVE-2024-2616, CVE-2024-29944) |
firefox-debuginfo | 115.9.1-1.el9_3 | ||
firefox-debugsource | 115.9.1-1.el9_3 | ||
firefox-x11 | 115.9.1-1.el9_3 | RHSA-2024:1485 | Security Advisory (CVE-2023-5388, CVE-2024-0743, CVE-2024-2607, CVE-2024-2608, CVE-2024-2610, CVE-2024-2611, CVE-2024-2612, CVE-2024-2614, CVE-2024-2616, CVE-2024-29944) |
go-toolset | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang-bin | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang-docs | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang-misc | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang-src | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
golang-tests | 1.20.12-2.el9_3 | RHSA-2024:1462 | Security Advisory (CVE-2024-1394) |
grafana | 9.2.10-8.el9_3 | RHSA-2024:1501 | Security Advisory (CVE-2024-1394) |
grafana-debuginfo | 9.2.10-8.el9_3 | ||
grafana-debugsource | 9.2.10-8.el9_3 | ||
grafana-pcp | 5.1.1-2.el9_3 | RHSA-2024:1502 | Security Advisory (CVE-2024-1394) |
grafana-pcp-debuginfo | 5.1.1-2.el9_3 | ||
grafana-pcp-debugsource | 5.1.1-2.el9_3 | ||
nodejs | 16.20.2-4.el9_3 | RHSA-2024:1438 | Security Advisory (CVE-2024-22019) |
nodejs | 18.19.1-1.module+el9.3.0+21388+22892fb9 | RHSA-2024:1503 | Security Advisory (CVE-2023-46809, CVE-2024-21892, CVE-2024-22019) |
nodejs-debuginfo | 16.20.2-4.el9_3 | ||
nodejs-debuginfo | 18.19.1-1.module+el9.3.0+21388+22892fb9 | ||
nodejs-debugsource | 16.20.2-4.el9_3 | ||
nodejs-debugsource | 18.19.1-1.module+el9.3.0+21388+22892fb9 | ||
nodejs-devel | 18.19.1-1.module+el9.3.0+21388+22892fb9 | RHSA-2024:1503 | Security Advisory (CVE-2023-46809, CVE-2024-21892, CVE-2024-22019) |
nodejs-docs | 16.20.2-4.el9_3 | RHSA-2024:1438 | Security Advisory (CVE-2024-22019) |
nodejs-docs | 18.19.1-1.module+el9.3.0+21388+22892fb9 | RHSA-2024:1503 | Security Advisory (CVE-2023-46809, CVE-2024-21892, CVE-2024-22019) |
nodejs-full-i18n | 16.20.2-4.el9_3 | RHSA-2024:1438 | Security Advisory (CVE-2024-22019) |
nodejs-full-i18n | 18.19.1-1.module+el9.3.0+21388+22892fb9 | RHSA-2024:1503 | Security Advisory (CVE-2023-46809, CVE-2024-21892, CVE-2024-22019) |
nodejs-libs | 16.20.2-4.el9_3 | RHSA-2024:1438 | Security Advisory (CVE-2024-22019) |
nodejs-libs-debuginfo | 16.20.2-4.el9_3 | ||
npm | 10.2.4-1.18.19.1.1.module+el9.3.0+21388+22892fb9 | RHSA-2024:1503 | Security Advisory (CVE-2023-46809, CVE-2024-21892, CVE-2024-22019) |
npm | 8.19.4-1.16.20.2.4.el9_3 | RHSA-2024:1438 | Security Advisory (CVE-2024-22019) |
postgresql-jdbc | 42.2.28-1.el9_3 | RHSA-2024:1436 | Security Advisory (CVE-2024-1597) |
thunderbird | 115.9.0-1.el9_3 | RHSA-2024:1493 | Security Advisory (CVE-2023-5388, CVE-2024-0743, CVE-2024-1936, CVE-2024-2607, CVE-2024-2608, CVE-2024-2610, CVE-2024-2611, CVE-2024-2612, CVE-2024-2614) |
thunderbird-debuginfo | 115.9.0-1.el9_3 | ||
thunderbird-debugsource | 115.9.0-1.el9_3 |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
nodejs | 16.20.2-4.el9_3 | RHSA-2024:1438 | Security Advisory (CVE-2024-22019) |
nodejs-debuginfo | 16.20.2-4.el9_3 | ||
nodejs-debugsource | 16.20.2-4.el9_3 | ||
nodejs-docs | 16.20.2-4.el9_3 | RHSA-2024:1438 | Security Advisory (CVE-2024-22019) |
nodejs-full-i18n | 16.20.2-4.el9_3 | RHSA-2024:1438 | Security Advisory (CVE-2024-22019) |
nodejs-libs | 16.20.2-4.el9_3 | RHSA-2024:1438 | Security Advisory (CVE-2024-22019) |
nodejs-libs-debuginfo | 16.20.2-4.el9_3 | ||
npm | 8.19.4-1.16.20.2.4.el9_3 | RHSA-2024:1438 | Security Advisory (CVE-2024-22019) |
postgresql-jdbc | 42.2.28-1.el9_3 | RHSA-2024:1436 | Security Advisory (CVE-2024-1597) |
2024-03-27¶
baseos x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
kmod-kvdo | 8.2.1.6-102.el9_3 | RHBA-2024:1361 | Bug Fix Advisory |
kmod-kvdo-debuginfo | 8.2.1.6-102.el9_3 | ||
kmod-kvdo-debugsource | 8.2.1.6-102.el9_3 |
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
aspnetcore-runtime-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
aspnetcore-runtime-dbg-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
aspnetcore-targeting-pack-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
aspnetcore-targeting-pack-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
autocorr-af | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-bg | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ca | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-cs | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-da | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-de | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-dsb | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-el | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-en | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-es | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-fa | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-fi | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-fr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ga | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-hr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-hsb | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-hu | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-is | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-it | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ja | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ko | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-lb | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-lt | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-mn | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-nl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-pl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-pt | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ro | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ru | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-sk | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-sl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-sr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-sv | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-tr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-vi | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-vro | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-zh | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
dnsmasq | 2.85-14.el9_3.1 | RHSA-2024:1334 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
dnsmasq-debuginfo | 2.85-14.el9_3.1 | ||
dnsmasq-debugsource | 2.85-14.el9_3.1 | ||
dnsmasq-utils | 2.85-14.el9_3.1 | RHSA-2024:1334 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
dnsmasq-utils-debuginfo | 2.85-14.el9_3.1 | ||
dotnet-apphost-pack-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-apphost-pack-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-apphost-pack-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-host | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-host-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-hostfxr-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-hostfxr-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-hostfxr-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-runtime-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-runtime-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-runtime-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-runtime-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-runtime-dbg-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-7.0 | 7.0.117-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-7.0-debuginfo | 7.0.117-1.el9_3 | ||
dotnet-sdk-8.0 | 8.0.103-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-8.0-debuginfo | 8.0.103-2.el9_3 | ||
dotnet-sdk-dbg-8.0 | 8.0.103-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-targeting-pack-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-targeting-pack-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-templates-7.0 | 7.0.117-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-templates-8.0 | 8.0.103-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet7.0-debuginfo | 7.0.117-1.el9_3 | ||
dotnet7.0-debugsource | 7.0.117-1.el9_3 | ||
dotnet8.0-debuginfo | 8.0.103-2.el9_3 | ||
dotnet8.0-debugsource | 8.0.103-2.el9_3 | ||
ipa-client | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-client-common | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-client-debuginfo | 4.10.2-8.el9_3 | ||
ipa-client-epn | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-client-samba | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-common | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-debuginfo | 4.10.2-8.el9_3 | ||
ipa-debugsource | 4.10.2-8.el9_3 | ||
ipa-selinux | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-server | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-server-common | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-server-debuginfo | 4.10.2-8.el9_3 | ||
ipa-server-dns | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-server-trust-ad | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-server-trust-ad-debuginfo | 4.10.2-8.el9_3 | ||
libreoffice | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-base | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-base-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-calc | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-calc-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-core | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-core-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-data | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-debugsource | 7.1.8.1-12.el9_3 | ||
libreoffice-draw | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-emailmerge | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-filters | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-gdb-debug-support | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-glade-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-graphicfilter | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-graphicfilter-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-gtk3 | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-gtk3-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-help-ar | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-bg | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-bn | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-ca | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-cs | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-da | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-de | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-dz | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-el | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-en | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-eo | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-es | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-et | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-eu | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-fi | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-fr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-gl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-gu | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-he | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-hi | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-hr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-hu | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-id | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-it | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-ja | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-ko | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-lt | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-lv | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-nb | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-nl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-nn | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-pl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-pt-BR | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-pt-PT | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-ro | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-ru | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-si | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-sk | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-sl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-sv | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-ta | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-tr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-uk | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-zh-Hans | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-help-zh-Hant | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-impress | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-impress-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-langpack-af | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ar | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-as | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-bg | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-bn | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-br | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ca | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-cs | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-cy | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-da | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-de | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-dz | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-el | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-en | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-eo | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-es | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-et | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-eu | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-fa | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-fi | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-fr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-fy | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ga | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-gl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-gu | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-he | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-hi | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-hr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-hu | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-id | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-it | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ja | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-kk | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-kn | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ko | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-lt | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-lv | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-mai | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ml | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-mr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-nb | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-nl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-nn | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-nr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-nso | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-or | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-pa | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-pl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-pt-BR | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-pt-PT | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ro | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ru | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-si | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-sk | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-sl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-sr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ss | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-st | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-sv | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ta | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-te | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-th | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-tn | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-tr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ts | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-uk | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-ve | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-xh | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-zh-Hans | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-zh-Hant | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-langpack-zu | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-math | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-officebean-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-ogltrans | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-ogltrans-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-opensymbol-fonts | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-pdfimport | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-pdfimport-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-postgresql-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-pyuno | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-pyuno-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-sdk-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-ure | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-ure-common | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-ure-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-wiki-publisher | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-writer | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-writer-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-x11 | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-x11-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-xsltfilter | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreofficekit | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreofficekit-debuginfo | 7.1.8.1-12.el9_3 | ||
netstandard-targeting-pack-2.1 | 8.0.103-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
python3-ipaclient | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
python3-ipalib | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
python3-ipaserver | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
squid | 5.5-6.el9_3.8 | RHSA-2024:1376 | Security Advisory (CVE-2023-50269, CVE-2024-25111, CVE-2024-25617) |
squid-debuginfo | 5.5-6.el9_3.8 | ||
squid-debugsource | 5.5-6.el9_3.8 |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-apphost-pack-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-host-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-hostfxr-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-runtime-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-runtime-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-sdk-7.0-debuginfo | 7.0.117-1.el9_3 | ||
dotnet-sdk-7.0-source-built-artifacts | 7.0.117-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-8.0-debuginfo | 8.0.103-2.el9_3 | ||
dotnet-sdk-8.0-source-built-artifacts | 8.0.103-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet7.0-debuginfo | 7.0.117-1.el9_3 | ||
dotnet7.0-debugsource | 7.0.117-1.el9_3 | ||
dotnet8.0-debuginfo | 8.0.103-2.el9_3 | ||
dotnet8.0-debugsource | 8.0.103-2.el9_3 | ||
libreoffice-base-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-calc-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-core-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-debugsource | 7.1.8.1-12.el9_3 | ||
libreoffice-glade-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-graphicfilter-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-gtk3-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-impress-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-officebean-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-ogltrans-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-pdfimport-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-postgresql-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-pyuno-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-sdk | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-sdk-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-sdk-doc | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-ure-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-writer-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-x11-debuginfo | 7.1.8.1-12.el9_3 | ||
libreofficekit-debuginfo | 7.1.8.1-12.el9_3 | ||
python3-ipatests | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
baseos aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
kmod-kvdo | 8.2.1.6-102.el9_3 | RHBA-2024:1361 | Bug Fix Advisory |
kmod-kvdo-debuginfo | 8.2.1.6-102.el9_3 | ||
kmod-kvdo-debugsource | 8.2.1.6-102.el9_3 |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
aspnetcore-runtime-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
aspnetcore-runtime-dbg-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
aspnetcore-targeting-pack-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
aspnetcore-targeting-pack-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
autocorr-af | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-bg | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ca | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-cs | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-da | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-de | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-dsb | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-el | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-en | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-es | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-fa | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-fi | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-fr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ga | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-hr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-hsb | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-hu | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-is | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-it | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ja | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ko | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-lb | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-lt | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-mn | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-nl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-pl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-pt | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ro | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-ru | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-sk | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-sl | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-sr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-sv | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-tr | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-vi | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-vro | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
autocorr-zh | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
dnsmasq | 2.85-14.el9_3.1 | RHSA-2024:1334 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
dnsmasq-debuginfo | 2.85-14.el9_3.1 | ||
dnsmasq-debugsource | 2.85-14.el9_3.1 | ||
dnsmasq-utils | 2.85-14.el9_3.1 | RHSA-2024:1334 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
dnsmasq-utils-debuginfo | 2.85-14.el9_3.1 | ||
dotnet-apphost-pack-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-apphost-pack-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-apphost-pack-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-host | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-host-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-hostfxr-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-hostfxr-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-hostfxr-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-runtime-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-runtime-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-runtime-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-runtime-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-runtime-dbg-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-7.0 | 7.0.117-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-7.0-debuginfo | 7.0.117-1.el9_3 | ||
dotnet-sdk-8.0 | 8.0.103-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-8.0-debuginfo | 8.0.103-2.el9_3 | ||
dotnet-sdk-dbg-8.0 | 8.0.103-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-targeting-pack-7.0 | 7.0.17-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-targeting-pack-8.0 | 8.0.3-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet-templates-7.0 | 7.0.117-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-templates-8.0 | 8.0.103-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet7.0-debuginfo | 7.0.117-1.el9_3 | ||
dotnet7.0-debugsource | 7.0.117-1.el9_3 | ||
dotnet8.0-debuginfo | 8.0.103-2.el9_3 | ||
dotnet8.0-debugsource | 8.0.103-2.el9_3 | ||
ipa-client | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-client-common | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-client-debuginfo | 4.10.2-8.el9_3 | ||
ipa-client-epn | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-client-samba | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-common | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-debuginfo | 4.10.2-8.el9_3 | ||
ipa-debugsource | 4.10.2-8.el9_3 | ||
ipa-selinux | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-server | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-server-common | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-server-debuginfo | 4.10.2-8.el9_3 | ||
ipa-server-dns | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-server-trust-ad | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
ipa-server-trust-ad-debuginfo | 4.10.2-8.el9_3 | ||
libreoffice-base-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-calc | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-calc-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-core | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-core-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-data | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-debugsource | 7.1.8.1-12.el9_3 | ||
libreoffice-glade-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-graphicfilter | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-graphicfilter-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-gtk3-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-help-en | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-impress | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-impress-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-langpack-en | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-officebean-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-ogltrans | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-ogltrans-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-opensymbol-fonts | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-pdfimport | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-pdfimport-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-postgresql-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-pyuno | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-pyuno-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-sdk-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-ure | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-ure-common | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-ure-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-writer | 7.1.8.1-12.el9_3 | RHSA-2024:1427 | Security Advisory (CVE-2023-6185, CVE-2023-6186) |
libreoffice-writer-debuginfo | 7.1.8.1-12.el9_3 | ||
libreoffice-x11-debuginfo | 7.1.8.1-12.el9_3 | ||
libreofficekit-debuginfo | 7.1.8.1-12.el9_3 | ||
netstandard-targeting-pack-2.1 | 8.0.103-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
python3-ipaclient | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
python3-ipalib | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
python3-ipaserver | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |
squid | 5.5-6.el9_3.8 | RHSA-2024:1376 | Security Advisory (CVE-2023-50269, CVE-2024-25111, CVE-2024-25617) |
squid-debuginfo | 5.5-6.el9_3.8 | ||
squid-debugsource | 5.5-6.el9_3.8 |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-apphost-pack-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-host-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-hostfxr-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-runtime-7.0-debuginfo | 7.0.17-1.el9_3 | ||
dotnet-runtime-8.0-debuginfo | 8.0.3-2.el9_3 | ||
dotnet-sdk-7.0-debuginfo | 7.0.117-1.el9_3 | ||
dotnet-sdk-7.0-source-built-artifacts | 7.0.117-1.el9_3 | RHSA-2024:1309 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-8.0-debuginfo | 8.0.103-2.el9_3 | ||
dotnet-sdk-8.0-source-built-artifacts | 8.0.103-2.el9_3 | RHSA-2024:1310 | Security Advisory (CVE-2024-21392) |
dotnet7.0-debuginfo | 7.0.117-1.el9_3 | ||
dotnet7.0-debugsource | 7.0.117-1.el9_3 | ||
dotnet8.0-debuginfo | 8.0.103-2.el9_3 | ||
dotnet8.0-debugsource | 8.0.103-2.el9_3 | ||
python3-ipatests | 4.10.2-8.el9_3 | RHBA-2024:1337 | Bug Fix Advisory |