March updates¶
2024-03-27¶
appstream x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| aspnetcore-runtime-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| aspnetcore-runtime-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| aspnetcore-runtime-dbg-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| aspnetcore-targeting-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| aspnetcore-targeting-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dnsmasq | 2.79-31.el8_9.2 | RHSA-2024:1335 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| dnsmasq-debuginfo | 2.79-31.el8_9.2 | ||
| dnsmasq-debugsource | 2.79-31.el8_9.2 | ||
| dnsmasq-utils | 2.79-31.el8_9.2 | RHSA-2024:1335 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| dnsmasq-utils-debuginfo | 2.79-31.el8_9.2 | ||
| dotnet | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-apphost-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-apphost-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-apphost-pack-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-host | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-host-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-hostfxr-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-hostfxr-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-hostfxr-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-runtime-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-runtime-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-runtime-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-runtime-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-runtime-dbg-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-sdk-7.0 | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-sdk-7.0-debuginfo | 7.0.117-1.el8_9 | ||
| dotnet-sdk-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-sdk-8.0-debuginfo | 8.0.103-1.el8_9 | ||
| dotnet-sdk-dbg-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-targeting-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-targeting-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-templates-7.0 | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-templates-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet7.0-debuginfo | 7.0.117-1.el8_9 | ||
| dotnet7.0-debugsource | 7.0.117-1.el8_9 | ||
| dotnet8.0-debuginfo | 8.0.103-1.el8_9 | ||
| dotnet8.0-debugsource | 8.0.103-1.el8_9 | ||
| netstandard-targeting-pack-2.1 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| ruby | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-bundled-gems | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-bundled-gems-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
| ruby-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
| ruby-debugsource | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
| ruby-default-gems | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-devel | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-doc | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-libs | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-libs-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-abrt | 0.4.0-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-abrt-doc | 0.4.0-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-bigdecimal | 3.1.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-bigdecimal-debuginfo | 3.1.1-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-bundler | 2.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-io-console | 0.5.11-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-io-console-debuginfo | 0.5.11-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-irb | 1.4.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-json | 2.6.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-json-debuginfo | 2.6.1-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-minitest | 5.15.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-mysql2 | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-mysql2-debuginfo | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-mysql2-debugsource | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-mysql2-doc | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-pg | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-pg-debuginfo | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-pg-debugsource | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-pg-doc | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-power_assert | 2.0.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-psych | 4.0.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-psych-debuginfo | 4.0.4-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-rake | 13.0.6-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-rbs | 2.7.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-rbs-debuginfo | 2.7.0-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-rdoc | 6.4.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-rexml | 3.2.5-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-rss | 0.2.9-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-test-unit | 3.5.3-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-typeprof | 0.21.3-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygems | 3.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygems-devel | 3.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| squid | 4.15-7.module+el8.9.0+21530+59b09a5b.10 | RHSA-2024:1375 | Security Advisory (CVE-2023-50269, CVE-2024-25111, CVE-2024-25617) |
| squid-debuginfo | 4.15-7.module+el8.9.0+21530+59b09a5b.10 | ||
| squid-debugsource | 4.15-7.module+el8.9.0+21530+59b09a5b.10 |
codeready-builder x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-apphost-pack-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-host-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-hostfxr-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-runtime-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-runtime-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-sdk-7.0-debuginfo | 7.0.117-1.el8_9 | ||
| dotnet-sdk-7.0-source-built-artifacts | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-sdk-8.0-debuginfo | 8.0.103-1.el8_9 | ||
| dotnet-sdk-8.0-source-built-artifacts | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet7.0-debuginfo | 7.0.117-1.el8_9 | ||
| dotnet7.0-debugsource | 7.0.117-1.el8_9 | ||
| dotnet8.0-debuginfo | 8.0.103-1.el8_9 | ||
| dotnet8.0-debugsource | 8.0.103-1.el8_9 |
appstream aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| aspnetcore-runtime-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| aspnetcore-runtime-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| aspnetcore-runtime-dbg-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| aspnetcore-targeting-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| aspnetcore-targeting-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dnsmasq | 2.79-31.el8_9.2 | RHSA-2024:1335 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| dnsmasq-debuginfo | 2.79-31.el8_9.2 | ||
| dnsmasq-debugsource | 2.79-31.el8_9.2 | ||
| dnsmasq-utils | 2.79-31.el8_9.2 | RHSA-2024:1335 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| dnsmasq-utils-debuginfo | 2.79-31.el8_9.2 | ||
| dotnet | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-apphost-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-apphost-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-apphost-pack-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-host | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-host-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-hostfxr-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-hostfxr-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-hostfxr-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-runtime-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-runtime-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-runtime-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-runtime-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-runtime-dbg-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-sdk-7.0 | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-sdk-7.0-debuginfo | 7.0.117-1.el8_9 | ||
| dotnet-sdk-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-sdk-8.0-debuginfo | 8.0.103-1.el8_9 | ||
| dotnet-sdk-dbg-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-targeting-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-targeting-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet-templates-7.0 | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-templates-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet7.0-debuginfo | 7.0.117-1.el8_9 | ||
| dotnet7.0-debugsource | 7.0.117-1.el8_9 | ||
| dotnet8.0-debuginfo | 8.0.103-1.el8_9 | ||
| dotnet8.0-debugsource | 8.0.103-1.el8_9 | ||
| netstandard-targeting-pack-2.1 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| ruby | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-bundled-gems | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-bundled-gems-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
| ruby-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
| ruby-debugsource | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
| ruby-default-gems | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-devel | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-doc | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-libs | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| ruby-libs-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-abrt | 0.4.0-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-abrt-doc | 0.4.0-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-bigdecimal | 3.1.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-bigdecimal-debuginfo | 3.1.1-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-bundler | 2.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-io-console | 0.5.11-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-io-console-debuginfo | 0.5.11-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-irb | 1.4.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-json | 2.6.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-json-debuginfo | 2.6.1-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-minitest | 5.15.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-mysql2 | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-mysql2-debuginfo | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-mysql2-debugsource | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-mysql2-doc | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-pg | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-pg-debuginfo | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-pg-debugsource | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-pg-doc | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-power_assert | 2.0.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-psych | 4.0.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-psych-debuginfo | 4.0.4-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-rake | 13.0.6-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-rbs | 2.7.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-rbs-debuginfo | 2.7.0-142.module+el8.9.0+21471+7d1e4a35 | ||
| rubygem-rdoc | 6.4.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-rexml | 3.2.5-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-rss | 0.2.9-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-test-unit | 3.5.3-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygem-typeprof | 0.21.3-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygems | 3.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| rubygems-devel | 3.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
| squid | 4.15-7.module+el8.9.0+21530+59b09a5b.10 | RHSA-2024:1375 | Security Advisory (CVE-2023-50269, CVE-2024-25111, CVE-2024-25617) |
| squid-debuginfo | 4.15-7.module+el8.9.0+21530+59b09a5b.10 | ||
| squid-debugsource | 4.15-7.module+el8.9.0+21530+59b09a5b.10 |
codeready-builder aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-apphost-pack-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-host-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-hostfxr-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-runtime-7.0-debuginfo | 7.0.17-1.el8_9 | ||
| dotnet-runtime-8.0-debuginfo | 8.0.3-1.el8_9 | ||
| dotnet-sdk-7.0-debuginfo | 7.0.117-1.el8_9 | ||
| dotnet-sdk-7.0-source-built-artifacts | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
| dotnet-sdk-8.0-debuginfo | 8.0.103-1.el8_9 | ||
| dotnet-sdk-8.0-source-built-artifacts | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
| dotnet7.0-debuginfo | 7.0.117-1.el8_9 | ||
| dotnet7.0-debugsource | 7.0.117-1.el8_9 | ||
| dotnet8.0-debuginfo | 8.0.103-1.el8_9 | ||
| dotnet8.0-debugsource | 8.0.103-1.el8_9 |
2024-03-20¶
appstream x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| aspnetcore-runtime-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| aspnetcore-targeting-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-apphost-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-apphost-pack-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-hostfxr-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-hostfxr-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-runtime-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-runtime-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-sdk-6.0 | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-sdk-6.0-debuginfo | 6.0.128-1.el8_9 | ||
| dotnet-targeting-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-templates-6.0 | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet6.0-debuginfo | 6.0.128-1.el8_9 | ||
| dotnet6.0-debugsource | 6.0.128-1.el8_9 |
codeready-builder x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| dotnet-apphost-pack-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-hostfxr-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-runtime-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-sdk-6.0-debuginfo | 6.0.128-1.el8_9 | ||
| dotnet-sdk-6.0-source-built-artifacts | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet6.0-debuginfo | 6.0.128-1.el8_9 | ||
| dotnet6.0-debugsource | 6.0.128-1.el8_9 |
appstream aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| aspnetcore-runtime-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| aspnetcore-targeting-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-apphost-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-apphost-pack-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-hostfxr-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-hostfxr-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-runtime-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-runtime-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-sdk-6.0 | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-sdk-6.0-debuginfo | 6.0.128-1.el8_9 | ||
| dotnet-targeting-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet-templates-6.0 | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet6.0-debuginfo | 6.0.128-1.el8_9 | ||
| dotnet6.0-debugsource | 6.0.128-1.el8_9 |
codeready-builder aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| dotnet-apphost-pack-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-hostfxr-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-runtime-6.0-debuginfo | 6.0.28-1.el8_9 | ||
| dotnet-sdk-6.0-debuginfo | 6.0.128-1.el8_9 | ||
| dotnet-sdk-6.0-source-built-artifacts | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
| dotnet6.0-debuginfo | 6.0.128-1.el8_9 | ||
| dotnet6.0-debugsource | 6.0.128-1.el8_9 |
2024-03-13¶
appstream x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| edk2-ovmf | 20220126gitbb1bba3d77-6.el8_9.6 | RHSA-2024:1063 | Security Advisory (CVE-2023-45230, CVE-2023-45234) |
appstream aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| edk2-aarch64 | 20220126gitbb1bba3d77-6.el8_9.6 | RHSA-2024:1063 | Security Advisory (CVE-2023-45230, CVE-2023-45234) |
2024-03-06¶
baseos x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| opensc | 0.20.0-8.el8_9 | RHSA-2024:0967 | Security Advisory (CVE-2023-5992) |
| opensc-debuginfo | 0.20.0-8.el8_9 | ||
| opensc-debugsource | 0.20.0-8.el8_9 |
appstream x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| firefox | 115.8.0-1.el8_9 | RHSA-2024:0955 | Security Advisory (CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553) |
| firefox-debuginfo | 115.8.0-1.el8_9 | ||
| firefox-debugsource | 115.8.0-1.el8_9 | ||
| pgaudit | 1.4.0-7.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| pgaudit-debuginfo | 1.4.0-7.module+el8.9.0+21289+7c796f9d | ||
| pgaudit-debugsource | 1.4.0-7.module+el8.9.0+21289+7c796f9d | ||
| postgresql | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-contrib | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-contrib | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-contrib | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-contrib | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-contrib-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-contrib-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-contrib-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-contrib-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-debugsource | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-debugsource | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-debugsource | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-debugsource | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-docs | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-docs | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-docs | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-docs | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-docs-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-docs-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-docs-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-docs-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-plperl | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-plperl | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-plperl | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-plperl | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-plperl-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-plperl-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-plperl-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-plperl-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-plpython3 | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-plpython3 | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-plpython3 | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-plpython3 | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-plpython3-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-plpython3-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-plpython3-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-plpython3-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-pltcl | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-pltcl | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-pltcl | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-pltcl | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-pltcl-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-pltcl-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-pltcl-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-pltcl-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-private-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-private-libs | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-private-libs-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-server | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-server | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-server | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-server | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-server-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-server-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-server-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-server-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-server-devel | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-server-devel | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-server-devel | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-server-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-server-devel-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-server-devel-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-server-devel-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-server-devel-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-static | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-static | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-static | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-static | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-test | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-test | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-test | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-test | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-test-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-test-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-test-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-test-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-test-rpm-macros | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-test-rpm-macros | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-test-rpm-macros | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-test-rpm-macros | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-upgrade-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-upgrade-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-upgrade-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-upgrade-devel | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade-devel | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade-devel | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade-devel-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-upgrade-devel-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-upgrade-devel-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-upgrade-devel-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| python3-unbound | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| python3-unbound-debuginfo | 1.16.2-5.el8_9.2 | ||
| scap-security-guide | 0.1.72-2.el8_9 | RHBA-2024:0987 | Bug Fix Advisory |
| scap-security-guide-doc | 0.1.72-2.el8_9 | RHBA-2024:0987 | Bug Fix Advisory |
| thunderbird | 115.8.0-1.el8_9 | RHSA-2024:0964 | Security Advisory (CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553) |
| thunderbird-debuginfo | 115.8.0-1.el8_9 | ||
| thunderbird-debugsource | 115.8.0-1.el8_9 | ||
| unbound | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| unbound-debuginfo | 1.16.2-5.el8_9.2 | ||
| unbound-debugsource | 1.16.2-5.el8_9.2 | ||
| unbound-devel | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| unbound-libs | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| unbound-libs-debuginfo | 1.16.2-5.el8_9.2 |
baseos aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| opensc | 0.20.0-8.el8_9 | RHSA-2024:0967 | Security Advisory (CVE-2023-5992) |
| opensc-debuginfo | 0.20.0-8.el8_9 | ||
| opensc-debugsource | 0.20.0-8.el8_9 |
appstream aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| firefox | 115.8.0-1.el8_9 | RHSA-2024:0955 | Security Advisory (CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553) |
| firefox-debuginfo | 115.8.0-1.el8_9 | ||
| firefox-debugsource | 115.8.0-1.el8_9 | ||
| pgaudit | 1.4.0-7.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| pgaudit-debuginfo | 1.4.0-7.module+el8.9.0+21289+7c796f9d | ||
| pgaudit-debugsource | 1.4.0-7.module+el8.9.0+21289+7c796f9d | ||
| postgresql | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-contrib | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-contrib | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-contrib | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-contrib | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-contrib-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-contrib-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-contrib-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-contrib-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-debugsource | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-debugsource | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-debugsource | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-debugsource | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-docs | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-docs | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-docs | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-docs | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-docs-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-docs-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-docs-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-docs-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-plperl | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-plperl | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-plperl | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-plperl | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-plperl-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-plperl-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-plperl-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-plperl-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-plpython3 | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-plpython3 | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-plpython3 | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-plpython3 | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-plpython3-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-plpython3-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-plpython3-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-plpython3-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-pltcl | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-pltcl | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-pltcl | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-pltcl | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-pltcl-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-pltcl-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-pltcl-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-pltcl-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-private-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-private-libs | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-private-libs-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-server | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-server | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-server | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-server | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-server-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-server-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-server-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-server-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-server-devel | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-server-devel | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-server-devel | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-server-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-server-devel-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-server-devel-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-server-devel-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-server-devel-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-static | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-static | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-static | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-static | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-test | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-test | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-test | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-test | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-test-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-test-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-test-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-test-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-test-rpm-macros | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-test-rpm-macros | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-test-rpm-macros | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-test-rpm-macros | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-upgrade-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-upgrade-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-upgrade-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| postgresql-upgrade-devel | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade-devel | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade-devel | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
| postgresql-upgrade-devel-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
| postgresql-upgrade-devel-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
| postgresql-upgrade-devel-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
| postgresql-upgrade-devel-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
| python3-unbound | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| python3-unbound-debuginfo | 1.16.2-5.el8_9.2 | ||
| scap-security-guide | 0.1.72-2.el8_9 | RHBA-2024:0987 | Bug Fix Advisory |
| scap-security-guide-doc | 0.1.72-2.el8_9 | RHBA-2024:0987 | Bug Fix Advisory |
| thunderbird | 115.8.0-1.el8_9 | RHSA-2024:0964 | Security Advisory (CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553) |
| thunderbird-debuginfo | 115.8.0-1.el8_9 | ||
| thunderbird-debugsource | 115.8.0-1.el8_9 | ||
| unbound | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| unbound-debuginfo | 1.16.2-5.el8_9.2 | ||
| unbound-debugsource | 1.16.2-5.el8_9.2 | ||
| unbound-devel | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| unbound-libs | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
| unbound-libs-debuginfo | 1.16.2-5.el8_9.2 |