October updates¶
2023-10-25¶
CERN x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| cern-anaconda-addon | 1.11-1.rh9.cern | ||
| useraddcern | 1.2-1.rh9.cern |
baseos x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| curl | 7.76.1-23.el9_2.4 | RHSA-2023:5763 | Security Advisory (CVE-2023-38545, CVE-2023-38546) |
| curl-debuginfo | 7.76.1-23.el9_2.4 | ||
| curl-debugsource | 7.76.1-23.el9_2.4 | ||
| curl-minimal | 7.76.1-23.el9_2.4 | RHSA-2023:5763 | Security Advisory (CVE-2023-38545, CVE-2023-38546) |
| curl-minimal-debuginfo | 7.76.1-23.el9_2.4 | ||
| libcurl | 7.76.1-23.el9_2.4 | RHSA-2023:5763 | Security Advisory (CVE-2023-38545, CVE-2023-38546) |
| libcurl-debuginfo | 7.76.1-23.el9_2.4 | ||
| libcurl-minimal | 7.76.1-23.el9_2.4 | RHSA-2023:5763 | Security Advisory (CVE-2023-38545, CVE-2023-38546) |
| libcurl-minimal-debuginfo | 7.76.1-23.el9_2.4 |
appstream x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| aspnetcore-runtime-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| aspnetcore-runtime-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| aspnetcore-targeting-pack-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| aspnetcore-targeting-pack-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| bind | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-chroot | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-debugsource | 9.16.23-11.el9_2.2 | ||
| bind-dnssec-doc | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-dnssec-utils | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-dnssec-utils-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-libs | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-libs-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-license | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-utils | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-utils-debuginfo | 9.16.23-11.el9_2.2 | ||
| curl-debuginfo | 7.76.1-23.el9_2.4 | ||
| curl-debugsource | 7.76.1-23.el9_2.4 | ||
| curl-minimal-debuginfo | 7.76.1-23.el9_2.4 | ||
| dotnet-apphost-pack-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-apphost-pack-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-apphost-pack-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-apphost-pack-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-host | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-host-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-hostfxr-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-hostfxr-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-hostfxr-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-hostfxr-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-runtime-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-runtime-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-runtime-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-runtime-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-sdk-6.0 | 6.0.123-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-sdk-6.0-debuginfo | 6.0.123-1.el9_2 | ||
| dotnet-sdk-7.0 | 7.0.112-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-sdk-7.0-debuginfo | 7.0.112-1.el9_2 | ||
| dotnet-targeting-pack-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-targeting-pack-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-templates-6.0 | 6.0.123-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-templates-7.0 | 7.0.112-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet6.0-debuginfo | 6.0.123-1.el9_2 | ||
| dotnet6.0-debugsource | 6.0.123-1.el9_2 | ||
| dotnet7.0-debuginfo | 7.0.112-1.el9_2 | ||
| dotnet7.0-debugsource | 7.0.112-1.el9_2 | ||
| galera | 26.4.14-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| galera-debuginfo | 26.4.14-1.el9_2 | ||
| galera-debugsource | 26.4.14-1.el9_2 | ||
| go-toolset | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-bin | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-docs | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-misc | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-race | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-src | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-tests | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| libcurl-debuginfo | 7.76.1-23.el9_2.4 | ||
| libcurl-devel | 7.76.1-23.el9_2.4 | RHSA-2023:5763 | Security Advisory (CVE-2023-38545, CVE-2023-38546) |
| libcurl-minimal-debuginfo | 7.76.1-23.el9_2.4 | ||
| mariadb | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-backup | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-backup-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-common | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-debugsource | 10.5.22-1.el9_2 | ||
| mariadb-embedded | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-embedded-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-errmsg | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-gssapi-server | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-gssapi-server-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-oqgraph-engine | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-oqgraph-engine-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-pam | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-pam-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-server | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-server-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-server-galera | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-server-utils | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-server-utils-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-test-debuginfo | 10.5.22-1.el9_2 | ||
| netstandard-targeting-pack-2.1 | 7.0.112-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| nginx | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-all-modules | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-core | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-core-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-debugsource | 1.20.1-14.el9_2.1 | ||
| nginx-filesystem | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-http-image-filter | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-http-image-filter-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-http-perl | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-http-perl-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-http-xslt-filter | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-http-xslt-filter-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-mail | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-mail-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-stream | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-stream-debuginfo | 1.20.1-14.el9_2.1 | ||
| nodejs | 16.20.2-3.el9_2 | RHSA-2023:5765 | Security Advisory (CVE-2023-44487) |
| nodejs-debuginfo | 16.20.2-3.el9_2 | ||
| nodejs-debugsource | 16.20.2-3.el9_2 | ||
| nodejs-docs | 16.20.2-3.el9_2 | RHSA-2023:5765 | Security Advisory (CVE-2023-44487) |
| nodejs-full-i18n | 16.20.2-3.el9_2 | RHSA-2023:5765 | Security Advisory (CVE-2023-44487) |
| nodejs-libs | 16.20.2-3.el9_2 | RHSA-2023:5765 | Security Advisory (CVE-2023-44487) |
| nodejs-libs-debuginfo | 16.20.2-3.el9_2 | ||
| npm | 8.19.4-1.16.20.2.3.el9_2 | RHSA-2023:5765 | Security Advisory (CVE-2023-44487) |
| python3-bind | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
codeready-builder x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| bind-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-debugsource | 9.16.23-11.el9_2.2 | ||
| bind-devel | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-dnssec-utils-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-doc | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-libs-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-utils-debuginfo | 9.16.23-11.el9_2.2 | ||
| dotnet-apphost-pack-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-apphost-pack-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-host-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-hostfxr-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-hostfxr-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-runtime-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-runtime-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-sdk-6.0-debuginfo | 6.0.123-1.el9_2 | ||
| dotnet-sdk-6.0-source-built-artifacts | 6.0.123-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-sdk-7.0-debuginfo | 7.0.112-1.el9_2 | ||
| dotnet-sdk-7.0-source-built-artifacts | 7.0.112-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet6.0-debuginfo | 6.0.123-1.el9_2 | ||
| dotnet6.0-debugsource | 6.0.123-1.el9_2 | ||
| dotnet7.0-debuginfo | 7.0.112-1.el9_2 | ||
| dotnet7.0-debugsource | 7.0.112-1.el9_2 | ||
| mariadb-backup-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-debugsource | 10.5.22-1.el9_2 | ||
| mariadb-devel | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-embedded-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-embedded-devel | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-gssapi-server-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-oqgraph-engine-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-pam-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-server-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-server-utils-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-test | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-test-debuginfo | 10.5.22-1.el9_2 | ||
| nginx-core-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-debugsource | 1.20.1-14.el9_2.1 | ||
| nginx-mod-devel | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-http-image-filter-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-http-perl-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-http-xslt-filter-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-mail-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-stream-debuginfo | 1.20.1-14.el9_2.1 |
CERN aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| cern-anaconda-addon | 1.11-1.rh9.cern | ||
| useraddcern | 1.2-1.rh9.cern |
baseos aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| curl | 7.76.1-23.el9_2.4 | RHSA-2023:5763 | Security Advisory (CVE-2023-38545, CVE-2023-38546) |
| curl-debuginfo | 7.76.1-23.el9_2.4 | ||
| curl-debugsource | 7.76.1-23.el9_2.4 | ||
| curl-minimal | 7.76.1-23.el9_2.4 | RHSA-2023:5763 | Security Advisory (CVE-2023-38545, CVE-2023-38546) |
| curl-minimal-debuginfo | 7.76.1-23.el9_2.4 | ||
| libcurl | 7.76.1-23.el9_2.4 | RHSA-2023:5763 | Security Advisory (CVE-2023-38545, CVE-2023-38546) |
| libcurl-debuginfo | 7.76.1-23.el9_2.4 | ||
| libcurl-minimal | 7.76.1-23.el9_2.4 | RHSA-2023:5763 | Security Advisory (CVE-2023-38545, CVE-2023-38546) |
| libcurl-minimal-debuginfo | 7.76.1-23.el9_2.4 |
appstream aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| aspnetcore-runtime-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| aspnetcore-runtime-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| aspnetcore-targeting-pack-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| aspnetcore-targeting-pack-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| bind | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-chroot | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-debugsource | 9.16.23-11.el9_2.2 | ||
| bind-dnssec-doc | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-dnssec-utils | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-dnssec-utils-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-libs | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-libs-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-license | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-utils | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-utils-debuginfo | 9.16.23-11.el9_2.2 | ||
| curl-debuginfo | 7.76.1-23.el9_2.4 | ||
| curl-debugsource | 7.76.1-23.el9_2.4 | ||
| curl-minimal-debuginfo | 7.76.1-23.el9_2.4 | ||
| dotnet-apphost-pack-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-apphost-pack-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-apphost-pack-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-apphost-pack-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-host | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-host-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-hostfxr-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-hostfxr-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-hostfxr-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-hostfxr-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-runtime-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-runtime-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-runtime-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-runtime-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-sdk-6.0 | 6.0.123-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-sdk-6.0-debuginfo | 6.0.123-1.el9_2 | ||
| dotnet-sdk-7.0 | 7.0.112-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-sdk-7.0-debuginfo | 7.0.112-1.el9_2 | ||
| dotnet-targeting-pack-6.0 | 6.0.23-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-targeting-pack-7.0 | 7.0.12-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet-templates-6.0 | 6.0.123-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-templates-7.0 | 7.0.112-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet6.0-debuginfo | 6.0.123-1.el9_2 | ||
| dotnet6.0-debugsource | 6.0.123-1.el9_2 | ||
| dotnet7.0-debuginfo | 7.0.112-1.el9_2 | ||
| dotnet7.0-debugsource | 7.0.112-1.el9_2 | ||
| galera | 26.4.14-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| galera-debuginfo | 26.4.14-1.el9_2 | ||
| galera-debugsource | 26.4.14-1.el9_2 | ||
| go-toolset | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-bin | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-docs | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-misc | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-src | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| golang-tests | 1.19.13-1.el9_2 | RHSA-2023:5738 | Security Advisory (CVE-2023-29406, CVE-2023-29409, CVE-2023-39325, CVE-2023-44487) |
| libcurl-debuginfo | 7.76.1-23.el9_2.4 | ||
| libcurl-devel | 7.76.1-23.el9_2.4 | RHSA-2023:5763 | Security Advisory (CVE-2023-38545, CVE-2023-38546) |
| libcurl-minimal-debuginfo | 7.76.1-23.el9_2.4 | ||
| mariadb | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-backup | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-backup-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-common | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-debugsource | 10.5.22-1.el9_2 | ||
| mariadb-embedded | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-embedded-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-errmsg | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-gssapi-server | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-gssapi-server-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-oqgraph-engine | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-oqgraph-engine-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-pam | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-pam-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-server | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-server-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-server-galera | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-server-utils | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-server-utils-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-test-debuginfo | 10.5.22-1.el9_2 | ||
| netstandard-targeting-pack-2.1 | 7.0.112-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| nginx | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-all-modules | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-core | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-core-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-debugsource | 1.20.1-14.el9_2.1 | ||
| nginx-filesystem | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-http-image-filter | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-http-image-filter-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-http-perl | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-http-perl-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-http-xslt-filter | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-http-xslt-filter-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-mail | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-mail-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-stream | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-stream-debuginfo | 1.20.1-14.el9_2.1 | ||
| nodejs | 16.20.2-3.el9_2 | RHSA-2023:5765 | Security Advisory (CVE-2023-44487) |
| nodejs-debuginfo | 16.20.2-3.el9_2 | ||
| nodejs-debugsource | 16.20.2-3.el9_2 | ||
| nodejs-docs | 16.20.2-3.el9_2 | RHSA-2023:5765 | Security Advisory (CVE-2023-44487) |
| nodejs-full-i18n | 16.20.2-3.el9_2 | RHSA-2023:5765 | Security Advisory (CVE-2023-44487) |
| nodejs-libs | 16.20.2-3.el9_2 | RHSA-2023:5765 | Security Advisory (CVE-2023-44487) |
| nodejs-libs-debuginfo | 16.20.2-3.el9_2 | ||
| npm | 8.19.4-1.16.20.2.3.el9_2 | RHSA-2023:5765 | Security Advisory (CVE-2023-44487) |
| python3-bind | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
codeready-builder aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| bind-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-debugsource | 9.16.23-11.el9_2.2 | ||
| bind-devel | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-dnssec-utils-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-doc | 9.16.23-11.el9_2.2 | RHSA-2023:5689 | Security Advisory (CVE-2023-3341) |
| bind-libs-debuginfo | 9.16.23-11.el9_2.2 | ||
| bind-utils-debuginfo | 9.16.23-11.el9_2.2 | ||
| dotnet-apphost-pack-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-apphost-pack-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-host-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-hostfxr-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-hostfxr-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-runtime-6.0-debuginfo | 6.0.23-1.el9_2 | ||
| dotnet-runtime-7.0-debuginfo | 7.0.12-1.el9_2 | ||
| dotnet-sdk-6.0-debuginfo | 6.0.123-1.el9_2 | ||
| dotnet-sdk-6.0-source-built-artifacts | 6.0.123-1.el9_2 | RHSA-2023:5708 | Security Advisory (CVE-2023-44487) |
| dotnet-sdk-7.0-debuginfo | 7.0.112-1.el9_2 | ||
| dotnet-sdk-7.0-source-built-artifacts | 7.0.112-1.el9_2 | RHSA-2023:5749 | Security Advisory (CVE-2023-44487) |
| dotnet6.0-debuginfo | 6.0.123-1.el9_2 | ||
| dotnet6.0-debugsource | 6.0.123-1.el9_2 | ||
| dotnet7.0-debuginfo | 7.0.112-1.el9_2 | ||
| dotnet7.0-debugsource | 7.0.112-1.el9_2 | ||
| mariadb-backup-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-debugsource | 10.5.22-1.el9_2 | ||
| mariadb-devel | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-embedded-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-embedded-devel | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-gssapi-server-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-oqgraph-engine-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-pam-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-server-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-server-utils-debuginfo | 10.5.22-1.el9_2 | ||
| mariadb-test | 10.5.22-1.el9_2 | RHSA-2023:5684 | Security Advisory (CVE-2022-32081, CVE-2022-32082, CVE-2022-32084, CVE-2022-32089, CVE-2022-32091, CVE-2022-38791, CVE-2022-47015, CVE-2023-5157) |
| mariadb-test-debuginfo | 10.5.22-1.el9_2 | ||
| nginx-core-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-debugsource | 1.20.1-14.el9_2.1 | ||
| nginx-mod-devel | 1.20.1-14.el9_2.1 | RHSA-2023:5711 | Security Advisory (CVE-2023-44487) |
| nginx-mod-http-image-filter-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-http-perl-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-http-xslt-filter-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-mail-debuginfo | 1.20.1-14.el9_2.1 | ||
| nginx-mod-stream-debuginfo | 1.20.1-14.el9_2.1 |
2023-10-18¶
baseos x86_64 repository¶
appstream x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| firefox | 115.3.1-1.el9_2 | RHSA-2023:5434 | Security Advisory (CVE-2023-3600, CVE-2023-5169, CVE-2023-5171, CVE-2023-5176, CVE-2023-5217) |
| firefox-debuginfo | 115.3.1-1.el9_2 | ||
| firefox-debugsource | 115.3.1-1.el9_2 | ||
| firefox-x11 | 115.3.1-1.el9_2 | RHSA-2023:5434 | Security Advisory (CVE-2023-3600, CVE-2023-5169, CVE-2023-5171, CVE-2023-5176, CVE-2023-5217) |
| ghostscript | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-debuginfo | 9.54.0-10.el9_2 | ||
| ghostscript-debugsource | 9.54.0-10.el9_2 | ||
| ghostscript-doc | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-gtk-debuginfo | 9.54.0-10.el9_2 | ||
| ghostscript-tools-dvipdf | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-tools-fonts | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-tools-printing | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-x11 | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-x11-debuginfo | 9.54.0-10.el9_2 | ||
| glibc-benchtests-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-common-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-debugsource | 2.34-60.el9_2.7 | ||
| glibc-devel | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-doc | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-gconv-extra-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-headers | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-locale-source | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-utils | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-utils-debuginfo | 2.34-60.el9_2.7 | ||
| libgs | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| libgs-debuginfo | 9.54.0-10.el9_2 | ||
| libnsl-debuginfo | 2.34-60.el9_2.7 | ||
| libvpx | 1.9.0-7.el9_2 | RHSA-2023:5539 | Security Advisory (CVE-2023-44488, CVE-2023-5217) |
| libvpx-debuginfo | 1.9.0-7.el9_2 | ||
| libvpx-debugsource | 1.9.0-7.el9_2 | ||
| libvpx-utils-debuginfo | 1.9.0-7.el9_2 | ||
| nodejs | 16.20.2-1.el9_2 | RHSA-2023:5532 | Security Advisory (CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-debuginfo | 16.20.2-1.el9_2 | ||
| nodejs-debugsource | 16.20.2-1.el9_2 | ||
| nodejs-docs | 16.20.2-1.el9_2 | RHSA-2023:5532 | Security Advisory (CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-full-i18n | 16.20.2-1.el9_2 | RHSA-2023:5532 | Security Advisory (CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-libs | 16.20.2-1.el9_2 | RHSA-2023:5532 | Security Advisory (CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-libs-debuginfo | 16.20.2-1.el9_2 | ||
| npm | 8.19.4-1.16.20.2.1.el9_2 | RHSA-2023:5532 | Security Advisory (CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nscd-debuginfo | 2.34-60.el9_2.7 | ||
| nss_db-debuginfo | 2.34-60.el9_2.7 | ||
| nss_hesiod-debuginfo | 2.34-60.el9_2.7 | ||
| python-unversioned-command | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3-devel | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3-tkinter | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3.11 | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.11-debuginfo | 3.11.2-2.el9_2.2 | ||
| python3.11-debugsource | 3.11.2-2.el9_2.2 | ||
| python3.11-devel | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.11-libs | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.11-tkinter | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.9-debuginfo | 3.9.16-1.el9_2.2 | ||
| python3.9-debugsource | 3.9.16-1.el9_2.2 | ||
| thunderbird | 115.3.1-1.el9_2 | RHSA-2023:5435 | Security Advisory (CVE-2023-3600, CVE-2023-5169, CVE-2023-5171, CVE-2023-5176, CVE-2023-5217) |
| thunderbird-debuginfo | 115.3.1-1.el9_2 | ||
| thunderbird-debugsource | 115.3.1-1.el9_2 |
codeready-builder x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| ghostscript-debuginfo | 9.54.0-10.el9_2 | ||
| ghostscript-debugsource | 9.54.0-10.el9_2 | ||
| ghostscript-gtk-debuginfo | 9.54.0-10.el9_2 | ||
| ghostscript-x11-debuginfo | 9.54.0-10.el9_2 | ||
| glibc-benchtests | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-benchtests-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-common-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-debugsource | 2.34-60.el9_2.7 | ||
| glibc-gconv-extra-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-nss-devel | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-static | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-utils-debuginfo | 2.34-60.el9_2.7 | ||
| libgs-debuginfo | 9.54.0-10.el9_2 | ||
| libgs-devel | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| libnsl-debuginfo | 2.34-60.el9_2.7 | ||
| libvpx-debuginfo | 1.9.0-7.el9_2 | ||
| libvpx-debugsource | 1.9.0-7.el9_2 | ||
| libvpx-devel | 1.9.0-7.el9_2 | RHSA-2023:5539 | Security Advisory (CVE-2023-44488, CVE-2023-5217) |
| libvpx-utils-debuginfo | 1.9.0-7.el9_2 | ||
| nscd-debuginfo | 2.34-60.el9_2.7 | ||
| nss_db | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| nss_db-debuginfo | 2.34-60.el9_2.7 | ||
| nss_hesiod | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| nss_hesiod-debuginfo | 2.34-60.el9_2.7 | ||
| python3-debug | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3-idle | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3-test | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3.11-debug | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.11-debuginfo | 3.11.2-2.el9_2.2 | ||
| python3.11-debugsource | 3.11.2-2.el9_2.2 | ||
| python3.11-idle | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.11-test | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.9-debuginfo | 3.9.16-1.el9_2.2 | ||
| python3.9-debugsource | 3.9.16-1.el9_2.2 |
baseos aarch64 repository¶
appstream aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| firefox | 115.3.1-1.el9_2 | RHSA-2023:5434 | Security Advisory (CVE-2023-3600, CVE-2023-5169, CVE-2023-5171, CVE-2023-5176, CVE-2023-5217) |
| firefox-debuginfo | 115.3.1-1.el9_2 | ||
| firefox-debugsource | 115.3.1-1.el9_2 | ||
| firefox-x11 | 115.3.1-1.el9_2 | RHSA-2023:5434 | Security Advisory (CVE-2023-3600, CVE-2023-5169, CVE-2023-5171, CVE-2023-5176, CVE-2023-5217) |
| ghostscript | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-debuginfo | 9.54.0-10.el9_2 | ||
| ghostscript-debugsource | 9.54.0-10.el9_2 | ||
| ghostscript-doc | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-gtk-debuginfo | 9.54.0-10.el9_2 | ||
| ghostscript-tools-dvipdf | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-tools-fonts | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-tools-printing | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-x11 | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| ghostscript-x11-debuginfo | 9.54.0-10.el9_2 | ||
| glibc-benchtests-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-common-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-debugsource | 2.34-60.el9_2.7 | ||
| glibc-devel | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-doc | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-gconv-extra-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-locale-source | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-utils | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-utils-debuginfo | 2.34-60.el9_2.7 | ||
| libgs | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| libgs-debuginfo | 9.54.0-10.el9_2 | ||
| libnsl-debuginfo | 2.34-60.el9_2.7 | ||
| libvpx | 1.9.0-7.el9_2 | RHSA-2023:5539 | Security Advisory (CVE-2023-44488, CVE-2023-5217) |
| libvpx-debuginfo | 1.9.0-7.el9_2 | ||
| libvpx-debugsource | 1.9.0-7.el9_2 | ||
| libvpx-utils-debuginfo | 1.9.0-7.el9_2 | ||
| nodejs | 16.20.2-1.el9_2 | RHSA-2023:5532 | Security Advisory (CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-debuginfo | 16.20.2-1.el9_2 | ||
| nodejs-debugsource | 16.20.2-1.el9_2 | ||
| nodejs-docs | 16.20.2-1.el9_2 | RHSA-2023:5532 | Security Advisory (CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-full-i18n | 16.20.2-1.el9_2 | RHSA-2023:5532 | Security Advisory (CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-libs | 16.20.2-1.el9_2 | RHSA-2023:5532 | Security Advisory (CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-libs-debuginfo | 16.20.2-1.el9_2 | ||
| npm | 8.19.4-1.16.20.2.1.el9_2 | RHSA-2023:5532 | Security Advisory (CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nscd-debuginfo | 2.34-60.el9_2.7 | ||
| nss_db-debuginfo | 2.34-60.el9_2.7 | ||
| nss_hesiod-debuginfo | 2.34-60.el9_2.7 | ||
| python-unversioned-command | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3-devel | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3-tkinter | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3.11 | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.11-debuginfo | 3.11.2-2.el9_2.2 | ||
| python3.11-debugsource | 3.11.2-2.el9_2.2 | ||
| python3.11-devel | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.11-libs | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.11-tkinter | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.9-debuginfo | 3.9.16-1.el9_2.2 | ||
| python3.9-debugsource | 3.9.16-1.el9_2.2 | ||
| thunderbird | 115.3.1-1.el9_2 | RHSA-2023:5435 | Security Advisory (CVE-2023-3600, CVE-2023-5169, CVE-2023-5171, CVE-2023-5176, CVE-2023-5217) |
| thunderbird-debuginfo | 115.3.1-1.el9_2 | ||
| thunderbird-debugsource | 115.3.1-1.el9_2 |
codeready-builder aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| ghostscript-debuginfo | 9.54.0-10.el9_2 | ||
| ghostscript-debugsource | 9.54.0-10.el9_2 | ||
| ghostscript-gtk-debuginfo | 9.54.0-10.el9_2 | ||
| ghostscript-x11-debuginfo | 9.54.0-10.el9_2 | ||
| glibc-benchtests | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-benchtests-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-common-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-debugsource | 2.34-60.el9_2.7 | ||
| glibc-gconv-extra-debuginfo | 2.34-60.el9_2.7 | ||
| glibc-nss-devel | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-static | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| glibc-utils-debuginfo | 2.34-60.el9_2.7 | ||
| libgs-debuginfo | 9.54.0-10.el9_2 | ||
| libgs-devel | 9.54.0-10.el9_2 | RHSA-2023:5459 | Security Advisory (CVE-2023-36664) |
| libnsl-debuginfo | 2.34-60.el9_2.7 | ||
| libvpx-debuginfo | 1.9.0-7.el9_2 | ||
| libvpx-debugsource | 1.9.0-7.el9_2 | ||
| libvpx-devel | 1.9.0-7.el9_2 | RHSA-2023:5539 | Security Advisory (CVE-2023-44488, CVE-2023-5217) |
| libvpx-utils-debuginfo | 1.9.0-7.el9_2 | ||
| nscd-debuginfo | 2.34-60.el9_2.7 | ||
| nss_db | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| nss_db-debuginfo | 2.34-60.el9_2.7 | ||
| nss_hesiod | 2.34-60.el9_2.7 | RHSA-2023:5453 | Security Advisory (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2023-4911) |
| nss_hesiod-debuginfo | 2.34-60.el9_2.7 | ||
| python3-debug | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3-idle | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3-test | 3.9.16-1.el9_2.2 | RHSA-2023:5462 | Security Advisory (CVE-2023-40217) |
| python3.11-debug | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.11-debuginfo | 3.11.2-2.el9_2.2 | ||
| python3.11-debugsource | 3.11.2-2.el9_2.2 | ||
| python3.11-idle | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.11-test | 3.11.2-2.el9_2.2 | RHSA-2023:5456 | Security Advisory (CVE-2023-40217) |
| python3.9-debuginfo | 3.9.16-1.el9_2.2 | ||
| python3.9-debugsource | 3.9.16-1.el9_2.2 |
2023-10-11¶
CERN x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| cern-get-keytab | 1.5.8-1.rh9.cern |
CERN aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| cern-get-keytab | 1.5.8-1.rh9.cern |
2023-10-04¶
baseos x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| sos | 4.6.0-2.el9 | RHBA-2023:5354 | Bug Fix Advisory |
| sos-audit | 4.6.0-2.el9 | RHBA-2023:5354 | Bug Fix Advisory |
appstream x86_64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| nodejs | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-debuginfo | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | ||
| nodejs-debugsource | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | ||
| nodejs-devel | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-docs | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-full-i18n | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-nodemon | 3.0.1-1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| npm | 9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| open-vm-tools | 12.1.5-1.el9_2.3 | RHSA-2023:5313 | Security Advisory (CVE-2023-20900) |
| open-vm-tools-debuginfo | 12.1.5-1.el9_2.3 | ||
| open-vm-tools-debugsource | 12.1.5-1.el9_2.3 | ||
| open-vm-tools-desktop | 12.1.5-1.el9_2.3 | RHSA-2023:5313 | Security Advisory (CVE-2023-20900) |
| open-vm-tools-desktop-debuginfo | 12.1.5-1.el9_2.3 | ||
| open-vm-tools-salt-minion | 12.1.5-1.el9_2.3 | RHSA-2023:5313 | Security Advisory (CVE-2023-20900) |
| open-vm-tools-sdmp | 12.1.5-1.el9_2.3 | RHSA-2023:5313 | Security Advisory (CVE-2023-20900) |
| open-vm-tools-sdmp-debuginfo | 12.1.5-1.el9_2.3 | ||
| open-vm-tools-test | 12.1.5-1.el9_2.3 | RHSA-2023:5313 | Security Advisory (CVE-2023-20900) |
| open-vm-tools-test-debuginfo | 12.1.5-1.el9_2.3 |
baseos aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| sos | 4.6.0-2.el9 | RHBA-2023:5354 | Bug Fix Advisory |
| sos-audit | 4.6.0-2.el9 | RHBA-2023:5354 | Bug Fix Advisory |
appstream aarch64 repository¶
| Package | Version | Advisory | Notes |
|---|---|---|---|
| nodejs | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-debuginfo | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | ||
| nodejs-debugsource | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | ||
| nodejs-devel | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-docs | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-full-i18n | 18.17.1-1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| nodejs-nodemon | 3.0.1-1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| npm | 9.6.7-1.18.17.1.1.module+el9.2.0.z+19753+58118bc0 | RHSA-2023:5363 | Security Advisory (CVE-2022-25883, CVE-2023-32002, CVE-2023-32006, CVE-2023-32559) |
| open-vm-tools | 12.1.5-1.el9_2.3 | RHSA-2023:5313 | Security Advisory (CVE-2023-20900) |
| open-vm-tools-debuginfo | 12.1.5-1.el9_2.3 | ||
| open-vm-tools-debugsource | 12.1.5-1.el9_2.3 | ||
| open-vm-tools-desktop | 12.1.5-1.el9_2.3 | RHSA-2023:5313 | Security Advisory (CVE-2023-20900) |
| open-vm-tools-desktop-debuginfo | 12.1.5-1.el9_2.3 | ||
| open-vm-tools-sdmp-debuginfo | 12.1.5-1.el9_2.3 | ||
| open-vm-tools-test | 12.1.5-1.el9_2.3 | RHSA-2023:5313 | Security Advisory (CVE-2023-20900) |
| open-vm-tools-test-debuginfo | 12.1.5-1.el9_2.3 |