Latest production System Updates for Red Hat Enterprise Linux 9 (RHEL9)¶
Please verify that your system is up to date, running as root:
/usr/bin/dnf check-update
If the above command shows you available updates apply these, running as root:
/usr/bin/dnf update
or if you only want to apply security updates, run as root:
/usr/bin/dnf --security update
To receive notifications of updates, please sign up to the e-group linux-announce-rhel.
For more information about software repositories please check: RHEL9 software repositories
2024-07-24¶
CERN x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
cern-get-keytab | 1.5.16-1.rh9.cern |
openafs x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
kmod-openafs | 1.8.10-0.5.14.0_427.26.1.el9_4.rh9.cern |
baseos x86_64 repository¶
appstream x86_64 repository¶
rt x86_64 repository¶
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bpftool-debuginfo | 7.3.0-427.26.1.el9_4 | ||
dotnet-apphost-pack-8.0-debuginfo | 8.0.7-1.el9_4 | ||
dotnet-host-debuginfo | 8.0.7-1.el9_4 | ||
dotnet-hostfxr-8.0-debuginfo | 8.0.7-1.el9_4 | ||
dotnet-runtime-8.0-debuginfo | 8.0.7-1.el9_4 | ||
dotnet-sdk-8.0-debuginfo | 8.0.107-1.el9_4 | ||
dotnet-sdk-8.0-source-built-artifacts | 8.0.107-1.el9_4 | RHSA-2024:4450 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet8.0-debuginfo | 8.0.107-1.el9_4 | ||
dotnet8.0-debugsource | 8.0.107-1.el9_4 | ||
java-11-openjdk-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-debugsource | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-demo-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-demo-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-devel-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-devel-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-devel-fastdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-devel-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-devel-slowdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-fastdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-headless-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-headless-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-headless-fastdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-headless-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-headless-slowdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-jmods-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-jmods-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-slowdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-src-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-src-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-static-libs-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-static-libs-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
kernel-cross-headers | 5.14.0-427.26.1.el9_4 | RHSA-2024:4583 | Security Advisory (CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663) |
kernel-debug-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-debuginfo-common-x86_64 | 5.14.0-427.26.1.el9_4 | ||
kernel-rt-debug-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-rt-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-tools-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-tools-libs-devel | 5.14.0-427.26.1.el9_4 | RHSA-2024:4583 | Security Advisory (CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663) |
libperf | 5.14.0-427.26.1.el9_4 | RHSA-2024:4583 | Security Advisory (CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663) |
libperf-debuginfo | 5.14.0-427.26.1.el9_4 | ||
perf-debuginfo | 5.14.0-427.26.1.el9_4 | ||
python3-perf-debuginfo | 5.14.0-427.26.1.el9_4 |
CERN aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
cern-get-keytab | 1.5.16-1.rh9.cern |
openafs aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
kmod-openafs | 1.8.10-0.5.14.0_427.26.1.el9_4.rh9.cern |
baseos aarch64 repository¶
appstream aarch64 repository¶
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bpftool-debuginfo | 7.3.0-427.26.1.el9_4 | ||
dotnet-apphost-pack-8.0-debuginfo | 8.0.7-1.el9_4 | ||
dotnet-host-debuginfo | 8.0.7-1.el9_4 | ||
dotnet-hostfxr-8.0-debuginfo | 8.0.7-1.el9_4 | ||
dotnet-runtime-8.0-debuginfo | 8.0.7-1.el9_4 | ||
dotnet-sdk-8.0-debuginfo | 8.0.107-1.el9_4 | ||
dotnet-sdk-8.0-source-built-artifacts | 8.0.107-1.el9_4 | RHSA-2024:4450 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet8.0-debuginfo | 8.0.107-1.el9_4 | ||
dotnet8.0-debugsource | 8.0.107-1.el9_4 | ||
java-11-openjdk-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-debugsource | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-demo-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-demo-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-devel-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-devel-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-devel-fastdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-devel-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-devel-slowdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-fastdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-headless-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-headless-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-headless-fastdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-headless-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-headless-slowdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-jmods-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-jmods-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-slowdebug-debuginfo | 11.0.24.0.8-2.el9 | ||
java-11-openjdk-src-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-src-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-static-libs-fastdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
java-11-openjdk-static-libs-slowdebug | 11.0.24.0.8-2.el9 | RHSA-2024:4567 | Security Advisory (CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147) |
kernel-64k-debug-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-64k-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-cross-headers | 5.14.0-427.26.1.el9_4 | RHSA-2024:4583 | Security Advisory (CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663) |
kernel-debug-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-debuginfo-common-aarch64 | 5.14.0-427.26.1.el9_4 | ||
kernel-rt-debug-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-rt-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-tools-debuginfo | 5.14.0-427.26.1.el9_4 | ||
kernel-tools-libs-devel | 5.14.0-427.26.1.el9_4 | RHSA-2024:4583 | Security Advisory (CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663) |
libperf | 5.14.0-427.26.1.el9_4 | RHSA-2024:4583 | Security Advisory (CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663) |
libperf-debuginfo | 5.14.0-427.26.1.el9_4 | ||
perf-debuginfo | 5.14.0-427.26.1.el9_4 | ||
python3-perf-debuginfo | 5.14.0-427.26.1.el9_4 |
2024-07-17¶
CERN x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
cern-get-keytab | 1.5.15-1.rh9.cern |
openafs x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
kmod-openafs | 1.8.10-0.5.14.0_427.24.1.el9_4.rh9.cern |
baseos x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bpftool | 7.3.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
bpftool-debuginfo | 7.3.0-427.24.1.el9_4 | ||
kernel | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-abi-stablelists | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-core | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug-core | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-debug-modules | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug-modules-core | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug-modules-extra | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug-uki-virt | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-debuginfo-common-x86_64 | 5.14.0-427.24.1.el9_4 | ||
kernel-modules | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-modules-core | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-modules-extra | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-rt-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-rt-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-tools | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-tools-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-tools-libs | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-uki-virt | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
libperf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
openssh | 8.7p1-38.el9_4.1 | RHSA-2024:4312 | Security Advisory (CVE-2024-6387) |
openssh-askpass-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-clients | 8.7p1-38.el9_4.1 | RHSA-2024:4312 | Security Advisory (CVE-2024-6387) |
openssh-clients-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-debugsource | 8.7p1-38.el9_4.1 | ||
openssh-keycat | 8.7p1-38.el9_4.1 | RHSA-2024:4312 | Security Advisory (CVE-2024-6387) |
openssh-keycat-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-server | 8.7p1-38.el9_4.1 | RHSA-2024:4312 | Security Advisory (CVE-2024-6387) |
openssh-server-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-sk-dummy-debuginfo | 8.7p1-38.el9_4.1 | ||
pam_ssh_agent_auth-debuginfo | 0.10.4-5.38.el9_4.1 | ||
perf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
python3-perf | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
python3-perf-debuginfo | 5.14.0-427.24.1.el9_4 |
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
aspnetcore-targeting-pack-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
bpftool-debuginfo | 7.3.0-427.24.1.el9_4 | ||
buildah | 1.33.7-3.el9_4 | RHSA-2024:4371 | Security Advisory (CVE-2024-1394) |
buildah-debuginfo | 1.33.7-3.el9_4 | ||
buildah-debugsource | 1.33.7-3.el9_4 | ||
buildah-tests | 1.33.7-3.el9_4 | RHSA-2024:4371 | Security Advisory (CVE-2024-1394) |
buildah-tests-debuginfo | 1.33.7-3.el9_4 | ||
dotnet-apphost-pack-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet-apphost-pack-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-hostfxr-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet-hostfxr-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-runtime-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet-runtime-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-sdk-6.0 | 6.0.132-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet-sdk-6.0-debuginfo | 6.0.132-1.el9_4 | ||
dotnet-targeting-pack-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet-templates-6.0 | 6.0.132-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet6.0-debuginfo | 6.0.132-1.el9_4 | ||
dotnet6.0-debugsource | 6.0.132-1.el9_4 | ||
fence-agents-common | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-agents-compute | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-agents-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-agents-debugsource | 4.10.0-62.el9_4.4 | ||
fence-agents-ibm-powervs | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-agents-ibm-vpc | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-agents-kdump-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-agents-kubevirt | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-agents-kubevirt-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-agents-virsh | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-virt | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-virt-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-virtd-cpg | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-virtd-cpg-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-libvirt | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-virtd-libvirt-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-multicast | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-virtd-multicast-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-serial | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-virtd-serial-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-tcp | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-virtd-tcp-debuginfo | 4.10.0-62.el9_4.4 | ||
gvisor-tap-vsock | 0.7.3-4.el9_4 | RHSA-2024:4379 | Security Advisory (CVE-2024-1394) |
gvisor-tap-vsock-debuginfo | 0.7.3-4.el9_4 | ||
gvisor-tap-vsock-debugsource | 0.7.3-4.el9_4 | ||
ha-cloud-support-debuginfo | 4.10.0-62.el9_4.4 | ||
kernel-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-debug-devel | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug-devel-matched | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-debuginfo-common-x86_64 | 5.14.0-427.24.1.el9_4 | ||
kernel-devel | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-devel-matched | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-doc | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-headers | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-rt-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-rt-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-tools-debuginfo | 5.14.0-427.24.1.el9_4 | ||
libperf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
openssh-askpass | 8.7p1-38.el9_4.1 | RHSA-2024:4312 | Security Advisory (CVE-2024-6387) |
openssh-askpass-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-clients-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-debugsource | 8.7p1-38.el9_4.1 | ||
openssh-keycat-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-server-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-sk-dummy-debuginfo | 8.7p1-38.el9_4.1 | ||
pam_ssh_agent_auth | 0.10.4-5.38.el9_4.1 | RHSA-2024:4312 | Security Advisory (CVE-2024-6387) |
pam_ssh_agent_auth-debuginfo | 0.10.4-5.38.el9_4.1 | ||
perf | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
perf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
podman | 4.9.4-5.el9_4 | RHSA-2024:4378 | Security Advisory (CVE-2024-1394) |
podman-debuginfo | 4.9.4-5.el9_4 | ||
podman-debugsource | 4.9.4-5.el9_4 | ||
podman-docker | 4.9.4-5.el9_4 | RHSA-2024:4378 | Security Advisory (CVE-2024-1394) |
podman-plugins | 4.9.4-5.el9_4 | RHSA-2024:4378 | Security Advisory (CVE-2024-1394) |
podman-plugins-debuginfo | 4.9.4-5.el9_4 | ||
podman-remote | 4.9.4-5.el9_4 | RHSA-2024:4378 | Security Advisory (CVE-2024-1394) |
podman-remote-debuginfo | 4.9.4-5.el9_4 | ||
podman-tests | 4.9.4-5.el9_4 | RHSA-2024:4378 | Security Advisory (CVE-2024-1394) |
python3-perf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
rtla | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
rv | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
highavailability x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
fence-agents-aliyun | 4.10.0-62.el9_4.4 | ||
fence-agents-all | 4.10.0-62.el9_4.4 | ||
fence-agents-amt-ws | 4.10.0-62.el9_4.4 | ||
fence-agents-apc | 4.10.0-62.el9_4.4 | ||
fence-agents-apc-snmp | 4.10.0-62.el9_4.4 | ||
fence-agents-aws | 4.10.0-62.el9_4.4 | ||
fence-agents-azure-arm | 4.10.0-62.el9_4.4 | ||
fence-agents-bladecenter | 4.10.0-62.el9_4.4 | ||
fence-agents-brocade | 4.10.0-62.el9_4.4 | ||
fence-agents-cisco-mds | 4.10.0-62.el9_4.4 | ||
fence-agents-cisco-ucs | 4.10.0-62.el9_4.4 | ||
fence-agents-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-agents-debugsource | 4.10.0-62.el9_4.4 | ||
fence-agents-drac5 | 4.10.0-62.el9_4.4 | ||
fence-agents-eaton-snmp | 4.10.0-62.el9_4.4 | ||
fence-agents-emerson | 4.10.0-62.el9_4.4 | ||
fence-agents-eps | 4.10.0-62.el9_4.4 | ||
fence-agents-gce | 4.10.0-62.el9_4.4 | ||
fence-agents-heuristics-ping | 4.10.0-62.el9_4.4 | ||
fence-agents-hpblade | 4.10.0-62.el9_4.4 | ||
fence-agents-ibmblade | 4.10.0-62.el9_4.4 | ||
fence-agents-ifmib | 4.10.0-62.el9_4.4 | ||
fence-agents-ilo-moonshot | 4.10.0-62.el9_4.4 | ||
fence-agents-ilo-mp | 4.10.0-62.el9_4.4 | ||
fence-agents-ilo-ssh | 4.10.0-62.el9_4.4 | ||
fence-agents-ilo2 | 4.10.0-62.el9_4.4 | ||
fence-agents-intelmodular | 4.10.0-62.el9_4.4 | ||
fence-agents-ipdu | 4.10.0-62.el9_4.4 | ||
fence-agents-ipmilan | 4.10.0-62.el9_4.4 | ||
fence-agents-kdump | 4.10.0-62.el9_4.4 | ||
fence-agents-kdump-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-agents-kubevirt-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-agents-mpath | 4.10.0-62.el9_4.4 | ||
fence-agents-openstack | 4.10.0-62.el9_4.4 | ||
fence-agents-redfish | 4.10.0-62.el9_4.4 | ||
fence-agents-rhevm | 4.10.0-62.el9_4.4 | ||
fence-agents-rsa | 4.10.0-62.el9_4.4 | ||
fence-agents-rsb | 4.10.0-62.el9_4.4 | ||
fence-agents-sbd | 4.10.0-62.el9_4.4 | ||
fence-agents-scsi | 4.10.0-62.el9_4.4 | ||
fence-agents-vmware-rest | 4.10.0-62.el9_4.4 | ||
fence-agents-vmware-soap | 4.10.0-62.el9_4.4 | ||
fence-agents-wti | 4.10.0-62.el9_4.4 | ||
fence-virt-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-cpg-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-libvirt-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-multicast-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-serial-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-virtd-tcp-debuginfo | 4.10.0-62.el9_4.4 | ||
ha-cloud-support | 4.10.0-62.el9_4.4 | ||
ha-cloud-support-debuginfo | 4.10.0-62.el9_4.4 |
rt x86_64 repository¶
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bpftool-debuginfo | 7.3.0-427.24.1.el9_4 | ||
dotnet-apphost-pack-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-hostfxr-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-runtime-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-sdk-6.0-debuginfo | 6.0.132-1.el9_4 | ||
dotnet-sdk-6.0-source-built-artifacts | 6.0.132-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet6.0-debuginfo | 6.0.132-1.el9_4 | ||
dotnet6.0-debugsource | 6.0.132-1.el9_4 | ||
kernel-cross-headers | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-debuginfo-common-x86_64 | 5.14.0-427.24.1.el9_4 | ||
kernel-rt-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-rt-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-tools-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-tools-libs-devel | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
libperf | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
libperf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
perf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
python3-perf-debuginfo | 5.14.0-427.24.1.el9_4 |
CERN aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
cern-get-keytab | 1.5.15-1.rh9.cern |
openafs aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
kmod-openafs | 1.8.10-0.5.14.0_427.24.1.el9_4.rh9.cern |
baseos aarch64 repository¶
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
aspnetcore-targeting-pack-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
bpftool-debuginfo | 7.3.0-427.24.1.el9_4 | ||
buildah | 1.33.7-3.el9_4 | RHSA-2024:4371 | Security Advisory (CVE-2024-1394) |
buildah-debuginfo | 1.33.7-3.el9_4 | ||
buildah-debugsource | 1.33.7-3.el9_4 | ||
buildah-tests | 1.33.7-3.el9_4 | RHSA-2024:4371 | Security Advisory (CVE-2024-1394) |
buildah-tests-debuginfo | 1.33.7-3.el9_4 | ||
dotnet-apphost-pack-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet-apphost-pack-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-hostfxr-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet-hostfxr-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-runtime-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet-runtime-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-sdk-6.0 | 6.0.132-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet-sdk-6.0-debuginfo | 6.0.132-1.el9_4 | ||
dotnet-targeting-pack-6.0 | 6.0.32-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet-templates-6.0 | 6.0.132-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet6.0-debuginfo | 6.0.132-1.el9_4 | ||
dotnet6.0-debugsource | 6.0.132-1.el9_4 | ||
fence-agents-common | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-agents-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-agents-debugsource | 4.10.0-62.el9_4.4 | ||
fence-agents-ibm-powervs | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-agents-ibm-vpc | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-agents-kdump-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-agents-kubevirt | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
fence-agents-kubevirt-debuginfo | 4.10.0-62.el9_4.4 | ||
fence-agents-virsh | 4.10.0-62.el9_4.4 | RHSA-2024:4422 | Security Advisory (CVE-2024-37891) |
gvisor-tap-vsock | 0.7.3-4.el9_4 | RHSA-2024:4379 | Security Advisory (CVE-2024-1394) |
gvisor-tap-vsock-debuginfo | 0.7.3-4.el9_4 | ||
gvisor-tap-vsock-debugsource | 0.7.3-4.el9_4 | ||
kernel-64k-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-64k-debug-devel | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-64k-debug-devel-matched | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-64k-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-64k-devel | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-64k-devel-matched | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-debug-devel | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug-devel-matched | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-debuginfo-common-aarch64 | 5.14.0-427.24.1.el9_4 | ||
kernel-devel | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-devel-matched | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-doc | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-headers | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-rt-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-rt-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-tools-debuginfo | 5.14.0-427.24.1.el9_4 | ||
libperf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
openssh-askpass | 8.7p1-38.el9_4.1 | RHSA-2024:4312 | Security Advisory (CVE-2024-6387) |
openssh-askpass-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-clients-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-debugsource | 8.7p1-38.el9_4.1 | ||
openssh-keycat-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-server-debuginfo | 8.7p1-38.el9_4.1 | ||
openssh-sk-dummy-debuginfo | 8.7p1-38.el9_4.1 | ||
pam_ssh_agent_auth | 0.10.4-5.38.el9_4.1 | RHSA-2024:4312 | Security Advisory (CVE-2024-6387) |
pam_ssh_agent_auth-debuginfo | 0.10.4-5.38.el9_4.1 | ||
perf | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
perf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
podman | 4.9.4-5.el9_4 | RHSA-2024:4378 | Security Advisory (CVE-2024-1394) |
podman-debuginfo | 4.9.4-5.el9_4 | ||
podman-debugsource | 4.9.4-5.el9_4 | ||
podman-docker | 4.9.4-5.el9_4 | RHSA-2024:4378 | Security Advisory (CVE-2024-1394) |
podman-plugins | 4.9.4-5.el9_4 | RHSA-2024:4378 | Security Advisory (CVE-2024-1394) |
podman-plugins-debuginfo | 4.9.4-5.el9_4 | ||
podman-remote | 4.9.4-5.el9_4 | RHSA-2024:4378 | Security Advisory (CVE-2024-1394) |
podman-remote-debuginfo | 4.9.4-5.el9_4 | ||
podman-tests | 4.9.4-5.el9_4 | RHSA-2024:4378 | Security Advisory (CVE-2024-1394) |
python3-perf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
rtla | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
rv | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bpftool-debuginfo | 7.3.0-427.24.1.el9_4 | ||
dotnet-apphost-pack-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-hostfxr-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-runtime-6.0-debuginfo | 6.0.32-1.el9_4 | ||
dotnet-sdk-6.0-debuginfo | 6.0.132-1.el9_4 | ||
dotnet-sdk-6.0-source-built-artifacts | 6.0.132-1.el9_4 | RHSA-2024:4439 | Security Advisory (CVE-2024-38095) |
dotnet6.0-debuginfo | 6.0.132-1.el9_4 | ||
dotnet6.0-debugsource | 6.0.132-1.el9_4 | ||
kernel-64k-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-64k-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-cross-headers | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
kernel-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-debuginfo-common-aarch64 | 5.14.0-427.24.1.el9_4 | ||
kernel-rt-debug-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-rt-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-tools-debuginfo | 5.14.0-427.24.1.el9_4 | ||
kernel-tools-libs-devel | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
libperf | 5.14.0-427.24.1.el9_4 | RHSA-2024:4349 | Security Advisory (CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960) |
libperf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
perf-debuginfo | 5.14.0-427.24.1.el9_4 | ||
python3-perf-debuginfo | 5.14.0-427.24.1.el9_4 |
2024-07-10¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
go-toolset | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang-bin | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang-docs | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang-misc | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang-src | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang-tests | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
idm-pki-acme | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-base | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-ca | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-est | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-java | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-kra | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-server | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-tools | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-tools-debuginfo | 11.5.0-2.el9_4 | ||
pki-core-debugsource | 11.5.0-2.el9_4 | ||
python3-idm-pki | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
qemu-guest-agent | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-guest-agent-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-img | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-img-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-audio-dbus-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-audio-pa | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-audio-pa-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-block-blkio | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-blkio-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-block-curl | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-curl-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-block-rbd | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-rbd-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-common | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-common-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-core | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-core-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-debugsource | 8.2.0-11.el9_4.4 | ||
qemu-kvm-device-display-virtio-gpu | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-device-display-virtio-gpu-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-device-display-virtio-gpu-pci | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-device-display-virtio-gpu-pci-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-device-display-virtio-vga | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-device-display-virtio-vga-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-device-usb-host | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-device-usb-host-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-device-usb-redirect | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-device-usb-redirect-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-docs | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-tests-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-tools | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-tools-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-ui-dbus-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-ui-egl-headless | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-ui-egl-headless-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-ui-opengl | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-ui-opengl-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-pr-helper | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-pr-helper-debuginfo | 8.2.0-11.el9_4.4 |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
go-toolset | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang-bin | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang-docs | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang-misc | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang-src | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
golang-tests | 1.21.11-1.el9_4 | RHSA-2024:4212 | Security Advisory (CVE-2024-24789, CVE-2024-24790) |
idm-pki-acme | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-base | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-ca | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-est | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-java | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-kra | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-server | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-tools | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
idm-pki-tools-debuginfo | 11.5.0-2.el9_4 | ||
pki-core-debugsource | 11.5.0-2.el9_4 | ||
python3-idm-pki | 11.5.0-2.el9_4 | RHSA-2024:4165 | Security Advisory (CVE-2023-4727) |
qemu-guest-agent | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-guest-agent-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-img | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-img-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-audio-dbus-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-audio-pa | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-audio-pa-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-block-blkio | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-blkio-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-block-curl | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-curl-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-block-rbd | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-rbd-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-common | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-common-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-core | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-core-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-debugsource | 8.2.0-11.el9_4.4 | ||
qemu-kvm-device-display-virtio-gpu | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-device-display-virtio-gpu-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-device-display-virtio-gpu-pci | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-device-display-virtio-gpu-pci-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-device-usb-host | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-device-usb-host-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-device-usb-redirect | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-device-usb-redirect-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-docs | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-tests-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-tools | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-kvm-tools-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-kvm-ui-dbus-debuginfo | 8.2.0-11.el9_4.4 | ||
qemu-pr-helper | 8.2.0-11.el9_4.4 | RHSA-2024:4278 | Security Advisory (CVE-2024-4467) |
qemu-pr-helper-debuginfo | 8.2.0-11.el9_4.4 |
2024-07-03¶
baseos x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
python3 | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3-libs | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3.9-debuginfo | 3.9.18-3.el9_4.1 | ||
python3.9-debugsource | 3.9.18-3.el9_4.1 | ||
sos | 4.7.1-3.el9 | RHBA-2024:4049 | Bug Fix Advisory |
sos-audit | 4.7.1-3.el9 | RHBA-2024:4049 | Bug Fix Advisory |
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
ghostscript | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-debuginfo | 9.54.0-16.el9_4 | ||
ghostscript-debugsource | 9.54.0-16.el9_4 | ||
ghostscript-doc | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-gtk-debuginfo | 9.54.0-16.el9_4 | ||
ghostscript-tools-dvipdf | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-tools-fonts | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-tools-printing | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-x11 | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-x11-debuginfo | 9.54.0-16.el9_4 | ||
git | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-all | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-core | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-core-debuginfo | 2.43.5-1.el9_4 | ||
git-core-doc | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-credential-libsecret | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-credential-libsecret-debuginfo | 2.43.5-1.el9_4 | ||
git-daemon | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-daemon-debuginfo | 2.43.5-1.el9_4 | ||
git-debuginfo | 2.43.5-1.el9_4 | ||
git-debugsource | 2.43.5-1.el9_4 | ||
git-email | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-gui | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-instaweb | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-subtree | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-svn | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
gitk | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
gitweb | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
libgs | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
libgs-debuginfo | 9.54.0-16.el9_4 | ||
libreswan | 4.12-2.el9_4.1 | RHSA-2024:4050 | Security Advisory (CVE-2024-3652) |
libreswan-debuginfo | 4.12-2.el9_4.1 | ||
libreswan-debugsource | 4.12-2.el9_4.1 | ||
perl-Git | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
perl-Git-SVN | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
python-unversioned-command | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3-devel | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3-tkinter | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3.11 | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.11-debuginfo | 3.11.7-1.el9_4.1 | ||
python3.11-debugsource | 3.11.7-1.el9_4.1 | ||
python3.11-devel | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.11-libs | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.11-tkinter | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.9-debuginfo | 3.9.18-3.el9_4.1 | ||
python3.9-debugsource | 3.9.18-3.el9_4.1 | ||
qemu-guest-agent | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-guest-agent-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-img | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-img-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-audio-dbus-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-audio-pa | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-audio-pa-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-block-blkio | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-block-blkio-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-block-curl | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-block-curl-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-block-rbd | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-block-rbd-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-common | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-common-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-core | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-core-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-debugsource | 8.2.0-11.el9_4.3 | ||
qemu-kvm-device-display-virtio-gpu | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-device-display-virtio-gpu-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-device-display-virtio-gpu-pci | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-device-display-virtio-gpu-pci-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-device-display-virtio-vga | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-device-display-virtio-vga-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-device-usb-host | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-device-usb-host-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-device-usb-redirect | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-device-usb-redirect-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-docs | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-tests-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-tools | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-tools-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-ui-dbus-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-ui-egl-headless | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-ui-egl-headless-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-ui-opengl | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-ui-opengl-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-pr-helper | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-pr-helper-debuginfo | 8.2.0-11.el9_4.3 | ||
thunderbird | 115.12.1-1.el9_4 | RHSA-2024:4002 | Security Advisory (CVE-2024-5688, CVE-2024-5690, CVE-2024-5691, CVE-2024-5693, CVE-2024-5696, CVE-2024-5700, CVE-2024-5702) |
thunderbird-debuginfo | 115.12.1-1.el9_4 | ||
thunderbird-debugsource | 115.12.1-1.el9_4 |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
ghostscript-debuginfo | 9.54.0-16.el9_4 | ||
ghostscript-debugsource | 9.54.0-16.el9_4 | ||
ghostscript-gtk-debuginfo | 9.54.0-16.el9_4 | ||
ghostscript-x11-debuginfo | 9.54.0-16.el9_4 | ||
libgs-debuginfo | 9.54.0-16.el9_4 | ||
libgs-devel | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
python3-debug | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3-idle | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3-test | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3.11-debug | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.11-debuginfo | 3.11.7-1.el9_4.1 | ||
python3.11-debugsource | 3.11.7-1.el9_4.1 | ||
python3.11-idle | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.11-test | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.9-debuginfo | 3.9.18-3.el9_4.1 | ||
python3.9-debugsource | 3.9.18-3.el9_4.1 |
baseos aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
python3 | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3-libs | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3.9-debuginfo | 3.9.18-3.el9_4.1 | ||
python3.9-debugsource | 3.9.18-3.el9_4.1 | ||
sos | 4.7.1-3.el9 | RHBA-2024:4049 | Bug Fix Advisory |
sos-audit | 4.7.1-3.el9 | RHBA-2024:4049 | Bug Fix Advisory |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
ghostscript | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-debuginfo | 9.54.0-16.el9_4 | ||
ghostscript-debugsource | 9.54.0-16.el9_4 | ||
ghostscript-doc | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-gtk-debuginfo | 9.54.0-16.el9_4 | ||
ghostscript-tools-dvipdf | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-tools-fonts | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-tools-printing | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-x11 | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
ghostscript-x11-debuginfo | 9.54.0-16.el9_4 | ||
git | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-all | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-core | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-core-debuginfo | 2.43.5-1.el9_4 | ||
git-core-doc | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-credential-libsecret | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-credential-libsecret-debuginfo | 2.43.5-1.el9_4 | ||
git-daemon | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-daemon-debuginfo | 2.43.5-1.el9_4 | ||
git-debuginfo | 2.43.5-1.el9_4 | ||
git-debugsource | 2.43.5-1.el9_4 | ||
git-email | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-gui | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-instaweb | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-subtree | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
git-svn | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
gitk | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
gitweb | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
libgs | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
libgs-debuginfo | 9.54.0-16.el9_4 | ||
libreswan | 4.12-2.el9_4.1 | RHSA-2024:4050 | Security Advisory (CVE-2024-3652) |
libreswan-debuginfo | 4.12-2.el9_4.1 | ||
libreswan-debugsource | 4.12-2.el9_4.1 | ||
perl-Git | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
perl-Git-SVN | 2.43.5-1.el9_4 | RHSA-2024:4083 | Security Advisory (CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465) |
python-unversioned-command | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3-devel | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3-tkinter | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3.11 | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.11-debuginfo | 3.11.7-1.el9_4.1 | ||
python3.11-debugsource | 3.11.7-1.el9_4.1 | ||
python3.11-devel | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.11-libs | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.11-tkinter | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.9-debuginfo | 3.9.18-3.el9_4.1 | ||
python3.9-debugsource | 3.9.18-3.el9_4.1 | ||
qemu-guest-agent | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-guest-agent-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-img | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-img-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-audio-dbus-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-audio-pa | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-audio-pa-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-block-blkio | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-block-blkio-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-block-curl | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-block-curl-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-block-rbd | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-block-rbd-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-common | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-common-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-core | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-core-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-debugsource | 8.2.0-11.el9_4.3 | ||
qemu-kvm-device-display-virtio-gpu | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-device-display-virtio-gpu-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-device-display-virtio-gpu-pci | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-device-display-virtio-gpu-pci-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-device-usb-host | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-device-usb-host-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-device-usb-redirect | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-device-usb-redirect-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-docs | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-tests-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-tools | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-kvm-tools-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-kvm-ui-dbus-debuginfo | 8.2.0-11.el9_4.3 | ||
qemu-pr-helper | 8.2.0-11.el9_4.3 | RHBA-2024:3995 | Bug Fix Advisory |
qemu-pr-helper-debuginfo | 8.2.0-11.el9_4.3 | ||
thunderbird | 115.12.1-1.el9_4 | RHSA-2024:4002 | Security Advisory (CVE-2024-5688, CVE-2024-5690, CVE-2024-5691, CVE-2024-5693, CVE-2024-5696, CVE-2024-5700, CVE-2024-5702) |
thunderbird-debuginfo | 115.12.1-1.el9_4 | ||
thunderbird-debugsource | 115.12.1-1.el9_4 |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
ghostscript-debuginfo | 9.54.0-16.el9_4 | ||
ghostscript-debugsource | 9.54.0-16.el9_4 | ||
ghostscript-gtk-debuginfo | 9.54.0-16.el9_4 | ||
ghostscript-x11-debuginfo | 9.54.0-16.el9_4 | ||
libgs-debuginfo | 9.54.0-16.el9_4 | ||
libgs-devel | 9.54.0-16.el9_4 | RHSA-2024:3999 | Security Advisory (CVE-2024-33871) |
python3-debug | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3-idle | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3-test | 3.9.18-3.el9_4.1 | RHSA-2024:4078 | Security Advisory (CVE-2023-6597, CVE-2024-0450) |
python3.11-debug | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.11-debuginfo | 3.11.7-1.el9_4.1 | ||
python3.11-debugsource | 3.11.7-1.el9_4.1 | ||
python3.11-idle | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.11-test | 3.11.7-1.el9_4.1 | RHSA-2024:4077 | Security Advisory (CVE-2023-6597) |
python3.9-debuginfo | 3.9.18-3.el9_4.1 | ||
python3.9-debugsource | 3.9.18-3.el9_4.1 |