Skip to content

Latest production System Updates for Red Hat Enterprise Linux 9 (RHEL9)

Please verify that your system is up to date, running as root:

/usr/bin/dnf check-update

If the above command shows you available updates apply these, running as root:

/usr/bin/dnf update

or if you only want to apply security updates, run as root:

/usr/bin/dnf --security update

To receive notifications of updates, please sign up to the e-group linux-announce-rhel.

For more information about software repositories please check: RHEL9 software repositories

2024-07-24

CERN x86_64 repository

Package Version Advisory Notes
cern-get-keytab 1.5.16-1.rh9.cern

openafs x86_64 repository

Package Version Advisory Notes
kmod-openafs 1.8.10-0.5.14.0_427.26.1.el9_4.rh9.cern

baseos x86_64 repository

Package Version Advisory Notes
bpftool 7.3.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
bpftool-debuginfo 7.3.0-427.26.1.el9_4
kernel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-abi-stablelists 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-debug-modules 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-modules-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-modules-extra 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-uki-virt 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debuginfo 5.14.0-427.26.1.el9_4
kernel-debuginfo-common-x86_64 5.14.0-427.26.1.el9_4
kernel-modules 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-modules-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-modules-extra 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-rt-debuginfo 5.14.0-427.26.1.el9_4
kernel-tools 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-tools-debuginfo 5.14.0-427.26.1.el9_4
kernel-tools-libs 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-uki-virt 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
libperf-debuginfo 5.14.0-427.26.1.el9_4
openssh 8.7p1-38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
openssh-askpass-debuginfo 8.7p1-38.el9_4.4
openssh-clients 8.7p1-38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
openssh-clients-debuginfo 8.7p1-38.el9_4.4
openssh-debuginfo 8.7p1-38.el9_4.4
openssh-debugsource 8.7p1-38.el9_4.4
openssh-keycat 8.7p1-38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
openssh-keycat-debuginfo 8.7p1-38.el9_4.4
openssh-server 8.7p1-38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
openssh-server-debuginfo 8.7p1-38.el9_4.4
openssh-sk-dummy-debuginfo 8.7p1-38.el9_4.4
pam_ssh_agent_auth-debuginfo 0.10.4-5.38.el9_4.4
perf-debuginfo 5.14.0-427.26.1.el9_4
python3-perf 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
python3-perf-debuginfo 5.14.0-427.26.1.el9_4

appstream x86_64 repository

Package Version Advisory Notes
aspnetcore-runtime-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
aspnetcore-runtime-dbg-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
aspnetcore-targeting-pack-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
bpftool-debuginfo 7.3.0-427.26.1.el9_4
dotnet-apphost-pack-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-apphost-pack-8.0-debuginfo 8.0.7-1.el9_4
dotnet-host 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-host-debuginfo 8.0.7-1.el9_4
dotnet-hostfxr-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-hostfxr-8.0-debuginfo 8.0.7-1.el9_4
dotnet-runtime-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-runtime-8.0-debuginfo 8.0.7-1.el9_4
dotnet-runtime-dbg-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-sdk-8.0 8.0.107-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-sdk-8.0-debuginfo 8.0.107-1.el9_4
dotnet-sdk-dbg-8.0 8.0.107-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-targeting-pack-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-templates-8.0 8.0.107-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet8.0-debuginfo 8.0.107-1.el9_4
dotnet8.0-debugsource 8.0.107-1.el9_4
firefox 115.13.0-3.el9_4 RHSA-2024:4500
Security Advisory
(CVE-2024-6601, CVE-2024-6603, CVE-2024-6604)
firefox-debuginfo 115.13.0-3.el9_4
firefox-debugsource 115.13.0-3.el9_4
firefox-x11 115.13.0-3.el9_4 RHSA-2024:4500
Security Advisory
(CVE-2024-6601, CVE-2024-6603, CVE-2024-6604)
java-11-openjdk 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-debugsource 11.0.24.0.8-2.el9
java-11-openjdk-demo 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-devel 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-devel-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-headless 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-headless-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-javadoc 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-javadoc-zip 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-jmods 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-src 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-static-libs 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
kernel-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-debug-devel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-devel-matched 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debuginfo 5.14.0-427.26.1.el9_4
kernel-debuginfo-common-x86_64 5.14.0-427.26.1.el9_4
kernel-devel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-devel-matched 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-doc 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-headers 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-rt-debuginfo 5.14.0-427.26.1.el9_4
kernel-tools-debuginfo 5.14.0-427.26.1.el9_4
libperf-debuginfo 5.14.0-427.26.1.el9_4
netstandard-targeting-pack-2.1 8.0.107-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
openssh-askpass 8.7p1-38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
openssh-askpass-debuginfo 8.7p1-38.el9_4.4
openssh-clients-debuginfo 8.7p1-38.el9_4.4
openssh-debuginfo 8.7p1-38.el9_4.4
openssh-debugsource 8.7p1-38.el9_4.4
openssh-keycat-debuginfo 8.7p1-38.el9_4.4
openssh-server-debuginfo 8.7p1-38.el9_4.4
openssh-sk-dummy-debuginfo 8.7p1-38.el9_4.4
pam_ssh_agent_auth 0.10.4-5.38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
pam_ssh_agent_auth-debuginfo 0.10.4-5.38.el9_4.4
perf 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
perf-debuginfo 5.14.0-427.26.1.el9_4
python3-perf-debuginfo 5.14.0-427.26.1.el9_4
rtla 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
rv 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
skopeo 1.14.3-3.el9_4 RHSA-2024:4502
Security Advisory
(CVE-2024-1394)
skopeo-debuginfo 1.14.3-3.el9_4
skopeo-debugsource 1.14.3-3.el9_4
skopeo-tests 1.14.3-3.el9_4 RHSA-2024:4502
Security Advisory
(CVE-2024-1394)

rt x86_64 repository

Package Version Advisory Notes
bpftool-debuginfo 7.3.0-427.26.1.el9_4
kernel-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-debuginfo 5.14.0-427.26.1.el9_4
kernel-debuginfo-common-x86_64 5.14.0-427.26.1.el9_4
kernel-rt 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debug 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debug-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-rt-debug-devel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debug-modules 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debug-modules-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debug-modules-extra 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debuginfo 5.14.0-427.26.1.el9_4
kernel-rt-devel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-modules 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-modules-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-modules-extra 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-tools-debuginfo 5.14.0-427.26.1.el9_4
libperf-debuginfo 5.14.0-427.26.1.el9_4
perf-debuginfo 5.14.0-427.26.1.el9_4
python3-perf-debuginfo 5.14.0-427.26.1.el9_4

codeready-builder x86_64 repository

Package Version Advisory Notes
bpftool-debuginfo 7.3.0-427.26.1.el9_4
dotnet-apphost-pack-8.0-debuginfo 8.0.7-1.el9_4
dotnet-host-debuginfo 8.0.7-1.el9_4
dotnet-hostfxr-8.0-debuginfo 8.0.7-1.el9_4
dotnet-runtime-8.0-debuginfo 8.0.7-1.el9_4
dotnet-sdk-8.0-debuginfo 8.0.107-1.el9_4
dotnet-sdk-8.0-source-built-artifacts 8.0.107-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet8.0-debuginfo 8.0.107-1.el9_4
dotnet8.0-debugsource 8.0.107-1.el9_4
java-11-openjdk-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-debugsource 11.0.24.0.8-2.el9
java-11-openjdk-demo-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-demo-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-devel-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-devel-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-devel-fastdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-devel-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-devel-slowdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-fastdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-headless-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-headless-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-headless-fastdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-headless-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-headless-slowdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-jmods-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-jmods-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-slowdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-src-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-src-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-static-libs-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-static-libs-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
kernel-cross-headers 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-debuginfo 5.14.0-427.26.1.el9_4
kernel-debuginfo-common-x86_64 5.14.0-427.26.1.el9_4
kernel-rt-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-rt-debuginfo 5.14.0-427.26.1.el9_4
kernel-tools-debuginfo 5.14.0-427.26.1.el9_4
kernel-tools-libs-devel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
libperf 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
libperf-debuginfo 5.14.0-427.26.1.el9_4
perf-debuginfo 5.14.0-427.26.1.el9_4
python3-perf-debuginfo 5.14.0-427.26.1.el9_4

CERN aarch64 repository

Package Version Advisory Notes
cern-get-keytab 1.5.16-1.rh9.cern

openafs aarch64 repository

Package Version Advisory Notes
kmod-openafs 1.8.10-0.5.14.0_427.26.1.el9_4.rh9.cern

baseos aarch64 repository

Package Version Advisory Notes
bpftool 7.3.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
bpftool-debuginfo 7.3.0-427.26.1.el9_4
kernel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-debug 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-debug-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-64k-debug-modules 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-debug-modules-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-debug-modules-extra 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-debuginfo 5.14.0-427.26.1.el9_4
kernel-64k-modules 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-modules-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-modules-extra 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-abi-stablelists 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-debug-modules 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-modules-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-modules-extra 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debuginfo 5.14.0-427.26.1.el9_4
kernel-debuginfo-common-aarch64 5.14.0-427.26.1.el9_4
kernel-modules 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-modules-core 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-modules-extra 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-rt-debuginfo 5.14.0-427.26.1.el9_4
kernel-tools 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-tools-debuginfo 5.14.0-427.26.1.el9_4
kernel-tools-libs 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
libperf-debuginfo 5.14.0-427.26.1.el9_4
openssh 8.7p1-38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
openssh-askpass-debuginfo 8.7p1-38.el9_4.4
openssh-clients 8.7p1-38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
openssh-clients-debuginfo 8.7p1-38.el9_4.4
openssh-debuginfo 8.7p1-38.el9_4.4
openssh-debugsource 8.7p1-38.el9_4.4
openssh-keycat 8.7p1-38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
openssh-keycat-debuginfo 8.7p1-38.el9_4.4
openssh-server 8.7p1-38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
openssh-server-debuginfo 8.7p1-38.el9_4.4
openssh-sk-dummy-debuginfo 8.7p1-38.el9_4.4
pam_ssh_agent_auth-debuginfo 0.10.4-5.38.el9_4.4
perf-debuginfo 5.14.0-427.26.1.el9_4
python3-perf 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
python3-perf-debuginfo 5.14.0-427.26.1.el9_4

appstream aarch64 repository

Package Version Advisory Notes
aspnetcore-runtime-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
aspnetcore-runtime-dbg-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
aspnetcore-targeting-pack-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
bpftool-debuginfo 7.3.0-427.26.1.el9_4
dotnet-apphost-pack-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-apphost-pack-8.0-debuginfo 8.0.7-1.el9_4
dotnet-host 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-host-debuginfo 8.0.7-1.el9_4
dotnet-hostfxr-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-hostfxr-8.0-debuginfo 8.0.7-1.el9_4
dotnet-runtime-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-runtime-8.0-debuginfo 8.0.7-1.el9_4
dotnet-runtime-dbg-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-sdk-8.0 8.0.107-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-sdk-8.0-debuginfo 8.0.107-1.el9_4
dotnet-sdk-dbg-8.0 8.0.107-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-targeting-pack-8.0 8.0.7-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-templates-8.0 8.0.107-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet8.0-debuginfo 8.0.107-1.el9_4
dotnet8.0-debugsource 8.0.107-1.el9_4
firefox 115.13.0-3.el9_4 RHSA-2024:4500
Security Advisory
(CVE-2024-6601, CVE-2024-6603, CVE-2024-6604)
firefox-debuginfo 115.13.0-3.el9_4
firefox-debugsource 115.13.0-3.el9_4
firefox-x11 115.13.0-3.el9_4 RHSA-2024:4500
Security Advisory
(CVE-2024-6601, CVE-2024-6603, CVE-2024-6604)
java-11-openjdk 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-debugsource 11.0.24.0.8-2.el9
java-11-openjdk-demo 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-devel 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-devel-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-headless 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-headless-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-javadoc 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-javadoc-zip 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-jmods 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-src 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-static-libs 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
kernel-64k-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-64k-debug-devel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-debug-devel-matched 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-debuginfo 5.14.0-427.26.1.el9_4
kernel-64k-devel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-64k-devel-matched 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-debug-devel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-devel-matched 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debuginfo 5.14.0-427.26.1.el9_4
kernel-debuginfo-common-aarch64 5.14.0-427.26.1.el9_4
kernel-devel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-devel-matched 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-doc 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-headers 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-rt-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-rt-debuginfo 5.14.0-427.26.1.el9_4
kernel-tools-debuginfo 5.14.0-427.26.1.el9_4
libperf-debuginfo 5.14.0-427.26.1.el9_4
netstandard-targeting-pack-2.1 8.0.107-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
openssh-askpass 8.7p1-38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
openssh-askpass-debuginfo 8.7p1-38.el9_4.4
openssh-clients-debuginfo 8.7p1-38.el9_4.4
openssh-debuginfo 8.7p1-38.el9_4.4
openssh-debugsource 8.7p1-38.el9_4.4
openssh-keycat-debuginfo 8.7p1-38.el9_4.4
openssh-server-debuginfo 8.7p1-38.el9_4.4
openssh-sk-dummy-debuginfo 8.7p1-38.el9_4.4
pam_ssh_agent_auth 0.10.4-5.38.el9_4.4 RHSA-2024:4457
Security Advisory
(CVE-2024-6409)
pam_ssh_agent_auth-debuginfo 0.10.4-5.38.el9_4.4
perf 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
perf-debuginfo 5.14.0-427.26.1.el9_4
python3-perf-debuginfo 5.14.0-427.26.1.el9_4
rtla 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
rv 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
skopeo 1.14.3-3.el9_4 RHSA-2024:4502
Security Advisory
(CVE-2024-1394)
skopeo-debuginfo 1.14.3-3.el9_4
skopeo-debugsource 1.14.3-3.el9_4
skopeo-tests 1.14.3-3.el9_4 RHSA-2024:4502
Security Advisory
(CVE-2024-1394)

codeready-builder aarch64 repository

Package Version Advisory Notes
bpftool-debuginfo 7.3.0-427.26.1.el9_4
dotnet-apphost-pack-8.0-debuginfo 8.0.7-1.el9_4
dotnet-host-debuginfo 8.0.7-1.el9_4
dotnet-hostfxr-8.0-debuginfo 8.0.7-1.el9_4
dotnet-runtime-8.0-debuginfo 8.0.7-1.el9_4
dotnet-sdk-8.0-debuginfo 8.0.107-1.el9_4
dotnet-sdk-8.0-source-built-artifacts 8.0.107-1.el9_4 RHSA-2024:4450
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet8.0-debuginfo 8.0.107-1.el9_4
dotnet8.0-debugsource 8.0.107-1.el9_4
java-11-openjdk-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-debugsource 11.0.24.0.8-2.el9
java-11-openjdk-demo-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-demo-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-devel-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-devel-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-devel-fastdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-devel-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-devel-slowdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-fastdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-headless-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-headless-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-headless-fastdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-headless-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-headless-slowdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-jmods-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-jmods-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-slowdebug-debuginfo 11.0.24.0.8-2.el9
java-11-openjdk-src-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-src-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-static-libs-fastdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
java-11-openjdk-static-libs-slowdebug 11.0.24.0.8-2.el9 RHSA-2024:4567
Security Advisory
(CVE-2024-21131, CVE-2024-21138, CVE-2024-21140, CVE-2024-21144, CVE-2024-21145, CVE-2024-21147)
kernel-64k-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-64k-debuginfo 5.14.0-427.26.1.el9_4
kernel-cross-headers 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
kernel-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-debuginfo 5.14.0-427.26.1.el9_4
kernel-debuginfo-common-aarch64 5.14.0-427.26.1.el9_4
kernel-rt-debug-debuginfo 5.14.0-427.26.1.el9_4
kernel-rt-debuginfo 5.14.0-427.26.1.el9_4
kernel-tools-debuginfo 5.14.0-427.26.1.el9_4
kernel-tools-libs-devel 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
libperf 5.14.0-427.26.1.el9_4 RHSA-2024:4583
Security Advisory
(CVE-2021-47548, CVE-2021-47596, CVE-2022-48627, CVE-2023-52638, CVE-2024-26783, CVE-2024-26858, CVE-2024-27397, CVE-2024-27435, CVE-2024-35958, CVE-2024-36270, CVE-2024-36886, CVE-2024-36904, CVE-2024-36957, CVE-2024-38543, CVE-2024-38586, CVE-2024-38593, CVE-2024-38663)
libperf-debuginfo 5.14.0-427.26.1.el9_4
perf-debuginfo 5.14.0-427.26.1.el9_4
python3-perf-debuginfo 5.14.0-427.26.1.el9_4

2024-07-17

CERN x86_64 repository

Package Version Advisory Notes
cern-get-keytab 1.5.15-1.rh9.cern

openafs x86_64 repository

Package Version Advisory Notes
kmod-openafs 1.8.10-0.5.14.0_427.24.1.el9_4.rh9.cern

baseos x86_64 repository

Package Version Advisory Notes
bpftool 7.3.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
bpftool-debuginfo 7.3.0-427.24.1.el9_4
kernel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-abi-stablelists 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-debug-modules 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-modules-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-modules-extra 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-uki-virt 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debuginfo 5.14.0-427.24.1.el9_4
kernel-debuginfo-common-x86_64 5.14.0-427.24.1.el9_4
kernel-modules 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-modules-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-modules-extra 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-rt-debuginfo 5.14.0-427.24.1.el9_4
kernel-tools 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-tools-debuginfo 5.14.0-427.24.1.el9_4
kernel-tools-libs 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-uki-virt 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
libperf-debuginfo 5.14.0-427.24.1.el9_4
openssh 8.7p1-38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
openssh-askpass-debuginfo 8.7p1-38.el9_4.1
openssh-clients 8.7p1-38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
openssh-clients-debuginfo 8.7p1-38.el9_4.1
openssh-debuginfo 8.7p1-38.el9_4.1
openssh-debugsource 8.7p1-38.el9_4.1
openssh-keycat 8.7p1-38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
openssh-keycat-debuginfo 8.7p1-38.el9_4.1
openssh-server 8.7p1-38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
openssh-server-debuginfo 8.7p1-38.el9_4.1
openssh-sk-dummy-debuginfo 8.7p1-38.el9_4.1
pam_ssh_agent_auth-debuginfo 0.10.4-5.38.el9_4.1
perf-debuginfo 5.14.0-427.24.1.el9_4
python3-perf 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
python3-perf-debuginfo 5.14.0-427.24.1.el9_4

appstream x86_64 repository

Package Version Advisory Notes
aspnetcore-runtime-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
aspnetcore-targeting-pack-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
bpftool-debuginfo 7.3.0-427.24.1.el9_4
buildah 1.33.7-3.el9_4 RHSA-2024:4371
Security Advisory
(CVE-2024-1394)
buildah-debuginfo 1.33.7-3.el9_4
buildah-debugsource 1.33.7-3.el9_4
buildah-tests 1.33.7-3.el9_4 RHSA-2024:4371
Security Advisory
(CVE-2024-1394)
buildah-tests-debuginfo 1.33.7-3.el9_4
dotnet-apphost-pack-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet-apphost-pack-6.0-debuginfo 6.0.32-1.el9_4
dotnet-hostfxr-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet-hostfxr-6.0-debuginfo 6.0.32-1.el9_4
dotnet-runtime-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet-runtime-6.0-debuginfo 6.0.32-1.el9_4
dotnet-sdk-6.0 6.0.132-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet-sdk-6.0-debuginfo 6.0.132-1.el9_4
dotnet-targeting-pack-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet-templates-6.0 6.0.132-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet6.0-debuginfo 6.0.132-1.el9_4
dotnet6.0-debugsource 6.0.132-1.el9_4
fence-agents-common 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-agents-compute 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-agents-debuginfo 4.10.0-62.el9_4.4
fence-agents-debugsource 4.10.0-62.el9_4.4
fence-agents-ibm-powervs 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-agents-ibm-vpc 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-agents-kdump-debuginfo 4.10.0-62.el9_4.4
fence-agents-kubevirt 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-agents-kubevirt-debuginfo 4.10.0-62.el9_4.4
fence-agents-virsh 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-virt 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-virt-debuginfo 4.10.0-62.el9_4.4
fence-virtd 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-virtd-cpg 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-virtd-cpg-debuginfo 4.10.0-62.el9_4.4
fence-virtd-debuginfo 4.10.0-62.el9_4.4
fence-virtd-libvirt 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-virtd-libvirt-debuginfo 4.10.0-62.el9_4.4
fence-virtd-multicast 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-virtd-multicast-debuginfo 4.10.0-62.el9_4.4
fence-virtd-serial 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-virtd-serial-debuginfo 4.10.0-62.el9_4.4
fence-virtd-tcp 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-virtd-tcp-debuginfo 4.10.0-62.el9_4.4
gvisor-tap-vsock 0.7.3-4.el9_4 RHSA-2024:4379
Security Advisory
(CVE-2024-1394)
gvisor-tap-vsock-debuginfo 0.7.3-4.el9_4
gvisor-tap-vsock-debugsource 0.7.3-4.el9_4
ha-cloud-support-debuginfo 4.10.0-62.el9_4.4
kernel-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-debug-devel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-devel-matched 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debuginfo 5.14.0-427.24.1.el9_4
kernel-debuginfo-common-x86_64 5.14.0-427.24.1.el9_4
kernel-devel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-devel-matched 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-doc 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-headers 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-rt-debuginfo 5.14.0-427.24.1.el9_4
kernel-tools-debuginfo 5.14.0-427.24.1.el9_4
libperf-debuginfo 5.14.0-427.24.1.el9_4
openssh-askpass 8.7p1-38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
openssh-askpass-debuginfo 8.7p1-38.el9_4.1
openssh-clients-debuginfo 8.7p1-38.el9_4.1
openssh-debuginfo 8.7p1-38.el9_4.1
openssh-debugsource 8.7p1-38.el9_4.1
openssh-keycat-debuginfo 8.7p1-38.el9_4.1
openssh-server-debuginfo 8.7p1-38.el9_4.1
openssh-sk-dummy-debuginfo 8.7p1-38.el9_4.1
pam_ssh_agent_auth 0.10.4-5.38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
pam_ssh_agent_auth-debuginfo 0.10.4-5.38.el9_4.1
perf 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
perf-debuginfo 5.14.0-427.24.1.el9_4
podman 4.9.4-5.el9_4 RHSA-2024:4378
Security Advisory
(CVE-2024-1394)
podman-debuginfo 4.9.4-5.el9_4
podman-debugsource 4.9.4-5.el9_4
podman-docker 4.9.4-5.el9_4 RHSA-2024:4378
Security Advisory
(CVE-2024-1394)
podman-plugins 4.9.4-5.el9_4 RHSA-2024:4378
Security Advisory
(CVE-2024-1394)
podman-plugins-debuginfo 4.9.4-5.el9_4
podman-remote 4.9.4-5.el9_4 RHSA-2024:4378
Security Advisory
(CVE-2024-1394)
podman-remote-debuginfo 4.9.4-5.el9_4
podman-tests 4.9.4-5.el9_4 RHSA-2024:4378
Security Advisory
(CVE-2024-1394)
python3-perf-debuginfo 5.14.0-427.24.1.el9_4
rtla 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
rv 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)

highavailability x86_64 repository

Package Version Advisory Notes
fence-agents-aliyun 4.10.0-62.el9_4.4
fence-agents-all 4.10.0-62.el9_4.4
fence-agents-amt-ws 4.10.0-62.el9_4.4
fence-agents-apc 4.10.0-62.el9_4.4
fence-agents-apc-snmp 4.10.0-62.el9_4.4
fence-agents-aws 4.10.0-62.el9_4.4
fence-agents-azure-arm 4.10.0-62.el9_4.4
fence-agents-bladecenter 4.10.0-62.el9_4.4
fence-agents-brocade 4.10.0-62.el9_4.4
fence-agents-cisco-mds 4.10.0-62.el9_4.4
fence-agents-cisco-ucs 4.10.0-62.el9_4.4
fence-agents-debuginfo 4.10.0-62.el9_4.4
fence-agents-debugsource 4.10.0-62.el9_4.4
fence-agents-drac5 4.10.0-62.el9_4.4
fence-agents-eaton-snmp 4.10.0-62.el9_4.4
fence-agents-emerson 4.10.0-62.el9_4.4
fence-agents-eps 4.10.0-62.el9_4.4
fence-agents-gce 4.10.0-62.el9_4.4
fence-agents-heuristics-ping 4.10.0-62.el9_4.4
fence-agents-hpblade 4.10.0-62.el9_4.4
fence-agents-ibmblade 4.10.0-62.el9_4.4
fence-agents-ifmib 4.10.0-62.el9_4.4
fence-agents-ilo-moonshot 4.10.0-62.el9_4.4
fence-agents-ilo-mp 4.10.0-62.el9_4.4
fence-agents-ilo-ssh 4.10.0-62.el9_4.4
fence-agents-ilo2 4.10.0-62.el9_4.4
fence-agents-intelmodular 4.10.0-62.el9_4.4
fence-agents-ipdu 4.10.0-62.el9_4.4
fence-agents-ipmilan 4.10.0-62.el9_4.4
fence-agents-kdump 4.10.0-62.el9_4.4
fence-agents-kdump-debuginfo 4.10.0-62.el9_4.4
fence-agents-kubevirt-debuginfo 4.10.0-62.el9_4.4
fence-agents-mpath 4.10.0-62.el9_4.4
fence-agents-openstack 4.10.0-62.el9_4.4
fence-agents-redfish 4.10.0-62.el9_4.4
fence-agents-rhevm 4.10.0-62.el9_4.4
fence-agents-rsa 4.10.0-62.el9_4.4
fence-agents-rsb 4.10.0-62.el9_4.4
fence-agents-sbd 4.10.0-62.el9_4.4
fence-agents-scsi 4.10.0-62.el9_4.4
fence-agents-vmware-rest 4.10.0-62.el9_4.4
fence-agents-vmware-soap 4.10.0-62.el9_4.4
fence-agents-wti 4.10.0-62.el9_4.4
fence-virt-debuginfo 4.10.0-62.el9_4.4
fence-virtd-cpg-debuginfo 4.10.0-62.el9_4.4
fence-virtd-debuginfo 4.10.0-62.el9_4.4
fence-virtd-libvirt-debuginfo 4.10.0-62.el9_4.4
fence-virtd-multicast-debuginfo 4.10.0-62.el9_4.4
fence-virtd-serial-debuginfo 4.10.0-62.el9_4.4
fence-virtd-tcp-debuginfo 4.10.0-62.el9_4.4
ha-cloud-support 4.10.0-62.el9_4.4
ha-cloud-support-debuginfo 4.10.0-62.el9_4.4

rt x86_64 repository

Package Version Advisory Notes
bpftool-debuginfo 7.3.0-427.24.1.el9_4
kernel-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-debuginfo 5.14.0-427.24.1.el9_4
kernel-debuginfo-common-x86_64 5.14.0-427.24.1.el9_4
kernel-rt 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debug 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debug-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-rt-debug-devel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debug-modules 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debug-modules-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debug-modules-extra 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debuginfo 5.14.0-427.24.1.el9_4
kernel-rt-devel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-modules 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-modules-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-modules-extra 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-tools-debuginfo 5.14.0-427.24.1.el9_4
libperf-debuginfo 5.14.0-427.24.1.el9_4
perf-debuginfo 5.14.0-427.24.1.el9_4
python3-perf-debuginfo 5.14.0-427.24.1.el9_4

codeready-builder x86_64 repository

Package Version Advisory Notes
bpftool-debuginfo 7.3.0-427.24.1.el9_4
dotnet-apphost-pack-6.0-debuginfo 6.0.32-1.el9_4
dotnet-hostfxr-6.0-debuginfo 6.0.32-1.el9_4
dotnet-runtime-6.0-debuginfo 6.0.32-1.el9_4
dotnet-sdk-6.0-debuginfo 6.0.132-1.el9_4
dotnet-sdk-6.0-source-built-artifacts 6.0.132-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet6.0-debuginfo 6.0.132-1.el9_4
dotnet6.0-debugsource 6.0.132-1.el9_4
kernel-cross-headers 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-debuginfo 5.14.0-427.24.1.el9_4
kernel-debuginfo-common-x86_64 5.14.0-427.24.1.el9_4
kernel-rt-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-rt-debuginfo 5.14.0-427.24.1.el9_4
kernel-tools-debuginfo 5.14.0-427.24.1.el9_4
kernel-tools-libs-devel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
libperf 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
libperf-debuginfo 5.14.0-427.24.1.el9_4
perf-debuginfo 5.14.0-427.24.1.el9_4
python3-perf-debuginfo 5.14.0-427.24.1.el9_4

CERN aarch64 repository

Package Version Advisory Notes
cern-get-keytab 1.5.15-1.rh9.cern

openafs aarch64 repository

Package Version Advisory Notes
kmod-openafs 1.8.10-0.5.14.0_427.24.1.el9_4.rh9.cern

baseos aarch64 repository

Package Version Advisory Notes
bpftool 7.3.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
bpftool-debuginfo 7.3.0-427.24.1.el9_4
kernel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-debug 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-debug-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-64k-debug-modules 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-debug-modules-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-debug-modules-extra 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-debuginfo 5.14.0-427.24.1.el9_4
kernel-64k-modules 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-modules-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-modules-extra 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-abi-stablelists 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-debug-modules 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-modules-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-modules-extra 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debuginfo 5.14.0-427.24.1.el9_4
kernel-debuginfo-common-aarch64 5.14.0-427.24.1.el9_4
kernel-modules 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-modules-core 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-modules-extra 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-rt-debuginfo 5.14.0-427.24.1.el9_4
kernel-tools 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-tools-debuginfo 5.14.0-427.24.1.el9_4
kernel-tools-libs 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
libperf-debuginfo 5.14.0-427.24.1.el9_4
openssh 8.7p1-38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
openssh-askpass-debuginfo 8.7p1-38.el9_4.1
openssh-clients 8.7p1-38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
openssh-clients-debuginfo 8.7p1-38.el9_4.1
openssh-debuginfo 8.7p1-38.el9_4.1
openssh-debugsource 8.7p1-38.el9_4.1
openssh-keycat 8.7p1-38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
openssh-keycat-debuginfo 8.7p1-38.el9_4.1
openssh-server 8.7p1-38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
openssh-server-debuginfo 8.7p1-38.el9_4.1
openssh-sk-dummy-debuginfo 8.7p1-38.el9_4.1
pam_ssh_agent_auth-debuginfo 0.10.4-5.38.el9_4.1
perf-debuginfo 5.14.0-427.24.1.el9_4
python3-perf 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
python3-perf-debuginfo 5.14.0-427.24.1.el9_4

appstream aarch64 repository

Package Version Advisory Notes
aspnetcore-runtime-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
aspnetcore-targeting-pack-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
bpftool-debuginfo 7.3.0-427.24.1.el9_4
buildah 1.33.7-3.el9_4 RHSA-2024:4371
Security Advisory
(CVE-2024-1394)
buildah-debuginfo 1.33.7-3.el9_4
buildah-debugsource 1.33.7-3.el9_4
buildah-tests 1.33.7-3.el9_4 RHSA-2024:4371
Security Advisory
(CVE-2024-1394)
buildah-tests-debuginfo 1.33.7-3.el9_4
dotnet-apphost-pack-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet-apphost-pack-6.0-debuginfo 6.0.32-1.el9_4
dotnet-hostfxr-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet-hostfxr-6.0-debuginfo 6.0.32-1.el9_4
dotnet-runtime-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet-runtime-6.0-debuginfo 6.0.32-1.el9_4
dotnet-sdk-6.0 6.0.132-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet-sdk-6.0-debuginfo 6.0.132-1.el9_4
dotnet-targeting-pack-6.0 6.0.32-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet-templates-6.0 6.0.132-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet6.0-debuginfo 6.0.132-1.el9_4
dotnet6.0-debugsource 6.0.132-1.el9_4
fence-agents-common 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-agents-debuginfo 4.10.0-62.el9_4.4
fence-agents-debugsource 4.10.0-62.el9_4.4
fence-agents-ibm-powervs 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-agents-ibm-vpc 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-agents-kdump-debuginfo 4.10.0-62.el9_4.4
fence-agents-kubevirt 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
fence-agents-kubevirt-debuginfo 4.10.0-62.el9_4.4
fence-agents-virsh 4.10.0-62.el9_4.4 RHSA-2024:4422
Security Advisory
(CVE-2024-37891)
gvisor-tap-vsock 0.7.3-4.el9_4 RHSA-2024:4379
Security Advisory
(CVE-2024-1394)
gvisor-tap-vsock-debuginfo 0.7.3-4.el9_4
gvisor-tap-vsock-debugsource 0.7.3-4.el9_4
kernel-64k-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-64k-debug-devel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-debug-devel-matched 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-debuginfo 5.14.0-427.24.1.el9_4
kernel-64k-devel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-64k-devel-matched 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-debug-devel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-devel-matched 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debuginfo 5.14.0-427.24.1.el9_4
kernel-debuginfo-common-aarch64 5.14.0-427.24.1.el9_4
kernel-devel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-devel-matched 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-doc 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-headers 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-rt-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-rt-debuginfo 5.14.0-427.24.1.el9_4
kernel-tools-debuginfo 5.14.0-427.24.1.el9_4
libperf-debuginfo 5.14.0-427.24.1.el9_4
openssh-askpass 8.7p1-38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
openssh-askpass-debuginfo 8.7p1-38.el9_4.1
openssh-clients-debuginfo 8.7p1-38.el9_4.1
openssh-debuginfo 8.7p1-38.el9_4.1
openssh-debugsource 8.7p1-38.el9_4.1
openssh-keycat-debuginfo 8.7p1-38.el9_4.1
openssh-server-debuginfo 8.7p1-38.el9_4.1
openssh-sk-dummy-debuginfo 8.7p1-38.el9_4.1
pam_ssh_agent_auth 0.10.4-5.38.el9_4.1 RHSA-2024:4312
Security Advisory
(CVE-2024-6387)
pam_ssh_agent_auth-debuginfo 0.10.4-5.38.el9_4.1
perf 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
perf-debuginfo 5.14.0-427.24.1.el9_4
podman 4.9.4-5.el9_4 RHSA-2024:4378
Security Advisory
(CVE-2024-1394)
podman-debuginfo 4.9.4-5.el9_4
podman-debugsource 4.9.4-5.el9_4
podman-docker 4.9.4-5.el9_4 RHSA-2024:4378
Security Advisory
(CVE-2024-1394)
podman-plugins 4.9.4-5.el9_4 RHSA-2024:4378
Security Advisory
(CVE-2024-1394)
podman-plugins-debuginfo 4.9.4-5.el9_4
podman-remote 4.9.4-5.el9_4 RHSA-2024:4378
Security Advisory
(CVE-2024-1394)
podman-remote-debuginfo 4.9.4-5.el9_4
podman-tests 4.9.4-5.el9_4 RHSA-2024:4378
Security Advisory
(CVE-2024-1394)
python3-perf-debuginfo 5.14.0-427.24.1.el9_4
rtla 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
rv 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)

codeready-builder aarch64 repository

Package Version Advisory Notes
bpftool-debuginfo 7.3.0-427.24.1.el9_4
dotnet-apphost-pack-6.0-debuginfo 6.0.32-1.el9_4
dotnet-hostfxr-6.0-debuginfo 6.0.32-1.el9_4
dotnet-runtime-6.0-debuginfo 6.0.32-1.el9_4
dotnet-sdk-6.0-debuginfo 6.0.132-1.el9_4
dotnet-sdk-6.0-source-built-artifacts 6.0.132-1.el9_4 RHSA-2024:4439
Security Advisory
(CVE-2024-38095)
dotnet6.0-debuginfo 6.0.132-1.el9_4
dotnet6.0-debugsource 6.0.132-1.el9_4
kernel-64k-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-64k-debuginfo 5.14.0-427.24.1.el9_4
kernel-cross-headers 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
kernel-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-debuginfo 5.14.0-427.24.1.el9_4
kernel-debuginfo-common-aarch64 5.14.0-427.24.1.el9_4
kernel-rt-debug-debuginfo 5.14.0-427.24.1.el9_4
kernel-rt-debuginfo 5.14.0-427.24.1.el9_4
kernel-tools-debuginfo 5.14.0-427.24.1.el9_4
kernel-tools-libs-devel 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
libperf 5.14.0-427.24.1.el9_4 RHSA-2024:4349
Security Advisory
(CVE-2021-47400, CVE-2023-52626, CVE-2023-52667, CVE-2024-26801, CVE-2024-26974, CVE-2024-27393, CVE-2024-35870, CVE-2024-35960)
libperf-debuginfo 5.14.0-427.24.1.el9_4
perf-debuginfo 5.14.0-427.24.1.el9_4
python3-perf-debuginfo 5.14.0-427.24.1.el9_4

2024-07-10

appstream x86_64 repository

Package Version Advisory Notes
go-toolset 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang-bin 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang-docs 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang-misc 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang-src 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang-tests 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
idm-pki-acme 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-base 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-ca 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-est 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-java 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-kra 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-server 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-tools 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-tools-debuginfo 11.5.0-2.el9_4
pki-core-debugsource 11.5.0-2.el9_4
python3-idm-pki 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
qemu-guest-agent 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-guest-agent-debuginfo 8.2.0-11.el9_4.4
qemu-img 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-img-debuginfo 8.2.0-11.el9_4.4
qemu-kvm 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-audio-dbus-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-audio-pa 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-audio-pa-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-block-blkio 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-blkio-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-block-curl 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-curl-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-block-rbd 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-rbd-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-common 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-common-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-core 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-core-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-debugsource 8.2.0-11.el9_4.4
qemu-kvm-device-display-virtio-gpu 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-device-display-virtio-gpu-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-device-display-virtio-gpu-pci 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-device-display-virtio-gpu-pci-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-device-display-virtio-vga 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-device-display-virtio-vga-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-device-usb-host 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-device-usb-host-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-device-usb-redirect 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-device-usb-redirect-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-docs 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-tests-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-tools 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-tools-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-ui-dbus-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-ui-egl-headless 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-ui-egl-headless-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-ui-opengl 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-ui-opengl-debuginfo 8.2.0-11.el9_4.4
qemu-pr-helper 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-pr-helper-debuginfo 8.2.0-11.el9_4.4

appstream aarch64 repository

Package Version Advisory Notes
go-toolset 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang-bin 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang-docs 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang-misc 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang-src 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
golang-tests 1.21.11-1.el9_4 RHSA-2024:4212
Security Advisory
(CVE-2024-24789, CVE-2024-24790)
idm-pki-acme 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-base 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-ca 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-est 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-java 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-kra 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-server 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-tools 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
idm-pki-tools-debuginfo 11.5.0-2.el9_4
pki-core-debugsource 11.5.0-2.el9_4
python3-idm-pki 11.5.0-2.el9_4 RHSA-2024:4165
Security Advisory
(CVE-2023-4727)
qemu-guest-agent 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-guest-agent-debuginfo 8.2.0-11.el9_4.4
qemu-img 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-img-debuginfo 8.2.0-11.el9_4.4
qemu-kvm 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-audio-dbus-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-audio-pa 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-audio-pa-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-block-blkio 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-blkio-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-block-curl 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-curl-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-block-rbd 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-rbd-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-common 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-common-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-core 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-core-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-debugsource 8.2.0-11.el9_4.4
qemu-kvm-device-display-virtio-gpu 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-device-display-virtio-gpu-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-device-display-virtio-gpu-pci 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-device-display-virtio-gpu-pci-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-device-usb-host 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-device-usb-host-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-device-usb-redirect 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-device-usb-redirect-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-docs 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-tests-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-tools 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-kvm-tools-debuginfo 8.2.0-11.el9_4.4
qemu-kvm-ui-dbus-debuginfo 8.2.0-11.el9_4.4
qemu-pr-helper 8.2.0-11.el9_4.4 RHSA-2024:4278
Security Advisory
(CVE-2024-4467)
qemu-pr-helper-debuginfo 8.2.0-11.el9_4.4

2024-07-03

baseos x86_64 repository

Package Version Advisory Notes
python3 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3-libs 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3.9-debuginfo 3.9.18-3.el9_4.1
python3.9-debugsource 3.9.18-3.el9_4.1
sos 4.7.1-3.el9 RHBA-2024:4049
Bug Fix Advisory
sos-audit 4.7.1-3.el9 RHBA-2024:4049
Bug Fix Advisory

appstream x86_64 repository

Package Version Advisory Notes
ghostscript 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-debuginfo 9.54.0-16.el9_4
ghostscript-debugsource 9.54.0-16.el9_4
ghostscript-doc 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-gtk-debuginfo 9.54.0-16.el9_4
ghostscript-tools-dvipdf 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-tools-fonts 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-tools-printing 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-x11 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-x11-debuginfo 9.54.0-16.el9_4
git 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-all 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-core 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-core-debuginfo 2.43.5-1.el9_4
git-core-doc 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-credential-libsecret 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-credential-libsecret-debuginfo 2.43.5-1.el9_4
git-daemon 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-daemon-debuginfo 2.43.5-1.el9_4
git-debuginfo 2.43.5-1.el9_4
git-debugsource 2.43.5-1.el9_4
git-email 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-gui 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-instaweb 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-subtree 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-svn 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
gitk 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
gitweb 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
libgs 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
libgs-debuginfo 9.54.0-16.el9_4
libreswan 4.12-2.el9_4.1 RHSA-2024:4050
Security Advisory
(CVE-2024-3652)
libreswan-debuginfo 4.12-2.el9_4.1
libreswan-debugsource 4.12-2.el9_4.1
perl-Git 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
perl-Git-SVN 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
python-unversioned-command 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3-devel 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3-tkinter 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3.11 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.11-debuginfo 3.11.7-1.el9_4.1
python3.11-debugsource 3.11.7-1.el9_4.1
python3.11-devel 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.11-libs 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.11-tkinter 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.9-debuginfo 3.9.18-3.el9_4.1
python3.9-debugsource 3.9.18-3.el9_4.1
qemu-guest-agent 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-guest-agent-debuginfo 8.2.0-11.el9_4.3
qemu-img 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-img-debuginfo 8.2.0-11.el9_4.3
qemu-kvm 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-audio-dbus-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-audio-pa 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-audio-pa-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-block-blkio 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-block-blkio-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-block-curl 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-block-curl-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-block-rbd 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-block-rbd-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-common 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-common-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-core 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-core-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-debugsource 8.2.0-11.el9_4.3
qemu-kvm-device-display-virtio-gpu 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-device-display-virtio-gpu-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-device-display-virtio-gpu-pci 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-device-display-virtio-gpu-pci-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-device-display-virtio-vga 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-device-display-virtio-vga-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-device-usb-host 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-device-usb-host-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-device-usb-redirect 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-device-usb-redirect-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-docs 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-tests-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-tools 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-tools-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-ui-dbus-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-ui-egl-headless 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-ui-egl-headless-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-ui-opengl 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-ui-opengl-debuginfo 8.2.0-11.el9_4.3
qemu-pr-helper 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-pr-helper-debuginfo 8.2.0-11.el9_4.3
thunderbird 115.12.1-1.el9_4 RHSA-2024:4002
Security Advisory
(CVE-2024-5688, CVE-2024-5690, CVE-2024-5691, CVE-2024-5693, CVE-2024-5696, CVE-2024-5700, CVE-2024-5702)
thunderbird-debuginfo 115.12.1-1.el9_4
thunderbird-debugsource 115.12.1-1.el9_4

codeready-builder x86_64 repository

Package Version Advisory Notes
ghostscript-debuginfo 9.54.0-16.el9_4
ghostscript-debugsource 9.54.0-16.el9_4
ghostscript-gtk-debuginfo 9.54.0-16.el9_4
ghostscript-x11-debuginfo 9.54.0-16.el9_4
libgs-debuginfo 9.54.0-16.el9_4
libgs-devel 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
python3-debug 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3-idle 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3-test 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3.11-debug 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.11-debuginfo 3.11.7-1.el9_4.1
python3.11-debugsource 3.11.7-1.el9_4.1
python3.11-idle 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.11-test 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.9-debuginfo 3.9.18-3.el9_4.1
python3.9-debugsource 3.9.18-3.el9_4.1

baseos aarch64 repository

Package Version Advisory Notes
python3 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3-libs 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3.9-debuginfo 3.9.18-3.el9_4.1
python3.9-debugsource 3.9.18-3.el9_4.1
sos 4.7.1-3.el9 RHBA-2024:4049
Bug Fix Advisory
sos-audit 4.7.1-3.el9 RHBA-2024:4049
Bug Fix Advisory

appstream aarch64 repository

Package Version Advisory Notes
ghostscript 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-debuginfo 9.54.0-16.el9_4
ghostscript-debugsource 9.54.0-16.el9_4
ghostscript-doc 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-gtk-debuginfo 9.54.0-16.el9_4
ghostscript-tools-dvipdf 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-tools-fonts 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-tools-printing 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-x11 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
ghostscript-x11-debuginfo 9.54.0-16.el9_4
git 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-all 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-core 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-core-debuginfo 2.43.5-1.el9_4
git-core-doc 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-credential-libsecret 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-credential-libsecret-debuginfo 2.43.5-1.el9_4
git-daemon 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-daemon-debuginfo 2.43.5-1.el9_4
git-debuginfo 2.43.5-1.el9_4
git-debugsource 2.43.5-1.el9_4
git-email 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-gui 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-instaweb 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-subtree 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
git-svn 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
gitk 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
gitweb 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
libgs 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
libgs-debuginfo 9.54.0-16.el9_4
libreswan 4.12-2.el9_4.1 RHSA-2024:4050
Security Advisory
(CVE-2024-3652)
libreswan-debuginfo 4.12-2.el9_4.1
libreswan-debugsource 4.12-2.el9_4.1
perl-Git 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
perl-Git-SVN 2.43.5-1.el9_4 RHSA-2024:4083
Security Advisory
(CVE-2024-32002, CVE-2024-32004, CVE-2024-32020, CVE-2024-32021, CVE-2024-32465)
python-unversioned-command 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3-devel 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3-tkinter 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3.11 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.11-debuginfo 3.11.7-1.el9_4.1
python3.11-debugsource 3.11.7-1.el9_4.1
python3.11-devel 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.11-libs 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.11-tkinter 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.9-debuginfo 3.9.18-3.el9_4.1
python3.9-debugsource 3.9.18-3.el9_4.1
qemu-guest-agent 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-guest-agent-debuginfo 8.2.0-11.el9_4.3
qemu-img 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-img-debuginfo 8.2.0-11.el9_4.3
qemu-kvm 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-audio-dbus-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-audio-pa 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-audio-pa-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-block-blkio 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-block-blkio-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-block-curl 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-block-curl-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-block-rbd 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-block-rbd-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-common 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-common-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-core 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-core-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-debugsource 8.2.0-11.el9_4.3
qemu-kvm-device-display-virtio-gpu 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-device-display-virtio-gpu-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-device-display-virtio-gpu-pci 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-device-display-virtio-gpu-pci-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-device-usb-host 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-device-usb-host-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-device-usb-redirect 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-device-usb-redirect-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-docs 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-tests-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-tools 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-kvm-tools-debuginfo 8.2.0-11.el9_4.3
qemu-kvm-ui-dbus-debuginfo 8.2.0-11.el9_4.3
qemu-pr-helper 8.2.0-11.el9_4.3 RHBA-2024:3995
Bug Fix Advisory
qemu-pr-helper-debuginfo 8.2.0-11.el9_4.3
thunderbird 115.12.1-1.el9_4 RHSA-2024:4002
Security Advisory
(CVE-2024-5688, CVE-2024-5690, CVE-2024-5691, CVE-2024-5693, CVE-2024-5696, CVE-2024-5700, CVE-2024-5702)
thunderbird-debuginfo 115.12.1-1.el9_4
thunderbird-debugsource 115.12.1-1.el9_4

codeready-builder aarch64 repository

Package Version Advisory Notes
ghostscript-debuginfo 9.54.0-16.el9_4
ghostscript-debugsource 9.54.0-16.el9_4
ghostscript-gtk-debuginfo 9.54.0-16.el9_4
ghostscript-x11-debuginfo 9.54.0-16.el9_4
libgs-debuginfo 9.54.0-16.el9_4
libgs-devel 9.54.0-16.el9_4 RHSA-2024:3999
Security Advisory
(CVE-2024-33871)
python3-debug 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3-idle 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3-test 3.9.18-3.el9_4.1 RHSA-2024:4078
Security Advisory
(CVE-2023-6597, CVE-2024-0450)
python3.11-debug 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.11-debuginfo 3.11.7-1.el9_4.1
python3.11-debugsource 3.11.7-1.el9_4.1
python3.11-idle 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.11-test 3.11.7-1.el9_4.1 RHSA-2024:4077
Security Advisory
(CVE-2023-6597)
python3.9-debuginfo 3.9.18-3.el9_4.1
python3.9-debugsource 3.9.18-3.el9_4.1