March updates¶
2024-03-27¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
aspnetcore-runtime-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
aspnetcore-runtime-dbg-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
aspnetcore-targeting-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
aspnetcore-targeting-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dnsmasq | 2.79-31.el8_9.2 | RHSA-2024:1335 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
dnsmasq-debuginfo | 2.79-31.el8_9.2 | ||
dnsmasq-debugsource | 2.79-31.el8_9.2 | ||
dnsmasq-utils | 2.79-31.el8_9.2 | RHSA-2024:1335 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
dnsmasq-utils-debuginfo | 2.79-31.el8_9.2 | ||
dotnet | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-apphost-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-apphost-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-apphost-pack-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-host | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-host-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-hostfxr-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-hostfxr-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-hostfxr-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-runtime-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-runtime-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-runtime-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-runtime-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-runtime-dbg-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-7.0 | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-7.0-debuginfo | 7.0.117-1.el8_9 | ||
dotnet-sdk-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-8.0-debuginfo | 8.0.103-1.el8_9 | ||
dotnet-sdk-dbg-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-targeting-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-targeting-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-templates-7.0 | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-templates-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet7.0-debuginfo | 7.0.117-1.el8_9 | ||
dotnet7.0-debugsource | 7.0.117-1.el8_9 | ||
dotnet8.0-debuginfo | 8.0.103-1.el8_9 | ||
dotnet8.0-debugsource | 8.0.103-1.el8_9 | ||
netstandard-targeting-pack-2.1 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
ruby | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-bundled-gems | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-bundled-gems-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
ruby-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
ruby-debugsource | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
ruby-default-gems | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-devel | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-doc | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-libs | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-libs-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-abrt | 0.4.0-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-abrt-doc | 0.4.0-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-bigdecimal | 3.1.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-bigdecimal-debuginfo | 3.1.1-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-bundler | 2.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-io-console | 0.5.11-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-io-console-debuginfo | 0.5.11-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-irb | 1.4.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-json | 2.6.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-json-debuginfo | 2.6.1-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-minitest | 5.15.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-mysql2 | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-mysql2-debuginfo | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-mysql2-debugsource | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-mysql2-doc | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-pg | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-pg-debuginfo | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-pg-debugsource | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-pg-doc | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-power_assert | 2.0.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-psych | 4.0.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-psych-debuginfo | 4.0.4-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-rake | 13.0.6-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rbs | 2.7.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rbs-debuginfo | 2.7.0-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-rdoc | 6.4.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rexml | 3.2.5-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rss | 0.2.9-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-test-unit | 3.5.3-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-typeprof | 0.21.3-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygems | 3.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygems-devel | 3.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
squid | 4.15-7.module+el8.9.0+21530+59b09a5b.10 | RHSA-2024:1375 | Security Advisory (CVE-2023-50269, CVE-2024-25111, CVE-2024-25617) |
squid-debuginfo | 4.15-7.module+el8.9.0+21530+59b09a5b.10 | ||
squid-debugsource | 4.15-7.module+el8.9.0+21530+59b09a5b.10 |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-apphost-pack-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-host-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-hostfxr-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-runtime-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-runtime-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-sdk-7.0-debuginfo | 7.0.117-1.el8_9 | ||
dotnet-sdk-7.0-source-built-artifacts | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-8.0-debuginfo | 8.0.103-1.el8_9 | ||
dotnet-sdk-8.0-source-built-artifacts | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet7.0-debuginfo | 7.0.117-1.el8_9 | ||
dotnet7.0-debugsource | 7.0.117-1.el8_9 | ||
dotnet8.0-debuginfo | 8.0.103-1.el8_9 | ||
dotnet8.0-debugsource | 8.0.103-1.el8_9 |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
aspnetcore-runtime-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
aspnetcore-runtime-dbg-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
aspnetcore-targeting-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
aspnetcore-targeting-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dnsmasq | 2.79-31.el8_9.2 | RHSA-2024:1335 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
dnsmasq-debuginfo | 2.79-31.el8_9.2 | ||
dnsmasq-debugsource | 2.79-31.el8_9.2 | ||
dnsmasq-utils | 2.79-31.el8_9.2 | RHSA-2024:1335 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
dnsmasq-utils-debuginfo | 2.79-31.el8_9.2 | ||
dotnet | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-apphost-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-apphost-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-apphost-pack-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-host | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-host-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-hostfxr-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-hostfxr-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-hostfxr-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-runtime-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-runtime-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-runtime-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-runtime-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-runtime-dbg-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-7.0 | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-7.0-debuginfo | 7.0.117-1.el8_9 | ||
dotnet-sdk-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-8.0-debuginfo | 8.0.103-1.el8_9 | ||
dotnet-sdk-dbg-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-targeting-pack-7.0 | 7.0.17-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-targeting-pack-8.0 | 8.0.3-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet-templates-7.0 | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-templates-8.0 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet7.0-debuginfo | 7.0.117-1.el8_9 | ||
dotnet7.0-debugsource | 7.0.117-1.el8_9 | ||
dotnet8.0-debuginfo | 8.0.103-1.el8_9 | ||
dotnet8.0-debugsource | 8.0.103-1.el8_9 | ||
netstandard-targeting-pack-2.1 | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
ruby | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-bundled-gems | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-bundled-gems-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
ruby-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
ruby-debugsource | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
ruby-default-gems | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-devel | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-doc | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-libs | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
ruby-libs-debuginfo | 3.1.4-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-abrt | 0.4.0-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-abrt-doc | 0.4.0-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-bigdecimal | 3.1.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-bigdecimal-debuginfo | 3.1.1-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-bundler | 2.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-io-console | 0.5.11-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-io-console-debuginfo | 0.5.11-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-irb | 1.4.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-json | 2.6.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-json-debuginfo | 2.6.1-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-minitest | 5.15.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-mysql2 | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-mysql2-debuginfo | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-mysql2-debugsource | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-mysql2-doc | 0.5.3-3.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-pg | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-pg-debuginfo | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-pg-debugsource | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-pg-doc | 1.3.2-1.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-power_assert | 2.0.1-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-psych | 4.0.4-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-psych-debuginfo | 4.0.4-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-rake | 13.0.6-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rbs | 2.7.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rbs-debuginfo | 2.7.0-142.module+el8.9.0+21471+7d1e4a35 | ||
rubygem-rdoc | 6.4.0-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rexml | 3.2.5-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-rss | 0.2.9-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-test-unit | 3.5.3-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygem-typeprof | 0.21.3-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygems | 3.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
rubygems-devel | 3.3.26-142.module+el8.9.0+21471+7d1e4a35 | RHSA-2024:1431 | Security Advisory (CVE-2021-33621, CVE-2023-28755, CVE-2023-28756, CVE-2023-36617) |
squid | 4.15-7.module+el8.9.0+21530+59b09a5b.10 | RHSA-2024:1375 | Security Advisory (CVE-2023-50269, CVE-2024-25111, CVE-2024-25617) |
squid-debuginfo | 4.15-7.module+el8.9.0+21530+59b09a5b.10 | ||
squid-debugsource | 4.15-7.module+el8.9.0+21530+59b09a5b.10 |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-apphost-pack-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-host-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-hostfxr-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-hostfxr-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-runtime-7.0-debuginfo | 7.0.17-1.el8_9 | ||
dotnet-runtime-8.0-debuginfo | 8.0.3-1.el8_9 | ||
dotnet-sdk-7.0-debuginfo | 7.0.117-1.el8_9 | ||
dotnet-sdk-7.0-source-built-artifacts | 7.0.117-1.el8_9 | RHSA-2024:1308 | Security Advisory (CVE-2024-21392) |
dotnet-sdk-8.0-debuginfo | 8.0.103-1.el8_9 | ||
dotnet-sdk-8.0-source-built-artifacts | 8.0.103-1.el8_9 | RHSA-2024:1311 | Security Advisory (CVE-2024-21392) |
dotnet7.0-debuginfo | 7.0.117-1.el8_9 | ||
dotnet7.0-debugsource | 7.0.117-1.el8_9 | ||
dotnet8.0-debuginfo | 8.0.103-1.el8_9 | ||
dotnet8.0-debugsource | 8.0.103-1.el8_9 |
2024-03-20¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
aspnetcore-targeting-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-apphost-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-apphost-pack-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-hostfxr-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-hostfxr-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-runtime-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-runtime-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-sdk-6.0 | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-sdk-6.0-debuginfo | 6.0.128-1.el8_9 | ||
dotnet-targeting-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-templates-6.0 | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet6.0-debuginfo | 6.0.128-1.el8_9 | ||
dotnet6.0-debugsource | 6.0.128-1.el8_9 |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-hostfxr-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-runtime-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-sdk-6.0-debuginfo | 6.0.128-1.el8_9 | ||
dotnet-sdk-6.0-source-built-artifacts | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet6.0-debuginfo | 6.0.128-1.el8_9 | ||
dotnet6.0-debugsource | 6.0.128-1.el8_9 |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
aspnetcore-targeting-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-apphost-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-apphost-pack-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-hostfxr-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-hostfxr-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-runtime-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-runtime-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-sdk-6.0 | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-sdk-6.0-debuginfo | 6.0.128-1.el8_9 | ||
dotnet-targeting-pack-6.0 | 6.0.28-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet-templates-6.0 | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet6.0-debuginfo | 6.0.128-1.el8_9 | ||
dotnet6.0-debugsource | 6.0.128-1.el8_9 |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-hostfxr-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-runtime-6.0-debuginfo | 6.0.28-1.el8_9 | ||
dotnet-sdk-6.0-debuginfo | 6.0.128-1.el8_9 | ||
dotnet-sdk-6.0-source-built-artifacts | 6.0.128-1.el8_9 | RHBA-2024:1298 | Bug Fix Advisory |
dotnet6.0-debuginfo | 6.0.128-1.el8_9 | ||
dotnet6.0-debugsource | 6.0.128-1.el8_9 |
2024-03-13¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
edk2-ovmf | 20220126gitbb1bba3d77-6.el8_9.6 | RHSA-2024:1063 | Security Advisory (CVE-2023-45230, CVE-2023-45234) |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
edk2-aarch64 | 20220126gitbb1bba3d77-6.el8_9.6 | RHSA-2024:1063 | Security Advisory (CVE-2023-45230, CVE-2023-45234) |
2024-03-06¶
baseos x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
opensc | 0.20.0-8.el8_9 | RHSA-2024:0967 | Security Advisory (CVE-2023-5992) |
opensc-debuginfo | 0.20.0-8.el8_9 | ||
opensc-debugsource | 0.20.0-8.el8_9 |
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
firefox | 115.8.0-1.el8_9 | RHSA-2024:0955 | Security Advisory (CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553) |
firefox-debuginfo | 115.8.0-1.el8_9 | ||
firefox-debugsource | 115.8.0-1.el8_9 | ||
pgaudit | 1.4.0-7.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
pgaudit-debuginfo | 1.4.0-7.module+el8.9.0+21289+7c796f9d | ||
pgaudit-debugsource | 1.4.0-7.module+el8.9.0+21289+7c796f9d | ||
postgresql | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-contrib | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-contrib | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-contrib | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-contrib | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-contrib-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-contrib-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-contrib-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-contrib-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-debugsource | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-debugsource | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-debugsource | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-debugsource | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-docs | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-docs | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-docs | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-docs | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-docs-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-docs-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-docs-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-docs-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-plperl | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-plperl | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-plperl | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-plperl | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-plperl-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-plperl-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-plperl-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-plperl-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-plpython3 | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-plpython3 | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-plpython3 | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-plpython3 | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-plpython3-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-plpython3-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-plpython3-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-plpython3-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-pltcl | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-pltcl | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-pltcl | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-pltcl | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-pltcl-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-pltcl-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-pltcl-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-pltcl-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-private-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-private-libs | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-private-libs-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-server | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-server | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-server | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-server | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-server-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-server-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-server-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-server-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-server-devel | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-server-devel | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-server-devel | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-server-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-server-devel-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-server-devel-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-server-devel-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-server-devel-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-static | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-static | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-static | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-static | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-test | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-test | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-test | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-test | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-test-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-test-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-test-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-test-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-test-rpm-macros | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-test-rpm-macros | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-test-rpm-macros | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-test-rpm-macros | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-upgrade-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-upgrade-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-upgrade-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-upgrade-devel | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade-devel | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade-devel | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade-devel-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-upgrade-devel-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-upgrade-devel-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-upgrade-devel-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
python3-unbound | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
python3-unbound-debuginfo | 1.16.2-5.el8_9.2 | ||
scap-security-guide | 0.1.72-2.el8_9 | RHBA-2024:0987 | Bug Fix Advisory |
scap-security-guide-doc | 0.1.72-2.el8_9 | RHBA-2024:0987 | Bug Fix Advisory |
thunderbird | 115.8.0-1.el8_9 | RHSA-2024:0964 | Security Advisory (CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553) |
thunderbird-debuginfo | 115.8.0-1.el8_9 | ||
thunderbird-debugsource | 115.8.0-1.el8_9 | ||
unbound | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
unbound-debuginfo | 1.16.2-5.el8_9.2 | ||
unbound-debugsource | 1.16.2-5.el8_9.2 | ||
unbound-devel | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
unbound-libs | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
unbound-libs-debuginfo | 1.16.2-5.el8_9.2 |
baseos aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
opensc | 0.20.0-8.el8_9 | RHSA-2024:0967 | Security Advisory (CVE-2023-5992) |
opensc-debuginfo | 0.20.0-8.el8_9 | ||
opensc-debugsource | 0.20.0-8.el8_9 |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
firefox | 115.8.0-1.el8_9 | RHSA-2024:0955 | Security Advisory (CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553) |
firefox-debuginfo | 115.8.0-1.el8_9 | ||
firefox-debugsource | 115.8.0-1.el8_9 | ||
pgaudit | 1.4.0-7.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
pgaudit-debuginfo | 1.4.0-7.module+el8.9.0+21289+7c796f9d | ||
pgaudit-debugsource | 1.4.0-7.module+el8.9.0+21289+7c796f9d | ||
postgresql | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-contrib | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-contrib | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-contrib | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-contrib | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-contrib-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-contrib-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-contrib-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-contrib-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-debugsource | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-debugsource | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-debugsource | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-debugsource | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-docs | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-docs | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-docs | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-docs | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-docs-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-docs-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-docs-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-docs-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-plperl | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-plperl | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-plperl | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-plperl | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-plperl-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-plperl-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-plperl-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-plperl-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-plpython3 | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-plpython3 | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-plpython3 | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-plpython3 | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-plpython3-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-plpython3-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-plpython3-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-plpython3-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-pltcl | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-pltcl | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-pltcl | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-pltcl | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-pltcl-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-pltcl-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-pltcl-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-pltcl-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-private-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-private-libs | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-private-libs-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-server | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-server | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-server | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-server | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-server-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-server-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-server-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-server-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-server-devel | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-server-devel | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-server-devel | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-server-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-server-devel-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-server-devel-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-server-devel-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-server-devel-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-static | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-static | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-static | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-static | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-test | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-test | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-test | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-test | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-test-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-test-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-test-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-test-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-test-rpm-macros | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-test-rpm-macros | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-test-rpm-macros | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-test-rpm-macros | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-upgrade-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-upgrade-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-upgrade-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
postgresql-upgrade-devel | 10.23-4.module+el8.9.0+21317+d2c6bf8a | RHSA-2024:0956 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade-devel | 12.18-1.module+el8.9.0+21289+7c796f9d | RHSA-2024:0974 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade-devel | 13.14-1.module+el8.9.0+21288+3d364c44 | RHSA-2024:0975 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade-devel | 15.6-1.module+el8.9.0+21287+d0eecfe6 | RHSA-2024:0973 | Security Advisory (CVE-2024-0985) |
postgresql-upgrade-devel-debuginfo | 10.23-4.module+el8.9.0+21317+d2c6bf8a | ||
postgresql-upgrade-devel-debuginfo | 12.18-1.module+el8.9.0+21289+7c796f9d | ||
postgresql-upgrade-devel-debuginfo | 13.14-1.module+el8.9.0+21288+3d364c44 | ||
postgresql-upgrade-devel-debuginfo | 15.6-1.module+el8.9.0+21287+d0eecfe6 | ||
python3-unbound | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
python3-unbound-debuginfo | 1.16.2-5.el8_9.2 | ||
scap-security-guide | 0.1.72-2.el8_9 | RHBA-2024:0987 | Bug Fix Advisory |
scap-security-guide-doc | 0.1.72-2.el8_9 | RHBA-2024:0987 | Bug Fix Advisory |
thunderbird | 115.8.0-1.el8_9 | RHSA-2024:0964 | Security Advisory (CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553) |
thunderbird-debuginfo | 115.8.0-1.el8_9 | ||
thunderbird-debugsource | 115.8.0-1.el8_9 | ||
unbound | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
unbound-debuginfo | 1.16.2-5.el8_9.2 | ||
unbound-debugsource | 1.16.2-5.el8_9.2 | ||
unbound-devel | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
unbound-libs | 1.16.2-5.el8_9.2 | RHSA-2024:0965 | Security Advisory (CVE-2023-50387, CVE-2023-50868) |
unbound-libs-debuginfo | 1.16.2-5.el8_9.2 |