Latest testing System Updates for Red Hat Enterprise Linux 8 (RHEL8)¶
Make sure the testing repositories are enabled by running as root:
dnf install cern-yum-tool
cern-yum-tool --testing
or simply:
echo "8-testing" > /etc/dnf/vars/cernrhel
Please verify that your system is up to date, running as root:
/usr/bin/dnf check-update
If the above command shows you available updates apply these, running as root:
/usr/bin/dnf update
or if you only want to apply security updates, run as root:
/usr/bin/dnf --security update
To receive notifications of updates, please sign up to the e-group linux-announce-rhel.
For more information about software repositories please check: RHEL8 software repositories
2024-12-13¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
python3.11 | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-debuginfo | 3.11.11-1.el8_10 | ||
python3.11-debugsource | 3.11.11-1.el8_10 | ||
python3.11-devel | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-libs | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-rpm-macros | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-tkinter | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.12 | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-debuginfo | 3.12.8-1.el8_10 | ||
python3.12-debugsource | 3.12.8-1.el8_10 | ||
python3.12-devel | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-libs | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-rpm-macros | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-tkinter | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
highavailability x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
pcs | 0.10.18-2.el8_10.3 | RHSA-2024:10987 | Security Advisory (CVE-2024-21510) |
pcs-snmp | 0.10.18-2.el8_10.3 | RHSA-2024:10987 | Security Advisory (CVE-2024-21510) |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
python3.11-debug | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-debuginfo | 3.11.11-1.el8_10 | ||
python3.11-debugsource | 3.11.11-1.el8_10 | ||
python3.11-idle | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-test | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.12-debug | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-debuginfo | 3.12.8-1.el8_10 | ||
python3.12-debugsource | 3.12.8-1.el8_10 | ||
python3.12-idle | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-test | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
python3.11 | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-debuginfo | 3.11.11-1.el8_10 | ||
python3.11-debugsource | 3.11.11-1.el8_10 | ||
python3.11-devel | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-libs | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-rpm-macros | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-tkinter | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.12 | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-debuginfo | 3.12.8-1.el8_10 | ||
python3.12-debugsource | 3.12.8-1.el8_10 | ||
python3.12-devel | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-libs | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-rpm-macros | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-tkinter | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
python3.11-debug | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-debuginfo | 3.11.11-1.el8_10 | ||
python3.11-debugsource | 3.11.11-1.el8_10 | ||
python3.11-idle | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.11-test | 3.11.11-1.el8_10 | RHSA-2024:10979 | Security Advisory (CVE-2024-9287) |
python3.12-debug | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-debuginfo | 3.12.8-1.el8_10 | ||
python3.12-debugsource | 3.12.8-1.el8_10 | ||
python3.12-idle | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
python3.12-test | 3.12.8-1.el8_10 | RHSA-2024:10980 | Security Advisory (CVE-2024-12254, CVE-2024-9287) |
2024-12-12¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
apcu-panel | 5.1.18-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
libzip | 1.6.1-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
libzip-debuginfo | 1.6.1-1.module+el8.10.0+22485+a3539972 | ||
libzip-debugsource | 1.6.1-1.module+el8.10.0+22485+a3539972 | ||
libzip-devel | 1.6.1-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
libzip-tools | 1.6.1-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
libzip-tools-debuginfo | 1.6.1-1.module+el8.10.0+22485+a3539972 | ||
php | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-bcmath | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-bcmath | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-bcmath-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-bcmath-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-cli | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-cli | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-cli-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-cli-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-common | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-common | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-common-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-common-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-dba | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-dba | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-dba-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-dba-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-dbg | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-dbg | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-dbg-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-dbg-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-debugsource | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-debugsource | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-devel | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-devel | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-embedded | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-embedded | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-embedded-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-embedded-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-enchant | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-enchant | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-enchant-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-enchant-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-ffi | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-ffi | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-ffi-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-ffi-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-fpm | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-fpm | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-fpm-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-fpm-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-gd | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-gd | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-gd-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-gd-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-gmp | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-gmp | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-gmp-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-gmp-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-intl | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-intl | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-intl-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-intl-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-json | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-json-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-ldap | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-ldap | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-ldap-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-ldap-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-mbstring | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-mbstring | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-mbstring-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-mbstring-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-mysqlnd | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-mysqlnd | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-mysqlnd-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-mysqlnd-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-odbc | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-odbc | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-odbc-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-odbc-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-opcache | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-opcache | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-opcache-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-opcache-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-pdo | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pdo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pdo-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-pdo-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-pear | 1.10.13-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-apcu | 5.1.18-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-apcu-debuginfo | 5.1.18-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-apcu-debugsource | 5.1.18-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-apcu-devel | 5.1.18-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-rrd | 2.0.1-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-rrd-debuginfo | 2.0.1-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-rrd-debugsource | 2.0.1-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-xdebug | 2.9.5-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-xdebug-debuginfo | 2.9.5-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-xdebug-debugsource | 2.9.5-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-zip | 1.18.2-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-zip-debuginfo | 1.18.2-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-zip-debugsource | 1.18.2-1.module+el8.10.0+22485+a3539972 | ||
php-pgsql | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pgsql | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pgsql-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-pgsql-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-process | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-process | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-process-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-process-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-snmp | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-snmp | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-snmp-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-snmp-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-soap | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-soap | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-soap-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-soap-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-xml | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-xml | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-xml-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-xml-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-xmlrpc | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-xmlrpc-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
python-virtualenv-doc | 15.1.0-23.module+el8.10.0+22619+61b70790 | RHSA-2024:10953 | Security Advisory (CVE-2024-53899) |
python3-virtualenv | 15.1.0-23.module+el8.10.0+22619+61b70790 | RHSA-2024:10953 | Security Advisory (CVE-2024-53899) |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
apcu-panel | 5.1.18-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
libzip | 1.6.1-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
libzip-debuginfo | 1.6.1-1.module+el8.10.0+22485+a3539972 | ||
libzip-debugsource | 1.6.1-1.module+el8.10.0+22485+a3539972 | ||
libzip-devel | 1.6.1-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
libzip-tools | 1.6.1-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
libzip-tools-debuginfo | 1.6.1-1.module+el8.10.0+22485+a3539972 | ||
php | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-bcmath | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-bcmath | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-bcmath-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-bcmath-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-cli | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-cli | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-cli-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-cli-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-common | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-common | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-common-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-common-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-dba | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-dba | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-dba-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-dba-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-dbg | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-dbg | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-dbg-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-dbg-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-debugsource | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-debugsource | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-devel | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-devel | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-embedded | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-embedded | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-embedded-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-embedded-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-enchant | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-enchant | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-enchant-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-enchant-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-ffi | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-ffi | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-ffi-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-ffi-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-fpm | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-fpm | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-fpm-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-fpm-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-gd | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-gd | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-gd-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-gd-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-gmp | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-gmp | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-gmp-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-gmp-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-intl | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-intl | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-intl-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-intl-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-json | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-json-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-ldap | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-ldap | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-ldap-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-ldap-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-mbstring | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-mbstring | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-mbstring-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-mbstring-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-mysqlnd | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-mysqlnd | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-mysqlnd-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-mysqlnd-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-odbc | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-odbc | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-odbc-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-odbc-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-opcache | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-opcache | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-opcache-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-opcache-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-pdo | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pdo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pdo-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-pdo-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-pear | 1.10.13-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-apcu | 5.1.18-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-apcu-debuginfo | 5.1.18-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-apcu-debugsource | 5.1.18-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-apcu-devel | 5.1.18-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-rrd | 2.0.1-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-rrd-debuginfo | 2.0.1-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-rrd-debugsource | 2.0.1-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-xdebug | 2.9.5-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-xdebug-debuginfo | 2.9.5-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-xdebug-debugsource | 2.9.5-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-zip | 1.18.2-1.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pecl-zip-debuginfo | 1.18.2-1.module+el8.10.0+22485+a3539972 | ||
php-pecl-zip-debugsource | 1.18.2-1.module+el8.10.0+22485+a3539972 | ||
php-pgsql | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pgsql | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-pgsql-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-pgsql-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-process | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-process | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-process-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-process-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-snmp | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-snmp | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-snmp-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-snmp-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-soap | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-soap | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-soap-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-soap-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-xml | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-xml | 8.2.25-1.module+el8.10.0+22478+9eb07224 | RHSA-2024:10951 | Security Advisory (CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-xml-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
php-xml-debuginfo | 8.2.25-1.module+el8.10.0+22478+9eb07224 | ||
php-xmlrpc | 7.4.33-2.module+el8.10.0+22485+a3539972 | RHSA-2024:10952 | Security Advisory (CVE-2023-0567, CVE-2023-0568, CVE-2023-3247, CVE-2023-3823, CVE-2023-3824, CVE-2024-2756, CVE-2024-3096, CVE-2024-5458, CVE-2024-8925, CVE-2024-8927, CVE-2024-9026) |
php-xmlrpc-debuginfo | 7.4.33-2.module+el8.10.0+22485+a3539972 | ||
python-virtualenv-doc | 15.1.0-23.module+el8.10.0+22619+61b70790 | RHSA-2024:10953 | Security Advisory (CVE-2024-53899) |
python3-virtualenv | 15.1.0-23.module+el8.10.0+22619+61b70790 | RHSA-2024:10953 | Security Advisory (CVE-2024-53899) |
2024-12-11¶
openafs x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
kmod-openafs | 1.8.10-0.4.18.0_553.32.1.el8_10.rh8.cern |
baseos x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bpftool | 4.18.0-553.32.1.el8_10 | ||
bpftool-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel | 4.18.0-553.32.1.el8_10 | ||
kernel-abi-stablelists | 4.18.0-553.32.1.el8_10 | ||
kernel-core | 4.18.0-553.32.1.el8_10 | ||
kernel-cross-headers | 4.18.0-553.32.1.el8_10 | ||
kernel-debug | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-core | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-devel | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-modules | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-modules-extra | 4.18.0-553.32.1.el8_10 | ||
kernel-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-debuginfo-common-x86_64 | 4.18.0-553.32.1.el8_10 | ||
kernel-devel | 4.18.0-553.32.1.el8_10 | ||
kernel-doc | 4.18.0-553.32.1.el8_10 | ||
kernel-headers | 4.18.0-553.32.1.el8_10 | ||
kernel-modules | 4.18.0-553.32.1.el8_10 | ||
kernel-modules-extra | 4.18.0-553.32.1.el8_10 | ||
kernel-tools | 4.18.0-553.32.1.el8_10 | ||
kernel-tools-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-tools-libs | 4.18.0-553.32.1.el8_10 | ||
perf | 4.18.0-553.32.1.el8_10 | ||
perf-debuginfo | 4.18.0-553.32.1.el8_10 | ||
python3-perf | 4.18.0-553.32.1.el8_10 | ||
python3-perf-debuginfo | 4.18.0-553.32.1.el8_10 |
rt x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
kernel-rt | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-core | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-debug | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-debug-core | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-debug-debuginfo | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-debug-devel | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-debug-modules | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-debug-modules-extra | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-debuginfo | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-debuginfo-common-x86_64 | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-devel | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-modules | 4.18.0-553.32.1.rt7.373.el8_10 | ||
kernel-rt-modules-extra | 4.18.0-553.32.1.rt7.373.el8_10 |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bpftool-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-debuginfo-common-x86_64 | 4.18.0-553.32.1.el8_10 | ||
kernel-tools-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-tools-libs-devel | 4.18.0-553.32.1.el8_10 | ||
perf-debuginfo | 4.18.0-553.32.1.el8_10 | ||
python3-perf-debuginfo | 4.18.0-553.32.1.el8_10 |
openafs aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
kmod-openafs | 1.8.10-0.4.18.0_553.32.1.el8_10.rh8.cern |
baseos aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bpftool | 4.18.0-553.32.1.el8_10 | ||
bpftool-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel | 4.18.0-553.32.1.el8_10 | ||
kernel-abi-stablelists | 4.18.0-553.32.1.el8_10 | ||
kernel-core | 4.18.0-553.32.1.el8_10 | ||
kernel-cross-headers | 4.18.0-553.32.1.el8_10 | ||
kernel-debug | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-core | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-devel | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-modules | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-modules-extra | 4.18.0-553.32.1.el8_10 | ||
kernel-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-debuginfo-common-aarch64 | 4.18.0-553.32.1.el8_10 | ||
kernel-devel | 4.18.0-553.32.1.el8_10 | ||
kernel-doc | 4.18.0-553.32.1.el8_10 | ||
kernel-headers | 4.18.0-553.32.1.el8_10 | ||
kernel-modules | 4.18.0-553.32.1.el8_10 | ||
kernel-modules-extra | 4.18.0-553.32.1.el8_10 | ||
kernel-tools | 4.18.0-553.32.1.el8_10 | ||
kernel-tools-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-tools-libs | 4.18.0-553.32.1.el8_10 | ||
perf | 4.18.0-553.32.1.el8_10 | ||
perf-debuginfo | 4.18.0-553.32.1.el8_10 | ||
python3-perf | 4.18.0-553.32.1.el8_10 | ||
python3-perf-debuginfo | 4.18.0-553.32.1.el8_10 |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bpftool-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-debug-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-debuginfo-common-aarch64 | 4.18.0-553.32.1.el8_10 | ||
kernel-tools-debuginfo | 4.18.0-553.32.1.el8_10 | ||
kernel-tools-libs-devel | 4.18.0-553.32.1.el8_10 | ||
perf-debuginfo | 4.18.0-553.32.1.el8_10 | ||
python3-perf-debuginfo | 4.18.0-553.32.1.el8_10 |
2024-12-06¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-9.0 | 9.0.0-2.el8_10 | ||
aspnetcore-runtime-dbg-9.0 | 9.0.0-2.el8_10 | ||
aspnetcore-targeting-pack-9.0 | 9.0.0-2.el8_10 | ||
dotnet | 9.0.101-2.el8_10 | ||
dotnet-apphost-pack-9.0 | 9.0.0-2.el8_10 | ||
dotnet-apphost-pack-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-host | 9.0.0-2.el8_10 | ||
dotnet-host-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-hostfxr-9.0 | 9.0.0-2.el8_10 | ||
dotnet-hostfxr-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-runtime-9.0 | 9.0.0-2.el8_10 | ||
dotnet-runtime-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-runtime-dbg-9.0 | 9.0.0-2.el8_10 | ||
dotnet-sdk-9.0 | 9.0.101-2.el8_10 | ||
dotnet-sdk-9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet-sdk-aot-9.0 | 9.0.101-2.el8_10 | ||
dotnet-sdk-aot-9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet-sdk-dbg-9.0 | 9.0.101-2.el8_10 | ||
dotnet-targeting-pack-9.0 | 9.0.0-2.el8_10 | ||
dotnet-templates-9.0 | 9.0.101-2.el8_10 | ||
dotnet9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet9.0-debugsource | 9.0.101-2.el8_10 | ||
netstandard-targeting-pack-2.1 | 9.0.101-2.el8_10 | ||
pg_repack | 1.5.1-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
pg_repack-debuginfo | 1.5.1-1.module+el8.10.0+22551+c0330dc9 | ||
pg_repack-debugsource | 1.5.1-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-contrib | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-contrib | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-contrib | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-contrib-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-contrib-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-contrib-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-debugsource | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-debugsource | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-debugsource | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-docs | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-docs | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-docs | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-docs-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-docs-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-docs-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-plperl | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plperl | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plperl | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plperl-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-plperl-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-plperl-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-plpython3 | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plpython3 | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plpython3 | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plpython3-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-plpython3-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-plpython3-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-pltcl | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-pltcl | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-pltcl | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-pltcl-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-pltcl-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-pltcl-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-private-devel | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-private-devel | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-private-libs | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-private-libs | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-private-libs-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-private-libs-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-server | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-server-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-server-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-server-devel | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server-devel | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server-devel | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server-devel-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-server-devel-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-server-devel-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-static | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-static | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-static | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-test-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-test-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-test-rpm-macros | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test-rpm-macros | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test-rpm-macros | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-upgrade-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-upgrade-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-upgrade-devel | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade-devel | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade-devel | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade-devel-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-upgrade-devel-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-upgrade-devel-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
ruby | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
ruby | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-bundled-gems | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-bundled-gems-debuginfo | 3.1.5-144.module+el8.10.0+22580+b97d9670 | ||
ruby-debuginfo | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | ||
ruby-debuginfo | 3.1.5-144.module+el8.10.0+22580+b97d9670 | ||
ruby-debugsource | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | ||
ruby-debugsource | 3.1.5-144.module+el8.10.0+22580+b97d9670 | ||
ruby-default-gems | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-devel | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
ruby-devel | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-doc | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
ruby-doc | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-irb | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
ruby-libs | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
ruby-libs | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-libs-debuginfo | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | ||
ruby-libs-debuginfo | 3.1.5-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-bigdecimal | 1.3.4-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-bigdecimal | 3.1.1-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-bigdecimal-debuginfo | 1.3.4-113.module+el8.10.0+22581+23fc9c9e | ||
rubygem-bigdecimal-debuginfo | 3.1.1-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-bundler | 2.3.27-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-did_you_mean | 1.2.0-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-io-console | 0.4.6-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-io-console | 0.5.11-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-io-console-debuginfo | 0.4.6-113.module+el8.10.0+22581+23fc9c9e | ||
rubygem-io-console-debuginfo | 0.5.11-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-irb | 1.4.1-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-json | 2.1.0-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-json | 2.6.1-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-json-debuginfo | 2.1.0-113.module+el8.10.0+22581+23fc9c9e | ||
rubygem-json-debuginfo | 2.6.1-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-minitest | 5.10.3-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-minitest | 5.15.0-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-net-telnet | 0.1.1-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-openssl | 2.1.2-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-openssl-debuginfo | 2.1.2-113.module+el8.10.0+22581+23fc9c9e | ||
rubygem-power_assert | 1.1.1-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-power_assert | 2.0.1-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-psych | 3.0.2-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-psych | 4.0.4-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-psych-debuginfo | 3.0.2-113.module+el8.10.0+22581+23fc9c9e | ||
rubygem-psych-debuginfo | 4.0.4-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-rake | 12.3.3-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-rake | 13.0.6-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-rbs | 2.7.0-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-rbs-debuginfo | 2.7.0-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-rdoc | 6.0.1.1-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-rdoc | 6.4.1.1-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-rexml | 3.2.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-rss | 0.2.9-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-test-unit | 3.2.7-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-test-unit | 3.5.3-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-typeprof | 0.21.3-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-xmlrpc | 0.3.0-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygems | 2.7.6.3-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygems | 3.3.27-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygems-devel | 2.7.6.3-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygems-devel | 3.3.27-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
scap-security-guide | 0.1.75-1.el8 | RHBA-2024:10833 | Bug Fix Advisory |
scap-security-guide-doc | 0.1.75-1.el8 | RHBA-2024:10833 | Bug Fix Advisory |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-host-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-hostfxr-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-runtime-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-sdk-9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet-sdk-9.0-source-built-artifacts | 9.0.101-2.el8_10 | ||
dotnet-sdk-aot-9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet9.0-debugsource | 9.0.101-2.el8_10 |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-9.0 | 9.0.0-2.el8_10 | ||
aspnetcore-runtime-dbg-9.0 | 9.0.0-2.el8_10 | ||
aspnetcore-targeting-pack-9.0 | 9.0.0-2.el8_10 | ||
dotnet | 9.0.101-2.el8_10 | ||
dotnet-apphost-pack-9.0 | 9.0.0-2.el8_10 | ||
dotnet-apphost-pack-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-host | 9.0.0-2.el8_10 | ||
dotnet-host-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-hostfxr-9.0 | 9.0.0-2.el8_10 | ||
dotnet-hostfxr-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-runtime-9.0 | 9.0.0-2.el8_10 | ||
dotnet-runtime-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-runtime-dbg-9.0 | 9.0.0-2.el8_10 | ||
dotnet-sdk-9.0 | 9.0.101-2.el8_10 | ||
dotnet-sdk-9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet-sdk-aot-9.0 | 9.0.101-2.el8_10 | ||
dotnet-sdk-aot-9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet-sdk-dbg-9.0 | 9.0.101-2.el8_10 | ||
dotnet-targeting-pack-9.0 | 9.0.0-2.el8_10 | ||
dotnet-templates-9.0 | 9.0.101-2.el8_10 | ||
dotnet9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet9.0-debugsource | 9.0.101-2.el8_10 | ||
netstandard-targeting-pack-2.1 | 9.0.101-2.el8_10 | ||
pg_repack | 1.5.1-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
pg_repack-debuginfo | 1.5.1-1.module+el8.10.0+22551+c0330dc9 | ||
pg_repack-debugsource | 1.5.1-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-contrib | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-contrib | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-contrib | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-contrib-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-contrib-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-contrib-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-debugsource | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-debugsource | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-debugsource | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-docs | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-docs | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-docs | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-docs-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-docs-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-docs-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-plperl | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plperl | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plperl | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plperl-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-plperl-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-plperl-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-plpython3 | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plpython3 | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plpython3 | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-plpython3-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-plpython3-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-plpython3-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-pltcl | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-pltcl | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-pltcl | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-pltcl-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-pltcl-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-pltcl-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-private-devel | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-private-devel | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-private-libs | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-private-libs | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-private-libs-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-private-libs-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-server | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-server-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-server-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-server-devel | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server-devel | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server-devel | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-server-devel-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-server-devel-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-server-devel-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-static | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-static | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-static | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-test-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-test-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-test-rpm-macros | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test-rpm-macros | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-test-rpm-macros | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-upgrade-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-upgrade-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
postgresql-upgrade-devel | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | RHSA-2024:10832 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade-devel | 15.10-1.module+el8.10.0+22550+22c7d5ca | RHSA-2024:10830 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade-devel | 16.6-1.module+el8.10.0+22551+c0330dc9 | RHSA-2024:10831 | Security Advisory (CVE-2024-10976, CVE-2024-10978, CVE-2024-10979) |
postgresql-upgrade-devel-debuginfo | 13.18-1.module+el8.10.0+22549+cf2ec3d9 | ||
postgresql-upgrade-devel-debuginfo | 15.10-1.module+el8.10.0+22550+22c7d5ca | ||
postgresql-upgrade-devel-debuginfo | 16.6-1.module+el8.10.0+22551+c0330dc9 | ||
ruby | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
ruby | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-bundled-gems | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-bundled-gems-debuginfo | 3.1.5-144.module+el8.10.0+22580+b97d9670 | ||
ruby-debuginfo | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | ||
ruby-debuginfo | 3.1.5-144.module+el8.10.0+22580+b97d9670 | ||
ruby-debugsource | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | ||
ruby-debugsource | 3.1.5-144.module+el8.10.0+22580+b97d9670 | ||
ruby-default-gems | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-devel | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
ruby-devel | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-doc | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
ruby-doc | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-irb | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
ruby-libs | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
ruby-libs | 3.1.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
ruby-libs-debuginfo | 2.5.9-113.module+el8.10.0+22581+23fc9c9e | ||
ruby-libs-debuginfo | 3.1.5-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-bigdecimal | 1.3.4-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-bigdecimal | 3.1.1-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-bigdecimal-debuginfo | 1.3.4-113.module+el8.10.0+22581+23fc9c9e | ||
rubygem-bigdecimal-debuginfo | 3.1.1-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-bundler | 2.3.27-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-did_you_mean | 1.2.0-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-io-console | 0.4.6-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-io-console | 0.5.11-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-io-console-debuginfo | 0.4.6-113.module+el8.10.0+22581+23fc9c9e | ||
rubygem-io-console-debuginfo | 0.5.11-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-irb | 1.4.1-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-json | 2.1.0-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-json | 2.6.1-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-json-debuginfo | 2.1.0-113.module+el8.10.0+22581+23fc9c9e | ||
rubygem-json-debuginfo | 2.6.1-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-minitest | 5.10.3-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-minitest | 5.15.0-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-net-telnet | 0.1.1-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-openssl | 2.1.2-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-openssl-debuginfo | 2.1.2-113.module+el8.10.0+22581+23fc9c9e | ||
rubygem-power_assert | 1.1.1-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-power_assert | 2.0.1-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-psych | 3.0.2-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-psych | 4.0.4-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-psych-debuginfo | 3.0.2-113.module+el8.10.0+22581+23fc9c9e | ||
rubygem-psych-debuginfo | 4.0.4-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-rake | 12.3.3-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-rake | 13.0.6-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-rbs | 2.7.0-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-rbs-debuginfo | 2.7.0-144.module+el8.10.0+22580+b97d9670 | ||
rubygem-rdoc | 6.0.1.1-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-rdoc | 6.4.1.1-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-rexml | 3.2.5-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-rss | 0.2.9-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-test-unit | 3.2.7-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygem-test-unit | 3.5.3-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-typeprof | 0.21.3-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygem-xmlrpc | 0.3.0-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygems | 2.7.6.3-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygems | 3.3.27-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
rubygems-devel | 2.7.6.3-113.module+el8.10.0+22581+23fc9c9e | RHSA-2024:10850 | Security Advisory (CVE-2024-49761) |
rubygems-devel | 3.3.27-144.module+el8.10.0+22580+b97d9670 | RHSA-2024:10834 | Security Advisory (CVE-2024-49761) |
scap-security-guide | 0.1.75-1.el8 | RHBA-2024:10833 | Bug Fix Advisory |
scap-security-guide-doc | 0.1.75-1.el8 | RHBA-2024:10833 | Bug Fix Advisory |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-host-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-hostfxr-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-runtime-9.0-debuginfo | 9.0.0-2.el8_10 | ||
dotnet-sdk-9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet-sdk-9.0-source-built-artifacts | 9.0.101-2.el8_10 | RHBA-2024:10863 | Bug Fix Advisory |
dotnet-sdk-aot-9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet9.0-debuginfo | 9.0.101-2.el8_10 | ||
dotnet9.0-debugsource | 9.0.101-2.el8_10 |