Skip to content
Snippets Groups Projects
Commit cf6f09eb authored by Linux Gitlab Continuous Integration's avatar Linux Gitlab Continuous Integration :speech_balloon:
Browse files

RHEL9 testing updates 2024-05-16

parent 151b94c9
No related branches found
No related tags found
No related merge requests found
## 2024-05-16
### appstream x86_64 repository
Package | Version | Advisory | Notes
------- | ------- | -------- | -----
nodejs | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | [RHSA-2024:2853](https://access.redhat.com/errata/RHSA-2024:2853) | <div class="adv_s">Security Advisory</div> ([CVE-2024-22025](https://access.redhat.com/security/cve/CVE-2024-22025), [CVE-2024-25629](https://access.redhat.com/security/cve/CVE-2024-25629), [CVE-2024-27982](https://access.redhat.com/security/cve/CVE-2024-27982), [CVE-2024-27983](https://access.redhat.com/security/cve/CVE-2024-27983), [CVE-2024-28182](https://access.redhat.com/security/cve/CVE-2024-28182))
nodejs-debuginfo | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | |
nodejs-debugsource | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | |
nodejs-devel | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | [RHSA-2024:2853](https://access.redhat.com/errata/RHSA-2024:2853) | <div class="adv_s">Security Advisory</div> ([CVE-2024-22025](https://access.redhat.com/security/cve/CVE-2024-22025), [CVE-2024-25629](https://access.redhat.com/security/cve/CVE-2024-25629), [CVE-2024-27982](https://access.redhat.com/security/cve/CVE-2024-27982), [CVE-2024-27983](https://access.redhat.com/security/cve/CVE-2024-27983), [CVE-2024-28182](https://access.redhat.com/security/cve/CVE-2024-28182))
nodejs-docs | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | [RHSA-2024:2853](https://access.redhat.com/errata/RHSA-2024:2853) | <div class="adv_s">Security Advisory</div> ([CVE-2024-22025](https://access.redhat.com/security/cve/CVE-2024-22025), [CVE-2024-25629](https://access.redhat.com/security/cve/CVE-2024-25629), [CVE-2024-27982](https://access.redhat.com/security/cve/CVE-2024-27982), [CVE-2024-27983](https://access.redhat.com/security/cve/CVE-2024-27983), [CVE-2024-28182](https://access.redhat.com/security/cve/CVE-2024-28182))
nodejs-full-i18n | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | [RHSA-2024:2853](https://access.redhat.com/errata/RHSA-2024:2853) | <div class="adv_s">Security Advisory</div> ([CVE-2024-22025](https://access.redhat.com/security/cve/CVE-2024-22025), [CVE-2024-25629](https://access.redhat.com/security/cve/CVE-2024-25629), [CVE-2024-27982](https://access.redhat.com/security/cve/CVE-2024-27982), [CVE-2024-27983](https://access.redhat.com/security/cve/CVE-2024-27983), [CVE-2024-28182](https://access.redhat.com/security/cve/CVE-2024-28182))
npm | 10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7 | [RHSA-2024:2853](https://access.redhat.com/errata/RHSA-2024:2853) | <div class="adv_s">Security Advisory</div> ([CVE-2024-22025](https://access.redhat.com/security/cve/CVE-2024-22025), [CVE-2024-25629](https://access.redhat.com/security/cve/CVE-2024-25629), [CVE-2024-27982](https://access.redhat.com/security/cve/CVE-2024-27982), [CVE-2024-27983](https://access.redhat.com/security/cve/CVE-2024-27983), [CVE-2024-28182](https://access.redhat.com/security/cve/CVE-2024-28182))
### appstream aarch64 repository
Package | Version | Advisory | Notes
------- | ------- | -------- | -----
nodejs | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | [RHSA-2024:2853](https://access.redhat.com/errata/RHSA-2024:2853) | <div class="adv_s">Security Advisory</div> ([CVE-2024-22025](https://access.redhat.com/security/cve/CVE-2024-22025), [CVE-2024-25629](https://access.redhat.com/security/cve/CVE-2024-25629), [CVE-2024-27982](https://access.redhat.com/security/cve/CVE-2024-27982), [CVE-2024-27983](https://access.redhat.com/security/cve/CVE-2024-27983), [CVE-2024-28182](https://access.redhat.com/security/cve/CVE-2024-28182))
nodejs-debuginfo | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | |
nodejs-debugsource | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | |
nodejs-devel | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | [RHSA-2024:2853](https://access.redhat.com/errata/RHSA-2024:2853) | <div class="adv_s">Security Advisory</div> ([CVE-2024-22025](https://access.redhat.com/security/cve/CVE-2024-22025), [CVE-2024-25629](https://access.redhat.com/security/cve/CVE-2024-25629), [CVE-2024-27982](https://access.redhat.com/security/cve/CVE-2024-27982), [CVE-2024-27983](https://access.redhat.com/security/cve/CVE-2024-27983), [CVE-2024-28182](https://access.redhat.com/security/cve/CVE-2024-28182))
nodejs-docs | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | [RHSA-2024:2853](https://access.redhat.com/errata/RHSA-2024:2853) | <div class="adv_s">Security Advisory</div> ([CVE-2024-22025](https://access.redhat.com/security/cve/CVE-2024-22025), [CVE-2024-25629](https://access.redhat.com/security/cve/CVE-2024-25629), [CVE-2024-27982](https://access.redhat.com/security/cve/CVE-2024-27982), [CVE-2024-27983](https://access.redhat.com/security/cve/CVE-2024-27983), [CVE-2024-28182](https://access.redhat.com/security/cve/CVE-2024-28182))
nodejs-full-i18n | 20.12.2-2.module+el9.4.0+21731+46b5b8a7 | [RHSA-2024:2853](https://access.redhat.com/errata/RHSA-2024:2853) | <div class="adv_s">Security Advisory</div> ([CVE-2024-22025](https://access.redhat.com/security/cve/CVE-2024-22025), [CVE-2024-25629](https://access.redhat.com/security/cve/CVE-2024-25629), [CVE-2024-27982](https://access.redhat.com/security/cve/CVE-2024-27982), [CVE-2024-27983](https://access.redhat.com/security/cve/CVE-2024-27983), [CVE-2024-28182](https://access.redhat.com/security/cve/CVE-2024-28182))
npm | 10.5.0-1.20.12.2.2.module+el9.4.0+21731+46b5b8a7 | [RHSA-2024:2853](https://access.redhat.com/errata/RHSA-2024:2853) | <div class="adv_s">Security Advisory</div> ([CVE-2024-22025](https://access.redhat.com/security/cve/CVE-2024-22025), [CVE-2024-25629](https://access.redhat.com/security/cve/CVE-2024-25629), [CVE-2024-27982](https://access.redhat.com/security/cve/CVE-2024-27982), [CVE-2024-27983](https://access.redhat.com/security/cve/CVE-2024-27983), [CVE-2024-28182](https://access.redhat.com/security/cve/CVE-2024-28182))
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment