Latest testing System Updates for Red Hat Enterprise Linux 8 (RHEL8)¶
Make sure the testing repositories are enabled by running as root:
dnf install cern-yum-tool
cern-yum-tool --testing
or simply:
echo "8-testing" > /etc/dnf/vars/cernrhel
Please verify that your system is up to date, running as root:
/usr/bin/dnf check-update
If the above command shows you available updates apply these, running as root:
/usr/bin/dnf update
or if you only want to apply security updates, run as root:
/usr/bin/dnf --security update
To receive notifications of updates, please sign up to the e-group linux-announce-rhel.
For more information about software repositories please check: RHEL8 software repositories
2024-07-12¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
firefox | 115.13.0-3.el8_10 | RHSA-2024:4517 | Security Advisory (CVE-2024-6601, CVE-2024-6603, CVE-2024-6604) |
firefox-debuginfo | 115.13.0-3.el8_10 | ||
firefox-debugsource | 115.13.0-3.el8_10 | ||
ruby | 2.5.9-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
ruby-debuginfo | 2.5.9-112.module+el8.10.0+22021+135c76a8 | ||
ruby-debugsource | 2.5.9-112.module+el8.10.0+22021+135c76a8 | ||
ruby-devel | 2.5.9-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
ruby-doc | 2.5.9-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
ruby-irb | 2.5.9-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
ruby-libs | 2.5.9-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
ruby-libs-debuginfo | 2.5.9-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-abrt | 0.3.0-4.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-abrt-doc | 0.3.0-4.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-bigdecimal | 1.3.4-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-bigdecimal-debuginfo | 1.3.4-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-bundler | 1.16.1-4.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-bundler-doc | 1.16.1-4.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-did_you_mean | 1.2.0-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-io-console | 0.4.6-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-io-console-debuginfo | 0.4.6-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-json | 2.1.0-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-json-debuginfo | 2.1.0-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-minitest | 5.10.3-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-net-telnet | 0.1.1-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-openssl | 2.1.2-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-openssl-debuginfo | 2.1.2-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-power_assert | 1.1.1-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-psych | 3.0.2-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-psych-debuginfo | 3.0.2-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-rake | 12.3.3-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-rdoc | 6.0.1.1-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-test-unit | 3.2.7-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-xmlrpc | 0.3.0-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygems | 2.7.6.3-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygems-devel | 2.7.6.3-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
firefox | 115.13.0-3.el8_10 | RHSA-2024:4517 | Security Advisory (CVE-2024-6601, CVE-2024-6603, CVE-2024-6604) |
firefox-debuginfo | 115.13.0-3.el8_10 | ||
firefox-debugsource | 115.13.0-3.el8_10 | ||
ruby | 2.5.9-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
ruby-debuginfo | 2.5.9-112.module+el8.10.0+22021+135c76a8 | ||
ruby-debugsource | 2.5.9-112.module+el8.10.0+22021+135c76a8 | ||
ruby-devel | 2.5.9-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
ruby-doc | 2.5.9-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
ruby-irb | 2.5.9-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
ruby-libs | 2.5.9-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
ruby-libs-debuginfo | 2.5.9-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-abrt | 0.3.0-4.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-abrt-doc | 0.3.0-4.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-bigdecimal | 1.3.4-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-bigdecimal-debuginfo | 1.3.4-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-bundler | 1.16.1-4.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-bundler-doc | 1.16.1-4.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-did_you_mean | 1.2.0-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-io-console | 0.4.6-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-io-console-debuginfo | 0.4.6-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-json | 2.1.0-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-json-debuginfo | 2.1.0-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-minitest | 5.10.3-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-net-telnet | 0.1.1-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-openssl | 2.1.2-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-openssl-debuginfo | 2.1.2-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-power_assert | 1.1.1-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-psych | 3.0.2-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-psych-debuginfo | 3.0.2-112.module+el8.10.0+22021+135c76a8 | ||
rubygem-rake | 12.3.3-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-rdoc | 6.0.1.1-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-test-unit | 3.2.7-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygem-xmlrpc | 0.3.0-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygems | 2.7.6.3-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
rubygems-devel | 2.7.6.3-112.module+el8.10.0+22021+135c76a8 | RHSA-2024:4499 | Security Advisory (CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176) |
2024-07-11¶
CERN x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
cern-get-keytab | 1.5.16-1.rh8.cern |
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
aspnetcore-runtime-dbg-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
aspnetcore-targeting-pack-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-apphost-pack-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-apphost-pack-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-host | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-host-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-hostfxr-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-hostfxr-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-runtime-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-runtime-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-runtime-dbg-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-sdk-8.0 | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-sdk-8.0-debuginfo | 8.0.107-1.el8_10 | ||
dotnet-sdk-dbg-8.0 | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-targeting-pack-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-templates-8.0 | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet8.0-debuginfo | 8.0.107-1.el8_10 | ||
dotnet8.0-debugsource | 8.0.107-1.el8_10 | ||
netstandard-targeting-pack-2.1 | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-host-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-hostfxr-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-runtime-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-sdk-8.0-debuginfo | 8.0.107-1.el8_10 | ||
dotnet-sdk-8.0-source-built-artifacts | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet8.0-debuginfo | 8.0.107-1.el8_10 | ||
dotnet8.0-debugsource | 8.0.107-1.el8_10 |
CERN aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
cern-get-keytab | 1.5.16-1.rh8.cern |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
aspnetcore-runtime-dbg-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
aspnetcore-targeting-pack-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-apphost-pack-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-apphost-pack-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-host | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-host-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-hostfxr-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-hostfxr-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-runtime-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-runtime-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-runtime-dbg-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-sdk-8.0 | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-sdk-8.0-debuginfo | 8.0.107-1.el8_10 | ||
dotnet-sdk-dbg-8.0 | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-targeting-pack-8.0 | 8.0.7-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet-templates-8.0 | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet8.0-debuginfo | 8.0.107-1.el8_10 | ||
dotnet8.0-debugsource | 8.0.107-1.el8_10 | ||
netstandard-targeting-pack-2.1 | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-host-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-hostfxr-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-runtime-8.0-debuginfo | 8.0.7-1.el8_10 | ||
dotnet-sdk-8.0-debuginfo | 8.0.107-1.el8_10 | ||
dotnet-sdk-8.0-source-built-artifacts | 8.0.107-1.el8_10 | RHSA-2024:4451 | Security Advisory (CVE-2024-30105, CVE-2024-35264, CVE-2024-38095) |
dotnet8.0-debuginfo | 8.0.107-1.el8_10 | ||
dotnet8.0-debugsource | 8.0.107-1.el8_10 |
2024-07-10¶
CERN x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
cern-get-keytab | 1.5.15-1.rh8.cern |
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-6.0 | 6.0.32-1.el8_10 | ||
aspnetcore-targeting-pack-6.0 | 6.0.32-1.el8_10 | ||
dotnet-apphost-pack-6.0 | 6.0.32-1.el8_10 | ||
dotnet-apphost-pack-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-hostfxr-6.0 | 6.0.32-1.el8_10 | ||
dotnet-hostfxr-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-runtime-6.0 | 6.0.32-1.el8_10 | ||
dotnet-runtime-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-sdk-6.0 | 6.0.132-1.el8_10 | ||
dotnet-sdk-6.0-debuginfo | 6.0.132-1.el8_10 | ||
dotnet-targeting-pack-6.0 | 6.0.32-1.el8_10 | ||
dotnet-templates-6.0 | 6.0.132-1.el8_10 | ||
dotnet6.0-debuginfo | 6.0.132-1.el8_10 | ||
dotnet6.0-debugsource | 6.0.132-1.el8_10 | ||
qemu-guest-agent | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-guest-agent-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-img | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-img-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-curl | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-curl-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-block-gluster | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-gluster-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-block-iscsi | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-iscsi-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-block-rbd | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-rbd-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-block-ssh | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-ssh-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-common | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-common-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-core | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-core-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-debugsource | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-docs | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-hw-usbredir | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-hw-usbredir-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-ui-opengl | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-ui-opengl-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-ui-spice | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-ui-spice-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-hostfxr-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-runtime-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-sdk-6.0-debuginfo | 6.0.132-1.el8_10 | ||
dotnet-sdk-6.0-source-built-artifacts | 6.0.132-1.el8_10 | ||
dotnet6.0-debuginfo | 6.0.132-1.el8_10 | ||
dotnet6.0-debugsource | 6.0.132-1.el8_10 | ||
qemu-kvm-tests | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
CERN aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
cern-get-keytab | 1.5.15-1.rh8.cern |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
aspnetcore-runtime-6.0 | 6.0.32-1.el8_10 | ||
aspnetcore-targeting-pack-6.0 | 6.0.32-1.el8_10 | ||
dotnet-apphost-pack-6.0 | 6.0.32-1.el8_10 | ||
dotnet-apphost-pack-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-hostfxr-6.0 | 6.0.32-1.el8_10 | ||
dotnet-hostfxr-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-runtime-6.0 | 6.0.32-1.el8_10 | ||
dotnet-runtime-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-sdk-6.0 | 6.0.132-1.el8_10 | ||
dotnet-sdk-6.0-debuginfo | 6.0.132-1.el8_10 | ||
dotnet-targeting-pack-6.0 | 6.0.32-1.el8_10 | ||
dotnet-templates-6.0 | 6.0.132-1.el8_10 | ||
dotnet6.0-debuginfo | 6.0.132-1.el8_10 | ||
dotnet6.0-debugsource | 6.0.132-1.el8_10 | ||
qemu-guest-agent | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-guest-agent-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-img | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-img-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-curl | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-curl-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-block-iscsi | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-iscsi-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-block-rbd | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-rbd-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-block-ssh | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-block-ssh-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-common | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-common-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-core | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
qemu-kvm-core-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-debuginfo | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-debugsource | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | ||
qemu-kvm-docs | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
dotnet-apphost-pack-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-hostfxr-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-runtime-6.0-debuginfo | 6.0.32-1.el8_10 | ||
dotnet-sdk-6.0-debuginfo | 6.0.132-1.el8_10 | ||
dotnet-sdk-6.0-source-built-artifacts | 6.0.132-1.el8_10 | ||
dotnet6.0-debuginfo | 6.0.132-1.el8_10 | ||
dotnet6.0-debugsource | 6.0.132-1.el8_10 | ||
qemu-kvm-tests | 6.2.0-50.module+el8.10.0+22027+db0a70a4 | RHSA-2024:4420 | Security Advisory (CVE-2024-4467) |
2024-07-09¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
idm-pki-acme | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-base | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-base-java | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-ca | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-kra | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-server | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-symkey | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-symkey-debuginfo | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | ||
idm-pki-tools | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-tools-debuginfo | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | ||
libreswan | 4.12-2.el8_10.4 | RHSA-2024:4376 | Security Advisory (CVE-2024-3652) |
libreswan-debuginfo | 4.12-2.el8_10.4 | ||
libreswan-debugsource | 4.12-2.el8_10.4 | ||
pki-core-debuginfo | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | ||
pki-core-debugsource | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | ||
python3-idm-pki | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
idm-pki-acme | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-base | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-base-java | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-ca | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-kra | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-server | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-symkey | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-symkey-debuginfo | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | ||
idm-pki-tools | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |
idm-pki-tools-debuginfo | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | ||
libreswan | 4.12-2.el8_10.4 | RHSA-2024:4376 | Security Advisory (CVE-2024-3652) |
libreswan-debuginfo | 4.12-2.el8_10.4 | ||
libreswan-debugsource | 4.12-2.el8_10.4 | ||
pki-core-debuginfo | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | ||
pki-core-debugsource | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | ||
python3-idm-pki | 10.15.1-1.module+el8.10.0+21991+2e8cd757 | RHSA-2024:4367 | Security Advisory (CVE-2023-4727) |