Skip to content

Latest testing System Updates for Red Hat Enterprise Linux 8 (RHEL8)

Make sure the testing repositories are enabled by running as root:

dnf install cern-yum-tool
cern-yum-tool --testing

or simply:

echo "8-testing" > /etc/dnf/vars/cernrhel

Please verify that your system is up to date, running as root:

/usr/bin/dnf check-update

If the above command shows you available updates apply these, running as root:

/usr/bin/dnf update

or if you only want to apply security updates, run as root:

/usr/bin/dnf --security update

To receive notifications of updates, please sign up to the e-group linux-announce-rhel.

For more information about software repositories please check: RHEL8 software repositories

2024-07-12

appstream x86_64 repository

Package Version Advisory Notes
firefox 115.13.0-3.el8_10 RHSA-2024:4517
Security Advisory
(CVE-2024-6601, CVE-2024-6603, CVE-2024-6604)
firefox-debuginfo 115.13.0-3.el8_10
firefox-debugsource 115.13.0-3.el8_10
ruby 2.5.9-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
ruby-debuginfo 2.5.9-112.module+el8.10.0+22021+135c76a8
ruby-debugsource 2.5.9-112.module+el8.10.0+22021+135c76a8
ruby-devel 2.5.9-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
ruby-doc 2.5.9-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
ruby-irb 2.5.9-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
ruby-libs 2.5.9-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
ruby-libs-debuginfo 2.5.9-112.module+el8.10.0+22021+135c76a8
rubygem-abrt 0.3.0-4.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-abrt-doc 0.3.0-4.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-bigdecimal 1.3.4-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-bigdecimal-debuginfo 1.3.4-112.module+el8.10.0+22021+135c76a8
rubygem-bundler 1.16.1-4.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-bundler-doc 1.16.1-4.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-did_you_mean 1.2.0-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-io-console 0.4.6-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-io-console-debuginfo 0.4.6-112.module+el8.10.0+22021+135c76a8
rubygem-json 2.1.0-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-json-debuginfo 2.1.0-112.module+el8.10.0+22021+135c76a8
rubygem-minitest 5.10.3-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-net-telnet 0.1.1-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-openssl 2.1.2-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-openssl-debuginfo 2.1.2-112.module+el8.10.0+22021+135c76a8
rubygem-power_assert 1.1.1-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-psych 3.0.2-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-psych-debuginfo 3.0.2-112.module+el8.10.0+22021+135c76a8
rubygem-rake 12.3.3-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-rdoc 6.0.1.1-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-test-unit 3.2.7-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-xmlrpc 0.3.0-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygems 2.7.6.3-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygems-devel 2.7.6.3-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)

appstream aarch64 repository

Package Version Advisory Notes
firefox 115.13.0-3.el8_10 RHSA-2024:4517
Security Advisory
(CVE-2024-6601, CVE-2024-6603, CVE-2024-6604)
firefox-debuginfo 115.13.0-3.el8_10
firefox-debugsource 115.13.0-3.el8_10
ruby 2.5.9-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
ruby-debuginfo 2.5.9-112.module+el8.10.0+22021+135c76a8
ruby-debugsource 2.5.9-112.module+el8.10.0+22021+135c76a8
ruby-devel 2.5.9-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
ruby-doc 2.5.9-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
ruby-irb 2.5.9-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
ruby-libs 2.5.9-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
ruby-libs-debuginfo 2.5.9-112.module+el8.10.0+22021+135c76a8
rubygem-abrt 0.3.0-4.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-abrt-doc 0.3.0-4.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-bigdecimal 1.3.4-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-bigdecimal-debuginfo 1.3.4-112.module+el8.10.0+22021+135c76a8
rubygem-bundler 1.16.1-4.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-bundler-doc 1.16.1-4.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-did_you_mean 1.2.0-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-io-console 0.4.6-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-io-console-debuginfo 0.4.6-112.module+el8.10.0+22021+135c76a8
rubygem-json 2.1.0-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-json-debuginfo 2.1.0-112.module+el8.10.0+22021+135c76a8
rubygem-minitest 5.10.3-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-net-telnet 0.1.1-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-openssl 2.1.2-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-openssl-debuginfo 2.1.2-112.module+el8.10.0+22021+135c76a8
rubygem-power_assert 1.1.1-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-psych 3.0.2-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-psych-debuginfo 3.0.2-112.module+el8.10.0+22021+135c76a8
rubygem-rake 12.3.3-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-rdoc 6.0.1.1-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-test-unit 3.2.7-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygem-xmlrpc 0.3.0-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygems 2.7.6.3-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)
rubygems-devel 2.7.6.3-112.module+el8.10.0+22021+135c76a8 RHSA-2024:4499
Security Advisory
(CVE-2023-36617, CVE-2024-27280, CVE-2024-27281, CVE-2024-27282, CVE-2024-35176)

2024-07-11

CERN x86_64 repository

Package Version Advisory Notes
cern-get-keytab 1.5.16-1.rh8.cern

appstream x86_64 repository

Package Version Advisory Notes
aspnetcore-runtime-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
aspnetcore-runtime-dbg-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
aspnetcore-targeting-pack-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-apphost-pack-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-apphost-pack-8.0-debuginfo 8.0.7-1.el8_10
dotnet-host 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-host-debuginfo 8.0.7-1.el8_10
dotnet-hostfxr-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-hostfxr-8.0-debuginfo 8.0.7-1.el8_10
dotnet-runtime-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-runtime-8.0-debuginfo 8.0.7-1.el8_10
dotnet-runtime-dbg-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-sdk-8.0 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-sdk-8.0-debuginfo 8.0.107-1.el8_10
dotnet-sdk-dbg-8.0 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-targeting-pack-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-templates-8.0 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet8.0-debuginfo 8.0.107-1.el8_10
dotnet8.0-debugsource 8.0.107-1.el8_10
netstandard-targeting-pack-2.1 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)

codeready-builder x86_64 repository

Package Version Advisory Notes
dotnet-apphost-pack-8.0-debuginfo 8.0.7-1.el8_10
dotnet-host-debuginfo 8.0.7-1.el8_10
dotnet-hostfxr-8.0-debuginfo 8.0.7-1.el8_10
dotnet-runtime-8.0-debuginfo 8.0.7-1.el8_10
dotnet-sdk-8.0-debuginfo 8.0.107-1.el8_10
dotnet-sdk-8.0-source-built-artifacts 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet8.0-debuginfo 8.0.107-1.el8_10
dotnet8.0-debugsource 8.0.107-1.el8_10

CERN aarch64 repository

Package Version Advisory Notes
cern-get-keytab 1.5.16-1.rh8.cern

appstream aarch64 repository

Package Version Advisory Notes
aspnetcore-runtime-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
aspnetcore-runtime-dbg-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
aspnetcore-targeting-pack-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-apphost-pack-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-apphost-pack-8.0-debuginfo 8.0.7-1.el8_10
dotnet-host 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-host-debuginfo 8.0.7-1.el8_10
dotnet-hostfxr-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-hostfxr-8.0-debuginfo 8.0.7-1.el8_10
dotnet-runtime-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-runtime-8.0-debuginfo 8.0.7-1.el8_10
dotnet-runtime-dbg-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-sdk-8.0 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-sdk-8.0-debuginfo 8.0.107-1.el8_10
dotnet-sdk-dbg-8.0 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-targeting-pack-8.0 8.0.7-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet-templates-8.0 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet8.0-debuginfo 8.0.107-1.el8_10
dotnet8.0-debugsource 8.0.107-1.el8_10
netstandard-targeting-pack-2.1 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)

codeready-builder aarch64 repository

Package Version Advisory Notes
dotnet-apphost-pack-8.0-debuginfo 8.0.7-1.el8_10
dotnet-host-debuginfo 8.0.7-1.el8_10
dotnet-hostfxr-8.0-debuginfo 8.0.7-1.el8_10
dotnet-runtime-8.0-debuginfo 8.0.7-1.el8_10
dotnet-sdk-8.0-debuginfo 8.0.107-1.el8_10
dotnet-sdk-8.0-source-built-artifacts 8.0.107-1.el8_10 RHSA-2024:4451
Security Advisory
(CVE-2024-30105, CVE-2024-35264, CVE-2024-38095)
dotnet8.0-debuginfo 8.0.107-1.el8_10
dotnet8.0-debugsource 8.0.107-1.el8_10

2024-07-10

CERN x86_64 repository

Package Version Advisory Notes
cern-get-keytab 1.5.15-1.rh8.cern

appstream x86_64 repository

Package Version Advisory Notes
aspnetcore-runtime-6.0 6.0.32-1.el8_10
aspnetcore-targeting-pack-6.0 6.0.32-1.el8_10
dotnet-apphost-pack-6.0 6.0.32-1.el8_10
dotnet-apphost-pack-6.0-debuginfo 6.0.32-1.el8_10
dotnet-hostfxr-6.0 6.0.32-1.el8_10
dotnet-hostfxr-6.0-debuginfo 6.0.32-1.el8_10
dotnet-runtime-6.0 6.0.32-1.el8_10
dotnet-runtime-6.0-debuginfo 6.0.32-1.el8_10
dotnet-sdk-6.0 6.0.132-1.el8_10
dotnet-sdk-6.0-debuginfo 6.0.132-1.el8_10
dotnet-targeting-pack-6.0 6.0.32-1.el8_10
dotnet-templates-6.0 6.0.132-1.el8_10
dotnet6.0-debuginfo 6.0.132-1.el8_10
dotnet6.0-debugsource 6.0.132-1.el8_10
qemu-guest-agent 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-guest-agent-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-img 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-img-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-curl 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-curl-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-block-gluster 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-gluster-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-block-iscsi 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-iscsi-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-block-rbd 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-rbd-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-block-ssh 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-ssh-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-common 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-common-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-core 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-core-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-debugsource 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-docs 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-hw-usbredir 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-hw-usbredir-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-ui-opengl 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-ui-opengl-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-ui-spice 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-ui-spice-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4

codeready-builder x86_64 repository

Package Version Advisory Notes
dotnet-apphost-pack-6.0-debuginfo 6.0.32-1.el8_10
dotnet-hostfxr-6.0-debuginfo 6.0.32-1.el8_10
dotnet-runtime-6.0-debuginfo 6.0.32-1.el8_10
dotnet-sdk-6.0-debuginfo 6.0.132-1.el8_10
dotnet-sdk-6.0-source-built-artifacts 6.0.132-1.el8_10
dotnet6.0-debuginfo 6.0.132-1.el8_10
dotnet6.0-debugsource 6.0.132-1.el8_10
qemu-kvm-tests 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)

CERN aarch64 repository

Package Version Advisory Notes
cern-get-keytab 1.5.15-1.rh8.cern

appstream aarch64 repository

Package Version Advisory Notes
aspnetcore-runtime-6.0 6.0.32-1.el8_10
aspnetcore-targeting-pack-6.0 6.0.32-1.el8_10
dotnet-apphost-pack-6.0 6.0.32-1.el8_10
dotnet-apphost-pack-6.0-debuginfo 6.0.32-1.el8_10
dotnet-hostfxr-6.0 6.0.32-1.el8_10
dotnet-hostfxr-6.0-debuginfo 6.0.32-1.el8_10
dotnet-runtime-6.0 6.0.32-1.el8_10
dotnet-runtime-6.0-debuginfo 6.0.32-1.el8_10
dotnet-sdk-6.0 6.0.132-1.el8_10
dotnet-sdk-6.0-debuginfo 6.0.132-1.el8_10
dotnet-targeting-pack-6.0 6.0.32-1.el8_10
dotnet-templates-6.0 6.0.132-1.el8_10
dotnet6.0-debuginfo 6.0.132-1.el8_10
dotnet6.0-debugsource 6.0.132-1.el8_10
qemu-guest-agent 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-guest-agent-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-img 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-img-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-curl 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-curl-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-block-iscsi 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-iscsi-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-block-rbd 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-rbd-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-block-ssh 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-block-ssh-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-common 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-common-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-core 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)
qemu-kvm-core-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-debuginfo 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-debugsource 6.2.0-50.module+el8.10.0+22027+db0a70a4
qemu-kvm-docs 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)

codeready-builder aarch64 repository

Package Version Advisory Notes
dotnet-apphost-pack-6.0-debuginfo 6.0.32-1.el8_10
dotnet-hostfxr-6.0-debuginfo 6.0.32-1.el8_10
dotnet-runtime-6.0-debuginfo 6.0.32-1.el8_10
dotnet-sdk-6.0-debuginfo 6.0.132-1.el8_10
dotnet-sdk-6.0-source-built-artifacts 6.0.132-1.el8_10
dotnet6.0-debuginfo 6.0.132-1.el8_10
dotnet6.0-debugsource 6.0.132-1.el8_10
qemu-kvm-tests 6.2.0-50.module+el8.10.0+22027+db0a70a4 RHSA-2024:4420
Security Advisory
(CVE-2024-4467)

2024-07-09

appstream x86_64 repository

Package Version Advisory Notes
idm-pki-acme 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-base 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-base-java 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-ca 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-kra 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-server 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-symkey 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-symkey-debuginfo 10.15.1-1.module+el8.10.0+21991+2e8cd757
idm-pki-tools 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-tools-debuginfo 10.15.1-1.module+el8.10.0+21991+2e8cd757
libreswan 4.12-2.el8_10.4 RHSA-2024:4376
Security Advisory
(CVE-2024-3652)
libreswan-debuginfo 4.12-2.el8_10.4
libreswan-debugsource 4.12-2.el8_10.4
pki-core-debuginfo 10.15.1-1.module+el8.10.0+21991+2e8cd757
pki-core-debugsource 10.15.1-1.module+el8.10.0+21991+2e8cd757
python3-idm-pki 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)

appstream aarch64 repository

Package Version Advisory Notes
idm-pki-acme 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-base 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-base-java 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-ca 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-kra 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-server 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-symkey 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-symkey-debuginfo 10.15.1-1.module+el8.10.0+21991+2e8cd757
idm-pki-tools 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)
idm-pki-tools-debuginfo 10.15.1-1.module+el8.10.0+21991+2e8cd757
libreswan 4.12-2.el8_10.4 RHSA-2024:4376
Security Advisory
(CVE-2024-3652)
libreswan-debuginfo 4.12-2.el8_10.4
libreswan-debugsource 4.12-2.el8_10.4
pki-core-debuginfo 10.15.1-1.module+el8.10.0+21991+2e8cd757
pki-core-debugsource 10.15.1-1.module+el8.10.0+21991+2e8cd757
python3-idm-pki 10.15.1-1.module+el8.10.0+21991+2e8cd757 RHSA-2024:4367
Security Advisory
(CVE-2023-4727)