Skip to content

Latest testing System Updates for Red Hat Enterprise Linux 8 (RHEL8)

Make sure the testing repositories are enabled by running as root:

dnf install cern-yum-tool
cern-yum-tool --testing

or simply:

echo "8-testing" > /etc/dnf/vars/cernrhel

Please verify that your system is up to date, running as root:

/usr/bin/dnf check-update

If the above command shows you available updates apply these, running as root:

/usr/bin/dnf update

or if you only want to apply security updates, run as root:

/usr/bin/dnf --security update

To receive notifications of updates, please sign up to the e-group linux-announce-rhel.

For more information about software repositories please check: RHEL8 software repositories

2026-05-21

openafs x86_64 repository

Package Version Advisory Notes
kmod-openafs 1.8.14-1.4.18.0_553.125.1.el8_10.rh8.cern

baseos x86_64 repository

Package Version Advisory Notes
bpftool 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
bpftool-debuginfo 4.18.0-553.125.1.el8_10
kernel 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-abi-stablelists 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-core 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-cross-headers 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debug 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debug-core 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debug-debuginfo 4.18.0-553.125.1.el8_10
kernel-debug-devel 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debug-modules 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debug-modules-extra 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debuginfo 4.18.0-553.125.1.el8_10
kernel-debuginfo-common-x86_64 4.18.0-553.125.1.el8_10
kernel-devel 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-doc 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-headers 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-modules 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-modules-extra 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-tools 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-tools-debuginfo 4.18.0-553.125.1.el8_10
kernel-tools-libs 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kpatch-patch-4_18_0-553_109_1 1-2.el8_10 RHSA-2026:19574
Security Advisory
(CVE-2026-43284)
kpatch-patch-4_18_0-553_109_1-debuginfo 1-2.el8_10
kpatch-patch-4_18_0-553_109_1-debugsource 1-2.el8_10
kpatch-patch-4_18_0-553_40_1 1-11.el8_10 RHSA-2026:19574
Security Advisory
(CVE-2026-43284)
kpatch-patch-4_18_0-553_40_1-debuginfo 1-11.el8_10
kpatch-patch-4_18_0-553_40_1-debugsource 1-11.el8_10
kpatch-patch-4_18_0-553_53_1 1-9.el8_10 RHSA-2026:19574
Security Advisory
(CVE-2026-43284)
kpatch-patch-4_18_0-553_53_1-debuginfo 1-9.el8_10
kpatch-patch-4_18_0-553_53_1-debugsource 1-9.el8_10
kpatch-patch-4_18_0-553_72_1 1-6.el8_10 RHSA-2026:19574
Security Advisory
(CVE-2026-43284)
kpatch-patch-4_18_0-553_72_1-debuginfo 1-6.el8_10
kpatch-patch-4_18_0-553_72_1-debugsource 1-6.el8_10
kpatch-patch-4_18_0-553_85_1 1-4.el8_10 RHSA-2026:19574
Security Advisory
(CVE-2026-43284)
kpatch-patch-4_18_0-553_85_1-debuginfo 1-4.el8_10
kpatch-patch-4_18_0-553_85_1-debugsource 1-4.el8_10
perf 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
perf-debuginfo 4.18.0-553.125.1.el8_10
python3-perf 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
python3-perf-debuginfo 4.18.0-553.125.1.el8_10

appstream x86_64 repository

Package Version Advisory Notes
firefox 140.10.1-1.el8_10 RHSA-2026:19588
Security Advisory
(CVE-2026-7320, CVE-2026-7321, CVE-2026-7322, CVE-2026-7323)
firefox-debuginfo 140.10.1-1.el8_10
firefox-debugsource 140.10.1-1.el8_10
libsndfile 1.0.28-17.el8_10 RHSA-2026:19559
Security Advisory
(CVE-2026-37555)
libsndfile-debuginfo 1.0.28-17.el8_10
libsndfile-debugsource 1.0.28-17.el8_10
libsndfile-utils 1.0.28-17.el8_10 RHSA-2026:19559
Security Advisory
(CVE-2026-37555)
libsndfile-utils-debuginfo 1.0.28-17.el8_10

rt x86_64 repository

Package Version Advisory Notes
kernel-rt 4.18.0-553.125.1.rt7.466.el8_10 RHSA-2026:19664
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-rt-core 4.18.0-553.125.1.rt7.466.el8_10 RHSA-2026:19664
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-rt-debug 4.18.0-553.125.1.rt7.466.el8_10 RHSA-2026:19664
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-rt-debug-core 4.18.0-553.125.1.rt7.466.el8_10 RHSA-2026:19664
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-rt-debug-debuginfo 4.18.0-553.125.1.rt7.466.el8_10
kernel-rt-debug-devel 4.18.0-553.125.1.rt7.466.el8_10 RHSA-2026:19664
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-rt-debug-modules 4.18.0-553.125.1.rt7.466.el8_10 RHSA-2026:19664
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-rt-debug-modules-extra 4.18.0-553.125.1.rt7.466.el8_10 RHSA-2026:19664
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-rt-debuginfo 4.18.0-553.125.1.rt7.466.el8_10
kernel-rt-debuginfo-common-x86_64 4.18.0-553.125.1.rt7.466.el8_10
kernel-rt-devel 4.18.0-553.125.1.rt7.466.el8_10 RHSA-2026:19664
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-rt-modules 4.18.0-553.125.1.rt7.466.el8_10 RHSA-2026:19664
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-rt-modules-extra 4.18.0-553.125.1.rt7.466.el8_10 RHSA-2026:19664
Security Advisory
(CVE-2026-46300, CVE-2026-46333)

codeready-builder x86_64 repository

Package Version Advisory Notes
bpftool-debuginfo 4.18.0-553.125.1.el8_10
kernel-debug-debuginfo 4.18.0-553.125.1.el8_10
kernel-debuginfo 4.18.0-553.125.1.el8_10
kernel-debuginfo-common-x86_64 4.18.0-553.125.1.el8_10
kernel-tools-debuginfo 4.18.0-553.125.1.el8_10
kernel-tools-libs-devel 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
libsndfile-debuginfo 1.0.28-17.el8_10
libsndfile-debugsource 1.0.28-17.el8_10
libsndfile-devel 1.0.28-17.el8_10 RHSA-2026:19559
Security Advisory
(CVE-2026-37555)
libsndfile-utils-debuginfo 1.0.28-17.el8_10
perf-debuginfo 4.18.0-553.125.1.el8_10
python3-perf-debuginfo 4.18.0-553.125.1.el8_10

openafs aarch64 repository

Package Version Advisory Notes
kmod-openafs 1.8.14-1.4.18.0_553.125.1.el8_10.rh8.cern

baseos aarch64 repository

Package Version Advisory Notes
bpftool 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
bpftool-debuginfo 4.18.0-553.125.1.el8_10
kernel 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-abi-stablelists 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-core 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-cross-headers 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debug 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debug-core 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debug-debuginfo 4.18.0-553.125.1.el8_10
kernel-debug-devel 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debug-modules 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debug-modules-extra 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-debuginfo 4.18.0-553.125.1.el8_10
kernel-debuginfo-common-aarch64 4.18.0-553.125.1.el8_10
kernel-devel 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-doc 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-headers 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-modules 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-modules-extra 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-tools 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
kernel-tools-debuginfo 4.18.0-553.125.1.el8_10
kernel-tools-libs 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
perf 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
perf-debuginfo 4.18.0-553.125.1.el8_10
python3-perf 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
python3-perf-debuginfo 4.18.0-553.125.1.el8_10

appstream aarch64 repository

Package Version Advisory Notes
firefox 140.10.1-1.el8_10 RHSA-2026:19588
Security Advisory
(CVE-2026-7320, CVE-2026-7321, CVE-2026-7322, CVE-2026-7323)
firefox-debuginfo 140.10.1-1.el8_10
firefox-debugsource 140.10.1-1.el8_10
libsndfile 1.0.28-17.el8_10 RHSA-2026:19559
Security Advisory
(CVE-2026-37555)
libsndfile-debuginfo 1.0.28-17.el8_10
libsndfile-debugsource 1.0.28-17.el8_10
libsndfile-utils 1.0.28-17.el8_10 RHSA-2026:19559
Security Advisory
(CVE-2026-37555)
libsndfile-utils-debuginfo 1.0.28-17.el8_10

codeready-builder aarch64 repository

Package Version Advisory Notes
bpftool-debuginfo 4.18.0-553.125.1.el8_10
kernel-debug-debuginfo 4.18.0-553.125.1.el8_10
kernel-debuginfo 4.18.0-553.125.1.el8_10
kernel-debuginfo-common-aarch64 4.18.0-553.125.1.el8_10
kernel-tools-debuginfo 4.18.0-553.125.1.el8_10
kernel-tools-libs-devel 4.18.0-553.125.1.el8_10 RHSA-2026:19666
Security Advisory
(CVE-2026-46300, CVE-2026-46333)
libsndfile-debuginfo 1.0.28-17.el8_10
libsndfile-debugsource 1.0.28-17.el8_10
libsndfile-devel 1.0.28-17.el8_10 RHSA-2026:19559
Security Advisory
(CVE-2026-37555)
libsndfile-utils-debuginfo 1.0.28-17.el8_10
perf-debuginfo 4.18.0-553.125.1.el8_10
python3-perf-debuginfo 4.18.0-553.125.1.el8_10

2026-05-20

appstream x86_64 repository

Package Version Advisory Notes
leapp 0.21.0-1.el8_10
leapp-deps 0.21.0-1.el8_10
leapp-upgrade-el8toel9 0.24.0-1.el8_10
leapp-upgrade-el8toel9-deps 0.24.0-1.el8_10
leapp-upgrade-el8toel9-fapolicyd 0.24.0-1.el8_10
python3-leapp 0.21.0-1.el8_10
snactor 0.21.0-1.el8_10

appstream aarch64 repository

Package Version Advisory Notes
leapp 0.21.0-1.el8_10
leapp-deps 0.21.0-1.el8_10
leapp-upgrade-el8toel9 0.24.0-1.el8_10
leapp-upgrade-el8toel9-deps 0.24.0-1.el8_10
leapp-upgrade-el8toel9-fapolicyd 0.24.0-1.el8_10
python3-leapp 0.21.0-1.el8_10
snactor 0.21.0-1.el8_10

2026-05-19

appstream x86_64 repository

Package Version Advisory Notes
nginx 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-all-modules 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-debugsource 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-filesystem 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-devel 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-http-image-filter 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-http-image-filter-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-mod-http-perl 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-http-perl-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-mod-http-xslt-filter 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-http-xslt-filter-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-mod-mail 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-mail-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-mod-stream 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-stream-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1

appstream aarch64 repository

Package Version Advisory Notes
nginx 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-all-modules 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-debugsource 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-filesystem 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-devel 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-http-image-filter 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-http-image-filter-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-mod-http-perl 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-http-perl-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-mod-http-xslt-filter 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-http-xslt-filter-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-mod-mail 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-mail-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1
nginx-mod-stream 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1 RHSA-2026:18041
Security Advisory
(CVE-2026-42945)
nginx-mod-stream-debuginfo 1.24.0-3.module+el8.10.0+24290+dc7f88b5.1

2026-05-15

baseos x86_64 repository

Package Version Advisory Notes
rsync 3.1.3-25.el8_10 RHSA-2026:17481
Security Advisory
(CVE-2026-41035)
rsync-daemon 3.1.3-25.el8_10 RHSA-2026:17481
Security Advisory
(CVE-2026-41035)
rsync-debuginfo 3.1.3-25.el8_10
rsync-debugsource 3.1.3-25.el8_10

appstream x86_64 repository

Package Version Advisory Notes
gimp 2.8.22-26.module+el8.10.0+24277+6acc3952.6 RHSA-2026:17533
Security Advisory
(CVE-2026-4150, CVE-2026-4153, CVE-2026-4154, CVE-2026-4887)
gimp-debuginfo 2.8.22-26.module+el8.10.0+24277+6acc3952.6
gimp-debugsource 2.8.22-26.module+el8.10.0+24277+6acc3952.6
gimp-devel 2.8.22-26.module+el8.10.0+24277+6acc3952.6 RHSA-2026:17533
Security Advisory
(CVE-2026-4150, CVE-2026-4153, CVE-2026-4154, CVE-2026-4887)
gimp-devel-tools 2.8.22-26.module+el8.10.0+24277+6acc3952.6 RHSA-2026:17533
Security Advisory
(CVE-2026-4150, CVE-2026-4153, CVE-2026-4154, CVE-2026-4887)
gimp-devel-tools-debuginfo 2.8.22-26.module+el8.10.0+24277+6acc3952.6
gimp-libs 2.8.22-26.module+el8.10.0+24277+6acc3952.6 RHSA-2026:17533
Security Advisory
(CVE-2026-4150, CVE-2026-4153, CVE-2026-4154, CVE-2026-4887)
gimp-libs-debuginfo 2.8.22-26.module+el8.10.0+24277+6acc3952.6

baseos aarch64 repository

Package Version Advisory Notes
rsync 3.1.3-25.el8_10 RHSA-2026:17481
Security Advisory
(CVE-2026-41035)
rsync-daemon 3.1.3-25.el8_10 RHSA-2026:17481
Security Advisory
(CVE-2026-41035)
rsync-debuginfo 3.1.3-25.el8_10
rsync-debugsource 3.1.3-25.el8_10

appstream aarch64 repository

Package Version Advisory Notes
gimp 2.8.22-26.module+el8.10.0+24277+6acc3952.6 RHSA-2026:17533
Security Advisory
(CVE-2026-4150, CVE-2026-4153, CVE-2026-4154, CVE-2026-4887)
gimp-debuginfo 2.8.22-26.module+el8.10.0+24277+6acc3952.6
gimp-debugsource 2.8.22-26.module+el8.10.0+24277+6acc3952.6
gimp-devel 2.8.22-26.module+el8.10.0+24277+6acc3952.6 RHSA-2026:17533
Security Advisory
(CVE-2026-4150, CVE-2026-4153, CVE-2026-4154, CVE-2026-4887)
gimp-devel-tools 2.8.22-26.module+el8.10.0+24277+6acc3952.6 RHSA-2026:17533
Security Advisory
(CVE-2026-4150, CVE-2026-4153, CVE-2026-4154, CVE-2026-4887)
gimp-devel-tools-debuginfo 2.8.22-26.module+el8.10.0+24277+6acc3952.6
gimp-libs 2.8.22-26.module+el8.10.0+24277+6acc3952.6 RHSA-2026:17533
Security Advisory
(CVE-2026-4150, CVE-2026-4153, CVE-2026-4154, CVE-2026-4887)
gimp-libs-debuginfo 2.8.22-26.module+el8.10.0+24277+6acc3952.6