Latest testing System Updates for Red Hat Enterprise Linux 8 (RHEL8)¶
Make sure the testing repositories are enabled by running as root:
dnf install cern-yum-tool
cern-yum-tool --testing
or simply:
echo "8-testing" > /etc/dnf/vars/cernrhel
Please verify that your system is up to date, running as root:
/usr/bin/dnf check-update
If the above command shows you available updates apply these, running as root:
/usr/bin/dnf update
or if you only want to apply security updates, run as root:
/usr/bin/dnf --security update
To receive notifications of updates, please sign up to the e-group linux-announce-rhel.
For more information about software repositories please check: RHEL8 software repositories
2024-09-11¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
389-ds-base | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-debuginfo | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-debugsource | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-devel | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-legacy-tools | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-legacy-tools-debuginfo | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-libs | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-libs-debuginfo | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-snmp | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-snmp-debuginfo | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
python3-lib389 | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
389-ds-base | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-debuginfo | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-debugsource | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-devel | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-legacy-tools | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-legacy-tools-debuginfo | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-libs | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-libs-debuginfo | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-snmp | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
389-ds-base-snmp-debuginfo | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 | ||
python3-lib389 | 1.4.3.39-8.module+el8.10.0+22275+e4fc04d4 |
2024-09-06¶
baseos x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bubblewrap | 0.4.0-2.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
bubblewrap-debuginfo | 0.4.0-2.el8_10 | ||
bubblewrap-debugsource | 0.4.0-2.el8_10 |
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
flatpak | 1.12.9-3.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
flatpak-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-debugsource | 1.12.9-3.el8_10 | ||
flatpak-libs | 1.12.9-3.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
flatpak-libs-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-selinux | 1.12.9-3.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
flatpak-session-helper | 1.12.9-3.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
flatpak-session-helper-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-tests-debuginfo | 1.12.9-3.el8_10 |
codeready-builder x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
flatpak-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-debugsource | 1.12.9-3.el8_10 | ||
flatpak-devel | 1.12.9-3.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
flatpak-libs-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-session-helper-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-tests-debuginfo | 1.12.9-3.el8_10 |
baseos aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
bubblewrap | 0.4.0-2.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
bubblewrap-debuginfo | 0.4.0-2.el8_10 | ||
bubblewrap-debugsource | 0.4.0-2.el8_10 |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
flatpak | 1.12.9-3.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
flatpak-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-debugsource | 1.12.9-3.el8_10 | ||
flatpak-libs | 1.12.9-3.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
flatpak-libs-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-selinux | 1.12.9-3.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
flatpak-session-helper | 1.12.9-3.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
flatpak-session-helper-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-tests-debuginfo | 1.12.9-3.el8_10 |
codeready-builder aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
flatpak-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-debugsource | 1.12.9-3.el8_10 | ||
flatpak-devel | 1.12.9-3.el8_10 | RHSA-2024:6422 | Security Advisory (CVE-2024-42472) |
flatpak-libs-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-session-helper-debuginfo | 1.12.9-3.el8_10 | ||
flatpak-tests-debuginfo | 1.12.9-3.el8_10 |
2024-09-05¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
fence-agents-aliyun-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-all | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-amt-ws | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-apc | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-apc-snmp | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-bladecenter | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-brocade | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-cisco-mds | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-cisco-ucs | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-common | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-compute | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-debugsource | 4.2.1-129.el8_10.4 | ||
fence-agents-drac5 | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-eaton-snmp | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-emerson | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-eps | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-heuristics-ping | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-hpblade | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ibm-powervs | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ibm-vpc | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ibmblade | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ifmib | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ilo-moonshot | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ilo-mp | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ilo-ssh | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ilo2 | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-intelmodular | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ipdu | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ipmilan | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-kdump | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-kdump-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-kubevirt | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-kubevirt-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-lpar | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-mpath | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-redfish | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-rhevm | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-rsa | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-rsb | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-sbd | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-scsi | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-virsh | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-vmware-rest | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-vmware-soap | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-wti | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
highavailability x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
fence-agents-aliyun | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-aliyun-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-aws | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-azure-arm | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-debugsource | 4.2.1-129.el8_10.4 | ||
fence-agents-gce | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-kdump-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-kubevirt-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-openstack | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
resource-agents | 4.9.0-54.el8_10.4 | RHSA-2024:6311 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
resource-agents-aliyun | 4.9.0-54.el8_10.4 | RHSA-2024:6311 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
resource-agents-aliyun-debuginfo | 4.9.0-54.el8_10.4 | ||
resource-agents-debuginfo | 4.9.0-54.el8_10.4 | ||
resource-agents-debugsource | 4.9.0-54.el8_10.4 | ||
resource-agents-gcp | 4.9.0-54.el8_10.4 | RHSA-2024:6311 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
resource-agents-paf | 4.9.0-54.el8_10.4 | RHSA-2024:6311 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
fence-agents-all | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-amt-ws | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-apc | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-apc-snmp | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-bladecenter | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-brocade | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-cisco-mds | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-cisco-ucs | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-common | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-compute | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-debugsource | 4.2.1-129.el8_10.4 | ||
fence-agents-drac5 | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-eaton-snmp | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-emerson | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-eps | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-heuristics-ping | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-hpblade | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ibm-powervs | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ibm-vpc | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ibmblade | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ifmib | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ilo-moonshot | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ilo-mp | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ilo-ssh | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ilo2 | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-intelmodular | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ipdu | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-ipmilan | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-kdump | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-kdump-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-kubevirt | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-kubevirt-debuginfo | 4.2.1-129.el8_10.4 | ||
fence-agents-mpath | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-redfish | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-rhevm | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-rsa | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-rsb | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-sbd | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-scsi | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-virsh | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-vmware-rest | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-vmware-soap | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
fence-agents-wti | 4.2.1-129.el8_10.4 | RHSA-2024:6309 | Security Advisory (CVE-2024-37891, CVE-2024-6345) |
2024-09-03¶
appstream x86_64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
nodejs | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-debuginfo | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-debugsource | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-devel | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-docs | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-full-i18n | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-nodemon | 3.0.1-1.module+el8.10.0+21159+f5a7145d | ||
nodejs-packaging | 2021.06-4.module+el8.9.0+19439+7b18b275 | ||
nodejs-packaging-bundler | 2021.06-4.module+el8.9.0+19439+7b18b275 | ||
npm | 10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead |
appstream aarch64 repository¶
Package | Version | Advisory | Notes |
---|---|---|---|
nodejs | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-debuginfo | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-debugsource | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-devel | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-docs | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-full-i18n | 18.20.4-1.module+el8.10.0+22199+56ea0ead | ||
nodejs-nodemon | 3.0.1-1.module+el8.10.0+21159+f5a7145d | ||
nodejs-packaging | 2021.06-4.module+el8.9.0+19439+7b18b275 | ||
nodejs-packaging-bundler | 2021.06-4.module+el8.9.0+19439+7b18b275 | ||
npm | 10.7.0-1.18.20.4.1.module+el8.10.0+22199+56ea0ead |