Skip to content

Latest production System Updates for AlmaLinux 8 (ALMA8)

Please verify that your system is up to date, running as root:

/usr/bin/dnf check-update

If the above command shows you available updates apply these, running as root:

/usr/bin/dnf update

or if you only want to apply security updates, run as root:

/usr/bin/dnf --security update

To receive notifications of updates, please sign up to the e-group linux-announce.

For more information about software repositories please check: ALMA8 software repositories

2024-12-11

openafs x86_64 repository

Package Version Advisory Notes
cern-aklog-systemd-user 1.8-1.al8.cern
kmod-openafs 1.8.10-0.4.18.0_553.30.1.el8_10.al8.cern

BaseOS x86_64 repository

Package Version Advisory Notes
almalinux-indexhtml 8-9.el8
bpftool 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
bpftool-debuginfo 4.18.0-553.30.1.el8_10
kernel 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-abi-stablelists 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-core 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-cross-headers 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debug 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debug-core 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debug-debuginfo 4.18.0-553.30.1.el8_10
kernel-debug-devel 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debug-modules 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debug-modules-extra 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debuginfo 4.18.0-553.30.1.el8_10
kernel-debuginfo-common-x86_64 4.18.0-553.30.1.el8_10
kernel-devel 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-doc 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-headers 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-modules 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-modules-extra 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-tools 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-tools-debuginfo 4.18.0-553.30.1.el8_10
kernel-tools-libs 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
pam 1.3.1-36.el8_10 ALSA-2024:10379
Security Advisory
(CVE-2024-10041, CVE-2024-10963)
pam-debuginfo 1.3.1-36.el8_10
pam-debugsource 1.3.1-36.el8_10
pam-devel 1.3.1-36.el8_10 ALSA-2024:10379
Security Advisory
(CVE-2024-10041, CVE-2024-10963)
perf 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
perf-debuginfo 4.18.0-553.30.1.el8_10
python3-perf 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
python3-perf-debuginfo 4.18.0-553.30.1.el8_10
sos 4.8.1-1.el8_10
sos-audit 4.8.1-1.el8_10

AppStream x86_64 repository

Package Version Advisory Notes
aardvark-dns 1.10.1-2.module_el8.10.0+3926+f12484f5
buildah 1.33.11-1.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
buildah-debuginfo 1.33.11-1.module_el8.10.0+3926+f12484f5
buildah-debugsource 1.33.11-1.module_el8.10.0+3926+f12484f5
buildah-tests 1.33.11-1.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
buildah-tests-debuginfo 1.33.11-1.module_el8.10.0+3926+f12484f5
cockpit-podman 84.1-1.module_el8.10.0+3926+f12484f5
conmon 2.1.10-1.module_el8.10.0+3926+f12484f5
conmon-debuginfo 2.1.10-1.module_el8.10.0+3926+f12484f5
conmon-debugsource 2.1.10-1.module_el8.10.0+3926+f12484f5
container-selinux 2.229.0-2.module_el8.10.0+3926+f12484f5
containernetworking-plugins 1.4.0-5.module_el8.10.0+3926+f12484f5
containernetworking-plugins-debuginfo 1.4.0-5.module_el8.10.0+3926+f12484f5
containernetworking-plugins-debugsource 1.4.0-5.module_el8.10.0+3926+f12484f5
containers-common 1-82.module_el8.10.0+3926+f12484f5
crit 3.18-5.module_el8.10.0+3926+f12484f5
criu 3.18-5.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
criu-debuginfo 3.18-5.module_el8.10.0+3926+f12484f5
criu-debugsource 3.18-5.module_el8.10.0+3926+f12484f5
criu-devel 3.18-5.module_el8.10.0+3926+f12484f5
criu-libs 3.18-5.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
criu-libs-debuginfo 3.18-5.module_el8.10.0+3926+f12484f5
crun 1.14.3-2.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
crun-debuginfo 1.14.3-2.module_el8.10.0+3926+f12484f5
crun-debugsource 1.14.3-2.module_el8.10.0+3926+f12484f5
fuse-overlayfs 1.13-1.module_el8.10.0+3926+f12484f5
fuse-overlayfs-debuginfo 1.13-1.module_el8.10.0+3926+f12484f5
fuse-overlayfs-debugsource 1.13-1.module_el8.10.0+3926+f12484f5
libslirp 4.4.0-2.module_el8.10.0+3926+f12484f5
libslirp-debuginfo 4.4.0-2.module_el8.10.0+3926+f12484f5
libslirp-debugsource 4.4.0-2.module_el8.10.0+3926+f12484f5
libslirp-devel 4.4.0-2.module_el8.10.0+3926+f12484f5
netavark 1.10.3-1.module_el8.10.0+3926+f12484f5
oci-seccomp-bpf-hook 1.2.10-1.module_el8.10.0+3926+f12484f5
oci-seccomp-bpf-hook-debuginfo 1.2.10-1.module_el8.10.0+3926+f12484f5
oci-seccomp-bpf-hook-debugsource 1.2.10-1.module_el8.10.0+3926+f12484f5
perl-App-cpanminus 1.7044-6.module_el8.10.0+3921+d6609cd4
perl-App-cpanminus 1.7044-6.module_el8.10.0+3922+0003acf2
perl-App-cpanminus 1.7044-6.module_el8.10.0+3923+8115cf75
perl-App-cpanminus 1.7044-6.module_el8.10.0+3924+8d272be4 ALSA-2024:10219
Security Advisory
(CVE-2024-45321)
perl-CPAN-DistnameInfo 0.12-13.module_el8.10.0+3921+d6609cd4
perl-CPAN-DistnameInfo 0.12-13.module_el8.10.0+3922+0003acf2
perl-CPAN-DistnameInfo 0.12-13.module_el8.10.0+3923+8115cf75
perl-CPAN-DistnameInfo 0.12-13.module_el8.10.0+3924+8d272be4
perl-CPAN-Meta-Check 0.014-6.module_el8.10.0+3921+d6609cd4
perl-CPAN-Meta-Check 0.014-6.module_el8.10.0+3922+0003acf2
perl-CPAN-Meta-Check 0.014-6.module_el8.10.0+3923+8115cf75
perl-CPAN-Meta-Check 0.014-6.module_el8.10.0+3924+8d272be4 ALSA-2024:10219
Security Advisory
(CVE-2024-45321)
perl-File-pushd 1.014-6.module_el8.10.0+3921+d6609cd4
perl-File-pushd 1.014-6.module_el8.10.0+3922+0003acf2
perl-File-pushd 1.014-6.module_el8.10.0+3923+8115cf75
perl-File-pushd 1.014-6.module_el8.10.0+3924+8d272be4
perl-Module-CPANfile 1.1002-7.module_el8.10.0+3921+d6609cd4
perl-Module-CPANfile 1.1002-7.module_el8.10.0+3922+0003acf2
perl-Module-CPANfile 1.1002-7.module_el8.10.0+3923+8115cf75
perl-Module-CPANfile 1.1002-7.module_el8.10.0+3924+8d272be4
perl-Parse-PMFile 0.41-7.module_el8.10.0+3921+d6609cd4
perl-Parse-PMFile 0.41-7.module_el8.10.0+3922+0003acf2
perl-Parse-PMFile 0.41-7.module_el8.10.0+3923+8115cf75
perl-Parse-PMFile 0.41-7.module_el8.10.0+3924+8d272be4
perl-String-ShellQuote 1.04-24.module_el8.10.0+3921+d6609cd4
perl-String-ShellQuote 1.04-24.module_el8.10.0+3922+0003acf2
perl-String-ShellQuote 1.04-24.module_el8.10.0+3923+8115cf75
perl-String-ShellQuote 1.04-24.module_el8.10.0+3924+8d272be4
podman 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-catatonit 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-catatonit-debuginfo 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-debuginfo 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-debugsource 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-docker 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-gvproxy 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-gvproxy-debuginfo 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-plugins 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-plugins-debuginfo 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-remote 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-remote-debuginfo 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-tests 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
python3-criu 3.18-5.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
python3-podman 4.9.0-3.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
runc 1.1.12-5.module_el8.10.0+3926+f12484f5
runc-debuginfo 1.1.12-5.module_el8.10.0+3926+f12484f5
runc-debugsource 1.1.12-5.module_el8.10.0+3926+f12484f5
skopeo 1.14.5-3.module_el8.10.0+3926+f12484f5
skopeo-tests 1.14.5-3.module_el8.10.0+3926+f12484f5
slirp4netns 1.2.3-1.module_el8.10.0+3926+f12484f5
slirp4netns-debuginfo 1.2.3-1.module_el8.10.0+3926+f12484f5
slirp4netns-debugsource 1.2.3-1.module_el8.10.0+3926+f12484f5
toolbox 0.0.99.5-2.module_el8.10.0+3926+f12484f5
toolbox-debuginfo 0.0.99.5-2.module_el8.10.0+3926+f12484f5
toolbox-debugsource 0.0.99.5-2.module_el8.10.0+3926+f12484f5
toolbox-tests 0.0.99.5-2.module_el8.10.0+3926+f12484f5
udica 0.2.6-21.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
webkit2gtk3 2.46.3-2.el8_10 ALSA-2024:10481
Security Advisory
(CVE-2024-44309)
webkit2gtk3-debuginfo 2.46.3-2.el8_10
webkit2gtk3-debugsource 2.46.3-2.el8_10
webkit2gtk3-devel 2.46.3-2.el8_10 ALSA-2024:10481
Security Advisory
(CVE-2024-44309)
webkit2gtk3-devel-debuginfo 2.46.3-2.el8_10
webkit2gtk3-jsc 2.46.3-2.el8_10 ALSA-2024:10481
Security Advisory
(CVE-2024-44309)
webkit2gtk3-jsc-debuginfo 2.46.3-2.el8_10
webkit2gtk3-jsc-devel 2.46.3-2.el8_10 ALSA-2024:10481
Security Advisory
(CVE-2024-44309)
webkit2gtk3-jsc-devel-debuginfo 2.46.3-2.el8_10

RT x86_64 repository

Package Version Advisory Notes
kernel-rt 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-core 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debug 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debug-core 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debug-debuginfo 4.18.0-553.30.1.rt7.371.el8_10
kernel-rt-debug-devel 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debug-modules 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debug-modules-extra 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debuginfo 4.18.0-553.30.1.rt7.371.el8_10
kernel-rt-debuginfo-common-x86_64 4.18.0-553.30.1.rt7.371.el8_10
kernel-rt-devel 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-modules 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-modules-extra 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)

PowerTools x86_64 repository

Package Version Advisory Notes
kernel-tools-libs-devel 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)

NFV x86_64 repository

Package Version Advisory Notes
kernel-rt 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-core 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debug 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debug-core 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debug-debuginfo 4.18.0-553.30.1.rt7.371.el8_10
kernel-rt-debug-devel 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debug-kvm 4.18.0-553.30.1.rt7.371.el8_10
kernel-rt-debug-modules 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debug-modules-extra 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-debuginfo 4.18.0-553.30.1.rt7.371.el8_10
kernel-rt-debuginfo-common-x86_64 4.18.0-553.30.1.rt7.371.el8_10
kernel-rt-devel 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-kvm 4.18.0-553.30.1.rt7.371.el8_10
kernel-rt-modules 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)
kernel-rt-modules-extra 4.18.0-553.30.1.rt7.371.el8_10 ALSA-2024:10282
Security Advisory
(CVE-2024-27043, CVE-2024-38564)

devel x86_64 repository

Package Version Advisory Notes
kernel-debug-modules-internal 4.18.0-553.30.1.el8_10
kernel-ipaclones-internal 4.18.0-553.30.1.el8_10
kernel-modules-internal 4.18.0-553.30.1.el8_10
kernel-rt-debug-modules-internal 4.18.0-553.30.1.rt7.371.el8_10
kernel-rt-modules-internal 4.18.0-553.30.1.rt7.371.el8_10
kernel-rt-selftests-internal 4.18.0-553.30.1.rt7.371.el8_10
kernel-selftests-internal 4.18.0-553.30.1.el8_10
perl-Test-Deep 1.127-5.module_el8.10.0+3921+d6609cd4
perl-Test-Deep 1.127-5.module_el8.10.0+3922+0003acf2
perl-Test-Deep 1.127-5.module_el8.10.0+3923+8115cf75
perl-Test-Deep 1.127-5.module_el8.10.0+3924+8d272be4

openafs aarch64 repository

Package Version Advisory Notes
cern-aklog-systemd-user 1.8-1.al8.cern
kmod-openafs 1.8.10-0.4.18.0_553.30.1.el8_10.al8.cern

BaseOS aarch64 repository

Package Version Advisory Notes
almalinux-indexhtml 8-9.el8
bpftool 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
bpftool-debuginfo 4.18.0-553.30.1.el8_10
kernel 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-abi-stablelists 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-core 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-cross-headers 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debug 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debug-core 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debug-debuginfo 4.18.0-553.30.1.el8_10
kernel-debug-devel 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debug-modules 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debug-modules-extra 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-debuginfo 4.18.0-553.30.1.el8_10
kernel-debuginfo-common-aarch64 4.18.0-553.30.1.el8_10
kernel-devel 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-doc 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-headers 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-modules 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-modules-extra 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-tools 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
kernel-tools-debuginfo 4.18.0-553.30.1.el8_10
kernel-tools-libs 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
pam 1.3.1-36.el8_10 ALSA-2024:10379
Security Advisory
(CVE-2024-10041, CVE-2024-10963)
pam-debuginfo 1.3.1-36.el8_10
pam-debugsource 1.3.1-36.el8_10
pam-devel 1.3.1-36.el8_10 ALSA-2024:10379
Security Advisory
(CVE-2024-10041, CVE-2024-10963)
perf 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
perf-debuginfo 4.18.0-553.30.1.el8_10
python3-perf 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)
python3-perf-debuginfo 4.18.0-553.30.1.el8_10
sos 4.8.1-1.el8_10
sos-audit 4.8.1-1.el8_10

AppStream aarch64 repository

Package Version Advisory Notes
aardvark-dns 1.10.1-2.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
buildah 1.33.11-1.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
buildah-debuginfo 1.33.11-1.module_el8.10.0+3926+f12484f5
buildah-debugsource 1.33.11-1.module_el8.10.0+3926+f12484f5
buildah-tests 1.33.11-1.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
buildah-tests-debuginfo 1.33.11-1.module_el8.10.0+3926+f12484f5
cockpit-podman 84.1-1.module_el8.10.0+3926+f12484f5
conmon 2.1.10-1.module_el8.10.0+3926+f12484f5
conmon-debuginfo 2.1.10-1.module_el8.10.0+3926+f12484f5
conmon-debugsource 2.1.10-1.module_el8.10.0+3926+f12484f5
container-selinux 2.229.0-2.module_el8.10.0+3926+f12484f5
containernetworking-plugins 1.4.0-5.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
containernetworking-plugins-debuginfo 1.4.0-5.module_el8.10.0+3926+f12484f5
containernetworking-plugins-debugsource 1.4.0-5.module_el8.10.0+3926+f12484f5
containers-common 1-82.module_el8.10.0+3926+f12484f5
crit 3.18-5.module_el8.10.0+3926+f12484f5
criu 3.18-5.module_el8.10.0+3926+f12484f5
criu-debuginfo 3.18-5.module_el8.10.0+3926+f12484f5
criu-debugsource 3.18-5.module_el8.10.0+3926+f12484f5
criu-devel 3.18-5.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
criu-libs 3.18-5.module_el8.10.0+3926+f12484f5
criu-libs-debuginfo 3.18-5.module_el8.10.0+3926+f12484f5
crun 1.14.3-2.module_el8.10.0+3926+f12484f5
crun-debuginfo 1.14.3-2.module_el8.10.0+3926+f12484f5
crun-debugsource 1.14.3-2.module_el8.10.0+3926+f12484f5
fuse-overlayfs 1.13-1.module_el8.10.0+3926+f12484f5
fuse-overlayfs-debuginfo 1.13-1.module_el8.10.0+3926+f12484f5
fuse-overlayfs-debugsource 1.13-1.module_el8.10.0+3926+f12484f5
libslirp 4.4.0-2.module_el8.10.0+3926+f12484f5
libslirp-debuginfo 4.4.0-2.module_el8.10.0+3926+f12484f5
libslirp-debugsource 4.4.0-2.module_el8.10.0+3926+f12484f5
libslirp-devel 4.4.0-2.module_el8.10.0+3926+f12484f5
netavark 1.10.3-1.module_el8.10.0+3926+f12484f5
oci-seccomp-bpf-hook 1.2.10-1.module_el8.10.0+3926+f12484f5
oci-seccomp-bpf-hook-debuginfo 1.2.10-1.module_el8.10.0+3926+f12484f5
oci-seccomp-bpf-hook-debugsource 1.2.10-1.module_el8.10.0+3926+f12484f5
perl-App-cpanminus 1.7044-6.module_el8.10.0+3921+d6609cd4
perl-App-cpanminus 1.7044-6.module_el8.10.0+3922+0003acf2
perl-App-cpanminus 1.7044-6.module_el8.10.0+3923+8115cf75
perl-App-cpanminus 1.7044-6.module_el8.10.0+3924+8d272be4 ALSA-2024:10219
Security Advisory
(CVE-2024-45321)
perl-CPAN-DistnameInfo 0.12-13.module_el8.10.0+3921+d6609cd4
perl-CPAN-DistnameInfo 0.12-13.module_el8.10.0+3922+0003acf2
perl-CPAN-DistnameInfo 0.12-13.module_el8.10.0+3923+8115cf75
perl-CPAN-DistnameInfo 0.12-13.module_el8.10.0+3924+8d272be4
perl-CPAN-Meta-Check 0.014-6.module_el8.10.0+3921+d6609cd4
perl-CPAN-Meta-Check 0.014-6.module_el8.10.0+3922+0003acf2
perl-CPAN-Meta-Check 0.014-6.module_el8.10.0+3923+8115cf75
perl-CPAN-Meta-Check 0.014-6.module_el8.10.0+3924+8d272be4 ALSA-2024:10219
Security Advisory
(CVE-2024-45321)
perl-File-pushd 1.014-6.module_el8.10.0+3921+d6609cd4
perl-File-pushd 1.014-6.module_el8.10.0+3922+0003acf2
perl-File-pushd 1.014-6.module_el8.10.0+3923+8115cf75
perl-File-pushd 1.014-6.module_el8.10.0+3924+8d272be4
perl-Module-CPANfile 1.1002-7.module_el8.10.0+3921+d6609cd4
perl-Module-CPANfile 1.1002-7.module_el8.10.0+3922+0003acf2
perl-Module-CPANfile 1.1002-7.module_el8.10.0+3923+8115cf75
perl-Module-CPANfile 1.1002-7.module_el8.10.0+3924+8d272be4
perl-Parse-PMFile 0.41-7.module_el8.10.0+3921+d6609cd4
perl-Parse-PMFile 0.41-7.module_el8.10.0+3922+0003acf2
perl-Parse-PMFile 0.41-7.module_el8.10.0+3923+8115cf75
perl-Parse-PMFile 0.41-7.module_el8.10.0+3924+8d272be4
perl-String-ShellQuote 1.04-24.module_el8.10.0+3921+d6609cd4
perl-String-ShellQuote 1.04-24.module_el8.10.0+3922+0003acf2
perl-String-ShellQuote 1.04-24.module_el8.10.0+3923+8115cf75
perl-String-ShellQuote 1.04-24.module_el8.10.0+3924+8d272be4
podman 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-catatonit 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-catatonit-debuginfo 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-debuginfo 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-debugsource 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-docker 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-gvproxy 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-gvproxy-debuginfo 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-plugins 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-plugins-debuginfo 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-remote 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
podman-remote-debuginfo 4.9.4-18.module_el8.10.0+3926+f12484f5
podman-tests 4.9.4-18.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
python3-criu 3.18-5.module_el8.10.0+3926+f12484f5
python3-podman 4.9.0-3.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
runc 1.1.12-5.module_el8.10.0+3926+f12484f5
runc-debuginfo 1.1.12-5.module_el8.10.0+3926+f12484f5
runc-debugsource 1.1.12-5.module_el8.10.0+3926+f12484f5
skopeo 1.14.5-3.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
skopeo-tests 1.14.5-3.module_el8.10.0+3926+f12484f5
slirp4netns 1.2.3-1.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
slirp4netns-debuginfo 1.2.3-1.module_el8.10.0+3926+f12484f5
slirp4netns-debugsource 1.2.3-1.module_el8.10.0+3926+f12484f5
toolbox 0.0.99.5-2.module_el8.10.0+3926+f12484f5
toolbox-debuginfo 0.0.99.5-2.module_el8.10.0+3926+f12484f5
toolbox-debugsource 0.0.99.5-2.module_el8.10.0+3926+f12484f5
toolbox-tests 0.0.99.5-2.module_el8.10.0+3926+f12484f5
udica 0.2.6-21.module_el8.10.0+3926+f12484f5 ALSA-2024:10289
Security Advisory
(CVE-2021-33198, CVE-2021-4024, CVE-2024-9676)
webkit2gtk3 2.46.3-2.el8_10 ALSA-2024:10481
Security Advisory
(CVE-2024-44309)
webkit2gtk3-debuginfo 2.46.3-2.el8_10
webkit2gtk3-debugsource 2.46.3-2.el8_10
webkit2gtk3-devel 2.46.3-2.el8_10 ALSA-2024:10481
Security Advisory
(CVE-2024-44309)
webkit2gtk3-devel-debuginfo 2.46.3-2.el8_10
webkit2gtk3-jsc 2.46.3-2.el8_10 ALSA-2024:10481
Security Advisory
(CVE-2024-44309)
webkit2gtk3-jsc-debuginfo 2.46.3-2.el8_10
webkit2gtk3-jsc-devel 2.46.3-2.el8_10 ALSA-2024:10481
Security Advisory
(CVE-2024-44309)
webkit2gtk3-jsc-devel-debuginfo 2.46.3-2.el8_10

PowerTools aarch64 repository

Package Version Advisory Notes
kernel-tools-libs-devel 4.18.0-553.30.1.el8_10 ALSA-2024:10281
Security Advisory
(CVE-2024-27043, CVE-2024-27399, CVE-2024-38564, CVE-2024-46858)

devel aarch64 repository

Package Version Advisory Notes
kernel-debug-modules-internal 4.18.0-553.30.1.el8_10
kernel-modules-internal 4.18.0-553.30.1.el8_10
kernel-selftests-internal 4.18.0-553.30.1.el8_10
perl-Test-Deep 1.127-5.module_el8.10.0+3921+d6609cd4
perl-Test-Deep 1.127-5.module_el8.10.0+3922+0003acf2
perl-Test-Deep 1.127-5.module_el8.10.0+3923+8115cf75
perl-Test-Deep 1.127-5.module_el8.10.0+3924+8d272be4

2024-11-27

BaseOS x86_64 repository

Package Version Advisory Notes
binutils 2.30-125.el8_10 ALSA-2024:9689
Security Advisory
(CVE-2018-12699)
binutils-debuginfo 2.30-125.el8_10
binutils-debugsource 2.30-125.el8_10
bzip2 1.0.6-27.el8_10.alma.1
bzip2-debuginfo 1.0.6-27.el8_10.alma.1
bzip2-debugsource 1.0.6-27.el8_10.alma.1
bzip2-devel 1.0.6-27.el8_10.alma.1
bzip2-libs 1.0.6-27.el8_10.alma.1
bzip2-libs-debuginfo 1.0.6-27.el8_10.alma.1
expat 2.2.5-16.el8_10 ALSA-2024:9502
Security Advisory
(CVE-2024-50602)
expat-debuginfo 2.2.5-16.el8_10
expat-debugsource 2.2.5-16.el8_10
expat-devel 2.2.5-16.el8_10 ALSA-2024:9502
Security Advisory
(CVE-2024-50602)
libsoup 2.62.3-6.el8_10 ALSA-2024:9573
Security Advisory
(CVE-2024-52530, CVE-2024-52532)
libsoup-debuginfo 2.62.3-6.el8_10
libsoup-debugsource 2.62.3-6.el8_10

AppStream x86_64 repository

Package Version Advisory Notes
aspnetcore-runtime-6.0 6.0.36-1.el8_10
aspnetcore-runtime-8.0 8.0.11-1.el8_10.1
aspnetcore-runtime-9.0 9.0.0-1.el8_10
aspnetcore-runtime-dbg-8.0 8.0.11-1.el8_10.1
aspnetcore-runtime-dbg-9.0 9.0.0-1.el8_10
aspnetcore-targeting-pack-6.0 6.0.36-1.el8_10
aspnetcore-targeting-pack-8.0 8.0.11-1.el8_10.1
aspnetcore-targeting-pack-9.0 9.0.0-1.el8_10
binutils-devel 2.30-125.el8_10 ALSA-2024:9689
Security Advisory
(CVE-2018-12699)
dotnet 9.0.100-1.el8_10
dotnet-apphost-pack-6.0 6.0.36-1.el8_10
dotnet-apphost-pack-6.0-debuginfo 6.0.36-1.el8_10
dotnet-apphost-pack-8.0 8.0.11-1.el8_10.1
dotnet-apphost-pack-8.0-debuginfo 8.0.11-1.el8_10.1
dotnet-apphost-pack-9.0 9.0.0-1.el8_10
dotnet-apphost-pack-9.0-debuginfo 9.0.0-1.el8_10
dotnet-host 9.0.0-1.el8_10
dotnet-host-debuginfo 9.0.0-1.el8_10
dotnet-hostfxr-6.0 6.0.36-1.el8_10
dotnet-hostfxr-6.0-debuginfo 6.0.36-1.el8_10
dotnet-hostfxr-8.0 8.0.11-1.el8_10.1
dotnet-hostfxr-8.0-debuginfo 8.0.11-1.el8_10.1
dotnet-hostfxr-9.0 9.0.0-1.el8_10
dotnet-hostfxr-9.0-debuginfo 9.0.0-1.el8_10
dotnet-runtime-6.0 6.0.36-1.el8_10
dotnet-runtime-6.0-debuginfo 6.0.36-1.el8_10
dotnet-runtime-8.0 8.0.11-1.el8_10.1
dotnet-runtime-8.0-debuginfo 8.0.11-1.el8_10.1
dotnet-runtime-9.0 9.0.0-1.el8_10
dotnet-runtime-9.0-debuginfo 9.0.0-1.el8_10
dotnet-runtime-dbg-8.0 8.0.11-1.el8_10.1
dotnet-runtime-dbg-9.0 9.0.0-1.el8_10
dotnet-sdk-6.0 6.0.136-1.el8_10
dotnet-sdk-6.0-debuginfo 6.0.136-1.el8_10
dotnet-sdk-8.0 8.0.111-1.el8_10.1
dotnet-sdk-8.0-debuginfo 8.0.111-1.el8_10.1
dotnet-sdk-9.0 9.0.100-1.el8_10
dotnet-sdk-9.0-debuginfo 9.0.100-1.el8_10
dotnet-sdk-aot-9.0 9.0.100-1.el8_10
dotnet-sdk-aot-9.0-debuginfo 9.0.100-1.el8_10
dotnet-sdk-dbg-8.0 8.0.111-1.el8_10.1
dotnet-sdk-dbg-9.0 9.0.100-1.el8_10
dotnet-targeting-pack-6.0 6.0.36-1.el8_10
dotnet-targeting-pack-8.0 8.0.11-1.el8_10.1
dotnet-targeting-pack-9.0 9.0.0-1.el8_10
dotnet-templates-6.0 6.0.136-1.el8_10
dotnet-templates-8.0 8.0.111-1.el8_10.1
dotnet-templates-9.0 9.0.100-1.el8_10
dotnet6.0-debuginfo 6.0.136-1.el8_10
dotnet6.0-debugsource 6.0.136-1.el8_10
dotnet8.0-debuginfo 8.0.111-1.el8_10.1
dotnet8.0-debugsource 8.0.111-1.el8_10.1
dotnet9.0-debuginfo 9.0.100-1.el8_10
dotnet9.0-debugsource 9.0.100-1.el8_10
evolution 3.28.5-27.el8_10
evolution-bogofilter 3.28.5-27.el8_10
evolution-bogofilter-debuginfo 3.28.5-27.el8_10
evolution-debuginfo 3.28.5-27.el8_10
evolution-debugsource 3.28.5-27.el8_10
evolution-help 3.28.5-27.el8_10
evolution-langpacks 3.28.5-27.el8_10
evolution-pst 3.28.5-27.el8_10
evolution-pst-debuginfo 3.28.5-27.el8_10
evolution-spamassassin 3.28.5-27.el8_10
evolution-spamassassin-debuginfo 3.28.5-27.el8_10
libsoup-devel 2.62.3-6.el8_10 ALSA-2024:9573
Security Advisory
(CVE-2024-52530, CVE-2024-52532)
netstandard-targeting-pack-2.1 9.0.100-1.el8_10
squid 4.15-10.module_el8.10.0+3916+ed00a4a0.3 ALSA-2024:9644
Security Advisory
(CVE-2024-23638, CVE-2024-45802)
squid-debuginfo 4.15-10.module_el8.10.0+3916+ed00a4a0.3
squid-debugsource 4.15-10.module_el8.10.0+3916+ed00a4a0.3
tigervnc 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-debuginfo 1.13.1-14.el8_10
tigervnc-debugsource 1.13.1-14.el8_10
tigervnc-icons 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-license 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-selinux 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-server 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-server-debuginfo 1.13.1-14.el8_10
tigervnc-server-minimal 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-server-minimal-debuginfo 1.13.1-14.el8_10
tigervnc-server-module 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-server-module-debuginfo 1.13.1-14.el8_10
webkit2gtk3 2.46.3-1.el8_10 ALSA-2024:9636
Security Advisory
(CVE-2024-23271, CVE-2024-27820, CVE-2024-27838, CVE-2024-27851, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782, CVE-2024-40789, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44244, CVE-2024-44296, CVE-2024-4558)
webkit2gtk3-debuginfo 2.46.3-1.el8_10
webkit2gtk3-debugsource 2.46.3-1.el8_10
webkit2gtk3-devel 2.46.3-1.el8_10 ALSA-2024:9636
Security Advisory
(CVE-2024-23271, CVE-2024-27820, CVE-2024-27838, CVE-2024-27851, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782, CVE-2024-40789, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44244, CVE-2024-44296, CVE-2024-4558)
webkit2gtk3-devel-debuginfo 2.46.3-1.el8_10
webkit2gtk3-jsc 2.46.3-1.el8_10 ALSA-2024:9636
Security Advisory
(CVE-2024-23271, CVE-2024-27820, CVE-2024-27838, CVE-2024-27851, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782, CVE-2024-40789, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44244, CVE-2024-44296, CVE-2024-4558)
webkit2gtk3-jsc-debuginfo 2.46.3-1.el8_10
webkit2gtk3-jsc-devel 2.46.3-1.el8_10 ALSA-2024:9636
Security Advisory
(CVE-2024-23271, CVE-2024-27820, CVE-2024-27838, CVE-2024-27851, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782, CVE-2024-40789, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44244, CVE-2024-44296, CVE-2024-4558)
webkit2gtk3-jsc-devel-debuginfo 2.46.3-1.el8_10

PowerTools x86_64 repository

Package Version Advisory Notes
dotnet-sdk-6.0-source-built-artifacts 6.0.136-1.el8_10
dotnet-sdk-8.0-source-built-artifacts 8.0.111-1.el8_10.1
dotnet-sdk-9.0-source-built-artifacts 9.0.100-1.el8_10
evolution-devel 3.28.5-27.el8_10

devel x86_64 repository

Package Version Advisory Notes
bzip2-static 1.0.6-27.el8_10.alma.1
evolution-devel-docs 3.28.5-27.el8_10
expat-static 2.2.5-16.el8_10

BaseOS aarch64 repository

Package Version Advisory Notes
binutils 2.30-125.el8_10 ALSA-2024:9689
Security Advisory
(CVE-2018-12699)
binutils-debuginfo 2.30-125.el8_10
binutils-debugsource 2.30-125.el8_10
bzip2 1.0.6-27.el8_10.alma.1
bzip2-debuginfo 1.0.6-27.el8_10.alma.1
bzip2-debugsource 1.0.6-27.el8_10.alma.1
bzip2-devel 1.0.6-27.el8_10.alma.1
bzip2-libs 1.0.6-27.el8_10.alma.1
bzip2-libs-debuginfo 1.0.6-27.el8_10.alma.1
expat 2.2.5-16.el8_10 ALSA-2024:9502
Security Advisory
(CVE-2024-50602)
expat-debuginfo 2.2.5-16.el8_10
expat-debugsource 2.2.5-16.el8_10
expat-devel 2.2.5-16.el8_10 ALSA-2024:9502
Security Advisory
(CVE-2024-50602)
libsoup 2.62.3-6.el8_10 ALSA-2024:9573
Security Advisory
(CVE-2024-52530, CVE-2024-52532)
libsoup-debuginfo 2.62.3-6.el8_10
libsoup-debugsource 2.62.3-6.el8_10

AppStream aarch64 repository

Package Version Advisory Notes
aspnetcore-runtime-6.0 6.0.36-1.el8_10
aspnetcore-runtime-8.0 8.0.11-1.el8_10.1
aspnetcore-runtime-9.0 9.0.0-1.el8_10
aspnetcore-runtime-dbg-8.0 8.0.11-1.el8_10.1
aspnetcore-runtime-dbg-9.0 9.0.0-1.el8_10
aspnetcore-targeting-pack-6.0 6.0.36-1.el8_10
aspnetcore-targeting-pack-8.0 8.0.11-1.el8_10.1
aspnetcore-targeting-pack-9.0 9.0.0-1.el8_10
binutils-devel 2.30-125.el8_10 ALSA-2024:9689
Security Advisory
(CVE-2018-12699)
dotnet 9.0.100-1.el8_10
dotnet-apphost-pack-6.0 6.0.36-1.el8_10
dotnet-apphost-pack-6.0-debuginfo 6.0.36-1.el8_10
dotnet-apphost-pack-8.0 8.0.11-1.el8_10.1
dotnet-apphost-pack-8.0-debuginfo 8.0.11-1.el8_10.1
dotnet-apphost-pack-9.0 9.0.0-1.el8_10
dotnet-apphost-pack-9.0-debuginfo 9.0.0-1.el8_10
dotnet-host 9.0.0-1.el8_10
dotnet-host-debuginfo 9.0.0-1.el8_10
dotnet-hostfxr-6.0 6.0.36-1.el8_10
dotnet-hostfxr-6.0-debuginfo 6.0.36-1.el8_10
dotnet-hostfxr-8.0 8.0.11-1.el8_10.1
dotnet-hostfxr-8.0-debuginfo 8.0.11-1.el8_10.1
dotnet-hostfxr-9.0 9.0.0-1.el8_10
dotnet-hostfxr-9.0-debuginfo 9.0.0-1.el8_10
dotnet-runtime-6.0 6.0.36-1.el8_10
dotnet-runtime-6.0-debuginfo 6.0.36-1.el8_10
dotnet-runtime-8.0 8.0.11-1.el8_10.1
dotnet-runtime-8.0-debuginfo 8.0.11-1.el8_10.1
dotnet-runtime-9.0 9.0.0-1.el8_10
dotnet-runtime-9.0-debuginfo 9.0.0-1.el8_10
dotnet-runtime-dbg-8.0 8.0.11-1.el8_10.1
dotnet-runtime-dbg-9.0 9.0.0-1.el8_10
dotnet-sdk-6.0 6.0.136-1.el8_10
dotnet-sdk-6.0-debuginfo 6.0.136-1.el8_10
dotnet-sdk-8.0 8.0.111-1.el8_10.1
dotnet-sdk-8.0-debuginfo 8.0.111-1.el8_10.1
dotnet-sdk-9.0 9.0.100-1.el8_10
dotnet-sdk-9.0-debuginfo 9.0.100-1.el8_10
dotnet-sdk-aot-9.0 9.0.100-1.el8_10
dotnet-sdk-aot-9.0-debuginfo 9.0.100-1.el8_10
dotnet-sdk-dbg-8.0 8.0.111-1.el8_10.1
dotnet-sdk-dbg-9.0 9.0.100-1.el8_10
dotnet-targeting-pack-6.0 6.0.36-1.el8_10
dotnet-targeting-pack-8.0 8.0.11-1.el8_10.1
dotnet-targeting-pack-9.0 9.0.0-1.el8_10
dotnet-templates-6.0 6.0.136-1.el8_10
dotnet-templates-8.0 8.0.111-1.el8_10.1
dotnet-templates-9.0 9.0.100-1.el8_10
dotnet6.0-debuginfo 6.0.136-1.el8_10
dotnet6.0-debugsource 6.0.136-1.el8_10
dotnet8.0-debuginfo 8.0.111-1.el8_10.1
dotnet8.0-debugsource 8.0.111-1.el8_10.1
dotnet9.0-debuginfo 9.0.100-1.el8_10
dotnet9.0-debugsource 9.0.100-1.el8_10
evolution 3.28.5-27.el8_10
evolution-bogofilter 3.28.5-27.el8_10
evolution-bogofilter-debuginfo 3.28.5-27.el8_10
evolution-debuginfo 3.28.5-27.el8_10
evolution-debugsource 3.28.5-27.el8_10
evolution-help 3.28.5-27.el8_10
evolution-langpacks 3.28.5-27.el8_10
evolution-pst 3.28.5-27.el8_10
evolution-pst-debuginfo 3.28.5-27.el8_10
evolution-spamassassin 3.28.5-27.el8_10
evolution-spamassassin-debuginfo 3.28.5-27.el8_10
libsoup-devel 2.62.3-6.el8_10 ALSA-2024:9573
Security Advisory
(CVE-2024-52530, CVE-2024-52532)
netstandard-targeting-pack-2.1 9.0.100-1.el8_10
squid 4.15-10.module_el8.10.0+3916+ed00a4a0.3 ALSA-2024:9644
Security Advisory
(CVE-2024-23638, CVE-2024-45802)
squid-debuginfo 4.15-10.module_el8.10.0+3916+ed00a4a0.3
squid-debugsource 4.15-10.module_el8.10.0+3916+ed00a4a0.3
tigervnc 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-debuginfo 1.13.1-14.el8_10
tigervnc-debugsource 1.13.1-14.el8_10
tigervnc-icons 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-license 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-selinux 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-server 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-server-debuginfo 1.13.1-14.el8_10
tigervnc-server-minimal 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-server-minimal-debuginfo 1.13.1-14.el8_10
tigervnc-server-module 1.13.1-14.el8_10 ALSA-2024:9540
Security Advisory
(CVE-2024-9632)
tigervnc-server-module-debuginfo 1.13.1-14.el8_10
webkit2gtk3 2.46.3-1.el8_10 ALSA-2024:9636
Security Advisory
(CVE-2024-23271, CVE-2024-27820, CVE-2024-27838, CVE-2024-27851, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782, CVE-2024-40789, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44244, CVE-2024-44296, CVE-2024-4558)
webkit2gtk3-debuginfo 2.46.3-1.el8_10
webkit2gtk3-debugsource 2.46.3-1.el8_10
webkit2gtk3-devel 2.46.3-1.el8_10 ALSA-2024:9636
Security Advisory
(CVE-2024-23271, CVE-2024-27820, CVE-2024-27838, CVE-2024-27851, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782, CVE-2024-40789, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44244, CVE-2024-44296, CVE-2024-4558)
webkit2gtk3-devel-debuginfo 2.46.3-1.el8_10
webkit2gtk3-jsc 2.46.3-1.el8_10 ALSA-2024:9636
Security Advisory
(CVE-2024-23271, CVE-2024-27820, CVE-2024-27838, CVE-2024-27851, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782, CVE-2024-40789, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44244, CVE-2024-44296, CVE-2024-4558)
webkit2gtk3-jsc-debuginfo 2.46.3-1.el8_10
webkit2gtk3-jsc-devel 2.46.3-1.el8_10 ALSA-2024:9636
Security Advisory
(CVE-2024-23271, CVE-2024-27820, CVE-2024-27838, CVE-2024-27851, CVE-2024-40779, CVE-2024-40780, CVE-2024-40782, CVE-2024-40789, CVE-2024-40866, CVE-2024-44185, CVE-2024-44187, CVE-2024-44244, CVE-2024-44296, CVE-2024-4558)
webkit2gtk3-jsc-devel-debuginfo 2.46.3-1.el8_10

PowerTools aarch64 repository

Package Version Advisory Notes
dotnet-sdk-6.0-source-built-artifacts 6.0.136-1.el8_10
dotnet-sdk-8.0-source-built-artifacts 8.0.111-1.el8_10.1
dotnet-sdk-9.0-source-built-artifacts 9.0.100-1.el8_10
evolution-devel 3.28.5-27.el8_10

devel aarch64 repository

Package Version Advisory Notes
bzip2-static 1.0.6-27.el8_10.alma.1
evolution-devel-docs 3.28.5-27.el8_10
expat-static 2.2.5-16.el8_10

2024-11-20

openafs x86_64 repository

Package Version Advisory Notes
kmod-openafs 1.8.10-0.4.18.0_553.27.1.el8_10.al8.cern

BaseOS x86_64 repository

Package Version Advisory Notes
almalinux-indexhtml 8-8.el8
bpftool 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
bpftool-debuginfo 4.18.0-553.27.1.el8_10
bzip2 1.0.6-27.el8_10 ALSA-2024:8922
Security Advisory
(CVE-2019-12900)
bzip2-debuginfo 1.0.6-27.el8_10
bzip2-debugsource 1.0.6-27.el8_10
bzip2-devel 1.0.6-27.el8_10 ALSA-2024:8922
Security Advisory
(CVE-2019-12900)
bzip2-libs 1.0.6-27.el8_10 ALSA-2024:8922
Security Advisory
(CVE-2019-12900)
bzip2-libs-debuginfo 1.0.6-27.el8_10
chrony 4.5-2.el8_10
chrony-debuginfo 4.5-2.el8_10
chrony-debugsource 4.5-2.el8_10
cups-client-debuginfo 2.2.6-61.el8_10
cups-debuginfo 2.2.6-61.el8_10
cups-debugsource 2.2.6-61.el8_10
cups-ipptool-debuginfo 2.2.6-61.el8_10
cups-libs 2.2.6-61.el8_10
cups-libs-debuginfo 2.2.6-61.el8_10
cups-lpd-debuginfo 2.2.6-61.el8_10
glib2 2.56.4-165.el8_10
glib2-debuginfo 2.56.4-165.el8_10
glib2-debugsource 2.56.4-165.el8_10
glib2-devel 2.56.4-165.el8_10
glib2-devel-debuginfo 2.56.4-165.el8_10
glib2-fam 2.56.4-165.el8_10
glib2-fam-debuginfo 2.56.4-165.el8_10
glib2-tests 2.56.4-165.el8_10
glib2-tests-debuginfo 2.56.4-165.el8_10
grub2-common 2.02-158.el8_10.alma.1
grub2-debuginfo 2.02-158.el8_10.alma.1
grub2-debugsource 2.02-158.el8_10.alma.1
grub2-efi-aa64-modules 2.02-158.el8_10.alma.1
grub2-efi-ia32 2.02-158.el8_10.alma.1
grub2-efi-ia32-cdboot 2.02-158.el8_10.alma.1
grub2-efi-ia32-modules 2.02-158.el8_10.alma.1
grub2-efi-x64 2.02-158.el8_10.alma.1
grub2-efi-x64-cdboot 2.02-158.el8_10.alma.1
grub2-efi-x64-modules 2.02-158.el8_10.alma.1
grub2-pc 2.02-158.el8_10.alma.1
grub2-pc-modules 2.02-158.el8_10.alma.1
grub2-ppc64le-modules 2.02-158.el8_10.alma.1
grub2-tools 2.02-158.el8_10.alma.1
grub2-tools-debuginfo 2.02-158.el8_10.alma.1
grub2-tools-efi 2.02-158.el8_10.alma.1
grub2-tools-efi-debuginfo 2.02-158.el8_10.alma.1
grub2-tools-extra 2.02-158.el8_10.alma.1
grub2-tools-extra-debuginfo 2.02-158.el8_10.alma.1
grub2-tools-minimal 2.02-158.el8_10.alma.1
grub2-tools-minimal-debuginfo 2.02-158.el8_10.alma.1
iwl100-firmware 39.31.5.1-125.el8_10.1
iwl1000-firmware 39.31.5.1-125.el8_10.1
iwl105-firmware 18.168.6.1-125.el8_10.1
iwl135-firmware 18.168.6.1-125.el8_10.1
iwl2000-firmware 18.168.6.1-125.el8_10.1
iwl2030-firmware 18.168.6.1-125.el8_10.1
iwl3160-firmware 25.30.13.0-125.el8_10.1
iwl3945-firmware 15.32.2.9-125.el8_10.1
iwl4965-firmware 228.61.2.24-125.el8_10.1
iwl5000-firmware 8.83.5.1_1-125.el8_10.1
iwl5150-firmware 8.24.2.2-125.el8_10.1
iwl6000-firmware 9.221.4.1-125.el8_10.1
iwl6000g2a-firmware 18.168.6.1-125.el8_10.1
iwl6000g2b-firmware 18.168.6.1-125.el8_10.1
iwl6050-firmware 41.28.5.1-125.el8_10.1
iwl7260-firmware 25.30.13.0-125.el8_10.1
kernel 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-abi-stablelists 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-core 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-cross-headers 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debug 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debug-core 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debug-debuginfo 4.18.0-553.27.1.el8_10
kernel-debug-devel 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debug-modules 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debug-modules-extra 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debuginfo 4.18.0-553.27.1.el8_10
kernel-debuginfo-common-x86_64 4.18.0-553.27.1.el8_10
kernel-devel 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-doc 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-headers 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-modules 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-modules-extra 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-tools 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-tools-debuginfo 4.18.0-553.27.1.el8_10
kernel-tools-libs 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
krb5-debuginfo 1.18.2-30.el8_10
krb5-debugsource 1.18.2-30.el8_10
krb5-devel 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-devel-debuginfo 1.18.2-30.el8_10
krb5-libs 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-libs-debuginfo 1.18.2-30.el8_10
krb5-pkinit 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-pkinit-debuginfo 1.18.2-30.el8_10
krb5-server 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-server-debuginfo 1.18.2-30.el8_10
krb5-server-ldap 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-server-ldap-debuginfo 1.18.2-30.el8_10
krb5-workstation 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-workstation-debuginfo 1.18.2-30.el8_10
libasan8 13.3.1-2.1.el8_10
libertas-sd8686-firmware 20241014-125.git06bad2f1.el8_10
libertas-sd8787-firmware 20241014-125.git06bad2f1.el8_10
libertas-usb8388-firmware 20241014-125.git06bad2f1.el8_10
libertas-usb8388-olpc-firmware 20241014-125.git06bad2f1.el8_10
libkadm5 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
libkadm5-debuginfo 1.18.2-30.el8_10
libproxy 0.4.15-5.5.el8_10
libproxy-bin-debuginfo 0.4.15-5.5.el8_10
libproxy-debuginfo 0.4.15-5.5.el8_10
libproxy-debugsource 0.4.15-5.5.el8_10
libproxy-gnome-debuginfo 0.4.15-5.5.el8_10
libproxy-networkmanager-debuginfo 0.4.15-5.5.el8_10
libproxy-webkitgtk4-debuginfo 0.4.15-5.5.el8_10
libtsan2 13.3.1-2.1.el8_10
linux-firmware 20241014-125.git06bad2f1.el8_10
microcode_ctl 20240910-1.el8_10
openldap 2.4.46-20.el8_10
openldap-clients 2.4.46-20.el8_10
openldap-clients-debuginfo 2.4.46-20.el8_10
openldap-debuginfo 2.4.46-20.el8_10
openldap-debugsource 2.4.46-20.el8_10
openldap-devel 2.4.46-20.el8_10
openldap-servers-debuginfo 2.4.46-20.el8_10
perf 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
perf-debuginfo 4.18.0-553.27.1.el8_10
python3-libproxy 0.4.15-5.5.el8_10
python3-perf 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
python3-perf-debuginfo 4.18.0-553.27.1.el8_10
tzdata 2024b-4.el8
xmlrpc-c 1.51.0-10.el8_10 ALSA-2024:8859
Security Advisory
(CVE-2024-45491)
xmlrpc-c-apps-debuginfo 1.51.0-10.el8_10
xmlrpc-c-c++-debuginfo 1.51.0-10.el8_10
xmlrpc-c-client++-debuginfo 1.51.0-10.el8_10
xmlrpc-c-client 1.51.0-10.el8_10 ALSA-2024:8859
Security Advisory
(CVE-2024-45491)
xmlrpc-c-client-debuginfo 1.51.0-10.el8_10
xmlrpc-c-debuginfo 1.51.0-10.el8_10
xmlrpc-c-debugsource 1.51.0-10.el8_10

AppStream x86_64 repository

Package Version Advisory Notes
aardvark-dns 1.10.1-2.module_el8.10.0+3909+6e1c1eb7
bcc 0.25.0-9.el8_10
bcc-debuginfo 0.25.0-9.el8_10
bcc-debugsource 0.25.0-9.el8_10
bcc-tools 0.25.0-9.el8_10
bcc-tools-debuginfo 0.25.0-9.el8_10
bpftrace 0.16.0-6.el8_10 ALSA-2024:8830
Security Advisory
(CVE-2024-2313)
bpftrace-debuginfo 0.16.0-6.el8_10
bpftrace-debugsource 0.16.0-6.el8_10
buildah 1.33.10-1.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
buildah-debuginfo 1.33.10-1.module_el8.10.0+3909+6e1c1eb7
buildah-debugsource 1.33.10-1.module_el8.10.0+3909+6e1c1eb7
buildah-tests 1.33.10-1.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
buildah-tests-debuginfo 1.33.10-1.module_el8.10.0+3909+6e1c1eb7
cargo 1.79.0-2.module_el8.10.0+3911+d6cc9007
cargo-debuginfo 1.79.0-2.module_el8.10.0+3911+d6cc9007
clang 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-analyzer 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-debugsource 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-devel 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-devel-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-libs 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-libs-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-resource-filesystem 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-tools-extra 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-tools-extra-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-tools-extra-devel 18.1.8-1.module_el8.10.0+3903+ca21d481
clippy 1.79.0-2.module_el8.10.0+3911+d6cc9007
clippy-debuginfo 1.79.0-2.module_el8.10.0+3911+d6cc9007
cockpit-podman 84.1-1.module_el8.10.0+3909+6e1c1eb7
compiler-rt 18.1.8-1.module_el8.10.0+3903+ca21d481
compiler-rt-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
compiler-rt-debugsource 18.1.8-1.module_el8.10.0+3903+ca21d481
conmon 2.1.10-1.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
conmon-debuginfo 2.1.10-1.module_el8.10.0+3909+6e1c1eb7
conmon-debugsource 2.1.10-1.module_el8.10.0+3909+6e1c1eb7
container-selinux 2.229.0-2.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
containernetworking-plugins 1.4.0-5.module_el8.10.0+3909+6e1c1eb7
containernetworking-plugins-debuginfo 1.4.0-5.module_el8.10.0+3909+6e1c1eb7
containernetworking-plugins-debugsource 1.4.0-5.module_el8.10.0+3909+6e1c1eb7
containers-common 1-82.module_el8.10.0+3909+6e1c1eb7
crit 3.18-5.module_el8.10.0+3909+6e1c1eb7
criu 3.18-5.module_el8.10.0+3909+6e1c1eb7
criu-debuginfo 3.18-5.module_el8.10.0+3909+6e1c1eb7
criu-debugsource 3.18-5.module_el8.10.0+3909+6e1c1eb7
criu-devel 3.18-5.module_el8.10.0+3909+6e1c1eb7
criu-libs 3.18-5.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
criu-libs-debuginfo 3.18-5.module_el8.10.0+3909+6e1c1eb7
crun 1.14.3-2.module_el8.10.0+3909+6e1c1eb7
crun-debuginfo 1.14.3-2.module_el8.10.0+3909+6e1c1eb7
crun-debugsource 1.14.3-2.module_el8.10.0+3909+6e1c1eb7
cups 2.2.6-61.el8_10
cups-client 2.2.6-61.el8_10
cups-devel 2.2.6-61.el8_10
cups-filesystem 2.2.6-61.el8_10
cups-ipptool 2.2.6-61.el8_10
cups-lpd 2.2.6-61.el8_10
fence-agents-aliyun-debuginfo 4.2.1-129.el8_10.5
fence-agents-all 4.2.1-129.el8_10.5
fence-agents-amt-ws 4.2.1-129.el8_10.5
fence-agents-apc 4.2.1-129.el8_10.5
fence-agents-apc-snmp 4.2.1-129.el8_10.5
fence-agents-bladecenter 4.2.1-129.el8_10.5
fence-agents-brocade 4.2.1-129.el8_10.5
fence-agents-cisco-mds 4.2.1-129.el8_10.5
fence-agents-cisco-ucs 4.2.1-129.el8_10.5
fence-agents-common 4.2.1-129.el8_10.5
fence-agents-compute 4.2.1-129.el8_10.5
fence-agents-debuginfo 4.2.1-129.el8_10.5
fence-agents-debugsource 4.2.1-129.el8_10.5
fence-agents-drac5 4.2.1-129.el8_10.5
fence-agents-eaton-snmp 4.2.1-129.el8_10.5
fence-agents-emerson 4.2.1-129.el8_10.5
fence-agents-eps 4.2.1-129.el8_10.5
fence-agents-heuristics-ping 4.2.1-129.el8_10.5
fence-agents-hpblade 4.2.1-129.el8_10.5
fence-agents-ibm-powervs 4.2.1-129.el8_10.5
fence-agents-ibm-vpc 4.2.1-129.el8_10.5
fence-agents-ibmblade 4.2.1-129.el8_10.5
fence-agents-ifmib 4.2.1-129.el8_10.5
fence-agents-ilo-moonshot 4.2.1-129.el8_10.5
fence-agents-ilo-mp 4.2.1-129.el8_10.5
fence-agents-ilo-ssh 4.2.1-129.el8_10.5
fence-agents-ilo2 4.2.1-129.el8_10.5
fence-agents-intelmodular 4.2.1-129.el8_10.5
fence-agents-ipdu 4.2.1-129.el8_10.5
fence-agents-ipmilan 4.2.1-129.el8_10.5
fence-agents-kdump 4.2.1-129.el8_10.5
fence-agents-kdump-debuginfo 4.2.1-129.el8_10.5
fence-agents-kubevirt 4.2.1-129.el8_10.5
fence-agents-kubevirt-debuginfo 4.2.1-129.el8_10.5
fence-agents-lpar 4.2.1-129.el8_10.5
fence-agents-mpath 4.2.1-129.el8_10.5
fence-agents-redfish 4.2.1-129.el8_10.5
fence-agents-rhevm 4.2.1-129.el8_10.5
fence-agents-rsa 4.2.1-129.el8_10.5
fence-agents-rsb 4.2.1-129.el8_10.5
fence-agents-sbd 4.2.1-129.el8_10.5
fence-agents-scsi 4.2.1-129.el8_10.5
fence-agents-virsh 4.2.1-129.el8_10.5
fence-agents-vmware-rest 4.2.1-129.el8_10.5
fence-agents-vmware-soap 4.2.1-129.el8_10.5
fence-agents-wti 4.2.1-129.el8_10.5
fence-agents-zvm 4.2.1-129.el8_10.5
freerdp 2.11.7-1.el8_10
freerdp-debuginfo 2.11.7-1.el8_10
freerdp-debugsource 2.11.7-1.el8_10
freerdp-libs 2.11.7-1.el8_10
freerdp-libs-debuginfo 2.11.7-1.el8_10
fuse-overlayfs 1.13-1.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
fuse-overlayfs-debuginfo 1.13-1.module_el8.10.0+3909+6e1c1eb7
fuse-overlayfs-debugsource 1.13-1.module_el8.10.0+3909+6e1c1eb7
gcc-toolset-13-annobin-annocheck 12.69-1.el8_10
gcc-toolset-13-annobin-annocheck-debuginfo 12.69-1.el8_10
gcc-toolset-13-annobin-debuginfo 12.69-1.el8_10
gcc-toolset-13-annobin-docs 12.69-1.el8_10
gcc-toolset-13-annobin-libannocheck-debuginfo 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-clang-debuginfo 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-gcc 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-gcc-debuginfo 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-llvm-debuginfo 12.69-1.el8_10
gcc-toolset-13-gcc 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-c++ 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-c++-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-gfortran 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-gfortran-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-plugin-annobin 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-plugin-annobin-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-plugin-devel 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-plugin-devel-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-libasan-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libatomic-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libgccjit 13.3.1-2.1.el8_10
gcc-toolset-13-libgccjit-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-libgccjit-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libitm-devel 13.3.1-2.1.el8_10
gcc-toolset-13-liblsan-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libquadmath-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libstdc++-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libstdc++-docs 13.3.1-2.1.el8_10
gcc-toolset-13-libtsan-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libubsan-devel 13.3.1-2.1.el8_10
gcc-toolset-13-offload-nvptx 13.3.1-2.1.el8_10
gcc-toolset-13-offload-nvptx-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-14 14.0-0.el8_10
gcc-toolset-14-annobin-annocheck 12.70-2.el8_10
gcc-toolset-14-annobin-annocheck-debuginfo 12.70-2.el8_10
gcc-toolset-14-annobin-debuginfo 12.70-2.el8_10
gcc-toolset-14-annobin-docs 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-gcc 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-gcc-debuginfo 12.70-2.el8_10
gcc-toolset-14-binutils 2.41-3.el8_10
gcc-toolset-14-binutils-debuginfo 2.41-3.el8_10
gcc-toolset-14-binutils-devel 2.41-3.el8_10
gcc-toolset-14-binutils-gold 2.41-3.el8_10
gcc-toolset-14-binutils-gold-debuginfo 2.41-3.el8_10
gcc-toolset-14-binutils-gprofng 2.41-3.el8_10
gcc-toolset-14-binutils-gprofng-debuginfo 2.41-3.el8_10
gcc-toolset-14-dwz 0.14-0.el8_10
gcc-toolset-14-dwz-debuginfo 0.14-0.el8_10
gcc-toolset-14-gcc 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-c++ 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-c++-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-gfortran 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-gfortran-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-plugin-annobin 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-plugin-annobin-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-plugin-devel 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-plugin-devel-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-gdb 14.2-3.el8_10
gcc-toolset-14-gdb-debuginfo 14.2-3.el8_10
gcc-toolset-14-libasan-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libatomic-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libgccjit 14.2.1-1.1.el8_10
gcc-toolset-14-libgccjit-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-libgccjit-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libitm-devel 14.2.1-1.1.el8_10
gcc-toolset-14-liblsan-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libquadmath-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libstdc++-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libstdc++-docs 14.2.1-1.1.el8_10
gcc-toolset-14-libtsan-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libubsan-devel 14.2.1-1.1.el8_10
gcc-toolset-14-offload-nvptx 14.2.1-1.1.el8_10
gcc-toolset-14-offload-nvptx-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-runtime 14.0-0.el8_10
ghostscript 9.27-15.el8_10
ghostscript-debuginfo 9.27-15.el8_10
ghostscript-debugsource 9.27-15.el8_10
ghostscript-gtk-debuginfo 9.27-15.el8_10
ghostscript-x11 9.27-15.el8_10
ghostscript-x11-debuginfo 9.27-15.el8_10
git-clang-format 18.1.8-1.module_el8.10.0+3903+ca21d481
grafana-pcp 5.1.1-9.el8_10 ALSA-2024:8847
Security Advisory
(CVE-2024-9355)
grafana-pcp-debuginfo 5.1.1-9.el8_10
grafana-pcp-debugsource 5.1.1-9.el8_10
gstreamer1-plugins-base 1.16.1-4.el8_10 ALSA-2024:9056
Security Advisory
(CVE-2024-4453)
gstreamer1-plugins-base-debuginfo 1.16.1-4.el8_10
gstreamer1-plugins-base-debugsource 1.16.1-4.el8_10
gstreamer1-plugins-base-devel 1.16.1-4.el8_10 ALSA-2024:9056
Security Advisory
(CVE-2024-4453)
gstreamer1-plugins-base-tools-debuginfo 1.16.1-4.el8_10
gvfs 1.36.2-17.el8_10
gvfs-afc 1.36.2-17.el8_10
gvfs-afc-debuginfo 1.36.2-17.el8_10
gvfs-afp 1.36.2-17.el8_10
gvfs-afp-debuginfo 1.36.2-17.el8_10
gvfs-archive 1.36.2-17.el8_10
gvfs-archive-debuginfo 1.36.2-17.el8_10
gvfs-client 1.36.2-17.el8_10
gvfs-client-debuginfo 1.36.2-17.el8_10
gvfs-debuginfo 1.36.2-17.el8_10
gvfs-debugsource 1.36.2-17.el8_10
gvfs-devel 1.36.2-17.el8_10
gvfs-fuse 1.36.2-17.el8_10
gvfs-fuse-debuginfo 1.36.2-17.el8_10
gvfs-goa 1.36.2-17.el8_10
gvfs-goa-debuginfo 1.36.2-17.el8_10
gvfs-gphoto2 1.36.2-17.el8_10
gvfs-gphoto2-debuginfo 1.36.2-17.el8_10
gvfs-mtp 1.36.2-17.el8_10
gvfs-mtp-debuginfo 1.36.2-17.el8_10
gvfs-smb 1.36.2-17.el8_10
gvfs-smb-debuginfo 1.36.2-17.el8_10
haproxy 1.8.27-5.el8_10.1 ALSA-2024:8849
Security Advisory
(CVE-2023-45539)
haproxy-debuginfo 1.8.27-5.el8_10.1
haproxy-debugsource 1.8.27-5.el8_10.1
libasan8 13.3.1-2.1.el8_10
libasan8 14.2.1-1.1.el8_10
libasan8-debuginfo 13.3.1-2.1.el8_10
libasan8-debuginfo 14.2.1-1.1.el8_10
libgs 9.27-15.el8_10
libgs-debuginfo 9.27-15.el8_10
libhwasan-debuginfo 13.3.1-2.1.el8_10
libomp 18.1.8-1.module_el8.10.0+3903+ca21d481
libomp-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
libomp-debugsource 18.1.8-1.module_el8.10.0+3903+ca21d481
libomp-devel 18.1.8-1.module_el8.10.0+3903+ca21d481
libproxy-bin 0.4.15-5.5.el8_10
libproxy-gnome 0.4.15-5.5.el8_10
libproxy-networkmanager 0.4.15-5.5.el8_10
libproxy-webkitgtk4 0.4.15-5.5.el8_10
libslirp 4.4.0-2.module_el8.10.0+3909+6e1c1eb7
libslirp-debuginfo 4.4.0-2.module_el8.10.0+3909+6e1c1eb7
libslirp-debugsource 4.4.0-2.module_el8.10.0+3909+6e1c1eb7
libslirp-devel 4.4.0-2.module_el8.10.0+3909+6e1c1eb7
libtiff 4.0.9-33.el8_10 ALSA-2024:8833
Security Advisory
(CVE-2024-7006)
libtiff-debuginfo 4.0.9-33.el8_10
libtiff-debugsource 4.0.9-33.el8_10
libtiff-devel 4.0.9-33.el8_10 ALSA-2024:8833
Security Advisory
(CVE-2024-7006)
libtiff-tools-debuginfo 4.0.9-33.el8_10
libtsan2 13.3.1-2.1.el8_10
libtsan2 14.2.1-1.1.el8_10
libtsan2-debuginfo 13.3.1-2.1.el8_10
libtsan2-debuginfo 14.2.1-1.1.el8_10
libwinpr 2.11.7-1.el8_10
libwinpr-debuginfo 2.11.7-1.el8_10
libwinpr-devel 2.11.7-1.el8_10
lld 18.1.8-1.module_el8.10.0+3903+ca21d481
lld-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
lld-debugsource 18.1.8-1.module_el8.10.0+3903+ca21d481
lld-devel 18.1.8-1.module_el8.10.0+3903+ca21d481
lld-libs 18.1.8-1.module_el8.10.0+3903+ca21d481
lld-libs-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
lldb 18.1.8-1.module_el8.10.0+3903+ca21d481
lldb-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
lldb-debugsource 18.1.8-1.module_el8.10.0+3903+ca21d481
lldb-devel 18.1.8-1.module_el8.10.0+3903+ca21d481
llvm 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-cmake-utils 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-compat 17.0.6-1.module_el8.10.0+3903+ca21d481
llvm-compat 17.0.6-3.module_el8.10.0+3912+9ee11f56
llvm-compat-debugsource 17.0.6-1.module_el8.10.0+3903+ca21d481
llvm-compat-debugsource 17.0.6-3.module_el8.10.0+3912+9ee11f56
llvm-compat-devel 17.0.6-3.module_el8.10.0+3912+9ee11f56
llvm-compat-libs 17.0.6-1.module_el8.10.0+3903+ca21d481
llvm-compat-libs 17.0.6-3.module_el8.10.0+3912+9ee11f56
llvm-compat-libs-debuginfo 17.0.6-1.module_el8.10.0+3903+ca21d481
llvm-compat-libs-debuginfo 17.0.6-3.module_el8.10.0+3912+9ee11f56
llvm-debuginfo 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-debugsource 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-devel 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-devel-debuginfo 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-doc 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-googletest 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-libs 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-libs-debuginfo 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-static 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-test 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-test-debuginfo 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-toolset 18.1.8-3.module_el8.10.0+3903+ca21d481
mod_http2 1.15.7-10.module_el8.10.0+3904+caabc2d4.1
mod_http2-debuginfo 1.15.7-10.module_el8.10.0+3904+caabc2d4.1
mod_http2-debugsource 1.15.7-10.module_el8.10.0+3904+caabc2d4.1
netavark 1.10.3-1.module_el8.10.0+3909+6e1c1eb7
oci-seccomp-bpf-hook 1.2.10-1.module_el8.10.0+3909+6e1c1eb7
oci-seccomp-bpf-hook-debuginfo 1.2.10-1.module_el8.10.0+3909+6e1c1eb7
oci-seccomp-bpf-hook-debugsource 1.2.10-1.module_el8.10.0+3909+6e1c1eb7
podman 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-catatonit 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-catatonit-debuginfo 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-debuginfo 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-debugsource 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-docker 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-gvproxy 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-gvproxy-debuginfo 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-plugins 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-plugins-debuginfo 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-remote 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-remote-debuginfo 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-tests 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
python-gevent-debugsource 1.2.2-5.el8_10
python3-bcc 0.25.0-9.el8_10
python3-clang 18.1.8-1.module_el8.10.0+3903+ca21d481
python3-criu 3.18-5.module_el8.10.0+3909+6e1c1eb7
python3-gevent 1.2.2-5.el8_10 ALSA-2024:8834
Security Advisory
(CVE-2023-41419)
python3-gevent-debuginfo 1.2.2-5.el8_10
python3-lit 18.1.8-1.module_el8.10.0+3903+ca21d481
python3-lldb 18.1.8-1.module_el8.10.0+3903+ca21d481
python3-podman 4.9.0-2.module_el8.10.0+3909+6e1c1eb7
python3.11 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-debuginfo 3.11.10-1.el8_10
python3.11-debugsource 3.11.10-1.el8_10
python3.11-devel 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-libs 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-rpm-macros 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-tkinter 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-urllib3 1.26.12-4.el8_10 ALSA-2024:8843
Security Advisory
(CVE-2024-37891)
python3.12 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-debuginfo 3.12.6-1.el8_10
python3.12-debugsource 3.12.6-1.el8_10
python3.12-devel 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-libs 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-rpm-macros 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-tkinter 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-urllib3 1.26.19-1.el8_10 ALSA-2024:8842
Security Advisory
(CVE-2024-37891)
qemu-guest-agent 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-guest-agent-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-img 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-img-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-curl 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-curl-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-gluster 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-gluster-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-iscsi 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-iscsi-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-rbd 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-rbd-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-ssh 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-ssh-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-common 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-common-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-core 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-core-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-debugsource 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-docs 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-hw-usbredir 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-hw-usbredir-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-ui-opengl 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-ui-opengl-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-ui-spice 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-ui-spice-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
rhel-system-roles 1.23.0-4.el8_10
rsyslog 8.2102.0-15.el8_10.1
rsyslog-crypto 8.2102.0-15.el8_10.1
rsyslog-crypto-debuginfo 8.2102.0-15.el8_10.1
rsyslog-debuginfo 8.2102.0-15.el8_10.1
rsyslog-debugsource 8.2102.0-15.el8_10.1
rsyslog-doc 8.2102.0-15.el8_10.1
rsyslog-elasticsearch 8.2102.0-15.el8_10.1
rsyslog-elasticsearch-debuginfo 8.2102.0-15.el8_10.1
rsyslog-gnutls 8.2102.0-15.el8_10.1
rsyslog-gnutls-debuginfo 8.2102.0-15.el8_10.1
rsyslog-gssapi 8.2102.0-15.el8_10.1
rsyslog-gssapi-debuginfo 8.2102.0-15.el8_10.1
rsyslog-kafka 8.2102.0-15.el8_10.1
rsyslog-kafka-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmaudit 8.2102.0-15.el8_10.1
rsyslog-mmaudit-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmfields 8.2102.0-15.el8_10.1
rsyslog-mmfields-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmjsonparse 8.2102.0-15.el8_10.1
rsyslog-mmjsonparse-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmkubernetes 8.2102.0-15.el8_10.1
rsyslog-mmkubernetes-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmnormalize 8.2102.0-15.el8_10.1
rsyslog-mmnormalize-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmsnmptrapd 8.2102.0-15.el8_10.1
rsyslog-mmsnmptrapd-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mysql 8.2102.0-15.el8_10.1
rsyslog-mysql-debuginfo 8.2102.0-15.el8_10.1
rsyslog-omamqp1 8.2102.0-15.el8_10.1
rsyslog-omamqp1-debuginfo 8.2102.0-15.el8_10.1
rsyslog-openssl 8.2102.0-15.el8_10.1
rsyslog-openssl-debuginfo 8.2102.0-15.el8_10.1
rsyslog-pgsql 8.2102.0-15.el8_10.1
rsyslog-pgsql-debuginfo 8.2102.0-15.el8_10.1
rsyslog-relp 8.2102.0-15.el8_10.1
rsyslog-relp-debuginfo 8.2102.0-15.el8_10.1
rsyslog-snmp 8.2102.0-15.el8_10.1
rsyslog-snmp-debuginfo 8.2102.0-15.el8_10.1
rsyslog-udpspoof 8.2102.0-15.el8_10.1
rsyslog-udpspoof-debuginfo 8.2102.0-15.el8_10.1
runc 1.1.12-1.module_el8.10.0+3910+f277e40e
runc 1.1.12-5.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
runc-debuginfo 1.1.12-1.module_el8.10.0+3910+f277e40e
runc-debuginfo 1.1.12-5.module_el8.10.0+3909+6e1c1eb7
runc-debugsource 1.1.12-1.module_el8.10.0+3910+f277e40e
runc-debugsource 1.1.12-5.module_el8.10.0+3909+6e1c1eb7
rust 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-analyzer 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-analyzer-debuginfo 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-debugger-common 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-debuginfo 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-debugsource 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-doc 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-gdb 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-lldb 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-src 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static-wasm32-unknown-unknown 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static-wasm32-wasi 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static-wasm32-wasip1 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-toolset 1.79.0-2.module_el8.10.0+3911+d6cc9007
rustfmt 1.79.0-2.module_el8.10.0+3911+d6cc9007
rustfmt-debuginfo 1.79.0-2.module_el8.10.0+3911+d6cc9007
skopeo 1.14.5-3.module_el8.10.0+3909+6e1c1eb7
skopeo-tests 1.14.5-3.module_el8.10.0+3909+6e1c1eb7
slirp4netns 1.2.3-1.module_el8.10.0+3909+6e1c1eb7
slirp4netns-debuginfo 1.2.3-1.module_el8.10.0+3909+6e1c1eb7
slirp4netns-debugsource 1.2.3-1.module_el8.10.0+3909+6e1c1eb7
spirv-tools 2024.2-1.el8_10
spirv-tools-debuginfo 2024.2-1.el8_10
spirv-tools-debugsource 2024.2-1.el8_10
spirv-tools-libs 2024.2-1.el8_10
spirv-tools-libs-debuginfo 2024.2-1.el8_10
squid 4.15-10.module_el8.10.0+3905+82668a7e.1
squid-debuginfo 4.15-10.module_el8.10.0+3905+82668a7e.1
squid-debugsource 4.15-10.module_el8.10.0+3905+82668a7e.1
toolbox 0.0.99.5-2.module_el8.10.0+3909+6e1c1eb7
toolbox-debuginfo 0.0.99.5-2.module_el8.10.0+3909+6e1c1eb7
toolbox-debugsource 0.0.99.5-2.module_el8.10.0+3909+6e1c1eb7
toolbox-tests 0.0.99.5-2.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
tzdata-java 2024b-4.el8
udica 0.2.6-21.module_el8.10.0+3909+6e1c1eb7
vulkan-headers 1.3.283.0-1.el8_10
vulkan-loader 1.3.283.0-1.el8_10
vulkan-loader-debuginfo 1.3.283.0-1.el8_10
vulkan-loader-debugsource 1.3.283.0-1.el8_10
vulkan-loader-devel 1.3.283.0-1.el8_10
vulkan-tools 1.3.283.0-2.el8_10
vulkan-tools-debuginfo 1.3.283.0-2.el8_10
vulkan-tools-debugsource 1.3.283.0-2.el8_10
vulkan-validation-layers 1.3.283.0-3.el8_10
vulkan-validation-layers-debuginfo 1.3.283.0-3.el8_10
vulkan-validation-layers-debugsource 1.3.283.0-3.el8_10
xorg-x11-server-common 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-debuginfo 1.20.11-25.el8_10
xorg-x11-server-debugsource 1.20.11-25.el8_10
xorg-x11-server-Xdmx 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xdmx-debuginfo 1.20.11-25.el8_10
xorg-x11-server-Xephyr 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xephyr-debuginfo 1.20.11-25.el8_10
xorg-x11-server-Xnest 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xnest-debuginfo 1.20.11-25.el8_10
xorg-x11-server-Xorg 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xorg-debuginfo 1.20.11-25.el8_10
xorg-x11-server-Xvfb 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xvfb-debuginfo 1.20.11-25.el8_10
xorg-x11-server-Xwayland 21.1.3-17.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xwayland-debuginfo 21.1.3-17.el8_10
xorg-x11-server-Xwayland-debugsource 21.1.3-17.el8_10

HighAvailability x86_64 repository

Package Version Advisory Notes
fence-agents-aliyun 4.2.1-129.el8_10.5
fence-agents-aws 4.2.1-129.el8_10.5
fence-agents-azure-arm 4.2.1-129.el8_10.5
fence-agents-gce 4.2.1-129.el8_10.5
fence-agents-openstack 4.2.1-129.el8_10.5
resource-agents 4.9.0-54.el8_10.5
resource-agents-aliyun 4.9.0-54.el8_10.5
resource-agents-aliyun-debuginfo 4.9.0-54.el8_10.5
resource-agents-debuginfo 4.9.0-54.el8_10.5
resource-agents-debugsource 4.9.0-54.el8_10.5
resource-agents-gcp 4.9.0-54.el8_10.5
resource-agents-paf 4.9.0-54.el8_10.5

RT x86_64 repository

Package Version Advisory Notes
kernel-rt 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-core 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debug 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debug-core 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debug-debuginfo 4.18.0-553.27.1.rt7.368.el8_10
kernel-rt-debug-devel 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debug-modules 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debug-modules-extra 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debuginfo 4.18.0-553.27.1.rt7.368.el8_10
kernel-rt-debuginfo-common-x86_64 4.18.0-553.27.1.rt7.368.el8_10
kernel-rt-devel 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-modules 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-modules-extra 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)

ResilientStorage x86_64 repository

Package Version Advisory Notes
fence-agents-aliyun 4.2.1-129.el8_10.5
fence-agents-aws 4.2.1-129.el8_10.5
fence-agents-azure-arm 4.2.1-129.el8_10.5
fence-agents-gce 4.2.1-129.el8_10.5
fence-agents-openstack 4.2.1-129.el8_10.5
resource-agents 4.9.0-54.el8_10.5
resource-agents-aliyun 4.9.0-54.el8_10.5
resource-agents-aliyun-debuginfo 4.9.0-54.el8_10.5
resource-agents-debuginfo 4.9.0-54.el8_10.5
resource-agents-debugsource 4.9.0-54.el8_10.5
resource-agents-gcp 4.9.0-54.el8_10.5
resource-agents-paf 4.9.0-54.el8_10.5

PowerTools x86_64 repository

Package Version Advisory Notes
bcc-devel 0.25.0-9.el8_10 ALSA-2024:8831
Security Advisory
(CVE-2024-2314)
bcc-doc 0.25.0-9.el8_10 ALSA-2024:8831
Security Advisory
(CVE-2024-2314)
freerdp-devel 2.11.7-1.el8_10
ghostscript-doc 9.27-15.el8_10
ghostscript-tools-dvipdf 9.27-15.el8_10
ghostscript-tools-fonts 9.27-15.el8_10
ghostscript-tools-printing 9.27-15.el8_10
glib2-doc 2.56.4-165.el8_10
glib2-static 2.56.4-165.el8_10
kernel-tools-libs-devel 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
libgs-devel 9.27-15.el8_10
libproxy-devel 0.4.15-5.5.el8_10
libtiff-tools 4.0.9-33.el8_10 ALSA-2024:8833
Security Advisory
(CVE-2024-7006)
openldap-servers 2.4.46-20.el8_10
python3.11-debug 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-idle 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-test 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.12-debug 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-idle 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-test 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
qemu-kvm-tests 6.2.0-53.module_el8.10.0+3906+b8f20084.2
source-highlight-devel 3.1.8-18.el8_10
spirv-tools-devel 2024.2-1.el8_10
xmlrpc-c-c++ 1.51.0-10.el8_10 ALSA-2024:8859
Security Advisory
(CVE-2024-45491)
xmlrpc-c-client++ 1.51.0-10.el8_10 ALSA-2024:8859
Security Advisory
(CVE-2024-45491)
xmlrpc-c-devel 1.51.0-10.el8_10 ALSA-2024:8859
Security Advisory
(CVE-2024-45491)
xorg-x11-server-devel 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-source 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)

NFV x86_64 repository

Package Version Advisory Notes
kernel-rt 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-core 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debug 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debug-core 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debug-debuginfo 4.18.0-553.27.1.rt7.368.el8_10
kernel-rt-debug-devel 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debug-kvm 4.18.0-553.27.1.rt7.368.el8_10
kernel-rt-debug-modules 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debug-modules-extra 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-debuginfo 4.18.0-553.27.1.rt7.368.el8_10
kernel-rt-debuginfo-common-x86_64 4.18.0-553.27.1.rt7.368.el8_10
kernel-rt-devel 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-kvm 4.18.0-553.27.1.rt7.368.el8_10
kernel-rt-modules 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-rt-modules-extra 4.18.0-553.27.1.rt7.368.el8_10 ALSA-2024:8870
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)

devel x86_64 repository

Package Version Advisory Notes
bzip2-static 1.0.6-27.el8_10
fence-agents-aws 4.2.1-129.el8_10.5
fence-agents-lpar 4.2.1-129.el8_10.5
fence-agents-zvm 4.2.1-129.el8_10.5
gcc-toolset-13-annobin-libannocheck 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-clang 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-llvm 12.69-1.el8_10
gcc-toolset-13-libhwasan-devel 13.3.1-2.1.el8_10
gcc-toolset-14-annobin-libannocheck 12.70-2.el8_10
gcc-toolset-14-annobin-libannocheck-debuginfo 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-clang 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-clang-debuginfo 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-llvm 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-llvm-debuginfo 12.70-2.el8_10
gcc-toolset-14-gdb-doc 14.2-3.el8_10
gcc-toolset-14-gdb-gdbserver 14.2-3.el8_10
gcc-toolset-14-libhwasan-devel 14.2.1-1.1.el8_10
ghostscript-gtk 9.27-15.el8_10
gstreamer1-plugins-base-devel-docs 1.16.1-4.el8_10
gstreamer1-plugins-base-tools 1.16.1-4.el8_10
gvfs-tests 1.36.2-17.el8_10
kernel-debug-modules-internal 4.18.0-553.27.1.el8_10
kernel-ipaclones-internal 4.18.0-553.27.1.el8_10
kernel-modules-internal 4.18.0-553.27.1.el8_10
kernel-rt-debug-modules-internal 4.18.0-553.27.1.rt7.368.el8_10
kernel-rt-modules-internal 4.18.0-553.27.1.rt7.368.el8_10
kernel-rt-selftests-internal 4.18.0-553.27.1.rt7.368.el8_10
kernel-selftests-internal 4.18.0-553.27.1.el8_10
libhwasan 13.3.1-2.1.el8_10
libhwasan 14.2.1-1.1.el8_10
libhwasan-debuginfo 14.2.1-1.1.el8_10
libtiff-static 4.0.9-33.el8_10
llvm-compat-devel-debuginfo 17.0.6-3.module_el8.10.0+3912+9ee11f56
rust-std-static-wasm32-unknown-unknown 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static-wasm32-wasi 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static-wasm32-wasip1 1.79.0-2.module_el8.10.0+3911+d6cc9007
spirv-headers-devel 1.5.5-6.el8_10
xmlrpc-c-apps 1.51.0-10.el8_10
xorg-x11-server-Xwayland-devel 21.1.3-17.el8_10

openafs aarch64 repository

Package Version Advisory Notes
kmod-openafs 1.8.10-0.4.18.0_553.27.1.el8_10.al8.cern

BaseOS aarch64 repository

Package Version Advisory Notes
almalinux-indexhtml 8-8.el8
bpftool 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
bpftool-debuginfo 4.18.0-553.27.1.el8_10
bzip2 1.0.6-27.el8_10 ALSA-2024:8922
Security Advisory
(CVE-2019-12900)
bzip2-debuginfo 1.0.6-27.el8_10
bzip2-debugsource 1.0.6-27.el8_10
bzip2-devel 1.0.6-27.el8_10 ALSA-2024:8922
Security Advisory
(CVE-2019-12900)
bzip2-libs 1.0.6-27.el8_10 ALSA-2024:8922
Security Advisory
(CVE-2019-12900)
bzip2-libs-debuginfo 1.0.6-27.el8_10
chrony 4.5-2.el8_10
chrony-debuginfo 4.5-2.el8_10
chrony-debugsource 4.5-2.el8_10
cups-client-debuginfo 2.2.6-61.el8_10
cups-debuginfo 2.2.6-61.el8_10
cups-debugsource 2.2.6-61.el8_10
cups-ipptool-debuginfo 2.2.6-61.el8_10
cups-libs 2.2.6-61.el8_10
cups-libs-debuginfo 2.2.6-61.el8_10
cups-lpd-debuginfo 2.2.6-61.el8_10
glib2 2.56.4-165.el8_10
glib2-debuginfo 2.56.4-165.el8_10
glib2-debugsource 2.56.4-165.el8_10
glib2-devel 2.56.4-165.el8_10
glib2-devel-debuginfo 2.56.4-165.el8_10
glib2-fam 2.56.4-165.el8_10
glib2-fam-debuginfo 2.56.4-165.el8_10
glib2-tests 2.56.4-165.el8_10
glib2-tests-debuginfo 2.56.4-165.el8_10
grub2-common 2.02-158.el8_10.alma.1
grub2-debuginfo 2.02-158.el8_10.alma.1
grub2-debugsource 2.02-158.el8_10.alma.1
grub2-efi-aa64 2.02-158.el8_10.alma.1
grub2-efi-aa64-cdboot 2.02-158.el8_10.alma.1
grub2-efi-aa64-modules 2.02-158.el8_10.alma.1
grub2-efi-ia32-modules 2.02-158.el8_10.alma.1
grub2-efi-x64-modules 2.02-158.el8_10.alma.1
grub2-pc-modules 2.02-158.el8_10.alma.1
grub2-ppc64le-modules 2.02-158.el8_10.alma.1
grub2-tools 2.02-158.el8_10.alma.1
grub2-tools-debuginfo 2.02-158.el8_10.alma.1
grub2-tools-extra 2.02-158.el8_10.alma.1
grub2-tools-extra-debuginfo 2.02-158.el8_10.alma.1
grub2-tools-minimal 2.02-158.el8_10.alma.1
grub2-tools-minimal-debuginfo 2.02-158.el8_10.alma.1
iwl100-firmware 39.31.5.1-125.el8_10.1
iwl1000-firmware 39.31.5.1-125.el8_10.1
iwl105-firmware 18.168.6.1-125.el8_10.1
iwl135-firmware 18.168.6.1-125.el8_10.1
iwl2000-firmware 18.168.6.1-125.el8_10.1
iwl2030-firmware 18.168.6.1-125.el8_10.1
iwl3160-firmware 25.30.13.0-125.el8_10.1
iwl3945-firmware 15.32.2.9-125.el8_10.1
iwl4965-firmware 228.61.2.24-125.el8_10.1
iwl5000-firmware 8.83.5.1_1-125.el8_10.1
iwl5150-firmware 8.24.2.2-125.el8_10.1
iwl6000-firmware 9.221.4.1-125.el8_10.1
iwl6000g2a-firmware 18.168.6.1-125.el8_10.1
iwl6000g2b-firmware 18.168.6.1-125.el8_10.1
iwl6050-firmware 41.28.5.1-125.el8_10.1
iwl7260-firmware 25.30.13.0-125.el8_10.1
kernel 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-abi-stablelists 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-core 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-cross-headers 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debug 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debug-core 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debug-debuginfo 4.18.0-553.27.1.el8_10
kernel-debug-devel 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debug-modules 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debug-modules-extra 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-debuginfo 4.18.0-553.27.1.el8_10
kernel-debuginfo-common-aarch64 4.18.0-553.27.1.el8_10
kernel-devel 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-doc 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-headers 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-modules 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-modules-extra 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-tools 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
kernel-tools-debuginfo 4.18.0-553.27.1.el8_10
kernel-tools-libs 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
krb5-debuginfo 1.18.2-30.el8_10
krb5-debugsource 1.18.2-30.el8_10
krb5-devel 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-devel-debuginfo 1.18.2-30.el8_10
krb5-libs 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-libs-debuginfo 1.18.2-30.el8_10
krb5-pkinit 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-pkinit-debuginfo 1.18.2-30.el8_10
krb5-server 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-server-debuginfo 1.18.2-30.el8_10
krb5-server-ldap 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-server-ldap-debuginfo 1.18.2-30.el8_10
krb5-workstation 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
krb5-workstation-debuginfo 1.18.2-30.el8_10
libertas-sd8686-firmware 20241014-125.git06bad2f1.el8_10
libertas-sd8787-firmware 20241014-125.git06bad2f1.el8_10
libertas-usb8388-firmware 20241014-125.git06bad2f1.el8_10
libertas-usb8388-olpc-firmware 20241014-125.git06bad2f1.el8_10
libkadm5 1.18.2-30.el8_10 ALSA-2024:8860
Security Advisory
(CVE-2024-3596)
libkadm5-debuginfo 1.18.2-30.el8_10
libproxy 0.4.15-5.5.el8_10
libproxy-bin-debuginfo 0.4.15-5.5.el8_10
libproxy-debuginfo 0.4.15-5.5.el8_10
libproxy-debugsource 0.4.15-5.5.el8_10
libproxy-gnome-debuginfo 0.4.15-5.5.el8_10
libproxy-networkmanager-debuginfo 0.4.15-5.5.el8_10
libproxy-webkitgtk4-debuginfo 0.4.15-5.5.el8_10
linux-firmware 20241014-125.git06bad2f1.el8_10
openldap 2.4.46-20.el8_10
openldap-clients 2.4.46-20.el8_10
openldap-clients-debuginfo 2.4.46-20.el8_10
openldap-debuginfo 2.4.46-20.el8_10
openldap-debugsource 2.4.46-20.el8_10
openldap-devel 2.4.46-20.el8_10
openldap-servers-debuginfo 2.4.46-20.el8_10
perf 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
perf-debuginfo 4.18.0-553.27.1.el8_10
python3-libproxy 0.4.15-5.5.el8_10
python3-perf 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
python3-perf-debuginfo 4.18.0-553.27.1.el8_10
tzdata 2024b-4.el8
xmlrpc-c 1.51.0-10.el8_10 ALSA-2024:8859
Security Advisory
(CVE-2024-45491)
xmlrpc-c-apps-debuginfo 1.51.0-10.el8_10
xmlrpc-c-c++-debuginfo 1.51.0-10.el8_10
xmlrpc-c-client++-debuginfo 1.51.0-10.el8_10
xmlrpc-c-client 1.51.0-10.el8_10 ALSA-2024:8859
Security Advisory
(CVE-2024-45491)
xmlrpc-c-client-debuginfo 1.51.0-10.el8_10
xmlrpc-c-debuginfo 1.51.0-10.el8_10
xmlrpc-c-debugsource 1.51.0-10.el8_10

AppStream aarch64 repository

Package Version Advisory Notes
aardvark-dns 1.10.1-2.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
bcc 0.25.0-9.el8_10
bcc-debuginfo 0.25.0-9.el8_10
bcc-debugsource 0.25.0-9.el8_10
bcc-tools 0.25.0-9.el8_10
bcc-tools-debuginfo 0.25.0-9.el8_10
bpftrace 0.16.0-6.el8_10 ALSA-2024:8830
Security Advisory
(CVE-2024-2313)
bpftrace-debuginfo 0.16.0-6.el8_10
bpftrace-debugsource 0.16.0-6.el8_10
buildah 1.33.10-1.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
buildah-debuginfo 1.33.10-1.module_el8.10.0+3909+6e1c1eb7
buildah-debugsource 1.33.10-1.module_el8.10.0+3909+6e1c1eb7
buildah-tests 1.33.10-1.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
buildah-tests-debuginfo 1.33.10-1.module_el8.10.0+3909+6e1c1eb7
cargo 1.79.0-2.module_el8.10.0+3911+d6cc9007
cargo-debuginfo 1.79.0-2.module_el8.10.0+3911+d6cc9007
clang 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-analyzer 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-debugsource 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-devel 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-devel-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-libs 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-libs-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-resource-filesystem 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-tools-extra 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-tools-extra-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
clang-tools-extra-devel 18.1.8-1.module_el8.10.0+3903+ca21d481
clippy 1.79.0-2.module_el8.10.0+3911+d6cc9007
clippy-debuginfo 1.79.0-2.module_el8.10.0+3911+d6cc9007
cockpit-podman 84.1-1.module_el8.10.0+3909+6e1c1eb7
compiler-rt 18.1.8-1.module_el8.10.0+3903+ca21d481
compiler-rt-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
compiler-rt-debugsource 18.1.8-1.module_el8.10.0+3903+ca21d481
conmon 2.1.10-1.module_el8.10.0+3909+6e1c1eb7
conmon-debuginfo 2.1.10-1.module_el8.10.0+3909+6e1c1eb7
conmon-debugsource 2.1.10-1.module_el8.10.0+3909+6e1c1eb7
container-selinux 2.229.0-2.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
containernetworking-plugins 1.4.0-5.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
containernetworking-plugins-debuginfo 1.4.0-5.module_el8.10.0+3909+6e1c1eb7
containernetworking-plugins-debugsource 1.4.0-5.module_el8.10.0+3909+6e1c1eb7
containers-common 1-82.module_el8.10.0+3909+6e1c1eb7
crit 3.18-5.module_el8.10.0+3909+6e1c1eb7
criu 3.18-5.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
criu-debuginfo 3.18-5.module_el8.10.0+3909+6e1c1eb7
criu-debugsource 3.18-5.module_el8.10.0+3909+6e1c1eb7
criu-devel 3.18-5.module_el8.10.0+3909+6e1c1eb7
criu-libs 3.18-5.module_el8.10.0+3909+6e1c1eb7
criu-libs-debuginfo 3.18-5.module_el8.10.0+3909+6e1c1eb7
crun 1.14.3-2.module_el8.10.0+3909+6e1c1eb7
crun-debuginfo 1.14.3-2.module_el8.10.0+3909+6e1c1eb7
crun-debugsource 1.14.3-2.module_el8.10.0+3909+6e1c1eb7
cups 2.2.6-61.el8_10
cups-client 2.2.6-61.el8_10
cups-devel 2.2.6-61.el8_10
cups-filesystem 2.2.6-61.el8_10
cups-ipptool 2.2.6-61.el8_10
cups-lpd 2.2.6-61.el8_10
fence-agents-all 4.2.1-129.el8_10.5
fence-agents-amt-ws 4.2.1-129.el8_10.5
fence-agents-apc 4.2.1-129.el8_10.5
fence-agents-apc-snmp 4.2.1-129.el8_10.5
fence-agents-bladecenter 4.2.1-129.el8_10.5
fence-agents-brocade 4.2.1-129.el8_10.5
fence-agents-cisco-mds 4.2.1-129.el8_10.5
fence-agents-cisco-ucs 4.2.1-129.el8_10.5
fence-agents-common 4.2.1-129.el8_10.5
fence-agents-compute 4.2.1-129.el8_10.5
fence-agents-debuginfo 4.2.1-129.el8_10.5
fence-agents-debugsource 4.2.1-129.el8_10.5
fence-agents-drac5 4.2.1-129.el8_10.5
fence-agents-eaton-snmp 4.2.1-129.el8_10.5
fence-agents-emerson 4.2.1-129.el8_10.5
fence-agents-eps 4.2.1-129.el8_10.5
fence-agents-heuristics-ping 4.2.1-129.el8_10.5
fence-agents-hpblade 4.2.1-129.el8_10.5
fence-agents-ibm-powervs 4.2.1-129.el8_10.5
fence-agents-ibm-vpc 4.2.1-129.el8_10.5
fence-agents-ibmblade 4.2.1-129.el8_10.5
fence-agents-ifmib 4.2.1-129.el8_10.5
fence-agents-ilo-moonshot 4.2.1-129.el8_10.5
fence-agents-ilo-mp 4.2.1-129.el8_10.5
fence-agents-ilo-ssh 4.2.1-129.el8_10.5
fence-agents-ilo2 4.2.1-129.el8_10.5
fence-agents-intelmodular 4.2.1-129.el8_10.5
fence-agents-ipdu 4.2.1-129.el8_10.5
fence-agents-ipmilan 4.2.1-129.el8_10.5
fence-agents-kdump 4.2.1-129.el8_10.5
fence-agents-kdump-debuginfo 4.2.1-129.el8_10.5
fence-agents-kubevirt 4.2.1-129.el8_10.5
fence-agents-kubevirt-debuginfo 4.2.1-129.el8_10.5
fence-agents-lpar 4.2.1-129.el8_10.5
fence-agents-mpath 4.2.1-129.el8_10.5
fence-agents-redfish 4.2.1-129.el8_10.5
fence-agents-rhevm 4.2.1-129.el8_10.5
fence-agents-rsa 4.2.1-129.el8_10.5
fence-agents-rsb 4.2.1-129.el8_10.5
fence-agents-sbd 4.2.1-129.el8_10.5
fence-agents-scsi 4.2.1-129.el8_10.5
fence-agents-virsh 4.2.1-129.el8_10.5
fence-agents-vmware-rest 4.2.1-129.el8_10.5
fence-agents-vmware-soap 4.2.1-129.el8_10.5
fence-agents-wti 4.2.1-129.el8_10.5
fence-agents-zvm 4.2.1-129.el8_10.5
freerdp 2.11.7-1.el8_10
freerdp-debuginfo 2.11.7-1.el8_10
freerdp-debugsource 2.11.7-1.el8_10
freerdp-libs 2.11.7-1.el8_10
freerdp-libs-debuginfo 2.11.7-1.el8_10
fuse-overlayfs 1.13-1.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
fuse-overlayfs-debuginfo 1.13-1.module_el8.10.0+3909+6e1c1eb7
fuse-overlayfs-debugsource 1.13-1.module_el8.10.0+3909+6e1c1eb7
gcc-toolset-13-annobin-annocheck 12.69-1.el8_10
gcc-toolset-13-annobin-annocheck-debuginfo 12.69-1.el8_10
gcc-toolset-13-annobin-debuginfo 12.69-1.el8_10
gcc-toolset-13-annobin-docs 12.69-1.el8_10
gcc-toolset-13-annobin-libannocheck-debuginfo 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-clang-debuginfo 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-gcc 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-gcc-debuginfo 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-llvm-debuginfo 12.69-1.el8_10
gcc-toolset-13-gcc 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-c++ 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-c++-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-gfortran 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-gfortran-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-plugin-annobin 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-plugin-annobin-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-plugin-devel 13.3.1-2.1.el8_10
gcc-toolset-13-gcc-plugin-devel-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-libasan-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libatomic-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libgccjit 13.3.1-2.1.el8_10
gcc-toolset-13-libgccjit-debuginfo 13.3.1-2.1.el8_10
gcc-toolset-13-libgccjit-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libitm-devel 13.3.1-2.1.el8_10
gcc-toolset-13-liblsan-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libstdc++-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libstdc++-docs 13.3.1-2.1.el8_10
gcc-toolset-13-libtsan-devel 13.3.1-2.1.el8_10
gcc-toolset-13-libubsan-devel 13.3.1-2.1.el8_10
gcc-toolset-14 14.0-0.el8_10
gcc-toolset-14-annobin-annocheck 12.70-2.el8_10
gcc-toolset-14-annobin-annocheck-debuginfo 12.70-2.el8_10
gcc-toolset-14-annobin-debuginfo 12.70-2.el8_10
gcc-toolset-14-annobin-docs 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-gcc 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-gcc-debuginfo 12.70-2.el8_10
gcc-toolset-14-binutils 2.41-3.el8_10
gcc-toolset-14-binutils-debuginfo 2.41-3.el8_10
gcc-toolset-14-binutils-devel 2.41-3.el8_10
gcc-toolset-14-binutils-gold 2.41-3.el8_10
gcc-toolset-14-binutils-gold-debuginfo 2.41-3.el8_10
gcc-toolset-14-binutils-gprofng 2.41-3.el8_10
gcc-toolset-14-binutils-gprofng-debuginfo 2.41-3.el8_10
gcc-toolset-14-dwz 0.14-0.el8_10
gcc-toolset-14-dwz-debuginfo 0.14-0.el8_10
gcc-toolset-14-gcc 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-c++ 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-c++-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-gfortran 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-gfortran-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-plugin-annobin 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-plugin-annobin-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-plugin-devel 14.2.1-1.1.el8_10
gcc-toolset-14-gcc-plugin-devel-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-gdb 14.2-3.el8_10
gcc-toolset-14-gdb-debuginfo 14.2-3.el8_10
gcc-toolset-14-libasan-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libatomic-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libgccjit 14.2.1-1.1.el8_10
gcc-toolset-14-libgccjit-debuginfo 14.2.1-1.1.el8_10
gcc-toolset-14-libgccjit-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libitm-devel 14.2.1-1.1.el8_10
gcc-toolset-14-liblsan-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libstdc++-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libstdc++-docs 14.2.1-1.1.el8_10
gcc-toolset-14-libtsan-devel 14.2.1-1.1.el8_10
gcc-toolset-14-libubsan-devel 14.2.1-1.1.el8_10
gcc-toolset-14-runtime 14.0-0.el8_10
ghostscript 9.27-15.el8_10
ghostscript-debuginfo 9.27-15.el8_10
ghostscript-debugsource 9.27-15.el8_10
ghostscript-gtk-debuginfo 9.27-15.el8_10
ghostscript-x11 9.27-15.el8_10
ghostscript-x11-debuginfo 9.27-15.el8_10
git-clang-format 18.1.8-1.module_el8.10.0+3903+ca21d481
grafana-pcp 5.1.1-9.el8_10 ALSA-2024:8847
Security Advisory
(CVE-2024-9355)
grafana-pcp-debuginfo 5.1.1-9.el8_10
grafana-pcp-debugsource 5.1.1-9.el8_10
gstreamer1-plugins-base 1.16.1-4.el8_10 ALSA-2024:9056
Security Advisory
(CVE-2024-4453)
gstreamer1-plugins-base-debuginfo 1.16.1-4.el8_10
gstreamer1-plugins-base-debugsource 1.16.1-4.el8_10
gstreamer1-plugins-base-devel 1.16.1-4.el8_10 ALSA-2024:9056
Security Advisory
(CVE-2024-4453)
gstreamer1-plugins-base-tools-debuginfo 1.16.1-4.el8_10
gvfs 1.36.2-17.el8_10
gvfs-afc 1.36.2-17.el8_10
gvfs-afc-debuginfo 1.36.2-17.el8_10
gvfs-afp 1.36.2-17.el8_10
gvfs-afp-debuginfo 1.36.2-17.el8_10
gvfs-archive 1.36.2-17.el8_10
gvfs-archive-debuginfo 1.36.2-17.el8_10
gvfs-client 1.36.2-17.el8_10
gvfs-client-debuginfo 1.36.2-17.el8_10
gvfs-debuginfo 1.36.2-17.el8_10
gvfs-debugsource 1.36.2-17.el8_10
gvfs-devel 1.36.2-17.el8_10
gvfs-fuse 1.36.2-17.el8_10
gvfs-fuse-debuginfo 1.36.2-17.el8_10
gvfs-goa 1.36.2-17.el8_10
gvfs-goa-debuginfo 1.36.2-17.el8_10
gvfs-gphoto2 1.36.2-17.el8_10
gvfs-gphoto2-debuginfo 1.36.2-17.el8_10
gvfs-mtp 1.36.2-17.el8_10
gvfs-mtp-debuginfo 1.36.2-17.el8_10
gvfs-smb 1.36.2-17.el8_10
gvfs-smb-debuginfo 1.36.2-17.el8_10
haproxy 1.8.27-5.el8_10.1 ALSA-2024:8849
Security Advisory
(CVE-2023-45539)
haproxy-debuginfo 1.8.27-5.el8_10.1
haproxy-debugsource 1.8.27-5.el8_10.1
libasan8 13.3.1-2.1.el8_10
libasan8 14.2.1-1.1.el8_10
libasan8-debuginfo 13.3.1-2.1.el8_10
libasan8-debuginfo 14.2.1-1.1.el8_10
libgs 9.27-15.el8_10
libgs-debuginfo 9.27-15.el8_10
libhwasan-debuginfo 13.3.1-2.1.el8_10
libomp 18.1.8-1.module_el8.10.0+3903+ca21d481
libomp-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
libomp-debugsource 18.1.8-1.module_el8.10.0+3903+ca21d481
libomp-devel 18.1.8-1.module_el8.10.0+3903+ca21d481
libproxy-bin 0.4.15-5.5.el8_10
libproxy-gnome 0.4.15-5.5.el8_10
libproxy-networkmanager 0.4.15-5.5.el8_10
libproxy-webkitgtk4 0.4.15-5.5.el8_10
libslirp 4.4.0-2.module_el8.10.0+3909+6e1c1eb7
libslirp-debuginfo 4.4.0-2.module_el8.10.0+3909+6e1c1eb7
libslirp-debugsource 4.4.0-2.module_el8.10.0+3909+6e1c1eb7
libslirp-devel 4.4.0-2.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
libtiff 4.0.9-33.el8_10 ALSA-2024:8833
Security Advisory
(CVE-2024-7006)
libtiff-debuginfo 4.0.9-33.el8_10
libtiff-debugsource 4.0.9-33.el8_10
libtiff-devel 4.0.9-33.el8_10 ALSA-2024:8833
Security Advisory
(CVE-2024-7006)
libtiff-tools-debuginfo 4.0.9-33.el8_10
libtsan2 13.3.1-2.1.el8_10
libtsan2 14.2.1-1.1.el8_10
libtsan2-debuginfo 13.3.1-2.1.el8_10
libtsan2-debuginfo 14.2.1-1.1.el8_10
libwinpr 2.11.7-1.el8_10
libwinpr-debuginfo 2.11.7-1.el8_10
libwinpr-devel 2.11.7-1.el8_10
lld 18.1.8-1.module_el8.10.0+3903+ca21d481
lld-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
lld-debugsource 18.1.8-1.module_el8.10.0+3903+ca21d481
lld-devel 18.1.8-1.module_el8.10.0+3903+ca21d481
lld-libs 18.1.8-1.module_el8.10.0+3903+ca21d481
lld-libs-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
lldb 18.1.8-1.module_el8.10.0+3903+ca21d481
lldb-debuginfo 18.1.8-1.module_el8.10.0+3903+ca21d481
lldb-debugsource 18.1.8-1.module_el8.10.0+3903+ca21d481
lldb-devel 18.1.8-1.module_el8.10.0+3903+ca21d481
llvm 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-cmake-utils 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-compat 17.0.6-1.module_el8.10.0+3903+ca21d481
llvm-compat 17.0.6-3.module_el8.10.0+3912+9ee11f56
llvm-compat-debugsource 17.0.6-1.module_el8.10.0+3903+ca21d481
llvm-compat-debugsource 17.0.6-3.module_el8.10.0+3912+9ee11f56
llvm-compat-devel 17.0.6-3.module_el8.10.0+3912+9ee11f56
llvm-compat-libs 17.0.6-1.module_el8.10.0+3903+ca21d481
llvm-compat-libs 17.0.6-3.module_el8.10.0+3912+9ee11f56
llvm-compat-libs-debuginfo 17.0.6-1.module_el8.10.0+3903+ca21d481
llvm-compat-libs-debuginfo 17.0.6-3.module_el8.10.0+3912+9ee11f56
llvm-debuginfo 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-debugsource 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-devel 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-devel-debuginfo 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-doc 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-googletest 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-libs 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-libs-debuginfo 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-static 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-test 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-test-debuginfo 18.1.8-3.module_el8.10.0+3903+ca21d481
llvm-toolset 18.1.8-3.module_el8.10.0+3903+ca21d481
mod_http2 1.15.7-10.module_el8.10.0+3904+caabc2d4.1
mod_http2-debuginfo 1.15.7-10.module_el8.10.0+3904+caabc2d4.1
mod_http2-debugsource 1.15.7-10.module_el8.10.0+3904+caabc2d4.1
netavark 1.10.3-1.module_el8.10.0+3909+6e1c1eb7
oci-seccomp-bpf-hook 1.2.10-1.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
oci-seccomp-bpf-hook-debuginfo 1.2.10-1.module_el8.10.0+3909+6e1c1eb7
oci-seccomp-bpf-hook-debugsource 1.2.10-1.module_el8.10.0+3909+6e1c1eb7
podman 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-catatonit 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-catatonit-debuginfo 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-debuginfo 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-debugsource 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-docker 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-gvproxy 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-gvproxy-debuginfo 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-plugins 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-plugins-debuginfo 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-remote 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
podman-remote-debuginfo 4.9.4-15.module_el8.10.0+3909+6e1c1eb7
podman-tests 4.9.4-15.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
python-gevent-debugsource 1.2.2-5.el8_10
python3-bcc 0.25.0-9.el8_10
python3-clang 18.1.8-1.module_el8.10.0+3903+ca21d481
python3-criu 3.18-5.module_el8.10.0+3909+6e1c1eb7
python3-gevent 1.2.2-5.el8_10 ALSA-2024:8834
Security Advisory
(CVE-2023-41419)
python3-gevent-debuginfo 1.2.2-5.el8_10
python3-lit 18.1.8-1.module_el8.10.0+3903+ca21d481
python3-lldb 18.1.8-1.module_el8.10.0+3903+ca21d481
python3-podman 4.9.0-2.module_el8.10.0+3909+6e1c1eb7
python3.11 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-debuginfo 3.11.10-1.el8_10
python3.11-debugsource 3.11.10-1.el8_10
python3.11-devel 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-libs 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-rpm-macros 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-tkinter 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-urllib3 1.26.12-4.el8_10 ALSA-2024:8843
Security Advisory
(CVE-2024-37891)
python3.12 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-debuginfo 3.12.6-1.el8_10
python3.12-debugsource 3.12.6-1.el8_10
python3.12-devel 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-libs 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-rpm-macros 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-tkinter 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-urllib3 1.26.19-1.el8_10 ALSA-2024:8842
Security Advisory
(CVE-2024-37891)
qemu-guest-agent 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-guest-agent-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-img 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-img-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-curl 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-curl-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-iscsi 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-iscsi-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-rbd 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-rbd-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-ssh 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-block-ssh-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-common 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-common-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-core 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-core-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-debuginfo 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-debugsource 6.2.0-53.module_el8.10.0+3906+b8f20084.2
qemu-kvm-docs 6.2.0-53.module_el8.10.0+3906+b8f20084.2
rhel-system-roles 1.23.0-4.el8_10
rsyslog 8.2102.0-15.el8_10.1
rsyslog-crypto 8.2102.0-15.el8_10.1
rsyslog-crypto-debuginfo 8.2102.0-15.el8_10.1
rsyslog-debuginfo 8.2102.0-15.el8_10.1
rsyslog-debugsource 8.2102.0-15.el8_10.1
rsyslog-doc 8.2102.0-15.el8_10.1
rsyslog-elasticsearch 8.2102.0-15.el8_10.1
rsyslog-elasticsearch-debuginfo 8.2102.0-15.el8_10.1
rsyslog-gnutls 8.2102.0-15.el8_10.1
rsyslog-gnutls-debuginfo 8.2102.0-15.el8_10.1
rsyslog-gssapi 8.2102.0-15.el8_10.1
rsyslog-gssapi-debuginfo 8.2102.0-15.el8_10.1
rsyslog-kafka 8.2102.0-15.el8_10.1
rsyslog-kafka-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmaudit 8.2102.0-15.el8_10.1
rsyslog-mmaudit-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmfields 8.2102.0-15.el8_10.1
rsyslog-mmfields-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmjsonparse 8.2102.0-15.el8_10.1
rsyslog-mmjsonparse-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmkubernetes 8.2102.0-15.el8_10.1
rsyslog-mmkubernetes-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmnormalize 8.2102.0-15.el8_10.1
rsyslog-mmnormalize-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mmsnmptrapd 8.2102.0-15.el8_10.1
rsyslog-mmsnmptrapd-debuginfo 8.2102.0-15.el8_10.1
rsyslog-mysql 8.2102.0-15.el8_10.1
rsyslog-mysql-debuginfo 8.2102.0-15.el8_10.1
rsyslog-omamqp1 8.2102.0-15.el8_10.1
rsyslog-omamqp1-debuginfo 8.2102.0-15.el8_10.1
rsyslog-openssl 8.2102.0-15.el8_10.1
rsyslog-openssl-debuginfo 8.2102.0-15.el8_10.1
rsyslog-pgsql 8.2102.0-15.el8_10.1
rsyslog-pgsql-debuginfo 8.2102.0-15.el8_10.1
rsyslog-relp 8.2102.0-15.el8_10.1
rsyslog-relp-debuginfo 8.2102.0-15.el8_10.1
rsyslog-snmp 8.2102.0-15.el8_10.1
rsyslog-snmp-debuginfo 8.2102.0-15.el8_10.1
rsyslog-udpspoof 8.2102.0-15.el8_10.1
rsyslog-udpspoof-debuginfo 8.2102.0-15.el8_10.1
runc 1.1.12-1.module_el8.10.0+3910+f277e40e
runc 1.1.12-5.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
runc-debuginfo 1.1.12-1.module_el8.10.0+3910+f277e40e
runc-debuginfo 1.1.12-5.module_el8.10.0+3909+6e1c1eb7
runc-debugsource 1.1.12-1.module_el8.10.0+3910+f277e40e
runc-debugsource 1.1.12-5.module_el8.10.0+3909+6e1c1eb7
rust 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-analyzer 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-analyzer-debuginfo 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-debugger-common 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-debuginfo 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-debugsource 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-doc 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-gdb 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-lldb 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-src 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static-wasm32-unknown-unknown 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static-wasm32-wasi 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static-wasm32-wasip1 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-toolset 1.79.0-2.module_el8.10.0+3911+d6cc9007
rustfmt 1.79.0-2.module_el8.10.0+3911+d6cc9007
rustfmt-debuginfo 1.79.0-2.module_el8.10.0+3911+d6cc9007
skopeo 1.14.5-3.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
skopeo-tests 1.14.5-3.module_el8.10.0+3909+6e1c1eb7
slirp4netns 1.2.3-1.module_el8.10.0+3909+6e1c1eb7
slirp4netns-debuginfo 1.2.3-1.module_el8.10.0+3909+6e1c1eb7
slirp4netns-debugsource 1.2.3-1.module_el8.10.0+3909+6e1c1eb7
spirv-tools 2024.2-1.el8_10
spirv-tools-debuginfo 2024.2-1.el8_10
spirv-tools-debugsource 2024.2-1.el8_10
spirv-tools-libs 2024.2-1.el8_10
spirv-tools-libs-debuginfo 2024.2-1.el8_10
squid 4.15-10.module_el8.10.0+3905+82668a7e.1
squid-debuginfo 4.15-10.module_el8.10.0+3905+82668a7e.1
squid-debugsource 4.15-10.module_el8.10.0+3905+82668a7e.1
toolbox 0.0.99.5-2.module_el8.10.0+3909+6e1c1eb7
toolbox-debuginfo 0.0.99.5-2.module_el8.10.0+3909+6e1c1eb7
toolbox-debugsource 0.0.99.5-2.module_el8.10.0+3909+6e1c1eb7
toolbox-tests 0.0.99.5-2.module_el8.10.0+3909+6e1c1eb7 ALSA-2024:8846
Security Advisory
(CVE-2024-9341, CVE-2024-9407, CVE-2024-9675)
tzdata-java 2024b-4.el8
udica 0.2.6-21.module_el8.10.0+3909+6e1c1eb7
vulkan-headers 1.3.283.0-1.el8_10
vulkan-loader 1.3.283.0-1.el8_10
vulkan-loader-debuginfo 1.3.283.0-1.el8_10
vulkan-loader-debugsource 1.3.283.0-1.el8_10
vulkan-loader-devel 1.3.283.0-1.el8_10
vulkan-tools 1.3.283.0-2.el8_10
vulkan-tools-debuginfo 1.3.283.0-2.el8_10
vulkan-tools-debugsource 1.3.283.0-2.el8_10
vulkan-validation-layers 1.3.283.0-3.el8_10
vulkan-validation-layers-debuginfo 1.3.283.0-3.el8_10
vulkan-validation-layers-debugsource 1.3.283.0-3.el8_10
xorg-x11-server-common 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-debuginfo 1.20.11-25.el8_10
xorg-x11-server-debugsource 1.20.11-25.el8_10
xorg-x11-server-Xdmx 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xdmx-debuginfo 1.20.11-25.el8_10
xorg-x11-server-Xephyr 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xephyr-debuginfo 1.20.11-25.el8_10
xorg-x11-server-Xnest 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xnest-debuginfo 1.20.11-25.el8_10
xorg-x11-server-Xorg 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xorg-debuginfo 1.20.11-25.el8_10
xorg-x11-server-Xvfb 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xvfb-debuginfo 1.20.11-25.el8_10
xorg-x11-server-Xwayland 21.1.3-17.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-Xwayland-debuginfo 21.1.3-17.el8_10
xorg-x11-server-Xwayland-debugsource 21.1.3-17.el8_10

HighAvailability aarch64 repository

Package Version Advisory Notes
fence-agents-aws 4.2.1-129.el8_10.5
fence-agents-azure-arm 4.2.1-129.el8_10.5
fence-agents-gce 4.2.1-129.el8_10.5
resource-agents 4.9.0-54.el8_10.5
resource-agents-debuginfo 4.9.0-54.el8_10.5
resource-agents-debugsource 4.9.0-54.el8_10.5
resource-agents-paf 4.9.0-54.el8_10.5

ResilientStorage aarch64 repository

Package Version Advisory Notes
fence-agents-aws 4.2.1-129.el8_10.5
fence-agents-azure-arm 4.2.1-129.el8_10.5
fence-agents-gce 4.2.1-129.el8_10.5
resource-agents 4.9.0-54.el8_10.5
resource-agents-debuginfo 4.9.0-54.el8_10.5
resource-agents-debugsource 4.9.0-54.el8_10.5
resource-agents-paf 4.9.0-54.el8_10.5

PowerTools aarch64 repository

Package Version Advisory Notes
bcc-devel 0.25.0-9.el8_10 ALSA-2024:8831
Security Advisory
(CVE-2024-2314)
bcc-doc 0.25.0-9.el8_10 ALSA-2024:8831
Security Advisory
(CVE-2024-2314)
freerdp-devel 2.11.7-1.el8_10
ghostscript-doc 9.27-15.el8_10
ghostscript-tools-dvipdf 9.27-15.el8_10
ghostscript-tools-fonts 9.27-15.el8_10
ghostscript-tools-printing 9.27-15.el8_10
glib2-doc 2.56.4-165.el8_10
glib2-static 2.56.4-165.el8_10
kernel-tools-libs-devel 4.18.0-553.27.1.el8_10 ALSA-2024:8856
Security Advisory
(CVE-2022-48773, CVE-2022-48936, CVE-2023-52492, CVE-2024-24857, CVE-2024-26851, CVE-2024-26924, CVE-2024-26976, CVE-2024-27017, CVE-2024-27062, CVE-2024-35839, CVE-2024-35898, CVE-2024-35939, CVE-2024-38540, CVE-2024-38541, CVE-2024-38586, CVE-2024-38608, CVE-2024-39503, CVE-2024-40924, CVE-2024-40961, CVE-2024-40983, CVE-2024-40984, CVE-2024-41009, CVE-2024-41042, CVE-2024-41066, CVE-2024-41092, CVE-2024-41093, CVE-2024-42070, CVE-2024-42079, CVE-2024-42244, CVE-2024-42284, CVE-2024-42292, CVE-2024-42301, CVE-2024-43854, CVE-2024-43880, CVE-2024-43889, CVE-2024-43892, CVE-2024-44935, CVE-2024-44989, CVE-2024-44990, CVE-2024-45018, CVE-2024-46826, CVE-2024-47668)
libgs-devel 9.27-15.el8_10
libproxy-devel 0.4.15-5.5.el8_10
libtiff-tools 4.0.9-33.el8_10 ALSA-2024:8833
Security Advisory
(CVE-2024-7006)
openldap-servers 2.4.46-20.el8_10
python3.11-debug 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-idle 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.11-test 3.11.10-1.el8_10 ALSA-2024:8838
Security Advisory
(CVE-2024-6232)
python3.12-debug 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-idle 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
python3.12-test 3.12.6-1.el8_10 ALSA-2024:8836
Security Advisory
(CVE-2024-6232)
qemu-kvm-tests 6.2.0-53.module_el8.10.0+3906+b8f20084.2
source-highlight-devel 3.1.8-18.el8_10
spirv-tools-devel 2024.2-1.el8_10
xmlrpc-c-c++ 1.51.0-10.el8_10 ALSA-2024:8859
Security Advisory
(CVE-2024-45491)
xmlrpc-c-client++ 1.51.0-10.el8_10 ALSA-2024:8859
Security Advisory
(CVE-2024-45491)
xmlrpc-c-devel 1.51.0-10.el8_10 ALSA-2024:8859
Security Advisory
(CVE-2024-45491)
xorg-x11-server-devel 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)
xorg-x11-server-source 1.20.11-25.el8_10 ALSA-2024:8798
Security Advisory
(CVE-2024-9632)

devel aarch64 repository

Package Version Advisory Notes
bzip2-static 1.0.6-27.el8_10
fence-agents-aws 4.2.1-129.el8_10.5
fence-agents-lpar 4.2.1-129.el8_10.5
fence-agents-zvm 4.2.1-129.el8_10.5
gcc-toolset-13-annobin-libannocheck 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-clang 12.69-1.el8_10
gcc-toolset-13-annobin-plugin-llvm 12.69-1.el8_10
gcc-toolset-13-libhwasan-devel 13.3.1-2.1.el8_10
gcc-toolset-14-annobin-libannocheck 12.70-2.el8_10
gcc-toolset-14-annobin-libannocheck-debuginfo 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-clang 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-clang-debuginfo 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-llvm 12.70-2.el8_10
gcc-toolset-14-annobin-plugin-llvm-debuginfo 12.70-2.el8_10
gcc-toolset-14-gdb-doc 14.2-3.el8_10
gcc-toolset-14-gdb-gdbserver 14.2-3.el8_10
gcc-toolset-14-libhwasan-devel 14.2.1-1.1.el8_10
ghostscript-gtk 9.27-15.el8_10
gstreamer1-plugins-base-devel-docs 1.16.1-4.el8_10
gstreamer1-plugins-base-tools 1.16.1-4.el8_10
gvfs-tests 1.36.2-17.el8_10
kernel-debug-modules-internal 4.18.0-553.27.1.el8_10
kernel-modules-internal 4.18.0-553.27.1.el8_10
kernel-selftests-internal 4.18.0-553.27.1.el8_10
libhwasan 13.3.1-2.1.el8_10
libhwasan 14.2.1-1.1.el8_10
libhwasan-debuginfo 14.2.1-1.1.el8_10
libtiff-static 4.0.9-33.el8_10
llvm-compat-devel-debuginfo 17.0.6-3.module_el8.10.0+3912+9ee11f56
rust-std-static-wasm32-unknown-unknown 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static-wasm32-wasi 1.79.0-2.module_el8.10.0+3911+d6cc9007
rust-std-static-wasm32-wasip1 1.79.0-2.module_el8.10.0+3911+d6cc9007
spirv-headers-devel 1.5.5-6.el8_10
xmlrpc-c-apps 1.51.0-10.el8_10
xorg-x11-server-Xwayland-devel 21.1.3-17.el8_10

2024-11-13

AppStream x86_64 repository

Package Version Advisory Notes
firefox 128.4.0-1.el8_10 ALSA-2024:8729
Security Advisory
(CVE-2024-10458, CVE-2024-10459, CVE-2024-10460, CVE-2024-10461, CVE-2024-10462, CVE-2024-10463, CVE-2024-10464, CVE-2024-10465, CVE-2024-10466, CVE-2024-10467)
firefox-debuginfo 128.4.0-1.el8_10
firefox-debugsource 128.4.0-1.el8_10
thunderbird 128.4.0-1.el8_10.alma.1 ALSA-2024:8790
Security Advisory
(CVE-2024-10458, CVE-2024-10459, CVE-2024-10460, CVE-2024-10461, CVE-2024-10462, CVE-2024-10463, CVE-2024-10464, CVE-2024-10465, CVE-2024-10466, CVE-2024-10467)
thunderbird-debuginfo 128.4.0-1.el8_10.alma.1
thunderbird-debugsource 128.4.0-1.el8_10.alma.1

AppStream aarch64 repository

Package Version Advisory Notes
firefox 128.4.0-1.el8_10 ALSA-2024:8729
Security Advisory
(CVE-2024-10458, CVE-2024-10459, CVE-2024-10460, CVE-2024-10461, CVE-2024-10462, CVE-2024-10463, CVE-2024-10464, CVE-2024-10465, CVE-2024-10466, CVE-2024-10467)
firefox-debuginfo 128.4.0-1.el8_10
firefox-debugsource 128.4.0-1.el8_10
thunderbird 128.4.0-1.el8_10.alma.1 ALSA-2024:8790
Security Advisory
(CVE-2024-10458, CVE-2024-10459, CVE-2024-10460, CVE-2024-10461, CVE-2024-10462, CVE-2024-10463, CVE-2024-10464, CVE-2024-10465, CVE-2024-10466, CVE-2024-10467)
thunderbird-debuginfo 128.4.0-1.el8_10.alma.1
thunderbird-debugsource 128.4.0-1.el8_10.alma.1