Security patch release notes (RHEL 8.10)

Security patches are tied to the version of Red Hat Linux that is installed on Cloud Pak for Data System.

The patches for a specific Red Hat release are cumulative. For example, if your system is on RHEL 8.10, you only need to install the latest patch that applies to RHEL 8.10, there is no need to install all of them one by one.

Verify that which patch can be installed on your system. Do not apply the patch if the Red Hat Linux version on your system does not match.

For installation, see Applying security patches. Downtime is required when installing the security patch.

For security patches related to RHEL 8.6 and 8.8, see Security patch release notes (RHEL 8.6 and 8.8).

8.10.25.12.SP10

The release date of the 8.10.25.12.SP10 security patch is 26 December 2025. The estimated run time is around 180 minutes.

Restriction: 8.10.25.12.SP10 security patch is based on RHEL 8.10, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF2.
Note: During the 8.10.25.12.SP10 security patch application, the upgrade might fail to start the mirror_registry service in some nodes:
Example:
ATTENTION : Errors encountered during upgrade operation


========================================================


Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.12.SP10_release --upgrade-directory /localrepo --phase platform


1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.12.SP10_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']


========================================================

Workaround

  1. On the failed node, run the following command to load the podman image:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Example:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Getting image source signatures
    Copying blob 7b9a3910f3c3 done
    Copying blob 9a5d14f9f550 done
    Copying blob b4592cba0628 done
    Copying blob de9819405bcf done
    Copying blob 3764c3e89288 done
    Copying config 1fd8e1b0bb done
    Writing manifest to image destination
    Storing signatures
    Loaded image: docker.io/library/registry:2.7
    [root@e1n1 install]# podman images
    REPOSITORY TAG IMAGE ID CREATED SIZE
    docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB
  2. Run the following command to restart the mirror_registry service:
    [root@e1n1 rhcos]# systemctl restart mirror-registry
  3. Restart the upgrade.
Note: During the 8.10.25.12.SP10 security patch application, the upgrade might fail with following error:
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:

Workaround

  1. On node e1n1, run the following commands:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
    
    sed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade
  2. Restart the upgrade.
  3. Once the upgrade is successfully completed, run the following command:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
The list of Red Hat CVEs, which are patched in this release:
RHSA-2025:21232 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23647+cfd78660.noarch
CVE-2025-31133  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23647+cfd78660.noarch
CVE-2025-52565  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23647+cfd78660.noarch
CVE-2025-52881  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23647+cfd78660.noarch
classification  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23647+cfd78660.noarch
RHSA-2025:21232 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. containers-common-2:1-82.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. containers-common-2:1-82.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. containers-common-2:1-82.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. containers-common-2:1-82.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. containers-common-2:1-82.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. criu-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. criu-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. criu-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. criu-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. criu-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. criu-libs-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. criu-libs-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. criu-libs-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. criu-libs-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. crun-1.14.3-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. crun-1.14.3-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. crun-1.14.3-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. crun-1.14.3-2.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. crun-1.14.3-2.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:22063 Moderate/Sec.  cups-1:2.2.6-64.el8_10.x86_64
CVE-2025-58364  Moderate/Sec.  cups-1:2.2.6-64.el8_10.x86_64
classification  Moderate/Sec.  cups-1:2.2.6-64.el8_10.x86_64
RHSA-2025:22063 Moderate/Sec.  cups-client-1:2.2.6-64.el8_10.x86_64
CVE-2025-58364  Moderate/Sec.  cups-client-1:2.2.6-64.el8_10.x86_64
classification  Moderate/Sec.  cups-client-1:2.2.6-64.el8_10.x86_64
RHSA-2025:22063 Moderate/Sec.  cups-filesystem-1:2.2.6-64.el8_10.noarch
CVE-2025-58364  Moderate/Sec.  cups-filesystem-1:2.2.6-64.el8_10.noarch
classification  Moderate/Sec.  cups-filesystem-1:2.2.6-64.el8_10.noarch
RHSA-2025:22063 Moderate/Sec.  cups-ipptool-1:2.2.6-64.el8_10.x86_64
CVE-2025-58364  Moderate/Sec.  cups-ipptool-1:2.2.6-64.el8_10.x86_64
classification  Moderate/Sec.  cups-ipptool-1:2.2.6-64.el8_10.x86_64
RHSA-2025:22063 Moderate/Sec.  cups-libs-1:2.2.6-64.el8_10.x86_64
CVE-2025-58364  Moderate/Sec.  cups-libs-1:2.2.6-64.el8_10.x86_64
classification  Moderate/Sec.  cups-libs-1:2.2.6-64.el8_10.x86_64
RHSA-2025:21776 Important/Sec. expat-2.5.0-1.el8_10.x86_64
classification  Important/Sec. expat-2.5.0-1.el8_10.x86_64
CVE-2013-0340   Important/Sec. expat-2.5.0-1.el8_10.x86_64
CVE-2022-23990  Important/Sec. expat-2.5.0-1.el8_10.x86_64
CVE-2024-28757  Important/Sec. expat-2.5.0-1.el8_10.x86_64
CVE-2025-59375  Important/Sec. expat-2.5.0-1.el8_10.x86_64
RHSA-2025:21232 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21140 Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23617+3e211261.x86_64
CVE-2025-59088  Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23617+3e211261.x86_64
CVE-2025-59089  Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23617+3e211261.x86_64
classification  Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23617+3e211261.x86_64
RHSA-2025:21140 Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59088  Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59089  Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
classification  Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
RHSA-2025:21140 Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59088  Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59089  Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
classification  Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
RHSA-2025:21140 Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59088  Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59089  Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
classification  Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
RHSA-2025:21398 Moderate/Sec.  kernel-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718  Moderate/Sec.  kernel-4.18.0-553.84.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec.  kernel-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697  Moderate/Sec.  kernel-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971  Moderate/Sec.  kernel-4.18.0-553.85.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec.  kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513  Moderate/Sec.  kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724  Moderate/Sec.  kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825  Moderate/Sec.  kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883  Moderate/Sec.  kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898  Moderate/Sec.  kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955  Moderate/Sec.  kernel-4.18.0-553.87.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec.  kernel-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543  Moderate/Sec.  kernel-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401  Moderate/Sec.  kernel-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539  Moderate/Sec.  kernel-4.18.0-553.89.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec.  kernel-core-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718  Moderate/Sec.  kernel-core-4.18.0-553.84.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec.  kernel-core-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697  Moderate/Sec.  kernel-core-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971  Moderate/Sec.  kernel-core-4.18.0-553.85.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec.  kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513  Moderate/Sec.  kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724  Moderate/Sec.  kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825  Moderate/Sec.  kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883  Moderate/Sec.  kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898  Moderate/Sec.  kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955  Moderate/Sec.  kernel-core-4.18.0-553.87.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec.  kernel-core-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543  Moderate/Sec.  kernel-core-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401  Moderate/Sec.  kernel-core-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539  Moderate/Sec.  kernel-core-4.18.0-553.89.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec.  kernel-devel-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718  Moderate/Sec.  kernel-devel-4.18.0-553.84.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec.  kernel-devel-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697  Moderate/Sec.  kernel-devel-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971  Moderate/Sec.  kernel-devel-4.18.0-553.85.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec.  kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513  Moderate/Sec.  kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724  Moderate/Sec.  kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825  Moderate/Sec.  kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883  Moderate/Sec.  kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898  Moderate/Sec.  kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955  Moderate/Sec.  kernel-devel-4.18.0-553.87.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec.  kernel-devel-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543  Moderate/Sec.  kernel-devel-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401  Moderate/Sec.  kernel-devel-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539  Moderate/Sec.  kernel-devel-4.18.0-553.89.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec.  kernel-headers-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718  Moderate/Sec.  kernel-headers-4.18.0-553.84.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec.  kernel-headers-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697  Moderate/Sec.  kernel-headers-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971  Moderate/Sec.  kernel-headers-4.18.0-553.85.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec.  kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513  Moderate/Sec.  kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724  Moderate/Sec.  kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825  Moderate/Sec.  kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883  Moderate/Sec.  kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898  Moderate/Sec.  kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955  Moderate/Sec.  kernel-headers-4.18.0-553.87.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec.  kernel-headers-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543  Moderate/Sec.  kernel-headers-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401  Moderate/Sec.  kernel-headers-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539  Moderate/Sec.  kernel-headers-4.18.0-553.89.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec.  kernel-modules-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718  Moderate/Sec.  kernel-modules-4.18.0-553.84.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec.  kernel-modules-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697  Moderate/Sec.  kernel-modules-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971  Moderate/Sec.  kernel-modules-4.18.0-553.85.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec.  kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513  Moderate/Sec.  kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724  Moderate/Sec.  kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825  Moderate/Sec.  kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883  Moderate/Sec.  kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898  Moderate/Sec.  kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955  Moderate/Sec.  kernel-modules-4.18.0-553.87.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec.  kernel-modules-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543  Moderate/Sec.  kernel-modules-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401  Moderate/Sec.  kernel-modules-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539  Moderate/Sec.  kernel-modules-4.18.0-553.89.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec.  kernel-modules-extra-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718  Moderate/Sec.  kernel-modules-extra-4.18.0-553.84.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec.  kernel-modules-extra-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697  Moderate/Sec.  kernel-modules-extra-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971  Moderate/Sec.  kernel-modules-extra-4.18.0-553.85.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec.  kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513  Moderate/Sec.  kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724  Moderate/Sec.  kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825  Moderate/Sec.  kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883  Moderate/Sec.  kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898  Moderate/Sec.  kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955  Moderate/Sec.  kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec.  kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543  Moderate/Sec.  kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401  Moderate/Sec.  kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539  Moderate/Sec.  kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec.  kernel-tools-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718  Moderate/Sec.  kernel-tools-4.18.0-553.84.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec.  kernel-tools-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697  Moderate/Sec.  kernel-tools-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971  Moderate/Sec.  kernel-tools-4.18.0-553.85.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec.  kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513  Moderate/Sec.  kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724  Moderate/Sec.  kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825  Moderate/Sec.  kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883  Moderate/Sec.  kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898  Moderate/Sec.  kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955  Moderate/Sec.  kernel-tools-4.18.0-553.87.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec.  kernel-tools-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543  Moderate/Sec.  kernel-tools-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401  Moderate/Sec.  kernel-tools-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539  Moderate/Sec.  kernel-tools-4.18.0-553.89.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec.  kernel-tools-libs-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718  Moderate/Sec.  kernel-tools-libs-4.18.0-553.84.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec.  kernel-tools-libs-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697  Moderate/Sec.  kernel-tools-libs-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971  Moderate/Sec.  kernel-tools-libs-4.18.0-553.85.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec.  kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513  Moderate/Sec.  kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724  Moderate/Sec.  kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825  Moderate/Sec.  kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883  Moderate/Sec.  kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898  Moderate/Sec.  kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955  Moderate/Sec.  kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec.  kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543  Moderate/Sec.  kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401  Moderate/Sec.  kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539  Moderate/Sec.  kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:23086 Moderate/Sec.  libluksmeta-9-4.el8_10.1.x86_64
CVE-2025-11568  Moderate/Sec.  libluksmeta-9-4.el8_10.1.x86_64
classification  Moderate/Sec.  libluksmeta-9-4.el8_10.1.x86_64
RHSA-2025:21232 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21977 Moderate/Sec.  libssh-0.9.6-16.el8_10.x86_64
CVE-2025-5372   Moderate/Sec.  libssh-0.9.6-16.el8_10.x86_64
classification  Moderate/Sec.  libssh-0.9.6-16.el8_10.x86_64
RHSA-2025:21977 Moderate/Sec.  libssh-config-0.9.6-16.el8_10.noarch
CVE-2025-5372   Moderate/Sec.  libssh-config-0.9.6-16.el8_10.noarch
classification  Moderate/Sec.  libssh-config-0.9.6-16.el8_10.noarch
RHSA-2025:23086 Moderate/Sec.  luksmeta-9-4.el8_10.1.x86_64
CVE-2025-11568  Moderate/Sec.  luksmeta-9-4.el8_10.1.x86_64
classification  Moderate/Sec.  luksmeta-9-4.el8_10.1.x86_64
RHSA-2025:21398 Moderate/Sec.  perf-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718  Moderate/Sec.  perf-4.18.0-553.84.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec.  perf-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697  Moderate/Sec.  perf-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971  Moderate/Sec.  perf-4.18.0-553.85.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec.  perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513  Moderate/Sec.  perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724  Moderate/Sec.  perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825  Moderate/Sec.  perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883  Moderate/Sec.  perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898  Moderate/Sec.  perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955  Moderate/Sec.  perf-4.18.0-553.87.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec.  perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543  Moderate/Sec.  perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401  Moderate/Sec.  perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539  Moderate/Sec.  perf-4.18.0-553.89.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21232 Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21140 Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59088  Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59089  Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
classification  Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
RHSA-2025:21140 Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59088  Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59089  Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
classification  Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
RHSA-2025:21398 Moderate/Sec.  python3-perf-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718  Moderate/Sec.  python3-perf-4.18.0-553.84.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec.  python3-perf-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697  Moderate/Sec.  python3-perf-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971  Moderate/Sec.  python3-perf-4.18.0-553.85.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec.  python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513  Moderate/Sec.  python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724  Moderate/Sec.  python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825  Moderate/Sec.  python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883  Moderate/Sec.  python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898  Moderate/Sec.  python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955  Moderate/Sec.  python3-perf-4.18.0-553.87.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec.  python3-perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543  Moderate/Sec.  python3-perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401  Moderate/Sec.  python3-perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539  Moderate/Sec.  python3-perf-4.18.0-553.89.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21232 Important/Sec. runc-4:1.2.5-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. runc-4:1.2.5-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. runc-4:1.2.5-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. runc-4:1.2.5-2.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. runc-4:1.2.5-2.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660.x86_64
classification  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660.x86_64
[root@gt32-node1 ~]#

8.10.25.11.SP9

The release date of the 8.10.25.11.SP9 security patch is 10 December 2025. The estimated run time is around 90 minutes.

Restriction: 8.10.25.11.SP9 security patch is based on RHEL 8.10, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF2.
Note: To install 8.10.25.11.SP9, ensure that 8.10.25.03.SP1 is already applied. Direct upgrade from 2.0.2.1-IF2 to SP9 is not supported.
Note: During the 8.10.25.11.SP9 security patch application, the upgrade might fail to start the mirror_registry service in some nodes:
Example:
ATTENTION : Errors encountered during upgrade operation


========================================================


Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.10.SP8_release --upgrade-directory /localrepo --phase platform


1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.11.SP9_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']


========================================================

Workaround

  1. On the failed node, run the following command to load the podman image:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Example:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Getting image source signatures
    Copying blob 7b9a3910f3c3 done
    Copying blob 9a5d14f9f550 done
    Copying blob b4592cba0628 done
    Copying blob de9819405bcf done
    Copying blob 3764c3e89288 done
    Copying config 1fd8e1b0bb done
    Writing manifest to image destination
    Storing signatures
    Loaded image: docker.io/library/registry:2.7
    [root@e1n1 install]# podman images
    REPOSITORY TAG IMAGE ID CREATED SIZE
    docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB
  2. Run the following command to restart the mirror_registry service:
    [root@e1n1 rhcos]# systemctl restart mirror-registry
  3. Restart the upgrade.
Note: During the 8.10.25.11.SP9 security patch application, the upgrade might fail with following error:
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:

Workaround

  1. On node e1n1, run the following commands:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
    
    sed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade
  2. Restart the upgrade.
  3. Once the upgrade is successfully completed, run the following command:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
The list of Red Hat CVEs, which are patched in this release:
RHSA-2025:14573 Important/Sec. aide-0.16-15.el8_10.2.x86_64
CVE-2025-54389  Important/Sec. aide-0.16-15.el8_10.2.x86_64
classification  Important/Sec. aide-0.16-15.el8_10.2.x86_64
RHSA-2025:19835 Important/Sec. bind-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778  Important/Sec. bind-32:9.11.36-16.el8_10.6.x86_64
classification  Important/Sec. bind-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778  Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.6.x86_64
classification  Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-libs-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778  Important/Sec. bind-libs-32:9.11.36-16.el8_10.6.x86_64
classification  Important/Sec. bind-libs-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778  Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.6.x86_64
classification  Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-license-32:9.11.36-16.el8_10.6.noarch
CVE-2025-40778  Important/Sec. bind-license-32:9.11.36-16.el8_10.6.noarch
classification  Important/Sec. bind-license-32:9.11.36-16.el8_10.6.noarch
RHSA-2025:19835 Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778  Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.6.x86_64
classification  Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778  Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.6.x86_64
classification  Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778  Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.6.x86_64
classification  Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-utils-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778  Important/Sec. bind-utils-32:9.11.36-16.el8_10.6.x86_64
classification  Important/Sec. bind-utils-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:8686  Moderate/Sec.  compat-libpthread-nonshared-2.28-251.el8_10.22.x86_64
CVE-2025-4802   Moderate/Sec.  compat-libpthread-nonshared-2.28-251.el8_10.22.x86_64
classification  Moderate/Sec.  compat-libpthread-nonshared-2.28-251.el8_10.22.x86_64
RHSA-2025:12980 Moderate/Sec.  compat-libpthread-nonshared-2.28-251.el8_10.25.x86_64
CVE-2025-8058   Moderate/Sec.  compat-libpthread-nonshared-2.28-251.el8_10.25.x86_64
classification  Moderate/Sec.  compat-libpthread-nonshared-2.28-251.el8_10.25.x86_64
RHSA-2025:7895  Important/Sec. compat-openssl10-1:1.0.2o-4.el8_10.1.x86_64
CVE-2023-0286   Important/Sec. compat-openssl10-1:1.0.2o-4.el8_10.1.x86_64
classification  Important/Sec. compat-openssl10-1:1.0.2o-4.el8_10.1.x86_64
RHSA-2025:9142  Moderate/Sec.  conmon-3:2.1.10-1.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  conmon-3:2.1.10-1.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  conmon-3:2.1.10-1.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142  Moderate/Sec.  container-selinux-2:2.229.0-2.module+el8.10.0+23250+94af2c8e.noarch
CVE-2025-22871  Moderate/Sec.  container-selinux-2:2.229.0-2.module+el8.10.0+23250+94af2c8e.noarch
classification  Moderate/Sec.  container-selinux-2:2.229.0-2.module+el8.10.0+23250+94af2c8e.noarch
RHSA-2025:10551 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23320+f7205097.noarch
CVE-2025-6032   Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23320+f7205097.noarch
classification  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23320+f7205097.noarch
RHSA-2025:15904 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23498+f7d19d48.noarch
CVE-2025-9566   Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23498+f7d19d48.noarch
classification  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23498+f7d19d48.noarch
RHSA-2025:9142  Moderate/Sec.  containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142  Moderate/Sec.  containers-common-2:1-82.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  containers-common-2:1-82.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  containers-common-2:1-82.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. containers-common-2:1-82.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. containers-common-2:1-82.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. containers-common-2:1-82.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. containers-common-2:1-82.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. containers-common-2:1-82.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. containers-common-2:1-82.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142  Moderate/Sec.  criu-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  criu-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  criu-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. criu-3.18-5.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. criu-3.18-5.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. criu-3.18-5.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. criu-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. criu-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. criu-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142  Moderate/Sec.  criu-libs-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  criu-libs-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  criu-libs-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. criu-libs-3.18-5.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. criu-libs-3.18-5.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. criu-libs-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. criu-libs-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142  Moderate/Sec.  crun-1.14.3-2.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  crun-1.14.3-2.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  crun-1.14.3-2.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. crun-1.14.3-2.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. crun-1.14.3-2.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. crun-1.14.3-2.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. crun-1.14.3-2.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. crun-1.14.3-2.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. crun-1.14.3-2.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:15702 Important/Sec. cups-1:2.2.6-63.el8_10.x86_64
CVE-2025-58060  Important/Sec. cups-1:2.2.6-63.el8_10.x86_64
classification  Important/Sec. cups-1:2.2.6-63.el8_10.x86_64
RHSA-2025:15702 Important/Sec. cups-client-1:2.2.6-63.el8_10.x86_64
CVE-2025-58060  Important/Sec. cups-client-1:2.2.6-63.el8_10.x86_64
classification  Important/Sec. cups-client-1:2.2.6-63.el8_10.x86_64
RHSA-2025:15702 Important/Sec. cups-filesystem-1:2.2.6-63.el8_10.noarch
CVE-2025-58060  Important/Sec. cups-filesystem-1:2.2.6-63.el8_10.noarch
classification  Important/Sec. cups-filesystem-1:2.2.6-63.el8_10.noarch
RHSA-2025:15702 Important/Sec. cups-ipptool-1:2.2.6-63.el8_10.x86_64
CVE-2025-58060  Important/Sec. cups-ipptool-1:2.2.6-63.el8_10.x86_64
classification  Important/Sec. cups-ipptool-1:2.2.6-63.el8_10.x86_64
RHSA-2025:11030 Moderate/Sec.  emacs-filesystem-1:26.1-15.el8_10.noarch
CVE-2024-53920  Moderate/Sec.  emacs-filesystem-1:26.1-15.el8_10.noarch
classification  Moderate/Sec.  emacs-filesystem-1:26.1-15.el8_10.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-all-4.2.1-129.el8_10.14.x86_64
CVE-2024-47081  Moderate/Sec.  fence-agents-all-4.2.1-129.el8_10.14.x86_64
classification  Moderate/Sec.  fence-agents-all-4.2.1-129.el8_10.14.x86_64
RHSA-2025:14750 Moderate/Sec.  fence-agents-amt-ws-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-amt-ws-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-amt-ws-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-apc-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-apc-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-apc-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-apc-snmp-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-apc-snmp-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-apc-snmp-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-bladecenter-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-bladecenter-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-bladecenter-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-brocade-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-brocade-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-brocade-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-cisco-mds-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-cisco-mds-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-cisco-mds-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-cisco-ucs-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-cisco-ucs-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-cisco-ucs-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-common-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-common-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-common-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-compute-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-compute-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-compute-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-drac5-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-drac5-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-drac5-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-eaton-snmp-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-eaton-snmp-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-eaton-snmp-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-emerson-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-emerson-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-emerson-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-eps-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-eps-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-eps-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-heuristics-ping-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-heuristics-ping-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-heuristics-ping-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-hpblade-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-hpblade-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-hpblade-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-ibmblade-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-ibmblade-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-ibmblade-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-ifmib-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-ifmib-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-ifmib-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-ilo-moonshot-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-ilo-moonshot-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-ilo-moonshot-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-ilo-mp-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-ilo-mp-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-ilo-mp-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-ilo-ssh-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-ilo-ssh-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-ilo-ssh-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-ilo2-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-ilo2-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-ilo2-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-intelmodular-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-intelmodular-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-intelmodular-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-ipdu-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-ipdu-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-ipdu-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-ipmilan-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-ipmilan-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-ipmilan-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-kdump-4.2.1-129.el8_10.14.x86_64
CVE-2024-47081  Moderate/Sec.  fence-agents-kdump-4.2.1-129.el8_10.14.x86_64
classification  Moderate/Sec.  fence-agents-kdump-4.2.1-129.el8_10.14.x86_64
RHSA-2025:14750 Moderate/Sec.  fence-agents-mpath-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-mpath-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-mpath-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-redfish-4.2.1-129.el8_10.14.x86_64
CVE-2024-47081  Moderate/Sec.  fence-agents-redfish-4.2.1-129.el8_10.14.x86_64
classification  Moderate/Sec.  fence-agents-redfish-4.2.1-129.el8_10.14.x86_64
RHSA-2025:14750 Moderate/Sec.  fence-agents-rhevm-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-rhevm-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-rhevm-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-rsa-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-rsa-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-rsa-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-rsb-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-rsb-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-rsb-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-sbd-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-sbd-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-sbd-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-scsi-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-scsi-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-scsi-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-vmware-rest-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-vmware-rest-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-vmware-rest-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-vmware-soap-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-vmware-soap-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-vmware-soap-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec.  fence-agents-wti-4.2.1-129.el8_10.14.noarch
CVE-2024-47081  Moderate/Sec.  fence-agents-wti-4.2.1-129.el8_10.14.noarch
classification  Moderate/Sec.  fence-agents-wti-4.2.1-129.el8_10.14.noarch
RHSA-2025:9142  Moderate/Sec.  fuse-overlayfs-1.13-1.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  fuse-overlayfs-1.13-1.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  fuse-overlayfs-1.13-1.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:13315 Moderate/Sec.  gdk-pixbuf2-modules-2.36.12-7.el8_10.x86_64
CVE-2025-7345   Moderate/Sec.  gdk-pixbuf2-modules-2.36.12-7.el8_10.x86_64
classification  Moderate/Sec.  gdk-pixbuf2-modules-2.36.12-7.el8_10.x86_64
RHSA-2025:8421  Moderate/Sec.  ghostscript-9.27-17.el8_10.x86_64
CVE-2025-27832  Moderate/Sec.  ghostscript-9.27-17.el8_10.x86_64
classification  Moderate/Sec.  ghostscript-9.27-17.el8_10.x86_64
RHSA-2025:8414  Moderate/Sec.  git-2.43.5-3.el8_10.x86_64
CVE-2024-52005  Moderate/Sec.  git-2.43.5-3.el8_10.x86_64
classification  Moderate/Sec.  git-2.43.5-3.el8_10.x86_64
RHSA-2025:11534 Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2024-50349  Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2024-52006  Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2025-27613  Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2025-27614  Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2025-46835  Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2025-48384  Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2025-48385  Important/Sec. git-2.43.7-1.el8_10.x86_64
classification  Important/Sec. git-2.43.7-1.el8_10.x86_64
RHSA-2025:8414  Moderate/Sec.  git-core-2.43.5-3.el8_10.x86_64
CVE-2024-52005  Moderate/Sec.  git-core-2.43.5-3.el8_10.x86_64
classification  Moderate/Sec.  git-core-2.43.5-3.el8_10.x86_64
RHSA-2025:11534 Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2024-50349  Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2024-52006  Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2025-27613  Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2025-27614  Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2025-46835  Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2025-48384  Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2025-48385  Important/Sec. git-core-2.43.7-1.el8_10.x86_64
classification  Important/Sec. git-core-2.43.7-1.el8_10.x86_64
RHSA-2025:8414  Moderate/Sec.  git-core-doc-2.43.5-3.el8_10.noarch
CVE-2024-52005  Moderate/Sec.  git-core-doc-2.43.5-3.el8_10.noarch
classification  Moderate/Sec.  git-core-doc-2.43.5-3.el8_10.noarch
RHSA-2025:11534 Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2024-50349  Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2024-52006  Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2025-27613  Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2025-27614  Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2025-46835  Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2025-48384  Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2025-48385  Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
classification  Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
RHSA-2025:8414  Moderate/Sec.  git-subtree-2.43.5-3.el8_10.x86_64
CVE-2024-52005  Moderate/Sec.  git-subtree-2.43.5-3.el8_10.x86_64
classification  Moderate/Sec.  git-subtree-2.43.5-3.el8_10.x86_64
RHSA-2025:11534 Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2024-50349  Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2024-52006  Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2025-27613  Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2025-27614  Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2025-46835  Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2025-48384  Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2025-48385  Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
classification  Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
RHSA-2025:17415 Moderate/Sec.  gnutls-c++-3.6.16-8.el8_10.4.x86_64
CVE-2025-6395   Moderate/Sec.  gnutls-c++-3.6.16-8.el8_10.4.x86_64
CVE-2025-32988  Moderate/Sec.  gnutls-c++-3.6.16-8.el8_10.4.x86_64
CVE-2025-32990  Moderate/Sec.  gnutls-c++-3.6.16-8.el8_10.4.x86_64
classification  Moderate/Sec.  gnutls-c++-3.6.16-8.el8_10.4.x86_64
RHSA-2025:17415 Moderate/Sec.  gnutls-dane-3.6.16-8.el8_10.4.x86_64
CVE-2025-6395   Moderate/Sec.  gnutls-dane-3.6.16-8.el8_10.4.x86_64
CVE-2025-32988  Moderate/Sec.  gnutls-dane-3.6.16-8.el8_10.4.x86_64
CVE-2025-32990  Moderate/Sec.  gnutls-dane-3.6.16-8.el8_10.4.x86_64
classification  Moderate/Sec.  gnutls-dane-3.6.16-8.el8_10.4.x86_64
RHSA-2025:17415 Moderate/Sec.  gnutls-utils-3.6.16-8.el8_10.4.x86_64
CVE-2025-6395   Moderate/Sec.  gnutls-utils-3.6.16-8.el8_10.4.x86_64
CVE-2025-32988  Moderate/Sec.  gnutls-utils-3.6.16-8.el8_10.4.x86_64
CVE-2025-32990  Moderate/Sec.  gnutls-utils-3.6.16-8.el8_10.4.x86_64
classification  Moderate/Sec.  gnutls-utils-3.6.16-8.el8_10.4.x86_64
RHSA-2025:15123 Moderate/Sec.  httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2024-47252  Moderate/Sec.  httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-23048  Moderate/Sec.  httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49630  Moderate/Sec.  httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49812  Moderate/Sec.  httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
classification  Moderate/Sec.  httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
RHSA-2025:15123 Moderate/Sec.  httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
CVE-2024-47252  Moderate/Sec.  httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
CVE-2025-23048  Moderate/Sec.  httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
CVE-2025-49630  Moderate/Sec.  httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
CVE-2025-49812  Moderate/Sec.  httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
classification  Moderate/Sec.  httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
RHSA-2025:15123 Moderate/Sec.  httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2024-47252  Moderate/Sec.  httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-23048  Moderate/Sec.  httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49630  Moderate/Sec.  httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49812  Moderate/Sec.  httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
classification  Moderate/Sec.  httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
RHSA-2025:9188  Important/Sec. ipa-client-4.9.13-18.module+el8.10.0+23183+85190b0c.x86_64
CVE-2025-4404   Important/Sec. ipa-client-4.9.13-18.module+el8.10.0+23183+85190b0c.x86_64
classification  Important/Sec. ipa-client-4.9.13-18.module+el8.10.0+23183+85190b0c.x86_64
RHSA-2025:17129 Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23537+32c82745.x86_64
CVE-2025-7493   Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23537+32c82745.x86_64
classification  Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23537+32c82745.x86_64
RHSA-2025:9188  Important/Sec. ipa-client-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
CVE-2025-4404   Important/Sec. ipa-client-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
classification  Important/Sec. ipa-client-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
RHSA-2025:17129 Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
CVE-2025-7493   Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
classification  Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
RHSA-2025:9188  Important/Sec. ipa-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
CVE-2025-4404   Important/Sec. ipa-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
classification  Important/Sec. ipa-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
RHSA-2025:17129 Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
CVE-2025-7493   Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
classification  Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
RHSA-2025:9188  Important/Sec. ipa-selinux-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
CVE-2025-4404   Important/Sec. ipa-selinux-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
classification  Important/Sec. ipa-selinux-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
RHSA-2025:17129 Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
CVE-2025-7493   Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
classification  Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
RHSA-2025:10862 Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30749  Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30754  Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30761  Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-50106  Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
classification  Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
RHSA-2025:18815 Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.472.b08-1.el8.x86_64
CVE-2025-53057  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.472.b08-1.el8.x86_64
CVE-2025-53066  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.472.b08-1.el8.x86_64
classification  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.472.b08-1.el8.x86_64
RHSA-2025:10862 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30749  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30754  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30761  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-50106  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
classification  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
RHSA-2025:18815 Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.472.b08-1.el8.x86_64
CVE-2025-53057  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.472.b08-1.el8.x86_64
CVE-2025-53066  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.472.b08-1.el8.x86_64
classification  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.472.b08-1.el8.x86_64
RHSA-2025:10618 Moderate/Sec.  jq-1.6-11.el8_10.x86_64
CVE-2024-23337  Moderate/Sec.  jq-1.6-11.el8_10.x86_64
CVE-2025-48060  Moderate/Sec.  jq-1.6-11.el8_10.x86_64
classification  Moderate/Sec.  jq-1.6-11.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec.  kernel-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373  Moderate/Sec.  kernel-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751  Moderate/Sec.  kernel-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757  Moderate/Sec.  kernel-4.18.0-553.80.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec.  kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386  Moderate/Sec.  kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297  Moderate/Sec.  kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386  Moderate/Sec.  kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817  Moderate/Sec.  kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841  Moderate/Sec.  kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849  Moderate/Sec.  kernel-4.18.0-553.81.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec.  kernel-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431     Moderate/Sec.  kernel-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226  Moderate/Sec.  kernel-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257  Moderate/Sec.  kernel-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864  Moderate/Sec.  kernel-4.18.0-553.82.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec.  kernel-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367  Moderate/Sec.  kernel-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178  Moderate/Sec.  kernel-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300  Moderate/Sec.  kernel-4.18.0-553.83.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec.  kernel-core-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373  Moderate/Sec.  kernel-core-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751  Moderate/Sec.  kernel-core-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757  Moderate/Sec.  kernel-core-4.18.0-553.80.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec.  kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386  Moderate/Sec.  kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297  Moderate/Sec.  kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386  Moderate/Sec.  kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817  Moderate/Sec.  kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841  Moderate/Sec.  kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849  Moderate/Sec.  kernel-core-4.18.0-553.81.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec.  kernel-core-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431     Moderate/Sec.  kernel-core-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226  Moderate/Sec.  kernel-core-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257  Moderate/Sec.  kernel-core-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864  Moderate/Sec.  kernel-core-4.18.0-553.82.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec.  kernel-core-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367  Moderate/Sec.  kernel-core-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178  Moderate/Sec.  kernel-core-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300  Moderate/Sec.  kernel-core-4.18.0-553.83.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec.  kernel-devel-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373  Moderate/Sec.  kernel-devel-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751  Moderate/Sec.  kernel-devel-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757  Moderate/Sec.  kernel-devel-4.18.0-553.80.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec.  kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386  Moderate/Sec.  kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297  Moderate/Sec.  kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386  Moderate/Sec.  kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817  Moderate/Sec.  kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841  Moderate/Sec.  kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849  Moderate/Sec.  kernel-devel-4.18.0-553.81.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec.  kernel-devel-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431     Moderate/Sec.  kernel-devel-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226  Moderate/Sec.  kernel-devel-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257  Moderate/Sec.  kernel-devel-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864  Moderate/Sec.  kernel-devel-4.18.0-553.82.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec.  kernel-devel-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367  Moderate/Sec.  kernel-devel-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178  Moderate/Sec.  kernel-devel-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300  Moderate/Sec.  kernel-devel-4.18.0-553.83.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec.  kernel-headers-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373  Moderate/Sec.  kernel-headers-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751  Moderate/Sec.  kernel-headers-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757  Moderate/Sec.  kernel-headers-4.18.0-553.80.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec.  kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386  Moderate/Sec.  kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297  Moderate/Sec.  kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386  Moderate/Sec.  kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817  Moderate/Sec.  kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841  Moderate/Sec.  kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849  Moderate/Sec.  kernel-headers-4.18.0-553.81.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec.  kernel-headers-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431     Moderate/Sec.  kernel-headers-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226  Moderate/Sec.  kernel-headers-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257  Moderate/Sec.  kernel-headers-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864  Moderate/Sec.  kernel-headers-4.18.0-553.82.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec.  kernel-headers-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367  Moderate/Sec.  kernel-headers-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178  Moderate/Sec.  kernel-headers-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300  Moderate/Sec.  kernel-headers-4.18.0-553.83.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec.  kernel-modules-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373  Moderate/Sec.  kernel-modules-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751  Moderate/Sec.  kernel-modules-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757  Moderate/Sec.  kernel-modules-4.18.0-553.80.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec.  kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386  Moderate/Sec.  kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297  Moderate/Sec.  kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386  Moderate/Sec.  kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817  Moderate/Sec.  kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841  Moderate/Sec.  kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849  Moderate/Sec.  kernel-modules-4.18.0-553.81.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec.  kernel-modules-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431     Moderate/Sec.  kernel-modules-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226  Moderate/Sec.  kernel-modules-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257  Moderate/Sec.  kernel-modules-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864  Moderate/Sec.  kernel-modules-4.18.0-553.82.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec.  kernel-modules-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367  Moderate/Sec.  kernel-modules-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178  Moderate/Sec.  kernel-modules-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300  Moderate/Sec.  kernel-modules-4.18.0-553.83.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec.  kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373  Moderate/Sec.  kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751  Moderate/Sec.  kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757  Moderate/Sec.  kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec.  kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386  Moderate/Sec.  kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297  Moderate/Sec.  kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386  Moderate/Sec.  kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817  Moderate/Sec.  kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841  Moderate/Sec.  kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849  Moderate/Sec.  kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec.  kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431     Moderate/Sec.  kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226  Moderate/Sec.  kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257  Moderate/Sec.  kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864  Moderate/Sec.  kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec.  kernel-modules-extra-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367  Moderate/Sec.  kernel-modules-extra-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178  Moderate/Sec.  kernel-modules-extra-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300  Moderate/Sec.  kernel-modules-extra-4.18.0-553.83.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec.  kernel-tools-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373  Moderate/Sec.  kernel-tools-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751  Moderate/Sec.  kernel-tools-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757  Moderate/Sec.  kernel-tools-4.18.0-553.80.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec.  kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386  Moderate/Sec.  kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297  Moderate/Sec.  kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386  Moderate/Sec.  kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817  Moderate/Sec.  kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841  Moderate/Sec.  kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849  Moderate/Sec.  kernel-tools-4.18.0-553.81.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec.  kernel-tools-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431     Moderate/Sec.  kernel-tools-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226  Moderate/Sec.  kernel-tools-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257  Moderate/Sec.  kernel-tools-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864  Moderate/Sec.  kernel-tools-4.18.0-553.82.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec.  kernel-tools-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367  Moderate/Sec.  kernel-tools-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178  Moderate/Sec.  kernel-tools-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300  Moderate/Sec.  kernel-tools-4.18.0-553.83.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec.  kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373  Moderate/Sec.  kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751  Moderate/Sec.  kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757  Moderate/Sec.  kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec.  kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386  Moderate/Sec.  kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297  Moderate/Sec.  kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386  Moderate/Sec.  kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817  Moderate/Sec.  kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841  Moderate/Sec.  kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849  Moderate/Sec.  kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec.  kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431     Moderate/Sec.  kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226  Moderate/Sec.  kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257  Moderate/Sec.  kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864  Moderate/Sec.  kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec.  kernel-tools-libs-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367  Moderate/Sec.  kernel-tools-libs-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178  Moderate/Sec.  kernel-tools-libs-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300  Moderate/Sec.  kernel-tools-libs-4.18.0-553.83.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:9878  Important/Sec. libblockdev-2.28-7.el8_10.x86_64
CVE-2025-6019   Important/Sec. libblockdev-2.28-7.el8_10.x86_64
classification  Important/Sec. libblockdev-2.28-7.el8_10.x86_64
RHSA-2025:9878  Important/Sec. libblockdev-crypto-2.28-7.el8_10.x86_64
CVE-2025-6019   Important/Sec. libblockdev-crypto-2.28-7.el8_10.x86_64
classification  Important/Sec. libblockdev-crypto-2.28-7.el8_10.x86_64
RHSA-2025:9878  Important/Sec. libblockdev-fs-2.28-7.el8_10.x86_64
CVE-2025-6019   Important/Sec. libblockdev-fs-2.28-7.el8_10.x86_64
classification  Important/Sec. libblockdev-fs-2.28-7.el8_10.x86_64
RHSA-2025:9878  Important/Sec. libblockdev-loop-2.28-7.el8_10.x86_64
CVE-2025-6019   Important/Sec. libblockdev-loop-2.28-7.el8_10.x86_64
classification  Important/Sec. libblockdev-loop-2.28-7.el8_10.x86_64
RHSA-2025:9878  Important/Sec. libblockdev-lvm-2.28-7.el8_10.x86_64
CVE-2025-6019   Important/Sec. libblockdev-lvm-2.28-7.el8_10.x86_64
classification  Important/Sec. libblockdev-lvm-2.28-7.el8_10.x86_64
RHSA-2025:9878  Important/Sec. libblockdev-mdraid-2.28-7.el8_10.x86_64
CVE-2025-6019   Important/Sec. libblockdev-mdraid-2.28-7.el8_10.x86_64
classification  Important/Sec. libblockdev-mdraid-2.28-7.el8_10.x86_64
RHSA-2025:9878  Important/Sec. libblockdev-part-2.28-7.el8_10.x86_64
CVE-2025-6019   Important/Sec. libblockdev-part-2.28-7.el8_10.x86_64
classification  Important/Sec. libblockdev-part-2.28-7.el8_10.x86_64
RHSA-2025:9878  Important/Sec. libblockdev-swap-2.28-7.el8_10.x86_64
CVE-2025-6019   Important/Sec. libblockdev-swap-2.28-7.el8_10.x86_64
classification  Important/Sec. libblockdev-swap-2.28-7.el8_10.x86_64
RHSA-2025:9878  Important/Sec. libblockdev-utils-2.28-7.el8_10.x86_64
CVE-2025-6019   Important/Sec. libblockdev-utils-2.28-7.el8_10.x86_64
classification  Important/Sec. libblockdev-utils-2.28-7.el8_10.x86_64
RHSA-2025:8421  Moderate/Sec.  libgs-9.27-17.el8_10.x86_64
CVE-2025-27832  Moderate/Sec.  libgs-9.27-17.el8_10.x86_64
classification  Moderate/Sec.  libgs-9.27-17.el8_10.x86_64
RHSA-2025:19610 Important/Sec. libipa_hbac-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. libipa_hbac-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. libipa_hbac-2.9.4-5.el8_10.3.x86_64
RHSA-2025:7540  Moderate/Sec.  libjpeg-turbo-1.5.3-14.el8_10.x86_64
CVE-2020-13790  Moderate/Sec.  libjpeg-turbo-1.5.3-14.el8_10.x86_64
classification  Moderate/Sec.  libjpeg-turbo-1.5.3-14.el8_10.x86_64
RHSA-2025:9142  Moderate/Sec.  libslirp-4.4.0-2.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  libslirp-4.4.0-2.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  libslirp-4.4.0-2.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:19714 Important/Sec. libsoup-2.62.3-10.el8_10.x86_64
CVE-2025-4945   Important/Sec. libsoup-2.62.3-10.el8_10.x86_64
CVE-2025-11021  Important/Sec. libsoup-2.62.3-10.el8_10.x86_64
classification  Important/Sec. libsoup-2.62.3-10.el8_10.x86_64
RHSA-2025:18286 Moderate/Sec.  libssh-0.9.6-15.el8_10.x86_64
CVE-2025-5318   Moderate/Sec.  libssh-0.9.6-15.el8_10.x86_64
classification  Moderate/Sec.  libssh-0.9.6-15.el8_10.x86_64
RHSA-2025:18286 Moderate/Sec.  libssh-config-0.9.6-15.el8_10.noarch
CVE-2025-5318   Moderate/Sec.  libssh-config-0.9.6-15.el8_10.noarch
classification  Moderate/Sec.  libssh-config-0.9.6-15.el8_10.noarch
RHSA-2025:19610 Important/Sec. libsss_autofs-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. libsss_autofs-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. libsss_autofs-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. libsss_certmap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. libsss_certmap-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. libsss_certmap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. libsss_idmap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. libsss_idmap-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. libsss_idmap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. libsss_simpleifp-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. libsss_simpleifp-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. libsss_simpleifp-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. libsss_sudo-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. libsss_sudo-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. libsss_sudo-2.9.4-5.el8_10.3.x86_64
RHSA-2025:4658  Moderate/Sec.  libtiff-4.0.9-34.el8_10.x86_64
CVE-2017-17095  Moderate/Sec.  libtiff-4.0.9-34.el8_10.x86_64
classification  Moderate/Sec.  libtiff-4.0.9-34.el8_10.x86_64
RHSA-2025:19276 Important/Sec. libtiff-4.0.9-35.el8_10.x86_64
CVE-2025-9900   Important/Sec. libtiff-4.0.9-35.el8_10.x86_64
classification  Important/Sec. libtiff-4.0.9-35.el8_10.x86_64
RHSA-2025:20034 Important/Sec. libtiff-4.0.9-36.el8_10.x86_64
CVE-2025-8176   Important/Sec. libtiff-4.0.9-36.el8_10.x86_64
classification  Important/Sec. libtiff-4.0.9-36.el8_10.x86_64
RHSA-2025:12527 Moderate/Sec.  libtpms-0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70.x86_64
CVE-2025-49133  Moderate/Sec.  libtpms-0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70.x86_64
classification  Moderate/Sec.  libtpms-0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70.x86_64
RHSA-2025:15017 Important/Sec. libudisks2-2.9.0-16.el8_10.1.x86_64
CVE-2025-8067   Important/Sec. libudisks2-2.9.0-16.el8_10.1.x86_64
classification  Important/Sec. libudisks2-2.9.0-16.el8_10.1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-client-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-client-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-client-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-config-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-config-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-config-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-config-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-config-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-config-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-interface-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-interface-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-interface-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-nodedev-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-nodedev-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-nodedev-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-qemu-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-qemu-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-qemu-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-secret-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-secret-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-secret-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-storage-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-storage-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-storage-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-storage-core-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-storage-core-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-storage-core-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-storage-disk-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-storage-disk-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-storage-disk-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-storage-gluster-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-storage-gluster-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-storage-gluster-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-direct-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-direct-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-storage-iscsi-direct-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-storage-logical-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-storage-logical-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-storage-logical-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-storage-mpath-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-storage-mpath-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-storage-mpath-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-storage-rbd-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-storage-rbd-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-storage-rbd-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-driver-storage-scsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-driver-storage-scsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-driver-storage-scsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-daemon-kvm-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-daemon-kvm-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-daemon-kvm-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec.  libvirt-libs-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133  Moderate/Sec.  libvirt-libs-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification  Moderate/Sec.  libvirt-libs-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:9119  Important/Sec. libvpx-1.7.0-12.el8_10.x86_64
CVE-2025-5283   Important/Sec. libvpx-1.7.0-12.el8_10.x86_64
classification  Important/Sec. libvpx-1.7.0-12.el8_10.x86_64
RHSA-2025:15123 Moderate/Sec.  mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
CVE-2024-47252  Moderate/Sec.  mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
CVE-2025-23048  Moderate/Sec.  mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
CVE-2025-49630  Moderate/Sec.  mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
CVE-2025-49812  Moderate/Sec.  mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
classification  Moderate/Sec.  mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
RHSA-2025:15123 Moderate/Sec.  mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2024-47252  Moderate/Sec.  mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-23048  Moderate/Sec.  mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49630  Moderate/Sec.  mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49812  Moderate/Sec.  mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
classification  Moderate/Sec.  mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
RHSA-2025:15123 Moderate/Sec.  mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2024-47252  Moderate/Sec.  mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-23048  Moderate/Sec.  mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49630  Moderate/Sec.  mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49812  Moderate/Sec.  mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
classification  Moderate/Sec.  mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
RHSA-2025:18297 Moderate/Sec.  perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373  Moderate/Sec.  perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751  Moderate/Sec.  perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757  Moderate/Sec.  perf-4.18.0-553.80.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec.  perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386  Moderate/Sec.  perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297  Moderate/Sec.  perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386  Moderate/Sec.  perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817  Moderate/Sec.  perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841  Moderate/Sec.  perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849  Moderate/Sec.  perf-4.18.0-553.81.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec.  perf-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431     Moderate/Sec.  perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226  Moderate/Sec.  perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257  Moderate/Sec.  perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864  Moderate/Sec.  perf-4.18.0-553.82.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec.  perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367  Moderate/Sec.  perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178  Moderate/Sec.  perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300  Moderate/Sec.  perf-4.18.0-553.83.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec.  perl-Attribute-Handlers-0.99-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-Attribute-Handlers-0.99-423.el8_10.noarch
classification  Moderate/Sec.  perl-Attribute-Handlers-0.99-423.el8_10.noarch
RHSA-2025:8432  Moderate/Sec.  perl-CPAN-2.18-402.el8_10.noarch
CVE-2020-16156  Moderate/Sec.  perl-CPAN-2.18-402.el8_10.noarch
classification  Moderate/Sec.  perl-CPAN-2.18-402.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-Devel-Peek-1.26-423.el8_10.x86_64
CVE-2025-40909  Moderate/Sec.  perl-Devel-Peek-1.26-423.el8_10.x86_64
classification  Moderate/Sec.  perl-Devel-Peek-1.26-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec.  perl-Devel-SelfStubber-1.06-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-Devel-SelfStubber-1.06-423.el8_10.noarch
classification  Moderate/Sec.  perl-Devel-SelfStubber-1.06-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-ExtUtils-Embed-1.34-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-ExtUtils-Embed-1.34-423.el8_10.noarch
classification  Moderate/Sec.  perl-ExtUtils-Embed-1.34-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-ExtUtils-Miniperl-1.06-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-ExtUtils-Miniperl-1.06-423.el8_10.noarch
classification  Moderate/Sec.  perl-ExtUtils-Miniperl-1.06-423.el8_10.noarch
RHSA-2025:8414  Moderate/Sec.  perl-Git-2.43.5-3.el8_10.noarch
CVE-2024-52005  Moderate/Sec.  perl-Git-2.43.5-3.el8_10.noarch
classification  Moderate/Sec.  perl-Git-2.43.5-3.el8_10.noarch
RHSA-2025:11534 Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2024-50349  Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2024-52006  Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2025-27613  Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2025-27614  Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2025-46835  Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2025-48384  Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2025-48385  Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
classification  Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch
classification  Moderate/Sec.  perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-Memoize-1.03-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-Memoize-1.03-423.el8_10.noarch
classification  Moderate/Sec.  perl-Memoize-1.03-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-Module-Loaded-1:0.08-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-Module-Loaded-1:0.08-423.el8_10.noarch
classification  Moderate/Sec.  perl-Module-Loaded-1:0.08-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-Net-Ping-2.55-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-Net-Ping-2.55-423.el8_10.noarch
classification  Moderate/Sec.  perl-Net-Ping-2.55-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-Pod-Html-1.22.02-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-Pod-Html-1.22.02-423.el8_10.noarch
classification  Moderate/Sec.  perl-Pod-Html-1.22.02-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-SelfLoader-1.23-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-SelfLoader-1.23-423.el8_10.noarch
classification  Moderate/Sec.  perl-SelfLoader-1.23-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-Test-1.30-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-Test-1.30-423.el8_10.noarch
classification  Moderate/Sec.  perl-Test-1.30-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-Time-Piece-1.31-423.el8_10.x86_64
CVE-2025-40909  Moderate/Sec.  perl-Time-Piece-1.31-423.el8_10.x86_64
classification  Moderate/Sec.  perl-Time-Piece-1.31-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec.  perl-libnetcfg-4:5.26.3-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-libnetcfg-4:5.26.3-423.el8_10.noarch
classification  Moderate/Sec.  perl-libnetcfg-4:5.26.3-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec.  perl-open-1.11-423.el8_10.noarch
CVE-2025-40909  Moderate/Sec.  perl-open-1.11-423.el8_10.noarch
classification  Moderate/Sec.  perl-open-1.11-423.el8_10.noarch
RHSA-2025:14560 Moderate/Sec.  platform-python-devel-3.6.8-71.el8_10.x86_64
CVE-2025-8194   Moderate/Sec.  platform-python-devel-3.6.8-71.el8_10.x86_64
classification  Moderate/Sec.  platform-python-devel-3.6.8-71.el8_10.x86_64
RHSA-2025:9142  Moderate/Sec.  podman-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  podman-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  podman-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. podman-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. podman-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. podman-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142  Moderate/Sec.  podman-catatonit-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  podman-catatonit-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  podman-catatonit-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. podman-catatonit-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. podman-catatonit-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. podman-catatonit-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142  Moderate/Sec.  podman-gvproxy-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  podman-gvproxy-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  podman-gvproxy-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. podman-gvproxy-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. podman-gvproxy-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. podman-gvproxy-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142  Moderate/Sec.  podman-plugins-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  podman-plugins-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  podman-plugins-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. podman-plugins-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. podman-plugins-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. podman-plugins-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:19835 Important/Sec. python3-bind-32:9.11.36-16.el8_10.6.noarch
CVE-2025-40778  Important/Sec. python3-bind-32:9.11.36-16.el8_10.6.noarch
classification  Important/Sec. python3-bind-32:9.11.36-16.el8_10.6.noarch
RHSA-2025:8419  Low/Sec.       python3-bson-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
CVE-2024-5629   Low/Sec.       python3-bson-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
classification  Low/Sec.       python3-bson-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
RHSA-2025:9188  Important/Sec. python3-ipaclient-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
CVE-2025-4404   Important/Sec. python3-ipaclient-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
classification  Important/Sec. python3-ipaclient-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
RHSA-2025:17129 Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
CVE-2025-7493   Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
classification  Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
RHSA-2025:9188  Important/Sec. python3-ipalib-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
CVE-2025-4404   Important/Sec. python3-ipalib-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
classification  Important/Sec. python3-ipalib-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
RHSA-2025:17129 Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
CVE-2025-7493   Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
classification  Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
RHSA-2025:19610 Important/Sec. python3-libipa_hbac-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. python3-libipa_hbac-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. python3-libipa_hbac-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. python3-libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. python3-libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. python3-libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:18297 Moderate/Sec.  python3-perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373  Moderate/Sec.  python3-perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751  Moderate/Sec.  python3-perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757  Moderate/Sec.  python3-perf-4.18.0-553.80.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec.  python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386  Moderate/Sec.  python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297  Moderate/Sec.  python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386  Moderate/Sec.  python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817  Moderate/Sec.  python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841  Moderate/Sec.  python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849  Moderate/Sec.  python3-perf-4.18.0-553.81.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec.  python3-perf-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431     Moderate/Sec.  python3-perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226  Moderate/Sec.  python3-perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257  Moderate/Sec.  python3-perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864  Moderate/Sec.  python3-perf-4.18.0-553.82.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec.  python3-perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367  Moderate/Sec.  python3-perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178  Moderate/Sec.  python3-perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300  Moderate/Sec.  python3-perf-4.18.0-553.83.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:8419  Low/Sec.       python3-pymongo-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
CVE-2024-5629   Low/Sec.       python3-pymongo-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
classification  Low/Sec.       python3-pymongo-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
RHSA-2025:9188  Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
CVE-2025-4404   Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
classification  Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
RHSA-2025:17129 Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
CVE-2025-7493   Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
classification  Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
RHSA-2025:19610 Important/Sec. python3-sss-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. python3-sss-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. python3-sss-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. python3-sss-murmur-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. python3-sss-murmur-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. python3-sss-murmur-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. python3-sssdconfig-2.9.4-5.el8_10.3.noarch
CVE-2025-11561  Important/Sec. python3-sssdconfig-2.9.4-5.el8_10.3.noarch
classification  Important/Sec. python3-sssdconfig-2.9.4-5.el8_10.3.noarch
RHSA-2025:11884 Important/Sec. python3-unbound-1.16.2-5.9.el8_10.x86_64
CVE-2025-5994   Important/Sec. python3-unbound-1.16.2-5.9.el8_10.x86_64
classification  Important/Sec. python3-unbound-1.16.2-5.9.el8_10.x86_64
RHSA-2025:14900 Moderate/Sec.  python39-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194   Moderate/Sec.  python39-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273  Moderate/Sec.  python39-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification  Moderate/Sec.  python39-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:14900 Moderate/Sec.  python39-devel-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194   Moderate/Sec.  python39-devel-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273  Moderate/Sec.  python39-devel-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification  Moderate/Sec.  python39-devel-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:14900 Moderate/Sec.  python39-idle-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194   Moderate/Sec.  python39-idle-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273  Moderate/Sec.  python39-idle-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification  Moderate/Sec.  python39-idle-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:14900 Moderate/Sec.  python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194   Moderate/Sec.  python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273  Moderate/Sec.  python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification  Moderate/Sec.  python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:14900 Moderate/Sec.  python39-rpm-macros-3.9.20-2.module+el8.10.0+23441+1124c1da.noarch
CVE-2025-8194   Moderate/Sec.  python39-rpm-macros-3.9.20-2.module+el8.10.0+23441+1124c1da.noarch
CVE-2025-47273  Moderate/Sec.  python39-rpm-macros-3.9.20-2.module+el8.10.0+23441+1124c1da.noarch
classification  Moderate/Sec.  python39-rpm-macros-3.9.20-2.module+el8.10.0+23441+1124c1da.noarch
RHSA-2025:14900 Moderate/Sec.  python39-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
CVE-2025-8194   Moderate/Sec.  python39-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
CVE-2025-47273  Moderate/Sec.  python39-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
classification  Moderate/Sec.  python39-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
RHSA-2025:14900 Moderate/Sec.  python39-setuptools-wheel-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
CVE-2025-8194   Moderate/Sec.  python39-setuptools-wheel-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
CVE-2025-47273  Moderate/Sec.  python39-setuptools-wheel-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
classification  Moderate/Sec.  python39-setuptools-wheel-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
RHSA-2025:14900 Moderate/Sec.  python39-test-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194   Moderate/Sec.  python39-test-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273  Moderate/Sec.  python39-test-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification  Moderate/Sec.  python39-test-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:14900 Moderate/Sec.  python39-tkinter-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194   Moderate/Sec.  python39-tkinter-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273  Moderate/Sec.  python39-tkinter-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification  Moderate/Sec.  python39-tkinter-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-img-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-img-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-img-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-block-curl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-block-gluster-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-block-iscsi-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-block-rbd-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-block-ssh-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-common-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-common-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-common-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-core-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-core-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-core-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-docs-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-docs-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-docs-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-hw-usbredir-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-ui-opengl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133  Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification  Moderate/Sec.  qemu-kvm-ui-spice-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:7539  Moderate/Sec.  ruby-libs-2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64
CVE-2019-19012  Moderate/Sec.  ruby-libs-2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64
CVE-2021-43809  Moderate/Sec.  ruby-libs-2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64
classification  Moderate/Sec.  ruby-libs-2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64
RHSA-2025:3210  Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869  Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
classification  Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:9142  Moderate/Sec.  runc-1:1.1.12-6.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  runc-1:1.1.12-6.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  runc-1:1.1.12-6.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142  Moderate/Sec.  skopeo-2:1.14.5-4.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  skopeo-2:1.14.5-4.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  skopeo-2:1.14.5-4.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142  Moderate/Sec.  slirp4netns-1.2.3-1.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871  Moderate/Sec.  slirp4netns-1.2.3-1.module+el8.10.0+23250+94af2c8e.x86_64
classification  Moderate/Sec.  slirp4netns-1.2.3-1.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032   Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23320+f7205097.x86_64
classification  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566   Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23498+f7d19d48.x86_64
classification  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:19610 Important/Sec. sssd-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-ad-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-ad-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-ad-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-client-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-client-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-client-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-common-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-common-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-common-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-common-pac-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-common-pac-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-common-pac-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-dbus-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-dbus-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-dbus-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-idp-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-idp-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-idp-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-ipa-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-ipa-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-ipa-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-kcm-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-kcm-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-kcm-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-krb5-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-krb5-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-krb5-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-krb5-common-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-krb5-common-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-krb5-common-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-ldap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-ldap-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-ldap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-nfs-idmap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-nfs-idmap-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-nfs-idmap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-proxy-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-proxy-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-proxy-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-tools-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561  Important/Sec. sssd-tools-2.9.4-5.el8_10.3.x86_64
classification  Important/Sec. sssd-tools-2.9.4-5.el8_10.3.x86_64
RHSA-2025:15017 Important/Sec. udisks2-2.9.0-16.el8_10.1.x86_64
CVE-2025-8067   Important/Sec. udisks2-2.9.0-16.el8_10.1.x86_64
classification  Important/Sec. udisks2-2.9.0-16.el8_10.1.x86_64
RHSA-2025:15017 Important/Sec. udisks2-iscsi-2.9.0-16.el8_10.1.x86_64
CVE-2025-8067   Important/Sec. udisks2-iscsi-2.9.0-16.el8_10.1.x86_64
classification  Important/Sec. udisks2-iscsi-2.9.0-16.el8_10.1.x86_64
RHSA-2025:15017 Important/Sec. udisks2-lvm2-2.9.0-16.el8_10.1.x86_64
CVE-2025-8067   Important/Sec. udisks2-lvm2-2.9.0-16.el8_10.1.x86_64
classification  Important/Sec. udisks2-lvm2-2.9.0-16.el8_10.1.x86_64
RHSA-2025:11884 Important/Sec. unbound-libs-1.16.2-5.9.el8_10.x86_64
CVE-2025-5994   Important/Sec. unbound-libs-1.16.2-5.9.el8_10.x86_64
classification  Important/Sec. unbound-libs-1.16.2-5.9.el8_10.x86_64
RHSA-2025:17715 Moderate/Sec.  vim-common-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53905  Moderate/Sec.  vim-common-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53906  Moderate/Sec.  vim-common-2:8.0.1763-21.el8_10.x86_64
classification  Moderate/Sec.  vim-common-2:8.0.1763-21.el8_10.x86_64
RHSA-2025:17715 Moderate/Sec.  vim-enhanced-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53905  Moderate/Sec.  vim-enhanced-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53906  Moderate/Sec.  vim-enhanced-2:8.0.1763-21.el8_10.x86_64
classification  Moderate/Sec.  vim-enhanced-2:8.0.1763-21.el8_10.x86_64
RHSA-2025:17715 Moderate/Sec.  vim-filesystem-2:8.0.1763-21.el8_10.noarch
CVE-2025-53905  Moderate/Sec.  vim-filesystem-2:8.0.1763-21.el8_10.noarch
CVE-2025-53906  Moderate/Sec.  vim-filesystem-2:8.0.1763-21.el8_10.noarch
classification  Moderate/Sec.  vim-filesystem-2:8.0.1763-21.el8_10.noarch

8.10.25.10.SP8

The release date of the 8.10.25.10.SP8 security patch is 04 November 2025. The estimated run time is around 70 minutes.

Restriction: 8.10.25.10.SP8 security patch is based on RHEL 8.10, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF2.
Note: During the 8.10.25.10.SP8 security patch application, the upgrade might fail to start the mirror_registry service in some nodes:
Example:
ATTENTION : Errors encountered during upgrade operation


========================================================


Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.10.SP8_release --upgrade-directory /localrepo --phase platform


1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.10.SP8_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']


========================================================

Workaround

  1. On the failed node, run the following command to load the podman image:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Example:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Getting image source signatures
    Copying blob 7b9a3910f3c3 done
    Copying blob 9a5d14f9f550 done
    Copying blob b4592cba0628 done
    Copying blob de9819405bcf done
    Copying blob 3764c3e89288 done
    Copying config 1fd8e1b0bb done
    Writing manifest to image destination
    Storing signatures
    Loaded image: docker.io/library/registry:2.7
    [root@e1n1 install]# podman images
    REPOSITORY TAG IMAGE ID CREATED SIZE
    docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB
  2. Run the following command to restart the mirror_registry service:
    [root@e1n1 rhcos]# systemctl restart mirror-registry
  3. Restart the upgrade.
Note: During the 8.10.25.10.SP8 security patch application, the upgrade might fail with following error:
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:

Workaround

  1. On node e1n1, run the following commands:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
    
    sed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade
  2. Restart the upgrade.
  3. Once the upgrade is successfully completed, run the following command:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
The list of Red Hat CVEs, which are patched in this release:
RHSA-2025:15702 Important/Sec. cups-libs-1:2.2.6-63.el8_10.x86_64
CVE-2025-58060 Important/Sec. cups-libs-1:2.2.6-63.el8_10.x86_64
classification Important/Sec. cups-libs-1:2.2.6-63.el8_10.x86_64
RHSA-2025:17415 Moderate/Sec. gnutls-3.6.16-8.el8_10.4.x86_64
CVE-2025-6395 Moderate/Sec. gnutls-3.6.16-8.el8_10.4.x86_64
CVE-2025-32988 Moderate/Sec. gnutls-3.6.16-8.el8_10.4.x86_64
CVE-2025-32990 Moderate/Sec. gnutls-3.6.16-8.el8_10.4.x86_64
classification Moderate/Sec. gnutls-3.6.16-8.el8_10.4.x86_64
RHSA-2025:15785 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-core-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-core-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-core-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-core-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-core-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-core-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-core-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-core-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-core-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-core-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-debuginfo-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-debuginfo-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-debuginfo-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-debuginfo-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-debuginfo-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-debuginfo-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-debuginfo-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-debuginfo-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-debuginfo-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-debuginfo-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-devel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-devel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-devel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-devel-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-devel-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-devel-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-devel-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-devel-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-devel-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-devel-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-headers-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-headers-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-headers-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-headers-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-headers-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-headers-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-headers-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-headers-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-headers-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-headers-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-modules-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-modules-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-modules-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-modules-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-modules-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-modules-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-modules-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-modules-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-modules-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-modules-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-modules-extra-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-modules-extra-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-modules-extra-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-modules-extra-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-modules-extra-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-modules-extra-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-tools-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-tools-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-tools-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-tools-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-tools-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-tools-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-tools-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-tools-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-tools-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-tools-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-tools-libs-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-tools-libs-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-tools-libs-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-tools-libs-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-tools-libs-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-tools-libs-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.79.1.el8_10.x86_64
RHEA-2024:8852 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
CVE-2020-26154 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
RHSA-2025:16823 Moderate/Sec. openssh-8.0p1-26.el8_10.x86_64
CVE-2025-26465 Moderate/Sec. openssh-8.0p1-26.el8_10.x86_64
classification Moderate/Sec. openssh-8.0p1-26.el8_10.x86_64
RHSA-2025:16823 Moderate/Sec. openssh-clients-8.0p1-26.el8_10.x86_64
CVE-2025-26465 Moderate/Sec. openssh-clients-8.0p1-26.el8_10.x86_64
classification Moderate/Sec. openssh-clients-8.0p1-26.el8_10.x86_64
RHSA-2025:16823 Moderate/Sec. openssh-server-8.0p1-26.el8_10.x86_64
CVE-2025-26465 Moderate/Sec. openssh-server-8.0p1-26.el8_10.x86_64
classification Moderate/Sec. openssh-server-8.0p1-26.el8_10.x86_64
RHSA-2025:15785 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. perf-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. perf-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. perf-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. perf-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. perf-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. perf-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. perf-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. python3-perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. python3-perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. python3-perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. python3-perf-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. python3-perf-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. python3-perf-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. python3-perf-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. python3-perf-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. python3-perf-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. python3-perf-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:17715 Moderate/Sec. vim-minimal-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53905 Moderate/Sec. vim-minimal-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53906 Moderate/Sec. vim-minimal-2:8.0.1763-21.el8_10.x86_64
classification Moderate/Sec. vim-minimal-2:8.0.1763-21.el8_10.x86_64
[root@gt27-node2 ~]#

8.10.25.09.SP7

The release date of the 8.10.25.09.SP7 security patch is 30 September 2025. The estimated run time is around 120 minutes.

Restriction: 8.10.25.09.SP7 security patch is based on RHEL 8.10, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF2.
Note: During the 8.10.25.09.SP7 security patch application, the upgrade might fail to start the mirror_registry service in some nodes:
Example:
ATTENTION : Errors encountered during upgrade operation


========================================================


Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.09.SP7_release --upgrade-directory /localrepo --phase platform


1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.09.SP7_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']


========================================================

Workaround

  1. On the failed node, run the following command to load the podman image:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Example:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Getting image source signatures
    Copying blob 7b9a3910f3c3 done
    Copying blob 9a5d14f9f550 done
    Copying blob b4592cba0628 done
    Copying blob de9819405bcf done
    Copying blob 3764c3e89288 done
    Copying config 1fd8e1b0bb done
    Writing manifest to image destination
    Storing signatures
    Loaded image: docker.io/library/registry:2.7
    [root@e1n1 install]# podman images
    REPOSITORY TAG IMAGE ID CREATED SIZE
    docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB
  2. Run the following command to restart the mirror_registry service:
    [root@e1n1 rhcos]# systemctl restart mirror-registry
  3. Restart the upgrade.
Note: During the 8.10.25.09.SP7 security patch application, the upgrade might fail with following error:
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:

Workaround

  1. On node e1n1, run the following commands:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
    
    sed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade
  2. Restart the upgrade.
  3. Once the upgrade is successfully completed, run the following command:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
The list of Red Hat CVEs, which are patched in this release:
RHSA-2025:13315 Moderate/Sec. gdk-pixbuf2-2.36.12-7.el8_10.x86_64
CVE-2025-7345 Moderate/Sec. gdk-pixbuf2-2.36.12-7.el8_10.x86_64
classification Moderate/Sec. gdk-pixbuf2-2.36.12-7.el8_10.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-common-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-common-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-common-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-devel-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-devel-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-devel-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-headers-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-headers-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-headers-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-locale-source-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.25.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-core-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-core-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-core-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-core-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-core-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-core-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-debuginfo-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-debuginfo-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-debuginfo-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-debuginfo-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-debuginfo-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-debuginfo-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-devel-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-devel-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-devel-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-devel-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-devel-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-devel-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-headers-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-headers-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-headers-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-headers-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-headers-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-headers-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-modules-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-modules-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-modules-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-modules-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-modules-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-modules-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-modules-extra-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-modules-extra-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-modules-extra-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-modules-extra-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-modules-extra-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-modules-extra-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-tools-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-tools-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-tools-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-tools-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-tools-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-tools-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-tools-libs-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-tools-libs-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-tools-libs-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-tools-libs-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-tools-libs-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-tools-libs-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:14135 Important/Sec. libarchive-3.3.3-6.el8_10.x86_64
CVE-2025-5914 Important/Sec. libarchive-3.3.3-6.el8_10.x86_64
classification Important/Sec. libarchive-3.3.3-6.el8_10.x86_64
RHSA-2025:12980 Moderate/Sec. libnsl-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. libnsl-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. libnsl-2.28-251.el8_10.25.x86_64
RHEA-2024:8852 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
CVE-2020-26154 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
RHSA-2025:13203 Moderate/Sec. libxml2-2.9.7-21.el8_10.3.x86_64
CVE-2025-32415 Moderate/Sec. libxml2-2.9.7-21.el8_10.3.x86_64
classification Moderate/Sec. libxml2-2.9.7-21.el8_10.3.x86_64
RHSA-2025:12980 Moderate/Sec. nscd-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. nscd-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. nscd-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. nss_db-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. nss_db-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. nss_db-2.28-251.el8_10.25.x86_64
RHSA-2025:14557 Important/Sec. pam-1.3.1-38.el8_10.x86_64
classification Important/Sec. pam-1.3.1-38.el8_10.x86_64
CVE-2025-6020 Important/Sec. pam-1.3.1-38.el8_10.x86_64
CVE-2025-8941 Important/Sec. pam-1.3.1-38.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. perf-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. perf-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. perf-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. perf-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. perf-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. perf-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:14560 Moderate/Sec. platform-python-3.6.8-71.el8_10.x86_64
CVE-2025-8194 Moderate/Sec. platform-python-3.6.8-71.el8_10.x86_64
classification Moderate/Sec. platform-python-3.6.8-71.el8_10.x86_64
RHSA-2025:14553 Moderate/Sec. python3-cryptography-3.2.1-8.el8_10.x86_64
CVE-2023-49083 Moderate/Sec. python3-cryptography-3.2.1-8.el8_10.x86_64
classification Moderate/Sec. python3-cryptography-3.2.1-8.el8_10.x86_64
RHSA-2025:14560 Moderate/Sec. python3-libs-3.6.8-71.el8_10.x86_64
CVE-2025-8194 Moderate/Sec. python3-libs-3.6.8-71.el8_10.x86_64
classification Moderate/Sec. python3-libs-3.6.8-71.el8_10.x86_64
RHSA-2025:13203 Moderate/Sec. python3-libxml2-2.9.7-21.el8_10.3.x86_64
CVE-2025-32415 Moderate/Sec. python3-libxml2-2.9.7-21.el8_10.3.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-21.el8_10.3.x86_64
RHSA-2025:13589 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. python3-perf-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. python3-perf-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. python3-perf-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. python3-perf-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. python3-perf-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. python3-perf-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13234 Moderate/Sec. python3-requests-2.20.0-6.el8_10.noarch
CVE-2024-47081 Moderate/Sec. python3-requests-2.20.0-6.el8_10.noarch
classification Moderate/Sec. python3-requests-2.20.0-6.el8_10.noarch
RHBA-2024:5736 bugfix ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch
CVE-2023-37920 bugfix ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch

8.10.25.08.SP6

The release date of the 8.10.25.08.SP6 security patch is 29 August 2025. The estimated run time is around 100 minutes.

Restriction: 8.10.25.08.SP6 security patch is based on RHEL 8.10, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF2.
Note: During the 8.10.25.08.SP6 security patch application, the upgrade might fail to start the mirror_registry service in some nodes:
Example:
ATTENTION : Errors encountered during upgrade operation


========================================================


Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.08.SP6_release --upgrade-directory /localrepo --phase platform


1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.08.SP6_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']


========================================================

Workaround

  1. On the failed node, run the following command to load the podman image:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Example:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Getting image source signatures
    Copying blob 7b9a3910f3c3 done
    Copying blob 9a5d14f9f550 done
    Copying blob b4592cba0628 done
    Copying blob de9819405bcf done
    Copying blob 3764c3e89288 done
    Copying config 1fd8e1b0bb done
    Writing manifest to image destination
    Storing signatures
    Loaded image: docker.io/library/registry:2.7
    [root@e1n1 install]# podman images
    REPOSITORY TAG IMAGE ID CREATED SIZE
    docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB
  2. Run the following command to restart the mirror_registry service:
    [root@e1n1 rhcos]# systemctl restart mirror-registry
  3. Restart the upgrade.
Note: During the 8.10.25.08.SP6 security patch application, the upgrade might fail with following error:
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:

Workaround

  1. On node e1n1, run the following commands:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
    
    sed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade
  2. Restart the upgrade.
  3. Once the upgrade is successfully completed, run the following command:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
The list of Red Hat CVEs, which are patched in this release:
RHSA-2025:11030 Moderate/Sec. emacs-filesystem-1:26.1-15.el8_10.noarch
CVE-2024-53920 Moderate/Sec. emacs-filesystem-1:26.1-15.el8_10.noarch
classification Moderate/Sec. emacs-filesystem-1:26.1-15.el8_10.noarch
RHSA-2025:11327 Moderate/Sec. glib2-2.56.4-166.el8_10.x86_64
CVE-2024-34397 Moderate/Sec. glib2-2.56.4-166.el8_10.x86_64
CVE-2024-52533 Moderate/Sec. glib2-2.56.4-166.el8_10.x86_64
CVE-2025-4373 Moderate/Sec. glib2-2.56.4-166.el8_10.x86_64
classification Moderate/Sec. glib2-2.56.4-166.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-core-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-core-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-core-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-core-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-core-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-core-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-core-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-core-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-core-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-core-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-core-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-debuginfo-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-debuginfo-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-debuginfo-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-debuginfo-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-debuginfo-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-debuginfo-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-debuginfo-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-debuginfo-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-debuginfo-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-debuginfo-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-debuginfo-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-devel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-devel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-devel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-devel-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-devel-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-devel-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-devel-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-devel-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-devel-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-devel-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-devel-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-headers-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-headers-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-headers-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-headers-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-headers-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-headers-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-headers-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-headers-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-headers-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-headers-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-headers-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-modules-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-modules-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-modules-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-modules-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-modules-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-modules-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-modules-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-modules-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-modules-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-modules-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-modules-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-modules-extra-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-modules-extra-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-modules-extra-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-modules-extra-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-modules-extra-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-modules-extra-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-modules-extra-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-tools-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-tools-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-tools-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-tools-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-tools-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-tools-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-tools-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-tools-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-tools-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-tools-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-tools-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-tools-libs-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-tools-libs-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-tools-libs-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-tools-libs-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-tools-libs-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-tools-libs-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-tools-libs-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10698 Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
RHEL-74345 Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-6021 Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-49794 Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-49796 Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
classification Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
RHSA-2025:12450 Important/Sec. libxml2-2.9.7-21.el8_10.2.x86_64
CVE-2025-7425 Important/Sec. libxml2-2.9.7-21.el8_10.2.x86_64
classification Important/Sec. libxml2-2.9.7-21.el8_10.2.x86_64
RHSA-2025:11035 Moderate/Sec. lz4-1.8.3-5.el8_10.x86_64
CVE-2019-17543 Moderate/Sec. lz4-1.8.3-5.el8_10.x86_64
classification Moderate/Sec. lz4-1.8.3-5.el8_10.x86_64
RHSA-2025:11035 Moderate/Sec. lz4-libs-1.8.3-5.el8_10.x86_64
CVE-2019-17543 Moderate/Sec. lz4-libs-1.8.3-5.el8_10.x86_64
classification Moderate/Sec. lz4-libs-1.8.3-5.el8_10.x86_64
RHSA-2025:10991 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
classification Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2024-28956 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2024-43420 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2024-45332 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2025-20012 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2025-20623 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2025-24495 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. perf-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. perf-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. perf-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. perf-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. perf-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
classification Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-IO-1.38-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-IO-1.38-423.el8_10.x86_64
classification Moderate/Sec. perl-IO-1.38-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-IO-Zlib-1:1.10-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-IO-Zlib-1:1.10-423.el8_10.noarch
classification Moderate/Sec. perl-IO-Zlib-1:1.10-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-Math-Complex-1.59-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-Math-Complex-1.59-423.el8_10.noarch
classification Moderate/Sec. perl-Math-Complex-1.59-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-macros-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-macros-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-macros-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11036 Moderate/Sec. platform-python-setuptools-39.2.0-9.el8_10.noarch
CVE-2025-47273 Moderate/Sec. platform-python-setuptools-39.2.0-9.el8_10.noarch
classification Moderate/Sec. platform-python-setuptools-39.2.0-9.el8_10.noarch
RHSA-2025:10698 Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
RHEL-74345 Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-6021 Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-49794 Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-49796 Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
classification Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
RHSA-2025:12450 Important/Sec. python3-libxml2-2.9.7-21.el8_10.2.x86_64
CVE-2025-7425 Important/Sec. python3-libxml2-2.9.7-21.el8_10.2.x86_64
classification Important/Sec. python3-libxml2-2.9.7-21.el8_10.2.x86_64
RHSA-2025:10669 Important/Sec. python3-perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. python3-perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. python3-perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. python3-perf-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. python3-perf-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. python3-perf-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. python3-perf-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. python3-perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. python3-perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. python3-perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. python3-perf-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:11036 Moderate/Sec. python3-setuptools-39.2.0-9.el8_10.noarch
CVE-2025-47273 Moderate/Sec. python3-setuptools-39.2.0-9.el8_10.noarch
classification Moderate/Sec. python3-setuptools-39.2.0-9.el8_10.noarch
RHSA-2025:11036 Moderate/Sec. python3-setuptools-wheel-39.2.0-9.el8_10.noarch
CVE-2025-47273 Moderate/Sec. python3-setuptools-wheel-39.2.0-9.el8_10.noarch
classification Moderate/Sec. python3-setuptools-wheel-39.2.0-9.el8_10.noarch
RHSA-2025:12010 Important/Sec. sqlite-3.26.0-20.el8_10.x86_64
CVE-2025-6965 Important/Sec. sqlite-3.26.0-20.el8_10.x86_64
classification Important/Sec. sqlite-3.26.0-20.el8_10.x86_64
RHSA-2025:12010 Important/Sec. sqlite-libs-3.26.0-20.el8_10.x86_64
CVE-2025-6965 Important/Sec. sqlite-libs-3.26.0-20.el8_10.x86_64
classification Important/Sec. sqlite-libs-3.26.0-20.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
classification Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-devel-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-devel-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-devel-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-utils-5.26.3-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-utils-5.26.3-423.el8_10.noarch
classification Moderate/Sec. perl-utils-5.26.3-423.el8_10.noarch

8.10.25.07.SP5

The release date of the 8.10.25.07.SP5 security patch is 30 July 2025. The estimated run time is around 80 minutes.

Restriction: 8.10.25.07.SP5 security patch is based on RHEL 8.10, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF2.
Note: During the 8.10.25.07.SP5 security patch application, the upgrade might fail to start the mirror_registry service in some nodes:
Example:
ATTENTION : Errors encountered during upgrade operation


========================================================


Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.07.SP5_release --upgrade-directory /localrepo --phase platform


1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.07.SP5_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']


========================================================

Workaround

  1. On the failed node, run the following command to load the podman image:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Example:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Getting image source signatures
    Copying blob 7b9a3910f3c3 done
    Copying blob 9a5d14f9f550 done
    Copying blob b4592cba0628 done
    Copying blob de9819405bcf done
    Copying blob 3764c3e89288 done
    Copying config 1fd8e1b0bb done
    Writing manifest to image destination
    Storing signatures
    Loaded image: docker.io/library/registry:2.7
    [root@e1n1 install]# podman images
    REPOSITORY TAG IMAGE ID CREATED SIZE
    docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB
  2. Run the following command to restart the mirror_registry service:
    [root@e1n1 rhcos]# systemctl restart mirror-registry
  3. Restart the upgrade.
Note: During the 8.10.25.07.SP5 security patch application, the upgrade might fail with following error:
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:

Workaround

  1. On node e1n1, run the following commands:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
    
    sed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade
  2. Restart the upgrade.
  3. Once the upgrade is successfully completed, run the following command:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
The list of Red Hat CVEs, which are patched in this release:
RHSA-2025:8686 Moderate/Sec. glibc-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-common-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-common-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-common-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-devel-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-devel-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-devel-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-headers-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-headers-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-headers-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-locale-source-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-locale-source-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.22.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-core-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-core-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-debuginfo-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-debuginfo-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-devel-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-devel-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-headers-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-headers-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-modules-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-modules-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-modules-extra-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-modules-extra-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-tools-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-tools-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-tools-libs-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-tools-libs-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8686 Moderate/Sec. libnsl-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. libnsl-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. libnsl-2.28-251.el8_10.22.x86_64
RHSA-2025:8958 Moderate/Sec. libxml2-2.9.7-20.el8_10.x86_64
CVE-2025-32414 (RHSA-2025:8958) Moderate/Sec. libxml2-2.9.7-20.el8_10.x86_64
classification Moderate/Sec. libxml2-2.9.7-20.el8_10.x86_64
RHSA-2025:8676 Moderate/Sec. libxslt-1.1.32-6.2.el8_10.x86_64
CVE-2023-40403 (RHSA-2025:8676) Moderate/Sec. libxslt-1.1.32-6.2.el8_10.x86_64
classification Moderate/Sec. libxslt-1.1.32-6.2.el8_10.x86_64
RHSA-2025:8686 Moderate/Sec. nscd-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. nscd-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. nscd-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 (RHSA-2025:8686) Moderate/Sec. nss_db-2.28-251.el8_10.22.x86_64
CVE-2025-4802 Moderate/Sec. nss_db-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. nss_db-2.28-251.el8_10.22.x86_64
RHSA-2025:10027 Important/Sec. pam-1.3.1-37.el8_10.x86_64
CVE-2025-6020 (RHSA-2025:10027) Important/Sec. pam-1.3.1-37.el8_10.x86_64
classification Important/Sec. pam-1.3.1-37.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. perf-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. perf-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:10128 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2024-12718 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4138 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4330 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4435 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4517 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
classification Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
RHSA-2025:10128 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2024-12718 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4138 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4330 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4435 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4517 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
classification Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
RHSA-2025:8958 Moderate/Sec. python3-libxml2-2.9.7-20.el8_10.x86_64
CVE-2025-32414 Moderate/Sec. python3-libxml2-2.9.7-20.el8_10.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-20.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. python3-perf-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. python3-perf-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:10110 Important/Sec. sudo-1.9.5p2-1.el8_10.1.x86_64
CVE-2025-32462 (RHSA-2025:10110) Important/Sec. sudo-1.9.5p2-1.el8_10.1.x86_64
classification Important/Sec. sudo-1.9.5p2-1.el8_10.1.x86_64
RHSA-2025:10128 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2024-12718 (RHSA-2025:10128) Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4138 (RHSA-2025:10128) Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4330 (RHSA-2025:10128) Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4435 (RHSA-2025:10128) Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4517 (RHSA-2025:10128) Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
classification Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
RHSA-2025:10128 Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
CVE-2024-12718 (RHSA-2025:10128) Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
CVE-2025-4138 (RHSA-2025:10128) Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
CVE-2025-4330 (RHSA-2025:10128) Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
CVE-2025-4435 (RHSA-2025:10128) Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
CVE-2025-4517 (RHSA-2025:10128) Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
classification Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
RHSA-2025:10128 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2024-12718 (RHSA-2025:10128) Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4138 (RHSA-2025:10128) Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4330 (RHSA-2025:10128) Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4435 (RHSA-2025:10128) Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4517 (RHSA-2025:10128) Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
classification Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64

8.10.25.06.SP4

The release date of the 8.10.25.06.SP4 security patch is 27 June 2025. The estimated run time is around 90 minutes.

Restriction: 8.10.25.06.SP4 security patch is based on RHEL 8.10, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF2.
Note: During the 8.10.25.06.SP4 security patch application, the upgrade might fail to start the mirror_registry service in some nodes:
Example:
ATTENTION : Errors encountered during upgrade operation


========================================================


Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.06.SP4_release --upgrade-directory /localrepo --phase platform


1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.06.SP4_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']


========================================================

Workaround

  1. On the failed node, run the following command to load the podman image:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Example:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Getting image source signatures
    Copying blob 7b9a3910f3c3 done
    Copying blob 9a5d14f9f550 done
    Copying blob b4592cba0628 done
    Copying blob de9819405bcf done
    Copying blob 3764c3e89288 done
    Copying config 1fd8e1b0bb done
    Writing manifest to image destination
    Storing signatures
    Loaded image: docker.io/library/registry:2.7
    [root@e1n1 install]# podman images
    REPOSITORY TAG IMAGE ID CREATED SIZE
    docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB
  2. Run the following command to restart the mirror_registry service:
    [root@e1n1 rhcos]# systemctl restart mirror-registry
  3. Restart the upgrade.
Note: During the 8.10.25.06.SP4 security patch application, the upgrade might fail with following error:
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:

Workaround

  1. On node e1n1, run the following commands:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
    
    sed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade
  2. Restart the upgrade.
  3. Once the upgrade is successfully completed, run the following command:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
The list of Red Hat CVEs, which are patched in this release:
RHSA-2025:7531 Important/Sec. kernel-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-core-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-core-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-core-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-core-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-core-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-core-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-core-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-core-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-core-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-core-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-debuginfo-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-debuginfo-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-debuginfo-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-debuginfo-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-debuginfo-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-debuginfo-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-debuginfo-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-debuginfo-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-debuginfo-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-debuginfo-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-devel-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-devel-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-devel-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-devel-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-devel-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-devel-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-devel-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-devel-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-devel-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-devel-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-headers-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-headers-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-headers-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-headers-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-headers-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-headers-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-headers-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-headers-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-headers-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-headers-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-modules-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-modules-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-modules-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-modules-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-modules-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-modules-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-modules-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-modules-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-modules-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-modules-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-modules-extra-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-modules-extra-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-tools-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-tools-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-tools-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-tools-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-tools-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-tools-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-tools-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-tools-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-tools-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-tools-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-tools-libs-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-tools-libs-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. krb5-devel-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. krb5-devel-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. krb5-devel-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. krb5-devel-1.18.2-32.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. krb5-libs-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. krb5-libs-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. krb5-libs-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. krb5-libs-1.18.2-32.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. krb5-pkinit-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. krb5-pkinit-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. krb5-pkinit-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. krb5-pkinit-1.18.2-32.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. krb5-server-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. krb5-server-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. krb5-server-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. krb5-server-1.18.2-32.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. krb5-workstation-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. krb5-workstation-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. krb5-workstation-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. krb5-workstation-1.18.2-32.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. libkadm5-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. libkadm5-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. libkadm5-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. libkadm5-1.18.2-32.el8_10.x86_64
RHSA-2025:4560 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32050 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32052 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32053 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32906 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32911 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32913 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-46420 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-46421 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
classification Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
RHSA-2025:8132 Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
CVE-2025-2784 Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
CVE-2025-4948 Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
CVE-2025-32049 Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
CVE-2025-32914 Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
classification Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
RHSA-2025:7531 Important/Sec. perf-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. perf-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. perf-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. perf-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. perf-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. perf-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. python3-perf-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. python3-perf-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. python3-perf-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. python3-perf-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. python3-perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. python3-perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. python3-perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. python3-perf-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. python3-perf-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. python3-perf-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:8395 Low/Sec. rsync-3.1.3-23.el8_10.x86_64
CVE-2016-9840 Low/Sec. rsync-3.1.3-23.el8_10.x86_64
classification Low/Sec. rsync-3.1.3-23.el8_10.x86_64
RHSA-2025:8395 Low/Sec. rsync-daemon-3.1.3-23.el8_10.noarch
CVE-2016-9840 Low/Sec. rsync-daemon-3.1.3-23.el8_10.noarch
classification Low/Sec. rsync-daemon-3.1.3-23.el8_10.noarch

8.10.25.05.SP3

The release date of the 8.10.25.05.SP3 security patch is 30 May 2025. The estimated run time is around 80 minutes.

Restriction: 8.10.25.05.SP3 security patch is based on RHEL 8.10, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF2.
Note: During the 8.10.25.05.SP3 security patch application, the upgrade might fail to start the mirror_registry service in some nodes:
Example:
ATTENTION : Errors encountered during upgrade operation


========================================================


Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.05.SP3_release --upgrade-directory /localrepo --phase platform


1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.05.SP3_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']


========================================================

Workaround

  1. On the failed node, run the following command to load the podman image:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Example:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Getting image source signatures
    Copying blob 7b9a3910f3c3 done
    Copying blob 9a5d14f9f550 done
    Copying blob b4592cba0628 done
    Copying blob de9819405bcf done
    Copying blob 3764c3e89288 done
    Copying config 1fd8e1b0bb done
    Writing manifest to image destination
    Storing signatures
    Loaded image: docker.io/library/registry:2.7
    [root@e1n1 install]# podman images
    REPOSITORY TAG IMAGE ID CREATED SIZE
    docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB
  2. Run the following command to restart the mirror_registry service:
    [root@e1n1 rhcos]# systemctl restart mirror-registry
  3. Restart the upgrade.
Note: During the 8.10.25.05.SP3 security patch application, the upgrade might fail with following error:
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:

Workaround

  1. On node e1n1, run the following commands:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
    
    sed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade
  2. Restart the upgrade.
  3. Once the upgrade is successfully completed, run the following command:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
The list of Red Hat CVEs, which are patched in this release:
RHSA-2025:3913 Moderate/Sec. expat-2.2.5-17.el8_10.x86_64
CVE-2024-8176 (RHSA-2025:3913) Moderate/Sec. expat-2.2.5-17.el8_10.x86_64
classification Moderate/Sec. expat-2.2.5-17.el8_10.x86_64
RHSA-2025:4362 Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2020-27792 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2023-46751 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2024-46951 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2024-46952 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2024-46953 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2024-46954 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2024-46956 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
classification Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
RHSA-2025:4051 Moderate/Sec. gnutls-3.6.16-8.el8_10.3.x86_64
CVE-2024-12243 (RHSA-2025:4051) Moderate/Sec. gnutls-3.6.16-8.el8_10.3.x86_64
classification Moderate/Sec. gnutls-3.6.16-8.el8_10.3.x86_64
RHSA-2025:4051 Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.3.x86_64
CVE-2024-12243 (RHSA-2025:4051) Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.3.x86_64
classification Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.3.x86_64
RHSA-2025:4051 Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.3.x86_64
CVE-2024-12243 (RHSA-2025:4051) Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.3.x86_64
classification Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.3.x86_64
RHSA-2025:4051 Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.3.x86_64
CVE-2024-12243 (RHSA-2025:4051) Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.3.x86_64
classification Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.3.x86_64
RHSA-2025:3845 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-21587 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-30691 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-30698 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.452.b09-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.452.b09-2.el8.x86_64
RHSA-2025:3845 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-21587 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-30691 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-30698 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.452.b09-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.452.b09-2.el8.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-core-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-core-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-core-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-debuginfo-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-debuginfo-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-debuginfo-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-devel-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-devel-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-devel-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-headers-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-headers-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-headers-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-modules-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-modules-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-modules-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-modules-extra-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-modules-extra-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-modules-extra-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-tools-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-tools-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-tools-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-tools-libs-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-tools-libs-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-tools-libs-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:4362 Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2020-27792 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2023-46751 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2024-46951 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2024-46952 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2024-46953 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2024-46954 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2024-46956 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
classification Moderate/Sec. libgs-9.27-16.el8_10.x86_64
RHSA-2025:4049 Moderate/Sec. libtasn1-4.13-5.el8_10.x86_64
CVE-2024-12133 (RHSA-2025:4049) Moderate/Sec. libtasn1-4.13-5.el8_10.x86_64
classification Moderate/Sec. libtasn1-4.13-5.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. perf-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. perf-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. perf-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. python3-perf-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. python3-perf-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. python3-perf-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:4048 Moderate/Sec. xmlrpc-c-1.51.0-11.el8_10.x86_64
CVE-2024-8176 (RHSA-2025:4048) Moderate/Sec. xmlrpc-c-1.51.0-11.el8_10.x86_64
classification Moderate/Sec. xmlrpc-c-1.51.0-11.el8_10.x86_64
RHSA-2025:4048 Moderate/Sec. xmlrpc-c-client-1.51.0-11.el8_10.x86_64
CVE-2024-8176 (RHSA-2025:4048) Moderate/Sec. xmlrpc-c-client-1.51.0-11.el8_10.x86_64
classification Moderate/Sec. xmlrpc-c-client-1.51.0-11.el8_10.x86_64

8.10.25.04.SP2

The release date of the 8.10.25.04.SP2 security patch is 12 May 2025. The estimated run time is around 80 minutes.

Restriction: 8.10.25.04.SP2 security patch is based on RHEL 8.10, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF2.
Note: During the 8.10.25.04.SP2 security patch application, the upgrade might fail to start the mirror_registry service in some nodes:
Example:
ATTENTION : Errors encountered during upgrade operation


========================================================


Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.04.SP2_release --upgrade-directory /localrepo --phase platform


1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.04.SP2_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']


========================================================

Workaround

  1. On the failed node, run the following command to load the podman image:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Example:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Getting image source signatures
    Copying blob 7b9a3910f3c3 done
    Copying blob 9a5d14f9f550 done
    Copying blob b4592cba0628 done
    Copying blob de9819405bcf done
    Copying blob 3764c3e89288 done
    Copying config 1fd8e1b0bb done
    Writing manifest to image destination
    Storing signatures
    Loaded image: docker.io/library/registry:2.7
    [root@e1n1 install]# podman images
    REPOSITORY TAG IMAGE ID CREATED SIZE
    docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB
  2. Run the following command to restart the mirror_registry service:
    [root@e1n1 rhcos]# systemctl restart mirror-registry
  3. Restart the upgrade.
Note: During the 8.10.25.04.SP2 security patch application, the upgrade might fail with following error:
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:

Workaround

  1. On node e1n1, run the following commands:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
    
    sed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade
  2. Restart the upgrade.
  3. Once the upgrade is successfully completed, run the following command:
    sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
The list of Red Hat CVEs, which are patched in this release:
RHBA-2024:5736 bugfix ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch
CVE-2023-37920 bugfix ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch
RHSA-2025:3828 Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.16.x86_64
RHSA-2025:3210 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22931+799fd806.noarch
CVE-2025-22869 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22931+799fd806.noarch
classification Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22931+799fd806.noarch
RHSA-2025:3210 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. containers-common-2:1-82.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. containers-common-2:1-82.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. containers-common-2:1-82.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. criu-3.18-5.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. criu-3.18-5.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. criu-3.18-5.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. criu-libs-3.18-5.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. crun-1.14.3-2.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. crun-1.14.3-2.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. crun-1.14.3-2.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3421 Important/Sec. freetype-2.9.1-10.el8_10.x86_64
CVE-2025-27363 Important/Sec. freetype-2.9.1-10.el8_10.x86_64
classification Important/Sec. freetype-2.9.1-10.el8_10.x86_64
RHSA-2025:3210 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-common-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-common-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-common-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-common-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-devel-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-devel-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-devel-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-devel-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-headers-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-headers-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-headers-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-headers-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-locale-source-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.16.x86_64
RHSA-2025:3367 Important/Sec. grub2-common-1:2.02-162.el8_10.noarch
CVE-2025-0624 Important/Sec. grub2-common-1:2.02-162.el8_10.noarch
classification Important/Sec. grub2-common-1:2.02-162.el8_10.noarch
RHSA-2025:3367 Important/Sec. grub2-pc-1:2.02-162.el8_10.x86_64
CVE-2025-0624 Important/Sec. grub2-pc-1:2.02-162.el8_10.x86_64
classification Important/Sec. grub2-pc-1:2.02-162.el8_10.x86_64
RHSA-2025:3367 Important/Sec. grub2-pc-modules-1:2.02-162.el8_10.noarch
CVE-2025-0624 Important/Sec. grub2-pc-modules-1:2.02-162.el8_10.noarch
classification Important/Sec. grub2-pc-modules-1:2.02-162.el8_10.noarch
RHSA-2025:3367 Important/Sec. grub2-tools-1:2.02-162.el8_10.x86_64
CVE-2025-0624 Important/Sec. grub2-tools-1:2.02-162.el8_10.x86_64
classification Important/Sec. grub2-tools-1:2.02-162.el8_10.x86_64
RHSA-2025:3367 Important/Sec. grub2-tools-efi-1:2.02-162.el8_10.x86_64
CVE-2025-0624 Important/Sec. grub2-tools-efi-1:2.02-162.el8_10.x86_64
classification Important/Sec. grub2-tools-efi-1:2.02-162.el8_10.x86_64
RHSA-2025:3367 Important/Sec. grub2-tools-extra-1:2.02-162.el8_10.x86_64
CVE-2025-0624 Important/Sec. grub2-tools-extra-1:2.02-162.el8_10.x86_64
classification Important/Sec. grub2-tools-extra-1:2.02-162.el8_10.x86_64
RHSA-2025:3367 Important/Sec. grub2-tools-minimal-1:2.02-162.el8_10.x86_64
CVE-2025-0624 Important/Sec. grub2-tools-minimal-1:2.02-162.el8_10.x86_64
classification Important/Sec. grub2-tools-minimal-1:2.02-162.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-core-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-core-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-core-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-core-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-debuginfo-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-debuginfo-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-debuginfo-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-debuginfo-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-devel-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-devel-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-devel-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-devel-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-headers-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-headers-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-headers-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-headers-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-modules-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-modules-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-modules-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-modules-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-modules-extra-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-modules-extra-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-modules-extra-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-modules-extra-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-tools-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-tools-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-tools-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-tools-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-tools-libs-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-tools-libs-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-tools-libs-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-tools-libs-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. krb5-devel-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. krb5-devel-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. krb5-devel-1.18.2-31.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. krb5-libs-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. krb5-libs-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. krb5-libs-1.18.2-31.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. krb5-pkinit-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. krb5-pkinit-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. krb5-pkinit-1.18.2-31.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. krb5-server-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. krb5-server-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. krb5-server-1.18.2-31.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. krb5-workstation-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. krb5-workstation-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. krb5-workstation-1.18.2-31.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. libkadm5-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. libkadm5-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. libkadm5-1.18.2-31.el8_10.x86_64
RHSA-2025:3828 Moderate/Sec. libnsl-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. libnsl-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. libnsl-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. libnsl-2.28-251.el8_10.16.x86_64
RHEA-2024:8852 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
CVE-2020-26154 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
RHSA-2025:3210 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:2686 Important/Sec. libxml2-2.9.7-19.el8_10.x86_64
CVE-2024-56171 Important/Sec. libxml2-2.9.7-19.el8_10.x86_64
CVE-2025-24928 Important/Sec. libxml2-2.9.7-19.el8_10.x86_64
classification Important/Sec. libxml2-2.9.7-19.el8_10.x86_64
RHSA-2025:3615 Important/Sec. libxslt-1.1.32-6.1.el8_10.x86_64
CVE-2024-55549 Important/Sec. libxslt-1.1.32-6.1.el8_10.x86_64
CVE-2025-24855 Important/Sec. libxslt-1.1.32-6.1.el8_10.x86_64
classification Important/Sec. libxslt-1.1.32-6.1.el8_10.x86_64
RHEA-2023:4995 enhancement microcode_ctl-4:20220809-2.20230808.2.el8_8.x86_64
CVE-2022-41804 enhancement microcode_ctl-4:20220809-2.20230808.2.el8_8.x86_64
RHEA-2023:7117 enhancement microcode_ctl-4:20230808-2.el8.x86_64
ref_0 enhancement microcode_ctl-4:20230808-2.el8.x86_64
CVE-2022-21216 enhancement microcode_ctl-4:20230808-2.el8.x86_64
CVE-2022-33196 enhancement microcode_ctl-4:20230808-2.el8.x86_64
RHSA-2025:3828 Moderate/Sec. nscd-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. nscd-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. nscd-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. nscd-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. nss_db-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. nss_db-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. nss_db-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. nss_db-2.28-251.el8_10.16.x86_64
RHSA-2025:2473 Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. perf-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. perf-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. perf-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. perf-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:3210 Important/Sec. podman-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. podman-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. podman-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. podman-catatonit-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. podman-catatonit-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. podman-catatonit-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. podman-gvproxy-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. podman-gvproxy-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. podman-gvproxy-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. podman-plugins-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. podman-plugins-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. podman-plugins-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3388 Important/Sec. python3-jinja2-2.10.1-7.el8_10.noarch
CVE-2025-27516 Important/Sec. python3-jinja2-2.10.1-7.el8_10.noarch
classification Important/Sec. python3-jinja2-2.10.1-7.el8_10.noarch
RHSA-2025:2686 Important/Sec. python3-libxml2-2.9.7-19.el8_10.x86_64
CVE-2024-56171 Important/Sec. python3-libxml2-2.9.7-19.el8_10.x86_64
CVE-2025-24928 Important/Sec. python3-libxml2-2.9.7-19.el8_10.x86_64
classification Important/Sec. python3-libxml2-2.9.7-19.el8_10.x86_64
RHSA-2025:2473 Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. python3-perf-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. python3-perf-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. python3-perf-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. python3-perf-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2600 Moderate/Sec. rsync-3.1.3-21.el8_10.x86_64
CVE-2024-12087 Moderate/Sec. rsync-3.1.3-21.el8_10.x86_64
CVE-2024-12088 Moderate/Sec. rsync-3.1.3-21.el8_10.x86_64
CVE-2024-12747 Moderate/Sec. rsync-3.1.3-21.el8_10.x86_64
classification Moderate/Sec. rsync-3.1.3-21.el8_10.x86_64
RHSA-2025:2600 Moderate/Sec. rsync-daemon-3.1.3-21.el8_10.noarch
CVE-2024-12087 Moderate/Sec. rsync-daemon-3.1.3-21.el8_10.noarch
CVE-2024-12088 Moderate/Sec. rsync-daemon-3.1.3-21.el8_10.noarch
CVE-2024-12747 Moderate/Sec. rsync-daemon-3.1.3-21.el8_10.noarch
classification Moderate/Sec. rsync-daemon-3.1.3-21.el8_10.noarch
RHSA-2025:3210 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22931+799fd806.x86_64

8.10.25.03.SP1

The release date of the 8.10.25.03.SP1 security patch is 10 April 2025. The estimated run time is around 80 minutes.

Restriction: 8.10.25.03.SP1 security patch is based on RHEL 8.10, and it can only be installed on Cloud Pak for Data System version 2.0.2.1 IF1.
Note: During the 8.10.25.03.SP1 security patch application, the upgrade might fail to start the mirror_registry service in some nodes:
Example:
ATTENTION : Errors encountered during upgrade operation


========================================================


Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.03.SP1_release --upgrade-directory /localrepo --phase platform


1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.03.SP1_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']


========================================================

Workaround

  1. On the failed node, run the following command to load the podman image:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Example:
    [root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz
    Getting image source signatures
    Copying blob 7b9a3910f3c3 done
    Copying blob 9a5d14f9f550 done
    Copying blob b4592cba0628 done
    Copying blob de9819405bcf done
    Copying blob 3764c3e89288 done
    Copying config 1fd8e1b0bb done
    Writing manifest to image destination
    Storing signatures
    Loaded image: docker.io/library/registry:2.7
    [root@e1n1 install]# podman images
    REPOSITORY TAG IMAGE ID CREATED SIZE
    docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB
  2. Run the following command to restart the mirror_registry service:
    [root@e1n1 rhcos]# systemctl restart mirror-registry
  3. Restart the upgrade.
The list of Red Hat CVEs, which are patched in this release:
RHSA-2025:0288  Moderate/Sec.  NetworkManager-1:1.40.16-18.el8_10.x86_64
RHEL-73052      Moderate/Sec.  NetworkManager-1:1.40.16-18.el8_10.x86_64
CVE-2024-3661   Moderate/Sec.  NetworkManager-1:1.40.16-18.el8_10.x86_64
classification  Moderate/Sec.  NetworkManager-1:1.40.16-18.el8_10.x86_64
RHSA-2025:0288  Moderate/Sec.  NetworkManager-config-server-1:1.40.16-18.el8_10.noarch
RHEL-73052      Moderate/Sec.  NetworkManager-config-server-1:1.40.16-18.el8_10.noarch
CVE-2024-3661   Moderate/Sec.  NetworkManager-config-server-1:1.40.16-18.el8_10.noarch
classification  Moderate/Sec.  NetworkManager-config-server-1:1.40.16-18.el8_10.noarch
RHSA-2025:0288  Moderate/Sec.  NetworkManager-dispatcher-routing-rules-1:1.40.16-18.el8_10.noarch
RHEL-73052      Moderate/Sec.  NetworkManager-dispatcher-routing-rules-1:1.40.16-18.el8_10.noarch
CVE-2024-3661   Moderate/Sec.  NetworkManager-dispatcher-routing-rules-1:1.40.16-18.el8_10.noarch
classification  Moderate/Sec.  NetworkManager-dispatcher-routing-rules-1:1.40.16-18.el8_10.noarch
RHSA-2025:0288  Moderate/Sec.  NetworkManager-initscripts-updown-1:1.40.16-18.el8_10.noarch
RHEL-73052      Moderate/Sec.  NetworkManager-initscripts-updown-1:1.40.16-18.el8_10.noarch
CVE-2024-3661   Moderate/Sec.  NetworkManager-initscripts-updown-1:1.40.16-18.el8_10.noarch
classification  Moderate/Sec.  NetworkManager-initscripts-updown-1:1.40.16-18.el8_10.noarch
RHSA-2025:0288  Moderate/Sec.  NetworkManager-libnm-1:1.40.16-18.el8_10.x86_64
RHEL-73052      Moderate/Sec.  NetworkManager-libnm-1:1.40.16-18.el8_10.x86_64
CVE-2024-3661   Moderate/Sec.  NetworkManager-libnm-1:1.40.16-18.el8_10.x86_64
classification  Moderate/Sec.  NetworkManager-libnm-1:1.40.16-18.el8_10.x86_64
RHSA-2025:0288  Moderate/Sec.  NetworkManager-team-1:1.40.16-18.el8_10.x86_64
RHEL-73052      Moderate/Sec.  NetworkManager-team-1:1.40.16-18.el8_10.x86_64
CVE-2024-3661   Moderate/Sec.  NetworkManager-team-1:1.40.16-18.el8_10.x86_64
classification  Moderate/Sec.  NetworkManager-team-1:1.40.16-18.el8_10.x86_64
RHSA-2025:0288  Moderate/Sec.  NetworkManager-tui-1:1.40.16-18.el8_10.x86_64
RHEL-73052      Moderate/Sec.  NetworkManager-tui-1:1.40.16-18.el8_10.x86_64
CVE-2024-3661   Moderate/Sec.  NetworkManager-tui-1:1.40.16-18.el8_10.x86_64
classification  Moderate/Sec.  NetworkManager-tui-1:1.40.16-18.el8_10.x86_64
RHSA-2025:1675  Important/Sec. bind-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187  Important/Sec. bind-32:9.11.36-16.el8_10.4.x86_64
classification  Important/Sec. bind-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675  Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187  Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.4.x86_64
classification  Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675  Important/Sec. bind-libs-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187  Important/Sec. bind-libs-32:9.11.36-16.el8_10.4.x86_64
classification  Important/Sec. bind-libs-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675  Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187  Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.4.x86_64
classification  Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675  Important/Sec. bind-license-32:9.11.36-16.el8_10.4.noarch
CVE-2024-11187  Important/Sec. bind-license-32:9.11.36-16.el8_10.4.noarch
classification  Important/Sec. bind-license-32:9.11.36-16.el8_10.4.noarch
RHSA-2025:1675  Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187  Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.4.x86_64
classification  Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675  Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187  Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.4.x86_64
classification  Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675  Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187  Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.4.x86_64
classification  Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675  Important/Sec. bind-utils-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187  Important/Sec. bind-utils-32:9.11.36-16.el8_10.4.x86_64
classification  Important/Sec. bind-utils-32:9.11.36-16.el8_10.4.x86_64
RHSA-2023:6236  Moderate/Sec.  binutils-2.30-119.el8_8.2.x86_64
CVE-2022-4285   Moderate/Sec.  binutils-2.30-119.el8_8.2.x86_64
classification  Moderate/Sec.  binutils-2.30-119.el8_8.2.x86_64
RHSA-2024:9689  Low/Sec.       binutils-2.30-125.el8_10.x86_64
CVE-2018-12699  Low/Sec.       binutils-2.30-125.el8_10.x86_64
classification  Low/Sec.       binutils-2.30-125.el8_10.x86_64
RHSA-2024:8922  Low/Sec.       bzip2-1.0.6-27.el8_10.x86_64
CVE-2019-12900  Low/Sec.       bzip2-1.0.6-27.el8_10.x86_64
classification  Low/Sec.       bzip2-1.0.6-27.el8_10.x86_64
RHSA-2025:0733  Moderate/Sec.  bzip2-1.0.6-28.el8_10.x86_64
RHEL-67824      Moderate/Sec.  bzip2-1.0.6-28.el8_10.x86_64
CVE-2019-12900  Moderate/Sec.  bzip2-1.0.6-28.el8_10.x86_64
classification  Moderate/Sec.  bzip2-1.0.6-28.el8_10.x86_64
RHSA-2024:8922  Low/Sec.       bzip2-libs-1.0.6-27.el8_10.x86_64
CVE-2019-12900  Low/Sec.       bzip2-libs-1.0.6-27.el8_10.x86_64
classification  Low/Sec.       bzip2-libs-1.0.6-27.el8_10.x86_64
RHSA-2025:0733  Moderate/Sec.  bzip2-libs-1.0.6-28.el8_10.x86_64
RHEL-67824      Moderate/Sec.  bzip2-libs-1.0.6-28.el8_10.x86_64
CVE-2019-12900  Moderate/Sec.  bzip2-libs-1.0.6-28.el8_10.x86_64
classification  Moderate/Sec.  bzip2-libs-1.0.6-28.el8_10.x86_64
RHSA-2024:8846  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865      Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
classification  Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:8846  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22397+e3c95ba6.noarch
CVE-2024-9341   Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22397+e3c95ba6.noarch
CVE-2024-9407   Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22397+e3c95ba6.noarch
CVE-2024-9675   Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22397+e3c95ba6.noarch
classification  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22397+e3c95ba6.noarch
RHSA-2024:10289 Moderate/Sec.  container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
CVE-2021-4024   Moderate/Sec.  container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
CVE-2021-33198  Moderate/Sec.  container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
CVE-2024-9676   Moderate/Sec.  container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
classification  Moderate/Sec.  container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
RHSA-2025:1372  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
RHEL-74865      Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
CVE-2024-11218  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
classification  Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
RHSA-2024:8846  Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865      Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218  Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
classification  Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:8846  Important/Sec. containers-common-2:1-82.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. containers-common-2:1-82.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. containers-common-2:1-82.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. containers-common-2:1-82.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. containers-common-2:1-82.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865      Important/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218  Important/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
classification  Important/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1301  Moderate/Sec.  cpp-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  cpp-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  cpp-8.5.0-23.el8_10.x86_64
RHSA-2024:8846  Important/Sec. criu-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. criu-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. criu-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. criu-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. criu-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865      Important/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218  Important/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
classification  Important/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:8846  Important/Sec. criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865      Important/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218  Important/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
classification  Important/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:8846  Important/Sec. crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865      Important/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218  Important/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
classification  Important/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:0083  Low/Sec.       cups-1:2.2.6-62.el8_10.x86_64
CVE-2024-47175  Low/Sec.       cups-1:2.2.6-62.el8_10.x86_64
classification  Low/Sec.       cups-1:2.2.6-62.el8_10.x86_64
ref_0           Low/Sec.       cups-1:2.2.6-62.el8_10.x86_64
RHSA-2025:0083  Low/Sec.       cups-client-1:2.2.6-62.el8_10.x86_64
CVE-2024-47175  Low/Sec.       cups-client-1:2.2.6-62.el8_10.x86_64
classification  Low/Sec.       cups-client-1:2.2.6-62.el8_10.x86_64
ref_0           Low/Sec.       cups-client-1:2.2.6-62.el8_10.x86_64
RHSA-2025:0083  Low/Sec.       cups-filesystem-1:2.2.6-62.el8_10.noarch
CVE-2024-47175  Low/Sec.       cups-filesystem-1:2.2.6-62.el8_10.noarch
classification  Low/Sec.       cups-filesystem-1:2.2.6-62.el8_10.noarch
ref_0           Low/Sec.       cups-filesystem-1:2.2.6-62.el8_10.noarch
RHSA-2025:0083  Low/Sec.       cups-ipptool-1:2.2.6-62.el8_10.x86_64
CVE-2024-47175  Low/Sec.       cups-ipptool-1:2.2.6-62.el8_10.x86_64
classification  Low/Sec.       cups-ipptool-1:2.2.6-62.el8_10.x86_64
ref_0           Low/Sec.       cups-ipptool-1:2.2.6-62.el8_10.x86_64
RHSA-2025:0083  Low/Sec.       cups-libs-1:2.2.6-62.el8_10.x86_64
CVE-2024-47175  Low/Sec.       cups-libs-1:2.2.6-62.el8_10.x86_64
classification  Low/Sec.       cups-libs-1:2.2.6-62.el8_10.x86_64
ref_0           Low/Sec.       cups-libs-1:2.2.6-62.el8_10.x86_64
RHSA-2023:4498  Moderate/Sec.  dbus-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969  Moderate/Sec.  dbus-1:1.12.8-24.el8_8.1.x86_64
classification  Moderate/Sec.  dbus-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498  Moderate/Sec.  dbus-common-1:1.12.8-24.el8_8.1.noarch
CVE-2023-34969  Moderate/Sec.  dbus-common-1:1.12.8-24.el8_8.1.noarch
classification  Moderate/Sec.  dbus-common-1:1.12.8-24.el8_8.1.noarch
RHSA-2023:4498  Moderate/Sec.  dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969  Moderate/Sec.  dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
classification  Moderate/Sec.  dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498  Moderate/Sec.  dbus-libs-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969  Moderate/Sec.  dbus-libs-1:1.12.8-24.el8_8.1.x86_64
classification  Moderate/Sec.  dbus-libs-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498  Moderate/Sec.  dbus-tools-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969  Moderate/Sec.  dbus-tools-1:1.12.8-24.el8_8.1.x86_64
classification  Moderate/Sec.  dbus-tools-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:5252  Moderate/Sec.  dmidecode-1:3.3-4.el8_8.1.x86_64
CVE-2023-30630  Moderate/Sec.  dmidecode-1:3.3-4.el8_8.1.x86_64
classification  Moderate/Sec.  dmidecode-1:3.3-4.el8_8.1.x86_64
RHSA-2023:4706  Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
CVE-2023-3899   Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
classification  Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
RHSA-2024:11185 Moderate/Sec.  edk2-ovmf-20220126gitbb1bba3d77-13.el8_10.4.noarch
CVE-2024-38796  Moderate/Sec.  edk2-ovmf-20220126gitbb1bba3d77-13.el8_10.4.noarch
classification  Moderate/Sec.  edk2-ovmf-20220126gitbb1bba3d77-13.el8_10.4.noarch
RHSA-2025:1917  Important/Sec. emacs-filesystem-1:26.1-13.el8_10.noarch
CVE-2025-1244   Important/Sec. emacs-filesystem-1:26.1-13.el8_10.noarch
classification  Important/Sec. emacs-filesystem-1:26.1-13.el8_10.noarch
RHSA-2024:9502  Moderate/Sec.  expat-2.2.5-16.el8_10.x86_64
CVE-2024-50602  Moderate/Sec.  expat-2.2.5-16.el8_10.x86_64
classification  Moderate/Sec.  expat-2.2.5-16.el8_10.x86_64
RHSA-2023:5046  Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
CVE-2020-22219  Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
classification  Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
RHSA-2024:8846  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865      Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
classification  Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1301  Moderate/Sec.  gcc-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  gcc-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  gcc-8.5.0-23.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  gcc-c++-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  gcc-c++-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  gcc-c++-8.5.0-23.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  gcc-gdb-plugin-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  gcc-gdb-plugin-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  gcc-gdb-plugin-8.5.0-23.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  gcc-plugin-annobin-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  gcc-plugin-annobin-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  gcc-plugin-annobin-8.5.0-23.el8_10.x86_64
RHSA-2024:3214  Moderate/Sec.  gmp-1:6.1.2-11.el8.x86_64
CVE-2021-43618  Moderate/Sec.  gmp-1:6.1.2-11.el8.x86_64
classification  Moderate/Sec.  gmp-1:6.1.2-11.el8.x86_64
ref_0           Moderate/Sec.  gmp-1:6.1.2-11.el8.x86_64
RHSA-2024:3214  Moderate/Sec.  gmp-c++-1:6.1.2-11.el8.x86_64
CVE-2021-43618  Moderate/Sec.  gmp-c++-1:6.1.2-11.el8.x86_64
classification  Moderate/Sec.  gmp-c++-1:6.1.2-11.el8.x86_64
ref_0           Moderate/Sec.  gmp-c++-1:6.1.2-11.el8.x86_64
RHSA-2024:9056  Moderate/Sec.  gstreamer1-plugins-base-1.16.1-4.el8_10.x86_64
CVE-2024-4453   Moderate/Sec.  gstreamer1-plugins-base-1.16.1-4.el8_10.x86_64
classification  Moderate/Sec.  gstreamer1-plugins-base-1.16.1-4.el8_10.x86_64
RHSA-2024:11345 Important/Sec. gstreamer1-plugins-base-1.16.1-5.el8_10.x86_64
CVE-2024-47538  Important/Sec. gstreamer1-plugins-base-1.16.1-5.el8_10.x86_64
CVE-2024-47607  Important/Sec. gstreamer1-plugins-base-1.16.1-5.el8_10.x86_64
CVE-2024-47615  Important/Sec. gstreamer1-plugins-base-1.16.1-5.el8_10.x86_64
classification  Important/Sec. gstreamer1-plugins-base-1.16.1-5.el8_10.x86_64
RHSA-2024:8849  Moderate/Sec.  haproxy-1.8.27-5.el8_10.1.x86_64
CVE-2023-45539  Moderate/Sec.  haproxy-1.8.27-5.el8_10.1.x86_64
classification  Moderate/Sec.  haproxy-1.8.27-5.el8_10.1.x86_64
RHSA-2025:0168  Important/Sec. iperf3-3.5-11.el8_10.x86_64
CVE-2024-53580  Important/Sec. iperf3-3.5-11.el8_10.x86_64
classification  Important/Sec. iperf3-3.5-11.el8_10.x86_64
RHSA-2023:4176  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22045  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22049  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
classification  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
RHSA-2023:5731  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2022-40433  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22067  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22081  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
classification  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
RHSA-2024:0265  Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20918  Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20919  Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20921  Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20926  Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20945  Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20952  Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
classification  Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
RHSA-2024:1818  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21011  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21068  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21085  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21094  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
classification  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
RHSA-2024:4563  Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21131  Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21138  Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21140  Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21144  Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21145  Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21147  Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
classification  Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
RHSA-2024:8117  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
CVE-2023-48161  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21208  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21210  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21217  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21235  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
classification  Moderate/Sec.  java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
RHSA-2023:4176  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22045  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22049  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
classification  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
RHSA-2023:5731  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2022-40433  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22067  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22081  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
classification  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
RHSA-2024:0265  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20918  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20919  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20921  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20926  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20945  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20952  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
classification  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
RHSA-2024:1818  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21011  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21068  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21085  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21094  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
classification  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
RHSA-2024:4563  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21131  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21138  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21140  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21144  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21145  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21147  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
classification  Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
RHSA-2024:8117  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
CVE-2023-48161  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21208  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21210  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21217  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21235  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
classification  Moderate/Sec.  java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
RHSA-2025:0743  Moderate/Sec.  keepalived-2.1.5-10.el8_10.x86_64
CVE-2024-41184  Moderate/Sec.  keepalived-2.1.5-10.el8_10.x86_64
classification  Moderate/Sec.  keepalived-2.1.5-10.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  kernel-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  kernel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  kernel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  kernel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  kernel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  kernel-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. kernel-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. kernel-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. kernel-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. kernel-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  kernel-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  kernel-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  kernel-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. kernel-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. kernel-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. kernel-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  kernel-core-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  kernel-core-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  kernel-core-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  kernel-core-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  kernel-core-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  kernel-core-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. kernel-core-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. kernel-core-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. kernel-core-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. kernel-core-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  kernel-core-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  kernel-core-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  kernel-core-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-core-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. kernel-core-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. kernel-core-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. kernel-core-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. kernel-debuginfo-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. kernel-debuginfo-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. kernel-debuginfo-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. kernel-debuginfo-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  kernel-debuginfo-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  kernel-debuginfo-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  kernel-debuginfo-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-debuginfo-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. kernel-debuginfo-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. kernel-debuginfo-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. kernel-debuginfo-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-debuginfo-common-x86_64-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  kernel-devel-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  kernel-devel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  kernel-devel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  kernel-devel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  kernel-devel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  kernel-devel-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. kernel-devel-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. kernel-devel-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. kernel-devel-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. kernel-devel-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  kernel-devel-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  kernel-devel-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  kernel-devel-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-devel-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. kernel-devel-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. kernel-devel-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. kernel-devel-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  kernel-headers-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  kernel-headers-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  kernel-headers-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  kernel-headers-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  kernel-headers-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  kernel-headers-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. kernel-headers-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. kernel-headers-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. kernel-headers-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. kernel-headers-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  kernel-headers-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  kernel-headers-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  kernel-headers-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-headers-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. kernel-headers-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. kernel-headers-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. kernel-headers-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  kernel-modules-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  kernel-modules-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  kernel-modules-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  kernel-modules-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  kernel-modules-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  kernel-modules-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. kernel-modules-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. kernel-modules-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. kernel-modules-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. kernel-modules-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  kernel-modules-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  kernel-modules-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  kernel-modules-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. kernel-modules-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. kernel-modules-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. kernel-modules-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. kernel-modules-extra-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. kernel-modules-extra-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. kernel-modules-extra-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. kernel-modules-extra-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  kernel-modules-extra-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  kernel-modules-extra-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  kernel-modules-extra-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-modules-extra-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. kernel-modules-extra-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. kernel-modules-extra-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. kernel-modules-extra-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  kernel-tools-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  kernel-tools-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  kernel-tools-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  kernel-tools-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  kernel-tools-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  kernel-tools-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. kernel-tools-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. kernel-tools-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. kernel-tools-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. kernel-tools-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  kernel-tools-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  kernel-tools-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  kernel-tools-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. kernel-tools-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. kernel-tools-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. kernel-tools-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. kernel-tools-libs-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. kernel-tools-libs-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. kernel-tools-libs-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. kernel-tools-libs-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  kernel-tools-libs-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  kernel-tools-libs-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  kernel-tools-libs-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  kernel-tools-libs-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. kernel-tools-libs-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. kernel-tools-libs-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. kernel-tools-libs-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8860  Important/Sec. krb5-devel-1.18.2-30.el8_10.x86_64
RHEL-50253      Important/Sec. krb5-devel-1.18.2-30.el8_10.x86_64
CVE-2024-3596   Important/Sec. krb5-devel-1.18.2-30.el8_10.x86_64
classification  Important/Sec. krb5-devel-1.18.2-30.el8_10.x86_64
RHSA-2024:8860  Important/Sec. krb5-libs-1.18.2-30.el8_10.x86_64
RHEL-50253      Important/Sec. krb5-libs-1.18.2-30.el8_10.x86_64
CVE-2024-3596   Important/Sec. krb5-libs-1.18.2-30.el8_10.x86_64
classification  Important/Sec. krb5-libs-1.18.2-30.el8_10.x86_64
RHSA-2024:8860  Important/Sec. krb5-pkinit-1.18.2-30.el8_10.x86_64
RHEL-50253      Important/Sec. krb5-pkinit-1.18.2-30.el8_10.x86_64
CVE-2024-3596   Important/Sec. krb5-pkinit-1.18.2-30.el8_10.x86_64
classification  Important/Sec. krb5-pkinit-1.18.2-30.el8_10.x86_64
RHSA-2024:8860  Important/Sec. krb5-server-1.18.2-30.el8_10.x86_64
RHEL-50253      Important/Sec. krb5-server-1.18.2-30.el8_10.x86_64
CVE-2024-3596   Important/Sec. krb5-server-1.18.2-30.el8_10.x86_64
classification  Important/Sec. krb5-server-1.18.2-30.el8_10.x86_64
RHSA-2024:8860  Important/Sec. krb5-workstation-1.18.2-30.el8_10.x86_64
RHEL-50253      Important/Sec. krb5-workstation-1.18.2-30.el8_10.x86_64
CVE-2024-3596   Important/Sec. krb5-workstation-1.18.2-30.el8_10.x86_64
classification  Important/Sec. krb5-workstation-1.18.2-30.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  libatomic-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  libatomic-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  libatomic-8.5.0-23.el8_10.x86_64
RHSA-2023:4524  Moderate/Sec.  libcap-2.48-5.el8_8.x86_64
CVE-2023-2602   Moderate/Sec.  libcap-2.48-5.el8_8.x86_64
CVE-2023-2603   Moderate/Sec.  libcap-2.48-5.el8_8.x86_64
classification  Moderate/Sec.  libcap-2.48-5.el8_8.x86_64
RHSA-2025:1301  Moderate/Sec.  libgcc-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  libgcc-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  libgcc-8.5.0-23.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  libgfortran-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  libgfortran-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  libgfortran-8.5.0-23.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  libgomp-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  libgomp-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  libgomp-8.5.0-23.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  libitm-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  libitm-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  libitm-8.5.0-23.el8_10.x86_64
RHSA-2024:8860  Important/Sec. libkadm5-1.18.2-30.el8_10.x86_64
RHEL-50253      Important/Sec. libkadm5-1.18.2-30.el8_10.x86_64
CVE-2024-3596   Important/Sec. libkadm5-1.18.2-30.el8_10.x86_64
classification  Important/Sec. libkadm5-1.18.2-30.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  libquadmath-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  libquadmath-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  libquadmath-8.5.0-23.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  libquadmath-devel-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  libquadmath-devel-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  libquadmath-devel-8.5.0-23.el8_10.x86_64
RHSA-2024:8846  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865      Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
classification  Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:11192 Moderate/Sec.  libsndfile-1.0.28-16.el8_10.x86_64
CVE-2024-50612  Moderate/Sec.  libsndfile-1.0.28-16.el8_10.x86_64
classification  Moderate/Sec.  libsndfile-1.0.28-16.el8_10.x86_64
RHSA-2024:9573  Important/Sec. libsoup-2.62.3-6.el8_10.x86_64
CVE-2024-52530  Important/Sec. libsoup-2.62.3-6.el8_10.x86_64
CVE-2024-52532  Important/Sec. libsoup-2.62.3-6.el8_10.x86_64
classification  Important/Sec. libsoup-2.62.3-6.el8_10.x86_64
RHSA-2025:0838  Important/Sec. libsoup-2.62.3-7.el8_10.x86_64
CVE-2024-52531  Important/Sec. libsoup-2.62.3-7.el8_10.x86_64
classification  Important/Sec. libsoup-2.62.3-7.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  libstdc++-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  libstdc++-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  libstdc++-8.5.0-23.el8_10.x86_64
RHSA-2025:1301  Moderate/Sec.  libstdc++-devel-8.5.0-23.el8_10.x86_64
CVE-2020-11023  Moderate/Sec.  libstdc++-devel-8.5.0-23.el8_10.x86_64
classification  Moderate/Sec.  libstdc++-devel-8.5.0-23.el8_10.x86_64
RHSA-2024:8833  Moderate/Sec.  libtiff-4.0.9-33.el8_10.x86_64
CVE-2024-7006   Moderate/Sec.  libtiff-4.0.9-33.el8_10.x86_64
classification  Moderate/Sec.  libtiff-4.0.9-33.el8_10.x86_64
RHSA-2023:5309  Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
classification  Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
CVE-2023-4863   Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
CVE-2023-5129   Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
RHSA-2025:1517  Moderate/Sec.  libxml2-2.9.7-18.el8_10.2.x86_64
CVE-2022-49043  Moderate/Sec.  libxml2-2.9.7-18.el8_10.2.x86_64
classification  Moderate/Sec.  libxml2-2.9.7-18.el8_10.2.x86_64
RHSA-2023:5259  Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32084  Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32091  Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-38791  Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-47015  Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
classification  Moderate/Sec.  mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
RHSA-2023:5259  Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32084  Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32091  Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-38791  Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-47015  Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
classification  Moderate/Sec.  mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
RHSA-2023:5249  Moderate/Sec.  ncurses-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491  Moderate/Sec.  ncurses-6.1-9.20180224.el8_8.1.x86_64
classification  Moderate/Sec.  ncurses-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249  Moderate/Sec.  ncurses-base-6.1-9.20180224.el8_8.1.noarch
CVE-2023-29491  Moderate/Sec.  ncurses-base-6.1-9.20180224.el8_8.1.noarch
classification  Moderate/Sec.  ncurses-base-6.1-9.20180224.el8_8.1.noarch
RHSA-2023:5249  Moderate/Sec.  ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491  Moderate/Sec.  ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
classification  Moderate/Sec.  ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249  Moderate/Sec.  ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491  Moderate/Sec.  ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
classification  Moderate/Sec.  ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249  Moderate/Sec.  ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491  Moderate/Sec.  ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
classification  Moderate/Sec.  ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2024:4264  Low/Sec.       openldap-2.4.46-19.el8_10.x86_64
CVE-2023-2953   Low/Sec.       openldap-2.4.46-19.el8_10.x86_64
classification  Low/Sec.       openldap-2.4.46-19.el8_10.x86_64
RHSA-2024:4264  Low/Sec.       openldap-clients-2.4.46-19.el8_10.x86_64
CVE-2023-2953   Low/Sec.       openldap-clients-2.4.46-19.el8_10.x86_64
classification  Low/Sec.       openldap-clients-2.4.46-19.el8_10.x86_64
RHSA-2024:10379 Important/Sec. pam-1.3.1-36.el8_10.x86_64
RHEL-23018      Important/Sec. pam-1.3.1-36.el8_10.x86_64
CVE-2024-10041  Important/Sec. pam-1.3.1-36.el8_10.x86_64
CVE-2024-10963  Important/Sec. pam-1.3.1-36.el8_10.x86_64
classification  Important/Sec. pam-1.3.1-36.el8_10.x86_64
RHSA-2024:8856  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  perf-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  perf-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. perf-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. perf-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. perf-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. perf-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  perf-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  perf-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  perf-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  perf-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. perf-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. perf-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. perf-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:10779 Moderate/Sec.  platform-python-3.6.8-69.el8_10.x86_64
CVE-2024-9287   Moderate/Sec.  platform-python-3.6.8-69.el8_10.x86_64
CVE-2024-11168  Moderate/Sec.  platform-python-3.6.8-69.el8_10.x86_64
classification  Moderate/Sec.  platform-python-3.6.8-69.el8_10.x86_64
RHSA-2024:10779 Moderate/Sec.  platform-python-devel-3.6.8-69.el8_10.x86_64
CVE-2024-9287   Moderate/Sec.  platform-python-devel-3.6.8-69.el8_10.x86_64
CVE-2024-11168  Moderate/Sec.  platform-python-devel-3.6.8-69.el8_10.x86_64
classification  Moderate/Sec.  platform-python-devel-3.6.8-69.el8_10.x86_64
RHSA-2024:8846  Important/Sec. podman-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. podman-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. podman-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. podman-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. podman-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  podman-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  podman-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  podman-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  podman-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  podman-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. podman-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHEL-74865      Important/Sec. podman-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
CVE-2024-11218  Important/Sec. podman-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
classification  Important/Sec. podman-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHSA-2024:8846  Important/Sec. podman-catatonit-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. podman-catatonit-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. podman-catatonit-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. podman-catatonit-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. podman-catatonit-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  podman-catatonit-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  podman-catatonit-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  podman-catatonit-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  podman-catatonit-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  podman-catatonit-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. podman-catatonit-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHEL-74865      Important/Sec. podman-catatonit-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
CVE-2024-11218  Important/Sec. podman-catatonit-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
classification  Important/Sec. podman-catatonit-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHSA-2024:8846  Important/Sec. podman-gvproxy-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. podman-gvproxy-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. podman-gvproxy-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. podman-gvproxy-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. podman-gvproxy-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  podman-gvproxy-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  podman-gvproxy-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  podman-gvproxy-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  podman-gvproxy-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  podman-gvproxy-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. podman-gvproxy-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHEL-74865      Important/Sec. podman-gvproxy-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
CVE-2024-11218  Important/Sec. podman-gvproxy-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
classification  Important/Sec. podman-gvproxy-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHSA-2024:8846  Important/Sec. podman-plugins-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. podman-plugins-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. podman-plugins-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. podman-plugins-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. podman-plugins-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  podman-plugins-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  podman-plugins-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  podman-plugins-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  podman-plugins-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  podman-plugins-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. podman-plugins-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHEL-74865      Important/Sec. podman-plugins-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
CVE-2024-11218  Important/Sec. podman-plugins-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
classification  Important/Sec. podman-plugins-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHSA-2023:6944  Moderate/Sec.  protobuf-c-1.3.0-8.el8.x86_64
CVE-2022-48468  Moderate/Sec.  protobuf-c-1.3.0-8.el8.x86_64
classification  Moderate/Sec.  protobuf-c-1.3.0-8.el8.x86_64
ref_0           Moderate/Sec.  protobuf-c-1.3.0-8.el8.x86_64
RHSA-2025:0746  Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
RHEL-70359      Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44442  Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44443  Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44444  Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
classification  Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
RHSA-2025:0746  Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
RHEL-70359      Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44442  Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44443  Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44444  Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
classification  Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
RHSA-2025:1675  Important/Sec. python3-bind-32:9.11.36-16.el8_10.4.noarch
CVE-2024-11187  Important/Sec. python3-bind-32:9.11.36-16.el8_10.4.noarch
classification  Important/Sec. python3-bind-32:9.11.36-16.el8_10.4.noarch
RHSA-2024:10953 Important/Sec. python3-bson-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
CVE-2024-53899  Important/Sec. python3-bson-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
classification  Important/Sec. python3-bson-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
RHSA-2023:4706  Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
CVE-2023-3899   Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
classification  Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
RHSA-2024:10953 Important/Sec. python3-distro-1.4.0-2.module+el8.10.0+20784+edafcd43.noarch
CVE-2024-53899  Important/Sec. python3-distro-1.4.0-2.module+el8.10.0+20784+edafcd43.noarch
classification  Important/Sec. python3-distro-1.4.0-2.module+el8.10.0+20784+edafcd43.noarch
RHSA-2025:0711  Important/Sec. python3-jinja2-2.10.1-6.el8_10.noarch
CVE-2024-56326  Important/Sec. python3-jinja2-2.10.1-6.el8_10.noarch
classification  Important/Sec. python3-jinja2-2.10.1-6.el8_10.noarch
RHSA-2024:10779 Moderate/Sec.  python3-libs-3.6.8-69.el8_10.x86_64
CVE-2024-9287   Moderate/Sec.  python3-libs-3.6.8-69.el8_10.x86_64
CVE-2024-11168  Moderate/Sec.  python3-libs-3.6.8-69.el8_10.x86_64
classification  Moderate/Sec.  python3-libs-3.6.8-69.el8_10.x86_64
RHSA-2025:1517  Moderate/Sec.  python3-libxml2-2.9.7-18.el8_10.2.x86_64
CVE-2022-49043  Moderate/Sec.  python3-libxml2-2.9.7-18.el8_10.2.x86_64
classification  Moderate/Sec.  python3-libxml2-2.9.7-18.el8_10.2.x86_64
RHSA-2024:8856  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668  Moderate/Sec.  python3-perf-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec.  python3-perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043  Moderate/Sec.  python3-perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399  Moderate/Sec.  python3-perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564  Moderate/Sec.  python3-perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858  Moderate/Sec.  python3-perf-4.18.0-553.30.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695  Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949  Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082  Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099  Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110  Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142  Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192  Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256  Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264  Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065  Important/Sec. python3-perf-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088  Important/Sec. python3-perf-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122  Important/Sec. python3-perf-4.18.0-553.34.1.el8_10.x86_64
classification  Important/Sec. python3-perf-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068  Moderate/Sec.  python3-perf-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935  Moderate/Sec.  python3-perf-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275  Moderate/Sec.  python3-perf-4.18.0-553.37.1.el8_10.x86_64
classification  Moderate/Sec.  python3-perf-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266  Important/Sec. python3-perf-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104  Important/Sec. python3-perf-4.18.0-553.40.1.el8_10.x86_64
classification  Important/Sec. python3-perf-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:10953 Important/Sec. python3-pygments-2.2.0-22.module+el8.10.0+20784+edafcd43.noarch
CVE-2024-53899  Important/Sec. python3-pygments-2.2.0-22.module+el8.10.0+20784+edafcd43.noarch
classification  Important/Sec. python3-pygments-2.2.0-22.module+el8.10.0+20784+edafcd43.noarch
RHSA-2024:10953 Important/Sec. python3-pymongo-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
CVE-2024-53899  Important/Sec. python3-pymongo-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
classification  Important/Sec. python3-pymongo-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
RHSA-2023:4520  Moderate/Sec.  python3-requests-2.20.0-3.el8_8.noarch
CVE-2023-32681  Moderate/Sec.  python3-requests-2.20.0-3.el8_8.noarch
classification  Moderate/Sec.  python3-requests-2.20.0-3.el8_8.noarch
RHSA-2025:0012  Moderate/Sec.  python3-requests-2.20.0-5.el8_10.noarch
CVE-2024-35195  Moderate/Sec.  python3-requests-2.20.0-5.el8_10.noarch
classification  Moderate/Sec.  python3-requests-2.20.0-5.el8_10.noarch
RHSA-2023:4706  Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
CVE-2023-3899   Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
classification  Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
RHSA-2023:4706  Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
CVE-2023-3899   Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
classification  Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
RHSA-2025:0837  Important/Sec. python3-unbound-1.16.2-5.8.el8_10.x86_64
CVE-2024-1488   Important/Sec. python3-unbound-1.16.2-5.8.el8_10.x86_64
CVE-2024-8508   Important/Sec. python3-unbound-1.16.2-5.8.el8_10.x86_64
classification  Important/Sec. python3-unbound-1.16.2-5.8.el8_10.x86_64
RHSA-2024:10953 Important/Sec. python36-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
CVE-2024-53899  Important/Sec. python36-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
classification  Important/Sec. python36-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
RHSA-2024:10953 Important/Sec. python36-devel-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
CVE-2024-53899  Important/Sec. python36-devel-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
classification  Important/Sec. python36-devel-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
RHSA-2024:8359  Moderate/Sec.  python39-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232   Moderate/Sec.  python39-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification  Moderate/Sec.  python39-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2024:8359  Moderate/Sec.  python39-devel-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232   Moderate/Sec.  python39-devel-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification  Moderate/Sec.  python39-devel-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2024:8359  Moderate/Sec.  python39-idle-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232   Moderate/Sec.  python39-idle-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification  Moderate/Sec.  python39-idle-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2024:8359  Moderate/Sec.  python39-libs-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232   Moderate/Sec.  python39-libs-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification  Moderate/Sec.  python39-libs-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2024:8359  Moderate/Sec.  python39-rpm-macros-3.9.20-1.module+el8.10.0+22342+478c159e.noarch
CVE-2024-6232   Moderate/Sec.  python39-rpm-macros-3.9.20-1.module+el8.10.0+22342+478c159e.noarch
classification  Moderate/Sec.  python39-rpm-macros-3.9.20-1.module+el8.10.0+22342+478c159e.noarch
RHSA-2024:8359  Moderate/Sec.  python39-test-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232   Moderate/Sec.  python39-test-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification  Moderate/Sec.  python39-test-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2024:8359  Moderate/Sec.  python39-tkinter-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232   Moderate/Sec.  python39-tkinter-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification  Moderate/Sec.  python39-tkinter-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2023:4706  Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
CVE-2023-3899   Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
classification  Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
RHSA-2025:0325  Important/Sec. rsync-3.1.3-20.el8_10.x86_64
CVE-2024-12085  Important/Sec. rsync-3.1.3-20.el8_10.x86_64
classification  Important/Sec. rsync-3.1.3-20.el8_10.x86_64
RHSA-2025:0325  Important/Sec. rsync-daemon-3.1.3-20.el8_10.noarch
CVE-2024-12085  Important/Sec. rsync-daemon-3.1.3-20.el8_10.noarch
classification  Important/Sec. rsync-daemon-3.1.3-20.el8_10.noarch
RHSA-2024:10850 Important/Sec. ruby-libs-2.5.9-113.module+el8.10.0+22581+23fc9c9e.x86_64
CVE-2024-49761  Important/Sec. ruby-libs-2.5.9-113.module+el8.10.0+22581+23fc9c9e.x86_64
classification  Important/Sec. ruby-libs-2.5.9-113.module+el8.10.0+22581+23fc9c9e.x86_64
RHSA-2024:8846  Important/Sec. runc-1:1.1.12-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. runc-1:1.1.12-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. runc-1:1.1.12-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. runc-1:1.1.12-5.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. runc-1:1.1.12-5.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  runc-1:1.1.12-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  runc-1:1.1.12-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  runc-1:1.1.12-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  runc-1:1.1.12-5.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  runc-1:1.1.12-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22722+0028f543.x86_64
RHEL-74865      Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22722+0028f543.x86_64
CVE-2024-11218  Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22722+0028f543.x86_64
classification  Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22722+0028f543.x86_64
RHSA-2024:8846  Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865      Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218  Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
classification  Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:8846  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341   Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407   Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675   Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6.x86_64
classification  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec.  slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024   Moderate/Sec.  slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198  Moderate/Sec.  slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676   Moderate/Sec.  slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
classification  Moderate/Sec.  slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865      Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
classification  Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2023:4706  Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
CVE-2023-3899   Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
classification  Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
RHSA-2023:4706  Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
CVE-2023-3899   Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
classification  Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
RHSA-2023:4706  Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
CVE-2023-3899   Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
classification  Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
RHSA-2025:1215  Moderate/Sec.  tbb-2018.2-10.el8_10.1.x86_64
CVE-2020-11023  Moderate/Sec.  tbb-2018.2-10.el8_10.1.x86_64
classification  Moderate/Sec.  tbb-2018.2-10.el8_10.1.x86_64
RHSA-2023:7166  Low/Sec.       tpm2-tss-2.3.2-5.el8.x86_64
CVE-2023-22745  Low/Sec.       tpm2-tss-2.3.2-5.el8.x86_64
classification  Low/Sec.       tpm2-tss-2.3.2-5.el8.x86_64
ref_0           Low/Sec.       tpm2-tss-2.3.2-5.el8.x86_64
RHSA-2024:11161 Moderate/Sec.  tuned-2.22.1-5.el8_10.noarch
CVE-2024-52337  Moderate/Sec.  tuned-2.22.1-5.el8_10.noarch
classification  Moderate/Sec.  tuned-2.22.1-5.el8_10.noarch
RHSA-2025:0837  Important/Sec. unbound-libs-1.16.2-5.8.el8_10.x86_64
CVE-2024-1488   Important/Sec. unbound-libs-1.16.2-5.8.el8_10.x86_64
CVE-2024-8508   Important/Sec. unbound-libs-1.16.2-5.8.el8_10.x86_64
classification  Important/Sec. unbound-libs-1.16.2-5.8.el8_10.x86_64
RHSA-2024:8859  Moderate/Sec.  xmlrpc-c-1.51.0-10.el8_10.x86_64
CVE-2024-45491  Moderate/Sec.  xmlrpc-c-1.51.0-10.el8_10.x86_64
classification  Moderate/Sec.  xmlrpc-c-1.51.0-10.el8_10.x86_64
RHSA-2024:8859  Moderate/Sec.  xmlrpc-c-client-1.51.0-10.el8_10.x86_64
CVE-2024-45491  Moderate/Sec.  xmlrpc-c-client-1.51.0-10.el8_10.x86_64
classification  Moderate/Sec.  xmlrpc-c-client-1.51.0-10.el8_10.x86_64
RHSA-2023:7057  Moderate/Sec.  yajl-2.1.0-12.el8.x86_64
CVE-2023-33460  Moderate/Sec.  yajl-2.1.0-12.el8.x86_64
classification  Moderate/Sec.  yajl-2.1.0-12.el8.x86_64
ref_0           Moderate/Sec.  yajl-2.1.0-12.el8.x86_64