Security patch release notes (RHEL 8.10)
Security patches are tied to the version of Red Hat Linux that is installed on Cloud Pak for Data System.
The patches for a specific Red Hat release are cumulative. For example, if your system is on RHEL 8.10, you only need to install the latest patch that applies to RHEL 8.10, there is no need to install all of them one by one.
Verify that which patch can be installed on your system. Do not apply the patch if the Red Hat Linux version on your system does not match.
For installation, see Applying security patches. Downtime is required when installing the security patch.
For security patches related to RHEL 8.6 and 8.8, see Security patch release notes (RHEL 8.6 and 8.8).
8.10.25.12.SP10
The release date of the 8.10.25.12.SP10 security patch is 26 December 2025. The estimated run time is around 180 minutes.
mirror_registry service in some
nodes:ATTENTION : Errors encountered during upgrade operation
========================================================
Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.12.SP10_release --upgrade-directory /localrepo --phase platform
1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.12.SP10_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']
========================================================
Workaround
- On the failed node, run the following command to load the
podmanimage:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gzExample:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz Getting image source signatures Copying blob 7b9a3910f3c3 done Copying blob 9a5d14f9f550 done Copying blob b4592cba0628 done Copying blob de9819405bcf done Copying blob 3764c3e89288 done Copying config 1fd8e1b0bb done Writing manifest to image destination Storing signatures Loaded image: docker.io/library/registry:2.7 [root@e1n1 install]# podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB - Run the following command to restart the
mirror_registryservice:[root@e1n1 rhcos]# systemctl restart mirror-registry - Restart the upgrade.
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:
Workaround
- On node
e1n1, run the following commands:sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.pysed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade - Restart the upgrade.
- Once the upgrade is successfully completed, run the following
command:
sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
RHSA-2025:21232 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23647+cfd78660.noarch
CVE-2025-31133 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23647+cfd78660.noarch
CVE-2025-52565 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23647+cfd78660.noarch
CVE-2025-52881 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23647+cfd78660.noarch
classification Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23647+cfd78660.noarch
RHSA-2025:21232 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. containers-common-2:1-82.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. containers-common-2:1-82.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. containers-common-2:1-82.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. containers-common-2:1-82.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. containers-common-2:1-82.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. criu-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. criu-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. criu-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. criu-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. criu-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. criu-libs-3.18-5.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. crun-1.14.3-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. crun-1.14.3-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. crun-1.14.3-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. crun-1.14.3-2.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. crun-1.14.3-2.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:22063 Moderate/Sec. cups-1:2.2.6-64.el8_10.x86_64
CVE-2025-58364 Moderate/Sec. cups-1:2.2.6-64.el8_10.x86_64
classification Moderate/Sec. cups-1:2.2.6-64.el8_10.x86_64
RHSA-2025:22063 Moderate/Sec. cups-client-1:2.2.6-64.el8_10.x86_64
CVE-2025-58364 Moderate/Sec. cups-client-1:2.2.6-64.el8_10.x86_64
classification Moderate/Sec. cups-client-1:2.2.6-64.el8_10.x86_64
RHSA-2025:22063 Moderate/Sec. cups-filesystem-1:2.2.6-64.el8_10.noarch
CVE-2025-58364 Moderate/Sec. cups-filesystem-1:2.2.6-64.el8_10.noarch
classification Moderate/Sec. cups-filesystem-1:2.2.6-64.el8_10.noarch
RHSA-2025:22063 Moderate/Sec. cups-ipptool-1:2.2.6-64.el8_10.x86_64
CVE-2025-58364 Moderate/Sec. cups-ipptool-1:2.2.6-64.el8_10.x86_64
classification Moderate/Sec. cups-ipptool-1:2.2.6-64.el8_10.x86_64
RHSA-2025:22063 Moderate/Sec. cups-libs-1:2.2.6-64.el8_10.x86_64
CVE-2025-58364 Moderate/Sec. cups-libs-1:2.2.6-64.el8_10.x86_64
classification Moderate/Sec. cups-libs-1:2.2.6-64.el8_10.x86_64
RHSA-2025:21776 Important/Sec. expat-2.5.0-1.el8_10.x86_64
classification Important/Sec. expat-2.5.0-1.el8_10.x86_64
CVE-2013-0340 Important/Sec. expat-2.5.0-1.el8_10.x86_64
CVE-2022-23990 Important/Sec. expat-2.5.0-1.el8_10.x86_64
CVE-2024-28757 Important/Sec. expat-2.5.0-1.el8_10.x86_64
CVE-2025-59375 Important/Sec. expat-2.5.0-1.el8_10.x86_64
RHSA-2025:21232 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21140 Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23617+3e211261.x86_64
CVE-2025-59088 Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23617+3e211261.x86_64
CVE-2025-59089 Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23617+3e211261.x86_64
classification Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23617+3e211261.x86_64
RHSA-2025:21140 Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59088 Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59089 Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
classification Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
RHSA-2025:21140 Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59088 Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59089 Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
classification Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
RHSA-2025:21140 Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59088 Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59089 Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
classification Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
RHSA-2025:21398 Moderate/Sec. kernel-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718 Moderate/Sec. kernel-4.18.0-553.84.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec. kernel-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697 Moderate/Sec. kernel-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971 Moderate/Sec. kernel-4.18.0-553.85.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec. kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513 Moderate/Sec. kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724 Moderate/Sec. kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825 Moderate/Sec. kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883 Moderate/Sec. kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898 Moderate/Sec. kernel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955 Moderate/Sec. kernel-4.18.0-553.87.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec. kernel-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543 Moderate/Sec. kernel-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401 Moderate/Sec. kernel-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539 Moderate/Sec. kernel-4.18.0-553.89.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec. kernel-core-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718 Moderate/Sec. kernel-core-4.18.0-553.84.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec. kernel-core-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697 Moderate/Sec. kernel-core-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971 Moderate/Sec. kernel-core-4.18.0-553.85.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec. kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513 Moderate/Sec. kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724 Moderate/Sec. kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825 Moderate/Sec. kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883 Moderate/Sec. kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898 Moderate/Sec. kernel-core-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955 Moderate/Sec. kernel-core-4.18.0-553.87.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec. kernel-core-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543 Moderate/Sec. kernel-core-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401 Moderate/Sec. kernel-core-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539 Moderate/Sec. kernel-core-4.18.0-553.89.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec. kernel-devel-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718 Moderate/Sec. kernel-devel-4.18.0-553.84.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec. kernel-devel-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697 Moderate/Sec. kernel-devel-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971 Moderate/Sec. kernel-devel-4.18.0-553.85.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec. kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513 Moderate/Sec. kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724 Moderate/Sec. kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825 Moderate/Sec. kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883 Moderate/Sec. kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898 Moderate/Sec. kernel-devel-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955 Moderate/Sec. kernel-devel-4.18.0-553.87.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec. kernel-devel-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543 Moderate/Sec. kernel-devel-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401 Moderate/Sec. kernel-devel-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539 Moderate/Sec. kernel-devel-4.18.0-553.89.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec. kernel-headers-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718 Moderate/Sec. kernel-headers-4.18.0-553.84.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec. kernel-headers-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697 Moderate/Sec. kernel-headers-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971 Moderate/Sec. kernel-headers-4.18.0-553.85.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec. kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513 Moderate/Sec. kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724 Moderate/Sec. kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825 Moderate/Sec. kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883 Moderate/Sec. kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898 Moderate/Sec. kernel-headers-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955 Moderate/Sec. kernel-headers-4.18.0-553.87.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec. kernel-headers-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543 Moderate/Sec. kernel-headers-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401 Moderate/Sec. kernel-headers-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539 Moderate/Sec. kernel-headers-4.18.0-553.89.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec. kernel-modules-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718 Moderate/Sec. kernel-modules-4.18.0-553.84.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec. kernel-modules-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697 Moderate/Sec. kernel-modules-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971 Moderate/Sec. kernel-modules-4.18.0-553.85.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec. kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513 Moderate/Sec. kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724 Moderate/Sec. kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825 Moderate/Sec. kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883 Moderate/Sec. kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898 Moderate/Sec. kernel-modules-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955 Moderate/Sec. kernel-modules-4.18.0-553.87.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec. kernel-modules-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543 Moderate/Sec. kernel-modules-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401 Moderate/Sec. kernel-modules-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539 Moderate/Sec. kernel-modules-4.18.0-553.89.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec. kernel-modules-extra-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718 Moderate/Sec. kernel-modules-extra-4.18.0-553.84.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec. kernel-modules-extra-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697 Moderate/Sec. kernel-modules-extra-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971 Moderate/Sec. kernel-modules-extra-4.18.0-553.85.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec. kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513 Moderate/Sec. kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724 Moderate/Sec. kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825 Moderate/Sec. kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883 Moderate/Sec. kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898 Moderate/Sec. kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955 Moderate/Sec. kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec. kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543 Moderate/Sec. kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401 Moderate/Sec. kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539 Moderate/Sec. kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec. kernel-tools-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718 Moderate/Sec. kernel-tools-4.18.0-553.84.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec. kernel-tools-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697 Moderate/Sec. kernel-tools-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971 Moderate/Sec. kernel-tools-4.18.0-553.85.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec. kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513 Moderate/Sec. kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724 Moderate/Sec. kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825 Moderate/Sec. kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883 Moderate/Sec. kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898 Moderate/Sec. kernel-tools-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955 Moderate/Sec. kernel-tools-4.18.0-553.87.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec. kernel-tools-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543 Moderate/Sec. kernel-tools-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401 Moderate/Sec. kernel-tools-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539 Moderate/Sec. kernel-tools-4.18.0-553.89.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21398 Moderate/Sec. kernel-tools-libs-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718 Moderate/Sec. kernel-tools-libs-4.18.0-553.84.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec. kernel-tools-libs-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697 Moderate/Sec. kernel-tools-libs-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971 Moderate/Sec. kernel-tools-libs-4.18.0-553.85.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec. kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513 Moderate/Sec. kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724 Moderate/Sec. kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825 Moderate/Sec. kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883 Moderate/Sec. kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898 Moderate/Sec. kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955 Moderate/Sec. kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec. kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543 Moderate/Sec. kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401 Moderate/Sec. kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539 Moderate/Sec. kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:23086 Moderate/Sec. libluksmeta-9-4.el8_10.1.x86_64
CVE-2025-11568 Moderate/Sec. libluksmeta-9-4.el8_10.1.x86_64
classification Moderate/Sec. libluksmeta-9-4.el8_10.1.x86_64
RHSA-2025:21232 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21977 Moderate/Sec. libssh-0.9.6-16.el8_10.x86_64
CVE-2025-5372 Moderate/Sec. libssh-0.9.6-16.el8_10.x86_64
classification Moderate/Sec. libssh-0.9.6-16.el8_10.x86_64
RHSA-2025:21977 Moderate/Sec. libssh-config-0.9.6-16.el8_10.noarch
CVE-2025-5372 Moderate/Sec. libssh-config-0.9.6-16.el8_10.noarch
classification Moderate/Sec. libssh-config-0.9.6-16.el8_10.noarch
RHSA-2025:23086 Moderate/Sec. luksmeta-9-4.el8_10.1.x86_64
CVE-2025-11568 Moderate/Sec. luksmeta-9-4.el8_10.1.x86_64
classification Moderate/Sec. luksmeta-9-4.el8_10.1.x86_64
RHSA-2025:21398 Moderate/Sec. perf-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718 Moderate/Sec. perf-4.18.0-553.84.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec. perf-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697 Moderate/Sec. perf-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971 Moderate/Sec. perf-4.18.0-553.85.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec. perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513 Moderate/Sec. perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724 Moderate/Sec. perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825 Moderate/Sec. perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883 Moderate/Sec. perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898 Moderate/Sec. perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955 Moderate/Sec. perf-4.18.0-553.87.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec. perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543 Moderate/Sec. perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401 Moderate/Sec. perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539 Moderate/Sec. perf-4.18.0-553.89.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21232 Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21140 Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59088 Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59089 Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
classification Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
RHSA-2025:21140 Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59088 Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
CVE-2025-59089 Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
classification Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23617+3e211261.noarch
RHSA-2025:21398 Moderate/Sec. python3-perf-4.18.0-553.84.1.el8_10.x86_64
CVE-2025-39718 Moderate/Sec. python3-perf-4.18.0-553.84.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.84.1.el8_10.x86_64
RHSA-2025:21917 Moderate/Sec. python3-perf-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39697 Moderate/Sec. python3-perf-4.18.0-553.85.1.el8_10.x86_64
CVE-2025-39971 Moderate/Sec. python3-perf-4.18.0-553.85.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.85.1.el8_10.x86_64
RHSA-2025:22388 Moderate/Sec. python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2023-53513 Moderate/Sec. python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-38724 Moderate/Sec. python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39825 Moderate/Sec. python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39883 Moderate/Sec. python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39898 Moderate/Sec. python3-perf-4.18.0-553.87.1.el8_10.x86_64
CVE-2025-39955 Moderate/Sec. python3-perf-4.18.0-553.87.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.87.1.el8_10.x86_64
RHSA-2025:22801 Moderate/Sec. python3-perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2022-50543 Moderate/Sec. python3-perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53401 Moderate/Sec. python3-perf-4.18.0-553.89.1.el8_10.x86_64
CVE-2023-53539 Moderate/Sec. python3-perf-4.18.0-553.89.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.89.1.el8_10.x86_64
RHSA-2025:21232 Important/Sec. runc-4:1.2.5-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. runc-4:1.2.5-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. runc-4:1.2.5-2.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. runc-4:1.2.5-2.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. runc-4:1.2.5-2.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23647+cfd78660.x86_64
RHSA-2025:21232 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-31133 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52565 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660.x86_64
CVE-2025-52881 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660.x86_64
classification Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23647+cfd78660.x86_64
[root@gt32-node1 ~]#
8.10.25.11.SP9
The release date of the 8.10.25.11.SP9 security patch is 10 December 2025. The estimated run time is around 90 minutes.
mirror_registry service in some
nodes:ATTENTION : Errors encountered during upgrade operation
========================================================
Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.10.SP8_release --upgrade-directory /localrepo --phase platform
1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.11.SP9_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']
========================================================
Workaround
- On the failed node, run the following command to load the
podmanimage:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gzExample:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz Getting image source signatures Copying blob 7b9a3910f3c3 done Copying blob 9a5d14f9f550 done Copying blob b4592cba0628 done Copying blob de9819405bcf done Copying blob 3764c3e89288 done Copying config 1fd8e1b0bb done Writing manifest to image destination Storing signatures Loaded image: docker.io/library/registry:2.7 [root@e1n1 install]# podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB - Run the following command to restart the
mirror_registryservice:[root@e1n1 rhcos]# systemctl restart mirror-registry - Restart the upgrade.
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:
Workaround
- On node
e1n1, run the following commands:sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.pysed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade - Restart the upgrade.
- Once the upgrade is successfully completed, run the following
command:
sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
RHSA-2025:14573 Important/Sec. aide-0.16-15.el8_10.2.x86_64
CVE-2025-54389 Important/Sec. aide-0.16-15.el8_10.2.x86_64
classification Important/Sec. aide-0.16-15.el8_10.2.x86_64
RHSA-2025:19835 Important/Sec. bind-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778 Important/Sec. bind-32:9.11.36-16.el8_10.6.x86_64
classification Important/Sec. bind-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778 Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.6.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-libs-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778 Important/Sec. bind-libs-32:9.11.36-16.el8_10.6.x86_64
classification Important/Sec. bind-libs-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778 Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.6.x86_64
classification Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-license-32:9.11.36-16.el8_10.6.noarch
CVE-2025-40778 Important/Sec. bind-license-32:9.11.36-16.el8_10.6.noarch
classification Important/Sec. bind-license-32:9.11.36-16.el8_10.6.noarch
RHSA-2025:19835 Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778 Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.6.x86_64
classification Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778 Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.6.x86_64
classification Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778 Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.6.x86_64
classification Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:19835 Important/Sec. bind-utils-32:9.11.36-16.el8_10.6.x86_64
CVE-2025-40778 Important/Sec. bind-utils-32:9.11.36-16.el8_10.6.x86_64
classification Important/Sec. bind-utils-32:9.11.36-16.el8_10.6.x86_64
RHSA-2025:8686 Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.22.x86_64
CVE-2025-4802 Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.22.x86_64
RHSA-2025:12980 Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.25.x86_64
RHSA-2025:7895 Important/Sec. compat-openssl10-1:1.0.2o-4.el8_10.1.x86_64
CVE-2023-0286 Important/Sec. compat-openssl10-1:1.0.2o-4.el8_10.1.x86_64
classification Important/Sec. compat-openssl10-1:1.0.2o-4.el8_10.1.x86_64
RHSA-2025:9142 Moderate/Sec. conmon-3:2.1.10-1.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. conmon-3:2.1.10-1.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. conmon-3:2.1.10-1.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142 Moderate/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23250+94af2c8e.noarch
CVE-2025-22871 Moderate/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23250+94af2c8e.noarch
classification Moderate/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23250+94af2c8e.noarch
RHSA-2025:10551 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23320+f7205097.noarch
CVE-2025-6032 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23320+f7205097.noarch
classification Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23320+f7205097.noarch
RHSA-2025:15904 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23498+f7d19d48.noarch
CVE-2025-9566 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23498+f7d19d48.noarch
classification Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+23498+f7d19d48.noarch
RHSA-2025:9142 Moderate/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. containernetworking-plugins-1:1.4.0-6.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142 Moderate/Sec. containers-common-2:1-82.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. containers-common-2:1-82.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. containers-common-2:1-82.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. containers-common-2:1-82.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. containers-common-2:1-82.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. containers-common-2:1-82.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. containers-common-2:1-82.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. containers-common-2:1-82.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. containers-common-2:1-82.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142 Moderate/Sec. criu-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. criu-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. criu-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. criu-3.18-5.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. criu-3.18-5.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. criu-3.18-5.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. criu-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. criu-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. criu-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142 Moderate/Sec. criu-libs-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. criu-libs-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. criu-libs-3.18-5.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. criu-libs-3.18-5.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. criu-libs-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. criu-libs-3.18-5.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142 Moderate/Sec. crun-1.14.3-2.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. crun-1.14.3-2.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. crun-1.14.3-2.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. crun-1.14.3-2.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. crun-1.14.3-2.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. crun-1.14.3-2.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. crun-1.14.3-2.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. crun-1.14.3-2.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. crun-1.14.3-2.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:15702 Important/Sec. cups-1:2.2.6-63.el8_10.x86_64
CVE-2025-58060 Important/Sec. cups-1:2.2.6-63.el8_10.x86_64
classification Important/Sec. cups-1:2.2.6-63.el8_10.x86_64
RHSA-2025:15702 Important/Sec. cups-client-1:2.2.6-63.el8_10.x86_64
CVE-2025-58060 Important/Sec. cups-client-1:2.2.6-63.el8_10.x86_64
classification Important/Sec. cups-client-1:2.2.6-63.el8_10.x86_64
RHSA-2025:15702 Important/Sec. cups-filesystem-1:2.2.6-63.el8_10.noarch
CVE-2025-58060 Important/Sec. cups-filesystem-1:2.2.6-63.el8_10.noarch
classification Important/Sec. cups-filesystem-1:2.2.6-63.el8_10.noarch
RHSA-2025:15702 Important/Sec. cups-ipptool-1:2.2.6-63.el8_10.x86_64
CVE-2025-58060 Important/Sec. cups-ipptool-1:2.2.6-63.el8_10.x86_64
classification Important/Sec. cups-ipptool-1:2.2.6-63.el8_10.x86_64
RHSA-2025:11030 Moderate/Sec. emacs-filesystem-1:26.1-15.el8_10.noarch
CVE-2024-53920 Moderate/Sec. emacs-filesystem-1:26.1-15.el8_10.noarch
classification Moderate/Sec. emacs-filesystem-1:26.1-15.el8_10.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-all-4.2.1-129.el8_10.14.x86_64
CVE-2024-47081 Moderate/Sec. fence-agents-all-4.2.1-129.el8_10.14.x86_64
classification Moderate/Sec. fence-agents-all-4.2.1-129.el8_10.14.x86_64
RHSA-2025:14750 Moderate/Sec. fence-agents-amt-ws-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-amt-ws-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-amt-ws-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-apc-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-apc-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-apc-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-apc-snmp-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-apc-snmp-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-apc-snmp-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-bladecenter-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-bladecenter-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-bladecenter-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-brocade-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-brocade-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-brocade-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-cisco-mds-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-cisco-mds-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-cisco-mds-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-cisco-ucs-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-cisco-ucs-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-cisco-ucs-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-common-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-common-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-common-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-compute-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-compute-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-compute-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-drac5-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-drac5-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-drac5-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-eaton-snmp-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-eaton-snmp-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-eaton-snmp-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-emerson-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-emerson-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-emerson-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-eps-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-eps-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-eps-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-heuristics-ping-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-heuristics-ping-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-heuristics-ping-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-hpblade-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-hpblade-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-hpblade-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-ibmblade-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-ibmblade-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-ibmblade-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-ifmib-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-ifmib-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-ifmib-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-ilo-moonshot-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-ilo-mp-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-ilo-mp-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-ilo-mp-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-ilo-ssh-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-ilo-ssh-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-ilo-ssh-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-ilo2-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-ilo2-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-ilo2-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-intelmodular-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-intelmodular-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-intelmodular-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-ipdu-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-ipdu-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-ipdu-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-ipmilan-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-ipmilan-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-ipmilan-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-kdump-4.2.1-129.el8_10.14.x86_64
CVE-2024-47081 Moderate/Sec. fence-agents-kdump-4.2.1-129.el8_10.14.x86_64
classification Moderate/Sec. fence-agents-kdump-4.2.1-129.el8_10.14.x86_64
RHSA-2025:14750 Moderate/Sec. fence-agents-mpath-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-mpath-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-mpath-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-redfish-4.2.1-129.el8_10.14.x86_64
CVE-2024-47081 Moderate/Sec. fence-agents-redfish-4.2.1-129.el8_10.14.x86_64
classification Moderate/Sec. fence-agents-redfish-4.2.1-129.el8_10.14.x86_64
RHSA-2025:14750 Moderate/Sec. fence-agents-rhevm-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-rhevm-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-rhevm-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-rsa-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-rsa-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-rsa-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-rsb-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-rsb-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-rsb-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-sbd-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-sbd-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-sbd-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-scsi-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-scsi-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-scsi-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-vmware-rest-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-vmware-rest-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-vmware-rest-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-vmware-soap-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-vmware-soap-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-vmware-soap-4.2.1-129.el8_10.14.noarch
RHSA-2025:14750 Moderate/Sec. fence-agents-wti-4.2.1-129.el8_10.14.noarch
CVE-2024-47081 Moderate/Sec. fence-agents-wti-4.2.1-129.el8_10.14.noarch
classification Moderate/Sec. fence-agents-wti-4.2.1-129.el8_10.14.noarch
RHSA-2025:9142 Moderate/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:13315 Moderate/Sec. gdk-pixbuf2-modules-2.36.12-7.el8_10.x86_64
CVE-2025-7345 Moderate/Sec. gdk-pixbuf2-modules-2.36.12-7.el8_10.x86_64
classification Moderate/Sec. gdk-pixbuf2-modules-2.36.12-7.el8_10.x86_64
RHSA-2025:8421 Moderate/Sec. ghostscript-9.27-17.el8_10.x86_64
CVE-2025-27832 Moderate/Sec. ghostscript-9.27-17.el8_10.x86_64
classification Moderate/Sec. ghostscript-9.27-17.el8_10.x86_64
RHSA-2025:8414 Moderate/Sec. git-2.43.5-3.el8_10.x86_64
CVE-2024-52005 Moderate/Sec. git-2.43.5-3.el8_10.x86_64
classification Moderate/Sec. git-2.43.5-3.el8_10.x86_64
RHSA-2025:11534 Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2024-50349 Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2024-52006 Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2025-27613 Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2025-27614 Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2025-46835 Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2025-48384 Important/Sec. git-2.43.7-1.el8_10.x86_64
CVE-2025-48385 Important/Sec. git-2.43.7-1.el8_10.x86_64
classification Important/Sec. git-2.43.7-1.el8_10.x86_64
RHSA-2025:8414 Moderate/Sec. git-core-2.43.5-3.el8_10.x86_64
CVE-2024-52005 Moderate/Sec. git-core-2.43.5-3.el8_10.x86_64
classification Moderate/Sec. git-core-2.43.5-3.el8_10.x86_64
RHSA-2025:11534 Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2024-50349 Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2024-52006 Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2025-27613 Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2025-27614 Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2025-46835 Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2025-48384 Important/Sec. git-core-2.43.7-1.el8_10.x86_64
CVE-2025-48385 Important/Sec. git-core-2.43.7-1.el8_10.x86_64
classification Important/Sec. git-core-2.43.7-1.el8_10.x86_64
RHSA-2025:8414 Moderate/Sec. git-core-doc-2.43.5-3.el8_10.noarch
CVE-2024-52005 Moderate/Sec. git-core-doc-2.43.5-3.el8_10.noarch
classification Moderate/Sec. git-core-doc-2.43.5-3.el8_10.noarch
RHSA-2025:11534 Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2024-50349 Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2024-52006 Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2025-27613 Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2025-27614 Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2025-46835 Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2025-48384 Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
CVE-2025-48385 Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
classification Important/Sec. git-core-doc-2.43.7-1.el8_10.noarch
RHSA-2025:8414 Moderate/Sec. git-subtree-2.43.5-3.el8_10.x86_64
CVE-2024-52005 Moderate/Sec. git-subtree-2.43.5-3.el8_10.x86_64
classification Moderate/Sec. git-subtree-2.43.5-3.el8_10.x86_64
RHSA-2025:11534 Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2024-50349 Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2024-52006 Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2025-27613 Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2025-27614 Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2025-46835 Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2025-48384 Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
CVE-2025-48385 Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
classification Important/Sec. git-subtree-2.43.7-1.el8_10.x86_64
RHSA-2025:17415 Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.4.x86_64
CVE-2025-6395 Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.4.x86_64
CVE-2025-32988 Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.4.x86_64
CVE-2025-32990 Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.4.x86_64
classification Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.4.x86_64
RHSA-2025:17415 Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.4.x86_64
CVE-2025-6395 Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.4.x86_64
CVE-2025-32988 Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.4.x86_64
CVE-2025-32990 Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.4.x86_64
classification Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.4.x86_64
RHSA-2025:17415 Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.4.x86_64
CVE-2025-6395 Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.4.x86_64
CVE-2025-32988 Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.4.x86_64
CVE-2025-32990 Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.4.x86_64
classification Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.4.x86_64
RHSA-2025:15123 Moderate/Sec. httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2024-47252 Moderate/Sec. httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-23048 Moderate/Sec. httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49630 Moderate/Sec. httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49812 Moderate/Sec. httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
classification Moderate/Sec. httpd-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
RHSA-2025:15123 Moderate/Sec. httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
CVE-2024-47252 Moderate/Sec. httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
CVE-2025-23048 Moderate/Sec. httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
CVE-2025-49630 Moderate/Sec. httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
CVE-2025-49812 Moderate/Sec. httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
classification Moderate/Sec. httpd-filesystem-2.4.37-65.module+el8.10.0+23369+11a81384.5.noarch
RHSA-2025:15123 Moderate/Sec. httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2024-47252 Moderate/Sec. httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-23048 Moderate/Sec. httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49630 Moderate/Sec. httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49812 Moderate/Sec. httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
classification Moderate/Sec. httpd-tools-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
RHSA-2025:9188 Important/Sec. ipa-client-4.9.13-18.module+el8.10.0+23183+85190b0c.x86_64
CVE-2025-4404 Important/Sec. ipa-client-4.9.13-18.module+el8.10.0+23183+85190b0c.x86_64
classification Important/Sec. ipa-client-4.9.13-18.module+el8.10.0+23183+85190b0c.x86_64
RHSA-2025:17129 Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23537+32c82745.x86_64
CVE-2025-7493 Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23537+32c82745.x86_64
classification Important/Sec. ipa-client-4.9.13-20.module+el8.10.0+23537+32c82745.x86_64
RHSA-2025:9188 Important/Sec. ipa-client-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
CVE-2025-4404 Important/Sec. ipa-client-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
classification Important/Sec. ipa-client-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
RHSA-2025:17129 Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
CVE-2025-7493 Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
classification Important/Sec. ipa-client-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
RHSA-2025:9188 Important/Sec. ipa-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
CVE-2025-4404 Important/Sec. ipa-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
classification Important/Sec. ipa-common-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
RHSA-2025:17129 Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
CVE-2025-7493 Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
classification Important/Sec. ipa-common-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
RHSA-2025:9188 Important/Sec. ipa-selinux-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
CVE-2025-4404 Important/Sec. ipa-selinux-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
classification Important/Sec. ipa-selinux-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
RHSA-2025:17129 Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
CVE-2025-7493 Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
classification Important/Sec. ipa-selinux-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
RHSA-2025:10862 Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30749 Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30754 Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30761 Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-50106 Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-1:1.8.0.462.b08-2.el8.x86_64
RHSA-2025:18815 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.472.b08-1.el8.x86_64
CVE-2025-53057 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.472.b08-1.el8.x86_64
CVE-2025-53066 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.472.b08-1.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.472.b08-1.el8.x86_64
RHSA-2025:10862 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30749 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30754 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-30761 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
CVE-2025-50106 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.462.b08-2.el8.x86_64
RHSA-2025:18815 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.472.b08-1.el8.x86_64
CVE-2025-53057 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.472.b08-1.el8.x86_64
CVE-2025-53066 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.472.b08-1.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.472.b08-1.el8.x86_64
RHSA-2025:10618 Moderate/Sec. jq-1.6-11.el8_10.x86_64
CVE-2024-23337 Moderate/Sec. jq-1.6-11.el8_10.x86_64
CVE-2025-48060 Moderate/Sec. jq-1.6-11.el8_10.x86_64
classification Moderate/Sec. jq-1.6-11.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec. kernel-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373 Moderate/Sec. kernel-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751 Moderate/Sec. kernel-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757 Moderate/Sec. kernel-4.18.0-553.80.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec. kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386 Moderate/Sec. kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297 Moderate/Sec. kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386 Moderate/Sec. kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817 Moderate/Sec. kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841 Moderate/Sec. kernel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849 Moderate/Sec. kernel-4.18.0-553.81.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec. kernel-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431 Moderate/Sec. kernel-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226 Moderate/Sec. kernel-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257 Moderate/Sec. kernel-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864 Moderate/Sec. kernel-4.18.0-553.82.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec. kernel-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367 Moderate/Sec. kernel-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178 Moderate/Sec. kernel-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300 Moderate/Sec. kernel-4.18.0-553.83.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec. kernel-core-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373 Moderate/Sec. kernel-core-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751 Moderate/Sec. kernel-core-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757 Moderate/Sec. kernel-core-4.18.0-553.80.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec. kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386 Moderate/Sec. kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297 Moderate/Sec. kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386 Moderate/Sec. kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817 Moderate/Sec. kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841 Moderate/Sec. kernel-core-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849 Moderate/Sec. kernel-core-4.18.0-553.81.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec. kernel-core-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431 Moderate/Sec. kernel-core-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226 Moderate/Sec. kernel-core-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257 Moderate/Sec. kernel-core-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864 Moderate/Sec. kernel-core-4.18.0-553.82.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec. kernel-core-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367 Moderate/Sec. kernel-core-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178 Moderate/Sec. kernel-core-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300 Moderate/Sec. kernel-core-4.18.0-553.83.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec. kernel-devel-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373 Moderate/Sec. kernel-devel-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751 Moderate/Sec. kernel-devel-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757 Moderate/Sec. kernel-devel-4.18.0-553.80.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec. kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386 Moderate/Sec. kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297 Moderate/Sec. kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386 Moderate/Sec. kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817 Moderate/Sec. kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841 Moderate/Sec. kernel-devel-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849 Moderate/Sec. kernel-devel-4.18.0-553.81.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec. kernel-devel-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431 Moderate/Sec. kernel-devel-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226 Moderate/Sec. kernel-devel-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257 Moderate/Sec. kernel-devel-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864 Moderate/Sec. kernel-devel-4.18.0-553.82.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec. kernel-devel-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367 Moderate/Sec. kernel-devel-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178 Moderate/Sec. kernel-devel-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300 Moderate/Sec. kernel-devel-4.18.0-553.83.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec. kernel-headers-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373 Moderate/Sec. kernel-headers-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751 Moderate/Sec. kernel-headers-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757 Moderate/Sec. kernel-headers-4.18.0-553.80.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec. kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386 Moderate/Sec. kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297 Moderate/Sec. kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386 Moderate/Sec. kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817 Moderate/Sec. kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841 Moderate/Sec. kernel-headers-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849 Moderate/Sec. kernel-headers-4.18.0-553.81.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec. kernel-headers-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431 Moderate/Sec. kernel-headers-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226 Moderate/Sec. kernel-headers-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257 Moderate/Sec. kernel-headers-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864 Moderate/Sec. kernel-headers-4.18.0-553.82.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec. kernel-headers-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367 Moderate/Sec. kernel-headers-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178 Moderate/Sec. kernel-headers-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300 Moderate/Sec. kernel-headers-4.18.0-553.83.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec. kernel-modules-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373 Moderate/Sec. kernel-modules-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751 Moderate/Sec. kernel-modules-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757 Moderate/Sec. kernel-modules-4.18.0-553.80.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec. kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386 Moderate/Sec. kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297 Moderate/Sec. kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386 Moderate/Sec. kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817 Moderate/Sec. kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841 Moderate/Sec. kernel-modules-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849 Moderate/Sec. kernel-modules-4.18.0-553.81.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec. kernel-modules-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431 Moderate/Sec. kernel-modules-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226 Moderate/Sec. kernel-modules-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257 Moderate/Sec. kernel-modules-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864 Moderate/Sec. kernel-modules-4.18.0-553.82.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec. kernel-modules-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367 Moderate/Sec. kernel-modules-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178 Moderate/Sec. kernel-modules-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300 Moderate/Sec. kernel-modules-4.18.0-553.83.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec. kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373 Moderate/Sec. kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751 Moderate/Sec. kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757 Moderate/Sec. kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec. kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386 Moderate/Sec. kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297 Moderate/Sec. kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386 Moderate/Sec. kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817 Moderate/Sec. kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841 Moderate/Sec. kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849 Moderate/Sec. kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec. kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431 Moderate/Sec. kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226 Moderate/Sec. kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257 Moderate/Sec. kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864 Moderate/Sec. kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec. kernel-modules-extra-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367 Moderate/Sec. kernel-modules-extra-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178 Moderate/Sec. kernel-modules-extra-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300 Moderate/Sec. kernel-modules-extra-4.18.0-553.83.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec. kernel-tools-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373 Moderate/Sec. kernel-tools-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751 Moderate/Sec. kernel-tools-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757 Moderate/Sec. kernel-tools-4.18.0-553.80.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec. kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386 Moderate/Sec. kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297 Moderate/Sec. kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386 Moderate/Sec. kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817 Moderate/Sec. kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841 Moderate/Sec. kernel-tools-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849 Moderate/Sec. kernel-tools-4.18.0-553.81.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec. kernel-tools-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431 Moderate/Sec. kernel-tools-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226 Moderate/Sec. kernel-tools-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257 Moderate/Sec. kernel-tools-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864 Moderate/Sec. kernel-tools-4.18.0-553.82.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec. kernel-tools-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367 Moderate/Sec. kernel-tools-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178 Moderate/Sec. kernel-tools-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300 Moderate/Sec. kernel-tools-4.18.0-553.83.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:18297 Moderate/Sec. kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373 Moderate/Sec. kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751 Moderate/Sec. kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757 Moderate/Sec. kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec. kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386 Moderate/Sec. kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297 Moderate/Sec. kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386 Moderate/Sec. kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817 Moderate/Sec. kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841 Moderate/Sec. kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849 Moderate/Sec. kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec. kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431 Moderate/Sec. kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226 Moderate/Sec. kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257 Moderate/Sec. kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864 Moderate/Sec. kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec. kernel-tools-libs-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367 Moderate/Sec. kernel-tools-libs-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178 Moderate/Sec. kernel-tools-libs-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300 Moderate/Sec. kernel-tools-libs-4.18.0-553.83.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:9878 Important/Sec. libblockdev-2.28-7.el8_10.x86_64
CVE-2025-6019 Important/Sec. libblockdev-2.28-7.el8_10.x86_64
classification Important/Sec. libblockdev-2.28-7.el8_10.x86_64
RHSA-2025:9878 Important/Sec. libblockdev-crypto-2.28-7.el8_10.x86_64
CVE-2025-6019 Important/Sec. libblockdev-crypto-2.28-7.el8_10.x86_64
classification Important/Sec. libblockdev-crypto-2.28-7.el8_10.x86_64
RHSA-2025:9878 Important/Sec. libblockdev-fs-2.28-7.el8_10.x86_64
CVE-2025-6019 Important/Sec. libblockdev-fs-2.28-7.el8_10.x86_64
classification Important/Sec. libblockdev-fs-2.28-7.el8_10.x86_64
RHSA-2025:9878 Important/Sec. libblockdev-loop-2.28-7.el8_10.x86_64
CVE-2025-6019 Important/Sec. libblockdev-loop-2.28-7.el8_10.x86_64
classification Important/Sec. libblockdev-loop-2.28-7.el8_10.x86_64
RHSA-2025:9878 Important/Sec. libblockdev-lvm-2.28-7.el8_10.x86_64
CVE-2025-6019 Important/Sec. libblockdev-lvm-2.28-7.el8_10.x86_64
classification Important/Sec. libblockdev-lvm-2.28-7.el8_10.x86_64
RHSA-2025:9878 Important/Sec. libblockdev-mdraid-2.28-7.el8_10.x86_64
CVE-2025-6019 Important/Sec. libblockdev-mdraid-2.28-7.el8_10.x86_64
classification Important/Sec. libblockdev-mdraid-2.28-7.el8_10.x86_64
RHSA-2025:9878 Important/Sec. libblockdev-part-2.28-7.el8_10.x86_64
CVE-2025-6019 Important/Sec. libblockdev-part-2.28-7.el8_10.x86_64
classification Important/Sec. libblockdev-part-2.28-7.el8_10.x86_64
RHSA-2025:9878 Important/Sec. libblockdev-swap-2.28-7.el8_10.x86_64
CVE-2025-6019 Important/Sec. libblockdev-swap-2.28-7.el8_10.x86_64
classification Important/Sec. libblockdev-swap-2.28-7.el8_10.x86_64
RHSA-2025:9878 Important/Sec. libblockdev-utils-2.28-7.el8_10.x86_64
CVE-2025-6019 Important/Sec. libblockdev-utils-2.28-7.el8_10.x86_64
classification Important/Sec. libblockdev-utils-2.28-7.el8_10.x86_64
RHSA-2025:8421 Moderate/Sec. libgs-9.27-17.el8_10.x86_64
CVE-2025-27832 Moderate/Sec. libgs-9.27-17.el8_10.x86_64
classification Moderate/Sec. libgs-9.27-17.el8_10.x86_64
RHSA-2025:19610 Important/Sec. libipa_hbac-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. libipa_hbac-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. libipa_hbac-2.9.4-5.el8_10.3.x86_64
RHSA-2025:7540 Moderate/Sec. libjpeg-turbo-1.5.3-14.el8_10.x86_64
CVE-2020-13790 Moderate/Sec. libjpeg-turbo-1.5.3-14.el8_10.x86_64
classification Moderate/Sec. libjpeg-turbo-1.5.3-14.el8_10.x86_64
RHSA-2025:9142 Moderate/Sec. libslirp-4.4.0-2.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. libslirp-4.4.0-2.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. libslirp-4.4.0-2.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. libslirp-4.4.0-2.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:19714 Important/Sec. libsoup-2.62.3-10.el8_10.x86_64
CVE-2025-4945 Important/Sec. libsoup-2.62.3-10.el8_10.x86_64
CVE-2025-11021 Important/Sec. libsoup-2.62.3-10.el8_10.x86_64
classification Important/Sec. libsoup-2.62.3-10.el8_10.x86_64
RHSA-2025:18286 Moderate/Sec. libssh-0.9.6-15.el8_10.x86_64
CVE-2025-5318 Moderate/Sec. libssh-0.9.6-15.el8_10.x86_64
classification Moderate/Sec. libssh-0.9.6-15.el8_10.x86_64
RHSA-2025:18286 Moderate/Sec. libssh-config-0.9.6-15.el8_10.noarch
CVE-2025-5318 Moderate/Sec. libssh-config-0.9.6-15.el8_10.noarch
classification Moderate/Sec. libssh-config-0.9.6-15.el8_10.noarch
RHSA-2025:19610 Important/Sec. libsss_autofs-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. libsss_autofs-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. libsss_autofs-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. libsss_certmap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. libsss_certmap-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. libsss_certmap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. libsss_idmap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. libsss_idmap-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. libsss_idmap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. libsss_simpleifp-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. libsss_simpleifp-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. libsss_simpleifp-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. libsss_sudo-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. libsss_sudo-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. libsss_sudo-2.9.4-5.el8_10.3.x86_64
RHSA-2025:4658 Moderate/Sec. libtiff-4.0.9-34.el8_10.x86_64
CVE-2017-17095 Moderate/Sec. libtiff-4.0.9-34.el8_10.x86_64
classification Moderate/Sec. libtiff-4.0.9-34.el8_10.x86_64
RHSA-2025:19276 Important/Sec. libtiff-4.0.9-35.el8_10.x86_64
CVE-2025-9900 Important/Sec. libtiff-4.0.9-35.el8_10.x86_64
classification Important/Sec. libtiff-4.0.9-35.el8_10.x86_64
RHSA-2025:20034 Important/Sec. libtiff-4.0.9-36.el8_10.x86_64
CVE-2025-8176 Important/Sec. libtiff-4.0.9-36.el8_10.x86_64
classification Important/Sec. libtiff-4.0.9-36.el8_10.x86_64
RHSA-2025:12527 Moderate/Sec. libtpms-0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70.x86_64
CVE-2025-49133 Moderate/Sec. libtpms-0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70.x86_64
classification Moderate/Sec. libtpms-0.9.1-3.20211126git1ff6fe1f43.module+el8.10.0+23348+204cfc70.x86_64
RHSA-2025:15017 Important/Sec. libudisks2-2.9.0-16.el8_10.1.x86_64
CVE-2025-8067 Important/Sec. libudisks2-2.9.0-16.el8_10.1.x86_64
classification Important/Sec. libudisks2-2.9.0-16.el8_10.1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-client-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-client-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-client-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-config-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-config-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-config-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-config-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-config-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-config-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-interface-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-interface-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-interface-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-network-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-nodedev-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-nodedev-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-nodedev-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-nwfilter-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-qemu-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-qemu-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-qemu-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-secret-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-secret-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-secret-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-storage-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-storage-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-storage-core-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-storage-core-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-core-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-storage-disk-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-storage-disk-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-disk-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-storage-gluster-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-storage-gluster-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-gluster-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-iscsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-direct-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-storage-iscsi-direct-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-iscsi-direct-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-storage-logical-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-storage-logical-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-logical-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-storage-mpath-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-storage-mpath-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-mpath-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-storage-rbd-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-storage-rbd-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-rbd-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-driver-storage-scsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-driver-storage-scsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-driver-storage-scsi-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-daemon-kvm-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-daemon-kvm-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-daemon-kvm-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:12527 Moderate/Sec. libvirt-libs-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
CVE-2025-49133 Moderate/Sec. libvirt-libs-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
classification Moderate/Sec. libvirt-libs-8.0.0-23.4.module+el8.10.0+23205+d8da55c1.x86_64
RHSA-2025:9119 Important/Sec. libvpx-1.7.0-12.el8_10.x86_64
CVE-2025-5283 Important/Sec. libvpx-1.7.0-12.el8_10.x86_64
classification Important/Sec. libvpx-1.7.0-12.el8_10.x86_64
RHSA-2025:15123 Moderate/Sec. mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
CVE-2024-47252 Moderate/Sec. mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
CVE-2025-23048 Moderate/Sec. mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
CVE-2025-49630 Moderate/Sec. mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
CVE-2025-49812 Moderate/Sec. mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
classification Moderate/Sec. mod_http2-1.15.7-10.module+el8.10.0+23369+11a81384.4.x86_64
RHSA-2025:15123 Moderate/Sec. mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2024-47252 Moderate/Sec. mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-23048 Moderate/Sec. mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49630 Moderate/Sec. mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49812 Moderate/Sec. mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
classification Moderate/Sec. mod_session-2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
RHSA-2025:15123 Moderate/Sec. mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2024-47252 Moderate/Sec. mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-23048 Moderate/Sec. mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49630 Moderate/Sec. mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
CVE-2025-49812 Moderate/Sec. mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
classification Moderate/Sec. mod_ssl-1:2.4.37-65.module+el8.10.0+23369+11a81384.5.x86_64
RHSA-2025:18297 Moderate/Sec. perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373 Moderate/Sec. perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751 Moderate/Sec. perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757 Moderate/Sec. perf-4.18.0-553.80.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec. perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386 Moderate/Sec. perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297 Moderate/Sec. perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386 Moderate/Sec. perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817 Moderate/Sec. perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841 Moderate/Sec. perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849 Moderate/Sec. perf-4.18.0-553.81.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec. perf-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431 Moderate/Sec. perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226 Moderate/Sec. perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257 Moderate/Sec. perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864 Moderate/Sec. perf-4.18.0-553.82.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec. perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367 Moderate/Sec. perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178 Moderate/Sec. perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300 Moderate/Sec. perf-4.18.0-553.83.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-Attribute-Handlers-0.99-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-Attribute-Handlers-0.99-423.el8_10.noarch
classification Moderate/Sec. perl-Attribute-Handlers-0.99-423.el8_10.noarch
RHSA-2025:8432 Moderate/Sec. perl-CPAN-2.18-402.el8_10.noarch
CVE-2020-16156 Moderate/Sec. perl-CPAN-2.18-402.el8_10.noarch
classification Moderate/Sec. perl-CPAN-2.18-402.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-Devel-Peek-1.26-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-Devel-Peek-1.26-423.el8_10.x86_64
classification Moderate/Sec. perl-Devel-Peek-1.26-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-Devel-SelfStubber-1.06-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-Devel-SelfStubber-1.06-423.el8_10.noarch
classification Moderate/Sec. perl-Devel-SelfStubber-1.06-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-ExtUtils-Embed-1.34-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-ExtUtils-Embed-1.34-423.el8_10.noarch
classification Moderate/Sec. perl-ExtUtils-Embed-1.34-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-ExtUtils-Miniperl-1.06-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-ExtUtils-Miniperl-1.06-423.el8_10.noarch
classification Moderate/Sec. perl-ExtUtils-Miniperl-1.06-423.el8_10.noarch
RHSA-2025:8414 Moderate/Sec. perl-Git-2.43.5-3.el8_10.noarch
CVE-2024-52005 Moderate/Sec. perl-Git-2.43.5-3.el8_10.noarch
classification Moderate/Sec. perl-Git-2.43.5-3.el8_10.noarch
RHSA-2025:11534 Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2024-50349 Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2024-52006 Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2025-27613 Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2025-27614 Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2025-46835 Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2025-48384 Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
CVE-2025-48385 Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
classification Important/Sec. perl-Git-2.43.7-1.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch
classification Moderate/Sec. perl-Locale-Maketext-Simple-1:0.21-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-Memoize-1.03-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-Memoize-1.03-423.el8_10.noarch
classification Moderate/Sec. perl-Memoize-1.03-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-Module-Loaded-1:0.08-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-Module-Loaded-1:0.08-423.el8_10.noarch
classification Moderate/Sec. perl-Module-Loaded-1:0.08-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-Net-Ping-2.55-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-Net-Ping-2.55-423.el8_10.noarch
classification Moderate/Sec. perl-Net-Ping-2.55-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-Pod-Html-1.22.02-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-Pod-Html-1.22.02-423.el8_10.noarch
classification Moderate/Sec. perl-Pod-Html-1.22.02-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-SelfLoader-1.23-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-SelfLoader-1.23-423.el8_10.noarch
classification Moderate/Sec. perl-SelfLoader-1.23-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-Test-1.30-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-Test-1.30-423.el8_10.noarch
classification Moderate/Sec. perl-Test-1.30-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-Time-Piece-1.31-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-Time-Piece-1.31-423.el8_10.x86_64
classification Moderate/Sec. perl-Time-Piece-1.31-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-libnetcfg-4:5.26.3-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-libnetcfg-4:5.26.3-423.el8_10.noarch
classification Moderate/Sec. perl-libnetcfg-4:5.26.3-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-open-1.11-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-open-1.11-423.el8_10.noarch
classification Moderate/Sec. perl-open-1.11-423.el8_10.noarch
RHSA-2025:14560 Moderate/Sec. platform-python-devel-3.6.8-71.el8_10.x86_64
CVE-2025-8194 Moderate/Sec. platform-python-devel-3.6.8-71.el8_10.x86_64
classification Moderate/Sec. platform-python-devel-3.6.8-71.el8_10.x86_64
RHSA-2025:9142 Moderate/Sec. podman-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. podman-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. podman-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. podman-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. podman-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. podman-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. podman-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142 Moderate/Sec. podman-catatonit-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. podman-catatonit-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. podman-catatonit-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. podman-catatonit-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. podman-catatonit-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. podman-catatonit-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. podman-catatonit-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142 Moderate/Sec. podman-gvproxy-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. podman-gvproxy-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. podman-gvproxy-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. podman-gvproxy-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. podman-gvproxy-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. podman-gvproxy-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. podman-gvproxy-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142 Moderate/Sec. podman-plugins-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. podman-plugins-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. podman-plugins-4:4.9.4-20.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. podman-plugins-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. podman-plugins-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. podman-plugins-4:4.9.4-22.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. podman-plugins-4:4.9.4-23.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:19835 Important/Sec. python3-bind-32:9.11.36-16.el8_10.6.noarch
CVE-2025-40778 Important/Sec. python3-bind-32:9.11.36-16.el8_10.6.noarch
classification Important/Sec. python3-bind-32:9.11.36-16.el8_10.6.noarch
RHSA-2025:8419 Low/Sec. python3-bson-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
CVE-2024-5629 Low/Sec. python3-bson-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
classification Low/Sec. python3-bson-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
RHSA-2025:9188 Important/Sec. python3-ipaclient-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
CVE-2025-4404 Important/Sec. python3-ipaclient-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
classification Important/Sec. python3-ipaclient-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
RHSA-2025:17129 Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
CVE-2025-7493 Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
classification Important/Sec. python3-ipaclient-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
RHSA-2025:9188 Important/Sec. python3-ipalib-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
CVE-2025-4404 Important/Sec. python3-ipalib-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
classification Important/Sec. python3-ipalib-4.9.13-18.module+el8.10.0+23183+85190b0c.noarch
RHSA-2025:17129 Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
CVE-2025-7493 Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
classification Important/Sec. python3-ipalib-4.9.13-20.module+el8.10.0+23537+32c82745.noarch
RHSA-2025:19610 Important/Sec. python3-libipa_hbac-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. python3-libipa_hbac-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. python3-libipa_hbac-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. python3-libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. python3-libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. python3-libsss_nss_idmap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:18297 Moderate/Sec. python3-perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2023-53373 Moderate/Sec. python3-perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39751 Moderate/Sec. python3-perf-4.18.0-553.80.1.el8_10.x86_64
CVE-2025-39757 Moderate/Sec. python3-perf-4.18.0-553.80.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.80.1.el8_10.x86_64
RHSA-2025:19102 Moderate/Sec. python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2022-50386 Moderate/Sec. python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53297 Moderate/Sec. python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2023-53386 Moderate/Sec. python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39817 Moderate/Sec. python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39841 Moderate/Sec. python3-perf-4.18.0-553.81.1.el8_10.x86_64
CVE-2025-39849 Moderate/Sec. python3-perf-4.18.0-553.81.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.81.1.el8_10.x86_64
RHSA-2025:19447 Moderate/Sec. python3-perf-4.18.0-553.82.1.el8_10.x86_64
RHEL-109431 Moderate/Sec. python3-perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53226 Moderate/Sec. python3-perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2023-53257 Moderate/Sec. python3-perf-4.18.0-553.82.1.el8_10.x86_64
CVE-2025-39864 Moderate/Sec. python3-perf-4.18.0-553.82.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.82.1.el8_10.x86_64
RHSA-2025:19931 Moderate/Sec. python3-perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2022-50367 Moderate/Sec. python3-perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2023-53178 Moderate/Sec. python3-perf-4.18.0-553.83.1.el8_10.x86_64
CVE-2025-40300 Moderate/Sec. python3-perf-4.18.0-553.83.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.83.1.el8_10.x86_64
RHSA-2025:8419 Low/Sec. python3-pymongo-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
CVE-2024-5629 Low/Sec. python3-pymongo-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
classification Low/Sec. python3-pymongo-3.7.0-2.module+el8.10.0+23071+07f1d18e.x86_64
RHSA-2025:9188 Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
CVE-2025-4404 Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
classification Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
RHSA-2025:17129 Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
CVE-2025-7493 Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
classification Important/Sec. python3-qrcode-core-5.3-1.module+el8.10.0+22544+6a7f07c2.noarch
RHSA-2025:19610 Important/Sec. python3-sss-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. python3-sss-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. python3-sss-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. python3-sss-murmur-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. python3-sss-murmur-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. python3-sss-murmur-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. python3-sssdconfig-2.9.4-5.el8_10.3.noarch
CVE-2025-11561 Important/Sec. python3-sssdconfig-2.9.4-5.el8_10.3.noarch
classification Important/Sec. python3-sssdconfig-2.9.4-5.el8_10.3.noarch
RHSA-2025:11884 Important/Sec. python3-unbound-1.16.2-5.9.el8_10.x86_64
CVE-2025-5994 Important/Sec. python3-unbound-1.16.2-5.9.el8_10.x86_64
classification Important/Sec. python3-unbound-1.16.2-5.9.el8_10.x86_64
RHSA-2025:14900 Moderate/Sec. python39-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194 Moderate/Sec. python39-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273 Moderate/Sec. python39-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification Moderate/Sec. python39-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:14900 Moderate/Sec. python39-devel-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194 Moderate/Sec. python39-devel-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273 Moderate/Sec. python39-devel-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification Moderate/Sec. python39-devel-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:14900 Moderate/Sec. python39-idle-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194 Moderate/Sec. python39-idle-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273 Moderate/Sec. python39-idle-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification Moderate/Sec. python39-idle-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:14900 Moderate/Sec. python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194 Moderate/Sec. python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273 Moderate/Sec. python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification Moderate/Sec. python39-libs-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:14900 Moderate/Sec. python39-rpm-macros-3.9.20-2.module+el8.10.0+23441+1124c1da.noarch
CVE-2025-8194 Moderate/Sec. python39-rpm-macros-3.9.20-2.module+el8.10.0+23441+1124c1da.noarch
CVE-2025-47273 Moderate/Sec. python39-rpm-macros-3.9.20-2.module+el8.10.0+23441+1124c1da.noarch
classification Moderate/Sec. python39-rpm-macros-3.9.20-2.module+el8.10.0+23441+1124c1da.noarch
RHSA-2025:14900 Moderate/Sec. python39-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
CVE-2025-8194 Moderate/Sec. python39-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
CVE-2025-47273 Moderate/Sec. python39-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
classification Moderate/Sec. python39-setuptools-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
RHSA-2025:14900 Moderate/Sec. python39-setuptools-wheel-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
CVE-2025-8194 Moderate/Sec. python39-setuptools-wheel-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
CVE-2025-47273 Moderate/Sec. python39-setuptools-wheel-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
classification Moderate/Sec. python39-setuptools-wheel-50.3.2-7.module+el8.10.0+23406+03055bfb.noarch
RHSA-2025:14900 Moderate/Sec. python39-test-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194 Moderate/Sec. python39-test-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273 Moderate/Sec. python39-test-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification Moderate/Sec. python39-test-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:14900 Moderate/Sec. python39-tkinter-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-8194 Moderate/Sec. python39-tkinter-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
CVE-2025-47273 Moderate/Sec. python39-tkinter-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
classification Moderate/Sec. python39-tkinter-3.9.20-2.module+el8.10.0+23441+1124c1da.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-img-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-img-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-img-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-block-curl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-block-gluster-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-block-iscsi-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-block-rbd-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-block-ssh-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-common-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-common-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-common-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-core-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-core-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-core-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-docs-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-docs-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-docs-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-hw-usbredir-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-ui-opengl-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:12527 Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
CVE-2025-49133 Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
classification Moderate/Sec. qemu-kvm-ui-spice-15:6.2.0-53.module+el8.10.0+23081+c18b1ee3.4.x86_64
RHSA-2025:7539 Moderate/Sec. ruby-libs-2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64
CVE-2019-19012 Moderate/Sec. ruby-libs-2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64
CVE-2021-43809 Moderate/Sec. ruby-libs-2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64
classification Moderate/Sec. ruby-libs-2.5.9-114.module+el8.10.0+23088+750dc6ca.x86_64
RHSA-2025:3210 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:9142 Moderate/Sec. runc-1:1.1.12-6.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. runc-1:1.1.12-6.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. runc-1:1.1.12-6.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. runc-1:1.1.12-6.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142 Moderate/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. skopeo-2:1.14.5-4.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:9142 Moderate/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23250+94af2c8e.x86_64
CVE-2025-22871 Moderate/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23250+94af2c8e.x86_64
classification Moderate/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23250+94af2c8e.x86_64
RHSA-2025:10551 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23320+f7205097.x86_64
CVE-2025-6032 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23320+f7205097.x86_64
classification Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23320+f7205097.x86_64
RHSA-2025:15904 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23498+f7d19d48.x86_64
CVE-2025-9566 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23498+f7d19d48.x86_64
classification Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+23498+f7d19d48.x86_64
RHSA-2025:19610 Important/Sec. sssd-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-ad-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-ad-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-ad-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-client-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-client-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-client-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-common-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-common-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-common-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-common-pac-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-common-pac-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-common-pac-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-dbus-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-dbus-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-dbus-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-idp-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-idp-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-idp-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-ipa-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-ipa-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-ipa-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-kcm-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-kcm-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-kcm-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-krb5-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-krb5-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-krb5-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-krb5-common-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-krb5-common-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-krb5-common-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-ldap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-ldap-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-ldap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-nfs-idmap-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-nfs-idmap-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-nfs-idmap-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-proxy-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-proxy-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-proxy-2.9.4-5.el8_10.3.x86_64
RHSA-2025:19610 Important/Sec. sssd-tools-2.9.4-5.el8_10.3.x86_64
CVE-2025-11561 Important/Sec. sssd-tools-2.9.4-5.el8_10.3.x86_64
classification Important/Sec. sssd-tools-2.9.4-5.el8_10.3.x86_64
RHSA-2025:15017 Important/Sec. udisks2-2.9.0-16.el8_10.1.x86_64
CVE-2025-8067 Important/Sec. udisks2-2.9.0-16.el8_10.1.x86_64
classification Important/Sec. udisks2-2.9.0-16.el8_10.1.x86_64
RHSA-2025:15017 Important/Sec. udisks2-iscsi-2.9.0-16.el8_10.1.x86_64
CVE-2025-8067 Important/Sec. udisks2-iscsi-2.9.0-16.el8_10.1.x86_64
classification Important/Sec. udisks2-iscsi-2.9.0-16.el8_10.1.x86_64
RHSA-2025:15017 Important/Sec. udisks2-lvm2-2.9.0-16.el8_10.1.x86_64
CVE-2025-8067 Important/Sec. udisks2-lvm2-2.9.0-16.el8_10.1.x86_64
classification Important/Sec. udisks2-lvm2-2.9.0-16.el8_10.1.x86_64
RHSA-2025:11884 Important/Sec. unbound-libs-1.16.2-5.9.el8_10.x86_64
CVE-2025-5994 Important/Sec. unbound-libs-1.16.2-5.9.el8_10.x86_64
classification Important/Sec. unbound-libs-1.16.2-5.9.el8_10.x86_64
RHSA-2025:17715 Moderate/Sec. vim-common-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53905 Moderate/Sec. vim-common-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53906 Moderate/Sec. vim-common-2:8.0.1763-21.el8_10.x86_64
classification Moderate/Sec. vim-common-2:8.0.1763-21.el8_10.x86_64
RHSA-2025:17715 Moderate/Sec. vim-enhanced-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53905 Moderate/Sec. vim-enhanced-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53906 Moderate/Sec. vim-enhanced-2:8.0.1763-21.el8_10.x86_64
classification Moderate/Sec. vim-enhanced-2:8.0.1763-21.el8_10.x86_64
RHSA-2025:17715 Moderate/Sec. vim-filesystem-2:8.0.1763-21.el8_10.noarch
CVE-2025-53905 Moderate/Sec. vim-filesystem-2:8.0.1763-21.el8_10.noarch
CVE-2025-53906 Moderate/Sec. vim-filesystem-2:8.0.1763-21.el8_10.noarch
classification Moderate/Sec. vim-filesystem-2:8.0.1763-21.el8_10.noarch
8.10.25.10.SP8
The release date of the 8.10.25.10.SP8 security patch is 04 November 2025. The estimated run time is around 70 minutes.
mirror_registry service in some
nodes:ATTENTION : Errors encountered during upgrade operation
========================================================
Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.10.SP8_release --upgrade-directory /localrepo --phase platform
1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.10.SP8_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']
========================================================
Workaround
- On the failed node, run the following command to load the
podmanimage:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gzExample:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz Getting image source signatures Copying blob 7b9a3910f3c3 done Copying blob 9a5d14f9f550 done Copying blob b4592cba0628 done Copying blob de9819405bcf done Copying blob 3764c3e89288 done Copying config 1fd8e1b0bb done Writing manifest to image destination Storing signatures Loaded image: docker.io/library/registry:2.7 [root@e1n1 install]# podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB - Run the following command to restart the
mirror_registryservice:[root@e1n1 rhcos]# systemctl restart mirror-registry - Restart the upgrade.
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:
Workaround
- On node
e1n1, run the following commands:sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.pysed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade - Restart the upgrade.
- Once the upgrade is successfully completed, run the following
command:
sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
RHSA-2025:15702 Important/Sec. cups-libs-1:2.2.6-63.el8_10.x86_64
CVE-2025-58060 Important/Sec. cups-libs-1:2.2.6-63.el8_10.x86_64
classification Important/Sec. cups-libs-1:2.2.6-63.el8_10.x86_64
RHSA-2025:17415 Moderate/Sec. gnutls-3.6.16-8.el8_10.4.x86_64
CVE-2025-6395 Moderate/Sec. gnutls-3.6.16-8.el8_10.4.x86_64
CVE-2025-32988 Moderate/Sec. gnutls-3.6.16-8.el8_10.4.x86_64
CVE-2025-32990 Moderate/Sec. gnutls-3.6.16-8.el8_10.4.x86_64
classification Moderate/Sec. gnutls-3.6.16-8.el8_10.4.x86_64
RHSA-2025:15785 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-core-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-core-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-core-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-core-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-core-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-core-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-core-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-core-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-core-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-core-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-core-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-debuginfo-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-debuginfo-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-debuginfo-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-debuginfo-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-debuginfo-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-debuginfo-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-debuginfo-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-debuginfo-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-debuginfo-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-debuginfo-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-debuginfo-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-devel-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-devel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-devel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-devel-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-devel-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-devel-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-devel-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-devel-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-devel-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-devel-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-devel-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-headers-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-headers-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-headers-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-headers-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-headers-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-headers-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-headers-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-headers-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-headers-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-headers-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-headers-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-modules-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-modules-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-modules-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-modules-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-modules-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-modules-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-modules-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-modules-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-modules-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-modules-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-modules-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-modules-extra-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-modules-extra-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-modules-extra-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-modules-extra-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-modules-extra-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-modules-extra-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-modules-extra-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-tools-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-tools-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-tools-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-tools-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-tools-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-tools-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-tools-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-tools-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-tools-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-tools-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-tools-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. kernel-tools-libs-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. kernel-tools-libs-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. kernel-tools-libs-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. kernel-tools-libs-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. kernel-tools-libs-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. kernel-tools-libs-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. kernel-tools-libs-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.79.1.el8_10.x86_64
RHEA-2024:8852 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
CVE-2020-26154 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
RHSA-2025:16823 Moderate/Sec. openssh-8.0p1-26.el8_10.x86_64
CVE-2025-26465 Moderate/Sec. openssh-8.0p1-26.el8_10.x86_64
classification Moderate/Sec. openssh-8.0p1-26.el8_10.x86_64
RHSA-2025:16823 Moderate/Sec. openssh-clients-8.0p1-26.el8_10.x86_64
CVE-2025-26465 Moderate/Sec. openssh-clients-8.0p1-26.el8_10.x86_64
classification Moderate/Sec. openssh-clients-8.0p1-26.el8_10.x86_64
RHSA-2025:16823 Moderate/Sec. openssh-server-8.0p1-26.el8_10.x86_64
CVE-2025-26465 Moderate/Sec. openssh-server-8.0p1-26.el8_10.x86_64
classification Moderate/Sec. openssh-server-8.0p1-26.el8_10.x86_64
RHSA-2025:15785 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. perf-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. perf-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. perf-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. perf-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. perf-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. perf-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. perf-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. perf-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:15785 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2023-53125 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38350 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38392 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38449 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
CVE-2025-38684 Important/Sec. python3-perf-4.18.0-553.75.1.el8_10.x86_64
RHSA-2025:16372 Moderate/Sec. python3-perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38461 Moderate/Sec. python3-perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38498 Moderate/Sec. python3-perf-4.18.0-553.76.1.el8_10.x86_64
CVE-2025-38556 Moderate/Sec. python3-perf-4.18.0-553.76.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.76.1.el8_10.x86_64
RHSA-2025:16919 Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2022-50087 Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-22026 Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-37797 Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
CVE-2025-38718 Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.77.1.el8_10.x86_64
RHSA-2025:17397 Moderate/Sec. python3-perf-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-38527 Moderate/Sec. python3-perf-4.18.0-553.78.1.el8_10.x86_64
CVE-2025-39730 Moderate/Sec. python3-perf-4.18.0-553.78.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.78.1.el8_10.x86_64
RHSA-2025:17797 Moderate/Sec. python3-perf-4.18.0-553.79.1.el8_10.x86_64
CVE-2022-50228 Moderate/Sec. python3-perf-4.18.0-553.79.1.el8_10.x86_64
CVE-2023-53305 Moderate/Sec. python3-perf-4.18.0-553.79.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.79.1.el8_10.x86_64
RHSA-2025:17715 Moderate/Sec. vim-minimal-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53905 Moderate/Sec. vim-minimal-2:8.0.1763-21.el8_10.x86_64
CVE-2025-53906 Moderate/Sec. vim-minimal-2:8.0.1763-21.el8_10.x86_64
classification Moderate/Sec. vim-minimal-2:8.0.1763-21.el8_10.x86_64
[root@gt27-node2 ~]#
8.10.25.09.SP7
The release date of the 8.10.25.09.SP7 security patch is 30 September 2025. The estimated run time is around 120 minutes.
mirror_registry service in some
nodes:ATTENTION : Errors encountered during upgrade operation
========================================================
Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.09.SP7_release --upgrade-directory /localrepo --phase platform
1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.09.SP7_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']
========================================================
Workaround
- On the failed node, run the following command to load the
podmanimage:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gzExample:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz Getting image source signatures Copying blob 7b9a3910f3c3 done Copying blob 9a5d14f9f550 done Copying blob b4592cba0628 done Copying blob de9819405bcf done Copying blob 3764c3e89288 done Copying config 1fd8e1b0bb done Writing manifest to image destination Storing signatures Loaded image: docker.io/library/registry:2.7 [root@e1n1 install]# podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB - Run the following command to restart the
mirror_registryservice:[root@e1n1 rhcos]# systemctl restart mirror-registry - Restart the upgrade.
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:
Workaround
- On node
e1n1, run the following commands:sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.pysed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade - Restart the upgrade.
- Once the upgrade is successfully completed, run the following
command:
sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
RHSA-2025:13315 Moderate/Sec. gdk-pixbuf2-2.36.12-7.el8_10.x86_64
CVE-2025-7345 Moderate/Sec. gdk-pixbuf2-2.36.12-7.el8_10.x86_64
classification Moderate/Sec. gdk-pixbuf2-2.36.12-7.el8_10.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-common-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-common-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-common-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-devel-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-devel-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-devel-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-headers-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-headers-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-headers-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-locale-source-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.25.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-core-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-core-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-core-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-core-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-core-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-core-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-core-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-debuginfo-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-debuginfo-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-debuginfo-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-debuginfo-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-debuginfo-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-debuginfo-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-debuginfo-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-devel-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-devel-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-devel-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-devel-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-devel-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-devel-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-devel-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-headers-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-headers-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-headers-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-headers-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-headers-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-headers-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-headers-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-modules-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-modules-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-modules-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-modules-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-modules-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-modules-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-modules-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-modules-extra-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-modules-extra-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-modules-extra-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-modules-extra-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-modules-extra-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-modules-extra-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-modules-extra-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-tools-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-tools-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-tools-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-tools-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-tools-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-tools-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-tools-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. kernel-tools-libs-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. kernel-tools-libs-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. kernel-tools-libs-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. kernel-tools-libs-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. kernel-tools-libs-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. kernel-tools-libs-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. kernel-tools-libs-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:14135 Important/Sec. libarchive-3.3.3-6.el8_10.x86_64
CVE-2025-5914 Important/Sec. libarchive-3.3.3-6.el8_10.x86_64
classification Important/Sec. libarchive-3.3.3-6.el8_10.x86_64
RHSA-2025:12980 Moderate/Sec. libnsl-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. libnsl-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. libnsl-2.28-251.el8_10.25.x86_64
RHEA-2024:8852 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
CVE-2020-26154 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
RHSA-2025:13203 Moderate/Sec. libxml2-2.9.7-21.el8_10.3.x86_64
CVE-2025-32415 Moderate/Sec. libxml2-2.9.7-21.el8_10.3.x86_64
classification Moderate/Sec. libxml2-2.9.7-21.el8_10.3.x86_64
RHSA-2025:12980 Moderate/Sec. nscd-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. nscd-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. nscd-2.28-251.el8_10.25.x86_64
RHSA-2025:12980 Moderate/Sec. nss_db-2.28-251.el8_10.25.x86_64
CVE-2025-8058 Moderate/Sec. nss_db-2.28-251.el8_10.25.x86_64
classification Moderate/Sec. nss_db-2.28-251.el8_10.25.x86_64
RHSA-2025:14557 Important/Sec. pam-1.3.1-38.el8_10.x86_64
classification Important/Sec. pam-1.3.1-38.el8_10.x86_64
CVE-2025-6020 Important/Sec. pam-1.3.1-38.el8_10.x86_64
CVE-2025-8941 Important/Sec. pam-1.3.1-38.el8_10.x86_64
RHSA-2025:13589 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. perf-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. perf-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. perf-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. perf-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. perf-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. perf-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. perf-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:14560 Moderate/Sec. platform-python-3.6.8-71.el8_10.x86_64
CVE-2025-8194 Moderate/Sec. platform-python-3.6.8-71.el8_10.x86_64
classification Moderate/Sec. platform-python-3.6.8-71.el8_10.x86_64
RHSA-2025:14553 Moderate/Sec. python3-cryptography-3.2.1-8.el8_10.x86_64
CVE-2023-49083 Moderate/Sec. python3-cryptography-3.2.1-8.el8_10.x86_64
classification Moderate/Sec. python3-cryptography-3.2.1-8.el8_10.x86_64
RHSA-2025:14560 Moderate/Sec. python3-libs-3.6.8-71.el8_10.x86_64
CVE-2025-8194 Moderate/Sec. python3-libs-3.6.8-71.el8_10.x86_64
classification Moderate/Sec. python3-libs-3.6.8-71.el8_10.x86_64
RHSA-2025:13203 Moderate/Sec. python3-libxml2-2.9.7-21.el8_10.3.x86_64
CVE-2025-32415 Moderate/Sec. python3-libxml2-2.9.7-21.el8_10.3.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-21.el8_10.3.x86_64
RHSA-2025:13589 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2021-47670 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2024-56644 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21727 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-21759 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38085 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
CVE-2025-38159 Moderate/Sec. python3-perf-4.18.0-553.69.1.el8_10.x86_64
RHSA-2025:13960 Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-22097 Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-37914 Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38250 Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
CVE-2025-38380 Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.70.1.el8_10.x86_64
RHSA-2025:14438 Moderate/Sec. python3-perf-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-22058 Moderate/Sec. python3-perf-4.18.0-553.71.1.el8_10.x86_64
CVE-2025-38200 Moderate/Sec. python3-perf-4.18.0-553.71.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.71.1.el8_10.x86_64
RHSA-2025:15008 Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38211 Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38332 Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38464 Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
CVE-2025-38477 Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.72.1.el8_10.x86_64
RHSA-2025:15471 Important/Sec. python3-perf-4.18.0-553.74.1.el8_10.x86_64
CVE-2022-49985 Important/Sec. python3-perf-4.18.0-553.74.1.el8_10.x86_64
CVE-2025-38352 Important/Sec. python3-perf-4.18.0-553.74.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.74.1.el8_10.x86_64
RHSA-2025:13234 Moderate/Sec. python3-requests-2.20.0-6.el8_10.noarch
CVE-2024-47081 Moderate/Sec. python3-requests-2.20.0-6.el8_10.noarch
classification Moderate/Sec. python3-requests-2.20.0-6.el8_10.noarch
RHBA-2024:5736 bugfix ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch
CVE-2023-37920 bugfix ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch
8.10.25.08.SP6
The release date of the 8.10.25.08.SP6 security patch is 29 August 2025. The estimated run time is around 100 minutes.
mirror_registry service in some
nodes:ATTENTION : Errors encountered during upgrade operation
========================================================
Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.08.SP6_release --upgrade-directory /localrepo --phase platform
1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.08.SP6_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']
========================================================
Workaround
- On the failed node, run the following command to load the
podmanimage:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gzExample:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz Getting image source signatures Copying blob 7b9a3910f3c3 done Copying blob 9a5d14f9f550 done Copying blob b4592cba0628 done Copying blob de9819405bcf done Copying blob 3764c3e89288 done Copying config 1fd8e1b0bb done Writing manifest to image destination Storing signatures Loaded image: docker.io/library/registry:2.7 [root@e1n1 install]# podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB - Run the following command to restart the
mirror_registryservice:[root@e1n1 rhcos]# systemctl restart mirror-registry - Restart the upgrade.
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:
Workaround
- On node
e1n1, run the following commands:sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.pysed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade - Restart the upgrade.
- Once the upgrade is successfully completed, run the following
command:
sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
RHSA-2025:11030 Moderate/Sec. emacs-filesystem-1:26.1-15.el8_10.noarch
CVE-2024-53920 Moderate/Sec. emacs-filesystem-1:26.1-15.el8_10.noarch
classification Moderate/Sec. emacs-filesystem-1:26.1-15.el8_10.noarch
RHSA-2025:11327 Moderate/Sec. glib2-2.56.4-166.el8_10.x86_64
CVE-2024-34397 Moderate/Sec. glib2-2.56.4-166.el8_10.x86_64
CVE-2024-52533 Moderate/Sec. glib2-2.56.4-166.el8_10.x86_64
CVE-2025-4373 Moderate/Sec. glib2-2.56.4-166.el8_10.x86_64
classification Moderate/Sec. glib2-2.56.4-166.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-core-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-core-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-core-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-core-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-core-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-core-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-core-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-core-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-core-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-core-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-core-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-debuginfo-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-debuginfo-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-debuginfo-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-debuginfo-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-debuginfo-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-debuginfo-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-debuginfo-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-debuginfo-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-debuginfo-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-debuginfo-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-debuginfo-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-devel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-devel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-devel-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-devel-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-devel-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-devel-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-devel-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-devel-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-devel-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-devel-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-devel-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-headers-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-headers-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-headers-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-headers-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-headers-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-headers-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-headers-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-headers-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-headers-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-headers-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-headers-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-modules-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-modules-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-modules-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-modules-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-modules-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-modules-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-modules-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-modules-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-modules-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-modules-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-modules-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-modules-extra-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-modules-extra-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-modules-extra-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-modules-extra-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-modules-extra-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-modules-extra-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-modules-extra-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-tools-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-tools-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-tools-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-tools-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-tools-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-tools-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-tools-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-tools-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-tools-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-tools-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-tools-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. kernel-tools-libs-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. kernel-tools-libs-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. kernel-tools-libs-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. kernel-tools-libs-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. kernel-tools-libs-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. kernel-tools-libs-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. kernel-tools-libs-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:10698 Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
RHEL-74345 Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-6021 Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-49794 Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-49796 Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
classification Important/Sec. libxml2-2.9.7-21.el8_10.1.x86_64
RHSA-2025:12450 Important/Sec. libxml2-2.9.7-21.el8_10.2.x86_64
CVE-2025-7425 Important/Sec. libxml2-2.9.7-21.el8_10.2.x86_64
classification Important/Sec. libxml2-2.9.7-21.el8_10.2.x86_64
RHSA-2025:11035 Moderate/Sec. lz4-1.8.3-5.el8_10.x86_64
CVE-2019-17543 Moderate/Sec. lz4-1.8.3-5.el8_10.x86_64
classification Moderate/Sec. lz4-1.8.3-5.el8_10.x86_64
RHSA-2025:11035 Moderate/Sec. lz4-libs-1.8.3-5.el8_10.x86_64
CVE-2019-17543 Moderate/Sec. lz4-libs-1.8.3-5.el8_10.x86_64
classification Moderate/Sec. lz4-libs-1.8.3-5.el8_10.x86_64
RHSA-2025:10991 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
classification Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2024-28956 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2024-43420 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2024-45332 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2025-20012 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2025-20623 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
CVE-2025-24495 Moderate/Sec. microcode_ctl-4:20250512-1.el8_10.x86_64
RHSA-2025:10669 Important/Sec. perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. perf-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. perf-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. perf-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. perf-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. perf-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
classification Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-IO-1.38-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-IO-1.38-423.el8_10.x86_64
classification Moderate/Sec. perl-IO-1.38-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-IO-Zlib-1:1.10-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-IO-Zlib-1:1.10-423.el8_10.noarch
classification Moderate/Sec. perl-IO-Zlib-1:1.10-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-Math-Complex-1.59-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-Math-Complex-1.59-423.el8_10.noarch
classification Moderate/Sec. perl-Math-Complex-1.59-423.el8_10.noarch
RHSA-2025:11805 Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-macros-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-macros-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-macros-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11036 Moderate/Sec. platform-python-setuptools-39.2.0-9.el8_10.noarch
CVE-2025-47273 Moderate/Sec. platform-python-setuptools-39.2.0-9.el8_10.noarch
classification Moderate/Sec. platform-python-setuptools-39.2.0-9.el8_10.noarch
RHSA-2025:10698 Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
RHEL-74345 Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-6021 Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-49794 Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
CVE-2025-49796 Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
classification Important/Sec. python3-libxml2-2.9.7-21.el8_10.1.x86_64
RHSA-2025:12450 Important/Sec. python3-libxml2-2.9.7-21.el8_10.2.x86_64
CVE-2025-7425 Important/Sec. python3-libxml2-2.9.7-21.el8_10.2.x86_64
classification Important/Sec. python3-libxml2-2.9.7-21.el8_10.2.x86_64
RHSA-2025:10669 Important/Sec. python3-perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49111 Important/Sec. python3-perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49136 Important/Sec. python3-perf-4.18.0-553.60.1.el8_10.x86_64
CVE-2022-49846 Important/Sec. python3-perf-4.18.0-553.60.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.60.1.el8_10.x86_64
RHSA-2025:11298 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49058 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2022-49788 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-57980 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2024-58002 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-21991 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-22004 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-23150 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
CVE-2025-37738 Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.62.1.el8_10.x86_64
RHSA-2025:11455 Moderate/Sec. python3-perf-4.18.0-553.63.1.el8_10.x86_64
CVE-2024-50154 Moderate/Sec. python3-perf-4.18.0-553.63.1.el8_10.x86_64
CVE-2025-38086 Moderate/Sec. python3-perf-4.18.0-553.63.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.63.1.el8_10.x86_64
RHSA-2025:11850 Moderate/Sec. python3-perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2022-49977 Moderate/Sec. python3-perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21905 Moderate/Sec. python3-perf-4.18.0-553.64.1.el8_10.x86_64
CVE-2025-21919 Moderate/Sec. python3-perf-4.18.0-553.64.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.64.1.el8_10.x86_64
RHSA-2025:12752 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2022-50020 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-21928 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-22020 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-37890 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38052 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
CVE-2025-38079 Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.66.1.el8_10.x86_64
RHSA-2025:11036 Moderate/Sec. python3-setuptools-39.2.0-9.el8_10.noarch
CVE-2025-47273 Moderate/Sec. python3-setuptools-39.2.0-9.el8_10.noarch
classification Moderate/Sec. python3-setuptools-39.2.0-9.el8_10.noarch
RHSA-2025:11036 Moderate/Sec. python3-setuptools-wheel-39.2.0-9.el8_10.noarch
CVE-2025-47273 Moderate/Sec. python3-setuptools-wheel-39.2.0-9.el8_10.noarch
classification Moderate/Sec. python3-setuptools-wheel-39.2.0-9.el8_10.noarch
RHSA-2025:12010 Important/Sec. sqlite-3.26.0-20.el8_10.x86_64
CVE-2025-6965 Important/Sec. sqlite-3.26.0-20.el8_10.x86_64
classification Important/Sec. sqlite-3.26.0-20.el8_10.x86_64
RHSA-2025:12010 Important/Sec. sqlite-libs-3.26.0-20.el8_10.x86_64
CVE-2025-6965 Important/Sec. sqlite-libs-3.26.0-20.el8_10.x86_64
classification Important/Sec. sqlite-libs-3.26.0-20.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
classification Moderate/Sec. perl-Errno-1.28-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-devel-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-devel-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-devel-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-interpreter-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
CVE-2025-40909 Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
classification Moderate/Sec. perl-libs-4:5.26.3-423.el8_10.x86_64
RHSA-2025:11805 Moderate/Sec. perl-utils-5.26.3-423.el8_10.noarch
CVE-2025-40909 Moderate/Sec. perl-utils-5.26.3-423.el8_10.noarch
classification Moderate/Sec. perl-utils-5.26.3-423.el8_10.noarch
8.10.25.07.SP5
The release date of the 8.10.25.07.SP5 security patch is 30 July 2025. The estimated run time is around 80 minutes.
mirror_registry service in some
nodes:ATTENTION : Errors encountered during upgrade operation
========================================================
Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.07.SP5_release --upgrade-directory /localrepo --phase platform
1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.07.SP5_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']
========================================================
Workaround
- On the failed node, run the following command to load the
podmanimage:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gzExample:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz Getting image source signatures Copying blob 7b9a3910f3c3 done Copying blob 9a5d14f9f550 done Copying blob b4592cba0628 done Copying blob de9819405bcf done Copying blob 3764c3e89288 done Copying config 1fd8e1b0bb done Writing manifest to image destination Storing signatures Loaded image: docker.io/library/registry:2.7 [root@e1n1 install]# podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB - Run the following command to restart the
mirror_registryservice:[root@e1n1 rhcos]# systemctl restart mirror-registry - Restart the upgrade.
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:
Workaround
- On node
e1n1, run the following commands:sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.pysed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade - Restart the upgrade.
- Once the upgrade is successfully completed, run the following
command:
sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
RHSA-2025:8686 Moderate/Sec. glibc-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-common-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-common-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-common-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-devel-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-devel-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-devel-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-headers-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-headers-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-headers-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-locale-source-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-locale-source-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.22.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-core-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-core-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-debuginfo-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-debuginfo-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-devel-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-devel-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-headers-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-headers-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-modules-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-modules-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-modules-extra-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-modules-extra-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-tools-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-tools-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. kernel-tools-libs-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. kernel-tools-libs-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:8686 Moderate/Sec. libnsl-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. libnsl-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. libnsl-2.28-251.el8_10.22.x86_64
RHSA-2025:8958 Moderate/Sec. libxml2-2.9.7-20.el8_10.x86_64
CVE-2025-32414 (RHSA-2025:8958) Moderate/Sec. libxml2-2.9.7-20.el8_10.x86_64
classification Moderate/Sec. libxml2-2.9.7-20.el8_10.x86_64
RHSA-2025:8676 Moderate/Sec. libxslt-1.1.32-6.2.el8_10.x86_64
CVE-2023-40403 (RHSA-2025:8676) Moderate/Sec. libxslt-1.1.32-6.2.el8_10.x86_64
classification Moderate/Sec. libxslt-1.1.32-6.2.el8_10.x86_64
RHSA-2025:8686 Moderate/Sec. nscd-2.28-251.el8_10.22.x86_64
CVE-2025-4802 (RHSA-2025:8686) Moderate/Sec. nscd-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. nscd-2.28-251.el8_10.22.x86_64
RHSA-2025:8686 (RHSA-2025:8686) Moderate/Sec. nss_db-2.28-251.el8_10.22.x86_64
CVE-2025-4802 Moderate/Sec. nss_db-2.28-251.el8_10.22.x86_64
classification Moderate/Sec. nss_db-2.28-251.el8_10.22.x86_64
RHSA-2025:10027 Important/Sec. pam-1.3.1-37.el8_10.x86_64
CVE-2025-6020 (RHSA-2025:10027) Important/Sec. pam-1.3.1-37.el8_10.x86_64
classification Important/Sec. pam-1.3.1-37.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. perf-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. perf-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:10128 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2024-12718 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4138 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4330 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4435 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4517 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
classification Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
RHSA-2025:10128 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2024-12718 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4138 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4330 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4435 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4517 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
classification Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
RHSA-2025:8958 Moderate/Sec. python3-libxml2-2.9.7-20.el8_10.x86_64
CVE-2025-32414 Moderate/Sec. python3-libxml2-2.9.7-20.el8_10.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-20.el8_10.x86_64
RHSA-2025:8743 Moderate/Sec. python3-perf-4.18.0-553.56.1.el8_10.x86_64
CVE-2022-49395 (RHSA-2025:8743) Moderate/Sec. python3-perf-4.18.0-553.56.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.56.1.el8_10.x86_64
RHSA-2025:9580 Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2022-48919 (RHSA-2025:9580) Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-50301 (RHSA-2025:9580) Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2024-53064 (RHSA-2025:9580) Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
CVE-2025-21764 (RHSA-2025:9580) Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.58.1.el8_10.x86_64
RHSA-2025:10110 Important/Sec. sudo-1.9.5p2-1.el8_10.1.x86_64
CVE-2025-32462 (RHSA-2025:10110) Important/Sec. sudo-1.9.5p2-1.el8_10.1.x86_64
classification Important/Sec. sudo-1.9.5p2-1.el8_10.1.x86_64
RHSA-2025:10128 Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2024-12718 (RHSA-2025:10128) Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4138 (RHSA-2025:10128) Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4330 (RHSA-2025:10128) Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4435 (RHSA-2025:10128) Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
CVE-2025-4517 (RHSA-2025:10128) Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
classification Important/Sec. platform-python-3.6.8-70.el8_10.x86_64
RHSA-2025:10128 Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
CVE-2024-12718 (RHSA-2025:10128) Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
CVE-2025-4138 (RHSA-2025:10128) Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
CVE-2025-4330 (RHSA-2025:10128) Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
CVE-2025-4435 (RHSA-2025:10128) Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
CVE-2025-4517 (RHSA-2025:10128) Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
classification Important/Sec. platform-python-devel-3.6.8-70.el8_10.x86_64
RHSA-2025:10128 Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2024-12718 (RHSA-2025:10128) Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4138 (RHSA-2025:10128) Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4330 (RHSA-2025:10128) Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4435 (RHSA-2025:10128) Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
CVE-2025-4517 (RHSA-2025:10128) Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
classification Important/Sec. python3-libs-3.6.8-70.el8_10.x86_64
8.10.25.06.SP4
The release date of the 8.10.25.06.SP4 security patch is 27 June 2025. The estimated run time is around 90 minutes.
mirror_registry service in some
nodes:ATTENTION : Errors encountered during upgrade operation
========================================================
Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.06.SP4_release --upgrade-directory /localrepo --phase platform
1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.06.SP4_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']
========================================================
Workaround
- On the failed node, run the following command to load the
podmanimage:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gzExample:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz Getting image source signatures Copying blob 7b9a3910f3c3 done Copying blob 9a5d14f9f550 done Copying blob b4592cba0628 done Copying blob de9819405bcf done Copying blob 3764c3e89288 done Copying config 1fd8e1b0bb done Writing manifest to image destination Storing signatures Loaded image: docker.io/library/registry:2.7 [root@e1n1 install]# podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB - Run the following command to restart the
mirror_registryservice:[root@e1n1 rhcos]# systemctl restart mirror-registry - Restart the upgrade.
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:
Workaround
- On node
e1n1, run the following commands:sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.pysed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade - Restart the upgrade.
- Once the upgrade is successfully completed, run the following
command:
sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
RHSA-2025:7531 Important/Sec. kernel-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-core-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-core-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-core-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-core-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-core-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-core-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-core-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-core-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-core-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-core-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-debuginfo-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-debuginfo-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-debuginfo-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-debuginfo-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-debuginfo-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-debuginfo-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-debuginfo-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-debuginfo-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-debuginfo-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-debuginfo-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-devel-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-devel-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-devel-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-devel-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-devel-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-devel-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-devel-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-devel-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-devel-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-devel-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-headers-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-headers-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-headers-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-headers-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-headers-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-headers-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-headers-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-headers-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-headers-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-headers-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-modules-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-modules-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-modules-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-modules-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-modules-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-modules-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-modules-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-modules-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-modules-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-modules-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-modules-extra-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-modules-extra-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-tools-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-tools-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-tools-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-tools-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-tools-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-tools-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-tools-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-tools-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-tools-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-tools-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. kernel-tools-libs-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. kernel-tools-libs-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. krb5-devel-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. krb5-devel-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. krb5-devel-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. krb5-devel-1.18.2-32.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. krb5-libs-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. krb5-libs-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. krb5-libs-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. krb5-libs-1.18.2-32.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. krb5-pkinit-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. krb5-pkinit-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. krb5-pkinit-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. krb5-pkinit-1.18.2-32.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. krb5-server-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. krb5-server-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. krb5-server-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. krb5-server-1.18.2-32.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. krb5-workstation-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. krb5-workstation-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. krb5-workstation-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. krb5-workstation-1.18.2-32.el8_10.x86_64
RHSA-2025:8411 Moderate/Sec. libkadm5-1.18.2-32.el8_10.x86_64
RHEL-86786 Moderate/Sec. libkadm5-1.18.2-32.el8_10.x86_64
CVE-2025-3576 Moderate/Sec. libkadm5-1.18.2-32.el8_10.x86_64
classification Moderate/Sec. libkadm5-1.18.2-32.el8_10.x86_64
RHSA-2025:4560 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32050 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32052 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32053 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32906 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32911 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-32913 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-46420 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
CVE-2025-46421 Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
classification Important/Sec. libsoup-2.62.3-8.el8_10.x86_64
RHSA-2025:8132 Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
CVE-2025-2784 Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
CVE-2025-4948 Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
CVE-2025-32049 Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
CVE-2025-32914 Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
classification Important/Sec. libsoup-2.62.3-9.el8_10.x86_64
RHSA-2025:7531 Important/Sec. perf-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. perf-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. perf-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. perf-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. perf-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. perf-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:7531 Important/Sec. python3-perf-4.18.0-553.52.1.el8_10.x86_64
RHEL-16285 Important/Sec. python3-perf-4.18.0-553.52.1.el8_10.x86_64
CVE-2022-49011 Important/Sec. python3-perf-4.18.0-553.52.1.el8_10.x86_64
CVE-2024-53141 Important/Sec. python3-perf-4.18.0-553.52.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.52.1.el8_10.x86_64
RHSA-2025:8056 Important/Sec. python3-perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-40906 Important/Sec. python3-perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2024-44970 Important/Sec. python3-perf-4.18.0-553.53.1.el8_10.x86_64
CVE-2025-21756 Important/Sec. python3-perf-4.18.0-553.53.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.53.1.el8_10.x86_64
RHSA-2025:8246 Moderate/Sec. python3-perf-4.18.0-553.54.1.el8_10.x86_64
CVE-2024-43842 Moderate/Sec. python3-perf-4.18.0-553.54.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.54.1.el8_10.x86_64
RHSA-2025:8395 Low/Sec. rsync-3.1.3-23.el8_10.x86_64
CVE-2016-9840 Low/Sec. rsync-3.1.3-23.el8_10.x86_64
classification Low/Sec. rsync-3.1.3-23.el8_10.x86_64
RHSA-2025:8395 Low/Sec. rsync-daemon-3.1.3-23.el8_10.noarch
CVE-2016-9840 Low/Sec. rsync-daemon-3.1.3-23.el8_10.noarch
classification Low/Sec. rsync-daemon-3.1.3-23.el8_10.noarch
8.10.25.05.SP3
The release date of the 8.10.25.05.SP3 security patch is 30 May 2025. The estimated run time is around 80 minutes.
mirror_registry service in some
nodes:ATTENTION : Errors encountered during upgrade operation
========================================================
Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.05.SP3_release --upgrade-directory /localrepo --phase platform
1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.05.SP3_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']
========================================================
Workaround
- On the failed node, run the following command to load the
podmanimage:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gzExample:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz Getting image source signatures Copying blob 7b9a3910f3c3 done Copying blob 9a5d14f9f550 done Copying blob b4592cba0628 done Copying blob de9819405bcf done Copying blob 3764c3e89288 done Copying config 1fd8e1b0bb done Writing manifest to image destination Storing signatures Loaded image: docker.io/library/registry:2.7 [root@e1n1 install]# podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB - Run the following command to restart the
mirror_registryservice:[root@e1n1 rhcos]# systemctl restart mirror-registry - Restart the upgrade.
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:
Workaround
- On node
e1n1, run the following commands:sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.pysed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade - Restart the upgrade.
- Once the upgrade is successfully completed, run the following
command:
sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
RHSA-2025:3913 Moderate/Sec. expat-2.2.5-17.el8_10.x86_64
CVE-2024-8176 (RHSA-2025:3913) Moderate/Sec. expat-2.2.5-17.el8_10.x86_64
classification Moderate/Sec. expat-2.2.5-17.el8_10.x86_64
RHSA-2025:4362 Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2020-27792 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2023-46751 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2024-46951 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2024-46952 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2024-46953 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2024-46954 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
CVE-2024-46956 (RHSA-2025:4362) Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
classification Moderate/Sec. ghostscript-9.27-16.el8_10.x86_64
RHSA-2025:4051 Moderate/Sec. gnutls-3.6.16-8.el8_10.3.x86_64
CVE-2024-12243 (RHSA-2025:4051) Moderate/Sec. gnutls-3.6.16-8.el8_10.3.x86_64
classification Moderate/Sec. gnutls-3.6.16-8.el8_10.3.x86_64
RHSA-2025:4051 Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.3.x86_64
CVE-2024-12243 (RHSA-2025:4051) Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.3.x86_64
classification Moderate/Sec. gnutls-c++-3.6.16-8.el8_10.3.x86_64
RHSA-2025:4051 Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.3.x86_64
CVE-2024-12243 (RHSA-2025:4051) Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.3.x86_64
classification Moderate/Sec. gnutls-dane-3.6.16-8.el8_10.3.x86_64
RHSA-2025:4051 Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.3.x86_64
CVE-2024-12243 (RHSA-2025:4051) Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.3.x86_64
classification Moderate/Sec. gnutls-utils-3.6.16-8.el8_10.3.x86_64
RHSA-2025:3845 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-21587 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-30691 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-30698 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.452.b09-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.452.b09-2.el8.x86_64
RHSA-2025:3845 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-21587 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-30691 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.452.b09-2.el8.x86_64
CVE-2025-30698 (RHSA-2025:3845) Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.452.b09-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.452.b09-2.el8.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-core-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-core-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-core-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-debuginfo-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-debuginfo-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-debuginfo-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-devel-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-devel-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-devel-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-headers-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-headers-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-headers-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-modules-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-modules-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-modules-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-modules-extra-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-modules-extra-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-modules-extra-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-tools-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-tools-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-tools-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. kernel-tools-libs-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. kernel-tools-libs-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. kernel-tools-libs-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:4362 Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2020-27792 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2023-46751 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2024-46951 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2024-46952 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2024-46953 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2024-46954 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
CVE-2024-46956 (RHSA-2025:4362) Moderate/Sec. libgs-9.27-16.el8_10.x86_64
classification Moderate/Sec. libgs-9.27-16.el8_10.x86_64
RHSA-2025:4049 Moderate/Sec. libtasn1-4.13-5.el8_10.x86_64
CVE-2024-12133 (RHSA-2025:4049) Moderate/Sec. libtasn1-4.13-5.el8_10.x86_64
classification Moderate/Sec. libtasn1-4.13-5.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. perf-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. perf-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. perf-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:3893 Moderate/Sec. python3-perf-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53150 (RHSA-2025:3893) Moderate/Sec. python3-perf-4.18.0-553.50.1.el8_10.x86_64
CVE-2024-53241 (RHSA-2025:3893) Moderate/Sec. python3-perf-4.18.0-553.50.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.50.1.el8_10.x86_64
RHSA-2025:4048 Moderate/Sec. xmlrpc-c-1.51.0-11.el8_10.x86_64
CVE-2024-8176 (RHSA-2025:4048) Moderate/Sec. xmlrpc-c-1.51.0-11.el8_10.x86_64
classification Moderate/Sec. xmlrpc-c-1.51.0-11.el8_10.x86_64
RHSA-2025:4048 Moderate/Sec. xmlrpc-c-client-1.51.0-11.el8_10.x86_64
CVE-2024-8176 (RHSA-2025:4048) Moderate/Sec. xmlrpc-c-client-1.51.0-11.el8_10.x86_64
classification Moderate/Sec. xmlrpc-c-client-1.51.0-11.el8_10.x86_64
8.10.25.04.SP2
The release date of the 8.10.25.04.SP2 security patch is 12 May 2025. The estimated run time is around 80 minutes.
mirror_registry service in some
nodes:ATTENTION : Errors encountered during upgrade operation
========================================================
Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.04.SP2_release --upgrade-directory /localrepo --phase platform
1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.04.SP2_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']
========================================================
Workaround
- On the failed node, run the following command to load the
podmanimage:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gzExample:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz Getting image source signatures Copying blob 7b9a3910f3c3 done Copying blob 9a5d14f9f550 done Copying blob b4592cba0628 done Copying blob de9819405bcf done Copying blob 3764c3e89288 done Copying config 1fd8e1b0bb done Writing manifest to image destination Storing signatures Loaded image: docker.io/library/registry:2.7 [root@e1n1 install]# podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB - Run the following command to restart the
mirror_registryservice:[root@e1n1 rhcos]# systemctl restart mirror-registry - Restart the upgrade.
025-05-05 05:24:06 INFO: Ensuring GPFS is started and running 2025-05-05 05:24:07 Unhandled error when attempting upgrade. Stack trace of failed command logged to /var/log/appliance/apupgrade/20250505/apupgrade20250505052404.log.tracelog Unable to upgrade because installed security patch version matches upgrade version. <class 'Exception'> 2025-05-05 05:24:07 ERROR: Exception: Traceback (most recent call last): 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/apupgrade", line 1479, in main_dont_die 2025-05-05 05:24:07 ERROR: self.prereqs.ensure_prereqs_met(self.repo, parsed_args.essentials, parsed_args.security, is_database_and_console, parsed_args.migrate, parsed_args.skip_nps_fw_update) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py", line 96, in ensure_prereqs_met 2025-05-05 05:24:07 ERROR: self.ensure_upgrade_is_valid(is_essentials, is_security, is_database_and_console, is_migrate) 2025-05-05 05:24:07 ERROR: File "/opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/yosemite_apupgrade_prereqs.py", line 86, in ensure_upgrade_is_valid 2025-05-05 05:24:07 ERROR: raise Exception(msg) 2025-05-05 05:24:07 ERROR: Exception: Unable to upgrade because installed security patch version matches upgrade version. 2025-05-05 05:24:07 ERROR:
Workaround
- On node
e1n1, run the following commands:sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^/#/; n; s/^/#/}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.pysed -i -e 's,self.verify_bundle,#self.verify_bundle,g' /opt/ibm/appliance/apupgrade/bin/apupgrade - Restart the upgrade.
- Once the upgrade is successfully completed, run the following
command:
sed -i '/if not os.path.isfile(self.if_status_file)/ {s/^#//; n; s/^#//}' /opt/ibm/appliance/apupgrade/bin/../modules/ibm/ca/apupgrade_prereqs/apupgrade_prereqs.py
RHBA-2024:5736 bugfix ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch
CVE-2023-37920 bugfix ca-certificates-2024.2.69_v8.0.303-80.0.el8_10.noarch
RHSA-2025:3828 Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. compat-libpthread-nonshared-2.28-251.el8_10.16.x86_64
RHSA-2025:3210 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22931+799fd806.noarch
CVE-2025-22869 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22931+799fd806.noarch
classification Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22931+799fd806.noarch
RHSA-2025:3210 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. containers-common-2:1-82.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. containers-common-2:1-82.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. containers-common-2:1-82.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. criu-3.18-5.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. criu-3.18-5.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. criu-3.18-5.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. criu-libs-3.18-5.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. crun-1.14.3-2.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. crun-1.14.3-2.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. crun-1.14.3-2.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3421 Important/Sec. freetype-2.9.1-10.el8_10.x86_64
CVE-2025-27363 Important/Sec. freetype-2.9.1-10.el8_10.x86_64
classification Important/Sec. freetype-2.9.1-10.el8_10.x86_64
RHSA-2025:3210 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-all-langpacks-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-common-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-common-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-common-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-common-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-devel-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-devel-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-devel-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-devel-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-gconv-extra-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-headers-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-headers-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-headers-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-headers-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-langpack-en-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-locale-source-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-locale-source-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. glibc-minimal-langpack-2.28-251.el8_10.16.x86_64
RHSA-2025:3367 Important/Sec. grub2-common-1:2.02-162.el8_10.noarch
CVE-2025-0624 Important/Sec. grub2-common-1:2.02-162.el8_10.noarch
classification Important/Sec. grub2-common-1:2.02-162.el8_10.noarch
RHSA-2025:3367 Important/Sec. grub2-pc-1:2.02-162.el8_10.x86_64
CVE-2025-0624 Important/Sec. grub2-pc-1:2.02-162.el8_10.x86_64
classification Important/Sec. grub2-pc-1:2.02-162.el8_10.x86_64
RHSA-2025:3367 Important/Sec. grub2-pc-modules-1:2.02-162.el8_10.noarch
CVE-2025-0624 Important/Sec. grub2-pc-modules-1:2.02-162.el8_10.noarch
classification Important/Sec. grub2-pc-modules-1:2.02-162.el8_10.noarch
RHSA-2025:3367 Important/Sec. grub2-tools-1:2.02-162.el8_10.x86_64
CVE-2025-0624 Important/Sec. grub2-tools-1:2.02-162.el8_10.x86_64
classification Important/Sec. grub2-tools-1:2.02-162.el8_10.x86_64
RHSA-2025:3367 Important/Sec. grub2-tools-efi-1:2.02-162.el8_10.x86_64
CVE-2025-0624 Important/Sec. grub2-tools-efi-1:2.02-162.el8_10.x86_64
classification Important/Sec. grub2-tools-efi-1:2.02-162.el8_10.x86_64
RHSA-2025:3367 Important/Sec. grub2-tools-extra-1:2.02-162.el8_10.x86_64
CVE-2025-0624 Important/Sec. grub2-tools-extra-1:2.02-162.el8_10.x86_64
classification Important/Sec. grub2-tools-extra-1:2.02-162.el8_10.x86_64
RHSA-2025:3367 Important/Sec. grub2-tools-minimal-1:2.02-162.el8_10.x86_64
CVE-2025-0624 Important/Sec. grub2-tools-minimal-1:2.02-162.el8_10.x86_64
classification Important/Sec. grub2-tools-minimal-1:2.02-162.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-core-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-core-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-core-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-core-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-debuginfo-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-debuginfo-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-debuginfo-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-debuginfo-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-devel-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-devel-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-devel-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-devel-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-headers-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-headers-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-headers-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-headers-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-modules-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-modules-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-modules-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-modules-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-modules-extra-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-modules-extra-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-modules-extra-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-modules-extra-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-tools-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-tools-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-tools-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-tools-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2473 Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. kernel-tools-libs-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. kernel-tools-libs-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. kernel-tools-libs-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. kernel-tools-libs-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. krb5-devel-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. krb5-devel-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. krb5-devel-1.18.2-31.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. krb5-libs-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. krb5-libs-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. krb5-libs-1.18.2-31.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. krb5-pkinit-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. krb5-pkinit-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. krb5-pkinit-1.18.2-31.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. krb5-server-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. krb5-server-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. krb5-server-1.18.2-31.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. krb5-workstation-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. krb5-workstation-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. krb5-workstation-1.18.2-31.el8_10.x86_64
RHSA-2025:2722 Moderate/Sec. libkadm5-1.18.2-31.el8_10.x86_64
CVE-2025-24528 Moderate/Sec. libkadm5-1.18.2-31.el8_10.x86_64
classification Moderate/Sec. libkadm5-1.18.2-31.el8_10.x86_64
RHSA-2025:3828 Moderate/Sec. libnsl-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. libnsl-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. libnsl-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. libnsl-2.28-251.el8_10.16.x86_64
RHEA-2024:8852 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
CVE-2020-26154 enhancement libproxy-0.4.15-5.5.el8_10.x86_64
RHSA-2025:3210 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:2686 Important/Sec. libxml2-2.9.7-19.el8_10.x86_64
CVE-2024-56171 Important/Sec. libxml2-2.9.7-19.el8_10.x86_64
CVE-2025-24928 Important/Sec. libxml2-2.9.7-19.el8_10.x86_64
classification Important/Sec. libxml2-2.9.7-19.el8_10.x86_64
RHSA-2025:3615 Important/Sec. libxslt-1.1.32-6.1.el8_10.x86_64
CVE-2024-55549 Important/Sec. libxslt-1.1.32-6.1.el8_10.x86_64
CVE-2025-24855 Important/Sec. libxslt-1.1.32-6.1.el8_10.x86_64
classification Important/Sec. libxslt-1.1.32-6.1.el8_10.x86_64
RHEA-2023:4995 enhancement microcode_ctl-4:20220809-2.20230808.2.el8_8.x86_64
CVE-2022-41804 enhancement microcode_ctl-4:20220809-2.20230808.2.el8_8.x86_64
RHEA-2023:7117 enhancement microcode_ctl-4:20230808-2.el8.x86_64
ref_0 enhancement microcode_ctl-4:20230808-2.el8.x86_64
CVE-2022-21216 enhancement microcode_ctl-4:20230808-2.el8.x86_64
CVE-2022-33196 enhancement microcode_ctl-4:20230808-2.el8.x86_64
RHSA-2025:3828 Moderate/Sec. nscd-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. nscd-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. nscd-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. nscd-2.28-251.el8_10.16.x86_64
RHSA-2025:3828 Moderate/Sec. nss_db-2.28-251.el8_10.16.x86_64
RHEL-35280 Moderate/Sec. nss_db-2.28-251.el8_10.16.x86_64
CVE-2025-0395 Moderate/Sec. nss_db-2.28-251.el8_10.16.x86_64
classification Moderate/Sec. nss_db-2.28-251.el8_10.16.x86_64
RHSA-2025:2473 Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. perf-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. perf-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. perf-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. perf-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:3210 Important/Sec. podman-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. podman-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. podman-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. podman-catatonit-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. podman-catatonit-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. podman-catatonit-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. podman-gvproxy-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. podman-gvproxy-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. podman-gvproxy-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. podman-plugins-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. podman-plugins-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. podman-plugins-4:4.9.4-20.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3388 Important/Sec. python3-jinja2-2.10.1-7.el8_10.noarch
CVE-2025-27516 Important/Sec. python3-jinja2-2.10.1-7.el8_10.noarch
classification Important/Sec. python3-jinja2-2.10.1-7.el8_10.noarch
RHSA-2025:2686 Important/Sec. python3-libxml2-2.9.7-19.el8_10.x86_64
CVE-2024-56171 Important/Sec. python3-libxml2-2.9.7-19.el8_10.x86_64
CVE-2025-24928 Important/Sec. python3-libxml2-2.9.7-19.el8_10.x86_64
classification Important/Sec. python3-libxml2-2.9.7-19.el8_10.x86_64
RHSA-2025:2473 Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-50302 Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-53197 Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57807 Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
CVE-2024-57979 Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.44.1.el8_10.x86_64
RHSA-2025:3026 Important/Sec. python3-perf-4.18.0-553.45.1.el8_10.x86_64
CVE-2023-52922 Important/Sec. python3-perf-4.18.0-553.45.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.45.1.el8_10.x86_64
RHSA-2025:3260 Important/Sec. python3-perf-4.18.0-553.46.1.el8_10.x86_64
CVE-2025-21785 Important/Sec. python3-perf-4.18.0-553.46.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.46.1.el8_10.x86_64
RHSA-2025:2600 Moderate/Sec. rsync-3.1.3-21.el8_10.x86_64
CVE-2024-12087 Moderate/Sec. rsync-3.1.3-21.el8_10.x86_64
CVE-2024-12088 Moderate/Sec. rsync-3.1.3-21.el8_10.x86_64
CVE-2024-12747 Moderate/Sec. rsync-3.1.3-21.el8_10.x86_64
classification Moderate/Sec. rsync-3.1.3-21.el8_10.x86_64
RHSA-2025:2600 Moderate/Sec. rsync-daemon-3.1.3-21.el8_10.noarch
CVE-2024-12087 Moderate/Sec. rsync-daemon-3.1.3-21.el8_10.noarch
CVE-2024-12088 Moderate/Sec. rsync-daemon-3.1.3-21.el8_10.noarch
CVE-2024-12747 Moderate/Sec. rsync-daemon-3.1.3-21.el8_10.noarch
classification Moderate/Sec. rsync-daemon-3.1.3-21.el8_10.noarch
RHSA-2025:3210 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22931+799fd806.x86_64
RHSA-2025:3210 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22931+799fd806.x86_64
CVE-2025-22869 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22931+799fd806.x86_64
classification Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22931+799fd806.x86_64
8.10.25.03.SP1
The release date of the 8.10.25.03.SP1 security patch is 10 April 2025. The estimated run time is around 80 minutes.
mirror_registry service in some
nodes:ATTENTION : Errors encountered during upgrade operation
========================================================
Logfile: /var/log/appliance/apupgrade/20240911/apupgrade20240911104526.log
Upgrade Command: apupgrade --upgrade --use-version 8.10.25.03.SP1_release --upgrade-directory /localrepo --phase platform
1. NodeosUpgrader.postinstall
Upgrade Detail: Component post install for nodeos
Caller Info:The call was made from 'NodeOSYosemitePostInstaller.do_postinstall' on line 55 with file located at '/localrepo/8.10.25.03.SP1_release/EXTRACT/platform/upgrade/bundle_upgraders/../nodeos/node_os_yosemite_postinstaller.py'
Message: Failed to start mirror_registry service.
ERROR: Error running command [systemctl restart mirror-registry] on ['e1n1']
========================================================
Workaround
- On the failed node, run the following command to load the
podmanimage:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gzExample:[root@e1n1 install]# podman load -i /install/app_img/rhcos/registry_image-2.7-x86_64.tar.gz Getting image source signatures Copying blob 7b9a3910f3c3 done Copying blob 9a5d14f9f550 done Copying blob b4592cba0628 done Copying blob de9819405bcf done Copying blob 3764c3e89288 done Copying config 1fd8e1b0bb done Writing manifest to image destination Storing signatures Loaded image: docker.io/library/registry:2.7 [root@e1n1 install]# podman images REPOSITORY TAG IMAGE ID CREATED SIZE docker.io/library/registry 2.7 1fd8e1b0bb7e 3 years ago 26.8 MB - Run the following command to restart the
mirror_registryservice:[root@e1n1 rhcos]# systemctl restart mirror-registry - Restart the upgrade.
RHSA-2025:0288 Moderate/Sec. NetworkManager-1:1.40.16-18.el8_10.x86_64
RHEL-73052 Moderate/Sec. NetworkManager-1:1.40.16-18.el8_10.x86_64
CVE-2024-3661 Moderate/Sec. NetworkManager-1:1.40.16-18.el8_10.x86_64
classification Moderate/Sec. NetworkManager-1:1.40.16-18.el8_10.x86_64
RHSA-2025:0288 Moderate/Sec. NetworkManager-config-server-1:1.40.16-18.el8_10.noarch
RHEL-73052 Moderate/Sec. NetworkManager-config-server-1:1.40.16-18.el8_10.noarch
CVE-2024-3661 Moderate/Sec. NetworkManager-config-server-1:1.40.16-18.el8_10.noarch
classification Moderate/Sec. NetworkManager-config-server-1:1.40.16-18.el8_10.noarch
RHSA-2025:0288 Moderate/Sec. NetworkManager-dispatcher-routing-rules-1:1.40.16-18.el8_10.noarch
RHEL-73052 Moderate/Sec. NetworkManager-dispatcher-routing-rules-1:1.40.16-18.el8_10.noarch
CVE-2024-3661 Moderate/Sec. NetworkManager-dispatcher-routing-rules-1:1.40.16-18.el8_10.noarch
classification Moderate/Sec. NetworkManager-dispatcher-routing-rules-1:1.40.16-18.el8_10.noarch
RHSA-2025:0288 Moderate/Sec. NetworkManager-initscripts-updown-1:1.40.16-18.el8_10.noarch
RHEL-73052 Moderate/Sec. NetworkManager-initscripts-updown-1:1.40.16-18.el8_10.noarch
CVE-2024-3661 Moderate/Sec. NetworkManager-initscripts-updown-1:1.40.16-18.el8_10.noarch
classification Moderate/Sec. NetworkManager-initscripts-updown-1:1.40.16-18.el8_10.noarch
RHSA-2025:0288 Moderate/Sec. NetworkManager-libnm-1:1.40.16-18.el8_10.x86_64
RHEL-73052 Moderate/Sec. NetworkManager-libnm-1:1.40.16-18.el8_10.x86_64
CVE-2024-3661 Moderate/Sec. NetworkManager-libnm-1:1.40.16-18.el8_10.x86_64
classification Moderate/Sec. NetworkManager-libnm-1:1.40.16-18.el8_10.x86_64
RHSA-2025:0288 Moderate/Sec. NetworkManager-team-1:1.40.16-18.el8_10.x86_64
RHEL-73052 Moderate/Sec. NetworkManager-team-1:1.40.16-18.el8_10.x86_64
CVE-2024-3661 Moderate/Sec. NetworkManager-team-1:1.40.16-18.el8_10.x86_64
classification Moderate/Sec. NetworkManager-team-1:1.40.16-18.el8_10.x86_64
RHSA-2025:0288 Moderate/Sec. NetworkManager-tui-1:1.40.16-18.el8_10.x86_64
RHEL-73052 Moderate/Sec. NetworkManager-tui-1:1.40.16-18.el8_10.x86_64
CVE-2024-3661 Moderate/Sec. NetworkManager-tui-1:1.40.16-18.el8_10.x86_64
classification Moderate/Sec. NetworkManager-tui-1:1.40.16-18.el8_10.x86_64
RHSA-2025:1675 Important/Sec. bind-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187 Important/Sec. bind-32:9.11.36-16.el8_10.4.x86_64
classification Important/Sec. bind-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675 Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187 Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.4.x86_64
classification Important/Sec. bind-export-libs-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675 Important/Sec. bind-libs-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187 Important/Sec. bind-libs-32:9.11.36-16.el8_10.4.x86_64
classification Important/Sec. bind-libs-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675 Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187 Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.4.x86_64
classification Important/Sec. bind-libs-lite-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675 Important/Sec. bind-license-32:9.11.36-16.el8_10.4.noarch
CVE-2024-11187 Important/Sec. bind-license-32:9.11.36-16.el8_10.4.noarch
classification Important/Sec. bind-license-32:9.11.36-16.el8_10.4.noarch
RHSA-2025:1675 Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187 Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.4.x86_64
classification Important/Sec. bind-pkcs11-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675 Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187 Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.4.x86_64
classification Important/Sec. bind-pkcs11-libs-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675 Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187 Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.4.x86_64
classification Important/Sec. bind-pkcs11-utils-32:9.11.36-16.el8_10.4.x86_64
RHSA-2025:1675 Important/Sec. bind-utils-32:9.11.36-16.el8_10.4.x86_64
CVE-2024-11187 Important/Sec. bind-utils-32:9.11.36-16.el8_10.4.x86_64
classification Important/Sec. bind-utils-32:9.11.36-16.el8_10.4.x86_64
RHSA-2023:6236 Moderate/Sec. binutils-2.30-119.el8_8.2.x86_64
CVE-2022-4285 Moderate/Sec. binutils-2.30-119.el8_8.2.x86_64
classification Moderate/Sec. binutils-2.30-119.el8_8.2.x86_64
RHSA-2024:9689 Low/Sec. binutils-2.30-125.el8_10.x86_64
CVE-2018-12699 Low/Sec. binutils-2.30-125.el8_10.x86_64
classification Low/Sec. binutils-2.30-125.el8_10.x86_64
RHSA-2024:8922 Low/Sec. bzip2-1.0.6-27.el8_10.x86_64
CVE-2019-12900 Low/Sec. bzip2-1.0.6-27.el8_10.x86_64
classification Low/Sec. bzip2-1.0.6-27.el8_10.x86_64
RHSA-2025:0733 Moderate/Sec. bzip2-1.0.6-28.el8_10.x86_64
RHEL-67824 Moderate/Sec. bzip2-1.0.6-28.el8_10.x86_64
CVE-2019-12900 Moderate/Sec. bzip2-1.0.6-28.el8_10.x86_64
classification Moderate/Sec. bzip2-1.0.6-28.el8_10.x86_64
RHSA-2024:8922 Low/Sec. bzip2-libs-1.0.6-27.el8_10.x86_64
CVE-2019-12900 Low/Sec. bzip2-libs-1.0.6-27.el8_10.x86_64
classification Low/Sec. bzip2-libs-1.0.6-27.el8_10.x86_64
RHSA-2025:0733 Moderate/Sec. bzip2-libs-1.0.6-28.el8_10.x86_64
RHEL-67824 Moderate/Sec. bzip2-libs-1.0.6-28.el8_10.x86_64
CVE-2019-12900 Moderate/Sec. bzip2-libs-1.0.6-28.el8_10.x86_64
classification Moderate/Sec. bzip2-libs-1.0.6-28.el8_10.x86_64
RHSA-2024:8846 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218 Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
classification Important/Sec. conmon-3:2.1.10-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:8846 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22397+e3c95ba6.noarch
CVE-2024-9341 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22397+e3c95ba6.noarch
CVE-2024-9407 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22397+e3c95ba6.noarch
CVE-2024-9675 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22397+e3c95ba6.noarch
classification Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22397+e3c95ba6.noarch
RHSA-2024:10289 Moderate/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
CVE-2021-4024 Moderate/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
CVE-2021-33198 Moderate/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
CVE-2024-9676 Moderate/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
classification Moderate/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
RHSA-2025:1372 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
RHEL-74865 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
CVE-2024-11218 Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
classification Important/Sec. container-selinux-2:2.229.0-2.module+el8.10.0+22417+2fb00970.noarch
RHSA-2024:8846 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218 Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
classification Important/Sec. containernetworking-plugins-1:1.4.0-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:8846 Important/Sec. containers-common-2:1-82.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. containers-common-2:1-82.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. containers-common-2:1-82.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. containers-common-2:1-82.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. containers-common-2:1-82.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865 Important/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218 Important/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
classification Important/Sec. containers-common-2:1-82.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1301 Moderate/Sec. cpp-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. cpp-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. cpp-8.5.0-23.el8_10.x86_64
RHSA-2024:8846 Important/Sec. criu-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. criu-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. criu-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. criu-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. criu-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865 Important/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218 Important/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
classification Important/Sec. criu-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:8846 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. criu-libs-3.18-5.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218 Important/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
classification Important/Sec. criu-libs-3.18-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:8846 Important/Sec. crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. crun-1.14.3-2.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865 Important/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218 Important/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
classification Important/Sec. crun-1.14.3-2.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:0083 Low/Sec. cups-1:2.2.6-62.el8_10.x86_64
CVE-2024-47175 Low/Sec. cups-1:2.2.6-62.el8_10.x86_64
classification Low/Sec. cups-1:2.2.6-62.el8_10.x86_64
ref_0 Low/Sec. cups-1:2.2.6-62.el8_10.x86_64
RHSA-2025:0083 Low/Sec. cups-client-1:2.2.6-62.el8_10.x86_64
CVE-2024-47175 Low/Sec. cups-client-1:2.2.6-62.el8_10.x86_64
classification Low/Sec. cups-client-1:2.2.6-62.el8_10.x86_64
ref_0 Low/Sec. cups-client-1:2.2.6-62.el8_10.x86_64
RHSA-2025:0083 Low/Sec. cups-filesystem-1:2.2.6-62.el8_10.noarch
CVE-2024-47175 Low/Sec. cups-filesystem-1:2.2.6-62.el8_10.noarch
classification Low/Sec. cups-filesystem-1:2.2.6-62.el8_10.noarch
ref_0 Low/Sec. cups-filesystem-1:2.2.6-62.el8_10.noarch
RHSA-2025:0083 Low/Sec. cups-ipptool-1:2.2.6-62.el8_10.x86_64
CVE-2024-47175 Low/Sec. cups-ipptool-1:2.2.6-62.el8_10.x86_64
classification Low/Sec. cups-ipptool-1:2.2.6-62.el8_10.x86_64
ref_0 Low/Sec. cups-ipptool-1:2.2.6-62.el8_10.x86_64
RHSA-2025:0083 Low/Sec. cups-libs-1:2.2.6-62.el8_10.x86_64
CVE-2024-47175 Low/Sec. cups-libs-1:2.2.6-62.el8_10.x86_64
classification Low/Sec. cups-libs-1:2.2.6-62.el8_10.x86_64
ref_0 Low/Sec. cups-libs-1:2.2.6-62.el8_10.x86_64
RHSA-2023:4498 Moderate/Sec. dbus-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 Moderate/Sec. dbus-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec. dbus-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498 Moderate/Sec. dbus-common-1:1.12.8-24.el8_8.1.noarch
CVE-2023-34969 Moderate/Sec. dbus-common-1:1.12.8-24.el8_8.1.noarch
classification Moderate/Sec. dbus-common-1:1.12.8-24.el8_8.1.noarch
RHSA-2023:4498 Moderate/Sec. dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 Moderate/Sec. dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec. dbus-daemon-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498 Moderate/Sec. dbus-libs-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 Moderate/Sec. dbus-libs-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec. dbus-libs-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:4498 Moderate/Sec. dbus-tools-1:1.12.8-24.el8_8.1.x86_64
CVE-2023-34969 Moderate/Sec. dbus-tools-1:1.12.8-24.el8_8.1.x86_64
classification Moderate/Sec. dbus-tools-1:1.12.8-24.el8_8.1.x86_64
RHSA-2023:5252 Moderate/Sec. dmidecode-1:3.3-4.el8_8.1.x86_64
CVE-2023-30630 Moderate/Sec. dmidecode-1:3.3-4.el8_8.1.x86_64
classification Moderate/Sec. dmidecode-1:3.3-4.el8_8.1.x86_64
RHSA-2023:4706 Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
CVE-2023-3899 Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
classification Important/Sec. dnf-plugin-subscription-manager-1.28.36-3.el8_8.x86_64
RHSA-2024:11185 Moderate/Sec. edk2-ovmf-20220126gitbb1bba3d77-13.el8_10.4.noarch
CVE-2024-38796 Moderate/Sec. edk2-ovmf-20220126gitbb1bba3d77-13.el8_10.4.noarch
classification Moderate/Sec. edk2-ovmf-20220126gitbb1bba3d77-13.el8_10.4.noarch
RHSA-2025:1917 Important/Sec. emacs-filesystem-1:26.1-13.el8_10.noarch
CVE-2025-1244 Important/Sec. emacs-filesystem-1:26.1-13.el8_10.noarch
classification Important/Sec. emacs-filesystem-1:26.1-13.el8_10.noarch
RHSA-2024:9502 Moderate/Sec. expat-2.2.5-16.el8_10.x86_64
CVE-2024-50602 Moderate/Sec. expat-2.2.5-16.el8_10.x86_64
classification Moderate/Sec. expat-2.2.5-16.el8_10.x86_64
RHSA-2023:5046 Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
CVE-2020-22219 Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
classification Important/Sec. flac-libs-1.3.2-9.el8_8.1.x86_64
RHSA-2024:8846 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218 Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
classification Important/Sec. fuse-overlayfs-1.13-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1301 Moderate/Sec. gcc-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. gcc-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. gcc-8.5.0-23.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. gcc-c++-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. gcc-c++-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. gcc-c++-8.5.0-23.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. gcc-gdb-plugin-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. gcc-gdb-plugin-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. gcc-gdb-plugin-8.5.0-23.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. gcc-plugin-annobin-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. gcc-plugin-annobin-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. gcc-plugin-annobin-8.5.0-23.el8_10.x86_64
RHSA-2024:3214 Moderate/Sec. gmp-1:6.1.2-11.el8.x86_64
CVE-2021-43618 Moderate/Sec. gmp-1:6.1.2-11.el8.x86_64
classification Moderate/Sec. gmp-1:6.1.2-11.el8.x86_64
ref_0 Moderate/Sec. gmp-1:6.1.2-11.el8.x86_64
RHSA-2024:3214 Moderate/Sec. gmp-c++-1:6.1.2-11.el8.x86_64
CVE-2021-43618 Moderate/Sec. gmp-c++-1:6.1.2-11.el8.x86_64
classification Moderate/Sec. gmp-c++-1:6.1.2-11.el8.x86_64
ref_0 Moderate/Sec. gmp-c++-1:6.1.2-11.el8.x86_64
RHSA-2024:9056 Moderate/Sec. gstreamer1-plugins-base-1.16.1-4.el8_10.x86_64
CVE-2024-4453 Moderate/Sec. gstreamer1-plugins-base-1.16.1-4.el8_10.x86_64
classification Moderate/Sec. gstreamer1-plugins-base-1.16.1-4.el8_10.x86_64
RHSA-2024:11345 Important/Sec. gstreamer1-plugins-base-1.16.1-5.el8_10.x86_64
CVE-2024-47538 Important/Sec. gstreamer1-plugins-base-1.16.1-5.el8_10.x86_64
CVE-2024-47607 Important/Sec. gstreamer1-plugins-base-1.16.1-5.el8_10.x86_64
CVE-2024-47615 Important/Sec. gstreamer1-plugins-base-1.16.1-5.el8_10.x86_64
classification Important/Sec. gstreamer1-plugins-base-1.16.1-5.el8_10.x86_64
RHSA-2024:8849 Moderate/Sec. haproxy-1.8.27-5.el8_10.1.x86_64
CVE-2023-45539 Moderate/Sec. haproxy-1.8.27-5.el8_10.1.x86_64
classification Moderate/Sec. haproxy-1.8.27-5.el8_10.1.x86_64
RHSA-2025:0168 Important/Sec. iperf3-3.5-11.el8_10.x86_64
CVE-2024-53580 Important/Sec. iperf3-3.5-11.el8_10.x86_64
classification Important/Sec. iperf3-3.5-11.el8_10.x86_64
RHSA-2023:4176 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22045 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22049 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.382.b05-2.el8.x86_64
RHSA-2023:5731 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2022-40433 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22067 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22081 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.392.b08-4.el8.x86_64
RHSA-2024:0265 Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20918 Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20919 Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20921 Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20926 Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20945 Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20952 Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-1:1.8.0.402.b06-2.el8.x86_64
RHSA-2024:1818 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21011 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21068 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21085 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21094 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.412.b08-2.el8.x86_64
RHSA-2024:4563 Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21131 Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21138 Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21140 Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21144 Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21145 Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21147 Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-1:1.8.0.422.b05-2.el8.x86_64
RHSA-2024:8117 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
CVE-2023-48161 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21208 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21210 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21217 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21235 Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-1:1.8.0.432.b06-2.el8.x86_64
RHSA-2023:4176 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22045 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
CVE-2023-22049 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.382.b05-2.el8.x86_64
RHSA-2023:5731 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2022-40433 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22067 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
CVE-2023-22081 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.392.b08-4.el8.x86_64
RHSA-2024:0265 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20918 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20919 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20921 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20926 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20945 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
CVE-2024-20952 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.402.b06-2.el8.x86_64
RHSA-2024:1818 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21011 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21068 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21085 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
CVE-2024-21094 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.412.b08-2.el8.x86_64
RHSA-2024:4563 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21131 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21138 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21140 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21144 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21145 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
CVE-2024-21147 Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
classification Important/Sec. java-1.8.0-openjdk-headless-1:1.8.0.422.b05-2.el8.x86_64
RHSA-2024:8117 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
CVE-2023-48161 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21208 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21210 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21217 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
CVE-2024-21235 Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
classification Moderate/Sec. java-1.8.0-openjdk-headless-1:1.8.0.432.b06-2.el8.x86_64
RHSA-2025:0743 Moderate/Sec. keepalived-2.1.5-10.el8_10.x86_64
CVE-2024-41184 Moderate/Sec. keepalived-2.1.5-10.el8_10.x86_64
classification Moderate/Sec. keepalived-2.1.5-10.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. kernel-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. kernel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. kernel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. kernel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. kernel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. kernel-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. kernel-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. kernel-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. kernel-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. kernel-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. kernel-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. kernel-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. kernel-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. kernel-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. kernel-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. kernel-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. kernel-core-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. kernel-core-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. kernel-core-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. kernel-core-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. kernel-core-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. kernel-core-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. kernel-core-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. kernel-core-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. kernel-core-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. kernel-core-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. kernel-core-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. kernel-core-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. kernel-core-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. kernel-core-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. kernel-core-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. kernel-core-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. kernel-debuginfo-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. kernel-debuginfo-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. kernel-debuginfo-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. kernel-debuginfo-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. kernel-debuginfo-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. kernel-debuginfo-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. kernel-debuginfo-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. kernel-debuginfo-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. kernel-debuginfo-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. kernel-debuginfo-common-x86_64-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. kernel-devel-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. kernel-devel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. kernel-devel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. kernel-devel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. kernel-devel-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. kernel-devel-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. kernel-devel-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. kernel-devel-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. kernel-devel-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. kernel-devel-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. kernel-devel-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. kernel-devel-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. kernel-devel-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. kernel-devel-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. kernel-devel-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. kernel-devel-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. kernel-headers-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. kernel-headers-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. kernel-headers-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. kernel-headers-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. kernel-headers-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. kernel-headers-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. kernel-headers-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. kernel-headers-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. kernel-headers-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. kernel-headers-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. kernel-headers-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. kernel-headers-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. kernel-headers-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. kernel-headers-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. kernel-headers-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. kernel-headers-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. kernel-modules-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. kernel-modules-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. kernel-modules-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. kernel-modules-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. kernel-modules-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. kernel-modules-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. kernel-modules-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. kernel-modules-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. kernel-modules-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. kernel-modules-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. kernel-modules-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. kernel-modules-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. kernel-modules-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. kernel-modules-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. kernel-modules-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. kernel-modules-extra-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. kernel-modules-extra-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. kernel-modules-extra-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. kernel-modules-extra-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. kernel-modules-extra-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. kernel-modules-extra-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. kernel-modules-extra-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. kernel-modules-extra-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. kernel-modules-extra-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. kernel-modules-extra-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. kernel-modules-extra-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. kernel-tools-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. kernel-tools-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. kernel-tools-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. kernel-tools-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. kernel-tools-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. kernel-tools-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. kernel-tools-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. kernel-tools-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. kernel-tools-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. kernel-tools-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. kernel-tools-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. kernel-tools-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. kernel-tools-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. kernel-tools-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. kernel-tools-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. kernel-tools-libs-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. kernel-tools-libs-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. kernel-tools-libs-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. kernel-tools-libs-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. kernel-tools-libs-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. kernel-tools-libs-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. kernel-tools-libs-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. kernel-tools-libs-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. kernel-tools-libs-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. kernel-tools-libs-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. kernel-tools-libs-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:8860 Important/Sec. krb5-devel-1.18.2-30.el8_10.x86_64
RHEL-50253 Important/Sec. krb5-devel-1.18.2-30.el8_10.x86_64
CVE-2024-3596 Important/Sec. krb5-devel-1.18.2-30.el8_10.x86_64
classification Important/Sec. krb5-devel-1.18.2-30.el8_10.x86_64
RHSA-2024:8860 Important/Sec. krb5-libs-1.18.2-30.el8_10.x86_64
RHEL-50253 Important/Sec. krb5-libs-1.18.2-30.el8_10.x86_64
CVE-2024-3596 Important/Sec. krb5-libs-1.18.2-30.el8_10.x86_64
classification Important/Sec. krb5-libs-1.18.2-30.el8_10.x86_64
RHSA-2024:8860 Important/Sec. krb5-pkinit-1.18.2-30.el8_10.x86_64
RHEL-50253 Important/Sec. krb5-pkinit-1.18.2-30.el8_10.x86_64
CVE-2024-3596 Important/Sec. krb5-pkinit-1.18.2-30.el8_10.x86_64
classification Important/Sec. krb5-pkinit-1.18.2-30.el8_10.x86_64
RHSA-2024:8860 Important/Sec. krb5-server-1.18.2-30.el8_10.x86_64
RHEL-50253 Important/Sec. krb5-server-1.18.2-30.el8_10.x86_64
CVE-2024-3596 Important/Sec. krb5-server-1.18.2-30.el8_10.x86_64
classification Important/Sec. krb5-server-1.18.2-30.el8_10.x86_64
RHSA-2024:8860 Important/Sec. krb5-workstation-1.18.2-30.el8_10.x86_64
RHEL-50253 Important/Sec. krb5-workstation-1.18.2-30.el8_10.x86_64
CVE-2024-3596 Important/Sec. krb5-workstation-1.18.2-30.el8_10.x86_64
classification Important/Sec. krb5-workstation-1.18.2-30.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. libatomic-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. libatomic-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. libatomic-8.5.0-23.el8_10.x86_64
RHSA-2023:4524 Moderate/Sec. libcap-2.48-5.el8_8.x86_64
CVE-2023-2602 Moderate/Sec. libcap-2.48-5.el8_8.x86_64
CVE-2023-2603 Moderate/Sec. libcap-2.48-5.el8_8.x86_64
classification Moderate/Sec. libcap-2.48-5.el8_8.x86_64
RHSA-2025:1301 Moderate/Sec. libgcc-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. libgcc-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. libgcc-8.5.0-23.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. libgfortran-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. libgfortran-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. libgfortran-8.5.0-23.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. libgomp-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. libgomp-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. libgomp-8.5.0-23.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. libitm-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. libitm-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. libitm-8.5.0-23.el8_10.x86_64
RHSA-2024:8860 Important/Sec. libkadm5-1.18.2-30.el8_10.x86_64
RHEL-50253 Important/Sec. libkadm5-1.18.2-30.el8_10.x86_64
CVE-2024-3596 Important/Sec. libkadm5-1.18.2-30.el8_10.x86_64
classification Important/Sec. libkadm5-1.18.2-30.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. libquadmath-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. libquadmath-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. libquadmath-8.5.0-23.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. libquadmath-devel-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. libquadmath-devel-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. libquadmath-devel-8.5.0-23.el8_10.x86_64
RHSA-2024:8846 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218 Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
classification Important/Sec. libslirp-4.4.0-2.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:11192 Moderate/Sec. libsndfile-1.0.28-16.el8_10.x86_64
CVE-2024-50612 Moderate/Sec. libsndfile-1.0.28-16.el8_10.x86_64
classification Moderate/Sec. libsndfile-1.0.28-16.el8_10.x86_64
RHSA-2024:9573 Important/Sec. libsoup-2.62.3-6.el8_10.x86_64
CVE-2024-52530 Important/Sec. libsoup-2.62.3-6.el8_10.x86_64
CVE-2024-52532 Important/Sec. libsoup-2.62.3-6.el8_10.x86_64
classification Important/Sec. libsoup-2.62.3-6.el8_10.x86_64
RHSA-2025:0838 Important/Sec. libsoup-2.62.3-7.el8_10.x86_64
CVE-2024-52531 Important/Sec. libsoup-2.62.3-7.el8_10.x86_64
classification Important/Sec. libsoup-2.62.3-7.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. libstdc++-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. libstdc++-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. libstdc++-8.5.0-23.el8_10.x86_64
RHSA-2025:1301 Moderate/Sec. libstdc++-devel-8.5.0-23.el8_10.x86_64
CVE-2020-11023 Moderate/Sec. libstdc++-devel-8.5.0-23.el8_10.x86_64
classification Moderate/Sec. libstdc++-devel-8.5.0-23.el8_10.x86_64
RHSA-2024:8833 Moderate/Sec. libtiff-4.0.9-33.el8_10.x86_64
CVE-2024-7006 Moderate/Sec. libtiff-4.0.9-33.el8_10.x86_64
classification Moderate/Sec. libtiff-4.0.9-33.el8_10.x86_64
RHSA-2023:5309 Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
classification Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
CVE-2023-4863 Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
CVE-2023-5129 Important/Sec. libwebp-1.0.0-8.el8_8.1.x86_64
RHSA-2025:1517 Moderate/Sec. libxml2-2.9.7-18.el8_10.2.x86_64
CVE-2022-49043 Moderate/Sec. libxml2-2.9.7-18.el8_10.2.x86_64
classification Moderate/Sec. libxml2-2.9.7-18.el8_10.2.x86_64
RHSA-2023:5259 Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32084 Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32091 Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-38791 Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-47015 Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
classification Moderate/Sec. mariadb-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
RHSA-2023:5259 Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32084 Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-32091 Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-38791 Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
CVE-2022-47015 Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
classification Moderate/Sec. mariadb-common-3:10.3.39-1.module+el8.8.0+19673+72b0d35f.x86_64
RHSA-2023:5249 Moderate/Sec. ncurses-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 Moderate/Sec. ncurses-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec. ncurses-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249 Moderate/Sec. ncurses-base-6.1-9.20180224.el8_8.1.noarch
CVE-2023-29491 Moderate/Sec. ncurses-base-6.1-9.20180224.el8_8.1.noarch
classification Moderate/Sec. ncurses-base-6.1-9.20180224.el8_8.1.noarch
RHSA-2023:5249 Moderate/Sec. ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 Moderate/Sec. ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec. ncurses-c++-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249 Moderate/Sec. ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 Moderate/Sec. ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec. ncurses-compat-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2023:5249 Moderate/Sec. ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
CVE-2023-29491 Moderate/Sec. ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
classification Moderate/Sec. ncurses-libs-6.1-9.20180224.el8_8.1.x86_64
RHSA-2024:4264 Low/Sec. openldap-2.4.46-19.el8_10.x86_64
CVE-2023-2953 Low/Sec. openldap-2.4.46-19.el8_10.x86_64
classification Low/Sec. openldap-2.4.46-19.el8_10.x86_64
RHSA-2024:4264 Low/Sec. openldap-clients-2.4.46-19.el8_10.x86_64
CVE-2023-2953 Low/Sec. openldap-clients-2.4.46-19.el8_10.x86_64
classification Low/Sec. openldap-clients-2.4.46-19.el8_10.x86_64
RHSA-2024:10379 Important/Sec. pam-1.3.1-36.el8_10.x86_64
RHEL-23018 Important/Sec. pam-1.3.1-36.el8_10.x86_64
CVE-2024-10041 Important/Sec. pam-1.3.1-36.el8_10.x86_64
CVE-2024-10963 Important/Sec. pam-1.3.1-36.el8_10.x86_64
classification Important/Sec. pam-1.3.1-36.el8_10.x86_64
RHSA-2024:8856 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. perf-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. perf-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. perf-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. perf-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. perf-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. perf-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. perf-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. perf-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. perf-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. perf-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. perf-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. perf-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:10779 Moderate/Sec. platform-python-3.6.8-69.el8_10.x86_64
CVE-2024-9287 Moderate/Sec. platform-python-3.6.8-69.el8_10.x86_64
CVE-2024-11168 Moderate/Sec. platform-python-3.6.8-69.el8_10.x86_64
classification Moderate/Sec. platform-python-3.6.8-69.el8_10.x86_64
RHSA-2024:10779 Moderate/Sec. platform-python-devel-3.6.8-69.el8_10.x86_64
CVE-2024-9287 Moderate/Sec. platform-python-devel-3.6.8-69.el8_10.x86_64
CVE-2024-11168 Moderate/Sec. platform-python-devel-3.6.8-69.el8_10.x86_64
classification Moderate/Sec. platform-python-devel-3.6.8-69.el8_10.x86_64
RHSA-2024:8846 Important/Sec. podman-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. podman-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. podman-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. podman-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. podman-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. podman-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. podman-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. podman-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. podman-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. podman-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. podman-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHEL-74865 Important/Sec. podman-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
CVE-2024-11218 Important/Sec. podman-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
classification Important/Sec. podman-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHSA-2024:8846 Important/Sec. podman-catatonit-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. podman-catatonit-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. podman-catatonit-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. podman-catatonit-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. podman-catatonit-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. podman-catatonit-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. podman-catatonit-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. podman-catatonit-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. podman-catatonit-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. podman-catatonit-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. podman-catatonit-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHEL-74865 Important/Sec. podman-catatonit-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
CVE-2024-11218 Important/Sec. podman-catatonit-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
classification Important/Sec. podman-catatonit-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHSA-2024:8846 Important/Sec. podman-gvproxy-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. podman-gvproxy-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. podman-gvproxy-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. podman-gvproxy-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. podman-gvproxy-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. podman-gvproxy-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. podman-gvproxy-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. podman-gvproxy-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. podman-gvproxy-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. podman-gvproxy-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. podman-gvproxy-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHEL-74865 Important/Sec. podman-gvproxy-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
CVE-2024-11218 Important/Sec. podman-gvproxy-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
classification Important/Sec. podman-gvproxy-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHSA-2024:8846 Important/Sec. podman-plugins-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. podman-plugins-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. podman-plugins-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. podman-plugins-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. podman-plugins-4:4.9.4-15.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. podman-plugins-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. podman-plugins-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. podman-plugins-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. podman-plugins-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. podman-plugins-4:4.9.4-18.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. podman-plugins-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHEL-74865 Important/Sec. podman-plugins-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
CVE-2024-11218 Important/Sec. podman-plugins-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
classification Important/Sec. podman-plugins-4:4.9.4-19.module+el8.10.0+22744+7794713b.x86_64
RHSA-2023:6944 Moderate/Sec. protobuf-c-1.3.0-8.el8.x86_64
CVE-2022-48468 Moderate/Sec. protobuf-c-1.3.0-8.el8.x86_64
classification Moderate/Sec. protobuf-c-1.3.0-8.el8.x86_64
ref_0 Moderate/Sec. protobuf-c-1.3.0-8.el8.x86_64
RHSA-2025:0746 Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
RHEL-70359 Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44442 Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44443 Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44444 Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
classification Important/Sec. pygobject2-2.28.7-5.module+el8.10.0+22676+becd68d6.x86_64
RHSA-2025:0746 Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
RHEL-70359 Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44442 Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44443 Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
CVE-2023-44444 Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
classification Important/Sec. python2-cairo-1.16.3-7.module+el8.10.0+22676+becd68d6.x86_64
RHSA-2025:1675 Important/Sec. python3-bind-32:9.11.36-16.el8_10.4.noarch
CVE-2024-11187 Important/Sec. python3-bind-32:9.11.36-16.el8_10.4.noarch
classification Important/Sec. python3-bind-32:9.11.36-16.el8_10.4.noarch
RHSA-2024:10953 Important/Sec. python3-bson-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
CVE-2024-53899 Important/Sec. python3-bson-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
classification Important/Sec. python3-bson-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
RHSA-2023:4706 Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
CVE-2023-3899 Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
classification Important/Sec. python3-cloud-what-1.28.36-3.el8_8.x86_64
RHSA-2024:10953 Important/Sec. python3-distro-1.4.0-2.module+el8.10.0+20784+edafcd43.noarch
CVE-2024-53899 Important/Sec. python3-distro-1.4.0-2.module+el8.10.0+20784+edafcd43.noarch
classification Important/Sec. python3-distro-1.4.0-2.module+el8.10.0+20784+edafcd43.noarch
RHSA-2025:0711 Important/Sec. python3-jinja2-2.10.1-6.el8_10.noarch
CVE-2024-56326 Important/Sec. python3-jinja2-2.10.1-6.el8_10.noarch
classification Important/Sec. python3-jinja2-2.10.1-6.el8_10.noarch
RHSA-2024:10779 Moderate/Sec. python3-libs-3.6.8-69.el8_10.x86_64
CVE-2024-9287 Moderate/Sec. python3-libs-3.6.8-69.el8_10.x86_64
CVE-2024-11168 Moderate/Sec. python3-libs-3.6.8-69.el8_10.x86_64
classification Moderate/Sec. python3-libs-3.6.8-69.el8_10.x86_64
RHSA-2025:1517 Moderate/Sec. python3-libxml2-2.9.7-18.el8_10.2.x86_64
CVE-2022-49043 Moderate/Sec. python3-libxml2-2.9.7-18.el8_10.2.x86_64
classification Moderate/Sec. python3-libxml2-2.9.7-18.el8_10.2.x86_64
RHSA-2024:8856 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48773 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2022-48936 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2023-52492 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-24857 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26851 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26924 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-26976 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27017 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-27062 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35839 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35898 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-35939 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38540 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38541 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38586 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-38608 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-39503 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40924 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40961 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40983 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-40984 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41009 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41042 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41066 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41092 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-41093 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42070 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42079 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42244 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42284 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42292 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-42301 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43854 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43880 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43889 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-43892 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44935 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44989 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-44990 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-45018 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46679 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-46826 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
CVE-2024-47668 Moderate/Sec. python3-perf-4.18.0-553.27.1.el8_10.x86_64
RHSA-2024:10281 Moderate/Sec. python3-perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27043 Moderate/Sec. python3-perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-27399 Moderate/Sec. python3-perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-38564 Moderate/Sec. python3-perf-4.18.0-553.30.1.el8_10.x86_64
CVE-2024-46858 Moderate/Sec. python3-perf-4.18.0-553.30.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.30.1.el8_10.x86_64
RHSA-2024:10943 Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-46695 Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-49949 Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50082 Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50099 Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50110 Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50142 Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50192 Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50256 Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
CVE-2024-50264 Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.32.1.el8_10.x86_64
RHSA-2025:0065 Important/Sec. python3-perf-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53088 Important/Sec. python3-perf-4.18.0-553.34.1.el8_10.x86_64
CVE-2024-53122 Important/Sec. python3-perf-4.18.0-553.34.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.34.1.el8_10.x86_64
RHSA-2025:1068 Moderate/Sec. python3-perf-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-26935 Moderate/Sec. python3-perf-4.18.0-553.37.1.el8_10.x86_64
CVE-2024-50275 Moderate/Sec. python3-perf-4.18.0-553.37.1.el8_10.x86_64
classification Moderate/Sec. python3-perf-4.18.0-553.37.1.el8_10.x86_64
RHSA-2025:1266 Important/Sec. python3-perf-4.18.0-553.40.1.el8_10.x86_64
CVE-2024-53104 Important/Sec. python3-perf-4.18.0-553.40.1.el8_10.x86_64
classification Important/Sec. python3-perf-4.18.0-553.40.1.el8_10.x86_64
RHSA-2024:10953 Important/Sec. python3-pygments-2.2.0-22.module+el8.10.0+20784+edafcd43.noarch
CVE-2024-53899 Important/Sec. python3-pygments-2.2.0-22.module+el8.10.0+20784+edafcd43.noarch
classification Important/Sec. python3-pygments-2.2.0-22.module+el8.10.0+20784+edafcd43.noarch
RHSA-2024:10953 Important/Sec. python3-pymongo-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
CVE-2024-53899 Important/Sec. python3-pymongo-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
classification Important/Sec. python3-pymongo-3.7.0-1.module+el8.10.0+20784+edafcd43.x86_64
RHSA-2023:4520 Moderate/Sec. python3-requests-2.20.0-3.el8_8.noarch
CVE-2023-32681 Moderate/Sec. python3-requests-2.20.0-3.el8_8.noarch
classification Moderate/Sec. python3-requests-2.20.0-3.el8_8.noarch
RHSA-2025:0012 Moderate/Sec. python3-requests-2.20.0-5.el8_10.noarch
CVE-2024-35195 Moderate/Sec. python3-requests-2.20.0-5.el8_10.noarch
classification Moderate/Sec. python3-requests-2.20.0-5.el8_10.noarch
RHSA-2023:4706 Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
CVE-2023-3899 Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
classification Important/Sec. python3-subscription-manager-rhsm-1.28.36-3.el8_8.x86_64
RHSA-2023:4706 Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
CVE-2023-3899 Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
classification Important/Sec. python3-syspurpose-1.28.36-3.el8_8.x86_64
RHSA-2025:0837 Important/Sec. python3-unbound-1.16.2-5.8.el8_10.x86_64
CVE-2024-1488 Important/Sec. python3-unbound-1.16.2-5.8.el8_10.x86_64
CVE-2024-8508 Important/Sec. python3-unbound-1.16.2-5.8.el8_10.x86_64
classification Important/Sec. python3-unbound-1.16.2-5.8.el8_10.x86_64
RHSA-2024:10953 Important/Sec. python36-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
CVE-2024-53899 Important/Sec. python36-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
classification Important/Sec. python36-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
RHSA-2024:10953 Important/Sec. python36-devel-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
CVE-2024-53899 Important/Sec. python36-devel-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
classification Important/Sec. python36-devel-3.6.8-39.module+el8.10.0+20784+edafcd43.x86_64
RHSA-2024:8359 Moderate/Sec. python39-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232 Moderate/Sec. python39-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification Moderate/Sec. python39-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2024:8359 Moderate/Sec. python39-devel-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232 Moderate/Sec. python39-devel-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification Moderate/Sec. python39-devel-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2024:8359 Moderate/Sec. python39-idle-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232 Moderate/Sec. python39-idle-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification Moderate/Sec. python39-idle-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2024:8359 Moderate/Sec. python39-libs-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232 Moderate/Sec. python39-libs-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification Moderate/Sec. python39-libs-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2024:8359 Moderate/Sec. python39-rpm-macros-3.9.20-1.module+el8.10.0+22342+478c159e.noarch
CVE-2024-6232 Moderate/Sec. python39-rpm-macros-3.9.20-1.module+el8.10.0+22342+478c159e.noarch
classification Moderate/Sec. python39-rpm-macros-3.9.20-1.module+el8.10.0+22342+478c159e.noarch
RHSA-2024:8359 Moderate/Sec. python39-test-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232 Moderate/Sec. python39-test-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification Moderate/Sec. python39-test-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2024:8359 Moderate/Sec. python39-tkinter-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
CVE-2024-6232 Moderate/Sec. python39-tkinter-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
classification Moderate/Sec. python39-tkinter-3.9.20-1.module+el8.10.0+22342+478c159e.x86_64
RHSA-2023:4706 Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
CVE-2023-3899 Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
classification Important/Sec. rhsm-icons-1.28.36-3.el8_8.noarch
RHSA-2025:0325 Important/Sec. rsync-3.1.3-20.el8_10.x86_64
CVE-2024-12085 Important/Sec. rsync-3.1.3-20.el8_10.x86_64
classification Important/Sec. rsync-3.1.3-20.el8_10.x86_64
RHSA-2025:0325 Important/Sec. rsync-daemon-3.1.3-20.el8_10.noarch
CVE-2024-12085 Important/Sec. rsync-daemon-3.1.3-20.el8_10.noarch
classification Important/Sec. rsync-daemon-3.1.3-20.el8_10.noarch
RHSA-2024:10850 Important/Sec. ruby-libs-2.5.9-113.module+el8.10.0+22581+23fc9c9e.x86_64
CVE-2024-49761 Important/Sec. ruby-libs-2.5.9-113.module+el8.10.0+22581+23fc9c9e.x86_64
classification Important/Sec. ruby-libs-2.5.9-113.module+el8.10.0+22581+23fc9c9e.x86_64
RHSA-2024:8846 Important/Sec. runc-1:1.1.12-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. runc-1:1.1.12-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. runc-1:1.1.12-5.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. runc-1:1.1.12-5.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. runc-1:1.1.12-5.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. runc-1:1.1.12-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. runc-1:1.1.12-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. runc-1:1.1.12-5.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. runc-1:1.1.12-5.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. runc-1:1.1.12-5.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22722+0028f543.x86_64
RHEL-74865 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22722+0028f543.x86_64
CVE-2024-11218 Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22722+0028f543.x86_64
classification Important/Sec. runc-1:1.1.12-6.module+el8.10.0+22722+0028f543.x86_64
RHSA-2024:8846 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218 Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
classification Important/Sec. skopeo-2:1.14.5-3.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2024:8846 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9341 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9407 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6.x86_64
CVE-2024-9675 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6.x86_64
classification Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22397+e3c95ba6.x86_64
RHSA-2024:10289 Moderate/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-4024 Moderate/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2021-33198 Moderate/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-9676 Moderate/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
classification Moderate/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2025:1372 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
RHEL-74865 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
CVE-2024-11218 Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
classification Important/Sec. slirp4netns-1.2.3-1.module+el8.10.0+22417+2fb00970.x86_64
RHSA-2023:4706 Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
CVE-2023-3899 Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
classification Important/Sec. subscription-manager-1.28.36-3.el8_8.x86_64
RHSA-2023:4706 Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
CVE-2023-3899 Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
classification Important/Sec. subscription-manager-cockpit-1.28.36-3.el8_8.noarch
RHSA-2023:4706 Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
CVE-2023-3899 Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
classification Important/Sec. subscription-manager-rhsm-certificates-1.28.36-3.el8_8.x86_64
RHSA-2025:1215 Moderate/Sec. tbb-2018.2-10.el8_10.1.x86_64
CVE-2020-11023 Moderate/Sec. tbb-2018.2-10.el8_10.1.x86_64
classification Moderate/Sec. tbb-2018.2-10.el8_10.1.x86_64
RHSA-2023:7166 Low/Sec. tpm2-tss-2.3.2-5.el8.x86_64
CVE-2023-22745 Low/Sec. tpm2-tss-2.3.2-5.el8.x86_64
classification Low/Sec. tpm2-tss-2.3.2-5.el8.x86_64
ref_0 Low/Sec. tpm2-tss-2.3.2-5.el8.x86_64
RHSA-2024:11161 Moderate/Sec. tuned-2.22.1-5.el8_10.noarch
CVE-2024-52337 Moderate/Sec. tuned-2.22.1-5.el8_10.noarch
classification Moderate/Sec. tuned-2.22.1-5.el8_10.noarch
RHSA-2025:0837 Important/Sec. unbound-libs-1.16.2-5.8.el8_10.x86_64
CVE-2024-1488 Important/Sec. unbound-libs-1.16.2-5.8.el8_10.x86_64
CVE-2024-8508 Important/Sec. unbound-libs-1.16.2-5.8.el8_10.x86_64
classification Important/Sec. unbound-libs-1.16.2-5.8.el8_10.x86_64
RHSA-2024:8859 Moderate/Sec. xmlrpc-c-1.51.0-10.el8_10.x86_64
CVE-2024-45491 Moderate/Sec. xmlrpc-c-1.51.0-10.el8_10.x86_64
classification Moderate/Sec. xmlrpc-c-1.51.0-10.el8_10.x86_64
RHSA-2024:8859 Moderate/Sec. xmlrpc-c-client-1.51.0-10.el8_10.x86_64
CVE-2024-45491 Moderate/Sec. xmlrpc-c-client-1.51.0-10.el8_10.x86_64
classification Moderate/Sec. xmlrpc-c-client-1.51.0-10.el8_10.x86_64
RHSA-2023:7057 Moderate/Sec. yajl-2.1.0-12.el8.x86_64
CVE-2023-33460 Moderate/Sec. yajl-2.1.0-12.el8.x86_64
classification Moderate/Sec. yajl-2.1.0-12.el8.x86_64
ref_0 Moderate/Sec. yajl-2.1.0-12.el8.x86_64