Skip to content
Snippets Groups Projects
Commit efe4caa5 authored by Linux Gitlab Continuous Integration's avatar Linux Gitlab Continuous Integration :speech_balloon:
Browse files

RHEL8 testing updates 2025-05-01

parent e5291cc1
No related branches found
No related tags found
No related merge requests found
## 2025-05-01
### appstream x86_64 repository
Package | Version | Advisory | Notes
------- | ------- | -------- | -----
ghostscript | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-debuginfo | 9.27-16.el8_10 | |
ghostscript-debugsource | 9.27-16.el8_10 | |
ghostscript-gtk-debuginfo | 9.27-16.el8_10 | |
ghostscript-x11 | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-x11-debuginfo | 9.27-16.el8_10 | |
libgs | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
libgs-debuginfo | 9.27-16.el8_10 | |
### codeready-builder x86_64 repository
Package | Version | Advisory | Notes
------- | ------- | -------- | -----
ghostscript-debuginfo | 9.27-16.el8_10 | |
ghostscript-debugsource | 9.27-16.el8_10 | |
ghostscript-doc | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-gtk-debuginfo | 9.27-16.el8_10 | |
ghostscript-tools-dvipdf | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-tools-fonts | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-tools-printing | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-x11-debuginfo | 9.27-16.el8_10 | |
libgs-debuginfo | 9.27-16.el8_10 | |
libgs-devel | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
### appstream aarch64 repository
Package | Version | Advisory | Notes
------- | ------- | -------- | -----
ghostscript | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-debuginfo | 9.27-16.el8_10 | |
ghostscript-debugsource | 9.27-16.el8_10 | |
ghostscript-gtk-debuginfo | 9.27-16.el8_10 | |
ghostscript-x11 | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-x11-debuginfo | 9.27-16.el8_10 | |
libgs | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
libgs-debuginfo | 9.27-16.el8_10 | |
### codeready-builder aarch64 repository
Package | Version | Advisory | Notes
------- | ------- | -------- | -----
ghostscript-debuginfo | 9.27-16.el8_10 | |
ghostscript-debugsource | 9.27-16.el8_10 | |
ghostscript-doc | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-gtk-debuginfo | 9.27-16.el8_10 | |
ghostscript-tools-dvipdf | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-tools-fonts | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-tools-printing | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
ghostscript-x11-debuginfo | 9.27-16.el8_10 | |
libgs-debuginfo | 9.27-16.el8_10 | |
libgs-devel | 9.27-16.el8_10 | [RHSA-2025:4362](https://access.redhat.com/errata/RHSA-2025:4362) | <div class="adv_s">Security Advisory</div> ([CVE-2020-27792](https://access.redhat.com/security/cve/CVE-2020-27792), [CVE-2023-46751](https://access.redhat.com/security/cve/CVE-2023-46751), [CVE-2024-46951](https://access.redhat.com/security/cve/CVE-2024-46951), [CVE-2024-46952](https://access.redhat.com/security/cve/CVE-2024-46952), [CVE-2024-46953](https://access.redhat.com/security/cve/CVE-2024-46953), [CVE-2024-46954](https://access.redhat.com/security/cve/CVE-2024-46954), [CVE-2024-46956](https://access.redhat.com/security/cve/CVE-2024-46956))
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment