Querying Security Updates
Command format: yum updateinfo <command> [option]
- Run the yum updateinfo command to query all available security updates.
[root@localhost ~]# yum updateinfo Last metadata expiration check: 0:03:05 ago on Thu 08 Sep 2022 05:30:23 PM CST. Updates Information Summary: available 12 Security notice(s) 4 Critical Security notice(s) 6 Important Security notice(s) 2 Moderate Security notice(s)
- Major <command> parameters include:
- list: lists the available security updates.
[root@localhost ~]# yum updateinfo list Last metadata expiration check: 0:03:32 ago on Thu 08 Sep 2022 05:30:23 PM CST. HCE2-SA-2022-0006 Critical/Sec. curl-7.79.1-2.h6.hce2.x86_64 HCE2-SA-2022-0011 Moderate/Sec. gnupg2-2.2.32-1.h6.hce2.x86_64 HCE2-SA-2022-0002 Important/Sec. kernel-5.10.0-60.18.0.50.h425_2.hce2.x86_64
- info <SA ID>: queries the security updates of a specific advisory.
[root@localhost ~]# yum updateinfo info HCE2-SA-2024-0262 Last metadata expiration check: 0:01:07 ago on Wed 26 Mar 2025 11:08:19 AM CST. =============================================================================== An update for wget is now available for HCE 2.0 =============================================================================== Update ID: HCE2-SA-2024-0262 Type: security Updated: 2024-09-23 18:09:48 CVEs: CVE-2024-38428 Description: Security Fix(es): : : url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent. (CVE-2024-38428) Severity: Critical
- list: lists the available security updates.
- Major [option] parameters include:
- --sec-severity={Critical,Important,Moderate,Low}: queries security updates of a specific level. Values in the brackets can be any combination of security update levels.
In the following example, --sec-severity=Critical is used to query critical security updates.
[root@localhost ~]# yum updateinfo list --sec-severity=Critical Last metadata expiration check: 0:10:15 ago on Thu 08 Sep 2022 05:30:23 PM CST. HCE2-SA-2022-0006 Critical/Sec. curl-7.79.1-2.h6.hce2.x86_64 HCE2-SA-2022-0003 Critical/Sec. libarchive-3.5.2-1.h2.hce2.x86_64 HCE2-SA-2022-0006 Critical/Sec. libcurl-7.79.1-2.h6.hce2.x86_64 ...
In the following example, --sec-severity={Critical,Moderate} is used to query critical and moderate security updates.
[root@localhost ~]# yum updateinfo list --sec-severity={Critical,Moderate} Last metadata expiration check: 0:11:07 ago on Thu 08 Sep 2022 05:30:23 PM CST. HCE2-SA-2022-0006 Critical/Sec. curl-7.79.1-2.h6.hce2.x86_64 HCE2-SA-2022-0011 Moderate/Sec. gnupg2-2.2.32-1.h6.hce2.x86_64 HCE2-SA-2022-0003 Critical/Sec. libarchive-3.5.2-1.h2.hce2.x86_64 ...
- --cve=<CVE ID>: queries security updates of a specific CVE.
[root@localhost ~]# yum updateinfo info --cve=CVE-2024-38428 Last metadata expiration check: 0:11:10 ago on Wed 26 Mar 2025 11:08:19 AM CST. =============================================================================== An update for wget is now available for HCE 2.0 =============================================================================== Update ID: HCE2-SA-2024-0262 Type: security Updated: 2024-09-23 18:09:48 CVEs: CVE-2024-38428 Description: Security Fix(es): : : url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent. (CVE-2024-38428) Severity: Critical
- --sec-severity={Critical,Important,Moderate,Low}: queries security updates of a specific level. Values in the brackets can be any combination of security update levels.

Use the yum updateinfo --help command to obtain more information.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot