SOLV L 0dnf1.01.2ql(3խfL(cւ(?ekx86_64noarchcvebugzillai6863finalpackager@almalinux.orgselfrhsa9:20200406-26.el9_21:7.1.8.1-11.el9.alma 2.el9_3.alma4.alma.1 3.el9_4.alma.1 4.el9_4.alma.1 8.el9_1.almaModerateImportant6.2.2-7.el9_5.alma.10-1.el92.el9_45.el9_4Copyright 2024 AlmaLinux OS 5 AlmaLinux OS 3 AlmaLinux OSkernel-doc4.10.0-98.el9_7.4586.el9_6.7kernel-debug-devel-matched vel -matchedperfkernel-headersrtla8cf767d6rv2.28-13.el9_6.alma.14.el9_610.5.0-7.el9_5.alma.10.0-6.2.el9_4.alma.1 6.el9_4.alma.1 el9_4.alma.1Copyright 2022 AlmaLinux OSwebkit2gtk3 -devel jsc-devel9.5.0-7.el9_3.alma.113.3.1-2.2.el9_54.2.1-1.3.el9_5firefoxnodejsthunderbird8.0.13-2.el9_020-3.el97-1.el9_130-1.el9_23.el9_65.el9_71.14-1.module_el9.2.0+24+ca6bd7c227-1.module_el9.3.0+53+44872dd130-1.module_el9.5.0+131+62ecd6872-1.module_el9.5.0+156+9f1cd3fd2.25-1.module_el9.5.0+132+adb0ae7a8-1.module_el9.6.0+165+cf879a7c30-1.module_el9.7.0+205+fe410f103.19-1.module_el9.6.0+166+f262c21c26-1.module_el9.7.0+197+324afee89-1.module_el9.7.0+206+f4fec7f311.5.0-5.el9_5.alma.1:11.0.16.0.8-1.el9_07.0.4.0.8-2.el9_0nodejs-docs8.5.0-7.el9_19.0.0-10.2.el9_2firefox-x115.14.0-70.17.1.el9_0 22.1.el9_017:6.2.0-11.el9_0.37.0.0-13.el9python3-perfdevel17:8.0.0-16.el9_3.alma.12.0-11.el9_4.49.0.0-10.el9_57.2.0-14.el9_2.5.alma.140.7-19.el9postgresqlython3.11-devel libs1:1.8.0.342.b07-1.el9_03.79.0-17.el9_190.0-4.el9_36.el9_3npmpodman-dockernodejs-full-i18nCopyright 2026 AlmaLinux OSpython-unversioned-command15.10-1.module_el9.5.0+126+03d48c9f2-1.module_el9.5.0+140+e3f03d9d4-1.module_el9.6.0+176+c508cfa25-2.module_el9.7.0+203+960b74c03-1.module_el9.2.0+32+f3c125b55-1.module_el9.3.0+52+217339196-1.module_el9.3.0+55+d62f47798-1.module_el9.4.0+111+667b9e9e6.10-1.module_el9.6.0+174+80cb77f01-1.module_el9.7.0+202+21427d8a4-1.module_el9.4.0+109+624ac33a8-1.module_el9.5.0+141+f4b0f9b75.15.9-10.el9_41.el9_67.el99.el94.12.2-14.el9_6.1522.el9_7.11.66.1-2.el9_2golang-docsmiscsrctests3:10.11.10-1.module_el9.5.0+135+c9657a87 5-1.module_el9.7.0+199+a988ea015.16-2.el9_0libcurl-develnodejs-nodemonphpopenssl-devel2.31.1-3.el9_19.1-1.el93-1.el9_243.5-1.el9_47.1-2.el9_63-1.el9_64.12.2-1.el9_5.3nodejs-libsruby4.10.0-43.el955.el9_3.2.alma.162.el9 _4.34.alma.1576.el9_5.4.alma.1dotnet-hostnetstandard-targeting-pack-2.1odejs-packaging-bundlerpython3.12-devel libs13.20-1.el9_53-1.el9_7postgresql-contrib plperlython3 tcl rivate-libs server upgrade1.6.1-20.el9_2.1Low3:10.5.22-1.el9_2.alma.17-1.el9_59-2.el9_6 3.el9_74.10.2-5.el9_3.alma.11.0-15.el9_4.alma.19.el9_4podman-pluginsremotetestslibxml2-devel1.22.12-3.el9buildah-testsjava-1.8.0-openjdk-javadoc-zipnodejs-develpython3-tkinter1:25.0.2.0.10-1.el9.alma.1golang-bin5.14.0-503.38.1.el9_570.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 5.1.el9_7 9.1.el9_7libtiff-develpostgresql-test-rpm-macros1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1 8.module_el9.5.0+153+8c633b18.1.alma.14.0-4.module_el9.5.0+154+722f94fd.1.alma.12021.06-4.module_el9.1.0+13+d9a595eago-toolsetrafana1:5.9.1-13.el9_4.3 7.el9_7.19.el9expat-develruby-devellibs1:11.0.17.0.8-2.el9_08.0.10-2.el9_19.0.7-1.el9_120.0.8-2.el91.0.9-2.el92.0.7-2.el93.0.9-3.el94.0.8-2.el95.0.9-2.el97.0.10.0.7-2.el91.0.9-2.el92.0.7-2.el93.0.11-3.el9.alma.14.0.7-2.el9.alma.15.0.6-2.el9.alma.16.0.8-2.el9.alma.17.0.10-1.el9.alma.18.0.8-1.el9.alma.15.0.8-2.el9_06.0.10-3.el9_17.0.7-1.el9_18.0.7-2.el99.0.9-2.el921.0.1.0.12-2.el9.alma.10.0.7-1.el9.alma.12.0.13-1.el9.alma.13.0.9-1.el9.alma.14.0.7-1.el9.alma.15.0.10-3.el9.alma.16.0.7-1.el9.alma.17.0.6-1.el9.alma.18.0.9-1.el9.alma.19.0.10-1.el9.alma.12:3.5.25-1.el98.0.10-1.el9_43-2.el9_35-1.el9_47-1.el9_48-1.el9_49.0.0-1.el9_510-1.el9_63-1.el9_55-1.el9_66-1.el9_6redistigervnc-icons license selinux5.14.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5krb5-devellibgsredis-devel1:1.20.1-14.el9_2.1.alma.148.4-2.el9.alma2.4.53-7.el9 _1.157-11.el9_4.15.el98.el962-1.el94.el9_6.47.el9_7.3:1.20.1-22.el9_6.2.alma.13.1.4-143.module_el9.3.0+60+5ebc989a5-145.module_el9.5.0+129+9ba7e8b13.1-2.module_el9.4.0+102+68a938530-5.module_el9.7.0+193+581791665-3.module_el9.4.0+115+226a984bphp-bcmathcliommondbagevelembeddednchantffipmgdmpintlldapmbstringysqlndodbcpcachepdogsqlrocesssnmpoapxmlython3.11 -tkinterrubygem-rbs4.16.1.3-27.el9_3gimp-libs1.22.1-2.el93.el9_52-4.el93.10-1.el9_11-1.el9_23-1.el9_34-1.el9_36-1.el9_48-1.el9_522-1.el9_66.6-1.module_el9.5.0+128+1095dce221.01.0-13.el9 4.el921.el9 3.el9_78.0.14-1.el9_56-1.el9_67-1.el9_621-1.el9_6aspnetcore-runtime-6.0 targeting-pack-6.0dotnet-apphost-pack-6.0hostfxr-6.0runtime-6.0sdk-6.0targeting-pack-6.0emplates-6.0java-17-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libsredis-docgnutls-c++daneevellibsoup-develrubygem-bigdecimalio-consolejsonpsych1:2.3.3op2-16.el9_2.1 21.el9 7.el9_4 31.el9_5 3.el9_6.1 4.el9_7.29.54.0-10.el9_21.el9_23.el94.el9_36.el9_47.el9_48.el9_69.el9_6bind-dnssec-doclicensefence-agents-common ibm-powervsvpc virshhttpd-filesystemmanualjava-1.8.0-openjdk-demovelheadlesssrcpython3-bindskopeo-teststomcat-admin-webappsdocs-webappel-3.0-apijsp-2.3-apilibservlet-4.0-apiwebapps11.0.6-2.el9_02.37.4-21.el9_732:9.16.23-1.el9_0.1 1.el9_2.12 4.el9_3.4 8.el9_4.16 24.el9_5.3 34.el9_7.1 5.el9_15.1.21-1.module_el9.1.0+15+94ba28e48.4.6-1.module_el9.6.0+180+a4e757e57-1.module_el9.7.0+194+73a02de81.18.9-1.el9_19.10-1.el9_23-1.el9_223.6-2.el9_59-1.el9_64.4-1.el9_66-1.el9_65.3-1.el9_75-2.el9_77-1.el9_71.3.0-1.el95.0-2.el9_4.alma.12.36.7-1.el9 _0 1.1238.5-1.el9 _2.12340.5-1.el9 _3.12.5-1.el94.3-2.el96.1-2.el9_43-1.el9_52.el9_55-1.el9_56-1.el9_52.el9_58.1-1.el9_5 62-1.el9_65-1.el9_650.1-0.el9_61.el9_73-1.el9_74-1.el9_73.0.21-37.el940.el9_44:5.32.1-481.el96.0.10-1.el9_08-1.el9_09-1.el9_07.0.0-0.5.rc2.el9_110-1.el9_21-1.el9_22-1.el9_23-1.el9_27-1.el9_29-1.el9_28.0.0-2.el9_31-1.el9_32-2.el9_3pg_repackauditostgres-decoderbufsql-docs private-devel server-devel tatic test upgrade-devel16.6-1.module_el9.5.0+127+50ff03a92:4.2.0-7.el9_15.14.0-162.6.1.el9_1284.11.1.el9_2 25.1.el9_270.30.1.el9_06.5.1-1.el9_12-6.el9_2.alma.17.12.1-11.el9_7.343.0-13.el9_3cups-develedk2-ovmfglibc-develruby-default-gemsgem-bundlerirbminitestpower_assertrake doc exml sstest-unit ypeprofs-devel1:1.8.0.352.b08-2.el9_0 62.b09-2.el9_1 72.b07-1.el9_1 82.b05-2.el9 92.b08-3.el9402.b06-2.el9 12.b08-2.el9 22.b05-2.el9 32.b06-2.el9 52.b09-2.el9 62.b08-3.el9 72.b08-1.el9.alma.1 82.b08-1.el9.alma.1aspnetcore-runtime-7.08.0 targeting-pack-7.08.0dotnet-apphost-pack-7.08.0hostfxr-7.08.0runtime-7.08.0sdk-7.0 8.0targeting-pack-7.08.0emplates-7.08.0golang-raceopenssl-perltigervnc-server-minimalodule1.12.0-13.el9_25.el9_1.123.1-3.el9_3.3.alma.16.alma.18.el9 _4.34.1-1.el9_5.18.el9_69.el9_65.0-6.el9_73.2.3-5.el97.6-12.el9_08.el9_123.el9_3.348.3-4.el9_46.el9 _6.2ruby-bundled-gems1.17.12-1.el9_09.9-2.el9_220.11-11.el9 7.el9 9.el924.el9 6.el9 8.el9_631.el9_6 2.el9_72-1.el9_32.el9_34.el9_31.11-1.el9_43-3.el9_44.el9_49-2.el9_47.0-8.el99.el9:9.0.62-11.el9_2.3 37.el9_3.1287-1.el9_4.12 2.el9_5.1 3.el9_6.13 6.el9_7.12.24.0-2.el9_5.alma.13.0.4-160.el9_07-162.el9_43.el9_54.16.4-101.el9 3.el9_17.5-102.el9 3.el9_2.alma8.6-100.el9 1.el9_3.alma.15.14.0-284.18.1.el9_2 30.1.el9_26.0.13-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_47.0.14-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_4ghostscript-docrafana-selinuxpython3.12 -tkinter2.9.4-11.el9_6.1:4.2.0-3.el94.1-3.el96.1-5.el97.el9_35.1.23-1.module_el9.4.0+65+49ff64726.0+151+5f31e5764.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_170.26.1.el9_07.76.1-14.el9_0.5apcu-panellibssh-develpam-develunbound-libs1.0.0-10.el9_1.282.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.7020.3-8.el9_5.13.1.5-144.module_el9.4.0+101+d58a8d951.11-2.el9 _6.123-5.el9_72-2.el9_2.125-1.el9_37-1.el9 _4.13569-7.el9 _5.1232.1-4.el9_4.342-1.el9_74.el9_75-2.el9 _5.1239-1.el9 _6.1224.31-5.el9bind-chrootdnssec-utilslibsutilscontainernetworking-pluginsfence-agents-compute kubevirtvirt d -cpg libvirt multicast serial tcphttpd-coredeveltoolsjava-11-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libs21-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libsmod_ldapuaproxy_htmlsessionslysqlphp-pecl-apcu -devel rrd xdebug3 zipruncsquid141-1.el9.alma.12.0.32-5.el9_442.6-3.el94.el9_4emacs-filesystemipa-client-commonommonselinuxrver-common dnspython3-ipaclient lib server12.1.5-1.el9_2.1.alma3.alma.12.5-3.el9_3.2.alma.15.0-1.el9.alma.1 _6.23.0.0-1.el9_7.13.5.3-3.module_el9.7.0+187+2286ff0a2:9.18.29-1.el9_5.1 4.el9_6.2 5.el9_7.28.0.43-1.el9_64-1.el9_79.0.100-1.el9_54-1.el9_56-1.el9_67-1.el9_611-1.el9_6aspnetcore-runtime-dbg-8.0dotnet-runtime-dbg-8.0sdk-dbg-8.0mariadbysql-commonerrmsgosbuild-composer-coreworker0.5.4-1.module_el9.1.0+8+503f6fbd1.16.2-19.el9_6.13.5-1.module_el9.1.0+8+503f6fbd0.2-11.el9:22.13.1-1.module_el9.5.0+139+092964915.0-1.module_el9.6.0+164+2d89b8ed6.0-1.module_el9.6.0+170+f035de784.13.0-1.module_el9.7.0+209+ecf6523e7.2-10.el9_41.el9_5.124.el9_6.26.el9_1.18.el9 _2.13.0.1-41.el9_02.41-5.el9_7.14-3.el9_7.1:4.9.4-0.1.el98.2.2637-16.el9_0.233.4.8-1.el94:4.9.4-10.el9_4 3.el9_4 6.el9_43.el9_44.el9_45.el9_45.2.2-13.el9_59.el9_55:5.4.0-10.el9_6 2.el9_6 3.el9_66:5.6.0-11.el9_76.el9_77.el9_79.el9_7flatpak-libsglib2-develstreamer1-plugins-bad-freegood-gtkiperf3pcp-devellibs-develtestsuiteoppler-cppglibqt5qt5-qtbase -devel examples gui mysql odbc postgresql rivate-develsqlite-develystemd-develvarnish0.4.31-7.el9_41.0.9-9.el9_712.8-1.el99-1.el9_43.el9_4 58.1-3.el94.el9_4:1.48.10-2.el9_5.alma.1 5.el9_56.16.0-1.el9_07.1-1.el9_08.1-3.el9_19.1-1.el9_2 2.el9_220.1-1.el9_22-3.el9_2 4.el9_3 8.el9_42.0.90-6.el9_17.el919.1-1.el9_650.7-1.el9_2.152-55.el9_7.7.alma.1:2.11.2-1.el97-1.el9_7.14.1-5.el95.15.9-2.el9_7.1autocorr-af bg ca s da e sb el n s fa i r ga hr sb u is t ja ko lb t mn nl pl t ro u sk l r v tr vi ro zhcups-filesystemedk2-aarch64ghostscript -tools-dvipdffontsprinting x11impt-allcore-docemailguiinstaweblfssvnkweblibc-doclibreoffice-data opensymbol-fonts ure-commonmysql-servernginxperl-Git-SVNqemu-guest-agentimgkvm-audio-pa block-curlrbd common re device-display-virtio-gpu"-pcivgausb-hostredirect ocs tools ui-egl-headless openglpr-helperruby-docxorg-x11-server-Xdmxephyrnestorgvfbwaylandcommon3.14.0-13.el96.el96.2-10.20210508.el97.2.11-1.module_el9.6.0+188+92104ce8rubygem-mysql2-doc11.3.5-1.el9_0.1:2.3.16-11.el9_4.1 7.el96.0.108-1.el9_076-2.el9_2.alma8.0.103-2.el9_35-1.el9_47-1.el9_48-1.el9_410-1.el9_430-3.el9_02-1.el9_26-1.el9_341-2.el9_5emacs-commonlucidnoxgnutls-utilsrafana-pcpipa-client -epn sambaserver -trust-adlibvirt-clientdaemon-config-networkwfilterdriver-interfacenetworkodedevwfilterqemusecrettorage-corediskiscsilogicalmpathrbdscsikvmlibsnssmariadb-backupcommonembedded rrmsggssapi-serveroqgraph-enginepamserver-galerautilsopen-vm-tools -desktopsdmptestssh-askpasspam_ssh_agent_authrepokey:type:idubygem-mysql2pg -doctoolbox-testsvim-X11commonenhanced0.30.0-6.el98-22.el9_61.03-481.el916.2-2.el93.el9 _3.159.3-2.el9_032.9-1.el9_55.4-1.module_el9.4.0+75+1a8fe981:1.12.20-7.el9_12.16.20.2-1.el9_28.12.1-1.module_el9.1.0+16+91bc168f4.2-2.module_el9.2.0+29+de583a0b 3.module_el9.2.0+30+e33124936.1-1.module_el9.2.0+31+cbae0c8e7.1-1.module_el9.2.0+36+853e48f58.2-2.module_el9.2.0+43+3ebc9e209.1-1.module_el9.3.0+59+28b9564420.2-2.module_el9.4.0+99+a01f76764-1.module_el9.4.0+112+bb28ff816-1.module_el9.5.0+136+92f38f3c20.11.1-1.module_el9.3.0+88+29afeaa22.2-2.module_el9.4.0+100+71fc95286.0-1.module_el9.4.0+107+dbd477e48.2-1.module_el9.5.0+137+381f3eaf9.1-1.module_el9.6.0+163+d268fe532-1.module_el9.6.0+169+c9cb05c22.40-21.el9_7.15.2-9.el9_56.1-8.el9_6:21.11.2-1.el9_13.11-2.el9_5avahi-glibc-ares-develfreerdp-libsr-selinuxgstreamer1-plugins-base-develkeylime-selinuxlibpq-develvpxwinprxslt-develnet-snmp-agent-libs devel libsginx-all-modulesfilesystemspr-devels-develsoftokn -devel freebl-develutil-develpython3-lib389rubygem-raccwireshark-cli0.40.0-6.el9_31.0.10-6.el9.28-4.el91.34-13.el9_69.el9_5.128.4-6.el92.0-6.el9_17.el9_22.12-4.el9_646.5-3.el97.0-12.el9_33.11-1.el95:6.2.0-13.el92.3.4-28.el968.4-11.el94.el9_4.16.el9_6.28.el9_7.17.4-10.el98.el92.0-10.el9_6.122.el9_7.1358.el9_5.233.2.1-10.el934.1-6.el9_17.el9_38.el9_69.el9_75.13-10.el98.el9_16.0-12.el9_79.14-1.el9 _1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9 _5.121-1.el9_52.el9 _6.125-2.el9_73.el9_74.34.0-17.el9_15.0-4.el9_36.el9_34.0-10.el92.el9 _4.13.el9_6.25.el9_7.22.el95.el9_17.el98.el9_26.2.17-1.el9_58-1.el9_620-1.el9_62.el9_77-1.el9cups-clientipptoollpdprinterappfrrgit-coreredential-libsecretdaemonsubtreelibc-headerslocale-sourceutilslibreoffice-base calc ore draw emailmerge filters gdb-debug-support raphicfilter tk3 help-arbgncasdaezelnostufirgluheiruidtjakoltvnblnplt-BRPTrousiklvtarukzh-Hanst impress langpack-afrsbgnrcasydaezelnostufairygaluheiruidtjakknoltvmailrnblnrsoorpalt-BRPTrousiklrstvtaehnrsukvexhzh-Hanstu math ogltrans pdfimport yuno ure wiki-publisher riter x11 sltfilter kitswanmod_http2open-vm-tools-salt-minionsamba-clientkrb5-printingvfs-iouringwinbind-clientskrb5-locator exe3.0.1-1.module_el9.2.0+36+853e48f55.32.1-481.el9libarchive-devel0.7.0-3.20211109gitb79fd91.el9996-3.module_el9.6.0+152+8cbce00c.41.02-481.el99-481.el97.0-1.module_el9.3.0+52+217339199.7-1.Final.module_el9.3.0+52+2173391901-1.el9.alma.12.el9_4.alma.12.12.0-1.el9_2.alma3.0-2.el9_2.alma4.0-1.el9_2.alma5.0-1.el9_2.alma1-1.el9_2.alma8.0-2.el9_1.alma15.11.0-1.el9_4.alma.13.0-3.el9_4.alma.16.0-1.el9_3.alma7.0-1.el9_3.alma8.0-1.el9_3.alma8-2.el9_5.alma.1.2-1.el9_5.alma.128.10.0-1.el9_5.alma.16.alma.11.0-1.el9_6.alma.12.0-1.el9_6.alma.12.0-1.el9_4.alma.13.0-1.el9_4.alma.132-1.el9.alma.1.2-1.el9_6.alma.12.el9_6.alma.140.3.0-1.el9_6.alma.16.0-1.el9_7.alma.17.0-1.el9_7.alma.19-3.el9_7.alma.36.0-1.module_el9.4.0+66+eb9878bc2.4.0-1.Final.module_el9.4.0+66+eb9878bc7.0.20070801-24.module_el9.6.0+152+8cbce00c021.06-4.module_el9.3.0+88+29afeaa25.0+139+09296491:8.2.2637-20.el9_1 1.el9 2.el9_6.1 3.el9_73.5.3-2.el9_089-ds-base -libs6.0.109-1.el9_010-1.el9_07.0.100-0.5.rc2.el9_17-1.el9_29-1.el9_210-1.el9_21-1.el9_22-1.el9_23-1.el9_28.0.100-2.el9_31-1.el9_32-2.el9_314-1.el9_56-1.el9_67-1.el9_621-1.el9_6aspnetcore-runtime-9.0dbg-9.0 targeting-pack-9.0dotnet-apphost-pack-9.0hostfxr-9.0runtime-9.0dbg-9.0sdk-9.0 aot-9.0 dbg-9.0targeting-pack-9.0emplates-9.0flatpak-selinuxgaleralib2-docvisor-tap-vsockipa-selinux-luna nfastkeylime-baseregistrartenantverifierlibreofficevirt-daemon-commonlockgplugin-lockdroxynginx-coremod-http-image-filterperlxslt-filter mail streampam-docscp-docodman-gvproxyython3-jinja2keylimeunbound.11-urllib3qt5-qtbase-commonunbound0.11.0-7.el93.71-11.el9_4 2.el921.1-1.el95.5-1.module_el9.4.0+75+1a8fe9818-15.el920.el91.0.31-8.el91.0-19.module_el9.6.0+152+8cbce00c23-481.el98.7-11.el9_2.17.el9_45.1-19.el921.el9_52.el9_55.el9_66.el9_64-1.el9:3.0.1-43.el9_0 7.el9_17-16.el9_225.el9_3 7.el9 8.el9_46.el9_22.2-6.el9_5.14.10-4.el9 6.el9 8.el9_7.15.1-4.el9_77.el9_72.1.3-4.el9_12.10-12.el9_0.24.5-8.el9_49.el9_47.0-11.el9_7.3024.3-3.el9_45.5-1.el950-12.el9_1.1 32-32.el9_4.alma.1:2.99.8-3.el9 4.el9_356.23.0.4-1.el9_7.12340.3-2.el9_6.13.1.1-2.el9_4.1 5.15.3-5.el9_66.el9_69.10-3.el9_04.16.0-8.el9_19.el95.2.5-8.el9_06.6.2-2.el9_1.13.el9_2.14.el9_3.16.el9_6.17.1-10.el9_67.2.10-1.module_el9.6.0+173+efaf92056-1.module_el9.5.0+130+36ae76357-1.module_el9.5.0+134+2e6456008-1.module_el9.6.0+168+b8d8e900LibRawbinutils-develcups-filters-libsdbus-develflac-libsgdk-pixbuf2 -devel modulesstreamer1-plugins-bad-free-libsharfbuzz-devel iculibX11-develxcbpm-develasan8blockdev -crypto dm fs kbd loop vm-dbus mdraid path nvdimmme part swap utilsjpeg-turbo -develnbdtasn1-develpmswebp-developenexr-libsjpeg2protobuf-literpm-ostree-libszziplib1.12-481.el920.1-1.module_el9.1.0+15+94ba28e42.0.3-4.module_el9.4.0+65+49ff6472021.06-4.module_el9.6.0+162+8dc602e53.1.4-1.module_el9.1.0+15+94ba28e46.1-5.el911.2-1.el9_423.1-1.el9_5bsdtarflatpak-session-helperglib2-testshaproxylibvirt-client-qemumod_auth_openidcysql-libsopentelemetry-collectorpcp-confexport-pcp2elasticsearchgraphiteinfluxdbjsonsparkxmlzabbix zabbix-agentgeolocateuiimport-collectl2pcp ganglia2pcp iostat2pcp mrtg2pcp sar2pcppmda-activemq pache bash cc ind2 onding pf trace cifs sco dbping enki m ocker s389log elasticsearch farm gfs2 luster pfs sd hacluster proxy infiniband json libvirt o msensors ogger ustrecomm mailq emcache ic ongodb unts ssql ysql named etcheck filter ws fsclient ginx vidia-gpu openmetrics vswitch racle pdns erfevent odman stfix gresql rabbitmq edis sctrl oomtemp syslog samba endmail hping lurm mart nmp ockets tatsd ummary ystemd trace unbound weblog zimbra swapselinuxystem-toolszeroconferl-PCP-LogImport Summary MMV PMDAgvectoroppler-utilsython3-pcpqemu-kvm-block-blkiosystemd-journal-remotevarnish-docs2.27-481.el95.15.3-1.el99-1.el9fence-agents-amt-wspc-snmp bladecenterrocade cisco-mdsucs drac5 eaton-snmpmersonps heuristics-pingpblade ibmbladefmiblo-moonshotpssh2ntelmodularpdumilan lpar mpath rhevmsab sbdcsi vmware-restsoap wtipostgresql-jdbcython3-requests+securityocksrsync-daemonyajl0.0.99.3-10.el9_2 5.el9 9.el94-6.el9_35-2.el9 5.el92-1.el9_61.0.9-1.el91.6-3.el9_62.22-4.el9_52.3-1.module_el9.4.0+65+49ff64726.0+151+5f31e5764.8-1.module_el9.2.0+22+096537937.0-1.module_el9.2.0+22+096537939.7-1.Final.module_el9.2.0+22+096537930.2.6-11.el9_63.el9_64.el9_67.el9_78.el9_74.el97.el9_59.el9_52.10.0-1.el9_1.alma1.0-2.el9_2.alma4.0-1.el9_0.alma9.0-3.el9_1.alma15.10.0-1.el9_3.alma.12.0-1.el9_4.alma.14.0-2.el9_4.alma.13.1-1.el9_2.alma.14.0-1.el9_2.alma.15.0-1.el9_3.alma.19.1-1.el9_3.alma.128.10.1-1.el9_6.alma.13.0-1.el9_6.alma.14.0-2.el9_6.alma.13.1-2.el9_4.alma.14.0-1.el9_455.1-1.el9_56.0-1.el9_57.0-1.el9_58.0-1.el9_59.0-2.el9_540.4.0-3.el9_6.alma.15.0-1.el9_7.alma.1:1.27.0-2.el99.1-1.el931.3-1.el9 2.el9_34-1.el9_35-1.el9_32.14.14-1.el94.53-7.el9_1.157-11.el9_4.1 5.el9 8.el962-1.el9 4.el9_6.4 7.el9_7.33.26.1-1.el9_7.12.0.3-4.module_el9.1.0+15+94ba28e46.0+151+5f31e57685-14.el9 _3.15.el99.6-2.el9_6:1.11.2-0.1.el93.3-1.el9 3.el9_3 4.el9_34.3-0.1.el9 2.el9_4 3.el9_45-1.el9_4 2.el9_46.1-1.el98.1-1.el9_6 2.el9_620.0-2.el9_733.10-1.el9_46-2.el97-1.el9_4 2.el9_4 3.el9_4 4.el9_49-1.el9_47.2-1.el95-1.el9_56-1.el9_59.4-1.el9_6 2.el9_641.6-1.el9_78-1.el9_79.2-1.el92.99.8-4.el9_63.2.2-2.module_el9.4.0+65+49ff64723.1-1.module_el9.6.0+151+5f31e57666-10.el9_62.el9_65.72-2.el96.0.113-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_41.0-2.module_el9.6.0+151+5f31e576:0.8.5-2.el9_67.0.114-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_48.0.6-2.el9_719.2.10-16.el9_4.alma.17.el9_49.el9_41.13.0-1.el9_0.almaavahi-toolsbind-dyndb-ldap9.18-chroot dnssec-utils libs utilsdnsmasq-utilsfence-agents-aliyunlwszure-arm gce kdump openstack redfishreerdpgstreamer1-plugins-base-toolsha-cloud-supportipa-client-encrypted-dnsserver-encrypted-dnsluamariadb-develembedded-develtestnet-snmp-perl utilsginx-mod-develss-sysinittoolsphp-pecl-redis6ython3-net-snmptornadosudo-python-pluginv8-12.4-develweldr-clientireshark0.10.4-11.el93.el95.el9_677.el9_720.2-6.el95.11-143.module_el9.3.0+60+5ebc989a 5.module_el9.5.0+129+9ba7e8b15-3.module_el9.7.0+184+e2e360726.1-13.el9_2.alma7.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669.1-3.20211126git1ff6fe1f43.el9_25.20211126git1ff6fe1f43.el9_69.9-5.el91.0.8-10.el9_510.0-11.el93-481.el97.1-5.el9_2.19.1-1.el92.el9_44.el9_12.0-11.el90.1-8.el91.1-1.el92.el9_43.el94.el9_56.el98.el9_62.1-2.el9_34.el93.3-10.el9 _2.148.2-5.el97.3-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669.0-7.el9_2.alma.18.el9_59.el9_6:0.9.72-5.el91.1.1k-5.el9_6.142.0-2.el9_42.0.7-6.el92.0.15-32.el9_520-2.module_el9.2.0+29+de583a0b6-4.el9_31.0-22.el90.4-9.el935.2-42.el967.el9_7.14.0-7.el98.el99-1.el9_1.18-9.el9_25.0-1.el9_3.12.el9_4.13.el9_5.135.el9_6 7.16.1-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b17.0-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b11-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b2-5.module_el9.7.0+193+581791669.13-10.el9_61.el9_62.el9_64.el9_73.el9_1 2.15.el9_36.el9_4 5.12:1.6.37-12.el9_7.13.0.1-1.module_el9.3.0+47+c33bc2881.1-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b15-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669-2.el9_64.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669-10.el9_2.alma3.el9 _5.14.el9_7.14.0.4-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b15.1.2-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791664.0-5.el97.76.1-19.el9 _1.1223.el9 _2.1246.el9 _3.239.el9_4.135.el9_7.38.3.1-11.el9_3.2.alma.1alma.15.el9 _2.2.alma5.3-4.el9CriticalOpenIPMI-lanserv ibsapr-develutil-bdb develbrotli-develzip2-develcjoseompat-openssl11rosynclibyrus-imapd-libse2fsprogs-develfreeglut-develtype-develibidi-develgcc-toolset-13-binutils-develgcc-plugin-devellibasan-develtomic-develgccjit-develitm-develquadmath-develstdc++-develubsan-devel 4-binutils-develgcc-plugin-devellibasan-develtomic-develgccjit-develitm-develquadmath-develstdc++-develubsan-devel 5-binutils-develmp-c++develstreamer1 -devel plugins-ugly-free rtsp-servertk3-devellassoibasanblkid-develcap-develom_err-develfastjsongccjit -develrypt-develicu-develnputtm-develjoselouismicrohttpdount-develpng-develqbuadmath-develrabbitmqsvg2-develsndfiletdc++-develubsandisks2uid-develvldpd-develmotif-develpg123-libsncurses-c++-libsdevelorc-develperl-devellibsixman-develmix-develpmiqt5-qt3d-develraptor2epokey:type:strpm-develust-std-staticspeextbb-develexlive-libusbguardwavpackxz-develyelp-libs0.03-481.el96.2-1.module_el9.5.0+120+4533eb202.module_el9.6.0+167+4e5611461.0.2-2.el95-481.el96-481.el97-481.el91.0-3.el91-481.el931-481.el97-481.el94.8-2.module_el9.5.0+119+18833d0320+4533eb205.1-1.module_el9.5.0+127+50ff03a96.0+146+c54fdeca2.25.1-10.el9_67.el9_29.el9021.06-4.module_el9.3.0+48+1cf146a130524-3.el9 4.el9_3.2.alma1122-6.el9_4.2440524-6.el9_5.31117-4.el9_7.32.3.1-4.el96.4.20-1.module_el9.5.0+135+c9657a873.12.33-160.el9_0 2.el9_4 3.el9_55-3.el93.26-143.module_el9.3.0+60+5ebc989a7-144.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b15.16-3.module_el9.4.0+115+226a984b22-5.module_el9.7.0+193+581791669-2.module_el9.4.0+102+68a9385389-ds-base-snmp5.74-481.el965.5.1-2.el9_4.14.el9_68.23904002024040318301360020250317151939NetworkManager-cloud-setuponfig-connectivity-redhatdispatcher-routing-rulesovspppbpftoolcloud-initockpit-packagekit cpstoragedups-filtersdbus-daemonx11elveovecot-mysqlpgsql igeonholepdk-develoctoolsfence-agents-nutanix-ahvreeradius -devel oc krb5 ldap utilsgnupg2-smimeidm-pki-acmebasecaestjavakraservertoolsputils-ninfodkernel-abi-stablelistscoreross-headersdebug -core modules-extramodules-extratools -libs-devellibX11-commonblockdev-plugins-all toolsguestfs-winsupportjpeg-turbo-utilsnbd-bash-completiontasn1-toolssan2mecab-develipadic -EUCJPod_jkproxy_clusteruttysql-develtest -datanbdfuseopenexrpki-jackson-databindython3-blockdevfreeradiusidm-pkijwcryptolibnbdprotobuf.11-setuptools-wheel 2-cryptography setuptools urllib3qemu-kvm-device-display-virtio-gpu-gl#pci-glvga-glt5-rpm-macrossrpm-macrosrapidjson-develpm-ostreesssd-idpysstatvim-filesystemminimalxterm-resizezziplib-utils2021.06-4.module_el9.5.0+124+df88fe4936+92f38f3c3.0.1-1.module_el9.5.0+125+8dc3887036+92f38f3c9+09296491rapidjson-docepokey:type:flexarray0.10.4-5.29.el9_2 30.el9_2 4.el9_3.3 8.el9_4.14 45.el9 7.el9_7.alma.127.0-1.el9_62.el9_635.0-2.el9_73.el9_76-103.el9_6.2.0-1.el99-481.el92.2-2.el97-3.el93-481.el95.11-144.module_el9.4.0+101+d58a8d957-160.el9_02.el9_43.el9_565-481.el91.15-481.el9.19-3.el9_1.55.el9_3.16-481.el98-481.el99.9-1.el9_22.10-2.el91-32.el9_049-1.el9_450-1.el9_4.10-481.el91.1-8.el9_424.1-2.el9_55.2-1.el9_78-481.el93.20-1.el9_42-1.el9_6.10-481.el9401-481.el94.8-1.module_el9.3.0+52+217339194.0+66+eb9878bc3-481.el97-481.el98-481.el97.4.1-6.el9_6.18.10-2.el9.alma0-481.el99.5p2-10.el9_36.17.el9_1.14-481.el90.112.10.0-2.el9_1.alma1.0-1.el9_2.alma3.0-3.el9_0.alma6.el9_0.alma7.el9_0.alma5.0-1.el9_1.alma2.el9_1.alma6.0-1.el9_1.alma2.el9_1.alma7.0-1.el9_1.alma1-1.el9_1.alma2.el9_1.alma9.0-1.el9_1.alma1.9-10.el9_4.alma.18.el9_3.3.alma.19.el9_4.alma.15-6.el9_1.10.0-2.el9_3.alma.12.1-1.el9_4.alma.14.0-1.el9_4.alma.13.1-1.el9_2.alma4.1-1.el9_2.alma5.0-1.el9_3.alma9.0-1.el9_3.alma.12.5.4-5.el97.el98.13.0-3.el9_6.alma.14.0-3.el9_6.alma.13.1-1.el9_4.alma.14.0-1.el9_4.alma.15.alma.15.0-1.el9_5.alma.16.0-3.el9_5.alma.17.0-1.el9_5.alma.18.0-2.el9_5.alma.19.0-2.el9_5.alma.12-1.el9_5.alma.14-2.el90.4.0-2.el9_6.alma.1:4.99.0-9.el9:0.79-8.1.el9_61.2.0-1.el93.0-4.el96.el9_34.0-2.el9_43.el9_44.el9_45.el9_46.el9_45.1-2.el96.2-2.el9_60.2.4-1.18.19.1.1.module_el9.3.0+59+28b95644 20.11.1.1.module_el9.3.0+88+29afeaa25.0-1.18.20.2.2.module_el9.4.0+99+a01f7676 20.12.2.2.module_el9.4.0+100+71fc95287.0-1.18.20.4.1.module_el9.4.0+112+bb28ff818.1-1.20.16.0.1.module_el9.4.0+107+dbd477e42-1.18.20.6.1.module_el9.5.0+136+92f38f3c 20.18.2.1.module_el9.5.0+137+381f3eaf9.1.1.module_el9.6.0+163+d268fe532.1.module_el9.6.0+169+c9cb05c29.2-1.22.13.1.1.module_el9.5.0+139+092964915.0.1.module_el9.6.0+164+2d89b8ed6.0.1.module_el9.6.0+170+f035de782.4.26-1.el9_7.18.11.0-1.16.16.0.1.el9_05.0-1.16.17.1.1.el9_09.2-1.16.18.1.3.el9_1 8.12.1.1.module_el9.1.0+16+91bc168f3-1.16.19.1.1.el9_22.el9_24-1.16.20.1.1.el9_22.1.el9_23.el9_24.el9_38.el9_49.5.0-1.18.14.2.2.module_el9.2.0+29+de583a0b3.module_el9.2.0+30+e33124931-1.18.16.1.1.module_el9.2.0+31+cbae0c8e6.7-1.18.17.1.1.module_el9.2.0+36+853e48f58.1-1.18.18.2.2.module_el9.2.0+43+3ebc9e202.0.26-1.el92.el9_4.14.el9_6.11.0-21.el94.0-1.el92.10-12.el9_0.38-4.el9_53.3-2.el9_05.el9_74.10-1.el9 _6.127-3.el9_1.222-1.el93.el9_39.4-4.el91-3.el95.1-160.el9_02.el9_43.el9_56-21.el9_3.alma.1-144.module_el9.4.0+101+d58a8d957.0-144.module_el9.4.0+101+d58a8d958.14-1.el9_7.19.4-6.el9_47-4.el9_7.10210202-11.el9_6.131.1.3-3.el97.el92.1.9-2.el95.el93.2.7-1.el93.el9_64.el9_65.el9_76.4.14-1.el9_2.alma.120-1.el9_52-1.el9_6:1.14.0-1.el92.1.7-1.el9_23.0.0-160.el9_02.el9_43.el9_55-6.el9_7.21.1-144.module_el9.4.0+101+d58a8d952-4.el9_32.0-1.el92.el9_33.el93.2-160.el9_02.el9_43.el9_54.1-2.el9_44.el9_4 55.3-4.el96.1-1.el92.el9_64.el9_71-2.el9_75.12-4.el9_65-4.el99-1.el97.0.2-6.el9:12.4.254.21-1.22.13.1.1.module_el9.5.0+139+092964915.0.1.module_el9.6.0+164+2d89b8ed6.0.1.module_el9.6.0+170+f035de783.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e4.0.4-144.module_el9.4.0+101+d58a8d9512-1.el9 _3.1.alma.12.el9_4.1 alma.16.5-3.el99-2.el9_24.el9_20.0-11.el9_610-21.el91.0.7-2.el9 _6.1:1.1.12-1.el9_3 2.el9 3.el9_4 4.el9_43-4.el94-1.el99-1.el92.el9_32.5-3.el9_63.0-4.el9_75.1.1-1.el91.el9_62.el9_3.alma.1 4.alma.13.el9_49.el9_54.2-4.el9_0.34-2.el9_13.el9:2.2.6-1.el92.el96.1.0-9.el94.2-1.el9_52.el9_6.2:0.7.3-3.el9_4.alma.14.el9_4.alma.15.el9_4.alma.18.5-1.el9_57.5.11-5.el9_05-3.el9:5.2-1.el9_0.125-13.el9_44.el9_5.322.el9_7.15.el9_2.16.el9_3.12588.2.2-4.el947p1-29.el9_230.el9_24.el9_3.38.el9_4.1445.el97.el9_7.alma.19.0.9-2.el93.el9_2.alma4.el9_2.alma.12-1.el92.el9_2.10-7.el9_3.alma.18.el9_3.alma.105002024100414370450204093711 1404284360020250317150833 10301455171.11.0-2.el9_0.alma2.0-2.el9_0.almaNetworkManager-libreswan-gnomeaardvark-dnsidensible-coretestpr-util-ldap mysql odbc penssl pgsql sqlitevahi-autoipdbcc-toolsluez-cupsobexdootcupdpftraceutanecargolippyonmonppurl-minimalyrus-imapd -utilsdotnet-sdk-6.0-source-built-artifactsexpatfwupd-plugin-flashromgcc-c++gfortranoffload-nvptxplugin-annobintoolset-13-binutils-goldgcc-c++gfortranplugin-annobinliblsan-develstdc++-docstsan-develoffload-nvptx 4-binutils-goldprofnggcc-c++gfortranplugin-annobinliblsan-develstdc++-docstsan-develoffload-nvptx 5-binutils-goldprofngdb-gdbserverheadlessminimalnome-remote-desktopshello-filesystemrpm-macrospsd-minimal -clientstk-update-icon-cache3-immodule-ximuestfs-toolsvisor-tap-vsock-gvforwardericugnitionmage-builderjava-1.8.0-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugslowdebugrc-fastdebugslowdebug1-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug7-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug25-openjdk-crypto-adapterdemovelheadlessjavadoc-zipmodssrctatic-libsosekeepalivedylime-agent-rustlibarchivebpf-toolscurl-minimalgomp-offload-nvptxuestfs -appliance rescue sync xfsinput-devel utilslsanrabbitmq-toolssvg2-toolssndfile-utilstdc++-docstsanvirt-ssh-proxymingw-binutils-genericod_mdsecurity -mlogcpg123-plugins-pulseaudiooci-seccomp-bpf-hookpenssl-libsrc-compilersbuild-composer-dnf-jsonpcp-export-pcp2openmetricspmda-uwsgierl-BCyrusDevel-PeekynaLoaderErrnoFCGIcntlile-DosGlobGDBM_FileHash-Util-FieldHashI18N-LanginfoONDBM_FileODBM_FilepcodePOSIXSys-Guestfs HostnameTime-Pieceinterpreterlibmrophsignki-symkeytoolsmix-toolsodman-catatonitstfix-cdbldap mdbmysqlpcre erl-scripts gsqlsqlitegis-clientdocsupgrade tilsython3-brotlilasso ibguestfs mount xmltbb.11-cryptographyqatzip-libst5-qt3d-examplesrearpm-buildplugin-fapolicyd ima syslogtemd-inhibitust-analysis zerdoctoolsetfmtsocatwtpm-libstoolsystem-reinstall-bootcd-boot-unsignedtangbb-doccpdumpexlive-bibtexdvipdfmx ng s svgmfontwaregsftopkkpathsealuahbtex texmakeindex etafont post fwarepdftextex 4htxdvi etexracker-minersudisks2-iscsilsm vm2nbound-dracutsbguard-dbus notifier toolsuiddv8-13.6-develalkey-develirt-v2vsftpdwgetxz-lzma-compatyelpzlib-devel0.02-481.el94-481.el96-481.el976-461.el913-481.el95.2-160.el9_0 2.el9_4 3.el9_52.9-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b160.el9_02.el9_43.el9_51.3-143.module_el9.3.0+60+5ebc989a 4.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b19-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791665-481.el93.0-2.module_el9.4.0+102+68a938531-3.module_el9.4.0+115+226a984b5.module_el9.7.0+193+5817916641.2-3.el9_7.14-481.el960.800-481.el96-481.el97-481.el975-481.el98-5.el9_41.0.0-9.el9_71-481.el94-481.el98-481.el91-481.el9.3-13.el9_64-6.el90-481.el90.600-481.el91.0-2.module_el9.4.0+102+68a938533.1-3.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791667-481.el92.0-160.el9_01-162.el9_43.el9_51-481.el95-481.el96-481.el9.12-2.el9 _5.125.el9_7.18-2.el9_5.19-1.el9_7.13.5-160.el9_02.el9_43.el9_55-481.el94.0-160.el9_02.el9_43.el9_51-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b103-481.el95.6-2.el91-481.el96-481.el99-481.el97044-14.1.el9_53.0.3-160.el9_0 2.el9_4 3.el9_56-143.module_el9.3.0+60+5ebc989a 4.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b11.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+58179166:0.08-481.el921-481.el911.6.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e2.0.1-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b19-1.el9_020-1.module_el9.1.0+16+91bc168f2.el9_13-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791663-481.el94-481.el911.3-5.el96.el97.el9_58.el9_53-481.el94.1-2.el92.33-160.el9_0 2.el9_4 3.el9_59-3.el93.26-143.module_el9.3.0+60+5ebc989a7-144.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b14-481.el941-481.el95.16-3.module_el9.4.0+115+226a984b22-5.module_el9.7.0+193+581791669-2.module_el9.4.0+102+68a9385385-481.el9021.06-6.module_el9.7.0+198+8bf605ba209+ecf6523e21207gitfff6d81270b5-9.el9_231122-6.el940524-6.el9_51.2.3-7.el93.1.1-11.el9.alma.14.4-4.el9_6.3.alma.13.0.3-3.module_el9.7.0+209+ecf6523e5-481.el92.3-18.el920.el9_5.15-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b160.el9_02.el9_43.el9_56-2.module_el9.4.0+102+68a938533.6-3.module_el9.4.0+115+226a984b7-160.el9_02.el9_43.el9_54.4-5.module_el9.7.0+193+581791665.3-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b16.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791664.6-481.el92.2.18-6.el9_127-1.el98-1.el9_35.14.2-160.el9_0 2.el9_4 3.el9_55.0-143.module_el9.3.0+60+5ebc989a 4.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b120.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+5817916639-16.el96.3.3-160.el9_04.1-162.el9_4 3.el9_54.0-143.module_el9.3.0+60+5ebc989a1-9.el9_1.1-144.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b16.3.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791668.2.2-3.el9_4.15.el9_6bcelgdb-docnome-classic-sessionshell-extension-apps-menuuto-move-windowsclassification-bannerommonustom-menudash-to-dockpanelesktop-iconsrive-menugesture-inhibitorheads-up-displaylaunch-new-instancenative-window-placementpanel-favoriteslaces-menuscreenshot-window-sizerystemMonitortop-iconsupdates-dialogser-themewindow-listsNavigatororkspace-indicatoro-rpm-templatessrpm-macroslibguestfs-bash-completion inspect-iconsncurses-termosbuild-depsolve-dnfluks2 vm2ostreeselinuxperl-App-cpanminusttribute-HandlersutoLoader SplitBenchmarkCPANlass-Structonfig-ExtensionsDBM_Filterevel-SelfStubberirHandleumpvalueEnglishxtUtils-ConstantEmbedMiniperlFile-Basename Compare py Find stat Cache HandlendBinGetopt-StdHTTP-TinyI18N-Collate LangTagsPC-Open3Locale-Maketext-SimpleMath-Complexemoizeodule-LoadedNEXTetPod-Functions HtmlSafeearch-DictlectSaverfLoaderymbolTerm-Complete ReadLinestxt-Abbrevhread -Semaphoreie-File MemoizemeUnicode-UCDser-pwentautousebaselibdebuggerprecateiagnosticsocencoding-warningsfieldsletestiflessibnetcfgocalemacroseta-notationopenverload ingsigtraportubsutilsvarsmsishki-acmebase-javacajackson-annotations core jaxrs-json-providerproviders module-jaxb-annotationskraserverython3-bccfile-magickdcproxylouismakoosbuildpip ki.11-PyMySQL+rsa pip-wheel 2-PyMySQL+rsa wheelrpm-apidocscronsync-rrsyncust-debugger-commongdblldbsrctd-static-wasm32-unknown-unknownwasisystemd-ukifytexlive-adjustbox e lgorithms phalph mscls fonts math nyfontsize size ppendix rabxetex phic tbegshi tachfile2 veryend uxhook vantgar wesomeboxbabel -english bib se eamer ra ton ibtopic di gfoot intcalc tset ookmanrk tabs reakurl qncapt-of ion rlisle tchfile hangebarpage rter ngcntr ite jk lasspack m -lgc super ap extra ns ollectboxion-basicfontsrecommendedhtmlxmllatexrecommendedxetex orprofiles tbl ntext urier rop squotes tablestack urrfiledatetime ehyphec epic nctex umitem viron psf topdf-pkg qparbox so-pic tex -pkg cmds oc olbox uenc ler ro sym xtsizesfancybox hdr ref vrb ilecontents hook nstrut x2col latvian loat mtcount ncychap ontawesome book s-tlwg pec wrap otmisc notehyper p l ramedgaruda-c90 eometry ttitlestring lyphlist raphics-cfgdef fext filehanging elvetic obsub logo ycolor perref h-utf8 en-baseatexifmtarg oddpage platform tex mport ndex fwarerr tcalcjadetex knapltxkastrup erkis nuth-libocal oma-script vdefinekeys options setkeysl3backend experimental kernel packages astpage tex -fonts 2man bug config etltxmacro trine inegoal no stings ofitems m -math tabptch xcmds misc ua-alt-getopt latex-math ibs otfload tex85base warpmakecmds nfnt-font rginnote vosym thpazo spec tools dwtools emoir talogo flogo-font nfss icrotype nitoc nsymbol odes parhack topdf s ultido rownatbib cctools ntrsbk eedspace wfloat unicodechar orasi-c90 toccite tgclassoberdiek solete verpicpalatino ralist lel skip ssivetex dfcolmk escape lscape pages texcmds gf hilokalia laceins in olyglossia werdot reprint sfrag latex nfss picture t-3d arrow blur coil eps fill grad math node plot slpe text ools ree ricks-add text xfontsqstestragged2e cs ealscripts fcount runfilecheck sfssansmathaccent uerj cheme-basic ection sty minar pnum tspace howexpl oul tackengine maryrd ringenc ubfigure vn-prov ymbolt2 abu lary ex-gyre-math ini-files live-common-docdocindexenmsg-translationsscripts-extra.infra tcase pos hreeparttable umbpdf imes pa tlesec ing ocloft ols ranslator imspaces xfonts ype1cm htmlucharcatlasses s hc lem nderscore icode-datamath quecounter sugar pdmap-map quote rl topiavarwidthwadalab s y -type1 sym rapfigxcolor ecjk olor yr index persian search tex-itranspstrickstibetan config fontinfo ifthen keyval ltxtra mltexconfig string tab unicodezapfchan ding refuned-gtkppdrofiles-atomicmssqloraclepostgresqlspectrumscaleutilsusbguard-selinuxvirt-v2v-bash-completionwin-regxdg-utils1.2424901002022120713184520020230413133347537 511122142 623091417 802112332 927094557 1019054835 261116023002023122112104840124164610 227081546 402085113 114627 906462740020240403183139 510175312 6053207 60610363063337 826124927 8134336 9130124 903074554 1909074450020241004144219 204144523 6140523833 1206590850127065635 214043037 21080435 328124628928 42819310660020250513150515837 4095852 604050441617 729092450 91714314070020251211084025 509390660217131521patch:ALBA-2022:82565:20841SA-2022:49405242495276348252769570916366799904428600343157657422435852185905602103470017638389549136399700713207117828831482369950458967870898003811225476278708906810012263951629472078192126502637919317405361844314449356180637438329065803:00052177194202108253023418218334567894383476608112281024903465134786570106781413376840770592670936701386809798090918207481276125677799320241622346489536789601823933129264057667703841744538788751923327082621633455034531437850245318423325597781567992566171145223923484030576047199158778201325730149504774112629956971634424838955850486971801941436942001424313634345536962532968497081133844953635849679246960771206788912426656324304013663589712805402392093146973482924675081823435942495166970589366315435961779948970732844587253577746550177112547534623456845914:0001102571108415126249656731087463567475335760237057908057114895012637710090218447438447259027025878918586099394950788311112232193842509301494127869503091034764273686285935012330766889175089818225872990840632033557911926325745675696097080493920481137283694566472688799025830233748536687787944103384763504124895019602456897016167972458798423538389103306739619687175482036730145784239559994002507788316521278312497189422395075002637873836234726495567612676986192835513892231793223463925293383693815928999602014676367984678992457356464510296768137265478358489134679771362046034645750550286799588025379110127214762803744467563617788072693800914359051889937811452283564450867801457890234520043778130617253137140451349501246789687023454138523459605258275:005980146761210308122434774226578667739237919124722351007213648899635379550631676998374862773114033541162374884961992200883100872804475196274683143009304286507860273782935624075130814162036936408276278983500710189239942960861700408879006046861081635639859701818070843778412835587426080971495152758132181521491135237345409895849273050203551883890922683564355456789601311101392558046269370281591626682005111753764056607908653034496387109114221041309235636423480359700293944856919500627689798649931072612344406531566173144571373833455259374025169229446344360889166978769779370495067767941079183847603578201412356309137879957402491078922356789301235678404586986007289390337958049126364283293333746787660735435582813737916908010618434575062843023627964301244862526634587780978A00256:005212637238473124223745587091236059467197193914234783236108891432393509778140891029738595617903813392042821262470797681699920repokey:type:relidarray numsitory:solvablessolvable:arch buildtime conflicts description evr name patchcategory rovides summary vendorupdate:collection:archevrfilenamenamelistmodule :archcontextnamestreamversionreference:hrefidtitleypeightsseveritytatusmm    [xbybvcwcvwxy**++{=|=@@NN/NNNi2,4 2244}>~>"">>}~5vkwkxjyjii--///'''{g|gAA''W,;;;ttYYVVXXWW{h|h/(((}~BB(($R%Rssrr##&&$$TT%%hh..h//0011yysss<<HH&&LLEE!!DDMM##$$""GGAAII%%KKJJVVCCFFDD]]99**9))UUMM\\ppKKVVooSSYYNNTTQQLLWWnnPP[[XXZZOORR::  ttxxssyyqqzzoo}}rrmmvvww||nn~~{{ppllrruumm664422ll55ttqqpp33ssoonnoo                    88II@@??bb``ZZddVVUU^^[[QQTT\\hhccRR__WWYY]]ffeeSSXXaagg!!"",,xxvvww  ;;!!""8877  ::JJ 99uuttutGG..--ff99hh77223311442143]]ZZ\\YY[[||00==WWYYZZuu4455EE22339988''&&((mm$$%%QQgg++889989mm99mbbb          9988HH222KK~~kkiihhjjggff  >..--AAjjgggbbb00ccaaaddcd  hhgggh777**))++((\\^^ddbb__``aaccoo}}\\//,,--UUVVXXZZWWYYW   333\\==GG99??AAEECC;;22GG44335566<<<44ppp<<&&$$fff%%XX//GGHH66''iiPP<<\\vvYYOOSS  ::JJ||))NN~~""ddQQ&&__aaDDpp**zzVV33UUyy77,,gg@@QQ22bbMM00nnll99    ss>>!!^^NN((rrttjjhh..kkmm``  MM  eecc11oo44BBww  }}OO55PP]]qq??FFEE##;;ffKKZZWWxx$$88--%%AAJJKKII[[LLuuLLTTRR==CC{{++nn%%&&ooo33666mmnnmn22TT2FFCCBBEEDDLLKKMMNNQQXX//00/RR0kkff~~oommjjhhii}}nnnmllggflighkjoSS(($$__''%%##&&""HHxxyy{{zz554445aaffddggee__cc``bb2266551133dd44QQ220011//<<55wwZZZ[[[??^^ppVVV^??^^rrryybbaazzb{{accc333''==RR((''%%''))&&(($$$$UUUjj```iiaaaee  e            \\\~~4433||aa{{}}a>>==??<<@@222--EEDDEDHHIIGG664488==7755=]]]AA==??>>BBHH@@||JJ22kkffhheeiijjjllkheliggfg[[]]\\^^===::8899;;<<[[\\\[444,,CCC77EEWWFFW\>>>AAAXXGGX000((''('RRQQRQ__TTTyyvvzz{{xx||uuww}}@@BB::<<FF>>HHDDXXWWWXYYY~~vv``xxzz`yyww11CC1))vvww5k6kccckkk!!  YYXXqqXYPP7766Puu++))**``FFF..ZZ[[YY[Y[[Z11gg``1  ((ss%%bbxxmmjj[[\\NN``  ..,,&&  }}qq]]OOPP**ee11wwUUooWWgg  ]MM  YY__rruuRRaa_^^yyZZcc$$))vvkkTTiiSS]]^^##""__  --VV``nn!!ll''ddtt  XX{{~~hhff`^||QQzz++ppNNOOONMMTTVVPPJJCCUUVFFGGNNHHWWUUUBB@@VVDDIIRROO??KKLLSSII""##qq22   ||;;;[[ZZvv PPqqqiP:::uu//""KKKTTSST;;S--}}}~~~66aa6``11LLMMML<<<..ee.ff---,,  ++11AA::   99aadd__ccbb^^ee``]]88777..--==>>**""%%((++$$))##!!  ''&&^^^34__ooiimmhhllnnjjkkrr##88ii8ccppddcdLLTT$$$RR%%!!PPSSQQ%VV  ##UU UU#""WW!"IIGGHHKKFFLLEEJJHH::BB??55H>>5B:6666@@BB006##GG;;;++AA000G//zz{{]}~!!5l6lxxuuII  !!I""kkETFTKKGHI_J_KL^^M_N_]]Tcceebbddaattss@@(h)h&h'hh\\\]]tt]///ll''))**bbaaCCDD33``__`_  //)),,)++,***+   00??iii//**   EE5544hh##,,$$OO%%%  ++--+cc..-.""))#!!)&&&$", !**''PP*((('MMOONN@@@hhjjggiiff,,ccddYYZZXX&&&kk11''??JJ1?nnJkk((OBPBQBRBXBYBaB]d^d_d`d abcdefghij klmno pEqErEsEtEuEvEwExE xmymzm{m|m }R~RRRBRRRRRRRRRR R R R R RRRRRRRRRRRRRRRRRRR R!R"R#R$R % & ' ( ) *  +9,9-9.9/90919 2T3T4T5T6T7T8T9T:T;TT?T@TATBTCTDTETFTGTHTITJTKTLTMTNTOTPTQTRTSTTTUTVTWTXTYTZT[T \] ^}_} `LaLbLcLdLeLfLgLhLiLjLkLlLmLnLoLpLqLrLsLtLuLvLwLxLyLzL{L|L}L~LLLLLLLLLLL L L L L L :bbbbbbbbbbbbbbbbbbb b!b"b#b$b%b&b'b(b)b;b*b+b ,{-{ .M/M0M1M2M3M4M5M6M7M8M9M:M;MM?M@MAMBMCMDMEMFMGMHMIMJMKMLMMMNMOMPMQMRMSMTMUMVMWMXMYMZM[M \] d^d_dddd`dadbdcd d;e;f;g;h;i;j;k;l;m;n;o;p;q;r;s;t;u;v;w;x;y;z;{;|;};~;;;;;;;;;;; ; ; ; ; ;;;;;;;;; rFsFtFuFvFwFxFpFqF  !"#$%&'()*+,-./01 SS}S~SSSSSS!S"SSSSSSSSSSS S SSSBS SSSSSS S SSSS SSS#S$S 2|3|4m5m6|7|8|9|:|;||?|@mAmBmCmD|E|F|G| H.I.J.K.L.M.N.O.P.Q.R.! \^]^" \^]^# SATAUAVAWAXAYAZA[A$ ejfjijjjcjdjajbj% @A>}?}8}9}D}E}:};}BC<=6}7}F}G}2}3}& \])6^_+&2`'<a7b7cd(7#]efgh*km!ii j@k@$y"E%Ol' mtntotptqtrtsttt( u|v|w{x{y{z{{{|{}{N{) ~* --- - - ------+ ^^^^^^^^^ ^ ^ ^, \>]>- \=]=.  D D*DDDDDDD7DDD+D/ xy0 ^~_~1 \\\\\\\\\\ \2 D{E{BC<=2{3{8{9{F{G{@A:{;{6{7{>{?{3 N|w|x|{|||y|z|}|u}v}4 PQ45XY67RS<=HILM235 ;,$,%,,,,,,,,,:,6 fvgvjvkvvvwvvv v vpvqv`vavxvyv v v7 \?]?8 \v]v9 \v]v: Y^T^S^W^X^; !!"!<    = #$j%&> 'B(B)B*B? +o,o@ -L.LA /#0#1#2#3#4#5#6#g#7#8#B 9?:?;?@?@@@A@B@C@D@E@F@G@H@I@J@x@w@D K)L)Y)E NUOUZU[U>U?UJUKUBUCU6U7UDUEU4U5UVUWU8U9UFUGU2U3URUSUPUQU:U;UHUIU@UAU^?^Y @AZ BC[ DjEjFj\ GyHyIyJyKyLyMyNyOyPyQyRySyTy] UlVlplWlXl^ Y3Z3[3\3]3^3_ <<<<r<s<j<k<<<<<n<o<l<m<<<f<g<|<}<h<i<~<< < <p<q<z<{<x<y<< <v<w<<<t<u<<<<< < <d<e<` _;`;a;a blcldlelflglhlilb jrkrc lfmfnfofpfqfrfsftfufvfwfd x)y)e zX{Xf |?}?g ~h .RRRRRRRi    j [-k NkIkHkl      m 888n #$j%&o }}}}}}p  !q /056g7834"#12r $~%~D~E~<=&'(~)~*~+~,~-~.~/~012~3~s Z456789:;<=>?t j&%#$u \A]Av \@]@wy@ABx CDEFGy N? uvH?I?{?|?y?z?z \B]B{ \C]C| [S} ______ _ __ ___~ : ; > ? 8 9 BFCFF G 2 3 @FAF6 7  4 5 X Y 2 3 P Q R S 6 7 L M H I < =  jwkwpwqw`wawxwywvwwwww w w w wfwgw ----$-%-----:-;- J8K8 \D]D ^4Z4[4\4Y4]4 L3M3N3O3P3Q3R3W3S3T3 UVWXYZ"[\]^'_`abcdefgh,ijkl(mnop.*qrstuvwx+yz{|F}~     / -!"#$%&'()*+,-./0123456789:;<=>&?@ABCDEFGHIJKLMNOPQRSTUVWXYZ!0[\ ]^_`abcdefghij%klmnopqrstuvwxyz{|}~#      !"#$)D%&'()*+,-./012345678$9:;<=>?@ABCDEFGHIJKL1MNOPQRESTUVWX YZ[\]^_`abcd XB N}}}x} y}z}w}{}|}u~v~ ^Q_QeQfQQ`QaQbQcQQQQ HlIlNl ))))) )))) ) ) g<h<i<j<k<l<m< nsospsqsrs z=y=x= sPtPuP vwxyz{ |}~  \E]E \F]F B I < :     ; =   A   >   J @  #PPPPP%PPPPP$P kk\k]k \k]k  `` ``` ``````` W_X_Y_T_S_ ******* * * ** %&j#$ ptotqtrtnt +p,p pqturs t=u=|=}=l=m=z={===== = =p=q===~==d=e== =======v=w===f=g= = =x=y=h=i=r=s===j=k=n=o=! "B#B0BBB$B%BBB1B B!B&B'B*B+B()" KK#  !"#$$ ]] ]]]]]]]]]% ww\w]w& %c&c'+(+)c*c+c,c-c.c/c0c1c2c3c4c5c6c7c8c9c:c;c+?+@cAcB+CcDcEcFc' \G]G(  + +++++ +++++) QQ#QQQQQ$QQQ%Q* 0CCC1C"C#C$C%CCC*C+C C!C()GH&C'C+ IqJqKqLqMqNqOqPqQqRqSqTqUqVqWqXq, YZ- HmImNm. ,,, ,,,,,, , ,/ \t]ttt0 \;];1 X Y R S L M 2 3 P Q H I 4 5 < = 6 7 2 jxkx`xaxxxvxwxpxqx x x x xfxgxxxyx3 :...$.%.......;.4  aa aaaaaaaaa a5 [>\>]>^>_>`>>a>b>6 czdzezfzgzhz7      8 -ijklmnopqr,/stuvwxyz.9 :\;\H\I\J\K\P\Q\<\=\D\E\4\5\T\U\X\Y\V\W\F\G\6\7\@\A\B\C\R\S\Z\[\L\M\2\3\: %; {x|x}x~xxxxxxxxxxx< ,-= |i}i>   ?   @ @yAyWyA  nn-M.MnnnnnnB          C 66D  S!SE 6_7_8_9_F pgqgngogrgsgvgwglgmgtgugG x*y*H     I bbbbbb bbb bb bJ OOOOOO#O$OOO%OK ^VL JzKzNzOzGzHzLzMzQzRzTzPzSzIzM "y#y$y%y&y'yN +E7EEE*EEEEEEE E EO 7$8$1$2$3$4$/$0$g$5$6$P 9$:$;$<$Q :[([)[9[>[=[e[;[<[8[R bS < : ; @ B   =   >   J I   A   T * + , - . / 0 1 U ^5Z5]5\5[5Y5V 2=3=W a?b?]?^??_?`?[?\?X 4d5dY 6666666Z 6g7g8g9g:g[ XC\  A AdAeA|A}AhAiAxAyAAAfAgAAAAAAArAsAAA A AjAkApAqAlAmAA AzA{AAAAAnAoA~AAtAuAAAvAwA] ;rr?r@rArBrCrDrErFrGrHrIrJrKr^ LMN_ OP   ` HnInNna Q4R4b      c WdXdYdTdSdd 'F(Fe @ABf +q,qg qurusutuoupumunuh a@b@]@^@_@`@@[@\@i SYTYj UVW X k HoIoNol cc ccccccc c ccm uvN@y@z@{@|@H@I@n w~x~uv{~|~y~z~}~N~o uu\u]up Y)Z)[)\)])^)_)`)a)b)c)d)e)f)g)h)i)j)k)l)m)q SZTZr \<]<s   A @ ; :     >   B <   I J = t bece`eaee^e_eeeefeu nVoVpVqVrVv ddddddd ddd d dw stux NAyAzA{A|AuvHAIAy 67FGBGCG>?89@GAG23:;z vAwAxAyAzA{A|A}A~AA{ {|wx}uvNyz| \f]f} \f]fff~ ,-./23&'<=$%()DE01*+ %&j#$ #    0  (   O *  '   z 7 } n  _   V _ {  p > 0 s   o o ~ D   1   | B q  -  x f 5 R 8   B    + { ! m H / .  v M   y C   8   I V J ] Z f m a E . K    Q > : ? ) & y + L  S v M    ` v ' < P <  ! @ A 7 h @   N =  Q ? \ G N 0  = d  ^   u ?  6   B I :  " } O `    X C Z ^ G j Y  / r w 5 $ D W    ) b % 4   N   b  s ) 2 i   H 2 h s 6    g   K @ 4  | H y p [ z x (    { R 5 * 1 $   U   U c  %  # j " $ } 3 A  6 ; ( a &  M > w =    I  . t  G  9 l  2     P d  i :   w u n  3 <  A /   4 L 9  X r -   t   k  E  7 , K [ F T F  "   ~   1     g u \ k %  ! "  q ' C c - ~ e J +   D L # $  e % & ' ( ! ,  T | Y #  t  W &  ; ) * z  x F ; ] , E 3 9 *    8   S  l   J  [6\6^6Z6Y6]6 OrPrUrVrSrTrMrNrQrRrWrXrIrJrKrLr iPjPoPpPPP_P`PPPPPuPvPPPaPbPsPtPmPnPePfPwPxPcPdPyPzPqPrPPP}P~P]P^PgPhPkPlP{P|P Y`T`S`W`X`     O P        RR`RaRbRcR^R_ReRfRRR ghcdefijab ,- 01<=*+,-./$%&'()23DE :;89>?67FGBHCH@HAH23 \g]g gg\g]g FF7FFF+F F F*FFFFF `yay y yvywyxyyyyyfygy y ypyqyjyky H I R S P Q 4 5 < = X Y 6 7 L M 2 3  //;/$/%/////:/// ee eee eeeee ee       +o,oOoPo-o.oIoJoWoXoKoLoUoVo/o0o1o2o3o4o5o6oQoRoSoToioMoNo u v NB{B|BHBIByBzB {|uv}xwNyz uQtQsQ Y{Z{ NpIpHp OP    789 W X UV hh\h]h \h]h g=h=i=j=k=l=m= :a;a~o~?~@~A~B~C~D~q~n~E~F~m~G~H~I~J~K~L~M~l~N~O~p~! $%,-23*+01DE./()<=&'" >?@IAIBICI23:;89FG67# PQRSTUVWXY2Z[\$ \i]i% \i]iii& 2(1(0('           O P ( ]>^>_>) :;89<=67Z45>?* `abcdefg+ B]C]Z][]<]=]R]S]F]G]2]3]H]I]6]7]J]K]V]W]P]Q]L]M]T]U]X]Y]4]5]@]A]:];]D]E], 8967>?@JAJFGBJCJ23:;- DE./*+23&'<=$%01,-(). Wz@zAz/ \j]jjj0 h{d{e{f{c{g{1 \j]j2 efcdabijgh3 u v {C|CyCzCNCHCIC4 \{]{{{5 \O]O6 h:i:j:k:C:l:m:n:o:p:7 B~B{B|B}BxByBzBvBwB8 q"r"s"t"u"v"w"x""y"z"{"|"}"9 j&%#$: y>z>w>x>{>|>uvN>; ~---< $+%+++"+#+++3242++++,+-+++ +!+0+1+&+'+= +G7G*GGGGG G GGGGG> BKCK:;@KAK>?FG892367? d?????????e? ? ? ? ? ??@ 00;00000$0%0:000A SbScS`SaSSeSfS^S_SSSB jzkzzzxzyz`zaz z zvzwzpzqz z zfzgzC *+<=,-0123()&'DE./$%D 2 3 P Q H I X Y L M 4 5 < = 6 7 R S E HqIqNqF N}x{|wuvyzG {D|Du v yDzDNDHDIDH ,-I EFGCDJ j>k>>>>>>>x>y>h>i>r>s>p>q>>>|>}>~>>>> > >n>o>>>v>w>d>e> > >z>{>>>f>g>> >>>l>m>t>u>K w;w@w=wL 6]7]8]9]M  jjjjjj j j j jdjejjjjjjjN   O ||\|]|P \P]PQ @LAL67>?FG2389:;BLCLR *+0123$%./,-&'DE()<=Syw#x#q#r#}#u#v##s#t#{#|#y#z#T ^_U edV 3~~W thuhnhohvhwhlhmhphqhrhshX x,y,Y    Z 8`9`6`7`[ 9%:%;%<%\ ] PXQXVXWX4X5X6X7X:X;X@XAXHXIXDXEXXXLXMXTXUXFXGX5q5r5a5b555?5@5s5t555k5l5y5z5A5B5C5D5{5|555m5n555f ,-g EFGHIJh KLMi Wx@xAxj :h9h6h7h8hk     l 5%6%g%7%8%3%4%/%0%1%2%m NLOLPLQLRLn S`T`o C~CvCwC}CzCyC{C|CxCp YZqyNuUuVuWuXuYuZu[u\u]ur +,;<ab9:ef{|mn[\abst34?@AB-st^_UV!"WX_`yz=>UV56D_`op78F]^ij}~cd%&  uvgh0 QR'($klMNmn=>E!WX*.'(ij/_`%)*-.YZGH;<+,/0-.ab12'wx QR#$9:#$EFqrcd]^  [\ 1  OPIJwx   ]^ef cdSTYZ#)56AB!"IJ(CD{|%&34gh?@MNuvkl)*YZGH78/0KL&OP[\op"UV,STKLCDEF+qr}~ yzWX12s `sasbscs,sdsesfst gthtu , - . / v  ffff ffff ffffw x 4y q$r$$u$v$s$t$w$x$y$z${$|$}$z STTT{ ~77i7| j0k0l0}  T!T~ :xx@x ^.Z.].\.[.Y. m6n6o6 p9q9r9 TUPQVWRS[\XY2Z stuvw. uts xyz j#$&% {|}~              HrIrNr `( yggggggg BA@ QQ Q Q Q }%x%u%v%{%|%w%q%r%s%t%%y%z%                                 HsIsNs ^_ <= !"#$%&'()*+DE,- 23()$%*+0T1T,-&T'T./ :;89@MAMBMCM67FG>?23 efcdghabij ^_ \Q]Q \}]}}} .~/~0~1~2~3~4<5<gg ggggg gggg guRtRsRqrij.op-mnstuvwxyzkl,/6s7s8s9s:s;s ;&<&9&:&!3f4f"    #/&0&5&6&1&2&7&8&3&4&g&$4f5f%QsRsWsXsUsVsIsJsSsTsKsLsOsPsMsNs&QpRp3p4p5p6pMpNpUpVpOpPp-p.p/p0pIpJpSpTpWpXp1p2pipKpLp+p,p'<%=%>%(\n]n)$R#RRRRRRRRR%R*\n]nnn+^_,Ad4dB,>,Cd2d7d8dFd,dDd&d@d?@NAN23BNCNFG:;1  2;111$1%1:11111113f{g{ { {{{ { {x{y{j{k{`{a{p{q{v{w{467PQ23LM45XYRSHI<=5SaTaYaWaXa6hBiBnBoB B BpBqBB B~BBtBuBBBlBmB B BBB|B}BvBwBBBdBeBBBBBfBgBjBkBrBsBBBxByBBBzB{BBB7IlJlKlLlMlNlilOlPlQlRlSlTlUljl8xyzwv{9#$j%&:>y\o]o?oo\o]o@3_4_AWwXwUwVwYwB7e8eFe,e;e-De)e*e1e2e3e4e5e6eAeCe+e/e0eEe-e'-B-C0V1V&V'V$%23./,-*+()DBOCO23@OAO>?67FG:;89EJ6K6F"#<=DE&'*+()$% !,-G1q2qQqRqUqVq3q4qMqNqWqXq5q6qOqPqIqJq/q0qKqLqiqSqTq-q.q+q,qHMtNtStTtWtXtKtLtItJtOtPtQtRtUtVtIpp\p]pJ\p]pK7777777L%VVVVVVVVV#V$VMxNVZWZXZYZZZO4 4 444444444[4\4O4P4 44PVSTUOPQRQlllll ll ll lllRguhuS\Z]ZT\]U3V3k4kMkNkSkTk-k.kik5k6k1k2kQkRk+k,k/k0kKkLkWkXkOkPkIkJkUkVkWOPUV56iSTQxRx3x4xWxXx/0KxLx+x,xMxNx1x2x-x.xIJXMvNvSvTvUvVvKvLvQvRvIvJvWvXvOvPvY^_+ `]!kghjBkB\* ${e f  #_"Gko%Q'>cda9b9(9)8&4liZcYbY^M_M#dMeMiMdMMcM+!r\M]M*g h aYfMgFfF)Ahfkf(=jf%UeFiHjH';lM"JkH]M$~`Ml  &1[( )  & ' \O5P55 5 555555555 55[5\5]EE E ErEsE E EEEdEeEfEgEE ExEyEvEwEEEEE|E}EEEEEnEoEhEiEtEuElEmEjEkEpEqE~EEEEEEzE{E^vCwCpCqCdCeC|C}CzC{CfCgCCCCClCmCCChCiCxCyC C CCC~CCCCjCkCrCsCnCoCCCC CCCtCuCCC C C_mSnSoSpSqSrSsStSuSvS`#%$%%%&%j%%azKyKxK{K|KK~K}KvKwKb$o#o"o%o&o'ocwoxoyozo{o|o}o~od3eIef:::::::gVYWYZYXYYYhHtItNtiW X UVjnnnnenfn`nanbncnk@z;zz?z=z:zl89>?6745:;Z<=mqvrvovpvmvnvsvtvnYZo!!p666[6\6 6 6 66O6P6666666q9':';'<'r    s&W'W230W1W,-./*+()$%t()"#*o+o !  -/0.opstwx12mn"^_789:WX#E[\IJ)*=>34_`WXyzcdAB!ST  &1gh$gh%&ab{|ab34,OPQR)MN}~GH12ij;<_`YZcd_`+,Dij  uvUVcd56wxGHuv%&KLOP{|STEF]^ yz;</0 efWX[\CDEF#$0IJ KL+,?@ABUV9:MN#$st(7856[\ mnkl')*?@CD'(-.YZF*qr]^-.!"YZopxXDyuvyz}x{|Nwzoboco`oaoeofoooo{~~\~]~|\R]R},-~|k}kHEIEyEzENE{E|Eunvnz?y?x?jeke!pL + ^L_L`L]L)?aXbX&/%R(;]LgEfE* fLeL#heeE\LlLg h dLiGjG"H$|cLdL'9cXiLl kGNI}yIzIHIII{I|I}uovoEFGCD8888888+H7HHHHH*HHHII H HHH;222$2%22222:222 | |p|q|f|g|||x|y|v|w|`|a| | |j|k|RSLM45XY6723<=HIPQ    GH ______ _____ xx\x]x \L]Lbpcppepfppp`pappSUTU    2>3> ddddddhh hhhhhhhh h hklyzwx-uvqr.op/,ijstmnXYYYHYIYVYWYFYGYDYEY6Y7YBYCYZY[YTYUY?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~D      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz'{|}~("` E`QBzAjMn o2T/lzz`W?4H1zz99 $ $-` 1 14 n$a )S 6r8pz=5tCa#<<L+\Dz9v<@K3Ia54X"%&pJ 5(b\\<\azz*s;taz>5E\U))L\75.,5 5!U"U#,$,,sK4j%&34!M:2Gs'U(Uw)2*2J+z,z'`0Au1o-.F</000NR4N r1-2-)?/@/q/r///{/|/e/f/;////o/p///3/4/A/B/}/~///m/n/C/D/i/j/c/d/g/h/a/b/k/l/y/z/s/t/_/`/w/x/u/v/]/^/*9(:(;(<(+ 2 2 2 2,5678-&.4g5g/zz,z-z(zz)z"z#z/zzzz.zz*z&z%zz z!zJz+z'z$z0"G#G$G%G0GGG*G+G() G!G&G'GGG1G1<&=&>&2Y/Z/[/\/]/^/3jsks4vDwDD~D}DxDyD{D|DzD5 $"#!6%TTT#TTTTT$TTT7{n|nynznwnxn}n~n8'n&n%n$n#n"n99N:N:F;;<<=>?@AB=G H >CMDMEMFMGM?H*I*J"K"@O&P&&&&& &&&& & &&[&\&&&A !BRR R R RCXXYXZXWXVXDWbXbYbTbSbEqurupuounuFzyxG[NH5K6K7K8K1K2KgK/K0KI;)<)9):)J 3 3 3 3KJJIIII7I+III I I*IIILfOM}-~-=->-?-@-q-r---w-x-y-z-k-l-{-|---A-B-c-d-;-<---m-n-3-4-_-`-i-j-o-p---e-f-C-D-]-^-g-h-a-b-s-t-u-v---N`tatetfttttbtcttOG H PSWTWQmn?@yZqrab/012uvmn !"IJ34ghMN%&STOP_`3478lwxqrWXYyzMN)*56UVWXklghefYZ/0ijQRCD-.wxcdGH'(kF =>9:#$]^OPKL  )*GH+,ef|}+,uv5612ST[\IJz{AB78=>;<_`stijABab-.CDop9:stcdE~[\opDKLQR?@EFUV]^  ;<R,[-[L[M[S|l}lT`````` `````UN%O%VUUUU%U$U#UUUUUWuStSsSX2C3CY''''' ' ' ''['\'''O'P'''ZHFIFNF{F|FupvpyFzF[*p+p   !,p-p$%{={:{A{cn5k5l5m5j5C5h5i5o5p5d))O)P)[)\) ) )))))) ))))e(<)@$}<jSkSk#j# "I#%Ti<d<gh* ]<^<_<':\<]<&0a;b;!qe"f"f<e<+ fjgkg+fNeN !'FS*T*k^j^eIfIU*^N_N%VcNdN$gh(>lN&5!Y]NNdN\N]NgI# cZbZ`N)Bi^hgl*iN"KaZg?0@0G0H000E0F000A0B000C0D000hij-.wxuvmnqrkl/opyz,stiWqXqYqZq[qj5L6L1L2LgL7L8L/L0Lk 4 4 4 4l\w]wm4h5hno]^cd12[\"cdstghYZ-DWX34 GH_`9:AB]^efAB  .gh=> op'UV/0GHqr(/0=>?@MN%&^_OPWXabIJ[\+,'(78mnklwx}~IJ1)*opabYZ-.ST_`MNST%CD  qrst%&#$FUV#$/UV$0 ijOPuv{|&YZ[\'(!"?@-.QR#347812]^ }~KL56klij9:)*;<uvef EFcd;<  QRCDKLEab,mn! WX+,EF!"yzwx*_`){|56+yz  ppnUnVnWnXnqkn!j'=`]efl_*$za8b8 )7%PghjAkAcd+"F^#^&3\i(8rutss#B!B^B_Bt\y]yyyu,t`tatbtctdtetftvw&x&y&z&s&t&q&r&&u&v&}&{&|&w\M]MxSVTVy{E|EzEyEE~E}EvEwExEz&j#$%{I >     < @   ; J B   = : A   |;\:\e\>\8\(\)\=\9\<\}qqbqcqqqeqfq`qaq~?BPCP    DE() !&'56-. KL[\_` #$%&[\56abstopGH1EF$yz34-.ij  UV&{|_`[\UVOP;</YZ#ef"(7812klmn }~ab9:%YZQR0=>!",+ij%&STAB'(cdCDCDwx]^WX12 34*KL)*abuvuv?@E^_IJ]^.UV!" cdghwxOP  GHstEF  FST'(#$qr!WXgh'QRYZ?@_`-MN+,efyzmnqr]^MN)*{|  78 /0}~/0AB9:WXopkl;<IJ`2a2b2..C.D._.`.i.j.{.|.y.z.s.t.....u.v...A.B.;.<.w.x...a.b.e.f.k.l.c.d.m.n.g.h.q.r.}.~.?.@.o.p.3.4.=.>.].^.4i5i3a4aF~FzFyF}FvFwF{F|FxFXYRS[\2PQZVWTU% & j # $  ^_,, ,, , ,,O,P,,,,,,,[,\,yy{y|yyyyyyy}y~yyyEE&E'E1E*E+E0EEE"E#E$E%E() E!EWoXopoUoVo JJ J J7JJJHH*J+JJJJJ!ji"zz\z]z#*r+rMN!"WX%&=>CDST,78'( IJyz]^QR )ef (12'(ef# -.34klOP12)*ABqr+,/0abgh/0 56?@WX9:GHAByzKLKLcdabCD78-.mnUV]^+,ij;<YZ-'YZcd/  )**!"[\ab{|_`mn#$E.]^+YZ$wx  EFGHST)<|>|?|@|A|;|=|:|*{K|KNKyKzKHKIKusvs+ .... . .....O.P....[.\.,5u6u1u2uOuPu3u4uKuLuMuNu-u.uUuVuiuSuTuQuRuIuJu/u0uWuXu+u,u//-QuRuKuLuWuXuMuNuOuPuIuJuUuVuSuTu.KrLr1r2rMrNrSrTrOrPr/r0rQrRr..UrVr+r,rIrJr5r6r-r.rWrXrir3r4r/oMpMuMnMvMtMsMqMrMmM0{G|GyGzGNGurvrHGIG1%!&!#!$!!j!2@ A B 3G~GxGyGzG{G|G}GvGwG4cqdqeqfqgqhqiqjq54j5j6\y]y73b4b8 6 6 6 69k%l%:5H6H1H2H/H0HgH7H8H;;+<+9+:+<y'z'q'r'w'x's't''u'v'{'|'}'=bucu,udueufu`uau>.wtsuv?a:b:[:\:]:^:_:`::@fkgkbkckdkekhkikAO/P/ //[/\//////// / ///B\w]wwwC\w]wD.-uvwxmnqrop,stij/yzklEz@y@x@F x!x$x%xSx"x#x&xGWcXcScTcYcHcPdP&6PdPeP]PU+T+ *+i_j_gJfJ(?S+a[b[\P]P# jhkhiP%W$c[k_^P_PeJlPghhh!Z"Ll`PfP'G)CIKLcd/0~AB=>)*12OPefCDOPKLab#$_`WXWXqryzYZ=>56ij56QRstghGH-.qr+,mnIJyST)*QR+,ef|}?@UVEFuvUVgh9:/0DuvopCD[\12  78GHIJ]^[\MN!"mn  ?@ ijMN_`opab]^ABEF9:wx'(YZ34ST-.%&kl;<wx;<klst 78z{34cdJr`rarrerfrrbrcrrK|m}mL,\-\L\M\M00 00 0 000O0P00000[0\00N2D3DO eeeeeePCp>pFpGpKpJp=pApBpDpEp?p@pHpIp;p?89@QAQBQCQ23FG67W !DE*s+s,s-s$%(),],^,i,j,3,4,s,t,},~,,,k,l,,,},~,c,d,a,b,,,?,@,y,z,,,C,D,g,h,,,e,f,{8b9b6b7b|6[7[T[U[B[C[F[G[R[S[P[Q[4[5[@[A[H[I[D[E[V[W[2[3[:[;[X[Y[[[<[=[L[M[Z[[[J[K[}iiiiiiii i ii i~FuuuuuuN{O{S{M{P{G{H{L{Q{R{J{K{I{T{]]]] ] X X X XXXXXXXy^C_C#C!CB!A!@!YeTeWeXeSe%#&###$#j##?@AtupqrsBECEDEEEbvcvfvdvev`vav,v}J~JJvJwJ{J|JxJyJzJsRtRuRnRvRqRrRmRoRpRijyzMNKL  12uvEFmnOP34~opcdefWX#$%&WXQRghefOP=>D34?@FGyZ78klwx_`QR/0lIJAB!"9: ?@)*YZ+,56+,_`56  '([\;<[\mnCDKLqrGH z{EFIJ|}]^HI-.YABUVopCDqrST12kst=>abcduvGH]^)*;<abst/078MNghij-.wx9:UVST/O0O7O8OgO1O2O5O6O qqqqqqmg Id! 9 9 9 9"%$&$j$#$$$$#ZYTUVW[\XRS2PQ$|n}n%LrMr,r-r&@"A"B"'xAyAzA(JKDELM<$=$NOP$Q$R$S$TUV$W$XYZ[\]^$_$`a)zwxyv*\Y]Y+ kkkkk kkkkkk k,\]-bfcfdfef.fghijk/333[3\3 333333O3P3 3 3330^_1..~.277 7777 7 7777O7P777[7\73\]4 mm mmmmmmm mmm5\[][6:c;czz9z:z;z  ?88[8\8 8 888 888O8P88888@FA2E3EB( ) & '  C&7'7757)7(7DkgfjihE./ !"#*+&',-()01$%F$,%,,,0,1, ,!,,,,,3343,,&,',,,,,-,",#,GqrH5N6N1N2NgN7N8N/N0NI : : : :JstuKvv\v]vL#'$'j'%'&''Mv>w>{>|>x>y>>~>z>}>NvVtVqVrVmVnVsVuVoVpVO\v]vPv3w3QJJJ[J\JJJOJPJJ J JJJJJJ J JR7Q8Q/Q0Q1Q2QgQ5Q6QSx[y[T\]UbVcVeVfVV^V_VVV`VaVVVsLtLuLWKKKKKKK[K\KOKPKK K KKKK K KX *Y66;66666:6$6%666Z23PQLMRS45<=HIXY67[  \.uvwts]A~@~:~<~?~=~>~;~^LL[L\LLLOLPLLL L LLLL LLL L_  @;<JB  I=A:> `T ; y z H N W B Q M R O 9 i j J . - F S s t I z { > D | } / @ : C 8 k l m n G ~  o p = E   L ,   u v   A ? K w x <   P V   q r   U a\]b\\]\c33333 3 333dMM MMOMPMMMM MMMM M MMM[M\Mevwz{yxf& ' ( )  g     h;;;;;;;;;;iNMLj\U]UkSTUVbWlsMtMuMmZzYzn999999999 99O9P9[9\9 9 9oNNNNN[N\N N NONPNNNN N NNNNp  qlZr7 7!7"7#7$7%7&7'7(7)7*7+7,7-7.7/707172737475767778797:7;7<7=7>7?7@7A7B7C7D7E7F7G7H7I7J7K7L7M7N7sO6P6Q6R6S6T6U6V6W6!6"6X6Y6Z6[6\6]6^6_6`6a6A6b6c6d6e6f6g6h6i6j6k6l6m6n6o6p6q6>6?6r6s6t6u6v6w6x6y6tSfTfWfXfYfuuNtNsNvzK{K|K}K~KKKKKKKKKKK K K K K KKKKKKKKKKKKKKKKKKK K!K"K#K$K%KwuTtTsTxijy[O\OO O OOOOPOOOOOO O OOOOOz8c9c6c7c{ ss sss sssssss|`WaWbWcWWWWW^W_WeWfW}PPPP P PP P PPOPPPPPP[P\PPP~&D'D(D)D'(**)>;=?<:@A\][Q\QQQ Q QOQPQQQQQ QQQQQQ Q{L|LyLzLNLuuvuHLILNHutvtyHzHHHIH{H|H./\V]VQsRsUsVs1s2s-s.sIsJsSsTsKsLs+s,sOsPsis/s0sWsXs3s4sMsNs5s6sUmVm/m0m5m6mImJmMmNm+m,m3m4mimWmXmKmLmOmPmSmTmQmRm-m.m1m2m KwLwIwJwOwPwQwRwSwTwUwVwWwXwMwNw GH uWnWqWrWvWtWmWsWoWpW }?~?{?|??v?w?x?y?z? R RRR[R\RRRORPRRR R RR RRRR6"7"8"9":";"<"=">"?"@"#($(j((&(%(*I+III I!I0I"I#I()&I'I$I%III1IZ\W\V\X\Y\SOSPSSSSS[S\SSS SSS S S SSSA^B^TTOTPTTT[T\TT TTTTT TTT T TV W R S [ \ P Q X Y 2 Z T U  UUUUUOUPUUUUU U UUUU U[U\U  gR7R8R5R6R1R2R/R0RmOnO.OEOFO-OMONOoOpOQORO_Om"n"q"r"E"F"s"t"o"p"\|]|||bb bbbbbbbbby6z6TOUOw6x6N6H6I6{6|6uxvx\|]| VVOVPV V VVVVVVVVV VVV[V\V :: : ::::[:\:::O:P: ::::!VWXYZ[\]^_"mwnwswtwqwrwowpw#KK7K*K+KKKKK K KKK$WWWWW W[W\WWW W WWW WWWOWPW%E|F||`|a|||G|H|0||1|||C|D|b|c|||?|@|A|B|&X XXXXOXPX X XXXX XXX[X\XXX'G H J F I E (WlXlKlLl-l.l3l4lOlPlil1l2l5l6lQlRl+l,lSlTlIlJlMlNl/l0lUlVl)O P Q R M N U V I J K L S T W X *ghefijcdab+/v0v+v,v1v2vOvPv5v6vSvTv-v.vIvJvKvLvWvXv3v4vUvVvMvNvivQvRv,d(e(-p q t u r s .OYPYYY Y Y YYYYYYY[Y\Y YYYY/tt t tt ttttttt0    ()*+$%,-&'"#  !1TU`aZ[P(Q(XY<(=(^(_(\]R(S(LMJKV(W(DENO2\ ]   3zyx4OZPZZZZZ ZZZ ZZZZ Z ZZZ[Z\Z5\a]a6;7777777$7%777:7745<=PQXYHI67RSLM238  9^1Z1Y1]1\1[1:_;`;;[;\;a;b;];^;;59)99&9'9(9<=O[P[[[[[\[[[[[[ [ [[ [[[ [[>YYYYYY#Y$Y%YYY?----$-%-"-#- -!-&-'-----0-1-3444--,---@3g4gA\\\ \ \\\\\\\ \\\ \O\P\[\\\BZ [ ^ _ V W X Y \ ] C nnnn nn nnnnnnDee eeee[e\ee eeeeeeOePe e eEENFNCNDNGNFgT5T6T/T0T1T2T7T8TG uuuuuu uuuuu uH(:)::&:':5:I}}b}c}C}D}}0}}}}`}a}}1}G}H}?}@}}E}F}A}B}J^_Kvwz{yxLz y x Mr s t u p q NN&O&OP[2\2^2Z2]2Y2Q3h4hR#Z$ZZZZZZZZZ%ZSk g h i f j Tx1y1UtmumrmsmpmqmnmomlmmmvmwmVk l m n o p q r W*LLL L LLL+LLLLL7LXZ![!V!W!X!Y!\!]!^!_!Y\PZSjTjYjWjXj[\ ]   \sptpupvpwp]Y$Z$^1U2UgU/U0U5U6U7U8U_^X_XXXXx(y(bXcXeXfXX`XaX`zY{Y|Y}Yaf f fffff[f\fffOfPfffff f fbWzXzUzVzYzc~uvd = = = =exDyDzDfuOtOsOg]]]]O]P] ] ]] ] ]]]]]][]\]]hnoqrpri vvvv vv vvvvvvj^O^P^^^ ^^ ^ ^^^^^^ ^[^\^^^k}}\}]}lA:>?<=;@mjikicOdO)D"Mia\b\i`j`$`O]Oc\ghk`]OeKfK %X# iO*fOeOgK U,T,S,hi!['H+dO\OlO&:(@lO_O^On,o-oLoMooE#F#q#r#m#n#s#t#o#p#pmPnPMPNP.PQPRPEPFPoPpP-P_Pq:i9i8i6i7ir674589:;>?<=Zs__O_P_[_\______ _ _____ _ _t~IIIIfIgI|I}IIIIIIIIIhIiIIIIII I I IrIsIpIqIzI{IjIkIvIwItIuIdIeI I IlImInIoIIIxIyIuoOpOvOtOmOnOsOqOrOuOv/V0V5V6V7V8V1V2VgVw;0<090:0xOOOOO O Oy%)&)j))#)$)zr:q:p:{U V WX|z y x }\]~wwww w wwwwww w   { {2I3I\}]}0J*J+J()&J'J"J#J$J%JJJ1J J!JJJ#W$WWWWW%WWWWWO;P; ; ;;;;;;;;[;\; ;;;;NOXYLMV%W%Z[P%Q%\]`a<%=%DE^%_%R%S%TUJK  }!}"}#} } } } }$}%},-*+}}(})}&}'}sUtUuU oo ooo ooooo oo \]]]  wwwwww kkkk k kekkk k kkkdk kkkk llel l lllll llll l ldlll,s-sLsMsFzByBxB  \ ] WxXxYxVxUxuTnTqTrTmTsTtToTpTvTL~LvLwLxLyL}LzL{L|L@}>};}=}?}:}<}A}pp ppp ppppp ppTeTfTbTcTTTTx'y'^T_T`TaT\z]z$5%555:555;55555PQHIRS45XY6723LM<=  AA[A\AAOAPAAA AAAAA A A AAA xxxxxx\^]^\_]_ C6o6p6h6i6l6m6n6k6j6! D DxDyDfDgDDDpDqDjDkDDDlDmDdDeDDDD DDDDDtDuD|D}D~DDDDvDwDDDrDsDDD D DzD{DnDoDhDiD"\s]sss#\s]s$%pPUPVPPPWPXP&rr rrrr']<^<a<b<_<`<<[<\<(j&#&$&%&&&&)WXU V *Y|Z|+[ k ,@#A#B#-aaaaaaaaaa a.}~|/550vUtUqUrUoUpUuUnUsUmU1v=w=z=y={=|==~=}=x=2| _ ~ yy { yy} z  yy3SfPfTfRfOfhfQf4YrXrZr[rWr5eeee6vkwkpkqktkuklkmknkokrksk7x/y/877>7=7<7777 7!7"7#7$7%7&7'7(7)79*]+],]:-.;'p&p"p#p$p%p<wpxpypzp}p{p|p~p=2G3G>a<`<_<?/0@A]B]Aqq qqqqqqq q qqB ; ; ; ;CUQVQpQQQWQXQD9.:.;.<.EKKdK K KeKKKKKKK KK K KF,l-lLlMlGJ  =I :;BA  <@>H vvvvvvIW@X@U@V@JhHiHxHyHtHuHHH H HHHHHfHgHHH|H}HHHzH{HlHmHnHoH H HrHsHvHwHHHdHeHjHkHHHHHpHqH~HHH HKLq(r(y(z(w(x(({(|(}(u(v(s(t(MBBB BBB[B\BB BBBBOBPB B BBBNzz zzzzO{M|MNMHMIMuvvvyMzMP(C)C&C'CQtt\t]tR()&'S4}5}6}7}8}Tx?y???~??p?q? ? ?d?e?l?m?h?i???v?w?????????r?s?z?{?t?u?|?}? ? ???? ?f?g???j?k?n?o?UFFFFFFxFyFFFFFfFgFnFoFFF F FjFkF|F}FrFsF~FFhFiFpFqFFFlFmFdFeFF FvFwFFF F FzF{FtFuFVuyvyN7y7z7{7|7w7x7TPUPH7I7W\t]tXh i j k g f Y33 3 3;3<3 3Z58)88(8&8'8[t u r s p q \xCyCzC]{)|))u)v)s)t)w)x)q)r)y)z)})^ ~!~&~'~ ~ ~(~)~*+ "~#~ ~ ~,-~~$~%~_N O R&S&X Y P&Q&D E L M \ ] ` a J K Z [ V&W&^&_&T U <&=&`ZUaLmMm,m-mbCC[C\CCCCCC COCPCCCC CC C Cc=1>1?1drrrr rrrr rrr re\]fh i j f g k ggvhvhD DDODPD[D\DDD DDDDDDDD D Di |!|>|=|"|<|juu\u]ukOEPEEEEE EEEE E EEE[E\EE EElE F G C D mw8x8H8I8N8uzvzy8z8TQUQ{8|8nuwvwNNyNzNHNIN{N|NoeUfU^U_UbUcUU`UaUUUUp\u]uq@cAcrF F FFFFFFFFF F FOFPF[F\FFFso7p7n7k7h7i7l7m7j7C7tLnMn,n-nu$%    &',-"#*+()  !vX!Y!\!]!V'W'R'S'<'='D!E!T!U!`!a!Z![!L!M!N!O!^'_'J!K!P'Q'wB#C#D#E#x|j}jyGG G G GGG GGG[G\GGGGGOGPGGz2H3H{//~/|4m5m}/P0P5P6P7P8P1P2PgP~;/ > > >` ```` ` `O`P```[`\````` ``G!H!E!F!J!I! 1S2S/S0S5S6S7S8SgS!M!N!K!L!Q!R!U!V!W!X!I!J!S!T!O!P!"1n2nMnNn3n4nQnRninSnTn+n,nOnPn5n6nKnLn-n.nWnXnInJn/n0nUnVn#  -t.tOtPtItJt  3t4t StTtUtVt/t0t5t6titQtRt1t2tKtLtWtXt+t,tMtNt$::%~~\~]~&DqEqIqJq?q@qHqAqBqKq=q>qCqFqGq;q>>>>>>>> >!>">#>$>%>&>'>(>)>*>1uv.stw2mh3If4bb bb[b\bbbbb b b bObPbbbbb5/P=;G.9JL @mnEz{  0SklOAWT?NQ|}HD>wxBUqr-Copyz<IR:stK~uvij8MF,V6HvIvNv7+C,C-C.C/C0C1C2C3C84J5J9 :sPtPoPpPvPuPnPqPrPmP;~GGGG|G}GG GzG{GGGGGGGtGuGGGpGqG G GxGyGGGhGiGGGrGsGGGjGkGnGoGvGwGlGmG G GfGgGdGeG<v@w@z@y@@~@{@|@x@}@=JJfJgJjJkJ~JJpJqJJJJJrJsJlJmJJJJJnJoJdJeJhJiJ|J}JvJwJJJtJuJxJyJ J JzJ{J J JJJJJJ J>SkTkWkXkYk?%*&*j*#*$**@:d;dT.WPyzEz{I-CD6C7C8C9C:C;CC?C@CACBCEhIFCrDrErFrGrHrIrJrG. / , - * + 0 1 HOdPdd d[d\d d dddddddd ddddIf g k h i j J<=8967Z>?45:;KW|X|U|V|Y|L^Z_ZZZeZfZZbZcZZ`ZaZM3NH9I9+f#{9|9y9z9KRLR$w9x9N9On9k9j9o9p9h9i9C9l9m9Pd@e@@@ @ @v@w@f@g@|@}@t@u@@@j@k@p@q@~@@@@@@@@x@y@l@m@ @ @h@i@r@s@@@@@@@n@o@@ @z@{@QLpMp,p-pR[)V)Z)_)]SXSU\_s)^_q)r)Y_"m_n_o_p)ld)b)a)c_`eWTi)j)k)h)g)f;NOPSTUABCDEFHIJKLMRWXZ[\]_ABCDEFHIJKLMR_WXvH  UBBbugfixImportant: qatzip bug fix and enhancement updateyhttps://access.redhat.com/errata/RHBA-2022:8256RHBA-2022:8256RHBA-2022:8256 https://access.redhat.com/security/cve/CVE-2022-36369CVE-2022-36369CVE-2022-36369https://bugzilla.redhat.com/21707842170784https://errata.almalinux.org/9/ALBA-2022-8256.htmlALBA-2022:8256ALBA-2022:8256 sdqatzip-libs-1.0.9-1.el9.x86_64.rpmrdqatzip-1.0.9-1.el9.x86_64.rpmsdqatzip-libs-1.0.9-1.el9.x86_64.rpmrdqatzip-1.0.9-1.el9.x86_64.rpm|  $ZBBBBBBBBbugfixModerate: open-vm-tools bug fix and enhancement updateyyhttps://access.redhat.com/errata/RHBA-2025:20841RHBA-2025:20841RHBA-2025:20841 https://errata.almalinux.org/9/ALBA-2025-20841.htmlALBA-2025:20841ALBA-2025:20841 https://www.redhat.com/security/data/cve/CVE-2025-22247.htmlCVE-2025-22247CVE-2025-22247#open-vm-tools-13.0.0-1.el9_7.1.x86_64.rpm&open-vm-tools-test-13.0.0-1.el9_7.1.x86_64.rpm$open-vm-tools-desktop-13.0.0-1.el9_7.1.x86_64.rpmTopen-vm-tools-salt-minion-13.0.0-1.el9_7.1.x86_64.rpm%open-vm-tools-sdmp-13.0.0-1.el9_7.1.x86_64.rpm#open-vm-tools-13.0.0-1.el9_7.1.x86_64.rpm&open-vm-tools-test-13.0.0-1.el9_7.1.x86_64.rpm$open-vm-tools-desktop-13.0.0-1.el9_7.1.x86_64.rpmTopen-vm-tools-salt-minion-13.0.0-1.el9_7.1.x86_64.rpm%open-vm-tools-sdmp-13.0.0-1.el9_7.1.x86_64.rpm  *eBBBsecurityImportant: xz security update0rhttps://access.redhat.com/errata/RHSA-2022:4940RHSA-2022:4940RHSA-2022:4940 https://access.redhat.com/security/cve/CVE-2022-1271CVE-2022-1271CVE-2022-1271https://bugzilla.redhat.com/20733102073310https://errata.almalinux.org/9/ALSA-2022-4940.htmlALSA-2022:4940ALSA-2022:4940 hxz-devel-5.2.5-8.el9_0.i686.rpm.xz-lzma-compat-5.2.5-8.el9_0.x86_64.rpmhxz-devel-5.2.5-8.el9_0.x86_64.rpmhxz-devel-5.2.5-8.el9_0.i686.rpm.xz-lzma-compat-5.2.5-8.el9_0.x86_64.rpmhxz-devel-5.2.5-8.el9_0.x86_64.rpm$ 4kBBBBBBBsecurityModerate: vim security update0Thttps://access.redhat.com/errata/RHSA-2022:5242RHSA-2022:5242RHSA-2022:5242 https://access.redhat.com/security/cve/CVE-2022-0554CVE-2022-0554CVE-2022-0554https://access.redhat.com/security/cve/CVE-2022-0943CVE-2022-0943CVE-2022-0943https://access.redhat.com/security/cve/CVE-2022-1154CVE-2022-1154CVE-2022-1154https://access.redhat.com/security/cve/CVE-2022-1420CVE-2022-1420CVE-2022-1420https://access.redhat.com/security/cve/CVE-2022-1621CVE-2022-1621CVE-2022-1621https://access.redhat.com/security/cve/CVE-2022-1629CVE-2022-1629CVE-2022-1629https://bugzilla.redhat.com/20584832058483https://bugzilla.redhat.com/20640642064064https://bugzilla.redhat.com/20730132073013https://bugzilla.redhat.com/20777342077734https://bugzilla.redhat.com/20839242083924https://bugzilla.redhat.com/20839312083931https://errata.almalinux.org/9/ALSA-2022-5242.htmlALSA-2022:5242ALSA-2022:5242 /Evim-X11-8.2.2637-16.el9_0.2.x86_64.rpm0Evim-common-8.2.2637-16.el9_0.2.x86_64.rpm1Evim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpmyEvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpmxEvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpm/Evim-X11-8.2.2637-16.el9_0.2.x86_64.rpm0Evim-common-8.2.2637-16.el9_0.2.x86_64.rpm1Evim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpmyEvim-minimal-8.2.2637-16.el9_0.2.x86_64.rpmxEvim-filesystem-8.2.2637-16.el9_0.2.noarch.rpmT :uBBBsecurityModerate: expat security update0[xhttps://access.redhat.com/errata/RHSA-2022:5244RHSA-2022:5244RHSA-2022:5244 https://access.redhat.com/security/cve/CVE-2022-25313CVE-2022-25313CVE-2022-25313https://access.redhat.com/security/cve/CVE-2022-25314CVE-2022-25314CVE-2022-25314https://bugzilla.redhat.com/20563502056350https://bugzilla.redhat.com/20563542056354https://errata.almalinux.org/9/ALSA-2022-5244.htmlALSA-2022:5244ALSA-2022:5244 smexpat-devel-2.2.10-12.el9_0.2.x86_64.rpmsmexpat-devel-2.2.10-12.el9_0.2.i686.rpmhttps://access.redhat.com/errata/RHSA-2022:5263RHSA-2022:5263RHSA-2022:5263 https://access.redhat.com/security/cve/CVE-2022-26353CVE-2022-26353CVE-2022-26353https://access.redhat.com/security/cve/CVE-2022-26354CVE-2022-26354CVE-2022-26354https://bugzilla.redhat.com/20631972063197https://bugzilla.redhat.com/20632572063257https://errata.almalinux.org/9/ALSA-2022-5263.htmlALSA-2022:5263ALSA-2022:5263 UTqemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3.x86_64.rpmMTqemu-kvm-6.2.0-11.el9_0.3.x86_64.rpm\Tqemu-pr-helper-6.2.0-11.el9_0.3.x86_64.rpmpTqemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3.x86_64.rpmKTqemu-guest-agent-6.2.0-11.el9_0.3.x86_64.rpmVTqemu-kvm-device-usb-host-6.2.0-11.el9_0.3.x86_64.rpmoTqemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3.x86_64.rpmSTqemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.x86_64.rpmYTqemu-kvm-tools-6.2.0-11.el9_0.3.x86_64.rpmNTqemu-kvm-audio-pa-6.2.0-11.el9_0.3.x86_64.rpmTTqemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3.x86_64.rpmQTqemu-kvm-common-6.2.0-11.el9_0.3.x86_64.rpmLTqemu-img-6.2.0-11.el9_0.3.x86_64.rpmWTqemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3.x86_64.rpmnTqemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.x86_64.rpmPTqemu-kvm-block-rbd-6.2.0-11.el9_0.3.x86_64.rpm[Tqemu-kvm-ui-opengl-6.2.0-11.el9_0.3.x86_64.rpmXTqemu-kvm-docs-6.2.0-11.el9_0.3.x86_64.rpmZTqemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3.x86_64.rpmOTqemu-kvm-block-curl-6.2.0-11.el9_0.3.x86_64.rpmRTqemu-kvm-core-6.2.0-11.el9_0.3.x86_64.rpmUTqemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3.x86_64.rpmMTqemu-kvm-6.2.0-11.el9_0.3.x86_64.rpm\Tqemu-pr-helper-6.2.0-11.el9_0.3.x86_64.rpmpTqemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3.x86_64.rpmKTqemu-guest-agent-6.2.0-11.el9_0.3.x86_64.rpmVTqemu-kvm-device-usb-host-6.2.0-11.el9_0.3.x86_64.rpmoTqemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3.x86_64.rpmSTqemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.x86_64.rpmYTqemu-kvm-tools-6.2.0-11.el9_0.3.x86_64.rpmNTqemu-kvm-audio-pa-6.2.0-11.el9_0.3.x86_64.rpmTTqemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3.x86_64.rpmQTqemu-kvm-common-6.2.0-11.el9_0.3.x86_64.rpmLTqemu-img-6.2.0-11.el9_0.3.x86_64.rpmWTqemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3.x86_64.rpmnTqemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.x86_64.rpmPTqemu-kvm-block-rbd-6.2.0-11.el9_0.3.x86_64.rpm[Tqemu-kvm-ui-opengl-6.2.0-11.el9_0.3.x86_64.rpmXTqemu-kvm-docs-6.2.0-11.el9_0.3.x86_64.rpmZTqemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3.x86_64.rpmOTqemu-kvm-block-curl-6.2.0-11.el9_0.3.x86_64.rpmRTqemu-kvm-core-6.2.0-11.el9_0.3.x86_64.rpm$ "`securityImportant: thunderbird security update01ehttps://access.redhat.com/errata/RHSA-2022:5482RHSA-2022:5482 https://access.redhat.com/security/cve/CVE-2022-2200CVE-2022-2200https://access.redhat.com/security/cve/CVE-2022-2226CVE-2022-2226https://access.redhat.com/security/cve/CVE-2022-31744CVE-2022-31744https://access.redhat.com/security/cve/CVE-2022-34468CVE-2022-34468https://access.redhat.com/security/cve/CVE-2022-34470CVE-2022-34470https://access.redhat.com/security/cve/CVE-2022-34472CVE-2022-34472https://access.redhat.com/security/cve/CVE-2022-34479CVE-2022-34479https://access.redhat.com/security/cve/CVE-2022-34481CVE-2022-34481https://access.redhat.com/security/cve/CVE-2022-34484CVE-2022-34484https://bugzilla.redhat.com/21021612102161https://bugzilla.redhat.com/21021622102162https://bugzilla.redhat.com/21021632102163https://bugzilla.redhat.com/21021642102164https://bugzilla.redhat.com/21021652102165https://bugzilla.redhat.com/21021662102166https://bugzilla.redhat.com/21021682102168https://bugzilla.redhat.com/21021692102169https://bugzilla.redhat.com/21022042102204https://errata.almalinux.org/9/ALSA-2022-5482.htmlALSA-2022:5482ALSA-2022:5482 :thunderbird-91.11.0-2.el9_0.alma.x86_64.rpm:thunderbird-91.11.0-2.el9_0.alma.x86_64.rpmY %csecurityImportant: squid security update0https://access.redhat.com/errata/RHSA-2022:5527RHSA-2022:5527 https://access.redhat.com/security/cve/CVE-2021-46784CVE-2021-46784https://bugzilla.redhat.com/21007212100721https://errata.almalinux.org/9/ALSA-2022-5527.htmlALSA-2022:5527ALSA-2022:5527  }squid-5.2-1.el9_0.1.x86_64.rpm }squid-5.2-1.el9_0.1.x86_64.rpm fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security, bug fix, and enhancement update0+https://access.redhat.com/errata/RHSA-2022:5695RHSA-2022:5695RHSA-2022:5695 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5695.htmlALSA-2022:5695ALSA-2022:5695 tLjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpmxLjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmLjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmsLjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpmyLjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmqLjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpmLjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmzLjava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmoLjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm}Ljava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmLjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmrLjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpmmLjava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpmvLjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmwLjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm|Ljava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmnLjava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpmLjava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmLjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm~Ljava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm{Ljava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmpLjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpmlLjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpmtLjava-11-openjdk-static-libs-11.0.16.0.8-1.el9_0.x86_64.rpmxLjava-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmLjava-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmsLjava-11-openjdk-src-11.0.16.0.8-1.el9_0.x86_64.rpmyLjava-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmqLjava-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9_0.x86_64.rpmLjava-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmzLjava-11-openjdk-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmoLjava-11-openjdk-headless-11.0.16.0.8-1.el9_0.x86_64.rpm}Ljava-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmLjava-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmrLjava-11-openjdk-jmods-11.0.16.0.8-1.el9_0.x86_64.rpmmLjava-11-openjdk-demo-11.0.16.0.8-1.el9_0.x86_64.rpmvLjava-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmwLjava-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm|Ljava-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmnLjava-11-openjdk-devel-11.0.16.0.8-1.el9_0.x86_64.rpmLjava-11-openjdk-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpmLjava-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm~Ljava-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9_0.x86_64.rpm{Ljava-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9_0.x86_64.rpmpLjava-11-openjdk-javadoc-11.0.16.0.8-1.el9_0.x86_64.rpmlLjava-11-openjdk-11.0.16.0.8-1.el9_0.x86_64.rpm 5UBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security, bug fix, and enhancement update0G.https://access.redhat.com/errata/RHSA-2022:5709RHSA-2022:5709RHSA-2022:5709 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5709.htmlALSA-2022:5709ALSA-2022:5709 :bjava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpmrbjava-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmubjava-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmmbjava-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm6bjava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm4bjava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm2bjava-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpmlbjava-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm5bjava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpmtbjava-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmqbjava-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmpbjava-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm3bjava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpmsbjava-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmobjava-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm;bjava-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpmnbjava-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm:bjava-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el9_0.noarch.rpmrbjava-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmubjava-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmmbjava-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm6bjava-1.8.0-openjdk-src-1.8.0.342.b07-1.el9_0.x86_64.rpm4bjava-1.8.0-openjdk-devel-1.8.0.342.b07-1.el9_0.x86_64.rpm2bjava-1.8.0-openjdk-1.8.0.342.b07-1.el9_0.x86_64.rpmlbjava-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm5bjava-1.8.0-openjdk-headless-1.8.0.342.b07-1.el9_0.x86_64.rpmtbjava-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmqbjava-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmpbjava-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm3bjava-1.8.0-openjdk-demo-1.8.0.342.b07-1.el9_0.x86_64.rpmsbjava-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpmobjava-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm;bjava-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el9_0.noarch.rpmnbjava-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el9_0.x86_64.rpm 8vsecurityImportant: grafana security update0uphttps://access.redhat.com/errata/RHSA-2022:5716RHSA-2022:5716 https://access.redhat.com/security/cve/CVE-2022-31107CVE-2022-31107https://bugzilla.redhat.com/21043672104367https://errata.almalinux.org/9/ALSA-2022-5716.htmlALSA-2022:5716ALSA-2022:5716 o{grafana-7.5.11-5.el9_0.x86_64.rpmo{grafana-7.5.11-5.el9_0.x86_64.rpm' 'yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security, bug fix, and enhancement update0ee https://access.redhat.com/errata/RHSA-2022:5736RHSA-2022:5736RHSA-2022:5736 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-21549CVE-2022-21549CVE-2022-21549https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085472108547https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5736.htmlALSA-2022:5736ALSA-2022:5736 Mjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Mjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmMjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm *hsecurityImportant: firefox security update0Jfhttps://access.redhat.com/errata/RHSA-2022:5767RHSA-2022:5767 https://access.redhat.com/security/cve/CVE-2022-2505CVE-2022-2505https://access.redhat.com/security/cve/CVE-2022-36318CVE-2022-36318https://access.redhat.com/security/cve/CVE-2022-36319CVE-2022-36319https://bugzilla.redhat.com/21119072111907https://bugzilla.redhat.com/21119082111908https://bugzilla.redhat.com/21119102111910https://errata.almalinux.org/9/ALSA-2022-5767.htmlALSA-2022:5767ALSA-2022:5767 8firefox-91.12.0-2.el9_0.alma.x86_64.rpm8firefox-91.12.0-2.el9_0.alma.x86_64.rpmy 5kBBBBBBBBsecurityImportant: go-toolset and golang security and bug fix update00https://access.redhat.com/errata/RHSA-2022:5799RHSA-2022:5799 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-1962CVE-2022-1962https://access.redhat.com/security/cve/CVE-2022-28131CVE-2022-28131https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30633CVE-2022-30633https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073762107376https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://bugzilla.redhat.com/21073902107390https://bugzilla.redhat.com/21073922107392https://errata.almalinux.org/9/ALSA-2022-5799.htmlALSA-2022:5799ALSA-2022:5799 dgolang-src-1.17.12-1.el9_0.noarch.rpmIdgolang-race-1.17.12-1.el9_0.x86_64.rpmdgolang-tests-1.17.12-1.el9_0.noarch.rpmdgolang-misc-1.17.12-1.el9_0.noarch.rpmdgolang-docs-1.17.12-1.el9_0.noarch.rpm@dgolang-bin-1.17.12-1.el9_0.x86_64.rpm?dgolang-1.17.12-1.el9_0.x86_64.rpmdgolang-src-1.17.12-1.el9_0.noarch.rpmIdgolang-race-1.17.12-1.el9_0.x86_64.rpmdgolang-tests-1.17.12-1.el9_0.noarch.rpmdgolang-misc-1.17.12-1.el9_0.noarch.rpmdgolang-docs-1.17.12-1.el9_0.noarch.rpm@dgolang-bin-1.17.12-1.el9_0.x86_64.rpm?dgolang-1.17.12-1.el9_0.x86_64.rpmo (vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php security update0Bhttps://access.redhat.com/errata/RHSA-2022:5904RHSA-2022:5904 https://access.redhat.com/security/cve/CVE-2022-31626CVE-2022-31626https://bugzilla.redhat.com/20985232098523https://errata.almalinux.org/9/ALSA-2022-5904.htmlALSA-2022:5904ALSA-2022:5904 b;php-opcache-8.0.13-2.el9_0.x86_64.rpm`;php-mysqlnd-8.0.13-2.el9_0.x86_64.rpmZ;php-fpm-8.0.13-2.el9_0.x86_64.rpmd;php-pgsql-8.0.13-2.el9_0.x86_64.rpmV;php-devel-8.0.13-2.el9_0.x86_64.rpmU;php-dbg-8.0.13-2.el9_0.x86_64.rpm^;php-ldap-8.0.13-2.el9_0.x86_64.rpm;php-8.0.13-2.el9_0.x86_64.rpm[;php-gd-8.0.13-2.el9_0.x86_64.rpmQ;php-bcmath-8.0.13-2.el9_0.x86_64.rpmT;php-dba-8.0.13-2.el9_0.x86_64.rpm\;php-gmp-8.0.13-2.el9_0.x86_64.rpmh;php-xml-8.0.13-2.el9_0.x86_64.rpmc;php-pdo-8.0.13-2.el9_0.x86_64.rpmR;php-cli-8.0.13-2.el9_0.x86_64.rpm_;php-mbstring-8.0.13-2.el9_0.x86_64.rpmW;php-embedded-8.0.13-2.el9_0.x86_64.rpmY;php-ffi-8.0.13-2.el9_0.x86_64.rpm];php-intl-8.0.13-2.el9_0.x86_64.rpmf;php-snmp-8.0.13-2.el9_0.x86_64.rpme;php-process-8.0.13-2.el9_0.x86_64.rpmS;php-common-8.0.13-2.el9_0.x86_64.rpmX;php-enchant-8.0.13-2.el9_0.x86_64.rpma;php-odbc-8.0.13-2.el9_0.x86_64.rpmg;php-soap-8.0.13-2.el9_0.x86_64.rpmb;php-opcache-8.0.13-2.el9_0.x86_64.rpm`;php-mysqlnd-8.0.13-2.el9_0.x86_64.rpmZ;php-fpm-8.0.13-2.el9_0.x86_64.rpmd;php-pgsql-8.0.13-2.el9_0.x86_64.rpmV;php-devel-8.0.13-2.el9_0.x86_64.rpmU;php-dbg-8.0.13-2.el9_0.x86_64.rpm^;php-ldap-8.0.13-2.el9_0.x86_64.rpm;php-8.0.13-2.el9_0.x86_64.rpm[;php-gd-8.0.13-2.el9_0.x86_64.rpmQ;php-bcmath-8.0.13-2.el9_0.x86_64.rpmT;php-dba-8.0.13-2.el9_0.x86_64.rpm\;php-gmp-8.0.13-2.el9_0.x86_64.rpmh;php-xml-8.0.13-2.el9_0.x86_64.rpmc;php-pdo-8.0.13-2.el9_0.x86_64.rpmR;php-cli-8.0.13-2.el9_0.x86_64.rpm_;php-mbstring-8.0.13-2.el9_0.x86_64.rpmW;php-embedded-8.0.13-2.el9_0.x86_64.rpmY;php-ffi-8.0.13-2.el9_0.x86_64.rpm];php-intl-8.0.13-2.el9_0.x86_64.rpmf;php-snmp-8.0.13-2.el9_0.x86_64.rpme;php-process-8.0.13-2.el9_0.x86_64.rpmS;php-common-8.0.13-2.el9_0.x86_64.rpmX;php-enchant-8.0.13-2.el9_0.x86_64.rpma;php-odbc-8.0.13-2.el9_0.x86_64.rpmg;php-soap-8.0.13-2.el9_0.x86_64.rpm2 2iBBBBBBBsecurityModerate: vim security update0DRhttps://access.redhat.com/errata/RHSA-2022:5942RHSA-2022:5942RHSA-2022:5942 https://access.redhat.com/security/cve/CVE-2022-1785CVE-2022-1785CVE-2022-1785https://access.redhat.com/security/cve/CVE-2022-1897CVE-2022-1897CVE-2022-1897https://access.redhat.com/security/cve/CVE-2022-1927CVE-2022-1927CVE-2022-1927https://bugzilla.redhat.com/20886892088689https://bugzilla.redhat.com/20916822091682https://bugzilla.redhat.com/20916872091687https://errata.almalinux.org/9/ALSA-2022-5942.htmlALSA-2022:5942ALSA-2022:5942 0Fvim-common-8.2.2637-16.el9_0.3.x86_64.rpm1Fvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpmyFvim-minimal-8.2.2637-16.el9_0.3.x86_64.rpmxFvim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm/Fvim-X11-8.2.2637-16.el9_0.3.x86_64.rpm0Fvim-common-8.2.2637-16.el9_0.3.x86_64.rpm1Fvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpmyFvim-minimal-8.2.2637-16.el9_0.3.x86_64.rpmxFvim-filesystem-8.2.2637-16.el9_0.3.noarch.rpm/Fvim-X11-8.2.2637-16.el9_0.3.x86_64.rpmR sBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update0iJhttps://access.redhat.com/errata/RHSA-2022:5948RHSA-2022:5948RHSA-2022:5948 https://access.redhat.com/security/cve/CVE-2021-46659CVE-2021-46659CVE-2021-46659https://access.redhat.com/security/cve/CVE-2021-46661CVE-2021-46661CVE-2021-46661https://access.redhat.com/security/cve/CVE-2021-46663CVE-2021-46663CVE-2021-46663https://access.redhat.com/security/cve/CVE-2021-46664CVE-2021-46664CVE-2021-46664https://access.redhat.com/security/cve/CVE-2021-46665CVE-2021-46665CVE-2021-46665https://access.redhat.com/security/cve/CVE-2021-46668CVE-2021-46668CVE-2021-46668https://access.redhat.com/security/cve/CVE-2021-46669CVE-2021-46669CVE-2021-46669https://access.redhat.com/security/cve/CVE-2022-24048CVE-2022-24048CVE-2022-24048https://access.redhat.com/security/cve/CVE-2022-24050CVE-2022-24050CVE-2022-24050https://access.redhat.com/security/cve/CVE-2022-24051CVE-2022-24051CVE-2022-24051https://access.redhat.com/security/cve/CVE-2022-24052CVE-2022-24052CVE-2022-24052https://access.redhat.com/security/cve/CVE-2022-27376CVE-2022-27376CVE-2022-27376https://access.redhat.com/security/cve/CVE-2022-27377CVE-2022-27377CVE-2022-27377https://access.redhat.com/security/cve/CVE-2022-27378CVE-2022-27378CVE-2022-27378https://access.redhat.com/security/cve/CVE-2022-27379CVE-2022-27379CVE-2022-27379https://access.redhat.com/security/cve/CVE-2022-27380CVE-2022-27380CVE-2022-27380https://access.redhat.com/security/cve/CVE-2022-27381CVE-2022-27381CVE-2022-27381https://access.redhat.com/security/cve/CVE-2022-27382CVE-2022-27382CVE-2022-27382https://access.redhat.com/security/cve/CVE-2022-27383CVE-2022-27383CVE-2022-27383https://access.redhat.com/security/cve/CVE-2022-27384CVE-2022-27384CVE-2022-27384https://access.redhat.com/security/cve/CVE-2022-27386CVE-2022-27386CVE-2022-27386https://access.redhat.com/security/cve/CVE-2022-27387CVE-2022-27387CVE-2022-27387https://access.redhat.com/security/cve/CVE-2022-27444CVE-2022-27444CVE-2022-27444https://access.redhat.com/security/cve/CVE-2022-27445CVE-2022-27445CVE-2022-27445https://access.redhat.com/security/cve/CVE-2022-27446CVE-2022-27446CVE-2022-27446https://access.redhat.com/security/cve/CVE-2022-27447CVE-2022-27447CVE-2022-27447https://access.redhat.com/security/cve/CVE-2022-27448CVE-2022-27448CVE-2022-27448https://access.redhat.com/security/cve/CVE-2022-27449CVE-2022-27449CVE-2022-27449https://access.redhat.com/security/cve/CVE-2022-27451CVE-2022-27451CVE-2022-27451https://access.redhat.com/security/cve/CVE-2022-27452CVE-2022-27452CVE-2022-27452https://access.redhat.com/security/cve/CVE-2022-27455CVE-2022-27455CVE-2022-27455https://access.redhat.com/security/cve/CVE-2022-27456CVE-2022-27456CVE-2022-27456https://access.redhat.com/security/cve/CVE-2022-27457CVE-2022-27457CVE-2022-27457https://access.redhat.com/security/cve/CVE-2022-27458CVE-2022-27458CVE-2022-27458https://access.redhat.com/security/cve/CVE-2022-31622CVE-2022-31622CVE-2022-31622https://access.redhat.com/security/cve/CVE-2022-31623CVE-2022-31623CVE-2022-31623https://bugzilla.redhat.com/20493022049302https://bugzilla.redhat.com/20500172050017https://bugzilla.redhat.com/20500222050022https://bugzilla.redhat.com/20500242050024https://bugzilla.redhat.com/20500262050026https://bugzilla.redhat.com/20500322050032https://bugzilla.redhat.com/20500342050034https://bugzilla.redhat.com/20682112068211https://bugzilla.redhat.com/20682332068233https://bugzilla.redhat.com/20682342068234https://bugzilla.redhat.com/20698332069833https://bugzilla.redhat.com/20748172074817https://bugzilla.redhat.com/20749472074947https://bugzilla.redhat.com/20749492074949https://bugzilla.redhat.com/20749512074951https://bugzilla.redhat.com/20749662074966https://bugzilla.redhat.com/20749812074981https://bugzilla.redhat.com/20749872074987https://bugzilla.redhat.com/20749962074996https://bugzilla.redhat.com/20749992074999https://bugzilla.redhat.com/20750052075005https://bugzilla.redhat.com/20750062075006https://bugzilla.redhat.com/20756912075691https://bugzilla.redhat.com/20756922075692https://bugzilla.redhat.com/20756932075693https://bugzilla.redhat.com/20756942075694https://bugzilla.redhat.com/20756952075695https://bugzilla.redhat.com/20756962075696https://bugzilla.redhat.com/20756972075697https://bugzilla.redhat.com/20756992075699https://bugzilla.redhat.com/20757002075700https://bugzilla.redhat.com/20757012075701https://bugzilla.redhat.com/20761442076144https://bugzilla.redhat.com/20761452076145https://bugzilla.redhat.com/20923542092354https://bugzilla.redhat.com/20923602092360https://errata.almalinux.org/9/ALSA-2022-5948.htmlALSA-2022:5948ALSA-2022:5948 mariadb-pam-10.5.16-2.el9_0.x86_64.rpm!mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpmmariadb-backup-10.5.16-2.el9_0.x86_64.rpm"mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm,mariadb-10.5.16-2.el9_0.x86_64.rpmmariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpmmariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpmmariadb-embedded-10.5.16-2.el9_0.x86_64.rpmmariadb-errmsg-10.5.16-2.el9_0.x86_64.rpmxmariadb-test-10.5.16-2.el9_0.x86_64.rpmvmariadb-devel-10.5.16-2.el9_0.x86_64.rpmmariadb-common-10.5.16-2.el9_0.x86_64.rpmwmariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm mariadb-server-10.5.16-2.el9_0.x86_64.rpmmariadb-pam-10.5.16-2.el9_0.x86_64.rpm!mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpmmariadb-backup-10.5.16-2.el9_0.x86_64.rpm"mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpm,mariadb-10.5.16-2.el9_0.x86_64.rpmmariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpmmariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpmmariadb-embedded-10.5.16-2.el9_0.x86_64.rpmmariadb-errmsg-10.5.16-2.el9_0.x86_64.rpmxmariadb-test-10.5.16-2.el9_0.x86_64.rpmvmariadb-devel-10.5.16-2.el9_0.x86_64.rpmmariadb-common-10.5.16-2.el9_0.x86_64.rpmwmariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpm mariadb-server-10.5.16-2.el9_0.x86_64.rpmͬt :PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update0qhttps://access.redhat.com/errata/RHSA-2022:6003RHSA-2022:6003RHSA-2022:6003 https://access.redhat.com/security/cve/CVE-2022-0494CVE-2022-0494CVE-2022-0494https://access.redhat.com/security/cve/CVE-2022-1055CVE-2022-1055CVE-2022-1055https://bugzilla.redhat.com/20394482039448https://bugzilla.redhat.com/20702202070220https://errata.almalinux.org/9/ALSA-2022-6003.htmlALSA-2022:6003ALSA-2022:6003 KSkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpmHSkernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmSkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm&Skernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpmISkernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpmCSkernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm%Sperf-5.14.0-70.22.1.el9_0.x86_64.rpmASkernel-5.14.0-70.22.1.el9_0.x86_64.rpmESkernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm"Skernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmDSkernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpmMSkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpmJSkernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmBSkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm$Skernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmSbpftool-5.14.0-70.22.1.el9_0.x86_64.rpmGSkernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm#Skernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpmLSkernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpmVSpython3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm!Skernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpmFSkernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpmKSkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpmHSkernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmSkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm&Skernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpmISkernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpmCSkernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm%Sperf-5.14.0-70.22.1.el9_0.x86_64.rpmASkernel-5.14.0-70.22.1.el9_0.x86_64.rpmESkernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm"Skernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmDSkernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpmMSkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpmJSkernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmBSkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm$Skernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpmSbpftool-5.14.0-70.22.1.el9_0.x86_64.rpmGSkernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm#Skernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpmLSkernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpmVSpython3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm!Skernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpmFSkernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpmл  {BBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security, bug fix, and enhancement update0pJhttps://access.redhat.com/errata/RHSA-2022:6043RHSA-2022:6043RHSA-2022:6043 https://access.redhat.com/security/cve/CVE-2022-34716CVE-2022-34716CVE-2022-34716https://bugzilla.redhat.com/21151832115183https://errata.almalinux.org/9/ALSA-2022-6043.htmlALSA-2022:6043ALSA-2022:6043 |aspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm;mdotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm|dotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm|dotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm|dotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpmmnetstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm|aspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpmmdotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpmmdotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm|dotnet-host-6.0.8-1.el9_0.x86_64.rpm|dotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm |aspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm;mdotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm|dotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm|dotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm|dotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpmmnetstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm|aspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpmmdotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpmmdotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm|dotnet-host-6.0.8-1.el9_0.x86_64.rpm|dotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpmк2! RBBBBBBBBBsecurityModerate: curl security update0:https://access.redhat.com/errata/RHSA-2022:6157RHSA-2022:6157RHSA-2022:6157 https://access.redhat.com/security/cve/CVE-2022-32206CVE-2022-32206CVE-2022-32206https://access.redhat.com/security/cve/CVE-2022-32207CVE-2022-32207CVE-2022-32207https://access.redhat.com/security/cve/CVE-2022-32208CVE-2022-32208CVE-2022-32208https://bugzilla.redhat.com/20993002099300https://bugzilla.redhat.com/20993052099305https://bugzilla.redhat.com/20993062099306https://errata.almalinux.org/9/ALSA-2022-6157.htmlALSA-2022:6157ALSA-2022:6157 .libcurl-devel-7.76.1-14.el9_0.5.i686.rpm!.libcurl-7.76.1-14.el9_0.5.x86_64.rpm".libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm.libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm8.curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm7.curl-7.76.1-14.el9_0.5.x86_64.rpm.libcurl-devel-7.76.1-14.el9_0.5.i686.rpm!.libcurl-7.76.1-14.el9_0.5.x86_64.rpm".libcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm.libcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm8.curl-minimal-7.76.1-14.el9_0.5.x86_64.rpm7.curl-7.76.1-14.el9_0.5.x86_64.rpm" ^securityImportant: thunderbird security update0S https://access.redhat.com/errata/RHSA-2022:6165RHSA-2022:6165RHSA-2022:6165 https://access.redhat.com/security/cve/CVE-2022-38472CVE-2022-38472CVE-2022-38472https://access.redhat.com/security/cve/CVE-2022-38473CVE-2022-38473CVE-2022-38473https://access.redhat.com/security/cve/CVE-2022-38476CVE-2022-38476CVE-2022-38476https://access.redhat.com/security/cve/CVE-2022-38477CVE-2022-38477CVE-2022-38477https://access.redhat.com/security/cve/CVE-2022-38478CVE-2022-38478CVE-2022-38478https://bugzilla.redhat.com/21206732120673https://bugzilla.redhat.com/21206742120674https://bugzilla.redhat.com/21206782120678https://bugzilla.redhat.com/21206952120695https://bugzilla.redhat.com/21206962120696https://errata.almalinux.org/9/ALSA-2022-6165.htmlALSA-2022:6165ALSA-2022:6165 :^thunderbird-91.13.0-1.el9_0.alma.x86_64.rpm:^thunderbird-91.13.0-1.el9_0.alma.x86_64.rpm# #asecurityImportant: firefox security update0a? https://access.redhat.com/errata/RHSA-2022:6174RHSA-2022:6174RHSA-2022:6174 https://access.redhat.com/security/cve/CVE-2022-38472CVE-2022-38472CVE-2022-38472https://access.redhat.com/security/cve/CVE-2022-38473CVE-2022-38473CVE-2022-38473https://access.redhat.com/security/cve/CVE-2022-38476CVE-2022-38476CVE-2022-38476https://access.redhat.com/security/cve/CVE-2022-38477CVE-2022-38477CVE-2022-38477https://access.redhat.com/security/cve/CVE-2022-38478CVE-2022-38478CVE-2022-38478https://bugzilla.redhat.com/21206732120673https://bugzilla.redhat.com/21206742120674https://bugzilla.redhat.com/21206782120678https://bugzilla.redhat.com/21206952120695https://bugzilla.redhat.com/21206962120696https://errata.almalinux.org/9/ALSA-2022-6174.htmlALSA-2022:6174ALSA-2022:6174 8^firefox-91.13.0-1.el9_0.alma.x86_64.rpm8^firefox-91.13.0-1.el9_0.alma.x86_64.rpm+$ -dBBBBBBBsecurityModerate: openssl security and bug fix update0 / https://access.redhat.com/errata/RHSA-2022:6224RHSA-2022:6224RHSA-2022:6224 https://access.redhat.com/security/cve/CVE-2022-1292CVE-2022-1292CVE-2022-1292https://access.redhat.com/security/cve/CVE-2022-1343CVE-2022-1343CVE-2022-1343https://access.redhat.com/security/cve/CVE-2022-1473CVE-2022-1473CVE-2022-1473https://access.redhat.com/security/cve/CVE-2022-2068CVE-2022-2068CVE-2022-2068https://access.redhat.com/security/cve/CVE-2022-2097CVE-2022-2097CVE-2022-2097https://bugzilla.redhat.com/20814942081494https://bugzilla.redhat.com/20879112087911https://bugzilla.redhat.com/20879132087913https://bugzilla.redhat.com/20973102097310https://bugzilla.redhat.com/21049052104905https://errata.almalinux.org/9/ALSA-2022-6224.htmlALSA-2022:6224ALSA-2022:6224  Aopenssl-devel-3.0.1-41.el9_0.i686.rpm:Aopenssl-libs-3.0.1-41.el9_0.x86_64.rpmJAopenssl-perl-3.0.1-41.el9_0.x86_64.rpm Aopenssl-devel-3.0.1-41.el9_0.x86_64.rpm9Aopenssl-3.0.1-41.el9_0.x86_64.rpm Aopenssl-devel-3.0.1-41.el9_0.i686.rpm:Aopenssl-libs-3.0.1-41.el9_0.x86_64.rpmJAopenssl-perl-3.0.1-41.el9_0.x86_64.rpm Aopenssl-devel-3.0.1-41.el9_0.x86_64.rpm9Aopenssl-3.0.1-41.el9_0.x86_64.rpm% 6nBBBBBBsecurityImportant: open-vm-tools security update0Ohttps://access.redhat.com/errata/RHSA-2022:6358RHSA-2022:6358RHSA-2022:6358 https://access.redhat.com/security/cve/CVE-2022-31676CVE-2022-31676CVE-2022-31676https://bugzilla.redhat.com/21187142118714https://errata.almalinux.org/9/ALSA-2022-6358.htmlALSA-2022:6358ALSA-2022:6358 $jopen-vm-tools-desktop-11.3.5-1.el9_0.1.x86_64.rpm%jopen-vm-tools-sdmp-11.3.5-1.el9_0.1.x86_64.rpm&jopen-vm-tools-test-11.3.5-1.el9_0.1.x86_64.rpm#jopen-vm-tools-11.3.5-1.el9_0.1.x86_64.rpm$jopen-vm-tools-desktop-11.3.5-1.el9_0.1.x86_64.rpm%jopen-vm-tools-sdmp-11.3.5-1.el9_0.1.x86_64.rpm&jopen-vm-tools-test-11.3.5-1.el9_0.1.x86_64.rpm#jopen-vm-tools-11.3.5-1.el9_0.1.x86_64.rpm& wBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security and bugfix update0Vxhttps://access.redhat.com/errata/RHSA-2022:6521RHSA-2022:6521RHSA-2022:6521 https://access.redhat.com/security/cve/CVE-2022-38013CVE-2022-38013CVE-2022-38013https://bugzilla.redhat.com/21251242125124https://errata.almalinux.org/9/ALSA-2022-6521.htmlALSA-2022:6521ALSA-2022:6521 dotnet-templates-6.0-6.0.109-1.el9_0.x86_64.rpm}aspnetcore-runtime-6.0-6.0.9-1.el9_0.x86_64.rpm}dotnet-hostfxr-6.0-6.0.9-1.el9_0.x86_64.rpm}dotnet-host-6.0.9-1.el9_0.x86_64.rpm}dotnet-runtime-6.0-6.0.9-1.el9_0.x86_64.rpmdotnet-sdk-6.0-6.0.109-1.el9_0.x86_64.rpmnetstandard-targeting-pack-2.1-6.0.109-1.el9_0.x86_64.rpm}dotnet-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm}dotnet-apphost-pack-6.0-6.0.9-1.el9_0.x86_64.rpm}aspnetcore-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm dotnet-templates-6.0-6.0.109-1.el9_0.x86_64.rpm}aspnetcore-runtime-6.0-6.0.9-1.el9_0.x86_64.rpm}dotnet-hostfxr-6.0-6.0.9-1.el9_0.x86_64.rpm}dotnet-host-6.0.9-1.el9_0.x86_64.rpm}dotnet-runtime-6.0-6.0.9-1.el9_0.x86_64.rpmdotnet-sdk-6.0-6.0.109-1.el9_0.x86_64.rpmnetstandard-targeting-pack-2.1-6.0.109-1.el9_0.x86_64.rpm}dotnet-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm}dotnet-apphost-pack-6.0-6.0.9-1.el9_0.x86_64.rpm}aspnetcore-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm%' +LBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby security, bug fix, and enhancement update0NMhttps://access.redhat.com/errata/RHSA-2022:6585RHSA-2022:6585RHSA-2022:6585 https://access.redhat.com/security/cve/CVE-2022-28738CVE-2022-28738CVE-2022-28738https://access.redhat.com/security/cve/CVE-2022-28739CVE-2022-28739CVE-2022-28739https://bugzilla.redhat.com/20756852075685https://bugzilla.redhat.com/20756872075687https://errata.almalinux.org/9/ALSA-2022-6585.htmlALSA-2022:6585ALSA-2022:6585 uruby-libs-3.0.4-160.el9_0.x86_64.rpm)6rubygem-typeprof-0.15.2-160.el9_0.noarch.rpmtruby-devel-3.0.4-160.el9_0.x86_64.rpm+rubygems-devel-3.2.33-160.el9_0.noarch.rpm&2rubygem-rexml-3.2.5-160.el9_0.noarch.rpmuruby-libs-3.0.4-160.el9_0.i686.rpm'<rubygem-rss-0.2.9-160.el9_0.noarch.rpm7rubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpmruby-3.0.4-160.el9_0.i686.rpm(7rubygem-test-unit-3.3.7-160.el9_0.noarch.rpm#]rubygem-power_assert-1.2.0-160.el9_0.noarch.rpmrubygem-json-2.5.1-160.el9_0.x86_64.rpmrubygem-io-console-0.5.7-160.el9_0.x86_64.rpm*rubygems-3.2.33-160.el9_0.noarch.rpmkmrubygem-rbs-1.4.0-160.el9_0.noarch.rpm!irubygem-irb-1.3.5-160.el9_0.noarch.rpmruby-3.0.4-160.el9_0.x86_64.rpm rubygem-bundler-2.2.33-160.el9_0.noarch.rpm@rubygem-psych-3.3.2-160.el9_0.x86_64.rpmruby-default-gems-3.0.4-160.el9_0.noarch.rpm$yrubygem-rake-13.0.3-160.el9_0.noarch.rpm"Erubygem-minitest-5.14.2-160.el9_0.noarch.rpm%Orubygem-rdoc-6.3.3-160.el9_0.noarch.rpmtruby-devel-3.0.4-160.el9_0.i686.rpmuruby-libs-3.0.4-160.el9_0.x86_64.rpm)6rubygem-typeprof-0.15.2-160.el9_0.noarch.rpmtruby-devel-3.0.4-160.el9_0.x86_64.rpm+rubygems-devel-3.2.33-160.el9_0.noarch.rpm&2rubygem-rexml-3.2.5-160.el9_0.noarch.rpmuruby-libs-3.0.4-160.el9_0.i686.rpm'<rubygem-rss-0.2.9-160.el9_0.noarch.rpm7rubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpmruby-3.0.4-160.el9_0.i686.rpm(7rubygem-test-unit-3.3.7-160.el9_0.noarch.rpm#]rubygem-power_assert-1.2.0-160.el9_0.noarch.rpmrubygem-json-2.5.1-160.el9_0.x86_64.rpmrubygem-io-console-0.5.7-160.el9_0.x86_64.rpm*rubygems-3.2.33-160.el9_0.noarch.rpmkmrubygem-rbs-1.4.0-160.el9_0.noarch.rpm!irubygem-irb-1.3.5-160.el9_0.noarch.rpmruby-3.0.4-160.el9_0.x86_64.rpm rubygem-bundler-2.2.33-160.el9_0.noarch.rpm@rubygem-psych-3.3.2-160.el9_0.x86_64.rpmruby-default-gems-3.0.4-160.el9_0.noarch.rpm$yrubygem-rake-13.0.3-160.el9_0.noarch.rpm"Erubygem-minitest-5.14.2-160.el9_0.noarch.rpm%Orubygem-rdoc-6.3.3-160.el9_0.noarch.rpmtruby-devel-3.0.4-160.el9_0.i686.rpmR( 4lBBBBBBsecurityModerate: mysql security, bug fix, and enhancement update0eZhttps://access.redhat.com/errata/RHSA-2022:6590RHSA-2022:6590RHSA-2022:6590 https://access.redhat.com/security/cve/CVE-2022-21412CVE-2022-21412CVE-2022-21412https://access.redhat.com/security/cve/CVE-2022-21413CVE-2022-21413CVE-2022-21413https://access.redhat.com/security/cve/CVE-2022-21414CVE-2022-21414CVE-2022-21414https://access.redhat.com/security/cve/CVE-2022-21415CVE-2022-21415CVE-2022-21415https://access.redhat.com/security/cve/CVE-2022-21417CVE-2022-21417CVE-2022-21417https://access.redhat.com/security/cve/CVE-2022-21418CVE-2022-21418CVE-2022-21418https://access.redhat.com/security/cve/CVE-2022-21423CVE-2022-21423CVE-2022-21423https://access.redhat.com/security/cve/CVE-2022-21425CVE-2022-21425CVE-2022-21425https://access.redhat.com/security/cve/CVE-2022-21427CVE-2022-21427CVE-2022-21427https://access.redhat.com/security/cve/CVE-2022-21435CVE-2022-21435CVE-2022-21435https://access.redhat.com/security/cve/CVE-2022-21436CVE-2022-21436CVE-2022-21436https://access.redhat.com/security/cve/CVE-2022-21437CVE-2022-21437CVE-2022-21437https://access.redhat.com/security/cve/CVE-2022-21438CVE-2022-21438CVE-2022-21438https://access.redhat.com/security/cve/CVE-2022-21440CVE-2022-21440CVE-2022-21440https://access.redhat.com/security/cve/CVE-2022-21444CVE-2022-21444CVE-2022-21444https://access.redhat.com/security/cve/CVE-2022-21451CVE-2022-21451CVE-2022-21451https://access.redhat.com/security/cve/CVE-2022-21452CVE-2022-21452CVE-2022-21452https://access.redhat.com/security/cve/CVE-2022-21454CVE-2022-21454CVE-2022-21454https://access.redhat.com/security/cve/CVE-2022-21455CVE-2022-21455CVE-2022-21455https://access.redhat.com/security/cve/CVE-2022-21457CVE-2022-21457CVE-2022-21457https://access.redhat.com/security/cve/CVE-2022-21459CVE-2022-21459CVE-2022-21459https://access.redhat.com/security/cve/CVE-2022-21460CVE-2022-21460CVE-2022-21460https://access.redhat.com/security/cve/CVE-2022-21462CVE-2022-21462CVE-2022-21462https://access.redhat.com/security/cve/CVE-2022-21478CVE-2022-21478CVE-2022-21478https://access.redhat.com/security/cve/CVE-2022-21479CVE-2022-21479CVE-2022-21479https://access.redhat.com/security/cve/CVE-2022-21509CVE-2022-21509CVE-2022-21509https://access.redhat.com/security/cve/CVE-2022-21515CVE-2022-21515CVE-2022-21515https://access.redhat.com/security/cve/CVE-2022-21517CVE-2022-21517CVE-2022-21517https://access.redhat.com/security/cve/CVE-2022-21522CVE-2022-21522CVE-2022-21522https://access.redhat.com/security/cve/CVE-2022-21525CVE-2022-21525CVE-2022-21525https://access.redhat.com/security/cve/CVE-2022-21526CVE-2022-21526CVE-2022-21526https://access.redhat.com/security/cve/CVE-2022-21527CVE-2022-21527CVE-2022-21527https://access.redhat.com/security/cve/CVE-2022-21528CVE-2022-21528CVE-2022-21528https://access.redhat.com/security/cve/CVE-2022-21529CVE-2022-21529CVE-2022-21529https://access.redhat.com/security/cve/CVE-2022-21530CVE-2022-21530CVE-2022-21530https://access.redhat.com/security/cve/CVE-2022-21531CVE-2022-21531CVE-2022-21531https://access.redhat.com/security/cve/CVE-2022-21534CVE-2022-21534CVE-2022-21534https://access.redhat.com/security/cve/CVE-2022-21537CVE-2022-21537CVE-2022-21537https://access.redhat.com/security/cve/CVE-2022-21538CVE-2022-21538CVE-2022-21538https://access.redhat.com/security/cve/CVE-2022-21539CVE-2022-21539CVE-2022-21539https://access.redhat.com/security/cve/CVE-2022-21547CVE-2022-21547CVE-2022-21547https://access.redhat.com/security/cve/CVE-2022-21553CVE-2022-21553CVE-2022-21553https://access.redhat.com/security/cve/CVE-2022-21556CVE-2022-21556CVE-2022-21556https://access.redhat.com/security/cve/CVE-2022-21569CVE-2022-21569CVE-2022-21569https://bugzilla.redhat.com/20826362082636https://bugzilla.redhat.com/20826372082637https://bugzilla.redhat.com/20826382082638https://bugzilla.redhat.com/20826392082639https://bugzilla.redhat.com/20826402082640https://bugzilla.redhat.com/20826412082641https://bugzilla.redhat.com/20826422082642https://bugzilla.redhat.com/20826432082643https://bugzilla.redhat.com/20826442082644https://bugzilla.redhat.com/20826452082645https://bugzilla.redhat.com/20826462082646https://bugzilla.redhat.com/20826472082647https://bugzilla.redhat.com/20826482082648https://bugzilla.redhat.com/20826492082649https://bugzilla.redhat.com/20826502082650https://bugzilla.redhat.com/20826512082651https://bugzilla.redhat.com/20826522082652https://bugzilla.redhat.com/20826532082653https://bugzilla.redhat.com/20826542082654https://bugzilla.redhat.com/20826552082655https://bugzilla.redhat.com/20826562082656https://bugzilla.redhat.com/20826572082657https://bugzilla.redhat.com/20826582082658https://bugzilla.redhat.com/20826592082659https://bugzilla.redhat.com/21152822115282https://bugzilla.redhat.com/21152832115283https://bugzilla.redhat.com/21152842115284https://bugzilla.redhat.com/21152852115285https://bugzilla.redhat.com/21152862115286https://bugzilla.redhat.com/21152872115287https://bugzilla.redhat.com/21152882115288https://bugzilla.redhat.com/21152892115289https://bugzilla.redhat.com/21152902115290https://bugzilla.redhat.com/21152912115291https://bugzilla.redhat.com/21152922115292https://bugzilla.redhat.com/21152932115293https://bugzilla.redhat.com/21152942115294https://bugzilla.redhat.com/21152952115295https://bugzilla.redhat.com/21152962115296https://bugzilla.redhat.com/21152972115297https://bugzilla.redhat.com/21152982115298https://bugzilla.redhat.com/21152992115299https://bugzilla.redhat.com/21153002115300https://bugzilla.redhat.com/21153012115301https://errata.almalinux.org/9/ALSA-2022-6590.htmlALSA-2022:6590ALSA-2022:6590 Gtmysql-server-8.0.30-3.el9_0.x86_64.rpmtmysql-8.0.30-3.el9_0.x86_64.rpm.tmysql-errmsg-8.0.30-3.el9_0.x86_64.rpm-tmysql-common-8.0.30-3.el9_0.x86_64.rpmGtmysql-server-8.0.30-3.el9_0.x86_64.rpmtmysql-8.0.30-3.el9_0.x86_64.rpm.tmysql-errmsg-8.0.30-3.el9_0.x86_64.rpm-tmysql-common-8.0.30-3.el9_0.x86_64.rpmO) uBBBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security and bug fix update01https://access.redhat.com/errata/RHSA-2022:6595RHSA-2022:6595RHSA-2022:6595 https://access.redhat.com/security/cve/CVE-2020-28469CVE-2020-28469CVE-2020-28469https://access.redhat.com/security/cve/CVE-2020-7788CVE-2020-7788CVE-2020-7788https://access.redhat.com/security/cve/CVE-2021-33502CVE-2021-33502CVE-2021-33502https://access.redhat.com/security/cve/CVE-2021-3807CVE-2021-3807CVE-2021-3807https://access.redhat.com/security/cve/CVE-2022-29244CVE-2022-29244CVE-2022-29244https://access.redhat.com/security/cve/CVE-2022-32212CVE-2022-32212CVE-2022-32212https://access.redhat.com/security/cve/CVE-2022-32213CVE-2022-32213CVE-2022-32213https://access.redhat.com/security/cve/CVE-2022-32214CVE-2022-32214CVE-2022-32214https://access.redhat.com/security/cve/CVE-2022-32215CVE-2022-32215CVE-2022-32215https://access.redhat.com/security/cve/CVE-2022-33987CVE-2022-33987CVE-2022-33987https://bugzilla.redhat.com/19074441907444https://bugzilla.redhat.com/19454591945459https://bugzilla.redhat.com/19644611964461https://bugzilla.redhat.com/20075572007557https://bugzilla.redhat.com/20985562098556https://bugzilla.redhat.com/21020012102001https://bugzilla.redhat.com/21054222105422https://bugzilla.redhat.com/21054262105426https://bugzilla.redhat.com/21054282105428https://bugzilla.redhat.com/21054302105430https://errata.almalinux.org/9/ALSA-2022-6595.htmlALSA-2022:6595ALSA-2022:6595 f|npm-8.11.0-1.16.16.0.1.el9_0.x86_64.rpmnodejs-nodemon-2.0.19-1.el9_0.noarch.rpm{nodejs-libs-16.16.0-1.el9_0.x86_64.rpm9{nodejs-16.16.0-1.el9_0.x86_64.rpmh{nodejs-full-i18n-16.16.0-1.el9_0.x86_64.rpm{nodejs-libs-16.16.0-1.el9_0.i686.rpmN{nodejs-docs-16.16.0-1.el9_0.noarch.rpmf|npm-8.11.0-1.16.16.0.1.el9_0.x86_64.rpmnodejs-nodemon-2.0.19-1.el9_0.noarch.rpm{nodejs-libs-16.16.0-1.el9_0.x86_64.rpm9{nodejs-16.16.0-1.el9_0.x86_64.rpmh{nodejs-full-i18n-16.16.0-1.el9_0.x86_64.rpm{nodejs-libs-16.16.0-1.el9_0.i686.rpmN{nodejs-docs-16.16.0-1.el9_0.noarch.rpm* AsecurityModerate: gnupg2 security update01(https://access.redhat.com/errata/RHSA-2022:6602RHSA-2022:6602RHSA-2022:6602 https://access.redhat.com/security/cve/CVE-2022-34903CVE-2022-34903CVE-2022-34903https://bugzilla.redhat.com/21028682102868https://errata.almalinux.org/9/ALSA-2022-6602.htmlALSA-2022:6602ALSA-2022:6602 7gnupg2-smime-2.3.3-2.el9_0.x86_64.rpm7gnupg2-smime-2.3.3-2.el9_0.x86_64.rpm'+ DBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0Y=https://access.redhat.com/errata/RHSA-2022:6610RHSA-2022:6610RHSA-2022:6610 https://access.redhat.com/security/cve/CVE-2022-2078CVE-2022-2078CVE-2022-2078https://access.redhat.com/security/cve/CVE-2022-34918CVE-2022-34918CVE-2022-34918https://bugzilla.redhat.com/20961782096178https://bugzilla.redhat.com/21044232104423https://errata.almalinux.org/9/ALSA-2022-6610.htmlALSA-2022:6610ALSA-2022:6610 "-kernel-debug-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm-kernel-doc-5.14.0-70.26.1.el9_0.noarch.rpm#-kernel-devel-5.14.0-70.26.1.el9_0.x86_64.rpm$-kernel-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm!-kernel-debug-devel-5.14.0-70.26.1.el9_0.x86_64.rpm%-perf-5.14.0-70.26.1.el9_0.x86_64.rpm"-kernel-debug-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm-kernel-doc-5.14.0-70.26.1.el9_0.noarch.rpm#-kernel-devel-5.14.0-70.26.1.el9_0.x86_64.rpm$-kernel-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm!-kernel-debug-devel-5.14.0-70.26.1.el9_0.x86_64.rpm%-perf-5.14.0-70.26.1.el9_0.x86_64.rpm&, PBBBBBBBBBBsecurityModerate: webkit2gtk3 security update0uhttps://access.redhat.com/errata/RHSA-2022:6634RHSA-2022:6634RHSA-2022:6634 https://access.redhat.com/security/cve/CVE-2022-32893CVE-2022-32893CVE-2022-32893https://bugzilla.redhat.com/21216452121645https://errata.almalinux.org/9/ALSA-2022-6634.htmlALSA-2022:6634ALSA-2022:6634 2^webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm3^webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm1^webkit2gtk3-2.36.7-1.el9_0.i686.rpm4^webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm2^webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm1^webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm4^webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm3^webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpm2^webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm3^webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm1^webkit2gtk3-2.36.7-1.el9_0.i686.rpm4^webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm2^webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm1^webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm4^webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm3^webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpmT- ]securityImportant: firefox security update0 yhttps://access.redhat.com/errata/RHSA-2022:6700RHSA-2022:6700RHSA-2022:6700 https://access.redhat.com/security/cve/CVE-2022-40956CVE-2022-40956CVE-2022-40956https://access.redhat.com/security/cve/CVE-2022-40957CVE-2022-40957CVE-2022-40957https://access.redhat.com/security/cve/CVE-2022-40958CVE-2022-40958CVE-2022-40958https://access.redhat.com/security/cve/CVE-2022-40959CVE-2022-40959CVE-2022-40959https://access.redhat.com/security/cve/CVE-2022-40960CVE-2022-40960CVE-2022-40960https://access.redhat.com/security/cve/CVE-2022-40962CVE-2022-40962CVE-2022-40962https://bugzilla.redhat.com/21287922128792https://bugzilla.redhat.com/21287932128793https://bugzilla.redhat.com/21287942128794https://bugzilla.redhat.com/21287952128795https://bugzilla.redhat.com/21287962128796https://bugzilla.redhat.com/21287972128797https://errata.almalinux.org/9/ALSA-2022-6700.htmlALSA-2022:6700ALSA-2022:6700 8>firefox-102.3.0-6.el9_0.alma.x86_64.rpm8>firefox-102.3.0-6.el9_0.alma.x86_64.rpm. "`securityImportant: thunderbird security update0https://access.redhat.com/errata/RHSA-2022:6717RHSA-2022:6717RHSA-2022:6717 https://access.redhat.com/security/cve/CVE-2022-3032CVE-2022-3032CVE-2022-3032https://access.redhat.com/security/cve/CVE-2022-3033CVE-2022-3033CVE-2022-3033https://access.redhat.com/security/cve/CVE-2022-3034CVE-2022-3034CVE-2022-3034https://access.redhat.com/security/cve/CVE-2022-36059CVE-2022-36059CVE-2022-36059https://access.redhat.com/security/cve/CVE-2022-40956CVE-2022-40956CVE-2022-40956https://access.redhat.com/security/cve/CVE-2022-40957CVE-2022-40957CVE-2022-40957https://access.redhat.com/security/cve/CVE-2022-40958CVE-2022-40958CVE-2022-40958https://access.redhat.com/security/cve/CVE-2022-40959CVE-2022-40959CVE-2022-40959https://access.redhat.com/security/cve/CVE-2022-40960CVE-2022-40960CVE-2022-40960https://access.redhat.com/security/cve/CVE-2022-40962CVE-2022-40962CVE-2022-40962https://bugzilla.redhat.com/21232552123255https://bugzilla.redhat.com/21232562123256https://bugzilla.redhat.com/21232572123257https://bugzilla.redhat.com/21232582123258https://bugzilla.redhat.com/21287922128792https://bugzilla.redhat.com/21287932128793https://bugzilla.redhat.com/21287942128794https://bugzilla.redhat.com/21287952128795https://bugzilla.redhat.com/21287962128796https://bugzilla.redhat.com/21287972128797https://errata.almalinux.org/9/ALSA-2022-6717.htmlALSA-2022:6717ALSA-2022:6717 :=thunderbird-102.3.0-3.el9_0.alma.x86_64.rpm:=thunderbird-102.3.0-3.el9_0.alma.x86_64.rpm1/ 0cBBBBBBBBBBBsecurityImportant: bind security update0https://access.redhat.com/errata/RHSA-2022:6763RHSA-2022:6763RHSA-2022:6763 https://access.redhat.com/security/cve/CVE-2022-3080CVE-2022-3080CVE-2022-3080https://access.redhat.com/security/cve/CVE-2022-38177CVE-2022-38177CVE-2022-38177https://access.redhat.com/security/cve/CVE-2022-38178CVE-2022-38178CVE-2022-38178https://bugzilla.redhat.com/21286002128600https://bugzilla.redhat.com/21286012128601https://bugzilla.redhat.com/21286022128602https://errata.almalinux.org/9/ALSA-2022-6763.htmlALSA-2022:6763ALSA-2022:6763 ]Dbind-utils-9.16.23-1.el9_0.1.x86_64.rpm*Dbind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpmZDbind-chroot-9.16.23-1.el9_0.1.x86_64.rpm\Dbind-libs-9.16.23-1.el9_0.1.x86_64.rpmYDbind-9.16.23-1.el9_0.1.x86_64.rpm7Dpython3-bind-9.16.23-1.el9_0.1.noarch.rpm[Dbind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpm+Dbind-license-9.16.23-1.el9_0.1.noarch.rpm]Dbind-utils-9.16.23-1.el9_0.1.x86_64.rpm*Dbind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpmZDbind-chroot-9.16.23-1.el9_0.1.x86_64.rpm\Dbind-libs-9.16.23-1.el9_0.1.x86_64.rpmYDbind-9.16.23-1.el9_0.1.x86_64.rpm7Dpython3-bind-9.16.23-1.el9_0.1.noarch.rpm[Dbind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpm+Dbind-license-9.16.23-1.el9_0.1.noarch.rpm 0 3qsecurityImportant: expat security update0"Uhttps://access.redhat.com/errata/RHSA-2022:6838RHSA-2022:6838RHSA-2022:6838 https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-6838.htmlALSA-2022:6838ALSA-2022:6838 sexpat-devel-2.2.10-12.el9_0.3.x86_64.rpmsexpat-devel-2.2.10-12.el9_0.3.x86_64.rpm1 6tsecurityImportant: squid security update0w https://access.redhat.com/errata/RHSA-2022:6839RHSA-2022:6839RHSA-2022:6839 https://access.redhat.com/security/cve/CVE-2022-41318CVE-2022-41318CVE-2022-41318https://bugzilla.redhat.com/21297712129771https://errata.almalinux.org/9/ALSA-2022-6839.htmlALSA-2022:6839ALSA-2022:6839  ~squid-5.2-1.el9_0.2.x86_64.rpm ~squid-5.2-1.el9_0.2.x86_64.rpm2 wBBBBBBBBBsecurityModerate: gnutls and nettle security, bug fix, and enhancement update02https://access.redhat.com/errata/RHSA-2022:6854RHSA-2022:6854RHSA-2022:6854 https://access.redhat.com/security/cve/CVE-2022-2509CVE-2022-2509CVE-2022-2509https://bugzilla.redhat.com/21089772108977https://errata.almalinux.org/9/ALSA-2022-6854.htmlALSA-2022:6854ALSA-2022:6854 \gnutls-dane-3.7.6-12.el9_0.x86_64.rpm\gnutls-dane-3.7.6-12.el9_0.i686.rpm\gnutls-c++-3.7.6-12.el9_0.x86_64.rpm\gnutls-c++-3.7.6-12.el9_0.i686.rpm|\gnutls-utils-3.7.6-12.el9_0.x86_64.rpm\gnutls-devel-3.7.6-12.el9_0.x86_64.rpm\gnutls-devel-3.7.6-12.el9_0.i686.rpm\gnutls-dane-3.7.6-12.el9_0.x86_64.rpm\gnutls-dane-3.7.6-12.el9_0.i686.rpm\gnutls-c++-3.7.6-12.el9_0.x86_64.rpm\gnutls-c++-3.7.6-12.el9_0.i686.rpm|\gnutls-utils-3.7.6-12.el9_0.x86_64.rpm\gnutls-devel-3.7.6-12.el9_0.x86_64.rpm\gnutls-devel-3.7.6-12.el9_0.i686.rpm3 CBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security and bugfix update06Vhttps://access.redhat.com/errata/RHSA-2022:6913RHSA-2022:6913RHSA-2022:6913 https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-6913.htmlALSA-2022:6913ALSA-2022:6913 {dotnet-host-6.0.10-1.el9_0.x86_64.rpmdotnet-sdk-6.0-6.0.110-1.el9_0.x86_64.rpmnetstandard-targeting-pack-2.1-6.0.110-1.el9_0.x86_64.rpm{aspnetcore-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm{dotnet-hostfxr-6.0-6.0.10-1.el9_0.x86_64.rpm{dotnet-apphost-pack-6.0-6.0.10-1.el9_0.x86_64.rpmdotnet-templates-6.0-6.0.110-1.el9_0.x86_64.rpm{dotnet-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm{dotnet-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm{aspnetcore-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm {dotnet-host-6.0.10-1.el9_0.x86_64.rpmdotnet-sdk-6.0-6.0.110-1.el9_0.x86_64.rpmnetstandard-targeting-pack-2.1-6.0.110-1.el9_0.x86_64.rpm{aspnetcore-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm{dotnet-hostfxr-6.0-6.0.10-1.el9_0.x86_64.rpm{dotnet-apphost-pack-6.0-6.0.10-1.el9_0.x86_64.rpmdotnet-templates-6.0-6.0.110-1.el9_0.x86_64.rpm{dotnet-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm{dotnet-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm{aspnetcore-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm;4 "XBBBBBBBBsecurityImportant: nodejs security update0 Ohttps://access.redhat.com/errata/RHSA-2022:6963RHSA-2022:6963RHSA-2022:6963 https://access.redhat.com/security/cve/CVE-2022-35255CVE-2022-35255CVE-2022-35255https://access.redhat.com/security/cve/CVE-2022-35256CVE-2022-35256CVE-2022-35256https://bugzilla.redhat.com/21305172130517https://bugzilla.redhat.com/21305182130518https://errata.almalinux.org/9/ALSA-2022-6963.htmlALSA-2022:6963ALSA-2022:6963 N|nodejs-docs-16.17.1-1.el9_0.noarch.rpm|nodejs-libs-16.17.1-1.el9_0.x86_64.rpmh|nodejs-full-i18n-16.17.1-1.el9_0.x86_64.rpm9|nodejs-16.17.1-1.el9_0.x86_64.rpm|nodejs-libs-16.17.1-1.el9_0.i686.rpmf}npm-8.15.0-1.16.17.1.1.el9_0.x86_64.rpmN|nodejs-docs-16.17.1-1.el9_0.noarch.rpm|nodejs-libs-16.17.1-1.el9_0.x86_64.rpmh|nodejs-full-i18n-16.17.1-1.el9_0.x86_64.rpm9|nodejs-16.17.1-1.el9_0.x86_64.rpm|nodejs-libs-16.17.1-1.el9_0.i686.rpmf}npm-8.15.0-1.16.17.1.1.el9_0.x86_64.rpm^5 5cBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update0[ https://access.redhat.com/errata/RHSA-2022:6999RHSA-2022:6999RHSA-2022:6999 https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-6999.htmlALSA-2022:6999ALSA-2022:6999 java-17-openjdk-jmods-17.0.5.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-src-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-static-libs-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-demo-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-headless-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-devel-17.0.5.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-jmods-17.0.5.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-src-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-static-libs-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-demo-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-headless-17.0.5.0.8-2.el9_0.x86_64.rpm java-17-openjdk-devel-17.0.5.0.8-2.el9_0.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0.x86_64.rpm6 vBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update0e_ https://access.redhat.com/errata/RHSA-2022:7007RHSA-2022:7007RHSA-2022:7007 https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://errata.almalinux.org/9/ALSA-2022-7007.htmlALSA-2022:7007ALSA-2022:7007 ;,java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpm3,java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpm5,java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpm6,java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpm4,java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpm2,java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpm:,java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpm;,java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpm3,java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpm5,java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpm6,java-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpm4,java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpm2,java-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpm:,java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpmɷ7 CBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update0D https://access.redhat.com/errata/RHSA-2022:7013RHSA-2022:7013RHSA-2022:7013 https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-7013.htmlALSA-2022:7013ALSA-2022:7013 svjava-11-openjdk-src-11.0.17.0.8-2.el9_0.x86_64.rpmqvjava-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0.x86_64.rpmrvjava-11-openjdk-jmods-11.0.17.0.8-2.el9_0.x86_64.rpmnvjava-11-openjdk-devel-11.0.17.0.8-2.el9_0.x86_64.rpmpvjava-11-openjdk-javadoc-11.0.17.0.8-2.el9_0.x86_64.rpmovjava-11-openjdk-headless-11.0.17.0.8-2.el9_0.x86_64.rpmtvjava-11-openjdk-static-libs-11.0.17.0.8-2.el9_0.x86_64.rpmmvjava-11-openjdk-demo-11.0.17.0.8-2.el9_0.x86_64.rpmlvjava-11-openjdk-11.0.17.0.8-2.el9_0.x86_64.rpm svjava-11-openjdk-src-11.0.17.0.8-2.el9_0.x86_64.rpmqvjava-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0.x86_64.rpmrvjava-11-openjdk-jmods-11.0.17.0.8-2.el9_0.x86_64.rpmnvjava-11-openjdk-devel-11.0.17.0.8-2.el9_0.x86_64.rpmpvjava-11-openjdk-javadoc-11.0.17.0.8-2.el9_0.x86_64.rpmovjava-11-openjdk-headless-11.0.17.0.8-2.el9_0.x86_64.rpmtvjava-11-openjdk-static-libs-11.0.17.0.8-2.el9_0.x86_64.rpmmvjava-11-openjdk-demo-11.0.17.0.8-2.el9_0.x86_64.rpmlvjava-11-openjdk-11.0.17.0.8-2.el9_0.x86_64.rpm8 VsecurityImportant: firefox security update0OKhttps://access.redhat.com/errata/RHSA-2022:7020RHSA-2022:7020RHSA-2022:7020 https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-7020.htmlALSA-2022:7020ALSA-2022:7020 8?firefox-102.3.0-7.el9_0.alma.x86_64.rpm8?firefox-102.3.0-7.el9_0.alma.x86_64.rpm+9 YsecurityImportant: firefox security update0) https://access.redhat.com/errata/RHSA-2022:7071RHSA-2022:7071RHSA-2022:7071 https://access.redhat.com/security/cve/CVE-2022-42927CVE-2022-42927CVE-2022-42927https://access.redhat.com/security/cve/CVE-2022-42928CVE-2022-42928CVE-2022-42928https://access.redhat.com/security/cve/CVE-2022-42929CVE-2022-42929CVE-2022-42929https://access.redhat.com/security/cve/CVE-2022-42932CVE-2022-42932CVE-2022-42932https://bugzilla.redhat.com/21361562136156https://bugzilla.redhat.com/21361572136157https://bugzilla.redhat.com/21361582136158https://bugzilla.redhat.com/21361592136159https://errata.almalinux.org/9/ALSA-2022-7071.htmlALSA-2022:7071ALSA-2022:7071 8vfirefox-102.4.0-1.el9_0.alma.x86_64.rpm8vfirefox-102.4.0-1.el9_0.alma.x86_64.rpmA: \securityImportant: thunderbird security update0C>https://access.redhat.com/errata/RHSA-2022:7178RHSA-2022:7178RHSA-2022:7178 https://access.redhat.com/security/cve/CVE-2022-39236CVE-2022-39236CVE-2022-39236https://access.redhat.com/security/cve/CVE-2022-39249CVE-2022-39249CVE-2022-39249https://access.redhat.com/security/cve/CVE-2022-39250CVE-2022-39250CVE-2022-39250https://access.redhat.com/security/cve/CVE-2022-39251CVE-2022-39251CVE-2022-39251https://access.redhat.com/security/cve/CVE-2022-42927CVE-2022-42927CVE-2022-42927https://access.redhat.com/security/cve/CVE-2022-42928CVE-2022-42928CVE-2022-42928https://access.redhat.com/security/cve/CVE-2022-42929CVE-2022-42929CVE-2022-42929https://access.redhat.com/security/cve/CVE-2022-42932CVE-2022-42932CVE-2022-42932https://bugzilla.redhat.com/21353912135391https://bugzilla.redhat.com/21353932135393https://bugzilla.redhat.com/21353952135395https://bugzilla.redhat.com/21353962135396https://bugzilla.redhat.com/21361562136156https://bugzilla.redhat.com/21361572136157https://bugzilla.redhat.com/21361582136158https://bugzilla.redhat.com/21361592136159https://errata.almalinux.org/9/ALSA-2022-7178.htmlALSA-2022:7178ALSA-2022:7178 :vthunderbird-102.4.0-1.el9_0.alma.x86_64.rpm:vthunderbird-102.4.0-1.el9_0.alma.x86_64.rpm:; $_BBBsecurityImportant: openssl security update0https://access.redhat.com/errata/RHSA-2022:7288RHSA-2022:7288RHSA-2022:7288 https://access.redhat.com/security/cve/CVE-2022-3602CVE-2022-3602CVE-2022-3602https://access.redhat.com/security/cve/CVE-2022-3786CVE-2022-3786CVE-2022-3786https://bugzilla.redhat.com/21377232137723https://bugzilla.redhat.com/21391042139104https://errata.almalinux.org/9/ALSA-2022-7288.htmlALSA-2022:7288ALSA-2022:7288  ^openssl-devel-3.0.1-43.el9_0.x86_64.rpm ^openssl-devel-3.0.1-43.el9_0.i686.rpmJ^openssl-perl-3.0.1-43.el9_0.x86_64.rpm ^openssl-devel-3.0.1-43.el9_0.x86_64.rpm ^openssl-devel-3.0.1-43.el9_0.i686.rpmJ^openssl-perl-3.0.1-43.el9_0.x86_64.rpmh< 'esecurityModerate: zlib security update0Ohttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314 https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314 0!zlib-devel-1.2.11-32.el9_0.i686.rpm0!zlib-devel-1.2.11-32.el9_0.i686.rpmO= 5hBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update0chttps://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318 https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318 kernel-doc-5.14.0-70.30.1.el9_0.noarch.rpm%perf-5.14.0-70.30.1.el9_0.x86_64.rpm"kernel-debug-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm$kernel-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm&kernel-headers-5.14.0-70.30.1.el9_0.x86_64.rpm!kernel-debug-devel-5.14.0-70.30.1.el9_0.x86_64.rpm#kernel-devel-5.14.0-70.30.1.el9_0.x86_64.rpmkernel-doc-5.14.0-70.30.1.el9_0.noarch.rpm%perf-5.14.0-70.30.1.el9_0.x86_64.rpm"kernel-debug-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm$kernel-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm&kernel-headers-5.14.0-70.30.1.el9_0.x86_64.rpm!kernel-debug-devel-5.14.0-70.30.1.el9_0.x86_64.rpm#kernel-devel-5.14.0-70.30.1.el9_0.x86_64.rpm^> ;vBBBsecurityModerate: python3.9 security update0fnhttps://access.redhat.com/errata/RHSA-2022:7323RHSA-2022:7323RHSA-2022:7323 https://access.redhat.com/security/cve/CVE-2020-10735CVE-2020-10735CVE-2020-10735https://bugzilla.redhat.com/18344231834423https://errata.almalinux.org/9/ALSA-2022-7323.htmlALSA-2022:7323ALSA-2022:7323 =python3-tkinter-3.9.10-3.el9_0.x86_64.rpmjpython-unversioned-command-3.9.10-3.el9_0.noarch.rpmWpython3-devel-3.9.10-3.el9_0.x86_64.rpm=python3-tkinter-3.9.10-3.el9_0.x86_64.rpmjpython-unversioned-command-3.9.10-3.el9_0.noarch.rpmWpython3-devel-3.9.10-3.el9_0.x86_64.rpm? NBBBBBBiBBsecurityImportant: pki-core security update0Thttps://access.redhat.com/errata/RHSA-2022:7326RHSA-2022:7326RHSA-2022:7326 https://access.redhat.com/security/cve/CVE-2022-2414CVE-2022-2414CVE-2022-2414https://bugzilla.redhat.com/21046762104676https://errata.almalinux.org/9/ALSA-2022-7326.htmlALSA-2022:7326ALSA-2022:7326 YBpki-symkey-11.0.6-2.el9_0.x86_64.rpmaBpython3-pki-11.0.6-2.el9_0.noarch.rpmXBpki-kra-11.0.6-2.el9_0.noarch.rpmQBpki-base-java-11.0.6-2.el9_0.noarch.rpmOBpki-acme-11.0.6-2.el9_0.noarch.rpmYBpki-server-11.0.6-2.el9_0.noarch.rpmZBpki-tools-11.0.6-2.el9_0.x86_64.rpmPBpki-base-11.0.6-2.el9_0.noarch.rpmRBpki-ca-11.0.6-2.el9_0.noarch.rpm YBpki-symkey-11.0.6-2.el9_0.x86_64.rpmaBpython3-pki-11.0.6-2.el9_0.noarch.rpmXBpki-kra-11.0.6-2.el9_0.noarch.rpmQBpki-base-java-11.0.6-2.el9_0.noarch.rpmOBpki-acme-11.0.6-2.el9_0.noarch.rpmYBpki-server-11.0.6-2.el9_0.noarch.rpmZBpki-tools-11.0.6-2.el9_0.x86_64.rpmPBpki-base-11.0.6-2.el9_0.noarch.rpmRBpki-ca-11.0.6-2.el9_0.noarch.rpm @ AsecurityModerate: lua security update0phttps://access.redhat.com/errata/RHSA-2022:7329RHSA-2022:7329RHSA-2022:7329 https://access.redhat.com/security/cve/CVE-2022-33099CVE-2022-33099CVE-2022-33099https://bugzilla.redhat.com/21044272104427https://errata.almalinux.org/9/ALSA-2022-7329.htmlALSA-2022:7329ALSA-2022:7329 uolua-5.4.2-4.el9_0.3.x86_64.rpmuolua-5.4.2-4.el9_0.3.x86_64.rpmA DsecurityLow: Image Builder security, bug fix, and enhancement update0* https://access.redhat.com/errata/RHSA-2022:7950RHSA-2022:7950RHSA-2022:7950 https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://bugzilla.redhat.com/21138142113814https://errata.almalinux.org/9/ALSA-2022-7950.htmlALSA-2022:7950ALSA-2022:7950 Lweldr-client-35.5-4.el9.x86_64.rpmLweldr-client-35.5-4.el9.x86_64.rpm݆B GBBBBBBBBBsecurityModerate: podman security and bug fix update0zhttps://access.redhat.com/errata/RHSA-2022:7954RHSA-2022:7954RHSA-2022:7954 https://access.redhat.com/security/cve/CVE-2020-28851CVE-2020-28851CVE-2020-28851https://access.redhat.com/security/cve/CVE-2020-28852CVE-2020-28852CVE-2020-28852https://access.redhat.com/security/cve/CVE-2021-20199CVE-2021-20199CVE-2021-20199https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33197CVE-2021-33197CVE-2021-33197https://access.redhat.com/security/cve/CVE-2021-34558CVE-2021-34558CVE-2021-34558https://access.redhat.com/security/cve/CVE-2021-4024CVE-2021-4024CVE-2021-4024https://access.redhat.com/security/cve/CVE-2022-27191CVE-2022-27191CVE-2022-27191https://bugzilla.redhat.com/19133331913333https://bugzilla.redhat.com/19133381913338https://bugzilla.redhat.com/19190501919050https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19835961983596https://bugzilla.redhat.com/19895701989570https://bugzilla.redhat.com/20266752026675https://bugzilla.redhat.com/20647022064702https://errata.almalinux.org/9/ALSA-2022-7954.htmlALSA-2022:7954ALSA-2022:7954 4#podman-remote-4.2.0-3.el9.x86_64.rpm5#podman-tests-4.2.0-3.el9.x86_64.rpmE#podman-gvproxy-4.2.0-3.el9.x86_64.rpm2#podman-4.2.0-3.el9.x86_64.rpmg#podman-docker-4.2.0-3.el9.noarch.rpm3#podman-plugins-4.2.0-3.el9.x86_64.rpm4#podman-remote-4.2.0-3.el9.x86_64.rpm5#podman-tests-4.2.0-3.el9.x86_64.rpmE#podman-gvproxy-4.2.0-3.el9.x86_64.rpm2#podman-4.2.0-3.el9.x86_64.rpmg#podman-docker-4.2.0-3.el9.noarch.rpm3#podman-plugins-4.2.0-3.el9.x86_64.rpmܸNC SBBsecurityModerate: skopeo security and bug fix update0?https://access.redhat.com/errata/RHSA-2022:7955RHSA-2022:7955RHSA-2022:7955 https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33198CVE-2021-33198CVE-2021-33198https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19895751989575https://errata.almalinux.org/9/ALSA-2022-7955.htmlALSA-2022:7955ALSA-2022:7955 9?skopeo-tests-1.9.2-1.el9.x86_64.rpm8?skopeo-1.9.2-1.el9.x86_64.rpm9?skopeo-tests-1.9.2-1.el9.x86_64.rpm8?skopeo-1.9.2-1.el9.x86_64.rpmܷ-D (XBBBBBBBBBBBBBBsecurityLow: libguestfs security, bug fix, and enhancement update0*Ghttps://access.redhat.com/errata/RHSA-2022:7958RHSA-2022:7958RHSA-2022:7958 https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7958.htmlALSA-2022:7958ALSA-2022:7958 '@libguestfs-rsync-1.48.4-2.el9.alma.x86_64.rpm&@libguestfs-rescue-1.48.4-2.el9.alma.x86_64.rpm(@libguestfs-xfs-1.48.4-2.el9.alma.x86_64.rpmm@python3-libguestfs-1.48.4-2.el9.alma.x86_64.rpm$@libguestfs-1.48.4-2.el9.alma.x86_64.rpm%@libguestfs-appliance-1.48.4-2.el9.alma.x86_64.rpmQ@perl-Sys-Guestfs-1.48.4-2.el9.alma.x86_64.rpmx@libguestfs-inspect-icons-1.48.4-2.el9.alma.noarch.rpmw@libguestfs-bash-completion-1.48.4-2.el9.alma.noarch.rpm '@libguestfs-rsync-1.48.4-2.el9.alma.x86_64.rpm&@libguestfs-rescue-1.48.4-2.el9.alma.x86_64.rpm(@libguestfs-xfs-1.48.4-2.el9.alma.x86_64.rpmm@python3-libguestfs-1.48.4-2.el9.alma.x86_64.rpm$@libguestfs-1.48.4-2.el9.alma.x86_64.rpm%@libguestfs-appliance-1.48.4-2.el9.alma.x86_64.rpmQ@perl-Sys-Guestfs-1.48.4-2.el9.alma.x86_64.rpmx@libguestfs-inspect-icons-1.48.4-2.el9.alma.noarch.rpmw@libguestfs-bash-completion-1.48.4-2.el9.alma.noarch.rpmܵhE ,iBsecurityLow: guestfs-tools security, bug fix, and enhancement update0*Whttps://access.redhat.com/errata/RHSA-2022:7959RHSA-2022:7959RHSA-2022:7959 https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7959.htmlALSA-2022:7959ALSA-2022:7959 g)guestfs-tools-1.48.2-5.el9.x86_64.rpmY)virt-win-reg-1.48.2-5.el9.noarch.rpmg)guestfs-tools-1.48.2-5.el9.x86_64.rpmY)virt-win-reg-1.48.2-5.el9.noarch.rpmܴ<F mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security, bug fix, and enhancement update0nS https://access.redhat.com/errata/RHSA-2022:7967RHSA-2022:7967RHSA-2022:7967 https://access.redhat.com/security/cve/CVE-2021-3507CVE-2021-3507CVE-2021-3507https://access.redhat.com/security/cve/CVE-2021-3611CVE-2021-3611CVE-2021-3611https://access.redhat.com/security/cve/CVE-2021-3750CVE-2021-3750CVE-2021-3750https://access.redhat.com/security/cve/CVE-2021-4158CVE-2021-4158CVE-2021-4158https://bugzilla.redhat.com/19511181951118https://bugzilla.redhat.com/19737841973784https://bugzilla.redhat.com/19990731999073https://bugzilla.redhat.com/20350022035002https://errata.almalinux.org/9/ALSA-2022-7967.htmlALSA-2022:7967ALSA-2022:7967 nUqemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9.x86_64.rpmRUqemu-kvm-core-7.0.0-13.el9.x86_64.rpmoUqemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9.x86_64.rpmLUqemu-img-7.0.0-13.el9.x86_64.rpmYUqemu-kvm-tools-7.0.0-13.el9.x86_64.rpm\Uqemu-pr-helper-7.0.0-13.el9.x86_64.rpmNUqemu-kvm-audio-pa-7.0.0-13.el9.x86_64.rpmMUqemu-kvm-7.0.0-13.el9.x86_64.rpmZUqemu-kvm-ui-egl-headless-7.0.0-13.el9.x86_64.rpmpUqemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9.x86_64.rpmTUqemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9.x86_64.rpmUUqemu-kvm-device-display-virtio-vga-7.0.0-13.el9.x86_64.rpm[Uqemu-kvm-ui-opengl-7.0.0-13.el9.x86_64.rpmPUqemu-kvm-block-rbd-7.0.0-13.el9.x86_64.rpmKUqemu-guest-agent-7.0.0-13.el9.x86_64.rpmQUqemu-kvm-common-7.0.0-13.el9.x86_64.rpmSUqemu-kvm-device-display-virtio-gpu-7.0.0-13.el9.x86_64.rpmVUqemu-kvm-device-usb-host-7.0.0-13.el9.x86_64.rpmWUqemu-kvm-device-usb-redirect-7.0.0-13.el9.x86_64.rpmOUqemu-kvm-block-curl-7.0.0-13.el9.x86_64.rpmXUqemu-kvm-docs-7.0.0-13.el9.x86_64.rpmnUqemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9.x86_64.rpmRUqemu-kvm-core-7.0.0-13.el9.x86_64.rpmoUqemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9.x86_64.rpmLUqemu-img-7.0.0-13.el9.x86_64.rpmYUqemu-kvm-tools-7.0.0-13.el9.x86_64.rpm\Uqemu-pr-helper-7.0.0-13.el9.x86_64.rpmNUqemu-kvm-audio-pa-7.0.0-13.el9.x86_64.rpmMUqemu-kvm-7.0.0-13.el9.x86_64.rpmZUqemu-kvm-ui-egl-headless-7.0.0-13.el9.x86_64.rpmpUqemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9.x86_64.rpmTUqemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9.x86_64.rpmUUqemu-kvm-device-display-virtio-vga-7.0.0-13.el9.x86_64.rpm[Uqemu-kvm-ui-opengl-7.0.0-13.el9.x86_64.rpmPUqemu-kvm-block-rbd-7.0.0-13.el9.x86_64.rpmKUqemu-guest-agent-7.0.0-13.el9.x86_64.rpmQUqemu-kvm-common-7.0.0-13.el9.x86_64.rpmSUqemu-kvm-device-display-virtio-gpu-7.0.0-13.el9.x86_64.rpmVUqemu-kvm-device-usb-host-7.0.0-13.el9.x86_64.rpmWUqemu-kvm-device-usb-redirect-7.0.0-13.el9.x86_64.rpmOUqemu-kvm-block-curl-7.0.0-13.el9.x86_64.rpmXUqemu-kvm-docs-7.0.0-13.el9.x86_64.rpmܳ&G XBsecurityLow: virt-v2v security, bug fix, and enhancement update0*Alhttps://access.redhat.com/errata/RHSA-2022:7968RHSA-2022:7968RHSA-2022:7968 https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7968.htmlALSA-2022:7968ALSA-2022:7968 X3virt-v2v-bash-completion-2.0.7-6.el9.noarch.rpm+3virt-v2v-2.0.7-6.el9.x86_64.rpmX3virt-v2v-bash-completion-2.0.7-6.el9.noarch.rpm+3virt-v2v-2.0.7-6.el9.x86_64.rpmܲH #\BBBBBsecurityModerate: protobuf security update0-Nhttps://access.redhat.com/errata/RHSA-2022:7970RHSA-2022:7970RHSA-2022:7970 https://access.redhat.com/security/cve/CVE-2021-22570CVE-2021-22570CVE-2021-22570https://bugzilla.redhat.com/20494292049429https://errata.almalinux.org/9/ALSA-2022-7970.htmlALSA-2022:7970ALSA-2022:7970 8eprotobuf-3.14.0-13.el9.i686.rpm9eprotobuf-lite-3.14.0-13.el9.x86_64.rpm8eprotobuf-3.14.0-13.el9.x86_64.rpmhepython3-protobuf-3.14.0-13.el9.noarch.rpm9eprotobuf-lite-3.14.0-13.el9.i686.rpm8eprotobuf-3.14.0-13.el9.i686.rpm9eprotobuf-lite-3.14.0-13.el9.x86_64.rpm8eprotobuf-3.14.0-13.el9.x86_64.rpmhepython3-protobuf-3.14.0-13.el9.noarch.rpm9eprotobuf-lite-3.14.0-13.el9.i686.rpmނhI )dBBBsecurityModerate: gimp security and enhancement update0{https://access.redhat.com/errata/RHSA-2022:7978RHSA-2022:7978RHSA-2022:7978 https://access.redhat.com/security/cve/CVE-2022-30067CVE-2022-30067CVE-2022-30067https://access.redhat.com/security/cve/CVE-2022-32990CVE-2022-32990CVE-2022-32990https://bugzilla.redhat.com/20875912087591https://bugzilla.redhat.com/21032022103202https://errata.almalinux.org/9/ALSA-2022-7978.htmlALSA-2022:7978ALSA-2022:7978 mvgimp-libs-2.99.8-3.el9.x86_64.rpm9vgimp-2.99.8-3.el9.x86_64.rpmmvgimp-libs-2.99.8-3.el9.i686.rpmmvgimp-libs-2.99.8-3.el9.x86_64.rpm9vgimp-2.99.8-3.el9.x86_64.rpmmvgimp-libs-2.99.8-3.el9.i686.rpmރ J -jBsecurityLow: speex security update0*8https://access.redhat.com/errata/RHSA-2022:7979RHSA-2022:7979RHSA-2022:7979 https://access.redhat.com/security/cve/CVE-2020-23903CVE-2020-23903CVE-2020-23903https://bugzilla.redhat.com/20242502024250https://errata.almalinux.org/9/ALSA-2022-7979.htmlALSA-2022:7979ALSA-2022:7979 bspeex-1.2.0-11.el9.x86_64.rpmbspeex-1.2.0-11.el9.i686.rpmbspeex-1.2.0-11.el9.x86_64.rpmbspeex-1.2.0-11.el9.i686.rpmރK nBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityLow: libvirt security, bug fix, and enhancement update0*8https://access.redhat.com/errata/RHSA-2022:8003RHSA-2022:8003RHSA-2022:8003 https://access.redhat.com/security/cve/CVE-2022-0897CVE-2022-0897CVE-2022-0897https://bugzilla.redhat.com/20638832063883https://errata.almalinux.org/9/ALSA-2022-8003.htmlALSA-2022:8003ALSA-2022:8003 Olibvirt-daemon-driver-storage-scsi-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-disk-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-config-network-8.5.0-7.el9_1.x86_64.rpmOlibvirt-client-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-rbd-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-interface-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-kvm-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-core-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-mpath-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-8.5.0-7.el9_1.x86_64.rpm Olibvirt-daemon-driver-nodedev-8.5.0-7.el9_1.x86_64.rpmOlibvirt-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-logical-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-config-nwfilter-8.5.0-7.el9_1.x86_64.rpmOlibvirt-nss-8.5.0-7.el9_1.x86_64.rpm Olibvirt-daemon-driver-qemu-8.5.0-7.el9_1.x86_64.rpm Olibvirt-daemon-driver-secret-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-8.5.0-7.el9_1.x86_64.rpm Olibvirt-daemon-driver-network-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-iscsi-8.5.0-7.el9_1.x86_64.rpm Olibvirt-daemon-driver-nwfilter-8.5.0-7.el9_1.x86_64.rpmOlibvirt-libs-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-scsi-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-disk-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-config-network-8.5.0-7.el9_1.x86_64.rpmOlibvirt-client-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-rbd-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-interface-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-kvm-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-core-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-mpath-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-8.5.0-7.el9_1.x86_64.rpm Olibvirt-daemon-driver-nodedev-8.5.0-7.el9_1.x86_64.rpmOlibvirt-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-logical-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-config-nwfilter-8.5.0-7.el9_1.x86_64.rpmOlibvirt-nss-8.5.0-7.el9_1.x86_64.rpm Olibvirt-daemon-driver-qemu-8.5.0-7.el9_1.x86_64.rpm Olibvirt-daemon-driver-secret-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-8.5.0-7.el9_1.x86_64.rpm Olibvirt-daemon-driver-network-8.5.0-7.el9_1.x86_64.rpmOlibvirt-daemon-driver-storage-iscsi-8.5.0-7.el9_1.x86_64.rpm Olibvirt-daemon-driver-nwfilter-8.5.0-7.el9_1.x86_64.rpmOlibvirt-libs-8.5.0-7.el9_1.x86_64.rpmܩPL [BBsecurityModerate: buildah security and bug fix update0Hhttps://access.redhat.com/errata/RHSA-2022:8008RHSA-2022:8008RHSA-2022:8008 https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33195CVE-2021-33195CVE-2021-33195https://access.redhat.com/security/cve/CVE-2021-33197CVE-2021-33197CVE-2021-33197https://access.redhat.com/security/cve/CVE-2021-33198CVE-2021-33198CVE-2021-33198https://access.redhat.com/security/cve/CVE-2022-27191CVE-2022-27191CVE-2022-27191https://access.redhat.com/security/cve/CVE-2022-2989CVE-2022-2989CVE-2022-2989https://access.redhat.com/security/cve/CVE-2022-2990CVE-2022-2990CVE-2022-2990https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19895641989564https://bugzilla.redhat.com/19895701989570https://bugzilla.redhat.com/19895751989575https://bugzilla.redhat.com/20647022064702https://bugzilla.redhat.com/21214452121445https://bugzilla.redhat.com/21214532121453https://errata.almalinux.org/9/ALSA-2022-8008.htmlALSA-2022:8008ALSA-2022:8008 9 buildah-tests-1.27.0-2.el9.x86_64.rpm8 buildah-1.27.0-2.el9.x86_64.rpm9 buildah-tests-1.27.0-2.el9.x86_64.rpm8 buildah-1.27.0-2.el9.x86_64.rpmܧM &`BBBBsecurityModerate: fribidi security update0\ghttps://access.redhat.com/errata/RHSA-2022:8011RHSA-2022:8011RHSA-2022:8011 https://access.redhat.com/security/cve/CVE-2022-25308CVE-2022-25308CVE-2022-25308https://access.redhat.com/security/cve/CVE-2022-25309CVE-2022-25309CVE-2022-25309https://access.redhat.com/security/cve/CVE-2022-25310CVE-2022-25310CVE-2022-25310https://bugzilla.redhat.com/20478902047890https://bugzilla.redhat.com/20478962047896https://bugzilla.redhat.com/20479232047923https://errata.almalinux.org/9/ALSA-2022-8011.htmlALSA-2022:8011ALSA-2022:8011 tfribidi-devel-1.0.10-6.el9.2.i686.rpmtfribidi-1.0.10-6.el9.2.i686.rpmtfribidi-1.0.10-6.el9.2.x86_64.rpmtfribidi-devel-1.0.10-6.el9.2.x86_64.rpmtfribidi-devel-1.0.10-6.el9.2.i686.rpmtfribidi-1.0.10-6.el9.2.i686.rpmtfribidi-1.0.10-6.el9.2.x86_64.rpmtfribidi-devel-1.0.10-6.el9.2.x86_64.rpmރrN *gBsecurityModerate: qt5 security and bug fix update0C9https://access.redhat.com/errata/RHSA-2022:8022RHSA-2022:8022RHSA-2022:8022 https://access.redhat.com/security/cve/CVE-2022-25255CVE-2022-25255CVE-2022-25255https://bugzilla.redhat.com/20555052055505https://errata.almalinux.org/9/ALSA-2022-8022.htmlALSA-2022:8022ALSA-2022:8022 q6qt5-5.15.3-1.el9.noarch.rpms6qt5-srpm-macros-5.15.3-1.el9.noarch.rpmr6qt5-rpm-macros-5.15.3-1.el9.noarch.rpmq6qt5-5.15.3-1.el9.noarch.rpms6qt5-srpm-macros-5.15.3-1.el9.noarch.rpmr6qt5-rpm-macros-5.15.3-1.el9.noarch.rpmܣ`O 7kBBBBBBBBBBsecurityModerate: webkit2gtk3 security and bug fix update0|https://access.redhat.com/errata/RHSA-2022:8054RHSA-2022:8054RHSA-2022:8054 https://access.redhat.com/security/cve/CVE-2022-22624CVE-2022-22624CVE-2022-22624https://access.redhat.com/security/cve/CVE-2022-22628CVE-2022-22628CVE-2022-22628https://access.redhat.com/security/cve/CVE-2022-22629CVE-2022-22629CVE-2022-22629https://access.redhat.com/security/cve/CVE-2022-22662CVE-2022-22662CVE-2022-22662https://access.redhat.com/security/cve/CVE-2022-26700CVE-2022-26700CVE-2022-26700https://access.redhat.com/security/cve/CVE-2022-26709CVE-2022-26709CVE-2022-26709https://access.redhat.com/security/cve/CVE-2022-26710CVE-2022-26710CVE-2022-26710https://access.redhat.com/security/cve/CVE-2022-26716CVE-2022-26716CVE-2022-26716https://access.redhat.com/security/cve/CVE-2022-26717CVE-2022-26717CVE-2022-26717https://access.redhat.com/security/cve/CVE-2022-26719CVE-2022-26719CVE-2022-26719https://access.redhat.com/security/cve/CVE-2022-30293CVE-2022-30293CVE-2022-30293https://bugzilla.redhat.com/20738932073893https://bugzilla.redhat.com/20738962073896https://bugzilla.redhat.com/20738992073899https://bugzilla.redhat.com/20825482082548https://bugzilla.redhat.com/20927322092732https://bugzilla.redhat.com/20927332092733https://bugzilla.redhat.com/20927342092734https://bugzilla.redhat.com/20927352092735https://bugzilla.redhat.com/20927362092736https://bugzilla.redhat.com/21047872104787https://bugzilla.redhat.com/21047892104789https://errata.almalinux.org/9/ALSA-2022-8054.htmlALSA-2022:8054ALSA-2022:8054 2]webkit2gtk3-devel-2.36.7-1.el9.x86_64.rpm4]webkit2gtk3-jsc-devel-2.36.7-1.el9.i686.rpm2]webkit2gtk3-devel-2.36.7-1.el9.i686.rpm3]webkit2gtk3-jsc-2.36.7-1.el9.x86_64.rpm3]webkit2gtk3-jsc-2.36.7-1.el9.i686.rpm1]webkit2gtk3-2.36.7-1.el9.i686.rpm4]webkit2gtk3-jsc-devel-2.36.7-1.el9.x86_64.rpm1]webkit2gtk3-2.36.7-1.el9.x86_64.rpm2]webkit2gtk3-devel-2.36.7-1.el9.x86_64.rpm4]webkit2gtk3-jsc-devel-2.36.7-1.el9.i686.rpm2]webkit2gtk3-devel-2.36.7-1.el9.i686.rpm3]webkit2gtk3-jsc-2.36.7-1.el9.x86_64.rpm3]webkit2gtk3-jsc-2.36.7-1.el9.i686.rpm1]webkit2gtk3-2.36.7-1.el9.i686.rpm4]webkit2gtk3-jsc-devel-2.36.7-1.el9.x86_64.rpm1]webkit2gtk3-2.36.7-1.el9.x86_64.rpmP :xsecurityImportant: grafana security, bug fix, and enhancement update0p https://access.redhat.com/errata/RHSA-2022:8057RHSA-2022:8057RHSA-2022:8057 https://access.redhat.com/security/cve/CVE-2021-23648CVE-2021-23648CVE-2021-23648https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-1962CVE-2022-1962CVE-2022-1962https://access.redhat.com/security/cve/CVE-2022-21673CVE-2022-21673CVE-2022-21673https://access.redhat.com/security/cve/CVE-2022-21698CVE-2022-21698CVE-2022-21698https://access.redhat.com/security/cve/CVE-2022-21702CVE-2022-21702CVE-2022-21702https://access.redhat.com/security/cve/CVE-2022-21703CVE-2022-21703CVE-2022-21703https://access.redhat.com/security/cve/CVE-2022-21713CVE-2022-21713CVE-2022-21713https://access.redhat.com/security/cve/CVE-2022-28131CVE-2022-28131CVE-2022-28131https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30633CVE-2022-30633CVE-2022-30633https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/20446282044628https://bugzilla.redhat.com/20458802045880https://bugzilla.redhat.com/20506482050648https://bugzilla.redhat.com/20507422050742https://bugzilla.redhat.com/20507432050743https://bugzilla.redhat.com/20652902065290https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073762107376https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://bugzilla.redhat.com/21073902107390https://bugzilla.redhat.com/21073922107392https://errata.almalinux.org/9/ALSA-2022-8057.htmlALSA-2022:8057ALSA-2022:8057 o|grafana-7.5.15-3.el9.x86_64.rpmo|grafana-7.5.15-3.el9.x86_64.rpmܟQ {BBBBBsecurityModerate: unbound security, bug fix, and enhancement update05https://access.redhat.com/errata/RHSA-2022:8062RHSA-2022:8062RHSA-2022:8062 https://access.redhat.com/security/cve/CVE-2022-30698CVE-2022-30698CVE-2022-30698https://access.redhat.com/security/cve/CVE-2022-30699CVE-2022-30699CVE-2022-30699https://bugzilla.redhat.com/21167252116725https://bugzilla.redhat.com/21167292116729https://errata.almalinux.org/9/ALSA-2022-8062.htmlALSA-2022:8062ALSA-2022:8062 H5python3-unbound-1.16.2-2.el9.x86_64.rpm25unbound-libs-1.16.2-2.el9.x86_64.rpm25unbound-libs-1.16.2-2.el9.i686.rpmK5unbound-1.16.2-2.el9.x86_64.rpmH5python3-unbound-1.16.2-2.el9.x86_64.rpm25unbound-libs-1.16.2-2.el9.x86_64.rpm25unbound-libs-1.16.2-2.el9.i686.rpmK5unbound-1.16.2-2.el9.x86_64.rpmބxR CBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security, bug fix, and enhancement update0=nhttps://access.redhat.com/errata/RHSA-2022:8067RHSA-2022:8067RHSA-2022:8067 https://access.redhat.com/security/cve/CVE-2022-22719CVE-2022-22719CVE-2022-22719https://access.redhat.com/security/cve/CVE-2022-22721CVE-2022-22721CVE-2022-22721https://access.redhat.com/security/cve/CVE-2022-23943CVE-2022-23943CVE-2022-23943https://access.redhat.com/security/cve/CVE-2022-26377CVE-2022-26377CVE-2022-26377https://access.redhat.com/security/cve/CVE-2022-28614CVE-2022-28614CVE-2022-28614https://access.redhat.com/security/cve/CVE-2022-28615CVE-2022-28615CVE-2022-28615https://access.redhat.com/security/cve/CVE-2022-29404CVE-2022-29404CVE-2022-29404https://access.redhat.com/security/cve/CVE-2022-30522CVE-2022-30522CVE-2022-30522https://access.redhat.com/security/cve/CVE-2022-30556CVE-2022-30556CVE-2022-30556https://access.redhat.com/security/cve/CVE-2022-31813CVE-2022-31813CVE-2022-31813https://bugzilla.redhat.com/20643192064319https://bugzilla.redhat.com/20643202064320https://bugzilla.redhat.com/20643222064322https://bugzilla.redhat.com/20949972094997https://bugzilla.redhat.com/20950022095002https://bugzilla.redhat.com/20950062095006https://bugzilla.redhat.com/20950122095012https://bugzilla.redhat.com/20950152095015https://bugzilla.redhat.com/20950182095018https://bugzilla.redhat.com/20950202095020https://errata.almalinux.org/9/ALSA-2022-8067.htmlALSA-2022:8067ALSA-2022:8067 1Ahttpd-manual-2.4.53-7.el9.noarch.rpm~Amod_ldap-2.4.53-7.el9.x86_64.rpmAmod_lua-2.4.53-7.el9.x86_64.rpmmod_proxy_html-2.4.53-7.el9.x86_64.rpmkAhttpd-tools-2.4.53-7.el9.x86_64.rpm0Ahttpd-filesystem-2.4.53-7.el9.noarch.rpmAmod_session-2.4.53-7.el9.x86_64.rpmiAhttpd-core-2.4.53-7.el9.x86_64.rpmhAhttpd-2.4.53-7.el9.x86_64.rpmmod_ssl-2.4.53-7.el9.x86_64.rpmjAhttpd-devel-2.4.53-7.el9.x86_64.rpm 1Ahttpd-manual-2.4.53-7.el9.noarch.rpm~Amod_ldap-2.4.53-7.el9.x86_64.rpmAmod_lua-2.4.53-7.el9.x86_64.rpmmod_proxy_html-2.4.53-7.el9.x86_64.rpmkAhttpd-tools-2.4.53-7.el9.x86_64.rpm0Ahttpd-filesystem-2.4.53-7.el9.noarch.rpmAmod_session-2.4.53-7.el9.x86_64.rpmiAhttpd-core-2.4.53-7.el9.x86_64.rpmhAhttpd-2.4.53-7.el9.x86_64.rpmmod_ssl-2.4.53-7.el9.x86_64.rpmjAhttpd-devel-2.4.53-7.el9.x86_64.rpmܙIS %XBBBBBBBBBBBsecurityModerate: bind security update0+ https://access.redhat.com/errata/RHSA-2022:8068RHSA-2022:8068RHSA-2022:8068 https://access.redhat.com/security/cve/CVE-2021-25220CVE-2021-25220CVE-2021-25220https://access.redhat.com/security/cve/CVE-2022-0396CVE-2022-0396CVE-2022-0396https://bugzilla.redhat.com/20645122064512https://bugzilla.redhat.com/20645132064513https://errata.almalinux.org/9/ALSA-2022-8068.htmlALSA-2022:8068ALSA-2022:8068 ZMbind-chroot-9.16.23-5.el9_1.x86_64.rpm\Mbind-libs-9.16.23-5.el9_1.x86_64.rpm[Mbind-dnssec-utils-9.16.23-5.el9_1.x86_64.rpmYMbind-9.16.23-5.el9_1.x86_64.rpm+Mbind-license-9.16.23-5.el9_1.noarch.rpm]Mbind-utils-9.16.23-5.el9_1.x86_64.rpm7Mpython3-bind-9.16.23-5.el9_1.noarch.rpm*Mbind-dnssec-doc-9.16.23-5.el9_1.noarch.rpmZMbind-chroot-9.16.23-5.el9_1.x86_64.rpm\Mbind-libs-9.16.23-5.el9_1.x86_64.rpm[Mbind-dnssec-utils-9.16.23-5.el9_1.x86_64.rpmYMbind-9.16.23-5.el9_1.x86_64.rpm+Mbind-license-9.16.23-5.el9_1.noarch.rpm]Mbind-utils-9.16.23-5.el9_1.x86_64.rpm7Mpython3-bind-9.16.23-5.el9_1.noarch.rpm*Mbind-dnssec-doc-9.16.23-5.el9_1.noarch.rpmܖ<T *fBBsecurityModerate: dnsmasq security and bug fix update080https://access.redhat.com/errata/RHSA-2022:8070RHSA-2022:8070RHSA-2022:8070 https://access.redhat.com/security/cve/CVE-2022-0934CVE-2022-0934CVE-2022-0934https://bugzilla.redhat.com/20570752057075https://errata.almalinux.org/9/ALSA-2022-8070.htmlALSA-2022:8070ALSA-2022:8070 g"dnsmasq-utils-2.85-5.el9.x86_64.rpmf"dnsmasq-2.85-5.el9.x86_64.rpmg"dnsmasq-utils-2.85-5.el9.x86_64.rpmf"dnsmasq-2.85-5.el9.x86_64.rpmܔ=U .kBsecurityModerate: flac security update0hjhttps://access.redhat.com/errata/RHSA-2022:8078RHSA-2022:8078RHSA-2022:8078 https://access.redhat.com/security/cve/CVE-2021-0561CVE-2021-0561CVE-2021-0561https://bugzilla.redhat.com/20577762057776https://errata.almalinux.org/9/ALSA-2022-8078.htmlALSA-2022:8078ALSA-2022:8078 'flac-libs-1.3.3-10.el9.i686.rpm'flac-libs-1.3.3-10.el9.x86_64.rpm'flac-libs-1.3.3-10.el9.i686.rpm'flac-libs-1.3.3-10.el9.x86_64.rpmކKV 1osecurityLow: runc security update0*R%https://access.redhat.com/errata/RHSA-2022:8090RHSA-2022:8090RHSA-2022:8090 https://access.redhat.com/security/cve/CVE-2022-29162CVE-2022-29162CVE-2022-29162https://bugzilla.redhat.com/20863982086398https://errata.almalinux.org/9/ALSA-2022-8090.htmlALSA-2022:8090ALSA-2022:8090  drunc-1.1.4-1.el9.x86_64.rpm drunc-1.1.4-1.el9.x86_64.rpmܐhW 8rBBBBsecurityLow: redis security and bug fix update0*w>https://access.redhat.com/errata/RHSA-2022:8096RHSA-2022:8096RHSA-2022:8096 https://access.redhat.com/security/cve/CVE-2022-24735CVE-2022-24735CVE-2022-24735https://access.redhat.com/security/cve/CVE-2022-24736CVE-2022-24736CVE-2022-24736https://bugzilla.redhat.com/20802862080286https://bugzilla.redhat.com/20802892080289https://errata.almalinux.org/9/ALSA-2022-8096.htmlALSA-2022:8096ALSA-2022:8096 ;redis-doc-6.2.7-1.el9.noarch.rpm";redis-6.2.7-1.el9.x86_64.rpm>;redis-devel-6.2.7-1.el9.x86_64.rpm>;redis-devel-6.2.7-1.el9.i686.rpm;redis-doc-6.2.7-1.el9.noarch.rpm";redis-6.2.7-1.el9.x86_64.rpm>;redis-devel-6.2.7-1.el9.x86_64.rpm>;redis-devel-6.2.7-1.el9.i686.rpmކxX =yBBsecurityModerate: toolbox security and bug fix update05@ https://access.redhat.com/errata/RHSA-2022:8098RHSA-2022:8098RHSA-2022:8098 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073862107386https://errata.almalinux.org/9/ALSA-2022-8098.htmlALSA-2022:8098ALSA-2022:8098 .^toolbox-tests-0.0.99.3-5.el9.x86_64.rpm-^toolbox-0.0.99.3-5.el9.x86_64.rpm.^toolbox-tests-0.0.99.3-5.el9.x86_64.rpm-^toolbox-0.0.99.3-5.el9.x86_64.rpm܍eY ~BBBBsecurityLow: swtpm security and bug fix update0*uhttps://access.redhat.com/errata/RHSA-2022:8100RHSA-2022:8100RHSA-2022:8100 https://access.redhat.com/security/cve/CVE-2022-23645CVE-2022-23645CVE-2022-23645https://bugzilla.redhat.com/20564912056491https://errata.almalinux.org/9/ALSA-2022-8100.htmlALSA-2022:8100ALSA-2022:8100 ^swtpm-tools-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm^swtpm-libs-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm^swtpm-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm^swtpm-tools-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm^swtpm-libs-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm^swtpm-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm܌fZ EsecurityModerate: frr security, bug fix, and enhancement update0y$https://access.redhat.com/errata/RHSA-2022:8112RHSA-2022:8112RHSA-2022:8112 https://access.redhat.com/security/cve/CVE-2022-26125CVE-2022-26125CVE-2022-26125https://bugzilla.redhat.com/20586282058628https://errata.almalinux.org/9/ALSA-2022-8112.htmlALSA-2022:8112ALSA-2022:8112 Afrr-8.2.2-4.el9.x86_64.rpmAfrr-8.2.2-4.el9.x86_64.rpm܋E[ HsecurityModerate: ignition security, bug fix, and enhancement update0,https://access.redhat.com/errata/RHSA-2022:8126RHSA-2022:8126RHSA-2022:8126 https://access.redhat.com/security/cve/CVE-2022-1706CVE-2022-1706CVE-2022-1706https://bugzilla.redhat.com/20822742082274https://errata.almalinux.org/9/ALSA-2022-8126.htmlALSA-2022:8126ALSA-2022:8126 jignition-2.14.0-1.el9.x86_64.rpmjignition-2.14.0-1.el9.x86_64.rpm܉X\ KBsecurityLow: wavpack security update0*I2https://access.redhat.com/errata/RHSA-2022:8139RHSA-2022:8139RHSA-2022:8139 https://access.redhat.com/security/cve/CVE-2021-44269CVE-2021-44269CVE-2021-44269https://bugzilla.redhat.com/20644572064457https://errata.almalinux.org/9/ALSA-2022-8139.htmlALSA-2022:8139ALSA-2022:8139 gjwavpack-5.4.0-5.el9.i686.rpmgjwavpack-5.4.0-5.el9.x86_64.rpmgjwavpack-5.4.0-5.el9.i686.rpmgjwavpack-5.4.0-5.el9.x86_64.rpmއ>] OBBBBBBBBBBBBsecurityModerate: poppler security and bug fix update0{(https://access.redhat.com/errata/RHSA-2022:8151RHSA-2022:8151RHSA-2022:8151 https://access.redhat.com/security/cve/CVE-2022-27337CVE-2022-27337CVE-2022-27337https://bugzilla.redhat.com/20871902087190https://errata.almalinux.org/9/ALSA-2022-8151.htmlALSA-2022:8151ALSA-2022:8151 bypoppler-cpp-21.01.0-13.el9.i686.rpmbypoppler-cpp-21.01.0-13.el9.x86_64.rpm0ypoppler-utils-21.01.0-13.el9.x86_64.rpmcypoppler-glib-21.01.0-13.el9.x86_64.rpmaypoppler-21.01.0-13.el9.i686.rpmaypoppler-21.01.0-13.el9.x86_64.rpmdypoppler-qt5-21.01.0-13.el9.i686.rpmcypoppler-glib-21.01.0-13.el9.i686.rpmdypoppler-qt5-21.01.0-13.el9.x86_64.rpm bypoppler-cpp-21.01.0-13.el9.i686.rpmbypoppler-cpp-21.01.0-13.el9.x86_64.rpm0ypoppler-utils-21.01.0-13.el9.x86_64.rpmcypoppler-glib-21.01.0-13.el9.x86_64.rpmaypoppler-21.01.0-13.el9.i686.rpmaypoppler-21.01.0-13.el9.x86_64.rpmdypoppler-qt5-21.01.0-13.el9.i686.rpmcypoppler-glib-21.01.0-13.el9.i686.rpmdypoppler-qt5-21.01.0-13.el9.x86_64.rpmއT^ #^BBBsecurityModerate: 389-ds-base security, bug fix, and enhancement update0#phttps://access.redhat.com/errata/RHSA-2022:8162RHSA-2022:8162RHSA-2022:8162 https://access.redhat.com/security/cve/CVE-2022-0918CVE-2022-0918CVE-2022-0918https://access.redhat.com/security/cve/CVE-2022-0996CVE-2022-0996CVE-2022-0996https://access.redhat.com/security/cve/CVE-2022-2850CVE-2022-2850CVE-2022-2850https://bugzilla.redhat.com/20558152055815https://bugzilla.redhat.com/20647692064769https://bugzilla.redhat.com/21186912118691https://errata.almalinux.org/9/ALSA-2022-8162.htmlALSA-2022:8162ALSA-2022:8162 l389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpmplpython3-lib389-2.1.3-4.el9_1.noarch.rpm l389-ds-base-2.1.3-4.el9_1.x86_64.rpml389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpmplpython3-lib389-2.1.3-4.el9_1.noarch.rpm l389-ds-base-2.1.3-4.el9_1.x86_64.rpm܃_ *dBBBBsecurityModerate: libtiff security update0@https://access.redhat.com/errata/RHSA-2022:8194RHSA-2022:8194RHSA-2022:8194 https://access.redhat.com/security/cve/CVE-2022-0561CVE-2022-0561CVE-2022-0561https://access.redhat.com/security/cve/CVE-2022-0562CVE-2022-0562CVE-2022-0562https://access.redhat.com/security/cve/CVE-2022-0865CVE-2022-0865CVE-2022-0865https://access.redhat.com/security/cve/CVE-2022-0891CVE-2022-0891CVE-2022-0891https://access.redhat.com/security/cve/CVE-2022-0908CVE-2022-0908CVE-2022-0908https://access.redhat.com/security/cve/CVE-2022-0909CVE-2022-0909CVE-2022-0909https://access.redhat.com/security/cve/CVE-2022-0924CVE-2022-0924CVE-2022-0924https://access.redhat.com/security/cve/CVE-2022-1354CVE-2022-1354CVE-2022-1354https://access.redhat.com/security/cve/CVE-2022-1355CVE-2022-1355CVE-2022-1355https://access.redhat.com/security/cve/CVE-2022-22844CVE-2022-22844CVE-2022-22844https://bugzilla.redhat.com/20426032042603https://bugzilla.redhat.com/20544942054494https://bugzilla.redhat.com/20544952054495https://bugzilla.redhat.com/20641452064145https://bugzilla.redhat.com/20641462064146https://bugzilla.redhat.com/20641482064148https://bugzilla.redhat.com/20644062064406https://bugzilla.redhat.com/20644112064411https://bugzilla.redhat.com/20744042074404https://bugzilla.redhat.com/20744152074415https://errata.almalinux.org/9/ALSA-2022-8194.htmlALSA-2022:8194ALSA-2022:8194 h3libtiff-devel-4.4.0-2.el9.x86_64.rpmg3libtiff-4.4.0-2.el9.i686.rpmg3libtiff-4.4.0-2.el9.x86_64.rpmh3libtiff-devel-4.4.0-2.el9.i686.rpmh3libtiff-devel-4.4.0-2.el9.x86_64.rpmg3libtiff-4.4.0-2.el9.i686.rpmg3libtiff-4.4.0-2.el9.x86_64.rpmh3libtiff-devel-4.4.0-2.el9.i686.rpmވ` kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security, bug fix, and enhancement update0S<https://access.redhat.com/errata/RHSA-2022:8197RHSA-2022:8197RHSA-2022:8197 https://access.redhat.com/security/cve/CVE-2021-21708CVE-2021-21708CVE-2021-21708https://access.redhat.com/security/cve/CVE-2022-31625CVE-2022-31625CVE-2022-31625https://bugzilla.redhat.com/20558792055879https://bugzilla.redhat.com/20985212098521https://errata.almalinux.org/9/ALSA-2022-8197.htmlALSA-2022:8197ALSA-2022:8197 _<php-mbstring-8.0.20-3.el9.x86_64.rpmS<php-common-8.0.20-3.el9.x86_64.rpm<php-8.0.20-3.el9.x86_64.rpmd<php-pgsql-8.0.20-3.el9.x86_64.rpmW<php-embedded-8.0.20-3.el9.x86_64.rpmY<php-ffi-8.0.20-3.el9.x86_64.rpmU<php-dbg-8.0.20-3.el9.x86_64.rpmV<php-devel-8.0.20-3.el9.x86_64.rpmX<php-enchant-8.0.20-3.el9.x86_64.rpm`<php-mysqlnd-8.0.20-3.el9.x86_64.rpmh<php-xml-8.0.20-3.el9.x86_64.rpmZ<php-fpm-8.0.20-3.el9.x86_64.rpmc<php-pdo-8.0.20-3.el9.x86_64.rpmf<php-snmp-8.0.20-3.el9.x86_64.rpm^<php-ldap-8.0.20-3.el9.x86_64.rpm\<php-gmp-8.0.20-3.el9.x86_64.rpmT<php-dba-8.0.20-3.el9.x86_64.rpm]<php-intl-8.0.20-3.el9.x86_64.rpmQ<php-bcmath-8.0.20-3.el9.x86_64.rpma<php-odbc-8.0.20-3.el9.x86_64.rpm[<php-gd-8.0.20-3.el9.x86_64.rpmR<php-cli-8.0.20-3.el9.x86_64.rpmg<php-soap-8.0.20-3.el9.x86_64.rpme<php-process-8.0.20-3.el9.x86_64.rpmb<php-opcache-8.0.20-3.el9.x86_64.rpm_<php-mbstring-8.0.20-3.el9.x86_64.rpmS<php-common-8.0.20-3.el9.x86_64.rpm<php-8.0.20-3.el9.x86_64.rpmd<php-pgsql-8.0.20-3.el9.x86_64.rpmW<php-embedded-8.0.20-3.el9.x86_64.rpmY<php-ffi-8.0.20-3.el9.x86_64.rpmU<php-dbg-8.0.20-3.el9.x86_64.rpmV<php-devel-8.0.20-3.el9.x86_64.rpmX<php-enchant-8.0.20-3.el9.x86_64.rpm`<php-mysqlnd-8.0.20-3.el9.x86_64.rpmh<php-xml-8.0.20-3.el9.x86_64.rpmZ<php-fpm-8.0.20-3.el9.x86_64.rpmc<php-pdo-8.0.20-3.el9.x86_64.rpmf<php-snmp-8.0.20-3.el9.x86_64.rpm^<php-ldap-8.0.20-3.el9.x86_64.rpm\<php-gmp-8.0.20-3.el9.x86_64.rpmT<php-dba-8.0.20-3.el9.x86_64.rpm]<php-intl-8.0.20-3.el9.x86_64.rpmQ<php-bcmath-8.0.20-3.el9.x86_64.rpma<php-odbc-8.0.20-3.el9.x86_64.rpm[<php-gd-8.0.20-3.el9.x86_64.rpmR<php-cli-8.0.20-3.el9.x86_64.rpmg<php-soap-8.0.20-3.el9.x86_64.rpme<php-process-8.0.20-3.el9.x86_64.rpmb<php-opcache-8.0.20-3.el9.x86_64.rpm5a !^BsecurityLow: openjpeg2 security update0*https://access.redhat.com/errata/RHSA-2022:8207RHSA-2022:8207RHSA-2022:8207 https://access.redhat.com/security/cve/CVE-2022-1122CVE-2022-1122CVE-2022-1122https://bugzilla.redhat.com/20670522067052https://errata.almalinux.org/9/ALSA-2022-8207.htmlALSA-2022:8207ALSA-2022:8207 7;openjpeg2-2.4.0-7.el9.i686.rpm7;openjpeg2-2.4.0-7.el9.x86_64.rpm7;openjpeg2-2.4.0-7.el9.i686.rpm7;openjpeg2-2.4.0-7.el9.x86_64.rpmވYb *bBBBBBBsecurityModerate: dovecot security and enhancement update0*Zhttps://access.redhat.com/errata/RHSA-2022:8208RHSA-2022:8208RHSA-2022:8208 https://access.redhat.com/security/cve/CVE-2022-30550CVE-2022-30550CVE-2022-30550https://bugzilla.redhat.com/21050702105070https://errata.almalinux.org/9/ALSA-2022-8208.htmlALSA-2022:8208ALSA-2022:8208 *ldovecot-pgsql-2.3.16-7.el9.x86_64.rpm)ldovecot-mysql-2.3.16-7.el9.x86_64.rpm+ldovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm(ldovecot-2.3.16-7.el9.x86_64.rpm*ldovecot-pgsql-2.3.16-7.el9.x86_64.rpm)ldovecot-mysql-2.3.16-7.el9.x86_64.rpm+ldovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm(ldovecot-2.3.16-7.el9.x86_64.rpmic -ksecurityModerate: mutt security update0dhttps://access.redhat.com/errata/RHSA-2022:8219RHSA-2022:8219RHSA-2022:8219 https://access.redhat.com/security/cve/CVE-2022-1328CVE-2022-1328CVE-2022-1328https://bugzilla.redhat.com/20760582076058https://errata.almalinux.org/9/ALSA-2022-8219.htmlALSA-2022:8219ALSA-2022:8219 \rmutt-2.2.6-1.el9.x86_64.rpm\rmutt-2.2.6-1.el9.x86_64.rpm-d :nBBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update0hZhttps://access.redhat.com/errata/RHSA-2022:8221RHSA-2022:8221RHSA-2022:8221 https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8221.htmlALSA-2022:8221ALSA-2022:8221 ^fxorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpmdfxorg-x11-server-common-1.20.11-11.el9.x86_64.rpmbfxorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpm_fxorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpm`fxorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpmafxorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpm^fxorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpmdfxorg-x11-server-common-1.20.11-11.el9.x86_64.rpmbfxorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpm_fxorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpm`fxorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpmafxorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpm'e ={securityModerate: xorg-x11-server-Xwayland security update0Bkhttps://access.redhat.com/errata/RHSA-2022:8222RHSA-2022:8222RHSA-2022:8222 https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8222.htmlALSA-2022:8222ALSA-2022:8222 c)xorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpmc)xorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpmDf ~securityModerate: python-lxml security update0-https://access.redhat.com/errata/RHSA-2022:8226RHSA-2022:8226RHSA-2022:8226 https://access.redhat.com/security/cve/CVE-2022-2309CVE-2022-2309CVE-2022-2309https://bugzilla.redhat.com/21075712107571https://errata.almalinux.org/9/ALSA-2022-8226.htmlALSA-2022:8226ALSA-2022:8226 oXpython3-lxml-4.6.5-3.el9.x86_64.rpmoXpython3-lxml-4.6.5-3.el9.x86_64.rpm۾g AsecurityModerate: grafana-pcp security update0>https://access.redhat.com/errata/RHSA-2022:8250RHSA-2022:8250RHSA-2022:8250 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://errata.almalinux.org/9/ALSA-2022-8250.htmlALSA-2022:8250ALSA-2022:8250 }?grafana-pcp-3.2.0-3.el9.x86_64.rpm}?grafana-pcp-3.2.0-3.el9.x86_64.rpmۻ9h DsecurityModerate: yajl security update0?Uhttps://access.redhat.com/errata/RHSA-2022:8252RHSA-2022:8252RHSA-2022:8252 https://access.redhat.com/security/cve/CVE-2022-24795CVE-2022-24795CVE-2022-24795https://bugzilla.redhat.com/20729122072912https://errata.almalinux.org/9/ALSA-2022-8252.htmlALSA-2022:8252ALSA-2022:8252 \yajl-2.1.0-21.el9.x86_64.rpm\yajl-2.1.0-21.el9.x86_64.rpm3i GBBBBBsecurityImportant: dpdk security and bug fix update0)https://access.redhat.com/errata/RHSA-2022:8263RHSA-2022:8263RHSA-2022:8263 https://access.redhat.com/security/cve/CVE-2021-3839CVE-2021-3839CVE-2021-3839https://access.redhat.com/security/cve/CVE-2022-2132CVE-2022-2132CVE-2022-2132https://access.redhat.com/security/cve/CVE-2022-28199CVE-2022-28199CVE-2022-28199https://bugzilla.redhat.com/20258822025882https://bugzilla.redhat.com/20994752099475https://bugzilla.redhat.com/21235492123549https://errata.almalinux.org/9/ALSA-2022-8263.htmlALSA-2022:8263ALSA-2022:8263 .Rdpdk-doc-21.11.2-1.el9_1.noarch.rpm/Rdpdk-tools-21.11.2-1.el9_1.x86_64.rpm,Rdpdk-21.11.2-1.el9_1.x86_64.rpm-Rdpdk-devel-21.11.2-1.el9_1.x86_64.rpm.Rdpdk-doc-21.11.2-1.el9_1.noarch.rpm/Rdpdk-tools-21.11.2-1.el9_1.x86_64.rpm,Rdpdk-21.11.2-1.el9_1.x86_64.rpm-Rdpdk-devel-21.11.2-1.el9_1.x86_64.rpm۹j OBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update0=?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267 https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267 &kernel-headers-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-doc-5.14.0-162.6.1.el9_1.noarch.rpm!kernel-debug-devel-5.14.0-162.6.1.el9_1.x86_64.rpm"kernel-debug-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm#kernel-devel-5.14.0-162.6.1.el9_1.x86_64.rpm$kernel-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm%perf-5.14.0-162.6.1.el9_1.x86_64.rpm&kernel-headers-5.14.0-162.6.1.el9_1.x86_64.rpmkernel-doc-5.14.0-162.6.1.el9_1.noarch.rpm!kernel-debug-devel-5.14.0-162.6.1.el9_1.x86_64.rpm"kernel-debug-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm#kernel-devel-5.14.0-162.6.1.el9_1.x86_64.rpm$kernel-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm%perf-5.14.0-162.6.1.el9_1.x86_64.rpm۰Nk securityModerate: rsync security and bug fix update0@zhttps://access.redhat.com/errata/RHSA-2022:8291RHSA-2022:8291RHSA-2022:8291 https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-8291.htmlALSA-2022:8291ALSA-2022:8291 [-rsync-daemon-3.2.3-18.el9.noarch.rpm[-rsync-daemon-3.2.3-18.el9.noarch.rpmۨ@l "_BsecurityLow: curl security update0*:8https://access.redhat.com/errata/RHSA-2022:8299RHSA-2022:8299RHSA-2022:8299 https://access.redhat.com/security/cve/CVE-2022-27775CVE-2022-27775CVE-2022-27775https://bugzilla.redhat.com/20783882078388https://errata.almalinux.org/9/ALSA-2022-8299.htmlALSA-2022:8299ALSA-2022:8299 klibcurl-devel-7.76.1-19.el9.x86_64.rpmklibcurl-devel-7.76.1-19.el9.i686.rpmklibcurl-devel-7.76.1-19.el9.x86_64.rpmklibcurl-devel-7.76.1-19.el9.i686.rpmދm /cBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update0rmhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317 https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317 Usamba-client-4.16.4-101.el9.x86_64.rpmVsamba-krb5-printing-4.16.4-101.el9.x86_64.rpmXsamba-winbind-clients-4.16.4-101.el9.x86_64.rpmZsamba-winexe-4.16.4-101.el9.x86_64.rpmWsamba-vfs-iouring-4.16.4-101.el9.x86_64.rpmYsamba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpmUsamba-client-4.16.4-101.el9.x86_64.rpmVsamba-krb5-printing-4.16.4-101.el9.x86_64.rpmXsamba-winbind-clients-4.16.4-101.el9.x86_64.rpmZsamba-winexe-4.16.4-101.el9.x86_64.rpmWsamba-vfs-iouring-4.16.4-101.el9.x86_64.rpmYsamba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpmۓ<n 3pBsecurityModerate: freetype security update0_Ohttps://access.redhat.com/errata/RHSA-2022:8340RHSA-2022:8340RHSA-2022:8340 https://access.redhat.com/security/cve/CVE-2022-27404CVE-2022-27404CVE-2022-27404https://access.redhat.com/security/cve/CVE-2022-27405CVE-2022-27405CVE-2022-27405https://access.redhat.com/security/cve/CVE-2022-27406CVE-2022-27406CVE-2022-27406https://bugzilla.redhat.com/20779852077985https://bugzilla.redhat.com/20779892077989https://bugzilla.redhat.com/20779912077991https://errata.almalinux.org/9/ALSA-2022-8340.htmlALSA-2022:8340ALSA-2022:8340 8freetype-devel-2.10.4-9.el9.x86_64.rpm8freetype-devel-2.10.4-9.el9.i686.rpm8freetype-devel-2.10.4-9.el9.x86_64.rpm8freetype-devel-2.10.4-9.el9.i686.rpmތ/o :tBBBBsecurityModerate: python3.9 security, bug fix, and enhancement update0.5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353 https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353 =python3-tkinter-3.9.14-1.el9.x86_64.rpmjpython-unversioned-command-3.9.14-1.el9.noarch.rpmWpython3-devel-3.9.14-1.el9.x86_64.rpmWpython3-devel-3.9.14-1.el9.i686.rpm=python3-tkinter-3.9.14-1.el9.x86_64.rpmjpython-unversioned-command-3.9.14-1.el9.noarch.rpmWpython3-devel-3.9.14-1.el9.x86_64.rpmWpython3-devel-3.9.14-1.el9.i686.rpmތ?p {BBBBsecurityModerate: e2fsprogs security update0c<https://access.redhat.com/errata/RHSA-2022:8361RHSA-2022:8361RHSA-2022:8361 https://access.redhat.com/security/cve/CVE-2022-1304CVE-2022-1304CVE-2022-1304https://bugzilla.redhat.com/20697262069726https://errata.almalinux.org/9/ALSA-2022-8361.htmlALSA-2022:8361ALSA-2022:8361  }e2fsprogs-devel-1.46.5-3.el9.x86_64.rpm }e2fsprogs-devel-1.46.5-3.el9.i686.rpm3}libcom_err-devel-1.46.5-3.el9.i686.rpm3}libcom_err-devel-1.46.5-3.el9.x86_64.rpm }e2fsprogs-devel-1.46.5-3.el9.x86_64.rpm }e2fsprogs-devel-1.46.5-3.el9.i686.rpm3}libcom_err-devel-1.46.5-3.el9.i686.rpm3}libcom_err-devel-1.46.5-3.el9.x86_64.rpmuq BBBBBsecurityModerate: harfbuzz security update0uhttps://access.redhat.com/errata/RHSA-2022:8384RHSA-2022:8384RHSA-2022:8384 https://access.redhat.com/security/cve/CVE-2022-33068CVE-2022-33068CVE-2022-33068https://bugzilla.redhat.com/21026082102608https://errata.almalinux.org/9/ALSA-2022-8384.htmlALSA-2022:8384ALSA-2022:8384 harfbuzz-devel-2.7.4-8.el9.i686.rpmharfbuzz-icu-2.7.4-8.el9.x86_64.rpmharfbuzz-devel-2.7.4-8.el9.x86_64.rpmharfbuzz-icu-2.7.4-8.el9.i686.rpmharfbuzz-devel-2.7.4-8.el9.i686.rpmharfbuzz-icu-2.7.4-8.el9.x86_64.rpmharfbuzz-devel-2.7.4-8.el9.x86_64.rpmharfbuzz-icu-2.7.4-8.el9.i686.rpmލr IBBBBBBBBBBBsecurityLow: podman security, bug fix, and enhancement update0*https://access.redhat.com/errata/RHSA-2022:8431RHSA-2022:8431RHSA-2022:8431 https://access.redhat.com/security/cve/CVE-2022-2989CVE-2022-2989CVE-2022-2989https://access.redhat.com/security/cve/CVE-2022-2990CVE-2022-2990CVE-2022-2990https://bugzilla.redhat.com/21214452121445https://bugzilla.redhat.com/21214532121453https://errata.almalinux.org/9/ALSA-2022-8431.htmlALSA-2022:8431ALSA-2022:8431 4podman-remote-4.2.0-7.el9_1.x86_64.rpm2podman-4.2.0-7.el9_1.x86_64.rpmgpodman-docker-4.2.0-7.el9_1.noarch.rpm3podman-plugins-4.2.0-7.el9_1.x86_64.rpmEpodman-gvproxy-4.2.0-7.el9_1.x86_64.rpm\podman-catatonit-4.2.0-7.el9_1.x86_64.rpm5podman-tests-4.2.0-7.el9_1.x86_64.rpm4podman-remote-4.2.0-7.el9_1.x86_64.rpm2podman-4.2.0-7.el9_1.x86_64.rpmgpodman-docker-4.2.0-7.el9_1.noarch.rpm3podman-plugins-4.2.0-7.el9_1.x86_64.rpmEpodman-gvproxy-4.2.0-7.el9_1.x86_64.rpm\podman-catatonit-4.2.0-7.el9_1.x86_64.rpm5podman-tests-4.2.0-7.el9_1.x86_64.rpms +WBBBBBBBBBBBBBBBBBBsecurityModerate: dotnet7.0 security, bug fix, and enhancement update03Ihttps://access.redhat.com/errata/RHSA-2022:8434RHSA-2022:8434RHSA-2022:8434 https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-8434.htmlALSA-2022:8434ALSA-2022:8434 =~dotnet-apphost-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm~dotnet-host-7.0.0-0.5.rc2.el9_1.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.100-0.5.rc2.el9_1.x86_64.rpmGdotnet-templates-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm9~aspnetcore-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm?~dotnet-hostfxr-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmA~dotnet-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmE~dotnet-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmCdotnet-sdk-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm;~aspnetcore-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm =~dotnet-apphost-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm~dotnet-host-7.0.0-0.5.rc2.el9_1.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.100-0.5.rc2.el9_1.x86_64.rpmGdotnet-templates-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm9~aspnetcore-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm?~dotnet-hostfxr-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmA~dotnet-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmE~dotnet-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmCdotnet-sdk-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpm;~aspnetcore-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm]t 9lBBBBBBBBBBBsecurityModerate: keylime security update0|https://access.redhat.com/errata/RHSA-2022:8444RHSA-2022:8444RHSA-2022:8444 https://access.redhat.com/security/cve/CVE-2022-3500CVE-2022-3500CVE-2022-3500https://bugzilla.redhat.com/21353432135343https://errata.almalinux.org/9/ALSA-2022-8444.htmlALSA-2022:8444ALSA-2022:8444 Zkeylime-selinux-6.5.1-1.el9_1.noarch.rpm2keylime-6.5.1-1.el9_1.x86_64.rpmGpython3-keylime-6.5.1-1.el9_1.x86_64.rpm4keylime-registrar-6.5.1-1.el9_1.x86_64.rpm3keylime-base-6.5.1-1.el9_1.x86_64.rpm5keylime-tenant-6.5.1-1.el9_1.x86_64.rpm6keylime-verifier-6.5.1-1.el9_1.x86_64.rpmZkeylime-selinux-6.5.1-1.el9_1.noarch.rpm2keylime-6.5.1-1.el9_1.x86_64.rpmGpython3-keylime-6.5.1-1.el9_1.x86_64.rpm4keylime-registrar-6.5.1-1.el9_1.x86_64.rpm3keylime-base-6.5.1-1.el9_1.x86_64.rpm5keylime-tenant-6.5.1-1.el9_1.x86_64.rpm6keylime-verifier-6.5.1-1.el9_1.x86_64.rpm'u zBBBBsecurityImportant: python3.9 security update0Qhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493 https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:8493 jpython-unversioned-command-3.9.14-1.el9_1.1.noarch.rpmWpython3-devel-3.9.14-1.el9_1.1.i686.rpmWpython3-devel-3.9.14-1.el9_1.1.x86_64.rpm=python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpmjpython-unversioned-command-3.9.14-1.el9_1.1.noarch.rpmWpython3-devel-3.9.14-1.el9_1.1.i686.rpmWpython3-devel-3.9.14-1.el9_1.1.x86_64.rpm=python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpmzv AsecurityImportant: thunderbird security update0`Dhttps://access.redhat.com/errata/RHSA-2022:8561RHSA-2022:8561RHSA-2022:8561 https://access.redhat.com/security/cve/CVE-2022-45403CVE-2022-45403CVE-2022-45403https://access.redhat.com/security/cve/CVE-2022-45404CVE-2022-45404CVE-2022-45404https://access.redhat.com/security/cve/CVE-2022-45405CVE-2022-45405CVE-2022-45405https://access.redhat.com/security/cve/CVE-2022-45406CVE-2022-45406CVE-2022-45406https://access.redhat.com/security/cve/CVE-2022-45408CVE-2022-45408CVE-2022-45408https://access.redhat.com/security/cve/CVE-2022-45409CVE-2022-45409CVE-2022-45409https://access.redhat.com/security/cve/CVE-2022-45410CVE-2022-45410CVE-2022-45410https://access.redhat.com/security/cve/CVE-2022-45411CVE-2022-45411CVE-2022-45411https://access.redhat.com/security/cve/CVE-2022-45412CVE-2022-45412CVE-2022-45412https://access.redhat.com/security/cve/CVE-2022-45416CVE-2022-45416CVE-2022-45416https://access.redhat.com/security/cve/CVE-2022-45418CVE-2022-45418CVE-2022-45418https://access.redhat.com/security/cve/CVE-2022-45420CVE-2022-45420CVE-2022-45420https://access.redhat.com/security/cve/CVE-2022-45421CVE-2022-45421CVE-2022-45421https://bugzilla.redhat.com/21431972143197https://bugzilla.redhat.com/21431982143198https://bugzilla.redhat.com/21431992143199https://bugzilla.redhat.com/21432002143200https://bugzilla.redhat.com/21432012143201https://bugzilla.redhat.com/21432022143202https://bugzilla.redhat.com/21432032143203https://bugzilla.redhat.com/21432042143204https://bugzilla.redhat.com/21432052143205https://bugzilla.redhat.com/21432402143240https://bugzilla.redhat.com/21432412143241https://bugzilla.redhat.com/21432422143242https://bugzilla.redhat.com/21432432143243https://errata.almalinux.org/9/ALSA-2022-8561.htmlALSA-2022:8561ALSA-2022:8561 :Athunderbird-102.5.0-2.el9_1.alma.x86_64.rpm:Athunderbird-102.5.0-2.el9_1.alma.x86_64.rpm}wy DsecurityImportant: firefox security update0$uhttps://access.redhat.com/errata/RHSA-2022:8580RHSA-2022:8580RHSA-2022:8580 https://access.redhat.com/security/cve/CVE-2022-45403CVE-2022-45403CVE-2022-45403https://access.redhat.com/security/cve/CVE-2022-45404CVE-2022-45404CVE-2022-45404https://access.redhat.com/security/cve/CVE-2022-45405CVE-2022-45405CVE-2022-45405https://access.redhat.com/security/cve/CVE-2022-45406CVE-2022-45406CVE-2022-45406https://access.redhat.com/security/cve/CVE-2022-45408CVE-2022-45408CVE-2022-45408https://access.redhat.com/security/cve/CVE-2022-45409CVE-2022-45409CVE-2022-45409https://access.redhat.com/security/cve/CVE-2022-45410CVE-2022-45410CVE-2022-45410https://access.redhat.com/security/cve/CVE-2022-45411CVE-2022-45411CVE-2022-45411https://access.redhat.com/security/cve/CVE-2022-45412CVE-2022-45412CVE-2022-45412https://access.redhat.com/security/cve/CVE-2022-45416CVE-2022-45416CVE-2022-45416https://access.redhat.com/security/cve/CVE-2022-45418CVE-2022-45418CVE-2022-45418https://access.redhat.com/security/cve/CVE-2022-45420CVE-2022-45420CVE-2022-45420https://access.redhat.com/security/cve/CVE-2022-45421CVE-2022-45421CVE-2022-45421https://bugzilla.redhat.com/21431972143197https://bugzilla.redhat.com/21431982143198https://bugzilla.redhat.com/21431992143199https://bugzilla.redhat.com/21432002143200https://bugzilla.redhat.com/21432012143201https://bugzilla.redhat.com/21432022143202https://bugzilla.redhat.com/21432032143203https://bugzilla.redhat.com/21432042143204https://bugzilla.redhat.com/21432052143205https://bugzilla.redhat.com/21432402143240https://bugzilla.redhat.com/21432412143241https://bugzilla.redhat.com/21432422143242https://bugzilla.redhat.com/21432432143243https://errata.almalinux.org/9/ALSA-2022-8580.htmlALSA-2022:8580ALSA-2022:8580 8@firefox-102.5.0-1.el9_1.alma.x86_64.rpm8@firefox-102.5.0-1.el9_1.alma.x86_64.rpmRx GBsecurityImportant: krb5 security update0ghttps://access.redhat.com/errata/RHSA-2022:8637RHSA-2022:8637RHSA-2022:8637 https://access.redhat.com/security/cve/CVE-2022-42898CVE-2022-42898CVE-2022-42898https://bugzilla.redhat.com/21409602140960https://errata.almalinux.org/9/ALSA-2022-8637.htmlALSA-2022:8637ALSA-2022:8637 <krb5-devel-1.19.1-24.el9_1.i686.rpm<krb5-devel-1.19.1-24.el9_1.x86_64.rpm<krb5-devel-1.19.1-24.el9_1.i686.rpm<krb5-devel-1.19.1-24.el9_1.x86_64.rpmy KBBBsecurityImportant: varnish security update0Vhttps://access.redhat.com/errata/RHSA-2022:8643RHSA-2022:8643RHSA-2022:8643 https://access.redhat.com/security/cve/CVE-2022-45060CVE-2022-45060CVE-2022-45060https://bugzilla.redhat.com/21418442141844https://errata.almalinux.org/9/ALSA-2022-8643.htmlALSA-2022:8643ALSA-2022:8643 4varnish-docs-6.6.2-2.el9_1.1.x86_64.rpmpvarnish-6.6.2-2.el9_1.1.i686.rpmpvarnish-6.6.2-2.el9_1.1.x86_64.rpm4varnish-docs-6.6.2-2.el9_1.1.x86_64.rpmpvarnish-6.6.2-2.el9_1.1.i686.rpmpvarnish-6.6.2-2.el9_1.1.x86_64.rpmz uB\BBBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement update0V}https://access.redhat.com/errata/RHSA-2022:8832RHSA-2022:8832RHSA-2022:8832 https://access.redhat.com/security/cve/CVE-2022-3517CVE-2022-3517CVE-2022-3517https://access.redhat.com/security/cve/CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/21346092134609https://bugzilla.redhat.com/21409112140911https://errata.almalinux.org/9/ALSA-2022-8832.htmlALSA-2022:8832ALSA-2022:8832 94](N?nodejs-docs-18.12.1-1.module_el9.1.0+16+91bc168f.noarch.rpm nodejs-nodemon-2.0.20-1.module_el9.1.0+16+91bc168f.noarch.rpmfnpm-8.19.2-1.18.12.1.1.module_el9.1.0+16+91bc168f.x86_64.rpmlhttps://access.redhat.com/errata/RHSA-2023:0005RHSA-2023:0005RHSA-2023:0005 https://access.redhat.com/security/cve/CVE-2022-42920CVE-2022-42920CVE-2022-42920https://bugzilla.redhat.com/21427072142707https://errata.almalinux.org/9/ALSA-2023-0005.htmlALSA-2023:0005ALSA-2023:0005 [Sbcel-6.4.1-9.el9_1.noarch.rpm[Sbcel-6.4.1-9.el9_1.noarch.rpme~ 0dBBBBBBBBBBsecurityImportant: webkit2gtk3 security update*https://access.redhat.com/errata/RHSA-2023:0021RHSA-2023:0021RHSA-2023:0021 https://access.redhat.com/security/cve/CVE-2022-42856CVE-2022-42856CVE-2022-42856https://bugzilla.redhat.com/21536832153683https://errata.almalinux.org/9/ALSA-2023-0021.htmlALSA-2023:0021ALSA-2023:0021 4_webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm3_webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm2_webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm3_webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm1_webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm4_webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm2_webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm1_webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm4_webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm3_webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm2_webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm3_webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm1_webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm4_webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm2_webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm1_webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm  qBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security, bug fix, and enhancement updateD`https://access.redhat.com/errata/RHSA-2023:0077RHSA-2023:0077RHSA-2023:0077 https://access.redhat.com/security/cve/CVE-2023-21538CVE-2023-21538CVE-2023-21538https://bugzilla.redhat.com/21583422158342https://errata.almalinux.org/9/ALSA-2023-0077.htmlALSA-2023:0077ALSA-2023:0077  dotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm aspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm dotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpmFdotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpm dotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpm aspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpmFdotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm dotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm dotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm aspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm dotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpmFdotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpm dotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpm aspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpmFdotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm dotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm BBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update$Hhttps://access.redhat.com/errata/RHSA-2023:0194RHSA-2023:0194RHSA-2023:0194 https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0194.htmlALSA-2023:0194ALSA-2023:0194  java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm  java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm 'UBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix updatellhttps://access.redhat.com/errata/RHSA-2023:0202RHSA-2023:0202RHSA-2023:0202 https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0202.htmlALSA-2023:0202ALSA-2023:0202 qwjava-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpmowjava-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpmtwjava-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpmmwjava-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpmrwjava-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpmnwjava-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpmlwjava-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpmpwjava-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpmswjava-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm qwjava-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpmowjava-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpmtwjava-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpmmwjava-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpmrwjava-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpmnwjava-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpmlwjava-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpmpwjava-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpmswjava-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm 4hBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix updateXxhttps://access.redhat.com/errata/RHSA-2023:0210RHSA-2023:0210RHSA-2023:0210 https://access.redhat.com/security/cve/CVE-2023-21830CVE-2023-21830CVE-2023-21830https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604752160475https://bugzilla.redhat.com/21604902160490https://errata.almalinux.org/9/ALSA-2023-0210.htmlALSA-2023:0210ALSA-2023:0210 6-java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.x86_64.rpm5-java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.x86_64.rpm3-java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.x86_64.rpm4-java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.x86_64.rpm2-java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.x86_64.rpm:-java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpm;-java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpm6-java-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.x86_64.rpm5-java-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.x86_64.rpm3-java-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.x86_64.rpm4-java-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.x86_64.rpm2-java-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.x86_64.rpm:-java-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpm;-java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpm 7usecurityImportant: sudo security updatePhttps://access.redhat.com/errata/RHSA-2023:0282RHSA-2023:0282RHSA-2023:0282 https://access.redhat.com/security/cve/CVE-2023-22809CVE-2023-22809CVE-2023-22809https://bugzilla.redhat.com/21611422161142https://errata.almalinux.org/9/ALSA-2023-0282.htmlALSA-2023:0282ALSA-2023:0282 8sudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpm8sudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpmO :xsecurityImportant: firefox security update^=https://access.redhat.com/errata/RHSA-2023:0285RHSA-2023:0285RHSA-2023:0285 https://access.redhat.com/security/cve/CVE-2022-46871CVE-2022-46871CVE-2022-46871https://access.redhat.com/security/cve/CVE-2022-46877CVE-2022-46877CVE-2022-46877https://access.redhat.com/security/cve/CVE-2023-23598CVE-2023-23598CVE-2023-23598https://access.redhat.com/security/cve/CVE-2023-23599CVE-2023-23599CVE-2023-23599https://access.redhat.com/security/cve/CVE-2023-23601CVE-2023-23601CVE-2023-23601https://access.redhat.com/security/cve/CVE-2023-23602CVE-2023-23602CVE-2023-23602https://access.redhat.com/security/cve/CVE-2023-23603CVE-2023-23603CVE-2023-23603https://access.redhat.com/security/cve/CVE-2023-23605CVE-2023-23605CVE-2023-23605https://bugzilla.redhat.com/21623362162336https://bugzilla.redhat.com/21623382162338https://bugzilla.redhat.com/21623392162339https://bugzilla.redhat.com/21623402162340https://bugzilla.redhat.com/21623412162341https://bugzilla.redhat.com/21623422162342https://bugzilla.redhat.com/21623432162343https://bugzilla.redhat.com/21623442162344https://errata.almalinux.org/9/ALSA-2023-0285.htmlALSA-2023:0285ALSA-2023:0285 8Dfirefox-102.7.0-1.el9_1.alma.x86_64.rpm8Dfirefox-102.7.0-1.el9_1.alma.x86_64.rpm {BBBBsecurityModerate: libtiff security update{https://access.redhat.com/errata/RHSA-2023:0302RHSA-2023:0302RHSA-2023:0302 https://access.redhat.com/security/cve/CVE-2022-2056CVE-2022-2056CVE-2022-2056https://access.redhat.com/security/cve/CVE-2022-2057CVE-2022-2057CVE-2022-2057https://access.redhat.com/security/cve/CVE-2022-2058CVE-2022-2058CVE-2022-2058https://access.redhat.com/security/cve/CVE-2022-2519CVE-2022-2519CVE-2022-2519https://access.redhat.com/security/cve/CVE-2022-2520CVE-2022-2520CVE-2022-2520https://access.redhat.com/security/cve/CVE-2022-2521CVE-2022-2521CVE-2022-2521https://access.redhat.com/security/cve/CVE-2022-2953CVE-2022-2953CVE-2022-2953https://bugzilla.redhat.com/21032222103222https://bugzilla.redhat.com/21227892122789https://bugzilla.redhat.com/21227922122792https://bugzilla.redhat.com/21227992122799https://bugzilla.redhat.com/21344322134432https://errata.almalinux.org/9/ALSA-2023-0302.htmlALSA-2023:0302ALSA-2023:0302 h4libtiff-devel-4.4.0-5.el9_1.i686.rpmg4libtiff-4.4.0-5.el9_1.i686.rpmh4libtiff-devel-4.4.0-5.el9_1.x86_64.rpmg4libtiff-4.4.0-5.el9_1.x86_64.rpmh4libtiff-devel-4.4.0-5.el9_1.i686.rpmg4libtiff-4.4.0-5.el9_1.i686.rpmh4libtiff-devel-4.4.0-5.el9_1.x86_64.rpmg4libtiff-4.4.0-5.el9_1.x86_64.rpm BBBBBBBBBsecurityModerate: usbguard security update*https://access.redhat.com/errata/RHSA-2023:0303RHSA-2023:0303RHSA-2023:0303 https://access.redhat.com/security/cve/CVE-2019-25058CVE-2019-25058CVE-2019-25058https://bugzilla.redhat.com/20584652058465https://errata.almalinux.org/9/ALSA-2023-0303.htmlALSA-2023:0303ALSA-2023:0303 &3usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm$3usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpmf3usbguard-1.0.0-10.el9_1.2.i686.rpmf3usbguard-1.0.0-10.el9_1.2.x86_64.rpmW3usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm%3usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm&3usbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm$3usbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpmf3usbguard-1.0.0-10.el9_1.2.i686.rpmf3usbguard-1.0.0-10.el9_1.2.x86_64.rpmW3usbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm%3usbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update@z https://access.redhat.com/errata/RHSA-2023:0304RHSA-2023:0304RHSA-2023:0304 https://access.redhat.com/security/cve/CVE-2022-26305CVE-2022-26305CVE-2022-26305https://access.redhat.com/security/cve/CVE-2022-26306CVE-2022-26306CVE-2022-26306https://access.redhat.com/security/cve/CVE-2022-26307CVE-2022-26307CVE-2022-26307https://access.redhat.com/security/cve/CVE-2022-3140CVE-2022-3140CVE-2022-3140https://bugzilla.redhat.com/21186102118610https://bugzilla.redhat.com/21186112118611https://bugzilla.redhat.com/21186132118613https://bugzilla.redhat.com/21346972134697https://errata.almalinux.org/9/ALSA-2023-0304.htmlALSA-2023:0304ALSA-2023:0304 0Xlibreoffice-help-da-7.1.8.1-8.el9_1.alma.x86_64.rpm/libreoffice-langpack-pa-7.1.8.1-8.el9_1.alma.x86_64.rpmGlibreoffice-langpack-zu-7.1.8.1-8.el9_1.alma.x86_64.rpm"autocorr-lb-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-cs-7.1.8.1-8.el9_1.alma.noarch.rpmHlibreoffice-math-7.1.8.1-8.el9_1.alma.x86_64.rpm6libreoffice-langpack-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm'autocorr-pt-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-is-7.1.8.1-8.el9_1.alma.noarch.rpm'libreoffice-langpack-ml-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-bg-7.1.8.1-8.el9_1.alma.noarch.rpmilibreoffice-help-id-7.1.8.1-8.el9_1.alma.x86_64.rpmPlibreoffice-gdb-debug-support-7.1.8.1-8.el9_1.alma.x86_64.rpm<libreoffice-langpack-ta-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm,autocorr-sr-7.1.8.1-8.el9_1.alma.noarch.rpm\libreoffice-help-en-7.1.8.1-8.el9_1.alma.x86_64.rpmvlibreoffice-help-ru-7.1.8.1-8.el9_1.alma.x86_64.rpm(autocorr-ro-7.1.8.1-8.el9_1.alma.noarch.rpmYlibreoffice-help-de-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-8.el9_1.alma.x86_64.rpm.autocorr-tr-7.1.8.1-8.el9_1.alma.noarch.rpm*autocorr-sk-7.1.8.1-8.el9_1.alma.noarch.rpmOlibreoffice-x11-7.1.8.1-8.el9_1.alma.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-de-7.1.8.1-8.el9_1.alma.x86_64.rpm:libreoffice-langpack-st-7.1.8.1-8.el9_1.alma.x86_64.rpm+autocorr-sl-7.1.8.1-8.el9_1.alma.noarch.rpmJlibreoffice-pdfimport-7.1.8.1-8.el9_1.alma.x86_64.rpm|libreoffice-help-tr-7.1.8.1-8.el9_1.alma.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-fr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm)libreoffice-langpack-nb-7.1.8.1-8.el9_1.alma.x86_64.rpmNlibreoffice-writer-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-fy-7.1.8.1-8.el9_1.alma.x86_64.rpm~libreoffice-help-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm"libreoffice-langpack-kn-7.1.8.1-8.el9_1.alma.x86_64.rpmdlibreoffice-help-gu-7.1.8.1-8.el9_1.alma.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-8.el9_1.alma.x86_64.rpm&libreoffice-langpack-mai-7.1.8.1-8.el9_1.alma.x86_64.rpm_libreoffice-help-et-7.1.8.1-8.el9_1.alma.x86_64.rpmalibreoffice-help-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmDlibreoffice-langpack-xh-7.1.8.1-8.el9_1.alma.x86_64.rpmplibreoffice-help-nl-7.1.8.1-8.el9_1.alma.x86_64.rpm/autocorr-vi-7.1.8.1-8.el9_1.alma.noarch.rpm*libreoffice-langpack-nl-7.1.8.1-8.el9_1.alma.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-8.el9_1.alma.x86_64.rpmVlibreoffice-help-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-8.el9_1.alma.x86_64.rpm-autocorr-sv-7.1.8.1-8.el9_1.alma.noarch.rpm3libreoffice-langpack-ro-7.1.8.1-8.el9_1.alma.x86_64.rpmUlibreoffice-help-bn-7.1.8.1-8.el9_1.alma.x86_64.rpmylibreoffice-help-sl-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-ga-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm7libreoffice-langpack-sl-7.1.8.1-8.el9_1.alma.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-8.el9_1.alma.x86_64.rpmglibreoffice-help-hr-7.1.8.1-8.el9_1.alma.x86_64.rpm@libreoffice-langpack-tr-7.1.8.1-8.el9_1.alma.x86_64.rpmQlibreofficekit-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-8.el9_1.alma.x86_64.rpm2libreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpmblibreoffice-help-fr-7.1.8.1-8.el9_1.alma.x86_64.rpmMlibreoffice-draw-7.1.8.1-8.el9_1.alma.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-8.el9_1.alma.x86_64.rpmnlibreoffice-help-lv-7.1.8.1-8.el9_1.alma.x86_64.rpm&autocorr-pl-7.1.8.1-8.el9_1.alma.noarch.rpmllibreoffice-help-ko-7.1.8.1-8.el9_1.alma.x86_64.rpm9libreoffice-langpack-ss-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-cy-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-ca-7.1.8.1-8.el9_1.alma.noarch.rpm libreoffice-langpack-ja-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-fa-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-dsb-7.1.8.1-8.el9_1.alma.noarch.rpmslibreoffice-help-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpm>libreoffice-langpack-th-7.1.8.1-8.el9_1.alma.x86_64.rpm!libreoffice-langpack-kk-7.1.8.1-8.el9_1.alma.x86_64.rpm^libreoffice-help-es-7.1.8.1-8.el9_1.alma.x86_64.rpmNlibreoffice-emailmerge-7.1.8.1-8.el9_1.alma.x86_64.rpm(libreoffice-langpack-mr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-da-7.1.8.1-8.el9_1.alma.noarch.rpmrlibreoffice-help-pl-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-he-7.1.8.1-8.el9_1.alma.x86_64.rpm!autocorr-ko-7.1.8.1-8.el9_1.alma.noarch.rpm0autocorr-vro-7.1.8.1-8.el9_1.alma.noarch.rpmtlibreoffice-help-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpm autocorr-af-7.1.8.1-8.el9_1.alma.noarch.rpmjlibreoffice-help-it-7.1.8.1-8.el9_1.alma.x86_64.rpmhlibreoffice-help-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm.libreoffice-langpack-or-7.1.8.1-8.el9_1.alma.x86_64.rpmklibreoffice-help-ja-7.1.8.1-8.el9_1.alma.x86_64.rpmmlibreoffice-help-lt-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-8.el9_1.alma.x86_64.rpm`libreoffice-help-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm%autocorr-nl-7.1.8.1-8.el9_1.alma.noarch.rpm libreoffice-langpack-el-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-en-7.1.8.1-8.el9_1.alma.noarch.rpmMlibreoffice-wiki-publisher-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-8.el9_1.alma.x86_64.rpmelibreoffice-help-he-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-de-7.1.8.1-8.el9_1.alma.noarch.rpmclibreoffice-help-gl-7.1.8.1-8.el9_1.alma.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-hsb-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-eo-7.1.8.1-8.el9_1.alma.x86_64.rpmolibreoffice-help-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm4libreoffice-langpack-ru-7.1.8.1-8.el9_1.alma.x86_64.rpmBlibreoffice-langpack-uk-7.1.8.1-8.el9_1.alma.x86_64.rpmwlibreoffice-help-si-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-da-7.1.8.1-8.el9_1.alma.x86_64.rpm#autocorr-lt-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-ga-7.1.8.1-8.el9_1.alma.x86_64.rpm}libreoffice-help-uk-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-it-7.1.8.1-8.el9_1.alma.x86_64.rpmOlibreoffice-filters-7.1.8.1-8.el9_1.alma.x86_64.rpm5libreoffice-langpack-si-7.1.8.1-8.el9_1.alma.x86_64.rpmPlibreoffice-xsltfilter-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-fi-7.1.8.1-8.el9_1.alma.noarch.rpm]libreoffice-help-eo-7.1.8.1-8.el9_1.alma.x86_64.rpmqlibreoffice-help-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm?libreoffice-langpack-tn-7.1.8.1-8.el9_1.alma.x86_64.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpmElibreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm#libreoffice-langpack-ko-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-es-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-fa-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-gl-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-fr-7.1.8.1-8.el9_1.alma.noarch.rpm)autocorr-ru-7.1.8.1-8.el9_1.alma.noarch.rpmDlibreoffice-data-7.1.8.1-8.el9_1.alma.noarch.rpm;libreoffice-langpack-sv-7.1.8.1-8.el9_1.alma.x86_64.rpmflibreoffice-help-hi-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-hi-7.1.8.1-8.el9_1.alma.x86_64.rpmKlibreoffice-pyuno-7.1.8.1-8.el9_1.alma.x86_64.rpmZlibreoffice-help-dz-7.1.8.1-8.el9_1.alma.x86_64.rpmWlibreoffice-help-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmxlibreoffice-help-sk-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-it-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-bn-7.1.8.1-8.el9_1.alma.x86_64.rpm$autocorr-mn-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-hu-7.1.8.1-8.el9_1.alma.noarch.rpm$libreoffice-langpack-lt-7.1.8.1-8.el9_1.alma.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-8.el9_1.alma.x86_64.rpm-libreoffice-langpack-nso-7.1.8.1-8.el9_1.alma.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-8.el9_1.alma.x86_64.rpmAlibreoffice-langpack-ts-7.1.8.1-8.el9_1.alma.x86_64.rpmJlibreoffice-base-7.1.8.1-8.el9_1.alma.x86_64.rpmKlibreoffice-calc-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-impress-7.1.8.1-8.el9_1.alma.x86_64.rpmIlibreoffice-ogltrans-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-8.el9_1.alma.x86_64.rpm1autocorr-zh-7.1.8.1-8.el9_1.alma.noarch.rpm[libreoffice-help-el-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-hr-7.1.8.1-8.el9_1.alma.x86_64.rpmLlibreoffice-core-7.1.8.1-8.el9_1.alma.x86_64.rpmElibreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-hr-7.1.8.1-8.el9_1.alma.noarch.rpmulibreoffice-help-ro-7.1.8.1-8.el9_1.alma.x86_64.rpmLlibreoffice-ure-7.1.8.1-8.el9_1.alma.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-8.el9_1.alma.x86_64.rpm autocorr-ja-7.1.8.1-8.el9_1.alma.noarch.rpmRlibreoffice-gtk3-7.1.8.1-8.el9_1.alma.x86_64.rpm=libreoffice-langpack-te-7.1.8.1-8.el9_1.alma.x86_64.rpmClibreoffice-langpack-ve-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-el-7.1.8.1-8.el9_1.alma.noarch.rpm{libreoffice-help-ta-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-id-7.1.8.1-8.el9_1.alma.x86_64.rpm+libreoffice-langpack-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm0Xlibreoffice-help-da-7.1.8.1-8.el9_1.alma.x86_64.rpm/libreoffice-langpack-pa-7.1.8.1-8.el9_1.alma.x86_64.rpmGlibreoffice-langpack-zu-7.1.8.1-8.el9_1.alma.x86_64.rpm"autocorr-lb-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-cs-7.1.8.1-8.el9_1.alma.noarch.rpmHlibreoffice-math-7.1.8.1-8.el9_1.alma.x86_64.rpm6libreoffice-langpack-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm'autocorr-pt-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-is-7.1.8.1-8.el9_1.alma.noarch.rpm'libreoffice-langpack-ml-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-bg-7.1.8.1-8.el9_1.alma.noarch.rpmilibreoffice-help-id-7.1.8.1-8.el9_1.alma.x86_64.rpmPlibreoffice-gdb-debug-support-7.1.8.1-8.el9_1.alma.x86_64.rpm<libreoffice-langpack-ta-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm,autocorr-sr-7.1.8.1-8.el9_1.alma.noarch.rpm\libreoffice-help-en-7.1.8.1-8.el9_1.alma.x86_64.rpmvlibreoffice-help-ru-7.1.8.1-8.el9_1.alma.x86_64.rpm(autocorr-ro-7.1.8.1-8.el9_1.alma.noarch.rpmYlibreoffice-help-de-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-8.el9_1.alma.x86_64.rpm.autocorr-tr-7.1.8.1-8.el9_1.alma.noarch.rpm*autocorr-sk-7.1.8.1-8.el9_1.alma.noarch.rpmOlibreoffice-x11-7.1.8.1-8.el9_1.alma.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-de-7.1.8.1-8.el9_1.alma.x86_64.rpm:libreoffice-langpack-st-7.1.8.1-8.el9_1.alma.x86_64.rpm+autocorr-sl-7.1.8.1-8.el9_1.alma.noarch.rpmJlibreoffice-pdfimport-7.1.8.1-8.el9_1.alma.x86_64.rpm|libreoffice-help-tr-7.1.8.1-8.el9_1.alma.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-fr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm)libreoffice-langpack-nb-7.1.8.1-8.el9_1.alma.x86_64.rpmNlibreoffice-writer-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-fy-7.1.8.1-8.el9_1.alma.x86_64.rpm~libreoffice-help-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm"libreoffice-langpack-kn-7.1.8.1-8.el9_1.alma.x86_64.rpmdlibreoffice-help-gu-7.1.8.1-8.el9_1.alma.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-8.el9_1.alma.x86_64.rpm&libreoffice-langpack-mai-7.1.8.1-8.el9_1.alma.x86_64.rpm_libreoffice-help-et-7.1.8.1-8.el9_1.alma.x86_64.rpmalibreoffice-help-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmDlibreoffice-langpack-xh-7.1.8.1-8.el9_1.alma.x86_64.rpmplibreoffice-help-nl-7.1.8.1-8.el9_1.alma.x86_64.rpm/autocorr-vi-7.1.8.1-8.el9_1.alma.noarch.rpm*libreoffice-langpack-nl-7.1.8.1-8.el9_1.alma.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-8.el9_1.alma.x86_64.rpmVlibreoffice-help-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-8.el9_1.alma.x86_64.rpm-autocorr-sv-7.1.8.1-8.el9_1.alma.noarch.rpm3libreoffice-langpack-ro-7.1.8.1-8.el9_1.alma.x86_64.rpmUlibreoffice-help-bn-7.1.8.1-8.el9_1.alma.x86_64.rpmylibreoffice-help-sl-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-ga-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm7libreoffice-langpack-sl-7.1.8.1-8.el9_1.alma.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-8.el9_1.alma.x86_64.rpmglibreoffice-help-hr-7.1.8.1-8.el9_1.alma.x86_64.rpm@libreoffice-langpack-tr-7.1.8.1-8.el9_1.alma.x86_64.rpmQlibreofficekit-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-8.el9_1.alma.x86_64.rpm2libreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpmblibreoffice-help-fr-7.1.8.1-8.el9_1.alma.x86_64.rpmMlibreoffice-draw-7.1.8.1-8.el9_1.alma.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-8.el9_1.alma.x86_64.rpmnlibreoffice-help-lv-7.1.8.1-8.el9_1.alma.x86_64.rpm&autocorr-pl-7.1.8.1-8.el9_1.alma.noarch.rpmllibreoffice-help-ko-7.1.8.1-8.el9_1.alma.x86_64.rpm9libreoffice-langpack-ss-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-cy-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-ca-7.1.8.1-8.el9_1.alma.noarch.rpm libreoffice-langpack-ja-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-fa-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-dsb-7.1.8.1-8.el9_1.alma.noarch.rpmslibreoffice-help-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpm>libreoffice-langpack-th-7.1.8.1-8.el9_1.alma.x86_64.rpm!libreoffice-langpack-kk-7.1.8.1-8.el9_1.alma.x86_64.rpm^libreoffice-help-es-7.1.8.1-8.el9_1.alma.x86_64.rpmNlibreoffice-emailmerge-7.1.8.1-8.el9_1.alma.x86_64.rpm(libreoffice-langpack-mr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-da-7.1.8.1-8.el9_1.alma.noarch.rpmrlibreoffice-help-pl-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-he-7.1.8.1-8.el9_1.alma.x86_64.rpm!autocorr-ko-7.1.8.1-8.el9_1.alma.noarch.rpm0autocorr-vro-7.1.8.1-8.el9_1.alma.noarch.rpmtlibreoffice-help-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpm autocorr-af-7.1.8.1-8.el9_1.alma.noarch.rpmjlibreoffice-help-it-7.1.8.1-8.el9_1.alma.x86_64.rpmhlibreoffice-help-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm.libreoffice-langpack-or-7.1.8.1-8.el9_1.alma.x86_64.rpmklibreoffice-help-ja-7.1.8.1-8.el9_1.alma.x86_64.rpmmlibreoffice-help-lt-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-8.el9_1.alma.x86_64.rpm`libreoffice-help-eu-7.1.8.1-8.el9_1.alma.x86_64.rpm%autocorr-nl-7.1.8.1-8.el9_1.alma.noarch.rpm libreoffice-langpack-el-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-en-7.1.8.1-8.el9_1.alma.noarch.rpmMlibreoffice-wiki-publisher-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-8.el9_1.alma.x86_64.rpmelibreoffice-help-he-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-de-7.1.8.1-8.el9_1.alma.noarch.rpmclibreoffice-help-gl-7.1.8.1-8.el9_1.alma.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-hsb-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-eo-7.1.8.1-8.el9_1.alma.x86_64.rpmolibreoffice-help-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm4libreoffice-langpack-ru-7.1.8.1-8.el9_1.alma.x86_64.rpmBlibreoffice-langpack-uk-7.1.8.1-8.el9_1.alma.x86_64.rpmwlibreoffice-help-si-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-da-7.1.8.1-8.el9_1.alma.x86_64.rpm#autocorr-lt-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-ga-7.1.8.1-8.el9_1.alma.x86_64.rpm}libreoffice-help-uk-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-it-7.1.8.1-8.el9_1.alma.x86_64.rpmOlibreoffice-filters-7.1.8.1-8.el9_1.alma.x86_64.rpm5libreoffice-langpack-si-7.1.8.1-8.el9_1.alma.x86_64.rpmPlibreoffice-xsltfilter-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-fi-7.1.8.1-8.el9_1.alma.noarch.rpm]libreoffice-help-eo-7.1.8.1-8.el9_1.alma.x86_64.rpmqlibreoffice-help-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm?libreoffice-langpack-tn-7.1.8.1-8.el9_1.alma.x86_64.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpmElibreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpm#libreoffice-langpack-ko-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-es-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-fa-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-gl-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-fr-7.1.8.1-8.el9_1.alma.noarch.rpm)autocorr-ru-7.1.8.1-8.el9_1.alma.noarch.rpmDlibreoffice-data-7.1.8.1-8.el9_1.alma.noarch.rpm;libreoffice-langpack-sv-7.1.8.1-8.el9_1.alma.x86_64.rpmflibreoffice-help-hi-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-hi-7.1.8.1-8.el9_1.alma.x86_64.rpmKlibreoffice-pyuno-7.1.8.1-8.el9_1.alma.x86_64.rpmZlibreoffice-help-dz-7.1.8.1-8.el9_1.alma.x86_64.rpmWlibreoffice-help-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmxlibreoffice-help-sk-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-it-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-bn-7.1.8.1-8.el9_1.alma.x86_64.rpm$autocorr-mn-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-hu-7.1.8.1-8.el9_1.alma.noarch.rpm$libreoffice-langpack-lt-7.1.8.1-8.el9_1.alma.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-8.el9_1.alma.x86_64.rpm-libreoffice-langpack-nso-7.1.8.1-8.el9_1.alma.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-8.el9_1.alma.x86_64.rpmAlibreoffice-langpack-ts-7.1.8.1-8.el9_1.alma.x86_64.rpmJlibreoffice-base-7.1.8.1-8.el9_1.alma.x86_64.rpmKlibreoffice-calc-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-impress-7.1.8.1-8.el9_1.alma.x86_64.rpmIlibreoffice-ogltrans-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-8.el9_1.alma.x86_64.rpm1autocorr-zh-7.1.8.1-8.el9_1.alma.noarch.rpm[libreoffice-help-el-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-hr-7.1.8.1-8.el9_1.alma.x86_64.rpmLlibreoffice-core-7.1.8.1-8.el9_1.alma.x86_64.rpmElibreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.alma.noarch.rpmautocorr-hr-7.1.8.1-8.el9_1.alma.noarch.rpmulibreoffice-help-ro-7.1.8.1-8.el9_1.alma.x86_64.rpmLlibreoffice-ure-7.1.8.1-8.el9_1.alma.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-8.el9_1.alma.x86_64.rpm autocorr-ja-7.1.8.1-8.el9_1.alma.noarch.rpmRlibreoffice-gtk3-7.1.8.1-8.el9_1.alma.x86_64.rpm=libreoffice-langpack-te-7.1.8.1-8.el9_1.alma.x86_64.rpmClibreoffice-langpack-ve-7.1.8.1-8.el9_1.alma.x86_64.rpmautocorr-el-7.1.8.1-8.el9_1.alma.noarch.rpm{libreoffice-help-ta-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-id-7.1.8.1-8.el9_1.alma.x86_64.rpm+libreoffice-langpack-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm6 securityModerate: postgresql-jdbc security update:khttps://access.redhat.com/errata/RHSA-2023:0318RHSA-2023:0318RHSA-2023:0318 https://access.redhat.com/security/cve/CVE-2022-31197CVE-2022-31197CVE-2022-31197https://bugzilla.redhat.com/21294282129428https://errata.almalinux.org/9/ALSA-2023-0318.htmlALSA-2023:0318ALSA-2023:0318 XBpostgresql-jdbc-42.2.18-6.el9_1.noarch.rpmXBpostgresql-jdbc-42.2.18-6.el9_1.noarch.rpmd  HBBBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security, bug fix, and enhancement update%e https://access.redhat.com/errata/RHSA-2023:0321RHSA-2023:0321RHSA-2023:0321 https://access.redhat.com/security/cve/CVE-2021-44906CVE-2021-44906CVE-2021-44906https://access.redhat.com/security/cve/CVE-2022-3517CVE-2022-3517CVE-2022-3517https://access.redhat.com/security/cve/CVE-2022-35256CVE-2022-35256CVE-2022-35256https://access.redhat.com/security/cve/CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/20660092066009https://bugzilla.redhat.com/21305182130518https://bugzilla.redhat.com/21346092134609https://bugzilla.redhat.com/21409112140911https://errata.almalinux.org/9/ALSA-2023-0321.htmlALSA-2023:0321ALSA-2023:0321 N}nodejs-docs-16.18.1-3.el9_1.noarch.rpm}nodejs-libs-16.18.1-3.el9_1.i686.rpm nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm9}nodejs-16.18.1-3.el9_1.x86_64.rpm}nodejs-libs-16.18.1-3.el9_1.x86_64.rpmh}nodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpmf~npm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpmN}nodejs-docs-16.18.1-3.el9_1.noarch.rpm}nodejs-libs-16.18.1-3.el9_1.i686.rpm nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm9}nodejs-16.18.1-3.el9_1.x86_64.rpm}nodejs-libs-16.18.1-3.el9_1.x86_64.rpmh}nodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpmf~npm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpm  TBBBBBBBBBBsecurityModerate: go-toolset and golang security and bug fix update https://access.redhat.com/errata/RHSA-2023:0328RHSA-2023:0328RHSA-2023:0328 https://access.redhat.com/security/cve/CVE-2022-2879CVE-2022-2879CVE-2022-2879https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21328672132867https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-0328.htmlALSA-2023:0328ALSA-2023:0328 IQgolang-race-1.18.9-1.el9_1.x86_64.rpmnQgo-toolset-1.18.9-1.el9_1.x86_64.rpmQgolang-tests-1.18.9-1.el9_1.noarch.rpm@Qgolang-bin-1.18.9-1.el9_1.x86_64.rpm?Qgolang-1.18.9-1.el9_1.x86_64.rpmQgolang-docs-1.18.9-1.el9_1.noarch.rpmQgolang-misc-1.18.9-1.el9_1.noarch.rpmQgolang-src-1.18.9-1.el9_1.noarch.rpmIQgolang-race-1.18.9-1.el9_1.x86_64.rpmnQgo-toolset-1.18.9-1.el9_1.x86_64.rpmQgolang-tests-1.18.9-1.el9_1.noarch.rpm@Qgolang-bin-1.18.9-1.el9_1.x86_64.rpm?Qgolang-1.18.9-1.el9_1.x86_64.rpmQgolang-docs-1.18.9-1.el9_1.noarch.rpmQgolang-misc-1.18.9-1.el9_1.noarch.rpmQgolang-src-1.18.9-1.el9_1.noarch.rpm  $aBsecurityModerate: curl security update!&https://access.redhat.com/errata/RHSA-2023:0333RHSA-2023:0333RHSA-2023:0333 https://access.redhat.com/security/cve/CVE-2022-32221CVE-2022-32221CVE-2022-32221https://bugzilla.redhat.com/21354112135411https://errata.almalinux.org/9/ALSA-2023-0333.htmlALSA-2023:0333ALSA-2023:0333 llibcurl-devel-7.76.1-19.el9_1.1.i686.rpmllibcurl-devel-7.76.1-19.el9_1.1.x86_64.rpmllibcurl-devel-7.76.1-19.el9_1.1.i686.rpmllibcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm  0eBBBBBBBBBsecurityImportant: kernel security and bug fix updateG;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334 https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334 %)perf-5.14.0-162.12.1.el9_1.x86_64.rpm)kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm")kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm$)kernel-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm!)kernel-debug-devel-5.14.0-162.12.1.el9_1.x86_64.rpm#)kernel-devel-5.14.0-162.12.1.el9_1.x86_64.rpm%)perf-5.14.0-162.12.1.el9_1.x86_64.rpm)kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm")kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm$)kernel-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm!)kernel-debug-devel-5.14.0-162.12.1.el9_1.x86_64.rpm#)kernel-devel-5.14.0-162.12.1.el9_1.x86_64.rpmd  8qBBBBBsecurityModerate: dbus security update^https://access.redhat.com/errata/RHSA-2023:0335RHSA-2023:0335RHSA-2023:0335 https://access.redhat.com/security/cve/CVE-2022-42010CVE-2022-42010CVE-2022-42010https://access.redhat.com/security/cve/CVE-2022-42011CVE-2022-42011CVE-2022-42011https://access.redhat.com/security/cve/CVE-2022-42012CVE-2022-42012CVE-2022-42012https://bugzilla.redhat.com/21336162133616https://bugzilla.redhat.com/21336172133617https://bugzilla.redhat.com/21336182133618https://errata.almalinux.org/9/ALSA-2023-0335.htmlALSA-2023:0335ALSA-2023:0335 %<dbus-daemon-1.12.20-7.el9_1.x86_64.rpm<dbus-devel-1.12.20-7.el9_1.x86_64.rpm<dbus-devel-1.12.20-7.el9_1.i686.rpm&<dbus-x11-1.12.20-7.el9_1.x86_64.rpm%<dbus-daemon-1.12.20-7.el9_1.x86_64.rpm<dbus-devel-1.12.20-7.el9_1.x86_64.rpm<dbus-devel-1.12.20-7.el9_1.i686.rpm&<dbus-x11-1.12.20-7.el9_1.x86_64.rpm >yBBBsecurityModerate: systemd security update`Qhttps://access.redhat.com/errata/RHSA-2023:0336RHSA-2023:0336RHSA-2023:0336 https://access.redhat.com/security/cve/CVE-2022-3821CVE-2022-3821CVE-2022-3821https://bugzilla.redhat.com/21393272139327https://errata.almalinux.org/9/ALSA-2023-0336.htmlALSA-2023:0336ALSA-2023:0336 ossystemd-devel-250-12.el9_1.1.x86_64.rpmossystemd-devel-250-12.el9_1.1.i686.rpm3ssystemd-journal-remote-250-12.el9_1.1.x86_64.rpmossystemd-devel-250-12.el9_1.1.x86_64.rpmossystemd-devel-250-12.el9_1.1.i686.rpm3ssystemd-journal-remote-250-12.el9_1.1.x86_64.rpm BsecurityModerate: expat security update1}https://access.redhat.com/errata/RHSA-2023:0337RHSA-2023:0337RHSA-2023:0337 https://access.redhat.com/security/cve/CVE-2022-43680CVE-2022-43680CVE-2022-43680https://bugzilla.redhat.com/21400592140059https://errata.almalinux.org/9/ALSA-2023-0337.htmlALSA-2023:0337ALSA-2023:0337 s=expat-devel-2.4.9-1.el9_1.1.i686.rpms=expat-devel-2.4.9-1.el9_1.1.x86_64.rpms=expat-devel-2.4.9-1.el9_1.1.i686.rpms=expat-devel-2.4.9-1.el9_1.1.x86_64.rpm CBsecurityModerate: libxml2 security update.Fhttps://access.redhat.com/errata/RHSA-2023:0338RHSA-2023:0338RHSA-2023:0338 https://access.redhat.com/security/cve/CVE-2022-40303CVE-2022-40303CVE-2022-40303https://access.redhat.com/security/cve/CVE-2022-40304CVE-2022-40304CVE-2022-40304https://bugzilla.redhat.com/21362662136266https://bugzilla.redhat.com/21362882136288https://errata.almalinux.org/9/ALSA-2023-0338.htmlALSA-2023:0338ALSA-2023:0338 6Plibxml2-devel-2.9.13-3.el9_1.x86_64.rpm6Plibxml2-devel-2.9.13-3.el9_1.i686.rpm6Plibxml2-devel-2.9.13-3.el9_1.x86_64.rpm6Plibxml2-devel-2.9.13-3.el9_1.i686.rpm  GBBBBsecurityModerate: sqlite security updatet<https://access.redhat.com/errata/RHSA-2023:0339RHSA-2023:0339RHSA-2023:0339 https://access.redhat.com/security/cve/CVE-2022-35737CVE-2022-35737CVE-2022-35737https://bugzilla.redhat.com/21102912110291https://errata.almalinux.org/9/ALSA-2023-0339.htmlALSA-2023:0339ALSA-2023:0339 msqlite-3.34.1-6.el9_1.i686.rpmnsqlite-devel-3.34.1-6.el9_1.x86_64.rpmmsqlite-3.34.1-6.el9_1.x86_64.rpmnsqlite-devel-3.34.1-6.el9_1.i686.rpmmsqlite-3.34.1-6.el9_1.i686.rpmnsqlite-devel-3.34.1-6.el9_1.x86_64.rpmmsqlite-3.34.1-6.el9_1.x86_64.rpmnsqlite-devel-3.34.1-6.el9_1.i686.rpmy NBBBsecurityModerate: libtasn1 security update0uhttps://access.redhat.com/errata/RHSA-2023:0343RHSA-2023:0343RHSA-2023:0343 https://access.redhat.com/security/cve/CVE-2021-46848CVE-2021-46848CVE-2021-46848https://bugzilla.redhat.com/21400582140058https://errata.almalinux.org/9/ALSA-2023-0343.htmlALSA-2023:0343ALSA-2023:0343 2libtasn1-devel-4.16.0-8.el9_1.i686.rpmTlibtasn1-tools-4.16.0-8.el9_1.x86_64.rpm2libtasn1-devel-4.16.0-8.el9_1.x86_64.rpm2libtasn1-devel-4.16.0-8.el9_1.i686.rpmTlibtasn1-tools-4.16.0-8.el9_1.x86_64.rpm2libtasn1-devel-4.16.0-8.el9_1.x86_64.rpmW TBBBBsecurityImportant: libXpm security update%;https://access.redhat.com/errata/RHSA-2023:0383RHSA-2023:0383RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617CVE-2022-44617CVE-2022-44617https://access.redhat.com/security/cve/CVE-2022-46285CVE-2022-46285CVE-2022-46285https://access.redhat.com/security/cve/CVE-2022-4883CVE-2022-4883CVE-2022-4883https://bugzilla.redhat.com/21600922160092https://bugzilla.redhat.com/21601932160193https://bugzilla.redhat.com/21602132160213https://errata.almalinux.org/9/ALSA-2023-0383.htmlALSA-2023:0383ALSA-2023:0383 libXpm-devel-3.5.13-8.el9_1.x86_64.rpmlibXpm-3.5.13-8.el9_1.x86_64.rpmlibXpm-3.5.13-8.el9_1.i686.rpmlibXpm-devel-3.5.13-8.el9_1.i686.rpmlibXpm-devel-3.5.13-8.el9_1.x86_64.rpmlibXpm-3.5.13-8.el9_1.x86_64.rpmlibXpm-3.5.13-8.el9_1.i686.rpmlibXpm-devel-3.5.13-8.el9_1.i686.rpm [securityImportant: thunderbird security update` https://access.redhat.com/errata/RHSA-2023:0476RHSA-2023:0476RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871CVE-2022-46871CVE-2022-46871https://access.redhat.com/security/cve/CVE-2022-46877CVE-2022-46877CVE-2022-46877https://access.redhat.com/security/cve/CVE-2023-23598CVE-2023-23598CVE-2023-23598https://access.redhat.com/security/cve/CVE-2023-23599CVE-2023-23599CVE-2023-23599https://access.redhat.com/security/cve/CVE-2023-23601CVE-2023-23601CVE-2023-23601https://access.redhat.com/security/cve/CVE-2023-23602CVE-2023-23602CVE-2023-23602https://access.redhat.com/security/cve/CVE-2023-23603CVE-2023-23603CVE-2023-23603https://access.redhat.com/security/cve/CVE-2023-23605CVE-2023-23605CVE-2023-23605https://bugzilla.redhat.com/21623362162336https://bugzilla.redhat.com/21623382162338https://bugzilla.redhat.com/21623392162339https://bugzilla.redhat.com/21623402162340https://bugzilla.redhat.com/21623412162341https://bugzilla.redhat.com/21623422162342https://bugzilla.redhat.com/21623432162343https://bugzilla.redhat.com/21623442162344https://errata.almalinux.org/9/ALSA-2023-0476.htmlALSA-2023:0476ALSA-2023:0476 :Ethunderbird-102.7.1-1.el9_1.alma.x86_64.rpm:Ethunderbird-102.7.1-1.el9_1.alma.x86_64.rpmD ^securityImportant: thunderbird security updatel%https://access.redhat.com/errata/RHSA-2023:0608RHSA-2023:0608RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430CVE-2023-0430CVE-2023-0430https://bugzilla.redhat.com/21665912166591https://errata.almalinux.org/9/ALSA-2023-0608.htmlALSA-2023:0608ALSA-2023:0608 :Fthunderbird-102.7.1-2.el9_1.alma.x86_64.rpm:Fthunderbird-102.7.1-2.el9_1.alma.x86_64.rpmo 5aBBBBBBBBBBBBBBBBBBsecurityImportant: git security updateYhttps://access.redhat.com/errata/RHSA-2023:0611RHSA-2023:0611RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521CVE-2022-23521CVE-2022-23521https://access.redhat.com/security/cve/CVE-2022-41903CVE-2022-41903CVE-2022-41903https://bugzilla.redhat.com/21620552162055https://bugzilla.redhat.com/21620562162056https://errata.almalinux.org/9/ALSA-2023-0611.htmlALSA-2023:0611ALSA-2023:0611 B gitweb-2.31.1-3.el9_1.noarch.rpmI perl-Git-2.31.1-3.el9_1.noarch.rpm< git-email-2.31.1-3.el9_1.noarch.rpm: git-all-2.31.1-3.el9_1.noarch.rpmF git-subtree-2.31.1-3.el9_1.x86_64.rpmC git-core-2.31.1-3.el9_1.x86_64.rpm; git-core-doc-2.31.1-3.el9_1.noarch.rpm= git-gui-2.31.1-3.el9_1.noarch.rpmB git-2.31.1-3.el9_1.x86_64.rpmA gitk-2.31.1-3.el9_1.noarch.rpmE git-daemon-2.31.1-3.el9_1.x86_64.rpm> git-instaweb-2.31.1-3.el9_1.noarch.rpmD git-credential-libsecret-2.31.1-3.el9_1.x86_64.rpmJ perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm@ git-svn-2.31.1-3.el9_1.noarch.rpmB gitweb-2.31.1-3.el9_1.noarch.rpmI perl-Git-2.31.1-3.el9_1.noarch.rpm< git-email-2.31.1-3.el9_1.noarch.rpm: git-all-2.31.1-3.el9_1.noarch.rpmF git-subtree-2.31.1-3.el9_1.x86_64.rpmC git-core-2.31.1-3.el9_1.x86_64.rpm; git-core-doc-2.31.1-3.el9_1.noarch.rpm= git-gui-2.31.1-3.el9_1.noarch.rpmB git-2.31.1-3.el9_1.x86_64.rpmA gitk-2.31.1-3.el9_1.noarch.rpmE git-daemon-2.31.1-3.el9_1.x86_64.rpm> git-instaweb-2.31.1-3.el9_1.noarch.rpmD git-credential-libsecret-2.31.1-3.el9_1.x86_64.rpmJ perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm@ git-svn-2.31.1-3.el9_1.noarch.rpm vBBBBBBBBBsecurityImportant: tigervnc security updatej_https://access.redhat.com/errata/RHSA-2023:0622RHSA-2023:0622RHSA-2023:0622 https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-0622.htmlALSA-2023:0622ALSA-2023:0622 #Ptigervnc-icons-1.12.0-5.el9_1.1.noarch.rpmLPtigervnc-server-1.12.0-5.el9_1.1.x86_64.rpmKPtigervnc-1.12.0-5.el9_1.1.x86_64.rpm%Ptigervnc-selinux-1.12.0-5.el9_1.1.noarch.rpmMPtigervnc-server-minimal-1.12.0-5.el9_1.1.x86_64.rpmNPtigervnc-server-module-1.12.0-5.el9_1.1.x86_64.rpm$Ptigervnc-license-1.12.0-5.el9_1.1.noarch.rpm#Ptigervnc-icons-1.12.0-5.el9_1.1.noarch.rpmLPtigervnc-server-1.12.0-5.el9_1.1.x86_64.rpmKPtigervnc-1.12.0-5.el9_1.1.x86_64.rpm%Ptigervnc-selinux-1.12.0-5.el9_1.1.noarch.rpmMPtigervnc-server-minimal-1.12.0-5.el9_1.1.x86_64.rpmNPtigervnc-server-module-1.12.0-5.el9_1.1.x86_64.rpm$Ptigervnc-license-1.12.0-5.el9_1.1.noarch.rpm BBBsecurityImportant: firefox security updateIMhttps://access.redhat.com/errata/RHSA-2023:0810RHSA-2023:0810RHSA-2023:0810 https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://access.redhat.com/security/cve/CVE-2023-25728CVE-2023-25728CVE-2023-25728https://access.redhat.com/security/cve/CVE-2023-25729CVE-2023-25729CVE-2023-25729https://access.redhat.com/security/cve/CVE-2023-25730CVE-2023-25730CVE-2023-25730https://access.redhat.com/security/cve/CVE-2023-25732CVE-2023-25732CVE-2023-25732https://access.redhat.com/security/cve/CVE-2023-25735CVE-2023-25735CVE-2023-25735https://access.redhat.com/security/cve/CVE-2023-25737CVE-2023-25737CVE-2023-25737https://access.redhat.com/security/cve/CVE-2023-25739CVE-2023-25739CVE-2023-25739https://access.redhat.com/security/cve/CVE-2023-25742CVE-2023-25742CVE-2023-25742https://access.redhat.com/security/cve/CVE-2023-25743CVE-2023-25743CVE-2023-25743https://access.redhat.com/security/cve/CVE-2023-25744CVE-2023-25744CVE-2023-25744https://access.redhat.com/security/cve/CVE-2023-25746CVE-2023-25746CVE-2023-25746https://bugzilla.redhat.com/21703742170374https://bugzilla.redhat.com/21703752170375https://bugzilla.redhat.com/21703762170376https://bugzilla.redhat.com/21703772170377https://bugzilla.redhat.com/21703782170378https://bugzilla.redhat.com/21703792170379https://bugzilla.redhat.com/21703812170381https://bugzilla.redhat.com/21703822170382https://bugzilla.redhat.com/21703832170383https://bugzilla.redhat.com/21703902170390https://bugzilla.redhat.com/21703912170391https://bugzilla.redhat.com/21704022170402https://errata.almalinux.org/9/ALSA-2023-0810.htmlALSA-2023:0810ALSA-2023:0810 Qkfirefox-x11-102.8.0-2.el9_1.alma.x86_64.rpm8kfirefox-102.8.0-2.el9_1.alma.x86_64.rpmQkfirefox-x11-102.8.0-2.el9_1.alma.x86_64.rpm8kfirefox-102.8.0-2.el9_1.alma.x86_64.rpmԄ GsecurityImportant: thunderbird security updatexhttps://access.redhat.com/errata/RHSA-2023:0824RHSA-2023:0824RHSA-2023:0824 https://access.redhat.com/security/cve/CVE-2023-0616CVE-2023-0616CVE-2023-0616https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://access.redhat.com/security/cve/CVE-2023-25728CVE-2023-25728CVE-2023-25728https://access.redhat.com/security/cve/CVE-2023-25729CVE-2023-25729CVE-2023-25729https://access.redhat.com/security/cve/CVE-2023-25730CVE-2023-25730CVE-2023-25730https://access.redhat.com/security/cve/CVE-2023-25732CVE-2023-25732CVE-2023-25732https://access.redhat.com/security/cve/CVE-2023-25735CVE-2023-25735CVE-2023-25735https://access.redhat.com/security/cve/CVE-2023-25737CVE-2023-25737CVE-2023-25737https://access.redhat.com/security/cve/CVE-2023-25739CVE-2023-25739CVE-2023-25739https://access.redhat.com/security/cve/CVE-2023-25742CVE-2023-25742CVE-2023-25742https://access.redhat.com/security/cve/CVE-2023-25743CVE-2023-25743CVE-2023-25743https://access.redhat.com/security/cve/CVE-2023-25744CVE-2023-25744CVE-2023-25744https://access.redhat.com/security/cve/CVE-2023-25746CVE-2023-25746CVE-2023-25746https://bugzilla.redhat.com/21703742170374https://bugzilla.redhat.com/21703752170375https://bugzilla.redhat.com/21703762170376https://bugzilla.redhat.com/21703772170377https://bugzilla.redhat.com/21703782170378https://bugzilla.redhat.com/21703792170379https://bugzilla.redhat.com/21703812170381https://bugzilla.redhat.com/21703822170382https://bugzilla.redhat.com/21703832170383https://bugzilla.redhat.com/21703902170390https://bugzilla.redhat.com/21703912170391https://bugzilla.redhat.com/21704022170402https://bugzilla.redhat.com/21713972171397https://errata.almalinux.org/9/ALSA-2023-0824.htmlALSA-2023:0824ALSA-2023:0824 :kthunderbird-102.8.0-2.el9_1.alma.x86_64.rpm:kthunderbird-102.8.0-2.el9_1.alma.x86_64.rpmԈn JBBBBBBBBBBsecurityImportant: webkit2gtk3 security update https://access.redhat.com/errata/RHSA-2023:0903RHSA-2023:0903RHSA-2023:0903 https://access.redhat.com/security/cve/CVE-2023-23529CVE-2023-23529CVE-2023-23529https://bugzilla.redhat.com/21699342169934https://errata.almalinux.org/9/ALSA-2023-0903.htmlALSA-2023:0903ALSA-2023:0903 3`webkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm4`webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm3`webkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm1`webkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm1`webkit2gtk3-2.36.7-1.el9_1.2.i686.rpm2`webkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm4`webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm2`webkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm3`webkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm4`webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm3`webkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm1`webkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm1`webkit2gtk3-2.36.7-1.el9_1.2.i686.rpm2`webkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm4`webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm2`webkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm݆; WBBBsecurityModerate: openssl security and bug fix update."https://access.redhat.com/errata/RHSA-2023:0946RHSA-2023:0946RHSA-2023:0946 https://access.redhat.com/security/cve/CVE-2022-4203CVE-2022-4203CVE-2022-4203https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0216CVE-2023-0216CVE-2023-0216https://access.redhat.com/security/cve/CVE-2023-0217CVE-2023-0217CVE-2023-0217https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://access.redhat.com/security/cve/CVE-2023-0401CVE-2023-0401CVE-2023-0401https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644882164488https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://bugzilla.redhat.com/21644972164497https://bugzilla.redhat.com/21644992164499https://bugzilla.redhat.com/21645002164500https://errata.almalinux.org/9/ALSA-2023-0946.htmlALSA-2023:0946ALSA-2023:0946 J_openssl-perl-3.0.1-47.el9_1.x86_64.rpm _openssl-devel-3.0.1-47.el9_1.x86_64.rpm _openssl-devel-3.0.1-47.el9_1.i686.rpmJ_openssl-perl-3.0.1-47.el9_1.x86_64.rpm _openssl-devel-3.0.1-47.el9_1.x86_64.rpm _openssl-devel-3.0.1-47.el9_1.i686.rpmv (]BBBBBBBBBsecurityImportant: kernel security and bug fix updateP~ https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951 https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951 *kernel-doc-5.14.0-162.18.1.el9_1.noarch.rpm!*kernel-debug-devel-5.14.0-162.18.1.el9_1.x86_64.rpm%*perf-5.14.0-162.18.1.el9_1.x86_64.rpm"*kernel-debug-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm#*kernel-devel-5.14.0-162.18.1.el9_1.x86_64.rpm$*kernel-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm*kernel-doc-5.14.0-162.18.1.el9_1.noarch.rpm!*kernel-debug-devel-5.14.0-162.18.1.el9_1.x86_64.rpm%*perf-5.14.0-162.18.1.el9_1.x86_64.rpm"*kernel-debug-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm#*kernel-devel-5.14.0-162.18.1.el9_1.x86_64.rpm$*kernel-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm /iBBBBsecurityModerate: python3.9 security updateN9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953 https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953 Wpython3-devel-3.9.14-1.el9_1.2.x86_64.rpmjpython-unversioned-command-3.9.14-1.el9_1.2.noarch.rpmWpython3-devel-3.9.14-1.el9_1.2.i686.rpm=python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpmWpython3-devel-3.9.14-1.el9_1.2.x86_64.rpmjpython-unversioned-command-3.9.14-1.el9_1.2.noarch.rpmWpython3-devel-3.9.14-1.el9_1.2.i686.rpm=python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpm, 5pBBBsecurityModerate: systemd security update]https://access.redhat.com/errata/RHSA-2023:0954RHSA-2023:0954RHSA-2023:0954 https://access.redhat.com/security/cve/CVE-2022-4415CVE-2022-4415CVE-2022-4415https://access.redhat.com/security/cve/CVE-2022-45873CVE-2022-45873CVE-2022-45873https://bugzilla.redhat.com/21490632149063https://bugzilla.redhat.com/21555152155515https://errata.almalinux.org/9/ALSA-2023-0954.htmlALSA-2023:0954ALSA-2023:0954 otsystemd-devel-250-12.el9_1.3.i686.rpm3tsystemd-journal-remote-250-12.el9_1.3.x86_64.rpmotsystemd-devel-250-12.el9_1.3.x86_64.rpmotsystemd-devel-250-12.el9_1.3.i686.rpm3tsystemd-journal-remote-250-12.el9_1.3.x86_64.rpmotsystemd-devel-250-12.el9_1.3.x86_64.rpm 8vsecurityModerate: lua security updated8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957 https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957 uplua-5.4.4-2.el9_1.x86_64.rpmuplua-5.4.4-2.el9_1.x86_64.rpm{  ?yBBBBsecurityModerate: vim security updateehttps://access.redhat.com/errata/RHSA-2023:0958RHSA-2023:0958RHSA-2023:0958 https://access.redhat.com/security/cve/CVE-2022-47024CVE-2022-47024CVE-2022-47024https://bugzilla.redhat.com/21636132163613https://errata.almalinux.org/9/ALSA-2023-0958.htmlALSA-2023:0958ALSA-2023:0958 /vim-X11-8.2.2637-20.el9_1.x86_64.rpm1vim-enhanced-8.2.2637-20.el9_1.x86_64.rpm0vim-common-8.2.2637-20.el9_1.x86_64.rpm/vim-X11-8.2.2637-20.el9_1.x86_64.rpm1vim-enhanced-8.2.2637-20.el9_1.x86_64.rpm0vim-common-8.2.2637-20.el9_1.x86_64.rpm@! 2@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security updateW https://access.redhat.com/errata/RHSA-2023:0965RHSA-2023:0965RHSA-2023:0965 https://access.redhat.com/security/cve/CVE-2022-31628CVE-2022-31628CVE-2022-31628https://access.redhat.com/security/cve/CVE-2022-31629CVE-2022-31629CVE-2022-31629https://access.redhat.com/security/cve/CVE-2022-31630CVE-2022-31630CVE-2022-31630https://access.redhat.com/security/cve/CVE-2022-31631CVE-2022-31631CVE-2022-31631https://access.redhat.com/security/cve/CVE-2022-37454CVE-2022-37454CVE-2022-37454https://bugzilla.redhat.com/21336872133687https://bugzilla.redhat.com/21336882133688https://bugzilla.redhat.com/21392802139280https://bugzilla.redhat.com/21402002140200https://bugzilla.redhat.com/21587912158791https://errata.almalinux.org/9/ALSA-2023-0965.htmlALSA-2023:0965ALSA-2023:0965 [=php-gd-8.0.27-1.el9_1.x86_64.rpmh=php-xml-8.0.27-1.el9_1.x86_64.rpmV=php-devel-8.0.27-1.el9_1.x86_64.rpm\=php-gmp-8.0.27-1.el9_1.x86_64.rpm_=php-mbstring-8.0.27-1.el9_1.x86_64.rpmR=php-cli-8.0.27-1.el9_1.x86_64.rpme=php-process-8.0.27-1.el9_1.x86_64.rpm^=php-ldap-8.0.27-1.el9_1.x86_64.rpmX=php-enchant-8.0.27-1.el9_1.x86_64.rpmc=php-pdo-8.0.27-1.el9_1.x86_64.rpmb=php-opcache-8.0.27-1.el9_1.x86_64.rpm]=php-intl-8.0.27-1.el9_1.x86_64.rpmS=php-common-8.0.27-1.el9_1.x86_64.rpma=php-odbc-8.0.27-1.el9_1.x86_64.rpmW=php-embedded-8.0.27-1.el9_1.x86_64.rpmQ=php-bcmath-8.0.27-1.el9_1.x86_64.rpmg=php-soap-8.0.27-1.el9_1.x86_64.rpm`=php-mysqlnd-8.0.27-1.el9_1.x86_64.rpmf=php-snmp-8.0.27-1.el9_1.x86_64.rpmT=php-dba-8.0.27-1.el9_1.x86_64.rpmZ=php-fpm-8.0.27-1.el9_1.x86_64.rpm=php-8.0.27-1.el9_1.x86_64.rpmY=php-ffi-8.0.27-1.el9_1.x86_64.rpmd=php-pgsql-8.0.27-1.el9_1.x86_64.rpmU=php-dbg-8.0.27-1.el9_1.x86_64.rpm[=php-gd-8.0.27-1.el9_1.x86_64.rpmh=php-xml-8.0.27-1.el9_1.x86_64.rpmV=php-devel-8.0.27-1.el9_1.x86_64.rpm\=php-gmp-8.0.27-1.el9_1.x86_64.rpm_=php-mbstring-8.0.27-1.el9_1.x86_64.rpmR=php-cli-8.0.27-1.el9_1.x86_64.rpme=php-process-8.0.27-1.el9_1.x86_64.rpm^=php-ldap-8.0.27-1.el9_1.x86_64.rpmX=php-enchant-8.0.27-1.el9_1.x86_64.rpmc=php-pdo-8.0.27-1.el9_1.x86_64.rpmb=php-opcache-8.0.27-1.el9_1.x86_64.rpm]=php-intl-8.0.27-1.el9_1.x86_64.rpmS=php-common-8.0.27-1.el9_1.x86_64.rpma=php-odbc-8.0.27-1.el9_1.x86_64.rpmW=php-embedded-8.0.27-1.el9_1.x86_64.rpmQ=php-bcmath-8.0.27-1.el9_1.x86_64.rpmg=php-soap-8.0.27-1.el9_1.x86_64.rpm`=php-mysqlnd-8.0.27-1.el9_1.x86_64.rpmf=php-snmp-8.0.27-1.el9_1.x86_64.rpmT=php-dba-8.0.27-1.el9_1.x86_64.rpmZ=php-fpm-8.0.27-1.el9_1.x86_64.rpm=php-8.0.27-1.el9_1.x86_64.rpmY=php-ffi-8.0.27-1.el9_1.x86_64.rpmd=php-pgsql-8.0.27-1.el9_1.x86_64.rpmU=php-dbg-8.0.27-1.el9_1.x86_64.rpmF" sBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security and bug fix updateXIhttps://access.redhat.com/errata/RHSA-2023:0970RHSA-2023:0970RHSA-2023:0970 https://access.redhat.com/security/cve/CVE-2006-20001CVE-2006-20001CVE-2006-20001https://access.redhat.com/security/cve/CVE-2022-36760CVE-2022-36760CVE-2022-36760https://access.redhat.com/security/cve/CVE-2022-37436CVE-2022-37436CVE-2022-37436https://bugzilla.redhat.com/21617732161773https://bugzilla.redhat.com/21617742161774https://bugzilla.redhat.com/21617772161777https://errata.almalinux.org/9/ALSA-2023-0970.htmlALSA-2023:0970ALSA-2023:0970 Bmod_session-2.4.53-7.el9_1.1.x86_64.rpmmod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm0Bhttpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm~Bmod_ldap-2.4.53-7.el9_1.1.x86_64.rpmiBhttpd-core-2.4.53-7.el9_1.1.x86_64.rpmBmod_lua-2.4.53-7.el9_1.1.x86_64.rpm1Bhttpd-manual-2.4.53-7.el9_1.1.noarch.rpmkBhttpd-tools-2.4.53-7.el9_1.1.x86_64.rpmhBhttpd-2.4.53-7.el9_1.1.x86_64.rpmjBhttpd-devel-2.4.53-7.el9_1.1.x86_64.rpmmod_ssl-2.4.53-7.el9_1.1.x86_64.rpm Bmod_session-2.4.53-7.el9_1.1.x86_64.rpmmod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm0Bhttpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm~Bmod_ldap-2.4.53-7.el9_1.1.x86_64.rpmiBhttpd-core-2.4.53-7.el9_1.1.x86_64.rpmBmod_lua-2.4.53-7.el9_1.1.x86_64.rpm1Bhttpd-manual-2.4.53-7.el9_1.1.noarch.rpmkBhttpd-tools-2.4.53-7.el9_1.1.x86_64.rpmhBhttpd-2.4.53-7.el9_1.1.x86_64.rpmjBhttpd-devel-2.4.53-7.el9_1.1.x86_64.rpmmod_ssl-2.4.53-7.el9_1.1.x86_64.rpmt# HsecurityImportant: pesign security update! https://access.redhat.com/errata/RHSA-2023:1067RHSA-2023:1067RHSA-2023:1067 https://access.redhat.com/security/cve/CVE-2022-3560CVE-2022-3560CVE-2022-3560https://bugzilla.redhat.com/21354202135420https://errata.almalinux.org/9/ALSA-2023-1067.htmlALSA-2023:1067ALSA-2023:1067 XKpesign-115-6.el9_1.x86_64.rpmXKpesign-115-6.el9_1.x86_64.rpm\$ KBBBBBBsecurityModerate: libjpeg-turbo security update..https://access.redhat.com/errata/RHSA-2023:1068RHSA-2023:1068RHSA-2023:1068 https://access.redhat.com/security/cve/CVE-2021-46822CVE-2021-46822CVE-2021-46822https://bugzilla.redhat.com/21000442100044https://errata.almalinux.org/9/ALSA-2023-1068.htmlALSA-2023:1068ALSA-2023:1068 /libjpeg-turbo-2.0.90-6.el9_1.x86_64.rpm0libjpeg-turbo-devel-2.0.90-6.el9_1.x86_64.rpm/libjpeg-turbo-2.0.90-6.el9_1.i686.rpmRlibjpeg-turbo-utils-2.0.90-6.el9_1.x86_64.rpm0libjpeg-turbo-devel-2.0.90-6.el9_1.i686.rpm/libjpeg-turbo-2.0.90-6.el9_1.x86_64.rpm0libjpeg-turbo-devel-2.0.90-6.el9_1.x86_64.rpm/libjpeg-turbo-2.0.90-6.el9_1.i686.rpmRlibjpeg-turbo-utils-2.0.90-6.el9_1.x86_64.rpm0libjpeg-turbo-devel-2.0.90-6.el9_1.i686.rpm% TBBBBBBBBBsecurityModerate: gnutls security and bug fix update\https://access.redhat.com/errata/RHSA-2023:1141RHSA-2023:1141RHSA-2023:1141 https://access.redhat.com/security/cve/CVE-2023-0361CVE-2023-0361CVE-2023-0361https://bugzilla.redhat.com/21625962162596https://errata.almalinux.org/9/ALSA-2023-1141.htmlALSA-2023:1141ALSA-2023:1141 ]gnutls-c++-3.7.6-18.el9_1.x86_64.rpm]gnutls-devel-3.7.6-18.el9_1.i686.rpm|]gnutls-utils-3.7.6-18.el9_1.x86_64.rpm]gnutls-dane-3.7.6-18.el9_1.i686.rpm]gnutls-devel-3.7.6-18.el9_1.x86_64.rpm]gnutls-c++-3.7.6-18.el9_1.i686.rpm]gnutls-dane-3.7.6-18.el9_1.x86_64.rpm]gnutls-c++-3.7.6-18.el9_1.x86_64.rpm]gnutls-devel-3.7.6-18.el9_1.i686.rpm|]gnutls-utils-3.7.6-18.el9_1.x86_64.rpm]gnutls-dane-3.7.6-18.el9_1.i686.rpm]gnutls-devel-3.7.6-18.el9_1.x86_64.rpm]gnutls-c++-3.7.6-18.el9_1.i686.rpm]gnutls-dane-3.7.6-18.el9_1.x86_64.rpm& $`BBsecurityImportant: firefox security update{% https://access.redhat.com/errata/RHSA-2023:1337RHSA-2023:1337RHSA-2023:1337 https://access.redhat.com/security/cve/CVE-2023-25751CVE-2023-25751CVE-2023-25751https://access.redhat.com/security/cve/CVE-2023-25752CVE-2023-25752CVE-2023-25752https://access.redhat.com/security/cve/CVE-2023-28162CVE-2023-28162CVE-2023-28162https://access.redhat.com/security/cve/CVE-2023-28164CVE-2023-28164CVE-2023-28164https://access.redhat.com/security/cve/CVE-2023-28176CVE-2023-28176CVE-2023-28176https://bugzilla.redhat.com/21784582178458https://bugzilla.redhat.com/21784602178460https://bugzilla.redhat.com/21784662178466https://bugzilla.redhat.com/21784702178470https://bugzilla.redhat.com/21784722178472https://errata.almalinux.org/9/ALSA-2023-1337.htmlALSA-2023:1337ALSA-2023:1337 Qwfirefox-x11-102.9.0-3.el9_1.alma.x86_64.rpm8wfirefox-102.9.0-3.el9_1.alma.x86_64.rpmQwfirefox-x11-102.9.0-3.el9_1.alma.x86_64.rpm8wfirefox-102.9.0-3.el9_1.alma.x86_64.rpmG' eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: nss security and bug fix update https://access.redhat.com/errata/RHSA-2023:1368RHSA-2023:1368RHSA-2023:1368 https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://bugzilla.redhat.com/21703772170377https://errata.almalinux.org/9/ALSA-2023-1368.htmlALSA-2023:1368ALSA-2023:1368 kcnss-softokn-devel-3.79.0-17.el9_1.i686.rpmf+nspr-4.34.0-17.el9_1.i686.rpm~cnss-tools-3.79.0-17.el9_1.x86_64.rpmocnss-util-devel-3.79.0-17.el9_1.x86_64.rpmmcnss-softokn-freebl-devel-3.79.0-17.el9_1.x86_64.rpmjcnss-softokn-3.79.0-17.el9_1.i686.rpmhcnss-3.79.0-17.el9_1.i686.rpmicnss-devel-3.79.0-17.el9_1.x86_64.rpm}cnss-sysinit-3.79.0-17.el9_1.x86_64.rpmncnss-util-3.79.0-17.el9_1.x86_64.rpmncnss-util-3.79.0-17.el9_1.i686.rpmmcnss-softokn-freebl-devel-3.79.0-17.el9_1.i686.rpmlcnss-softokn-freebl-3.79.0-17.el9_1.x86_64.rpmg+nspr-devel-4.34.0-17.el9_1.i686.rpmf+nspr-4.34.0-17.el9_1.x86_64.rpmlcnss-softokn-freebl-3.79.0-17.el9_1.i686.rpmicnss-devel-3.79.0-17.el9_1.i686.rpmg+nspr-devel-4.34.0-17.el9_1.x86_64.rpmhcnss-3.79.0-17.el9_1.x86_64.rpmkcnss-softokn-devel-3.79.0-17.el9_1.x86_64.rpmjcnss-softokn-3.79.0-17.el9_1.x86_64.rpmocnss-util-devel-3.79.0-17.el9_1.i686.rpmkcnss-softokn-devel-3.79.0-17.el9_1.i686.rpmf+nspr-4.34.0-17.el9_1.i686.rpm~cnss-tools-3.79.0-17.el9_1.x86_64.rpmocnss-util-devel-3.79.0-17.el9_1.x86_64.rpmmcnss-softokn-freebl-devel-3.79.0-17.el9_1.x86_64.rpmjcnss-softokn-3.79.0-17.el9_1.i686.rpmhcnss-3.79.0-17.el9_1.i686.rpmicnss-devel-3.79.0-17.el9_1.x86_64.rpm}cnss-sysinit-3.79.0-17.el9_1.x86_64.rpmncnss-util-3.79.0-17.el9_1.x86_64.rpmncnss-util-3.79.0-17.el9_1.i686.rpmmcnss-softokn-freebl-devel-3.79.0-17.el9_1.i686.rpmlcnss-softokn-freebl-3.79.0-17.el9_1.x86_64.rpmg+nspr-devel-4.34.0-17.el9_1.i686.rpmf+nspr-4.34.0-17.el9_1.x86_64.rpmlcnss-softokn-freebl-3.79.0-17.el9_1.i686.rpmicnss-devel-3.79.0-17.el9_1.i686.rpmg+nspr-devel-4.34.0-17.el9_1.x86_64.rpmhcnss-3.79.0-17.el9_1.x86_64.rpmkcnss-softokn-devel-3.79.0-17.el9_1.x86_64.rpmjcnss-softokn-3.79.0-17.el9_1.x86_64.rpmocnss-util-devel-3.79.0-17.el9_1.i686.rpmJ( HsecurityImportant: thunderbird security update8t https://access.redhat.com/errata/RHSA-2023:1407RHSA-2023:1407RHSA-2023:1407 https://access.redhat.com/security/cve/CVE-2023-25751CVE-2023-25751CVE-2023-25751https://access.redhat.com/security/cve/CVE-2023-25752CVE-2023-25752CVE-2023-25752https://access.redhat.com/security/cve/CVE-2023-28162CVE-2023-28162CVE-2023-28162https://access.redhat.com/security/cve/CVE-2023-28164CVE-2023-28164CVE-2023-28164https://access.redhat.com/security/cve/CVE-2023-28176CVE-2023-28176CVE-2023-28176https://bugzilla.redhat.com/21784582178458https://bugzilla.redhat.com/21784602178460https://bugzilla.redhat.com/21784662178466https://bugzilla.redhat.com/21784702178470https://bugzilla.redhat.com/21784722178472https://errata.almalinux.org/9/ALSA-2023-1407.htmlALSA-2023:1407ALSA-2023:1407 :Gthunderbird-102.9.0-1.el9_1.alma.x86_64.rpm:Gthunderbird-102.9.0-1.el9_1.alma.x86_64.rpm) KBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update,Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470 https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470 #+kernel-devel-5.14.0-162.22.2.el9_1.x86_64.rpm%+perf-5.14.0-162.22.2.el9_1.x86_64.rpm!+kernel-debug-devel-5.14.0-162.22.2.el9_1.x86_64.rpm$+kernel-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpm+kernel-doc-5.14.0-162.22.2.el9_1.noarch.rpm"+kernel-debug-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpm#+kernel-devel-5.14.0-162.22.2.el9_1.x86_64.rpm%+perf-5.14.0-162.22.2.el9_1.x86_64.rpm!+kernel-debug-devel-5.14.0-162.22.2.el9_1.x86_64.rpm$+kernel-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpm+kernel-doc-5.14.0-162.22.2.el9_1.noarch.rpm"+kernel-debug-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpm?* "WBBBBBBBBBsecurityImportant: tigervnc security updatephttps://access.redhat.com/errata/RHSA-2023:1592RHSA-2023:1592RHSA-2023:1592 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-1592.htmlALSA-2023:1592ALSA-2023:1592 MQtigervnc-server-minimal-1.12.0-5.el9_1.2.x86_64.rpm#Qtigervnc-icons-1.12.0-5.el9_1.2.noarch.rpmNQtigervnc-server-module-1.12.0-5.el9_1.2.x86_64.rpmLQtigervnc-server-1.12.0-5.el9_1.2.x86_64.rpm$Qtigervnc-license-1.12.0-5.el9_1.2.noarch.rpmKQtigervnc-1.12.0-5.el9_1.2.x86_64.rpm%Qtigervnc-selinux-1.12.0-5.el9_1.2.noarch.rpmMQtigervnc-server-minimal-1.12.0-5.el9_1.2.x86_64.rpm#Qtigervnc-icons-1.12.0-5.el9_1.2.noarch.rpmNQtigervnc-server-module-1.12.0-5.el9_1.2.x86_64.rpmLQtigervnc-server-1.12.0-5.el9_1.2.x86_64.rpm$Qtigervnc-license-1.12.0-5.el9_1.2.noarch.rpmKQtigervnc-1.12.0-5.el9_1.2.x86_64.rpm%Qtigervnc-selinux-1.12.0-5.el9_1.2.noarch.rpm-+ 9cBBBBBBBBBBBBBBBBBBBBsecurityImportant: httpd and mod_http2 security updateuhttps://access.redhat.com/errata/RHSA-2023:1670RHSA-2023:1670RHSA-2023:1670 https://access.redhat.com/security/cve/CVE-2023-25690CVE-2023-25690CVE-2023-25690https://bugzilla.redhat.com/21762092176209https://errata.almalinux.org/9/ALSA-2023-1670.htmlALSA-2023:1670ALSA-2023:1670 0Chttpd-filesystem-2.4.53-7.el9_1.5.noarch.rpmCmod_lua-2.4.53-7.el9_1.5.x86_64.rpm1Chttpd-manual-2.4.53-7.el9_1.5.noarch.rpmCmod_session-2.4.53-7.el9_1.5.x86_64.rpmiChttpd-core-2.4.53-7.el9_1.5.x86_64.rpm~Cmod_ldap-2.4.53-7.el9_1.5.x86_64.rpmmod_proxy_html-2.4.53-7.el9_1.5.x86_64.rpmjChttpd-devel-2.4.53-7.el9_1.5.x86_64.rpmkChttpd-tools-2.4.53-7.el9_1.5.x86_64.rpmmod_ssl-2.4.53-7.el9_1.5.x86_64.rpmSmod_http2-1.15.19-3.el9_1.5.x86_64.rpmhChttpd-2.4.53-7.el9_1.5.x86_64.rpm 0Chttpd-filesystem-2.4.53-7.el9_1.5.noarch.rpmCmod_lua-2.4.53-7.el9_1.5.x86_64.rpm1Chttpd-manual-2.4.53-7.el9_1.5.noarch.rpmCmod_session-2.4.53-7.el9_1.5.x86_64.rpmiChttpd-core-2.4.53-7.el9_1.5.x86_64.rpm~Cmod_ldap-2.4.53-7.el9_1.5.x86_64.rpmmod_proxy_html-2.4.53-7.el9_1.5.x86_64.rpmjChttpd-devel-2.4.53-7.el9_1.5.x86_64.rpmkChttpd-tools-2.4.53-7.el9_1.5.x86_64.rpmmod_ssl-2.4.53-7.el9_1.5.x86_64.rpmSmod_http2-1.15.19-3.el9_1.5.x86_64.rpmhChttpd-2.4.53-7.el9_1.5.x86_64.rpm, zBBBBBBBBBBBBBBsecurityModerate: postgresql security update|jhttps://access.redhat.com/errata/RHSA-2023:1693RHSA-2023:1693RHSA-2023:1693 https://access.redhat.com/security/cve/CVE-2022-2625CVE-2022-2625CVE-2022-2625https://access.redhat.com/security/cve/CVE-2022-41862CVE-2022-41862CVE-2022-41862https://bugzilla.redhat.com/21138252113825https://bugzilla.redhat.com/21657222165722https://errata.almalinux.org/9/ALSA-2023-1693.htmlALSA-2023:1693ALSA-2023:1693 (qpostgresql-upgrade-13.10-1.el9_1.x86_64.rpm$qpostgresql-plpython3-13.10-1.el9_1.x86_64.rpm_qpostgresql-13.10-1.el9_1.x86_64.rpm'qpostgresql-server-13.10-1.el9_1.x86_64.rpm%qpostgresql-pltcl-13.10-1.el9_1.x86_64.rpm#qpostgresql-plperl-13.10-1.el9_1.x86_64.rpm&qpostgresql-private-libs-13.10-1.el9_1.x86_64.rpm"qpostgresql-contrib-13.10-1.el9_1.x86_64.rpm(qpostgresql-upgrade-13.10-1.el9_1.x86_64.rpm$qpostgresql-plpython3-13.10-1.el9_1.x86_64.rpm_qpostgresql-13.10-1.el9_1.x86_64.rpm'qpostgresql-server-13.10-1.el9_1.x86_64.rpm%qpostgresql-pltcl-13.10-1.el9_1.x86_64.rpm#qpostgresql-plperl-13.10-1.el9_1.x86_64.rpm&qpostgresql-private-libs-13.10-1.el9_1.x86_64.rpm"qpostgresql-contrib-13.10-1.el9_1.x86_64.rpm- KsecurityModerate: haproxy security updatef=https://access.redhat.com/errata/RHSA-2023:1696RHSA-2023:1696RHSA-2023:1696 https://access.redhat.com/security/cve/CVE-2023-0056CVE-2023-0056CVE-2023-0056https://access.redhat.com/security/cve/CVE-2023-25725CVE-2023-25725CVE-2023-25725https://bugzilla.redhat.com/21608082160808https://bugzilla.redhat.com/21690892169089https://errata.almalinux.org/9/ALSA-2023-1696.htmlALSA-2023:1696ALSA-2023:1696 Hhaproxy-2.4.17-3.el9_1.2.x86_64.rpmHhaproxy-2.4.17-3.el9_1.2.x86_64.rpm. NBsecurityModerate: curl security update#9https://access.redhat.com/errata/RHSA-2023:1701RHSA-2023:1701RHSA-2023:1701 https://access.redhat.com/security/cve/CVE-2023-23916CVE-2023-23916CVE-2023-23916https://bugzilla.redhat.com/21678152167815https://errata.almalinux.org/9/ALSA-2023-1701.htmlALSA-2023:1701ALSA-2023:1701 mlibcurl-devel-7.76.1-19.el9_1.2.i686.rpmmlibcurl-devel-7.76.1-19.el9_1.2.x86_64.rpmmlibcurl-devel-7.76.1-19.el9_1.2.i686.rpmmlibcurl-devel-7.76.1-19.el9_1.2.x86_64.rpm / RBBBBBBBBBsecurityImportant: kernel security and bug fix update\4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703 https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703 ,kernel-doc-5.14.0-162.23.1.el9_1.noarch.rpm!,kernel-debug-devel-5.14.0-162.23.1.el9_1.x86_64.rpm$,kernel-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm%,perf-5.14.0-162.23.1.el9_1.x86_64.rpm",kernel-debug-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm#,kernel-devel-5.14.0-162.23.1.el9_1.x86_64.rpm,kernel-doc-5.14.0-162.23.1.el9_1.noarch.rpm!,kernel-debug-devel-5.14.0-162.23.1.el9_1.x86_64.rpm$,kernel-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm%,perf-5.14.0-162.23.1.el9_1.x86_64.rpm",kernel-debug-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm#,kernel-devel-5.14.0-162.23.1.el9_1.x86_64.rpm 0 "^BBsecurityImportant: firefox security updateDhttps://access.redhat.com/errata/RHSA-2023:1786RHSA-2023:1786RHSA-2023:1786 https://access.redhat.com/security/cve/CVE-2023-1945CVE-2023-1945CVE-2023-1945https://access.redhat.com/security/cve/CVE-2023-29533CVE-2023-29533CVE-2023-29533https://access.redhat.com/security/cve/CVE-2023-29535CVE-2023-29535CVE-2023-29535https://access.redhat.com/security/cve/CVE-2023-29536CVE-2023-29536CVE-2023-29536https://access.redhat.com/security/cve/CVE-2023-29539CVE-2023-29539CVE-2023-29539https://access.redhat.com/security/cve/CVE-2023-29541CVE-2023-29541CVE-2023-29541https://access.redhat.com/security/cve/CVE-2023-29548CVE-2023-29548CVE-2023-29548https://access.redhat.com/security/cve/CVE-2023-29550CVE-2023-29550CVE-2023-29550https://bugzilla.redhat.com/21861012186101https://bugzilla.redhat.com/21861032186103https://bugzilla.redhat.com/21861042186104https://bugzilla.redhat.com/21861052186105https://bugzilla.redhat.com/21861062186106https://bugzilla.redhat.com/21861092186109https://bugzilla.redhat.com/21861102186110https://bugzilla.redhat.com/21861112186111https://errata.almalinux.org/9/ALSA-2023-1786.htmlALSA-2023:1786ALSA-2023:1786 8tfirefox-102.10.0-1.el9_1.alma.x86_64.rpmQtfirefox-x11-102.10.0-1.el9_1.alma.x86_64.rpm8tfirefox-102.10.0-1.el9_1.alma.x86_64.rpmQtfirefox-x11-102.10.0-1.el9_1.alma.x86_64.rpmM1 %csecurityImportant: thunderbird security updateT*https://access.redhat.com/errata/RHSA-2023:1809RHSA-2023:1809RHSA-2023:1809 https://access.redhat.com/security/cve/CVE-2023-0547CVE-2023-0547CVE-2023-0547https://access.redhat.com/security/cve/CVE-2023-1945CVE-2023-1945CVE-2023-1945https://access.redhat.com/security/cve/CVE-2023-28427CVE-2023-28427CVE-2023-28427https://access.redhat.com/security/cve/CVE-2023-29479CVE-2023-29479CVE-2023-29479https://access.redhat.com/security/cve/CVE-2023-29533CVE-2023-29533CVE-2023-29533https://access.redhat.com/security/cve/CVE-2023-29535CVE-2023-29535CVE-2023-29535https://access.redhat.com/security/cve/CVE-2023-29536CVE-2023-29536CVE-2023-29536https://access.redhat.com/security/cve/CVE-2023-29539CVE-2023-29539CVE-2023-29539https://access.redhat.com/security/cve/CVE-2023-29541CVE-2023-29541CVE-2023-29541https://access.redhat.com/security/cve/CVE-2023-29548CVE-2023-29548CVE-2023-29548https://access.redhat.com/security/cve/CVE-2023-29550CVE-2023-29550CVE-2023-29550https://bugzilla.redhat.com/21832782183278https://bugzilla.redhat.com/21861012186101https://bugzilla.redhat.com/21861032186103https://bugzilla.redhat.com/21861042186104https://bugzilla.redhat.com/21861052186105https://bugzilla.redhat.com/21861062186106https://bugzilla.redhat.com/21861092186109https://bugzilla.redhat.com/21861102186110https://bugzilla.redhat.com/21861112186111https://bugzilla.redhat.com/21867342186734https://bugzilla.redhat.com/21867352186735https://errata.almalinux.org/9/ALSA-2023-1809.htmlALSA-2023:1809ALSA-2023:1809 :;thunderbird-102.10.0-2.el9_1.alma.x86_64.rpm:;thunderbird-102.10.0-2.el9_1.alma.x86_64.rpm2 8fBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security and bug fix update~https://access.redhat.com/errata/RHSA-2023:1879RHSA-2023:1879RHSA-2023:1879 https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1879.htmlALSA-2023:1879ALSA-2023:1879  java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-demo-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-devel-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-jmods-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-headless-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-src-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1.x86_64.rpm  java-17-openjdk-javadoc-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-demo-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-devel-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-jmods-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-headless-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-src-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-17.0.7.0.7-1.el9_1.x86_64.rpm java-17-openjdk-static-libs-17.0.7.0.7-1.el9_1.x86_64.rpm3 yBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security update2https://access.redhat.com/errata/RHSA-2023:1880RHSA-2023:1880RHSA-2023:1880 https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1880.htmlALSA-2023:1880ALSA-2023:1880 qxjava-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1.x86_64.rpmtxjava-11-openjdk-static-libs-11.0.19.0.7-1.el9_1.x86_64.rpmnxjava-11-openjdk-devel-11.0.19.0.7-1.el9_1.x86_64.rpmrxjava-11-openjdk-jmods-11.0.19.0.7-1.el9_1.x86_64.rpmoxjava-11-openjdk-headless-11.0.19.0.7-1.el9_1.x86_64.rpmlxjava-11-openjdk-11.0.19.0.7-1.el9_1.x86_64.rpmpxjava-11-openjdk-javadoc-11.0.19.0.7-1.el9_1.x86_64.rpmsxjava-11-openjdk-src-11.0.19.0.7-1.el9_1.x86_64.rpmmxjava-11-openjdk-demo-11.0.19.0.7-1.el9_1.x86_64.rpm qxjava-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9_1.x86_64.rpmtxjava-11-openjdk-static-libs-11.0.19.0.7-1.el9_1.x86_64.rpmnxjava-11-openjdk-devel-11.0.19.0.7-1.el9_1.x86_64.rpmrxjava-11-openjdk-jmods-11.0.19.0.7-1.el9_1.x86_64.rpmoxjava-11-openjdk-headless-11.0.19.0.7-1.el9_1.x86_64.rpmlxjava-11-openjdk-11.0.19.0.7-1.el9_1.x86_64.rpmpxjava-11-openjdk-javadoc-11.0.19.0.7-1.el9_1.x86_64.rpmsxjava-11-openjdk-src-11.0.19.0.7-1.el9_1.x86_64.rpmmxjava-11-openjdk-demo-11.0.19.0.7-1.el9_1.x86_64.rpmu4 LBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security and bug fix updateLThttps://access.redhat.com/errata/RHSA-2023:1909RHSA-2023:1909RHSA-2023:1909 https://access.redhat.com/security/cve/CVE-2023-21930CVE-2023-21930CVE-2023-21930https://access.redhat.com/security/cve/CVE-2023-21937CVE-2023-21937CVE-2023-21937https://access.redhat.com/security/cve/CVE-2023-21938CVE-2023-21938CVE-2023-21938https://access.redhat.com/security/cve/CVE-2023-21939CVE-2023-21939CVE-2023-21939https://access.redhat.com/security/cve/CVE-2023-21954CVE-2023-21954CVE-2023-21954https://access.redhat.com/security/cve/CVE-2023-21967CVE-2023-21967CVE-2023-21967https://access.redhat.com/security/cve/CVE-2023-21968CVE-2023-21968CVE-2023-21968https://bugzilla.redhat.com/21874352187435https://bugzilla.redhat.com/21874412187441https://bugzilla.redhat.com/21877042187704https://bugzilla.redhat.com/21877242187724https://bugzilla.redhat.com/21877582187758https://bugzilla.redhat.com/21877902187790https://bugzilla.redhat.com/21878022187802https://errata.almalinux.org/9/ALSA-2023-1909.htmlALSA-2023:1909ALSA-2023:1909 :.java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1.noarch.rpm4.java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1.x86_64.rpm3.java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1.x86_64.rpm6.java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1.x86_64.rpm2.java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1.x86_64.rpm5.java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1.x86_64.rpm;.java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1.noarch.rpm:.java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el9_1.noarch.rpm4.java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el9_1.x86_64.rpm3.java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el9_1.x86_64.rpm6.java-1.8.0-openjdk-src-1.8.0.372.b07-1.el9_1.x86_64.rpm2.java-1.8.0-openjdk-1.8.0.372.b07-1.el9_1.x86_64.rpm5.java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el9_1.x86_64.rpm;.java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el9_1.noarch.rpmƷJ5 %YBBBBBBBBBBsecurityImportant: webkit2gtk3 security update xhttps://access.redhat.com/errata/RHSA-2023:1918RHSA-2023:1918RHSA-2023:1918 https://access.redhat.com/security/cve/CVE-2023-28205CVE-2023-28205CVE-2023-28205https://bugzilla.redhat.com/21857242185724https://errata.almalinux.org/9/ALSA-2023-1918.htmlALSA-2023:1918ALSA-2023:1918 3awebkit2gtk3-jsc-2.36.7-1.el9_1.3.x86_64.rpm1awebkit2gtk3-2.36.7-1.el9_1.3.x86_64.rpm2awebkit2gtk3-devel-2.36.7-1.el9_1.3.i686.rpm3awebkit2gtk3-jsc-2.36.7-1.el9_1.3.i686.rpm4awebkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.i686.rpm1awebkit2gtk3-2.36.7-1.el9_1.3.i686.rpm2awebkit2gtk3-devel-2.36.7-1.el9_1.3.x86_64.rpm4awebkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.x86_64.rpm3awebkit2gtk3-jsc-2.36.7-1.el9_1.3.x86_64.rpm1awebkit2gtk3-2.36.7-1.el9_1.3.x86_64.rpm2awebkit2gtk3-devel-2.36.7-1.el9_1.3.i686.rpm3awebkit2gtk3-jsc-2.36.7-1.el9_1.3.i686.rpm4awebkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.i686.rpm1awebkit2gtk3-2.36.7-1.el9_1.3.i686.rpm2awebkit2gtk3-devel-2.36.7-1.el9_1.3.x86_64.rpm4awebkit2gtk3-jsc-devel-2.36.7-1.el9_1.3.x86_64.rpmt6 /fBBBBBBBsecurityImportant: emacs security updateRhttps://access.redhat.com/errata/RHSA-2023:2074RHSA-2023:2074RHSA-2023:2074 https://access.redhat.com/security/cve/CVE-2023-28617CVE-2023-28617CVE-2023-28617https://bugzilla.redhat.com/21805442180544https://errata.almalinux.org/9/ALSA-2023-2074.htmlALSA-2023:2074ALSA-2023:2074 x>emacs-27.2-6.el9_1.1.x86_64.rpmy>emacs-common-27.2-6.el9_1.1.x86_64.rpm{>emacs-nox-27.2-6.el9_1.1.x86_64.rpm>emacs-filesystem-27.2-6.el9_1.1.noarch.rpmz>emacs-lucid-27.2-6.el9_1.1.x86_64.rpmx>emacs-27.2-6.el9_1.1.x86_64.rpmy>emacs-common-27.2-6.el9_1.1.x86_64.rpm{>emacs-nox-27.2-6.el9_1.1.x86_64.rpm>emacs-filesystem-27.2-6.el9_1.1.noarch.rpmz>emacs-lucid-27.2-6.el9_1.1.x86_64.rpmȭ7 6pBBBBsecurityImportant: libwebp security updatej*https://access.redhat.com/errata/RHSA-2023:2078RHSA-2023:2078RHSA-2023:2078 https://access.redhat.com/security/cve/CVE-2023-1999CVE-2023-1999CVE-2023-1999https://bugzilla.redhat.com/21861022186102https://errata.almalinux.org/9/ALSA-2023-2078.htmlALSA-2023:2078ALSA-2023:2078 5zlibwebp-devel-1.2.0-6.el9_1.x86_64.rpm4zlibwebp-1.2.0-6.el9_1.i686.rpm4zlibwebp-1.2.0-6.el9_1.x86_64.rpm5zlibwebp-devel-1.2.0-6.el9_1.i686.rpm5zlibwebp-devel-1.2.0-6.el9_1.x86_64.rpm4zlibwebp-1.2.0-6.el9_1.i686.rpm4zlibwebp-1.2.0-6.el9_1.x86_64.rpm5zlibwebp-devel-1.2.0-6.el9_1.i686.rpmȩV8 wBBBBBBBBBBsecurityImportant: samba security updatehttps://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127 https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127 Xsamba-winbind-clients-4.16.4-103.el9_1.x86_64.rpmYsamba-winbind-krb5-locator-4.16.4-103.el9_1.x86_64.rpmUsamba-client-4.16.4-103.el9_1.x86_64.rpmVsamba-krb5-printing-4.16.4-103.el9_1.x86_64.rpmZsamba-winexe-4.16.4-103.el9_1.x86_64.rpmWsamba-vfs-iouring-4.16.4-103.el9_1.x86_64.rpmXsamba-winbind-clients-4.16.4-103.el9_1.x86_64.rpmYsamba-winbind-krb5-locator-4.16.4-103.el9_1.x86_64.rpmUsamba-client-4.16.4-103.el9_1.x86_64.rpmVsamba-krb5-printing-4.16.4-103.el9_1.x86_64.rpmZsamba-winexe-4.16.4-103.el9_1.x86_64.rpmWsamba-vfs-iouring-4.16.4-103.el9_1.x86_64.rpmӿ!9 DBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security and bug fix update(https://access.redhat.com/errata/RHSA-2023:2161RHSA-2023:2161RHSA-2023:2161 https://access.redhat.com/security/cve/CVE-2022-36087CVE-2022-36087CVE-2022-36087https://bugzilla.redhat.com/21284252128425https://errata.almalinux.org/9/ALSA-2023-2161.htmlALSA-2023:2161ALSA-2023:2161 -fence-agents-ibm-powervs-4.10.0-43.el9.noarch.rpmafence-virt-4.10.0-43.el9.x86_64.rpmffence-virtd-serial-4.10.0-43.el9.x86_64.rpmdfence-virtd-libvirt-4.10.0-43.el9.x86_64.rpmgfence-virtd-tcp-4.10.0-43.el9.x86_64.rpmefence-virtd-multicast-4.10.0-43.el9.x86_64.rpm,fence-agents-common-4.10.0-43.el9.noarch.rpm/fence-agents-virsh-4.10.0-43.el9.noarch.rpm_fence-agents-compute-4.10.0-43.el9.x86_64.rpmcfence-virtd-cpg-4.10.0-43.el9.x86_64.rpm`fence-agents-kubevirt-4.10.0-43.el9.x86_64.rpmbfence-virtd-4.10.0-43.el9.x86_64.rpm.fence-agents-ibm-vpc-4.10.0-43.el9.noarch.rpm -fence-agents-ibm-powervs-4.10.0-43.el9.noarch.rpmafence-virt-4.10.0-43.el9.x86_64.rpmffence-virtd-serial-4.10.0-43.el9.x86_64.rpmdfence-virtd-libvirt-4.10.0-43.el9.x86_64.rpmgfence-virtd-tcp-4.10.0-43.el9.x86_64.rpmefence-virtd-multicast-4.10.0-43.el9.x86_64.rpm,fence-agents-common-4.10.0-43.el9.noarch.rpm/fence-agents-virsh-4.10.0-43.el9.noarch.rpm_fence-agents-compute-4.10.0-43.el9.x86_64.rpmcfence-virtd-cpg-4.10.0-43.el9.x86_64.rpm`fence-agents-kubevirt-4.10.0-43.el9.x86_64.rpmbfence-virtd-4.10.0-43.el9.x86_64.rpm.fence-agents-ibm-vpc-4.10.0-43.el9.noarch.rpmj: ?[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security, bug fix, and enhancement update.lhttps://access.redhat.com/errata/RHSA-2023:2162RHSA-2023:2162RHSA-2023:2162 https://access.redhat.com/security/cve/CVE-2022-3165CVE-2022-3165CVE-2022-3165https://access.redhat.com/security/cve/CVE-2022-4172CVE-2022-4172CVE-2022-4172https://bugzilla.redhat.com/21297392129739https://bugzilla.redhat.com/21491052149105https://errata.almalinux.org/9/ALSA-2023-2162.htmlALSA-2023:2162ALSA-2023:2162 K\qemu-guest-agent-7.2.0-14.el9_2.x86_64.rpmQ\qemu-kvm-common-7.2.0-14.el9_2.x86_64.rpmL\qemu-img-7.2.0-14.el9_2.x86_64.rpmP\qemu-kvm-block-rbd-7.2.0-14.el9_2.x86_64.rpmV\qemu-kvm-device-usb-host-7.2.0-14.el9_2.x86_64.rpmN\qemu-kvm-audio-pa-7.2.0-14.el9_2.x86_64.rpmM\qemu-kvm-7.2.0-14.el9_2.x86_64.rpmX\qemu-kvm-docs-7.2.0-14.el9_2.x86_64.rpmO\qemu-kvm-block-curl-7.2.0-14.el9_2.x86_64.rpmZ\qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.x86_64.rpmT\qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.x86_64.rpm\\qemu-pr-helper-7.2.0-14.el9_2.x86_64.rpmS\qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.x86_64.rpmY\qemu-kvm-tools-7.2.0-14.el9_2.x86_64.rpm[\qemu-kvm-ui-opengl-7.2.0-14.el9_2.x86_64.rpmR\qemu-kvm-core-7.2.0-14.el9_2.x86_64.rpmW\qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.x86_64.rpmU\qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.x86_64.rpmK\qemu-guest-agent-7.2.0-14.el9_2.x86_64.rpmQ\qemu-kvm-common-7.2.0-14.el9_2.x86_64.rpmL\qemu-img-7.2.0-14.el9_2.x86_64.rpmP\qemu-kvm-block-rbd-7.2.0-14.el9_2.x86_64.rpmV\qemu-kvm-device-usb-host-7.2.0-14.el9_2.x86_64.rpmN\qemu-kvm-audio-pa-7.2.0-14.el9_2.x86_64.rpmM\qemu-kvm-7.2.0-14.el9_2.x86_64.rpmX\qemu-kvm-docs-7.2.0-14.el9_2.x86_64.rpmO\qemu-kvm-block-curl-7.2.0-14.el9_2.x86_64.rpmZ\qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.x86_64.rpmT\qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.x86_64.rpm\\qemu-pr-helper-7.2.0-14.el9_2.x86_64.rpmS\qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.x86_64.rpmY\qemu-kvm-tools-7.2.0-14.el9_2.x86_64.rpm[\qemu-kvm-ui-opengl-7.2.0-14.el9_2.x86_64.rpmR\qemu-kvm-core-7.2.0-14.el9_2.x86_64.rpmW\qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.x86_64.rpmU\qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.x86_64.rpm; securityImportant: edk2 security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:2165RHSA-2023:2165RHSA-2023:2165 https://access.redhat.com/security/cve/CVE-2021-38578CVE-2021-38578CVE-2021-38578https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/19603211960321https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://errata.almalinux.org/9/ALSA-2023-2165.htmlALSA-2023:2165ALSA-2023:2165 %edk2-ovmf-20221207gitfff6d81270b5-9.el9_2.noarch.rpm%edk2-ovmf-20221207gitfff6d81270b5-9.el9_2.noarch.rpm< BBBBBBBBBBBBBsecurityModerate: freeradius security and bug fix update)fhttps://access.redhat.com/errata/RHSA-2023:2166RHSA-2023:2166RHSA-2023:2166 https://access.redhat.com/security/cve/CVE-2022-41859CVE-2022-41859CVE-2022-41859https://access.redhat.com/security/cve/CVE-2022-41860CVE-2022-41860CVE-2022-41860https://access.redhat.com/security/cve/CVE-2022-41861CVE-2022-41861CVE-2022-41861https://bugzilla.redhat.com/20784832078483https://bugzilla.redhat.com/20784852078485https://bugzilla.redhat.com/20784872078487https://errata.almalinux.org/9/ALSA-2023-2166.htmlALSA-2023:2166ALSA-2023:2166 2xfreeradius-devel-3.0.21-37.el9.x86_64.rpm6xfreeradius-utils-3.0.21-37.el9.x86_64.rpm5xfreeradius-ldap-3.0.21-37.el9.x86_64.rpm1xfreeradius-3.0.21-37.el9.x86_64.rpm3xfreeradius-doc-3.0.21-37.el9.x86_64.rpmdxpython3-freeradius-3.0.21-37.el9.x86_64.rpm4xfreeradius-krb5-3.0.21-37.el9.x86_64.rpm2xfreeradius-devel-3.0.21-37.el9.x86_64.rpm6xfreeradius-utils-3.0.21-37.el9.x86_64.rpm5xfreeradius-ldap-3.0.21-37.el9.x86_64.rpm1xfreeradius-3.0.21-37.el9.x86_64.rpm3xfreeradius-doc-3.0.21-37.el9.x86_64.rpmdxpython3-freeradius-3.0.21-37.el9.x86_64.rpm4xfreeradius-krb5-3.0.21-37.el9.x86_64.rpm:= QsecurityModerate: grafana security and enhancement update https://access.redhat.com/errata/RHSA-2023:2167RHSA-2023:2167RHSA-2023:2167 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-35957CVE-2022-35957CVE-2022-35957https://access.redhat.com/security/cve/CVE-2022-39229CVE-2022-39229CVE-2022-39229https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21255142125514https://bugzilla.redhat.com/21311492131149https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-2167.htmlALSA-2023:2167ALSA-2023:2167 ografana-9.0.9-2.el9.x86_64.rpmografana-9.0.9-2.el9.x86_64.rpm=> TsecurityModerate: grafana-pcp security and enhancement update{https://access.redhat.com/errata/RHSA-2023:2177RHSA-2023:2177RHSA-2023:2177 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://bugzilla.redhat.com/21246692124669https://errata.almalinux.org/9/ALSA-2023-2177.htmlALSA-2023:2177ALSA-2023:2177 }igrafana-pcp-5.1.1-1.el9.x86_64.rpm}igrafana-pcp-5.1.1-1.el9.x86_64.rpm? WsecurityModerate: libguestfs-winsupport security update https://access.redhat.com/errata/RHSA-2023:2179RHSA-2023:2179RHSA-2023:2179 https://access.redhat.com/security/cve/CVE-2021-46790CVE-2021-46790CVE-2021-46790https://access.redhat.com/security/cve/CVE-2022-30784CVE-2022-30784CVE-2022-30784https://access.redhat.com/security/cve/CVE-2022-30786CVE-2022-30786CVE-2022-30786https://access.redhat.com/security/cve/CVE-2022-30788CVE-2022-30788CVE-2022-30788https://access.redhat.com/security/cve/CVE-2022-30789CVE-2022-30789CVE-2022-30789https://bugzilla.redhat.com/20933142093314https://bugzilla.redhat.com/20933262093326https://bugzilla.redhat.com/20933402093340https://bugzilla.redhat.com/20933482093348https://bugzilla.redhat.com/20933582093358https://errata.almalinux.org/9/ALSA-2023-2179.htmlALSA-2023:2179ALSA-2023:2179 Qlibguestfs-winsupport-9.2-1.el9.x86_64.rpmQlibguestfs-winsupport-9.2-1.el9.x86_64.rpm@ ZsecurityModerate: butane security, bug fix, and enhancement update%Ehttps://access.redhat.com/errata/RHSA-2023:2193RHSA-2023:2193RHSA-2023:2193 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://bugzilla.redhat.com/21138142113814https://bugzilla.redhat.com/21246692124669https://errata.almalinux.org/9/ALSA-2023-2193.htmlALSA-2023:2193ALSA-2023:2193 2butane-0.16.0-1.el9.x86_64.rpm2butane-0.16.0-1.el9.x86_64.rpmA ]BsecurityModerate: frr security, bug fix, and enhancement updatejThttps://access.redhat.com/errata/RHSA-2023:2202RHSA-2023:2202RHSA-2023:2202 https://access.redhat.com/security/cve/CVE-2022-37032CVE-2022-37032CVE-2022-37032https://bugzilla.redhat.com/21287132128713https://errata.almalinux.org/9/ALSA-2023-2202.htmlALSA-2023:2202ALSA-2023:2202 Ayfrr-8.3.1-5.el9.x86_64.rpmWyfrr-selinux-8.3.1-5.el9.noarch.rpmAyfrr-8.3.1-5.el9.x86_64.rpmWyfrr-selinux-8.3.1-5.el9.noarch.rpm9B +aBBBBBBBBsecurityModerate: Image Builder security, bug fix, and enhancement update>G https://access.redhat.com/errata/RHSA-2023:2204RHSA-2023:2204RHSA-2023:2204 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2879CVE-2022-2879CVE-2022-2879https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21328672132867https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2204.htmlALSA-2023:2204ALSA-2023:2204 0nosbuild-composer-core-76-2.el9_2.alma.x86_64.rpmMweldr-client-35.9-1.el9.x86_64.rpm1nosbuild-composer-worker-76-2.el9_2.alma.x86_64.rpm/nosbuild-composer-76-2.el9_2.alma.x86_64.rpm[idm-pki-server-11.3.0-1.el9.noarch.rpm=[idm-pki-kra-11.3.0-1.el9.noarch.rpme[python3-idm-pki-11.3.0-1.el9.noarch.rpm;[idm-pki-est-11.3.0-1.el9.noarch.rpm<[idm-pki-java-11.3.0-1.el9.noarch.rpm8[idm-pki-acme-11.3.0-1.el9.noarch.rpm :[idm-pki-ca-11.3.0-1.el9.noarch.rpm?[idm-pki-tools-11.3.0-1.el9.x86_64.rpm9[idm-pki-base-11.3.0-1.el9.noarch.rpm>[idm-pki-server-11.3.0-1.el9.noarch.rpm=[idm-pki-kra-11.3.0-1.el9.noarch.rpme[python3-idm-pki-11.3.0-1.el9.noarch.rpm;[idm-pki-est-11.3.0-1.el9.noarch.rpm<[idm-pki-java-11.3.0-1.el9.noarch.rpm8[idm-pki-acme-11.3.0-1.el9.noarch.rpm*S 21securityModerate: jackson security update;!https://access.redhat.com/errata/RHSA-2023:2312RHSA-2023:2312RHSA-2023:2312 https://access.redhat.com/security/cve/CVE-2020-36518CVE-2020-36518CVE-2020-36518https://bugzilla.redhat.com/20646982064698https://errata.almalinux.org/9/ALSA-2023-2312.htmlALSA-2023:2312ALSA-2023:2312 bpki-jackson-databind-2.14.1-2.el9.noarch.rpmbpki-jackson-databind-2.14.1-2.el9.noarch.rpm\T sBBBBBBBBBBBBBBBBBBsecurityModerate: git security and bug fix update\5 https://access.redhat.com/errata/RHSA-2023:2319RHSA-2023:2319RHSA-2023:2319 https://access.redhat.com/security/cve/CVE-2022-24765CVE-2022-24765CVE-2022-24765https://access.redhat.com/security/cve/CVE-2022-29187CVE-2022-29187CVE-2022-29187https://access.redhat.com/security/cve/CVE-2022-39253CVE-2022-39253CVE-2022-39253https://access.redhat.com/security/cve/CVE-2022-39260CVE-2022-39260CVE-2022-39260https://bugzilla.redhat.com/20734142073414https://bugzilla.redhat.com/21074392107439https://bugzilla.redhat.com/21374222137422https://bugzilla.redhat.com/21374232137423https://errata.almalinux.org/9/ALSA-2023-2319.htmlALSA-2023:2319ALSA-2023:2319 < git-email-2.39.1-1.el9.noarch.rpm: git-all-2.39.1-1.el9.noarch.rpm; git-core-doc-2.39.1-1.el9.noarch.rpm@ git-svn-2.39.1-1.el9.noarch.rpmB gitweb-2.39.1-1.el9.noarch.rpmE git-daemon-2.39.1-1.el9.x86_64.rpm= git-gui-2.39.1-1.el9.noarch.rpmC git-core-2.39.1-1.el9.x86_64.rpm> git-instaweb-2.39.1-1.el9.noarch.rpmB git-2.39.1-1.el9.x86_64.rpmJ perl-Git-SVN-2.39.1-1.el9.noarch.rpmI perl-Git-2.39.1-1.el9.noarch.rpmF git-subtree-2.39.1-1.el9.x86_64.rpmA gitk-2.39.1-1.el9.noarch.rpmD git-credential-libsecret-2.39.1-1.el9.x86_64.rpm< git-email-2.39.1-1.el9.noarch.rpm: git-all-2.39.1-1.el9.noarch.rpm; git-core-doc-2.39.1-1.el9.noarch.rpm@ git-svn-2.39.1-1.el9.noarch.rpmB gitweb-2.39.1-1.el9.noarch.rpmE git-daemon-2.39.1-1.el9.x86_64.rpm= git-gui-2.39.1-1.el9.noarch.rpmC git-core-2.39.1-1.el9.x86_64.rpm> git-instaweb-2.39.1-1.el9.noarch.rpmB git-2.39.1-1.el9.x86_64.rpmJ perl-Git-SVN-2.39.1-1.el9.noarch.rpmI perl-Git-2.39.1-1.el9.noarch.rpmF git-subtree-2.39.1-1.el9.x86_64.rpmA gitk-2.39.1-1.el9.noarch.rpmD git-credential-libsecret-2.39.1-1.el9.x86_64.rpm`U HBBBBBBsecurityModerate: freerdp security updatefhttps://access.redhat.com/errata/RHSA-2023:2326RHSA-2023:2326RHSA-2023:2326 https://access.redhat.com/security/cve/CVE-2022-39282CVE-2022-39282CVE-2022-39282https://access.redhat.com/security/cve/CVE-2022-39283CVE-2022-39283CVE-2022-39283https://access.redhat.com/security/cve/CVE-2022-39316CVE-2022-39316CVE-2022-39316https://access.redhat.com/security/cve/CVE-2022-39317CVE-2022-39317CVE-2022-39317https://access.redhat.com/security/cve/CVE-2022-39318CVE-2022-39318CVE-2022-39318https://access.redhat.com/security/cve/CVE-2022-39319CVE-2022-39319CVE-2022-39319https://access.redhat.com/security/cve/CVE-2022-39320CVE-2022-39320CVE-2022-39320https://access.redhat.com/security/cve/CVE-2022-39347CVE-2022-39347CVE-2022-39347https://access.redhat.com/security/cve/CVE-2022-41877CVE-2022-41877CVE-2022-41877https://bugzilla.redhat.com/21347132134713https://bugzilla.redhat.com/21347172134717https://bugzilla.redhat.com/21436422143642https://bugzilla.redhat.com/21436432143643https://bugzilla.redhat.com/21436442143644https://bugzilla.redhat.com/21436452143645https://bugzilla.redhat.com/21436462143646https://bugzilla.redhat.com/21436472143647https://bugzilla.redhat.com/21436482143648https://errata.almalinux.org/9/ALSA-2023-2326.htmlALSA-2023:2326ALSA-2023:2326 ^ libwinpr-2.4.1-5.el9.i686.rpmp freerdp-2.4.1-5.el9.x86_64.rpmV freerdp-libs-2.4.1-5.el9.i686.rpmV freerdp-libs-2.4.1-5.el9.x86_64.rpm^ libwinpr-2.4.1-5.el9.x86_64.rpm^ libwinpr-2.4.1-5.el9.i686.rpmp freerdp-2.4.1-5.el9.x86_64.rpmV freerdp-libs-2.4.1-5.el9.i686.rpmV freerdp-libs-2.4.1-5.el9.x86_64.rpm^ libwinpr-2.4.1-5.el9.x86_64.rpm%V QBBBBsecurityModerate: libtiff security updatew>https://access.redhat.com/errata/RHSA-2023:2340RHSA-2023:2340RHSA-2023:2340 https://access.redhat.com/security/cve/CVE-2022-3570CVE-2022-3570CVE-2022-3570https://access.redhat.com/security/cve/CVE-2022-3597CVE-2022-3597CVE-2022-3597https://access.redhat.com/security/cve/CVE-2022-3598CVE-2022-3598CVE-2022-3598https://access.redhat.com/security/cve/CVE-2022-3599CVE-2022-3599CVE-2022-3599https://access.redhat.com/security/cve/CVE-2022-3626CVE-2022-3626CVE-2022-3626https://access.redhat.com/security/cve/CVE-2022-3627CVE-2022-3627CVE-2022-3627https://access.redhat.com/security/cve/CVE-2022-3970CVE-2022-3970CVE-2022-3970https://access.redhat.com/security/cve/CVE-2022-4645CVE-2022-4645CVE-2022-4645https://access.redhat.com/security/cve/CVE-2023-30774CVE-2023-30774CVE-2023-30774https://access.redhat.com/security/cve/CVE-2023-30775CVE-2023-30775CVE-2023-30775https://bugzilla.redhat.com/21427342142734https://bugzilla.redhat.com/21427362142736https://bugzilla.redhat.com/21427382142738https://bugzilla.redhat.com/21427402142740https://bugzilla.redhat.com/21427412142741https://bugzilla.redhat.com/21427422142742https://bugzilla.redhat.com/21489182148918https://bugzilla.redhat.com/21762202176220https://bugzilla.redhat.com/21871392187139https://bugzilla.redhat.com/21871412187141https://errata.almalinux.org/9/ALSA-2023-2340.htmlALSA-2023:2340ALSA-2023:2340 h5libtiff-devel-4.4.0-7.el9.i686.rpmg5libtiff-4.4.0-7.el9.x86_64.rpmg5libtiff-4.4.0-7.el9.i686.rpmh5libtiff-devel-4.4.0-7.el9.x86_64.rpmh5libtiff-devel-4.4.0-7.el9.i686.rpmg5libtiff-4.4.0-7.el9.x86_64.rpmg5libtiff-4.4.0-7.el9.i686.rpmh5libtiff-devel-4.4.0-7.el9.x86_64.rpm8W XsecurityModerate: git-lfs security and bug fix update5Mhttps://access.redhat.com/errata/RHSA-2023:2357RHSA-2023:2357RHSA-2023:2357 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148CVE-2022-32148https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://bugzilla.redhat.com/21138142113814https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2357.htmlALSA-2023:2357ALSA-2023:2357 ?=git-lfs-3.2.0-1.el9.x86_64.rpm?=git-lfs-3.2.0-1.el9.x86_64.rpmpX $[BBBBBBBsecurityModerate: emacs security and bug fix updateahttps://access.redhat.com/errata/RHSA-2023:2366RHSA-2023:2366RHSA-2023:2366 https://access.redhat.com/security/cve/CVE-2022-45939CVE-2022-45939CVE-2022-45939https://bugzilla.redhat.com/21493802149380https://errata.almalinux.org/9/ALSA-2023-2366.htmlALSA-2023:2366ALSA-2023:2366 z?emacs-lucid-27.2-8.el9.x86_64.rpmy?emacs-common-27.2-8.el9.x86_64.rpm?emacs-filesystem-27.2-8.el9.noarch.rpm{?emacs-nox-27.2-8.el9.x86_64.rpmx?emacs-27.2-8.el9.x86_64.rpmz?emacs-lucid-27.2-8.el9.x86_64.rpmy?emacs-common-27.2-8.el9.x86_64.rpm?emacs-filesystem-27.2-8.el9.noarch.rpm{?emacs-nox-27.2-8.el9.x86_64.rpmx?emacs-27.2-8.el9.x86_64.rpmSY 'esecurityModerate: containernetworking-plugins security and bug fix updatechttps://access.redhat.com/errata/RHSA-2023:2367RHSA-2023:2367RHSA-2023:2367 https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2367.htmlALSA-2023:2367ALSA-2023:2367 ^dcontainernetworking-plugins-1.2.0-1.el9.x86_64.rpm^dcontainernetworking-plugins-1.2.0-1.el9.x86_64.rpmZ /hBBBBBsecurityModerate: unbound security updated9https://access.redhat.com/errata/RHSA-2023:2370RHSA-2023:2370RHSA-2023:2370 https://access.redhat.com/security/cve/CVE-2022-3204CVE-2022-3204CVE-2022-3204https://bugzilla.redhat.com/21289472128947https://errata.almalinux.org/9/ALSA-2023-2370.htmlALSA-2023:2370ALSA-2023:2370 K6unbound-1.16.2-3.el9.x86_64.rpm26unbound-libs-1.16.2-3.el9.x86_64.rpm26unbound-libs-1.16.2-3.el9.i686.rpmH6python3-unbound-1.16.2-3.el9.x86_64.rpmK6unbound-1.16.2-3.el9.x86_64.rpm26unbound-libs-1.16.2-3.el9.x86_64.rpm26unbound-libs-1.16.2-3.el9.i686.rpmH6python3-unbound-1.16.2-3.el9.x86_64.rpmF[ 5pBBBsecurityModerate: wireshark security and bug fix update4https://access.redhat.com/errata/RHSA-2023:2373RHSA-2023:2373RHSA-2023:2373 https://access.redhat.com/security/cve/CVE-2022-3190CVE-2022-3190CVE-2022-3190https://bugzilla.redhat.com/21520612152061https://errata.almalinux.org/9/ALSA-2023-2373.htmlALSA-2023:2373ALSA-2023:2373 gwireshark-3.4.10-4.el9.x86_64.rpmrgwireshark-cli-3.4.10-4.el9.i686.rpmrgwireshark-cli-3.4.10-4.el9.x86_64.rpmgwireshark-3.4.10-4.el9.x86_64.rpmrgwireshark-cli-3.4.10-4.el9.i686.rpmrgwireshark-cli-3.4.10-4.el9.x86_64.rpm \ 76securityModerate: postgresql-jdbc security updateQhttps://access.redhat.com/errata/RHSA-2023:2378RHSA-2023:2378RHSA-2023:2378 https://access.redhat.com/security/cve/CVE-2022-41946CVE-2022-41946CVE-2022-41946https://bugzilla.redhat.com/21533992153399https://errata.almalinux.org/9/ALSA-2023-2378.htmlALSA-2023:2378ALSA-2023:2378 XCpostgresql-jdbc-42.2.27-1.el9.noarch.rpmXCpostgresql-jdbc-42.2.27-1.el9.noarch.rpm] *RBBBBBBBBRBMBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security updatecZ https://access.redhat.com/errata/RHSA-2023:2417RHSA-2023:2417RHSA-2023:2417 https://access.redhat.com/security/cve/CVE-2022-31628CVE-2022-31628CVE-2022-31628https://access.redhat.com/security/cve/CVE-2022-31629CVE-2022-31629CVE-2022-31629https://access.redhat.com/security/cve/CVE-2022-31630CVE-2022-31630CVE-2022-31630https://access.redhat.com/security/cve/CVE-2022-31631CVE-2022-31631CVE-2022-31631https://access.redhat.com/security/cve/CVE-2022-37454CVE-2022-37454CVE-2022-37454https://bugzilla.redhat.com/21336872133687https://bugzilla.redhat.com/21336882133688https://bugzilla.redhat.com/21392802139280https://bugzilla.redhat.com/21402002140200https://bugzilla.redhat.com/21587912158791https://errata.almalinux.org/9/ALSA-2023-2417.htmlALSA-2023:2417ALSA-2023:2417 Z_(eAphp-process-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmbAphp-opcache-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmhAphp-xml-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm=php-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmZAphp-fpm-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmTAphp-dba-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmYAphp-ffi-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmphp-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm`Aphp-mysqlnd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm_Aphp-mbstring-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmXAphp-enchant-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmWAphp-embedded-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmAphp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmRAphp-cli-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmfAphp-snmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmdAphp-pgsql-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm^Aphp-ldap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmVAphp-devel-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm]Aphp-intl-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm\Aphp-gmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmgAphp-soap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmSAphp-common-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmUAphp-dbg-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmNphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmcAphp-pdo-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm/Napcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm[Aphp-gd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmaAphp-odbc-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmNphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmQAphp-bcmath-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmZ_(eAphp-process-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmbAphp-opcache-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmhAphp-xml-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm=php-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmZAphp-fpm-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmTAphp-dba-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmYAphp-ffi-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmphp-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpm`Aphp-mysqlnd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm_Aphp-mbstring-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmXAphp-enchant-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmWAphp-embedded-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmAphp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmRAphp-cli-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmfAphp-snmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmdAphp-pgsql-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm^Aphp-ldap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmVAphp-devel-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm]Aphp-intl-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm\Aphp-gmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmgAphp-soap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmSAphp-common-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmUAphp-dbg-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmNphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmcAphp-pdo-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm/Napcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm[Aphp-gd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmaAphp-odbc-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmNphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmQAphp-bcmath-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmb^ git-instaweb-2.39.3-1.el9_2.noarch.rpmB git-2.39.3-1.el9_2.x86_64.rpmB gitweb-2.39.3-1.el9_2.noarch.rpm< git-email-2.39.3-1.el9_2.noarch.rpmD git-credential-libsecret-2.39.3-1.el9_2.x86_64.rpmI perl-Git-2.39.3-1.el9_2.noarch.rpmJ perl-Git-SVN-2.39.3-1.el9_2.noarch.rpm= git-gui-2.39.3-1.el9_2.noarch.rpmC git-core-2.39.3-1.el9_2.x86_64.rpmA gitk-2.39.3-1.el9_2.noarch.rpm@ git-svn-2.39.3-1.el9_2.noarch.rpm; git-core-doc-2.39.3-1.el9_2.noarch.rpm: git-all-2.39.3-1.el9_2.noarch.rpmF git-subtree-2.39.3-1.el9_2.x86_64.rpmE git-daemon-2.39.3-1.el9_2.x86_64.rpm> git-instaweb-2.39.3-1.el9_2.noarch.rpmB git-2.39.3-1.el9_2.x86_64.rpmB gitweb-2.39.3-1.el9_2.noarch.rpm< git-email-2.39.3-1.el9_2.noarch.rpmD git-credential-libsecret-2.39.3-1.el9_2.x86_64.rpmI perl-Git-2.39.3-1.el9_2.noarch.rpmJ perl-Git-SVN-2.39.3-1.el9_2.noarch.rpm= git-gui-2.39.3-1.el9_2.noarch.rpmxu 6jBBBBBBBBBBsecurityImportant: go-toolset and golang security updatepUhttps://access.redhat.com/errata/RHSA-2023:3318RHSA-2023:3318RHSA-2023:3318 https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://bugzilla.redhat.com/21960272196027https://errata.almalinux.org/9/ALSA-2023-3318.htmlALSA-2023:3318ALSA-2023:3318 ?egolang-1.19.9-2.el9_2.x86_64.rpm@egolang-bin-1.19.9-2.el9_2.x86_64.rpmegolang-tests-1.19.9-2.el9_2.noarch.rpmIegolang-race-1.19.9-2.el9_2.x86_64.rpmegolang-src-1.19.9-2.el9_2.noarch.rpmegolang-docs-1.19.9-2.el9_2.noarch.rpmngo-toolset-1.19.9-1.el9_2.x86_64.rpmegolang-misc-1.19.9-2.el9_2.noarch.rpm?egolang-1.19.9-2.el9_2.x86_64.rpm@egolang-bin-1.19.9-2.el9_2.x86_64.rpmegolang-tests-1.19.9-2.el9_2.noarch.rpmIegolang-race-1.19.9-2.el9_2.x86_64.rpmegolang-src-1.19.9-2.el9_2.noarch.rpmegolang-docs-1.19.9-2.el9_2.noarch.rpmngo-toolset-1.19.9-1.el9_2.x86_64.rpmegolang-misc-1.19.9-2.el9_2.noarch.rpmrv tBBBBBBBBsecurityImportant: nodejs security update% https://access.redhat.com/errata/RHSA-2023:3586RHSA-2023:3586RHSA-2023:3586 https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://access.redhat.com/security/cve/CVE-2023-32067CVE-2023-32067CVE-2023-32067https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://bugzilla.redhat.com/22095022209502https://errata.almalinux.org/9/ALSA-2023-3586.htmlALSA-2023:3586ALSA-2023:3586 hnodejs-full-i18n-16.19.1-2.el9_2.x86_64.rpmnodejs-libs-16.19.1-2.el9_2.x86_64.rpmnodejs-libs-16.19.1-2.el9_2.i686.rpmfnpm-8.19.3-1.16.19.1.2.el9_2.x86_64.rpmNnodejs-docs-16.19.1-2.el9_2.noarch.rpm9nodejs-16.19.1-2.el9_2.x86_64.rpmhnodejs-full-i18n-16.19.1-2.el9_2.x86_64.rpmnodejs-libs-16.19.1-2.el9_2.x86_64.rpmnodejs-libs-16.19.1-2.el9_2.i686.rpmfnpm-8.19.3-1.16.19.1.2.el9_2.x86_64.rpmNnodejs-docs-16.19.1-2.el9_2.noarch.rpm9nodejs-16.19.1-2.el9_2.x86_64.rpm} securityImportant: thunderbird security update3zhttps://access.redhat.com/errata/RHSA-2023:3587RHSA-2023:3587RHSA-2023:3587 https://access.redhat.com/security/cve/CVE-2023-34414CVE-2023-34414CVE-2023-34414https://access.redhat.com/security/cve/CVE-2023-34416CVE-2023-34416CVE-2023-34416https://bugzilla.redhat.com/22128412212841https://bugzilla.redhat.com/22128422212842https://errata.almalinux.org/9/ALSA-2023-3587.htmlALSA-2023:3587ALSA-2023:3587 :fthunderbird-102.12.0-1.el9_2.alma.x86_64.rpm:fthunderbird-102.12.0-1.el9_2.alma.x86_64.rpmΝZ~ BBBsecurityImportant: firefox security update-+https://access.redhat.com/errata/RHSA-2023:3589RHSA-2023:3589RHSA-2023:3589 https://access.redhat.com/security/cve/CVE-2023-34414CVE-2023-34414CVE-2023-34414https://access.redhat.com/security/cve/CVE-2023-34416CVE-2023-34416CVE-2023-34416https://bugzilla.redhat.com/22128412212841https://bugzilla.redhat.com/22128422212842https://errata.almalinux.org/9/ALSA-2023-3589.htmlALSA-2023:3589ALSA-2023:3589 8ffirefox-102.12.0-1.el9_2.alma.x86_64.rpmQffirefox-x11-102.12.0-1.el9_2.alma.x86_64.rpm8ffirefox-102.12.0-1.el9_2.alma.x86_64.rpmQffirefox-x11-102.12.0-1.el9_2.alma.x86_64.rpmΚ{ GBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement updateX https://access.redhat.com/errata/RHSA-2023:3592RHSA-2023:3592RHSA-2023:3592 https://access.redhat.com/security/cve/CVE-2023-24936CVE-2023-24936CVE-2023-24936https://access.redhat.com/security/cve/CVE-2023-29331CVE-2023-29331CVE-2023-29331https://access.redhat.com/security/cve/CVE-2023-29337CVE-2023-29337CVE-2023-29337https://access.redhat.com/security/cve/CVE-2023-32032CVE-2023-32032CVE-2023-32032https://access.redhat.com/security/cve/CVE-2023-33128CVE-2023-33128CVE-2023-33128https://bugzilla.redhat.com/21924382192438https://bugzilla.redhat.com/22126152212615https://bugzilla.redhat.com/22126172212617https://bugzilla.redhat.com/22126182212618https://bugzilla.redhat.com/22137032213703https://errata.almalinux.org/9/ALSA-2023-3592.htmlALSA-2023:3592ALSA-2023:3592 Adotnet-runtime-7.0-7.0.7-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.7-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.7-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.107-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.107-1.el9_2.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.7-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.7-1.el9_2.x86_64.rpmdotnet-host-7.0.7-1.el9_2.x86_64.rpmCdotnet-sdk-7.0-7.0.107-1.el9_2.x86_64.rpm?dotnet-hostfxr-7.0-7.0.7-1.el9_2.x86_64.rpm Adotnet-runtime-7.0-7.0.7-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.7-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.7-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.107-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.107-1.el9_2.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.7-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.7-1.el9_2.x86_64.rpmdotnet-host-7.0.7-1.el9_2.x86_64.rpmCdotnet-sdk-7.0-7.0.107-1.el9_2.x86_64.rpm?dotnet-hostfxr-7.0-7.0.7-1.el9_2.x86_64.rpm! "\BBBBsecurityImportant: python3.9 security update_+https://access.redhat.com/errata/RHSA-2023:3595RHSA-2023:3595RHSA-2023:3595 https://access.redhat.com/security/cve/CVE-2023-24329CVE-2023-24329CVE-2023-24329https://bugzilla.redhat.com/21739172173917https://errata.almalinux.org/9/ALSA-2023-3595.htmlALSA-2023:3595ALSA-2023:3595 Wpython3-devel-3.9.16-1.el9_2.1.x86_64.rpmWpython3-devel-3.9.16-1.el9_2.1.i686.rpmjpython-unversioned-command-3.9.16-1.el9_2.1.noarch.rpm=python3-tkinter-3.9.16-1.el9_2.1.x86_64.rpmWpython3-devel-3.9.16-1.el9_2.1.x86_64.rpmWpython3-devel-3.9.16-1.el9_2.1.i686.rpmjpython-unversioned-command-3.9.16-1.el9_2.1.noarch.rpm=python3-tkinter-3.9.16-1.el9_2.1.x86_64.rpm} *cBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: texlive security update https://access.redhat.com/errata/RHSA-2023:3661RHSA-2023:3661RHSA-2023:3661 https://access.redhat.com/security/cve/CVE-2023-32700CVE-2023-32700CVE-2023-32700https://bugzilla.redhat.com/22089432208943https://errata.almalinux.org/9/ALSA-2023-3661.htmlALSA-2023:3661ALSA-2023:3661 r# texlive-cm-lgc-20200406-26.el9_2.noarch.rpm texlive-tex-ini-files-20200406-26.el9_2.noarch.rpm texlive-texlive.infra-20200406-26.el9_2.noarch.rpm texlive-soul-20200406-26.el9_2.noarch.rpm0 texlive-colortbl-20200406-26.el9_2.noarch.rpm texlive-textpos-20200406-26.el9_2.noarch.rpm( texlive-marvosym-20200406-26.el9_2.noarch.rpm texlive-tex-gyre-math-20200406-26.el9_2.noarch.rpm texlive-jadetex-20200406-26.el9_2.noarch.rpmO texlive-fancyhdr-20200406-26.el9_2.noarch.rpm* texlive-mathspec-20200406-26.el9_2.noarch.rpm texlive-koma-script-20200406-26.el9_2.noarch.rpm' texlive-ulem-20200406-26.el9_2.noarch.rpm texlive-makeindex-20200406-26.el9_2.x86_64.rpmz texlive-sectsty-20200406-26.el9_2.noarch.rpm7 texlive-mptopdf-20200406-26.el9_2.noarch.rpm} texlive-infwarerr-20200406-26.el9_2.noarch.rpmn texlive-helvetic-20200406-26.el9_2.noarch.rpm texlive-svn-prov-20200406-26.el9_2.noarch.rpm_ texlive-pst-coil-20200406-26.el9_2.noarch.rpm texlive-threeparttable-20200406-26.el9_2.noarch.rpm texlive-tabulary-20200406-26.el9_2.noarch.rpmV texlive-fixlatvian-20200406-26.el9_2.noarch.rpm_ texlive-footmisc-20200406-26.el9_2.noarch.rpm{ texlive-import-20200406-26.el9_2.noarch.rpm texlive-titling-20200406-26.el9_2.noarch.rpmp texlive-hologo-20200406-26.el9_2.noarch.rpm> texlive-needspace-20200406-26.el9_2.noarch.rpm0 texlive-mflogo-font-20200406-26.el9_2.noarch.rpms texlive-hyph-utf8-20200406-26.el9_2.noarch.rpm texlive-knuth-local-20200406-26.el9_2.noarch.rpm texlive-txfonts-20200406-26.el9_2.noarch.rpmo texlive-ragged2e-20200406-26.el9_2.noarch.rpmo texlive-hobsub-20200406-26.el9_2.noarch.rpm~ texlive-showexpl-20200406-26.el9_2.noarch.rpmD texlive-xifthen-20200406-26.el9_2.noarch.rpm texlive-latex-20200406-26.el9_2.noarch.rpm texlive-linegoal-20200406-26.el9_2.noarch.rpm1 texlive-context-20200406-26.el9_2.noarch.rpm texlive-luatex-20200406-26.el9_2.x86_64.rpm| texlive-appendix-20200406-26.el9_2.noarch.rpmB texlive-eqparbox-20200406-26.el9_2.noarch.rpmq texlive-realscripts-20200406-26.el9_2.noarch.rpm texlive-tocloft-20200406-26.el9_2.noarch.rpm- texlive-collection-latexrecommended-20200406-26.el9_2.noarch.rpm texlive-l3backend-20200406-26.el9_2.noarch.rpmx texlive-amsfonts-20200406-26.el9_2.noarch.rpmf texlive-pst-slpe-20200406-26.el9_2.noarch.rpm5 texlive-modes-20200406-26.el9_2.noarch.rpmR texlive-philokalia-20200406-26.el9_2.noarch.rpm8 texlive-ms-20200406-26.el9_2.noarch.rpm texlive-xdvi-20200406-26.el9_2.x86_64.rpmB texlive-notoccite-20200406-26.el9_2.noarch.rpm texlive-texlive-docindex-20200406-26.el9_2.noarch.rpme texlive-lib-20200406-26.el9_2.x86_64.rpm+ texlive-mathtools-20200406-26.el9_2.noarch.rpm{ texlive-anysize-20200406-26.el9_2.noarch.rpm! texlive-classpack-20200406-26.el9_2.noarch.rpmm texlive-hanging-20200406-26.el9_2.noarch.rpmH texlive-xmltexconfig-20200406-26.el9_2.noarch.rpm/ texlive-mflogo-20200406-26.el9_2.noarch.rpm. texlive-upquote-20200406-26.el9_2.noarch.rpm texlive-kastrup-20200406-26.el9_2.noarch.rpmv texlive-hyphenex-20200406-26.el9_2.noarch.rpmM texlive-extsizes-20200406-26.el9_2.noarch.rpm texlive-kvdefinekeys-20200406-26.el9_2.noarch.rpm texlive-booktabs-20200406-26.el9_2.noarch.rpmy texlive-amsmath-20200406-26.el9_2.noarch.rpmC texlive-xetexfontinfo-20200406-26.el9_2.noarch.rpm texlive-times-20200406-26.el9_2.noarch.rpm texlive-texlive-en-20200406-26.el9_2.noarch.rpm8 texlive-datetime-20200406-26.el9_2.noarch.rpm texlive-atveryend-20200406-26.el9_2.noarch.rpm texlive-bigfoot-20200406-26.el9_2.noarch.rpmI texlive-parallel-20200406-26.el9_2.noarch.rpmV texlive-powerdot-20200406-26.el9_2.noarch.rpmJ texlive-euler-20200406-26.el9_2.noarch.rpm] texlive-pst-arrow-20200406-26.el9_2.noarch.rpmZ texlive-fontawesome-20200406-26.el9_2.noarch.rpmf texlive-gettitlestring-20200406-26.el9_2.noarch.rpmm texlive-pxfonts-20200406-26.el9_2.noarch.rpma texlive-fp-20200406-26.el9_2.noarch.rpmE texlive-etex-pkg-20200406-26.el9_2.noarch.rpm. texlive-metalogo-20200406-26.el9_2.noarch.rpmK texlive-passivetex-20200406-26.el9_2.noarch.rpm texlive-texlive-scripts-20200406-26.el9_2.noarch.rpm texlive-latexbug-20200406-26.el9_2.noarch.rpm texlive-thumbpdf-20200406-26.el9_2.noarch.rpmQ texlive-fancyvrb-20200406-26.el9_2.noarch.rpm> texlive-xesearch-20200406-26.el9_2.noarch.rpm: texlive-multirow-20200406-26.el9_2.noarch.rpm? texlive-xetex-itrans-20200406-26.el9_2.noarch.rpm) texlive-mathpazo-20200406-26.el9_2.noarch.rpm& texlive-manfnt-font-20200406-26.el9_2.noarch.rpmy texlive-ifplatform-20200406-26.el9_2.noarch.rpm+ texlive-collection-htmlxml-20200406-26.el9_2.noarch.rpmL texlive-pdfcolmk-20200406-26.el9_2.noarch.rpm texlive-babel-english-20200406-26.el9_2.noarch.rpmS texlive-filehook-20200406-26.el9_2.noarch.rpmv texlive-sansmathaccent-20200406-26.el9_2.noarch.rpmM texlive-pdfescape-20200406-26.el9_2.noarch.rpm texlive-metapost-20200406-26.el9_2.x86_64.rpm texlive-bookman-20200406-26.el9_2.noarch.rpm` texlive-pst-eps-20200406-26.el9_2.noarch.rpmv texlive-alphalph-20200406-26.el9_2.noarch.rpm' texlive-cns-20200406-26.el9_2.noarch.rpm< texlive-enctex-20200406-26.el9_2.noarch.rpmP texlive-pdftexcmds-20200406-26.el9_2.noarch.rpm< texlive-xeindex-20200406-26.el9_2.noarch.rpm texlive-babel-20200406-26.el9_2.noarch.rpm! texlive-luaotfload-20200406-26.el9_2.noarch.rpm@ texlive-xetex-pstricks-20200406-26.el9_2.noarch.rpmA texlive-norasi-c90-20200406-26.el9_2.noarch.rpm7 texlive-currfile-20200406-26.el9_2.noarch.rpmh texlive-graphics-20200406-26.el9_2.noarch.rpm@ texlive-epstopdf-20200406-26.el9_2.noarch.rpm texlive-dvips-20200406-26.el9_2.x86_64.rpmN texlive-fancybox-20200406-26.el9_2.noarch.rpm= texlive-enumitem-20200406-26.el9_2.noarch.rpm texlive-l3kernel-20200406-26.el9_2.noarch.rpmQ texlive-pgf-20200406-26.el9_2.noarch.rpm? texlive-newfloat-20200406-26.el9_2.noarch.rpm\ texlive-pst-3d-20200406-26.el9_2.noarch.rpmG texlive-etoc-20200406-26.el9_2.noarch.rpmN texlive-zref-20200406-26.el9_2.noarch.rpm0 texlive-utopia-20200406-26.el9_2.noarch.rpm texlive-l3packages-20200406-26.el9_2.noarch.rpm= texlive-ncntrsbk-20200406-26.el9_2.noarch.rpmd texlive-pst-node-20200406-26.el9_2.noarch.rpm texlive-atbegshi-20200406-26.el9_2.noarch.rpm^ texlive-fontwrap-20200406-26.el9_2.noarch.rpm texlive-charter-20200406-26.el9_2.noarch.rpm texlive-latex-fonts-20200406-26.el9_2.noarch.rpmu texlive-hyphenat-20200406-26.el9_2.noarch.rpm? texlive-epsf-20200406-26.el9_2.noarch.rpm texlive-caption-20200406-26.el9_2.noarch.rpm6 texlive-mparhack-20200406-26.el9_2.noarch.rpm texlive-mfware-20200406-26.el9_2.x86_64.rpmB texlive-xetexconfig-20200406-26.el9_2.noarch.rpmI texlive-euenc-20200406-26.el9_2.noarch.rpm: texlive-ec-20200406-26.el9_2.noarch.rpm texlive-attachfile-20200406-26.el9_2.noarch.rpm" texlive-cm-20200406-26.el9_2.noarch.rpm} texlive-setspace-20200406-26.el9_2.noarch.rpmO texlive-pdfpages-20200406-26.el9_2.noarch.rpm` texlive-footnotehyper-20200406-26.el9_2.noarch.rpm texlive-texlive-common-doc-20200406-26.el9_2.noarch.rpm texlive-pdftex-20200406-26.el9_2.x86_64.rpmX texlive-psfrag-20200406-26.el9_2.noarch.rpmC texlive-eso-pic-20200406-26.el9_2.noarch.rpmZ texlive-psnfss-20200406-26.el9_2.noarch.rpm^ texlive-pst-blur-20200406-26.el9_2.noarch.rpmG texlive-xmltex-20200406-26.el9_2.noarch.rpmj texlive-graphics-def-20200406-26.el9_2.noarch.rpmY texlive-fncychap-20200406-26.el9_2.noarch.rpm texlive-babelbib-20200406-26.el9_2.noarch.rpm/ texlive-colorprofiles-20200406-26.el9_2.noarch.rpmr texlive-hyperref-20200406-26.el9_2.noarch.rpmw texlive-amscls-20200406-26.el9_2.noarch.rpm5 texlive-wasy-type1-20200406-26.el9_2.noarch.rpm$ texlive-cm-super-20200406-26.el9_2.noarch.rpmD texlive-etex-20200406-26.el9_2.noarch.rpmW texlive-preprint-20200406-26.el9_2.noarch.rpm texlive-cite-20200406-26.el9_2.noarch.rpm texlive-kpathsea-20200406-26.el9_2.x86_64.rpm) texlive-collection-basic-20200406-26.el9_2.noarch.rpmb texlive-fpl-20200406-26.el9_2.noarch.rpm% texlive-ucs-20200406-26.el9_2.noarch.rpm4 texlive-wasy-20200406-26.el9_2.noarch.rpm texlive-latex2man-20200406-26.el9_2.noarch.rpm texlive-catchfile-20200406-26.el9_2.noarch.rpmN texlive-pdflscape-20200406-26.el9_2.noarch.rpm texlive-bookmark-20200406-26.el9_2.noarch.rpm texlive-lm-20200406-26.el9_2.noarch.rpmb texlive-pst-grad-20200406-26.el9_2.noarch.rpm texlive-kvoptions-20200406-26.el9_2.noarch.rpms texlive-adjustbox-20200406-26.el9_2.noarch.rpm) texlive-unicode-data-20200406-26.el9_2.noarch.rpm2 texlive-microtype-20200406-26.el9_2.noarch.rpmi texlive-pst-tree-20200406-26.el9_2.noarch.rpm texlive-awesomebox-20200406-26.el9_2.noarch.rpm texlive-auxhook-20200406-26.el9_2.noarch.rpmH texlive-paralist-20200406-26.el9_2.noarch.rpm2 texlive-wadalab-20200406-26.el9_2.noarch.rpmh texlive-pst-tools-20200406-26.el9_2.noarch.rpms texlive-rerunfilecheck-20200406-26.el9_2.noarch.rpm6 texlive-ctablestack-20200406-26.el9_2.noarch.rpm texlive-breqn-20200406-26.el9_2.noarch.rpm texlive-dvipng-20200406-26.el9_2.x86_64.rpmg texlive-pst-text-20200406-26.el9_2.noarch.rpm texlive-kvsetkeys-20200406-26.el9_2.noarch.rpm texlive-stmaryrd-20200406-26.el9_2.noarch.rpmK texlive-euro-20200406-26.el9_2.noarch.rpm@ texlive-newunicodechar-20200406-26.el9_2.noarch.rpm4 texlive-csquotes-20200406-26.el9_2.noarch.rpm texlive-beamer-20200406-26.el9_2.noarch.rpm| texlive-sepnum-20200406-26.el9_2.noarch.rpmH texlive-etoolbox-20200406-26.el9_2.noarch.rpmy texlive-section-20200406-26.el9_2.noarch.rpmp texlive-rcs-20200406-26.el9_2.noarch.rpm[ texlive-pspicture-20200406-26.el9_2.noarch.rpmz texlive-iftex-20200406-26.el9_2.noarch.rpmx texlive-scheme-basic-20200406-26.el9_2.noarch.rpm( texlive-underscore-20200406-26.el9_2.noarch.rpm texlive-luahbtex-20200406-26.el9_2.x86_64.rpm texlive-letltxmacro-20200406-26.el9_2.noarch.rpm{ texlive-seminar-20200406-26.el9_2.noarch.rpmR texlive-filecontents-20200406-26.el9_2.noarch.rpm5 texlive-ctable-20200406-26.el9_2.noarch.rpm* texlive-collection-fontsrecommended-20200406-26.el9_2.noarch.rpm1 texlive-varwidth-20200406-26.el9_2.noarch.rpm$ texlive-ucharclasses-20200406-26.el9_2.noarch.rpm texlive-tex4ht-20200406-26.el9_2.x86_64.rpmU texlive-fix2col-20200406-26.el9_2.noarch.rpm texlive-cjk-20200406-26.el9_2.noarch.rpm texlive-lua-alt-getopt-20200406-26.el9_2.noarch.rpmU texlive-polyglossia-20200406-26.el9_2.noarch.rpmc texlive-pst-math-20200406-26.el9_2.noarch.rpm texlive-bibtopic-20200406-26.el9_2.noarch.rpm% texlive-makecmds-20200406-26.el9_2.noarch.rpm texlive-bigintcalc-20200406-26.el9_2.noarch.rpm# texlive-ucharcat-20200406-26.el9_2.noarch.rpmj texlive-pstricks-20200406-26.el9_2.noarch.rpm" texlive-luatex85-20200406-26.el9_2.noarch.rpm$ texlive-lwarp-20200406-26.el9_2.noarch.rpm} texlive-arabxetex-20200406-26.el9_2.noarch.rpm3 texlive-minitoc-20200406-26.el9_2.noarch.rpmA texlive-epstopdf-pkg-20200406-26.el9_2.noarch.rpm texlive-changebar-20200406-26.el9_2.noarch.rpm6 texlive-wasysym-20200406-26.el9_2.noarch.rpm; texlive-xecyr-20200406-26.el9_2.noarch.rpm( texlive-collectbox-20200406-26.el9_2.noarch.rpma texlive-pst-fill-20200406-26.el9_2.noarch.rpm& texlive-cmextra-20200406-26.el9_2.noarch.rpm texlive-bidi-20200406-26.el9_2.noarch.rpmM texlive-zapfding-20200406-26.el9_2.noarch.rpm> texlive-environ-20200406-26.el9_2.noarch.rpmw texlive-sauerj-20200406-26.el9_2.noarch.rpm= texlive-xepersian-20200406-26.el9_2.noarch.rpm texlive-jknapltx-20200406-26.el9_2.noarch.rpm texlive-xetex-20200406-26.el9_2.x86_64.rpmI texlive-xstring-20200406-26.el9_2.noarch.rpm texlive-beton-20200406-26.el9_2.noarch.rpm. texlive-collection-xetex-20200406-26.el9_2.noarch.rpmt texlive-rsfs-20200406-26.el9_2.noarch.rpm texlive-tools-20200406-26.el9_2.noarch.rpmG texlive-palatino-20200406-26.el9_2.noarch.rpm texlive-tex-gyre-20200406-26.el9_2.noarch.rpm9 texlive-xecjk-20200406-26.el9_2.noarch.rpml texlive-ptext-20200406-26.el9_2.noarch.rpm texlive-lineno-20200406-26.el9_2.noarch.rpm2 texlive-courier-20200406-26.el9_2.noarch.rpm texlive-symbol-20200406-26.el9_2.noarch.rpm texlive-dvisvgm-20200406-26.el9_2.x86_64.rpm texlive-listings-20200406-26.el9_2.noarch.rpmP texlive-fancyref-20200406-26.el9_2.noarch.rpmd texlive-garuda-c90-20200406-26.el9_2.noarch.rpm texlive-subfigure-20200406-26.el9_2.noarch.rpmi texlive-graphics-cfg-20200406-26.el9_2.noarch.rpm: texlive-xecolor-20200406-26.el9_2.noarch.rpm texlive-avantgar-20200406-26.el9_2.noarch.rpm texlive-tabu-20200406-26.el9_2.noarch.rpmw texlive-ifmtarg-20200406-26.el9_2.noarch.rpmu texlive-sansmath-20200406-26.el9_2.noarch.rpmn texlive-qstest-20200406-26.el9_2.noarch.rpm texlive-lastpage-20200406-26.el9_2.noarch.rpm3 texlive-crop-20200406-26.el9_2.noarch.rpm< texlive-ncctools-20200406-26.el9_2.noarch.rpm texlive-t2-20200406-26.el9_2.noarch.rpmA texlive-xetex-tibetan-20200406-26.el9_2.noarch.rpm/ texlive-url-20200406-26.el9_2.noarch.rpm texlive-fontware-20200406-26.el9_2.x86_64.rpm4 texlive-mnsymbol-20200406-26.el9_2.noarch.rpmL texlive-zapfchan-20200406-26.el9_2.noarch.rpm9 texlive-multido-20200406-26.el9_2.noarch.rpme texlive-lib-20200406-26.el9_2.i686.rpmX texlive-fmtcount-20200406-26.el9_2.noarch.rpmr texlive-refcount-20200406-26.el9_2.noarch.rpm- texlive-updmap-map-20200406-26.el9_2.noarch.rpm texlive-listofitems-20200406-26.el9_2.noarch.rpm texlive-attachfile2-20200406-26.el9_2.noarch.rpmt texlive-hyphen-base-20200406-26.el9_2.noarch.rpm texlive-dvipdfmx-20200406-26.el9_2.x86_64.rpmk texlive-grfext-20200406-26.el9_2.noarch.rpm texlive-titlesec-20200406-26.el9_2.noarch.rpmE texlive-obsolete-20200406-26.el9_2.noarch.rpm texlive-stringenc-20200406-26.el9_2.noarch.rpm7 texlive-wrapfig-20200406-26.el9_2.noarch.rpm, texlive-mdwtools-20200406-26.el9_2.noarch.rpmK texlive-xunicode-20200406-26.el9_2.noarch.rpm[ texlive-fontbook-20200406-26.el9_2.noarch.rpmF texlive-xltxtra-20200406-26.el9_2.noarch.rpmT texlive-finstrut-20200406-26.el9_2.noarch.rpmF texlive-overpic-20200406-26.el9_2.noarch.rpm texlive-base-20200406-26.el9_2.noarch.rpm" texlive-typehtml-20200406-26.el9_2.noarch.rpm texlive-lualibs-20200406-26.el9_2.noarch.rpm texlive-lm-math-20200406-26.el9_2.noarch.rpm~ texlive-intcalc-20200406-26.el9_2.noarch.rpm texlive-chngcntr-20200406-26.el9_2.noarch.rpm texlive-texlive-msg-translations-20200406-26.el9_2.noarch.rpm1 texlive-mfnfss-20200406-26.el9_2.noarch.rpm texlive-ltxmisc-20200406-26.el9_2.noarch.rpm texlive-trimspaces-20200406-26.el9_2.noarch.rpm texlive-lettrine-20200406-26.el9_2.noarch.rpm texlive-textcase-20200406-26.el9_2.noarch.rpmg texlive-glyphlist-20200406-26.el9_2.noarch.rpmu texlive-algorithms-20200406-26.el9_2.noarch.rpm\ texlive-fonts-tlwg-20200406-26.el9_2.noarch.rpmk texlive-pstricks-add-20200406-26.el9_2.noarch.rpm% texlive-cmap-20200406-26.el9_2.noarch.rpm texlive-carlisle-20200406-26.el9_2.noarch.rpm texlive-tex-20200406-26.el9_2.x86_64.rpm texlive-translator-20200406-26.el9_2.noarch.rpmq texlive-hycolor-20200406-26.el9_2.noarch.rpm' texlive-marginnote-20200406-26.el9_2.noarch.rpmC texlive-ntgclass-20200406-26.el9_2.noarch.rpmc texlive-framed-20200406-26.el9_2.noarch.rpm- texlive-memoir-20200406-26.el9_2.noarch.rpm~ texlive-arphic-20200406-26.el9_2.noarch.rpme texlive-geometry-20200406-26.el9_2.noarch.rpmJ texlive-xtab-20200406-26.el9_2.noarch.rpm+ texlive-uniquecounter-20200406-26.el9_2.noarch.rpm texlive-knuth-lib-20200406-26.el9_2.noarch.rpm texlive-l3experimental-20200406-26.el9_2.noarch.rpmD texlive-oberdiek-20200406-26.el9_2.noarch.rpmL texlive-eurosym-20200406-26.el9_2.noarch.rpm texlive-gsftopk-20200406-26.el9_2.x86_64.rpm texlive-kerkis-20200406-26.el9_2.noarch.rpme texlive-pst-plot-20200406-26.el9_2.noarch.rpm texlive-20200406-26.el9_2.x86_64.rpm texlive-bibtex-20200406-26.el9_2.x86_64.rpm! texlive-type1cm-20200406-26.el9_2.noarch.rpm, texlive-collection-latex-20200406-26.el9_2.noarch.rpm texlive-ltxcmds-20200406-26.el9_2.noarch.rpmT texlive-plain-20200406-26.el9_2.noarch.rpm| texlive-index-20200406-26.el9_2.noarch.rpmY texlive-pslatex-20200406-26.el9_2.noarch.rpm# texlive-luatexbase-20200406-26.el9_2.noarch.rpm texlive-stackengine-20200406-26.el9_2.noarch.rpmt texlive-ae-20200406-26.el9_2.noarch.rpm texlive-ltabptch-20200406-26.el9_2.noarch.rpmW texlive-float-20200406-26.el9_2.noarch.rpm& texlive-uhc-20200406-26.el9_2.noarch.rpm texlive-bitset-20200406-26.el9_2.noarch.rpm; texlive-natbib-20200406-26.el9_2.noarch.rpm texlive-metafont-20200406-26.el9_2.x86_64.rpmz texlive-anyfontsize-20200406-26.el9_2.noarch.rpm texlive-texlive-scripts-extra-20200406-26.el9_2.noarch.rpmx texlive-ifoddpage-20200406-26.el9_2.noarch.rpmF texlive-etexcmds-20200406-26.el9_2.noarch.rpm; texlive-eepic-20200406-26.el9_2.noarch.rpm] texlive-fontspec-20200406-26.el9_2.noarch.rpm, texlive-unisugar-20200406-26.el9_2.noarch.rpmE texlive-xkeyval-20200406-26.el9_2.noarch.rpm3 texlive-was-20200406-26.el9_2.noarch.rpm9 texlive-dehyph-20200406-26.el9_2.noarch.rpm* texlive-unicode-math-20200406-26.el9_2.noarch.rpm texlive-lualatex-math-20200406-26.el9_2.noarch.rpm texlive-bera-20200406-26.el9_2.noarch.rpm texlive-breakurl-20200406-26.el9_2.noarch.rpm8 texlive-xcolor-20200406-26.el9_2.noarch.rpm texlive-subfig-20200406-26.el9_2.noarch.rpm texlive-latexconfig-20200406-26.el9_2.noarch.rpmS texlive-placeins-20200406-26.el9_2.noarch.rpm texlive-tipa-20200406-26.el9_2.noarch.rpml texlive-grffile-20200406-26.el9_2.noarch.rpm texlive-capt-of-20200406-26.el9_2.noarch.rpm texlive-changepage-20200406-26.el9_2.noarch.rpmJ texlive-parskip-20200406-26.el9_2.noarch.rpmr# texlive-cm-lgc-20200406-26.el9_2.noarch.rpm texlive-tex-ini-files-20200406-26.el9_2.noarch.rpm texlive-texlive.infra-20200406-26.el9_2.noarch.rpm texlive-soul-20200406-26.el9_2.noarch.rpm0 texlive-colortbl-20200406-26.el9_2.noarch.rpm texlive-textpos-20200406-26.el9_2.noarch.rpm( texlive-marvosym-20200406-26.el9_2.noarch.rpm texlive-tex-gyre-math-20200406-26.el9_2.noarch.rpm texlive-jadetex-20200406-26.el9_2.noarch.rpmO texlive-fancyhdr-20200406-26.el9_2.noarch.rpm* texlive-mathspec-20200406-26.el9_2.noarch.rpm texlive-koma-script-20200406-26.el9_2.noarch.rpm' texlive-ulem-20200406-26.el9_2.noarch.rpm texlive-makeindex-20200406-26.el9_2.x86_64.rpmz texlive-sectsty-20200406-26.el9_2.noarch.rpm7 texlive-mptopdf-20200406-26.el9_2.noarch.rpm} texlive-infwarerr-20200406-26.el9_2.noarch.rpmn texlive-helvetic-20200406-26.el9_2.noarch.rpm texlive-svn-prov-20200406-26.el9_2.noarch.rpm_ texlive-pst-coil-20200406-26.el9_2.noarch.rpm texlive-threeparttable-20200406-26.el9_2.noarch.rpm texlive-tabulary-20200406-26.el9_2.noarch.rpmV texlive-fixlatvian-20200406-26.el9_2.noarch.rpm_ texlive-footmisc-20200406-26.el9_2.noarch.rpm{ texlive-import-20200406-26.el9_2.noarch.rpm texlive-titling-20200406-26.el9_2.noarch.rpmp texlive-hologo-20200406-26.el9_2.noarch.rpm> texlive-needspace-20200406-26.el9_2.noarch.rpm0 texlive-mflogo-font-20200406-26.el9_2.noarch.rpms texlive-hyph-utf8-20200406-26.el9_2.noarch.rpm texlive-knuth-local-20200406-26.el9_2.noarch.rpm texlive-txfonts-20200406-26.el9_2.noarch.rpmo texlive-ragged2e-20200406-26.el9_2.noarch.rpmo texlive-hobsub-20200406-26.el9_2.noarch.rpm~ texlive-showexpl-20200406-26.el9_2.noarch.rpmD texlive-xifthen-20200406-26.el9_2.noarch.rpm texlive-latex-20200406-26.el9_2.noarch.rpm texlive-linegoal-20200406-26.el9_2.noarch.rpm1 texlive-context-20200406-26.el9_2.noarch.rpm texlive-luatex-20200406-26.el9_2.x86_64.rpm| texlive-appendix-20200406-26.el9_2.noarch.rpmB texlive-eqparbox-20200406-26.el9_2.noarch.rpmq texlive-realscripts-20200406-26.el9_2.noarch.rpm texlive-tocloft-20200406-26.el9_2.noarch.rpm- texlive-collection-latexrecommended-20200406-26.el9_2.noarch.rpm texlive-l3backend-20200406-26.el9_2.noarch.rpmx texlive-amsfonts-20200406-26.el9_2.noarch.rpmf texlive-pst-slpe-20200406-26.el9_2.noarch.rpm5 texlive-modes-20200406-26.el9_2.noarch.rpmR texlive-philokalia-20200406-26.el9_2.noarch.rpm8 texlive-ms-20200406-26.el9_2.noarch.rpm texlive-xdvi-20200406-26.el9_2.x86_64.rpmB texlive-notoccite-20200406-26.el9_2.noarch.rpm texlive-texlive-docindex-20200406-26.el9_2.noarch.rpme texlive-lib-20200406-26.el9_2.x86_64.rpm+ texlive-mathtools-20200406-26.el9_2.noarch.rpm{ texlive-anysize-20200406-26.el9_2.noarch.rpm! texlive-classpack-20200406-26.el9_2.noarch.rpmm texlive-hanging-20200406-26.el9_2.noarch.rpmH texlive-xmltexconfig-20200406-26.el9_2.noarch.rpm/ texlive-mflogo-20200406-26.el9_2.noarch.rpm. texlive-upquote-20200406-26.el9_2.noarch.rpm texlive-kastrup-20200406-26.el9_2.noarch.rpmv texlive-hyphenex-20200406-26.el9_2.noarch.rpmM texlive-extsizes-20200406-26.el9_2.noarch.rpm texlive-kvdefinekeys-20200406-26.el9_2.noarch.rpm texlive-booktabs-20200406-26.el9_2.noarch.rpmy texlive-amsmath-20200406-26.el9_2.noarch.rpmC texlive-xetexfontinfo-20200406-26.el9_2.noarch.rpm texlive-times-20200406-26.el9_2.noarch.rpm texlive-texlive-en-20200406-26.el9_2.noarch.rpm8 texlive-datetime-20200406-26.el9_2.noarch.rpm texlive-atveryend-20200406-26.el9_2.noarch.rpm texlive-bigfoot-20200406-26.el9_2.noarch.rpmI texlive-parallel-20200406-26.el9_2.noarch.rpmV texlive-powerdot-20200406-26.el9_2.noarch.rpmJ texlive-euler-20200406-26.el9_2.noarch.rpm] texlive-pst-arrow-20200406-26.el9_2.noarch.rpmZ texlive-fontawesome-20200406-26.el9_2.noarch.rpmf texlive-gettitlestring-20200406-26.el9_2.noarch.rpmm texlive-pxfonts-20200406-26.el9_2.noarch.rpma texlive-fp-20200406-26.el9_2.noarch.rpmE texlive-etex-pkg-20200406-26.el9_2.noarch.rpm. texlive-metalogo-20200406-26.el9_2.noarch.rpmK texlive-passivetex-20200406-26.el9_2.noarch.rpm texlive-texlive-scripts-20200406-26.el9_2.noarch.rpm texlive-latexbug-20200406-26.el9_2.noarch.rpm texlive-thumbpdf-20200406-26.el9_2.noarch.rpmQ texlive-fancyvrb-20200406-26.el9_2.noarch.rpm> texlive-xesearch-20200406-26.el9_2.noarch.rpm: texlive-multirow-20200406-26.el9_2.noarch.rpm? texlive-xetex-itrans-20200406-26.el9_2.noarch.rpm) texlive-mathpazo-20200406-26.el9_2.noarch.rpm& texlive-manfnt-font-20200406-26.el9_2.noarch.rpmy texlive-ifplatform-20200406-26.el9_2.noarch.rpm+ texlive-collection-htmlxml-20200406-26.el9_2.noarch.rpmL texlive-pdfcolmk-20200406-26.el9_2.noarch.rpm texlive-babel-english-20200406-26.el9_2.noarch.rpmS texlive-filehook-20200406-26.el9_2.noarch.rpmv texlive-sansmathaccent-20200406-26.el9_2.noarch.rpmM texlive-pdfescape-20200406-26.el9_2.noarch.rpm texlive-metapost-20200406-26.el9_2.x86_64.rpm texlive-bookman-20200406-26.el9_2.noarch.rpm` texlive-pst-eps-20200406-26.el9_2.noarch.rpmv texlive-alphalph-20200406-26.el9_2.noarch.rpm' texlive-cns-20200406-26.el9_2.noarch.rpm< texlive-enctex-20200406-26.el9_2.noarch.rpmP texlive-pdftexcmds-20200406-26.el9_2.noarch.rpm< texlive-xeindex-20200406-26.el9_2.noarch.rpm texlive-babel-20200406-26.el9_2.noarch.rpm! texlive-luaotfload-20200406-26.el9_2.noarch.rpm@ texlive-xetex-pstricks-20200406-26.el9_2.noarch.rpmA texlive-norasi-c90-20200406-26.el9_2.noarch.rpm7 texlive-currfile-20200406-26.el9_2.noarch.rpmh texlive-graphics-20200406-26.el9_2.noarch.rpm@ texlive-epstopdf-20200406-26.el9_2.noarch.rpm texlive-dvips-20200406-26.el9_2.x86_64.rpmN texlive-fancybox-20200406-26.el9_2.noarch.rpm= texlive-enumitem-20200406-26.el9_2.noarch.rpm texlive-l3kernel-20200406-26.el9_2.noarch.rpmQ texlive-pgf-20200406-26.el9_2.noarch.rpm? texlive-newfloat-20200406-26.el9_2.noarch.rpm\ texlive-pst-3d-20200406-26.el9_2.noarch.rpmG texlive-etoc-20200406-26.el9_2.noarch.rpmN texlive-zref-20200406-26.el9_2.noarch.rpm0 texlive-utopia-20200406-26.el9_2.noarch.rpm texlive-l3packages-20200406-26.el9_2.noarch.rpm= texlive-ncntrsbk-20200406-26.el9_2.noarch.rpmd texlive-pst-node-20200406-26.el9_2.noarch.rpm texlive-atbegshi-20200406-26.el9_2.noarch.rpm^ texlive-fontwrap-20200406-26.el9_2.noarch.rpm texlive-charter-20200406-26.el9_2.noarch.rpm texlive-latex-fonts-20200406-26.el9_2.noarch.rpmu texlive-hyphenat-20200406-26.el9_2.noarch.rpm? texlive-epsf-20200406-26.el9_2.noarch.rpm texlive-caption-20200406-26.el9_2.noarch.rpm6 texlive-mparhack-20200406-26.el9_2.noarch.rpm texlive-mfware-20200406-26.el9_2.x86_64.rpmB texlive-xetexconfig-20200406-26.el9_2.noarch.rpmI texlive-euenc-20200406-26.el9_2.noarch.rpm: texlive-ec-20200406-26.el9_2.noarch.rpm texlive-attachfile-20200406-26.el9_2.noarch.rpm" texlive-cm-20200406-26.el9_2.noarch.rpm} texlive-setspace-20200406-26.el9_2.noarch.rpmO texlive-pdfpages-20200406-26.el9_2.noarch.rpm` texlive-footnotehyper-20200406-26.el9_2.noarch.rpm texlive-texlive-common-doc-20200406-26.el9_2.noarch.rpm texlive-pdftex-20200406-26.el9_2.x86_64.rpmX texlive-psfrag-20200406-26.el9_2.noarch.rpmC texlive-eso-pic-20200406-26.el9_2.noarch.rpmZ texlive-psnfss-20200406-26.el9_2.noarch.rpm^ texlive-pst-blur-20200406-26.el9_2.noarch.rpmG texlive-xmltex-20200406-26.el9_2.noarch.rpmj texlive-graphics-def-20200406-26.el9_2.noarch.rpmY texlive-fncychap-20200406-26.el9_2.noarch.rpm texlive-babelbib-20200406-26.el9_2.noarch.rpm/ texlive-colorprofiles-20200406-26.el9_2.noarch.rpmr texlive-hyperref-20200406-26.el9_2.noarch.rpmw texlive-amscls-20200406-26.el9_2.noarch.rpm5 texlive-wasy-type1-20200406-26.el9_2.noarch.rpm$ texlive-cm-super-20200406-26.el9_2.noarch.rpmD texlive-etex-20200406-26.el9_2.noarch.rpmW texlive-preprint-20200406-26.el9_2.noarch.rpm texlive-cite-20200406-26.el9_2.noarch.rpm texlive-kpathsea-20200406-26.el9_2.x86_64.rpm) texlive-collection-basic-20200406-26.el9_2.noarch.rpmb texlive-fpl-20200406-26.el9_2.noarch.rpm% texlive-ucs-20200406-26.el9_2.noarch.rpm4 texlive-wasy-20200406-26.el9_2.noarch.rpm texlive-latex2man-20200406-26.el9_2.noarch.rpm texlive-catchfile-20200406-26.el9_2.noarch.rpmN texlive-pdflscape-20200406-26.el9_2.noarch.rpm texlive-bookmark-20200406-26.el9_2.noarch.rpm texlive-lm-20200406-26.el9_2.noarch.rpmb texlive-pst-grad-20200406-26.el9_2.noarch.rpm texlive-kvoptions-20200406-26.el9_2.noarch.rpms texlive-adjustbox-20200406-26.el9_2.noarch.rpm) texlive-unicode-data-20200406-26.el9_2.noarch.rpm2 texlive-microtype-20200406-26.el9_2.noarch.rpmi texlive-pst-tree-20200406-26.el9_2.noarch.rpm texlive-awesomebox-20200406-26.el9_2.noarch.rpm texlive-auxhook-20200406-26.el9_2.noarch.rpmH texlive-paralist-20200406-26.el9_2.noarch.rpm2 texlive-wadalab-20200406-26.el9_2.noarch.rpmh texlive-pst-tools-20200406-26.el9_2.noarch.rpms texlive-rerunfilecheck-20200406-26.el9_2.noarch.rpm6 texlive-ctablestack-20200406-26.el9_2.noarch.rpm texlive-breqn-20200406-26.el9_2.noarch.rpm texlive-dvipng-20200406-26.el9_2.x86_64.rpmg texlive-pst-text-20200406-26.el9_2.noarch.rpm texlive-kvsetkeys-20200406-26.el9_2.noarch.rpm texlive-stmaryrd-20200406-26.el9_2.noarch.rpmK texlive-euro-20200406-26.el9_2.noarch.rpm@ texlive-newunicodechar-20200406-26.el9_2.noarch.rpm4 texlive-csquotes-20200406-26.el9_2.noarch.rpm texlive-beamer-20200406-26.el9_2.noarch.rpm| texlive-sepnum-20200406-26.el9_2.noarch.rpmH texlive-etoolbox-20200406-26.el9_2.noarch.rpmy texlive-section-20200406-26.el9_2.noarch.rpmp texlive-rcs-20200406-26.el9_2.noarch.rpm[ texlive-pspicture-20200406-26.el9_2.noarch.rpmz texlive-iftex-20200406-26.el9_2.noarch.rpmx texlive-scheme-basic-20200406-26.el9_2.noarch.rpm( texlive-underscore-20200406-26.el9_2.noarch.rpm texlive-luahbtex-20200406-26.el9_2.x86_64.rpm texlive-letltxmacro-20200406-26.el9_2.noarch.rpm{ texlive-seminar-20200406-26.el9_2.noarch.rpmR texlive-filecontents-20200406-26.el9_2.noarch.rpm5 texlive-ctable-20200406-26.el9_2.noarch.rpm* texlive-collection-fontsrecommended-20200406-26.el9_2.noarch.rpm1 texlive-varwidth-20200406-26.el9_2.noarch.rpm$ texlive-ucharclasses-20200406-26.el9_2.noarch.rpm texlive-tex4ht-20200406-26.el9_2.x86_64.rpmU texlive-fix2col-20200406-26.el9_2.noarch.rpm texlive-cjk-20200406-26.el9_2.noarch.rpm texlive-lua-alt-getopt-20200406-26.el9_2.noarch.rpmU texlive-polyglossia-20200406-26.el9_2.noarch.rpmc texlive-pst-math-20200406-26.el9_2.noarch.rpm texlive-bibtopic-20200406-26.el9_2.noarch.rpm% texlive-makecmds-20200406-26.el9_2.noarch.rpm texlive-bigintcalc-20200406-26.el9_2.noarch.rpm# texlive-ucharcat-20200406-26.el9_2.noarch.rpmj texlive-pstricks-20200406-26.el9_2.noarch.rpm" texlive-luatex85-20200406-26.el9_2.noarch.rpm$ texlive-lwarp-20200406-26.el9_2.noarch.rpm} texlive-arabxetex-20200406-26.el9_2.noarch.rpm3 texlive-minitoc-20200406-26.el9_2.noarch.rpmA texlive-epstopdf-pkg-20200406-26.el9_2.noarch.rpm texlive-changebar-20200406-26.el9_2.noarch.rpm6 texlive-wasysym-20200406-26.el9_2.noarch.rpm; texlive-xecyr-20200406-26.el9_2.noarch.rpm( texlive-collectbox-20200406-26.el9_2.noarch.rpma texlive-pst-fill-20200406-26.el9_2.noarch.rpm& texlive-cmextra-20200406-26.el9_2.noarch.rpm texlive-bidi-20200406-26.el9_2.noarch.rpmM texlive-zapfding-20200406-26.el9_2.noarch.rpm> texlive-environ-20200406-26.el9_2.noarch.rpmw texlive-sauerj-20200406-26.el9_2.noarch.rpm= texlive-xepersian-20200406-26.el9_2.noarch.rpm texlive-jknapltx-20200406-26.el9_2.noarch.rpm texlive-xetex-20200406-26.el9_2.x86_64.rpmI texlive-xstring-20200406-26.el9_2.noarch.rpm texlive-beton-20200406-26.el9_2.noarch.rpm. texlive-collection-xetex-20200406-26.el9_2.noarch.rpmt texlive-rsfs-20200406-26.el9_2.noarch.rpm texlive-tools-20200406-26.el9_2.noarch.rpmG texlive-palatino-20200406-26.el9_2.noarch.rpm texlive-tex-gyre-20200406-26.el9_2.noarch.rpm9 texlive-xecjk-20200406-26.el9_2.noarch.rpml texlive-ptext-20200406-26.el9_2.noarch.rpm texlive-lineno-20200406-26.el9_2.noarch.rpm2 texlive-courier-20200406-26.el9_2.noarch.rpm texlive-symbol-20200406-26.el9_2.noarch.rpm texlive-dvisvgm-20200406-26.el9_2.x86_64.rpm texlive-listings-20200406-26.el9_2.noarch.rpmP texlive-fancyref-20200406-26.el9_2.noarch.rpmd texlive-garuda-c90-20200406-26.el9_2.noarch.rpm texlive-subfigure-20200406-26.el9_2.noarch.rpmi texlive-graphics-cfg-20200406-26.el9_2.noarch.rpm: texlive-xecolor-20200406-26.el9_2.noarch.rpm texlive-avantgar-20200406-26.el9_2.noarch.rpm texlive-tabu-20200406-26.el9_2.noarch.rpmw texlive-ifmtarg-20200406-26.el9_2.noarch.rpmu texlive-sansmath-20200406-26.el9_2.noarch.rpmn texlive-qstest-20200406-26.el9_2.noarch.rpm texlive-lastpage-20200406-26.el9_2.noarch.rpm3 texlive-crop-20200406-26.el9_2.noarch.rpm< texlive-ncctools-20200406-26.el9_2.noarch.rpm texlive-t2-20200406-26.el9_2.noarch.rpmA texlive-xetex-tibetan-20200406-26.el9_2.noarch.rpm/ texlive-url-20200406-26.el9_2.noarch.rpm texlive-fontware-20200406-26.el9_2.x86_64.rpm4 texlive-mnsymbol-20200406-26.el9_2.noarch.rpmL texlive-zapfchan-20200406-26.el9_2.noarch.rpm9 texlive-multido-20200406-26.el9_2.noarch.rpme texlive-lib-20200406-26.el9_2.i686.rpmX texlive-fmtcount-20200406-26.el9_2.noarch.rpmr texlive-refcount-20200406-26.el9_2.noarch.rpm- texlive-updmap-map-20200406-26.el9_2.noarch.rpm texlive-listofitems-20200406-26.el9_2.noarch.rpm texlive-attachfile2-20200406-26.el9_2.noarch.rpmt texlive-hyphen-base-20200406-26.el9_2.noarch.rpm texlive-dvipdfmx-20200406-26.el9_2.x86_64.rpmk texlive-grfext-20200406-26.el9_2.noarch.rpm texlive-titlesec-20200406-26.el9_2.noarch.rpmE texlive-obsolete-20200406-26.el9_2.noarch.rpm texlive-stringenc-20200406-26.el9_2.noarch.rpm7 texlive-wrapfig-20200406-26.el9_2.noarch.rpm, texlive-mdwtools-20200406-26.el9_2.noarch.rpmK texlive-xunicode-20200406-26.el9_2.noarch.rpm[ texlive-fontbook-20200406-26.el9_2.noarch.rpmF texlive-xltxtra-20200406-26.el9_2.noarch.rpmT texlive-finstrut-20200406-26.el9_2.noarch.rpmF texlive-overpic-20200406-26.el9_2.noarch.rpm texlive-base-20200406-26.el9_2.noarch.rpm" texlive-typehtml-20200406-26.el9_2.noarch.rpm texlive-lualibs-20200406-26.el9_2.noarch.rpm texlive-lm-math-20200406-26.el9_2.noarch.rpm~ texlive-intcalc-20200406-26.el9_2.noarch.rpm texlive-chngcntr-20200406-26.el9_2.noarch.rpm texlive-texlive-msg-translations-20200406-26.el9_2.noarch.rpm1 texlive-mfnfss-20200406-26.el9_2.noarch.rpm texlive-ltxmisc-20200406-26.el9_2.noarch.rpm texlive-trimspaces-20200406-26.el9_2.noarch.rpm texlive-lettrine-20200406-26.el9_2.noarch.rpm texlive-textcase-20200406-26.el9_2.noarch.rpmg texlive-glyphlist-20200406-26.el9_2.noarch.rpmu texlive-algorithms-20200406-26.el9_2.noarch.rpm\ texlive-fonts-tlwg-20200406-26.el9_2.noarch.rpmk texlive-pstricks-add-20200406-26.el9_2.noarch.rpm% texlive-cmap-20200406-26.el9_2.noarch.rpm texlive-carlisle-20200406-26.el9_2.noarch.rpm texlive-tex-20200406-26.el9_2.x86_64.rpm texlive-translator-20200406-26.el9_2.noarch.rpmq texlive-hycolor-20200406-26.el9_2.noarch.rpm' texlive-marginnote-20200406-26.el9_2.noarch.rpmC texlive-ntgclass-20200406-26.el9_2.noarch.rpmc texlive-framed-20200406-26.el9_2.noarch.rpm- texlive-memoir-20200406-26.el9_2.noarch.rpm~ texlive-arphic-20200406-26.el9_2.noarch.rpme texlive-geometry-20200406-26.el9_2.noarch.rpmJ texlive-xtab-20200406-26.el9_2.noarch.rpm+ texlive-uniquecounter-20200406-26.el9_2.noarch.rpm texlive-knuth-lib-20200406-26.el9_2.noarch.rpm texlive-l3experimental-20200406-26.el9_2.noarch.rpmD texlive-oberdiek-20200406-26.el9_2.noarch.rpmL texlive-eurosym-20200406-26.el9_2.noarch.rpm texlive-gsftopk-20200406-26.el9_2.x86_64.rpm texlive-kerkis-20200406-26.el9_2.noarch.rpme texlive-pst-plot-20200406-26.el9_2.noarch.rpm texlive-20200406-26.el9_2.x86_64.rpm texlive-bibtex-20200406-26.el9_2.x86_64.rpm! texlive-type1cm-20200406-26.el9_2.noarch.rpm, texlive-collection-latex-20200406-26.el9_2.noarch.rpm texlive-ltxcmds-20200406-26.el9_2.noarch.rpmT texlive-plain-20200406-26.el9_2.noarch.rpm| texlive-index-20200406-26.el9_2.noarch.rpmY texlive-pslatex-20200406-26.el9_2.noarch.rpm# texlive-luatexbase-20200406-26.el9_2.noarch.rpm texlive-stackengine-20200406-26.el9_2.noarch.rpmt texlive-ae-20200406-26.el9_2.noarch.rpm texlive-ltabptch-20200406-26.el9_2.noarch.rpmW texlive-float-20200406-26.el9_2.noarch.rpm& texlive-uhc-20200406-26.el9_2.noarch.rpm texlive-bitset-20200406-26.el9_2.noarch.rpm; texlive-natbib-20200406-26.el9_2.noarch.rpm texlive-metafont-20200406-26.el9_2.x86_64.rpmz texlive-anyfontsize-20200406-26.el9_2.noarch.rpm texlive-texlive-scripts-extra-20200406-26.el9_2.noarch.rpmx texlive-ifoddpage-20200406-26.el9_2.noarch.rpmF texlive-etexcmds-20200406-26.el9_2.noarch.rpm; texlive-eepic-20200406-26.el9_2.noarch.rpm] texlive-fontspec-20200406-26.el9_2.noarch.rpm, texlive-unisugar-20200406-26.el9_2.noarch.rpmE texlive-xkeyval-20200406-26.el9_2.noarch.rpm3 texlive-was-20200406-26.el9_2.noarch.rpm9 texlive-dehyph-20200406-26.el9_2.noarch.rpm* texlive-unicode-math-20200406-26.el9_2.noarch.rpm texlive-lualatex-math-20200406-26.el9_2.noarch.rpm texlive-bera-20200406-26.el9_2.noarch.rpm texlive-breakurl-20200406-26.el9_2.noarch.rpm8 texlive-xcolor-20200406-26.el9_2.noarch.rpm texlive-subfig-20200406-26.el9_2.noarch.rpm texlive-latexconfig-20200406-26.el9_2.noarch.rpmS texlive-placeins-20200406-26.el9_2.noarch.rpm texlive-tipa-20200406-26.el9_2.noarch.rpml texlive-grffile-20200406-26.el9_2.noarch.rpm texlive-capt-of-20200406-26.el9_2.noarch.rpm texlive-changepage-20200406-26.el9_2.noarch.rpmJ texlive-parskip-20200406-26.el9_2.noarch.rpm: 1kBBBBsecurityModerate: libtiff security updatephttps://access.redhat.com/errata/RHSA-2023:3711RHSA-2023:3711RHSA-2023:3711 https://access.redhat.com/security/cve/CVE-2022-48281CVE-2022-48281CVE-2022-48281https://access.redhat.com/security/cve/CVE-2023-0795CVE-2023-0795CVE-2023-0795https://access.redhat.com/security/cve/CVE-2023-0796CVE-2023-0796CVE-2023-0796https://access.redhat.com/security/cve/CVE-2023-0797CVE-2023-0797CVE-2023-0797https://access.redhat.com/security/cve/CVE-2023-0798CVE-2023-0798CVE-2023-0798https://access.redhat.com/security/cve/CVE-2023-0799CVE-2023-0799CVE-2023-0799https://access.redhat.com/security/cve/CVE-2023-0800CVE-2023-0800CVE-2023-0800https://access.redhat.com/security/cve/CVE-2023-0801CVE-2023-0801CVE-2023-0801https://access.redhat.com/security/cve/CVE-2023-0802CVE-2023-0802CVE-2023-0802https://access.redhat.com/security/cve/CVE-2023-0803CVE-2023-0803CVE-2023-0803https://access.redhat.com/security/cve/CVE-2023-0804CVE-2023-0804CVE-2023-0804https://bugzilla.redhat.com/21636062163606https://bugzilla.redhat.com/21701192170119https://bugzilla.redhat.com/21701462170146https://bugzilla.redhat.com/21701512170151https://bugzilla.redhat.com/21701572170157https://bugzilla.redhat.com/21701622170162https://bugzilla.redhat.com/21701672170167https://bugzilla.redhat.com/21701722170172https://bugzilla.redhat.com/21701782170178https://bugzilla.redhat.com/21701872170187https://bugzilla.redhat.com/21701922170192https://errata.almalinux.org/9/ALSA-2023-3711.htmlALSA-2023:3711ALSA-2023:3711 g6libtiff-4.4.0-8.el9_2.i686.rpmh6libtiff-devel-4.4.0-8.el9_2.i686.rpmh6libtiff-devel-4.4.0-8.el9_2.x86_64.rpmg6libtiff-4.4.0-8.el9_2.x86_64.rpmg6libtiff-4.4.0-8.el9_2.i686.rpmh6libtiff-devel-4.4.0-8.el9_2.i686.rpmh6libtiff-devel-4.4.0-8.el9_2.x86_64.rpmg6libtiff-4.4.0-8.el9_2.x86_64.rpmk rBBBBBBBBBBBBBBsecurityModerate: postgresql security updateShttps://access.redhat.com/errata/RHSA-2023:3714RHSA-2023:3714RHSA-2023:3714 https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-3714.htmlALSA-2023:3714ALSA-2023:3714 'rpostgresql-server-13.11-1.el9_2.x86_64.rpm&rpostgresql-private-libs-13.11-1.el9_2.x86_64.rpm#rpostgresql-plperl-13.11-1.el9_2.x86_64.rpm_rpostgresql-13.11-1.el9_2.x86_64.rpm%rpostgresql-pltcl-13.11-1.el9_2.x86_64.rpm"rpostgresql-contrib-13.11-1.el9_2.x86_64.rpm(rpostgresql-upgrade-13.11-1.el9_2.x86_64.rpm$rpostgresql-plpython3-13.11-1.el9_2.x86_64.rpm'rpostgresql-server-13.11-1.el9_2.x86_64.rpm&rpostgresql-private-libs-13.11-1.el9_2.x86_64.rpm#rpostgresql-plperl-13.11-1.el9_2.x86_64.rpm_rpostgresql-13.11-1.el9_2.x86_64.rpm%rpostgresql-pltcl-13.11-1.el9_2.x86_64.rpm"rpostgresql-contrib-13.11-1.el9_2.x86_64.rpm(rpostgresql-upgrade-13.11-1.el9_2.x86_64.rpm$rpostgresql-plpython3-13.11-1.el9_2.x86_64.rpm /CBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security updateZ}https://access.redhat.com/errata/RHSA-2023:3715RHSA-2023:3715RHSA-2023:3715 https://access.redhat.com/security/cve/CVE-2023-2700CVE-2023-2700CVE-2023-2700https://bugzilla.redhat.com/22036532203653https://errata.almalinux.org/9/ALSA-2023-3715.htmlALSA-2023:3715ALSA-2023:3715 Plibvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpm Plibvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpm Plibvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-client-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-nss-9.0.0-10.2.el9_2.x86_64.rpm Plibvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-libs-9.0.0-10.2.el9_2.x86_64.rpm Plibvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpm Plibvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpm Plibvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpm Plibvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-client-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-nss-9.0.0-10.2.el9_2.x86_64.rpm Plibvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-libs-9.0.0-10.2.el9_2.x86_64.rpm Plibvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpmPlibvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpm Plibvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpm 5pBBBsecurityModerate: openssl security and bug fix updateWV https://access.redhat.com/errata/RHSA-2023:3722RHSA-2023:3722RHSA-2023:3722 https://access.redhat.com/security/cve/CVE-2023-0464CVE-2023-0464CVE-2023-0464https://access.redhat.com/security/cve/CVE-2023-0465CVE-2023-0465CVE-2023-0465https://access.redhat.com/security/cve/CVE-2023-0466CVE-2023-0466CVE-2023-0466https://access.redhat.com/security/cve/CVE-2023-1255CVE-2023-1255CVE-2023-1255https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/21810822181082https://bugzilla.redhat.com/21825612182561https://bugzilla.redhat.com/21825652182565https://bugzilla.redhat.com/21884612188461https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-3722.htmlALSA-2023:3722ALSA-2023:3722  `openssl-devel-3.0.7-16.el9_2.x86_64.rpm `openssl-devel-3.0.7-16.el9_2.i686.rpmJ`openssl-perl-3.0.7-16.el9_2.x86_64.rpm `openssl-devel-3.0.7-16.el9_2.x86_64.rpm `openssl-devel-3.0.7-16.el9_2.i686.rpmJ`openssl-perl-3.0.7-16.el9_2.x86_64.rpm{ vBBBBBBBBBBsecurityImportant: kernel security and bug fix update-https://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723 https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723 % perf-5.14.0-284.18.1.el9_2.x86_64.rpm" kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm' rtla-5.14.0-284.18.1.el9_2.x86_64.rpm$ kernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm# kernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm! kernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpm% perf-5.14.0-284.18.1.el9_2.x86_64.rpm" kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm' rtla-5.14.0-284.18.1.el9_2.x86_64.rpm$ kernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm# kernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm! kernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpmY CBBBBBBBBBBsecurityCritical: go-toolset and golang security update|;x https://access.redhat.com/errata/RHSA-2023:3923RHSA-2023:3923RHSA-2023:3923 https://access.redhat.com/security/cve/CVE-2023-29402CVE-2023-29402CVE-2023-29402https://access.redhat.com/security/cve/CVE-2023-29403CVE-2023-29403CVE-2023-29403https://access.redhat.com/security/cve/CVE-2023-29404CVE-2023-29404CVE-2023-29404https://access.redhat.com/security/cve/CVE-2023-29405CVE-2023-29405CVE-2023-29405https://bugzilla.redhat.com/22169652216965https://bugzilla.redhat.com/22175622217562https://bugzilla.redhat.com/22175652217565https://bugzilla.redhat.com/22175692217569https://errata.almalinux.org/9/ALSA-2023-3923.htmlALSA-2023:3923ALSA-2023:3923 Rgolang-tests-1.19.10-1.el9_2.noarch.rpmRgolang-docs-1.19.10-1.el9_2.noarch.rpm@Rgolang-bin-1.19.10-1.el9_2.x86_64.rpm?Rgolang-1.19.10-1.el9_2.x86_64.rpmIRgolang-race-1.19.10-1.el9_2.x86_64.rpmnRgo-toolset-1.19.10-1.el9_2.x86_64.rpmRgolang-misc-1.19.10-1.el9_2.noarch.rpmRgolang-src-1.19.10-1.el9_2.noarch.rpmRgolang-tests-1.19.10-1.el9_2.noarch.rpmRgolang-docs-1.19.10-1.el9_2.noarch.rpm@Rgolang-bin-1.19.10-1.el9_2.x86_64.rpm?Rgolang-1.19.10-1.el9_2.x86_64.rpmIRgolang-race-1.19.10-1.el9_2.x86_64.rpmnRgo-toolset-1.19.10-1.el9_2.x86_64.rpmRgolang-misc-1.19.10-1.el9_2.noarch.rpmRgolang-src-1.19.10-1.el9_2.noarch.rpmN PBBBBBBBBsecurityLow: open-vm-tools security update*3 https://access.redhat.com/errata/RHSA-2023:3948RHSA-2023:3948RHSA-2023:3948 https://access.redhat.com/security/cve/CVE-2023-20867CVE-2023-20867CVE-2023-20867https://bugzilla.redhat.com/22130872213087https://errata.almalinux.org/9/ALSA-2023-3948.htmlALSA-2023:3948ALSA-2023:3948 Topen-vm-tools-salt-minion-12.1.5-1.el9_2.1.alma.x86_64.rpm&open-vm-tools-test-12.1.5-1.el9_2.1.alma.x86_64.rpm$open-vm-tools-desktop-12.1.5-1.el9_2.1.alma.x86_64.rpm%open-vm-tools-sdmp-12.1.5-1.el9_2.1.alma.x86_64.rpm#open-vm-tools-12.1.5-1.el9_2.1.alma.x86_64.rpmTopen-vm-tools-salt-minion-12.1.5-1.el9_2.1.alma.x86_64.rpm&open-vm-tools-test-12.1.5-1.el9_2.1.alma.x86_64.rpm$open-vm-tools-desktop-12.1.5-1.el9_2.1.alma.x86_64.rpm%open-vm-tools-sdmp-12.1.5-1.el9_2.1.alma.x86_64.rpm#open-vm-tools-12.1.5-1.el9_2.1.alma.x86_64.rpmN  [securityCritical: grafana security update|<https://access.redhat.com/errata/RHSA-2023:4030RHSA-2023:4030RHSA-2023:4030 https://access.redhat.com/security/cve/CVE-2023-3128CVE-2023-3128CVE-2023-3128https://bugzilla.redhat.com/22136262213626https://errata.almalinux.org/9/ALSA-2023-4030.htmlALSA-2023:4030ALSA-2023:4030 ografana-9.0.9-3.el9_2.alma.x86_64.rpmografana-9.0.9-3.el9_2.alma.x86_64.rpmZ  2^BBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement updateLEhttps://access.redhat.com/errata/RHSA-2023:4057RHSA-2023:4057RHSA-2023:4057 https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4057.htmlALSA-2023:4057ALSA-2023:4057 Cdotnet-sdk-7.0-7.0.109-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.109-1.el9_2.x86_64.rpm?dotnet-hostfxr-7.0-7.0.9-1.el9_2.x86_64.rpmAdotnet-runtime-7.0-7.0.9-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.9-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.109-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.9-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpmdotnet-host-7.0.9-1.el9_2.x86_64.rpm Cdotnet-sdk-7.0-7.0.109-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.109-1.el9_2.x86_64.rpm?dotnet-hostfxr-7.0-7.0.9-1.el9_2.x86_64.rpmAdotnet-runtime-7.0-7.0.9-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.9-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.109-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.9-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpmdotnet-host-7.0.9-1.el9_2.x86_64.rpmE  sBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement updateFhttps://access.redhat.com/errata/RHSA-2023:4060RHSA-2023:4060RHSA-2023:4060 https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4060.htmlALSA-2023:4060ALSA-2023:4060 dotnet-runtime-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.20-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.20-1.el9_2.x86_64.rpmHdotnet-sdk-6.0-6.0.120-1.el9_2.x86_64.rpmHdotnet-templates-6.0-6.0.120-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.20-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.20-1.el9_2.x86_64.rpmHdotnet-sdk-6.0-6.0.120-1.el9_2.x86_64.rpmHdotnet-templates-6.0-6.0.120-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpm;  DsecurityImportant: thunderbird security updateWg https://access.redhat.com/errata/RHSA-2023:4064RHSA-2023:4064RHSA-2023:4064 https://access.redhat.com/security/cve/CVE-2023-37201CVE-2023-37201CVE-2023-37201https://access.redhat.com/security/cve/CVE-2023-37202CVE-2023-37202CVE-2023-37202https://access.redhat.com/security/cve/CVE-2023-37207CVE-2023-37207CVE-2023-37207https://access.redhat.com/security/cve/CVE-2023-37208CVE-2023-37208CVE-2023-37208https://access.redhat.com/security/cve/CVE-2023-37211CVE-2023-37211CVE-2023-37211https://bugzilla.redhat.com/22197472219747https://bugzilla.redhat.com/22197482219748https://bugzilla.redhat.com/22197492219749https://bugzilla.redhat.com/22197502219750https://bugzilla.redhat.com/22197512219751https://errata.almalinux.org/9/ALSA-2023-4064.htmlALSA-2023:4064ALSA-2023:4064 :gthunderbird-102.13.0-2.el9_2.alma.x86_64.rpm:gthunderbird-102.13.0-2.el9_2.alma.x86_64.rpmǔ  GBBsecurityImportant: firefox security update> https://access.redhat.com/errata/RHSA-2023:4071RHSA-2023:4071RHSA-2023:4071 https://access.redhat.com/security/cve/CVE-2023-37201CVE-2023-37201CVE-2023-37201https://access.redhat.com/security/cve/CVE-2023-37202CVE-2023-37202CVE-2023-37202https://access.redhat.com/security/cve/CVE-2023-37207CVE-2023-37207CVE-2023-37207https://access.redhat.com/security/cve/CVE-2023-37208CVE-2023-37208CVE-2023-37208https://access.redhat.com/security/cve/CVE-2023-37211CVE-2023-37211CVE-2023-37211https://bugzilla.redhat.com/22197472219747https://bugzilla.redhat.com/22197482219748https://bugzilla.redhat.com/22197492219749https://bugzilla.redhat.com/22197502219750https://bugzilla.redhat.com/22197512219751https://errata.almalinux.org/9/ALSA-2023-4071.htmlALSA-2023:4071ALSA-2023:4071 Qgfirefox-x11-102.13.0-2.el9_2.alma.x86_64.rpm8gfirefox-102.13.0-2.el9_2.alma.x86_64.rpmQgfirefox-x11-102.13.0-2.el9_2.alma.x86_64.rpm8gfirefox-102.13.0-2.el9_2.alma.x86_64.rpmǑ LBBBBBBBBBBBsecurityImportant: bind security updateVNhttps://access.redhat.com/errata/RHSA-2023:4099RHSA-2023:4099RHSA-2023:4099 https://access.redhat.com/security/cve/CVE-2023-2828CVE-2023-2828CVE-2023-2828https://bugzilla.redhat.com/22162272216227https://errata.almalinux.org/9/ALSA-2023-4099.htmlALSA-2023:4099ALSA-2023:4099 \Fbind-libs-9.16.23-11.el9_2.1.x86_64.rpm7Fpython3-bind-9.16.23-11.el9_2.1.noarch.rpmZFbind-chroot-9.16.23-11.el9_2.1.x86_64.rpm+Fbind-license-9.16.23-11.el9_2.1.noarch.rpm]Fbind-utils-9.16.23-11.el9_2.1.x86_64.rpm*Fbind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpmYFbind-9.16.23-11.el9_2.1.x86_64.rpm[Fbind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpm\Fbind-libs-9.16.23-11.el9_2.1.x86_64.rpm7Fpython3-bind-9.16.23-11.el9_2.1.noarch.rpmZFbind-chroot-9.16.23-11.el9_2.1.x86_64.rpm+Fbind-license-9.16.23-11.el9_2.1.noarch.rpm]Fbind-utils-9.16.23-11.el9_2.1.x86_64.rpm*Fbind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpmYFbind-9.16.23-11.el9_2.1.x86_64.rpm[Fbind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpmٟ ,ZBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update$"https://access.redhat.com/errata/RHSA-2023:4158RHSA-2023:4158RHSA-2023:4158 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4158.htmlALSA-2023:4158ALSA-2023:4158 tyjava-11-openjdk-static-libs-11.0.20.0.8-2.el9.x86_64.rpmpyjava-11-openjdk-javadoc-11.0.20.0.8-2.el9.x86_64.rpmryjava-11-openjdk-jmods-11.0.20.0.8-2.el9.x86_64.rpmmyjava-11-openjdk-demo-11.0.20.0.8-2.el9.x86_64.rpmnyjava-11-openjdk-devel-11.0.20.0.8-2.el9.x86_64.rpmsyjava-11-openjdk-src-11.0.20.0.8-2.el9.x86_64.rpmlyjava-11-openjdk-11.0.20.0.8-2.el9.x86_64.rpmoyjava-11-openjdk-headless-11.0.20.0.8-2.el9.x86_64.rpmqyjava-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9.x86_64.rpm tyjava-11-openjdk-static-libs-11.0.20.0.8-2.el9.x86_64.rpmpyjava-11-openjdk-javadoc-11.0.20.0.8-2.el9.x86_64.rpmryjava-11-openjdk-jmods-11.0.20.0.8-2.el9.x86_64.rpmmyjava-11-openjdk-demo-11.0.20.0.8-2.el9.x86_64.rpmnyjava-11-openjdk-devel-11.0.20.0.8-2.el9.x86_64.rpmsyjava-11-openjdk-src-11.0.20.0.8-2.el9.x86_64.rpmlyjava-11-openjdk-11.0.20.0.8-2.el9.x86_64.rpmoyjava-11-openjdk-headless-11.0.20.0.8-2.el9.x86_64.rpmqyjava-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9.x86_64.rpm ?mBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix updateFNhttps://access.redhat.com/errata/RHSA-2023:4177RHSA-2023:4177RHSA-2023:4177 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22044CVE-2023-22044CVE-2023-22044https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216422221642https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4177.htmlALSA-2023:4177ALSA-2023:4177  java-17-openjdk-headless-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-jmods-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-src-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-javadoc-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-static-libs-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9.x86_64.rpm  java-17-openjdk-headless-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-jmods-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-src-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-javadoc-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-static-libs-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.8.0.7-2.el9.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9.x86_64.rpmz @BBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix updateyhttps://access.redhat.com/errata/RHSA-2023:4178RHSA-2023:4178RHSA-2023:4178 https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://errata.almalinux.org/9/ALSA-2023-4178.htmlALSA-2023:4178ALSA-2023:4178 4/java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpm;/java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm3/java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpm2/java-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpm5/java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpm:/java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm6/java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpm4/java-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpm;/java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpm3/java-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpm2/java-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpm5/java-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpm:/java-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpm6/java-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpm; MBBBBBBBBBBsecurityImportant: webkit2gtk3 security update Zhttps://access.redhat.com/errata/RHSA-2023:4201RHSA-2023:4201RHSA-2023:4201 https://access.redhat.com/security/cve/CVE-2023-32435CVE-2023-32435CVE-2023-32435https://access.redhat.com/security/cve/CVE-2023-32439CVE-2023-32439CVE-2023-32439https://bugzilla.redhat.com/22186262218626https://bugzilla.redhat.com/22186402218640https://errata.almalinux.org/9/ALSA-2023-4201.htmlALSA-2023:4201ALSA-2023:4201 1ewebkit2gtk3-2.38.5-1.el9_2.3.i686.rpm1ewebkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm2ewebkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm3ewebkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm4ewebkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm2ewebkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm4ewebkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm3ewebkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpm1ewebkit2gtk3-2.38.5-1.el9_2.3.i686.rpm1ewebkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm2ewebkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm3ewebkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm4ewebkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm2ewebkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm4ewebkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm3ewebkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpmt &ZBBBBBBBBBBsecurityModerate: samba security and bug fix updateghttps://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325 https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325 Zsamba-winexe-4.17.5-103.el9_2.alma.x86_64.rpmYsamba-winbind-krb5-locator-4.17.5-103.el9_2.alma.x86_64.rpmWsamba-vfs-iouring-4.17.5-103.el9_2.alma.x86_64.rpmVsamba-krb5-printing-4.17.5-103.el9_2.alma.x86_64.rpmXsamba-winbind-clients-4.17.5-103.el9_2.alma.x86_64.rpmUsamba-client-4.17.5-103.el9_2.alma.x86_64.rpmZsamba-winexe-4.17.5-103.el9_2.alma.x86_64.rpmYsamba-winbind-krb5-locator-4.17.5-103.el9_2.alma.x86_64.rpmWsamba-vfs-iouring-4.17.5-103.el9_2.alma.x86_64.rpmVsamba-krb5-printing-4.17.5-103.el9_2.alma.x86_64.rpmXsamba-winbind-clients-4.17.5-103.el9_2.alma.x86_64.rpmUsamba-client-4.17.5-103.el9_2.alma.x86_64.rpm* nBBBBBuBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:15 security updateoShttps://access.redhat.com/errata/RHSA-2023:4327RHSA-2023:4327RHSA-2023:4327 https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-4327.htmlALSA-2023:4327ALSA-2023:4327 _^( opostgresql-private-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm kpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm'opostgresql-server-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-static-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm(opostgresql-upgrade-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm jpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm"opostgresql-contrib-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm$opostgresql-plpython3-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm&opostgresql-private-libs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmipg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm opostgresql-docs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-upgrade-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-test-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm opostgresql-server-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm%opostgresql-pltcl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm#opostgresql-plperl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmiopostgresql-test-rpm-macros-15.3-1.module_el9.2.0+32+f3c125b5.noarch.rpm_opostgresql-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm_^( opostgresql-private-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm kpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm'opostgresql-server-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-static-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm(opostgresql-upgrade-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm jpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm"opostgresql-contrib-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm$opostgresql-plpython3-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm&opostgresql-private-libs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmipg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm opostgresql-docs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-upgrade-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmopostgresql-test-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm opostgresql-server-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm%opostgresql-pltcl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm#opostgresql-plperl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmiopostgresql-test-rpm-macros-15.3-1.module_el9.2.0+32+f3c125b5.noarch.rpm_opostgresql-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmy uBxYBBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement updateBU https://access.redhat.com/errata/RHSA-2023:4330RHSA-2023:4330RHSA-2023:4330 https://access.redhat.com/security/cve/CVE-2023-30581CVE-2023-30581CVE-2023-30581https://access.redhat.com/security/cve/CVE-2023-30588CVE-2023-30588CVE-2023-30588https://access.redhat.com/security/cve/CVE-2023-30589CVE-2023-30589CVE-2023-30589https://access.redhat.com/security/cve/CVE-2023-30590CVE-2023-30590CVE-2023-30590https://bugzilla.redhat.com/22198242219824https://bugzilla.redhat.com/22198382219838https://bugzilla.redhat.com/22198412219841https://bugzilla.redhat.com/22198422219842https://errata.almalinux.org/9/ALSA-2023-4330.htmlALSA-2023:4330ALSA-2023:4330 94b(f npm-9.5.1-1.18.16.1.1.module_el9.2.0+31+cbae0c8e.x86_64.rpmmnodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmNBnodejs-docs-18.16.1-1.module_el9.2.0+31+cbae0c8e.noarch.rpmmnodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmhBnodejs-full-i18n-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpmjBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement updateYhttps://access.redhat.com/errata/RHSA-2023:4642RHSA-2023:4642RHSA-2023:4642 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4642.htmlALSA-2023:4642ALSA-2023:4642 =dotnet-apphost-pack-7.0-7.0.10-1.el9_2.x86_64.rpmAdotnet-runtime-7.0-7.0.10-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpm?dotnet-hostfxr-7.0-7.0.10-1.el9_2.x86_64.rpmCdotnet-sdk-7.0-7.0.110-1.el9_2.x86_64.rpmdotnet-host-7.0.10-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.10-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.110-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.110-1.el9_2.x86_64.rpm =dotnet-apphost-pack-7.0-7.0.10-1.el9_2.x86_64.rpmAdotnet-runtime-7.0-7.0.10-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpm?dotnet-hostfxr-7.0-7.0.10-1.el9_2.x86_64.rpmCdotnet-sdk-7.0-7.0.110-1.el9_2.x86_64.rpmdotnet-host-7.0.10-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.10-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.110-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.110-1.el9_2.x86_64.rpm# BBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement updatephttps://access.redhat.com/errata/RHSA-2023:4644RHSA-2023:4644RHSA-2023:4644 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4644.htmlALSA-2023:4644ALSA-2023:4644 aspnetcore-runtime-6.0-6.0.21-1.el9_2.x86_64.rpmIdotnet-templates-6.0-6.0.121-1.el9_2.x86_64.rpmIdotnet-sdk-6.0-6.0.121-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.21-1.el9_2.x86_64.rpmIdotnet-templates-6.0-6.0.121-1.el9_2.x86_64.rpmIdotnet-sdk-6.0-6.0.121-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.21-1.el9_2.x86_64.rpmdotnet-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpm0$ PBBBBBBBBBBBBsecurityImportant: cups security updatehttps://access.redhat.com/errata/RHSA-2023:4838RHSA-2023:4838RHSA-2023:4838 https://access.redhat.com/security/cve/CVE-2023-32360CVE-2023-32360CVE-2023-32360https://bugzilla.redhat.com/22304952230495https://errata.almalinux.org/9/ALSA-2023-4838.htmlALSA-2023:4838ALSA-2023:4838 >cups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpm=cups-client-2.3.3op2-16.el9_2.1.x86_64.rpm?cups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpm<cups-2.3.3op2-16.el9_2.1.x86_64.rpmcups-devel-2.3.3op2-16.el9_2.1.i686.rpm2cups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpmcups-devel-2.3.3op2-16.el9_2.1.x86_64.rpm@cups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpm>cups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpm=cups-client-2.3.3op2-16.el9_2.1.x86_64.rpm?cups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpm<cups-2.3.3op2-16.el9_2.1.x86_64.rpmcups-devel-2.3.3op2-16.el9_2.1.i686.rpm2cups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpmcups-devel-2.3.3op2-16.el9_2.1.x86_64.rpm@cups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpmM% !_securityImportant: thunderbird security update!https://access.redhat.com/errata/RHSA-2023:4955RHSA-2023:4955RHSA-2023:4955 https://access.redhat.com/security/cve/CVE-2023-4051CVE-2023-4051CVE-2023-4051https://access.redhat.com/security/cve/CVE-2023-4053CVE-2023-4053CVE-2023-4053https://access.redhat.com/security/cve/CVE-2023-4573CVE-2023-4573CVE-2023-4573https://access.redhat.com/security/cve/CVE-2023-4574CVE-2023-4574CVE-2023-4574https://access.redhat.com/security/cve/CVE-2023-4575CVE-2023-4575CVE-2023-4575https://access.redhat.com/security/cve/CVE-2023-4577CVE-2023-4577CVE-2023-4577https://access.redhat.com/security/cve/CVE-2023-4578CVE-2023-4578CVE-2023-4578https://access.redhat.com/security/cve/CVE-2023-4580CVE-2023-4580CVE-2023-4580https://access.redhat.com/security/cve/CVE-2023-4581CVE-2023-4581CVE-2023-4581https://access.redhat.com/security/cve/CVE-2023-4583CVE-2023-4583CVE-2023-4583https://access.redhat.com/security/cve/CVE-2023-4584CVE-2023-4584CVE-2023-4584https://access.redhat.com/security/cve/CVE-2023-4585CVE-2023-4585CVE-2023-4585https://bugzilla.redhat.com/22360712236071https://bugzilla.redhat.com/22360722236072https://bugzilla.redhat.com/22360732236073https://bugzilla.redhat.com/22360752236075https://bugzilla.redhat.com/22360762236076https://bugzilla.redhat.com/22360772236077https://bugzilla.redhat.com/22360782236078https://bugzilla.redhat.com/22360792236079https://bugzilla.redhat.com/22360802236080https://bugzilla.redhat.com/22360822236082https://bugzilla.redhat.com/22360842236084https://bugzilla.redhat.com/22360862236086https://errata.almalinux.org/9/ALSA-2023-4955.htmlALSA-2023:4955ALSA-2023:4955 :ithunderbird-102.15.0-1.el9_2.alma.x86_64.rpm:ithunderbird-102.15.0-1.el9_2.alma.x86_64.rpm&& &bBBsecurityImportant: firefox security update 0https://access.redhat.com/errata/RHSA-2023:4958RHSA-2023:4958RHSA-2023:4958 https://access.redhat.com/security/cve/CVE-2023-4051CVE-2023-4051CVE-2023-4051https://access.redhat.com/security/cve/CVE-2023-4053CVE-2023-4053CVE-2023-4053https://access.redhat.com/security/cve/CVE-2023-4573CVE-2023-4573CVE-2023-4573https://access.redhat.com/security/cve/CVE-2023-4574CVE-2023-4574CVE-2023-4574https://access.redhat.com/security/cve/CVE-2023-4575CVE-2023-4575CVE-2023-4575https://access.redhat.com/security/cve/CVE-2023-4577CVE-2023-4577CVE-2023-4577https://access.redhat.com/security/cve/CVE-2023-4578CVE-2023-4578CVE-2023-4578https://access.redhat.com/security/cve/CVE-2023-4580CVE-2023-4580CVE-2023-4580https://access.redhat.com/security/cve/CVE-2023-4581CVE-2023-4581CVE-2023-4581https://access.redhat.com/security/cve/CVE-2023-4583CVE-2023-4583CVE-2023-4583https://access.redhat.com/security/cve/CVE-2023-4584CVE-2023-4584CVE-2023-4584https://access.redhat.com/security/cve/CVE-2023-4585CVE-2023-4585CVE-2023-4585https://bugzilla.redhat.com/22360712236071https://bugzilla.redhat.com/22360722236072https://bugzilla.redhat.com/22360732236073https://bugzilla.redhat.com/22360752236075https://bugzilla.redhat.com/22360762236076https://bugzilla.redhat.com/22360772236077https://bugzilla.redhat.com/22360782236078https://bugzilla.redhat.com/22360792236079https://bugzilla.redhat.com/22360802236080https://bugzilla.redhat.com/22360822236082https://bugzilla.redhat.com/22360842236084https://bugzilla.redhat.com/22360862236086https://errata.almalinux.org/9/ALSA-2023-4958.htmlALSA-2023:4958ALSA-2023:4958 8ifirefox-102.15.0-1.el9_2.alma.x86_64.rpmQifirefox-x11-102.15.0-1.el9_2.alma.x86_64.rpm8ifirefox-102.15.0-1.el9_2.alma.x86_64.rpmQifirefox-x11-102.15.0-1.el9_2.alma.x86_64.rpmM' *gBsecurityImportant: flac security updatePwhttps://access.redhat.com/errata/RHSA-2023:5048RHSA-2023:5048RHSA-2023:5048 https://access.redhat.com/security/cve/CVE-2020-22219CVE-2020-22219CVE-2020-22219https://bugzilla.redhat.com/22354892235489https://errata.almalinux.org/9/ALSA-2023-5048.htmlALSA-2023:5048ALSA-2023:5048 (flac-libs-1.3.3-10.el9_2.1.x86_64.rpm(flac-libs-1.3.3-10.el9_2.1.i686.rpm(flac-libs-1.3.3-10.el9_2.1.x86_64.rpm(flac-libs-1.3.3-10.el9_2.1.i686.rpm5( 7kBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement updateG_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069 https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:5069 % perf-5.14.0-284.30.1.el9_2.x86_64.rpm! kernel-debug-devel-5.14.0-284.30.1.el9_2.x86_64.rpm" kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm$ kernel-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm# kernel-devel-5.14.0-284.30.1.el9_2.x86_64.rpm' rtla-5.14.0-284.30.1.el9_2.x86_64.rpm% perf-5.14.0-284.30.1.el9_2.x86_64.rpm! kernel-debug-devel-5.14.0-284.30.1.el9_2.x86_64.rpm" kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm$ kernel-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm# kernel-devel-5.14.0-284.30.1.el9_2.x86_64.rpm' rtla-5.14.0-284.30.1.el9_2.x86_64.rpm) ;xBsecurityModerate: libcap security update&0https://access.redhat.com/errata/RHSA-2023:5071RHSA-2023:5071RHSA-2023:5071 https://access.redhat.com/security/cve/CVE-2023-2602CVE-2023-2602CVE-2023-2602https://access.redhat.com/security/cve/CVE-2023-2603CVE-2023-2603CVE-2023-2603https://bugzilla.redhat.com/22091132209113https://bugzilla.redhat.com/22091142209114https://errata.almalinux.org/9/ALSA-2023-5071.htmlALSA-2023:5071ALSA-2023:5071 2>libcap-devel-2.48-9.el9_2.x86_64.rpm2>libcap-devel-2.48-9.el9_2.i686.rpm2>libcap-devel-2.48-9.el9_2.x86_64.rpm2>libcap-devel-2.48-9.el9_2.i686.rpm* |BBBBBBBBBBBsecurityModerate: keylime security updateVhhttps://access.redhat.com/errata/RHSA-2023:5080RHSA-2023:5080RHSA-2023:5080 https://access.redhat.com/security/cve/CVE-2023-38200CVE-2023-38200CVE-2023-38200https://access.redhat.com/security/cve/CVE-2023-38201CVE-2023-38201CVE-2023-38201https://bugzilla.redhat.com/22226922222692https://bugzilla.redhat.com/22226932222693https://errata.almalinux.org/9/ALSA-2023-5080.htmlALSA-2023:5080ALSA-2023:5080 3keylime-base-6.5.2-6.el9_2.alma.1.x86_64.rpm4keylime-registrar-6.5.2-6.el9_2.alma.1.x86_64.rpm5keylime-tenant-6.5.2-6.el9_2.alma.1.x86_64.rpmGpython3-keylime-6.5.2-6.el9_2.alma.1.x86_64.rpmZkeylime-selinux-6.5.2-6.el9_2.alma.1.noarch.rpm2keylime-6.5.2-6.el9_2.alma.1.x86_64.rpm6keylime-verifier-6.5.2-6.el9_2.alma.1.x86_64.rpm3keylime-base-6.5.2-6.el9_2.alma.1.x86_64.rpm4keylime-registrar-6.5.2-6.el9_2.alma.1.x86_64.rpm5keylime-tenant-6.5.2-6.el9_2.alma.1.x86_64.rpmGpython3-keylime-6.5.2-6.el9_2.alma.1.x86_64.rpmZkeylime-selinux-6.5.2-6.el9_2.alma.1.noarch.rpm2keylime-6.5.2-6.el9_2.alma.1.x86_64.rpm6keylime-verifier-6.5.2-6.el9_2.alma.1.x86_64.rpm+ JBBBBBBsecurityModerate: librsvg2 security update>https://access.redhat.com/errata/RHSA-2023:5081RHSA-2023:5081RHSA-2023:5081 https://access.redhat.com/security/cve/CVE-2023-38633CVE-2023-38633CVE-2023-38633https://bugzilla.redhat.com/22249452224945https://errata.almalinux.org/9/ALSA-2023-5081.htmlALSA-2023:5081ALSA-2023:5081 -librsvg2-tools-2.50.7-1.el9_2.1.x86_64.rpmElibrsvg2-devel-2.50.7-1.el9_2.1.x86_64.rpmDlibrsvg2-2.50.7-1.el9_2.1.x86_64.rpmElibrsvg2-devel-2.50.7-1.el9_2.1.i686.rpmDlibrsvg2-2.50.7-1.el9_2.1.i686.rpm-librsvg2-tools-2.50.7-1.el9_2.1.x86_64.rpmElibrsvg2-devel-2.50.7-1.el9_2.1.x86_64.rpmDlibrsvg2-2.50.7-1.el9_2.1.x86_64.rpmElibrsvg2-devel-2.50.7-1.el9_2.1.i686.rpmDlibrsvg2-2.50.7-1.el9_2.1.i686.rpm], 7SBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qemu-kvm security and bug fix updateNBhttps://access.redhat.com/errata/RHSA-2023:5094RHSA-2023:5094RHSA-2023:5094 https://access.redhat.com/security/cve/CVE-2023-3354CVE-2023-3354CVE-2023-3354https://bugzilla.redhat.com/22164782216478https://errata.almalinux.org/9/ALSA-2023-5094.htmlALSA-2023:5094ALSA-2023:5094 Y]qemu-kvm-tools-7.2.0-14.el9_2.5.alma.1.x86_64.rpmR]qemu-kvm-core-7.2.0-14.el9_2.5.alma.1.x86_64.rpmV]qemu-kvm-device-usb-host-7.2.0-14.el9_2.5.alma.1.x86_64.rpm[]qemu-kvm-ui-opengl-7.2.0-14.el9_2.5.alma.1.x86_64.rpmT]qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5.alma.1.x86_64.rpmU]qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5.alma.1.x86_64.rpmQ]qemu-kvm-common-7.2.0-14.el9_2.5.alma.1.x86_64.rpm\]qemu-pr-helper-7.2.0-14.el9_2.5.alma.1.x86_64.rpmL]qemu-img-7.2.0-14.el9_2.5.alma.1.x86_64.rpmZ]qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5.alma.1.x86_64.rpmP]qemu-kvm-block-rbd-7.2.0-14.el9_2.5.alma.1.x86_64.rpmW]qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5.alma.1.x86_64.rpmX]qemu-kvm-docs-7.2.0-14.el9_2.5.alma.1.x86_64.rpmO]qemu-kvm-block-curl-7.2.0-14.el9_2.5.alma.1.x86_64.rpmM]qemu-kvm-7.2.0-14.el9_2.5.alma.1.x86_64.rpmS]qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.alma.1.x86_64.rpmK]qemu-guest-agent-7.2.0-14.el9_2.5.alma.1.x86_64.rpmN]qemu-kvm-audio-pa-7.2.0-14.el9_2.5.alma.1.x86_64.rpmY]qemu-kvm-tools-7.2.0-14.el9_2.5.alma.1.x86_64.rpmR]qemu-kvm-core-7.2.0-14.el9_2.5.alma.1.x86_64.rpmV]qemu-kvm-device-usb-host-7.2.0-14.el9_2.5.alma.1.x86_64.rpm[]qemu-kvm-ui-opengl-7.2.0-14.el9_2.5.alma.1.x86_64.rpmT]qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5.alma.1.x86_64.rpmU]qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5.alma.1.x86_64.rpmQ]qemu-kvm-common-7.2.0-14.el9_2.5.alma.1.x86_64.rpm\]qemu-pr-helper-7.2.0-14.el9_2.5.alma.1.x86_64.rpmL]qemu-img-7.2.0-14.el9_2.5.alma.1.x86_64.rpmZ]qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5.alma.1.x86_64.rpmP]qemu-kvm-block-rbd-7.2.0-14.el9_2.5.alma.1.x86_64.rpmW]qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5.alma.1.x86_64.rpmX]qemu-kvm-docs-7.2.0-14.el9_2.5.alma.1.x86_64.rpmO]qemu-kvm-block-curl-7.2.0-14.el9_2.5.alma.1.x86_64.rpmM]qemu-kvm-7.2.0-14.el9_2.5.alma.1.x86_64.rpmS]qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.alma.1.x86_64.rpmK]qemu-guest-agent-7.2.0-14.el9_2.5.alma.1.x86_64.rpmN]qemu-kvm-audio-pa-7.2.0-14.el9_2.5.alma.1.x86_64.rpm- xBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security updateRhttps://access.redhat.com/errata/RHSA-2023:5143RHSA-2023:5143RHSA-2023:5143 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5143.htmlALSA-2023:5143ALSA-2023:5143 dotnet-hostfxr-6.0-6.0.22-1.el9_2.x86_64.rpmdotnet-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.22-1.el9_2.x86_64.rpmJdotnet-templates-6.0-6.0.122-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.22-1.el9_2.x86_64.rpmJdotnet-sdk-6.0-6.0.122-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.22-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.22-1.el9_2.x86_64.rpmdotnet-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.22-1.el9_2.x86_64.rpmJdotnet-templates-6.0-6.0.122-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.22-1.el9_2.x86_64.rpmJdotnet-sdk-6.0-6.0.122-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm~. IBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security updatebRhttps://access.redhat.com/errata/RHSA-2023:5146RHSA-2023:5146RHSA-2023:5146 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5146.htmlALSA-2023:5146ALSA-2023:5146 dotnet-host-7.0.11-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpm?dotnet-hostfxr-7.0-7.0.11-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.111-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.111-1.el9_2.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.11-1.el9_2.x86_64.rpmCdotnet-sdk-7.0-7.0.111-1.el9_2.x86_64.rpmAdotnet-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm dotnet-host-7.0.11-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpm?dotnet-hostfxr-7.0-7.0.11-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.111-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.111-1.el9_2.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.11-1.el9_2.x86_64.rpmCdotnet-sdk-7.0-7.0.111-1.el9_2.x86_64.rpmAdotnet-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.11-1.el9_2.x86_64.rpmq/ !^BsecurityImportant: frr security update4jhttps://access.redhat.com/errata/RHSA-2023:5194RHSA-2023:5194RHSA-2023:5194 https://access.redhat.com/security/cve/CVE-2023-38802CVE-2023-38802CVE-2023-38802https://bugzilla.redhat.com/22309832230983https://errata.almalinux.org/9/ALSA-2023-5194.htmlALSA-2023:5194ALSA-2023:5194 Wzfrr-selinux-8.3.1-5.el9_2.2.alma.noarch.rpmAzfrr-8.3.1-5.el9_2.2.alma.x86_64.rpmWzfrr-selinux-8.3.1-5.el9_2.2.alma.noarch.rpmAzfrr-8.3.1-5.el9_2.2.alma.x86_64.rpm*0 &bBBsecurityImportant: firefox security update7https://access.redhat.com/errata/RHSA-2023:5200RHSA-2023:5200RHSA-2023:5200 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5200.htmlALSA-2023:5200ALSA-2023:5200 8jfirefox-102.15.1-1.el9_2.alma.x86_64.rpmQjfirefox-x11-102.15.1-1.el9_2.alma.x86_64.rpm8jfirefox-102.15.1-1.el9_2.alma.x86_64.rpmQjfirefox-x11-102.15.1-1.el9_2.alma.x86_64.rpmM1 -gBBBBsecurityImportant: libwebp security updateU-https://access.redhat.com/errata/RHSA-2023:5214RHSA-2023:5214RHSA-2023:5214 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5214.htmlALSA-2023:5214ALSA-2023:5214 5{libwebp-devel-1.2.0-7.el9_2.i686.rpm4{libwebp-1.2.0-7.el9_2.i686.rpm5{libwebp-devel-1.2.0-7.el9_2.x86_64.rpm4{libwebp-1.2.0-7.el9_2.x86_64.rpm5{libwebp-devel-1.2.0-7.el9_2.i686.rpm4{libwebp-1.2.0-7.el9_2.i686.rpm5{libwebp-devel-1.2.0-7.el9_2.x86_64.rpm4{libwebp-1.2.0-7.el9_2.x86_64.rpm^2 0nsecurityImportant: thunderbird security updatehttps://access.redhat.com/errata/RHSA-2023:5224RHSA-2023:5224RHSA-2023:5224 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5224.htmlALSA-2023:5224ALSA-2023:5224 :jthunderbird-102.15.1-1.el9_2.alma.x86_64.rpm:jthunderbird-102.15.1-1.el9_2.alma.x86_64.rpmp3 ;qBBBBBBBBsecurityImportant: open-vm-tools security updatelhttps://access.redhat.com/errata/RHSA-2023:5313RHSA-2023:5313RHSA-2023:5313 https://access.redhat.com/security/cve/CVE-2023-20900CVE-2023-20900CVE-2023-20900https://bugzilla.redhat.com/22365422236542https://errata.almalinux.org/9/ALSA-2023-5313.htmlALSA-2023:5313ALSA-2023:5313 $open-vm-tools-desktop-12.1.5-1.el9_2.3.alma.1.x86_64.rpm&open-vm-tools-test-12.1.5-1.el9_2.3.alma.1.x86_64.rpm#open-vm-tools-12.1.5-1.el9_2.3.alma.1.x86_64.rpm%open-vm-tools-sdmp-12.1.5-1.el9_2.3.alma.1.x86_64.rpmTopen-vm-tools-salt-minion-12.1.5-1.el9_2.3.alma.1.x86_64.rpm$open-vm-tools-desktop-12.1.5-1.el9_2.3.alma.1.x86_64.rpm&open-vm-tools-test-12.1.5-1.el9_2.3.alma.1.x86_64.rpm#open-vm-tools-12.1.5-1.el9_2.3.alma.1.x86_64.rpm%open-vm-tools-sdmp-12.1.5-1.el9_2.3.alma.1.x86_64.rpmTopen-vm-tools-salt-minion-12.1.5-1.el9_2.3.alma.1.x86_64.rpm4 uBFBBBBBBBBsecurityImportant: nodejs:18 security, bug fix, and enhancement updatet. https://access.redhat.com/errata/RHSA-2023:5363RHSA-2023:5363RHSA-2023:5363 https://access.redhat.com/security/cve/CVE-2022-25883CVE-2022-25883CVE-2022-25883https://access.redhat.com/security/cve/CVE-2023-32002CVE-2023-32002CVE-2023-32002https://access.redhat.com/security/cve/CVE-2023-32006CVE-2023-32006CVE-2023-32006https://access.redhat.com/security/cve/CVE-2023-32559CVE-2023-32559CVE-2023-32559https://bugzilla.redhat.com/22164752216475https://bugzilla.redhat.com/22309482230948https://bugzilla.redhat.com/22309552230955https://bugzilla.redhat.com/22309562230956https://errata.almalinux.org/9/ALSA-2023-5363.htmlALSA-2023:5363ALSA-2023:5363 94c(f npm-9.6.7-1.18.17.1.1.module_el9.2.0+36+853e48f5.x86_64.rpmhCnodejs-full-i18n-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm[nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm9Cnodejs-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpmmnodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmmnodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmNCnodejs-docs-18.17.1-1.module_el9.2.0+36+853e48f5.noarch.rpm .aBBBBBBBBBBBsecurityImportant: bind security updatemEhttps://access.redhat.com/errata/RHSA-2023:5689RHSA-2023:5689RHSA-2023:5689 https://access.redhat.com/security/cve/CVE-2023-3341CVE-2023-3341CVE-2023-3341https://bugzilla.redhat.com/22396212239621https://errata.almalinux.org/9/ALSA-2023-5689.htmlALSA-2023:5689ALSA-2023:5689 +Gbind-license-9.16.23-11.el9_2.2.noarch.rpm7Gpython3-bind-9.16.23-11.el9_2.2.noarch.rpm*Gbind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpmZGbind-chroot-9.16.23-11.el9_2.2.x86_64.rpm[Gbind-dnssec-utils-9.16.23-11.el9_2.2.x86_64.rpm]Gbind-utils-9.16.23-11.el9_2.2.x86_64.rpmYGbind-9.16.23-11.el9_2.2.x86_64.rpm\Gbind-libs-9.16.23-11.el9_2.2.x86_64.rpm+Gbind-license-9.16.23-11.el9_2.2.noarch.rpm7Gpython3-bind-9.16.23-11.el9_2.2.noarch.rpm*Gbind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpmZGbind-chroot-9.16.23-11.el9_2.2.x86_64.rpm[Gbind-dnssec-utils-9.16.23-11.el9_2.2.x86_64.rpm]Gbind-utils-9.16.23-11.el9_2.2.x86_64.rpmYGbind-9.16.23-11.el9_2.2.x86_64.rpm\Gbind-libs-9.16.23-11.el9_2.2.x86_64.rpm ? ?oBBBBBBBBBBBBBBsecurityImportant: dotnet6.0 security update2ohttps://access.redhat.com/errata/RHSA-2023:5708RHSA-2023:5708RHSA-2023:5708 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5708.htmlALSA-2023:5708ALSA-2023:5708 Kdotnet-sdk-6.0-6.0.123-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.23-1.el9_2.x86_64.rpmKdotnet-templates-6.0-6.0.123-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.23-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.23-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.23-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpmdotnet-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpmKdotnet-sdk-6.0-6.0.123-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.23-1.el9_2.x86_64.rpmKdotnet-templates-6.0-6.0.123-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.23-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.23-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.23-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpmdotnet-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpmr@ @BBBBBBBBBBBBBBsecurityModerate: nginx security update!Qhttps://access.redhat.com/errata/RHSA-2023:5711RHSA-2023:5711RHSA-2023:5711 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5711.htmlALSA-2023:5711ALSA-2023:5711 d?nginx-all-modules-1.20.1-14.el9_2.1.alma.1.noarch.rpmA?nginx-mod-mail-1.20.1-14.el9_2.1.alma.1.x86_64.rpm=?nginx-core-1.20.1-14.el9_2.1.alma.1.x86_64.rpm??nginx-mod-http-perl-1.20.1-14.el9_2.1.alma.1.x86_64.rpm>?nginx-mod-http-image-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpme?nginx-filesystem-1.20.1-14.el9_2.1.alma.1.noarch.rpmB?nginx-mod-stream-1.20.1-14.el9_2.1.alma.1.x86_64.rpmH?nginx-1.20.1-14.el9_2.1.alma.1.x86_64.rpm@?nginx-mod-http-xslt-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpm d?nginx-all-modules-1.20.1-14.el9_2.1.alma.1.noarch.rpmA?nginx-mod-mail-1.20.1-14.el9_2.1.alma.1.x86_64.rpm=?nginx-core-1.20.1-14.el9_2.1.alma.1.x86_64.rpm??nginx-mod-http-perl-1.20.1-14.el9_2.1.alma.1.x86_64.rpm>?nginx-mod-http-image-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpme?nginx-filesystem-1.20.1-14.el9_2.1.alma.1.noarch.rpmB?nginx-mod-stream-1.20.1-14.el9_2.1.alma.1.x86_64.rpmH?nginx-1.20.1-14.el9_2.1.alma.1.x86_64.rpm@?nginx-mod-http-xslt-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpmHA QBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updaterEhttps://access.redhat.com/errata/RHSA-2023:5733RHSA-2023:5733RHSA-2023:5733 https://access.redhat.com/security/cve/CVE-2022-40433CVE-2022-40433CVE-2022-40433https://access.redhat.com/security/cve/CVE-2023-22067CVE-2023-22067CVE-2023-22067https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22377092237709https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22436372243637https://errata.almalinux.org/9/ALSA-2023-5733.htmlALSA-2023:5733ALSA-2023:5733 60java-1.8.0-openjdk-src-1.8.0.392.b08-3.el9.x86_64.rpm;0java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9.noarch.rpm50java-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9.x86_64.rpm20java-1.8.0-openjdk-1.8.0.392.b08-3.el9.x86_64.rpm30java-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9.x86_64.rpm:0java-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9.noarch.rpm40java-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9.x86_64.rpm60java-1.8.0-openjdk-src-1.8.0.392.b08-3.el9.x86_64.rpm;0java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9.noarch.rpm50java-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9.x86_64.rpm20java-1.8.0-openjdk-1.8.0.392.b08-3.el9.x86_64.rpm30java-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9.x86_64.rpm:0java-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9.noarch.rpm40java-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9.x86_64.rpm(B *^BBBBBBBBBBsecurityImportant: go-toolset and golang security and bug fix update7https://access.redhat.com/errata/RHSA-2023:5738RHSA-2023:5738RHSA-2023:5738 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39325CVE-2023-39325CVE-2023-39325https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22432962243296https://errata.almalinux.org/9/ALSA-2023-5738.htmlALSA-2023:5738ALSA-2023:5738 Sgolang-src-1.19.13-1.el9_2.noarch.rpm?Sgolang-1.19.13-1.el9_2.x86_64.rpm@Sgolang-bin-1.19.13-1.el9_2.x86_64.rpmSgolang-docs-1.19.13-1.el9_2.noarch.rpmnSgo-toolset-1.19.13-1.el9_2.x86_64.rpmISgolang-race-1.19.13-1.el9_2.x86_64.rpmSgolang-misc-1.19.13-1.el9_2.noarch.rpmSgolang-tests-1.19.13-1.el9_2.noarch.rpmSgolang-src-1.19.13-1.el9_2.noarch.rpm?Sgolang-1.19.13-1.el9_2.x86_64.rpm@Sgolang-bin-1.19.13-1.el9_2.x86_64.rpmSgolang-docs-1.19.13-1.el9_2.noarch.rpmnSgo-toolset-1.19.13-1.el9_2.x86_64.rpmISgolang-race-1.19.13-1.el9_2.x86_64.rpmSgolang-misc-1.19.13-1.el9_2.noarch.rpmSgolang-tests-1.19.13-1.el9_2.noarch.rpm=C =kBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update=&https://access.redhat.com/errata/RHSA-2023:5744RHSA-2023:5744RHSA-2023:5744 https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://errata.almalinux.org/9/ALSA-2023-5744.htmlALSA-2023:5744ALSA-2023:5744 qzjava-11-openjdk-javadoc-zip-11.0.21.0.9-2.el9.x86_64.rpmnzjava-11-openjdk-devel-11.0.21.0.9-2.el9.x86_64.rpmmzjava-11-openjdk-demo-11.0.21.0.9-2.el9.x86_64.rpmtzjava-11-openjdk-static-libs-11.0.21.0.9-2.el9.x86_64.rpmpzjava-11-openjdk-javadoc-11.0.21.0.9-2.el9.x86_64.rpmrzjava-11-openjdk-jmods-11.0.21.0.9-2.el9.x86_64.rpmozjava-11-openjdk-headless-11.0.21.0.9-2.el9.x86_64.rpmlzjava-11-openjdk-11.0.21.0.9-2.el9.x86_64.rpmszjava-11-openjdk-src-11.0.21.0.9-2.el9.x86_64.rpm qzjava-11-openjdk-javadoc-zip-11.0.21.0.9-2.el9.x86_64.rpmnzjava-11-openjdk-devel-11.0.21.0.9-2.el9.x86_64.rpmmzjava-11-openjdk-demo-11.0.21.0.9-2.el9.x86_64.rpmtzjava-11-openjdk-static-libs-11.0.21.0.9-2.el9.x86_64.rpmpzjava-11-openjdk-javadoc-11.0.21.0.9-2.el9.x86_64.rpmrzjava-11-openjdk-jmods-11.0.21.0.9-2.el9.x86_64.rpmozjava-11-openjdk-headless-11.0.21.0.9-2.el9.x86_64.rpmlzjava-11-openjdk-11.0.21.0.9-2.el9.x86_64.rpmszjava-11-openjdk-src-11.0.21.0.9-2.el9.x86_64.rpm˶ D ~BBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security updatecohttps://access.redhat.com/errata/RHSA-2023:5749RHSA-2023:5749RHSA-2023:5749 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5749.htmlALSA-2023:5749ALSA-2023:5749 ?dotnet-hostfxr-7.0-7.0.12-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.112-1.el9_2.x86_64.rpmAdotnet-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmCdotnet-sdk-7.0-7.0.112-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.112-1.el9_2.x86_64.rpmdotnet-host-7.0.12-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.12-1.el9_2.x86_64.rpm ?dotnet-hostfxr-7.0-7.0.12-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.112-1.el9_2.x86_64.rpmAdotnet-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmCdotnet-sdk-7.0-7.0.112-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.112-1.el9_2.x86_64.rpmdotnet-host-7.0.12-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.12-1.el9_2.x86_64.rpmE %SBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix updateR<https://access.redhat.com/errata/RHSA-2023:5753RHSA-2023:5753RHSA-2023:5753 https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-5753.htmlALSA-2023:5753ALSA-2023:5753  java-17-openjdk-javadoc-zip-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-jmods-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-headless-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-javadoc-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-src-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-static-libs-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.9.0.9-2.el9.x86_64.rpm  java-17-openjdk-javadoc-zip-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-jmods-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-headless-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-javadoc-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-src-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-static-libs-17.0.9.0.9-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.9.0.9-2.el9.x86_64.rpm˩lF )fBsecurityImportant: curl security update}https://access.redhat.com/errata/RHSA-2023:5763RHSA-2023:5763RHSA-2023:5763 https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-5763.htmlALSA-2023:5763ALSA-2023:5763 qlibcurl-devel-7.76.1-23.el9_2.4.i686.rpmqlibcurl-devel-7.76.1-23.el9_2.4.x86_64.rpmqlibcurl-devel-7.76.1-23.el9_2.4.i686.rpmqlibcurl-devel-7.76.1-23.el9_2.4.x86_64.rpmeG 4jBBBBBBBBsecurityImportant: nodejs security update Mhttps://access.redhat.com/errata/RHSA-2023:5765RHSA-2023:5765RHSA-2023:5765 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5765.htmlALSA-2023:5765ALSA-2023:5765 Nnodejs-docs-16.20.2-3.el9_2.noarch.rpmnodejs-libs-16.20.2-3.el9_2.i686.rpmhnodejs-full-i18n-16.20.2-3.el9_2.x86_64.rpmnodejs-libs-16.20.2-3.el9_2.x86_64.rpmfnpm-8.19.4-1.16.20.2.3.el9_2.x86_64.rpm9nodejs-16.20.2-3.el9_2.x86_64.rpmNnodejs-docs-16.20.2-3.el9_2.noarch.rpmnodejs-libs-16.20.2-3.el9_2.i686.rpmhnodejs-full-i18n-16.20.2-3.el9_2.x86_64.rpmnodejs-libs-16.20.2-3.el9_2.x86_64.rpmfnpm-8.19.4-1.16.20.2.3.el9_2.x86_64.rpm9nodejs-16.20.2-3.el9_2.x86_64.rpm[H >uBF{BBBBBBBsecurityImportant: nodejs:18 security updateX https://access.redhat.com/errata/RHSA-2023:5849RHSA-2023:5849RHSA-2023:5849 https://access.redhat.com/security/cve/CVE-2023-38552CVE-2023-38552CVE-2023-38552https://access.redhat.com/security/cve/CVE-2023-39333CVE-2023-39333CVE-2023-39333https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://access.redhat.com/security/cve/CVE-2023-45143CVE-2023-45143CVE-2023-45143https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22441042244104https://bugzilla.redhat.com/22444152244415https://bugzilla.redhat.com/22444182244418https://errata.almalinux.org/9/ALSA-2023-5849.htmlALSA-2023:5849ALSA-2023:5849 94d(hDnodejs-full-i18n-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpmf npm-9.8.1-1.18.18.2.2.module_el9.2.0+43+3ebc9e20.x86_64.rpm[nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm9Dnodejs-18.18.2-2.module_el9.2.0+43+3ebc9e20.x86_64.rpmmnodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmNDnodejs-docs-18.18.2-2.module_el9.2.0+43+3ebc9e20.noarch.rpmmnodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmphp-pgsql-8.0.30-1.el9_2.x86_64.rpmX>php-enchant-8.0.30-1.el9_2.x86_64.rpmW>php-embedded-8.0.30-1.el9_2.x86_64.rpmY>php-ffi-8.0.30-1.el9_2.x86_64.rpmT>php-dba-8.0.30-1.el9_2.x86_64.rpmZ>php-fpm-8.0.30-1.el9_2.x86_64.rpm>php-8.0.30-1.el9_2.x86_64.rpm^>php-ldap-8.0.30-1.el9_2.x86_64.rpmg>php-soap-8.0.30-1.el9_2.x86_64.rpmh>php-xml-8.0.30-1.el9_2.x86_64.rpmc>php-pdo-8.0.30-1.el9_2.x86_64.rpmR>php-cli-8.0.30-1.el9_2.x86_64.rpmf>php-snmp-8.0.30-1.el9_2.x86_64.rpmU>php-dbg-8.0.30-1.el9_2.x86_64.rpma>php-odbc-8.0.30-1.el9_2.x86_64.rpmQ>php-bcmath-8.0.30-1.el9_2.x86_64.rpmb>php-opcache-8.0.30-1.el9_2.x86_64.rpme>php-process-8.0.30-1.el9_2.x86_64.rpm\>php-gmp-8.0.30-1.el9_2.x86_64.rpmS>php-common-8.0.30-1.el9_2.x86_64.rpm`>php-mysqlnd-8.0.30-1.el9_2.x86_64.rpm]>php-intl-8.0.30-1.el9_2.x86_64.rpm_>php-mbstring-8.0.30-1.el9_2.x86_64.rpmV>php-devel-8.0.30-1.el9_2.x86_64.rpm[>php-gd-8.0.30-1.el9_2.x86_64.rpmd>php-pgsql-8.0.30-1.el9_2.x86_64.rpmX>php-enchant-8.0.30-1.el9_2.x86_64.rpmW>php-embedded-8.0.30-1.el9_2.x86_64.rpmY>php-ffi-8.0.30-1.el9_2.x86_64.rpmT>php-dba-8.0.30-1.el9_2.x86_64.rpmZ>php-fpm-8.0.30-1.el9_2.x86_64.rpm>php-8.0.30-1.el9_2.x86_64.rpm^>php-ldap-8.0.30-1.el9_2.x86_64.rpmg>php-soap-8.0.30-1.el9_2.x86_64.rpmh>php-xml-8.0.30-1.el9_2.x86_64.rpmc>php-pdo-8.0.30-1.el9_2.x86_64.rpmR>php-cli-8.0.30-1.el9_2.x86_64.rpmf>php-snmp-8.0.30-1.el9_2.x86_64.rpmU>php-dbg-8.0.30-1.el9_2.x86_64.rpma>php-odbc-8.0.30-1.el9_2.x86_64.rpmQ>php-bcmath-8.0.30-1.el9_2.x86_64.rpmb>php-opcache-8.0.30-1.el9_2.x86_64.rpme>php-process-8.0.30-1.el9_2.x86_64.rpm\>php-gmp-8.0.30-1.el9_2.x86_64.rpmS>php-common-8.0.30-1.el9_2.x86_64.rpm`>php-mysqlnd-8.0.30-1.el9_2.x86_64.rpm]>php-intl-8.0.30-1.el9_2.x86_64.rpm_>php-mbstring-8.0.30-1.el9_2.x86_64.rpmV>php-devel-8.0.30-1.el9_2.x86_64.rpm[>php-gd-8.0.30-1.el9_2.x86_64.rpmdL {BBBBBBsecurityImportant: tomcat security update)https://access.redhat.com/errata/RHSA-2023:5929RHSA-2023:5929RHSA-2023:5929 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5929.htmlALSA-2023:5929ALSA-2023:5929 wtomcat-jsp-2.3-api-9.0.62-11.el9_2.3.noarch.rpm;wtomcat-admin-webapps-9.0.62-11.el9_2.3.noarch.rpm@wtomcat-servlet-4.0-api-9.0.62-11.el9_2.3.noarch.rpm=wtomcat-el-3.0-api-9.0.62-11.el9_2.3.noarch.rpmwtomcat-jsp-2.3-api-9.0.62-11.el9_2.3.noarch.rpm;wtomcat-admin-webapps-9.0.62-11.el9_2.3.noarch.rpm@wtomcat-servlet-4.0-api-9.0.62-11.el9_2.3.noarch.rpm=wtomcat-el-3.0-api-9.0.62-11.el9_2.3.noarch.rpmIM DBBsecurityModerate: toolbox security update( https://access.redhat.com/errata/RHSA-2023:6077RHSA-2023:6077RHSA-2023:6077 https://access.redhat.com/security/cve/CVE-2023-39325CVE-2023-39325CVE-2023-39325https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22432962243296https://errata.almalinux.org/9/ALSA-2023-6077.htmlALSA-2023:6077ALSA-2023:6077 .]toolbox-tests-0.0.99.3-10.el9_2.x86_64.rpm-]toolbox-0.0.99.3-10.el9_2.x86_64.rpm.]toolbox-tests-0.0.99.3-10.el9_2.x86_64.rpm-]toolbox-0.0.99.3-10.el9_2.x86_64.rpmN IBBBBBBBBBBBBBBBBsecurityModerate: nginx:1.22 security updateHQhttps://access.redhat.com/errata/RHSA-2023:6120RHSA-2023:6120RHSA-2023:6120 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-6120.htmlALSA-2023:6120ALSA-2023:6120 H&e( @jnginx-mod-http-xslt-filter-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm|jnginx-mod-devel-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm=jnginx-core-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpmHjnginx-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpmBjnginx-mod-stream-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpmdjnginx-all-modules-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.noarch.rpmejnginx-filesystem-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.noarch.rpm>jnginx-mod-http-image-filter-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpmAjnginx-mod-mail-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm?jnginx-mod-http-perl-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpmH&e( @jnginx-mod-http-xslt-filter-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm|jnginx-mod-devel-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm=jnginx-core-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpmHjnginx-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpmBjnginx-mod-stream-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpmdjnginx-all-modules-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.noarch.rpmejnginx-filesystem-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.noarch.rpm>jnginx-mod-http-image-filter-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpmAjnginx-mod-mail-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm?jnginx-mod-http-perl-1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1.x86_64.rpm`O \securityLow: libguestfs-winsupport security update*https://access.redhat.com/errata/RHSA-2023:6167RHSA-2023:6167RHSA-2023:6167 https://access.redhat.com/security/cve/CVE-2022-40284CVE-2022-40284CVE-2022-40284https://bugzilla.redhat.com/22361302236130https://errata.almalinux.org/9/ALSA-2023-6167.htmlALSA-2023:6167ALSA-2023:6167 Qlibguestfs-winsupport-9.2-2.el9_2.x86_64.rpmQlibguestfs-winsupport-9.2-2.el9_2.x86_64.rpmWP #_BBsecurityImportant: firefox security updateHhttps://access.redhat.com/errata/RHSA-2023:6188RHSA-2023:6188RHSA-2023:6188 https://access.redhat.com/security/cve/CVE-2023-44488CVE-2023-44488CVE-2023-44488https://access.redhat.com/security/cve/CVE-2023-5721CVE-2023-5721CVE-2023-5721https://access.redhat.com/security/cve/CVE-2023-5724CVE-2023-5724CVE-2023-5724https://access.redhat.com/security/cve/CVE-2023-5725CVE-2023-5725CVE-2023-5725https://access.redhat.com/security/cve/CVE-2023-5728CVE-2023-5728CVE-2023-5728https://access.redhat.com/security/cve/CVE-2023-5730CVE-2023-5730CVE-2023-5730https://access.redhat.com/security/cve/CVE-2023-5732CVE-2023-5732CVE-2023-5732https://bugzilla.redhat.com/22418062241806https://bugzilla.redhat.com/22458962245896https://bugzilla.redhat.com/22458982245898https://bugzilla.redhat.com/22458992245899https://bugzilla.redhat.com/22459002245900https://bugzilla.redhat.com/22459032245903https://bugzilla.redhat.com/22459062245906https://errata.almalinux.org/9/ALSA-2023-6188.htmlALSA-2023:6188ALSA-2023:6188 Q|firefox-x11-115.4.0-1.el9_2.alma.1.x86_64.rpm8|firefox-115.4.0-1.el9_2.alma.1.x86_64.rpmQ|firefox-x11-115.4.0-1.el9_2.alma.1.x86_64.rpm8|firefox-115.4.0-1.el9_2.alma.1.x86_64.rpmhQ &dsecurityImportant: thunderbird security updatechttps://access.redhat.com/errata/RHSA-2023:6191RHSA-2023:6191RHSA-2023:6191 https://access.redhat.com/security/cve/CVE-2023-44488CVE-2023-44488CVE-2023-44488https://access.redhat.com/security/cve/CVE-2023-5721CVE-2023-5721CVE-2023-5721https://access.redhat.com/security/cve/CVE-2023-5724CVE-2023-5724CVE-2023-5724https://access.redhat.com/security/cve/CVE-2023-5725CVE-2023-5725CVE-2023-5725https://access.redhat.com/security/cve/CVE-2023-5728CVE-2023-5728CVE-2023-5728https://access.redhat.com/security/cve/CVE-2023-5730CVE-2023-5730CVE-2023-5730https://access.redhat.com/security/cve/CVE-2023-5732CVE-2023-5732CVE-2023-5732https://bugzilla.redhat.com/22418062241806https://bugzilla.redhat.com/22458962245896https://bugzilla.redhat.com/22458982245898https://bugzilla.redhat.com/22458992245899https://bugzilla.redhat.com/22459002245900https://bugzilla.redhat.com/22459032245903https://bugzilla.redhat.com/22459062245906https://errata.almalinux.org/9/ALSA-2023-6191.htmlALSA-2023:6191ALSA-2023:6191 :Pthunderbird-115.4.1-1.el9_2.alma.x86_64.rpm:Pthunderbird-115.4.1-1.el9_2.alma.x86_64.rpm<R 7gBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security updatezQhttps://access.redhat.com/errata/RHSA-2023:6242RHSA-2023:6242RHSA-2023:6242 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6242.htmlALSA-2023:6242ALSA-2023:6242 Ldotnet-templates-6.0-6.0.124-1.el9_2.x86_64.rpmdotnet-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.24-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.24-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.24-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.24-1.el9_2.x86_64.rpmLdotnet-sdk-6.0-6.0.124-1.el9_2.x86_64.rpmLdotnet-templates-6.0-6.0.124-1.el9_2.x86_64.rpmdotnet-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpmaspnetcore-runtime-6.0-6.0.24-1.el9_2.x86_64.rpmdotnet-apphost-pack-6.0-6.0.24-1.el9_2.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpmdotnet-hostfxr-6.0-6.0.24-1.el9_2.x86_64.rpmdotnet-runtime-6.0-6.0.24-1.el9_2.x86_64.rpmLdotnet-sdk-6.0-6.0.124-1.el9_2.x86_64.rpmSy xBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security updateKQhttps://access.redhat.com/errata/RHSA-2023:6246RHSA-2023:6246RHSA-2023:6246 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6246.htmlALSA-2023:6246ALSA-2023:6246 ?dotnet-hostfxr-7.0-7.0.13-1.el9_2.x86_64.rpmCdotnet-sdk-7.0-7.0.113-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.13-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpmAdotnet-runtime-7.0-7.0.13-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.113-1.el9_2.x86_64.rpmdotnet-host-7.0.13-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.13-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.113-1.el9_2.x86_64.rpm ?dotnet-hostfxr-7.0-7.0.13-1.el9_2.x86_64.rpmCdotnet-sdk-7.0-7.0.113-1.el9_2.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.13-1.el9_2.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpmAdotnet-runtime-7.0-7.0.13-1.el9_2.x86_64.rpmGdotnet-templates-7.0-7.0.113-1.el9_2.x86_64.rpmdotnet-host-7.0.13-1.el9_2.x86_64.rpm9aspnetcore-runtime-7.0-7.0.13-1.el9_2.x86_64.rpmnetstandard-targeting-pack-2.1-7.0.113-1.el9_2.x86_64.rpmLT MBBBBBBBBBBBBsecurityImportant: ghostscript security updatehttps://access.redhat.com/errata/RHSA-2023:6265RHSA-2023:6265RHSA-2023:6265 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6265.htmlALSA-2023:6265ALSA-2023:6265 =#libgs-9.54.0-11.el9_2.x86_64.rpm6#ghostscript-tools-fonts-9.54.0-11.el9_2.x86_64.rpm=#libgs-9.54.0-11.el9_2.i686.rpm8#ghostscript-x11-9.54.0-11.el9_2.x86_64.rpm#ghostscript-doc-9.54.0-11.el9_2.noarch.rpm4#ghostscript-9.54.0-11.el9_2.x86_64.rpm5#ghostscript-tools-dvipdf-9.54.0-11.el9_2.x86_64.rpm7#ghostscript-tools-printing-9.54.0-11.el9_2.x86_64.rpm=#libgs-9.54.0-11.el9_2.x86_64.rpm6#ghostscript-tools-fonts-9.54.0-11.el9_2.x86_64.rpm=#libgs-9.54.0-11.el9_2.i686.rpm8#ghostscript-x11-9.54.0-11.el9_2.x86_64.rpm#ghostscript-doc-9.54.0-11.el9_2.noarch.rpm4#ghostscript-9.54.0-11.el9_2.x86_64.rpm5#ghostscript-tools-dvipdf-9.54.0-11.el9_2.x86_64.rpm7#ghostscript-tools-printing-9.54.0-11.el9_2.x86_64.rpmU \securityCritical: squid security update|1https://access.redhat.com/errata/RHSA-2023:6266RHSA-2023:6266RHSA-2023:6266 https://access.redhat.com/security/cve/CVE-2023-46846CVE-2023-46846CVE-2023-46846https://access.redhat.com/security/cve/CVE-2023-46847CVE-2023-46847CVE-2023-46847https://access.redhat.com/security/cve/CVE-2023-46848CVE-2023-46848CVE-2023-46848https://bugzilla.redhat.com/22459102245910https://bugzilla.redhat.com/22459162245916https://bugzilla.redhat.com/22459192245919https://errata.almalinux.org/9/ALSA-2023-6266.htmlALSA-2023:6266ALSA-2023:6266  squid-5.5-5.el9_2.1.x86_64.rpm squid-5.5-5.el9_2.1.x86_64.rpmTV !_securityModerate: python3.11-pip security updateN'https://access.redhat.com/errata/RHSA-2023:6324RHSA-2023:6324RHSA-2023:6324 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6324.htmlALSA-2023:6324ALSA-2023:6324 epython3.11-pip-wheel-22.3.1-4.el9.noarch.rpmdpython3.11-pip-22.3.1-4.el9.noarch.rpmepython3.11-pip-wheel-22.3.1-4.el9.noarch.rpmdpython3.11-pip-22.3.1-4.el9.noarch.rpm&W $bsecurityModerate: edk2 security, bug fix, and enhancement updateuBhttps://access.redhat.com/errata/RHSA-2023:6330RHSA-2023:6330RHSA-2023:6330 https://access.redhat.com/security/cve/CVE-2019-14560CVE-2019-14560CVE-2019-14560https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/18580381858038https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-6330.htmlALSA-2023:6330ALSA-2023:6330 3~edk2-aarch64-20230524-3.el9.noarch.rpm~edk2-ovmf-20230524-3.el9.noarch.rpm3~edk2-aarch64-20230524-3.el9.noarch.rpm~edk2-ovmf-20230524-3.el9.noarch.rpmX 1eBBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update7https://access.redhat.com/errata/RHSA-2023:6340RHSA-2023:6340RHSA-2023:6340 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6340.htmlALSA-2023:6340ALSA-2023:6340 `hxorg-x11-server-Xnest-1.20.11-19.el9.x86_64.rpmdhxorg-x11-server-common-1.20.11-19.el9.x86_64.rpmahxorg-x11-server-Xorg-1.20.11-19.el9.x86_64.rpm^hxorg-x11-server-Xdmx-1.20.11-19.el9.x86_64.rpmbhxorg-x11-server-Xvfb-1.20.11-19.el9.x86_64.rpm_hxorg-x11-server-Xephyr-1.20.11-19.el9.x86_64.rpm`hxorg-x11-server-Xnest-1.20.11-19.el9.x86_64.rpmdhxorg-x11-server-common-1.20.11-19.el9.x86_64.rpmahxorg-x11-server-Xorg-1.20.11-19.el9.x86_64.rpm^hxorg-x11-server-Xdmx-1.20.11-19.el9.x86_64.rpmbhxorg-x11-server-Xvfb-1.20.11-19.el9.x86_64.rpm_hxorg-x11-server-Xephyr-1.20.11-19.el9.x86_64.rpmY 4rsecurityModerate: xorg-x11-server-Xwayland security, bug fix, and enhancement update; https://access.redhat.com/errata/RHSA-2023:6341RHSA-2023:6341RHSA-2023:6341 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6341.htmlALSA-2023:6341ALSA-2023:6341 c,xorg-x11-server-Xwayland-22.1.9-2.el9.x86_64.rpmc,xorg-x11-server-Xwayland-22.1.9-2.el9.x86_64.rpmrZ 8uBsecurityModerate: LibRaw security updateHGhttps://access.redhat.com/errata/RHSA-2023:6343RHSA-2023:6343RHSA-2023:6343 https://access.redhat.com/security/cve/CVE-2021-32142CVE-2021-32142CVE-2021-32142https://bugzilla.redhat.com/21720042172004https://errata.almalinux.org/9/ALSA-2023-6343.htmlALSA-2023:6343ALSA-2023:6343  LibRaw-0.20.2-6.el9.x86_64.rpm LibRaw-0.20.2-6.el9.i686.rpm LibRaw-0.20.2-6.el9.x86_64.rpm LibRaw-0.20.2-6.el9.i686.rpm [ =yBBsecurityModerate: toolbox security and bug fix updatebhttps://access.redhat.com/errata/RHSA-2023:6346RHSA-2023:6346RHSA-2023:6346 https://access.redhat.com/security/cve/CVE-2022-3064CVE-2022-3064CVE-2022-3064https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21630372163037https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6346.htmlALSA-2023:6346ALSA-2023:6346 -`toolbox-0.0.99.4-6.el9_3.x86_64.rpm.`toolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm-`toolbox-0.0.99.4-6.el9_3.x86_64.rpm.`toolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm \ ~BBsecurityModerate: skopeo security updateqRhttps://access.redhat.com/errata/RHSA-2023:6363RHSA-2023:6363RHSA-2023:6363 https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24537CVE-2023-24537CVE-2023-24537https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21844842184484https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6363.htmlALSA-2023:6363ALSA-2023:6363 9%skopeo-tests-1.13.3-1.el9.x86_64.rpm8%skopeo-1.13.3-1.el9.x86_64.rpm9%skopeo-tests-1.13.3-1.el9.x86_64.rpm8%skopeo-1.13.3-1.el9.x86_64.rpm ] CsecurityModerate: mod_auth_openidc security and bug fix updateChttps://access.redhat.com/errata/RHSA-2023:6365RHSA-2023:6365RHSA-2023:6365 https://access.redhat.com/security/cve/CVE-2022-23527CVE-2022-23527CVE-2022-23527https://access.redhat.com/security/cve/CVE-2023-28625CVE-2023-28625CVE-2023-28625https://bugzilla.redhat.com/21536552153655https://bugzilla.redhat.com/21841182184118https://errata.almalinux.org/9/ALSA-2023-6365.htmlALSA-2023:6365ALSA-2023:6365 Jmod_auth_openidc-2.4.9.4-4.el9.x86_64.rpmJmod_auth_openidc-2.4.9.4-4.el9.x86_64.rpms^ ,FBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security, bug fix, and enhancement updateXrhttps://access.redhat.com/errata/RHSA-2023:6368RHSA-2023:6368RHSA-2023:6368 https://access.redhat.com/security/cve/CVE-2023-2680CVE-2023-2680CVE-2023-2680https://bugzilla.redhat.com/22033872203387https://errata.almalinux.org/9/ALSA-2023-6368.htmlALSA-2023:6368ALSA-2023:6368 PXqemu-kvm-block-rbd-8.0.0-16.el9_3.alma.1.x86_64.rpmZXqemu-kvm-ui-egl-headless-8.0.0-16.el9_3.alma.1.x86_64.rpmMXqemu-kvm-8.0.0-16.el9_3.alma.1.x86_64.rpm\Xqemu-pr-helper-8.0.0-16.el9_3.alma.1.x86_64.rpmKXqemu-guest-agent-8.0.0-16.el9_3.alma.1.x86_64.rpmSXqemu-kvm-device-display-virtio-gpu-8.0.0-16.el9_3.alma.1.x86_64.rpmQXqemu-kvm-common-8.0.0-16.el9_3.alma.1.x86_64.rpmNXqemu-kvm-audio-pa-8.0.0-16.el9_3.alma.1.x86_64.rpm2Xqemu-kvm-block-blkio-8.0.0-16.el9_3.alma.1.x86_64.rpmWXqemu-kvm-device-usb-redirect-8.0.0-16.el9_3.alma.1.x86_64.rpmXXqemu-kvm-docs-8.0.0-16.el9_3.alma.1.x86_64.rpmTXqemu-kvm-device-display-virtio-gpu-pci-8.0.0-16.el9_3.alma.1.x86_64.rpmVXqemu-kvm-device-usb-host-8.0.0-16.el9_3.alma.1.x86_64.rpmLXqemu-img-8.0.0-16.el9_3.alma.1.x86_64.rpm[Xqemu-kvm-ui-opengl-8.0.0-16.el9_3.alma.1.x86_64.rpmOXqemu-kvm-block-curl-8.0.0-16.el9_3.alma.1.x86_64.rpmUXqemu-kvm-device-display-virtio-vga-8.0.0-16.el9_3.alma.1.x86_64.rpmYXqemu-kvm-tools-8.0.0-16.el9_3.alma.1.x86_64.rpmRXqemu-kvm-core-8.0.0-16.el9_3.alma.1.x86_64.rpmPXqemu-kvm-block-rbd-8.0.0-16.el9_3.alma.1.x86_64.rpmZXqemu-kvm-ui-egl-headless-8.0.0-16.el9_3.alma.1.x86_64.rpmMXqemu-kvm-8.0.0-16.el9_3.alma.1.x86_64.rpm\Xqemu-pr-helper-8.0.0-16.el9_3.alma.1.x86_64.rpmKXqemu-guest-agent-8.0.0-16.el9_3.alma.1.x86_64.rpmSXqemu-kvm-device-display-virtio-gpu-8.0.0-16.el9_3.alma.1.x86_64.rpmQXqemu-kvm-common-8.0.0-16.el9_3.alma.1.x86_64.rpmNXqemu-kvm-audio-pa-8.0.0-16.el9_3.alma.1.x86_64.rpm2Xqemu-kvm-block-blkio-8.0.0-16.el9_3.alma.1.x86_64.rpmWXqemu-kvm-device-usb-redirect-8.0.0-16.el9_3.alma.1.x86_64.rpmXXqemu-kvm-docs-8.0.0-16.el9_3.alma.1.x86_64.rpmTXqemu-kvm-device-display-virtio-gpu-pci-8.0.0-16.el9_3.alma.1.x86_64.rpmVXqemu-kvm-device-usb-host-8.0.0-16.el9_3.alma.1.x86_64.rpmLXqemu-img-8.0.0-16.el9_3.alma.1.x86_64.rpm[Xqemu-kvm-ui-opengl-8.0.0-16.el9_3.alma.1.x86_64.rpmOXqemu-kvm-block-curl-8.0.0-16.el9_3.alma.1.x86_64.rpmUXqemu-kvm-device-display-virtio-vga-8.0.0-16.el9_3.alma.1.x86_64.rpmYXqemu-kvm-tools-8.0.0-16.el9_3.alma.1.x86_64.rpmRXqemu-kvm-core-8.0.0-16.el9_3.alma.1.x86_64.rpm"_ mBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qt5 security and bug fix updateJ https://access.redhat.com/errata/RHSA-2023:6369RHSA-2023:6369RHSA-2023:6369 https://access.redhat.com/security/cve/CVE-2023-32573CVE-2023-32573CVE-2023-32573https://access.redhat.com/security/cve/CVE-2023-33285CVE-2023-33285CVE-2023-33285https://access.redhat.com/security/cve/CVE-2023-34410CVE-2023-34410CVE-2023-34410https://access.redhat.com/security/cve/CVE-2023-37369CVE-2023-37369CVE-2023-37369https://access.redhat.com/security/cve/CVE-2023-38197CVE-2023-38197CVE-2023-38197https://bugzilla.redhat.com/22081352208135https://bugzilla.redhat.com/22094882209488https://bugzilla.redhat.com/22127472212747https://bugzilla.redhat.com/22227672222767https://bugzilla.redhat.com/22321732232173https://errata.almalinux.org/9/ALSA-2023-6369.htmlALSA-2023:6369ALSA-2023:6369 kyqt5-qtbase-postgresql-5.15.9-7.el9.i686.rpmfyqt5-qtbase-devel-5.15.9-7.el9.i686.rpmhyqt5-qtbase-gui-5.15.9-7.el9.x86_64.rpmeyqt5-qtbase-5.15.9-7.el9.i686.rpmq7qt5-5.15.9-1.el9.noarch.rpmiyqt5-qtbase-mysql-5.15.9-7.el9.i686.rpmjyqt5-qtbase-odbc-5.15.9-7.el9.x86_64.rpmjyqt5-qtbase-odbc-5.15.9-7.el9.i686.rpmlyqt5-qtbase-private-devel-5.15.9-7.el9.i686.rpmr7qt5-rpm-macros-5.15.9-1.el9.noarch.rpmkyqt5-qtbase-postgresql-5.15.9-7.el9.x86_64.rpmJyqt5-qtbase-common-5.15.9-7.el9.noarch.rpmhyqt5-qtbase-gui-5.15.9-7.el9.i686.rpms7qt5-srpm-macros-5.15.9-1.el9.noarch.rpmeyqt5-qtbase-5.15.9-7.el9.x86_64.rpmlyqt5-qtbase-private-devel-5.15.9-7.el9.x86_64.rpmiyqt5-qtbase-mysql-5.15.9-7.el9.x86_64.rpmgyqt5-qtbase-examples-5.15.9-7.el9.i686.rpmfyqt5-qtbase-devel-5.15.9-7.el9.x86_64.rpmgyqt5-qtbase-examples-5.15.9-7.el9.x86_64.rpmkyqt5-qtbase-postgresql-5.15.9-7.el9.i686.rpmfyqt5-qtbase-devel-5.15.9-7.el9.i686.rpmhyqt5-qtbase-gui-5.15.9-7.el9.x86_64.rpmeyqt5-qtbase-5.15.9-7.el9.i686.rpmq7qt5-5.15.9-1.el9.noarch.rpmiyqt5-qtbase-mysql-5.15.9-7.el9.i686.rpmjyqt5-qtbase-odbc-5.15.9-7.el9.x86_64.rpmjyqt5-qtbase-odbc-5.15.9-7.el9.i686.rpmlyqt5-qtbase-private-devel-5.15.9-7.el9.i686.rpmr7qt5-rpm-macros-5.15.9-1.el9.noarch.rpmkyqt5-qtbase-postgresql-5.15.9-7.el9.x86_64.rpmJyqt5-qtbase-common-5.15.9-7.el9.noarch.rpmhyqt5-qtbase-gui-5.15.9-7.el9.i686.rpms7qt5-srpm-macros-5.15.9-1.el9.noarch.rpmeyqt5-qtbase-5.15.9-7.el9.x86_64.rpmlyqt5-qtbase-private-devel-5.15.9-7.el9.x86_64.rpmiyqt5-qtbase-mysql-5.15.9-7.el9.x86_64.rpmgyqt5-qtbase-examples-5.15.9-7.el9.i686.rpmfyqt5-qtbase-devel-5.15.9-7.el9.x86_64.rpmgyqt5-qtbase-examples-5.15.9-7.el9.x86_64.rpmf` securityModerate: cloud-init security, bug fix, and enhancement updateghttps://access.redhat.com/errata/RHSA-2023:6371RHSA-2023:6371RHSA-2023:6371 https://access.redhat.com/security/cve/CVE-2023-1786CVE-2023-1786CVE-2023-1786https://bugzilla.redhat.com/21900792190079https://errata.almalinux.org/9/ALSA-2023-6371.htmlALSA-2023:6371ALSA-2023:6371  )cloud-init-23.1.1-11.el9.alma.1.noarch.rpm )cloud-init-23.1.1-11.el9.alma.1.noarch.rpm?a LBBBBBBBsecurityLow: gdb security update*fDhttps://access.redhat.com/errata/RHSA-2023:6372RHSA-2023:6372RHSA-2023:6372 https://access.redhat.com/security/cve/CVE-2021-3826CVE-2021-3826CVE-2021-3826https://bugzilla.redhat.com/21226272122627https://errata.almalinux.org/9/ALSA-2023-6372.htmlALSA-2023:6372ALSA-2023:6372 [5gdb-10.2-11.el9.x86_64.rpm]5gdb-headless-10.2-11.el9.x86_64.rpm\5gdb-doc-10.2-11.el9.noarch.rpm\5gdb-gdbserver-10.2-11.el9.x86_64.rpm^5gdb-minimal-10.2-11.el9.x86_64.rpm[5gdb-10.2-11.el9.x86_64.rpm]5gdb-headless-10.2-11.el9.x86_64.rpm\5gdb-doc-10.2-11.el9.noarch.rpm\5gdb-gdbserver-10.2-11.el9.x86_64.rpm^5gdb-minimal-10.2-11.el9.x86_64.rpmeb VsecurityModerate: runc security update*Y https://access.redhat.com/errata/RHSA-2023:6380RHSA-2023:6380RHSA-2023:6380 https://access.redhat.com/security/cve/CVE-2021-43784CVE-2021-43784CVE-2021-43784https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2023-25809CVE-2023-25809CVE-2023-25809https://access.redhat.com/security/cve/CVE-2023-27561CVE-2023-27561CVE-2023-27561https://access.redhat.com/security/cve/CVE-2023-28642CVE-2023-28642CVE-2023-28642https://bugzilla.redhat.com/20294392029439https://bugzilla.redhat.com/21757212175721https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21828832182883https://bugzilla.redhat.com/21828842182884https://errata.almalinux.org/9/ALSA-2023-6380.htmlALSA-2023:6380ALSA-2023:6380  erunc-1.1.9-1.el9.x86_64.rpm erunc-1.1.9-1.el9.x86_64.rpmtc YBBsecurityModerate: liblouis security updateIhttps://access.redhat.com/errata/RHSA-2023:6385RHSA-2023:6385RHSA-2023:6385 https://access.redhat.com/security/cve/CVE-2023-26767CVE-2023-26767CVE-2023-26767https://access.redhat.com/security/cve/CVE-2023-26768CVE-2023-26768CVE-2023-26768https://access.redhat.com/security/cve/CVE-2023-26769CVE-2023-26769CVE-2023-26769https://bugzilla.redhat.com/21811352181135https://bugzilla.redhat.com/21811392181139https://bugzilla.redhat.com/21811432181143https://errata.almalinux.org/9/ALSA-2023-6385.htmlALSA-2023:6385ALSA-2023:6385 =Aliblouis-3.16.1-5.el9.i686.rpm=Aliblouis-3.16.1-5.el9.x86_64.rpm]Apython3-louis-3.16.1-5.el9.noarch.rpm=Aliblouis-3.16.1-5.el9.i686.rpm=Aliblouis-3.16.1-5.el9.x86_64.rpm]Apython3-louis-3.16.1-5.el9.noarch.rpmRd ^securityModerate: containernetworking-plugins security and bug fix updateLLhttps://access.redhat.com/errata/RHSA-2023:6402RHSA-2023:6402RHSA-2023:6402 https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6402.htmlALSA-2023:6402ALSA-2023:6402 ^econtainernetworking-plugins-1.3.0-4.el9.x86_64.rpm^econtainernetworking-plugins-1.3.0-4.el9.x86_64.rpmte 5aBBBBBBBBBBBBBBBBBBsecurityModerate: httpd and mod_http2 security, bug fix, and enhancement updatemhttps://access.redhat.com/errata/RHSA-2023:6403RHSA-2023:6403RHSA-2023:6403 https://access.redhat.com/security/cve/CVE-2023-27522CVE-2023-27522CVE-2023-27522https://bugzilla.redhat.com/21762112176211https://errata.almalinux.org/9/ALSA-2023-6403.htmlALSA-2023:6403ALSA-2023:6403 ~Fmod_ldap-2.4.57-5.el9.x86_64.rpm0Fhttpd-filesystem-2.4.57-5.el9.noarch.rpmjFhttpd-devel-2.4.57-5.el9.x86_64.rpmhFhttpd-2.4.57-5.el9.x86_64.rpmmod_proxy_html-2.4.57-5.el9.x86_64.rpmFmod_session-2.4.57-5.el9.x86_64.rpmFmod_lua-2.4.57-5.el9.x86_64.rpm1Fhttpd-manual-2.4.57-5.el9.noarch.rpmmod_ssl-2.4.57-5.el9.x86_64.rpmkFhttpd-tools-2.4.57-5.el9.x86_64.rpmiFhttpd-core-2.4.57-5.el9.x86_64.rpm ~Fmod_ldap-2.4.57-5.el9.x86_64.rpm0Fhttpd-filesystem-2.4.57-5.el9.noarch.rpmjFhttpd-devel-2.4.57-5.el9.x86_64.rpmhFhttpd-2.4.57-5.el9.x86_64.rpmmod_proxy_html-2.4.57-5.el9.x86_64.rpmFmod_session-2.4.57-5.el9.x86_64.rpmFmod_lua-2.4.57-5.el9.x86_64.rpm1Fhttpd-manual-2.4.57-5.el9.noarch.rpmmod_ssl-2.4.57-5.el9.x86_64.rpmkFhttpd-tools-2.4.57-5.el9.x86_64.rpmiFhttpd-core-2.4.57-5.el9.x86_64.rpm3f ,vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security, bug fix, and enhancement updatehttps://access.redhat.com/errata/RHSA-2023:6409RHSA-2023:6409RHSA-2023:6409 https://access.redhat.com/security/cve/CVE-2023-3750CVE-2023-3750CVE-2023-3750https://bugzilla.redhat.com/22222102222210https://errata.almalinux.org/9/ALSA-2023-6409.htmlALSA-2023:6409ALSA-2023:6409 5libvirt-daemon-driver-storage-disk-9.5.0-7.el9_3.alma.1.x86_64.rpm:5libvirt-daemon-log-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-kvm-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-rbd-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-client-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-libs-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-config-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-interface-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-scsi-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-logical-9.5.0-7.el9_3.alma.1.x86_64.rpm 5libvirt-daemon-driver-secret-9.5.0-7.el9_3.alma.1.x86_64.rpm85libvirt-daemon-common-9.5.0-7.el9_3.alma.1.x86_64.rpm 5libvirt-daemon-driver-nodedev-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-config-network-9.5.0-7.el9_3.alma.1.x86_64.rpm 5libvirt-daemon-driver-network-9.5.0-7.el9_3.alma.1.x86_64.rpm95libvirt-daemon-lock-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-core-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-nss-9.5.0-7.el9_3.alma.1.x86_64.rpm;5libvirt-daemon-plugin-lockd-9.5.0-7.el9_3.alma.1.x86_64.rpm<5libvirt-daemon-proxy-9.5.0-7.el9_3.alma.1.x86_64.rpm 5libvirt-daemon-driver-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm 5libvirt-daemon-driver-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-mpath-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-iscsi-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-disk-9.5.0-7.el9_3.alma.1.x86_64.rpm:5libvirt-daemon-log-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-kvm-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-rbd-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-client-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-libs-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-config-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-interface-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-scsi-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-logical-9.5.0-7.el9_3.alma.1.x86_64.rpm 5libvirt-daemon-driver-secret-9.5.0-7.el9_3.alma.1.x86_64.rpm85libvirt-daemon-common-9.5.0-7.el9_3.alma.1.x86_64.rpm 5libvirt-daemon-driver-nodedev-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-config-network-9.5.0-7.el9_3.alma.1.x86_64.rpm 5libvirt-daemon-driver-network-9.5.0-7.el9_3.alma.1.x86_64.rpm95libvirt-daemon-lock-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-core-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-nss-9.5.0-7.el9_3.alma.1.x86_64.rpm;5libvirt-daemon-plugin-lockd-9.5.0-7.el9_3.alma.1.x86_64.rpm<5libvirt-daemon-proxy-9.5.0-7.el9_3.alma.1.x86_64.rpm 5libvirt-daemon-driver-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpm 5libvirt-daemon-driver-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-mpath-9.5.0-7.el9_3.alma.1.x86_64.rpm5libvirt-daemon-driver-storage-iscsi-9.5.0-7.el9_3.alma.1.x86_64.rpm~g /msecurityModerate: grafana security and enhancement updateqhttps://access.redhat.com/errata/RHSA-2023:6420RHSA-2023:6420RHSA-2023:6420 https://access.redhat.com/security/cve/CVE-2022-23552CVE-2022-23552CVE-2022-23552https://access.redhat.com/security/cve/CVE-2022-31123CVE-2022-31123CVE-2022-31123https://access.redhat.com/security/cve/CVE-2022-31130CVE-2022-31130CVE-2022-31130https://access.redhat.com/security/cve/CVE-2022-39201CVE-2022-39201CVE-2022-39201https://access.redhat.com/security/cve/CVE-2022-39306CVE-2022-39306CVE-2022-39306https://access.redhat.com/security/cve/CVE-2022-39307CVE-2022-39307CVE-2022-39307https://access.redhat.com/security/cve/CVE-2022-39324CVE-2022-39324CVE-2022-39324https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://bugzilla.redhat.com/21311462131146https://bugzilla.redhat.com/21311472131147https://bugzilla.redhat.com/21311482131148https://bugzilla.redhat.com/21380142138014https://bugzilla.redhat.com/21380152138015https://bugzilla.redhat.com/21482522148252https://bugzilla.redhat.com/21584202158420https://bugzilla.redhat.com/21612742161274https://bugzilla.redhat.com/21844832184483https://errata.almalinux.org/9/ALSA-2023-6420.htmlALSA-2023:6420ALSA-2023:6420 ografana-9.2.10-7.el9_3.alma.1.x86_64.rpmografana-9.2.10-7.el9_3.alma.1.x86_64.rpmuh 6pBBBBsecurityLow: libpq security update*Dhttps://access.redhat.com/errata/RHSA-2023:6429RHSA-2023:6429RHSA-2023:6429 https://access.redhat.com/security/cve/CVE-2022-41862CVE-2022-41862CVE-2022-41862https://bugzilla.redhat.com/21657222165722https://errata.almalinux.org/9/ALSA-2023-6429.htmlALSA-2023:6429ALSA-2023:6429 [libpq-13.11-1.el9.i686.rpm\libpq-devel-13.11-1.el9.x86_64.rpm\libpq-devel-13.11-1.el9.i686.rpm[libpq-13.11-1.el9.x86_64.rpm[libpq-13.11-1.el9.i686.rpm\libpq-devel-13.11-1.el9.x86_64.rpm\libpq-devel-13.11-1.el9.i686.rpm[libpq-13.11-1.el9.x86_64.rpmOi :wBsecurityModerate: libfastjson security updateI[https://access.redhat.com/errata/RHSA-2023:6431RHSA-2023:6431RHSA-2023:6431 https://access.redhat.com/security/cve/CVE-2020-12762CVE-2020-12762CVE-2020-12762https://bugzilla.redhat.com/18352531835253https://errata.almalinux.org/9/ALSA-2023-6431.htmlALSA-2023:6431ALSA-2023:6431 4libfastjson-0.99.9-5.el9.i686.rpm4libfastjson-0.99.9-5.el9.x86_64.rpm4libfastjson-0.99.9-5.el9.i686.rpm4libfastjson-0.99.9-5.el9.x86_64.rpmj >{BsecurityModerate: frr security and bug fix update$ https://access.redhat.com/errata/RHSA-2023:6434RHSA-2023:6434RHSA-2023:6434 https://access.redhat.com/security/cve/CVE-2022-36440CVE-2022-36440CVE-2022-36440https://access.redhat.com/security/cve/CVE-2022-40302CVE-2022-40302CVE-2022-40302https://access.redhat.com/security/cve/CVE-2022-40318CVE-2022-40318CVE-2022-40318https://access.redhat.com/security/cve/CVE-2022-43681CVE-2022-43681CVE-2022-43681https://bugzilla.redhat.com/21844682184468https://bugzilla.redhat.com/21960882196088https://bugzilla.redhat.com/21960902196090https://bugzilla.redhat.com/21960912196091https://errata.almalinux.org/9/ALSA-2023-6434.htmlALSA-2023:6434ALSA-2023:6434 Wxfrr-selinux-8.3.1-11.el9_3.alma.1.noarch.rpmAxfrr-8.3.1-11.el9_3.alma.1.x86_64.rpmWxfrr-selinux-8.3.1-11.el9_3.alma.1.noarch.rpmAxfrr-8.3.1-11.el9_3.alma.1.x86_64.rpmHk BBBsecurityModerate: wireshark security update7Ghttps://access.redhat.com/errata/RHSA-2023:6469RHSA-2023:6469RHSA-2023:6469 https://access.redhat.com/security/cve/CVE-2023-0666CVE-2023-0666CVE-2023-0666https://access.redhat.com/security/cve/CVE-2023-0668CVE-2023-0668CVE-2023-0668https://access.redhat.com/security/cve/CVE-2023-2855CVE-2023-2855CVE-2023-2855https://access.redhat.com/security/cve/CVE-2023-2856CVE-2023-2856CVE-2023-2856https://access.redhat.com/security/cve/CVE-2023-2858CVE-2023-2858CVE-2023-2858https://access.redhat.com/security/cve/CVE-2023-2952CVE-2023-2952CVE-2023-2952https://bugzilla.redhat.com/22108222210822https://bugzilla.redhat.com/22108242210824https://bugzilla.redhat.com/22108292210829https://bugzilla.redhat.com/22108322210832https://bugzilla.redhat.com/22108352210835https://bugzilla.redhat.com/22114062211406https://errata.almalinux.org/9/ALSA-2023-6469.htmlALSA-2023:6469ALSA-2023:6469 rhwireshark-cli-3.4.10-6.el9.x86_64.rpmhwireshark-3.4.10-6.el9.x86_64.rpmrhwireshark-cli-3.4.10-6.el9.i686.rpmrhwireshark-cli-3.4.10-6.el9.x86_64.rpmhwireshark-3.4.10-6.el9.x86_64.rpmrhwireshark-cli-3.4.10-6.el9.i686.rpm2l EBBsecurityModerate: buildah security update~https://access.redhat.com/errata/RHSA-2023:6473RHSA-2023:6473RHSA-2023:6473 https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-25173CVE-2023-25173CVE-2023-25173https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21744852174485https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6473.htmlALSA-2023:6473ALSA-2023:6473 9buildah-tests-1.31.3-1.el9.x86_64.rpm8buildah-1.31.3-1.el9.x86_64.rpm9buildah-tests-1.31.3-1.el9.x86_64.rpm8buildah-1.31.3-1.el9.x86_64.rpmm JBBBBBBBBBsecurityModerate: podman security, bug fix, and enhancement updatehttps://access.redhat.com/errata/RHSA-2023:6474RHSA-2023:6474RHSA-2023:6474 https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24537CVE-2023-24537CVE-2023-24537https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-25173CVE-2023-25173CVE-2023-25173https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://access.redhat.com/security/cve/CVE-2023-3978CVE-2023-3978CVE-2023-3978https://bugzilla.redhat.com/21744852174485https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21844842184484https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://bugzilla.redhat.com/22286892228689https://errata.almalinux.org/9/ALSA-2023-6474.htmlALSA-2023:6474ALSA-2023:6474 2%podman-4.6.1-5.el9.x86_64.rpmg%podman-docker-4.6.1-5.el9.noarch.rpm3%podman-plugins-4.6.1-5.el9.x86_64.rpmE%podman-gvproxy-4.6.1-5.el9.x86_64.rpm4%podman-remote-4.6.1-5.el9.x86_64.rpm5%podman-tests-4.6.1-5.el9.x86_64.rpm2%podman-4.6.1-5.el9.x86_64.rpmg%podman-docker-4.6.1-5.el9.noarch.rpm3%podman-plugins-4.6.1-5.el9.x86_64.rpmE%podman-gvproxy-4.6.1-5.el9.x86_64.rpm4%podman-remote-4.6.1-5.el9.x86_64.rpm5%podman-tests-4.6.1-5.el9.x86_64.rpmIn VBBBsecurityModerate: librabbitmq security updateWhttps://access.redhat.com/errata/RHSA-2023:6482RHSA-2023:6482RHSA-2023:6482 https://access.redhat.com/security/cve/CVE-2023-35789CVE-2023-35789CVE-2023-35789https://bugzilla.redhat.com/22157622215762https://errata.almalinux.org/9/ALSA-2023-6482.htmlALSA-2023:6482ALSA-2023:6482 ,Llibrabbitmq-tools-0.11.0-7.el9.x86_64.rpmCLlibrabbitmq-0.11.0-7.el9.x86_64.rpmCLlibrabbitmq-0.11.0-7.el9.i686.rpm,Llibrabbitmq-tools-0.11.0-7.el9.x86_64.rpmCLlibrabbitmq-0.11.0-7.el9.x86_64.rpmCLlibrabbitmq-0.11.0-7.el9.i686.rpm4o \securityModerate: tang security updatet4https://access.redhat.com/errata/RHSA-2023:6492RHSA-2023:6492RHSA-2023:6492 https://access.redhat.com/security/cve/CVE-2023-1672CVE-2023-1672CVE-2023-1672https://bugzilla.redhat.com/21809992180999https://errata.almalinux.org/9/ALSA-2023-6492.htmlALSA-2023:6492ALSA-2023:6492 `tang-14-2.el9.x86_64.rpm`tang-14-2.el9.x86_64.rpmxp )_BBBBBBBBsecurityModerate: python3.11 security update(bhttps://access.redhat.com/errata/RHSA-2023:6494RHSA-2023:6494RHSA-2023:6494 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://access.redhat.com/security/cve/CVE-2023-41105CVE-2023-41105CVE-2023-41105https://bugzilla.redhat.com/22357952235795https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6494.htmlALSA-2023:6494ALSA-2023:6494 aCpython3.11-libs-3.11.5-1.el9_3.i686.rpmjCpython3.11-tkinter-3.11.5-1.el9_3.x86_64.rpmaCpython3.11-libs-3.11.5-1.el9_3.x86_64.rpm`Cpython3.11-devel-3.11.5-1.el9_3.i686.rpmiCpython3.11-3.11.5-1.el9_3.x86_64.rpm`Cpython3.11-devel-3.11.5-1.el9_3.x86_64.rpmaCpython3.11-libs-3.11.5-1.el9_3.i686.rpmjCpython3.11-tkinter-3.11.5-1.el9_3.x86_64.rpmaCpython3.11-libs-3.11.5-1.el9_3.x86_64.rpm`Cpython3.11-devel-3.11.5-1.el9_3.i686.rpmiCpython3.11-3.11.5-1.el9_3.x86_64.rpm`Cpython3.11-devel-3.11.5-1.el9_3.x86_64.rpmqy ,jsecurityModerate: haproxy security and bug fix update https://access.redhat.com/errata/RHSA-2023:6496RHSA-2023:6496RHSA-2023:6496 https://access.redhat.com/security/cve/CVE-2023-0836CVE-2023-0836CVE-2023-0836https://bugzilla.redhat.com/21807462180746https://errata.almalinux.org/9/ALSA-2023-6496.htmlALSA-2023:6496ALSA-2023:6496 Hhaproxy-2.4.22-1.el9.x86_64.rpmHhaproxy-2.4.22-1.el9.x86_64.rpmyr 7mBBBBBBBBsecurityModerate: libX11 security update6https://access.redhat.com/errata/RHSA-2023:6497RHSA-2023:6497RHSA-2023:6497 https://access.redhat.com/security/cve/CVE-2023-3138CVE-2023-3138CVE-2023-3138https://bugzilla.redhat.com/22137482213748https://errata.almalinux.org/9/ALSA-2023-6497.htmlALSA-2023:6497ALSA-2023:6497 NulibX11-common-1.7.0-8.el9.noarch.rpmulibX11-devel-1.7.0-8.el9.i686.rpmulibX11-xcb-1.7.0-8.el9.i686.rpmulibX11-devel-1.7.0-8.el9.x86_64.rpmulibX11-1.7.0-8.el9.i686.rpmulibX11-1.7.0-8.el9.x86_64.rpmulibX11-xcb-1.7.0-8.el9.x86_64.rpmNulibX11-common-1.7.0-8.el9.noarch.rpmulibX11-devel-1.7.0-8.el9.i686.rpmulibX11-xcb-1.7.0-8.el9.i686.rpmulibX11-devel-1.7.0-8.el9.x86_64.rpmulibX11-1.7.0-8.el9.i686.rpmulibX11-1.7.0-8.el9.x86_64.rpmulibX11-xcb-1.7.0-8.el9.x86_64.rpmzs 2xBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security updateM/ https://access.redhat.com/errata/RHSA-2023:6508RHSA-2023:6508RHSA-2023:6508 https://access.redhat.com/security/cve/CVE-2022-38745CVE-2022-38745CVE-2022-38745https://access.redhat.com/security/cve/CVE-2023-0950CVE-2023-0950CVE-2023-0950https://access.redhat.com/security/cve/CVE-2023-1183CVE-2023-1183CVE-2023-1183https://access.redhat.com/security/cve/CVE-2023-2255CVE-2023-2255CVE-2023-2255https://bugzilla.redhat.com/21820442182044https://bugzilla.redhat.com/22085062208506https://bugzilla.redhat.com/22101852210185https://bugzilla.redhat.com/22101862210186https://errata.almalinux.org/9/ALSA-2023-6508.htmlALSA-2023:6508ALSA-2023:6508 1wlibreoffice-help-si-7.1.8.1-11.el9.alma.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-11.el9.alma.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-11.el9.alma.x86_64.rpm.libreoffice-langpack-or-7.1.8.1-11.el9.alma.x86_64.rpm$libreoffice-langpack-lt-7.1.8.1-11.el9.alma.x86_64.rpmmlibreoffice-help-lt-7.1.8.1-11.el9.alma.x86_64.rpmolibreoffice-help-nb-7.1.8.1-11.el9.alma.x86_64.rpmYlibreoffice-help-de-7.1.8.1-11.el9.alma.x86_64.rpm=libreoffice-langpack-te-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-id-7.1.8.1-11.el9.alma.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-11.el9.alma.x86_64.rpmWlibreoffice-help-cs-7.1.8.1-11.el9.alma.x86_64.rpmplibreoffice-help-nl-7.1.8.1-11.el9.alma.x86_64.rpm_libreoffice-help-et-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-it-7.1.8.1-11.el9.alma.noarch.rpmllibreoffice-help-ko-7.1.8.1-11.el9.alma.x86_64.rpmAlibreoffice-langpack-ts-7.1.8.1-11.el9.alma.x86_64.rpm-autocorr-sv-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-fi-7.1.8.1-11.el9.alma.x86_64.rpm7libreoffice-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-11.el9.alma.x86_64.rpmNlibreoffice-writer-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-11.el9.alma.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-11.el9.alma.x86_64.rpm{libreoffice-help-ta-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ga-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-11.el9.alma.x86_64.rpmnlibreoffice-help-lv-7.1.8.1-11.el9.alma.x86_64.rpmLlibreoffice-ure-7.1.8.1-11.el9.alma.x86_64.rpmxlibreoffice-help-sk-7.1.8.1-11.el9.alma.x86_64.rpmDlibreoffice-data-7.1.8.1-11.el9.alma.noarch.rpmautocorr-fa-7.1.8.1-11.el9.alma.noarch.rpmhlibreoffice-help-hu-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-11.el9.alma.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-11.el9.alma.noarch.rpmDlibreoffice-langpack-xh-7.1.8.1-11.el9.alma.x86_64.rpm6libreoffice-langpack-sk-7.1.8.1-11.el9.alma.x86_64.rpm#libreoffice-langpack-ko-7.1.8.1-11.el9.alma.x86_64.rpm`libreoffice-help-eu-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-fr-7.1.8.1-11.el9.alma.x86_64.rpmklibreoffice-help-ja-7.1.8.1-11.el9.alma.x86_64.rpm;libreoffice-langpack-sv-7.1.8.1-11.el9.alma.x86_64.rpmdlibreoffice-help-gu-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-de-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-dsb-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-as-7.1.8.1-11.el9.alma.x86_64.rpm0autocorr-vro-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-af-7.1.8.1-11.el9.alma.x86_64.rpmNlibreoffice-emailmerge-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-en-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-hu-7.1.8.1-11.el9.alma.x86_64.rpm$autocorr-mn-7.1.8.1-11.el9.alma.noarch.rpmautocorr-hsb-7.1.8.1-11.el9.alma.noarch.rpmautocorr-bg-7.1.8.1-11.el9.alma.noarch.rpm libreoffice-langpack-el-7.1.8.1-11.el9.alma.x86_64.rpm[libreoffice-help-el-7.1.8.1-11.el9.alma.x86_64.rpmMlibreoffice-wiki-publisher-7.1.8.1-11.el9.alma.x86_64.rpm]libreoffice-help-eo-7.1.8.1-11.el9.alma.x86_64.rpm-libreoffice-langpack-nso-7.1.8.1-11.el9.alma.x86_64.rpmElibreoffice-opensymbol-fonts-7.1.8.1-11.el9.alma.noarch.rpm!autocorr-ko-7.1.8.1-11.el9.alma.noarch.rpm/libreoffice-langpack-pa-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-fy-7.1.8.1-11.el9.alma.x86_64.rpm*autocorr-sk-7.1.8.1-11.el9.alma.noarch.rpm*libreoffice-langpack-nl-7.1.8.1-11.el9.alma.x86_64.rpm.autocorr-tr-7.1.8.1-11.el9.alma.noarch.rpmVlibreoffice-help-ca-7.1.8.1-11.el9.alma.x86_64.rpmflibreoffice-help-hi-7.1.8.1-11.el9.alma.x86_64.rpm\libreoffice-help-en-7.1.8.1-11.el9.alma.x86_64.rpmBlibreoffice-langpack-uk-7.1.8.1-11.el9.alma.x86_64.rpm/autocorr-vi-7.1.8.1-11.el9.alma.noarch.rpm'libreoffice-langpack-ml-7.1.8.1-11.el9.alma.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-11.el9.alma.x86_64.rpm%autocorr-nl-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-en-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-hi-7.1.8.1-11.el9.alma.x86_64.rpmRlibreoffice-gtk3-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-fr-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-cs-7.1.8.1-11.el9.alma.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpmKlibreoffice-pyuno-7.1.8.1-11.el9.alma.x86_64.rpm&libreoffice-langpack-mai-7.1.8.1-11.el9.alma.x86_64.rpmglibreoffice-help-hr-7.1.8.1-11.el9.alma.x86_64.rpmilibreoffice-help-id-7.1.8.1-11.el9.alma.x86_64.rpmZlibreoffice-help-dz-7.1.8.1-11.el9.alma.x86_64.rpm'autocorr-pt-7.1.8.1-11.el9.alma.noarch.rpmPlibreoffice-xsltfilter-7.1.8.1-11.el9.alma.x86_64.rpm:libreoffice-langpack-st-7.1.8.1-11.el9.alma.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-11.el9.alma.x86_64.rpmLlibreoffice-core-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-gl-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-da-7.1.8.1-11.el9.alma.x86_64.rpmMlibreoffice-draw-7.1.8.1-11.el9.alma.x86_64.rpmUlibreoffice-help-bn-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-ja-7.1.8.1-11.el9.alma.x86_64.rpmOlibreoffice-x11-7.1.8.1-11.el9.alma.x86_64.rpm+libreoffice-langpack-nn-7.1.8.1-11.el9.alma.x86_64.rpmClibreoffice-langpack-ve-7.1.8.1-11.el9.alma.x86_64.rpm"libreoffice-langpack-kn-7.1.8.1-11.el9.alma.x86_64.rpmHlibreoffice-math-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-11.el9.alma.x86_64.rpm1autocorr-zh-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-it-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-hr-7.1.8.1-11.el9.alma.x86_64.rpmIlibreoffice-ogltrans-7.1.8.1-11.el9.alma.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm5libreoffice-langpack-si-7.1.8.1-11.el9.alma.x86_64.rpmOlibreoffice-filters-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-ca-7.1.8.1-11.el9.alma.noarch.rpmjlibreoffice-help-it-7.1.8.1-11.el9.alma.x86_64.rpm<libreoffice-langpack-ta-7.1.8.1-11.el9.alma.x86_64.rpm?libreoffice-langpack-tn-7.1.8.1-11.el9.alma.x86_64.rpm autocorr-ja-7.1.8.1-11.el9.alma.noarch.rpmPlibreoffice-gdb-debug-support-7.1.8.1-11.el9.alma.x86_64.rpmqlibreoffice-help-nn-7.1.8.1-11.el9.alma.x86_64.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpmulibreoffice-help-ro-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-he-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-es-7.1.8.1-11.el9.alma.noarch.rpm#autocorr-lt-7.1.8.1-11.el9.alma.noarch.rpm)autocorr-ru-7.1.8.1-11.el9.alma.noarch.rpm2libreoffice-langpack-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpm9libreoffice-langpack-ss-7.1.8.1-11.el9.alma.x86_64.rpm3libreoffice-langpack-ro-7.1.8.1-11.el9.alma.x86_64.rpmslibreoffice-help-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm(autocorr-ro-7.1.8.1-11.el9.alma.noarch.rpmJlibreoffice-base-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-ga-7.1.8.1-11.el9.alma.noarch.rpm|libreoffice-help-tr-7.1.8.1-11.el9.alma.x86_64.rpmylibreoffice-help-sl-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-da-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-es-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-hu-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-gu-7.1.8.1-11.el9.alma.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-11.el9.alma.x86_64.rpm!libreoffice-langpack-kk-7.1.8.1-11.el9.alma.x86_64.rpmclibreoffice-help-gl-7.1.8.1-11.el9.alma.x86_64.rpmvlibreoffice-help-ru-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-fa-7.1.8.1-11.el9.alma.x86_64.rpm7libreoffice-langpack-sl-7.1.8.1-11.el9.alma.x86_64.rpmGlibreoffice-langpack-zu-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-impress-7.1.8.1-11.el9.alma.x86_64.rpm~libreoffice-help-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpmblibreoffice-help-fr-7.1.8.1-11.el9.alma.x86_64.rpm@libreoffice-langpack-tr-7.1.8.1-11.el9.alma.x86_64.rpm>libreoffice-langpack-th-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-fi-7.1.8.1-11.el9.alma.noarch.rpmalibreoffice-help-fi-7.1.8.1-11.el9.alma.x86_64.rpm&autocorr-pl-7.1.8.1-11.el9.alma.noarch.rpm^libreoffice-help-es-7.1.8.1-11.el9.alma.x86_64.rpm)libreoffice-langpack-nb-7.1.8.1-11.el9.alma.x86_64.rpmtlibreoffice-help-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-11.el9.alma.x86_64.rpm"autocorr-lb-7.1.8.1-11.el9.alma.noarch.rpmautocorr-de-7.1.8.1-11.el9.alma.noarch.rpmXlibreoffice-help-da-7.1.8.1-11.el9.alma.x86_64.rpm,autocorr-sr-7.1.8.1-11.el9.alma.noarch.rpm(libreoffice-langpack-mr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-cy-7.1.8.1-11.el9.alma.x86_64.rpmKlibreoffice-calc-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-is-7.1.8.1-11.el9.alma.noarch.rpmautocorr-cs-7.1.8.1-11.el9.alma.noarch.rpm}libreoffice-help-uk-7.1.8.1-11.el9.alma.x86_64.rpmElibreoffice-langpack-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-el-7.1.8.1-11.el9.alma.noarch.rpm+autocorr-sl-7.1.8.1-11.el9.alma.noarch.rpmelibreoffice-help-he-7.1.8.1-11.el9.alma.x86_64.rpm4libreoffice-langpack-ru-7.1.8.1-11.el9.alma.x86_64.rpm autocorr-af-7.1.8.1-11.el9.alma.noarch.rpmJlibreoffice-pdfimport-7.1.8.1-11.el9.alma.x86_64.rpmrlibreoffice-help-pl-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-hr-7.1.8.1-11.el9.alma.noarch.rpmQlibreofficekit-7.1.8.1-11.el9.alma.x86_64.rpm1wlibreoffice-help-si-7.1.8.1-11.el9.alma.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-11.el9.alma.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-11.el9.alma.x86_64.rpm.libreoffice-langpack-or-7.1.8.1-11.el9.alma.x86_64.rpm$libreoffice-langpack-lt-7.1.8.1-11.el9.alma.x86_64.rpmmlibreoffice-help-lt-7.1.8.1-11.el9.alma.x86_64.rpmolibreoffice-help-nb-7.1.8.1-11.el9.alma.x86_64.rpmYlibreoffice-help-de-7.1.8.1-11.el9.alma.x86_64.rpm=libreoffice-langpack-te-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-id-7.1.8.1-11.el9.alma.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-11.el9.alma.x86_64.rpmWlibreoffice-help-cs-7.1.8.1-11.el9.alma.x86_64.rpmplibreoffice-help-nl-7.1.8.1-11.el9.alma.x86_64.rpm_libreoffice-help-et-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-it-7.1.8.1-11.el9.alma.noarch.rpmllibreoffice-help-ko-7.1.8.1-11.el9.alma.x86_64.rpmAlibreoffice-langpack-ts-7.1.8.1-11.el9.alma.x86_64.rpm-autocorr-sv-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-fi-7.1.8.1-11.el9.alma.x86_64.rpm7libreoffice-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-11.el9.alma.x86_64.rpmNlibreoffice-writer-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-11.el9.alma.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-11.el9.alma.x86_64.rpm{libreoffice-help-ta-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ga-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-11.el9.alma.x86_64.rpmnlibreoffice-help-lv-7.1.8.1-11.el9.alma.x86_64.rpmLlibreoffice-ure-7.1.8.1-11.el9.alma.x86_64.rpmxlibreoffice-help-sk-7.1.8.1-11.el9.alma.x86_64.rpmDlibreoffice-data-7.1.8.1-11.el9.alma.noarch.rpmautocorr-fa-7.1.8.1-11.el9.alma.noarch.rpmhlibreoffice-help-hu-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-11.el9.alma.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-11.el9.alma.noarch.rpmDlibreoffice-langpack-xh-7.1.8.1-11.el9.alma.x86_64.rpm6libreoffice-langpack-sk-7.1.8.1-11.el9.alma.x86_64.rpm#libreoffice-langpack-ko-7.1.8.1-11.el9.alma.x86_64.rpm`libreoffice-help-eu-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-fr-7.1.8.1-11.el9.alma.x86_64.rpmklibreoffice-help-ja-7.1.8.1-11.el9.alma.x86_64.rpm;libreoffice-langpack-sv-7.1.8.1-11.el9.alma.x86_64.rpmdlibreoffice-help-gu-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-de-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-dsb-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-as-7.1.8.1-11.el9.alma.x86_64.rpm0autocorr-vro-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-af-7.1.8.1-11.el9.alma.x86_64.rpmNlibreoffice-emailmerge-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-en-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-hu-7.1.8.1-11.el9.alma.x86_64.rpm$autocorr-mn-7.1.8.1-11.el9.alma.noarch.rpmautocorr-hsb-7.1.8.1-11.el9.alma.noarch.rpmautocorr-bg-7.1.8.1-11.el9.alma.noarch.rpm libreoffice-langpack-el-7.1.8.1-11.el9.alma.x86_64.rpm[libreoffice-help-el-7.1.8.1-11.el9.alma.x86_64.rpmMlibreoffice-wiki-publisher-7.1.8.1-11.el9.alma.x86_64.rpm]libreoffice-help-eo-7.1.8.1-11.el9.alma.x86_64.rpm-libreoffice-langpack-nso-7.1.8.1-11.el9.alma.x86_64.rpmElibreoffice-opensymbol-fonts-7.1.8.1-11.el9.alma.noarch.rpm!autocorr-ko-7.1.8.1-11.el9.alma.noarch.rpm/libreoffice-langpack-pa-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-fy-7.1.8.1-11.el9.alma.x86_64.rpm*autocorr-sk-7.1.8.1-11.el9.alma.noarch.rpm*libreoffice-langpack-nl-7.1.8.1-11.el9.alma.x86_64.rpm.autocorr-tr-7.1.8.1-11.el9.alma.noarch.rpmVlibreoffice-help-ca-7.1.8.1-11.el9.alma.x86_64.rpmflibreoffice-help-hi-7.1.8.1-11.el9.alma.x86_64.rpm\libreoffice-help-en-7.1.8.1-11.el9.alma.x86_64.rpmBlibreoffice-langpack-uk-7.1.8.1-11.el9.alma.x86_64.rpm/autocorr-vi-7.1.8.1-11.el9.alma.noarch.rpm'libreoffice-langpack-ml-7.1.8.1-11.el9.alma.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-11.el9.alma.x86_64.rpm%autocorr-nl-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-en-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-hi-7.1.8.1-11.el9.alma.x86_64.rpmRlibreoffice-gtk3-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-fr-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-cs-7.1.8.1-11.el9.alma.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpmKlibreoffice-pyuno-7.1.8.1-11.el9.alma.x86_64.rpm&libreoffice-langpack-mai-7.1.8.1-11.el9.alma.x86_64.rpmglibreoffice-help-hr-7.1.8.1-11.el9.alma.x86_64.rpmilibreoffice-help-id-7.1.8.1-11.el9.alma.x86_64.rpmZlibreoffice-help-dz-7.1.8.1-11.el9.alma.x86_64.rpm'autocorr-pt-7.1.8.1-11.el9.alma.noarch.rpmPlibreoffice-xsltfilter-7.1.8.1-11.el9.alma.x86_64.rpm:libreoffice-langpack-st-7.1.8.1-11.el9.alma.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-11.el9.alma.x86_64.rpmLlibreoffice-core-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-gl-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-da-7.1.8.1-11.el9.alma.x86_64.rpmMlibreoffice-draw-7.1.8.1-11.el9.alma.x86_64.rpmUlibreoffice-help-bn-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-ja-7.1.8.1-11.el9.alma.x86_64.rpmOlibreoffice-x11-7.1.8.1-11.el9.alma.x86_64.rpm+libreoffice-langpack-nn-7.1.8.1-11.el9.alma.x86_64.rpmClibreoffice-langpack-ve-7.1.8.1-11.el9.alma.x86_64.rpm"libreoffice-langpack-kn-7.1.8.1-11.el9.alma.x86_64.rpmHlibreoffice-math-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-11.el9.alma.x86_64.rpm1autocorr-zh-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-it-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-hr-7.1.8.1-11.el9.alma.x86_64.rpmIlibreoffice-ogltrans-7.1.8.1-11.el9.alma.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm5libreoffice-langpack-si-7.1.8.1-11.el9.alma.x86_64.rpmOlibreoffice-filters-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-ca-7.1.8.1-11.el9.alma.noarch.rpmjlibreoffice-help-it-7.1.8.1-11.el9.alma.x86_64.rpm<libreoffice-langpack-ta-7.1.8.1-11.el9.alma.x86_64.rpm?libreoffice-langpack-tn-7.1.8.1-11.el9.alma.x86_64.rpm autocorr-ja-7.1.8.1-11.el9.alma.noarch.rpmPlibreoffice-gdb-debug-support-7.1.8.1-11.el9.alma.x86_64.rpmqlibreoffice-help-nn-7.1.8.1-11.el9.alma.x86_64.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpmulibreoffice-help-ro-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-he-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-es-7.1.8.1-11.el9.alma.noarch.rpm#autocorr-lt-7.1.8.1-11.el9.alma.noarch.rpm)autocorr-ru-7.1.8.1-11.el9.alma.noarch.rpm2libreoffice-langpack-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpm9libreoffice-langpack-ss-7.1.8.1-11.el9.alma.x86_64.rpm3libreoffice-langpack-ro-7.1.8.1-11.el9.alma.x86_64.rpmslibreoffice-help-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm(autocorr-ro-7.1.8.1-11.el9.alma.noarch.rpmJlibreoffice-base-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-ga-7.1.8.1-11.el9.alma.noarch.rpm|libreoffice-help-tr-7.1.8.1-11.el9.alma.x86_64.rpmylibreoffice-help-sl-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-da-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-es-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-hu-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-gu-7.1.8.1-11.el9.alma.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-11.el9.alma.x86_64.rpm!libreoffice-langpack-kk-7.1.8.1-11.el9.alma.x86_64.rpmclibreoffice-help-gl-7.1.8.1-11.el9.alma.x86_64.rpmvlibreoffice-help-ru-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-fa-7.1.8.1-11.el9.alma.x86_64.rpm7libreoffice-langpack-sl-7.1.8.1-11.el9.alma.x86_64.rpmGlibreoffice-langpack-zu-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-impress-7.1.8.1-11.el9.alma.x86_64.rpm~libreoffice-help-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpmblibreoffice-help-fr-7.1.8.1-11.el9.alma.x86_64.rpm@libreoffice-langpack-tr-7.1.8.1-11.el9.alma.x86_64.rpm>libreoffice-langpack-th-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-fi-7.1.8.1-11.el9.alma.noarch.rpmalibreoffice-help-fi-7.1.8.1-11.el9.alma.x86_64.rpm&autocorr-pl-7.1.8.1-11.el9.alma.noarch.rpm^libreoffice-help-es-7.1.8.1-11.el9.alma.x86_64.rpm)libreoffice-langpack-nb-7.1.8.1-11.el9.alma.x86_64.rpmtlibreoffice-help-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-11.el9.alma.x86_64.rpm"autocorr-lb-7.1.8.1-11.el9.alma.noarch.rpmautocorr-de-7.1.8.1-11.el9.alma.noarch.rpmXlibreoffice-help-da-7.1.8.1-11.el9.alma.x86_64.rpm,autocorr-sr-7.1.8.1-11.el9.alma.noarch.rpm(libreoffice-langpack-mr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-cy-7.1.8.1-11.el9.alma.x86_64.rpmKlibreoffice-calc-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-is-7.1.8.1-11.el9.alma.noarch.rpmautocorr-cs-7.1.8.1-11.el9.alma.noarch.rpm}libreoffice-help-uk-7.1.8.1-11.el9.alma.x86_64.rpmElibreoffice-langpack-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-el-7.1.8.1-11.el9.alma.noarch.rpm+autocorr-sl-7.1.8.1-11.el9.alma.noarch.rpmelibreoffice-help-he-7.1.8.1-11.el9.alma.x86_64.rpm4libreoffice-langpack-ru-7.1.8.1-11.el9.alma.x86_64.rpm autocorr-af-7.1.8.1-11.el9.alma.noarch.rpmJlibreoffice-pdfimport-7.1.8.1-11.el9.alma.x86_64.rpmrlibreoffice-help-pl-7.1.8.1-11.el9.alma.x86_64.rpmautocorr-hr-7.1.8.1-11.el9.alma.noarch.rpmQlibreofficekit-7.1.8.1-11.el9.alma.x86_64.rpmpt ;sBBBBBBsecurityModerate: flatpak security, bug fix, and enhancement update|whttps://access.redhat.com/errata/RHSA-2023:6518RHSA-2023:6518RHSA-2023:6518 https://access.redhat.com/security/cve/CVE-2023-28100CVE-2023-28100CVE-2023-28100https://access.redhat.com/security/cve/CVE-2023-28101CVE-2023-28101CVE-2023-28101https://bugzilla.redhat.com/21792192179219https://bugzilla.redhat.com/21792202179220https://errata.almalinux.org/9/ALSA-2023-6518.htmlALSA-2023:6518ALSA-2023:6518 Esflatpak-1.12.8-1.el9.x86_64.rpmWsflatpak-libs-1.12.8-1.el9.x86_64.rpm,sflatpak-selinux-1.12.8-1.el9.noarch.rpmFsflatpak-session-helper-1.12.8-1.el9.x86_64.rpmWsflatpak-libs-1.12.8-1.el9.i686.rpmEsflatpak-1.12.8-1.el9.x86_64.rpmWsflatpak-libs-1.12.8-1.el9.x86_64.rpm,sflatpak-selinux-1.12.8-1.el9.noarch.rpmFsflatpak-session-helper-1.12.8-1.el9.x86_64.rpmWsflatpak-libs-1.12.8-1.el9.i686.rpmgu >|securityModerate: python-tornado security updatesmhttps://access.redhat.com/errata/RHSA-2023:6523RHSA-2023:6523RHSA-2023:6523 https://access.redhat.com/security/cve/CVE-2023-28370CVE-2023-28370CVE-2023-28370https://bugzilla.redhat.com/22101992210199https://errata.almalinux.org/9/ALSA-2023-6523.htmlALSA-2023:6523ALSA-2023:6523 tpython3-tornado-6.1.0-9.el9.x86_64.rpmtpython3-tornado-6.1.0-9.el9.x86_64.rpmzv BBsecurityModerate: dnsmasq security and bug fix update`Uhttps://access.redhat.com/errata/RHSA-2023:6524RHSA-2023:6524RHSA-2023:6524 https://access.redhat.com/security/cve/CVE-2023-28450CVE-2023-28450CVE-2023-28450https://bugzilla.redhat.com/21789482178948https://errata.almalinux.org/9/ALSA-2023-6524.htmlALSA-2023:6524ALSA-2023:6524 g dnsmasq-utils-2.85-14.el9.x86_64.rpmf dnsmasq-2.85-14.el9.x86_64.rpmg dnsmasq-utils-2.85-14.el9.x86_64.rpmf dnsmasq-2.85-14.el9.x86_64.rpmw DBBBBBBBBBBsecurityImportant: webkit2gtk3 security and bug fix update5&https://access.redhat.com/errata/RHSA-2023:6535RHSA-2023:6535RHSA-2023:6535 https://access.redhat.com/security/cve/CVE-2022-32885CVE-2022-32885CVE-2022-32885https://access.redhat.com/security/cve/CVE-2023-27932CVE-2023-27932CVE-2023-27932https://access.redhat.com/security/cve/CVE-2023-27954CVE-2023-27954CVE-2023-27954https://access.redhat.com/security/cve/CVE-2023-28198CVE-2023-28198CVE-2023-28198https://access.redhat.com/security/cve/CVE-2023-32370CVE-2023-32370CVE-2023-32370https://access.redhat.com/security/cve/CVE-2023-32393CVE-2023-32393CVE-2023-32393https://access.redhat.com/security/cve/CVE-2023-38133CVE-2023-38133CVE-2023-38133https://access.redhat.com/security/cve/CVE-2023-38572CVE-2023-38572CVE-2023-38572https://access.redhat.com/security/cve/CVE-2023-38592CVE-2023-38592CVE-2023-38592https://access.redhat.com/security/cve/CVE-2023-38594CVE-2023-38594CVE-2023-38594https://access.redhat.com/security/cve/CVE-2023-38595CVE-2023-38595CVE-2023-38595https://access.redhat.com/security/cve/CVE-2023-38597CVE-2023-38597CVE-2023-38597https://access.redhat.com/security/cve/CVE-2023-38599CVE-2023-38599CVE-2023-38599https://access.redhat.com/security/cve/CVE-2023-38600CVE-2023-38600CVE-2023-38600https://access.redhat.com/security/cve/CVE-2023-38611CVE-2023-38611CVE-2023-38611https://access.redhat.com/security/cve/CVE-2023-39434CVE-2023-39434CVE-2023-39434https://access.redhat.com/security/cve/CVE-2023-40397CVE-2023-40397CVE-2023-40397https://access.redhat.com/security/cve/CVE-2023-40451CVE-2023-40451CVE-2023-40451https://bugzilla.redhat.com/22246082224608https://bugzilla.redhat.com/22310152231015https://bugzilla.redhat.com/22310172231017https://bugzilla.redhat.com/22310182231018https://bugzilla.redhat.com/22310192231019https://bugzilla.redhat.com/22310202231020https://bugzilla.redhat.com/22310212231021https://bugzilla.redhat.com/22310222231022https://bugzilla.redhat.com/22310282231028https://bugzilla.redhat.com/22310432231043https://bugzilla.redhat.com/22368422236842https://bugzilla.redhat.com/22368432236843https://bugzilla.redhat.com/22368442236844https://bugzilla.redhat.com/22389432238943https://bugzilla.redhat.com/22389442238944https://bugzilla.redhat.com/22389452238945https://bugzilla.redhat.com/22414052241405https://bugzilla.redhat.com/22414092241409https://errata.almalinux.org/9/ALSA-2023-6535.htmlALSA-2023:6535ALSA-2023:6535 3fwebkit2gtk3-jsc-2.40.5-1.el9.x86_64.rpm2fwebkit2gtk3-devel-2.40.5-1.el9.i686.rpm4fwebkit2gtk3-jsc-devel-2.40.5-1.el9.x86_64.rpm4fwebkit2gtk3-jsc-devel-2.40.5-1.el9.i686.rpm3fwebkit2gtk3-jsc-2.40.5-1.el9.i686.rpm1fwebkit2gtk3-2.40.5-1.el9.x86_64.rpm2fwebkit2gtk3-devel-2.40.5-1.el9.x86_64.rpm1fwebkit2gtk3-2.40.5-1.el9.i686.rpm3fwebkit2gtk3-jsc-2.40.5-1.el9.x86_64.rpm2fwebkit2gtk3-devel-2.40.5-1.el9.i686.rpm4fwebkit2gtk3-jsc-devel-2.40.5-1.el9.x86_64.rpm4fwebkit2gtk3-jsc-devel-2.40.5-1.el9.i686.rpm3fwebkit2gtk3-jsc-2.40.5-1.el9.i686.rpm1fwebkit2gtk3-2.40.5-1.el9.x86_64.rpm2fwebkit2gtk3-devel-2.40.5-1.el9.x86_64.rpm1fwebkit2gtk3-2.40.5-1.el9.i686.rpm}x securityModerate: perl-CPAN security updateC"https://access.redhat.com/errata/RHSA-2023:6539RHSA-2023:6539RHSA-2023:6539 https://access.redhat.com/security/cve/CVE-2023-31484CVE-2023-31484CVE-2023-31484https://bugzilla.redhat.com/22186672218667https://errata.almalinux.org/9/ALSA-2023-6539.htmlALSA-2023:6539ALSA-2023:6539 perl-CPAN-2.29-3.el9.noarch.rpmperl-CPAN-2.29-3.el9.noarch.rpmAy securityModerate: perl-HTTP-Tiny security updatee[https://access.redhat.com/errata/RHSA-2023:6542RHSA-2023:6542RHSA-2023:6542 https://access.redhat.com/security/cve/CVE-2023-31486CVE-2023-31486CVE-2023-31486https://bugzilla.redhat.com/22283922228392https://errata.almalinux.org/9/ALSA-2023-6542.htmlALSA-2023:6542ALSA-2023:6542 4perl-HTTP-Tiny-0.076-461.el9.noarch.rpm4perl-HTTP-Tiny-0.076-461.el9.noarch.rpmAz #UBBBBBBBBBBBBsecurityModerate: ghostscript security and bug fix update@rhttps://access.redhat.com/errata/RHSA-2023:6544RHSA-2023:6544RHSA-2023:6544 https://access.redhat.com/security/cve/CVE-2023-28879CVE-2023-28879CVE-2023-28879https://access.redhat.com/security/cve/CVE-2023-38559CVE-2023-38559CVE-2023-38559https://bugzilla.redhat.com/21845852184585https://bugzilla.redhat.com/22243672224367https://errata.almalinux.org/9/ALSA-2023-6544.htmlALSA-2023:6544ALSA-2023:6544 6$ghostscript-tools-fonts-9.54.0-13.el9.x86_64.rpm$ghostscript-doc-9.54.0-13.el9.noarch.rpm8$ghostscript-x11-9.54.0-13.el9.x86_64.rpm4$ghostscript-9.54.0-13.el9.x86_64.rpm=$libgs-9.54.0-13.el9.x86_64.rpm7$ghostscript-tools-printing-9.54.0-13.el9.x86_64.rpm5$ghostscript-tools-dvipdf-9.54.0-13.el9.x86_64.rpm=$libgs-9.54.0-13.el9.i686.rpm6$ghostscript-tools-fonts-9.54.0-13.el9.x86_64.rpm$ghostscript-doc-9.54.0-13.el9.noarch.rpm8$ghostscript-x11-9.54.0-13.el9.x86_64.rpm4$ghostscript-9.54.0-13.el9.x86_64.rpm=$libgs-9.54.0-13.el9.x86_64.rpm7$ghostscript-tools-printing-9.54.0-13.el9.x86_64.rpm5$ghostscript-tools-dvipdf-9.54.0-13.el9.x86_64.rpm=$libgs-9.54.0-13.el9.i686.rpm{ &dsecurityModerate: libreswan security update2yhttps://access.redhat.com/errata/RHSA-2023:6549RHSA-2023:6549RHSA-2023:6549 https://access.redhat.com/security/cve/CVE-2023-38710CVE-2023-38710CVE-2023-38710https://access.redhat.com/security/cve/CVE-2023-38711CVE-2023-38711CVE-2023-38711https://access.redhat.com/security/cve/CVE-2023-38712CVE-2023-38712CVE-2023-38712https://bugzilla.redhat.com/22159522215952https://bugzilla.redhat.com/22253682225368https://bugzilla.redhat.com/22253692225369https://errata.almalinux.org/9/ALSA-2023-6549.htmlALSA-2023:6549ALSA-2023:6549 RTlibreswan-4.12-1.el9.x86_64.rpmRTlibreswan-4.12-1.el9.x86_64.rpm{| *gBsecurityModerate: yajl security update+,https://access.redhat.com/errata/RHSA-2023:6551RHSA-2023:6551RHSA-2023:6551 https://access.redhat.com/security/cve/CVE-2023-33460CVE-2023-33460CVE-2023-33460https://bugzilla.redhat.com/22212492221249https://errata.almalinux.org/9/ALSA-2023-6551.htmlALSA-2023:6551ALSA-2023:6551 \7yajl-2.1.0-22.el9.x86_64.rpm\7yajl-2.1.0-22.el9.i686.rpm\7yajl-2.1.0-22.el9.x86_64.rpm\7yajl-2.1.0-22.el9.i686.rpm} .kBsecurityModerate: libmicrohttpd security updateW~https://access.redhat.com/errata/RHSA-2023:6566RHSA-2023:6566RHSA-2023:6566 https://access.redhat.com/security/cve/CVE-2023-27371CVE-2023-27371CVE-2023-27371https://bugzilla.redhat.com/21743132174313https://errata.almalinux.org/9/ALSA-2023-6566.htmlALSA-2023:6566ALSA-2023:6566 >0libmicrohttpd-0.9.72-5.el9.x86_64.rpm>0libmicrohttpd-0.9.72-5.el9.i686.rpm>0libmicrohttpd-0.9.72-5.el9.x86_64.rpm>0libmicrohttpd-0.9.72-5.el9.i686.rpm~ 1osecurityModerate: sysstat security and bug fix updateUYhttps://access.redhat.com/errata/RHSA-2023:6569RHSA-2023:6569RHSA-2023:6569 https://access.redhat.com/security/cve/CVE-2023-33204CVE-2023-33204CVE-2023-33204https://bugzilla.redhat.com/22082702208270https://errata.almalinux.org/9/ALSA-2023-6569.htmlALSA-2023:6569ALSA-2023:6569 wTsysstat-12.5.4-7.el9.x86_64.rpmwTsysstat-12.5.4-7.el9.x86_64.rpm| :rBBBBBBsecurityModerate: tomcat security and bug fix update.3https://access.redhat.com/errata/RHSA-2023:6570RHSA-2023:6570RHSA-2023:6570 https://access.redhat.com/security/cve/CVE-2023-24998CVE-2023-24998CVE-2023-24998https://access.redhat.com/security/cve/CVE-2023-28708CVE-2023-28708CVE-2023-28708https://access.redhat.com/security/cve/CVE-2023-28709CVE-2023-28709CVE-2023-28709https://bugzilla.redhat.com/21722982172298https://bugzilla.redhat.com/21808562180856https://bugzilla.redhat.com/22103212210321https://errata.almalinux.org/9/ALSA-2023-6570.htmlALSA-2023:6570ALSA-2023:6570 :xtomcat-9.0.62-37.el9_3.noarch.rpmxtomcat-jsp-2.3-api-9.0.62-37.el9_3.noarch.rpm@xtomcat-servlet-4.0-api-9.0.62-37.el9_3.noarch.rpm:xtomcat-9.0.62-37.el9_3.noarch.rpmxtomcat-jsp-2.3-api-9.0.62-37.el9_3.noarch.rpm@xtomcat-servlet-4.0-api-9.0.62-37.el9_3.noarch.rpmv {BBBBsecurityModerate: libtiff security updateaN https://access.redhat.com/errata/RHSA-2023:6575RHSA-2023:6575RHSA-2023:6575 https://access.redhat.com/security/cve/CVE-2023-26965CVE-2023-26965CVE-2023-26965https://access.redhat.com/security/cve/CVE-2023-26966CVE-2023-26966CVE-2023-26966https://access.redhat.com/security/cve/CVE-2023-2731CVE-2023-2731CVE-2023-2731https://access.redhat.com/security/cve/CVE-2023-3316CVE-2023-3316CVE-2023-3316https://access.redhat.com/security/cve/CVE-2023-3576CVE-2023-3576CVE-2023-3576https://bugzilla.redhat.com/22076352207635https://bugzilla.redhat.com/22152062215206https://bugzilla.redhat.com/22160802216080https://bugzilla.redhat.com/22187492218749https://bugzilla.redhat.com/22193402219340https://errata.almalinux.org/9/ALSA-2023-6575.htmlALSA-2023:6575ALSA-2023:6575 h.libtiff-devel-4.4.0-10.el9.i686.rpmg.libtiff-4.4.0-10.el9.x86_64.rpmg.libtiff-4.4.0-10.el9.i686.rpmh.libtiff-devel-4.4.0-10.el9.x86_64.rpmh.libtiff-devel-4.4.0-10.el9.i686.rpmg.libtiff-4.4.0-10.el9.x86_64.rpmg.libtiff-4.4.0-10.el9.i686.rpmh.libtiff-devel-4.4.0-10.el9.x86_64.rpmY BBsecurityModerate: libqb security update/ohttps://access.redhat.com/errata/RHSA-2023:6578RHSA-2023:6578RHSA-2023:6578 https://access.redhat.com/security/cve/CVE-2023-39976CVE-2023-39976CVE-2023-39976https://bugzilla.redhat.com/22307082230708https://errata.almalinux.org/9/ALSA-2023-6578.htmlALSA-2023:6578ALSA-2023:6578 A6libqb-2.0.6-4.el9_3.i686.rpmA6libqb-2.0.6-4.el9_3.x86_64.rpmA6libqb-2.0.6-4.el9_3.i686.rpmA6libqb-2.0.6-4.el9_3.x86_64.rpm; FBsecurityModerate: binutils security updateJhttps://access.redhat.com/errata/RHSA-2023:6593RHSA-2023:6593RHSA-2023:6593 https://access.redhat.com/security/cve/CVE-2022-4285CVE-2022-4285CVE-2022-4285https://bugzilla.redhat.com/21507682150768https://errata.almalinux.org/9/ALSA-2023-6593.htmlALSA-2023:6593ALSA-2023:6593 9binutils-devel-2.35.2-42.el9.x86_64.rpm9binutils-devel-2.35.2-42.el9.i686.rpm9binutils-devel-2.35.2-42.el9.x86_64.rpm9binutils-devel-2.35.2-42.el9.i686.rpm JBBBBBBBBBBBBsecurityModerate: cups security and bug fix updatehnhttps://access.redhat.com/errata/RHSA-2023:6596RHSA-2023:6596RHSA-2023:6596 https://access.redhat.com/security/cve/CVE-2023-32324CVE-2023-32324CVE-2023-32324https://access.redhat.com/security/cve/CVE-2023-34241CVE-2023-34241CVE-2023-34241https://bugzilla.redhat.com/22096032209603https://bugzilla.redhat.com/22149142214914https://errata.almalinux.org/9/ALSA-2023-6596.htmlALSA-2023:6596ALSA-2023:6596 ?cups-lpd-2.3.3op2-21.el9.x86_64.rpm>cups-ipptool-2.3.3op2-21.el9.x86_64.rpm<cups-2.3.3op2-21.el9.x86_64.rpm=cups-client-2.3.3op2-21.el9.x86_64.rpm@cups-printerapp-2.3.3op2-21.el9.x86_64.rpmcups-devel-2.3.3op2-21.el9.i686.rpm2cups-filesystem-2.3.3op2-21.el9.noarch.rpmcups-devel-2.3.3op2-21.el9.x86_64.rpm?cups-lpd-2.3.3op2-21.el9.x86_64.rpm>cups-ipptool-2.3.3op2-21.el9.x86_64.rpm<cups-2.3.3op2-21.el9.x86_64.rpm=cups-client-2.3.3op2-21.el9.x86_64.rpm@cups-printerapp-2.3.3op2-21.el9.x86_64.rpmcups-devel-2.3.3op2-21.el9.i686.rpm2cups-filesystem-2.3.3op2-21.el9.noarch.rpmcups-devel-2.3.3op2-21.el9.x86_64.rpm YBBBBsecurityLow: glib2 security and bug fix update*Vohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631 https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631 Xglib2-devel-2.68.4-11.el9.x86_64.rpmGglib2-tests-2.68.4-11.el9.x86_64.rpmXglib2-devel-2.68.4-11.el9.i686.rpm.glib2-doc-2.68.4-11.el9.noarch.rpmXglib2-devel-2.68.4-11.el9.x86_64.rpmGglib2-tests-2.68.4-11.el9.x86_64.rpmXglib2-devel-2.68.4-11.el9.i686.rpm.glib2-doc-2.68.4-11.el9.noarch.rpma #`BsecurityModerate: c-ares security, bug fix, and enhancement updateE https://access.redhat.com/errata/RHSA-2023:6635RHSA-2023:6635RHSA-2023:6635 https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://errata.almalinux.org/9/ALSA-2023-6635.htmlALSA-2023:6635ALSA-2023:6635 Uc-ares-devel-1.19.1-1.el9.x86_64.rpmUc-ares-devel-1.19.1-1.el9.i686.rpmUc-ares-devel-1.19.1-1.el9.x86_64.rpmUc-ares-devel-1.19.1-1.el9.i686.rpm 'dBsecurityModerate: libssh security updateO{https://access.redhat.com/errata/RHSA-2023:6643RHSA-2023:6643RHSA-2023:6643 https://access.redhat.com/security/cve/CVE-2023-1667CVE-2023-1667CVE-2023-1667https://access.redhat.com/security/cve/CVE-2023-2283CVE-2023-2283CVE-2023-2283https://bugzilla.redhat.com/21821992182199https://bugzilla.redhat.com/21897362189736https://errata.almalinux.org/9/ALSA-2023-6643.htmlALSA-2023:6643ALSA-2023:6643 0libssh-devel-0.10.4-11.el9.x86_64.rpm0libssh-devel-0.10.4-11.el9.i686.rpm0libssh-devel-0.10.4-11.el9.x86_64.rpm0libssh-devel-0.10.4-11.el9.i686.rpm .hBBBBsecurityModerate: python3.9 security updateJ https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659 jpython-unversioned-command-3.9.18-1.el9_3.noarch.rpm=python3-tkinter-3.9.18-1.el9_3.x86_64.rpmWpython3-devel-3.9.18-1.el9_3.i686.rpmWpython3-devel-3.9.18-1.el9_3.x86_64.rpmjpython-unversioned-command-3.9.18-1.el9_3.noarch.rpm=python3-tkinter-3.9.18-1.el9_3.x86_64.rpmWpython3-devel-3.9.18-1.el9_3.i686.rpmWpython3-devel-3.9.18-1.el9_3.x86_64.rpma 5oBBBBsecurityLow: gmp security and enhancement update*jUhttps://access.redhat.com/errata/RHSA-2023:6661RHSA-2023:6661RHSA-2023:6661 https://access.redhat.com/security/cve/CVE-2021-43618CVE-2021-43618CVE-2021-43618https://bugzilla.redhat.com/20249042024904https://errata.almalinux.org/9/ALSA-2023-6661.htmlALSA-2023:6661ALSA-2023:6661 (gmp-devel-6.2.0-13.el9.i686.rpm'gmp-c++-6.2.0-13.el9.x86_64.rpm(gmp-devel-6.2.0-13.el9.x86_64.rpm'gmp-c++-6.2.0-13.el9.i686.rpm(gmp-devel-6.2.0-13.el9.i686.rpm'gmp-c++-6.2.0-13.el9.x86_64.rpm(gmp-devel-6.2.0-13.el9.x86_64.rpm'gmp-c++-6.2.0-13.el9.i686.rpm  vBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update?K https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667 https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667 X samba-winbind-clients-4.18.6-100.el9.x86_64.rpmZ samba-winexe-4.18.6-100.el9.x86_64.rpmW samba-vfs-iouring-4.18.6-100.el9.x86_64.rpmV samba-krb5-printing-4.18.6-100.el9.x86_64.rpmU samba-client-4.18.6-100.el9.x86_64.rpmY samba-winbind-krb5-locator-4.18.6-100.el9.x86_64.rpmX samba-winbind-clients-4.18.6-100.el9.x86_64.rpmZ samba-winexe-4.18.6-100.el9.x86_64.rpmW samba-vfs-iouring-4.18.6-100.el9.x86_64.rpmV samba-krb5-printing-4.18.6-100.el9.x86_64.rpmU samba-client-4.18.6-100.el9.x86_64.rpmY samba-winbind-krb5-locator-4.18.6-100.el9.x86_64.rpm   CBsecurityModerate: curl security update q https://access.redhat.com/errata/RHSA-2023:6679RHSA-2023:6679RHSA-2023:6679 https://access.redhat.com/security/cve/CVE-2023-27533CVE-2023-27533CVE-2023-27533https://access.redhat.com/security/cve/CVE-2023-27534CVE-2023-27534CVE-2023-27534https://access.redhat.com/security/cve/CVE-2023-27536CVE-2023-27536CVE-2023-27536https://access.redhat.com/security/cve/CVE-2023-27538CVE-2023-27538CVE-2023-27538https://bugzilla.redhat.com/21790622179062https://bugzilla.redhat.com/21790692179069https://bugzilla.redhat.com/21790922179092https://bugzilla.redhat.com/21791032179103https://errata.almalinux.org/9/ALSA-2023-6679.htmlALSA-2023:6679ALSA-2023:6679 rlibcurl-devel-7.76.1-26.el9.i686.rpmrlibcurl-devel-7.76.1-26.el9.x86_64.rpmrlibcurl-devel-7.76.1-26.el9.i686.rpmrlibcurl-devel-7.76.1-26.el9.x86_64.rpmV  securityModerate: python-pip security update{(https://access.redhat.com/errata/RHSA-2023:6694RHSA-2023:6694RHSA-2023:6694 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6694.htmlALSA-2023:6694ALSA-2023:6694 `(python3-pip-21.2.3-7.el9.noarch.rpm`(python3-pip-21.2.3-7.el9.noarch.rpmD  IBBBBBsecurityModerate: ncurses security and bug fix update#xhttps://access.redhat.com/errata/RHSA-2023:6698RHSA-2023:6698RHSA-2023:6698 https://access.redhat.com/security/cve/CVE-2023-29491CVE-2023-29491CVE-2023-29491https://bugzilla.redhat.com/21917042191704https://errata.almalinux.org/9/ALSA-2023-6698.htmlALSA-2023:6698ALSA-2023:6698 ygncurses-term-6.2-10.20210508.el9.noarch.rpmRgncurses-devel-6.2-10.20210508.el9.i686.rpmQgncurses-c++-libs-6.2-10.20210508.el9.x86_64.rpmRgncurses-devel-6.2-10.20210508.el9.x86_64.rpmQgncurses-c++-libs-6.2-10.20210508.el9.i686.rpmygncurses-term-6.2-10.20210508.el9.noarch.rpmRgncurses-devel-6.2-10.20210508.el9.i686.rpmQgncurses-c++-libs-6.2-10.20210508.el9.x86_64.rpmRgncurses-devel-6.2-10.20210508.el9.x86_64.rpmQgncurses-c++-libs-6.2-10.20210508.el9.i686.rpmi  QBsecurityModerate: krb5 security and bug fix update9https://access.redhat.com/errata/RHSA-2023:6699RHSA-2023:6699RHSA-2023:6699 https://access.redhat.com/security/cve/CVE-2023-36054CVE-2023-36054CVE-2023-36054https://access.redhat.com/security/cve/CVE-2023-39975CVE-2023-39975CVE-2023-39975https://bugzilla.redhat.com/22301782230178https://bugzilla.redhat.com/22326822232682https://errata.almalinux.org/9/ALSA-2023-6699.htmlALSA-2023:6699ALSA-2023:6699 <krb5-devel-1.21.1-1.el9.x86_64.rpm<krb5-devel-1.21.1-1.el9.i686.rpm<krb5-devel-1.21.1-1.el9.x86_64.rpm<krb5-devel-1.21.1-1.el9.i686.rpm" UBBBsecurityModerate: avahi security updateThttps://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707 https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707 _Qavahi-tools-0.8-15.el9.x86_64.rpmTQavahi-glib-0.8-15.el9.x86_64.rpmTQavahi-glib-0.8-15.el9.i686.rpm_Qavahi-tools-0.8-15.el9.x86_64.rpmTQavahi-glib-0.8-15.el9.x86_64.rpmTQavahi-glib-0.8-15.el9.i686.rpmG )[BBBBBBBBBBBBsecurityImportant: ghostscript security updateehttps://access.redhat.com/errata/RHSA-2023:6732RHSA-2023:6732RHSA-2023:6732 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6732.htmlALSA-2023:6732ALSA-2023:6732 =%libgs-9.54.0-14.el9_3.i686.rpm8%ghostscript-x11-9.54.0-14.el9_3.x86_64.rpm5%ghostscript-tools-dvipdf-9.54.0-14.el9_3.x86_64.rpm=%libgs-9.54.0-14.el9_3.x86_64.rpm6%ghostscript-tools-fonts-9.54.0-14.el9_3.x86_64.rpm4%ghostscript-9.54.0-14.el9_3.x86_64.rpm%ghostscript-doc-9.54.0-14.el9_3.noarch.rpm7%ghostscript-tools-printing-9.54.0-14.el9_3.x86_64.rpm=%libgs-9.54.0-14.el9_3.i686.rpm8%ghostscript-x11-9.54.0-14.el9_3.x86_64.rpm5%ghostscript-tools-dvipdf-9.54.0-14.el9_3.x86_64.rpm=%libgs-9.54.0-14.el9_3.x86_64.rpm6%ghostscript-tools-fonts-9.54.0-14.el9_3.x86_64.rpm4%ghostscript-9.54.0-14.el9_3.x86_64.rpm%ghostscript-doc-9.54.0-14.el9_3.noarch.rpm7%ghostscript-tools-printing-9.54.0-14.el9_3.x86_64.rpm dotnet-apphost-pack-8.0-8.0.0-2.el9_3.x86_64.rpmHdotnet-templates-8.0-8.0.100-2.el9_3.x86_64.rpmdotnet-host-8.0.0-2.el9_3.x86_64.rpmDdotnet-sdk-8.0-8.0.100-2.el9_3.x86_64.rpm netstandard-targeting-pack-2.1-8.0.100-2.el9_3.x86_64.rpm@dotnet-hostfxr-8.0-8.0.0-2.el9_3.x86_64.rpmBdotnet-runtime-8.0-8.0.0-2.el9_3.x86_64.rpm:aspnetcore-runtime-8.0-8.0.0-2.el9_3.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.0-2.el9_3.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.0-2.el9_3.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.0-2.el9_3.x86_64.rpmHdotnet-templates-8.0-8.0.100-2.el9_3.x86_64.rpmdotnet-host-8.0.0-2.el9_3.x86_64.rpmDdotnet-sdk-8.0-8.0.100-2.el9_3.x86_64.rpmٍ 6fBBBBBBBBBBBBBBsecurityModerate: dotnet7.0 security update|1https://access.redhat.com/errata/RHSA-2023:7255RHSA-2023:7255RHSA-2023:7255 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7255.htmlALSA-2023:7255ALSA-2023:7255 ;aspnetcore-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpm9aspnetcore-runtime-7.0-7.0.14-1.el9_3.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.14-1.el9_3.x86_64.rpm?dotnet-hostfxr-7.0-7.0.14-1.el9_3.x86_64.rpmCTdotnet-sdk-7.0-7.0.114-1.el9_3.x86_64.rpmAdotnet-runtime-7.0-7.0.14-1.el9_3.x86_64.rpmGTdotnet-templates-7.0-7.0.114-1.el9_3.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpm9aspnetcore-runtime-7.0-7.0.14-1.el9_3.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.14-1.el9_3.x86_64.rpm?dotnet-hostfxr-7.0-7.0.14-1.el9_3.x86_64.rpmCTdotnet-sdk-7.0-7.0.114-1.el9_3.x86_64.rpmAdotnet-runtime-7.0-7.0.14-1.el9_3.x86_64.rpmGTdotnet-templates-7.0-7.0.114-1.el9_3.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.14-1.el9_3.x86_64.rpmt wBBBBBBBBBBBBBBsecurityModerate: dotnet6.0 security update-.https://access.redhat.com/errata/RHSA-2023:7257RHSA-2023:7257RHSA-2023:7257 https://access.redhat.com/security/cve/CVE-2023-36049CVE-2023-36049CVE-2023-36049https://access.redhat.com/security/cve/CVE-2023-36558CVE-2023-36558CVE-2023-36558https://bugzilla.redhat.com/22477502247750https://bugzilla.redhat.com/22488832248883https://errata.almalinux.org/9/ALSA-2023-7257.htmlALSA-2023:7257ALSA-2023:7257 dotnet-runtime-6.0-6.0.25-1.el9_3.x86_64.rpmdotnet-hostfxr-6.0-6.0.25-1.el9_3.x86_64.rpmMdotnet-templates-6.0-6.0.125-1.el9_3.x86_64.rpmMdotnet-sdk-6.0-6.0.125-1.el9_3.x86_64.rpmdotnet-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpmdotnet-apphost-pack-6.0-6.0.25-1.el9_3.x86_64.rpmaspnetcore-runtime-6.0-6.0.25-1.el9_3.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpmdotnet-runtime-6.0-6.0.25-1.el9_3.x86_64.rpmdotnet-hostfxr-6.0-6.0.25-1.el9_3.x86_64.rpmMdotnet-templates-6.0-6.0.125-1.el9_3.x86_64.rpmMdotnet-sdk-6.0-6.0.125-1.el9_3.x86_64.rpmdotnet-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpmdotnet-apphost-pack-6.0-6.0.25-1.el9_3.x86_64.rpmaspnetcore-runtime-6.0-6.0.25-1.el9_3.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.25-1.el9_3.x86_64.rpmو; HBBBBBBBBsecurityImportant: open-vm-tools security update[Shttps://access.redhat.com/errata/RHSA-2023:7277RHSA-2023:7277RHSA-2023:7277 https://access.redhat.com/security/cve/CVE-2023-34058CVE-2023-34058CVE-2023-34058https://access.redhat.com/security/cve/CVE-2023-34059CVE-2023-34059CVE-2023-34059https://bugzilla.redhat.com/22460802246080https://bugzilla.redhat.com/22460962246096https://errata.almalinux.org/9/ALSA-2023-7277.htmlALSA-2023:7277ALSA-2023:7277 $open-vm-tools-desktop-12.2.5-3.el9_3.2.alma.1.x86_64.rpm&open-vm-tools-test-12.2.5-3.el9_3.2.alma.1.x86_64.rpmTopen-vm-tools-salt-minion-12.2.5-3.el9_3.2.alma.1.x86_64.rpm#open-vm-tools-12.2.5-3.el9_3.2.alma.1.x86_64.rpm%open-vm-tools-sdmp-12.2.5-3.el9_3.2.alma.1.x86_64.rpm$open-vm-tools-desktop-12.2.5-3.el9_3.2.alma.1.x86_64.rpm&open-vm-tools-test-12.2.5-3.el9_3.2.alma.1.x86_64.rpmTopen-vm-tools-salt-minion-12.2.5-3.el9_3.2.alma.1.x86_64.rpm#open-vm-tools-12.2.5-3.el9_3.2.alma.1.x86_64.rpm%open-vm-tools-sdmp-12.2.5-3.el9_3.2.alma.1.x86_64.rpmؾ SsecurityImportant: squid security update.whttps://access.redhat.com/errata/RHSA-2023:7465RHSA-2023:7465RHSA-2023:7465 https://access.redhat.com/security/cve/CVE-2023-5824CVE-2023-5824CVE-2023-5824https://bugzilla.redhat.com/22459142245914https://errata.almalinux.org/9/ALSA-2023-7465.htmlALSA-2023:7465ALSA-2023:7465  squid-5.5-6.el9_3.2.x86_64.rpm squid-5.5-6.el9_3.2.x86_64.rpm VsecurityImportant: thunderbird security update%&https://access.redhat.com/errata/RHSA-2023:7501RHSA-2023:7501RHSA-2023:7501 https://access.redhat.com/security/cve/CVE-2023-6204CVE-2023-6204CVE-2023-6204https://access.redhat.com/security/cve/CVE-2023-6205CVE-2023-6205CVE-2023-6205https://access.redhat.com/security/cve/CVE-2023-6206CVE-2023-6206CVE-2023-6206https://access.redhat.com/security/cve/CVE-2023-6207CVE-2023-6207CVE-2023-6207https://access.redhat.com/security/cve/CVE-2023-6208CVE-2023-6208CVE-2023-6208https://access.redhat.com/security/cve/CVE-2023-6209CVE-2023-6209CVE-2023-6209https://access.redhat.com/security/cve/CVE-2023-6212CVE-2023-6212CVE-2023-6212https://bugzilla.redhat.com/22508962250896https://bugzilla.redhat.com/22508972250897https://bugzilla.redhat.com/22508982250898https://bugzilla.redhat.com/22508992250899https://bugzilla.redhat.com/22509002250900https://bugzilla.redhat.com/22509012250901https://bugzilla.redhat.com/22509022250902https://errata.almalinux.org/9/ALSA-2023-7501.htmlALSA-2023:7501ALSA-2023:7501 :Qthunderbird-115.5.0-1.el9_3.alma.x86_64.rpm:Qthunderbird-115.5.0-1.el9_3.alma.x86_64.rpmH YBBsecurityImportant: firefox security updateKWhttps://access.redhat.com/errata/RHSA-2023:7507RHSA-2023:7507RHSA-2023:7507 https://access.redhat.com/security/cve/CVE-2023-6204CVE-2023-6204CVE-2023-6204https://access.redhat.com/security/cve/CVE-2023-6205CVE-2023-6205CVE-2023-6205https://access.redhat.com/security/cve/CVE-2023-6206CVE-2023-6206CVE-2023-6206https://access.redhat.com/security/cve/CVE-2023-6207CVE-2023-6207CVE-2023-6207https://access.redhat.com/security/cve/CVE-2023-6208CVE-2023-6208CVE-2023-6208https://access.redhat.com/security/cve/CVE-2023-6209CVE-2023-6209CVE-2023-6209https://access.redhat.com/security/cve/CVE-2023-6212CVE-2023-6212CVE-2023-6212https://bugzilla.redhat.com/22508962250896https://bugzilla.redhat.com/22508972250897https://bugzilla.redhat.com/22508982250898https://bugzilla.redhat.com/22508992250899https://bugzilla.redhat.com/22509002250900https://bugzilla.redhat.com/22509012250901https://bugzilla.redhat.com/22509022250902https://errata.almalinux.org/9/ALSA-2023-7507.htmlALSA-2023:7507ALSA-2023:7507 8}firefox-115.5.0-1.el9_3.alma.1.x86_64.rpmQ}firefox-x11-115.5.0-1.el9_3.alma.1.x86_64.rpm8}firefox-115.5.0-1.el9_3.alma.1.x86_64.rpmQ}firefox-x11-115.5.0-1.el9_3.alma.1.x86_64.rpm% $^BBBBsecurityModerate: apr security update"@https://access.redhat.com/errata/RHSA-2023:7711RHSA-2023:7711RHSA-2023:7711 https://access.redhat.com/security/cve/CVE-2022-24963CVE-2022-24963CVE-2022-24963https://bugzilla.redhat.com/21694652169465https://errata.almalinux.org/9/ALSA-2023-7711.htmlALSA-2023:7711ALSA-2023:7711 ~apr-devel-1.7.0-12.el9_3.x86_64.rpm~apr-1.7.0-12.el9_3.x86_64.rpm~apr-devel-1.7.0-12.el9_3.i686.rpm~apr-1.7.0-12.el9_3.i686.rpm~apr-devel-1.7.0-12.el9_3.x86_64.rpm~apr-1.7.0-12.el9_3.x86_64.rpm~apr-devel-1.7.0-12.el9_3.i686.rpm~apr-1.7.0-12.el9_3.i686.rpmܗK 'esecurityImportant: tracker-miners security updateb7https://access.redhat.com/errata/RHSA-2023:7712RHSA-2023:7712RHSA-2023:7712 https://access.redhat.com/security/cve/CVE-2023-5557CVE-2023-5557CVE-2023-5557https://bugzilla.redhat.com/22430962243096https://errata.almalinux.org/9/ALSA-2023-7712.htmlALSA-2023:7712ALSA-2023:7712 <tracker-miners-3.1.2-4.el9_3.x86_64.rpm<tracker-miners-3.1.2-4.el9_3.x86_64.rpmd 4hBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateghttps://access.redhat.com/errata/RHSA-2023:7715RHSA-2023:7715RHSA-2023:7715 https://access.redhat.com/security/cve/CVE-2023-42917CVE-2023-42917CVE-2023-42917https://bugzilla.redhat.com/22530582253058https://errata.almalinux.org/9/ALSA-2023-7715.htmlALSA-2023:7715ALSA-2023:7715 3gwebkit2gtk3-jsc-2.40.5-1.el9_3.1.i686.rpm3gwebkit2gtk3-jsc-2.40.5-1.el9_3.1.x86_64.rpm2gwebkit2gtk3-devel-2.40.5-1.el9_3.1.x86_64.rpm4gwebkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.i686.rpm1gwebkit2gtk3-2.40.5-1.el9_3.1.x86_64.rpm1gwebkit2gtk3-2.40.5-1.el9_3.1.i686.rpm2gwebkit2gtk3-devel-2.40.5-1.el9_3.1.i686.rpm4gwebkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.x86_64.rpm3gwebkit2gtk3-jsc-2.40.5-1.el9_3.1.i686.rpm3gwebkit2gtk3-jsc-2.40.5-1.el9_3.1.x86_64.rpm2gwebkit2gtk3-devel-2.40.5-1.el9_3.1.x86_64.rpm4gwebkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.i686.rpm1gwebkit2gtk3-2.40.5-1.el9_3.1.x86_64.rpm1gwebkit2gtk3-2.40.5-1.el9_3.1.i686.rpm2gwebkit2gtk3-devel-2.40.5-1.el9_3.1.i686.rpm4gwebkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.x86_64.rpm& 8uBsecurityModerate: libxml2 security updatehttps://access.redhat.com/errata/RHSA-2023:7747RHSA-2023:7747RHSA-2023:7747 https://access.redhat.com/security/cve/CVE-2023-39615CVE-2023-39615CVE-2023-39615https://bugzilla.redhat.com/22358642235864https://errata.almalinux.org/9/ALSA-2023-7747.htmlALSA-2023:7747ALSA-2023:7747 6Rlibxml2-devel-2.9.13-5.el9_3.i686.rpm6Rlibxml2-devel-2.9.13-5.el9_3.x86_64.rpm6Rlibxml2-devel-2.9.13-5.el9_3.i686.rpm6Rlibxml2-devel-2.9.13-5.el9_3.x86_64.rpmK yBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security updateRhttps://access.redhat.com/errata/RHSA-2023:7753RHSA-2023:7753RHSA-2023:7753 https://access.redhat.com/security/cve/CVE-2023-37920CVE-2023-37920CVE-2023-37920https://access.redhat.com/security/cve/CVE-2023-43804CVE-2023-43804CVE-2023-43804https://bugzilla.redhat.com/22265862226586https://bugzilla.redhat.com/22424932242493https://errata.almalinux.org/9/ALSA-2023-7753.htmlALSA-2023:7753ALSA-2023:7753 efence-virtd-multicast-4.10.0-55.el9_3.2.alma.1.x86_64.rpmafence-virt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm.fence-agents-ibm-vpc-4.10.0-55.el9_3.2.alma.1.noarch.rpmgfence-virtd-tcp-4.10.0-55.el9_3.2.alma.1.x86_64.rpm-fence-agents-ibm-powervs-4.10.0-55.el9_3.2.alma.1.noarch.rpmdfence-virtd-libvirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm_fence-agents-compute-4.10.0-55.el9_3.2.alma.1.x86_64.rpmcfence-virtd-cpg-4.10.0-55.el9_3.2.alma.1.x86_64.rpm`fence-agents-kubevirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpmbfence-virtd-4.10.0-55.el9_3.2.alma.1.x86_64.rpmffence-virtd-serial-4.10.0-55.el9_3.2.alma.1.x86_64.rpm,fence-agents-common-4.10.0-55.el9_3.2.alma.1.noarch.rpm/fence-agents-virsh-4.10.0-55.el9_3.2.alma.1.noarch.rpm efence-virtd-multicast-4.10.0-55.el9_3.2.alma.1.x86_64.rpmafence-virt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm.fence-agents-ibm-vpc-4.10.0-55.el9_3.2.alma.1.noarch.rpmgfence-virtd-tcp-4.10.0-55.el9_3.2.alma.1.x86_64.rpm-fence-agents-ibm-powervs-4.10.0-55.el9_3.2.alma.1.noarch.rpmdfence-virtd-libvirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm_fence-agents-compute-4.10.0-55.el9_3.2.alma.1.x86_64.rpmcfence-virtd-cpg-4.10.0-55.el9_3.2.alma.1.x86_64.rpm`fence-agents-kubevirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpmbfence-virtd-4.10.0-55.el9_3.2.alma.1.x86_64.rpmffence-virtd-serial-4.10.0-55.el9_3.2.alma.1.x86_64.rpm,fence-agents-common-4.10.0-55.el9_3.2.alma.1.noarch.rpm/fence-agents-virsh-4.10.0-55.el9_3.2.alma.1.noarch.rpm  PBBBBsecurityModerate: pixman security updateQhttps://access.redhat.com/errata/RHSA-2023:7754RHSA-2023:7754RHSA-2023:7754 https://access.redhat.com/security/cve/CVE-2022-44638CVE-2022-44638CVE-2022-44638https://bugzilla.redhat.com/21399882139988https://errata.almalinux.org/9/ALSA-2023-7754.htmlALSA-2023:7754ALSA-2023:7754 Xspixman-devel-0.40.0-6.el9_3.x86_64.rpmWspixman-0.40.0-6.el9_3.x86_64.rpmWspixman-0.40.0-6.el9_3.i686.rpmXspixman-devel-0.40.0-6.el9_3.i686.rpmXspixman-devel-0.40.0-6.el9_3.x86_64.rpmWspixman-0.40.0-6.el9_3.x86_64.rpmWspixman-0.40.0-6.el9_3.i686.rpmXspixman-devel-0.40.0-6.el9_3.i686.rpmR! WBBsecurityModerate: skopeo security updateVZ https://access.redhat.com/errata/RHSA-2023:7762RHSA-2023:7762RHSA-2023:7762 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7762.htmlALSA-2023:7762ALSA-2023:7762 8&skopeo-1.13.3-3.el9_3.x86_64.rpm9&skopeo-tests-1.13.3-3.el9_3.x86_64.rpm8&skopeo-1.13.3-3.el9_3.x86_64.rpm9&skopeo-tests-1.13.3-3.el9_3.x86_64.rpmK" \securityModerate: runc security update0qhttps://access.redhat.com/errata/RHSA-2023:7763RHSA-2023:7763RHSA-2023:7763 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7763.htmlALSA-2023:7763ALSA-2023:7763  frunc-1.1.9-2.el9_3.x86_64.rpm frunc-1.1.9-2.el9_3.x86_64.rpmI# #_BBsecurityModerate: buildah security update! https://access.redhat.com/errata/RHSA-2023:7764RHSA-2023:7764RHSA-2023:7764 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7764.htmlALSA-2023:7764ALSA-2023:7764 8buildah-1.31.3-2.el9_3.x86_64.rpm9buildah-tests-1.31.3-2.el9_3.x86_64.rpm8buildah-1.31.3-2.el9_3.x86_64.rpm9buildah-tests-1.31.3-2.el9_3.x86_64.rpmL$ /dBBBBBBBBBsecurityModerate: podman security update8 https://access.redhat.com/errata/RHSA-2023:7765RHSA-2023:7765RHSA-2023:7765 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7765.htmlALSA-2023:7765ALSA-2023:7765 4&podman-remote-4.6.1-7.el9_3.x86_64.rpm2&podman-4.6.1-7.el9_3.x86_64.rpm5&podman-tests-4.6.1-7.el9_3.x86_64.rpm3&podman-plugins-4.6.1-7.el9_3.x86_64.rpmE&podman-gvproxy-4.6.1-7.el9_3.x86_64.rpmg&podman-docker-4.6.1-7.el9_3.noarch.rpm4&podman-remote-4.6.1-7.el9_3.x86_64.rpm2&podman-4.6.1-7.el9_3.x86_64.rpm5&podman-tests-4.6.1-7.el9_3.x86_64.rpm3&podman-plugins-4.6.1-7.el9_3.x86_64.rpmE&podman-gvproxy-4.6.1-7.el9_3.x86_64.rpmg&podman-docker-4.6.1-7.el9_3.noarch.rpmZ% 2psecurityModerate: containernetworking-plugins security update9 https://access.redhat.com/errata/RHSA-2023:7766RHSA-2023:7766RHSA-2023:7766 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7766.htmlALSA-2023:7766ALSA-2023:7766 ^fcontainernetworking-plugins-1.3.0-6.el9_3.x86_64.rpm^fcontainernetworking-plugins-1.3.0-6.el9_3.x86_64.rpmI& sBBBBBBBBBBBBBBsecurityImportant: postgresql security updateL https://access.redhat.com/errata/RHSA-2023:7784RHSA-2023:7784RHSA-2023:7784 https://access.redhat.com/security/cve/CVE-2023-39417CVE-2023-39417CVE-2023-39417https://access.redhat.com/security/cve/CVE-2023-5868CVE-2023-5868CVE-2023-5868https://access.redhat.com/security/cve/CVE-2023-5869CVE-2023-5869CVE-2023-5869https://access.redhat.com/security/cve/CVE-2023-5870CVE-2023-5870CVE-2023-5870https://bugzilla.redhat.com/22281112228111https://bugzilla.redhat.com/22471682247168https://bugzilla.redhat.com/22471692247169https://bugzilla.redhat.com/22471702247170https://errata.almalinux.org/9/ALSA-2023-7784.htmlALSA-2023:7784ALSA-2023:7784 %spostgresql-pltcl-13.13-1.el9_3.x86_64.rpm"spostgresql-contrib-13.13-1.el9_3.x86_64.rpm&spostgresql-private-libs-13.13-1.el9_3.x86_64.rpm(spostgresql-upgrade-13.13-1.el9_3.x86_64.rpm#spostgresql-plperl-13.13-1.el9_3.x86_64.rpm$spostgresql-plpython3-13.13-1.el9_3.x86_64.rpm'spostgresql-server-13.13-1.el9_3.x86_64.rpm_spostgresql-13.13-1.el9_3.x86_64.rpm%spostgresql-pltcl-13.13-1.el9_3.x86_64.rpm"spostgresql-contrib-13.13-1.el9_3.x86_64.rpm&spostgresql-private-libs-13.13-1.el9_3.x86_64.rpm(spostgresql-upgrade-13.13-1.el9_3.x86_64.rpm#spostgresql-plperl-13.13-1.el9_3.x86_64.rpm$spostgresql-plpython3-13.13-1.el9_3.x86_64.rpm'spostgresql-server-13.13-1.el9_3.x86_64.rpm_spostgresql-13.13-1.el9_3.x86_64.rpmb' !nBBBBBRBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security updateRc https://access.redhat.com/errata/RHSA-2023:7785RHSA-2023:7785RHSA-2023:7785 https://access.redhat.com/security/cve/CVE-2023-39417CVE-2023-39417CVE-2023-39417https://access.redhat.com/security/cve/CVE-2023-39418CVE-2023-39418CVE-2023-39418https://access.redhat.com/security/cve/CVE-2023-5868CVE-2023-5868CVE-2023-5868https://access.redhat.com/security/cve/CVE-2023-5869CVE-2023-5869CVE-2023-5869https://access.redhat.com/security/cve/CVE-2023-5870CVE-2023-5870CVE-2023-5870https://bugzilla.redhat.com/22281112228111https://bugzilla.redhat.com/22281122228112https://bugzilla.redhat.com/22471682247168https://bugzilla.redhat.com/22471692247169https://bugzilla.redhat.com/22471702247170https://errata.almalinux.org/9/ALSA-2023-7785.htmlALSA-2023:7785ALSA-2023:7785 _f(%ppostgresql-pltcl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm kpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpmppostgresql-test-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm ppostgresql-server-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm_ppostgresql-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm&ppostgresql-private-libs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm jpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm'ppostgresql-server-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-static-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm ppostgresql-docs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm(ppostgresql-upgrade-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmipg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm#ppostgresql-plperl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm"ppostgresql-contrib-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-upgrade-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmippostgresql-test-rpm-macros-15.5-1.module_el9.3.0+52+21733919.noarch.rpm$ppostgresql-plpython3-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm ppostgresql-private-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm_f(%ppostgresql-pltcl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm kpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpmppostgresql-test-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm ppostgresql-server-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm_ppostgresql-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm&ppostgresql-private-libs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm jpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm'ppostgresql-server-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-static-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm ppostgresql-docs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm(ppostgresql-upgrade-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmipg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm#ppostgresql-plperl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm"ppostgresql-contrib-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmppostgresql-upgrade-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmippostgresql-test-rpm-macros-15.5-1.module_el9.3.0+52+21733919.noarch.rpm$ppostgresql-plpython3-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm ppostgresql-private-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm&( %bBsecurityImportant: gstreamer1-plugins-bad-free security update5https://access.redhat.com/errata/RHSA-2023:7791RHSA-2023:7791RHSA-2023:7791 https://access.redhat.com/security/cve/CVE-2023-44429CVE-2023-44429CVE-2023-44429https://access.redhat.com/security/cve/CVE-2023-44446CVE-2023-44446CVE-2023-44446https://bugzilla.redhat.com/22502472250247https://bugzilla.redhat.com/22502492250249https://errata.almalinux.org/9/ALSA-2023-7791.htmlALSA-2023:7791ALSA-2023:7791 Y%gstreamer1-plugins-bad-free-1.22.1-2.el9_3.i686.rpmY%gstreamer1-plugins-bad-free-1.22.1-2.el9_3.x86_64.rpmY%gstreamer1-plugins-bad-free-1.22.1-2.el9_3.i686.rpmY%gstreamer1-plugins-bad-free-1.22.1-2.el9_3.x86_64.rpmM) (fsecurityImportant: thunderbird security updateR@https://access.redhat.com/errata/RHSA-2024:0001RHSA-2024:0001RHSA-2024:0001 https://access.redhat.com/security/cve/CVE-2023-50761CVE-2023-50761CVE-2023-50761https://access.redhat.com/security/cve/CVE-2023-50762CVE-2023-50762CVE-2023-50762https://access.redhat.com/security/cve/CVE-2023-6856CVE-2023-6856CVE-2023-6856https://access.redhat.com/security/cve/CVE-2023-6857CVE-2023-6857CVE-2023-6857https://access.redhat.com/security/cve/CVE-2023-6858CVE-2023-6858CVE-2023-6858https://access.redhat.com/security/cve/CVE-2023-6859CVE-2023-6859CVE-2023-6859https://access.redhat.com/security/cve/CVE-2023-6860CVE-2023-6860CVE-2023-6860https://access.redhat.com/security/cve/CVE-2023-6861CVE-2023-6861CVE-2023-6861https://access.redhat.com/security/cve/CVE-2023-6862CVE-2023-6862CVE-2023-6862https://access.redhat.com/security/cve/CVE-2023-6863CVE-2023-6863CVE-2023-6863https://access.redhat.com/security/cve/CVE-2023-6864CVE-2023-6864CVE-2023-6864https://bugzilla.redhat.com/22553602255360https://bugzilla.redhat.com/22553622255362https://bugzilla.redhat.com/22553632255363https://bugzilla.redhat.com/22553642255364https://bugzilla.redhat.com/22553652255365https://bugzilla.redhat.com/22553672255367https://bugzilla.redhat.com/22553682255368https://bugzilla.redhat.com/22553692255369https://bugzilla.redhat.com/22553702255370https://bugzilla.redhat.com/22553782255378https://bugzilla.redhat.com/22553792255379https://errata.almalinux.org/9/ALSA-2024-0001.htmlALSA-2024:0001ALSA-2024:0001 :nthunderbird-115.6.0-1.el9_3.alma.x86_64.rpm:nthunderbird-115.6.0-1.el9_3.alma.x86_64.rpm֯* 4iBBBBBBBBBsecurityImportant: tigervnc security update0https://access.redhat.com/errata/RHSA-2024:0010RHSA-2024:0010RHSA-2024:0010 https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://errata.almalinux.org/9/ALSA-2024-0010.htmlALSA-2024:0010ALSA-2024:0010 $Rtigervnc-license-1.13.1-3.el9_3.3.alma.1.noarch.rpm#Rtigervnc-icons-1.13.1-3.el9_3.3.alma.1.noarch.rpmNRtigervnc-server-module-1.13.1-3.el9_3.3.alma.1.x86_64.rpmKRtigervnc-1.13.1-3.el9_3.3.alma.1.x86_64.rpmMRtigervnc-server-minimal-1.13.1-3.el9_3.3.alma.1.x86_64.rpmLRtigervnc-server-1.13.1-3.el9_3.3.alma.1.x86_64.rpm%Rtigervnc-selinux-1.13.1-3.el9_3.3.alma.1.noarch.rpm$Rtigervnc-license-1.13.1-3.el9_3.3.alma.1.noarch.rpm#Rtigervnc-icons-1.13.1-3.el9_3.3.alma.1.noarch.rpmNRtigervnc-server-module-1.13.1-3.el9_3.3.alma.1.x86_64.rpmKRtigervnc-1.13.1-3.el9_3.3.alma.1.x86_64.rpmMRtigervnc-server-minimal-1.13.1-3.el9_3.3.alma.1.x86_64.rpmLRtigervnc-server-1.13.1-3.el9_3.3.alma.1.x86_64.rpm%Rtigervnc-selinux-1.13.1-3.el9_3.3.alma.1.noarch.rpm֭$+ 9uBBsecurityImportant: firefox security updateBhttps://access.redhat.com/errata/RHSA-2024:0025RHSA-2024:0025RHSA-2024:0025 https://access.redhat.com/security/cve/CVE-2023-6856CVE-2023-6856CVE-2023-6856https://access.redhat.com/security/cve/CVE-2023-6857CVE-2023-6857CVE-2023-6857https://access.redhat.com/security/cve/CVE-2023-6858CVE-2023-6858CVE-2023-6858https://access.redhat.com/security/cve/CVE-2023-6859CVE-2023-6859CVE-2023-6859https://access.redhat.com/security/cve/CVE-2023-6860CVE-2023-6860CVE-2023-6860https://access.redhat.com/security/cve/CVE-2023-6861CVE-2023-6861CVE-2023-6861https://access.redhat.com/security/cve/CVE-2023-6862CVE-2023-6862CVE-2023-6862https://access.redhat.com/security/cve/CVE-2023-6863CVE-2023-6863CVE-2023-6863https://access.redhat.com/security/cve/CVE-2023-6864CVE-2023-6864CVE-2023-6864https://access.redhat.com/security/cve/CVE-2023-6865CVE-2023-6865CVE-2023-6865https://access.redhat.com/security/cve/CVE-2023-6867CVE-2023-6867CVE-2023-6867https://bugzilla.redhat.com/22553602255360https://bugzilla.redhat.com/22553612255361https://bugzilla.redhat.com/22553622255362https://bugzilla.redhat.com/22553632255363https://bugzilla.redhat.com/22553642255364https://bugzilla.redhat.com/22553652255365https://bugzilla.redhat.com/22553662255366https://bugzilla.redhat.com/22553672255367https://bugzilla.redhat.com/22553682255368https://bugzilla.redhat.com/22553692255369https://bugzilla.redhat.com/22553702255370https://errata.almalinux.org/9/ALSA-2024-0025.htmlALSA-2024:0025ALSA-2024:0025 8nfirefox-115.6.0-1.el9_3.alma.x86_64.rpmQnfirefox-x11-115.6.0-1.el9_3.alma.x86_64.rpm8nfirefox-115.6.0-1.el9_3.alma.x86_64.rpmQnfirefox-x11-115.6.0-1.el9_3.alma.x86_64.rpm֫Y, dotnet-apphost-pack-8.0-8.0.1-1.el9_3.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpmnetstandard-targeting-pack-2.1-8.0.101-1.el9_3.x86_64.rpmBdotnet-runtime-8.0-8.0.1-1.el9_3.x86_64.rpmdotnet-host-8.0.1-1.el9_3.x86_64.rpm@dotnet-hostfxr-8.0-8.0.1-1.el9_3.x86_64.rpm <aspnetcore-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpmHdotnet-templates-8.0-8.0.101-1.el9_3.x86_64.rpm:aspnetcore-runtime-8.0-8.0.1-1.el9_3.x86_64.rpmDdotnet-sdk-8.0-8.0.101-1.el9_3.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.1-1.el9_3.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.1-1.el9_3.x86_64.rpmnetstandard-targeting-pack-2.1-8.0.101-1.el9_3.x86_64.rpmBdotnet-runtime-8.0-8.0.1-1.el9_3.x86_64.rpmdotnet-host-8.0.1-1.el9_3.x86_64.rpm@dotnet-hostfxr-8.0-8.0.1-1.el9_3.x86_64.rpm1 )YBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security update|ghttps://access.redhat.com/errata/RHSA-2024:0156RHSA-2024:0156RHSA-2024:0156 https://access.redhat.com/security/cve/CVE-2024-0056CVE-2024-0056CVE-2024-0056https://access.redhat.com/security/cve/CVE-2024-0057CVE-2024-0057CVE-2024-0057https://access.redhat.com/security/cve/CVE-2024-21319CVE-2024-21319CVE-2024-21319https://bugzilla.redhat.com/22553842255384https://bugzilla.redhat.com/22553862255386https://bugzilla.redhat.com/22575662257566https://errata.almalinux.org/9/ALSA-2024-0156.htmlALSA-2024:0156ALSA-2024:0156 dotnet-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpmdotnet-hostfxr-6.0-6.0.26-1.el9_3.x86_64.rpmaspnetcore-runtime-6.0-6.0.26-1.el9_3.x86_64.rpmNdotnet-templates-6.0-6.0.126-1.el9_3.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpmNdotnet-sdk-6.0-6.0.126-1.el9_3.x86_64.rpmdotnet-apphost-pack-6.0-6.0.26-1.el9_3.x86_64.rpmdotnet-runtime-6.0-6.0.26-1.el9_3.x86_64.rpmdotnet-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpmdotnet-hostfxr-6.0-6.0.26-1.el9_3.x86_64.rpmaspnetcore-runtime-6.0-6.0.26-1.el9_3.x86_64.rpmNdotnet-templates-6.0-6.0.126-1.el9_3.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.26-1.el9_3.x86_64.rpmNdotnet-sdk-6.0-6.0.126-1.el9_3.x86_64.rpmdotnet-apphost-pack-6.0-6.0.26-1.el9_3.x86_64.rpmdotnet-runtime-6.0-6.0.26-1.el9_3.x86_64.rpmw2 ytomcat-jsp-2.3-api-9.0.62-37.el9_3.1.noarch.rpmytomcat-jsp-2.3-api-9.0.62-37.el9_3.1.noarch.rpm +`BBBBBBBBBsecurityImportant: tigervnc security updatewo https://access.redhat.com/errata/RHSA-2024:0557RHSA-2024:0557RHSA-2024:0557 https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-0557.htmlALSA-2024:0557ALSA-2024:0557 KStigervnc-1.13.1-3.el9_3.6.alma.1.x86_64.rpm$Stigervnc-license-1.13.1-3.el9_3.6.alma.1.noarch.rpmLStigervnc-server-1.13.1-3.el9_3.6.alma.1.x86_64.rpmMStigervnc-server-minimal-1.13.1-3.el9_3.6.alma.1.x86_64.rpmNStigervnc-server-module-1.13.1-3.el9_3.6.alma.1.x86_64.rpm#Stigervnc-icons-1.13.1-3.el9_3.6.alma.1.noarch.rpm%Stigervnc-selinux-1.13.1-3.el9_3.6.alma.1.noarch.rpmKStigervnc-1.13.1-3.el9_3.6.alma.1.x86_64.rpm$Stigervnc-license-1.13.1-3.el9_3.6.alma.1.noarch.rpmLStigervnc-server-1.13.1-3.el9_3.6.alma.1.x86_64.rpmMStigervnc-server-minimal-1.13.1-3.el9_3.6.alma.1.x86_64.rpmNStigervnc-server-module-1.13.1-3.el9_3.6.alma.1.x86_64.rpm#Stigervnc-icons-1.13.1-3.el9_3.6.alma.1.noarch.rpm%Stigervnc-selinux-1.13.1-3.el9_3.6.alma.1.noarch.rpmW? .lsecurityImportant: thunderbird security updatefhttps://access.redhat.com/errata/RHSA-2024:0602RHSA-2024:0602RHSA-2024:0602 https://access.redhat.com/security/cve/CVE-2024-0741CVE-2024-0741CVE-2024-0741https://access.redhat.com/security/cve/CVE-2024-0742CVE-2024-0742CVE-2024-0742https://access.redhat.com/security/cve/CVE-2024-0746CVE-2024-0746CVE-2024-0746https://access.redhat.com/security/cve/CVE-2024-0747CVE-2024-0747CVE-2024-0747https://access.redhat.com/security/cve/CVE-2024-0749CVE-2024-0749CVE-2024-0749https://access.redhat.com/security/cve/CVE-2024-0750CVE-2024-0750CVE-2024-0750https://access.redhat.com/security/cve/CVE-2024-0751CVE-2024-0751CVE-2024-0751https://access.redhat.com/security/cve/CVE-2024-0753CVE-2024-0753CVE-2024-0753https://access.redhat.com/security/cve/CVE-2024-0755CVE-2024-0755CVE-2024-0755https://bugzilla.redhat.com/22599262259926https://bugzilla.redhat.com/22599272259927https://bugzilla.redhat.com/22599282259928https://bugzilla.redhat.com/22599292259929https://bugzilla.redhat.com/22599302259930https://bugzilla.redhat.com/22599312259931https://bugzilla.redhat.com/22599322259932https://bugzilla.redhat.com/22599332259933https://bugzilla.redhat.com/22599342259934https://errata.almalinux.org/9/ALSA-2024-0602.htmlALSA-2024:0602ALSA-2024:0602 :othunderbird-115.7.0-1.el9_3.alma.x86_64.rpm:othunderbird-115.7.0-1.el9_3.alma.x86_64.rpm@ 3oBBsecurityImportant: firefox security updatevAhttps://access.redhat.com/errata/RHSA-2024:0603RHSA-2024:0603RHSA-2024:0603 https://access.redhat.com/security/cve/CVE-2024-0741CVE-2024-0741CVE-2024-0741https://access.redhat.com/security/cve/CVE-2024-0742CVE-2024-0742CVE-2024-0742https://access.redhat.com/security/cve/CVE-2024-0746CVE-2024-0746CVE-2024-0746https://access.redhat.com/security/cve/CVE-2024-0747CVE-2024-0747CVE-2024-0747https://access.redhat.com/security/cve/CVE-2024-0749CVE-2024-0749CVE-2024-0749https://access.redhat.com/security/cve/CVE-2024-0750CVE-2024-0750CVE-2024-0750https://access.redhat.com/security/cve/CVE-2024-0751CVE-2024-0751CVE-2024-0751https://access.redhat.com/security/cve/CVE-2024-0753CVE-2024-0753CVE-2024-0753https://access.redhat.com/security/cve/CVE-2024-0755CVE-2024-0755CVE-2024-0755https://bugzilla.redhat.com/22599262259926https://bugzilla.redhat.com/22599272259927https://bugzilla.redhat.com/22599282259928https://bugzilla.redhat.com/22599292259929https://bugzilla.redhat.com/22599302259930https://bugzilla.redhat.com/22599312259931https://bugzilla.redhat.com/22599322259932https://bugzilla.redhat.com/22599332259933https://bugzilla.redhat.com/22599342259934https://errata.almalinux.org/9/ALSA-2024-0603.htmlALSA-2024:0603ALSA-2024:0603 Qofirefox-x11-115.7.0-1.el9_3.alma.x86_64.rpm8ofirefox-115.7.0-1.el9_3.alma.x86_64.rpmQofirefox-x11-115.7.0-1.el9_3.alma.x86_64.rpm8ofirefox-115.7.0-1.el9_3.alma.x86_64.rpm8A 6tsecurityImportant: runc security update7|https://access.redhat.com/errata/RHSA-2024:0670RHSA-2024:0670RHSA-2024:0670 https://access.redhat.com/security/cve/CVE-2024-21626CVE-2024-21626CVE-2024-21626https://bugzilla.redhat.com/22587252258725https://errata.almalinux.org/9/ALSA-2024-0670.htmlALSA-2024:0670ALSA-2024:0670  _runc-1.1.12-1.el9_3.x86_64.rpm _runc-1.1.12-1.el9_3.x86_64.rpm1B dotnet-apphost-pack-8.0-8.0.2-2.el9_3.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpmBdotnet-runtime-8.0-8.0.2-2.el9_3.x86_64.rpm@dotnet-hostfxr-8.0-8.0.2-2.el9_3.x86_64.rpmDdotnet-sdk-8.0-8.0.102-2.el9_3.x86_64.rpm :aspnetcore-runtime-8.0-8.0.2-2.el9_3.x86_64.rpmnetstandard-targeting-pack-2.1-8.0.102-2.el9_3.x86_64.rpmdotnet-host-8.0.2-2.el9_3.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpmHdotnet-templates-8.0-8.0.102-2.el9_3.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.2-2.el9_3.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpmBdotnet-runtime-8.0-8.0.2-2.el9_3.x86_64.rpm@dotnet-hostfxr-8.0-8.0.2-2.el9_3.x86_64.rpmDdotnet-sdk-8.0-8.0.102-2.el9_3.x86_64.rpmH 7nBBBBBhBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security updaten https://access.redhat.com/errata/RHSA-2024:0950RHSA-2024:0950RHSA-2024:0950 https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0950.htmlALSA-2024:0950ALSA-2024:0950 _h( kpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpmqpostgresql-upgrade-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm jpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm%qpostgresql-pltcl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm&qpostgresql-private-libs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-test-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm_qpostgresql-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm"qpostgresql-contrib-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm qpostgresql-server-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm'qpostgresql-server-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm(qpostgresql-upgrade-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmipg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm qpostgresql-docs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm$qpostgresql-plpython3-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmiqpostgresql-test-rpm-macros-15.6-1.module_el9.3.0+55+d62f4779.noarch.rpm#qpostgresql-plperl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-static-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm qpostgresql-private-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm_h( kpostgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpmqpostgresql-upgrade-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm jpgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpm%qpostgresql-pltcl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm&qpostgresql-private-libs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-test-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm_qpostgresql-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm"qpostgresql-contrib-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm qpostgresql-server-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm'qpostgresql-server-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm(qpostgresql-upgrade-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmipg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm qpostgresql-docs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm$qpostgresql-plpython3-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmiqpostgresql-test-rpm-macros-15.6-1.module_el9.3.0+55+d62f4779.noarch.rpm#qpostgresql-plperl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqpostgresql-static-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm qpostgresql-private-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqI xBBBBBBBBBBBBBBsecurityImportant: postgresql security updatew https://access.redhat.com/errata/RHSA-2024:0951RHSA-2024:0951RHSA-2024:0951 https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0951.htmlALSA-2024:0951ALSA-2024:0951 _tpostgresql-13.14-1.el9_3.x86_64.rpm#tpostgresql-plperl-13.14-1.el9_3.x86_64.rpm"tpostgresql-contrib-13.14-1.el9_3.x86_64.rpm$tpostgresql-plpython3-13.14-1.el9_3.x86_64.rpm(tpostgresql-upgrade-13.14-1.el9_3.x86_64.rpm'tpostgresql-server-13.14-1.el9_3.x86_64.rpm%tpostgresql-pltcl-13.14-1.el9_3.x86_64.rpm&tpostgresql-private-libs-13.14-1.el9_3.x86_64.rpm_tpostgresql-13.14-1.el9_3.x86_64.rpm#tpostgresql-plperl-13.14-1.el9_3.x86_64.rpm"tpostgresql-contrib-13.14-1.el9_3.x86_64.rpm$tpostgresql-plpython3-13.14-1.el9_3.x86_64.rpm(tpostgresql-upgrade-13.14-1.el9_3.x86_64.rpm'tpostgresql-server-13.14-1.el9_3.x86_64.rpm%tpostgresql-pltcl-13.14-1.el9_3.x86_64.rpm&tpostgresql-private-libs-13.14-1.el9_3.x86_64.rpmJ IBBsecurityImportant: firefox security updatePhttps://access.redhat.com/errata/RHSA-2024:0952RHSA-2024:0952RHSA-2024:0952 https://access.redhat.com/security/cve/CVE-2024-1546CVE-2024-1546CVE-2024-1546https://access.redhat.com/security/cve/CVE-2024-1547CVE-2024-1547CVE-2024-1547https://access.redhat.com/security/cve/CVE-2024-1548CVE-2024-1548CVE-2024-1548https://access.redhat.com/security/cve/CVE-2024-1549CVE-2024-1549CVE-2024-1549https://access.redhat.com/security/cve/CVE-2024-1550CVE-2024-1550CVE-2024-1550https://access.redhat.com/security/cve/CVE-2024-1551CVE-2024-1551CVE-2024-1551https://access.redhat.com/security/cve/CVE-2024-1552CVE-2024-1552CVE-2024-1552https://access.redhat.com/security/cve/CVE-2024-1553CVE-2024-1553CVE-2024-1553https://bugzilla.redhat.com/22653492265349https://bugzilla.redhat.com/22653502265350https://bugzilla.redhat.com/22653512265351https://bugzilla.redhat.com/22653522265352https://bugzilla.redhat.com/22653532265353https://bugzilla.redhat.com/22653542265354https://bugzilla.redhat.com/22653552265355https://bugzilla.redhat.com/22653562265356https://errata.almalinux.org/9/ALSA-2024-0952.htmlALSA-2024:0952ALSA-2024:0952 Qpfirefox-x11-115.8.0-1.el9_3.alma.x86_64.rpm8pfirefox-115.8.0-1.el9_3.alma.x86_64.rpmQpfirefox-x11-115.8.0-1.el9_3.alma.x86_64.rpm8pfirefox-115.8.0-1.el9_3.alma.x86_64.rpmhK NsecurityImportant: thunderbird security updatePhttps://access.redhat.com/errata/RHSA-2024:0963RHSA-2024:0963RHSA-2024:0963 https://access.redhat.com/security/cve/CVE-2024-1546CVE-2024-1546CVE-2024-1546https://access.redhat.com/security/cve/CVE-2024-1547CVE-2024-1547CVE-2024-1547https://access.redhat.com/security/cve/CVE-2024-1548CVE-2024-1548CVE-2024-1548https://access.redhat.com/security/cve/CVE-2024-1549CVE-2024-1549CVE-2024-1549https://access.redhat.com/security/cve/CVE-2024-1550CVE-2024-1550CVE-2024-1550https://access.redhat.com/security/cve/CVE-2024-1551CVE-2024-1551CVE-2024-1551https://access.redhat.com/security/cve/CVE-2024-1552CVE-2024-1552CVE-2024-1552https://access.redhat.com/security/cve/CVE-2024-1553CVE-2024-1553CVE-2024-1553https://bugzilla.redhat.com/22653492265349https://bugzilla.redhat.com/22653502265350https://bugzilla.redhat.com/22653512265351https://bugzilla.redhat.com/22653522265352https://bugzilla.redhat.com/22653532265353https://bugzilla.redhat.com/22653542265354https://bugzilla.redhat.com/22653552265355https://bugzilla.redhat.com/22653562265356https://errata.almalinux.org/9/ALSA-2024-0963.htmlALSA-2024:0963ALSA-2024:0963 :pthunderbird-115.8.0-1.el9_3.alma.x86_64.rpm:pthunderbird-115.8.0-1.el9_3.alma.x86_64.rpmqL QBBBBBsecurityImportant: unbound security updateo[https://access.redhat.com/errata/RHSA-2024:0977RHSA-2024:0977RHSA-2024:0977 https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-0977.htmlALSA-2024:0977ALSA-2024:0977 27unbound-libs-1.16.2-3.el9_3.1.i686.rpmK7unbound-1.16.2-3.el9_3.1.x86_64.rpm27unbound-libs-1.16.2-3.el9_3.1.x86_64.rpmH7python3-unbound-1.16.2-3.el9_3.1.x86_64.rpm27unbound-libs-1.16.2-3.el9_3.1.i686.rpmK7unbound-1.16.2-3.el9_3.1.x86_64.rpm27unbound-libs-1.16.2-3.el9_3.1.x86_64.rpmH7python3-unbound-1.16.2-3.el9_3.1.x86_64.rpmM $YBBBBBBBBBsecurityImportant: tigervnc security updateJlhttps://access.redhat.com/errata/RHSA-2024:10090RHSA-2024:10090RHSA-2024:10090 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://bugzilla.redhat.com/23172332317233https://errata.almalinux.org/9/ALSA-2024-10090.htmlALSA-2024:10090ALSA-2024:10090 %Vtigervnc-selinux-1.14.1-1.el9_5.noarch.rpmKVtigervnc-1.14.1-1.el9_5.x86_64.rpmMVtigervnc-server-minimal-1.14.1-1.el9_5.x86_64.rpmLVtigervnc-server-1.14.1-1.el9_5.x86_64.rpmNVtigervnc-server-module-1.14.1-1.el9_5.x86_64.rpm#Vtigervnc-icons-1.14.1-1.el9_5.noarch.rpm$Vtigervnc-license-1.14.1-1.el9_5.noarch.rpm%Vtigervnc-selinux-1.14.1-1.el9_5.noarch.rpmKVtigervnc-1.14.1-1.el9_5.x86_64.rpmMVtigervnc-server-minimal-1.14.1-1.el9_5.x86_64.rpmLVtigervnc-server-1.14.1-1.el9_5.x86_64.rpmNVtigervnc-server-module-1.14.1-1.el9_5.x86_64.rpm#Vtigervnc-icons-1.14.1-1.el9_5.noarch.rpm$Vtigervnc-license-1.14.1-1.el9_5.noarch.rpm]N &%securityModerate: perl-App-cpanminus security update6https://access.redhat.com/errata/RHSA-2024:10218RHSA-2024:10218RHSA-2024:10218 https://access.redhat.com/security/cve/CVE-2024-45321CVE-2024-45321CVE-2024-45321https://bugzilla.redhat.com/23080782308078https://errata.almalinux.org/9/ALSA-2024-10218.htmlALSA-2024:10218ALSA-2024:10218 xperl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpmxperl-App-cpanminus-1.7044-14.1.el9_5.noarch.rpmaO ,gBBBsecurityImportant: pam:1.5.1 security updateE[https://access.redhat.com/errata/RHSA-2024:10244RHSA-2024:10244RHSA-2024:10244 https://access.redhat.com/security/cve/CVE-2024-10963CVE-2024-10963CVE-2024-10963https://bugzilla.redhat.com/23242912324291https://errata.almalinux.org/9/ALSA-2024-10244.htmlALSA-2024:10244ALSA-2024:10244 1Zpam-devel-1.5.1-22.el9_5.x86_64.rpmCZpam-docs-1.5.1-22.el9_5.x86_64.rpm1Zpam-devel-1.5.1-22.el9_5.i686.rpm1Zpam-devel-1.5.1-22.el9_5.x86_64.rpmCZpam-docs-1.5.1-22.el9_5.x86_64.rpm1Zpam-devel-1.5.1-22.el9_5.i686.rpmgP >mBBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2024:10274RHSA-2024:10274RHSA-2024:10274 https://access.redhat.com/security/cve/CVE-2024-41009CVE-2024-41009CVE-2024-41009https://access.redhat.com/security/cve/CVE-2024-42244CVE-2024-42244CVE-2024-42244https://access.redhat.com/security/cve/CVE-2024-50226CVE-2024-50226CVE-2024-50226https://bugzilla.redhat.com/22984122298412https://bugzilla.redhat.com/23248762324876https://errata.almalinux.org/9/ALSA-2024-10274.htmlALSA-2024:10274ALSA-2024:10274 4kernel-doc-5.14.0-503.15.1.el9_5.noarch.rpm#4kernel-devel-5.14.0-503.15.1.el9_5.x86_64.rpm!4kernel-debug-devel-5.14.0-503.15.1.el9_5.x86_64.rpm"4kernel-debug-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpm&4kernel-headers-5.14.0-503.15.1.el9_5.x86_64.rpm%4perf-5.14.0-503.15.1.el9_5.x86_64.rpm)4rv-5.14.0-503.15.1.el9_5.x86_64.rpm'4rtla-5.14.0-503.15.1.el9_5.x86_64.rpm$4kernel-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpm 4kernel-doc-5.14.0-503.15.1.el9_5.noarch.rpm#4kernel-devel-5.14.0-503.15.1.el9_5.x86_64.rpm!4kernel-debug-devel-5.14.0-503.15.1.el9_5.x86_64.rpm"4kernel-debug-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpm&4kernel-headers-5.14.0-503.15.1.el9_5.x86_64.rpm%4perf-5.14.0-503.15.1.el9_5.x86_64.rpm)4rv-5.14.0-503.15.1.el9_5.x86_64.rpm'4rtla-5.14.0-503.15.1.el9_5.x86_64.rpm$4kernel-devel-matched-5.14.0-503.15.1.el9_5.x86_64.rpmxQ BBBBBBsecurityImportant: tuned security update?https://access.redhat.com/errata/RHSA-2024:10384RHSA-2024:10384RHSA-2024:10384 https://access.redhat.com/security/cve/CVE-2024-52336CVE-2024-52336CVE-2024-52336https://access.redhat.com/security/cve/CVE-2024-52337CVE-2024-52337CVE-2024-52337https://bugzilla.redhat.com/23245402324540https://bugzilla.redhat.com/23245412324541https://errata.almalinux.org/9/ALSA-2024-10384.htmlALSA-2024:10384ALSA-2024:10384 Vtuned-utils-2.24.0-2.el9_5.alma.1.noarch.rpmStuned-profiles-oracle-2.24.0-2.el9_5.alma.1.noarch.rpmTtuned-profiles-postgresql-2.24.0-2.el9_5.alma.1.noarch.rpmUtuned-profiles-spectrumscale-2.24.0-2.el9_5.alma.1.noarch.rpmOtuned-gtk-2.24.0-2.el9_5.alma.1.noarch.rpmPtuned-ppd-2.24.0-2.el9_5.alma.1.noarch.rpmQtuned-profiles-atomic-2.24.0-2.el9_5.alma.1.noarch.rpmRtuned-profiles-mssql-2.24.0-2.el9_5.alma.1.noarch.rpmVtuned-utils-2.24.0-2.el9_5.alma.1.noarch.rpmStuned-profiles-oracle-2.24.0-2.el9_5.alma.1.noarch.rpmTtuned-profiles-postgresql-2.24.0-2.el9_5.alma.1.noarch.rpmUtuned-profiles-spectrumscale-2.24.0-2.el9_5.alma.1.noarch.rpmOtuned-gtk-2.24.0-2.el9_5.alma.1.noarch.rpmPtuned-ppd-2.24.0-2.el9_5.alma.1.noarch.rpmQtuned-profiles-atomic-2.24.0-2.el9_5.alma.1.noarch.rpmRtuned-profiles-mssql-2.24.0-2.el9_5.alma.1.noarch.rpmzR HBBBBBBBBBBsecurityImportant: webkit2gtk3 security update]shttps://access.redhat.com/errata/RHSA-2024:10472RHSA-2024:10472RHSA-2024:10472 https://access.redhat.com/security/cve/CVE-2024-44309CVE-2024-44309CVE-2024-44309https://bugzilla.redhat.com/23279272327927https://errata.almalinux.org/9/ALSA-2024-10472.htmlALSA-2024:10472ALSA-2024:10472 2lwebkit2gtk3-devel-2.46.3-2.el9_5.x86_64.rpm2lwebkit2gtk3-devel-2.46.3-2.el9_5.i686.rpm1lwebkit2gtk3-2.46.3-2.el9_5.i686.rpm3lwebkit2gtk3-jsc-2.46.3-2.el9_5.x86_64.rpm1lwebkit2gtk3-2.46.3-2.el9_5.x86_64.rpm3lwebkit2gtk3-jsc-2.46.3-2.el9_5.i686.rpm4lwebkit2gtk3-jsc-devel-2.46.3-2.el9_5.x86_64.rpm4lwebkit2gtk3-jsc-devel-2.46.3-2.el9_5.i686.rpm2lwebkit2gtk3-devel-2.46.3-2.el9_5.x86_64.rpm2lwebkit2gtk3-devel-2.46.3-2.el9_5.i686.rpm1lwebkit2gtk3-2.46.3-2.el9_5.i686.rpm3lwebkit2gtk3-jsc-2.46.3-2.el9_5.x86_64.rpm1lwebkit2gtk3-2.46.3-2.el9_5.x86_64.rpm3lwebkit2gtk3-jsc-2.46.3-2.el9_5.i686.rpm4lwebkit2gtk3-jsc-devel-2.46.3-2.el9_5.x86_64.rpm4lwebkit2gtk3-jsc-devel-2.46.3-2.el9_5.i686.rpm7S UsecurityImportant: python-tornado security updatePJhttps://access.redhat.com/errata/RHSA-2024:10590RHSA-2024:10590RHSA-2024:10590 https://access.redhat.com/security/cve/CVE-2024-52804CVE-2024-52804CVE-2024-52804https://bugzilla.redhat.com/23280452328045https://errata.almalinux.org/9/ALSA-2024-10590.htmlALSA-2024:10590ALSA-2024:10590 upython3-tornado-6.4.2-1.el9_5.x86_64.rpmupython3-tornado-6.4.2-1.el9_5.x86_64.rpm\T XsecurityImportant: thunderbird security updatehttps://access.redhat.com/errata/RHSA-2024:10592RHSA-2024:10592RHSA-2024:10592 https://access.redhat.com/security/cve/CVE-2024-11159CVE-2024-11159CVE-2024-11159https://access.redhat.com/security/cve/CVE-2024-11692CVE-2024-11692CVE-2024-11692https://access.redhat.com/security/cve/CVE-2024-11694CVE-2024-11694CVE-2024-11694https://access.redhat.com/security/cve/CVE-2024-11695CVE-2024-11695CVE-2024-11695https://access.redhat.com/security/cve/CVE-2024-11696CVE-2024-11696CVE-2024-11696https://access.redhat.com/security/cve/CVE-2024-11697CVE-2024-11697CVE-2024-11697https://access.redhat.com/security/cve/CVE-2024-11699CVE-2024-11699CVE-2024-11699https://bugzilla.redhat.com/23258962325896https://bugzilla.redhat.com/23289412328941https://bugzilla.redhat.com/23289432328943https://bugzilla.redhat.com/23289462328946https://bugzilla.redhat.com/23289472328947https://bugzilla.redhat.com/23289482328948https://bugzilla.redhat.com/23289502328950https://errata.almalinux.org/9/ALSA-2024-10592.htmlALSA-2024:10592ALSA-2024:10592 :Zthunderbird-128.5.0-1.el9_5.alma.1.x86_64.rpm:Zthunderbird-128.5.0-1.el9_5.alma.1.x86_64.rpm3U [BBsecurityImportant: firefox security update Vhttps://access.redhat.com/errata/RHSA-2024:10702RHSA-2024:10702RHSA-2024:10702 https://access.redhat.com/security/cve/CVE-2024-11692CVE-2024-11692CVE-2024-11692https://access.redhat.com/security/cve/CVE-2024-11694CVE-2024-11694CVE-2024-11694https://access.redhat.com/security/cve/CVE-2024-11695CVE-2024-11695CVE-2024-11695https://access.redhat.com/security/cve/CVE-2024-11696CVE-2024-11696CVE-2024-11696https://access.redhat.com/security/cve/CVE-2024-11697CVE-2024-11697CVE-2024-11697https://access.redhat.com/security/cve/CVE-2024-11699CVE-2024-11699CVE-2024-11699https://bugzilla.redhat.com/23289412328941https://bugzilla.redhat.com/23289432328943https://bugzilla.redhat.com/23289462328946https://bugzilla.redhat.com/23289472328947https://bugzilla.redhat.com/23289482328948https://bugzilla.redhat.com/23289502328950https://errata.almalinux.org/9/ALSA-2024-10702.htmlALSA-2024:10702ALSA-2024:10702 Qfirefox-x11-128.5.1-1.el9_5.x86_64.rpm8firefox-128.5.1-1.el9_5.x86_64.rpmQfirefox-x11-128.5.1-1.el9_5.x86_64.rpm8firefox-128.5.1-1.el9_5.x86_64.rpmV "`securityImportant: edk2 security updatev6https://access.redhat.com/errata/RHSA-2024:1075RHSA-2024:1075RHSA-2024:1075 https://access.redhat.com/security/cve/CVE-2023-45230CVE-2023-45230CVE-2023-45230https://access.redhat.com/security/cve/CVE-2023-45234CVE-2023-45234CVE-2023-45234https://bugzilla.redhat.com/22586852258685https://bugzilla.redhat.com/22586972258697https://errata.almalinux.org/9/ALSA-2024-1075.htmlALSA-2024:1075ALSA-2024:1075 edk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm3edk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpmedk2-ovmf-20230524-4.el9_3.2.alma.noarch.rpm3edk2-aarch64-20230524-4.el9_3.2.alma.noarch.rpmLW FBBBVBEBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update,`https://access.redhat.com/errata/RHSA-2024:10787RHSA-2024:10787RHSA-2024:10787 https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10787.htmlALSA-2024:10787ALSA-2024:10787 _v(kpostgresql-test-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm_kpostgresql-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm bpgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm#kpostgresql-plperl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmkpostgresql-static-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm cpostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmikpostgresql-test-rpm-macros-15.10-1.module_el9.5.0+126+03d48c9f.noarch.rpm kpostgresql-server-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmkpostgresql-upgrade-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm%kpostgresql-pltcl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm kpostgresql-private-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm kpostgresql-docs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmvpg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm$kpostgresql-plpython3-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm"kpostgresql-contrib-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm'kpostgresql-server-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm(kpostgresql-upgrade-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm&kpostgresql-private-libs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm_v(kpostgresql-test-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm_kpostgresql-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm bpgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm#kpostgresql-plperl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmkpostgresql-static-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm cpostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmikpostgresql-test-rpm-macros-15.10-1.module_el9.5.0+126+03d48c9f.noarch.rpm kpostgresql-server-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmkpostgresql-upgrade-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm%kpostgresql-pltcl-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm kpostgresql-private-devel-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm kpostgresql-docs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmvpg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm$kpostgresql-plpython3-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm"kpostgresql-contrib-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm'kpostgresql-server-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm(kpostgresql-upgrade-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpm&kpostgresql-private-libs-15.10-1.module_el9.5.0+126+03d48c9f.x86_64.rpmvX JBBBTBBB_BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update `https://access.redhat.com/errata/RHSA-2024:10788RHSA-2024:10788RHSA-2024:10788 https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10788.htmlALSA-2024:10788ALSA-2024:10788 _l(wpg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm'postgresql-server-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm&postgresql-private-libs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm postgresql-server-devel-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpmipostgresql-test-rpm-macros-16.6-1.module_el9.5.0+127+50ff03a9.noarch.rpm#postgresql-plperl-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm%xpostgresql-pltcl-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmxpostgresql-test-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm/kpgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm"xpostgresql-contrib-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm postgresql-docs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm$xpostgresql-plpython3-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm xpostgresql-private-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm_xpostgresql-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmxpostgresql-upgrade-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmxpostgresql-static-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm(postgresql-upgrade-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm_l(wpg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm'postgresql-server-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm&postgresql-private-libs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm postgresql-server-devel-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpmipostgresql-test-rpm-macros-16.6-1.module_el9.5.0+127+50ff03a9.noarch.rpm#postgresql-plperl-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm%xpostgresql-pltcl-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmxpostgresql-test-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm/kpgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm"xpostgresql-contrib-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm postgresql-docs-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm$xpostgresql-plpython3-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm xpostgresql-private-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm_xpostgresql-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmxpostgresql-upgrade-devel-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpmxpostgresql-static-16.6-1.module_el9.5.0+128+1095dce2.x86_64.rpm(postgresql-upgrade-16.6-1.module_el9.5.0+127+50ff03a9.x86_64.rpm Y /_BBBBBBBBBBBBBBsecurityImportant: postgresql security updatel`https://access.redhat.com/errata/RHSA-2024:10791RHSA-2024:10791RHSA-2024:10791 https://access.redhat.com/security/cve/CVE-2024-10976CVE-2024-10976CVE-2024-10976https://access.redhat.com/security/cve/CVE-2024-10978CVE-2024-10978CVE-2024-10978https://access.redhat.com/security/cve/CVE-2024-10979CVE-2024-10979CVE-2024-10979https://bugzilla.redhat.com/23262512326251https://bugzilla.redhat.com/23262532326253https://bugzilla.redhat.com/23262632326263https://errata.almalinux.org/9/ALSA-2024-10791.htmlALSA-2024:10791ALSA-2024:10791 _vpostgresql-13.18-1.el9_5.x86_64.rpm#vpostgresql-plperl-13.18-1.el9_5.x86_64.rpm&vpostgresql-private-libs-13.18-1.el9_5.x86_64.rpm$vpostgresql-plpython3-13.18-1.el9_5.x86_64.rpm%vpostgresql-pltcl-13.18-1.el9_5.x86_64.rpm(vpostgresql-upgrade-13.18-1.el9_5.x86_64.rpm"vpostgresql-contrib-13.18-1.el9_5.x86_64.rpm'vpostgresql-server-13.18-1.el9_5.x86_64.rpm_vpostgresql-13.18-1.el9_5.x86_64.rpm#vpostgresql-plperl-13.18-1.el9_5.x86_64.rpm&vpostgresql-private-libs-13.18-1.el9_5.x86_64.rpm$vpostgresql-plpython3-13.18-1.el9_5.x86_64.rpm%vpostgresql-pltcl-13.18-1.el9_5.x86_64.rpm(vpostgresql-upgrade-13.18-1.el9_5.x86_64.rpm"vpostgresql-contrib-13.18-1.el9_5.x86_64.rpm'vpostgresql-server-13.18-1.el9_5.x86_64.rpmpZ pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ruby security updateL%https://access.redhat.com/errata/RHSA-2024:10858RHSA-2024:10858RHSA-2024:10858 https://access.redhat.com/security/cve/CVE-2024-49761CVE-2024-49761CVE-2024-49761https://bugzilla.redhat.com/23221532322153https://errata.almalinux.org/9/ALSA-2024-10858.htmlALSA-2024:10858ALSA-2024:10858 truby-devel-3.0.7-163.el9_5.x86_64.rpm+ rubygems-devel-3.2.33-163.el9_5.noarch.rpmuruby-libs-3.0.7-163.el9_5.i686.rpm!krubygem-irb-1.3.5-163.el9_5.noarch.rpmrubygem-io-console-0.5.7-163.el9_5.x86_64.rpmBrubygem-psych-3.3.2-163.el9_5.x86_64.rpmuruby-libs-3.0.7-163.el9_5.x86_64.rpm* rubygems-3.2.33-163.el9_5.noarch.rpm${rubygem-rake-13.0.3-163.el9_5.noarch.rpm rubygem-json-2.5.1-163.el9_5.x86_64.rpm rubygem-bundler-2.2.33-163.el9_5.noarch.rpm#_rubygem-power_assert-1.2.1-163.el9_5.noarch.rpm"Grubygem-minitest-5.14.2-163.el9_5.noarch.rpmkorubygem-rbs-1.4.0-163.el9_5.noarch.rpm%Qrubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpmruby-default-gems-3.0.7-163.el9_5.noarch.rpm'>rubygem-rss-0.2.9-163.el9_5.noarch.rpmruby-3.0.7-163.el9_5.i686.rpm9rubygem-bigdecimal-3.0.0-163.el9_5.x86_64.rpm(9rubygem-test-unit-3.3.7-163.el9_5.noarch.rpm)8rubygem-typeprof-0.15.2-163.el9_5.noarch.rpm&4rubygem-rexml-3.2.5-163.el9_5.noarch.rpmtruby-devel-3.0.7-163.el9_5.i686.rpmruby-3.0.7-163.el9_5.x86_64.rpmtruby-devel-3.0.7-163.el9_5.x86_64.rpm+ rubygems-devel-3.2.33-163.el9_5.noarch.rpmuruby-libs-3.0.7-163.el9_5.i686.rpm!krubygem-irb-1.3.5-163.el9_5.noarch.rpmrubygem-io-console-0.5.7-163.el9_5.x86_64.rpmBrubygem-psych-3.3.2-163.el9_5.x86_64.rpmuruby-libs-3.0.7-163.el9_5.x86_64.rpm* rubygems-3.2.33-163.el9_5.noarch.rpm${rubygem-rake-13.0.3-163.el9_5.noarch.rpm rubygem-json-2.5.1-163.el9_5.x86_64.rpm rubygem-bundler-2.2.33-163.el9_5.noarch.rpm#_rubygem-power_assert-1.2.1-163.el9_5.noarch.rpm"Grubygem-minitest-5.14.2-163.el9_5.noarch.rpmkorubygem-rbs-1.4.0-163.el9_5.noarch.rpm%Qrubygem-rdoc-6.3.4.1-163.el9_5.noarch.rpmruby-default-gems-3.0.7-163.el9_5.noarch.rpm'>rubygem-rss-0.2.9-163.el9_5.noarch.rpmruby-3.0.7-163.el9_5.i686.rpm9rubygem-bigdecimal-3.0.0-163.el9_5.x86_64.rpm(9rubygem-test-unit-3.3.7-163.el9_5.noarch.rpm)8rubygem-typeprof-0.15.2-163.el9_5.noarch.rpm&4rubygem-rexml-3.2.5-163.el9_5.noarch.rpmtruby-devel-3.0.7-163.el9_5.i686.rpmruby-3.0.7-163.el9_5.x86_64.rpmL[ 9]BBBBBoBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ruby:3.1 security updateq%https://access.redhat.com/errata/RHSA-2024:10860RHSA-2024:10860RHSA-2024:10860 https://access.redhat.com/security/cve/CVE-2024-49761CVE-2024-49761CVE-2024-49761https://bugzilla.redhat.com/23221532322153https://errata.almalinux.org/9/ALSA-2024-10860.htmlALSA-2024:10860ALSA-2024:10860 x($Yrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpmtMruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm#rubygem-power_assert-2.0.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmcMruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmMruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmMruby-default-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmi2rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmMruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm+rubygems-devel-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm!rrubygem-irb-1.4.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmuMruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm*rubygems-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm rubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmYrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmcMruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmFrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpm)Arubygem-typeprof-0.21.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmfrubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.i686.rpm(=rubygem-test-unit-3.5.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmfrubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm%Urubygem-rdoc-6.4.1.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmFrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmkHrubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.i686.rpm';rubygem-rss-0.2.9-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmtMruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm"Jrubygem-minitest-5.15.0-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmkHrubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm]Mruby-doc-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm,4rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm$~rubygem-rake-13.0.6-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm*2rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpmuMruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm rubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.i686.rpm+4rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm rubygem-bundler-2.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm&1rubygem-rexml-3.2.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmx($Yrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpmtMruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm#rubygem-power_assert-2.0.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmcMruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmMruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmMruby-default-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmi2rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmMruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm+rubygems-devel-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm!rrubygem-irb-1.4.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmuMruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm*rubygems-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm rubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmYrubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmcMruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmFrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpm)Arubygem-typeprof-0.21.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmfrubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.i686.rpm(=rubygem-test-unit-3.5.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmfrubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm%Urubygem-rdoc-6.4.1.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmFrubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmkHrubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.i686.rpm';rubygem-rss-0.2.9-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmtMruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm"Jrubygem-minitest-5.15.0-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmkHrubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm]Mruby-doc-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm,4rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm$~rubygem-rake-13.0.6-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm*2rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpmuMruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm rubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.i686.rpm+4rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm rubygem-bundler-2.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm&1rubygem-rexml-3.2.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmd\ ?zBBBsecurityModerate: redis:7 security updateM https://access.redhat.com/errata/RHSA-2024:10869RHSA-2024:10869RHSA-2024:10869 https://access.redhat.com/security/cve/CVE-2023-41053CVE-2023-41053CVE-2023-41053https://access.redhat.com/security/cve/CVE-2023-45145CVE-2023-45145CVE-2023-45145https://access.redhat.com/security/cve/CVE-2024-31227CVE-2024-31227CVE-2024-31227https://access.redhat.com/security/cve/CVE-2024-31228CVE-2024-31228CVE-2024-31228https://access.redhat.com/security/cve/CVE-2024-31449CVE-2024-31449CVE-2024-31449https://bugzilla.redhat.com/22378262237826https://bugzilla.redhat.com/22449402244940https://bugzilla.redhat.com/23170532317053https://bugzilla.redhat.com/23170562317056https://bugzilla.redhat.com/23170582317058https://errata.almalinux.org/9/ALSA-2024-10869.htmlALSA-2024:10869ALSA-2024:10869 "y(> redis-devel-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm redis-doc-7.2.6-1.module_el9.5.0+130+36ae7635.noarch.rpm" redis-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm"y(> redis-devel-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm redis-doc-7.2.6-1.module_el9.5.0+130+36ae7635.noarch.rpm" redis-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm#] @BBBBBBBBBBBBBBBsecurityModerate: kernel security updatecAhttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939 https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939 '5rtla-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-doc-5.14.0-503.16.1.el9_5.noarch.rpm#5kernel-devel-5.14.0-503.16.1.el9_5.x86_64.rpm&5kernel-headers-5.14.0-503.16.1.el9_5.x86_64.rpm%5perf-5.14.0-503.16.1.el9_5.x86_64.rpm"5kernel-debug-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm!5kernel-debug-devel-5.14.0-503.16.1.el9_5.x86_64.rpm$5kernel-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm)5rv-5.14.0-503.16.1.el9_5.x86_64.rpm '5rtla-5.14.0-503.16.1.el9_5.x86_64.rpm5kernel-doc-5.14.0-503.16.1.el9_5.noarch.rpm#5kernel-devel-5.14.0-503.16.1.el9_5.x86_64.rpm&5kernel-headers-5.14.0-503.16.1.el9_5.x86_64.rpm%5perf-5.14.0-503.16.1.el9_5.x86_64.rpm"5kernel-debug-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm!5kernel-debug-devel-5.14.0-503.16.1.el9_5.x86_64.rpm$5kernel-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm)5rv-5.14.0-503.16.1.el9_5.x86_64.rpm0^ cBUBBBBBBBBSBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.2 security update$https://access.redhat.com/errata/RHSA-2024:10949RHSA-2024:10949RHSA-2024:10949 https://access.redhat.com/security/cve/CVE-2024-2756CVE-2024-2756CVE-2024-2756https://access.redhat.com/security/cve/CVE-2024-3096CVE-2024-3096CVE-2024-3096https://access.redhat.com/security/cve/CVE-2024-5458CVE-2024-5458CVE-2024-5458https://access.redhat.com/security/cve/CVE-2024-8925CVE-2024-8925CVE-2024-8925https://access.redhat.com/security/cve/CVE-2024-8927CVE-2024-8927CVE-2024-8927https://access.redhat.com/security/cve/CVE-2024-9026CVE-2024-9026CVE-2024-9026https://bugzilla.redhat.com/22750582275058https://bugzilla.redhat.com/22750612275061https://bugzilla.redhat.com/22912522291252https://bugzilla.redhat.com/23170492317049https://bugzilla.redhat.com/23170512317051https://bugzilla.redhat.com/23171442317144https://errata.almalinux.org/9/ALSA-2024-10949.htmlALSA-2024:10949ALSA-2024:10949 (gEphp-soap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmeEphp-process-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmEphp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmfEphp-snmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmaEphp-odbc-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmbEphp-opcache-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm/'apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm`Ephp-mysqlnd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm]Ephp-intl-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmTEphp-dba-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmQEphp-bcmath-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmXEphp-enchant-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmYEphp-ffi-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmhEphp-xml-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm>php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm'php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmgphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpmAphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmREphp-cli-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm_Ephp-mbstring-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmUEphp-dbg-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmZEphp-fpm-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm[Ephp-gd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmVEphp-devel-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmdEphp-pgsql-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm^Ephp-ldap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm'php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmcEphp-pdo-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmWEphp-embedded-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmSEphp-common-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm\Ephp-gmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm(gEphp-soap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmeEphp-process-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmEphp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmfEphp-snmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmaEphp-odbc-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmbEphp-opcache-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm/'apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpm`Ephp-mysqlnd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm]Ephp-intl-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmTEphp-dba-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmQEphp-bcmath-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmXEphp-enchant-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmYEphp-ffi-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmhEphp-xml-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm>php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm'php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmgphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpmAphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmREphp-cli-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm_Ephp-mbstring-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmUEphp-dbg-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmZEphp-fpm-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm[Ephp-gd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmVEphp-devel-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmdEphp-pgsql-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm^Ephp-ldap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm'php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmcEphp-pdo-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmWEphp-embedded-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmSEphp-common-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm\Ephp-gmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmS_ 7RBBBBBBBBJBbBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security update=https://access.redhat.com/errata/RHSA-2024:10950RHSA-2024:10950RHSA-2024:10950 https://access.redhat.com/security/cve/CVE-2024-2756CVE-2024-2756CVE-2024-2756https://access.redhat.com/security/cve/CVE-2024-3096CVE-2024-3096CVE-2024-3096https://access.redhat.com/security/cve/CVE-2024-5458CVE-2024-5458CVE-2024-5458https://access.redhat.com/security/cve/CVE-2024-8925CVE-2024-8925CVE-2024-8925https://access.redhat.com/security/cve/CVE-2024-8927CVE-2024-8927CVE-2024-8927https://access.redhat.com/security/cve/CVE-2024-9026CVE-2024-9026CVE-2024-9026https://bugzilla.redhat.com/22750582275058https://bugzilla.redhat.com/22750612275061https://bugzilla.redhat.com/22912522291252https://bugzilla.redhat.com/23170492317049https://bugzilla.redhat.com/23170512317051https://bugzilla.redhat.com/23171442317144https://errata.almalinux.org/9/ALSA-2024-10950.htmlALSA-2024:10950ALSA-2024:10950 Zz(QCphp-bcmath-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm^Cphp-ldap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm=php-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmbCphp-opcache-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmhCphp-xml-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm\Cphp-gmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm`Cphp-mysqlnd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmWCphp-embedded-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmXCphp-enchant-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmVCphp-devel-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmgCphp-soap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmZCphp-fpm-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmTCphp-dba-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmeCphp-process-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmYCphp-ffi-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm>php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmcCphp-pdo-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmSCphp-common-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmdCphp-pgsql-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmCphp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmUCphp-dbg-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmNphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmRCphp-cli-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm]Cphp-intl-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm_Cphp-mbstring-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm[Cphp-gd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmaCphp-odbc-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm/Napcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmNphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmfCphp-snmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmZz(QCphp-bcmath-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm^Cphp-ldap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm=php-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmbCphp-opcache-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmhCphp-xml-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm\Cphp-gmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm`Cphp-mysqlnd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmWCphp-embedded-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmXCphp-enchant-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmVCphp-devel-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmgCphp-soap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmZCphp-fpm-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmTCphp-dba-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmeCphp-process-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmYCphp-ffi-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm>php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmcCphp-pdo-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmSCphp-common-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmdCphp-pgsql-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmCphp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmUCphp-dbg-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmNphp-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmRCphp-cli-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm]Cphp-intl-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm_Cphp-mbstring-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm[Cphp-gd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmaCphp-odbc-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm/Napcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmNphp-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmfCphp-snmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm`` xBBBBBBBBsecurityImportant: python3.12 security updateV-https://access.redhat.com/errata/RHSA-2024:10978RHSA-2024:10978RHSA-2024:10978 https://access.redhat.com/security/cve/CVE-2024-12254CVE-2024-12254CVE-2024-12254https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23308042330804https://errata.almalinux.org/9/ALSA-2024-10978.htmlALSA-2024:10978ALSA-2024:10978 Spython3.12-devel-3.12.5-2.el9_5.2.i686.rpm!Spython3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm Spython3.12-3.12.5-2.el9_5.2.x86_64.rpmSpython3.12-libs-3.12.5-2.el9_5.2.x86_64.rpmSpython3.12-devel-3.12.5-2.el9_5.2.x86_64.rpmSpython3.12-libs-3.12.5-2.el9_5.2.i686.rpmSpython3.12-devel-3.12.5-2.el9_5.2.i686.rpm!Spython3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm Spython3.12-3.12.5-2.el9_5.2.x86_64.rpmSpython3.12-libs-3.12.5-2.el9_5.2.x86_64.rpmSpython3.12-devel-3.12.5-2.el9_5.2.x86_64.rpmSpython3.12-libs-3.12.5-2.el9_5.2.i686.rpma CBBBBsecurityModerate: python3.9:3.9.21 security updatehttps://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983 https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:10983 =%python3-tkinter-3.9.21-1.el9_5.x86_64.rpmW%python3-devel-3.9.21-1.el9_5.x86_64.rpmj%python-unversioned-command-3.9.21-1.el9_5.noarch.rpmW%python3-devel-3.9.21-1.el9_5.i686.rpm=%python3-tkinter-3.9.21-1.el9_5.x86_64.rpmW%python3-devel-3.9.21-1.el9_5.x86_64.rpmj%python-unversioned-command-3.9.21-1.el9_5.noarch.rpmW%python3-devel-3.9.21-1.el9_5.i686.rpmHb JBBBBBBBBsecurityModerate: python3.11 security update!Mhttps://access.redhat.com/errata/RHSA-2024:11111RHSA-2024:11111RHSA-2024:11111 https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://errata.almalinux.org/9/ALSA-2024-11111.htmlALSA-2024:11111ALSA-2024:11111 `Kpython3.11-devel-3.11.9-7.el9_5.2.i686.rpm`Kpython3.11-devel-3.11.9-7.el9_5.2.x86_64.rpmiKpython3.11-3.11.9-7.el9_5.2.x86_64.rpmaKpython3.11-libs-3.11.9-7.el9_5.2.i686.rpmaKpython3.11-libs-3.11.9-7.el9_5.2.x86_64.rpmjKpython3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm`Kpython3.11-devel-3.11.9-7.el9_5.2.i686.rpm`Kpython3.11-devel-3.11.9-7.el9_5.2.x86_64.rpmiKpython3.11-3.11.9-7.el9_5.2.x86_64.rpmaKpython3.11-libs-3.11.9-7.el9_5.2.i686.rpmaKpython3.11-libs-3.11.9-7.el9_5.2.x86_64.rpmjKpython3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm|c UBBBBsecurityImportant: gstreamer1-plugins-good security updaten' https://access.redhat.com/errata/RHSA-2024:11122RHSA-2024:11122RHSA-2024:11122 https://access.redhat.com/security/cve/CVE-2024-47537CVE-2024-47537CVE-2024-47537https://access.redhat.com/security/cve/CVE-2024-47539CVE-2024-47539CVE-2024-47539https://access.redhat.com/security/cve/CVE-2024-47540CVE-2024-47540CVE-2024-47540https://access.redhat.com/security/cve/CVE-2024-47606CVE-2024-47606CVE-2024-47606https://access.redhat.com/security/cve/CVE-2024-47613CVE-2024-47613CVE-2024-47613https://bugzilla.redhat.com/23317192331719https://bugzilla.redhat.com/23317222331722https://bugzilla.redhat.com/23317262331726https://bugzilla.redhat.com/23317532331753https://bugzilla.redhat.com/23317602331760https://errata.almalinux.org/9/ALSA-2024-11122.htmlALSA-2024:11122ALSA-2024:11122 Zogstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpmZogstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpm[ogstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpm[ogstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpmZogstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpmZogstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpm[ogstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpm[ogstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpmrd $\BBBBBBsecurityImportant: gstreamer1-plugins-base security updateBhttps://access.redhat.com/errata/RHSA-2024:11123RHSA-2024:11123RHSA-2024:11123 https://access.redhat.com/security/cve/CVE-2024-47538CVE-2024-47538CVE-2024-47538https://access.redhat.com/security/cve/CVE-2024-47607CVE-2024-47607CVE-2024-47607https://access.redhat.com/security/cve/CVE-2024-47615CVE-2024-47615CVE-2024-47615https://bugzilla.redhat.com/23317272331727https://bugzilla.redhat.com/23317402331740https://bugzilla.redhat.com/23317542331754https://errata.almalinux.org/9/ALSA-2024-11123.htmlALSA-2024:11123ALSA-2024:11123 Yogstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpmXogstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpmqogstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpmXogstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpmYogstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpmYogstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpmXogstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpmqogstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpmXogstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpmYogstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpm-e 'esecurityModerate: edk2:20240524 security updateWBhttps://access.redhat.com/errata/RHSA-2024:11219RHSA-2024:11219RHSA-2024:11219 https://access.redhat.com/security/cve/CVE-2024-38796CVE-2024-38796CVE-2024-38796https://bugzilla.redhat.com/23153902315390https://errata.almalinux.org/9/ALSA-2024-11219.htmlALSA-2024:11219ALSA-2024:11219 edk2-ovmf-20240524-6.el9_5.3.noarch.rpm3edk2-aarch64-20240524-6.el9_5.3.noarch.rpmedk2-ovmf-20240524-6.el9_5.3.noarch.rpm3edk2-aarch64-20240524-6.el9_5.3.noarch.rpmTf )(securityModerate: python3.11-urllib3 security update9https://access.redhat.com/errata/RHSA-2024:11238RHSA-2024:11238RHSA-2024:11238 https://access.redhat.com/security/cve/CVE-2023-45803CVE-2023-45803CVE-2023-45803https://bugzilla.redhat.com/22468402246840https://errata.almalinux.org/9/ALSA-2024-11238.htmlALSA-2024:11238ALSA-2024:11238 Iepython3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpmIepython3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm`g 1jBBBBBsecurityModerate: mpg123:1.32.9 security updateRqhttps://access.redhat.com/errata/RHSA-2024:11242RHSA-2024:11242RHSA-2024:11242 https://access.redhat.com/security/cve/CVE-2024-10573CVE-2024-10573CVE-2024-10573https://bugzilla.redhat.com/23229802322980https://errata.almalinux.org/9/ALSA-2024-11242.htmlALSA-2024:11242ALSA-2024:11242 P:mpg123-libs-1.32.9-1.el9_5.x86_64.rpm7:mpg123-plugins-pulseaudio-1.32.9-1.el9_5.x86_64.rpm6:mpg123-1.32.9-1.el9_5.x86_64.rpmP:mpg123-libs-1.32.9-1.el9_5.i686.rpmP:mpg123-libs-1.32.9-1.el9_5.x86_64.rpm7:mpg123-plugins-pulseaudio-1.32.9-1.el9_5.x86_64.rpm6:mpg123-1.32.9-1.el9_5.x86_64.rpmP:mpg123-libs-1.32.9-1.el9_5.i686.rpmh 7rBBBsecurityModerate: pam security updateC?https://access.redhat.com/errata/RHSA-2024:11250RHSA-2024:11250RHSA-2024:11250 https://access.redhat.com/security/cve/CVE-2024-10041CVE-2024-10041CVE-2024-10041https://bugzilla.redhat.com/23192122319212https://errata.almalinux.org/9/ALSA-2024-11250.htmlALSA-2024:11250ALSA-2024:11250 1Ypam-devel-1.5.1-21.el9_5.x86_64.rpm1Ypam-devel-1.5.1-21.el9_5.i686.rpmCYpam-docs-1.5.1-21.el9_5.x86_64.rpm1Ypam-devel-1.5.1-21.el9_5.x86_64.rpm1Ypam-devel-1.5.1-21.el9_5.i686.rpmCYpam-docs-1.5.1-21.el9_5.x86_64.rpmi ;xBsecurityModerate: curl security update@https://access.redhat.com/errata/RHSA-2024:1129RHSA-2024:1129RHSA-2024:1129 https://access.redhat.com/security/cve/CVE-2023-46218CVE-2023-46218CVE-2023-46218https://bugzilla.redhat.com/22520302252030https://errata.almalinux.org/9/ALSA-2024-1129.htmlALSA-2024:1129ALSA-2024:1129 tlibcurl-devel-7.76.1-26.el9_3.3.i686.rpmtlibcurl-devel-7.76.1-26.el9_3.3.x86_64.rpmtlibcurl-devel-7.76.1-26.el9_3.3.i686.rpmtlibcurl-devel-7.76.1-26.el9_3.3.x86_64.rpm6j |BBsecurityModerate: openssh security updateB0https://access.redhat.com/errata/RHSA-2024:1130RHSA-2024:1130RHSA-2024:1130 https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://access.redhat.com/security/cve/CVE-2023-51385CVE-2023-51385CVE-2023-51385https://bugzilla.redhat.com/22542102254210https://bugzilla.redhat.com/22552712255271https://errata.almalinux.org/9/ALSA-2024-1130.htmlALSA-2024:1130ALSA-2024:1130 ' openssh-askpass-8.7p1-34.el9_3.3.x86_64.rpm(pam_ssh_agent_auth-0.10.4-5.34.el9_3.3.x86_64.rpm' openssh-askpass-8.7p1-34.el9_3.3.x86_64.rpm(pam_ssh_agent_auth-0.10.4-5.34.el9_3.3.x86_64.rpmRk ABBBBBBBBsecurityModerate: golang security updaterPhttps://access.redhat.com/errata/RHSA-2024:1131RHSA-2024:1131RHSA-2024:1131 https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45285CVE-2023-45285CVE-2023-45285https://bugzilla.redhat.com/22533232253323https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-1131.htmlALSA-2024:1131ALSA-2024:1131 ngolang-misc-1.20.12-1.el9_3.noarch.rpmngolang-docs-1.20.12-1.el9_3.noarch.rpmngolang-src-1.20.12-1.el9_3.noarch.rpmngolang-tests-1.20.12-1.el9_3.noarch.rpmnngo-toolset-1.20.12-1.el9_3.x86_64.rpm@ngolang-bin-1.20.12-1.el9_3.x86_64.rpm?ngolang-1.20.12-1.el9_3.x86_64.rpmngolang-misc-1.20.12-1.el9_3.noarch.rpmngolang-docs-1.20.12-1.el9_3.noarch.rpmngolang-src-1.20.12-1.el9_3.noarch.rpmngolang-tests-1.20.12-1.el9_3.noarch.rpmnngo-toolset-1.20.12-1.el9_3.x86_64.rpm@ngolang-bin-1.20.12-1.el9_3.x86_64.rpm?ngolang-1.20.12-1.el9_3.x86_64.rpm/l LBBBBBBsecurityImportant: tomcat security updateBhttps://access.redhat.com/errata/RHSA-2024:1134RHSA-2024:1134RHSA-2024:1134 https://access.redhat.com/security/cve/CVE-2023-46589CVE-2023-46589CVE-2023-46589https://bugzilla.redhat.com/22520502252050https://errata.almalinux.org/9/ALSA-2024-1134.htmlALSA-2024:1134ALSA-2024:1134 @ztomcat-servlet-4.0-api-9.0.62-37.el9_3.2.noarch.rpm;ztomcat-admin-webapps-9.0.62-37.el9_3.2.noarch.rpmztomcat-jsp-2.3-api-9.0.62-37.el9_3.2.noarch.rpm?ztomcat-lib-9.0.62-37.el9_3.2.noarch.rpm=ztomcat-el-3.0-api-9.0.62-37.el9_3.2.noarch.rpm:ztomcat-9.0.62-37.el9_3.2.noarch.rpm@ztomcat-servlet-4.0-api-9.0.62-37.el9_3.2.noarch.rpm;ztomcat-admin-webapps-9.0.62-37.el9_3.2.noarch.rpmztomcat-jsp-2.3-api-9.0.62-37.el9_3.2.noarch.rpm?ztomcat-lib-9.0.62-37.el9_3.2.noarch.rpm=ztomcat-el-3.0-api-9.0.62-37.el9_3.2.noarch.rpm:ztomcat-9.0.62-37.el9_3.2.noarch.rpmam "UBBBBBBBBBBBsecurityLow: keylime security update*Ghttps://access.redhat.com/errata/RHSA-2024:1139RHSA-2024:1139RHSA-2024:1139 https://access.redhat.com/security/cve/CVE-2023-3674CVE-2023-3674CVE-2023-3674https://bugzilla.redhat.com/22229032222903https://errata.almalinux.org/9/ALSA-2024-1139.htmlALSA-2024:1139ALSA-2024:1139 4keylime-registrar-7.3.0-13.el9_3.x86_64.rpm6keylime-verifier-7.3.0-13.el9_3.x86_64.rpmGpython3-keylime-7.3.0-13.el9_3.x86_64.rpm2keylime-7.3.0-13.el9_3.x86_64.rpm3keylime-base-7.3.0-13.el9_3.x86_64.rpmZkeylime-selinux-7.3.0-13.el9_3.noarch.rpm5keylime-tenant-7.3.0-13.el9_3.x86_64.rpm4keylime-registrar-7.3.0-13.el9_3.x86_64.rpm6keylime-verifier-7.3.0-13.el9_3.x86_64.rpmGpython3-keylime-7.3.0-13.el9_3.x86_64.rpm2keylime-7.3.0-13.el9_3.x86_64.rpm3keylime-base-7.3.0-13.el9_3.x86_64.rpmZkeylime-selinux-7.3.0-13.el9_3.noarch.rpm5keylime-tenant-7.3.0-13.el9_3.x86_64.rpm*n +cBBBBBBsecurityModerate: mysql security update`thttps://access.redhat.com/errata/RHSA-2024:1141RHSA-2024:1141RHSA-2024:1141 https://access.redhat.com/security/cve/CVE-2022-4899CVE-2022-4899CVE-2022-4899https://access.redhat.com/security/cve/CVE-2023-21911CVE-2023-21911CVE-2023-21911https://access.redhat.com/security/cve/CVE-2023-21919CVE-2023-21919CVE-2023-21919https://access.redhat.com/security/cve/CVE-2023-21920CVE-2023-21920CVE-2023-21920https://access.redhat.com/security/cve/CVE-2023-21929CVE-2023-21929CVE-2023-21929https://access.redhat.com/security/cve/CVE-2023-21933CVE-2023-21933CVE-2023-21933https://access.redhat.com/security/cve/CVE-2023-21935CVE-2023-21935CVE-2023-21935https://access.redhat.com/security/cve/CVE-2023-21940CVE-2023-21940CVE-2023-21940https://access.redhat.com/security/cve/CVE-2023-21945CVE-2023-21945CVE-2023-21945https://access.redhat.com/security/cve/CVE-2023-21946CVE-2023-21946CVE-2023-21946https://access.redhat.com/security/cve/CVE-2023-21947CVE-2023-21947CVE-2023-21947https://access.redhat.com/security/cve/CVE-2023-21953CVE-2023-21953CVE-2023-21953https://access.redhat.com/security/cve/CVE-2023-21955CVE-2023-21955CVE-2023-21955https://access.redhat.com/security/cve/CVE-2023-21962CVE-2023-21962CVE-2023-21962https://access.redhat.com/security/cve/CVE-2023-21966CVE-2023-21966CVE-2023-21966https://access.redhat.com/security/cve/CVE-2023-21972CVE-2023-21972CVE-2023-21972https://access.redhat.com/security/cve/CVE-2023-21976CVE-2023-21976CVE-2023-21976https://access.redhat.com/security/cve/CVE-2023-21977CVE-2023-21977CVE-2023-21977https://access.redhat.com/security/cve/CVE-2023-21980CVE-2023-21980CVE-2023-21980https://access.redhat.com/security/cve/CVE-2023-21982CVE-2023-21982CVE-2023-21982https://access.redhat.com/security/cve/CVE-2023-22005CVE-2023-22005CVE-2023-22005https://access.redhat.com/security/cve/CVE-2023-22007CVE-2023-22007CVE-2023-22007https://access.redhat.com/security/cve/CVE-2023-22008CVE-2023-22008CVE-2023-22008https://access.redhat.com/security/cve/CVE-2023-22032CVE-2023-22032CVE-2023-22032https://access.redhat.com/security/cve/CVE-2023-22033CVE-2023-22033CVE-2023-22033https://access.redhat.com/security/cve/CVE-2023-22038CVE-2023-22038CVE-2023-22038https://access.redhat.com/security/cve/CVE-2023-22046CVE-2023-22046CVE-2023-22046https://access.redhat.com/security/cve/CVE-2023-22048CVE-2023-22048CVE-2023-22048https://access.redhat.com/security/cve/CVE-2023-22053CVE-2023-22053CVE-2023-22053https://access.redhat.com/security/cve/CVE-2023-22054CVE-2023-22054CVE-2023-22054https://access.redhat.com/security/cve/CVE-2023-22056CVE-2023-22056CVE-2023-22056https://access.redhat.com/security/cve/CVE-2023-22057CVE-2023-22057CVE-2023-22057https://access.redhat.com/security/cve/CVE-2023-22058CVE-2023-22058CVE-2023-22058https://access.redhat.com/security/cve/CVE-2023-22059CVE-2023-22059CVE-2023-22059https://access.redhat.com/security/cve/CVE-2023-22064CVE-2023-22064CVE-2023-22064https://access.redhat.com/security/cve/CVE-2023-22065CVE-2023-22065CVE-2023-22065https://access.redhat.com/security/cve/CVE-2023-22066CVE-2023-22066CVE-2023-22066https://access.redhat.com/security/cve/CVE-2023-22068CVE-2023-22068CVE-2023-22068https://access.redhat.com/security/cve/CVE-2023-22070CVE-2023-22070CVE-2023-22070https://access.redhat.com/security/cve/CVE-2023-22078CVE-2023-22078CVE-2023-22078https://access.redhat.com/security/cve/CVE-2023-22079CVE-2023-22079CVE-2023-22079https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2023-22092CVE-2023-22092CVE-2023-22092https://access.redhat.com/security/cve/CVE-2023-22097CVE-2023-22097CVE-2023-22097https://access.redhat.com/security/cve/CVE-2023-22103CVE-2023-22103CVE-2023-22103https://access.redhat.com/security/cve/CVE-2023-22104CVE-2023-22104CVE-2023-22104https://access.redhat.com/security/cve/CVE-2023-22110CVE-2023-22110CVE-2023-22110https://access.redhat.com/security/cve/CVE-2023-22111CVE-2023-22111CVE-2023-22111https://access.redhat.com/security/cve/CVE-2023-22112CVE-2023-22112CVE-2023-22112https://access.redhat.com/security/cve/CVE-2023-22113CVE-2023-22113CVE-2023-22113https://access.redhat.com/security/cve/CVE-2023-22114CVE-2023-22114CVE-2023-22114https://access.redhat.com/security/cve/CVE-2023-22115CVE-2023-22115CVE-2023-22115https://access.redhat.com/security/cve/CVE-2024-20960CVE-2024-20960CVE-2024-20960https://access.redhat.com/security/cve/CVE-2024-20961CVE-2024-20961CVE-2024-20961https://access.redhat.com/security/cve/CVE-2024-20962CVE-2024-20962CVE-2024-20962https://access.redhat.com/security/cve/CVE-2024-20963CVE-2024-20963CVE-2024-20963https://access.redhat.com/security/cve/CVE-2024-20964CVE-2024-20964CVE-2024-20964https://access.redhat.com/security/cve/CVE-2024-20965CVE-2024-20965CVE-2024-20965https://access.redhat.com/security/cve/CVE-2024-20966CVE-2024-20966CVE-2024-20966https://access.redhat.com/security/cve/CVE-2024-20967CVE-2024-20967CVE-2024-20967https://access.redhat.com/security/cve/CVE-2024-20968CVE-2024-20968CVE-2024-20968https://access.redhat.com/security/cve/CVE-2024-20969CVE-2024-20969CVE-2024-20969https://access.redhat.com/security/cve/CVE-2024-20970CVE-2024-20970CVE-2024-20970https://access.redhat.com/security/cve/CVE-2024-20971CVE-2024-20971CVE-2024-20971https://access.redhat.com/security/cve/CVE-2024-20972CVE-2024-20972CVE-2024-20972https://access.redhat.com/security/cve/CVE-2024-20973CVE-2024-20973CVE-2024-20973https://access.redhat.com/security/cve/CVE-2024-20974CVE-2024-20974CVE-2024-20974https://access.redhat.com/security/cve/CVE-2024-20976CVE-2024-20976CVE-2024-20976https://access.redhat.com/security/cve/CVE-2024-20977CVE-2024-20977CVE-2024-20977https://access.redhat.com/security/cve/CVE-2024-20978CVE-2024-20978CVE-2024-20978https://access.redhat.com/security/cve/CVE-2024-20981CVE-2024-20981CVE-2024-20981https://access.redhat.com/security/cve/CVE-2024-20982CVE-2024-20982CVE-2024-20982https://access.redhat.com/security/cve/CVE-2024-20983CVE-2024-20983CVE-2024-20983https://access.redhat.com/security/cve/CVE-2024-20984CVE-2024-20984CVE-2024-20984https://access.redhat.com/security/cve/CVE-2024-20985CVE-2024-20985CVE-2024-20985https://bugzilla.redhat.com/21798642179864https://bugzilla.redhat.com/21881092188109https://bugzilla.redhat.com/21881132188113https://bugzilla.redhat.com/21881152188115https://bugzilla.redhat.com/21881162188116https://bugzilla.redhat.com/21881172188117https://bugzilla.redhat.com/21881182188118https://bugzilla.redhat.com/21881192188119https://bugzilla.redhat.com/21881202188120https://bugzilla.redhat.com/21881212188121https://bugzilla.redhat.com/21881222188122https://bugzilla.redhat.com/21881232188123https://bugzilla.redhat.com/21881242188124https://bugzilla.redhat.com/21881252188125https://bugzilla.redhat.com/21881272188127https://bugzilla.redhat.com/21881282188128https://bugzilla.redhat.com/21881292188129https://bugzilla.redhat.com/21881302188130https://bugzilla.redhat.com/21881312188131https://bugzilla.redhat.com/21881322188132https://bugzilla.redhat.com/22242112224211https://bugzilla.redhat.com/22242122224212https://bugzilla.redhat.com/22242132224213https://bugzilla.redhat.com/22242142224214https://bugzilla.redhat.com/22242152224215https://bugzilla.redhat.com/22242162224216https://bugzilla.redhat.com/22242172224217https://bugzilla.redhat.com/22242182224218https://bugzilla.redhat.com/22242192224219https://bugzilla.redhat.com/22242202224220https://bugzilla.redhat.com/22242212224221https://bugzilla.redhat.com/22242222224222https://bugzilla.redhat.com/22450142245014https://bugzilla.redhat.com/22450152245015https://bugzilla.redhat.com/22450162245016https://bugzilla.redhat.com/22450172245017https://bugzilla.redhat.com/22450182245018https://bugzilla.redhat.com/22450192245019https://bugzilla.redhat.com/22450202245020https://bugzilla.redhat.com/22450212245021https://bugzilla.redhat.com/22450222245022https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22450242245024https://bugzilla.redhat.com/22450262245026https://bugzilla.redhat.com/22450272245027https://bugzilla.redhat.com/22450282245028https://bugzilla.redhat.com/22450292245029https://bugzilla.redhat.com/22450302245030https://bugzilla.redhat.com/22450312245031https://bugzilla.redhat.com/22450322245032https://bugzilla.redhat.com/22450332245033https://bugzilla.redhat.com/22450342245034https://bugzilla.redhat.com/22587712258771https://bugzilla.redhat.com/22587722258772https://bugzilla.redhat.com/22587732258773https://bugzilla.redhat.com/22587742258774https://bugzilla.redhat.com/22587752258775https://bugzilla.redhat.com/22587762258776https://bugzilla.redhat.com/22587772258777https://bugzilla.redhat.com/22587782258778https://bugzilla.redhat.com/22587792258779https://bugzilla.redhat.com/22587802258780https://bugzilla.redhat.com/22587812258781https://bugzilla.redhat.com/22587822258782https://bugzilla.redhat.com/22587832258783https://bugzilla.redhat.com/22587842258784https://bugzilla.redhat.com/22587852258785https://bugzilla.redhat.com/22587872258787https://bugzilla.redhat.com/22587882258788https://bugzilla.redhat.com/22587892258789https://bugzilla.redhat.com/22587902258790https://bugzilla.redhat.com/22587912258791https://bugzilla.redhat.com/22587922258792https://bugzilla.redhat.com/22587932258793https://bugzilla.redhat.com/22587942258794https://errata.almalinux.org/9/ALSA-2024-1141.htmlALSA-2024:1141ALSA-2024:1141 .vmysql-errmsg-8.0.36-1.el9_3.x86_64.rpmvmysql-8.0.36-1.el9_3.x86_64.rpmGvmysql-server-8.0.36-1.el9_3.x86_64.rpm-vmysql-common-8.0.36-1.el9_3.x86_64.rpm.vmysql-errmsg-8.0.36-1.el9_3.x86_64.rpmvmysql-8.0.36-1.el9_3.x86_64.rpmGvmysql-server-8.0.36-1.el9_3.x86_64.rpm-vmysql-common-8.0.36-1.el9_3.x86_64.rpmyo .lsecurityModerate: haproxy security updateT https://access.redhat.com/errata/RHSA-2024:1142RHSA-2024:1142RHSA-2024:1142 https://access.redhat.com/security/cve/CVE-2023-40225CVE-2023-40225CVE-2023-40225https://access.redhat.com/security/cve/CVE-2023-45539CVE-2023-45539CVE-2023-45539https://bugzilla.redhat.com/22313702231370https://bugzilla.redhat.com/22530372253037https://errata.almalinux.org/9/ALSA-2024-1142.htmlALSA-2024:1142ALSA-2024:1142 Hhaproxy-2.4.22-3.el9_3.x86_64.rpmHhaproxy-2.4.22-3.el9_3.x86_64.rpmep 1osecurityModerate: rear security update]|https://access.redhat.com/errata/RHSA-2024:1147RHSA-2024:1147RHSA-2024:1147 https://access.redhat.com/security/cve/CVE-2024-23301CVE-2024-23301CVE-2024-23301https://bugzilla.redhat.com/22583962258396https://errata.almalinux.org/9/ALSA-2024-1147.htmlALSA-2024:1147ALSA-2024:1147 u!rear-2.6-21.el9_3.alma.x86_64.rpmu!rear-2.6-21.el9_3.alma.x86_64.rpm q rBBBBBBBBBBBBBBBsecurityModerate: kernel security updateYc$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486 https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:11486 %6perf-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-doc-5.14.0-503.19.1.el9_5.noarch.rpm)6rv-5.14.0-503.19.1.el9_5.x86_64.rpm#6kernel-devel-5.14.0-503.19.1.el9_5.x86_64.rpm$6kernel-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm'6rtla-5.14.0-503.19.1.el9_5.x86_64.rpm!6kernel-debug-devel-5.14.0-503.19.1.el9_5.x86_64.rpm"6kernel-debug-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm&6kernel-headers-5.14.0-503.19.1.el9_5.x86_64.rpm %6perf-5.14.0-503.19.1.el9_5.x86_64.rpm6kernel-doc-5.14.0-503.19.1.el9_5.noarch.rpm)6rv-5.14.0-503.19.1.el9_5.x86_64.rpm#6kernel-devel-5.14.0-503.19.1.el9_5.x86_64.rpm$6kernel-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm'6rtla-5.14.0-503.19.1.el9_5.x86_64.rpm!6kernel-debug-devel-5.14.0-503.19.1.el9_5.x86_64.rpm"6kernel-debug-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm&6kernel-headers-5.14.0-503.19.1.el9_5.x86_64.rpmir DBBsecurityModerate: skopeo security update<\https://access.redhat.com/errata/RHSA-2024:1149RHSA-2024:1149RHSA-2024:1149 https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-1149.htmlALSA-2024:1149ALSA-2024:1149 9'skopeo-tests-1.13.3-4.el9_3.x86_64.rpm8'skopeo-1.13.3-4.el9_3.x86_64.rpm9'skopeo-tests-1.13.3-4.el9_3.x86_64.rpm8'skopeo-1.13.3-4.el9_3.x86_64.rpm s IBBsecurityModerate: buildah security updateyhttps://access.redhat.com/errata/RHSA-2024:1150RHSA-2024:1150RHSA-2024:1150 https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://bugzilla.redhat.com/22542102254210https://errata.almalinux.org/9/ALSA-2024-1150.htmlALSA-2024:1150ALSA-2024:1150 8buildah-1.31.4-1.el9_3.x86_64.rpm9buildah-tests-1.31.4-1.el9_3.x86_64.rpm8buildah-1.31.4-1.el9_3.x86_64.rpm9buildah-tests-1.31.4-1.el9_3.x86_64.rpm0t NBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security updateFhttps://access.redhat.com/errata/RHSA-2024:1309RHSA-2024:1309RHSA-2024:1309 https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1309.htmlALSA-2024:1309ALSA-2024:1309 GWdotnet-templates-7.0-7.0.117-1.el9_3.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpmCWdotnet-sdk-7.0-7.0.117-1.el9_3.x86_64.rpmAdotnet-runtime-7.0-7.0.17-1.el9_3.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpm?dotnet-hostfxr-7.0-7.0.17-1.el9_3.x86_64.rpm9aspnetcore-runtime-7.0-7.0.17-1.el9_3.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.17-1.el9_3.x86_64.rpmGWdotnet-templates-7.0-7.0.117-1.el9_3.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpmCWdotnet-sdk-7.0-7.0.117-1.el9_3.x86_64.rpmAdotnet-runtime-7.0-7.0.17-1.el9_3.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.17-1.el9_3.x86_64.rpm?dotnet-hostfxr-7.0-7.0.17-1.el9_3.x86_64.rpm9aspnetcore-runtime-7.0-7.0.17-1.el9_3.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.17-1.el9_3.x86_64.rpm˥uu 9_BBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 8.0 security updateWEhttps://access.redhat.com/errata/RHSA-2024:1310RHSA-2024:1310RHSA-2024:1310 https://access.redhat.com/security/cve/CVE-2024-21392CVE-2024-21392CVE-2024-21392https://bugzilla.redhat.com/22682662268266https://errata.almalinux.org/9/ALSA-2024-1310.htmlALSA-2024:1310ALSA-2024:1310 >dotnet-apphost-pack-8.0-8.0.3-2.el9_3.x86_64.rpm:aspnetcore-runtime-8.0-8.0.3-2.el9_3.x86_64.rpmHodotnet-templates-8.0-8.0.103-2.el9_3.x86_64.rpmBdotnet-runtime-8.0-8.0.3-2.el9_3.x86_64.rpmonetstandard-targeting-pack-2.1-8.0.103-2.el9_3.x86_64.rpm@dotnet-hostfxr-8.0-8.0.3-2.el9_3.x86_64.rpmdotnet-host-8.0.3-2.el9_3.x86_64.rpmDodotnet-sdk-8.0-8.0.103-2.el9_3.x86_64.rpm+odotnet-sdk-dbg-8.0-8.0.103-2.el9_3.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpm >dotnet-apphost-pack-8.0-8.0.3-2.el9_3.x86_64.rpm:aspnetcore-runtime-8.0-8.0.3-2.el9_3.x86_64.rpmHodotnet-templates-8.0-8.0.103-2.el9_3.x86_64.rpmBdotnet-runtime-8.0-8.0.3-2.el9_3.x86_64.rpmonetstandard-targeting-pack-2.1-8.0.103-2.el9_3.x86_64.rpm@dotnet-hostfxr-8.0-8.0.3-2.el9_3.x86_64.rpmdotnet-host-8.0.3-2.el9_3.x86_64.rpmDodotnet-sdk-8.0-8.0.103-2.el9_3.x86_64.rpm+odotnet-sdk-dbg-8.0-8.0.103-2.el9_3.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.3-2.el9_3.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.3-2.el9_3.x86_64.rpmiv >zBBsecurityImportant: dnsmasq security update https://access.redhat.com/errata/RHSA-2024:1334RHSA-2024:1334RHSA-2024:1334 https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1334.htmlALSA-2024:1334ALSA-2024:1334 f!dnsmasq-2.85-14.el9_3.1.x86_64.rpmg!dnsmasq-utils-2.85-14.el9_3.1.x86_64.rpmf!dnsmasq-2.85-14.el9_3.1.x86_64.rpmg!dnsmasq-utils-2.85-14.el9_3.1.x86_64.rpmWw securityImportant: squid security update<https://access.redhat.com/errata/RHSA-2024:1376RHSA-2024:1376RHSA-2024:1376 https://access.redhat.com/security/cve/CVE-2023-50269CVE-2023-50269CVE-2023-50269https://access.redhat.com/security/cve/CVE-2024-25111CVE-2024-25111CVE-2024-25111https://access.redhat.com/security/cve/CVE-2024-25617CVE-2024-25617CVE-2024-25617https://bugzilla.redhat.com/22546632254663https://bugzilla.redhat.com/22643092264309https://bugzilla.redhat.com/22683662268366https://errata.almalinux.org/9/ALSA-2024-1376.htmlALSA-2024:1376ALSA-2024:1376  squid-5.5-6.el9_3.8.x86_64.rpm squid-5.5-6.el9_3.8.x86_64.rpmx libreoffice-langpack-th-7.1.8.1-12.el9_3.alma.x86_64.rpm^libreoffice-help-es-7.1.8.1-12.el9_3.alma.x86_64.rpm|libreoffice-help-tr-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-it-7.1.8.1-12.el9_3.alma.noarch.rpm(libreoffice-langpack-mr-7.1.8.1-12.el9_3.alma.x86_64.rpmKlibreoffice-calc-7.1.8.1-12.el9_3.alma.x86_64.rpm6libreoffice-langpack-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-12.el9_3.alma.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-12.el9_3.alma.x86_64.rpmKlibreoffice-pyuno-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-fi-7.1.8.1-12.el9_3.alma.noarch.rpm]libreoffice-help-eo-7.1.8.1-12.el9_3.alma.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmmlibreoffice-help-lt-7.1.8.1-12.el9_3.alma.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-12.el9_3.alma.x86_64.rpm=libreoffice-langpack-te-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-fa-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-ga-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-cy-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-ja-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-gl-7.1.8.1-12.el9_3.alma.x86_64.rpm0autocorr-vro-7.1.8.1-12.el9_3.alma.noarch.rpmslibreoffice-help-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpmalibreoffice-help-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm autocorr-ja-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-ar-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpmllibreoffice-help-ko-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-el-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-ca-7.1.8.1-12.el9_3.alma.noarch.rpm9libreoffice-langpack-ss-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-cs-7.1.8.1-12.el9_3.alma.noarch.rpmXlibreoffice-help-da-7.1.8.1-12.el9_3.alma.x86_64.rpm$libreoffice-langpack-lt-7.1.8.1-12.el9_3.alma.x86_64.rpm[libreoffice-help-el-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-is-7.1.8.1-12.el9_3.alma.noarch.rpmUlibreoffice-help-bn-7.1.8.1-12.el9_3.alma.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-12.el9_3.alma.x86_64.rpm(autocorr-ro-7.1.8.1-12.el9_3.alma.noarch.rpmblibreoffice-help-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmxlibreoffice-help-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmHlibreoffice-math-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-12.el9_3.alma.x86_64.rpmMlibreoffice-wiki-publisher-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-el-7.1.8.1-12.el9_3.alma.x86_64.rpm'autocorr-pt-7.1.8.1-12.el9_3.alma.noarch.rpm*libreoffice-langpack-nl-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-hsb-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-ga-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-fa-7.1.8.1-12.el9_3.alma.noarch.rpm7libreoffice-langpack-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-hu-7.1.8.1-12.el9_3.alma.noarch.rpmJlibreoffice-base-7.1.8.1-12.el9_3.alma.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-hu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-hi-7.1.8.1-12.el9_3.alma.x86_64.rpmRlibreoffice-gtk3-7.1.8.1-12.el9_3.alma.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-12.el9_3.alma.noarch.rpm*autocorr-sk-7.1.8.1-12.el9_3.alma.noarch.rpmOlibreoffice-x11-7.1.8.1-12.el9_3.alma.x86_64.rpmClibreoffice-langpack-ve-7.1.8.1-12.el9_3.alma.x86_64.rpmglibreoffice-help-hr-7.1.8.1-12.el9_3.alma.x86_64.rpm3libreoffice-langpack-ro-7.1.8.1-12.el9_3.alma.x86_64.rpmGlibreoffice-langpack-zu-7.1.8.1-12.el9_3.alma.x86_64.rpm#libreoffice-langpack-ko-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-12.el9_3.alma.x86_64.rpm?libreoffice-langpack-tn-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-da-7.1.8.1-12.el9_3.alma.x86_64.rpm1flibreoffice-help-hi-7.1.8.1-12.el9_3.alma.x86_64.rpm5libreoffice-langpack-si-7.1.8.1-12.el9_3.alma.x86_64.rpm4libreoffice-langpack-ru-7.1.8.1-12.el9_3.alma.x86_64.rpm%autocorr-nl-7.1.8.1-12.el9_3.alma.noarch.rpmjlibreoffice-help-it-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-12.el9_3.alma.x86_64.rpm)libreoffice-langpack-nb-7.1.8.1-12.el9_3.alma.x86_64.rpm/autocorr-vi-7.1.8.1-12.el9_3.alma.noarch.rpmilibreoffice-help-id-7.1.8.1-12.el9_3.alma.x86_64.rpm+autocorr-sl-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-it-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-bg-7.1.8.1-12.el9_3.alma.noarch.rpm<libreoffice-langpack-ta-7.1.8.1-12.el9_3.alma.x86_64.rpmLlibreoffice-core-7.1.8.1-12.el9_3.alma.x86_64.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpmelibreoffice-help-he-7.1.8.1-12.el9_3.alma.x86_64.rpm autocorr-af-7.1.8.1-12.el9_3.alma.noarch.rpmLlibreoffice-ure-7.1.8.1-12.el9_3.alma.x86_64.rpm~libreoffice-help-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpmvlibreoffice-help-ru-7.1.8.1-12.el9_3.alma.x86_64.rpmnlibreoffice-help-lv-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-da-7.1.8.1-12.el9_3.alma.noarch.rpm"libreoffice-langpack-kn-7.1.8.1-12.el9_3.alma.x86_64.rpm-autocorr-sv-7.1.8.1-12.el9_3.alma.noarch.rpm@libreoffice-langpack-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm.autocorr-tr-7.1.8.1-12.el9_3.alma.noarch.rpmDlibreoffice-langpack-xh-7.1.8.1-12.el9_3.alma.x86_64.rpm}libreoffice-help-uk-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpm_libreoffice-help-et-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-es-7.1.8.1-12.el9_3.alma.noarch.rpmZlibreoffice-help-dz-7.1.8.1-12.el9_3.alma.x86_64.rpmYlibreoffice-help-de-7.1.8.1-12.el9_3.alma.x86_64.rpm"autocorr-lb-7.1.8.1-12.el9_3.alma.noarch.rpmplibreoffice-help-nl-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-dsb-7.1.8.1-12.el9_3.alma.noarch.rpm7libreoffice-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-12.el9_3.alma.x86_64.rpmMlibreoffice-draw-7.1.8.1-12.el9_3.alma.x86_64.rpmrlibreoffice-help-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm#autocorr-lt-7.1.8.1-12.el9_3.alma.noarch.rpmElibreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.alma.noarch.rpmtlibreoffice-help-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpmIlibreoffice-ogltrans-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-12.el9_3.alma.x86_64.rpm-libreoffice-langpack-nso-7.1.8.1-12.el9_3.alma.x86_64.rpmWlibreoffice-help-cs-7.1.8.1-12.el9_3.alma.x86_64.rpmhlibreoffice-help-hu-7.1.8.1-12.el9_3.alma.x86_64.rpmBlibreoffice-langpack-uk-7.1.8.1-12.el9_3.alma.x86_64.rpmqlibreoffice-help-nn-7.1.8.1-12.el9_3.alma.x86_64.rpm/libreoffice-langpack-pa-7.1.8.1-12.el9_3.alma.x86_64.rpmJlibreoffice-pdfimport-7.1.8.1-12.el9_3.alma.x86_64.rpm+libreoffice-langpack-nn-7.1.8.1-12.el9_3.alma.x86_64.rpmAlibreoffice-langpack-ts-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-fy-7.1.8.1-12.el9_3.alma.x86_64.rpmPlibreoffice-xsltfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmElibreoffice-langpack-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpm!autocorr-ko-7.1.8.1-12.el9_3.alma.noarch.rpmulibreoffice-help-ro-7.1.8.1-12.el9_3.alma.x86_64.rpmOlibreoffice-filters-7.1.8.1-12.el9_3.alma.x86_64.rpm&autocorr-pl-7.1.8.1-12.el9_3.alma.noarch.rpm1autocorr-zh-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-as-7.1.8.1-12.el9_3.alma.x86_64.rpm$autocorr-mn-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-gu-7.1.8.1-12.el9_3.alma.x86_64.rpm;libreoffice-langpack-sv-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-fr-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-id-7.1.8.1-12.el9_3.alma.x86_64.rpm&libreoffice-langpack-mai-7.1.8.1-12.el9_3.alma.x86_64.rpmolibreoffice-help-nb-7.1.8.1-12.el9_3.alma.x86_64.rpm.libreoffice-langpack-or-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-12.el9_3.alma.x86_64.rpm,autocorr-sr-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-hr-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-hr-7.1.8.1-12.el9_3.alma.x86_64.rpmwlibreoffice-help-si-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-en-7.1.8.1-12.el9_3.alma.noarch.rpmNlibreoffice-emailmerge-7.1.8.1-12.el9_3.alma.x86_64.rpm)autocorr-ru-7.1.8.1-12.el9_3.alma.noarch.rpm!libreoffice-langpack-kk-7.1.8.1-12.el9_3.alma.x86_64.rpmVlibreoffice-help-ca-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-de-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-impress-7.1.8.1-12.el9_3.alma.x86_64.rpmNlibreoffice-writer-7.1.8.1-12.el9_3.alma.x86_64.rpmQlibreofficekit-7.1.8.1-12.el9_3.alma.x86_64.rpm`libreoffice-help-eu-7.1.8.1-12.el9_3.alma.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm'libreoffice-langpack-ml-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-he-7.1.8.1-12.el9_3.alma.x86_64.rpmklibreoffice-help-ja-7.1.8.1-12.el9_3.alma.x86_64.rpm{libreoffice-help-ta-7.1.8.1-12.el9_3.alma.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-12.el9_3.alma.x86_64.rpmDlibreoffice-data-7.1.8.1-12.el9_3.alma.noarch.rpm\libreoffice-help-en-7.1.8.1-12.el9_3.alma.x86_64.rpmdlibreoffice-help-gu-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-de-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-12.el9_3.alma.x86_64.rpmPlibreoffice-gdb-debug-support-7.1.8.1-12.el9_3.alma.x86_64.rpm2libreoffice-langpack-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpm:libreoffice-langpack-st-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-12.el9_3.alma.x86_64.rpmclibreoffice-help-gl-7.1.8.1-12.el9_3.alma.x86_64.rpmylibreoffice-help-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm>libreoffice-langpack-th-7.1.8.1-12.el9_3.alma.x86_64.rpm^libreoffice-help-es-7.1.8.1-12.el9_3.alma.x86_64.rpm|libreoffice-help-tr-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-it-7.1.8.1-12.el9_3.alma.noarch.rpm(libreoffice-langpack-mr-7.1.8.1-12.el9_3.alma.x86_64.rpmKlibreoffice-calc-7.1.8.1-12.el9_3.alma.x86_64.rpm6libreoffice-langpack-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-bg-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-12.el9_3.alma.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-12.el9_3.alma.x86_64.rpmKlibreoffice-pyuno-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-fi-7.1.8.1-12.el9_3.alma.noarch.rpm]libreoffice-help-eo-7.1.8.1-12.el9_3.alma.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmmlibreoffice-help-lt-7.1.8.1-12.el9_3.alma.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-12.el9_3.alma.x86_64.rpm=libreoffice-langpack-te-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-fa-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-ga-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-cy-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-ja-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-gl-7.1.8.1-12.el9_3.alma.x86_64.rpm0autocorr-vro-7.1.8.1-12.el9_3.alma.noarch.rpmslibreoffice-help-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpmalibreoffice-help-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm autocorr-ja-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-ar-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpmllibreoffice-help-ko-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-el-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-ca-7.1.8.1-12.el9_3.alma.noarch.rpm9libreoffice-langpack-ss-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-cs-7.1.8.1-12.el9_3.alma.noarch.rpmXlibreoffice-help-da-7.1.8.1-12.el9_3.alma.x86_64.rpm$libreoffice-langpack-lt-7.1.8.1-12.el9_3.alma.x86_64.rpm[libreoffice-help-el-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-is-7.1.8.1-12.el9_3.alma.noarch.rpmUlibreoffice-help-bn-7.1.8.1-12.el9_3.alma.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-12.el9_3.alma.x86_64.rpm(autocorr-ro-7.1.8.1-12.el9_3.alma.noarch.rpmblibreoffice-help-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmxlibreoffice-help-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmHlibreoffice-math-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-12.el9_3.alma.x86_64.rpmMlibreoffice-wiki-publisher-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-el-7.1.8.1-12.el9_3.alma.x86_64.rpm'autocorr-pt-7.1.8.1-12.el9_3.alma.noarch.rpm*libreoffice-langpack-nl-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-hsb-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-ga-7.1.8.1-12.el9_3.alma.noarch.rpmautocorr-fa-7.1.8.1-12.el9_3.alma.noarch.rpm7libreoffice-langpack-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-12.el9_3.alma.x86_64.rpmautocorr-hu-7.1.8.1-12.el9_3.alma.noarch.rpmJlibreoffice-base-7.1.8.1-12.el9_3.alma.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-hu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-hi-7.1.8.1-12.el9_3.alma.x86_64.rpmRlibreoffice-gtk3-7.1.8.1-12.el9_3.alma.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-12.el9_3.alma.noarch.rpm*autocorr-sk-7.1.8.1-12.el9_3.alma.noarch.rpmOlibreoffice-x11-7.1.8.1-12.el9_3.alma.x86_64.rpmClibreoffice-langpack-ve-7.1.8.1-12.el9_3.alma.x86_64.rpmglibreoffice-help-hr-7.1.8.1-12.el9_3.alma.x86_64.rpm3libreoffice-langpack-ro-7.1.8.1-12.el9_3.alma.x86_64.rpmGlibreoffice-langpack-zu-7.1.8.1-12.el9_3.alma.x86_64.rpm#libreoffice-langpack-ko-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-12.el9_3.alma.x86_64.rpm?libreoffice-langpack-tn-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-da-7.1.8.1-12.el9_3.alma.x86_64.rpm^y >=securityImportant: postgresql-jdbc security update]ohttps://access.redhat.com/errata/RHSA-2024:1436RHSA-2024:1436RHSA-2024:1436 https://access.redhat.com/security/cve/CVE-2024-1597CVE-2024-1597CVE-2024-1597https://bugzilla.redhat.com/22665232266523https://errata.almalinux.org/9/ALSA-2024-1436.htmlALSA-2024:1436ALSA-2024:1436 XDpostgresql-jdbc-42.2.28-1.el9_3.noarch.rpmXDpostgresql-jdbc-42.2.28-1.el9_3.noarch.rpmgz BBBBBBBBsecurityImportant: nodejs security updateLHhttps://access.redhat.com/errata/RHSA-2024:1438RHSA-2024:1438RHSA-2024:1438 https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645742264574https://errata.almalinux.org/9/ALSA-2024-1438.htmlALSA-2024:1438ALSA-2024:1438 fnpm-8.19.4-1.16.20.2.4.el9_3.x86_64.rpm9nodejs-16.20.2-4.el9_3.x86_64.rpmnodejs-libs-16.20.2-4.el9_3.i686.rpmhnodejs-full-i18n-16.20.2-4.el9_3.x86_64.rpmNnodejs-docs-16.20.2-4.el9_3.noarch.rpmnodejs-libs-16.20.2-4.el9_3.x86_64.rpmfnpm-8.19.4-1.16.20.2.4.el9_3.x86_64.rpm9nodejs-16.20.2-4.el9_3.x86_64.rpmnodejs-libs-16.20.2-4.el9_3.i686.rpmhnodejs-full-i18n-16.20.2-4.el9_3.x86_64.rpmNnodejs-docs-16.20.2-4.el9_3.noarch.rpmnodejs-libs-16.20.2-4.el9_3.x86_64.rpm { JBBBBBBBBsecurityImportant: golang security updateBhttps://access.redhat.com/errata/RHSA-2024:1462RHSA-2024:1462RHSA-2024:1462 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1462.htmlALSA-2024:1462ALSA-2024:1462 ogolang-tests-1.20.12-2.el9_3.noarch.rpm?ogolang-1.20.12-2.el9_3.x86_64.rpm@ogolang-bin-1.20.12-2.el9_3.x86_64.rpmnogo-toolset-1.20.12-2.el9_3.x86_64.rpmogolang-misc-1.20.12-2.el9_3.noarch.rpmogolang-docs-1.20.12-2.el9_3.noarch.rpmogolang-src-1.20.12-2.el9_3.noarch.rpmogolang-tests-1.20.12-2.el9_3.noarch.rpm?ogolang-1.20.12-2.el9_3.x86_64.rpm@ogolang-bin-1.20.12-2.el9_3.x86_64.rpmnogo-toolset-1.20.12-2.el9_3.x86_64.rpmogolang-misc-1.20.12-2.el9_3.noarch.rpmogolang-docs-1.20.12-2.el9_3.noarch.rpmogolang-src-1.20.12-2.el9_3.noarch.rpm&| UBBsecurityCritical: firefox security update|VChttps://access.redhat.com/errata/RHSA-2024:1485RHSA-2024:1485RHSA-2024:1485 https://access.redhat.com/security/cve/CVE-2023-5388CVE-2023-5388CVE-2023-5388https://access.redhat.com/security/cve/CVE-2024-0743CVE-2024-0743CVE-2024-0743https://access.redhat.com/security/cve/CVE-2024-2607CVE-2024-2607CVE-2024-2607https://access.redhat.com/security/cve/CVE-2024-2608CVE-2024-2608CVE-2024-2608https://access.redhat.com/security/cve/CVE-2024-2610CVE-2024-2610CVE-2024-2610https://access.redhat.com/security/cve/CVE-2024-2611CVE-2024-2611CVE-2024-2611https://access.redhat.com/security/cve/CVE-2024-2612CVE-2024-2612CVE-2024-2612https://access.redhat.com/security/cve/CVE-2024-2614CVE-2024-2614CVE-2024-2614https://access.redhat.com/security/cve/CVE-2024-2616CVE-2024-2616CVE-2024-2616https://access.redhat.com/security/cve/CVE-2024-29944CVE-2024-29944CVE-2024-29944https://bugzilla.redhat.com/22436442243644https://bugzilla.redhat.com/22600122260012https://bugzilla.redhat.com/22706602270660https://bugzilla.redhat.com/22706612270661https://bugzilla.redhat.com/22706622270662https://bugzilla.redhat.com/22706632270663https://bugzilla.redhat.com/22706642270664https://bugzilla.redhat.com/22706652270665https://bugzilla.redhat.com/22706662270666https://bugzilla.redhat.com/22710642271064https://errata.almalinux.org/9/ALSA-2024-1485.htmlALSA-2024:1485ALSA-2024:1485 Q~firefox-x11-115.9.1-1.el9_3.alma.1.x86_64.rpm8~firefox-115.9.1-1.el9_3.alma.1.x86_64.rpmQ~firefox-x11-115.9.1-1.el9_3.alma.1.x86_64.rpm8~firefox-115.9.1-1.el9_3.alma.1.x86_64.rpm} ZsecurityModerate: thunderbird security updateKhttps://access.redhat.com/errata/RHSA-2024:1493RHSA-2024:1493RHSA-2024:1493 https://access.redhat.com/security/cve/CVE-2023-5388CVE-2023-5388CVE-2023-5388https://access.redhat.com/security/cve/CVE-2024-0743CVE-2024-0743CVE-2024-0743https://access.redhat.com/security/cve/CVE-2024-1936CVE-2024-1936CVE-2024-1936https://access.redhat.com/security/cve/CVE-2024-2607CVE-2024-2607CVE-2024-2607https://access.redhat.com/security/cve/CVE-2024-2608CVE-2024-2608CVE-2024-2608https://access.redhat.com/security/cve/CVE-2024-2610CVE-2024-2610CVE-2024-2610https://access.redhat.com/security/cve/CVE-2024-2611CVE-2024-2611CVE-2024-2611https://access.redhat.com/security/cve/CVE-2024-2612CVE-2024-2612CVE-2024-2612https://access.redhat.com/security/cve/CVE-2024-2614CVE-2024-2614CVE-2024-2614https://bugzilla.redhat.com/22436442243644https://bugzilla.redhat.com/22600122260012https://bugzilla.redhat.com/22681712268171https://bugzilla.redhat.com/22706602270660https://bugzilla.redhat.com/22706612270661https://bugzilla.redhat.com/22706632270663https://bugzilla.redhat.com/22706642270664https://bugzilla.redhat.com/22706652270665https://bugzilla.redhat.com/22706662270666https://errata.almalinux.org/9/ALSA-2024-1493.htmlALSA-2024:1493ALSA-2024:1493 :Rthunderbird-115.9.0-1.el9_3.alma.1.x86_64.rpm:Rthunderbird-115.9.0-1.el9_3.alma.1.x86_64.rpm٨?~ ]securityImportant: grafana security updatednhttps://access.redhat.com/errata/RHSA-2024:1501RHSA-2024:1501RHSA-2024:1501 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1501.htmlALSA-2024:1501ALSA-2024:1501 ografana-9.2.10-8.el9_3.alma.1.x86_64.rpmografana-9.2.10-8.el9_3.alma.1.x86_64.rpm9 "`securityImportant: grafana-pcp security updateR:https://access.redhat.com/errata/RHSA-2024:1502RHSA-2024:1502RHSA-2024:1502 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1502.htmlALSA-2024:1502ALSA-2024:1502 }kgrafana-pcp-5.1.1-2.el9_3.alma.1.x86_64.rpm}kgrafana-pcp-5.1.1-2.el9_3.alma.1.x86_64.rpm$ ,uBFiBBBBBBBsecurityImportant: nodejs:18 security update https://access.redhat.com/errata/RHSA-2024:1503RHSA-2024:1503RHSA-2024:1503 https://access.redhat.com/security/cve/CVE-2023-46809CVE-2023-46809CVE-2023-46809https://access.redhat.com/security/cve/CVE-2024-21892CVE-2024-21892CVE-2024-21892https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645692264569https://bugzilla.redhat.com/22645742264574https://bugzilla.redhat.com/22645822264582https://errata.almalinux.org/9/ALSA-2024-1503.htmlALSA-2024:1503ALSA-2024:1503 94i( 4mBBBBBsecurityImportant: unbound security update:6https://access.redhat.com/errata/RHSA-2024:1750RHSA-2024:1750RHSA-2024:1750 https://access.redhat.com/security/cve/CVE-2024-1488CVE-2024-1488CVE-2024-1488https://bugzilla.redhat.com/22641832264183https://errata.almalinux.org/9/ALSA-2024-1750.htmlALSA-2024:1750ALSA-2024:1750 28unbound-libs-1.16.2-3.el9_3.5.x86_64.rpmH8python3-unbound-1.16.2-3.el9_3.5.x86_64.rpmK8unbound-1.16.2-3.el9_3.5.x86_64.rpm28unbound-libs-1.16.2-3.el9_3.5.i686.rpm28unbound-libs-1.16.2-3.el9_3.5.x86_64.rpmH8python3-unbound-1.16.2-3.el9_3.5.x86_64.rpmK8unbound-1.16.2-3.el9_3.5.x86_64.rpm28unbound-libs-1.16.2-3.el9_3.5.i686.rpmH uBBBBBBBBBBBBBsecurityImportant: bind security updatepGhttps://access.redhat.com/errata/RHSA-2024:1789RHSA-2024:1789RHSA-2024:1789 https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1789.htmlALSA-2024:1789ALSA-2024:1789 +Hbind-license-9.16.23-14.el9_3.4.noarch.rpm7Hpython3-bind-9.16.23-14.el9_3.4.noarch.rpmYHbind-9.16.23-14.el9_3.4.x86_64.rpm[Hbind-dnssec-utils-9.16.23-14.el9_3.4.x86_64.rpm*Hbind-dnssec-doc-9.16.23-14.el9_3.4.noarch.rpmZHbind-chroot-9.16.23-14.el9_3.4.x86_64.rpm`Ibind-dyndb-ldap-11.9-8.el9_3.3.alma.1.x86_64.rpm]Hbind-utils-9.16.23-14.el9_3.4.x86_64.rpm\Hbind-libs-9.16.23-14.el9_3.4.x86_64.rpm +Hbind-license-9.16.23-14.el9_3.4.noarch.rpm7Hpython3-bind-9.16.23-14.el9_3.4.noarch.rpmYHbind-9.16.23-14.el9_3.4.x86_64.rpm[Hbind-dnssec-utils-9.16.23-14.el9_3.4.x86_64.rpm*Hbind-dnssec-doc-9.16.23-14.el9_3.4.noarch.rpmZHbind-chroot-9.16.23-14.el9_3.4.x86_64.rpm`Ibind-dyndb-ldap-11.9-8.el9_3.3.alma.1.x86_64.rpm]Hbind-utils-9.16.23-14.el9_3.4.x86_64.rpm\Hbind-libs-9.16.23-14.el9_3.4.x86_64.rpm EBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update7 https://access.redhat.com/errata/RHSA-2024:1818RHSA-2024:1818RHSA-2024:1818 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1818.htmlALSA-2024:1818ALSA-2024:1818 ;2java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm62java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpm32java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpm52java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpm42java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpm:2java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm22java-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpm;2java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpm62java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpm32java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpm52java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpm42java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpm:2java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpm22java-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpmy $RBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security updateVn https://access.redhat.com/errata/RHSA-2024:1822RHSA-2024:1822RHSA-2024:1822 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1822.htmlALSA-2024:1822ALSA-2024:1822 p|java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpmo|java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpms|java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpmn|java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpmm|java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpmr|java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpmt|java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpml|java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpmq|java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpm p|java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpmo|java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpms|java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpmn|java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpmm|java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpmr|java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpmt|java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpml|java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpmq|java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpmO  7eBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updateD$ https://access.redhat.com/errata/RHSA-2024:1825RHSA-2024:1825RHSA-2024:1825 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1825.htmlALSA-2024:1825ALSA-2024:1825  java-17-openjdk-demo-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-src-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-javadoc-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-static-libs-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-headless-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-jmods-17.0.11.0.9-2.el9.x86_64.rpm  java-17-openjdk-demo-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-src-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-javadoc-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-static-libs-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-17.0.11.0.9-2.el9.x86_64.rpm java-17-openjdk-headless-17.0.11.0.9-2.el9.x86_64.rpmjava-17-openjdk-jmods-17.0.11.0.9-2.el9.x86_64.rpm$  xBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security updatehHhttps://access.redhat.com/errata/RHSA-2024:1828RHSA-2024:1828RHSA-2024:1828 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://errata.almalinux.org/9/ALSA-2024-1828.htmlALSA-2024:1828ALSA-2024:1828 xjava-21-openjdk-headless-21.0.3.0.9-1.el9.alma.1.x86_64.rpmwjava-21-openjdk-devel-21.0.3.0.9-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.3.0.9-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.alma.1.x86_64.rpm{java-21-openjdk-jmods-21.0.3.0.9-1.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.3.0.9-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.3.0.9-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.3.0.9-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.3.0.9-1.el9.alma.1.x86_64.rpm xjava-21-openjdk-headless-21.0.3.0.9-1.el9.alma.1.x86_64.rpmwjava-21-openjdk-devel-21.0.3.0.9-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.3.0.9-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.alma.1.x86_64.rpm{java-21-openjdk-jmods-21.0.3.0.9-1.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.3.0.9-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.3.0.9-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.3.0.9-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.3.0.9-1.el9.alma.1.x86_64.rpmT  KsecurityImportant: mod_http2 security update0vhttps://access.redhat.com/errata/RHSA-2024:1872RHSA-2024:1872RHSA-2024:1872 https://access.redhat.com/security/cve/CVE-2024-27316CVE-2024-27316CVE-2024-27316https://bugzilla.redhat.com/22682772268277https://errata.almalinux.org/9/ALSA-2024-1872.htmlALSA-2024:1872ALSA-2024:1872 Smod_http2-1.15.19-5.el9_3.1.x86_64.rpmSmod_http2-1.15.19-5.el9_3.1.x86_64.rpm@  NBBBBBBBBBsecurityModerate: gnutls security update&https://access.redhat.com/errata/RHSA-2024:1879RHSA-2024:1879RHSA-2024:1879 https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-1879.htmlALSA-2024:1879ALSA-2024:1879 _gnutls-dane-3.7.6-23.el9_3.4.i686.rpm_gnutls-devel-3.7.6-23.el9_3.4.x86_64.rpm|_gnutls-utils-3.7.6-23.el9_3.4.x86_64.rpm_gnutls-devel-3.7.6-23.el9_3.4.i686.rpm_gnutls-c++-3.7.6-23.el9_3.4.x86_64.rpm_gnutls-c++-3.7.6-23.el9_3.4.i686.rpm_gnutls-dane-3.7.6-23.el9_3.4.x86_64.rpm_gnutls-dane-3.7.6-23.el9_3.4.i686.rpm_gnutls-devel-3.7.6-23.el9_3.4.x86_64.rpm|_gnutls-utils-3.7.6-23.el9_3.4.x86_64.rpm_gnutls-devel-3.7.6-23.el9_3.4.i686.rpm_gnutls-c++-3.7.6-23.el9_3.4.x86_64.rpm_gnutls-c++-3.7.6-23.el9_3.4.i686.rpm_gnutls-dane-3.7.6-23.el9_3.4.x86_64.rpm  ZBBsecurityImportant: firefox security update8@https://access.redhat.com/errata/RHSA-2024:1908RHSA-2024:1908RHSA-2024:1908 https://access.redhat.com/security/cve/CVE-2024-2609CVE-2024-2609CVE-2024-2609https://access.redhat.com/security/cve/CVE-2024-3852CVE-2024-3852CVE-2024-3852https://access.redhat.com/security/cve/CVE-2024-3854CVE-2024-3854CVE-2024-3854https://access.redhat.com/security/cve/CVE-2024-3857CVE-2024-3857CVE-2024-3857https://access.redhat.com/security/cve/CVE-2024-3859CVE-2024-3859CVE-2024-3859https://access.redhat.com/security/cve/CVE-2024-3861CVE-2024-3861CVE-2024-3861https://access.redhat.com/security/cve/CVE-2024-3864CVE-2024-3864CVE-2024-3864https://bugzilla.redhat.com/22755472275547https://bugzilla.redhat.com/22755492275549https://bugzilla.redhat.com/22755502275550https://bugzilla.redhat.com/22755512275551https://bugzilla.redhat.com/22755522275552https://bugzilla.redhat.com/22755532275553https://bugzilla.redhat.com/22755552275555https://errata.almalinux.org/9/ALSA-2024-1908.htmlALSA-2024:1908ALSA-2024:1908 Qxfirefox-x11-115.10.0-1.el9_3.alma.1.x86_64.rpm8xfirefox-115.10.0-1.el9_3.alma.1.x86_64.rpmQxfirefox-x11-115.10.0-1.el9_3.alma.1.x86_64.rpm8xfirefox-115.10.0-1.el9_3.alma.1.x86_64.rpm, !_securityLow: thunderbird security update*xhttps://access.redhat.com/errata/RHSA-2024:1940RHSA-2024:1940RHSA-2024:1940 https://access.redhat.com/security/cve/CVE-2024-2609CVE-2024-2609CVE-2024-2609https://access.redhat.com/security/cve/CVE-2024-3302CVE-2024-3302CVE-2024-3302https://access.redhat.com/security/cve/CVE-2024-3852CVE-2024-3852CVE-2024-3852https://access.redhat.com/security/cve/CVE-2024-3854CVE-2024-3854CVE-2024-3854https://access.redhat.com/security/cve/CVE-2024-3857CVE-2024-3857CVE-2024-3857https://access.redhat.com/security/cve/CVE-2024-3859CVE-2024-3859CVE-2024-3859https://access.redhat.com/security/cve/CVE-2024-3861CVE-2024-3861CVE-2024-3861https://access.redhat.com/security/cve/CVE-2024-3864CVE-2024-3864CVE-2024-3864https://bugzilla.redhat.com/22733832273383https://bugzilla.redhat.com/22755472275547https://bugzilla.redhat.com/22755492275549https://bugzilla.redhat.com/22755502275550https://bugzilla.redhat.com/22755512275551https://bugzilla.redhat.com/22755522275552https://bugzilla.redhat.com/22755532275553https://bugzilla.redhat.com/22755552275555https://errata.almalinux.org/9/ALSA-2024-1940.htmlALSA-2024:1940ALSA-2024:1940 :Lthunderbird-115.10.0-2.el9_3.alma.1.x86_64.rpm:Lthunderbird-115.10.0-2.el9_3.alma.1.x86_64.rpm[ ,bBBBBBBBBsecurityImportant: golang security update;https://access.redhat.com/errata/RHSA-2024:1963RHSA-2024:1963RHSA-2024:1963 https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-1963.htmlALSA-2024:1963ALSA-2024:1963 ?pgolang-1.20.12-4.el9_3.x86_64.rpmpgolang-docs-1.20.12-4.el9_3.noarch.rpmnpgo-toolset-1.20.12-4.el9_3.x86_64.rpmpgolang-tests-1.20.12-4.el9_3.noarch.rpmpgolang-src-1.20.12-4.el9_3.noarch.rpm@pgolang-bin-1.20.12-4.el9_3.x86_64.rpmpgolang-misc-1.20.12-4.el9_3.noarch.rpm?pgolang-1.20.12-4.el9_3.x86_64.rpmpgolang-docs-1.20.12-4.el9_3.noarch.rpmnpgo-toolset-1.20.12-4.el9_3.x86_64.rpmpgolang-tests-1.20.12-4.el9_3.noarch.rpmpgolang-src-1.20.12-4.el9_3.noarch.rpm@pgolang-bin-1.20.12-4.el9_3.x86_64.rpmpgolang-misc-1.20.12-4.el9_3.noarch.rpmt /msecurityModerate: libreswan security and bug fix updateINhttps://access.redhat.com/errata/RHSA-2024:2033RHSA-2024:2033RHSA-2024:2033 https://access.redhat.com/security/cve/CVE-2024-2357CVE-2024-2357CVE-2024-2357https://bugzilla.redhat.com/22689522268952https://errata.almalinux.org/9/ALSA-2024-2033.htmlALSA-2024:2033ALSA-2024:2033 RUlibreswan-4.12-1.el9_3.1.alma.1.x86_64.rpmRUlibreswan-4.12-1.el9_3.1.alma.1.x86_64.rpm` 4pBBsecurityImportant: buildah security updateghttps://access.redhat.com/errata/RHSA-2024:2055RHSA-2024:2055RHSA-2024:2055 https://access.redhat.com/security/cve/CVE-2024-1753CVE-2024-1753CVE-2024-1753https://bugzilla.redhat.com/22655132265513https://errata.almalinux.org/9/ALSA-2024-2055.htmlALSA-2024:2055ALSA-2024:2055 8buildah-1.31.5-1.el9_3.x86_64.rpm9buildah-tests-1.31.5-1.el9_3.x86_64.rpm8buildah-1.31.5-1.el9_3.x86_64.rpm9buildah-tests-1.31.5-1.el9_3.x86_64.rpm 7usecurityImportant: git-lfs security update~~https://access.redhat.com/errata/RHSA-2024:2079RHSA-2024:2079RHSA-2024:2079 https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-2079.htmlALSA-2024:2079ALSA-2024:2079 ?>git-lfs-3.2.0-2.el9_3.x86_64.rpm?>git-lfs-3.2.0-2.el9_3.x86_64.rpmZ >xBBBBsecurityModerate: Image builder components bug fix, enhancement and security update|Shttps://access.redhat.com/errata/RHSA-2024:2119RHSA-2024:2119RHSA-2024:2119 https://access.redhat.com/security/cve/CVE-2024-2307CVE-2024-2307CVE-2024-2307https://bugzilla.redhat.com/22685132268513https://errata.almalinux.org/9/ALSA-2024-2119.htmlALSA-2024:2119ALSA-2024:2119 0dosbuild-composer-core-101-1.el9.alma.1.x86_64.rpm/dosbuild-composer-101-1.el9.alma.1.x86_64.rpm1dosbuild-composer-worker-101-1.el9.alma.1.x86_64.rpm0dosbuild-composer-core-101-1.el9.alma.1.x86_64.rpm/dosbuild-composer-101-1.el9.alma.1.x86_64.rpm1dosbuild-composer-worker-101-1.el9.alma.1.x86_64.rpmF BBBBBBBBBBsecurityImportant: webkit2gtk3 security updateOhttps://access.redhat.com/errata/RHSA-2024:2126RHSA-2024:2126RHSA-2024:2126 https://access.redhat.com/security/cve/CVE-2014-1745CVE-2014-1745CVE-2014-1745https://access.redhat.com/security/cve/CVE-2023-32359CVE-2023-32359CVE-2023-32359https://access.redhat.com/security/cve/CVE-2023-39928CVE-2023-39928CVE-2023-39928https://access.redhat.com/security/cve/CVE-2023-40414CVE-2023-40414CVE-2023-40414https://access.redhat.com/security/cve/CVE-2023-41983CVE-2023-41983CVE-2023-41983https://access.redhat.com/security/cve/CVE-2023-42852CVE-2023-42852CVE-2023-42852https://access.redhat.com/security/cve/CVE-2023-42883CVE-2023-42883CVE-2023-42883https://access.redhat.com/security/cve/CVE-2023-42890CVE-2023-42890CVE-2023-42890https://access.redhat.com/security/cve/CVE-2024-23206CVE-2024-23206CVE-2024-23206https://access.redhat.com/security/cve/CVE-2024-23213CVE-2024-23213CVE-2024-23213https://bugzilla.redhat.com/22414002241400https://bugzilla.redhat.com/22543262254326https://bugzilla.redhat.com/22543272254327https://bugzilla.redhat.com/22697432269743https://bugzilla.redhat.com/22701412270141https://bugzilla.redhat.com/22701432270143https://bugzilla.redhat.com/22701512270151https://bugzilla.redhat.com/22714492271449https://bugzilla.redhat.com/22714532271453https://bugzilla.redhat.com/22714562271456https://errata.almalinux.org/9/ALSA-2024-2126.htmlALSA-2024:2126ALSA-2024:2126 3hwebkit2gtk3-jsc-2.42.5-1.el9.i686.rpm1hwebkit2gtk3-2.42.5-1.el9.x86_64.rpm2hwebkit2gtk3-devel-2.42.5-1.el9.x86_64.rpm2hwebkit2gtk3-devel-2.42.5-1.el9.i686.rpm1hwebkit2gtk3-2.42.5-1.el9.i686.rpm4hwebkit2gtk3-jsc-devel-2.42.5-1.el9.i686.rpm4hwebkit2gtk3-jsc-devel-2.42.5-1.el9.x86_64.rpm3hwebkit2gtk3-jsc-2.42.5-1.el9.x86_64.rpm3hwebkit2gtk3-jsc-2.42.5-1.el9.i686.rpm1hwebkit2gtk3-2.42.5-1.el9.x86_64.rpm2hwebkit2gtk3-devel-2.42.5-1.el9.x86_64.rpm2hwebkit2gtk3-devel-2.42.5-1.el9.i686.rpm1hwebkit2gtk3-2.42.5-1.el9.i686.rpm4hwebkit2gtk3-jsc-devel-2.42.5-1.el9.i686.rpm4hwebkit2gtk3-jsc-devel-2.42.5-1.el9.x86_64.rpm3hwebkit2gtk3-jsc-2.42.5-1.el9.x86_64.rpmN "LBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security and bug fix updateRyhttps://access.redhat.com/errata/RHSA-2024:2132RHSA-2024:2132RHSA-2024:2132 https://access.redhat.com/security/cve/CVE-2023-45803CVE-2023-45803CVE-2023-45803https://access.redhat.com/security/cve/CVE-2023-52323CVE-2023-52323CVE-2023-52323https://access.redhat.com/security/cve/CVE-2024-22195CVE-2024-22195CVE-2024-22195https://bugzilla.redhat.com/22468402246840https://bugzilla.redhat.com/22570282257028https://bugzilla.redhat.com/22578542257854https://errata.almalinux.org/9/ALSA-2024-2132.htmlALSA-2024:2132ALSA-2024:2132 ffence-virtd-serial-4.10.0-62.el9.x86_64.rpmbfence-virtd-4.10.0-62.el9.x86_64.rpm`fence-agents-kubevirt-4.10.0-62.el9.x86_64.rpm-fence-agents-ibm-powervs-4.10.0-62.el9.noarch.rpmcfence-virtd-cpg-4.10.0-62.el9.x86_64.rpmefence-virtd-multicast-4.10.0-62.el9.x86_64.rpm.fence-agents-ibm-vpc-4.10.0-62.el9.noarch.rpmgfence-virtd-tcp-4.10.0-62.el9.x86_64.rpm/fence-agents-virsh-4.10.0-62.el9.noarch.rpm,fence-agents-common-4.10.0-62.el9.noarch.rpmafence-virt-4.10.0-62.el9.x86_64.rpm_fence-agents-compute-4.10.0-62.el9.x86_64.rpmdfence-virtd-libvirt-4.10.0-62.el9.x86_64.rpm ffence-virtd-serial-4.10.0-62.el9.x86_64.rpmbfence-virtd-4.10.0-62.el9.x86_64.rpm`fence-agents-kubevirt-4.10.0-62.el9.x86_64.rpm-fence-agents-ibm-powervs-4.10.0-62.el9.noarch.rpmcfence-virtd-cpg-4.10.0-62.el9.x86_64.rpmefence-virtd-multicast-4.10.0-62.el9.x86_64.rpm.fence-agents-ibm-vpc-4.10.0-62.el9.noarch.rpmgfence-virtd-tcp-4.10.0-62.el9.x86_64.rpm/fence-agents-virsh-4.10.0-62.el9.noarch.rpm,fence-agents-common-4.10.0-62.el9.noarch.rpmafence-virt-4.10.0-62.el9.x86_64.rpm_fence-agents-compute-4.10.0-62.el9.x86_64.rpmdfence-virtd-libvirt-4.10.0-62.el9.x86_64.rpm` cBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security updateKP https://access.redhat.com/errata/RHSA-2024:2135RHSA-2024:2135RHSA-2024:2135 https://access.redhat.com/security/cve/CVE-2023-3019CVE-2023-3019CVE-2023-3019https://access.redhat.com/security/cve/CVE-2023-3255CVE-2023-3255CVE-2023-3255https://access.redhat.com/security/cve/CVE-2023-42467CVE-2023-42467CVE-2023-42467https://access.redhat.com/security/cve/CVE-2023-5088CVE-2023-5088CVE-2023-5088https://access.redhat.com/security/cve/CVE-2023-6683CVE-2023-6683CVE-2023-6683https://bugzilla.redhat.com/22184862218486https://bugzilla.redhat.com/22223512222351https://bugzilla.redhat.com/22382912238291https://bugzilla.redhat.com/22472832247283https://bugzilla.redhat.com/22548252254825https://errata.almalinux.org/9/ALSA-2024-2135.htmlALSA-2024:2135ALSA-2024:2135 OYqemu-kvm-block-curl-8.2.0-11.el9_4.x86_64.rpmQYqemu-kvm-common-8.2.0-11.el9_4.x86_64.rpmZYqemu-kvm-ui-egl-headless-8.2.0-11.el9_4.x86_64.rpmTYqemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.x86_64.rpmNYqemu-kvm-audio-pa-8.2.0-11.el9_4.x86_64.rpm\Yqemu-pr-helper-8.2.0-11.el9_4.x86_64.rpmYYqemu-kvm-tools-8.2.0-11.el9_4.x86_64.rpmRYqemu-kvm-core-8.2.0-11.el9_4.x86_64.rpmXYqemu-kvm-docs-8.2.0-11.el9_4.x86_64.rpmVYqemu-kvm-device-usb-host-8.2.0-11.el9_4.x86_64.rpm[Yqemu-kvm-ui-opengl-8.2.0-11.el9_4.x86_64.rpmWYqemu-kvm-device-usb-redirect-8.2.0-11.el9_4.x86_64.rpmKYqemu-guest-agent-8.2.0-11.el9_4.x86_64.rpmUYqemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.x86_64.rpmMYqemu-kvm-8.2.0-11.el9_4.x86_64.rpmPYqemu-kvm-block-rbd-8.2.0-11.el9_4.x86_64.rpmLYqemu-img-8.2.0-11.el9_4.x86_64.rpmSYqemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.x86_64.rpm2Yqemu-kvm-block-blkio-8.2.0-11.el9_4.x86_64.rpmOYqemu-kvm-block-curl-8.2.0-11.el9_4.x86_64.rpmQYqemu-kvm-common-8.2.0-11.el9_4.x86_64.rpmZYqemu-kvm-ui-egl-headless-8.2.0-11.el9_4.x86_64.rpmTYqemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.x86_64.rpmNYqemu-kvm-audio-pa-8.2.0-11.el9_4.x86_64.rpm\Yqemu-pr-helper-8.2.0-11.el9_4.x86_64.rpmYYqemu-kvm-tools-8.2.0-11.el9_4.x86_64.rpmRYqemu-kvm-core-8.2.0-11.el9_4.x86_64.rpmXYqemu-kvm-docs-8.2.0-11.el9_4.x86_64.rpmVYqemu-kvm-device-usb-host-8.2.0-11.el9_4.x86_64.rpm[Yqemu-kvm-ui-opengl-8.2.0-11.el9_4.x86_64.rpmWYqemu-kvm-device-usb-redirect-8.2.0-11.el9_4.x86_64.rpmKYqemu-guest-agent-8.2.0-11.el9_4.x86_64.rpmUYqemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.x86_64.rpmMYqemu-kvm-8.2.0-11.el9_4.x86_64.rpmPYqemu-kvm-block-rbd-8.2.0-11.el9_4.x86_64.rpmLYqemu-img-8.2.0-11.el9_4.x86_64.rpmSYqemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.x86_64.rpm2Yqemu-kvm-block-blkio-8.2.0-11.el9_4.x86_64.rpmy JBsecurityLow: LibRaw security update*https://access.redhat.com/errata/RHSA-2024:2137RHSA-2024:2137RHSA-2024:2137 https://access.redhat.com/security/cve/CVE-2023-1729CVE-2023-1729CVE-2023-1729https://bugzilla.redhat.com/21882402188240https://errata.almalinux.org/9/ALSA-2024-2137.htmlALSA-2024:2137ALSA-2024:2137 OLibRaw-0.21.1-1.el9.i686.rpmOLibRaw-0.21.1-1.el9.x86_64.rpmOLibRaw-0.21.1-1.el9.i686.rpmOLibRaw-0.21.1-1.el9.x86_64.rpmH NBBBBBBBBsecurityModerate: libX11 security update3https://access.redhat.com/errata/RHSA-2024:2145RHSA-2024:2145RHSA-2024:2145 https://access.redhat.com/security/cve/CVE-2023-43785CVE-2023-43785CVE-2023-43785https://access.redhat.com/security/cve/CVE-2023-43786CVE-2023-43786CVE-2023-43786https://access.redhat.com/security/cve/CVE-2023-43787CVE-2023-43787CVE-2023-43787https://bugzilla.redhat.com/22422522242252https://bugzilla.redhat.com/22422532242253https://bugzilla.redhat.com/22422542242254https://errata.almalinux.org/9/ALSA-2024-2145.htmlALSA-2024:2145ALSA-2024:2145 vlibX11-devel-1.7.0-9.el9.i686.rpmvlibX11-1.7.0-9.el9.x86_64.rpmvlibX11-devel-1.7.0-9.el9.x86_64.rpmNvlibX11-common-1.7.0-9.el9.noarch.rpmvlibX11-1.7.0-9.el9.i686.rpmvlibX11-xcb-1.7.0-9.el9.i686.rpmvlibX11-xcb-1.7.0-9.el9.x86_64.rpmvlibX11-devel-1.7.0-9.el9.i686.rpmvlibX11-1.7.0-9.el9.x86_64.rpmvlibX11-devel-1.7.0-9.el9.x86_64.rpmNvlibX11-common-1.7.0-9.el9.noarch.rpmvlibX11-1.7.0-9.el9.i686.rpmvlibX11-xcb-1.7.0-9.el9.i686.rpmvlibX11-xcb-1.7.0-9.el9.x86_64.rpmM YBBBBsecurityModerate: libXpm security updatePhttps://access.redhat.com/errata/RHSA-2024:2146RHSA-2024:2146RHSA-2024:2146 https://access.redhat.com/security/cve/CVE-2023-43788CVE-2023-43788CVE-2023-43788https://access.redhat.com/security/cve/CVE-2023-43789CVE-2023-43789CVE-2023-43789https://bugzilla.redhat.com/22422482242248https://bugzilla.redhat.com/22422492242249https://errata.almalinux.org/9/ALSA-2024-2146.htmlALSA-2024:2146ALSA-2024:2146 libXpm-devel-3.5.13-10.el9.i686.rpmlibXpm-3.5.13-10.el9.x86_64.rpmlibXpm-3.5.13-10.el9.i686.rpmlibXpm-devel-3.5.13-10.el9.x86_64.rpmlibXpm-devel-3.5.13-10.el9.i686.rpmlibXpm-3.5.13-10.el9.x86_64.rpmlibXpm-3.5.13-10.el9.i686.rpmlibXpm-devel-3.5.13-10.el9.x86_64.rpm  2`BBBBBBBBBBBBBBBBsecurityModerate: ipa security updateouhttps://access.redhat.com/errata/RHSA-2024:2147RHSA-2024:2147RHSA-2024:2147 https://access.redhat.com/security/cve/CVE-2024-1481CVE-2024-1481CVE-2024-1481https://bugzilla.redhat.com/22621692262169https://errata.almalinux.org/9/ALSA-2024-2147.htmlALSA-2024:2147ALSA-2024:2147 1ipa-client-epn-4.11.0-9.el9_4.x86_64.rpm1ipa-selinux-4.11.0-9.el9_4.noarch.rpm1ipa-server-trust-ad-4.11.0-9.el9_4.x86_64.rpm1ipa-client-common-4.11.0-9.el9_4.noarch.rpm1ipa-client-samba-4.11.0-9.el9_4.x86_64.rpm1ipa-server-4.11.0-9.el9_4.x86_64.rpm1python3-ipaserver-4.11.0-9.el9_4.noarch.rpm1python3-ipalib-4.11.0-9.el9_4.noarch.rpm~1ipa-client-4.11.0-9.el9_4.x86_64.rpm1python3-ipaclient-4.11.0-9.el9_4.noarch.rpm1ipa-server-common-4.11.0-9.el9_4.noarch.rpm1ipa-common-4.11.0-9.el9_4.noarch.rpm1ipa-server-dns-4.11.0-9.el9_4.noarch.rpm 1ipa-client-epn-4.11.0-9.el9_4.x86_64.rpm1ipa-selinux-4.11.0-9.el9_4.noarch.rpm1ipa-server-trust-ad-4.11.0-9.el9_4.x86_64.rpm1ipa-client-common-4.11.0-9.el9_4.noarch.rpm1ipa-client-samba-4.11.0-9.el9_4.x86_64.rpm1ipa-server-4.11.0-9.el9_4.x86_64.rpm1python3-ipaserver-4.11.0-9.el9_4.noarch.rpm1python3-ipalib-4.11.0-9.el9_4.noarch.rpm~1ipa-client-4.11.0-9.el9_4.x86_64.rpm1python3-ipaclient-4.11.0-9.el9_4.noarch.rpm1ipa-server-common-4.11.0-9.el9_4.noarch.rpm1ipa-common-4.11.0-9.el9_4.noarch.rpm1ipa-server-dns-4.11.0-9.el9_4.noarch.rpm( 6sBsecurityModerate: frr security updatedbhttps://access.redhat.com/errata/RHSA-2024:2156RHSA-2024:2156RHSA-2024:2156 https://access.redhat.com/security/cve/CVE-2023-31489CVE-2023-31489CVE-2023-31489https://access.redhat.com/security/cve/CVE-2023-31490CVE-2023-31490CVE-2023-31490https://access.redhat.com/security/cve/CVE-2023-41358CVE-2023-41358CVE-2023-41358https://access.redhat.com/security/cve/CVE-2023-41359CVE-2023-41359CVE-2023-41359https://access.redhat.com/security/cve/CVE-2023-41360CVE-2023-41360CVE-2023-41360https://access.redhat.com/security/cve/CVE-2023-41909CVE-2023-41909CVE-2023-41909https://access.redhat.com/security/cve/CVE-2023-46752CVE-2023-46752CVE-2023-46752https://access.redhat.com/security/cve/CVE-2023-46753CVE-2023-46753CVE-2023-46753https://bugzilla.redhat.com/22358392235839https://bugzilla.redhat.com/22358402235840https://bugzilla.redhat.com/22358422235842https://bugzilla.redhat.com/22374162237416https://bugzilla.redhat.com/22389902238990https://bugzilla.redhat.com/22389922238992https://bugzilla.redhat.com/22463792246379https://bugzilla.redhat.com/22463812246381https://errata.almalinux.org/9/ALSA-2024-2156.htmlALSA-2024:2156ALSA-2024:2156 A{frr-8.5.3-4.el9.x86_64.rpmW{frr-selinux-8.5.3-4.el9.noarch.rpmA{frr-8.5.3-4.el9.x86_64.rpmW{frr-selinux-8.5.3-4.el9.noarch.rpm  87securityModerate: python3.11-urllib3 security updateF3https://access.redhat.com/errata/RHSA-2024:2159RHSA-2024:2159RHSA-2024:2159 https://access.redhat.com/security/cve/CVE-2023-43804CVE-2023-43804CVE-2023-43804https://bugzilla.redhat.com/22424932242493https://errata.almalinux.org/9/ALSA-2024-2159.htmlALSA-2024:2159ALSA-2024:2159 Icpython3.11-urllib3-1.26.12-2.el9.noarch.rpmIcpython3.11-urllib3-1.26.12-2.el9.noarch.rpm =yBBsecurityModerate: toolbox security updatey_https://access.redhat.com/errata/RHSA-2024:2160RHSA-2024:2160RHSA-2024:2160 https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-2160.htmlALSA-2024:2160ALSA-2024:2160 -atoolbox-0.0.99.5-2.el9.x86_64.rpm.atoolbox-tests-0.0.99.5-2.el9.x86_64.rpm-atoolbox-0.0.99.5-2.el9.x86_64.rpm.atoolbox-tests-0.0.99.5-2.el9.x86_64.rpm! ~BBBBBBBBBBsecurityModerate: xorg-x11-server security updateXhttps://access.redhat.com/errata/RHSA-2024:2169RHSA-2024:2169RHSA-2024:2169 https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-5380CVE-2023-5380CVE-2023-5380https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-0408CVE-2024-0408CVE-2024-0408https://access.redhat.com/security/cve/CVE-2024-0409CVE-2024-0409CVE-2024-0409https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22447362244736https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576892257689https://bugzilla.redhat.com/22576902257690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-2169.htmlALSA-2024:2169ALSA-2024:2169 bixorg-x11-server-Xvfb-1.20.11-24.el9.x86_64.rpmaixorg-x11-server-Xorg-1.20.11-24.el9.x86_64.rpm`ixorg-x11-server-Xnest-1.20.11-24.el9.x86_64.rpm^ixorg-x11-server-Xdmx-1.20.11-24.el9.x86_64.rpmdixorg-x11-server-common-1.20.11-24.el9.x86_64.rpm_ixorg-x11-server-Xephyr-1.20.11-24.el9.x86_64.rpmbixorg-x11-server-Xvfb-1.20.11-24.el9.x86_64.rpmaixorg-x11-server-Xorg-1.20.11-24.el9.x86_64.rpm`ixorg-x11-server-Xnest-1.20.11-24.el9.x86_64.rpm^ixorg-x11-server-Xdmx-1.20.11-24.el9.x86_64.rpmdixorg-x11-server-common-1.20.11-24.el9.x86_64.rpm_ixorg-x11-server-Xephyr-1.20.11-24.el9.x86_64.rpm  KsecurityModerate: xorg-x11-server-Xwayland security updateXJhttps://access.redhat.com/errata/RHSA-2024:2170RHSA-2024:2170RHSA-2024:2170 https://access.redhat.com/security/cve/CVE-2023-5367CVE-2023-5367CVE-2023-5367https://access.redhat.com/security/cve/CVE-2023-6377CVE-2023-6377CVE-2023-6377https://access.redhat.com/security/cve/CVE-2023-6478CVE-2023-6478CVE-2023-6478https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-0408CVE-2024-0408CVE-2024-0408https://access.redhat.com/security/cve/CVE-2024-0409CVE-2024-0409CVE-2024-0409https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22430912243091https://bugzilla.redhat.com/22532912253291https://bugzilla.redhat.com/22532982253298https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576892257689https://bugzilla.redhat.com/22576902257690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-2170.htmlALSA-2024:2170ALSA-2024:2170 c-xorg-x11-server-Xwayland-22.1.9-5.el9.x86_64.rpmc-xorg-x11-server-Xwayland-22.1.9-5.el9.x86_64.rpm   NsecurityModerate: runc security update" https://access.redhat.com/errata/RHSA-2024:2180RHSA-2024:2180RHSA-2024:2180 https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/22531932253193https://errata.almalinux.org/9/ALSA-2024-2180.htmlALSA-2024:2180ALSA-2024:2180  `runc-1.1.12-2.el9.x86_64.rpm `runc-1.1.12-2.el9.x86_64.rpm ! QBBBsecurityModerate: libsndfile security update)&https://access.redhat.com/errata/RHSA-2024:2184RHSA-2024:2184RHSA-2024:2184 https://access.redhat.com/security/cve/CVE-2022-33065CVE-2022-33065CVE-2022-33065https://bugzilla.redhat.com/22389342238934https://errata.almalinux.org/9/ALSA-2024-2184.htmlALSA-2024:2184ALSA-2024:2184 FSlibsndfile-1.0.31-8.el9.x86_64.rpmFSlibsndfile-1.0.31-8.el9.i686.rpm.Slibsndfile-utils-1.0.31-8.el9.x86_64.rpmFSlibsndfile-1.0.31-8.el9.x86_64.rpmFSlibsndfile-1.0.31-8.el9.i686.rpm.Slibsndfile-utils-1.0.31-8.el9.x86_64.rpmJ" WBBBBBBBsecurityModerate: podman security updateOthttps://access.redhat.com/errata/RHSA-2024:2193RHSA-2024:2193RHSA-2024:2193 https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/22531932253193https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-2193.htmlALSA-2024:2193ALSA-2024:2193 gDpodman-docker-4.9.4-0.1.el9.noarch.rpm4Dpodman-remote-4.9.4-0.1.el9.x86_64.rpm3Dpodman-plugins-4.9.4-0.1.el9.x86_64.rpm5Dpodman-tests-4.9.4-0.1.el9.x86_64.rpm2Dpodman-4.9.4-0.1.el9.x86_64.rpmgDpodman-docker-4.9.4-0.1.el9.noarch.rpm4Dpodman-remote-4.9.4-0.1.el9.x86_64.rpm3Dpodman-plugins-4.9.4-0.1.el9.x86_64.rpm5Dpodman-tests-4.9.4-0.1.el9.x86_64.rpm2Dpodman-4.9.4-0.1.el9.x86_64.rpm\# ,aBBBBBBBBBsecurityImportant: pmix security updateC:https://access.redhat.com/errata/RHSA-2024:2199RHSA-2024:2199RHSA-2024:2199 https://access.redhat.com/security/cve/CVE-2023-41915CVE-2023-41915CVE-2023-41915https://bugzilla.redhat.com/22388982238898https://errata.almalinux.org/9/ALSA-2024-2199.htmlALSA-2024:2199ALSA-2024:2199 Z[pmix-devel-3.2.3-5.el9.x86_64.rpm[[pmix-pmi-3.2.3-5.el9.i686.rpmY[pmix-3.2.3-5.el9.x86_64.rpm[[pmix-pmi-3.2.3-5.el9.x86_64.rpmY[pmix-3.2.3-5.el9.i686.rpm[[pmix-tools-3.2.3-5.el9.x86_64.rpmZ[pmix-devel-3.2.3-5.el9.i686.rpmZ[pmix-devel-3.2.3-5.el9.x86_64.rpm[[pmix-pmi-3.2.3-5.el9.i686.rpmY[pmix-3.2.3-5.el9.x86_64.rpm[[pmix-pmi-3.2.3-5.el9.x86_64.rpmY[pmix-3.2.3-5.el9.i686.rpm[[pmix-tools-3.2.3-5.el9.x86_64.rpmZ[pmix-devel-3.2.3-5.el9.i686.rpm$ 5mBBBBBBsecurityModerate: libnbd security update}<https://access.redhat.com/errata/RHSA-2024:2204RHSA-2024:2204RHSA-2024:2204 https://access.redhat.com/security/cve/CVE-2023-5215CVE-2023-5215CVE-2023-5215https://access.redhat.com/security/cve/CVE-2023-5871CVE-2023-5871CVE-2023-5871https://bugzilla.redhat.com/22410412241041https://bugzilla.redhat.com/22473082247308https://errata.almalinux.org/9/ALSA-2024-2204.htmlALSA-2024:2204ALSA-2024:2204 1wlibnbd-1.18.1-3.el9.x86_64.rpmgwpython3-libnbd-1.18.1-3.el9.x86_64.rpm`wnbdfuse-1.18.1-3.el9.x86_64.rpmSwlibnbd-bash-completion-1.18.1-3.el9.noarch.rpm1wlibnbd-1.18.1-3.el9.i686.rpm1wlibnbd-1.18.1-3.el9.x86_64.rpmgwpython3-libnbd-1.18.1-3.el9.x86_64.rpm`wnbdfuse-1.18.1-3.el9.x86_64.rpmSwlibnbd-bash-completion-1.18.1-3.el9.noarch.rpm1wlibnbd-1.18.1-3.el9.i686.rpm6% >vBBBBBBsecurityModerate: freerdp security update9ihttps://access.redhat.com/errata/RHSA-2024:2208RHSA-2024:2208RHSA-2024:2208 https://access.redhat.com/security/cve/CVE-2023-39350CVE-2023-39350CVE-2023-39350https://access.redhat.com/security/cve/CVE-2023-39351CVE-2023-39351CVE-2023-39351https://access.redhat.com/security/cve/CVE-2023-39352CVE-2023-39352CVE-2023-39352https://access.redhat.com/security/cve/CVE-2023-39353CVE-2023-39353CVE-2023-39353https://access.redhat.com/security/cve/CVE-2023-39354CVE-2023-39354CVE-2023-39354https://access.redhat.com/security/cve/CVE-2023-39356CVE-2023-39356CVE-2023-39356https://access.redhat.com/security/cve/CVE-2023-40181CVE-2023-40181CVE-2023-40181https://access.redhat.com/security/cve/CVE-2023-40186CVE-2023-40186CVE-2023-40186https://access.redhat.com/security/cve/CVE-2023-40188CVE-2023-40188CVE-2023-40188https://access.redhat.com/security/cve/CVE-2023-40567CVE-2023-40567CVE-2023-40567https://access.redhat.com/security/cve/CVE-2023-40569CVE-2023-40569CVE-2023-40569https://access.redhat.com/security/cve/CVE-2023-40589CVE-2023-40589CVE-2023-40589https://bugzilla.redhat.com/22366062236606https://bugzilla.redhat.com/22366502236650https://bugzilla.redhat.com/22366562236656https://bugzilla.redhat.com/22366692236669https://bugzilla.redhat.com/22367302236730https://bugzilla.redhat.com/22367502236750https://bugzilla.redhat.com/22367592236759https://bugzilla.redhat.com/22367632236763https://bugzilla.redhat.com/22367662236766https://bugzilla.redhat.com/22367742236774https://bugzilla.redhat.com/22367792236779https://bugzilla.redhat.com/22367842236784https://errata.almalinux.org/9/ALSA-2024-2208.htmlALSA-2024:2208ALSA-2024:2208 p freerdp-2.11.2-1.el9.x86_64.rpm^ libwinpr-2.11.2-1.el9.i686.rpmV freerdp-libs-2.11.2-1.el9.x86_64.rpm^ libwinpr-2.11.2-1.el9.x86_64.rpmV freerdp-libs-2.11.2-1.el9.i686.rpmp freerdp-2.11.2-1.el9.x86_64.rpm^ libwinpr-2.11.2-1.el9.i686.rpmV freerdp-libs-2.11.2-1.el9.x86_64.rpm^ libwinpr-2.11.2-1.el9.x86_64.rpmV freerdp-libs-2.11.2-1.el9.i686.rpm2& securityModerate: tcpdump security update"hhttps://access.redhat.com/errata/RHSA-2024:2211RHSA-2024:2211RHSA-2024:2211 https://access.redhat.com/security/cve/CVE-2021-41043CVE-2021-41043CVE-2021-41043https://bugzilla.redhat.com/20403922040392https://errata.almalinux.org/9/ALSA-2024-2211.htmlALSA-2024:2211ALSA-2024:2211  btcpdump-4.99.0-9.el9.x86_64.rpm btcpdump-4.99.0-9.el9.x86_64.rpm' BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: pcp security update Mhttps://access.redhat.com/errata/RHSA-2024:2213RHSA-2024:2213RHSA-2024:2213 https://access.redhat.com/security/cve/CVE-2023-6917CVE-2023-6917CVE-2023-6917https://bugzilla.redhat.com/22549832254983https://errata.almalinux.org/9/ALSA-2024-2213.htmlALSA-2024:2213ALSA-2024:2213 l(pcp-selinux-6.2.0-1.el9.x86_64.rpmspcp-pmda-gpsd-6.2.0-1.el9.x86_64.rpm%pcp-pmda-weblog-6.2.0-1.el9.x86_64.rpmpcp-pmda-podman-6.2.0-1.el9.x86_64.rpmbpcp-pmda-bind2-6.2.0-1.el9.x86_64.rpmxpcp-pmda-libvirt-6.2.0-1.el9.x86_64.rpmpcp-pmda-memcache-6.2.0-1.el9.x86_64.rpmmpcp-pmda-ds389log-6.2.0-1.el9.x86_64.rpmjpcp-pmda-dm-6.2.0-1.el9.x86_64.rpm[pcp-import-iostat2pcp-6.2.0-1.el9.x86_64.rpm\pcp-import-mrtg2pcp-6.2.0-1.el9.x86_64.rpmpcp-pmda-slurm-6.2.0-1.el9.x86_64.rpmpcp-pmda-mysql-6.2.0-1.el9.x86_64.rpmNpcp-conf-6.2.0-1.el9.x86_64.rpm`pcp-testsuite-6.2.0-1.el9.x86_64.rpmpcp-pmda-oracle-6.2.0-1.el9.x86_64.rpm pcp-pmda-nvidia-gpu-6.2.0-1.el9.x86_64.rpm.perl-PCP-PMDA-6.2.0-1.el9.x86_64.rpm,perl-PCP-LogSummary-6.2.0-1.el9.x86_64.rpmpcp-pmda-named-6.2.0-1.el9.x86_64.rpm&pcp-pmda-zimbra-6.2.0-1.el9.x86_64.rpm pcp-pmda-nfsclient-6.2.0-1.el9.x86_64.rpm}pcp-pmda-lustrecomm-6.2.0-1.el9.x86_64.rpmqpcp-pmda-gluster-6.2.0-1.el9.x86_64.rpm]pcp-devel-6.2.0-1.el9.i686.rpmOpcp-export-pcp2elasticsearch-6.2.0-1.el9.x86_64.rpmPpcp-export-pcp2graphite-6.2.0-1.el9.x86_64.rpm*pcp-zeroconf-6.2.0-1.el9.x86_64.rpmepcp-pmda-bpftrace-6.2.0-1.el9.x86_64.rpmpcp-pmda-roomtemp-6.2.0-1.el9.x86_64.rpmpcp-pmda-perfevent-6.2.0-1.el9.x86_64.rpm1python3-pcp-6.2.0-1.el9.x86_64.rpmpcp-pmda-rsyslog-6.2.0-1.el9.x86_64.rpmwpcp-pmda-json-6.2.0-1.el9.x86_64.rpmUpcp-export-pcp2zabbix-6.2.0-1.el9.x86_64.rpmopcp-pmda-farm-6.2.0-1.el9.x86_64.rpmpcp-pmda-postgresql-6.2.0-1.el9.x86_64.rpmWpcp-geolocate-6.2.0-1.el9.x86_64.rpmgpcp-pmda-cisco-6.2.0-1.el9.x86_64.rpm pcp-pmda-statsd-6.2.0-1.el9.x86_64.rpm]pcp-devel-6.2.0-1.el9.x86_64.rpmMpcp-6.2.0-1.el9.x86_64.rpmpcp-pmda-redis-6.2.0-1.el9.x86_64.rpm pcp-pmda-nginx-6.2.0-1.el9.x86_64.rpmYpcp-import-collectl2pcp-6.2.0-1.el9.x86_64.rpmpcp-pmda-smart-6.2.0-1.el9.x86_64.rpmDpcp-doc-6.2.0-1.el9.noarch.rpmpcp-pmda-pdns-6.2.0-1.el9.x86_64.rpmpcp-pmda-resctrl-6.2.0-1.el9.x86_64.rpm_pcp-libs-devel-6.2.0-1.el9.x86_64.rpmpcp-pmda-samba-6.2.0-1.el9.x86_64.rpmrpcp-pmda-gpfs-6.2.0-1.el9.x86_64.rpmupcp-pmda-haproxy-6.2.0-1.el9.x86_64.rpmRpcp-export-pcp2json-6.2.0-1.el9.x86_64.rpmapcp-pmda-bcc-6.2.0-1.el9.x86_64.rpmpcp-pmda-mongodb-6.2.0-1.el9.x86_64.rpm_pcp-libs-devel-6.2.0-1.el9.i686.rpm^pcp-libs-6.2.0-1.el9.x86_64.rpmypcp-pmda-lio-6.2.0-1.el9.x86_64.rpmpcp-pmda-netcheck-6.2.0-1.el9.x86_64.rpmpcp-pmda-shping-6.2.0-1.el9.x86_64.rpmZpcp-import-ganglia2pcp-6.2.0-1.el9.x86_64.rpmcpcp-pmda-bonding-6.2.0-1.el9.x86_64.rpmpcp-pmda-netfilter-6.2.0-1.el9.x86_64.rpm$pcp-pmda-unbound-6.2.0-1.el9.x86_64.rpm)pcp-system-tools-6.2.0-1.el9.x86_64.rpmvpcp-pmda-infiniband-6.2.0-1.el9.x86_64.rpmpcp-pmda-sendmail-6.2.0-1.el9.x86_64.rpmkpcp-pmda-docker-6.2.0-1.el9.x86_64.rpmTpcp-export-pcp2xml-6.2.0-1.el9.x86_64.rpmpcp-pmda-mounts-6.2.0-1.el9.x86_64.rpmipcp-pmda-denki-6.2.0-1.el9.x86_64.rpmpcp-pmda-mssql-6.2.0-1.el9.x86_64.rpmSpcp-export-pcp2spark-6.2.0-1.el9.x86_64.rpm]pcp-import-sar2pcp-6.2.0-1.el9.x86_64.rpm^pcp-pmda-activemq-6.2.0-1.el9.x86_64.rpm#pcp-pmda-trace-6.2.0-1.el9.x86_64.rpm"pcp-pmda-systemd-6.2.0-1.el9.x86_64.rpm_pcp-pmda-apache-6.2.0-1.el9.x86_64.rpm pcp-pmda-openmetrics-6.2.0-1.el9.x86_64.rpm-perl-PCP-MMV-6.2.0-1.el9.x86_64.rpmpcp-pmda-snmp-6.2.0-1.el9.x86_64.rpmVpcp-export-zabbix-agent-6.2.0-1.el9.x86_64.rpm`pcp-pmda-bash-6.2.0-1.el9.x86_64.rpmnpcp-pmda-elasticsearch-6.2.0-1.el9.x86_64.rpmpcp-pmda-news-6.2.0-1.el9.x86_64.rpm!pcp-pmda-summary-6.2.0-1.el9.x86_64.rpmlpcp-pmda-ds389-6.2.0-1.el9.x86_64.rpm'pcp-pmda-zswap-6.2.0-1.el9.x86_64.rpmdpcp-pmda-bpf-6.2.0-1.el9.x86_64.rpmtpcp-pmda-hacluster-6.2.0-1.el9.x86_64.rpm pcp-pmda-openvswitch-6.2.0-1.el9.x86_64.rpmXpcp-gui-6.2.0-1.el9.x86_64.rpm{pcp-pmda-logger-6.2.0-1.el9.x86_64.rpm~pcp-pmda-mailq-6.2.0-1.el9.x86_64.rpmpcp-pmda-sockets-6.2.0-1.el9.x86_64.rpmhpcp-pmda-dbping-6.2.0-1.el9.x86_64.rpmpcp-pmda-rabbitmq-6.2.0-1.el9.x86_64.rpmfpcp-pmda-cifs-6.2.0-1.el9.x86_64.rpm`pcp-testsuite-6.2.0-1.el9.i686.rpm^pcp-libs-6.2.0-1.el9.i686.rpmpcp-pmda-postfix-6.2.0-1.el9.x86_64.rpm|pcp-pmda-lustre-6.2.0-1.el9.x86_64.rpmpcp-pmda-mic-6.2.0-1.el9.x86_64.rpmQpcp-export-pcp2influxdb-6.2.0-1.el9.x86_64.rpmzpcp-pmda-lmsensors-6.2.0-1.el9.x86_64.rpm+perl-PCP-LogImport-6.2.0-1.el9.x86_64.rpmppcp-pmda-gfs2-6.2.0-1.el9.x86_64.rpml(pcp-selinux-6.2.0-1.el9.x86_64.rpmspcp-pmda-gpsd-6.2.0-1.el9.x86_64.rpm%pcp-pmda-weblog-6.2.0-1.el9.x86_64.rpmpcp-pmda-podman-6.2.0-1.el9.x86_64.rpmbpcp-pmda-bind2-6.2.0-1.el9.x86_64.rpmxpcp-pmda-libvirt-6.2.0-1.el9.x86_64.rpmpcp-pmda-memcache-6.2.0-1.el9.x86_64.rpmmpcp-pmda-ds389log-6.2.0-1.el9.x86_64.rpmjpcp-pmda-dm-6.2.0-1.el9.x86_64.rpm[pcp-import-iostat2pcp-6.2.0-1.el9.x86_64.rpm\pcp-import-mrtg2pcp-6.2.0-1.el9.x86_64.rpmpcp-pmda-slurm-6.2.0-1.el9.x86_64.rpmpcp-pmda-mysql-6.2.0-1.el9.x86_64.rpmNpcp-conf-6.2.0-1.el9.x86_64.rpm`pcp-testsuite-6.2.0-1.el9.x86_64.rpmpcp-pmda-oracle-6.2.0-1.el9.x86_64.rpm pcp-pmda-nvidia-gpu-6.2.0-1.el9.x86_64.rpm.perl-PCP-PMDA-6.2.0-1.el9.x86_64.rpm,perl-PCP-LogSummary-6.2.0-1.el9.x86_64.rpmpcp-pmda-named-6.2.0-1.el9.x86_64.rpm&pcp-pmda-zimbra-6.2.0-1.el9.x86_64.rpm pcp-pmda-nfsclient-6.2.0-1.el9.x86_64.rpm}pcp-pmda-lustrecomm-6.2.0-1.el9.x86_64.rpmqpcp-pmda-gluster-6.2.0-1.el9.x86_64.rpm]pcp-devel-6.2.0-1.el9.i686.rpmOpcp-export-pcp2elasticsearch-6.2.0-1.el9.x86_64.rpmPpcp-export-pcp2graphite-6.2.0-1.el9.x86_64.rpm*pcp-zeroconf-6.2.0-1.el9.x86_64.rpmepcp-pmda-bpftrace-6.2.0-1.el9.x86_64.rpmpcp-pmda-roomtemp-6.2.0-1.el9.x86_64.rpmpcp-pmda-perfevent-6.2.0-1.el9.x86_64.rpm1python3-pcp-6.2.0-1.el9.x86_64.rpmpcp-pmda-rsyslog-6.2.0-1.el9.x86_64.rpmwpcp-pmda-json-6.2.0-1.el9.x86_64.rpmUpcp-export-pcp2zabbix-6.2.0-1.el9.x86_64.rpmopcp-pmda-farm-6.2.0-1.el9.x86_64.rpmpcp-pmda-postgresql-6.2.0-1.el9.x86_64.rpmWpcp-geolocate-6.2.0-1.el9.x86_64.rpmgpcp-pmda-cisco-6.2.0-1.el9.x86_64.rpm pcp-pmda-statsd-6.2.0-1.el9.x86_64.rpm]pcp-devel-6.2.0-1.el9.x86_64.rpmMpcp-6.2.0-1.el9.x86_64.rpmpcp-pmda-redis-6.2.0-1.el9.x86_64.rpm pcp-pmda-nginx-6.2.0-1.el9.x86_64.rpmYpcp-import-collectl2pcp-6.2.0-1.el9.x86_64.rpmpcp-pmda-smart-6.2.0-1.el9.x86_64.rpmDpcp-doc-6.2.0-1.el9.noarch.rpmpcp-pmda-pdns-6.2.0-1.el9.x86_64.rpmpcp-pmda-resctrl-6.2.0-1.el9.x86_64.rpm_pcp-libs-devel-6.2.0-1.el9.x86_64.rpmpcp-pmda-samba-6.2.0-1.el9.x86_64.rpmrpcp-pmda-gpfs-6.2.0-1.el9.x86_64.rpmupcp-pmda-haproxy-6.2.0-1.el9.x86_64.rpmRpcp-export-pcp2json-6.2.0-1.el9.x86_64.rpmapcp-pmda-bcc-6.2.0-1.el9.x86_64.rpmpcp-pmda-mongodb-6.2.0-1.el9.x86_64.rpm_pcp-libs-devel-6.2.0-1.el9.i686.rpm^pcp-libs-6.2.0-1.el9.x86_64.rpmypcp-pmda-lio-6.2.0-1.el9.x86_64.rpmpcp-pmda-netcheck-6.2.0-1.el9.x86_64.rpmpcp-pmda-shping-6.2.0-1.el9.x86_64.rpmZpcp-import-ganglia2pcp-6.2.0-1.el9.x86_64.rpmcpcp-pmda-bonding-6.2.0-1.el9.x86_64.rpmpcp-pmda-netfilter-6.2.0-1.el9.x86_64.rpm$pcp-pmda-unbound-6.2.0-1.el9.x86_64.rpm)pcp-system-tools-6.2.0-1.el9.x86_64.rpmvpcp-pmda-infiniband-6.2.0-1.el9.x86_64.rpmpcp-pmda-sendmail-6.2.0-1.el9.x86_64.rpmkpcp-pmda-docker-6.2.0-1.el9.x86_64.rpmTpcp-export-pcp2xml-6.2.0-1.el9.x86_64.rpmpcp-pmda-mounts-6.2.0-1.el9.x86_64.rpmipcp-pmda-denki-6.2.0-1.el9.x86_64.rpmpcp-pmda-mssql-6.2.0-1.el9.x86_64.rpmSpcp-export-pcp2spark-6.2.0-1.el9.x86_64.rpm]pcp-import-sar2pcp-6.2.0-1.el9.x86_64.rpm^pcp-pmda-activemq-6.2.0-1.el9.x86_64.rpm#pcp-pmda-trace-6.2.0-1.el9.x86_64.rpm"pcp-pmda-systemd-6.2.0-1.el9.x86_64.rpm_pcp-pmda-apache-6.2.0-1.el9.x86_64.rpm pcp-pmda-openmetrics-6.2.0-1.el9.x86_64.rpm-perl-PCP-MMV-6.2.0-1.el9.x86_64.rpmpcp-pmda-snmp-6.2.0-1.el9.x86_64.rpmVpcp-export-zabbix-agent-6.2.0-1.el9.x86_64.rpm`pcp-pmda-bash-6.2.0-1.el9.x86_64.rpmnpcp-pmda-elasticsearch-6.2.0-1.el9.x86_64.rpmpcp-pmda-news-6.2.0-1.el9.x86_64.rpm!pcp-pmda-summary-6.2.0-1.el9.x86_64.rpmlpcp-pmda-ds389-6.2.0-1.el9.x86_64.rpm'pcp-pmda-zswap-6.2.0-1.el9.x86_64.rpmdpcp-pmda-bpf-6.2.0-1.el9.x86_64.rpmtpcp-pmda-hacluster-6.2.0-1.el9.x86_64.rpm pcp-pmda-openvswitch-6.2.0-1.el9.x86_64.rpmXpcp-gui-6.2.0-1.el9.x86_64.rpm{pcp-pmda-logger-6.2.0-1.el9.x86_64.rpm~pcp-pmda-mailq-6.2.0-1.el9.x86_64.rpmpcp-pmda-sockets-6.2.0-1.el9.x86_64.rpmhpcp-pmda-dbping-6.2.0-1.el9.x86_64.rpmpcp-pmda-rabbitmq-6.2.0-1.el9.x86_64.rpmfpcp-pmda-cifs-6.2.0-1.el9.x86_64.rpm`pcp-testsuite-6.2.0-1.el9.i686.rpm^pcp-libs-6.2.0-1.el9.i686.rpmpcp-pmda-postfix-6.2.0-1.el9.x86_64.rpm|pcp-pmda-lustre-6.2.0-1.el9.x86_64.rpmpcp-pmda-mic-6.2.0-1.el9.x86_64.rpmQpcp-export-pcp2influxdb-6.2.0-1.el9.x86_64.rpmzpcp-pmda-lmsensors-6.2.0-1.el9.x86_64.rpm+perl-PCP-LogImport-6.2.0-1.el9.x86_64.rpmppcp-pmda-gfs2-6.2.0-1.el9.x86_64.rpmY( VBBBBsecurityModerate: motif security updateW$https://access.redhat.com/errata/RHSA-2024:2217RHSA-2024:2217RHSA-2024:2217 https://access.redhat.com/security/cve/CVE-2023-43788CVE-2023-43788CVE-2023-43788https://access.redhat.com/security/cve/CVE-2023-43789CVE-2023-43789CVE-2023-43789https://bugzilla.redhat.com/22422482242248https://bugzilla.redhat.com/22422492242249https://errata.almalinux.org/9/ALSA-2024-2217.htmlALSA-2024:2217ALSA-2024:2217 Nmotif-2.3.4-28.el9.i686.rpmOmotif-devel-2.3.4-28.el9.i686.rpmOmotif-devel-2.3.4-28.el9.x86_64.rpmNmotif-2.3.4-28.el9.x86_64.rpmNmotif-2.3.4-28.el9.i686.rpmOmotif-devel-2.3.4-28.el9.i686.rpmOmotif-devel-2.3.4-28.el9.x86_64.rpmNmotif-2.3.4-28.el9.x86_64.rpm) ]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: perl security update{3https://access.redhat.com/errata/RHSA-2024:2228RHSA-2024:2228RHSA-2024:2228 https://access.redhat.com/security/cve/CVE-2023-47038CVE-2023-47038CVE-2023-47038https://bugzilla.redhat.com/22495232249523https://errata.almalinux.org/9/ALSA-2024-2228.htmlALSA-2024:2228ALSA-2024:2228 fMperl-NDBM_File-1.15-481.el9.x86_64.rpm"`perl-Net-1.02-481.el9.noarch.rpm Eperl-ExtUtils-Constant-0.25-481.el9.noarch.rpm`perl-IPC-Open3-1.21-481.el9.noarch.rpmQperl-Attribute-Handlers-1.01-481.el9.noarch.rpmBzperl-libnetcfg-5.32.1-481.el9.noarch.rpmAjperl-less-0.03-481.el9.noarch.rpmperl-AutoSplit-5.74-481.el9.noarch.rpmMnperl-vars-1.05-481.el9.noarch.rpm operl-Devel-SelfStubber-1.06-481.el9.noarch.rpm2Tperl-Tie-Memoize-1.1-481.el9.noarch.rpm/perl-Thread-Semaphore-2.13-481.el9.noarch.rpmlperl-ExtUtils-Embed-1.35-481.el9.noarch.rpmTzperl-interpreter-5.32.1-481.el9.x86_64.rpm`perl-I18N-Collate-1.02-481.el9.noarch.rpmperl-FileHandle-2.03-481.el9.noarch.rpmWperl-FileCache-1.10-481.el9.noarch.rpm?4perl-filetest-1.03-481.el9.noarch.rpmH1perl-overloading-0.02-481.el9.noarch.rpmVzperl-libs-5.32.1-481.el9.x86_64.rpmP9perl-POSIX-1.94-481.el9.x86_64.rpmJ$perl-Hash-Util-FieldHash-1.20-481.el9.x86_64.rpm-`perl-Text-Abbrev-1.02-481.el9.noarch.rpmC1perl-DynaLoader-1.47-481.el9.x86_64.rpm4perl-Memoize-1.03-481.el9.noarch.rpm nperl-DirHandle-1.05-481.el9.noarch.rpm$aperl-Pod-Html-1.25-481.el9.noarch.rpm perl-Module-Loaded-0.08-481.el9.noarch.rpm)Sperl-Symbol-1.08-481.el9.noarch.rpmUperl-lib-0.65-481.el9.x86_64.rpm6rperl-autouse-1.11-481.el9.noarch.rpm8pperl-blib-1.07-481.el9.noarch.rpmVzperl-libs-5.32.1-481.el9.i686.rpmperl-Locale-Maketext-Simple-0.21-481.el9.noarch.rpm=5perl-encoding-warnings-0.13-481.el9.noarch.rpmtperl-File-Find-1.37-481.el9.noarch.rpmCaperl-locale-1.09-481.el9.noarch.rpm#perl-Pod-Functions-1.13-481.el9.noarch.rpmFperl-Fcntl-1.13-481.el9.x86_64.rpmG<perl-File-DosGlob-1.12-481.el9.x86_64.rpmLperl-Class-Struct-0.66-481.el9.noarch.rpm+\perl-Term-ReadLine-1.17-481.el9.noarch.rpmDzperl-macros-5.32.1-481.el9.noarch.rpm9vperl-debugger-1.56-481.el9.noarch.rpm<perl-Getopt-Std-1.12-481.el9.noarch.rpm@Kperl-if-0.60.800-481.el9.noarch.rpmNperl-ODBM_File-1.16-481.el9.x86_64.rpm3perl-DBM_Filter-0.06-481.el9.noarch.rpmIaperl-sigtrap-1.09-481.el9.noarch.rpm54perl-User-pwent-1.03-481.el9.noarch.rpmXperl-File-Compare-1.100.600-481.el9.noarch.rpmHperl-GDBM_File-1.18-481.el9.x86_64.rpm"perl-File-Basename-2.85-481.el9.noarch.rpm%perl-Safe-2.41-481.el9.noarch.rpm&pperl-Search-Dict-1.07-481.el9.noarch.rpmperl-AutoLoader-5.74-481.el9.noarch.rpmJperl-sort-2.04-481.el9.noarch.rpm 5perl-Dumpvalue-2.27-481.el9.noarch.rpm(bperl-SelfLoader-1.26-481.el9.noarch.rpmW\perl-ph-5.32.1-481.el9.x86_64.rpm<\perl-doc-5.32.1-481.el9.noarch.rpmaperl-File-stat-1.09-481.el9.noarch.rpmUzperl-devel-5.32.1-481.el9.i686.rpm*sperl-Term-Complete-1.403-481.el9.noarch.rpm;tperl-diagnostics-1.37-481.el9.noarch.rpmaperl-ExtUtils-Miniperl-1.09-481.el9.noarch.rpmUzperl-devel-5.32.1-481.el9.x86_64.rpm>5perl-fields-2.27-481.el9.noarch.rpmE\perl-meta-notation-5.32.1-481.el9.noarch.rpmUperl-Benchmark-1.23-481.el9.noarch.rpmB)perl-Devel-Peek-1.28-481.el9.x86_64.rpmL\perl-utils-5.32.1-481.el9.noarch.rpm75perl-base-2.27-481.el9.noarch.rpm.,perl-Thread-3.05-481.el9.noarch.rpm@5perl-B-1.80-481.el9.x86_64.rpmVUperl-mro-1.23-481.el9.x86_64.rpmD,perl-Errno-1.30-481.el9.x86_64.rpm,sperl-Test-1.31-481.el9.noarch.rpmK4perl-subs-1.03-481.el9.noarch.rpmjperl-Config-Extensions-0.03-481.el9.noarch.rpmIperl-Hash-Util-0.23-481.el9.x86_64.rpm34perl-Time-1.03-481.el9.noarch.rpm!Mperl-NEXT-0.67-481.el9.noarch.rpm:2perl-deprecate-0.04-481.el9.noarch.rpmGsperl-overload-1.31-481.el9.noarch.rpmRUperl-Sys-Hostname-1.23-481.el9.x86_64.rpmwperl-Math-Complex-1.59-481.el9.noarch.rpmO2perl-Opcode-1.48-481.el9.x86_64.rpmJperl-I18N-LangTags-0.44-481.el9.noarch.rpm?zperl-5.32.1-481.el9.x86_64.rpm'`perl-SelectSaver-1.02-481.el9.noarch.rpmperl-File-Copy-2.34-481.el9.noarch.rpm0Aperl-Tie-4.6-481.el9.noarch.rpmuperl-FindBin-1.51-481.el9.noarch.rpm1operl-Tie-File-1.06-481.el9.noarch.rpmKperl-I18N-Langinfo-0.19-481.el9.x86_64.rpmF<perl-open-1.12-481.el9.noarch.rpmL0perl-IO-1.43-481.el9.x86_64.rpmNRperl-vmsish-1.04-481.el9.noarch.rpm4Nperl-Unicode-UCD-0.75-481.el9.noarch.rpm rperl-English-1.11-481.el9.noarch.rpmS-perl-Time-Piece-1.3401-481.el9.x86_64.rpmfMperl-NDBM_File-1.15-481.el9.x86_64.rpm"`perl-Net-1.02-481.el9.noarch.rpm Eperl-ExtUtils-Constant-0.25-481.el9.noarch.rpm`perl-IPC-Open3-1.21-481.el9.noarch.rpmQperl-Attribute-Handlers-1.01-481.el9.noarch.rpmBzperl-libnetcfg-5.32.1-481.el9.noarch.rpmAjperl-less-0.03-481.el9.noarch.rpmperl-AutoSplit-5.74-481.el9.noarch.rpmMnperl-vars-1.05-481.el9.noarch.rpm operl-Devel-SelfStubber-1.06-481.el9.noarch.rpm2Tperl-Tie-Memoize-1.1-481.el9.noarch.rpm/perl-Thread-Semaphore-2.13-481.el9.noarch.rpmlperl-ExtUtils-Embed-1.35-481.el9.noarch.rpmTzperl-interpreter-5.32.1-481.el9.x86_64.rpm`perl-I18N-Collate-1.02-481.el9.noarch.rpmperl-FileHandle-2.03-481.el9.noarch.rpmWperl-FileCache-1.10-481.el9.noarch.rpm?4perl-filetest-1.03-481.el9.noarch.rpmH1perl-overloading-0.02-481.el9.noarch.rpmVzperl-libs-5.32.1-481.el9.x86_64.rpmP9perl-POSIX-1.94-481.el9.x86_64.rpmJ$perl-Hash-Util-FieldHash-1.20-481.el9.x86_64.rpm-`perl-Text-Abbrev-1.02-481.el9.noarch.rpmC1perl-DynaLoader-1.47-481.el9.x86_64.rpm4perl-Memoize-1.03-481.el9.noarch.rpm nperl-DirHandle-1.05-481.el9.noarch.rpm$aperl-Pod-Html-1.25-481.el9.noarch.rpm perl-Module-Loaded-0.08-481.el9.noarch.rpm)Sperl-Symbol-1.08-481.el9.noarch.rpmUperl-lib-0.65-481.el9.x86_64.rpm6rperl-autouse-1.11-481.el9.noarch.rpm8pperl-blib-1.07-481.el9.noarch.rpmVzperl-libs-5.32.1-481.el9.i686.rpmperl-Locale-Maketext-Simple-0.21-481.el9.noarch.rpm=5perl-encoding-warnings-0.13-481.el9.noarch.rpmtperl-File-Find-1.37-481.el9.noarch.rpmCaperl-locale-1.09-481.el9.noarch.rpm#perl-Pod-Functions-1.13-481.el9.noarch.rpmFperl-Fcntl-1.13-481.el9.x86_64.rpmG<perl-File-DosGlob-1.12-481.el9.x86_64.rpmLperl-Class-Struct-0.66-481.el9.noarch.rpm+\perl-Term-ReadLine-1.17-481.el9.noarch.rpmDzperl-macros-5.32.1-481.el9.noarch.rpm9vperl-debugger-1.56-481.el9.noarch.rpm<perl-Getopt-Std-1.12-481.el9.noarch.rpm@Kperl-if-0.60.800-481.el9.noarch.rpmNperl-ODBM_File-1.16-481.el9.x86_64.rpm3perl-DBM_Filter-0.06-481.el9.noarch.rpmIaperl-sigtrap-1.09-481.el9.noarch.rpm54perl-User-pwent-1.03-481.el9.noarch.rpmXperl-File-Compare-1.100.600-481.el9.noarch.rpmHperl-GDBM_File-1.18-481.el9.x86_64.rpm"perl-File-Basename-2.85-481.el9.noarch.rpm%perl-Safe-2.41-481.el9.noarch.rpm&pperl-Search-Dict-1.07-481.el9.noarch.rpmperl-AutoLoader-5.74-481.el9.noarch.rpmJperl-sort-2.04-481.el9.noarch.rpm 5perl-Dumpvalue-2.27-481.el9.noarch.rpm(bperl-SelfLoader-1.26-481.el9.noarch.rpmW\perl-ph-5.32.1-481.el9.x86_64.rpm<\perl-doc-5.32.1-481.el9.noarch.rpmaperl-File-stat-1.09-481.el9.noarch.rpmUzperl-devel-5.32.1-481.el9.i686.rpm*sperl-Term-Complete-1.403-481.el9.noarch.rpm;tperl-diagnostics-1.37-481.el9.noarch.rpmaperl-ExtUtils-Miniperl-1.09-481.el9.noarch.rpmUzperl-devel-5.32.1-481.el9.x86_64.rpm>5perl-fields-2.27-481.el9.noarch.rpmE\perl-meta-notation-5.32.1-481.el9.noarch.rpmUperl-Benchmark-1.23-481.el9.noarch.rpmB)perl-Devel-Peek-1.28-481.el9.x86_64.rpmL\perl-utils-5.32.1-481.el9.noarch.rpm75perl-base-2.27-481.el9.noarch.rpm.,perl-Thread-3.05-481.el9.noarch.rpm@5perl-B-1.80-481.el9.x86_64.rpmVUperl-mro-1.23-481.el9.x86_64.rpmD,perl-Errno-1.30-481.el9.x86_64.rpm,sperl-Test-1.31-481.el9.noarch.rpmK4perl-subs-1.03-481.el9.noarch.rpmjperl-Config-Extensions-0.03-481.el9.noarch.rpmIperl-Hash-Util-0.23-481.el9.x86_64.rpm34perl-Time-1.03-481.el9.noarch.rpm!Mperl-NEXT-0.67-481.el9.noarch.rpm:2perl-deprecate-0.04-481.el9.noarch.rpmGsperl-overload-1.31-481.el9.noarch.rpmRUperl-Sys-Hostname-1.23-481.el9.x86_64.rpmwperl-Math-Complex-1.59-481.el9.noarch.rpmO2perl-Opcode-1.48-481.el9.x86_64.rpmJperl-I18N-LangTags-0.44-481.el9.noarch.rpm?zperl-5.32.1-481.el9.x86_64.rpm'`perl-SelectSaver-1.02-481.el9.noarch.rpmperl-File-Copy-2.34-481.el9.noarch.rpm0Aperl-Tie-4.6-481.el9.noarch.rpmuperl-FindBin-1.51-481.el9.noarch.rpm1operl-Tie-File-1.06-481.el9.noarch.rpmKperl-I18N-Langinfo-0.19-481.el9.x86_64.rpmF<perl-open-1.12-481.el9.noarch.rpmL0perl-IO-1.43-481.el9.x86_64.rpmNRperl-vmsish-1.04-481.el9.noarch.rpm4Nperl-Unicode-UCD-0.75-481.el9.noarch.rpm rperl-English-1.11-481.el9.noarch.rpmS-perl-Time-Piece-1.3401-481.el9.x86_64.rpm* \BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update.https://access.redhat.com/errata/RHSA-2024:2236RHSA-2024:2236RHSA-2024:2236 https://access.redhat.com/security/cve/CVE-2024-2496CVE-2024-2496CVE-2024-2496https://bugzilla.redhat.com/22696722269672https://errata.almalinux.org/9/ALSA-2024-2236.htmlALSA-2024:2236ALSA-2024:2236 9/libvirt-daemon-lock-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-daemon-driver-nodedev-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-daemon-driver-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-daemon-driver-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-rbd-10.0.0-6.el9_4.alma.1.x86_64.rpm:/libvirt-daemon-log-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-10.0.0-6.el9_4.alma.1.x86_64.rpm8/libvirt-daemon-common-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-daemon-driver-network-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-libs-10.0.0-6.el9_4.alma.1.x86_64.rpmI/libvirt-client-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpm;/libvirt-daemon-plugin-lockd-10.0.0-6.el9_4.alma.1.x86_64.rpm /libvirt-daemon-driver-secret-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-iscsi-10.0.0-6.el9_4.alma.1.x86_64.rpm/libvirt-daemon-driver-storage-mpath-10.0.0-6.el9_4.alma.1.x86_64.rpm 'esecurityModerate: mod_http2 security updatexhttps://access.redhat.com/errata/RHSA-2024:2368RHSA-2024:2368RHSA-2024:2368 https://access.redhat.com/security/cve/CVE-2023-43622CVE-2023-43622CVE-2023-43622https://access.redhat.com/security/cve/CVE-2023-45802CVE-2023-45802CVE-2023-45802https://bugzilla.redhat.com/22438772243877https://bugzilla.redhat.com/22451532245153https://errata.almalinux.org/9/ALSA-2024-2368.htmlALSA-2024:2368ALSA-2024:2368 S mod_http2-2.0.26-1.el9.x86_64.rpmS mod_http2-2.0.26-1.el9.x86_64.rpmZ? -hBBBsecurityModerate: zziplib security update{https://access.redhat.com/errata/RHSA-2024:2377RHSA-2024:2377RHSA-2024:2377 https://access.redhat.com/security/cve/CVE-2020-18770CVE-2020-18770CVE-2020-18770https://bugzilla.redhat.com/22469072246907https://errata.almalinux.org/9/ALSA-2024-2377.htmlALSA-2024:2377ALSA-2024:2377 |Mzziplib-utils-0.13.71-11.el9_4.x86_64.rpm;Mzziplib-0.13.71-11.el9_4.x86_64.rpm;Mzziplib-0.13.71-11.el9_4.i686.rpm|Mzziplib-utils-0.13.71-11.el9_4.x86_64.rpm;Mzziplib-0.13.71-11.el9_4.x86_64.rpm;Mzziplib-0.13.71-11.el9_4.i686.rpmz@ 2nBBsecurityModerate: mod_jk and mod_proxy_cluster security update _https://access.redhat.com/errata/RHSA-2024:2387RHSA-2024:2387RHSA-2024:2387 https://access.redhat.com/security/cve/CVE-2023-41081CVE-2023-41081CVE-2023-41081https://access.redhat.com/security/cve/CVE-2023-6710CVE-2023-6710CVE-2023-6710https://bugzilla.redhat.com/22388472238847https://bugzilla.redhat.com/22541282254128https://errata.almalinux.org/9/ALSA-2024-2387.htmlALSA-2024:2387ALSA-2024:2387 [*mod_proxy_cluster-1.3.20-1.el9_4.x86_64.rpmZ"mod_jk-1.2.49-1.el9_4.x86_64.rpm[*mod_proxy_cluster-1.3.20-1.el9_4.x86_64.rpmZ"mod_jk-1.2.49-1.el9_4.x86_64.rpm0A sBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement updateh%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394 https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394 https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671 '&rtla-5.14.0-427.13.1.el9_4.x86_64.rpm!&kernel-debug-devel-5.14.0-427.13.1.el9_4.x86_64.rpm"&kernel-debug-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm$&kernel-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm%&perf-5.14.0-427.13.1.el9_4.x86_64.rpm#&kernel-devel-5.14.0-427.13.1.el9_4.x86_64.rpm&kernel-doc-5.14.0-427.13.1.el9_4.noarch.rpm)&rv-5.14.0-427.13.1.el9_4.x86_64.rpm&&kernel-headers-5.14.0-427.13.1.el9_4.x86_64.rpm '&rtla-5.14.0-427.13.1.el9_4.x86_64.rpm!&kernel-debug-devel-5.14.0-427.13.1.el9_4.x86_64.rpm"&kernel-debug-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm$&kernel-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm%&perf-5.14.0-427.13.1.el9_4.x86_64.rpm#&kernel-devel-5.14.0-427.13.1.el9_4.x86_64.rpm&kernel-doc-5.14.0-427.13.1.el9_4.noarch.rpm)&rv-5.14.0-427.13.1.el9_4.x86_64.rpm&&kernel-headers-5.14.0-427.13.1.el9_4.x86_64.rpm"B EBBBBsecurityModerate: harfbuzz security update {https://access.redhat.com/errata/RHSA-2024:2410RHSA-2024:2410RHSA-2024:2410 https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://errata.almalinux.org/9/ALSA-2024-2410.htmlALSA-2024:2410ALSA-2024:2410 harfbuzz-icu-2.7.4-10.el9.x86_64.rpmharfbuzz-devel-2.7.4-10.el9.i686.rpmharfbuzz-devel-2.7.4-10.el9.x86_64.rpmharfbuzz-icu-2.7.4-10.el9.i686.rpmharfbuzz-icu-2.7.4-10.el9.x86_64.rpmharfbuzz-devel-2.7.4-10.el9.i686.rpmharfbuzz-devel-2.7.4-10.el9.x86_64.rpmharfbuzz-icu-2.7.4-10.el9.i686.rpmC LBBBsecurityModerate: avahi security updateO https://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433 https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433 _Ravahi-tools-0.8-20.el9.x86_64.rpmTRavahi-glib-0.8-20.el9.x86_64.rpmTRavahi-glib-0.8-20.el9.i686.rpm_Ravahi-tools-0.8-20.el9.x86_64.rpmTRavahi-glib-0.8-20.el9.x86_64.rpmTRavahi-glib-0.8-20.el9.i686.rpm D RBBBsecurityModerate: pam security updateWOhttps://access.redhat.com/errata/RHSA-2024:2438RHSA-2024:2438RHSA-2024:2438 https://access.redhat.com/security/cve/CVE-2024-22365CVE-2024-22365CVE-2024-22365https://bugzilla.redhat.com/22577222257722https://errata.almalinux.org/9/ALSA-2024-2438.htmlALSA-2024:2438ALSA-2024:2438 CXpam-docs-1.5.1-19.el9.x86_64.rpm1Xpam-devel-1.5.1-19.el9.i686.rpm1Xpam-devel-1.5.1-19.el9.x86_64.rpmCXpam-docs-1.5.1-19.el9.x86_64.rpm1Xpam-devel-1.5.1-19.el9.i686.rpm1Xpam-devel-1.5.1-19.el9.x86_64.rpmE XBBBsecurityLow: openssl and openssl-fips-provider security update*&/https://access.redhat.com/errata/RHSA-2024:2447RHSA-2024:2447RHSA-2024:2447 https://access.redhat.com/security/cve/CVE-2023-2975CVE-2023-2975CVE-2023-2975https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-3817CVE-2023-3817CVE-2023-3817https://access.redhat.com/security/cve/CVE-2023-5678CVE-2023-5678CVE-2023-5678https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://bugzilla.redhat.com/22230162223016https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22278522227852https://bugzilla.redhat.com/22486162248616https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://errata.almalinux.org/9/ALSA-2024-2447.htmlALSA-2024:2447ALSA-2024:2447 Jbopenssl-perl-3.0.7-27.el9.x86_64.rpm bopenssl-devel-3.0.7-27.el9.x86_64.rpm bopenssl-devel-3.0.7-27.el9.i686.rpmJbopenssl-perl-3.0.7-27.el9.x86_64.rpm bopenssl-devel-3.0.7-27.el9.x86_64.rpm bopenssl-devel-3.0.7-27.el9.i686.rpmF #^BBBsecurityModerate: systemd security updateUhttps://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463 https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463 3usystemd-journal-remote-252-32.el9_4.alma.1.x86_64.rpmousystemd-devel-252-32.el9_4.alma.1.i686.rpmousystemd-devel-252-32.el9_4.alma.1.x86_64.rpm3usystemd-journal-remote-252-32.el9_4.alma.1.x86_64.rpmousystemd-devel-252-32.el9_4.alma.1.i686.rpmousystemd-devel-252-32.el9_4.alma.1.x86_64.rpmG 'dBsecurityLow: libssh security update*Vhttps://access.redhat.com/errata/RHSA-2024:2504RHSA-2024:2504RHSA-2024:2504 https://access.redhat.com/security/cve/CVE-2023-6004CVE-2023-6004CVE-2023-6004https://access.redhat.com/security/cve/CVE-2023-6918CVE-2023-6918CVE-2023-6918https://bugzilla.redhat.com/22511102251110https://bugzilla.redhat.com/22549972254997https://errata.almalinux.org/9/ALSA-2024-2504.htmlALSA-2024:2504ALSA-2024:2504 0libssh-devel-0.10.4-13.el9.i686.rpm0libssh-devel-0.10.4-13.el9.x86_64.rpm0libssh-devel-0.10.4-13.el9.i686.rpm0libssh-devel-0.10.4-13.el9.x86_64.rpmH )(securityLow: file security update*^Bhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512 https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512 [Npython3-file-magic-5.39-16.el9.noarch.rpm[Npython3-file-magic-5.39-16.el9.noarch.rpmI 3jBBBBBBBsecurityModerate: podman security and bug fix update ^https://access.redhat.com/errata/RHSA-2024:2548RHSA-2024:2548RHSA-2024:2548 https://access.redhat.com/security/cve/CVE-2024-1753CVE-2024-1753CVE-2024-1753https://access.redhat.com/security/cve/CVE-2024-24786CVE-2024-24786CVE-2024-24786https://bugzilla.redhat.com/22655132265513https://bugzilla.redhat.com/22680462268046https://errata.almalinux.org/9/ALSA-2024-2548.htmlALSA-2024:2548ALSA-2024:2548 2Kpodman-4.9.4-3.el9_4.x86_64.rpm3Kpodman-plugins-4.9.4-3.el9_4.x86_64.rpm5Kpodman-tests-4.9.4-3.el9_4.x86_64.rpmgKpodman-docker-4.9.4-3.el9_4.noarch.rpm4Kpodman-remote-4.9.4-3.el9_4.x86_64.rpm2Kpodman-4.9.4-3.el9_4.x86_64.rpm3Kpodman-plugins-4.9.4-3.el9_4.x86_64.rpm5Kpodman-tests-4.9.4-3.el9_4.x86_64.rpmgKpodman-docker-4.9.4-3.el9_4.noarch.rpm4Kpodman-remote-4.9.4-3.el9_4.x86_64.rpm J 8tBBsecurityModerate: skopeo security and bug fix update~1https://access.redhat.com/errata/RHSA-2024:2549RHSA-2024:2549RHSA-2024:2549 https://access.redhat.com/security/cve/CVE-2024-24786CVE-2024-24786CVE-2024-24786https://access.redhat.com/security/cve/CVE-2024-28180CVE-2024-28180CVE-2024-28180https://bugzilla.redhat.com/22680462268046https://bugzilla.redhat.com/22688542268854https://errata.almalinux.org/9/ALSA-2024-2549.htmlALSA-2024:2549ALSA-2024:2549 8)skopeo-1.14.3-2.el9_4.x86_64.rpm9)skopeo-tests-1.14.3-2.el9_4.x86_64.rpm8)skopeo-1.14.3-2.el9_4.x86_64.rpm9)skopeo-tests-1.14.3-2.el9_4.x86_64.rpm<K =yBBsecurityModerate: buildah bug fix update/Ohttps://access.redhat.com/errata/RHSA-2024:2550RHSA-2024:2550RHSA-2024:2550 https://access.redhat.com/security/cve/CVE-2024-24786CVE-2024-24786CVE-2024-24786https://bugzilla.redhat.com/22680462268046https://errata.almalinux.org/9/ALSA-2024-2550.htmlALSA-2024:2550ALSA-2024:2550 93buildah-tests-1.33.7-1.el9_4.x86_64.rpm83buildah-1.33.7-1.el9_4.x86_64.rpm93buildah-tests-1.33.7-1.el9_4.x86_64.rpm83buildah-1.33.7-1.el9_4.x86_64.rpm<L ~BBBBBBBBBBBBBsecurityImportant: bind security update~https://access.redhat.com/errata/RHSA-2024:2551RHSA-2024:2551RHSA-2024:2551 https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-2551.htmlALSA-2024:2551ALSA-2024:2551 `Jbind-dyndb-ldap-11.9-9.el9_4.alma.1.x86_64.rpm[Ibind-dnssec-utils-9.16.23-18.el9_4.1.x86_64.rpmZIbind-chroot-9.16.23-18.el9_4.1.x86_64.rpm7Ipython3-bind-9.16.23-18.el9_4.1.noarch.rpm+Ibind-license-9.16.23-18.el9_4.1.noarch.rpmYIbind-9.16.23-18.el9_4.1.x86_64.rpm]Ibind-utils-9.16.23-18.el9_4.1.x86_64.rpm*Ibind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpm\Ibind-libs-9.16.23-18.el9_4.1.x86_64.rpm `Jbind-dyndb-ldap-11.9-9.el9_4.alma.1.x86_64.rpm[Ibind-dnssec-utils-9.16.23-18.el9_4.1.x86_64.rpmZIbind-chroot-9.16.23-18.el9_4.1.x86_64.rpm7Ipython3-bind-9.16.23-18.el9_4.1.noarch.rpm+Ibind-license-9.16.23-18.el9_4.1.noarch.rpmYIbind-9.16.23-18.el9_4.1.x86_64.rpm]Ibind-utils-9.16.23-18.el9_4.1.x86_64.rpm*Ibind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpm\Ibind-libs-9.16.23-18.el9_4.1.x86_64.rpm=M securityModerate: python-jwcrypto security update https://access.redhat.com/errata/RHSA-2024:2559RHSA-2024:2559RHSA-2024:2559 https://access.redhat.com/security/cve/CVE-2024-28102CVE-2024-28102CVE-2024-28102https://bugzilla.redhat.com/22687582268758https://errata.almalinux.org/9/ALSA-2024-2559.htmlALSA-2024:2559ALSA-2024:2559 fOpython3-jwcrypto-0.8-5.el9_4.noarch.rpmfOpython3-jwcrypto-0.8-5.el9_4.noarch.rpm N PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security and bug fix update 2https://access.redhat.com/errata/RHSA-2024:2560RHSA-2024:2560RHSA-2024:2560 https://access.redhat.com/security/cve/CVE-2024-1441CVE-2024-1441CVE-2024-1441https://access.redhat.com/security/cve/CVE-2024-2494CVE-2024-2494CVE-2024-2494https://bugzilla.redhat.com/22638412263841https://bugzilla.redhat.com/22701152270115https://errata.almalinux.org/9/ALSA-2024-2560.htmlALSA-2024:2560ALSA-2024:2560  -libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.alma.1.x86_64.rpm8-libvirt-daemon-common-10.0.0-6.2.el9_4.alma.1.x86_64.rpm9-libvirt-daemon-lock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm -libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-libs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-nss-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.alma.1.x86_64.rpm -libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpm -libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm;-libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-client-10.0.0-6.2.el9_4.alma.1.x86_64.rpm:-libvirt-daemon-log-10.0.0-6.2.el9_4.alma.1.x86_64.rpm -libvirt-daemon-driver-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.alma.1.x86_64.rpmI-libvirt-client-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-kvm-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.alma.1.x86_64.rpm<-libvirt-daemon-proxy-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-config-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.alma.1.x86_64.rpm -libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.alma.1.x86_64.rpm8-libvirt-daemon-common-10.0.0-6.2.el9_4.alma.1.x86_64.rpm9-libvirt-daemon-lock-10.0.0-6.2.el9_4.alma.1.x86_64.rpm -libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-libs-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-nss-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.alma.1.x86_64.rpm -libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpm -libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm;-libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-client-10.0.0-6.2.el9_4.alma.1.x86_64.rpm:-libvirt-daemon-log-10.0.0-6.2.el9_4.alma.1.x86_64.rpm -libvirt-daemon-driver-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.alma.1.x86_64.rpmI-libvirt-client-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-kvm-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.alma.1.x86_64.rpm<-libvirt-daemon-proxy-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-config-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.alma.1.x86_64.rpm-libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.alma.1.x86_64.rpmKO IBBBBBBBBsecurityImportant: golang security update>Xhttps://access.redhat.com/errata/RHSA-2024:2562RHSA-2024:2562RHSA-2024:2562 https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://access.redhat.com/security/cve/CVE-2023-45289CVE-2023-45289CVE-2023-45289https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://access.redhat.com/security/cve/CVE-2024-24784CVE-2024-24784CVE-2024-24784https://access.redhat.com/security/cve/CVE-2024-24785CVE-2024-24785CVE-2024-24785https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680182268018https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22680212268021https://bugzilla.redhat.com/22680222268022https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-2562.htmlALSA-2024:2562ALSA-2024:2562 @tgolang-bin-1.21.9-2.el9_4.x86_64.rpmntgo-toolset-1.21.9-2.el9_4.x86_64.rpmtgolang-misc-1.21.9-2.el9_4.noarch.rpmtgolang-tests-1.21.9-2.el9_4.noarch.rpmtgolang-src-1.21.9-2.el9_4.noarch.rpm?tgolang-1.21.9-2.el9_4.x86_64.rpmtgolang-docs-1.21.9-2.el9_4.noarch.rpm@tgolang-bin-1.21.9-2.el9_4.x86_64.rpmntgo-toolset-1.21.9-2.el9_4.x86_64.rpmtgolang-misc-1.21.9-2.el9_4.noarch.rpmtgolang-tests-1.21.9-2.el9_4.noarch.rpmtgolang-src-1.21.9-2.el9_4.noarch.rpm?tgolang-1.21.9-2.el9_4.x86_64.rpmtgolang-docs-1.21.9-2.el9_4.noarch.rpm?P TsecurityModerate: mod_http2 security updatehttps://access.redhat.com/errata/RHSA-2024:2564RHSA-2024:2564RHSA-2024:2564 https://access.redhat.com/security/cve/CVE-2024-27316CVE-2024-27316CVE-2024-27316https://bugzilla.redhat.com/22682772268277https://errata.almalinux.org/9/ALSA-2024-2564.htmlALSA-2024:2564ALSA-2024:2564 S mod_http2-2.0.26-2.el9_4.x86_64.rpmS mod_http2-2.0.26-2.el9_4.x86_64.rpmQ WsecurityModerate: libreswan security updateNhttps://access.redhat.com/errata/RHSA-2024:2565RHSA-2024:2565RHSA-2024:2565 https://access.redhat.com/security/cve/CVE-2024-2357CVE-2024-2357CVE-2024-2357https://bugzilla.redhat.com/22689522268952https://errata.almalinux.org/9/ALSA-2024-2565.htmlALSA-2024:2565ALSA-2024:2565 RWlibreswan-4.12-2.el9_4.alma.1.x86_64.rpmRWlibreswan-4.12-2.el9_4.alma.1.x86_64.rpmR -ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: pcp security, bug fix, and enhancement updateeMhttps://access.redhat.com/errata/RHSA-2024:2566RHSA-2024:2566RHSA-2024:2566 https://access.redhat.com/security/cve/CVE-2024-3019CVE-2024-3019CVE-2024-3019https://bugzilla.redhat.com/22718982271898https://errata.almalinux.org/9/ALSA-2024-2566.htmlALSA-2024:2566ALSA-2024:2566 lUpcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpm"pcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpm]pcp-devel-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpm~pcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpmTpcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpmYpcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpmzpcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpm_pcp-libs-devel-6.2.0-2.el9_4.i686.rpmcpcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpmVpcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpmxpcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpm,perl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpm$pcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-news-6.2.0-2.el9_4.x86_64.rpm{pcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpmipcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpmmpcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpm^pcp-libs-6.2.0-2.el9_4.i686.rpm+perl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpmdpcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpm]pcp-devel-6.2.0-2.el9_4.i686.rpmppcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpmnpcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpm(pcp-selinux-6.2.0-2.el9_4.x86_64.rpm^pcp-libs-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpm}pcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpmqpcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpmwpcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm1python3-pcp-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpmtpcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpmfpcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpm!pcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpm%pcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpm)pcp-system-tools-6.2.0-2.el9_4.x86_64.rpm`pcp-testsuite-6.2.0-2.el9_4.i686.rpmZpcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpm\pcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpmjpcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpmXpcp-gui-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-named-6.2.0-2.el9_4.x86_64.rpm.perl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpmrpcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpmvpcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpmspcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpmhpcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpmgpcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpmbpcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpmapcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpmlpcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpmMpcp-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpmSpcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpm#pcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpm^pcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpm*pcp-zeroconf-6.2.0-2.el9_4.x86_64.rpm_pcp-libs-devel-6.2.0-2.el9_4.x86_64.rpmQpcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpm_pcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpmepcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpmypcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpmkpcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpmNpcp-conf-6.2.0-2.el9_4.x86_64.rpmRpcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpmopcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpm]pcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpmWpcp-geolocate-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpm`pcp-testsuite-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpmOpcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpm|pcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpmDpcp-doc-6.2.0-2.el9_4.noarch.rpm`pcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpm&pcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpm-perl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpm'pcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpmPpcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpmupcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpm[pcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpmlUpcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpm"pcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpm]pcp-devel-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpm~pcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpmTpcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpmYpcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpmzpcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpm_pcp-libs-devel-6.2.0-2.el9_4.i686.rpmcpcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpmVpcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpmxpcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpm,perl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpm$pcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-news-6.2.0-2.el9_4.x86_64.rpm{pcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpmipcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpmmpcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpm^pcp-libs-6.2.0-2.el9_4.i686.rpm+perl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpmdpcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpm]pcp-devel-6.2.0-2.el9_4.i686.rpmppcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpmnpcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpm(pcp-selinux-6.2.0-2.el9_4.x86_64.rpm^pcp-libs-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpm}pcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpmqpcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpmwpcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm1python3-pcp-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpmtpcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpmfpcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpm!pcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpm%pcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpm)pcp-system-tools-6.2.0-2.el9_4.x86_64.rpm`pcp-testsuite-6.2.0-2.el9_4.i686.rpmZpcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpm\pcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpmjpcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpmXpcp-gui-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-named-6.2.0-2.el9_4.x86_64.rpm.perl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpmrpcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpmvpcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpmspcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpmhpcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpmgpcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpmbpcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpmapcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpmlpcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpmMpcp-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpmSpcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpm#pcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpm^pcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpm*pcp-zeroconf-6.2.0-2.el9_4.x86_64.rpm_pcp-libs-devel-6.2.0-2.el9_4.x86_64.rpmQpcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpm_pcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpmepcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpmypcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpmkpcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpmNpcp-conf-6.2.0-2.el9_4.x86_64.rpmRpcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpmopcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpm]pcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpmWpcp-geolocate-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpm`pcp-testsuite-6.2.0-2.el9_4.x86_64.rpm pcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpmOpcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpm|pcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpmDpcp-doc-6.2.0-2.el9_4.noarch.rpm`pcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpm&pcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpm-perl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpm'pcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpmPpcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpmpcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpmupcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpm[pcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpmS 2nBBsecurityModerate: grafana security update2jhttps://access.redhat.com/errata/RHSA-2024:2568RHSA-2024:2568RHSA-2024:2568 https://access.redhat.com/security/cve/CVE-2024-1313CVE-2024-1313CVE-2024-1313https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/22719032271903https://errata.almalinux.org/9/ALSA-2024-2568.htmlALSA-2024:2568ALSA-2024:2568 o[grafana-9.2.10-16.el9_4.alma.1.x86_64.rpm[grafana-selinux-9.2.10-16.el9_4.alma.1.x86_64.rpmo[grafana-9.2.10-16.el9_4.alma.1.x86_64.rpm[grafana-selinux-9.2.10-16.el9_4.alma.1.x86_64.rpmAT 5ssecurityImportant: grafana-pcp security updatexhttps://access.redhat.com/errata/RHSA-2024:2569RHSA-2024:2569RHSA-2024:2569 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-2569.htmlALSA-2024:2569ALSA-2024:2569 }lgrafana-pcp-5.1.1-2.el9_4.alma.1.x86_64.rpm}lgrafana-pcp-5.1.1-2.el9_4.alma.1.x86_64.rpmU vBBBBBBBBBsecurityModerate: gnutls security updatehttps://access.redhat.com/errata/RHSA-2024:2570RHSA-2024:2570RHSA-2024:2570 https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-2570.htmlALSA-2024:2570ALSA-2024:2570 |`gnutls-utils-3.8.3-4.el9_4.x86_64.rpm`gnutls-devel-3.8.3-4.el9_4.x86_64.rpm`gnutls-c++-3.8.3-4.el9_4.i686.rpm`gnutls-devel-3.8.3-4.el9_4.i686.rpm`gnutls-c++-3.8.3-4.el9_4.x86_64.rpm`gnutls-dane-3.8.3-4.el9_4.x86_64.rpm`gnutls-dane-3.8.3-4.el9_4.i686.rpm|`gnutls-utils-3.8.3-4.el9_4.x86_64.rpm`gnutls-devel-3.8.3-4.el9_4.x86_64.rpm`gnutls-c++-3.8.3-4.el9_4.i686.rpm`gnutls-devel-3.8.3-4.el9_4.i686.rpm`gnutls-c++-3.8.3-4.el9_4.x86_64.rpm`gnutls-dane-3.8.3-4.el9_4.x86_64.rpm`gnutls-dane-3.8.3-4.el9_4.i686.rpmKV BsecurityModerate: sssd security and bug fix update%Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571 https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571 v%sssd-idp-2.9.4-6.el9_4.x86_64.rpmv%sssd-idp-2.9.4-6.el9_4.x86_64.rpmW EBBBBBBBBBsecurityImportant: tigervnc security updatemhttps://access.redhat.com/errata/RHSA-2024:2616RHSA-2024:2616RHSA-2024:2616 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-2616.htmlALSA-2024:2616ALSA-2024:2616 LUtigervnc-server-1.13.1-8.el9_4.3.x86_64.rpmKUtigervnc-1.13.1-8.el9_4.3.x86_64.rpm%Utigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm$Utigervnc-license-1.13.1-8.el9_4.3.noarch.rpm#Utigervnc-icons-1.13.1-8.el9_4.3.noarch.rpmMUtigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpmNUtigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpmLUtigervnc-server-1.13.1-8.el9_4.3.x86_64.rpmKUtigervnc-1.13.1-8.el9_4.3.x86_64.rpm%Utigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm$Utigervnc-license-1.13.1-8.el9_4.3.noarch.rpm#Utigervnc-icons-1.13.1-8.el9_4.3.noarch.rpmMUtigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpmNUtigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpm7X QBsecurityModerate: libxml2 security updatesnhttps://access.redhat.com/errata/RHSA-2024:2679RHSA-2024:2679RHSA-2024:2679 https://access.redhat.com/security/cve/CVE-2024-25062CVE-2024-25062CVE-2024-25062https://bugzilla.redhat.com/22627262262726https://errata.almalinux.org/9/ALSA-2024-2679.htmlALSA-2024:2679ALSA-2024:2679 6Slibxml2-devel-2.9.13-6.el9_4.i686.rpm6Slibxml2-devel-2.9.13-6.el9_4.x86_64.rpm6Slibxml2-devel-2.9.13-6.el9_4.i686.rpm6Slibxml2-devel-2.9.13-6.el9_4.x86_64.rpmjY UsecurityImportant: git-lfs security updatea( https://access.redhat.com/errata/RHSA-2024:2724RHSA-2024:2724RHSA-2024:2724 https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://access.redhat.com/security/cve/CVE-2023-45289CVE-2023-45289CVE-2023-45289https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680182268018https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-2724.htmlALSA-2024:2724ALSA-2024:2724 ?Cgit-lfs-3.4.1-2.el9_4.x86_64.rpm?Cgit-lfs-3.4.1-2.el9_4.x86_64.rpmiZ )XBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update &https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758 https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758 https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743 %'perf-5.14.0-427.16.1.el9_4.x86_64.rpm'kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm!'kernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm#'kernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm$'kernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm)'rv-5.14.0-427.16.1.el9_4.x86_64.rpm"'kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm''rtla-5.14.0-427.16.1.el9_4.x86_64.rpm&'kernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpm %'perf-5.14.0-427.16.1.el9_4.x86_64.rpm'kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm!'kernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm#'kernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm$'kernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm)'rv-5.14.0-427.16.1.el9_4.x86_64.rpm"'kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm''rtla-5.14.0-427.16.1.el9_4.x86_64.rpm&'kernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpmp[ 3uBFpBBBBBBBsecurityImportant: nodejs:18 security update/P https://access.redhat.com/errata/RHSA-2024:2779RHSA-2024:2779RHSA-2024:2779 https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2779.htmlALSA-2024:2779ALSA-2024:2779 94m(dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm:aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpmdotnet-host-8.0.5-1.el9_4.x86_64.rpm+pdotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm Hpdotnet-templates-8.0-8.0.105-1.el9_4.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpmBdotnet-runtime-8.0-8.0.5-1.el9_4.x86_64.rpmDpdotnet-sdk-8.0-8.0.105-1.el9_4.x86_64.rpm@dotnet-hostfxr-8.0-8.0.5-1.el9_4.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpmpnetstandard-targeting-pack-2.1-8.0.105-1.el9_4.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm:aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpmdotnet-host-8.0.5-1.el9_4.x86_64.rpm+pdotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpmK] OBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security update!#https://access.redhat.com/errata/RHSA-2024:2843RHSA-2024:2843RHSA-2024:2843 https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2843.htmlALSA-2024:2843ALSA-2024:2843 ;aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm9aspnetcore-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmCXdotnet-sdk-7.0-7.0.119-1.el9_4.x86_64.rpmAdotnet-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmGXdotnet-templates-7.0-7.0.119-1.el9_4.x86_64.rpm?dotnet-hostfxr-7.0-7.0.19-1.el9_4.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.19-1.el9_4.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm;aspnetcore-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpm9aspnetcore-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmCXdotnet-sdk-7.0-7.0.119-1.el9_4.x86_64.rpmAdotnet-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmGXdotnet-templates-7.0-7.0.119-1.el9_4.x86_64.rpm?dotnet-hostfxr-7.0-7.0.19-1.el9_4.x86_64.rpm=dotnet-apphost-pack-7.0-7.0.19-1.el9_4.x86_64.rpmEdotnet-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpmo^ )ABPPBBBBBBBsecurityImportant: nodejs:20 security updateDO https://access.redhat.com/errata/RHSA-2024:2853RHSA-2024:2853RHSA-2024:2853 https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2853.htmlALSA-2024:2853ALSA-2024:2853 9n(NJnodejs-docs-20.12.2-2.module_el9.4.0+100+71fc9528.noarch.rpm9Jnodejs-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpmWnodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpmnodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmnodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm{tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm={tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm:{tomcat-9.0.87-1.el9_4.1.noarch.rpmA{tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm;{tomcat-admin-webapps-9.0.87-1.el9_4.1.noarch.rpm?{tomcat-lib-9.0.87-1.el9_4.1.noarch.rpm@{tomcat-servlet-4.0-api-9.0.87-1.el9_4.1.noarch.rpm<{tomcat-docs-webapp-9.0.87-1.el9_4.1.noarch.rpm>{tomcat-jsp-2.3-api-9.0.87-1.el9_4.1.noarch.rpm={tomcat-el-3.0-api-9.0.87-1.el9_4.1.noarch.rpm:{tomcat-9.0.87-1.el9_4.1.noarch.rpmA{tomcat-webapps-9.0.87-1.el9_4.1.noarch.rpm d "XBBBBBBBBsecurityImportant: glibc security update> https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339 https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339 5glibc-devel-2.34-100.el9_4.2.i686.rpmI5glibc-utils-2.34-100.el9_4.2.x86_64.rpm5glibc-devel-2.34-100.el9_4.2.x86_64.rpmC5glibc-doc-2.34-100.el9_4.2.noarch.rpmH5glibc-locale-source-2.34-100.el9_4.2.x86_64.rpmG5glibc-headers-2.34-100.el9_4.2.x86_64.rpm5glibc-devel-2.34-100.el9_4.2.i686.rpmI5glibc-utils-2.34-100.el9_4.2.x86_64.rpm5glibc-devel-2.34-100.el9_4.2.x86_64.rpmC5glibc-doc-2.34-100.el9_4.2.noarch.rpmH5glibc-locale-source-2.34-100.el9_4.2.x86_64.rpmG5glibc-headers-2.34-100.el9_4.2.x86_64.rpm|e 4cBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix updateNbhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619 https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619 &)kernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm')rtla-5.14.0-427.20.1.el9_4.x86_64.rpm))rv-5.14.0-427.20.1.el9_4.x86_64.rpm#)kernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm")kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm)kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm!)kernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm$)kernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm%)perf-5.14.0-427.20.1.el9_4.x86_64.rpm &)kernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm')rtla-5.14.0-427.20.1.el9_4.x86_64.rpm))rv-5.14.0-427.20.1.el9_4.x86_64.rpm#)kernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm")kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm)kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm!)kernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm$)kernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm%)perf-5.14.0-427.20.1.el9_4.x86_64.rpmLf ]BBBBBTBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.1 security, bug fix, and enhancement update0/https://access.redhat.com/errata/RHSA-2024:3668RHSA-2024:3668RHSA-2024:3668 https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3668.htmlALSA-2024:3668ALSA-2024:3668 o((<rubygem-test-unit-3.5.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm)@rubygem-typeprof-0.21.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm$}rubygem-rake-13.0.6-144.module_el9.4.0+101+d58a8d95.noarch.rpm<ruby-default-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmi2rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmSrubygem-psych-4.0.4-144.module_el9.4.0+101+d58a8d95.x86_64.rpmk#rubygem-rbs-2.7.0-144.module_el9.4.0+101+d58a8d95.x86_64.rpm rubygem-bundler-2.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm"Irubygem-minitest-5.15.0-144.module_el9.4.0+101+d58a8d95.noarch.rpm#rubygem-power_assert-2.0.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm%Trubygem-rdoc-6.4.1.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm<ruby-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpmrubygem-io-console-0.5.11-144.module_el9.4.0+101+d58a8d95.x86_64.rpm* rubygems-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm]<ruby-doc-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmt<ruby-devel-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm':rubygem-rss-0.2.9-144.module_el9.4.0+101+d58a8d95.noarch.rpm,4rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpmu<ruby-libs-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm&0rubygem-rexml-3.2.5-144.module_el9.4.0+101+d58a8d95.noarch.rpm;rubygem-bigdecimal-3.1.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpm!qrubygem-irb-1.4.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm*2rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm"rubygem-json-2.6.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpmc<ruby-bundled-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm+ rubygems-devel-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm+4rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpmo((<rubygem-test-unit-3.5.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm)@rubygem-typeprof-0.21.3-144.module_el9.4.0+101+d58a8d95.noarch.rpm$}rubygem-rake-13.0.6-144.module_el9.4.0+101+d58a8d95.noarch.rpm<ruby-default-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmi2rubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmSrubygem-psych-4.0.4-144.module_el9.4.0+101+d58a8d95.x86_64.rpmk#rubygem-rbs-2.7.0-144.module_el9.4.0+101+d58a8d95.x86_64.rpm rubygem-bundler-2.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm"Irubygem-minitest-5.15.0-144.module_el9.4.0+101+d58a8d95.noarch.rpm#rubygem-power_assert-2.0.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm%Trubygem-rdoc-6.4.1.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm<ruby-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpmrubygem-io-console-0.5.11-144.module_el9.4.0+101+d58a8d95.x86_64.rpm* rubygems-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm]<ruby-doc-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmt<ruby-devel-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm':rubygem-rss-0.2.9-144.module_el9.4.0+101+d58a8d95.noarch.rpm,4rubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpmu<ruby-libs-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm&0rubygem-rexml-3.2.5-144.module_el9.4.0+101+d58a8d95.noarch.rpm;rubygem-bigdecimal-3.1.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpm!qrubygem-irb-1.4.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm*2rubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpm"rubygem-json-2.6.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpmc<ruby-bundled-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpm+ rubygems-devel-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpm+4rubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm^g CBBNBE@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.3 security, bug fix, and enhancement update_/https://access.redhat.com/errata/RHSA-2024:3671RHSA-2024:3671RHSA-2024:3671 https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3671.htmlALSA-2024:3671ALSA-2024:3671  p(&grubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.x86_64.rpm+rubygems-devel-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm*Prubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpmcNruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm !rubygem-bundler-2.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm'Frubygem-rss-0.3.0-2.module_el9.4.0+102+68a93853.noarch.rpm,;rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpmq*rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.x86_64.rpmk^rubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.x86_64.rpmIrubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpmq*rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.i686.rpmtNruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm%Vrubygem-rdoc-6.6.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmNruby-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm$rubygem-rake-13.1.0-2.module_el9.4.0+102+68a93853.noarch.rpmrubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpmiPrubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpm(>rubygem-test-unit-3.6.1-2.module_el9.4.0+102+68a93853.noarch.rpmtNruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm&5rubygem-rexml-3.2.6-2.module_el9.4.0+102+68a93853.noarch.rpm+;rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm!Yrubygem-irb-1.11.0-2.module_el9.4.0+102+68a93853.noarch.rpm]Nruby-doc-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmNruby-default-gems-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmcNruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmuNruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmIrubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.i686.rpm# rubygem-power_assert-2.0.3-2.module_el9.4.0+102+68a93853.noarch.rpmZrubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.i686.rpmuNruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm)Brubygem-typeprof-0.21.9-2.module_el9.4.0+102+68a93853.noarch.rpmk^rubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.i686.rpmgrubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.i686.rpmrubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.i686.rpm*rubygems-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpmNruby-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm"Krubygem-minitest-5.20.0-2.module_el9.4.0+102+68a93853.noarch.rpmZrubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.x86_64.rpm p(&grubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.x86_64.rpm+rubygems-devel-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm*Prubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpmcNruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm !rubygem-bundler-2.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm'Frubygem-rss-0.3.0-2.module_el9.4.0+102+68a93853.noarch.rpm,;rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpmq*rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.x86_64.rpmk^rubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.x86_64.rpmIrubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpmq*rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.i686.rpmtNruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm%Vrubygem-rdoc-6.6.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmNruby-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm$rubygem-rake-13.1.0-2.module_el9.4.0+102+68a93853.noarch.rpmrubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpmiPrubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpm(>rubygem-test-unit-3.6.1-2.module_el9.4.0+102+68a93853.noarch.rpmtNruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm&5rubygem-rexml-3.2.6-2.module_el9.4.0+102+68a93853.noarch.rpm+;rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm!Yrubygem-irb-1.11.0-2.module_el9.4.0+102+68a93853.noarch.rpm]Nruby-doc-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmNruby-default-gems-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmcNruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmuNruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmIrubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.i686.rpm# rubygem-power_assert-2.0.3-2.module_el9.4.0+102+68a93853.noarch.rpmZrubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.i686.rpmuNruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpm)Brubygem-typeprof-0.21.9-2.module_el9.4.0+102+68a93853.noarch.rpmk^rubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.i686.rpmgrubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.i686.rpmrubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.i686.rpm*rubygems-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpmNruby-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpm"Krubygem-minitest-5.20.0-2.module_el9.4.0+102+68a93853.noarch.rpmZrubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.x86_64.rpmfh CBBBBBBBBBBBBBBBBsecurityImportant: ipa security updatewhttps://access.redhat.com/errata/RHSA-2024:3754RHSA-2024:3754RHSA-2024:3754 https://access.redhat.com/security/cve/CVE-2024-2698CVE-2024-2698CVE-2024-2698https://access.redhat.com/security/cve/CVE-2024-3183CVE-2024-3183CVE-2024-3183https://bugzilla.redhat.com/22703532270353https://bugzilla.redhat.com/22706852270685https://errata.almalinux.org/9/ALSA-2024-3754.htmlALSA-2024:3754ALSA-2024:3754 ~0ipa-client-4.11.0-15.el9_4.alma.1.x86_64.rpm0ipa-server-trust-ad-4.11.0-15.el9_4.alma.1.x86_64.rpm0python3-ipaserver-4.11.0-15.el9_4.alma.1.noarch.rpm0python3-ipalib-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-server-4.11.0-15.el9_4.alma.1.x86_64.rpm0ipa-server-common-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-client-common-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-client-samba-4.11.0-15.el9_4.alma.1.x86_64.rpm0ipa-server-dns-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-selinux-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-client-epn-4.11.0-15.el9_4.alma.1.x86_64.rpm0python3-ipaclient-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-common-4.11.0-15.el9_4.alma.1.noarch.rpm ~0ipa-client-4.11.0-15.el9_4.alma.1.x86_64.rpm0ipa-server-trust-ad-4.11.0-15.el9_4.alma.1.x86_64.rpm0python3-ipaserver-4.11.0-15.el9_4.alma.1.noarch.rpm0python3-ipalib-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-server-4.11.0-15.el9_4.alma.1.x86_64.rpm0ipa-server-common-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-client-common-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-client-samba-4.11.0-15.el9_4.alma.1.x86_64.rpm0ipa-server-dns-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-selinux-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-client-epn-4.11.0-15.el9_4.alma.1.x86_64.rpm0python3-ipaclient-4.11.0-15.el9_4.alma.1.noarch.rpm0ipa-common-4.11.0-15.el9_4.alma.1.noarch.rpmѧ|i ,VBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security update3https://access.redhat.com/errata/RHSA-2024:3820RHSA-2024:3820RHSA-2024:3820 https://access.redhat.com/security/cve/CVE-2024-34064CVE-2024-34064CVE-2024-34064https://bugzilla.redhat.com/22794762279476https://errata.almalinux.org/9/ALSA-2024-3820.htmlALSA-2024:3820ALSA-2024:3820 afence-virt-4.10.0-62.el9_4.3.x86_64.rpm-fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm.fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm`fence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpmcfence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpmdfence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpmefence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpmffence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm/fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpmgfence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpmbfence-virtd-4.10.0-62.el9_4.3.x86_64.rpm,fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm_fence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm afence-virt-4.10.0-62.el9_4.3.x86_64.rpm-fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm.fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm`fence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpmcfence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpmdfence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpmefence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpmffence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm/fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpmgfence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpmbfence-virtd-4.10.0-62.el9_4.3.x86_64.rpm,fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm_fence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm)j 2mBBBsecurityModerate: rpm-ostree security update8https://access.redhat.com/errata/RHSA-2024:3823RHSA-2024:3823RHSA-2024:3823 https://access.redhat.com/security/cve/CVE-2024-2905CVE-2024-2905CVE-2024-2905https://bugzilla.redhat.com/22715852271585https://errata.almalinux.org/9/ALSA-2024-3823.htmlALSA-2024:3823ALSA-2024:3823 :qrpm-ostree-libs-2024.3-3.el9_4.x86_64.rpm:qrpm-ostree-libs-2024.3-3.el9_4.i686.rpmuqrpm-ostree-2024.3-3.el9_4.x86_64.rpm:qrpm-ostree-libs-2024.3-3.el9_4.x86_64.rpm:qrpm-ostree-libs-2024.3-3.el9_4.i686.rpmuqrpm-ostree-2024.3-3.el9_4.x86_64.rpmVk libreoffice-langpack-th-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ga-7.1.8.1-12.el9_4.alma.1.x86_64.rpmxlibreoffice-help-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmvlibreoffice-help-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpm\libreoffice-help-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpmMlibreoffice-draw-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmclibreoffice-help-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmmlibreoffice-help-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpm autocorr-af-7.1.8.1-12.el9_4.alma.1.noarch.rpmKlibreoffice-calc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmklibreoffice-help-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmOlibreoffice-filters-7.1.8.1-12.el9_4.alma.1.x86_64.rpmNlibreoffice-emailmerge-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-langpack-cy-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmElibreoffice-opensymbol-fonts-7.1.8.1-12.el9_4.alma.1.noarch.rpm.libreoffice-langpack-or-7.1.8.1-12.el9_4.alma.1.x86_64.rpmalibreoffice-help-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm]libreoffice-help-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm,autocorr-sr-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-de-7.1.8.1-12.el9_4.alma.1.noarch.rpmYlibreoffice-help-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpm!autocorr-ko-7.1.8.1-12.el9_4.alma.1.noarch.rpm5libreoffice-langpack-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3libreoffice-langpack-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm*autocorr-sk-7.1.8.1-12.el9_4.alma.1.noarch.rpmhlibreoffice-help-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpm)autocorr-ru-7.1.8.1-12.el9_4.alma.1.noarch.rpm|libreoffice-help-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm2libreoffice-langpack-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpm+autocorr-sl-7.1.8.1-12.el9_4.alma.1.noarch.rpmJlibreoffice-pdfimport-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1Clibreoffice-langpack-ve-7.1.8.1-12.el9_4.alma.1.x86_64.rpm+libreoffice-langpack-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmZlibreoffice-help-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-ca-7.1.8.1-12.el9_4.alma.1.noarch.rpm=libreoffice-langpack-te-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-da-7.1.8.1-12.el9_4.alma.1.noarch.rpm"autocorr-lb-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-fr-7.1.8.1-12.el9_4.alma.1.noarch.rpmPlibreoffice-gdb-debug-support-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-12.el9_4.alma.1.x86_64.rpmGlibreoffice-langpack-zu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmwlibreoffice-help-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpm-autocorr-sv-7.1.8.1-12.el9_4.alma.1.noarch.rpmDlibreoffice-data-7.1.8.1-12.el9_4.alma.1.noarch.rpm/libreoffice-langpack-pa-7.1.8.1-12.el9_4.alma.1.x86_64.rpmWlibreoffice-help-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpmElibreoffice-langpack-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm'libreoffice-langpack-ml-7.1.8.1-12.el9_4.alma.1.x86_64.rpm$libreoffice-langpack-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpmAlibreoffice-langpack-ts-7.1.8.1-12.el9_4.alma.1.x86_64.rpmjlibreoffice-help-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-mai-7.1.8.1-12.el9_4.alma.1.x86_64.rpm<libreoffice-langpack-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpm_libreoffice-help-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpm9libreoffice-langpack-ss-7.1.8.1-12.el9_4.alma.1.x86_64.rpmdlibreoffice-help-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm.autocorr-tr-7.1.8.1-12.el9_4.alma.1.noarch.rpm)libreoffice-langpack-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm-libreoffice-langpack-nso-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-12.el9_4.alma.1.x86_64.rpmDlibreoffice-langpack-xh-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-12.el9_4.alma.1.x86_64.rpmplibreoffice-help-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmNlibreoffice-writer-7.1.8.1-12.el9_4.alma.1.x86_64.rpm'autocorr-pt-7.1.8.1-12.el9_4.alma.1.noarch.rpmLlibreoffice-ure-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-hr-7.1.8.1-12.el9_4.alma.1.noarch.rpmKlibreoffice-pyuno-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-impress-7.1.8.1-12.el9_4.alma.1.x86_64.rpmelibreoffice-help-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-is-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-fa-7.1.8.1-12.el9_4.alma.1.x86_64.rpm(autocorr-ro-7.1.8.1-12.el9_4.alma.1.noarch.rpm@libreoffice-langpack-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmnlibreoffice-help-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmPlibreoffice-xsltfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm[libreoffice-help-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpm;libreoffice-langpack-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm7libreoffice-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fy-7.1.8.1-12.el9_4.alma.1.x86_64.rpm^libreoffice-help-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpmVlibreoffice-help-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-it-7.1.8.1-12.el9_4.alma.1.noarch.rpmrlibreoffice-help-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-en-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpmIlibreoffice-ogltrans-7.1.8.1-12.el9_4.alma.1.x86_64.rpmHlibreoffice-math-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-fa-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmMlibreoffice-wiki-publisher-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-langpack-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpm:libreoffice-langpack-st-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmslibreoffice-help-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm*libreoffice-langpack-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1autocorr-zh-7.1.8.1-12.el9_4.alma.1.noarch.rpm7libreoffice-langpack-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-dsb-7.1.8.1-12.el9_4.alma.1.noarch.rpm#libreoffice-langpack-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpmilibreoffice-help-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpmRlibreoffice-gtk3-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-ga-7.1.8.1-12.el9_4.alma.1.noarch.rpmBlibreoffice-langpack-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmglibreoffice-help-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmulibreoffice-help-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpm{libreoffice-help-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpm!libreoffice-langpack-kk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm(libreoffice-langpack-mr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm%autocorr-nl-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-el-7.1.8.1-12.el9_4.alma.1.noarch.rpmJlibreoffice-base-7.1.8.1-12.el9_4.alma.1.x86_64.rpm"libreoffice-langpack-kn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmOlibreoffice-x11-7.1.8.1-12.el9_4.alma.1.x86_64.rpmqlibreoffice-help-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmylibreoffice-help-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-12.el9_4.alma.1.noarch.rpmXlibreoffice-help-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpmUlibreoffice-help-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm/autocorr-vi-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm~libreoffice-help-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm$autocorr-mn-7.1.8.1-12.el9_4.alma.1.noarch.rpm0autocorr-vro-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-bg-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-hu-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm`libreoffice-help-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-cs-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-fi-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpmolibreoffice-help-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpm&autocorr-pl-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm}libreoffice-help-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmtlibreoffice-help-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpmflibreoffice-help-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm?libreoffice-langpack-tn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpmllibreoffice-help-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmLlibreoffice-core-7.1.8.1-12.el9_4.alma.1.x86_64.rpm#autocorr-lt-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpmblibreoffice-help-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmQlibreofficekit-7.1.8.1-12.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-12.el9_4.alma.1.noarch.rpm6libreoffice-langpack-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm autocorr-ja-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-hsb-7.1.8.1-12.el9_4.alma.1.noarch.rpm4libreoffice-langpack-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpm>libreoffice-langpack-th-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ga-7.1.8.1-12.el9_4.alma.1.x86_64.rpmxlibreoffice-help-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmvlibreoffice-help-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpm\libreoffice-help-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpmMlibreoffice-draw-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmclibreoffice-help-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmmlibreoffice-help-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpm autocorr-af-7.1.8.1-12.el9_4.alma.1.noarch.rpmKlibreoffice-calc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmklibreoffice-help-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmOlibreoffice-filters-7.1.8.1-12.el9_4.alma.1.x86_64.rpmNlibreoffice-emailmerge-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-langpack-cy-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmElibreoffice-opensymbol-fonts-7.1.8.1-12.el9_4.alma.1.noarch.rpm.libreoffice-langpack-or-7.1.8.1-12.el9_4.alma.1.x86_64.rpmalibreoffice-help-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm]libreoffice-help-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm,autocorr-sr-7.1.8.1-12.el9_4.alma.1.noarch.rpmautocorr-de-7.1.8.1-12.el9_4.alma.1.noarch.rpmYlibreoffice-help-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpm!autocorr-ko-7.1.8.1-12.el9_4.alma.1.noarch.rpm5libreoffice-langpack-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3libreoffice-langpack-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpm*autocorr-sk-7.1.8.1-12.el9_4.alma.1.noarch.rpmhlibreoffice-help-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpm)autocorr-ru-7.1.8.1-12.el9_4.alma.1.noarch.rpm|libreoffice-help-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm2libreoffice-langpack-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpm+autocorr-sl-7.1.8.1-12.el9_4.alma.1.noarch.rpmJlibreoffice-pdfimport-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3q MBBBsecurityImportant: 389-ds-base security update mhttps://access.redhat.com/errata/RHSA-2024:3837RHSA-2024:3837RHSA-2024:3837 https://access.redhat.com/security/cve/CVE-2024-2199CVE-2024-2199CVE-2024-2199https://access.redhat.com/security/cve/CVE-2024-3657CVE-2024-3657CVE-2024-3657https://bugzilla.redhat.com/22679762267976https://bugzilla.redhat.com/22744012274401https://errata.almalinux.org/9/ALSA-2024-3837.htmlALSA-2024:3837ALSA-2024:3837 pnpython3-lib389-2.4.5-8.el9_4.noarch.rpmn389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpm n389-ds-base-2.4.5-8.el9_4.x86_64.rpmpnpython3-lib389-2.4.5-8.el9_4.noarch.rpmn389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpm n389-ds-base-2.4.5-8.el9_4.x86_64.rpm r 2SBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby security updatevXhttps://access.redhat.com/errata/RHSA-2024:3838RHSA-2024:3838RHSA-2024:3838 https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3838.htmlALSA-2024:3838ALSA-2024:3838 knrubygem-rbs-1.4.0-162.el9_4.noarch.rpm!jrubygem-irb-1.3.5-162.el9_4.noarch.rpm'=rubygem-rss-0.2.9-162.el9_4.noarch.rpmuruby-libs-3.0.7-162.el9_4.i686.rpmrubygem-json-2.5.1-162.el9_4.x86_64.rpmtruby-devel-3.0.7-162.el9_4.i686.rpm*rubygems-3.2.33-162.el9_4.noarch.rpm$zrubygem-rake-13.0.3-162.el9_4.noarch.rpm8rubygem-bigdecimal-3.0.0-162.el9_4.x86_64.rpm rubygem-bundler-2.2.33-162.el9_4.noarch.rpm)7rubygem-typeprof-0.15.2-162.el9_4.noarch.rpm%Prubygem-rdoc-6.3.4.1-162.el9_4.noarch.rpmrubygem-io-console-0.5.7-162.el9_4.x86_64.rpmArubygem-psych-3.3.2-162.el9_4.x86_64.rpmruby-3.0.7-162.el9_4.i686.rpm+rubygems-devel-3.2.33-162.el9_4.noarch.rpm"Frubygem-minitest-5.14.2-162.el9_4.noarch.rpmtruby-devel-3.0.7-162.el9_4.x86_64.rpm#^rubygem-power_assert-1.2.1-162.el9_4.noarch.rpm&3rubygem-rexml-3.2.5-162.el9_4.noarch.rpmuruby-libs-3.0.7-162.el9_4.x86_64.rpmruby-3.0.7-162.el9_4.x86_64.rpm(8rubygem-test-unit-3.3.7-162.el9_4.noarch.rpmruby-default-gems-3.0.7-162.el9_4.noarch.rpmknrubygem-rbs-1.4.0-162.el9_4.noarch.rpm!jrubygem-irb-1.3.5-162.el9_4.noarch.rpm'=rubygem-rss-0.2.9-162.el9_4.noarch.rpmuruby-libs-3.0.7-162.el9_4.i686.rpmrubygem-json-2.5.1-162.el9_4.x86_64.rpmtruby-devel-3.0.7-162.el9_4.i686.rpm*rubygems-3.2.33-162.el9_4.noarch.rpm$zrubygem-rake-13.0.3-162.el9_4.noarch.rpm8rubygem-bigdecimal-3.0.0-162.el9_4.x86_64.rpm rubygem-bundler-2.2.33-162.el9_4.noarch.rpm)7rubygem-typeprof-0.15.2-162.el9_4.noarch.rpm%Prubygem-rdoc-6.3.4.1-162.el9_4.noarch.rpmrubygem-io-console-0.5.7-162.el9_4.x86_64.rpmArubygem-psych-3.3.2-162.el9_4.x86_64.rpmruby-3.0.7-162.el9_4.i686.rpm+rubygems-devel-3.2.33-162.el9_4.noarch.rpm"Frubygem-minitest-5.14.2-162.el9_4.noarch.rpmtruby-devel-3.0.7-162.el9_4.x86_64.rpm#^rubygem-power_assert-1.2.1-162.el9_4.noarch.rpm&3rubygem-rexml-3.2.5-162.el9_4.noarch.rpmuruby-libs-3.0.7-162.el9_4.x86_64.rpmruby-3.0.7-162.el9_4.x86_64.rpm(8rubygem-test-unit-3.3.7-162.el9_4.noarch.rpmruby-default-gems-3.0.7-162.el9_4.noarch.rpmFs 6sBsecurityLow: c-ares security update*Nhttps://access.redhat.com/errata/RHSA-2024:3842RHSA-2024:3842RHSA-2024:3842 https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://bugzilla.redhat.com/22657132265713https://errata.almalinux.org/9/ALSA-2024-3842.htmlALSA-2024:3842ALSA-2024:3842 Uc-ares-devel-1.19.1-2.el9_4.x86_64.rpmUc-ares-devel-1.19.1-2.el9_4.i686.rpmUc-ares-devel-1.19.1-2.el9_4.x86_64.rpmUc-ares-devel-1.19.1-2.el9_4.i686.rpmWt ;wBBsecurityModerate: cockpit security updatePEhttps://access.redhat.com/errata/RHSA-2024:3843RHSA-2024:3843RHSA-2024:3843 https://access.redhat.com/security/cve/CVE-2024-2947CVE-2024-2947CVE-2024-2947https://bugzilla.redhat.com/22716142271614https://errata.almalinux.org/9/ALSA-2024-3843.htmlALSA-2024:3843ALSA-2024:3843 #Bcockpit-storaged-311.2-1.el9_4.noarch.rpm!Bcockpit-packagekit-311.2-1.el9_4.noarch.rpm"Bcockpit-pcp-311.2-1.el9_4.x86_64.rpm#Bcockpit-storaged-311.2-1.el9_4.noarch.rpm!Bcockpit-packagekit-311.2-1.el9_4.noarch.rpm"Bcockpit-pcp-311.2-1.el9_4.x86_64.rpmbu |BBsecurityImportant: firefox security update/https://access.redhat.com/errata/RHSA-2024:3955RHSA-2024:3955RHSA-2024:3955 https://access.redhat.com/security/cve/CVE-2024-5688CVE-2024-5688CVE-2024-5688https://access.redhat.com/security/cve/CVE-2024-5690CVE-2024-5690CVE-2024-5690https://access.redhat.com/security/cve/CVE-2024-5691CVE-2024-5691CVE-2024-5691https://access.redhat.com/security/cve/CVE-2024-5693CVE-2024-5693CVE-2024-5693https://access.redhat.com/security/cve/CVE-2024-5696CVE-2024-5696CVE-2024-5696https://access.redhat.com/security/cve/CVE-2024-5700CVE-2024-5700CVE-2024-5700https://access.redhat.com/security/cve/CVE-2024-5702CVE-2024-5702CVE-2024-5702https://bugzilla.redhat.com/22913942291394https://bugzilla.redhat.com/22913952291395https://bugzilla.redhat.com/22913962291396https://bugzilla.redhat.com/22913972291397https://bugzilla.redhat.com/22913992291399https://bugzilla.redhat.com/22914002291400https://bugzilla.redhat.com/22914012291401https://errata.almalinux.org/9/ALSA-2024-3955.htmlALSA-2024:3955ALSA-2024:3955 8yfirefox-115.12.0-1.el9_4.alma.1.x86_64.rpmQyfirefox-x11-115.12.0-1.el9_4.alma.1.x86_64.rpm8yfirefox-115.12.0-1.el9_4.alma.1.x86_64.rpmQyfirefox-x11-115.12.0-1.el9_4.alma.1.x86_64.rpmvv ABBBBBBsecurityImportant: flatpak security updateD|https://access.redhat.com/errata/RHSA-2024:3959RHSA-2024:3959RHSA-2024:3959 https://access.redhat.com/security/cve/CVE-2024-32462CVE-2024-32462CVE-2024-32462https://bugzilla.redhat.com/22759812275981https://errata.almalinux.org/9/ALSA-2024-3959.htmlALSA-2024:3959ALSA-2024:3959 ,tflatpak-selinux-1.12.9-1.el9_4.noarch.rpmEtflatpak-1.12.9-1.el9_4.x86_64.rpmWtflatpak-libs-1.12.9-1.el9_4.x86_64.rpmFtflatpak-session-helper-1.12.9-1.el9_4.x86_64.rpmWtflatpak-libs-1.12.9-1.el9_4.i686.rpm,tflatpak-selinux-1.12.9-1.el9_4.noarch.rpmEtflatpak-1.12.9-1.el9_4.x86_64.rpmWtflatpak-libs-1.12.9-1.el9_4.x86_64.rpmFtflatpak-session-helper-1.12.9-1.el9_4.x86_64.rpmWtflatpak-libs-1.12.9-1.el9_4.i686.rpmBw JBBBBBBBBBBBBsecurityImportant: ghostscript security update@qhttps://access.redhat.com/errata/RHSA-2024:3999RHSA-2024:3999RHSA-2024:3999 https://access.redhat.com/security/cve/CVE-2024-33871CVE-2024-33871CVE-2024-33871https://bugzilla.redhat.com/22835082283508https://errata.almalinux.org/9/ALSA-2024-3999.htmlALSA-2024:3999ALSA-2024:3999 =&libgs-9.54.0-16.el9_4.x86_64.rpm7&ghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpm4&ghostscript-9.54.0-16.el9_4.x86_64.rpm6&ghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpm&ghostscript-doc-9.54.0-16.el9_4.noarch.rpm8&ghostscript-x11-9.54.0-16.el9_4.x86_64.rpm=&libgs-9.54.0-16.el9_4.i686.rpm5&ghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpm=&libgs-9.54.0-16.el9_4.x86_64.rpm7&ghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpm4&ghostscript-9.54.0-16.el9_4.x86_64.rpm6&ghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpm&ghostscript-doc-9.54.0-16.el9_4.noarch.rpm8&ghostscript-x11-9.54.0-16.el9_4.x86_64.rpm=&libgs-9.54.0-16.el9_4.i686.rpm5&ghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpmЧx YsecurityImportant: thunderbird security update1https://access.redhat.com/errata/RHSA-2024:4002RHSA-2024:4002RHSA-2024:4002 https://access.redhat.com/security/cve/CVE-2024-5688CVE-2024-5688CVE-2024-5688https://access.redhat.com/security/cve/CVE-2024-5690CVE-2024-5690CVE-2024-5690https://access.redhat.com/security/cve/CVE-2024-5691CVE-2024-5691CVE-2024-5691https://access.redhat.com/security/cve/CVE-2024-5693CVE-2024-5693CVE-2024-5693https://access.redhat.com/security/cve/CVE-2024-5696CVE-2024-5696CVE-2024-5696https://access.redhat.com/security/cve/CVE-2024-5700CVE-2024-5700CVE-2024-5700https://access.redhat.com/security/cve/CVE-2024-5702CVE-2024-5702CVE-2024-5702https://bugzilla.redhat.com/22913942291394https://bugzilla.redhat.com/22913952291395https://bugzilla.redhat.com/22913962291396https://bugzilla.redhat.com/22913972291397https://bugzilla.redhat.com/22913992291399https://bugzilla.redhat.com/22914002291400https://bugzilla.redhat.com/22914012291401https://errata.almalinux.org/9/ALSA-2024-4002.htmlALSA-2024:4002ALSA-2024:4002 :Mthunderbird-115.12.1-1.el9_4.alma.1.x86_64.rpm:Mthunderbird-115.12.1-1.el9_4.alma.1.x86_64.rpmEy \securityModerate: libreswan security updateGOhttps://access.redhat.com/errata/RHSA-2024:4050RHSA-2024:4050RHSA-2024:4050 https://access.redhat.com/security/cve/CVE-2024-3652CVE-2024-3652CVE-2024-3652https://bugzilla.redhat.com/22744482274448https://errata.almalinux.org/9/ALSA-2024-4050.htmlALSA-2024:4050ALSA-2024:4050 RVlibreswan-4.12-2.el9_4.1.x86_64.rpmRVlibreswan-4.12-2.el9_4.1.x86_64.rpmkz )_BBBBBBBBsecurityImportant: python3.11 security update0https://access.redhat.com/errata/RHSA-2024:4077RHSA-2024:4077RHSA-2024:4077 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://bugzilla.redhat.com/22765182276518https://errata.almalinux.org/9/ALSA-2024-4077.htmlALSA-2024:4077ALSA-2024:4077 iEpython3.11-3.11.7-1.el9_4.1.x86_64.rpm`Epython3.11-devel-3.11.7-1.el9_4.1.i686.rpmaEpython3.11-libs-3.11.7-1.el9_4.1.i686.rpmaEpython3.11-libs-3.11.7-1.el9_4.1.x86_64.rpmjEpython3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpm`Epython3.11-devel-3.11.7-1.el9_4.1.x86_64.rpmiEpython3.11-3.11.7-1.el9_4.1.x86_64.rpm`Epython3.11-devel-3.11.7-1.el9_4.1.i686.rpmaEpython3.11-libs-3.11.7-1.el9_4.1.i686.rpmaEpython3.11-libs-3.11.7-1.el9_4.1.x86_64.rpmjEpython3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpm`Epython3.11-devel-3.11.7-1.el9_4.1.x86_64.rpmI{ 0jBBBBsecurityImportant: python3.9 security updateFhttps://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078 Wpython3-devel-3.9.18-3.el9_4.1.i686.rpmjpython-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm=python3-tkinter-3.9.18-3.el9_4.1.x86_64.rpmWpython3-devel-3.9.18-3.el9_4.1.x86_64.rpmWpython3-devel-3.9.18-3.el9_4.1.i686.rpmjpython-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm=python3-tkinter-3.9.18-3.el9_4.1.x86_64.rpmWpython3-devel-3.9.18-3.el9_4.1.x86_64.rpm'| qBBBBBBBBBBBBBBBBBBsecurityImportant: git security update[ https://access.redhat.com/errata/RHSA-2024:4083RHSA-2024:4083RHSA-2024:4083 https://access.redhat.com/security/cve/CVE-2024-32002CVE-2024-32002CVE-2024-32002https://access.redhat.com/security/cve/CVE-2024-32004CVE-2024-32004CVE-2024-32004https://access.redhat.com/security/cve/CVE-2024-32020CVE-2024-32020CVE-2024-32020https://access.redhat.com/security/cve/CVE-2024-32021CVE-2024-32021CVE-2024-32021https://access.redhat.com/security/cve/CVE-2024-32465CVE-2024-32465CVE-2024-32465https://bugzilla.redhat.com/22804212280421https://bugzilla.redhat.com/22804282280428https://bugzilla.redhat.com/22804462280446https://bugzilla.redhat.com/22804662280466https://bugzilla.redhat.com/22804842280484https://errata.almalinux.org/9/ALSA-2024-4083.htmlALSA-2024:4083ALSA-2024:4083 I perl-Git-2.43.5-1.el9_4.noarch.rpm> git-instaweb-2.43.5-1.el9_4.noarch.rpmF git-subtree-2.43.5-1.el9_4.x86_64.rpmE git-daemon-2.43.5-1.el9_4.x86_64.rpm< git-email-2.43.5-1.el9_4.noarch.rpm@ git-svn-2.43.5-1.el9_4.noarch.rpmD git-credential-libsecret-2.43.5-1.el9_4.x86_64.rpm; git-core-doc-2.43.5-1.el9_4.noarch.rpmJ perl-Git-SVN-2.43.5-1.el9_4.noarch.rpmB gitweb-2.43.5-1.el9_4.noarch.rpmC git-core-2.43.5-1.el9_4.x86_64.rpm= git-gui-2.43.5-1.el9_4.noarch.rpm: git-all-2.43.5-1.el9_4.noarch.rpmA gitk-2.43.5-1.el9_4.noarch.rpmB git-2.43.5-1.el9_4.x86_64.rpmI perl-Git-2.43.5-1.el9_4.noarch.rpm> git-instaweb-2.43.5-1.el9_4.noarch.rpmF git-subtree-2.43.5-1.el9_4.x86_64.rpmE git-daemon-2.43.5-1.el9_4.x86_64.rpm< git-email-2.43.5-1.el9_4.noarch.rpm@ git-svn-2.43.5-1.el9_4.noarch.rpmD git-credential-libsecret-2.43.5-1.el9_4.x86_64.rpm; git-core-doc-2.43.5-1.el9_4.noarch.rpmJ perl-Git-SVN-2.43.5-1.el9_4.noarch.rpmB gitweb-2.43.5-1.el9_4.noarch.rpmC git-core-2.43.5-1.el9_4.x86_64.rpm= git-gui-2.43.5-1.el9_4.noarch.rpm: git-all-2.43.5-1.el9_4.noarch.rpmA gitk-2.43.5-1.el9_4.noarch.rpmB git-2.43.5-1.el9_4.x86_64.rpmT} FBBBBBBBBsecurityImportant: pki-core security updatez https://access.redhat.com/errata/RHSA-2024:4165RHSA-2024:4165RHSA-2024:4165 https://access.redhat.com/security/cve/CVE-2023-4727CVE-2023-4727CVE-2023-4727https://bugzilla.redhat.com/22322182232218https://errata.almalinux.org/9/ALSA-2024-4165.htmlALSA-2024:4165ALSA-2024:4165 ;\idm-pki-est-11.5.0-2.el9_4.alma.1.noarch.rpm:\idm-pki-ca-11.5.0-2.el9_4.alma.1.noarch.rpme\python3-idm-pki-11.5.0-2.el9_4.alma.1.noarch.rpm>\idm-pki-server-11.5.0-2.el9_4.alma.1.noarch.rpm8\idm-pki-acme-11.5.0-2.el9_4.alma.1.noarch.rpm?\idm-pki-tools-11.5.0-2.el9_4.alma.1.x86_64.rpm=\idm-pki-kra-11.5.0-2.el9_4.alma.1.noarch.rpm9\idm-pki-base-11.5.0-2.el9_4.alma.1.noarch.rpm<\idm-pki-java-11.5.0-2.el9_4.alma.1.noarch.rpm ;\idm-pki-est-11.5.0-2.el9_4.alma.1.noarch.rpm:\idm-pki-ca-11.5.0-2.el9_4.alma.1.noarch.rpme\python3-idm-pki-11.5.0-2.el9_4.alma.1.noarch.rpm>\idm-pki-server-11.5.0-2.el9_4.alma.1.noarch.rpm8\idm-pki-acme-11.5.0-2.el9_4.alma.1.noarch.rpm?\idm-pki-tools-11.5.0-2.el9_4.alma.1.x86_64.rpm=\idm-pki-kra-11.5.0-2.el9_4.alma.1.noarch.rpm9\idm-pki-base-11.5.0-2.el9_4.alma.1.noarch.rpm<\idm-pki-java-11.5.0-2.el9_4.alma.1.noarch.rpm)~ QBBBBBBBBsecurityModerate: golang security updateMhttps://access.redhat.com/errata/RHSA-2024:4212RHSA-2024:4212RHSA-2024:4212 https://access.redhat.com/security/cve/CVE-2024-24789CVE-2024-24789CVE-2024-24789https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://bugzilla.redhat.com/22926682292668https://bugzilla.redhat.com/22927872292787https://errata.almalinux.org/9/ALSA-2024-4212.htmlALSA-2024:4212ALSA-2024:4212 qgolang-src-1.21.11-1.el9_4.noarch.rpmqgolang-docs-1.21.11-1.el9_4.noarch.rpm?qgolang-1.21.11-1.el9_4.x86_64.rpmqgolang-tests-1.21.11-1.el9_4.noarch.rpmqgolang-misc-1.21.11-1.el9_4.noarch.rpmnqgo-toolset-1.21.11-1.el9_4.x86_64.rpm@qgolang-bin-1.21.11-1.el9_4.x86_64.rpmqgolang-src-1.21.11-1.el9_4.noarch.rpmqgolang-docs-1.21.11-1.el9_4.noarch.rpm?qgolang-1.21.11-1.el9_4.x86_64.rpmqgolang-tests-1.21.11-1.el9_4.noarch.rpmqgolang-misc-1.21.11-1.el9_4.noarch.rpmnqgo-toolset-1.21.11-1.el9_4.x86_64.rpm@qgolang-bin-1.21.11-1.el9_4.x86_64.rpm^ \BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qemu-kvm security updateQrhttps://access.redhat.com/errata/RHSA-2024:4278RHSA-2024:4278RHSA-2024:4278 https://access.redhat.com/security/cve/CVE-2024-4467CVE-2024-4467CVE-2024-4467https://bugzilla.redhat.com/22788752278875https://errata.almalinux.org/9/ALSA-2024-4278.htmlALSA-2024:4278ALSA-2024:4278 VZqemu-kvm-device-usb-host-8.2.0-11.el9_4.4.x86_64.rpmQZqemu-kvm-common-8.2.0-11.el9_4.4.x86_64.rpmXZqemu-kvm-docs-8.2.0-11.el9_4.4.x86_64.rpmUZqemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.4.x86_64.rpmMZqemu-kvm-8.2.0-11.el9_4.4.x86_64.rpm\Zqemu-pr-helper-8.2.0-11.el9_4.4.x86_64.rpmOZqemu-kvm-block-curl-8.2.0-11.el9_4.4.x86_64.rpmNZqemu-kvm-audio-pa-8.2.0-11.el9_4.4.x86_64.rpmLZqemu-img-8.2.0-11.el9_4.4.x86_64.rpmWZqemu-kvm-device-usb-redirect-8.2.0-11.el9_4.4.x86_64.rpmRZqemu-kvm-core-8.2.0-11.el9_4.4.x86_64.rpm2Zqemu-kvm-block-blkio-8.2.0-11.el9_4.4.x86_64.rpmSZqemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.4.x86_64.rpmZZqemu-kvm-ui-egl-headless-8.2.0-11.el9_4.4.x86_64.rpmTZqemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.4.x86_64.rpmYZqemu-kvm-tools-8.2.0-11.el9_4.4.x86_64.rpmKZqemu-guest-agent-8.2.0-11.el9_4.4.x86_64.rpmPZqemu-kvm-block-rbd-8.2.0-11.el9_4.4.x86_64.rpm[Zqemu-kvm-ui-opengl-8.2.0-11.el9_4.4.x86_64.rpmVZqemu-kvm-device-usb-host-8.2.0-11.el9_4.4.x86_64.rpmQZqemu-kvm-common-8.2.0-11.el9_4.4.x86_64.rpmXZqemu-kvm-docs-8.2.0-11.el9_4.4.x86_64.rpmUZqemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.4.x86_64.rpmMZqemu-kvm-8.2.0-11.el9_4.4.x86_64.rpm\Zqemu-pr-helper-8.2.0-11.el9_4.4.x86_64.rpmOZqemu-kvm-block-curl-8.2.0-11.el9_4.4.x86_64.rpmNZqemu-kvm-audio-pa-8.2.0-11.el9_4.4.x86_64.rpmLZqemu-img-8.2.0-11.el9_4.4.x86_64.rpmWZqemu-kvm-device-usb-redirect-8.2.0-11.el9_4.4.x86_64.rpmRZqemu-kvm-core-8.2.0-11.el9_4.4.x86_64.rpm2Zqemu-kvm-block-blkio-8.2.0-11.el9_4.4.x86_64.rpmSZqemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.4.x86_64.rpmZZqemu-kvm-ui-egl-headless-8.2.0-11.el9_4.4.x86_64.rpmTZqemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.4.x86_64.rpmYZqemu-kvm-tools-8.2.0-11.el9_4.4.x86_64.rpmKZqemu-guest-agent-8.2.0-11.el9_4.4.x86_64.rpmPZqemu-kvm-block-rbd-8.2.0-11.el9_4.4.x86_64.rpm[Zqemu-kvm-ui-opengl-8.2.0-11.el9_4.4.x86_64.rpm CBBsecurityImportant: openssh security updateCshttps://access.redhat.com/errata/RHSA-2024:4312RHSA-2024:4312RHSA-2024:4312 https://access.redhat.com/security/cve/CVE-2024-6387CVE-2024-6387CVE-2024-6387https://bugzilla.redhat.com/22946042294604https://errata.almalinux.org/9/ALSA-2024-4312.htmlALSA-2024:4312ALSA-2024:4312 (pam_ssh_agent_auth-0.10.4-5.38.el9_4.1.x86_64.rpm' openssh-askpass-8.7p1-38.el9_4.1.x86_64.rpm(pam_ssh_agent_auth-0.10.4-5.38.el9_4.1.x86_64.rpm' openssh-askpass-8.7p1-38.el9_4.1.x86_64.rpm HBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update6https://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349 https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349 !*kernel-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm)*rv-5.14.0-427.24.1.el9_4.x86_64.rpm'*rtla-5.14.0-427.24.1.el9_4.x86_64.rpm%*perf-5.14.0-427.24.1.el9_4.x86_64.rpm"*kernel-debug-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm&*kernel-headers-5.14.0-427.24.1.el9_4.x86_64.rpm*kernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm$*kernel-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm#*kernel-devel-5.14.0-427.24.1.el9_4.x86_64.rpm !*kernel-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm)*rv-5.14.0-427.24.1.el9_4.x86_64.rpm'*rtla-5.14.0-427.24.1.el9_4.x86_64.rpm%*perf-5.14.0-427.24.1.el9_4.x86_64.rpm"*kernel-debug-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm&*kernel-headers-5.14.0-427.24.1.el9_4.x86_64.rpm*kernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm$*kernel-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm#*kernel-devel-5.14.0-427.24.1.el9_4.x86_64.rpmx ZBBsecurityImportant: buildah security updateD https://access.redhat.com/errata/RHSA-2024:4371RHSA-2024:4371RHSA-2024:4371 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4371.htmlALSA-2024:4371ALSA-2024:4371 85buildah-1.33.7-3.el9_4.x86_64.rpm95buildah-tests-1.33.7-3.el9_4.x86_64.rpm85buildah-1.33.7-3.el9_4.x86_64.rpm95buildah-tests-1.33.7-3.el9_4.x86_64.rpm. (_BBBBBBBsecurityImportant: podman security updateOuhttps://access.redhat.com/errata/RHSA-2024:4378RHSA-2024:4378RHSA-2024:4378 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4378.htmlALSA-2024:4378ALSA-2024:4378 4Mpodman-remote-4.9.4-5.el9_4.x86_64.rpm5Mpodman-tests-4.9.4-5.el9_4.x86_64.rpm3Mpodman-plugins-4.9.4-5.el9_4.x86_64.rpm2Mpodman-4.9.4-5.el9_4.x86_64.rpmgMpodman-docker-4.9.4-5.el9_4.noarch.rpm4Mpodman-remote-4.9.4-5.el9_4.x86_64.rpm5Mpodman-tests-4.9.4-5.el9_4.x86_64.rpm3Mpodman-plugins-4.9.4-5.el9_4.x86_64.rpm2Mpodman-4.9.4-5.el9_4.x86_64.rpmgMpodman-docker-4.9.4-5.el9_4.noarch.rpmM +isecurityImportant: gvisor-tap-vsock security updateDGhttps://access.redhat.com/errata/RHSA-2024:4379RHSA-2024:4379RHSA-2024:4379 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4379.htmlALSA-2024:4379ALSA-2024:4379 /xgvisor-tap-vsock-0.7.3-4.el9_4.alma.1.x86_64.rpm/xgvisor-tap-vsock-0.7.3-4.el9_4.alma.1.x86_64.rpmF lBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security update https://access.redhat.com/errata/RHSA-2024:4422RHSA-2024:4422RHSA-2024:4422 https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-4422.htmlALSA-2024:4422ALSA-2024:4422 /fence-agents-virsh-4.10.0-62.el9_4.4.alma.1.noarch.rpmbfence-virtd-4.10.0-62.el9_4.4.alma.1.x86_64.rpmffence-virtd-serial-4.10.0-62.el9_4.4.alma.1.x86_64.rpmgfence-virtd-tcp-4.10.0-62.el9_4.4.alma.1.x86_64.rpm`fence-agents-kubevirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpmefence-virtd-multicast-4.10.0-62.el9_4.4.alma.1.x86_64.rpmdfence-virtd-libvirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm.fence-agents-ibm-vpc-4.10.0-62.el9_4.4.alma.1.noarch.rpmcfence-virtd-cpg-4.10.0-62.el9_4.4.alma.1.x86_64.rpm_fence-agents-compute-4.10.0-62.el9_4.4.alma.1.x86_64.rpm-fence-agents-ibm-powervs-4.10.0-62.el9_4.4.alma.1.noarch.rpm,fence-agents-common-4.10.0-62.el9_4.4.alma.1.noarch.rpmafence-virt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm /fence-agents-virsh-4.10.0-62.el9_4.4.alma.1.noarch.rpmbfence-virtd-4.10.0-62.el9_4.4.alma.1.x86_64.rpmffence-virtd-serial-4.10.0-62.el9_4.4.alma.1.x86_64.rpmgfence-virtd-tcp-4.10.0-62.el9_4.4.alma.1.x86_64.rpm`fence-agents-kubevirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpmefence-virtd-multicast-4.10.0-62.el9_4.4.alma.1.x86_64.rpmdfence-virtd-libvirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm.fence-agents-ibm-vpc-4.10.0-62.el9_4.4.alma.1.noarch.rpmcfence-virtd-cpg-4.10.0-62.el9_4.4.alma.1.x86_64.rpm_fence-agents-compute-4.10.0-62.el9_4.4.alma.1.x86_64.rpm-fence-agents-ibm-powervs-4.10.0-62.el9_4.4.alma.1.noarch.rpm,fence-agents-common-4.10.0-62.el9_4.4.alma.1.noarch.rpmafence-virt-4.10.0-62.el9_4.4.alma.1.x86_64.rpmL CBBBBBBBBBBBBBBsecurityModerate: dotnet6.0 security updateJhttps://access.redhat.com/errata/RHSA-2024:4439RHSA-2024:4439RHSA-2024:4439 https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4439.htmlALSA-2024:4439ALSA-2024:4439 aspnetcore-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpmdotnet-apphost-pack-6.0-6.0.32-1.el9_4.x86_64.rpmdotnet-runtime-6.0-6.0.32-1.el9_4.x86_64.rpmdotnet-hostfxr-6.0-6.0.32-1.el9_4.x86_64.rpmPdotnet-templates-6.0-6.0.132-1.el9_4.x86_64.rpmdotnet-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpmaspnetcore-runtime-6.0-6.0.32-1.el9_4.x86_64.rpmPdotnet-sdk-6.0-6.0.132-1.el9_4.x86_64.rpmaspnetcore-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpmdotnet-apphost-pack-6.0-6.0.32-1.el9_4.x86_64.rpmdotnet-runtime-6.0-6.0.32-1.el9_4.x86_64.rpmdotnet-hostfxr-6.0-6.0.32-1.el9_4.x86_64.rpmPdotnet-templates-6.0-6.0.132-1.el9_4.x86_64.rpmdotnet-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpmaspnetcore-runtime-6.0-6.0.32-1.el9_4.x86_64.rpmPdotnet-sdk-6.0-6.0.132-1.el9_4.x86_64.rpmZ .TBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: dotnet8.0 security updateg&https://access.redhat.com/errata/RHSA-2024:4450RHSA-2024:4450RHSA-2024:4450 https://access.redhat.com/security/cve/CVE-2024-30105CVE-2024-30105CVE-2024-30105https://access.redhat.com/security/cve/CVE-2024-35264CVE-2024-35264CVE-2024-35264https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953202295320https://bugzilla.redhat.com/22953212295321https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4450.htmlALSA-2024:4450ALSA-2024:4450 @dotnet-hostfxr-8.0-8.0.7-1.el9_4.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpmdotnet-host-8.0.7-1.el9_4.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.7-1.el9_4.x86_64.rpmBdotnet-runtime-8.0-8.0.7-1.el9_4.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpmqnetstandard-targeting-pack-2.1-8.0.107-1.el9_4.x86_64.rpmDqdotnet-sdk-8.0-8.0.107-1.el9_4.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm:aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpmHqdotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpm+qdotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm @dotnet-hostfxr-8.0-8.0.7-1.el9_4.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpmdotnet-host-8.0.7-1.el9_4.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.7-1.el9_4.x86_64.rpmBdotnet-runtime-8.0-8.0.7-1.el9_4.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpmqnetstandard-targeting-pack-2.1-8.0.107-1.el9_4.x86_64.rpmDqdotnet-sdk-8.0-8.0.107-1.el9_4.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm:aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpmHqdotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpm+qdotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm 3oBBsecurityModerate: openssh security update https://access.redhat.com/errata/RHSA-2024:4457RHSA-2024:4457RHSA-2024:4457 https://access.redhat.com/security/cve/CVE-2024-6409CVE-2024-6409CVE-2024-6409https://bugzilla.redhat.com/22950852295085https://errata.almalinux.org/9/ALSA-2024-4457.htmlALSA-2024:4457ALSA-2024:4457 (pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpm' openssh-askpass-8.7p1-38.el9_4.4.x86_64.rpm(pam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpm' openssh-askpass-8.7p1-38.el9_4.4.x86_64.rpmߴ  8tBBsecurityImportant: firefox security update4https://access.redhat.com/errata/RHSA-2024:4500RHSA-2024:4500RHSA-2024:4500 https://access.redhat.com/security/cve/CVE-2024-6601CVE-2024-6601CVE-2024-6601https://access.redhat.com/security/cve/CVE-2024-6603CVE-2024-6603CVE-2024-6603https://access.redhat.com/security/cve/CVE-2024-6604CVE-2024-6604CVE-2024-6604https://bugzilla.redhat.com/22966362296636https://bugzilla.redhat.com/22966382296638https://bugzilla.redhat.com/22966392296639https://errata.almalinux.org/9/ALSA-2024-4500.htmlALSA-2024:4500ALSA-2024:4500 8mfirefox-115.13.0-3.el9_4.alma.1.x86_64.rpmQmfirefox-x11-115.13.0-3.el9_4.alma.1.x86_64.rpm8mfirefox-115.13.0-3.el9_4.alma.1.x86_64.rpmQmfirefox-x11-115.13.0-3.el9_4.alma.1.x86_64.rpm߱m  =yBBsecurityImportant: skopeo security updateGNhttps://access.redhat.com/errata/RHSA-2024:4502RHSA-2024:4502RHSA-2024:4502 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4502.htmlALSA-2024:4502ALSA-2024:4502 8*skopeo-1.14.3-3.el9_4.x86_64.rpm9*skopeo-tests-1.14.3-3.el9_4.x86_64.rpm8*skopeo-1.14.3-3.el9_4.x86_64.rpm9*skopeo-tests-1.14.3-3.el9_4.x86_64.rpm߱   ~BBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security updatePhttps://access.redhat.com/errata/RHSA-2024:4563RHSA-2024:4563RHSA-2024:4563 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4563.htmlALSA-2024:4563ALSA-2024:4563 63java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9.x86_64.rpm43java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9.x86_64.rpm23java-1.8.0-openjdk-1.8.0.422.b05-2.el9.x86_64.rpm;3java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9.noarch.rpm53java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9.x86_64.rpm:3java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9.noarch.rpm33java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9.x86_64.rpm63java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9.x86_64.rpm43java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9.x86_64.rpm23java-1.8.0-openjdk-1.8.0.422.b05-2.el9.x86_64.rpm;3java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9.noarch.rpm53java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9.x86_64.rpm:3java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9.noarch.rpm33java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9.x86_64.rpmR  KBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security updateeOhttps://access.redhat.com/errata/RHSA-2024:4567RHSA-2024:4567RHSA-2024:4567 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4567.htmlALSA-2024:4567ALSA-2024:4567 q}java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9.x86_64.rpmn}java-11-openjdk-devel-11.0.24.0.8-2.el9.x86_64.rpmm}java-11-openjdk-demo-11.0.24.0.8-2.el9.x86_64.rpml}java-11-openjdk-11.0.24.0.8-2.el9.x86_64.rpmo}java-11-openjdk-headless-11.0.24.0.8-2.el9.x86_64.rpmr}java-11-openjdk-jmods-11.0.24.0.8-2.el9.x86_64.rpmt}java-11-openjdk-static-libs-11.0.24.0.8-2.el9.x86_64.rpmp}java-11-openjdk-javadoc-11.0.24.0.8-2.el9.x86_64.rpms}java-11-openjdk-src-11.0.24.0.8-2.el9.x86_64.rpm q}java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9.x86_64.rpmn}java-11-openjdk-devel-11.0.24.0.8-2.el9.x86_64.rpmm}java-11-openjdk-demo-11.0.24.0.8-2.el9.x86_64.rpml}java-11-openjdk-11.0.24.0.8-2.el9.x86_64.rpmo}java-11-openjdk-headless-11.0.24.0.8-2.el9.x86_64.rpmr}java-11-openjdk-jmods-11.0.24.0.8-2.el9.x86_64.rpmt}java-11-openjdk-static-libs-11.0.24.0.8-2.el9.x86_64.rpmp}java-11-openjdk-javadoc-11.0.24.0.8-2.el9.x86_64.rpms}java-11-openjdk-src-11.0.24.0.8-2.el9.x86_64.rpmn  0^BBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update4i https://access.redhat.com/errata/RHSA-2024:4568RHSA-2024:4568RHSA-2024:4568 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4568.htmlALSA-2024:4568ALSA-2024:4568  java-17-openjdk-headless-17.0.12.0.7-2.el9.x86_64.rpmjava-17-openjdk-static-libs-17.0.12.0.7-2.el9.x86_64.rpm java-17-openjdk-17.0.12.0.7-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.12.0.7-2.el9.x86_64.rpmjava-17-openjdk-jmods-17.0.12.0.7-2.el9.x86_64.rpm java-17-openjdk-javadoc-17.0.12.0.7-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.12.0.7-2.el9.x86_64.rpmjava-17-openjdk-src-17.0.12.0.7-2.el9.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9.x86_64.rpm  java-17-openjdk-headless-17.0.12.0.7-2.el9.x86_64.rpmjava-17-openjdk-static-libs-17.0.12.0.7-2.el9.x86_64.rpm java-17-openjdk-17.0.12.0.7-2.el9.x86_64.rpm java-17-openjdk-devel-17.0.12.0.7-2.el9.x86_64.rpmjava-17-openjdk-jmods-17.0.12.0.7-2.el9.x86_64.rpm java-17-openjdk-javadoc-17.0.12.0.7-2.el9.x86_64.rpm java-17-openjdk-demo-17.0.12.0.7-2.el9.x86_64.rpmjava-17-openjdk-src-17.0.12.0.7-2.el9.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9.x86_64.rpmh qBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updatei https://access.redhat.com/errata/RHSA-2024:4573RHSA-2024:4573RHSA-2024:4573 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4573.htmlALSA-2024:4573ALSA-2024:4573 zjava-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.alma.1.x86_64.rpm{java-21-openjdk-jmods-21.0.4.0.7-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.4.0.7-1.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.4.0.7-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.4.0.7-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.4.0.7-1.el9.alma.1.x86_64.rpmwjava-21-openjdk-devel-21.0.4.0.7-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.4.0.7-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.4.0.7-1.el9.alma.1.x86_64.rpm zjava-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.alma.1.x86_64.rpm{java-21-openjdk-jmods-21.0.4.0.7-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.4.0.7-1.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.4.0.7-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.4.0.7-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.4.0.7-1.el9.alma.1.x86_64.rpmwjava-21-openjdk-devel-21.0.4.0.7-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.4.0.7-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.4.0.7-1.el9.alma.1.x86_64.rpm DBBBBBBBBBBBBBBBsecurityImportant: kernel security update$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583 https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583 #+kernel-devel-5.14.0-427.26.1.el9_4.x86_64.rpm)+rv-5.14.0-427.26.1.el9_4.x86_64.rpm+kernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm!+kernel-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm'+rtla-5.14.0-427.26.1.el9_4.x86_64.rpm"+kernel-debug-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm%+perf-5.14.0-427.26.1.el9_4.x86_64.rpm&+kernel-headers-5.14.0-427.26.1.el9_4.x86_64.rpm$+kernel-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm #+kernel-devel-5.14.0-427.26.1.el9_4.x86_64.rpm)+rv-5.14.0-427.26.1.el9_4.x86_64.rpm+kernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm!+kernel-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm'+rtla-5.14.0-427.26.1.el9_4.x86_64.rpm"+kernel-debug-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm%+perf-5.14.0-427.26.1.el9_4.x86_64.rpm&+kernel-headers-5.14.0-427.26.1.el9_4.x86_64.rpm$+kernel-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm# /VBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qt5-qtbase security update @https://access.redhat.com/errata/RHSA-2024:4623RHSA-2024:4623RHSA-2024:4623 https://access.redhat.com/security/cve/CVE-2024-39936CVE-2024-39936CVE-2024-39936https://bugzilla.redhat.com/22958672295867https://errata.almalinux.org/9/ALSA-2024-4623.htmlALSA-2024:4623ALSA-2024:4623 jwqt5-qtbase-odbc-5.15.9-10.el9_4.i686.rpmlwqt5-qtbase-private-devel-5.15.9-10.el9_4.i686.rpmjwqt5-qtbase-odbc-5.15.9-10.el9_4.x86_64.rpmgwqt5-qtbase-examples-5.15.9-10.el9_4.x86_64.rpmiwqt5-qtbase-mysql-5.15.9-10.el9_4.i686.rpmiwqt5-qtbase-mysql-5.15.9-10.el9_4.x86_64.rpmkwqt5-qtbase-postgresql-5.15.9-10.el9_4.i686.rpmfwqt5-qtbase-devel-5.15.9-10.el9_4.i686.rpmewqt5-qtbase-5.15.9-10.el9_4.x86_64.rpmkwqt5-qtbase-postgresql-5.15.9-10.el9_4.x86_64.rpmfwqt5-qtbase-devel-5.15.9-10.el9_4.x86_64.rpmhwqt5-qtbase-gui-5.15.9-10.el9_4.i686.rpmhwqt5-qtbase-gui-5.15.9-10.el9_4.x86_64.rpmgwqt5-qtbase-examples-5.15.9-10.el9_4.i686.rpmewqt5-qtbase-5.15.9-10.el9_4.i686.rpmJwqt5-qtbase-common-5.15.9-10.el9_4.noarch.rpmlwqt5-qtbase-private-devel-5.15.9-10.el9_4.x86_64.rpmjwqt5-qtbase-odbc-5.15.9-10.el9_4.i686.rpmlwqt5-qtbase-private-devel-5.15.9-10.el9_4.i686.rpmjwqt5-qtbase-odbc-5.15.9-10.el9_4.x86_64.rpmgwqt5-qtbase-examples-5.15.9-10.el9_4.x86_64.rpmiwqt5-qtbase-mysql-5.15.9-10.el9_4.i686.rpmiwqt5-qtbase-mysql-5.15.9-10.el9_4.x86_64.rpmkwqt5-qtbase-postgresql-5.15.9-10.el9_4.i686.rpmfwqt5-qtbase-devel-5.15.9-10.el9_4.i686.rpmewqt5-qtbase-5.15.9-10.el9_4.x86_64.rpmkwqt5-qtbase-postgresql-5.15.9-10.el9_4.x86_64.rpmfwqt5-qtbase-devel-5.15.9-10.el9_4.x86_64.rpmhwqt5-qtbase-gui-5.15.9-10.el9_4.i686.rpmhwqt5-qtbase-gui-5.15.9-10.el9_4.x86_64.rpmgwqt5-qtbase-examples-5.15.9-10.el9_4.i686.rpmewqt5-qtbase-5.15.9-10.el9_4.i686.rpmJwqt5-qtbase-common-5.15.9-10.el9_4.noarch.rpmlwqt5-qtbase-private-devel-5.15.9-10.el9_4.x86_64.rpm 2psecurityImportant: thunderbird security update`https://access.redhat.com/errata/RHSA-2024:4624RHSA-2024:4624RHSA-2024:4624 https://access.redhat.com/security/cve/CVE-2024-6601CVE-2024-6601CVE-2024-6601https://access.redhat.com/security/cve/CVE-2024-6603CVE-2024-6603CVE-2024-6603https://access.redhat.com/security/cve/CVE-2024-6604CVE-2024-6604CVE-2024-6604https://bugzilla.redhat.com/22966362296636https://bugzilla.redhat.com/22966382296638https://bugzilla.redhat.com/22966392296639https://errata.almalinux.org/9/ALSA-2024-4624.htmlALSA-2024:4624ALSA-2024:4624 :mthunderbird-115.13.0-3.el9_4.alma.1.x86_64.rpm:mthunderbird-115.13.0-3.el9_4.alma.1.x86_64.rpm1 sBBBBBBBBBBBBBBBBBBsecurityImportant: httpd security updatecq https://access.redhat.com/errata/RHSA-2024:4726RHSA-2024:4726RHSA-2024:4726 https://access.redhat.com/security/cve/CVE-2024-38473CVE-2024-38473CVE-2024-38473https://access.redhat.com/security/cve/CVE-2024-38474CVE-2024-38474CVE-2024-38474https://access.redhat.com/security/cve/CVE-2024-38475CVE-2024-38475CVE-2024-38475https://access.redhat.com/security/cve/CVE-2024-38477CVE-2024-38477CVE-2024-38477https://access.redhat.com/security/cve/CVE-2024-39573CVE-2024-39573CVE-2024-39573https://bugzilla.redhat.com/22950122295012https://bugzilla.redhat.com/22950132295013https://bugzilla.redhat.com/22950142295014https://bugzilla.redhat.com/22950162295016https://bugzilla.redhat.com/22950222295022https://errata.almalinux.org/9/ALSA-2024-4726.htmlALSA-2024:4726ALSA-2024:4726 Dmod_session-2.4.57-11.el9_4.x86_64.rpm~Dmod_ldap-2.4.57-11.el9_4.x86_64.rpmiDhttpd-core-2.4.57-11.el9_4.x86_64.rpmmod_proxy_html-2.4.57-11.el9_4.x86_64.rpmjDhttpd-devel-2.4.57-11.el9_4.x86_64.rpm0Dhttpd-filesystem-2.4.57-11.el9_4.noarch.rpmkDhttpd-tools-2.4.57-11.el9_4.x86_64.rpmmod_ssl-2.4.57-11.el9_4.x86_64.rpm1Dhttpd-manual-2.4.57-11.el9_4.noarch.rpmDmod_lua-2.4.57-11.el9_4.x86_64.rpmhDhttpd-2.4.57-11.el9_4.x86_64.rpm Dmod_session-2.4.57-11.el9_4.x86_64.rpm~Dmod_ldap-2.4.57-11.el9_4.x86_64.rpmiDhttpd-core-2.4.57-11.el9_4.x86_64.rpmmod_proxy_html-2.4.57-11.el9_4.x86_64.rpmjDhttpd-devel-2.4.57-11.el9_4.x86_64.rpm0Dhttpd-filesystem-2.4.57-11.el9_4.noarch.rpmkDhttpd-tools-2.4.57-11.el9_4.x86_64.rpmmod_ssl-2.4.57-11.el9_4.x86_64.rpm1Dhttpd-manual-2.4.57-11.el9_4.noarch.rpmDmod_lua-2.4.57-11.el9_4.x86_64.rpmhDhttpd-2.4.57-11.el9_4.x86_64.rpmr HsecurityModerate: edk2 security updateTLhttps://access.redhat.com/errata/RHSA-2024:4749RHSA-2024:4749RHSA-2024:4749 https://access.redhat.com/security/cve/CVE-2022-36765CVE-2022-36765CVE-2022-36765https://access.redhat.com/security/cve/CVE-2023-45236CVE-2023-45236CVE-2023-45236https://access.redhat.com/security/cve/CVE-2023-45237CVE-2023-45237CVE-2023-45237https://bugzilla.redhat.com/22575842257584https://bugzilla.redhat.com/22587032258703https://bugzilla.redhat.com/22587062258706https://errata.almalinux.org/9/ALSA-2024-4749.htmlALSA-2024:4749ALSA-2024:4749 edk2-ovmf-20231122-6.el9_4.2.noarch.rpm3edk2-aarch64-20231122-6.el9_4.2.noarch.rpmedk2-ovmf-20231122-6.el9_4.2.noarch.rpm3edk2-aarch64-20231122-6.el9_4.2.noarch.rpmH KBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update https://access.redhat.com/errata/RHSA-2024:4755RHSA-2024:4755RHSA-2024:4755 https://access.redhat.com/security/cve/CVE-2024-3044CVE-2024-3044CVE-2024-3044https://bugzilla.redhat.com/22805422280542https://errata.almalinux.org/9/ALSA-2024-4755.htmlALSA-2024:4755ALSA-2024:4755 1Plibreoffice-gdb-debug-support-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpm?libreoffice-langpack-tn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmDlibreoffice-data-7.1.8.1-13.el9_4.alma.1.noarch.rpm)autocorr-ru-7.1.8.1-13.el9_4.alma.1.noarch.rpm-libreoffice-langpack-nso-7.1.8.1-13.el9_4.alma.1.x86_64.rpmxlibreoffice-help-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpm>libreoffice-langpack-th-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-hr-7.1.8.1-13.el9_4.alma.1.noarch.rpmtlibreoffice-help-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpm{libreoffice-help-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm autocorr-ja-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm;libreoffice-langpack-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmHlibreoffice-math-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm2libreoffice-langpack-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpmplibreoffice-help-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmilibreoffice-help-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fy-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmqlibreoffice-help-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-impress-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1autocorr-zh-7.1.8.1-13.el9_4.alma.1.noarch.rpmKlibreoffice-calc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm*libreoffice-langpack-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm$autocorr-mn-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpmWlibreoffice-help-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpmglibreoffice-help-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm`libreoffice-help-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm"libreoffice-langpack-kn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpm&autocorr-pl-7.1.8.1-13.el9_4.alma.1.noarch.rpm|libreoffice-help-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm'libreoffice-langpack-ml-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-el-7.1.8.1-13.el9_4.alma.1.noarch.rpm=libreoffice-langpack-te-7.1.8.1-13.el9_4.alma.1.x86_64.rpmXlibreoffice-help-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm/autocorr-vi-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm#autocorr-lt-7.1.8.1-13.el9_4.alma.1.noarch.rpm<libreoffice-langpack-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm"autocorr-lb-7.1.8.1-13.el9_4.alma.1.noarch.rpm(autocorr-ro-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-fi-7.1.8.1-13.el9_4.alma.1.noarch.rpm libreoffice-langpack-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpmZlibreoffice-help-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMlibreoffice-wiki-publisher-7.1.8.1-13.el9_4.alma.1.x86_64.rpm autocorr-af-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm.libreoffice-langpack-or-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMlibreoffice-draw-7.1.8.1-13.el9_4.alma.1.x86_64.rpm%autocorr-nl-7.1.8.1-13.el9_4.alma.1.noarch.rpmRlibreoffice-gtk3-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-en-7.1.8.1-13.el9_4.alma.1.noarch.rpm#libreoffice-langpack-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNlibreoffice-emailmerge-7.1.8.1-13.el9_4.alma.1.x86_64.rpm0autocorr-vro-7.1.8.1-13.el9_4.alma.1.noarch.rpmnlibreoffice-help-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-da-7.1.8.1-13.el9_4.alma.1.noarch.rpmBlibreoffice-langpack-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm}libreoffice-help-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm3libreoffice-langpack-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpm,autocorr-sr-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-fa-7.1.8.1-13.el9_4.alma.1.noarch.rpm+autocorr-sl-7.1.8.1-13.el9_4.alma.1.noarch.rpm\libreoffice-help-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-hu-7.1.8.1-13.el9_4.alma.1.noarch.rpmylibreoffice-help-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNlibreoffice-writer-7.1.8.1-13.el9_4.alma.1.x86_64.rpm(libreoffice-langpack-mr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmAlibreoffice-langpack-ts-7.1.8.1-13.el9_4.alma.1.x86_64.rpmflibreoffice-help-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmklibreoffice-help-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-cy-7.1.8.1-13.el9_4.alma.1.x86_64.rpmJlibreoffice-base-7.1.8.1-13.el9_4.alma.1.x86_64.rpm:libreoffice-langpack-st-7.1.8.1-13.el9_4.alma.1.x86_64.rpmClibreoffice-langpack-ve-7.1.8.1-13.el9_4.alma.1.x86_64.rpmwlibreoffice-help-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpm/libreoffice-langpack-pa-7.1.8.1-13.el9_4.alma.1.x86_64.rpmQlibreofficekit-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-de-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-ca-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-dsb-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpmDlibreoffice-langpack-xh-7.1.8.1-13.el9_4.alma.1.x86_64.rpm*autocorr-sk-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpmalibreoffice-help-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmclibreoffice-help-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmElibreoffice-opensymbol-fonts-7.1.8.1-13.el9_4.alma.1.noarch.rpm7libreoffice-7.1.8.1-13.el9_4.alma.1.x86_64.rpmslibreoffice-help-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpmjlibreoffice-help-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpm.autocorr-tr-7.1.8.1-13.el9_4.alma.1.noarch.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpmLlibreoffice-ure-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-fr-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-is-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ga-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpm5libreoffice-langpack-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-cs-7.1.8.1-13.el9_4.alma.1.noarch.rpm+libreoffice-langpack-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm)libreoffice-langpack-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpm^libreoffice-help-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-fa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpmOlibreoffice-filters-7.1.8.1-13.el9_4.alma.1.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-13.el9_4.alma.1.noarch.rpmulibreoffice-help-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmUlibreoffice-help-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm]libreoffice-help-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpmelibreoffice-help-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm!autocorr-ko-7.1.8.1-13.el9_4.alma.1.noarch.rpmrlibreoffice-help-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmElibreoffice-langpack-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm'autocorr-pt-7.1.8.1-13.el9_4.alma.1.noarch.rpmLlibreoffice-core-7.1.8.1-13.el9_4.alma.1.x86_64.rpmGlibreoffice-langpack-zu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-bg-7.1.8.1-13.el9_4.alma.1.noarch.rpmllibreoffice-help-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-mai-7.1.8.1-13.el9_4.alma.1.x86_64.rpmhlibreoffice-help-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm-autocorr-sv-7.1.8.1-13.el9_4.alma.1.noarch.rpm!libreoffice-langpack-kk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmVlibreoffice-help-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpmmlibreoffice-help-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpmJlibreoffice-pdfimport-7.1.8.1-13.el9_4.alma.1.x86_64.rpmYlibreoffice-help-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm_libreoffice-help-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-ga-7.1.8.1-13.el9_4.alma.1.noarch.rpmOlibreoffice-x11-7.1.8.1-13.el9_4.alma.1.x86_64.rpm6libreoffice-langpack-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm[libreoffice-help-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpm7libreoffice-langpack-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmolibreoffice-help-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpmdlibreoffice-help-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmblibreoffice-help-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-13.el9_4.alma.1.x86_64.rpmKlibreoffice-pyuno-7.1.8.1-13.el9_4.alma.1.x86_64.rpm4libreoffice-langpack-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpm@libreoffice-langpack-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-it-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-hsb-7.1.8.1-13.el9_4.alma.1.noarch.rpm9libreoffice-langpack-ss-7.1.8.1-13.el9_4.alma.1.x86_64.rpm$libreoffice-langpack-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpmvlibreoffice-help-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpm~libreoffice-help-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmPlibreoffice-xsltfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpmIlibreoffice-ogltrans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1Plibreoffice-gdb-debug-support-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpm?libreoffice-langpack-tn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmDlibreoffice-data-7.1.8.1-13.el9_4.alma.1.noarch.rpm)autocorr-ru-7.1.8.1-13.el9_4.alma.1.noarch.rpm-libreoffice-langpack-nso-7.1.8.1-13.el9_4.alma.1.x86_64.rpmxlibreoffice-help-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpm>libreoffice-langpack-th-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-hr-7.1.8.1-13.el9_4.alma.1.noarch.rpmtlibreoffice-help-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpm{libreoffice-help-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm autocorr-ja-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm;libreoffice-langpack-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmHlibreoffice-math-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm2libreoffice-langpack-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpmplibreoffice-help-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmilibreoffice-help-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fy-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmqlibreoffice-help-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-impress-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1autocorr-zh-7.1.8.1-13.el9_4.alma.1.noarch.rpmKlibreoffice-calc-7.1.8.1-13.el9_4.alma.1.x86_64.rpm*libreoffice-langpack-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm$autocorr-mn-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpmWlibreoffice-help-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpmglibreoffice-help-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm`libreoffice-help-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm"libreoffice-langpack-kn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpm&autocorr-pl-7.1.8.1-13.el9_4.alma.1.noarch.rpm|libreoffice-help-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm'libreoffice-langpack-ml-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-el-7.1.8.1-13.el9_4.alma.1.noarch.rpm=libreoffice-langpack-te-7.1.8.1-13.el9_4.alma.1.x86_64.rpmXlibreoffice-help-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm/autocorr-vi-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm#autocorr-lt-7.1.8.1-13.el9_4.alma.1.noarch.rpm<libreoffice-langpack-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm"autocorr-lb-7.1.8.1-13.el9_4.alma.1.noarch.rpm(autocorr-ro-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-fi-7.1.8.1-13.el9_4.alma.1.noarch.rpm libreoffice-langpack-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpmZlibreoffice-help-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMlibreoffice-wiki-publisher-7.1.8.1-13.el9_4.alma.1.x86_64.rpm autocorr-af-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm.libreoffice-langpack-or-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMlibreoffice-draw-7.1.8.1-13.el9_4.alma.1.x86_64.rpm%autocorr-nl-7.1.8.1-13.el9_4.alma.1.noarch.rpmRlibreoffice-gtk3-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-en-7.1.8.1-13.el9_4.alma.1.noarch.rpm#libreoffice-langpack-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNlibreoffice-emailmerge-7.1.8.1-13.el9_4.alma.1.x86_64.rpm0autocorr-vro-7.1.8.1-13.el9_4.alma.1.noarch.rpmnlibreoffice-help-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-da-7.1.8.1-13.el9_4.alma.1.noarch.rpmBlibreoffice-langpack-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm}libreoffice-help-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm3libreoffice-langpack-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpm,autocorr-sr-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-fa-7.1.8.1-13.el9_4.alma.1.noarch.rpm+autocorr-sl-7.1.8.1-13.el9_4.alma.1.noarch.rpm\libreoffice-help-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-hu-7.1.8.1-13.el9_4.alma.1.noarch.rpmylibreoffice-help-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNlibreoffice-writer-7.1.8.1-13.el9_4.alma.1.x86_64.rpm(libreoffice-langpack-mr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmAlibreoffice-langpack-ts-7.1.8.1-13.el9_4.alma.1.x86_64.rpmflibreoffice-help-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmklibreoffice-help-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-cy-7.1.8.1-13.el9_4.alma.1.x86_64.rpmJlibreoffice-base-7.1.8.1-13.el9_4.alma.1.x86_64.rpm:libreoffice-langpack-st-7.1.8.1-13.el9_4.alma.1.x86_64.rpmClibreoffice-langpack-ve-7.1.8.1-13.el9_4.alma.1.x86_64.rpmwlibreoffice-help-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpm/libreoffice-langpack-pa-7.1.8.1-13.el9_4.alma.1.x86_64.rpmQlibreofficekit-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-de-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-ca-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-dsb-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpmDlibreoffice-langpack-xh-7.1.8.1-13.el9_4.alma.1.x86_64.rpm*autocorr-sk-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpmalibreoffice-help-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmclibreoffice-help-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmElibreoffice-opensymbol-fonts-7.1.8.1-13.el9_4.alma.1.noarch.rpm7libreoffice-7.1.8.1-13.el9_4.alma.1.x86_64.rpmslibreoffice-help-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpmjlibreoffice-help-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpm.autocorr-tr-7.1.8.1-13.el9_4.alma.1.noarch.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpmLlibreoffice-ure-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-fr-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-is-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ga-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpm5libreoffice-langpack-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-cs-7.1.8.1-13.el9_4.alma.1.noarch.rpm+libreoffice-langpack-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm)libreoffice-langpack-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpm^libreoffice-help-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-fa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpmOlibreoffice-filters-7.1.8.1-13.el9_4.alma.1.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-13.el9_4.alma.1.noarch.rpmulibreoffice-help-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmUlibreoffice-help-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm]libreoffice-help-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpmelibreoffice-help-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpm!autocorr-ko-7.1.8.1-13.el9_4.alma.1.noarch.rpmrlibreoffice-help-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmElibreoffice-langpack-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm'autocorr-pt-7.1.8.1-13.el9_4.alma.1.noarch.rpmLlibreoffice-core-7.1.8.1-13.el9_4.alma.1.x86_64.rpmGlibreoffice-langpack-zu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-bg-7.1.8.1-13.el9_4.alma.1.noarch.rpmllibreoffice-help-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-mai-7.1.8.1-13.el9_4.alma.1.x86_64.rpmhlibreoffice-help-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm-autocorr-sv-7.1.8.1-13.el9_4.alma.1.noarch.rpm!libreoffice-langpack-kk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmVlibreoffice-help-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpmmlibreoffice-help-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpmJlibreoffice-pdfimport-7.1.8.1-13.el9_4.alma.1.x86_64.rpmYlibreoffice-help-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm_libreoffice-help-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-ga-7.1.8.1-13.el9_4.alma.1.noarch.rpmOlibreoffice-x11-7.1.8.1-13.el9_4.alma.1.x86_64.rpm6libreoffice-langpack-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm[libreoffice-help-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpm7libreoffice-langpack-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmolibreoffice-help-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpmdlibreoffice-help-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmblibreoffice-help-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-13.el9_4.alma.1.x86_64.rpmKlibreoffice-pyuno-7.1.8.1-13.el9_4.alma.1.x86_64.rpm4libreoffice-langpack-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpm@libreoffice-langpack-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmautocorr-it-7.1.8.1-13.el9_4.alma.1.noarch.rpmautocorr-hsb-7.1.8.1-13.el9_4.alma.1.noarch.rpm9libreoffice-langpack-ss-7.1.8.1-13.el9_4.alma.1.x86_64.rpm$libreoffice-langpack-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpmvlibreoffice-help-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpm~libreoffice-help-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmPlibreoffice-xsltfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpmIlibreoffice-ogltrans-7.1.8.1-13.el9_4.alma.1.x86_64.rpmb FBsecurityModerate: libuv security update7whttps://access.redhat.com/errata/RHSA-2024:4756RHSA-2024:4756RHSA-2024:4756 https://access.redhat.com/security/cve/CVE-2024-24806CVE-2024-24806CVE-2024-24806https://bugzilla.redhat.com/22632922263292https://errata.almalinux.org/9/ALSA-2024-4756.htmlALSA-2024:4756ALSA-2024:4756 K2libuv-1.42.0-2.el9_4.i686.rpmK2libuv-1.42.0-2.el9_4.x86_64.rpmK2libuv-1.42.0-2.el9_4.i686.rpmK2libuv-1.42.0-2.el9_4.x86_64.rpm0 JBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update.\https://access.redhat.com/errata/RHSA-2024:4757RHSA-2024:4757RHSA-2024:4757 https://access.redhat.com/security/cve/CVE-2024-4418CVE-2024-4418CVE-2024-4418https://bugzilla.redhat.com/22786162278616https://errata.almalinux.org/9/ALSA-2024-4757.htmlALSA-2024:4757ALSA-2024:4757 .libvirt-libs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm<.libvirt-daemon-proxy-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-disk-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-kvm-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-daemon-driver-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-nss-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-daemon-driver-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-logical-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-daemon-driver-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm;.libvirt-daemon-plugin-lockd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm:.libvirt-daemon-log-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-config-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-iscsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-config-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-rbd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-core-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-client-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-mpath-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-interface-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-daemon-driver-nodedev-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-daemon-driver-secret-10.0.0-6.6.el9_4.alma.1.x86_64.rpm9.libvirt-daemon-lock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-10.0.0-6.6.el9_4.alma.1.x86_64.rpmI.libvirt-client-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm8.libvirt-daemon-common-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-scsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-libs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm<.libvirt-daemon-proxy-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-disk-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-kvm-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-daemon-driver-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-nss-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-daemon-driver-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-logical-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-daemon-driver-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm;.libvirt-daemon-plugin-lockd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm:.libvirt-daemon-log-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-config-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-iscsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-config-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-rbd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-core-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-client-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-mpath-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-interface-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-daemon-driver-nodedev-10.0.0-6.6.el9_4.alma.1.x86_64.rpm .libvirt-daemon-driver-secret-10.0.0-6.6.el9_4.alma.1.x86_64.rpm9.libvirt-daemon-lock-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-10.0.0-6.6.el9_4.alma.1.x86_64.rpmI.libvirt-client-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm8.libvirt-daemon-common-10.0.0-6.6.el9_4.alma.1.x86_64.rpm.libvirt-daemon-driver-storage-scsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm  CsecurityImportant: containernetworking-plugins security update https://access.redhat.com/errata/RHSA-2024:4761RHSA-2024:4761RHSA-2024:4761 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4761.htmlALSA-2024:4761ALSA-2024:4761 ^icontainernetworking-plugins-1.4.0-4.el9_4.x86_64.rpm^icontainernetworking-plugins-1.4.0-4.el9_4.x86_64.rpmf FsecurityImportant: runc security update1https://access.redhat.com/errata/RHSA-2024:4762RHSA-2024:4762RHSA-2024:4762 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4762.htmlALSA-2024:4762ALSA-2024:4762  arunc-1.1.12-3.el9_4.x86_64.rpm arunc-1.1.12-3.el9_4.x86_64.rpmW IBBBBBBBBsecurityLow: python3 security update*B,https://access.redhat.com/errata/RHSA-2024:4766RHSA-2024:4766RHSA-2024:4766 https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4766.htmlALSA-2024:4766ALSA-2024:4766 aFpython3.11-libs-3.11.7-1.el9_4.3.i686.rpm`Fpython3.11-devel-3.11.7-1.el9_4.3.i686.rpmaFpython3.11-libs-3.11.7-1.el9_4.3.x86_64.rpmjFpython3.11-tkinter-3.11.7-1.el9_4.3.x86_64.rpmiFpython3.11-3.11.7-1.el9_4.3.x86_64.rpm`Fpython3.11-devel-3.11.7-1.el9_4.3.x86_64.rpmaFpython3.11-libs-3.11.7-1.el9_4.3.i686.rpm`Fpython3.11-devel-3.11.7-1.el9_4.3.i686.rpmaFpython3.11-libs-3.11.7-1.el9_4.3.x86_64.rpmjFpython3.11-tkinter-3.11.7-1.el9_4.3.x86_64.rpmiFpython3.11-3.11.7-1.el9_4.3.x86_64.rpm`Fpython3.11-devel-3.11.7-1.el9_4.3.x86_64.rpm "TBBBBBBBBBBBBsecurityModerate: cups security updaten https://access.redhat.com/errata/RHSA-2024:4776RHSA-2024:4776RHSA-2024:4776 https://access.redhat.com/security/cve/CVE-2024-35235CVE-2024-35235CVE-2024-35235https://bugzilla.redhat.com/22903182290318https://errata.almalinux.org/9/ALSA-2024-4776.htmlALSA-2024:4776ALSA-2024:4776 cups-devel-2.3.3op2-27.el9_4.i686.rpm=cups-client-2.3.3op2-27.el9_4.x86_64.rpm@cups-printerapp-2.3.3op2-27.el9_4.x86_64.rpm2cups-filesystem-2.3.3op2-27.el9_4.noarch.rpm>cups-ipptool-2.3.3op2-27.el9_4.x86_64.rpmcups-devel-2.3.3op2-27.el9_4.x86_64.rpm<cups-2.3.3op2-27.el9_4.x86_64.rpm?cups-lpd-2.3.3op2-27.el9_4.x86_64.rpmcups-devel-2.3.3op2-27.el9_4.i686.rpm=cups-client-2.3.3op2-27.el9_4.x86_64.rpm@cups-printerapp-2.3.3op2-27.el9_4.x86_64.rpm2cups-filesystem-2.3.3op2-27.el9_4.noarch.rpm>cups-ipptool-2.3.3op2-27.el9_4.x86_64.rpmcups-devel-2.3.3op2-27.el9_4.x86_64.rpm<cups-2.3.3op2-27.el9_4.x86_64.rpm?cups-lpd-2.3.3op2-27.el9_4.x86_64.rpm )cBBBBsecurityLow: python3 security update*x,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779 https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779 W python3-devel-3.9.18-3.el9_4.3.x86_64.rpmj python-unversioned-command-3.9.18-3.el9_4.3.noarch.rpm= python3-tkinter-3.9.18-3.el9_4.3.x86_64.rpmW python3-devel-3.9.18-3.el9_4.3.i686.rpmW python3-devel-3.9.18-3.el9_4.3.x86_64.rpmj python-unversioned-command-3.9.18-3.el9_4.3.noarch.rpm= python3-tkinter-3.9.18-3.el9_4.3.x86_64.rpmW python3-devel-3.9.18-3.el9_4.3.i686.rpm7 ,jsecurityModerate: squid security update$~https://access.redhat.com/errata/RHSA-2024:4861RHSA-2024:4861RHSA-2024:4861 https://access.redhat.com/security/cve/CVE-2024-23638CVE-2024-23638CVE-2024-23638https://access.redhat.com/security/cve/CVE-2024-37894CVE-2024-37894CVE-2024-37894https://bugzilla.redhat.com/22600512260051https://bugzilla.redhat.com/22943532294353https://errata.almalinux.org/9/ALSA-2024-4861.htmlALSA-2024:4861ALSA-2024:4861  squid-5.5-13.el9_4.x86_64.rpm squid-5.5-13.el9_4.x86_64.rpmI >mBBBBBBBBBBBBBBBsecurityModerate: kernel security update"1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928 https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928 %,perf-5.14.0-427.28.1.el9_4.x86_64.rpm$,kernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm#,kernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm,kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm',rtla-5.14.0-427.28.1.el9_4.x86_64.rpm",kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm&,kernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm!,kernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm),rv-5.14.0-427.28.1.el9_4.x86_64.rpm %,perf-5.14.0-427.28.1.el9_4.x86_64.rpm$,kernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm#,kernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm,kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm',rtla-5.14.0-427.28.1.el9_4.x86_64.rpm",kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm&,kernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm!,kernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm),rv-5.14.0-427.28.1.el9_4.x86_64.rpmM BBBBBBBBBBBBsecurityImportant: freeradius security updateSGhttps://access.redhat.com/errata/RHSA-2024:4935RHSA-2024:4935RHSA-2024:4935 https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-4935.htmlALSA-2024:4935ALSA-2024:4935 4yfreeradius-krb5-3.0.21-40.el9_4.x86_64.rpm2yfreeradius-devel-3.0.21-40.el9_4.x86_64.rpmdypython3-freeradius-3.0.21-40.el9_4.x86_64.rpm3yfreeradius-doc-3.0.21-40.el9_4.x86_64.rpm5yfreeradius-ldap-3.0.21-40.el9_4.x86_64.rpm6yfreeradius-utils-3.0.21-40.el9_4.x86_64.rpm1yfreeradius-3.0.21-40.el9_4.x86_64.rpm4yfreeradius-krb5-3.0.21-40.el9_4.x86_64.rpm2yfreeradius-devel-3.0.21-40.el9_4.x86_64.rpmdypython3-freeradius-3.0.21-40.el9_4.x86_64.rpm3yfreeradius-doc-3.0.21-40.el9_4.x86_64.rpm5yfreeradius-ldap-3.0.21-40.el9_4.x86_64.rpm6yfreeradius-utils-3.0.21-40.el9_4.x86_64.rpm1yfreeradius-3.0.21-40.el9_4.x86_64.rpmʚN "NBBBBBBBBBBBBBBBBBBsecurityImportant: httpd security update.https://access.redhat.com/errata/RHSA-2024:5138RHSA-2024:5138RHSA-2024:5138 https://access.redhat.com/security/cve/CVE-2024-38476CVE-2024-38476CVE-2024-38476https://bugzilla.redhat.com/22950152295015https://errata.almalinux.org/9/ALSA-2024-5138.htmlALSA-2024:5138ALSA-2024:5138 ~Emod_ldap-2.4.57-11.el9_4.1.x86_64.rpmhEhttpd-2.4.57-11.el9_4.1.x86_64.rpmmod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpm1Ehttpd-manual-2.4.57-11.el9_4.1.noarch.rpmjEhttpd-devel-2.4.57-11.el9_4.1.x86_64.rpm0Ehttpd-filesystem-2.4.57-11.el9_4.1.noarch.rpmEmod_lua-2.4.57-11.el9_4.1.x86_64.rpmEmod_session-2.4.57-11.el9_4.1.x86_64.rpmiEhttpd-core-2.4.57-11.el9_4.1.x86_64.rpmmod_ssl-2.4.57-11.el9_4.1.x86_64.rpmkEhttpd-tools-2.4.57-11.el9_4.1.x86_64.rpm ~Emod_ldap-2.4.57-11.el9_4.1.x86_64.rpmhEhttpd-2.4.57-11.el9_4.1.x86_64.rpmmod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpm1Ehttpd-manual-2.4.57-11.el9_4.1.noarch.rpmjEhttpd-devel-2.4.57-11.el9_4.1.x86_64.rpm0Ehttpd-filesystem-2.4.57-11.el9_4.1.noarch.rpmEmod_lua-2.4.57-11.el9_4.1.x86_64.rpmEmod_session-2.4.57-11.el9_4.1.x86_64.rpmiEhttpd-core-2.4.57-11.el9_4.1.x86_64.rpmmod_ssl-2.4.57-11.el9_4.1.x86_64.rpmkEhttpd-tools-2.4.57-11.el9_4.1.x86_64.rpmԫ}  (cBBBsecurityModerate: 389-ds-base security updateHjhttps://access.redhat.com/errata/RHSA-2024:5192RHSA-2024:5192RHSA-2024:5192 https://access.redhat.com/security/cve/CVE-2024-5953CVE-2024-5953CVE-2024-5953https://access.redhat.com/security/cve/CVE-2024-6237CVE-2024-6237CVE-2024-6237https://bugzilla.redhat.com/22921042292104https://bugzilla.redhat.com/22935792293579https://errata.almalinux.org/9/ALSA-2024-5192.htmlALSA-2024:5192ALSA-2024:5192  o389-ds-base-2.4.5-9.el9_4.x86_64.rpmpopython3-lib389-2.4.5-9.el9_4.noarch.rpmo389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpm o389-ds-base-2.4.5-9.el9_4.x86_64.rpmpopython3-lib389-2.4.5-9.el9_4.noarch.rpmo389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpm>! 8iBBBBBBBBBBBBBsecurityImportant: bind and bind-dyndb-ldap security update2"https://access.redhat.com/errata/RHSA-2024:5231RHSA-2024:5231RHSA-2024:5231 https://access.redhat.com/security/cve/CVE-2024-1737CVE-2024-1737CVE-2024-1737https://access.redhat.com/security/cve/CVE-2024-1975CVE-2024-1975CVE-2024-1975https://access.redhat.com/security/cve/CVE-2024-4076CVE-2024-4076CVE-2024-4076https://bugzilla.redhat.com/22988932298893https://bugzilla.redhat.com/22989012298901https://bugzilla.redhat.com/22989042298904https://errata.almalinux.org/9/ALSA-2024-5231.htmlALSA-2024:5231ALSA-2024:5231 \Jbind-libs-9.16.23-18.el9_4.6.x86_64.rpm]Jbind-utils-9.16.23-18.el9_4.6.x86_64.rpm7Jpython3-bind-9.16.23-18.el9_4.6.noarch.rpmZJbind-chroot-9.16.23-18.el9_4.6.x86_64.rpm`Hbind-dyndb-ldap-11.9-10.el9_4.alma.1.x86_64.rpm*Jbind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm+Jbind-license-9.16.23-18.el9_4.6.noarch.rpmYJbind-9.16.23-18.el9_4.6.x86_64.rpm[Jbind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpm \Jbind-libs-9.16.23-18.el9_4.6.x86_64.rpm]Jbind-utils-9.16.23-18.el9_4.6.x86_64.rpm7Jpython3-bind-9.16.23-18.el9_4.6.noarch.rpmZJbind-chroot-9.16.23-18.el9_4.6.x86_64.rpm`Hbind-dyndb-ldap-11.9-10.el9_4.alma.1.x86_64.rpm*Jbind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpm+Jbind-license-9.16.23-18.el9_4.6.noarch.rpmYJbind-9.16.23-18.el9_4.6.x86_64.rpm[Jbind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpmq" ;ysecurityImportant: python3.11-setuptools security updateThttps://access.redhat.com/errata/RHSA-2024:5279RHSA-2024:5279RHSA-2024:5279 https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5279.htmlALSA-2024:5279ALSA-2024:5279 jpython3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpmipython3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpmjpython3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpmipython3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm5# |BBsecurityImportant: firefox security updatekhttps://access.redhat.com/errata/RHSA-2024:5322RHSA-2024:5322RHSA-2024:5322 https://access.redhat.com/security/cve/CVE-2024-7518CVE-2024-7518CVE-2024-7518https://access.redhat.com/security/cve/CVE-2024-7519CVE-2024-7519CVE-2024-7519https://access.redhat.com/security/cve/CVE-2024-7520CVE-2024-7520CVE-2024-7520https://access.redhat.com/security/cve/CVE-2024-7521CVE-2024-7521CVE-2024-7521https://access.redhat.com/security/cve/CVE-2024-7522CVE-2024-7522CVE-2024-7522https://access.redhat.com/security/cve/CVE-2024-7524CVE-2024-7524CVE-2024-7524https://access.redhat.com/security/cve/CVE-2024-7525CVE-2024-7525CVE-2024-7525https://access.redhat.com/security/cve/CVE-2024-7526CVE-2024-7526CVE-2024-7526https://access.redhat.com/security/cve/CVE-2024-7527CVE-2024-7527CVE-2024-7527https://access.redhat.com/security/cve/CVE-2024-7528CVE-2024-7528CVE-2024-7528https://access.redhat.com/security/cve/CVE-2024-7529CVE-2024-7529CVE-2024-7529https://bugzilla.redhat.com/23031352303135https://bugzilla.redhat.com/23031362303136https://bugzilla.redhat.com/23031372303137https://bugzilla.redhat.com/23031382303138https://bugzilla.redhat.com/23031392303139https://bugzilla.redhat.com/23031412303141https://bugzilla.redhat.com/23031422303142https://bugzilla.redhat.com/23031432303143https://bugzilla.redhat.com/23031442303144https://bugzilla.redhat.com/23031452303145https://bugzilla.redhat.com/23031462303146https://errata.almalinux.org/9/ALSA-2024-5322.htmlALSA-2024:5322ALSA-2024:5322 Qzfirefox-x11-115.14.0-2.el9_4.alma.1.x86_64.rpm8zfirefox-115.14.0-2.el9_4.alma.1.x86_64.rpmQzfirefox-x11-115.14.0-2.el9_4.alma.1.x86_64.rpm8zfirefox-115.14.0-2.el9_4.alma.1.x86_64.rpm^$ ABBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 8.0 security update|}https://access.redhat.com/errata/RHSA-2024:5334RHSA-2024:5334RHSA-2024:5334 https://access.redhat.com/security/cve/CVE-2024-38167CVE-2024-38167CVE-2024-38167https://bugzilla.redhat.com/23024282302428https://errata.almalinux.org/9/ALSA-2024-5334.htmlALSA-2024:5334ALSA-2024:5334 Hrdotnet-templates-8.0-8.0.108-1.el9_4.x86_64.rpmrnetstandard-targeting-pack-2.1-8.0.108-1.el9_4.x86_64.rpm+rdotnet-sdk-dbg-8.0-8.0.108-1.el9_4.x86_64.rpm@dotnet-hostfxr-8.0-8.0.8-1.el9_4.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.8-1.el9_4.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpmDrdotnet-sdk-8.0-8.0.108-1.el9_4.x86_64.rpmBdotnet-runtime-8.0-8.0.8-1.el9_4.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm:aspnetcore-runtime-8.0-8.0.8-1.el9_4.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpmdotnet-host-8.0.8-1.el9_4.x86_64.rpm Hrdotnet-templates-8.0-8.0.108-1.el9_4.x86_64.rpmrnetstandard-targeting-pack-2.1-8.0.108-1.el9_4.x86_64.rpm+rdotnet-sdk-dbg-8.0-8.0.108-1.el9_4.x86_64.rpm@dotnet-hostfxr-8.0-8.0.8-1.el9_4.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.8-1.el9_4.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpmDrdotnet-sdk-8.0-8.0.108-1.el9_4.x86_64.rpmBdotnet-runtime-8.0-8.0.8-1.el9_4.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpm:aspnetcore-runtime-8.0-8.0.8-1.el9_4.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpmdotnet-host-8.0.8-1.el9_4.x86_64.rpmV% -\BBBBBBBBBBBBBBBsecurityImportant: kernel security updatey4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363 https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363 $-kernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm&-kernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm)-rv-5.14.0-427.31.1.el9_4.x86_64.rpm#-kernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm'-rtla-5.14.0-427.31.1.el9_4.x86_64.rpm"-kernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm-kernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm%-perf-5.14.0-427.31.1.el9_4.x86_64.rpm!-kernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm $-kernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm&-kernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm)-rv-5.14.0-427.31.1.el9_4.x86_64.rpm#-kernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm'-rtla-5.14.0-427.31.1.el9_4.x86_64.rpm"-kernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm-kernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm%-perf-5.14.0-427.31.1.el9_4.x86_64.rpm!-kernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpmy& 0nsecurityImportant: thunderbird security update-https://access.redhat.com/errata/RHSA-2024:5392RHSA-2024:5392RHSA-2024:5392 https://access.redhat.com/security/cve/CVE-2024-7518CVE-2024-7518CVE-2024-7518https://access.redhat.com/security/cve/CVE-2024-7519CVE-2024-7519CVE-2024-7519https://access.redhat.com/security/cve/CVE-2024-7520CVE-2024-7520CVE-2024-7520https://access.redhat.com/security/cve/CVE-2024-7521CVE-2024-7521CVE-2024-7521https://access.redhat.com/security/cve/CVE-2024-7522CVE-2024-7522CVE-2024-7522https://access.redhat.com/security/cve/CVE-2024-7525CVE-2024-7525CVE-2024-7525https://access.redhat.com/security/cve/CVE-2024-7526CVE-2024-7526CVE-2024-7526https://access.redhat.com/security/cve/CVE-2024-7527CVE-2024-7527CVE-2024-7527https://access.redhat.com/security/cve/CVE-2024-7528CVE-2024-7528CVE-2024-7528https://access.redhat.com/security/cve/CVE-2024-7529CVE-2024-7529CVE-2024-7529https://bugzilla.redhat.com/23031352303135https://bugzilla.redhat.com/23031362303136https://bugzilla.redhat.com/23031372303137https://bugzilla.redhat.com/23031382303138https://bugzilla.redhat.com/23031392303139https://bugzilla.redhat.com/23031422303142https://bugzilla.redhat.com/23031432303143https://bugzilla.redhat.com/23031442303144https://bugzilla.redhat.com/23031452303145https://bugzilla.redhat.com/23031462303146https://errata.almalinux.org/9/ALSA-2024-5392.htmlALSA-2024:5392ALSA-2024:5392 :Nthunderbird-115.14.0-1.el9_4.alma.1.x86_64.rpm:Nthunderbird-115.14.0-1.el9_4.alma.1.x86_64.rpmf' 4qBsecurityModerate: curl security updateD(https://access.redhat.com/errata/RHSA-2024:5529RHSA-2024:5529RHSA-2024:5529 https://access.redhat.com/security/cve/CVE-2024-2398CVE-2024-2398CVE-2024-2398https://bugzilla.redhat.com/22704982270498https://errata.almalinux.org/9/ALSA-2024-5529.htmlALSA-2024:5529ALSA-2024:5529 ulibcurl-devel-7.76.1-29.el9_4.1.i686.rpmulibcurl-devel-7.76.1-29.el9_4.1.x86_64.rpmulibcurl-devel-7.76.1-29.el9_4.1.i686.rpmulibcurl-devel-7.76.1-29.el9_4.1.x86_64.rpm*( 65securityImportant: python3.12-setuptools security updatelhttps://access.redhat.com/errata/RHSA-2024:5533RHSA-2024:5533RHSA-2024:5533 https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5533.htmlALSA-2024:5533ALSA-2024:5533 lYpython3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpmlYpython3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm_) 1wBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update{https://access.redhat.com/errata/RHSA-2024:5583RHSA-2024:5583RHSA-2024:5583 https://access.redhat.com/security/cve/CVE-2024-6472CVE-2024-6472CVE-2024-6472https://bugzilla.redhat.com/23028662302866https://errata.almalinux.org/9/ALSA-2024-5583.htmlALSA-2024:5583ALSA-2024:5583 1klibreoffice-help-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpm5libreoffice-langpack-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm&autocorr-pl-7.1.8.1-14.el9_4.alma.1.noarch.rpmOlibreoffice-filters-7.1.8.1-14.el9_4.alma.1.x86_64.rpmclibreoffice-help-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1autocorr-zh-7.1.8.1-14.el9_4.alma.1.noarch.rpm"autocorr-lb-7.1.8.1-14.el9_4.alma.1.noarch.rpm;libreoffice-langpack-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmllibreoffice-help-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpmVlibreoffice-help-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm'libreoffice-langpack-ml-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpmhlibreoffice-help-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-fr-7.1.8.1-14.el9_4.alma.1.noarch.rpmNlibreoffice-emailmerge-7.1.8.1-14.el9_4.alma.1.x86_64.rpmrlibreoffice-help-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpmUlibreoffice-help-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm=libreoffice-langpack-te-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpmtlibreoffice-help-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm!autocorr-ko-7.1.8.1-14.el9_4.alma.1.noarch.rpmvlibreoffice-help-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpmMlibreoffice-draw-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm_libreoffice-help-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpmXlibreoffice-help-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm4libreoffice-langpack-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpm%autocorr-nl-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-en-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm\libreoffice-help-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-dsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmxlibreoffice-help-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-is-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-ga-7.1.8.1-14.el9_4.alma.1.noarch.rpmelibreoffice-help-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-14.el9_4.alma.1.noarch.rpmslibreoffice-help-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpmDlibreoffice-langpack-xh-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm0autocorr-vro-7.1.8.1-14.el9_4.alma.1.noarch.rpm~libreoffice-help-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-14.el9_4.alma.1.noarch.rpm[libreoffice-help-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpmolibreoffice-help-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpmWlibreoffice-help-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm7libreoffice-7.1.8.1-14.el9_4.alma.1.x86_64.rpmDlibreoffice-data-7.1.8.1-14.el9_4.alma.1.noarch.rpmnlibreoffice-help-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm!libreoffice-langpack-kk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpm/libreoffice-langpack-pa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-mai-7.1.8.1-14.el9_4.alma.1.x86_64.rpmylibreoffice-help-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm-libreoffice-langpack-nso-7.1.8.1-14.el9_4.alma.1.x86_64.rpmJlibreoffice-base-7.1.8.1-14.el9_4.alma.1.x86_64.rpmulibreoffice-help-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm,autocorr-sr-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-fi-7.1.8.1-14.el9_4.alma.1.noarch.rpmblibreoffice-help-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpm autocorr-ja-7.1.8.1-14.el9_4.alma.1.noarch.rpmIlibreoffice-ogltrans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm}libreoffice-help-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmJlibreoffice-pdfimport-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm*libreoffice-langpack-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-hr-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-fa-7.1.8.1-14.el9_4.alma.1.noarch.rpm#libreoffice-langpack-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpm6libreoffice-langpack-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmqlibreoffice-help-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmLlibreoffice-core-7.1.8.1-14.el9_4.alma.1.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpm)autocorr-ru-7.1.8.1-14.el9_4.alma.1.noarch.rpmmlibreoffice-help-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-14.el9_4.alma.1.x86_64.rpm(autocorr-ro-7.1.8.1-14.el9_4.alma.1.noarch.rpmPlibreoffice-xsltfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpmZlibreoffice-help-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpmflibreoffice-help-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm<libreoffice-langpack-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpm#autocorr-lt-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-ca-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpmglibreoffice-help-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpm^libreoffice-help-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpmNlibreoffice-writer-7.1.8.1-14.el9_4.alma.1.x86_64.rpmQlibreofficekit-7.1.8.1-14.el9_4.alma.1.x86_64.rpm7libreoffice-langpack-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmAlibreoffice-langpack-ts-7.1.8.1-14.el9_4.alma.1.x86_64.rpmOlibreoffice-x11-7.1.8.1-14.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-it-7.1.8.1-14.el9_4.alma.1.noarch.rpm@libreoffice-langpack-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm.libreoffice-langpack-or-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-14.el9_4.alma.1.x86_64.rpmKlibreoffice-pyuno-7.1.8.1-14.el9_4.alma.1.x86_64.rpm autocorr-af-7.1.8.1-14.el9_4.alma.1.noarch.rpm2libreoffice-langpack-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm)libreoffice-langpack-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm]libreoffice-help-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpm$libreoffice-langpack-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-impress-7.1.8.1-14.el9_4.alma.1.x86_64.rpmalibreoffice-help-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm9libreoffice-langpack-ss-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpmElibreoffice-langpack-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm>libreoffice-langpack-th-7.1.8.1-14.el9_4.alma.1.x86_64.rpmPlibreoffice-gdb-debug-support-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-hu-7.1.8.1-14.el9_4.alma.1.noarch.rpm libreoffice-langpack-cy-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-bg-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmMlibreoffice-wiki-publisher-7.1.8.1-14.el9_4.alma.1.x86_64.rpmLlibreoffice-ure-7.1.8.1-14.el9_4.alma.1.x86_64.rpmjlibreoffice-help-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-da-7.1.8.1-14.el9_4.alma.1.noarch.rpm`libreoffice-help-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fy-7.1.8.1-14.el9_4.alma.1.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-de-7.1.8.1-14.el9_4.alma.1.noarch.rpmRlibreoffice-gtk3-7.1.8.1-14.el9_4.alma.1.x86_64.rpmwlibreoffice-help-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm-autocorr-sv-7.1.8.1-14.el9_4.alma.1.noarch.rpm'autocorr-pt-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-cs-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpm+libreoffice-langpack-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm/autocorr-vi-7.1.8.1-14.el9_4.alma.1.noarch.rpm"libreoffice-langpack-kn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpm*autocorr-sk-7.1.8.1-14.el9_4.alma.1.noarch.rpm3libreoffice-langpack-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-hsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmHlibreoffice-math-7.1.8.1-14.el9_4.alma.1.x86_64.rpmilibreoffice-help-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm|libreoffice-help-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm{libreoffice-help-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpmYlibreoffice-help-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmElibreoffice-opensymbol-fonts-7.1.8.1-14.el9_4.alma.1.noarch.rpm.autocorr-tr-7.1.8.1-14.el9_4.alma.1.noarch.rpmClibreoffice-langpack-ve-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ga-7.1.8.1-14.el9_4.alma.1.x86_64.rpm+autocorr-sl-7.1.8.1-14.el9_4.alma.1.noarch.rpmGlibreoffice-langpack-zu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm$autocorr-mn-7.1.8.1-14.el9_4.alma.1.noarch.rpm:libreoffice-langpack-st-7.1.8.1-14.el9_4.alma.1.x86_64.rpmdlibreoffice-help-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-el-7.1.8.1-14.el9_4.alma.1.noarch.rpm?libreoffice-langpack-tn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmKlibreoffice-calc-7.1.8.1-14.el9_4.alma.1.x86_64.rpmplibreoffice-help-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmBlibreoffice-langpack-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm(libreoffice-langpack-mr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1klibreoffice-help-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpm5libreoffice-langpack-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm&autocorr-pl-7.1.8.1-14.el9_4.alma.1.noarch.rpmOlibreoffice-filters-7.1.8.1-14.el9_4.alma.1.x86_64.rpmclibreoffice-help-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1autocorr-zh-7.1.8.1-14.el9_4.alma.1.noarch.rpm"autocorr-lb-7.1.8.1-14.el9_4.alma.1.noarch.rpm;libreoffice-langpack-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmllibreoffice-help-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpmVlibreoffice-help-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm'libreoffice-langpack-ml-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpmhlibreoffice-help-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-fr-7.1.8.1-14.el9_4.alma.1.noarch.rpmNlibreoffice-emailmerge-7.1.8.1-14.el9_4.alma.1.x86_64.rpmrlibreoffice-help-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmSlibreoffice-help-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpmUlibreoffice-help-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm=libreoffice-langpack-te-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpmtlibreoffice-help-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm!autocorr-ko-7.1.8.1-14.el9_4.alma.1.noarch.rpmvlibreoffice-help-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpmMlibreoffice-draw-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm_libreoffice-help-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpmXlibreoffice-help-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm4libreoffice-langpack-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpm%autocorr-nl-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-en-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm\libreoffice-help-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-dsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmxlibreoffice-help-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-is-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-ga-7.1.8.1-14.el9_4.alma.1.noarch.rpmelibreoffice-help-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpmFlibreoffice-ure-common-7.1.8.1-14.el9_4.alma.1.noarch.rpmslibreoffice-help-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpmDlibreoffice-langpack-xh-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-br-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm0autocorr-vro-7.1.8.1-14.el9_4.alma.1.noarch.rpm~libreoffice-help-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-es-7.1.8.1-14.el9_4.alma.1.noarch.rpm[libreoffice-help-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpmolibreoffice-help-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpmWlibreoffice-help-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm8libreoffice-langpack-sr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm7libreoffice-7.1.8.1-14.el9_4.alma.1.x86_64.rpmDlibreoffice-data-7.1.8.1-14.el9_4.alma.1.noarch.rpmnlibreoffice-help-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm!libreoffice-langpack-kk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpm/libreoffice-langpack-pa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm&libreoffice-langpack-mai-7.1.8.1-14.el9_4.alma.1.x86_64.rpmylibreoffice-help-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm-libreoffice-langpack-nso-7.1.8.1-14.el9_4.alma.1.x86_64.rpmJlibreoffice-base-7.1.8.1-14.el9_4.alma.1.x86_64.rpmulibreoffice-help-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm,autocorr-sr-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-fi-7.1.8.1-14.el9_4.alma.1.noarch.rpmblibreoffice-help-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmFlibreoffice-langpack-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpm autocorr-ja-7.1.8.1-14.el9_4.alma.1.noarch.rpmIlibreoffice-ogltrans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm}libreoffice-help-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmJlibreoffice-pdfimport-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm*libreoffice-langpack-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-hr-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-fa-7.1.8.1-14.el9_4.alma.1.noarch.rpm#libreoffice-langpack-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpm6libreoffice-langpack-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmqlibreoffice-help-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmLlibreoffice-core-7.1.8.1-14.el9_4.alma.1.x86_64.rpmQlibreoffice-graphicfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpm)autocorr-ru-7.1.8.1-14.el9_4.alma.1.noarch.rpmmlibreoffice-help-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-af-7.1.8.1-14.el9_4.alma.1.x86_64.rpm(autocorr-ro-7.1.8.1-14.el9_4.alma.1.noarch.rpmPlibreoffice-xsltfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpmZlibreoffice-help-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpmflibreoffice-help-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm<libreoffice-langpack-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpm#autocorr-lt-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-ca-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpmglibreoffice-help-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpm^libreoffice-help-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpmNlibreoffice-writer-7.1.8.1-14.el9_4.alma.1.x86_64.rpmQlibreofficekit-7.1.8.1-14.el9_4.alma.1.x86_64.rpm7libreoffice-langpack-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmAlibreoffice-langpack-ts-7.1.8.1-14.el9_4.alma.1.x86_64.rpmOlibreoffice-x11-7.1.8.1-14.el9_4.alma.1.x86_64.rpm,libreoffice-langpack-nr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-it-7.1.8.1-14.el9_4.alma.1.noarch.rpm@libreoffice-langpack-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm.libreoffice-langpack-or-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-as-7.1.8.1-14.el9_4.alma.1.x86_64.rpmKlibreoffice-pyuno-7.1.8.1-14.el9_4.alma.1.x86_64.rpm autocorr-af-7.1.8.1-14.el9_4.alma.1.noarch.rpm2libreoffice-langpack-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpm)libreoffice-langpack-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm%libreoffice-langpack-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm]libreoffice-help-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpmTlibreoffice-help-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpm$libreoffice-langpack-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-impress-7.1.8.1-14.el9_4.alma.1.x86_64.rpmalibreoffice-help-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm9libreoffice-langpack-ss-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpmElibreoffice-langpack-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpm>libreoffice-langpack-th-7.1.8.1-14.el9_4.alma.1.x86_64.rpmPlibreoffice-gdb-debug-support-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-hu-7.1.8.1-14.el9_4.alma.1.noarch.rpm libreoffice-langpack-cy-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-bg-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmMlibreoffice-wiki-publisher-7.1.8.1-14.el9_4.alma.1.x86_64.rpmLlibreoffice-ure-7.1.8.1-14.el9_4.alma.1.x86_64.rpmjlibreoffice-help-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-help-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-da-7.1.8.1-14.el9_4.alma.1.noarch.rpm`libreoffice-help-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-fy-7.1.8.1-14.el9_4.alma.1.x86_64.rpm0libreoffice-langpack-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-de-7.1.8.1-14.el9_4.alma.1.noarch.rpmRlibreoffice-gtk3-7.1.8.1-14.el9_4.alma.1.x86_64.rpmwlibreoffice-help-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpm-autocorr-sv-7.1.8.1-14.el9_4.alma.1.noarch.rpm'autocorr-pt-7.1.8.1-14.el9_4.alma.1.noarch.rpmautocorr-cs-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpm+libreoffice-langpack-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm/autocorr-vi-7.1.8.1-14.el9_4.alma.1.noarch.rpm"libreoffice-langpack-kn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpm*autocorr-sk-7.1.8.1-14.el9_4.alma.1.noarch.rpm3libreoffice-langpack-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-hsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmHlibreoffice-math-7.1.8.1-14.el9_4.alma.1.x86_64.rpmilibreoffice-help-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm|libreoffice-help-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm{libreoffice-help-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpmYlibreoffice-help-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmElibreoffice-opensymbol-fonts-7.1.8.1-14.el9_4.alma.1.noarch.rpm.autocorr-tr-7.1.8.1-14.el9_4.alma.1.noarch.rpmClibreoffice-langpack-ve-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ga-7.1.8.1-14.el9_4.alma.1.x86_64.rpm+autocorr-sl-7.1.8.1-14.el9_4.alma.1.noarch.rpmGlibreoffice-langpack-zu-7.1.8.1-14.el9_4.alma.1.x86_64.rpm$autocorr-mn-7.1.8.1-14.el9_4.alma.1.noarch.rpm:libreoffice-langpack-st-7.1.8.1-14.el9_4.alma.1.x86_64.rpmdlibreoffice-help-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmautocorr-el-7.1.8.1-14.el9_4.alma.1.noarch.rpm?libreoffice-langpack-tn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmKlibreoffice-calc-7.1.8.1-14.el9_4.alma.1.x86_64.rpmplibreoffice-help-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmzlibreoffice-help-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmBlibreoffice-langpack-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm(libreoffice-langpack-mr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm* :rBBBBBBsecurityImportant: tomcat security update~|https://access.redhat.com/errata/RHSA-2024:5693RHSA-2024:5693RHSA-2024:5693 https://access.redhat.com/security/cve/CVE-2024-34750CVE-2024-34750CVE-2024-34750https://bugzilla.redhat.com/22956512295651https://errata.almalinux.org/9/ALSA-2024-5693.htmlALSA-2024:5693ALSA-2024:5693 <|tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm>|tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpm?|tomcat-lib-9.0.87-1.el9_4.2.noarch.rpm@|tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpmA|tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm;|tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm=|tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm:|tomcat-9.0.87-1.el9_4.2.noarch.rpm<|tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpm>|tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpm?|tomcat-lib-9.0.87-1.el9_4.2.noarch.rpm@|tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpmA|tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpm;|tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpm=|tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpm:|tomcat-9.0.87-1.el9_4.2.noarch.rpm+ ABPkBBBBBBBsecurityModerate: nodejs:20 security updatez(https://access.redhat.com/errata/RHSA-2024:5815RHSA-2024:5815RHSA-2024:5815 https://access.redhat.com/security/cve/CVE-2024-22018CVE-2024-22018CVE-2024-22018https://access.redhat.com/security/cve/CVE-2024-22020CVE-2024-22020CVE-2024-22020https://access.redhat.com/security/cve/CVE-2024-36137CVE-2024-36137CVE-2024-36137https://bugzilla.redhat.com/22964172296417https://bugzilla.redhat.com/22969902296990https://bugzilla.redhat.com/22992812299281https://errata.almalinux.org/9/ALSA-2024-5815.htmlALSA-2024:5815ALSA-2024:5815 9q(hKnodejs-full-i18n-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpmNKnodejs-docs-20.16.0-1.module_el9.4.0+107+dbd477e4.noarch.rpm9Knodejs-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpmdotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpmsnetstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm:aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm+sdotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm Bdotnet-runtime-8.0-8.0.10-1.el9_4.x86_64.rpmdotnet-host-8.0.10-1.el9_4.x86_64.rpm@dotnet-hostfxr-8.0-8.0.10-1.el9_4.x86_64.rpmHsdotnet-templates-8.0-8.0.110-1.el9_4.x86_64.rpmDsdotnet-sdk-8.0-8.0.110-1.el9_4.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpmsnetstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpm:aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm+sdotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpmQY |BBsecurityImportant: firefox security updateJhttps://access.redhat.com/errata/RHSA-2024:7958RHSA-2024:7958RHSA-2024:7958 https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://errata.almalinux.org/9/ALSA-2024-7958.htmlALSA-2024:7958ALSA-2024:7958 8firefox-128.3.1-2.el9_4.alma.1.x86_64.rpmQfirefox-x11-128.3.1-2.el9_4.alma.1.x86_64.rpm8firefox-128.3.1-2.el9_4.alma.1.x86_64.rpmQfirefox-x11-128.3.1-2.el9_4.alma.1.x86_64.rpmZZ AsecurityImportant: thunderbird security updatedihttps://access.redhat.com/errata/RHSA-2024:8025RHSA-2024:8025RHSA-2024:8025 https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://errata.almalinux.org/9/ALSA-2024-8025.htmlALSA-2024:8025ALSA-2024:8025 :Wthunderbird-128.3.1-1.el9_4.alma.1.x86_64.rpm:Wthunderbird-128.3.1-1.el9_4.alma.1.x86_64.rpm@[ DBBBBBBBsecurityModerate: OpenIPMI security updateM:https://access.redhat.com/errata/RHSA-2024:8037RHSA-2024:8037RHSA-2024:8037 https://access.redhat.com/security/cve/CVE-2024-42934CVE-2024-42934CVE-2024-42934https://bugzilla.redhat.com/23083752308375https://errata.almalinux.org/9/ALSA-2024-8037.htmlALSA-2024:8037ALSA-2024:8037 } OpenIPMI-2.0.32-5.el9_4.i686.rpm} OpenIPMI-2.0.32-5.el9_4.x86_64.rpm~ OpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpm OpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpm~ OpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpm OpenIPMI-libs-2.0.32-5.el9_4.i686.rpm} OpenIPMI-2.0.32-5.el9_4.i686.rpm} OpenIPMI-2.0.32-5.el9_4.x86_64.rpm~ OpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpm OpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpm~ OpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpm OpenIPMI-libs-2.0.32-5.el9_4.i686.rpm`\ NBBBBBBBsecurityImportant: podman security update\ https://access.redhat.com/errata/RHSA-2024:8039RHSA-2024:8039RHSA-2024:8039 https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://errata.almalinux.org/9/ALSA-2024-8039.htmlALSA-2024:8039ALSA-2024:8039 4Ipodman-remote-4.9.4-13.el9_4.x86_64.rpm2Ipodman-4.9.4-13.el9_4.x86_64.rpm5Ipodman-tests-4.9.4-13.el9_4.x86_64.rpm3Ipodman-plugins-4.9.4-13.el9_4.x86_64.rpmgIpodman-docker-4.9.4-13.el9_4.noarch.rpm4Ipodman-remote-4.9.4-13.el9_4.x86_64.rpm2Ipodman-4.9.4-13.el9_4.x86_64.rpm5Ipodman-tests-4.9.4-13.el9_4.x86_64.rpm3Ipodman-plugins-4.9.4-13.el9_4.x86_64.rpmgIpodman-docker-4.9.4-13.el9_4.noarch.rpm*] XsecurityImportant: containernetworking-plugins security updatecChttps://access.redhat.com/errata/RHSA-2024:8110RHSA-2024:8110RHSA-2024:8110 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-8110.htmlALSA-2024:8110ALSA-2024:8110 ^kcontainernetworking-plugins-1.4.0-6.el9_4.x86_64.rpm^kcontainernetworking-plugins-1.4.0-6.el9_4.x86_64.rpm^ [BBsecurityImportant: skopeo security update& https://access.redhat.com/errata/RHSA-2024:8111RHSA-2024:8111RHSA-2024:8111 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-8111.htmlALSA-2024:8111ALSA-2024:8111 9,skopeo-tests-1.14.5-2.el9_4.x86_64.rpm8,skopeo-1.14.5-2.el9_4.x86_64.rpm9,skopeo-tests-1.14.5-2.el9_4.x86_64.rpm8,skopeo-1.14.5-2.el9_4.x86_64.rpmy_ $`BBsecurityImportant: buildah security update0r https://access.redhat.com/errata/RHSA-2024:8112RHSA-2024:8112RHSA-2024:8112 https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://errata.almalinux.org/9/ALSA-2024-8112.htmlALSA-2024:8112ALSA-2024:8112 97buildah-tests-1.33.9-1.el9_4.x86_64.rpm87buildah-1.33.9-1.el9_4.x86_64.rpm97buildah-tests-1.33.9-1.el9_4.x86_64.rpm87buildah-1.33.9-1.el9_4.x86_64.rpmg` 1eBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update"r https://access.redhat.com/errata/RHSA-2024:8117RHSA-2024:8117RHSA-2024:8117 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8117.htmlALSA-2024:8117ALSA-2024:8117 34java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpm54java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpm;4java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm64java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpm44java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpm:4java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm24java-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpm34java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpm54java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpm;4java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpm64java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpm44java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpm:4java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpm24java-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpmva rBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security updateq https://access.redhat.com/errata/RHSA-2024:8121RHSA-2024:8121RHSA-2024:8121 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8121.htmlALSA-2024:8121ALSA-2024:8121 q~java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpmp~java-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpml~java-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpmm~java-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpms~java-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpmt~java-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpmo~java-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpmr~java-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpmn~java-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpm q~java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpmp~java-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpml~java-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpmm~java-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpms~java-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpmt~java-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpmo~java-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpmr~java-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpmn~java-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpmfb EBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updateq https://access.redhat.com/errata/RHSA-2024:8124RHSA-2024:8124RHSA-2024:8124 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8124.htmlALSA-2024:8124ALSA-2024:8124 java-17-openjdk-src-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-src-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.13.0.11-3.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.13.0.11-3.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.13.0.11-3.el9.alma.1.x86_64.rpmlc *XBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security updatev https://access.redhat.com/errata/RHSA-2024:8127RHSA-2024:8127RHSA-2024:8127 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8127.htmlALSA-2024:8127ALSA-2024:8127 {java-21-openjdk-jmods-21.0.5.0.10-3.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.5.0.10-3.el9.alma.1.x86_64.rpmwjava-21-openjdk-devel-21.0.5.0.10-3.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.5.0.10-3.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.5.0.10-3.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.5.0.10-3.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.5.0.10-3.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.5.0.10-3.el9.alma.1.x86_64.rpm {java-21-openjdk-jmods-21.0.5.0.10-3.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.5.0.10-3.el9.alma.1.x86_64.rpmwjava-21-openjdk-devel-21.0.5.0.10-3.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.5.0.10-3.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.5.0.10-3.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.5.0.10-3.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.5.0.10-3.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.5.0.10-3.el9.alma.1.x86_64.rpm^d -https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617 https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617 !2kernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm2kernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm$2kernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm&2kernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm"2kernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm)2rv-5.14.0-427.42.1.el9_4.x86_64.rpm%2perf-5.14.0-427.42.1.el9_4.x86_64.rpm#2kernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm'2rtla-5.14.0-427.42.1.el9_4.x86_64.rpm !2kernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpm2kernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm$2kernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm&2kernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm"2kernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm)2rv-5.14.0-427.42.1.el9_4.x86_64.rpm%2perf-5.14.0-427.42.1.el9_4.x86_64.rpm#2kernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm'2rtla-5.14.0-427.42.1.el9_4.x86_64.rpmBk ~BBsecurityImportant: grafana security update%Khttps://access.redhat.com/errata/RHSA-2024:8678RHSA-2024:8678RHSA-2024:8678 https://access.redhat.com/security/cve/CVE-2024-47875CVE-2024-47875CVE-2024-47875https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/23157192315719https://bugzilla.redhat.com/23180522318052https://errata.almalinux.org/9/ALSA-2024-8678.htmlALSA-2024:8678ALSA-2024:8678 ]grafana-selinux-9.2.10-19.el9_4.x86_64.rpmo]grafana-9.2.10-19.el9_4.x86_64.rpm]grafana-selinux-9.2.10-19.el9_4.x86_64.rpmo]grafana-9.2.10-19.el9_4.x86_64.rpml CsecurityLow: mod_http2 security update*phttps://access.redhat.com/errata/RHSA-2024:8680RHSA-2024:8680RHSA-2024:8680 https://access.redhat.com/security/cve/CVE-2024-36387CVE-2024-36387CVE-2024-36387https://bugzilla.redhat.com/22950062295006https://errata.almalinux.org/9/ALSA-2024-8680.htmlALSA-2024:8680ALSA-2024:8680 Smod_http2-2.0.26-2.el9_4.1.x86_64.rpmSmod_http2-2.0.26-2.el9_4.1.x86_64.rpm@m FBBsecurityModerate: firefox security updateMhttps://access.redhat.com/errata/RHSA-2024:8726RHSA-2024:8726RHSA-2024:8726 https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-8726.htmlALSA-2024:8726ALSA-2024:8726 Qfirefox-x11-128.4.0-1.el9_4.x86_64.rpm8firefox-128.4.0-1.el9_4.x86_64.rpmQfirefox-x11-128.4.0-1.el9_4.x86_64.rpm8firefox-128.4.0-1.el9_4.x86_64.rpmn KsecurityModerate: thunderbird security updateThttps://access.redhat.com/errata/RHSA-2024:8793RHSA-2024:8793RHSA-2024:8793 https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-8793.htmlALSA-2024:8793ALSA-2024:8793 :Xthunderbird-128.4.0-1.el9_4.alma.1.x86_64.rpm:Xthunderbird-128.4.0-1.el9_4.alma.1.x86_64.rpmo NBBBsecurityImportant: openexr security updatep:https://access.redhat.com/errata/RHSA-2024:8800RHSA-2024:8800RHSA-2024:8800 https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-8800.htmlALSA-2024:8800ALSA-2024:8800 6~openexr-libs-3.1.1-2.el9_4.1.x86_64.rpma~openexr-3.1.1-2.el9_4.1.x86_64.rpm6~openexr-libs-3.1.1-2.el9_4.1.i686.rpm6~openexr-libs-3.1.1-2.el9_4.1.x86_64.rpma~openexr-3.1.1-2.el9_4.1.x86_64.rpm6~openexr-libs-3.1.1-2.el9_4.1.i686.rpmp TBBBBsecurityModerate: libtiff security update* https://access.redhat.com/errata/RHSA-2024:8914RHSA-2024:8914RHSA-2024:8914 https://access.redhat.com/security/cve/CVE-2024-7006CVE-2024-7006CVE-2024-7006https://bugzilla.redhat.com/23029962302996https://errata.almalinux.org/9/ALSA-2024-8914.htmlALSA-2024:8914ALSA-2024:8914 g0libtiff-4.4.0-12.el9_4.1.x86_64.rpmh0libtiff-devel-4.4.0-12.el9_4.1.x86_64.rpmg0libtiff-4.4.0-12.el9_4.1.i686.rpmh0libtiff-devel-4.4.0-12.el9_4.1.i686.rpmg0libtiff-4.4.0-12.el9_4.1.x86_64.rpmh0libtiff-devel-4.4.0-12.el9_4.1.x86_64.rpmg0libtiff-4.4.0-12.el9_4.1.i686.rpmh0libtiff-devel-4.4.0-12.el9_4.1.i686.rpm q [securityModerate: edk2 security update5Ehttps://access.redhat.com/errata/RHSA-2024:8935RHSA-2024:8935RHSA-2024:8935 https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-8935.htmlALSA-2024:8935ALSA-2024:8935 3edk2-aarch64-20231122-6.el9_4.4.noarch.rpmedk2-ovmf-20231122-6.el9_4.4.noarch.rpm3edk2-aarch64-20231122-6.el9_4.4.noarch.rpmedk2-ovmf-20231122-6.el9_4.4.noarch.rpmtr '^BBBBBBBsecurityImportant: podman security updateznhttps://access.redhat.com/errata/RHSA-2024:9051RHSA-2024:9051RHSA-2024:9051 https://access.redhat.com/security/cve/CVE-2024-9407CVE-2024-9407CVE-2024-9407https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://access.redhat.com/security/cve/CVE-2024-9676CVE-2024-9676CVE-2024-9676https://bugzilla.redhat.com/23158872315887https://bugzilla.redhat.com/23174582317458https://bugzilla.redhat.com/23174672317467https://errata.almalinux.org/9/ALSA-2024-9051.htmlALSA-2024:9051ALSA-2024:9051 2Jpodman-4.9.4-16.el9_4.x86_64.rpm3Jpodman-plugins-4.9.4-16.el9_4.x86_64.rpm4Jpodman-remote-4.9.4-16.el9_4.x86_64.rpmgJpodman-docker-4.9.4-16.el9_4.noarch.rpm5Jpodman-tests-4.9.4-16.el9_4.x86_64.rpm2Jpodman-4.9.4-16.el9_4.x86_64.rpm3Jpodman-plugins-4.9.4-16.el9_4.x86_64.rpm4Jpodman-remote-4.9.4-16.el9_4.x86_64.rpmgJpodman-docker-4.9.4-16.el9_4.noarch.rpm5Jpodman-tests-4.9.4-16.el9_4.x86_64.rpmus )(securityModerate: edk2 security updateh= https://access.redhat.com/errata/RHSA-2024:9088RHSA-2024:9088RHSA-2024:9088 https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://access.redhat.com/security/cve/CVE-2024-1298CVE-2024-1298CVE-2024-1298https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://bugzilla.redhat.com/22842432284243https://errata.almalinux.org/9/ALSA-2024-9088.htmlALSA-2024:9088ALSA-2024:9088 'edk2-ovmf-20240524-6.el9_5.noarch.rpm'edk2-ovmf-20240524-6.el9_5.noarch.rpm t ,jsecurityModerate: containernetworking-plugins security update%yhttps://access.redhat.com/errata/RHSA-2024:9089RHSA-2024:9089RHSA-2024:9089 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9089.htmlALSA-2024:9089ALSA-2024:9089 ^lcontainernetworking-plugins-1.5.1-2.el9.x86_64.rpm^lcontainernetworking-plugins-1.5.1-2.el9.x86_64.rpm,u /msecurityModerate: xorg-x11-server-Xwayland security update:https://access.redhat.com/errata/RHSA-2024:9093RHSA-2024:9093RHSA-2024:9093 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9093.htmlALSA-2024:9093ALSA-2024:9093 c.xorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpmc.xorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpm,v 4pBBsecurityModerate: buildah security updateX}https://access.redhat.com/errata/RHSA-2024:9097RHSA-2024:9097RHSA-2024:9097 https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-3727CVE-2024-3727CVE-2024-3727https://bugzilla.redhat.com/22747672274767https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9097.htmlALSA-2024:9097ALSA-2024:9097 98buildah-tests-1.37.2-1.el9.x86_64.rpm88buildah-1.37.2-1.el9.x86_64.rpm98buildah-tests-1.37.2-1.el9.x86_64.rpm88buildah-1.37.2-1.el9.x86_64.rpmhw 9uBBsecurityModerate: skopeo security updateUq https://access.redhat.com/errata/RHSA-2024:9098RHSA-2024:9098RHSA-2024:9098 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-3727CVE-2024-3727CVE-2024-3727https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22747672274767https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9098.htmlALSA-2024:9098ALSA-2024:9098 8-skopeo-1.16.1-1.el9.x86_64.rpm9-skopeo-tests-1.16.1-1.el9.x86_64.rpm8-skopeo-1.16.1-1.el9.x86_64.rpm9-skopeo-tests-1.16.1-1.el9.x86_64.rpm<x zBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gnome-shell and gnome-shell-extensions security updateFhttps://access.redhat.com/errata/RHSA-2024:9114RHSA-2024:9114RHSA-2024:9114 https://access.redhat.com/security/cve/CVE-2024-36472CVE-2024-36472CVE-2024-36472https://bugzilla.redhat.com/22837502283750https://errata.almalinux.org/9/ALSA-2024-9114.htmlALSA-2024:9114ALSA-2024:9114 n^gnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpmm^gnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpma^gnome-shell-extension-common-40.7-19.el9.noarch.rpmt^gnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpmp^gnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpmg^gnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpm`^gnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpme^gnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpm`\gnome-shell-40.10-21.el9.x86_64.rpmh^gnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpmq^gnome-shell-extension-user-theme-40.7-19.el9.noarch.rpmb^gnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpmc^gnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpmr^gnome-shell-extension-window-list-40.7-19.el9.noarch.rpmk^gnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpms^gnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm]^gnome-classic-session-40.7-19.el9.noarch.rpm^^gnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpml^gnome-shell-extension-places-menu-40.7-19.el9.noarch.rpmo^gnome-shell-extension-top-icons-40.7-19.el9.noarch.rpmi^gnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpmf^gnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpmj^gnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpmd^gnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpm_^gnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpmn^gnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpmm^gnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpma^gnome-shell-extension-common-40.7-19.el9.noarch.rpmt^gnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpmp^gnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpmg^gnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpm`^gnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpme^gnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpm`\gnome-shell-40.10-21.el9.x86_64.rpmh^gnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpmq^gnome-shell-extension-user-theme-40.7-19.el9.noarch.rpmb^gnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpmc^gnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpmr^gnome-shell-extension-window-list-40.7-19.el9.noarch.rpmk^gnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpms^gnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm]^gnome-classic-session-40.7-19.el9.noarch.rpm^^gnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpml^gnome-shell-extension-places-menu-40.7-19.el9.noarch.rpmo^gnome-shell-extension-top-icons-40.7-19.el9.noarch.rpmi^gnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpmf^gnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpmj^gnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpmd^gnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpm_^gnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpmXy UBBsecurityModerate: grafana security updateF4 https://access.redhat.com/errata/RHSA-2024:9115RHSA-2024:9115RHSA-2024:9115 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24789CVE-2024-24789CVE-2024-24789https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22926682292668https://bugzilla.redhat.com/22927872292787https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9115.htmlALSA-2024:9115ALSA-2024:9115 qgrafana-selinux-10.2.6-4.el9.x86_64.rpmoqgrafana-10.2.6-4.el9.x86_64.rpmqgrafana-selinux-10.2.6-4.el9.x86_64.rpmoqgrafana-10.2.6-4.el9.x86_64.rpmz &ZBBBBBBBBBBsecurityModerate: xorg-x11-server security updatez)https://access.redhat.com/errata/RHSA-2024:9122RHSA-2024:9122RHSA-2024:9122 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9122.htmlALSA-2024:9122ALSA-2024:9122 _jxorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpm`jxorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpmdjxorg-x11-server-common-1.20.11-26.el9.x86_64.rpmbjxorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpmajxorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpm^jxorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpm_jxorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpm`jxorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpmdjxorg-x11-server-common-1.20.11-26.el9.x86_64.rpmbjxorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpmajxorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpm^jxorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpm{ !gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update#|https://access.redhat.com/errata/RHSA-2024:9128RHSA-2024:9128RHSA-2024:9128 https://access.redhat.com/security/cve/CVE-2024-8235CVE-2024-8235CVE-2024-8235https://bugzilla.redhat.com/23086802308680https://errata.almalinux.org/9/ALSA-2024-9128.htmlALSA-2024:9128ALSA-2024:9128 :,libvirt-daemon-log-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-daemon-driver-nodedev-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-logical-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-config-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-mpath-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-10.5.0-7.el9_5.alma.1.x86_64.rpm;,libvirt-daemon-plugin-lockd-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-daemon-driver-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-disk-10.5.0-7.el9_5.alma.1.x86_64.rpm8,libvirt-daemon-common-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-scsi-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-kvm-10.5.0-7.el9_5.alma.1.x86_64.rpmI,libvirt-client-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-10.5.0-7.el9_5.alma.1.x86_64.rpm1,libvirt-ssh-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-daemon-driver-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-core-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-libs-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-daemon-driver-secret-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-client-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-config-network-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-daemon-driver-network-10.5.0-7.el9_5.alma.1.x86_64.rpm9,libvirt-daemon-lock-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-nss-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-iscsi-10.5.0-7.el9_5.alma.1.x86_64.rpm<,libvirt-daemon-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-interface-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-rbd-10.5.0-7.el9_5.alma.1.x86_64.rpm:,libvirt-daemon-log-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-daemon-driver-nodedev-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-logical-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-config-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-mpath-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-10.5.0-7.el9_5.alma.1.x86_64.rpm;,libvirt-daemon-plugin-lockd-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-daemon-driver-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-disk-10.5.0-7.el9_5.alma.1.x86_64.rpm8,libvirt-daemon-common-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-scsi-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-kvm-10.5.0-7.el9_5.alma.1.x86_64.rpmI,libvirt-client-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-10.5.0-7.el9_5.alma.1.x86_64.rpm1,libvirt-ssh-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-daemon-driver-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-core-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-libs-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-daemon-driver-secret-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-client-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-config-network-10.5.0-7.el9_5.alma.1.x86_64.rpm ,libvirt-daemon-driver-network-10.5.0-7.el9_5.alma.1.x86_64.rpm9,libvirt-daemon-lock-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-nss-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-iscsi-10.5.0-7.el9_5.alma.1.x86_64.rpm<,libvirt-daemon-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-interface-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-10.5.0-7.el9_5.alma.1.x86_64.rpm,libvirt-daemon-driver-storage-rbd-10.5.0-7.el9_5.alma.1.x86_64.rpmv| &bBBsecurityModerate: toolbox security updateh https://access.redhat.com/errata/RHSA-2024:9135RHSA-2024:9135RHSA-2024:9135 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-24785CVE-2024-24785CVE-2024-24785https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680222268022https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9135.htmlALSA-2024:9135ALSA-2024:9135 -btoolbox-0.0.99.5-5.el9.x86_64.rpm.btoolbox-tests-0.0.99.5-5.el9.x86_64.rpm-btoolbox-0.0.99.5-5.el9.x86_64.rpm.btoolbox-tests-0.0.99.5-5.el9.x86_64.rpm=} gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security updateahttps://access.redhat.com/errata/RHSA-2024:9136RHSA-2024:9136RHSA-2024:9136 https://access.redhat.com/security/cve/CVE-2024-26327CVE-2024-26327CVE-2024-26327https://access.redhat.com/security/cve/CVE-2024-3446CVE-2024-3446CVE-2024-3446https://access.redhat.com/security/cve/CVE-2024-7409CVE-2024-7409CVE-2024-7409https://bugzilla.redhat.com/22648442264844https://bugzilla.redhat.com/22742112274211https://bugzilla.redhat.com/23024872302487https://errata.almalinux.org/9/ALSA-2024-9136.htmlALSA-2024:9136ALSA-2024:9136 \[qemu-pr-helper-9.0.0-10.el9_5.x86_64.rpmX[qemu-kvm-docs-9.0.0-10.el9_5.x86_64.rpmY[qemu-kvm-tools-9.0.0-10.el9_5.x86_64.rpmT[qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.x86_64.rpm[[qemu-kvm-ui-opengl-9.0.0-10.el9_5.x86_64.rpmP[qemu-kvm-block-rbd-9.0.0-10.el9_5.x86_64.rpmM[qemu-kvm-9.0.0-10.el9_5.x86_64.rpmS[qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.x86_64.rpmQ[qemu-kvm-common-9.0.0-10.el9_5.x86_64.rpmN[qemu-kvm-audio-pa-9.0.0-10.el9_5.x86_64.rpmZ[qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.x86_64.rpmU[qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.x86_64.rpmK[qemu-guest-agent-9.0.0-10.el9_5.x86_64.rpmO[qemu-kvm-block-curl-9.0.0-10.el9_5.x86_64.rpm2[qemu-kvm-block-blkio-9.0.0-10.el9_5.x86_64.rpmV[qemu-kvm-device-usb-host-9.0.0-10.el9_5.x86_64.rpmW[qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.x86_64.rpmR[qemu-kvm-core-9.0.0-10.el9_5.x86_64.rpmL[qemu-img-9.0.0-10.el9_5.x86_64.rpm\[qemu-pr-helper-9.0.0-10.el9_5.x86_64.rpmX[qemu-kvm-docs-9.0.0-10.el9_5.x86_64.rpmY[qemu-kvm-tools-9.0.0-10.el9_5.x86_64.rpmT[qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.x86_64.rpm[[qemu-kvm-ui-opengl-9.0.0-10.el9_5.x86_64.rpmP[qemu-kvm-block-rbd-9.0.0-10.el9_5.x86_64.rpmM[qemu-kvm-9.0.0-10.el9_5.x86_64.rpmS[qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.x86_64.rpmQ[qemu-kvm-common-9.0.0-10.el9_5.x86_64.rpmN[qemu-kvm-audio-pa-9.0.0-10.el9_5.x86_64.rpmZ[qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.x86_64.rpmU[qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.x86_64.rpmK[qemu-guest-agent-9.0.0-10.el9_5.x86_64.rpmO[qemu-kvm-block-curl-9.0.0-10.el9_5.x86_64.rpm2[qemu-kvm-block-blkio-9.0.0-10.el9_5.x86_64.rpmV[qemu-kvm-device-usb-host-9.0.0-10.el9_5.x86_64.rpmW[qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.x86_64.rpmR[qemu-kvm-core-9.0.0-10.el9_5.x86_64.rpmL[qemu-img-9.0.0-10.el9_5.x86_64.rpm8~ NBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateh https://access.redhat.com/errata/RHSA-2024:9144RHSA-2024:9144RHSA-2024:9144 https://access.redhat.com/security/cve/CVE-2023-42843CVE-2023-42843CVE-2023-42843https://access.redhat.com/security/cve/CVE-2023-42950CVE-2023-42950CVE-2023-42950https://access.redhat.com/security/cve/CVE-2023-42956CVE-2023-42956CVE-2023-42956https://access.redhat.com/security/cve/CVE-2024-4558CVE-2024-4558CVE-2024-4558https://bugzilla.redhat.com/22717172271717https://bugzilla.redhat.com/22717182271718https://bugzilla.redhat.com/22717192271719https://bugzilla.redhat.com/22796892279689https://errata.almalinux.org/9/ALSA-2024-9144.htmlALSA-2024:9144ALSA-2024:9144 3iwebkit2gtk3-jsc-2.44.3-2.el9.i686.rpm1iwebkit2gtk3-2.44.3-2.el9.i686.rpm2iwebkit2gtk3-devel-2.44.3-2.el9.x86_64.rpm4iwebkit2gtk3-jsc-devel-2.44.3-2.el9.i686.rpm1iwebkit2gtk3-2.44.3-2.el9.x86_64.rpm4iwebkit2gtk3-jsc-devel-2.44.3-2.el9.x86_64.rpm2iwebkit2gtk3-devel-2.44.3-2.el9.i686.rpm3iwebkit2gtk3-jsc-2.44.3-2.el9.x86_64.rpm3iwebkit2gtk3-jsc-2.44.3-2.el9.i686.rpm1iwebkit2gtk3-2.44.3-2.el9.i686.rpm2iwebkit2gtk3-devel-2.44.3-2.el9.x86_64.rpm4iwebkit2gtk3-jsc-devel-2.44.3-2.el9.i686.rpm1iwebkit2gtk3-2.44.3-2.el9.x86_64.rpm4iwebkit2gtk3-jsc-devel-2.44.3-2.el9.x86_64.rpm2iwebkit2gtk3-devel-2.44.3-2.el9.i686.rpm3iwebkit2gtk3-jsc-2.44.3-2.el9.x86_64.rpm securityModerate: python-jinja2 security updatewhttps://access.redhat.com/errata/RHSA-2024:9150RHSA-2024:9150RHSA-2024:9150 https://access.redhat.com/security/cve/CVE-2024-34064CVE-2024-34064CVE-2024-34064https://bugzilla.redhat.com/22794762279476https://errata.almalinux.org/9/ALSA-2024-9150.htmlALSA-2024:9150ALSA-2024:9150 Fpython3-jinja2-2.11.3-6.el9.noarch.rpmFpython3-jinja2-2.11.3-6.el9.noarch.rpm #]BBBBsecurityModerate: lldpd security update~Mhttps://access.redhat.com/errata/RHSA-2024:9158RHSA-2024:9158RHSA-2024:9158 https://access.redhat.com/security/cve/CVE-2020-27827CVE-2020-27827CVE-2020-27827https://access.redhat.com/security/cve/CVE-2021-43612CVE-2021-43612CVE-2021-43612https://access.redhat.com/security/cve/CVE-2023-41910CVE-2023-41910CVE-2023-41910https://bugzilla.redhat.com/19214381921438https://bugzilla.redhat.com/20403882040388https://bugzilla.redhat.com/22374112237411https://errata.almalinux.org/9/ALSA-2024-9158.htmlALSA-2024:9158ALSA-2024:9158 Lulldpd-1.0.18-4.el9.x86_64.rpmMulldpd-devel-1.0.18-4.el9.x86_64.rpmMulldpd-devel-1.0.18-4.el9.i686.rpmLulldpd-1.0.18-4.el9.i686.rpmLulldpd-1.0.18-4.el9.x86_64.rpmMulldpd-devel-1.0.18-4.el9.x86_64.rpmMulldpd-devel-1.0.18-4.el9.i686.rpmLulldpd-1.0.18-4.el9.i686.rpm 2dBBBBBBBBBBBBsecurityModerate: poppler security updateK+https://access.redhat.com/errata/RHSA-2024:9167RHSA-2024:9167RHSA-2024:9167 https://access.redhat.com/security/cve/CVE-2024-6239CVE-2024-6239CVE-2024-6239https://bugzilla.redhat.com/22935942293594https://errata.almalinux.org/9/ALSA-2024-9167.htmlALSA-2024:9167ALSA-2024:9167 a{poppler-21.01.0-21.el9.i686.rpmc{poppler-glib-21.01.0-21.el9.i686.rpma{poppler-21.01.0-21.el9.x86_64.rpmb{poppler-cpp-21.01.0-21.el9.i686.rpmc{poppler-glib-21.01.0-21.el9.x86_64.rpmd{poppler-qt5-21.01.0-21.el9.i686.rpm0{poppler-utils-21.01.0-21.el9.x86_64.rpmb{poppler-cpp-21.01.0-21.el9.x86_64.rpmd{poppler-qt5-21.01.0-21.el9.x86_64.rpm a{poppler-21.01.0-21.el9.i686.rpmc{poppler-glib-21.01.0-21.el9.i686.rpma{poppler-21.01.0-21.el9.x86_64.rpmb{poppler-cpp-21.01.0-21.el9.i686.rpmc{poppler-glib-21.01.0-21.el9.x86_64.rpmd{poppler-qt5-21.01.0-21.el9.i686.rpm0{poppler-utils-21.01.0-21.el9.x86_64.rpmb{poppler-cpp-21.01.0-21.el9.x86_64.rpmd{poppler-qt5-21.01.0-21.el9.x86_64.rpm  5ssecurityModerate: mod_auth_openidc security updatev$https://access.redhat.com/errata/RHSA-2024:9180RHSA-2024:9180RHSA-2024:9180 https://access.redhat.com/security/cve/CVE-2024-24814CVE-2024-24814CVE-2024-24814https://bugzilla.redhat.com/22640922264092https://errata.almalinux.org/9/ALSA-2024-9180.htmlALSA-2024:9180ALSA-2024:9180 Jmod_auth_openidc-2.4.10-1.el9.x86_64.rpmJmod_auth_openidc-2.4.10-1.el9.x86_64.rpm/ ;vBBBsecurityModerate: jose security updateRhttps://access.redhat.com/errata/RHSA-2024:9181RHSA-2024:9181RHSA-2024:9181 https://access.redhat.com/security/cve/CVE-2023-50967CVE-2023-50967CVE-2023-50967https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22705382270538https://errata.almalinux.org/9/ALSA-2024-9181.htmlALSA-2024:9181ALSA-2024:9181 ]jose-14-1.el9.x86_64.rpm<]libjose-14-1.el9.i686.rpm<]libjose-14-1.el9.x86_64.rpm]jose-14-1.el9.x86_64.rpm<]libjose-14-1.el9.i686.rpm<]libjose-14-1.el9.x86_64.rpmb |BBBBBBBBsecurityModerate: gtk3 security updatel+https://access.redhat.com/errata/RHSA-2024:9184RHSA-2024:9184RHSA-2024:9184 https://access.redhat.com/security/cve/CVE-2024-6655CVE-2024-6655CVE-2024-6655https://bugzilla.redhat.com/22970982297098https://errata.almalinux.org/9/ALSA-2024-9184.htmlALSA-2024:9184ALSA-2024:9184 .Xgtk3-devel-3.24.31-5.el9.x86_64.rpmeXgtk-update-icon-cache-3.24.31-5.el9.x86_64.rpm.Xgtk3-devel-3.24.31-5.el9.i686.rpmfXgtk3-immodule-xim-3.24.31-5.el9.x86_64.rpm-Xgtk3-3.24.31-5.el9.i686.rpm-Xgtk3-3.24.31-5.el9.x86_64.rpm.Xgtk3-devel-3.24.31-5.el9.x86_64.rpmeXgtk-update-icon-cache-3.24.31-5.el9.x86_64.rpm.Xgtk3-devel-3.24.31-5.el9.i686.rpmfXgtk3-immodule-xim-3.24.31-5.el9.x86_64.rpm-Xgtk3-3.24.31-5.el9.i686.rpm-Xgtk3-3.24.31-5.el9.x86_64.rpm GBsecurityModerate: iperf3 security update?https://access.redhat.com/errata/RHSA-2024:9185RHSA-2024:9185RHSA-2024:9185 https://access.redhat.com/security/cve/CVE-2023-7250CVE-2023-7250CVE-2023-7250https://access.redhat.com/security/cve/CVE-2024-26306CVE-2024-26306CVE-2024-26306https://bugzilla.redhat.com/22447072244707https://bugzilla.redhat.com/22702702270270https://errata.almalinux.org/9/ALSA-2024-9185.htmlALSA-2024:9185ALSA-2024:9185 \biperf3-3.9-13.el9.x86_64.rpm\biperf3-3.9-13.el9.i686.rpm\biperf3-3.9-13.el9.x86_64.rpm\biperf3-3.9-13.el9.i686.rpmA KBBBBBsecurityLow: bcc security update*Vvhttps://access.redhat.com/errata/RHSA-2024:9187RHSA-2024:9187RHSA-2024:9187 https://access.redhat.com/security/cve/CVE-2024-2314CVE-2024-2314CVE-2024-2314https://bugzilla.redhat.com/22690192269019https://errata.almalinux.org/9/ALSA-2024-9187.htmlALSA-2024:9187ALSA-2024:9187 ,2bcc-tools-0.30.0-6.el9.x86_64.rpm 2libbpf-tools-0.30.0-6.el9.x86_64.rpmZ2python3-bcc-0.30.0-6.el9.noarch.rpm+2bcc-0.30.0-6.el9.x86_64.rpm,2bcc-tools-0.30.0-6.el9.x86_64.rpm 2libbpf-tools-0.30.0-6.el9.x86_64.rpmZ2python3-bcc-0.30.0-6.el9.noarch.rpm+2bcc-0.30.0-6.el9.x86_64.rpmA SsecurityLow: bpftrace security update*L@https://access.redhat.com/errata/RHSA-2024:9188RHSA-2024:9188RHSA-2024:9188 https://access.redhat.com/security/cve/CVE-2024-2313CVE-2024-2313CVE-2024-2313https://bugzilla.redhat.com/22690142269014https://errata.almalinux.org/9/ALSA-2024-9188.htmlALSA-2024:9188ALSA-2024:9188 1Obpftrace-0.21.1-1.el9.x86_64.rpm1Obpftrace-0.21.1-1.el9.x86_64.rpm0 VBBBBBBBBsecurityModerate: python3.12 security update Fhttps://access.redhat.com/errata/RHSA-2024:9190RHSA-2024:9190RHSA-2024:9190 https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/22929212292921https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9190.htmlALSA-2024:9190ALSA-2024:9190 Qpython3.12-devel-3.12.5-2.el9.i686.rpmQpython3.12-devel-3.12.5-2.el9.x86_64.rpmQpython3.12-libs-3.12.5-2.el9.i686.rpm!Qpython3.12-tkinter-3.12.5-2.el9.x86_64.rpmQpython3.12-libs-3.12.5-2.el9.x86_64.rpm Qpython3.12-3.12.5-2.el9.x86_64.rpmQpython3.12-devel-3.12.5-2.el9.i686.rpmQpython3.12-devel-3.12.5-2.el9.x86_64.rpmQpython3.12-libs-3.12.5-2.el9.i686.rpm!Qpython3.12-tkinter-3.12.5-2.el9.x86_64.rpmQpython3.12-libs-3.12.5-2.el9.x86_64.rpm Qpython3.12-3.12.5-2.el9.x86_64.rpm<  +aBBBBBBBBsecurityModerate: python3.11 security updateRRhttps://access.redhat.com/errata/RHSA-2024:9192RHSA-2024:9192RHSA-2024:9192 https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9192.htmlALSA-2024:9192ALSA-2024:9192 `Ipython3.11-devel-3.11.9-7.el9.i686.rpm`Ipython3.11-devel-3.11.9-7.el9.x86_64.rpmiIpython3.11-3.11.9-7.el9.x86_64.rpmjIpython3.11-tkinter-3.11.9-7.el9.x86_64.rpmaIpython3.11-libs-3.11.9-7.el9.x86_64.rpmaIpython3.11-libs-3.11.9-7.el9.i686.rpm`Ipython3.11-devel-3.11.9-7.el9.i686.rpm`Ipython3.11-devel-3.11.9-7.el9.x86_64.rpmiIpython3.11-3.11.9-7.el9.x86_64.rpmjIpython3.11-tkinter-3.11.9-7.el9.x86_64.rpmaIpython3.11-libs-3.11.9-7.el9.x86_64.rpmaIpython3.11-libs-3.11.9-7.el9.i686.rpmd  .lsecurityModerate: python3.12-PyMySQL security update$khttps://access.redhat.com/errata/RHSA-2024:9193RHSA-2024:9193RHSA-2024:9193 https://access.redhat.com/security/cve/CVE-2024-36039CVE-2024-36039CVE-2024-36039https://bugzilla.redhat.com/22828212282821https://errata.almalinux.org/9/ALSA-2024-9193.htmlALSA-2024:9193ALSA-2024:9193 gqpython3.12-PyMySQL+rsa-1.1.0-3.el9.noarch.rpmfqpython3.12-PyMySQL-1.1.0-3.el9.noarch.rpmgqpython3.12-PyMySQL+rsa-1.1.0-3.el9.noarch.rpmfqpython3.12-PyMySQL-1.1.0-3.el9.noarch.rpml  1osecurityModerate: python3.11-PyMySQL security updatekhttps://access.redhat.com/errata/RHSA-2024:9194RHSA-2024:9194RHSA-2024:9194 https://access.redhat.com/security/cve/CVE-2024-36039CVE-2024-36039CVE-2024-36039https://bugzilla.redhat.com/22828212282821https://errata.almalinux.org/9/ALSA-2024-9194.htmlALSA-2024:9194ALSA-2024:9194 bmpython3.11-PyMySQL-1.0.2-2.el9.noarch.rpmcmpython3.11-PyMySQL+rsa-1.0.2-2.el9.noarch.rpmbmpython3.11-PyMySQL-1.0.2-2.el9.noarch.rpmcmpython3.11-PyMySQL+rsa-1.0.2-2.el9.noarch.rpml  ;rBBBBBBBsecurityModerate: cyrus-imapd security updatez@https://access.redhat.com/errata/RHSA-2024:9195RHSA-2024:9195RHSA-2024:9195 https://access.redhat.com/security/cve/CVE-2024-34055CVE-2024-34055CVE-2024-34055https://bugzilla.redhat.com/22905102290510https://errata.almalinux.org/9/ALSA-2024-9195.htmlALSA-2024:9195ALSA-2024:9195 AGperl-Cyrus-3.4.8-1.el9.x86_64.rpm:Gcyrus-imapd-utils-3.4.8-1.el9.x86_64.rpm Gcyrus-imapd-libs-3.4.8-1.el9.x86_64.rpm Gcyrus-imapd-libs-3.4.8-1.el9.i686.rpm9Gcyrus-imapd-3.4.8-1.el9.x86_64.rpmAGperl-Cyrus-3.4.8-1.el9.x86_64.rpm:Gcyrus-imapd-utils-3.4.8-1.el9.x86_64.rpm Gcyrus-imapd-libs-3.4.8-1.el9.x86_64.rpm Gcyrus-imapd-libs-3.4.8-1.el9.i686.rpm9Gcyrus-imapd-3.4.8-1.el9.x86_64.rpmW  >|securityModerate: runc security update:7https://access.redhat.com/errata/RHSA-2024:9200RHSA-2024:9200RHSA-2024:9200 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://bugzilla.redhat.com/22798142279814https://errata.almalinux.org/9/ALSA-2024-9200.htmlALSA-2024:9200ALSA-2024:9200  crunc-1.1.13-4.el9.x86_64.rpm crunc-1.1.13-4.el9.x86_64.rpm1 BBBBBBBBBBBBBBBBsecurityModerate: postfix security updateq https://access.redhat.com/errata/RHSA-2024:9243RHSA-2024:9243RHSA-2024:9243 https://access.redhat.com/security/cve/CVE-2023-51764CVE-2023-51764CVE-2023-51764https://bugzilla.redhat.com/22555632255563https://errata.almalinux.org/9/ALSA-2024-9243.htmlALSA-2024:9243ALSA-2024:9243 apostfix-mysql-3.5.25-1.el9.x86_64.rpmdpostfix-pgsql-3.5.25-1.el9.x86_64.rpm_postfix-ldap-3.5.25-1.el9.x86_64.rpmcpostfix-perl-scripts-3.5.25-1.el9.x86_64.rpmbpostfix-pcre-3.5.25-1.el9.x86_64.rpm^postfix-cdb-3.5.25-1.el9.x86_64.rpmepostfix-sqlite-3.5.25-1.el9.x86_64.rpm`postfix-lmdb-3.5.25-1.el9.x86_64.rpm]postfix-3.5.25-1.el9.x86_64.rpm apostfix-mysql-3.5.25-1.el9.x86_64.rpmdpostfix-pgsql-3.5.25-1.el9.x86_64.rpm_postfix-ldap-3.5.25-1.el9.x86_64.rpmcpostfix-perl-scripts-3.5.25-1.el9.x86_64.rpmbpostfix-pcre-3.5.25-1.el9.x86_64.rpm^postfix-cdb-3.5.25-1.el9.x86_64.rpmepostfix-sqlite-3.5.25-1.el9.x86_64.rpm`postfix-lmdb-3.5.25-1.el9.x86_64.rpm]postfix-3.5.25-1.el9.x86_64.rpm RsecurityModerate: oci-seccomp-bpf-hook security updatehttps://access.redhat.com/errata/RHSA-2024:9277RHSA-2024:9277RHSA-2024:9277 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://bugzilla.redhat.com/22798142279814https://errata.almalinux.org/9/ALSA-2024-9277.htmlALSA-2024:9277ALSA-2024:9277 8 oci-seccomp-bpf-hook-1.2.10-2.el9.x86_64.rpm8 oci-seccomp-bpf-hook-1.2.10-2.el9.x86_64.rpm1 securityModerate: python-jwcrypto security updatehttps://access.redhat.com/errata/RHSA-2024:9281RHSA-2024:9281RHSA-2024:9281 https://access.redhat.com/security/cve/CVE-2023-6681CVE-2023-6681CVE-2023-6681https://bugzilla.redhat.com/22608432260843https://errata.almalinux.org/9/ALSA-2024-9281.htmlALSA-2024:9281ALSA-2024:9281 ftpython3-jwcrypto-1.5.6-2.el9.noarch.rpmftpython3-jwcrypto-1.5.6-2.el9.noarch.rpm +WBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security update+Lhttps://access.redhat.com/errata/RHSA-2024:9306RHSA-2024:9306RHSA-2024:9306 https://access.redhat.com/security/cve/CVE-2023-38709CVE-2023-38709CVE-2023-38709https://access.redhat.com/security/cve/CVE-2024-24795CVE-2024-24795CVE-2024-24795https://bugzilla.redhat.com/22734912273491https://bugzilla.redhat.com/22734992273499https://errata.almalinux.org/9/ALSA-2024-9306.htmlALSA-2024:9306ALSA-2024:9306 jHhttpd-devel-2.4.62-1.el9.x86_64.rpm0Hhttpd-filesystem-2.4.62-1.el9.noarch.rpm~Hmod_ldap-2.4.62-1.el9.x86_64.rpmmod_ssl-2.4.62-1.el9.x86_64.rpmhHhttpd-2.4.62-1.el9.x86_64.rpmmod_proxy_html-2.4.62-1.el9.x86_64.rpmkHhttpd-tools-2.4.62-1.el9.x86_64.rpmiHhttpd-core-2.4.62-1.el9.x86_64.rpmHmod_session-2.4.62-1.el9.x86_64.rpmHmod_lua-2.4.62-1.el9.x86_64.rpm1Hhttpd-manual-2.4.62-1.el9.noarch.rpm jHhttpd-devel-2.4.62-1.el9.x86_64.rpm0Hhttpd-filesystem-2.4.62-1.el9.noarch.rpm~Hmod_ldap-2.4.62-1.el9.x86_64.rpmmod_ssl-2.4.62-1.el9.x86_64.rpmhHhttpd-2.4.62-1.el9.x86_64.rpmmod_proxy_html-2.4.62-1.el9.x86_64.rpmkHhttpd-tools-2.4.62-1.el9.x86_64.rpmiHhttpd-core-2.4.62-1.el9.x86_64.rpmHmod_session-2.4.62-1.el9.x86_64.rpmHmod_lua-2.4.62-1.el9.x86_64.rpm1Hhttpd-manual-2.4.62-1.el9.noarch.rpm% 4lBBBBBBsecurityLow: NetworkManager security update*wjhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317 https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317 yNetworkManager-config-connectivity-redhat-1.48.10-2.el9_5.alma.1.noarch.rpmyNetworkManager-cloud-setup-1.48.10-2.el9_5.alma.1.x86_64.rpmyNetworkManager-dispatcher-routing-rules-1.48.10-2.el9_5.alma.1.noarch.rpmyNetworkManager-ovs-1.48.10-2.el9_5.alma.1.x86_64.rpmyNetworkManager-ppp-1.48.10-2.el9_5.alma.1.x86_64.rpmyNetworkManager-config-connectivity-redhat-1.48.10-2.el9_5.alma.1.noarch.rpmyNetworkManager-cloud-setup-1.48.10-2.el9_5.alma.1.x86_64.rpmyNetworkManager-dispatcher-routing-rules-1.48.10-2.el9_5.alma.1.noarch.rpmyNetworkManager-ovs-1.48.10-2.el9_5.alma.1.x86_64.rpmyNetworkManager-ppp-1.48.10-2.el9_5.alma.1.x86_64.rpmH 9uBBsecurityLow: cockpit security update*a2https://access.redhat.com/errata/RHSA-2024:9325RHSA-2024:9325RHSA-2024:9325 https://access.redhat.com/security/cve/CVE-2024-6126CVE-2024-6126CVE-2024-6126https://bugzilla.redhat.com/22928972292897https://errata.almalinux.org/9/ALSA-2024-9325.htmlALSA-2024:9325ALSA-2024:9325 "Ccockpit-pcp-323.1-1.el9_5.x86_64.rpm#Ccockpit-storaged-323.1-1.el9_5.noarch.rpm!Ccockpit-packagekit-323.1-1.el9_5.noarch.rpm"Ccockpit-pcp-323.1-1.el9_5.x86_64.rpm#Ccockpit-storaged-323.1-1.el9_5.noarch.rpm!Ccockpit-packagekit-323.1-1.el9_5.noarch.rpm =zBsecurityModerate: krb5 security update https://access.redhat.com/errata/RHSA-2024:9331RHSA-2024:9331RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26458CVE-2024-26458CVE-2024-26458https://access.redhat.com/security/cve/CVE-2024-26461CVE-2024-26461CVE-2024-26461https://access.redhat.com/security/cve/CVE-2024-26462CVE-2024-26462CVE-2024-26462https://bugzilla.redhat.com/22667312266731https://bugzilla.redhat.com/22667402266740https://bugzilla.redhat.com/22667422266742https://errata.almalinux.org/9/ALSA-2024-9331.htmlALSA-2024:9331ALSA-2024:9331 pcp-pmda-uwsgi-6.2.2-7.el9_5.alma.1.x86_64.rpmYpcp-import-collectl2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmkpcp-pmda-docker-6.2.2-7.el9_5.alma.1.x86_64.rpm]pcp-devel-6.2.2-7.el9_5.alma.1.i686.rpmpcp-pmda-mysql-6.2.2-7.el9_5.alma.1.x86_64.rpm}pcp-pmda-lustrecomm-6.2.2-7.el9_5.alma.1.x86_64.rpmopcp-pmda-farm-6.2.2-7.el9_5.alma.1.x86_64.rpmNpcp-conf-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-postgresql-6.2.2-7.el9_5.alma.1.x86_64.rpmlpcp-pmda-ds389-6.2.2-7.el9_5.alma.1.x86_64.rpmbpcp-pmda-bind2-6.2.2-7.el9_5.alma.1.x86_64.rpm`pcp-testsuite-6.2.2-7.el9_5.alma.1.i686.rpmWpcp-geolocate-6.2.2-7.el9_5.alma.1.x86_64.rpm#pcp-pmda-trace-6.2.2-7.el9_5.alma.1.x86_64.rpmepcp-pmda-bpftrace-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-roomtemp-6.2.2-7.el9_5.alma.1.x86_64.rpmzpcp-pmda-lmsensors-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-oracle-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-shping-6.2.2-7.el9_5.alma.1.x86_64.rpmXpcp-gui-6.2.2-7.el9_5.alma.1.x86_64.rpmvpcp-pmda-infiniband-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-resctrl-6.2.2-7.el9_5.alma.1.x86_64.rpm^pcp-pmda-activemq-6.2.2-7.el9_5.alma.1.x86_64.rpm~pcp-pmda-mailq-6.2.2-7.el9_5.alma.1.x86_64.rpmQpcp-export-pcp2influxdb-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-podman-6.2.2-7.el9_5.alma.1.x86_64.rpmSpcp-export-pcp2spark-6.2.2-7.el9_5.alma.1.x86_64.rpmnpcp-pmda-elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpmupcp-pmda-haproxy-6.2.2-7.el9_5.alma.1.x86_64.rpm1python3-pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmfpcp-pmda-cifs-6.2.2-7.el9_5.alma.1.x86_64.rpm_pcp-libs-devel-6.2.2-7.el9_5.alma.1.i686.rpmpcp-pmda-pdns-6.2.2-7.el9_5.alma.1.x86_64.rpm%pcp-pmda-weblog-6.2.2-7.el9_5.alma.1.x86_64.rpm pcp-pmda-statsd-6.2.2-7.el9_5.alma.1.x86_64.rpm]pcp-import-sar2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm'pcp-pmda-zswap-6.2.2-7.el9_5.alma.1.x86_64.rpm pcp-pmda-nfsclient-6.2.2-7.el9_5.alma.1.x86_64.rpmnpcp-pmda-rsyslog-6.2.2-7.el9_5.alma.1.x86_64.rpmppcp-pmda-gfs2-6.2.2-7.el9_5.alma.1.x86_64.rpm,perl-PCP-LogSummary-6.2.2-7.el9_5.alma.1.x86_64.rpm`pcp-pmda-bash-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-samba-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-mounts-6.2.2-7.el9_5.alma.1.x86_64.rpmgpcp-pmda-cisco-6.2.2-7.el9_5.alma.1.x86_64.rpm-perl-PCP-MMV-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-postfix-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-news-6.2.2-7.el9_5.alma.1.x86_64.rpmipcp-pmda-denki-6.2.2-7.el9_5.alma.1.x86_64.rpm pcp-pmda-nginx-6.2.2-7.el9_5.alma.1.x86_64.rpm|pcp-pmda-lustre-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-sockets-6.2.2-7.el9_5.alma.1.x86_64.rpmhpcp-pmda-dbping-6.2.2-7.el9_5.alma.1.x86_64.rpmqpcp-pmda-gluster-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-netfilter-6.2.2-7.el9_5.alma.1.x86_64.rpm$pcp-pmda-unbound-6.2.2-7.el9_5.alma.1.x86_64.rpmypcp-pmda-lio-6.2.2-7.el9_5.alma.1.x86_64.rpmdpcp-pmda-bpf-6.2.2-7.el9_5.alma.1.x86_64.rpm&pcp-pmda-zimbra-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-rabbitmq-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-perfevent-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-smart-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-named-6.2.2-7.el9_5.alma.1.x86_64.rpm\pcp-import-mrtg2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmRpcp-export-pcp2json-6.2.2-7.el9_5.alma.1.x86_64.rpmDpcp-doc-6.2.2-7.el9_5.alma.1.noarch.rpmxpcp-pmda-libvirt-6.2.2-7.el9_5.alma.1.x86_64.rpm"pcp-pmda-systemd-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-netcheck-6.2.2-7.el9_5.alma.1.x86_64.rpm=pcp-export-pcp2openmetrics-6.2.2-7.el9_5.alma.1.x86_64.rpm]pcp-devel-6.2.2-7.el9_5.alma.1.x86_64.rpmmpcp-pmda-ds389log-6.2.2-7.el9_5.alma.1.x86_64.rpmwpcp-pmda-json-6.2.2-7.el9_5.alma.1.x86_64.rpm+perl-PCP-LogImport-6.2.2-7.el9_5.alma.1.x86_64.rpm*pcp-zeroconf-6.2.2-7.el9_5.alma.1.x86_64.rpm!pcp-pmda-summary-6.2.2-7.el9_5.alma.1.x86_64.rpmTpcp-export-pcp2xml-6.2.2-7.el9_5.alma.1.x86_64.rpm^pcp-libs-6.2.2-7.el9_5.alma.1.i686.rpm pcp-pmda-nvidia-gpu-6.2.2-7.el9_5.alma.1.x86_64.rpm_pcp-pmda-apache-6.2.2-7.el9_5.alma.1.x86_64.rpmcpcp-pmda-bonding-6.2.2-7.el9_5.alma.1.x86_64.rpmjpcp-pmda-dm-6.2.2-7.el9_5.alma.1.x86_64.rpm_pcp-libs-devel-6.2.2-7.el9_5.alma.1.x86_64.rpmapcp-pmda-bcc-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-slurm-6.2.2-7.el9_5.alma.1.x86_64.rpm(pcp-selinux-6.2.2-7.el9_5.alma.1.x86_64.rpmtpcp-pmda-hacluster-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-sendmail-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-memcache-6.2.2-7.el9_5.alma.1.x86_64.rpmspcp-pmda-gpsd-6.2.2-7.el9_5.alma.1.x86_64.rpm{pcp-pmda-logger-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-mssql-6.2.2-7.el9_5.alma.1.x86_64.rpmrpcp-pmda-gpfs-6.2.2-7.el9_5.alma.1.x86_64.rpm)pcp-system-tools-6.2.2-7.el9_5.alma.1.x86_64.rpmOpcp-export-pcp2elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpm[pcp-import-iostat2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm pcp-pmda-openvswitch-6.2.2-7.el9_5.alma.1.x86_64.rpmUpcp-export-pcp2zabbix-6.2.2-7.el9_5.alma.1.x86_64.rpm pcp-pmda-openmetrics-6.2.2-7.el9_5.alma.1.x86_64.rpm.perl-PCP-PMDA-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-mic-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-snmp-6.2.2-7.el9_5.alma.1.x86_64.rpmZpcp-import-ganglia2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-mongodb-6.2.2-7.el9_5.alma.1.x86_64.rpmMpcp-6.2.2-7.el9_5.alma.1.x86_64.rpm`pcp-testsuite-6.2.2-7.el9_5.alma.1.x86_64.rpmVpcp-export-zabbix-agent-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-redis-6.2.2-7.el9_5.alma.1.x86_64.rpm^pcp-libs-6.2.2-7.el9_5.alma.1.x86_64.rpmPpcp-export-pcp2graphite-6.2.2-7.el9_5.alma.1.x86_64.rpm>pcp-pmda-uwsgi-6.2.2-7.el9_5.alma.1.x86_64.rpmYpcp-import-collectl2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmkpcp-pmda-docker-6.2.2-7.el9_5.alma.1.x86_64.rpm]pcp-devel-6.2.2-7.el9_5.alma.1.i686.rpmpcp-pmda-mysql-6.2.2-7.el9_5.alma.1.x86_64.rpm}pcp-pmda-lustrecomm-6.2.2-7.el9_5.alma.1.x86_64.rpmopcp-pmda-farm-6.2.2-7.el9_5.alma.1.x86_64.rpmNpcp-conf-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-postgresql-6.2.2-7.el9_5.alma.1.x86_64.rpmlpcp-pmda-ds389-6.2.2-7.el9_5.alma.1.x86_64.rpmbpcp-pmda-bind2-6.2.2-7.el9_5.alma.1.x86_64.rpm`pcp-testsuite-6.2.2-7.el9_5.alma.1.i686.rpmWpcp-geolocate-6.2.2-7.el9_5.alma.1.x86_64.rpm#pcp-pmda-trace-6.2.2-7.el9_5.alma.1.x86_64.rpmepcp-pmda-bpftrace-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-roomtemp-6.2.2-7.el9_5.alma.1.x86_64.rpmzpcp-pmda-lmsensors-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-oracle-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-shping-6.2.2-7.el9_5.alma.1.x86_64.rpmXpcp-gui-6.2.2-7.el9_5.alma.1.x86_64.rpmvpcp-pmda-infiniband-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-resctrl-6.2.2-7.el9_5.alma.1.x86_64.rpm^pcp-pmda-activemq-6.2.2-7.el9_5.alma.1.x86_64.rpm~pcp-pmda-mailq-6.2.2-7.el9_5.alma.1.x86_64.rpmQpcp-export-pcp2influxdb-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-pmda-podman-6.2.2-7.el9_5.alma.1.x86_64.rpmSpcp-export-pcp2spark-6.2.2-7.el9_5.alma.1.x86_64.rpmnpcp-pmda-elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpmupcp-pmda-haproxy-6.2.2-7.el9_5.alma.1.x86_64.rpm1python3-pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmfpcp-pmda-cifs-6.2.2-7.el9_5.alma.1.x86_64.rpm_pcp-libs-devel-6.2.2-7.el9_5.alma.1.i686.rpmpcp-pmda-pdns-6.2.2-7.el9_5.alma.1.x86_64.rpm%pcp-pmda-weblog-6.2.2-7.el9_5.alma.1.x86_64.rpm pcp-pmda-statsd-6.2.2-7.el9_5.alma.1.x86_64.rpm]pcp-import-sar2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm'pcp-pmda-zswap-6.2.2-7.el9_5.alma.1.x86_64.rpm pcp-pmda-nfsclient-6.2.2-7.el9_5.alma.1.x86_64.rpmS RBBBBBBBsecurityImportant: podman security updateH@https://access.redhat.com/errata/RHSA-2024:9454RHSA-2024:9454RHSA-2024:9454 https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://access.redhat.com/security/cve/CVE-2024-9407CVE-2024-9407CVE-2024-9407https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://access.redhat.com/security/cve/CVE-2024-9676CVE-2024-9676CVE-2024-9676https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://bugzilla.redhat.com/23158872315887https://bugzilla.redhat.com/23174582317458https://bugzilla.redhat.com/23174672317467https://errata.almalinux.org/9/ALSA-2024-9454.htmlALSA-2024:9454ALSA-2024:9454 4Opodman-remote-5.2.2-9.el9_5.x86_64.rpm3Opodman-plugins-5.2.2-9.el9_5.x86_64.rpmgOpodman-docker-5.2.2-9.el9_5.noarch.rpm5Opodman-tests-5.2.2-9.el9_5.x86_64.rpm2Opodman-5.2.2-9.el9_5.x86_64.rpm4Opodman-remote-5.2.2-9.el9_5.x86_64.rpm3Opodman-plugins-5.2.2-9.el9_5.x86_64.rpmgOpodman-docker-5.2.2-9.el9_5.noarch.rpm5Opodman-tests-5.2.2-9.el9_5.x86_64.rpm2Opodman-5.2.2-9.el9_5.x86_64.rpm| "\BBBBsecurityImportant: osbuild-composer security updatehttps://access.redhat.com/errata/RHSA-2024:9456RHSA-2024:9456RHSA-2024:9456 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-9456.htmlALSA-2024:9456ALSA-2024:9456 0qosbuild-composer-core-118-2.el9_5.alma.1.x86_64.rpm/qosbuild-composer-118-2.el9_5.alma.1.x86_64.rpm1qosbuild-composer-worker-118-2.el9_5.alma.1.x86_64.rpm0qosbuild-composer-core-118-2.el9_5.alma.1.x86_64.rpm/qosbuild-composer-118-2.el9_5.alma.1.x86_64.rpm1qosbuild-composer-worker-118-2.el9_5.alma.1.x86_64.rpm}  $#securityModerate: python3.12-urllib3 security update&https://access.redhat.com/errata/RHSA-2024:9457RHSA-2024:9457RHSA-2024:9457 https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-9457.htmlALSA-2024:9457ALSA-2024:9457 mgpython3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpmmgpython3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpm8! &%securityModerate: python3.11-urllib3 security update63https://access.redhat.com/errata/RHSA-2024:9458RHSA-2024:9458RHSA-2024:9458 https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-9458.htmlALSA-2024:9458ALSA-2024:9458 Idpython3.11-urllib3-1.26.12-2.el9_5.1.noarch.rpmIdpython3.11-urllib3-1.26.12-2.el9_5.1.noarch.rpm9" +gBBsecurityImportant: buildah security updateiVhttps://access.redhat.com/errata/RHSA-2024:9459RHSA-2024:9459RHSA-2024:9459 https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://access.redhat.com/security/cve/CVE-2024-9407CVE-2024-9407CVE-2024-9407https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://access.redhat.com/security/cve/CVE-2024-9676CVE-2024-9676CVE-2024-9676https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://bugzilla.redhat.com/23158872315887https://bugzilla.redhat.com/23174582317458https://bugzilla.redhat.com/23174672317467https://errata.almalinux.org/9/ALSA-2024-9459.htmlALSA-2024:9459ALSA-2024:9459 89buildah-1.37.5-1.el9_5.x86_64.rpm99buildah-tests-1.37.5-1.el9_5.x86_64.rpm89buildah-1.37.5-1.el9_5.x86_64.rpm99buildah-tests-1.37.5-1.el9_5.x86_64.rpmR# 2lBBBBsecurityModerate: python3.9 security update?\https://access.redhat.com/errata/RHSA-2024:9468RHSA-2024:9468RHSA-2024:9468 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9468.htmlALSA-2024:9468ALSA-2024:9468 W$python3-devel-3.9.19-8.el9_5.1.x86_64.rpmj$python-unversioned-command-3.9.19-8.el9_5.1.noarch.rpm=$python3-tkinter-3.9.19-8.el9_5.1.x86_64.rpmW$python3-devel-3.9.19-8.el9_5.1.i686.rpmW$python3-devel-3.9.19-8.el9_5.1.x86_64.rpmj$python-unversioned-command-3.9.19-8.el9_5.1.noarch.rpm=$python3-tkinter-3.9.19-8.el9_5.1.x86_64.rpmW$python3-devel-3.9.19-8.el9_5.1.i686.rpmV$ sBBBBBBBBBBBBsecurityLow: cups security update*)https://access.redhat.com/errata/RHSA-2024:9470RHSA-2024:9470RHSA-2024:9470 https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-9470.htmlALSA-2024:9470ALSA-2024:9470 cups-devel-2.3.3op2-31.el9_5.x86_64.rpm?cups-lpd-2.3.3op2-31.el9_5.x86_64.rpm<cups-2.3.3op2-31.el9_5.x86_64.rpm@cups-printerapp-2.3.3op2-31.el9_5.x86_64.rpmcups-devel-2.3.3op2-31.el9_5.i686.rpm=cups-client-2.3.3op2-31.el9_5.x86_64.rpm2cups-filesystem-2.3.3op2-31.el9_5.noarch.rpm>cups-ipptool-2.3.3op2-31.el9_5.x86_64.rpmcups-devel-2.3.3op2-31.el9_5.x86_64.rpm?cups-lpd-2.3.3op2-31.el9_5.x86_64.rpm<cups-2.3.3op2-31.el9_5.x86_64.rpm@cups-printerapp-2.3.3op2-31.el9_5.x86_64.rpmcups-devel-2.3.3op2-31.el9_5.i686.rpm=cups-client-2.3.3op2-31.el9_5.x86_64.rpm2cups-filesystem-2.3.3op2-31.el9_5.noarch.rpm>cups-ipptool-2.3.3op2-31.el9_5.x86_64.rpmP% BsecurityImportant: grafana-pcp security updateDDhttps://access.redhat.com/errata/RHSA-2024:9472RHSA-2024:9472RHSA-2024:9472 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-9472.htmlALSA-2024:9472ALSA-2024:9472 }ngrafana-pcp-5.1.1-9.el9_5.x86_64.rpm}ngrafana-pcp-5.1.1-9.el9_5.x86_64.rpm8& EBBsecurityImportant: grafana security update1https://access.redhat.com/errata/RHSA-2024:9473RHSA-2024:9473RHSA-2024:9473 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-47875CVE-2024-47875CVE-2024-47875https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23180522318052https://errata.almalinux.org/9/ALSA-2024-9473.htmlALSA-2024:9473ALSA-2024:9473 rgrafana-selinux-10.2.6-7.el9_5.x86_64.rpmorgrafana-10.2.6-7.el9_5.x86_64.rpmrgrafana-selinux-10.2.6-7.el9_5.x86_64.rpmorgrafana-10.2.6-7.el9_5.x86_64.rpmT' JBsecurityImportant: krb5 security update9Shttps://access.redhat.com/errata/RHSA-2024:9474RHSA-2024:9474RHSA-2024:9474 https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-9474.htmlALSA-2024:9474ALSA-2024:9474 <"krb5-devel-1.21.1-4.el9_5.i686.rpm<"krb5-devel-1.21.1-4.el9_5.x86_64.rpm<"krb5-devel-1.21.1-4.el9_5.i686.rpm<"krb5-devel-1.21.1-4.el9_5.x86_64.rpmT( NBsecurityModerate: expat security update Ghttps://access.redhat.com/errata/RHSA-2024:9541RHSA-2024:9541RHSA-2024:9541 https://access.redhat.com/security/cve/CVE-2024-50602CVE-2024-50602CVE-2024-50602https://bugzilla.redhat.com/23219872321987https://errata.almalinux.org/9/ALSA-2024-9541.htmlALSA-2024:9541ALSA-2024:9541 sAexpat-devel-2.5.0-3.el9_5.1.x86_64.rpmsAexpat-devel-2.5.0-3.el9_5.1.i686.rpmsAexpat-devel-2.5.0-3.el9_5.1.x86_64.rpmsAexpat-devel-2.5.0-3.el9_5.1.i686.rpmU) .RBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security updateSfhttps://access.redhat.com/errata/RHSA-2024:9543RHSA-2024:9543RHSA-2024:9543 https://access.redhat.com/security/cve/CVE-2024-43498CVE-2024-43498CVE-2024-43498https://access.redhat.com/security/cve/CVE-2024-43499CVE-2024-43499CVE-2024-43499https://bugzilla.redhat.com/23232392323239https://bugzilla.redhat.com/23232402323240https://errata.almalinux.org/9/ALSA-2024-9543.htmlALSA-2024:9543ALSA-2024:9543 *dotnet-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpmdotnet-host-9.0.0-1.el9_5.x86_64.rpm"aspnetcore-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpm$netstandard-targeting-pack-2.1-9.0.100-1.el9_5.x86_64.rpm%dotnet-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm($dotnet-sdk-aot-9.0-9.0.100-1.el9_5.x86_64.rpm+$dotnet-templates-9.0-9.0.100-1.el9_5.x86_64.rpm$dotnet-hostfxr-9.0-9.0.0-1.el9_5.x86_64.rpm)$dotnet-sdk-dbg-9.0-9.0.100-1.el9_5.x86_64.rpm#dotnet-apphost-pack-9.0-9.0.0-1.el9_5.x86_64.rpm!aspnetcore-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpm aspnetcore-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm'$dotnet-sdk-9.0-9.0.100-1.el9_5.x86_64.rpm&dotnet-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpm*dotnet-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpmdotnet-host-9.0.0-1.el9_5.x86_64.rpm"aspnetcore-targeting-pack-9.0-9.0.0-1.el9_5.x86_64.rpm$netstandard-targeting-pack-2.1-9.0.100-1.el9_5.x86_64.rpm%dotnet-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm($dotnet-sdk-aot-9.0-9.0.100-1.el9_5.x86_64.rpm+$dotnet-templates-9.0-9.0.100-1.el9_5.x86_64.rpm$dotnet-hostfxr-9.0-9.0.0-1.el9_5.x86_64.rpm)$dotnet-sdk-dbg-9.0-9.0.100-1.el9_5.x86_64.rpm#dotnet-apphost-pack-9.0-9.0.0-1.el9_5.x86_64.rpm!aspnetcore-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpm aspnetcore-runtime-9.0-9.0.0-1.el9_5.x86_64.rpm'$dotnet-sdk-9.0-9.0.100-1.el9_5.x86_64.rpm&dotnet-runtime-dbg-9.0-9.0.0-1.el9_5.x86_64.rpmU* 4oBBBsecurityImportant: openexr security update9:https://access.redhat.com/errata/RHSA-2024:9548RHSA-2024:9548RHSA-2024:9548 https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-9548.htmlALSA-2024:9548ALSA-2024:9548 6openexr-libs-3.1.1-2.el9_5.1.i686.rpmaopenexr-3.1.1-2.el9_5.1.x86_64.rpm6openexr-libs-3.1.1-2.el9_5.1.x86_64.rpm6openexr-libs-3.1.1-2.el9_5.1.i686.rpmaopenexr-3.1.1-2.el9_5.1.x86_64.rpm6openexr-libs-3.1.1-2.el9_5.1.x86_64.rpm+ 7usecurityImportant: thunderbird security updatesvhttps://access.redhat.com/errata/RHSA-2024:9552RHSA-2024:9552RHSA-2024:9552 https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-9552.htmlALSA-2024:9552ALSA-2024:9552 :Ythunderbird-128.4.0-1.el9_5.alma.1.x86_64.rpm:Ythunderbird-128.4.0-1.el9_5.alma.1.x86_64.rpm, xBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateio https://access.redhat.com/errata/RHSA-2024:9553RHSA-2024:9553RHSA-2024:9553 https://access.redhat.com/security/cve/CVE-2024-40866CVE-2024-40866CVE-2024-40866https://access.redhat.com/security/cve/CVE-2024-44185CVE-2024-44185CVE-2024-44185https://access.redhat.com/security/cve/CVE-2024-44187CVE-2024-44187CVE-2024-44187https://access.redhat.com/security/cve/CVE-2024-44244CVE-2024-44244CVE-2024-44244https://access.redhat.com/security/cve/CVE-2024-44296CVE-2024-44296CVE-2024-44296https://bugzilla.redhat.com/23127242312724https://bugzilla.redhat.com/23147062314706https://bugzilla.redhat.com/23232632323263https://bugzilla.redhat.com/23232782323278https://bugzilla.redhat.com/23232892323289https://errata.almalinux.org/9/ALSA-2024-9553.htmlALSA-2024:9553ALSA-2024:9553 3kwebkit2gtk3-jsc-2.46.3-1.el9_5.x86_64.rpm2kwebkit2gtk3-devel-2.46.3-1.el9_5.i686.rpm3kwebkit2gtk3-jsc-2.46.3-1.el9_5.i686.rpm1kwebkit2gtk3-2.46.3-1.el9_5.x86_64.rpm4kwebkit2gtk3-jsc-devel-2.46.3-1.el9_5.i686.rpm2kwebkit2gtk3-devel-2.46.3-1.el9_5.x86_64.rpm1kwebkit2gtk3-2.46.3-1.el9_5.i686.rpm4kwebkit2gtk3-jsc-devel-2.46.3-1.el9_5.x86_64.rpm3kwebkit2gtk3-jsc-2.46.3-1.el9_5.x86_64.rpm2kwebkit2gtk3-devel-2.46.3-1.el9_5.i686.rpm3kwebkit2gtk3-jsc-2.46.3-1.el9_5.i686.rpm1kwebkit2gtk3-2.46.3-1.el9_5.x86_64.rpm4kwebkit2gtk3-jsc-devel-2.46.3-1.el9_5.i686.rpm2kwebkit2gtk3-devel-2.46.3-1.el9_5.x86_64.rpm1kwebkit2gtk3-2.46.3-1.el9_5.i686.rpm4kwebkit2gtk3-jsc-devel-2.46.3-1.el9_5.x86_64.rpm- EBBsecurityImportant: firefox security updateX'https://access.redhat.com/errata/RHSA-2024:9554RHSA-2024:9554RHSA-2024:9554 https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-9554.htmlALSA-2024:9554ALSA-2024:9554 8firefox-128.4.0-1.el9_5.x86_64.rpmQfirefox-x11-128.4.0-1.el9_5.x86_64.rpm8firefox-128.4.0-1.el9_5.x86_64.rpmQfirefox-x11-128.4.0-1.el9_5.x86_64.rpmR. JBBsecurityImportant: NetworkManager-libreswan security update$https://access.redhat.com/errata/RHSA-2024:9555RHSA-2024:9555RHSA-2024:9555 https://access.redhat.com/security/cve/CVE-2024-9050CVE-2024-9050CVE-2024-9050https://bugzilla.redhat.com/23138282313828https://errata.almalinux.org/9/ALSA-2024-9555.htmlALSA-2024:9555ALSA-2024:9555 fNetworkManager-libreswan-gnome-1.2.22-4.el9_5.x86_64.rpmfNetworkManager-libreswan-1.2.22-4.el9_5.x86_64.rpmfNetworkManager-libreswan-gnome-1.2.22-4.el9_5.x86_64.rpmfNetworkManager-libreswan-1.2.22-4.el9_5.x86_64.rpm:/ OBBBBsecurityImportant: libsoup security update#Whttps://access.redhat.com/errata/RHSA-2024:9559RHSA-2024:9559RHSA-2024:9559 https://access.redhat.com/security/cve/CVE-2024-52530CVE-2024-52530CVE-2024-52530https://access.redhat.com/security/cve/CVE-2024-52532CVE-2024-52532CVE-2024-52532https://bugzilla.redhat.com/23252762325276https://bugzilla.redhat.com/23252842325284https://errata.almalinux.org/9/ALSA-2024-9559.htmlALSA-2024:9559ALSA-2024:9559 libsoup-2.72.0-8.el9_5.2.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.2.i686.rpmlibsoup-devel-2.72.0-8.el9_5.2.x86_64.rpmlibsoup-2.72.0-8.el9_5.2.i686.rpmlibsoup-2.72.0-8.el9_5.2.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.2.i686.rpmlibsoup-devel-2.72.0-8.el9_5.2.x86_64.rpmlibsoup-2.72.0-8.el9_5.2.i686.rpmE0 'VBBBBBBBBBBBBBBBsecurityModerate: kernel security updatez'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605 https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:9605 "3kernel-debug-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-doc-5.14.0-503.14.1.el9_5.noarch.rpm)3rv-5.14.0-503.14.1.el9_5.x86_64.rpm$3kernel-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm!3kernel-debug-devel-5.14.0-503.14.1.el9_5.x86_64.rpm%3perf-5.14.0-503.14.1.el9_5.x86_64.rpm'3rtla-5.14.0-503.14.1.el9_5.x86_64.rpm#3kernel-devel-5.14.0-503.14.1.el9_5.x86_64.rpm&3kernel-headers-5.14.0-503.14.1.el9_5.x86_64.rpm "3kernel-debug-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm3kernel-doc-5.14.0-503.14.1.el9_5.noarch.rpm)3rv-5.14.0-503.14.1.el9_5.x86_64.rpm$3kernel-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm!3kernel-debug-devel-5.14.0-503.14.1.el9_5.x86_64.rpm%3perf-5.14.0-503.14.1.el9_5.x86_64.rpm'3rtla-5.14.0-503.14.1.el9_5.x86_64.rpm#3kernel-devel-5.14.0-503.14.1.el9_5.x86_64.rpm&3kernel-headers-5.14.0-503.14.1.el9_5.x86_64.rpmB1 *hsecurityImportant: squid security update!https://access.redhat.com/errata/RHSA-2024:9625RHSA-2024:9625RHSA-2024:9625 https://access.redhat.com/security/cve/CVE-2024-45802CVE-2024-45802CVE-2024-45802https://bugzilla.redhat.com/23221542322154https://errata.almalinux.org/9/ALSA-2024-9625.htmlALSA-2024:9625ALSA-2024:9625  squid-5.5-14.el9_5.3.x86_64.rpm squid-5.5-14.el9_5.3.x86_64.rpm:2 .kBsecurityModerate: libvpx security update8>https://access.redhat.com/errata/RHSA-2024:9827RHSA-2024:9827RHSA-2024:9827 https://access.redhat.com/security/cve/CVE-2024-5197CVE-2024-5197CVE-2024-5197https://bugzilla.redhat.com/22911982291198https://errata.almalinux.org/9/ALSA-2024-9827.htmlALSA-2024:9827ALSA-2024:9827 ].libvpx-1.9.0-8.el9_5.x86_64.rpm].libvpx-1.9.0-8.el9_5.i686.rpm].libvpx-1.9.0-8.el9_5.x86_64.rpm].libvpx-1.9.0-8.el9_5.i686.rpmY3 oBBBBBBBBBBBBBBBsecurityImportant: kernel security updatev https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059 https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:0059 !7kernel-debug-devel-5.14.0-503.21.1.el9_5.x86_64.rpm$7kernel-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm"7kernel-debug-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm#7kernel-devel-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-doc-5.14.0-503.21.1.el9_5.noarch.rpm&7kernel-headers-5.14.0-503.21.1.el9_5.x86_64.rpm'7rtla-5.14.0-503.21.1.el9_5.x86_64.rpm%7perf-5.14.0-503.21.1.el9_5.x86_64.rpm)7rv-5.14.0-503.21.1.el9_5.x86_64.rpm !7kernel-debug-devel-5.14.0-503.21.1.el9_5.x86_64.rpm$7kernel-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm"7kernel-debug-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm#7kernel-devel-5.14.0-503.21.1.el9_5.x86_64.rpm7kernel-doc-5.14.0-503.21.1.el9_5.noarch.rpm&7kernel-headers-5.14.0-503.21.1.el9_5.x86_64.rpm'7rtla-5.14.0-503.21.1.el9_5.x86_64.rpm%7perf-5.14.0-503.21.1.el9_5.x86_64.rpm)7rv-5.14.0-503.21.1.el9_5.x86_64.rpm:4 ABBsecurityImportant: firefox security updatehttps://access.redhat.com/errata/RHSA-2025:0080RHSA-2025:0080RHSA-2025:0080 https://access.redhat.com/security/cve/CVE-2025-0237CVE-2025-0237CVE-2025-0237https://access.redhat.com/security/cve/CVE-2025-0238CVE-2025-0238CVE-2025-0238https://access.redhat.com/security/cve/CVE-2025-0239CVE-2025-0239CVE-2025-0239https://access.redhat.com/security/cve/CVE-2025-0240CVE-2025-0240CVE-2025-0240https://access.redhat.com/security/cve/CVE-2025-0241CVE-2025-0241CVE-2025-0241https://access.redhat.com/security/cve/CVE-2025-0242CVE-2025-0242CVE-2025-0242https://access.redhat.com/security/cve/CVE-2025-0243CVE-2025-0243CVE-2025-0243https://bugzilla.redhat.com/23361652336165https://bugzilla.redhat.com/23361682336168https://bugzilla.redhat.com/23361702336170https://bugzilla.redhat.com/23361752336175https://bugzilla.redhat.com/23361812336181https://bugzilla.redhat.com/23361822336182https://bugzilla.redhat.com/23361882336188https://errata.almalinux.org/9/ALSA-2025-0080.htmlALSA-2025:0080ALSA-2025:0080 Qfirefox-x11-128.6.0-1.el9_5.x86_64.rpm8firefox-128.6.0-1.el9_5.x86_64.rpmQfirefox-x11-128.6.0-1.el9_5.x86_64.rpm8firefox-128.6.0-1.el9_5.x86_64.rpmL5 FBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateh https://access.redhat.com/errata/RHSA-2025:0146RHSA-2025:0146RHSA-2025:0146 https://access.redhat.com/security/cve/CVE-2024-54479CVE-2024-54479CVE-2024-54479https://access.redhat.com/security/cve/CVE-2024-54502CVE-2024-54502CVE-2024-54502https://access.redhat.com/security/cve/CVE-2024-54505CVE-2024-54505CVE-2024-54505https://access.redhat.com/security/cve/CVE-2024-54508CVE-2024-54508CVE-2024-54508https://bugzilla.redhat.com/23338412333841https://bugzilla.redhat.com/23338432333843https://bugzilla.redhat.com/23338442333844https://bugzilla.redhat.com/23338452333845https://errata.almalinux.org/9/ALSA-2025-0146.htmlALSA-2025:0146ALSA-2025:0146 4mwebkit2gtk3-jsc-devel-2.46.5-1.el9_5.x86_64.rpm1mwebkit2gtk3-2.46.5-1.el9_5.x86_64.rpm4mwebkit2gtk3-jsc-devel-2.46.5-1.el9_5.i686.rpm3mwebkit2gtk3-jsc-2.46.5-1.el9_5.i686.rpm2mwebkit2gtk3-devel-2.46.5-1.el9_5.x86_64.rpm3mwebkit2gtk3-jsc-2.46.5-1.el9_5.x86_64.rpm2mwebkit2gtk3-devel-2.46.5-1.el9_5.i686.rpm1mwebkit2gtk3-2.46.5-1.el9_5.i686.rpm4mwebkit2gtk3-jsc-devel-2.46.5-1.el9_5.x86_64.rpm1mwebkit2gtk3-2.46.5-1.el9_5.x86_64.rpm4mwebkit2gtk3-jsc-devel-2.46.5-1.el9_5.i686.rpm3mwebkit2gtk3-jsc-2.46.5-1.el9_5.i686.rpm2mwebkit2gtk3-devel-2.46.5-1.el9_5.x86_64.rpm3mwebkit2gtk3-jsc-2.46.5-1.el9_5.x86_64.rpm2mwebkit2gtk3-devel-2.46.5-1.el9_5.i686.rpm1mwebkit2gtk3-2.46.5-1.el9_5.i686.rpm6 SsecurityImportant: thunderbird security updateYhttps://access.redhat.com/errata/RHSA-2025:0147RHSA-2025:0147RHSA-2025:0147 https://access.redhat.com/security/cve/CVE-2025-0242CVE-2025-0242CVE-2025-0242https://access.redhat.com/security/cve/CVE-2025-0243CVE-2025-0243CVE-2025-0243https://bugzilla.redhat.com/23361752336175https://bugzilla.redhat.com/23361812336181https://errata.almalinux.org/9/ALSA-2025-0147.htmlALSA-2025:0147ALSA-2025:0147 :[thunderbird-128.6.0-3.el9_5.alma.1.x86_64.rpm:[thunderbird-128.6.0-3.el9_5.alma.1.x86_64.rpm97 VBsecurityImportant: iperf3 security update`Uhttps://access.redhat.com/errata/RHSA-2025:0161RHSA-2025:0161RHSA-2025:0161 https://access.redhat.com/security/cve/CVE-2024-53580CVE-2024-53580CVE-2024-53580https://bugzilla.redhat.com/23331462333146https://errata.almalinux.org/9/ALSA-2025-0161.htmlALSA-2025:0161ALSA-2025:0161 \ciperf3-3.9-13.el9_5.1.i686.rpm\ciperf3-3.9-13.el9_5.1.x86_64.rpm\ciperf3-3.9-13.el9_5.1.i686.rpm\ciperf3-3.9-13.el9_5.1.x86_64.rpm8 !ZBBBBBsecurityImportant: dpdk security update5Rhttps://access.redhat.com/errata/RHSA-2025:0210RHSA-2025:0210RHSA-2025:0210 https://access.redhat.com/security/cve/CVE-2024-11614CVE-2024-11614CVE-2024-11614https://bugzilla.redhat.com/23279552327955https://errata.almalinux.org/9/ALSA-2025-0210.htmlALSA-2025:0210ALSA-2025:0210 /Sdpdk-tools-23.11-2.el9_5.x86_64.rpm,Sdpdk-23.11-2.el9_5.x86_64.rpm.Sdpdk-doc-23.11-2.el9_5.noarch.rpm-Sdpdk-devel-23.11-2.el9_5.x86_64.rpm/Sdpdk-tools-23.11-2.el9_5.x86_64.rpm,Sdpdk-23.11-2.el9_5.x86_64.rpm.Sdpdk-doc-23.11-2.el9_5.noarch.rpm-Sdpdk-devel-23.11-2.el9_5.x86_64.rpm9 8bBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security updateZhttps://access.redhat.com/errata/RHSA-2025:0308RHSA-2025:0308RHSA-2025:0308 https://access.redhat.com/security/cve/CVE-2024-56201CVE-2024-56201CVE-2024-56201https://access.redhat.com/security/cve/CVE-2024-56326CVE-2024-56326CVE-2024-56326https://errata.almalinux.org/9/ALSA-2025-0308.htmlALSA-2025:0308ALSA-2025:0308 bfence-virtd-4.10.0-76.el9_5.4.alma.1.x86_64.rpm`fence-agents-kubevirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmcfence-virtd-cpg-4.10.0-76.el9_5.4.alma.1.x86_64.rpmgfence-virtd-tcp-4.10.0-76.el9_5.4.alma.1.x86_64.rpmafence-virt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmefence-virtd-multicast-4.10.0-76.el9_5.4.alma.1.x86_64.rpm,fence-agents-common-4.10.0-76.el9_5.4.alma.1.noarch.rpm-fence-agents-ibm-powervs-4.10.0-76.el9_5.4.alma.1.noarch.rpm.fence-agents-ibm-vpc-4.10.0-76.el9_5.4.alma.1.noarch.rpm/fence-agents-virsh-4.10.0-76.el9_5.4.alma.1.noarch.rpm_fence-agents-compute-4.10.0-76.el9_5.4.alma.1.x86_64.rpmdfence-virtd-libvirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmffence-virtd-serial-4.10.0-76.el9_5.4.alma.1.x86_64.rpm bfence-virtd-4.10.0-76.el9_5.4.alma.1.x86_64.rpm`fence-agents-kubevirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmcfence-virtd-cpg-4.10.0-76.el9_5.4.alma.1.x86_64.rpmgfence-virtd-tcp-4.10.0-76.el9_5.4.alma.1.x86_64.rpmafence-virt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmefence-virtd-multicast-4.10.0-76.el9_5.4.alma.1.x86_64.rpm,fence-agents-common-4.10.0-76.el9_5.4.alma.1.noarch.rpm-fence-agents-ibm-powervs-4.10.0-76.el9_5.4.alma.1.noarch.rpm.fence-agents-ibm-vpc-4.10.0-76.el9_5.4.alma.1.noarch.rpm/fence-agents-virsh-4.10.0-76.el9_5.4.alma.1.noarch.rpm_fence-agents-compute-4.10.0-76.el9_5.4.alma.1.x86_64.rpmdfence-virtd-libvirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpmffence-virtd-serial-4.10.0-76.el9_5.4.alma.1.x86_64.rpm: =securityImportant: rsync security update!8https://access.redhat.com/errata/RHSA-2025:0324RHSA-2025:0324RHSA-2025:0324 https://access.redhat.com/security/cve/CVE-2024-12085CVE-2024-12085CVE-2024-12085https://bugzilla.redhat.com/23305392330539https://errata.almalinux.org/9/ALSA-2025-0324.htmlALSA-2025:0324ALSA-2025:0324 [.rsync-daemon-3.2.3-20.el9_5.1.noarch.rpm[.rsync-daemon-3.2.3-20.el9_5.1.noarch.rpme< BBBBBBBBBBBBBBBBBBsecurityModerate: ipa security updateYahttps://access.redhat.com/errata/RHSA-2025:0334RHSA-2025:0334RHSA-2025:0334 https://access.redhat.com/security/cve/CVE-2024-11029CVE-2024-11029CVE-2024-11029https://bugzilla.redhat.com/23255572325557https://errata.almalinux.org/9/ALSA-2025-0334.htmlALSA-2025:0334ALSA-2025:0334 ipa-server-dns-4.12.2-1.el9_5.3.noarch.rpmpython3-ipaserver-4.12.2-1.el9_5.3.noarch.rpmpython3-ipalib-4.12.2-1.el9_5.3.noarch.rpmipa-selinux-4.12.2-1.el9_5.3.noarch.rpmipa-common-4.12.2-1.el9_5.3.noarch.rpmipa-server-common-4.12.2-1.el9_5.3.noarch.rpm1ipa-selinux-nfast-4.12.2-1.el9_5.3.noarch.rpmipa-client-common-4.12.2-1.el9_5.3.noarch.rpmpython3-ipaclient-4.12.2-1.el9_5.3.noarch.rpmipa-server-4.12.2-1.el9_5.3.x86_64.rpm0ipa-selinux-luna-4.12.2-1.el9_5.3.noarch.rpm~ipa-client-4.12.2-1.el9_5.3.x86_64.rpmipa-server-trust-ad-4.12.2-1.el9_5.3.x86_64.rpmipa-client-samba-4.12.2-1.el9_5.3.x86_64.rpmipa-client-epn-4.12.2-1.el9_5.3.x86_64.rpmipa-server-dns-4.12.2-1.el9_5.3.noarch.rpmpython3-ipaserver-4.12.2-1.el9_5.3.noarch.rpmpython3-ipalib-4.12.2-1.el9_5.3.noarch.rpmipa-selinux-4.12.2-1.el9_5.3.noarch.rpmipa-common-4.12.2-1.el9_5.3.noarch.rpmipa-server-common-4.12.2-1.el9_5.3.noarch.rpm1ipa-selinux-nfast-4.12.2-1.el9_5.3.noarch.rpmipa-client-common-4.12.2-1.el9_5.3.noarch.rpmpython3-ipaclient-4.12.2-1.el9_5.3.noarch.rpmipa-server-4.12.2-1.el9_5.3.x86_64.rpm0ipa-selinux-luna-4.12.2-1.el9_5.3.noarch.rpm~ipa-client-4.12.2-1.el9_5.3.x86_64.rpmipa-server-trust-ad-4.12.2-1.el9_5.3.x86_64.rpmipa-client-samba-4.12.2-1.el9_5.3.x86_64.rpmipa-client-epn-4.12.2-1.el9_5.3.x86_64.rpm= TBBBBBBsecurityModerate: Security and bug fixes for NetworkManager:Lhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377 https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377 zNetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpmzNetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpmzNetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpmzNetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpmzNetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpmzNetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpmzNetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpmzNetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpmzNetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpmzNetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm%> /]BBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update for AlmaLinux 8.6, 8.8, 8.10, 9.4 and 9.5fhttps://access.redhat.com/errata/RHSA-2025:0422RHSA-2025:0422RHSA-2025:0422 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0422.htmlALSA-2025:0422ALSA-2025:0422 java-17-openjdk-jmods-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-jmods-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.14.0.7-2.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.14.0.7-2.el9.alma.1.x86_64.rpmO? pBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update for AlmaLinux 8.10, 9.4 and 9.5lhttps://access.redhat.com/errata/RHSA-2025:0426RHSA-2025:0426RHSA-2025:0426 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0426.htmlALSA-2025:0426ALSA-2025:0426 wjava-21-openjdk-devel-21.0.6.0.7-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.alma.1.x86_64.rpm{java-21-openjdk-jmods-21.0.6.0.7-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.6.0.7-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.6.0.7-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.6.0.7-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.6.0.7-1.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.6.0.7-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.6.0.7-1.el9.alma.1.x86_64.rpm wjava-21-openjdk-devel-21.0.6.0.7-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.alma.1.x86_64.rpm{java-21-openjdk-jmods-21.0.6.0.7-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.6.0.7-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.6.0.7-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.6.0.7-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.6.0.7-1.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.6.0.7-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.6.0.7-1.el9.alma.1.x86_64.rpmɲ"@ CBBBBBBBBBBBBBBBsecurityModerate: kernel security updateoEhttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578 https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:0578 !8kernel-debug-devel-5.14.0-503.22.1.el9_5.x86_64.rpm)8rv-5.14.0-503.22.1.el9_5.x86_64.rpm#8kernel-devel-5.14.0-503.22.1.el9_5.x86_64.rpm&8kernel-headers-5.14.0-503.22.1.el9_5.x86_64.rpm$8kernel-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-doc-5.14.0-503.22.1.el9_5.noarch.rpm'8rtla-5.14.0-503.22.1.el9_5.x86_64.rpm%8perf-5.14.0-503.22.1.el9_5.x86_64.rpm"8kernel-debug-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm !8kernel-debug-devel-5.14.0-503.22.1.el9_5.x86_64.rpm)8rv-5.14.0-503.22.1.el9_5.x86_64.rpm#8kernel-devel-5.14.0-503.22.1.el9_5.x86_64.rpm&8kernel-headers-5.14.0-503.22.1.el9_5.x86_64.rpm$8kernel-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm8kernel-doc-5.14.0-503.22.1.el9_5.noarch.rpm'8rtla-5.14.0-503.22.1.el9_5.x86_64.rpm%8perf-5.14.0-503.22.1.el9_5.x86_64.rpm"8kernel-debug-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpmՕA securityImportant: python-jinja2 security update4Whttps://access.redhat.com/errata/RHSA-2025:0667RHSA-2025:0667RHSA-2025:0667 https://access.redhat.com/security/cve/CVE-2024-56326CVE-2024-56326CVE-2024-56326https://bugzilla.redhat.com/23338562333856https://errata.almalinux.org/9/ALSA-2025-0667.htmlALSA-2025:0667ALSA-2025:0667 Fpython3-jinja2-2.11.3-7.el9_5.noarch.rpmFpython3-jinja2-2.11.3-7.el9_5.noarch.rpmRB WsecurityImportant: git-lfs security update shttps://access.redhat.com/errata/RHSA-2025:0673RHSA-2025:0673RHSA-2025:0673 https://access.redhat.com/security/cve/CVE-2024-53263CVE-2024-53263CVE-2024-53263https://bugzilla.redhat.com/23380022338002https://errata.almalinux.org/9/ALSA-2025-0673.htmlALSA-2025:0673ALSA-2025:0673 ?Egit-lfs-3.4.1-4.el9_5.x86_64.rpm?Egit-lfs-3.4.1-4.el9_5.x86_64.rpmeC ZBBBsecurityImportant: redis:7 security update~\https://access.redhat.com/errata/RHSA-2025:0692RHSA-2025:0692RHSA-2025:0692 https://access.redhat.com/security/cve/CVE-2024-46981CVE-2024-46981CVE-2024-46981https://access.redhat.com/security/cve/CVE-2024-51741CVE-2024-51741CVE-2024-51741https://bugzilla.redhat.com/23360042336004https://bugzilla.redhat.com/23360072336007https://errata.almalinux.org/9/ALSA-2025-0692.htmlALSA-2025:0692ALSA-2025:0692 "{(> redis-devel-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm" redis-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm redis-doc-7.2.7-1.module_el9.5.0+134+2e645600.noarch.rpm"{(> redis-devel-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm" redis-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm redis-doc-7.2.7-1.module_el9.5.0+134+2e645600.noarch.rpmXD &`BBBBsecurityImportant: redis security updateZ\ https://access.redhat.com/errata/RHSA-2025:0693RHSA-2025:0693RHSA-2025:0693 https://access.redhat.com/security/cve/CVE-2022-24834CVE-2022-24834CVE-2022-24834https://access.redhat.com/security/cve/CVE-2023-45145CVE-2023-45145CVE-2023-45145https://access.redhat.com/security/cve/CVE-2024-31228CVE-2024-31228CVE-2024-31228https://access.redhat.com/security/cve/CVE-2024-31449CVE-2024-31449CVE-2024-31449https://access.redhat.com/security/cve/CVE-2024-46981CVE-2024-46981CVE-2024-46981https://bugzilla.redhat.com/22216622221662https://bugzilla.redhat.com/22449402244940https://bugzilla.redhat.com/23170562317056https://bugzilla.redhat.com/23170582317058https://bugzilla.redhat.com/23360042336004https://errata.almalinux.org/9/ALSA-2025-0693.htmlALSA-2025:0693ALSA-2025:0693 "7redis-6.2.17-1.el9_5.x86_64.rpm7redis-doc-6.2.17-1.el9_5.noarch.rpm>7redis-devel-6.2.17-1.el9_5.i686.rpm>7redis-devel-6.2.17-1.el9_5.x86_64.rpm"7redis-6.2.17-1.el9_5.x86_64.rpm7redis-doc-6.2.17-1.el9_5.noarch.rpm>7redis-devel-6.2.17-1.el9_5.i686.rpm>7redis-devel-6.2.17-1.el9_5.x86_64.rpm'E -gBBBBsecurityImportant: libsoup security update6 https://access.redhat.com/errata/RHSA-2025:0791RHSA-2025:0791RHSA-2025:0791 https://access.redhat.com/security/cve/CVE-2024-52531CVE-2024-52531CVE-2024-52531https://bugzilla.redhat.com/23252772325277https://errata.almalinux.org/9/ALSA-2025-0791.htmlALSA-2025:0791ALSA-2025:0791 libsoup-2.72.0-8.el9_5.3.i686.rpmlibsoup-2.72.0-8.el9_5.3.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.3.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.3.i686.rpmlibsoup-2.72.0-8.el9_5.3.i686.rpmlibsoup-2.72.0-8.el9_5.3.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.3.x86_64.rpmlibsoup-devel-2.72.0-8.el9_5.3.i686.rpmF pB~BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: mariadb:10.11 security updateBhttps://access.redhat.com/errata/RHSA-2025:0912RHSA-2025:0912RHSA-2025:0912 https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0912.htmlALSA-2025:0912ALSA-2025:0912 ,:(wmariadb-embedded-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-gssapi-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-oqgraph-engine-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmvmariadb-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-backup-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-errmsg-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm-galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-common-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmxmariadb-test-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-pam-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm!mariadb-server-galera-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm mariadb-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm,mariadb-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-embedded-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm"mariadb-server-utils-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm,:(wmariadb-embedded-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-gssapi-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-oqgraph-engine-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmvmariadb-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-backup-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-errmsg-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm-galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-common-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmxmariadb-test-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-pam-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm!mariadb-server-galera-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm mariadb-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm,mariadb-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-embedded-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm"mariadb-server-utils-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmG #KBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera and mariadb security updateT4https://access.redhat.com/errata/RHSA-2025:0914RHSA-2025:0914RHSA-2025:0914 https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0914.htmlALSA-2025:0914ALSA-2025:0914 ,mariadb-embedded-10.5.27-1.el9_5.x86_64.rpm,,mariadb-10.5.27-1.el9_5.x86_64.rpm ,mariadb-server-10.5.27-1.el9_5.x86_64.rpm,mariadb-gssapi-server-10.5.27-1.el9_5.x86_64.rpm,mariadb-backup-10.5.27-1.el9_5.x86_64.rpm!,mariadb-server-galera-10.5.27-1.el9_5.x86_64.rpm-3galera-26.4.20-1.el9_5.x86_64.rpm,mariadb-pam-10.5.27-1.el9_5.x86_64.rpm,mariadb-errmsg-10.5.27-1.el9_5.x86_64.rpm",mariadb-server-utils-10.5.27-1.el9_5.x86_64.rpm,mariadb-common-10.5.27-1.el9_5.x86_64.rpm,mariadb-oqgraph-engine-10.5.27-1.el9_5.x86_64.rpm ,mariadb-embedded-10.5.27-1.el9_5.x86_64.rpm,,mariadb-10.5.27-1.el9_5.x86_64.rpm ,mariadb-server-10.5.27-1.el9_5.x86_64.rpm,mariadb-gssapi-server-10.5.27-1.el9_5.x86_64.rpm,mariadb-backup-10.5.27-1.el9_5.x86_64.rpm!,mariadb-server-galera-10.5.27-1.el9_5.x86_64.rpm-3galera-26.4.20-1.el9_5.x86_64.rpm,mariadb-pam-10.5.27-1.el9_5.x86_64.rpm,mariadb-errmsg-10.5.27-1.el9_5.x86_64.rpm",mariadb-server-utils-10.5.27-1.el9_5.x86_64.rpm,mariadb-common-10.5.27-1.el9_5.x86_64.rpm,mariadb-oqgraph-engine-10.5.27-1.el9_5.x86_64.rpm8H &dsecurityModerate: keepalived security updateUhttps://access.redhat.com/errata/RHSA-2025:0917RHSA-2025:0917RHSA-2025:0917 https://access.redhat.com/security/cve/CVE-2024-41184CVE-2024-41184CVE-2024-41184https://bugzilla.redhat.com/22985322298532https://errata.almalinux.org/9/ALSA-2025-0917.htmlALSA-2025:0917ALSA-2025:0917 keepalived-2.2.8-4.el9_5.x86_64.rpmkeepalived-2.2.8-4.el9_5.x86_64.rpmcI 0gBBBBBBBsecurityImportant: podman security update] https://access.redhat.com/errata/RHSA-2025:0922RHSA-2025:0922RHSA-2025:0922 https://access.redhat.com/security/cve/CVE-2024-11218CVE-2024-11218CVE-2024-11218https://bugzilla.redhat.com/23262312326231https://errata.almalinux.org/9/ALSA-2025-0922.htmlALSA-2025:0922ALSA-2025:0922 2Npodman-5.2.2-13.el9_5.x86_64.rpm5Npodman-tests-5.2.2-13.el9_5.x86_64.rpmgNpodman-docker-5.2.2-13.el9_5.noarch.rpm3Npodman-plugins-5.2.2-13.el9_5.x86_64.rpm4Npodman-remote-5.2.2-13.el9_5.x86_64.rpm2Npodman-5.2.2-13.el9_5.x86_64.rpm5Npodman-tests-5.2.2-13.el9_5.x86_64.rpmgNpodman-docker-5.2.2-13.el9_5.noarch.rpm3Npodman-plugins-5.2.2-13.el9_5.x86_64.rpm4Npodman-remote-5.2.2-13.el9_5.x86_64.rpmZJ 5qBBsecurityImportant: buildah security update}6https://access.redhat.com/errata/RHSA-2025:0923RHSA-2025:0923RHSA-2025:0923 https://access.redhat.com/security/cve/CVE-2024-11218CVE-2024-11218CVE-2024-11218https://bugzilla.redhat.com/23262312326231https://errata.almalinux.org/9/ALSA-2025-0923.htmlALSA-2025:0923ALSA-2025:0923 8:buildah-1.37.6-1.el9_5.x86_64.rpm9:buildah-tests-1.37.6-1.el9_5.x86_64.rpm8:buildah-1.37.6-1.el9_5.x86_64.rpm9:buildah-tests-1.37.6-1.el9_5.x86_64.rpm%K 9vBsecurityModerate: bzip2 security update3https://access.redhat.com/errata/RHSA-2025:0925RHSA-2025:0925RHSA-2025:0925 https://access.redhat.com/security/cve/CVE-2019-12900CVE-2019-12900CVE-2019-12900https://bugzilla.redhat.com/23320752332075https://errata.almalinux.org/9/ALSA-2025-0925.htmlALSA-2025:0925ALSA-2025:0925 bzip2-devel-1.0.8-10.el9_5.x86_64.rpmbzip2-devel-1.0.8-10.el9_5.i686.rpmbzip2-devel-1.0.8-10.el9_5.x86_64.rpmbzip2-devel-1.0.8-10.el9_5.i686.rpmL >zBBsecurityImportant: firefox security updateD? https://access.redhat.com/errata/RHSA-2025:10072RHSA-2025:10072RHSA-2025:10072 https://access.redhat.com/security/cve/CVE-2025-6424CVE-2025-6424CVE-2025-6424https://access.redhat.com/security/cve/CVE-2025-6425CVE-2025-6425CVE-2025-6425https://access.redhat.com/security/cve/CVE-2025-6429CVE-2025-6429CVE-2025-6429https://access.redhat.com/security/cve/CVE-2025-6430CVE-2025-6430CVE-2025-6430https://bugzilla.redhat.com/23745552374555https://bugzilla.redhat.com/23745592374559https://bugzilla.redhat.com/23745612374561https://bugzilla.redhat.com/23745622374562https://errata.almalinux.org/9/ALSA-2025-10072.htmlALSA-2025:10072ALSA-2025:10072 Qvfirefox-x11-128.12.0-1.el9_6.alma.1.x86_64.rpm8vfirefox-128.12.0-1.el9_6.alma.1.x86_64.rpmQvfirefox-x11-128.12.0-1.el9_6.alma.1.x86_64.rpm8vfirefox-128.12.0-1.el9_6.alma.1.x86_64.rpmÐKM BBBBsecurityImportant: python3.9 security updateg https://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136 ='python3-tkinter-3.9.21-2.el9_6.1.x86_64.rpmj'python-unversioned-command-3.9.21-2.el9_6.1.noarch.rpmW'python3-devel-3.9.21-2.el9_6.1.x86_64.rpmW'python3-devel-3.9.21-2.el9_6.1.i686.rpm='python3-tkinter-3.9.21-2.el9_6.1.x86_64.rpmj'python-unversioned-command-3.9.21-2.el9_6.1.noarch.rpmW'python3-devel-3.9.21-2.el9_6.1.x86_64.rpmW'python3-devel-3.9.21-2.el9_6.1.i686.rpmÓ=N FBBBBBBBBsecurityImportant: python3.11 security updatejg https://access.redhat.com/errata/RHSA-2025:10148RHSA-2025:10148RHSA-2025:10148 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10148.htmlALSA-2025:10148ALSA-2025:10148 j>python3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpmi>python3.11-3.11.11-2.el9_6.1.x86_64.rpm`>python3.11-devel-3.11.11-2.el9_6.1.x86_64.rpma>python3.11-libs-3.11.11-2.el9_6.1.i686.rpm`>python3.11-devel-3.11.11-2.el9_6.1.i686.rpma>python3.11-libs-3.11.11-2.el9_6.1.x86_64.rpmj>python3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpmi>python3.11-3.11.11-2.el9_6.1.x86_64.rpm`>python3.11-devel-3.11.11-2.el9_6.1.x86_64.rpma>python3.11-libs-3.11.11-2.el9_6.1.i686.rpm`>python3.11-devel-3.11.11-2.el9_6.1.i686.rpma>python3.11-libs-3.11.11-2.el9_6.1.x86_64.rpmÔoO QBBBBBBBBsecurityImportant: python3.12 security updateQg https://access.redhat.com/errata/RHSA-2025:10189RHSA-2025:10189RHSA-2025:10189 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10189.htmlALSA-2025:10189ALSA-2025:10189 Vpython3.12-libs-3.12.9-1.el9_6.1.i686.rpm Vpython3.12-3.12.9-1.el9_6.1.x86_64.rpmVpython3.12-devel-3.12.9-1.el9_6.1.i686.rpmVpython3.12-libs-3.12.9-1.el9_6.1.x86_64.rpmVpython3.12-devel-3.12.9-1.el9_6.1.x86_64.rpm!Vpython3.12-tkinter-3.12.9-1.el9_6.1.x86_64.rpmVpython3.12-libs-3.12.9-1.el9_6.1.i686.rpm Vpython3.12-3.12.9-1.el9_6.1.x86_64.rpmVpython3.12-devel-3.12.9-1.el9_6.1.i686.rpmVpython3.12-libs-3.12.9-1.el9_6.1.x86_64.rpmVpython3.12-devel-3.12.9-1.el9_6.1.x86_64.rpm!Vpython3.12-tkinter-3.12.9-1.el9_6.1.x86_64.rpmÔcP \securityImportant: thunderbird security update8https://access.redhat.com/errata/RHSA-2025:10196RHSA-2025:10196RHSA-2025:10196 https://access.redhat.com/security/cve/CVE-2025-5986CVE-2025-5986CVE-2025-5986https://bugzilla.redhat.com/23722812372281https://errata.almalinux.org/9/ALSA-2025-10196.htmlALSA-2025:10196ALSA-2025:10196 :vthunderbird-128.12.0-1.el9_6.alma.1.x86_64.rpm:vthunderbird-128.12.0-1.el9_6.alma.1.x86_64.rpmØQ !_securityModerate: socat security updateOvhttps://access.redhat.com/errata/RHSA-2025:10353RHSA-2025:10353RHSA-2025:10353 https://access.redhat.com/security/cve/CVE-2024-54661CVE-2024-54661CVE-2024-54661https://bugzilla.redhat.com/23302972330297https://errata.almalinux.org/9/ALSA-2025-10353.htmlALSA-2025:10353ALSA-2025:10353 3socat-1.7.4.1-6.el9_6.1.x86_64.rpm3socat-1.7.4.1-6.el9_6.1.x86_64.rpmøJR 5bBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateE] https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379 https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379 "Jkernel-debug-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpmJkernel-doc-5.14.0-570.25.1.el9_6.noarch.rpm)Jrv-5.14.0-570.25.1.el9_6.x86_64.rpm&Jkernel-headers-5.14.0-570.25.1.el9_6.x86_64.rpm'Jrtla-5.14.0-570.25.1.el9_6.x86_64.rpmVJpython3-perf-5.14.0-570.25.1.el9_6.x86_64.rpm$Jkernel-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm!Jkernel-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm%Jperf-5.14.0-570.25.1.el9_6.x86_64.rpm#Jkernel-devel-5.14.0-570.25.1.el9_6.x86_64.rpm "Jkernel-debug-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpmJkernel-doc-5.14.0-570.25.1.el9_6.noarch.rpm)Jrv-5.14.0-570.25.1.el9_6.x86_64.rpm&Jkernel-headers-5.14.0-570.25.1.el9_6.x86_64.rpm'Jrtla-5.14.0-570.25.1.el9_6.x86_64.rpmVJpython3-perf-5.14.0-570.25.1.el9_6.x86_64.rpm$Jkernel-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm!Jkernel-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm%Jperf-5.14.0-570.25.1.el9_6.x86_64.rpm#Jkernel-devel-5.14.0-570.25.1.el9_6.x86_64.rpmÿS ?vBBBBBBBsecurityImportant: podman security update"Thttps://access.redhat.com/errata/RHSA-2025:10550RHSA-2025:10550RHSA-2025:10550 https://access.redhat.com/security/cve/CVE-2025-6032CVE-2025-6032CVE-2025-6032https://bugzilla.redhat.com/23725012372501https://errata.almalinux.org/9/ALSA-2025-10550.htmlALSA-2025:10550ALSA-2025:10550 3Qpodman-plugins-5.4.0-12.el9_6.x86_64.rpm4Qpodman-remote-5.4.0-12.el9_6.x86_64.rpm5Qpodman-tests-5.4.0-12.el9_6.x86_64.rpmgQpodman-docker-5.4.0-12.el9_6.noarch.rpm2Qpodman-5.4.0-12.el9_6.x86_64.rpm3Qpodman-plugins-5.4.0-12.el9_6.x86_64.rpm4Qpodman-remote-5.4.0-12.el9_6.x86_64.rpm5Qpodman-tests-5.4.0-12.el9_6.x86_64.rpmgQpodman-docker-5.4.0-12.el9_6.noarch.rpm2Qpodman-5.4.0-12.el9_6.x86_64.rpmø T @securityModerate: gnome-remote-desktop security updatev%https://access.redhat.com/errata/RHSA-2025:10631RHSA-2025:10631RHSA-2025:10631 https://access.redhat.com/security/cve/CVE-2025-5024CVE-2025-5024CVE-2025-5024https://bugzilla.redhat.com/23677172367717https://errata.almalinux.org/9/ALSA-2025-10631.htmlALSA-2025:10631ALSA-2025:10631 _[gnome-remote-desktop-40.0-11.el9_6.x86_64.rpm_[gnome-remote-desktop-40.0-11.el9_6.x86_64.rpmþU CBBsecurityImportant: firefox security updatehttps://access.redhat.com/errata/RHSA-2025:1066RHSA-2025:1066RHSA-2025:1066 https://access.redhat.com/security/cve/CVE-2025-1009CVE-2025-1009CVE-2025-1009https://access.redhat.com/security/cve/CVE-2025-1010CVE-2025-1010CVE-2025-1010https://access.redhat.com/security/cve/CVE-2025-1011CVE-2025-1011CVE-2025-1011https://access.redhat.com/security/cve/CVE-2025-1012CVE-2025-1012CVE-2025-1012https://access.redhat.com/security/cve/CVE-2025-1013CVE-2025-1013CVE-2025-1013https://access.redhat.com/security/cve/CVE-2025-1014CVE-2025-1014CVE-2025-1014https://access.redhat.com/security/cve/CVE-2025-1016CVE-2025-1016CVE-2025-1016https://access.redhat.com/security/cve/CVE-2025-1017CVE-2025-1017CVE-2025-1017https://bugzilla.redhat.com/23437482343748https://bugzilla.redhat.com/23437502343750https://bugzilla.redhat.com/23437522343752https://bugzilla.redhat.com/23437542343754https://bugzilla.redhat.com/23437562343756https://bugzilla.redhat.com/23437602343760https://bugzilla.redhat.com/23437642343764https://bugzilla.redhat.com/23437652343765https://errata.almalinux.org/9/ALSA-2025-1066.htmlALSA-2025:1066ALSA-2025:1066 Qfirefox-x11-128.7.0-1.el9_5.x86_64.rpm8firefox-128.7.0-1.el9_5.x86_64.rpmQfirefox-x11-128.7.0-1.el9_5.x86_64.rpm8firefox-128.7.0-1.el9_5.x86_64.rpm$V HBBBBBBBBBBsecurityModerate: golang security update:https://access.redhat.com/errata/RHSA-2025:10676RHSA-2025:10676RHSA-2025:10676 https://access.redhat.com/security/cve/CVE-2025-4673CVE-2025-4673CVE-2025-4673https://bugzilla.redhat.com/23733052373305https://errata.almalinux.org/9/ALSA-2025-10676.htmlALSA-2025:10676ALSA-2025:10676 ?Vgolang-1.24.4-1.el9_6.x86_64.rpmnVgo-toolset-1.24.4-1.el9_6.x86_64.rpmVgolang-misc-1.24.4-1.el9_6.noarch.rpmIVgolang-race-1.24.4-1.el9_6.x86_64.rpmVgolang-docs-1.24.4-1.el9_6.noarch.rpmVgolang-tests-1.24.4-1.el9_6.noarch.rpm@Vgolang-bin-1.24.4-1.el9_6.x86_64.rpmVgolang-src-1.24.4-1.el9_6.noarch.rpm?Vgolang-1.24.4-1.el9_6.x86_64.rpmnVgo-toolset-1.24.4-1.el9_6.x86_64.rpmVgolang-misc-1.24.4-1.el9_6.noarch.rpmIVgolang-race-1.24.4-1.el9_6.x86_64.rpmVgolang-docs-1.24.4-1.el9_6.noarch.rpmVgolang-tests-1.24.4-1.el9_6.noarch.rpm@Vgolang-bin-1.24.4-1.el9_6.x86_64.rpmVgolang-src-1.24.4-1.el9_6.noarch.rpm\W UBsecurityImportant: libxml2 security update>Lhttps://access.redhat.com/errata/RHSA-2025:10699RHSA-2025:10699RHSA-2025:10699 https://access.redhat.com/security/cve/CVE-2025-49794CVE-2025-49794CVE-2025-49794https://access.redhat.com/security/cve/CVE-2025-49796CVE-2025-49796CVE-2025-49796https://access.redhat.com/security/cve/CVE-2025-6021CVE-2025-6021CVE-2025-6021https://bugzilla.redhat.com/23723732372373https://bugzilla.redhat.com/23723852372385https://bugzilla.redhat.com/23724062372406https://errata.almalinux.org/9/ALSA-2025-10699.htmlALSA-2025:10699ALSA-2025:10699 6Llibxml2-devel-2.9.13-10.el9_6.x86_64.rpm6Llibxml2-devel-2.9.13-10.el9_6.i686.rpm6Llibxml2-devel-2.9.13-10.el9_6.x86_64.rpm6Llibxml2-devel-2.9.13-10.el9_6.i686.rpmþ#X ,YBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837 https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837 "Kkernel-debug-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpmKkernel-doc-5.14.0-570.26.1.el9_6.noarch.rpm%Kperf-5.14.0-570.26.1.el9_6.x86_64.rpm!Kkernel-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm)Krv-5.14.0-570.26.1.el9_6.x86_64.rpm'Krtla-5.14.0-570.26.1.el9_6.x86_64.rpmVKpython3-perf-5.14.0-570.26.1.el9_6.x86_64.rpm$Kkernel-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm&Kkernel-headers-5.14.0-570.26.1.el9_6.x86_64.rpm#Kkernel-devel-5.14.0-570.26.1.el9_6.x86_64.rpm "Kkernel-debug-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpmKkernel-doc-5.14.0-570.26.1.el9_6.noarch.rpm%Kperf-5.14.0-570.26.1.el9_6.x86_64.rpm!Kkernel-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm)Krv-5.14.0-570.26.1.el9_6.x86_64.rpm'Krtla-5.14.0-570.26.1.el9_6.x86_64.rpmVKpython3-perf-5.14.0-570.26.1.el9_6.x86_64.rpm$Kkernel-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm&Kkernel-headers-5.14.0-570.26.1.el9_6.x86_64.rpm#Kkernel-devel-5.14.0-570.26.1.el9_6.x86_64.rpmhY .-securityImportant: cloud-init security updatelhttps://access.redhat.com/errata/RHSA-2025:10848RHSA-2025:10848RHSA-2025:10848 https://access.redhat.com/security/cve/CVE-2024-6174CVE-2024-6174CVE-2024-6174https://bugzilla.redhat.com/23749242374924https://errata.almalinux.org/9/ALSA-2025-10848.htmlALSA-2025:10848ALSA-2025:10848  *cloud-init-24.4-4.el9_6.3.alma.1.noarch.rpm *cloud-init-24.4-4.el9_6.3.alma.1.noarch.rpm{Z ;oBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update ahttps://access.redhat.com/errata/RHSA-2025:10862RHSA-2025:10862RHSA-2025:10862 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-30761CVE-2025-30761CVE-2025-30761https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10862.htmlALSA-2025:10862ALSA-2025:10862 46java-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9.x86_64.rpm;6java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9.noarch.rpm26java-1.8.0-openjdk-1.8.0.462.b08-3.el9.x86_64.rpm66java-1.8.0-openjdk-src-1.8.0.462.b08-3.el9.x86_64.rpm:6java-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9.noarch.rpm36java-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9.x86_64.rpm56java-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9.x86_64.rpm46java-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9.x86_64.rpm;6java-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9.noarch.rpm26java-1.8.0-openjdk-1.8.0.462.b08-3.el9.x86_64.rpm66java-1.8.0-openjdk-src-1.8.0.462.b08-3.el9.x86_64.rpm:6java-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9.noarch.rpm36java-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9.x86_64.rpm56java-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9.x86_64.rpm,[ |BBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security updatek https://access.redhat.com/errata/RHSA-2025:10867RHSA-2025:10867RHSA-2025:10867 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10867.htmlALSA-2025:10867ALSA-2025:10867 java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.16.0.8-2.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.16.0.8-2.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.16.0.8-2.el9.alma.1.x86_64.rpm޿i\ !OBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updatexqhttps://access.redhat.com/errata/RHSA-2025:10873RHSA-2025:10873RHSA-2025:10873 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10873.htmlALSA-2025:10873ALSA-2025:10873 wjava-21-openjdk-devel-21.0.8.0.9-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.8.0.9-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.8.0.9-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.8.0.9-1.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.8.0.9-1.el9.alma.1.x86_64.rpm{java-21-openjdk-jmods-21.0.8.0.9-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.8.0.9-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.8.0.9-1.el9.alma.1.x86_64.rpm wjava-21-openjdk-devel-21.0.8.0.9-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.8.0.9-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.8.0.9-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.8.0.9-1.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.8.0.9-1.el9.alma.1.x86_64.rpm{java-21-openjdk-jmods-21.0.8.0.9-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.8.0.9-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.8.0.9-1.el9.alma.1.x86_64.rpmĨn] (bBBBBsecurityModerate: glib2 security updateihttps://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140 https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140 .glib2-doc-2.68.4-16.el9_6.2.noarch.rpmGglib2-tests-2.68.4-16.el9_6.2.x86_64.rpmXglib2-devel-2.68.4-16.el9_6.2.i686.rpmXglib2-devel-2.68.4-16.el9_6.2.x86_64.rpm.glib2-doc-2.68.4-16.el9_6.2.noarch.rpmGglib2-tests-2.68.4-16.el9_6.2.x86_64.rpmXglib2-devel-2.68.4-16.el9_6.2.i686.rpmXglib2-devel-2.68.4-16.el9_6.2.x86_64.rpm޽5^ 1iBBBBBBsecurityImportant: tomcat security updatemhttps://access.redhat.com/errata/RHSA-2025:11335RHSA-2025:11335RHSA-2025:11335 https://access.redhat.com/security/cve/CVE-2024-56337CVE-2024-56337CVE-2024-56337https://access.redhat.com/security/cve/CVE-2025-31650CVE-2025-31650CVE-2025-31650https://bugzilla.redhat.com/23335212333521https://bugzilla.redhat.com/23627832362783https://errata.almalinux.org/9/ALSA-2025-11335.htmlALSA-2025:11335ALSA-2025:11335 A~tomcat-webapps-9.0.87-3.el9_6.1.noarch.rpm@~tomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpm:~tomcat-9.0.87-3.el9_6.1.noarch.rpm<~tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpm?~tomcat-lib-9.0.87-3.el9_6.1.noarch.rpm=~tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpm>~tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpm;~tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpmA~tomcat-webapps-9.0.87-3.el9_6.1.noarch.rpm@~tomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpm:~tomcat-9.0.87-3.el9_6.1.noarch.rpm<~tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpm?~tomcat-lib-9.0.87-3.el9_6.1.noarch.rpm=~tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpm>~tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpm;~tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpm-_ rBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateoVhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411 https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411 %Lperf-5.14.0-570.28.1.el9_6.x86_64.rpm)Lrv-5.14.0-570.28.1.el9_6.x86_64.rpm"Lkernel-debug-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm'Lrtla-5.14.0-570.28.1.el9_6.x86_64.rpm!Lkernel-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm#Lkernel-devel-5.14.0-570.28.1.el9_6.x86_64.rpmLkernel-doc-5.14.0-570.28.1.el9_6.noarch.rpm&Lkernel-headers-5.14.0-570.28.1.el9_6.x86_64.rpm$Lkernel-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpmVLpython3-perf-5.14.0-570.28.1.el9_6.x86_64.rpm %Lperf-5.14.0-570.28.1.el9_6.x86_64.rpm)Lrv-5.14.0-570.28.1.el9_6.x86_64.rpm"Lkernel-debug-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm'Lrtla-5.14.0-570.28.1.el9_6.x86_64.rpm!Lkernel-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm#Lkernel-devel-5.14.0-570.28.1.el9_6.x86_64.rpmLkernel-doc-5.14.0-570.28.1.el9_6.noarch.rpm&Lkernel-headers-5.14.0-570.28.1.el9_6.x86_64.rpm$Lkernel-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpmVLpython3-perf-5.14.0-570.28.1.el9_6.x86_64.rpmĂ>` FBBBBBBBBBBBBBBBBBBsecurityImportant: git security updateEMhttps://access.redhat.com/errata/RHSA-2025:11462RHSA-2025:11462RHSA-2025:11462 https://access.redhat.com/security/cve/CVE-2024-50349CVE-2024-50349CVE-2024-50349https://access.redhat.com/security/cve/CVE-2024-52006CVE-2024-52006CVE-2024-52006https://access.redhat.com/security/cve/CVE-2025-27613CVE-2025-27613CVE-2025-27613https://access.redhat.com/security/cve/CVE-2025-27614CVE-2025-27614CVE-2025-27614https://access.redhat.com/security/cve/CVE-2025-46835CVE-2025-46835CVE-2025-46835https://access.redhat.com/security/cve/CVE-2025-48384CVE-2025-48384CVE-2025-48384https://access.redhat.com/security/cve/CVE-2025-48385CVE-2025-48385CVE-2025-48385https://bugzilla.redhat.com/23378242337824https://bugzilla.redhat.com/23379562337956https://bugzilla.redhat.com/23788062378806https://bugzilla.redhat.com/23788082378808https://bugzilla.redhat.com/23791242379124https://bugzilla.redhat.com/23791252379125https://bugzilla.redhat.com/23793262379326https://errata.almalinux.org/9/ALSA-2025-11462.htmlALSA-2025:11462ALSA-2025:11462 Cgit-core-2.47.3-1.el9_6.x86_64.rpm@git-svn-2.47.3-1.el9_6.noarch.rpm;git-core-doc-2.47.3-1.el9_6.noarch.rpm<git-email-2.47.3-1.el9_6.noarch.rpmJperl-Git-SVN-2.47.3-1.el9_6.noarch.rpmBgitweb-2.47.3-1.el9_6.noarch.rpmBgit-2.47.3-1.el9_6.x86_64.rpmIperl-Git-2.47.3-1.el9_6.noarch.rpm=git-gui-2.47.3-1.el9_6.noarch.rpmFgit-subtree-2.47.3-1.el9_6.x86_64.rpmAgitk-2.47.3-1.el9_6.noarch.rpm:git-all-2.47.3-1.el9_6.noarch.rpm>git-instaweb-2.47.3-1.el9_6.noarch.rpmDgit-credential-libsecret-2.47.3-1.el9_6.x86_64.rpmEgit-daemon-2.47.3-1.el9_6.x86_64.rpmCgit-core-2.47.3-1.el9_6.x86_64.rpm@git-svn-2.47.3-1.el9_6.noarch.rpm;git-core-doc-2.47.3-1.el9_6.noarch.rpm<git-email-2.47.3-1.el9_6.noarch.rpmJperl-Git-SVN-2.47.3-1.el9_6.noarch.rpmBgitweb-2.47.3-1.el9_6.noarch.rpmBgit-2.47.3-1.el9_6.x86_64.rpmIperl-Git-2.47.3-1.el9_6.noarch.rpm=git-gui-2.47.3-1.el9_6.noarch.rpmFgit-subtree-2.47.3-1.el9_6.x86_64.rpmAgitk-2.47.3-1.el9_6.noarch.rpm:git-all-2.47.3-1.el9_6.noarch.rpm>git-instaweb-2.47.3-1.el9_6.noarch.rpmDgit-credential-libsecret-2.47.3-1.el9_6.x86_64.rpmEgit-daemon-2.47.3-1.el9_6.x86_64.rpm@a #[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security updatehttps://access.redhat.com/errata/RHSA-2025:11463RHSA-2025:11463RHSA-2025:11463 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-11463.htmlALSA-2025:11463ALSA-2025:11463 6T fence-agents-scsi-4.10.0-86.el9_6.7.noarch.rpm; fence-agents-bladecenter-4.10.0-86.el9_6.7.noarch.rpmb fence-virtd-4.10.0-86.el9_6.7.x86_64.rpmH fence-agents-ilo-mp-4.10.0-86.el9_6.7.noarch.rpmN fence-agents-lpar-4.10.0-86.el9_6.7.noarch.rpmW fence-agents-wti-4.10.0-86.el9_6.7.noarch.rpmB fence-agents-eps-4.10.0-86.el9_6.7.noarch.rpmQ fence-agents-rsa-4.10.0-86.el9_6.7.noarch.rpmM fence-agents-ipmilan-4.10.0-86.el9_6.7.noarch.rpmR fence-agents-rsb-4.10.0-86.el9_6.7.noarch.rpmO fence-agents-mpath-4.10.0-86.el9_6.7.noarch.rpm9 fence-agents-apc-4.10.0-86.el9_6.7.noarch.rpma fence-virt-4.10.0-86.el9_6.7.x86_64.rpmJ fence-agents-ilo2-4.10.0-86.el9_6.7.noarch.rpm. fence-agents-ibm-vpc-4.10.0-86.el9_6.7.noarch.rpm- fence-agents-ibm-powervs-4.10.0-86.el9_6.7.noarch.rpmF fence-agents-ifmib-4.10.0-86.el9_6.7.noarch.rpmS fence-agents-sbd-4.10.0-86.el9_6.7.noarch.rpm_ fence-agents-compute-4.10.0-86.el9_6.7.x86_64.rpmI fence-agents-ilo-ssh-4.10.0-86.el9_6.7.noarch.rpmo fence-agents-redfish-4.10.0-86.el9_6.7.x86_64.rpm> fence-agents-cisco-ucs-4.10.0-86.el9_6.7.noarch.rpmD fence-agents-hpblade-4.10.0-86.el9_6.7.noarch.rpmi fence-agents-all-4.10.0-86.el9_6.7.x86_64.rpm/ fence-agents-virsh-4.10.0-86.el9_6.7.noarch.rpm@ fence-agents-eaton-snmp-4.10.0-86.el9_6.7.noarch.rpm: fence-agents-apc-snmp-4.10.0-86.el9_6.7.noarch.rpmC fence-agents-heuristics-ping-4.10.0-86.el9_6.7.noarch.rpm8 fence-agents-amt-ws-4.10.0-86.el9_6.7.noarch.rpmf fence-virtd-serial-4.10.0-86.el9_6.7.x86_64.rpmd fence-virtd-libvirt-4.10.0-86.el9_6.7.x86_64.rpmG fence-agents-ilo-moonshot-4.10.0-86.el9_6.7.noarch.rpmm fence-agents-kdump-4.10.0-86.el9_6.7.x86_64.rpmg fence-virtd-tcp-4.10.0-86.el9_6.7.x86_64.rpm= fence-agents-cisco-mds-4.10.0-86.el9_6.7.noarch.rpmE fence-agents-ibmblade-4.10.0-86.el9_6.7.noarch.rpmh fence-agents-aliyun-4.10.0-86.el9_6.7.x86_64.rpmL fence-agents-ipdu-4.10.0-86.el9_6.7.noarch.rpm, fence-agents-common-4.10.0-86.el9_6.7.noarch.rpml fence-agents-gce-4.10.0-86.el9_6.7.x86_64.rpmc fence-virtd-cpg-4.10.0-86.el9_6.7.x86_64.rpmn fence-agents-openstack-4.10.0-86.el9_6.7.x86_64.rpmA fence-agents-emerson-4.10.0-86.el9_6.7.noarch.rpm? fence-agents-drac5-4.10.0-86.el9_6.7.noarch.rpmK fence-agents-intelmodular-4.10.0-86.el9_6.7.noarch.rpm` fence-agents-kubevirt-4.10.0-86.el9_6.7.x86_64.rpm< fence-agents-brocade-4.10.0-86.el9_6.7.noarch.rpmj fence-agents-aws-4.10.0-86.el9_6.7.x86_64.rpmP fence-agents-rhevm-4.10.0-86.el9_6.7.noarch.rpmV fence-agents-vmware-soap-4.10.0-86.el9_6.7.noarch.rpmk fence-agents-azure-arm-4.10.0-86.el9_6.7.x86_64.rpme fence-virtd-multicast-4.10.0-86.el9_6.7.x86_64.rpmr ha-cloud-support-4.10.0-86.el9_6.7.x86_64.rpmU fence-agents-vmware-rest-4.10.0-86.el9_6.7.noarch.rpm6T fence-agents-scsi-4.10.0-86.el9_6.7.noarch.rpm; fence-agents-bladecenter-4.10.0-86.el9_6.7.noarch.rpmb fence-virtd-4.10.0-86.el9_6.7.x86_64.rpmH fence-agents-ilo-mp-4.10.0-86.el9_6.7.noarch.rpmN fence-agents-lpar-4.10.0-86.el9_6.7.noarch.rpmW fence-agents-wti-4.10.0-86.el9_6.7.noarch.rpmB fence-agents-eps-4.10.0-86.el9_6.7.noarch.rpmQ fence-agents-rsa-4.10.0-86.el9_6.7.noarch.rpmM fence-agents-ipmilan-4.10.0-86.el9_6.7.noarch.rpmR fence-agents-rsb-4.10.0-86.el9_6.7.noarch.rpmO fence-agents-mpath-4.10.0-86.el9_6.7.noarch.rpm9 fence-agents-apc-4.10.0-86.el9_6.7.noarch.rpma fence-virt-4.10.0-86.el9_6.7.x86_64.rpmJ fence-agents-ilo2-4.10.0-86.el9_6.7.noarch.rpm. fence-agents-ibm-vpc-4.10.0-86.el9_6.7.noarch.rpm- fence-agents-ibm-powervs-4.10.0-86.el9_6.7.noarch.rpmF fence-agents-ifmib-4.10.0-86.el9_6.7.noarch.rpmS fence-agents-sbd-4.10.0-86.el9_6.7.noarch.rpm_ fence-agents-compute-4.10.0-86.el9_6.7.x86_64.rpmI fence-agents-ilo-ssh-4.10.0-86.el9_6.7.noarch.rpmo fence-agents-redfish-4.10.0-86.el9_6.7.x86_64.rpm> fence-agents-cisco-ucs-4.10.0-86.el9_6.7.noarch.rpmD fence-agents-hpblade-4.10.0-86.el9_6.7.noarch.rpmi fence-agents-all-4.10.0-86.el9_6.7.x86_64.rpm/ fence-agents-virsh-4.10.0-86.el9_6.7.noarch.rpm@ fence-agents-eaton-snmp-4.10.0-86.el9_6.7.noarch.rpm: fence-agents-apc-snmp-4.10.0-86.el9_6.7.noarch.rpmC fence-agents-heuristics-ping-4.10.0-86.el9_6.7.noarch.rpm8 fence-agents-amt-ws-4.10.0-86.el9_6.7.noarch.rpmf fence-virtd-serial-4.10.0-86.el9_6.7.x86_64.rpmd fence-virtd-libvirt-4.10.0-86.el9_6.7.x86_64.rpmG fence-agents-ilo-moonshot-4.10.0-86.el9_6.7.noarch.rpmm fence-agents-kdump-4.10.0-86.el9_6.7.x86_64.rpmg fence-virtd-tcp-4.10.0-86.el9_6.7.x86_64.rpm= fence-agents-cisco-mds-4.10.0-86.el9_6.7.noarch.rpmE fence-agents-ibmblade-4.10.0-86.el9_6.7.noarch.rpmh fence-agents-aliyun-4.10.0-86.el9_6.7.x86_64.rpmL fence-agents-ipdu-4.10.0-86.el9_6.7.noarch.rpm, fence-agents-common-4.10.0-86.el9_6.7.noarch.rpml fence-agents-gce-4.10.0-86.el9_6.7.x86_64.rpmc fence-virtd-cpg-4.10.0-86.el9_6.7.x86_64.rpmn fence-agents-openstack-4.10.0-86.el9_6.7.x86_64.rpmA fence-agents-emerson-4.10.0-86.el9_6.7.noarch.rpm? fence-agents-drac5-4.10.0-86.el9_6.7.noarch.rpmK fence-agents-intelmodular-4.10.0-86.el9_6.7.noarch.rpm` fence-agents-kubevirt-4.10.0-86.el9_6.7.x86_64.rpm< fence-agents-brocade-4.10.0-86.el9_6.7.noarch.rpmj fence-agents-aws-4.10.0-86.el9_6.7.x86_64.rpmP fence-agents-rhevm-4.10.0-86.el9_6.7.noarch.rpmV fence-agents-vmware-soap-4.10.0-86.el9_6.7.noarch.rpmk fence-agents-azure-arm-4.10.0-86.el9_6.7.x86_64.rpme fence-virtd-multicast-4.10.0-86.el9_6.7.x86_64.rpmr ha-cloud-support-4.10.0-86.el9_6.7.x86_64.rpmU fence-agents-vmware-rest-4.10.0-86.el9_6.7.noarch.rpmb (dBBsecurityImportant: firefox security update:https://access.redhat.com/errata/RHSA-2025:11748RHSA-2025:11748RHSA-2025:11748 https://access.redhat.com/security/cve/CVE-2025-8027CVE-2025-8027CVE-2025-8027https://access.redhat.com/security/cve/CVE-2025-8028CVE-2025-8028CVE-2025-8028https://access.redhat.com/security/cve/CVE-2025-8029CVE-2025-8029CVE-2025-8029https://access.redhat.com/security/cve/CVE-2025-8030CVE-2025-8030CVE-2025-8030https://access.redhat.com/security/cve/CVE-2025-8031CVE-2025-8031CVE-2025-8031https://access.redhat.com/security/cve/CVE-2025-8032CVE-2025-8032CVE-2025-8032https://access.redhat.com/security/cve/CVE-2025-8033CVE-2025-8033CVE-2025-8033https://access.redhat.com/security/cve/CVE-2025-8034CVE-2025-8034CVE-2025-8034https://access.redhat.com/security/cve/CVE-2025-8035CVE-2025-8035CVE-2025-8035https://bugzilla.redhat.com/23827012382701https://bugzilla.redhat.com/23827032382703https://bugzilla.redhat.com/23827042382704https://bugzilla.redhat.com/23827072382707https://bugzilla.redhat.com/23827102382710https://bugzilla.redhat.com/23827112382711https://bugzilla.redhat.com/23827172382717https://bugzilla.redhat.com/23827182382718https://bugzilla.redhat.com/23827202382720https://errata.almalinux.org/9/ALSA-2025-11748.htmlALSA-2025:11748ALSA-2025:11748 8firefox-128.13.0-1.el9_6.alma.1.x86_64.rpmQfirefox-x11-128.13.0-1.el9_6.alma.1.x86_64.rpm8firefox-128.13.0-1.el9_6.alma.1.x86_64.rpmQfirefox-x11-128.13.0-1.el9_6.alma.1.x86_64.rpmĨDc +isecurityImportant: thunderbird security updateP https://access.redhat.com/errata/RHSA-2025:1184RHSA-2025:1184RHSA-2025:1184 https://access.redhat.com/security/cve/CVE-2025-0510CVE-2025-0510CVE-2025-0510https://access.redhat.com/security/cve/CVE-2025-1009CVE-2025-1009CVE-2025-1009https://access.redhat.com/security/cve/CVE-2025-1010CVE-2025-1010CVE-2025-1010https://access.redhat.com/security/cve/CVE-2025-1011CVE-2025-1011CVE-2025-1011https://access.redhat.com/security/cve/CVE-2025-1012CVE-2025-1012CVE-2025-1012https://access.redhat.com/security/cve/CVE-2025-1013CVE-2025-1013CVE-2025-1013https://access.redhat.com/security/cve/CVE-2025-1014CVE-2025-1014CVE-2025-1014https://access.redhat.com/security/cve/CVE-2025-1015CVE-2025-1015CVE-2025-1015https://access.redhat.com/security/cve/CVE-2025-1016CVE-2025-1016CVE-2025-1016https://access.redhat.com/security/cve/CVE-2025-1017CVE-2025-1017CVE-2025-1017https://bugzilla.redhat.com/23437482343748https://bugzilla.redhat.com/23437502343750https://bugzilla.redhat.com/23437522343752https://bugzilla.redhat.com/23437542343754https://bugzilla.redhat.com/23437562343756https://bugzilla.redhat.com/23437592343759https://bugzilla.redhat.com/23437602343760https://bugzilla.redhat.com/23437622343762https://bugzilla.redhat.com/23437642343764https://bugzilla.redhat.com/23437652343765https://errata.almalinux.org/9/ALSA-2025-1184.htmlALSA-2025:1184ALSA-2025:1184 :\thunderbird-128.7.0-1.el9_5.alma.1.x86_64.rpm:\thunderbird-128.7.0-1.el9_5.alma.1.x86_64.rpm(d 5lBBBBBBBsecurityImportant: unbound security update[hhttps://access.redhat.com/errata/RHSA-2025:11849RHSA-2025:11849RHSA-2025:11849 https://access.redhat.com/security/cve/CVE-2025-5994CVE-2025-5994CVE-2025-5994https://bugzilla.redhat.com/23809492380949https://errata.almalinux.org/9/ALSA-2025-11849.htmlALSA-2025:11849ALSA-2025:11849 23unbound-libs-1.16.2-19.el9_6.1.x86_64.rpmK3unbound-1.16.2-19.el9_6.1.x86_64.rpm23unbound-libs-1.16.2-19.el9_6.1.i686.rpm#3unbound-dracut-1.16.2-19.el9_6.1.x86_64.rpmH3python3-unbound-1.16.2-19.el9_6.1.x86_64.rpm23unbound-libs-1.16.2-19.el9_6.1.x86_64.rpmK3unbound-1.16.2-19.el9_6.1.x86_64.rpm23unbound-libs-1.16.2-19.el9_6.1.i686.rpm#3unbound-dracut-1.16.2-19.el9_6.1.x86_64.rpmH3python3-unbound-1.16.2-19.el9_6.1.x86_64.rpmĞ_e vBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateChttps://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861 https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861 %Mperf-5.14.0-570.30.1.el9_6.x86_64.rpm$Mkernel-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm'Mrtla-5.14.0-570.30.1.el9_6.x86_64.rpm!Mkernel-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpmVMpython3-perf-5.14.0-570.30.1.el9_6.x86_64.rpmMkernel-doc-5.14.0-570.30.1.el9_6.noarch.rpm"Mkernel-debug-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm#Mkernel-devel-5.14.0-570.30.1.el9_6.x86_64.rpm&Mkernel-headers-5.14.0-570.30.1.el9_6.x86_64.rpm)Mrv-5.14.0-570.30.1.el9_6.x86_64.rpm %Mperf-5.14.0-570.30.1.el9_6.x86_64.rpm$Mkernel-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm'Mrtla-5.14.0-570.30.1.el9_6.x86_64.rpm!Mkernel-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpmVMpython3-perf-5.14.0-570.30.1.el9_6.x86_64.rpmMkernel-doc-5.14.0-570.30.1.el9_6.noarch.rpm"Mkernel-debug-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm#Mkernel-devel-5.14.0-570.30.1.el9_6.x86_64.rpm&Mkernel-headers-5.14.0-570.30.1.el9_6.x86_64.rpm)Mrv-5.14.0-570.30.1.el9_6.x86_64.rpmį'f JBBBBsecurityImportant: sqlite security updateQ https://access.redhat.com/errata/RHSA-2025:11992RHSA-2025:11992RHSA-2025:11992 https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-11992.htmlALSA-2025:11992ALSA-2025:11992 msqlite-3.34.1-8.el9_6.i686.rpmmsqlite-3.34.1-8.el9_6.x86_64.rpmnsqlite-devel-3.34.1-8.el9_6.i686.rpmnsqlite-devel-3.34.1-8.el9_6.x86_64.rpmmsqlite-3.34.1-8.el9_6.i686.rpmmsqlite-3.34.1-8.el9_6.x86_64.rpmnsqlite-devel-3.34.1-8.el9_6.i686.rpmnsqlite-devel-3.34.1-8.el9_6.x86_64.rpmĢg QBBBsecurityImportant: redis:7 security updateZthttps://access.redhat.com/errata/RHSA-2025:12008RHSA-2025:12008RHSA-2025:12008 https://access.redhat.com/security/cve/CVE-2025-27151CVE-2025-27151CVE-2025-27151https://access.redhat.com/security/cve/CVE-2025-32023CVE-2025-32023CVE-2025-32023https://access.redhat.com/security/cve/CVE-2025-48367CVE-2025-48367CVE-2025-48367https://bugzilla.redhat.com/23691532369153https://errata.almalinux.org/9/ALSA-2025-12008.htmlALSA-2025:12008ALSA-2025:12008 "(" redis-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm> redis-devel-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm redis-doc-7.2.10-1.module_el9.6.0+173+efaf9205.noarch.rpm"(" redis-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm> redis-devel-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm redis-doc-7.2.10-1.module_el9.6.0+173+efaf9205.noarch.rpmĢ,h WBBBsecurityModerate: icu security updateNhttps://access.redhat.com/errata/RHSA-2025:12083RHSA-2025:12083RHSA-2025:12083 https://access.redhat.com/security/cve/CVE-2025-5222CVE-2025-5222CVE-2025-5222https://bugzilla.redhat.com/23686002368600https://errata.almalinux.org/9/ALSA-2025-12083.htmlALSA-2025:12083ALSA-2025:12083 8 libicu-devel-67.1-10.el9_6.x86_64.rpmi icu-67.1-10.el9_6.x86_64.rpm8 libicu-devel-67.1-10.el9_6.i686.rpm8 libicu-devel-67.1-10.el9_6.x86_64.rpmi icu-67.1-10.el9_6.x86_64.rpm8 libicu-devel-67.1-10.el9_6.i686.rpmħHi ']BBBBBBBBsecurityModerate: tbb security update`ahttps://access.redhat.com/errata/RHSA-2025:1210RHSA-2025:1210RHSA-2025:1210 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1210.htmlALSA-2025:1210ALSA-2025:1210 c;tbb-2020.3-8.el9_5.1.i686.rpmp;python3-tbb-2020.3-8.el9_5.1.x86_64.rpmd;tbb-devel-2020.3-8.el9_5.1.i686.rpmc;tbb-2020.3-8.el9_5.1.x86_64.rpmd;tbb-devel-2020.3-8.el9_5.1.x86_64.rpm;tbb-doc-2020.3-8.el9_5.1.x86_64.rpmc;tbb-2020.3-8.el9_5.1.i686.rpmp;python3-tbb-2020.3-8.el9_5.1.x86_64.rpmd;tbb-devel-2020.3-8.el9_5.1.i686.rpmc;tbb-2020.3-8.el9_5.1.x86_64.rpmd;tbb-devel-2020.3-8.el9_5.1.x86_64.rpm;tbb-doc-2020.3-8.el9_5.1.x86_64.rpmj +hBsecurityModerate: libtpms security updateAhttps://access.redhat.com/errata/RHSA-2025:12100RHSA-2025:12100RHSA-2025:12100 https://access.redhat.com/security/cve/CVE-2025-49133CVE-2025-49133CVE-2025-49133https://bugzilla.redhat.com/23715852371585https://errata.almalinux.org/9/ALSA-2025-12100.htmlALSA-2025:12100ALSA-2025:12100 3libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm3libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpm3libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm3libtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpmħDk .lsecurityImportant: thunderbird security updateE https://access.redhat.com/errata/RHSA-2025:12187RHSA-2025:12187RHSA-2025:12187 https://access.redhat.com/security/cve/CVE-2025-8027CVE-2025-8027CVE-2025-8027https://access.redhat.com/security/cve/CVE-2025-8028CVE-2025-8028CVE-2025-8028https://access.redhat.com/security/cve/CVE-2025-8029CVE-2025-8029CVE-2025-8029https://access.redhat.com/security/cve/CVE-2025-8030CVE-2025-8030CVE-2025-8030https://access.redhat.com/security/cve/CVE-2025-8031CVE-2025-8031CVE-2025-8031https://access.redhat.com/security/cve/CVE-2025-8032CVE-2025-8032CVE-2025-8032https://access.redhat.com/security/cve/CVE-2025-8033CVE-2025-8033CVE-2025-8033https://access.redhat.com/security/cve/CVE-2025-8034CVE-2025-8034CVE-2025-8034https://access.redhat.com/security/cve/CVE-2025-8035CVE-2025-8035CVE-2025-8035https://bugzilla.redhat.com/23827012382701https://bugzilla.redhat.com/23827032382703https://bugzilla.redhat.com/23827042382704https://bugzilla.redhat.com/23827072382707https://bugzilla.redhat.com/23827102382710https://bugzilla.redhat.com/23827112382711https://bugzilla.redhat.com/23827172382717https://bugzilla.redhat.com/23827182382718https://bugzilla.redhat.com/23827202382720https://errata.almalinux.org/9/ALSA-2025-12187.htmlALSA-2025:12187ALSA-2025:12187 :Uthunderbird-128.13.0-3.el9_6.alma.1.x86_64.rpm:Uthunderbird-128.13.0-3.el9_6.alma.1.x86_64.rpmĨHl 5oBBBBsecurityImportant: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security updateNhttps://access.redhat.com/errata/RHSA-2025:12280RHSA-2025:12280RHSA-2025:12280 https://access.redhat.com/security/cve/CVE-2025-52999CVE-2025-52999CVE-2025-52999https://bugzilla.redhat.com/23748042374804https://errata.almalinux.org/9/ALSA-2025-12280.htmlALSA-2025:12280ALSA-2025:12280 Spki-jackson-annotations-2.19.1-1.el9_6.noarch.rpmTpki-jackson-core-2.19.1-1.el9_6.noarch.rpmUpki-jackson-jaxrs-json-provider-2.19.1-1.el9_6.noarch.rpmVpki-jackson-jaxrs-providers-2.19.1-1.el9_6.noarch.rpmbpki-jackson-databind-2.19.1-1.el9_6.noarch.rpmWpki-jackson-module-jaxb-annotations-2.19.1-1.el9_6.noarch.rpmSpki-jackson-annotations-2.19.1-1.el9_6.noarch.rpmTpki-jackson-core-2.19.1-1.el9_6.noarch.rpmUpki-jackson-jaxrs-json-provider-2.19.1-1.el9_6.noarch.rpmVpki-jackson-jaxrs-providers-2.19.1-1.el9_6.noarch.rpmbpki-jackson-databind-2.19.1-1.el9_6.noarch.rpmWpki-jackson-module-jaxb-annotations-2.19.1-1.el9_6.noarch.rpmݘ m 9vBsecurityImportant: libxml2 security updated!https://access.redhat.com/errata/RHSA-2025:12447RHSA-2025:12447RHSA-2025:12447 https://access.redhat.com/security/cve/CVE-2025-7425CVE-2025-7425CVE-2025-7425https://bugzilla.redhat.com/23792742379274https://errata.almalinux.org/9/ALSA-2025-12447.htmlALSA-2025:12447ALSA-2025:12447 6Mlibxml2-devel-2.9.13-11.el9_6.x86_64.rpm6Mlibxml2-devel-2.9.13-11.el9_6.i686.rpm6Mlibxml2-devel-2.9.13-11.el9_6.x86_64.rpm6Mlibxml2-devel-2.9.13-11.el9_6.i686.rpmijxn w TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc security updateKhttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346 HKlibubsan-11.5.0-5.el9_5.alma.1.x86_64.rpm:Klibitm-11.5.0-5.el9_5.alma.1.x86_64.rpmBKlibquadmath-devel-11.5.0-5.el9_5.alma.1.i686.rpm?Kgcc-c++-11.5.0-5.el9_5.alma.1.x86_64.rpm5Klibgccjit-11.5.0-5.el9_5.alma.1.x86_64.rpmHKlibubsan-11.5.0-5.el9_5.alma.1.i686.rpm>Kgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm5Klibgccjit-11.5.0-5.el9_5.alma.1.i686.rpmBKlibquadmath-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm:Klibitm-11.5.0-5.el9_5.alma.1.i686.rpm6Kcpp-11.5.0-5.el9_5.alma.1.x86_64.rpm6Klibgccjit-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm@Kgcc-gfortran-11.5.0-5.el9_5.alma.1.x86_64.rpmBKgcc-plugin-annobin-11.5.0-5.el9_5.alma.1.x86_64.rpm0Klibasan-11.5.0-5.el9_5.alma.1.x86_64.rpm6Klibgccjit-devel-11.5.0-5.el9_5.alma.1.i686.rpm#Klibgomp-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpmGKlibstdc++-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm;Klibitm-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm;Klibitm-devel-11.5.0-5.el9_5.alma.1.i686.rpm+Kliblsan-11.5.0-5.el9_5.alma.1.x86_64.rpmAKgcc-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpm0Klibtsan-11.5.0-5.el9_5.alma.1.x86_64.rpm0Klibasan-11.5.0-5.el9_5.alma.1.i686.rpmGKlibstdc++-devel-11.5.0-5.el9_5.alma.1.i686.rpm/Klibstdc++-docs-11.5.0-5.el9_5.alma.1.x86_64.rpmHKlibubsan-11.5.0-5.el9_5.alma.1.x86_64.rpm:Klibitm-11.5.0-5.el9_5.alma.1.x86_64.rpmBKlibquadmath-devel-11.5.0-5.el9_5.alma.1.i686.rpm?Kgcc-c++-11.5.0-5.el9_5.alma.1.x86_64.rpm5Klibgccjit-11.5.0-5.el9_5.alma.1.x86_64.rpmHKlibubsan-11.5.0-5.el9_5.alma.1.i686.rpm>Kgcc-11.5.0-5.el9_5.alma.1.x86_64.rpm5Klibgccjit-11.5.0-5.el9_5.alma.1.i686.rpmBKlibquadmath-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm:Klibitm-11.5.0-5.el9_5.alma.1.i686.rpm6Kcpp-11.5.0-5.el9_5.alma.1.x86_64.rpm6Klibgccjit-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm@Kgcc-gfortran-11.5.0-5.el9_5.alma.1.x86_64.rpmBKgcc-plugin-annobin-11.5.0-5.el9_5.alma.1.x86_64.rpm0Klibasan-11.5.0-5.el9_5.alma.1.x86_64.rpm6Klibgccjit-devel-11.5.0-5.el9_5.alma.1.i686.rpm#Klibgomp-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpmGKlibstdc++-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm;Klibitm-devel-11.5.0-5.el9_5.alma.1.x86_64.rpm;Klibitm-devel-11.5.0-5.el9_5.alma.1.i686.rpm+Kliblsan-11.5.0-5.el9_5.alma.1.x86_64.rpmAKgcc-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpm0Klibtsan-11.5.0-5.el9_5.alma.1.x86_64.rpm0Klibasan-11.5.0-5.el9_5.alma.1.i686.rpmGKlibstdc++-devel-11.5.0-5.el9_5.alma.1.i686.rpm/Klibstdc++-docs-11.5.0-5.el9_5.alma.1.x86_64.rpmx ABsecurityImportant: libxml2 security updateM~https://access.redhat.com/errata/RHSA-2025:1350RHSA-2025:1350RHSA-2025:1350 https://access.redhat.com/security/cve/CVE-2022-49043CVE-2022-49043CVE-2022-49043https://bugzilla.redhat.com/23421182342118https://errata.almalinux.org/9/ALSA-2025-1350.htmlALSA-2025:1350ALSA-2025:1350 6Tlibxml2-devel-2.9.13-6.el9_5.1.i686.rpm6Tlibxml2-devel-2.9.13-6.el9_5.1.x86_64.rpm6Tlibxml2-devel-2.9.13-6.el9_5.1.i686.rpm6Tlibxml2-devel-2.9.13-6.el9_5.1.x86_64.rpm y EsecurityModerate: python3.11-setuptools security updateK3https://access.redhat.com/errata/RHSA-2025:13578RHSA-2025:13578RHSA-2025:13578 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-13578.htmlALSA-2025:13578ALSA-2025:13578 ipython3.11-setuptools-65.5.1-4.el9_6.noarch.rpmjpython3.11-setuptools-wheel-65.5.1-4.el9_6.noarch.rpmipython3.11-setuptools-65.5.1-4.el9_6.noarch.rpmjpython3.11-setuptools-wheel-65.5.1-4.el9_6.noarch.rpm8z HBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update~Hhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602 https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602 )Orv-5.14.0-570.33.2.el9_6.x86_64.rpmVOpython3-perf-5.14.0-570.33.2.el9_6.x86_64.rpm$Okernel-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm'Ortla-5.14.0-570.33.2.el9_6.x86_64.rpm!Okernel-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm"Okernel-debug-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpmOkernel-doc-5.14.0-570.33.2.el9_6.noarch.rpm#Okernel-devel-5.14.0-570.33.2.el9_6.x86_64.rpm%Operf-5.14.0-570.33.2.el9_6.x86_64.rpm&Okernel-headers-5.14.0-570.33.2.el9_6.x86_64.rpm )Orv-5.14.0-570.33.2.el9_6.x86_64.rpmVOpython3-perf-5.14.0-570.33.2.el9_6.x86_64.rpm$Okernel-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm'Ortla-5.14.0-570.33.2.el9_6.x86_64.rpm!Okernel-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm"Okernel-debug-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpmOkernel-doc-5.14.0-570.33.2.el9_6.noarch.rpm#Okernel-devel-5.14.0-570.33.2.el9_6.x86_64.rpm%Operf-5.14.0-570.33.2.el9_6.x86_64.rpm&Okernel-headers-5.14.0-570.33.2.el9_6.x86_64.rpm{ \BBsecurityImportant: toolbox security updateFhttps://access.redhat.com/errata/RHSA-2025:13673RHSA-2025:13673RHSA-2025:13673 https://access.redhat.com/security/cve/CVE-2025-23266CVE-2025-23266CVE-2025-23266https://bugzilla.redhat.com/23817942381794https://errata.almalinux.org/9/ALSA-2025-13673.htmlALSA-2025:13673ALSA-2025:13673 -ctoolbox-0.2-1.el9_6.x86_64.rpm.ctoolbox-tests-0.2-1.el9_6.x86_64.rpm-ctoolbox-0.2-1.el9_6.x86_64.rpm.ctoolbox-tests-0.2-1.el9_6.x86_64.rpmD| -aBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateWJhttps://access.redhat.com/errata/RHSA-2025:13782RHSA-2025:13782RHSA-2025:13782 https://access.redhat.com/security/cve/CVE-2025-31273CVE-2025-31273CVE-2025-31273https://access.redhat.com/security/cve/CVE-2025-31278CVE-2025-31278CVE-2025-31278https://access.redhat.com/security/cve/CVE-2025-43211CVE-2025-43211CVE-2025-43211https://access.redhat.com/security/cve/CVE-2025-43212CVE-2025-43212CVE-2025-43212https://access.redhat.com/security/cve/CVE-2025-43216CVE-2025-43216CVE-2025-43216https://access.redhat.com/security/cve/CVE-2025-43227CVE-2025-43227CVE-2025-43227https://access.redhat.com/security/cve/CVE-2025-43240CVE-2025-43240CVE-2025-43240https://access.redhat.com/security/cve/CVE-2025-43265CVE-2025-43265CVE-2025-43265https://access.redhat.com/security/cve/CVE-2025-6558CVE-2025-6558CVE-2025-6558https://bugzilla.redhat.com/23802542380254https://bugzilla.redhat.com/23843852384385https://bugzilla.redhat.com/23862682386268https://bugzilla.redhat.com/23862692386269https://bugzilla.redhat.com/23862702386270https://bugzilla.redhat.com/23862712386271https://bugzilla.redhat.com/23862732386273https://bugzilla.redhat.com/23862742386274https://bugzilla.redhat.com/23862762386276https://errata.almalinux.org/9/ALSA-2025-13782.htmlALSA-2025:13782ALSA-2025:13782 4swebkit2gtk3-jsc-devel-2.48.5-1.el9_6.x86_64.rpm3swebkit2gtk3-jsc-2.48.5-1.el9_6.x86_64.rpm4swebkit2gtk3-jsc-devel-2.48.5-1.el9_6.i686.rpm1swebkit2gtk3-2.48.5-1.el9_6.x86_64.rpm1swebkit2gtk3-2.48.5-1.el9_6.i686.rpm3swebkit2gtk3-jsc-2.48.5-1.el9_6.i686.rpm2swebkit2gtk3-devel-2.48.5-1.el9_6.x86_64.rpm2swebkit2gtk3-devel-2.48.5-1.el9_6.i686.rpm4swebkit2gtk3-jsc-devel-2.48.5-1.el9_6.x86_64.rpm3swebkit2gtk3-jsc-2.48.5-1.el9_6.x86_64.rpm4swebkit2gtk3-jsc-devel-2.48.5-1.el9_6.i686.rpm1swebkit2gtk3-2.48.5-1.el9_6.x86_64.rpm1swebkit2gtk3-2.48.5-1.el9_6.i686.rpm3swebkit2gtk3-jsc-2.48.5-1.el9_6.i686.rpm2swebkit2gtk3-devel-2.48.5-1.el9_6.x86_64.rpm2swebkit2gtk3-devel-2.48.5-1.el9_6.i686.rpmb} :nBBBBBBBBBBsecurityImportant: golang security update!]https://access.redhat.com/errata/RHSA-2025:13935RHSA-2025:13935RHSA-2025:13935 https://access.redhat.com/security/cve/CVE-2025-4674CVE-2025-4674CVE-2025-4674https://bugzilla.redhat.com/23843292384329https://errata.almalinux.org/9/ALSA-2025-13935.htmlALSA-2025:13935ALSA-2025:13935 @Wgolang-bin-1.24.6-1.el9_6.x86_64.rpm?Wgolang-1.24.6-1.el9_6.x86_64.rpmWgolang-tests-1.24.6-1.el9_6.noarch.rpmWgolang-misc-1.24.6-1.el9_6.noarch.rpmWgolang-docs-1.24.6-1.el9_6.noarch.rpmWgolang-src-1.24.6-1.el9_6.noarch.rpmIWgolang-race-1.24.6-1.el9_6.x86_64.rpmnWgo-toolset-1.24.6-1.el9_6.x86_64.rpm@Wgolang-bin-1.24.6-1.el9_6.x86_64.rpm?Wgolang-1.24.6-1.el9_6.x86_64.rpmWgolang-tests-1.24.6-1.el9_6.noarch.rpmWgolang-misc-1.24.6-1.el9_6.noarch.rpmWgolang-docs-1.24.6-1.el9_6.noarch.rpmWgolang-src-1.24.6-1.el9_6.noarch.rpmIWgolang-race-1.24.6-1.el9_6.x86_64.rpmnWgo-toolset-1.24.6-1.el9_6.x86_64.rpmŌY~ {BBBBBBBBBBBBBBBBBsecurityImportant: kernel security update~https://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962 https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962 %Pperf-5.14.0-570.35.1.el9_6.x86_64.rpm&Pkernel-headers-5.14.0-570.35.1.el9_6.x86_64.rpm#Pkernel-devel-5.14.0-570.35.1.el9_6.x86_64.rpmVPpython3-perf-5.14.0-570.35.1.el9_6.x86_64.rpm$Pkernel-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm'Prtla-5.14.0-570.35.1.el9_6.x86_64.rpmPkernel-doc-5.14.0-570.35.1.el9_6.noarch.rpm!Pkernel-debug-devel-5.14.0-570.35.1.el9_6.x86_64.rpm)Prv-5.14.0-570.35.1.el9_6.x86_64.rpm"Pkernel-debug-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm %Pperf-5.14.0-570.35.1.el9_6.x86_64.rpm&Pkernel-headers-5.14.0-570.35.1.el9_6.x86_64.rpm#Pkernel-devel-5.14.0-570.35.1.el9_6.x86_64.rpmVPpython3-perf-5.14.0-570.35.1.el9_6.x86_64.rpm$Pkernel-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm'Prtla-5.14.0-570.35.1.el9_6.x86_64.rpmPkernel-doc-5.14.0-570.35.1.el9_6.noarch.rpm!Pkernel-debug-devel-5.14.0-570.35.1.el9_6.x86_64.rpm)Prv-5.14.0-570.35.1.el9_6.x86_64.rpm"Pkernel-debug-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpmŠ} OBBsecurityModerate: xterm security update^https://access.redhat.com/errata/RHSA-2025:14075RHSA-2025:14075RHSA-2025:14075 https://access.redhat.com/security/cve/CVE-2022-24130CVE-2022-24130CVE-2022-24130https://bugzilla.redhat.com/20486762048676https://errata.almalinux.org/9/ALSA-2025-14075.htmlALSA-2025:14075ALSA-2025:14075 zDxterm-366-12.el9_6.x86_64.rpm{Dxterm-resize-366-12.el9_6.x86_64.rpmzDxterm-366-12.el9_6.x86_64.rpm{Dxterm-resize-366-12.el9_6.x86_64.rpmőI TBBBsecurityImportant: libarchive security updatem}https://access.redhat.com/errata/RHSA-2025:14130RHSA-2025:14130RHSA-2025:14130 https://access.redhat.com/security/cve/CVE-2025-5914CVE-2025-5914CVE-2025-5914https://bugzilla.redhat.com/23708612370861https://errata.almalinux.org/9/ALSA-2025-14130.htmlALSA-2025:14130ALSA-2025:14130 Dbsdtar-3.5.3-6.el9_6.x86_64.rpm]libarchive-devel-3.5.3-6.el9_6.i686.rpm]libarchive-devel-3.5.3-6.el9_6.x86_64.rpmDbsdtar-3.5.3-6.el9_6.x86_64.rpm]libarchive-devel-3.5.3-6.el9_6.i686.rpm]libarchive-devel-3.5.3-6.el9_6.x86_64.rpmŗl "ZBBBBBBsecurityImportant: tomcat security updatejNhttps://access.redhat.com/errata/RHSA-2025:14181RHSA-2025:14181RHSA-2025:14181 https://access.redhat.com/security/cve/CVE-2025-48976CVE-2025-48976CVE-2025-48976https://access.redhat.com/security/cve/CVE-2025-48988CVE-2025-48988CVE-2025-48988https://access.redhat.com/security/cve/CVE-2025-48989CVE-2025-48989CVE-2025-48989https://access.redhat.com/security/cve/CVE-2025-49125CVE-2025-49125CVE-2025-49125https://access.redhat.com/security/cve/CVE-2025-52434CVE-2025-52434CVE-2025-52434https://access.redhat.com/security/cve/CVE-2025-52520CVE-2025-52520CVE-2025-52520https://access.redhat.com/security/cve/CVE-2025-53506CVE-2025-53506CVE-2025-53506https://bugzilla.redhat.com/23730152373015https://bugzilla.redhat.com/23730182373018https://bugzilla.redhat.com/23730202373020https://bugzilla.redhat.com/23733092373309https://bugzilla.redhat.com/23793742379374https://bugzilla.redhat.com/23793822379382https://bugzilla.redhat.com/23793862379386https://errata.almalinux.org/9/ALSA-2025-14181.htmlALSA-2025:14181ALSA-2025:14181 >tomcat-jsp-2.3-api-9.0.87-3.el9_6.3.noarch.rpm;tomcat-admin-webapps-9.0.87-3.el9_6.3.noarch.rpm=tomcat-el-3.0-api-9.0.87-3.el9_6.3.noarch.rpm?tomcat-lib-9.0.87-3.el9_6.3.noarch.rpm<tomcat-docs-webapp-9.0.87-3.el9_6.3.noarch.rpm:tomcat-9.0.87-3.el9_6.3.noarch.rpm@tomcat-servlet-4.0-api-9.0.87-3.el9_6.3.noarch.rpmAtomcat-webapps-9.0.87-3.el9_6.3.noarch.rpm>tomcat-jsp-2.3-api-9.0.87-3.el9_6.3.noarch.rpm;tomcat-admin-webapps-9.0.87-3.el9_6.3.noarch.rpm=tomcat-el-3.0-api-9.0.87-3.el9_6.3.noarch.rpm?tomcat-lib-9.0.87-3.el9_6.3.noarch.rpm<tomcat-docs-webapp-9.0.87-3.el9_6.3.noarch.rpm:tomcat-9.0.87-3.el9_6.3.noarch.rpm@tomcat-servlet-4.0-api-9.0.87-3.el9_6.3.noarch.rpmAtomcat-webapps-9.0.87-3.el9_6.3.noarch.rpmš# 'cBBsecurityImportant: firefox security update8J https://access.redhat.com/errata/RHSA-2025:14416RHSA-2025:14416RHSA-2025:14416 https://access.redhat.com/security/cve/CVE-2025-9179CVE-2025-9179CVE-2025-9179https://access.redhat.com/security/cve/CVE-2025-9180CVE-2025-9180CVE-2025-9180https://access.redhat.com/security/cve/CVE-2025-9181CVE-2025-9181CVE-2025-9181https://access.redhat.com/security/cve/CVE-2025-9182CVE-2025-9182CVE-2025-9182https://access.redhat.com/security/cve/CVE-2025-9185CVE-2025-9185CVE-2025-9185https://bugzilla.redhat.com/23895752389575https://bugzilla.redhat.com/23895802389580https://bugzilla.redhat.com/23895812389581https://bugzilla.redhat.com/23895832389583https://bugzilla.redhat.com/23895842389584https://errata.almalinux.org/9/ALSA-2025-14416.htmlALSA-2025:14416ALSA-2025:14416 8firefox-128.14.0-2.el9_6.alma.1.x86_64.rpmQfirefox-x11-128.14.0-2.el9_6.alma.1.x86_64.rpm8firefox-128.14.0-2.el9_6.alma.1.x86_64.rpmQfirefox-x11-128.14.0-2.el9_6.alma.1.x86_64.rpmŻt ;hBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update!https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420 https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420 )Qrv-5.14.0-570.37.1.el9_6.x86_64.rpm"Qkernel-debug-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm#Qkernel-devel-5.14.0-570.37.1.el9_6.x86_64.rpm'Qrtla-5.14.0-570.37.1.el9_6.x86_64.rpm!Qkernel-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm&Qkernel-headers-5.14.0-570.37.1.el9_6.x86_64.rpm$Qkernel-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm%Qperf-5.14.0-570.37.1.el9_6.x86_64.rpmQkernel-doc-5.14.0-570.37.1.el9_6.noarch.rpmVQpython3-perf-5.14.0-570.37.1.el9_6.x86_64.rpm )Qrv-5.14.0-570.37.1.el9_6.x86_64.rpm"Qkernel-debug-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm#Qkernel-devel-5.14.0-570.37.1.el9_6.x86_64.rpm'Qrtla-5.14.0-570.37.1.el9_6.x86_64.rpm!Qkernel-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm&Qkernel-headers-5.14.0-570.37.1.el9_6.x86_64.rpm$Qkernel-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm%Qperf-5.14.0-570.37.1.el9_6.x86_64.rpmQkernel-doc-5.14.0-570.37.1.el9_6.noarch.rpmVQpython3-perf-5.14.0-570.37.1.el9_6.x86_64.rpmŻs {HkQBBBBBBBsecurityImportant: nodejs:20 security update#Khttps://access.redhat.com/errata/RHSA-2025:1443RHSA-2025:1443RHSA-2025:1443 https://access.redhat.com/security/cve/CVE-2025-22150CVE-2025-22150CVE-2025-22150https://access.redhat.com/security/cve/CVE-2025-23083CVE-2025-23083CVE-2025-23083https://access.redhat.com/security/cve/CVE-2025-23085CVE-2025-23085CVE-2025-23085https://bugzilla.redhat.com/23391762339176https://bugzilla.redhat.com/23393922339392https://bugzilla.redhat.com/23426182342618https://errata.almalinux.org/9/ALSA-2025-1443.htmlALSA-2025:1443ALSA-2025:1443 9|(hLnodejs-full-i18n-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm9Lnodejs-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm[nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpmnodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmNLnodejs-docs-20.18.2-1.module_el9.5.0+137+381f3eaf.noarch.rpmfunpm-10.8.2-1.20.18.2.1.module_el9.5.0+137+381f3eaf.x86_64.rpm}nodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm cups-ipptool-2.3.3op2-33.el9_6.1.x86_64.rpm cups-devel-2.3.3op2-33.el9_6.1.i686.rpm2 cups-filesystem-2.3.3op2-33.el9_6.1.noarch.rpm cups-devel-2.3.3op2-33.el9_6.1.x86_64.rpm? cups-lpd-2.3.3op2-33.el9_6.1.x86_64.rpm< cups-2.3.3op2-33.el9_6.1.x86_64.rpm= cups-client-2.3.3op2-33.el9_6.1.x86_64.rpm@ cups-printerapp-2.3.3op2-33.el9_6.1.x86_64.rpm> cups-ipptool-2.3.3op2-33.el9_6.1.x86_64.rpm cups-devel-2.3.3op2-33.el9_6.1.i686.rpm2 cups-filesystem-2.3.3op2-33.el9_6.1.noarch.rpm cups-devel-2.3.3op2-33.el9_6.1.x86_64.rpm? cups-lpd-2.3.3op2-33.el9_6.1.x86_64.rpmV xBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updatephttps://access.redhat.com/errata/RHSA-2025:15740RHSA-2025:15740RHSA-2025:15740 https://access.redhat.com/security/cve/CVE-2025-38550CVE-2025-38550CVE-2025-38550https://bugzilla.redhat.com/23889412388941https://errata.almalinux.org/9/ALSA-2025-15740.htmlALSA-2025:15740ALSA-2025:15740 $Ukernel-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpm"Ukernel-debug-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpmUkernel-doc-5.14.0-570.44.1.el9_6.noarch.rpm'Urtla-5.14.0-570.44.1.el9_6.x86_64.rpm&Ukernel-headers-5.14.0-570.44.1.el9_6.x86_64.rpm!Ukernel-debug-devel-5.14.0-570.44.1.el9_6.x86_64.rpm#Ukernel-devel-5.14.0-570.44.1.el9_6.x86_64.rpm%Uperf-5.14.0-570.44.1.el9_6.x86_64.rpmVUpython3-perf-5.14.0-570.44.1.el9_6.x86_64.rpm)Urv-5.14.0-570.44.1.el9_6.x86_64.rpm $Ukernel-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpm"Ukernel-debug-devel-matched-5.14.0-570.44.1.el9_6.x86_64.rpmUkernel-doc-5.14.0-570.44.1.el9_6.noarch.rpm'Urtla-5.14.0-570.44.1.el9_6.x86_64.rpm&Ukernel-headers-5.14.0-570.44.1.el9_6.x86_64.rpm!Ukernel-debug-devel-5.14.0-570.44.1.el9_6.x86_64.rpm#Ukernel-devel-5.14.0-570.44.1.el9_6.x86_64.rpm%Uperf-5.14.0-570.44.1.el9_6.x86_64.rpmVUpython3-perf-5.14.0-570.44.1.el9_6.x86_64.rpm)Urv-5.14.0-570.44.1.el9_6.x86_64.rpmԃ: LsecurityModerate: opentelemetry-collector security updatephttps://access.redhat.com/errata/RHSA-2025:15887RHSA-2025:15887RHSA-2025:15887 https://access.redhat.com/security/cve/CVE-2025-4673CVE-2025-4673CVE-2025-4673https://bugzilla.redhat.com/23733052373305https://errata.almalinux.org/9/ALSA-2025-15887.htmlALSA-2025:15887ALSA-2025:15887 L opentelemetry-collector-0.127.0-2.el9_6.x86_64.rpmL opentelemetry-collector-0.127.0-2.el9_6.x86_64.rpmƯz OBBBBBBBsecurityImportant: podman security updatefhttps://access.redhat.com/errata/RHSA-2025:15900RHSA-2025:15900RHSA-2025:15900 https://access.redhat.com/security/cve/CVE-2025-9566CVE-2025-9566CVE-2025-9566https://bugzilla.redhat.com/23931522393152https://errata.almalinux.org/9/ALSA-2025-15900.htmlALSA-2025:15900ALSA-2025:15900 gRpodman-docker-5.4.0-13.el9_6.noarch.rpm3Rpodman-plugins-5.4.0-13.el9_6.x86_64.rpm2Rpodman-5.4.0-13.el9_6.x86_64.rpm5Rpodman-tests-5.4.0-13.el9_6.x86_64.rpm4Rpodman-remote-5.4.0-13.el9_6.x86_64.rpmgRpodman-docker-5.4.0-13.el9_6.noarch.rpm3Rpodman-plugins-5.4.0-13.el9_6.x86_64.rpm2Rpodman-5.4.0-13.el9_6.x86_64.rpm5Rpodman-tests-5.4.0-13.el9_6.x86_64.rpm4Rpodman-remote-5.4.0-13.el9_6.x86_64.rpm~ &DBDBBBBBDBDFBBBBBBBBBBBsecurityModerate: mysql:8.4 security updateg khttps://access.redhat.com/errata/RHSA-2025:16046RHSA-2025:16046RHSA-2025:16046 https://access.redhat.com/security/cve/CVE-2024-13176CVE-2024-13176CVE-2024-13176https://access.redhat.com/security/cve/CVE-2025-21574CVE-2025-21574CVE-2025-21574https://access.redhat.com/security/cve/CVE-2025-21575CVE-2025-21575CVE-2025-21575https://access.redhat.com/security/cve/CVE-2025-21577CVE-2025-21577CVE-2025-21577https://access.redhat.com/security/cve/CVE-2025-21579CVE-2025-21579CVE-2025-21579https://access.redhat.com/security/cve/CVE-2025-21580CVE-2025-21580CVE-2025-21580https://access.redhat.com/security/cve/CVE-2025-21581CVE-2025-21581CVE-2025-21581https://access.redhat.com/security/cve/CVE-2025-21584CVE-2025-21584CVE-2025-21584https://access.redhat.com/security/cve/CVE-2025-21585CVE-2025-21585CVE-2025-21585https://access.redhat.com/security/cve/CVE-2025-21588CVE-2025-21588CVE-2025-21588https://access.redhat.com/security/cve/CVE-2025-30681CVE-2025-30681CVE-2025-30681https://access.redhat.com/security/cve/CVE-2025-30682CVE-2025-30682CVE-2025-30682https://access.redhat.com/security/cve/CVE-2025-30683CVE-2025-30683CVE-2025-30683https://access.redhat.com/security/cve/CVE-2025-30684CVE-2025-30684CVE-2025-30684https://access.redhat.com/security/cve/CVE-2025-30685CVE-2025-30685CVE-2025-30685https://access.redhat.com/security/cve/CVE-2025-30687CVE-2025-30687CVE-2025-30687https://access.redhat.com/security/cve/CVE-2025-30688CVE-2025-30688CVE-2025-30688https://access.redhat.com/security/cve/CVE-2025-30689CVE-2025-30689CVE-2025-30689https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30695CVE-2025-30695CVE-2025-30695https://access.redhat.com/security/cve/CVE-2025-30696CVE-2025-30696CVE-2025-30696https://access.redhat.com/security/cve/CVE-2025-30699CVE-2025-30699CVE-2025-30699https://access.redhat.com/security/cve/CVE-2025-30703CVE-2025-30703CVE-2025-30703https://access.redhat.com/security/cve/CVE-2025-30704CVE-2025-30704CVE-2025-30704https://access.redhat.com/security/cve/CVE-2025-30705CVE-2025-30705CVE-2025-30705https://access.redhat.com/security/cve/CVE-2025-30715CVE-2025-30715CVE-2025-30715https://access.redhat.com/security/cve/CVE-2025-30721CVE-2025-30721CVE-2025-30721https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://access.redhat.com/security/cve/CVE-2025-50077CVE-2025-50077CVE-2025-50077https://access.redhat.com/security/cve/CVE-2025-50078CVE-2025-50078CVE-2025-50078https://access.redhat.com/security/cve/CVE-2025-50079CVE-2025-50079CVE-2025-50079https://access.redhat.com/security/cve/CVE-2025-50080CVE-2025-50080CVE-2025-50080https://access.redhat.com/security/cve/CVE-2025-50081CVE-2025-50081CVE-2025-50081https://access.redhat.com/security/cve/CVE-2025-50082CVE-2025-50082CVE-2025-50082https://access.redhat.com/security/cve/CVE-2025-50083CVE-2025-50083CVE-2025-50083https://access.redhat.com/security/cve/CVE-2025-50084CVE-2025-50084CVE-2025-50084https://access.redhat.com/security/cve/CVE-2025-50085CVE-2025-50085CVE-2025-50085https://access.redhat.com/security/cve/CVE-2025-50086CVE-2025-50086CVE-2025-50086https://access.redhat.com/security/cve/CVE-2025-50087CVE-2025-50087CVE-2025-50087https://access.redhat.com/security/cve/CVE-2025-50088CVE-2025-50088CVE-2025-50088https://access.redhat.com/security/cve/CVE-2025-50091CVE-2025-50091CVE-2025-50091https://access.redhat.com/security/cve/CVE-2025-50092CVE-2025-50092CVE-2025-50092https://access.redhat.com/security/cve/CVE-2025-50093CVE-2025-50093CVE-2025-50093https://access.redhat.com/security/cve/CVE-2025-50094CVE-2025-50094CVE-2025-50094https://access.redhat.com/security/cve/CVE-2025-50096CVE-2025-50096CVE-2025-50096https://access.redhat.com/security/cve/CVE-2025-50097CVE-2025-50097CVE-2025-50097https://access.redhat.com/security/cve/CVE-2025-50098CVE-2025-50098CVE-2025-50098https://access.redhat.com/security/cve/CVE-2025-50099CVE-2025-50099CVE-2025-50099https://access.redhat.com/security/cve/CVE-2025-50100CVE-2025-50100CVE-2025-50100https://access.redhat.com/security/cve/CVE-2025-50101CVE-2025-50101CVE-2025-50101https://access.redhat.com/security/cve/CVE-2025-50102CVE-2025-50102CVE-2025-50102https://access.redhat.com/security/cve/CVE-2025-50104CVE-2025-50104CVE-2025-50104https://access.redhat.com/security/cve/CVE-2025-5399CVE-2025-5399CVE-2025-5399https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23598882359888https://bugzilla.redhat.com/23598922359892https://bugzilla.redhat.com/23598942359894https://bugzilla.redhat.com/23598952359895https://bugzilla.redhat.com/23598992359899https://bugzilla.redhat.com/23599002359900https://bugzilla.redhat.com/23599022359902https://bugzilla.redhat.com/23599032359903https://bugzilla.redhat.com/23599112359911https://bugzilla.redhat.com/23599182359918https://bugzilla.redhat.com/23599202359920https://bugzilla.redhat.com/23599242359924https://bugzilla.redhat.com/23599282359928https://bugzilla.redhat.com/23599302359930https://bugzilla.redhat.com/23599322359932https://bugzilla.redhat.com/23599342359934https://bugzilla.redhat.com/23599382359938https://bugzilla.redhat.com/23599402359940https://bugzilla.redhat.com/23599432359943https://bugzilla.redhat.com/23599442359944https://bugzilla.redhat.com/23599452359945https://bugzilla.redhat.com/23599472359947https://bugzilla.redhat.com/23599502359950https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/23599642359964https://bugzilla.redhat.com/23599722359972https://bugzilla.redhat.com/23709202370920https://bugzilla.redhat.com/23802642380264https://bugzilla.redhat.com/23802732380273https://bugzilla.redhat.com/23802742380274https://bugzilla.redhat.com/23802782380278https://bugzilla.redhat.com/23802802380280https://bugzilla.redhat.com/23802832380283https://bugzilla.redhat.com/23802842380284https://bugzilla.redhat.com/23802902380290https://bugzilla.redhat.com/23802912380291https://bugzilla.redhat.com/23802952380295https://bugzilla.redhat.com/23802982380298https://bugzilla.redhat.com/23803062380306https://bugzilla.redhat.com/23803082380308https://bugzilla.redhat.com/23803092380309https://bugzilla.redhat.com/23803102380310https://bugzilla.redhat.com/23803122380312https://bugzilla.redhat.com/23803132380313https://bugzilla.redhat.com/23803202380320https://bugzilla.redhat.com/23803212380321https://bugzilla.redhat.com/23803222380322https://bugzilla.redhat.com/23803262380326https://bugzilla.redhat.com/23803272380327https://bugzilla.redhat.com/23803342380334https://bugzilla.redhat.com/23803352380335https://errata.almalinux.org/9/ALSA-2025-16046.htmlALSA-2025:16046ALSA-2025:16046 (GOmysql-server-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpmtTrapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm.Omysql-errmsg-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpmKOmysql-libs-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm-Omysql-common-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpmYmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmV_mecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmXmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm^Omysql-test-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpmW_mecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmOmysql-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm]Omysql-devel-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm_Omysql-test-data-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpmTrapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm(GOmysql-server-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpmtTrapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm.Omysql-errmsg-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpmKOmysql-libs-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm-Omysql-common-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpmYmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmV_mecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmXmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm^Omysql-test-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpmW_mecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmOmysql-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm]Omysql-devel-8.4.6-1.module_el9.6.0+180+a4e757e5.x86_64.rpm_Omysql-test-data-8.4.6-1.module_el9.6.0+180+a4e757e5.noarch.rpmTrapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpmƯh 1gBBBBBBBBsecurityModerate: mysql security updatephhttps://access.redhat.com/errata/RHSA-2025:16086RHSA-2025:16086RHSA-2025:16086 https://access.redhat.com/security/cve/CVE-2025-21574CVE-2025-21574CVE-2025-21574https://access.redhat.com/security/cve/CVE-2025-21575CVE-2025-21575CVE-2025-21575https://access.redhat.com/security/cve/CVE-2025-21577CVE-2025-21577CVE-2025-21577https://access.redhat.com/security/cve/CVE-2025-21579CVE-2025-21579CVE-2025-21579https://access.redhat.com/security/cve/CVE-2025-21580CVE-2025-21580CVE-2025-21580https://access.redhat.com/security/cve/CVE-2025-21581CVE-2025-21581CVE-2025-21581https://access.redhat.com/security/cve/CVE-2025-21584CVE-2025-21584CVE-2025-21584https://access.redhat.com/security/cve/CVE-2025-21585CVE-2025-21585CVE-2025-21585https://access.redhat.com/security/cve/CVE-2025-30681CVE-2025-30681CVE-2025-30681https://access.redhat.com/security/cve/CVE-2025-30682CVE-2025-30682CVE-2025-30682https://access.redhat.com/security/cve/CVE-2025-30683CVE-2025-30683CVE-2025-30683https://access.redhat.com/security/cve/CVE-2025-30684CVE-2025-30684CVE-2025-30684https://access.redhat.com/security/cve/CVE-2025-30685CVE-2025-30685CVE-2025-30685https://access.redhat.com/security/cve/CVE-2025-30687CVE-2025-30687CVE-2025-30687https://access.redhat.com/security/cve/CVE-2025-30688CVE-2025-30688CVE-2025-30688https://access.redhat.com/security/cve/CVE-2025-30689CVE-2025-30689CVE-2025-30689https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30695CVE-2025-30695CVE-2025-30695https://access.redhat.com/security/cve/CVE-2025-30696CVE-2025-30696CVE-2025-30696https://access.redhat.com/security/cve/CVE-2025-30699CVE-2025-30699CVE-2025-30699https://access.redhat.com/security/cve/CVE-2025-30703CVE-2025-30703CVE-2025-30703https://access.redhat.com/security/cve/CVE-2025-30704CVE-2025-30704CVE-2025-30704https://access.redhat.com/security/cve/CVE-2025-30705CVE-2025-30705CVE-2025-30705https://access.redhat.com/security/cve/CVE-2025-30715CVE-2025-30715CVE-2025-30715https://access.redhat.com/security/cve/CVE-2025-30721CVE-2025-30721CVE-2025-30721https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://access.redhat.com/security/cve/CVE-2025-50077CVE-2025-50077CVE-2025-50077https://access.redhat.com/security/cve/CVE-2025-50078CVE-2025-50078CVE-2025-50078https://access.redhat.com/security/cve/CVE-2025-50079CVE-2025-50079CVE-2025-50079https://access.redhat.com/security/cve/CVE-2025-50080CVE-2025-50080CVE-2025-50080https://access.redhat.com/security/cve/CVE-2025-50081CVE-2025-50081CVE-2025-50081https://access.redhat.com/security/cve/CVE-2025-50082CVE-2025-50082CVE-2025-50082https://access.redhat.com/security/cve/CVE-2025-50083CVE-2025-50083CVE-2025-50083https://access.redhat.com/security/cve/CVE-2025-50084CVE-2025-50084CVE-2025-50084https://access.redhat.com/security/cve/CVE-2025-50085CVE-2025-50085CVE-2025-50085https://access.redhat.com/security/cve/CVE-2025-50086CVE-2025-50086CVE-2025-50086https://access.redhat.com/security/cve/CVE-2025-50087CVE-2025-50087CVE-2025-50087https://access.redhat.com/security/cve/CVE-2025-50088CVE-2025-50088CVE-2025-50088https://access.redhat.com/security/cve/CVE-2025-50091CVE-2025-50091CVE-2025-50091https://access.redhat.com/security/cve/CVE-2025-50092CVE-2025-50092CVE-2025-50092https://access.redhat.com/security/cve/CVE-2025-50093CVE-2025-50093CVE-2025-50093https://access.redhat.com/security/cve/CVE-2025-50094CVE-2025-50094CVE-2025-50094https://access.redhat.com/security/cve/CVE-2025-50096CVE-2025-50096CVE-2025-50096https://access.redhat.com/security/cve/CVE-2025-50097CVE-2025-50097CVE-2025-50097https://access.redhat.com/security/cve/CVE-2025-50098CVE-2025-50098CVE-2025-50098https://access.redhat.com/security/cve/CVE-2025-50099CVE-2025-50099CVE-2025-50099https://access.redhat.com/security/cve/CVE-2025-50100CVE-2025-50100CVE-2025-50100https://access.redhat.com/security/cve/CVE-2025-50101CVE-2025-50101CVE-2025-50101https://access.redhat.com/security/cve/CVE-2025-50102CVE-2025-50102CVE-2025-50102https://access.redhat.com/security/cve/CVE-2025-50104CVE-2025-50104CVE-2025-50104https://access.redhat.com/security/cve/CVE-2025-53023CVE-2025-53023CVE-2025-53023https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23598882359888https://bugzilla.redhat.com/23598922359892https://bugzilla.redhat.com/23598942359894https://bugzilla.redhat.com/23598952359895https://bugzilla.redhat.com/23598992359899https://bugzilla.redhat.com/23599002359900https://bugzilla.redhat.com/23599022359902https://bugzilla.redhat.com/23599032359903https://bugzilla.redhat.com/23599182359918https://bugzilla.redhat.com/23599202359920https://bugzilla.redhat.com/23599242359924https://bugzilla.redhat.com/23599282359928https://bugzilla.redhat.com/23599302359930https://bugzilla.redhat.com/23599322359932https://bugzilla.redhat.com/23599342359934https://bugzilla.redhat.com/23599382359938https://bugzilla.redhat.com/23599402359940https://bugzilla.redhat.com/23599432359943https://bugzilla.redhat.com/23599442359944https://bugzilla.redhat.com/23599452359945https://bugzilla.redhat.com/23599472359947https://bugzilla.redhat.com/23599502359950https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/23599642359964https://bugzilla.redhat.com/23599722359972https://bugzilla.redhat.com/23802642380264https://bugzilla.redhat.com/23802732380273https://bugzilla.redhat.com/23802742380274https://bugzilla.redhat.com/23802782380278https://bugzilla.redhat.com/23802802380280https://bugzilla.redhat.com/23802832380283https://bugzilla.redhat.com/23802842380284https://bugzilla.redhat.com/23802902380290https://bugzilla.redhat.com/23802912380291https://bugzilla.redhat.com/23802952380295https://bugzilla.redhat.com/23802982380298https://bugzilla.redhat.com/23803062380306https://bugzilla.redhat.com/23803082380308https://bugzilla.redhat.com/23803092380309https://bugzilla.redhat.com/23803102380310https://bugzilla.redhat.com/23803112380311https://bugzilla.redhat.com/23803122380312https://bugzilla.redhat.com/23803132380313https://bugzilla.redhat.com/23803202380320https://bugzilla.redhat.com/23803212380321https://bugzilla.redhat.com/23803222380322https://bugzilla.redhat.com/23803262380326https://bugzilla.redhat.com/23803272380327https://bugzilla.redhat.com/23803342380334https://bugzilla.redhat.com/23803352380335https://errata.almalinux.org/9/ALSA-2025-16086.htmlALSA-2025:16086ALSA-2025:16086 G"mysql-server-8.0.43-1.el9_6.x86_64.rpm."mysql-errmsg-8.0.43-1.el9_6.x86_64.rpmK"mysql-libs-8.0.43-1.el9_6.x86_64.rpm-"mysql-common-8.0.43-1.el9_6.x86_64.rpm"mysql-8.0.43-1.el9_6.x86_64.rpmG"mysql-server-8.0.43-1.el9_6.x86_64.rpm."mysql-errmsg-8.0.43-1.el9_6.x86_64.rpmK"mysql-libs-8.0.43-1.el9_6.x86_64.rpm-"mysql-common-8.0.43-1.el9_6.x86_64.rpm"mysql-8.0.43-1.el9_6.x86_64.rpmp 6rBBsecurityImportant: firefox security updatevRhttps://access.redhat.com/errata/RHSA-2025:16108RHSA-2025:16108RHSA-2025:16108 https://access.redhat.com/security/cve/CVE-2025-10527CVE-2025-10527CVE-2025-10527https://access.redhat.com/security/cve/CVE-2025-10528CVE-2025-10528CVE-2025-10528https://access.redhat.com/security/cve/CVE-2025-10529CVE-2025-10529CVE-2025-10529https://access.redhat.com/security/cve/CVE-2025-10532CVE-2025-10532CVE-2025-10532https://access.redhat.com/security/cve/CVE-2025-10533CVE-2025-10533CVE-2025-10533https://access.redhat.com/security/cve/CVE-2025-10536CVE-2025-10536CVE-2025-10536https://access.redhat.com/security/cve/CVE-2025-10537CVE-2025-10537CVE-2025-10537https://bugzilla.redhat.com/23957452395745https://bugzilla.redhat.com/23957542395754https://bugzilla.redhat.com/23957552395755https://bugzilla.redhat.com/23957562395756https://bugzilla.redhat.com/23957592395759https://bugzilla.redhat.com/23957642395764https://bugzilla.redhat.com/23957662395766https://errata.almalinux.org/9/ALSA-2025-16108.htmlALSA-2025:16108ALSA-2025:16108 8|firefox-140.3.0-1.el9_6.alma.1.x86_64.rpmQ|firefox-x11-140.3.0-1.el9_6.alma.1.x86_64.rpm8|firefox-140.3.0-1.el9_6.alma.1.x86_64.rpmQ|firefox-x11-140.3.0-1.el9_6.alma.1.x86_64.rpmQ wBBBBBBBBBsecurityModerate: gnutls security, bug fix, and enhancement updateH https://access.redhat.com/errata/RHSA-2025:16116RHSA-2025:16116RHSA-2025:16116 https://access.redhat.com/security/cve/CVE-2025-32988CVE-2025-32988CVE-2025-32988https://access.redhat.com/security/cve/CVE-2025-32989CVE-2025-32989CVE-2025-32989https://access.redhat.com/security/cve/CVE-2025-32990CVE-2025-32990CVE-2025-32990https://access.redhat.com/security/cve/CVE-2025-6395CVE-2025-6395CVE-2025-6395https://bugzilla.redhat.com/23596202359620https://bugzilla.redhat.com/23596212359621https://bugzilla.redhat.com/23596222359622https://bugzilla.redhat.com/23767552376755https://errata.almalinux.org/9/ALSA-2025-16116.htmlALSA-2025:16116ALSA-2025:16116 bgnutls-c++-3.8.3-6.el9_6.2.x86_64.rpmbgnutls-devel-3.8.3-6.el9_6.2.i686.rpmbgnutls-dane-3.8.3-6.el9_6.2.x86_64.rpm|bgnutls-utils-3.8.3-6.el9_6.2.x86_64.rpmbgnutls-devel-3.8.3-6.el9_6.2.x86_64.rpmbgnutls-dane-3.8.3-6.el9_6.2.i686.rpmbgnutls-c++-3.8.3-6.el9_6.2.i686.rpmbgnutls-c++-3.8.3-6.el9_6.2.x86_64.rpmbgnutls-devel-3.8.3-6.el9_6.2.i686.rpmbgnutls-dane-3.8.3-6.el9_6.2.x86_64.rpm|bgnutls-utils-3.8.3-6.el9_6.2.x86_64.rpmbgnutls-devel-3.8.3-6.el9_6.2.x86_64.rpmbgnutls-dane-3.8.3-6.el9_6.2.i686.rpmbgnutls-c++-3.8.3-6.el9_6.2.i686.rpm  P^BVBBBBBBBBBBBsecurityImportant: nodejs:22 security updateYKhttps://access.redhat.com/errata/RHSA-2025:1613RHSA-2025:1613RHSA-2025:1613 https://access.redhat.com/security/cve/CVE-2025-22150CVE-2025-22150CVE-2025-22150https://access.redhat.com/security/cve/CVE-2025-23083CVE-2025-23083CVE-2025-23083https://access.redhat.com/security/cve/CVE-2025-23085CVE-2025-23085CVE-2025-23085https://bugzilla.redhat.com/23391762339176https://bugzilla.redhat.com/23393922339392https://bugzilla.redhat.com/23426182342618https://errata.almalinux.org/9/ALSA-2025-1613.htmlALSA-2025:1613ALSA-2025:1613 94( 96nodejs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpmOv8-12.4-devel-12.4.254.21-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm6nodejs-libs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpmnodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpmnodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpmN6nodejs-docs-22.13.1-1.module_el9.5.0+139+09296491.noarch.rpm<6nodejs-devel-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm~nodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpmh6nodejs-full-i18n-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpmfxnpm-10.9.2-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm94( 96nodejs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpmOv8-12.4-devel-12.4.254.21-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm6nodejs-libs-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpmnodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpmnodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpmN6nodejs-docs-22.13.1-1.module_el9.5.0+139+09296491.noarch.rpm<6nodejs-devel-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpm~nodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpmh6nodejs-full-i18n-22.13.1-1.module_el9.5.0+139+09296491.x86_64.rpmfxnpm-10.9.2-1.22.13.1.1.module_el9.5.0+139+09296491.x86_64.rpm7 QsecurityImportant: thunderbird security update$!https://access.redhat.com/errata/RHSA-2025:16156RHSA-2025:16156RHSA-2025:16156 https://access.redhat.com/security/cve/CVE-2025-10527CVE-2025-10527CVE-2025-10527https://access.redhat.com/security/cve/CVE-2025-10528CVE-2025-10528CVE-2025-10528https://access.redhat.com/security/cve/CVE-2025-10529CVE-2025-10529CVE-2025-10529https://access.redhat.com/security/cve/CVE-2025-10532CVE-2025-10532CVE-2025-10532https://access.redhat.com/security/cve/CVE-2025-10533CVE-2025-10533CVE-2025-10533https://access.redhat.com/security/cve/CVE-2025-10536CVE-2025-10536CVE-2025-10536https://access.redhat.com/security/cve/CVE-2025-10537CVE-2025-10537CVE-2025-10537https://bugzilla.redhat.com/23957452395745https://bugzilla.redhat.com/23957542395754https://bugzilla.redhat.com/23957552395755https://bugzilla.redhat.com/23957562395756https://bugzilla.redhat.com/23957592395759https://bugzilla.redhat.com/23957642395764https://bugzilla.redhat.com/23957662395766https://errata.almalinux.org/9/ALSA-2025-16156.htmlALSA-2025:16156ALSA-2025:16156 :|thunderbird-140.3.0-1.el9_6.alma.1.x86_64.rpm:|thunderbird-140.3.0-1.el9_6.alma.1.x86_64.rpm   'TBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateE https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398 https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398 $Vkernel-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm'Vrtla-5.14.0-570.46.1.el9_6.x86_64.rpm#Vkernel-devel-5.14.0-570.46.1.el9_6.x86_64.rpm%Vperf-5.14.0-570.46.1.el9_6.x86_64.rpm&Vkernel-headers-5.14.0-570.46.1.el9_6.x86_64.rpmVkernel-doc-5.14.0-570.46.1.el9_6.noarch.rpm"Vkernel-debug-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpmVVpython3-perf-5.14.0-570.46.1.el9_6.x86_64.rpm!Vkernel-debug-devel-5.14.0-570.46.1.el9_6.x86_64.rpm)Vrv-5.14.0-570.46.1.el9_6.x86_64.rpm $Vkernel-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm'Vrtla-5.14.0-570.46.1.el9_6.x86_64.rpm#Vkernel-devel-5.14.0-570.46.1.el9_6.x86_64.rpm%Vperf-5.14.0-570.46.1.el9_6.x86_64.rpm&Vkernel-headers-5.14.0-570.46.1.el9_6.x86_64.rpmVkernel-doc-5.14.0-570.46.1.el9_6.noarch.rpm"Vkernel-debug-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpmVVpython3-perf-5.14.0-570.46.1.el9_6.x86_64.rpm!Vkernel-debug-devel-5.14.0-570.46.1.el9_6.x86_64.rpm)Vrv-5.14.0-570.46.1.el9_6.x86_64.rpmm! 9hBBBBBBBBBBBBBBBsecurityModerate: kernel security updateLhttps://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659 https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:1659 !:kernel-debug-devel-5.14.0-503.26.1.el9_5.x86_64.rpm#:kernel-devel-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-doc-5.14.0-503.26.1.el9_5.noarch.rpm%:perf-5.14.0-503.26.1.el9_5.x86_64.rpm):rv-5.14.0-503.26.1.el9_5.x86_64.rpm":kernel-debug-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm':rtla-5.14.0-503.26.1.el9_5.x86_64.rpm$:kernel-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm&:kernel-headers-5.14.0-503.26.1.el9_5.x86_64.rpm !:kernel-debug-devel-5.14.0-503.26.1.el9_5.x86_64.rpm#:kernel-devel-5.14.0-503.26.1.el9_5.x86_64.rpm:kernel-doc-5.14.0-503.26.1.el9_5.noarch.rpm%:perf-5.14.0-503.26.1.el9_5.x86_64.rpm):rv-5.14.0-503.26.1.el9_5.x86_64.rpm":kernel-debug-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm':rtla-5.14.0-503.26.1.el9_5.x86_64.rpm$:kernel-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm&:kernel-headers-5.14.0-503.26.1.el9_5.x86_64.rpm@" zBBBBBBBBsecurityImportant: bind9.18 security update]rhttps://access.redhat.com/errata/RHSA-2025:1670RHSA-2025:1670RHSA-2025:1670 https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://access.redhat.com/security/cve/CVE-2024-12705CVE-2024-12705CVE-2024-12705https://bugzilla.redhat.com/23428792342879https://bugzilla.redhat.com/23428802342880https://errata.almalinux.org/9/ALSA-2025-1670.htmlALSA-2025:1670ALSA-2025:1670 cbind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpmebind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpmbbind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpmdbind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpmabind9.18-9.18.29-1.el9_5.1.x86_64.rpmcbind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpmebind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpmbbind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpmdbind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpmabind9.18-9.18.29-1.el9_5.1.x86_64.rpm/# EBBBBBBsecurityImportant: mysql security updateO*dhttps://access.redhat.com/errata/RHSA-2025:1671RHSA-2025:1671RHSA-2025:1671 https://access.redhat.com/security/cve/CVE-2024-11053CVE-2024-11053CVE-2024-11053https://access.redhat.com/security/cve/CVE-2024-21193CVE-2024-21193CVE-2024-21193https://access.redhat.com/security/cve/CVE-2024-21194CVE-2024-21194CVE-2024-21194https://access.redhat.com/security/cve/CVE-2024-21196CVE-2024-21196CVE-2024-21196https://access.redhat.com/security/cve/CVE-2024-21197CVE-2024-21197CVE-2024-21197https://access.redhat.com/security/cve/CVE-2024-21198CVE-2024-21198CVE-2024-21198https://access.redhat.com/security/cve/CVE-2024-21199CVE-2024-21199CVE-2024-21199https://access.redhat.com/security/cve/CVE-2024-21201CVE-2024-21201CVE-2024-21201https://access.redhat.com/security/cve/CVE-2024-21203CVE-2024-21203CVE-2024-21203https://access.redhat.com/security/cve/CVE-2024-21212CVE-2024-21212CVE-2024-21212https://access.redhat.com/security/cve/CVE-2024-21213CVE-2024-21213CVE-2024-21213https://access.redhat.com/security/cve/CVE-2024-21218CVE-2024-21218CVE-2024-21218https://access.redhat.com/security/cve/CVE-2024-21219CVE-2024-21219CVE-2024-21219https://access.redhat.com/security/cve/CVE-2024-21230CVE-2024-21230CVE-2024-21230https://access.redhat.com/security/cve/CVE-2024-21231CVE-2024-21231CVE-2024-21231https://access.redhat.com/security/cve/CVE-2024-21236CVE-2024-21236CVE-2024-21236https://access.redhat.com/security/cve/CVE-2024-21237CVE-2024-21237CVE-2024-21237https://access.redhat.com/security/cve/CVE-2024-21238CVE-2024-21238CVE-2024-21238https://access.redhat.com/security/cve/CVE-2024-21239CVE-2024-21239CVE-2024-21239https://access.redhat.com/security/cve/CVE-2024-21241CVE-2024-21241CVE-2024-21241https://access.redhat.com/security/cve/CVE-2024-21247CVE-2024-21247CVE-2024-21247https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://access.redhat.com/security/cve/CVE-2024-7264CVE-2024-7264CVE-2024-7264https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-21491CVE-2025-21491CVE-2025-21491https://access.redhat.com/security/cve/CVE-2025-21494CVE-2025-21494CVE-2025-21494https://access.redhat.com/security/cve/CVE-2025-21497CVE-2025-21497CVE-2025-21497https://access.redhat.com/security/cve/CVE-2025-21500CVE-2025-21500CVE-2025-21500https://access.redhat.com/security/cve/CVE-2025-21501CVE-2025-21501CVE-2025-21501https://access.redhat.com/security/cve/CVE-2025-21503CVE-2025-21503CVE-2025-21503https://access.redhat.com/security/cve/CVE-2025-21504CVE-2025-21504CVE-2025-21504https://access.redhat.com/security/cve/CVE-2025-21505CVE-2025-21505CVE-2025-21505https://access.redhat.com/security/cve/CVE-2025-21518CVE-2025-21518CVE-2025-21518https://access.redhat.com/security/cve/CVE-2025-21519CVE-2025-21519CVE-2025-21519https://access.redhat.com/security/cve/CVE-2025-21520CVE-2025-21520CVE-2025-21520https://access.redhat.com/security/cve/CVE-2025-21521CVE-2025-21521CVE-2025-21521https://access.redhat.com/security/cve/CVE-2025-21522CVE-2025-21522CVE-2025-21522https://access.redhat.com/security/cve/CVE-2025-21523CVE-2025-21523CVE-2025-21523https://access.redhat.com/security/cve/CVE-2025-21525CVE-2025-21525CVE-2025-21525https://access.redhat.com/security/cve/CVE-2025-21529CVE-2025-21529CVE-2025-21529https://access.redhat.com/security/cve/CVE-2025-21531CVE-2025-21531CVE-2025-21531https://access.redhat.com/security/cve/CVE-2025-21534CVE-2025-21534CVE-2025-21534https://access.redhat.com/security/cve/CVE-2025-21536CVE-2025-21536CVE-2025-21536https://access.redhat.com/security/cve/CVE-2025-21540CVE-2025-21540CVE-2025-21540https://access.redhat.com/security/cve/CVE-2025-21543CVE-2025-21543CVE-2025-21543https://access.redhat.com/security/cve/CVE-2025-21546CVE-2025-21546CVE-2025-21546https://access.redhat.com/security/cve/CVE-2025-21555CVE-2025-21555CVE-2025-21555https://access.redhat.com/security/cve/CVE-2025-21559CVE-2025-21559CVE-2025-21559https://bugzilla.redhat.com/22945812294581https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/23018882301888https://bugzilla.redhat.com/23188572318857https://bugzilla.redhat.com/23188582318858https://bugzilla.redhat.com/23188702318870https://bugzilla.redhat.com/23188732318873https://bugzilla.redhat.com/23188742318874https://bugzilla.redhat.com/23188762318876https://bugzilla.redhat.com/23188822318882https://bugzilla.redhat.com/23188832318883https://bugzilla.redhat.com/23188842318884https://bugzilla.redhat.com/23188852318885https://bugzilla.redhat.com/23188862318886https://bugzilla.redhat.com/23188972318897https://bugzilla.redhat.com/23189002318900https://bugzilla.redhat.com/23189052318905https://bugzilla.redhat.com/23189142318914https://bugzilla.redhat.com/23189222318922https://bugzilla.redhat.com/23189232318923https://bugzilla.redhat.com/23189252318925https://bugzilla.redhat.com/23189262318926https://bugzilla.redhat.com/23189272318927https://bugzilla.redhat.com/23311912331191https://bugzilla.redhat.com/23392182339218https://bugzilla.redhat.com/23392202339220https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23392262339226https://bugzilla.redhat.com/23392312339231https://bugzilla.redhat.com/23392362339236https://bugzilla.redhat.com/23392382339238https://bugzilla.redhat.com/23392432339243https://bugzilla.redhat.com/23392472339247https://bugzilla.redhat.com/23392522339252https://bugzilla.redhat.com/23392592339259https://bugzilla.redhat.com/23392662339266https://bugzilla.redhat.com/23392702339270https://bugzilla.redhat.com/23392712339271https://bugzilla.redhat.com/23392752339275https://bugzilla.redhat.com/23392772339277https://bugzilla.redhat.com/23392812339281https://bugzilla.redhat.com/23392842339284https://bugzilla.redhat.com/23392912339291https://bugzilla.redhat.com/23392932339293https://bugzilla.redhat.com/23392952339295https://bugzilla.redhat.com/23392992339299https://bugzilla.redhat.com/23393002339300https://bugzilla.redhat.com/23393042339304https://bugzilla.redhat.com/23393052339305https://errata.almalinux.org/9/ALSA-2025-1671.htmlALSA-2025:1671ALSA-2025:1671 Gwmysql-server-8.0.41-2.el9_5.x86_64.rpm-wmysql-common-8.0.41-2.el9_5.x86_64.rpm.wmysql-errmsg-8.0.41-2.el9_5.x86_64.rpmwmysql-8.0.41-2.el9_5.x86_64.rpmGwmysql-server-8.0.41-2.el9_5.x86_64.rpm-wmysql-common-8.0.41-2.el9_5.x86_64.rpm.wmysql-errmsg-8.0.41-2.el9_5.x86_64.rpmwmysql-8.0.41-2.el9_5.x86_64.rpm݄d$ NBBBBBBBBBBBsecurityImportant: bind security updateyXhttps://access.redhat.com/errata/RHSA-2025:1681RHSA-2025:1681RHSA-2025:1681 https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://bugzilla.redhat.com/23428792342879https://errata.almalinux.org/9/ALSA-2025-1681.htmlALSA-2025:1681ALSA-2025:1681 [Kbind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpm7Kpython3-bind-9.16.23-24.el9_5.3.noarch.rpm*Kbind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm+Kbind-license-9.16.23-24.el9_5.3.noarch.rpm\Kbind-libs-9.16.23-24.el9_5.3.x86_64.rpmYKbind-9.16.23-24.el9_5.3.x86_64.rpm]Kbind-utils-9.16.23-24.el9_5.3.x86_64.rpmZKbind-chroot-9.16.23-24.el9_5.3.x86_64.rpm[Kbind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpm7Kpython3-bind-9.16.23-24.el9_5.3.noarch.rpm*Kbind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpm+Kbind-license-9.16.23-24.el9_5.3.noarch.rpm\Kbind-libs-9.16.23-24.el9_5.3.x86_64.rpmYKbind-9.16.23-24.el9_5.3.x86_64.rpm]Kbind-utils-9.16.23-24.el9_5.3.x86_64.rpmZKbind-chroot-9.16.23-24.el9_5.3.x86_64.rpmܴ % /\BBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateQi https://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880 https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880 %Wperf-5.14.0-570.49.1.el9_6.x86_64.rpm"Wkernel-debug-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpmVWpython3-perf-5.14.0-570.49.1.el9_6.x86_64.rpm)Wrv-5.14.0-570.49.1.el9_6.x86_64.rpm&Wkernel-headers-5.14.0-570.49.1.el9_6.x86_64.rpm#Wkernel-devel-5.14.0-570.49.1.el9_6.x86_64.rpm!Wkernel-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm$Wkernel-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpmWkernel-doc-5.14.0-570.49.1.el9_6.noarch.rpm'Wrtla-5.14.0-570.49.1.el9_6.x86_64.rpm %Wperf-5.14.0-570.49.1.el9_6.x86_64.rpm"Wkernel-debug-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpmVWpython3-perf-5.14.0-570.49.1.el9_6.x86_64.rpm)Wrv-5.14.0-570.49.1.el9_6.x86_64.rpm&Wkernel-headers-5.14.0-570.49.1.el9_6.x86_64.rpm#Wkernel-devel-5.14.0-570.49.1.el9_6.x86_64.rpm!Wkernel-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm$Wkernel-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpmWkernel-doc-5.14.0-570.49.1.el9_6.noarch.rpm'Wrtla-5.14.0-570.49.1.el9_6.x86_64.rpm-& pBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security update:ghttps://access.redhat.com/errata/RHSA-2025:17084RHSA-2025:17084RHSA-2025:17084 https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-17084.htmlALSA-2025:17084ALSA-2025:17084 |ipa-server-4.12.2-14.el9_6.5.x86_64.rpm|python3-ipaclient-4.12.2-14.el9_6.5.noarch.rpmt|ipa-server-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm|python3-ipaserver-4.12.2-14.el9_6.5.noarch.rpm|ipa-server-common-4.12.2-14.el9_6.5.noarch.rpm|ipa-server-trust-ad-4.12.2-14.el9_6.5.x86_64.rpm0|ipa-selinux-luna-4.12.2-14.el9_6.5.noarch.rpm|python3-ipalib-4.12.2-14.el9_6.5.noarch.rpm1|ipa-selinux-nfast-4.12.2-14.el9_6.5.noarch.rpm|ipa-server-dns-4.12.2-14.el9_6.5.noarch.rpm|ipa-client-common-4.12.2-14.el9_6.5.noarch.rpm|ipa-client-epn-4.12.2-14.el9_6.5.x86_64.rpms|ipa-client-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm|ipa-common-4.12.2-14.el9_6.5.noarch.rpm|ipa-selinux-4.12.2-14.el9_6.5.noarch.rpm~|ipa-client-4.12.2-14.el9_6.5.x86_64.rpm|ipa-client-samba-4.12.2-14.el9_6.5.x86_64.rpm|ipa-server-4.12.2-14.el9_6.5.x86_64.rpm|python3-ipaclient-4.12.2-14.el9_6.5.noarch.rpmt|ipa-server-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm|python3-ipaserver-4.12.2-14.el9_6.5.noarch.rpm|ipa-server-common-4.12.2-14.el9_6.5.noarch.rpm|ipa-server-trust-ad-4.12.2-14.el9_6.5.x86_64.rpm0|ipa-selinux-luna-4.12.2-14.el9_6.5.noarch.rpm|python3-ipalib-4.12.2-14.el9_6.5.noarch.rpm1|ipa-selinux-nfast-4.12.2-14.el9_6.5.noarch.rpm|ipa-server-dns-4.12.2-14.el9_6.5.noarch.rpm|ipa-client-common-4.12.2-14.el9_6.5.noarch.rpm|ipa-client-epn-4.12.2-14.el9_6.5.x86_64.rpms|ipa-client-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpm|ipa-common-4.12.2-14.el9_6.5.noarch.rpm|ipa-selinux-4.12.2-14.el9_6.5.noarch.rpm~|ipa-client-4.12.2-14.el9_6.5.x86_64.rpm|ipa-client-samba-4.12.2-14.el9_6.5.x86_64.rpm' IBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update!Fhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377 https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377 Xkernel-doc-5.14.0-570.51.1.el9_6.noarch.rpm$Xkernel-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm&Xkernel-headers-5.14.0-570.51.1.el9_6.x86_64.rpm'Xrtla-5.14.0-570.51.1.el9_6.x86_64.rpm#Xkernel-devel-5.14.0-570.51.1.el9_6.x86_64.rpm"Xkernel-debug-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpmVXpython3-perf-5.14.0-570.51.1.el9_6.x86_64.rpm!Xkernel-debug-devel-5.14.0-570.51.1.el9_6.x86_64.rpm)Xrv-5.14.0-570.51.1.el9_6.x86_64.rpm%Xperf-5.14.0-570.51.1.el9_6.x86_64.rpm Xkernel-doc-5.14.0-570.51.1.el9_6.noarch.rpm$Xkernel-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm&Xkernel-headers-5.14.0-570.51.1.el9_6.x86_64.rpm'Xrtla-5.14.0-570.51.1.el9_6.x86_64.rpm#Xkernel-devel-5.14.0-570.51.1.el9_6.x86_64.rpm"Xkernel-debug-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpmVXpython3-perf-5.14.0-570.51.1.el9_6.x86_64.rpm!Xkernel-debug-devel-5.14.0-570.51.1.el9_6.x86_64.rpm)Xrv-5.14.0-570.51.1.el9_6.x86_64.rpm%Xperf-5.14.0-570.51.1.el9_6.x86_64.rpmǝN( #]BBBBsecurityImportant: libpq security updategRhttps://access.redhat.com/errata/RHSA-2025:1738RHSA-2025:1738RHSA-2025:1738 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1738.htmlALSA-2025:1738ALSA-2025:1738 \ libpq-devel-13.20-1.el9_5.x86_64.rpm[ libpq-13.20-1.el9_5.x86_64.rpm\ libpq-devel-13.20-1.el9_5.i686.rpm[ libpq-13.20-1.el9_5.i686.rpm\ libpq-devel-13.20-1.el9_5.x86_64.rpm[ libpq-13.20-1.el9_5.x86_64.rpm\ libpq-devel-13.20-1.el9_5.i686.rpm[ libpq-13.20-1.el9_5.i686.rpm;) FBBBVBFBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update9'https://access.redhat.com/errata/RHSA-2025:1741RHSA-2025:1741RHSA-2025:1741 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1741.htmlALSA-2025:1741ALSA-2025:1741 _}("lpostgresql-contrib-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm$lpostgresql-plpython3-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm bpgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmlpostgresql-static-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmlpostgresql-test-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm cpostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm'lpostgresql-server-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmilpostgresql-test-rpm-macros-15.12-1.module_el9.5.0+140+e3f03d9d.noarch.rpmlpostgresql-upgrade-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm lpostgresql-server-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm%lpostgresql-pltcl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmvpg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm lpostgresql-private-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm#lpostgresql-plperl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm(lpostgresql-upgrade-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm_lpostgresql-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm lpostgresql-docs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm&lpostgresql-private-libs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm_}("lpostgresql-contrib-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm$lpostgresql-plpython3-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm bpgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmlpostgresql-static-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmlpostgresql-test-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm cpostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm'lpostgresql-server-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmilpostgresql-test-rpm-macros-15.12-1.module_el9.5.0+140+e3f03d9d.noarch.rpmlpostgresql-upgrade-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm lpostgresql-server-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm%lpostgresql-pltcl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmvpg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm lpostgresql-private-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm#lpostgresql-plperl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm(lpostgresql-upgrade-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm_lpostgresql-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm lpostgresql-docs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm&lpostgresql-private-libs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm* BBBBBBBBBBBBBBBsecurityImportant: postgresql security update`'https://access.redhat.com/errata/RHSA-2025:1742RHSA-2025:1742RHSA-2025:1742 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1742.htmlALSA-2025:1742ALSA-2025:1742 ' postgresql-server-13.20-1.el9_5.x86_64.rpm% postgresql-pltcl-13.20-1.el9_5.x86_64.rpm_ postgresql-13.20-1.el9_5.x86_64.rpm& postgresql-private-libs-13.20-1.el9_5.x86_64.rpm( postgresql-upgrade-13.20-1.el9_5.x86_64.rpm$ postgresql-plpython3-13.20-1.el9_5.x86_64.rpm# postgresql-plperl-13.20-1.el9_5.x86_64.rpm" postgresql-contrib-13.20-1.el9_5.x86_64.rpm' postgresql-server-13.20-1.el9_5.x86_64.rpm% postgresql-pltcl-13.20-1.el9_5.x86_64.rpm_ postgresql-13.20-1.el9_5.x86_64.rpm& postgresql-private-libs-13.20-1.el9_5.x86_64.rpm( postgresql-upgrade-13.20-1.el9_5.x86_64.rpm$ postgresql-plpython3-13.20-1.el9_5.x86_64.rpm# postgresql-plperl-13.20-1.el9_5.x86_64.rpm" postgresql-contrib-13.20-1.el9_5.x86_64.rpms+ SBBBBBBBBsecurityImportant: open-vm-tools security updatehttps://access.redhat.com/errata/RHSA-2025:17428RHSA-2025:17428RHSA-2025:17428 https://access.redhat.com/security/cve/CVE-2025-41244CVE-2025-41244CVE-2025-41244https://bugzilla.redhat.com/23977522397752https://errata.almalinux.org/9/ALSA-2025-17428.htmlALSA-2025:17428ALSA-2025:17428 Topen-vm-tools-salt-minion-12.5.0-1.el9_6.2.x86_64.rpm$open-vm-tools-desktop-12.5.0-1.el9_6.2.x86_64.rpm%open-vm-tools-sdmp-12.5.0-1.el9_6.2.x86_64.rpm&open-vm-tools-test-12.5.0-1.el9_6.2.x86_64.rpm#open-vm-tools-12.5.0-1.el9_6.2.x86_64.rpmTopen-vm-tools-salt-minion-12.5.0-1.el9_6.2.x86_64.rpm$open-vm-tools-desktop-12.5.0-1.el9_6.2.x86_64.rpm%open-vm-tools-sdmp-12.5.0-1.el9_6.2.x86_64.rpm&open-vm-tools-test-12.5.0-1.el9_6.2.x86_64.rpm#open-vm-tools-12.5.0-1.el9_6.2.x86_64.rpmDz, ;JBBBTBBB|BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update 'https://access.redhat.com/errata/RHSA-2025:1743RHSA-2025:1743RHSA-2025:1743 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1743.htmlALSA-2025:1743ALSA-2025:1743 _w( vpostgresql-docs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmwpg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm vpostgresql-private-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpmvpostgresql-upgrade-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm'vpostgresql-server-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm vpostgresql-server-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm#vpostgresql-plperl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmvpostgresql-static-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm(vpostgresql-upgrade-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm$vpostgresql-plpython3-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm"vpostgresql-contrib-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmvpostgresql-test-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm/kpgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm&vpostgresql-private-libs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm_vpostgresql-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmivpostgresql-test-rpm-macros-16.8-1.module_el9.5.0+141+f4b0f9b7.noarch.rpm%vpostgresql-pltcl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm_w( vpostgresql-docs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmwpg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm vpostgresql-private-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpmvpostgresql-upgrade-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm'vpostgresql-server-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm vpostgresql-server-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm#vpostgresql-plperl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmvpostgresql-static-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm(vpostgresql-upgrade-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm$vpostgresql-plpython3-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm"vpostgresql-contrib-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmvpostgresql-test-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm/kpgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm&vpostgresql-private-libs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm_vpostgresql-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmivpostgresql-test-rpm-macros-16.8-1.module_el9.5.0+141+f4b0f9b7.noarch.rpm%vpostgresql-pltcl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmW- >|securityModerate: iputils security update2ghttps://access.redhat.com/errata/RHSA-2025:17558RHSA-2025:17558RHSA-2025:17558 https://access.redhat.com/security/cve/CVE-2025-48964CVE-2025-48964CVE-2025-48964https://bugzilla.redhat.com/23826572382657https://errata.almalinux.org/9/ALSA-2025-17558.htmlALSA-2025:17558ALSA-2025:17558 @(iputils-ninfod-20210202-11.el9_6.3.x86_64.rpm@(iputils-ninfod-20210202-11.el9_6.3.x86_64.rpmDz^. BBBBsecurityModerate: vim security updatezhttps://access.redhat.com/errata/RHSA-2025:17742RHSA-2025:17742RHSA-2025:17742 https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-17742.htmlALSA-2025:17742ALSA-2025:17742 / vim-X11-8.2.2637-22.el9_6.1.x86_64.rpm1 vim-enhanced-8.2.2637-22.el9_6.1.x86_64.rpm0 vim-common-8.2.2637-22.el9_6.1.x86_64.rpm/ vim-X11-8.2.2637-22.el9_6.1.x86_64.rpm1 vim-enhanced-8.2.2637-22.el9_6.1.x86_64.rpm0 vim-common-8.2.2637-22.el9_6.1.x86_64.rpmǹ / FBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updated https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760 https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760 'Yrtla-5.14.0-570.52.1.el9_6.x86_64.rpmYkernel-doc-5.14.0-570.52.1.el9_6.noarch.rpmVYpython3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm#Ykernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm%Yperf-5.14.0-570.52.1.el9_6.x86_64.rpm!Ykernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm"Ykernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm)Yrv-5.14.0-570.52.1.el9_6.x86_64.rpm$Ykernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm&Ykernel-headers-5.14.0-570.52.1.el9_6.x86_64.rpm 'Yrtla-5.14.0-570.52.1.el9_6.x86_64.rpmYkernel-doc-5.14.0-570.52.1.el9_6.noarch.rpmVYpython3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm#Ykernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm%Yperf-5.14.0-570.52.1.el9_6.x86_64.rpm!Ykernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm"Ykernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm)Yrv-5.14.0-570.52.1.el9_6.x86_64.rpm$Ykernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm&Ykernel-headers-5.14.0-570.52.1.el9_6.x86_64.rpm¿.0 &ZBBBBBBBBBBsecurityImportant: webkit2gtk3 security updatewa https://access.redhat.com/errata/RHSA-2025:18097RHSA-2025:18097RHSA-2025:18097 https://access.redhat.com/security/cve/CVE-2025-43272CVE-2025-43272CVE-2025-43272https://access.redhat.com/security/cve/CVE-2025-43342CVE-2025-43342CVE-2025-43342https://access.redhat.com/security/cve/CVE-2025-43343CVE-2025-43343CVE-2025-43343https://access.redhat.com/security/cve/CVE-2025-43356CVE-2025-43356CVE-2025-43356https://access.redhat.com/security/cve/CVE-2025-43368CVE-2025-43368CVE-2025-43368https://bugzilla.redhat.com/23976262397626https://bugzilla.redhat.com/23976272397627https://bugzilla.redhat.com/23976282397628https://bugzilla.redhat.com/23976302397630https://bugzilla.redhat.com/24035982403598https://errata.almalinux.org/9/ALSA-2025-18097.htmlALSA-2025:18097ALSA-2025:18097 3twebkit2gtk3-jsc-2.50.1-0.el9_6.i686.rpm3twebkit2gtk3-jsc-2.50.1-0.el9_6.x86_64.rpm4twebkit2gtk3-jsc-devel-2.50.1-0.el9_6.x86_64.rpm1twebkit2gtk3-2.50.1-0.el9_6.x86_64.rpm2twebkit2gtk3-devel-2.50.1-0.el9_6.i686.rpm4twebkit2gtk3-jsc-devel-2.50.1-0.el9_6.i686.rpm2twebkit2gtk3-devel-2.50.1-0.el9_6.x86_64.rpm1twebkit2gtk3-2.50.1-0.el9_6.i686.rpm3twebkit2gtk3-jsc-2.50.1-0.el9_6.i686.rpm3twebkit2gtk3-jsc-2.50.1-0.el9_6.x86_64.rpm4twebkit2gtk3-jsc-devel-2.50.1-0.el9_6.x86_64.rpm1twebkit2gtk3-2.50.1-0.el9_6.x86_64.rpm2twebkit2gtk3-devel-2.50.1-0.el9_6.i686.rpm4twebkit2gtk3-jsc-devel-2.50.1-0.el9_6.i686.rpm2twebkit2gtk3-devel-2.50.1-0.el9_6.x86_64.rpm1twebkit2gtk3-2.50.1-0.el9_6.i686.rpm-1 =gBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updateXMhttps://access.redhat.com/errata/RHSA-2025:18149RHSA-2025:18149RHSA-2025:18149 https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18149.htmlALSA-2025:18149ALSA-2025:18149 )aspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.21-1.el9_6.x86_64.rpmHdotnet-templates-8.0-8.0.121-1.el9_6.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpmDdotnet-sdk-8.0-8.0.121-1.el9_6.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm:aspnetcore-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm+dotnet-sdk-dbg-8.0-8.0.121-1.el9_6.x86_64.rpm@dotnet-hostfxr-8.0-8.0.21-1.el9_6.x86_64.rpmBdotnet-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm )aspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.21-1.el9_6.x86_64.rpmHdotnet-templates-8.0-8.0.121-1.el9_6.x86_64.rpm<aspnetcore-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpmDdotnet-sdk-8.0-8.0.121-1.el9_6.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpm:aspnetcore-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm+dotnet-sdk-dbg-8.0-8.0.121-1.el9_6.x86_64.rpm@dotnet-hostfxr-8.0-8.0.21-1.el9_6.x86_64.rpmBdotnet-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm_2 ~BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update%Mhttps://access.redhat.com/errata/RHSA-2025:18151RHSA-2025:18151RHSA-2025:18151 https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18151.htmlALSA-2025:18151ALSA-2025:18151 $dotnet-hostfxr-9.0-9.0.10-1.el9_6.x86_64.rpm&dotnet-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm!aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm((dotnet-sdk-aot-9.0-9.0.111-1.el9_6.x86_64.rpm#dotnet-apphost-pack-9.0-9.0.10-1.el9_6.x86_64.rpm(netstandard-targeting-pack-2.1-9.0.111-1.el9_6.x86_64.rpm'(dotnet-sdk-9.0-9.0.111-1.el9_6.x86_64.rpm aspnetcore-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm+(dotnet-templates-9.0-9.0.111-1.el9_6.x86_64.rpm"aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm*dotnet-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm)(dotnet-sdk-dbg-9.0-9.0.111-1.el9_6.x86_64.rpmdotnet-host-9.0.10-1.el9_6.x86_64.rpm%dotnet-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm$dotnet-hostfxr-9.0-9.0.10-1.el9_6.x86_64.rpm&dotnet-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm!aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm((dotnet-sdk-aot-9.0-9.0.111-1.el9_6.x86_64.rpm#dotnet-apphost-pack-9.0-9.0.10-1.el9_6.x86_64.rpm(netstandard-targeting-pack-2.1-9.0.111-1.el9_6.x86_64.rpm'(dotnet-sdk-9.0-9.0.111-1.el9_6.x86_64.rpm aspnetcore-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm+(dotnet-templates-9.0-9.0.111-1.el9_6.x86_64.rpm"aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm*dotnet-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm)(dotnet-sdk-dbg-9.0-9.0.111-1.el9_6.x86_64.rpmdotnet-host-9.0.10-1.el9_6.x86_64.rpm%dotnet-runtime-9.0-9.0.10-1.el9_6.x86_64.rpmȡl3 [BBsecurityImportant: firefox security updaterDhttps://access.redhat.com/errata/RHSA-2025:18155RHSA-2025:18155RHSA-2025:18155 https://access.redhat.com/security/cve/CVE-2025-11708CVE-2025-11708CVE-2025-11708https://access.redhat.com/security/cve/CVE-2025-11709CVE-2025-11709CVE-2025-11709https://access.redhat.com/security/cve/CVE-2025-11710CVE-2025-11710CVE-2025-11710https://access.redhat.com/security/cve/CVE-2025-11711CVE-2025-11711CVE-2025-11711https://access.redhat.com/security/cve/CVE-2025-11712CVE-2025-11712CVE-2025-11712https://access.redhat.com/security/cve/CVE-2025-11714CVE-2025-11714CVE-2025-11714https://access.redhat.com/security/cve/CVE-2025-11715CVE-2025-11715CVE-2025-11715https://bugzilla.redhat.com/24037632403763https://bugzilla.redhat.com/24037652403765https://bugzilla.redhat.com/24037682403768https://bugzilla.redhat.com/24037692403769https://bugzilla.redhat.com/24037702403770https://bugzilla.redhat.com/24037742403774https://bugzilla.redhat.com/24037762403776https://errata.almalinux.org/9/ALSA-2025-18155.htmlALSA-2025:18155ALSA-2025:18155 8 firefox-140.4.0-3.el9_6.alma.1.x86_64.rpmQ firefox-x11-140.4.0-3.el9_6.alma.1.x86_64.rpm8 firefox-140.4.0-3.el9_6.alma.1.x86_64.rpmQ firefox-x11-140.4.0-3.el9_6.alma.1.x86_64.rpm.4 #`BsecurityModerate: libssh security update6 https://access.redhat.com/errata/RHSA-2025:18275RHSA-2025:18275RHSA-2025:18275 https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-18275.htmlALSA-2025:18275ALSA-2025:18275 0libssh-devel-0.10.4-15.el9_6.i686.rpm0libssh-devel-0.10.4-15.el9_6.x86_64.rpm0libssh-devel-0.10.4-15.el9_6.i686.rpm0libssh-devel-0.10.4-15.el9_6.x86_64.rpm5 7dBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateAhttps://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281 https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281 'Zrtla-5.14.0-570.55.1.el9_6.x86_64.rpmZkernel-doc-5.14.0-570.55.1.el9_6.noarch.rpm&Zkernel-headers-5.14.0-570.55.1.el9_6.x86_64.rpmVZpython3-perf-5.14.0-570.55.1.el9_6.x86_64.rpm"Zkernel-debug-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm$Zkernel-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm%Zperf-5.14.0-570.55.1.el9_6.x86_64.rpm#Zkernel-devel-5.14.0-570.55.1.el9_6.x86_64.rpm!Zkernel-debug-devel-5.14.0-570.55.1.el9_6.x86_64.rpm)Zrv-5.14.0-570.55.1.el9_6.x86_64.rpm 'Zrtla-5.14.0-570.55.1.el9_6.x86_64.rpmZkernel-doc-5.14.0-570.55.1.el9_6.noarch.rpm&Zkernel-headers-5.14.0-570.55.1.el9_6.x86_64.rpmVZpython3-perf-5.14.0-570.55.1.el9_6.x86_64.rpm"Zkernel-debug-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm$Zkernel-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm%Zperf-5.14.0-570.55.1.el9_6.x86_64.rpm#Zkernel-devel-5.14.0-570.55.1.el9_6.x86_64.rpm!Zkernel-debug-devel-5.14.0-570.55.1.el9_6.x86_64.rpm)Zrv-5.14.0-570.55.1.el9_6.x86_64.rpmx6 :xsecurityImportant: thunderbird security updateVhttps://access.redhat.com/errata/RHSA-2025:18321RHSA-2025:18321RHSA-2025:18321 https://access.redhat.com/security/cve/CVE-2025-11708CVE-2025-11708CVE-2025-11708https://access.redhat.com/security/cve/CVE-2025-11709CVE-2025-11709CVE-2025-11709https://access.redhat.com/security/cve/CVE-2025-11710CVE-2025-11710CVE-2025-11710https://access.redhat.com/security/cve/CVE-2025-11711CVE-2025-11711CVE-2025-11711https://access.redhat.com/security/cve/CVE-2025-11712CVE-2025-11712CVE-2025-11712https://access.redhat.com/security/cve/CVE-2025-11714CVE-2025-11714CVE-2025-11714https://access.redhat.com/security/cve/CVE-2025-11715CVE-2025-11715CVE-2025-11715https://bugzilla.redhat.com/24037632403763https://bugzilla.redhat.com/24037652403765https://bugzilla.redhat.com/24037682403768https://bugzilla.redhat.com/24037692403769https://bugzilla.redhat.com/24037702403770https://bugzilla.redhat.com/24037742403774https://bugzilla.redhat.com/24037762403776https://errata.almalinux.org/9/ALSA-2025-18321.htmlALSA-2025:18321ALSA-2025:18321 :athunderbird-140.4.0-2.el9_6.alma.1.x86_64.rpm:athunderbird-140.4.0-2.el9_6.alma.1.x86_64.rpm7 {BBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updatei\https://access.redhat.com/errata/RHSA-2025:18815RHSA-2025:18815RHSA-2025:18815 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18815.htmlALSA-2025:18815ALSA-2025:18815 ;7java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9.alma.1.noarch.rpm47java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm27java-1.8.0-openjdk-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm67java-1.8.0-openjdk-src-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm37java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm57java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm:7java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9.alma.1.noarch.rpm;7java-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9.alma.1.noarch.rpm47java-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm27java-1.8.0-openjdk-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm67java-1.8.0-openjdk-src-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm37java-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm57java-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9.alma.1.x86_64.rpm:7java-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9.alma.1.noarch.rpmȍJ8 HBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updateEhttps://access.redhat.com/errata/RHSA-2025:18821RHSA-2025:18821RHSA-2025:18821 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18821.htmlALSA-2025:18821ALSA-2025:18821 java-17-openjdk-src-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-src-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-static-libs-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.17.0.10-1.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.17.0.10-1.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9.alma.1.x86_64.rpmȌh9 -[BBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security updateJlhttps://access.redhat.com/errata/RHSA-2025:18824RHSA-2025:18824RHSA-2025:18824 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://access.redhat.com/security/cve/CVE-2025-61748CVE-2025-61748CVE-2025-61748https://errata.almalinux.org/9/ALSA-2025-18824.htmlALSA-2025:18824ALSA-2025:18824 }java-21-openjdk-static-libs-21.0.9.0.10-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.9.0.10-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.9.0.10-1.el9.alma.1.x86_64.rpmwjava-21-openjdk-devel-21.0.9.0.10-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.9.0.10-1.el9.alma.1.x86_64.rpm{java-21-openjdk-jmods-21.0.9.0.10-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.9.0.10-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.9.0.10-1.el9.alma.1.x86_64.rpm }java-21-openjdk-static-libs-21.0.9.0.10-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.9.0.10-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.9.0.10-1.el9.alma.1.x86_64.rpmwjava-21-openjdk-devel-21.0.9.0.10-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.9.0.10-1.el9.alma.1.x86_64.rpm{java-21-openjdk-jmods-21.0.9.0.10-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.9.0.10-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.9.0.10-1.el9.alma.1.x86_64.rpmȌS: 4nBBBBsecurityImportant: libtiff security update6<https://access.redhat.com/errata/RHSA-2025:19113RHSA-2025:19113RHSA-2025:19113 https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-19113.htmlALSA-2025:19113ALSA-2025:19113 h1libtiff-devel-4.4.0-13.el9_6.2.i686.rpmh1libtiff-devel-4.4.0-13.el9_6.2.x86_64.rpmg1libtiff-4.4.0-13.el9_6.2.x86_64.rpmg1libtiff-4.4.0-13.el9_6.2.i686.rpmh1libtiff-devel-4.4.0-13.el9_6.2.i686.rpmh1libtiff-devel-4.4.0-13.el9_6.2.x86_64.rpmg1libtiff-4.4.0-13.el9_6.2.x86_64.rpmg1libtiff-4.4.0-13.el9_6.2.i686.rpmȁ2; >uBBBBBBBsecurityImportant: emacs security updaterthttps://access.redhat.com/errata/RHSA-2025:1915RHSA-2025:1915RHSA-2025:1915 https://access.redhat.com/security/cve/CVE-2025-1244CVE-2025-1244CVE-2025-1244https://bugzilla.redhat.com/23451502345150https://errata.almalinux.org/9/ALSA-2025-1915.htmlALSA-2025:1915ALSA-2025:1915 {;emacs-nox-27.2-11.el9_5.1.x86_64.rpm;emacs-filesystem-27.2-11.el9_5.1.noarch.rpmx;emacs-27.2-11.el9_5.1.x86_64.rpmz;emacs-lucid-27.2-11.el9_5.1.x86_64.rpmy;emacs-common-27.2-11.el9_5.1.x86_64.rpm{;emacs-nox-27.2-11.el9_5.1.x86_64.rpm;emacs-filesystem-27.2-11.el9_5.1.noarch.rpmx;emacs-27.2-11.el9_5.1.x86_64.rpmz;emacs-lucid-27.2-11.el9_5.1.x86_64.rpmy;emacs-common-27.2-11.el9_5.1.x86_64.rpm0< BBBBsecurityImportant: redis security updatef https://access.redhat.com/errata/RHSA-2025:19237RHSA-2025:19237RHSA-2025:19237 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-19237.htmlALSA-2025:19237ALSA-2025:19237 >9redis-devel-6.2.20-1.el9_6.i686.rpm9redis-doc-6.2.20-1.el9_6.noarch.rpm"9redis-6.2.20-1.el9_6.x86_64.rpm>9redis-devel-6.2.20-1.el9_6.x86_64.rpm>9redis-devel-6.2.20-1.el9_6.i686.rpm9redis-doc-6.2.20-1.el9_6.noarch.rpm"9redis-6.2.20-1.el9_6.x86_64.rpm>9redis-devel-6.2.20-1.el9_6.x86_64.rpmȌZ= gBBBsecurityImportant: redis:7 security update https://access.redhat.com/errata/RHSA-2025:19345RHSA-2025:19345RHSA-2025:19345 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-19345.htmlALSA-2025:19345ALSA-2025:19345 "(>hredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm"hredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpmhredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpm"(>hredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm"hredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpmhredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpmȷ>> GBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409 https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409 '[rtla-5.14.0-570.60.1.el9_6.x86_64.rpm%[perf-5.14.0-570.60.1.el9_6.x86_64.rpm)[rv-5.14.0-570.60.1.el9_6.x86_64.rpm"[kernel-debug-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm[kernel-doc-5.14.0-570.60.1.el9_6.noarch.rpm&[kernel-headers-5.14.0-570.60.1.el9_6.x86_64.rpm#[kernel-devel-5.14.0-570.60.1.el9_6.x86_64.rpmV[python3-perf-5.14.0-570.60.1.el9_6.x86_64.rpm![kernel-debug-devel-5.14.0-570.60.1.el9_6.x86_64.rpm$[kernel-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm '[rtla-5.14.0-570.60.1.el9_6.x86_64.rpm%[perf-5.14.0-570.60.1.el9_6.x86_64.rpm)[rv-5.14.0-570.60.1.el9_6.x86_64.rpm"[kernel-debug-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm[kernel-doc-5.14.0-570.60.1.el9_6.noarch.rpm&[kernel-headers-5.14.0-570.60.1.el9_6.x86_64.rpm#[kernel-devel-5.14.0-570.60.1.el9_6.x86_64.rpmV[python3-perf-5.14.0-570.60.1.el9_6.x86_64.rpm![kernel-debug-devel-5.14.0-570.60.1.el9_6.x86_64.rpm$[kernel-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpmȷD? &[BBBBBBBBBsecurityImportant: tigervnc security update thttps://access.redhat.com/errata/RHSA-2025:19489RHSA-2025:19489RHSA-2025:19489 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-19489.htmlALSA-2025:19489ALSA-2025:19489 NYtigervnc-server-module-1.14.1-9.el9_6.x86_64.rpmMYtigervnc-server-minimal-1.14.1-9.el9_6.x86_64.rpmLYtigervnc-server-1.14.1-9.el9_6.x86_64.rpm#Ytigervnc-icons-1.14.1-9.el9_6.noarch.rpm$Ytigervnc-license-1.14.1-9.el9_6.noarch.rpm%Ytigervnc-selinux-1.14.1-9.el9_6.noarch.rpmKYtigervnc-1.14.1-9.el9_6.x86_64.rpmNYtigervnc-server-module-1.14.1-9.el9_6.x86_64.rpmMYtigervnc-server-minimal-1.14.1-9.el9_6.x86_64.rpmLYtigervnc-server-1.14.1-9.el9_6.x86_64.rpm#Ytigervnc-icons-1.14.1-9.el9_6.noarch.rpm$Ytigervnc-license-1.14.1-9.el9_6.noarch.rpm%Ytigervnc-selinux-1.14.1-9.el9_6.noarch.rpmKYtigervnc-1.14.1-9.el9_6.x86_64.rpmȷG@ ?gBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera and mariadb security update! https://access.redhat.com/errata/RHSA-2025:19584RHSA-2025:19584RHSA-2025:19584 https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://errata.almalinux.org/9/ALSA-2025-19584.htmlALSA-2025:19584ALSA-2025:19584 ,-mariadb-10.5.29-2.el9_6.x86_64.rpm"-mariadb-server-utils-10.5.29-2.el9_6.x86_64.rpm-mariadb-embedded-10.5.29-2.el9_6.x86_64.rpm-mariadb-oqgraph-engine-10.5.29-2.el9_6.x86_64.rpm-mariadb-gssapi-server-10.5.29-2.el9_6.x86_64.rpm-mariadb-errmsg-10.5.29-2.el9_6.x86_64.rpm!-mariadb-server-galera-10.5.29-2.el9_6.x86_64.rpm-mariadb-pam-10.5.29-2.el9_6.x86_64.rpm -mariadb-server-10.5.29-2.el9_6.x86_64.rpm-4galera-26.4.22-1.el9_6.x86_64.rpm-mariadb-backup-10.5.29-2.el9_6.x86_64.rpm-mariadb-common-10.5.29-2.el9_6.x86_64.rpm ,-mariadb-10.5.29-2.el9_6.x86_64.rpm"-mariadb-server-utils-10.5.29-2.el9_6.x86_64.rpm-mariadb-embedded-10.5.29-2.el9_6.x86_64.rpm-mariadb-oqgraph-engine-10.5.29-2.el9_6.x86_64.rpm-mariadb-gssapi-server-10.5.29-2.el9_6.x86_64.rpm-mariadb-errmsg-10.5.29-2.el9_6.x86_64.rpm!-mariadb-server-galera-10.5.29-2.el9_6.x86_64.rpm-mariadb-pam-10.5.29-2.el9_6.x86_64.rpm -mariadb-server-10.5.29-2.el9_6.x86_64.rpm-4galera-26.4.22-1.el9_6.x86_64.rpm-mariadb-backup-10.5.29-2.el9_6.x86_64.rpm-mariadb-common-10.5.29-2.el9_6.x86_64.rpmȶ A @securityImportant: runc security update5https://access.redhat.com/errata/RHSA-2025:19927RHSA-2025:19927RHSA-2025:19927 https://access.redhat.com/security/cve/CVE-2025-31133CVE-2025-31133CVE-2025-31133https://access.redhat.com/security/cve/CVE-2025-52565CVE-2025-52565CVE-2025-52565https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047052404705https://bugzilla.redhat.com/24047082404708https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-19927.htmlALSA-2025:19927ALSA-2025:19927  grunc-1.2.5-3.el9_6.x86_64.rpm grunc-1.2.5-3.el9_6.x86_64.rpmOB CBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateT9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930 https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930 "\kernel-debug-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpm\kernel-doc-5.14.0-570.62.1.el9_6.noarch.rpm#\kernel-devel-5.14.0-570.62.1.el9_6.x86_64.rpm&\kernel-headers-5.14.0-570.62.1.el9_6.x86_64.rpm!\kernel-debug-devel-5.14.0-570.62.1.el9_6.x86_64.rpm%\perf-5.14.0-570.62.1.el9_6.x86_64.rpm$\kernel-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpmV\python3-perf-5.14.0-570.62.1.el9_6.x86_64.rpm'\rtla-5.14.0-570.62.1.el9_6.x86_64.rpm)\rv-5.14.0-570.62.1.el9_6.x86_64.rpm "\kernel-debug-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpm\kernel-doc-5.14.0-570.62.1.el9_6.noarch.rpm#\kernel-devel-5.14.0-570.62.1.el9_6.x86_64.rpm&\kernel-headers-5.14.0-570.62.1.el9_6.x86_64.rpm!\kernel-debug-devel-5.14.0-570.62.1.el9_6.x86_64.rpm%\perf-5.14.0-570.62.1.el9_6.x86_64.rpm$\kernel-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpmV\python3-perf-5.14.0-570.62.1.el9_6.x86_64.rpm'\rtla-5.14.0-570.62.1.el9_6.x86_64.rpm)\rv-5.14.0-570.62.1.el9_6.x86_64.rpmѳC !WBBBBBBBBsecurityImportant: bind9.18 security update phttps://access.redhat.com/errata/RHSA-2025:19950RHSA-2025:19950RHSA-2025:19950 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-19950.htmlALSA-2025:19950ALSA-2025:19950 b bind9.18-chroot-9.18.29-4.el9_6.2.x86_64.rpma bind9.18-9.18.29-4.el9_6.2.x86_64.rpmc bind9.18-dnssec-utils-9.18.29-4.el9_6.2.x86_64.rpme bind9.18-utils-9.18.29-4.el9_6.2.x86_64.rpmd bind9.18-libs-9.18.29-4.el9_6.2.x86_64.rpmb bind9.18-chroot-9.18.29-4.el9_6.2.x86_64.rpma bind9.18-9.18.29-4.el9_6.2.x86_64.rpmc bind9.18-dnssec-utils-9.18.29-4.el9_6.2.x86_64.rpme bind9.18-utils-9.18.29-4.el9_6.2.x86_64.rpmd bind9.18-libs-9.18.29-4.el9_6.2.x86_64.rpm/D .bBBBBBBBBBBsecurityImportant: webkit2gtk3 security update}# https://access.redhat.com/errata/RHSA-2025:2035RHSA-2025:2035RHSA-2025:2035 https://access.redhat.com/security/cve/CVE-2024-54543CVE-2024-54543CVE-2024-54543https://access.redhat.com/security/cve/CVE-2025-24143CVE-2025-24143CVE-2025-24143https://access.redhat.com/security/cve/CVE-2025-24150CVE-2025-24150CVE-2025-24150https://access.redhat.com/security/cve/CVE-2025-24158CVE-2025-24158CVE-2025-24158https://access.redhat.com/security/cve/CVE-2025-24162CVE-2025-24162CVE-2025-24162https://bugzilla.redhat.com/23446192344619https://bugzilla.redhat.com/23446212344621https://bugzilla.redhat.com/23446222344622https://bugzilla.redhat.com/23446232344623https://bugzilla.redhat.com/23446242344624https://errata.almalinux.org/9/ALSA-2025-2035.htmlALSA-2025:2035ALSA-2025:2035 1nwebkit2gtk3-2.46.6-1.el9_5.x86_64.rpm2nwebkit2gtk3-devel-2.46.6-1.el9_5.x86_64.rpm4nwebkit2gtk3-jsc-devel-2.46.6-1.el9_5.x86_64.rpm3nwebkit2gtk3-jsc-2.46.6-1.el9_5.x86_64.rpm3nwebkit2gtk3-jsc-2.46.6-1.el9_5.i686.rpm2nwebkit2gtk3-devel-2.46.6-1.el9_5.i686.rpm1nwebkit2gtk3-2.46.6-1.el9_5.i686.rpm4nwebkit2gtk3-jsc-devel-2.46.6-1.el9_5.i686.rpm1nwebkit2gtk3-2.46.6-1.el9_5.x86_64.rpm2nwebkit2gtk3-devel-2.46.6-1.el9_5.x86_64.rpm4nwebkit2gtk3-jsc-devel-2.46.6-1.el9_5.x86_64.rpm3nwebkit2gtk3-jsc-2.46.6-1.el9_5.x86_64.rpm3nwebkit2gtk3-jsc-2.46.6-1.el9_5.i686.rpm2nwebkit2gtk3-devel-2.46.6-1.el9_5.i686.rpm1nwebkit2gtk3-2.46.6-1.el9_5.i686.rpm4nwebkit2gtk3-jsc-devel-2.46.6-1.el9_5.i686.rpm)E oBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update Xahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518 https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518 https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396 &ekernel-headers-5.14.0-611.5.1.el9_7.x86_64.rpm$ekernel-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm%eperf-5.14.0-611.5.1.el9_7.x86_64.rpm)erv-5.14.0-611.5.1.el9_7.x86_64.rpmVepython3-perf-5.14.0-611.5.1.el9_7.x86_64.rpm!ekernel-debug-devel-5.14.0-611.5.1.el9_7.x86_64.rpmekernel-doc-5.14.0-611.5.1.el9_7.noarch.rpm"ekernel-debug-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm'ertla-5.14.0-611.5.1.el9_7.x86_64.rpm#ekernel-devel-5.14.0-611.5.1.el9_7.x86_64.rpm &ekernel-headers-5.14.0-611.5.1.el9_7.x86_64.rpm$ekernel-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm%eperf-5.14.0-611.5.1.el9_7.x86_64.rpm)erv-5.14.0-611.5.1.el9_7.x86_64.rpmVepython3-perf-5.14.0-611.5.1.el9_7.x86_64.rpm!ekernel-debug-devel-5.14.0-611.5.1.el9_7.x86_64.rpmekernel-doc-5.14.0-611.5.1.el9_7.noarch.rpm"ekernel-debug-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm'ertla-5.14.0-611.5.1.el9_7.x86_64.rpm#ekernel-devel-5.14.0-611.5.1.el9_7.x86_64.rpmAF CBBBsecurityModerate: zziplib security updatexhttps://access.redhat.com/errata/RHSA-2025:20838RHSA-2025:20838RHSA-2025:20838 https://access.redhat.com/security/cve/CVE-2018-17828CVE-2018-17828CVE-2018-17828https://bugzilla.redhat.com/16358881635888https://errata.almalinux.org/9/ALSA-2025-20838.htmlALSA-2025:20838ALSA-2025:20838 ;Nzziplib-0.13.71-12.el9.x86_64.rpm|Nzziplib-utils-0.13.71-12.el9.x86_64.rpm;Nzziplib-0.13.71-12.el9.i686.rpm;Nzziplib-0.13.71-12.el9.x86_64.rpm|Nzziplib-utils-0.13.71-12.el9.x86_64.rpm;Nzziplib-0.13.71-12.el9.i686.rpmtG IBBBBBBBsecurityImportant: podman security update &https://access.redhat.com/errata/RHSA-2025:20909RHSA-2025:20909RHSA-2025:20909 https://access.redhat.com/security/cve/CVE-2025-47907CVE-2025-47907CVE-2025-47907https://access.redhat.com/security/cve/CVE-2025-9566CVE-2025-9566CVE-2025-9566https://bugzilla.redhat.com/23870832387083https://bugzilla.redhat.com/23931522393152https://errata.almalinux.org/9/ALSA-2025-20909.htmlALSA-2025:20909ALSA-2025:20909 gTpodman-docker-5.6.0-6.el9_7.noarch.rpm2Tpodman-5.6.0-6.el9_7.x86_64.rpm4Tpodman-remote-5.6.0-6.el9_7.x86_64.rpm5Tpodman-tests-5.6.0-6.el9_7.x86_64.rpm3Tpodman-plugins-5.6.0-6.el9_7.x86_64.rpmgTpodman-docker-5.6.0-6.el9_7.noarch.rpm2Tpodman-5.6.0-6.el9_7.x86_64.rpm4Tpodman-remote-5.6.0-6.el9_7.x86_64.rpm5Tpodman-tests-5.6.0-6.el9_7.x86_64.rpm3Tpodman-plugins-5.6.0-6.el9_7.x86_64.rpmɑzH SBBBBBBBBBBsecurityImportant: webkit2gtk3 security update0a https://access.redhat.com/errata/RHSA-2025:20922RHSA-2025:20922RHSA-2025:20922 https://access.redhat.com/security/cve/CVE-2025-43272CVE-2025-43272CVE-2025-43272https://access.redhat.com/security/cve/CVE-2025-43342CVE-2025-43342CVE-2025-43342https://access.redhat.com/security/cve/CVE-2025-43343CVE-2025-43343CVE-2025-43343https://access.redhat.com/security/cve/CVE-2025-43356CVE-2025-43356CVE-2025-43356https://access.redhat.com/security/cve/CVE-2025-43368CVE-2025-43368CVE-2025-43368https://bugzilla.redhat.com/23976262397626https://bugzilla.redhat.com/23976272397627https://bugzilla.redhat.com/23976282397628https://bugzilla.redhat.com/23976302397630https://bugzilla.redhat.com/24035982403598https://errata.almalinux.org/9/ALSA-2025-20922.htmlALSA-2025:20922ALSA-2025:20922 3uwebkit2gtk3-jsc-2.50.1-1.el9_7.x86_64.rpm4uwebkit2gtk3-jsc-devel-2.50.1-1.el9_7.i686.rpm2uwebkit2gtk3-devel-2.50.1-1.el9_7.i686.rpm1uwebkit2gtk3-2.50.1-1.el9_7.x86_64.rpm1uwebkit2gtk3-2.50.1-1.el9_7.i686.rpm2uwebkit2gtk3-devel-2.50.1-1.el9_7.x86_64.rpm3uwebkit2gtk3-jsc-2.50.1-1.el9_7.i686.rpm4uwebkit2gtk3-jsc-devel-2.50.1-1.el9_7.x86_64.rpm3uwebkit2gtk3-jsc-2.50.1-1.el9_7.x86_64.rpm4uwebkit2gtk3-jsc-devel-2.50.1-1.el9_7.i686.rpm2uwebkit2gtk3-devel-2.50.1-1.el9_7.i686.rpm1uwebkit2gtk3-2.50.1-1.el9_7.x86_64.rpm1uwebkit2gtk3-2.50.1-1.el9_7.i686.rpm2uwebkit2gtk3-devel-2.50.1-1.el9_7.x86_64.rpm3uwebkit2gtk3-jsc-2.50.1-1.el9_7.i686.rpm4uwebkit2gtk3-jsc-devel-2.50.1-1.el9_7.x86_64.rpm>I &`BBBBsecurityImportant: redis security update https://access.redhat.com/errata/RHSA-2025:20926RHSA-2025:20926RHSA-2025:20926 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-20926.htmlALSA-2025:20926ALSA-2025:20926 >:redis-devel-6.2.20-2.el9_7.x86_64.rpm:redis-doc-6.2.20-2.el9_7.noarch.rpm":redis-6.2.20-2.el9_7.x86_64.rpm>:redis-devel-6.2.20-2.el9_7.i686.rpm>:redis-devel-6.2.20-2.el9_7.x86_64.rpm:redis-doc-6.2.20-2.el9_7.noarch.rpm":redis-6.2.20-2.el9_7.x86_64.rpm>:redis-devel-6.2.20-2.el9_7.i686.rpmJ ?gBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security update,ghttps://access.redhat.com/errata/RHSA-2025:20928RHSA-2025:20928RHSA-2025:20928 https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-20928.htmlALSA-2025:20928ALSA-2025:20928 }python3-ipaclient-4.12.2-22.el9_7.1.noarch.rpm}ipa-common-4.12.2-22.el9_7.1.noarch.rpms}ipa-client-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm}ipa-client-epn-4.12.2-22.el9_7.1.x86_64.rpm}ipa-server-dns-4.12.2-22.el9_7.1.noarch.rpm0}ipa-selinux-luna-4.12.2-22.el9_7.1.noarch.rpm}python3-ipalib-4.12.2-22.el9_7.1.noarch.rpm}ipa-client-common-4.12.2-22.el9_7.1.noarch.rpm}ipa-selinux-4.12.2-22.el9_7.1.noarch.rpmt}ipa-server-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm}ipa-server-common-4.12.2-22.el9_7.1.noarch.rpm1}ipa-selinux-nfast-4.12.2-22.el9_7.1.noarch.rpm}ipa-server-trust-ad-4.12.2-22.el9_7.1.x86_64.rpm~}ipa-client-4.12.2-22.el9_7.1.x86_64.rpm}python3-ipaserver-4.12.2-22.el9_7.1.noarch.rpm}ipa-server-4.12.2-22.el9_7.1.x86_64.rpm}ipa-client-samba-4.12.2-22.el9_7.1.x86_64.rpm}python3-ipaclient-4.12.2-22.el9_7.1.noarch.rpm}ipa-common-4.12.2-22.el9_7.1.noarch.rpms}ipa-client-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm}ipa-client-epn-4.12.2-22.el9_7.1.x86_64.rpm}ipa-server-dns-4.12.2-22.el9_7.1.noarch.rpm0}ipa-selinux-luna-4.12.2-22.el9_7.1.noarch.rpm}python3-ipalib-4.12.2-22.el9_7.1.noarch.rpm}ipa-client-common-4.12.2-22.el9_7.1.noarch.rpm}ipa-selinux-4.12.2-22.el9_7.1.noarch.rpmt}ipa-server-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpm}ipa-server-common-4.12.2-22.el9_7.1.noarch.rpm1}ipa-selinux-nfast-4.12.2-22.el9_7.1.noarch.rpm}ipa-server-trust-ad-4.12.2-22.el9_7.1.x86_64.rpm~}ipa-client-4.12.2-22.el9_7.1.x86_64.rpm}python3-ipaserver-4.12.2-22.el9_7.1.noarch.rpm}ipa-server-4.12.2-22.el9_7.1.x86_64.rpm}ipa-client-samba-4.12.2-22.el9_7.1.x86_64.rpmɵ`K @securityImportant: squid security updateFhttps://access.redhat.com/errata/RHSA-2025:20935RHSA-2025:20935RHSA-2025:20935 https://access.redhat.com/security/cve/CVE-2025-62168CVE-2025-62168CVE-2025-62168https://bugzilla.redhat.com/24047362404736https://errata.almalinux.org/9/ALSA-2025-20935.htmlALSA-2025:20935ALSA-2025:20935  squid-5.5-22.el9_7.1.x86_64.rpm squid-5.5-22.el9_7.1.x86_64.rpmDL CBBBBsecurityImportant: sqlite security updateY https://access.redhat.com/errata/RHSA-2025:20936RHSA-2025:20936RHSA-2025:20936 https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-20936.htmlALSA-2025:20936ALSA-2025:20936 msqlite-3.34.1-9.el9_7.i686.rpmmsqlite-3.34.1-9.el9_7.x86_64.rpmnsqlite-devel-3.34.1-9.el9_7.i686.rpmnsqlite-devel-3.34.1-9.el9_7.x86_64.rpmmsqlite-3.34.1-9.el9_7.i686.rpmmsqlite-3.34.1-9.el9_7.x86_64.rpmnsqlite-devel-3.34.1-9.el9_7.i686.rpmnsqlite-devel-3.34.1-9.el9_7.x86_64.rpmM JBsecurityModerate: libssh security updateb https://access.redhat.com/errata/RHSA-2025:20943RHSA-2025:20943RHSA-2025:20943 https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-20943.htmlALSA-2025:20943ALSA-2025:20943 0 libssh-devel-0.10.4-15.el9_7.i686.rpm0 libssh-devel-0.10.4-15.el9_7.x86_64.rpm0 libssh-devel-0.10.4-15.el9_7.i686.rpm0 libssh-devel-0.10.4-15.el9_7.x86_64.rpmBN NBBBBsecurityModerate: vim security updatemzhttps://access.redhat.com/errata/RHSA-2025:20945RHSA-2025:20945RHSA-2025:20945 https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-20945.htmlALSA-2025:20945ALSA-2025:20945 0 vim-common-8.2.2637-23.el9_7.x86_64.rpm1 vim-enhanced-8.2.2637-23.el9_7.x86_64.rpm/ vim-X11-8.2.2637-23.el9_7.x86_64.rpm0 vim-common-8.2.2637-23.el9_7.x86_64.rpm1 vim-enhanced-8.2.2637-23.el9_7.x86_64.rpm/ vim-X11-8.2.2637-23.el9_7.x86_64.rpmSO UsecurityImportant: sssd security updateg/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954 https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954 v&sssd-idp-2.9.7-4.el9_7.1.x86_64.rpmv&sssd-idp-2.9.7-4.el9_7.1.x86_64.rpmɵP gBBBsecurityImportant: redis:7 security update https://access.redhat.com/errata/RHSA-2025:20955RHSA-2025:20955RHSA-2025:20955 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-20955.htmlALSA-2025:20955ALSA-2025:20955 "(>hredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm"hredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpmhredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpm"(>hredis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm"hredis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpmhredis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpmQ YBBBBsecurityImportant: libtiff security update1<https://access.redhat.com/errata/RHSA-2025:20956RHSA-2025:20956RHSA-2025:20956 https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-20956.htmlALSA-2025:20956ALSA-2025:20956 g2libtiff-4.4.0-15.el9_7.2.i686.rpmh2libtiff-devel-4.4.0-15.el9_7.2.i686.rpmg2libtiff-4.4.0-15.el9_7.2.x86_64.rpmh2libtiff-devel-4.4.0-15.el9_7.2.x86_64.rpmg2libtiff-4.4.0-15.el9_7.2.i686.rpmh2libtiff-devel-4.4.0-15.el9_7.2.i686.rpmg2libtiff-4.4.0-15.el9_7.2.x86_64.rpmh2libtiff-devel-4.4.0-15.el9_7.2.x86_64.rpm0R "`securityImportant: runc security updatemhttps://access.redhat.com/errata/RHSA-2025:20957RHSA-2025:20957RHSA-2025:20957 https://access.redhat.com/security/cve/CVE-2025-31133CVE-2025-31133CVE-2025-31133https://access.redhat.com/security/cve/CVE-2025-52565CVE-2025-52565CVE-2025-52565https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047052404705https://bugzilla.redhat.com/24047082404708https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-20957.htmlALSA-2025:20957ALSA-2025:20957  hrunc-1.3.0-4.el9_7.x86_64.rpm hrunc-1.3.0-4.el9_7.x86_64.rpmjS .cBBBBBBBBBsecurityImportant: tigervnc security update thttps://access.redhat.com/errata/RHSA-2025:20958RHSA-2025:20958RHSA-2025:20958 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20958.htmlALSA-2025:20958ALSA-2025:20958 #Ztigervnc-icons-1.15.0-6.el9_7.noarch.rpm$Ztigervnc-license-1.15.0-6.el9_7.noarch.rpmMZtigervnc-server-minimal-1.15.0-6.el9_7.x86_64.rpmKZtigervnc-1.15.0-6.el9_7.x86_64.rpmLZtigervnc-server-1.15.0-6.el9_7.x86_64.rpmNZtigervnc-server-module-1.15.0-6.el9_7.x86_64.rpm%Ztigervnc-selinux-1.15.0-6.el9_7.noarch.rpm#Ztigervnc-icons-1.15.0-6.el9_7.noarch.rpm$Ztigervnc-license-1.15.0-6.el9_7.noarch.rpmMZtigervnc-server-minimal-1.15.0-6.el9_7.x86_64.rpmKZtigervnc-1.15.0-6.el9_7.x86_64.rpmLZtigervnc-server-1.15.0-6.el9_7.x86_64.rpmNZtigervnc-server-module-1.15.0-6.el9_7.x86_64.rpm%Ztigervnc-selinux-1.15.0-6.el9_7.noarch.rpmɵzT 5oBBBBsecurityImportant: libsoup security update_https://access.redhat.com/errata/RHSA-2025:20959RHSA-2025:20959RHSA-2025:20959 https://access.redhat.com/security/cve/CVE-2025-11021CVE-2025-11021CVE-2025-11021https://access.redhat.com/security/cve/CVE-2025-4945CVE-2025-4945CVE-2025-4945https://bugzilla.redhat.com/23671752367175https://bugzilla.redhat.com/23996272399627https://errata.almalinux.org/9/ALSA-2025-20959.htmlALSA-2025:20959ALSA-2025:20959  libsoup-2.72.0-12.el9_7.1.i686.rpm libsoup-devel-2.72.0-12.el9_7.1.i686.rpm libsoup-2.72.0-12.el9_7.1.x86_64.rpm libsoup-devel-2.72.0-12.el9_7.1.x86_64.rpm libsoup-2.72.0-12.el9_7.1.i686.rpm libsoup-devel-2.72.0-12.el9_7.1.i686.rpm libsoup-2.72.0-12.el9_7.1.x86_64.rpm libsoup-devel-2.72.0-12.el9_7.1.x86_64.rpm+U 8vsecurityModerate: xorg-x11-server-Xwayland security update_ https://access.redhat.com/errata/RHSA-2025:20960RHSA-2025:20960RHSA-2025:20960 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20960.htmlALSA-2025:20960ALSA-2025:20960 c1xorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpmc1xorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpm1V yBBBBBBBBBBsecurityModerate: xorg-x11-server security updateiyhttps://access.redhat.com/errata/RHSA-2025:20961RHSA-2025:20961RHSA-2025:20961 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20961.htmlALSA-2025:20961ALSA-2025:20961 `mxorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpm_mxorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpmbmxorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpmdmxorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpm^mxorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpmamxorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpm`mxorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpm_mxorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpmbmxorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpmdmxorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpm^mxorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpmamxorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpmW FBBBBBBsecurityModerate: qt5-qt3d security updatebYhttps://access.redhat.com/errata/RHSA-2025:20963RHSA-2025:20963RHSA-2025:20963 https://access.redhat.com/security/cve/CVE-2025-11277CVE-2025-11277CVE-2025-11277https://bugzilla.redhat.com/24016222401622https://errata.almalinux.org/9/ALSA-2025-20963.htmlALSA-2025:20963ALSA-2025:20963 \ qt5-qt3d-5.15.9-2.el9_7.1.i686.rpm\ qt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpm] qt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpmt qt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpm] qt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpm\ qt5-qt3d-5.15.9-2.el9_7.1.i686.rpm\ qt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpm] qt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpmt qt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpm] qt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpmSX OBBBBBBBBBBBsecurityImportant: bind security update;~https://access.redhat.com/errata/RHSA-2025:21110RHSA-2025:21110RHSA-2025:21110 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://errata.almalinux.org/9/ALSA-2025-21110.htmlALSA-2025:21110ALSA-2025:21110 *Lbind-dnssec-doc-9.16.23-34.el9_7.1.noarch.rpm[Lbind-dnssec-utils-9.16.23-34.el9_7.1.x86_64.rpm]Lbind-utils-9.16.23-34.el9_7.1.x86_64.rpm\Lbind-libs-9.16.23-34.el9_7.1.x86_64.rpm+Lbind-license-9.16.23-34.el9_7.1.noarch.rpmZLbind-chroot-9.16.23-34.el9_7.1.x86_64.rpmYLbind-9.16.23-34.el9_7.1.x86_64.rpm7Lpython3-bind-9.16.23-34.el9_7.1.noarch.rpm*Lbind-dnssec-doc-9.16.23-34.el9_7.1.noarch.rpm[Lbind-dnssec-utils-9.16.23-34.el9_7.1.x86_64.rpm]Lbind-utils-9.16.23-34.el9_7.1.x86_64.rpm\Lbind-libs-9.16.23-34.el9_7.1.x86_64.rpm+Lbind-license-9.16.23-34.el9_7.1.noarch.rpmZLbind-chroot-9.16.23-34.el9_7.1.x86_64.rpmYLbind-9.16.23-34.el9_7.1.x86_64.rpm7Lpython3-bind-9.16.23-34.el9_7.1.noarch.rpm>Y ']BBBBBBBBsecurityImportant: bind9.18 security update9phttps://access.redhat.com/errata/RHSA-2025:21111RHSA-2025:21111RHSA-2025:21111 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-21111.htmlALSA-2025:21111ALSA-2025:21111 b!bind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpmc!bind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpme!bind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpmd!bind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpma!bind9.18-9.18.29-5.el9_7.2.x86_64.rpmb!bind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpmc!bind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpme!bind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpmd!bind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpma!bind9.18-9.18.29-5.el9_7.2.x86_64.rpmɵZ )(securityImportant: python-kdcproxy security update)https://access.redhat.com/errata/RHSA-2025:21139RHSA-2025:21139RHSA-2025:21139 https://access.redhat.com/security/cve/CVE-2025-59088CVE-2025-59088CVE-2025-59088https://access.redhat.com/security/cve/CVE-2025-59089CVE-2025-59089CVE-2025-59089https://bugzilla.redhat.com/23939552393955https://bugzilla.redhat.com/23939582393958https://errata.almalinux.org/9/ALSA-2025-21139.htmlALSA-2025:21139ALSA-2025:21139 \Ppython3-kdcproxy-1.0.0-9.el9_7.noarch.rpm\Ppython3-kdcproxy-1.0.0-9.el9_7.noarch.rpmK[ /jBBBsecurityModerate: openssl security updateHZhttps://access.redhat.com/errata/RHSA-2025:21255RHSA-2025:21255RHSA-2025:21255 https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2025-21255.htmlALSA-2025:21255ALSA-2025:21255  jopenssl-devel-3.5.1-4.el9_7.i686.rpm jopenssl-devel-3.5.1-4.el9_7.x86_64.rpmJjopenssl-perl-3.5.1-4.el9_7.x86_64.rpm jopenssl-devel-3.5.1-4.el9_7.i686.rpm jopenssl-devel-3.5.1-4.el9_7.x86_64.rpmJjopenssl-perl-3.5.1-4.el9_7.x86_64.rpmɵs\ 4pBBsecurityImportant: firefox security update"https://access.redhat.com/errata/RHSA-2025:21280RHSA-2025:21280RHSA-2025:21280 https://access.redhat.com/security/cve/CVE-2025-13012CVE-2025-13012CVE-2025-13012https://access.redhat.com/security/cve/CVE-2025-13013CVE-2025-13013CVE-2025-13013https://access.redhat.com/security/cve/CVE-2025-13014CVE-2025-13014CVE-2025-13014https://access.redhat.com/security/cve/CVE-2025-13015CVE-2025-13015CVE-2025-13015https://access.redhat.com/security/cve/CVE-2025-13016CVE-2025-13016CVE-2025-13016https://access.redhat.com/security/cve/CVE-2025-13017CVE-2025-13017CVE-2025-13017https://access.redhat.com/security/cve/CVE-2025-13018CVE-2025-13018CVE-2025-13018https://access.redhat.com/security/cve/CVE-2025-13019CVE-2025-13019CVE-2025-13019https://access.redhat.com/security/cve/CVE-2025-13020CVE-2025-13020CVE-2025-13020https://bugzilla.redhat.com/24140792414079https://bugzilla.redhat.com/24140802414080https://bugzilla.redhat.com/24140832414083https://bugzilla.redhat.com/24140842414084https://bugzilla.redhat.com/24140852414085https://bugzilla.redhat.com/24140862414086https://bugzilla.redhat.com/24140902414090https://bugzilla.redhat.com/24140912414091https://bugzilla.redhat.com/24140922414092https://errata.almalinux.org/9/ALSA-2025-21280.htmlALSA-2025:21280ALSA-2025:21280 8 firefox-140.5.0-1.el9_7.alma.1.x86_64.rpmQ firefox-x11-140.5.0-1.el9_7.alma.1.x86_64.rpm8 firefox-140.5.0-1.el9_7.alma.1.x86_64.rpmQ firefox-x11-140.5.0-1.el9_7.alma.1.x86_64.rpmɑ>] :uBBBsecurityCritical: lasso security update|=$https://access.redhat.com/errata/RHSA-2025:21462RHSA-2025:21462RHSA-2025:21462 https://access.redhat.com/security/cve/CVE-2025-47151CVE-2025-47151CVE-2025-47151https://bugzilla.redhat.com/24127392412739https://errata.almalinux.org/9/ALSA-2025-21462.htmlALSA-2025:21462ALSA-2025:21462 /plasso-2.7.0-11.el9_7.3.x86_64.rpm/plasso-2.7.0-11.el9_7.3.i686.rpmlppython3-lasso-2.7.0-11.el9_7.3.x86_64.rpm/plasso-2.7.0-11.el9_7.3.x86_64.rpm/plasso-2.7.0-11.el9_7.3.i686.rpmlppython3-lasso-2.7.0-11.el9_7.3.x86_64.rpm ^ ={securityImportant: haproxy security updatea$https://access.redhat.com/errata/RHSA-2025:21693RHSA-2025:21693RHSA-2025:21693 https://access.redhat.com/security/cve/CVE-2025-11230CVE-2025-11230CVE-2025-11230https://bugzilla.redhat.com/24130032413003https://errata.almalinux.org/9/ALSA-2025-21693.htmlALSA-2025:21693ALSA-2025:21693 H$haproxy-2.8.14-1.el9_7.1.x86_64.rpmH$haproxy-2.8.14-1.el9_7.1.x86_64.rpmy_ ~BBBBBBBsecurityImportant: podman security updatehttps://access.redhat.com/errata/RHSA-2025:21702RHSA-2025:21702RHSA-2025:21702 https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-21702.htmlALSA-2025:21702ALSA-2025:21702 5Upodman-tests-5.6.0-7.el9_7.x86_64.rpmgUpodman-docker-5.6.0-7.el9_7.noarch.rpm4Upodman-remote-5.6.0-7.el9_7.x86_64.rpm2Upodman-5.6.0-7.el9_7.x86_64.rpm3Upodman-plugins-5.6.0-7.el9_7.x86_64.rpm5Upodman-tests-5.6.0-7.el9_7.x86_64.rpmgUpodman-docker-5.6.0-7.el9_7.noarch.rpm4Upodman-remote-5.6.0-7.el9_7.x86_64.rpm2Upodman-5.6.0-7.el9_7.x86_64.rpm3Upodman-plugins-5.6.0-7.el9_7.x86_64.rpm1` HBBBBBBBBBBBBsecurityModerate: delve and golang security updatePhttps://access.redhat.com/errata/RHSA-2025:21815RHSA-2025:21815RHSA-2025:21815 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-21815.htmlALSA-2025:21815ALSA-2025:21815 IXgolang-race-1.25.3-1.el9_7.x86_64.rpmXgolang-misc-1.25.3-1.el9_7.noarch.rpmXgolang-docs-1.25.3-1.el9_7.noarch.rpmXgolang-src-1.25.3-1.el9_7.noarch.rpm'(delve-1.25.2-1.el9_7.x86_64.rpm?Xgolang-1.25.3-1.el9_7.x86_64.rpmnXgo-toolset-1.25.3-1.el9_7.x86_64.rpmXgolang-tests-1.25.3-1.el9_7.noarch.rpm@Xgolang-bin-1.25.3-1.el9_7.x86_64.rpm IXgolang-race-1.25.3-1.el9_7.x86_64.rpmXgolang-misc-1.25.3-1.el9_7.noarch.rpmXgolang-docs-1.25.3-1.el9_7.noarch.rpmXgolang-src-1.25.3-1.el9_7.noarch.rpm'(delve-1.25.2-1.el9_7.x86_64.rpm?Xgolang-1.25.3-1.el9_7.x86_64.rpmnXgo-toolset-1.25.3-1.el9_7.x86_64.rpmXgolang-tests-1.25.3-1.el9_7.noarch.rpm@Xgolang-bin-1.25.3-1.el9_7.x86_64.rpm(a WBBsecurityImportant: valkey security updatei: https://access.redhat.com/errata/RHSA-2025:21916RHSA-2025:21916RHSA-2025:21916 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-21916.htmlALSA-2025:21916ALSA-2025:21916 )Yvalkey-8.0.6-2.el9_7.x86_64.rpm*Yvalkey-devel-8.0.6-2.el9_7.x86_64.rpm)Yvalkey-8.0.6-2.el9_7.x86_64.rpm*Yvalkey-devel-8.0.6-2.el9_7.x86_64.rpmɵ(b /\BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update#https://access.redhat.com/errata/RHSA-2025:21926RHSA-2025:21926RHSA-2025:21926 https://access.redhat.com/security/cve/CVE-2025-39843CVE-2025-39843CVE-2025-39843https://bugzilla.redhat.com/23969412396941https://errata.almalinux.org/9/ALSA-2025-21926.htmlALSA-2025:21926ALSA-2025:21926 Vfpython3-perf-5.14.0-611.9.1.el9_7.x86_64.rpm$fkernel-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm%fperf-5.14.0-611.9.1.el9_7.x86_64.rpmfkernel-doc-5.14.0-611.9.1.el9_7.noarch.rpm)frv-5.14.0-611.9.1.el9_7.x86_64.rpm"fkernel-debug-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm'frtla-5.14.0-611.9.1.el9_7.x86_64.rpm!fkernel-debug-devel-5.14.0-611.9.1.el9_7.x86_64.rpm&fkernel-headers-5.14.0-611.9.1.el9_7.x86_64.rpm#fkernel-devel-5.14.0-611.9.1.el9_7.x86_64.rpm Vfpython3-perf-5.14.0-611.9.1.el9_7.x86_64.rpm$fkernel-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm%fperf-5.14.0-611.9.1.el9_7.x86_64.rpmfkernel-doc-5.14.0-611.9.1.el9_7.noarch.rpm)frv-5.14.0-611.9.1.el9_7.x86_64.rpm"fkernel-debug-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm'frtla-5.14.0-611.9.1.el9_7.x86_64.rpm!fkernel-debug-devel-5.14.0-611.9.1.el9_7.x86_64.rpm&fkernel-headers-5.14.0-611.9.1.el9_7.x86_64.rpm#fkernel-devel-5.14.0-611.9.1.el9_7.x86_64.rpmɵBc 5pBBBsecurityImportant: gimp security update"\https://access.redhat.com/errata/RHSA-2025:21968RHSA-2025:21968RHSA-2025:21968 https://access.redhat.com/security/cve/CVE-2025-10920CVE-2025-10920CVE-2025-10920https://access.redhat.com/security/cve/CVE-2025-10921CVE-2025-10921CVE-2025-10921https://access.redhat.com/security/cve/CVE-2025-10922CVE-2025-10922CVE-2025-10922https://access.redhat.com/security/cve/CVE-2025-10923CVE-2025-10923CVE-2025-10923https://access.redhat.com/security/cve/CVE-2025-10924CVE-2025-10924CVE-2025-10924https://access.redhat.com/security/cve/CVE-2025-10925CVE-2025-10925CVE-2025-10925https://access.redhat.com/security/cve/CVE-2025-10934CVE-2025-10934CVE-2025-10934https://bugzilla.redhat.com/24071882407188https://bugzilla.redhat.com/24071912407191https://bugzilla.redhat.com/24071922407192https://bugzilla.redhat.com/24071942407194https://bugzilla.redhat.com/24071992407199https://bugzilla.redhat.com/24072002407200https://bugzilla.redhat.com/24072332407233https://errata.almalinux.org/9/ALSA-2025-21968.htmlALSA-2025:21968ALSA-2025:21968 9zgimp-3.0.4-1.el9_7.1.x86_64.rpmmzgimp-libs-3.0.4-1.el9_7.1.x86_64.rpmmzgimp-libs-3.0.4-1.el9_7.1.i686.rpm9zgimp-3.0.4-1.el9_7.1.x86_64.rpmmzgimp-libs-3.0.4-1.el9_7.1.x86_64.rpmmzgimp-libs-3.0.4-1.el9_7.1.i686.rpmɵd f&https://access.redhat.com/errata/RHSA-2025:22790RHSA-2025:22790RHSA-2025:22790 https://access.redhat.com/security/cve/CVE-2023-43000CVE-2023-43000CVE-2023-43000https://access.redhat.com/security/cve/CVE-2025-13502CVE-2025-13502CVE-2025-13502https://access.redhat.com/security/cve/CVE-2025-13947CVE-2025-13947CVE-2025-13947https://access.redhat.com/security/cve/CVE-2025-43392CVE-2025-43392CVE-2025-43392https://access.redhat.com/security/cve/CVE-2025-43419CVE-2025-43419CVE-2025-43419https://access.redhat.com/security/cve/CVE-2025-43421CVE-2025-43421CVE-2025-43421https://access.redhat.com/security/cve/CVE-2025-43425CVE-2025-43425CVE-2025-43425https://access.redhat.com/security/cve/CVE-2025-43427CVE-2025-43427CVE-2025-43427https://access.redhat.com/security/cve/CVE-2025-43429CVE-2025-43429CVE-2025-43429https://access.redhat.com/security/cve/CVE-2025-43430CVE-2025-43430CVE-2025-43430https://access.redhat.com/security/cve/CVE-2025-43431CVE-2025-43431CVE-2025-43431https://access.redhat.com/security/cve/CVE-2025-43432CVE-2025-43432CVE-2025-43432https://access.redhat.com/security/cve/CVE-2025-43434CVE-2025-43434CVE-2025-43434https://access.redhat.com/security/cve/CVE-2025-43440CVE-2025-43440CVE-2025-43440https://access.redhat.com/security/cve/CVE-2025-43443CVE-2025-43443CVE-2025-43443https://access.redhat.com/security/cve/CVE-2025-43458CVE-2025-43458CVE-2025-43458https://access.redhat.com/security/cve/CVE-2025-43480CVE-2025-43480CVE-2025-43480https://access.redhat.com/security/cve/CVE-2025-66287CVE-2025-66287CVE-2025-66287https://bugzilla.redhat.com/24163002416300https://bugzilla.redhat.com/24163242416324https://bugzilla.redhat.com/24163252416325https://bugzilla.redhat.com/24163262416326https://bugzilla.redhat.com/24163272416327https://bugzilla.redhat.com/24163292416329https://bugzilla.redhat.com/24163302416330https://bugzilla.redhat.com/24163312416331https://bugzilla.redhat.com/24163322416332https://bugzilla.redhat.com/24163342416334https://bugzilla.redhat.com/24163352416335https://bugzilla.redhat.com/24163362416336https://bugzilla.redhat.com/24163372416337https://bugzilla.redhat.com/24163382416338https://bugzilla.redhat.com/24163552416355https://bugzilla.redhat.com/24185762418576https://bugzilla.redhat.com/24188552418855https://bugzilla.redhat.com/24188572418857https://errata.almalinux.org/9/ALSA-2025-22790.htmlALSA-2025:22790ALSA-2025:22790 4vwebkit2gtk3-jsc-devel-2.50.3-1.el9_7.x86_64.rpm2vwebkit2gtk3-devel-2.50.3-1.el9_7.i686.rpm1vwebkit2gtk3-2.50.3-1.el9_7.x86_64.rpm3vwebkit2gtk3-jsc-2.50.3-1.el9_7.x86_64.rpm2vwebkit2gtk3-devel-2.50.3-1.el9_7.x86_64.rpm4vwebkit2gtk3-jsc-devel-2.50.3-1.el9_7.i686.rpm3vwebkit2gtk3-jsc-2.50.3-1.el9_7.i686.rpm1vwebkit2gtk3-2.50.3-1.el9_7.i686.rpm4vwebkit2gtk3-jsc-devel-2.50.3-1.el9_7.x86_64.rpm2vwebkit2gtk3-devel-2.50.3-1.el9_7.i686.rpm1vwebkit2gtk3-2.50.3-1.el9_7.x86_64.rpm3vwebkit2gtk3-jsc-2.50.3-1.el9_7.x86_64.rpm2vwebkit2gtk3-devel-2.50.3-1.el9_7.x86_64.rpm4vwebkit2gtk3-jsc-devel-2.50.3-1.el9_7.i686.rpm3vwebkit2gtk3-jsc-2.50.3-1.el9_7.i686.rpm1vwebkit2gtk3-2.50.3-1.el9_7.i686.rpm۴8k tBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update$Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865 https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865 ^kernel-doc-5.14.0-611.13.1.el9_7.noarch.rpm'^rtla-5.14.0-611.13.1.el9_7.x86_64.rpm"^kernel-debug-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm$^kernel-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm#^kernel-devel-5.14.0-611.13.1.el9_7.x86_64.rpm%^perf-5.14.0-611.13.1.el9_7.x86_64.rpm&^kernel-headers-5.14.0-611.13.1.el9_7.x86_64.rpmV^python3-perf-5.14.0-611.13.1.el9_7.x86_64.rpm)^rv-5.14.0-611.13.1.el9_7.x86_64.rpm!^kernel-debug-devel-5.14.0-611.13.1.el9_7.x86_64.rpm ^kernel-doc-5.14.0-611.13.1.el9_7.noarch.rpm'^rtla-5.14.0-611.13.1.el9_7.x86_64.rpm"^kernel-debug-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm$^kernel-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm#^kernel-devel-5.14.0-611.13.1.el9_7.x86_64.rpm%^perf-5.14.0-611.13.1.el9_7.x86_64.rpm&^kernel-headers-5.14.0-611.13.1.el9_7.x86_64.rpmV^python3-perf-5.14.0-611.13.1.el9_7.x86_64.rpm)^rv-5.14.0-611.13.1.el9_7.x86_64.rpm!^kernel-debug-devel-5.14.0-611.13.1.el9_7.x86_64.rpmʊ l HBBsecurityImportant: firefox security updatewohttps://access.redhat.com/errata/RHSA-2025:23034RHSA-2025:23034RHSA-2025:23034 https://access.redhat.com/security/cve/CVE-2025-14321CVE-2025-14321CVE-2025-14321https://access.redhat.com/security/cve/CVE-2025-14322CVE-2025-14322CVE-2025-14322https://access.redhat.com/security/cve/CVE-2025-14323CVE-2025-14323CVE-2025-14323https://access.redhat.com/security/cve/CVE-2025-14324CVE-2025-14324CVE-2025-14324https://access.redhat.com/security/cve/CVE-2025-14325CVE-2025-14325CVE-2025-14325https://access.redhat.com/security/cve/CVE-2025-14328CVE-2025-14328CVE-2025-14328https://access.redhat.com/security/cve/CVE-2025-14329CVE-2025-14329CVE-2025-14329https://access.redhat.com/security/cve/CVE-2025-14330CVE-2025-14330CVE-2025-14330https://access.redhat.com/security/cve/CVE-2025-14331CVE-2025-14331CVE-2025-14331https://access.redhat.com/security/cve/CVE-2025-14333CVE-2025-14333CVE-2025-14333https://bugzilla.redhat.com/24205022420502https://bugzilla.redhat.com/24205032420503https://bugzilla.redhat.com/24205042420504https://bugzilla.redhat.com/24205062420506https://bugzilla.redhat.com/24205082420508https://bugzilla.redhat.com/24205092420509https://bugzilla.redhat.com/24205122420512https://bugzilla.redhat.com/24205132420513https://bugzilla.redhat.com/24205162420516https://bugzilla.redhat.com/24205172420517https://errata.almalinux.org/9/ALSA-2025-23034.htmlALSA-2025:23034ALSA-2025:23034 Q}firefox-x11-140.6.0-1.el9_7.alma.1.x86_64.rpm8}firefox-140.6.0-1.el9_7.alma.1.x86_64.rpmQ}firefox-x11-140.6.0-1.el9_7.alma.1.x86_64.rpm8}firefox-140.6.0-1.el9_7.alma.1.x86_64.rpmm MBBBBBBsecurityImportant: tomcat security updatef https://access.redhat.com/errata/RHSA-2025:23049RHSA-2025:23049RHSA-2025:23049 https://access.redhat.com/security/cve/CVE-2025-31651CVE-2025-31651CVE-2025-31651https://access.redhat.com/security/cve/CVE-2025-55752CVE-2025-55752CVE-2025-55752https://bugzilla.redhat.com/23627822362782https://bugzilla.redhat.com/24065912406591https://errata.almalinux.org/9/ALSA-2025-23049.htmlALSA-2025:23049ALSA-2025:23049 Atomcat-webapps-9.0.87-6.el9_7.1.noarch.rpm:tomcat-9.0.87-6.el9_7.1.noarch.rpm>tomcat-jsp-2.3-api-9.0.87-6.el9_7.1.noarch.rpm?tomcat-lib-9.0.87-6.el9_7.1.noarch.rpm<tomcat-docs-webapp-9.0.87-6.el9_7.1.noarch.rpm=tomcat-el-3.0-api-9.0.87-6.el9_7.1.noarch.rpm;tomcat-admin-webapps-9.0.87-6.el9_7.1.noarch.rpm@tomcat-servlet-4.0-api-9.0.87-6.el9_7.1.noarch.rpmAtomcat-webapps-9.0.87-6.el9_7.1.noarch.rpm:tomcat-9.0.87-6.el9_7.1.noarch.rpm>tomcat-jsp-2.3-api-9.0.87-6.el9_7.1.noarch.rpm?tomcat-lib-9.0.87-6.el9_7.1.noarch.rpm<tomcat-docs-webapp-9.0.87-6.el9_7.1.noarch.rpm=tomcat-el-3.0-api-9.0.87-6.el9_7.1.noarch.rpm;tomcat-admin-webapps-9.0.87-6.el9_7.1.noarch.rpm@tomcat-servlet-4.0-api-9.0.87-6.el9_7.1.noarch.rpmʊn CBBRBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.3 security updateio`https://access.redhat.com/errata/RHSA-2025:23063RHSA-2025:23063RHSA-2025:23063 https://access.redhat.com/security/cve/CVE-2025-24294CVE-2025-24294CVE-2025-24294https://access.redhat.com/security/cve/CVE-2025-58767CVE-2025-58767CVE-2025-58767https://access.redhat.com/security/cve/CVE-2025-61594CVE-2025-61594CVE-2025-61594https://bugzilla.redhat.com/23796842379684https://bugzilla.redhat.com/23961862396186https://errata.almalinux.org/9/ALSA-2025-23063.htmlALSA-2025:23063ALSA-2025:23063  (&irubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.x86_64.rpmOruby-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm)Drubygem-typeprof-0.21.9-5.module_el9.7.0+193+58179166.noarch.rpm"Mrubygem-minitest-5.20.0-5.module_el9.7.0+193+58179166.noarch.rpmirubygem-mysql2-doc-0.5.5-3.module_el9.7.0+184+e2e36072.noarch.rpm\rubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.x86_64.rpmk`rubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.i686.rpm,;rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm$rubygem-rake-13.1.0-5.module_el9.7.0+193+58179166.noarch.rpmuOruby-libs-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm\rubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.i686.rpmrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.x86_64.rpmk`rubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.x86_64.rpm]Oruby-doc-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpmKrubygem-json-2.7.2-5.module_el9.7.0+193+58179166.x86_64.rpm*rubygem-mysql2-0.5.5-3.module_el9.7.0+184+e2e36072.x86_64.rpm%Xrubygem-rdoc-6.6.3.1-5.module_el9.7.0+193+58179166.noarch.rpm# rubygem-power_assert-2.0.3-5.module_el9.7.0+193+58179166.noarch.rpm+;rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpmOruby-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm*rubygems-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpmcOruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmKrubygem-json-2.7.2-5.module_el9.7.0+193+58179166.i686.rpm rubygem-bundler-2.5.22-5.module_el9.7.0+193+58179166.noarch.rpmq,rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.i686.rpmq,rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.x86_64.rpmirubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.i686.rpm![rubygem-irb-1.13.1-5.module_el9.7.0+193+58179166.noarch.rpm'Hrubygem-rss-0.3.1-5.module_el9.7.0+193+58179166.noarch.rpm+rubygems-devel-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpmcOruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmuOruby-libs-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.i686.rpmOruby-default-gems-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpm&:rubygem-rexml-3.4.4-5.module_el9.7.0+193+58179166.noarch.rpm(@rubygem-test-unit-3.6.1-5.module_el9.7.0+193+58179166.noarch.rpmtOruby-devel-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmtOruby-devel-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm (&irubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.x86_64.rpmOruby-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm)Drubygem-typeprof-0.21.9-5.module_el9.7.0+193+58179166.noarch.rpm"Mrubygem-minitest-5.20.0-5.module_el9.7.0+193+58179166.noarch.rpmirubygem-mysql2-doc-0.5.5-3.module_el9.7.0+184+e2e36072.noarch.rpm\rubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.x86_64.rpmk`rubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.i686.rpm,;rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm$rubygem-rake-13.1.0-5.module_el9.7.0+193+58179166.noarch.rpmuOruby-libs-3.3.10-5.module_el9.7.0+193+58179166.i686.rpm\rubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.i686.rpmrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.x86_64.rpmk`rubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.x86_64.rpm]Oruby-doc-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpmKrubygem-json-2.7.2-5.module_el9.7.0+193+58179166.x86_64.rpm*rubygem-mysql2-0.5.5-3.module_el9.7.0+184+e2e36072.x86_64.rpm%Xrubygem-rdoc-6.6.3.1-5.module_el9.7.0+193+58179166.noarch.rpm# rubygem-power_assert-2.0.3-5.module_el9.7.0+193+58179166.noarch.rpm+;rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpmOruby-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm*rubygems-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpmcOruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmKrubygem-json-2.7.2-5.module_el9.7.0+193+58179166.i686.rpm rubygem-bundler-2.5.22-5.module_el9.7.0+193+58179166.noarch.rpmq,rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.i686.rpmq,rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.x86_64.rpmirubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.i686.rpm![rubygem-irb-1.13.1-5.module_el9.7.0+193+58179166.noarch.rpm'Hrubygem-rss-0.3.1-5.module_el9.7.0+193+58179166.noarch.rpm+rubygems-devel-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpmcOruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmuOruby-libs-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.i686.rpmOruby-default-gems-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpm&:rubygem-rexml-3.4.4-5.module_el9.7.0+193+58179166.noarch.rpm(@rubygem-test-unit-3.6.1-5.module_el9.7.0+193+58179166.noarch.rpmtOruby-devel-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmtOruby-devel-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmYo FBBsecurityModerate: grafana security updateO"https://access.redhat.com/errata/RHSA-2025:23087RHSA-2025:23087RHSA-2025:23087 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23087.htmlALSA-2025:23087ALSA-2025:23087 oografana-10.2.6-17.el9_7.x86_64.rpmografana-selinux-10.2.6-17.el9_7.x86_64.rpmoografana-10.2.6-17.el9_7.x86_64.rpmografana-selinux-10.2.6-17.el9_7.x86_64.rpmʀp KBBBBBBBBsecurityModerate: mysql security updateq[https://access.redhat.com/errata/RHSA-2025:23109RHSA-2025:23109RHSA-2025:23109 https://access.redhat.com/security/cve/CVE-2025-53040CVE-2025-53040CVE-2025-53040https://access.redhat.com/security/cve/CVE-2025-53042CVE-2025-53042CVE-2025-53042https://access.redhat.com/security/cve/CVE-2025-53044CVE-2025-53044CVE-2025-53044https://access.redhat.com/security/cve/CVE-2025-53045CVE-2025-53045CVE-2025-53045https://access.redhat.com/security/cve/CVE-2025-53053CVE-2025-53053CVE-2025-53053https://access.redhat.com/security/cve/CVE-2025-53054CVE-2025-53054CVE-2025-53054https://access.redhat.com/security/cve/CVE-2025-53062CVE-2025-53062CVE-2025-53062https://access.redhat.com/security/cve/CVE-2025-53069CVE-2025-53069CVE-2025-53069https://bugzilla.redhat.com/24054862405486https://bugzilla.redhat.com/24054912405491https://bugzilla.redhat.com/24055112405511https://bugzilla.redhat.com/24055142405514https://bugzilla.redhat.com/24055232405523https://bugzilla.redhat.com/24055342405534https://bugzilla.redhat.com/24055412405541https://bugzilla.redhat.com/24055442405544https://errata.almalinux.org/9/ALSA-2025-23109.htmlALSA-2025:23109ALSA-2025:23109 K#mysql-libs-8.0.44-1.el9_7.x86_64.rpm.#mysql-errmsg-8.0.44-1.el9_7.x86_64.rpmG#mysql-server-8.0.44-1.el9_7.x86_64.rpm-#mysql-common-8.0.44-1.el9_7.x86_64.rpm#mysql-8.0.44-1.el9_7.x86_64.rpmK#mysql-libs-8.0.44-1.el9_7.x86_64.rpm.#mysql-errmsg-8.0.44-1.el9_7.x86_64.rpmG#mysql-server-8.0.44-1.el9_7.x86_64.rpm-#mysql-common-8.0.44-1.el9_7.x86_64.rpm#mysql-8.0.44-1.el9_7.x86_64.rpmEq #DBDBBBBBDBDCBBBBBBBBBBBsecurityModerate: mysql:8.4 security updateL[https://access.redhat.com/errata/RHSA-2025:23111RHSA-2025:23111RHSA-2025:23111 https://access.redhat.com/security/cve/CVE-2025-53040CVE-2025-53040CVE-2025-53040https://access.redhat.com/security/cve/CVE-2025-53042CVE-2025-53042CVE-2025-53042https://access.redhat.com/security/cve/CVE-2025-53044CVE-2025-53044CVE-2025-53044https://access.redhat.com/security/cve/CVE-2025-53045CVE-2025-53045CVE-2025-53045https://access.redhat.com/security/cve/CVE-2025-53053CVE-2025-53053CVE-2025-53053https://access.redhat.com/security/cve/CVE-2025-53054CVE-2025-53054CVE-2025-53054https://access.redhat.com/security/cve/CVE-2025-53062CVE-2025-53062CVE-2025-53062https://access.redhat.com/security/cve/CVE-2025-53069CVE-2025-53069CVE-2025-53069https://bugzilla.redhat.com/24054862405486https://bugzilla.redhat.com/24054912405491https://bugzilla.redhat.com/24055112405511https://bugzilla.redhat.com/24055142405514https://bugzilla.redhat.com/24055232405523https://bugzilla.redhat.com/24055342405534https://bugzilla.redhat.com/24055412405541https://bugzilla.redhat.com/24055442405544https://errata.almalinux.org/9/ALSA-2025-23111.htmlALSA-2025:23111ALSA-2025:23111  (GPmysql-server-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmtTrapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm^Pmysql-test-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm.Pmysql-errmsg-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpmYmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmV_mecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmXmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm]Pmysql-devel-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmKPmysql-libs-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmPmysql-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmW_mecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm-Pmysql-common-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpm_Pmysql-test-data-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpmTrapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm (GPmysql-server-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmtTrapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpm^Pmysql-test-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm.Pmysql-errmsg-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpmYmecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmV_mecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmXmecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm]Pmysql-devel-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmKPmysql-libs-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmPmysql-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmW_mecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm-Pmysql-common-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpm_Pmysql-test-data-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpmTrapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpmʊbr )dBBBsecurityImportant: wireshark security update'&https://access.redhat.com/errata/RHSA-2025:23142RHSA-2025:23142RHSA-2025:23142 https://access.redhat.com/security/cve/CVE-2025-13499CVE-2025-13499CVE-2025-13499https://bugzilla.redhat.com/24162932416293https://errata.almalinux.org/9/ALSA-2025-23142.htmlALSA-2025:23142ALSA-2025:23142 riwireshark-cli-3.4.10-8.el9_7.1.x86_64.rpmriwireshark-cli-3.4.10-8.el9_7.1.i686.rpmiwireshark-3.4.10-8.el9_7.1.x86_64.rpmriwireshark-cli-3.4.10-8.el9_7.1.x86_64.rpmriwireshark-cli-3.4.10-8.el9_7.1.i686.rpmiwireshark-3.4.10-8.el9_7.1.x86_64.rpm$s 7jBBBBBBBBBBBsecurityImportant: keylime security updateM-https://access.redhat.com/errata/RHSA-2025:23210RHSA-2025:23210RHSA-2025:23210 https://access.redhat.com/security/cve/CVE-2025-13609CVE-2025-13609CVE-2025-13609https://bugzilla.redhat.com/24167612416761https://errata.almalinux.org/9/ALSA-2025-23210.htmlALSA-2025:23210ALSA-2025:23210 Gpython3-keylime-7.12.1-11.el9_7.3.x86_64.rpm2keylime-7.12.1-11.el9_7.3.x86_64.rpm4keylime-registrar-7.12.1-11.el9_7.3.x86_64.rpm3keylime-base-7.12.1-11.el9_7.3.x86_64.rpm6keylime-verifier-7.12.1-11.el9_7.3.x86_64.rpm5keylime-tenant-7.12.1-11.el9_7.3.x86_64.rpmZkeylime-selinux-7.12.1-11.el9_7.3.noarch.rpmGpython3-keylime-7.12.1-11.el9_7.3.x86_64.rpm2keylime-7.12.1-11.el9_7.3.x86_64.rpm4keylime-registrar-7.12.1-11.el9_7.3.x86_64.rpm3keylime-base-7.12.1-11.el9_7.3.x86_64.rpm6keylime-verifier-7.12.1-11.el9_7.3.x86_64.rpm5keylime-tenant-7.12.1-11.el9_7.3.x86_64.rpmZkeylime-selinux-7.12.1-11.el9_7.3.noarch.rpmʊ!t xBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updatezMhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241 https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241 !_kernel-debug-devel-5.14.0-611.16.1.el9_7.x86_64.rpm'_rtla-5.14.0-611.16.1.el9_7.x86_64.rpm)_rv-5.14.0-611.16.1.el9_7.x86_64.rpm&_kernel-headers-5.14.0-611.16.1.el9_7.x86_64.rpm%_perf-5.14.0-611.16.1.el9_7.x86_64.rpmV_python3-perf-5.14.0-611.16.1.el9_7.x86_64.rpm$_kernel-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm_kernel-doc-5.14.0-611.16.1.el9_7.noarch.rpm"_kernel-debug-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm#_kernel-devel-5.14.0-611.16.1.el9_7.x86_64.rpm !_kernel-debug-devel-5.14.0-611.16.1.el9_7.x86_64.rpm'_rtla-5.14.0-611.16.1.el9_7.x86_64.rpm)_rv-5.14.0-611.16.1.el9_7.x86_64.rpm&_kernel-headers-5.14.0-611.16.1.el9_7.x86_64.rpm%_perf-5.14.0-611.16.1.el9_7.x86_64.rpmV_python3-perf-5.14.0-611.16.1.el9_7.x86_64.rpm$_kernel-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm_kernel-doc-5.14.0-611.16.1.el9_7.noarch.rpm"_kernel-debug-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm#_kernel-devel-5.14.0-611.16.1.el9_7.x86_64.rpmu >QBBBBBBBBBBBBpBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.3 security updateG+https://access.redhat.com/errata/RHSA-2025:23309RHSA-2025:23309RHSA-2025:23309 https://access.redhat.com/security/cve/CVE-2025-1220CVE-2025-1220CVE-2025-1220https://access.redhat.com/security/cve/CVE-2025-1735CVE-2025-1735CVE-2025-1735https://access.redhat.com/security/cve/CVE-2025-6491CVE-2025-6491CVE-2025-6491https://bugzilla.redhat.com/23786892378689https://bugzilla.redhat.com/23786902378690https://bugzilla.redhat.com/23797922379792https://errata.almalinux.org/9/ALSA-2025-23309.htmlALSA-2025:23309ALSA-2025:23309 ( cIphp-pdo-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmYIphp-ffi-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm`Iphp-mysqlnd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmhphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmhIphp-xml-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmRIphp-cli-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm/(apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmaIphp-odbc-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmWIphp-embedded-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm(php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmXIphp-enchant-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmZIphp-fpm-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm_Iphp-mbstring-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmphp-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmgIphp-soap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm]Iphp-intl-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmfIphp-snmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmIphp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm^Iphp-ldap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm\Iphp-gmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmdIphp-pgsql-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmQIphp-bcmath-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm[Iphp-gd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmbIphp-opcache-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmeIphp-process-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmVIphp-devel-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmBphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpmUIphp-dbg-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmSIphp-common-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm(php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmTIphp-dba-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmRphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm( cIphp-pdo-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmYIphp-ffi-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm`Iphp-mysqlnd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmhphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmhIphp-xml-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmRIphp-cli-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm/(apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmaIphp-odbc-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmWIphp-embedded-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm(php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmXIphp-enchant-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmZIphp-fpm-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm_Iphp-mbstring-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmphp-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmgIphp-soap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm]Iphp-intl-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmfIphp-snmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmIphp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm^Iphp-ldap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm\Iphp-gmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmdIphp-pgsql-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmQIphp-bcmath-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm[Iphp-gd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmbIphp-opcache-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmeIphp-process-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmVIphp-devel-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmBphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpmUIphp-dbg-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmSIphp-common-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm(php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmTIphp-dba-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmRphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpmʥIv BBBBBBBBsecurityModerate: python3.12 security updaterghttps://access.redhat.com/errata/RHSA-2025:23323RHSA-2025:23323RHSA-2025:23323 https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/24023422402342https://errata.almalinux.org/9/ALSA-2025-23323.htmlALSA-2025:23323ALSA-2025:23323 !Opython3.12-tkinter-3.12.12-1.el9_7.x86_64.rpmOpython3.12-libs-3.12.12-1.el9_7.i686.rpmOpython3.12-devel-3.12.12-1.el9_7.i686.rpmOpython3.12-libs-3.12.12-1.el9_7.x86_64.rpm Opython3.12-3.12.12-1.el9_7.x86_64.rpmOpython3.12-devel-3.12.12-1.el9_7.x86_64.rpm!Opython3.12-tkinter-3.12.12-1.el9_7.x86_64.rpmOpython3.12-libs-3.12.12-1.el9_7.i686.rpmOpython3.12-devel-3.12.12-1.el9_7.i686.rpmOpython3.12-libs-3.12.12-1.el9_7.x86_64.rpm Opython3.12-3.12.12-1.el9_7.x86_64.rpmOpython3.12-devel-3.12.12-1.el9_7.x86_64.rpmʥw JBBBBBBBsecurityModerate: podman security updateYshttps://access.redhat.com/errata/RHSA-2025:23325RHSA-2025:23325RHSA-2025:23325 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23325.htmlALSA-2025:23325ALSA-2025:23325 4Vpodman-remote-5.6.0-9.el9_7.x86_64.rpm2Vpodman-5.6.0-9.el9_7.x86_64.rpm3Vpodman-plugins-5.6.0-9.el9_7.x86_64.rpm5Vpodman-tests-5.6.0-9.el9_7.x86_64.rpmgVpodman-docker-5.6.0-9.el9_7.noarch.rpm4Vpodman-remote-5.6.0-9.el9_7.x86_64.rpm2Vpodman-5.6.0-9.el9_7.x86_64.rpm3Vpodman-plugins-5.6.0-9.el9_7.x86_64.rpm5Vpodman-tests-5.6.0-9.el9_7.x86_64.rpmgVpodman-docker-5.6.0-9.el9_7.noarch.rpmʥx TBBsecurityModerate: skopeo security updateLLhttps://access.redhat.com/errata/RHSA-2025:23326RHSA-2025:23326RHSA-2025:23326 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23326.htmlALSA-2025:23326ALSA-2025:23326 80skopeo-1.20.0-2.el9_7.x86_64.rpm90skopeo-tests-1.20.0-2.el9_7.x86_64.rpm80skopeo-1.20.0-2.el9_7.x86_64.rpm90skopeo-tests-1.20.0-2.el9_7.x86_64.rpmʥOy YBBBBBsecurityModerate: gcc-toolset-13-binutils security updateehttps://access.redhat.com/errata/RHSA-2025:23336RHSA-2025:23336RHSA-2025:23336 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23336.htmlALSA-2025:23336ALSA-2025:23336 COgcc-toolset-13-binutils-2.40-21.el9_7.1.x86_64.rpmOgcc-toolset-13-binutils-devel-2.40-21.el9_7.1.i686.rpmDOgcc-toolset-13-binutils-gold-2.40-21.el9_7.1.x86_64.rpmOgcc-toolset-13-binutils-devel-2.40-21.el9_7.1.x86_64.rpmCOgcc-toolset-13-binutils-2.40-21.el9_7.1.x86_64.rpmOgcc-toolset-13-binutils-devel-2.40-21.el9_7.1.i686.rpmDOgcc-toolset-13-binutils-gold-2.40-21.el9_7.1.x86_64.rpmOgcc-toolset-13-binutils-devel-2.40-21.el9_7.1.x86_64.rpmʥoz 'aBBBBsecurityModerate: python3.9 security update}x https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342 https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342 W)python3-devel-3.9.25-2.el9_7.x86_64.rpmj)python-unversioned-command-3.9.25-2.el9_7.noarch.rpmW)python3-devel-3.9.25-2.el9_7.i686.rpm=)python3-tkinter-3.9.25-2.el9_7.x86_64.rpmW)python3-devel-3.9.25-2.el9_7.x86_64.rpmj)python-unversioned-command-3.9.25-2.el9_7.noarch.rpmW)python3-devel-3.9.25-2.el9_7.i686.rpm=)python3-tkinter-3.9.25-2.el9_7.x86_64.rpmʥs{ +hBsecurityModerate: binutils security updateuhttps://access.redhat.com/errata/RHSA-2025:23343RHSA-2025:23343RHSA-2025:23343 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23343.htmlALSA-2025:23343ALSA-2025:23343 :binutils-devel-2.35.2-67.el9_7.1.i686.rpm:binutils-devel-2.35.2-67.el9_7.1.x86_64.rpm:binutils-devel-2.35.2-67.el9_7.1.i686.rpm:binutils-devel-2.35.2-67.el9_7.1.x86_64.rpmʥj| 0lBBsecurityModerate: openssh security updatewhttps://access.redhat.com/errata/RHSA-2025:23480RHSA-2025:23480RHSA-2025:23480 https://access.redhat.com/security/cve/CVE-2025-61984CVE-2025-61984CVE-2025-61984https://access.redhat.com/security/cve/CVE-2025-61985CVE-2025-61985CVE-2025-61985https://bugzilla.redhat.com/24019602401960https://bugzilla.redhat.com/24019622401962https://errata.almalinux.org/9/ALSA-2025-23480.htmlALSA-2025:23480ALSA-2025:23480 ( pam_ssh_agent_auth-0.10.4-5.47.el9_7.alma.1.x86_64.rpm'openssh-askpass-8.7p1-47.el9_7.alma.1.x86_64.rpm( pam_ssh_agent_auth-0.10.4-5.47.el9_7.alma.1.x86_64.rpm'openssh-askpass-8.7p1-47.el9_7.alma.1.x86_64.rpmʡ} 4qBsecurityModerate: libssh security update&https://access.redhat.com/errata/RHSA-2025:23483RHSA-2025:23483RHSA-2025:23483 https://access.redhat.com/security/cve/CVE-2025-5987CVE-2025-5987CVE-2025-5987https://bugzilla.redhat.com/23762192376219https://errata.almalinux.org/9/ALSA-2025-23483.htmlALSA-2025:23483ALSA-2025:23483 0 libssh-devel-0.10.4-17.el9_7.i686.rpm0 libssh-devel-0.10.4-17.el9_7.x86_64.rpm0 libssh-devel-0.10.4-17.el9_7.i686.rpm0 libssh-devel-0.10.4-17.el9_7.x86_64.rpmʡ ~ 9uBBsecurityImportant: firefox security update-nhttps://access.redhat.com/errata/RHSA-2025:2359RHSA-2025:2359RHSA-2025:2359 https://access.redhat.com/security/cve/CVE-2025-1930CVE-2025-1930CVE-2025-1930https://access.redhat.com/security/cve/CVE-2025-1931CVE-2025-1931CVE-2025-1931https://access.redhat.com/security/cve/CVE-2025-1932CVE-2025-1932CVE-2025-1932https://access.redhat.com/security/cve/CVE-2025-1933CVE-2025-1933CVE-2025-1933https://access.redhat.com/security/cve/CVE-2025-1934CVE-2025-1934CVE-2025-1934https://access.redhat.com/security/cve/CVE-2025-1935CVE-2025-1935CVE-2025-1935https://access.redhat.com/security/cve/CVE-2025-1936CVE-2025-1936CVE-2025-1936https://access.redhat.com/security/cve/CVE-2025-1937CVE-2025-1937CVE-2025-1937https://access.redhat.com/security/cve/CVE-2025-1938CVE-2025-1938CVE-2025-1938https://bugzilla.redhat.com/23497862349786https://bugzilla.redhat.com/23497872349787https://bugzilla.redhat.com/23497902349790https://bugzilla.redhat.com/23497922349792https://bugzilla.redhat.com/23497932349793https://bugzilla.redhat.com/23497942349794https://bugzilla.redhat.com/23497952349795https://bugzilla.redhat.com/23497962349796https://bugzilla.redhat.com/23497972349797https://errata.almalinux.org/9/ALSA-2025-2359.htmlALSA-2025:2359ALSA-2025:2359 Qfirefox-x11-128.8.0-1.el9_5.x86_64.rpm8firefox-128.8.0-1.el9_5.x86_64.rpmQfirefox-x11-128.8.0-1.el9_5.x86_64.rpm8firefox-128.8.0-1.el9_5.x86_64.rpm2 zBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateIhttps://access.redhat.com/errata/RHSA-2025:23700RHSA-2025:23700RHSA-2025:23700 https://access.redhat.com/security/cve/CVE-2025-43501CVE-2025-43501CVE-2025-43501https://access.redhat.com/security/cve/CVE-2025-43529CVE-2025-43529CVE-2025-43529https://access.redhat.com/security/cve/CVE-2025-43531CVE-2025-43531CVE-2025-43531https://access.redhat.com/security/cve/CVE-2025-43535CVE-2025-43535CVE-2025-43535https://access.redhat.com/security/cve/CVE-2025-43536CVE-2025-43536CVE-2025-43536https://access.redhat.com/security/cve/CVE-2025-43541CVE-2025-43541CVE-2025-43541https://bugzilla.redhat.com/24231662423166https://bugzilla.redhat.com/24231852423185https://bugzilla.redhat.com/24231872423187https://bugzilla.redhat.com/24231882423188https://bugzilla.redhat.com/24231902423190https://bugzilla.redhat.com/24231912423191https://errata.almalinux.org/9/ALSA-2025-23700.htmlALSA-2025:23700ALSA-2025:23700 3wwebkit2gtk3-jsc-2.50.4-1.el9_7.i686.rpm4wwebkit2gtk3-jsc-devel-2.50.4-1.el9_7.i686.rpm3wwebkit2gtk3-jsc-2.50.4-1.el9_7.x86_64.rpm1wwebkit2gtk3-2.50.4-1.el9_7.x86_64.rpm2wwebkit2gtk3-devel-2.50.4-1.el9_7.x86_64.rpm1wwebkit2gtk3-2.50.4-1.el9_7.i686.rpm2wwebkit2gtk3-devel-2.50.4-1.el9_7.i686.rpm4wwebkit2gtk3-jsc-devel-2.50.4-1.el9_7.x86_64.rpm3wwebkit2gtk3-jsc-2.50.4-1.el9_7.i686.rpm4wwebkit2gtk3-jsc-devel-2.50.4-1.el9_7.i686.rpm3wwebkit2gtk3-jsc-2.50.4-1.el9_7.x86_64.rpm1wwebkit2gtk3-2.50.4-1.el9_7.x86_64.rpm2wwebkit2gtk3-devel-2.50.4-1.el9_7.x86_64.rpm1wwebkit2gtk3-2.50.4-1.el9_7.i686.rpm2wwebkit2gtk3-devel-2.50.4-1.el9_7.i686.rpm4wwebkit2gtk3-jsc-devel-2.50.4-1.el9_7.x86_64.rpmʥ" GsecurityImportant: opentelemetry-collector security updated#https://access.redhat.com/errata/RHSA-2025:23729RHSA-2025:23729RHSA-2025:23729 https://access.redhat.com/security/cve/CVE-2025-68156CVE-2025-68156CVE-2025-68156https://bugzilla.redhat.com/24228912422891https://errata.almalinux.org/9/ALSA-2025-23729.htmlALSA-2025:23729ALSA-2025:23729 L opentelemetry-collector-0.135.0-2.el9_7.x86_64.rpmL opentelemetry-collector-0.135.0-2.el9_7.x86_64.rpmʪ! JsecurityImportant: mod_md security updateDhttps://access.redhat.com/errata/RHSA-2025:23739RHSA-2025:23739RHSA-2025:23739 https://access.redhat.com/security/cve/CVE-2025-55753CVE-2025-55753CVE-2025-55753https://bugzilla.redhat.com/24191402419140https://errata.almalinux.org/9/ALSA-2025-23739.htmlALSA-2025:23739ALSA-2025:23739 3{mod_md-2.4.26-1.el9_7.1.x86_64.rpm3{mod_md-2.4.26-1.el9_7.1.x86_64.rpmʥ~ MsecurityImportant: git-lfs security updateKkhttps://access.redhat.com/errata/RHSA-2025:23744RHSA-2025:23744RHSA-2025:23744 https://access.redhat.com/security/cve/CVE-2025-26625CVE-2025-26625CVE-2025-26625https://bugzilla.redhat.com/24047202404720https://errata.almalinux.org/9/ALSA-2025-23744.htmlALSA-2025:23744ALSA-2025:23744 ?Igit-lfs-3.6.1-4.el9_7.x86_64.rpm?Igit-lfs-3.6.1-4.el9_7.x86_64.rpmʤ0 PsecurityImportant: thunderbird security update6>https://access.redhat.com/errata/RHSA-2025:23856RHSA-2025:23856RHSA-2025:23856 https://access.redhat.com/security/cve/CVE-2025-14321CVE-2025-14321CVE-2025-14321https://access.redhat.com/security/cve/CVE-2025-14322CVE-2025-14322CVE-2025-14322https://access.redhat.com/security/cve/CVE-2025-14323CVE-2025-14323CVE-2025-14323https://access.redhat.com/security/cve/CVE-2025-14324CVE-2025-14324CVE-2025-14324https://access.redhat.com/security/cve/CVE-2025-14325CVE-2025-14325CVE-2025-14325https://access.redhat.com/security/cve/CVE-2025-14328CVE-2025-14328CVE-2025-14328https://access.redhat.com/security/cve/CVE-2025-14329CVE-2025-14329CVE-2025-14329https://access.redhat.com/security/cve/CVE-2025-14330CVE-2025-14330CVE-2025-14330https://access.redhat.com/security/cve/CVE-2025-14331CVE-2025-14331CVE-2025-14331https://access.redhat.com/security/cve/CVE-2025-14333CVE-2025-14333CVE-2025-14333https://bugzilla.redhat.com/24205022420502https://bugzilla.redhat.com/24205032420503https://bugzilla.redhat.com/24205042420504https://bugzilla.redhat.com/24205062420506https://bugzilla.redhat.com/24205082420508https://bugzilla.redhat.com/24205092420509https://bugzilla.redhat.com/24205122420512https://bugzilla.redhat.com/24205132420513https://bugzilla.redhat.com/24205162420516https://bugzilla.redhat.com/24205172420517https://errata.almalinux.org/9/ALSA-2025-23856.htmlALSA-2025:23856ALSA-2025:23856 :}thunderbird-140.6.0-1.el9_7.alma.1.x86_64.rpm:}thunderbird-140.6.0-1.el9_7.alma.1.x86_64.rpmʫ  'SBBBBBBBBBBBBBBBBBBsecurityImportant: httpd security updatet\https://access.redhat.com/errata/RHSA-2025:23919RHSA-2025:23919RHSA-2025:23919 https://access.redhat.com/security/cve/CVE-2025-58098CVE-2025-58098CVE-2025-58098https://access.redhat.com/security/cve/CVE-2025-65082CVE-2025-65082CVE-2025-65082https://access.redhat.com/security/cve/CVE-2025-66200CVE-2025-66200CVE-2025-66200https://bugzilla.redhat.com/24191392419139https://bugzilla.redhat.com/24192622419262https://bugzilla.redhat.com/24193652419365https://errata.almalinux.org/9/ALSA-2025-23919.htmlALSA-2025:23919ALSA-2025:23919 0Jhttpd-filesystem-2.4.62-7.el9_7.3.noarch.rpmmod_proxy_html-2.4.62-7.el9_7.3.x86_64.rpmjJhttpd-devel-2.4.62-7.el9_7.3.x86_64.rpmmod_ssl-2.4.62-7.el9_7.3.x86_64.rpmhJhttpd-2.4.62-7.el9_7.3.x86_64.rpmJmod_session-2.4.62-7.el9_7.3.x86_64.rpmiJhttpd-core-2.4.62-7.el9_7.3.x86_64.rpm~Jmod_ldap-2.4.62-7.el9_7.3.x86_64.rpm1Jhttpd-manual-2.4.62-7.el9_7.3.noarch.rpmkJhttpd-tools-2.4.62-7.el9_7.3.x86_64.rpmJmod_lua-2.4.62-7.el9_7.3.x86_64.rpm 0Jhttpd-filesystem-2.4.62-7.el9_7.3.noarch.rpmmod_proxy_html-2.4.62-7.el9_7.3.x86_64.rpmjJhttpd-devel-2.4.62-7.el9_7.3.x86_64.rpmmod_ssl-2.4.62-7.el9_7.3.x86_64.rpmhJhttpd-2.4.62-7.el9_7.3.x86_64.rpmJmod_session-2.4.62-7.el9_7.3.x86_64.rpmiJhttpd-core-2.4.62-7.el9_7.3.x86_64.rpm~Jmod_ldap-2.4.62-7.el9_7.3.x86_64.rpm1Jhttpd-manual-2.4.62-7.el9_7.3.noarch.rpmkJhttpd-tools-2.4.62-7.el9_7.3.x86_64.rpmJmod_lua-2.4.62-7.el9_7.3.x86_64.rpm+ 3hBBBBBBBBBsecurityImportant: tigervnc security updatePohttps://access.redhat.com/errata/RHSA-2025:2500RHSA-2025:2500RHSA-2025:2500 https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-2500.htmlALSA-2025:2500ALSA-2025:2500 #Wtigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm$Wtigervnc-license-1.14.1-1.el9_5.1.noarch.rpmKWtigervnc-1.14.1-1.el9_5.1.x86_64.rpmMWtigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm%Wtigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpmLWtigervnc-server-1.14.1-1.el9_5.1.x86_64.rpmNWtigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm#Wtigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm$Wtigervnc-license-1.14.1-1.el9_5.1.noarch.rpmKWtigervnc-1.14.1-1.el9_5.1.x86_64.rpmMWtigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm%Wtigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpmLWtigervnc-server-1.14.1-1.el9_5.1.x86_64.rpmNWtigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm tBBBBBBBBBBBBBBBsecurityImportant: kernel security update?9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627 https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627 ';rtla-5.14.0-503.31.1.el9_5.x86_64.rpm#;kernel-devel-5.14.0-503.31.1.el9_5.x86_64.rpm";kernel-debug-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-doc-5.14.0-503.31.1.el9_5.noarch.rpm%;perf-5.14.0-503.31.1.el9_5.x86_64.rpm!;kernel-debug-devel-5.14.0-503.31.1.el9_5.x86_64.rpm);rv-5.14.0-503.31.1.el9_5.x86_64.rpm$;kernel-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm&;kernel-headers-5.14.0-503.31.1.el9_5.x86_64.rpm ';rtla-5.14.0-503.31.1.el9_5.x86_64.rpm#;kernel-devel-5.14.0-503.31.1.el9_5.x86_64.rpm";kernel-debug-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm;kernel-doc-5.14.0-503.31.1.el9_5.noarch.rpm%;perf-5.14.0-503.31.1.el9_5.x86_64.rpm!;kernel-debug-devel-5.14.0-503.31.1.el9_5.x86_64.rpm);rv-5.14.0-503.31.1.el9_5.x86_64.rpm$;kernel-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm&;kernel-headers-5.14.0-503.31.1.el9_5.x86_64.rpmI "FBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security, bug fix, and enhancement updatex|https://access.redhat.com/errata/RHSA-2025:2668RHSA-2025:2668RHSA-2025:2668 https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2668.htmlALSA-2025:2668ALSA-2025:2668 %dotnet-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm#dotnet-apphost-pack-9.0-9.0.3-1.el9_5.x86_64.rpm"aspnetcore-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm)%dotnet-sdk-dbg-9.0-9.0.104-1.el9_5.x86_64.rpm!aspnetcore-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm(%dotnet-sdk-aot-9.0-9.0.104-1.el9_5.x86_64.rpm aspnetcore-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm&dotnet-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm%netstandard-targeting-pack-2.1-9.0.104-1.el9_5.x86_64.rpmdotnet-host-9.0.3-1.el9_5.x86_64.rpm'%dotnet-sdk-9.0-9.0.104-1.el9_5.x86_64.rpm+%dotnet-templates-9.0-9.0.104-1.el9_5.x86_64.rpm$dotnet-hostfxr-9.0-9.0.3-1.el9_5.x86_64.rpm*dotnet-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm%dotnet-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm#dotnet-apphost-pack-9.0-9.0.3-1.el9_5.x86_64.rpm"aspnetcore-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm)%dotnet-sdk-dbg-9.0-9.0.104-1.el9_5.x86_64.rpm!aspnetcore-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm(%dotnet-sdk-aot-9.0-9.0.104-1.el9_5.x86_64.rpm aspnetcore-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm&dotnet-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm%netstandard-targeting-pack-2.1-9.0.104-1.el9_5.x86_64.rpmdotnet-host-9.0.3-1.el9_5.x86_64.rpm'%dotnet-sdk-9.0-9.0.104-1.el9_5.x86_64.rpm+%dotnet-templates-9.0-9.0.104-1.el9_5.x86_64.rpm$dotnet-hostfxr-9.0-9.0.3-1.el9_5.x86_64.rpm*dotnet-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm] 9cBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security, bug fix, and enhancement updatet}https://access.redhat.com/errata/RHSA-2025:2669RHSA-2025:2669RHSA-2025:2669 https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2669.htmlALSA-2025:2669ALSA-2025:2669 +dotnet-sdk-dbg-8.0-8.0.114-1.el9_5.x86_64.rpmB}dotnet-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm:}aspnetcore-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm*}dotnet-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm)}aspnetcore-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm<}aspnetcore-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpmDdotnet-sdk-8.0-8.0.114-1.el9_5.x86_64.rpmHdotnet-templates-8.0-8.0.114-1.el9_5.x86_64.rpm@}dotnet-hostfxr-8.0-8.0.14-1.el9_5.x86_64.rpm>}dotnet-apphost-pack-8.0-8.0.14-1.el9_5.x86_64.rpmF}dotnet-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpm +dotnet-sdk-dbg-8.0-8.0.114-1.el9_5.x86_64.rpmB}dotnet-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm:}aspnetcore-runtime-8.0-8.0.14-1.el9_5.x86_64.rpm*}dotnet-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm)}aspnetcore-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpm<}aspnetcore-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpmDdotnet-sdk-8.0-8.0.114-1.el9_5.x86_64.rpmHdotnet-templates-8.0-8.0.114-1.el9_5.x86_64.rpm@}dotnet-hostfxr-8.0-8.0.14-1.el9_5.x86_64.rpm>}dotnet-apphost-pack-8.0-8.0.14-1.el9_5.x86_64.rpmF}dotnet-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpmR  =zBsecurityImportant: libxml2 security updateqPhttps://access.redhat.com/errata/RHSA-2025:2679RHSA-2025:2679RHSA-2025:2679 https://access.redhat.com/security/cve/CVE-2024-56171CVE-2024-56171CVE-2024-56171https://access.redhat.com/security/cve/CVE-2025-24928CVE-2025-24928CVE-2025-24928https://bugzilla.redhat.com/23464162346416https://bugzilla.redhat.com/23464212346421https://errata.almalinux.org/9/ALSA-2025-2679.htmlALSA-2025:2679ALSA-2025:2679 6Ulibxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm6Ulibxml2-devel-2.9.13-6.el9_5.2.i686.rpm6Ulibxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm6Ulibxml2-devel-2.9.13-6.el9_5.2.i686.rpmʏS  ~BBBBBBBBBBsecurityImportant: webkit2gtk3 security updateAqhttps://access.redhat.com/errata/RHSA-2025:2864RHSA-2025:2864RHSA-2025:2864 https://access.redhat.com/security/cve/CVE-2025-24201CVE-2025-24201CVE-2025-24201https://bugzilla.redhat.com/23518022351802https://errata.almalinux.org/9/ALSA-2025-2864.htmlALSA-2025:2864ALSA-2025:2864 3owebkit2gtk3-jsc-2.46.6-2.el9_5.i686.rpm3owebkit2gtk3-jsc-2.46.6-2.el9_5.x86_64.rpm4owebkit2gtk3-jsc-devel-2.46.6-2.el9_5.i686.rpm1owebkit2gtk3-2.46.6-2.el9_5.x86_64.rpm1owebkit2gtk3-2.46.6-2.el9_5.i686.rpm2owebkit2gtk3-devel-2.46.6-2.el9_5.i686.rpm4owebkit2gtk3-jsc-devel-2.46.6-2.el9_5.x86_64.rpm2owebkit2gtk3-devel-2.46.6-2.el9_5.x86_64.rpm3owebkit2gtk3-jsc-2.46.6-2.el9_5.i686.rpm3owebkit2gtk3-jsc-2.46.6-2.el9_5.x86_64.rpm4owebkit2gtk3-jsc-devel-2.46.6-2.el9_5.i686.rpm1owebkit2gtk3-2.46.6-2.el9_5.x86_64.rpm1owebkit2gtk3-2.46.6-2.el9_5.i686.rpm2owebkit2gtk3-devel-2.46.6-2.el9_5.i686.rpm4owebkit2gtk3-jsc-devel-2.46.6-2.el9_5.x86_64.rpm2owebkit2gtk3-devel-2.46.6-2.el9_5.x86_64.rpm   KsecurityImportant: thunderbird security update2Ehttps://access.redhat.com/errata/RHSA-2025:2899RHSA-2025:2899RHSA-2025:2899 https://access.redhat.com/security/cve/CVE-2025-1937CVE-2025-1937CVE-2025-1937https://access.redhat.com/security/cve/CVE-2025-1938CVE-2025-1938CVE-2025-1938https://bugzilla.redhat.com/23497932349793https://bugzilla.redhat.com/23497952349795https://errata.almalinux.org/9/ALSA-2025-2899.htmlALSA-2025:2899ALSA-2025:2899 :]thunderbird-128.8.0-2.el9_5.alma.1.x86_64.rpm:]thunderbird-128.8.0-2.el9_5.alma.1.x86_64.rpmv  NBBBBsecurityImportant: libxslt security updatewvhttps://access.redhat.com/errata/RHSA-2025:3107RHSA-2025:3107RHSA-2025:3107 https://access.redhat.com/security/cve/CVE-2025-24855CVE-2025-24855CVE-2025-24855https://bugzilla.redhat.com/23524832352483https://errata.almalinux.org/9/ALSA-2025-3107.htmlALSA-2025:3107ALSA-2025:3107 `wlibxslt-devel-1.1.34-9.el9_5.1.x86_64.rpm_wlibxslt-1.1.34-9.el9_5.1.i686.rpm`wlibxslt-devel-1.1.34-9.el9_5.1.i686.rpm_wlibxslt-1.1.34-9.el9_5.1.x86_64.rpm`wlibxslt-devel-1.1.34-9.el9_5.1.x86_64.rpm_wlibxslt-1.1.34-9.el9_5.1.i686.rpm`wlibxslt-devel-1.1.34-9.el9_5.1.i686.rpm_wlibxslt-1.1.34-9.el9_5.1.x86_64.rpm[  'UBBBBBBBBBBBBBBBBsecurityModerate: nginx:1.22 security updatem5https://access.redhat.com/errata/RHSA-2025:3261RHSA-2025:3261RHSA-2025:3261 https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://errata.almalinux.org/9/ALSA-2025-3261.htmlALSA-2025:3261ALSA-2025:3261 H&~( >knginx-mod-http-image-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm|knginx-mod-devel-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmHknginx-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmeknginx-filesystem-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpm?knginx-mod-http-perl-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmBknginx-mod-stream-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmAknginx-mod-mail-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmdknginx-all-modules-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpm@knginx-mod-http-xslt-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm=knginx-core-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmH&~( >knginx-mod-http-image-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm|knginx-mod-devel-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmHknginx-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmeknginx-filesystem-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpm?knginx-mod-http-perl-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmBknginx-mod-stream-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmAknginx-mod-mail-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmdknginx-all-modules-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpm@knginx-mod-http-xslt-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm=knginx-core-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm :hBBBBBBBBBBBBBBBBsecurityModerate: nginx:1.24 security update"5https://access.redhat.com/errata/RHSA-2025:3262RHSA-2025:3262RHSA-2025:3262 https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://errata.almalinux.org/9/ALSA-2025-3262.htmlALSA-2025:3262ALSA-2025:3262 H[( ?lnginx-mod-http-perl-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmelnginx-filesystem-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpmHlnginx-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm=lnginx-core-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm>lnginx-mod-http-image-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm@lnginx-mod-http-xslt-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm|lnginx-mod-devel-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmBlnginx-mod-stream-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmdlnginx-all-modules-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpmAlnginx-mod-mail-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmH[( ?lnginx-mod-http-perl-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmelnginx-filesystem-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpmHlnginx-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm=lnginx-core-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm>lnginx-mod-http-image-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm@lnginx-mod-http-xslt-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpm|lnginx-mod-devel-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmBlnginx-mod-stream-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmdlnginx-all-modules-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpmAlnginx-mod-mail-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmĈl ?{BBsecurityImportant: grafana security updateW,https://access.redhat.com/errata/RHSA-2025:3344RHSA-2025:3344RHSA-2025:3344 https://access.redhat.com/security/cve/CVE-2025-30204CVE-2025-30204CVE-2025-30204https://bugzilla.redhat.com/23541952354195https://errata.almalinux.org/9/ALSA-2025-3344.htmlALSA-2025:3344ALSA-2025:3344 osgrafana-10.2.6-9.el9_5.x86_64.rpmsgrafana-selinux-10.2.6-9.el9_5.x86_64.rpmosgrafana-10.2.6-9.el9_5.x86_64.rpmsgrafana-selinux-10.2.6-9.el9_5.x86_64.rpm% securityImportant: python-jinja2 security updateQhttps://access.redhat.com/errata/RHSA-2025:3406RHSA-2025:3406RHSA-2025:3406 https://access.redhat.com/security/cve/CVE-2025-27516CVE-2025-27516CVE-2025-27516https://bugzilla.redhat.com/23501902350190https://errata.almalinux.org/9/ALSA-2025-3406.htmlALSA-2025:3406ALSA-2025:3406 Fpython3-jinja2-2.11.3-8.el9_5.noarch.rpmFpython3-jinja2-2.11.3-8.el9_5.noarch.rpmL BBsecurityModerate: expat security updateTlhttps://access.redhat.com/errata/RHSA-2025:3531RHSA-2025:3531RHSA-2025:3531 https://access.redhat.com/security/cve/CVE-2024-8176CVE-2024-8176CVE-2024-8176https://bugzilla.redhat.com/23101372310137https://errata.almalinux.org/9/ALSA-2025-3531.htmlALSA-2025:3531ALSA-2025:3531 sBexpat-devel-2.5.0-3.el9_5.3.i686.rpmsBexpat-devel-2.5.0-3.el9_5.3.x86_64.rpmsBexpat-devel-2.5.0-3.el9_5.3.i686.rpmsBexpat-devel-2.5.0-3.el9_5.3.x86_64.rpmK FBBsecurityImportant: firefox security update@https://access.redhat.com/errata/RHSA-2025:3556RHSA-2025:3556RHSA-2025:3556 https://access.redhat.com/security/cve/CVE-2025-3028CVE-2025-3028CVE-2025-3028https://access.redhat.com/security/cve/CVE-2025-3029CVE-2025-3029CVE-2025-3029https://access.redhat.com/security/cve/CVE-2025-3030CVE-2025-3030CVE-2025-3030https://bugzilla.redhat.com/23565562356556https://bugzilla.redhat.com/23565622356562https://bugzilla.redhat.com/23565632356563https://errata.almalinux.org/9/ALSA-2025-3556.htmlALSA-2025:3556ALSA-2025:3556 Q firefox-x11-128.9.0-2.el9_5.x86_64.rpm8 firefox-128.9.0-2.el9_5.x86_64.rpmQ firefox-x11-128.9.0-2.el9_5.x86_64.rpm8 firefox-128.9.0-2.el9_5.x86_64.rpmV KBBBsecurityImportant: gimp security updateC, https://access.redhat.com/errata/RHSA-2025:3617RHSA-2025:3617RHSA-2025:3617 https://access.redhat.com/security/cve/CVE-2023-44441CVE-2023-44441CVE-2023-44441https://access.redhat.com/security/cve/CVE-2023-44442CVE-2023-44442CVE-2023-44442https://access.redhat.com/security/cve/CVE-2023-44443CVE-2023-44443CVE-2023-44443https://access.redhat.com/security/cve/CVE-2023-44444CVE-2023-44444CVE-2023-44444https://bugzilla.redhat.com/22499382249938https://bugzilla.redhat.com/22499422249942https://bugzilla.redhat.com/22499442249944https://bugzilla.redhat.com/22499462249946https://errata.almalinux.org/9/ALSA-2025-3617.htmlALSA-2025:3617ALSA-2025:3617 9xgimp-2.99.8-4.el9_5.x86_64.rpmmxgimp-libs-2.99.8-4.el9_5.i686.rpmmxgimp-libs-2.99.8-4.el9_5.x86_64.rpm9xgimp-2.99.8-4.el9_5.x86_64.rpmmxgimp-libs-2.99.8-4.el9_5.i686.rpmmxgimp-libs-2.99.8-4.el9_5.x86_64.rpmϷ QBBBBBBBBsecurityLow: python3.12 security update*oXhttps://access.redhat.com/errata/RHSA-2025:3631RHSA-2025:3631RHSA-2025:3631 https://access.redhat.com/security/cve/CVE-2024-7592CVE-2024-7592CVE-2024-7592https://errata.almalinux.org/9/ALSA-2025-3631.htmlALSA-2025:3631ALSA-2025:3631 Tpython3.12-devel-3.12.5-2.el9_5.3.x86_64.rpm Tpython3.12-3.12.5-2.el9_5.3.x86_64.rpmTpython3.12-devel-3.12.5-2.el9_5.3.i686.rpmTpython3.12-libs-3.12.5-2.el9_5.3.x86_64.rpm!Tpython3.12-tkinter-3.12.5-2.el9_5.3.x86_64.rpmTpython3.12-libs-3.12.5-2.el9_5.3.i686.rpmTpython3.12-devel-3.12.5-2.el9_5.3.x86_64.rpm Tpython3.12-3.12.5-2.el9_5.3.x86_64.rpmTpython3.12-devel-3.12.5-2.el9_5.3.i686.rpmTpython3.12-libs-3.12.5-2.el9_5.3.x86_64.rpm!Tpython3.12-tkinter-3.12.5-2.el9_5.3.x86_64.rpmTpython3.12-libs-3.12.5-2.el9_5.3.i686.rpm9 &\BBBBBBBBsecurityLow: python3.11 security update*GXhttps://access.redhat.com/errata/RHSA-2025:3634RHSA-2025:3634RHSA-2025:3634 https://access.redhat.com/security/cve/CVE-2024-7592CVE-2024-7592CVE-2024-7592https://errata.almalinux.org/9/ALSA-2025-3634.htmlALSA-2025:3634ALSA-2025:3634 aLpython3.11-libs-3.11.9-7.el9_5.3.i686.rpmjLpython3.11-tkinter-3.11.9-7.el9_5.3.x86_64.rpm`Lpython3.11-devel-3.11.9-7.el9_5.3.x86_64.rpmaLpython3.11-libs-3.11.9-7.el9_5.3.x86_64.rpm`Lpython3.11-devel-3.11.9-7.el9_5.3.i686.rpmiLpython3.11-3.11.9-7.el9_5.3.x86_64.rpmaLpython3.11-libs-3.11.9-7.el9_5.3.i686.rpmjLpython3.11-tkinter-3.11.9-7.el9_5.3.x86_64.rpm`Lpython3.11-devel-3.11.9-7.el9_5.3.x86_64.rpmaLpython3.11-libs-3.11.9-7.el9_5.3.x86_64.rpm`Lpython3.11-devel-3.11.9-7.el9_5.3.i686.rpmiLpython3.11-3.11.9-7.el9_5.3.x86_64.rpmC /gBBBBBBsecurityModerate: tomcat security update{https://access.redhat.com/errata/RHSA-2025:3645RHSA-2025:3645RHSA-2025:3645 https://access.redhat.com/security/cve/CVE-2024-50379CVE-2024-50379CVE-2024-50379https://access.redhat.com/security/cve/CVE-2025-24813CVE-2025-24813CVE-2025-24813https://bugzilla.redhat.com/23328172332817https://bugzilla.redhat.com/23511292351129https://errata.almalinux.org/9/ALSA-2025-3645.htmlALSA-2025:3645ALSA-2025:3645 @}tomcat-servlet-4.0-api-9.0.87-2.el9_5.1.noarch.rpm>}tomcat-jsp-2.3-api-9.0.87-2.el9_5.1.noarch.rpm;}tomcat-admin-webapps-9.0.87-2.el9_5.1.noarch.rpm=}tomcat-el-3.0-api-9.0.87-2.el9_5.1.noarch.rpm?}tomcat-lib-9.0.87-2.el9_5.1.noarch.rpm:}tomcat-9.0.87-2.el9_5.1.noarch.rpm<}tomcat-docs-webapp-9.0.87-2.el9_5.1.noarch.rpmA}tomcat-webapps-9.0.87-2.el9_5.1.noarch.rpm@}tomcat-servlet-4.0-api-9.0.87-2.el9_5.1.noarch.rpm>}tomcat-jsp-2.3-api-9.0.87-2.el9_5.1.noarch.rpm;}tomcat-admin-webapps-9.0.87-2.el9_5.1.noarch.rpm=}tomcat-el-3.0-api-9.0.87-2.el9_5.1.noarch.rpm?}tomcat-lib-9.0.87-2.el9_5.1.noarch.rpm:}tomcat-9.0.87-2.el9_5.1.noarch.rpm<}tomcat-docs-webapp-9.0.87-2.el9_5.1.noarch.rpmA}tomcat-webapps-9.0.87-2.el9_5.1.noarch.rpm   !_securityModerate: git-lfs security updateEhttps://access.redhat.com/errata/RHSA-2025:7256RHSA-2025:7256RHSA-2025:7256 https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22927872292787https://bugzilla.redhat.com/22953102295310https://bugzilla.redhat.com/23157192315719https://errata.almalinux.org/9/ALSA-2025-7256.htmlALSA-2025:7256ALSA-2025:7256 ?Ggit-lfs-3.6.1-1.el9.x86_64.rpm?Ggit-lfs-3.6.1-1.el9.x86_64.rpmÔ"? %bBsecurityModerate: openjpeg2 security update`Xhttps://access.redhat.com/errata/RHSA-2025:7309RHSA-2025:7309RHSA-2025:7309 https://access.redhat.com/security/cve/CVE-2024-56826CVE-2024-56826CVE-2024-56826https://access.redhat.com/security/cve/CVE-2024-56827CVE-2024-56827CVE-2024-56827https://bugzilla.redhat.com/23351722335172https://bugzilla.redhat.com/23351742335174https://errata.almalinux.org/9/ALSA-2025-7309.htmlALSA-2025:7309ALSA-2025:7309 7<openjpeg2-2.4.0-8.el9.x86_64.rpm7<openjpeg2-2.4.0-8.el9.i686.rpm7<openjpeg2-2.4.0-8.el9.x86_64.rpm7<openjpeg2-2.4.0-8.el9.i686.rpmÔ:@ (fsecurityModerate: keylime-agent-rust security update8Whttps://access.redhat.com/errata/RHSA-2025:7313RHSA-2025:7313RHSA-2025:7313 https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7313.htmlALSA-2025:7313ALSA-2025:7313 keylime-agent-rust-0.2.2-2.el9.x86_64.rpmkeylime-agent-rust-0.2.2-2.el9.x86_64.rpmÔ[A +isecurityModerate: python3.12-cryptography security updateYhttps://access.redhat.com/errata/RHSA-2025:7317RHSA-2025:7317RHSA-2025:7317 https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7317.htmlALSA-2025:7317ALSA-2025:7317 k]python3.12-cryptography-41.0.7-2.el9.x86_64.rpmk]python3.12-cryptography-41.0.7-2.el9.x86_64.rpmÔB 8lBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateh https://access.redhat.com/errata/RHSA-2025:7387RHSA-2025:7387RHSA-2025:7387 https://access.redhat.com/security/cve/CVE-2024-44192CVE-2024-44192CVE-2024-44192https://access.redhat.com/security/cve/CVE-2024-54467CVE-2024-54467CVE-2024-54467https://access.redhat.com/security/cve/CVE-2024-54551CVE-2024-54551CVE-2024-54551https://access.redhat.com/security/cve/CVE-2025-24208CVE-2025-24208CVE-2025-24208https://access.redhat.com/security/cve/CVE-2025-24209CVE-2025-24209CVE-2025-24209https://access.redhat.com/security/cve/CVE-2025-24216CVE-2025-24216CVE-2025-24216https://access.redhat.com/security/cve/CVE-2025-30427CVE-2025-30427CVE-2025-30427https://bugzilla.redhat.com/23538712353871https://bugzilla.redhat.com/23538722353872https://bugzilla.redhat.com/23579092357909https://bugzilla.redhat.com/23579102357910https://bugzilla.redhat.com/23579112357911https://bugzilla.redhat.com/23579172357917https://bugzilla.redhat.com/23579192357919https://errata.almalinux.org/9/ALSA-2025-7387.htmlALSA-2025:7387ALSA-2025:7387 1qwebkit2gtk3-2.48.1-1.el9_6.i686.rpm3qwebkit2gtk3-jsc-2.48.1-1.el9_6.x86_64.rpm4qwebkit2gtk3-jsc-devel-2.48.1-1.el9_6.i686.rpm3qwebkit2gtk3-jsc-2.48.1-1.el9_6.i686.rpm2qwebkit2gtk3-devel-2.48.1-1.el9_6.i686.rpm1qwebkit2gtk3-2.48.1-1.el9_6.x86_64.rpm4qwebkit2gtk3-jsc-devel-2.48.1-1.el9_6.x86_64.rpm2qwebkit2gtk3-devel-2.48.1-1.el9_6.x86_64.rpm1qwebkit2gtk3-2.48.1-1.el9_6.i686.rpm3qwebkit2gtk3-jsc-2.48.1-1.el9_6.x86_64.rpm4qwebkit2gtk3-jsc-devel-2.48.1-1.el9_6.i686.rpm3qwebkit2gtk3-jsc-2.48.1-1.el9_6.i686.rpm2qwebkit2gtk3-devel-2.48.1-1.el9_6.i686.rpm1qwebkit2gtk3-2.48.1-1.el9_6.x86_64.rpm4qwebkit2gtk3-jsc-devel-2.48.1-1.el9_6.x86_64.rpm2qwebkit2gtk3-devel-2.48.1-1.el9_6.x86_64.rpmdC =yBBsecurityModerate: buildah security updater~https://access.redhat.com/errata/RHSA-2025:7389RHSA-2025:7389RHSA-2025:7389 https://access.redhat.com/security/cve/CVE-2025-27144CVE-2025-27144CVE-2025-27144https://bugzilla.redhat.com/23474232347423https://errata.almalinux.org/9/ALSA-2025-7389.htmlALSA-2025:7389ALSA-2025:7389 8;buildah-1.39.4-1.el9_6.x86_64.rpm9;buildah-tests-1.39.4-1.el9_6.x86_64.rpm8;buildah-1.39.4-1.el9_6.x86_64.rpm9;buildah-tests-1.39.4-1.el9_6.x86_64.rpmD ~BBBBBsecurityModerate: 389-ds-base security updatepzhttps://access.redhat.com/errata/RHSA-2025:7395RHSA-2025:7395RHSA-2025:7395 https://access.redhat.com/security/cve/CVE-2025-2487CVE-2025-2487CVE-2025-2487https://bugzilla.redhat.com/23530712353071https://errata.almalinux.org/9/ALSA-2025-7395.htmlALSA-2025:7395ALSA-2025:7395 Q389-ds-base-libs-2.6.1-8.el9_6.x86_64.rpmpQpython3-lib389-2.6.1-8.el9_6.noarch.rpmQ389-ds-base-snmp-2.6.1-8.el9_6.x86_64.rpm Q389-ds-base-2.6.1-8.el9_6.x86_64.rpmQ389-ds-base-libs-2.6.1-8.el9_6.x86_64.rpmpQpython3-lib389-2.6.1-8.el9_6.noarch.rpmQ389-ds-base-snmp-2.6.1-8.el9_6.x86_64.rpm Q389-ds-base-2.6.1-8.el9_6.x86_64.rpm!E FBBsecurityModerate: skopeo security updatejAhttps://access.redhat.com/errata/RHSA-2025:7397RHSA-2025:7397RHSA-2025:7397 https://access.redhat.com/security/cve/CVE-2025-27144CVE-2025-27144CVE-2025-27144https://bugzilla.redhat.com/23474232347423https://errata.almalinux.org/9/ALSA-2025-7397.htmlALSA-2025:7397ALSA-2025:7397 9.skopeo-tests-1.18.1-1.el9_6.x86_64.rpm8.skopeo-1.18.1-1.el9_6.x86_64.rpm9.skopeo-tests-1.18.1-1.el9_6.x86_64.rpm8.skopeo-1.18.1-1.el9_6.x86_64.rpm\F KBBBBBBBBBBBBBBsecurityModerate: nginx security update+Ghttps://access.redhat.com/errata/RHSA-2025:7402RHSA-2025:7402RHSA-2025:7402 https://access.redhat.com/security/cve/CVE-2022-41741CVE-2022-41741CVE-2022-41741https://access.redhat.com/security/cve/CVE-2022-41742CVE-2022-41742CVE-2022-41742https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://bugzilla.redhat.com/21414952141495https://bugzilla.redhat.com/21414962141496https://errata.almalinux.org/9/ALSA-2025-7402.htmlALSA-2025:7402ALSA-2025:7402 ?Knginx-mod-http-perl-1.20.1-22.el9_6.2.alma.1.x86_64.rpmdKnginx-all-modules-1.20.1-22.el9_6.2.alma.1.noarch.rpmBKnginx-mod-stream-1.20.1-22.el9_6.2.alma.1.x86_64.rpmeKnginx-filesystem-1.20.1-22.el9_6.2.alma.1.noarch.rpm=Knginx-core-1.20.1-22.el9_6.2.alma.1.x86_64.rpmAKnginx-mod-mail-1.20.1-22.el9_6.2.alma.1.x86_64.rpm>Knginx-mod-http-image-filter-1.20.1-22.el9_6.2.alma.1.x86_64.rpm@Knginx-mod-http-xslt-filter-1.20.1-22.el9_6.2.alma.1.x86_64.rpmHKnginx-1.20.1-22.el9_6.2.alma.1.x86_64.rpm ?Knginx-mod-http-perl-1.20.1-22.el9_6.2.alma.1.x86_64.rpmdKnginx-all-modules-1.20.1-22.el9_6.2.alma.1.noarch.rpmBKnginx-mod-stream-1.20.1-22.el9_6.2.alma.1.x86_64.rpmeKnginx-filesystem-1.20.1-22.el9_6.2.alma.1.noarch.rpm=Knginx-core-1.20.1-22.el9_6.2.alma.1.x86_64.rpmAKnginx-mod-mail-1.20.1-22.el9_6.2.alma.1.x86_64.rpm>Knginx-mod-http-image-filter-1.20.1-22.el9_6.2.alma.1.x86_64.rpm@Knginx-mod-http-xslt-filter-1.20.1-22.el9_6.2.alma.1.x86_64.rpmHKnginx-1.20.1-22.el9_6.2.alma.1.x86_64.rpmdG \BBsecurityImportant: grafana security updater,https://access.redhat.com/errata/RHSA-2025:7404RHSA-2025:7404RHSA-2025:7404 https://access.redhat.com/security/cve/CVE-2025-30204CVE-2025-30204CVE-2025-30204https://bugzilla.redhat.com/23541952354195https://errata.almalinux.org/9/ALSA-2025-7404.htmlALSA-2025:7404ALSA-2025:7404 olgrafana-10.2.6-11.el9_6.x86_64.rpmlgrafana-selinux-10.2.6-11.el9_6.x86_64.rpmolgrafana-10.2.6-11.el9_6.x86_64.rpmlgrafana-selinux-10.2.6-11.el9_6.x86_64.rpm~H 5aBBBBBBBBBBBBBBBBBBsecurityModerate: git security update!https://access.redhat.com/errata/RHSA-2025:7409RHSA-2025:7409RHSA-2025:7409 https://access.redhat.com/security/cve/CVE-2024-52005CVE-2024-52005CVE-2024-52005https://bugzilla.redhat.com/23382892338289https://errata.almalinux.org/9/ALSA-2025-7409.htmlALSA-2025:7409ALSA-2025:7409 Jperl-Git-SVN-2.47.1-2.el9_6.noarch.rpmCgit-core-2.47.1-2.el9_6.x86_64.rpm=git-gui-2.47.1-2.el9_6.noarch.rpmFgit-subtree-2.47.1-2.el9_6.x86_64.rpmIperl-Git-2.47.1-2.el9_6.noarch.rpmEgit-daemon-2.47.1-2.el9_6.x86_64.rpm:git-all-2.47.1-2.el9_6.noarch.rpm;git-core-doc-2.47.1-2.el9_6.noarch.rpmBgitweb-2.47.1-2.el9_6.noarch.rpmAgitk-2.47.1-2.el9_6.noarch.rpmBgit-2.47.1-2.el9_6.x86_64.rpm<git-email-2.47.1-2.el9_6.noarch.rpm@git-svn-2.47.1-2.el9_6.noarch.rpm>git-instaweb-2.47.1-2.el9_6.noarch.rpmDgit-credential-libsecret-2.47.1-2.el9_6.x86_64.rpmJperl-Git-SVN-2.47.1-2.el9_6.noarch.rpmCgit-core-2.47.1-2.el9_6.x86_64.rpm=git-gui-2.47.1-2.el9_6.noarch.rpmFgit-subtree-2.47.1-2.el9_6.x86_64.rpmIperl-Git-2.47.1-2.el9_6.noarch.rpmEgit-daemon-2.47.1-2.el9_6.x86_64.rpm:git-all-2.47.1-2.el9_6.noarch.rpm;git-core-doc-2.47.1-2.el9_6.noarch.rpmBgitweb-2.47.1-2.el9_6.noarch.rpmAgitk-2.47.1-2.el9_6.noarch.rpmBgit-2.47.1-2.el9_6.x86_64.rpm<git-email-2.47.1-2.el9_6.noarch.rpm@git-svn-2.47.1-2.el9_6.noarch.rpm>git-instaweb-2.47.1-2.el9_6.noarch.rpmDgit-credential-libsecret-2.47.1-2.el9_6.x86_64.rpm>I redis-devel-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpmredis-doc-7.2.8-1.module_el9.6.0+168+b8d8e900.noarch.rpm"redis-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpm"(>redis-devel-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpmredis-doc-7.2.8-1.module_el9.6.0+168+b8d8e900.noarch.rpm"redis-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpmT |BBBsecurityImportant: yelp security updatewdhttps://access.redhat.com/errata/RHSA-2025:7430RHSA-2025:7430RHSA-2025:7430 https://access.redhat.com/security/cve/CVE-2025-3155CVE-2025-3155CVE-2025-3155https://bugzilla.redhat.com/23570912357091https://errata.almalinux.org/9/ALSA-2025-7430.htmlALSA-2025:7430ALSA-2025:7430 i}yelp-libs-40.3-2.el9_6.1.x86_64.rpmi}yelp-libs-40.3-2.el9_6.1.i686.rpm/}yelp-40.3-2.el9_6.1.x86_64.rpmi}yelp-libs-40.3-2.el9_6.1.x86_64.rpmi}yelp-libs-40.3-2.el9_6.1.i686.rpm/}yelp-40.3-2.el9_6.1.x86_64.rpm6U 4BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security update[ https://access.redhat.com/errata/RHSA-2025:7431RHSA-2025:7431RHSA-2025:7431 https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-7431.htmlALSA-2025:7431ALSA-2025:7431 T?php-dba-8.0.30-3.el9_6.x86_64.rpma?php-odbc-8.0.30-3.el9_6.x86_64.rpmc?php-pdo-8.0.30-3.el9_6.x86_64.rpm^?php-ldap-8.0.30-3.el9_6.x86_64.rpme?php-process-8.0.30-3.el9_6.x86_64.rpmb?php-opcache-8.0.30-3.el9_6.x86_64.rpmV?php-devel-8.0.30-3.el9_6.x86_64.rpmZ?php-fpm-8.0.30-3.el9_6.x86_64.rpmY?php-ffi-8.0.30-3.el9_6.x86_64.rpmQ?php-bcmath-8.0.30-3.el9_6.x86_64.rpmS?php-common-8.0.30-3.el9_6.x86_64.rpmg?php-soap-8.0.30-3.el9_6.x86_64.rpmX?php-enchant-8.0.30-3.el9_6.x86_64.rpmW?php-embedded-8.0.30-3.el9_6.x86_64.rpm?php-8.0.30-3.el9_6.x86_64.rpm\?php-gmp-8.0.30-3.el9_6.x86_64.rpm[?php-gd-8.0.30-3.el9_6.x86_64.rpmh?php-xml-8.0.30-3.el9_6.x86_64.rpmf?php-snmp-8.0.30-3.el9_6.x86_64.rpm_?php-mbstring-8.0.30-3.el9_6.x86_64.rpm]?php-intl-8.0.30-3.el9_6.x86_64.rpm`?php-mysqlnd-8.0.30-3.el9_6.x86_64.rpmR?php-cli-8.0.30-3.el9_6.x86_64.rpmd?php-pgsql-8.0.30-3.el9_6.x86_64.rpmU?php-dbg-8.0.30-3.el9_6.x86_64.rpmT?php-dba-8.0.30-3.el9_6.x86_64.rpma?php-odbc-8.0.30-3.el9_6.x86_64.rpmc?php-pdo-8.0.30-3.el9_6.x86_64.rpm^?php-ldap-8.0.30-3.el9_6.x86_64.rpme?php-process-8.0.30-3.el9_6.x86_64.rpmb?php-opcache-8.0.30-3.el9_6.x86_64.rpmV?php-devel-8.0.30-3.el9_6.x86_64.rpmZ?php-fpm-8.0.30-3.el9_6.x86_64.rpmY?php-ffi-8.0.30-3.el9_6.x86_64.rpmQ?php-bcmath-8.0.30-3.el9_6.x86_64.rpmS?php-common-8.0.30-3.el9_6.x86_64.rpmg?php-soap-8.0.30-3.el9_6.x86_64.rpmX?php-enchant-8.0.30-3.el9_6.x86_64.rpmW?php-embedded-8.0.30-3.el9_6.x86_64.rpm?php-8.0.30-3.el9_6.x86_64.rpm\?php-gmp-8.0.30-3.el9_6.x86_64.rpm[?php-gd-8.0.30-3.el9_6.x86_64.rpmh?php-xml-8.0.30-3.el9_6.x86_64.rpmf?php-snmp-8.0.30-3.el9_6.x86_64.rpm_?php-mbstring-8.0.30-3.el9_6.x86_64.rpm]?php-intl-8.0.30-3.el9_6.x86_64.rpm`?php-mysqlnd-8.0.30-3.el9_6.x86_64.rpmR?php-cli-8.0.30-3.el9_6.x86_64.rpmd?php-pgsql-8.0.30-3.el9_6.x86_64.rpmU?php-dbg-8.0.30-3.el9_6.x86_64.rpm V 'cBUBBBBBBBBvBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.2 security updateg3https://access.redhat.com/errata/RHSA-2025:7432RHSA-2025:7432RHSA-2025:7432 https://access.redhat.com/security/cve/CVE-2024-11233CVE-2024-11233CVE-2024-11233https://access.redhat.com/security/cve/CVE-2024-11234CVE-2024-11234CVE-2024-11234https://access.redhat.com/security/cve/CVE-2024-8929CVE-2024-8929CVE-2024-8929https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23279602327960https://bugzilla.redhat.com/23285212328521https://bugzilla.redhat.com/23285232328523https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-7432.htmlALSA-2025:7432ALSA-2025:7432 (aFphp-odbc-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmXFphp-enchant-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmWFphp-embedded-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmTFphp-dba-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmRFphp-cli-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmSFphp-common-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm`Fphp-mysqlnd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmUFphp-dbg-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm/'apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmYFphp-ffi-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmeFphp-process-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmdFphp-pgsql-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmhFphp-xml-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmFphp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm>php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmcFphp-pdo-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmZFphp-fpm-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm^Fphp-ldap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmgFphp-soap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmVFphp-devel-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm'php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmgphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpmAphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmbFphp-opcache-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm]Fphp-intl-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmQFphp-bcmath-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm_Fphp-mbstring-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm'php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmfFphp-snmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm\Fphp-gmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm[Fphp-gd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm(aFphp-odbc-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmXFphp-enchant-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmWFphp-embedded-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmTFphp-dba-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmRFphp-cli-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmSFphp-common-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm`Fphp-mysqlnd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmUFphp-dbg-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm/'apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmYFphp-ffi-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmeFphp-process-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmdFphp-pgsql-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmhFphp-xml-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmFphp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm>php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmcFphp-pdo-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmZFphp-fpm-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm^Fphp-ldap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmgFphp-soap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmVFphp-devel-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm'php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmgphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpmAphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmbFphp-opcache-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm]Fphp-intl-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmQFphp-bcmath-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm_Fphp-mbstring-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm'php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmfFphp-snmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm\Fphp-gmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm[Fphp-gd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmÔ:W 5PkBnBBBBBBBBBBBsecurityImportant: nodejs:22 security updatebhttps://access.redhat.com/errata/RHSA-2025:7433RHSA-2025:7433RHSA-2025:7433 https://access.redhat.com/security/cve/CVE-2025-31498CVE-2025-31498CVE-2025-31498https://access.redhat.com/security/cve/CVE-2025-3277CVE-2025-3277CVE-2025-3277https://bugzilla.redhat.com/23582712358271https://bugzilla.redhat.com/23595532359553https://errata.almalinux.org/9/ALSA-2025-7433.htmlALSA-2025:7433ALSA-2025:7433 9+( fynpm-10.9.2-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpmN7nodejs-docs-22.15.0-1.module_el9.6.0+164+2d89b8ed.noarch.rpm97nodejs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpmnodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpmnodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpmh7nodejs-full-i18n-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpmnodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm7nodejs-libs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpmPv8-12.4-devel-12.4.254.21-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpm<7nodejs-devel-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm9+( fynpm-10.9.2-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpmN7nodejs-docs-22.15.0-1.module_el9.6.0+164+2d89b8ed.noarch.rpm97nodejs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpmnodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpmnodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpmh7nodejs-full-i18n-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpmnodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpm7nodejs-libs-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpmPv8-12.4-devel-12.4.254.21-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpm<7nodejs-devel-22.15.0-1.module_el9.6.0+164+2d89b8ed.x86_64.rpm]X 8vsecurityImportant: thunderbird security update| https://access.redhat.com/errata/RHSA-2025:7435RHSA-2025:7435RHSA-2025:7435 https://access.redhat.com/security/cve/CVE-2025-2830CVE-2025-2830CVE-2025-2830https://access.redhat.com/security/cve/CVE-2025-3522CVE-2025-3522CVE-2025-3522https://access.redhat.com/security/cve/CVE-2025-3523CVE-2025-3523CVE-2025-3523https://bugzilla.redhat.com/23597862359786https://bugzilla.redhat.com/23597892359789https://bugzilla.redhat.com/23597932359793https://errata.almalinux.org/9/ALSA-2025-7435.htmlALSA-2025:7435ALSA-2025:7435 :tthunderbird-128.10.0-1.el9_6.alma.1.x86_64.rpm:tthunderbird-128.10.0-1.el9_6.alma.1.x86_64.rpmoY ?yBBBBsecurityImportant: libsoup security updateHhttps://access.redhat.com/errata/RHSA-2025:7436RHSA-2025:7436RHSA-2025:7436 https://access.redhat.com/security/cve/CVE-2025-32050CVE-2025-32050CVE-2025-32050https://access.redhat.com/security/cve/CVE-2025-32052CVE-2025-32052CVE-2025-32052https://access.redhat.com/security/cve/CVE-2025-32053CVE-2025-32053CVE-2025-32053https://access.redhat.com/security/cve/CVE-2025-32906CVE-2025-32906CVE-2025-32906https://access.redhat.com/security/cve/CVE-2025-32907CVE-2025-32907CVE-2025-32907https://access.redhat.com/security/cve/CVE-2025-32911CVE-2025-32911CVE-2025-32911https://access.redhat.com/security/cve/CVE-2025-32913CVE-2025-32913CVE-2025-32913https://access.redhat.com/security/cve/CVE-2025-46420CVE-2025-46420CVE-2025-46420https://access.redhat.com/security/cve/CVE-2025-46421CVE-2025-46421CVE-2025-46421https://bugzilla.redhat.com/23570672357067https://bugzilla.redhat.com/23570692357069https://bugzilla.redhat.com/23570702357070https://bugzilla.redhat.com/23593412359341https://bugzilla.redhat.com/23593422359342https://bugzilla.redhat.com/23593552359355https://bugzilla.redhat.com/23593572359357https://bugzilla.redhat.com/23619622361962https://bugzilla.redhat.com/23619632361963https://errata.almalinux.org/9/ALSA-2025-7436.htmlALSA-2025:7436ALSA-2025:7436  libsoup-devel-2.72.0-10.el9_6.1.i686.rpm libsoup-devel-2.72.0-10.el9_6.1.x86_64.rpm libsoup-2.72.0-10.el9_6.1.i686.rpm libsoup-2.72.0-10.el9_6.1.x86_64.rpm libsoup-devel-2.72.0-10.el9_6.1.i686.rpm libsoup-devel-2.72.0-10.el9_6.1.x86_64.rpm libsoup-2.72.0-10.el9_6.1.i686.rpm libsoup-2.72.0-10.el9_6.1.x86_64.rpmZ @BBBBBsecurityModerate: avahi security updated*https://access.redhat.com/errata/RHSA-2025:7437RHSA-2025:7437RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616CVE-2024-52616CVE-2024-52616https://bugzilla.redhat.com/23264292326429https://errata.almalinux.org/9/ALSA-2025-7437.htmlALSA-2025:7437ALSA-2025:7437 _3avahi-tools-0.8-22.el9_6.x86_64.rpmT3avahi-glib-0.8-22.el9_6.i686.rpm*3avahi-autoipd-0.8-22.el9_6.x86_64.rpmT3avahi-glib-0.8-22.el9_6.x86_64.rpm_3avahi-tools-0.8-22.el9_6.x86_64.rpmT3avahi-glib-0.8-22.el9_6.i686.rpm*3avahi-autoipd-0.8-22.el9_6.x86_64.rpmT3avahi-glib-0.8-22.el9_6.x86_64.rpmu[ HBBBBsecurityImportant: redis security update'https://access.redhat.com/errata/RHSA-2025:7438RHSA-2025:7438RHSA-2025:7438 https://access.redhat.com/security/cve/CVE-2025-21605CVE-2025-21605CVE-2025-21605https://bugzilla.redhat.com/23618832361883https://errata.almalinux.org/9/ALSA-2025-7438.htmlALSA-2025:7438ALSA-2025:7438 >8redis-devel-6.2.18-1.el9_6.i686.rpm8redis-doc-6.2.18-1.el9_6.noarch.rpm>8redis-devel-6.2.18-1.el9_6.x86_64.rpm"8redis-6.2.18-1.el9_6.x86_64.rpm>8redis-devel-6.2.18-1.el9_6.i686.rpm8redis-doc-6.2.18-1.el9_6.noarch.rpm>8redis-devel-6.2.18-1.el9_6.x86_64.rpm"8redis-6.2.18-1.el9_6.x86_64.rpmQ\ OBBBBsecurityLow: vim security update*5phttps://access.redhat.com/errata/RHSA-2025:7440RHSA-2025:7440RHSA-2025:7440 https://access.redhat.com/security/cve/CVE-2023-4752CVE-2023-4752CVE-2023-4752https://bugzilla.redhat.com/22373112237311https://errata.almalinux.org/9/ALSA-2025-7440.htmlALSA-2025:7440ALSA-2025:7440 1 vim-enhanced-8.2.2637-22.el9_6.x86_64.rpm0 vim-common-8.2.2637-22.el9_6.x86_64.rpm/ vim-X11-8.2.2637-22.el9_6.x86_64.rpm1 vim-enhanced-8.2.2637-22.el9_6.x86_64.rpm0 vim-common-8.2.2637-22.el9_6.x86_64.rpm/ vim-X11-8.2.2637-22.el9_6.x86_64.rpm]] VBsecurityModerate: expat security update%lhttps://access.redhat.com/errata/RHSA-2025:7444RHSA-2025:7444RHSA-2025:7444 https://access.redhat.com/security/cve/CVE-2024-8176CVE-2024-8176CVE-2024-8176https://bugzilla.redhat.com/23101372310137https://errata.almalinux.org/9/ALSA-2025-7444.htmlALSA-2025:7444ALSA-2025:7444 sCexpat-devel-2.5.0-5.el9_6.x86_64.rpmsCexpat-devel-2.5.0-5.el9_6.i686.rpmsCexpat-devel-2.5.0-5.el9_6.x86_64.rpmsCexpat-devel-2.5.0-5.el9_6.i686.rpmU^ (ZBBBBBBBBBBBBsecurityModerate: ghostscript security updatefhttps://access.redhat.com/errata/RHSA-2025:7586RHSA-2025:7586RHSA-2025:7586 https://access.redhat.com/security/cve/CVE-2025-27832CVE-2025-27832CVE-2025-27832https://bugzilla.redhat.com/23549492354949https://errata.almalinux.org/9/ALSA-2025-7586.htmlALSA-2025:7586ALSA-2025:7586 5)ghostscript-tools-dvipdf-9.54.0-19.el9_6.x86_64.rpm)ghostscript-doc-9.54.0-19.el9_6.noarch.rpm8)ghostscript-x11-9.54.0-19.el9_6.x86_64.rpm4)ghostscript-9.54.0-19.el9_6.x86_64.rpm=)libgs-9.54.0-19.el9_6.x86_64.rpm6)ghostscript-tools-fonts-9.54.0-19.el9_6.x86_64.rpm7)ghostscript-tools-printing-9.54.0-19.el9_6.x86_64.rpm=)libgs-9.54.0-19.el9_6.i686.rpm5)ghostscript-tools-dvipdf-9.54.0-19.el9_6.x86_64.rpm)ghostscript-doc-9.54.0-19.el9_6.noarch.rpm8)ghostscript-x11-9.54.0-19.el9_6.x86_64.rpm4)ghostscript-9.54.0-19.el9_6.x86_64.rpm=)libgs-9.54.0-19.el9_6.x86_64.rpm6)ghostscript-tools-fonts-9.54.0-19.el9_6.x86_64.rpm7)ghostscript-tools-printing-9.54.0-19.el9_6.x86_64.rpm=)libgs-9.54.0-19.el9_6.i686.rpmÔx_ ?iBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updatewGhttps://access.redhat.com/errata/RHSA-2025:7598RHSA-2025:7598RHSA-2025:7598 https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7598.htmlALSA-2025:7598ALSA-2025:7598 B~dotnet-runtime-8.0-8.0.16-1.el9_6.x86_64.rpmF~dotnet-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm*~dotnet-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm>~dotnet-apphost-pack-8.0-8.0.16-1.el9_6.x86_64.rpmHdotnet-templates-8.0-8.0.116-1.el9_6.x86_64.rpm+dotnet-sdk-dbg-8.0-8.0.116-1.el9_6.x86_64.rpm:~aspnetcore-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm)~aspnetcore-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpmDdotnet-sdk-8.0-8.0.116-1.el9_6.x86_64.rpm@~dotnet-hostfxr-8.0-8.0.16-1.el9_6.x86_64.rpm<~aspnetcore-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm B~dotnet-runtime-8.0-8.0.16-1.el9_6.x86_64.rpmF~dotnet-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpm*~dotnet-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpm>~dotnet-apphost-pack-8.0-8.0.16-1.el9_6.x86_64.rpmHdotnet-templates-8.0-8.0.116-1.el9_6.x86_64.rpm+dotnet-sdk-dbg-8.0-8.0.116-1.el9_6.x86_64.rpm:~aspnetcore-runtime-8.0-8.0.16-1.el9_6.x86_64.rpm)~aspnetcore-runtime-dbg-8.0-8.0.16-1.el9_6.x86_64.rpmDdotnet-sdk-8.0-8.0.116-1.el9_6.x86_64.rpm@~dotnet-hostfxr-8.0-8.0.16-1.el9_6.x86_64.rpm<~aspnetcore-targeting-pack-8.0-8.0.16-1.el9_6.x86_64.rpmM` @BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update>Fhttps://access.redhat.com/errata/RHSA-2025:7600RHSA-2025:7600RHSA-2025:7600 https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7600.htmlALSA-2025:7600ALSA-2025:7600 % dotnet-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm+&dotnet-templates-9.0-9.0.106-1.el9_6.x86_64.rpm# dotnet-apphost-pack-9.0-9.0.5-1.el9_6.x86_64.rpm(&dotnet-sdk-aot-9.0-9.0.106-1.el9_6.x86_64.rpm dotnet-host-9.0.5-1.el9_6.x86_64.rpm" aspnetcore-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm aspnetcore-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm& dotnet-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm* dotnet-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm! aspnetcore-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm)&dotnet-sdk-dbg-9.0-9.0.106-1.el9_6.x86_64.rpm'&dotnet-sdk-9.0-9.0.106-1.el9_6.x86_64.rpm$ dotnet-hostfxr-9.0-9.0.5-1.el9_6.x86_64.rpm&netstandard-targeting-pack-2.1-9.0.106-1.el9_6.x86_64.rpm% dotnet-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm+&dotnet-templates-9.0-9.0.106-1.el9_6.x86_64.rpm# dotnet-apphost-pack-9.0-9.0.5-1.el9_6.x86_64.rpm(&dotnet-sdk-aot-9.0-9.0.106-1.el9_6.x86_64.rpm dotnet-host-9.0.5-1.el9_6.x86_64.rpm" aspnetcore-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm aspnetcore-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm& dotnet-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm* dotnet-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm! aspnetcore-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm)&dotnet-sdk-dbg-9.0-9.0.106-1.el9_6.x86_64.rpm'&dotnet-sdk-9.0-9.0.106-1.el9_6.x86_64.rpm$ dotnet-hostfxr-9.0-9.0.5-1.el9_6.x86_64.rpm&netstandard-targeting-pack-2.1-9.0.106-1.el9_6.x86_64.rpmÔCa securityModerate: xdg-utils security updateMhttps://access.redhat.com/errata/RHSA-2025:7672RHSA-2025:7672RHSA-2025:7672 https://access.redhat.com/security/cve/CVE-2022-4055CVE-2022-4055CVE-2022-4055https://bugzilla.redhat.com/21437922143792https://errata.almalinux.org/9/ALSA-2025-7672.htmlALSA-2025:7672ALSA-2025:7672 ZUxdg-utils-1.1.3-13.el9_6.noarch.rpmZUxdg-utils-1.1.3-13.el9_6.noarch.rpmÔ@b #_BBsecurityImportant: grafana security updateQ8https://access.redhat.com/errata/RHSA-2025:7893RHSA-2025:7893RHSA-2025:7893 https://access.redhat.com/security/cve/CVE-2025-4123CVE-2025-4123CVE-2025-4123https://bugzilla.redhat.com/23646322364632https://errata.almalinux.org/9/ALSA-2025-7893.htmlALSA-2025:7893ALSA-2025:7893 mgrafana-selinux-10.2.6-13.el9_6.x86_64.rpmomgrafana-10.2.6-13.el9_6.x86_64.rpmmgrafana-selinux-10.2.6-13.el9_6.x86_64.rpmomgrafana-10.2.6-13.el9_6.x86_64.rpmFc 7dBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update 9https://access.redhat.com/errata/RHSA-2025:7903RHSA-2025:7903RHSA-2025:7903 https://access.redhat.com/security/cve/CVE-2025-21756CVE-2025-21756CVE-2025-21756https://access.redhat.com/security/cve/CVE-2025-21966CVE-2025-21966CVE-2025-21966https://access.redhat.com/security/cve/CVE-2025-37749CVE-2025-37749CVE-2025-37749https://bugzilla.redhat.com/23486092348609https://bugzilla.redhat.com/23566052356605https://bugzilla.redhat.com/23633322363332https://errata.almalinux.org/9/ALSA-2025-7903.htmlALSA-2025:7903ALSA-2025:7903 "Ckernel-debug-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm)Crv-5.14.0-570.17.1.el9_6.x86_64.rpm&Ckernel-headers-5.14.0-570.17.1.el9_6.x86_64.rpm!Ckernel-debug-devel-5.14.0-570.17.1.el9_6.x86_64.rpmVCpython3-perf-5.14.0-570.17.1.el9_6.x86_64.rpm'Crtla-5.14.0-570.17.1.el9_6.x86_64.rpm%Cperf-5.14.0-570.17.1.el9_6.x86_64.rpmCkernel-doc-5.14.0-570.17.1.el9_6.noarch.rpm$Ckernel-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm#Ckernel-devel-5.14.0-570.17.1.el9_6.x86_64.rpm "Ckernel-debug-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm)Crv-5.14.0-570.17.1.el9_6.x86_64.rpm&Ckernel-headers-5.14.0-570.17.1.el9_6.x86_64.rpm!Ckernel-debug-devel-5.14.0-570.17.1.el9_6.x86_64.rpmVCpython3-perf-5.14.0-570.17.1.el9_6.x86_64.rpm'Crtla-5.14.0-570.17.1.el9_6.x86_64.rpm%Cperf-5.14.0-570.17.1.el9_6.x86_64.rpmCkernel-doc-5.14.0-570.17.1.el9_6.noarch.rpm$Ckernel-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm#Ckernel-devel-5.14.0-570.17.1.el9_6.x86_64.rpm`d ;xBsecurityImportant: compat-openssl11 security updateBhttps://access.redhat.com/errata/RHSA-2025:7937RHSA-2025:7937RHSA-2025:7937 https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/21644402164440https://errata.almalinux.org/9/ALSA-2025-7937.htmlALSA-2025:7937ALSA-2025:7937  1compat-openssl11-1.1.1k-5.el9_6.1.i686.rpm 1compat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpm 1compat-openssl11-1.1.1k-5.el9_6.1.i686.rpm 1compat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpmYe |BBBBBBBBBBsecurityImportant: webkit2gtk3 security updateGvhttps://access.redhat.com/errata/RHSA-2025:7995RHSA-2025:7995RHSA-2025:7995 https://access.redhat.com/security/cve/CVE-2025-31205CVE-2025-31205CVE-2025-31205https://access.redhat.com/security/cve/CVE-2025-31257CVE-2025-31257CVE-2025-31257https://bugzilla.redhat.com/23665012366501https://bugzilla.redhat.com/23665042366504https://errata.almalinux.org/9/ALSA-2025-7995.htmlALSA-2025:7995ALSA-2025:7995 1rwebkit2gtk3-2.48.2-1.el9_6.i686.rpm4rwebkit2gtk3-jsc-devel-2.48.2-1.el9_6.i686.rpm3rwebkit2gtk3-jsc-2.48.2-1.el9_6.x86_64.rpm2rwebkit2gtk3-devel-2.48.2-1.el9_6.i686.rpm4rwebkit2gtk3-jsc-devel-2.48.2-1.el9_6.x86_64.rpm3rwebkit2gtk3-jsc-2.48.2-1.el9_6.i686.rpm2rwebkit2gtk3-devel-2.48.2-1.el9_6.x86_64.rpm1rwebkit2gtk3-2.48.2-1.el9_6.x86_64.rpm1rwebkit2gtk3-2.48.2-1.el9_6.i686.rpm4rwebkit2gtk3-jsc-devel-2.48.2-1.el9_6.i686.rpm3rwebkit2gtk3-jsc-2.48.2-1.el9_6.x86_64.rpm2rwebkit2gtk3-devel-2.48.2-1.el9_6.i686.rpm4rwebkit2gtk3-jsc-devel-2.48.2-1.el9_6.x86_64.rpm3rwebkit2gtk3-jsc-2.48.2-1.el9_6.i686.rpm2rwebkit2gtk3-devel-2.48.2-1.el9_6.x86_64.rpm1rwebkit2gtk3-2.48.2-1.el9_6.x86_64.rpmÔ^f IBBsecurityImportant: firefox security update=ghttps://access.redhat.com/errata/RHSA-2025:8049RHSA-2025:8049RHSA-2025:8049 https://access.redhat.com/security/cve/CVE-2025-4918CVE-2025-4918CVE-2025-4918https://access.redhat.com/security/cve/CVE-2025-4919CVE-2025-4919CVE-2025-4919https://bugzilla.redhat.com/23670162367016https://bugzilla.redhat.com/23670182367018https://errata.almalinux.org/9/ALSA-2025-8049.htmlALSA-2025:8049ALSA-2025:8049 Qfirefox-x11-128.10.1-1.el9_6.alma.1.x86_64.rpm8firefox-128.10.1-1.el9_6.alma.1.x86_64.rpmQfirefox-x11-128.10.1-1.el9_6.alma.1.x86_64.rpm8firefox-128.10.1-1.el9_6.alma.1.x86_64.rpmjg NBBBBsecurityImportant: libsoup security update$k https://access.redhat.com/errata/RHSA-2025:8126RHSA-2025:8126RHSA-2025:8126 https://access.redhat.com/security/cve/CVE-2025-2784CVE-2025-2784CVE-2025-2784https://access.redhat.com/security/cve/CVE-2025-32049CVE-2025-32049CVE-2025-32049https://access.redhat.com/security/cve/CVE-2025-32914CVE-2025-32914CVE-2025-32914https://access.redhat.com/security/cve/CVE-2025-4948CVE-2025-4948CVE-2025-4948https://bugzilla.redhat.com/23546692354669https://bugzilla.redhat.com/23570662357066https://bugzilla.redhat.com/23593582359358https://bugzilla.redhat.com/23671832367183https://errata.almalinux.org/9/ALSA-2025-8126.htmlALSA-2025:8126ALSA-2025:8126  libsoup-devel-2.72.0-10.el9_6.2.i686.rpm libsoup-devel-2.72.0-10.el9_6.2.x86_64.rpm libsoup-2.72.0-10.el9_6.2.x86_64.rpm libsoup-2.72.0-10.el9_6.2.i686.rpm libsoup-devel-2.72.0-10.el9_6.2.i686.rpm libsoup-devel-2.72.0-10.el9_6.2.x86_64.rpm libsoup-2.72.0-10.el9_6.2.x86_64.rpm libsoup-2.72.0-10.el9_6.2.i686.rpmҥ&h UsecurityImportant: python-tornado security update=https://access.redhat.com/errata/RHSA-2025:8136RHSA-2025:8136RHSA-2025:8136 https://access.redhat.com/security/cve/CVE-2025-47287CVE-2025-47287CVE-2025-47287https://bugzilla.redhat.com/23667032366703https://errata.almalinux.org/9/ALSA-2025-8136.htmlALSA-2025:8136ALSA-2025:8136 vpython3-tornado-6.4.2-2.el9_6.2.x86_64.rpmvpython3-tornado-6.4.2-2.el9_6.2.x86_64.rpm;i +XBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateL https://access.redhat.com/errata/RHSA-2025:8142RHSA-2025:8142RHSA-2025:8142 https://access.redhat.com/security/cve/CVE-2025-21964CVE-2025-21964CVE-2025-21964https://bugzilla.redhat.com/23566652356665https://errata.almalinux.org/9/ALSA-2025-8142.htmlALSA-2025:8142ALSA-2025:8142 VDpython3-perf-5.14.0-570.18.1.el9_6.x86_64.rpmDkernel-doc-5.14.0-570.18.1.el9_6.noarch.rpm'Drtla-5.14.0-570.18.1.el9_6.x86_64.rpm)Drv-5.14.0-570.18.1.el9_6.x86_64.rpm&Dkernel-headers-5.14.0-570.18.1.el9_6.x86_64.rpm$Dkernel-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm%Dperf-5.14.0-570.18.1.el9_6.x86_64.rpm"Dkernel-debug-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm!Dkernel-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm#Dkernel-devel-5.14.0-570.18.1.el9_6.x86_64.rpm VDpython3-perf-5.14.0-570.18.1.el9_6.x86_64.rpmDkernel-doc-5.14.0-570.18.1.el9_6.noarch.rpm'Drtla-5.14.0-570.18.1.el9_6.x86_64.rpm)Drv-5.14.0-570.18.1.el9_6.x86_64.rpm&Dkernel-headers-5.14.0-570.18.1.el9_6.x86_64.rpm$Dkernel-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm%Dperf-5.14.0-570.18.1.el9_6.x86_64.rpm"Dkernel-debug-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm!Dkernel-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm#Dkernel-devel-5.14.0-570.18.1.el9_6.x86_64.rpmܣsj 2lBBBBsecurityImportant: gstreamer1-plugins-bad-free security updateYhttps://access.redhat.com/errata/RHSA-2025:8183RHSA-2025:8183RHSA-2025:8183 https://access.redhat.com/security/cve/CVE-2025-3887CVE-2025-3887CVE-2025-3887https://bugzilla.redhat.com/23679192367919https://errata.almalinux.org/9/ALSA-2025-8183.htmlALSA-2025:8183ALSA-2025:8183 |gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.x86_64.rpmY|gstreamer1-plugins-bad-free-1.22.12-4.el9_6.x86_64.rpm|gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.i686.rpmY|gstreamer1-plugins-bad-free-1.22.12-4.el9_6.i686.rpm|gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.x86_64.rpmY|gstreamer1-plugins-bad-free-1.22.12-4.el9_6.x86_64.rpm|gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.i686.rpmY|gstreamer1-plugins-bad-free-1.22.12-4.el9_6.i686.rpmk 7sBBsecurityImportant: firefox security updategzhttps://access.redhat.com/errata/RHSA-2025:8293RHSA-2025:8293RHSA-2025:8293 https://access.redhat.com/security/cve/CVE-2025-5263CVE-2025-5263CVE-2025-5263https://access.redhat.com/security/cve/CVE-2025-5264CVE-2025-5264CVE-2025-5264https://access.redhat.com/security/cve/CVE-2025-5266CVE-2025-5266CVE-2025-5266https://access.redhat.com/security/cve/CVE-2025-5267CVE-2025-5267CVE-2025-5267https://access.redhat.com/security/cve/CVE-2025-5268CVE-2025-5268CVE-2025-5268https://access.redhat.com/security/cve/CVE-2025-5269CVE-2025-5269CVE-2025-5269https://bugzilla.redhat.com/23687502368750https://bugzilla.redhat.com/23687512368751https://bugzilla.redhat.com/23687522368752https://bugzilla.redhat.com/23687552368755https://bugzilla.redhat.com/23687562368756https://bugzilla.redhat.com/23687572368757https://errata.almalinux.org/9/ALSA-2025-8293.htmlALSA-2025:8293ALSA-2025:8293 Qufirefox-x11-128.11.0-1.el9_6.alma.1.x86_64.rpm8ufirefox-128.11.0-1.el9_6.alma.1.x86_64.rpmQufirefox-x11-128.11.0-1.el9_6.alma.1.x86_64.rpm8ufirefox-128.11.0-1.el9_6.alma.1.x86_64.rpm~l xBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateaWhttps://access.redhat.com/errata/RHSA-2025:8333RHSA-2025:8333RHSA-2025:8333 https://access.redhat.com/security/cve/CVE-2022-3424CVE-2022-3424CVE-2022-3424https://access.redhat.com/security/cve/CVE-2025-21764CVE-2025-21764CVE-2025-21764https://bugzilla.redhat.com/21326402132640https://bugzilla.redhat.com/23485752348575https://errata.almalinux.org/9/ALSA-2025-8333.htmlALSA-2025:8333ALSA-2025:8333 'Ertla-5.14.0-570.19.1.el9_6.x86_64.rpm"Ekernel-debug-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm%Eperf-5.14.0-570.19.1.el9_6.x86_64.rpm$Ekernel-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm!Ekernel-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm#Ekernel-devel-5.14.0-570.19.1.el9_6.x86_64.rpm&Ekernel-headers-5.14.0-570.19.1.el9_6.x86_64.rpm)Erv-5.14.0-570.19.1.el9_6.x86_64.rpmVEpython3-perf-5.14.0-570.19.1.el9_6.x86_64.rpmEkernel-doc-5.14.0-570.19.1.el9_6.noarch.rpm 'Ertla-5.14.0-570.19.1.el9_6.x86_64.rpm"Ekernel-debug-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm%Eperf-5.14.0-570.19.1.el9_6.x86_64.rpm$Ekernel-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm!Ekernel-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm#Ekernel-devel-5.14.0-570.19.1.el9_6.x86_64.rpm&Ekernel-headers-5.14.0-570.19.1.el9_6.x86_64.rpm)Erv-5.14.0-570.19.1.el9_6.x86_64.rpmVEpython3-perf-5.14.0-570.19.1.el9_6.x86_64.rpmEkernel-doc-5.14.0-570.19.1.el9_6.noarch.rpmÔXm LBBBsecurityImportant: varnish security update8Zhttps://access.redhat.com/errata/RHSA-2025:8337RHSA-2025:8337RHSA-2025:8337 https://access.redhat.com/security/cve/CVE-2025-47905CVE-2025-47905CVE-2025-47905https://bugzilla.redhat.com/23642352364235https://errata.almalinux.org/9/ALSA-2025-8337.htmlALSA-2025:8337ALSA-2025:8337 p varnish-6.6.2-6.el9_6.1.i686.rpmp varnish-6.6.2-6.el9_6.1.x86_64.rpm4 varnish-docs-6.6.2-6.el9_6.1.x86_64.rpmp varnish-6.6.2-6.el9_6.1.i686.rpmp varnish-6.6.2-6.el9_6.1.x86_64.rpm4 varnish-docs-6.6.2-6.el9_6.1.x86_64.rpm[n PkBXBBBBBBBBBBBsecurityImportant: nodejs:22 security update2https://access.redhat.com/errata/RHSA-2025:8467RHSA-2025:8467RHSA-2025:8467 https://access.redhat.com/security/cve/CVE-2025-23166CVE-2025-23166CVE-2025-23166https://bugzilla.redhat.com/23671632367163https://errata.almalinux.org/9/ALSA-2025-8467.htmlALSA-2025:8467ALSA-2025:8467 9+( 8nodejs-libs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm<8nodejs-devel-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpmN8nodejs-docs-22.16.0-1.module_el9.6.0+170+f035de78.noarch.rpmnodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpmnodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpmnodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpmfznpm-10.9.2-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpm98nodejs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpmQv8-12.4-devel-12.4.254.21-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpmh8nodejs-full-i18n-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm9+( 8nodejs-libs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm<8nodejs-devel-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpmN8nodejs-docs-22.16.0-1.module_el9.6.0+170+f035de78.noarch.rpmnodejs-nodemon-3.0.1-1.module_el9.5.0+139+09296491.noarch.rpmnodejs-packaging-2021.06-4.module_el9.5.0+139+09296491.noarch.rpmnodejs-packaging-bundler-2021.06-4.module_el9.5.0+139+09296491.noarch.rpmfznpm-10.9.2-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpm98nodejs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpmQv8-12.4-devel-12.4.254.21-1.22.16.0.1.module_el9.6.0+170+f035de78.x86_64.rpmh8nodejs-full-i18n-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm†+o )rBBmBBBBBBBsecurityImportant: nodejs:20 security updateD2https://access.redhat.com/errata/RHSA-2025:8468RHSA-2025:8468RHSA-2025:8468 https://access.redhat.com/security/cve/CVE-2025-23166CVE-2025-23166CVE-2025-23166https://bugzilla.redhat.com/23671632367163https://errata.almalinux.org/9/ALSA-2025-8468.htmlALSA-2025:8468ALSA-2025:8468 9(nodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpm?nodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpmfwnpm-10.8.2-1.20.19.2.1.module_el9.6.0+169+c9cb05c2.x86_64.rpmNNnodejs-docs-20.19.2-1.module_el9.6.0+169+c9cb05c2.noarch.rpm9Nnodejs-20.19.2-1.module_el9.6.0+169+c9cb05c2.x86_64.rpm?nodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpmdotnet-apphost-pack-8.0-8.0.17-1.el9_6.x86_64.rpm+dotnet-sdk-dbg-8.0-8.0.117-1.el9_6.x86_64.rpmBdotnet-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm <aspnetcore-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpm)aspnetcore-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm*dotnet-runtime-dbg-8.0-8.0.17-1.el9_6.x86_64.rpm@dotnet-hostfxr-8.0-8.0.17-1.el9_6.x86_64.rpmFdotnet-targeting-pack-8.0-8.0.17-1.el9_6.x86_64.rpmDdotnet-sdk-8.0-8.0.117-1.el9_6.x86_64.rpm:aspnetcore-runtime-8.0-8.0.17-1.el9_6.x86_64.rpmHdotnet-templates-8.0-8.0.117-1.el9_6.x86_64.rpm>dotnet-apphost-pack-8.0-8.0.17-1.el9_6.x86_64.rpm+dotnet-sdk-dbg-8.0-8.0.117-1.el9_6.x86_64.rpmBdotnet-runtime-8.0-8.0.17-1.el9_6.x86_64.rpm°tw xBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security updateF7https://access.redhat.com/errata/RHSA-2025:8817RHSA-2025:8817RHSA-2025:8817 https://access.redhat.com/security/cve/CVE-2025-30399CVE-2025-30399CVE-2025-30399https://bugzilla.redhat.com/23697012369701https://errata.almalinux.org/9/ALSA-2025-8817.htmlALSA-2025:8817ALSA-2025:8817 #!dotnet-apphost-pack-9.0-9.0.6-1.el9_6.x86_64.rpm !aspnetcore-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm)'dotnet-sdk-dbg-9.0-9.0.107-1.el9_6.x86_64.rpm+'dotnet-templates-9.0-9.0.107-1.el9_6.x86_64.rpm'netstandard-targeting-pack-2.1-9.0.107-1.el9_6.x86_64.rpm!dotnet-host-9.0.6-1.el9_6.x86_64.rpm$!dotnet-hostfxr-9.0-9.0.6-1.el9_6.x86_64.rpm&!dotnet-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm!!aspnetcore-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm"!aspnetcore-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm%!dotnet-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm''dotnet-sdk-9.0-9.0.107-1.el9_6.x86_64.rpm*!dotnet-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm('dotnet-sdk-aot-9.0-9.0.107-1.el9_6.x86_64.rpm#!dotnet-apphost-pack-9.0-9.0.6-1.el9_6.x86_64.rpm !aspnetcore-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm)'dotnet-sdk-dbg-9.0-9.0.107-1.el9_6.x86_64.rpm+'dotnet-templates-9.0-9.0.107-1.el9_6.x86_64.rpm'netstandard-targeting-pack-2.1-9.0.107-1.el9_6.x86_64.rpm!dotnet-host-9.0.6-1.el9_6.x86_64.rpm$!dotnet-hostfxr-9.0-9.0.6-1.el9_6.x86_64.rpm&!dotnet-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm!!aspnetcore-runtime-dbg-9.0-9.0.6-1.el9_6.x86_64.rpm"!aspnetcore-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm%!dotnet-runtime-9.0-9.0.6-1.el9_6.x86_64.rpm''dotnet-sdk-9.0-9.0.107-1.el9_6.x86_64.rpm*!dotnet-targeting-pack-9.0-9.0.6-1.el9_6.x86_64.rpm('dotnet-sdk-aot-9.0-9.0.107-1.el9_6.x86_64.rpmªEx UBBsecurityImportant: mod_security security update}https://access.redhat.com/errata/RHSA-2025:8837RHSA-2025:8837RHSA-2025:8837 https://access.redhat.com/security/cve/CVE-2025-47947CVE-2025-47947CVE-2025-47947https://bugzilla.redhat.com/23679032367903https://errata.almalinux.org/9/ALSA-2025-8837.htmlALSA-2025:8837ALSA-2025:8837 5#mod_security-mlogc-2.9.6-2.el9_6.x86_64.rpm4#mod_security-2.9.6-2.el9_6.x86_64.rpm5#mod_security-mlogc-2.9.6-2.el9_6.x86_64.rpm4#mod_security-2.9.6-2.el9_6.x86_64.rpmªy ZsecurityModerate: grafana-pcp security updatehttps://access.redhat.com/errata/RHSA-2025:8916RHSA-2025:8916RHSA-2025:8916 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-8916.htmlALSA-2025:8916ALSA-2025:8916 }jgrafana-pcp-5.1.1-11.el9_6.x86_64.rpm}jgrafana-pcp-5.1.1-11.el9_6.x86_64.rpmÔz 0]BBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateihttps://access.redhat.com/errata/RHSA-2025:9080RHSA-2025:9080RHSA-2025:9080 https://access.redhat.com/security/cve/CVE-2025-21961CVE-2025-21961CVE-2025-21961https://access.redhat.com/security/cve/CVE-2025-21963CVE-2025-21963CVE-2025-21963https://access.redhat.com/security/cve/CVE-2025-21969CVE-2025-21969CVE-2025-21969https://access.redhat.com/security/cve/CVE-2025-21979CVE-2025-21979CVE-2025-21979https://access.redhat.com/security/cve/CVE-2025-21999CVE-2025-21999CVE-2025-21999https://access.redhat.com/security/cve/CVE-2025-22126CVE-2025-22126CVE-2025-22126https://access.redhat.com/security/cve/CVE-2025-37750CVE-2025-37750CVE-2025-37750https://bugzilla.redhat.com/23565842356584https://bugzilla.redhat.com/23566332356633https://bugzilla.redhat.com/23566422356642https://bugzilla.redhat.com/23566522356652https://bugzilla.redhat.com/23571342357134https://bugzilla.redhat.com/23602362360236https://bugzilla.redhat.com/23633412363341https://errata.almalinux.org/9/ALSA-2025-9080.htmlALSA-2025:9080ALSA-2025:9080 "Gkernel-debug-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm#Gkernel-devel-5.14.0-570.22.1.el9_6.x86_64.rpm$Gkernel-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpmVGpython3-perf-5.14.0-570.22.1.el9_6.x86_64.rpm&Gkernel-headers-5.14.0-570.22.1.el9_6.x86_64.rpm)Grv-5.14.0-570.22.1.el9_6.x86_64.rpm%Gperf-5.14.0-570.22.1.el9_6.x86_64.rpm!Gkernel-debug-devel-5.14.0-570.22.1.el9_6.x86_64.rpm'Grtla-5.14.0-570.22.1.el9_6.x86_64.rpmGkernel-doc-5.14.0-570.22.1.el9_6.noarch.rpm "Gkernel-debug-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpm#Gkernel-devel-5.14.0-570.22.1.el9_6.x86_64.rpm$Gkernel-devel-matched-5.14.0-570.22.1.el9_6.x86_64.rpmVGpython3-perf-5.14.0-570.22.1.el9_6.x86_64.rpm&Gkernel-headers-5.14.0-570.22.1.el9_6.x86_64.rpm)Grv-5.14.0-570.22.1.el9_6.x86_64.rpm%Gperf-5.14.0-570.22.1.el9_6.x86_64.rpm!Gkernel-debug-devel-5.14.0-570.22.1.el9_6.x86_64.rpm'Grtla-5.14.0-570.22.1.el9_6.x86_64.rpmGkernel-doc-5.14.0-570.22.1.el9_6.noarch.rpmÔ&{ 3qsecurityModerate: git-lfs security update|https://access.redhat.com/errata/RHSA-2025:9106RHSA-2025:9106RHSA-2025:9106 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9106.htmlALSA-2025:9106ALSA-2025:9106 ?Hgit-lfs-3.6.1-2.el9_6.x86_64.rpm?Hgit-lfs-3.6.1-2.el9_6.x86_64.rpmÔ~| 7tBsecurityImportant: libvpx security update8https://access.redhat.com/errata/RHSA-2025:9118RHSA-2025:9118RHSA-2025:9118 https://access.redhat.com/security/cve/CVE-2025-5283CVE-2025-5283CVE-2025-5283https://bugzilla.redhat.com/23687492368749https://errata.almalinux.org/9/ALSA-2025-9118.htmlALSA-2025:9118ALSA-2025:9118 ]/libvpx-1.9.0-9.el9_6.x86_64.rpm]/libvpx-1.9.0-9.el9_6.i686.rpm]/libvpx-1.9.0-9.el9_6.x86_64.rpm]/libvpx-1.9.0-9.el9_6.i686.rpmÔ@} :xsecurityModerate: containernetworking-plugins security update7https://access.redhat.com/errata/RHSA-2025:9143RHSA-2025:9143RHSA-2025:9143 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9143.htmlALSA-2025:9143ALSA-2025:9143 ^mcontainernetworking-plugins-1.6.2-2.el9_6.x86_64.rpm^mcontainernetworking-plugins-1.6.2-2.el9_6.x86_64.rpmn~ {BBBBBBBsecurityModerate: podman security updateQhttps://access.redhat.com/errata/RHSA-2025:9144RHSA-2025:9144RHSA-2025:9144 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9144.htmlALSA-2025:9144ALSA-2025:9144 4Ppodman-remote-5.4.0-10.el9_6.x86_64.rpm2Ppodman-5.4.0-10.el9_6.x86_64.rpm3Ppodman-plugins-5.4.0-10.el9_6.x86_64.rpm5Ppodman-tests-5.4.0-10.el9_6.x86_64.rpmgPpodman-docker-5.4.0-10.el9_6.noarch.rpm4Ppodman-remote-5.4.0-10.el9_6.x86_64.rpm2Ppodman-5.4.0-10.el9_6.x86_64.rpm3Ppodman-plugins-5.4.0-10.el9_6.x86_64.rpm5Ppodman-tests-5.4.0-10.el9_6.x86_64.rpmgPpodman-docker-5.4.0-10.el9_6.noarch.rpm9 EBBsecurityModerate: skopeo security updateYahttps://access.redhat.com/errata/RHSA-2025:9145RHSA-2025:9145RHSA-2025:9145 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9145.htmlALSA-2025:9145ALSA-2025:9145 8/skopeo-1.18.1-2.el9_6.x86_64.rpm9/skopeo-tests-1.18.1-2.el9_6.x86_64.rpm8/skopeo-1.18.1-2.el9_6.x86_64.rpm9/skopeo-tests-1.18.1-2.el9_6.x86_64.rpmĿu JBBsecurityModerate: buildah security update:https://access.redhat.com/errata/RHSA-2025:9147RHSA-2025:9147RHSA-2025:9147 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9147.htmlALSA-2025:9147ALSA-2025:9147 9<buildah-tests-1.39.4-2.el9_6.x86_64.rpm8<buildah-1.39.4-2.el9_6.x86_64.rpm9<buildah-tests-1.39.4-2.el9_6.x86_64.rpm8<buildah-1.39.4-2.el9_6.x86_64.rpmľ^ OBBsecurityModerate: gvisor-tap-vsock security updateXhttps://access.redhat.com/errata/RHSA-2025:9150RHSA-2025:9150RHSA-2025:9150 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9150.htmlALSA-2025:9150ALSA-2025:9150 /Sgvisor-tap-vsock-0.8.5-2.el9_6.x86_64.rpmhSgvisor-tap-vsock-gvforwarder-0.8.5-2.el9_6.x86_64.rpm/Sgvisor-tap-vsock-0.8.5-2.el9_6.x86_64.rpmhSgvisor-tap-vsock-gvforwarder-0.8.5-2.el9_6.x86_64.rpmźu TBBBsecurityImportant: gimp security updatel.https://access.redhat.com/errata/RHSA-2025:9162RHSA-2025:9162RHSA-2025:9162 https://access.redhat.com/security/cve/CVE-2025-48797CVE-2025-48797CVE-2025-48797https://access.redhat.com/security/cve/CVE-2025-48798CVE-2025-48798CVE-2025-48798https://access.redhat.com/security/cve/CVE-2025-5473CVE-2025-5473CVE-2025-5473https://bugzilla.redhat.com/23685572368557https://bugzilla.redhat.com/23685582368558https://bugzilla.redhat.com/23708672370867https://errata.almalinux.org/9/ALSA-2025-9162.htmlALSA-2025:9162ALSA-2025:9162 9ygimp-2.99.8-4.el9_6.2.x86_64.rpmmygimp-libs-2.99.8-4.el9_6.2.x86_64.rpmmygimp-libs-2.99.8-4.el9_6.2.i686.rpm9ygimp-2.99.8-4.el9_6.2.x86_64.rpmmygimp-libs-2.99.8-4.el9_6.2.x86_64.rpmmygimp-libs-2.99.8-4.el9_6.2.i686.rpmÊh 2ZBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security updateghttps://access.redhat.com/errata/RHSA-2025:9184RHSA-2025:9184RHSA-2025:9184 https://access.redhat.com/security/cve/CVE-2025-4404CVE-2025-4404CVE-2025-4404https://bugzilla.redhat.com/23646062364606https://errata.almalinux.org/9/ALSA-2025-9184.htmlALSA-2025:9184ALSA-2025:9184 0{ipa-selinux-luna-4.12.2-14.el9_6.1.noarch.rpm{python3-ipaclient-4.12.2-14.el9_6.1.noarch.rpm{ipa-server-dns-4.12.2-14.el9_6.1.noarch.rpm{python3-ipaserver-4.12.2-14.el9_6.1.noarch.rpm{ipa-server-common-4.12.2-14.el9_6.1.noarch.rpm{ipa-common-4.12.2-14.el9_6.1.noarch.rpm{ipa-client-samba-4.12.2-14.el9_6.1.x86_64.rpm{ipa-client-common-4.12.2-14.el9_6.1.noarch.rpm{ipa-server-trust-ad-4.12.2-14.el9_6.1.x86_64.rpm{ipa-selinux-4.12.2-14.el9_6.1.noarch.rpmt{ipa-server-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm{python3-ipalib-4.12.2-14.el9_6.1.noarch.rpm1{ipa-selinux-nfast-4.12.2-14.el9_6.1.noarch.rpms{ipa-client-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm{ipa-client-epn-4.12.2-14.el9_6.1.x86_64.rpm~{ipa-client-4.12.2-14.el9_6.1.x86_64.rpm{ipa-server-4.12.2-14.el9_6.1.x86_64.rpm0{ipa-selinux-luna-4.12.2-14.el9_6.1.noarch.rpm{python3-ipaclient-4.12.2-14.el9_6.1.noarch.rpm{ipa-server-dns-4.12.2-14.el9_6.1.noarch.rpm{python3-ipaserver-4.12.2-14.el9_6.1.noarch.rpm{ipa-server-common-4.12.2-14.el9_6.1.noarch.rpm{ipa-common-4.12.2-14.el9_6.1.noarch.rpm{ipa-client-samba-4.12.2-14.el9_6.1.x86_64.rpm{ipa-client-common-4.12.2-14.el9_6.1.noarch.rpm{ipa-server-trust-ad-4.12.2-14.el9_6.1.x86_64.rpm{ipa-selinux-4.12.2-14.el9_6.1.noarch.rpmt{ipa-server-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm{python3-ipalib-4.12.2-14.el9_6.1.noarch.rpm1{ipa-selinux-nfast-4.12.2-14.el9_6.1.noarch.rpms{ipa-client-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpm{ipa-client-epn-4.12.2-14.el9_6.1.x86_64.rpm~{ipa-client-4.12.2-14.el9_6.1.x86_64.rpm{ipa-server-4.12.2-14.el9_6.1.x86_64.rpmÊ_ sBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302 https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302 "Hkernel-debug-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm&Hkernel-headers-5.14.0-570.23.1.el9_6.x86_64.rpm#Hkernel-devel-5.14.0-570.23.1.el9_6.x86_64.rpmVHpython3-perf-5.14.0-570.23.1.el9_6.x86_64.rpm)Hrv-5.14.0-570.23.1.el9_6.x86_64.rpm%Hperf-5.14.0-570.23.1.el9_6.x86_64.rpm$Hkernel-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpmHkernel-doc-5.14.0-570.23.1.el9_6.noarch.rpm!Hkernel-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm'Hrtla-5.14.0-570.23.1.el9_6.x86_64.rpm "Hkernel-debug-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm&Hkernel-headers-5.14.0-570.23.1.el9_6.x86_64.rpm#Hkernel-devel-5.14.0-570.23.1.el9_6.x86_64.rpmVHpython3-perf-5.14.0-570.23.1.el9_6.x86_64.rpm)Hrv-5.14.0-570.23.1.el9_6.x86_64.rpm%Hperf-5.14.0-570.23.1.el9_6.x86_64.rpm$Hkernel-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpmHkernel-doc-5.14.0-570.23.1.el9_6.noarch.rpm!Hkernel-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm'Hrtla-5.14.0-570.23.1.el9_6.x86_64.rpmÙD GBBBBBBBBBBBBsecurityImportant: xorg-x11-server and xorg-x11-server-Xwayland security updatez https://access.redhat.com/errata/RHSA-2025:9303RHSA-2025:9303RHSA-2025:9303 https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9303.htmlALSA-2025:9303ALSA-2025:9303 c0xorg-x11-server-Xwayland-23.2.7-4.el9_6.x86_64.rpm^lxorg-x11-server-Xdmx-1.20.11-31.el9_6.x86_64.rpmblxorg-x11-server-Xvfb-1.20.11-31.el9_6.x86_64.rpmdlxorg-x11-server-common-1.20.11-31.el9_6.x86_64.rpm_lxorg-x11-server-Xephyr-1.20.11-31.el9_6.x86_64.rpm`lxorg-x11-server-Xnest-1.20.11-31.el9_6.x86_64.rpmalxorg-x11-server-Xorg-1.20.11-31.el9_6.x86_64.rpmc0xorg-x11-server-Xwayland-23.2.7-4.el9_6.x86_64.rpm^lxorg-x11-server-Xdmx-1.20.11-31.el9_6.x86_64.rpmblxorg-x11-server-Xvfb-1.20.11-31.el9_6.x86_64.rpmdlxorg-x11-server-common-1.20.11-31.el9_6.x86_64.rpm_lxorg-x11-server-Xephyr-1.20.11-31.el9_6.x86_64.rpm`lxorg-x11-server-Xnest-1.20.11-31.el9_6.x86_64.rpmalxorg-x11-server-Xorg-1.20.11-31.el9_6.x86_64.rpmÊ !VBBBBBBBBBsecurityImportant: tigervnc security updateu https://access.redhat.com/errata/RHSA-2025:9306RHSA-2025:9306RHSA-2025:9306 https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9306.htmlALSA-2025:9306ALSA-2025:9306 %Xtigervnc-selinux-1.14.1-8.el9_6.noarch.rpm#Xtigervnc-icons-1.14.1-8.el9_6.noarch.rpmMXtigervnc-server-minimal-1.14.1-8.el9_6.x86_64.rpmNXtigervnc-server-module-1.14.1-8.el9_6.x86_64.rpmLXtigervnc-server-1.14.1-8.el9_6.x86_64.rpmKXtigervnc-1.14.1-8.el9_6.x86_64.rpm$Xtigervnc-license-1.14.1-8.el9_6.noarch.rpm%Xtigervnc-selinux-1.14.1-8.el9_6.noarch.rpm#Xtigervnc-icons-1.14.1-8.el9_6.noarch.rpmMXtigervnc-server-minimal-1.14.1-8.el9_6.x86_64.rpmNXtigervnc-server-module-1.14.1-8.el9_6.x86_64.rpmLXtigervnc-server-1.14.1-8.el9_6.x86_64.rpmKXtigervnc-1.14.1-8.el9_6.x86_64.rpm$Xtigervnc-license-1.14.1-8.el9_6.noarch.rpmÙ bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libblockdev security update (https://access.redhat.com/errata/RHSA-2025:9327RHSA-2025:9327RHSA-2025:9327 https://access.redhat.com/security/cve/CVE-2025-6019CVE-2025-6019CVE-2025-6019https://bugzilla.redhat.com/23700512370051https://errata.almalinux.org/9/ALSA-2025-9327.htmlALSA-2025:9327ALSA-2025:9327 !#+libblockdev-fs-2.28-14.el9_6.x86_64.rpm,+libblockdev-part-2.28-14.el9_6.i686.rpm$+libblockdev-kbd-2.28-14.el9_6.i686.rpmO+libblockdev-plugins-all-2.28-14.el9_6.x86_64.rpm%+libblockdev-loop-2.28-14.el9_6.i686.rpm%+libblockdev-loop-2.28-14.el9_6.x86_64.rpm +libblockdev-2.28-14.el9_6.i686.rpm++libblockdev-nvme-2.28-14.el9_6.i686.rpm-+libblockdev-swap-2.28-14.el9_6.i686.rpm++libblockdev-nvme-2.28-14.el9_6.x86_64.rpmc+python3-blockdev-2.28-14.el9_6.x86_64.rpm.+libblockdev-utils-2.28-14.el9_6.i686.rpm-+libblockdev-swap-2.28-14.el9_6.x86_64.rpm.+libblockdev-utils-2.28-14.el9_6.x86_64.rpm"+libblockdev-dm-2.28-14.el9_6.i686.rpm)+libblockdev-mpath-2.28-14.el9_6.x86_64.rpm#+libblockdev-fs-2.28-14.el9_6.i686.rpm!+libblockdev-crypto-2.28-14.el9_6.i686.rpm)+libblockdev-mpath-2.28-14.el9_6.i686.rpm&+libblockdev-lvm-2.28-14.el9_6.i686.rpm&+libblockdev-lvm-2.28-14.el9_6.x86_64.rpm$+libblockdev-kbd-2.28-14.el9_6.x86_64.rpm"+libblockdev-dm-2.28-14.el9_6.x86_64.rpm,+libblockdev-part-2.28-14.el9_6.x86_64.rpm +libblockdev-2.28-14.el9_6.x86_64.rpm!+libblockdev-crypto-2.28-14.el9_6.x86_64.rpm*+libblockdev-nvdimm-2.28-14.el9_6.i686.rpm'+libblockdev-lvm-dbus-2.28-14.el9_6.x86_64.rpmP+libblockdev-tools-2.28-14.el9_6.x86_64.rpm*+libblockdev-nvdimm-2.28-14.el9_6.x86_64.rpm(+libblockdev-mdraid-2.28-14.el9_6.i686.rpm(+libblockdev-mdraid-2.28-14.el9_6.x86_64.rpm'+libblockdev-lvm-dbus-2.28-14.el9_6.i686.rpm!#+libblockdev-fs-2.28-14.el9_6.x86_64.rpm,+libblockdev-part-2.28-14.el9_6.i686.rpm$+libblockdev-kbd-2.28-14.el9_6.i686.rpmO+libblockdev-plugins-all-2.28-14.el9_6.x86_64.rpm%+libblockdev-loop-2.28-14.el9_6.i686.rpm%+libblockdev-loop-2.28-14.el9_6.x86_64.rpm +libblockdev-2.28-14.el9_6.i686.rpm++libblockdev-nvme-2.28-14.el9_6.i686.rpm-+libblockdev-swap-2.28-14.el9_6.i686.rpm++libblockdev-nvme-2.28-14.el9_6.x86_64.rpmc+python3-blockdev-2.28-14.el9_6.x86_64.rpm.+libblockdev-utils-2.28-14.el9_6.i686.rpm-+libblockdev-swap-2.28-14.el9_6.x86_64.rpm.+libblockdev-utils-2.28-14.el9_6.x86_64.rpm"+libblockdev-dm-2.28-14.el9_6.i686.rpm)+libblockdev-mpath-2.28-14.el9_6.x86_64.rpm#+libblockdev-fs-2.28-14.el9_6.i686.rpm!+libblockdev-crypto-2.28-14.el9_6.i686.rpm)+libblockdev-mpath-2.28-14.el9_6.i686.rpm&+libblockdev-lvm-2.28-14.el9_6.i686.rpm&+libblockdev-lvm-2.28-14.el9_6.x86_64.rpm$+libblockdev-kbd-2.28-14.el9_6.x86_64.rpm"+libblockdev-dm-2.28-14.el9_6.x86_64.rpm,+libblockdev-part-2.28-14.el9_6.x86_64.rpm +libblockdev-2.28-14.el9_6.x86_64.rpm!+libblockdev-crypto-2.28-14.el9_6.x86_64.rpm*+libblockdev-nvdimm-2.28-14.el9_6.i686.rpm'+libblockdev-lvm-dbus-2.28-14.el9_6.x86_64.rpmP+libblockdev-tools-2.28-14.el9_6.x86_64.rpm*+libblockdev-nvdimm-2.28-14.el9_6.x86_64.rpm(+libblockdev-mdraid-2.28-14.el9_6.i686.rpm(+libblockdev-mdraid-2.28-14.el9_6.x86_64.rpm'+libblockdev-lvm-dbus-2.28-14.el9_6.i686.rpmÙE VsecurityImportant: mod_auth_openidc security update2 https://access.redhat.com/errata/RHSA-2025:9396RHSA-2025:9396RHSA-2025:9396 https://access.redhat.com/security/cve/CVE-2025-3891CVE-2025-3891CVE-2025-3891https://bugzilla.redhat.com/23616332361633https://errata.almalinux.org/9/ALSA-2025-9396.htmlALSA-2025:9396ALSA-2025:9396 Jmod_auth_openidc-2.4.10-1.el9_6.2.x86_64.rpmJmod_auth_openidc-2.4.10-1.el9_6.2.x86_64.rpmØb  YBsecurityModerate: krb5 security update?https://access.redhat.com/errata/RHSA-2025:9430RHSA-2025:9430RHSA-2025:9430 https://access.redhat.com/security/cve/CVE-2025-3576CVE-2025-3576CVE-2025-3576https://bugzilla.redhat.com/23594652359465https://errata.almalinux.org/9/ALSA-2025-9430.htmlALSA-2025:9430ALSA-2025:9430 <$krb5-devel-1.21.1-8.el9_6.x86_64.rpm<$krb5-devel-1.21.1-8.el9_6.i686.rpm<$krb5-devel-1.21.1-8.el9_6.x86_64.rpm<$krb5-devel-1.21.1-8.el9_6.i686.rpmÊK  "]BBBsecurityModerate: libarchive security updateWRhttps://access.redhat.com/errata/RHSA-2025:9431RHSA-2025:9431RHSA-2025:9431 https://access.redhat.com/security/cve/CVE-2025-25724CVE-2025-25724CVE-2025-25724https://bugzilla.redhat.com/23492212349221https://errata.almalinux.org/9/ALSA-2025-9431.htmlALSA-2025:9431ALSA-2025:9431 ]libarchive-devel-3.5.3-5.el9_6.x86_64.rpmDbsdtar-3.5.3-5.el9_6.x86_64.rpm]libarchive-devel-3.5.3-5.el9_6.i686.rpm]libarchive-devel-3.5.3-5.el9_6.x86_64.rpmDbsdtar-3.5.3-5.el9_6.x86_64.rpm]libarchive-devel-3.5.3-5.el9_6.i686.rpmÊA  %csecurityModerate: iputils security update)https://access.redhat.com/errata/RHSA-2025:9432RHSA-2025:9432RHSA-2025:9432 https://access.redhat.com/security/cve/CVE-2025-47268CVE-2025-47268CVE-2025-47268https://bugzilla.redhat.com/23640902364090https://errata.almalinux.org/9/ALSA-2025-9432.htmlALSA-2025:9432ALSA-2025:9432 @'iputils-ninfod-20210202-11.el9_6.1.x86_64.rpm@'iputils-ninfod-20210202-11.el9_6.1.x86_64.rpmÊH  (fsecurityModerate: mod_proxy_cluster security update;https://access.redhat.com/errata/RHSA-2025:9434RHSA-2025:9434RHSA-2025:9434 https://access.redhat.com/security/cve/CVE-2024-10306CVE-2024-10306CVE-2024-10306https://bugzilla.redhat.com/23213022321302https://errata.almalinux.org/9/ALSA-2025-9434.htmlALSA-2025:9434ALSA-2025:9434 [+mod_proxy_cluster-1.3.22-1.el9_6.1.x86_64.rpm[+mod_proxy_cluster-1.3.22-1.el9_6.1.x86_64.rpmÊd  2iBBBBBBBsecurityModerate: emacs security updateW`https://access.redhat.com/errata/RHSA-2025:9448RHSA-2025:9448RHSA-2025:9448 https://access.redhat.com/security/cve/CVE-2024-53920CVE-2024-53920CVE-2024-53920https://bugzilla.redhat.com/23291612329161https://errata.almalinux.org/9/ALSA-2025-9448.htmlALSA-2025:9448ALSA-2025:9448 z=emacs-lucid-27.2-14.el9_6.2.x86_64.rpm=emacs-filesystem-27.2-14.el9_6.2.noarch.rpmy=emacs-common-27.2-14.el9_6.2.x86_64.rpm{=emacs-nox-27.2-14.el9_6.2.x86_64.rpmx=emacs-27.2-14.el9_6.2.x86_64.rpmz=emacs-lucid-27.2-14.el9_6.2.x86_64.rpm=emacs-filesystem-27.2-14.el9_6.2.noarch.rpmy=emacs-common-27.2-14.el9_6.2.x86_64.rpm{=emacs-nox-27.2-14.el9_6.2.x86_64.rpmx=emacs-27.2-14.el9_6.2.x86_64.rpmÊ sBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qt5-qtbase security update7.https://access.redhat.com/errata/RHSA-2025:9462RHSA-2025:9462RHSA-2025:9462 https://access.redhat.com/security/cve/CVE-2025-5455CVE-2025-5455CVE-2025-5455https://bugzilla.redhat.com/23697222369722https://errata.almalinux.org/9/ALSA-2025-9462.htmlALSA-2025:9462ALSA-2025:9462 kxqt5-qtbase-postgresql-5.15.9-11.el9_6.x86_64.rpmjxqt5-qtbase-odbc-5.15.9-11.el9_6.x86_64.rpmexqt5-qtbase-5.15.9-11.el9_6.x86_64.rpmlxqt5-qtbase-private-devel-5.15.9-11.el9_6.i686.rpmfxqt5-qtbase-devel-5.15.9-11.el9_6.x86_64.rpmlxqt5-qtbase-private-devel-5.15.9-11.el9_6.x86_64.rpmexqt5-qtbase-5.15.9-11.el9_6.i686.rpmixqt5-qtbase-mysql-5.15.9-11.el9_6.i686.rpmfxqt5-qtbase-devel-5.15.9-11.el9_6.i686.rpmhxqt5-qtbase-gui-5.15.9-11.el9_6.x86_64.rpmjxqt5-qtbase-odbc-5.15.9-11.el9_6.i686.rpmgxqt5-qtbase-examples-5.15.9-11.el9_6.x86_64.rpmhxqt5-qtbase-gui-5.15.9-11.el9_6.i686.rpmkxqt5-qtbase-postgresql-5.15.9-11.el9_6.i686.rpmgxqt5-qtbase-examples-5.15.9-11.el9_6.i686.rpmixqt5-qtbase-mysql-5.15.9-11.el9_6.x86_64.rpmJxqt5-qtbase-common-5.15.9-11.el9_6.noarch.rpmkxqt5-qtbase-postgresql-5.15.9-11.el9_6.x86_64.rpmjxqt5-qtbase-odbc-5.15.9-11.el9_6.x86_64.rpmexqt5-qtbase-5.15.9-11.el9_6.x86_64.rpmlxqt5-qtbase-private-devel-5.15.9-11.el9_6.i686.rpmfxqt5-qtbase-devel-5.15.9-11.el9_6.x86_64.rpmlxqt5-qtbase-private-devel-5.15.9-11.el9_6.x86_64.rpmexqt5-qtbase-5.15.9-11.el9_6.i686.rpmixqt5-qtbase-mysql-5.15.9-11.el9_6.i686.rpmfxqt5-qtbase-devel-5.15.9-11.el9_6.i686.rpmhxqt5-qtbase-gui-5.15.9-11.el9_6.x86_64.rpmjxqt5-qtbase-odbc-5.15.9-11.el9_6.i686.rpmgxqt5-qtbase-examples-5.15.9-11.el9_6.x86_64.rpmhxqt5-qtbase-gui-5.15.9-11.el9_6.i686.rpmkxqt5-qtbase-postgresql-5.15.9-11.el9_6.i686.rpmgxqt5-qtbase-examples-5.15.9-11.el9_6.i686.rpmixqt5-qtbase-mysql-5.15.9-11.el9_6.x86_64.rpmJxqt5-qtbase-common-5.15.9-11.el9_6.noarch.rpmÊ MBBBsecurityImportant: pam security updatee0https://access.redhat.com/errata/RHSA-2025:9526RHSA-2025:9526RHSA-2025:9526 https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://bugzilla.redhat.com/23725122372512https://errata.almalinux.org/9/ALSA-2025-9526.htmlALSA-2025:9526ALSA-2025:9526 1[pam-devel-1.5.1-25.el9_6.x86_64.rpmC[pam-docs-1.5.1-25.el9_6.x86_64.rpm1[pam-devel-1.5.1-25.el9_6.i686.rpm1[pam-devel-1.5.1-25.el9_6.x86_64.rpmC[pam-docs-1.5.1-25.el9_6.x86_64.rpm1[pam-devel-1.5.1-25.el9_6.i686.rpm' SBBBBsecurityModerate: osbuild-composer security updateWhttps://access.redhat.com/errata/RHSA-2025:9634RHSA-2025:9634RHSA-2025:9634 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9634.htmlALSA-2025:9634ALSA-2025:9634 /{osbuild-composer-132.2-2.el9_6.alma.1.x86_64.rpm1{osbuild-composer-worker-132.2-2.el9_6.alma.1.x86_64.rpm0{osbuild-composer-core-132.2-2.el9_6.alma.1.x86_64.rpm/{osbuild-composer-132.2-2.el9_6.alma.1.x86_64.rpm1{osbuild-composer-worker-132.2-2.el9_6.alma.1.x86_64.rpm0{osbuild-composer-core-132.2-2.el9_6.alma.1.x86_64.rpmÊ2 ZsecurityModerate: weldr-client security updatelyhttps://access.redhat.com/errata/RHSA-2025:9635RHSA-2025:9635RHSA-2025:9635 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9635.htmlALSA-2025:9635ALSA-2025:9635 Kweldr-client-35.12-4.el9_6.x86_64.rpmKweldr-client-35.12-4.el9_6.x86_64.rpmÊJ ']BBBBBBBBsecurityModerate: glibc security updatee2https://access.redhat.com/errata/RHSA-2025:9877RHSA-2025:9877RHSA-2025:9877 https://access.redhat.com/security/cve/CVE-2025-5702CVE-2025-5702CVE-2025-5702https://bugzilla.redhat.com/23704722370472https://errata.almalinux.org/9/ALSA-2025-9877.htmlALSA-2025:9877ALSA-2025:9877 I8glibc-utils-2.34-168.el9_6.20.x86_64.rpmC8glibc-doc-2.34-168.el9_6.20.noarch.rpm8glibc-devel-2.34-168.el9_6.20.x86_64.rpm8glibc-devel-2.34-168.el9_6.20.i686.rpmG8glibc-headers-2.34-168.el9_6.20.x86_64.rpmH8glibc-locale-source-2.34-168.el9_6.20.x86_64.rpmI8glibc-utils-2.34-168.el9_6.20.x86_64.rpmC8glibc-doc-2.34-168.el9_6.20.noarch.rpm8glibc-devel-2.34-168.el9_6.20.x86_64.rpm8glibc-devel-2.34-168.el9_6.20.i686.rpmG8glibc-headers-2.34-168.el9_6.20.x86_64.rpmH8glibc-locale-source-2.34-168.el9_6.20.x86_64.rpmÊl ;hBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880 https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880 &Ikernel-headers-5.14.0-570.24.1.el9_6.x86_64.rpm#Ikernel-devel-5.14.0-570.24.1.el9_6.x86_64.rpmIkernel-doc-5.14.0-570.24.1.el9_6.noarch.rpm$Ikernel-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpm!Ikernel-debug-devel-5.14.0-570.24.1.el9_6.x86_64.rpm)Irv-5.14.0-570.24.1.el9_6.x86_64.rpm"Ikernel-debug-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpmVIpython3-perf-5.14.0-570.24.1.el9_6.x86_64.rpm%Iperf-5.14.0-570.24.1.el9_6.x86_64.rpm'Irtla-5.14.0-570.24.1.el9_6.x86_64.rpm &Ikernel-headers-5.14.0-570.24.1.el9_6.x86_64.rpm#Ikernel-devel-5.14.0-570.24.1.el9_6.x86_64.rpmIkernel-doc-5.14.0-570.24.1.el9_6.noarch.rpm$Ikernel-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpm!Ikernel-debug-devel-5.14.0-570.24.1.el9_6.x86_64.rpm)Irv-5.14.0-570.24.1.el9_6.x86_64.rpm"Ikernel-debug-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpmVIpython3-perf-5.14.0-570.24.1.el9_6.x86_64.rpm%Iperf-5.14.0-570.24.1.el9_6.x86_64.rpm'Irtla-5.14.0-570.24.1.el9_6.x86_64.rpmÓ  >|securityImportant: sudo security update shttps://access.redhat.com/errata/RHSA-2025:9978RHSA-2025:9978RHSA-2025:9978 https://access.redhat.com/security/cve/CVE-2025-32462CVE-2025-32462CVE-2025-32462https://bugzilla.redhat.com/23746922374692https://errata.almalinux.org/9/ALSA-2025-9978.htmlALSA-2025:9978ALSA-2025:9978 7sudo-python-plugin-1.9.5p2-10.el9_6.1.x86_64.rpm7sudo-python-plugin-1.9.5p2-10.el9_6.1.x86_64.rpmÐz BBBBBBBBsecurityModerate: open-vm-tools security updatexhttps://access.redhat.com/security/cve/CVE-2025-22247CVE-2025-22247CVE-2025-22247https://bugzilla.redhat.com/23642612364261https://errata.almalinux.org/9/ALSA-2025-A002.htmlALSA-2025:A002ALSA-2025:A002 #open-vm-tools-12.5.0-1.el9.alma.1.x86_64.rpm$open-vm-tools-desktop-12.5.0-1.el9.alma.1.x86_64.rpm%open-vm-tools-sdmp-12.5.0-1.el9.alma.1.x86_64.rpm&open-vm-tools-test-12.5.0-1.el9.alma.1.x86_64.rpmTopen-vm-tools-salt-minion-12.5.0-1.el9.alma.1.x86_64.rpm#open-vm-tools-12.5.0-1.el9.alma.1.x86_64.rpm$open-vm-tools-desktop-12.5.0-1.el9.alma.1.x86_64.rpm%open-vm-tools-sdmp-12.5.0-1.el9.alma.1.x86_64.rpm&open-vm-tools-test-12.5.0-1.el9.alma.1.x86_64.rpmTopen-vm-tools-salt-minion-12.5.0-1.el9.alma.1.x86_64.rpmԨ^ =JBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libblockdev security update Ihttps://access.redhat.com/security/cve/CVE-2025-6019CVE-2025-6019CVE-2025-6019https://bugzilla.redhat.com/23700512370051https://errata.almalinux.org/9/ALSA-2025-A005.htmlALSA-2025:A005ALSA-2025:A005 !#*libblockdev-fs-2.28-13.el9_6.alma.1.i686.rpm$*libblockdev-kbd-2.28-13.el9_6.alma.1.i686.rpm"*libblockdev-dm-2.28-13.el9_6.alma.1.x86_64.rpm&*libblockdev-lvm-2.28-13.el9_6.alma.1.x86_64.rpm**libblockdev-nvdimm-2.28-13.el9_6.alma.1.i686.rpm+*libblockdev-nvme-2.28-13.el9_6.alma.1.x86_64.rpm!*libblockdev-crypto-2.28-13.el9_6.alma.1.x86_64.rpm *libblockdev-2.28-13.el9_6.alma.1.x86_64.rpm'*libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.i686.rpm"*libblockdev-dm-2.28-13.el9_6.alma.1.i686.rpm**libblockdev-nvdimm-2.28-13.el9_6.alma.1.x86_64.rpmc*python3-blockdev-2.28-13.el9_6.alma.1.x86_64.rpm,*libblockdev-part-2.28-13.el9_6.alma.1.x86_64.rpm$*libblockdev-kbd-2.28-13.el9_6.alma.1.x86_64.rpm(*libblockdev-mdraid-2.28-13.el9_6.alma.1.i686.rpm%*libblockdev-loop-2.28-13.el9_6.alma.1.i686.rpm.*libblockdev-utils-2.28-13.el9_6.alma.1.x86_64.rpm'*libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.x86_64.rpm-*libblockdev-swap-2.28-13.el9_6.alma.1.i686.rpm#*libblockdev-fs-2.28-13.el9_6.alma.1.x86_64.rpm%*libblockdev-loop-2.28-13.el9_6.alma.1.x86_64.rpm *libblockdev-2.28-13.el9_6.alma.1.i686.rpmO*libblockdev-plugins-all-2.28-13.el9_6.alma.1.x86_64.rpm&*libblockdev-lvm-2.28-13.el9_6.alma.1.i686.rpm)*libblockdev-mpath-2.28-13.el9_6.alma.1.x86_64.rpm+*libblockdev-nvme-2.28-13.el9_6.alma.1.i686.rpm)*libblockdev-mpath-2.28-13.el9_6.alma.1.i686.rpm!*libblockdev-crypto-2.28-13.el9_6.alma.1.i686.rpmP*libblockdev-tools-2.28-13.el9_6.alma.1.x86_64.rpm-*libblockdev-swap-2.28-13.el9_6.alma.1.x86_64.rpm,*libblockdev-part-2.28-13.el9_6.alma.1.i686.rpm(*libblockdev-mdraid-2.28-13.el9_6.alma.1.x86_64.rpm.*libblockdev-utils-2.28-13.el9_6.alma.1.i686.rpm!#*libblockdev-fs-2.28-13.el9_6.alma.1.i686.rpm$*libblockdev-kbd-2.28-13.el9_6.alma.1.i686.rpm"*libblockdev-dm-2.28-13.el9_6.alma.1.x86_64.rpm&*libblockdev-lvm-2.28-13.el9_6.alma.1.x86_64.rpm**libblockdev-nvdimm-2.28-13.el9_6.alma.1.i686.rpm+*libblockdev-nvme-2.28-13.el9_6.alma.1.x86_64.rpm!*libblockdev-crypto-2.28-13.el9_6.alma.1.x86_64.rpm *libblockdev-2.28-13.el9_6.alma.1.x86_64.rpm'*libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.i686.rpm"*libblockdev-dm-2.28-13.el9_6.alma.1.i686.rpm**libblockdev-nvdimm-2.28-13.el9_6.alma.1.x86_64.rpmc*python3-blockdev-2.28-13.el9_6.alma.1.x86_64.rpm,*libblockdev-part-2.28-13.el9_6.alma.1.x86_64.rpm$*libblockdev-kbd-2.28-13.el9_6.alma.1.x86_64.rpm(*libblockdev-mdraid-2.28-13.el9_6.alma.1.i686.rpm%*libblockdev-loop-2.28-13.el9_6.alma.1.i686.rpm.*libblockdev-utils-2.28-13.el9_6.alma.1.x86_64.rpm'*libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.x86_64.rpm-*libblockdev-swap-2.28-13.el9_6.alma.1.i686.rpm#*libblockdev-fs-2.28-13.el9_6.alma.1.x86_64.rpm%*libblockdev-loop-2.28-13.el9_6.alma.1.x86_64.rpm *libblockdev-2.28-13.el9_6.alma.1.i686.rpmO*libblockdev-plugins-all-2.28-13.el9_6.alma.1.x86_64.rpm&*libblockdev-lvm-2.28-13.el9_6.alma.1.i686.rpm)*libblockdev-mpath-2.28-13.el9_6.alma.1.x86_64.rpm+*libblockdev-nvme-2.28-13.el9_6.alma.1.i686.rpm)*libblockdev-mpath-2.28-13.el9_6.alma.1.i686.rpm!*libblockdev-crypto-2.28-13.el9_6.alma.1.i686.rpmP*libblockdev-tools-2.28-13.el9_6.alma.1.x86_64.rpm-*libblockdev-swap-2.28-13.el9_6.alma.1.x86_64.rpm,*libblockdev-part-2.28-13.el9_6.alma.1.i686.rpm(*libblockdev-mdraid-2.28-13.el9_6.alma.1.x86_64.rpm.*libblockdev-utils-2.28-13.el9_6.alma.1.i686.rpm& ~BBBBBBBsecurityModerate: gcc-toolset-14-binutils security updateiTehttps://access.redhat.com/errata/RHSA-2026:0052RHSA-2026:0052RHSA-2026:0052 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2026-0052.htmlALSA-2026:0052ALSA-2026:0052 MBgcc-toolset-14-binutils-2.41-5.el9_7.1.x86_64.rpmOBgcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1.x86_64.rpmNBgcc-toolset-14-binutils-gold-2.41-5.el9_7.1.x86_64.rpmBgcc-toolset-14-binutils-devel-2.41-5.el9_7.1.x86_64.rpmBgcc-toolset-14-binutils-devel-2.41-5.el9_7.1.i686.rpmMBgcc-toolset-14-binutils-2.41-5.el9_7.1.x86_64.rpmOBgcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1.x86_64.rpmNBgcc-toolset-14-binutils-gold-2.41-5.el9_7.1.x86_64.rpmBgcc-toolset-14-binutils-devel-2.41-5.el9_7.1.x86_64.rpmBgcc-toolset-14-binutils-devel-2.41-5.el9_7.1.i686.rpm HBBBBBBBBBBBBsecurityModerate: poppler security updatei9xhttps://access.redhat.com/errata/RHSA-2026:0126RHSA-2026:0126RHSA-2026:0126 https://access.redhat.com/security/cve/CVE-2025-32365CVE-2025-32365CVE-2025-32365https://bugzilla.redhat.com/23576562357656https://errata.almalinux.org/9/ALSA-2026-0126.htmlALSA-2026:0126ALSA-2026:0126 c|poppler-glib-21.01.0-23.el9_7.x86_64.rpma|poppler-21.01.0-23.el9_7.i686.rpma|poppler-21.01.0-23.el9_7.x86_64.rpmc|poppler-glib-21.01.0-23.el9_7.i686.rpmd|poppler-qt5-21.01.0-23.el9_7.i686.rpmb|poppler-cpp-21.01.0-23.el9_7.x86_64.rpmd|poppler-qt5-21.01.0-23.el9_7.x86_64.rpm0|poppler-utils-21.01.0-23.el9_7.x86_64.rpmb|poppler-cpp-21.01.0-23.el9_7.i686.rpm c|poppler-glib-21.01.0-23.el9_7.x86_64.rpma|poppler-21.01.0-23.el9_7.i686.rpma|poppler-21.01.0-23.el9_7.x86_64.rpmc|poppler-glib-21.01.0-23.el9_7.i686.rpmd|poppler-qt5-21.01.0-23.el9_7.i686.rpmb|poppler-cpp-21.01.0-23.el9_7.x86_64.rpmd|poppler-qt5-21.01.0-23.el9_7.x86_64.rpm0|poppler-utils-21.01.0-23.el9_7.x86_64.rpmb|poppler-cpp-21.01.0-23.el9_7.i686.rpmp -WBBBBBBBBBBBBBBBBBBBBsecurityImportant: mariadb security updatei18https://access.redhat.com/errata/RHSA-2026:0137RHSA-2026:0137RHSA-2026:0137 https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0137.htmlALSA-2026:0137ALSA-2026:0137 .mariadb-oqgraph-engine-10.5.29-3.el9_7.x86_64.rpm .mariadb-server-10.5.29-3.el9_7.x86_64.rpm.mariadb-gssapi-server-10.5.29-3.el9_7.x86_64.rpm.mariadb-backup-10.5.29-3.el9_7.x86_64.rpm.mariadb-pam-10.5.29-3.el9_7.x86_64.rpm".mariadb-server-utils-10.5.29-3.el9_7.x86_64.rpm!.mariadb-server-galera-10.5.29-3.el9_7.x86_64.rpm.mariadb-errmsg-10.5.29-3.el9_7.x86_64.rpm.mariadb-embedded-10.5.29-3.el9_7.x86_64.rpm,.mariadb-10.5.29-3.el9_7.x86_64.rpm.mariadb-common-10.5.29-3.el9_7.x86_64.rpm .mariadb-oqgraph-engine-10.5.29-3.el9_7.x86_64.rpm .mariadb-server-10.5.29-3.el9_7.x86_64.rpm.mariadb-gssapi-server-10.5.29-3.el9_7.x86_64.rpm.mariadb-backup-10.5.29-3.el9_7.x86_64.rpm.mariadb-pam-10.5.29-3.el9_7.x86_64.rpm".mariadb-server-utils-10.5.29-3.el9_7.x86_64.rpm!.mariadb-server-galera-10.5.29-3.el9_7.x86_64.rpm.mariadb-errmsg-10.5.29-3.el9_7.x86_64.rpm.mariadb-embedded-10.5.29-3.el9_7.x86_64.rpm,.mariadb-10.5.29-3.el9_7.x86_64.rpm.mariadb-common-10.5.29-3.el9_7.x86_64.rpm 1nBsecurityImportant: libpng security updateiihttps://access.redhat.com/errata/RHSA-2026:0238RHSA-2026:0238RHSA-2026:0238 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2025-66293CVE-2025-66293CVE-2025-66293https://bugzilla.redhat.com/24169042416904https://bugzilla.redhat.com/24169072416907https://bugzilla.redhat.com/24187112418711https://errata.almalinux.org/9/ALSA-2026-0238.htmlALSA-2026:0238ALSA-2026:0238 @Vlibpng-devel-1.6.37-12.el9_7.1.i686.rpm@Vlibpng-devel-1.6.37-12.el9_7.1.x86_64.rpm@Vlibpng-devel-1.6.37-12.el9_7.1.i686.rpm@Vlibpng-devel-1.6.37-12.el9_7.1.x86_64.rpmU pBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: mariadb:10.11 security updatei{https://access.redhat.com/errata/RHSA-2026:0247RHSA-2026:0247RHSA-2026:0247 https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2023-52971CVE-2023-52971CVE-2023-52971https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509172350917https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0247.htmlALSA-2026:0247ALSA-2026:0247 ,:(mariadb-oqgraph-engine-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-common-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-gssapi-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmwmariadb-embedded-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-backup-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm"mariadb-server-utils-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm mariadb-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm-galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-pam-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmxmariadb-test-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmvmariadb-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm,mariadb-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-errmsg-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-embedded-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm!mariadb-server-galera-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm,:(mariadb-oqgraph-engine-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-common-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-gssapi-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmwmariadb-embedded-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-backup-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm"mariadb-server-utils-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm mariadb-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm-galera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpmmariadb-pam-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmxmariadb-test-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmvmariadb-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm,mariadb-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-errmsg-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmmariadb-embedded-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm!mariadb-server-galera-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm˓7 OBBBBBBBBBBBBsecurityModerate: cups security updateihttps://access.redhat.com/errata/RHSA-2026:0312RHSA-2026:0312RHSA-2026:0312 https://access.redhat.com/security/cve/CVE-2025-58436CVE-2025-58436CVE-2025-58436https://access.redhat.com/security/cve/CVE-2025-61915CVE-2025-61915CVE-2025-61915https://bugzilla.redhat.com/24160392416039https://bugzilla.redhat.com/24160402416040https://errata.almalinux.org/9/ALSA-2026-0312.htmlALSA-2026:0312ALSA-2026:0312 =!cups-client-2.3.3op2-34.el9_7.2.x86_64.rpm>!cups-ipptool-2.3.3op2-34.el9_7.2.x86_64.rpm!cups-devel-2.3.3op2-34.el9_7.2.x86_64.rpm2!cups-filesystem-2.3.3op2-34.el9_7.2.noarch.rpm!cups-ipptool-2.3.3op2-34.el9_7.2.x86_64.rpm!cups-devel-2.3.3op2-34.el9_7.2.x86_64.rpm2!cups-filesystem-2.3.3op2-34.el9_7.2.noarch.rpmbuildah-1.41.8-1.el9_7.x86_64.rpm9>buildah-tests-1.41.8-1.el9_7.x86_64.rpm8>buildah-1.41.8-1.el9_7.x86_64.rpm9>buildah-tests-1.41.8-1.el9_7.x86_64.rpm˩v =jBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updatei]0 https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445 https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445 V`python3-perf-5.14.0-611.20.1.el9_7.x86_64.rpm`kernel-doc-5.14.0-611.20.1.el9_7.noarch.rpm"`kernel-debug-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm#`kernel-devel-5.14.0-611.20.1.el9_7.x86_64.rpm'`rtla-5.14.0-611.20.1.el9_7.x86_64.rpm!`kernel-debug-devel-5.14.0-611.20.1.el9_7.x86_64.rpm)`rv-5.14.0-611.20.1.el9_7.x86_64.rpm%`perf-5.14.0-611.20.1.el9_7.x86_64.rpm&`kernel-headers-5.14.0-611.20.1.el9_7.x86_64.rpm$`kernel-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm V`python3-perf-5.14.0-611.20.1.el9_7.x86_64.rpm`kernel-doc-5.14.0-611.20.1.el9_7.noarch.rpm"`kernel-debug-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm#`kernel-devel-5.14.0-611.20.1.el9_7.x86_64.rpm'`rtla-5.14.0-611.20.1.el9_7.x86_64.rpm!`kernel-debug-devel-5.14.0-611.20.1.el9_7.x86_64.rpm)`rv-5.14.0-611.20.1.el9_7.x86_64.rpm%`perf-5.14.0-611.20.1.el9_7.x86_64.rpm&`kernel-headers-5.14.0-611.20.1.el9_7.x86_64.rpm$`kernel-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm˩S  ~BBBBsecurityModerate: libpq security updatei (https://access.redhat.com/errata/RHSA-2026:0458RHSA-2026:0458RHSA-2026:0458 https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0458.htmlALSA-2026:0458ALSA-2026:0458 \!libpq-devel-13.23-1.el9_7.x86_64.rpm[!libpq-13.23-1.el9_7.i686.rpm[!libpq-13.23-1.el9_7.x86_64.rpm\!libpq-devel-13.23-1.el9_7.i686.rpm\!libpq-devel-13.23-1.el9_7.x86_64.rpm[!libpq-13.23-1.el9_7.i686.rpm[!libpq-13.23-1.el9_7.x86_64.rpm\!libpq-devel-13.23-1.el9_7.i686.rpm˩! EBBBBBBBsecurityImportant: podman security updatei5 https://access.redhat.com/errata/RHSA-2026:0470RHSA-2026:0470RHSA-2026:0470 https://access.redhat.com/security/cve/CVE-2025-47913CVE-2025-47913CVE-2025-47913https://bugzilla.redhat.com/24149432414943https://errata.almalinux.org/9/ALSA-2026-0470.htmlALSA-2026:0470ALSA-2026:0470 5Spodman-tests-5.6.0-11.el9_7.x86_64.rpm4Spodman-remote-5.6.0-11.el9_7.x86_64.rpm2Spodman-5.6.0-11.el9_7.x86_64.rpm3Spodman-plugins-5.6.0-11.el9_7.x86_64.rpmgSpodman-docker-5.6.0-11.el9_7.noarch.rpm5Spodman-tests-5.6.0-11.el9_7.x86_64.rpm4Spodman-remote-5.6.0-11.el9_7.x86_64.rpm2Spodman-5.6.0-11.el9_7.x86_64.rpm3Spodman-plugins-5.6.0-11.el9_7.x86_64.rpmgSpodman-docker-5.6.0-11.el9_7.noarch.rpm˩F" OBBBBBBBBBBBBBBsecurityModerate: postgresql security updateiU[https://access.redhat.com/errata/RHSA-2026:0491RHSA-2026:0491RHSA-2026:0491 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0491.htmlALSA-2026:0491ALSA-2026:0491 _!postgresql-13.23-1.el9_7.x86_64.rpm$!postgresql-plpython3-13.23-1.el9_7.x86_64.rpm%!postgresql-pltcl-13.23-1.el9_7.x86_64.rpm&!postgresql-private-libs-13.23-1.el9_7.x86_64.rpm"!postgresql-contrib-13.23-1.el9_7.x86_64.rpm(!postgresql-upgrade-13.23-1.el9_7.x86_64.rpm#!postgresql-plperl-13.23-1.el9_7.x86_64.rpm'!postgresql-server-13.23-1.el9_7.x86_64.rpm_!postgresql-13.23-1.el9_7.x86_64.rpm$!postgresql-plpython3-13.23-1.el9_7.x86_64.rpm%!postgresql-pltcl-13.23-1.el9_7.x86_64.rpm&!postgresql-private-libs-13.23-1.el9_7.x86_64.rpm"!postgresql-contrib-13.23-1.el9_7.x86_64.rpm(!postgresql-upgrade-13.23-1.el9_7.x86_64.rpm#!postgresql-plperl-13.23-1.el9_7.x86_64.rpm'!postgresql-server-13.23-1.el9_7.x86_64.rpm˩V# =FBBBmBkBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:15 security updatei0[https://access.redhat.com/errata/RHSA-2026:0492RHSA-2026:0492RHSA-2026:0492 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0492.htmlALSA-2026:0492ALSA-2026:0492 _(npostgresql-upgrade-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm_npostgresql-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmupg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm bpgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmnpostgresql-test-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm%npostgresql-pltcl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpminpostgresql-test-rpm-macros-15.15-2.module_el9.7.0+203+960b74c0.noarch.rpm#npostgresql-plperl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm npostgresql-private-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm cpostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm'npostgresql-server-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm npostgresql-server-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm$npostgresql-plpython3-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmnpostgresql-static-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm"npostgresql-contrib-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm(npostgresql-upgrade-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm npostgresql-docs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm&npostgresql-private-libs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm_(npostgresql-upgrade-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm_npostgresql-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmupg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm bpgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmnpostgresql-test-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm%npostgresql-pltcl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpminpostgresql-test-rpm-macros-15.15-2.module_el9.7.0+203+960b74c0.noarch.rpm#npostgresql-plperl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm npostgresql-private-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm cpostgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm'npostgresql-server-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm npostgresql-server-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm$npostgresql-plpython3-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmnpostgresql-static-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm"npostgresql-contrib-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm(npostgresql-upgrade-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm npostgresql-docs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm&npostgresql-private-libs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm˸$ %JBBBeBBBKBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:16 security updatei [https://access.redhat.com/errata/RHSA-2026:0493RHSA-2026:0493RHSA-2026:0493 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0493.htmlALSA-2026:0493ALSA-2026:0493 _(hpostgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmjpostgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm/lpgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpmtpostgresql-static-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm'tpostgresql-server-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm(tpostgresql-upgrade-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpmgpostgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmtpostgresql-test-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmipostgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm#tpostgresql-plperl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm&tpostgresql-private-libs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm tpostgresql-docs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm tpostgresql-server-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmitpostgresql-test-rpm-macros-16.11-1.module_el9.7.0+202+21427d8a.noarch.rpm%tpostgresql-pltcl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmtpostgresql-upgrade-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm$tpostgresql-plpython3-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmxpg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpm"tpostgresql-contrib-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm tpostgresql-private-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmfpostgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm_tpostgresql-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm_(hpostgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmjpostgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm/lpgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpmtpostgresql-static-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm'tpostgresql-server-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm postgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm(tpostgresql-upgrade-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm pgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpmgpostgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmtpostgresql-test-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmipostgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm#tpostgresql-plperl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm&tpostgresql-private-libs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm tpostgresql-docs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm tpostgresql-server-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmitpostgresql-test-rpm-macros-16.11-1.module_el9.7.0+202+21427d8a.noarch.rpm%tpostgresql-pltcl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmtpostgresql-upgrade-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm$tpostgresql-plpython3-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmxpg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpm"tpostgresql-contrib-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm tpostgresql-private-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmfpostgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm_tpostgresql-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm˷2% (fsecurityModerate: vsftpd security updateif@https://access.redhat.com/errata/RHSA-2026:0605RHSA-2026:0605RHSA-2026:0605 https://access.redhat.com/security/cve/CVE-2025-14242CVE-2025-14242CVE-2025-14242https://bugzilla.redhat.com/24198262419826https://errata.almalinux.org/9/ALSA-2026-0605.htmlALSA-2026:0605ALSA-2026:0605 ,:vsftpd-3.0.5-6.el9_7.2.x86_64.rpm,:vsftpd-3.0.5-6.el9_7.2.x86_64.rpm˩g& -iBBsecurityImportant: firefox security updatei&yhttps://access.redhat.com/errata/RHSA-2026:0694RHSA-2026:0694RHSA-2026:0694 https://access.redhat.com/security/cve/CVE-2025-14327CVE-2025-14327CVE-2025-14327https://access.redhat.com/security/cve/CVE-2026-0877CVE-2026-0877CVE-2026-0877https://access.redhat.com/security/cve/CVE-2026-0878CVE-2026-0878CVE-2026-0878https://access.redhat.com/security/cve/CVE-2026-0879CVE-2026-0879CVE-2026-0879https://access.redhat.com/security/cve/CVE-2026-0880CVE-2026-0880CVE-2026-0880https://access.redhat.com/security/cve/CVE-2026-0882CVE-2026-0882CVE-2026-0882https://access.redhat.com/security/cve/CVE-2026-0883CVE-2026-0883CVE-2026-0883https://access.redhat.com/security/cve/CVE-2026-0884CVE-2026-0884CVE-2026-0884https://access.redhat.com/security/cve/CVE-2026-0885CVE-2026-0885CVE-2026-0885https://access.redhat.com/security/cve/CVE-2026-0886CVE-2026-0886CVE-2026-0886https://access.redhat.com/security/cve/CVE-2026-0887CVE-2026-0887CVE-2026-0887https://access.redhat.com/security/cve/CVE-2026-0890CVE-2026-0890CVE-2026-0890https://access.redhat.com/security/cve/CVE-2026-0891CVE-2026-0891CVE-2026-0891https://bugzilla.redhat.com/24205072420507https://bugzilla.redhat.com/24289612428961https://bugzilla.redhat.com/24289632428963https://bugzilla.redhat.com/24289652428965https://bugzilla.redhat.com/24289662428966https://bugzilla.redhat.com/24289672428967https://bugzilla.redhat.com/24289682428968https://bugzilla.redhat.com/24289692428969https://bugzilla.redhat.com/24289712428971https://bugzilla.redhat.com/24289722428972https://bugzilla.redhat.com/24289732428973https://bugzilla.redhat.com/24289752428975https://bugzilla.redhat.com/24289782428978https://errata.almalinux.org/9/ALSA-2026-0694.htmlALSA-2026:0694ALSA-2026:0694 Q~firefox-x11-140.7.0-1.el9_7.alma.1.x86_64.rpm8~firefox-140.7.0-1.el9_7.alma.1.x86_64.rpmQ~firefox-x11-140.7.0-1.el9_7.alma.1.x86_64.rpm8~firefox-140.7.0-1.el9_7.alma.1.x86_64.rpm˩^' ?nBBBBBBBBBBBBBBBsecurityImportant: net-snmp security updatei9https://access.redhat.com/errata/RHSA-2026:0696RHSA-2026:0696RHSA-2026:0696 https://access.redhat.com/security/cve/CVE-2025-68615CVE-2025-68615CVE-2025-68615https://bugzilla.redhat.com/24246182424618https://errata.almalinux.org/9/ALSA-2026-0696.htmlALSA-2026:0696ALSA-2026:0696 qpython3-net-snmp-5.9.1-17.el9_7.1.x86_64.rpmcqnet-snmp-libs-5.9.1-17.el9_7.1.i686.rpmaqnet-snmp-agent-libs-5.9.1-17.el9_7.1.i686.rpmaqnet-snmp-agent-libs-5.9.1-17.el9_7.1.x86_64.rpmzqnet-snmp-perl-5.9.1-17.el9_7.1.x86_64.rpmcqnet-snmp-libs-5.9.1-17.el9_7.1.x86_64.rpmbqnet-snmp-devel-5.9.1-17.el9_7.1.i686.rpmbqnet-snmp-devel-5.9.1-17.el9_7.1.x86_64.rpm{qnet-snmp-utils-5.9.1-17.el9_7.1.x86_64.rpmyqnet-snmp-5.9.1-17.el9_7.1.x86_64.rpm qpython3-net-snmp-5.9.1-17.el9_7.1.x86_64.rpmcqnet-snmp-libs-5.9.1-17.el9_7.1.i686.rpmaqnet-snmp-agent-libs-5.9.1-17.el9_7.1.i686.rpmaqnet-snmp-agent-libs-5.9.1-17.el9_7.1.x86_64.rpmzqnet-snmp-perl-5.9.1-17.el9_7.1.x86_64.rpmcqnet-snmp-libs-5.9.1-17.el9_7.1.x86_64.rpmbqnet-snmp-devel-5.9.1-17.el9_7.1.i686.rpmbqnet-snmp-devel-5.9.1-17.el9_7.1.x86_64.rpm{qnet-snmp-utils-5.9.1-17.el9_7.1.x86_64.rpmyqnet-snmp-5.9.1-17.el9_7.1.x86_64.rpm( @securityImportant: gnupg2 security updateiXbhttps://access.redhat.com/errata/RHSA-2026:0719RHSA-2026:0719RHSA-2026:0719 https://access.redhat.com/security/cve/CVE-2025-68973CVE-2025-68973CVE-2025-68973https://bugzilla.redhat.com/24259662425966https://errata.almalinux.org/9/ALSA-2026-0719.htmlALSA-2026:0719ALSA-2026:0719 7gnupg2-smime-2.3.3-5.el9_7.x86_64.rpm7gnupg2-smime-2.3.3-5.el9_7.x86_64.rpm˧i) CBBsecurityImportant: gpsd-minimal security updatei:%https://access.redhat.com/errata/RHSA-2026:0771RHSA-2026:0771RHSA-2026:0771 https://access.redhat.com/security/cve/CVE-2025-67268CVE-2025-67268CVE-2025-67268https://access.redhat.com/security/cve/CVE-2025-67269CVE-2025-67269CVE-2025-67269https://bugzilla.redhat.com/24268102426810https://bugzilla.redhat.com/24268352426835https://errata.almalinux.org/9/ALSA-2026-0771.htmlALSA-2026:0771ALSA-2026:0771 cgpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpmdgpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpmcgpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpmdgpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpm˽]* HBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updatei_+ https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793 https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793 "akernel-debug-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpmakernel-doc-5.14.0-611.24.1.el9_7.noarch.rpmVapython3-perf-5.14.0-611.24.1.el9_7.x86_64.rpm&akernel-headers-5.14.0-611.24.1.el9_7.x86_64.rpm%aperf-5.14.0-611.24.1.el9_7.x86_64.rpm!akernel-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm$akernel-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm#akernel-devel-5.14.0-611.24.1.el9_7.x86_64.rpm'artla-5.14.0-611.24.1.el9_7.x86_64.rpm)arv-5.14.0-611.24.1.el9_7.x86_64.rpm "akernel-debug-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpmakernel-doc-5.14.0-611.24.1.el9_7.noarch.rpmVapython3-perf-5.14.0-611.24.1.el9_7.x86_64.rpm&akernel-headers-5.14.0-611.24.1.el9_7.x86_64.rpm%aperf-5.14.0-611.24.1.el9_7.x86_64.rpm!akernel-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm$akernel-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm#akernel-devel-5.14.0-611.24.1.el9_7.x86_64.rpm'artla-5.14.0-611.24.1.el9_7.x86_64.rpm)arv-5.14.0-611.24.1.el9_7.x86_64.rpm+ !\BBBsecurityImportant: gimp security updatei n https://access.redhat.com/errata/RHSA-2026:0914RHSA-2026:0914RHSA-2026:0914 https://access.redhat.com/security/cve/CVE-2025-14422CVE-2025-14422CVE-2025-14422https://access.redhat.com/security/cve/CVE-2025-14423CVE-2025-14423CVE-2025-14423https://access.redhat.com/security/cve/CVE-2025-14424CVE-2025-14424CVE-2025-14424https://access.redhat.com/security/cve/CVE-2025-14425CVE-2025-14425CVE-2025-14425https://bugzilla.redhat.com/24247662424766https://bugzilla.redhat.com/24247672424767https://bugzilla.redhat.com/24247742424774https://bugzilla.redhat.com/24247822424782https://errata.almalinux.org/9/ALSA-2026-0914.htmlALSA-2026:0914ALSA-2026:0914 m{gimp-libs-3.0.4-1.el9_7.2.i686.rpmm{gimp-libs-3.0.4-1.el9_7.2.x86_64.rpm9{gimp-3.0.4-1.el9_7.2.x86_64.rpmm{gimp-libs-3.0.4-1.el9_7.2.i686.rpmm{gimp-libs-3.0.4-1.el9_7.2.x86_64.rpm9{gimp-3.0.4-1.el9_7.2.x86_64.rpm&, .bBBBBBBBBBBsecurityImportant: golang security updateixhttps://access.redhat.com/errata/RHSA-2026:0923RHSA-2026:0923RHSA-2026:0923 https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://bugzilla.redhat.com/24184622418462https://errata.almalinux.org/9/ALSA-2026-0923.htmlALSA-2026:0923ALSA-2026:0923 Ygolang-docs-1.25.5-2.el9_7.noarch.rpm?Ygolang-1.25.5-2.el9_7.x86_64.rpmYgolang-misc-1.25.5-2.el9_7.noarch.rpmYgolang-tests-1.25.5-2.el9_7.noarch.rpmnYgo-toolset-1.25.5-2.el9_7.x86_64.rpmIYgolang-race-1.25.5-2.el9_7.x86_64.rpmYgolang-src-1.25.5-2.el9_7.noarch.rpm@Ygolang-bin-1.25.5-2.el9_7.x86_64.rpmYgolang-docs-1.25.5-2.el9_7.noarch.rpm?Ygolang-1.25.5-2.el9_7.x86_64.rpmYgolang-misc-1.25.5-2.el9_7.noarch.rpmYgolang-tests-1.25.5-2.el9_7.noarch.rpmnYgo-toolset-1.25.5-2.el9_7.x86_64.rpmIYgolang-race-1.25.5-2.el9_7.x86_64.rpmYgolang-src-1.25.5-2.el9_7.noarch.rpm@Ygolang-bin-1.25.5-2.el9_7.x86_64.rpmr- 1osecurityImportant: thunderbird security updatei Hhttps://access.redhat.com/errata/RHSA-2026:0924RHSA-2026:0924RHSA-2026:0924 https://access.redhat.com/security/cve/CVE-2025-14327CVE-2025-14327CVE-2025-14327https://access.redhat.com/security/cve/CVE-2026-0877CVE-2026-0877CVE-2026-0877https://access.redhat.com/security/cve/CVE-2026-0878CVE-2026-0878CVE-2026-0878https://access.redhat.com/security/cve/CVE-2026-0879CVE-2026-0879CVE-2026-0879https://access.redhat.com/security/cve/CVE-2026-0880CVE-2026-0880CVE-2026-0880https://access.redhat.com/security/cve/CVE-2026-0882CVE-2026-0882CVE-2026-0882https://access.redhat.com/security/cve/CVE-2026-0883CVE-2026-0883CVE-2026-0883https://access.redhat.com/security/cve/CVE-2026-0884CVE-2026-0884CVE-2026-0884https://access.redhat.com/security/cve/CVE-2026-0885CVE-2026-0885CVE-2026-0885https://access.redhat.com/security/cve/CVE-2026-0886CVE-2026-0886CVE-2026-0886https://access.redhat.com/security/cve/CVE-2026-0887CVE-2026-0887CVE-2026-0887https://access.redhat.com/security/cve/CVE-2026-0890CVE-2026-0890CVE-2026-0890https://access.redhat.com/security/cve/CVE-2026-0891CVE-2026-0891CVE-2026-0891https://bugzilla.redhat.com/24205072420507https://bugzilla.redhat.com/24289612428961https://bugzilla.redhat.com/24289632428963https://bugzilla.redhat.com/24289652428965https://bugzilla.redhat.com/24289662428966https://bugzilla.redhat.com/24289672428967https://bugzilla.redhat.com/24289682428968https://bugzilla.redhat.com/24289692428969https://bugzilla.redhat.com/24289712428971https://bugzilla.redhat.com/24289722428972https://bugzilla.redhat.com/24289732428973https://bugzilla.redhat.com/24289752428975https://bugzilla.redhat.com/24289782428978https://errata.almalinux.org/9/ALSA-2026-0924.htmlALSA-2026:0924ALSA-2026:0924 :~thunderbird-140.7.0-1.el9_7.alma.1.x86_64.rpm:~thunderbird-140.7.0-1.el9_7.alma.1.x86_64.rpm . rBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security updateiTdhttps://access.redhat.com/errata/RHSA-2026:0927RHSA-2026:0927RHSA-2026:0927 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0927.htmlALSA-2026:0927ALSA-2026:0927 java-17-openjdk-static-libs-17.0.18.0.8-1.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.18.0.8-1.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.18.0.8-1.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-static-libs-17.0.18.0.8-1.el9.alma.1.x86_64.rpmjava-17-openjdk-jmods-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-demo-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-devel-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-headless-17.0.18.0.8-1.el9.alma.1.x86_64.rpmjava-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9.alma.1.x86_64.rpm java-17-openjdk-javadoc-17.0.18.0.8-1.el9.alma.1.x86_64.rpmjava-17-openjdk-src-17.0.18.0.8-1.el9.alma.1.x86_64.rpm0/ EBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updatei8)https://access.redhat.com/errata/RHSA-2026:0928RHSA-2026:0928RHSA-2026:0928 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0928.htmlALSA-2026:0928ALSA-2026:0928 {java-21-openjdk-jmods-21.0.10.0.7-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.10.0.7-1.el9.alma.1.x86_64.rpmwjava-21-openjdk-devel-21.0.10.0.7-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.10.0.7-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.10.0.7-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.10.0.7-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.10.0.7-1.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.10.0.7-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9.alma.1.x86_64.rpm {java-21-openjdk-jmods-21.0.10.0.7-1.el9.alma.1.x86_64.rpmyjava-21-openjdk-javadoc-21.0.10.0.7-1.el9.alma.1.x86_64.rpmwjava-21-openjdk-devel-21.0.10.0.7-1.el9.alma.1.x86_64.rpmujava-21-openjdk-21.0.10.0.7-1.el9.alma.1.x86_64.rpm|java-21-openjdk-src-21.0.10.0.7-1.el9.alma.1.x86_64.rpmvjava-21-openjdk-demo-21.0.10.0.7-1.el9.alma.1.x86_64.rpmxjava-21-openjdk-headless-21.0.10.0.7-1.el9.alma.1.x86_64.rpm}java-21-openjdk-static-libs-21.0.10.0.7-1.el9.alma.1.x86_64.rpmzjava-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9.alma.1.x86_64.rpm0 $XBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security updateiawhttps://access.redhat.com/errata/RHSA-2026:0932RHSA-2026:0932RHSA-2026:0932 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0932.htmlALSA-2026:0932ALSA-2026:0932 38java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm58java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm68java-1.8.0-openjdk-src-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm28java-1.8.0-openjdk-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm;8java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el9.alma.1.noarch.rpm48java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm:8java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el9.alma.1.noarch.rpm38java-1.8.0-openjdk-demo-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm58java-1.8.0-openjdk-headless-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm68java-1.8.0-openjdk-src-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm28java-1.8.0-openjdk-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm;8java-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el9.alma.1.noarch.rpm48java-1.8.0-openjdk-devel-1.8.0.482.b08-1.el9.alma.1.x86_64.rpm:8java-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el9.alma.1.noarch.rpm1 9eBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security updateiXfhttps://access.redhat.com/errata/RHSA-2026:0933RHSA-2026:0933RHSA-2026:0933 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0933.htmlALSA-2026:0933ALSA-2026:0933 >java-25-openjdk-static-libs-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-src-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-headless-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-javadoc-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-devel-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-jmods-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-demo-25.0.2.0.10-1.el9.alma.1.x86_64.rpm >java-25-openjdk-static-libs-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-src-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-headless-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-javadoc-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-devel-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-jmods-25.0.2.0.10-1.el9.alma.1.x86_64.rpm>java-25-openjdk-demo-25.0.2.0.10-1.el9.alma.1.x86_64.rpm2 zBBBBsecurityModerate: glib2 security updatei>https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936 https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936 Gglib2-tests-2.68.4-18.el9_7.1.x86_64.rpm.glib2-doc-2.68.4-18.el9_7.1.noarch.rpmXglib2-devel-2.68.4-18.el9_7.1.x86_64.rpmXglib2-devel-2.68.4-18.el9_7.1.i686.rpmGglib2-tests-2.68.4-18.el9_7.1.x86_64.rpm.glib2-doc-2.68.4-18.el9_7.1.noarch.rpmXglib2-devel-2.68.4-18.el9_7.1.x86_64.rpmXglib2-devel-2.68.4-18.el9_7.1.i686.rpmi3 securityImportant: python3.12-urllib3 security updatei[7https://access.redhat.com/errata/RHSA-2026:1088RHSA-2026:1088RHSA-2026:1088 https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1088.htmlALSA-2026:1088ALSA-2026:1088 mhpython3.12-urllib3-1.26.19-1.el9_7.1.noarch.rpmmhpython3.12-urllib3-1.26.19-1.el9_7.1.noarch.rpm4 securityImportant: python3.11-urllib3 security updatei7https://access.redhat.com/errata/RHSA-2026:1089RHSA-2026:1089RHSA-2026:1089 https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1089.htmlALSA-2026:1089ALSA-2026:1089 Ifpython3.11-urllib3-1.26.12-5.el9_7.1.noarch.rpmIfpython3.11-urllib3-1.26.12-5.el9_7.1.noarch.rpm 5 EBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateiIhttps://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143 https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143 "bkernel-debug-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm$bkernel-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm)brv-5.14.0-611.26.1.el9_7.x86_64.rpm%bperf-5.14.0-611.26.1.el9_7.x86_64.rpmbkernel-doc-5.14.0-611.26.1.el9_7.noarch.rpmVbpython3-perf-5.14.0-611.26.1.el9_7.x86_64.rpm#bkernel-devel-5.14.0-611.26.1.el9_7.x86_64.rpm'brtla-5.14.0-611.26.1.el9_7.x86_64.rpm!bkernel-debug-devel-5.14.0-611.26.1.el9_7.x86_64.rpm&bkernel-headers-5.14.0-611.26.1.el9_7.x86_64.rpm "bkernel-debug-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm$bkernel-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm)brv-5.14.0-611.26.1.el9_7.x86_64.rpm%bperf-5.14.0-611.26.1.el9_7.x86_64.rpmbkernel-doc-5.14.0-611.26.1.el9_7.noarch.rpmVbpython3-perf-5.14.0-611.26.1.el9_7.x86_64.rpm#bkernel-devel-5.14.0-611.26.1.el9_7.x86_64.rpm'brtla-5.14.0-611.26.1.el9_7.x86_64.rpm!bkernel-debug-devel-5.14.0-611.26.1.el9_7.x86_64.rpm&bkernel-headers-5.14.0-611.26.1.el9_7.x86_64.rpm86 "YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security updateifqhttps://access.redhat.com/errata/RHSA-2026:1239RHSA-2026:1239RHSA-2026:1239 https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1239.htmlALSA-2026:1239ALSA-2026:1239 7/fence-agents-virsh-4.10.0-98.el9_7.4.noarch.rpmPfence-agents-rhevm-4.10.0-98.el9_7.4.noarch.rpm=fence-agents-cisco-mds-4.10.0-98.el9_7.4.noarch.rpm;fence-agents-bladecenter-4.10.0-98.el9_7.4.noarch.rpmGfence-agents-ilo-moonshot-4.10.0-98.el9_7.4.noarch.rpm.fence-agents-ibm-vpc-4.10.0-98.el9_7.4.noarch.rpm9fence-agents-apc-4.10.0-98.el9_7.4.noarch.rpmJfence-agents-ilo2-4.10.0-98.el9_7.4.noarch.rpmLfence-agents-ipdu-4.10.0-98.el9_7.4.noarch.rpmkfence-agents-azure-arm-4.10.0-98.el9_7.4.x86_64.rpm@fence-agents-eaton-snmp-4.10.0-98.el9_7.4.noarch.rpmdfence-virtd-libvirt-4.10.0-98.el9_7.4.x86_64.rpmEfence-agents-ibmblade-4.10.0-98.el9_7.4.noarch.rpmofence-agents-redfish-4.10.0-98.el9_7.4.x86_64.rpmrha-cloud-support-4.10.0-98.el9_7.4.x86_64.rpm0fence-agents-nutanix-ahv-4.10.0-98.el9_7.4.noarch.rpmSfence-agents-sbd-4.10.0-98.el9_7.4.noarch.rpmffence-virtd-serial-4.10.0-98.el9_7.4.x86_64.rpmOfence-agents-mpath-4.10.0-98.el9_7.4.noarch.rpmAfence-agents-emerson-4.10.0-98.el9_7.4.noarch.rpmWfence-agents-wti-4.10.0-98.el9_7.4.noarch.rpmTfence-agents-scsi-4.10.0-98.el9_7.4.noarch.rpmhfence-agents-aliyun-4.10.0-98.el9_7.4.x86_64.rpm?fence-agents-drac5-4.10.0-98.el9_7.4.noarch.rpmNfence-agents-lpar-4.10.0-98.el9_7.4.noarch.rpmQfence-agents-rsa-4.10.0-98.el9_7.4.noarch.rpmifence-agents-all-4.10.0-98.el9_7.4.x86_64.rpmHfence-agents-ilo-mp-4.10.0-98.el9_7.4.noarch.rpmDfence-agents-hpblade-4.10.0-98.el9_7.4.noarch.rpmjfence-agents-aws-4.10.0-98.el9_7.4.x86_64.rpm>fence-agents-cisco-ucs-4.10.0-98.el9_7.4.noarch.rpm`fence-agents-kubevirt-4.10.0-98.el9_7.4.x86_64.rpmBfence-agents-eps-4.10.0-98.el9_7.4.noarch.rpmUfence-agents-vmware-rest-4.10.0-98.el9_7.4.noarch.rpmnfence-agents-openstack-4.10.0-98.el9_7.4.x86_64.rpmefence-virtd-multicast-4.10.0-98.el9_7.4.x86_64.rpm-fence-agents-ibm-powervs-4.10.0-98.el9_7.4.noarch.rpmCfence-agents-heuristics-ping-4.10.0-98.el9_7.4.noarch.rpmgfence-virtd-tcp-4.10.0-98.el9_7.4.x86_64.rpmbfence-virtd-4.10.0-98.el9_7.4.x86_64.rpm<fence-agents-brocade-4.10.0-98.el9_7.4.noarch.rpmIfence-agents-ilo-ssh-4.10.0-98.el9_7.4.noarch.rpmRfence-agents-rsb-4.10.0-98.el9_7.4.noarch.rpm:fence-agents-apc-snmp-4.10.0-98.el9_7.4.noarch.rpm_fence-agents-compute-4.10.0-98.el9_7.4.x86_64.rpmKfence-agents-intelmodular-4.10.0-98.el9_7.4.noarch.rpmmfence-agents-kdump-4.10.0-98.el9_7.4.x86_64.rpmcfence-virtd-cpg-4.10.0-98.el9_7.4.x86_64.rpmafence-virt-4.10.0-98.el9_7.4.x86_64.rpm8fence-agents-amt-ws-4.10.0-98.el9_7.4.noarch.rpmMfence-agents-ipmilan-4.10.0-98.el9_7.4.noarch.rpmlfence-agents-gce-4.10.0-98.el9_7.4.x86_64.rpmFfence-agents-ifmib-4.10.0-98.el9_7.4.noarch.rpm,fence-agents-common-4.10.0-98.el9_7.4.noarch.rpmVfence-agents-vmware-soap-4.10.0-98.el9_7.4.noarch.rpm7/fence-agents-virsh-4.10.0-98.el9_7.4.noarch.rpmPfence-agents-rhevm-4.10.0-98.el9_7.4.noarch.rpm=fence-agents-cisco-mds-4.10.0-98.el9_7.4.noarch.rpm;fence-agents-bladecenter-4.10.0-98.el9_7.4.noarch.rpmGfence-agents-ilo-moonshot-4.10.0-98.el9_7.4.noarch.rpm.fence-agents-ibm-vpc-4.10.0-98.el9_7.4.noarch.rpm9fence-agents-apc-4.10.0-98.el9_7.4.noarch.rpmJfence-agents-ilo2-4.10.0-98.el9_7.4.noarch.rpmLfence-agents-ipdu-4.10.0-98.el9_7.4.noarch.rpmkfence-agents-azure-arm-4.10.0-98.el9_7.4.x86_64.rpm@fence-agents-eaton-snmp-4.10.0-98.el9_7.4.noarch.rpmdfence-virtd-libvirt-4.10.0-98.el9_7.4.x86_64.rpmEfence-agents-ibmblade-4.10.0-98.el9_7.4.noarch.rpmofence-agents-redfish-4.10.0-98.el9_7.4.x86_64.rpmrha-cloud-support-4.10.0-98.el9_7.4.x86_64.rpm0fence-agents-nutanix-ahv-4.10.0-98.el9_7.4.noarch.rpmSfence-agents-sbd-4.10.0-98.el9_7.4.noarch.rpmffence-virtd-serial-4.10.0-98.el9_7.4.x86_64.rpmOfence-agents-mpath-4.10.0-98.el9_7.4.noarch.rpmAfence-agents-emerson-4.10.0-98.el9_7.4.noarch.rpmWfence-agents-wti-4.10.0-98.el9_7.4.noarch.rpmTfence-agents-scsi-4.10.0-98.el9_7.4.noarch.rpmhfence-agents-aliyun-4.10.0-98.el9_7.4.x86_64.rpm?fence-agents-drac5-4.10.0-98.el9_7.4.noarch.rpmNfence-agents-lpar-4.10.0-98.el9_7.4.noarch.rpmQfence-agents-rsa-4.10.0-98.el9_7.4.noarch.rpmifence-agents-all-4.10.0-98.el9_7.4.x86_64.rpmHfence-agents-ilo-mp-4.10.0-98.el9_7.4.noarch.rpmDfence-agents-hpblade-4.10.0-98.el9_7.4.noarch.rpmjfence-agents-aws-4.10.0-98.el9_7.4.x86_64.rpm>fence-agents-cisco-ucs-4.10.0-98.el9_7.4.noarch.rpm`fence-agents-kubevirt-4.10.0-98.el9_7.4.x86_64.rpmBfence-agents-eps-4.10.0-98.el9_7.4.noarch.rpmUfence-agents-vmware-rest-4.10.0-98.el9_7.4.noarch.rpmnfence-agents-openstack-4.10.0-98.el9_7.4.x86_64.rpmefence-virtd-multicast-4.10.0-98.el9_7.4.x86_64.rpm-fence-agents-ibm-powervs-4.10.0-98.el9_7.4.noarch.rpmCfence-agents-heuristics-ping-4.10.0-98.el9_7.4.noarch.rpmgfence-virtd-tcp-4.10.0-98.el9_7.4.x86_64.rpmbfence-virtd-4.10.0-98.el9_7.4.x86_64.rpm<fence-agents-brocade-4.10.0-98.el9_7.4.noarch.rpmIfence-agents-ilo-ssh-4.10.0-98.el9_7.4.noarch.rpmRfence-agents-rsb-4.10.0-98.el9_7.4.noarch.rpm:fence-agents-apc-snmp-4.10.0-98.el9_7.4.noarch.rpm_fence-agents-compute-4.10.0-98.el9_7.4.x86_64.rpmKfence-agents-intelmodular-4.10.0-98.el9_7.4.noarch.rpmmfence-agents-kdump-4.10.0-98.el9_7.4.x86_64.rpmcfence-virtd-cpg-4.10.0-98.el9_7.4.x86_64.rpmafence-virt-4.10.0-98.el9_7.4.x86_64.rpm8fence-agents-amt-ws-4.10.0-98.el9_7.4.noarch.rpmMfence-agents-ipmilan-4.10.0-98.el9_7.4.noarch.rpmlfence-agents-gce-4.10.0-98.el9_7.4.x86_64.rpmFfence-agents-ifmib-4.10.0-98.el9_7.4.noarch.rpm,fence-agents-common-4.10.0-98.el9_7.4.noarch.rpmVfence-agents-vmware-soap-4.10.0-98.el9_7.4.noarch.rpm̂s7 &cBsecurityModerate: curl security updateiWAhttps://access.redhat.com/errata/RHSA-2026:1350RHSA-2026:1350RHSA-2026:1350 https://access.redhat.com/security/cve/CVE-2025-9086CVE-2025-9086CVE-2025-9086https://bugzilla.redhat.com/23947502394750https://errata.almalinux.org/9/ALSA-2026-1350.htmlALSA-2026:1350ALSA-2026:1350 vlibcurl-devel-7.76.1-35.el9_7.3.i686.rpmvlibcurl-devel-7.76.1-35.el9_7.3.x86_64.rpmvlibcurl-devel-7.76.1-35.el9_7.3.i686.rpmvlibcurl-devel-7.76.1-35.el9_7.3.x86_64.rpm8 0gBBBBBBBsecurityModerate: gcc-toolset-15-binutils security updateiehttps://access.redhat.com/errata/RHSA-2026:1359RHSA-2026:1359RHSA-2026:1359 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2026-1359.htmlALSA-2026:1359ALSA-2026:1359 YCgcc-toolset-15-binutils-gold-2.44-3.el9_7.1.x86_64.rpmZCgcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1.x86_64.rpmXCgcc-toolset-15-binutils-2.44-3.el9_7.1.x86_64.rpm&Cgcc-toolset-15-binutils-devel-2.44-3.el9_7.1.i686.rpm&Cgcc-toolset-15-binutils-devel-2.44-3.el9_7.1.x86_64.rpmYCgcc-toolset-15-binutils-gold-2.44-3.el9_7.1.x86_64.rpmZCgcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1.x86_64.rpmXCgcc-toolset-15-binutils-2.44-3.el9_7.1.x86_64.rpm&Cgcc-toolset-15-binutils-devel-2.44-3.el9_7.1.i686.rpm&Cgcc-toolset-15-binutils-devel-2.44-3.el9_7.1.x86_64.rpm̂>9 3qsecurityModerate: image-builder security updatei}*https://access.redhat.com/errata/RHSA-2026:1377RHSA-2026:1377RHSA-2026:1377 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2026-1377.htmlALSA-2026:1377ALSA-2026:1377 kJimage-builder-31-2.el9_7.x86_64.rpmkJimage-builder-31-2.el9_7.x86_64.rpm̶: :tBBBBsecurityModerate: osbuild-composer security updatei'Bhttps://access.redhat.com/errata/RHSA-2026:1381RHSA-2026:1381RHSA-2026:1381 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2026-1381.htmlALSA-2026:1381ALSA-2026:1381 1osbuild-composer-worker-149-3.el9_7.alma.3.x86_64.rpm/osbuild-composer-149-3.el9_7.alma.3.x86_64.rpm0osbuild-composer-core-149-3.el9_7.alma.3.x86_64.rpm1osbuild-composer-worker-149-3.el9_7.alma.3.x86_64.rpm/osbuild-composer-149-3.el9_7.alma.3.x86_64.rpm0osbuild-composer-core-149-3.el9_7.alma.3.x86_64.rpm̂[; {BBBBBBBBsecurityModerate: python3.12 security updateii,https://access.redhat.com/errata/RHSA-2026:1408RHSA-2026:1408RHSA-2026:1408 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1408.htmlALSA-2026:1408ALSA-2026:1408 Ppython3.12-libs-3.12.12-4.el9_7.x86_64.rpm!Ppython3.12-tkinter-3.12.12-4.el9_7.x86_64.rpmPpython3.12-libs-3.12.12-4.el9_7.i686.rpmPpython3.12-devel-3.12.12-4.el9_7.x86_64.rpm Ppython3.12-3.12.12-4.el9_7.x86_64.rpmPpython3.12-devel-3.12.12-4.el9_7.i686.rpmPpython3.12-libs-3.12.12-4.el9_7.x86_64.rpm!Ppython3.12-tkinter-3.12.12-4.el9_7.x86_64.rpmPpython3.12-libs-3.12.12-4.el9_7.i686.rpmPpython3.12-devel-3.12.12-4.el9_7.x86_64.rpm Ppython3.12-3.12.12-4.el9_7.x86_64.rpmPpython3.12-devel-3.12.12-4.el9_7.i686.rpm< 8cBUBBBBBBBBGBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.2 security updateiXhttps://access.redhat.com/errata/RHSA-2026:1409RHSA-2026:1409RHSA-2026:1409 https://access.redhat.com/security/cve/CVE-2025-1220CVE-2025-1220CVE-2025-1220https://access.redhat.com/security/cve/CVE-2025-14177CVE-2025-14177CVE-2025-14177https://access.redhat.com/security/cve/CVE-2025-14178CVE-2025-14178CVE-2025-14178https://access.redhat.com/security/cve/CVE-2025-14180CVE-2025-14180CVE-2025-14180https://access.redhat.com/security/cve/CVE-2025-1735CVE-2025-1735CVE-2025-1735https://access.redhat.com/security/cve/CVE-2025-6491CVE-2025-6491CVE-2025-6491https://bugzilla.redhat.com/23786892378689https://bugzilla.redhat.com/23786902378690https://bugzilla.redhat.com/23797922379792https://bugzilla.redhat.com/24256252425625https://bugzilla.redhat.com/24256262425626https://bugzilla.redhat.com/24256272425627https://errata.almalinux.org/9/ALSA-2026-1409.htmlALSA-2026:1409ALSA-2026:1409 (cGphp-pdo-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmaGphp-odbc-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmhGphp-xml-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm]Gphp-intl-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm\Gphp-gmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmXGphp-enchant-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmRGphp-cli-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm_Gphp-mbstring-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm[Gphp-gd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm/'apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmYGphp-ffi-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm^Gphp-ldap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmfGphp-snmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmTGphp-dba-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmWGphp-embedded-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmZGphp-fpm-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm>php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmgGphp-soap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm'php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmgphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpmAphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmGphp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmSGphp-common-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmdGphp-pgsql-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmUGphp-dbg-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmQGphp-bcmath-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmVGphp-devel-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm'php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmeGphp-process-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm`Gphp-mysqlnd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmbGphp-opcache-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm(cGphp-pdo-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmaGphp-odbc-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmhGphp-xml-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm]Gphp-intl-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm\Gphp-gmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmXGphp-enchant-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmRGphp-cli-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm_Gphp-mbstring-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm[Gphp-gd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm/'apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmYGphp-ffi-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm^Gphp-ldap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmfGphp-snmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmTGphp-dba-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmWGphp-embedded-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmZGphp-fpm-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm>php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmgGphp-soap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm'php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmgphp-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpmAphp-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmGphp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmSGphp-common-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmdGphp-pgsql-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmUGphp-dbg-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmQGphp-bcmath-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmVGphp-devel-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm'php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmeGphp-process-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm`Gphp-mysqlnd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmbGphp-opcache-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm̂u= yBBBBBBBBsecurityModerate: python3.11 security updateim,https://access.redhat.com/errata/RHSA-2026:1410RHSA-2026:1410RHSA-2026:1410 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1410.htmlALSA-2026:1410ALSA-2026:1410 j@python3.11-tkinter-3.11.13-5.el9_7.x86_64.rpm`@python3.11-devel-3.11.13-5.el9_7.i686.rpma@python3.11-libs-3.11.13-5.el9_7.i686.rpmi@python3.11-3.11.13-5.el9_7.x86_64.rpm`@python3.11-devel-3.11.13-5.el9_7.x86_64.rpma@python3.11-libs-3.11.13-5.el9_7.x86_64.rpmj@python3.11-tkinter-3.11.13-5.el9_7.x86_64.rpm`@python3.11-devel-3.11.13-5.el9_7.i686.rpma@python3.11-libs-3.11.13-5.el9_7.i686.rpmi@python3.11-3.11.13-5.el9_7.x86_64.rpm`@python3.11-devel-3.11.13-5.el9_7.x86_64.rpma@python3.11-libs-3.11.13-5.el9_7.x86_64.rpmI> 6QBBBBBBBBBBBBhBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.3 security updatei[https://access.redhat.com/errata/RHSA-2026:1429RHSA-2026:1429RHSA-2026:1429 https://access.redhat.com/security/cve/CVE-2025-14177CVE-2025-14177CVE-2025-14177https://access.redhat.com/security/cve/CVE-2025-14178CVE-2025-14178CVE-2025-14178https://access.redhat.com/security/cve/CVE-2025-14180CVE-2025-14180CVE-2025-14180https://bugzilla.redhat.com/24256252425625https://bugzilla.redhat.com/24256262425626https://bugzilla.redhat.com/24256272425627https://errata.almalinux.org/9/ALSA-2026-1429.htmlALSA-2026:1429ALSA-2026:1429 ( gJphp-soap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm`Jphp-mysqlnd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmdJphp-pgsql-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmcJphp-pdo-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmhphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpm^Jphp-ldap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmWJphp-embedded-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmaJphp-odbc-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmJphp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmVJphp-devel-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm/(apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmYJphp-ffi-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm_Jphp-mbstring-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmUJphp-dbg-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm(php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmbJphp-opcache-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmphp-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmZJphp-fpm-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmhJphp-xml-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmQJphp-bcmath-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmXJphp-enchant-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm[Jphp-gd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmTJphp-dba-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmeJphp-process-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmBphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm\Jphp-gmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmfJphp-snmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmSJphp-common-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm(php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmRJphp-cli-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm]Jphp-intl-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmRphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm( gJphp-soap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm`Jphp-mysqlnd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmdJphp-pgsql-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmcJphp-pdo-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmhphp-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpm^Jphp-ldap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmWJphp-embedded-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmaJphp-odbc-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmJphp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmVJphp-devel-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm/(apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmYJphp-ffi-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm_Jphp-mbstring-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmUJphp-dbg-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm(php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmbJphp-opcache-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmphp-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmZJphp-fpm-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmhJphp-xml-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmQJphp-bcmath-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmXJphp-enchant-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm[Jphp-gd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmTJphp-dba-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmeJphp-process-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmBphp-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm\Jphp-gmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmfJphp-snmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmSJphp-common-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm(php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmRJphp-cli-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm]Jphp-intl-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmRphp-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm=? fence-agents-cisco-ucs-4.10.0-98.el9_7.5.noarch.rpmTfence-agents-scsi-4.10.0-98.el9_7.5.noarch.rpm.fence-agents-ibm-vpc-4.10.0-98.el9_7.5.noarch.rpmWfence-agents-wti-4.10.0-98.el9_7.5.noarch.rpmPfence-agents-rhevm-4.10.0-98.el9_7.5.noarch.rpmbfence-virtd-4.10.0-98.el9_7.5.x86_64.rpmEfence-agents-ibmblade-4.10.0-98.el9_7.5.noarch.rpmofence-agents-redfish-4.10.0-98.el9_7.5.x86_64.rpmIfence-agents-ilo-ssh-4.10.0-98.el9_7.5.noarch.rpm-fence-agents-ibm-powervs-4.10.0-98.el9_7.5.noarch.rpm7rha-cloud-support-4.10.0-98.el9_7.5.x86_64.rpm@fence-agents-eaton-snmp-4.10.0-98.el9_7.5.noarch.rpm/fence-agents-virsh-4.10.0-98.el9_7.5.noarch.rpm8fence-agents-amt-ws-4.10.0-98.el9_7.5.noarch.rpmkfence-agents-azure-arm-4.10.0-98.el9_7.5.x86_64.rpmMfence-agents-ipmilan-4.10.0-98.el9_7.5.noarch.rpmlfence-agents-gce-4.10.0-98.el9_7.5.x86_64.rpmLfence-agents-ipdu-4.10.0-98.el9_7.5.noarch.rpm9fence-agents-apc-4.10.0-98.el9_7.5.noarch.rpmBfence-agents-eps-4.10.0-98.el9_7.5.noarch.rpm=fence-agents-cisco-mds-4.10.0-98.el9_7.5.noarch.rpmFfence-agents-ifmib-4.10.0-98.el9_7.5.noarch.rpmifence-agents-all-4.10.0-98.el9_7.5.x86_64.rpmAfence-agents-emerson-4.10.0-98.el9_7.5.noarch.rpm_fence-agents-compute-4.10.0-98.el9_7.5.x86_64.rpmafence-virt-4.10.0-98.el9_7.5.x86_64.rpmKfence-agents-intelmodular-4.10.0-98.el9_7.5.noarch.rpmjfence-agents-aws-4.10.0-98.el9_7.5.x86_64.rpmRfence-agents-rsb-4.10.0-98.el9_7.5.noarch.rpmQfence-agents-rsa-4.10.0-98.el9_7.5.noarch.rpmNfence-agents-lpar-4.10.0-98.el9_7.5.noarch.rpmDfence-agents-hpblade-4.10.0-98.el9_7.5.noarch.rpmCfence-agents-heuristics-ping-4.10.0-98.el9_7.5.noarch.rpm?fence-agents-drac5-4.10.0-98.el9_7.5.noarch.rpm:fence-agents-apc-snmp-4.10.0-98.el9_7.5.noarch.rpmdfence-virtd-libvirt-4.10.0-98.el9_7.5.x86_64.rpmUfence-agents-vmware-rest-4.10.0-98.el9_7.5.noarch.rpmefence-virtd-multicast-4.10.0-98.el9_7.5.x86_64.rpmHfence-agents-ilo-mp-4.10.0-98.el9_7.5.noarch.rpmJfence-agents-ilo2-4.10.0-98.el9_7.5.noarch.rpmhfence-agents-aliyun-4.10.0-98.el9_7.5.x86_64.rpmnfence-agents-openstack-4.10.0-98.el9_7.5.x86_64.rpm<fence-agents-brocade-4.10.0-98.el9_7.5.noarch.rpmcfence-virtd-cpg-4.10.0-98.el9_7.5.x86_64.rpmGfence-agents-ilo-moonshot-4.10.0-98.el9_7.5.noarch.rpmOfence-agents-mpath-4.10.0-98.el9_7.5.noarch.rpm`fence-agents-kubevirt-4.10.0-98.el9_7.5.x86_64.rpm;fence-agents-bladecenter-4.10.0-98.el9_7.5.noarch.rpmVfence-agents-vmware-soap-4.10.0-98.el9_7.5.noarch.rpmgfence-virtd-tcp-4.10.0-98.el9_7.5.x86_64.rpmmfence-agents-kdump-4.10.0-98.el9_7.5.x86_64.rpmSfence-agents-sbd-4.10.0-98.el9_7.5.noarch.rpm,fence-agents-common-4.10.0-98.el9_7.5.noarch.rpmffence-virtd-serial-4.10.0-98.el9_7.5.x86_64.rpm0fence-agents-nutanix-ahv-4.10.0-98.el9_7.5.noarch.rpm>fence-agents-cisco-ucs-4.10.0-98.el9_7.5.noarch.rpmTfence-agents-scsi-4.10.0-98.el9_7.5.noarch.rpm.fence-agents-ibm-vpc-4.10.0-98.el9_7.5.noarch.rpmWfence-agents-wti-4.10.0-98.el9_7.5.noarch.rpmPfence-agents-rhevm-4.10.0-98.el9_7.5.noarch.rpmbfence-virtd-4.10.0-98.el9_7.5.x86_64.rpmEfence-agents-ibmblade-4.10.0-98.el9_7.5.noarch.rpmofence-agents-redfish-4.10.0-98.el9_7.5.x86_64.rpmIfence-agents-ilo-ssh-4.10.0-98.el9_7.5.noarch.rpm-fence-agents-ibm-powervs-4.10.0-98.el9_7.5.noarch.rpm̫LD (fsecurityImportant: opentelemetry-collector security updatei5!https://access.redhat.com/errata/RHSA-2026:1908RHSA-2026:1908RHSA-2026:1908 https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://bugzilla.redhat.com/24184622418462https://errata.almalinux.org/9/ALSA-2026-1908.htmlALSA-2026:1908ALSA-2026:1908 Lopentelemetry-collector-0.135.0-3.el9_7.x86_64.rpmLopentelemetry-collector-0.135.0-3.el9_7.x86_64.rpm̫/E 6iBBBBBBBBBBBsecurityModerate: util-linux security updateiVhttps://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913 https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913 1Clibblkid-devel-2.37.4-21.el9_7.x86_64.rpm'Cuuidd-2.37.4-21.el9_7.x86_64.rpm?Clibmount-devel-2.37.4-21.el9_7.x86_64.rpmJClibuuid-devel-2.37.4-21.el9_7.i686.rpm1Clibblkid-devel-2.37.4-21.el9_7.i686.rpm?Clibmount-devel-2.37.4-21.el9_7.i686.rpmnCpython3-libmount-2.37.4-21.el9_7.x86_64.rpmJClibuuid-devel-2.37.4-21.el9_7.x86_64.rpm1Clibblkid-devel-2.37.4-21.el9_7.x86_64.rpm'Cuuidd-2.37.4-21.el9_7.x86_64.rpm?Clibmount-devel-2.37.4-21.el9_7.x86_64.rpmJClibuuid-devel-2.37.4-21.el9_7.i686.rpm1Clibblkid-devel-2.37.4-21.el9_7.i686.rpm?Clibmount-devel-2.37.4-21.el9_7.i686.rpmnCpython3-libmount-2.37.4-21.el9_7.x86_64.rpmJClibuuid-devel-2.37.4-21.el9_7.x86_64.rpm̫GF 87securityImportant: python3.12-wheel security updateirhhttps://access.redhat.com/errata/RHSA-2026:1939RHSA-2026:1939RHSA-2026:1939 https://access.redhat.com/security/cve/CVE-2026-24049CVE-2026-24049CVE-2026-24049https://bugzilla.redhat.com/24319592431959https://errata.almalinux.org/9/ALSA-2026-1939.htmlALSA-2026:1939ALSA-2026:1939 hIpython3.12-wheel-0.41.2-3.el9_7.1.noarch.rpmhIpython3.12-wheel-0.41.2-3.el9_7.1.noarch.rpm̫ G yBBBBBBsecurityImportant: brotli security updateiZhttps://access.redhat.com/errata/RHSA-2026:2042RHSA-2026:2042RHSA-2026:2042 https://access.redhat.com/security/cve/CVE-2025-6176CVE-2025-6176CVE-2025-6176https://bugzilla.redhat.com/24087622408762https://errata.almalinux.org/9/ALSA-2026-2042.htmlALSA-2026:2042ALSA-2026:2042 rbrotli-devel-1.0.9-9.el9_7.i686.rpmkrpython3-brotli-1.0.9-9.el9_7.x86_64.rpmrbrotli-devel-1.0.9-9.el9_7.x86_64.rpmrbrotli-1.0.9-9.el9_7.x86_64.rpmrbrotli-1.0.9-9.el9_7.i686.rpmrbrotli-devel-1.0.9-9.el9_7.i686.rpmkrpython3-brotli-1.0.9-9.el9_7.x86_64.rpmrbrotli-devel-1.0.9-9.el9_7.x86_64.rpmrbrotli-1.0.9-9.el9_7.x86_64.rpmrbrotli-1.0.9-9.el9_7.i686.rpm̒7H BBBBBBBsecurityImportant: freerdp security updateiyhttps://access.redhat.com/errata/RHSA-2026:2048RHSA-2026:2048RHSA-2026:2048 https://access.redhat.com/security/cve/CVE-2026-23530CVE-2026-23530CVE-2026-23530https://access.redhat.com/security/cve/CVE-2026-23531CVE-2026-23531CVE-2026-23531https://access.redhat.com/security/cve/CVE-2026-23532CVE-2026-23532CVE-2026-23532https://access.redhat.com/security/cve/CVE-2026-23533CVE-2026-23533CVE-2026-23533https://access.redhat.com/security/cve/CVE-2026-23534CVE-2026-23534CVE-2026-23534https://access.redhat.com/security/cve/CVE-2026-23883CVE-2026-23883CVE-2026-23883https://access.redhat.com/security/cve/CVE-2026-23884CVE-2026-23884CVE-2026-23884https://bugzilla.redhat.com/24308772430877https://bugzilla.redhat.com/24308802430880https://bugzilla.redhat.com/24308852430885https://bugzilla.redhat.com/24308862430886https://bugzilla.redhat.com/24308872430887https://bugzilla.redhat.com/24308882430888https://bugzilla.redhat.com/24308912430891https://errata.almalinux.org/9/ALSA-2026-2048.htmlALSA-2026:2048ALSA-2026:2048 V freerdp-libs-2.11.7-1.el9_7.1.i686.rpmp freerdp-2.11.7-1.el9_7.1.x86_64.rpm^ libwinpr-2.11.7-1.el9_7.1.i686.rpmV freerdp-libs-2.11.7-1.el9_7.1.x86_64.rpm^ libwinpr-2.11.7-1.el9_7.1.x86_64.rpmV freerdp-libs-2.11.7-1.el9_7.1.i686.rpmp freerdp-2.11.7-1.el9_7.1.x86_64.rpm^ libwinpr-2.11.7-1.el9_7.1.i686.rpmV freerdp-libs-2.11.7-1.el9_7.1.x86_64.rpm^ libwinpr-2.11.7-1.el9_7.1.x86_64.rpm̫wI KBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateiu"https://access.redhat.com/errata/RHSA-2026:2212RHSA-2026:2212RHSA-2026:2212 https://access.redhat.com/security/cve/CVE-2025-37789CVE-2025-37789CVE-2025-37789https://access.redhat.com/security/cve/CVE-2025-37819CVE-2025-37819CVE-2025-37819https://access.redhat.com/security/cve/CVE-2025-38022CVE-2025-38022CVE-2025-38022https://access.redhat.com/security/cve/CVE-2025-38024CVE-2025-38024CVE-2025-38024https://access.redhat.com/security/cve/CVE-2025-38403CVE-2025-38403CVE-2025-38403https://access.redhat.com/security/cve/CVE-2025-38415CVE-2025-38415CVE-2025-38415https://access.redhat.com/security/cve/CVE-2025-38459CVE-2025-38459CVE-2025-38459https://access.redhat.com/security/cve/CVE-2025-38730CVE-2025-38730CVE-2025-38730https://access.redhat.com/security/cve/CVE-2025-39760CVE-2025-39760CVE-2025-39760https://access.redhat.com/security/cve/CVE-2025-40135CVE-2025-40135CVE-2025-40135https://access.redhat.com/security/cve/CVE-2025-40141CVE-2025-40141CVE-2025-40141https://access.redhat.com/security/cve/CVE-2025-40158CVE-2025-40158CVE-2025-40158https://access.redhat.com/security/cve/CVE-2025-40170CVE-2025-40170CVE-2025-40170https://access.redhat.com/security/cve/CVE-2025-40269CVE-2025-40269CVE-2025-40269https://access.redhat.com/security/cve/CVE-2025-40271CVE-2025-40271CVE-2025-40271https://access.redhat.com/security/cve/CVE-2025-40318CVE-2025-40318CVE-2025-40318https://bugzilla.redhat.com/23633152363315https://bugzilla.redhat.com/23650322365032https://bugzilla.redhat.com/23733262373326https://bugzilla.redhat.com/23733542373354https://bugzilla.redhat.com/23834042383404https://bugzilla.redhat.com/23834212383421https://bugzilla.redhat.com/23834872383487https://bugzilla.redhat.com/23931912393191https://bugzilla.redhat.com/23946012394601https://bugzilla.redhat.com/24145062414506https://bugzilla.redhat.com/24145212414521https://bugzilla.redhat.com/24145222414522https://bugzilla.redhat.com/24145232414523https://bugzilla.redhat.com/24198372419837https://bugzilla.redhat.com/24199192419919https://bugzilla.redhat.com/24199202419920https://errata.almalinux.org/9/ALSA-2026-2212.htmlALSA-2026:2212ALSA-2026:2212 'drtla-5.14.0-611.30.1.el9_7.x86_64.rpmVdpython3-perf-5.14.0-611.30.1.el9_7.x86_64.rpm)drv-5.14.0-611.30.1.el9_7.x86_64.rpm#dkernel-devel-5.14.0-611.30.1.el9_7.x86_64.rpm!dkernel-debug-devel-5.14.0-611.30.1.el9_7.x86_64.rpmdkernel-doc-5.14.0-611.30.1.el9_7.noarch.rpm%dperf-5.14.0-611.30.1.el9_7.x86_64.rpm&dkernel-headers-5.14.0-611.30.1.el9_7.x86_64.rpm$dkernel-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm"dkernel-debug-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm 'drtla-5.14.0-611.30.1.el9_7.x86_64.rpmVdpython3-perf-5.14.0-611.30.1.el9_7.x86_64.rpm)drv-5.14.0-611.30.1.el9_7.x86_64.rpm#dkernel-devel-5.14.0-611.30.1.el9_7.x86_64.rpm!dkernel-debug-devel-5.14.0-611.30.1.el9_7.x86_64.rpmdkernel-doc-5.14.0-611.30.1.el9_7.noarch.rpm%dperf-5.14.0-611.30.1.el9_7.x86_64.rpm&dkernel-headers-5.14.0-611.30.1.el9_7.x86_64.rpm$dkernel-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm"dkernel-debug-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm̶+J %_BBBBsecurityImportant: libsoup security updatei https://access.redhat.com/errata/RHSA-2026:2216RHSA-2026:2216RHSA-2026:2216 https://access.redhat.com/security/cve/CVE-2026-0719CVE-2026-0719CVE-2026-0719https://access.redhat.com/security/cve/CVE-2026-1761CVE-2026-1761CVE-2026-1761https://bugzilla.redhat.com/24279062427906https://bugzilla.redhat.com/24359612435961https://errata.almalinux.org/9/ALSA-2026-2216.htmlALSA-2026:2216ALSA-2026:2216  libsoup-2.72.0-12.el9_7.5.x86_64.rpm libsoup-2.72.0-12.el9_7.5.i686.rpm libsoup-devel-2.72.0-12.el9_7.5.i686.rpm libsoup-devel-2.72.0-12.el9_7.5.x86_64.rpm libsoup-2.72.0-12.el9_7.5.x86_64.rpm libsoup-2.72.0-12.el9_7.5.i686.rpm libsoup-devel-2.72.0-12.el9_7.5.i686.rpm libsoup-devel-2.72.0-12.el9_7.5.x86_64.rpm̬wK 3fBBBBBBBBBBBsecurityCritical: keylime security updatei|+[https://access.redhat.com/errata/RHSA-2026:2224RHSA-2026:2224RHSA-2026:2224 https://access.redhat.com/security/cve/CVE-2026-1709CVE-2026-1709CVE-2026-1709https://bugzilla.redhat.com/24355142435514https://errata.almalinux.org/9/ALSA-2026-2224.htmlALSA-2026:2224ALSA-2026:2224 5keylime-tenant-7.12.1-11.el9_7.4.x86_64.rpm4keylime-registrar-7.12.1-11.el9_7.4.x86_64.rpmGpython3-keylime-7.12.1-11.el9_7.4.x86_64.rpmZkeylime-selinux-7.12.1-11.el9_7.4.noarch.rpm6keylime-verifier-7.12.1-11.el9_7.4.x86_64.rpm2keylime-7.12.1-11.el9_7.4.x86_64.rpm3keylime-base-7.12.1-11.el9_7.4.x86_64.rpm5keylime-tenant-7.12.1-11.el9_7.4.x86_64.rpm4keylime-registrar-7.12.1-11.el9_7.4.x86_64.rpmGpython3-keylime-7.12.1-11.el9_7.4.x86_64.rpmZkeylime-selinux-7.12.1-11.el9_7.4.noarch.rpm6keylime-verifier-7.12.1-11.el9_7.4.x86_64.rpm2keylime-7.12.1-11.el9_7.4.x86_64.rpm3keylime-base-7.12.1-11.el9_7.4.x86_64.rpm̲HL 9tBBBsecurityImportant: gimp security updatei9https://access.redhat.com/errata/RHSA-2026:2707RHSA-2026:2707RHSA-2026:2707 https://access.redhat.com/security/cve/CVE-2025-15059CVE-2025-15059CVE-2025-15059https://bugzilla.redhat.com/24322962432296https://errata.almalinux.org/9/ALSA-2026-2707.htmlALSA-2026:2707ALSA-2026:2707 9|gimp-3.0.4-1.el9_7.3.x86_64.rpmm|gimp-libs-3.0.4-1.el9_7.3.x86_64.rpmm|gimp-libs-3.0.4-1.el9_7.3.i686.rpm9|gimp-3.0.4-1.el9_7.3.x86_64.rpmm|gimp-libs-3.0.4-1.el9_7.3.x86_64.rpmm|gimp-libs-3.0.4-1.el9_7.3.i686.rpmц&M zBBBBBBBBBBsecurityImportant: golang security updatei? https://access.redhat.com/errata/RHSA-2026:2709RHSA-2026:2709RHSA-2026:2709 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61732CVE-2025-61732CVE-2025-61732https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24370162437016https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-2709.htmlALSA-2026:2709ALSA-2026:2709 IZgolang-race-1.25.7-1.el9_7.x86_64.rpmZgolang-docs-1.25.7-1.el9_7.noarch.rpmZgolang-tests-1.25.7-1.el9_7.noarch.rpmnZgo-toolset-1.25.7-1.el9_7.x86_64.rpmZgolang-src-1.25.7-1.el9_7.noarch.rpm?Zgolang-1.25.7-1.el9_7.x86_64.rpmZgolang-misc-1.25.7-1.el9_7.noarch.rpm@Zgolang-bin-1.25.7-1.el9_7.x86_64.rpmIZgolang-race-1.25.7-1.el9_7.x86_64.rpmZgolang-docs-1.25.7-1.el9_7.noarch.rpmZgolang-tests-1.25.7-1.el9_7.noarch.rpmnZgo-toolset-1.25.7-1.el9_7.x86_64.rpmZgolang-src-1.25.7-1.el9_7.noarch.rpm?Zgolang-1.25.7-1.el9_7.x86_64.rpmZgolang-misc-1.25.7-1.el9_7.noarch.rpm@Zgolang-bin-1.25.7-1.el9_7.x86_64.rpmх-N GsecurityModerate: edk2 security updateiFGhttps://access.redhat.com/errata/RHSA-2026:2776RHSA-2026:2776RHSA-2026:2776 https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2026-2776.htmlALSA-2026:2776ALSA-2026:2776 edk2-ovmf-20241117-4.el9_7.3.noarch.rpm3edk2-aarch64-20241117-4.el9_7.3.noarch.rpmedk2-ovmf-20241117-4.el9_7.3.noarch.rpm3edk2-aarch64-20241117-4.el9_7.3.noarch.rpm׆;O JBBBBBBBBBBBBBsecurityImportant: nodejs:24 security updatei Bhttps://access.redhat.com/errata/RHSA-2026:2781RHSA-2026:2781RHSA-2026:2781 https://access.redhat.com/security/cve/CVE-2025-55130CVE-2025-55130CVE-2025-55130https://access.redhat.com/security/cve/CVE-2025-55131CVE-2025-55131CVE-2025-55131https://access.redhat.com/security/cve/CVE-2025-55132CVE-2025-55132CVE-2025-55132https://access.redhat.com/security/cve/CVE-2025-59465CVE-2025-59465CVE-2025-59465https://access.redhat.com/security/cve/CVE-2025-59466CVE-2025-59466CVE-2025-59466https://access.redhat.com/security/cve/CVE-2026-21637CVE-2026-21637CVE-2026-21637https://bugzilla.redhat.com/24313382431338https://bugzilla.redhat.com/24313402431340https://bugzilla.redhat.com/24313432431343https://bugzilla.redhat.com/24313492431349https://bugzilla.redhat.com/24313502431350https://bugzilla.redhat.com/24313522431352https://errata.almalinux.org/9/ALSA-2026-2781.htmlALSA-2026:2781ALSA-2026:2781 9\ ( <9nodejs-devel-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm+nodejs-nodemon-3.0.3-3.module_el9.7.0+209+ecf6523e.noarch.rpmfnpm-11.6.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e.noarch.rpm#nodejs-packaging-bundler-2021.06-6.module_el9.7.0+198+8bf605ba.noarch.rpmh9nodejs-full-i18n-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm99nodejs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm(Rv8-13.6-devel-13.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e.x86_64.rpm$nodejs-packaging-2021.06-6.module_el9.7.0+209+ecf6523e.noarch.rpm9nodejs-libs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpmN9nodejs-docs-24.13.0-1.module_el9.7.0+209+ecf6523e.noarch.rpm9\ ( <9nodejs-devel-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm+nodejs-nodemon-3.0.3-3.module_el9.7.0+209+ecf6523e.noarch.rpmfnpm-11.6.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e.noarch.rpm#nodejs-packaging-bundler-2021.06-6.module_el9.7.0+198+8bf605ba.noarch.rpmh9nodejs-full-i18n-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm99nodejs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm(Rv8-13.6-devel-13.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e.x86_64.rpm$nodejs-packaging-2021.06-6.module_el9.7.0+209+ecf6523e.noarch.rpm9nodejs-libs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpmN9nodejs-docs-24.13.0-1.module_el9.7.0+209+ecf6523e.noarch.rpmׇgP $ZBBBBBBBBsecurityModerate: glibc security updateiO|https://access.redhat.com/errata/RHSA-2026:2786RHSA-2026:2786RHSA-2026:2786 https://access.redhat.com/security/cve/CVE-2025-15281CVE-2025-15281CVE-2025-15281https://access.redhat.com/security/cve/CVE-2026-0861CVE-2026-0861CVE-2026-0861https://access.redhat.com/security/cve/CVE-2026-0915CVE-2026-0915CVE-2026-0915https://bugzilla.redhat.com/24297712429771https://bugzilla.redhat.com/24302012430201https://bugzilla.redhat.com/24311962431196https://errata.almalinux.org/9/ALSA-2026-2786.htmlALSA-2026:2786ALSA-2026:2786 9glibc-devel-2.34-231.el9_7.10.i686.rpm9glibc-devel-2.34-231.el9_7.10.x86_64.rpmG9glibc-headers-2.34-231.el9_7.10.x86_64.rpmH9glibc-locale-source-2.34-231.el9_7.10.x86_64.rpmC9glibc-doc-2.34-231.el9_7.10.noarch.rpmI9glibc-utils-2.34-231.el9_7.10.x86_64.rpm9glibc-devel-2.34-231.el9_7.10.i686.rpm9glibc-devel-2.34-231.el9_7.10.x86_64.rpmG9glibc-headers-2.34-231.el9_7.10.x86_64.rpmH9glibc-locale-source-2.34-231.el9_7.10.x86_64.rpmC9glibc-doc-2.34-231.el9_7.10.noarch.rpmI9glibc-utils-2.34-231.el9_7.10.x86_64.rpmׄ Q eBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security updateiKfhttps://access.redhat.com/errata/RHSA-2026:2799RHSA-2026:2799RHSA-2026:2799 https://access.redhat.com/security/cve/CVE-2025-14177CVE-2025-14177CVE-2025-14177https://access.redhat.com/security/cve/CVE-2025-14178CVE-2025-14178CVE-2025-14178https://bugzilla.redhat.com/24256252425625https://bugzilla.redhat.com/24256262425626https://errata.almalinux.org/9/ALSA-2026-2799.htmlALSA-2026:2799ALSA-2026:2799 b@php-opcache-8.0.30-5.el9_7.x86_64.rpm_@php-mbstring-8.0.30-5.el9_7.x86_64.rpmf@php-snmp-8.0.30-5.el9_7.x86_64.rpmQ@php-bcmath-8.0.30-5.el9_7.x86_64.rpm`@php-mysqlnd-8.0.30-5.el9_7.x86_64.rpmh@php-xml-8.0.30-5.el9_7.x86_64.rpm[@php-gd-8.0.30-5.el9_7.x86_64.rpmg@php-soap-8.0.30-5.el9_7.x86_64.rpmd@php-pgsql-8.0.30-5.el9_7.x86_64.rpm^@php-ldap-8.0.30-5.el9_7.x86_64.rpmc@php-pdo-8.0.30-5.el9_7.x86_64.rpmW@php-embedded-8.0.30-5.el9_7.x86_64.rpmS@php-common-8.0.30-5.el9_7.x86_64.rpmX@php-enchant-8.0.30-5.el9_7.x86_64.rpmT@php-dba-8.0.30-5.el9_7.x86_64.rpmV@php-devel-8.0.30-5.el9_7.x86_64.rpme@php-process-8.0.30-5.el9_7.x86_64.rpmZ@php-fpm-8.0.30-5.el9_7.x86_64.rpm@php-8.0.30-5.el9_7.x86_64.rpmR@php-cli-8.0.30-5.el9_7.x86_64.rpma@php-odbc-8.0.30-5.el9_7.x86_64.rpmY@php-ffi-8.0.30-5.el9_7.x86_64.rpmU@php-dbg-8.0.30-5.el9_7.x86_64.rpm]@php-intl-8.0.30-5.el9_7.x86_64.rpm\@php-gmp-8.0.30-5.el9_7.x86_64.rpmb@php-opcache-8.0.30-5.el9_7.x86_64.rpm_@php-mbstring-8.0.30-5.el9_7.x86_64.rpmf@php-snmp-8.0.30-5.el9_7.x86_64.rpmQ@php-bcmath-8.0.30-5.el9_7.x86_64.rpm`@php-mysqlnd-8.0.30-5.el9_7.x86_64.rpmh@php-xml-8.0.30-5.el9_7.x86_64.rpm[@php-gd-8.0.30-5.el9_7.x86_64.rpmg@php-soap-8.0.30-5.el9_7.x86_64.rpmd@php-pgsql-8.0.30-5.el9_7.x86_64.rpm^@php-ldap-8.0.30-5.el9_7.x86_64.rpmc@php-pdo-8.0.30-5.el9_7.x86_64.rpmW@php-embedded-8.0.30-5.el9_7.x86_64.rpmS@php-common-8.0.30-5.el9_7.x86_64.rpmX@php-enchant-8.0.30-5.el9_7.x86_64.rpmT@php-dba-8.0.30-5.el9_7.x86_64.rpmV@php-devel-8.0.30-5.el9_7.x86_64.rpme@php-process-8.0.30-5.el9_7.x86_64.rpmZ@php-fpm-8.0.30-5.el9_7.x86_64.rpm@php-8.0.30-5.el9_7.x86_64.rpmR@php-cli-8.0.30-5.el9_7.x86_64.rpma@php-odbc-8.0.30-5.el9_7.x86_64.rpmY@php-ffi-8.0.30-5.el9_7.x86_64.rpmU@php-dbg-8.0.30-5.el9_7.x86_64.rpm]@php-intl-8.0.30-5.el9_7.x86_64.rpm\@php-gmp-8.0.30-5.el9_7.x86_64.rpmR XBBsecurityImportant: grafana security updatei1q https://access.redhat.com/errata/RHSA-2026:2920RHSA-2026:2920RHSA-2026:2920 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://access.redhat.com/security/cve/CVE-2026-21721CVE-2026-21721CVE-2026-21721https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24332422433242https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-2920.htmlALSA-2026:2920ALSA-2026:2920 pgrafana-selinux-10.2.6-18.el9_7.x86_64.rpmopgrafana-10.2.6-18.el9_7.x86_64.rpmpgrafana-selinux-10.2.6-18.el9_7.x86_64.rpmopgrafana-10.2.6-18.el9_7.x86_64.rpmKUFor detailed information changes this release, seee AlmaLinux R Not0linkNfrom'Referencsec^.3xw XZ Util]s anctegrat7coll& of user-space fmpressu@itiWb}doLempel-Ziv-Markovɡalgorithm (LZMA), which perossl[ datai. TW?provide highÔr?Ykeepingde%time short. SecuWy Fix(es): * gzip: arbitrary--w%e vulneraby (CVE-2022-1271) moroաboutsgissue(sincludimgt,CVSS scG cknowgments,j/r8,ftoR pagms,ViVi IMaed)updgyim verJ$Ovi editorPvim: U.Out-of-r Po{r OffsetvV0554)@Heap-lBuff6v=low octs?943?y4202hr blol+621+&-read'9'usf{freeutf_ptr2)r51SExpatG C.bN fpa?XML docu<eC: st hausv9typeM;2531=in8pyStr8():w1kernel pvaIconta3!,anyopeNsyomC: Small tableturb sizeTCP sourcx gen^ocnl:k012){rdiU_evf_ƤTsUprivescal^Y7Ya--netsub$lrooq966tomIP ESP tscode76K Bug`make SHA512_ar1.sCRYPTO_USER4-ins (BZ#20726SR-IOVgan*> 50%d3483fixrrupiauyby dm-1 982187mCTP cli$-sid eloffns [al(_-9]<404#n finasymmec8.61102)Mozillabird# ndg mZnewsg4p. TO K 91.11_: CS jbox0dL`ow-s`beD pasz/regeijava+.RI,34468)uU nsSHj8708Apnd] could a way l hdd@ ba webT p9pMsafbugs` iFi}7׫ESR{Y84nd atbuan oto.20&ɳDa0}g OS PGP gna Lwas|ceptslidc26c9 en[sty1hej 1745ilyPACulOfreqsebled2XPoiu=ReceEleeA8SquiVf-@ Jx, fs,p"FTP, GopHT' b obs: DoS xcezgM|p/ es1-467/ -jdkAJDK 1J/ RunEnon+Softwa!D lop,Ki* xhaveHen?3a r D:(S0.168).77Ct " BXa -J (JAXm82073416Ocl{r ilN(HotPtF1859 1XFpIrMedH .invokeBasicoaa? rh1991003 pE br s#n..pkcswr er.PKCSInce7@,P[L9e#GYKeyje/imz^ don'tKA_SIGNMFIPSg{107ǡ{Rct s1@e6=gevh.8.0-8,*T+(.342.b06$08/V/z95V.u-Graf n%, fe h ushboargqh G, InfluxDB &TSDBeAua ccount3keg 107$7 7 +T(174 9aratm\sL8J3875J9Prous\s&"abhe )+ AirdfacSNi%a"mumoi*5at%dedE%i0=\g!e3</W0pv,qwfBlaeU`9 wce</Nfigu105395ޢ/r'>T'ma;v_8i~uTboh-D}HeSPF=U-D..fips=f e,ڢan{r'{F1lEha} rIi7e,Ṇ1 x Ma7uless- (! ed¶3\ -" browsg:rdli, {|t2UU 3.150LDOxebuF\*ft*URLamet631MoPos#ofC0)#GFGo T!!8 s+Go  !lb.,Zn. y ngo<. 6  r e*Q:%R/p+'RO.0)I/http T.En4%V17Ugo/Y(er̛"P*sM962Mew/xmlPDe%r.SkipW81io/fsBGlob(0:Kh/!BU#rshF3Fgob K$#: NewS]leH`seP- omit X-warn $worj2148v C t-git`es9b]UXGoJI7L+8PHPHTML-embe $mS$ApacS:phpsswordexve^ ngM4& F) o RCE-4)N/O%Wr+88*o*0+_reg)+_> rxp.cK897KS/i-/EmbyteD927MaF)-%$, thBSQLHb * is((omp pMy40gal (26 11), mdb0.5._ysql-sel (5)p=: ou3M9w@ :ack_ on _co_to_in(%-KxBIGINT!O JE6l2 h fUo@5uTf\'o~0wiag -;&0,8˒exfnc/k] .o,v50 av(befui"a(t,ifi51uCONNECT SREng'4P(E(V5p2pir3;I_s::walk D73Dpoison exivoli.% X7Xcr0,_tmp_1::f1F8F(_B or:: e_r*_X9Xmy_d::uor=A80AField:: IfaH&=y)f^s2cTRfx![s/`_w_a)__^oSy_$ca8~8I4N0*V3V#ɺ2ee::-_vr_ct _/kǮ4eN%ry_are$SEL(view`d(__s8V]HAVINGNOT EXISTd|a&q+c&_elf445IS NULLޡ _;BTi& :_M7&ɤv B it Q*GR4/iL3.ccA;)in ; ORD4BYO5 ‘u˔5LWHERE$h n er ind(˩VD3:/_ȴinK"due"-:=,gD3iqueP$)o5')TPund/=bup/ds  2XkCc5VIEW= gg \9S| 5  nLfi_:d ^*n 9b(CTE 1˚ 13_,::VɹerG>|3|+ &_p'joa# ă4 P8ȏbec8jk Ĉ5- y~D2IN 8b+S+= 3csi_i>l>049[kc_1_y<s d/cls_api 0[9 ower9LPAR';t:Shaxp,.:(#s[H&22H$+:_Dyss-ng`TsOF5fi|nam>3 gfs2;=?h dvo#>(^<#oc 7,e5DAP{:f en6ofti85;Un5j7+#575-KRBmt2C*$T;3 #A:*#vXSLT-89Cro(inhe%nt's+e3e$4>2;$2Y7!Y,V,mzm$D;pP: PK11_C'PWS6 '3'j>*SSL@'ki }@_NOCHECKSo3P#S31lHIn$71mgnutlsFFDHE8032 . TZ3DES+3v4Bs uD3ll&c v,|LN5508]mUC`ECDSA k/ZTs_-w ip256k1>[XxM19/XS6UCo#X8p-onSl+FKAT8$=1RRsPon23+qs G uYOZtKwsu&]|iN5(O5[IBMHW$T] POWER10pPe/5\yG|[ 1ew]R-R*1*DH tTg*5856*EC*7*S+8+AND,9,zero-,_,HKDF5mi 147?QK4/go"~ VM6SkI .L!K 9usri%K. X!I vm-/:4dTMh]4 164 5 Z6 999QDOf-- ASP]CMVC/s-" MlS=DQ; ru. 0YwRubxa< ow+prL,Z)en(/O"?xt)ȢMsk94+r(p4=1e]28)JIu! R-= 87:)Sr=[-F6tEl9y(.>-iLM daem0-d!mk5a866Hw (E0J,8J2:26 tzerXunB,d>6C(Xg2r Z?4143567840529678$Dv3NNN$V5VInno"/j1512DDL/22*iFTS$=27NG'PluK#c5ʲPAM EZJulZ5/ZεLog#R60R!` 505;52678O30153o69R "5+T3(2gP= d!.22vedeyd$@4: E#_d ,D2logroE tjr(lVN .jG} $dBIp^ BfasIZ ;%EISZ 2?75Y nϡ(_SbS- 29t $?  G$:MtNX c INImu0-778 Hg4-og`s, 0 4Ka -O:JReWV) mXANSI'%D17lrze- B!B43502p] o 7v%.gitS.+CSW2Z20$R+/mlx5jnujDrlNX#ntr /7 8,B tC+"dB\-\ke,extOp-.G5wF'J0)un1U`M"u-: WR0xVamazo4.32xiPn9nX86/ /UV-ST/Fi[KUV5 77Gl!:#2-sync s\  0.b>mq_]2_h- _Ma[9J 0.zw11ONVMe/lderak n-donips,nic^77WAd[nvmeӪa0-7(/tcp9iVFstag3Brq()_)l(qf)O'mI QR bY&929x2 9/ppc64 I]# & "T "=aTwlscpu+" 17,/ */ HvwJ1AMX 2amx0C8, bf- H82L1G pm#H!4!avf"19Q&i40e"dWebVGTKI'l8(re+e B:qB7x%2gtk&2.36.7)+*:4( @Rfkx R:289])***(**(BfSFPo=dEB k4_" )-5 9UTF-8C YL)5.)3Y*"e$#4 __Mn__8pvix8l[gs-g4 -ZhC6ChsTCjWASMARM64T -00KGLnnS-6_#rJl)2nNjMEz8&resh G/-2022-3033) * Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVER40959SData-race when0r`non-UTF-8 URLs iThreadL60LMemory safety bugs fixed?Firefox 105 andESR2.3Y2YRYte contspecifiYan HTML documthat was n#side'iframe's src. at8bute.ot block3ċAG elepemailuld [gger atworkqu]4Ca6x SDK@ndlwith Th erbird vulnerable to denial-of-serviceacke60KSecJ CZxtL forokiD__Ho__8pǡd8l[nt-1ity-base- bC6CIncohernucachbuildWASMARM64T7) Fֱe9ts abou6e s issue(s),mcluW impact,CVSS scG cknowgs,!othrelaMma, 2Rm liR&ences:.TBerk{yter\ NDo|n (BIND)mpy ofX)5Syrm (DNS)otocols. Ees `(n8d);.ollibra(rKines=app{susifacWZ~;7tool=Wifyzaipt r"ly. SFix(es): Hbind:9sQfigǢw 7wYfromYzero stale-!-time3may minaDunexpedly8'm$leakECDSASEC/E8177FsGdGExpat Cz2XseE:Cusf-freexdo funnxmlde.cZ674TSquidThigh-pXncexypweb clisupporFTP, GopHTTP dn objrs:ffovzSSPILSMB authv131gnutpv v3GNU T p LayhN(GnuTLSg,tich ryptograp algormsѡ6 SSL, RD Nettle1OBigndfit easilyalmRy xtN kit7-en=langu,C++, Pyth}2Pike,fl LSH!GPG+evekRlc  䪈followhave be2upd@ reamss:(3.7.6nn;8) 3:u d&_pkcs7_'.2509 Bug[IBM 9.1] [P10] POWER10 enh4y:u-r l (BZ#2 58( AMd KAlmaLinux385! DES-CBC g{ FIPS41531 ah uRkeys <22FmK9770).NET ed-softwar9 . Ita9bs@  C- APIsevi l?wi CLRn "wsd`add il navE. eZdfU'V3 6.0.1Run 0jdot: Nug poisonvia.ld-wBڤ+di~ :Ng.jsXPdlop} ppkn fa(scal(yJScript{gmD. 6nϡ(16.17.1{':aomnWebCgez35255)>RSmuggOduin "hea,lo[j-17- njdkOJ17Environy+SDKit?:rS MultiByr;no ` f(JGS 82860 16 eexce{ :X. ceG e(h5h26hHttpS nonlimiL twe2c9c̯2haloNTLM h 4sá,9_nsjicFiz+hJNDI numb(0ƿ4_miNI /2 (NO936ï3939h Prep6or4nquarR n\releas10, Z0.5) [a0 l:-9]329 .8.0 8 *& o11+p1V71) ur{DbrowW,+undar com7 ,/7b' s}9w.01"4 JSEginmviolkU[cross/ 292 CupJSg:&Dni w.prie>} 6d} 4Y6 e sgpwL{w fon by lciouad2istor7924)g!9x-je1e"h"clb3"P7'/¾=1 ;VariLN78zma-l^l"mp0U ddifw" *p-E&d. orif .1rgszip ra43a3!,c}%sC&cpu rJ C%ml vilee=cUn(dTKc&PTRACE_SEIZEWO_SUSPEND_)%COMP`3-)cras+!^booT14/G2 AMD^p (mt7921eiule))5,execveA,.ntD+ced666 JblscrvVGA Uput someNs.201needQ(oa+yhee,DRBGf miycfN')vx)watchdog BUG:k. - CPU#30u 34s! [swer/30:0]O785UV ,5.16"A Bad L qemu-kvm pfn:68a74600?vfio(Ems 2M H+a5>879Vhpa2)9 E!(Nlo!e hpiloq& HPE RL3 Gen", (aarch64f94&$*T, aGve,u$_% !3cl, g yb'vcdy25%.typedl. tC+eB9Cpib t = & sp}:u()PyL_FSt$doeL/wamddp tgv)ptto$S0g735pPublK-fra.@ (PKI)b esQdaA0i,4 $CC-ki-:OSxteeyt/ 2J+XXE41 lua ]ILuapowtulVG-Ndn".Vlso'("ntld \ ,- #:%  G_errCsde.c"unrora )7 < 30)ImB$ei0&[$cuszMOS aac*VM̳SOST  mi% use'sS((hoodgo: h/bi l(o .Flo`'nd R:1Tpani'en0d m iTh,i(jn218&i Chhes:Ҥj c%Ti', seRBN\,n podmanl)s`.gs)D.r)<3fv.5!#Kub4eN.org/x/-PnPEAcULUl)-u-Z3288#-gv Ycp47 tagf):m`eD.wFgvp?1QbounMa IP1(R8H 3r _sQ as i;XTdR *B/s8:~ c[>29^X-/h6l ePYwesfirs emp,l33,l//> wr A--t _45u _"in}>ws 7271>skf!mm fyou insj7]7 g - lQ/ creUyles,4J ygn(rv9fa% Npt;sic35cg-f5' a | g ndE: &tuaWdisk y: _T2 t<-&icsi"M:onS6y/UUID/&*, rscrm 0KFVhMh(KVMK@(F?u]M/rItecV5p-}9_run5  .6)4(.0)0647FBQEMUqcd-ehciMA Ecu 7G"Nfdcaad=qfU L507L5l-hda:aa ,sr"+K6KNULL er]pci_$7eYhw/acpi/hp.~ 415Ay%-v2vcGRcUCcKVM ') hyp sor EXiI3; wbo p4 :ssociN+ta.zso,O9 ۢIO drivpo~ k:H$PPb$GooglJ/.3Ce*$d? /yet R/#fl5,8"BommeisU;seri8Ł9Id:nar.mbolN%pt25=GI"(CMpulPiI!' si *e,.RX )vnD,Nr_~ed#4(8.5031 3F8'nwۡjNumOfNWF< : :08>ah Qling OCIQs^ m`>tD:sc'to:(@ Y:N6iBA8#i;V$KlW$=TvackF;!- KHlsU]*R9,(urz#vMdh< i[ FriBidi] $ KsJn%ex Hebrew, ALc)aplay^d7^:@;-,X"*Ftselfl$tPlogM-> fZ 8 9a3425V)7HJ30- _ _rtl_to_4 SVN9NSEGV>ve_ marks=1AGQt5 Qt 5.P 5&Qt:M& IPqQP0z:)2ub$n?r EO,C.f(%xPATH8mM:8N@FGTK$&@l@re*Ge <:BB,FY:gtk: U 1 o@ deM 2D9P8PQ9QC[_ YsI2 Bf:af<S=6700:cP9TSDB8rUgG!85p553Cf2tdl?3UK!zin1UrlH1-5B4(:RTM!-E>170qgo/Hr:D!exhausm.*Mf2: F OAu I@t)TokeP5F;Y n 167;pro)heus/-_D?I;vH. u!]ªYin›D42VCSRFFY 2>O3OIDOROh171Q3e"/JD3 SkipI8(LIio/^ BGlobd630:"/@BR.IÄpߌ2Unm hjFXgob XK \S]leh- o:X-Q] j21^>unbd(ac8=P1Qgg8(1.Q\287@)4\gdiI"_sTloVednS&qA.82Zp`T<$$97(?NA<79mT<2:1_ad/h*xyon394R;=Us46uni oVur: bodyO2c OrV8i orqAmLb?#`Bi21Źp_ajprXpsa`C638l94045o7 522ʮ:Edq pe@hoyy-htF&T181Outp,#o,8614<p_cmp_mA5>I" +sMa'q>f-7 f1yGoSuG$TCP! 039A dnsmasq D-DD(N)?DHCP'HvC64-)#x JUZdhcp6_no_y/9uO~ LACP `FLQA8oZD. *is!=milaOgg Vo $=)810?-lxp,@>=;822fN: x in(_fifo_ved_X_5050O>>8CM F DF (OCF) a CnRAAi1haUbinher^ny* 1):$Redis( advPdm-'eR.of#;zTI-3 si66s0Oah1sGwets, and sorte. For performance, Redis workith2 in-memory data9. You c6) R,etails about sissue(s),clu impact,CVSSsG cknowledgolrelain¢,f3R pagm l,R&es:^Addi al Changes:Ҥj o %TeasseefAlmaLinuxp Not0linkNfromΎToolbox ist fMoz9symJcllowsSumofFnnerizqTl Itjbuilttop>Podmanust arJX technoiOCIgol4: net/http:r sanz^f Trans-Enco'head(x170Uio/fckhausMGlob930630:press/gzipBR~.I1Ipath/f0ߌ2]iffh  XTag ImOFileTIFC }: DjjIH56pBNuNF pol"^2^rer.865.O|-{!cp24=.-buff:.c m 35Ą _cpy>T_q xV284ĔhT “exctS[9pPddrg bF hN[lsdirü~ 8tDiz e By Zerorop89RawDStedfÒN;W HPHTML-embedOC }ummonlS}pacHTTPo7php0.2575 hpArduee_fat(Wail j1-2Qnime arraRpg_b ry_am ,jo RCE316>O-JPEG<wrijE2000ijajpeg mfa opj2_dekyu=12=DgcoIM c U UNIX kten >mari;als smaPOP3txe-mBŢm SQL du1nt plug-z subzd): ( escalZwhSimimasnon-zdb|05 :Mut E fb"tW ?d MIMEycn[KmoU!s+lM,weA 6^m: uuT a 28da, sl,Ad+bo) )Be/gobAD .KiRewS]leH Rse!xy - omb.X-wed t.j214=V Y/AnJSON(YAJL) <nt-SAX-style)7n ANSI CKCv_ da5gen-oyajl3 Qg:xatD5T479=Udpdk d{ 1W P,e D{ op Kit/teth>qvfaa, & spaD":Ca Vh+@sthaUwo o$s m5 1eDPDK/,vy___l _fymay2b1-383 rv3ilx54Tz d/l%R #819A~ kern*3W!,1any/3off-! '+4rXU55or BatHc '?. s[ 0-3651!*g--vulb+in_so-"ms64 smb2_ioctl# d# 016*idf_"]_. _icbd)y,b[617wiotlb!kDMA_FROM_DEVIg08"*s,Hr nft_do_uin&$ ,UMi10J HWspcm_hw_PoM4S 78p4Gmŷoarupk18#c@8urywbe%`drm%,m_F*_get3,28cKYpfkey_:353 in P9k_htc_Rbei6(&%anofß67 x86_3e_]n%185} o ysufd:tpG99nf_)s%-)poten@£loCg258  FMH_sfa_4G#26,s-P_Dv23din-ean-uO8mri-sha' 乮 SBDRNc3Ni]architufZ'TST5T5ifRC&_DRPW_6po/0del3Nz#;ofUo]149AMD:+tBle@Arb26*p)= r,6en1usitJ!(*hr|6z#(3rF[5..γǤoisbe%&" 1-ifinq @65.whol!b""u)n olE z-*9g@B) m+awu*el7434@2zE3own(fu!vouat!), Fe1~}:dH IPv63 nԩ I1777=^7ba@n!sMe2Blo[SMB) [8C+(rn~0SIFS;DV- P ma; ne ;pr\ C.6-,s,(4.16.4/,7748E;2)8is?E1$274=)F   :, &font<gJ6@$c,-A$[>sW[r.9d0u glyph)f "ly$W: sfn`i\$*40>SQ,viol a FNT_S _R!H5HtHTBOG=6!pre, ac{ Kb-orhe.gM0mV{1 m?^cla:, cepx 9 p'dynam %dl.S"*x'tABy  C2,3 .w([-7p3.9 (;A}24?6:q-D: findch2Bdo sea5A150^!;;~.pyc?ur1H7> e2fsD mu"5O':ym 4R 98d'Odah,KBugc(6est)v Nnew "sItS1"04=Unf-=brokeh*nt!n53p.</8>/cni.d . /?///X9 XkPd1=[x ]747Y& 4.jsgeC7mpt(ssuddenfwerIH3627CPANIC&- q# &/panic>8Enh+ 髺Tvolume++shbe5 [al-9D0 Z67[RFE][o\Xstom aP unlth5+1).NETd-Pfe e9+eC-@ ,=B lLR N0 sd`add9;&6 avai-pdU'VSDK 7A>1;RC Y/R;!8MQdot*7X(} 3464rF7AgeZ?sO. ld- _+n =410VKeyl`U8/O8P|%es} rJ mur9>lkGi +mB/Kornaa$3@35 w#֪m"pg+fK^ 1h# 29PMoz#a$birds,\lon'?usg]Vp<is6!sL 102.5N*W]mL* r Yh#% ma540!_FuicrY;& byX?:4:U!'I/S~H5HofrJaS_Re@6&NameI8Garb C(@9@MsafetyXfixwFi>BESRY21Y -;eASScooki y^10^C=4T;M5 D%% rd rs]żyms )l[ WR! #&S2So6CS-)L0+:0C mour|W)h drawn! wc0UIU<I Q re32ui- ;webP, M?!Z9R 8d t}pltK_ eJ )(I i+vYyEb%)li)4n-Id c=( V(pryAJlgB'R&ƳUjGPhelG/aec$p yM5#H>bo,c2KDC)}rb5PACv7 f28O1fVi8Ck#Qb1l;td-sm'modon'it9 @Zf, giv*(sTa ^bp.upv."ForgV<06<N_j;d;ppk O,x$yZ8nϡ(18.1l[469, 30 4 5$X-#\b'05b7Et8(L35Z8F? 6*|VR. 6. 2/aro7evNX687f  6g_ r WebGL3C9ƓF"u6 DraDropp+n t"c1J3  ʜ2U6 QuojnZA cer< tagtOh QlB, hQPg lU b6µX N=Byt8w%&gG\1oCEGig196vCway $yze,; m}m(b ry) tD . --: a bytAJpkedo=n29FGTK$K! E0N0:vB~ Fkitgtk:XNW)p+anhy "11Y"3$8"G (s 5445#/"PHa*?q%^ponse:\LJOC2?TI3-3P j P-F jK` 17 EX}+S2K?:"!,ke?HQxDTLS9JSSE, 8218PYsObankns:(SI9377I4cvV the References section. Bug Fix(es): * In FIPS mode,6use of a SQLite databaprovided by NSS was assumed, whichopen$in read-only] and with no PIN exped. This^event:o r\rttingDon.%. Pupvllowsre control ovUkusStwo newpertiq- fips.nssdb.pa-can bffigurˡFmanשijava.urityIletemporari(viaCmmi-linrgfnts toCJC&rtual mach%(RHBZ#2147476)Prepaf_5next quarterfOJDK(stmle(2023-01, 17.0.6) [almaux-9] (f53097)T-11-jdk packages3}n11Runtime Enon߫[+SoftwD$lop,KitSI?: hQshak9oS att against DTLSns (JSSE, 8287411) (CVE- 21835)Ysoundbank URL:molloadH(SI93742I43) FdetailKbouti^e(s),;cluZ imat,CVscG cknowledg+,MAaZin ma,ferQgm lis,G0j1j18k7798k.8.0n8m*&l8ݡiTFCORBAseriz$v502v0Jv8u362t9912|solr broken dueacsDni("io.FPB" "/etc/pki/!/cacWs"w,;-863594sudoa)utilsysW adminiatorC(FusQp,extivgs,orFdu crole.V/httpGG\eProxhorwi ne}/ti80irxp/sy xmԥ>bH]+171Ikөppc64le4454crypzc*/|o 390x493 )l  hd{C vTvEc^s, FeLDAP}*OSTPUTfu622 ny ]E:t >pdiVllto eZbUAX88179_178AeKnet.V64Vi915GPU TLB flushïrom Z3ïnfsd ,!RPC m: TCPg  945ò2cleng=g s)smt_ 0 YUnmaW PTRACE_SEIZEeO_SUSPENDCCOMP1' 0wl 9.2:%navfs32788vvfio zw]ppaf 2M (a|>851>nvme-tcpoc re~!lyz r@EMC wt~NDUd313q%DriU/5.19)207WARNINGAPU:~ 6P$D: 3440n/x86/mm/.c:105_V"_f+0x3f/0x50f458drm: ed crm_acy__r_erin)&or$ i6p$elroughfo ren*"-EINVAL evS69DELLi boojeRTerc12.J9JNwP VGA   @l{ A9-acio%d01JP|idy_ "Dummit" 'ar|osMy& oomnere'scaleftzswapZ39%fa t:{inckT: BrCh t%etng 9IAMdCLIENT: 5uD& "no:"̪m+8\7\z&zCIva6ECI_5MA@MEMORYmeM' x#S50910S z-E:t#i'oynVMs^ qg' led+ s19- On PE R760,esob LgEunessl>w 0/ seBs^twa0 d?P:eI-w bur)>B-+i e!4fac dW:-dacras\ cei!#ne#nthe y")>zV)$ @varrarJns"n0elPp1p`__m~ hal_by`p fd\Ă"f" ann) u NpK$mV  init{llpm\,s R&vBtar& s,D on-æ#"ekeeps8k)e cgwpnS t7p napW\qtmair u([  ell=ns Pepncy- 7-Mcalso xsp#-iRrYysvj/: Z_r 8v< XMLc.IeE:- caZYe}d*uI. RDTDm_ExEtyPrCre5 6#xml2{b%zWHJl'u: UPARSE_HUGEw0309"Adict_e cycM2CthW 3 . A li b ȡ&92N2AleteA!-ngleskAPI()Tv>,,2A"1,o+wR%w6 o'-Uq0nh htHo7IInf eJun@(&0v=6/Th$rdxlon nws cli.P/LtT/1 nP/  o*ub S/M]5)s=bchekd043 Gi]d Z-])]Sentr)ed}".1- A>p'SsT-< e" eaL?cop ']os+o0 $c his/g?onb*hs Xon) (Ǯ0))'38p#chOtJr *im],Pm=spoM1oån? G$i\/ ~230>H1`git$`,8--`'C19V@NC}u3(VNC)t<{yf:iAaŤG-/e=oAw;iY" 5y$! etY1i..-sC xorg-x7A3XGCP3ClaE-,!"le9\:8:^ < PKCS 12D76 b pb l0>violWMu , 572 S( hijQF lE@EPoQ rtmf%SpiMon3^ 6s'c.*s <*2 mT6ad,4U-00PUnsl;um*j?PBKDF2Xstun-8hig>'+p{+"3\a R!Sp ɭ8SHAKEdig.-OAEP>g10gSSVPL:#a os`hash6(]",ٙ2R%9.31dm5oN4,38512P56eB )DRBGsЙ3 5-37ުáQ欘hv9kC<48_ EVPEY_m+uw(?02.1 N!ly[0%R]O01J'93:dikl"F roe  ]&?cPXibmca -2#l%cVXo.4 (3.0)9mHsud084 b9(l2(mJ_sdu(5=bluetoU/'J35C9s% do_: _dvecskip_sp278QŹQ__P942_ssc_fs/n4)(c+3D!(a/6S- ~9Nvul(1ft_pay<_B_vla 1[|%sQ9-9O!7v?WW4: LACT+ R8f!14~S!hirdas Pn8T+|330%d1INMIfa a l[ e 57ua@ua4V3-wR0 x >e ?LuaYfr.D!dE,-O`1ua &Sa|cs;OVs f5975=i RUEFI #,+qasB it7a1 NQvDh U5I ibjpeg-bkeJPEG-0he3sosW Fo==Mse-9*a1-?asK1^bet/ reL_=_rgb_)^rdppm6>2{Ignutl4fYNT$Gnu$Np$i gormsp$bK,G QsJ$s-6}  3FCCM(g"bm'f s% ,jB!5T,dcmdP[]:i >^cle%1elf ir0)14{P14W$JIY7] 1+5y>-1,9YX+.  Prlec epĮy,.>l.P6,?~8L?4?ed?w9\ `j19I+toaWc5Kc-enod} #-2(7P |nsc' 7 NK=I=ew 3H87WE94C-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklet88168URL bepdraggnfrom a removcross-origRiframe\toe s tab tger/navigationw4) For more details atJecurity issue(s),fclud tmpact,CVSS scG,0know&gmentsnd o/rlatinform,f pagm lis,R&en:.Tkernel pv7s conȤ3Linux!, ofyopersyom. SFix(es): E: tun: avoubleeeun_ _netdevl2-474k* ALSA: pcm:ve rwsem lock?sidsnd_ctl_elem_ddprevJ UAF0266Tu: CPU softTupTC miregre9to- aH©269 BugAlma9.0 - zfcp: fixaueortanthustarget!BZ#2127880~Cgroups_v2,0cOnew c/erspu affinNmasks fxall usrozo쵠437booAddeǩQ;51528<-rt-debug: WARNING:circularRependtyu(&n->_%->&p->pi wai)6061Sup}.sched)ad_bala by changfaultsdiroryuct_1105! s390/kexecipladdkdumpK6903Klibgpioesn'teñ?w withterphase *chiE5zxsi:orvsFswiotlb ufleakRfidKial VM`77Enh7k(IBM 9.2 FEATepgradeWQETHlivqu, e.g.l6F30¢l_ SPRMX mvl_fVe cod8382)VirtuNetVCompuT(VNC){tesplayichCows NrsviaiGdesktop environ( n'onlyomanertvrunn?,"J 5netFwvariety~YarBut. TisuitvˢTcliCxorg-x11-3: X.Org S O.Win B-Af-FLocvP -ge Escal;Vuln*bilp139HhttpdG2ApacHTTPFpowerfulcexten<webv:[requzitOmod wr_x25PostSQLnvobj$-p*da bman`(DBMS)ppdsq3 Escriptslacepsbeloze6.: 262l_C memclos)onnKerbe fifie 181 parlia?, high-pgvn rTCPJ-d apIc.:gXDoSg 0'mugglRattac{/1 he[rr? '%t , raM 1|>Ţfns-u:4ouatocols m, FeLDAP}emi- M L qil3916]/FUSE -p_d s ep38{Upd i8 _idHEagles /ShirOapids & * 61K E n nO pp>n robu utexud eg m ()_`)oxo-sourcbrows W igned ndardemp, pW 'Thisw u s} er102.10 ESRMFSA-TMP01gD- 86^)A.Fullsc,nifbobscu]+95338)193WSdHTML2> 2>9>ilen7r]ogcZ8191Z54Z ǤWs>negoI]310]67]_st:RzNULLract 62O KPBuil]5]8˭ lashZURIapath&6 IIPSeDDcryptopcsalgormvl;osat cV t. Itf %t5 B-toolcalsoSwributhesn<mAnhey,in-7RH8@Ply4X Jarun/ y. F e :+Rrb.edoisedń1PKCS#11[bymi xt@tokenssome&y ~iaYf8 yf{,\Yoe "#wn-.JmreAH ?)xp|ߢN #7)11+9.8.08*K T(SAPSSS iu M U)ys\cSun:0H9!D!S#did eNb1D  emptJo 3&Kerrorecu<mm PMwil I $2l$  8024)WebGTKT r]  ree e : Bp<7*l:y-a($~a tT'u382'GNU E%sw#( self-docu^ edi s#`w6di-fea"leu(el)碩cap%0,e-Je:Am*injUN& 617Ba oolLP .imMa lyyn d/tah =sPcosta+c "oVP8i+$l,(Re(M+u :F(RIFF)wmas,GdV `us,(vnd$BCE'ly 1999Samba[y)Mu B_0(SMB)tE#?CA*SN'CIFS;.b+ PC- t(*sh !, priZ%#sC4/HMAC-MD5,Logon 1Lhan"is-bsh212-38f-2 (P D-J)$yfaiorvNnobcy res@1Ϊ 4 ܥe. pyn-o1h޺S5eQ IPV6 608 1<:Ҥjc%Tse,?$p No *?2h/M.(KVM/ v sol) k\&n+'//qemu-kvmEN&-sp+X /k j ?c a+1r%1 :(7.2.0)311769, 3580&QEM=1/tege f|i nc_!_o _e _i 6exha\c16aACPI ERST:,s9$&t_or.e417}kE(Embed~g  UEFIW Vi>= L{pA64-b6HfirmwIA~:ssl2400_5typkfu 0X.509 Ge| lN 02**& k2SmmEntryPoiunp"SMM2p*1!57- n-De  5I5:P cR\PEM_hbio_exD4"DBIO_ _NDE,:1}/5RADIUSz0 lyigu%Rw AuthcD@U` .e) /c+ rYed aR^waG1w r:u#IUl` &REAP-PWD85=CrU:un* 1ASIMA60AiM&n4//7J2)ePI4 NorwunexLrn41A:2=i:T0s`7GOAWAYM=4N=h6e:dmoW u/pi:5957Y&3e 4(I s~?6i 9229rxp/syxsmi6+R >s pluDUPuCo-PilooDIeta@#`sem pm PRe, PC*bpftrd S>da,welsa9:>z@8fs-w" T 9 si b>s 3 @XA\Hr G&;y@mkAcn3g:9p\AovP &y/1-467b=@crd NTFSttcaO]R_ID_K'_ 0784da_ s__atp6GbIM+)sSofp -lT 7AT>PodmanujI7%hno2V _ DV-XV,1 lNl_%G$ab1 G-fkei3W ,faa!up:yW_GetCounS\7()xkb/.cFXkbEKbdBy]%uB$H283ATrSwapF 9Inputv_D634͇IPaUngr`H1HvdiSe,VoNHy֡H2HSth'Pc,s you\)ea^3>RNE_iBscH ch_4sp&P4p;V$KlW$nQiOiy Do ;c - R _ rJ/tlF+AWkflZra m__adp(06>}Z?FAgtk40I ?2-$V74Y3`]5BY8Y WM2eBif{"cc.$cêRn[JITfE]923]حUI Vp=K3$xƢMv hD4c5# ap<Y636Avy 691YS OpPo;ypa=HcȋyPA79DY700YdnCV::R2Lay} :Ch(H5y:)UerU6* ,N1S3>i[1+pa( A hGapsf2)f\DR8entD)otFlagk@}W <5n:7Mako<@N $ te1PD2a(m(ar,XAXB'Q:i/B%maximumgEmU(EEL8K$a&0F}&PoppBw)PDMEKPDF)I,&n&Evi y@JBIG2 emalѳ}38_4:GS,(:(B9a 'M6M]s.@";v(FgVer1-9s-gootI9-N\<-C@quE-LGPL l nsÑSf7n3_mgoska_d%Gxp_wvpk_^-& 2M2,jH 6~ g)eAVI&E-2022-1921) * gstreamer-plugins-good: Potential heap overwrite in mkv demuxing uszlibcompression (CVEk28kbz2j38jlzoj48jHEADERSTRIPr5&rp421 For more'tails about the secu]y issue(s),gclud[ impact, a CVSS scG cknowledgmsnd o/r relatedFformat,ftoR pagm lis,R&ences:. Addi Changes:Ҥj c%TiseasseefAlmaLinuxp NtsnkNfromΎTBerk8y Internet N Domai~BIND) is>le#fX)5Sym (DNS) protocols. Ees~rvG(n8d);olrary (rin2f"applic{s~uwhenXfacwith^Ptool=Wify a/operat r"lySSFix(es)* binܡcarglegmay[veygradep婎79M^flBUPDATEAquest_ᩁSE3094EsenDspecific ?rie@PcaSaP736;P>podman alcontaGr7Itpartֹ<,iich$Ofv. CD#ceptKubpesggol3: $/http: exrve me;y growthNa GoacdTTP/2741717)ecrypto/tls~ticketsck r5_H_addy629@sko mlyou gp'ԤGgiige+G layQsignaturc@ f PublKV fraucT (PKI) undaW l p8irlbyCertul ;pki-: W# ` caSrgen_DirUX,r(n2csUIDse} \ RSubjfiell2393nYigh3ndsmseDs unex edlyx;476mBypass afe.dis<9187316>f} edr?7?di zero8>P engmvdyG9G3buf{fxB20ˊpasa`dr`H47HinpN4N> fu5 EC mpulaTagghIJFil (TIFF)-~}Bp.c[57>-of-`_tcp:./_MxQ97QexctigSasShif24bm /͹98goS^leSW9sS6260eSgg% XRRGBATGExVm W;pKI4645IBb  TAG_INKNAMESFNUMBEROF$Su3774zH32~,0Z>LXS (LFa ~I! aToJ, seC/pptex siL}fh or E  impriz TVs-Exhea 170 Ul:U e5 xy ou,#war acybi2880i: hHl error}ftGOAWAYM7664Nio/f]tNexhGlob063É2 /B2Be`/gobAD .K NewfHost- omX-Fed j2148jrxp/syLx:OKu b +˹: Ater' _Ibmbig^ .Float RP yp? p.c im iorpo#_l8=GNU EBspowmul8uZmjlf-docKedKB/Y!ۻ -feWwscrifu:e7p)vcaplȩde-m!newX emt loc^ex0Tvula593A !N:q%faNI0%8co|h#" s# wy'-i Bfigunin.lonm$a numberuproa!NI:n2v*Il m.la<$ur%s a%'~_1un$ng[cYg,(SEC&lc RDe((nolump1(NRespLAL)0AX'wiha'payz to!- r runn}oMDu V'*5ethLrm"'e <*-cy: yleo19=?PM greSQLO n !v+t - ^)*pKsql-jdbceF.jareo!g5ms h:aHkpre vstatduinBe poUP946=HnML-e d& ( ~}p ?&䲠fo beu&p. brh$!(hp (8.1.14)XKCP: SHA-3745rOx'rcookib)d '__'-' S35g-g zOOB "u!;"*tdfy()XwXPDO::qu$/re|ni w1Z1Zpoa 3Y(gzQ&=`%+-snmp V'1(<-M SNMPa)X'-#ag?,h8 ~t (S_af;do_P optK66KIGD/ű\v_aclLP36+)jQ_p$SguV#8 u}2euy\A]{ fCdev,o!_ _y5QUSB-CbrcmfD<31_deinA4vDou?._2MB_gtt_%lt_<p_nf70ptc subGal attim41l2(s+ockco+u_i όdgig niYhemc_rcuyoclo7+et 21 .r,0b-IMA,15#d usb_8~_0 rt_x!/&* }-8JnDbandront<d SKBXSA-4Hn&mZ_rn ()m ^VM_PFNMAP /sosb9e TLB91¢flE35  are I= 9 KnV_PMPTEDm{oMt8vl 5dfg8<1_upd _~# 416B(f!  on_vmareG270]ss_(l/s# 7M.B 4 _([Db5on3 P2P-deO#HĢmo 5375 c6H9HrawR5_p&_f ' 399q_gr+DG590G%P h;fs/ q*119{tipce63Q >R2P/1V7(mf|u4sM, FeLDAP}| W"_m%cha-b525QUggev?.p)M@35P>fwa6E9L;h#7w`4 firm`n:*l!adJ ;/etc/&/ f.cf%[2F:N?3rrty e6ot ?4301-@2-@=,1ba~ -#\ MB (SMb"8CM0jI0;I PC-=) hE,ZC.6 s,(4.17.5).NZ#21"2: GnuTLS gnuz'_rndanQg?%pr+ct'316.:OSS# kiIat"T SLISL),z2*(rP,wt?-l-ju:Nl-purpl )r3y&ss8". CipNID_A<,lrt35A5C;= My-J, thB- ' i6aM4dae (my-d m!AH^'7w+0.< 77731, >:#*[ K6ed8PU,r  p_O< mi1TOVR1Vƴto$PPd$[9[InnoDB#I60ʥ,608511ɞ9:N Ha$^7@q0_3Re%V353AU4 9T0BT8@T1ʩDMLNJ 28_%T63AT4AT5AT7ATJI357*7.EU$_AG7+SA78ATI8*T1ATGIS%N* TT Z2oz A!RFRe _ O=Word%.)x72("_'N(),+~&!51 v(FTP Oea(?*9-3>R53WebKitGTK <#web re^?:vBpl:`l[205[2&Nj2 (dlop}Nas7ByFS, J4(nϡ(18C.2?gU-AFnt Exv/` /1+0c-ares#D)ig_s}/3C3 9]QN-LeGf7ޯRe)2: @Gpo:e8beedbpRi.uc>@9[`W%W9" R9RFe8APIlWvaglt CRLF 6Xs\\  CUC8 _uA on+ ^2^HfU486{6.19!,->2 OMozillaDox . G, "EKjN,z8 is1Gupgrades Firefox to version 102.11.0 ESR. Security*x(es): * Mozilla: Browser prompts could have been obs>ed by popups (CVE-2023-32205)NCrash in RLBExpat drivb767Potential permiss request{pass via clickjackingQ7QMemory safebugs fixȡ4113 and0=Z1on3ces3dueinvalid wasmMdeJ1spoofDuaddrbbarG2GmcorruptleRe0r::Do Data()S3) For Ae details about the sIue(s),[clud impact, a CVSS scG cknowledgms,ro/rlatforma, R pagm lis,R&enc:.TAPortabl'umAPR)pillibra0usZ BHTTP Serjos. apr-utilTHwhich%vi i+>>rfafm;HsupXMLng, LDAP, daaseE, URI': -of-nds w)^%_g64$2-25147$LeswannleuZ IP,IKELinux.6[Inet Protocol n:Pttrocryptophy b auMc;1si. se allow youPbui{@unnelrough ruworksdcxRrtuud (VPN)@l@:_g7L0570oOAlmaEs2295MDerbirdsttalone ma$newsgpaTh-upd}LGitRdiOibu/revicondjyGm wiRcezprchct~. As oc'hSsT-eOdel, ensurtha a[E@copya'revit{exZ$cco h/2not onlyu@)ncne/u#chang׫irficibSalsokt si~ =ǥnonngit:f% pelyf@po `gitp--re`hsytreꩍbe o t%V thle^565at *figurin whaam$Let a fvBfilew90#w T#t.malous/490MH:&>h3946h pl Q4y sej errt DH PCTrnOgalwaysv0PBo2 er , Ko;pkcs5 2Z UtB11+Sj0*iEMSW 1.2faul=itciǥP880~1rsa_'r!ver7n's*5as5d399- sshd4mprebmca,i52e7_= CIPHERSbALLS)E3 k;l !,of  xE\RwE_e_J{KPt Ev 23\^/nj batch]`e"3.KblueB th:"< c0;0OOB<%>'s XFS0H!Hi2cx_sli2_)_x()N9Ntl0I_g # o#mayKNULL ider`y8 % tQAT U0 - (p1768RPL-P IOTG/ S : cpu f!85?g $ ¡-R*kPT_l'>172jBUGiwlmv:fi9=QvBMe k:F672NAzh =?9 BQG93827a0a36f2fd6368a54a020f420c8916e9b [KVM: VMX:Nr_vmcs]82blk nvme/047aE753S ,'sE s,beesrW;y lth2 h s`70[-rt]ask8ai6e :1778)\Q622o$65hd85map_ _J59342.ws ^l&=occձhu]lbwcD^9234 wG_wd 6|do riUMunexpk ^ 9#9:CPU}GNSeptp4I1L"smpb: Sirriwwobbly,lab7!"nohz_ plHCn }7D_Kkr"caE3Q[al-9]P2^ FJ: [REG] NYinfeopCOMMIT5.$4ERR_DELAY \;$7Y3s"ev 4tax: '_l8d_c_}_rt_5'" b'_ oNg,hximumD V'747cha{trpmins,D/K /zh_CN/G/mc-number.rst8247cifs:7smCp&06l9-1aefc40a7fTwrEun?f= urn/!)_<_nܥ904x86_64* 2nwil"*lyn g"kvm-g@ 25.hv2"_106{&;cmd/go: k $a-FN%ycA94 g7 ee4ecfAOtFbnkb(sW5W>::aviLtuid/gidnQK N MaC Ts "G!!VM(6''(z ,Cnh* d$c4ImU-:IFvg, uA089Gh<,> r% s shbo ediqG,fluxDB &hTSDB0g:Sount keD8 D OA'@+?b++9,+9u+96I u+CSInMAr PdA >hodC 9D6Di:20D20ED E^434U?CRTC672!%M omV9f KmAoSpMon}^0N25, 23+oNFu,crJ? NĬ7jdk,J VL? Enonv+S D?K?: ZIPQ[a(830L3zIDw('?y#DD41DiOslae\-Z+on4e531eL@fbuzz:oO(n^,gHWAeav ZI519?] i7@N4K2475ŝ0Harra}d8tege22K44$&P o%n%%er1+ res!07, Z k231,+77+ o}04 InT ll%-h2ǽFfa1)GaA%ǥupreB{?;,;'jm!(beon\=&ui-c Ibd7FS!RHf1650)828'.8.08*&JD[/y8u3x066xe^Wa$o$>3?.Yh@ uz%V?X9b(iMes$B"(SMBUo>F7IB1PC-t+ sh,5+Z%AgsE%MB2BetT(eDk9t"9$= #.ed"0f3ijhjioJ(ptw]Xs5 mY8)ed 6 :vQT rSnjV2& 6 8 9  5kcinM".""#lL8meKis/D CCPpoi'GuiP84Q-Y cxV99i8iR}jSmugg E&ky   s] CRS9SDif6:H:ma/&o7Gs aovYyexT6.1Y3Y36 Y40 2 +Yxml2e\]boxi, 9NOu:14%mlS1upCojxT -848IHashofZty dicboOcc:W;Sin0_s69ve_oa?P57Q82/mmu:^U_f_=N!OA9N=4OQ:Qo@ 3K:/P/K[YSI1v2$T miK' bl<19MCJ 5ejHOibrary implementing the Javascript Object Signand Encryption (JOSE). Security Fix(es): * cjose: AES GCM de7usesiTag length fromactual Au ca2)provided inWE (CVE-2023-37464) For moreptails about0sissue(s),Jclud ~, a CVSS scG,knowledg%s,o/r relatform,ftoR pagm lis,R&enc sd:.OpenSSHd tocolsupporNbynumbtof Linux, UNIXsimilaperasyms. It filnesfPbo!cli_ervero0ssh:motbde ex*ish- MPKCS#118408MozillaDox -source web browR, vRstards@iaZ, ѣ 6abilThbupdawupgra}©s102.14.0 ESR: Offeen Can(uld havepasscross-origrestris4045)YInrovalue&d dWASMilG6GPg9Dmxrequ viackjaP7PCrashDOMParsdA|-of-meyndi8MUra8whe1leasp oX9XSt bufovlowStorManrB50BMsafebugsxֶ8116, 15.1Q, Thunderbird&*Ĕ66mlookie jaBcaunexp%st^Q9lone mգnewsgroupxL|x kt#le Ext% ]SpoofuText Di!O_riD CharaW341D-Bus R enm g/betw^applw # s :I-wB"urvi as -uslo-ses4fac dW:-dan: rfurea itveg drivPcannotlO969I& toI whichas;maximum TCP bԩ频tuvarioppmetUDP cic.lre sL lay jitt ?a-gR liP3: allohazardJc(/ 3Ru5Tsets-sQ]BContlyR cH c1,P]WindJ_  {/5/ׯFLACxsFz LlAo-$. *i; oOgg Vo,bl80$cost/tCť¢ enn"x iny21-line @>"#J;m ed2,flac!#CfE!#(r)5bitw>er_g_ fun},7#lyfp>ͭ u0-2221kel pvaconȤ3!;any elYnS!a r *:(5,'&: UAFnf __lup_glob[f{hblnanonym>batW:~_:Hina cBrt7HjNFT_MSG_NEWRUL'61x/sched:5s_fw onibploit^sulX cf_che_iv'x776-T-fsr( ezmoval_pipapo_e()J04 \_@rud]a iEBA_<_CHAIN_ID-sŰy1R y3īݶibyid312T Os-o ?-Ybyteorde4V5001V/!JulaMSRs!S3sF*um163hw+mKC"ProcL92059!`sha)eSae' Q1 e Bug[Il 9.3 BUG] [SPR][EMFHF] ACPIs"swake,(BZ#802[DelT2TM  lu#D19TBSSUT &'VGA/DVIype-C nglej946rtmu #waibwok#)uein2_3_adj_p1Σ^`2Alma\AWS ARMgsl DMi$hift e2DH33H9.x` SEV-SNP g_$5+>Q Lo!  ne blo$lk_fl} _m562 /p9/rq-x ".\70h-9] bz)2169//0'N~g-suit d arch64Ps[Z]/w d3921E(FEAT] cpuf:l_p:3<HWP IO&f@a:1z7Y- MB,AMP(ngeMayay (ad)X896XZMDRA -Lk G2G Add5 -ue $1&Lap64s POSIX.1t er 6)[a15 Milt)T+__dupG 2603>j p_ct ? Keyl TPMahighlya/ tetW ewr!B((sol: istra)F"' DoS/ SSLn &2WKQl e-`&-t6 ` aP5Xsvg2%!SV1>phSVG)ʴogartu8r[\7x# hOs"/*63-OVir9Mj (KVM)f vizRX,x+zrchi"ureqemu-kvmq-sp0@_:!Y*at QEMU: VNC:I/O9WTLS3kelZy :e_$A. 35:@] rh edQmi \F%rWaG C DeHInimw19[a ltv] hot/unjmlx vdpa dNoc)%ied']n- dump'mshuts773(2(2j(5(EC urig`vm-AML:kacO09N.j ? }A4;fi@n-? -?yALSALL'; 4^%)(18).M8? 4409;d*CpolbXD'Modus _0* \P?mv#,u(2-258חEon&m .htru.R<~#6y. &S55  3  f5%i,O% r*9P'Op95$9UnIi?97R-n/8n/3Jn/3lvpxvp8'+in/H2aEv !gl_ CC (/u$Am,%m)ڢi%<%G (nscd)|&byplA0sT.1`2seq. G,D):,ld.soX?p g `;491QKHUgetno-aweK527K}LP;-8Baih_i @H$ Py8nacs i , -l ~yic4*dƩ} ^ `mphN21V,N5vy s co--pyp:R 40Gho> &ett8$eIP1p PDFAP(s4t myҡaB) pyB rUn:ltOSwinjrS/  fz#KiJ.6Zac1,QReL5, e9 y_ _^L_dl. ,2ms5llC a9llE yMw/9 D+vY]p# ReTet N 16eq#'-m+6434)  a@P e 6C,C1'M medWu'>A1 HQUVP9A440aDB>U, BSQLs. 8yzMy42}gal (2i0;), mdb0.5$;(esD. poinS@o',eysq 2gb40H1iXd+ OsOn pI70_inpl_} _@v r0a:.c24_V. [->g< _coun == 0`d[0\2\6a_;?)$u6lectK4K&Yi35_l7u((::  _M9MJO;CACHE::o\"7fiel&ON9Ea_<7t3*97fN87NNUB?erjC_db_m>:: _wB2-4701ZBeQl, PNDom8(BIND,K)5ODNOt$Ee'(?); a re,. ($%e t=Y.M W,~;7!vfB W= hausntro.n6d6y,0\DO)W6J:+3+3KHTTP/2B'8Lr&J73TRapid ReZA n9thhxycI,%fo n\u4^ \jl-1.8.0-Hjdk #Jf8aEn on*SD Ki >h iMKB;Z!4@Iby some Zip64 creation tools. With boreleases, the checks can be disabled using -Djdk.util.zip.`ExtraFieldValidk=true. (RHBZ#2237185) * Tg/usr/bin/jfr altern3ve is now ownvâjava-17-open package (AlmaLinux-13648\jcmdMprovidP-headlessY, ra'r,-devel,` makt more accBiŘ51)curlaslibrary andoity for dloadfilFfrom serversvariouatoc, inclu5HTTP, FeLDAP. SejdFix(es): J}: a p-b#?uffomflXinSOCKS5pxy hWsh(CVE-2023-3854Scookie=jecwnone86) Fedetails about|sissue(s) imtt,CVSS scG, gmentsoatinsm,Rgms,R&encs.Node.jsaftwaɱFop} ppkbuilastscalaXnetwork applicsyJScriptgrammDlangu. njs:/2: Multipl enwebhvulnera DDoS attXapid set A)44487A ( Bulletihich addrWurilaw^vJL_Dintegoro poiecircumvenop52Ucodvia WebAmbly export namZF9333F-und{p514.Grafanan -urcf}urmets dashboardcph editGit=InfluxDB & OUTSDBzgo:P/http, x/ rEst m rLcause@6B23"$Varnish Cac*high-p`- le or. ItorH%mmeM <don'tv8_ same@* gaigiv*(siteignifipeeu p.vPHPHTML-ed smmonu UApJ4SYphp: XML ex l ,S:be2:Hpharv mism`ge0401-byOrraytrunש3 solvG0568G!6 whe?rd myarequestMdyL662LMis5Finsnt'nd wkDig\auth>SOAP247oPassw_ify()cways'#ha+Tom2, lcontef@ բ J(JSP) technologG 5rhel9/boxim T(oob*!Biz mmlineviron׫qiUB ' [ t..wMV t Op of Podm&st =OCIFTupdatAWregi] yJ  Gun cKfol s p̣I\y.io/ġ(ed)C"Jx/ubiJunLnginra:agD sup ac y,  usaz g4fs-w pa s Wins 3@ɪ-Hgausq&mod tum2"(VM)k8NTFS-3G:{! rexNNc73ma8a;2-40284MozillaKDo0-03brer, R Wm: aid}º115.4.0 ESR: Queue diGuld w yckj5721)WMm afezbugsxP119, Thubi{l30lvpx:ysޡVP9 o+p(# LarGL dralUah4E?E& nsBAatURLsB5BImpb 5ckduGCe^eг.qAusrooffbidVc p~ ri lkmգnewsgro/L1.NET-d- frgim  ao bF WC- API1 sev lͣitp CLRZa N0sd`^t Zw.8dU'VSDK 6.0.124RuS 24Gdoteni桨iB C Cep f tcKelO36799P7P13P3PmGho sus!%o|P1 PDF^.PtKss4{  mapcҡaB)$Qye Si0: PDLHlb#{rG3>Squi+ cg ; #Goph,IsSQUIDV:3 sA68V1VR%/p[muggl_/1.1ICV6V5VdʭFT? 0pip.#sy=m\Atalt %=tePyn. Many foun)I PyPI). rLachymVP ei&"P5IsXs"iz"p: tar@&ul aJ07t!5I ddi CheҤjc%Ti),SbR NoHkedE((E]DQKit)ro o" UEFIVMs;(alr64-b3 Hfirm IQEMU~KVMedkFun GetEfiGlobalVE2B;valnotDxeIVoHw[ (19-1456Essl:4*_ASN5idrfi 265L:X.Org X S +icK-l #da f"-fke%ical l rfaa up:xorg-x11-: Ol Use-Afd-Fr=LozPr"leiE,(VB 1$= lX  n7X W W2.UEbejOIr& :F-(229)/158761)ƌLibR7( 0e$RAW0 OdigitphorRW/CR2, NEF,<DNGOs):E 0 __ ::gs)i rc/w .cppE1J$142F4zI_,_ idc7ID Conn1~ 73 J!< enyP-?/iO 2(Rp:g>7To_v@e_r_>Ng)K#2352fNULL) der{b3OIDCStmC.:;I w&"u;eI4286B89K5elA (K:-Y-u5n+AV'arcac!qemu-kvmb'-Ks(nD)-Nu6/(8"08089~Mcd-eh =DMA rera0 (in% tes(ܵ768=Q?64kie54;G@/qt-0-E!rep}9aS 332IFM#W"G2xbypasǤrL$ic F=C$ ]v4410v0n QXmlSR37369>i =8197Un8iXed=G3Gm_usPerEmC2)@# cloud-3%%5 !R. ' ed 7 9to6<,\Ae|!nKSSH keytodO3Hf:nsiIj$,b%poZnD 178A GNUj!bN%1GDB)5dE#,JE|C, C++YF!W _ibe TH;J/dm_l@EdgKm*cC1>ACCl(twe\6K6l!3 CF (OCF) j ;r;,U;nc(ootMMs `/r/fs/c3`R 5809Fv mu@ (rH5B#99O3S754SAppArmv'ed`/Bc` ip <s5m;4fic,figur?IZAmsg8ngbfOes pB8' ̋1+79i@$ il=p&k-])orLPB>Is' u(Ul7 u,*9Jun 'o0m*/havhyphen2. !1.Ye%ly`adh ?Na 3 roM. aal>/mdEb(Ne)hHvys$< agn/ cQJcap- X?AS*./ ,!s$[Z"tokenSdPȰ3@0|D|Ń[݃9ÃeHYC\ buK3 KUenumoI?for@)U@7@S Foorigi.UbB naps1sN1 : gLi Go) NW5PMV 1g[@, Apq9A/SQL6$2ptb, & EU+p*sq1zDBs;|KJero{6Qi%8XACbjslG IEntO7=fJSON)@c%T(9J@PCpm!-bGvert# #reԭaf|<-c ,7ut-of-bA e#6mg0-127>FRRouci1eec% s TCP/IP}r2W`{BGPrOOSPFv23 SIS, RIPng, PIM9HRP BR, EIGR=XBFD@frrEar*D eek_<_as4_ y864Oby& OPEN mDdA type 0xff0302>digp+__/vȏ18'Hdaem{*P368y==mwi}-in a~ ayzerG 3Wmtk+oM'V}TPSorRwa" 1IEEE C37M8Bnchrop:cG8GCp2:2Ci:VMSIPe=S?er8ƱXRAi389>Fzlah >O$alp=qe8Am`>tMPc l8 C 8TiRN,{Jsc7h onox2>cM;V$KlW$J i,LDo8#;ei@)ou- cd4(iupsTt -[dc K517ee wZDq hoX# or^s{5fv.#!#Kubw6tcemWrou4g ^n[397 C ?+-b[66nav6dzccPPy(AMQo:balEklows you to communicate with AMQP servers using protocol ion 0-9-1. Security Fix(es): * rabbitmq-c/lib : Ins.e credentials submisT(CVE-2023-35789) For mo1detai-about the JyArra8dex uHCalcpar _950L  1833R docu1ltp\ptIFsP225=Fp[  buil4, mi unn boxed7 f(1.12.8 2179l =4: TIOCLINUXoseġutWV rtucol810gM?NSI6ro> anus( iser bpa1=ornado web4q synchronw Q]asc 7 non-blocFpmtool % -t:ireb vulbi1ScFWHZlM figul370@H dnsmasqI D-lT twe DNS (Dom"NS()war˪?DH] (DwHo C P )i_:!fault ximum E.0 UDPetzat4096sld 1232T45=TWebKitGTK$+ ' pbreGengine :Bp*Fkitgta  /U 239 6byp SOrigio+y78537P .5bm 9/ّ859Y64#65#67!666116Memo3rruB+lpQ288 crafuO5793sd gr s usU5 rreeM198:plT fcGe clos̿3813\d9>c943,jscri A403tturL SE@ eƲf45>O PANW ry, n_ Alz`D 3:'.pmTesU tn ify TLS ifsz} S1484/h'f a yipul TagghIma/p F (TIFF)$}jull# - derLZWDe()3/_lzwc1 Wc5 aCfa%16Lm [Á24heap*OaE乳Rj26965kBOuv_en<:D+qbWKAmpurpof-^R0F-/q reus|fur0u9;gi% -5p%i0qbkk_*%997Anb;tGqcŤ+[bC&msZ(%3]2)s+Ka +gf, ld mx3copydump, Ea7f;",spaddr2l  : NULL_bfd_t_get_symbol_v%_#.seg(2-422= UNIXinZS[ (CUPS)P'"p*^ ,ICl-q8, 5Gca*N$=--indAc<6Cs r/7424=GK%, )+9,,C]>,u -GNOME,%'lo+-3 gf y =0q3g: GVanaf'aeQ0'iQis_nl\ 94K"Wg_vX_bytIp-t\timX>so +Yfpu32$Ŷdeseria XcWpec'[Y6Ac-ar[sH-*-) 7 [n"Volv{API.6P0O09.1:-53U-_sdue@wngth`r90Yay U0[3in _inn1130DfAuz3S!ra;l#.sQ47QAutoT.yFCARES_RANDOM_FILE pi~ \M:|ssh>rSSHftx"!to.#e ; re7algorm gu(/166Z-zZ*Upki &__signB26:zVA9A8A(A>$ gmpMP( ,piN6ae#?tegClG{numbffp. 1 mpB^Hrn&  / s1-4361=q?c1bas8-8`4|MZaiB#MBx :+8&IFS;Z&PC- bm to+6are3,FC7@s,(4:.6<1x 1F2q9))J AUTH_CRAP 212@in 0dssvc RPC 'pot 8' 4Kn uL˜# - =T@E=Durl1"+0buOfs$, FeLDAP })g(1J%4nީ*- 753դCTELNET-IACj;434SFT:~%)y:4: weill==pipr tDn-%22%Bftw.42 . M p fk/' PIE(PyPI rO#acy7&an stZ Dei"P5IsXs"r0z" y n(new routpaC-iGp2P9edpU,cN edrow( m!SD f/3piBC decc r s;IEc0sS 7l to>&: Local:tPdou= TGS cT#=AvahioSDi0v MX;@#do :dly-˺?>s502® 6edTDBuBA2$=: PDLHl@%4C&R4&E-jdk NTJDK 21>2Run5#Enj;on+SD]U,I?:k Hx86_64AVX-51K831:1$.TC O9^" _W d09dB;""sFhl=Zip;h-'2483,r tIW21.0MrB,3u%=zip]to nH$arr ;+k1,z z-"h ,r ap pbycre#Q W>ws 3t1[-Dr.h..`ZraFieldV= W OE ,'prt ]jar.-S()S,400596,t D)8 MB}u sbo:MJAR31(rO ;F16d(-14?KWTtparHu<6TH6uncTcXo 8j  -.)ReSe(RSS)y%a rcbefQZ kl=ݼ szJ hpVAM7VM) tttS:9IereHa `ge #is@bdt &)cErtIDv%)QH6C &s'-lW&wofsű-in0!.jsap&be>WyDShvve5 G.st ' ac>ǥu:e( g"um*3,à=,S"on*<`?,4/usr//jfrterNs[V>519]jcmolNQ th-T^,mt,it$acy8)@ smbd,2iyx d+las *W6-d"ued-onl l 09R"rpc9=o" M` (dZy w[e.llAD "h".DNaN;i-OCKS5pf k 85aScookiSn88Squidg3cNg/S,O"GopE)lsDDigeA 684"IR%0/ ponseuggREPIC#I6IdʓN 2.U!7d-8^9.aq4WC_1 seviGwi&pCLRK,dot:Xd)Wr+XDeleVW:@Ftpi(604~\SP B>.ZWBlazomsX55CNew'i`%<sEZYV  isa3pedU'k714r4. {62525w^!@7Ԣ:e uVM6!9Vgn>S 5KonlHD #pe3cSc@vm-:1SML:k=540= whijf!vm!--s -wrRf | o~gt;D3A589Moz,azIib$)alFm@sg#pt.0is0sL .5z8Z+cGL2@itHoF62oE-2023-6209) For more details about the security issue(s), including impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:.Mozilla FiDoxl open-source web browser,signRfstards compliaZ, per portabil. Thbupdšgrad}vers 115.5.0 ESR5SHFix(es): * : Out-of-vnmeyCsWebGL2 bFramebuf.((4)OUse-after-freeCMKSP::EnglC5CClickjɪmpr+tsfullschransit'Z6՞ReadableByteStreamQueuery::B7QM3safecbugs fix9120, Thyerbirdl12žSel API wouldFpynt{X112ima2.8^InDr(rjof6ive URLsrtwith "///"QTA Runtime (APR)TbreusZbyZBHTTPrvjos. It via M{C atructur#CrLinesapr:egjovTlow/wraջ#_ede2-24963rlscolci/hlr / A$sticese lMf0er unchTno}beAcibly l-rpvedomܥe. python-ce-fi:\vߡe-Tu o c 7920)Furl>3:okiequeheadn't%ippducross-origredis38 QPixmDx lipulnBX Wind SyYmCairo._ O_sa_or_ op ob s was44638sk o mhlekyou p^ A,zgiege+G lay-Ja to ctvfylgol ypto/tl\ӣ=|,zlarRSA keyX294 hhtml/npv:ropekHTML-likJ mc u x39318hi b4pjc whe5cpost-qsham RQUICdn8g21glˢamitJ(edmQ>YrunClightwe, ROpCmF (OCF)a| r .u<_pbuildah Lfaca 0OCIAmozngcen*torN, eiBBsF t +apo ;V$KlWnBin0Dof; B bo podj t sw, < ,ii appl  fv.#ceptKubernet)NetrNI)XZsRs+΢uiemlug-GonfigJnninLinux,ea numberhup aN)cLtfx=p"vlco|sN6!dele'PgreSQLdv;d-p*al-s(DBMS)dsql: $; garrayWd0z5863XDdisclosureEgg^funcEcallsK8Ken/@substits@quoDn5ĭ394bRol g_l_ba an a;uauser ¿7s ERGE/ae,c!PDATESELECT rpo TĹG#eTs mU dgl h} "t pK"; gVer1-% O-bad#` %  jV1 !c !-44 )IMXFmuxer f$vuln-"F4$'$&a ilnewsg"p@i&Lt&6.0&Hī-acl& <>DrawE9sIn'm*o m0761VTZP ( wahown idePGPZ&Symn ksfol\&䡥!ex4Ro'knsT( N'#(PR_GetIdent(esLB9BPot+#duꤙVSoBridge mG_0A::Pi(void){Oless5eq#eDNS&z j Ufi^behaviorJShutdjObs>'()P&Virtu)C*u(VNCm(! play3 S: ss&,iew G&vnu no)lyma e t(ny 5~nJ"v\tY8'(i +u-sT&xorg-x11-3,l |XICh9eD#Pty/RR5+36kg 8-r>s/tsuKB;ton a637ZRͱ*Pr647 ov/6v/ؠ Vun'iz+En 80YC2pop >286Squi h#-=]xyl a,"FTP, Goph/1=s: Den صSSL C4672INULL -!e<+r gtocol5N8N-F5fe9 49285Q3CheFRe, "Re6:Ŀ 1:.")~-s bJrtyo6"8ue.GO-1F7)0Q1Q+/o7o7o+oi12ZIPAdust(82'23\3i W4T par%HumP(THP)aun-bX&$a&,y:mY&@%fNto g/P6eSe! (RSS*a r8be)B7k&l)psj%$LMorTsl!3ntqd*)Dig\ SOAPo3247o=Olo3K65r?iutE RH823Hpharw"/!040Pd_y()wayN"CesoU h QP] rUP K-l[)X.7cdUHl+ al ,( n r  Frpm1OCTOU=un))1-3593A:N ch&/ch'/ͺPU 7\OδU8Uшt{+e+|%68o a .s 79?4:TNH &92Ni@%,e60A!tora leU0k ?TZi#% vEƫofiD. 9 oYRJflexiof4adm5,straZhae5R(. Ds 9i@7-t s Buzz712bgpd/_.c 4 c@Our.AN#el>7>rrF P2Gly[MP_UNREACH_NLRI-HB%2P>7P>7l @7*pf@{cL:#de ` 6&{GIMPNlIcaMciPE `aoQBe#,.Rw"992@4<7w<7AwsBudo packages contain the sutility which allows system administrators tGrovide cerFusewithQpermission,execute privileged~mmands,oreCd foru ment purpose.bout having]log as root. Bug Fix(es) c EnhancH(s): * CVE-2023-28487: Sdonot escape'rol charactl0replay pS6SmessN42465NTarget&Corrupt`of RegisGSt Variables.NET is aPd-softwqframework. It impl%+subset\ϣC- APIskseveral new,itcludeICLRZaN0v sd`that addr5rvulnfbnow avail. Th=pdaU'VSDK 8.0.102Runtime2Sl9&dotnet: Deni塧ServiceSignalR sz(4-21386)>X509C=ific2@404) F modetbmeue,rheqZ,VSS scG ck:ledg笮o/r rel?inm,fdR?gm lo,R&ecsPostgreSQL|nvobj$-p*abase(DBMS)pdsql:n-own'REFRESH MATERIALIZED VIEW CONCURRENTLY'+biry 09856Mozilla7Doxopenurweb brxer, =atardKi,f port'Thbgra}* 115. ESR: Out-of-vnmeyaqcsne154KAl doguld e beebpoofn٬siO7OMsafebugs fix123, =Therdl53lFullscrNoLhiddbyl elW8[Custom sQobse]^ =L9ouХKre-iunexpecly¸ltointedqG"0qultipaHTTP nse baccepSet-Cookie head㩪r/ Bh1hInc Tco ge& n 32-bARMJuJ2O ,lil sgroup cliL" na validengeivEcachDNS SECwol. bind9: KeyTrap - ExtremPUsumSo> 3-5038OPhaK53 +n r] c exhausW s]86MVirtu NP mput(VNC)rtes iew2cG ktopavirononly=m&eRereunnRbLfrany 5I3rnZ!vȦYartuigeru-s/ * xorg-x11-9: t\vnc:jp- dfovh ls6 D963Dj Why?'spncyeeVquir-zerofigurss iGmai{&exFsiAplug-i"iuushellrip. Whens10 MB AM l-App-cpanus>e#:: DC[E V 45321PgAutheDModuljPAM)gw a7policiznebilePghaeH ammEpHnapre(_LroACBypas-00kl/&Lx!,^^T K: bpf:h R100 IUSB:  :s7840: crashWuF2244Fcxl/K&-af)-  or dec rutd_50226tu M %;s *o1 Mrofi )x: `_``}-fS,sndv 42336)si5san z*`t{_K` pa 5 cte()` hodp7&ebKitGTK %>rD eng :wBp Lkitgtk:xo bv437orna^ PyWn`|asynch ouslibq   ,blocFpmtool y p-thi cNsaDoS528)+ 8RJot0 is: ۹oxtOPGP\rypyf,:iCSP' XWExppvia hp:s"W~VMk- o2062975{T?w!_vy+rrl0`7]pe#ATO#s309VFALR_v(FILi6_Vj6Ds6_%458JEw|*.F A8925Acgi.&k.̤M0ol$q7q!-FPM L,1x(90}$#Z a'1gO+m9Aes+,e & highvey'ictypi-t\a C> iasllto w+2ow!;$:Us(v ) 8@6(o quV1T hsL28[U   C S T45s. es F6o'IlӡFuCe 1T59LGSt-m?Oea"+i6o9;ph sC@7;FgVer1-45"-goo/aA a-7q5@qua- LGPL l5 ͘:4< 6Maa3ska/I&;muxeZG47540)aOOB-EP.mp4/qtK.cKx/KKu"_to_s334_1aM9MnullU der6\4_gdk_pix'_N2_flu2b613beX# MP4/MOVOԭs)1c;. o?sč06'/9ed 5=: Sc.ck-:vos_)_iden@_et8)zRhOgp< PϻNopusHe_A@O`(  (IPeC LoReeIm(@9"3url 3v3< O M+' POST i |S"sZody?st p9 ?303tuxo"r@6G#z801;mpg4Fl bPMPEG 1.0/25L"lxr !< 04]cur2  W=z$"|'Natoc91eLDAPZK} 7"IloUi2c% flawq62M8SNR ]aVe=ay  =L@ UNIXsimFV s$7ox0%boc1_jssh:H/t@"a#n B'EePan P(BPP) , *.T$inj%1KEmetac3'I13qS{ oGG(1vS"http/nsBW(D()rRe7C K 3 393pcmd/g3=Fb*r6$mq 2Tomca(xBle\#H @J Z4P (JSD_Jhno' tq: sm m "'-+T4R5054inU`J66* 89)1044UDF#1>N@RfDE4P4-2(T1S25671234^_8` :hI3_PVs%_sV7* 1$R\UN9:N8$N  W,rewall%_$Njzst TY" !29"Q3/$Y4Y!4m FIb#S30199` b32rjC reg(--s_gtid-mvl=OFF (Alma-uU*ahaxyb]l.,-:Q HBlTCPl\u:%UʢIw @eryX-L`5022dQunmBURI#X9eLofKf/"A:Q:%ROx-_-RCr L>ig1TnapQa<=i :8rTqt!)_8the k-F_8_ F>23o*t_w_nW_P9#skeN le yeEiu ?x2v2ge+G &uPy!R\bu>ah ] X4 0OCIA.gt s,c,;t CGRN,G_%crEGGan F;V$KlWnsHq 3 closeen r procan exhauԡ|ourYf868Squideh-perX% xy chò web8i8"FTP, Gopga objrss:AnimiceDheaw561ADASAChunked!coD111DІrequ.C 269 LibreOff) open ,mmun-d?ld$-+duEvsuiteNkey ktop applic?ch adHcFoA sprsheep&ula edit8 a drawYQg. laO6,visimr buhd#extend 61866: vous flawXJIRA:AlmaLinux465A5 APWgreSQLadvR-p*ibase syamjpKsql-jdbc.jailneeJIsac *JDBC DriRallowJtta'in f ukPEQueryMode=SIMPLE159N.js nppkbuilfastsca\ myScriptmDlangu. njs: 0unedwithx(c{7 s201IngoPv [3Goybp{+ *T:-fips/ssl: Me0y leakconrypdeRSAylocG394)MozilTFiox- br>ign-sti) s li, [ z7  Thb } 115.9.1 ESRh : tiZ` ag L38 * : CrashENATLS method(07432JITsfail savmturng8r9n Armv7-A607NIntegov9l:could hR^ hs wri vp ethgh peie,189Y mleXanBleenbacPKCS#1 v1.5dMaxn) 4680;5F FExpatCaPXMLcuGeE:3g}kens gNa#P52425)NzEBl 87MRuby2geped,orG s+"has= tY:task(pfofsbe rst.m <(3.1). (J905 3/cgi-:jsp/eCGIP1-3362?:.qM3UR3353-'eteiK[36JӏT|Đ Bug-irb RBhdepBncy! 'ru4 not4 \IPS[u E 9R3$I]eKha l mon-bufHM6M%tiplew 0Xpassdui? ŀsB& sanzr1rH wck--p-fs-ժAa0assid()7es drello_uVarni^CZElertsto £Lso:sn'vcrere @= , giv(sgnificRspeupv/2 Br0 W pAzmay&=4-301 #2a \!es +"!:olAOw }nrdefa,, any8 ysaPmfyrL$ c"+t?=""?#rol-^cer; no""$\ eiY Vit"im useIa]P5%Zf" WTf a Gn;Bloh#to $8953,%+al ~(.in% ?gjk o ipupn fh$衠mr$quer?.dǣ {meisru (LltogeR g=' "/etc/,/E.d/rt ." e} w%l, "R,%vwo di<ah@limitMKa: "/ "- "yes"se , "manÆ"{Upxfdvisvm kB+yziZ ,Ȼ^t!| gf" "Jma㺭pua()"3n dpipe)",̝ dt l'^S becaitfe7#LR| bf 9" Q: Xxe8"a cum r$I614  5Berk yrn@+)*5*(BIND)&C,_*(E)t5*.E l();SO(routF sA heD*W ~;7tool=zais l** *\:+ o:+NSpec_ sy s0 l tooKa65C`E~ bo64_-s-eb|sser 7uA 679vD%5RFC 19184ae zo7r>“nxd ”T~51VPOm@| yexUЪO44"$jc-1./-jdk ?J0'0Environ*SDKit>: gEce7c(83198510MlC1$genO8322122XXP.200.|7 cII85IC24fP" )_t_s1ray"75[9;j111+h["\lookFO57{N'477+U22+ͣG _h2 AphttpdulN;A02 (h2+h2c)c4 wngB22L2.4% (5ONTINUATION;{u734 A&0nutlsGNU Trv!Layh6(Gnu)g, n&%phalgorymsTn6SSL,C*D Mindhanl+%883NJD/M ,*a1@a110.0b1 GetB$,be^wr*38N#0m* -mizeEX#JWI/drgJ%++tgarbc@$`P3Nmp"Rd+i "i)cu+ ,-o\Typ{%åVPV껷AlDB5 sX,-m2I6},,,5,10{,10d!]^0->=9l30?y7x7/, x/ 2:Yeul52~>sw3 QIP}ah  a3+(OCI*e!G. Amt#cs4$@)3N, "fG,aorAL]Cpo;V$KlWnsr!t"at>; B : full{'pe 9f3fGi F!SP(LF fB-B76os,E@' G.O'in$ }'" oh,VU#421644.;` I7&w[N] OS fac VMcrST !i%|OosI% hood--Y,aco %GPG9osi^e 30( Ad nChes:ҤjIc%Trese,Sd }/R Nxs HRLoGTK6!lreGeng7#:B/ Fkitgtk 'NI9 tc!6K=04=?Y24>YMYaJT ,,:U!w145vU!r Irb{lou&a-to-,=cS+983 9gM aRecoMPvXGSX35F^si9928 M.pmaX+I6 ZGZX+/cAZly| f pifing[6inPu"0;Q+-agIa +[(43&1n power 7$~s4DwT@ no 8&b[cx80 eJ,pvܥe url3364@stM$Z3S*[4AGtS 80jpysd-:>2OAEP BPyC9Jxk52kj4a29&riM4nXaNmxml9x219}xKl]VMk2KVMT*f"5'>o s7cu@cq;8/qemu-kvm,f3 mp0mk/Rt QEMU: e1000Rp_5_et_to_ge(34UVNC=4"5pLinf7_,7() 32l;Yi+IDE rpXKMBR6*8ũNULL der_-pHB_a66Qam53c974Sdi#0$H @o46= Raw?:RAWob2Odigithoto[merah RW/CR2, NEF,<DNGOs: ao-|in .T2@ _exd1729@` X)w53 "D5:Ds(2b_XkbRSyms?z(Ks:/_bx.outSubT6T#X=M? $,X=X.Org}pm&:|pm|y|ߡF*%NoNPMcuL&#pL=;IL:M (Id centr edJb:B(d tra /c0 eE (s7(&i ipa3.Bs[M ?61!CP/V>r2&A_s BGPNOSPFv2>ISI'RIP?PIMq HRP BR, EIGRPzBFDZfrrect7ngheLi gp_Dy_llgE do93T W$ngU_pX_QSS7 NLRIs[:p= 1358Kai cA  Gnlri_a_()d/!.cd90FhaTjleda| 3-' D3N UPDATE,E3Eaa Jf ORFa*6> py|n- 5!;P#!1-W"pZ!f;:P G}@!.i` YisDF6+rossqMQs 804=2b+ O#z=Ns-7DS&.") AlPdsSt~/PodABu,X hn g.D"!.W/pIY-lik in%31*h Wb9b!/P?))()[Re-C:> p2=\k/iPAXJMA- 1lULl4Cnha6E V-fkey$aI-`M Fsm/up:Ixorg-x@;# }"OiInD Pty/RRODu53gRs/tsuKB ton a 637ZRͱPr6478sHN1/Fa/^hpXI@P? b8~AbtK ilRmas dq]229qSEP&abe\GLXa @@@ =~hSXISV#YHier3y]UO$VDd%WIU0,y 8= Xwe[X Xo'W2/>C uQU*Z x7 L F (OCF) 7 g q 3 c io/fVcGlob2 63:!?/gzipB$I1IW/ߌ2Ì$/;TYSD"$Yaf[E(N3)/=Vsnd`9 բ1d s,/AIF AU,'WAVsrc/ 4.6au.cb#286=&S.Zs,1pa/podl@P=&fv.}ci= Ku3net\\YHdetails about the security issue(s), including impact, a CVSS score cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:. Addi al Changes: For j c%TiseasseefAlmaLinuxp Not0linkNfromΎTPros Manƪ Interface (PMI) provid8p+m+funLs fMPIdla. C ExascalQxRan extendversf7stard specifiCly 8ign1support st@ upe~sizesS*Fix(es)* pmix: rcon powtt'_\obwnhiparbitrary fs (-2023-41915)mq*Network Block DeviNBD) is%_tocolacJ.hYdisks9 -lik!) overNn. 1libnbdgusp1liwwr1uzS:licious4\may crashz[5871)?C&hisbehavKhenPreturn|unexpUpb!`2>FreeRDP@fre!2RemSsktop(<),ddhcensexardpcannMsJch a icrosoft WindmWinexJVirtualBoxy:PrqoffselculŴ*o DOSz39350)GNull Poir\C@9FXL1Linvld ǑOOf BouWeS2SmigS-of-Ssagdi_multi_opaque_/l6lgfcocbwvulabilqCrejSu018mOQsRinUear_decompre_ba_aN567N`gKiveY`k dueiVOsv9vbuff2rncrushhMsrwith fdput`8`U3*O/nsc_rl tI41-U12fezgfxbse)Xre}l_LumaToYUV444F8th'Pcenabto\ RN, eiBsccu:Pa< t ;V$KlW$n.u!va Do; B - /http/i:niS (DoS)Res5nsTHTTP st2Ansible rp sedel-drfigu , -n2 deployD&taskԩ<}sSSH8doe fjiw .aem)b % a 1ip(XTagt]l (TIFF)}2X a(G2[0A'9faf4Fax3En ,/_f.c1618Qi cp7407458Braw2'D117D-HcpS pToTi1 /ɠ622=Mut , l|"MIME e-m.. Ksx !s(s,.mboMas q#A82sPOP36IMAPm.i80=1Pythons{pr_, vjob-'nc#, peG,asse,hy #& type"iy# t6y#)C-.vc4wT& (}:orep/_!r.pyf/uH. (h/j)%tupl27?+jpeg-!b $JPEGWysoFo42+c(tjMk1sa*a $asKb betQ,K ?9-] in 1moA}1jdcoefctJ1-293>9TCu(VNCE0#+o-9iewGdz7enF&on.o(er}ni ny 5n$"wetY."i K[/7T p:xorg-x11-3: UD1buDaroU5F@,F3>wgk$MgO1maid 5]nsutl73> ekgooV k@quE LGPL A=P <~FLACF #gA* -yNs C& Auq's6yCA'ID s*$G5mier bv# .-GloPKCS7 c#X e#9083Gnjinja2hJ2 p p gS r<(p8.1,DjqspiJ(noXML dx :l\Cd? an$alk nd*ed :q _9 $ n H? $69219=MinGW (M9ma GNUC< pe\ )#C! ! tX1HD`!NbtiO#H-gdb/bfd/oni!fd_2l6[@157=8gluyH=zQ""2G#i#y1NIsDc#,t>Ih2+h2c)oMl=KgOL2.4 Peh#=: X(r/2l_K0u 36p#*Fre Rl$rb ĪE=()0Disclos 10?J1/: Sto Cross sBSc!M671Akl#3W!D1@. K *K:(M7[G-0e"_new G604|GC'w3ff-SKBs+ix_ _r_Oic()UAF~7h7 r!WroupUas(ofYa)ev'!1Vu3Zw XFu L9sDtnRU24rdma,mpF1r} ;577YK;douNhci+n_dSnu gbW846(RCI:obal)Fc)2886Sbe pUARTSETPROTOIGu$_tty_ioct*3fĪP45y89912IP_CMD_ADDSWAPU /k&fXI_~%th T.586Csmb:' :H+OOB "2%)Gmm/s1Vina_c->u s 3a _pe&c@_yŬ528F?A'Vbridge: /in - "_hae_&_-shƯ78]/:VOETH_P_1588 d PaPs a0Scdskb coo g61SCIFS .DeIVWZCq.EAVw%de Xen\ed_+`&|&569a HsEZ`oseK 3Lcklogg K:G4֔txB u ՚ lxsw:L<?m_acl_tcaF cO Ki2c801<1^_ 6Y`*Ba9}/wbar$@c toUma oC_/]60 ref=QUEUE/DROP++Sa?WMddd/a3?I~ -a3WIM B+[o aRK,BR,+fP topprYLnfinW Pa:aq 2rF _dns_Xet_ndao63 GOpe_labelCCdbu_t_h 5_ns/C1އr B2B@Ϗ>]mg&cxML(PAMk aR/to a7pol@1/[2mp'p'2 H Hcp _un S anIi23$ :NsSSLuE~Nۡ se :),TW M (LGt96a fu,trd-L'p7 )fcK@-SIV )r'a0OfouOekHyoci*enV1 9<;K* OqH7`GaeX^_JX9.42ore* mbeG9s& 6/POLY1305 Mj-sI&KXaPEPC[ 9Ip+P QPdJG N <<72A.`0-Sr6 ~, LSysV7LSB $ ssM Br^0K;l], V RD-Busiv.@Xs, oQ)(.t[#ofTkeepsDfe47.fcn]r,snapshotcWre? PsH , !4L=un U E elH2a?X yO@hIo:Y d-ir-c^Yysv2/-@lvbUnt renszonVfa=- SEC=y700=4sP*?CXu8bQ >.+er-:qxyC_/ J~kfe^*k/o8:q Etho@A @ 6009lMia+tdigQ691Ac?!aisZdenMm-borw[t^BT^RIBdift-Bϣ FYLHbV<2,RR>hbv$5oma<\:G- in%strCs\!85*q>podman  ss,e[ai"DMP(j'wi~;=a3atiS0corrly.bind: PreparNSEC3 clst r&c exh!t CPUurd@3-50868)\KeyTrapExtre[8cump~sv atorN387NSific rs query s`ya|aut-of-memorywdiua6516`E) iNS64_-b&asserR* duLuv5679vQĢ5RFC 19184vre zo7r>“nxd-redi”d~51VParlarOmyexcЪloaO440^-dyndb-sp:~tt ABhe0 FKetjbȳsi (s)F ct,CVSSG cknowg,rela: ,fGoR`gmg python-jwcrypEP s Web>WKS| SEnnhJWE)TokeT) JOSE Obj VdH)ndardsE:2ious Cu:FdeniSice} 8102) s API agrac^5 izcapa ie* sIng,Vr te_~edQKX:4f-by- error'+vL5esBySts()1441)Knegng_new0ngIunndoZ 94T%p :n9515 (sGogrammnguM{  r fips/nssl: Mkq edeRSAys3Sb&t/":' dRest.heMultip: FC5290T/cookiejarw wLnsih,Ȥ8s HTTP u89u/x509: VpanicFczf Va  ubl kegor 3m:ʻC,displvQ r Vhtml/p:s4n9 M medbr < estbn5, x/ 2:liminumbf CONTINUATIvfrs SP mod_h2 ApeEdulsA2m (h2+h2c)ttb=ng]L2 3:73 Lib| wIP,IKEU.iSPg:=g hyO auth};y 8seOw{unnelbghsBouchpriv٥ (VPN)9l@7is# .ShaH 0 np 8shN357MPMHnc9o-PiloHPCPXi V , 4acquiarv)anysfv -l measur>Cli-weCbuң^tŲ1makeet icuTwell-ceG plex  cp:posq zse} exUPvia p}xyL3019:L _LGrafZ L, ferirzdObo_ e orOG,fluxDB & OUTSDB J( kvuln +' bypas=10 6-pluginQ KP} gnutlsU T NU L(GnuTLSf,b ic s3~SSL, RD (M0vazde-0ne*p883xNpazJin[/^M xSc DaemSSSD))ad',cF bo meism9soSccI ")M!P,gA[MY sAM) PWow;hwJ-  lfZtousssq Ra}PHGPOE. un/sl3-375s*t|234nPscTotTll & dz16)Is7209)V N C u(VNC Ku us&view2cGksen5 on #onoa"whetvr i butny 5I }v tybY  igerl TcliHxorg-x11-3: HeV"r/5R cXI#SccgEv 108M)`GDe`1`U-aftfreNRenAddGlyphƫV fxml2d+ op box_}XMLu:@w?R~;506GLFiS(LF@le?$ao sasoRF Qtex0&  }s\f^o6" JmBN$ t sa3!,). I( *K:vin5 )- n u 62! e743 hw: amI% rai#VC*!Uat iAMD-SN08,L2 ffdhe*9tih inrduc0a2e5b909w._ed=1 l pairwg cy tsl 009mm/mglru:*uV Q(B[EMR] [TBOOT OS] SUT > ldX gonS3|te9(2 Tbo'OS O |$ -16v BUSYɄ673 m"te - NMIsi E30678E0:6f:00.0>##e<A+timC110N.js oftw}(fas9 s- T&JavaScrip>+nj1$92(fe o re" URL' *"5z Sm %ACnLObfu@2Pb813c-areOa__ _l 25..NETd-ԫ7? bTWC-$#s'n o eICLR N0 d`4)#rZ6nr@ig upd6U'VSDK 8.0.105Run5 dot:& u)ou 004?+ Y600Y25P 8*?Z1Zas@NI' _?c0KT, o@enx 1has1 p{',$_ol> %k"yfo f|have |Na rstmeB(3.1).y!,47V3:fG(uRSIOo 2(BRCE6.rL_o" RGE1Eɖ_Reg4e5*VԮ3 $Id M<(Id0b g80Ӧ:wT/ZH^oq/a ud rs5. m)lBgru"&=xy2 -|o d/%2Qt)+t8`Cz@X;obah0?0I/)C ute-].{)f-2nt5M a coll/";k>,p7(r$s 54t f w orohFty re:O pve1ܥejinjaSQ+ 5L;hXG4064yDrpm-oolJgemPML^FlOST; ot-L4"4;s b O ~Bͺh-.M!-:t_o &w:Pld-/</md [O.z]1852*Us;PM`ir#o8>O?fv.uon|KunetG$OSOB.¬MRÑ7GSA5YT<A =3cslirpCK2 tep@GooD&gViso]* .y-7ZmparC2Yvc-tap-vp9b$figu-%X,o ^ sosTX947)22 2-657y"8H,-n"IJ68.ExEPp_ !UC!e i,y|MfM SaboH.+were toi/s%0R) awYk1k/O/I! scrCafsG3G /CF F>6> I/7I/2iI/20) uFNp#s\ )bKA*eQJz:r[ ln&l~324{H{Gho]Ls- rXKP1NM2u u.Pfs4Stnoetm ϡ+)Medq2|hLPVP !TrW-Dri h1^62.1t6;M2QPo,K#BI9_v1auolAH/ES deQ$2G"65dlK "b87!f&,ns, Ls,y8 _9:imtWiU/Cw,5_~R+% "<l oE'nf.Tempo x2Ip)b/G zi8.{"-bombO ];GzyU crevi[ rQeY+GYY$sH 4' ' Ssk uX2encQa }/!'siaX!pSj8his/ais Z`_+(Ǯn|/us(s{iw!iɻF][e3ǥ!o!rgRtc s20 ,,W,oc545*qal.b465,6h'kW20*sym c&1HF+ct, a CVSS score cknowledgmentsnd other related information,fEE page(s) lis)R#ences sec7.TPublic Key Infrastructure (PKI) Co contains fundaalgckjs~quirjby AlmaLinux Certific Sym. Security Fix(es): * dogtag ca: token aunt;Vpass vulnerabil@(-2023-4727) For mdels aboutsuissu,cluding im5o$golaVprovide3Gogramm(u$mpilerZS: archive/zip:rz hlPof caZIP fSsb4-24789)Onet/MUnexpLehavifrom Is method6IPv4-mapp( 6 addressh90Kernel-bas'Virtu-ManUKVM)full vizsolu2Hon+varietes. :qemu-kvm<user-s/on_runn5 ms5at6 Zs: QEMU: 'imgG' leads@hostQSad/write446; _OpenSSHn tocolle1uppor,ynumbtի, UNIXsimilaptsEItթ7necSaryb!cli_erv8o0ssh: PossibmotkUex3due2a r^ndiiignTc638kt&3!,ny.  *K{mlx5e:"Dsprd bugj timesta(hnapi_poxextH52626)kBluetoA: AvoidQt-aftZfreemhci_error_eY6801Ycrypto: qi- 0olveEd AER oyU974Uxen-ntdd miakb_mark_fcycleK7393Kgfgadoufs__cte_groupW[smb:]UAF3mb2onnh_()35870̨r ly pkwintO96O: hns3: no/llow ll_nic_%_%pdl1 40 Bci->n wi_pumb_JIRA:T -2894BUG: unaefe faulccf16bf752f593ff8 [aTlT9.4.z]k35672k[HPE & ]quemergAMDi^ansllibrpatchpix6220x9]/ 4\/_de.c:51!\68icDPLL-ݡ71)CNB95schedpd TCtm v6.y764.) : SR: beb XS69TRFE] BOtmpfsswapuopU825#IsoDs,uws 5Og^ ^8as W .ۈ595ީ]G oc VFbetTx MDD ev"Z9083MC REGRESSION] bos: br z10+ ckets495ybnx2x*ch PCI qe,JurF k432x buildah i lfac>t0OF~im. Amoth'cews you CiworkRN, eiBscr anoa .rpo;V$KlWn"-a D{r) ;!  S-fips/& 3Me9ysk& ndVRSAylo# 1394 podmanv,f sortZengeCheckEli"ParraydevqT (83212114P[UTF8[zeB1"4B31BExivemb0lengTan in loopW98W8W (RCE)t-Lt05480[P200}?savde2106e4eOut-of-bosŪ'|2DO454W O1L11M+N7N7N+nN2727+u%Z(TIPC mkemb`(504$88(e7&isi4on&_d_dc'NQ/ge_sr%by_O''vÁX'c)hclgevf&nd_mbx_msgV9vC(m=lNdelerתbuf,Y2-4862(: j1939:a1$MadlyPngY#_6s_rw `)3mm/vmsfug(akeup_k%d["(aD"zone67$s)Us?%bi,eBrPTP WQ x@qtrocɹժpulMmD a_mapÐ85B f_tG#:P+ce"Sa*7avm*I* &rx3cLW435#w,iE2~o#2&tc<2sfcu'_Q__zerocp_twsk_uniq7).98S)d'_hmm.c:*src_pf ? 4\854Ir8169IlRracTxR&a`M r g-ivcm!an8841^,ytwT)Pif 3h%be2isd!-|2,o40x2:..ofUy-{)sGpaO95blk-cL-dK(iot66 Q #% V%ki d1 %4t54G9!;)xmlR#3QtqtP:Delayun7 le W!po 9936Y lmxws`e,\\ httpd;ApacHTSL$#8*fG; |/ ~v9em . @pnYdv2738m )DS !tity en uD4Dn8+er.A?7?PSSRFwP37E`bN o E](E dSV~:L! &UEFIW :Vi'Ma 64-bHfirm^#I#:Q:F2: gerq .Hob2ouldJHOB OR/W226edk25'ctTCP=iAi'{N=!5452zA  W PseudoR; Ge D8Lw-eOe8 -ty-e -ad/vsuq"ky)ktop,,ch0dHosp2ep #%&uve8nddrawM?. ,s6iK#but5hO!*llt(:9%cu.%pr!tlle *1t-7ȩ cMa ph,0Cuvm7i-p_Z~77f^5asynchEoI/Ob;Dom< Lookup '0t9at.@80 @o @5n numerh$3 D:rhmRzP 3U @80@@74p alsi0)fg]n-terack;edn'f0X=NetC IOEL<4418& 3NI^f.NFco st7+ecnF\r; lug-ForB1in)+%l~Su))a. :c2s ,selflp%ofl[0je|sN47:p{%"C 6alightwe,:)l+$.<F (OCF) 3Nr-.#Py) n  3, vo<.23e QI]8 os,P s, 68i vBhvel6  typeæi6 3sm83 C, well.H;wi op}h JIdIpriv rq+4032cmm~!/in0UPSd p* +@k/c@?=dMstLrC chm:0777 WqSaPd-0xyr g ; Es,"FTP,z_irq;T#N` (i9R90RsC#?shut]nĚ8"scsi;"f2")fc_lR_ptp_ u88hN%1%_K@(~ Nrx_kp],`bM5`pRel/hba%ef\%$_h%_þ4!24]MovPIV'Lq6AE6Icn uph5*#amd-xgbPOa0)I&7#eP:a beyDrTlifeR#Œ#0./ FRADIUS3 {lDRi)AYDInhrhe)v :5PCrYBa r1uOorg p /ko6 #sa?OyIwW Z3sal or +ZloiOv47389$ LDAPA "v3=t%vLjA.P(@^<-lut,-%dmw-ds: l8e MS},!-se&[ds6$Bel_: #,N *(BIND!n)5JGEGJ(na);lp(| TMo,, W~;7(vL>zais l@bk: 'sTp_(sr"RvX"RRseist s@namc1 *ivSIG(0(exhau!PU% 9%úAss\a( O othK&!8 l B/G rlS D 4L!_3,&lMPRU ily S¢1rib!E, e o[_ /Xpnc 9l%4E, Eje;"K,ckkg[pa/ei 3i"wnpV}2_1in\3d5sE}:k+4/+.1+(jm+Fucr A diaobscue$U75 ]OuVK3z7$5ǂe!sw#'ee$4<c/!91ŭk,/x86*TL40M602Ÿrlg'1=;7t7G606W525pvlt;=!7gi$tls4Op!cxl/<ođ839őbo %9]nr -BL:Vr J cT`H (N ycZgl(' ,a'e*r0/2d55-.2392M;rF(vTvac<(N[Nf.@mz4nz"TomcaFnle5@-Qo P(JSPf5echno+.tq:;Ha? E C\E C03{S- a CVSS score, acknowledgmentsnd other related information,fto "HE page(s) lis,R&ences sec:.Node.js issoftware develop} ppk  building fastscalable network applicsyJavaScripNrogrammDlangu. Security Fix(es): * njs: Bypassbimportstri via data URL (-2024-20)Ifs.lstat bR permissDm$l=18=fchown/-E36137) F?mo]tailpboutsBu,9cluj act,g'Tkernpv7s conȤ3Linux!, ofyo$syom.  *K: nft_s _set_rbtre4kip enterval elefrom gc6581)Wetfil9Xlimit:"jfiguthaauselgEoverflowd668dvfio/pci: Lock extINTx ma© opsE810Ǫ: ice:$ potiENULLUrȡ._bridge3link()e55ex86/xen: Adomull_chec?smp.^90^_raEmutex afX}gcq_ͫrtithe25e%-ra__nexpr_type_get700cobjb19bSc{Kerb|?uthentB|GcmeyourEfenatn-cos~8ds/n\ed E sȲTktoe@Ghelpru-U *y#keyJce(KDC krbGmo t[*733Orc 0t ool =if +sizO"#e arrayc B ""~o NmblyNresJ furvy SIMDuchitvs2C ubtVPg}##\ -d fM#vulU ORCU0OK%Ck BNI NI),$sR  .c!wrivplug-in$|%cumbfGa. :cs)on=p!nvlrv>$oN4d go!9/x509: VCfynichertQhun n publalghm5 478A:N/LlirptVPNKit!tenIp Gos oasA$gV+u*. ypodT-mane\ual kom0"C, gvc--vsb4'DNS #}wi+N<unC8ghtwe,mOpcF (OCF) 9u me0&ah laκ4 WOCImagAmEth,cenh' $C:!N} iB4scd rM1no axr!;V$KlWns !(atk9; B bo, /wge71GNU W=  .x = HTTP,SFTPDtoc 1s isVG)l#per&h8428ss, %po} w/fv."g p(Kub9"teVj-yhttp#rFV  ogS#Urilla/sch-#exhaI+kas|tlKdes]%29sko mhl.uh- ,k+ lay0 uUrto(ev[2GhosuEsr. PDF dCPnss4ձIof,itmapXaaB)bep%dZprSd:X ~_y]shtSAFER6{295Y'gg3alS;+ u-.9Zto" if0urrd/cti\7tNstBubwrJ(/usr/bin/b)2<-rQl6s s etuid bVryAW)<)#2spfpak#6#šCs s&box es= (--)472GLib3 ֢0 bY/uCI ]:`-GNOME"Hop r,nrg] < un  2lB 43 E pow6ul,s$o F&.-y'eworade -Zn (el})2ap]e0e-!e:g-N:- (2-abbr.Do0 uunsafe E9331Dco IMAP f;[}UNIXA4[ma :n mindsa;aPOP3teinŢim&*dr3Yo$de d):{_prXeh{gr=a E12318 cz`N =\% f$Da59  TM3G?(fs3ROpng 2Va!sRs94%"2fsd!2RELEASE_L<3OWN 665m;6aE,A6->-fq@in'8lkS30S/bc7di2-by-6Twb_dirx3@J:gb7>Blueth9U= F7B-'Bkbes/?: Uepy~8_"_no#:3-%d94dKVMFlus[su kvm->{9o(UAFsvm_|d8ģ ong;:4a 3m 6s>6Ac-;Sr{[=i ufFP>of s_i,CjAsplhiopt_aS80$C-of-bos a inB;ê8z7mq7ap-.H[ru in&_';V=9Ausb-s) a&<*ud C:\aQi"izM6AEPCI/MSI si_p (97x9R !e WARN(9x9{@=_aH19082Jp |gror>JƕReve<4;2Is100>\@$NBFg icJ3;:LdouO payload7# Moz!r0=x oa- web2ws6 4a2 m66, 43}: 115.15/128.2 ES m: T8) f upAfto2a &(; U83Ief%%weee &( E9r.)s ranā2Ádid J>ig: fu5Le3eG l6c5)-orc-JrOOM'si4iWASM*invA(C5CSeEr55-an%s( popup*883 `M @ ?130, Th b-l7C  Async G15tLA[3mER76>i}: ZlMGxgroup/LtLPL`CDenx$ OTR cK9]2f-ag!#  2Qt"wer"$cl3G?syZGeLa9on;i{/r_ ,eܥep/pA0 d8 A_jOx 1in\#634Expaj C9yXML8eH:/gay#LlOPFV02O454HNO MWra:;1;i; 1-0BWD (NBD'K.hw?S!n N)HY1enblFA1"8DS:*i (#<7 -SS E lkii>oL3%"SL)vm#/m(TLS)Z 7a Ml-@-0v B%g{Ox ssjX.%1 D61BRub onD\9O9,uD|6t14"ȢT tarexmlwS56RE39X4rc-CanF+ng6y5 7NsuchG7Q, >]]>11941T433)Po -Pil0(PCP1'U,oW#Pe+"8ܤ)a Xd7-;pmjTurs 2-2= Z9 Ts i.rFula`;->rWx ;7TmI*m9+>eC1cprroo%g77Pcd;!|ugh mp/c#.]N6>+ 3GT>il $.Dlm)N100-?e inDtI'Y g{^-EW,CaS!

e=>kM,h saOshbo"';7 ,e r9M篬 T)EG,fluxDB &{:TSDBHg&uio!in_jlx&b C_mirr ['tr)> 8wK%yskb67dAR@%9a/]fH%:\@1&is r5or-m1%e%[` 2v4pfKyKha&vp#; X0XfcOE'fN1 %l7vma (l isie <$2f &J&%!D]le|Ϋ ]&, @\%P"_vc1o#__^+iCXd"`c!o &V"0_3el%K"gpio 6\w&wE _chaed_^yY899afd:$i(Co ak86fG%-FaabHe$E, Jccppc_WJai$P5"Cfs2H9go8]+PN`nlaA*#)G@sTof H gafI<=ydadqW=oszf/um fe%ACPICA$$I\(6'BARYNK.$_`bAc3E$1ht7Vri?_@70 _%J22f,dnrjaReEPERMbnp i xs_tcp_f_etj@%GL+FSh* (LFz[!aos, +os, eg c; VO7GzG1UfO OSTq i%@se8/7 oo4Be(sq>orIal>aDipn?4upR*s;l6clouUA5"tos^cpit- 2LA -snmpC /R *USNMP(SNMPnX|^< Ant,hmes or 0STŒ7ْGNEXTnsV|u9  AGENTnsLogń8݄9zBcc(-frs&qenI#_Aa c _I Cc?*<{i9S(CUP~ SZ 3i-9w 5st/b /Bd^ UDPADDR_ANY:631ZF SM,^0+/.b`cfGeterA` APIX#/" aHoIPP647l~pp- [E 8onUlxc@PPD} 4(_jk;( Ap73M#$=OW+C 1 &TomcF(leH*DBugRe5iI6 1.2{#?z(JIRA:Alma-58zfN^'Dv|/O!16tb989CS3<'formance, and portability. Secur Fix(es): * firefox: 115.16/128.3 ESR ()thunderbird: Memory safeNbugs(xed in\1 131, O`m, T\7(CVE-2024-9401='2ЊCross-orig{access to PDF contents0rough multipart responsesg393gJSON h4hompromisNX pcan bypa site isolation]. For e details aboutje sissue(s),cluding impact CVSS scG,knowledgm쬸o/r塆, ܡ#R pagm lis,R&ences:.Tgڡpv7svide3Gogramm(u$/mpilerS-fips:D`FIPS zerobufL55LMozillacissttalone mգnewsgp cliISpecially crafWebTransGquestsuld leadden4 ofrvice9.PodctpuploadviaLckjþ71Externtocol hPKbe enumerYpopup8mrup{dJIT400#Zmay oc whenFonjcern objr6,.NET 5d-softwaf!ework. ItleubsetUWC- APIssev3liteICLRZa N0viϢd`that addraZvulnfG ; avaJble. updU'VSDK 6.0.135RuSme35dotnetyem.IO.Po- Mle DoSwsuseSedLQ4348ZDSAoText.Js@5@asusce'ble9hash flooPe4{. 8100 k :sHTTP/3 amcaa raYdisN rdtd xr3822S Flg# R penurweb broww, JignRf:rd_ Xiper'Use-r-freAni 'lin.1KChemsp)9680:hOIPMIim{-tooܡ l2ep™MIlligeP&M mrf().ia}N s0 healthnito!ipmi: mcheck o@auth?z)ypeoLANssBssi29349podmanswain\Xs s  lib<rary,ich$oappA8 fv. 2#Kub%etes/:*aallJyP" func%deepne?lit vpanic/YexhO\415enc3/gobȐDer.a;sŕQuctureɗ՞b,build/cintȥ+"// +1"  tag \wiĥexp `$P: Brah:{i-o: Crypto-Po]y DiMo </kLwJNetqCNI)%|sif.wriWplug-BfiguEnninLLinuxg8a bsupt edaNIrnsselfj=p!nvIl vlloco' sNivle'. msko  s you inlf?zgyige+G lay sl attobeate ify} lese b j a0OCIAm{th'cenito  dRN, eiBsc ʡ7 ja r8o;V$KlWn]iODocko;) bo > j-1.-Ujdk|#J J1Environ*SADlop+Kit if : Heap-B#OvlIoSaDumpSc$n2RGB F3-4816"!: Array8dexAtegzf(8328544F21210Arop? P@maxHerSizeP286P08PUnboDd T-of-w err833144S17SIױ:Wr reGY263111+77+}21 reenel}h 35!,..  *K: Ll,suu_n(R) Atom)2874 XtBnft__offO-: dsre+   7-iR8$t "u/mlx5 lo|Zchdev$dh2ncyA526:kBeng : idxd:W oopsrmmod8le-CPUS +35989[hwM: (w83792d)[NULL*der<+ u-e[r1-473e!rmptcp:%snd_nx8li,+թ-n68!sd_,q:T.O"OOBCT!_tune()\978\Add aquire,0umaph2[855KVMh#WARNvN+ wiffs&x-htUsked]9#]ioif_napi_dh)B5*/Bxfrm6: ip6_B_iա8real+__s'Z4095gfs2: rT%_logu $Q207QY_ct:kep# zo_ht_keyW27$cnon-35 _udp_2_bZ8: y3K GTK%3#l$:d  :wB Fkitgtk: 2 U"0%R%CuE%4077FZPomaiousw4)vc!n;&edI0ra07|O s r[wW*~Gg vei'h0Th73$d ! 2fVis,1+bar '2of86AR c2beh 23271\bN%tdJ(2ߣ`be cerprin{user_38й5'ex 5 7-a418 Py;%nj"pr, acw  :$d9 ulclassex+ ,y hig5lF dynamr%di!& N tw&y^&c C ,w&tdr &/p}DoR9vecktrale  hG 6S UY ,2`* ,-,a=~mK.$d mp&0is,\9.,),xten.&yh1 va'R H--s)yW3 I$!$" ": rT!J3zmajo i=1W-%ssh< ed+o=&Krem )&ǝ #0ken ߩptkeneeoÿseaU!uyh *doc*. Py1^S'_-!j 6#-" pix2B$  "ws Bm"s9675s94?Zhwu:BNatBrN5h HmInj (BHI2CIaddCnq< rxFcopyA6640| reR,e;q682'af_uni4.gKClI74ga۪m3()T92mac8547 ec ,res-_(5@b6Gscsi:ߤunBcfs host<+{&Wpty  vm1p blie <tap :) d G4mu4tX9r(9iűerycRo36244Mu=2s-bamu XSSC78 _h2 A httpd1EB#2ntM(h2+h2ctngB2ڤL2.4 \Oer ><::Bbullq t~$~A2363\g1C 1046̇o1T9-DisposXbegn«rN/x-mOP-re_rN}1}Per>o}&kR,9dM<$eAW#WDA7,V9VSQ2@QdQ4DSQ4<7ҍClip"pax3ttJp#a sY5YDOM p!ID3PX N6Ө:o*JH3HOBj"8promptbe|y FURLc2Ӭ;dla Rk0L#Df EXR` ~-.'-' | 7qual"is dms aief viGQ?V%l9faJITaggg2FIFI(TIFF)\ 3: !,,.c7006E64(EZ6)pOFt'UEFI-#VirtuMach58 a 64-b8HpmrUIQEMU. rssl\o_i.509g6119OK @@I6InpV|inG#O RUN --I9, /pEACRI-O:~mk I4/$BB ( )ďlmysqOLY1305 MAC1clasW Her&PowerPC61UE):sp$+in RSA blisR237Ra j7s072CedkTempoW"A%Ch s ֤ny'Xi# ,W 6Alma!R> Not0Hed14<*:AN 4H@8=!NSBi, 2/p[:]()i'-fe9=inMEk91BxXw " e?)X8s W2 xorg-xEPY,/Wsinh3XIGetSe$edEvx 3105-bPaG#kb1bOR7GlyphƮ3F2[*//:c g.Zdo%/\tee y 6|.UZ=F go-r_$ygurl*AAs3&{)La61v)pGNOME Sh7p<Cf >]F5k$(s)8zN#qP likEN,une gBs:)vag0cap of SFrno''hN8ntr% nova=n` ! nome-sn.=i$l !6-A})9Oar/ve/zipKgFr tZIPQ9/netOUAAqIs3h IPv4-m( 6Bj90X.Org >is an open-source implementatiof the X Window System. It provides basic low-level func@ality!atll-fledged graphical user interfacere Uign&upon. SecurJFix(es): * xorg-x11-Fver: Heap buffVoread/data leakagel ProcXIGetSelectedEvs (CVE-2024-31080).bPassiveGrabDevi`b1bUse-af-freORenderAddGlyphƮ3) For moCtailOboutsCissue(s),Wcluding act, a CVSS scG cknowm#,1d o/r relatinform1,toR pm lis,R&ense+i8 Changes֤n c'Xress9jAlmaLinuxt Not0linkNfromΒ Kernel-b6d VirtuMachinKVM)$7s6 v#izsolu numerous hardwpIs. TD:rhImodule conns paw>hE-spac)m5urun m.pV alsoVAPIs5nag/a withPodmzst 8X technologiesOCI gol;: net/[http:]()mime/multipa2text&to&euy exhausRequest.ParseMCF3-4529e[html/Op^: ]orturMShalJSON|thodsy br < escap*24785p:=lW`DNSSsscanűviniSloO8OGDeni̩duemr@ 100-űRe hlinMEk91e n ariearItmureqemu-kvmwr7_na  QEMU: SR-IOV:vd NumVFs ds fl 6327)YDMA ntrancPdoub vulabi+ 446YMSM!ISynchK*7 NBD0"D=Socket Closur 7409B`WebKitGTKG%port\ a web r Leng~: B* Lkitsiaiciv s4^addr apoof92843)Zh t QrbicodeoU950Up es ðbc]Bmium-brb ANGLE4558CW yn-jinja2 J7wopPH.1a Djo NpirnoXML dxt sup~ xpr|ons;s H ` :cepfkeys"attrieuW L064BLLDPLd [ c .5 pLk-Lay4s) s EbCDPgo{tlHvekr me ism;eliwnotifNأSadj= G work4 ldp/ vsch:]s 1 rigge] l 0-278 ]d: -of-ndwhde%ONMPe1-43612JCCPDU P+ cdp.c_1910BLPop9r( PDocu F (PDF) ,by aEȿDvim p?df: cWk`so-dUraIx623C _auth_nidcO ID  !ec  Ap e HTTP >envJ!AeUnyPy/iOAu2.0$p : Sz`OIDCSmTypliokie`mpula 2481CJos-'u Javascript ObjGS0]2Encryp/[jb jdep/[clev~aQ.toge>nNB Disk}(E). Q: r817a .o olCPU sumpP3-50967Fu>+s) -X kthcA } tk3 pv 3 oA:/ L> CWD65CIp mJtmaximum TCP0ndwidthuneV U islreL, diyAt,c-gR  iV3: ` (7250,ESNET-SECADV000p Mlmarv0 ioi:6306BBPF mpi CqB(BCCe"(f effx k t onD\!d BerkyFee e) bc8 unlv:#}scaoh mihl=hN23D1 в% high %;F tfenhan &` iltre@4.x)LLVM Uckeo#ile ,5-bytekeTע!p ,owe&ex.%i`dynamB&$(kbe{ J%u%{poinL  nwk9C@pec orLrsDTI&'T pfC>C%G 12n<,,d_premF;]hysٺy #es,OI(:hcoCird-p0i  $" ":rAr&J ajooe tsӪF-%'u$shoulҢNe o=aloKrem)s|ǝ'SrtkTestneeÿse? t.H h **.\ya _ge Dna#$"j"=fi T0:vzipf^ mbs 4-04LfinreIPv46 rQB4032BcI"5ZIP !f8088Ivko-or Rcl-exysy& .&y'.dt /any Cn .ww/+\QTR!!a|!-MySQL&Py#iO'e C- xcWx(dbf`Ch,GPI}!%J -pymysql(]uua+inputi360FXjay{-imapd  m IMAP'OP3, NNTPDSIE )%beJ#I1EbyxnLITERALa Nl1Y1?40D"6unC n 7ghtwe,+3x v jF (OC.2ruUm #91D6t'r)MaTs .Ag(MTA)' pj(likDSM"AUTH (SASLTLS :?smuggl0CD6 H#utJ json s 3EBzD'3oci->--h[[ z'lk$ )]U7cw' 7zKubt j* jwB$o >k= W1Ke;JWKy!%a6S$JWETvT) JOSE  x%)y% JWC,Via3ecg- ^*f W323"81F: 7[p)?pow ul,7Ou5 |:a'pel"387F73R3S3)].alg5*hXP{3M3A323C ViNVi' d|3nUd d#,>vi eo vimHLK1-39mDbluez R!3fo A f B9tooci ,n7h ,p6d2,q 2(pcmc\. ?! oHD@c  t/. $K23e#K586c=ZdioXAVR9NVNArrI mowCl0EhV2734phonB1rtLY596tOBEXDoE cN`4`aLavrcp se_me_d2z2ze3{89{m_mJ_s4n0nsy2(44431^0`t2C(Bub wraS /usr/bin/b%<%N7n!  ssWirn9U3T fpakMk"Is N!pZ sdatasourJ-scalable timrirom pm Redilive PCP metricbpftraceKript>das wellseveralshboards. SpFix(es): * ou/gob: golang: CallDeer. onmessF which connseply neYstructurcanuse anic duest exht (-2024-34156C?i open , fea rDﯴgraph tMGit=InfluxDB & OUTSDBdompfy:[-basbmuta6XvulnbilH478750Kerberos1twork au0nticsyGm,vroveof ylEby eliminatn-e prac_e4senpass8ds ovС/JunrypѢ. It Mow li)(=sƳeaHwithahelpa X.thiparty,"#key dis:buc]L(KDC) freEdius:gery at59ExpatOC/braMRsXML|cu 6>eN: DoiaC_ResCPUE50602F.NETEmged-softwaframele+subsetТXC- API#newiWLRZaN2_sfbthaddr]<> av. upd9U'VSDK 9.0.100Run ?dotB: TypeQfubŗlead/AVeC7Nrbf7Ԧ:(4solV6Kbo26a2 cloud8e#p vi| E #|dmstwv@e1d j021S vsso>XtCpo70acl:.v!5It:p 8eUEK,mrel ,b<hadb(WWAN)APPPoE,=T !*!a> yt8!vmf~RKton#6tj eoaxJIRA:-730diUۢW&rou.?is@2e#ipv4.'e-%ڂ1i$y2\iP3rusgn3661z" HCPop81=puM'ZtH3؊647 dj-17-j @3J 177EC+S# A:^hparrn ,21\ BB߹yF--5ig$K5suhtoUw9b. W is} )/twV9ƖHE}soyearsҢIr9(867, 712).J 21 +R%/dcDon'tp#p (A:3&sk_7&u$8k($@Y 015 $arm64/sve^i(4xCPU 'S7t BWi40RfEc-byIb1er'!te x~08Py| n M s, ,Q$n2q mDuq s s, BexM vA%m ve:Ge; t9N l. @7m C .wow @ jf28VG LarF S< (LFS) 0s9!suZ%s dioMm,@%s,IeGGr =G"} R%a h git-lfhFS.H5d_ en s/ '.\MKHadvd ,F-!u "oft!F CHH si3I w,n hE*s, %so. \N#& F-9. Youwp1 DeiBbyW+2ΡZ{I?8a,;qp'G( log :' LuaMGs~dJexT4698#Y(d-of-4 OcACL17?`hUB*lcjsnimsg y2-24834poL6ydKx 14 Q3,145QxMŢRCEͬ(31449\DuEp^rt6.X/75F 2<3",MTF-8-_53_am__cA+2C+Ma8-_Qi/-, R pQLFpa(My4 8mysql9:r QApr \/210=&unde(kaOJ8ae/iwMdaemmdbd) Xs"42- /SqSgInnoZ \O\3-2WepaWy sYrob0f0aloadlL բ(~/8)ePrelMor-wid'hIPPDiVS(IPV% -}&/>CE)Ō.SKf!7ckeadapli Wak^p'?T lthq?*sÝ'runsCP=(VRRPv2)X eveo&:Zt =S5Lia5rrp`3 _d>& 11Tpodman |) ss,0s 0 poy': a`fv.r!ndKuVnet  ildah:Wb--jobs=2'K_3G9"l%S11218?F%3ja(OCIC. AmBt ¦c$ytoBeaRN,scr2orQ O;V$KlWnB0s; B" Szip2 ʡ'$",Sf (9o ('m,<7 ,haCk~ +:U-",e 'n2;-O'il19&90.9IPCI9%i'%롿Ita64CqIFF5Set:A:Incor7h9KYedd$I.cZb98 ExIshipy5o)rI UUIDf)"cpWaO* /te^mrsf/=0A443PBiOQodvcmk(j1 )227}kEdx!e_5[]fAa6twri(t8r h, S Ų&)K@em&tC1>iH0AmWnso'D,h+k SpE1nCr&6a)$b ///K,ks598Fs8t-9b9h'bi-i6R#e t0s3b2\0thd-ZT#XB/a$)Gs P/)seip4nd" .:p9"c3/t[5466"cU/ 56c';:eRCUtigmp6_:O07[Oovl.UAF9_ry_(3_^ mdI/+_%d8\`dTatmi6 [ecɬ200/udCFNsl-1$b$s L7in*_f_X2-j46Xvmx3N(e6>in'_pB_xd377j'xTLS k6034[R'D[D'[crUWY(`[Q= zme-n-=nrCky>C umjK(MRGPDUK0aBV J5J5J7J710= ̌~Cud-mcghltL c4jK20K& aPo#Jpenof 1_; '0biD2so LA]MAmG+ErqvlaNf HdXSLT@0 SCee[ngtKRasS>p/K$dĖ ]eŖduurren?azCYvCAcfer to the CVE page(s) listed inRe&ences section. Tgolang5ck8s provide4Gogrammi#(u$ compiler. Security Fix(es): * net/[http:]() Sensitive headers not clearon cross-origirâLD (-2025-4673) For more details aboutsissu,Kclud΢ imt, a:SS scG cknowledgmentsn/rlaVformaH,+libxml2rardevelopZolboxle of various XML stards {: Heap use aftfree (UAFĩsDenialgservic DoS)9794)WTyp0nfusL6L2: IntegOverflowZBuildQName() LbSt Buff1ok6021Kkernelzɤ4Linux!,anyopersypm =K: x86/micode/AMD:* ;-of-CnSs with CPU-less NUMA d2199cloud-initga+tscripts f5ȡS. C{specH9run dTiz"etrieveKll SSHy %le`usOYf :ermlaw4-6174java-1.8.0-Jnjdk[OJDK 8 J1 Runtime Environ*Softwa#D!Kit @: BetGlyph draw;r30749).Enhi TLStݱhupport6546Ime+J3s4614˚450106'BugO>erfvigurthe5QIPv4 wav6 (ei$due -D..-B`=tr"be續fiHrIintza*%@s)method ^IAddr.getLocalHost() wouldurfully quh+naTeIh. ThihavionHe ndLS+ risBtiHfrom'U> .-OeasewiĴKM(Alma-102904, 567891012717+HTTPi hlt5005t/6ZD Hdefault phic#displayyWaylB"seca! fure*tradi!bX11thatawt.Rob @{akcf nXptO,duca bk[. W/ +updӤRPM n $ommec 2PipeWi,ichscanĐNf6666970 21 +83845 xchoomigrtaskj one;$anY 1 garballor,AllocRegobjr\ssoc 9atsamʪob| re r.thr S icC, bOhê l)rbit'chT-to-T Qacrash9 )­ (dcmid-O olvis by ways s Lp/oughan }903 81JGLib]sFapplicbbJkGUiq-tuC4t]-GNOME ploop,n 2 g^utildfunդstoatauc g:u_n_msg(^4-52533)?(Und@or&/g.c g__x_uni9r43ATomcat/ieA#P+ (JSP) technologi twVgp0379 - RCETOCTOUޡu66337)k: malS//2 PRIORITY_UPDATE> 1650)dma: uvco:m d%pof8002)Fsunrpc: e SVC_GARBAG.5svc aupesas'o38089[idie[vir  cen^edchite. Aspo.'vSsTG -s%m(l : j ea workAcopy_'revi Gn exact$c9h/al Ȣr{n)*G ce/us~ ` ir a alsoxkeswpoMbleoåN LHdoe saEze URL2 yxc ene tc?03p^NewlineinHElp exfilt 9g033 z ex83846fig. es353k4*c `31(4ƚGUI hL Z has " 5f-3ntsa wr^)owanAlus}s1eiabcy tarϪpveGe s%p"!s:V Trae)Vulnbu  +*I x72 MozAa,E:" -sourceb breign{o a:"+i,1 Z Rf:u] bird: L n#ctxc 8028)`Memsafebugs<in. pmdiCyZ958Dz:9Wun+^acc]mii_nw_YZ6Z/mdiobu:e- 6457/Bya1SQL C>y wM(base .ub&92NR"ed%A!torn leleAPIB*v Mmsık agaU'oJflexinadms3<].D sql2TBi696RedP vadvyd /-,iftf,tod-GjZceI!j,hsǥs. \m-e"Youwistm-bymh2λ,y o#lxo9X ; \ `r:94X715 7Un#A44C;67CHy og OBWu|7+=C(ssUY (ICUQ!r/-fu7n6 hicu:W!SRBRoot::UTag !522 B]#B]#(TBB)'++'4)1&tG?5v tUneNlor tiXmi- k @ jque Un HT592>DOMipu$!(0-11rtpmlTTFPzu Mo'ePM)a$ +tu:|R 4913Vt}C5 Jafo-akfJ9A  ellL ic(7LAwi |.fasr ?.jr./ ~ %  E&5299"jAslAAF.JatxArrupuAPt742*Py npre4, C-R&pD2es mexceU hi- dynamdin=%)IeXs3 t(t?R>Podm36 X-PO:OCI 1n a-CKkJIP?EEs9HH#?I>d?NVIDIAXTI23[@lZGTK%tof $%DGr?Z,:wBpl7/ a7! W p3i>on598+*dfa65G:glKA nload?s ekmay@i ,MV0QP!&j@rduɢh\.Er(P1 Sh8hT 5N4(B/anNSaf Bq2^q6-q"lsn7/r276r? ]6/sB8r6Focmd/go:EVCS{E_36ic bpf, te&3 '_skb_pkt_c'8:mm_R\'orE%94-2895Q@Atlb:F0Mb4@V^p,Fbef80RY nALA_fvs GUP-0 racP B&dp gs3!se3qpullb u+g_S12ŤA rtw88['>'G:Cg6C9Dc5 B4toY((N fljU YTi2c/S@rc( PH3Et^WB/':Cso]5~T&xmTR er]al4Do%\Xb S^D5HVT[TektrHx 4I/^iy a2 1 nwl-aul! s"^b^sLl k!ics.*2-6YX7.VhGseverayefT{75Ks$EJpioISO 9660 CD-ReOLouYaKMbsdt_`,=obi?Asg&v-񤄦poVskHm)VrRR^2>_90_Yek-()&.}&K |t|`Ć`in?8up` 89/S`rcokFe/or#G|:RbR09182lS esjrLcbtAu>L/V6GMPq79qme}poyCas2D0gUn edb?Ea1aUU7U13lB+40.2*/Oerbird ESR 140.2, Firefox2 and Thund&(CVE-2025-9185) For more details about the security issue(s), including impact, a CVSS scG cknowledgments,o/r relatedFformation, toR pagm lis,R&ences:. Tkernel pw8s conɤ4Linux!, ofyopersypm. SFix(es): *K: udp: me>ycounFleak.j22058)=net_sched: etsHdouble adclass with1em ahild qdiscc37914cice: fXesAchdearesetenarioP8417 N.jssoftwavelop~ pql fbu\fascalawork applicszJavaScripNrogrammanguQ Rici: U UsInsuffly Rom ValuZ150njJW6Threa#xposuvia Diagnostics Chan>S3083SGOAWAY HTTP/2 fߺgausOsicheapP5JAdvadGtrus D Environ(AIDE)utilthat ctedatabasfiloyyǡn u=3enâ:teg;4dGs a:crpneutralizabbyp54389Mozilla. tualon֣newsgroupS bf :|[:Anial-of-serv du4^Graph: WebReFmpw 2lSbocaprinvd poRrtAo/V!o MPq79qme-origTpoyFCas2D0gUniniti=QEnea1aMSsafetygs[ Wu 15.27,28.14,^+ * PgreSQLn obj%-q+al(mana(DBMS) pjsq: vex0eG i; tM @ *~8715)WD\9N4KImod_h2 Ah ttpdulleB 2 toco<h2+h2c) op libngB2 L2.4 er .:dxy_I: u from4 sf f X49630yth pre4, a'v enRy, w he3excepy y high#veynamic  typdl. support& faթm7LlCjraJ-ell.vu@w̤; |cp ^ ow par ar 194:gWhfscXaten UAF_dequeB)782K40LMMIO wres-!Ea1_cr_hw\8200\RDMA/iwcm-af-fre,h  cm_isb11b/Always notif^xbe)emps`3*`tipc˾_nosoJ46vsockK ns_* TOCTOU:xfrm:Ő?ha g lW_md=ri=by  uTLS 1.3 sesum 48z/3HijZ5aPupv`A49812luggAuth.  MD (PAM)`amB a7< need2rZp hleH l- -paL rTrama602itmldޢ 55&CK6ed #amas)OpenTet x0[:]()= (d> edcr$ ТLD4673podman 6s% erIta f < y /+)fv. # KubTt  k6+b mmm host)9566My!B lti-, t_.A#!<I scsM t (my!d  op:Ti ,-ECDSAgnatM+8utY 13176 :dA spec vulnb+(CPUwr 0722NO7 m8 r#N688NS"do##U99UUDF%1;<Re %P3PC=*i#[$XP#/747DN8ĚDML%H{0-InnoDB%47;yN(40S%62G709Ks$L0]ĝ70<<3G'Tt56K7038KDD&0tPl:1Sxet eCs:539!JulDž 97N%N787H-9:210NΗ!K8/X7- En=/C%1%ėg U +1; .N=Poo'$=(;+9+S:102^R7  =P302xjK I.!-sour-4brow)!SA$Krd'mD, pp. )N KgK;hK1052s2rp&b=9 EP l KKCh, fifbehavior8XL8Ԉ [LLay\9\KK3K3K3WK3v >t;I=wNQRU76dSPer3^SVGP(gnutl(H9GNUH6n>Vi(Gnu8h(1GW22algor*LpDGs*ch2SSL,k8D : Vi/d2)temp:q)Q3299NNSCT+:onJJN SANT_I8I3T_$_fig_)os@iphl*u)-63 BugQoEnh(3dBZ#235962+`F1)\E2le 1312PKdwc3: gadg^ e?3=nuntU;e>5@> E:v?10jdo_Ie_Y>(ܩYto ;unmoed/l>u ]84;390/cSCCB pr*c>96+Mmmig<8DiU%pWFB724 BINDU e l @6 Doml`nj #DNS\W(4<)q. de3$(n3d)olv$6pAIPfr,es;@&r  (rout7#AA9);_L=vlAfyaisp`l b&B:9uF?F cexhaus}7611|]-- Ss??V%ple9d vyD7 o s2 eg8_seEPnXXCe5538rb5 nmAtokA43737cQ0ASN.1rs72fQ"OG@{D123ADJin#M1%͜4tC$% Sma%7W3ͣ1$ N0!&>GGCS%ZAFT%H#HealMoEo%C1w!H -52HLPRKA[ti#:pę) 0=5, N#Hs$O4Bk UnaeHedXNNRif35+P4'"h,)#͢<NP!+3;49#FPA6pel-a>Mmore details about the security issue(s), including impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:. AlmaLinux IdlMan?z (IdM)cralizPauO,ci:m:(oriz' solu b Qdial/cloud-basdDerprise viron . SXFix(es): * FreeIPA:m: PrivilegAscalfrom host1domaadm? (F-2025-7493) FTkernel pw8s conta4!, ofyopersypm K:/keys: fix slab-<-of-Dnds_task_fmI4-50301)YKVM: x86/hy2-v: Skip non-caicUddressdPV TLB flush3835_wifi: ath12k: DecrTID RX pefragtup err%hlj]9761ElibpqD provs3PTgreSQLi*,rary, which allows;gramsnf Eserver ip0sqSicԉ7910MozillaEox brer,J ignSJst i,@ ?  thu] bird`: Me]y safet9ug 117 =Ous` s)ad/wrinutrigg'd by GLWurew09wCross-Tk]du2 IPC m, 0iUse-jr-fMnaTrFGraphI::GetInce 8_An OBJECLaK%buterode! haviorY0 Fs a -K2҉ ඿ESR 140.4,D)144&Đ5ҐSoR OLscould mfi`Ns )(=SSHtocol!canu'{.Z< appl : osftp_8)-nfsdon'gnU^re:desvc__regr2/kmZ :|m_scpEn# _9yno-sirobe d208sunrpcysi l71K?ƣWK6,fivarfi+n #_d_ S981 cfg80211me:p lthW__#__ult`49cs`lpfcbuf/crdercdjXeive]c i,@ loni:$ sgro!2 jn-1.-o jdkI)hJ= J1fEL(*SDVlop+ S@ccPF-or5300Cf e?t6u BugySiA8.8teT)9.2hasX a leilkeea maj EZ. Wi^his, samO|wsoofo%&l@8.2,46f3 On{ somean 's FIPS#e(ll4enV_a eP>.!verpbuuk-Dd..fips=f8777, 8982717+־889 +6St01617tfufun4$anA$lkTagImai'Fil (TIFF)A le:b4 A F #AW -Wwe[9900GNU E)spowucC"om)L,0lf-docuk'$ItסZB -f "langu(ep)袪te-" el he Injvi "" URI Schemo )R)2-')ue stHt; mto a')-strucm 3sh sTs"ed. \D(in-m9. Youwpst6eiB um(2ΡZk%o9y#;O moog rOu@s"B)bpoMRCE46R_A6e-exLUAsi;e#b8b;#DoS<"lX9X!rUͺV*KgZipv6WrOMACpaRd lays9:view2cG|ktop*>onl4re&unn?, but>u 5I>neR!vat YarteA5isu -^sT xorg6@l3XPtHNo ycre6222XwXkbcv71R30RVRSetatMap&HGafas5nchm^imasn0ws~ !-/)2nsa^;6Bsim(!@Dt*)e osy]axZۥgwww.g*ct1r> my6HighA }(iy72149madbDB,CZ.DCEmpOBGte82969M]I_di__lK7 /*(CPU Apr p 0722NInno"K6CC :lWtwe,2i;;CuOCtpc$r _ :4>;3'm Ced !'mZou:UEѭ)` m$ fig^/dev/- olekw 2565m=dmar6'r4gadge A fs A{88d7 -lB"z} /i>E AMD"974-3635j4Ud Fvmg@ddmIBPB=tig 4cFBIND (Berk]y NDH;DNS>I4S<)t*Zd32(n3d)E2 lv$sI IPG; &rS(ro e>ifac);_a@=v{8fya(O#l r/bi CacIpoP;$u+KRRsg)Gw{PRNG;80;R exhaJ AiaO|KEYH8671:u< 5454hA_*[f=Mn 241aCop#aLWI! t#3i%^)9+V\G:r6U cK: tp=CAN7 , in0_rcv2C8a^so[ qimd-p p shadWC,WBg4668-Squsanckmb @ QF7Fv,beS en ey/o2 Andd()&D]767Ťtd*"6MMIO"@72 rxj/>aĢOket HI-I/OJG46io_uc:T0we{esdul OO06Mm_pcOddF_cl0__ ()Np0/e,d2-2x-U9ck'd 64n_)_650195~V>challsM29o/rwsSNOWAIT O_DIR]-!A [#aC1eC4@ir%/vKdc_queuX G11QVMX: Bu0 l PT_J( K/] )){)iCONFIG_BROKENj3xePXJRt] .Dw#ve (6Advis4 %s21sRDMA/rxe"sqp% m*reqG2&buafErq itV/s 74rG(v4#/ o8 rcu_Ü16N!lim== 0U PL| inZcKBo 6?*pc/xi)9 efJicp_opaO4:Nd 3 u9paprK<<{ s'0'd:_353v |MYJ!@N60 l/d<œ26a1s%>raJ__m u\î4/x"Omap >BOe>=D imG c0sUEFIL Foot T2GW 8'ar$ >rdl#8J h)\=LlU=In&:^ap-^an6oG-thYl4NFS^QL# 4_shutdown_ bFSen: gna A !pm72p_:_r6Y44QB="totrtKNULLup  79@?brcms#T ranctl{Ahy_iqc}! ms_nd80rRûbc@de__boH_#Ǽq=mlx5Pk ODP#Ɵdrm/xe/PTP_Ek495Shid"Q_*d*nd jrtw8 1cg+l_hw_s-* 4&le/ 7X`mt76925gl n_ch:! ``b'x FhOPPix]:Yid$ fu9uıa+tin&_[_aDto_vi #$_/ ;m%zeCo]  E:greDd?vrf:Al3ml_l3_oWf te beuEAM_OPTION_TYPE_STRI]] Wh'<  erRZF3ūvxlO _vni  1offgEloadc}-ip6_1mss6ASoCOF[ thda-daiDAI+ge+8®?LG @T'?b, ýX let.[.h&{+s.c18-17 Cpodman V4m`s 3ims@p%,lpuodMU/i/ fv.4c@p/Kubyt r8/sqnsER|C4m!9kub+;+N9Wb.1-8i\FB strings, hashelistseand sorted. For performance, Redis workith2 in-memory data9. You col ghtwe, _ 5 z OphCꡃOC c$rume ):4pK'masked 'muse(mra:31133)`ma iou^/dev/cRolekwm525- m=da, marbit gadge dVcfsc {88VirtuNetJjmpu/(VNCh spl} > Uview2cGktop notWl\m\eRicn?, bMany 5Rrne#!^da tYartesiVsu- Ixorg: xl3:af}XPtHNoy! c6222 XwXk a vO R30RV ^RSetatMapHN/pNGE ofYGNOMEtaOeCookie Expi DYHa"4[OBR]RަRL_1102X0 XT 8W2X.OrgoH -9j X Wind(ic >-lll a full-fݡgraphicF aQupxQt 3D<(near-l !m on^& ~12DVre%&nC++ Quick) ^2:k AsImx#A! Q3DLoa|.cpp~ sMheap[277:Berkeley AD*(BINDdh)wK (DNo p E/ (n8d); ) (rou so! whe'Xi~;8=vdfy{ape  ly hbiCisoattµu RR"077{G w PRNG;8K(  y(~y, }s-!eIP?dreHsy ;Roexhaus<O|KEY 86mPyn#e4, ac,\"-nRz mmguqm,a,fcep,Vy # dy #typedl. s¼m<c7Ciasllto"w  p-kdcp# naSSRFHRm?\rollO SRVG5908WRunboL d TCP eamKU9/ SSLkim#=ock_LayL:bTranso (TL ak enggezl-purpoBcryptphyy 8! "T&!& RFC 3211 KEK[wa9 Mozilla"EoxB&brer, stm) f: MmgbypassDOM:4uon } 30N KAo/V oI4IIn 2XJavaS: Webf mblЮ6dS^gin;~yWo rsU9RTC: 20QRQG И2poof$F757 $C&MLω3"xx [1o:3L  SertSl Slgn-On?SA٢2Zr# whNlife-cyclCfed"  i!K#Q +: TyuX&YEn'ouve-#4715`ha& `oi,k-nlotbalT ): vHAPmjso%podman ]'s Himnis ,'f*<1p u fv.X c$ptKub {% Go P?L pgo:eve/tarw  5s\GNU pOf%U2ke e(S( S(R((.o-oseJke'o;xr{i%; push6;$ "!q*:,L,'ce;y(dmA Ies#nkz. >evtutq4 `)XDey ,{)7z),t+ to-i$ sla re,fablr synchrz2bo-o,spliF o th. Of"ea=oPub/Sub,)1),,yHmEl,s5ǭ!beh y5ƥ'\#m[si *kl@ 4/!,c7 K: m2slubvo8w.-kswapL_tr_pr6*3~3 IMP (2,ML,p" m!seV,.R^ao89gt s,cen' s tCCs ^ RN,! sc oU 'l sta>po8 ;V$KlWngia ck+N;<o& ~e}.s XMLcu ]eK:E w^@##2tM D!XsC sm Ts ³937F>Vxml2d op0 &S"h {slۢiw4at&Dyn+Fu**"/.W971*nf>B$_-_ld()il@in+4_#id_-rm-387^ dwfg80": x/Acmp_oCL986Le1000eD;,#._eepJ98ʗmt76N'Fec u%C91CtcA Cl- _sk(sk)->!_ršdis955TBtolGMT: #si5UAFs??i"u/vt-DisKAty9Cifohlk 0058Xce_adap: }GxaYK|  F]18fp ':?mpVvk+V7LSB ?i2=;+HoH'lC - )(usO&RD-Bus ;vo$r_uD,ifde4#okDfkxsen +/ cgro']+tusnapshoWreqPst, ,r);  boItEal+yrol0zH22,-i:cHYysv 5-:8=  cl( EIa SUIM2EK ' FK\n/F m?858%KitGTK %9)LM?'r(3L :wBp L):?7/ WPE0)b8l!W=1350zgtk:s1??fOon)1V 3-43000hA s Gex tZys&b339Ph4>/hD}rYr7_r_X30T431_2CrSaf q4^40_r3i 48_2eb1-9IUag--j1394_Ly Ur6628f,cI : j1939:c NETDEV_UNREGISTER~,x8!-et/mlx5< OJJ7.4T2.saf0Gbu-=ɦESR 140.6,W biQ)146&! a0 1/a.U043?OJIT m_&P S2. ,X\1Se}22:nvasG1x 2\YImonUN8;ND3!2Requ(FY3Ҩv2p5  ?y9`p876 GrnaY, r 3metr9d boZm 4JK|>un8ed<(CPU Ot _05HInnoE#K447K627K58VPKOxmgr%N0NCs^$?9;2wim hapa,>p F a(y4>gc! Xnt fq' UoMuV  BUnianPo W13497lQTPM f 9ly  5boote iwn!] /mur o : KRegij#wsot4odu8$e r560hUl'_df_mn:&: 9 "LCAP_SYS_ADMINr1` n7&8Hm7&f4&Fdt"du!$#"*egor&66Ptlwai;~;a;DkJif*_Ap_msg_yDd3&%ObLPHPOG-=dl [J &+[ LphC$pg!Ion`2Jckps73RNULLDerSOAP-q6L-GRspcP8of6491fJHD<)R N2ChaOut426*!PcqP: zipEf Cexvi(EOCWLocor*fa@)_f82F,kN+l"5h6i: t6 ge+G `=s 9_ vW#B_ t# b\r?t  (:>Y+bng8va a mil.gbEmbl)f^gFJ P/lUH1rnmAmbY7)copyѡ -ly 3,Ŧk< files), ranlib (for generating an index the contents ofarchive@eadelfAdisplayAdetacdGmVo6bout binarysize>lis}psec2uobj )CBtr7sEptablefromvpcard4symboland addr2linver esstoR/*). Security Fix(o: *utils: GNU B Linker heap-bas7ojflow (CVE-2025-11083) FmoreesX7xissue(incluݢ impact CVSS scG cknowgmo/rlatferR pagm},R&enc'. Pythonfterpre4, a'v-orienRprogrammlanguq, whichemodu, cla, excepy Ry high level dynamic data typedl. supporfaթmany7m callCUraJs well.vou`ows;s 7p: Invalid ueOpenSSL APIyuse BufE-(en NPNwu`W4-5642)ecfHTMLParsIquadcmplex6069CKzip(EYf Cral DirorLEOCD) Locatow*fset not check5-8291ulQʦi;s.path.expv()th r-rolp75wTbppy:sVvidecu-ities ipula(code~ߥItKar, gf, lnmcopydumpn5CH toleObynumbff.ux, UNIXsimilapU necWQbo!cl _er o6ssh:?: CKaiercl/Hex\via ProxyComm 1984)rNulon// URI(oҩ u0yu >6be{.  applic curn ha20 poly1305@ba5987Mozilla.Eox$-sourceb browq, ignS2st[ sia[, pG Raby f: Use-aftfrexWebT&sKChil193'@AboIPC StTmD coulOrigg8^d$B鲐f0fUnqeccGC durRegExp0ilHK4KCkjregrPHKlbforhrW5Wthu rbird: Mem safebu7 ix"136, T5ESR 128.8'Č8ŌJITru YWASM i32 `n 64-bit CPU3P15.21%7ŠIncor XSLT sow o 5-of-Ends 2dQ%00$ faklpsgTa jar:Lngjh u6FKitGTK%Alreᢹengo :wBH Lkitgtk: d rQ mD4352 PPfmaJ l/redҭGa 5r01^r3`r5_r6CrSaf q41C bona Alma ; TeW th gi`b.T/\r- : EDeniTS i2 unvr\Ԣ;o z6815kThi' mx5domainoivirtuXhos^Sifi% ACME utomcg5te wiC bfigure d.oirĜnatIewal %'_mdpacHTTPMe_ (unidVH5575GLarge0FSa (LFS)X/l!bsu`a  ;os, qrpD0 N8s9ior7n#rtUR-lfFSw*ar .Ml2662.[ ;elm֣QsgroupW 40." F 46 4 43 ] RTC: S]alO2R mis.iSJavaSc:t  X8Sbe?p n ect dixmyGWansGLx PrivgezNetmN8;N9megin*icy,pasReqt ҨDOMkokΰp5 6y4~httpd{3pow+ulff R|?CGIonJr6508QUdir+AlFO[Ifd6200dDIPs _to #cmd=...g58098[Vj work CFu0(VNC)%}!oariew2cGYktop%onj oma!nejre vrunK ,Jt!. 5IL ne!l de Y!turTiu -  X.Org: Xwayl4ro oT2659xoFxFSyncIQTgH6FHPReEvK0K' Mze YRediW Y599YO PCctePaBarrCX8X ikbCT!OfKeyM7MHKWCSymsGXەVModMaskTII kl a4H!,q+# K:PI:lo NULLder-"{3-5260 Mvsock/io d` cocWvsk->tviO#0264iHID:: zero-wU#MI302I: bcm:# UAF_@_sh92Am; 9inc_p_bulk_noprofš3113XALSA:Cb-ZpoeExtigyMO de#sm8.NET6Aftwafr5 !b%C-%seveP%n CLRZaaN2-i4 fbthat(]vul'* n 2 . upd9U'VSDK 9.0.104Ru"me3.dot( E V×n-InMmr.hAs8&+24070jBugEnh:(TBZ#23497"814^$xml2 d,opO tool'b)XML`# ? {E AE FE l617 7St.) $Snq/fE[`9~+% I d p2Qz%$Dslp* dVVoa $1,Ģz&¢K s%ll,5r)8 )%tyl"eet me%is9 -s.c:85v*ipV- ,"]. s,ac0nE4curpy*%us : s MP43dO"O"7347dGrQ&na!. !., furmQ%S!dx&boj! edk#t=luxDB &%SDB go%-jwt/: -go8^%veT-hi4r par-0"9jinja J bkt gh%trXseT7as751'ExpaZ C\ B deNI,Res;ISE?C.DjhFh817k3 E0B2Spoof8non-BMP3iT57_9)Y3e8/ -orS0_ 7_ K 9=K 9Ì30GI(5;ImaM g: "6RCE3-4t2PSD222psp g333c?-by-C-AU0s7 lc?gBin%1ok// 592W(TomcR 2letf#e!AI+ )Z+%Pa#(JSP) t,no7#Ctw: -TOCTOU2Q+"7 GP"Q/o<,Ilosc <O LPUTE 48"kXH84-rAis[ex@ra*?rossU/n4467TϳH5455[:Loa* i Zs.5tC208һ?M:rD<M:qXq3042L` oF ,L, en\i:gob:f3l(Dezr.6mesbs6>7yMwux-W9anw&sexh34:A S8jl5FlirpuVPNK8tpGo$s JJbn/7gViJiM. ypod -/o:s.0arClKvc-tJ+'iQa:cDNSueJ }w1Q |.4-/x/crypto/bG=t-BA`28zNj -1. &-jdk pa+4JK& A&E1*Sr'Dw$ @.etTLS'nJ 15H7i. 6O:t&e/@fha6798717+21 +d[319of=s ~Ssfin5clB152&(GetInheriHNsLP)554 ^|*=HQra= (UI) Mis_<h |o5.BXIDI/tmp :< 28'BQLD#?had v<ede<Fүghc i# (/POSIX $4p),Amath%m)ۢincdaeK(nscd<plBKsWi8q{nZ@fun` cNFl "/:2a Cg's Tr=03=PHPJ_-e-d Ls ly&OjC xphphm?' `iysqln`89bS`byAver`cc.quotX8c-d'Y112vIZCaxyXxtFghtE* CRL=j 2[sh4hHV*fewrZer%'es]C |Zl*1217 FK* ?omitNh"V7rRVsWf iC[?\lfW ml lonIM- rGIrBeN@)J)tDcaOJ ,1γ{86\5N(JUs;E8 n +iFe EY-XP-408V? bH ":"`OinTsw0Z5 8 10 10Îݎȍon3 F5RubNtn'a', has4&&! ɢ BntI @%reoS=RE99"6rk-EVBhav 'XVwB5sp, >]]>4 Ê#46 633K~Pm&e6( :Ui#WTP@7220:MFC((.n @ I%foh"m?f#jI, me.2 +Ō 389m?(vLDAPD 3ZYv3) t % L} we jAAP[^)R-k} %dminist/ -dsB: niKq$"9$gA٪Q^cust)POS fa>1XVM 13OSTPi%BGuKosR_hood.M>[sqMx l;,]o\Glo.* toude#+) w2eoliSckpc[$RU:eE$ HVM,0lf- 8;ZY= m-4(elTE6e-i e:u]mLiH3'ro88539\!000:e_ure braDnQbA 0+FHj Us0֤nNc'XiVOD[eW]es-e\XqsM*{T-N-mid[.i6Y fyHd))isK,>6465A"Z(R ntsg g*a519?Eetailed information changes this release, seee AlmaLinuxR Not/linkMfrom&Referencsec]. Trsync utility enabl#2user o copy and *hronize fi'locally or across a network. S.withofast becausonJsenddifqoverfstead of:ing whol. ilsod amirror:tool. Secur-Fix(es): *K: Patrav$al vulnerabanr(CVE-2024-12087)A--safe-p"bypasVЫzpeN8NRace CoIHlSymbolic LqK74 Fmoryboutmsissue(s),acluo impact,LCVSS scG,knowgments,Fo/rat,foRgms,Ad)C7֤\_Kerbeqau0nticsym,ich canJrwyourEbliminEn-e prac_eW8dA unryptө. It ows cliereeaڻahelpaudrdrty,"#keystribuc]L(KDC) krb5:fIen cululog bk s5-24528AugnutIp ahid[GNU Transport Lay(GnuTLSbraryhleM ographalgortmhtocolu6SSL, RD Q: IuIneffic DER Deco Gtasn1 LNmo!DoSr243AwA3"atrs AbsttaxROnASN.1,(specifieX.680 ITU-TcommP:)sct}s manB}nH&uishWEn/Ru(Cypl90) e"=d_funs :Pf13CImDNS f A/A nncwa'quest nfigd ol.z$ %`src/b/mod.rs` js/avark-dnMTCP Que} FlaweA(|Deny,Sy841BPyxn m pre, D vjobj2- ^xmmZlatod,> y exce vhigh vel dynamY+ ypel. sup6t aթwyN lCiewell.vous ndow̤; _p: cURL 1 e quabrM doma 093A s!buil.c`omd OS `if:s, VMN .OSTr i%. useOsSd5ho  BesJ qM>.itcpload*dirlyloudgisp=b<o-|cpit- o-fips/openssl: Meyck er Qt RSA/y4394)d//cond :y: C7EPEa "// +1"K tagdeep"neexp s[U/anTu{staexhaus34158  FIPS zedo;9355EqP BGoogle'sC .3*Fed? yet:tRa flex,8"ommeism iz|ā : mafc2-1941Erpm-oҢNorbioge;PMתLmly boyile^saaabdAthn-IW-:t_p |6 /srollG - :sct_n_ affA89Bk BX.Org-s]c+cfBX WJ > bas " - afull-fo4 U asignedW>kxorg-x11-: tig heap-ba! "privrg s_ 632A 4: Xw - se---r5 soM 652 : xF; InitTrig()H601HPlaydEvK0Kuninite oYKRe Y599YOuf-YwףCreuPaBarrCrX8XBTXkboTzOfKeyM7MH?KWCL sG6%ەVModMaskTI5BX frunn;XW26"r ,r1_ +7aO*$, G= s3toperatgo'^42 4&g4_9 - :3f:5N%d 5lk=.D3v2rjnSSA i1i,M_Gnel_m[0^ %LRCӼ83Ci4rF StoragLF4r%l!:r'aX%h*seG s!!K *!t:h0!or1 &J5/4pU&@7cx&kposhake#pQUICn,L3-3932Kil o88tL oS2S8:+l:=1.'i0nloop2238O/ip n|'e5eh or)Isc!+"IPv4:pp( 6 add'esj9b[http:]()0)'r 100-e MEkzp'Of r r 6KHF<+Yi 2000' gjpehIzin%/$olor.>5682 I/%2/j2kHBc>R|nt?Oe "2KitGTKۢ%@! Yweb reKe: Bp. Lkitgtk:1. malek1crdvO #2a!C  5sh 419 rAis [exZ>Ggi1A67TϳT T V551VLo}iZscri83tDFһ=r9CrSafq16ZqK 4ahS+aTolD &ac|6OCI_6. A gngs,cJFG\:$itRNiBscur.n a{5r;V$KlWB6uLiDoh9r ;<".60 go-joo JOSEQ4"Vw'lu?71" 389C7' 8Fn LDAP t7 3v3) l'l!t ^^d wLD twejAc5^)Rs2LeLiej%dminis=-d]nuc ]z d wsk oi ins{Ne{gz ge+G lH` /aFtodcifyN xGi7x:P HTTPpJ,laTcu: psJ5a}m<<< n<&ruOngx__mp4_ 2-417H#M:=sMH2HHQL24-734Gr^ na, fe r7rd boar e\ Gt=InfluxDB & TSDBjwt/: OJ vyc du! he&"+ 204i&@a!PeHvirol`L"en"4/a2=<' qS :u 'SsT10Iel, en: Q pQa'/os4yxexact$@le!his/n2no,lwCC6>o=En))Ǯnehavemisp/us; irG$ bu0Rsk sQ>ȥnoRD gi' baANp0'/ݢztinAJ5 Jxsl$PtdQdXMLGg' uak HTML,ez&¢Ke,9 lyA) - >OCXSLT yheetL@ 9\&(GetInheriHNsLP)5549 GIMP@S^SI MEpUUP)z ?i K.RDY"V736VsWf inv7dKnlf4f/ml swrN-""sR r8euR)9 )t:caHJ c1UV861Viun<n__shutR"s61123 _h_ id}_w ID2^x \GXhI OJ!&n: P \/iO U 2.0B :- OIDCPrlRM# PF lL-u314.hk%ssyrP1S1PDFcu.P s4Jt|o"tmO"} saC)G p5d/prR >g:ng1%<=gdevn#_Sr_kB+DhJrX`l6kel p4:!a! n! zK0o_u3/sqpm.:u(BTd->th3-ctx4T3Msoq6 &void oIL[.numb;58007Ztpm:!dkvb()WeAAb/acpi&8;Hrtpcf85063:lxqV]).'PCF$ NVMEMZ69Znvme-tcpU`,_,_du@ Usi_ibfLF_UBSAN shifXK/ar*Dih._xrW ow_;,f93?pUNk.js >@ dop~$l-k*GNhppl szJavam ( M c-ar&&2F_ w 86x8CJemoE $NDEC VTTektmx 4014^yV'3nwl :Y e OSC 50pu  HMozillaEoGPTbr $O? "-((J .f:bk;&KҦUBh8QUnjn a tX s4nΨ'ison"j "K^I !*(`(sw3w өTbugs $138,'5ESR 128.10(ÎM3ݎȍonfLn$vdm-Z uoftMferru-'!inceI] 'haP g7sjC. \Qs-9. Y%$wpst{ 'byOm /2ΡZkG ry oi'7/9o;$ { Fr:i$EOJ6uni7e owth" Pabby,odX 67YpiEpGNOMEktopto5;&9qiex 8ra/ml fo aXFZ*Hk 4yf# 59j$ LO#-"hN:t(zugh bYAmysqln92ingle98HO.quo-B-HN 3ZC*o}k*̣xts&CRLF(j}2 sh2زJSQL$ NI>72_N1C, a CVSS score cknowledgmentsnd other related information,fto "HE page(s) lis,R&ences sec:. Mozilla Thunderbir/sstualone mailnewsgroup cli. Security Fix(es): *sR: UsInterface (UI) MisrepresJ of attach URL (-2025-3523)XI  DisclosureI/tmp dirory ingQ2830QLeak?hash=Window credials viaaf\ү2) For modetH[bouts:issu,clud impactiTlibspx9s providew HTTP vl2ratfGNOME *ateg?ov(lvappend_param_quof205ŧEHeap buffIsniff_un>n()E2EsFfeed_or_htmlKkip_insig!icant_spj3jOqndsadh_h ersse_requestQ906QDenTiceOwhenOlargml|ranwith R Ņ7ƅouble fremessEget_co-disposi{thkgh "7-7-7.c""s" GHTaovalueĚ11ŚNULL poi derwݧM"filename" eUi),GtP nofCM-DMV1.dma;seVAuthoriz7haCfostbee@rbyA4642ZMempGqual_ƫ`0GAvahiYnler6DNS S~yMultM#spec]P&i bjs918)PGmizQlarmMG-rZ``6784 k$DwtBJOOB9ad(@I_mOH t__"#StoBJexiYpÚ91 Uu ԉLvo'i48Pyn4, a've,7Iergm  uq,c,moduldcl*exce s,y hi1ll dyR i_g !$4m cC. ,2well.vCv$̤;  nado: T4Z1m-DF;728gB s 80,WaM&gmax l# 4St7me #R( mapba{5 D$;gVer1-p)-bad a ll1-  &: H265dec PS-BJOR΢0ic38 )Cb kjaDcould ve led $#aapayArd"'yPo, #`eV?Copy#cf*?g b4b%safebugş8]ZŠ FCGI Pq6{ p*-fcgis:&0.44 0.82,Z =.6.\2 (aka L06'!gsfiCwnhiH/__udp_.192"v:ce =lyde A0Axskv:xp_ _a:as _u7 [997Xg} veng.gH2&H/4I9"( h12umin"_rx_h_Vcap_n@b94%gc 1"(/POSIX wp),Amath%m)ۢin]7cdae/(nsc23@\ 6Wiunn;+ /:Luid(dl{(!sLD_LIBRARY_PATHV80/x) 1717P/039971766ModS)  r*de%+en)"^6  #cHPo  < B 1` Co-Pilop< se -pm =>PCPbpftrIc3>da,,$7 getbnx2esizmb-xdp-4cas"11 BA 0OL2CAP s->7)i2 -F_cmd]9]$ $3cfg 11: cwiphy_3$efrcS7ŲUUAF?i>md!Z&fv.*)nptKubt 8skopleN8j  /iH#ge+G Fend.4.'vfy<J%ah;:^P{%OCI Pm1thiNcSb P@~NRN,\NXsc! 0r u nA/O<r ;V$KlWn?ck%|;0il0? 6A jl7lirpuVPNK{ FQiGo3bs 9PgVis+4Ka~Q`v-tap-AX1tzSQT_960@wVi69GIMP (GNUNM.pul PP%s(!X/,.R0al\l1:upon xorg-x11-k -Xwayl7::?g ncH.BH.X (ExteWAnimzCur T.7'"Big st6(tUn?DS DI ByVI {80)ud9 (R R)y8VirtSW u4PVNCvX('XCB` GdR? )oMrep#Lunn cny 5ne5vt7Y )i!5`#Y-7 7s=tbl0 a^GOb%oQrQire(i 0^s 'kbr1RO,LVM, Btrf?LUKSbMD RAIDG"PE\_act$kro%<Y:u@c60M>'__ idc -ID& 4uT Ap/?S ban!@9nRe2PPci4V*nKKs^pioISO Y0 CD-ROMLis#noVybsdtard1\?%:pO-񤄦poo # lR:K1/PiVFQip"`([#JiS'?Q |o=k Timeuuino 7P>xy_sLe.ESas aclrN %dž:əlMCTt4-1030Epowul!`bFng&-i*l {AJ8&(el)袪- e-]C e: jC BXLrro k,(q3{=Q Gy_kG3qt5DG q, xml B3Q* n:6:*CnAs FvK V54eEdg MX (PALto 7up po^eZ.nLW&Hv L eH {\1m:g |I b0w s%;=OS 6%fa  Vg / 'i%) sS)Bhoo+BlqMFuI , > ~o6*co#ble< !e<'r-cli and cockpit-composer ents. Security Fix(es): * net/[http:]() Request smuggling due to acceptance of invaliwhunked dataQI (CVE-2025-22871) For more details about the sissue(s),Lclud impact, a CVSS scG,knowledgm, o/r relatinformation,f̢R pagm lis,R&es:. Comm^e utilJcontrol osbuild5xTbc pv7s providet{ard C $rari (/POSIX&readp$Ah%m)ۢinam0rvicache}emon (nscd) usby multiplegrams osym. Withseq,$Linux*fnnot fun ~rly /: V*ogfr overw0e bugtW257021kernel2a4a!s]anyoperӮ oK: Squashfs: fix hɢsan95ckmxattr_idunt3-52933sudoIwhich allowsadmineorscerFus wiQm (,ex!tivilegcorefgu  pur.hav^o loAas root : LPE via hoopz3246{Open Virtual M(2Tooˡע;o"sourclo~!VMw,6. Vy, Ew ar 28podmansx is pWo_"inu~fv.D ##Kubut 1wbnv'd|-q+] N4 (DBMS CREATE STATISTICS do#3" ma+pm7)vsftpd SVe emT"mProtoc(FTP) EH xTn :ji$ N,!me)p424&Mozilla FiEox6%&web br 0 igne'+0H ,%U fpo ng7DownloPax>&32MUse-af-freMJavaScc[ GCL6-0885KthbirSM safe+s pOESR 140.7,&';)147.&91ŏS1b<#pe d, <ndiT:.sWebGL78SIPH2 Eng N4NI.!lossVGQO3OM+gNbypas5DOM: -JCI#&sDragD^^C kja,bg  *ew6/h-9j]8,I08I-snmvb%+6p1E+s%Si(M SNMP\&ena,hry3:qet QS c1u byU r USB '-fa maBt#-ta, /c se/veB0xil 4-r ETCP 29 6×E1 Almab6/limi.e [% ;:@#_1euAVCOM? 672"YA ~*SNMEA2000wxxcdrm/xe#k;ma-f4G ru3870m#:!t v_done//_off, lengthir3['q97vmwgf V $s h .aga SVGA_CMD_MAX_DATASIZEc/ cusbhwc3:R &r (twePurrF+_$v(s\/h"828ol6:epWuq /7e_W__osd_ma\1I (7I MR4P6 seng.R!l2<4 chan6cn%s,! csub-pSlW9&an:)akS:c/sI, (4-levelo i~ :H@'CEPNM Q0 @144(\JP2\~+f5fXCF ~$AFZ4ZsJ&ͱLB=j"V4G)04 ;rMp$/%^4tejC4]@J.--=d eiYN,nQAvElJ0c@ p;" $g__;_iPYA0XPypTn pre4, acMO,0orEed.bsQ(,|M xi6,y hDdy~: 6typxinqP!1">#m tdC,=well.(wiQwAurlRUnedrAexh&{o64zGa St%nPQ7Cly[Il|H]nE]qD"mbcg&x;foK:~AreE%s®6446g%YW mer $&zoA&381r$ntpollE349E&F%vm_bi$ioctl8uyOg_F73ьJ6uXJWqYu@\FA8\ cO"%2_8_H 4OĬO)BIGtoMGMT;.|<7É94ĉ.:&l$cf H 0 RX K@830: hc] :%Ai\)teFa&)-a0a Xs /Mpo]y;$sIo[T]ledGnr^[no -Ac[re#Hed(d1e. 1C cur l*lL]or d$]tn@suchMicrosoft WsAchinxJVirtualBox  op nt . 53IȎ nQ- r-vulobyv8vj3jps nUs %GFX Q updfs%18v9-suhz hz2,<:vsch;nek<g a3778xc½rqWp/gv2mVW81WRDMA/"KASAN: s-UR ib_regr_"j bl k8022ãyrxeԼa~4~MrujSquashfso$ bkze cuA p415pvs3/vmcCk ns r{ izitf03+ATM CLIP !inrs59f < inGm io_u /net387v<USB976pus st_rcu k_up_capsF7Fipv6GRCU>p6_xmit83=Blue_tNISOpo UAF so_ _9N41ه0hƉ5zUi_mdiN+ yey2.Å271Ѕ ALSAari:! gÈ6hci_syncrcmdqueue_onW3tphn HTTP@ "~ GNOME ha: S"eU Con ErrOLS-B <inNTLM Auth^c6-073WMultipa Pym r 6-Keyl!TPM3Ply lbT attTr$tB$sol : K%sau^rdAst:v. ! Xiq $CP"GIMP (GNU ImaManip P})n!isiedin 5R@4j551A 16375k9466"555un{"pt 1As+ 2 c ndar 5 (/POSIX&p),Ah%m)ۢi< cdaem nscd)<d p s4Wi> sequ!c ot!Qly M'gK inkug+086|PW+lzero-u 1V9 Owxp> WRDE_REUSEyAPPEND&.n@1528PH(ML-e' ! %F   ph ray_mergs417 E *get 4Hs L chunk -q7G A)&,)0r#Z'R-ushbogh(G,|luxDB'SDB c' /pkg/ls/-DPSco>2B E s Cr?0#"7x3.