SOLV Pf 0dnf1.01.29^0\F[|~x86_64noarchcvebugzillai6863finalpackager@almalinux.orgselfrhsa9:20200406-26.el9_21:7.1.8.1-11.el9.alma 2.el9_3.alma4.alma.1 3.el9_4.alma.1 4.el9_4.alma.1 8.el9_1.almaModerateImportant6.2.2-7.el9_5.alma.10-1.el92.el9_45.el9_4Copyright 2024 AlmaLinux OS 5 AlmaLinux OS 3 AlmaLinux OSkernel-doc4.10.0-98.el9_7.4586.el9_6.7kernel-debug-devel-matched vel -matchedperfCopyright 2026 AlmaLinux OS8cf767d6kernel-headersrtlavnodejs2.28-13.el9_6.alma.14.el9_610.5.0-7.el9_5.alma.10.0-6.2.el9_4.alma.1 6.el9_4.alma.1 el9_4.alma.1Copyright 2022 AlmaLinux OSwebkit2gtk3 -devel jsc-develfirefox9.5.0-7.el9_3.alma.1thunderbird13.3.1-2.2.el9_54.2.1-1.3.el9_5nodejs-docs8.0.13-2.el9_020-3.el97-1.el9_130-1.el9_23.el9_65.el9_71.14-1.module_el9.2.0+24+ca6bd7c227-1.module_el9.3.0+53+44872dd130-1.module_el9.5.0+131+62ecd6872-1.module_el9.5.0+156+9f1cd3fd2.25-1.module_el9.5.0+132+adb0ae7a8-1.module_el9.6.0+165+cf879a7c30-1.module_el9.7.0+205+fe410f103.19-1.module_el9.6.0+166+f262c21c26-1.module_el9.7.0+197+324afee89-1.module_el9.7.0+206+f4fec7f3python3-perf11.5.0-5.el9_5.alma.1firefox-x111:11.0.16.0.8-1.el9_07.0.4.0.8-2.el9_0python3-devel8.5.0-7.el9_19.0.0-10.2.el9_25.14.0-70.17.1.el9_0 22.1.el9_017:6.2.0-11.el9_0.37.0.0-13.el9postgresql17:8.0.0-16.el9_3.alma.12.0-11.el9_4.49.0.0-10.el9_5python3.11-devel libs17:7.2.0-14.el9_2.5.alma.140.7-19.el9npmodejs-full-i18n1:1.8.0.342.b07-1.el9_0podman-dockerython-unversioned-command3.79.0-17.el9_190.0-4.el9_36.el9_3nodejs-nodemongolang-docsmiscsrctests15.10-1.module_el9.5.0+126+03d48c9f2-1.module_el9.5.0+140+e3f03d9d4-1.module_el9.6.0+176+c508cfa25-2.module_el9.7.0+203+960b74c07-1.module_el9.7.0+214+91f631df3-1.module_el9.2.0+32+f3c125b55-1.module_el9.3.0+52+217339196-1.module_el9.3.0+55+d62f47798-1.module_el9.4.0+111+667b9e9e6.10-1.module_el9.6.0+174+80cb77f01-1.module_el9.7.0+202+21427d8a3-1.module_el9.7.0+213+65e1da694-1.module_el9.4.0+109+624ac33a8-1.module_el9.5.0+141+f4b0f9b75.15.9-10.el9_41.el9_67.el99.el94.12.2-14.el9_6.1522.el9_7.1nodejs-packaging-bundler1.66.1-2.el9_23:10.11.10-1.module_el9.5.0+135+c9657a87 5-1.module_el9.7.0+199+a988ea015.16-2.el9_0libcurl-develpython3.12-devel libshpnodejs-libspostgresql-contrib plperlython3 tcl rivate-libs server upgradeopenssl-devel2.31.1-3.el9_19.1-1.el93-1.el9_243.5-1.el9_47.1-2.el9_63-1.el9_64.12.2-1.el9_5.3dotnet-hostnetstandard-targeting-pack-2.1odejs-develruby4.10.0-43.el955.el9_3.2.alma.162.el9 _4.34.alma.1576.el9_5.4.alma.11.22.12-5.el9_73.20-1.el9_53-1.el9_7podman-pluginsremotetestsython3-tkinter1.6.1-20.el9_2.1Lowpostgresql-test-rpm-macros3:10.5.22-1.el9_2.alma.17-1.el9_59-2.el9_6 3.el9_74.10.2-5.el9_3.alma.11.0-15.el9_4.alma.19.el9_4buildah-testslibxml2-devel1.22.12-3.el9golang-binjava-1.8.0-openjdk-javadoc-zip1:25.0.2.0.10-1.el9.alma.1go-toolsetrafana5.14.0-503.38.1.el9_570.16.1.el9_6 7.1.el9_6 8.1.el9_6 9.1.el9_6 21.1.el9_6 2.1.el9_6 3.1.el9_6 4.1.el9_6 5.1.el9_6 6.1.el9_6 8.1.el9_6 30.1.el9_6 2.1.el9_6 3.2.el9_6 5.1.el9_6 7.1.el9_6 9.1.el9_6 41.1.el9_6 2.2.el9_6 4.1.el9_6 6.1.el9_6 9.1.el9_6 51.1.el9_6 2.1.el9_6 5.1.el9_6 60.1.el9_6 2.1.el9_6611.11.1.el9_7 3.1.el9_7 6.1.el9_7 20.1.el9_7 4.1.el9_7 6.1.el9_7 7.1.el9_7 30.1.el9_7 4.1.el9_7 5.1.el9_7 6.1.el9_7 8.1.el9_7 41.1.el9_7 5.1.el9_7 7.1.el9_7 9.1.el9_7 5.1.el9_7 9.1.el9_7libtiff-devel1:1.22.1-3.module_el9.2.0+44+f932b372.1.alma.1 8.module_el9.5.0+153+8c633b18.1.alma.14.0-4.module_el9.5.0+154+722f94fd.1.alma.1 5.module_el9.7.0+212+9d3c155a.1.alma.120+47ec8b91.2.alma.12021.06-4.module_el9.1.0+13+d9a595ea:1.26.3-2.module_el9.7.0+215+8d94e91c23+9cd7031b.1nginxpython3.11 -tkinter1:5.9.1-13.el9_4.3 7.el9_7.19.el9expat-develgimp-libsruby-devellibs10.0.4-1.el9_7:11.0.17.0.8-2.el9_08.0.10-2.el9_19.0.7-1.el9_120.0.8-2.el91.0.9-2.el92.0.7-2.el93.0.9-3.el94.0.8-2.el95.0.9-2.el97.0.10.0.7-2.el91.0.9-2.el92.0.7-2.el93.0.11-3.el9.alma.14.0.7-2.el9.alma.15.0.6-2.el9.alma.16.0.8-2.el9.alma.17.0.10-1.el9.alma.18.0.8-1.el9.alma.15.0.8-2.el9_06.0.10-3.el9_17.0.7-1.el9_18.0.7-2.el99.0.9-2.el921.0.1.0.12-2.el9.alma.10.0.7-1.el9.alma.12.0.13-1.el9.alma.13.0.9-1.el9.alma.14.0.7-1.el9.alma.15.0.10-3.el9.alma.16.0.7-1.el9.alma.17.0.6-1.el9.alma.18.0.9-1.el9.alma.19.0.10-1.el9.alma.12:3.5.25-1.el98.0.10-1.el9_43-2.el9_35-1.el9_47-1.el9_48-1.el9_49.0.0-1.el9_510-1.el9_63-1.el9_55-1.el9_66-1.el9_6redistigervnc-icons license selinux5.14.0-427.13.1.el9_4 6.1.el9_4 8.1.el9_4 20.1.el9_4 4.1.el9_4 6.1.el9_4 8.1.el9_4 31.1.el9_4 3.1.el9_4 5.1.el9_4 7.1.el9_4 40.1.el9_4 2.1.el9_4503.14.1.el9_5 5.1.el9_5 6.1.el9_5 9.1.el9_5 21.1.el9_5 2.1.el9_5 3.2.el9_5 6.1.el9_5 31.1.el9_5gnutls-c++daneevelkrb5-devellibgsredis-devel1:1.20.1-14.el9_2.1.alma.148.4-2.el9.alma2.4.53-7.el9 _1.157-11.el9_4.15.el98.el962-1.el94.el9_6.47.el9_7.3:1.20.1-22.el9_6.2.alma.1 4.el9_7.1.alma.12.alma.13.1.4-143.module_el9.3.0+60+5ebc989a5-145.module_el9.5.0+129+9ba7e8b13.1-2.module_el9.4.0+102+68a938530-5.module_el9.7.0+193+581791665-3.module_el9.4.0+115+226a984bphp-bcmathcliommondbagevelembeddednchantffipmgdmpintlldapmbstringysqlndodbcpcachepdogsqlrocesssnmpoapxmlrubygem-rbs4.16.1.3-27.el9_3bind-dnssec-doclicensenginx-all-modulesfilesystempython3-bind1.22.1-2.el93.el9_52-4.el93.10-1.el9_11-1.el9_23-1.el9_34-1.el9_36-1.el9_48-1.el9_522-1.el9_63-2.el9_76.6-1.module_el9.5.0+128+1095dce221.01.0-13.el9 4.el921.el9 3.el9_78.0.14-1.el9_56-1.el9_67-1.el9_621-1.el9_65-1.el9_76-1.el9_79.0.14-1.el9_7aspnetcore-runtime-6.0 targeting-pack-6.0dotnet-apphost-pack-6.0hostfxr-6.0runtime-6.0sdk-6.0targeting-pack-6.0emplates-6.0java-17-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libspg_repackauditostgres-decoderbufsql-docs private-devel server-devel tatic test upgrade-develredis-docskopeo-testsfreerdp-libslibsoup-develwinprrubygem-bigdecimalio-consolejsonpsych1:2.3.3op2-16.el9_2.1 21.el9 7.el9_4 31.el9_5 3.el9_6.1 4.el9_7.23.5.3-3.module_el9.7.0+187+2286ff0a9.54.0-10.el9_21.el9_23.el94.el9_36.el9_47.el9_48.el9_69.el9_6aspnetcore-runtime-8.0 targeting-pack-8.0dotnet-apphost-pack-8.0hostfxr-8.0runtime-8.0sdk-8.0targeting-pack-8.0emplates-8.0fence-agents-common ibm-powervsvpc virshhttpd-filesystemmanualjava-1.8.0-openjdk-demovelheadlesssrctomcat-admin-webappsdocs-webappel-3.0-apijsp-2.3-apilibservlet-4.0-apiwebapps11.0.6-2.el9_02.37.4-21.el9_732:9.16.23-1.el9_0.1 1.el9_2.12 4.el9_3.4 8.el9_4.16 24.el9_5.3 34.el9_7.12 5.el9_15.1.21-1.module_el9.1.0+15+94ba28e48.4.6-1.module_el9.6.0+180+a4e757e57-1.module_el9.7.0+194+73a02de88-1.module_el9.7.0+219+aca48cd31.18.9-1.el9_19.10-1.el9_23-1.el9_223.6-2.el9_59-1.el9_64.4-1.el9_66-1.el9_65.3-1.el9_75-2.el9_77-1.el9_78-1.el9_71.3.0-1.el95.0-2.el9_4.alma.12.36.7-1.el9 _0 1.1238.5-1.el9 _2.12340.5-1.el9 _3.12.5-1.el94.3-2.el96.1-2.el9_43-1.el9_52.el9_55-1.el9_56-1.el9_52.el9_58.1-1.el9_5 62-1.el9_65-1.el9_650.1-0.el9_61.el9_73-1.el9_74-1.el9_73.0.21-37.el940.el9_44:5.32.1-481.el96.0.10-1.el9_08-1.el9_09-1.el9_07.0.0-0.5.rc2.el9_110-1.el9_21-1.el9_22-1.el9_23-1.el9_27-1.el9_29-1.el9_28.0.0-2.el9_31-1.el9_32-2.el9_3golang-racemysqlpython3.12 -tkinter16.6-1.module_el9.5.0+127+50ff03a92:4.2.0-7.el9_15.14.0-162.6.1.el9_1284.11.1.el9_2 25.1.el9_270.30.1.el9_06.5.1-1.el9_12-6.el9_2.alma.17.12.1-11.el9_7.343.0-13.el9_3cups-develedk2-ovmfglibc-develruby-default-gemsgem-bundlerirbminitestpower_assertrake doc exml sstest-unit ypeprofs-devel1:1.8.0.352.b08-2.el9_0 62.b09-2.el9_1 72.b07-1.el9_1 82.b05-2.el9 92.b08-3.el9402.b06-2.el9 12.b08-2.el9 22.b05-2.el9 32.b06-2.el9 52.b09-2.el9 62.b08-3.el9 72.b08-1.el9.alma.1 82.b08-1.el9.alma.1aspnetcore-runtime-7.0 targeting-pack-7.0dotnet-apphost-pack-7.0hostfxr-7.0runtime-7.0sdk-7.0targeting-pack-7.0emplates-7.0grafana-selinuxopenssl-perltigervnc-server-minimalodule1.12.0-13.el9_25.el9_1.123.1-3.el9_3.3.alma.16.alma.18.el9 _4.34.1-1.el9_5.18.el9_69.el9_65.0-6.el9_73.2.3-5.el97.6-12.el9_08.el9_123.el9_3.348.3-10.el9_74.el9_46.el9 _6.2mysql-commonerrmsgruby-bundled-gems1.17.12-1.el9_09.9-2.el9_220.11-11.el9 7.el9 9.el924.el9 6.el9 8.el9_631.el9_6 2.el9_72-1.el9_32.el9_34.el9_31.11-1.el9_43-3.el9_44.el9_49-2.el9_47.0-8.el99.el9:9.0.62-11.el9_2.3 37.el9_3.1287-1.el9_4.12 2.el9_5.1 3.el9_6.13 6.el9_7.12.24.0-2.el9_5.alma.13.0.4-160.el9_07-162.el9_43.el9_54.16.4-101.el9 3.el9_17.5-102.el9 3.el9_2.alma8.6-100.el9 1.el9_3.alma.15.14.0-284.18.1.el9_2 30.1.el9_26.0.13-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_47.0.14-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_4aspnetcore-runtime-dbg-8.0bind-chrootdnssec-utilslibsutilscontainernetworking-pluginsdotnet-runtime-dbg-8.0sdk-dbg-8.0ghostscript-docnginx-coremod-http-image-filterperlxslt-filter mail streamosbuild-composer-coreworkerruncsquid2.9.4-11.el9_6.1:4.2.0-3.el94.1-3.el96.1-5.el97.el9_35.1.23-1.module_el9.4.0+65+49ff64726.0+151+5f31e5764.0-162.12.1.el9_1 8.1.el9_1 22.2.el9_1 3.1.el9_170.26.1.el9_07.76.1-14.el9_0.5apcu-panelgstreamer1-plugins-bad-freegood-gtklibssh-develpam-develunbound-libs1.0.0-10.el9_1.282.34-100.el9_4.225.el9_5.8.alma.168.el9_6.1920231.el9_7.1060.el9_2.7020.3-8.el9_5.13.1.5-144.module_el9.4.0+101+d58a8d951.11-2.el9 _6.123-5.1.el9_7 2.el9_7 el9_72-2.el9_2.125-1.el9_37-1.el9 _4.13569-7.el9 _5.1232.1-4.el9_4.342-1.el9_74.el9_7.125-2.el9 _5.1239-1.el9 _6.1224.31-5.el9fence-agents-compute kubevirtvirt d -cpg libvirt multicast serial tcpgit-lfshttpd-coredeveltoolsjava-11-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libs21-openjdk-demovelheadlessjavadoc-zipmodssrctatic-libsmod_ldapuaproxy_htmlsessionslysql-serverphp-pecl-apcu -devel rrd xdebug3 zip141-1.el9.alma.12.0.32-5.el9_442.6-3.el94.el9_4emacs-filesystemipa-client-commonommonselinuxrver-common dnslibarchive-develpython3-ipaclient lib server12.1.5-1.el9_2.1.alma3.alma.12.5-3.el9_3.2.alma.15.0-1.el9.alma.1 _6.23.0.0-1.el9_7.132:9.18.29-1.el9_5.1 4.el9_6.2 5.el9_7.248.0.43-1.el9_64-1.el9_75-1.el9_79.0.100-1.el9_54-1.el9_56-1.el9_67-1.el9_611-1.el9_65-1.el9_7gimprafana-pcpmariadbvim-X11commonenhanced0.5.4-1.module_el9.1.0+8+503f6fbd1.16.2-19.el9_6.13.5-1.module_el9.1.0+8+503f6fbd0.2-11.el9:22.13.1-1.module_el9.5.0+139+092964915.0-1.module_el9.6.0+164+2d89b8ed6.0-1.module_el9.6.0+170+f035de7822.0-1.module_el9.7.0+208+fb06c0ab4.13.0-1.module_el9.7.0+209+ecf6523e4.1-2.module_el9.7.0+222+ef1c61e17.2-10.el9_41.el9_5.124.el9_6.26.el9_1.18.el9 _2.13.0.1-41.el9_02.41-5.el9_7.14-3.el9_7.1:4.9.4-0.1.el98.2.2637-16.el9_0.233.4.8-1.el94:4.9.4-10.el9_4 3.el9_4 6.el9_43.el9_44.el9_45.el9_45.2.2-13.el9_59.el9_55:5.4.0-10.el9_6 2.el9_6 3.el9_66:5.6.0-11.el9_7 4.el9_76.el9_77.el9_79.el9_7flatpak-libsglib2-develstreamer1-plugins-base-develiperf3libvpxxslt-develpcp-devellibs-develtestsuiteoppler-cppglibqt5qt5-qtbase -devel examples gui mysql odbc postgresql rivate-develsqlite-develystemd-develvarnish0.4.31-7.el9_41.0.9-9.el9_712.8-1.el99-1.el9_43.el9_4 58.1-3.el94.el9_4:1.48.10-2.el9_5.alma.1 5.el9_56.16.0-1.el9_07.1-1.el9_08.1-3.el9_19.1-1.el9_2 2.el9_220.1-1.el9_22-3.el9_2 4.el9_3 8.el9_42.0.90-6.el9_17.el919.1-1.el9_650.7-1.el9_2.152-55.el9_7.7.alma.1:2.11.2-1.el97-1.el9_7.123564.1-5.el95.15.9-2.el9_7.1autocorr-af bg ca s da e sb el n s fa i r ga hr sb u is t ja ko lb t mn nl pl t ro u sk l r v tr vi ro zhcups-filesystemedk2-aarch64ghostscript -tools-dvipdffontsprinting x11it-allcore-docemailguiinstawebsvnkweblibc-docnutls-utilslibreoffice-data opensymbol-fonts ure-commonopenssh-askpasspam_ssh_agent_autherl-Git-SVNython3-lib389qemu-guest-agentimgkvm-audio-pa block-curlrbd common re device-display-virtio-gpu"-pcivgausb-hostredirect ocs tools ui-egl-headless openglpr-helperruby-docxorg-x11-server-Xdmxephyrnestorgvfbwaylandcommon3.14.0-13.el96.el97.el9_76.2-10.20210508.el97.2.11-1.module_el9.6.0+188+92104ce8rubygem-mysql2-doc0.996-3.module_el9.6.0+152+8cbce00c.410.0.104-1.el9_71.3.5-1.el9_0.15:2.3.16-11.el9_4.1 7.el92.7.0.20070801-24.module_el9.6.0+152+8cbce00c06.0.108-1.el9_076-2.el9_2.alma8.0.103-2.el9_35-1.el9_47-1.el9_48-1.el9_410-1.el9_430-3.el9_02-1.el9_26-1.el9_341-2.el9_5emacs-commonlucidnoxfreerdpipa-client -epn sambaserver -trust-adlibvirt-clientdaemon-config-networkwfilterdriver-interfacenetworkodedevwfilterqemusecrettorage-corediskiscsilogicalmpathrbdscsikvmlibsnssmariadb-backupcommonembedded rrmsggssapi-serveroqgraph-enginepamserver-galerautilsnginx-mod-developen-vm-tools -desktopsdmptestrepokey:type:idubygem-mysql2pg -doctoolbox-tests0.30.0-6.el98-22.el9_61.03-481.el91.0-19.module_el9.6.0+152+8cbce00c6.2-2.el93.el9 _3.159.3-2.el9_032.9-1.el9_55.4-1.module_el9.4.0+75+1a8fe981:1.12.20-7.el9_12.16.20.2-1.el9_28.12.1-1.module_el9.1.0+16+91bc168f4.2-2.module_el9.2.0+29+de583a0b 3.module_el9.2.0+30+e33124936.1-1.module_el9.2.0+31+cbae0c8e7.1-1.module_el9.2.0+36+853e48f58.2-2.module_el9.2.0+43+3ebc9e209.1-1.module_el9.3.0+59+28b9564420.2-2.module_el9.4.0+99+a01f76764-1.module_el9.4.0+112+bb28ff816-1.module_el9.5.0+136+92f38f3c20.11.1-1.module_el9.3.0+88+29afeaa22.2-2.module_el9.4.0+100+71fc95286.0-1.module_el9.4.0+107+dbd477e48.2-1.module_el9.5.0+137+381f3eaf9.1-1.module_el9.6.0+163+d268fe532-1.module_el9.6.0+169+c9cb05c220.0-1.module_el9.7.0+207+845738102.40-21.el9_7.15.2-9.el9_56.1-8.el9_67.0-10.el9_7:21.11.2-1.el9_13.11-2.el9_5avahi-glibc-ares-develfrr-selinuxgstreamer1-plugins-bad-free-libskeylime-selinuxlibpq-develnet-snmp-agent-libs devel libsspr-devels-develsoftokn -devel freebl-develutil-developenexr-libsprotobuf-literubygem-raccwireshark-cli0.40.0-6.el9_31.0.10-6.el9.28-4.el91.34-13.el9_64.el9_7.19.el9_5.128.4-6.el92.0-6.el9_17.el9_22.12-4.el9_646.5-3.el97.0-1.module_el9.3.0+52+217339192.el9_39.7-1.Final.module_el9.3.0+52+217339193.11-1.el96.0-1.module_el9.4.0+66+eb9878bc:6.2.0-13.el92.3.4-28.el94.0-1.Final.module_el9.4.0+66+eb9878bc68.4-11.el94.el9_4.16.el9_6.28.el9_7.17.4-10.el98.el92.0-10.el9_6.122.el9_7.1358.el9_5.233.2.1-10.el934.1-6.el9_17.el9_38.el9_69.el9_75.13-10.el98.el9_16.0-12.el9_73.el9_74.el9_79.14-1.el9 _1.126-1.el9_2.128-1.el9_3.13.el9_4.13569-8.el9 _5.121-1.el9_52.el9 _6.125-2.el9_73.el9_7.1289-ds-base -libs4.34.0-17.el9_15.0-4.el9_36.el9_34.0-10.el92.el9 _4.13.el9_6.25.el9_7.22.el95.el9_17.el98.el9_26.2.17-1.el9_58-1.el9_620-1.el9_62.el9_77-1.el9aspnetcore-runtime-9.0dbg-9.0 targeting-pack-9.0bsdtarcups-clientipptoollpdprinterappdotnet-apphost-pack-9.0hostfxr-9.0runtime-9.0dbg-9.0sdk-9.0 aot-9.0 dbg-9.0targeting-pack-9.0emplates-9.0frrgit-coreredential-libsecretdaemonsubtreelibc-headerslocale-sourceutilslibreoffice-base calc ore draw emailmerge filters gdb-debug-support raphicfilter tk3 help-arbgncasdaezelnostufirgluheiruidtjakoltvnblnplt-BRPTrousiklvtarukzh-Hanst impress langpack-afrsbgnrcasydaezelnostufairygaluheiruidtjakknoltvmailrnblnrsoorpalt-BRPTrousiklrstvtaehnrsukvexhzh-Hanstu math ogltrans pdfimport yuno ure wiki-publisher riter x11 sltfilter kitswanmod_http2ysql-libsopen-vm-tools-salt-minionsamba-clientkrb5-printingvfs-iouringwinbind-clientskrb5-locator exe3.0.1-1.module_el9.2.0+36+853e48f55.32.1-481.el90.7.0-3.20211109gitb79fd91.el91.02-481.el99-481.el901-1.el9.alma.12.el9_4.alma.12.12.0-1.el9_2.alma3.0-2.el9_2.alma4.0-1.el9_2.alma5.0-1.el9_2.alma1-1.el9_2.alma8.0-2.el9_1.alma15.11.0-1.el9_4.alma.13.0-3.el9_4.alma.16.0-1.el9_3.alma7.0-1.el9_3.alma8.0-1.el9_3.alma8-2.el9_5.alma.1.2-1.el9_5.alma.128.10.0-1.el9_5.alma.16.alma.11.0-1.el9_6.alma.12.0-1.el9_6.alma.12.0-1.el9_4.alma.13.0-1.el9_4.alma.132-1.el9.alma.1.2-1.el9_6.alma.12.el9_6.alma.140.3.0-1.el9_6.alma.16.0-1.el9_7.alma.17.0-1.el9_7.alma.19.0-1.el9_7.alma.11-1.el9_7.alma.19-3.el9_7.alma.34.el9_7.alma.35.el9_7.alma.32021.06-4.module_el9.3.0+88+29afeaa25.0+139+09296491:8.2.2637-20.el9_1 1.el9 2.el9_6.1 3.el9_7.123.5.3-2.el9_06.0.109-1.el9_010-1.el9_07.0.100-0.5.rc2.el9_17-1.el9_29-1.el9_210-1.el9_21-1.el9_22-1.el9_23-1.el9_28.0.100-2.el9_31-1.el9_32-2.el9_314-1.el9_56-1.el9_67-1.el9_621-1.el9_65-1.el9_76-1.el9_7flatpak-selinuxgaleralib2-docvisor-tap-vsockipa-selinux-luna nfastkeylime-baseregistrartenantverifierlibreofficevirt-daemon-commonlockgplugin-lockdroxyopentelemetry-collectorpam-docscp-docgvectorodman-gvproxyython3-jinja2keylimeunbound.11-urllib3qt5-qtbase-commonrsync-daemonunbound0.11.0-7.el93.71-11.el9_4 2.el921.1-1.el95.13-14.el9_75-1.module_el9.4.0+75+1a8fe9818-15.el920.el91.0.31-8.el923-481.el98.7-11.el9_2.17.el9_45.1-19.el921.el9_52.el9_55.el9_66.el9_64-1.el9:3.0.1-43.el9_0 7.el9_17-16.el9_225.el9_3 7.el9 8.el9_46.el9_22.2-6.el9_5.14.10-4.el9 6.el9 8.el9_7.15.1-4.el9_77.el9_72.1.3-4.el9_12.10-12.el9_0.24.5-8.el9_49.el9_47.0-11.el9_7.3024.3-3.el9_45.5-1.el950-12.el9_1.1 32-32.el9_4.alma.1:2.99.8-3.el9 4.el9_356.23.0.4-1.el9_7.123440.3-2.el9_6.13.1.1-2.el9_4.1 5.13.el9_7.15.3-5.el9_66.el9_67.el9_79.el9_79.10-3.el9_04.16.0-8.el9_19.el95.2.5-8.el9_06.6.2-2.el9_1.13.el9_2.14.el9_3.16.el9_6.17.1-10.el9_67.2.10-1.module_el9.6.0+173+efaf92056-1.module_el9.5.0+130+36ae76357-1.module_el9.5.0+134+2e6456008-1.module_el9.6.0+168+b8d8e900LibRawbinutils-develcompat-openssl11ups-filters-libsdbus-develflac-libsgdk-pixbuf2 -devel modulesstreamer1-plugins-ugly-freeharfbuzz-devel iculibX11-develxcbpm-develasan8blockdev -crypto dm fs kbd loop vm-dbus mdraid path nvdimmme part swap utilsjpeg-turbo -develnbdpng-develtasn1-develpmswebp-developenjpeg2rpm-ostree-libszziplib1.12-481.el920.1-1.module_el9.1.0+15+94ba28e42.0.3-4.module_el9.4.0+65+49ff6472021.06-4.module_el9.6.0+162+8dc602e53.1.4-1.module_el9.1.0+15+94ba28e46.1-5.el911.2-1.el9_423.1-1.el9_5bind9.18-chroot dnssec-utils libs utilsflatpak-session-helperglib2-testsstreamer1-plugins-base-toolshaproxylibvirt-client-qemumod_auth_openidcpcp-confexport-pcp2elasticsearchgraphiteinfluxdbjsonsparkxmlzabbix zabbix-agentgeolocateuiimport-collectl2pcp ganglia2pcp iostat2pcp mrtg2pcp sar2pcppmda-activemq pache bash cc ind2 onding pf trace cifs sco dbping enki m ocker s389log elasticsearch farm gfs2 luster pfs sd hacluster proxy infiniband json libvirt o msensors ogger ustrecomm mailq emcache ic ongodb unts ssql ysql named etcheck filter ws fsclient ginx vidia-gpu openmetrics vswitch racle pdns erfevent odman stfix gresql rabbitmq edis sctrl oomtemp syslog samba endmail hping lurm mart nmp ockets tatsd ummary ystemd trace unbound weblog zimbra swapselinuxystem-toolszeroconferl-PCP-LogImport Summary MMV PMDAoppler-utilsython3-pcpqemu-kvm-block-blkiosystemd-journal-remotev8-12.4-develarnish-docs2.27-481.el93.0.1-1.module_el9.5.0+125+8dc388705.15.3-1.el99-1.el9cockpit-packagekitstoragedfence-agents-amt-wspc-snmp bladecenterrocade cisco-mdsucs drac5 eaton-snmpmersonps heuristics-pingpblade ibmbladefmiblo-moonshotpssh2ntelmodularpdumilan lpar mpath rhevmsab sbdcsi vmware-restsoap wtigo-rpm-templatessrpm-macrosmysql-test-datapostgresql-jdbcython3-protobufrequests+securityocksyajl0.0.99.3-10.el9_2 5.el9 9.el94-6.el9_35-2.el9 5.el92-1.el9_66.2-2.module_el9.6.0+167+4e5611461.0.9-1.el91.6-3.el9_62.22-4.el9_52.3-1.module_el9.4.0+65+49ff64726.0+151+5f31e5764.8-1.module_el9.2.0+22+096537932.module_el9.5.0+119+18833d035.1-1.module_el9.6.0+146+c54fdeca7.0-1.module_el9.2.0+22+096537939.7-1.Final.module_el9.2.0+22+096537930.2.6-11.el9_63.el9_64.el9_67.el9_78.el9_79.el9_74.el97.el9_59.el9_52.10.0-1.el9_1.alma1.0-2.el9_2.alma4.0-1.el9_0.alma9.0-3.el9_1.alma15.10.0-1.el9_3.alma.12.0-1.el9_4.alma.14.0-2.el9_4.alma.13.1-1.el9_2.alma.14.0-1.el9_2.alma.15.0-1.el9_3.alma.19.1-1.el9_3.alma.128.10.1-1.el9_6.alma.13.0-1.el9_6.alma.14.0-2.el9_6.alma.13.1-2.el9_4.alma.14.0-1.el9_455.1-1.el9_56.0-1.el9_57.0-1.el9_58.0-1.el9_59.0-2.el9_540.4.0-3.el9_6.alma.15.0-1.el9_7.alma.18.0-2.el9_7.alma.1:1.27.0-2.el99.1-1.el931.3-1.el9 2.el9_34-1.el9_35-1.el9_32.14.14-1.el94.53-7.el9_1.157-11.el9_4.1 5.el9 8.el962-1.el9 4.el9_6.4 7.el9_7.35.4-38.el9_7.30.20.2-1.module_el9.7.0+226+88d368703.26.1-1.el9_7.12.0.3-4.module_el9.1.0+15+94ba28e46.0+151+5f31e57685-14.el9 _3.15.el99.6-2.el9_6:1.11.2-0.1.el93.3-1.el9 3.el9_3 4.el9_34.3-0.1.el9 2.el9_4 3.el9_45-1.el9_4 2.el9_46.1-1.el98.1-1.el9_6 2.el9_620.0-2.el9_7 3.el9_733.10-1.el9_46-2.el97-1.el9_4 2.el9_4 3.el9_4 4.el9_49-1.el9_47.2-1.el95-1.el9_56-1.el9_59.4-1.el9_6 2.el9_641.6-1.el9_78-1.el9_7 2.el9_79.2-1.el92.99.8-4.el9_63.2.2-2.module_el9.4.0+65+49ff64723.1-1.module_el9.6.0+151+5f31e57666-10.el9_62.el9_689-ds-base-snmp5.72-2.el96.0.113-1.el9_18-1.el9_220-1.el9_21-1.el9_22-1.el9_23-1.el9_24-1.el9_25-1.el9_36-1.el9_37-1.el9_332-1.el9_45-1.el9_41.0-2.module_el9.6.0+151+5f31e576:0.8.5-2.el9_67.0.114-1.el9_35-1.el9_36-1.el9_37-1.el9_39-1.el9_48.0.6-2.el9_77-1.el9_719.2.10-16.el9_4.alma.17.el9_49.el9_41.13.0-1.el9_0.almaCriticalavahi-toolsbind-dyndb-ldapdelvensmasq-utilsfence-agents-aliyunlwszure-arm gce kdump openstack redfishgo-filesystemrpm-macrosha-cloud-supportipa-client-encrypted-dnsserver-encrypted-dnsluamariadb-develembedded-develtestecab-develipadic -EUCJPysql-develtestnet-snmp-perl utilsss-sysinittoolsopenexrphp-pecl-redis6ython3-net-snmptornadorapidjson-develsudo-python-pluginweldr-clientireshark0.10.4-11.el93.el95.el9_677.el9_720.2-6.el95.11-143.module_el9.3.0+60+5ebc989a 5.module_el9.5.0+129+9ba7e8b15-3.module_el9.7.0+184+e2e360726.1-13.el9_2.alma7.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669.1-3.20211126git1ff6fe1f43.el9_25.20211126git1ff6fe1f43.el9_69.9-5.el91.0.8-10.el9_510.0-11.el93-481.el97.1-5.el9_2.19.1-1.el92.el9_44.el9_12.0-11.el90.1-8.el91.1-1.el92.el9_43.el94.el9_56.el98.el9_62.1-2.el9_34.el92-4.el9_73.3-10.el9 _2.148.2-5.el95.30-14.el9_7.17.3-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669.0-10.el9_77.el9_2.alma.18.el9_59.el9_6:0.9.72-5.el91.1.1k-5.el9_6.17.142.0-2.el9_42.0.7-6.el90.20.2-1.module_el9.7.0+224+0af7cc6b2.0.15-32.el9_520-2.module_el9.2.0+29+de583a0b6-4.el9_31.0-22.el90.4-9.el935.2-42.el967.el9_7.14.0-7.el98.el99-1.el9_1.18-9.el9_25.0-1.el9_3.12.el9_4.13.el9_5.135.el9_6 7.16.1-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b17.0-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b11-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b2-5.module_el9.7.0+193+581791669.13-10.el9_61.el9_62.el9_64.el9_73.el9_1 2.15.el9_36.el9_4 5.12:1.6.37-12.el9_7.123.0.1-1.module_el9.3.0+47+c33bc2881.1-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b15-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669-2.el9_64.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791669-10.el9_2.alma3.el9 _5.14.el9_7.14.0.2-11.el9_74-143.module_el9.3.0+60+5ebc989a5.module_el9.5.0+129+9ba7e8b15.1.2-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791664.0-5.el97.76.1-19.el9 _1.1223.el9 _2.1246.el9 _3.239.el9_4.135.el9_7.38.3.1-11.el9_3.2.alma.1alma.15.el9 _2.2.alma5.3-4.el9OpenIPMI-lanserv ibsapr-develutil-bdb develbrotli-develzip2-develcapstonejoseorosynclibyrus-imapd-libse2fsprogs-develfreeglut-develtype-develibidi-develgcc-toolset-13-binutils-develgcc-plugin-devellibasan-develtomic-develgccjit-develitm-develquadmath-develstdc++-develubsan-devel 4-binutils-develgcc-plugin-devellibasan-develtomic-develgccjit-develitm-develquadmath-develstdc++-develubsan-devel 5-binutils-develmp-c++develstreamer1 -devel rtsp-servertk3-devellassoibasanblkid-develcap-develom_err-develfastjsongccjit -develrypt-develicu-develnputtm-develjoselouismicrohttpdount-develpng15qbuadmath-develrabbitmqsvg2-develsndfiletdc++-develubsandisks2uid-develvldpd-develmotif-develpg123-libsunge-libsncurses-c++-libsdevelorc-develperl-devellibsixman-develmix-develpmiqt5-qt3d-develrapidjson-doctor2epokey:type:strpm-develust-std-staticspeextbb-develexlive-libusbguardwavpackxz-develyelp-libs0.03-481.el94.8-7.el9_76.2-1.module_el9.5.0+120+4533eb201.0.2-2.el95-481.el96-481.el97-481.el91.0-3.el91-481.el92431-481.el97-481.el94.8-2.module_el9.5.0+120+4533eb205.1-1.module_el9.5.0+127+50ff03a92.25.1-10.el9_67.el9_29.el9021.06-4.module_el9.3.0+48+1cf146a15.module_el9.7.0+207+845738106.module_el9.7.0+226+88d3687030524-3.el9 4.el9_3.2.alma1122-6.el9_4.2440524-6.el9_5.31117-4.el9_7.32.3.1-4.el96.4.20-1.module_el9.5.0+135+c9657a873.12.33-160.el9_0 2.el9_4 3.el9_55-3.el9 _7.23.26-143.module_el9.3.0+60+5ebc989a7-144.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b15.16-3.module_el9.4.0+115+226a984b22-5.module_el9.7.0+193+581791669-2.module_el9.4.0+102+68a9385344-2.el9_75.74-481.el965.5.1-2.el9_4.14.el9_68.234904002024040318301350020241004143704600202503171508331939NetworkManager-cloud-setuponfig-connectivity-redhatdispatcher-routing-rulesovspppbpftoolcloud-initockpit-pcpups-filtersdbus-daemonx11ovecot-mysqlpgsql igeonholepdk-develoctoolsfence-agents-nutanix-ahvreeradius -devel oc krb5 ldap utilsgnupg2-smimeidm-pki-acmebasecaestjavakraservertoolsputils-ninfodkernel-abi-stablelistscoreross-headersdebug -core modules-extramodules-extratools -libs-devellibX11-commonblockdev-plugins-all toolsguestfs-winsupportjpeg-turbo-utilsnbd-bash-completiontasn1-toolssan2mod_jkproxy_clusteruttnbdfusepki-jackson-databindostgis-clientdocsupgrade tilsython3-blockdevfreeradiusidm-pkijwcryptolibnbd.11-setuptools-wheel 2-cryptography setuptools urllib3qemu-kvm-device-display-virtio-gpu-gl#pci-glvga-glt5-rpm-macrossrpm-macrosrpm-ostreesync-rrsyncsssd-idpysstatv8-13.6-develalkey-develim-filesystemminimalxterm-resizezziplib-utils2021.06-4.module_el9.5.0+124+df88fe4936+92f38f3c6.module_el9.7.0+198+8bf605ba209+ecf6523e3.0.1-1.module_el9.5.0+136+92f38f3c9+092964913-3.module_el9.7.0+209+ecf6523erepokey:type:flexarray0.10.4-5.29.el9_2 30.el9_2 4.el9_3.3 8.el9_4.14 45.el9 7.el9_7.alma.1 8.el9_7.alma.127.0-1.el9_62.el9_635.0-2.el9_73.el9_744.0-1.el9_76-103.el9_6.2.0-1.el99-481.el92.2-2.el97-3.el93-481.el95.11-144.module_el9.4.0+101+d58a8d957-160.el9_02.el9_43.el9_565-481.el91.15-481.el9.19-3.el9_1.55.el9_3.16-481.el98-481.el99.9-1.el9_22.10-2.el91-32.el9_049-1.el9_450-1.el9_4.10-481.el91.1-8.el9_424.1-2.el9_55.2-1.el9_72.el9_767-1.el9_78-481.el93.20-1.el9_42-1.el9_6.10-481.el9401-481.el94.8-1.module_el9.3.0+52+217339194.0+66+eb9878bc3-481.el97-481.el98-481.el97.4.1-6.el9_6.18.10-2.el9.alma0-481.el99.5p2-10.el9_36.17.el9_1.14-481.el90.112.10.0-2.el9_1.alma1.0-1.el9_2.alma3.0-3.el9_0.alma6.el9_0.alma7.el9_0.alma5.0-1.el9_1.alma2.el9_1.alma6.0-1.el9_1.alma2.el9_1.alma7.0-1.el9_1.alma1-1.el9_1.alma2.el9_1.alma9.0-1.el9_1.alma1.9-10.el9_4.alma.18.el9_3.3.alma.19.el9_4.alma.15-6.el9_1.10.0-2.el9_3.alma.12.1-1.el9_4.alma.14.0-1.el9_4.alma.13.1-1.el9_2.alma4.1-1.el9_2.alma5.0-1.el9_3.alma9.0-1.el9_3.alma.12.5.4-5.el97.el98.13.0-3.el9_6.alma.14.0-3.el9_6.alma.13.1-1.el9_4.alma.14.0-1.el9_4.alma.15.alma.15.0-1.el9_5.alma.16.0-3.el9_5.alma.17.0-1.el9_5.alma.18.0-2.el9_5.alma.19.0-2.el9_5.alma.12-1.el9_5.alma.14-2.el90.4.0-2.el9_6.alma.18.0-1.el9_7.alma.1:4.99.0-9.el9:0.79-8.1.el9_61.2.0-1.el93.0-4.el96.el9_34.0-2.el9_43.el9_44.el9_45.el9_46.el9_45.1-2.el96.2-2.el9_67.1-3.el9_70.2.4-1.18.19.1.1.module_el9.3.0+59+28b95644 20.11.1.1.module_el9.3.0+88+29afeaa25.0-1.18.20.2.2.module_el9.4.0+99+a01f7676 20.12.2.2.module_el9.4.0+100+71fc95287.0-1.18.20.4.1.module_el9.4.0+112+bb28ff818.1-1.20.16.0.1.module_el9.4.0+107+dbd477e42-1.18.20.6.1.module_el9.5.0+136+92f38f3c 20.18.2.1.module_el9.5.0+137+381f3eaf9.1.1.module_el9.6.0+163+d268fe532.1.module_el9.6.0+169+c9cb05c220.0.1.module_el9.7.0+207+845738102.1.module_el9.7.0+224+0af7cc6b9.2-1.22.13.1.1.module_el9.5.0+139+092964915.0.1.module_el9.6.0+164+2d89b8ed6.0.1.module_el9.6.0+170+f035de784-1.22.22.0.1.module_el9.7.0+208+fb06c0ab2.4.26-1.el9_7.18.11.0-1.16.16.0.1.el9_05.0-1.16.17.1.1.el9_09.2-1.16.18.1.3.el9_1 8.12.1.1.module_el9.1.0+16+91bc168f3-1.16.19.1.1.el9_22.el9_24-1.16.20.1.1.el9_22.1.el9_23.el9_24.el9_38.el9_49.5.0-1.18.14.2.2.module_el9.2.0+29+de583a0b3.module_el9.2.0+30+e33124931-1.18.16.1.1.module_el9.2.0+31+cbae0c8e6.7-1.18.17.1.1.module_el9.2.0+36+853e48f58.1-1.18.18.2.2.module_el9.2.0+43+3ebc9e202.0.26-1.el92.el9_4.14.el9_6.11.0-21.el94.0-1.el92.10-12.el9_0.38-4.el9_53.3-2.el9_05.el9_74.10-1.el9 _6.127-3.el9_1.222-1.el93.el9_39.4-4.el91-3.el96-9.1.el9_75.1-160.el9_02.el9_43.el9_56-21.el9_3.alma.1-144.module_el9.4.0+101+d58a8d957.0-144.module_el9.4.0+101+d58a8d958.14-1.el9_7.19.4-6.el9_47-4.el9_7.10210202-11.el9_6.131.1.3-3.el97.el92.1.9-2.el95.el93.2.7-1.el93.el9_64.el9_65.el9_746.4.14-1.el9_2.alma.120-1.el9_52-1.el9_6:1.14.0-1.el92.1.7-1.el9_23.0.0-160.el9_02.el9_43.el9_55-6.el9_7.21.1-144.module_el9.4.0+101+d58a8d952-4.el9_32.0-1.el92.el9_33.el93.2-160.el9_02.el9_43.el9_54.1-2.el9_44.el9_4 55.3-4.el96.1-1.el92.el9_64.el9_77.el9_78.el9_71-2.el9_75.12-4.el9_65-4.el99-1.el97.0.2-6.el9:12.4.254.21-1.22.13.1.1.module_el9.5.0+139+092964915.0.1.module_el9.6.0+164+2d89b8ed6.0.1.module_el9.6.0+170+f035de7822.0.1.module_el9.7.0+208+fb06c0ab3.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e4.1.2.module_el9.7.0+222+ef1c61e14.0.4-144.module_el9.4.0+101+d58a8d9512-1.el9 _3.1.alma.12.el9_4.1 alma.16.5-3.el99-2.el9_24.el9_20.0-11.el9_610-21.el91.0.7-2.el9 _6.1:1.1.12-1.el9_3 2.el9 3.el9_4 4.el9_43-4.el94-1.el99-1.el92.el9_32.5-3.el9_63.0-4.el9_74.0-2.el9_75.1.1-1.el91.el9_62.el9_73.el9_72.el9_3.alma.1 4.alma.13.el9_49.el9_54.2-4.el9_0.34-2.el9_13.el9:2.2.6-1.el92.el96.1.0-9.el94.2-1.el9_52.el9_6.2:0.7.3-3.el9_4.alma.14.el9_4.alma.15.el9_4.alma.18.5-1.el9_57.5.11-5.el9_05-3.el9:5.2-1.el9_0.125-13.el9_44.el9_5.322.el9_7.145.el9_2.16.el9_3.12588.2.2-4.el97p1-29.el9_230.el9_24.el9_3.38.el9_4.1445.el97.el9_7.alma.18.el9_7.alma.19.0.9-2.el93.el9_2.alma4.el9_2.alma.12-1.el92.el9_2.10-7.el9_3.alma.18.el9_3.alma.1050020250204093711 1404284360020251030145517700202602171315211.11.0-2.el9_0.alma2.0-2.el9_0.almaNetworkManager-libreswan-gnomeaardvark-dnsidensible-coretestpr-util-ldap mysql odbc penssl pgsql sqlitespnetcore-runtime-10.0dbg-10.0 targeting-pack-10.0vahi-autoipdbcc-toolsluez-cupsobexdootcupdpftraceutanecargolippyonmonpprunurl-minimalyrus-imapd -utilsdotnet-apphost-pack-10.0hostfxr-10.0runtime-10.0dbg-10.0sdk-10.0 6.0-source-built-artifacts aot-10.0 dbg-10.0targeting-pack-10.0emplates-10.0expatfwupd-plugin-flashromgcc-c++gfortranoffload-nvptxplugin-annobintoolset-13-binutils-goldgcc-c++gfortranplugin-annobinliblsan-develstdc++-docstsan-develoffload-nvptx 4-binutils-goldprofnggcc-c++gfortranplugin-annobinliblsan-develstdc++-docstsan-develoffload-nvptx 5-binutils-goldprofngdb-gdbserverheadlessminimalnome-remote-desktopshellpsd-minimal -clientstk-update-icon-cache3-immodule-ximuestfs-toolsvisor-tap-vsock-gvforwardericugnitionmage-builderjava-1.8.0-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugslowdebugrc-fastdebugslowdebug1-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug7-openjdk-demo-fastdebugslowdebugvel-fastdebugslowdebugfastdebugheadless-fastdebugslowdebugjmods-fastdebugslowdebugslowdebugrc-fastdebugslowdebugtatic-libs-fastdebugslowdebug25-openjdk-crypto-adapterdemovelheadlessjavadoc-zipmodssrctatic-libsosekeepalivedylime-agent-rustlibarchivebpf-toolscurl-minimalgomp-offload-nvptxuestfs -appliance rescue sync xfsinput-devel utilslsanrabbitmq-toolssvg2-toolssndfile-utilstdc++-docstsanvirt-ssh-proxymingw-binutils-genericod_mdsecurity -mlogcpg123-plugins-pulseaudioungenfs-utils-coreosv4-client-utilsoci-seccomp-bpf-hookpenssl-libsrc-compilersbuild-composer-dnf-jsonpcp-export-pcp2openmetricspmda-uwsgierl-BCyrusDevel-PeekynaLoaderErrnoFCGIcntlile-DosGlobGDBM_FileHash-Util-FieldHashI18N-LanginfoONDBM_FileODBM_FilepcodePOSIXSys-Guestfs HostnameTime-PieceXML-Parserinterpreterlibmrophsignki-symkeytoolsmix-toolsodman-catatonitstfix-cdbldap mdbmysqlpcre erl-scripts gsqlsqliteython3-brotlilasso ibguestfs mount xmltbb.11-cryptographyqatzip-libst5-qt3d-examplesrearpm-buildplugin-fapolicyd ima syslogtemd-inhibitust-analysis zerdoctoolsetfmtsocatwtpm-libstoolsystem-reinstall-bootcd-boot-unsignedtangbb-doccpdumpexlive-bibtexdvipdfmx ng s svgmfontwaregsftopkkpathsealuahbtex texmakeindex etafont post fwarepdftextex 4htxdvi etexracker-minersudisks2-iscsilsm vm2nbound-dracutsbguard-dbus notifier toolsuiddvirt-v2vsftpdwgetxz-lzma-compatyelpzlib-devel0.02-481.el94-481.el96-481.el976-461.el913-481.el95.2-160.el9_0 2.el9_4 3.el9_52.9-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b160.el9_02.el9_43.el9_51.3-143.module_el9.3.0+60+5ebc989a 4.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b19-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791665-481.el93.0-2.module_el9.4.0+102+68a938531-3.module_el9.4.0+115+226a984b5.module_el9.7.0+193+5817916641.2-3.el9_7.14-481.el960.800-481.el96-481.el97-481.el975-481.el98-5.el9_41.0.0-9.el9_71-481.el94-481.el98-481.el91-481.el9.3-13.el9_64-6.el90-481.el90.600-481.el91.0-2.module_el9.4.0+102+68a938533.1-3.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791667-481.el92.0-160.el9_01-162.el9_43.el9_51-481.el95-481.el96-481.el9.12-2.el9 _5.125.el9_7.18-2.el9_5.19-1.el9_7.13.5-160.el9_02.el9_43.el9_55-481.el94.0-160.el9_02.el9_43.el9_51-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b103-481.el95.6-2.el91-481.el96-481.el99-481.el97044-14.1.el9_53.0.3-160.el9_0 2.el9_4 3.el9_56-143.module_el9.3.0+60+5ebc989a 4.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b11.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+58179166:0.08-481.el921-481.el911.11.0-1.24.14.1.2.module_el9.7.0+222+ef1c61e16.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e2.0.1-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b19-1.el9_020-1.module_el9.1.0+16+91bc168f2.el9_13-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791663-481.el94-481.el911.3-5.el96.el97.el9_58.el9_53-481.el94.1-2.el92.33-160.el9_0 2.el9_4 3.el9_59-3.el93.26-143.module_el9.3.0+60+5ebc989a7-144.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b14-481.el941-481.el95.16-3.module_el9.4.0+115+226a984b22-5.module_el9.7.0+193+581791669-2.module_el9.4.0+102+68a9385385-481.el9021.06-5.module_el9.7.0+196+ac40ca3b208+fb06c0ab21207gitfff6d81270b5-9.el9_231122-6.el940524-6.el9_51.2.3-7.el93.1.1-11.el9.alma.14.4-4.el9_6.3.alma.13.0.1-1.module_el9.6.0+172+f0ba00ec5-481.el92.3-18.el920.el9_5.15-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b160.el9_02.el9_43.el9_56-2.module_el9.4.0+102+68a938533.6-3.module_el9.4.0+115+226a984b7-160.el9_02.el9_43.el9_54.4-5.module_el9.7.0+193+581791665.3-143.module_el9.3.0+60+5ebc989a4.module_el9.4.0+101+d58a8d955.module_el9.5.0+129+9ba7e8b16.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791664.6-481.el92.2.18-6.el9_127-1.el98-1.el9_35.14.2-160.el9_0 2.el9_4 3.el9_55.0-143.module_el9.3.0+60+5ebc989a 4.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b120.0-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+5817916639-16.el96.3.3-160.el9_04.1-162.el9_4 3.el9_54.0-143.module_el9.3.0+60+5ebc989a1-9.el9_1.1-144.module_el9.4.0+101+d58a8d95 5.module_el9.5.0+129+9ba7e8b16.3.1-2.module_el9.4.0+102+68a938533.module_el9.4.0+115+226a984b5.module_el9.7.0+193+581791668.2.2-3.el9_4.15.el9_6bcelgdb-docnome-classic-sessionshell-extension-apps-menuuto-move-windowsclassification-bannerommonustom-menudash-to-dockpanelesktop-iconsrive-menugesture-inhibitorheads-up-displaylaunch-new-instancenative-window-placementpanel-favoriteslaces-menuscreenshot-window-sizerystemMonitortop-iconsupdates-dialogser-themewindow-listsNavigatororkspace-indicatorlibguestfs-bash-completion inspect-iconsncurses-termosbuild-depsolve-dnfluks2 vm2ostreeselinuxperl-App-cpanminusttribute-HandlersutoLoader SplitBenchmarkCPANlass-Structonfig-ExtensionsDBM_Filterevel-SelfStubberirHandleumpvalueEnglishxtUtils-ConstantEmbedMiniperlFile-Basename Compare py Find stat Cache HandlendBinGetopt-StdHTTP-TinyI18N-Collate LangTagsPC-Open3Locale-Maketext-SimpleMath-Complexemoizeodule-LoadedNEXTetPod-Functions HtmlSafeearch-DictlectSaverfLoaderymbolTerm-Complete ReadLinestxt-Abbrevhread -Semaphoreie-File MemoizemeUnicode-UCDser-pwentautousebaselibdebuggerprecateiagnosticsocencoding-warningsfieldsletestiflessibnetcfgocalemacroseta-notationopenverload ingsigtraportubsutilsvarsmsishki-acmebase-javacajackson-annotations core jaxrs-json-providerproviders module-jaxb-annotationskraserverython3-bccfile-magickdcproxylouismakoosbuildpip ki yasn1-modules.11-PyMySQL+rsa pip-wheel 2-PyMySQL+rsa wheelrpm-apidocscronust-debugger-commongdblldbsrctd-static-wasm32-unknown-unknownwasisystemd-ukifytexlive-adjustbox e lgorithms phalph mscls fonts math nyfontsize size ppendix rabxetex phic tbegshi tachfile2 veryend uxhook vantgar wesomeboxbabel -english bib se eamer ra ton ibtopic di gfoot intcalc tset ookmanrk tabs reakurl qncapt-of ion rlisle tchfile hangebarpage rter ngcntr ite jk lasspack m -lgc super ap extra ns ollectboxion-basicfontsrecommendedhtmlxmllatexrecommendedxetex orprofiles tbl ntext urier rop squotes tablestack urrfiledatetime ehyphec epic nctex umitem viron psf topdf-pkg qparbox so-pic tex -pkg cmds oc olbox uenc ler ro sym xtsizesfancybox hdr ref vrb ilecontents hook nstrut x2col latvian loat mtcount ncychap ontawesome book s-tlwg pec wrap otmisc notehyper p l ramedgaruda-c90 eometry ttitlestring lyphlist raphics-cfgdef fext filehanging elvetic obsub logo ycolor perref h-utf8 en-baseatexifmtarg oddpage platform tex mport ndex fwarerr tcalcjadetex knapltxkastrup erkis nuth-libocal oma-script vdefinekeys options setkeysl3backend experimental kernel packages astpage tex -fonts 2man bug config etltxmacro trine inegoal no stings ofitems m -math tabptch xcmds misc ua-alt-getopt latex-math ibs otfload tex85base warpmakecmds nfnt-font rginnote vosym thpazo spec tools dwtools emoir talogo flogo-font nfss icrotype nitoc nsymbol odes parhack topdf s ultido rownatbib cctools ntrsbk eedspace wfloat unicodechar orasi-c90 toccite tgclassoberdiek solete verpicpalatino ralist lel skip ssivetex dfcolmk escape lscape pages texcmds gf hilokalia laceins in olyglossia werdot reprint sfrag latex nfss picture t-3d arrow blur coil eps fill grad math node plot slpe text ools ree ricks-add text xfontsqstestragged2e cs ealscripts fcount runfilecheck sfssansmathaccent uerj cheme-basic ection sty minar pnum tspace howexpl oul tackengine maryrd ringenc ubfigure vn-prov ymbolt2 abu lary ex-gyre-math ini-files live-common-docdocindexenmsg-translationsscripts-extra.infra tcase pos hreeparttable umbpdf imes pa tlesec ing ocloft ols ranslator imspaces xfonts ype1cm htmlucharcatlasses s hc lem nderscore icode-datamath quecounter sugar pdmap-map quote rl topiavarwidthwadalab s y -type1 sym rapfigxcolor ecjk olor yr index persian search tex-itranspstrickstibetan config fontinfo ifthen keyval ltxtra mltexconfig string tab unicodezapfchan ding refuned-gtkppdrofiles-atomicmssqloraclepostgresqlspectrumscaleutilsusbguard-selinuxvirt-v2v-bash-completionwin-regxdg-utils901002022120713184520020230413133347537 511122142 623091417 802112332 927094557 1019054835 261116023002023122112104840124164610 227081546 402085113 114627 906462740020240403183139 510175312 6053207 60610363063337 826124927 8134336 9130124 903074554 1909074450020241004144219 113054853 204144523 6140523833 1206590850127065635 214043037 21080435 328124628928 42819310660020250318115828 513150515837 4095852 604050441617 729092450 91714314070020251211084025 50939066021712463730349 304085732 11090120 408035010 10072346patch:ALBA-2022:82565:20841SA-2022:49405242495276348252769570916366799904428600343157657422435852185905602103470017638389549136399700713207117828831482369950458967870898003811225476278708906810012263951629472078192126502637919317405361844314449356180637438329065803:00052177194202108253023418218334567894383476608112281024903465134786570106781413376840770592670936701386809798090918207481276125677799320241622346489536789601823933129264057667703841744538788751923327082621633455034531437850245318423325597781567992566171145223923484030576047199158778201325730149504774112629956971634424838955850486971801941436942001424313634345536962532968497081133844953635849679246960771206788912426656324304013663589712805402392093146973482924675081823435942495166970589366315435961779948970732844587253577746550177112547534623456845914:0001102571108415126249656731087463567475335760237057908057114895012637710090218447438447259027025878918586099394950788311112232193842509301494127869503091034764273686285935012330766889175089818225872990840632033557911926325745675696097080493920481137283694566472688799025830233748536687787944103384763504124895019602456897016167972458798423538389103306739619687175482036730145784239559994002507788316521278312497189422395075002637873836234726495567612676986192835513892231793223463925293383693815928999602014676367984678992457356464510296768137265478358489134679771362046034645750550286799588025379110127214762803744467563617788072693800914359051889937811452283564450867801457890234520043778130617253137140451349501246789687023454138523459605258275:005980146761210308122434774226578667739237919124722351007213648899635379550631676998374862773114033541162374884961992200883100872804475196274683143009304286507860273782935624075130814162036936408276278983500710189239942960861700408879006046861081635639859701818070843778412835587426080971495152758132181521491135237345409895849273050203551883890922683564355456789601311101392558046269370281591626682005111753764056607908653034496387109114221041309235636423480359700293944856919500627689798649931072612344406531566173144571373833455259374025169229446344360889166978769779370495067767941079183847603578201412356309137879957402491078922356789301235678404586986007289390337958049126364283293333746787660735435582813737916908010618434575062843023627964301244862526634587780978A00256:0052126372384731242237455870912360594671971939142347832361088914323935097781408910297385956179038133920428212624707922768123699920303144066795189291833794015940588507166386873053842969284066411065873788216354457546727598289850805996024093042600415388266856300140823904625706217669237002259343508467198969158075259457969510841889219044repokey:type:relidarray numsitory:solvablessolvable:arch buildtime conflicts description evr name patchcategory rovides summary vendorupdate:collection:archevrfilenamenamelistmodule :archcontextnamestreamversionreference:hrefidtitleypeightsseveritytatus||3322k2W=X=U?V?UEVEWBXBAA??@@>>==nnoobcfgh|i|f|j|k|11*ipkliminkokdeaaUURRTTSS^^k66UUdvevkU?V?W>X>y;z;uuf^h^i^b9c9fgj^k^k<Wp}n}o}{5|5y=z=y<z<vv11 + + 1 1 ++CvXb:c:f_j_k_dwewfgh_i_--FFHHEEGGDDxxwwiilljj++kkNN00NffgghhaaDD11((55..!!--66##$$  ""00**22%%4433MM,,//%%LL00//  UU  TT  SS99XX--~~,,**((++&&||}}''  ))%%xx{{ssffddbbrreezzwwvvccyyuuttFF  --//00  ((    ++**..)),,7788AA@@{{yyss}}oonnwwttjjmmuu||kkxxpprrvv~~llqqzzddff^^ggeebbcc``aaQQOO__PPee!!??&&##$$    ''%%""  ''(( 7766CCmmBBAA""CCBB"DD<<99cc++dd  445533664365IIFFHHEEGGQQQPPPRRR2211RRccddNNcc//00  --..<<;;--,,..rr**++ZZmm----..-.ccHHHZZUUKKIIYYMM[[TTXXJJOOHHWWLL]]QQRRSSNNVVPP\\==<<vvuuuv  lll778899$$::""!!;;##@@??]]]WWUrrqq  ppMMMzz   ssrrvvuuuvAA$$""  !!##ttdd--,,--//11..00tttRqqqbbccbcffffkkddgghhjjiieezz  ||{{}}~~SSS,,,!!bb++))LLL**..  }}??&&oo22LL//\\%%))aa  RRkkhh$$llTTxx::''||5577FFPP,,WW  ++OOss  ==''ff88##DDBB__vv^^IIww44$$~~]]HHppJJ@@>>AACCYY66cc##bb;;jj99eeEE  MM``mmSSuu%%  &&33GGyyiiZZggnn<<ddUUqq!!00--NN[[zz{{  !!VVXX11rr""KK""**((QQttEE\\\+++}}>>>))**)*}}==}hhggghoonnppqqOObbyyzzy;;z''""\\++))&&$$%%[[***)((##"(%#$'&+))YY>>??AA@@JJ::00UUVVTTEE``^^^__`_33\\hhhiii((@@BB===@  JJdd000XX  YY __ZZ!!!~~~))EE((hh  ggg""ii$$!!h##i[[[^^^___!!KK  ""K557744998866nnn2211GGG        GGG  33))(()(IIIvvttxxTTwwuuTRRNNPPOOSSQQhhXXX||''""$$!!%%&&&(('$!(%##"#cceeddff!!!22'''  eeffedddf``-"""%%%YYYjjj      776676<<22//33441155..0066WWXXTTUUZZVV[[YYffeefe##==<<<=gggCCEEDDFFGG{{FF}}F~~||kkk**y\z\y]z]{R|RA   CDB  ;;::    44==<<4zzLLDDKK==***44??@@>>@>ee?{{MMBB{ss>>pp\\--CCJJ8855&&''ggOOYYVVyywwPPqqTTHH<<uu00bb[[{{ccBB  ::^^""22kk``UU$$hhZZaadd==@@,,LLDDQQff%%..RRoottAAee66MM44NN(())nnmm**WWxxii!!++99SSll77rr//??XX##FFIIjj33__11]]GGKKEEvv;;223332VV^^;;YYSSLL__;OOPPWWQQaa:::KKII``MMRR[[XXHHTTUU\\vv88rrrsssdd@@??ll[[Wlm///*YYww  ///99889DD8//bbbccddcd,,]],hh77001110""   kkll**&&))//JJ99ppp88kknniimmllhhoojjggAA    ,,++FFGG>>???>DDDm m##lllggHHBBFFAAEEGGCCDDKK((ooIIuuJJIJ  \\ii   ZZ  XX[[YY ^^>>i]]__{{yyyQQOOPPzz{SSxxNNz||~~x}}|TT~}MMRR,,&&GG,FF&44HHJJ))++11II66+55bbccLekif--%%&&-$$''PP**WWVV~~    MMLL)))))):)AAABByyBqq>>^^__JJII  KKwwLLw99  --aaaooo..$$OOO11kjX((ZZZNN;;::nnmmvvnn88ooojjuuwwuIIxxwxllssmkkspppnlvjkttqq99trrrqUUWWVV|||NKOKPKQKRKSKTKUKVKWK..iijj!!  aabb``   qq,,##..#ss.kkppkjjjkkg]]h$$$>>555??@@@@AA==>>''&&<<BBCC;;%%::mmm55]]PoQoRoSoYoZoboX6Y6Z6[6 \U]U^U_U`UaUbUcUdUeUfNgNhNiNjN k~l~m~n~o~p~q~r~`~ s2t2u2v2w2 xUyUzU{U+U|U}U~UUUUUUUUUUUU U U U U UUUUUUUUUUUUUUUUUUU  `!`"`#`$`%` &{'{({){*{+{,{ -W.W/W0W1W2W3W4W5W6W7W8W9W:W;WW?W@WAWBWCWDWEWFWGWHWIWJWKWLWMWNWOWPWQWRWSWTWUWVW WX YxZx [P\P]P^P_P`PaPbPcPdPePfPgPhPiPjPkPlPmPnPoPpPqPrPsPtPuPvPwPxPyPzP{P|P}P~PPPPPPPPPPP Be e e e e eeeeeeeeeeeeeeeeeee e!e"e#e$eCe%e&e 'v(v )Q*Q+Q,Q-Q.Q/Q0Q1Q2Q3Q4Q5Q6Q7Q8Q9Q:Q;QQ?Q@QAQBQCQDQEQFQGQHQIQJQKQLQMQNQOQPQQQRQSQTQUQVQ WX! n Y Z o m l [ \ ] ^ " _=`=a=b=c=d=e=f=g=h=i=j=k=l=m=n=o=p=q=r=s=t=u=v=w=x=y=z={=|=}=~=========== = = = = ====# mnopqr`kl$                 ! " # $ % & ' ( ) * + , % VVxVyVVzV{VVVVVVVVV~VV V VVVVVVV+VV V V VVVVV|V}VVVVVVV& -,.,/3031,2,3,4,5,6,73839,:,;3<3=3>3?,@,A,B,' CeDeEeFeGeHeIeJeKeLeMe( W:X:) W:X:* NzOzPzQzRzSzTzUzVz+ `-a-d-e-^-_-\-]-, ;aa7a8a1-2-A-B---.-- W(X(T8Y(Z(VoQ5[(R>\+]+^(_(S:N_`abcUooLkd(Ke4f4J(O{MHPRg(. h:i:j:k:l:m:n:o:/ poqok r7s7t7u7v7w7x7<70 yz1  d ddddd ddddd2 {|}~3 W,X,4 W+X+5 qqq q q q q qqqqqq6 st7 YyZy8 9 ?+@+=b>b7b8b-+.+3+4+A+B+;b W-X-? WKXK@ WKXKA T#O#N#R#S#B   C AAA A AA AzA{AAAAAD KKgK K!KE "o#o$o%oF &j'jG (B)BH *Z+Z,Z-Z.Z/Z0Z1ZfZ2Z3ZI 4567J 8W9W:W;WW?W@WAWBWCWDWEWyWxWK F G [ L IXJXUXVX9X:XEXFX=X>X1X2X?X@X/X0XQXRX3X4XAXBX-X.XMXNXKXLX5X6XCXDX;Xb ?P@PAPc BCDEFGHIJKLMNOd P1Q1 1R1S1e T|U|V|W|X|Y|f }>~> > >m>n>e>f>>>>>i>j>g>h> > >a>b>w>x>c>d>y>z>>>k>l>u>v>s>t>>>q>r> >>o>p>{>|>>>>>_>`>g Z[\h ]0^0_0`0a0b0c0d0i emfmj g h i j k l m n o p q r k stl uPvPm w3x3n yzo {|}~p z>{>>>> > >>>> >>>q 0r IQDQCQs ++++++++ + + + +t  u ]]g] ]!]]v <<<<<<w KKKKKKx *=+=0=1=f=2=3=.=/===,=-=y . .?.@.7d8d!d"d#.$.%.&.'.(.).*.+d,d-...z B/B0B1B2B3B4B5B6B7B8B9B:B{ g^^!^ ^^^| W/X/} W.X.~^;{<{={ >O?O@OAOBO <k prqrCDvwtu W0X0 W1X1 ^V }~|{ 536393:33343=!>!A3B3-3.3;!?O@ABCWSDEFGHIJKLMNOPQQRSTUapVWMXYZ[\]^_`abcdeefgUhijklmnoRpqrs\tuvwxyz{|}~c   X  VYi !"#$%&'()*+,-./01_23d]456789:;<=>?@ABCDEFGqHIJKLM[NOPQRS`TUVWXYTZ[\]^_ )E <9x9s9k t9u9r9v9w9pqqq YZ`ao[\]^lmn CRDRIR ``` ` `` ````` b~c~d~e~f~g~h~ i8j8k8l8m8 u!t!s! n4o4p4 qTrTsTtTuTvT wLxLyLzL{L |Y}Y~YYYY W3X3 W4X4 {yz| }   ~ 7s s sss9sssss8s >>W>X> W>X> ~}|{! R$S$T$O$N$" aaaaa a aaaa a#  _!_g____$ k9j9l9m9i9% &k'k& kYlYoYpYmYnY' o?p?w?x?g?h?u?v?}?~?{?|???k?l? ? ?y?z?_?`??? ? ? ????q?r???a?b???s?t?c?d?m?n???e?f?i?j?( YYjj`YYYY YYYaYYY!Y"Y%Y&Y#j$j) 99* @@@@@@@@+ , LLWLXL-  h!h"t#t$h%h&h'h(h)h*h+h,h-h.h/h0h1h2h3h4h5h6h7h8t9t:t;hh?h@hAh. W5X5/ bbbbbbb bb b b0 tt7ttt t t8ttt9t1 `ZZZaZZZZ ZZZkk%Z&ZZZ#k$kBC!Z"Z2 D E F G H I J K L M N O P Q R S 3 T U 4 CSDSIS5 cccc ccc c ccc6 WIXIII7 W)X)8 STMNGH-.KLCD/078129 e f [ \ { | q r k l     a b s t : BYYYY YYYYYYYCY; ~|}{< VwWwXwYwZw[wFw\w]w= ^9_9`9a9b9c9> ,, , ,,,,,,, , ,? ]#d#e#f#g#h#i#j#k#l#m#\#_#n#o#p#q#r#s#t#u#^#@ 5`6`C`D`E`F`K`L`7`8`?`@`/`0`O`P`S`T`Q`R`A`B`1`2`;`<`=`>`M`N`U`V`G`H`-`.`A H(B v(w(x(y(z({(|(}(~((((((C ' ( D wbxbE F {{G ;_<__H 4 4(C)C 4 4 4 444I DDDDDDDDDJ **K AAL 10203040M k l i j m n q r g h o p N stO ccccP }~{|Q rrrr r r7r8rrr9rR _XS EFIJBCGHLMOKNDT 888 8!8"8U rr r rr rr r rrrrrV 2[3[,[-[.[/[*[+[f[0[1[W 4|5|6|7|X # # $ " ' & K $ % ! Y CZ {yz~ |}   [ %K&K'K(K)K*K+K,K\ Y~U~X~W~V~T~] -1.1^ \x]xXxYxFxZx[xVxWx_ /S0S` xxxxxxxa 1,2,3,4,5,b )Fc CC_C`CwCxCcCdCsCtCCCaCbC}C~C C CCCmCnC{C|CCCeCfCkClCgChCCCuCvCCC C CiCjCyCzCoCpC CCqCrCd 6789:;<=>?@ABCDEFe GrHrIrf  ? ?J?K??? ???????g CTDTITh L"M"i -- - ------- - -j R)S)T)O)N)k ":#:l ;}<}=}m &l'ln l;m;n;o;j;k;h;i;o \y]yXyYyZy[yFyVyWyp NQOQq PmQmRSr CUDUIUs {|}~t pzqz<tuvwCDu r:s:psqsv:w:t:u:x:<:v JJWJXJw T2U2V2W2X2Y2Z2[2\2]2^2_2`2a2b2c2d2e2f2g2h2x NRORy W*X*z ~zy }{   |{ ] ^ [ \ o Y Z n l ` a m | ijklm} }~{|~ nxoxpx <tuvwp{q{CD 1424A4B4=">"94:43444;"<"-4.45464 q}r}s}t}u}v}w}x}y}z} v;w;r;s;x;ptqt<;t;u; W9X9 W9X999 '3(3)3*3-3.3!e"e7e8e3 3#3$3?3@3+e,e%3&3  `!``g``` %    2  *   Q ,  ) { | | 9  p  a   X a }  r @ 2 u  " q q  F   3 } ~ ~ D s  /  z h 7 T :   D    - } # o J 1 0  x O   { E   :   K X L _ \ h o c G 0 M    S @ < A + ( { - N  U x O    b x ) > R >  # B C 9 j B   P ?  S A ^ I P 2  ? f  `   w A  8   D K <  $  Q b    Z E \ ` I l [  1 t y 7 & F Y !   + d ' 6   P   d  u + 4 k   J 4 j u 8    i   M B 6  ~ J { r ] | z *    } T 7 , 3 &   W "  W e  '  % l $ &  5 C  8 = * c (  O @ y ?    K  0 v  I  ; n  4     R f  k <   y w p  5 >  C 1   6 N ;  Z t /   v   m  G  9 . M ] H V H  $ "     3  !   i w ^ m '     s ) E e /  g L -   F N    g  ! " # # .  V ~ [ %  v  Y (  = $ % |  z H = _ . G 5 ; , !   :   U  n   L  VWYUTX J K P Q N O H I L M R S D E F G  dTeTjTkT~TTZT[TzT{TTTpTqT|T}T\T]TnToThTiT`TaTrTsT^T_TtTuTlTmTTTxTyTXTYTbTcTfTgTvTwT T%O%N%R%S% 11 1 1J1K11 11111 ol[\]^YZ`amn bPcP^P_P`PaPdPeP\P]P ' (  +f,f7f8f%4&4'4(4)4*44 4!f"f#4$4-4.4?4@4 5565354595:51525A5B5=#>#;#<#-5.5 W:X: ::W:X:  s ss s sssss ssss [ \   q r s t { | a b   k l e f  CDMNKL/078ST12GH-. ZZCZZ ZZZZZBZZZ {|~} .. . . . ....... &u'uJuKu(u)uDuEuRuSuFuGuPuQu*u+u,u-u.u/u0u1uLuMuNuOu4uHuIu p|q|<vwCDtu v<w<puqux<s<r<<<t<u< p5o5n5 +`,` IVDVCV  @ @@@@@@J@K@@@@ @! 2n3n4n" RSPnQn# ;;W;X;$ W;X;% bcdefgh& 5F6F7F' 89q:;<=>?sp@AoBCDEFGHnIJr( / /'/(/-/./%/&/+g,g?/@/)/*/#/$/7g8g!g"g) 96:6;$<$=$>$-6.656663646A6B61626* KELEMENEOEPEQERESETErEUEVEWE+ W<X<, W<X<<<- -,+. 2222 2 22 222J2K2/ X"Y"Z"0 5C6C3C4C7C8C1C2CC/C0C9C:C1 [C\C]C^C_C`CaCbC2 =a>aUaVa7a8aMaNaAaBa-a.aCaDa1a2aEaFaQaRaKaLaGaHaOaPaSaTa/a0a;a%-7.757674 ?0@0)0*0%0&0-0.0!h"h7h8h0 0+h,h'0(0#0$05 `;`<`6 W=X===7 c:_:`:a:^:b:8 W=X=9 `QaQ^Q_Q\Q]QdQeQbQcQ: p}q}vwtu<CD; WPXPPP< W=X== ctdtetfttgthtitjtkt> z~y~v~w~x~s~t~u~q~r~? lLmLnLoLpLqLrLsLMLtLuLvLwLxL@ gaa!a aaaA tursvwpvqv<B yz{C 5 5555555& &5555'5(55555+5,5!5"5D ttt t ttttt tt t tE =&>&5868;&<&98:8A8B83848-8.81828F V|V}V~VVVVVVVVVVVV VG [[C[[[[[[ [B[[[H n]^[\l`aYZmoI ef{|st[\qrklabJ %1&17i8i'1(1+i,i-1.1#1$1!i"i?1@1)1*11 1K - . K L C D S T G H / 0 7 8 1 2 M N L CWDWIWM <=x=s=v=w=r=pwqwt=u=N vwp~q~tu<CDO '(P @PAPBP>P?PQ e@f@ @ @@@@@s@t@c@d@m@n@k@l@@@w@x@y@z@{@|@@@i@j@ @@q@r@_@`@@@u@v@ @ @a@b@@@}@~@g@h@o@p@R ilgnkhmjS 1.2.3.4.T w w w w~wwwwwwwwww|w}wwwU V QQWQXQW W>X>X ;'<'192999:9A9B9-9.939495969='>'Y %2&2+j,j-2.22 2)2*2'2(2!j"j?2@2#2$27j8jZ^rMsMlMmMxMpMqMMMnMoMvMwMtMuM[ Y~Z~\ hlgl] seHe^ opijqrghklmn_ st`  j jja 31411121b 4}5}6}7}c d KZLZQZRZ/Z0Z1Z2Z5Z6Z;ZZUZVZe V !W"#X$%&'()*f  ,g +l,l-l.l_l/l0l1l2lh .]/]i 3 4 5 ^ j /T0Tk ]]`]%]&]!]"]nn]]]]a]#n$n]]] ]l Z8[86878d8e8`8a8^8_888r8s8b8c8j8k8X8Y8p8q8x8y88898l8m8\8]8|8}8:8;8n8o8z8{8f8g8t8u8<8=8>8?8v8w888h8i8~88m '(n @@A@B@C@D@E@o FtGtHtp ^;^<^q 5-4-1-2-3-r dddds 0\1\f\2\3\.\/\*\+\,\-\t IJKLMu NNONv zyqrxutvwsw T U x^7PQRSTUVWXy |}&'67\]45`avwhiVW\]no./  _:;<=mnoYZPQ~RSZ[tu89PQ01WZ[jk23XYdexy^_ !pqSbcpLMU"#d\NfgHIhi  89aRSz{jn"#dez{oZ[e$%()TUYBC67&'*+  ()\],-g  rs LM~45@Alm^_XYVWqJKDErs OXY`a`^_NOTUVci01<=DEh>?Zvw !Q./]bc:;HIpqfg$%TUBC23*+FGXfJK|}VWjkbRPQlNOFG>?@A^PTklmxyMtuRS[,-z [/\/]/^/t/_/`/a/{ boco| 'x(x)x*x} ~|}{~  6 lNmNMNpNqNnNoNrNsNtNuNvNwNxN NLOL yzd efg BB gihjnlkm YwUwXwWwVwTw hij klm OFPFKFLFQFRFMFNFVFWFSFTFrFUF nFoFpFqFrFvF pyoyny seteue gbbbb!b b vCwCxCyCzC{C //// / ///// / / CXDXIX a+ z(|(}(~(((( =~<~;~  xOsOpOqOvOwOrOlOmOnOoOMOtOuO !! ! ! ! ! !!!!!!!!!!!! 00000000 0 0 0 0 CYDYIY YZ 7k8k5555555 5!5"5#5$5%k&k?5@5'k(k -?.?#?$?? ?%?&?+/,/'?(?!/"/)?*? 5:6:3:4:;(<(=(>(1:2:A:B:9:::-:.: `RaR^R_RbRcR\R]RdReR YZ W?X? WRXRRR! )>*>+>,>->.>"/000#}~{|$p6o6n6%l$m$d$e$^$j$k$]$h$i$n$o$p$q$r$s$t$u$f$g$\$_$&112131415161'6~7~4~5~(.^/^)eeee**]+]0]1],]-]2]3].]/]f]+/U0U,LMRSPQDENOFGJKHI-LvMv.v/v0v1vHvIvPvQvJvKv(v)v*v+vDvEvNvOvRvSv,v-v4vFvGv&v'v.789/WAXA08u7uuuuuuu u u9u1WAXAAA2YZ3i-i2i3iAi'i?i!i;i7i5i)i.i&i"u#u i@i+i$i%i,i*i4i:u8u6i(i0i1i4O9G9:9;9M9H9J9K9<9=9I9>9?9@9A9N9B9C95)@*@'@(@-@.@+0,0@ @!0"0#@$@%@&@66 6%l&l66'l(l#6$6!6"67l8l66?6@66671;2;3;4;9;:;;)<)-;.;=)>)A;B;5;6;8###### ## # # # #######9C\\\\ \B\\\\\\\:ab{|stef[\klqr;12KL-.GH/0STMNCD78<N&O&T&R&S&=cDdDiDjDDDkDlDDDyDzDoDpD D DgDhDDD D DwDxDqDrD{D|D_D`DDD}D~DaDbDeDfDmDnDDDsDtDDDuDvD DD>DEFGHIlJKLMNOPm?sUtUuUrUqUvU@ccgc c!ccAkinjmlghB;]<]]CDvv8v v vvvvv7v9vEWBXBFBBWBXBG.W/WHR<S<P<Q<T<I2j3jAj'j6j7j;j5j)j j!j4j:v#v8v9v?j$j%j,j-j.j/j0j1jj&j*j+j@j(j"v=vJ+1,1!1"1A A-A.A)A*A'A(A%A&A#A$AK=*>*-<.<;*<*9<:<1<2<A<B<5<6<3<4<LE$F$M777m8m?7@7!7"7%m&m#7$77 77777'm(mN,w-wLwMwPwQw.w/wHwIwRwSw0w1wJwKwDwEw*w+wFwGw4wNwOw(w)w&w'wOHINORSFGDEJKLMPQPCCWCXCQWCXCRyyyyyyyS9yyyyy y yyy7y8yTzUQRSTUVHHHHH H HzH{HHHVHWHJHKHH HWX'U'V'W'Q'R'S'T'X{|~}YbpcpZWHXH[ZZWZXZ\Hfsf].p/pHpIpNpOp(p)p4p0p1p,p-pLpMp&p'p*p+pFpGpRpSpJpKpDpEpPpQp^J<K<P<Q<0<1<4<N<O<LM./RS*<+<FG&'HI,-()D<E<_HINOPQFGLMDERSJK`Y*Z*Vq[*X*Lmbce6f6W*UqO}`aKNaMJqPTJ*R@^*_*\-]-S<T:Q7g*d*a^>]>YfZfN _f`fdf_fJf^fVwLtWfXfUwblcl\>afb*a*TCcLfLS@eLPX`*d,e,R=gfMMf,fO[fglKQ4bUU:UUUcJIKIIIIzI{III I IIII IVIWIdGGGGmGnGGG GG_G`GaGbGGGsGtGqGrG G GGGwGxG{G|G}G~GiGjGcGdGoGpGgGhGeGfGkGlGyGzGGG G GuGvGeqErEkElE_E`EwExEuEvEaEbEEE E EgEhEEEcEdEsEtEEEEEyEzE E EeEfEmEnEiEjE{E|EEE}E~EoEpE EEEEfhijklmnopqgjj j!jgjjhutsvwzyxqri    ! " jr s t u v w x y kHisil gmz|{|||}|~|||nQRUSToCZDZIZpRSPoQoqmlno`a[\]^rm h i n k l j g s3F4F9F:F1F2F/F0F5F6FF7F8Ftl<m<j<k<h<i<n<o<uTUvwJJJVJWJJJJ JJJKJJJ J JzJ{Jx4567yffffz!2"2-B.B+2,2'B(B)B*B%B&B#B$BB B{#-$---%5&5--7585--?-@-'5(555!-"-- -----|)y*y'y(y}YZ~"# xyeXY|}o\]kN`aLMlmMPQfg89Qm*+njknors  V,-hibSYZ2345RScVWDE$%89./Z[z{RStu^_<=  aNOfqbcdbc !Y\]  vw\]./l[JK|}ULMiHIxyRBC~,-de67Z[z{TU^_Z[&'depqPQ^_01rsBCpq !FGJKvw_NO@AXYtu67*+X   `aRSVW>?@ApDE`FG&':;TO<=PPQ45HI^noh2301VWhifgg\ZW$%:;]>?"#()TUjlmXY()TUjk~)Gpxqxt>u>x>s>v>w><>r>o]^[\`amlnSSWSXSW@X@'(wfxfCDtu<vwp^q^u#t#s#eKfKLrJeKVuYeZe[eXeTA\=]=Q2PUS>eb)a)Uuae`eNcK`)Wegebkck_ed+e+MKO~^e_eR;^=degkf+ < bt u C D v w bp_q_ @QAQBQ>Q?Q zzzzzzz uu uuuuu u u 7 7uu u u C]]]] ]]]]]B]]]klab{|stqr[\efMNGH/0ST12-.78CDKL$$$$$$ $ $ $$$$$$$$ $ $BCMMWMXMW:X:]^l`aon[\mNMOMgggg-2.27 7 7 7 7 7}~{|f%g%t%u%r%s%]%p%q%l%m%^%j%k%_%\%d%e%n%o%h%i%S[T[C[D[Q[R[A[B[?[@[1[2[=[>[U[V[O[P[7[8[M[N[G[H[5[6[-[.[/[0[K[L[E[F[;[<[[[  PQWVT7URSXX}X~XXX|X >;?;I;B;C;G;<;=;@;A;O;N;:;;;M;J;H;K;!;a?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstu.vDwDxDyDzD{D/|}#5GbSC*BP|NT U3V0n~**5Y@uI3**''.5 u T%c!*U 7X9V *>7[D6$w w w N,^E*:xAM 5J66uZ  %&!'V|K )d33=36**+u<[6*?F3M38//##-ZLuP !4u"O;4HZ"#y$ % L&*'*(5 1Dw2U(|)|G*+OT5P X,-0:1;1l1m111v1w1`1a16171z1{18191|1}1j1k111.1/1<1=1x1y1~11h1i1>1?1d1e1^1_1b1c1\1]1f1g1t1u1n1o1Z1[1r1s1p1q1X1Y1145672    30h1h2h3h4H)5/V0V6'(#$*)%! &"7^^^ ^`^^^%^&^#o$o^^!^"^oo^^a^87899TxUxVxWxXxYx:enfn;qrzyxstvwu<AAAAAAAA=9w w w7wwwww8www>v w t u r s x y ?" !     @4D5DA B67C8S9S:S;S?@ABFCDE F GJ:K::: : :: ::::::V:W:z:{:HJJJJJJIJSTURQKR'S'T'O'N'Ll:m:k:j:i:MuftfsfN\QO0123,-f*+P6745Q    R 8 8vv v vvv vvvvv v vSLQTx/y/8/9/:/;/l/m///r/s/t/u/f/g/v/w////?/X/Y/b/c/\/]/n/o/p/q/z/{/U[\`amon]^lVBCWNOOOXhi:;tUlm\]*+,-{|pqhiDE./bcHI !NOJKZ[./23grslmRSTtuHI$%01PQRSfgbc`aTU*+deLM>?()rs^_BC"#fA8945XYJKFG$%BC&'`awx&'pq01,- NOVWDEuv<=238967}~Z[node<=\]()>?  jk45no^_@yzVWjkFGLM:;@APQXY  67Y'7(7G7H7Zwgxg[\IJ] x xxx9x8x7xxxxx^p7o7n7_-7.7`;;;;;;;; ;V;W; ; ;J;K;z;{;aCD<vwp`q`tub%6&6....'6(6... .7686#.$.!."...?.@.66..c-C.C#C$C+3,3'C(C!3"3%C&CC C)C*Cd< t u C D paqav w e??W?X?fW?X?gpyqyr?s?t?u?v?w?:?:M:H:od&e&]&^&r&s&p&q&h&i&l&m&f&g&_&j&k&t&u&\&n&o&pR6S6T6U6V6q01,-f23*+r    sWrXrt/W0WuEEEEEEEEEvXY^_,-OVWQbY^_nobcTU|}mRS./ BCZ[45<=XY  `a  <=n|}bc89jk~gPQ[*+BClm^h*+89z{  :;HI !YZJK_RS\]U~DEVW&'W"#23hifgrsxyDEq$%Sjk\]TUZz{()NOZ[HINOeT>?lmno !PQoPQdpN]dePJKXpqvwfTUVW"#:;()LMc./23,-VXY`\xyFG01fgde45$%67pq`aM@A^_67LM>?FG\]  lRhia RS&'@AtursjZ[ivw01ktuw 3P3Q3R3S3xpLlR?[)X)`ag)Z)UpO|\,],KT9PSbce5f5^)_)VpMIY)N`Q6W)d)S;J)ypzoznzz  Y Z {WNXNNN|t0[0\0]0^0_0`0a0}rPsPtPuPnPoPlPmPMPpPqPxPvPwP~W;X;NNONvwutzyxqrsd!dgddd d} {~  z |y$ # K ' ! # $ & " % nl]^om`a[\7\8\C\D\O\P\-\.\/\0\1\2\S\T\?\@\E\F\G\H\U\V\\\;\<\Q\R\A\B\=\>\5\6\K\L\M\N\PpQpRS>>V>W>J>K>>> > >z>{>>> >>> *+,-2301f WsXs _'t'u'f'g'j'k'r's'l'm'h'i'^'p'q'n'o']'\'d'e' -=.=A=B=5=6=3=4=;+<+1=2=9=:==+>+ //////?/@/#/$///!/"/7787'7(7/ ///%7&777PqQqRSW@X@@@6745^^^^^^C^^^B^^ ^ef{|stklqr[\abCD1278GHKLSTMN/0-. % % %%%%%%%%%%%% % %%%??V?W????J?K? ? ???z?{?? ?~~ ~!~~*~(~~~&~~~~~$~~"~)~#~~~'~~~%~W@X@[[[[[ [ll%[&[`[[[#l$la[[[!["[Hgsg^_&'i8901() FG[VWZ[` !VWz{01\]nojkBCq@Adtu./()dePQfvwZ[TVWPQJK67oTUc`abh23X~,-fghiMxy\]45eTUULMp89Qz{lWkde] !~NO<="#^_>?>?rsXY|}RS,-ROS./jFG$%\]pqpq:;YZDEXYnPQY^ P^_|}bcrsJKBCnoV@ANO"#  lmaRSbcgLMTUN:;  Z[mHI&'`atuhi  ZlmXYHI$%vw23*+xy*+_\<=45RSjkfg67  DE[\]00>0?0Z0[0d0e0v0w0t0u0n0o000z0{0p0q0|0}0<0=06070r0s0~00\0]0`0a0f0g0^0_0h0i0b0c0l0m0x0y0:0;0j0k0.0/08090X0Y0/X0X.Y/Yzyutxqrvws SGTGMGNGVGWGrGKGLGUGQGRGOGPG! e!egeeee"YzZz#@@@ @@@@J@K@ @ @z@{@@@V@W@$))v)w)))~))z){)x)y)|)})%\\!\"\mma\%\&\`\\\\\\ \#m$m\\&R4S4 4P4Q4' w wwww w w 6 6ww wwww(O}N})OOWOXO*%8&878888800#0$00 0'8(800000000!0"0?0@0+A AzA{AVAWAAAJAKA A AAAAAA,W<X<-C[D[I[.Q\/^_ fpqqb !:;Z[jkZ[rsYLMRSnoVW@AVWafg45bcno  PQxyeUxydeS01^ZlmDEJKPQjk~ppqVHIvw./67YZ89HIRS   !89>?NOlX23"#`DEtu[WXYLM i`az{h  ,-"#`acO()./fgJK~,-$%<=lm&'_*+\]bc*+M01|}:;  RS45BC<=tuFGFG^_\]]>?23N()hiPQXY&'Qde67RTU|}mgPTU^_o$%j\VW\]vwZ[hinXYkTUdrsT@Az{BCNO0i"k"l"m"n"h"j"g"1v w < t u C D pcqc2B B B BBBzB{BBBJBKBBBBVBWB30|1|,|-|J|K|.|/|F|G|H|I|(|)|P|Q|4|N|O|L|M|D|E|*|+|R|S|&|'|yz4LMFGRSHIJKDEPQNO5FxGx,x-xHxIxNxOxJxKx*x+xLxMxyzPxQx&x'xDxEx0x1x(x)xRxSx4x.x/x6j k p i q o n l m h 7v w t u < pbqbC D 8 f!ffffgf9;<=:zystuvwxqr;^-_-`-a-b-c-d-e-</Y0Y=WtXt>.Z/Z?@fgA01,-*+f23B6745CtQuQlQmQrQsQnQoQMQpQqQvQwQxQD]1^1t1_1`1a1[1\1EvGrGoGnGpGqGF\s]sVsWsXsYsZs[sFsGa/b/]/^/_/`/c/d/HJCKCC CVCWCCCC C CCCCCzC{CIWJXJJJJWJXJK^(](p(q(r(s(h(i(l(m(j(k(\(n(o(d(e(_(t(u(f(g(Lu$t$s$M444 4<444!4NR(S(N(O(T(O^i_iQ9Ji_i`iiP O K"UxVxdDeDb.a.SBN \@]@WiXiNeNfNdiPZO^@fDYiZi`.gibpcpcNL\MOgp[iaiRITEPFG^_*+yz<=  89$%,-JK`a>?JK FG\]Z[RSRSlmtuTU89{|01de01LMnobcBC()lm&'hiDEtNO$%LM&'`awx:;PQ@ApqPQbc45*+pqjk>?VW,-23BCDEXYVWHIhi:;deHIZ[jk\]XY<=@A45rs  "#TU./NO() !fg67rs67fgno23}~uv./^_Qo[\m`al]^nRwhxhS'8(8G8H8TzD{DD DDD D DJDKDDDDDVDWDDU-8.8V8 8 8 8 8 8W>9ABFE8<=?@:;CD67XkjlmiYEFZKKWKXK[`amo]^n[\l\WKXK]5>6>9>:>3>4>;,<,=,>,->.>A>B>1>2>^,,?,@,,,%9&9'9(9, ,#,$,7989,,,,99,,!,",_WWXWWW`WEXEahCiCjCkClCmCnCoCpCb*+01,-23fc/Z0Zd4567ef_ ___C_____B___gefstab[\klqr{|h/0-.1278CDSTGHKLMNi && & &&&&&&&&&&& & &&&jE EVEWEEEEJEKEzE{EEE E EEEk|~{}lzyxvwstuqrmg!ggggg gnq o h i p n j k l m o    pFFFF FzF{F F FVFWFFFFFJFKFqG9H9'9(9rBCsXXWXXXtWFXFuqDrDsDtDuDvXyWyTyUyVyYywshHhx0123*+f,-yH*z/[0[{s!t!|}6745~qbpbdbwbsbjbcbhbvTwTkbtbebfbubnbvb`babobrblbibmbgbbbGFHF'F(Fmnopijklqrgh6.7.l.m.p.q.r.s.h.i.j.k.<.=.v.w.Z.[.8.9.X.Y.d.e.../.n.o.x.y...f.g...x.y.^._.\.].|.}.:.;.t.u.~..>.?.b.c.z.{.`.a.334313231]2]O]P]=]>]A]B]M]N]K]L]/]0];]<]C]D]?]@]Q]R]-].]5]6]S]T]]]7]8]G]H]U]V]E]F]}~{| z3{3|3}3~33IJNHKBCGLMEFDO   """""       7G6G5G ssss[sss hipqojknlmutsvwqrxyzjWiWeSfS.[/[ +!+"+#+$+%+&+'+(+)+*+++,+-+.+/+0+1+2 3 Lv%_&_`___#p$p!_"_pp___ _____a_54555565758595Y Z   =<;T*O*R*S*N* h!hhhghh:v;v ? @  ]2^2a2_2`2[2\2t2!xyzqrvwstu"nopiqlmhjk#detuHIFG,-pq@AhiJK./yzjk^_`aRS !RSLMbc`a}~JK89  ./:;ABtU23fgrsZ[LM*+gDE<=45 :;$%TU&'01&'Z[01"#VW67VWhi>?FGlmBCuv@ADEwxXYCD{|()T<=PQjk>?lmNO,-fno89\]^_pqBCXY$%67\]no*+23HI  bcde()rs45PQNO$*+23f,-01%D D D D D D&Ri' f() i!igiiii*UHTHOHPHQHRHVHWHSHMHNHrHKHLH+wixi,GGHG'G(G-;<=.s%t%u%/E1F1?1@1G1H17]8]I1J1K]L]M]N]O1P1Q]R]S1T1U1V1W1X1Y]Z][1\10uErEsEtEqE1WGXG2~|}{3WYXYYY4]8^8_8`85aQbQcQdQeQfQ6 G GGVGWGG GGGGGJGKGGGzG{G7Y{Z{8{zy9KKK K K KKKKzK{KJKKKKKVKWK:[[W[X[;}~{|<WIXI=5H6H7H>{|}~?t)u)r)s)p)q)j)k)d)e)l)m)\)])^)_)n)o)h)i)f)g)@ghiA1BKONIHJyGM@Ax:;BC<=>?C86966465666766DKLCD/012GHSTMN-.78E'' ' ' '''' ' '''''''''FLLVLWLLLzL{LL LLJLKLLL L LG H-9.9IVVVV:VJ:0KfRbRaReRdRcRL)*%&!"'(#$+, M6 666+6,6666666' '66!6"666'6(666NlmO01,-f23*+PQnuoupuRIIWIXISllgl l!llTqxrxvxwxsxtxzxyxuxxxUqolmhinpjkVWIXIWq!r!X P PPVPWPzP{PJPKPPPP PPPPPPPY2 3 * + , - f 0 1 ZsStS[\\W\X\\]^`amYZlo[\n]n0o0p0^ Q QQQQQQVQWQJQKQQQQ QzQ{QQQ_ -`aaCaaaaaBaa aaaa-.KLGHMN/078CDST12b)) ) ))))))))) )) ) )))cvHpHqHrHoHnHdn$m$g$i$l$j$k$h$eRRVRWR R RJRKRRRRRRzR{RR RRRf~z{ |y}   g"  t u   %       d e  ^ ]  ! n o  u v   w x _     f g h i  y z j k   { |  \ } ~ p q      r s     $   l m   # hWUXUUUiWJXJjjjjjjjjjjkSSS SJSKSSSSSS S SSSzS{SVSWSlqVrVuVvVtVsVmTTTT:Tn S S S S SouuuuuuuuuupIsHsGsqWCXCrTBUBVBWBCBXBsn1o1p1t,_+_uMMzM{MMM M MMM MJMKMVMWMMMv T TTzT{TVTWTTTJTKTTTTTT TTTwuuxQ]y;;;;;; ;!;";#;$;%;&;';(;);*;+;,;-;.;/;0;1;2;3;4;5;6;7;8;9;:;;;<;=;>;?;@;A;B;C;D;E;F;G;H;I;zJ:K:L:M:N:O:P:Q:R:::S:T:U:V:W:X:Y:Z:[:\:<:]:^:_:`:a:b:c:d:e:f:g:h:i:j:k:l:9:::m:n:o:p:q:r:s:t:{N+O+R+S+T+|p2o2n2}uNvNwNxNyNzN{N|N}N~NNNNNNNNNNN N N N N NNNNNNNNNNNNNNNNNNN N~p8o8n8N~O~VUWUUUU UJUKUUU U UUUUUUzU{U34441424###~#####}#{#|##[\]^omlnYZ`aVVzV{VVVVVV VJVKVVVVVVWV V V!"#$"H#H%H%H$Hk%h%j%l%i%g%m%n%WVXVVV VWWW W WWWJWKWWWzW{WW WWWWWW vwtu<peqeCD < pdqdt u C D v w  )z*z WDXDLyMyPyQy,y-y(y)yDyEyNyOyFyGy&y'yJyKy4y*y+yRySy.y/yHyIy0y1yPrQr*r+r0r1rDrErHrIr&r'r.r/r4rRrSrFrGrJrKrNrOrLrMr(r)r,r-rFGDEJKLMNOPQRSHIBCpilmqohnjkxyyyvywyzyqyrysytyuyXXzX{XVXWXXXJXKX X XXXXX XXX+Y,Y-Y.Y/Y0Y1Y2Y3Y4Y5Ymmgmm!m mqq%`&`````````#q$q!`"`` ```a`U!R!Q!S!T!YJYKYzY{YYYVYWYYYY YYYYY Y Y6V7VzZ{ZJZKZ Z ZVZWZZZZZZZZ ZZZZQIRIMINIVIWIKILISITIrIUIOIPI[ [ [ [[J[K[z[{[[[[[[[[[V[W[vvf 2 3 0 1 , - * +  h}i}}8}9}}:};}j}k}<}=}(}!hZiZlZmZ8Z9ZnZoZjZkZ"WOXOOO#$tmum>E?Ermsm?LMHI:;<=-^^ ^z^{^J^K^^^ ^ ^^^^^V^W^^^.B+C+E+A+D+@+/RqSqFqGq(q)q.q/qJqKq4q,q-q0q1qLqMq&q'qNqOqDqEqHqIq*q+qPqQq0J+K+L+M+H+I+P+Q+D+E+F+G+N+O+R+S+1bTcT`TaTdTeT^T_T\T]T2*}+}&}'},}-}J}K}0}1}N}O}(})}D}E}F}G}R}S}.}/}P}Q}H}I}4}L}M}3NO4k\l\o\p\m\n\5J_K__________ _ _V_W__ _z_{_6}$~$$$$$$$|$${$$7#$%q&q 'q(q!"qq8O2P2[2\2U2V2KaLaS2T27a8aYaZaW2X2MaNaG2H2E2F2QaRa?2@2I2J29W_X___:ugtgsg;J`K``z`{``` ` `` ```````V`W`<WOXO=Cbbbbbbbb bbbBb>/078KLSTCD12MNGH-.?**** * *** * *** ******@YzUzTzXzWzVzAZt[tFtVtWt\t]tXtYtB0:CDJaKaaaVaWa a aaza{aaaaaaaa aE|||| | |7|8|9|||F77777 77777!7"77777+7,7( (77'7(7G._/_H b bbbbzb{bbbbbb bbbJbKbVbWbIDWEWHWIW@WAWBWCWFWGWJ{|~}Kzs{ss sssVsWssssss s sJsKsssL@A>?BMf01*+,-23N%~%%%%|%%%%{%}%%O:0PMHLM>?KxNGIJKJyBC:;O@A<=QY|Z|RqWrWuWvWtWsWSuhthshTm]n]o]p]k]l]UIJVWV{W{Y{U{X{T{X.`/`Y7}8}}}}} } }}}9}ZfNbNcNdNaNeN[s$t$\opmnklijghqr]ULVLWLXLYLZL[L\L^yyyyy y yy y y yyy_DXEX@XAXBXCXFXGXHXIX`]RaN/O/T/R/S/bW`X```c]5^5_5`5a5dTUe,-f*+0123fYZmlnbc]^`ao[\gd4e4f4g4httt ttttVtWt t tJtKtttzt{tttiR?S?P?Q?T?jhZiZ&Z'ZjZkZkls(t(u(mp3o3n3nzc{cccJcKcccccc ccc c cVcWccolDmDiDjDlDmDkDtDp&&&|&&&&~&{&&}&&qdJdKd d dd dddddzd{dddVdWdddrPPWPXPsn&g&k&l&i&j&h&m&teOfO^h_hTFMP*m\A]AdEeEO[hXh^AbqcqfEh`/a/lmmmP[NdhUyah`hb/K#P O N cOL]RJVy_hWhgqJhQ=SCghZhYhu'C(CGCHCv8[9[l[m[h[i[n[o[j[k[wh~i~:~;~~<~=~8~9~j~k~~(~x5.4.3.1.2.y1D2D/D0D3D4D5D6D9D:D7D8DDzeeJeKeVeWeze{eeeeee ee e eee{yKzKKKaKbKwKxK{K|K KKKK K KcKdK}K~KKKKKKKmKnKkKlKuKvKeKfKqKrKoKpK_K`KKKgKhKiKjK K KsKtK|j k q o h i n l m p }*+0123,-f~6745nopqrst n!ngnnnnmlkPsQsR S uitisi]]W]X]}'~''''''{'|''''wwunvn-=.= WPXP `arr%a&a#r$r!a"aaaa aaaaaaaaa 7z8zzzzz9z z zzz JOKOOO O OOOOOOVOWOO OzO{O I3J3S3T3G3H3Q^R^U3V3K^L^W3X3[3\37^8^?3@3Y^Z^M^N^O3P3E3F3nn 'n(n%n&n#$!"n9o9p9}~|{WKXKw6x6y6z6{6|6xx x xxxxxxxx|x}xxx x~xxyyyyy~yyyyy y y yyyy|y}y'H(HGHHH u&t&s&^^W^X^R=S=T=Q=P=pilmhnojkqzyqrstxuvwm#k#h#j#l#g#i#n# |     ~   }  { m`a]^onlbcYZ[\WuXu ` ```B```C`````!KLCDMN/0ST12-.GH78"(((( ( ((((( ( ((((( ((#zG{GVGWGGJGKGGGG G G GGGGGGG$w7x7y7z7{7|7%WLXL&WMXM'pjpkpcpdpgphpipfpep(FFsFtFaFbFFFkFlFeFfF{F|FgFhF_F`F F FFF FFFFoFpFwFxFyFzF}F~FqFrF F FmFnFFFFFuFvFiFjFcFdF)WFXFFF*WFXF+, PQ}~RS- E EE E E E.XuYu\u]uZu[uFuVuWu/gkkk k!kk0R S PrQr1+a,a2rZr3;<=45{MxMyMzMwM6))7qolmjkpinh8qwrwuwtwvwwwzwywxwsw9}B`BB L LB|B L L~B{BL L:N&K&O&M&J&*&L&;T7S7U7V7R7<7777=qrklopghijmn>s"t"???9?8?7??? ? ? ? ? ???????@BBBA~~B" !     Cr s t u x v w y D-;.;E\ [ Z F}}G6U7UH!!!~!!!}!!|!!!{!IJPQ }~RSK4567Lbbbbbb~bb|b}bbbb bbbM'@(@G@H@N | yz{~}  Ow4x4y4z4|4{4PRSPQQcJdJsJtJoJpJ JJJJ J JJJaJbJJJwJxJ J JuJvJgJhJiJjJJJmJnJqJrJ}J~J_J`JeJfJ{J|JJJkJlJyJzJJJR  SlRmRtRuRrRsRMRvRwRxRpRqRnRoRTzH{HHHHHVHWHHH HHHJHKHHH H HU M MM M M MVvw<CDpfqftuW#$!"XGGWGXGYWW:WWWZCCC C!C[sAtA AAyAzAkAlAAA_A`AgAhAcAdAAAqArA A AAA A AAAmAnAuAvAoApAwAxAAA}A~AAAaAbA{A|AeAfAiAjA\ HH H HHHsHtH{H|H H HaHbHiHjHHHHHeHfHwHxHmHnHyHzHcHdHkHlHHHgHhH_H`HHHqHrH}H~HHHuHvHoHpH]pkqkF?FCnDn^WGXG_cLdLeLfLbLaL`tttt$t%tta0:bo[p[m[n[k[l[cs't'u'dvSwSMSpSqSnSoSrSsSlSmStSuSxSe!"#$%o&ooo'o(o fI4J4M_N_S4T4K_L_?4@4G4H4W4X4[4\4E4F4U4V4Q_R_Y_Z_O4P47_8_g\WhGAHA'A(Ai I IVIWIzI{IIIIIJIKIIIII IIIj&'(k"""""~""|""}"{""lTTWTXTmcMdMeMaMbMfMnbqcqoJJJJJKJVJWJzJ{JJ JJJ J JJJJJp ; ;9;8; ;7;qHHWHXHrJKKK K KKKK KKKKKzK{KVKWKKKKs@RARBR>R?RtrosoCoDoG?Gvowoupgqg<tuCDvwv`aYZ]^m[\nolwWHXHx)R*RyLLL LLzL{LLL L LLLJLKLVLWLLLzjqkqiqfqcqdqgqhqeqq{GBHB'B(B| !"'p(p%p&p#$pp}S5T5W5X5Q`R`M`N`7`8`?5@5O5P5[5\5U5V5G5H5I5J5Y`Z`E5F5K`L`~+{,{-{.{wcxc M MMMM MMMzM{MVMWMMMMMJMKMM-<.<{zy/\0\* + 0 1 2 3 , - f 6745W.X./.0.R>S>P>Q>T> xMKOJH<=GBCIJKNyLM>?:;@A  N NzN{NNNNNVNWNNNN NNNNJNKN s#t#ghklijmnopqr 9{7{{{{{ { {{{8{ 1-2-3-4-5-6-7-8-9-:-;-<-=->-?-@-A-B-C-D-E-F-G-H-I-J-K-L-M-N-O-P-Q-R-S-T-U-V-W-X-Y-Z-[-\-]-^-_-`-a-b-c-  =<;$G%G"G#G%GNOCD\v]vFvXvYvZv[vVvWv"$ !)%*(#'&Q R S T U  N N N NN N(A)AgrhrrerfrirjrkrcrdrzO{OOOOO OOOVOWO O OOOOOJOKOE%F%\S]S`SaSdSeS^S_SbScSM,2,5,6,U,J,S,R,Y,Z,B,?,X,O,W,=,c,\,I,_,C,D,V,4,T,`,a,9,:,H,F,[,@,A,1,;,<,7,8,Q,K,L,>,P,N,],^,G,3,b,E,d{e{f{g{h{i{j{k{l{GHIJKNLMDCOEFB88+8,88888888888!8"88 888'8(8 m:n:o:!  ' (   ) *     + ,   # $ % &   ! "     "MJNJKJLJUJTJrJQJRJSJOJPJVJWJ#cOdOfObOaOeO$%fff f fffJfKfffVfWfffzf{ff f&B,C,@,A,E,D,', - * + 0 1 2 3 f (H,I,F,G,L,M,P,Q,R,S,D,E,N,O,J,K,),s-sHsIs.s/sLsMs4sNsOs&s'sJsKs0s1sFsGs(s)sRsSsDsEs*s+sPsQs*(z)zJzKzDzEz.z/zNzOzPzQz*z+z0z1z4zLzMz,z-zFzGzRzSz&z'zHzIz+z.{.,QQWQXQ-?@DE:;C<=F89>AB67.yz/|u}u~uu0 g ggggzg{gggggg gggJgKgVgWg1T@Q@P@R@S@2l]^mo`aYZn[\3WQXQ412KL78MNGHCD-.ST/05 """""""""" " """"" " "6c cccccccCcccBc7DDDDDDDDD D D D D DDDDDDD8pIqIvInIoIrI9Rj: h; h hh hVhWhhhhhhhhJhKhhhzh{h<_  ^hiuv!fg%"{| wx rs#lm]jktu  noyzpqde}~\$=C\D\I\>|||||||||?@@@ T T T TT TAn o j k q p i l m h ByIzI IIwIxIIIuIvI I I{I|I}I~IoIpIIIkIlIIIsItIIIcIdIIImInI I IeIfIiIjIqIrIgIhIIIaIbI_I`ICq|r|u|t|z|y|v|w|s|x|DLLaLbLeLfLyLzLkLlLLL LLmLnLgLhLLL}L~LiLjL_L`LcLdLwLxLqLrL L LoLpLsLtLLLuLvLLL L L{L|LLLEN0O0R0S0T0F o!ogooooG5I6I7IHiiiiJiKii i iiiiizi{iViWii iI_}~ wxnode  hi#lm{| pqrs $jkyz!\fg "^%tuuv]JxxKp p!p"p#p$p%p&p'p(p)p*p+pLkKM,.-.../.0.1.2.3.N)F*F'F(F%F&F+F,FOJjKjjjVjWjjjjjjjjzj{jj j j jPaPbPfPcPdPePQ7E8E3E4E1E2EE9E:E/E0E5E6ERRASAPAQATASY Z l o ` a n ] ^ m [ \ Tkkkkzk{kVkWkk k k kkkkkkJkKkUHjsjVCqDqcvqwqtquq6I7IrqsqH?Htpup&k.CpDp?@^wdxd_lll lllJlKlllllzl{llVlWl l l`,G&G'G(G%G)G*G+GaN'K'*'L'M'J'O'bRSPQ}~ c.a/ade0 1 2 3 , - f * + faaWaXag6 7 4 5 h/]0]idQcQjo;n;m;kVmWmmmmmmm m mzm{mmmm mmJmKmld5e5f5g5mWPXPnz zzz|z}z z zzzzz~zzzzzzoj[k['[h[i[&[pLMJKFGNOHIPQRSDEq U U U UU UrbcsLtMtPtQt*t+tFtGtDtEt&t't0t1t4tRtStJtKt(t)tHtIt.t/tNtOt,t-tt->.>uAsBsCsDsvzn{nnnnnn nVnWnJnKnnnnn n nnwJ{K{4{R{S{.{/{D{E{0{1{L{M{F{G{,{-{&{'{H{I{*{+{({){N{O{P{Q{xh i j k q o n p l m yp!ppp pgpzPBQBTBRBSB{yy|}xzyzqzrzvzwzuztzzzsz~}}|}}} } }}}}}~}}}}} }}}E,F,G,H,I J K,L,M N O P Q R ? @ S T U,V,W X Y Z [ \ yz{rr%r&r#$ 'r(r!"UVSTKbLbQbRbGHIJMbNbWXEF7b8b[\YbZbOP&'(ooo o oooVoWooozo{oJoKoooo oh\i\l\m\8\9\n\o\j\k\]J^J_J%I%I"I#I$Iccccccc ccccc~cc|c}c o^p^m^n^k^l^ :;89jk(<=hi RRWRXR n m [ \ o Y Z ] ^ l ` a  'H(H)H*H,H&H%H+Hp ppppp p ppppVpWpJpKpppzp{pWRXRw5x5{5|5z5y5qopijkhlmnu{t{q{r{v{w{s{x{y{z{y*s* * *9*8*v*w***t*u*"*!** *r*7* x* *Y}Z}+I*I%I&I)I'I(I,IGEHE'E(EwexeZssR S PtQtzq{qqq q qqqqq qJqKqqqqqVqWq`agqq!q qqq{{|{}{{{{{~{{{{ { {{ {{{dddd d~ddddddddd|d}d-?.? ~~~~~~~~~ ~ ~|~}~~~~~ ~~!m<2@72Q4l;ERm=EPmQm8E}LEMENEOmKlCmAm@mBE?lDl63HmImJmGmFmEl;NOPSTUABCDEFHIJKLMRWXZ[\]_ABCDEFHIJKLMR_WX  0lBBbugfixImportant: qatzip bug fix and enhancement updateyhttps://access.redhat.com/errata/RHBA-2022:8256RHBA-2022:8256RHBA-2022:8256 https://access.redhat.com/security/cve/CVE-2022-36369CVE-2022-36369CVE-2022-36369https://bugzilla.redhat.com/21707842170784https://errata.almalinux.org/9/ALBA-2022-8256.htmlALBA-2022:8256ALBA-2022:8256 x6qatzip-libs-1.0.9-1.el9.x86_64.rpmw6qatzip-1.0.9-1.el9.x86_64.rpmx6qatzip-libs-1.0.9-1.el9.x86_64.rpmw6qatzip-1.0.9-1.el9.x86_64.rpm| ;qBBBBBBBBbugfixModerate: open-vm-tools bug fix and enhancement updateyyhttps://access.redhat.com/errata/RHBA-2025:20841RHBA-2025:20841RHBA-2025:20841 https://errata.almalinux.org/9/ALBA-2025-20841.htmlALBA-2025:20841ALBA-2025:20841 https://www.redhat.com/security/data/cve/CVE-2025-22247.htmlCVE-2025-22247CVE-2025-22247iUopen-vm-tools-13.0.0-1.el9_7.1.x86_64.rpmlUopen-vm-tools-test-13.0.0-1.el9_7.1.x86_64.rpmjUopen-vm-tools-desktop-13.0.0-1.el9_7.1.x86_64.rpm+Uopen-vm-tools-salt-minion-13.0.0-1.el9_7.1.x86_64.rpmkUopen-vm-tools-sdmp-13.0.0-1.el9_7.1.x86_64.rpmiUopen-vm-tools-13.0.0-1.el9_7.1.x86_64.rpmlUopen-vm-tools-test-13.0.0-1.el9_7.1.x86_64.rpmjUopen-vm-tools-desktop-13.0.0-1.el9_7.1.x86_64.rpm+Uopen-vm-tools-salt-minion-13.0.0-1.el9_7.1.x86_64.rpmkUopen-vm-tools-sdmp-13.0.0-1.el9_7.1.x86_64.rpm |BBBsecurityImportant: xz security update2rhttps://access.redhat.com/errata/RHSA-2022:4940RHSA-2022:4940RHSA-2022:4940 https://access.redhat.com/security/cve/CVE-2022-1271CVE-2022-1271CVE-2022-1271https://bugzilla.redhat.com/20733102073310https://errata.almalinux.org/9/ALSA-2022-4940.htmlALSA-2022:4940ALSA-2022:4940 NNxz-devel-5.2.5-8.el9_0.i686.rpm0Nxz-lzma-compat-5.2.5-8.el9_0.x86_64.rpmNNxz-devel-5.2.5-8.el9_0.x86_64.rpmNNxz-devel-5.2.5-8.el9_0.i686.rpm0Nxz-lzma-compat-5.2.5-8.el9_0.x86_64.rpmNNxz-devel-5.2.5-8.el9_0.x86_64.rpm$ BBBBBBBBsecurityModerate: vim security update2Thttps://access.redhat.com/errata/RHSA-2022:5242RHSA-2022:5242RHSA-2022:5242 https://access.redhat.com/security/cve/CVE-2022-0554CVE-2022-0554CVE-2022-0554https://access.redhat.com/security/cve/CVE-2022-0943CVE-2022-0943CVE-2022-0943https://access.redhat.com/security/cve/CVE-2022-1154CVE-2022-1154CVE-2022-1154https://access.redhat.com/security/cve/CVE-2022-1420CVE-2022-1420CVE-2022-1420https://access.redhat.com/security/cve/CVE-2022-1621CVE-2022-1621CVE-2022-1621https://access.redhat.com/security/cve/CVE-2022-1629CVE-2022-1629CVE-2022-1629https://bugzilla.redhat.com/20584832058483https://bugzilla.redhat.com/20640642064064https://bugzilla.redhat.com/20730132073013https://bugzilla.redhat.com/20777342077734https://bugzilla.redhat.com/20839242083924https://bugzilla.redhat.com/20839312083931https://errata.almalinux.org/9/ALSA-2022-5242.htmlALSA-2022:5242ALSA-2022:5242 f~vim-X11-8.2.2637-16.el9_0.2.x86_64.rpmg~vim-common-8.2.2637-16.el9_0.2.x86_64.rpmh~vim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpma~vim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm`~vim-filesystem-8.2.2637-16.el9_0.2.noarch.rpmf~vim-X11-8.2.2637-16.el9_0.2.x86_64.rpmg~vim-common-8.2.2637-16.el9_0.2.x86_64.rpmh~vim-enhanced-8.2.2637-16.el9_0.2.x86_64.rpma~vim-minimal-8.2.2637-16.el9_0.2.x86_64.rpm`~vim-filesystem-8.2.2637-16.el9_0.2.noarch.rpmT LBBBsecurityModerate: expat security update2[xhttps://access.redhat.com/errata/RHSA-2022:5244RHSA-2022:5244RHSA-2022:5244 https://access.redhat.com/security/cve/CVE-2022-25313CVE-2022-25313CVE-2022-25313https://access.redhat.com/security/cve/CVE-2022-25314CVE-2022-25314CVE-2022-25314https://bugzilla.redhat.com/20563502056350https://bugzilla.redhat.com/20563542056354https://errata.almalinux.org/9/ALSA-2022-5244.htmlALSA-2022:5244ALSA-2022:5244 2expat-devel-2.2.10-12.el9_0.2.x86_64.rpm2expat-devel-2.2.10-12.el9_0.2.i686.rpmD2expat-2.2.10-12.el9_0.2.x86_64.rpm2expat-devel-2.2.10-12.el9_0.2.x86_64.rpm2expat-devel-2.2.10-12.el9_0.2.i686.rpmD2expat-2.2.10-12.el9_0.2.x86_64.rpm: https://access.redhat.com/errata/RHSA-2022:5263RHSA-2022:5263RHSA-2022:5263 https://access.redhat.com/security/cve/CVE-2022-26353CVE-2022-26353CVE-2022-26353https://access.redhat.com/security/cve/CVE-2022-26354CVE-2022-26354CVE-2022-26354https://bugzilla.redhat.com/20631972063197https://bugzilla.redhat.com/20632572063257https://errata.almalinux.org/9/ALSA-2022-5263.htmlALSA-2022:5263ALSA-2022:5263 Wqemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3.x86_64.rpm Wqemu-kvm-6.2.0-11.el9_0.3.x86_64.rpmWqemu-pr-helper-6.2.0-11.el9_0.3.x86_64.rpmUWqemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3.x86_64.rpm Wqemu-guest-agent-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-device-usb-host-6.2.0-11.el9_0.3.x86_64.rpmTWqemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-tools-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-audio-pa-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-common-6.2.0-11.el9_0.3.x86_64.rpm Wqemu-img-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3.x86_64.rpmSWqemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-block-rbd-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-ui-opengl-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-docs-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-block-curl-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-core-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-device-display-virtio-vga-6.2.0-11.el9_0.3.x86_64.rpm Wqemu-kvm-6.2.0-11.el9_0.3.x86_64.rpmWqemu-pr-helper-6.2.0-11.el9_0.3.x86_64.rpmUWqemu-kvm-device-display-virtio-vga-gl-6.2.0-11.el9_0.3.x86_64.rpm Wqemu-guest-agent-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-device-usb-host-6.2.0-11.el9_0.3.x86_64.rpmTWqemu-kvm-device-display-virtio-gpu-pci-gl-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-device-display-virtio-gpu-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-tools-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-audio-pa-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-device-display-virtio-gpu-pci-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-common-6.2.0-11.el9_0.3.x86_64.rpm Wqemu-img-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-device-usb-redirect-6.2.0-11.el9_0.3.x86_64.rpmSWqemu-kvm-device-display-virtio-gpu-gl-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-block-rbd-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-ui-opengl-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-docs-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-ui-egl-headless-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-block-curl-6.2.0-11.el9_0.3.x86_64.rpmWqemu-kvm-core-6.2.0-11.el9_0.3.x86_64.rpm$ 9wsecurityImportant: thunderbird security update21ehttps://access.redhat.com/errata/RHSA-2022:5482RHSA-2022:5482 https://access.redhat.com/security/cve/CVE-2022-2200CVE-2022-2200https://access.redhat.com/security/cve/CVE-2022-2226CVE-2022-2226https://access.redhat.com/security/cve/CVE-2022-31744CVE-2022-31744https://access.redhat.com/security/cve/CVE-2022-34468CVE-2022-34468https://access.redhat.com/security/cve/CVE-2022-34470CVE-2022-34470https://access.redhat.com/security/cve/CVE-2022-34472CVE-2022-34472https://access.redhat.com/security/cve/CVE-2022-34479CVE-2022-34479https://access.redhat.com/security/cve/CVE-2022-34481CVE-2022-34481https://access.redhat.com/security/cve/CVE-2022-34484CVE-2022-34484https://bugzilla.redhat.com/21021612102161https://bugzilla.redhat.com/21021622102162https://bugzilla.redhat.com/21021632102163https://bugzilla.redhat.com/21021642102164https://bugzilla.redhat.com/21021652102165https://bugzilla.redhat.com/21021662102166https://bugzilla.redhat.com/21021682102168https://bugzilla.redhat.com/21021692102169https://bugzilla.redhat.com/21022042102204https://errata.almalinux.org/9/ALSA-2022-5482.htmlALSA-2022:5482ALSA-2022:5482 9thunderbird-91.11.0-2.el9_0.alma.x86_64.rpm9thunderbird-91.11.0-2.el9_0.alma.x86_64.rpmY PBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security, bug fix, and enhancement update2ee https://access.redhat.com/errata/RHSA-2022:5736RHSA-2022:5736RHSA-2022:5736 https://access.redhat.com/security/cve/CVE-2022-21540CVE-2022-21540CVE-2022-21540https://access.redhat.com/security/cve/CVE-2022-21541CVE-2022-21541CVE-2022-21541https://access.redhat.com/security/cve/CVE-2022-21549CVE-2022-21549CVE-2022-21549https://access.redhat.com/security/cve/CVE-2022-34169CVE-2022-34169CVE-2022-34169https://bugzilla.redhat.com/21085402108540https://bugzilla.redhat.com/21085432108543https://bugzilla.redhat.com/21085472108547https://bugzilla.redhat.com/21085542108554https://errata.almalinux.org/9/ALSA-2022-5736.htmlALSA-2022:5736ALSA-2022:5736  Qjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm-Qjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm/Qjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm0Qjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Qjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm(Qjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpm Qjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Qjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm+Qjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm*Qjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm.Qjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm)Qjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm,Qjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Qjava-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm-Qjava-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm/Qjava-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm0Qjava-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Qjava-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm(Qjava-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpm Qjava-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm Qjava-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm+Qjava-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm*Qjava-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm.Qjava-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm)Qjava-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm,Qjava-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpmQjava-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm! securityImportant: firefox security update2Jfhttps://access.redhat.com/errata/RHSA-2022:5767RHSA-2022:5767 https://access.redhat.com/security/cve/CVE-2022-2505CVE-2022-2505https://access.redhat.com/security/cve/CVE-2022-36318CVE-2022-36318https://access.redhat.com/security/cve/CVE-2022-36319CVE-2022-36319https://bugzilla.redhat.com/21119072111907https://bugzilla.redhat.com/21119082111908https://bugzilla.redhat.com/21119102111910https://errata.almalinux.org/9/ALSA-2022-5767.htmlALSA-2022:5767ALSA-2022:5767 7firefox-91.12.0-2.el9_0.alma.x86_64.rpm7firefox-91.12.0-2.el9_0.alma.x86_64.rpmy" BBBBBBBBBsecurityImportant: go-toolset and golang security and bug fix update20https://access.redhat.com/errata/RHSA-2022:5799RHSA-2022:5799 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-1962CVE-2022-1962https://access.redhat.com/security/cve/CVE-2022-28131CVE-2022-28131https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30633CVE-2022-30633https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073762107376https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://bugzilla.redhat.com/21073902107390https://bugzilla.redhat.com/21073922107392https://errata.almalinux.org/9/ALSA-2022-5799.htmlALSA-2022:5799ALSA-2022:5799 n golang-src-1.17.12-1.el9_0.noarch.rpm8 golang-race-1.17.12-1.el9_0.x86_64.rpmo golang-tests-1.17.12-1.el9_0.noarch.rpmm golang-misc-1.17.12-1.el9_0.noarch.rpml golang-docs-1.17.12-1.el9_0.noarch.rpmA golang-bin-1.17.12-1.el9_0.x86_64.rpm@ golang-1.17.12-1.el9_0.x86_64.rpmn golang-src-1.17.12-1.el9_0.noarch.rpm8 golang-race-1.17.12-1.el9_0.x86_64.rpmo golang-tests-1.17.12-1.el9_0.noarch.rpmm golang-misc-1.17.12-1.el9_0.noarch.rpml golang-docs-1.17.12-1.el9_0.noarch.rpmA golang-bin-1.17.12-1.el9_0.x86_64.rpm@ golang-1.17.12-1.el9_0.x86_64.rpmo# ?MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php security update2Bhttps://access.redhat.com/errata/RHSA-2022:5904RHSA-2022:5904 https://access.redhat.com/security/cve/CVE-2022-31626CVE-2022-31626https://bugzilla.redhat.com/20985232098523https://errata.almalinux.org/9/ALSA-2022-5904.htmlALSA-2022:5904ALSA-2022:5904 {=php-opcache-8.0.13-2.el9_0.x86_64.rpmy=php-mysqlnd-8.0.13-2.el9_0.x86_64.rpms=php-fpm-8.0.13-2.el9_0.x86_64.rpm}=php-pgsql-8.0.13-2.el9_0.x86_64.rpmo=php-devel-8.0.13-2.el9_0.x86_64.rpmn=php-dbg-8.0.13-2.el9_0.x86_64.rpmw=php-ldap-8.0.13-2.el9_0.x86_64.rpm=php-8.0.13-2.el9_0.x86_64.rpmt=php-gd-8.0.13-2.el9_0.x86_64.rpmj=php-bcmath-8.0.13-2.el9_0.x86_64.rpmm=php-dba-8.0.13-2.el9_0.x86_64.rpmu=php-gmp-8.0.13-2.el9_0.x86_64.rpm=php-xml-8.0.13-2.el9_0.x86_64.rpm|=php-pdo-8.0.13-2.el9_0.x86_64.rpmk=php-cli-8.0.13-2.el9_0.x86_64.rpmx=php-mbstring-8.0.13-2.el9_0.x86_64.rpmp=php-embedded-8.0.13-2.el9_0.x86_64.rpmr=php-ffi-8.0.13-2.el9_0.x86_64.rpmv=php-intl-8.0.13-2.el9_0.x86_64.rpm=php-snmp-8.0.13-2.el9_0.x86_64.rpm~=php-process-8.0.13-2.el9_0.x86_64.rpml=php-common-8.0.13-2.el9_0.x86_64.rpmq=php-enchant-8.0.13-2.el9_0.x86_64.rpmz=php-odbc-8.0.13-2.el9_0.x86_64.rpm=php-soap-8.0.13-2.el9_0.x86_64.rpm{=php-opcache-8.0.13-2.el9_0.x86_64.rpmy=php-mysqlnd-8.0.13-2.el9_0.x86_64.rpms=php-fpm-8.0.13-2.el9_0.x86_64.rpm}=php-pgsql-8.0.13-2.el9_0.x86_64.rpmo=php-devel-8.0.13-2.el9_0.x86_64.rpmn=php-dbg-8.0.13-2.el9_0.x86_64.rpmw=php-ldap-8.0.13-2.el9_0.x86_64.rpm=php-8.0.13-2.el9_0.x86_64.rpmt=php-gd-8.0.13-2.el9_0.x86_64.rpmj=php-bcmath-8.0.13-2.el9_0.x86_64.rpmm=php-dba-8.0.13-2.el9_0.x86_64.rpmu=php-gmp-8.0.13-2.el9_0.x86_64.rpm=php-xml-8.0.13-2.el9_0.x86_64.rpm|=php-pdo-8.0.13-2.el9_0.x86_64.rpmk=php-cli-8.0.13-2.el9_0.x86_64.rpmx=php-mbstring-8.0.13-2.el9_0.x86_64.rpmp=php-embedded-8.0.13-2.el9_0.x86_64.rpmr=php-ffi-8.0.13-2.el9_0.x86_64.rpmv=php-intl-8.0.13-2.el9_0.x86_64.rpm=php-snmp-8.0.13-2.el9_0.x86_64.rpm~=php-process-8.0.13-2.el9_0.x86_64.rpml=php-common-8.0.13-2.el9_0.x86_64.rpmq=php-enchant-8.0.13-2.el9_0.x86_64.rpmz=php-odbc-8.0.13-2.el9_0.x86_64.rpm=php-soap-8.0.13-2.el9_0.x86_64.rpm2$ @BBBBBBBsecurityModerate: vim security update2DRhttps://access.redhat.com/errata/RHSA-2022:5942RHSA-2022:5942RHSA-2022:5942 https://access.redhat.com/security/cve/CVE-2022-1785CVE-2022-1785CVE-2022-1785https://access.redhat.com/security/cve/CVE-2022-1897CVE-2022-1897CVE-2022-1897https://access.redhat.com/security/cve/CVE-2022-1927CVE-2022-1927CVE-2022-1927https://bugzilla.redhat.com/20886892088689https://bugzilla.redhat.com/20916822091682https://bugzilla.redhat.com/20916872091687https://errata.almalinux.org/9/ALSA-2022-5942.htmlALSA-2022:5942ALSA-2022:5942 gvim-common-8.2.2637-16.el9_0.3.x86_64.rpmhvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpmavim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm`vim-filesystem-8.2.2637-16.el9_0.3.noarch.rpmfvim-X11-8.2.2637-16.el9_0.3.x86_64.rpmgvim-common-8.2.2637-16.el9_0.3.x86_64.rpmhvim-enhanced-8.2.2637-16.el9_0.3.x86_64.rpmavim-minimal-8.2.2637-16.el9_0.3.x86_64.rpm`vim-filesystem-8.2.2637-16.el9_0.3.noarch.rpmfvim-X11-8.2.2637-16.el9_0.3.x86_64.rpmR% &JBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera, mariadb, and mysql-selinux security, bug fix, and enhancement update2iJhttps://access.redhat.com/errata/RHSA-2022:5948RHSA-2022:5948RHSA-2022:5948 https://access.redhat.com/security/cve/CVE-2021-46659CVE-2021-46659CVE-2021-46659https://access.redhat.com/security/cve/CVE-2021-46661CVE-2021-46661CVE-2021-46661https://access.redhat.com/security/cve/CVE-2021-46663CVE-2021-46663CVE-2021-46663https://access.redhat.com/security/cve/CVE-2021-46664CVE-2021-46664CVE-2021-46664https://access.redhat.com/security/cve/CVE-2021-46665CVE-2021-46665CVE-2021-46665https://access.redhat.com/security/cve/CVE-2021-46668CVE-2021-46668CVE-2021-46668https://access.redhat.com/security/cve/CVE-2021-46669CVE-2021-46669CVE-2021-46669https://access.redhat.com/security/cve/CVE-2022-24048CVE-2022-24048CVE-2022-24048https://access.redhat.com/security/cve/CVE-2022-24050CVE-2022-24050CVE-2022-24050https://access.redhat.com/security/cve/CVE-2022-24051CVE-2022-24051CVE-2022-24051https://access.redhat.com/security/cve/CVE-2022-24052CVE-2022-24052CVE-2022-24052https://access.redhat.com/security/cve/CVE-2022-27376CVE-2022-27376CVE-2022-27376https://access.redhat.com/security/cve/CVE-2022-27377CVE-2022-27377CVE-2022-27377https://access.redhat.com/security/cve/CVE-2022-27378CVE-2022-27378CVE-2022-27378https://access.redhat.com/security/cve/CVE-2022-27379CVE-2022-27379CVE-2022-27379https://access.redhat.com/security/cve/CVE-2022-27380CVE-2022-27380CVE-2022-27380https://access.redhat.com/security/cve/CVE-2022-27381CVE-2022-27381CVE-2022-27381https://access.redhat.com/security/cve/CVE-2022-27382CVE-2022-27382CVE-2022-27382https://access.redhat.com/security/cve/CVE-2022-27383CVE-2022-27383CVE-2022-27383https://access.redhat.com/security/cve/CVE-2022-27384CVE-2022-27384CVE-2022-27384https://access.redhat.com/security/cve/CVE-2022-27386CVE-2022-27386CVE-2022-27386https://access.redhat.com/security/cve/CVE-2022-27387CVE-2022-27387CVE-2022-27387https://access.redhat.com/security/cve/CVE-2022-27444CVE-2022-27444CVE-2022-27444https://access.redhat.com/security/cve/CVE-2022-27445CVE-2022-27445CVE-2022-27445https://access.redhat.com/security/cve/CVE-2022-27446CVE-2022-27446CVE-2022-27446https://access.redhat.com/security/cve/CVE-2022-27447CVE-2022-27447CVE-2022-27447https://access.redhat.com/security/cve/CVE-2022-27448CVE-2022-27448CVE-2022-27448https://access.redhat.com/security/cve/CVE-2022-27449CVE-2022-27449CVE-2022-27449https://access.redhat.com/security/cve/CVE-2022-27451CVE-2022-27451CVE-2022-27451https://access.redhat.com/security/cve/CVE-2022-27452CVE-2022-27452CVE-2022-27452https://access.redhat.com/security/cve/CVE-2022-27455CVE-2022-27455CVE-2022-27455https://access.redhat.com/security/cve/CVE-2022-27456CVE-2022-27456CVE-2022-27456https://access.redhat.com/security/cve/CVE-2022-27457CVE-2022-27457CVE-2022-27457https://access.redhat.com/security/cve/CVE-2022-27458CVE-2022-27458CVE-2022-27458https://access.redhat.com/security/cve/CVE-2022-31622CVE-2022-31622CVE-2022-31622https://access.redhat.com/security/cve/CVE-2022-31623CVE-2022-31623CVE-2022-31623https://bugzilla.redhat.com/20493022049302https://bugzilla.redhat.com/20500172050017https://bugzilla.redhat.com/20500222050022https://bugzilla.redhat.com/20500242050024https://bugzilla.redhat.com/20500262050026https://bugzilla.redhat.com/20500322050032https://bugzilla.redhat.com/20500342050034https://bugzilla.redhat.com/20682112068211https://bugzilla.redhat.com/20682332068233https://bugzilla.redhat.com/20682342068234https://bugzilla.redhat.com/20698332069833https://bugzilla.redhat.com/20748172074817https://bugzilla.redhat.com/20749472074947https://bugzilla.redhat.com/20749492074949https://bugzilla.redhat.com/20749512074951https://bugzilla.redhat.com/20749662074966https://bugzilla.redhat.com/20749812074981https://bugzilla.redhat.com/20749872074987https://bugzilla.redhat.com/20749962074996https://bugzilla.redhat.com/20749992074999https://bugzilla.redhat.com/20750052075005https://bugzilla.redhat.com/20750062075006https://bugzilla.redhat.com/20756912075691https://bugzilla.redhat.com/20756922075692https://bugzilla.redhat.com/20756932075693https://bugzilla.redhat.com/20756942075694https://bugzilla.redhat.com/20756952075695https://bugzilla.redhat.com/20756962075696https://bugzilla.redhat.com/20756972075697https://bugzilla.redhat.com/20756992075699https://bugzilla.redhat.com/20757002075700https://bugzilla.redhat.com/20757012075701https://bugzilla.redhat.com/20761442076144https://bugzilla.redhat.com/20761452076145https://bugzilla.redhat.com/20923542092354https://bugzilla.redhat.com/20923602092360https://errata.almalinux.org/9/ALSA-2022-5948.htmlALSA-2022:5948ALSA-2022:5948 d mariadb-pam-10.5.16-2.el9_0.x86_64.rpmf mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm^ mariadb-backup-10.5.16-2.el9_0.x86_64.rpmg mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpme mariadb-10.5.16-2.el9_0.x86_64.rpmb mariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpmc mariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm` mariadb-embedded-10.5.16-2.el9_0.x86_64.rpma mariadb-errmsg-10.5.16-2.el9_0.x86_64.rpmQ mariadb-test-10.5.16-2.el9_0.x86_64.rpmO mariadb-devel-10.5.16-2.el9_0.x86_64.rpm_ mariadb-common-10.5.16-2.el9_0.x86_64.rpmP mariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpme mariadb-server-10.5.16-2.el9_0.x86_64.rpmd mariadb-pam-10.5.16-2.el9_0.x86_64.rpmf mariadb-server-galera-10.5.16-2.el9_0.x86_64.rpm^ mariadb-backup-10.5.16-2.el9_0.x86_64.rpmg mariadb-server-utils-10.5.16-2.el9_0.x86_64.rpme mariadb-10.5.16-2.el9_0.x86_64.rpmb mariadb-gssapi-server-10.5.16-2.el9_0.x86_64.rpmc mariadb-oqgraph-engine-10.5.16-2.el9_0.x86_64.rpm` mariadb-embedded-10.5.16-2.el9_0.x86_64.rpma mariadb-errmsg-10.5.16-2.el9_0.x86_64.rpmQ mariadb-test-10.5.16-2.el9_0.x86_64.rpmO mariadb-devel-10.5.16-2.el9_0.x86_64.rpm_ mariadb-common-10.5.16-2.el9_0.x86_64.rpmP mariadb-embedded-devel-10.5.16-2.el9_0.x86_64.rpme mariadb-server-10.5.16-2.el9_0.x86_64.rpmͬt& gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update2qhttps://access.redhat.com/errata/RHSA-2022:6003RHSA-2022:6003RHSA-2022:6003 https://access.redhat.com/security/cve/CVE-2022-0494CVE-2022-0494CVE-2022-0494https://access.redhat.com/security/cve/CVE-2022-1055CVE-2022-1055CVE-2022-1055https://bugzilla.redhat.com/20394482039448https://bugzilla.redhat.com/20702202070220https://errata.almalinux.org/9/ALSA-2022-6003.htmlALSA-2022:6003ALSA-2022:6003 4Vkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm1Vkernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmVkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm(Vkernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm2Vkernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm,Vkernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm%Vperf-5.14.0-70.22.1.el9_0.x86_64.rpm*Vkernel-5.14.0-70.22.1.el9_0.x86_64.rpm.Vkernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm"Vkernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm-Vkernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm6Vkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm3Vkernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm+Vkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm$Vkernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm Vbpftool-5.14.0-70.22.1.el9_0.x86_64.rpm0Vkernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm#Vkernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm5Vkernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpmMVpython3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm!Vkernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/Vkernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpm4Vkernel-tools-5.14.0-70.22.1.el9_0.x86_64.rpm1Vkernel-debug-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpmVkernel-doc-5.14.0-70.22.1.el9_0.noarch.rpm(Vkernel-headers-5.14.0-70.22.1.el9_0.x86_64.rpm2Vkernel-modules-5.14.0-70.22.1.el9_0.x86_64.rpm,Vkernel-core-5.14.0-70.22.1.el9_0.x86_64.rpm%Vperf-5.14.0-70.22.1.el9_0.x86_64.rpm*Vkernel-5.14.0-70.22.1.el9_0.x86_64.rpm.Vkernel-debug-5.14.0-70.22.1.el9_0.x86_64.rpm"Vkernel-debug-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm-Vkernel-cross-headers-5.14.0-70.22.1.el9_0.x86_64.rpm6Vkernel-tools-libs-devel-5.14.0-70.22.1.el9_0.x86_64.rpm3Vkernel-modules-extra-5.14.0-70.22.1.el9_0.x86_64.rpm+Vkernel-abi-stablelists-5.14.0-70.22.1.el9_0.noarch.rpm$Vkernel-devel-matched-5.14.0-70.22.1.el9_0.x86_64.rpm Vbpftool-5.14.0-70.22.1.el9_0.x86_64.rpm0Vkernel-debug-modules-5.14.0-70.22.1.el9_0.x86_64.rpm#Vkernel-devel-5.14.0-70.22.1.el9_0.x86_64.rpm5Vkernel-tools-libs-5.14.0-70.22.1.el9_0.x86_64.rpmMVpython3-perf-5.14.0-70.22.1.el9_0.x86_64.rpm!Vkernel-debug-devel-5.14.0-70.22.1.el9_0.x86_64.rpm/Vkernel-debug-core-5.14.0-70.22.1.el9_0.x86_64.rpmл' (RBBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security, bug fix, and enhancement update2pJhttps://access.redhat.com/errata/RHSA-2022:6043RHSA-2022:6043RHSA-2022:6043 https://access.redhat.com/security/cve/CVE-2022-34716CVE-2022-34716CVE-2022-34716https://bugzilla.redhat.com/21151832115183https://errata.almalinux.org/9/ALSA-2022-6043.htmlALSA-2022:6043ALSA-2022:6043 !,aspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm?3dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm&,dotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm#,dotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm$,dotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm 3netstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm ,aspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm'3dotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm%3dotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm,dotnet-host-6.0.8-1.el9_0.x86_64.rpm",dotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpm !,aspnetcore-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm?3dotnet-sdk-6.0-source-built-artifacts-6.0.108-1.el9_0.x86_64.rpm&,dotnet-targeting-pack-6.0-6.0.8-1.el9_0.x86_64.rpm#,dotnet-hostfxr-6.0-6.0.8-1.el9_0.x86_64.rpm$,dotnet-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm 3netstandard-targeting-pack-2.1-6.0.108-1.el9_0.x86_64.rpm ,aspnetcore-runtime-6.0-6.0.8-1.el9_0.x86_64.rpm'3dotnet-templates-6.0-6.0.108-1.el9_0.x86_64.rpm%3dotnet-sdk-6.0-6.0.108-1.el9_0.x86_64.rpm,dotnet-host-6.0.8-1.el9_0.x86_64.rpm",dotnet-apphost-pack-6.0-6.0.8-1.el9_0.x86_64.rpmк2( 4iBBBBBBBBBsecurityModerate: curl security update2:https://access.redhat.com/errata/RHSA-2022:6157RHSA-2022:6157RHSA-2022:6157 https://access.redhat.com/security/cve/CVE-2022-32206CVE-2022-32206CVE-2022-32206https://access.redhat.com/security/cve/CVE-2022-32207CVE-2022-32207CVE-2022-32207https://access.redhat.com/security/cve/CVE-2022-32208CVE-2022-32208CVE-2022-32208https://bugzilla.redhat.com/20993002099300https://bugzilla.redhat.com/20993052099305https://bugzilla.redhat.com/20993062099306https://errata.almalinux.org/9/ALSA-2022-6157.htmlALSA-2022:6157ALSA-2022:6157  elibcurl-devel-7.76.1-14.el9_0.5.i686.rpm'elibcurl-7.76.1-14.el9_0.5.x86_64.rpm(elibcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm elibcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm7ecurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm6ecurl-7.76.1-14.el9_0.5.x86_64.rpm elibcurl-devel-7.76.1-14.el9_0.5.i686.rpm'elibcurl-7.76.1-14.el9_0.5.x86_64.rpm(elibcurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm elibcurl-devel-7.76.1-14.el9_0.5.x86_64.rpm7ecurl-minimal-7.76.1-14.el9_0.5.x86_64.rpm6ecurl-7.76.1-14.el9_0.5.x86_64.rpm) 7usecurityImportant: thunderbird security update2S https://access.redhat.com/errata/RHSA-2022:6165RHSA-2022:6165RHSA-2022:6165 https://access.redhat.com/security/cve/CVE-2022-38472CVE-2022-38472CVE-2022-38472https://access.redhat.com/security/cve/CVE-2022-38473CVE-2022-38473CVE-2022-38473https://access.redhat.com/security/cve/CVE-2022-38476CVE-2022-38476CVE-2022-38476https://access.redhat.com/security/cve/CVE-2022-38477CVE-2022-38477CVE-2022-38477https://access.redhat.com/security/cve/CVE-2022-38478CVE-2022-38478CVE-2022-38478https://bugzilla.redhat.com/21206732120673https://bugzilla.redhat.com/21206742120674https://bugzilla.redhat.com/21206782120678https://bugzilla.redhat.com/21206952120695https://bugzilla.redhat.com/21206962120696https://errata.almalinux.org/9/ALSA-2022-6165.htmlALSA-2022:6165ALSA-2022:6165 9:thunderbird-91.13.0-1.el9_0.alma.x86_64.rpm9:thunderbird-91.13.0-1.el9_0.alma.x86_64.rpm* :xsecurityImportant: firefox security update2a? https://access.redhat.com/errata/RHSA-2022:6174RHSA-2022:6174RHSA-2022:6174 https://access.redhat.com/security/cve/CVE-2022-38472CVE-2022-38472CVE-2022-38472https://access.redhat.com/security/cve/CVE-2022-38473CVE-2022-38473CVE-2022-38473https://access.redhat.com/security/cve/CVE-2022-38476CVE-2022-38476CVE-2022-38476https://access.redhat.com/security/cve/CVE-2022-38477CVE-2022-38477CVE-2022-38477https://access.redhat.com/security/cve/CVE-2022-38478CVE-2022-38478CVE-2022-38478https://bugzilla.redhat.com/21206732120673https://bugzilla.redhat.com/21206742120674https://bugzilla.redhat.com/21206782120678https://bugzilla.redhat.com/21206952120695https://bugzilla.redhat.com/21206962120696https://errata.almalinux.org/9/ALSA-2022-6174.htmlALSA-2022:6174ALSA-2022:6174 7:firefox-91.13.0-1.el9_0.alma.x86_64.rpm7:firefox-91.13.0-1.el9_0.alma.x86_64.rpm++ {BBBBBBBsecurityModerate: openssl security and bug fix update2 / https://access.redhat.com/errata/RHSA-2022:6224RHSA-2022:6224RHSA-2022:6224 https://access.redhat.com/security/cve/CVE-2022-1292CVE-2022-1292CVE-2022-1292https://access.redhat.com/security/cve/CVE-2022-1343CVE-2022-1343CVE-2022-1343https://access.redhat.com/security/cve/CVE-2022-1473CVE-2022-1473CVE-2022-1473https://access.redhat.com/security/cve/CVE-2022-2068CVE-2022-2068CVE-2022-2068https://access.redhat.com/security/cve/CVE-2022-2097CVE-2022-2097CVE-2022-2097https://bugzilla.redhat.com/20814942081494https://bugzilla.redhat.com/20879112087911https://bugzilla.redhat.com/20879132087913https://bugzilla.redhat.com/20973102097310https://bugzilla.redhat.com/21049052104905https://errata.almalinux.org/9/ALSA-2022-6224.htmlALSA-2022:6224ALSA-2022:6224 zopenssl-devel-3.0.1-41.el9_0.i686.rpmCzopenssl-libs-3.0.1-41.el9_0.x86_64.rpmmzopenssl-perl-3.0.1-41.el9_0.x86_64.rpmzopenssl-devel-3.0.1-41.el9_0.x86_64.rpmBzopenssl-3.0.1-41.el9_0.x86_64.rpmzopenssl-devel-3.0.1-41.el9_0.i686.rpmCzopenssl-libs-3.0.1-41.el9_0.x86_64.rpmmzopenssl-perl-3.0.1-41.el9_0.x86_64.rpmzopenssl-devel-3.0.1-41.el9_0.x86_64.rpmBzopenssl-3.0.1-41.el9_0.x86_64.rpm, EBBBBBBsecurityImportant: open-vm-tools security update2Ohttps://access.redhat.com/errata/RHSA-2022:6358RHSA-2022:6358RHSA-2022:6358 https://access.redhat.com/security/cve/CVE-2022-31676CVE-2022-31676CVE-2022-31676https://bugzilla.redhat.com/21187142118714https://errata.almalinux.org/9/ALSA-2022-6358.htmlALSA-2022:6358ALSA-2022:6358 j-open-vm-tools-desktop-11.3.5-1.el9_0.1.x86_64.rpmk-open-vm-tools-sdmp-11.3.5-1.el9_0.1.x86_64.rpml-open-vm-tools-test-11.3.5-1.el9_0.1.x86_64.rpmi-open-vm-tools-11.3.5-1.el9_0.1.x86_64.rpmj-open-vm-tools-desktop-11.3.5-1.el9_0.1.x86_64.rpmk-open-vm-tools-sdmp-11.3.5-1.el9_0.1.x86_64.rpml-open-vm-tools-test-11.3.5-1.el9_0.1.x86_64.rpmi-open-vm-tools-11.3.5-1.el9_0.1.x86_64.rpm- "NBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security and bugfix update2Vxhttps://access.redhat.com/errata/RHSA-2022:6521RHSA-2022:6521RHSA-2022:6521 https://access.redhat.com/security/cve/CVE-2022-38013CVE-2022-38013CVE-2022-38013https://bugzilla.redhat.com/21251242125124https://errata.almalinux.org/9/ALSA-2022-6521.htmlALSA-2022:6521ALSA-2022:6521 'adotnet-templates-6.0-6.0.109-1.el9_0.x86_64.rpm -aspnetcore-runtime-6.0-6.0.9-1.el9_0.x86_64.rpm#-dotnet-hostfxr-6.0-6.0.9-1.el9_0.x86_64.rpm-dotnet-host-6.0.9-1.el9_0.x86_64.rpm$-dotnet-runtime-6.0-6.0.9-1.el9_0.x86_64.rpm%adotnet-sdk-6.0-6.0.109-1.el9_0.x86_64.rpm anetstandard-targeting-pack-2.1-6.0.109-1.el9_0.x86_64.rpm&-dotnet-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm"-dotnet-apphost-pack-6.0-6.0.9-1.el9_0.x86_64.rpm!-aspnetcore-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm 'adotnet-templates-6.0-6.0.109-1.el9_0.x86_64.rpm -aspnetcore-runtime-6.0-6.0.9-1.el9_0.x86_64.rpm#-dotnet-hostfxr-6.0-6.0.9-1.el9_0.x86_64.rpm-dotnet-host-6.0.9-1.el9_0.x86_64.rpm$-dotnet-runtime-6.0-6.0.9-1.el9_0.x86_64.rpm%adotnet-sdk-6.0-6.0.109-1.el9_0.x86_64.rpm anetstandard-targeting-pack-2.1-6.0.109-1.el9_0.x86_64.rpm&-dotnet-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm"-dotnet-apphost-pack-6.0-6.0.9-1.el9_0.x86_64.rpm!-aspnetcore-targeting-pack-6.0-6.0.9-1.el9_0.x86_64.rpm%. cBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby security, bug fix, and enhancement update2NMhttps://access.redhat.com/errata/RHSA-2022:6585RHSA-2022:6585RHSA-2022:6585 https://access.redhat.com/security/cve/CVE-2022-28738CVE-2022-28738CVE-2022-28738https://access.redhat.com/security/cve/CVE-2022-28739CVE-2022-28739CVE-2022-28739https://bugzilla.redhat.com/20756852075685https://bugzilla.redhat.com/20756872075687https://errata.almalinux.org/9/ALSA-2022-6585.htmlALSA-2022:6585ALSA-2022:6585 (ruby-libs-3.0.4-160.el9_0.x86_64.rpmT8rubygem-typeprof-0.15.2-160.el9_0.noarch.rpm(ruby-devel-3.0.4-160.el9_0.x86_64.rpmVorubygems-devel-3.2.33-160.el9_0.noarch.rpmQ5rubygem-rexml-3.2.5-160.el9_0.noarch.rpm(ruby-libs-3.0.4-160.el9_0.i686.rpmR>rubygem-rss-0.2.9-160.el9_0.noarch.rpmA+rubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpm"(ruby-3.0.4-160.el9_0.i686.rpmS:rubygem-test-unit-3.3.7-160.el9_0.noarch.rpmN_rubygem-power_assert-1.2.0-160.el9_0.noarch.rpmCrubygem-json-2.5.1-160.el9_0.x86_64.rpmBrubygem-io-console-0.5.7-160.el9_0.x86_64.rpmUorubygems-3.2.33-160.el9_0.noarch.rpmorubygem-rbs-1.4.0-160.el9_0.noarch.rpmLkrubygem-irb-1.3.5-160.el9_0.noarch.rpm"(ruby-3.0.4-160.el9_0.x86_64.rpmKrubygem-bundler-2.2.33-160.el9_0.noarch.rpmD4rubygem-psych-3.3.2-160.el9_0.x86_64.rpmJ(ruby-default-gems-3.0.4-160.el9_0.noarch.rpmO{rubygem-rake-13.0.3-160.el9_0.noarch.rpmMHrubygem-minitest-5.14.2-160.el9_0.noarch.rpmPRrubygem-rdoc-6.3.3-160.el9_0.noarch.rpm(ruby-devel-3.0.4-160.el9_0.i686.rpm(ruby-libs-3.0.4-160.el9_0.x86_64.rpmT8rubygem-typeprof-0.15.2-160.el9_0.noarch.rpm(ruby-devel-3.0.4-160.el9_0.x86_64.rpmVorubygems-devel-3.2.33-160.el9_0.noarch.rpmQ5rubygem-rexml-3.2.5-160.el9_0.noarch.rpm(ruby-libs-3.0.4-160.el9_0.i686.rpmR>rubygem-rss-0.2.9-160.el9_0.noarch.rpmA+rubygem-bigdecimal-3.0.0-160.el9_0.x86_64.rpm"(ruby-3.0.4-160.el9_0.i686.rpmS:rubygem-test-unit-3.3.7-160.el9_0.noarch.rpmN_rubygem-power_assert-1.2.0-160.el9_0.noarch.rpmCrubygem-json-2.5.1-160.el9_0.x86_64.rpmBrubygem-io-console-0.5.7-160.el9_0.x86_64.rpmUorubygems-3.2.33-160.el9_0.noarch.rpmorubygem-rbs-1.4.0-160.el9_0.noarch.rpmLkrubygem-irb-1.3.5-160.el9_0.noarch.rpm"(ruby-3.0.4-160.el9_0.x86_64.rpmKrubygem-bundler-2.2.33-160.el9_0.noarch.rpmD4rubygem-psych-3.3.2-160.el9_0.x86_64.rpmJ(ruby-default-gems-3.0.4-160.el9_0.noarch.rpmO{rubygem-rake-13.0.3-160.el9_0.noarch.rpmMHrubygem-minitest-5.14.2-160.el9_0.noarch.rpmPRrubygem-rdoc-6.3.3-160.el9_0.noarch.rpm(ruby-devel-3.0.4-160.el9_0.i686.rpmR/ CBBBBBBsecurityModerate: mysql security, bug fix, and enhancement update2eZhttps://access.redhat.com/errata/RHSA-2022:6590RHSA-2022:6590RHSA-2022:6590 https://access.redhat.com/security/cve/CVE-2022-21412CVE-2022-21412CVE-2022-21412https://access.redhat.com/security/cve/CVE-2022-21413CVE-2022-21413CVE-2022-21413https://access.redhat.com/security/cve/CVE-2022-21414CVE-2022-21414CVE-2022-21414https://access.redhat.com/security/cve/CVE-2022-21415CVE-2022-21415CVE-2022-21415https://access.redhat.com/security/cve/CVE-2022-21417CVE-2022-21417CVE-2022-21417https://access.redhat.com/security/cve/CVE-2022-21418CVE-2022-21418CVE-2022-21418https://access.redhat.com/security/cve/CVE-2022-21423CVE-2022-21423CVE-2022-21423https://access.redhat.com/security/cve/CVE-2022-21425CVE-2022-21425CVE-2022-21425https://access.redhat.com/security/cve/CVE-2022-21427CVE-2022-21427CVE-2022-21427https://access.redhat.com/security/cve/CVE-2022-21435CVE-2022-21435CVE-2022-21435https://access.redhat.com/security/cve/CVE-2022-21436CVE-2022-21436CVE-2022-21436https://access.redhat.com/security/cve/CVE-2022-21437CVE-2022-21437CVE-2022-21437https://access.redhat.com/security/cve/CVE-2022-21438CVE-2022-21438CVE-2022-21438https://access.redhat.com/security/cve/CVE-2022-21440CVE-2022-21440CVE-2022-21440https://access.redhat.com/security/cve/CVE-2022-21444CVE-2022-21444CVE-2022-21444https://access.redhat.com/security/cve/CVE-2022-21451CVE-2022-21451CVE-2022-21451https://access.redhat.com/security/cve/CVE-2022-21452CVE-2022-21452CVE-2022-21452https://access.redhat.com/security/cve/CVE-2022-21454CVE-2022-21454CVE-2022-21454https://access.redhat.com/security/cve/CVE-2022-21455CVE-2022-21455CVE-2022-21455https://access.redhat.com/security/cve/CVE-2022-21457CVE-2022-21457CVE-2022-21457https://access.redhat.com/security/cve/CVE-2022-21459CVE-2022-21459CVE-2022-21459https://access.redhat.com/security/cve/CVE-2022-21460CVE-2022-21460CVE-2022-21460https://access.redhat.com/security/cve/CVE-2022-21462CVE-2022-21462CVE-2022-21462https://access.redhat.com/security/cve/CVE-2022-21478CVE-2022-21478CVE-2022-21478https://access.redhat.com/security/cve/CVE-2022-21479CVE-2022-21479CVE-2022-21479https://access.redhat.com/security/cve/CVE-2022-21509CVE-2022-21509CVE-2022-21509https://access.redhat.com/security/cve/CVE-2022-21515CVE-2022-21515CVE-2022-21515https://access.redhat.com/security/cve/CVE-2022-21517CVE-2022-21517CVE-2022-21517https://access.redhat.com/security/cve/CVE-2022-21522CVE-2022-21522CVE-2022-21522https://access.redhat.com/security/cve/CVE-2022-21525CVE-2022-21525CVE-2022-21525https://access.redhat.com/security/cve/CVE-2022-21526CVE-2022-21526CVE-2022-21526https://access.redhat.com/security/cve/CVE-2022-21527CVE-2022-21527CVE-2022-21527https://access.redhat.com/security/cve/CVE-2022-21528CVE-2022-21528CVE-2022-21528https://access.redhat.com/security/cve/CVE-2022-21529CVE-2022-21529CVE-2022-21529https://access.redhat.com/security/cve/CVE-2022-21530CVE-2022-21530CVE-2022-21530https://access.redhat.com/security/cve/CVE-2022-21531CVE-2022-21531CVE-2022-21531https://access.redhat.com/security/cve/CVE-2022-21534CVE-2022-21534CVE-2022-21534https://access.redhat.com/security/cve/CVE-2022-21537CVE-2022-21537CVE-2022-21537https://access.redhat.com/security/cve/CVE-2022-21538CVE-2022-21538CVE-2022-21538https://access.redhat.com/security/cve/CVE-2022-21539CVE-2022-21539CVE-2022-21539https://access.redhat.com/security/cve/CVE-2022-21547CVE-2022-21547CVE-2022-21547https://access.redhat.com/security/cve/CVE-2022-21553CVE-2022-21553CVE-2022-21553https://access.redhat.com/security/cve/CVE-2022-21556CVE-2022-21556CVE-2022-21556https://access.redhat.com/security/cve/CVE-2022-21569CVE-2022-21569CVE-2022-21569https://bugzilla.redhat.com/20826362082636https://bugzilla.redhat.com/20826372082637https://bugzilla.redhat.com/20826382082638https://bugzilla.redhat.com/20826392082639https://bugzilla.redhat.com/20826402082640https://bugzilla.redhat.com/20826412082641https://bugzilla.redhat.com/20826422082642https://bugzilla.redhat.com/20826432082643https://bugzilla.redhat.com/20826442082644https://bugzilla.redhat.com/20826452082645https://bugzilla.redhat.com/20826462082646https://bugzilla.redhat.com/20826472082647https://bugzilla.redhat.com/20826482082648https://bugzilla.redhat.com/20826492082649https://bugzilla.redhat.com/20826502082650https://bugzilla.redhat.com/20826512082651https://bugzilla.redhat.com/20826522082652https://bugzilla.redhat.com/20826532082653https://bugzilla.redhat.com/20826542082654https://bugzilla.redhat.com/20826552082655https://bugzilla.redhat.com/20826562082656https://bugzilla.redhat.com/20826572082657https://bugzilla.redhat.com/20826582082658https://bugzilla.redhat.com/20826592082659https://bugzilla.redhat.com/21152822115282https://bugzilla.redhat.com/21152832115283https://bugzilla.redhat.com/21152842115284https://bugzilla.redhat.com/21152852115285https://bugzilla.redhat.com/21152862115286https://bugzilla.redhat.com/21152872115287https://bugzilla.redhat.com/21152882115288https://bugzilla.redhat.com/21152892115289https://bugzilla.redhat.com/21152902115290https://bugzilla.redhat.com/21152912115291https://bugzilla.redhat.com/21152922115292https://bugzilla.redhat.com/21152932115293https://bugzilla.redhat.com/21152942115294https://bugzilla.redhat.com/21152952115295https://bugzilla.redhat.com/21152962115296https://bugzilla.redhat.com/21152972115297https://bugzilla.redhat.com/21152982115298https://bugzilla.redhat.com/21152992115299https://bugzilla.redhat.com/21153002115300https://bugzilla.redhat.com/21153012115301https://errata.almalinux.org/9/ALSA-2022-6590.htmlALSA-2022:6590ALSA-2022:6590 <:mysql-server-8.0.30-3.el9_0.x86_64.rpm9:mysql-8.0.30-3.el9_0.x86_64.rpm:mysql-errmsg-8.0.30-3.el9_0.x86_64.rpm:mysql-common-8.0.30-3.el9_0.x86_64.rpm<:mysql-server-8.0.30-3.el9_0.x86_64.rpm9:mysql-8.0.30-3.el9_0.x86_64.rpm:mysql-errmsg-8.0.30-3.el9_0.x86_64.rpm:mysql-common-8.0.30-3.el9_0.x86_64.rpmO0 LBBBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security and bug fix update21https://access.redhat.com/errata/RHSA-2022:6595RHSA-2022:6595RHSA-2022:6595 https://access.redhat.com/security/cve/CVE-2020-28469CVE-2020-28469CVE-2020-28469https://access.redhat.com/security/cve/CVE-2020-7788CVE-2020-7788CVE-2020-7788https://access.redhat.com/security/cve/CVE-2021-33502CVE-2021-33502CVE-2021-33502https://access.redhat.com/security/cve/CVE-2021-3807CVE-2021-3807CVE-2021-3807https://access.redhat.com/security/cve/CVE-2022-29244CVE-2022-29244CVE-2022-29244https://access.redhat.com/security/cve/CVE-2022-32212CVE-2022-32212CVE-2022-32212https://access.redhat.com/security/cve/CVE-2022-32213CVE-2022-32213CVE-2022-32213https://access.redhat.com/security/cve/CVE-2022-32214CVE-2022-32214CVE-2022-32214https://access.redhat.com/security/cve/CVE-2022-32215CVE-2022-32215CVE-2022-32215https://access.redhat.com/security/cve/CVE-2022-33987CVE-2022-33987CVE-2022-33987https://bugzilla.redhat.com/19074441907444https://bugzilla.redhat.com/19454591945459https://bugzilla.redhat.com/19644611964461https://bugzilla.redhat.com/20075572007557https://bugzilla.redhat.com/20985562098556https://bugzilla.redhat.com/21020012102001https://bugzilla.redhat.com/21054222105422https://bugzilla.redhat.com/21054262105426https://bugzilla.redhat.com/21054282105428https://bugzilla.redhat.com/21054302105430https://errata.almalinux.org/9/ALSA-2022-6595.htmlALSA-2022:6595ALSA-2022:6595 conpm-8.11.0-1.16.16.0.1.el9_0.x86_64.rpmk nodejs-nodemon-2.0.19-1.el9_0.noarch.rpm7nodejs-libs-16.16.0-1.el9_0.x86_64.rpm+7nodejs-16.16.0-1.el9_0.x86_64.rpmd7nodejs-full-i18n-16.16.0-1.el9_0.x86_64.rpm7nodejs-libs-16.16.0-1.el9_0.i686.rpm<7nodejs-docs-16.16.0-1.el9_0.noarch.rpmconpm-8.11.0-1.16.16.0.1.el9_0.x86_64.rpmk nodejs-nodemon-2.0.19-1.el9_0.noarch.rpm7nodejs-libs-16.16.0-1.el9_0.x86_64.rpm+7nodejs-16.16.0-1.el9_0.x86_64.rpmd7nodejs-full-i18n-16.16.0-1.el9_0.x86_64.rpm7nodejs-libs-16.16.0-1.el9_0.i686.rpm<7nodejs-docs-16.16.0-1.el9_0.noarch.rpm1 XsecurityModerate: gnupg2 security update21(https://access.redhat.com/errata/RHSA-2022:6602RHSA-2022:6602RHSA-2022:6602 https://access.redhat.com/security/cve/CVE-2022-34903CVE-2022-34903CVE-2022-34903https://bugzilla.redhat.com/21028682102868https://errata.almalinux.org/9/ALSA-2022-6602.htmlALSA-2022:6602ALSA-2022:6602  gnupg2-smime-2.3.3-2.el9_0.x86_64.rpm gnupg2-smime-2.3.3-2.el9_0.x86_64.rpm'2 &[BBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update2Y=https://access.redhat.com/errata/RHSA-2022:6610RHSA-2022:6610RHSA-2022:6610 https://access.redhat.com/security/cve/CVE-2022-2078CVE-2022-2078CVE-2022-2078https://access.redhat.com/security/cve/CVE-2022-34918CVE-2022-34918CVE-2022-34918https://bugzilla.redhat.com/20961782096178https://bugzilla.redhat.com/21044232104423https://errata.almalinux.org/9/ALSA-2022-6610.htmlALSA-2022:6610ALSA-2022:6610 "dkernel-debug-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpmdkernel-doc-5.14.0-70.26.1.el9_0.noarch.rpm#dkernel-devel-5.14.0-70.26.1.el9_0.x86_64.rpm$dkernel-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm!dkernel-debug-devel-5.14.0-70.26.1.el9_0.x86_64.rpm%dperf-5.14.0-70.26.1.el9_0.x86_64.rpm"dkernel-debug-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpmdkernel-doc-5.14.0-70.26.1.el9_0.noarch.rpm#dkernel-devel-5.14.0-70.26.1.el9_0.x86_64.rpm$dkernel-devel-matched-5.14.0-70.26.1.el9_0.x86_64.rpm!dkernel-debug-devel-5.14.0-70.26.1.el9_0.x86_64.rpm%dperf-5.14.0-70.26.1.el9_0.x86_64.rpm&3 3gBBBBBBBBBBsecurityModerate: webkit2gtk3 security update2uhttps://access.redhat.com/errata/RHSA-2022:6634RHSA-2022:6634RHSA-2022:6634 https://access.redhat.com/security/cve/CVE-2022-32893CVE-2022-32893CVE-2022-32893https://bugzilla.redhat.com/21216452121645https://errata.almalinux.org/9/ALSA-2022-6634.htmlALSA-2022:6634ALSA-2022:6634 4webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm5webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm3webkit2gtk3-2.36.7-1.el9_0.i686.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm4webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm3webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm5webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpm4webkit2gtk3-devel-2.36.7-1.el9_0.x86_64.rpm5webkit2gtk3-jsc-2.36.7-1.el9_0.i686.rpm3webkit2gtk3-2.36.7-1.el9_0.i686.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_0.i686.rpm4webkit2gtk3-devel-2.36.7-1.el9_0.i686.rpm3webkit2gtk3-2.36.7-1.el9_0.x86_64.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_0.x86_64.rpm5webkit2gtk3-jsc-2.36.7-1.el9_0.x86_64.rpmT4 6tsecurityImportant: firefox security update2 yhttps://access.redhat.com/errata/RHSA-2022:6700RHSA-2022:6700RHSA-2022:6700 https://access.redhat.com/security/cve/CVE-2022-40956CVE-2022-40956CVE-2022-40956https://access.redhat.com/security/cve/CVE-2022-40957CVE-2022-40957CVE-2022-40957https://access.redhat.com/security/cve/CVE-2022-40958CVE-2022-40958CVE-2022-40958https://access.redhat.com/security/cve/CVE-2022-40959CVE-2022-40959CVE-2022-40959https://access.redhat.com/security/cve/CVE-2022-40960CVE-2022-40960CVE-2022-40960https://access.redhat.com/security/cve/CVE-2022-40962CVE-2022-40962CVE-2022-40962https://bugzilla.redhat.com/21287922128792https://bugzilla.redhat.com/21287932128793https://bugzilla.redhat.com/21287942128794https://bugzilla.redhat.com/21287952128795https://bugzilla.redhat.com/21287962128796https://bugzilla.redhat.com/21287972128797https://errata.almalinux.org/9/ALSA-2022-6700.htmlALSA-2022:6700ALSA-2022:6700 7,firefox-102.3.0-6.el9_0.alma.x86_64.rpm7,firefox-102.3.0-6.el9_0.alma.x86_64.rpm5 9wsecurityImportant: thunderbird security update2https://access.redhat.com/errata/RHSA-2022:6717RHSA-2022:6717RHSA-2022:6717 https://access.redhat.com/security/cve/CVE-2022-3032CVE-2022-3032CVE-2022-3032https://access.redhat.com/security/cve/CVE-2022-3033CVE-2022-3033CVE-2022-3033https://access.redhat.com/security/cve/CVE-2022-3034CVE-2022-3034CVE-2022-3034https://access.redhat.com/security/cve/CVE-2022-36059CVE-2022-36059CVE-2022-36059https://access.redhat.com/security/cve/CVE-2022-40956CVE-2022-40956CVE-2022-40956https://access.redhat.com/security/cve/CVE-2022-40957CVE-2022-40957CVE-2022-40957https://access.redhat.com/security/cve/CVE-2022-40958CVE-2022-40958CVE-2022-40958https://access.redhat.com/security/cve/CVE-2022-40959CVE-2022-40959CVE-2022-40959https://access.redhat.com/security/cve/CVE-2022-40960CVE-2022-40960CVE-2022-40960https://access.redhat.com/security/cve/CVE-2022-40962CVE-2022-40962CVE-2022-40962https://bugzilla.redhat.com/21232552123255https://bugzilla.redhat.com/21232562123256https://bugzilla.redhat.com/21232572123257https://bugzilla.redhat.com/21232582123258https://bugzilla.redhat.com/21287922128792https://bugzilla.redhat.com/21287932128793https://bugzilla.redhat.com/21287942128794https://bugzilla.redhat.com/21287952128795https://bugzilla.redhat.com/21287962128796https://bugzilla.redhat.com/21287972128797https://errata.almalinux.org/9/ALSA-2022-6717.htmlALSA-2022:6717ALSA-2022:6717 9+thunderbird-102.3.0-3.el9_0.alma.x86_64.rpm9+thunderbird-102.3.0-3.el9_0.alma.x86_64.rpm16 zBBBBBBBBBBBsecurityImportant: bind security update2https://access.redhat.com/errata/RHSA-2022:6763RHSA-2022:6763RHSA-2022:6763 https://access.redhat.com/security/cve/CVE-2022-3080CVE-2022-3080CVE-2022-3080https://access.redhat.com/security/cve/CVE-2022-38177CVE-2022-38177CVE-2022-38177https://access.redhat.com/security/cve/CVE-2022-38178CVE-2022-38178CVE-2022-38178https://bugzilla.redhat.com/21286002128600https://bugzilla.redhat.com/21286012128601https://bugzilla.redhat.com/21286022128602https://errata.almalinux.org/9/ALSA-2022-6763.htmlALSA-2022:6763ALSA-2022:6763 Iqbind-utils-9.16.23-1.el9_0.1.x86_64.rpmqbind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpmFqbind-chroot-9.16.23-1.el9_0.1.x86_64.rpmHqbind-libs-9.16.23-1.el9_0.1.x86_64.rpmEqbind-9.16.23-1.el9_0.1.x86_64.rpmqpython3-bind-9.16.23-1.el9_0.1.noarch.rpmGqbind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpmqbind-license-9.16.23-1.el9_0.1.noarch.rpmIqbind-utils-9.16.23-1.el9_0.1.x86_64.rpmqbind-dnssec-doc-9.16.23-1.el9_0.1.noarch.rpmFqbind-chroot-9.16.23-1.el9_0.1.x86_64.rpmHqbind-libs-9.16.23-1.el9_0.1.x86_64.rpmEqbind-9.16.23-1.el9_0.1.x86_64.rpmqpython3-bind-9.16.23-1.el9_0.1.noarch.rpmGqbind-dnssec-utils-9.16.23-1.el9_0.1.x86_64.rpmqbind-license-9.16.23-1.el9_0.1.noarch.rpm 7 HsecurityImportant: expat security update2"Uhttps://access.redhat.com/errata/RHSA-2022:6838RHSA-2022:6838RHSA-2022:6838 https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-6838.htmlALSA-2022:6838ALSA-2022:6838 expat-devel-2.2.10-12.el9_0.3.x86_64.rpmexpat-devel-2.2.10-12.el9_0.3.x86_64.rpm8 KsecurityImportant: squid security update2w https://access.redhat.com/errata/RHSA-2022:6839RHSA-2022:6839RHSA-2022:6839 https://access.redhat.com/security/cve/CVE-2022-41318CVE-2022-41318CVE-2022-41318https://bugzilla.redhat.com/21297712129771https://errata.almalinux.org/9/ALSA-2022-6839.htmlALSA-2022:6839ALSA-2022:6839 Xysquid-5.2-1.el9_0.2.x86_64.rpmXysquid-5.2-1.el9_0.2.x86_64.rpm9 NBBBBBBBBBsecurityModerate: gnutls and nettle security, bug fix, and enhancement update22https://access.redhat.com/errata/RHSA-2022:6854RHSA-2022:6854RHSA-2022:6854 https://access.redhat.com/security/cve/CVE-2022-2509CVE-2022-2509CVE-2022-2509https://bugzilla.redhat.com/21089772108977https://errata.almalinux.org/9/ALSA-2022-6854.htmlALSA-2022:6854ALSA-2022:6854 Qgnutls-dane-3.7.6-12.el9_0.x86_64.rpmQgnutls-dane-3.7.6-12.el9_0.i686.rpmPgnutls-c++-3.7.6-12.el9_0.x86_64.rpmPgnutls-c++-3.7.6-12.el9_0.i686.rpmgnutls-utils-3.7.6-12.el9_0.x86_64.rpmRgnutls-devel-3.7.6-12.el9_0.x86_64.rpmRgnutls-devel-3.7.6-12.el9_0.i686.rpmQgnutls-dane-3.7.6-12.el9_0.x86_64.rpmQgnutls-dane-3.7.6-12.el9_0.i686.rpmPgnutls-c++-3.7.6-12.el9_0.x86_64.rpmPgnutls-c++-3.7.6-12.el9_0.i686.rpmgnutls-utils-3.7.6-12.el9_0.x86_64.rpmRgnutls-devel-3.7.6-12.el9_0.x86_64.rpmRgnutls-devel-3.7.6-12.el9_0.i686.rpm: .ZBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security and bugfix update26Vhttps://access.redhat.com/errata/RHSA-2022:6913RHSA-2022:6913RHSA-2022:6913 https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-6913.htmlALSA-2022:6913ALSA-2022:6913 +dotnet-host-6.0.10-1.el9_0.x86_64.rpm%bdotnet-sdk-6.0-6.0.110-1.el9_0.x86_64.rpm bnetstandard-targeting-pack-2.1-6.0.110-1.el9_0.x86_64.rpm!+aspnetcore-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm#+dotnet-hostfxr-6.0-6.0.10-1.el9_0.x86_64.rpm"+dotnet-apphost-pack-6.0-6.0.10-1.el9_0.x86_64.rpm'bdotnet-templates-6.0-6.0.110-1.el9_0.x86_64.rpm$+dotnet-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm&+dotnet-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm +aspnetcore-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm +dotnet-host-6.0.10-1.el9_0.x86_64.rpm%bdotnet-sdk-6.0-6.0.110-1.el9_0.x86_64.rpm bnetstandard-targeting-pack-2.1-6.0.110-1.el9_0.x86_64.rpm!+aspnetcore-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm#+dotnet-hostfxr-6.0-6.0.10-1.el9_0.x86_64.rpm"+dotnet-apphost-pack-6.0-6.0.10-1.el9_0.x86_64.rpm'bdotnet-templates-6.0-6.0.110-1.el9_0.x86_64.rpm$+dotnet-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm&+dotnet-targeting-pack-6.0-6.0.10-1.el9_0.x86_64.rpm +aspnetcore-runtime-6.0-6.0.10-1.el9_0.x86_64.rpm;; 9oBBBBBBBBsecurityImportant: nodejs security update2 Ohttps://access.redhat.com/errata/RHSA-2022:6963RHSA-2022:6963RHSA-2022:6963 https://access.redhat.com/security/cve/CVE-2022-35255CVE-2022-35255CVE-2022-35255https://access.redhat.com/security/cve/CVE-2022-35256CVE-2022-35256CVE-2022-35256https://bugzilla.redhat.com/21305172130517https://bugzilla.redhat.com/21305182130518https://errata.almalinux.org/9/ALSA-2022-6963.htmlALSA-2022:6963ALSA-2022:6963 <8nodejs-docs-16.17.1-1.el9_0.noarch.rpm8nodejs-libs-16.17.1-1.el9_0.x86_64.rpmd8nodejs-full-i18n-16.17.1-1.el9_0.x86_64.rpm+8nodejs-16.17.1-1.el9_0.x86_64.rpm8nodejs-libs-16.17.1-1.el9_0.i686.rpmcpnpm-8.15.0-1.16.17.1.1.el9_0.x86_64.rpm<8nodejs-docs-16.17.1-1.el9_0.noarch.rpm8nodejs-libs-16.17.1-1.el9_0.x86_64.rpmd8nodejs-full-i18n-16.17.1-1.el9_0.x86_64.rpm+8nodejs-16.17.1-1.el9_0.x86_64.rpm8nodejs-libs-16.17.1-1.el9_0.i686.rpmcpnpm-8.15.0-1.16.17.1.1.el9_0.x86_64.rpm^< zBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update2[ https://access.redhat.com/errata/RHSA-2022:6999RHSA-2022:6999RHSA-2022:6999 https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-6999.htmlALSA-2022:6999ALSA-2022:6999 .java-17-openjdk-jmods-17.0.5.0.8-2.el9_0.x86_64.rpm/java-17-openjdk-src-17.0.5.0.8-2.el9_0.x86_64.rpm,java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0.x86_64.rpm0java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0.x86_64.rpm)java-17-openjdk-demo-17.0.5.0.8-2.el9_0.x86_64.rpm(java-17-openjdk-17.0.5.0.8-2.el9_0.x86_64.rpm+java-17-openjdk-headless-17.0.5.0.8-2.el9_0.x86_64.rpm*java-17-openjdk-devel-17.0.5.0.8-2.el9_0.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0.x86_64.rpm .java-17-openjdk-jmods-17.0.5.0.8-2.el9_0.x86_64.rpm/java-17-openjdk-src-17.0.5.0.8-2.el9_0.x86_64.rpm,java-17-openjdk-javadoc-17.0.5.0.8-2.el9_0.x86_64.rpm0java-17-openjdk-static-libs-17.0.5.0.8-2.el9_0.x86_64.rpm)java-17-openjdk-demo-17.0.5.0.8-2.el9_0.x86_64.rpm(java-17-openjdk-17.0.5.0.8-2.el9_0.x86_64.rpm+java-17-openjdk-headless-17.0.5.0.8-2.el9_0.x86_64.rpm*java-17-openjdk-devel-17.0.5.0.8-2.el9_0.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.5.0.8-2.el9_0.x86_64.rpm= MBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update2e_ https://access.redhat.com/errata/RHSA-2022:7007RHSA-2022:7007RHSA-2022:7007 https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://errata.almalinux.org/9/ALSA-2022-7007.htmlALSA-2022:7007ALSA-2022:7007 CWjava-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpmcWjava-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpmeWjava-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpmfWjava-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpmdWjava-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpmbWjava-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpmBWjava-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpmCWjava-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el9_0.noarch.rpmcWjava-1.8.0-openjdk-demo-1.8.0.352.b08-2.el9_0.x86_64.rpmeWjava-1.8.0-openjdk-headless-1.8.0.352.b08-2.el9_0.x86_64.rpmfWjava-1.8.0-openjdk-src-1.8.0.352.b08-2.el9_0.x86_64.rpmdWjava-1.8.0-openjdk-devel-1.8.0.352.b08-2.el9_0.x86_64.rpmbWjava-1.8.0-openjdk-1.8.0.352.b08-2.el9_0.x86_64.rpmBWjava-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el9_0.noarch.rpmɷ> ,ZBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update2D https://access.redhat.com/errata/RHSA-2022:7013RHSA-2022:7013RHSA-2022:7013 https://access.redhat.com/security/cve/CVE-2022-21618CVE-2022-21618CVE-2022-21618https://access.redhat.com/security/cve/CVE-2022-21619CVE-2022-21619CVE-2022-21619https://access.redhat.com/security/cve/CVE-2022-21624CVE-2022-21624CVE-2022-21624https://access.redhat.com/security/cve/CVE-2022-21626CVE-2022-21626CVE-2022-21626https://access.redhat.com/security/cve/CVE-2022-21628CVE-2022-21628CVE-2022-21628https://access.redhat.com/security/cve/CVE-2022-39399CVE-2022-39399CVE-2022-39399https://bugzilla.redhat.com/21337452133745https://bugzilla.redhat.com/21337532133753https://bugzilla.redhat.com/21337652133765https://bugzilla.redhat.com/21337692133769https://bugzilla.redhat.com/21337762133776https://bugzilla.redhat.com/21338172133817https://errata.almalinux.org/9/ALSA-2022-7013.htmlALSA-2022:7013ALSA-2022:7013 , java-11-openjdk-src-11.0.17.0.8-2.el9_0.x86_64.rpm* java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0.x86_64.rpm+ java-11-openjdk-jmods-11.0.17.0.8-2.el9_0.x86_64.rpm' java-11-openjdk-devel-11.0.17.0.8-2.el9_0.x86_64.rpm) java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0.x86_64.rpm( java-11-openjdk-headless-11.0.17.0.8-2.el9_0.x86_64.rpm- java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0.x86_64.rpm& java-11-openjdk-demo-11.0.17.0.8-2.el9_0.x86_64.rpm% java-11-openjdk-11.0.17.0.8-2.el9_0.x86_64.rpm , java-11-openjdk-src-11.0.17.0.8-2.el9_0.x86_64.rpm* java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el9_0.x86_64.rpm+ java-11-openjdk-jmods-11.0.17.0.8-2.el9_0.x86_64.rpm' java-11-openjdk-devel-11.0.17.0.8-2.el9_0.x86_64.rpm) java-11-openjdk-javadoc-11.0.17.0.8-2.el9_0.x86_64.rpm( java-11-openjdk-headless-11.0.17.0.8-2.el9_0.x86_64.rpm- java-11-openjdk-static-libs-11.0.17.0.8-2.el9_0.x86_64.rpm& java-11-openjdk-demo-11.0.17.0.8-2.el9_0.x86_64.rpm% java-11-openjdk-11.0.17.0.8-2.el9_0.x86_64.rpm? /msecurityImportant: firefox security update2OKhttps://access.redhat.com/errata/RHSA-2022:7020RHSA-2022:7020RHSA-2022:7020 https://access.redhat.com/security/cve/CVE-2022-40674CVE-2022-40674CVE-2022-40674https://bugzilla.redhat.com/21307692130769https://errata.almalinux.org/9/ALSA-2022-7020.htmlALSA-2022:7020ALSA-2022:7020 7-firefox-102.3.0-7.el9_0.alma.x86_64.rpm7-firefox-102.3.0-7.el9_0.alma.x86_64.rpm+@ 2psecurityImportant: firefox security update2) https://access.redhat.com/errata/RHSA-2022:7071RHSA-2022:7071RHSA-2022:7071 https://access.redhat.com/security/cve/CVE-2022-42927CVE-2022-42927CVE-2022-42927https://access.redhat.com/security/cve/CVE-2022-42928CVE-2022-42928CVE-2022-42928https://access.redhat.com/security/cve/CVE-2022-42929CVE-2022-42929CVE-2022-42929https://access.redhat.com/security/cve/CVE-2022-42932CVE-2022-42932CVE-2022-42932https://bugzilla.redhat.com/21361562136156https://bugzilla.redhat.com/21361572136157https://bugzilla.redhat.com/21361582136158https://bugzilla.redhat.com/21361592136159https://errata.almalinux.org/9/ALSA-2022-7071.htmlALSA-2022:7071ALSA-2022:7071 7Kfirefox-102.4.0-1.el9_0.alma.x86_64.rpm7Kfirefox-102.4.0-1.el9_0.alma.x86_64.rpmAA 5ssecurityImportant: thunderbird security update2C>https://access.redhat.com/errata/RHSA-2022:7178RHSA-2022:7178RHSA-2022:7178 https://access.redhat.com/security/cve/CVE-2022-39236CVE-2022-39236CVE-2022-39236https://access.redhat.com/security/cve/CVE-2022-39249CVE-2022-39249CVE-2022-39249https://access.redhat.com/security/cve/CVE-2022-39250CVE-2022-39250CVE-2022-39250https://access.redhat.com/security/cve/CVE-2022-39251CVE-2022-39251CVE-2022-39251https://access.redhat.com/security/cve/CVE-2022-42927CVE-2022-42927CVE-2022-42927https://access.redhat.com/security/cve/CVE-2022-42928CVE-2022-42928CVE-2022-42928https://access.redhat.com/security/cve/CVE-2022-42929CVE-2022-42929CVE-2022-42929https://access.redhat.com/security/cve/CVE-2022-42932CVE-2022-42932CVE-2022-42932https://bugzilla.redhat.com/21353912135391https://bugzilla.redhat.com/21353932135393https://bugzilla.redhat.com/21353952135395https://bugzilla.redhat.com/21353962135396https://bugzilla.redhat.com/21361562136156https://bugzilla.redhat.com/21361572136157https://bugzilla.redhat.com/21361582136158https://bugzilla.redhat.com/21361592136159https://errata.almalinux.org/9/ALSA-2022-7178.htmlALSA-2022:7178ALSA-2022:7178 9Kthunderbird-102.4.0-1.el9_0.alma.x86_64.rpm9Kthunderbird-102.4.0-1.el9_0.alma.x86_64.rpm:B ;vBBBsecurityImportant: openssl security update2https://access.redhat.com/errata/RHSA-2022:7288RHSA-2022:7288RHSA-2022:7288 https://access.redhat.com/security/cve/CVE-2022-3602CVE-2022-3602CVE-2022-3602https://access.redhat.com/security/cve/CVE-2022-3786CVE-2022-3786CVE-2022-3786https://bugzilla.redhat.com/21377232137723https://bugzilla.redhat.com/21391042139104https://errata.almalinux.org/9/ALSA-2022-7288.htmlALSA-2022:7288ALSA-2022:7288 #openssl-devel-3.0.1-43.el9_0.x86_64.rpm#openssl-devel-3.0.1-43.el9_0.i686.rpmm#openssl-perl-3.0.1-43.el9_0.x86_64.rpm#openssl-devel-3.0.1-43.el9_0.x86_64.rpm#openssl-devel-3.0.1-43.el9_0.i686.rpmm#openssl-perl-3.0.1-43.el9_0.x86_64.rpmhC >|securityModerate: zlib security update2Ohttps://access.redhat.com/errata/RHSA-2022:7314RHSA-2022:7314RHSA-2022:7314 https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-7314.htmlALSA-2022:7314ALSA-2022:7314 2 zlib-devel-1.2.11-32.el9_0.i686.rpm2 zlib-devel-1.2.11-32.el9_0.i686.rpmOD BBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update2chttps://access.redhat.com/errata/RHSA-2022:7318RHSA-2022:7318RHSA-2022:7318 https://access.redhat.com/security/cve/CVE-2022-2585CVE-2022-2585CVE-2022-2585https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21148742114874https://errata.almalinux.org/9/ALSA-2022-7318.htmlALSA-2022:7318ALSA-2022:7318 Akernel-doc-5.14.0-70.30.1.el9_0.noarch.rpm%Aperf-5.14.0-70.30.1.el9_0.x86_64.rpm"Akernel-debug-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm$Akernel-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm(Akernel-headers-5.14.0-70.30.1.el9_0.x86_64.rpm!Akernel-debug-devel-5.14.0-70.30.1.el9_0.x86_64.rpm#Akernel-devel-5.14.0-70.30.1.el9_0.x86_64.rpmAkernel-doc-5.14.0-70.30.1.el9_0.noarch.rpm%Aperf-5.14.0-70.30.1.el9_0.x86_64.rpm"Akernel-debug-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm$Akernel-devel-matched-5.14.0-70.30.1.el9_0.x86_64.rpm(Akernel-headers-5.14.0-70.30.1.el9_0.x86_64.rpm!Akernel-debug-devel-5.14.0-70.30.1.el9_0.x86_64.rpm#Akernel-devel-5.14.0-70.30.1.el9_0.x86_64.rpm^E MBBBsecurityModerate: python3.9 security update2fnhttps://access.redhat.com/errata/RHSA-2022:7323RHSA-2022:7323RHSA-2022:7323 https://access.redhat.com/security/cve/CVE-2020-10735CVE-2020-10735CVE-2020-10735https://bugzilla.redhat.com/18344231834423https://errata.almalinux.org/9/ALSA-2022-7323.htmlALSA-2022:7323ALSA-2022:7323 1Kpython3-tkinter-3.9.10-3.el9_0.x86_64.rpmgKpython-unversioned-command-3.9.10-3.el9_0.noarch.rpmRKpython3-devel-3.9.10-3.el9_0.x86_64.rpm1Kpython3-tkinter-3.9.10-3.el9_0.x86_64.rpmgKpython-unversioned-command-3.9.10-3.el9_0.noarch.rpmRKpython3-devel-3.9.10-3.el9_0.x86_64.rpmF eBBBBBBiBBsecurityImportant: pki-core security update2Thttps://access.redhat.com/errata/RHSA-2022:7326RHSA-2022:7326RHSA-2022:7326 https://access.redhat.com/security/cve/CVE-2022-2414CVE-2022-2414CVE-2022-2414https://bugzilla.redhat.com/21046762104676https://errata.almalinux.org/9/ALSA-2022-7326.htmlALSA-2022:7326ALSA-2022:7326 copki-symkey-11.0.6-2.el9_0.x86_64.rpmbopython3-pki-11.0.6-2.el9_0.noarch.rpmYopki-kra-11.0.6-2.el9_0.noarch.rpmRopki-base-java-11.0.6-2.el9_0.noarch.rpmPopki-acme-11.0.6-2.el9_0.noarch.rpmZopki-server-11.0.6-2.el9_0.noarch.rpmdopki-tools-11.0.6-2.el9_0.x86_64.rpmQopki-base-11.0.6-2.el9_0.noarch.rpmSopki-ca-11.0.6-2.el9_0.noarch.rpm copki-symkey-11.0.6-2.el9_0.x86_64.rpmbopython3-pki-11.0.6-2.el9_0.noarch.rpmYopki-kra-11.0.6-2.el9_0.noarch.rpmRopki-base-java-11.0.6-2.el9_0.noarch.rpmPopki-acme-11.0.6-2.el9_0.noarch.rpmZopki-server-11.0.6-2.el9_0.noarch.rpmdopki-tools-11.0.6-2.el9_0.x86_64.rpmQopki-base-11.0.6-2.el9_0.noarch.rpmSopki-ca-11.0.6-2.el9_0.noarch.rpm G XsecurityModerate: lua security update2phttps://access.redhat.com/errata/RHSA-2022:7329RHSA-2022:7329RHSA-2022:7329 https://access.redhat.com/security/cve/CVE-2022-33099CVE-2022-33099CVE-2022-33099https://bugzilla.redhat.com/21044272104427https://errata.almalinux.org/9/ALSA-2022-7329.htmlALSA-2022:7329ALSA-2022:7329 Njlua-5.4.2-4.el9_0.3.x86_64.rpmNjlua-5.4.2-4.el9_0.3.x86_64.rpmH [securityLow: Image Builder security, bug fix, and enhancement update23 https://access.redhat.com/errata/RHSA-2022:7950RHSA-2022:7950RHSA-2022:7950 https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://bugzilla.redhat.com/21138142113814https://errata.almalinux.org/9/ALSA-2022-7950.htmlALSA-2022:7950ALSA-2022:7950 cBweldr-client-35.5-4.el9.x86_64.rpmcBweldr-client-35.5-4.el9.x86_64.rpm݆I )^BBBBBBBBBsecurityModerate: podman security and bug fix update2zhttps://access.redhat.com/errata/RHSA-2022:7954RHSA-2022:7954RHSA-2022:7954 https://access.redhat.com/security/cve/CVE-2020-28851CVE-2020-28851CVE-2020-28851https://access.redhat.com/security/cve/CVE-2020-28852CVE-2020-28852CVE-2020-28852https://access.redhat.com/security/cve/CVE-2021-20199CVE-2021-20199CVE-2021-20199https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33197CVE-2021-33197CVE-2021-33197https://access.redhat.com/security/cve/CVE-2021-34558CVE-2021-34558CVE-2021-34558https://access.redhat.com/security/cve/CVE-2021-4024CVE-2021-4024CVE-2021-4024https://access.redhat.com/security/cve/CVE-2022-27191CVE-2022-27191CVE-2022-27191https://bugzilla.redhat.com/19133331913333https://bugzilla.redhat.com/19133381913338https://bugzilla.redhat.com/19190501919050https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19835961983596https://bugzilla.redhat.com/19895701989570https://bugzilla.redhat.com/20266752026675https://bugzilla.redhat.com/20647022064702https://errata.almalinux.org/9/ALSA-2022-7954.htmlALSA-2022:7954ALSA-2022:7954 /Zpodman-remote-4.2.0-3.el9.x86_64.rpm0Zpodman-tests-4.2.0-3.el9.x86_64.rpm Zpodman-gvproxy-4.2.0-3.el9.x86_64.rpm-Zpodman-4.2.0-3.el9.x86_64.rpmfZpodman-docker-4.2.0-3.el9.noarch.rpm.Zpodman-plugins-4.2.0-3.el9.x86_64.rpm/Zpodman-remote-4.2.0-3.el9.x86_64.rpm0Zpodman-tests-4.2.0-3.el9.x86_64.rpm Zpodman-gvproxy-4.2.0-3.el9.x86_64.rpm-Zpodman-4.2.0-3.el9.x86_64.rpmfZpodman-docker-4.2.0-3.el9.noarch.rpm.Zpodman-plugins-4.2.0-3.el9.x86_64.rpmܸNJ .jBBsecurityModerate: skopeo security and bug fix update2?https://access.redhat.com/errata/RHSA-2022:7955RHSA-2022:7955RHSA-2022:7955 https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33198CVE-2021-33198CVE-2021-33198https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19895751989575https://errata.almalinux.org/9/ALSA-2022-7955.htmlALSA-2022:7955ALSA-2022:7955 <skopeo-tests-1.9.2-1.el9.x86_64.rpm;skopeo-1.9.2-1.el9.x86_64.rpm<skopeo-tests-1.9.2-1.el9.x86_64.rpm;skopeo-1.9.2-1.el9.x86_64.rpmܷ-K ?oBBBBBBBBBBBBBBsecurityLow: libguestfs security, bug fix, and enhancement update23Ghttps://access.redhat.com/errata/RHSA-2022:7958RHSA-2022:7958RHSA-2022:7958 https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7958.htmlALSA-2022:7958ALSA-2022:7958 -Wlibguestfs-rsync-1.48.4-2.el9.alma.x86_64.rpm,Wlibguestfs-rescue-1.48.4-2.el9.alma.x86_64.rpm.Wlibguestfs-xfs-1.48.4-2.el9.alma.x86_64.rpmrWpython3-libguestfs-1.48.4-2.el9.alma.x86_64.rpm*Wlibguestfs-1.48.4-2.el9.alma.x86_64.rpm+Wlibguestfs-appliance-1.48.4-2.el9.alma.x86_64.rpmZWperl-Sys-Guestfs-1.48.4-2.el9.alma.x86_64.rpmyWlibguestfs-inspect-icons-1.48.4-2.el9.alma.noarch.rpmxWlibguestfs-bash-completion-1.48.4-2.el9.alma.noarch.rpm -Wlibguestfs-rsync-1.48.4-2.el9.alma.x86_64.rpm,Wlibguestfs-rescue-1.48.4-2.el9.alma.x86_64.rpm.Wlibguestfs-xfs-1.48.4-2.el9.alma.x86_64.rpmrWpython3-libguestfs-1.48.4-2.el9.alma.x86_64.rpm*Wlibguestfs-1.48.4-2.el9.alma.x86_64.rpm+Wlibguestfs-appliance-1.48.4-2.el9.alma.x86_64.rpmZWperl-Sys-Guestfs-1.48.4-2.el9.alma.x86_64.rpmyWlibguestfs-inspect-icons-1.48.4-2.el9.alma.noarch.rpmxWlibguestfs-bash-completion-1.48.4-2.el9.alma.noarch.rpmܵhL @BsecurityLow: guestfs-tools security, bug fix, and enhancement update23Whttps://access.redhat.com/errata/RHSA-2022:7959RHSA-2022:7959RHSA-2022:7959 https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7959.htmlALSA-2022:7959ALSA-2022:7959 m guestfs-tools-1.48.2-5.el9.x86_64.rpm[ virt-win-reg-1.48.2-5.el9.noarch.rpmm guestfs-tools-1.48.2-5.el9.x86_64.rpm[ virt-win-reg-1.48.2-5.el9.noarch.rpmܴ<M .DBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security, bug fix, and enhancement update2nS https://access.redhat.com/errata/RHSA-2022:7967RHSA-2022:7967RHSA-2022:7967 https://access.redhat.com/security/cve/CVE-2021-3507CVE-2021-3507CVE-2021-3507https://access.redhat.com/security/cve/CVE-2021-3611CVE-2021-3611CVE-2021-3611https://access.redhat.com/security/cve/CVE-2021-3750CVE-2021-3750CVE-2021-3750https://access.redhat.com/security/cve/CVE-2021-4158CVE-2021-4158CVE-2021-4158https://bugzilla.redhat.com/19511181951118https://bugzilla.redhat.com/19737841973784https://bugzilla.redhat.com/19990731999073https://bugzilla.redhat.com/20350022035002https://errata.almalinux.org/9/ALSA-2022-7967.htmlALSA-2022:7967ALSA-2022:7967 SXqemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9.x86_64.rpmXqemu-kvm-core-7.0.0-13.el9.x86_64.rpmTXqemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9.x86_64.rpm Xqemu-img-7.0.0-13.el9.x86_64.rpmXqemu-kvm-tools-7.0.0-13.el9.x86_64.rpmXqemu-pr-helper-7.0.0-13.el9.x86_64.rpmXqemu-kvm-audio-pa-7.0.0-13.el9.x86_64.rpm Xqemu-kvm-7.0.0-13.el9.x86_64.rpmXqemu-kvm-ui-egl-headless-7.0.0-13.el9.x86_64.rpmUXqemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9.x86_64.rpmXqemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9.x86_64.rpmXqemu-kvm-device-display-virtio-vga-7.0.0-13.el9.x86_64.rpmXqemu-kvm-ui-opengl-7.0.0-13.el9.x86_64.rpmXqemu-kvm-block-rbd-7.0.0-13.el9.x86_64.rpm Xqemu-guest-agent-7.0.0-13.el9.x86_64.rpmXqemu-kvm-common-7.0.0-13.el9.x86_64.rpmXqemu-kvm-device-display-virtio-gpu-7.0.0-13.el9.x86_64.rpmXqemu-kvm-device-usb-host-7.0.0-13.el9.x86_64.rpmXqemu-kvm-device-usb-redirect-7.0.0-13.el9.x86_64.rpmXqemu-kvm-block-curl-7.0.0-13.el9.x86_64.rpmXqemu-kvm-docs-7.0.0-13.el9.x86_64.rpmSXqemu-kvm-device-display-virtio-gpu-gl-7.0.0-13.el9.x86_64.rpmXqemu-kvm-core-7.0.0-13.el9.x86_64.rpmTXqemu-kvm-device-display-virtio-gpu-pci-gl-7.0.0-13.el9.x86_64.rpm Xqemu-img-7.0.0-13.el9.x86_64.rpmXqemu-kvm-tools-7.0.0-13.el9.x86_64.rpmXqemu-pr-helper-7.0.0-13.el9.x86_64.rpmXqemu-kvm-audio-pa-7.0.0-13.el9.x86_64.rpm Xqemu-kvm-7.0.0-13.el9.x86_64.rpmXqemu-kvm-ui-egl-headless-7.0.0-13.el9.x86_64.rpmUXqemu-kvm-device-display-virtio-vga-gl-7.0.0-13.el9.x86_64.rpmXqemu-kvm-device-display-virtio-gpu-pci-7.0.0-13.el9.x86_64.rpmXqemu-kvm-device-display-virtio-vga-7.0.0-13.el9.x86_64.rpmXqemu-kvm-ui-opengl-7.0.0-13.el9.x86_64.rpmXqemu-kvm-block-rbd-7.0.0-13.el9.x86_64.rpm Xqemu-guest-agent-7.0.0-13.el9.x86_64.rpmXqemu-kvm-common-7.0.0-13.el9.x86_64.rpmXqemu-kvm-device-display-virtio-gpu-7.0.0-13.el9.x86_64.rpmXqemu-kvm-device-usb-host-7.0.0-13.el9.x86_64.rpmXqemu-kvm-device-usb-redirect-7.0.0-13.el9.x86_64.rpmXqemu-kvm-block-curl-7.0.0-13.el9.x86_64.rpmXqemu-kvm-docs-7.0.0-13.el9.x86_64.rpmܳ&N 2oBsecurityLow: virt-v2v security, bug fix, and enhancement update23Alhttps://access.redhat.com/errata/RHSA-2022:7968RHSA-2022:7968RHSA-2022:7968 https://access.redhat.com/security/cve/CVE-2022-2211CVE-2022-2211CVE-2022-2211https://bugzilla.redhat.com/21008622100862https://errata.almalinux.org/9/ALSA-2022-7968.htmlALSA-2022:7968ALSA-2022:7968 Zvirt-v2v-bash-completion-2.0.7-6.el9.noarch.rpm-virt-v2v-2.0.7-6.el9.x86_64.rpmZvirt-v2v-bash-completion-2.0.7-6.el9.noarch.rpm-virt-v2v-2.0.7-6.el9.x86_64.rpmܲO :sBBBBBsecurityModerate: protobuf security update2-Nhttps://access.redhat.com/errata/RHSA-2022:7970RHSA-2022:7970RHSA-2022:7970 https://access.redhat.com/security/cve/CVE-2021-22570CVE-2021-22570CVE-2021-22570https://bugzilla.redhat.com/20494292049429https://errata.almalinux.org/9/ALSA-2022-7970.htmlALSA-2022:7970ALSA-2022:7970 -%protobuf-3.14.0-13.el9.i686.rpm.%protobuf-lite-3.14.0-13.el9.x86_64.rpm-%protobuf-3.14.0-13.el9.x86_64.rpm*%python3-protobuf-3.14.0-13.el9.noarch.rpm.%protobuf-lite-3.14.0-13.el9.i686.rpm-%protobuf-3.14.0-13.el9.i686.rpm.%protobuf-lite-3.14.0-13.el9.x86_64.rpm-%protobuf-3.14.0-13.el9.x86_64.rpm*%python3-protobuf-3.14.0-13.el9.noarch.rpm.%protobuf-lite-3.14.0-13.el9.i686.rpmނhP {BBBsecurityModerate: gimp security and enhancement update2{https://access.redhat.com/errata/RHSA-2022:7978RHSA-2022:7978RHSA-2022:7978 https://access.redhat.com/security/cve/CVE-2022-30067CVE-2022-30067CVE-2022-30067https://access.redhat.com/security/cve/CVE-2022-32990CVE-2022-32990CVE-2022-32990https://bugzilla.redhat.com/20875912087591https://bugzilla.redhat.com/21032022103202https://errata.almalinux.org/9/ALSA-2022-7978.htmlALSA-2022:7978ALSA-2022:7978 ;gimp-libs-2.99.8-3.el9.x86_64.rpmc;gimp-2.99.8-3.el9.x86_64.rpm;gimp-libs-2.99.8-3.el9.i686.rpm;gimp-libs-2.99.8-3.el9.x86_64.rpmc;gimp-2.99.8-3.el9.x86_64.rpm;gimp-libs-2.99.8-3.el9.i686.rpmރ Q ABsecurityLow: speex security update238https://access.redhat.com/errata/RHSA-2022:7979RHSA-2022:7979RHSA-2022:7979 https://access.redhat.com/security/cve/CVE-2020-23903CVE-2020-23903CVE-2020-23903https://bugzilla.redhat.com/20242502024250https://errata.almalinux.org/9/ALSA-2022-7979.htmlALSA-2022:7979ALSA-2022:7979 H|speex-1.2.0-11.el9.x86_64.rpmH|speex-1.2.0-11.el9.i686.rpmH|speex-1.2.0-11.el9.x86_64.rpmH|speex-1.2.0-11.el9.i686.rpmރR 1EBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityLow: libvirt security, bug fix, and enhancement update238https://access.redhat.com/errata/RHSA-2022:8003RHSA-2022:8003RHSA-2022:8003 https://access.redhat.com/security/cve/CVE-2022-0897CVE-2022-0897CVE-2022-0897https://bugzilla.redhat.com/20638832063883https://errata.almalinux.org/9/ALSA-2022-8003.htmlALSA-2022:8003ALSA-2022:8003 ZSlibvirt-daemon-driver-storage-scsi-8.5.0-7.el9_1.x86_64.rpmUSlibvirt-daemon-driver-storage-disk-8.5.0-7.el9_1.x86_64.rpmKSlibvirt-daemon-config-network-8.5.0-7.el9_1.x86_64.rpmISlibvirt-client-8.5.0-7.el9_1.x86_64.rpmYSlibvirt-daemon-driver-storage-rbd-8.5.0-7.el9_1.x86_64.rpmMSlibvirt-daemon-driver-interface-8.5.0-7.el9_1.x86_64.rpm[Slibvirt-daemon-kvm-8.5.0-7.el9_1.x86_64.rpmTSlibvirt-daemon-driver-storage-core-8.5.0-7.el9_1.x86_64.rpmXSlibvirt-daemon-driver-storage-mpath-8.5.0-7.el9_1.x86_64.rpmJSlibvirt-daemon-8.5.0-7.el9_1.x86_64.rpmOSlibvirt-daemon-driver-nodedev-8.5.0-7.el9_1.x86_64.rpmHSlibvirt-8.5.0-7.el9_1.x86_64.rpmWSlibvirt-daemon-driver-storage-logical-8.5.0-7.el9_1.x86_64.rpmLSlibvirt-daemon-config-nwfilter-8.5.0-7.el9_1.x86_64.rpm]Slibvirt-nss-8.5.0-7.el9_1.x86_64.rpmQSlibvirt-daemon-driver-qemu-8.5.0-7.el9_1.x86_64.rpmRSlibvirt-daemon-driver-secret-8.5.0-7.el9_1.x86_64.rpmSSlibvirt-daemon-driver-storage-8.5.0-7.el9_1.x86_64.rpmNSlibvirt-daemon-driver-network-8.5.0-7.el9_1.x86_64.rpmVSlibvirt-daemon-driver-storage-iscsi-8.5.0-7.el9_1.x86_64.rpmPSlibvirt-daemon-driver-nwfilter-8.5.0-7.el9_1.x86_64.rpm\Slibvirt-libs-8.5.0-7.el9_1.x86_64.rpmZSlibvirt-daemon-driver-storage-scsi-8.5.0-7.el9_1.x86_64.rpmUSlibvirt-daemon-driver-storage-disk-8.5.0-7.el9_1.x86_64.rpmKSlibvirt-daemon-config-network-8.5.0-7.el9_1.x86_64.rpmISlibvirt-client-8.5.0-7.el9_1.x86_64.rpmYSlibvirt-daemon-driver-storage-rbd-8.5.0-7.el9_1.x86_64.rpmMSlibvirt-daemon-driver-interface-8.5.0-7.el9_1.x86_64.rpm[Slibvirt-daemon-kvm-8.5.0-7.el9_1.x86_64.rpmTSlibvirt-daemon-driver-storage-core-8.5.0-7.el9_1.x86_64.rpmXSlibvirt-daemon-driver-storage-mpath-8.5.0-7.el9_1.x86_64.rpmJSlibvirt-daemon-8.5.0-7.el9_1.x86_64.rpmOSlibvirt-daemon-driver-nodedev-8.5.0-7.el9_1.x86_64.rpmHSlibvirt-8.5.0-7.el9_1.x86_64.rpmWSlibvirt-daemon-driver-storage-logical-8.5.0-7.el9_1.x86_64.rpmLSlibvirt-daemon-config-nwfilter-8.5.0-7.el9_1.x86_64.rpm]Slibvirt-nss-8.5.0-7.el9_1.x86_64.rpmQSlibvirt-daemon-driver-qemu-8.5.0-7.el9_1.x86_64.rpmRSlibvirt-daemon-driver-secret-8.5.0-7.el9_1.x86_64.rpmSSlibvirt-daemon-driver-storage-8.5.0-7.el9_1.x86_64.rpmNSlibvirt-daemon-driver-network-8.5.0-7.el9_1.x86_64.rpmVSlibvirt-daemon-driver-storage-iscsi-8.5.0-7.el9_1.x86_64.rpmPSlibvirt-daemon-driver-nwfilter-8.5.0-7.el9_1.x86_64.rpm\Slibvirt-libs-8.5.0-7.el9_1.x86_64.rpmܩPS 6rBBsecurityModerate: buildah security and bug fix update2Hhttps://access.redhat.com/errata/RHSA-2022:8008RHSA-2022:8008RHSA-2022:8008 https://access.redhat.com/security/cve/CVE-2021-20291CVE-2021-20291CVE-2021-20291https://access.redhat.com/security/cve/CVE-2021-33195CVE-2021-33195CVE-2021-33195https://access.redhat.com/security/cve/CVE-2021-33197CVE-2021-33197CVE-2021-33197https://access.redhat.com/security/cve/CVE-2021-33198CVE-2021-33198CVE-2021-33198https://access.redhat.com/security/cve/CVE-2022-27191CVE-2022-27191CVE-2022-27191https://access.redhat.com/security/cve/CVE-2022-2989CVE-2022-2989CVE-2022-2989https://access.redhat.com/security/cve/CVE-2022-2990CVE-2022-2990CVE-2022-2990https://bugzilla.redhat.com/19394851939485https://bugzilla.redhat.com/19895641989564https://bugzilla.redhat.com/19895701989570https://bugzilla.redhat.com/19895751989575https://bugzilla.redhat.com/20647022064702https://bugzilla.redhat.com/21214452121445https://bugzilla.redhat.com/21214532121453https://errata.almalinux.org/9/ALSA-2022-8008.htmlALSA-2022:8008ALSA-2022:8008 =bbuildah-tests-1.27.0-2.el9.x86_64.rpmhttps://access.redhat.com/errata/RHSA-2022:8096RHSA-2022:8096RHSA-2022:8096 https://access.redhat.com/security/cve/CVE-2022-24735CVE-2022-24735CVE-2022-24735https://access.redhat.com/security/cve/CVE-2022-24736CVE-2022-24736CVE-2022-24736https://bugzilla.redhat.com/20802862080286https://bugzilla.redhat.com/20802892080289https://errata.almalinux.org/9/ALSA-2022-8096.htmlALSA-2022:8096ALSA-2022:8096 :redis-doc-6.2.7-1.el9.noarch.rpm6redis-6.2.7-1.el9.x86_64.rpmUredis-devel-6.2.7-1.el9.x86_64.rpmUredis-devel-6.2.7-1.el9.i686.rpm:redis-doc-6.2.7-1.el9.noarch.rpm6redis-6.2.7-1.el9.x86_64.rpmUredis-devel-6.2.7-1.el9.x86_64.rpmUredis-devel-6.2.7-1.el9.i686.rpmކx_ PBBsecurityModerate: toolbox security and bug fix update25@ https://access.redhat.com/errata/RHSA-2022:8098RHSA-2022:8098RHSA-2022:8098 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073862107386https://errata.almalinux.org/9/ALSA-2022-8098.htmlALSA-2022:8098ALSA-2022:8098 r/toolbox-tests-0.0.99.3-5.el9.x86_64.rpmq/toolbox-0.0.99.3-5.el9.x86_64.rpmr/toolbox-tests-0.0.99.3-5.el9.x86_64.rpmq/toolbox-0.0.99.3-5.el9.x86_64.rpm܍e` UBBBBsecurityLow: swtpm security and bug fix update23uhttps://access.redhat.com/errata/RHSA-2022:8100RHSA-2022:8100RHSA-2022:8100 https://access.redhat.com/security/cve/CVE-2022-23645CVE-2022-23645CVE-2022-23645https://bugzilla.redhat.com/20564912056491https://errata.almalinux.org/9/ALSA-2022-8100.htmlALSA-2022:8100ALSA-2022:8100  4swtpm-tools-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm4swtpm-libs-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm4swtpm-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm 4swtpm-tools-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm4swtpm-libs-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm4swtpm-0.7.0-3.20211109gitb79fd91.el9.x86_64.rpm܌fa \securityModerate: frr security, bug fix, and enhancement update2y$https://access.redhat.com/errata/RHSA-2022:8112RHSA-2022:8112RHSA-2022:8112 https://access.redhat.com/security/cve/CVE-2022-26125CVE-2022-26125CVE-2022-26125https://bugzilla.redhat.com/20586282058628https://errata.almalinux.org/9/ALSA-2022-8112.htmlALSA-2022:8112ALSA-2022:8112 frr-8.2.2-4.el9.x86_64.rpmfrr-8.2.2-4.el9.x86_64.rpm܋Eb !_securityModerate: ignition security, bug fix, and enhancement update2,https://access.redhat.com/errata/RHSA-2022:8126RHSA-2022:8126RHSA-2022:8126 https://access.redhat.com/security/cve/CVE-2022-1706CVE-2022-1706CVE-2022-1706https://bugzilla.redhat.com/20822742082274https://errata.almalinux.org/9/ALSA-2022-8126.htmlALSA-2022:8126ALSA-2022:8126 pignition-2.14.0-1.el9.x86_64.rpmpignition-2.14.0-1.el9.x86_64.rpm܉Xc %bBsecurityLow: wavpack security update23I2https://access.redhat.com/errata/RHSA-2022:8139RHSA-2022:8139RHSA-2022:8139 https://access.redhat.com/security/cve/CVE-2021-44269CVE-2021-44269CVE-2021-44269https://bugzilla.redhat.com/20644572064457https://errata.almalinux.org/9/ALSA-2022-8139.htmlALSA-2022:8139ALSA-2022:8139 MPwavpack-5.4.0-5.el9.i686.rpmMPwavpack-5.4.0-5.el9.x86_64.rpmMPwavpack-5.4.0-5.el9.i686.rpmMPwavpack-5.4.0-5.el9.x86_64.rpmއ>d 4fBBBBBBBBBBBBsecurityModerate: poppler security and bug fix update2{(https://access.redhat.com/errata/RHSA-2022:8151RHSA-2022:8151RHSA-2022:8151 https://access.redhat.com/security/cve/CVE-2022-27337CVE-2022-27337CVE-2022-27337https://bugzilla.redhat.com/20871902087190https://errata.almalinux.org/9/ALSA-2022-8151.htmlALSA-2022:8151ALSA-2022:8151 poppler-cpp-21.01.0-13.el9.i686.rpmpoppler-cpp-21.01.0-13.el9.x86_64.rpmzpoppler-utils-21.01.0-13.el9.x86_64.rpmpoppler-glib-21.01.0-13.el9.x86_64.rpmpoppler-21.01.0-13.el9.i686.rpmpoppler-21.01.0-13.el9.x86_64.rpm poppler-qt5-21.01.0-13.el9.i686.rpmpoppler-glib-21.01.0-13.el9.i686.rpm poppler-qt5-21.01.0-13.el9.x86_64.rpm poppler-cpp-21.01.0-13.el9.i686.rpmpoppler-cpp-21.01.0-13.el9.x86_64.rpmzpoppler-utils-21.01.0-13.el9.x86_64.rpmpoppler-glib-21.01.0-13.el9.x86_64.rpmpoppler-21.01.0-13.el9.i686.rpmpoppler-21.01.0-13.el9.x86_64.rpm poppler-qt5-21.01.0-13.el9.i686.rpmpoppler-glib-21.01.0-13.el9.i686.rpm poppler-qt5-21.01.0-13.el9.x86_64.rpmއTe :uBBBsecurityModerate: 389-ds-base security, bug fix, and enhancement update2#phttps://access.redhat.com/errata/RHSA-2022:8162RHSA-2022:8162RHSA-2022:8162 https://access.redhat.com/security/cve/CVE-2022-0918CVE-2022-0918CVE-2022-0918https://access.redhat.com/security/cve/CVE-2022-0996CVE-2022-0996CVE-2022-0996https://access.redhat.com/security/cve/CVE-2022-2850CVE-2022-2850CVE-2022-2850https://bugzilla.redhat.com/20558152055815https://bugzilla.redhat.com/20647692064769https://bugzilla.redhat.com/21186912118691https://errata.almalinux.org/9/ALSA-2022-8162.htmlALSA-2022:8162ALSA-2022:8162 s1389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpm 1python3-lib389-2.1.3-4.el9_1.noarch.rpmr1389-ds-base-2.1.3-4.el9_1.x86_64.rpms1389-ds-base-libs-2.1.3-4.el9_1.x86_64.rpm 1python3-lib389-2.1.3-4.el9_1.noarch.rpmr1389-ds-base-2.1.3-4.el9_1.x86_64.rpm܃f {BBBBsecurityModerate: libtiff security update2@https://access.redhat.com/errata/RHSA-2022:8194RHSA-2022:8194RHSA-2022:8194 https://access.redhat.com/security/cve/CVE-2022-0561CVE-2022-0561CVE-2022-0561https://access.redhat.com/security/cve/CVE-2022-0562CVE-2022-0562CVE-2022-0562https://access.redhat.com/security/cve/CVE-2022-0865CVE-2022-0865CVE-2022-0865https://access.redhat.com/security/cve/CVE-2022-0891CVE-2022-0891CVE-2022-0891https://access.redhat.com/security/cve/CVE-2022-0908CVE-2022-0908CVE-2022-0908https://access.redhat.com/security/cve/CVE-2022-0909CVE-2022-0909CVE-2022-0909https://access.redhat.com/security/cve/CVE-2022-0924CVE-2022-0924CVE-2022-0924https://access.redhat.com/security/cve/CVE-2022-1354CVE-2022-1354CVE-2022-1354https://access.redhat.com/security/cve/CVE-2022-1355CVE-2022-1355CVE-2022-1355https://access.redhat.com/security/cve/CVE-2022-22844CVE-2022-22844CVE-2022-22844https://bugzilla.redhat.com/20426032042603https://bugzilla.redhat.com/20544942054494https://bugzilla.redhat.com/20544952054495https://bugzilla.redhat.com/20641452064145https://bugzilla.redhat.com/20641462064146https://bugzilla.redhat.com/20641482064148https://bugzilla.redhat.com/20644062064406https://bugzilla.redhat.com/20644112064411https://bugzilla.redhat.com/20744042074404https://bugzilla.redhat.com/20744152074415https://errata.almalinux.org/9/ALSA-2022-8194.htmlALSA-2022:8194ALSA-2022:8194 v|libtiff-devel-4.4.0-2.el9.x86_64.rpmu|libtiff-4.4.0-2.el9.i686.rpmu|libtiff-4.4.0-2.el9.x86_64.rpmv|libtiff-devel-4.4.0-2.el9.i686.rpmv|libtiff-devel-4.4.0-2.el9.x86_64.rpmu|libtiff-4.4.0-2.el9.i686.rpmu|libtiff-4.4.0-2.el9.x86_64.rpmv|libtiff-devel-4.4.0-2.el9.i686.rpmވg 4BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security, bug fix, and enhancement update2S<https://access.redhat.com/errata/RHSA-2022:8197RHSA-2022:8197RHSA-2022:8197 https://access.redhat.com/security/cve/CVE-2021-21708CVE-2021-21708CVE-2021-21708https://access.redhat.com/security/cve/CVE-2022-31625CVE-2022-31625CVE-2022-31625https://bugzilla.redhat.com/20558792055879https://bugzilla.redhat.com/20985212098521https://errata.almalinux.org/9/ALSA-2022-8197.htmlALSA-2022:8197ALSA-2022:8197 x>php-mbstring-8.0.20-3.el9.x86_64.rpml>php-common-8.0.20-3.el9.x86_64.rpm>php-8.0.20-3.el9.x86_64.rpm}>php-pgsql-8.0.20-3.el9.x86_64.rpmp>php-embedded-8.0.20-3.el9.x86_64.rpmr>php-ffi-8.0.20-3.el9.x86_64.rpmn>php-dbg-8.0.20-3.el9.x86_64.rpmo>php-devel-8.0.20-3.el9.x86_64.rpmq>php-enchant-8.0.20-3.el9.x86_64.rpmy>php-mysqlnd-8.0.20-3.el9.x86_64.rpm>php-xml-8.0.20-3.el9.x86_64.rpms>php-fpm-8.0.20-3.el9.x86_64.rpm|>php-pdo-8.0.20-3.el9.x86_64.rpm>php-snmp-8.0.20-3.el9.x86_64.rpmw>php-ldap-8.0.20-3.el9.x86_64.rpmu>php-gmp-8.0.20-3.el9.x86_64.rpmm>php-dba-8.0.20-3.el9.x86_64.rpmv>php-intl-8.0.20-3.el9.x86_64.rpmj>php-bcmath-8.0.20-3.el9.x86_64.rpmz>php-odbc-8.0.20-3.el9.x86_64.rpmt>php-gd-8.0.20-3.el9.x86_64.rpmk>php-cli-8.0.20-3.el9.x86_64.rpm>php-soap-8.0.20-3.el9.x86_64.rpm~>php-process-8.0.20-3.el9.x86_64.rpm{>php-opcache-8.0.20-3.el9.x86_64.rpmx>php-mbstring-8.0.20-3.el9.x86_64.rpml>php-common-8.0.20-3.el9.x86_64.rpm>php-8.0.20-3.el9.x86_64.rpm}>php-pgsql-8.0.20-3.el9.x86_64.rpmp>php-embedded-8.0.20-3.el9.x86_64.rpmr>php-ffi-8.0.20-3.el9.x86_64.rpmn>php-dbg-8.0.20-3.el9.x86_64.rpmo>php-devel-8.0.20-3.el9.x86_64.rpmq>php-enchant-8.0.20-3.el9.x86_64.rpmy>php-mysqlnd-8.0.20-3.el9.x86_64.rpm>php-xml-8.0.20-3.el9.x86_64.rpms>php-fpm-8.0.20-3.el9.x86_64.rpm|>php-pdo-8.0.20-3.el9.x86_64.rpm>php-snmp-8.0.20-3.el9.x86_64.rpmw>php-ldap-8.0.20-3.el9.x86_64.rpmu>php-gmp-8.0.20-3.el9.x86_64.rpmm>php-dba-8.0.20-3.el9.x86_64.rpmv>php-intl-8.0.20-3.el9.x86_64.rpmj>php-bcmath-8.0.20-3.el9.x86_64.rpmz>php-odbc-8.0.20-3.el9.x86_64.rpmt>php-gd-8.0.20-3.el9.x86_64.rpmk>php-cli-8.0.20-3.el9.x86_64.rpm>php-soap-8.0.20-3.el9.x86_64.rpm~>php-process-8.0.20-3.el9.x86_64.rpm{>php-opcache-8.0.20-3.el9.x86_64.rpm5h 8uBsecurityLow: openjpeg2 security update23https://access.redhat.com/errata/RHSA-2022:8207RHSA-2022:8207RHSA-2022:8207 https://access.redhat.com/security/cve/CVE-2022-1122CVE-2022-1122CVE-2022-1122https://bugzilla.redhat.com/20670522067052https://errata.almalinux.org/9/ALSA-2022-8207.htmlALSA-2022:8207ALSA-2022:8207 openjpeg2-2.4.0-7.el9.i686.rpmopenjpeg2-2.4.0-7.el9.x86_64.rpmopenjpeg2-2.4.0-7.el9.i686.rpmopenjpeg2-2.4.0-7.el9.x86_64.rpmވYi yBBBBBBsecurityModerate: dovecot security and enhancement update2*Zhttps://access.redhat.com/errata/RHSA-2022:8208RHSA-2022:8208RHSA-2022:8208 https://access.redhat.com/security/cve/CVE-2022-30550CVE-2022-30550CVE-2022-30550https://bugzilla.redhat.com/21050702105070https://errata.almalinux.org/9/ALSA-2022-8208.htmlALSA-2022:8208ALSA-2022:8208 0dovecot-pgsql-2.3.16-7.el9.x86_64.rpm0dovecot-mysql-2.3.16-7.el9.x86_64.rpm0dovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm0dovecot-2.3.16-7.el9.x86_64.rpm0dovecot-pgsql-2.3.16-7.el9.x86_64.rpm0dovecot-mysql-2.3.16-7.el9.x86_64.rpm0dovecot-pigeonhole-2.3.16-7.el9.x86_64.rpm0dovecot-2.3.16-7.el9.x86_64.rpmij BsecurityModerate: mutt security update2dhttps://access.redhat.com/errata/RHSA-2022:8219RHSA-2022:8219RHSA-2022:8219 https://access.redhat.com/security/cve/CVE-2022-1328CVE-2022-1328CVE-2022-1328https://bugzilla.redhat.com/20760582076058https://errata.almalinux.org/9/ALSA-2022-8219.htmlALSA-2022:8219ALSA-2022:8219 Ammutt-2.2.6-1.el9.x86_64.rpmAmmutt-2.2.6-1.el9.x86_64.rpm-k EBBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update2hZhttps://access.redhat.com/errata/RHSA-2022:8221RHSA-2022:8221RHSA-2022:8221 https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8221.htmlALSA-2022:8221ALSA-2022:8221  xorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpm$ xorg-x11-server-common-1.20.11-11.el9.x86_64.rpm" xorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpm xorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpm xorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpm! xorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpm xorg-x11-server-Xdmx-1.20.11-11.el9.x86_64.rpm$ xorg-x11-server-common-1.20.11-11.el9.x86_64.rpm" xorg-x11-server-Xvfb-1.20.11-11.el9.x86_64.rpm xorg-x11-server-Xephyr-1.20.11-11.el9.x86_64.rpm xorg-x11-server-Xnest-1.20.11-11.el9.x86_64.rpm! xorg-x11-server-Xorg-1.20.11-11.el9.x86_64.rpm'l RsecurityModerate: xorg-x11-server-Xwayland security update2Bkhttps://access.redhat.com/errata/RHSA-2022:8222RHSA-2022:8222RHSA-2022:8222 https://access.redhat.com/security/cve/CVE-2022-2319CVE-2022-2319CVE-2022-2319https://access.redhat.com/security/cve/CVE-2022-2320CVE-2022-2320CVE-2022-2320https://bugzilla.redhat.com/21066712106671https://bugzilla.redhat.com/21066832106683https://errata.almalinux.org/9/ALSA-2022-8222.htmlALSA-2022:8222ALSA-2022:8222 #xorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpm#xorg-x11-server-Xwayland-21.1.3-3.el9.x86_64.rpmDm UsecurityModerate: python-lxml security update2-https://access.redhat.com/errata/RHSA-2022:8226RHSA-2022:8226RHSA-2022:8226 https://access.redhat.com/security/cve/CVE-2022-2309CVE-2022-2309CVE-2022-2309https://bugzilla.redhat.com/21075712107571https://errata.almalinux.org/9/ALSA-2022-8226.htmlALSA-2022:8226ALSA-2022:8226 tPpython3-lxml-4.6.5-3.el9.x86_64.rpmtPpython3-lxml-4.6.5-3.el9.x86_64.rpm۾n XsecurityModerate: grafana-pcp security update2>https://access.redhat.com/errata/RHSA-2022:8250RHSA-2022:8250RHSA-2022:8250 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30631CVE-2022-30631CVE-2022-30631https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148CVE-2022-32148https://bugzilla.redhat.com/21073422107342https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://errata.almalinux.org/9/ALSA-2022-8250.htmlALSA-2022:8250ALSA-2022:8250 d3grafana-pcp-3.2.0-3.el9.x86_64.rpmd3grafana-pcp-3.2.0-3.el9.x86_64.rpmۻ9o [securityModerate: yajl security update2?Uhttps://access.redhat.com/errata/RHSA-2022:8252RHSA-2022:8252RHSA-2022:8252 https://access.redhat.com/security/cve/CVE-2022-24795CVE-2022-24795CVE-2022-24795https://bugzilla.redhat.com/20729122072912https://errata.almalinux.org/9/ALSA-2022-8252.htmlALSA-2022:8252ALSA-2022:8252 -yajl-2.1.0-21.el9.x86_64.rpm-yajl-2.1.0-21.el9.x86_64.rpm3p %^BBBBBsecurityImportant: dpdk security and bug fix update2)https://access.redhat.com/errata/RHSA-2022:8263RHSA-2022:8263RHSA-2022:8263 https://access.redhat.com/security/cve/CVE-2021-3839CVE-2021-3839CVE-2021-3839https://access.redhat.com/security/cve/CVE-2022-2132CVE-2022-2132CVE-2022-2132https://access.redhat.com/security/cve/CVE-2022-28199CVE-2022-28199CVE-2022-28199https://bugzilla.redhat.com/20258822025882https://bugzilla.redhat.com/20994752099475https://bugzilla.redhat.com/21235492123549https://errata.almalinux.org/9/ALSA-2022-8263.htmlALSA-2022:8263ALSA-2022:8263 dpdk-doc-21.11.2-1.el9_1.noarch.rpmdpdk-tools-21.11.2-1.el9_1.x86_64.rpmdpdk-21.11.2-1.el9_1.x86_64.rpmdpdk-devel-21.11.2-1.el9_1.x86_64.rpmdpdk-doc-21.11.2-1.el9_1.noarch.rpmdpdk-tools-21.11.2-1.el9_1.x86_64.rpmdpdk-21.11.2-1.el9_1.x86_64.rpmdpdk-devel-21.11.2-1.el9_1.x86_64.rpm۹q 3fBBBBBBBBBBBsecurityModerate: kernel security, bug fix, and enhancement update2=?https://access.redhat.com/errata/RHSA-2022:8267RHSA-2022:8267RHSA-2022:8267 https://access.redhat.com/security/cve/CVE-2020-36516CVE-2020-36516CVE-2020-36516https://access.redhat.com/security/cve/CVE-2021-3640CVE-2021-3640CVE-2021-3640https://access.redhat.com/security/cve/CVE-2022-0168CVE-2022-0168CVE-2022-0168https://access.redhat.com/security/cve/CVE-2022-0617CVE-2022-0617CVE-2022-0617https://access.redhat.com/security/cve/CVE-2022-0854CVE-2022-0854CVE-2022-0854https://access.redhat.com/security/cve/CVE-2022-1016CVE-2022-1016CVE-2022-1016https://access.redhat.com/security/cve/CVE-2022-1048CVE-2022-1048CVE-2022-1048https://access.redhat.com/security/cve/CVE-2022-1184CVE-2022-1184CVE-2022-1184https://access.redhat.com/security/cve/CVE-2022-1280CVE-2022-1280CVE-2022-1280https://access.redhat.com/security/cve/CVE-2022-1353CVE-2022-1353CVE-2022-1353https://access.redhat.com/security/cve/CVE-2022-1679CVE-2022-1679CVE-2022-1679https://access.redhat.com/security/cve/CVE-2022-1852CVE-2022-1852CVE-2022-1852https://access.redhat.com/security/cve/CVE-2022-1998CVE-2022-1998CVE-2022-1998https://access.redhat.com/security/cve/CVE-2022-20368CVE-2022-20368CVE-2022-20368https://access.redhat.com/security/cve/CVE-2022-21123CVE-2022-21123CVE-2022-21123https://access.redhat.com/security/cve/CVE-2022-21125CVE-2022-21125CVE-2022-21125https://access.redhat.com/security/cve/CVE-2022-21166CVE-2022-21166CVE-2022-21166https://access.redhat.com/security/cve/CVE-2022-21499CVE-2022-21499CVE-2022-21499https://access.redhat.com/security/cve/CVE-2022-23816CVE-2022-23816CVE-2022-23816https://access.redhat.com/security/cve/CVE-2022-23825CVE-2022-23825CVE-2022-23825https://access.redhat.com/security/cve/CVE-2022-24448CVE-2022-24448CVE-2022-24448https://access.redhat.com/security/cve/CVE-2022-2586CVE-2022-2586CVE-2022-2586https://access.redhat.com/security/cve/CVE-2022-26373CVE-2022-26373CVE-2022-26373https://access.redhat.com/security/cve/CVE-2022-2639CVE-2022-2639CVE-2022-2639https://access.redhat.com/security/cve/CVE-2022-28390CVE-2022-28390CVE-2022-28390https://access.redhat.com/security/cve/CVE-2022-28893CVE-2022-28893CVE-2022-28893https://access.redhat.com/security/cve/CVE-2022-29581CVE-2022-29581CVE-2022-29581https://access.redhat.com/security/cve/CVE-2022-29900CVE-2022-29900CVE-2022-29900https://access.redhat.com/security/cve/CVE-2022-29901CVE-2022-29901CVE-2022-29901https://access.redhat.com/security/cve/CVE-2022-36946CVE-2022-36946CVE-2022-36946https://access.redhat.com/security/cve/CVE-2022-39190CVE-2022-39190CVE-2022-39190https://bugzilla.redhat.com/19806461980646https://bugzilla.redhat.com/20373862037386https://bugzilla.redhat.com/20514442051444https://bugzilla.redhat.com/20523122052312https://bugzilla.redhat.com/20536322053632https://bugzilla.redhat.com/20583952058395https://bugzilla.redhat.com/20599282059928https://bugzilla.redhat.com/20666142066614https://bugzilla.redhat.com/20667062066706https://bugzilla.redhat.com/20668192066819https://bugzilla.redhat.com/20702052070205https://bugzilla.redhat.com/20710222071022https://bugzilla.redhat.com/20730642073064https://bugzilla.redhat.com/20742082074208https://bugzilla.redhat.com/20841252084125https://bugzilla.redhat.com/20841832084183https://bugzilla.redhat.com/20844792084479https://bugzilla.redhat.com/20880212088021https://bugzilla.redhat.com/20898152089815https://bugzilla.redhat.com/20902262090226https://bugzilla.redhat.com/20902372090237https://bugzilla.redhat.com/20902402090240https://bugzilla.redhat.com/20902412090241https://bugzilla.redhat.com/21031482103148https://bugzilla.redhat.com/21031532103153https://bugzilla.redhat.com/21148782114878https://bugzilla.redhat.com/21150652115065https://bugzilla.redhat.com/21152782115278https://bugzilla.redhat.com/21236952123695https://bugzilla.redhat.com/21291522129152https://errata.almalinux.org/9/ALSA-2022-8267.htmlALSA-2022:8267ALSA-2022:8267 (>kernel-headers-5.14.0-162.6.1.el9_1.x86_64.rpm>kernel-doc-5.14.0-162.6.1.el9_1.noarch.rpm!>kernel-debug-devel-5.14.0-162.6.1.el9_1.x86_64.rpm">kernel-debug-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm#>kernel-devel-5.14.0-162.6.1.el9_1.x86_64.rpm$>kernel-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm%>perf-5.14.0-162.6.1.el9_1.x86_64.rpm(>kernel-headers-5.14.0-162.6.1.el9_1.x86_64.rpm>kernel-doc-5.14.0-162.6.1.el9_1.noarch.rpm!>kernel-debug-devel-5.14.0-162.6.1.el9_1.x86_64.rpm">kernel-debug-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm#>kernel-devel-5.14.0-162.6.1.el9_1.x86_64.rpm$>kernel-devel-matched-5.14.0-162.6.1.el9_1.x86_64.rpm%>perf-5.14.0-162.6.1.el9_1.x86_64.rpm۰Nr 54securityModerate: rsync security and bug fix update2@zhttps://access.redhat.com/errata/RHSA-2022:8291RHSA-2022:8291RHSA-2022:8291 https://access.redhat.com/security/cve/CVE-2022-37434CVE-2022-37434CVE-2022-37434https://bugzilla.redhat.com/21166392116639https://errata.almalinux.org/9/ALSA-2022-8291.htmlALSA-2022:8291ALSA-2022:8291 0rsync-daemon-3.2.3-18.el9.noarch.rpm0rsync-daemon-3.2.3-18.el9.noarch.rpmۨ@s 9vBsecurityLow: curl security update23:8https://access.redhat.com/errata/RHSA-2022:8299RHSA-2022:8299RHSA-2022:8299 https://access.redhat.com/security/cve/CVE-2022-27775CVE-2022-27775CVE-2022-27775https://bugzilla.redhat.com/20783882078388https://errata.almalinux.org/9/ALSA-2022-8299.htmlALSA-2022:8299ALSA-2022:8299  Qlibcurl-devel-7.76.1-19.el9.x86_64.rpm Qlibcurl-devel-7.76.1-19.el9.i686.rpm Qlibcurl-devel-7.76.1-19.el9.x86_64.rpm Qlibcurl-devel-7.76.1-19.el9.i686.rpmދt zBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update2rmhttps://access.redhat.com/errata/RHSA-2022:8317RHSA-2022:8317RHSA-2022:8317 https://access.redhat.com/security/cve/CVE-2022-32742CVE-2022-32742CVE-2022-32742https://bugzilla.redhat.com/21081962108196https://errata.almalinux.org/9/ALSA-2022-8317.htmlALSA-2022:8317ALSA-2022:8317 ,+samba-client-4.16.4-101.el9.x86_64.rpm-+samba-krb5-printing-4.16.4-101.el9.x86_64.rpm/+samba-winbind-clients-4.16.4-101.el9.x86_64.rpm1+samba-winexe-4.16.4-101.el9.x86_64.rpm.+samba-vfs-iouring-4.16.4-101.el9.x86_64.rpm0+samba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpm,+samba-client-4.16.4-101.el9.x86_64.rpm-+samba-krb5-printing-4.16.4-101.el9.x86_64.rpm/+samba-winbind-clients-4.16.4-101.el9.x86_64.rpm1+samba-winexe-4.16.4-101.el9.x86_64.rpm.+samba-vfs-iouring-4.16.4-101.el9.x86_64.rpm0+samba-winbind-krb5-locator-4.16.4-101.el9.x86_64.rpmۓ<u GBsecurityModerate: freetype security update2_Ohttps://access.redhat.com/errata/RHSA-2022:8340RHSA-2022:8340RHSA-2022:8340 https://access.redhat.com/security/cve/CVE-2022-27404CVE-2022-27404CVE-2022-27404https://access.redhat.com/security/cve/CVE-2022-27405CVE-2022-27405CVE-2022-27405https://access.redhat.com/security/cve/CVE-2022-27406CVE-2022-27406CVE-2022-27406https://bugzilla.redhat.com/20779852077985https://bugzilla.redhat.com/20779892077989https://bugzilla.redhat.com/20779912077991https://errata.almalinux.org/9/ALSA-2022-8340.htmlALSA-2022:8340ALSA-2022:8340 tfreetype-devel-2.10.4-9.el9.x86_64.rpmtfreetype-devel-2.10.4-9.el9.i686.rpmtfreetype-devel-2.10.4-9.el9.x86_64.rpmtfreetype-devel-2.10.4-9.el9.i686.rpmތ/v KBBBBsecurityModerate: python3.9 security, bug fix, and enhancement update2.5https://access.redhat.com/errata/RHSA-2022:8353RHSA-2022:8353RHSA-2022:8353 https://access.redhat.com/security/cve/CVE-2015-20107CVE-2015-20107CVE-2015-20107https://access.redhat.com/security/cve/CVE-2021-28861CVE-2021-28861CVE-2021-28861https://bugzilla.redhat.com/20753902075390https://bugzilla.redhat.com/21206422120642https://errata.almalinux.org/9/ALSA-2022-8353.htmlALSA-2022:8353ALSA-2022:8353 1]python3-tkinter-3.9.14-1.el9.x86_64.rpmg]python-unversioned-command-3.9.14-1.el9.noarch.rpmR]python3-devel-3.9.14-1.el9.x86_64.rpmR]python3-devel-3.9.14-1.el9.i686.rpm1]python3-tkinter-3.9.14-1.el9.x86_64.rpmg]python-unversioned-command-3.9.14-1.el9.noarch.rpmR]python3-devel-3.9.14-1.el9.x86_64.rpmR]python3-devel-3.9.14-1.el9.i686.rpmތ?w RBBBBsecurityModerate: e2fsprogs security update2c<https://access.redhat.com/errata/RHSA-2022:8361RHSA-2022:8361RHSA-2022:8361 https://access.redhat.com/security/cve/CVE-2022-1304CVE-2022-1304CVE-2022-1304https://bugzilla.redhat.com/20697262069726https://errata.almalinux.org/9/ALSA-2022-8361.htmlALSA-2022:8361ALSA-2022:8361 q<e2fsprogs-devel-1.46.5-3.el9.x86_64.rpmq<e2fsprogs-devel-1.46.5-3.el9.i686.rpm<libcom_err-devel-1.46.5-3.el9.i686.rpm<libcom_err-devel-1.46.5-3.el9.x86_64.rpmq<e2fsprogs-devel-1.46.5-3.el9.x86_64.rpmq<e2fsprogs-devel-1.46.5-3.el9.i686.rpm<libcom_err-devel-1.46.5-3.el9.i686.rpm<libcom_err-devel-1.46.5-3.el9.x86_64.rpmux YBBBBsecurityModerate: harfbuzz security update2uhttps://access.redhat.com/errata/RHSA-2022:8384RHSA-2022:8384RHSA-2022:8384 https://access.redhat.com/security/cve/CVE-2022-33068CVE-2022-33068CVE-2022-33068https://bugzilla.redhat.com/21026082102608https://errata.almalinux.org/9/ALSA-2022-8384.htmlALSA-2022:8384ALSA-2022:8384 bKharfbuzz-devel-2.7.4-8.el9.i686.rpmcKharfbuzz-icu-2.7.4-8.el9.x86_64.rpmbKharfbuzz-devel-2.7.4-8.el9.x86_64.rpmcKharfbuzz-icu-2.7.4-8.el9.i686.rpmbKharfbuzz-devel-2.7.4-8.el9.i686.rpmcKharfbuzz-icu-2.7.4-8.el9.x86_64.rpmbKharfbuzz-devel-2.7.4-8.el9.x86_64.rpmcKharfbuzz-icu-2.7.4-8.el9.i686.rpmލy -`BBBBBBBBBBBsecurityLow: podman security, bug fix, and enhancement update23https://access.redhat.com/errata/RHSA-2022:8431RHSA-2022:8431RHSA-2022:8431 https://access.redhat.com/security/cve/CVE-2022-2989CVE-2022-2989CVE-2022-2989https://access.redhat.com/security/cve/CVE-2022-2990CVE-2022-2990CVE-2022-2990https://bugzilla.redhat.com/21214452121445https://bugzilla.redhat.com/21214532121453https://errata.almalinux.org/9/ALSA-2022-8431.htmlALSA-2022:8431ALSA-2022:8431 /=podman-remote-4.2.0-7.el9_1.x86_64.rpm-=podman-4.2.0-7.el9_1.x86_64.rpmf=podman-docker-4.2.0-7.el9_1.noarch.rpm.=podman-plugins-4.2.0-7.el9_1.x86_64.rpm =podman-gvproxy-4.2.0-7.el9_1.x86_64.rpmf=podman-catatonit-4.2.0-7.el9_1.x86_64.rpm0=podman-tests-4.2.0-7.el9_1.x86_64.rpm/=podman-remote-4.2.0-7.el9_1.x86_64.rpm-=podman-4.2.0-7.el9_1.x86_64.rpmf=podman-docker-4.2.0-7.el9_1.noarch.rpm.=podman-plugins-4.2.0-7.el9_1.x86_64.rpm =podman-gvproxy-4.2.0-7.el9_1.x86_64.rpmf=podman-catatonit-4.2.0-7.el9_1.x86_64.rpm0=podman-tests-4.2.0-7.el9_1.x86_64.rpmz nBBBBBBBBBBBBBBBBBBsecurityModerate: dotnet7.0 security, bug fix, and enhancement update23Ihttps://access.redhat.com/errata/RHSA-2022:8434RHSA-2022:8434RHSA-2022:8434 https://access.redhat.com/security/cve/CVE-2022-41032CVE-2022-41032CVE-2022-41032https://bugzilla.redhat.com/21326142132614https://errata.almalinux.org/9/ALSA-2022-8434.htmlALSA-2022:8434ALSA-2022:8434 f.dotnet-apphost-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm.dotnet-host-7.0.0-0.5.rc2.el9_1.x86_64.rpm dnetstandard-targeting-pack-2.1-7.0.100-0.5.rc2.el9_1.x86_64.rpmkddotnet-templates-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpmd.aspnetcore-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmg.dotnet-hostfxr-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmh.dotnet-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmj.dotnet-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmiddotnet-sdk-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpme.aspnetcore-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm f.dotnet-apphost-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm.dotnet-host-7.0.0-0.5.rc2.el9_1.x86_64.rpm dnetstandard-targeting-pack-2.1-7.0.100-0.5.rc2.el9_1.x86_64.rpmkddotnet-templates-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpmd.aspnetcore-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmg.dotnet-hostfxr-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmh.dotnet-runtime-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmj.dotnet-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpmiddotnet-sdk-7.0-7.0.100-0.5.rc2.el9_1.x86_64.rpme.aspnetcore-targeting-pack-7.0-7.0.0-0.5.rc2.el9_1.x86_64.rpm]{ CBBBBBBBBBBBsecurityModerate: keylime security update2|https://access.redhat.com/errata/RHSA-2022:8444RHSA-2022:8444RHSA-2022:8444 https://access.redhat.com/security/cve/CVE-2022-3500CVE-2022-3500CVE-2022-3500https://bugzilla.redhat.com/21353432135343https://errata.almalinux.org/9/ALSA-2022-8444.htmlALSA-2022:8444ALSA-2022:8444 Bkeylime-selinux-6.5.1-1.el9_1.noarch.rpmzBkeylime-6.5.1-1.el9_1.x86_64.rpm Bpython3-keylime-6.5.1-1.el9_1.x86_64.rpm|Bkeylime-registrar-6.5.1-1.el9_1.x86_64.rpm{Bkeylime-base-6.5.1-1.el9_1.x86_64.rpm}Bkeylime-tenant-6.5.1-1.el9_1.x86_64.rpm~Bkeylime-verifier-6.5.1-1.el9_1.x86_64.rpmBkeylime-selinux-6.5.1-1.el9_1.noarch.rpmzBkeylime-6.5.1-1.el9_1.x86_64.rpm Bpython3-keylime-6.5.1-1.el9_1.x86_64.rpm|Bkeylime-registrar-6.5.1-1.el9_1.x86_64.rpm{Bkeylime-base-6.5.1-1.el9_1.x86_64.rpm}Bkeylime-tenant-6.5.1-1.el9_1.x86_64.rpm~Bkeylime-verifier-6.5.1-1.el9_1.x86_64.rpm'| QBBBBsecurityImportant: python3.9 security update2Qhttps://access.redhat.com/errata/RHSA-2022:8493RHSA-2022:8493RHSA-2022:8493 https://access.redhat.com/security/cve/CVE-2022-42919CVE-2022-42919CVE-2022-42919https://bugzilla.redhat.com/21387052138705https://errata.almalinux.org/9/ALSA-2022-8493.htmlALSA-2022:8493ALSA-2022:8493 g^python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpmR^python3-devel-3.9.14-1.el9_1.1.i686.rpmR^python3-devel-3.9.14-1.el9_1.1.x86_64.rpm1^python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpmg^python-unversioned-command-3.9.14-1.el9_1.1.noarch.rpmR^python3-devel-3.9.14-1.el9_1.1.i686.rpmR^python3-devel-3.9.14-1.el9_1.1.x86_64.rpm1^python3-tkinter-3.9.14-1.el9_1.1.x86_64.rpmz} XsecurityImportant: thunderbird security update2`Dhttps://access.redhat.com/errata/RHSA-2022:8561RHSA-2022:8561RHSA-2022:8561 https://access.redhat.com/security/cve/CVE-2022-45403CVE-2022-45403CVE-2022-45403https://access.redhat.com/security/cve/CVE-2022-45404CVE-2022-45404CVE-2022-45404https://access.redhat.com/security/cve/CVE-2022-45405CVE-2022-45405CVE-2022-45405https://access.redhat.com/security/cve/CVE-2022-45406CVE-2022-45406CVE-2022-45406https://access.redhat.com/security/cve/CVE-2022-45408CVE-2022-45408CVE-2022-45408https://access.redhat.com/security/cve/CVE-2022-45409CVE-2022-45409CVE-2022-45409https://access.redhat.com/security/cve/CVE-2022-45410CVE-2022-45410CVE-2022-45410https://access.redhat.com/security/cve/CVE-2022-45411CVE-2022-45411CVE-2022-45411https://access.redhat.com/security/cve/CVE-2022-45412CVE-2022-45412CVE-2022-45412https://access.redhat.com/security/cve/CVE-2022-45416CVE-2022-45416CVE-2022-45416https://access.redhat.com/security/cve/CVE-2022-45418CVE-2022-45418CVE-2022-45418https://access.redhat.com/security/cve/CVE-2022-45420CVE-2022-45420CVE-2022-45420https://access.redhat.com/security/cve/CVE-2022-45421CVE-2022-45421CVE-2022-45421https://bugzilla.redhat.com/21431972143197https://bugzilla.redhat.com/21431982143198https://bugzilla.redhat.com/21431992143199https://bugzilla.redhat.com/21432002143200https://bugzilla.redhat.com/21432012143201https://bugzilla.redhat.com/21432022143202https://bugzilla.redhat.com/21432032143203https://bugzilla.redhat.com/21432042143204https://bugzilla.redhat.com/21432052143205https://bugzilla.redhat.com/21432402143240https://bugzilla.redhat.com/21432412143241https://bugzilla.redhat.com/21432422143242https://bugzilla.redhat.com/21432432143243https://errata.almalinux.org/9/ALSA-2022-8561.htmlALSA-2022:8561ALSA-2022:8561 9/thunderbird-102.5.0-2.el9_1.alma.x86_64.rpm9/thunderbird-102.5.0-2.el9_1.alma.x86_64.rpm}~^ [securityImportant: firefox security update2$uhttps://access.redhat.com/errata/RHSA-2022:8580RHSA-2022:8580RHSA-2022:8580 https://access.redhat.com/security/cve/CVE-2022-45403CVE-2022-45403CVE-2022-45403https://access.redhat.com/security/cve/CVE-2022-45404CVE-2022-45404CVE-2022-45404https://access.redhat.com/security/cve/CVE-2022-45405CVE-2022-45405CVE-2022-45405https://access.redhat.com/security/cve/CVE-2022-45406CVE-2022-45406CVE-2022-45406https://access.redhat.com/security/cve/CVE-2022-45408CVE-2022-45408CVE-2022-45408https://access.redhat.com/security/cve/CVE-2022-45409CVE-2022-45409CVE-2022-45409https://access.redhat.com/security/cve/CVE-2022-45410CVE-2022-45410CVE-2022-45410https://access.redhat.com/security/cve/CVE-2022-45411CVE-2022-45411CVE-2022-45411https://access.redhat.com/security/cve/CVE-2022-45412CVE-2022-45412CVE-2022-45412https://access.redhat.com/security/cve/CVE-2022-45416CVE-2022-45416CVE-2022-45416https://access.redhat.com/security/cve/CVE-2022-45418CVE-2022-45418CVE-2022-45418https://access.redhat.com/security/cve/CVE-2022-45420CVE-2022-45420CVE-2022-45420https://access.redhat.com/security/cve/CVE-2022-45421CVE-2022-45421CVE-2022-45421https://bugzilla.redhat.com/21431972143197https://bugzilla.redhat.com/21431982143198https://bugzilla.redhat.com/21431992143199https://bugzilla.redhat.com/21432002143200https://bugzilla.redhat.com/21432012143201https://bugzilla.redhat.com/21432022143202https://bugzilla.redhat.com/21432032143203https://bugzilla.redhat.com/21432042143204https://bugzilla.redhat.com/21432052143205https://bugzilla.redhat.com/21432402143240https://bugzilla.redhat.com/21432412143241https://bugzilla.redhat.com/21432422143242https://bugzilla.redhat.com/21432432143243https://errata.almalinux.org/9/ALSA-2022-8580.htmlALSA-2022:8580ALSA-2022:8580 7.firefox-102.5.0-1.el9_1.alma.x86_64.rpm7.firefox-102.5.0-1.el9_1.alma.x86_64.rpmR !^BsecurityImportant: krb5 security update2ghttps://access.redhat.com/errata/RHSA-2022:8637RHSA-2022:8637RHSA-2022:8637 https://access.redhat.com/security/cve/CVE-2022-42898CVE-2022-42898CVE-2022-42898https://bugzilla.redhat.com/21409602140960https://errata.almalinux.org/9/ALSA-2022-8637.htmlALSA-2022:8637ALSA-2022:8637 S{krb5-devel-1.19.1-24.el9_1.i686.rpmS{krb5-devel-1.19.1-24.el9_1.x86_64.rpmS{krb5-devel-1.19.1-24.el9_1.i686.rpmS{krb5-devel-1.19.1-24.el9_1.x86_64.rpm 'bBBBsecurityImportant: varnish security update2Vhttps://access.redhat.com/errata/RHSA-2022:8643RHSA-2022:8643RHSA-2022:8643 https://access.redhat.com/security/cve/CVE-2022-45060CVE-2022-45060CVE-2022-45060https://bugzilla.redhat.com/21418442141844https://errata.almalinux.org/9/ALSA-2022-8643.htmlALSA-2022:8643ALSA-2022:8643 Ovarnish-docs-6.6.2-2.el9_1.1.x86_64.rpm,Ovarnish-6.6.2-2.el9_1.1.i686.rpm,Ovarnish-6.6.2-2.el9_1.1.x86_64.rpmOvarnish-docs-6.6.2-2.el9_1.1.x86_64.rpm,Ovarnish-6.6.2-2.el9_1.1.i686.rpm,Ovarnish-6.6.2-2.el9_1.1.x86_64.rpm 2TBTBBBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement update2V}https://access.redhat.com/errata/RHSA-2022:8832RHSA-2022:8832RHSA-2022:8832 https://access.redhat.com/security/cve/CVE-2022-3517CVE-2022-3517CVE-2022-3517https://access.redhat.com/security/cve/CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/21346092134609https://bugzilla.redhat.com/21409112140911https://errata.almalinux.org/9/ALSA-2022-8832.htmlALSA-2022:8832ALSA-2022:8832 +n]'<nodejs-docs-18.12.1-1.module_el9.1.0+16+91bc168f.noarch.rpmk nodejs-nodemon-2.0.20-1.module_el9.1.0+16+91bc168f.noarch.rpmcrnpm-8.19.2-1.18.12.1.1.module_el9.1.0+16+91bc168f.x86_64.rpm!nodejs-devel-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmdnodejs-full-i18n-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm+nodejs-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm+n]'<nodejs-docs-18.12.1-1.module_el9.1.0+16+91bc168f.noarch.rpmk nodejs-nodemon-2.0.20-1.module_el9.1.0+16+91bc168f.noarch.rpmcrnpm-8.19.2-1.18.12.1.1.module_el9.1.0+16+91bc168f.x86_64.rpm!nodejs-devel-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmdnodejs-full-i18n-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm+nodejs-18.12.1-1.module_el9.1.0+16+91bc168f.x86_64.rpm7 5ssecurityImportant: firefox security update2S3https://access.redhat.com/errata/RHSA-2022:9065RHSA-2022:9065RHSA-2022:9065 https://access.redhat.com/security/cve/CVE-2022-46872CVE-2022-46872CVE-2022-46872https://access.redhat.com/security/cve/CVE-2022-46874CVE-2022-46874CVE-2022-46874https://access.redhat.com/security/cve/CVE-2022-46878CVE-2022-46878CVE-2022-46878https://access.redhat.com/security/cve/CVE-2022-46880CVE-2022-46880CVE-2022-46880https://access.redhat.com/security/cve/CVE-2022-46881CVE-2022-46881CVE-2022-46881https://access.redhat.com/security/cve/CVE-2022-46882CVE-2022-46882CVE-2022-46882https://bugzilla.redhat.com/21534412153441https://bugzilla.redhat.com/21534492153449https://bugzilla.redhat.com/21534542153454https://bugzilla.redhat.com/21534632153463https://bugzilla.redhat.com/21534662153466https://bugzilla.redhat.com/21534672153467https://errata.almalinux.org/9/ALSA-2022-9065.htmlALSA-2022:9065ALSA-2022:9065 70firefox-102.6.0-1.el9_1.alma.x86_64.rpm70firefox-102.6.0-1.el9_1.alma.x86_64.rpm: 8vsecurityImportant: thunderbird security update28https://access.redhat.com/errata/RHSA-2022:9080RHSA-2022:9080RHSA-2022:9080 https://access.redhat.com/security/cve/CVE-2022-45414CVE-2022-45414CVE-2022-45414https://access.redhat.com/security/cve/CVE-2022-46872CVE-2022-46872CVE-2022-46872https://access.redhat.com/security/cve/CVE-2022-46874CVE-2022-46874CVE-2022-46874https://access.redhat.com/security/cve/CVE-2022-46878CVE-2022-46878CVE-2022-46878https://access.redhat.com/security/cve/CVE-2022-46880CVE-2022-46880CVE-2022-46880https://access.redhat.com/security/cve/CVE-2022-46881CVE-2022-46881CVE-2022-46881https://access.redhat.com/security/cve/CVE-2022-46882CVE-2022-46882CVE-2022-46882https://bugzilla.redhat.com/21498682149868https://bugzilla.redhat.com/21534412153441https://bugzilla.redhat.com/21534492153449https://bugzilla.redhat.com/21534542153454https://bugzilla.redhat.com/21534632153463https://bugzilla.redhat.com/21534662153466https://bugzilla.redhat.com/21534672153467https://errata.almalinux.org/9/ALSA-2022-9080.htmlALSA-2022:9080ALSA-2022:9080 91thunderbird-102.6.0-2.el9_1.alma.x86_64.rpm91thunderbird-102.6.0-2.el9_1.alma.x86_64.rpm# :9securityImportant: bcel security update>lhttps://access.redhat.com/errata/RHSA-2023:0005RHSA-2023:0005RHSA-2023:0005 https://access.redhat.com/security/cve/CVE-2022-42920CVE-2022-42920CVE-2022-42920https://bugzilla.redhat.com/21427072142707https://errata.almalinux.org/9/ALSA-2023-0005.htmlALSA-2023:0005ALSA-2023:0005 ^Vbcel-6.4.1-9.el9_1.noarch.rpm^Vbcel-6.4.1-9.el9_1.noarch.rpme {BBBBBBBBBBsecurityImportant: webkit2gtk3 security update*https://access.redhat.com/errata/RHSA-2023:0021RHSA-2023:0021RHSA-2023:0021 https://access.redhat.com/security/cve/CVE-2022-42856CVE-2022-42856CVE-2022-42856https://bugzilla.redhat.com/21536832153683https://errata.almalinux.org/9/ALSA-2023-0021.htmlALSA-2023:0021ALSA-2023:0021 6webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm5webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm4webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm5webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm3webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm4webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm3webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.i686.rpm5webkit2gtk3-jsc-2.36.7-1.el9_1.1.i686.rpm4webkit2gtk3-devel-2.36.7-1.el9_1.1.i686.rpm5webkit2gtk3-jsc-2.36.7-1.el9_1.1.x86_64.rpm3webkit2gtk3-2.36.7-1.el9_1.1.x86_64.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_1.1.x86_64.rpm4webkit2gtk3-devel-2.36.7-1.el9_1.1.x86_64.rpm3webkit2gtk3-2.36.7-1.el9_1.1.i686.rpm  HBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security, bug fix, and enhancement updateD`https://access.redhat.com/errata/RHSA-2023:0077RHSA-2023:0077RHSA-2023:0077 https://access.redhat.com/security/cve/CVE-2023-21538CVE-2023-21538CVE-2023-21538https://bugzilla.redhat.com/21583422158342https://errata.almalinux.org/9/ALSA-2023-0077.htmlALSA-2023:0077ALSA-2023:0077 $3dotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm 3aspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm#3dotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpm%!dotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpm"3dotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpm!3aspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm'!dotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm&3dotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm$3dotnet-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm 3aspnetcore-runtime-6.0-6.0.13-1.el9_1.x86_64.rpm#3dotnet-hostfxr-6.0-6.0.13-1.el9_1.x86_64.rpm%!dotnet-sdk-6.0-6.0.113-1.el9_1.x86_64.rpm"3dotnet-apphost-pack-6.0-6.0.13-1.el9_1.x86_64.rpm!3aspnetcore-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm'!dotnet-templates-6.0-6.0.113-1.el9_1.x86_64.rpm&3dotnet-targeting-pack-6.0-6.0.13-1.el9_1.x86_64.rpm +YBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix update$Hhttps://access.redhat.com/errata/RHSA-2023:0194RHSA-2023:0194RHSA-2023:0194 https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0194.htmlALSA-2023:0194ALSA-2023:0194 /java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm,java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm.java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm)java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm0java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm*java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm+java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm(java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm /java-17-openjdk-src-17.0.6.0.10-3.el9_1.x86_64.rpm,java-17-openjdk-javadoc-17.0.6.0.10-3.el9_1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.6.0.10-3.el9_1.x86_64.rpm.java-17-openjdk-jmods-17.0.6.0.10-3.el9_1.x86_64.rpm)java-17-openjdk-demo-17.0.6.0.10-3.el9_1.x86_64.rpm0java-17-openjdk-static-libs-17.0.6.0.10-3.el9_1.x86_64.rpm*java-17-openjdk-devel-17.0.6.0.10-3.el9_1.x86_64.rpm+java-17-openjdk-headless-17.0.6.0.10-3.el9_1.x86_64.rpm(java-17-openjdk-17.0.6.0.10-3.el9_1.x86_64.rpm >lBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix updatellhttps://access.redhat.com/errata/RHSA-2023:0202RHSA-2023:0202RHSA-2023:0202 https://access.redhat.com/security/cve/CVE-2023-21835CVE-2023-21835CVE-2023-21835https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604212160421https://bugzilla.redhat.com/21604752160475https://errata.almalinux.org/9/ALSA-2023-0202.htmlALSA-2023:0202ALSA-2023:0202 * java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpm( java-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpm- java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpm& java-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpm+ java-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpm' java-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpm% java-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpm) java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpm, java-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm * java-11-openjdk-javadoc-zip-11.0.18.0.10-2.el9_1.x86_64.rpm( java-11-openjdk-headless-11.0.18.0.10-2.el9_1.x86_64.rpm- java-11-openjdk-static-libs-11.0.18.0.10-2.el9_1.x86_64.rpm& java-11-openjdk-demo-11.0.18.0.10-2.el9_1.x86_64.rpm+ java-11-openjdk-jmods-11.0.18.0.10-2.el9_1.x86_64.rpm' java-11-openjdk-devel-11.0.18.0.10-2.el9_1.x86_64.rpm% java-11-openjdk-11.0.18.0.10-2.el9_1.x86_64.rpm) java-11-openjdk-javadoc-11.0.18.0.10-2.el9_1.x86_64.rpm, java-11-openjdk-src-11.0.18.0.10-2.el9_1.x86_64.rpm  BBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix updateXxhttps://access.redhat.com/errata/RHSA-2023:0210RHSA-2023:0210RHSA-2023:0210 https://access.redhat.com/security/cve/CVE-2023-21830CVE-2023-21830CVE-2023-21830https://access.redhat.com/security/cve/CVE-2023-21843CVE-2023-21843CVE-2023-21843https://bugzilla.redhat.com/21604752160475https://bugzilla.redhat.com/21604902160490https://errata.almalinux.org/9/ALSA-2023-0210.htmlALSA-2023:0210ALSA-2023:0210 fXjava-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.x86_64.rpmeXjava-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.x86_64.rpmcXjava-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.x86_64.rpmdXjava-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.x86_64.rpmbXjava-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.x86_64.rpmBXjava-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpmCXjava-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpmfXjava-1.8.0-openjdk-src-1.8.0.362.b09-2.el9_1.x86_64.rpmeXjava-1.8.0-openjdk-headless-1.8.0.362.b09-2.el9_1.x86_64.rpmcXjava-1.8.0-openjdk-demo-1.8.0.362.b09-2.el9_1.x86_64.rpmdXjava-1.8.0-openjdk-devel-1.8.0.362.b09-2.el9_1.x86_64.rpmbXjava-1.8.0-openjdk-1.8.0.362.b09-2.el9_1.x86_64.rpmBXjava-1.8.0-openjdk-javadoc-1.8.0.362.b09-2.el9_1.noarch.rpmCXjava-1.8.0-openjdk-javadoc-zip-1.8.0.362.b09-2.el9_1.noarch.rpm  LsecurityImportant: sudo security updatePhttps://access.redhat.com/errata/RHSA-2023:0282RHSA-2023:0282RHSA-2023:0282 https://access.redhat.com/security/cve/CVE-2023-22809CVE-2023-22809CVE-2023-22809https://bugzilla.redhat.com/21611422161142https://errata.almalinux.org/9/ALSA-2023-0282.htmlALSA-2023:0282ALSA-2023:0282 b&sudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpmb&sudo-python-plugin-1.9.5p2-7.el9_1.1.x86_64.rpmO  OsecurityImportant: firefox security update^=https://access.redhat.com/errata/RHSA-2023:0285RHSA-2023:0285RHSA-2023:0285 https://access.redhat.com/security/cve/CVE-2022-46871CVE-2022-46871CVE-2022-46871https://access.redhat.com/security/cve/CVE-2022-46877CVE-2022-46877CVE-2022-46877https://access.redhat.com/security/cve/CVE-2023-23598CVE-2023-23598CVE-2023-23598https://access.redhat.com/security/cve/CVE-2023-23599CVE-2023-23599CVE-2023-23599https://access.redhat.com/security/cve/CVE-2023-23601CVE-2023-23601CVE-2023-23601https://access.redhat.com/security/cve/CVE-2023-23602CVE-2023-23602CVE-2023-23602https://access.redhat.com/security/cve/CVE-2023-23603CVE-2023-23603CVE-2023-23603https://access.redhat.com/security/cve/CVE-2023-23605CVE-2023-23605CVE-2023-23605https://bugzilla.redhat.com/21623362162336https://bugzilla.redhat.com/21623382162338https://bugzilla.redhat.com/21623392162339https://bugzilla.redhat.com/21623402162340https://bugzilla.redhat.com/21623412162341https://bugzilla.redhat.com/21623422162342https://bugzilla.redhat.com/21623432162343https://bugzilla.redhat.com/21623442162344https://errata.almalinux.org/9/ALSA-2023-0285.htmlALSA-2023:0285ALSA-2023:0285 72firefox-102.7.0-1.el9_1.alma.x86_64.rpm72firefox-102.7.0-1.el9_1.alma.x86_64.rpm  RBBBBsecurityModerate: libtiff security update{https://access.redhat.com/errata/RHSA-2023:0302RHSA-2023:0302RHSA-2023:0302 https://access.redhat.com/security/cve/CVE-2022-2056CVE-2022-2056CVE-2022-2056https://access.redhat.com/security/cve/CVE-2022-2057CVE-2022-2057CVE-2022-2057https://access.redhat.com/security/cve/CVE-2022-2058CVE-2022-2058CVE-2022-2058https://access.redhat.com/security/cve/CVE-2022-2519CVE-2022-2519CVE-2022-2519https://access.redhat.com/security/cve/CVE-2022-2520CVE-2022-2520CVE-2022-2520https://access.redhat.com/security/cve/CVE-2022-2521CVE-2022-2521CVE-2022-2521https://access.redhat.com/security/cve/CVE-2022-2953CVE-2022-2953CVE-2022-2953https://bugzilla.redhat.com/21032222103222https://bugzilla.redhat.com/21227892122789https://bugzilla.redhat.com/21227922122792https://bugzilla.redhat.com/21227992122799https://bugzilla.redhat.com/21344322134432https://errata.almalinux.org/9/ALSA-2023-0302.htmlALSA-2023:0302ALSA-2023:0302 v}libtiff-devel-4.4.0-5.el9_1.i686.rpmu}libtiff-4.4.0-5.el9_1.i686.rpmv}libtiff-devel-4.4.0-5.el9_1.x86_64.rpmu}libtiff-4.4.0-5.el9_1.x86_64.rpmv}libtiff-devel-4.4.0-5.el9_1.i686.rpmu}libtiff-4.4.0-5.el9_1.i686.rpmv}libtiff-devel-4.4.0-5.el9_1.x86_64.rpmu}libtiff-4.4.0-5.el9_1.x86_64.rpm  #YBBBBBBBBsecurityModerate: usbguard security update*https://access.redhat.com/errata/RHSA-2023:0303RHSA-2023:0303RHSA-2023:0303 https://access.redhat.com/security/cve/CVE-2019-25058CVE-2019-25058CVE-2019-25058https://bugzilla.redhat.com/20584652058465https://errata.almalinux.org/9/ALSA-2023-0303.htmlALSA-2023:0303ALSA-2023:0303 +musbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm)musbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpmLmusbguard-1.0.0-10.el9_1.2.i686.rpmLmusbguard-1.0.0-10.el9_1.2.x86_64.rpmYmusbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm*musbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm+musbguard-tools-1.0.0-10.el9_1.2.x86_64.rpm)musbguard-dbus-1.0.0-10.el9_1.2.x86_64.rpmLmusbguard-1.0.0-10.el9_1.2.i686.rpmLmusbguard-1.0.0-10.el9_1.2.x86_64.rpmYmusbguard-selinux-1.0.0-10.el9_1.2.noarch.rpm*musbguard-notifier-1.0.0-10.el9_1.2.x86_64.rpm dBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update@z https://access.redhat.com/errata/RHSA-2023:0304RHSA-2023:0304RHSA-2023:0304 https://access.redhat.com/security/cve/CVE-2022-26305CVE-2022-26305CVE-2022-26305https://access.redhat.com/security/cve/CVE-2022-26306CVE-2022-26306CVE-2022-26306https://access.redhat.com/security/cve/CVE-2022-26307CVE-2022-26307CVE-2022-26307https://access.redhat.com/security/cve/CVE-2022-3140CVE-2022-3140CVE-2022-3140https://bugzilla.redhat.com/21186102118610https://bugzilla.redhat.com/21186112118611https://bugzilla.redhat.com/21186132118613https://bugzilla.redhat.com/21346972134697https://errata.almalinux.org/9/ALSA-2023-0304.htmlALSA-2023:0304ALSA-2023:0304 0.libreoffice-help-da-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-pa-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-zu-7.1.8.1-8.el9_1.alma.x86_64.rpmbautocorr-lb-7.1.8.1-8.el9_1.alma.noarch.rpmPautocorr-cs-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-math-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-sk-7.1.8.1-8.el9_1.alma.x86_64.rpmgautocorr-pt-7.1.8.1-8.el9_1.alma.noarch.rpm^autocorr-is-7.1.8.1-8.el9_1.alma.noarch.rpm}libreoffice-langpack-ml-7.1.8.1-8.el9_1.alma.x86_64.rpmNautocorr-bg-7.1.8.1-8.el9_1.alma.noarch.rpm?libreoffice-help-id-7.1.8.1-8.el9_1.alma.x86_64.rpm&libreoffice-gdb-debug-support-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ta-7.1.8.1-8.el9_1.alma.x86_64.rpmolibreoffice-langpack-gu-7.1.8.1-8.el9_1.alma.x86_64.rpmlautocorr-sr-7.1.8.1-8.el9_1.alma.noarch.rpm2libreoffice-help-en-7.1.8.1-8.el9_1.alma.x86_64.rpmLlibreoffice-help-ru-7.1.8.1-8.el9_1.alma.x86_64.rpmhautocorr-ro-7.1.8.1-8.el9_1.alma.noarch.rpm/libreoffice-help-de-7.1.8.1-8.el9_1.alma.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-8.el9_1.alma.x86_64.rpmnautocorr-tr-7.1.8.1-8.el9_1.alma.noarch.rpmjautocorr-sk-7.1.8.1-8.el9_1.alma.noarch.rpm%libreoffice-x11-7.1.8.1-8.el9_1.alma.x86_64.rpm)libreoffice-help-ar-7.1.8.1-8.el9_1.alma.x86_64.rpmalibreoffice-langpack-de-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-st-7.1.8.1-8.el9_1.alma.x86_64.rpmkautocorr-sl-7.1.8.1-8.el9_1.alma.noarch.rpm libreoffice-pdfimport-7.1.8.1-8.el9_1.alma.x86_64.rpmRlibreoffice-help-tr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-ure-common-7.1.8.1-8.el9_1.alma.noarch.rpmklibreoffice-langpack-fr-7.1.8.1-8.el9_1.alma.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm$libreoffice-writer-7.1.8.1-8.el9_1.alma.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-8.el9_1.alma.x86_64.rpmTlibreoffice-help-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpmxlibreoffice-langpack-kn-7.1.8.1-8.el9_1.alma.x86_64.rpm:libreoffice-help-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-8.el9_1.alma.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-8.el9_1.alma.x86_64.rpm5libreoffice-help-et-7.1.8.1-8.el9_1.alma.x86_64.rpm7libreoffice-help-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-xh-7.1.8.1-8.el9_1.alma.x86_64.rpmFlibreoffice-help-nl-7.1.8.1-8.el9_1.alma.x86_64.rpmoautocorr-vi-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-nl-7.1.8.1-8.el9_1.alma.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-8.el9_1.alma.x86_64.rpm,libreoffice-help-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmWlibreoffice-langpack-af-7.1.8.1-8.el9_1.alma.x86_64.rpmmautocorr-sv-7.1.8.1-8.el9_1.alma.noarch.rpm libreoffice-langpack-ro-7.1.8.1-8.el9_1.alma.x86_64.rpm+libreoffice-help-bn-7.1.8.1-8.el9_1.alma.x86_64.rpmOlibreoffice-help-sl-7.1.8.1-8.el9_1.alma.x86_64.rpmZautocorr-ga-7.1.8.1-8.el9_1.alma.noarch.rpmslibreoffice-langpack-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-sl-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-8.el9_1.alma.x86_64.rpm=libreoffice-help-hr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-tr-7.1.8.1-8.el9_1.alma.x86_64.rpm'libreofficekit-7.1.8.1-8.el9_1.alma.x86_64.rpmflibreoffice-langpack-es-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpm8libreoffice-help-fr-7.1.8.1-8.el9_1.alma.x86_64.rpm#libreoffice-draw-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-8.el9_1.alma.x86_64.rpmDlibreoffice-help-lv-7.1.8.1-8.el9_1.alma.x86_64.rpmfautocorr-pl-7.1.8.1-8.el9_1.alma.noarch.rpmBlibreoffice-help-ko-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ss-7.1.8.1-8.el9_1.alma.x86_64.rpm_libreoffice-langpack-cy-7.1.8.1-8.el9_1.alma.x86_64.rpmOautocorr-ca-7.1.8.1-8.el9_1.alma.noarch.rpmvlibreoffice-langpack-ja-7.1.8.1-8.el9_1.alma.x86_64.rpm^libreoffice-langpack-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmWautocorr-fa-7.1.8.1-8.el9_1.alma.noarch.rpmSautocorr-dsb-7.1.8.1-8.el9_1.alma.noarch.rpmIlibreoffice-help-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-8.el9_1.alma.x86_64.rpmwlibreoffice-langpack-kk-7.1.8.1-8.el9_1.alma.x86_64.rpm4libreoffice-help-es-7.1.8.1-8.el9_1.alma.x86_64.rpm$libreoffice-emailmerge-7.1.8.1-8.el9_1.alma.x86_64.rpm~libreoffice-langpack-mr-7.1.8.1-8.el9_1.alma.x86_64.rpm]libreoffice-langpack-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmQautocorr-da-7.1.8.1-8.el9_1.alma.noarch.rpmHlibreoffice-help-pl-7.1.8.1-8.el9_1.alma.x86_64.rpmplibreoffice-langpack-he-7.1.8.1-8.el9_1.alma.x86_64.rpmaautocorr-ko-7.1.8.1-8.el9_1.alma.noarch.rpmpautocorr-vro-7.1.8.1-8.el9_1.alma.noarch.rpmJlibreoffice-help-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpmMautocorr-af-7.1.8.1-8.el9_1.alma.noarch.rpm@libreoffice-help-it-7.1.8.1-8.el9_1.alma.x86_64.rpm>libreoffice-help-hu-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-or-7.1.8.1-8.el9_1.alma.x86_64.rpmAlibreoffice-help-ja-7.1.8.1-8.el9_1.alma.x86_64.rpmClibreoffice-help-lt-7.1.8.1-8.el9_1.alma.x86_64.rpmYlibreoffice-langpack-as-7.1.8.1-8.el9_1.alma.x86_64.rpm6libreoffice-help-eu-7.1.8.1-8.el9_1.alma.x86_64.rpmeautocorr-nl-7.1.8.1-8.el9_1.alma.noarch.rpmclibreoffice-langpack-el-7.1.8.1-8.el9_1.alma.x86_64.rpmUautocorr-en-7.1.8.1-8.el9_1.alma.noarch.rpm#libreoffice-wiki-publisher-7.1.8.1-8.el9_1.alma.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-8.el9_1.alma.x86_64.rpm;libreoffice-help-he-7.1.8.1-8.el9_1.alma.x86_64.rpmjlibreoffice-langpack-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmRautocorr-de-7.1.8.1-8.el9_1.alma.noarch.rpm9libreoffice-help-gl-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpm\autocorr-hsb-7.1.8.1-8.el9_1.alma.noarch.rpmelibreoffice-langpack-eo-7.1.8.1-8.el9_1.alma.x86_64.rpmElibreoffice-help-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-ru-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-uk-7.1.8.1-8.el9_1.alma.x86_64.rpmMlibreoffice-help-si-7.1.8.1-8.el9_1.alma.x86_64.rpm`libreoffice-langpack-da-7.1.8.1-8.el9_1.alma.x86_64.rpmcautocorr-lt-7.1.8.1-8.el9_1.alma.noarch.rpmmlibreoffice-langpack-ga-7.1.8.1-8.el9_1.alma.x86_64.rpmSlibreoffice-help-uk-7.1.8.1-8.el9_1.alma.x86_64.rpmulibreoffice-langpack-it-7.1.8.1-8.el9_1.alma.x86_64.rpm%libreoffice-filters-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-si-7.1.8.1-8.el9_1.alma.x86_64.rpm&libreoffice-xsltfilter-7.1.8.1-8.el9_1.alma.x86_64.rpmXautocorr-fi-7.1.8.1-8.el9_1.alma.noarch.rpm3libreoffice-help-eo-7.1.8.1-8.el9_1.alma.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-tn-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpmylibreoffice-langpack-ko-7.1.8.1-8.el9_1.alma.x86_64.rpmVautocorr-es-7.1.8.1-8.el9_1.alma.noarch.rpmilibreoffice-langpack-fa-7.1.8.1-8.el9_1.alma.x86_64.rpmZlibreoffice-langpack-bg-7.1.8.1-8.el9_1.alma.x86_64.rpmglibreoffice-langpack-et-7.1.8.1-8.el9_1.alma.x86_64.rpmnlibreoffice-langpack-gl-7.1.8.1-8.el9_1.alma.x86_64.rpmYautocorr-fr-7.1.8.1-8.el9_1.alma.noarch.rpmiautocorr-ru-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-data-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-sv-7.1.8.1-8.el9_1.alma.x86_64.rpm<libreoffice-help-hi-7.1.8.1-8.el9_1.alma.x86_64.rpmdlibreoffice-langpack-en-7.1.8.1-8.el9_1.alma.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpmqlibreoffice-langpack-hi-7.1.8.1-8.el9_1.alma.x86_64.rpm!libreoffice-pyuno-7.1.8.1-8.el9_1.alma.x86_64.rpm0libreoffice-help-dz-7.1.8.1-8.el9_1.alma.x86_64.rpm-libreoffice-help-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmNlibreoffice-help-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm_autocorr-it-7.1.8.1-8.el9_1.alma.noarch.rpm[libreoffice-langpack-bn-7.1.8.1-8.el9_1.alma.x86_64.rpmdautocorr-mn-7.1.8.1-8.el9_1.alma.noarch.rpm]autocorr-hu-7.1.8.1-8.el9_1.alma.noarch.rpmzlibreoffice-langpack-lt-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-nso-7.1.8.1-8.el9_1.alma.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-base-7.1.8.1-8.el9_1.alma.x86_64.rpm!libreoffice-calc-7.1.8.1-8.el9_1.alma.x86_64.rpmVlibreoffice-impress-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-ogltrans-7.1.8.1-8.el9_1.alma.x86_64.rpmXlibreoffice-langpack-ar-7.1.8.1-8.el9_1.alma.x86_64.rpmqautocorr-zh-7.1.8.1-8.el9_1.alma.noarch.rpm1libreoffice-help-el-7.1.8.1-8.el9_1.alma.x86_64.rpmrlibreoffice-langpack-hr-7.1.8.1-8.el9_1.alma.x86_64.rpm"libreoffice-core-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.alma.noarch.rpm[autocorr-hr-7.1.8.1-8.el9_1.alma.noarch.rpmKlibreoffice-help-ro-7.1.8.1-8.el9_1.alma.x86_64.rpm"libreoffice-ure-7.1.8.1-8.el9_1.alma.x86_64.rpm*libreoffice-help-bg-7.1.8.1-8.el9_1.alma.x86_64.rpm`autocorr-ja-7.1.8.1-8.el9_1.alma.noarch.rpm(libreoffice-gtk3-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-te-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ve-7.1.8.1-8.el9_1.alma.x86_64.rpmTautocorr-el-7.1.8.1-8.el9_1.alma.noarch.rpmQlibreoffice-help-ta-7.1.8.1-8.el9_1.alma.x86_64.rpmtlibreoffice-langpack-id-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm0.libreoffice-help-da-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-pa-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-zu-7.1.8.1-8.el9_1.alma.x86_64.rpmbautocorr-lb-7.1.8.1-8.el9_1.alma.noarch.rpmPautocorr-cs-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-math-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-sk-7.1.8.1-8.el9_1.alma.x86_64.rpmgautocorr-pt-7.1.8.1-8.el9_1.alma.noarch.rpm^autocorr-is-7.1.8.1-8.el9_1.alma.noarch.rpm}libreoffice-langpack-ml-7.1.8.1-8.el9_1.alma.x86_64.rpmNautocorr-bg-7.1.8.1-8.el9_1.alma.noarch.rpm?libreoffice-help-id-7.1.8.1-8.el9_1.alma.x86_64.rpm&libreoffice-gdb-debug-support-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ta-7.1.8.1-8.el9_1.alma.x86_64.rpmolibreoffice-langpack-gu-7.1.8.1-8.el9_1.alma.x86_64.rpmlautocorr-sr-7.1.8.1-8.el9_1.alma.noarch.rpm2libreoffice-help-en-7.1.8.1-8.el9_1.alma.x86_64.rpmLlibreoffice-help-ru-7.1.8.1-8.el9_1.alma.x86_64.rpmhautocorr-ro-7.1.8.1-8.el9_1.alma.noarch.rpm/libreoffice-help-de-7.1.8.1-8.el9_1.alma.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-8.el9_1.alma.x86_64.rpmnautocorr-tr-7.1.8.1-8.el9_1.alma.noarch.rpmjautocorr-sk-7.1.8.1-8.el9_1.alma.noarch.rpm%libreoffice-x11-7.1.8.1-8.el9_1.alma.x86_64.rpm)libreoffice-help-ar-7.1.8.1-8.el9_1.alma.x86_64.rpmalibreoffice-langpack-de-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-st-7.1.8.1-8.el9_1.alma.x86_64.rpmkautocorr-sl-7.1.8.1-8.el9_1.alma.noarch.rpm libreoffice-pdfimport-7.1.8.1-8.el9_1.alma.x86_64.rpmRlibreoffice-help-tr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-ure-common-7.1.8.1-8.el9_1.alma.noarch.rpmklibreoffice-langpack-fr-7.1.8.1-8.el9_1.alma.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm$libreoffice-writer-7.1.8.1-8.el9_1.alma.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-8.el9_1.alma.x86_64.rpmTlibreoffice-help-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpmxlibreoffice-langpack-kn-7.1.8.1-8.el9_1.alma.x86_64.rpm:libreoffice-help-gu-7.1.8.1-8.el9_1.alma.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-8.el9_1.alma.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-8.el9_1.alma.x86_64.rpm5libreoffice-help-et-7.1.8.1-8.el9_1.alma.x86_64.rpm7libreoffice-help-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-xh-7.1.8.1-8.el9_1.alma.x86_64.rpmFlibreoffice-help-nl-7.1.8.1-8.el9_1.alma.x86_64.rpmoautocorr-vi-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-nl-7.1.8.1-8.el9_1.alma.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-8.el9_1.alma.x86_64.rpm,libreoffice-help-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmWlibreoffice-langpack-af-7.1.8.1-8.el9_1.alma.x86_64.rpmmautocorr-sv-7.1.8.1-8.el9_1.alma.noarch.rpm libreoffice-langpack-ro-7.1.8.1-8.el9_1.alma.x86_64.rpm+libreoffice-help-bn-7.1.8.1-8.el9_1.alma.x86_64.rpmOlibreoffice-help-sl-7.1.8.1-8.el9_1.alma.x86_64.rpmZautocorr-ga-7.1.8.1-8.el9_1.alma.noarch.rpmslibreoffice-langpack-hu-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-sl-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-8.el9_1.alma.x86_64.rpm=libreoffice-help-hr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-tr-7.1.8.1-8.el9_1.alma.x86_64.rpm'libreofficekit-7.1.8.1-8.el9_1.alma.x86_64.rpmflibreoffice-langpack-es-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpm8libreoffice-help-fr-7.1.8.1-8.el9_1.alma.x86_64.rpm#libreoffice-draw-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-8.el9_1.alma.x86_64.rpmDlibreoffice-help-lv-7.1.8.1-8.el9_1.alma.x86_64.rpmfautocorr-pl-7.1.8.1-8.el9_1.alma.noarch.rpmBlibreoffice-help-ko-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ss-7.1.8.1-8.el9_1.alma.x86_64.rpm_libreoffice-langpack-cy-7.1.8.1-8.el9_1.alma.x86_64.rpmOautocorr-ca-7.1.8.1-8.el9_1.alma.noarch.rpmvlibreoffice-langpack-ja-7.1.8.1-8.el9_1.alma.x86_64.rpm^libreoffice-langpack-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmWautocorr-fa-7.1.8.1-8.el9_1.alma.noarch.rpmSautocorr-dsb-7.1.8.1-8.el9_1.alma.noarch.rpmIlibreoffice-help-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-8.el9_1.alma.x86_64.rpmwlibreoffice-langpack-kk-7.1.8.1-8.el9_1.alma.x86_64.rpm4libreoffice-help-es-7.1.8.1-8.el9_1.alma.x86_64.rpm$libreoffice-emailmerge-7.1.8.1-8.el9_1.alma.x86_64.rpm~libreoffice-langpack-mr-7.1.8.1-8.el9_1.alma.x86_64.rpm]libreoffice-langpack-ca-7.1.8.1-8.el9_1.alma.x86_64.rpmQautocorr-da-7.1.8.1-8.el9_1.alma.noarch.rpmHlibreoffice-help-pl-7.1.8.1-8.el9_1.alma.x86_64.rpmplibreoffice-langpack-he-7.1.8.1-8.el9_1.alma.x86_64.rpmaautocorr-ko-7.1.8.1-8.el9_1.alma.noarch.rpmpautocorr-vro-7.1.8.1-8.el9_1.alma.noarch.rpmJlibreoffice-help-pt-PT-7.1.8.1-8.el9_1.alma.x86_64.rpmMautocorr-af-7.1.8.1-8.el9_1.alma.noarch.rpm@libreoffice-help-it-7.1.8.1-8.el9_1.alma.x86_64.rpm>libreoffice-help-hu-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-or-7.1.8.1-8.el9_1.alma.x86_64.rpmAlibreoffice-help-ja-7.1.8.1-8.el9_1.alma.x86_64.rpmClibreoffice-help-lt-7.1.8.1-8.el9_1.alma.x86_64.rpmYlibreoffice-langpack-as-7.1.8.1-8.el9_1.alma.x86_64.rpm6libreoffice-help-eu-7.1.8.1-8.el9_1.alma.x86_64.rpmeautocorr-nl-7.1.8.1-8.el9_1.alma.noarch.rpmclibreoffice-langpack-el-7.1.8.1-8.el9_1.alma.x86_64.rpmUautocorr-en-7.1.8.1-8.el9_1.alma.noarch.rpm#libreoffice-wiki-publisher-7.1.8.1-8.el9_1.alma.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-8.el9_1.alma.x86_64.rpm;libreoffice-help-he-7.1.8.1-8.el9_1.alma.x86_64.rpmjlibreoffice-langpack-fi-7.1.8.1-8.el9_1.alma.x86_64.rpmRautocorr-de-7.1.8.1-8.el9_1.alma.noarch.rpm9libreoffice-help-gl-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-8.el9_1.alma.x86_64.rpm\autocorr-hsb-7.1.8.1-8.el9_1.alma.noarch.rpmelibreoffice-langpack-eo-7.1.8.1-8.el9_1.alma.x86_64.rpmElibreoffice-help-nb-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-ru-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-uk-7.1.8.1-8.el9_1.alma.x86_64.rpmMlibreoffice-help-si-7.1.8.1-8.el9_1.alma.x86_64.rpm`libreoffice-langpack-da-7.1.8.1-8.el9_1.alma.x86_64.rpmcautocorr-lt-7.1.8.1-8.el9_1.alma.noarch.rpmmlibreoffice-langpack-ga-7.1.8.1-8.el9_1.alma.x86_64.rpmSlibreoffice-help-uk-7.1.8.1-8.el9_1.alma.x86_64.rpmulibreoffice-langpack-it-7.1.8.1-8.el9_1.alma.x86_64.rpm%libreoffice-filters-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-langpack-si-7.1.8.1-8.el9_1.alma.x86_64.rpm&libreoffice-xsltfilter-7.1.8.1-8.el9_1.alma.x86_64.rpmXautocorr-fi-7.1.8.1-8.el9_1.alma.noarch.rpm3libreoffice-help-eo-7.1.8.1-8.el9_1.alma.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-tn-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-8.el9_1.alma.x86_64.rpmylibreoffice-langpack-ko-7.1.8.1-8.el9_1.alma.x86_64.rpmVautocorr-es-7.1.8.1-8.el9_1.alma.noarch.rpmilibreoffice-langpack-fa-7.1.8.1-8.el9_1.alma.x86_64.rpmZlibreoffice-langpack-bg-7.1.8.1-8.el9_1.alma.x86_64.rpmglibreoffice-langpack-et-7.1.8.1-8.el9_1.alma.x86_64.rpmnlibreoffice-langpack-gl-7.1.8.1-8.el9_1.alma.x86_64.rpmYautocorr-fr-7.1.8.1-8.el9_1.alma.noarch.rpmiautocorr-ru-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-data-7.1.8.1-8.el9_1.alma.noarch.rpmlibreoffice-langpack-sv-7.1.8.1-8.el9_1.alma.x86_64.rpm<libreoffice-help-hi-7.1.8.1-8.el9_1.alma.x86_64.rpmdlibreoffice-langpack-en-7.1.8.1-8.el9_1.alma.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-8.el9_1.alma.x86_64.rpmqlibreoffice-langpack-hi-7.1.8.1-8.el9_1.alma.x86_64.rpm!libreoffice-pyuno-7.1.8.1-8.el9_1.alma.x86_64.rpm0libreoffice-help-dz-7.1.8.1-8.el9_1.alma.x86_64.rpm-libreoffice-help-cs-7.1.8.1-8.el9_1.alma.x86_64.rpmNlibreoffice-help-sk-7.1.8.1-8.el9_1.alma.x86_64.rpm_autocorr-it-7.1.8.1-8.el9_1.alma.noarch.rpm[libreoffice-langpack-bn-7.1.8.1-8.el9_1.alma.x86_64.rpmdautocorr-mn-7.1.8.1-8.el9_1.alma.noarch.rpm]autocorr-hu-7.1.8.1-8.el9_1.alma.noarch.rpmzlibreoffice-langpack-lt-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-nso-7.1.8.1-8.el9_1.alma.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-8.el9_1.alma.x86_64.rpm libreoffice-base-7.1.8.1-8.el9_1.alma.x86_64.rpm!libreoffice-calc-7.1.8.1-8.el9_1.alma.x86_64.rpmVlibreoffice-impress-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-ogltrans-7.1.8.1-8.el9_1.alma.x86_64.rpmXlibreoffice-langpack-ar-7.1.8.1-8.el9_1.alma.x86_64.rpmqautocorr-zh-7.1.8.1-8.el9_1.alma.noarch.rpm1libreoffice-help-el-7.1.8.1-8.el9_1.alma.x86_64.rpmrlibreoffice-langpack-hr-7.1.8.1-8.el9_1.alma.x86_64.rpm"libreoffice-core-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-opensymbol-fonts-7.1.8.1-8.el9_1.alma.noarch.rpm[autocorr-hr-7.1.8.1-8.el9_1.alma.noarch.rpmKlibreoffice-help-ro-7.1.8.1-8.el9_1.alma.x86_64.rpm"libreoffice-ure-7.1.8.1-8.el9_1.alma.x86_64.rpm*libreoffice-help-bg-7.1.8.1-8.el9_1.alma.x86_64.rpm`autocorr-ja-7.1.8.1-8.el9_1.alma.noarch.rpm(libreoffice-gtk3-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-te-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-ve-7.1.8.1-8.el9_1.alma.x86_64.rpmTautocorr-el-7.1.8.1-8.el9_1.alma.noarch.rpmQlibreoffice-help-ta-7.1.8.1-8.el9_1.alma.x86_64.rpmtlibreoffice-langpack-id-7.1.8.1-8.el9_1.alma.x86_64.rpmlibreoffice-langpack-nn-7.1.8.1-8.el9_1.alma.x86_64.rpm6 securityModerate: postgresql-jdbc security update:khttps://access.redhat.com/errata/RHSA-2023:0318RHSA-2023:0318RHSA-2023:0318 https://access.redhat.com/security/cve/CVE-2022-31197CVE-2022-31197CVE-2022-31197https://bugzilla.redhat.com/21294282129428https://errata.almalinux.org/9/ALSA-2023-0318.htmlALSA-2023:0318ALSA-2023:0318 )Epostgresql-jdbc-42.2.18-6.el9_1.noarch.rpm)Epostgresql-jdbc-42.2.18-6.el9_1.noarch.rpmd *_BBBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security, bug fix, and enhancement update%e https://access.redhat.com/errata/RHSA-2023:0321RHSA-2023:0321RHSA-2023:0321 https://access.redhat.com/security/cve/CVE-2021-44906CVE-2021-44906CVE-2021-44906https://access.redhat.com/security/cve/CVE-2022-3517CVE-2022-3517CVE-2022-3517https://access.redhat.com/security/cve/CVE-2022-35256CVE-2022-35256CVE-2022-35256https://access.redhat.com/security/cve/CVE-2022-43548CVE-2022-43548CVE-2022-43548https://bugzilla.redhat.com/20660092066009https://bugzilla.redhat.com/21305182130518https://bugzilla.redhat.com/21346092134609https://bugzilla.redhat.com/21409112140911https://errata.almalinux.org/9/ALSA-2023-0321.htmlALSA-2023:0321ALSA-2023:0321 <9nodejs-docs-16.18.1-3.el9_1.noarch.rpm9nodejs-libs-16.18.1-3.el9_1.i686.rpmk nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm+9nodejs-16.18.1-3.el9_1.x86_64.rpm9nodejs-libs-16.18.1-3.el9_1.x86_64.rpmd9nodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpmcqnpm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpm<9nodejs-docs-16.18.1-3.el9_1.noarch.rpm9nodejs-libs-16.18.1-3.el9_1.i686.rpmk nodejs-nodemon-2.0.20-2.el9_1.noarch.rpm+9nodejs-16.18.1-3.el9_1.x86_64.rpm9nodejs-libs-16.18.1-3.el9_1.x86_64.rpmd9nodejs-full-i18n-16.18.1-3.el9_1.x86_64.rpmcqnpm-8.19.2-1.16.18.1.3.el9_1.x86_64.rpm 7kBBBBBBBBBBsecurityModerate: go-toolset and golang security and bug fix update https://access.redhat.com/errata/RHSA-2023:0328RHSA-2023:0328RHSA-2023:0328 https://access.redhat.com/security/cve/CVE-2022-2879CVE-2022-2879CVE-2022-2879https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21328672132867https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-0328.htmlALSA-2023:0328ALSA-2023:0328 8golang-race-1.18.9-1.el9_1.x86_64.rpmEgo-toolset-1.18.9-1.el9_1.x86_64.rpmogolang-tests-1.18.9-1.el9_1.noarch.rpmAgolang-bin-1.18.9-1.el9_1.x86_64.rpm@golang-1.18.9-1.el9_1.x86_64.rpmlgolang-docs-1.18.9-1.el9_1.noarch.rpmmgolang-misc-1.18.9-1.el9_1.noarch.rpmngolang-src-1.18.9-1.el9_1.noarch.rpm8golang-race-1.18.9-1.el9_1.x86_64.rpmEgo-toolset-1.18.9-1.el9_1.x86_64.rpmogolang-tests-1.18.9-1.el9_1.noarch.rpmAgolang-bin-1.18.9-1.el9_1.x86_64.rpm@golang-1.18.9-1.el9_1.x86_64.rpmlgolang-docs-1.18.9-1.el9_1.noarch.rpmmgolang-misc-1.18.9-1.el9_1.noarch.rpmngolang-src-1.18.9-1.el9_1.noarch.rpm ;xBsecurityModerate: curl security update!&https://access.redhat.com/errata/RHSA-2023:0333RHSA-2023:0333RHSA-2023:0333 https://access.redhat.com/security/cve/CVE-2022-32221CVE-2022-32221CVE-2022-32221https://bugzilla.redhat.com/21354112135411https://errata.almalinux.org/9/ALSA-2023-0333.htmlALSA-2023:0333ALSA-2023:0333  Rlibcurl-devel-7.76.1-19.el9_1.1.i686.rpm Rlibcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm Rlibcurl-devel-7.76.1-19.el9_1.1.i686.rpm Rlibcurl-devel-7.76.1-19.el9_1.1.x86_64.rpm |BBBBBBBBBsecurityImportant: kernel security and bug fix updateG;https://access.redhat.com/errata/RHSA-2023:0334RHSA-2023:0334RHSA-2023:0334 https://access.redhat.com/security/cve/CVE-2022-2959CVE-2022-2959CVE-2022-2959https://access.redhat.com/security/cve/CVE-2022-2964CVE-2022-2964CVE-2022-2964https://access.redhat.com/security/cve/CVE-2022-30594CVE-2022-30594CVE-2022-30594https://access.redhat.com/security/cve/CVE-2022-3077CVE-2022-3077CVE-2022-3077https://access.redhat.com/security/cve/CVE-2022-4139CVE-2022-4139CVE-2022-4139https://access.redhat.com/security/cve/CVE-2022-43945CVE-2022-43945CVE-2022-43945https://bugzilla.redhat.com/20674822067482https://bugzilla.redhat.com/20853002085300https://bugzilla.redhat.com/21036812103681https://bugzilla.redhat.com/21233092123309https://bugzilla.redhat.com/21417522141752https://bugzilla.redhat.com/21475722147572https://errata.almalinux.org/9/ALSA-2023-0334.htmlALSA-2023:0334ALSA-2023:0334 %`perf-5.14.0-162.12.1.el9_1.x86_64.rpm`kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm"`kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm$`kernel-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm!`kernel-debug-devel-5.14.0-162.12.1.el9_1.x86_64.rpm#`kernel-devel-5.14.0-162.12.1.el9_1.x86_64.rpm%`perf-5.14.0-162.12.1.el9_1.x86_64.rpm`kernel-doc-5.14.0-162.12.1.el9_1.noarch.rpm"`kernel-debug-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm$`kernel-devel-matched-5.14.0-162.12.1.el9_1.x86_64.rpm!`kernel-debug-devel-5.14.0-162.12.1.el9_1.x86_64.rpm#`kernel-devel-5.14.0-162.12.1.el9_1.x86_64.rpmd HBBBBBsecurityModerate: dbus security update^https://access.redhat.com/errata/RHSA-2023:0335RHSA-2023:0335RHSA-2023:0335 https://access.redhat.com/security/cve/CVE-2022-42010CVE-2022-42010CVE-2022-42010https://access.redhat.com/security/cve/CVE-2022-42011CVE-2022-42011CVE-2022-42011https://access.redhat.com/security/cve/CVE-2022-42012CVE-2022-42012CVE-2022-42012https://bugzilla.redhat.com/21336162133616https://bugzilla.redhat.com/21336172133617https://bugzilla.redhat.com/21336182133618https://errata.almalinux.org/9/ALSA-2023-0335.htmlALSA-2023:0335ALSA-2023:0335 ~dbus-daemon-1.12.20-7.el9_1.x86_64.rpm\~dbus-devel-1.12.20-7.el9_1.x86_64.rpm\~dbus-devel-1.12.20-7.el9_1.i686.rpm~dbus-x11-1.12.20-7.el9_1.x86_64.rpm~dbus-daemon-1.12.20-7.el9_1.x86_64.rpm\~dbus-devel-1.12.20-7.el9_1.x86_64.rpm\~dbus-devel-1.12.20-7.el9_1.i686.rpm~dbus-x11-1.12.20-7.el9_1.x86_64.rpm PBBBsecurityModerate: systemd security update`Qhttps://access.redhat.com/errata/RHSA-2023:0336RHSA-2023:0336RHSA-2023:0336 https://access.redhat.com/security/cve/CVE-2022-3821CVE-2022-3821CVE-2022-3821https://bugzilla.redhat.com/21393272139327https://errata.almalinux.org/9/ALSA-2023-0336.htmlALSA-2023:0336ALSA-2023:0336 +8systemd-devel-250-12.el9_1.1.x86_64.rpm+8systemd-devel-250-12.el9_1.1.i686.rpm}8systemd-journal-remote-250-12.el9_1.1.x86_64.rpm+8systemd-devel-250-12.el9_1.1.x86_64.rpm+8systemd-devel-250-12.el9_1.1.i686.rpm}8systemd-journal-remote-250-12.el9_1.1.x86_64.rpm VBsecurityModerate: expat security update1}https://access.redhat.com/errata/RHSA-2023:0337RHSA-2023:0337RHSA-2023:0337 https://access.redhat.com/security/cve/CVE-2022-43680CVE-2022-43680CVE-2022-43680https://bugzilla.redhat.com/21400592140059https://errata.almalinux.org/9/ALSA-2023-0337.htmlALSA-2023:0337ALSA-2023:0337 !expat-devel-2.4.9-1.el9_1.1.i686.rpm!expat-devel-2.4.9-1.el9_1.1.x86_64.rpm!expat-devel-2.4.9-1.el9_1.1.i686.rpm!expat-devel-2.4.9-1.el9_1.1.x86_64.rpm ZBsecurityModerate: libxml2 security update.Fhttps://access.redhat.com/errata/RHSA-2023:0338RHSA-2023:0338RHSA-2023:0338 https://access.redhat.com/security/cve/CVE-2022-40303CVE-2022-40303CVE-2022-40303https://access.redhat.com/security/cve/CVE-2022-40304CVE-2022-40304CVE-2022-40304https://bugzilla.redhat.com/21362662136266https://bugzilla.redhat.com/21362882136288https://errata.almalinux.org/9/ALSA-2023-0338.htmlALSA-2023:0338ALSA-2023:0338 >4libxml2-devel-2.9.13-3.el9_1.x86_64.rpm>4libxml2-devel-2.9.13-3.el9_1.i686.rpm>4libxml2-devel-2.9.13-3.el9_1.x86_64.rpm>4libxml2-devel-2.9.13-3.el9_1.i686.rpm  $^BBBBsecurityModerate: sqlite security updatet<https://access.redhat.com/errata/RHSA-2023:0339RHSA-2023:0339RHSA-2023:0339 https://access.redhat.com/security/cve/CVE-2022-35737CVE-2022-35737CVE-2022-35737https://bugzilla.redhat.com/21102912110291https://errata.almalinux.org/9/ALSA-2023-0339.htmlALSA-2023:0339ALSA-2023:0339 )Tsqlite-3.34.1-6.el9_1.i686.rpm*Tsqlite-devel-3.34.1-6.el9_1.x86_64.rpm)Tsqlite-3.34.1-6.el9_1.x86_64.rpm*Tsqlite-devel-3.34.1-6.el9_1.i686.rpm)Tsqlite-3.34.1-6.el9_1.i686.rpm*Tsqlite-devel-3.34.1-6.el9_1.x86_64.rpm)Tsqlite-3.34.1-6.el9_1.x86_64.rpm*Tsqlite-devel-3.34.1-6.el9_1.i686.rpmy *eBBBsecurityModerate: libtasn1 security update0uhttps://access.redhat.com/errata/RHSA-2023:0343RHSA-2023:0343RHSA-2023:0343 https://access.redhat.com/security/cve/CVE-2021-46848CVE-2021-46848CVE-2021-46848https://bugzilla.redhat.com/21400582140058https://errata.almalinux.org/9/ALSA-2023-0343.htmlALSA-2023:0343ALSA-2023:0343 }Llibtasn1-devel-4.16.0-8.el9_1.i686.rpm=Llibtasn1-tools-4.16.0-8.el9_1.x86_64.rpm}Llibtasn1-devel-4.16.0-8.el9_1.x86_64.rpm}Llibtasn1-devel-4.16.0-8.el9_1.i686.rpm=Llibtasn1-tools-4.16.0-8.el9_1.x86_64.rpm}Llibtasn1-devel-4.16.0-8.el9_1.x86_64.rpmW 1kBBBBsecurityImportant: libXpm security update%;https://access.redhat.com/errata/RHSA-2023:0383RHSA-2023:0383RHSA-2023:0383 https://access.redhat.com/security/cve/CVE-2022-44617CVE-2022-44617CVE-2022-44617https://access.redhat.com/security/cve/CVE-2022-46285CVE-2022-46285CVE-2022-46285https://access.redhat.com/security/cve/CVE-2022-4883CVE-2022-4883CVE-2022-4883https://bugzilla.redhat.com/21600922160092https://bugzilla.redhat.com/21601932160193https://bugzilla.redhat.com/21602132160213https://errata.almalinux.org/9/ALSA-2023-0383.htmlALSA-2023:0383ALSA-2023:0383 hYlibXpm-devel-3.5.13-8.el9_1.x86_64.rpmgYlibXpm-3.5.13-8.el9_1.x86_64.rpmgYlibXpm-3.5.13-8.el9_1.i686.rpmhYlibXpm-devel-3.5.13-8.el9_1.i686.rpmhYlibXpm-devel-3.5.13-8.el9_1.x86_64.rpmgYlibXpm-3.5.13-8.el9_1.x86_64.rpmgYlibXpm-3.5.13-8.el9_1.i686.rpmhYlibXpm-devel-3.5.13-8.el9_1.i686.rpm 4rsecurityImportant: thunderbird security update` https://access.redhat.com/errata/RHSA-2023:0476RHSA-2023:0476RHSA-2023:0476 https://access.redhat.com/security/cve/CVE-2022-46871CVE-2022-46871CVE-2022-46871https://access.redhat.com/security/cve/CVE-2022-46877CVE-2022-46877CVE-2022-46877https://access.redhat.com/security/cve/CVE-2023-23598CVE-2023-23598CVE-2023-23598https://access.redhat.com/security/cve/CVE-2023-23599CVE-2023-23599CVE-2023-23599https://access.redhat.com/security/cve/CVE-2023-23601CVE-2023-23601CVE-2023-23601https://access.redhat.com/security/cve/CVE-2023-23602CVE-2023-23602CVE-2023-23602https://access.redhat.com/security/cve/CVE-2023-23603CVE-2023-23603CVE-2023-23603https://access.redhat.com/security/cve/CVE-2023-23605CVE-2023-23605CVE-2023-23605https://bugzilla.redhat.com/21623362162336https://bugzilla.redhat.com/21623382162338https://bugzilla.redhat.com/21623392162339https://bugzilla.redhat.com/21623402162340https://bugzilla.redhat.com/21623412162341https://bugzilla.redhat.com/21623422162342https://bugzilla.redhat.com/21623432162343https://bugzilla.redhat.com/21623442162344https://errata.almalinux.org/9/ALSA-2023-0476.htmlALSA-2023:0476ALSA-2023:0476 93thunderbird-102.7.1-1.el9_1.alma.x86_64.rpm93thunderbird-102.7.1-1.el9_1.alma.x86_64.rpmD 7usecurityImportant: thunderbird security updatel%https://access.redhat.com/errata/RHSA-2023:0608RHSA-2023:0608RHSA-2023:0608 https://access.redhat.com/security/cve/CVE-2023-0430CVE-2023-0430CVE-2023-0430https://bugzilla.redhat.com/21665912166591https://errata.almalinux.org/9/ALSA-2023-0608.htmlALSA-2023:0608ALSA-2023:0608 94thunderbird-102.7.1-2.el9_1.alma.x86_64.rpm94thunderbird-102.7.1-2.el9_1.alma.x86_64.rpmo xBBBBBBBBBBBBBBBBBBsecurityImportant: git security updateYhttps://access.redhat.com/errata/RHSA-2023:0611RHSA-2023:0611RHSA-2023:0611 https://access.redhat.com/security/cve/CVE-2022-23521CVE-2022-23521CVE-2022-23521https://access.redhat.com/security/cve/CVE-2022-41903CVE-2022-41903CVE-2022-41903https://bugzilla.redhat.com/21620552162055https://bugzilla.redhat.com/21620562162056https://errata.almalinux.org/9/ALSA-2023-0611.htmlALSA-2023:0611ALSA-2023:0611 gitweb-2.31.1-3.el9_1.noarch.rpmperl-Git-2.31.1-3.el9_1.noarch.rpm{git-email-2.31.1-3.el9_1.noarch.rpmygit-all-2.31.1-3.el9_1.noarch.rpmgit-subtree-2.31.1-3.el9_1.x86_64.rpmgit-core-2.31.1-3.el9_1.x86_64.rpmzgit-core-doc-2.31.1-3.el9_1.noarch.rpm|git-gui-2.31.1-3.el9_1.noarch.rpmgit-2.31.1-3.el9_1.x86_64.rpmgitk-2.31.1-3.el9_1.noarch.rpmgit-daemon-2.31.1-3.el9_1.x86_64.rpm}git-instaweb-2.31.1-3.el9_1.noarch.rpmgit-credential-libsecret-2.31.1-3.el9_1.x86_64.rpm perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm~git-svn-2.31.1-3.el9_1.noarch.rpmgitweb-2.31.1-3.el9_1.noarch.rpmperl-Git-2.31.1-3.el9_1.noarch.rpm{git-email-2.31.1-3.el9_1.noarch.rpmygit-all-2.31.1-3.el9_1.noarch.rpmgit-subtree-2.31.1-3.el9_1.x86_64.rpmgit-core-2.31.1-3.el9_1.x86_64.rpmzgit-core-doc-2.31.1-3.el9_1.noarch.rpm|git-gui-2.31.1-3.el9_1.noarch.rpmgit-2.31.1-3.el9_1.x86_64.rpmgitk-2.31.1-3.el9_1.noarch.rpmgit-daemon-2.31.1-3.el9_1.x86_64.rpm}git-instaweb-2.31.1-3.el9_1.noarch.rpmgit-credential-libsecret-2.31.1-3.el9_1.x86_64.rpm perl-Git-SVN-2.31.1-3.el9_1.noarch.rpm~git-svn-2.31.1-3.el9_1.noarch.rpm MBBBBBBBBBsecurityImportant: tigervnc security updatej_https://access.redhat.com/errata/RHSA-2023:0622RHSA-2023:0622RHSA-2023:0622 https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-0622.htmlALSA-2023:0622ALSA-2023:0622 7stigervnc-icons-1.12.0-5.el9_1.1.noarch.rpmostigervnc-server-1.12.0-5.el9_1.1.x86_64.rpmnstigervnc-1.12.0-5.el9_1.1.x86_64.rpm9stigervnc-selinux-1.12.0-5.el9_1.1.noarch.rpmpstigervnc-server-minimal-1.12.0-5.el9_1.1.x86_64.rpmqstigervnc-server-module-1.12.0-5.el9_1.1.x86_64.rpm8stigervnc-license-1.12.0-5.el9_1.1.noarch.rpm7stigervnc-icons-1.12.0-5.el9_1.1.noarch.rpmostigervnc-server-1.12.0-5.el9_1.1.x86_64.rpmnstigervnc-1.12.0-5.el9_1.1.x86_64.rpm9stigervnc-selinux-1.12.0-5.el9_1.1.noarch.rpmpstigervnc-server-minimal-1.12.0-5.el9_1.1.x86_64.rpmqstigervnc-server-module-1.12.0-5.el9_1.1.x86_64.rpm8stigervnc-license-1.12.0-5.el9_1.1.noarch.rpm YBBsecurityImportant: firefox security updateIMhttps://access.redhat.com/errata/RHSA-2023:0810RHSA-2023:0810RHSA-2023:0810 https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://access.redhat.com/security/cve/CVE-2023-25728CVE-2023-25728CVE-2023-25728https://access.redhat.com/security/cve/CVE-2023-25729CVE-2023-25729CVE-2023-25729https://access.redhat.com/security/cve/CVE-2023-25730CVE-2023-25730CVE-2023-25730https://access.redhat.com/security/cve/CVE-2023-25732CVE-2023-25732CVE-2023-25732https://access.redhat.com/security/cve/CVE-2023-25735CVE-2023-25735CVE-2023-25735https://access.redhat.com/security/cve/CVE-2023-25737CVE-2023-25737CVE-2023-25737https://access.redhat.com/security/cve/CVE-2023-25739CVE-2023-25739CVE-2023-25739https://access.redhat.com/security/cve/CVE-2023-25742CVE-2023-25742CVE-2023-25742https://access.redhat.com/security/cve/CVE-2023-25743CVE-2023-25743CVE-2023-25743https://access.redhat.com/security/cve/CVE-2023-25744CVE-2023-25744CVE-2023-25744https://access.redhat.com/security/cve/CVE-2023-25746CVE-2023-25746CVE-2023-25746https://bugzilla.redhat.com/21703742170374https://bugzilla.redhat.com/21703752170375https://bugzilla.redhat.com/21703762170376https://bugzilla.redhat.com/21703772170377https://bugzilla.redhat.com/21703782170378https://bugzilla.redhat.com/21703792170379https://bugzilla.redhat.com/21703812170381https://bugzilla.redhat.com/21703822170382https://bugzilla.redhat.com/21703832170383https://bugzilla.redhat.com/21703902170390https://bugzilla.redhat.com/21703912170391https://bugzilla.redhat.com/21704022170402https://errata.almalinux.org/9/ALSA-2023-0810.htmlALSA-2023:0810ALSA-2023:0810 O>firefox-x11-102.8.0-2.el9_1.alma.x86_64.rpm7>firefox-102.8.0-2.el9_1.alma.x86_64.rpmO>firefox-x11-102.8.0-2.el9_1.alma.x86_64.rpm7>firefox-102.8.0-2.el9_1.alma.x86_64.rpmԄ  ^securityImportant: thunderbird security updatexhttps://access.redhat.com/errata/RHSA-2023:0824RHSA-2023:0824RHSA-2023:0824 https://access.redhat.com/security/cve/CVE-2023-0616CVE-2023-0616CVE-2023-0616https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://access.redhat.com/security/cve/CVE-2023-25728CVE-2023-25728CVE-2023-25728https://access.redhat.com/security/cve/CVE-2023-25729CVE-2023-25729CVE-2023-25729https://access.redhat.com/security/cve/CVE-2023-25730CVE-2023-25730CVE-2023-25730https://access.redhat.com/security/cve/CVE-2023-25732CVE-2023-25732CVE-2023-25732https://access.redhat.com/security/cve/CVE-2023-25735CVE-2023-25735CVE-2023-25735https://access.redhat.com/security/cve/CVE-2023-25737CVE-2023-25737CVE-2023-25737https://access.redhat.com/security/cve/CVE-2023-25739CVE-2023-25739CVE-2023-25739https://access.redhat.com/security/cve/CVE-2023-25742CVE-2023-25742CVE-2023-25742https://access.redhat.com/security/cve/CVE-2023-25743CVE-2023-25743CVE-2023-25743https://access.redhat.com/security/cve/CVE-2023-25744CVE-2023-25744CVE-2023-25744https://access.redhat.com/security/cve/CVE-2023-25746CVE-2023-25746CVE-2023-25746https://bugzilla.redhat.com/21703742170374https://bugzilla.redhat.com/21703752170375https://bugzilla.redhat.com/21703762170376https://bugzilla.redhat.com/21703772170377https://bugzilla.redhat.com/21703782170378https://bugzilla.redhat.com/21703792170379https://bugzilla.redhat.com/21703812170381https://bugzilla.redhat.com/21703822170382https://bugzilla.redhat.com/21703832170383https://bugzilla.redhat.com/21703902170390https://bugzilla.redhat.com/21703912170391https://bugzilla.redhat.com/21704022170402https://bugzilla.redhat.com/21713972171397https://errata.almalinux.org/9/ALSA-2023-0824.htmlALSA-2023:0824ALSA-2023:0824 9>thunderbird-102.8.0-2.el9_1.alma.x86_64.rpm9>thunderbird-102.8.0-2.el9_1.alma.x86_64.rpmԈn! -aBBBBBBBBBBsecurityImportant: webkit2gtk3 security update https://access.redhat.com/errata/RHSA-2023:0903RHSA-2023:0903RHSA-2023:0903 https://access.redhat.com/security/cve/CVE-2023-23529CVE-2023-23529CVE-2023-23529https://bugzilla.redhat.com/21699342169934https://errata.almalinux.org/9/ALSA-2023-0903.htmlALSA-2023:0903ALSA-2023:0903 5webkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm5webkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm3webkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm3webkit2gtk3-2.36.7-1.el9_1.2.i686.rpm4webkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm4webkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm5webkit2gtk3-jsc-2.36.7-1.el9_1.2.x86_64.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.x86_64.rpm5webkit2gtk3-jsc-2.36.7-1.el9_1.2.i686.rpm3webkit2gtk3-2.36.7-1.el9_1.2.x86_64.rpm3webkit2gtk3-2.36.7-1.el9_1.2.i686.rpm4webkit2gtk3-devel-2.36.7-1.el9_1.2.i686.rpm6webkit2gtk3-jsc-devel-2.36.7-1.el9_1.2.i686.rpm4webkit2gtk3-devel-2.36.7-1.el9_1.2.x86_64.rpm݆;" 3nBBBsecurityModerate: openssl security and bug fix update."https://access.redhat.com/errata/RHSA-2023:0946RHSA-2023:0946RHSA-2023:0946 https://access.redhat.com/security/cve/CVE-2022-4203CVE-2022-4203CVE-2022-4203https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0216CVE-2023-0216CVE-2023-0216https://access.redhat.com/security/cve/CVE-2023-0217CVE-2023-0217CVE-2023-0217https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://access.redhat.com/security/cve/CVE-2023-0401CVE-2023-0401CVE-2023-0401https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644882164488https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://bugzilla.redhat.com/21644972164497https://bugzilla.redhat.com/21644992164499https://bugzilla.redhat.com/21645002164500https://errata.almalinux.org/9/ALSA-2023-0946.htmlALSA-2023:0946ALSA-2023:0946 m$openssl-perl-3.0.1-47.el9_1.x86_64.rpm$openssl-devel-3.0.1-47.el9_1.x86_64.rpm$openssl-devel-3.0.1-47.el9_1.i686.rpmm$openssl-perl-3.0.1-47.el9_1.x86_64.rpm$openssl-devel-3.0.1-47.el9_1.x86_64.rpm$openssl-devel-3.0.1-47.el9_1.i686.rpmv# ?tBBBBBBBBBsecurityImportant: kernel security and bug fix updateP~ https://access.redhat.com/errata/RHSA-2023:0951RHSA-2023:0951RHSA-2023:0951 https://access.redhat.com/security/cve/CVE-2022-2873CVE-2022-2873CVE-2022-2873https://access.redhat.com/security/cve/CVE-2022-3564CVE-2022-3564CVE-2022-3564https://access.redhat.com/security/cve/CVE-2022-4378CVE-2022-4378CVE-2022-4378https://access.redhat.com/security/cve/CVE-2022-4379CVE-2022-4379CVE-2022-4379https://access.redhat.com/security/cve/CVE-2023-0179CVE-2023-0179CVE-2023-0179https://bugzilla.redhat.com/21190482119048https://bugzilla.redhat.com/21509992150999https://bugzilla.redhat.com/21525482152548https://bugzilla.redhat.com/21528072152807https://bugzilla.redhat.com/21617132161713https://errata.almalinux.org/9/ALSA-2023-0951.htmlALSA-2023:0951ALSA-2023:0951 akernel-doc-5.14.0-162.18.1.el9_1.noarch.rpm!akernel-debug-devel-5.14.0-162.18.1.el9_1.x86_64.rpm%aperf-5.14.0-162.18.1.el9_1.x86_64.rpm"akernel-debug-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm#akernel-devel-5.14.0-162.18.1.el9_1.x86_64.rpm$akernel-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpmakernel-doc-5.14.0-162.18.1.el9_1.noarch.rpm!akernel-debug-devel-5.14.0-162.18.1.el9_1.x86_64.rpm%aperf-5.14.0-162.18.1.el9_1.x86_64.rpm"akernel-debug-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm#akernel-devel-5.14.0-162.18.1.el9_1.x86_64.rpm$akernel-devel-matched-5.14.0-162.18.1.el9_1.x86_64.rpm$ @BBBBsecurityModerate: python3.9 security updateN9https://access.redhat.com/errata/RHSA-2023:0953RHSA-2023:0953RHSA-2023:0953 https://access.redhat.com/security/cve/CVE-2022-45061CVE-2022-45061CVE-2022-45061https://bugzilla.redhat.com/21440722144072https://errata.almalinux.org/9/ALSA-2023-0953.htmlALSA-2023:0953ALSA-2023:0953 R_python3-devel-3.9.14-1.el9_1.2.x86_64.rpmg_python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpmR_python3-devel-3.9.14-1.el9_1.2.i686.rpm1_python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpmR_python3-devel-3.9.14-1.el9_1.2.x86_64.rpmg_python-unversioned-command-3.9.14-1.el9_1.2.noarch.rpmR_python3-devel-3.9.14-1.el9_1.2.i686.rpm1_python3-tkinter-3.9.14-1.el9_1.2.x86_64.rpm,% GBBBsecurityModerate: systemd security update]https://access.redhat.com/errata/RHSA-2023:0954RHSA-2023:0954RHSA-2023:0954 https://access.redhat.com/security/cve/CVE-2022-4415CVE-2022-4415CVE-2022-4415https://access.redhat.com/security/cve/CVE-2022-45873CVE-2022-45873CVE-2022-45873https://bugzilla.redhat.com/21490632149063https://bugzilla.redhat.com/21555152155515https://errata.almalinux.org/9/ALSA-2023-0954.htmlALSA-2023:0954ALSA-2023:0954 +9systemd-devel-250-12.el9_1.3.i686.rpm}9systemd-journal-remote-250-12.el9_1.3.x86_64.rpm+9systemd-devel-250-12.el9_1.3.x86_64.rpm+9systemd-devel-250-12.el9_1.3.i686.rpm}9systemd-journal-remote-250-12.el9_1.3.x86_64.rpm+9systemd-devel-250-12.el9_1.3.x86_64.rpm& MsecurityModerate: lua security updated8https://access.redhat.com/errata/RHSA-2023:0957RHSA-2023:0957RHSA-2023:0957 https://access.redhat.com/security/cve/CVE-2021-43519CVE-2021-43519CVE-2021-43519https://access.redhat.com/security/cve/CVE-2021-44964CVE-2021-44964CVE-2021-44964https://bugzilla.redhat.com/20476722047672https://bugzilla.redhat.com/20647722064772https://errata.almalinux.org/9/ALSA-2023-0957.htmlALSA-2023:0957ALSA-2023:0957 Nklua-5.4.4-2.el9_1.x86_64.rpmNklua-5.4.4-2.el9_1.x86_64.rpm{' PBBBBsecurityModerate: vim security updateehttps://access.redhat.com/errata/RHSA-2023:0958RHSA-2023:0958RHSA-2023:0958 https://access.redhat.com/security/cve/CVE-2022-47024CVE-2022-47024CVE-2022-47024https://bugzilla.redhat.com/21636132163613https://errata.almalinux.org/9/ALSA-2023-0958.htmlALSA-2023:0958ALSA-2023:0958 fYvim-X11-8.2.2637-20.el9_1.x86_64.rpmhYvim-enhanced-8.2.2637-20.el9_1.x86_64.rpmgYvim-common-8.2.2637-20.el9_1.x86_64.rpmfYvim-X11-8.2.2637-20.el9_1.x86_64.rpmhYvim-enhanced-8.2.2637-20.el9_1.x86_64.rpmgYvim-common-8.2.2637-20.el9_1.x86_64.rpm@( WBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security updateW https://access.redhat.com/errata/RHSA-2023:0965RHSA-2023:0965RHSA-2023:0965 https://access.redhat.com/security/cve/CVE-2022-31628CVE-2022-31628CVE-2022-31628https://access.redhat.com/security/cve/CVE-2022-31629CVE-2022-31629CVE-2022-31629https://access.redhat.com/security/cve/CVE-2022-31630CVE-2022-31630CVE-2022-31630https://access.redhat.com/security/cve/CVE-2022-31631CVE-2022-31631CVE-2022-31631https://access.redhat.com/security/cve/CVE-2022-37454CVE-2022-37454CVE-2022-37454https://bugzilla.redhat.com/21336872133687https://bugzilla.redhat.com/21336882133688https://bugzilla.redhat.com/21392802139280https://bugzilla.redhat.com/21402002140200https://bugzilla.redhat.com/21587912158791https://errata.almalinux.org/9/ALSA-2023-0965.htmlALSA-2023:0965ALSA-2023:0965 t?php-gd-8.0.27-1.el9_1.x86_64.rpm?php-xml-8.0.27-1.el9_1.x86_64.rpmo?php-devel-8.0.27-1.el9_1.x86_64.rpmu?php-gmp-8.0.27-1.el9_1.x86_64.rpmx?php-mbstring-8.0.27-1.el9_1.x86_64.rpmk?php-cli-8.0.27-1.el9_1.x86_64.rpm~?php-process-8.0.27-1.el9_1.x86_64.rpmw?php-ldap-8.0.27-1.el9_1.x86_64.rpmq?php-enchant-8.0.27-1.el9_1.x86_64.rpm|?php-pdo-8.0.27-1.el9_1.x86_64.rpm{?php-opcache-8.0.27-1.el9_1.x86_64.rpmv?php-intl-8.0.27-1.el9_1.x86_64.rpml?php-common-8.0.27-1.el9_1.x86_64.rpmz?php-odbc-8.0.27-1.el9_1.x86_64.rpmp?php-embedded-8.0.27-1.el9_1.x86_64.rpmj?php-bcmath-8.0.27-1.el9_1.x86_64.rpm?php-soap-8.0.27-1.el9_1.x86_64.rpmy?php-mysqlnd-8.0.27-1.el9_1.x86_64.rpm?php-snmp-8.0.27-1.el9_1.x86_64.rpmm?php-dba-8.0.27-1.el9_1.x86_64.rpms?php-fpm-8.0.27-1.el9_1.x86_64.rpm?php-8.0.27-1.el9_1.x86_64.rpmr?php-ffi-8.0.27-1.el9_1.x86_64.rpm}?php-pgsql-8.0.27-1.el9_1.x86_64.rpmn?php-dbg-8.0.27-1.el9_1.x86_64.rpmt?php-gd-8.0.27-1.el9_1.x86_64.rpm?php-xml-8.0.27-1.el9_1.x86_64.rpmo?php-devel-8.0.27-1.el9_1.x86_64.rpmu?php-gmp-8.0.27-1.el9_1.x86_64.rpmx?php-mbstring-8.0.27-1.el9_1.x86_64.rpmk?php-cli-8.0.27-1.el9_1.x86_64.rpm~?php-process-8.0.27-1.el9_1.x86_64.rpmw?php-ldap-8.0.27-1.el9_1.x86_64.rpmq?php-enchant-8.0.27-1.el9_1.x86_64.rpm|?php-pdo-8.0.27-1.el9_1.x86_64.rpm{?php-opcache-8.0.27-1.el9_1.x86_64.rpmv?php-intl-8.0.27-1.el9_1.x86_64.rpml?php-common-8.0.27-1.el9_1.x86_64.rpmz?php-odbc-8.0.27-1.el9_1.x86_64.rpmp?php-embedded-8.0.27-1.el9_1.x86_64.rpmj?php-bcmath-8.0.27-1.el9_1.x86_64.rpm?php-soap-8.0.27-1.el9_1.x86_64.rpmy?php-mysqlnd-8.0.27-1.el9_1.x86_64.rpm?php-snmp-8.0.27-1.el9_1.x86_64.rpmm?php-dba-8.0.27-1.el9_1.x86_64.rpms?php-fpm-8.0.27-1.el9_1.x86_64.rpm?php-8.0.27-1.el9_1.x86_64.rpmr?php-ffi-8.0.27-1.el9_1.x86_64.rpm}?php-pgsql-8.0.27-1.el9_1.x86_64.rpmn?php-dbg-8.0.27-1.el9_1.x86_64.rpmF) JBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security and bug fix updateXIhttps://access.redhat.com/errata/RHSA-2023:0970RHSA-2023:0970RHSA-2023:0970 https://access.redhat.com/security/cve/CVE-2006-20001CVE-2006-20001CVE-2006-20001https://access.redhat.com/security/cve/CVE-2022-36760CVE-2022-36760CVE-2022-36760https://access.redhat.com/security/cve/CVE-2022-37436CVE-2022-37436CVE-2022-37436https://bugzilla.redhat.com/21617732161773https://bugzilla.redhat.com/21617742161774https://bugzilla.redhat.com/21617772161777https://errata.almalinux.org/9/ALSA-2023-0970.htmlALSA-2023:0970ALSA-2023:0970 :Ymod_session-2.4.53-7.el9_1.1.x86_64.rpm9jmod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm`Yhttpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm7Ymod_ldap-2.4.53-7.el9_1.1.x86_64.rpm"Yhttpd-core-2.4.53-7.el9_1.1.x86_64.rpm8Ymod_lua-2.4.53-7.el9_1.1.x86_64.rpmaYhttpd-manual-2.4.53-7.el9_1.1.noarch.rpm$Yhttpd-tools-2.4.53-7.el9_1.1.x86_64.rpm!Yhttpd-2.4.53-7.el9_1.1.x86_64.rpm#Yhttpd-devel-2.4.53-7.el9_1.1.x86_64.rpm;jmod_ssl-2.4.53-7.el9_1.1.x86_64.rpm :Ymod_session-2.4.53-7.el9_1.1.x86_64.rpm9jmod_proxy_html-2.4.53-7.el9_1.1.x86_64.rpm`Yhttpd-filesystem-2.4.53-7.el9_1.1.noarch.rpm7Ymod_ldap-2.4.53-7.el9_1.1.x86_64.rpm"Yhttpd-core-2.4.53-7.el9_1.1.x86_64.rpm8Ymod_lua-2.4.53-7.el9_1.1.x86_64.rpmaYhttpd-manual-2.4.53-7.el9_1.1.noarch.rpm$Yhttpd-tools-2.4.53-7.el9_1.1.x86_64.rpm!Yhttpd-2.4.53-7.el9_1.1.x86_64.rpm#Yhttpd-devel-2.4.53-7.el9_1.1.x86_64.rpm;jmod_ssl-2.4.53-7.el9_1.1.x86_64.rpmt* !_securityImportant: pesign security update! https://access.redhat.com/errata/RHSA-2023:1067RHSA-2023:1067RHSA-2023:1067 https://access.redhat.com/security/cve/CVE-2022-3560CVE-2022-3560CVE-2022-3560https://bugzilla.redhat.com/21354202135420https://errata.almalinux.org/9/ALSA-2023-1067.htmlALSA-2023:1067ALSA-2023:1067 b9pesign-115-6.el9_1.x86_64.rpmb9pesign-115-6.el9_1.x86_64.rpm\+ *bBBBBBBsecurityModerate: libjpeg-turbo security update..https://access.redhat.com/errata/RHSA-2023:1068RHSA-2023:1068RHSA-2023:1068 https://access.redhat.com/security/cve/CVE-2021-46822CVE-2021-46822CVE-2021-46822https://bugzilla.redhat.com/21000442100044https://errata.almalinux.org/9/ALSA-2023-1068.htmlALSA-2023:1068ALSA-2023:1068 y@libjpeg-turbo-2.0.90-6.el9_1.x86_64.rpmz@libjpeg-turbo-devel-2.0.90-6.el9_1.x86_64.rpmy@libjpeg-turbo-2.0.90-6.el9_1.i686.rpm;@libjpeg-turbo-utils-2.0.90-6.el9_1.x86_64.rpmz@libjpeg-turbo-devel-2.0.90-6.el9_1.i686.rpmy@libjpeg-turbo-2.0.90-6.el9_1.x86_64.rpmz@libjpeg-turbo-devel-2.0.90-6.el9_1.x86_64.rpmy@libjpeg-turbo-2.0.90-6.el9_1.i686.rpm;@libjpeg-turbo-utils-2.0.90-6.el9_1.x86_64.rpmz@libjpeg-turbo-devel-2.0.90-6.el9_1.i686.rpm, 6kBBBBBBBBBsecurityModerate: gnutls security and bug fix update\https://access.redhat.com/errata/RHSA-2023:1141RHSA-2023:1141RHSA-2023:1141 https://access.redhat.com/security/cve/CVE-2023-0361CVE-2023-0361CVE-2023-0361https://bugzilla.redhat.com/21625962162596https://errata.almalinux.org/9/ALSA-2023-1141.htmlALSA-2023:1141ALSA-2023:1141 Pgnutls-c++-3.7.6-18.el9_1.x86_64.rpmRgnutls-devel-3.7.6-18.el9_1.i686.rpmgnutls-utils-3.7.6-18.el9_1.x86_64.rpmQgnutls-dane-3.7.6-18.el9_1.i686.rpmRgnutls-devel-3.7.6-18.el9_1.x86_64.rpmPgnutls-c++-3.7.6-18.el9_1.i686.rpmQgnutls-dane-3.7.6-18.el9_1.x86_64.rpmPgnutls-c++-3.7.6-18.el9_1.x86_64.rpmRgnutls-devel-3.7.6-18.el9_1.i686.rpmgnutls-utils-3.7.6-18.el9_1.x86_64.rpmQgnutls-dane-3.7.6-18.el9_1.i686.rpmRgnutls-devel-3.7.6-18.el9_1.x86_64.rpmPgnutls-c++-3.7.6-18.el9_1.i686.rpmQgnutls-dane-3.7.6-18.el9_1.x86_64.rpm- ;wBBsecurityImportant: firefox security update{% https://access.redhat.com/errata/RHSA-2023:1337RHSA-2023:1337RHSA-2023:1337 https://access.redhat.com/security/cve/CVE-2023-25751CVE-2023-25751CVE-2023-25751https://access.redhat.com/security/cve/CVE-2023-25752CVE-2023-25752CVE-2023-25752https://access.redhat.com/security/cve/CVE-2023-28162CVE-2023-28162CVE-2023-28162https://access.redhat.com/security/cve/CVE-2023-28164CVE-2023-28164CVE-2023-28164https://access.redhat.com/security/cve/CVE-2023-28176CVE-2023-28176CVE-2023-28176https://bugzilla.redhat.com/21784582178458https://bugzilla.redhat.com/21784602178460https://bugzilla.redhat.com/21784662178466https://bugzilla.redhat.com/21784702178470https://bugzilla.redhat.com/21784722178472https://errata.almalinux.org/9/ALSA-2023-1337.htmlALSA-2023:1337ALSA-2023:1337 OLfirefox-x11-102.9.0-3.el9_1.alma.x86_64.rpm7Lfirefox-102.9.0-3.el9_1.alma.x86_64.rpmOLfirefox-x11-102.9.0-3.el9_1.alma.x86_64.rpm7Lfirefox-102.9.0-3.el9_1.alma.x86_64.rpmG. |BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: nss security and bug fix update https://access.redhat.com/errata/RHSA-2023:1368RHSA-2023:1368RHSA-2023:1368 https://access.redhat.com/security/cve/CVE-2023-0767CVE-2023-0767CVE-2023-0767https://bugzilla.redhat.com/21703772170377https://errata.almalinux.org/9/ALSA-2023-1368.htmlALSA-2023:1368ALSA-2023:1368 'hnss-softokn-devel-3.79.0-17.el9_1.i686.rpm"tnspr-4.34.0-17.el9_1.i686.rpm\hnss-tools-3.79.0-17.el9_1.x86_64.rpm+hnss-util-devel-3.79.0-17.el9_1.x86_64.rpm)hnss-softokn-freebl-devel-3.79.0-17.el9_1.x86_64.rpm&hnss-softokn-3.79.0-17.el9_1.i686.rpm$hnss-3.79.0-17.el9_1.i686.rpm%hnss-devel-3.79.0-17.el9_1.x86_64.rpm[hnss-sysinit-3.79.0-17.el9_1.x86_64.rpm*hnss-util-3.79.0-17.el9_1.x86_64.rpm*hnss-util-3.79.0-17.el9_1.i686.rpm)hnss-softokn-freebl-devel-3.79.0-17.el9_1.i686.rpm(hnss-softokn-freebl-3.79.0-17.el9_1.x86_64.rpm#tnspr-devel-4.34.0-17.el9_1.i686.rpm"tnspr-4.34.0-17.el9_1.x86_64.rpm(hnss-softokn-freebl-3.79.0-17.el9_1.i686.rpm%hnss-devel-3.79.0-17.el9_1.i686.rpm#tnspr-devel-4.34.0-17.el9_1.x86_64.rpm$hnss-3.79.0-17.el9_1.x86_64.rpm'hnss-softokn-devel-3.79.0-17.el9_1.x86_64.rpm&hnss-softokn-3.79.0-17.el9_1.x86_64.rpm+hnss-util-devel-3.79.0-17.el9_1.i686.rpm'hnss-softokn-devel-3.79.0-17.el9_1.i686.rpm"tnspr-4.34.0-17.el9_1.i686.rpm\hnss-tools-3.79.0-17.el9_1.x86_64.rpm+hnss-util-devel-3.79.0-17.el9_1.x86_64.rpm)hnss-softokn-freebl-devel-3.79.0-17.el9_1.x86_64.rpm&hnss-softokn-3.79.0-17.el9_1.i686.rpm$hnss-3.79.0-17.el9_1.i686.rpm%hnss-devel-3.79.0-17.el9_1.x86_64.rpm[hnss-sysinit-3.79.0-17.el9_1.x86_64.rpm*hnss-util-3.79.0-17.el9_1.x86_64.rpm*hnss-util-3.79.0-17.el9_1.i686.rpm)hnss-softokn-freebl-devel-3.79.0-17.el9_1.i686.rpm(hnss-softokn-freebl-3.79.0-17.el9_1.x86_64.rpm#tnspr-devel-4.34.0-17.el9_1.i686.rpm"tnspr-4.34.0-17.el9_1.x86_64.rpm(hnss-softokn-freebl-3.79.0-17.el9_1.i686.rpm%hnss-devel-3.79.0-17.el9_1.i686.rpm#tnspr-devel-4.34.0-17.el9_1.x86_64.rpm$hnss-3.79.0-17.el9_1.x86_64.rpm'hnss-softokn-devel-3.79.0-17.el9_1.x86_64.rpm&hnss-softokn-3.79.0-17.el9_1.x86_64.rpm+hnss-util-devel-3.79.0-17.el9_1.i686.rpmJ/ !_securityImportant: thunderbird security update8t https://access.redhat.com/errata/RHSA-2023:1407RHSA-2023:1407RHSA-2023:1407 https://access.redhat.com/security/cve/CVE-2023-25751CVE-2023-25751CVE-2023-25751https://access.redhat.com/security/cve/CVE-2023-25752CVE-2023-25752CVE-2023-25752https://access.redhat.com/security/cve/CVE-2023-28162CVE-2023-28162CVE-2023-28162https://access.redhat.com/security/cve/CVE-2023-28164CVE-2023-28164CVE-2023-28164https://access.redhat.com/security/cve/CVE-2023-28176CVE-2023-28176CVE-2023-28176https://bugzilla.redhat.com/21784582178458https://bugzilla.redhat.com/21784602178460https://bugzilla.redhat.com/21784662178466https://bugzilla.redhat.com/21784702178470https://bugzilla.redhat.com/21784722178472https://errata.almalinux.org/9/ALSA-2023-1407.htmlALSA-2023:1407ALSA-2023:1407 95thunderbird-102.9.0-1.el9_1.alma.x86_64.rpm95thunderbird-102.9.0-1.el9_1.alma.x86_64.rpm0 -bBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement update,Yhttps://access.redhat.com/errata/RHSA-2023:1470RHSA-2023:1470RHSA-2023:1470 https://access.redhat.com/security/cve/CVE-2022-4269CVE-2022-4269CVE-2022-4269https://access.redhat.com/security/cve/CVE-2022-4744CVE-2022-4744CVE-2022-4744https://access.redhat.com/security/cve/CVE-2023-0266CVE-2023-0266CVE-2023-0266https://bugzilla.redhat.com/21502722150272https://bugzilla.redhat.com/21563222156322https://bugzilla.redhat.com/21633792163379https://errata.almalinux.org/9/ALSA-2023-1470.htmlALSA-2023:1470ALSA-2023:1470 #bkernel-devel-5.14.0-162.22.2.el9_1.x86_64.rpm%bperf-5.14.0-162.22.2.el9_1.x86_64.rpm!bkernel-debug-devel-5.14.0-162.22.2.el9_1.x86_64.rpm$bkernel-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpmbkernel-doc-5.14.0-162.22.2.el9_1.noarch.rpm"bkernel-debug-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpm#bkernel-devel-5.14.0-162.22.2.el9_1.x86_64.rpm%bperf-5.14.0-162.22.2.el9_1.x86_64.rpm!bkernel-debug-devel-5.14.0-162.22.2.el9_1.x86_64.rpm$bkernel-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpmbkernel-doc-5.14.0-162.22.2.el9_1.noarch.rpm"bkernel-debug-devel-matched-5.14.0-162.22.2.el9_1.x86_64.rpm?1 9nBBBBBBBBBsecurityImportant: tigervnc security updatephttps://access.redhat.com/errata/RHSA-2023:1592RHSA-2023:1592RHSA-2023:1592 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-1592.htmlALSA-2023:1592ALSA-2023:1592 pttigervnc-server-minimal-1.12.0-5.el9_1.2.x86_64.rpm7ttigervnc-icons-1.12.0-5.el9_1.2.noarch.rpmqttigervnc-server-module-1.12.0-5.el9_1.2.x86_64.rpmottigervnc-server-1.12.0-5.el9_1.2.x86_64.rpm8ttigervnc-license-1.12.0-5.el9_1.2.noarch.rpmnttigervnc-1.12.0-5.el9_1.2.x86_64.rpm9ttigervnc-selinux-1.12.0-5.el9_1.2.noarch.rpmpttigervnc-server-minimal-1.12.0-5.el9_1.2.x86_64.rpm7ttigervnc-icons-1.12.0-5.el9_1.2.noarch.rpmqttigervnc-server-module-1.12.0-5.el9_1.2.x86_64.rpmottigervnc-server-1.12.0-5.el9_1.2.x86_64.rpm8ttigervnc-license-1.12.0-5.el9_1.2.noarch.rpmnttigervnc-1.12.0-5.el9_1.2.x86_64.rpm9ttigervnc-selinux-1.12.0-5.el9_1.2.noarch.rpm-2 zBBBBBBBBBBBBBBBBBBBBsecurityImportant: httpd and mod_http2 security updateuhttps://access.redhat.com/errata/RHSA-2023:1670RHSA-2023:1670RHSA-2023:1670 https://access.redhat.com/security/cve/CVE-2023-25690CVE-2023-25690CVE-2023-25690https://bugzilla.redhat.com/21762092176209https://errata.almalinux.org/9/ALSA-2023-1670.htmlALSA-2023:1670ALSA-2023:1670 `Zhttpd-filesystem-2.4.53-7.el9_1.5.noarch.rpm8Zmod_lua-2.4.53-7.el9_1.5.x86_64.rpmaZhttpd-manual-2.4.53-7.el9_1.5.noarch.rpm:Zmod_session-2.4.53-7.el9_1.5.x86_64.rpm"Zhttpd-core-2.4.53-7.el9_1.5.x86_64.rpm7Zmod_ldap-2.4.53-7.el9_1.5.x86_64.rpm9kmod_proxy_html-2.4.53-7.el9_1.5.x86_64.rpm#Zhttpd-devel-2.4.53-7.el9_1.5.x86_64.rpm$Zhttpd-tools-2.4.53-7.el9_1.5.x86_64.rpm;kmod_ssl-2.4.53-7.el9_1.5.x86_64.rpm)mod_http2-1.15.19-3.el9_1.5.x86_64.rpm!Zhttpd-2.4.53-7.el9_1.5.x86_64.rpm `Zhttpd-filesystem-2.4.53-7.el9_1.5.noarch.rpm8Zmod_lua-2.4.53-7.el9_1.5.x86_64.rpmaZhttpd-manual-2.4.53-7.el9_1.5.noarch.rpm:Zmod_session-2.4.53-7.el9_1.5.x86_64.rpm"Zhttpd-core-2.4.53-7.el9_1.5.x86_64.rpm7Zmod_ldap-2.4.53-7.el9_1.5.x86_64.rpm9kmod_proxy_html-2.4.53-7.el9_1.5.x86_64.rpm#Zhttpd-devel-2.4.53-7.el9_1.5.x86_64.rpm$Zhttpd-tools-2.4.53-7.el9_1.5.x86_64.rpm;kmod_ssl-2.4.53-7.el9_1.5.x86_64.rpm)mod_http2-1.15.19-3.el9_1.5.x86_64.rpm!Zhttpd-2.4.53-7.el9_1.5.x86_64.rpm3 !QBBBBBBBBBBBBBBsecurityModerate: postgresql security update|jhttps://access.redhat.com/errata/RHSA-2023:1693RHSA-2023:1693RHSA-2023:1693 https://access.redhat.com/security/cve/CVE-2022-2625CVE-2022-2625CVE-2022-2625https://access.redhat.com/security/cve/CVE-2022-41862CVE-2022-41862CVE-2022-41862https://bugzilla.redhat.com/21138252113825https://bugzilla.redhat.com/21657222165722https://errata.almalinux.org/9/ALSA-2023-1693.htmlALSA-2023:1693ALSA-2023:1693  postgresql-upgrade-13.10-1.el9_1.x86_64.rpm postgresql-plpython3-13.10-1.el9_1.x86_64.rpmY postgresql-13.10-1.el9_1.x86_64.rpm postgresql-server-13.10-1.el9_1.x86_64.rpm postgresql-pltcl-13.10-1.el9_1.x86_64.rpm postgresql-plperl-13.10-1.el9_1.x86_64.rpm postgresql-private-libs-13.10-1.el9_1.x86_64.rpm postgresql-contrib-13.10-1.el9_1.x86_64.rpm postgresql-upgrade-13.10-1.el9_1.x86_64.rpm postgresql-plpython3-13.10-1.el9_1.x86_64.rpmY postgresql-13.10-1.el9_1.x86_64.rpm postgresql-server-13.10-1.el9_1.x86_64.rpm postgresql-pltcl-13.10-1.el9_1.x86_64.rpm postgresql-plperl-13.10-1.el9_1.x86_64.rpm postgresql-private-libs-13.10-1.el9_1.x86_64.rpm postgresql-contrib-13.10-1.el9_1.x86_64.rpm4 $bsecurityModerate: haproxy security updatef=https://access.redhat.com/errata/RHSA-2023:1696RHSA-2023:1696RHSA-2023:1696 https://access.redhat.com/security/cve/CVE-2023-0056CVE-2023-0056CVE-2023-0056https://access.redhat.com/security/cve/CVE-2023-25725CVE-2023-25725CVE-2023-25725https://bugzilla.redhat.com/21608082160808https://bugzilla.redhat.com/21690892169089https://errata.almalinux.org/9/ALSA-2023-1696.htmlALSA-2023:1696ALSA-2023:1696  haproxy-2.4.17-3.el9_1.2.x86_64.rpm haproxy-2.4.17-3.el9_1.2.x86_64.rpm5 (eBsecurityModerate: curl security update#9https://access.redhat.com/errata/RHSA-2023:1701RHSA-2023:1701RHSA-2023:1701 https://access.redhat.com/security/cve/CVE-2023-23916CVE-2023-23916CVE-2023-23916https://bugzilla.redhat.com/21678152167815https://errata.almalinux.org/9/ALSA-2023-1701.htmlALSA-2023:1701ALSA-2023:1701  Slibcurl-devel-7.76.1-19.el9_1.2.i686.rpm Slibcurl-devel-7.76.1-19.el9_1.2.x86_64.rpm Slibcurl-devel-7.76.1-19.el9_1.2.i686.rpm Slibcurl-devel-7.76.1-19.el9_1.2.x86_64.rpm 6 4iBBBBBBBBBsecurityImportant: kernel security and bug fix update\4https://access.redhat.com/errata/RHSA-2023:1703RHSA-2023:1703RHSA-2023:1703 https://access.redhat.com/security/cve/CVE-2023-0386CVE-2023-0386CVE-2023-0386https://bugzilla.redhat.com/21595052159505https://errata.almalinux.org/9/ALSA-2023-1703.htmlALSA-2023:1703ALSA-2023:1703 ckernel-doc-5.14.0-162.23.1.el9_1.noarch.rpm!ckernel-debug-devel-5.14.0-162.23.1.el9_1.x86_64.rpm$ckernel-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm%cperf-5.14.0-162.23.1.el9_1.x86_64.rpm"ckernel-debug-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm#ckernel-devel-5.14.0-162.23.1.el9_1.x86_64.rpmckernel-doc-5.14.0-162.23.1.el9_1.noarch.rpm!ckernel-debug-devel-5.14.0-162.23.1.el9_1.x86_64.rpm$ckernel-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm%cperf-5.14.0-162.23.1.el9_1.x86_64.rpm"ckernel-debug-devel-matched-5.14.0-162.23.1.el9_1.x86_64.rpm#ckernel-devel-5.14.0-162.23.1.el9_1.x86_64.rpm 7 9uBBsecurityImportant: firefox security updateDhttps://access.redhat.com/errata/RHSA-2023:1786RHSA-2023:1786RHSA-2023:1786 https://access.redhat.com/security/cve/CVE-2023-1945CVE-2023-1945CVE-2023-1945https://access.redhat.com/security/cve/CVE-2023-29533CVE-2023-29533CVE-2023-29533https://access.redhat.com/security/cve/CVE-2023-29535CVE-2023-29535CVE-2023-29535https://access.redhat.com/security/cve/CVE-2023-29536CVE-2023-29536CVE-2023-29536https://access.redhat.com/security/cve/CVE-2023-29539CVE-2023-29539CVE-2023-29539https://access.redhat.com/security/cve/CVE-2023-29541CVE-2023-29541CVE-2023-29541https://access.redhat.com/security/cve/CVE-2023-29548CVE-2023-29548CVE-2023-29548https://access.redhat.com/security/cve/CVE-2023-29550CVE-2023-29550CVE-2023-29550https://bugzilla.redhat.com/21861012186101https://bugzilla.redhat.com/21861032186103https://bugzilla.redhat.com/21861042186104https://bugzilla.redhat.com/21861052186105https://bugzilla.redhat.com/21861062186106https://bugzilla.redhat.com/21861092186109https://bugzilla.redhat.com/21861102186110https://bugzilla.redhat.com/21861112186111https://errata.almalinux.org/9/ALSA-2023-1786.htmlALSA-2023:1786ALSA-2023:1786 7Ifirefox-102.10.0-1.el9_1.alma.x86_64.rpmOIfirefox-x11-102.10.0-1.el9_1.alma.x86_64.rpm7Ifirefox-102.10.0-1.el9_1.alma.x86_64.rpmOIfirefox-x11-102.10.0-1.el9_1.alma.x86_64.rpmM8 wemacs-27.2-6.el9_1.1.x86_64.rpm?wemacs-common-27.2-6.el9_1.1.x86_64.rpmAwemacs-nox-27.2-6.el9_1.1.x86_64.rpmFwemacs-filesystem-27.2-6.el9_1.1.noarch.rpm@wemacs-lucid-27.2-6.el9_1.1.x86_64.rpm>wemacs-27.2-6.el9_1.1.x86_64.rpm?wemacs-common-27.2-6.el9_1.1.x86_64.rpmAwemacs-nox-27.2-6.el9_1.1.x86_64.rpmFwemacs-filesystem-27.2-6.el9_1.1.noarch.rpm@wemacs-lucid-27.2-6.el9_1.1.x86_64.rpmȭ> GBBBBsecurityImportant: libwebp security updatej*https://access.redhat.com/errata/RHSA-2023:2078RHSA-2023:2078RHSA-2023:2078 https://access.redhat.com/security/cve/CVE-2023-1999CVE-2023-1999CVE-2023-1999https://bugzilla.redhat.com/21861022186102https://errata.almalinux.org/9/ALSA-2023-2078.htmlALSA-2023:2078ALSA-2023:2078 9libwebp-devel-1.2.0-6.el9_1.x86_64.rpm9libwebp-1.2.0-6.el9_1.i686.rpm9libwebp-1.2.0-6.el9_1.x86_64.rpm9libwebp-devel-1.2.0-6.el9_1.i686.rpm9libwebp-devel-1.2.0-6.el9_1.x86_64.rpm9libwebp-1.2.0-6.el9_1.i686.rpm9libwebp-1.2.0-6.el9_1.x86_64.rpm9libwebp-devel-1.2.0-6.el9_1.i686.rpmȩV? NBBBBBBBBBBsecurityImportant: samba security updatehttps://access.redhat.com/errata/RHSA-2023:2127RHSA-2023:2127RHSA-2023:2127 https://access.redhat.com/security/cve/CVE-2022-38023CVE-2022-38023CVE-2022-38023https://bugzilla.redhat.com/21543622154362https://errata.almalinux.org/9/ALSA-2023-2127.htmlALSA-2023:2127ALSA-2023:2127 /,samba-winbind-clients-4.16.4-103.el9_1.x86_64.rpm0,samba-winbind-krb5-locator-4.16.4-103.el9_1.x86_64.rpm,,samba-client-4.16.4-103.el9_1.x86_64.rpm-,samba-krb5-printing-4.16.4-103.el9_1.x86_64.rpm1,samba-winexe-4.16.4-103.el9_1.x86_64.rpm.,samba-vfs-iouring-4.16.4-103.el9_1.x86_64.rpm/,samba-winbind-clients-4.16.4-103.el9_1.x86_64.rpm0,samba-winbind-krb5-locator-4.16.4-103.el9_1.x86_64.rpm,,samba-client-4.16.4-103.el9_1.x86_64.rpm-,samba-krb5-printing-4.16.4-103.el9_1.x86_64.rpm1,samba-winexe-4.16.4-103.el9_1.x86_64.rpm.,samba-vfs-iouring-4.16.4-103.el9_1.x86_64.rpmӿ!@ 1[BBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security and bug fix update(https://access.redhat.com/errata/RHSA-2023:2161RHSA-2023:2161RHSA-2023:2161 https://access.redhat.com/security/cve/CVE-2022-36087CVE-2022-36087CVE-2022-36087https://bugzilla.redhat.com/21284252128425https://errata.almalinux.org/9/ALSA-2023-2161.htmlALSA-2023:2161ALSA-2023:2161 ]#fence-agents-ibm-powervs-4.10.0-43.el9.noarch.rpm#fence-virt-4.10.0-43.el9.x86_64.rpm#fence-virtd-serial-4.10.0-43.el9.x86_64.rpm#fence-virtd-libvirt-4.10.0-43.el9.x86_64.rpm#fence-virtd-tcp-4.10.0-43.el9.x86_64.rpm#fence-virtd-multicast-4.10.0-43.el9.x86_64.rpm\#fence-agents-common-4.10.0-43.el9.noarch.rpm_#fence-agents-virsh-4.10.0-43.el9.noarch.rpm#fence-agents-compute-4.10.0-43.el9.x86_64.rpm#fence-virtd-cpg-4.10.0-43.el9.x86_64.rpm#fence-agents-kubevirt-4.10.0-43.el9.x86_64.rpm#fence-virtd-4.10.0-43.el9.x86_64.rpm^#fence-agents-ibm-vpc-4.10.0-43.el9.noarch.rpm ]#fence-agents-ibm-powervs-4.10.0-43.el9.noarch.rpm#fence-virt-4.10.0-43.el9.x86_64.rpm#fence-virtd-serial-4.10.0-43.el9.x86_64.rpm#fence-virtd-libvirt-4.10.0-43.el9.x86_64.rpm#fence-virtd-tcp-4.10.0-43.el9.x86_64.rpm#fence-virtd-multicast-4.10.0-43.el9.x86_64.rpm\#fence-agents-common-4.10.0-43.el9.noarch.rpm_#fence-agents-virsh-4.10.0-43.el9.noarch.rpm#fence-agents-compute-4.10.0-43.el9.x86_64.rpm#fence-virtd-cpg-4.10.0-43.el9.x86_64.rpm#fence-agents-kubevirt-4.10.0-43.el9.x86_64.rpm#fence-virtd-4.10.0-43.el9.x86_64.rpm^#fence-agents-ibm-vpc-4.10.0-43.el9.noarch.rpmjA rBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security, bug fix, and enhancement update.lhttps://access.redhat.com/errata/RHSA-2023:2162RHSA-2023:2162RHSA-2023:2162 https://access.redhat.com/security/cve/CVE-2022-3165CVE-2022-3165CVE-2022-3165https://access.redhat.com/security/cve/CVE-2022-4172CVE-2022-4172CVE-2022-4172https://bugzilla.redhat.com/21297392129739https://bugzilla.redhat.com/21491052149105https://errata.almalinux.org/9/ALSA-2023-2162.htmlALSA-2023:2162ALSA-2023:2162  `qemu-guest-agent-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-common-7.2.0-14.el9_2.x86_64.rpm `qemu-img-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-block-rbd-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-device-usb-host-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-audio-pa-7.2.0-14.el9_2.x86_64.rpm `qemu-kvm-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-docs-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-block-curl-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.x86_64.rpm`qemu-pr-helper-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-tools-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-ui-opengl-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-core-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.x86_64.rpm `qemu-guest-agent-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-common-7.2.0-14.el9_2.x86_64.rpm `qemu-img-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-block-rbd-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-device-usb-host-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-audio-pa-7.2.0-14.el9_2.x86_64.rpm `qemu-kvm-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-docs-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-block-curl-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-ui-egl-headless-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.x86_64.rpm`qemu-pr-helper-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-tools-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-ui-opengl-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-core-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-device-usb-redirect-7.2.0-14.el9_2.x86_64.rpm`qemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.x86_64.rpmB securityImportant: edk2 security, bug fix, and enhancement update https://access.redhat.com/errata/RHSA-2023:2165RHSA-2023:2165RHSA-2023:2165 https://access.redhat.com/security/cve/CVE-2021-38578CVE-2021-38578CVE-2021-38578https://access.redhat.com/security/cve/CVE-2022-4304CVE-2022-4304CVE-2022-4304https://access.redhat.com/security/cve/CVE-2022-4450CVE-2022-4450CVE-2022-4450https://access.redhat.com/security/cve/CVE-2023-0215CVE-2023-0215CVE-2023-0215https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/19603211960321https://bugzilla.redhat.com/21644402164440https://bugzilla.redhat.com/21644872164487https://bugzilla.redhat.com/21644922164492https://bugzilla.redhat.com/21644942164494https://errata.almalinux.org/9/ALSA-2023-2165.htmlALSA-2023:2165ALSA-2023:2165 H(edk2-ovmf-20221207gitfff6d81270b5-9.el9_2.noarch.rpmH(edk2-ovmf-20221207gitfff6d81270b5-9.el9_2.noarch.rpmC 'YBBBBBBBBBBBBsecurityModerate: freeradius security and bug fix update)fhttps://access.redhat.com/errata/RHSA-2023:2166RHSA-2023:2166RHSA-2023:2166 https://access.redhat.com/security/cve/CVE-2022-41859CVE-2022-41859CVE-2022-41859https://access.redhat.com/security/cve/CVE-2022-41860CVE-2022-41860CVE-2022-41860https://access.redhat.com/security/cve/CVE-2022-41861CVE-2022-41861CVE-2022-41861https://bugzilla.redhat.com/20784832078483https://bugzilla.redhat.com/20784852078485https://bugzilla.redhat.com/20784872078487https://errata.almalinux.org/9/ALSA-2023-2166.htmlALSA-2023:2166ALSA-2023:2166 (freeradius-devel-3.0.21-37.el9.x86_64.rpm(freeradius-utils-3.0.21-37.el9.x86_64.rpm(freeradius-ldap-3.0.21-37.el9.x86_64.rpm(freeradius-3.0.21-37.el9.x86_64.rpm(freeradius-doc-3.0.21-37.el9.x86_64.rpmJ(python3-freeradius-3.0.21-37.el9.x86_64.rpm(freeradius-krb5-3.0.21-37.el9.x86_64.rpm(freeradius-devel-3.0.21-37.el9.x86_64.rpm(freeradius-utils-3.0.21-37.el9.x86_64.rpm(freeradius-ldap-3.0.21-37.el9.x86_64.rpm(freeradius-3.0.21-37.el9.x86_64.rpm(freeradius-doc-3.0.21-37.el9.x86_64.rpmJ(python3-freeradius-3.0.21-37.el9.x86_64.rpm(freeradius-krb5-3.0.21-37.el9.x86_64.rpm:D *hsecurityModerate: grafana security and enhancement update https://access.redhat.com/errata/RHSA-2023:2167RHSA-2023:2167RHSA-2023:2167 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-35957CVE-2022-35957CVE-2022-35957https://access.redhat.com/security/cve/CVE-2022-39229CVE-2022-39229CVE-2022-39229https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21255142125514https://bugzilla.redhat.com/21311492131149https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://errata.almalinux.org/9/ALSA-2023-2167.htmlALSA-2023:2167ALSA-2023:2167 F grafana-9.0.9-2.el9.x86_64.rpmF grafana-9.0.9-2.el9.x86_64.rpm=E -ksecurityModerate: grafana-pcp security and enhancement update{https://access.redhat.com/errata/RHSA-2023:2177RHSA-2023:2177RHSA-2023:2177 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://bugzilla.redhat.com/21246692124669https://errata.almalinux.org/9/ALSA-2023-2177.htmlALSA-2023:2177ALSA-2023:2177 dbgrafana-pcp-5.1.1-1.el9.x86_64.rpmdbgrafana-pcp-5.1.1-1.el9.x86_64.rpmF 0nsecurityModerate: libguestfs-winsupport security update https://access.redhat.com/errata/RHSA-2023:2179RHSA-2023:2179RHSA-2023:2179 https://access.redhat.com/security/cve/CVE-2021-46790CVE-2021-46790CVE-2021-46790https://access.redhat.com/security/cve/CVE-2022-30784CVE-2022-30784CVE-2022-30784https://access.redhat.com/security/cve/CVE-2022-30786CVE-2022-30786CVE-2022-30786https://access.redhat.com/security/cve/CVE-2022-30788CVE-2022-30788CVE-2022-30788https://access.redhat.com/security/cve/CVE-2022-30789CVE-2022-30789CVE-2022-30789https://bugzilla.redhat.com/20933142093314https://bugzilla.redhat.com/20933262093326https://bugzilla.redhat.com/20933402093340https://bugzilla.redhat.com/20933482093348https://bugzilla.redhat.com/20933582093358https://errata.almalinux.org/9/ALSA-2023-2179.htmlALSA-2023:2179ALSA-2023:2179 :libguestfs-winsupport-9.2-1.el9.x86_64.rpm:libguestfs-winsupport-9.2-1.el9.x86_64.rpmG 3qsecurityModerate: butane security, bug fix, and enhancement update%Ehttps://access.redhat.com/errata/RHSA-2023:2193RHSA-2023:2193RHSA-2023:2193 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://bugzilla.redhat.com/21138142113814https://bugzilla.redhat.com/21246692124669https://errata.almalinux.org/9/ALSA-2023-2193.htmlALSA-2023:2193ALSA-2023:2193 0{butane-0.16.0-1.el9.x86_64.rpm0{butane-0.16.0-1.el9.x86_64.rpmH 7tBsecurityModerate: frr security, bug fix, and enhancement updatejThttps://access.redhat.com/errata/RHSA-2023:2202RHSA-2023:2202RHSA-2023:2202 https://access.redhat.com/security/cve/CVE-2022-37032CVE-2022-37032CVE-2022-37032https://bugzilla.redhat.com/21287132128713https://errata.almalinux.org/9/ALSA-2023-2202.htmlALSA-2023:2202ALSA-2023:2202 _frr-8.3.1-5.el9.x86_64.rpm_frr-selinux-8.3.1-5.el9.noarch.rpm_frr-8.3.1-5.el9.x86_64.rpm_frr-selinux-8.3.1-5.el9.noarch.rpm9I xBBBBBBBBsecurityModerate: Image Builder security, bug fix, and enhancement update>G https://access.redhat.com/errata/RHSA-2023:2204RHSA-2023:2204RHSA-2023:2204 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2879CVE-2022-2879CVE-2022-2879https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21328672132867https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2204.htmlALSA-2023:2204ALSA-2023:2204 U4osbuild-composer-core-76-2.el9_2.alma.x86_64.rpmcCweldr-client-35.9-1.el9.x86_64.rpmV4osbuild-composer-worker-76-2.el9_2.alma.x86_64.rpmT4osbuild-composer-76-2.el9_2.alma.x86_64.rpmE4osbuild-composer-dnf-json-76-2.el9_2.alma.x86_64.rpmU4osbuild-composer-core-76-2.el9_2.alma.x86_64.rpmcCweldr-client-35.9-1.el9.x86_64.rpmV4osbuild-composer-worker-76-2.el9_2.alma.x86_64.rpmT4osbuild-composer-76-2.el9_2.alma.x86_64.rpmE4osbuild-composer-dnf-json-76-2.el9_2.alma.x86_64.rpmTJ CBBBBBBBsecurityModerate: gdk-pixbuf2 security update`https://access.redhat.com/errata/RHSA-2023:2216RHSA-2023:2216RHSA-2023:2216 https://access.redhat.com/security/cve/CVE-2021-44648CVE-2021-44648CVE-2021-44648https://access.redhat.com/security/cve/CVE-2021-46829CVE-2021-46829CVE-2021-46829https://bugzilla.redhat.com/20437222043722https://bugzilla.redhat.com/21149402114940https://errata.almalinux.org/9/ALSA-2023-2216.htmlALSA-2023:2216ALSA-2023:2216 `Dgdk-pixbuf2-modules-2.42.6-3.el9.x86_64.rpm^Dgdk-pixbuf2-2.42.6-3.el9.x86_64.rpm^Dgdk-pixbuf2-2.42.6-3.el9.i686.rpm_Dgdk-pixbuf2-devel-2.42.6-3.el9.x86_64.rpm`Dgdk-pixbuf2-modules-2.42.6-3.el9.i686.rpm_Dgdk-pixbuf2-devel-2.42.6-3.el9.i686.rpm`Dgdk-pixbuf2-modules-2.42.6-3.el9.x86_64.rpm^Dgdk-pixbuf2-2.42.6-3.el9.x86_64.rpm^Dgdk-pixbuf2-2.42.6-3.el9.i686.rpm_Dgdk-pixbuf2-devel-2.42.6-3.el9.x86_64.rpm`Dgdk-pixbuf2-modules-2.42.6-3.el9.i686.rpm_Dgdk-pixbuf2-devel-2.42.6-3.el9.i686.rpm#K MsecurityModerate: conmon security and bug fix updateeshttps://access.redhat.com/errata/RHSA-2023:2222RHSA-2023:2222RHSA-2023:2222 https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2222.htmlALSA-2023:2222ALSA-2023:2222 3*conmon-2.1.7-1.el9_2.x86_64.rpm3*conmon-2.1.7-1.el9_2.x86_64.rpmL PsecurityModerate: sysstat security and bug fix updateXHhttps://access.redhat.com/errata/RHSA-2023:2234RHSA-2023:2234RHSA-2023:2234 https://access.redhat.com/security/cve/CVE-2022-39377CVE-2022-39377CVE-2022-39377https://bugzilla.redhat.com/21412072141207https://errata.almalinux.org/9/ALSA-2023-2234.htmlALSA-2023:2234ALSA-2023:2234 \Asysstat-12.5.4-5.el9.x86_64.rpm\Asysstat-12.5.4-5.el9.x86_64.rpmM SBBsecurityModerate: toolbox security and bug fix update https://access.redhat.com/errata/RHSA-2023:2236RHSA-2023:2236RHSA-2023:2236 https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21138142113814https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2236.htmlALSA-2023:2236ALSA-2023:2236 r0toolbox-tests-0.0.99.3-9.el9.x86_64.rpmq0toolbox-0.0.99.3-9.el9.x86_64.rpmr0toolbox-tests-0.0.99.3-9.el9.x86_64.rpmq0toolbox-0.0.99.3-9.el9.x86_64.rpmN $XBBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update/Ohttps://access.redhat.com/errata/RHSA-2023:2248RHSA-2023:2248RHSA-2023:2248 https://access.redhat.com/security/cve/CVE-2022-3550CVE-2022-3550CVE-2022-3550https://access.redhat.com/security/cve/CVE-2022-3551CVE-2022-3551CVE-2022-3551https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21406982140698https://bugzilla.redhat.com/21407012140701https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-2248.htmlALSA-2023:2248ALSA-2023:2248 " xorg-x11-server-Xvfb-1.20.11-17.el9.x86_64.rpm$ xorg-x11-server-common-1.20.11-17.el9.x86_64.rpm xorg-x11-server-Xephyr-1.20.11-17.el9.x86_64.rpm! xorg-x11-server-Xorg-1.20.11-17.el9.x86_64.rpm xorg-x11-server-Xdmx-1.20.11-17.el9.x86_64.rpm xorg-x11-server-Xnest-1.20.11-17.el9.x86_64.rpm" xorg-x11-server-Xvfb-1.20.11-17.el9.x86_64.rpm$ xorg-x11-server-common-1.20.11-17.el9.x86_64.rpm xorg-x11-server-Xephyr-1.20.11-17.el9.x86_64.rpm! xorg-x11-server-Xorg-1.20.11-17.el9.x86_64.rpm xorg-x11-server-Xdmx-1.20.11-17.el9.x86_64.rpm xorg-x11-server-Xnest-1.20.11-17.el9.x86_64.rpmO 'esecurityModerate: xorg-x11-server-Xwayland security update~`https://access.redhat.com/errata/RHSA-2023:2249RHSA-2023:2249RHSA-2023:2249 https://access.redhat.com/security/cve/CVE-2022-3550CVE-2022-3550CVE-2022-3550https://access.redhat.com/security/cve/CVE-2022-3551CVE-2022-3551CVE-2022-3551https://access.redhat.com/security/cve/CVE-2022-4283CVE-2022-4283CVE-2022-4283https://access.redhat.com/security/cve/CVE-2022-46340CVE-2022-46340CVE-2022-46340https://access.redhat.com/security/cve/CVE-2022-46341CVE-2022-46341CVE-2022-46341https://access.redhat.com/security/cve/CVE-2022-46342CVE-2022-46342CVE-2022-46342https://access.redhat.com/security/cve/CVE-2022-46343CVE-2022-46343CVE-2022-46343https://access.redhat.com/security/cve/CVE-2022-46344CVE-2022-46344CVE-2022-46344https://access.redhat.com/security/cve/CVE-2023-0494CVE-2023-0494CVE-2023-0494https://bugzilla.redhat.com/21406982140698https://bugzilla.redhat.com/21407012140701https://bugzilla.redhat.com/21517552151755https://bugzilla.redhat.com/21517562151756https://bugzilla.redhat.com/21517572151757https://bugzilla.redhat.com/21517582151758https://bugzilla.redhat.com/21517602151760https://bugzilla.redhat.com/21517612151761https://bugzilla.redhat.com/21659952165995https://errata.almalinux.org/9/ALSA-2023-2249.htmlALSA-2023:2249ALSA-2023:2249 #xorg-x11-server-Xwayland-21.1.3-7.el9.x86_64.rpm#xorg-x11-server-Xwayland-21.1.3-7.el9.x86_64.rpm7P ,hBBsecurityModerate: buildah security and bug fix update^https://access.redhat.com/errata/RHSA-2023:2253RHSA-2023:2253RHSA-2023:2253 https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2253.htmlALSA-2023:2253ALSA-2023:2253 https://access.redhat.com/errata/RHSA-2023:2340RHSA-2023:2340RHSA-2023:2340 https://access.redhat.com/security/cve/CVE-2022-3570CVE-2022-3570CVE-2022-3570https://access.redhat.com/security/cve/CVE-2022-3597CVE-2022-3597CVE-2022-3597https://access.redhat.com/security/cve/CVE-2022-3598CVE-2022-3598CVE-2022-3598https://access.redhat.com/security/cve/CVE-2022-3599CVE-2022-3599CVE-2022-3599https://access.redhat.com/security/cve/CVE-2022-3626CVE-2022-3626CVE-2022-3626https://access.redhat.com/security/cve/CVE-2022-3627CVE-2022-3627CVE-2022-3627https://access.redhat.com/security/cve/CVE-2022-3970CVE-2022-3970CVE-2022-3970https://access.redhat.com/security/cve/CVE-2022-4645CVE-2022-4645CVE-2022-4645https://access.redhat.com/security/cve/CVE-2023-30774CVE-2023-30774CVE-2023-30774https://access.redhat.com/security/cve/CVE-2023-30775CVE-2023-30775CVE-2023-30775https://bugzilla.redhat.com/21427342142734https://bugzilla.redhat.com/21427362142736https://bugzilla.redhat.com/21427382142738https://bugzilla.redhat.com/21427402142740https://bugzilla.redhat.com/21427412142741https://bugzilla.redhat.com/21427422142742https://bugzilla.redhat.com/21489182148918https://bugzilla.redhat.com/21762202176220https://bugzilla.redhat.com/21871392187139https://bugzilla.redhat.com/21871412187141https://errata.almalinux.org/9/ALSA-2023-2340.htmlALSA-2023:2340ALSA-2023:2340 v~libtiff-devel-4.4.0-7.el9.i686.rpmu~libtiff-4.4.0-7.el9.x86_64.rpmu~libtiff-4.4.0-7.el9.i686.rpmv~libtiff-devel-4.4.0-7.el9.x86_64.rpmv~libtiff-devel-4.4.0-7.el9.i686.rpmu~libtiff-4.4.0-7.el9.x86_64.rpmu~libtiff-4.4.0-7.el9.i686.rpmv~libtiff-devel-4.4.0-7.el9.x86_64.rpm8^ 1osecurityModerate: git-lfs security and bug fix update5Mhttps://access.redhat.com/errata/RHSA-2023:2357RHSA-2023:2357RHSA-2023:2357 https://access.redhat.com/security/cve/CVE-2022-1705CVE-2022-1705CVE-2022-1705https://access.redhat.com/security/cve/CVE-2022-27664CVE-2022-27664CVE-2022-27664https://access.redhat.com/security/cve/CVE-2022-2880CVE-2022-2880CVE-2022-2880https://access.redhat.com/security/cve/CVE-2022-30630CVE-2022-30630CVE-2022-30630https://access.redhat.com/security/cve/CVE-2022-30632CVE-2022-30632CVE-2022-30632https://access.redhat.com/security/cve/CVE-2022-30635CVE-2022-30635CVE-2022-30635https://access.redhat.com/security/cve/CVE-2022-32148CVE-2022-32148CVE-2022-32148https://access.redhat.com/security/cve/CVE-2022-32189CVE-2022-32189CVE-2022-32189https://access.redhat.com/security/cve/CVE-2022-41715CVE-2022-41715CVE-2022-41715https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/21073712107371https://bugzilla.redhat.com/21073742107374https://bugzilla.redhat.com/21073832107383https://bugzilla.redhat.com/21073862107386https://bugzilla.redhat.com/21073882107388https://bugzilla.redhat.com/21138142113814https://bugzilla.redhat.com/21246692124669https://bugzilla.redhat.com/21328682132868https://bugzilla.redhat.com/21328722132872https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2357.htmlALSA-2023:2357ALSA-2023:2357  1git-lfs-3.2.0-1.el9.x86_64.rpm 1git-lfs-3.2.0-1.el9.x86_64.rpmp_ ;rBBBBBBBsecurityModerate: emacs security and bug fix updateahttps://access.redhat.com/errata/RHSA-2023:2366RHSA-2023:2366RHSA-2023:2366 https://access.redhat.com/security/cve/CVE-2022-45939CVE-2022-45939CVE-2022-45939https://bugzilla.redhat.com/21493802149380https://errata.almalinux.org/9/ALSA-2023-2366.htmlALSA-2023:2366ALSA-2023:2366 @xemacs-lucid-27.2-8.el9.x86_64.rpm?xemacs-common-27.2-8.el9.x86_64.rpmFxemacs-filesystem-27.2-8.el9.noarch.rpmAxemacs-nox-27.2-8.el9.x86_64.rpm>xemacs-27.2-8.el9.x86_64.rpm@xemacs-lucid-27.2-8.el9.x86_64.rpm?xemacs-common-27.2-8.el9.x86_64.rpmFxemacs-filesystem-27.2-8.el9.noarch.rpmAxemacs-nox-27.2-8.el9.x86_64.rpm>xemacs-27.2-8.el9.x86_64.rpmS` >|securityModerate: containernetworking-plugins security and bug fix updatechttps://access.redhat.com/errata/RHSA-2023:2367RHSA-2023:2367RHSA-2023:2367 https://access.redhat.com/security/cve/CVE-2022-30629CVE-2022-30629CVE-2022-30629https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://bugzilla.redhat.com/20927932092793https://bugzilla.redhat.com/21612742161274https://errata.almalinux.org/9/ALSA-2023-2367.htmlALSA-2023:2367ALSA-2023:2367 JScontainernetworking-plugins-1.2.0-1.el9.x86_64.rpmJScontainernetworking-plugins-1.2.0-1.el9.x86_64.rpma BBBBBsecurityModerate: unbound security updated9https://access.redhat.com/errata/RHSA-2023:2370RHSA-2023:2370RHSA-2023:2370 https://access.redhat.com/security/cve/CVE-2022-3204CVE-2022-3204CVE-2022-3204https://bugzilla.redhat.com/21289472128947https://errata.almalinux.org/9/ALSA-2023-2370.htmlALSA-2023:2370ALSA-2023:2370 xunbound-1.16.2-3.el9.x86_64.rpmlxunbound-libs-1.16.2-3.el9.x86_64.rpmlxunbound-libs-1.16.2-3.el9.i686.rpm xpython3-unbound-1.16.2-3.el9.x86_64.rpmxunbound-1.16.2-3.el9.x86_64.rpmlxunbound-libs-1.16.2-3.el9.x86_64.rpmlxunbound-libs-1.16.2-3.el9.i686.rpm xpython3-unbound-1.16.2-3.el9.x86_64.rpmFb GBBBsecurityModerate: wireshark security and bug fix update4https://access.redhat.com/errata/RHSA-2023:2373RHSA-2023:2373RHSA-2023:2373 https://access.redhat.com/security/cve/CVE-2022-3190CVE-2022-3190CVE-2022-3190https://bugzilla.redhat.com/21520612152061https://errata.almalinux.org/9/ALSA-2023-2373.htmlALSA-2023:2373ALSA-2023:2373 d,wireshark-3.4.10-4.el9.x86_64.rpm0,wireshark-cli-3.4.10-4.el9.i686.rpm0,wireshark-cli-3.4.10-4.el9.x86_64.rpmd,wireshark-3.4.10-4.el9.x86_64.rpm0,wireshark-cli-3.4.10-4.el9.i686.rpm0,wireshark-cli-3.4.10-4.el9.x86_64.rpm c  securityModerate: postgresql-jdbc security updateQhttps://access.redhat.com/errata/RHSA-2023:2378RHSA-2023:2378RHSA-2023:2378 https://access.redhat.com/security/cve/CVE-2022-41946CVE-2022-41946CVE-2022-41946https://bugzilla.redhat.com/21533992153399https://errata.almalinux.org/9/ALSA-2023-2378.htmlALSA-2023:2378ALSA-2023:2378 )Fpostgresql-jdbc-42.2.27-1.el9.noarch.rpm)Fpostgresql-jdbc-42.2.27-1.el9.noarch.rpmd qBBBBBBBB_BxBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security updatecZ https://access.redhat.com/errata/RHSA-2023:2417RHSA-2023:2417RHSA-2023:2417 https://access.redhat.com/security/cve/CVE-2022-31628CVE-2022-31628CVE-2022-31628https://access.redhat.com/security/cve/CVE-2022-31629CVE-2022-31629CVE-2022-31629https://access.redhat.com/security/cve/CVE-2022-31630CVE-2022-31630CVE-2022-31630https://access.redhat.com/security/cve/CVE-2022-31631CVE-2022-31631CVE-2022-31631https://access.redhat.com/security/cve/CVE-2022-37454CVE-2022-37454CVE-2022-37454https://bugzilla.redhat.com/21336872133687https://bugzilla.redhat.com/21336882133688https://bugzilla.redhat.com/21392802139280https://bugzilla.redhat.com/21402002140200https://bugzilla.redhat.com/21587912158791https://errata.almalinux.org/9/ALSA-2023-2417.htmlALSA-2023:2417ALSA-2023:2417 6_'~Cphp-process-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm{Cphp-opcache-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmCphp-xml-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmAphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmsCphp-fpm-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmmCphp-dba-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmrCphp-ffi-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm?vphp-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpmyCphp-mysqlnd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmxCphp-mbstring-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmqCphp-enchant-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmpCphp-embedded-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmCphp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmkCphp-cli-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmCphp-snmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm}Cphp-pgsql-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmwCphp-ldap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmoCphp-devel-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmvCphp-intl-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmuCphp-gmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmCphp-soap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmlCphp-common-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmnCphp-dbg-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm>|php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm|Cphp-pdo-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmf|apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmtCphp-gd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmzCphp-odbc-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm=|php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmjCphp-bcmath-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm6_'~Cphp-process-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm{Cphp-opcache-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmCphp-xml-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmAphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmsCphp-fpm-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmmCphp-dba-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmrCphp-ffi-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm?vphp-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpmyCphp-mysqlnd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmxCphp-mbstring-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmqCphp-enchant-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmpCphp-embedded-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmCphp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmkCphp-cli-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmCphp-snmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm}Cphp-pgsql-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmwCphp-ldap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmoCphp-devel-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmvCphp-intl-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmuCphp-gmp-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmCphp-soap-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmlCphp-common-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmnCphp-dbg-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm>|php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm|Cphp-pdo-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmf|apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmtCphp-gd-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmzCphp-odbc-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpm=|php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmjCphp-bcmath-8.1.14-1.module_el9.2.0+24+ca6bd7c2.x86_64.rpmbe BBBBBBBBBBBBBBBBsecurityModerate: net-snmp security and bug fix update=vhttps://access.redhat.com/errata/RHSA-2023:2444RHSA-2023:2444RHSA-2023:2444 https://access.redhat.com/security/cve/CVE-2022-44792CVE-2022-44792CVE-2022-44792https://access.redhat.com/security/cve/CVE-2022-44793CVE-2022-44793CVE-2022-44793https://bugzilla.redhat.com/21418972141897https://bugzilla.redhat.com/21418982141898https://errata.almalinux.org/9/ALSA-2023-2444.htmlALSA-2023:2444ALSA-2023:2444 Xnet-snmp-5.9.1-9.el9.x86_64.rpm net-snmp-devel-5.9.1-9.el9.i686.rpmnet-snmp-agent-libs-5.9.1-9.el9.i686.rpmYnet-snmp-perl-5.9.1-9.el9.x86_64.rpm net-snmp-devel-5.9.1-9.el9.x86_64.rpm_python3-net-snmp-5.9.1-9.el9.x86_64.rpmZnet-snmp-utils-5.9.1-9.el9.x86_64.rpmnet-snmp-agent-libs-5.9.1-9.el9.x86_64.rpm!net-snmp-libs-5.9.1-9.el9.i686.rpm!net-snmp-libs-5.9.1-9.el9.x86_64.rpm Xnet-snmp-5.9.1-9.el9.x86_64.rpm net-snmp-devel-5.9.1-9.el9.i686.rpmnet-snmp-agent-libs-5.9.1-9.el9.i686.rpmYnet-snmp-perl-5.9.1-9.el9.x86_64.rpm net-snmp-devel-5.9.1-9.el9.x86_64.rpm_python3-net-snmp-5.9.1-9.el9.x86_64.rpmZnet-snmp-utils-5.9.1-9.el9.x86_64.rpmnet-snmp-agent-libs-5.9.1-9.el9.x86_64.rpm!net-snmp-libs-5.9.1-9.el9.i686.rpm!net-snmp-libs-5.9.1-9.el9.x86_64.rpmf TBsecurityModerate: libtpms security update3khttps://access.redhat.com/errata/RHSA-2023:2453RHSA-2023:2453RHSA-2023:2453 https://access.redhat.com/security/cve/CVE-2023-1017CVE-2023-1017CVE-2023-1017https://access.redhat.com/security/cve/CVE-2023-1018CVE-2023-1018CVE-2023-1018https://bugzilla.redhat.com/21494162149416https://bugzilla.redhat.com/21494202149420https://errata.almalinux.org/9/ALSA-2023-2453.htmlALSA-2023:2453ALSA-2023:2453 ~rlibtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.i686.rpm~rlibtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.x86_64.rpm~rlibtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.i686.rpm~rlibtpms-0.9.1-3.20211126git1ff6fe1f43.el9_2.x86_64.rpmFg %XBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement updateSRhttps://access.redhat.com/errata/RHSA-2023:2458RHSA-2023:2458RHSA-2023:2458 https://access.redhat.com/security/cve/CVE-2021-26341CVE-2021-26341CVE-2021-26341https://access.redhat.com/security/cve/CVE-2021-33655CVE-2021-33655CVE-2021-33655https://access.redhat.com/security/cve/CVE-2022-1462CVE-2022-1462CVE-2022-1462https://access.redhat.com/security/cve/CVE-2022-1789CVE-2022-1789CVE-2022-1789https://access.redhat.com/security/cve/CVE-2022-1882CVE-2022-1882CVE-2022-1882https://access.redhat.com/security/cve/CVE-2022-20141CVE-2022-20141CVE-2022-20141https://access.redhat.com/security/cve/CVE-2022-21505CVE-2022-21505CVE-2022-21505https://access.redhat.com/security/cve/CVE-2022-2196CVE-2022-2196CVE-2022-2196https://access.redhat.com/security/cve/CVE-2022-2663CVE-2022-2663CVE-2022-2663https://access.redhat.com/security/cve/CVE-2022-28388CVE-2022-28388CVE-2022-28388https://access.redhat.com/security/cve/CVE-2022-3028CVE-2022-3028CVE-2022-3028https://access.redhat.com/security/cve/CVE-2022-33743CVE-2022-33743CVE-2022-33743https://access.redhat.com/security/cve/CVE-2022-3435CVE-2022-3435CVE-2022-3435https://access.redhat.com/security/cve/CVE-2022-3522CVE-2022-3522CVE-2022-3522https://access.redhat.com/security/cve/CVE-2022-3524CVE-2022-3524CVE-2022-3524https://access.redhat.com/security/cve/CVE-2022-3566CVE-2022-3566CVE-2022-3566https://access.redhat.com/security/cve/CVE-2022-3567CVE-2022-3567CVE-2022-3567https://access.redhat.com/security/cve/CVE-2022-3619CVE-2022-3619CVE-2022-3619https://access.redhat.com/security/cve/CVE-2022-3623CVE-2022-3623CVE-2022-3623https://access.redhat.com/security/cve/CVE-2022-3625CVE-2022-3625CVE-2022-3625https://access.redhat.com/security/cve/CVE-2022-3628CVE-2022-3628CVE-2022-3628https://access.redhat.com/security/cve/CVE-2022-3640CVE-2022-3640CVE-2022-3640https://access.redhat.com/security/cve/CVE-2022-3707CVE-2022-3707CVE-2022-3707https://access.redhat.com/security/cve/CVE-2022-39188CVE-2022-39188CVE-2022-39188https://access.redhat.com/security/cve/CVE-2022-39189CVE-2022-39189CVE-2022-39189https://access.redhat.com/security/cve/CVE-2022-4128CVE-2022-4128CVE-2022-4128https://access.redhat.com/security/cve/CVE-2022-4129CVE-2022-4129CVE-2022-4129https://access.redhat.com/security/cve/CVE-2022-41674CVE-2022-41674CVE-2022-41674https://access.redhat.com/security/cve/CVE-2022-42703CVE-2022-42703CVE-2022-42703https://access.redhat.com/security/cve/CVE-2022-42720CVE-2022-42720CVE-2022-42720https://access.redhat.com/security/cve/CVE-2022-42721CVE-2022-42721CVE-2022-42721https://access.redhat.com/security/cve/CVE-2022-42722CVE-2022-42722CVE-2022-42722https://access.redhat.com/security/cve/CVE-2022-42896CVE-2022-42896CVE-2022-42896https://access.redhat.com/security/cve/CVE-2022-43750CVE-2022-43750CVE-2022-43750https://access.redhat.com/security/cve/CVE-2022-47929CVE-2022-47929CVE-2022-47929https://access.redhat.com/security/cve/CVE-2023-0394CVE-2023-0394CVE-2023-0394https://access.redhat.com/security/cve/CVE-2023-0461CVE-2023-0461CVE-2023-0461https://access.redhat.com/security/cve/CVE-2023-0590CVE-2023-0590CVE-2023-0590https://access.redhat.com/security/cve/CVE-2023-1195CVE-2023-1195CVE-2023-1195https://access.redhat.com/security/cve/CVE-2023-1382CVE-2023-1382CVE-2023-1382https://bugzilla.redhat.com/20617032061703https://bugzilla.redhat.com/20730912073091https://bugzilla.redhat.com/20784662078466https://bugzilla.redhat.com/20897012089701https://bugzilla.redhat.com/20907232090723https://bugzilla.redhat.com/21068302106830https://bugzilla.redhat.com/21079242107924https://bugzilla.redhat.com/21086912108691https://bugzilla.redhat.com/21149372114937https://bugzilla.redhat.com/21222282122228https://bugzilla.redhat.com/21230562123056https://bugzilla.redhat.com/21247882124788https://bugzilla.redhat.com/21301412130141https://bugzilla.redhat.com/21334832133483https://bugzilla.redhat.com/21334902133490https://bugzilla.redhat.com/21343772134377https://bugzilla.redhat.com/21343802134380https://bugzilla.redhat.com/21344512134451https://bugzilla.redhat.com/21345062134506https://bugzilla.redhat.com/21345172134517https://bugzilla.redhat.com/21345282134528https://bugzilla.redhat.com/21379792137979https://bugzilla.redhat.com/21396102139610https://bugzilla.redhat.com/21438932143893https://bugzilla.redhat.com/21439432143943https://bugzilla.redhat.com/21447202144720https://bugzilla.redhat.com/21473642147364https://bugzilla.redhat.com/21509472150947https://bugzilla.redhat.com/21509602150960https://bugzilla.redhat.com/21509792150979https://bugzilla.redhat.com/21512702151270https://bugzilla.redhat.com/21541712154171https://bugzilla.redhat.com/21542352154235https://bugzilla.redhat.com/21600232160023https://bugzilla.redhat.com/21621202162120https://bugzilla.redhat.com/21657212165721https://bugzilla.redhat.com/21657412165741https://bugzilla.redhat.com/21682462168246https://bugzilla.redhat.com/21761922176192https://bugzilla.redhat.com/21773712177371https://errata.almalinux.org/9/ALSA-2023-2458.htmlALSA-2023:2458ALSA-2023:2458 "?kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm)?rtla-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-doc-5.14.0-284.11.1.el9_2.noarch.rpm$?kernel-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm%?perf-5.14.0-284.11.1.el9_2.x86_64.rpm#?kernel-devel-5.14.0-284.11.1.el9_2.x86_64.rpm!?kernel-debug-devel-5.14.0-284.11.1.el9_2.x86_64.rpm"?kernel-debug-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm)?rtla-5.14.0-284.11.1.el9_2.x86_64.rpm?kernel-doc-5.14.0-284.11.1.el9_2.noarch.rpm$?kernel-devel-matched-5.14.0-284.11.1.el9_2.x86_64.rpm%?perf-5.14.0-284.11.1.el9_2.x86_64.rpm#?kernel-devel-5.14.0-284.11.1.el9_2.x86_64.rpm!?kernel-debug-devel-5.14.0-284.11.1.el9_2.x86_64.rpmXh )fBsecurityLow: curl security update3q"https://access.redhat.com/errata/RHSA-2023:2478RHSA-2023:2478RHSA-2023:2478 https://access.redhat.com/security/cve/CVE-2022-35252CVE-2022-35252CVE-2022-35252https://access.redhat.com/security/cve/CVE-2022-43552CVE-2022-43552CVE-2022-43552https://bugzilla.redhat.com/21207182120718https://bugzilla.redhat.com/21526522152652https://errata.almalinux.org/9/ALSA-2023-2478.htmlALSA-2023:2478ALSA-2023:2478  Tlibcurl-devel-7.76.1-23.el9.i686.rpm Tlibcurl-devel-7.76.1-23.el9.x86_64.rpm Tlibcurl-devel-7.76.1-23.el9.i686.rpm Tlibcurl-devel-7.76.1-23.el9.x86_64.rpmbi ,jsecurityModerate: fwupd security and bug fix updateM https://access.redhat.com/errata/RHSA-2023:2487RHSA-2023:2487RHSA-2023:2487 https://access.redhat.com/security/cve/CVE-2022-3287CVE-2022-3287CVE-2022-3287https://access.redhat.com/security/cve/CVE-2022-34301CVE-2022-34301CVE-2022-34301https://access.redhat.com/security/cve/CVE-2022-34302CVE-2022-34302CVE-2022-34302https://access.redhat.com/security/cve/CVE-2022-34303CVE-2022-34303CVE-2022-34303https://bugzilla.redhat.com/21206872120687https://bugzilla.redhat.com/21206992120699https://bugzilla.redhat.com/21207012120701https://bugzilla.redhat.com/21299042129904https://errata.almalinux.org/9/ALSA-2023-2487.htmlALSA-2023:2487ALSA-2023:2487 E"fwupd-plugin-flashrom-1.8.10-2.el9.alma.x86_64.rpmE"fwupd-plugin-flashrom-1.8.10-2.el9.alma.x86_64.rpm}j 9mBBBBBBBBBBsecurityLow: samba security, bug fix, and enhancement update3`https://access.redhat.com/errata/RHSA-2023:2519RHSA-2023:2519RHSA-2023:2519 https://access.redhat.com/security/cve/CVE-2022-1615CVE-2022-1615CVE-2022-1615https://bugzilla.redhat.com/21226492122649https://errata.almalinux.org/9/ALSA-2023-2519.htmlALSA-2023:2519ALSA-2023:2519 --samba-krb5-printing-4.17.5-102.el9.x86_64.rpm.-samba-vfs-iouring-4.17.5-102.el9.x86_64.rpm/-samba-winbind-clients-4.17.5-102.el9.x86_64.rpm1-samba-winexe-4.17.5-102.el9.x86_64.rpm,-samba-client-4.17.5-102.el9.x86_64.rpm0-samba-winbind-krb5-locator-4.17.5-102.el9.x86_64.rpm--samba-krb5-printing-4.17.5-102.el9.x86_64.rpm.-samba-vfs-iouring-4.17.5-102.el9.x86_64.rpm/-samba-winbind-clients-4.17.5-102.el9.x86_64.rpm1-samba-winexe-4.17.5-102.el9.x86_64.rpm,-samba-client-4.17.5-102.el9.x86_64.rpm0-samba-winbind-krb5-locator-4.17.5-102.el9.x86_64.rpmVk ?zBBBsecurityLow: openssl security and bug fix update3dphttps://access.redhat.com/errata/RHSA-2023:2523RHSA-2023:2523RHSA-2023:2523 https://access.redhat.com/security/cve/CVE-2022-3358CVE-2022-3358CVE-2022-3358https://bugzilla.redhat.com/21347402134740https://errata.almalinux.org/9/ALSA-2023-2523.htmlALSA-2023:2523ALSA-2023:2523 m)openssl-perl-3.0.7-6.el9_2.x86_64.rpm)openssl-devel-3.0.7-6.el9_2.x86_64.rpm)openssl-devel-3.0.7-6.el9_2.i686.rpmm)openssl-perl-3.0.7-6.el9_2.x86_64.rpm)openssl-devel-3.0.7-6.el9_2.x86_64.rpm)openssl-devel-3.0.7-6.el9_2.i686.rpmCl @securityLow: libarchive security update3TYhttps://access.redhat.com/errata/RHSA-2023:2532RHSA-2023:2532RHSA-2023:2532 https://access.redhat.com/security/cve/CVE-2022-36227CVE-2022-36227CVE-2022-36227https://bugzilla.redhat.com/21449722144972https://errata.almalinux.org/9/ALSA-2023-2532.htmlALSA-2023:2532ALSA-2023:2532 :bsdtar-3.5.3-4.el9.x86_64.rpm:bsdtar-3.5.3-4.el9.x86_64.rpmm CBsecurityModerate: krb5 security, bug fix, and enhancement update-Whttps://access.redhat.com/errata/RHSA-2023:2570RHSA-2023:2570RHSA-2023:2570 https://access.redhat.com/security/cve/CVE-2020-17049CVE-2020-17049CVE-2020-17049https://bugzilla.redhat.com/20257212025721https://errata.almalinux.org/9/ALSA-2023-2570.htmlALSA-2023:2570ALSA-2023:2570 S}krb5-devel-1.20.1-8.el9.i686.rpmS}krb5-devel-1.20.1-8.el9.x86_64.rpmS}krb5-devel-1.20.1-8.el9.i686.rpmS}krb5-devel-1.20.1-8.el9.x86_64.rpm)n GsecurityLow: lua security update3Rhttps://access.redhat.com/errata/RHSA-2023:2582RHSA-2023:2582RHSA-2023:2582 https://access.redhat.com/security/cve/CVE-2022-28805CVE-2022-28805CVE-2022-28805https://bugzilla.redhat.com/20738842073884https://errata.almalinux.org/9/ALSA-2023-2582.htmlALSA-2023:2582ALSA-2023:2582 Nllua-5.4.4-3.el9.x86_64.rpmNllua-5.4.4-3.el9.x86_64.rpmko JBBBBBBsecurityImportant: mysql security updateVLhttps://access.redhat.com/errata/RHSA-2023:2621RHSA-2023:2621RHSA-2023:2621 https://access.redhat.com/security/cve/CVE-2022-21594CVE-2022-21594CVE-2022-21594https://access.redhat.com/security/cve/CVE-2022-21599CVE-2022-21599CVE-2022-21599https://access.redhat.com/security/cve/CVE-2022-21604CVE-2022-21604CVE-2022-21604https://access.redhat.com/security/cve/CVE-2022-21608CVE-2022-21608CVE-2022-21608https://access.redhat.com/security/cve/CVE-2022-21611CVE-2022-21611CVE-2022-21611https://access.redhat.com/security/cve/CVE-2022-21617CVE-2022-21617CVE-2022-21617https://access.redhat.com/security/cve/CVE-2022-21625CVE-2022-21625CVE-2022-21625https://access.redhat.com/security/cve/CVE-2022-21632CVE-2022-21632CVE-2022-21632https://access.redhat.com/security/cve/CVE-2022-21633CVE-2022-21633CVE-2022-21633https://access.redhat.com/security/cve/CVE-2022-21637CVE-2022-21637CVE-2022-21637https://access.redhat.com/security/cve/CVE-2022-21640CVE-2022-21640CVE-2022-21640https://access.redhat.com/security/cve/CVE-2022-39400CVE-2022-39400CVE-2022-39400https://access.redhat.com/security/cve/CVE-2022-39408CVE-2022-39408CVE-2022-39408https://access.redhat.com/security/cve/CVE-2022-39410CVE-2022-39410CVE-2022-39410https://access.redhat.com/security/cve/CVE-2023-21836CVE-2023-21836CVE-2023-21836https://access.redhat.com/security/cve/CVE-2023-21863CVE-2023-21863CVE-2023-21863https://access.redhat.com/security/cve/CVE-2023-21864CVE-2023-21864CVE-2023-21864https://access.redhat.com/security/cve/CVE-2023-21865CVE-2023-21865CVE-2023-21865https://access.redhat.com/security/cve/CVE-2023-21867CVE-2023-21867CVE-2023-21867https://access.redhat.com/security/cve/CVE-2023-21868CVE-2023-21868CVE-2023-21868https://access.redhat.com/security/cve/CVE-2023-21869CVE-2023-21869CVE-2023-21869https://access.redhat.com/security/cve/CVE-2023-21870CVE-2023-21870CVE-2023-21870https://access.redhat.com/security/cve/CVE-2023-21871CVE-2023-21871CVE-2023-21871https://access.redhat.com/security/cve/CVE-2023-21873CVE-2023-21873CVE-2023-21873https://access.redhat.com/security/cve/CVE-2023-21874CVE-2023-21874CVE-2023-21874https://access.redhat.com/security/cve/CVE-2023-21875CVE-2023-21875CVE-2023-21875https://access.redhat.com/security/cve/CVE-2023-21876CVE-2023-21876CVE-2023-21876https://access.redhat.com/security/cve/CVE-2023-21877CVE-2023-21877CVE-2023-21877https://access.redhat.com/security/cve/CVE-2023-21878CVE-2023-21878CVE-2023-21878https://access.redhat.com/security/cve/CVE-2023-21879CVE-2023-21879CVE-2023-21879https://access.redhat.com/security/cve/CVE-2023-21880CVE-2023-21880CVE-2023-21880https://access.redhat.com/security/cve/CVE-2023-21881CVE-2023-21881CVE-2023-21881https://access.redhat.com/security/cve/CVE-2023-21882CVE-2023-21882CVE-2023-21882https://access.redhat.com/security/cve/CVE-2023-21883CVE-2023-21883CVE-2023-21883https://access.redhat.com/security/cve/CVE-2023-21887CVE-2023-21887CVE-2023-21887https://access.redhat.com/security/cve/CVE-2023-21912CVE-2023-21912CVE-2023-21912https://access.redhat.com/security/cve/CVE-2023-21917CVE-2023-21917CVE-2023-21917https://bugzilla.redhat.com/21428612142861https://bugzilla.redhat.com/21428632142863https://bugzilla.redhat.com/21428652142865https://bugzilla.redhat.com/21428682142868https://bugzilla.redhat.com/21428692142869https://bugzilla.redhat.com/21428702142870https://bugzilla.redhat.com/21428712142871https://bugzilla.redhat.com/21428722142872https://bugzilla.redhat.com/21428732142873https://bugzilla.redhat.com/21428752142875https://bugzilla.redhat.com/21428772142877https://bugzilla.redhat.com/21428792142879https://bugzilla.redhat.com/21428802142880https://bugzilla.redhat.com/21428812142881https://bugzilla.redhat.com/21622682162268https://bugzilla.redhat.com/21622702162270https://bugzilla.redhat.com/21622712162271https://bugzilla.redhat.com/21622722162272https://bugzilla.redhat.com/21622742162274https://bugzilla.redhat.com/21622752162275https://bugzilla.redhat.com/21622762162276https://bugzilla.redhat.com/21622772162277https://bugzilla.redhat.com/21622782162278https://bugzilla.redhat.com/21622802162280https://bugzilla.redhat.com/21622812162281https://bugzilla.redhat.com/21622822162282https://bugzilla.redhat.com/21622832162283https://bugzilla.redhat.com/21622842162284https://bugzilla.redhat.com/21622852162285https://bugzilla.redhat.com/21622862162286https://bugzilla.redhat.com/21622872162287https://bugzilla.redhat.com/21622882162288https://bugzilla.redhat.com/21622892162289https://bugzilla.redhat.com/21622902162290https://bugzilla.redhat.com/21622912162291https://bugzilla.redhat.com/21881102188110https://bugzilla.redhat.com/21881122188112https://errata.almalinux.org/9/ALSA-2023-2621.htmlALSA-2023:2621ALSA-2023:2621 ;mysql-errmsg-8.0.32-1.el9_2.x86_64.rpm;mysql-common-8.0.32-1.el9_2.x86_64.rpm9;mysql-8.0.32-1.el9_2.x86_64.rpm<;mysql-server-8.0.32-1.el9_2.x86_64.rpm;mysql-errmsg-8.0.32-1.el9_2.x86_64.rpm;mysql-common-8.0.32-1.el9_2.x86_64.rpm9;mysql-8.0.32-1.el9_2.x86_64.rpm<;mysql-server-8.0.32-1.el9_2.x86_64.rpmip SBBBBBBBsecurityImportant: emacs security updateU, https://access.redhat.com/errata/RHSA-2023:2626RHSA-2023:2626RHSA-2023:2626 https://access.redhat.com/security/cve/CVE-2022-48337CVE-2022-48337CVE-2022-48337https://access.redhat.com/security/cve/CVE-2022-48338CVE-2022-48338CVE-2022-48338https://access.redhat.com/security/cve/CVE-2022-48339CVE-2022-48339CVE-2022-48339https://access.redhat.com/security/cve/CVE-2023-2491CVE-2023-2491CVE-2023-2491https://bugzilla.redhat.com/21719872171987https://bugzilla.redhat.com/21719882171988https://bugzilla.redhat.com/21719892171989https://bugzilla.redhat.com/21928732192873https://errata.almalinux.org/9/ALSA-2023-2626.htmlALSA-2023:2626ALSA-2023:2626 @yemacs-lucid-27.2-8.el9_2.1.x86_64.rpm?yemacs-common-27.2-8.el9_2.1.x86_64.rpmAyemacs-nox-27.2-8.el9_2.1.x86_64.rpmFyemacs-filesystem-27.2-8.el9_2.1.noarch.rpm>yemacs-27.2-8.el9_2.1.x86_64.rpm@yemacs-lucid-27.2-8.el9_2.1.x86_64.rpm?yemacs-common-27.2-8.el9_2.1.x86_64.rpmAyemacs-nox-27.2-8.el9_2.1.x86_64.rpmFyemacs-filesystem-27.2-8.el9_2.1.noarch.rpm>yemacs-27.2-8.el9_2.1.x86_64.rpm`q ]securityModerate: libreswan security update_https://access.redhat.com/errata/RHSA-2023:2633RHSA-2023:2633RHSA-2023:2633 https://access.redhat.com/security/cve/CVE-2023-23009CVE-2023-23009CVE-2023-23009https://bugzilla.redhat.com/21736102173610https://errata.almalinux.org/9/ALSA-2023-2633.htmlALSA-2023:2633ALSA-2023:2633 (Qlibreswan-4.9-2.el9_2.x86_64.rpm(Qlibreswan-4.9-2.el9_2.x86_64.rpmvr $`BBsecurityModerate: openssh security update`https://access.redhat.com/errata/RHSA-2023:2645RHSA-2023:2645RHSA-2023:2645 https://access.redhat.com/security/cve/CVE-2023-25136CVE-2023-25136CVE-2023-25136https://bugzilla.redhat.com/21676362167636https://errata.almalinux.org/9/ALSA-2023-2645.htmlALSA-2023:2645ALSA-2023:2645 mpam_ssh_agent_auth-0.10.4-5.29.el9_2.x86_64.rpmopenssh-askpass-8.7p1-29.el9_2.x86_64.rpmmpam_ssh_agent_auth-0.10.4-5.29.el9_2.x86_64.rpmopenssh-askpass-8.7p1-29.el9_2.x86_64.rpmHs (eBsecurityModerate: curl security updateh(https://access.redhat.com/errata/RHSA-2023:2650RHSA-2023:2650RHSA-2023:2650 https://access.redhat.com/security/cve/CVE-2023-27535CVE-2023-27535CVE-2023-27535https://bugzilla.redhat.com/21790732179073https://errata.almalinux.org/9/ALSA-2023-2650.htmlALSA-2023:2650ALSA-2023:2650  Ulibcurl-devel-7.76.1-23.el9_2.1.i686.rpm Ulibcurl-devel-7.76.1-23.el9_2.1.x86_64.rpm Ulibcurl-devel-7.76.1-23.el9_2.1.i686.rpm Ulibcurl-devel-7.76.1-23.el9_2.1.x86_64.rpmAt 5iBBBBBBBBBBsecurityImportant: webkit2gtk3 security updatezhttps://access.redhat.com/errata/RHSA-2023:2653RHSA-2023:2653RHSA-2023:2653 https://access.redhat.com/security/cve/CVE-2023-2203CVE-2023-2203CVE-2023-2203https://bugzilla.redhat.com/21885432188543https://errata.almalinux.org/9/ALSA-2023-2653.htmlALSA-2023:2653ALSA-2023:2653 4webkit2gtk3-devel-2.38.5-1.el9_2.1.x86_64.rpm3webkit2gtk3-2.38.5-1.el9_2.1.x86_64.rpm6webkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.i686.rpm4webkit2gtk3-devel-2.38.5-1.el9_2.1.i686.rpm5webkit2gtk3-jsc-2.38.5-1.el9_2.1.i686.rpm6webkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.x86_64.rpm5webkit2gtk3-jsc-2.38.5-1.el9_2.1.x86_64.rpm3webkit2gtk3-2.38.5-1.el9_2.1.i686.rpm4webkit2gtk3-devel-2.38.5-1.el9_2.1.x86_64.rpm3webkit2gtk3-2.38.5-1.el9_2.1.x86_64.rpm6webkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.i686.rpm4webkit2gtk3-devel-2.38.5-1.el9_2.1.i686.rpm5webkit2gtk3-jsc-2.38.5-1.el9_2.1.i686.rpm6webkit2gtk3-jsc-devel-2.38.5-1.el9_2.1.x86_64.rpm5webkit2gtk3-jsc-2.38.5-1.el9_2.1.x86_64.rpm3webkit2gtk3-2.38.5-1.el9_2.1.i686.rpmCu ?TBE^BBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement update |https://access.redhat.com/errata/RHSA-2023:2654RHSA-2023:2654RHSA-2023:2654 https://access.redhat.com/security/cve/CVE-2021-35065CVE-2021-35065CVE-2021-35065https://access.redhat.com/security/cve/CVE-2022-25881CVE-2022-25881CVE-2022-25881https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-23918CVE-2023-23918CVE-2023-23918https://access.redhat.com/security/cve/CVE-2023-23919CVE-2023-23919CVE-2023-23919https://access.redhat.com/security/cve/CVE-2023-23920CVE-2023-23920CVE-2023-23920https://access.redhat.com/security/cve/CVE-2023-23936CVE-2023-23936CVE-2023-23936https://access.redhat.com/security/cve/CVE-2023-24807CVE-2023-24807CVE-2023-24807https://bugzilla.redhat.com/21563242156324https://bugzilla.redhat.com/21658242165824https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/21719352171935https://bugzilla.redhat.com/21721702172170https://bugzilla.redhat.com/21721902172190https://bugzilla.redhat.com/21722042172204https://bugzilla.redhat.com/21722172172217https://errata.almalinux.org/9/ALSA-2023-2654.htmlALSA-2023:2654ALSA-2023:2654 +n`'cznpm-9.5.0-1.18.14.2.2.module_el9.2.0+29+de583a0b.x86_64.rpm<nodejs-docs-18.14.2-2.module_el9.2.0+29+de583a0b.noarch.rpm+nodejs-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmdnodejs-full-i18n-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpmknodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm!nodejs-devel-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm+n`'cznpm-9.5.0-1.18.14.2.2.module_el9.2.0+29+de583a0b.x86_64.rpm<nodejs-docs-18.14.2-2.module_el9.2.0+29+de583a0b.noarch.rpm+nodejs-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmdnodejs-full-i18n-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpmknodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm!nodejs-devel-18.14.2-2.module_el9.2.0+29+de583a0b.x86_64.rpmv @BBBBBBBBsecurityModerate: nodejs and nodejs-nodemon security, bug fix, and enhancement update}https://access.redhat.com/errata/RHSA-2023:2655RHSA-2023:2655RHSA-2023:2655 https://access.redhat.com/security/cve/CVE-2022-25881CVE-2022-25881CVE-2022-25881https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-23918CVE-2023-23918CVE-2023-23918https://access.redhat.com/security/cve/CVE-2023-23920CVE-2023-23920CVE-2023-23920https://access.redhat.com/security/cve/CVE-2023-23936CVE-2023-23936CVE-2023-23936https://access.redhat.com/security/cve/CVE-2023-24807CVE-2023-24807CVE-2023-24807https://bugzilla.redhat.com/21658242165824https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/21719352171935https://bugzilla.redhat.com/21721902172190https://bugzilla.redhat.com/21722042172204https://bugzilla.redhat.com/21722172172217https://errata.almalinux.org/9/ALSA-2023-2655.htmlALSA-2023:2655ALSA-2023:2655 :nodejs-libs-16.19.1-1.el9_2.x86_64.rpmcsnpm-8.19.3-1.16.19.1.1.el9_2.x86_64.rpmd:nodejs-full-i18n-16.19.1-1.el9_2.x86_64.rpm+:nodejs-16.19.1-1.el9_2.x86_64.rpm:nodejs-libs-16.19.1-1.el9_2.i686.rpm<:nodejs-docs-16.19.1-1.el9_2.noarch.rpm:nodejs-libs-16.19.1-1.el9_2.x86_64.rpmcsnpm-8.19.3-1.16.19.1.1.el9_2.x86_64.rpmd:nodejs-full-i18n-16.19.1-1.el9_2.x86_64.rpm+:nodejs-16.19.1-1.el9_2.x86_64.rpm:nodejs-libs-16.19.1-1.el9_2.i686.rpm<:nodejs-docs-16.19.1-1.el9_2.noarch.rpmtw KBBsecurityImportant: firefox security updatehttps://access.redhat.com/errata/RHSA-2023:3143RHSA-2023:3143RHSA-2023:3143 https://access.redhat.com/security/cve/CVE-2023-32205CVE-2023-32205CVE-2023-32205https://access.redhat.com/security/cve/CVE-2023-32206CVE-2023-32206CVE-2023-32206https://access.redhat.com/security/cve/CVE-2023-32207CVE-2023-32207CVE-2023-32207https://access.redhat.com/security/cve/CVE-2023-32211CVE-2023-32211CVE-2023-32211https://access.redhat.com/security/cve/CVE-2023-32212CVE-2023-32212CVE-2023-32212https://access.redhat.com/security/cve/CVE-2023-32213CVE-2023-32213CVE-2023-32213https://access.redhat.com/security/cve/CVE-2023-32215CVE-2023-32215CVE-2023-32215https://bugzilla.redhat.com/21967362196736https://bugzilla.redhat.com/21967372196737https://bugzilla.redhat.com/21967382196738https://bugzilla.redhat.com/21967402196740https://bugzilla.redhat.com/21967412196741https://bugzilla.redhat.com/21967422196742https://bugzilla.redhat.com/21967532196753https://errata.almalinux.org/9/ALSA-2023-3143.htmlALSA-2023:3143ALSA-2023:3143 OJfirefox-x11-102.11.0-2.el9_2.alma.x86_64.rpm7Jfirefox-102.11.0-2.el9_2.alma.x86_64.rpmOJfirefox-x11-102.11.0-2.el9_2.alma.x86_64.rpm7Jfirefox-102.11.0-2.el9_2.alma.x86_64.rpmx %PBBBBBBBBBBBBBBBBBBBsecurityImportant: apr-util security update%https://access.redhat.com/errata/RHSA-2023:3147RHSA-2023:3147RHSA-2023:3147 https://access.redhat.com/security/cve/CVE-2022-25147CVE-2022-25147CVE-2022-25147https://bugzilla.redhat.com/21696522169652https://errata.almalinux.org/9/ALSA-2023-3147.htmlALSA-2023:3147ALSA-2023:3147 h2apr-util-bdb-1.6.1-20.el9_2.1.i686.rpm 2apr-util-mysql-1.6.1-20.el9_2.1.x86_64.rpmg2apr-util-1.6.1-20.el9_2.1.i686.rpmg2apr-util-1.6.1-20.el9_2.1.x86_64.rpm"2apr-util-openssl-1.6.1-20.el9_2.1.x86_64.rpmi2apr-util-devel-1.6.1-20.el9_2.1.x86_64.rpm$2apr-util-sqlite-1.6.1-20.el9_2.1.x86_64.rpm!2apr-util-odbc-1.6.1-20.el9_2.1.x86_64.rpmh2apr-util-bdb-1.6.1-20.el9_2.1.x86_64.rpm#2apr-util-pgsql-1.6.1-20.el9_2.1.x86_64.rpm2apr-util-ldap-1.6.1-20.el9_2.1.x86_64.rpmi2apr-util-devel-1.6.1-20.el9_2.1.i686.rpm h2apr-util-bdb-1.6.1-20.el9_2.1.i686.rpm 2apr-util-mysql-1.6.1-20.el9_2.1.x86_64.rpmg2apr-util-1.6.1-20.el9_2.1.i686.rpmg2apr-util-1.6.1-20.el9_2.1.x86_64.rpm"2apr-util-openssl-1.6.1-20.el9_2.1.x86_64.rpmi2apr-util-devel-1.6.1-20.el9_2.1.x86_64.rpm$2apr-util-sqlite-1.6.1-20.el9_2.1.x86_64.rpm!2apr-util-odbc-1.6.1-20.el9_2.1.x86_64.rpmh2apr-util-bdb-1.6.1-20.el9_2.1.x86_64.rpm#2apr-util-pgsql-1.6.1-20.el9_2.1.x86_64.rpm2apr-util-ldap-1.6.1-20.el9_2.1.x86_64.rpmi2apr-util-devel-1.6.1-20.el9_2.1.i686.rpm?y (fsecurityImportant: libreswan security update texlive-enctex-20200406-26.el9_2.noarch.rpmR texlive-pdftexcmds-20200406-26.el9_2.noarch.rpm> texlive-xeindex-20200406-26.el9_2.noarch.rpm texlive-babel-20200406-26.el9_2.noarch.rpm# texlive-luaotfload-20200406-26.el9_2.noarch.rpmB texlive-xetex-pstricks-20200406-26.el9_2.noarch.rpmC texlive-norasi-c90-20200406-26.el9_2.noarch.rpm9 texlive-currfile-20200406-26.el9_2.noarch.rpmj texlive-graphics-20200406-26.el9_2.noarch.rpmB texlive-epstopdf-20200406-26.el9_2.noarch.rpm texlive-dvips-20200406-26.el9_2.x86_64.rpmP texlive-fancybox-20200406-26.el9_2.noarch.rpm? texlive-enumitem-20200406-26.el9_2.noarch.rpm texlive-l3kernel-20200406-26.el9_2.noarch.rpmS texlive-pgf-20200406-26.el9_2.noarch.rpmA texlive-newfloat-20200406-26.el9_2.noarch.rpm^ texlive-pst-3d-20200406-26.el9_2.noarch.rpmI texlive-etoc-20200406-26.el9_2.noarch.rpmP texlive-zref-20200406-26.el9_2.noarch.rpm2 texlive-utopia-20200406-26.el9_2.noarch.rpm texlive-l3packages-20200406-26.el9_2.noarch.rpm? texlive-ncntrsbk-20200406-26.el9_2.noarch.rpmf texlive-pst-node-20200406-26.el9_2.noarch.rpm texlive-atbegshi-20200406-26.el9_2.noarch.rpm` texlive-fontwrap-20200406-26.el9_2.noarch.rpm texlive-charter-20200406-26.el9_2.noarch.rpm texlive-latex-fonts-20200406-26.el9_2.noarch.rpmw texlive-hyphenat-20200406-26.el9_2.noarch.rpmA texlive-epsf-20200406-26.el9_2.noarch.rpm texlive-caption-20200406-26.el9_2.noarch.rpm8 texlive-mparhack-20200406-26.el9_2.noarch.rpm texlive-mfware-20200406-26.el9_2.x86_64.rpmD texlive-xetexconfig-20200406-26.el9_2.noarch.rpmK texlive-euenc-20200406-26.el9_2.noarch.rpm< texlive-ec-20200406-26.el9_2.noarch.rpm texlive-attachfile-20200406-26.el9_2.noarch.rpm$ texlive-cm-20200406-26.el9_2.noarch.rpm texlive-setspace-20200406-26.el9_2.noarch.rpmQ texlive-pdfpages-20200406-26.el9_2.noarch.rpmb texlive-footnotehyper-20200406-26.el9_2.noarch.rpm texlive-texlive-common-doc-20200406-26.el9_2.noarch.rpm texlive-pdftex-20200406-26.el9_2.x86_64.rpmZ texlive-psfrag-20200406-26.el9_2.noarch.rpmE texlive-eso-pic-20200406-26.el9_2.noarch.rpm\ texlive-psnfss-20200406-26.el9_2.noarch.rpm` texlive-pst-blur-20200406-26.el9_2.noarch.rpmI texlive-xmltex-20200406-26.el9_2.noarch.rpml texlive-graphics-def-20200406-26.el9_2.noarch.rpm[ texlive-fncychap-20200406-26.el9_2.noarch.rpm texlive-babelbib-20200406-26.el9_2.noarch.rpm1 texlive-colorprofiles-20200406-26.el9_2.noarch.rpmt texlive-hyperref-20200406-26.el9_2.noarch.rpmy texlive-amscls-20200406-26.el9_2.noarch.rpm7 texlive-wasy-type1-20200406-26.el9_2.noarch.rpm& texlive-cm-super-20200406-26.el9_2.noarch.rpmF texlive-etex-20200406-26.el9_2.noarch.rpmY texlive-preprint-20200406-26.el9_2.noarch.rpm! texlive-cite-20200406-26.el9_2.noarch.rpm texlive-kpathsea-20200406-26.el9_2.x86_64.rpm+ texlive-collection-basic-20200406-26.el9_2.noarch.rpmd texlive-fpl-20200406-26.el9_2.noarch.rpm' texlive-ucs-20200406-26.el9_2.noarch.rpm6 texlive-wasy-20200406-26.el9_2.noarch.rpm texlive-latex2man-20200406-26.el9_2.noarch.rpm texlive-catchfile-20200406-26.el9_2.noarch.rpmP texlive-pdflscape-20200406-26.el9_2.noarch.rpm texlive-bookmark-20200406-26.el9_2.noarch.rpm texlive-lm-20200406-26.el9_2.noarch.rpmd texlive-pst-grad-20200406-26.el9_2.noarch.rpm texlive-kvoptions-20200406-26.el9_2.noarch.rpmu texlive-adjustbox-20200406-26.el9_2.noarch.rpm+ texlive-unicode-data-20200406-26.el9_2.noarch.rpm4 texlive-microtype-20200406-26.el9_2.noarch.rpmk texlive-pst-tree-20200406-26.el9_2.noarch.rpm texlive-awesomebox-20200406-26.el9_2.noarch.rpm texlive-auxhook-20200406-26.el9_2.noarch.rpmJ texlive-paralist-20200406-26.el9_2.noarch.rpm4 texlive-wadalab-20200406-26.el9_2.noarch.rpmj texlive-pst-tools-20200406-26.el9_2.noarch.rpmu texlive-rerunfilecheck-20200406-26.el9_2.noarch.rpm8 texlive-ctablestack-20200406-26.el9_2.noarch.rpm texlive-breqn-20200406-26.el9_2.noarch.rpm texlive-dvipng-20200406-26.el9_2.x86_64.rpmi texlive-pst-text-20200406-26.el9_2.noarch.rpm texlive-kvsetkeys-20200406-26.el9_2.noarch.rpm texlive-stmaryrd-20200406-26.el9_2.noarch.rpmM texlive-euro-20200406-26.el9_2.noarch.rpmB texlive-newunicodechar-20200406-26.el9_2.noarch.rpm6 texlive-csquotes-20200406-26.el9_2.noarch.rpm texlive-beamer-20200406-26.el9_2.noarch.rpm~ texlive-sepnum-20200406-26.el9_2.noarch.rpmJ texlive-etoolbox-20200406-26.el9_2.noarch.rpm{ texlive-section-20200406-26.el9_2.noarch.rpmr texlive-rcs-20200406-26.el9_2.noarch.rpm] texlive-pspicture-20200406-26.el9_2.noarch.rpm| texlive-iftex-20200406-26.el9_2.noarch.rpmz texlive-scheme-basic-20200406-26.el9_2.noarch.rpm* texlive-underscore-20200406-26.el9_2.noarch.rpm texlive-luahbtex-20200406-26.el9_2.x86_64.rpm texlive-letltxmacro-20200406-26.el9_2.noarch.rpm} texlive-seminar-20200406-26.el9_2.noarch.rpmT texlive-filecontents-20200406-26.el9_2.noarch.rpm7 texlive-ctable-20200406-26.el9_2.noarch.rpm, texlive-collection-fontsrecommended-20200406-26.el9_2.noarch.rpm3 texlive-varwidth-20200406-26.el9_2.noarch.rpm& texlive-ucharclasses-20200406-26.el9_2.noarch.rpm texlive-tex4ht-20200406-26.el9_2.x86_64.rpmW texlive-fix2col-20200406-26.el9_2.noarch.rpm" texlive-cjk-20200406-26.el9_2.noarch.rpm texlive-lua-alt-getopt-20200406-26.el9_2.noarch.rpmW texlive-polyglossia-20200406-26.el9_2.noarch.rpme texlive-pst-math-20200406-26.el9_2.noarch.rpm texlive-bibtopic-20200406-26.el9_2.noarch.rpm' texlive-makecmds-20200406-26.el9_2.noarch.rpm texlive-bigintcalc-20200406-26.el9_2.noarch.rpm% texlive-ucharcat-20200406-26.el9_2.noarch.rpml texlive-pstricks-20200406-26.el9_2.noarch.rpm$ texlive-luatex85-20200406-26.el9_2.noarch.rpm& texlive-lwarp-20200406-26.el9_2.noarch.rpm texlive-arabxetex-20200406-26.el9_2.noarch.rpm5 texlive-minitoc-20200406-26.el9_2.noarch.rpmC texlive-epstopdf-pkg-20200406-26.el9_2.noarch.rpm texlive-changebar-20200406-26.el9_2.noarch.rpm8 texlive-wasysym-20200406-26.el9_2.noarch.rpm= texlive-xecyr-20200406-26.el9_2.noarch.rpm* texlive-collectbox-20200406-26.el9_2.noarch.rpmc texlive-pst-fill-20200406-26.el9_2.noarch.rpm( texlive-cmextra-20200406-26.el9_2.noarch.rpm texlive-bidi-20200406-26.el9_2.noarch.rpmO texlive-zapfding-20200406-26.el9_2.noarch.rpm@ texlive-environ-20200406-26.el9_2.noarch.rpmy texlive-sauerj-20200406-26.el9_2.noarch.rpm? texlive-xepersian-20200406-26.el9_2.noarch.rpm texlive-jknapltx-20200406-26.el9_2.noarch.rpm" texlive-xetex-20200406-26.el9_2.x86_64.rpmK texlive-xstring-20200406-26.el9_2.noarch.rpm texlive-beton-20200406-26.el9_2.noarch.rpm0 texlive-collection-xetex-20200406-26.el9_2.noarch.rpmv texlive-rsfs-20200406-26.el9_2.noarch.rpm texlive-tools-20200406-26.el9_2.noarch.rpmI texlive-palatino-20200406-26.el9_2.noarch.rpm texlive-tex-gyre-20200406-26.el9_2.noarch.rpm; texlive-xecjk-20200406-26.el9_2.noarch.rpmn texlive-ptext-20200406-26.el9_2.noarch.rpm texlive-lineno-20200406-26.el9_2.noarch.rpm4 texlive-courier-20200406-26.el9_2.noarch.rpm texlive-symbol-20200406-26.el9_2.noarch.rpm texlive-dvisvgm-20200406-26.el9_2.x86_64.rpm texlive-listings-20200406-26.el9_2.noarch.rpmR texlive-fancyref-20200406-26.el9_2.noarch.rpmf texlive-garuda-c90-20200406-26.el9_2.noarch.rpm texlive-subfigure-20200406-26.el9_2.noarch.rpmk texlive-graphics-cfg-20200406-26.el9_2.noarch.rpm< texlive-xecolor-20200406-26.el9_2.noarch.rpm texlive-avantgar-20200406-26.el9_2.noarch.rpm texlive-tabu-20200406-26.el9_2.noarch.rpmy texlive-ifmtarg-20200406-26.el9_2.noarch.rpmw texlive-sansmath-20200406-26.el9_2.noarch.rpmp texlive-qstest-20200406-26.el9_2.noarch.rpm texlive-lastpage-20200406-26.el9_2.noarch.rpm5 texlive-crop-20200406-26.el9_2.noarch.rpm> texlive-ncctools-20200406-26.el9_2.noarch.rpm texlive-t2-20200406-26.el9_2.noarch.rpmC texlive-xetex-tibetan-20200406-26.el9_2.noarch.rpm1 texlive-url-20200406-26.el9_2.noarch.rpm texlive-fontware-20200406-26.el9_2.x86_64.rpm6 texlive-mnsymbol-20200406-26.el9_2.noarch.rpmN texlive-zapfchan-20200406-26.el9_2.noarch.rpm; texlive-multido-20200406-26.el9_2.noarch.rpmK texlive-lib-20200406-26.el9_2.i686.rpmZ texlive-fmtcount-20200406-26.el9_2.noarch.rpmt texlive-refcount-20200406-26.el9_2.noarch.rpm/ texlive-updmap-map-20200406-26.el9_2.noarch.rpm texlive-listofitems-20200406-26.el9_2.noarch.rpm texlive-attachfile2-20200406-26.el9_2.noarch.rpmv texlive-hyphen-base-20200406-26.el9_2.noarch.rpm texlive-dvipdfmx-20200406-26.el9_2.x86_64.rpmm texlive-grfext-20200406-26.el9_2.noarch.rpm texlive-titlesec-20200406-26.el9_2.noarch.rpmG texlive-obsolete-20200406-26.el9_2.noarch.rpm texlive-stringenc-20200406-26.el9_2.noarch.rpm9 texlive-wrapfig-20200406-26.el9_2.noarch.rpm. texlive-mdwtools-20200406-26.el9_2.noarch.rpmM texlive-xunicode-20200406-26.el9_2.noarch.rpm] texlive-fontbook-20200406-26.el9_2.noarch.rpmH texlive-xltxtra-20200406-26.el9_2.noarch.rpmV texlive-finstrut-20200406-26.el9_2.noarch.rpmH texlive-overpic-20200406-26.el9_2.noarch.rpm texlive-base-20200406-26.el9_2.noarch.rpm$ texlive-typehtml-20200406-26.el9_2.noarch.rpm" texlive-lualibs-20200406-26.el9_2.noarch.rpm texlive-lm-math-20200406-26.el9_2.noarch.rpm texlive-intcalc-20200406-26.el9_2.noarch.rpm texlive-chngcntr-20200406-26.el9_2.noarch.rpm texlive-texlive-msg-translations-20200406-26.el9_2.noarch.rpm3 texlive-mfnfss-20200406-26.el9_2.noarch.rpm texlive-ltxmisc-20200406-26.el9_2.noarch.rpm! texlive-trimspaces-20200406-26.el9_2.noarch.rpm texlive-lettrine-20200406-26.el9_2.noarch.rpm texlive-textcase-20200406-26.el9_2.noarch.rpmi texlive-glyphlist-20200406-26.el9_2.noarch.rpmw texlive-algorithms-20200406-26.el9_2.noarch.rpm^ texlive-fonts-tlwg-20200406-26.el9_2.noarch.rpmm texlive-pstricks-add-20200406-26.el9_2.noarch.rpm' texlive-cmap-20200406-26.el9_2.noarch.rpm texlive-carlisle-20200406-26.el9_2.noarch.rpm texlive-tex-20200406-26.el9_2.x86_64.rpm texlive-translator-20200406-26.el9_2.noarch.rpms texlive-hycolor-20200406-26.el9_2.noarch.rpm) texlive-marginnote-20200406-26.el9_2.noarch.rpmE texlive-ntgclass-20200406-26.el9_2.noarch.rpme texlive-framed-20200406-26.el9_2.noarch.rpm/ texlive-memoir-20200406-26.el9_2.noarch.rpm texlive-arphic-20200406-26.el9_2.noarch.rpmg texlive-geometry-20200406-26.el9_2.noarch.rpmL texlive-xtab-20200406-26.el9_2.noarch.rpm- texlive-uniquecounter-20200406-26.el9_2.noarch.rpm texlive-knuth-lib-20200406-26.el9_2.noarch.rpm texlive-l3experimental-20200406-26.el9_2.noarch.rpmF texlive-oberdiek-20200406-26.el9_2.noarch.rpmN texlive-eurosym-20200406-26.el9_2.noarch.rpm texlive-gsftopk-20200406-26.el9_2.x86_64.rpm texlive-kerkis-20200406-26.el9_2.noarch.rpmg texlive-pst-plot-20200406-26.el9_2.noarch.rpm texlive-20200406-26.el9_2.x86_64.rpm texlive-bibtex-20200406-26.el9_2.x86_64.rpm# texlive-type1cm-20200406-26.el9_2.noarch.rpm. texlive-collection-latex-20200406-26.el9_2.noarch.rpm texlive-ltxcmds-20200406-26.el9_2.noarch.rpmV texlive-plain-20200406-26.el9_2.noarch.rpm~ texlive-index-20200406-26.el9_2.noarch.rpm[ texlive-pslatex-20200406-26.el9_2.noarch.rpm% texlive-luatexbase-20200406-26.el9_2.noarch.rpm texlive-stackengine-20200406-26.el9_2.noarch.rpmv texlive-ae-20200406-26.el9_2.noarch.rpm texlive-ltabptch-20200406-26.el9_2.noarch.rpmY texlive-float-20200406-26.el9_2.noarch.rpm( texlive-uhc-20200406-26.el9_2.noarch.rpm texlive-bitset-20200406-26.el9_2.noarch.rpm= texlive-natbib-20200406-26.el9_2.noarch.rpm texlive-metafont-20200406-26.el9_2.x86_64.rpm| texlive-anyfontsize-20200406-26.el9_2.noarch.rpm texlive-texlive-scripts-extra-20200406-26.el9_2.noarch.rpmz texlive-ifoddpage-20200406-26.el9_2.noarch.rpmH texlive-etexcmds-20200406-26.el9_2.noarch.rpm= texlive-eepic-20200406-26.el9_2.noarch.rpm_ texlive-fontspec-20200406-26.el9_2.noarch.rpm. texlive-unisugar-20200406-26.el9_2.noarch.rpmG texlive-xkeyval-20200406-26.el9_2.noarch.rpm5 texlive-was-20200406-26.el9_2.noarch.rpm; texlive-dehyph-20200406-26.el9_2.noarch.rpm, texlive-unicode-math-20200406-26.el9_2.noarch.rpm! texlive-lualatex-math-20200406-26.el9_2.noarch.rpm texlive-bera-20200406-26.el9_2.noarch.rpm texlive-breakurl-20200406-26.el9_2.noarch.rpm: texlive-xcolor-20200406-26.el9_2.noarch.rpm texlive-subfig-20200406-26.el9_2.noarch.rpm texlive-latexconfig-20200406-26.el9_2.noarch.rpmU texlive-placeins-20200406-26.el9_2.noarch.rpm texlive-tipa-20200406-26.el9_2.noarch.rpmn texlive-grffile-20200406-26.el9_2.noarch.rpm texlive-capt-of-20200406-26.el9_2.noarch.rpm texlive-changepage-20200406-26.el9_2.noarch.rpmL texlive-parskip-20200406-26.el9_2.noarch.rpmr% texlive-cm-lgc-20200406-26.el9_2.noarch.rpm texlive-tex-ini-files-20200406-26.el9_2.noarch.rpm texlive-texlive.infra-20200406-26.el9_2.noarch.rpm texlive-soul-20200406-26.el9_2.noarch.rpm2 texlive-colortbl-20200406-26.el9_2.noarch.rpm texlive-textpos-20200406-26.el9_2.noarch.rpm* texlive-marvosym-20200406-26.el9_2.noarch.rpm texlive-tex-gyre-math-20200406-26.el9_2.noarch.rpm texlive-jadetex-20200406-26.el9_2.noarch.rpmQ texlive-fancyhdr-20200406-26.el9_2.noarch.rpm, texlive-mathspec-20200406-26.el9_2.noarch.rpm texlive-koma-script-20200406-26.el9_2.noarch.rpm) texlive-ulem-20200406-26.el9_2.noarch.rpm texlive-makeindex-20200406-26.el9_2.x86_64.rpm| texlive-sectsty-20200406-26.el9_2.noarch.rpm9 texlive-mptopdf-20200406-26.el9_2.noarch.rpm texlive-infwarerr-20200406-26.el9_2.noarch.rpmp texlive-helvetic-20200406-26.el9_2.noarch.rpm texlive-svn-prov-20200406-26.el9_2.noarch.rpma texlive-pst-coil-20200406-26.el9_2.noarch.rpm texlive-threeparttable-20200406-26.el9_2.noarch.rpm texlive-tabulary-20200406-26.el9_2.noarch.rpmX texlive-fixlatvian-20200406-26.el9_2.noarch.rpma texlive-footmisc-20200406-26.el9_2.noarch.rpm} texlive-import-20200406-26.el9_2.noarch.rpm texlive-titling-20200406-26.el9_2.noarch.rpmr texlive-hologo-20200406-26.el9_2.noarch.rpm@ texlive-needspace-20200406-26.el9_2.noarch.rpm2 texlive-mflogo-font-20200406-26.el9_2.noarch.rpmu texlive-hyph-utf8-20200406-26.el9_2.noarch.rpm texlive-knuth-local-20200406-26.el9_2.noarch.rpm" texlive-txfonts-20200406-26.el9_2.noarch.rpmq texlive-ragged2e-20200406-26.el9_2.noarch.rpmq texlive-hobsub-20200406-26.el9_2.noarch.rpm texlive-showexpl-20200406-26.el9_2.noarch.rpmF texlive-xifthen-20200406-26.el9_2.noarch.rpm texlive-latex-20200406-26.el9_2.noarch.rpm texlive-linegoal-20200406-26.el9_2.noarch.rpm3 texlive-context-20200406-26.el9_2.noarch.rpm texlive-luatex-20200406-26.el9_2.x86_64.rpm~ texlive-appendix-20200406-26.el9_2.noarch.rpmD texlive-eqparbox-20200406-26.el9_2.noarch.rpms texlive-realscripts-20200406-26.el9_2.noarch.rpm texlive-tocloft-20200406-26.el9_2.noarch.rpm/ texlive-collection-latexrecommended-20200406-26.el9_2.noarch.rpm texlive-l3backend-20200406-26.el9_2.noarch.rpmz texlive-amsfonts-20200406-26.el9_2.noarch.rpmh texlive-pst-slpe-20200406-26.el9_2.noarch.rpm7 texlive-modes-20200406-26.el9_2.noarch.rpmT texlive-philokalia-20200406-26.el9_2.noarch.rpm: texlive-ms-20200406-26.el9_2.noarch.rpm! texlive-xdvi-20200406-26.el9_2.x86_64.rpmD texlive-notoccite-20200406-26.el9_2.noarch.rpm texlive-texlive-docindex-20200406-26.el9_2.noarch.rpmK texlive-lib-20200406-26.el9_2.x86_64.rpm- texlive-mathtools-20200406-26.el9_2.noarch.rpm} texlive-anysize-20200406-26.el9_2.noarch.rpm# texlive-classpack-20200406-26.el9_2.noarch.rpmo texlive-hanging-20200406-26.el9_2.noarch.rpmJ texlive-xmltexconfig-20200406-26.el9_2.noarch.rpm1 texlive-mflogo-20200406-26.el9_2.noarch.rpm0 texlive-upquote-20200406-26.el9_2.noarch.rpm texlive-kastrup-20200406-26.el9_2.noarch.rpmx texlive-hyphenex-20200406-26.el9_2.noarch.rpmO texlive-extsizes-20200406-26.el9_2.noarch.rpm texlive-kvdefinekeys-20200406-26.el9_2.noarch.rpm texlive-booktabs-20200406-26.el9_2.noarch.rpm{ texlive-amsmath-20200406-26.el9_2.noarch.rpmE texlive-xetexfontinfo-20200406-26.el9_2.noarch.rpm texlive-times-20200406-26.el9_2.noarch.rpm texlive-texlive-en-20200406-26.el9_2.noarch.rpm: texlive-datetime-20200406-26.el9_2.noarch.rpm texlive-atveryend-20200406-26.el9_2.noarch.rpm texlive-bigfoot-20200406-26.el9_2.noarch.rpmK texlive-parallel-20200406-26.el9_2.noarch.rpmX texlive-powerdot-20200406-26.el9_2.noarch.rpmL texlive-euler-20200406-26.el9_2.noarch.rpm_ texlive-pst-arrow-20200406-26.el9_2.noarch.rpm\ texlive-fontawesome-20200406-26.el9_2.noarch.rpmh texlive-gettitlestring-20200406-26.el9_2.noarch.rpmo texlive-pxfonts-20200406-26.el9_2.noarch.rpmc texlive-fp-20200406-26.el9_2.noarch.rpmG texlive-etex-pkg-20200406-26.el9_2.noarch.rpm0 texlive-metalogo-20200406-26.el9_2.noarch.rpmM texlive-passivetex-20200406-26.el9_2.noarch.rpm texlive-texlive-scripts-20200406-26.el9_2.noarch.rpm texlive-latexbug-20200406-26.el9_2.noarch.rpm texlive-thumbpdf-20200406-26.el9_2.noarch.rpmS texlive-fancyvrb-20200406-26.el9_2.noarch.rpm@ texlive-xesearch-20200406-26.el9_2.noarch.rpm< texlive-multirow-20200406-26.el9_2.noarch.rpmA texlive-xetex-itrans-20200406-26.el9_2.noarch.rpm+ texlive-mathpazo-20200406-26.el9_2.noarch.rpm( texlive-manfnt-font-20200406-26.el9_2.noarch.rpm{ texlive-ifplatform-20200406-26.el9_2.noarch.rpm- texlive-collection-htmlxml-20200406-26.el9_2.noarch.rpmN texlive-pdfcolmk-20200406-26.el9_2.noarch.rpm texlive-babel-english-20200406-26.el9_2.noarch.rpmU texlive-filehook-20200406-26.el9_2.noarch.rpmx texlive-sansmathaccent-20200406-26.el9_2.noarch.rpmO texlive-pdfescape-20200406-26.el9_2.noarch.rpm texlive-metapost-20200406-26.el9_2.x86_64.rpm texlive-bookman-20200406-26.el9_2.noarch.rpmb texlive-pst-eps-20200406-26.el9_2.noarch.rpmx texlive-alphalph-20200406-26.el9_2.noarch.rpm) texlive-cns-20200406-26.el9_2.noarch.rpm> texlive-enctex-20200406-26.el9_2.noarch.rpmR texlive-pdftexcmds-20200406-26.el9_2.noarch.rpm> texlive-xeindex-20200406-26.el9_2.noarch.rpm texlive-babel-20200406-26.el9_2.noarch.rpm# texlive-luaotfload-20200406-26.el9_2.noarch.rpmB texlive-xetex-pstricks-20200406-26.el9_2.noarch.rpmC texlive-norasi-c90-20200406-26.el9_2.noarch.rpm9 texlive-currfile-20200406-26.el9_2.noarch.rpmj texlive-graphics-20200406-26.el9_2.noarch.rpmB texlive-epstopdf-20200406-26.el9_2.noarch.rpm texlive-dvips-20200406-26.el9_2.x86_64.rpmP texlive-fancybox-20200406-26.el9_2.noarch.rpm? texlive-enumitem-20200406-26.el9_2.noarch.rpm texlive-l3kernel-20200406-26.el9_2.noarch.rpmS texlive-pgf-20200406-26.el9_2.noarch.rpmA texlive-newfloat-20200406-26.el9_2.noarch.rpm^ texlive-pst-3d-20200406-26.el9_2.noarch.rpmI texlive-etoc-20200406-26.el9_2.noarch.rpmP texlive-zref-20200406-26.el9_2.noarch.rpm2 texlive-utopia-20200406-26.el9_2.noarch.rpm texlive-l3packages-20200406-26.el9_2.noarch.rpm? texlive-ncntrsbk-20200406-26.el9_2.noarch.rpmf texlive-pst-node-20200406-26.el9_2.noarch.rpm texlive-atbegshi-20200406-26.el9_2.noarch.rpm` texlive-fontwrap-20200406-26.el9_2.noarch.rpm texlive-charter-20200406-26.el9_2.noarch.rpm texlive-latex-fonts-20200406-26.el9_2.noarch.rpmw texlive-hyphenat-20200406-26.el9_2.noarch.rpmA texlive-epsf-20200406-26.el9_2.noarch.rpm texlive-caption-20200406-26.el9_2.noarch.rpm8 texlive-mparhack-20200406-26.el9_2.noarch.rpm texlive-mfware-20200406-26.el9_2.x86_64.rpmD texlive-xetexconfig-20200406-26.el9_2.noarch.rpmK texlive-euenc-20200406-26.el9_2.noarch.rpm< texlive-ec-20200406-26.el9_2.noarch.rpm texlive-attachfile-20200406-26.el9_2.noarch.rpm$ texlive-cm-20200406-26.el9_2.noarch.rpm texlive-setspace-20200406-26.el9_2.noarch.rpmQ texlive-pdfpages-20200406-26.el9_2.noarch.rpmb texlive-footnotehyper-20200406-26.el9_2.noarch.rpm texlive-texlive-common-doc-20200406-26.el9_2.noarch.rpm texlive-pdftex-20200406-26.el9_2.x86_64.rpmZ texlive-psfrag-20200406-26.el9_2.noarch.rpmE texlive-eso-pic-20200406-26.el9_2.noarch.rpm\ texlive-psnfss-20200406-26.el9_2.noarch.rpm` texlive-pst-blur-20200406-26.el9_2.noarch.rpmI texlive-xmltex-20200406-26.el9_2.noarch.rpml texlive-graphics-def-20200406-26.el9_2.noarch.rpm[ texlive-fncychap-20200406-26.el9_2.noarch.rpm texlive-babelbib-20200406-26.el9_2.noarch.rpm1 texlive-colorprofiles-20200406-26.el9_2.noarch.rpmt texlive-hyperref-20200406-26.el9_2.noarch.rpmy texlive-amscls-20200406-26.el9_2.noarch.rpm7 texlive-wasy-type1-20200406-26.el9_2.noarch.rpm& texlive-cm-super-20200406-26.el9_2.noarch.rpmF texlive-etex-20200406-26.el9_2.noarch.rpmY texlive-preprint-20200406-26.el9_2.noarch.rpm! texlive-cite-20200406-26.el9_2.noarch.rpm texlive-kpathsea-20200406-26.el9_2.x86_64.rpm+ texlive-collection-basic-20200406-26.el9_2.noarch.rpmd texlive-fpl-20200406-26.el9_2.noarch.rpm' texlive-ucs-20200406-26.el9_2.noarch.rpm6 texlive-wasy-20200406-26.el9_2.noarch.rpm texlive-latex2man-20200406-26.el9_2.noarch.rpm texlive-catchfile-20200406-26.el9_2.noarch.rpmP texlive-pdflscape-20200406-26.el9_2.noarch.rpm texlive-bookmark-20200406-26.el9_2.noarch.rpm texlive-lm-20200406-26.el9_2.noarch.rpmd texlive-pst-grad-20200406-26.el9_2.noarch.rpm texlive-kvoptions-20200406-26.el9_2.noarch.rpmu texlive-adjustbox-20200406-26.el9_2.noarch.rpm+ texlive-unicode-data-20200406-26.el9_2.noarch.rpm4 texlive-microtype-20200406-26.el9_2.noarch.rpmk texlive-pst-tree-20200406-26.el9_2.noarch.rpm texlive-awesomebox-20200406-26.el9_2.noarch.rpm texlive-auxhook-20200406-26.el9_2.noarch.rpmJ texlive-paralist-20200406-26.el9_2.noarch.rpm4 texlive-wadalab-20200406-26.el9_2.noarch.rpmj texlive-pst-tools-20200406-26.el9_2.noarch.rpmu texlive-rerunfilecheck-20200406-26.el9_2.noarch.rpm8 texlive-ctablestack-20200406-26.el9_2.noarch.rpm texlive-breqn-20200406-26.el9_2.noarch.rpm texlive-dvipng-20200406-26.el9_2.x86_64.rpmi texlive-pst-text-20200406-26.el9_2.noarch.rpm texlive-kvsetkeys-20200406-26.el9_2.noarch.rpm texlive-stmaryrd-20200406-26.el9_2.noarch.rpmM texlive-euro-20200406-26.el9_2.noarch.rpmB texlive-newunicodechar-20200406-26.el9_2.noarch.rpm6 texlive-csquotes-20200406-26.el9_2.noarch.rpm texlive-beamer-20200406-26.el9_2.noarch.rpm~ texlive-sepnum-20200406-26.el9_2.noarch.rpmJ texlive-etoolbox-20200406-26.el9_2.noarch.rpm{ texlive-section-20200406-26.el9_2.noarch.rpmr texlive-rcs-20200406-26.el9_2.noarch.rpm] texlive-pspicture-20200406-26.el9_2.noarch.rpm| texlive-iftex-20200406-26.el9_2.noarch.rpmz texlive-scheme-basic-20200406-26.el9_2.noarch.rpm* texlive-underscore-20200406-26.el9_2.noarch.rpm texlive-luahbtex-20200406-26.el9_2.x86_64.rpm texlive-letltxmacro-20200406-26.el9_2.noarch.rpm} texlive-seminar-20200406-26.el9_2.noarch.rpmT texlive-filecontents-20200406-26.el9_2.noarch.rpm7 texlive-ctable-20200406-26.el9_2.noarch.rpm, texlive-collection-fontsrecommended-20200406-26.el9_2.noarch.rpm3 texlive-varwidth-20200406-26.el9_2.noarch.rpm& texlive-ucharclasses-20200406-26.el9_2.noarch.rpm texlive-tex4ht-20200406-26.el9_2.x86_64.rpmW texlive-fix2col-20200406-26.el9_2.noarch.rpm" texlive-cjk-20200406-26.el9_2.noarch.rpm texlive-lua-alt-getopt-20200406-26.el9_2.noarch.rpmW texlive-polyglossia-20200406-26.el9_2.noarch.rpme texlive-pst-math-20200406-26.el9_2.noarch.rpm texlive-bibtopic-20200406-26.el9_2.noarch.rpm' texlive-makecmds-20200406-26.el9_2.noarch.rpm texlive-bigintcalc-20200406-26.el9_2.noarch.rpm% texlive-ucharcat-20200406-26.el9_2.noarch.rpml texlive-pstricks-20200406-26.el9_2.noarch.rpm$ texlive-luatex85-20200406-26.el9_2.noarch.rpm& texlive-lwarp-20200406-26.el9_2.noarch.rpm texlive-arabxetex-20200406-26.el9_2.noarch.rpm5 texlive-minitoc-20200406-26.el9_2.noarch.rpmC texlive-epstopdf-pkg-20200406-26.el9_2.noarch.rpm texlive-changebar-20200406-26.el9_2.noarch.rpm8 texlive-wasysym-20200406-26.el9_2.noarch.rpm= texlive-xecyr-20200406-26.el9_2.noarch.rpm* texlive-collectbox-20200406-26.el9_2.noarch.rpmc texlive-pst-fill-20200406-26.el9_2.noarch.rpm( texlive-cmextra-20200406-26.el9_2.noarch.rpm texlive-bidi-20200406-26.el9_2.noarch.rpmO texlive-zapfding-20200406-26.el9_2.noarch.rpm@ texlive-environ-20200406-26.el9_2.noarch.rpmy texlive-sauerj-20200406-26.el9_2.noarch.rpm? texlive-xepersian-20200406-26.el9_2.noarch.rpm texlive-jknapltx-20200406-26.el9_2.noarch.rpm" texlive-xetex-20200406-26.el9_2.x86_64.rpmK texlive-xstring-20200406-26.el9_2.noarch.rpm texlive-beton-20200406-26.el9_2.noarch.rpm0 texlive-collection-xetex-20200406-26.el9_2.noarch.rpmv texlive-rsfs-20200406-26.el9_2.noarch.rpm texlive-tools-20200406-26.el9_2.noarch.rpmI texlive-palatino-20200406-26.el9_2.noarch.rpm texlive-tex-gyre-20200406-26.el9_2.noarch.rpm; texlive-xecjk-20200406-26.el9_2.noarch.rpmn texlive-ptext-20200406-26.el9_2.noarch.rpm texlive-lineno-20200406-26.el9_2.noarch.rpm4 texlive-courier-20200406-26.el9_2.noarch.rpm texlive-symbol-20200406-26.el9_2.noarch.rpm texlive-dvisvgm-20200406-26.el9_2.x86_64.rpm texlive-listings-20200406-26.el9_2.noarch.rpmR texlive-fancyref-20200406-26.el9_2.noarch.rpmf texlive-garuda-c90-20200406-26.el9_2.noarch.rpm texlive-subfigure-20200406-26.el9_2.noarch.rpmk texlive-graphics-cfg-20200406-26.el9_2.noarch.rpm< texlive-xecolor-20200406-26.el9_2.noarch.rpm texlive-avantgar-20200406-26.el9_2.noarch.rpm texlive-tabu-20200406-26.el9_2.noarch.rpmy texlive-ifmtarg-20200406-26.el9_2.noarch.rpmw texlive-sansmath-20200406-26.el9_2.noarch.rpmp texlive-qstest-20200406-26.el9_2.noarch.rpm texlive-lastpage-20200406-26.el9_2.noarch.rpm5 texlive-crop-20200406-26.el9_2.noarch.rpm> texlive-ncctools-20200406-26.el9_2.noarch.rpm texlive-t2-20200406-26.el9_2.noarch.rpmC texlive-xetex-tibetan-20200406-26.el9_2.noarch.rpm1 texlive-url-20200406-26.el9_2.noarch.rpm texlive-fontware-20200406-26.el9_2.x86_64.rpm6 texlive-mnsymbol-20200406-26.el9_2.noarch.rpmN texlive-zapfchan-20200406-26.el9_2.noarch.rpm; texlive-multido-20200406-26.el9_2.noarch.rpmK texlive-lib-20200406-26.el9_2.i686.rpmZ texlive-fmtcount-20200406-26.el9_2.noarch.rpmt texlive-refcount-20200406-26.el9_2.noarch.rpm/ texlive-updmap-map-20200406-26.el9_2.noarch.rpm texlive-listofitems-20200406-26.el9_2.noarch.rpm texlive-attachfile2-20200406-26.el9_2.noarch.rpmv texlive-hyphen-base-20200406-26.el9_2.noarch.rpm texlive-dvipdfmx-20200406-26.el9_2.x86_64.rpmm texlive-grfext-20200406-26.el9_2.noarch.rpm texlive-titlesec-20200406-26.el9_2.noarch.rpmG texlive-obsolete-20200406-26.el9_2.noarch.rpm texlive-stringenc-20200406-26.el9_2.noarch.rpm9 texlive-wrapfig-20200406-26.el9_2.noarch.rpm. texlive-mdwtools-20200406-26.el9_2.noarch.rpmM texlive-xunicode-20200406-26.el9_2.noarch.rpm] texlive-fontbook-20200406-26.el9_2.noarch.rpmH texlive-xltxtra-20200406-26.el9_2.noarch.rpmV texlive-finstrut-20200406-26.el9_2.noarch.rpmH texlive-overpic-20200406-26.el9_2.noarch.rpm texlive-base-20200406-26.el9_2.noarch.rpm$ texlive-typehtml-20200406-26.el9_2.noarch.rpm" texlive-lualibs-20200406-26.el9_2.noarch.rpm texlive-lm-math-20200406-26.el9_2.noarch.rpm texlive-intcalc-20200406-26.el9_2.noarch.rpm texlive-chngcntr-20200406-26.el9_2.noarch.rpm texlive-texlive-msg-translations-20200406-26.el9_2.noarch.rpm3 texlive-mfnfss-20200406-26.el9_2.noarch.rpm texlive-ltxmisc-20200406-26.el9_2.noarch.rpm! texlive-trimspaces-20200406-26.el9_2.noarch.rpm texlive-lettrine-20200406-26.el9_2.noarch.rpm texlive-textcase-20200406-26.el9_2.noarch.rpmi texlive-glyphlist-20200406-26.el9_2.noarch.rpmw texlive-algorithms-20200406-26.el9_2.noarch.rpm^ texlive-fonts-tlwg-20200406-26.el9_2.noarch.rpmm texlive-pstricks-add-20200406-26.el9_2.noarch.rpm' texlive-cmap-20200406-26.el9_2.noarch.rpm texlive-carlisle-20200406-26.el9_2.noarch.rpm texlive-tex-20200406-26.el9_2.x86_64.rpm texlive-translator-20200406-26.el9_2.noarch.rpms texlive-hycolor-20200406-26.el9_2.noarch.rpm) texlive-marginnote-20200406-26.el9_2.noarch.rpmE texlive-ntgclass-20200406-26.el9_2.noarch.rpme texlive-framed-20200406-26.el9_2.noarch.rpm/ texlive-memoir-20200406-26.el9_2.noarch.rpm texlive-arphic-20200406-26.el9_2.noarch.rpmg texlive-geometry-20200406-26.el9_2.noarch.rpmL texlive-xtab-20200406-26.el9_2.noarch.rpm- texlive-uniquecounter-20200406-26.el9_2.noarch.rpm texlive-knuth-lib-20200406-26.el9_2.noarch.rpm texlive-l3experimental-20200406-26.el9_2.noarch.rpmF texlive-oberdiek-20200406-26.el9_2.noarch.rpmN texlive-eurosym-20200406-26.el9_2.noarch.rpm texlive-gsftopk-20200406-26.el9_2.x86_64.rpm texlive-kerkis-20200406-26.el9_2.noarch.rpmg texlive-pst-plot-20200406-26.el9_2.noarch.rpm texlive-20200406-26.el9_2.x86_64.rpm texlive-bibtex-20200406-26.el9_2.x86_64.rpm# texlive-type1cm-20200406-26.el9_2.noarch.rpm. texlive-collection-latex-20200406-26.el9_2.noarch.rpm texlive-ltxcmds-20200406-26.el9_2.noarch.rpmV texlive-plain-20200406-26.el9_2.noarch.rpm~ texlive-index-20200406-26.el9_2.noarch.rpm[ texlive-pslatex-20200406-26.el9_2.noarch.rpm% texlive-luatexbase-20200406-26.el9_2.noarch.rpm texlive-stackengine-20200406-26.el9_2.noarch.rpmv texlive-ae-20200406-26.el9_2.noarch.rpm texlive-ltabptch-20200406-26.el9_2.noarch.rpmY texlive-float-20200406-26.el9_2.noarch.rpm( texlive-uhc-20200406-26.el9_2.noarch.rpm texlive-bitset-20200406-26.el9_2.noarch.rpm= texlive-natbib-20200406-26.el9_2.noarch.rpm texlive-metafont-20200406-26.el9_2.x86_64.rpm| texlive-anyfontsize-20200406-26.el9_2.noarch.rpm texlive-texlive-scripts-extra-20200406-26.el9_2.noarch.rpmz texlive-ifoddpage-20200406-26.el9_2.noarch.rpmH texlive-etexcmds-20200406-26.el9_2.noarch.rpm= texlive-eepic-20200406-26.el9_2.noarch.rpm_ texlive-fontspec-20200406-26.el9_2.noarch.rpm. texlive-unisugar-20200406-26.el9_2.noarch.rpmG texlive-xkeyval-20200406-26.el9_2.noarch.rpm5 texlive-was-20200406-26.el9_2.noarch.rpm; texlive-dehyph-20200406-26.el9_2.noarch.rpm, texlive-unicode-math-20200406-26.el9_2.noarch.rpm! texlive-lualatex-math-20200406-26.el9_2.noarch.rpm texlive-bera-20200406-26.el9_2.noarch.rpm texlive-breakurl-20200406-26.el9_2.noarch.rpm: texlive-xcolor-20200406-26.el9_2.noarch.rpm texlive-subfig-20200406-26.el9_2.noarch.rpm texlive-latexconfig-20200406-26.el9_2.noarch.rpmU texlive-placeins-20200406-26.el9_2.noarch.rpm texlive-tipa-20200406-26.el9_2.noarch.rpmn texlive-grffile-20200406-26.el9_2.noarch.rpm texlive-capt-of-20200406-26.el9_2.noarch.rpm texlive-changepage-20200406-26.el9_2.noarch.rpmL texlive-parskip-20200406-26.el9_2.noarch.rpm:  BBBBBsecurityModerate: libtiff security updatephttps://access.redhat.com/errata/RHSA-2023:3711RHSA-2023:3711RHSA-2023:3711 https://access.redhat.com/security/cve/CVE-2022-48281CVE-2022-48281CVE-2022-48281https://access.redhat.com/security/cve/CVE-2023-0795CVE-2023-0795CVE-2023-0795https://access.redhat.com/security/cve/CVE-2023-0796CVE-2023-0796CVE-2023-0796https://access.redhat.com/security/cve/CVE-2023-0797CVE-2023-0797CVE-2023-0797https://access.redhat.com/security/cve/CVE-2023-0798CVE-2023-0798CVE-2023-0798https://access.redhat.com/security/cve/CVE-2023-0799CVE-2023-0799CVE-2023-0799https://access.redhat.com/security/cve/CVE-2023-0800CVE-2023-0800CVE-2023-0800https://access.redhat.com/security/cve/CVE-2023-0801CVE-2023-0801CVE-2023-0801https://access.redhat.com/security/cve/CVE-2023-0802CVE-2023-0802CVE-2023-0802https://access.redhat.com/security/cve/CVE-2023-0803CVE-2023-0803CVE-2023-0803https://access.redhat.com/security/cve/CVE-2023-0804CVE-2023-0804CVE-2023-0804https://bugzilla.redhat.com/21636062163606https://bugzilla.redhat.com/21701192170119https://bugzilla.redhat.com/21701462170146https://bugzilla.redhat.com/21701512170151https://bugzilla.redhat.com/21701572170157https://bugzilla.redhat.com/21701622170162https://bugzilla.redhat.com/21701672170167https://bugzilla.redhat.com/21701722170172https://bugzilla.redhat.com/21701782170178https://bugzilla.redhat.com/21701872170187https://bugzilla.redhat.com/21701922170192https://errata.almalinux.org/9/ALSA-2023-3711.htmlALSA-2023:3711ALSA-2023:3711 ulibtiff-4.4.0-8.el9_2.i686.rpmvlibtiff-devel-4.4.0-8.el9_2.i686.rpmvlibtiff-devel-4.4.0-8.el9_2.x86_64.rpmulibtiff-4.4.0-8.el9_2.x86_64.rpmulibtiff-4.4.0-8.el9_2.i686.rpmvlibtiff-devel-4.4.0-8.el9_2.i686.rpmvlibtiff-devel-4.4.0-8.el9_2.x86_64.rpmulibtiff-4.4.0-8.el9_2.x86_64.rpmk  IBBBBBBBBBBBBBBsecurityModerate: postgresql security updateShttps://access.redhat.com/errata/RHSA-2023:3714RHSA-2023:3714RHSA-2023:3714 https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-3714.htmlALSA-2023:3714ALSA-2023:3714  postgresql-server-13.11-1.el9_2.x86_64.rpm postgresql-private-libs-13.11-1.el9_2.x86_64.rpm postgresql-plperl-13.11-1.el9_2.x86_64.rpmY postgresql-13.11-1.el9_2.x86_64.rpm postgresql-pltcl-13.11-1.el9_2.x86_64.rpm postgresql-contrib-13.11-1.el9_2.x86_64.rpm postgresql-upgrade-13.11-1.el9_2.x86_64.rpm postgresql-plpython3-13.11-1.el9_2.x86_64.rpm postgresql-server-13.11-1.el9_2.x86_64.rpm postgresql-private-libs-13.11-1.el9_2.x86_64.rpm postgresql-plperl-13.11-1.el9_2.x86_64.rpmY postgresql-13.11-1.el9_2.x86_64.rpm postgresql-pltcl-13.11-1.el9_2.x86_64.rpm postgresql-contrib-13.11-1.el9_2.x86_64.rpm postgresql-upgrade-13.11-1.el9_2.x86_64.rpm postgresql-plpython3-13.11-1.el9_2.x86_64.rpm  ZBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security updateZ}https://access.redhat.com/errata/RHSA-2023:3715RHSA-2023:3715RHSA-2023:3715 https://access.redhat.com/security/cve/CVE-2023-2700CVE-2023-2700CVE-2023-2700https://bugzilla.redhat.com/22036532203653https://errata.almalinux.org/9/ALSA-2023-3715.htmlALSA-2023:3715ALSA-2023:3715 [Tlibvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpmJTlibvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpmVTlibvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpmUTlibvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpmSTlibvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpmPTlibvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpmWTlibvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpmNTlibvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpmKTlibvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpmHTlibvirt-9.0.0-10.2.el9_2.x86_64.rpmXTlibvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpmYTlibvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpmLTlibvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpmITlibvirt-client-9.0.0-10.2.el9_2.x86_64.rpm]Tlibvirt-nss-9.0.0-10.2.el9_2.x86_64.rpmOTlibvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpm\Tlibvirt-libs-9.0.0-10.2.el9_2.x86_64.rpmRTlibvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpmZTlibvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpmMTlibvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpmTTlibvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpmQTlibvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpm[Tlibvirt-daemon-kvm-9.0.0-10.2.el9_2.x86_64.rpmJTlibvirt-daemon-9.0.0-10.2.el9_2.x86_64.rpmVTlibvirt-daemon-driver-storage-iscsi-9.0.0-10.2.el9_2.x86_64.rpmUTlibvirt-daemon-driver-storage-disk-9.0.0-10.2.el9_2.x86_64.rpmSTlibvirt-daemon-driver-storage-9.0.0-10.2.el9_2.x86_64.rpmPTlibvirt-daemon-driver-nwfilter-9.0.0-10.2.el9_2.x86_64.rpmWTlibvirt-daemon-driver-storage-logical-9.0.0-10.2.el9_2.x86_64.rpmNTlibvirt-daemon-driver-network-9.0.0-10.2.el9_2.x86_64.rpmKTlibvirt-daemon-config-network-9.0.0-10.2.el9_2.x86_64.rpmHTlibvirt-9.0.0-10.2.el9_2.x86_64.rpmXTlibvirt-daemon-driver-storage-mpath-9.0.0-10.2.el9_2.x86_64.rpmYTlibvirt-daemon-driver-storage-rbd-9.0.0-10.2.el9_2.x86_64.rpmLTlibvirt-daemon-config-nwfilter-9.0.0-10.2.el9_2.x86_64.rpmITlibvirt-client-9.0.0-10.2.el9_2.x86_64.rpm]Tlibvirt-nss-9.0.0-10.2.el9_2.x86_64.rpmOTlibvirt-daemon-driver-nodedev-9.0.0-10.2.el9_2.x86_64.rpm\Tlibvirt-libs-9.0.0-10.2.el9_2.x86_64.rpmRTlibvirt-daemon-driver-secret-9.0.0-10.2.el9_2.x86_64.rpmZTlibvirt-daemon-driver-storage-scsi-9.0.0-10.2.el9_2.x86_64.rpmMTlibvirt-daemon-driver-interface-9.0.0-10.2.el9_2.x86_64.rpmTTlibvirt-daemon-driver-storage-core-9.0.0-10.2.el9_2.x86_64.rpmQTlibvirt-daemon-driver-qemu-9.0.0-10.2.el9_2.x86_64.rpm  GBBBsecurityModerate: openssl security and bug fix updateWV https://access.redhat.com/errata/RHSA-2023:3722RHSA-2023:3722RHSA-2023:3722 https://access.redhat.com/security/cve/CVE-2023-0464CVE-2023-0464CVE-2023-0464https://access.redhat.com/security/cve/CVE-2023-0465CVE-2023-0465CVE-2023-0465https://access.redhat.com/security/cve/CVE-2023-0466CVE-2023-0466CVE-2023-0466https://access.redhat.com/security/cve/CVE-2023-1255CVE-2023-1255CVE-2023-1255https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/21810822181082https://bugzilla.redhat.com/21825612182561https://bugzilla.redhat.com/21825652182565https://bugzilla.redhat.com/21884612188461https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-3722.htmlALSA-2023:3722ALSA-2023:3722 %openssl-devel-3.0.7-16.el9_2.x86_64.rpm%openssl-devel-3.0.7-16.el9_2.i686.rpmm%openssl-perl-3.0.7-16.el9_2.x86_64.rpm%openssl-devel-3.0.7-16.el9_2.x86_64.rpm%openssl-devel-3.0.7-16.el9_2.i686.rpmm%openssl-perl-3.0.7-16.el9_2.x86_64.rpm{  MBBBBBBBBBBsecurityImportant: kernel security and bug fix update-https://access.redhat.com/errata/RHSA-2023:3723RHSA-2023:3723RHSA-2023:3723 https://access.redhat.com/security/cve/CVE-2023-2002CVE-2023-2002CVE-2023-2002https://access.redhat.com/security/cve/CVE-2023-2124CVE-2023-2124CVE-2023-2124https://access.redhat.com/security/cve/CVE-2023-2194CVE-2023-2194CVE-2023-2194https://access.redhat.com/security/cve/CVE-2023-2235CVE-2023-2235CVE-2023-2235https://access.redhat.com/security/cve/CVE-2023-28466CVE-2023-28466CVE-2023-28466https://access.redhat.com/security/cve/CVE-2023-32233CVE-2023-32233CVE-2023-32233https://bugzilla.redhat.com/21790002179000https://bugzilla.redhat.com/21873082187308https://bugzilla.redhat.com/21874392187439https://bugzilla.redhat.com/21883962188396https://bugzilla.redhat.com/21925892192589https://bugzilla.redhat.com/21961052196105https://errata.almalinux.org/9/ALSA-2023-3723.htmlALSA-2023:3723ALSA-2023:3723 %1perf-5.14.0-284.18.1.el9_2.x86_64.rpm"1kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm)1rtla-5.14.0-284.18.1.el9_2.x86_64.rpm$1kernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm#1kernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm!1kernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpm%1perf-5.14.0-284.18.1.el9_2.x86_64.rpm"1kernel-debug-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm)1rtla-5.14.0-284.18.1.el9_2.x86_64.rpm$1kernel-devel-matched-5.14.0-284.18.1.el9_2.x86_64.rpm#1kernel-devel-5.14.0-284.18.1.el9_2.x86_64.rpm!1kernel-debug-devel-5.14.0-284.18.1.el9_2.x86_64.rpmY &ZBBBBBBBBBBsecurityCritical: go-toolset and golang security update;;x https://access.redhat.com/errata/RHSA-2023:3923RHSA-2023:3923RHSA-2023:3923 https://access.redhat.com/security/cve/CVE-2023-29402CVE-2023-29402CVE-2023-29402https://access.redhat.com/security/cve/CVE-2023-29403CVE-2023-29403CVE-2023-29403https://access.redhat.com/security/cve/CVE-2023-29404CVE-2023-29404CVE-2023-29404https://access.redhat.com/security/cve/CVE-2023-29405CVE-2023-29405CVE-2023-29405https://bugzilla.redhat.com/22169652216965https://bugzilla.redhat.com/22175622217562https://bugzilla.redhat.com/22175652217565https://bugzilla.redhat.com/22175692217569https://errata.almalinux.org/9/ALSA-2023-3923.htmlALSA-2023:3923ALSA-2023:3923 ogolang-tests-1.19.10-1.el9_2.noarch.rpmlgolang-docs-1.19.10-1.el9_2.noarch.rpmAgolang-bin-1.19.10-1.el9_2.x86_64.rpm@golang-1.19.10-1.el9_2.x86_64.rpm8golang-race-1.19.10-1.el9_2.x86_64.rpmEgo-toolset-1.19.10-1.el9_2.x86_64.rpmmgolang-misc-1.19.10-1.el9_2.noarch.rpmngolang-src-1.19.10-1.el9_2.noarch.rpmogolang-tests-1.19.10-1.el9_2.noarch.rpmlgolang-docs-1.19.10-1.el9_2.noarch.rpmAgolang-bin-1.19.10-1.el9_2.x86_64.rpm@golang-1.19.10-1.el9_2.x86_64.rpm8golang-race-1.19.10-1.el9_2.x86_64.rpmEgo-toolset-1.19.10-1.el9_2.x86_64.rpmmgolang-misc-1.19.10-1.el9_2.noarch.rpmngolang-src-1.19.10-1.el9_2.noarch.rpmN 1gBBBBBBBBsecurityLow: open-vm-tools security update33 https://access.redhat.com/errata/RHSA-2023:3948RHSA-2023:3948RHSA-2023:3948 https://access.redhat.com/security/cve/CVE-2023-20867CVE-2023-20867CVE-2023-20867https://bugzilla.redhat.com/22130872213087https://errata.almalinux.org/9/ALSA-2023-3948.htmlALSA-2023:3948ALSA-2023:3948 +Popen-vm-tools-salt-minion-12.1.5-1.el9_2.1.alma.x86_64.rpmlPopen-vm-tools-test-12.1.5-1.el9_2.1.alma.x86_64.rpmjPopen-vm-tools-desktop-12.1.5-1.el9_2.1.alma.x86_64.rpmkPopen-vm-tools-sdmp-12.1.5-1.el9_2.1.alma.x86_64.rpmiPopen-vm-tools-12.1.5-1.el9_2.1.alma.x86_64.rpm+Popen-vm-tools-salt-minion-12.1.5-1.el9_2.1.alma.x86_64.rpmlPopen-vm-tools-test-12.1.5-1.el9_2.1.alma.x86_64.rpmjPopen-vm-tools-desktop-12.1.5-1.el9_2.1.alma.x86_64.rpmkPopen-vm-tools-sdmp-12.1.5-1.el9_2.1.alma.x86_64.rpmiPopen-vm-tools-12.1.5-1.el9_2.1.alma.x86_64.rpmN 4rsecurityCritical: grafana security update;<https://access.redhat.com/errata/RHSA-2023:4030RHSA-2023:4030RHSA-2023:4030 https://access.redhat.com/security/cve/CVE-2023-3128CVE-2023-3128CVE-2023-3128https://bugzilla.redhat.com/22136262213626https://errata.almalinux.org/9/ALSA-2023-4030.htmlALSA-2023:4030ALSA-2023:4030 F grafana-9.0.9-3.el9_2.alma.x86_64.rpmF grafana-9.0.9-3.el9_2.alma.x86_64.rpmZ uBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement updateLEhttps://access.redhat.com/errata/RHSA-2023:4057RHSA-2023:4057RHSA-2023:4057 https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4057.htmlALSA-2023:4057ALSA-2023:4057 ifdotnet-sdk-7.0-7.0.109-1.el9_2.x86_64.rpm fnetstandard-targeting-pack-2.1-7.0.109-1.el9_2.x86_64.rpmg4dotnet-hostfxr-7.0-7.0.9-1.el9_2.x86_64.rpmh4dotnet-runtime-7.0-7.0.9-1.el9_2.x86_64.rpmj4dotnet-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpmf4dotnet-apphost-pack-7.0-7.0.9-1.el9_2.x86_64.rpmkfdotnet-templates-7.0-7.0.109-1.el9_2.x86_64.rpmd4aspnetcore-runtime-7.0-7.0.9-1.el9_2.x86_64.rpme4aspnetcore-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpm4dotnet-host-7.0.9-1.el9_2.x86_64.rpm ifdotnet-sdk-7.0-7.0.109-1.el9_2.x86_64.rpm fnetstandard-targeting-pack-2.1-7.0.109-1.el9_2.x86_64.rpmg4dotnet-hostfxr-7.0-7.0.9-1.el9_2.x86_64.rpmh4dotnet-runtime-7.0-7.0.9-1.el9_2.x86_64.rpmj4dotnet-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpmf4dotnet-apphost-pack-7.0-7.0.9-1.el9_2.x86_64.rpmkfdotnet-templates-7.0-7.0.109-1.el9_2.x86_64.rpmd4aspnetcore-runtime-7.0-7.0.9-1.el9_2.x86_64.rpme4aspnetcore-targeting-pack-7.0-7.0.9-1.el9_2.x86_64.rpm4dotnet-host-7.0.9-1.el9_2.x86_64.rpmE JBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement updateFhttps://access.redhat.com/errata/RHSA-2023:4060RHSA-2023:4060RHSA-2023:4060 https://access.redhat.com/security/cve/CVE-2023-33170CVE-2023-33170CVE-2023-33170https://bugzilla.redhat.com/22218542221854https://errata.almalinux.org/9/ALSA-2023-4060.htmlALSA-2023:4060ALSA-2023:4060 $5dotnet-runtime-6.0-6.0.20-1.el9_2.x86_64.rpm#5dotnet-hostfxr-6.0-6.0.20-1.el9_2.x86_64.rpm 5aspnetcore-runtime-6.0-6.0.20-1.el9_2.x86_64.rpm&5dotnet-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpm"5dotnet-apphost-pack-6.0-6.0.20-1.el9_2.x86_64.rpm%#dotnet-sdk-6.0-6.0.120-1.el9_2.x86_64.rpm'#dotnet-templates-6.0-6.0.120-1.el9_2.x86_64.rpm!5aspnetcore-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpm$5dotnet-runtime-6.0-6.0.20-1.el9_2.x86_64.rpm#5dotnet-hostfxr-6.0-6.0.20-1.el9_2.x86_64.rpm 5aspnetcore-runtime-6.0-6.0.20-1.el9_2.x86_64.rpm&5dotnet-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpm"5dotnet-apphost-pack-6.0-6.0.20-1.el9_2.x86_64.rpm%#dotnet-sdk-6.0-6.0.120-1.el9_2.x86_64.rpm'#dotnet-templates-6.0-6.0.120-1.el9_2.x86_64.rpm!5aspnetcore-targeting-pack-6.0-6.0.20-1.el9_2.x86_64.rpm; [securityImportant: thunderbird security updateWg https://access.redhat.com/errata/RHSA-2023:4064RHSA-2023:4064RHSA-2023:4064 https://access.redhat.com/security/cve/CVE-2023-37201CVE-2023-37201CVE-2023-37201https://access.redhat.com/security/cve/CVE-2023-37202CVE-2023-37202CVE-2023-37202https://access.redhat.com/security/cve/CVE-2023-37207CVE-2023-37207CVE-2023-37207https://access.redhat.com/security/cve/CVE-2023-37208CVE-2023-37208CVE-2023-37208https://access.redhat.com/security/cve/CVE-2023-37211CVE-2023-37211CVE-2023-37211https://bugzilla.redhat.com/22197472219747https://bugzilla.redhat.com/22197482219748https://bugzilla.redhat.com/22197492219749https://bugzilla.redhat.com/22197502219750https://bugzilla.redhat.com/22197512219751https://errata.almalinux.org/9/ALSA-2023-4064.htmlALSA-2023:4064ALSA-2023:4064 9:thunderbird-102.13.0-2.el9_2.alma.x86_64.rpm9:thunderbird-102.13.0-2.el9_2.alma.x86_64.rpmǔ "^BBsecurityImportant: firefox security update> https://access.redhat.com/errata/RHSA-2023:4071RHSA-2023:4071RHSA-2023:4071 https://access.redhat.com/security/cve/CVE-2023-37201CVE-2023-37201CVE-2023-37201https://access.redhat.com/security/cve/CVE-2023-37202CVE-2023-37202CVE-2023-37202https://access.redhat.com/security/cve/CVE-2023-37207CVE-2023-37207CVE-2023-37207https://access.redhat.com/security/cve/CVE-2023-37208CVE-2023-37208CVE-2023-37208https://access.redhat.com/security/cve/CVE-2023-37211CVE-2023-37211CVE-2023-37211https://bugzilla.redhat.com/22197472219747https://bugzilla.redhat.com/22197482219748https://bugzilla.redhat.com/22197492219749https://bugzilla.redhat.com/22197502219750https://bugzilla.redhat.com/22197512219751https://errata.almalinux.org/9/ALSA-2023-4071.htmlALSA-2023:4071ALSA-2023:4071 O:firefox-x11-102.13.0-2.el9_2.alma.x86_64.rpm7:firefox-102.13.0-2.el9_2.alma.x86_64.rpmO:firefox-x11-102.13.0-2.el9_2.alma.x86_64.rpm7:firefox-102.13.0-2.el9_2.alma.x86_64.rpmǑ 0cBBBBBBBBBBBsecurityImportant: bind security updateVNhttps://access.redhat.com/errata/RHSA-2023:4099RHSA-2023:4099RHSA-2023:4099 https://access.redhat.com/security/cve/CVE-2023-2828CVE-2023-2828CVE-2023-2828https://bugzilla.redhat.com/22162272216227https://errata.almalinux.org/9/ALSA-2023-4099.htmlALSA-2023:4099ALSA-2023:4099 Hsbind-libs-9.16.23-11.el9_2.1.x86_64.rpmspython3-bind-9.16.23-11.el9_2.1.noarch.rpmFsbind-chroot-9.16.23-11.el9_2.1.x86_64.rpmsbind-license-9.16.23-11.el9_2.1.noarch.rpmIsbind-utils-9.16.23-11.el9_2.1.x86_64.rpmsbind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpmEsbind-9.16.23-11.el9_2.1.x86_64.rpmGsbind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpmHsbind-libs-9.16.23-11.el9_2.1.x86_64.rpmspython3-bind-9.16.23-11.el9_2.1.noarch.rpmFsbind-chroot-9.16.23-11.el9_2.1.x86_64.rpmsbind-license-9.16.23-11.el9_2.1.noarch.rpmIsbind-utils-9.16.23-11.el9_2.1.x86_64.rpmsbind-dnssec-doc-9.16.23-11.el9_2.1.noarch.rpmEsbind-9.16.23-11.el9_2.1.x86_64.rpmGsbind-dnssec-utils-9.16.23-11.el9_2.1.x86_64.rpmٟ qBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update$"https://access.redhat.com/errata/RHSA-2023:4158RHSA-2023:4158RHSA-2023:4158 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4158.htmlALSA-2023:4158ALSA-2023:4158 - java-11-openjdk-static-libs-11.0.20.0.8-2.el9.x86_64.rpm) java-11-openjdk-javadoc-11.0.20.0.8-2.el9.x86_64.rpm+ java-11-openjdk-jmods-11.0.20.0.8-2.el9.x86_64.rpm& java-11-openjdk-demo-11.0.20.0.8-2.el9.x86_64.rpm' java-11-openjdk-devel-11.0.20.0.8-2.el9.x86_64.rpm, java-11-openjdk-src-11.0.20.0.8-2.el9.x86_64.rpm% java-11-openjdk-11.0.20.0.8-2.el9.x86_64.rpm( java-11-openjdk-headless-11.0.20.0.8-2.el9.x86_64.rpm* java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9.x86_64.rpm - java-11-openjdk-static-libs-11.0.20.0.8-2.el9.x86_64.rpm) java-11-openjdk-javadoc-11.0.20.0.8-2.el9.x86_64.rpm+ java-11-openjdk-jmods-11.0.20.0.8-2.el9.x86_64.rpm& java-11-openjdk-demo-11.0.20.0.8-2.el9.x86_64.rpm' java-11-openjdk-devel-11.0.20.0.8-2.el9.x86_64.rpm, java-11-openjdk-src-11.0.20.0.8-2.el9.x86_64.rpm% java-11-openjdk-11.0.20.0.8-2.el9.x86_64.rpm( java-11-openjdk-headless-11.0.20.0.8-2.el9.x86_64.rpm* java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el9.x86_64.rpm DBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security and bug fix updateFNhttps://access.redhat.com/errata/RHSA-2023:4177RHSA-2023:4177RHSA-2023:4177 https://access.redhat.com/security/cve/CVE-2023-22006CVE-2023-22006CVE-2023-22006https://access.redhat.com/security/cve/CVE-2023-22036CVE-2023-22036CVE-2023-22036https://access.redhat.com/security/cve/CVE-2023-22041CVE-2023-22041CVE-2023-22041https://access.redhat.com/security/cve/CVE-2023-22044CVE-2023-22044CVE-2023-22044https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://bugzilla.redhat.com/22216262221626https://bugzilla.redhat.com/22216342221634https://bugzilla.redhat.com/22216422221642https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://bugzilla.redhat.com/22232072223207https://errata.almalinux.org/9/ALSA-2023-4177.htmlALSA-2023:4177ALSA-2023:4177 +java-17-openjdk-headless-17.0.8.0.7-2.el9.x86_64.rpm)java-17-openjdk-demo-17.0.8.0.7-2.el9.x86_64.rpm.java-17-openjdk-jmods-17.0.8.0.7-2.el9.x86_64.rpm/java-17-openjdk-src-17.0.8.0.7-2.el9.x86_64.rpm(java-17-openjdk-17.0.8.0.7-2.el9.x86_64.rpm,java-17-openjdk-javadoc-17.0.8.0.7-2.el9.x86_64.rpm0java-17-openjdk-static-libs-17.0.8.0.7-2.el9.x86_64.rpm*java-17-openjdk-devel-17.0.8.0.7-2.el9.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9.x86_64.rpm +java-17-openjdk-headless-17.0.8.0.7-2.el9.x86_64.rpm)java-17-openjdk-demo-17.0.8.0.7-2.el9.x86_64.rpm.java-17-openjdk-jmods-17.0.8.0.7-2.el9.x86_64.rpm/java-17-openjdk-src-17.0.8.0.7-2.el9.x86_64.rpm(java-17-openjdk-17.0.8.0.7-2.el9.x86_64.rpm,java-17-openjdk-javadoc-17.0.8.0.7-2.el9.x86_64.rpm0java-17-openjdk-static-libs-17.0.8.0.7-2.el9.x86_64.rpm*java-17-openjdk-devel-17.0.8.0.7-2.el9.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.8.0.7-2.el9.x86_64.rpmz #WBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security and bug fix updateyhttps://access.redhat.com/errata/RHSA-2023:4178RHSA-2023:4178RHSA-2023:4178 https://access.redhat.com/security/cve/CVE-2023-22045CVE-2023-22045CVE-2023-22045https://access.redhat.com/security/cve/CVE-2023-22049CVE-2023-22049CVE-2023-22049https://bugzilla.redhat.com/22216452221645https://bugzilla.redhat.com/22216472221647https://errata.almalinux.org/9/ALSA-2023-4178.htmlALSA-2023:4178ALSA-2023:4178 dZjava-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpmCZjava-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpmcZjava-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpmbZjava-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpmeZjava-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpmBZjava-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpmfZjava-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpmdZjava-1.8.0-openjdk-devel-1.8.0.382.b05-2.el9.x86_64.rpmCZjava-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-2.el9.noarch.rpmcZjava-1.8.0-openjdk-demo-1.8.0.382.b05-2.el9.x86_64.rpmbZjava-1.8.0-openjdk-1.8.0.382.b05-2.el9.x86_64.rpmeZjava-1.8.0-openjdk-headless-1.8.0.382.b05-2.el9.x86_64.rpmBZjava-1.8.0-openjdk-javadoc-1.8.0.382.b05-2.el9.noarch.rpmfZjava-1.8.0-openjdk-src-1.8.0.382.b05-2.el9.x86_64.rpm; 0dBBBBBBBBBBsecurityImportant: webkit2gtk3 security update Zhttps://access.redhat.com/errata/RHSA-2023:4201RHSA-2023:4201RHSA-2023:4201 https://access.redhat.com/security/cve/CVE-2023-32435CVE-2023-32435CVE-2023-32435https://access.redhat.com/security/cve/CVE-2023-32439CVE-2023-32439CVE-2023-32439https://bugzilla.redhat.com/22186262218626https://bugzilla.redhat.com/22186402218640https://errata.almalinux.org/9/ALSA-2023-4201.htmlALSA-2023:4201ALSA-2023:4201 3webkit2gtk3-2.38.5-1.el9_2.3.i686.rpm3webkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm4webkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm5webkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm6webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm4webkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm6webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm5webkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpm3webkit2gtk3-2.38.5-1.el9_2.3.i686.rpm3webkit2gtk3-2.38.5-1.el9_2.3.x86_64.rpm4webkit2gtk3-devel-2.38.5-1.el9_2.3.x86_64.rpm5webkit2gtk3-jsc-2.38.5-1.el9_2.3.x86_64.rpm6webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.i686.rpm4webkit2gtk3-devel-2.38.5-1.el9_2.3.i686.rpm6webkit2gtk3-jsc-devel-2.38.5-1.el9_2.3.x86_64.rpm5webkit2gtk3-jsc-2.38.5-1.el9_2.3.i686.rpmt =qBBBBBBBBBBsecurityModerate: samba security and bug fix updateghttps://access.redhat.com/errata/RHSA-2023:4325RHSA-2023:4325RHSA-2023:4325 https://access.redhat.com/security/cve/CVE-2023-3347CVE-2023-3347CVE-2023-3347https://bugzilla.redhat.com/22227922222792https://errata.almalinux.org/9/ALSA-2023-4325.htmlALSA-2023:4325ALSA-2023:4325 1.samba-winexe-4.17.5-103.el9_2.alma.x86_64.rpm0.samba-winbind-krb5-locator-4.17.5-103.el9_2.alma.x86_64.rpm..samba-vfs-iouring-4.17.5-103.el9_2.alma.x86_64.rpm-.samba-krb5-printing-4.17.5-103.el9_2.alma.x86_64.rpm/.samba-winbind-clients-4.17.5-103.el9_2.alma.x86_64.rpm,.samba-client-4.17.5-103.el9_2.alma.x86_64.rpm1.samba-winexe-4.17.5-103.el9_2.alma.x86_64.rpm0.samba-winbind-krb5-locator-4.17.5-103.el9_2.alma.x86_64.rpm..samba-vfs-iouring-4.17.5-103.el9_2.alma.x86_64.rpm-.samba-krb5-printing-4.17.5-103.el9_2.alma.x86_64.rpm/.samba-winbind-clients-4.17.5-103.el9_2.alma.x86_64.rpm,.samba-client-4.17.5-103.el9_2.alma.x86_64.rpm* ZBBBBB`BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:15 security updateoShttps://access.redhat.com/errata/RHSA-2023:4327RHSA-2023:4327RHSA-2023:4327 https://access.redhat.com/security/cve/CVE-2023-2454CVE-2023-2454CVE-2023-2454https://access.redhat.com/security/cve/CVE-2023-2455CVE-2023-2455CVE-2023-2455https://bugzilla.redhat.com/22075682207568https://bugzilla.redhat.com/22075692207569https://errata.almalinux.org/9/ALSA-2023-4327.htmlALSA-2023:4327ALSA-2023:4327 Y.^'5upostgresql-private-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpmupostgresql-server-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm7upostgresql-static-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmupostgresql-upgrade-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm2>pgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpmupostgresql-contrib-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmupostgresql-plpython3-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmupostgresql-private-libs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm1;pg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm4upostgresql-docs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm9upostgresql-upgrade-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm8upostgresql-test-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm6upostgresql-server-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmupostgresql-pltcl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmupostgresql-plperl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm4upostgresql-test-rpm-macros-15.3-1.module_el9.2.0+32+f3c125b5.noarch.rpmYupostgresql-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmY.^'5upostgresql-private-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpmupostgresql-server-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm7upostgresql-static-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmupostgresql-upgrade-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm2>pgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpmupostgresql-contrib-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmupostgresql-plpython3-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmupostgresql-private-libs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm1;pg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm4upostgresql-docs-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm9upostgresql-upgrade-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm8upostgresql-test-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm6upostgresql-server-devel-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmupostgresql-pltcl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmupostgresql-plperl-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpm4upostgresql-test-rpm-macros-15.3-1.module_el9.2.0+32+f3c125b5.noarch.rpmYupostgresql-15.3-1.module_el9.2.0+32+f3c125b5.x86_64.rpmy %TBEDBBBBBBBsecurityModerate: nodejs:18 security, bug fix, and enhancement updateBU https://access.redhat.com/errata/RHSA-2023:4330RHSA-2023:4330RHSA-2023:4330 https://access.redhat.com/security/cve/CVE-2023-30581CVE-2023-30581CVE-2023-30581https://access.redhat.com/security/cve/CVE-2023-30588CVE-2023-30588CVE-2023-30588https://access.redhat.com/security/cve/CVE-2023-30589CVE-2023-30589CVE-2023-30589https://access.redhat.com/security/cve/CVE-2023-30590CVE-2023-30590CVE-2023-30590https://bugzilla.redhat.com/22198242219824https://bugzilla.redhat.com/22198382219838https://bugzilla.redhat.com/22198412219841https://bugzilla.redhat.com/22198422219842https://errata.almalinux.org/9/ALSA-2023-4330.htmlALSA-2023:4330ALSA-2023:4330 +nb'c|npm-9.5.1-1.18.16.1.1.module_el9.2.0+31+cbae0c8e.x86_64.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm<nodejs-docs-18.16.1-1.module_el9.2.0+31+cbae0c8e.noarch.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmdnodejs-full-i18n-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm!nodejs-devel-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpmknodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm+nodejs-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm+nb'c|npm-9.5.1-1.18.16.1.1.module_el9.2.0+31+cbae0c8e.x86_64.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm<nodejs-docs-18.16.1-1.module_el9.2.0+31+cbae0c8e.noarch.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmdnodejs-full-i18n-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm!nodejs-devel-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpmknodejs-nodemon-2.0.20-2.module_el9.2.0+29+de583a0b.noarch.rpm+nodejs-18.16.1-1.module_el9.2.0+31+cbae0c8e.x86_64.rpm; 0fBBBBBBBBsecurityModerate: nodejs security, bug fix, and enhancement updateZ https://access.redhat.com/errata/RHSA-2023:4331RHSA-2023:4331RHSA-2023:4331 https://access.redhat.com/security/cve/CVE-2023-30581CVE-2023-30581CVE-2023-30581https://access.redhat.com/security/cve/CVE-2023-30588CVE-2023-30588CVE-2023-30588https://access.redhat.com/security/cve/CVE-2023-30589CVE-2023-30589CVE-2023-30589https://access.redhat.com/security/cve/CVE-2023-30590CVE-2023-30590CVE-2023-30590https://bugzilla.redhat.com/22198242219824https://bugzilla.redhat.com/22198382219838https://bugzilla.redhat.com/22198412219841https://bugzilla.redhat.com/22198422219842https://errata.almalinux.org/9/ALSA-2023-4331.htmlALSA-2023:4331ALSA-2023:4331 d<nodejs-full-i18n-16.20.1-1.el9_2.x86_64.rpmcunpm-8.19.4-1.16.20.1.1.el9_2.x86_64.rpm<nodejs-libs-16.20.1-1.el9_2.i686.rpm<nodejs-libs-16.20.1-1.el9_2.x86_64.rpm<<nodejs-docs-16.20.1-1.el9_2.noarch.rpm+<nodejs-16.20.1-1.el9_2.x86_64.rpmd<nodejs-full-i18n-16.20.1-1.el9_2.x86_64.rpmcunpm-8.19.4-1.16.20.1.1.el9_2.x86_64.rpm<nodejs-libs-16.20.1-1.el9_2.i686.rpm<nodejs-libs-16.20.1-1.el9_2.x86_64.rpm<<nodejs-docs-16.20.1-1.el9_2.noarch.rpm+<nodejs-16.20.1-1.el9_2.x86_64.rpmA 4qBsecurityModerate: libxml2 security updateqNhttps://access.redhat.com/errata/RHSA-2023:4349RHSA-2023:4349RHSA-2023:4349 https://access.redhat.com/security/cve/CVE-2023-28484CVE-2023-28484CVE-2023-28484https://access.redhat.com/security/cve/CVE-2023-29469CVE-2023-29469CVE-2023-29469https://bugzilla.redhat.com/21859842185984https://bugzilla.redhat.com/21859942185994https://errata.almalinux.org/9/ALSA-2023-4349.htmlALSA-2023:4349ALSA-2023:4349 >5libxml2-devel-2.9.13-3.el9_2.1.i686.rpm>5libxml2-devel-2.9.13-3.el9_2.1.x86_64.rpm>5libxml2-devel-2.9.13-3.el9_2.1.i686.rpm>5libxml2-devel-2.9.13-3.el9_2.1.x86_64.rpm 7usecurityModerate: python-requests security update?https://access.redhat.com/errata/RHSA-2023:4350RHSA-2023:4350RHSA-2023:4350 https://access.redhat.com/security/cve/CVE-2023-32681CVE-2023-32681CVE-2023-32681https://bugzilla.redhat.com/22094692209469https://errata.almalinux.org/9/ALSA-2023-4350.htmlALSA-2023:4350ALSA-2023:4350 +`python3-requests+security-2.25.1-7.el9_2.noarch.rpm,`python3-requests+socks-2.25.1-7.el9_2.noarch.rpm+`python3-requests+security-2.25.1-7.el9_2.noarch.rpm,`python3-requests+socks-2.25.1-7.el9_2.noarch.rpmQ  ;xBsecurityModerate: curl security updateF~https://access.redhat.com/errata/RHSA-2023:4354RHSA-2023:4354RHSA-2023:4354 https://access.redhat.com/security/cve/CVE-2023-28321CVE-2023-28321CVE-2023-28321https://access.redhat.com/security/cve/CVE-2023-28322CVE-2023-28322CVE-2023-28322https://bugzilla.redhat.com/21967862196786https://bugzilla.redhat.com/21967932196793https://errata.almalinux.org/9/ALSA-2023-4354.htmlALSA-2023:4354ALSA-2023:4354  Vlibcurl-devel-7.76.1-23.el9_2.2.x86_64.rpm Vlibcurl-devel-7.76.1-23.el9_2.2.i686.rpm Vlibcurl-devel-7.76.1-23.el9_2.2.x86_64.rpm Vlibcurl-devel-7.76.1-23.el9_2.2.i686.rpmh! |BBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement updateD0 https://access.redhat.com/errata/RHSA-2023:4377RHSA-2023:4377RHSA-2023:4377 https://access.redhat.com/security/cve/CVE-2022-45869CVE-2022-45869CVE-2022-45869https://access.redhat.com/security/cve/CVE-2023-0458CVE-2023-0458CVE-2023-0458https://access.redhat.com/security/cve/CVE-2023-1998CVE-2023-1998CVE-2023-1998https://access.redhat.com/security/cve/CVE-2023-3090CVE-2023-3090CVE-2023-3090https://access.redhat.com/security/cve/CVE-2023-35788CVE-2023-35788CVE-2023-35788https://bugzilla.redhat.com/21513172151317https://bugzilla.redhat.com/21872572187257https://bugzilla.redhat.com/21932192193219https://bugzilla.redhat.com/22157682215768https://bugzilla.redhat.com/22186722218672https://errata.almalinux.org/9/ALSA-2023-4377.htmlALSA-2023:4377ALSA-2023:4377 "@kernel-debug-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm%@perf-5.14.0-284.25.1.el9_2.x86_64.rpm!@kernel-debug-devel-5.14.0-284.25.1.el9_2.x86_64.rpm@kernel-doc-5.14.0-284.25.1.el9_2.noarch.rpm)@rtla-5.14.0-284.25.1.el9_2.x86_64.rpm#@kernel-devel-5.14.0-284.25.1.el9_2.x86_64.rpm$@kernel-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm"@kernel-debug-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm%@perf-5.14.0-284.25.1.el9_2.x86_64.rpm!@kernel-debug-devel-5.14.0-284.25.1.el9_2.x86_64.rpm@kernel-doc-5.14.0-284.25.1.el9_2.noarch.rpm)@rtla-5.14.0-284.25.1.el9_2.x86_64.rpm#@kernel-devel-5.14.0-284.25.1.el9_2.x86_64.rpm$@kernel-devel-matched-5.14.0-284.25.1.el9_2.x86_64.rpm5" JBsecurityImportant: cjose security updatethttps://access.redhat.com/errata/RHSA-2023:4411RHSA-2023:4411RHSA-2023:4411 https://access.redhat.com/security/cve/CVE-2023-37464CVE-2023-37464CVE-2023-37464https://bugzilla.redhat.com/22232952223295https://errata.almalinux.org/9/ALSA-2023-4411.htmlALSA-2023:4411ALSA-2023:4411 nncjose-0.6.1-13.el9_2.alma.i686.rpmnncjose-0.6.1-13.el9_2.alma.x86_64.rpmnncjose-0.6.1-13.el9_2.alma.i686.rpmnncjose-0.6.1-13.el9_2.alma.x86_64.rpmR# NBBsecurityImportant: openssh security update]https://access.redhat.com/errata/RHSA-2023:4412RHSA-2023:4412RHSA-2023:4412 https://access.redhat.com/security/cve/CVE-2023-38408CVE-2023-38408CVE-2023-38408https://bugzilla.redhat.com/22241732224173https://errata.almalinux.org/9/ALSA-2023-4412.htmlALSA-2023:4412ALSA-2023:4412 openssh-askpass-8.7p1-30.el9_2.x86_64.rpmnpam_ssh_agent_auth-0.10.4-5.30.el9_2.x86_64.rpmopenssh-askpass-8.7p1-30.el9_2.x86_64.rpmnpam_ssh_agent_auth-0.10.4-5.30.el9_2.x86_64.rpm $ SBBsecurityImportant: firefox security updatep*https://access.redhat.com/errata/RHSA-2023:4462RHSA-2023:4462RHSA-2023:4462 https://access.redhat.com/security/cve/CVE-2023-4045CVE-2023-4045CVE-2023-4045https://access.redhat.com/security/cve/CVE-2023-4046CVE-2023-4046CVE-2023-4046https://access.redhat.com/security/cve/CVE-2023-4047CVE-2023-4047CVE-2023-4047https://access.redhat.com/security/cve/CVE-2023-4048CVE-2023-4048CVE-2023-4048https://access.redhat.com/security/cve/CVE-2023-4049CVE-2023-4049CVE-2023-4049https://access.redhat.com/security/cve/CVE-2023-4050CVE-2023-4050CVE-2023-4050https://access.redhat.com/security/cve/CVE-2023-4055CVE-2023-4055CVE-2023-4055https://access.redhat.com/security/cve/CVE-2023-4056CVE-2023-4056CVE-2023-4056https://access.redhat.com/security/cve/CVE-2023-4057CVE-2023-4057CVE-2023-4057https://bugzilla.redhat.com/22283602228360https://bugzilla.redhat.com/22283612228361https://bugzilla.redhat.com/22283622228362https://bugzilla.redhat.com/22283632228363https://bugzilla.redhat.com/22283642228364https://bugzilla.redhat.com/22283652228365https://bugzilla.redhat.com/22283672228367https://bugzilla.redhat.com/22283702228370https://bugzilla.redhat.com/22283712228371https://errata.almalinux.org/9/ALSA-2023-4462.htmlALSA-2023:4462ALSA-2023:4462 O;firefox-x11-102.14.0-1.el9_2.alma.x86_64.rpm7;firefox-102.14.0-1.el9_2.alma.x86_64.rpmO;firefox-x11-102.14.0-1.el9_2.alma.x86_64.rpm7;firefox-102.14.0-1.el9_2.alma.x86_64.rpmG% XsecurityImportant: thunderbird security updateOhttps://access.redhat.com/errata/RHSA-2023:4499RHSA-2023:4499RHSA-2023:4499 https://access.redhat.com/security/cve/CVE-2023-3417CVE-2023-3417CVE-2023-3417https://access.redhat.com/security/cve/CVE-2023-4045CVE-2023-4045CVE-2023-4045https://access.redhat.com/security/cve/CVE-2023-4046CVE-2023-4046CVE-2023-4046https://access.redhat.com/security/cve/CVE-2023-4047CVE-2023-4047CVE-2023-4047https://access.redhat.com/security/cve/CVE-2023-4048CVE-2023-4048CVE-2023-4048https://access.redhat.com/security/cve/CVE-2023-4049CVE-2023-4049CVE-2023-4049https://access.redhat.com/security/cve/CVE-2023-4050CVE-2023-4050CVE-2023-4050https://access.redhat.com/security/cve/CVE-2023-4055CVE-2023-4055CVE-2023-4055https://access.redhat.com/security/cve/CVE-2023-4056CVE-2023-4056CVE-2023-4056https://access.redhat.com/security/cve/CVE-2023-4057CVE-2023-4057CVE-2023-4057https://bugzilla.redhat.com/22253252225325https://bugzilla.redhat.com/22283602228360https://bugzilla.redhat.com/22283612228361https://bugzilla.redhat.com/22283622228362https://bugzilla.redhat.com/22283632228363https://bugzilla.redhat.com/22283642228364https://bugzilla.redhat.com/22283652228365https://bugzilla.redhat.com/22283672228367https://bugzilla.redhat.com/22283702228370https://bugzilla.redhat.com/22283712228371https://errata.almalinux.org/9/ALSA-2023-4499.htmlALSA-2023:4499ALSA-2023:4499 9;thunderbird-102.14.0-1.el9_2.alma.x86_64.rpm9;thunderbird-102.14.0-1.el9_2.alma.x86_64.rpmY& "[BBBBBsecurityModerate: dbus security updateihttps://access.redhat.com/errata/RHSA-2023:4569RHSA-2023:4569RHSA-2023:4569 https://access.redhat.com/security/cve/CVE-2023-34969CVE-2023-34969CVE-2023-34969https://bugzilla.redhat.com/22131662213166https://errata.almalinux.org/9/ALSA-2023-4569.htmlALSA-2023:4569ALSA-2023:4569 dbus-daemon-1.12.20-7.el9_2.1.x86_64.rpm\dbus-devel-1.12.20-7.el9_2.1.x86_64.rpm\dbus-devel-1.12.20-7.el9_2.1.i686.rpmdbus-x11-1.12.20-7.el9_2.1.x86_64.rpmdbus-daemon-1.12.20-7.el9_2.1.x86_64.rpm\dbus-devel-1.12.20-7.el9_2.1.x86_64.rpm\dbus-devel-1.12.20-7.el9_2.1.i686.rpmdbus-x11-1.12.20-7.el9_2.1.x86_64.rpm' &cBsecurityImportant: iperf3 security updateh8https://access.redhat.com/errata/RHSA-2023:4571RHSA-2023:4571RHSA-2023:4571 https://access.redhat.com/security/cve/CVE-2023-38403CVE-2023-38403CVE-2023-38403https://bugzilla.redhat.com/22222042222204https://errata.almalinux.org/9/ALSA-2023-4571.htmlALSA-2023:4571ALSA-2023:4571 Fiperf3-3.9-10.el9_2.alma.i686.rpmFiperf3-3.9-10.el9_2.alma.x86_64.rpmFiperf3-3.9-10.el9_2.alma.i686.rpmFiperf3-3.9-10.el9_2.alma.x86_64.rpmo( gBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: rust security update 9https://access.redhat.com/errata/RHSA-2023:4634RHSA-2023:4634RHSA-2023:4634 https://access.redhat.com/security/cve/CVE-2023-38497CVE-2023-38497CVE-2023-38497https://bugzilla.redhat.com/22280382228038https://errata.almalinux.org/9/ALSA-2023-4634.htmlALSA-2023:4634ALSA-2023:4634 rust-doc-1.66.1-2.el9_2.x86_64.rpmqrust-src-1.66.1-2.el9_2.noarch.rpm2clippy-1.66.1-2.el9_2.x86_64.rpm1cargo-1.66.1-2.el9_2.x86_64.rpmrust-analysis-1.66.1-2.el9_2.x86_64.rpmsrust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpmprust-lldb-1.66.1-2.el9_2.noarch.rpmGrust-std-static-1.66.1-2.el9_2.x86_64.rpmorust-gdb-1.66.1-2.el9_2.noarch.rpmrust-toolset-1.66.1-2.el9_2.x86_64.rpmrust-1.66.1-2.el9_2.x86_64.rpmrust-analyzer-1.66.1-2.el9_2.x86_64.rpmGrust-std-static-1.66.1-2.el9_2.i686.rpmnrust-debugger-common-1.66.1-2.el9_2.noarch.rpmrustfmt-1.66.1-2.el9_2.x86_64.rpmrrust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpmrust-doc-1.66.1-2.el9_2.x86_64.rpmqrust-src-1.66.1-2.el9_2.noarch.rpm2clippy-1.66.1-2.el9_2.x86_64.rpm1cargo-1.66.1-2.el9_2.x86_64.rpmrust-analysis-1.66.1-2.el9_2.x86_64.rpmsrust-std-static-wasm32-wasi-1.66.1-2.el9_2.noarch.rpmprust-lldb-1.66.1-2.el9_2.noarch.rpmGrust-std-static-1.66.1-2.el9_2.x86_64.rpmorust-gdb-1.66.1-2.el9_2.noarch.rpmrust-toolset-1.66.1-2.el9_2.x86_64.rpmrust-1.66.1-2.el9_2.x86_64.rpmrust-analyzer-1.66.1-2.el9_2.x86_64.rpmGrust-std-static-1.66.1-2.el9_2.i686.rpmnrust-debugger-common-1.66.1-2.el9_2.noarch.rpmrustfmt-1.66.1-2.el9_2.x86_64.rpmrrust-std-static-wasm32-unknown-unknown-1.66.1-2.el9_2.noarch.rpmP) ABBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security, bug fix, and enhancement updateYhttps://access.redhat.com/errata/RHSA-2023:4642RHSA-2023:4642RHSA-2023:4642 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4642.htmlALSA-2023:4642ALSA-2023:4642 f/dotnet-apphost-pack-7.0-7.0.10-1.el9_2.x86_64.rpmh/dotnet-runtime-7.0-7.0.10-1.el9_2.x86_64.rpme/aspnetcore-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpmg/dotnet-hostfxr-7.0-7.0.10-1.el9_2.x86_64.rpmigdotnet-sdk-7.0-7.0.110-1.el9_2.x86_64.rpm/dotnet-host-7.0.10-1.el9_2.x86_64.rpmj/dotnet-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpmd/aspnetcore-runtime-7.0-7.0.10-1.el9_2.x86_64.rpm gnetstandard-targeting-pack-2.1-7.0.110-1.el9_2.x86_64.rpmkgdotnet-templates-7.0-7.0.110-1.el9_2.x86_64.rpm f/dotnet-apphost-pack-7.0-7.0.10-1.el9_2.x86_64.rpmh/dotnet-runtime-7.0-7.0.10-1.el9_2.x86_64.rpme/aspnetcore-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpmg/dotnet-hostfxr-7.0-7.0.10-1.el9_2.x86_64.rpmigdotnet-sdk-7.0-7.0.110-1.el9_2.x86_64.rpm/dotnet-host-7.0.10-1.el9_2.x86_64.rpmj/dotnet-targeting-pack-7.0-7.0.10-1.el9_2.x86_64.rpmd/aspnetcore-runtime-7.0-7.0.10-1.el9_2.x86_64.rpm gnetstandard-targeting-pack-2.1-7.0.110-1.el9_2.x86_64.rpmkgdotnet-templates-7.0-7.0.110-1.el9_2.x86_64.rpm* &VBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security, bug fix, and enhancement updatephttps://access.redhat.com/errata/RHSA-2023:4644RHSA-2023:4644RHSA-2023:4644 https://access.redhat.com/security/cve/CVE-2023-35390CVE-2023-35390CVE-2023-35390https://access.redhat.com/security/cve/CVE-2023-38180CVE-2023-38180CVE-2023-38180https://bugzilla.redhat.com/22286212228621https://bugzilla.redhat.com/22286222228622https://errata.almalinux.org/9/ALSA-2023-4644.htmlALSA-2023:4644ALSA-2023:4644  6aspnetcore-runtime-6.0-6.0.21-1.el9_2.x86_64.rpm'$dotnet-templates-6.0-6.0.121-1.el9_2.x86_64.rpm%$dotnet-sdk-6.0-6.0.121-1.el9_2.x86_64.rpm!6aspnetcore-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpm$6dotnet-runtime-6.0-6.0.21-1.el9_2.x86_64.rpm#6dotnet-hostfxr-6.0-6.0.21-1.el9_2.x86_64.rpm"6dotnet-apphost-pack-6.0-6.0.21-1.el9_2.x86_64.rpm&6dotnet-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpm 6aspnetcore-runtime-6.0-6.0.21-1.el9_2.x86_64.rpm'$dotnet-templates-6.0-6.0.121-1.el9_2.x86_64.rpm%$dotnet-sdk-6.0-6.0.121-1.el9_2.x86_64.rpm!6aspnetcore-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpm$6dotnet-runtime-6.0-6.0.21-1.el9_2.x86_64.rpm#6dotnet-hostfxr-6.0-6.0.21-1.el9_2.x86_64.rpm"6dotnet-apphost-pack-6.0-6.0.21-1.el9_2.x86_64.rpm&6dotnet-targeting-pack-6.0-6.0.21-1.el9_2.x86_64.rpm0+ 5gBBBBBBBBBBBBsecurityImportant: cups security updatehttps://access.redhat.com/errata/RHSA-2023:4838RHSA-2023:4838RHSA-2023:4838 https://access.redhat.com/security/cve/CVE-2023-32360CVE-2023-32360CVE-2023-32360https://bugzilla.redhat.com/22304952230495https://errata.almalinux.org/9/ALSA-2023-4838.htmlALSA-2023:4838ALSA-2023:4838  Ecups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpm Ecups-client-2.3.3op2-16.el9_2.1.x86_64.rpm Ecups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpm Ecups-2.3.3op2-16.el9_2.1.x86_64.rpmGEcups-devel-2.3.3op2-16.el9_2.1.i686.rpmrEcups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpmGEcups-devel-2.3.3op2-16.el9_2.1.x86_64.rpm Ecups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpm Ecups-ipptool-2.3.3op2-16.el9_2.1.x86_64.rpm Ecups-client-2.3.3op2-16.el9_2.1.x86_64.rpm Ecups-lpd-2.3.3op2-16.el9_2.1.x86_64.rpm Ecups-2.3.3op2-16.el9_2.1.x86_64.rpmGEcups-devel-2.3.3op2-16.el9_2.1.i686.rpmrEcups-filesystem-2.3.3op2-16.el9_2.1.noarch.rpmGEcups-devel-2.3.3op2-16.el9_2.1.x86_64.rpm Ecups-printerapp-2.3.3op2-16.el9_2.1.x86_64.rpmM, 8vsecurityImportant: thunderbird security update!https://access.redhat.com/errata/RHSA-2023:4955RHSA-2023:4955RHSA-2023:4955 https://access.redhat.com/security/cve/CVE-2023-4051CVE-2023-4051CVE-2023-4051https://access.redhat.com/security/cve/CVE-2023-4053CVE-2023-4053CVE-2023-4053https://access.redhat.com/security/cve/CVE-2023-4573CVE-2023-4573CVE-2023-4573https://access.redhat.com/security/cve/CVE-2023-4574CVE-2023-4574CVE-2023-4574https://access.redhat.com/security/cve/CVE-2023-4575CVE-2023-4575CVE-2023-4575https://access.redhat.com/security/cve/CVE-2023-4577CVE-2023-4577CVE-2023-4577https://access.redhat.com/security/cve/CVE-2023-4578CVE-2023-4578CVE-2023-4578https://access.redhat.com/security/cve/CVE-2023-4580CVE-2023-4580CVE-2023-4580https://access.redhat.com/security/cve/CVE-2023-4581CVE-2023-4581CVE-2023-4581https://access.redhat.com/security/cve/CVE-2023-4583CVE-2023-4583CVE-2023-4583https://access.redhat.com/security/cve/CVE-2023-4584CVE-2023-4584CVE-2023-4584https://access.redhat.com/security/cve/CVE-2023-4585CVE-2023-4585CVE-2023-4585https://bugzilla.redhat.com/22360712236071https://bugzilla.redhat.com/22360722236072https://bugzilla.redhat.com/22360732236073https://bugzilla.redhat.com/22360752236075https://bugzilla.redhat.com/22360762236076https://bugzilla.redhat.com/22360772236077https://bugzilla.redhat.com/22360782236078https://bugzilla.redhat.com/22360792236079https://bugzilla.redhat.com/22360802236080https://bugzilla.redhat.com/22360822236082https://bugzilla.redhat.com/22360842236084https://bugzilla.redhat.com/22360862236086https://errata.almalinux.org/9/ALSA-2023-4955.htmlALSA-2023:4955ALSA-2023:4955 9<thunderbird-102.15.0-1.el9_2.alma.x86_64.rpm9<thunderbird-102.15.0-1.el9_2.alma.x86_64.rpm&- =yBBsecurityImportant: firefox security update 0https://access.redhat.com/errata/RHSA-2023:4958RHSA-2023:4958RHSA-2023:4958 https://access.redhat.com/security/cve/CVE-2023-4051CVE-2023-4051CVE-2023-4051https://access.redhat.com/security/cve/CVE-2023-4053CVE-2023-4053CVE-2023-4053https://access.redhat.com/security/cve/CVE-2023-4573CVE-2023-4573CVE-2023-4573https://access.redhat.com/security/cve/CVE-2023-4574CVE-2023-4574CVE-2023-4574https://access.redhat.com/security/cve/CVE-2023-4575CVE-2023-4575CVE-2023-4575https://access.redhat.com/security/cve/CVE-2023-4577CVE-2023-4577CVE-2023-4577https://access.redhat.com/security/cve/CVE-2023-4578CVE-2023-4578CVE-2023-4578https://access.redhat.com/security/cve/CVE-2023-4580CVE-2023-4580CVE-2023-4580https://access.redhat.com/security/cve/CVE-2023-4581CVE-2023-4581CVE-2023-4581https://access.redhat.com/security/cve/CVE-2023-4583CVE-2023-4583CVE-2023-4583https://access.redhat.com/security/cve/CVE-2023-4584CVE-2023-4584CVE-2023-4584https://access.redhat.com/security/cve/CVE-2023-4585CVE-2023-4585CVE-2023-4585https://bugzilla.redhat.com/22360712236071https://bugzilla.redhat.com/22360722236072https://bugzilla.redhat.com/22360732236073https://bugzilla.redhat.com/22360752236075https://bugzilla.redhat.com/22360762236076https://bugzilla.redhat.com/22360772236077https://bugzilla.redhat.com/22360782236078https://bugzilla.redhat.com/22360792236079https://bugzilla.redhat.com/22360802236080https://bugzilla.redhat.com/22360822236082https://bugzilla.redhat.com/22360842236084https://bugzilla.redhat.com/22360862236086https://errata.almalinux.org/9/ALSA-2023-4958.htmlALSA-2023:4958ALSA-2023:4958 7<firefox-102.15.0-1.el9_2.alma.x86_64.rpmO<firefox-x11-102.15.0-1.el9_2.alma.x86_64.rpm7<firefox-102.15.0-1.el9_2.alma.x86_64.rpmO<firefox-x11-102.15.0-1.el9_2.alma.x86_64.rpmM. ~BsecurityImportant: flac security updatePwhttps://access.redhat.com/errata/RHSA-2023:5048RHSA-2023:5048RHSA-2023:5048 https://access.redhat.com/security/cve/CVE-2020-22219CVE-2020-22219CVE-2020-22219https://bugzilla.redhat.com/22354892235489https://errata.almalinux.org/9/ALSA-2023-5048.htmlALSA-2023:5048ALSA-2023:5048 ]flac-libs-1.3.3-10.el9_2.1.x86_64.rpm]flac-libs-1.3.3-10.el9_2.1.i686.rpm]flac-libs-1.3.3-10.el9_2.1.x86_64.rpm]flac-libs-1.3.3-10.el9_2.1.i686.rpm5/ BBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement updateG_https://access.redhat.com/errata/RHSA-2023:5069RHSA-2023:5069RHSA-2023:5069 https://access.redhat.com/security/cve/CVE-2023-1637CVE-2023-1637CVE-2023-1637https://access.redhat.com/security/cve/CVE-2023-20593CVE-2023-20593CVE-2023-20593https://access.redhat.com/security/cve/CVE-2023-21102CVE-2023-21102CVE-2023-21102https://access.redhat.com/security/cve/CVE-2023-31248CVE-2023-31248CVE-2023-31248https://access.redhat.com/security/cve/CVE-2023-3390CVE-2023-3390CVE-2023-3390https://access.redhat.com/security/cve/CVE-2023-35001CVE-2023-35001CVE-2023-35001https://access.redhat.com/security/cve/CVE-2023-3610CVE-2023-3610CVE-2023-3610https://access.redhat.com/security/cve/CVE-2023-3776CVE-2023-3776CVE-2023-3776https://access.redhat.com/security/cve/CVE-2023-4004CVE-2023-4004CVE-2023-4004https://access.redhat.com/security/cve/CVE-2023-4147CVE-2023-4147CVE-2023-4147https://bugzilla.redhat.com/21818912181891https://bugzilla.redhat.com/22132602213260https://bugzilla.redhat.com/22134552213455https://bugzilla.redhat.com/22178452217845https://bugzilla.redhat.com/22208922220892https://bugzilla.redhat.com/22208932220893https://bugzilla.redhat.com/22250972225097https://bugzilla.redhat.com/22251982225198https://bugzilla.redhat.com/22252392225239https://bugzilla.redhat.com/22252752225275https://errata.almalinux.org/9/ALSA-2023-5069.htmlALSA-2023:5069ALSA-2023:5069 %2perf-5.14.0-284.30.1.el9_2.x86_64.rpm!2kernel-debug-devel-5.14.0-284.30.1.el9_2.x86_64.rpm"2kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm$2kernel-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm#2kernel-devel-5.14.0-284.30.1.el9_2.x86_64.rpm)2rtla-5.14.0-284.30.1.el9_2.x86_64.rpm%2perf-5.14.0-284.30.1.el9_2.x86_64.rpm!2kernel-debug-devel-5.14.0-284.30.1.el9_2.x86_64.rpm"2kernel-debug-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm$2kernel-devel-matched-5.14.0-284.30.1.el9_2.x86_64.rpm#2kernel-devel-5.14.0-284.30.1.el9_2.x86_64.rpm)2rtla-5.14.0-284.30.1.el9_2.x86_64.rpm0 OBsecurityModerate: libcap security update&0https://access.redhat.com/errata/RHSA-2023:5071RHSA-2023:5071RHSA-2023:5071 https://access.redhat.com/security/cve/CVE-2023-2602CVE-2023-2602CVE-2023-2602https://access.redhat.com/security/cve/CVE-2023-2603CVE-2023-2603CVE-2023-2603https://bugzilla.redhat.com/22091132209113https://bugzilla.redhat.com/22091142209114https://errata.almalinux.org/9/ALSA-2023-5071.htmlALSA-2023:5071ALSA-2023:5071 "libcap-devel-2.48-9.el9_2.x86_64.rpm"libcap-devel-2.48-9.el9_2.i686.rpm"libcap-devel-2.48-9.el9_2.x86_64.rpm"libcap-devel-2.48-9.el9_2.i686.rpm1 SBBBBBBBBBBBsecurityModerate: keylime security updateVhhttps://access.redhat.com/errata/RHSA-2023:5080RHSA-2023:5080RHSA-2023:5080 https://access.redhat.com/security/cve/CVE-2023-38200CVE-2023-38200CVE-2023-38200https://access.redhat.com/security/cve/CVE-2023-38201CVE-2023-38201CVE-2023-38201https://bugzilla.redhat.com/22226922222692https://bugzilla.redhat.com/22226932222693https://errata.almalinux.org/9/ALSA-2023-5080.htmlALSA-2023:5080ALSA-2023:5080 {Ckeylime-base-6.5.2-6.el9_2.alma.1.x86_64.rpm|Ckeylime-registrar-6.5.2-6.el9_2.alma.1.x86_64.rpm}Ckeylime-tenant-6.5.2-6.el9_2.alma.1.x86_64.rpm Cpython3-keylime-6.5.2-6.el9_2.alma.1.x86_64.rpmCkeylime-selinux-6.5.2-6.el9_2.alma.1.noarch.rpmzCkeylime-6.5.2-6.el9_2.alma.1.x86_64.rpm~Ckeylime-verifier-6.5.2-6.el9_2.alma.1.x86_64.rpm{Ckeylime-base-6.5.2-6.el9_2.alma.1.x86_64.rpm|Ckeylime-registrar-6.5.2-6.el9_2.alma.1.x86_64.rpm}Ckeylime-tenant-6.5.2-6.el9_2.alma.1.x86_64.rpm Cpython3-keylime-6.5.2-6.el9_2.alma.1.x86_64.rpmCkeylime-selinux-6.5.2-6.el9_2.alma.1.noarch.rpmzCkeylime-6.5.2-6.el9_2.alma.1.x86_64.rpm~Ckeylime-verifier-6.5.2-6.el9_2.alma.1.x86_64.rpm2 )aBBBBBBsecurityModerate: librsvg2 security update>https://access.redhat.com/errata/RHSA-2023:5081RHSA-2023:5081RHSA-2023:5081 https://access.redhat.com/security/cve/CVE-2023-38633CVE-2023-38633CVE-2023-38633https://bugzilla.redhat.com/22249452224945https://errata.almalinux.org/9/ALSA-2023-5081.htmlALSA-2023:5081ALSA-2023:5081 3Clibrsvg2-tools-2.50.7-1.el9_2.1.x86_64.rpm)Clibrsvg2-devel-2.50.7-1.el9_2.1.x86_64.rpm(Clibrsvg2-2.50.7-1.el9_2.1.x86_64.rpm)Clibrsvg2-devel-2.50.7-1.el9_2.1.i686.rpm(Clibrsvg2-2.50.7-1.el9_2.1.i686.rpm3Clibrsvg2-tools-2.50.7-1.el9_2.1.x86_64.rpm)Clibrsvg2-devel-2.50.7-1.el9_2.1.x86_64.rpm(Clibrsvg2-2.50.7-1.el9_2.1.x86_64.rpm)Clibrsvg2-devel-2.50.7-1.el9_2.1.i686.rpm(Clibrsvg2-2.50.7-1.el9_2.1.i686.rpm]3 jBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qemu-kvm security and bug fix updateNBhttps://access.redhat.com/errata/RHSA-2023:5094RHSA-2023:5094RHSA-2023:5094 https://access.redhat.com/security/cve/CVE-2023-3354CVE-2023-3354CVE-2023-3354https://bugzilla.redhat.com/22164782216478https://errata.almalinux.org/9/ALSA-2023-5094.htmlALSA-2023:5094ALSA-2023:5094 aqemu-kvm-tools-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-core-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-device-usb-host-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-ui-opengl-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-common-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-pr-helper-7.2.0-14.el9_2.5.alma.1.x86_64.rpm aqemu-img-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-block-rbd-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-docs-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-block-curl-7.2.0-14.el9_2.5.alma.1.x86_64.rpm aqemu-kvm-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.alma.1.x86_64.rpm aqemu-guest-agent-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-audio-pa-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-tools-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-core-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-device-usb-host-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-ui-opengl-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-device-display-virtio-gpu-pci-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-device-display-virtio-vga-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-common-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-pr-helper-7.2.0-14.el9_2.5.alma.1.x86_64.rpm aqemu-img-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-ui-egl-headless-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-block-rbd-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-device-usb-redirect-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-docs-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-block-curl-7.2.0-14.el9_2.5.alma.1.x86_64.rpm aqemu-kvm-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-device-display-virtio-gpu-7.2.0-14.el9_2.5.alma.1.x86_64.rpm aqemu-guest-agent-7.2.0-14.el9_2.5.alma.1.x86_64.rpmaqemu-kvm-audio-pa-7.2.0-14.el9_2.5.alma.1.x86_64.rpm4 OBBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security updateRhttps://access.redhat.com/errata/RHSA-2023:5143RHSA-2023:5143RHSA-2023:5143 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5143.htmlALSA-2023:5143ALSA-2023:5143 #7dotnet-hostfxr-6.0-6.0.22-1.el9_2.x86_64.rpm&7dotnet-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpm 7aspnetcore-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm'%dotnet-templates-6.0-6.0.122-1.el9_2.x86_64.rpm"7dotnet-apphost-pack-6.0-6.0.22-1.el9_2.x86_64.rpm%%dotnet-sdk-6.0-6.0.122-1.el9_2.x86_64.rpm!7aspnetcore-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpm$7dotnet-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm#7dotnet-hostfxr-6.0-6.0.22-1.el9_2.x86_64.rpm&7dotnet-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpm 7aspnetcore-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm'%dotnet-templates-6.0-6.0.122-1.el9_2.x86_64.rpm"7dotnet-apphost-pack-6.0-6.0.22-1.el9_2.x86_64.rpm%%dotnet-sdk-6.0-6.0.122-1.el9_2.x86_64.rpm!7aspnetcore-targeting-pack-6.0-6.0.22-1.el9_2.x86_64.rpm$7dotnet-runtime-6.0-6.0.22-1.el9_2.x86_64.rpm~5 4`BBBBBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security updatebRhttps://access.redhat.com/errata/RHSA-2023:5146RHSA-2023:5146RHSA-2023:5146 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-5146.htmlALSA-2023:5146ALSA-2023:5146 0dotnet-host-7.0.11-1.el9_2.x86_64.rpmj0dotnet-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpmg0dotnet-hostfxr-7.0-7.0.11-1.el9_2.x86_64.rpme0aspnetcore-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpmkhdotnet-templates-7.0-7.0.111-1.el9_2.x86_64.rpm hnetstandard-targeting-pack-2.1-7.0.111-1.el9_2.x86_64.rpmf0dotnet-apphost-pack-7.0-7.0.11-1.el9_2.x86_64.rpmihdotnet-sdk-7.0-7.0.111-1.el9_2.x86_64.rpmh0dotnet-runtime-7.0-7.0.11-1.el9_2.x86_64.rpmd0aspnetcore-runtime-7.0-7.0.11-1.el9_2.x86_64.rpm 0dotnet-host-7.0.11-1.el9_2.x86_64.rpmj0dotnet-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpmg0dotnet-hostfxr-7.0-7.0.11-1.el9_2.x86_64.rpme0aspnetcore-targeting-pack-7.0-7.0.11-1.el9_2.x86_64.rpmkhdotnet-templates-7.0-7.0.111-1.el9_2.x86_64.rpm hnetstandard-targeting-pack-2.1-7.0.111-1.el9_2.x86_64.rpmf0dotnet-apphost-pack-7.0-7.0.11-1.el9_2.x86_64.rpmihdotnet-sdk-7.0-7.0.111-1.el9_2.x86_64.rpmh0dotnet-runtime-7.0-7.0.11-1.el9_2.x86_64.rpmd0aspnetcore-runtime-7.0-7.0.11-1.el9_2.x86_64.rpmq6 8uBsecurityImportant: frr security update4jhttps://access.redhat.com/errata/RHSA-2023:5194RHSA-2023:5194RHSA-2023:5194 https://access.redhat.com/security/cve/CVE-2023-38802CVE-2023-38802CVE-2023-38802https://bugzilla.redhat.com/22309832230983https://errata.almalinux.org/9/ALSA-2023-5194.htmlALSA-2023:5194ALSA-2023:5194 `frr-selinux-8.3.1-5.el9_2.2.alma.noarch.rpm`frr-8.3.1-5.el9_2.2.alma.x86_64.rpm`frr-selinux-8.3.1-5.el9_2.2.alma.noarch.rpm`frr-8.3.1-5.el9_2.2.alma.x86_64.rpm*7 =yBBsecurityImportant: firefox security update7https://access.redhat.com/errata/RHSA-2023:5200RHSA-2023:5200RHSA-2023:5200 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5200.htmlALSA-2023:5200ALSA-2023:5200 7=firefox-102.15.1-1.el9_2.alma.x86_64.rpmO=firefox-x11-102.15.1-1.el9_2.alma.x86_64.rpm7=firefox-102.15.1-1.el9_2.alma.x86_64.rpmO=firefox-x11-102.15.1-1.el9_2.alma.x86_64.rpmM8 ~BBBBsecurityImportant: libwebp security updateU-https://access.redhat.com/errata/RHSA-2023:5214RHSA-2023:5214RHSA-2023:5214 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5214.htmlALSA-2023:5214ALSA-2023:5214 :libwebp-devel-1.2.0-7.el9_2.i686.rpm:libwebp-1.2.0-7.el9_2.i686.rpm:libwebp-devel-1.2.0-7.el9_2.x86_64.rpm:libwebp-1.2.0-7.el9_2.x86_64.rpm:libwebp-devel-1.2.0-7.el9_2.i686.rpm:libwebp-1.2.0-7.el9_2.i686.rpm:libwebp-devel-1.2.0-7.el9_2.x86_64.rpm:libwebp-1.2.0-7.el9_2.x86_64.rpm^9 EsecurityImportant: thunderbird security updatehttps://access.redhat.com/errata/RHSA-2023:5224RHSA-2023:5224RHSA-2023:5224 https://access.redhat.com/security/cve/CVE-2023-4863CVE-2023-4863CVE-2023-4863https://bugzilla.redhat.com/22384312238431https://errata.almalinux.org/9/ALSA-2023-5224.htmlALSA-2023:5224ALSA-2023:5224 9=thunderbird-102.15.1-1.el9_2.alma.x86_64.rpm9=thunderbird-102.15.1-1.el9_2.alma.x86_64.rpmp: HBBBBBBBBsecurityImportant: open-vm-tools security updatelhttps://access.redhat.com/errata/RHSA-2023:5313RHSA-2023:5313RHSA-2023:5313 https://access.redhat.com/security/cve/CVE-2023-20900CVE-2023-20900CVE-2023-20900https://bugzilla.redhat.com/22365422236542https://errata.almalinux.org/9/ALSA-2023-5313.htmlALSA-2023:5313ALSA-2023:5313 jQopen-vm-tools-desktop-12.1.5-1.el9_2.3.alma.1.x86_64.rpmlQopen-vm-tools-test-12.1.5-1.el9_2.3.alma.1.x86_64.rpmiQopen-vm-tools-12.1.5-1.el9_2.3.alma.1.x86_64.rpmkQopen-vm-tools-sdmp-12.1.5-1.el9_2.3.alma.1.x86_64.rpm+Qopen-vm-tools-salt-minion-12.1.5-1.el9_2.3.alma.1.x86_64.rpmjQopen-vm-tools-desktop-12.1.5-1.el9_2.3.alma.1.x86_64.rpmlQopen-vm-tools-test-12.1.5-1.el9_2.3.alma.1.x86_64.rpmiQopen-vm-tools-12.1.5-1.el9_2.3.alma.1.x86_64.rpmkQopen-vm-tools-sdmp-12.1.5-1.el9_2.3.alma.1.x86_64.rpm+Qopen-vm-tools-salt-minion-12.1.5-1.el9_2.3.alma.1.x86_64.rpm; TBFzBBBBBBBsecurityImportant: nodejs:18 security, bug fix, and enhancement updatet. https://access.redhat.com/errata/RHSA-2023:5363RHSA-2023:5363RHSA-2023:5363 https://access.redhat.com/security/cve/CVE-2022-25883CVE-2022-25883CVE-2022-25883https://access.redhat.com/security/cve/CVE-2023-32002CVE-2023-32002CVE-2023-32002https://access.redhat.com/security/cve/CVE-2023-32006CVE-2023-32006CVE-2023-32006https://access.redhat.com/security/cve/CVE-2023-32559CVE-2023-32559CVE-2023-32559https://bugzilla.redhat.com/22164752216475https://bugzilla.redhat.com/22309482230948https://bugzilla.redhat.com/22309552230955https://bugzilla.redhat.com/22309562230956https://errata.almalinux.org/9/ALSA-2023-5363.htmlALSA-2023:5363ALSA-2023:5363 +nc'c}npm-9.6.7-1.18.17.1.1.module_el9.2.0+36+853e48f5.x86_64.rpmdnodejs-full-i18n-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpmk2nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm+nodejs-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm<nodejs-docs-18.17.1-1.module_el9.2.0+36+853e48f5.noarch.rpm!nodejs-devel-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm+nc'c}npm-9.6.7-1.18.17.1.1.module_el9.2.0+36+853e48f5.x86_64.rpmdnodejs-full-i18n-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpmk2nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm+nodejs-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm<nodejs-docs-18.17.1-1.module_el9.2.0+36+853e48f5.noarch.rpm!nodejs-devel-18.17.1-1.module_el9.2.0+36+853e48f5.x86_64.rpmѸ < !]BBsecurityImportant: firefox security update"W https://access.redhat.com/errata/RHSA-2023:5434RHSA-2023:5434RHSA-2023:5434 https://access.redhat.com/security/cve/CVE-2023-3600CVE-2023-3600CVE-2023-3600https://access.redhat.com/security/cve/CVE-2023-5169CVE-2023-5169CVE-2023-5169https://access.redhat.com/security/cve/CVE-2023-5171CVE-2023-5171CVE-2023-5171https://access.redhat.com/security/cve/CVE-2023-5176CVE-2023-5176CVE-2023-5176https://access.redhat.com/security/cve/CVE-2023-5217CVE-2023-5217CVE-2023-5217https://bugzilla.redhat.com/22226522222652https://bugzilla.redhat.com/22408932240893https://bugzilla.redhat.com/22408942240894https://bugzilla.redhat.com/22408962240896https://bugzilla.redhat.com/22411912241191https://errata.almalinux.org/9/ALSA-2023-5434.htmlALSA-2023:5434ALSA-2023:5434 7Pfirefox-115.3.1-1.el9_2.alma.1.x86_64.rpmOPfirefox-x11-115.3.1-1.el9_2.alma.1.x86_64.rpm7Pfirefox-115.3.1-1.el9_2.alma.1.x86_64.rpmOPfirefox-x11-115.3.1-1.el9_2.alma.1.x86_64.rpmD= $bsecurityImportant: thunderbird security updatey& https://access.redhat.com/errata/RHSA-2023:5435RHSA-2023:5435RHSA-2023:5435 https://access.redhat.com/security/cve/CVE-2023-3600CVE-2023-3600CVE-2023-3600https://access.redhat.com/security/cve/CVE-2023-5169CVE-2023-5169CVE-2023-5169https://access.redhat.com/security/cve/CVE-2023-5171CVE-2023-5171CVE-2023-5171https://access.redhat.com/security/cve/CVE-2023-5176CVE-2023-5176CVE-2023-5176https://access.redhat.com/security/cve/CVE-2023-5217CVE-2023-5217CVE-2023-5217https://bugzilla.redhat.com/22226522222652https://bugzilla.redhat.com/22408932240893https://bugzilla.redhat.com/22408942240894https://bugzilla.redhat.com/22408962240896https://bugzilla.redhat.com/22411912241191https://errata.almalinux.org/9/ALSA-2023-5435.htmlALSA-2023:5435ALSA-2023:5435 9=thunderbird-115.3.1-1.el9_2.alma.x86_64.rpm9=thunderbird-115.3.1-1.el9_2.alma.x86_64.rpm3> /eBBBBBBBBsecurityImportant: glibc security update https://access.redhat.com/errata/RHSA-2023:5453RHSA-2023:5453RHSA-2023:5453 https://access.redhat.com/security/cve/CVE-2023-4527CVE-2023-4527CVE-2023-4527https://access.redhat.com/security/cve/CVE-2023-4806CVE-2023-4806CVE-2023-4806https://access.redhat.com/security/cve/CVE-2023-4813CVE-2023-4813CVE-2023-4813https://access.redhat.com/security/cve/CVE-2023-4911CVE-2023-4911CVE-2023-4911https://bugzilla.redhat.com/22347122234712https://bugzilla.redhat.com/22377822237782https://bugzilla.redhat.com/22377982237798https://bugzilla.redhat.com/22383522238352https://errata.almalinux.org/9/ALSA-2023-5453.htmlALSA-2023:5453ALSA-2023:5453 tglibc-locale-source-2.34-60.el9_2.7.x86_64.rpmItglibc-devel-2.34-60.el9_2.7.x86_64.rpmtglibc-doc-2.34-60.el9_2.7.noarch.rpmtglibc-utils-2.34-60.el9_2.7.x86_64.rpmItglibc-devel-2.34-60.el9_2.7.i686.rpmtglibc-headers-2.34-60.el9_2.7.x86_64.rpmtglibc-locale-source-2.34-60.el9_2.7.x86_64.rpmItglibc-devel-2.34-60.el9_2.7.x86_64.rpmtglibc-doc-2.34-60.el9_2.7.noarch.rpmtglibc-utils-2.34-60.el9_2.7.x86_64.rpmItglibc-devel-2.34-60.el9_2.7.i686.rpmtglibc-headers-2.34-60.el9_2.7.x86_64.rpmx? :pBBBBBBBBsecurityImportant: python3.11 security update+ihttps://access.redhat.com/errata/RHSA-2023:5456RHSA-2023:5456RHSA-2023:5456 https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5456.htmlALSA-2023:5456ALSA-2023:5456 _~python3.11-libs-3.11.2-2.el9_2.2.i686.rpm~python3.11-3.11.2-2.el9_2.2.x86_64.rpm_~python3.11-libs-3.11.2-2.el9_2.2.x86_64.rpm^~python3.11-devel-3.11.2-2.el9_2.2.x86_64.rpm^~python3.11-devel-3.11.2-2.el9_2.2.i686.rpm~python3.11-tkinter-3.11.2-2.el9_2.2.x86_64.rpm_~python3.11-libs-3.11.2-2.el9_2.2.i686.rpm~python3.11-3.11.2-2.el9_2.2.x86_64.rpm_~python3.11-libs-3.11.2-2.el9_2.2.x86_64.rpm^~python3.11-devel-3.11.2-2.el9_2.2.x86_64.rpm^~python3.11-devel-3.11.2-2.el9_2.2.i686.rpm~python3.11-tkinter-3.11.2-2.el9_2.2.x86_64.rpm=@ {BBBBBBBBBBBBsecurityImportant: ghostscript security updatehttps://access.redhat.com/errata/RHSA-2023:5459RHSA-2023:5459RHSA-2023:5459 https://access.redhat.com/security/cve/CVE-2023-36664CVE-2023-36664CVE-2023-36664https://bugzilla.redhat.com/22177982217798https://errata.almalinux.org/9/ALSA-2023-5459.htmlALSA-2023:5459ALSA-2023:5459 vLghostscript-tools-fonts-9.54.0-10.el9_2.x86_64.rpmtLghostscript-9.54.0-10.el9_2.x86_64.rpmxLghostscript-x11-9.54.0-10.el9_2.x86_64.rpmTLlibgs-9.54.0-10.el9_2.x86_64.rpmMLghostscript-doc-9.54.0-10.el9_2.noarch.rpmwLghostscript-tools-printing-9.54.0-10.el9_2.x86_64.rpmuLghostscript-tools-dvipdf-9.54.0-10.el9_2.x86_64.rpmTLlibgs-9.54.0-10.el9_2.i686.rpmvLghostscript-tools-fonts-9.54.0-10.el9_2.x86_64.rpmtLghostscript-9.54.0-10.el9_2.x86_64.rpmxLghostscript-x11-9.54.0-10.el9_2.x86_64.rpmTLlibgs-9.54.0-10.el9_2.x86_64.rpmMLghostscript-doc-9.54.0-10.el9_2.noarch.rpmwLghostscript-tools-printing-9.54.0-10.el9_2.x86_64.rpmuLghostscript-tools-dvipdf-9.54.0-10.el9_2.x86_64.rpmTLlibgs-9.54.0-10.el9_2.i686.rpmdA JBBBBsecurityImportant: python3.9 security update%https://access.redhat.com/errata/RHSA-2023:5462RHSA-2023:5462RHSA-2023:5462 https://access.redhat.com/security/cve/CVE-2023-40217CVE-2023-40217CVE-2023-40217https://bugzilla.redhat.com/22357892235789https://errata.almalinux.org/9/ALSA-2023-5462.htmlALSA-2023:5462ALSA-2023:5462 gapython-unversioned-command-3.9.16-1.el9_2.2.noarch.rpmRapython3-devel-3.9.16-1.el9_2.2.i686.rpmRapython3-devel-3.9.16-1.el9_2.2.x86_64.rpm1apython3-tkinter-3.9.16-1.el9_2.2.x86_64.rpmgapython-unversioned-command-3.9.16-1.el9_2.2.noarch.rpmRapython3-devel-3.9.16-1.el9_2.2.i686.rpmRapython3-devel-3.9.16-1.el9_2.2.x86_64.rpm1apython3-tkinter-3.9.16-1.el9_2.2.x86_64.rpmOB QBBBBBBBsecurityImportant: nodejs security and bug fix update@Thttps://access.redhat.com/errata/RHSA-2023:5532RHSA-2023:5532RHSA-2023:5532 https://access.redhat.com/security/cve/CVE-2023-32002CVE-2023-32002CVE-2023-32002https://access.redhat.com/security/cve/CVE-2023-32006CVE-2023-32006CVE-2023-32006https://access.redhat.com/security/cve/CVE-2023-32559CVE-2023-32559CVE-2023-32559https://bugzilla.redhat.com/22309482230948https://bugzilla.redhat.com/22309552230955https://bugzilla.redhat.com/22309562230956https://errata.almalinux.org/9/ALSA-2023-5532.htmlALSA-2023:5532ALSA-2023:5532 +nodejs-16.20.2-1.el9_2.x86_64.rpmnodejs-libs-16.20.2-1.el9_2.x86_64.rpmdnodejs-full-i18n-16.20.2-1.el9_2.x86_64.rpmcvnpm-8.19.4-1.16.20.2.1.el9_2.x86_64.rpm<nodejs-docs-16.20.2-1.el9_2.noarch.rpm+nodejs-16.20.2-1.el9_2.x86_64.rpmnodejs-libs-16.20.2-1.el9_2.x86_64.rpmdnodejs-full-i18n-16.20.2-1.el9_2.x86_64.rpmcvnpm-8.19.4-1.16.20.2.1.el9_2.x86_64.rpm<nodejs-docs-16.20.2-1.el9_2.noarch.rpmC [BsecurityImportant: libvpx security updatehttps://access.redhat.com/errata/RHSA-2023:5539RHSA-2023:5539RHSA-2023:5539 https://access.redhat.com/security/cve/CVE-2023-44488CVE-2023-44488CVE-2023-44488https://access.redhat.com/security/cve/CVE-2023-5217CVE-2023-5217CVE-2023-5217https://bugzilla.redhat.com/22411912241191https://bugzilla.redhat.com/22418062241806https://errata.almalinux.org/9/ALSA-2023-5539.htmlALSA-2023:5539ALSA-2023:5539 libvpx-1.9.0-7.el9_2.alma.1.i686.rpmlibvpx-1.9.0-7.el9_2.alma.1.x86_64.rpmlibvpx-1.9.0-7.el9_2.alma.1.i686.rpmlibvpx-1.9.0-7.el9_2.alma.1.x86_64.rpmwD 7_BBBBBBBBBBBBBBBBBBBBBBsecurityImportant: galera and mariadb security updateUhttps://access.redhat.com/errata/RHSA-2023:5684RHSA-2023:5684RHSA-2023:5684 https://access.redhat.com/security/cve/CVE-2022-32081CVE-2022-32081CVE-2022-32081https://access.redhat.com/security/cve/CVE-2022-32082CVE-2022-32082CVE-2022-32082https://access.redhat.com/security/cve/CVE-2022-32084CVE-2022-32084CVE-2022-32084https://access.redhat.com/security/cve/CVE-2022-32089CVE-2022-32089CVE-2022-32089https://access.redhat.com/security/cve/CVE-2022-32091CVE-2022-32091CVE-2022-32091https://access.redhat.com/security/cve/CVE-2022-38791CVE-2022-38791CVE-2022-38791https://access.redhat.com/security/cve/CVE-2022-47015CVE-2022-47015CVE-2022-47015https://access.redhat.com/security/cve/CVE-2023-5157CVE-2023-5157CVE-2023-5157https://bugzilla.redhat.com/21060282106028https://bugzilla.redhat.com/21060302106030https://bugzilla.redhat.com/21060342106034https://bugzilla.redhat.com/21060352106035https://bugzilla.redhat.com/21060422106042https://bugzilla.redhat.com/21301052130105https://bugzilla.redhat.com/21636092163609https://bugzilla.redhat.com/22402462240246https://errata.almalinux.org/9/ALSA-2023-5684.htmlALSA-2023:5684ALSA-2023:5684 `5mariadb-embedded-10.5.22-1.el9_2.alma.1.x86_64.rpme5mariadb-10.5.22-1.el9_2.alma.1.x86_64.rpmc5mariadb-oqgraph-engine-10.5.22-1.el9_2.alma.1.x86_64.rpmd5mariadb-pam-10.5.22-1.el9_2.alma.1.x86_64.rpmu&galera-26.4.14-1.el9_2.alma.1.x86_64.rpmf5mariadb-server-galera-10.5.22-1.el9_2.alma.1.x86_64.rpmg5mariadb-server-utils-10.5.22-1.el9_2.alma.1.x86_64.rpm_5mariadb-common-10.5.22-1.el9_2.alma.1.x86_64.rpm^5mariadb-backup-10.5.22-1.el9_2.alma.1.x86_64.rpmb5mariadb-gssapi-server-10.5.22-1.el9_2.alma.1.x86_64.rpme5mariadb-server-10.5.22-1.el9_2.alma.1.x86_64.rpma5mariadb-errmsg-10.5.22-1.el9_2.alma.1.x86_64.rpm `5mariadb-embedded-10.5.22-1.el9_2.alma.1.x86_64.rpme5mariadb-10.5.22-1.el9_2.alma.1.x86_64.rpmc5mariadb-oqgraph-engine-10.5.22-1.el9_2.alma.1.x86_64.rpmd5mariadb-pam-10.5.22-1.el9_2.alma.1.x86_64.rpmu&galera-26.4.14-1.el9_2.alma.1.x86_64.rpmf5mariadb-server-galera-10.5.22-1.el9_2.alma.1.x86_64.rpmg5mariadb-server-utils-10.5.22-1.el9_2.alma.1.x86_64.rpm_5mariadb-common-10.5.22-1.el9_2.alma.1.x86_64.rpm^5mariadb-backup-10.5.22-1.el9_2.alma.1.x86_64.rpmb5mariadb-gssapi-server-10.5.22-1.el9_2.alma.1.x86_64.rpme5mariadb-server-10.5.22-1.el9_2.alma.1.x86_64.rpma5mariadb-errmsg-10.5.22-1.el9_2.alma.1.x86_64.rpm;E xBBBBBBBBBBBsecurityImportant: bind security updatemEhttps://access.redhat.com/errata/RHSA-2023:5689RHSA-2023:5689RHSA-2023:5689 https://access.redhat.com/security/cve/CVE-2023-3341CVE-2023-3341CVE-2023-3341https://bugzilla.redhat.com/22396212239621https://errata.almalinux.org/9/ALSA-2023-5689.htmlALSA-2023:5689ALSA-2023:5689 tbind-license-9.16.23-11.el9_2.2.noarch.rpmtpython3-bind-9.16.23-11.el9_2.2.noarch.rpmtbind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpmFtbind-chroot-9.16.23-11.el9_2.2.x86_64.rpmGtbind-dnssec-utils-9.16.23-11.el9_2.2.x86_64.rpmItbind-utils-9.16.23-11.el9_2.2.x86_64.rpmEtbind-9.16.23-11.el9_2.2.x86_64.rpmHtbind-libs-9.16.23-11.el9_2.2.x86_64.rpmtbind-license-9.16.23-11.el9_2.2.noarch.rpmtpython3-bind-9.16.23-11.el9_2.2.noarch.rpmtbind-dnssec-doc-9.16.23-11.el9_2.2.noarch.rpmFtbind-chroot-9.16.23-11.el9_2.2.x86_64.rpmGtbind-dnssec-utils-9.16.23-11.el9_2.2.x86_64.rpmItbind-utils-9.16.23-11.el9_2.2.x86_64.rpmEtbind-9.16.23-11.el9_2.2.x86_64.rpmHtbind-libs-9.16.23-11.el9_2.2.x86_64.rpm F FBBBBBBBBBBBBBBsecurityImportant: dotnet6.0 security update2ohttps://access.redhat.com/errata/RHSA-2023:5708RHSA-2023:5708RHSA-2023:5708 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5708.htmlALSA-2023:5708ALSA-2023:5708 %&dotnet-sdk-6.0-6.0.123-1.el9_2.x86_64.rpm$8dotnet-runtime-6.0-6.0.23-1.el9_2.x86_64.rpm'&dotnet-templates-6.0-6.0.123-1.el9_2.x86_64.rpm 8aspnetcore-runtime-6.0-6.0.23-1.el9_2.x86_64.rpm"8dotnet-apphost-pack-6.0-6.0.23-1.el9_2.x86_64.rpm#8dotnet-hostfxr-6.0-6.0.23-1.el9_2.x86_64.rpm!8aspnetcore-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpm&8dotnet-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpm%&dotnet-sdk-6.0-6.0.123-1.el9_2.x86_64.rpm$8dotnet-runtime-6.0-6.0.23-1.el9_2.x86_64.rpm'&dotnet-templates-6.0-6.0.123-1.el9_2.x86_64.rpm 8aspnetcore-runtime-6.0-6.0.23-1.el9_2.x86_64.rpm"8dotnet-apphost-pack-6.0-6.0.23-1.el9_2.x86_64.rpm#8dotnet-hostfxr-6.0-6.0.23-1.el9_2.x86_64.rpm!8aspnetcore-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpm&8dotnet-targeting-pack-6.0-6.0.23-1.el9_2.x86_64.rpmrG 'WBBBBBBBBBBBBBBsecurityModerate: nginx security update!Qhttps://access.redhat.com/errata/RHSA-2023:5711RHSA-2023:5711RHSA-2023:5711 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5711.htmlALSA-2023:5711ALSA-2023:5711 Vnginx-all-modules-1.20.1-14.el9_2.1.alma.1.noarch.rpmRVnginx-mod-mail-1.20.1-14.el9_2.1.alma.1.x86_64.rpmNVnginx-core-1.20.1-14.el9_2.1.alma.1.x86_64.rpmPVnginx-mod-http-perl-1.20.1-14.el9_2.1.alma.1.x86_64.rpmOVnginx-mod-http-image-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpmVnginx-filesystem-1.20.1-14.el9_2.1.alma.1.noarch.rpmSVnginx-mod-stream-1.20.1-14.el9_2.1.alma.1.x86_64.rpmVnginx-1.20.1-14.el9_2.1.alma.1.x86_64.rpmQVnginx-mod-http-xslt-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpm Vnginx-all-modules-1.20.1-14.el9_2.1.alma.1.noarch.rpmRVnginx-mod-mail-1.20.1-14.el9_2.1.alma.1.x86_64.rpmNVnginx-core-1.20.1-14.el9_2.1.alma.1.x86_64.rpmPVnginx-mod-http-perl-1.20.1-14.el9_2.1.alma.1.x86_64.rpmOVnginx-mod-http-image-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpmVnginx-filesystem-1.20.1-14.el9_2.1.alma.1.noarch.rpmSVnginx-mod-stream-1.20.1-14.el9_2.1.alma.1.x86_64.rpmVnginx-1.20.1-14.el9_2.1.alma.1.x86_64.rpmQVnginx-mod-http-xslt-filter-1.20.1-14.el9_2.1.alma.1.x86_64.rpmHH 4hBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updaterEhttps://access.redhat.com/errata/RHSA-2023:5733RHSA-2023:5733RHSA-2023:5733 https://access.redhat.com/security/cve/CVE-2022-40433CVE-2022-40433CVE-2022-40433https://access.redhat.com/security/cve/CVE-2023-22067CVE-2023-22067CVE-2023-22067https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22377092237709https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22436372243637https://errata.almalinux.org/9/ALSA-2023-5733.htmlALSA-2023:5733ALSA-2023:5733 f[java-1.8.0-openjdk-src-1.8.0.392.b08-3.el9.x86_64.rpmC[java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9.noarch.rpme[java-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9.x86_64.rpmb[java-1.8.0-openjdk-1.8.0.392.b08-3.el9.x86_64.rpmc[java-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9.x86_64.rpmB[java-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9.noarch.rpmd[java-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9.x86_64.rpmf[java-1.8.0-openjdk-src-1.8.0.392.b08-3.el9.x86_64.rpmC[java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-3.el9.noarch.rpme[java-1.8.0-openjdk-headless-1.8.0.392.b08-3.el9.x86_64.rpmb[java-1.8.0-openjdk-1.8.0.392.b08-3.el9.x86_64.rpmc[java-1.8.0-openjdk-demo-1.8.0.392.b08-3.el9.x86_64.rpmB[java-1.8.0-openjdk-javadoc-1.8.0.392.b08-3.el9.noarch.rpmd[java-1.8.0-openjdk-devel-1.8.0.392.b08-3.el9.x86_64.rpm(I uBBBBBBBBBBsecurityImportant: go-toolset and golang security and bug fix update7https://access.redhat.com/errata/RHSA-2023:5738RHSA-2023:5738RHSA-2023:5738 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39325CVE-2023-39325CVE-2023-39325https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22428032242803https://bugzilla.redhat.com/22432962243296https://errata.almalinux.org/9/ALSA-2023-5738.htmlALSA-2023:5738ALSA-2023:5738 ngolang-src-1.19.13-1.el9_2.noarch.rpm@golang-1.19.13-1.el9_2.x86_64.rpmAgolang-bin-1.19.13-1.el9_2.x86_64.rpmlgolang-docs-1.19.13-1.el9_2.noarch.rpmEgo-toolset-1.19.13-1.el9_2.x86_64.rpm8golang-race-1.19.13-1.el9_2.x86_64.rpmmgolang-misc-1.19.13-1.el9_2.noarch.rpmogolang-tests-1.19.13-1.el9_2.noarch.rpmngolang-src-1.19.13-1.el9_2.noarch.rpm@golang-1.19.13-1.el9_2.x86_64.rpmAgolang-bin-1.19.13-1.el9_2.x86_64.rpmlgolang-docs-1.19.13-1.el9_2.noarch.rpmEgo-toolset-1.19.13-1.el9_2.x86_64.rpm8golang-race-1.19.13-1.el9_2.x86_64.rpmmgolang-misc-1.19.13-1.el9_2.noarch.rpmogolang-tests-1.19.13-1.el9_2.noarch.rpm=J BBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security and bug fix update=&https://access.redhat.com/errata/RHSA-2023:5744RHSA-2023:5744RHSA-2023:5744 https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://errata.almalinux.org/9/ALSA-2023-5744.htmlALSA-2023:5744ALSA-2023:5744 *java-11-openjdk-javadoc-zip-11.0.21.0.9-2.el9.x86_64.rpm'java-11-openjdk-devel-11.0.21.0.9-2.el9.x86_64.rpm&java-11-openjdk-demo-11.0.21.0.9-2.el9.x86_64.rpm-java-11-openjdk-static-libs-11.0.21.0.9-2.el9.x86_64.rpm)java-11-openjdk-javadoc-11.0.21.0.9-2.el9.x86_64.rpm+java-11-openjdk-jmods-11.0.21.0.9-2.el9.x86_64.rpm(java-11-openjdk-headless-11.0.21.0.9-2.el9.x86_64.rpm%java-11-openjdk-11.0.21.0.9-2.el9.x86_64.rpm,java-11-openjdk-src-11.0.21.0.9-2.el9.x86_64.rpm *java-11-openjdk-javadoc-zip-11.0.21.0.9-2.el9.x86_64.rpm'java-11-openjdk-devel-11.0.21.0.9-2.el9.x86_64.rpm&java-11-openjdk-demo-11.0.21.0.9-2.el9.x86_64.rpm-java-11-openjdk-static-libs-11.0.21.0.9-2.el9.x86_64.rpm)java-11-openjdk-javadoc-11.0.21.0.9-2.el9.x86_64.rpm+java-11-openjdk-jmods-11.0.21.0.9-2.el9.x86_64.rpm(java-11-openjdk-headless-11.0.21.0.9-2.el9.x86_64.rpm%java-11-openjdk-11.0.21.0.9-2.el9.x86_64.rpm,java-11-openjdk-src-11.0.21.0.9-2.el9.x86_64.rpm˶ K )UBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security updatecohttps://access.redhat.com/errata/RHSA-2023:5749RHSA-2023:5749RHSA-2023:5749 https://access.redhat.com/security/cve/CVE-2023-44487CVE-2023-44487CVE-2023-44487https://bugzilla.redhat.com/22428032242803https://errata.almalinux.org/9/ALSA-2023-5749.htmlALSA-2023:5749ALSA-2023:5749 g1dotnet-hostfxr-7.0-7.0.12-1.el9_2.x86_64.rpm inetstandard-targeting-pack-2.1-7.0.112-1.el9_2.x86_64.rpmh1dotnet-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmiidotnet-sdk-7.0-7.0.112-1.el9_2.x86_64.rpme1aspnetcore-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpmd1aspnetcore-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmkidotnet-templates-7.0-7.0.112-1.el9_2.x86_64.rpm1dotnet-host-7.0.12-1.el9_2.x86_64.rpmj1dotnet-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpmf1dotnet-apphost-pack-7.0-7.0.12-1.el9_2.x86_64.rpm g1dotnet-hostfxr-7.0-7.0.12-1.el9_2.x86_64.rpm inetstandard-targeting-pack-2.1-7.0.112-1.el9_2.x86_64.rpmh1dotnet-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmiidotnet-sdk-7.0-7.0.112-1.el9_2.x86_64.rpme1aspnetcore-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpmd1aspnetcore-runtime-7.0-7.0.12-1.el9_2.x86_64.rpmkidotnet-templates-7.0-7.0.112-1.el9_2.x86_64.rpm1dotnet-host-7.0.12-1.el9_2.x86_64.rpmj1dotnet-targeting-pack-7.0-7.0.12-1.el9_2.x86_64.rpmf1dotnet-apphost-pack-7.0-7.0.12-1.el9_2.x86_64.rpmL thunderbird-115.4.1-1.el9_2.alma.x86_64.rpm9>thunderbird-115.4.1-1.el9_2.alma.x86_64.rpm<Y ~BBBBBBBBBBBBBBsecurityModerate: .NET 6.0 security updatezQhttps://access.redhat.com/errata/RHSA-2023:6242RHSA-2023:6242RHSA-2023:6242 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6242.htmlALSA-2023:6242ALSA-2023:6242 ''dotnet-templates-6.0-6.0.124-1.el9_2.x86_64.rpm&9dotnet-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpm 9aspnetcore-runtime-6.0-6.0.24-1.el9_2.x86_64.rpm"9dotnet-apphost-pack-6.0-6.0.24-1.el9_2.x86_64.rpm!9aspnetcore-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpm#9dotnet-hostfxr-6.0-6.0.24-1.el9_2.x86_64.rpm$9dotnet-runtime-6.0-6.0.24-1.el9_2.x86_64.rpm%'dotnet-sdk-6.0-6.0.124-1.el9_2.x86_64.rpm''dotnet-templates-6.0-6.0.124-1.el9_2.x86_64.rpm&9dotnet-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpm 9aspnetcore-runtime-6.0-6.0.24-1.el9_2.x86_64.rpm"9dotnet-apphost-pack-6.0-6.0.24-1.el9_2.x86_64.rpm!9aspnetcore-targeting-pack-6.0-6.0.24-1.el9_2.x86_64.rpm#9dotnet-hostfxr-6.0-6.0.24-1.el9_2.x86_64.rpm$9dotnet-runtime-6.0-6.0.24-1.el9_2.x86_64.rpm%'dotnet-sdk-6.0-6.0.124-1.el9_2.x86_64.rpmZ^ #OBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 7.0 security updateKQhttps://access.redhat.com/errata/RHSA-2023:6246RHSA-2023:6246RHSA-2023:6246 https://access.redhat.com/security/cve/CVE-2023-36799CVE-2023-36799CVE-2023-36799https://bugzilla.redhat.com/22373172237317https://errata.almalinux.org/9/ALSA-2023-6246.htmlALSA-2023:6246ALSA-2023:6246 g2dotnet-hostfxr-7.0-7.0.13-1.el9_2.x86_64.rpmijdotnet-sdk-7.0-7.0.113-1.el9_2.x86_64.rpme2aspnetcore-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpmf2dotnet-apphost-pack-7.0-7.0.13-1.el9_2.x86_64.rpmj2dotnet-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpmh2dotnet-runtime-7.0-7.0.13-1.el9_2.x86_64.rpmkjdotnet-templates-7.0-7.0.113-1.el9_2.x86_64.rpm2dotnet-host-7.0.13-1.el9_2.x86_64.rpmd2aspnetcore-runtime-7.0-7.0.13-1.el9_2.x86_64.rpm jnetstandard-targeting-pack-2.1-7.0.113-1.el9_2.x86_64.rpm g2dotnet-hostfxr-7.0-7.0.13-1.el9_2.x86_64.rpmijdotnet-sdk-7.0-7.0.113-1.el9_2.x86_64.rpme2aspnetcore-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpmf2dotnet-apphost-pack-7.0-7.0.13-1.el9_2.x86_64.rpmj2dotnet-targeting-pack-7.0-7.0.13-1.el9_2.x86_64.rpmh2dotnet-runtime-7.0-7.0.13-1.el9_2.x86_64.rpmkjdotnet-templates-7.0-7.0.113-1.el9_2.x86_64.rpm2dotnet-host-7.0.13-1.el9_2.x86_64.rpmd2aspnetcore-runtime-7.0-7.0.13-1.el9_2.x86_64.rpm jnetstandard-targeting-pack-2.1-7.0.113-1.el9_2.x86_64.rpmL[ 2dBBBBBBBBBBBBsecurityImportant: ghostscript security updatehttps://access.redhat.com/errata/RHSA-2023:6265RHSA-2023:6265RHSA-2023:6265 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6265.htmlALSA-2023:6265ALSA-2023:6265 TMlibgs-9.54.0-11.el9_2.x86_64.rpmvMghostscript-tools-fonts-9.54.0-11.el9_2.x86_64.rpmTMlibgs-9.54.0-11.el9_2.i686.rpmxMghostscript-x11-9.54.0-11.el9_2.x86_64.rpmMMghostscript-doc-9.54.0-11.el9_2.noarch.rpmtMghostscript-9.54.0-11.el9_2.x86_64.rpmuMghostscript-tools-dvipdf-9.54.0-11.el9_2.x86_64.rpmwMghostscript-tools-printing-9.54.0-11.el9_2.x86_64.rpmTMlibgs-9.54.0-11.el9_2.x86_64.rpmvMghostscript-tools-fonts-9.54.0-11.el9_2.x86_64.rpmTMlibgs-9.54.0-11.el9_2.i686.rpmxMghostscript-x11-9.54.0-11.el9_2.x86_64.rpmMMghostscript-doc-9.54.0-11.el9_2.noarch.rpmtMghostscript-9.54.0-11.el9_2.x86_64.rpmuMghostscript-tools-dvipdf-9.54.0-11.el9_2.x86_64.rpmwMghostscript-tools-printing-9.54.0-11.el9_2.x86_64.rpm\ 5ssecurityCritical: squid security update;1https://access.redhat.com/errata/RHSA-2023:6266RHSA-2023:6266RHSA-2023:6266 https://access.redhat.com/security/cve/CVE-2023-46846CVE-2023-46846CVE-2023-46846https://access.redhat.com/security/cve/CVE-2023-46847CVE-2023-46847CVE-2023-46847https://access.redhat.com/security/cve/CVE-2023-46848CVE-2023-46848CVE-2023-46848https://bugzilla.redhat.com/22459102245910https://bugzilla.redhat.com/22459162245916https://bugzilla.redhat.com/22459192245919https://errata.almalinux.org/9/ALSA-2023-6266.htmlALSA-2023:6266ALSA-2023:6266 X~squid-5.5-5.el9_2.1.x86_64.rpmX~squid-5.5-5.el9_2.1.x86_64.rpmT] 8vsecurityModerate: python3.11-pip security updateN'https://access.redhat.com/errata/RHSA-2023:6324RHSA-2023:6324RHSA-2023:6324 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6324.htmlALSA-2023:6324ALSA-2023:6324 hlpython3.11-pip-wheel-22.3.1-4.el9.noarch.rpmglpython3.11-pip-22.3.1-4.el9.noarch.rpmhlpython3.11-pip-wheel-22.3.1-4.el9.noarch.rpmglpython3.11-pip-22.3.1-4.el9.noarch.rpm&^ ;ysecurityModerate: edk2 security, bug fix, and enhancement updateuBhttps://access.redhat.com/errata/RHSA-2023:6330RHSA-2023:6330RHSA-2023:6330 https://access.redhat.com/security/cve/CVE-2019-14560CVE-2019-14560CVE-2019-14560https://access.redhat.com/security/cve/CVE-2023-2650CVE-2023-2650CVE-2023-2650https://bugzilla.redhat.com/18580381858038https://bugzilla.redhat.com/22079472207947https://errata.almalinux.org/9/ALSA-2023-6330.htmlALSA-2023:6330ALSA-2023:6330 seedk2-aarch64-20230524-3.el9.noarch.rpmHeedk2-ovmf-20230524-3.el9.noarch.rpmseedk2-aarch64-20230524-3.el9.noarch.rpmHeedk2-ovmf-20230524-3.el9.noarch.rpm_ |BBBBBBBBBBsecurityModerate: xorg-x11-server security and bug fix update7https://access.redhat.com/errata/RHSA-2023:6340RHSA-2023:6340RHSA-2023:6340 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6340.htmlALSA-2023:6340ALSA-2023:6340  xorg-x11-server-Xnest-1.20.11-19.el9.x86_64.rpm$xorg-x11-server-common-1.20.11-19.el9.x86_64.rpm!xorg-x11-server-Xorg-1.20.11-19.el9.x86_64.rpmxorg-x11-server-Xdmx-1.20.11-19.el9.x86_64.rpm"xorg-x11-server-Xvfb-1.20.11-19.el9.x86_64.rpmxorg-x11-server-Xephyr-1.20.11-19.el9.x86_64.rpm xorg-x11-server-Xnest-1.20.11-19.el9.x86_64.rpm$xorg-x11-server-common-1.20.11-19.el9.x86_64.rpm!xorg-x11-server-Xorg-1.20.11-19.el9.x86_64.rpmxorg-x11-server-Xdmx-1.20.11-19.el9.x86_64.rpm"xorg-x11-server-Xvfb-1.20.11-19.el9.x86_64.rpmxorg-x11-server-Xephyr-1.20.11-19.el9.x86_64.rpm` IsecurityModerate: xorg-x11-server-Xwayland security, bug fix, and enhancement update; https://access.redhat.com/errata/RHSA-2023:6341RHSA-2023:6341RHSA-2023:6341 https://access.redhat.com/security/cve/CVE-2023-1393CVE-2023-1393CVE-2023-1393https://bugzilla.redhat.com/21802882180288https://errata.almalinux.org/9/ALSA-2023-6341.htmlALSA-2023:6341ALSA-2023:6341 #xorg-x11-server-Xwayland-22.1.9-2.el9.x86_64.rpm#xorg-x11-server-Xwayland-22.1.9-2.el9.x86_64.rpmra LBsecurityModerate: LibRaw security updateHGhttps://access.redhat.com/errata/RHSA-2023:6343RHSA-2023:6343RHSA-2023:6343 https://access.redhat.com/security/cve/CVE-2021-32142CVE-2021-32142CVE-2021-32142https://bugzilla.redhat.com/21720042172004https://errata.almalinux.org/9/ALSA-2023-6343.htmlALSA-2023:6343ALSA-2023:6343 XjLibRaw-0.20.2-6.el9.x86_64.rpmXjLibRaw-0.20.2-6.el9.i686.rpmXjLibRaw-0.20.2-6.el9.x86_64.rpmXjLibRaw-0.20.2-6.el9.i686.rpm b PBBsecurityModerate: toolbox security and bug fix updatebhttps://access.redhat.com/errata/RHSA-2023:6346RHSA-2023:6346RHSA-2023:6346 https://access.redhat.com/security/cve/CVE-2022-3064CVE-2022-3064CVE-2022-3064https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21630372163037https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6346.htmlALSA-2023:6346ALSA-2023:6346 q1toolbox-0.0.99.4-6.el9_3.x86_64.rpmr1toolbox-tests-0.0.99.4-6.el9_3.x86_64.rpmq1toolbox-0.0.99.4-6.el9_3.x86_64.rpmr1toolbox-tests-0.0.99.4-6.el9_3.x86_64.rpm c UBBsecurityModerate: skopeo security updateqRhttps://access.redhat.com/errata/RHSA-2023:6363RHSA-2023:6363RHSA-2023:6363 https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24537CVE-2023-24537CVE-2023-24537https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21844842184484https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6363.htmlALSA-2023:6363ALSA-2023:6363 <}skopeo-tests-1.13.3-1.el9.x86_64.rpm;}skopeo-1.13.3-1.el9.x86_64.rpm<}skopeo-tests-1.13.3-1.el9.x86_64.rpm;}skopeo-1.13.3-1.el9.x86_64.rpm d ZsecurityModerate: mod_auth_openidc security and bug fix updateChttps://access.redhat.com/errata/RHSA-2023:6365RHSA-2023:6365RHSA-2023:6365 https://access.redhat.com/security/cve/CVE-2022-23527CVE-2022-23527CVE-2022-23527https://access.redhat.com/security/cve/CVE-2023-28625CVE-2023-28625CVE-2023-28625https://bugzilla.redhat.com/21536552153655https://bugzilla.redhat.com/21841182184118https://errata.almalinux.org/9/ALSA-2023-6365.htmlALSA-2023:6365ALSA-2023:6365 mod_auth_openidc-2.4.9.4-4.el9.x86_64.rpmmod_auth_openidc-2.4.9.4-4.el9.x86_64.rpmse ]BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security, bug fix, and enhancement updateXrhttps://access.redhat.com/errata/RHSA-2023:6368RHSA-2023:6368RHSA-2023:6368 https://access.redhat.com/security/cve/CVE-2023-2680CVE-2023-2680CVE-2023-2680https://bugzilla.redhat.com/22033872203387https://errata.almalinux.org/9/ALSA-2023-6368.htmlALSA-2023:6368ALSA-2023:6368 Zqemu-kvm-block-rbd-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-ui-egl-headless-8.0.0-16.el9_3.alma.1.x86_64.rpm Zqemu-kvm-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-pr-helper-8.0.0-16.el9_3.alma.1.x86_64.rpm Zqemu-guest-agent-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-device-display-virtio-gpu-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-common-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-audio-pa-8.0.0-16.el9_3.alma.1.x86_64.rpm|Zqemu-kvm-block-blkio-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-device-usb-redirect-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-docs-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-device-display-virtio-gpu-pci-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-device-usb-host-8.0.0-16.el9_3.alma.1.x86_64.rpm Zqemu-img-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-ui-opengl-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-block-curl-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-device-display-virtio-vga-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-tools-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-core-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-block-rbd-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-ui-egl-headless-8.0.0-16.el9_3.alma.1.x86_64.rpm Zqemu-kvm-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-pr-helper-8.0.0-16.el9_3.alma.1.x86_64.rpm Zqemu-guest-agent-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-device-display-virtio-gpu-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-common-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-audio-pa-8.0.0-16.el9_3.alma.1.x86_64.rpm|Zqemu-kvm-block-blkio-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-device-usb-redirect-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-docs-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-device-display-virtio-gpu-pci-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-device-usb-host-8.0.0-16.el9_3.alma.1.x86_64.rpm Zqemu-img-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-ui-opengl-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-block-curl-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-device-display-virtio-vga-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-tools-8.0.0-16.el9_3.alma.1.x86_64.rpmZqemu-kvm-core-8.0.0-16.el9_3.alma.1.x86_64.rpm"f DBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qt5 security and bug fix updateJ https://access.redhat.com/errata/RHSA-2023:6369RHSA-2023:6369RHSA-2023:6369 https://access.redhat.com/security/cve/CVE-2023-32573CVE-2023-32573CVE-2023-32573https://access.redhat.com/security/cve/CVE-2023-33285CVE-2023-33285CVE-2023-33285https://access.redhat.com/security/cve/CVE-2023-34410CVE-2023-34410CVE-2023-34410https://access.redhat.com/security/cve/CVE-2023-37369CVE-2023-37369CVE-2023-37369https://access.redhat.com/security/cve/CVE-2023-38197CVE-2023-38197CVE-2023-38197https://bugzilla.redhat.com/22081352208135https://bugzilla.redhat.com/22094882209488https://bugzilla.redhat.com/22127472212747https://bugzilla.redhat.com/22227672222767https://bugzilla.redhat.com/22321732232173https://errata.almalinux.org/9/ALSA-2023-6369.htmlALSA-2023:6369ALSA-2023:6369 'qt5-qtbase-postgresql-5.15.9-7.el9.i686.rpm"qt5-qtbase-devel-5.15.9-7.el9.i686.rpm$qt5-qtbase-gui-5.15.9-7.el9.x86_64.rpm!qt5-qtbase-5.15.9-7.el9.i686.rpmVqt5-5.15.9-1.el9.noarch.rpm%qt5-qtbase-mysql-5.15.9-7.el9.i686.rpm&qt5-qtbase-odbc-5.15.9-7.el9.x86_64.rpm&qt5-qtbase-odbc-5.15.9-7.el9.i686.rpm(qt5-qtbase-private-devel-5.15.9-7.el9.i686.rpmWqt5-rpm-macros-5.15.9-1.el9.noarch.rpm'qt5-qtbase-postgresql-5.15.9-7.el9.x86_64.rpmqt5-qtbase-common-5.15.9-7.el9.noarch.rpm$qt5-qtbase-gui-5.15.9-7.el9.i686.rpmXqt5-srpm-macros-5.15.9-1.el9.noarch.rpm!qt5-qtbase-5.15.9-7.el9.x86_64.rpm(qt5-qtbase-private-devel-5.15.9-7.el9.x86_64.rpm%qt5-qtbase-mysql-5.15.9-7.el9.x86_64.rpm#qt5-qtbase-examples-5.15.9-7.el9.i686.rpm"qt5-qtbase-devel-5.15.9-7.el9.x86_64.rpm#qt5-qtbase-examples-5.15.9-7.el9.x86_64.rpm'qt5-qtbase-postgresql-5.15.9-7.el9.i686.rpm"qt5-qtbase-devel-5.15.9-7.el9.i686.rpm$qt5-qtbase-gui-5.15.9-7.el9.x86_64.rpm!qt5-qtbase-5.15.9-7.el9.i686.rpmVqt5-5.15.9-1.el9.noarch.rpm%qt5-qtbase-mysql-5.15.9-7.el9.i686.rpm&qt5-qtbase-odbc-5.15.9-7.el9.x86_64.rpm&qt5-qtbase-odbc-5.15.9-7.el9.i686.rpm(qt5-qtbase-private-devel-5.15.9-7.el9.i686.rpmWqt5-rpm-macros-5.15.9-1.el9.noarch.rpm'qt5-qtbase-postgresql-5.15.9-7.el9.x86_64.rpmqt5-qtbase-common-5.15.9-7.el9.noarch.rpm$qt5-qtbase-gui-5.15.9-7.el9.i686.rpmXqt5-srpm-macros-5.15.9-1.el9.noarch.rpm!qt5-qtbase-5.15.9-7.el9.x86_64.rpm(qt5-qtbase-private-devel-5.15.9-7.el9.x86_64.rpm%qt5-qtbase-mysql-5.15.9-7.el9.x86_64.rpm#qt5-qtbase-examples-5.15.9-7.el9.i686.rpm"qt5-qtbase-devel-5.15.9-7.el9.x86_64.rpm#qt5-qtbase-examples-5.15.9-7.el9.x86_64.rpmfg "!securityModerate: cloud-init security, bug fix, and enhancement updateghttps://access.redhat.com/errata/RHSA-2023:6371RHSA-2023:6371RHSA-2023:6371 https://access.redhat.com/security/cve/CVE-2023-1786CVE-2023-1786CVE-2023-1786https://bugzilla.redhat.com/21900792190079https://errata.almalinux.org/9/ALSA-2023-6371.htmlALSA-2023:6371ALSA-2023:6371  ,cloud-init-23.1.1-11.el9.alma.1.noarch.rpm ,cloud-init-23.1.1-11.el9.alma.1.noarch.rpm?h ,cBBBBBBBsecurityLow: gdb security update3fDhttps://access.redhat.com/errata/RHSA-2023:6372RHSA-2023:6372RHSA-2023:6372 https://access.redhat.com/security/cve/CVE-2021-3826CVE-2021-3826CVE-2021-3826https://bugzilla.redhat.com/21226272122627https://errata.almalinux.org/9/ALSA-2023-6372.htmlALSA-2023:6372ALSA-2023:6372 clgdb-10.2-11.el9.x86_64.rpmelgdb-headless-10.2-11.el9.x86_64.rpm_lgdb-doc-10.2-11.el9.noarch.rpmdlgdb-gdbserver-10.2-11.el9.x86_64.rpmflgdb-minimal-10.2-11.el9.x86_64.rpmclgdb-10.2-11.el9.x86_64.rpmelgdb-headless-10.2-11.el9.x86_64.rpm_lgdb-doc-10.2-11.el9.noarch.rpmdlgdb-gdbserver-10.2-11.el9.x86_64.rpmflgdb-minimal-10.2-11.el9.x86_64.rpmei /msecurityModerate: runc security update*Y https://access.redhat.com/errata/RHSA-2023:6380RHSA-2023:6380RHSA-2023:6380 https://access.redhat.com/security/cve/CVE-2021-43784CVE-2021-43784CVE-2021-43784https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2023-25809CVE-2023-25809CVE-2023-25809https://access.redhat.com/security/cve/CVE-2023-27561CVE-2023-27561CVE-2023-27561https://access.redhat.com/security/cve/CVE-2023-28642CVE-2023-28642CVE-2023-28642https://bugzilla.redhat.com/20294392029439https://bugzilla.redhat.com/21757212175721https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21828832182883https://bugzilla.redhat.com/21828842182884https://errata.almalinux.org/9/ALSA-2023-6380.htmlALSA-2023:6380ALSA-2023:6380 W]runc-1.1.9-1.el9.x86_64.rpmW]runc-1.1.9-1.el9.x86_64.rpmtj 4pBBsecurityModerate: liblouis security updateIhttps://access.redhat.com/errata/RHSA-2023:6385RHSA-2023:6385RHSA-2023:6385 https://access.redhat.com/security/cve/CVE-2023-26767CVE-2023-26767CVE-2023-26767https://access.redhat.com/security/cve/CVE-2023-26768CVE-2023-26768CVE-2023-26768https://access.redhat.com/security/cve/CVE-2023-26769CVE-2023-26769CVE-2023-26769https://bugzilla.redhat.com/21811352181135https://bugzilla.redhat.com/21811392181139https://bugzilla.redhat.com/21811432181143https://errata.almalinux.org/9/ALSA-2023-6385.htmlALSA-2023:6385ALSA-2023:6385 ! liblouis-3.16.1-5.el9.i686.rpm! liblouis-3.16.1-5.el9.x86_64.rpm^ python3-louis-3.16.1-5.el9.noarch.rpm! liblouis-3.16.1-5.el9.i686.rpm! liblouis-3.16.1-5.el9.x86_64.rpm^ python3-louis-3.16.1-5.el9.noarch.rpmRk 7usecurityModerate: containernetworking-plugins security and bug fix updateLLhttps://access.redhat.com/errata/RHSA-2023:6402RHSA-2023:6402RHSA-2023:6402 https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6402.htmlALSA-2023:6402ALSA-2023:6402 JTcontainernetworking-plugins-1.3.0-4.el9.x86_64.rpmJTcontainernetworking-plugins-1.3.0-4.el9.x86_64.rpmtl xBBBBBBBBBBBBBBBBBBsecurityModerate: httpd and mod_http2 security, bug fix, and enhancement updatemhttps://access.redhat.com/errata/RHSA-2023:6403RHSA-2023:6403RHSA-2023:6403 https://access.redhat.com/security/cve/CVE-2023-27522CVE-2023-27522CVE-2023-27522https://bugzilla.redhat.com/21762112176211https://errata.almalinux.org/9/ALSA-2023-6403.htmlALSA-2023:6403ALSA-2023:6403 7]mod_ldap-2.4.57-5.el9.x86_64.rpm`]httpd-filesystem-2.4.57-5.el9.noarch.rpm#]httpd-devel-2.4.57-5.el9.x86_64.rpm!]httpd-2.4.57-5.el9.x86_64.rpm9nmod_proxy_html-2.4.57-5.el9.x86_64.rpm:]mod_session-2.4.57-5.el9.x86_64.rpm8]mod_lua-2.4.57-5.el9.x86_64.rpma]httpd-manual-2.4.57-5.el9.noarch.rpm;nmod_ssl-2.4.57-5.el9.x86_64.rpm$]httpd-tools-2.4.57-5.el9.x86_64.rpm"]httpd-core-2.4.57-5.el9.x86_64.rpm 7]mod_ldap-2.4.57-5.el9.x86_64.rpm`]httpd-filesystem-2.4.57-5.el9.noarch.rpm#]httpd-devel-2.4.57-5.el9.x86_64.rpm!]httpd-2.4.57-5.el9.x86_64.rpm9nmod_proxy_html-2.4.57-5.el9.x86_64.rpm:]mod_session-2.4.57-5.el9.x86_64.rpm8]mod_lua-2.4.57-5.el9.x86_64.rpma]httpd-manual-2.4.57-5.el9.noarch.rpm;nmod_ssl-2.4.57-5.el9.x86_64.rpm$]httpd-tools-2.4.57-5.el9.x86_64.rpm"]httpd-core-2.4.57-5.el9.x86_64.rpm3m MBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security, bug fix, and enhancement updatehttps://access.redhat.com/errata/RHSA-2023:6409RHSA-2023:6409RHSA-2023:6409 https://access.redhat.com/security/cve/CVE-2023-3750CVE-2023-3750CVE-2023-3750https://bugzilla.redhat.com/22222102222210https://errata.almalinux.org/9/ALSA-2023-6409.htmlALSA-2023:6409ALSA-2023:6409 U8libvirt-daemon-driver-storage-disk-9.5.0-7.el9_3.alma.1.x86_64.rpm8libvirt-daemon-log-9.5.0-7.el9_3.alma.1.x86_64.rpm[8libvirt-daemon-kvm-9.5.0-7.el9_3.alma.1.x86_64.rpmY8libvirt-daemon-driver-storage-rbd-9.5.0-7.el9_3.alma.1.x86_64.rpmI8libvirt-client-9.5.0-7.el9_3.alma.1.x86_64.rpm\8libvirt-libs-9.5.0-7.el9_3.alma.1.x86_64.rpmL8libvirt-daemon-config-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpmM8libvirt-daemon-driver-interface-9.5.0-7.el9_3.alma.1.x86_64.rpmJ8libvirt-daemon-9.5.0-7.el9_3.alma.1.x86_64.rpmZ8libvirt-daemon-driver-storage-scsi-9.5.0-7.el9_3.alma.1.x86_64.rpmW8libvirt-daemon-driver-storage-logical-9.5.0-7.el9_3.alma.1.x86_64.rpmR8libvirt-daemon-driver-secret-9.5.0-7.el9_3.alma.1.x86_64.rpm8libvirt-daemon-common-9.5.0-7.el9_3.alma.1.x86_64.rpmO8libvirt-daemon-driver-nodedev-9.5.0-7.el9_3.alma.1.x86_64.rpmK8libvirt-daemon-config-network-9.5.0-7.el9_3.alma.1.x86_64.rpmN8libvirt-daemon-driver-network-9.5.0-7.el9_3.alma.1.x86_64.rpm8libvirt-daemon-lock-9.5.0-7.el9_3.alma.1.x86_64.rpmH8libvirt-9.5.0-7.el9_3.alma.1.x86_64.rpmS8libvirt-daemon-driver-storage-9.5.0-7.el9_3.alma.1.x86_64.rpmT8libvirt-daemon-driver-storage-core-9.5.0-7.el9_3.alma.1.x86_64.rpm]8libvirt-nss-9.5.0-7.el9_3.alma.1.x86_64.rpm8libvirt-daemon-plugin-lockd-9.5.0-7.el9_3.alma.1.x86_64.rpm8libvirt-daemon-proxy-9.5.0-7.el9_3.alma.1.x86_64.rpmQ8libvirt-daemon-driver-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpmP8libvirt-daemon-driver-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpmX8libvirt-daemon-driver-storage-mpath-9.5.0-7.el9_3.alma.1.x86_64.rpmV8libvirt-daemon-driver-storage-iscsi-9.5.0-7.el9_3.alma.1.x86_64.rpmU8libvirt-daemon-driver-storage-disk-9.5.0-7.el9_3.alma.1.x86_64.rpm8libvirt-daemon-log-9.5.0-7.el9_3.alma.1.x86_64.rpm[8libvirt-daemon-kvm-9.5.0-7.el9_3.alma.1.x86_64.rpmY8libvirt-daemon-driver-storage-rbd-9.5.0-7.el9_3.alma.1.x86_64.rpmI8libvirt-client-9.5.0-7.el9_3.alma.1.x86_64.rpm\8libvirt-libs-9.5.0-7.el9_3.alma.1.x86_64.rpmL8libvirt-daemon-config-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpmM8libvirt-daemon-driver-interface-9.5.0-7.el9_3.alma.1.x86_64.rpmJ8libvirt-daemon-9.5.0-7.el9_3.alma.1.x86_64.rpmZ8libvirt-daemon-driver-storage-scsi-9.5.0-7.el9_3.alma.1.x86_64.rpmW8libvirt-daemon-driver-storage-logical-9.5.0-7.el9_3.alma.1.x86_64.rpmR8libvirt-daemon-driver-secret-9.5.0-7.el9_3.alma.1.x86_64.rpm8libvirt-daemon-common-9.5.0-7.el9_3.alma.1.x86_64.rpmO8libvirt-daemon-driver-nodedev-9.5.0-7.el9_3.alma.1.x86_64.rpmK8libvirt-daemon-config-network-9.5.0-7.el9_3.alma.1.x86_64.rpmN8libvirt-daemon-driver-network-9.5.0-7.el9_3.alma.1.x86_64.rpm8libvirt-daemon-lock-9.5.0-7.el9_3.alma.1.x86_64.rpmH8libvirt-9.5.0-7.el9_3.alma.1.x86_64.rpmS8libvirt-daemon-driver-storage-9.5.0-7.el9_3.alma.1.x86_64.rpmT8libvirt-daemon-driver-storage-core-9.5.0-7.el9_3.alma.1.x86_64.rpm]8libvirt-nss-9.5.0-7.el9_3.alma.1.x86_64.rpm8libvirt-daemon-plugin-lockd-9.5.0-7.el9_3.alma.1.x86_64.rpm8libvirt-daemon-proxy-9.5.0-7.el9_3.alma.1.x86_64.rpmQ8libvirt-daemon-driver-qemu-9.5.0-7.el9_3.alma.1.x86_64.rpmP8libvirt-daemon-driver-nwfilter-9.5.0-7.el9_3.alma.1.x86_64.rpmX8libvirt-daemon-driver-storage-mpath-9.5.0-7.el9_3.alma.1.x86_64.rpmV8libvirt-daemon-driver-storage-iscsi-9.5.0-7.el9_3.alma.1.x86_64.rpm~n DsecurityModerate: grafana security and enhancement updateqhttps://access.redhat.com/errata/RHSA-2023:6420RHSA-2023:6420RHSA-2023:6420 https://access.redhat.com/security/cve/CVE-2022-23552CVE-2022-23552CVE-2022-23552https://access.redhat.com/security/cve/CVE-2022-31123CVE-2022-31123CVE-2022-31123https://access.redhat.com/security/cve/CVE-2022-31130CVE-2022-31130CVE-2022-31130https://access.redhat.com/security/cve/CVE-2022-39201CVE-2022-39201CVE-2022-39201https://access.redhat.com/security/cve/CVE-2022-39306CVE-2022-39306CVE-2022-39306https://access.redhat.com/security/cve/CVE-2022-39307CVE-2022-39307CVE-2022-39307https://access.redhat.com/security/cve/CVE-2022-39324CVE-2022-39324CVE-2022-39324https://access.redhat.com/security/cve/CVE-2022-41717CVE-2022-41717CVE-2022-41717https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://bugzilla.redhat.com/21311462131146https://bugzilla.redhat.com/21311472131147https://bugzilla.redhat.com/21311482131148https://bugzilla.redhat.com/21380142138014https://bugzilla.redhat.com/21380152138015https://bugzilla.redhat.com/21482522148252https://bugzilla.redhat.com/21584202158420https://bugzilla.redhat.com/21612742161274https://bugzilla.redhat.com/21844832184483https://errata.almalinux.org/9/ALSA-2023-6420.htmlALSA-2023:6420ALSA-2023:6420 Fgrafana-9.2.10-7.el9_3.alma.1.x86_64.rpmFgrafana-9.2.10-7.el9_3.alma.1.x86_64.rpmuo GBBBBsecurityLow: libpq security update3Dhttps://access.redhat.com/errata/RHSA-2023:6429RHSA-2023:6429RHSA-2023:6429 https://access.redhat.com/security/cve/CVE-2022-41862CVE-2022-41862CVE-2022-41862https://bugzilla.redhat.com/21657222165722https://errata.almalinux.org/9/ALSA-2023-6429.htmlALSA-2023:6429ALSA-2023:6429 @libpq-13.11-1.el9.i686.rpm@libpq-devel-13.11-1.el9.x86_64.rpm@libpq-devel-13.11-1.el9.i686.rpm@libpq-13.11-1.el9.x86_64.rpm@libpq-13.11-1.el9.i686.rpm@libpq-devel-13.11-1.el9.x86_64.rpm@libpq-devel-13.11-1.el9.i686.rpm@libpq-13.11-1.el9.x86_64.rpmOp NBsecurityModerate: libfastjson security updateI[https://access.redhat.com/errata/RHSA-2023:6431RHSA-2023:6431RHSA-2023:6431 https://access.redhat.com/security/cve/CVE-2020-12762CVE-2020-12762CVE-2020-12762https://bugzilla.redhat.com/18352531835253https://errata.almalinux.org/9/ALSA-2023-6431.htmlALSA-2023:6431ALSA-2023:6431 tlibfastjson-0.99.9-5.el9.i686.rpmtlibfastjson-0.99.9-5.el9.x86_64.rpmtlibfastjson-0.99.9-5.el9.i686.rpmtlibfastjson-0.99.9-5.el9.x86_64.rpmq RBsecurityModerate: frr security and bug fix update$ https://access.redhat.com/errata/RHSA-2023:6434RHSA-2023:6434RHSA-2023:6434 https://access.redhat.com/security/cve/CVE-2022-36440CVE-2022-36440CVE-2022-36440https://access.redhat.com/security/cve/CVE-2022-40302CVE-2022-40302CVE-2022-40302https://access.redhat.com/security/cve/CVE-2022-40318CVE-2022-40318CVE-2022-40318https://access.redhat.com/security/cve/CVE-2022-43681CVE-2022-43681CVE-2022-43681https://bugzilla.redhat.com/21844682184468https://bugzilla.redhat.com/21960882196088https://bugzilla.redhat.com/21960902196090https://bugzilla.redhat.com/21960912196091https://errata.almalinux.org/9/ALSA-2023-6434.htmlALSA-2023:6434ALSA-2023:6434 ^frr-selinux-8.3.1-11.el9_3.alma.1.noarch.rpm^frr-8.3.1-11.el9_3.alma.1.x86_64.rpm^frr-selinux-8.3.1-11.el9_3.alma.1.noarch.rpm^frr-8.3.1-11.el9_3.alma.1.x86_64.rpmHr VBBBsecurityModerate: wireshark security update7Ghttps://access.redhat.com/errata/RHSA-2023:6469RHSA-2023:6469RHSA-2023:6469 https://access.redhat.com/security/cve/CVE-2023-0666CVE-2023-0666CVE-2023-0666https://access.redhat.com/security/cve/CVE-2023-0668CVE-2023-0668CVE-2023-0668https://access.redhat.com/security/cve/CVE-2023-2855CVE-2023-2855CVE-2023-2855https://access.redhat.com/security/cve/CVE-2023-2856CVE-2023-2856CVE-2023-2856https://access.redhat.com/security/cve/CVE-2023-2858CVE-2023-2858CVE-2023-2858https://access.redhat.com/security/cve/CVE-2023-2952CVE-2023-2952CVE-2023-2952https://bugzilla.redhat.com/22108222210822https://bugzilla.redhat.com/22108242210824https://bugzilla.redhat.com/22108292210829https://bugzilla.redhat.com/22108322210832https://bugzilla.redhat.com/22108352210835https://bugzilla.redhat.com/22114062211406https://errata.almalinux.org/9/ALSA-2023-6469.htmlALSA-2023:6469ALSA-2023:6469 0-wireshark-cli-3.4.10-6.el9.x86_64.rpmd-wireshark-3.4.10-6.el9.x86_64.rpm0-wireshark-cli-3.4.10-6.el9.i686.rpm0-wireshark-cli-3.4.10-6.el9.x86_64.rpmd-wireshark-3.4.10-6.el9.x86_64.rpm0-wireshark-cli-3.4.10-6.el9.i686.rpm2s \BBsecurityModerate: buildah security update~https://access.redhat.com/errata/RHSA-2023:6473RHSA-2023:6473RHSA-2023:6473 https://access.redhat.com/security/cve/CVE-2022-41723CVE-2022-41723CVE-2022-41723https://access.redhat.com/security/cve/CVE-2022-41724CVE-2022-41724CVE-2022-41724https://access.redhat.com/security/cve/CVE-2022-41725CVE-2022-41725CVE-2022-41725https://access.redhat.com/security/cve/CVE-2023-24534CVE-2023-24534CVE-2023-24534https://access.redhat.com/security/cve/CVE-2023-24536CVE-2023-24536CVE-2023-24536https://access.redhat.com/security/cve/CVE-2023-24538CVE-2023-24538CVE-2023-24538https://access.redhat.com/security/cve/CVE-2023-24539CVE-2023-24539CVE-2023-24539https://access.redhat.com/security/cve/CVE-2023-24540CVE-2023-24540CVE-2023-24540https://access.redhat.com/security/cve/CVE-2023-25173CVE-2023-25173CVE-2023-25173https://access.redhat.com/security/cve/CVE-2023-29400CVE-2023-29400CVE-2023-29400https://access.redhat.com/security/cve/CVE-2023-29406CVE-2023-29406CVE-2023-29406https://bugzilla.redhat.com/21744852174485https://bugzilla.redhat.com/21783582178358https://bugzilla.redhat.com/21784882178488https://bugzilla.redhat.com/21784922178492https://bugzilla.redhat.com/21844812184481https://bugzilla.redhat.com/21844822184482https://bugzilla.redhat.com/21844832184483https://bugzilla.redhat.com/21960262196026https://bugzilla.redhat.com/21960272196027https://bugzilla.redhat.com/21960292196029https://bugzilla.redhat.com/22221672222167https://errata.almalinux.org/9/ALSA-2023-6473.htmlALSA-2023:6473ALSA-2023:6473 =dbuildah-tests-1.31.3-1.el9.x86_64.rpmlibreoffice-help-hu-7.1.8.1-11.el9.alma.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-11.el9.alma.x86_64.rpm[libreoffice-langpack-bn-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-ure-common-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-xh-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-sk-7.1.8.1-11.el9.alma.x86_64.rpmylibreoffice-langpack-ko-7.1.8.1-11.el9.alma.x86_64.rpm6libreoffice-help-eu-7.1.8.1-11.el9.alma.x86_64.rpmklibreoffice-langpack-fr-7.1.8.1-11.el9.alma.x86_64.rpmAlibreoffice-help-ja-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-sv-7.1.8.1-11.el9.alma.x86_64.rpm:libreoffice-help-gu-7.1.8.1-11.el9.alma.x86_64.rpmalibreoffice-langpack-de-7.1.8.1-11.el9.alma.x86_64.rpmSautocorr-dsb-7.1.8.1-11.el9.alma.noarch.rpmYlibreoffice-langpack-as-7.1.8.1-11.el9.alma.x86_64.rpmpautocorr-vro-7.1.8.1-11.el9.alma.noarch.rpmWlibreoffice-langpack-af-7.1.8.1-11.el9.alma.x86_64.rpm$libreoffice-emailmerge-7.1.8.1-11.el9.alma.x86_64.rpmUautocorr-en-7.1.8.1-11.el9.alma.noarch.rpmslibreoffice-langpack-hu-7.1.8.1-11.el9.alma.x86_64.rpmdautocorr-mn-7.1.8.1-11.el9.alma.noarch.rpm\autocorr-hsb-7.1.8.1-11.el9.alma.noarch.rpmNautocorr-bg-7.1.8.1-11.el9.alma.noarch.rpmclibreoffice-langpack-el-7.1.8.1-11.el9.alma.x86_64.rpm1libreoffice-help-el-7.1.8.1-11.el9.alma.x86_64.rpm#libreoffice-wiki-publisher-7.1.8.1-11.el9.alma.x86_64.rpm3libreoffice-help-eo-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-nso-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-opensymbol-fonts-7.1.8.1-11.el9.alma.noarch.rpmaautocorr-ko-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-pa-7.1.8.1-11.el9.alma.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-11.el9.alma.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-11.el9.alma.x86_64.rpmjautocorr-sk-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-nl-7.1.8.1-11.el9.alma.x86_64.rpmnautocorr-tr-7.1.8.1-11.el9.alma.noarch.rpm,libreoffice-help-ca-7.1.8.1-11.el9.alma.x86_64.rpm<libreoffice-help-hi-7.1.8.1-11.el9.alma.x86_64.rpm2libreoffice-help-en-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-uk-7.1.8.1-11.el9.alma.x86_64.rpmoautocorr-vi-7.1.8.1-11.el9.alma.noarch.rpm}libreoffice-langpack-ml-7.1.8.1-11.el9.alma.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-11.el9.alma.x86_64.rpmeautocorr-nl-7.1.8.1-11.el9.alma.noarch.rpmdlibreoffice-langpack-en-7.1.8.1-11.el9.alma.x86_64.rpmqlibreoffice-langpack-hi-7.1.8.1-11.el9.alma.x86_64.rpm(libreoffice-gtk3-7.1.8.1-11.el9.alma.x86_64.rpmYautocorr-fr-7.1.8.1-11.el9.alma.noarch.rpm^libreoffice-langpack-cs-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-11.el9.alma.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpm!libreoffice-pyuno-7.1.8.1-11.el9.alma.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-11.el9.alma.x86_64.rpm=libreoffice-help-hr-7.1.8.1-11.el9.alma.x86_64.rpm?libreoffice-help-id-7.1.8.1-11.el9.alma.x86_64.rpm0libreoffice-help-dz-7.1.8.1-11.el9.alma.x86_64.rpmgautocorr-pt-7.1.8.1-11.el9.alma.noarch.rpm&libreoffice-xsltfilter-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-st-7.1.8.1-11.el9.alma.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-11.el9.alma.x86_64.rpm"libreoffice-core-7.1.8.1-11.el9.alma.x86_64.rpmnlibreoffice-langpack-gl-7.1.8.1-11.el9.alma.x86_64.rpm`libreoffice-langpack-da-7.1.8.1-11.el9.alma.x86_64.rpm#libreoffice-draw-7.1.8.1-11.el9.alma.x86_64.rpm+libreoffice-help-bn-7.1.8.1-11.el9.alma.x86_64.rpmvlibreoffice-langpack-ja-7.1.8.1-11.el9.alma.x86_64.rpm%libreoffice-x11-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-nn-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ve-7.1.8.1-11.el9.alma.x86_64.rpmxlibreoffice-langpack-kn-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-math-7.1.8.1-11.el9.alma.x86_64.rpmZlibreoffice-langpack-bg-7.1.8.1-11.el9.alma.x86_64.rpmqautocorr-zh-7.1.8.1-11.el9.alma.noarch.rpmulibreoffice-langpack-it-7.1.8.1-11.el9.alma.x86_64.rpmrlibreoffice-langpack-hr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-ogltrans-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-si-7.1.8.1-11.el9.alma.x86_64.rpm%libreoffice-filters-7.1.8.1-11.el9.alma.x86_64.rpmOautocorr-ca-7.1.8.1-11.el9.alma.noarch.rpm@libreoffice-help-it-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ta-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-tn-7.1.8.1-11.el9.alma.x86_64.rpm`autocorr-ja-7.1.8.1-11.el9.alma.noarch.rpm&libreoffice-gdb-debug-support-7.1.8.1-11.el9.alma.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpmKlibreoffice-help-ro-7.1.8.1-11.el9.alma.x86_64.rpmplibreoffice-langpack-he-7.1.8.1-11.el9.alma.x86_64.rpmVautocorr-es-7.1.8.1-11.el9.alma.noarch.rpmcautocorr-lt-7.1.8.1-11.el9.alma.noarch.rpmiautocorr-ru-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ss-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-ro-7.1.8.1-11.el9.alma.x86_64.rpmIlibreoffice-help-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpmhautocorr-ro-7.1.8.1-11.el9.alma.noarch.rpm libreoffice-base-7.1.8.1-11.el9.alma.x86_64.rpmZautocorr-ga-7.1.8.1-11.el9.alma.noarch.rpmRlibreoffice-help-tr-7.1.8.1-11.el9.alma.x86_64.rpmOlibreoffice-help-sl-7.1.8.1-11.el9.alma.x86_64.rpmQautocorr-da-7.1.8.1-11.el9.alma.noarch.rpmflibreoffice-langpack-es-7.1.8.1-11.el9.alma.x86_64.rpm]autocorr-hu-7.1.8.1-11.el9.alma.noarch.rpmolibreoffice-langpack-gu-7.1.8.1-11.el9.alma.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-11.el9.alma.x86_64.rpmwlibreoffice-langpack-kk-7.1.8.1-11.el9.alma.x86_64.rpm9libreoffice-help-gl-7.1.8.1-11.el9.alma.x86_64.rpmLlibreoffice-help-ru-7.1.8.1-11.el9.alma.x86_64.rpmilibreoffice-langpack-fa-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-sl-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-zu-7.1.8.1-11.el9.alma.x86_64.rpmVlibreoffice-impress-7.1.8.1-11.el9.alma.x86_64.rpmTlibreoffice-help-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpm8libreoffice-help-fr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-tr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-11.el9.alma.x86_64.rpmXautocorr-fi-7.1.8.1-11.el9.alma.noarch.rpm7libreoffice-help-fi-7.1.8.1-11.el9.alma.x86_64.rpmfautocorr-pl-7.1.8.1-11.el9.alma.noarch.rpm4libreoffice-help-es-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-nb-7.1.8.1-11.el9.alma.x86_64.rpmJlibreoffice-help-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-11.el9.alma.x86_64.rpmbautocorr-lb-7.1.8.1-11.el9.alma.noarch.rpmRautocorr-de-7.1.8.1-11.el9.alma.noarch.rpm.libreoffice-help-da-7.1.8.1-11.el9.alma.x86_64.rpmlautocorr-sr-7.1.8.1-11.el9.alma.noarch.rpm~libreoffice-langpack-mr-7.1.8.1-11.el9.alma.x86_64.rpmXlibreoffice-langpack-ar-7.1.8.1-11.el9.alma.x86_64.rpm_libreoffice-langpack-cy-7.1.8.1-11.el9.alma.x86_64.rpm!libreoffice-calc-7.1.8.1-11.el9.alma.x86_64.rpm^autocorr-is-7.1.8.1-11.el9.alma.noarch.rpmPautocorr-cs-7.1.8.1-11.el9.alma.noarch.rpmSlibreoffice-help-uk-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpmTautocorr-el-7.1.8.1-11.el9.alma.noarch.rpmkautocorr-sl-7.1.8.1-11.el9.alma.noarch.rpm;libreoffice-help-he-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-ru-7.1.8.1-11.el9.alma.x86_64.rpmMautocorr-af-7.1.8.1-11.el9.alma.noarch.rpm libreoffice-pdfimport-7.1.8.1-11.el9.alma.x86_64.rpmHlibreoffice-help-pl-7.1.8.1-11.el9.alma.x86_64.rpm[autocorr-hr-7.1.8.1-11.el9.alma.noarch.rpm'libreofficekit-7.1.8.1-11.el9.alma.x86_64.rpm1Mlibreoffice-help-si-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-or-7.1.8.1-11.el9.alma.x86_64.rpmzlibreoffice-langpack-lt-7.1.8.1-11.el9.alma.x86_64.rpmClibreoffice-help-lt-7.1.8.1-11.el9.alma.x86_64.rpmElibreoffice-help-nb-7.1.8.1-11.el9.alma.x86_64.rpm/libreoffice-help-de-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-te-7.1.8.1-11.el9.alma.x86_64.rpmtlibreoffice-langpack-id-7.1.8.1-11.el9.alma.x86_64.rpm)libreoffice-help-ar-7.1.8.1-11.el9.alma.x86_64.rpm-libreoffice-help-cs-7.1.8.1-11.el9.alma.x86_64.rpmFlibreoffice-help-nl-7.1.8.1-11.el9.alma.x86_64.rpm5libreoffice-help-et-7.1.8.1-11.el9.alma.x86_64.rpm_autocorr-it-7.1.8.1-11.el9.alma.noarch.rpmBlibreoffice-help-ko-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-11.el9.alma.x86_64.rpmmautocorr-sv-7.1.8.1-11.el9.alma.noarch.rpmjlibreoffice-langpack-fi-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-7.1.8.1-11.el9.alma.x86_64.rpm]libreoffice-langpack-ca-7.1.8.1-11.el9.alma.x86_64.rpm$libreoffice-writer-7.1.8.1-11.el9.alma.x86_64.rpmglibreoffice-langpack-et-7.1.8.1-11.el9.alma.x86_64.rpm*libreoffice-help-bg-7.1.8.1-11.el9.alma.x86_64.rpmQlibreoffice-help-ta-7.1.8.1-11.el9.alma.x86_64.rpmmlibreoffice-langpack-ga-7.1.8.1-11.el9.alma.x86_64.rpmelibreoffice-langpack-eo-7.1.8.1-11.el9.alma.x86_64.rpmDlibreoffice-help-lv-7.1.8.1-11.el9.alma.x86_64.rpm"libreoffice-ure-7.1.8.1-11.el9.alma.x86_64.rpmNlibreoffice-help-sk-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-data-7.1.8.1-11.el9.alma.noarch.rpmWautocorr-fa-7.1.8.1-11.el9.alma.noarch.rpm>libreoffice-help-hu-7.1.8.1-11.el9.alma.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-11.el9.alma.x86_64.rpm[libreoffice-langpack-bn-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-ure-common-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-xh-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-sk-7.1.8.1-11.el9.alma.x86_64.rpmylibreoffice-langpack-ko-7.1.8.1-11.el9.alma.x86_64.rpm6libreoffice-help-eu-7.1.8.1-11.el9.alma.x86_64.rpmklibreoffice-langpack-fr-7.1.8.1-11.el9.alma.x86_64.rpmAlibreoffice-help-ja-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-sv-7.1.8.1-11.el9.alma.x86_64.rpm:libreoffice-help-gu-7.1.8.1-11.el9.alma.x86_64.rpmalibreoffice-langpack-de-7.1.8.1-11.el9.alma.x86_64.rpmSautocorr-dsb-7.1.8.1-11.el9.alma.noarch.rpmYlibreoffice-langpack-as-7.1.8.1-11.el9.alma.x86_64.rpmpautocorr-vro-7.1.8.1-11.el9.alma.noarch.rpmWlibreoffice-langpack-af-7.1.8.1-11.el9.alma.x86_64.rpm$libreoffice-emailmerge-7.1.8.1-11.el9.alma.x86_64.rpmUautocorr-en-7.1.8.1-11.el9.alma.noarch.rpmslibreoffice-langpack-hu-7.1.8.1-11.el9.alma.x86_64.rpmdautocorr-mn-7.1.8.1-11.el9.alma.noarch.rpm\autocorr-hsb-7.1.8.1-11.el9.alma.noarch.rpmNautocorr-bg-7.1.8.1-11.el9.alma.noarch.rpmclibreoffice-langpack-el-7.1.8.1-11.el9.alma.x86_64.rpm1libreoffice-help-el-7.1.8.1-11.el9.alma.x86_64.rpm#libreoffice-wiki-publisher-7.1.8.1-11.el9.alma.x86_64.rpm3libreoffice-help-eo-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-nso-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-opensymbol-fonts-7.1.8.1-11.el9.alma.noarch.rpmaautocorr-ko-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-pa-7.1.8.1-11.el9.alma.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-11.el9.alma.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-11.el9.alma.x86_64.rpmjautocorr-sk-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-nl-7.1.8.1-11.el9.alma.x86_64.rpmnautocorr-tr-7.1.8.1-11.el9.alma.noarch.rpm,libreoffice-help-ca-7.1.8.1-11.el9.alma.x86_64.rpm<libreoffice-help-hi-7.1.8.1-11.el9.alma.x86_64.rpm2libreoffice-help-en-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-uk-7.1.8.1-11.el9.alma.x86_64.rpmoautocorr-vi-7.1.8.1-11.el9.alma.noarch.rpm}libreoffice-langpack-ml-7.1.8.1-11.el9.alma.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-11.el9.alma.x86_64.rpmeautocorr-nl-7.1.8.1-11.el9.alma.noarch.rpmdlibreoffice-langpack-en-7.1.8.1-11.el9.alma.x86_64.rpmqlibreoffice-langpack-hi-7.1.8.1-11.el9.alma.x86_64.rpm(libreoffice-gtk3-7.1.8.1-11.el9.alma.x86_64.rpmYautocorr-fr-7.1.8.1-11.el9.alma.noarch.rpm^libreoffice-langpack-cs-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-11.el9.alma.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpm!libreoffice-pyuno-7.1.8.1-11.el9.alma.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-11.el9.alma.x86_64.rpm=libreoffice-help-hr-7.1.8.1-11.el9.alma.x86_64.rpm?libreoffice-help-id-7.1.8.1-11.el9.alma.x86_64.rpm0libreoffice-help-dz-7.1.8.1-11.el9.alma.x86_64.rpmgautocorr-pt-7.1.8.1-11.el9.alma.noarch.rpm&libreoffice-xsltfilter-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-st-7.1.8.1-11.el9.alma.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-11.el9.alma.x86_64.rpm"libreoffice-core-7.1.8.1-11.el9.alma.x86_64.rpmnlibreoffice-langpack-gl-7.1.8.1-11.el9.alma.x86_64.rpm`libreoffice-langpack-da-7.1.8.1-11.el9.alma.x86_64.rpm#libreoffice-draw-7.1.8.1-11.el9.alma.x86_64.rpm+libreoffice-help-bn-7.1.8.1-11.el9.alma.x86_64.rpmvlibreoffice-langpack-ja-7.1.8.1-11.el9.alma.x86_64.rpm%libreoffice-x11-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-nn-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ve-7.1.8.1-11.el9.alma.x86_64.rpmxlibreoffice-langpack-kn-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-math-7.1.8.1-11.el9.alma.x86_64.rpmZlibreoffice-langpack-bg-7.1.8.1-11.el9.alma.x86_64.rpmqautocorr-zh-7.1.8.1-11.el9.alma.noarch.rpmulibreoffice-langpack-it-7.1.8.1-11.el9.alma.x86_64.rpmrlibreoffice-langpack-hr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-ogltrans-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-si-7.1.8.1-11.el9.alma.x86_64.rpm%libreoffice-filters-7.1.8.1-11.el9.alma.x86_64.rpmOautocorr-ca-7.1.8.1-11.el9.alma.noarch.rpm@libreoffice-help-it-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ta-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-tn-7.1.8.1-11.el9.alma.x86_64.rpm`autocorr-ja-7.1.8.1-11.el9.alma.noarch.rpm&libreoffice-gdb-debug-support-7.1.8.1-11.el9.alma.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-11.el9.alma.x86_64.rpmKlibreoffice-help-ro-7.1.8.1-11.el9.alma.x86_64.rpmplibreoffice-langpack-he-7.1.8.1-11.el9.alma.x86_64.rpmVautocorr-es-7.1.8.1-11.el9.alma.noarch.rpmcautocorr-lt-7.1.8.1-11.el9.alma.noarch.rpmiautocorr-ru-7.1.8.1-11.el9.alma.noarch.rpmlibreoffice-langpack-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-ss-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-ro-7.1.8.1-11.el9.alma.x86_64.rpmIlibreoffice-help-pt-BR-7.1.8.1-11.el9.alma.x86_64.rpmhautocorr-ro-7.1.8.1-11.el9.alma.noarch.rpm libreoffice-base-7.1.8.1-11.el9.alma.x86_64.rpmZautocorr-ga-7.1.8.1-11.el9.alma.noarch.rpmRlibreoffice-help-tr-7.1.8.1-11.el9.alma.x86_64.rpmOlibreoffice-help-sl-7.1.8.1-11.el9.alma.x86_64.rpmQautocorr-da-7.1.8.1-11.el9.alma.noarch.rpmflibreoffice-langpack-es-7.1.8.1-11.el9.alma.x86_64.rpm]autocorr-hu-7.1.8.1-11.el9.alma.noarch.rpmolibreoffice-langpack-gu-7.1.8.1-11.el9.alma.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-11.el9.alma.x86_64.rpmwlibreoffice-langpack-kk-7.1.8.1-11.el9.alma.x86_64.rpm9libreoffice-help-gl-7.1.8.1-11.el9.alma.x86_64.rpmLlibreoffice-help-ru-7.1.8.1-11.el9.alma.x86_64.rpmilibreoffice-langpack-fa-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-sl-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-zu-7.1.8.1-11.el9.alma.x86_64.rpmVlibreoffice-impress-7.1.8.1-11.el9.alma.x86_64.rpmTlibreoffice-help-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpm8libreoffice-help-fr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-tr-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-11.el9.alma.x86_64.rpmXautocorr-fi-7.1.8.1-11.el9.alma.noarch.rpm7libreoffice-help-fi-7.1.8.1-11.el9.alma.x86_64.rpmfautocorr-pl-7.1.8.1-11.el9.alma.noarch.rpm4libreoffice-help-es-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-nb-7.1.8.1-11.el9.alma.x86_64.rpmJlibreoffice-help-pt-PT-7.1.8.1-11.el9.alma.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-11.el9.alma.x86_64.rpmbautocorr-lb-7.1.8.1-11.el9.alma.noarch.rpmRautocorr-de-7.1.8.1-11.el9.alma.noarch.rpm.libreoffice-help-da-7.1.8.1-11.el9.alma.x86_64.rpmlautocorr-sr-7.1.8.1-11.el9.alma.noarch.rpm~libreoffice-langpack-mr-7.1.8.1-11.el9.alma.x86_64.rpmXlibreoffice-langpack-ar-7.1.8.1-11.el9.alma.x86_64.rpm_libreoffice-langpack-cy-7.1.8.1-11.el9.alma.x86_64.rpm!libreoffice-calc-7.1.8.1-11.el9.alma.x86_64.rpm^autocorr-is-7.1.8.1-11.el9.alma.noarch.rpmPautocorr-cs-7.1.8.1-11.el9.alma.noarch.rpmSlibreoffice-help-uk-7.1.8.1-11.el9.alma.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-11.el9.alma.x86_64.rpmTautocorr-el-7.1.8.1-11.el9.alma.noarch.rpmkautocorr-sl-7.1.8.1-11.el9.alma.noarch.rpm;libreoffice-help-he-7.1.8.1-11.el9.alma.x86_64.rpm libreoffice-langpack-ru-7.1.8.1-11.el9.alma.x86_64.rpmMautocorr-af-7.1.8.1-11.el9.alma.noarch.rpm libreoffice-pdfimport-7.1.8.1-11.el9.alma.x86_64.rpmHlibreoffice-help-pl-7.1.8.1-11.el9.alma.x86_64.rpm[autocorr-hr-7.1.8.1-11.el9.alma.noarch.rpm'libreofficekit-7.1.8.1-11.el9.alma.x86_64.rpmp{ JBBBBBBsecurityModerate: flatpak security, bug fix, and enhancement update|whttps://access.redhat.com/errata/RHSA-2023:6518RHSA-2023:6518RHSA-2023:6518 https://access.redhat.com/security/cve/CVE-2023-28100CVE-2023-28100CVE-2023-28100https://access.redhat.com/security/cve/CVE-2023-28101CVE-2023-28101CVE-2023-28101https://bugzilla.redhat.com/21792192179219https://bugzilla.redhat.com/21792202179220https://errata.almalinux.org/9/ALSA-2023-6518.htmlALSA-2023:6518ALSA-2023:6518 /flatpak-1.12.8-1.el9.x86_64.rpm/flatpak-libs-1.12.8-1.el9.x86_64.rpmt/flatpak-selinux-1.12.8-1.el9.noarch.rpm/flatpak-session-helper-1.12.8-1.el9.x86_64.rpm/flatpak-libs-1.12.8-1.el9.i686.rpm/flatpak-1.12.8-1.el9.x86_64.rpm/flatpak-libs-1.12.8-1.el9.x86_64.rpmt/flatpak-selinux-1.12.8-1.el9.noarch.rpm/flatpak-session-helper-1.12.8-1.el9.x86_64.rpm/flatpak-libs-1.12.8-1.el9.i686.rpmg| SsecurityModerate: python-tornado security updatesmhttps://access.redhat.com/errata/RHSA-2023:6523RHSA-2023:6523RHSA-2023:6523 https://access.redhat.com/security/cve/CVE-2023-28370CVE-2023-28370CVE-2023-28370https://bugzilla.redhat.com/22101992210199https://errata.almalinux.org/9/ALSA-2023-6523.htmlALSA-2023:6523ALSA-2023:6523 `opython3-tornado-6.1.0-9.el9.x86_64.rpm`opython3-tornado-6.1.0-9.el9.x86_64.rpmz} VBBsecurityModerate: dnsmasq security and bug fix update`Uhttps://access.redhat.com/errata/RHSA-2023:6524RHSA-2023:6524RHSA-2023:6524 https://access.redhat.com/security/cve/CVE-2023-28450CVE-2023-28450CVE-2023-28450https://bugzilla.redhat.com/21789482178948https://errata.almalinux.org/9/ALSA-2023-6524.htmlALSA-2023:6524ALSA-2023:6524 @xdnsmasq-utils-2.85-14.el9.x86_64.rpm?xdnsmasq-2.85-14.el9.x86_64.rpm@xdnsmasq-utils-2.85-14.el9.x86_64.rpm?xdnsmasq-2.85-14.el9.x86_64.rpm~ '[BBBBBBBBBBsecurityImportant: webkit2gtk3 security and bug fix update5&https://access.redhat.com/errata/RHSA-2023:6535RHSA-2023:6535RHSA-2023:6535 https://access.redhat.com/security/cve/CVE-2022-32885CVE-2022-32885CVE-2022-32885https://access.redhat.com/security/cve/CVE-2023-27932CVE-2023-27932CVE-2023-27932https://access.redhat.com/security/cve/CVE-2023-27954CVE-2023-27954CVE-2023-27954https://access.redhat.com/security/cve/CVE-2023-28198CVE-2023-28198CVE-2023-28198https://access.redhat.com/security/cve/CVE-2023-32370CVE-2023-32370CVE-2023-32370https://access.redhat.com/security/cve/CVE-2023-32393CVE-2023-32393CVE-2023-32393https://access.redhat.com/security/cve/CVE-2023-38133CVE-2023-38133CVE-2023-38133https://access.redhat.com/security/cve/CVE-2023-38572CVE-2023-38572CVE-2023-38572https://access.redhat.com/security/cve/CVE-2023-38592CVE-2023-38592CVE-2023-38592https://access.redhat.com/security/cve/CVE-2023-38594CVE-2023-38594CVE-2023-38594https://access.redhat.com/security/cve/CVE-2023-38595CVE-2023-38595CVE-2023-38595https://access.redhat.com/security/cve/CVE-2023-38597CVE-2023-38597CVE-2023-38597https://access.redhat.com/security/cve/CVE-2023-38599CVE-2023-38599CVE-2023-38599https://access.redhat.com/security/cve/CVE-2023-38600CVE-2023-38600CVE-2023-38600https://access.redhat.com/security/cve/CVE-2023-38611CVE-2023-38611CVE-2023-38611https://access.redhat.com/security/cve/CVE-2023-39434CVE-2023-39434CVE-2023-39434https://access.redhat.com/security/cve/CVE-2023-40397CVE-2023-40397CVE-2023-40397https://access.redhat.com/security/cve/CVE-2023-40451CVE-2023-40451CVE-2023-40451https://bugzilla.redhat.com/22246082224608https://bugzilla.redhat.com/22310152231015https://bugzilla.redhat.com/22310172231017https://bugzilla.redhat.com/22310182231018https://bugzilla.redhat.com/22310192231019https://bugzilla.redhat.com/22310202231020https://bugzilla.redhat.com/22310212231021https://bugzilla.redhat.com/22310222231022https://bugzilla.redhat.com/22310282231028https://bugzilla.redhat.com/22310432231043https://bugzilla.redhat.com/22368422236842https://bugzilla.redhat.com/22368432236843https://bugzilla.redhat.com/22368442236844https://bugzilla.redhat.com/22389432238943https://bugzilla.redhat.com/22389442238944https://bugzilla.redhat.com/22389452238945https://bugzilla.redhat.com/22414052241405https://bugzilla.redhat.com/22414092241409https://errata.almalinux.org/9/ALSA-2023-6535.htmlALSA-2023:6535ALSA-2023:6535 5webkit2gtk3-jsc-2.40.5-1.el9.x86_64.rpm4webkit2gtk3-devel-2.40.5-1.el9.i686.rpm6webkit2gtk3-jsc-devel-2.40.5-1.el9.x86_64.rpm6webkit2gtk3-jsc-devel-2.40.5-1.el9.i686.rpm5webkit2gtk3-jsc-2.40.5-1.el9.i686.rpm3webkit2gtk3-2.40.5-1.el9.x86_64.rpm4webkit2gtk3-devel-2.40.5-1.el9.x86_64.rpm3webkit2gtk3-2.40.5-1.el9.i686.rpm5webkit2gtk3-jsc-2.40.5-1.el9.x86_64.rpm4webkit2gtk3-devel-2.40.5-1.el9.i686.rpm6webkit2gtk3-jsc-devel-2.40.5-1.el9.x86_64.rpm6webkit2gtk3-jsc-devel-2.40.5-1.el9.i686.rpm5webkit2gtk3-jsc-2.40.5-1.el9.i686.rpm3webkit2gtk3-2.40.5-1.el9.x86_64.rpm4webkit2gtk3-devel-2.40.5-1.el9.x86_64.rpm3webkit2gtk3-2.40.5-1.el9.i686.rpm} )(securityModerate: perl-CPAN security updateC"https://access.redhat.com/errata/RHSA-2023:6539RHSA-2023:6539RHSA-2023:6539 https://access.redhat.com/security/cve/CVE-2023-31484CVE-2023-31484CVE-2023-31484https://bugzilla.redhat.com/22186672218667https://errata.almalinux.org/9/ALSA-2023-6539.htmlALSA-2023:6539ALSA-2023:6539 perl-CPAN-2.29-3.el9.noarch.rpmperl-CPAN-2.29-3.el9.noarch.rpmA +*securityModerate: perl-HTTP-Tiny security updatee[https://access.redhat.com/errata/RHSA-2023:6542RHSA-2023:6542RHSA-2023:6542 https://access.redhat.com/security/cve/CVE-2023-31486CVE-2023-31486CVE-2023-31486https://bugzilla.redhat.com/22283922228392https://errata.almalinux.org/9/ALSA-2023-6542.htmlALSA-2023:6542ALSA-2023:6542 6perl-HTTP-Tiny-0.076-461.el9.noarch.rpm6perl-HTTP-Tiny-0.076-461.el9.noarch.rpmA :lBBBBBBBBBBBBsecurityModerate: ghostscript security and bug fix update@rhttps://access.redhat.com/errata/RHSA-2023:6544RHSA-2023:6544RHSA-2023:6544 https://access.redhat.com/security/cve/CVE-2023-28879CVE-2023-28879CVE-2023-28879https://access.redhat.com/security/cve/CVE-2023-38559CVE-2023-38559CVE-2023-38559https://bugzilla.redhat.com/21845852184585https://bugzilla.redhat.com/22243672224367https://errata.almalinux.org/9/ALSA-2023-6544.htmlALSA-2023:6544ALSA-2023:6544 vNghostscript-tools-fonts-9.54.0-13.el9.x86_64.rpmMNghostscript-doc-9.54.0-13.el9.noarch.rpmxNghostscript-x11-9.54.0-13.el9.x86_64.rpmtNghostscript-9.54.0-13.el9.x86_64.rpmTNlibgs-9.54.0-13.el9.x86_64.rpmwNghostscript-tools-printing-9.54.0-13.el9.x86_64.rpmuNghostscript-tools-dvipdf-9.54.0-13.el9.x86_64.rpmTNlibgs-9.54.0-13.el9.i686.rpmvNghostscript-tools-fonts-9.54.0-13.el9.x86_64.rpmMNghostscript-doc-9.54.0-13.el9.noarch.rpmxNghostscript-x11-9.54.0-13.el9.x86_64.rpmtNghostscript-9.54.0-13.el9.x86_64.rpmTNlibgs-9.54.0-13.el9.x86_64.rpmwNghostscript-tools-printing-9.54.0-13.el9.x86_64.rpmuNghostscript-tools-dvipdf-9.54.0-13.el9.x86_64.rpmTNlibgs-9.54.0-13.el9.i686.rpm ={securityModerate: libreswan security update2yhttps://access.redhat.com/errata/RHSA-2023:6549RHSA-2023:6549RHSA-2023:6549 https://access.redhat.com/security/cve/CVE-2023-38710CVE-2023-38710CVE-2023-38710https://access.redhat.com/security/cve/CVE-2023-38711CVE-2023-38711CVE-2023-38711https://access.redhat.com/security/cve/CVE-2023-38712CVE-2023-38712CVE-2023-38712https://bugzilla.redhat.com/22159522215952https://bugzilla.redhat.com/22253682225368https://bugzilla.redhat.com/22253692225369https://errata.almalinux.org/9/ALSA-2023-6549.htmlALSA-2023:6549ALSA-2023:6549 (Llibreswan-4.12-1.el9.x86_64.rpm(Llibreswan-4.12-1.el9.x86_64.rpm{ ~BsecurityModerate: yajl security update+,https://access.redhat.com/errata/RHSA-2023:6551RHSA-2023:6551RHSA-2023:6551 https://access.redhat.com/security/cve/CVE-2023-33460CVE-2023-33460CVE-2023-33460https://bugzilla.redhat.com/22212492221249https://errata.almalinux.org/9/ALSA-2023-6551.htmlALSA-2023:6551ALSA-2023:6551 -yajl-2.1.0-22.el9.x86_64.rpm-yajl-2.1.0-22.el9.i686.rpm-yajl-2.1.0-22.el9.x86_64.rpm-yajl-2.1.0-22.el9.i686.rpm BBsecurityModerate: libmicrohttpd security updateW~https://access.redhat.com/errata/RHSA-2023:6566RHSA-2023:6566RHSA-2023:6566 https://access.redhat.com/security/cve/CVE-2023-27371CVE-2023-27371CVE-2023-27371https://bugzilla.redhat.com/21743132174313https://errata.almalinux.org/9/ALSA-2023-6566.htmlALSA-2023:6566ALSA-2023:6566 "libmicrohttpd-0.9.72-5.el9.x86_64.rpm"libmicrohttpd-0.9.72-5.el9.i686.rpm"libmicrohttpd-0.9.72-5.el9.x86_64.rpm"libmicrohttpd-0.9.72-5.el9.i686.rpm FsecurityModerate: sysstat security and bug fix updateUYhttps://access.redhat.com/errata/RHSA-2023:6569RHSA-2023:6569RHSA-2023:6569 https://access.redhat.com/security/cve/CVE-2023-33204CVE-2023-33204CVE-2023-33204https://bugzilla.redhat.com/22082702208270https://errata.almalinux.org/9/ALSA-2023-6569.htmlALSA-2023:6569ALSA-2023:6569 \Bsysstat-12.5.4-7.el9.x86_64.rpm\Bsysstat-12.5.4-7.el9.x86_64.rpm| IBBBBBBsecurityModerate: tomcat security and bug fix update.3https://access.redhat.com/errata/RHSA-2023:6570RHSA-2023:6570RHSA-2023:6570 https://access.redhat.com/security/cve/CVE-2023-24998CVE-2023-24998CVE-2023-24998https://access.redhat.com/security/cve/CVE-2023-28708CVE-2023-28708CVE-2023-28708https://access.redhat.com/security/cve/CVE-2023-28709CVE-2023-28709CVE-2023-28709https://bugzilla.redhat.com/21722982172298https://bugzilla.redhat.com/21808562180856https://bugzilla.redhat.com/22103212210321https://errata.almalinux.org/9/ALSA-2023-6570.htmlALSA-2023:6570ALSA-2023:6570 gtomcat-9.0.62-37.el9_3.noarch.rpmitomcat-docs-webapp-9.0.62-37.el9_3.noarch.rpmhtomcat-admin-webapps-9.0.62-37.el9_3.noarch.rpmjtomcat-el-3.0-api-9.0.62-37.el9_3.noarch.rpmntomcat-webapps-9.0.62-37.el9_3.noarch.rpmltomcat-lib-9.0.62-37.el9_3.noarch.rpmktomcat-jsp-2.3-api-9.0.62-37.el9_3.noarch.rpmmtomcat-servlet-4.0-api-9.0.62-37.el9_3.noarch.rpmgtomcat-9.0.62-37.el9_3.noarch.rpmitomcat-docs-webapp-9.0.62-37.el9_3.noarch.rpmhtomcat-admin-webapps-9.0.62-37.el9_3.noarch.rpmjtomcat-el-3.0-api-9.0.62-37.el9_3.noarch.rpmntomcat-webapps-9.0.62-37.el9_3.noarch.rpmltomcat-lib-9.0.62-37.el9_3.noarch.rpmktomcat-jsp-2.3-api-9.0.62-37.el9_3.noarch.rpmmtomcat-servlet-4.0-api-9.0.62-37.el9_3.noarch.rpmv RBBBBsecurityModerate: libtiff security updateaN https://access.redhat.com/errata/RHSA-2023:6575RHSA-2023:6575RHSA-2023:6575 https://access.redhat.com/security/cve/CVE-2023-26965CVE-2023-26965CVE-2023-26965https://access.redhat.com/security/cve/CVE-2023-26966CVE-2023-26966CVE-2023-26966https://access.redhat.com/security/cve/CVE-2023-2731CVE-2023-2731CVE-2023-2731https://access.redhat.com/security/cve/CVE-2023-3316CVE-2023-3316CVE-2023-3316https://access.redhat.com/security/cve/CVE-2023-3576CVE-2023-3576CVE-2023-3576https://bugzilla.redhat.com/22076352207635https://bugzilla.redhat.com/22152062215206https://bugzilla.redhat.com/22160802216080https://bugzilla.redhat.com/22187492218749https://bugzilla.redhat.com/22193402219340https://errata.almalinux.org/9/ALSA-2023-6575.htmlALSA-2023:6575ALSA-2023:6575 vwlibtiff-devel-4.4.0-10.el9.i686.rpmuwlibtiff-4.4.0-10.el9.x86_64.rpmuwlibtiff-4.4.0-10.el9.i686.rpmvwlibtiff-devel-4.4.0-10.el9.x86_64.rpmvwlibtiff-devel-4.4.0-10.el9.i686.rpmuwlibtiff-4.4.0-10.el9.x86_64.rpmuwlibtiff-4.4.0-10.el9.i686.rpmvwlibtiff-devel-4.4.0-10.el9.x86_64.rpmY YBsecurityModerate: libqb security update/ohttps://access.redhat.com/errata/RHSA-2023:6578RHSA-2023:6578RHSA-2023:6578 https://access.redhat.com/security/cve/CVE-2023-39976CVE-2023-39976CVE-2023-39976https://bugzilla.redhat.com/22307082230708https://errata.almalinux.org/9/ALSA-2023-6578.htmlALSA-2023:6578ALSA-2023:6578 %libqb-2.0.6-4.el9_3.i686.rpm%libqb-2.0.6-4.el9_3.x86_64.rpm%libqb-2.0.6-4.el9_3.i686.rpm%libqb-2.0.6-4.el9_3.x86_64.rpm;  ]BsecurityModerate: binutils security updateJhttps://access.redhat.com/errata/RHSA-2023:6593RHSA-2023:6593RHSA-2023:6593 https://access.redhat.com/security/cve/CVE-2022-4285CVE-2022-4285CVE-2022-4285https://bugzilla.redhat.com/21507682150768https://errata.almalinux.org/9/ALSA-2023-6593.htmlALSA-2023:6593ALSA-2023:6593 Ybinutils-devel-2.35.2-42.el9.x86_64.rpmYbinutils-devel-2.35.2-42.el9.i686.rpmYbinutils-devel-2.35.2-42.el9.x86_64.rpmYbinutils-devel-2.35.2-42.el9.i686.rpm  /aBBBBBBBBBBBBsecurityModerate: cups security and bug fix updatehnhttps://access.redhat.com/errata/RHSA-2023:6596RHSA-2023:6596RHSA-2023:6596 https://access.redhat.com/security/cve/CVE-2023-32324CVE-2023-32324CVE-2023-32324https://access.redhat.com/security/cve/CVE-2023-34241CVE-2023-34241CVE-2023-34241https://bugzilla.redhat.com/22096032209603https://bugzilla.redhat.com/22149142214914https://errata.almalinux.org/9/ALSA-2023-6596.htmlALSA-2023:6596ALSA-2023:6596  Fcups-lpd-2.3.3op2-21.el9.x86_64.rpm Fcups-ipptool-2.3.3op2-21.el9.x86_64.rpm Fcups-2.3.3op2-21.el9.x86_64.rpm Fcups-client-2.3.3op2-21.el9.x86_64.rpm Fcups-printerapp-2.3.3op2-21.el9.x86_64.rpmGFcups-devel-2.3.3op2-21.el9.i686.rpmrFcups-filesystem-2.3.3op2-21.el9.noarch.rpmGFcups-devel-2.3.3op2-21.el9.x86_64.rpm Fcups-lpd-2.3.3op2-21.el9.x86_64.rpm Fcups-ipptool-2.3.3op2-21.el9.x86_64.rpm Fcups-2.3.3op2-21.el9.x86_64.rpm Fcups-client-2.3.3op2-21.el9.x86_64.rpm Fcups-printerapp-2.3.3op2-21.el9.x86_64.rpmGFcups-devel-2.3.3op2-21.el9.i686.rpmrFcups-filesystem-2.3.3op2-21.el9.noarch.rpmGFcups-devel-2.3.3op2-21.el9.x86_64.rpm  6pBBBBsecurityLow: glib2 security and bug fix update3Vohttps://access.redhat.com/errata/RHSA-2023:6631RHSA-2023:6631RHSA-2023:6631 https://access.redhat.com/security/cve/CVE-2023-29499CVE-2023-29499CVE-2023-29499https://access.redhat.com/security/cve/CVE-2023-32611CVE-2023-32611CVE-2023-32611https://access.redhat.com/security/cve/CVE-2023-32665CVE-2023-32665CVE-2023-32665https://bugzilla.redhat.com/22118272211827https://bugzilla.redhat.com/22118282211828https://bugzilla.redhat.com/22118292211829https://errata.almalinux.org/9/ALSA-2023-6631.htmlALSA-2023:6631ALSA-2023:6631 Fglib2-devel-2.68.4-11.el9.x86_64.rpmFglib2-tests-2.68.4-11.el9.x86_64.rpmFglib2-devel-2.68.4-11.el9.i686.rpmvFglib2-doc-2.68.4-11.el9.noarch.rpmFglib2-devel-2.68.4-11.el9.x86_64.rpmFglib2-tests-2.68.4-11.el9.x86_64.rpmFglib2-devel-2.68.4-11.el9.i686.rpmvFglib2-doc-2.68.4-11.el9.noarch.rpma  :wBsecurityModerate: c-ares security, bug fix, and enhancement updateE https://access.redhat.com/errata/RHSA-2023:6635RHSA-2023:6635RHSA-2023:6635 https://access.redhat.com/security/cve/CVE-2022-4904CVE-2022-4904CVE-2022-4904https://access.redhat.com/security/cve/CVE-2023-31124CVE-2023-31124CVE-2023-31124https://access.redhat.com/security/cve/CVE-2023-31130CVE-2023-31130CVE-2023-31130https://access.redhat.com/security/cve/CVE-2023-31147CVE-2023-31147CVE-2023-31147https://bugzilla.redhat.com/21686312168631https://bugzilla.redhat.com/22094942209494https://bugzilla.redhat.com/22094972209497https://bugzilla.redhat.com/22095012209501https://errata.almalinux.org/9/ALSA-2023-6635.htmlALSA-2023:6635ALSA-2023:6635 yc-ares-devel-1.19.1-1.el9.x86_64.rpmyc-ares-devel-1.19.1-1.el9.i686.rpmyc-ares-devel-1.19.1-1.el9.x86_64.rpmyc-ares-devel-1.19.1-1.el9.i686.rpm  >{BsecurityModerate: libssh security updateO{https://access.redhat.com/errata/RHSA-2023:6643RHSA-2023:6643RHSA-2023:6643 https://access.redhat.com/security/cve/CVE-2023-1667CVE-2023-1667CVE-2023-1667https://access.redhat.com/security/cve/CVE-2023-2283CVE-2023-2283CVE-2023-2283https://bugzilla.redhat.com/21821992182199https://bugzilla.redhat.com/21897362189736https://errata.almalinux.org/9/ALSA-2023-6643.htmlALSA-2023:6643ALSA-2023:6643 jelibssh-devel-0.10.4-11.el9.x86_64.rpmjelibssh-devel-0.10.4-11.el9.i686.rpmjelibssh-devel-0.10.4-11.el9.x86_64.rpmjelibssh-devel-0.10.4-11.el9.i686.rpm BBBBsecurityModerate: python3.9 security updateJ https://access.redhat.com/errata/RHSA-2023:6659RHSA-2023:6659RHSA-2023:6659 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6659.htmlALSA-2023:6659ALSA-2023:6659 gbpython-unversioned-command-3.9.18-1.el9_3.noarch.rpm1bpython3-tkinter-3.9.18-1.el9_3.x86_64.rpmRbpython3-devel-3.9.18-1.el9_3.i686.rpmRbpython3-devel-3.9.18-1.el9_3.x86_64.rpmgbpython-unversioned-command-3.9.18-1.el9_3.noarch.rpm1bpython3-tkinter-3.9.18-1.el9_3.x86_64.rpmRbpython3-devel-3.9.18-1.el9_3.i686.rpmRbpython3-devel-3.9.18-1.el9_3.x86_64.rpma FBBBBsecurityLow: gmp security and enhancement update3jUhttps://access.redhat.com/errata/RHSA-2023:6661RHSA-2023:6661RHSA-2023:6661 https://access.redhat.com/security/cve/CVE-2021-43618CVE-2021-43618CVE-2021-43618https://bugzilla.redhat.com/20249042024904https://errata.almalinux.org/9/ALSA-2023-6661.htmlALSA-2023:6661ALSA-2023:6661  Cgmp-devel-6.2.0-13.el9.i686.rpm Cgmp-c++-6.2.0-13.el9.x86_64.rpm Cgmp-devel-6.2.0-13.el9.x86_64.rpm Cgmp-c++-6.2.0-13.el9.i686.rpm Cgmp-devel-6.2.0-13.el9.i686.rpm Cgmp-c++-6.2.0-13.el9.x86_64.rpm Cgmp-devel-6.2.0-13.el9.x86_64.rpm Cgmp-c++-6.2.0-13.el9.i686.rpm MBBBBBBBBBBsecurityModerate: samba security, bug fix, and enhancement update?K https://access.redhat.com/errata/RHSA-2023:6667RHSA-2023:6667RHSA-2023:6667 https://access.redhat.com/security/cve/CVE-2022-2127CVE-2022-2127CVE-2022-2127https://access.redhat.com/security/cve/CVE-2023-34966CVE-2023-34966CVE-2023-34966https://access.redhat.com/security/cve/CVE-2023-34967CVE-2023-34967CVE-2023-34967https://access.redhat.com/security/cve/CVE-2023-34968CVE-2023-34968CVE-2023-34968https://bugzilla.redhat.com/22227912222791https://bugzilla.redhat.com/22227932222793https://bugzilla.redhat.com/22227942222794https://bugzilla.redhat.com/22227952222795https://errata.almalinux.org/9/ALSA-2023-6667.htmlALSA-2023:6667ALSA-2023:6667 //samba-winbind-clients-4.18.6-100.el9.x86_64.rpm1/samba-winexe-4.18.6-100.el9.x86_64.rpm./samba-vfs-iouring-4.18.6-100.el9.x86_64.rpm-/samba-krb5-printing-4.18.6-100.el9.x86_64.rpm,/samba-client-4.18.6-100.el9.x86_64.rpm0/samba-winbind-krb5-locator-4.18.6-100.el9.x86_64.rpm//samba-winbind-clients-4.18.6-100.el9.x86_64.rpm1/samba-winexe-4.18.6-100.el9.x86_64.rpm./samba-vfs-iouring-4.18.6-100.el9.x86_64.rpm-/samba-krb5-printing-4.18.6-100.el9.x86_64.rpm,/samba-client-4.18.6-100.el9.x86_64.rpm0/samba-winbind-krb5-locator-4.18.6-100.el9.x86_64.rpm  ZBsecurityModerate: curl security update q https://access.redhat.com/errata/RHSA-2023:6679RHSA-2023:6679RHSA-2023:6679 https://access.redhat.com/security/cve/CVE-2023-27533CVE-2023-27533CVE-2023-27533https://access.redhat.com/security/cve/CVE-2023-27534CVE-2023-27534CVE-2023-27534https://access.redhat.com/security/cve/CVE-2023-27536CVE-2023-27536CVE-2023-27536https://access.redhat.com/security/cve/CVE-2023-27538CVE-2023-27538CVE-2023-27538https://bugzilla.redhat.com/21790622179062https://bugzilla.redhat.com/21790692179069https://bugzilla.redhat.com/21790922179092https://bugzilla.redhat.com/21791032179103https://errata.almalinux.org/9/ALSA-2023-6679.htmlALSA-2023:6679ALSA-2023:6679  Xlibcurl-devel-7.76.1-26.el9.i686.rpm Xlibcurl-devel-7.76.1-26.el9.x86_64.rpm Xlibcurl-devel-7.76.1-26.el9.i686.rpm Xlibcurl-devel-7.76.1-26.el9.x86_64.rpmV securityModerate: python-pip security update{(https://access.redhat.com/errata/RHSA-2023:6694RHSA-2023:6694RHSA-2023:6694 https://access.redhat.com/security/cve/CVE-2007-4559CVE-2007-4559CVE-2007-4559https://bugzilla.redhat.com/263261263261https://errata.almalinux.org/9/ALSA-2023-6694.htmlALSA-2023:6694ALSA-2023:6694 a+python3-pip-21.2.3-7.el9.noarch.rpma+python3-pip-21.2.3-7.el9.noarch.rpmD '`BBBBBsecurityModerate: ncurses security and bug fix update#xhttps://access.redhat.com/errata/RHSA-2023:6698RHSA-2023:6698RHSA-2023:6698 https://access.redhat.com/security/cve/CVE-2023-29491CVE-2023-29491CVE-2023-29491https://bugzilla.redhat.com/21917042191704https://errata.almalinux.org/9/ALSA-2023-6698.htmlALSA-2023:6698ALSA-2023:6698 z(ncurses-term-6.2-10.20210508.el9.noarch.rpm7(ncurses-devel-6.2-10.20210508.el9.i686.rpm6(ncurses-c++-libs-6.2-10.20210508.el9.x86_64.rpm7(ncurses-devel-6.2-10.20210508.el9.x86_64.rpm6(ncurses-c++-libs-6.2-10.20210508.el9.i686.rpmz(ncurses-term-6.2-10.20210508.el9.noarch.rpm7(ncurses-devel-6.2-10.20210508.el9.i686.rpm6(ncurses-c++-libs-6.2-10.20210508.el9.x86_64.rpm7(ncurses-devel-6.2-10.20210508.el9.x86_64.rpm6(ncurses-c++-libs-6.2-10.20210508.el9.i686.rpmi +hBsecurityModerate: krb5 security and bug fix update9https://access.redhat.com/errata/RHSA-2023:6699RHSA-2023:6699RHSA-2023:6699 https://access.redhat.com/security/cve/CVE-2023-36054CVE-2023-36054CVE-2023-36054https://access.redhat.com/security/cve/CVE-2023-39975CVE-2023-39975CVE-2023-39975https://bugzilla.redhat.com/22301782230178https://bugzilla.redhat.com/22326822232682https://errata.almalinux.org/9/ALSA-2023-6699.htmlALSA-2023:6699ALSA-2023:6699 S~krb5-devel-1.21.1-1.el9.x86_64.rpmS~krb5-devel-1.21.1-1.el9.i686.rpmS~krb5-devel-1.21.1-1.el9.x86_64.rpmS~krb5-devel-1.21.1-1.el9.i686.rpm" 1lBBBsecurityModerate: avahi security updateThttps://access.redhat.com/errata/RHSA-2023:6707RHSA-2023:6707RHSA-2023:6707 https://access.redhat.com/security/cve/CVE-2021-3468CVE-2021-3468CVE-2021-3468https://access.redhat.com/security/cve/CVE-2021-3502CVE-2021-3502CVE-2021-3502https://access.redhat.com/security/cve/CVE-2023-1981CVE-2023-1981CVE-2023-1981https://bugzilla.redhat.com/19396141939614https://bugzilla.redhat.com/19469141946914https://bugzilla.redhat.com/21859112185911https://errata.almalinux.org/9/ALSA-2023-6707.htmlALSA-2023:6707ALSA-2023:6707 <avahi-tools-0.8-15.el9.x86_64.rpmavahi-glib-0.8-15.el9.x86_64.rpmavahi-glib-0.8-15.el9.i686.rpm<avahi-tools-0.8-15.el9.x86_64.rpmavahi-glib-0.8-15.el9.x86_64.rpmavahi-glib-0.8-15.el9.i686.rpmG rBBBBBBBBBBBBsecurityImportant: ghostscript security updateehttps://access.redhat.com/errata/RHSA-2023:6732RHSA-2023:6732RHSA-2023:6732 https://access.redhat.com/security/cve/CVE-2023-43115CVE-2023-43115CVE-2023-43115https://bugzilla.redhat.com/22411082241108https://errata.almalinux.org/9/ALSA-2023-6732.htmlALSA-2023:6732ALSA-2023:6732 TOlibgs-9.54.0-14.el9_3.i686.rpmxOghostscript-x11-9.54.0-14.el9_3.x86_64.rpmuOghostscript-tools-dvipdf-9.54.0-14.el9_3.x86_64.rpmTOlibgs-9.54.0-14.el9_3.x86_64.rpmvOghostscript-tools-fonts-9.54.0-14.el9_3.x86_64.rpmtOghostscript-9.54.0-14.el9_3.x86_64.rpmMOghostscript-doc-9.54.0-14.el9_3.noarch.rpmwOghostscript-tools-printing-9.54.0-14.el9_3.x86_64.rpmTOlibgs-9.54.0-14.el9_3.i686.rpmxOghostscript-x11-9.54.0-14.el9_3.x86_64.rpmuOghostscript-tools-dvipdf-9.54.0-14.el9_3.x86_64.rpmTOlibgs-9.54.0-14.el9_3.x86_64.rpmvOghostscript-tools-fonts-9.54.0-14.el9_3.x86_64.rpmtOghostscript-9.54.0-14.el9_3.x86_64.rpmMOghostscript-doc-9.54.0-14.el9_3.noarch.rpmwOghostscript-tools-printing-9.54.0-14.el9_3.x86_64.rpm ABBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security and bug fix updatefhttps://access.redhat.com/errata/RHSA-2023:6738RHSA-2023:6738RHSA-2023:6738 https://access.redhat.com/security/cve/CVE-2023-22025CVE-2023-22025CVE-2023-22025https://access.redhat.com/security/cve/CVE-2023-22081CVE-2023-22081CVE-2023-22081https://bugzilla.redhat.com/22436272243627https://bugzilla.redhat.com/22438052243805https://errata.almalinux.org/9/ALSA-2023-6738.htmlALSA-2023:6738ALSA-2023:6738 2!java-21-openjdk-javadoc-21.0.1.0.12-2.el9.alma.1.x86_64.rpm/!java-21-openjdk-demo-21.0.1.0.12-2.el9.alma.1.x86_64.rpm3!java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el9.alma.1.x86_64.rpm4!java-21-openjdk-jmods-21.0.1.0.12-2.el9.alma.1.x86_64.rpm1!java-21-openjdk-headless-21.0.1.0.12-2.el9.alma.1.x86_64.rpm5!java-21-openjdk-src-21.0.1.0.12-2.el9.alma.1.x86_64.rpm.!java-21-openjdk-21.0.1.0.12-2.el9.alma.1.x86_64.rpm0!java-21-openjdk-devel-21.0.1.0.12-2.el9.alma.1.x86_64.rpm6!java-21-openjdk-static-libs-21.0.1.0.12-2.el9.alma.1.x86_64.rpm 2!java-21-openjdk-javadoc-21.0.1.0.12-2.el9.alma.1.x86_64.rpm/!java-21-openjdk-demo-21.0.1.0.12-2.el9.alma.1.x86_64.rpm3!java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el9.alma.1.x86_64.rpm4!java-21-openjdk-jmods-21.0.1.0.12-2.el9.alma.1.x86_64.rpm1!java-21-openjdk-headless-21.0.1.0.12-2.el9.alma.1.x86_64.rpm5!java-21-openjdk-src-21.0.1.0.12-2.el9.alma.1.x86_64.rpm.!java-21-openjdk-21.0.1.0.12-2.el9.alma.1.x86_64.rpm0!java-21-openjdk-devel-21.0.1.0.12-2.el9.alma.1.x86_64.rpm6!java-21-openjdk-static-libs-21.0.1.0.12-2.el9.alma.1.x86_64.rpm[ TBBBBBBBBBBsecurityModerate: samba security updateYhttps://access.redhat.com/errata/RHSA-2023:6744RHSA-2023:6744RHSA-2023:6744 https://access.redhat.com/security/cve/CVE-2023-3961CVE-2023-3961CVE-2023-3961https://access.redhat.com/security/cve/CVE-2023-4091CVE-2023-4091CVE-2023-4091https://access.redhat.com/security/cve/CVE-2023-42669CVE-2023-42669CVE-2023-42669https://bugzilla.redhat.com/22418812241881https://bugzilla.redhat.com/22418822241882https://bugzilla.redhat.com/22418842241884https://errata.almalinux.org/9/ALSA-2023-6744.htmlALSA-2023:6744ALSA-2023:6744 10samba-winexe-4.18.6-101.el9_3.alma.1.x86_64.rpm/0samba-winbind-clients-4.18.6-101.el9_3.alma.1.x86_64.rpm-0samba-krb5-printing-4.18.6-101.el9_3.alma.1.x86_64.rpm,0samba-client-4.18.6-101.el9_3.alma.1.x86_64.rpm.0samba-vfs-iouring-4.18.6-101.el9_3.alma.1.x86_64.rpm00samba-winbind-krb5-locator-4.18.6-101.el9_3.alma.1.x86_64.rpm10samba-winexe-4.18.6-101.el9_3.alma.1.x86_64.rpm/0samba-winbind-clients-4.18.6-101.el9_3.alma.1.x86_64.rpm-0samba-krb5-printing-4.18.6-101.el9_3.alma.1.x86_64.rpm,0samba-client-4.18.6-101.el9_3.alma.1.x86_64.rpm.0samba-vfs-iouring-4.18.6-101.el9_3.alma.1.x86_64.rpm00samba-winbind-krb5-locator-4.18.6-101.el9_3.alma.1.x86_64.rpm! $aBsecurityImportant: curl security updateY}https://access.redhat.com/errata/RHSA-2023:6745RHSA-2023:6745RHSA-2023:6745 https://access.redhat.com/security/cve/CVE-2023-38545CVE-2023-38545CVE-2023-38545https://access.redhat.com/security/cve/CVE-2023-38546CVE-2023-38546CVE-2023-38546https://bugzilla.redhat.com/22419332241933https://bugzilla.redhat.com/22419382241938https://errata.almalinux.org/9/ALSA-2023-6745.htmlALSA-2023:6745ALSA-2023:6745  Ylibcurl-devel-7.76.1-26.el9_3.2.i686.rpm Ylibcurl-devel-7.76.1-26.el9_3.2.x86_64.rpm Ylibcurl-devel-7.76.1-26.el9_3.2.i686.rpm Ylibcurl-devel-7.76.1-26.el9_3.2.x86_64.rpm' 'esecurityCritical: squid security update;V https://access.redhat.com/errata/RHSA-2023:6748RHSA-2023:6748RHSA-2023:6748 https://access.redhat.com/security/cve/CVE-2023-46846CVE-2023-46846CVE-2023-46846https://access.redhat.com/security/cve/CVE-2023-46847CVE-2023-46847CVE-2023-46847https://access.redhat.com/security/cve/CVE-2023-46848CVE-2023-46848CVE-2023-46848https://bugzilla.redhat.com/22459102245910https://bugzilla.redhat.com/22459162245916https://bugzilla.redhat.com/22459192245919https://errata.almalinux.org/9/ALSA-2023-6748.htmlALSA-2023:6748ALSA-2023:6748 Xsquid-5.5-6.el9_3.1.x86_64.rpmXsquid-5.5-6.el9_3.1.x86_64.rpm  apr-devel-1.7.0-12.el9_3.x86_64.rpme>apr-1.7.0-12.el9_3.x86_64.rpmf>apr-devel-1.7.0-12.el9_3.i686.rpme>apr-1.7.0-12.el9_3.i686.rpmf>apr-devel-1.7.0-12.el9_3.x86_64.rpme>apr-1.7.0-12.el9_3.x86_64.rpmf>apr-devel-1.7.0-12.el9_3.i686.rpme>apr-1.7.0-12.el9_3.i686.rpmܗK# >|securityImportant: tracker-miners security updateb7https://access.redhat.com/errata/RHSA-2023:7712RHSA-2023:7712RHSA-2023:7712 https://access.redhat.com/security/cve/CVE-2023-5557CVE-2023-5557CVE-2023-5557https://bugzilla.redhat.com/22430962243096https://errata.almalinux.org/9/ALSA-2023-7712.htmlALSA-2023:7712ALSA-2023:7712 #0tracker-miners-3.1.2-4.el9_3.x86_64.rpm#0tracker-miners-3.1.2-4.el9_3.x86_64.rpmd$ BBBBBBBBBBsecurityImportant: webkit2gtk3 security updateghttps://access.redhat.com/errata/RHSA-2023:7715RHSA-2023:7715RHSA-2023:7715 https://access.redhat.com/security/cve/CVE-2023-42917CVE-2023-42917CVE-2023-42917https://bugzilla.redhat.com/22530582253058https://errata.almalinux.org/9/ALSA-2023-7715.htmlALSA-2023:7715ALSA-2023:7715 5webkit2gtk3-jsc-2.40.5-1.el9_3.1.i686.rpm5webkit2gtk3-jsc-2.40.5-1.el9_3.1.x86_64.rpm4webkit2gtk3-devel-2.40.5-1.el9_3.1.x86_64.rpm6webkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.i686.rpm3webkit2gtk3-2.40.5-1.el9_3.1.x86_64.rpm3webkit2gtk3-2.40.5-1.el9_3.1.i686.rpm4webkit2gtk3-devel-2.40.5-1.el9_3.1.i686.rpm6webkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.x86_64.rpm5webkit2gtk3-jsc-2.40.5-1.el9_3.1.i686.rpm5webkit2gtk3-jsc-2.40.5-1.el9_3.1.x86_64.rpm4webkit2gtk3-devel-2.40.5-1.el9_3.1.x86_64.rpm6webkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.i686.rpm3webkit2gtk3-2.40.5-1.el9_3.1.x86_64.rpm3webkit2gtk3-2.40.5-1.el9_3.1.i686.rpm4webkit2gtk3-devel-2.40.5-1.el9_3.1.i686.rpm6webkit2gtk3-jsc-devel-2.40.5-1.el9_3.1.x86_64.rpm&% LBsecurityModerate: libxml2 security updatehttps://access.redhat.com/errata/RHSA-2023:7747RHSA-2023:7747RHSA-2023:7747 https://access.redhat.com/security/cve/CVE-2023-39615CVE-2023-39615CVE-2023-39615https://bugzilla.redhat.com/22358642235864https://errata.almalinux.org/9/ALSA-2023-7747.htmlALSA-2023:7747ALSA-2023:7747 >6libxml2-devel-2.9.13-5.el9_3.i686.rpm>6libxml2-devel-2.9.13-5.el9_3.x86_64.rpm>6libxml2-devel-2.9.13-5.el9_3.i686.rpm>6libxml2-devel-2.9.13-5.el9_3.x86_64.rpmK& &PBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security updateRhttps://access.redhat.com/errata/RHSA-2023:7753RHSA-2023:7753RHSA-2023:7753 https://access.redhat.com/security/cve/CVE-2023-37920CVE-2023-37920CVE-2023-37920https://access.redhat.com/security/cve/CVE-2023-43804CVE-2023-43804CVE-2023-43804https://bugzilla.redhat.com/22265862226586https://bugzilla.redhat.com/22424932242493https://errata.almalinux.org/9/ALSA-2023-7753.htmlALSA-2023:7753ALSA-2023:7753 $fence-virtd-multicast-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-virt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm^$fence-agents-ibm-vpc-4.10.0-55.el9_3.2.alma.1.noarch.rpm$fence-virtd-tcp-4.10.0-55.el9_3.2.alma.1.x86_64.rpm]$fence-agents-ibm-powervs-4.10.0-55.el9_3.2.alma.1.noarch.rpm$fence-virtd-libvirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-agents-compute-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-virtd-cpg-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-agents-kubevirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-virtd-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-virtd-serial-4.10.0-55.el9_3.2.alma.1.x86_64.rpm\$fence-agents-common-4.10.0-55.el9_3.2.alma.1.noarch.rpm_$fence-agents-virsh-4.10.0-55.el9_3.2.alma.1.noarch.rpm $fence-virtd-multicast-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-virt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm^$fence-agents-ibm-vpc-4.10.0-55.el9_3.2.alma.1.noarch.rpm$fence-virtd-tcp-4.10.0-55.el9_3.2.alma.1.x86_64.rpm]$fence-agents-ibm-powervs-4.10.0-55.el9_3.2.alma.1.noarch.rpm$fence-virtd-libvirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-agents-compute-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-virtd-cpg-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-agents-kubevirt-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-virtd-4.10.0-55.el9_3.2.alma.1.x86_64.rpm$fence-virtd-serial-4.10.0-55.el9_3.2.alma.1.x86_64.rpm\$fence-agents-common-4.10.0-55.el9_3.2.alma.1.noarch.rpm_$fence-agents-virsh-4.10.0-55.el9_3.2.alma.1.noarch.rpm' -gBBBBsecurityModerate: pixman security updateQhttps://access.redhat.com/errata/RHSA-2023:7754RHSA-2023:7754RHSA-2023:7754 https://access.redhat.com/security/cve/CVE-2022-44638CVE-2022-44638CVE-2022-44638https://bugzilla.redhat.com/21399882139988https://errata.almalinux.org/9/ALSA-2023-7754.htmlALSA-2023:7754ALSA-2023:7754 =1pixman-devel-0.40.0-6.el9_3.x86_64.rpm<1pixman-0.40.0-6.el9_3.x86_64.rpm<1pixman-0.40.0-6.el9_3.i686.rpm=1pixman-devel-0.40.0-6.el9_3.i686.rpm=1pixman-devel-0.40.0-6.el9_3.x86_64.rpm<1pixman-0.40.0-6.el9_3.x86_64.rpm<1pixman-0.40.0-6.el9_3.i686.rpm=1pixman-devel-0.40.0-6.el9_3.i686.rpmR( 2nBBsecurityModerate: skopeo security updateVZ https://access.redhat.com/errata/RHSA-2023:7762RHSA-2023:7762RHSA-2023:7762 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7762.htmlALSA-2023:7762ALSA-2023:7762 ;~skopeo-1.13.3-3.el9_3.x86_64.rpm<~skopeo-tests-1.13.3-3.el9_3.x86_64.rpm;~skopeo-1.13.3-3.el9_3.x86_64.rpm<~skopeo-tests-1.13.3-3.el9_3.x86_64.rpmK) 5ssecurityModerate: runc security update0qhttps://access.redhat.com/errata/RHSA-2023:7763RHSA-2023:7763RHSA-2023:7763 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7763.htmlALSA-2023:7763ALSA-2023:7763 W^runc-1.1.9-2.el9_3.x86_64.rpmW^runc-1.1.9-2.el9_3.x86_64.rpmI* :vBBsecurityModerate: buildah security update! https://access.redhat.com/errata/RHSA-2023:7764RHSA-2023:7764RHSA-2023:7764 https://access.redhat.com/security/cve/CVE-2023-29409CVE-2023-29409CVE-2023-29409https://access.redhat.com/security/cve/CVE-2023-39318CVE-2023-39318CVE-2023-39318https://access.redhat.com/security/cve/CVE-2023-39319CVE-2023-39319CVE-2023-39319https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://bugzilla.redhat.com/22287432228743https://bugzilla.redhat.com/22377732237773https://bugzilla.redhat.com/22377762237776https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://errata.almalinux.org/9/ALSA-2023-7764.htmlALSA-2023:7764ALSA-2023:7764 pgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpmvpostgresql-server-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm7vpostgresql-static-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm4vpostgresql-docs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmvpostgresql-upgrade-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm1;pg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpmvpostgresql-plperl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmvpostgresql-contrib-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm9vpostgresql-upgrade-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm4vpostgresql-test-rpm-macros-15.5-1.module_el9.3.0+52+21733919.noarch.rpmvpostgresql-plpython3-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm5vpostgresql-private-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmY.f'vpostgresql-pltcl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm8vpostgresql-test-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm6vpostgresql-server-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmYvpostgresql-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmvpostgresql-private-libs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm2>pgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpmvpostgresql-server-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm7vpostgresql-static-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm4vpostgresql-docs-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmvpostgresql-upgrade-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm1;pg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpmvpostgresql-plperl-15.5-1.module_el9.3.0+52+21733919.x86_64.rpmvpostgresql-contrib-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm9vpostgresql-upgrade-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm4vpostgresql-test-rpm-macros-15.5-1.module_el9.3.0+52+21733919.noarch.rpmvpostgresql-plpython3-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm5vpostgresql-private-devel-15.5-1.module_el9.3.0+52+21733919.x86_64.rpm&/  ?qBBBBBBBB_BvBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security updaterhttps://access.redhat.com/errata/RHSA-2024:0387RHSA-2024:0387RHSA-2024:0387 https://access.redhat.com/security/cve/CVE-2023-0567CVE-2023-0567CVE-2023-0567https://access.redhat.com/security/cve/CVE-2023-0568CVE-2023-0568CVE-2023-0568https://access.redhat.com/security/cve/CVE-2023-0662CVE-2023-0662CVE-2023-0662https://access.redhat.com/security/cve/CVE-2023-3247CVE-2023-3247CVE-2023-3247https://access.redhat.com/security/cve/CVE-2023-3823CVE-2023-3823CVE-2023-3823https://access.redhat.com/security/cve/CVE-2023-3824CVE-2023-3824CVE-2023-3824https://bugzilla.redhat.com/21707612170761https://bugzilla.redhat.com/21707702170770https://bugzilla.redhat.com/21707712170771https://bugzilla.redhat.com/22192902219290https://bugzilla.redhat.com/22293962229396https://bugzilla.redhat.com/22301012230101https://errata.almalinux.org/9/ALSA-2024-0387.htmlALSA-2024:0387ALSA-2024:0387 6g'sDphp-fpm-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmnDphp-dbg-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmAphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmDphp-snmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmwDphp-ldap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm?vphp-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpmvDphp-intl-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm|Dphp-pdo-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmtDphp-gd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmlDphp-common-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmoDphp-devel-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm~Dphp-process-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmqDphp-enchant-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmDphp-xml-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmjDphp-bcmath-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmkDphp-cli-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpm{Dphp-opcache-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmrDphp-ffi-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmxDphp-mbstring-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm>|php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmyDphp-mysqlnd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm}Dphp-pgsql-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmDphp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmDphp-soap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmmDphp-dba-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmf|apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmpDphp-embedded-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm=|php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmuDphp-gmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmzDphp-odbc-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm6g'sDphp-fpm-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmnDphp-dbg-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmAphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmDphp-snmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmwDphp-ldap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm?vphp-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpmvDphp-intl-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm|Dphp-pdo-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmtDphp-gd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmlDphp-common-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmoDphp-devel-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm~Dphp-process-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmqDphp-enchant-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmDphp-xml-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmjDphp-bcmath-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmkDphp-cli-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpm{Dphp-opcache-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmrDphp-ffi-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmxDphp-mbstring-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm>|php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmyDphp-mysqlnd-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm}Dphp-pgsql-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmDphp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmDphp-soap-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmmDphp-dba-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmf|apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmpDphp-embedded-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm=|php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmuDphp-gmp-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpmzDphp-odbc-8.1.27-1.module_el9.3.0+53+44872dd1.x86_64.rpm˴[? @BBBBBBBBBBBBBsecurityModerate: rpm security updatewhttps://access.redhat.com/errata/RHSA-2024:0463RHSA-2024:0463RHSA-2024:0463 https://access.redhat.com/security/cve/CVE-2021-35937CVE-2021-35937CVE-2021-35937https://access.redhat.com/security/cve/CVE-2021-35938CVE-2021-35938CVE-2021-35938https://access.redhat.com/security/cve/CVE-2021-35939CVE-2021-35939CVE-2021-35939https://bugzilla.redhat.com/19641141964114https://bugzilla.redhat.com/19641251964125https://bugzilla.redhat.com/19641291964129https://errata.almalinux.org/9/ALSA-2024-0463.htmlALSA-2024:0463ALSA-2024:0463 {rpm-build-4.16.1.3-27.el9_3.x86_64.rpmFrpm-devel-4.16.1.3-27.el9_3.i686.rpm}rpm-plugin-ima-4.16.1.3-27.el9_3.x86_64.rpmlrpm-apidocs-4.16.1.3-27.el9_3.noarch.rpmrpm-plugin-systemd-inhibit-4.16.1.3-27.el9_3.x86_64.rpmFrpm-devel-4.16.1.3-27.el9_3.x86_64.rpm~rpm-plugin-syslog-4.16.1.3-27.el9_3.x86_64.rpm|rpm-plugin-fapolicyd-4.16.1.3-27.el9_3.x86_64.rpmmrpm-cron-4.16.1.3-27.el9_3.noarch.rpm {rpm-build-4.16.1.3-27.el9_3.x86_64.rpmFrpm-devel-4.16.1.3-27.el9_3.i686.rpm}rpm-plugin-ima-4.16.1.3-27.el9_3.x86_64.rpmlrpm-apidocs-4.16.1.3-27.el9_3.noarch.rpmrpm-plugin-systemd-inhibit-4.16.1.3-27.el9_3.x86_64.rpmFrpm-devel-4.16.1.3-27.el9_3.x86_64.rpm~rpm-plugin-syslog-4.16.1.3-27.el9_3.x86_64.rpm|rpm-plugin-fapolicyd-4.16.1.3-27.el9_3.x86_64.rpmmrpm-cron-4.16.1.3-27.el9_3.noarch.rpm˰3@ PBBBBsecurityModerate: sqlite security updatehttps://access.redhat.com/errata/RHSA-2024:0465RHSA-2024:0465RHSA-2024:0465 https://access.redhat.com/security/cve/CVE-2023-7104CVE-2023-7104CVE-2023-7104https://bugzilla.redhat.com/22561942256194https://errata.almalinux.org/9/ALSA-2024-0465.htmlALSA-2024:0465ALSA-2024:0465 *Usqlite-devel-3.34.1-7.el9_3.x86_64.rpm)Usqlite-3.34.1-7.el9_3.x86_64.rpm)Usqlite-3.34.1-7.el9_3.i686.rpm*Usqlite-devel-3.34.1-7.el9_3.i686.rpm*Usqlite-devel-3.34.1-7.el9_3.x86_64.rpm)Usqlite-3.34.1-7.el9_3.x86_64.rpm)Usqlite-3.34.1-7.el9_3.i686.rpm*Usqlite-devel-3.34.1-7.el9_3.i686.rpm˩7A WBBBBsecurityModerate: python3.9 security updatechttps://access.redhat.com/errata/RHSA-2024:0466RHSA-2024:0466RHSA-2024:0466 https://access.redhat.com/security/cve/CVE-2023-27043CVE-2023-27043CVE-2023-27043https://bugzilla.redhat.com/21961832196183https://errata.almalinux.org/9/ALSA-2024-0466.htmlALSA-2024:0466ALSA-2024:0466 1cpython3-tkinter-3.9.18-1.el9_3.1.x86_64.rpmgcpython-unversioned-command-3.9.18-1.el9_3.1.noarch.rpmRcpython3-devel-3.9.18-1.el9_3.1.x86_64.rpmRcpython3-devel-3.9.18-1.el9_3.1.i686.rpm1cpython3-tkinter-3.9.18-1.el9_3.1.x86_64.rpmgcpython-unversioned-command-3.9.18-1.el9_3.1.noarch.rpmRcpython3-devel-3.9.18-1.el9_3.1.x86_64.rpmRcpython3-devel-3.9.18-1.el9_3.1.i686.rpmˤB &^BBBBBBsecurityModerate: tomcat security updateq https://access.redhat.com/errata/RHSA-2024:0474RHSA-2024:0474RHSA-2024:0474 https://access.redhat.com/security/cve/CVE-2023-41080CVE-2023-41080CVE-2023-41080https://access.redhat.com/security/cve/CVE-2023-42794CVE-2023-42794CVE-2023-42794https://access.redhat.com/security/cve/CVE-2023-42795CVE-2023-42795CVE-2023-42795https://access.redhat.com/security/cve/CVE-2023-45648CVE-2023-45648CVE-2023-45648https://bugzilla.redhat.com/22353702235370https://bugzilla.redhat.com/22437492243749https://bugzilla.redhat.com/22437512243751https://bugzilla.redhat.com/22437522243752https://errata.almalinux.org/9/ALSA-2024-0474.htmlALSA-2024:0474ALSA-2024:0474 ktomcat-jsp-2.3-api-9.0.62-37.el9_3.1.noarch.rpmitomcat-docs-webapp-9.0.62-37.el9_3.1.noarch.rpmntomcat-webapps-9.0.62-37.el9_3.1.noarch.rpmjtomcat-el-3.0-api-9.0.62-37.el9_3.1.noarch.rpmmtomcat-servlet-4.0-api-9.0.62-37.el9_3.1.noarch.rpmltomcat-lib-9.0.62-37.el9_3.1.noarch.rpmgtomcat-9.0.62-37.el9_3.1.noarch.rpmhtomcat-admin-webapps-9.0.62-37.el9_3.1.noarch.rpmktomcat-jsp-2.3-api-9.0.62-37.el9_3.1.noarch.rpmitomcat-docs-webapp-9.0.62-37.el9_3.1.noarch.rpmntomcat-webapps-9.0.62-37.el9_3.1.noarch.rpmjtomcat-el-3.0-api-9.0.62-37.el9_3.1.noarch.rpmmtomcat-servlet-4.0-api-9.0.62-37.el9_3.1.noarch.rpmltomcat-lib-9.0.62-37.el9_3.1.noarch.rpmgtomcat-9.0.62-37.el9_3.1.noarch.rpmhtomcat-admin-webapps-9.0.62-37.el9_3.1.noarch.rpmˢ#C *gBsecurityModerate: frr security update https://access.redhat.com/errata/RHSA-2024:0477RHSA-2024:0477RHSA-2024:0477 https://access.redhat.com/security/cve/CVE-2023-38406CVE-2023-38406CVE-2023-38406https://access.redhat.com/security/cve/CVE-2023-38407CVE-2023-38407CVE-2023-38407https://access.redhat.com/security/cve/CVE-2023-47234CVE-2023-47234CVE-2023-47234https://access.redhat.com/security/cve/CVE-2023-47235CVE-2023-47235CVE-2023-47235https://bugzilla.redhat.com/22482072248207https://bugzilla.redhat.com/22482082248208https://bugzilla.redhat.com/22485262248526https://bugzilla.redhat.com/22485282248528https://errata.almalinux.org/9/ALSA-2024-0477.htmlALSA-2024:0477ALSA-2024:0477 ]frr-8.3.1-11.el9_3.2.alma.1.x86_64.rpm]frr-selinux-8.3.1-11.el9_3.2.alma.1.noarch.rpm]frr-8.3.1-11.el9_3.2.alma.1.x86_64.rpm]frr-selinux-8.3.1-11.el9_3.2.alma.1.noarch.rpmˠ(D 6kBBBBBBBBBsecurityModerate: gnutls security update0Ghttps://access.redhat.com/errata/RHSA-2024:0533RHSA-2024:0533RHSA-2024:0533 https://access.redhat.com/security/cve/CVE-2023-5981CVE-2023-5981CVE-2023-5981https://access.redhat.com/security/cve/CVE-2024-0553CVE-2024-0553CVE-2024-0553https://access.redhat.com/security/cve/CVE-2024-0567CVE-2024-0567CVE-2024-0567https://bugzilla.redhat.com/22484452248445https://bugzilla.redhat.com/22584122258412https://bugzilla.redhat.com/22585442258544https://errata.almalinux.org/9/ALSA-2024-0533.htmlALSA-2024:0533ALSA-2024:0533 Qgnutls-dane-3.7.6-23.el9_3.3.i686.rpmRgnutls-devel-3.7.6-23.el9_3.3.i686.rpmPgnutls-c++-3.7.6-23.el9_3.3.i686.rpmgnutls-utils-3.7.6-23.el9_3.3.x86_64.rpmPgnutls-c++-3.7.6-23.el9_3.3.x86_64.rpmQgnutls-dane-3.7.6-23.el9_3.3.x86_64.rpmRgnutls-devel-3.7.6-23.el9_3.3.x86_64.rpmQgnutls-dane-3.7.6-23.el9_3.3.i686.rpmRgnutls-devel-3.7.6-23.el9_3.3.i686.rpmPgnutls-c++-3.7.6-23.el9_3.3.i686.rpmgnutls-utils-3.7.6-23.el9_3.3.x86_64.rpmPgnutls-c++-3.7.6-23.el9_3.3.x86_64.rpmQgnutls-dane-3.7.6-23.el9_3.3.x86_64.rpmRgnutls-devel-3.7.6-23.el9_3.3.x86_64.rpm߲E wBBBBBBBBBsecurityImportant: tigervnc security updatewo https://access.redhat.com/errata/RHSA-2024:0557RHSA-2024:0557RHSA-2024:0557 https://access.redhat.com/security/cve/CVE-2023-6816CVE-2023-6816CVE-2023-6816https://access.redhat.com/security/cve/CVE-2024-0229CVE-2024-0229CVE-2024-0229https://access.redhat.com/security/cve/CVE-2024-21885CVE-2024-21885CVE-2024-21885https://access.redhat.com/security/cve/CVE-2024-21886CVE-2024-21886CVE-2024-21886https://bugzilla.redhat.com/22565402256540https://bugzilla.redhat.com/22565422256542https://bugzilla.redhat.com/22566902256690https://bugzilla.redhat.com/22576912257691https://errata.almalinux.org/9/ALSA-2024-0557.htmlALSA-2024:0557ALSA-2024:0557 nvtigervnc-1.13.1-3.el9_3.6.alma.1.x86_64.rpm8vtigervnc-license-1.13.1-3.el9_3.6.alma.1.noarch.rpmovtigervnc-server-1.13.1-3.el9_3.6.alma.1.x86_64.rpmpvtigervnc-server-minimal-1.13.1-3.el9_3.6.alma.1.x86_64.rpmqvtigervnc-server-module-1.13.1-3.el9_3.6.alma.1.x86_64.rpm7vtigervnc-icons-1.13.1-3.el9_3.6.alma.1.noarch.rpm9vtigervnc-selinux-1.13.1-3.el9_3.6.alma.1.noarch.rpmnvtigervnc-1.13.1-3.el9_3.6.alma.1.x86_64.rpm8vtigervnc-license-1.13.1-3.el9_3.6.alma.1.noarch.rpmovtigervnc-server-1.13.1-3.el9_3.6.alma.1.x86_64.rpmpvtigervnc-server-minimal-1.13.1-3.el9_3.6.alma.1.x86_64.rpmqvtigervnc-server-module-1.13.1-3.el9_3.6.alma.1.x86_64.rpm7vtigervnc-icons-1.13.1-3.el9_3.6.alma.1.noarch.rpm9vtigervnc-selinux-1.13.1-3.el9_3.6.alma.1.noarch.rpmWF CsecurityImportant: thunderbird security updatefhttps://access.redhat.com/errata/RHSA-2024:0602RHSA-2024:0602RHSA-2024:0602 https://access.redhat.com/security/cve/CVE-2024-0741CVE-2024-0741CVE-2024-0741https://access.redhat.com/security/cve/CVE-2024-0742CVE-2024-0742CVE-2024-0742https://access.redhat.com/security/cve/CVE-2024-0746CVE-2024-0746CVE-2024-0746https://access.redhat.com/security/cve/CVE-2024-0747CVE-2024-0747CVE-2024-0747https://access.redhat.com/security/cve/CVE-2024-0749CVE-2024-0749CVE-2024-0749https://access.redhat.com/security/cve/CVE-2024-0750CVE-2024-0750CVE-2024-0750https://access.redhat.com/security/cve/CVE-2024-0751CVE-2024-0751CVE-2024-0751https://access.redhat.com/security/cve/CVE-2024-0753CVE-2024-0753CVE-2024-0753https://access.redhat.com/security/cve/CVE-2024-0755CVE-2024-0755CVE-2024-0755https://bugzilla.redhat.com/22599262259926https://bugzilla.redhat.com/22599272259927https://bugzilla.redhat.com/22599282259928https://bugzilla.redhat.com/22599292259929https://bugzilla.redhat.com/22599302259930https://bugzilla.redhat.com/22599312259931https://bugzilla.redhat.com/22599322259932https://bugzilla.redhat.com/22599332259933https://bugzilla.redhat.com/22599342259934https://errata.almalinux.org/9/ALSA-2024-0602.htmlALSA-2024:0602ALSA-2024:0602 9Bthunderbird-115.7.0-1.el9_3.alma.x86_64.rpm9Bthunderbird-115.7.0-1.el9_3.alma.x86_64.rpmG FBBsecurityImportant: firefox security updatevAhttps://access.redhat.com/errata/RHSA-2024:0603RHSA-2024:0603RHSA-2024:0603 https://access.redhat.com/security/cve/CVE-2024-0741CVE-2024-0741CVE-2024-0741https://access.redhat.com/security/cve/CVE-2024-0742CVE-2024-0742CVE-2024-0742https://access.redhat.com/security/cve/CVE-2024-0746CVE-2024-0746CVE-2024-0746https://access.redhat.com/security/cve/CVE-2024-0747CVE-2024-0747CVE-2024-0747https://access.redhat.com/security/cve/CVE-2024-0749CVE-2024-0749CVE-2024-0749https://access.redhat.com/security/cve/CVE-2024-0750CVE-2024-0750CVE-2024-0750https://access.redhat.com/security/cve/CVE-2024-0751CVE-2024-0751CVE-2024-0751https://access.redhat.com/security/cve/CVE-2024-0753CVE-2024-0753CVE-2024-0753https://access.redhat.com/security/cve/CVE-2024-0755CVE-2024-0755CVE-2024-0755https://bugzilla.redhat.com/22599262259926https://bugzilla.redhat.com/22599272259927https://bugzilla.redhat.com/22599282259928https://bugzilla.redhat.com/22599292259929https://bugzilla.redhat.com/22599302259930https://bugzilla.redhat.com/22599312259931https://bugzilla.redhat.com/22599322259932https://bugzilla.redhat.com/22599332259933https://bugzilla.redhat.com/22599342259934https://errata.almalinux.org/9/ALSA-2024-0603.htmlALSA-2024:0603ALSA-2024:0603 OBfirefox-x11-115.7.0-1.el9_3.alma.x86_64.rpm7Bfirefox-115.7.0-1.el9_3.alma.x86_64.rpmOBfirefox-x11-115.7.0-1.el9_3.alma.x86_64.rpm7Bfirefox-115.7.0-1.el9_3.alma.x86_64.rpm8H KsecurityImportant: runc security update7|https://access.redhat.com/errata/RHSA-2024:0670RHSA-2024:0670RHSA-2024:0670 https://access.redhat.com/security/cve/CVE-2024-21626CVE-2024-21626CVE-2024-21626https://bugzilla.redhat.com/22587252258725https://errata.almalinux.org/9/ALSA-2024-0670.htmlALSA-2024:0670ALSA-2024:0670 WWrunc-1.1.12-1.el9_3.x86_64.rpmWWrunc-1.1.12-1.el9_3.x86_64.rpm1I NBBBsecurityImportant: gimp security update3 https://access.redhat.com/errata/RHSA-2024:0675RHSA-2024:0675RHSA-2024:0675 https://access.redhat.com/security/cve/CVE-2023-44441CVE-2023-44441CVE-2023-44441https://access.redhat.com/security/cve/CVE-2023-44442CVE-2023-44442CVE-2023-44442https://access.redhat.com/security/cve/CVE-2023-44443CVE-2023-44443CVE-2023-44443https://access.redhat.com/security/cve/CVE-2023-44444CVE-2023-44444CVE-2023-44444https://bugzilla.redhat.com/22499382249938https://bugzilla.redhat.com/22499422249942https://bugzilla.redhat.com/22499442249944https://bugzilla.redhat.com/22499462249946https://errata.almalinux.org/9/ALSA-2024-0675.htmlALSA-2024:0675ALSA-2024:0675 c<gimp-2.99.8-4.el9_3.x86_64.rpm<gimp-libs-2.99.8-4.el9_3.x86_64.rpm<gimp-libs-2.99.8-4.el9_3.i686.rpmc<gimp-2.99.8-4.el9_3.x86_64.rpm<gimp-libs-2.99.8-4.el9_3.x86_64.rpm<gimp-libs-2.99.8-4.el9_3.i686.rpm=J 6TBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: nss security updateQ:https://access.redhat.com/errata/RHSA-2024:0790RHSA-2024:0790RHSA-2024:0790 https://access.redhat.com/security/cve/CVE-2023-6135CVE-2023-6135CVE-2023-6135https://bugzilla.redhat.com/22499062249906https://errata.almalinux.org/9/ALSA-2024-0790.htmlALSA-2024:0790ALSA-2024:0790 *jnss-util-3.90.0-6.el9_3.x86_64.rpm+jnss-util-devel-3.90.0-6.el9_3.i686.rpm(jnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm(jnss-softokn-freebl-3.90.0-6.el9_3.i686.rpm)jnss-softokn-freebl-devel-3.90.0-6.el9_3.i686.rpm'jnss-softokn-devel-3.90.0-6.el9_3.i686.rpm*jnss-util-3.90.0-6.el9_3.i686.rpm"vnspr-4.35.0-6.el9_3.x86_64.rpm#vnspr-devel-4.35.0-6.el9_3.i686.rpm'jnss-softokn-devel-3.90.0-6.el9_3.x86_64.rpm\jnss-tools-3.90.0-6.el9_3.x86_64.rpm$jnss-3.90.0-6.el9_3.i686.rpm%jnss-devel-3.90.0-6.el9_3.x86_64.rpm[jnss-sysinit-3.90.0-6.el9_3.x86_64.rpm%jnss-devel-3.90.0-6.el9_3.i686.rpm$jnss-3.90.0-6.el9_3.x86_64.rpm+jnss-util-devel-3.90.0-6.el9_3.x86_64.rpm&jnss-softokn-3.90.0-6.el9_3.i686.rpm&jnss-softokn-3.90.0-6.el9_3.x86_64.rpm)jnss-softokn-freebl-devel-3.90.0-6.el9_3.x86_64.rpm"vnspr-4.35.0-6.el9_3.i686.rpm#vnspr-devel-4.35.0-6.el9_3.x86_64.rpm*jnss-util-3.90.0-6.el9_3.x86_64.rpm+jnss-util-devel-3.90.0-6.el9_3.i686.rpm(jnss-softokn-freebl-3.90.0-6.el9_3.x86_64.rpm(jnss-softokn-freebl-3.90.0-6.el9_3.i686.rpm)jnss-softokn-freebl-devel-3.90.0-6.el9_3.i686.rpm'jnss-softokn-devel-3.90.0-6.el9_3.i686.rpm*jnss-util-3.90.0-6.el9_3.i686.rpm"vnspr-4.35.0-6.el9_3.x86_64.rpm#vnspr-devel-4.35.0-6.el9_3.i686.rpm'jnss-softokn-devel-3.90.0-6.el9_3.x86_64.rpm\jnss-tools-3.90.0-6.el9_3.x86_64.rpm$jnss-3.90.0-6.el9_3.i686.rpm%jnss-devel-3.90.0-6.el9_3.x86_64.rpm[jnss-sysinit-3.90.0-6.el9_3.x86_64.rpm%jnss-devel-3.90.0-6.el9_3.i686.rpm$jnss-3.90.0-6.el9_3.x86_64.rpm+jnss-util-devel-3.90.0-6.el9_3.x86_64.rpm&jnss-softokn-3.90.0-6.el9_3.i686.rpm&jnss-softokn-3.90.0-6.el9_3.x86_64.rpm)jnss-softokn-freebl-devel-3.90.0-6.el9_3.x86_64.rpm"vnspr-4.35.0-6.el9_3.i686.rpm#vnspr-devel-4.35.0-6.el9_3.x86_64.rpm9K wBBBBBBBBBBBBBBsecurityImportant: dotnet7.0 security update xhttps://access.redhat.com/errata/RHSA-2024:0805RHSA-2024:0805RHSA-2024:0805 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0805.htmlALSA-2024:0805ALSA-2024:0805 i1dotnet-sdk-7.0-7.0.116-1.el9_3.x86_64.rpmk1dotnet-templates-7.0-7.0.116-1.el9_3.x86_64.rpmfAdotnet-apphost-pack-7.0-7.0.16-1.el9_3.x86_64.rpmeAaspnetcore-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpmjAdotnet-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpmhAdotnet-runtime-7.0-7.0.16-1.el9_3.x86_64.rpmgAdotnet-hostfxr-7.0-7.0.16-1.el9_3.x86_64.rpmdAaspnetcore-runtime-7.0-7.0.16-1.el9_3.x86_64.rpmi1dotnet-sdk-7.0-7.0.116-1.el9_3.x86_64.rpmk1dotnet-templates-7.0-7.0.116-1.el9_3.x86_64.rpmfAdotnet-apphost-pack-7.0-7.0.16-1.el9_3.x86_64.rpmeAaspnetcore-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpmjAdotnet-targeting-pack-7.0-7.0.16-1.el9_3.x86_64.rpmhAdotnet-runtime-7.0-7.0.16-1.el9_3.x86_64.rpmgAdotnet-hostfxr-7.0-7.0.16-1.el9_3.x86_64.rpmdAaspnetcore-runtime-7.0-7.0.16-1.el9_3.x86_64.rpmBL HBBBBBBBBBBBBBBsecurityImportant: dotnet6.0 security updatexhttps://access.redhat.com/errata/RHSA-2024:0807RHSA-2024:0807RHSA-2024:0807 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0807.htmlALSA-2024:0807ALSA-2024:0807 %*dotnet-sdk-6.0-6.0.127-1.el9_3.x86_64.rpm!<aspnetcore-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpm'*dotnet-templates-6.0-6.0.127-1.el9_3.x86_64.rpm <aspnetcore-runtime-6.0-6.0.27-1.el9_3.x86_64.rpm&<dotnet-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpm"<dotnet-apphost-pack-6.0-6.0.27-1.el9_3.x86_64.rpm$<dotnet-runtime-6.0-6.0.27-1.el9_3.x86_64.rpm#<dotnet-hostfxr-6.0-6.0.27-1.el9_3.x86_64.rpm%*dotnet-sdk-6.0-6.0.127-1.el9_3.x86_64.rpm!<aspnetcore-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpm'*dotnet-templates-6.0-6.0.127-1.el9_3.x86_64.rpm <aspnetcore-runtime-6.0-6.0.27-1.el9_3.x86_64.rpm&<dotnet-targeting-pack-6.0-6.0.27-1.el9_3.x86_64.rpm"<dotnet-apphost-pack-6.0-6.0.27-1.el9_3.x86_64.rpm$<dotnet-runtime-6.0-6.0.27-1.el9_3.x86_64.rpm#<dotnet-hostfxr-6.0-6.0.27-1.el9_3.x86_64.rpm3M YsecurityModerate: sudo security update{|https://access.redhat.com/errata/RHSA-2024:0811RHSA-2024:0811RHSA-2024:0811 https://access.redhat.com/security/cve/CVE-2023-28486CVE-2023-28486CVE-2023-28486https://access.redhat.com/security/cve/CVE-2023-28487CVE-2023-28487CVE-2023-28487https://access.redhat.com/security/cve/CVE-2023-42465CVE-2023-42465CVE-2023-42465https://bugzilla.redhat.com/21792722179272https://bugzilla.redhat.com/21792732179273https://bugzilla.redhat.com/22555682255568https://errata.almalinux.org/9/ALSA-2024-0811.htmlALSA-2024:0811ALSA-2024:0811 b$sudo-python-plugin-1.9.5p2-10.el9_3.x86_64.rpmb$sudo-python-plugin-1.9.5p2-10.el9_3.x86_64.rpm[N 0\BBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updatewwhttps://access.redhat.com/errata/RHSA-2024:0848RHSA-2024:0848RHSA-2024:0848 https://access.redhat.com/security/cve/CVE-2024-21386CVE-2024-21386CVE-2024-21386https://access.redhat.com/security/cve/CVE-2024-21404CVE-2024-21404CVE-2024-21404https://bugzilla.redhat.com/22630852263085https://bugzilla.redhat.com/22630862263086https://errata.almalinux.org/9/ALSA-2024-0848.htmlALSA-2024:0848ALSA-2024:0848 T7aspnetcore-runtime-8.0-8.0.2-2.el9_3.x86_64.rpm mnetstandard-targeting-pack-2.1-8.0.102-2.el9_3.x86_64.rpm7dotnet-host-8.0.2-2.el9_3.x86_64.rpmZ7dotnet-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpm[mdotnet-templates-8.0-8.0.102-2.el9_3.x86_64.rpmV7dotnet-apphost-pack-8.0-8.0.2-2.el9_3.x86_64.rpmU7aspnetcore-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpmX7dotnet-runtime-8.0-8.0.2-2.el9_3.x86_64.rpmW7dotnet-hostfxr-8.0-8.0.2-2.el9_3.x86_64.rpmYmdotnet-sdk-8.0-8.0.102-2.el9_3.x86_64.rpm T7aspnetcore-runtime-8.0-8.0.2-2.el9_3.x86_64.rpm mnetstandard-targeting-pack-2.1-8.0.102-2.el9_3.x86_64.rpm7dotnet-host-8.0.2-2.el9_3.x86_64.rpmZ7dotnet-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpm[mdotnet-templates-8.0-8.0.102-2.el9_3.x86_64.rpmV7dotnet-apphost-pack-8.0-8.0.2-2.el9_3.x86_64.rpmU7aspnetcore-targeting-pack-8.0-8.0.2-2.el9_3.x86_64.rpmX7dotnet-runtime-8.0-8.0.2-2.el9_3.x86_64.rpmW7dotnet-hostfxr-8.0-8.0.2-2.el9_3.x86_64.rpmYmdotnet-sdk-8.0-8.0.102-2.el9_3.x86_64.rpmO ZBBBBBSBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security updaten https://access.redhat.com/errata/RHSA-2024:0950RHSA-2024:0950RHSA-2024:0950 https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0950.htmlALSA-2024:0950ALSA-2024:0950 Y.h'3?postgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm9wpostgresql-upgrade-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm2>pgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpmwpostgresql-pltcl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmwpostgresql-private-libs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm8wpostgresql-test-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmYwpostgresql-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmwpostgresql-contrib-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm6wpostgresql-server-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmwpostgresql-server-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmwpostgresql-upgrade-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm1;pg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm4wpostgresql-docs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmwpostgresql-plpython3-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm4wpostgresql-test-rpm-macros-15.6-1.module_el9.3.0+55+d62f4779.noarch.rpmwpostgresql-plperl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm7wpostgresql-static-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm5wpostgresql-private-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmY.h'3?postgres-decoderbufs-1.9.7-1.Final.module_el9.2.0+22+09653793.x86_64.rpm9wpostgresql-upgrade-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm2>pgaudit-1.7.0-1.module_el9.2.0+22+09653793.x86_64.rpmwpostgresql-pltcl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmwpostgresql-private-libs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm8wpostgresql-test-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmYwpostgresql-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmwpostgresql-contrib-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm6wpostgresql-server-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmwpostgresql-server-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmwpostgresql-upgrade-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm1;pg_repack-1.4.8-1.module_el9.2.0+22+09653793.x86_64.rpm4wpostgresql-docs-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmwpostgresql-plpython3-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm4wpostgresql-test-rpm-macros-15.6-1.module_el9.3.0+55+d62f4779.noarch.rpmwpostgresql-plperl-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm7wpostgresql-static-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpm5wpostgresql-private-devel-15.6-1.module_el9.3.0+55+d62f4779.x86_64.rpmqP OBBBBBBBBBBBBBBsecurityImportant: postgresql security updatew https://access.redhat.com/errata/RHSA-2024:0951RHSA-2024:0951RHSA-2024:0951 https://access.redhat.com/security/cve/CVE-2024-0985CVE-2024-0985CVE-2024-0985https://bugzilla.redhat.com/22633842263384https://errata.almalinux.org/9/ALSA-2024-0951.htmlALSA-2024:0951ALSA-2024:0951 Ypostgresql-13.14-1.el9_3.x86_64.rpmpostgresql-plperl-13.14-1.el9_3.x86_64.rpmpostgresql-contrib-13.14-1.el9_3.x86_64.rpmpostgresql-plpython3-13.14-1.el9_3.x86_64.rpmpostgresql-upgrade-13.14-1.el9_3.x86_64.rpmpostgresql-server-13.14-1.el9_3.x86_64.rpmpostgresql-pltcl-13.14-1.el9_3.x86_64.rpmpostgresql-private-libs-13.14-1.el9_3.x86_64.rpmYpostgresql-13.14-1.el9_3.x86_64.rpmpostgresql-plperl-13.14-1.el9_3.x86_64.rpmpostgresql-contrib-13.14-1.el9_3.x86_64.rpmpostgresql-plpython3-13.14-1.el9_3.x86_64.rpmpostgresql-upgrade-13.14-1.el9_3.x86_64.rpmpostgresql-server-13.14-1.el9_3.x86_64.rpmpostgresql-pltcl-13.14-1.el9_3.x86_64.rpmpostgresql-private-libs-13.14-1.el9_3.x86_64.rpmQ $`BBsecurityImportant: firefox security updatePhttps://access.redhat.com/errata/RHSA-2024:0952RHSA-2024:0952RHSA-2024:0952 https://access.redhat.com/security/cve/CVE-2024-1546CVE-2024-1546CVE-2024-1546https://access.redhat.com/security/cve/CVE-2024-1547CVE-2024-1547CVE-2024-1547https://access.redhat.com/security/cve/CVE-2024-1548CVE-2024-1548CVE-2024-1548https://access.redhat.com/security/cve/CVE-2024-1549CVE-2024-1549CVE-2024-1549https://access.redhat.com/security/cve/CVE-2024-1550CVE-2024-1550CVE-2024-1550https://access.redhat.com/security/cve/CVE-2024-1551CVE-2024-1551CVE-2024-1551https://access.redhat.com/security/cve/CVE-2024-1552CVE-2024-1552CVE-2024-1552https://access.redhat.com/security/cve/CVE-2024-1553CVE-2024-1553CVE-2024-1553https://bugzilla.redhat.com/22653492265349https://bugzilla.redhat.com/22653502265350https://bugzilla.redhat.com/22653512265351https://bugzilla.redhat.com/22653522265352https://bugzilla.redhat.com/22653532265353https://bugzilla.redhat.com/22653542265354https://bugzilla.redhat.com/22653552265355https://bugzilla.redhat.com/22653562265356https://errata.almalinux.org/9/ALSA-2024-0952.htmlALSA-2024:0952ALSA-2024:0952 OCfirefox-x11-115.8.0-1.el9_3.alma.x86_64.rpm7Cfirefox-115.8.0-1.el9_3.alma.x86_64.rpmOCfirefox-x11-115.8.0-1.el9_3.alma.x86_64.rpm7Cfirefox-115.8.0-1.el9_3.alma.x86_64.rpmhR 'esecurityImportant: thunderbird security updatePhttps://access.redhat.com/errata/RHSA-2024:0963RHSA-2024:0963RHSA-2024:0963 https://access.redhat.com/security/cve/CVE-2024-1546CVE-2024-1546CVE-2024-1546https://access.redhat.com/security/cve/CVE-2024-1547CVE-2024-1547CVE-2024-1547https://access.redhat.com/security/cve/CVE-2024-1548CVE-2024-1548CVE-2024-1548https://access.redhat.com/security/cve/CVE-2024-1549CVE-2024-1549CVE-2024-1549https://access.redhat.com/security/cve/CVE-2024-1550CVE-2024-1550CVE-2024-1550https://access.redhat.com/security/cve/CVE-2024-1551CVE-2024-1551CVE-2024-1551https://access.redhat.com/security/cve/CVE-2024-1552CVE-2024-1552CVE-2024-1552https://access.redhat.com/security/cve/CVE-2024-1553CVE-2024-1553CVE-2024-1553https://bugzilla.redhat.com/22653492265349https://bugzilla.redhat.com/22653502265350https://bugzilla.redhat.com/22653512265351https://bugzilla.redhat.com/22653522265352https://bugzilla.redhat.com/22653532265353https://bugzilla.redhat.com/22653542265354https://bugzilla.redhat.com/22653552265355https://bugzilla.redhat.com/22653562265356https://errata.almalinux.org/9/ALSA-2024-0963.htmlALSA-2024:0963ALSA-2024:0963 9Cthunderbird-115.8.0-1.el9_3.alma.x86_64.rpm9Cthunderbird-115.8.0-1.el9_3.alma.x86_64.rpmqS /hBBBBBsecurityImportant: unbound security updateo[https://access.redhat.com/errata/RHSA-2024:0977RHSA-2024:0977RHSA-2024:0977 https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-0977.htmlALSA-2024:0977ALSA-2024:0977 lyunbound-libs-1.16.2-3.el9_3.1.i686.rpmyunbound-1.16.2-3.el9_3.1.x86_64.rpmlyunbound-libs-1.16.2-3.el9_3.1.x86_64.rpm ypython3-unbound-1.16.2-3.el9_3.1.x86_64.rpmlyunbound-libs-1.16.2-3.el9_3.1.i686.rpmyunbound-1.16.2-3.el9_3.1.x86_64.rpmlyunbound-libs-1.16.2-3.el9_3.1.x86_64.rpm ypython3-unbound-1.16.2-3.el9_3.1.x86_64.rpmT ;pBBBBBBBBBsecurityImportant: tigervnc security updateJlhttps://access.redhat.com/errata/RHSA-2024:10090RHSA-2024:10090RHSA-2024:10090 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://bugzilla.redhat.com/23172332317233https://errata.almalinux.org/9/ALSA-2024-10090.htmlALSA-2024:10090ALSA-2024:10090 9ytigervnc-selinux-1.14.1-1.el9_5.noarch.rpmnytigervnc-1.14.1-1.el9_5.x86_64.rpmpytigervnc-server-minimal-1.14.1-1.el9_5.x86_64.rpmoytigervnc-server-1.14.1-1.el9_5.x86_64.rpmqytigervnc-server-module-1.14.1-1.el9_5.x86_64.rpm7ytigervnc-icons-1.14.1-1.el9_5.noarch.rpm8ytigervnc-license-1.14.1-1.el9_5.noarch.rpm9ytigervnc-selinux-1.14.1-1.el9_5.noarch.rpmnytigervnc-1.14.1-1.el9_5.x86_64.rpmpytigervnc-server-minimal-1.14.1-1.el9_5.x86_64.rpmoytigervnc-server-1.14.1-1.el9_5.x86_64.rpmqytigervnc-server-module-1.14.1-1.el9_5.x86_64.rpm7ytigervnc-icons-1.14.1-1.el9_5.noarch.rpm8ytigervnc-license-1.14.1-1.el9_5.noarch.rpm]U =rubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpmfruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmN rubygem-power_assert-2.0.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm fruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm"fruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmJfruby-default-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm*irubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm"fruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmVwrubygems-devel-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmLtrubygem-irb-1.4.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmfruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmUwrubygems-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmBlrubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmA>rubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm fruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmC*rubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpmTCrubygem-typeprof-0.21.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmDLrubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.i686.rpmS@rubygem-test-unit-3.5.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmDLrubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmPXrubygem-rdoc-6.4.1.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmC*rubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm,rubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.i686.rpmR=rubygem-rss-0.2.9-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmfruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmMMrubygem-minitest-5.15.0-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm,rubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmfruby-doc-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmpkrubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpmOrubygem-rake-13.0.6-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmnirubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpmfruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmBlrubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.i686.rpmokrubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpmKrubygem-bundler-2.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmQ4rubygem-rexml-3.2.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm"ny'$A>rubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpmfruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmN rubygem-power_assert-2.0.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm fruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpm"fruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmJfruby-default-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm*irubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpm"fruby-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmVwrubygems-devel-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmLtrubygem-irb-1.4.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmfruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmUwrubygems-3.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmBlrubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmA>rubygem-bigdecimal-3.1.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm fruby-bundled-gems-3.1.5-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmC*rubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.i686.rpmTCrubygem-typeprof-0.21.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmDLrubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.i686.rpmS@rubygem-test-unit-3.5.3-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmDLrubygem-psych-4.0.4-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmPXrubygem-rdoc-6.4.1.1-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmC*rubygem-json-2.6.1-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpm,rubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.i686.rpmR=rubygem-rss-0.2.9-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmfruby-devel-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmMMrubygem-minitest-5.15.0-145.module_el9.5.0+129+9ba7e8b1.noarch.rpm,rubygem-rbs-2.7.0-145.module_el9.5.0+129+9ba7e8b1.x86_64.rpmfruby-doc-3.1.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmpkrubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpmOrubygem-rake-13.0.6-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmnirubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpmfruby-libs-3.1.5-145.module_el9.5.0+129+9ba7e8b1.i686.rpmBlrubygem-io-console-0.5.11-145.module_el9.5.0+129+9ba7e8b1.i686.rpmokrubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpmKrubygem-bundler-2.3.27-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmQ4rubygem-rexml-3.2.5-145.module_el9.5.0+129+9ba7e8b1.noarch.rpmdc QBBBsecurityModerate: redis:7 security updateM https://access.redhat.com/errata/RHSA-2024:10869RHSA-2024:10869RHSA-2024:10869 https://access.redhat.com/security/cve/CVE-2023-41053CVE-2023-41053CVE-2023-41053https://access.redhat.com/security/cve/CVE-2023-45145CVE-2023-45145CVE-2023-45145https://access.redhat.com/security/cve/CVE-2024-31227CVE-2024-31227CVE-2024-31227https://access.redhat.com/security/cve/CVE-2024-31228CVE-2024-31228CVE-2024-31228https://access.redhat.com/security/cve/CVE-2024-31449CVE-2024-31449CVE-2024-31449https://bugzilla.redhat.com/22378262237826https://bugzilla.redhat.com/22449402244940https://bugzilla.redhat.com/23170532317053https://bugzilla.redhat.com/23170562317056https://bugzilla.redhat.com/23170582317058https://errata.almalinux.org/9/ALSA-2024-10869.htmlALSA-2024:10869ALSA-2024:10869 6cz'UUredis-devel-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm:Uredis-doc-7.2.6-1.module_el9.5.0+130+36ae7635.noarch.rpm6Uredis-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm6cz'UUredis-devel-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm:Uredis-doc-7.2.6-1.module_el9.5.0+130+36ae7635.noarch.rpm6Uredis-7.2.6-1.module_el9.5.0+130+36ae7635.x86_64.rpm#d (WBBBBBBBBBBBBBBBsecurityModerate: kernel security updatecAhttps://access.redhat.com/errata/RHSA-2024:10939RHSA-2024:10939RHSA-2024:10939 https://access.redhat.com/security/cve/CVE-2024-26615CVE-2024-26615CVE-2024-26615https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-44994CVE-2024-44994CVE-2024-44994https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://access.redhat.com/security/cve/CVE-2024-46695CVE-2024-46695CVE-2024-46695https://access.redhat.com/security/cve/CVE-2024-49949CVE-2024-49949CVE-2024-49949https://access.redhat.com/security/cve/CVE-2024-50251CVE-2024-50251CVE-2024-50251https://bugzilla.redhat.com/22673552267355https://bugzilla.redhat.com/23098572309857https://bugzilla.redhat.com/23117152311715https://bugzilla.redhat.com/23120832312083https://bugzilla.redhat.com/23205052320505https://bugzilla.redhat.com/23248862324886https://errata.almalinux.org/9/ALSA-2024-10939.htmlALSA-2024:10939ALSA-2024:10939 )Irtla-5.14.0-503.16.1.el9_5.x86_64.rpmIkernel-doc-5.14.0-503.16.1.el9_5.noarch.rpm#Ikernel-devel-5.14.0-503.16.1.el9_5.x86_64.rpm(Ikernel-headers-5.14.0-503.16.1.el9_5.x86_64.rpm%Iperf-5.14.0-503.16.1.el9_5.x86_64.rpm"Ikernel-debug-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm!Ikernel-debug-devel-5.14.0-503.16.1.el9_5.x86_64.rpm$Ikernel-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm*Irv-5.14.0-503.16.1.el9_5.x86_64.rpm )Irtla-5.14.0-503.16.1.el9_5.x86_64.rpmIkernel-doc-5.14.0-503.16.1.el9_5.noarch.rpm#Ikernel-devel-5.14.0-503.16.1.el9_5.x86_64.rpm(Ikernel-headers-5.14.0-503.16.1.el9_5.x86_64.rpm%Iperf-5.14.0-503.16.1.el9_5.x86_64.rpm"Ikernel-debug-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm!Ikernel-debug-devel-5.14.0-503.16.1.el9_5.x86_64.rpm$Ikernel-devel-matched-5.14.0-503.16.1.el9_5.x86_64.rpm*Irv-5.14.0-503.16.1.el9_5.x86_64.rpm0e DB^BBBBBBBB@BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.2 security update$https://access.redhat.com/errata/RHSA-2024:10949RHSA-2024:10949RHSA-2024:10949 https://access.redhat.com/security/cve/CVE-2024-2756CVE-2024-2756CVE-2024-2756https://access.redhat.com/security/cve/CVE-2024-3096CVE-2024-3096CVE-2024-3096https://access.redhat.com/security/cve/CVE-2024-5458CVE-2024-5458CVE-2024-5458https://access.redhat.com/security/cve/CVE-2024-8925CVE-2024-8925CVE-2024-8925https://access.redhat.com/security/cve/CVE-2024-8927CVE-2024-8927CVE-2024-8927https://access.redhat.com/security/cve/CVE-2024-9026CVE-2024-9026CVE-2024-9026https://bugzilla.redhat.com/22750582275058https://bugzilla.redhat.com/22750612275061https://bugzilla.redhat.com/22912522291252https://bugzilla.redhat.com/23170492317049https://bugzilla.redhat.com/23170512317051https://bugzilla.redhat.com/23171442317144https://errata.almalinux.org/9/ALSA-2024-10949.htmlALSA-2024:10949ALSA-2024:10949 'Gphp-soap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm~Gphp-process-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmGphp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmGphp-snmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmzGphp-odbc-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm{Gphp-opcache-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmf^apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmyGphp-mysqlnd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmvGphp-intl-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmmGphp-dba-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmjGphp-bcmath-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmqGphp-enchant-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmrGphp-ffi-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmGphp-xml-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm?php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm>^php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmA9php-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm@php-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmkGphp-cli-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmxGphp-mbstring-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmnGphp-dbg-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmsGphp-fpm-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmtGphp-gd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmoGphp-devel-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm}Gphp-pgsql-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmwGphp-ldap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm=^php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm|Gphp-pdo-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmpGphp-embedded-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmlGphp-common-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmuGphp-gmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm'Gphp-soap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm~Gphp-process-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmGphp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmGphp-snmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmzGphp-odbc-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm{Gphp-opcache-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmf^apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmyGphp-mysqlnd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmvGphp-intl-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmmGphp-dba-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmjGphp-bcmath-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmqGphp-enchant-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmrGphp-ffi-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmGphp-xml-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm?php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm>^php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmA9php-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm@php-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmkGphp-cli-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmxGphp-mbstring-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmnGphp-dbg-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmsGphp-fpm-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmtGphp-gd-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmoGphp-devel-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm}Gphp-pgsql-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmwGphp-ldap-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpm=^php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm|Gphp-pdo-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmpGphp-embedded-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmlGphp-common-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmuGphp-gmp-8.2.25-1.module_el9.5.0+132+adb0ae7a.x86_64.rpmSf qBBBBBBBBLBXBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security update=https://access.redhat.com/errata/RHSA-2024:10950RHSA-2024:10950RHSA-2024:10950 https://access.redhat.com/security/cve/CVE-2024-2756CVE-2024-2756CVE-2024-2756https://access.redhat.com/security/cve/CVE-2024-3096CVE-2024-3096CVE-2024-3096https://access.redhat.com/security/cve/CVE-2024-5458CVE-2024-5458CVE-2024-5458https://access.redhat.com/security/cve/CVE-2024-8925CVE-2024-8925CVE-2024-8925https://access.redhat.com/security/cve/CVE-2024-8927CVE-2024-8927CVE-2024-8927https://access.redhat.com/security/cve/CVE-2024-9026CVE-2024-9026CVE-2024-9026https://bugzilla.redhat.com/22750582275058https://bugzilla.redhat.com/22750612275061https://bugzilla.redhat.com/22912522291252https://bugzilla.redhat.com/23170492317049https://bugzilla.redhat.com/23170512317051https://bugzilla.redhat.com/23171442317144https://errata.almalinux.org/9/ALSA-2024-10950.htmlALSA-2024:10950ALSA-2024:10950 6{'jEphp-bcmath-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmwEphp-ldap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmAphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm{Ephp-opcache-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmEphp-xml-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmuEphp-gmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmyEphp-mysqlnd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmpEphp-embedded-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmqEphp-enchant-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmoEphp-devel-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmEphp-soap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmsEphp-fpm-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmmEphp-dba-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm~Ephp-process-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmrEphp-ffi-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm?php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm|Ephp-pdo-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmlEphp-common-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm}Ephp-pgsql-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmEphp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmnEphp-dbg-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm>|php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmkEphp-cli-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmvEphp-intl-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmxEphp-mbstring-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmtEphp-gd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmzEphp-odbc-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmf|apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm=|php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmEphp-snmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm6{'jEphp-bcmath-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmwEphp-ldap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmAphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpm{Ephp-opcache-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmEphp-xml-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmuEphp-gmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmyEphp-mysqlnd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmpEphp-embedded-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmqEphp-enchant-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmoEphp-devel-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmEphp-soap-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmsEphp-fpm-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmmEphp-dba-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm~Ephp-process-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmrEphp-ffi-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm?php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm|Ephp-pdo-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmlEphp-common-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm}Ephp-pgsql-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmEphp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmnEphp-dbg-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm>|php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmkEphp-cli-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmvEphp-intl-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmxEphp-mbstring-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmtEphp-gd-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmzEphp-odbc-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpmf|apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpm=|php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmEphp-snmp-8.1.30-1.module_el9.5.0+131+62ecd687.x86_64.rpm`g OBBBBBBBBsecurityImportant: python3.12 security updateV-https://access.redhat.com/errata/RHSA-2024:10978RHSA-2024:10978RHSA-2024:10978 https://access.redhat.com/security/cve/CVE-2024-12254CVE-2024-12254CVE-2024-12254https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23308042330804https://errata.almalinux.org/9/ALSA-2024-10978.htmlALSA-2024:10978ALSA-2024:10978  python3.12-devel-3.12.5-2.el9_5.2.i686.rpm;python3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm:python3.12-3.12.5-2.el9_5.2.x86_64.rpm python3.12-libs-3.12.5-2.el9_5.2.x86_64.rpm python3.12-devel-3.12.5-2.el9_5.2.x86_64.rpm python3.12-libs-3.12.5-2.el9_5.2.i686.rpm python3.12-devel-3.12.5-2.el9_5.2.i686.rpm;python3.12-tkinter-3.12.5-2.el9_5.2.x86_64.rpm:python3.12-3.12.5-2.el9_5.2.x86_64.rpm python3.12-libs-3.12.5-2.el9_5.2.x86_64.rpm python3.12-devel-3.12.5-2.el9_5.2.x86_64.rpm python3.12-libs-3.12.5-2.el9_5.2.i686.rpmh ZBBBBsecurityModerate: python3.9:3.9.21 security updatehttps://access.redhat.com/errata/RHSA-2024:10983RHSA-2024:10983RHSA-2024:10983 https://access.redhat.com/security/cve/CVE-2024-11168CVE-2024-11168CVE-2024-11168https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://bugzilla.redhat.com/23257762325776https://errata.almalinux.org/9/ALSA-2024-10983.htmlALSA-2024:10983ALSA-2024:10983 1jpython3-tkinter-3.9.21-1.el9_5.x86_64.rpmRjpython3-devel-3.9.21-1.el9_5.x86_64.rpmgjpython-unversioned-command-3.9.21-1.el9_5.noarch.rpmRjpython3-devel-3.9.21-1.el9_5.i686.rpm1jpython3-tkinter-3.9.21-1.el9_5.x86_64.rpmRjpython3-devel-3.9.21-1.el9_5.x86_64.rpmgjpython-unversioned-command-3.9.21-1.el9_5.noarch.rpmRjpython3-devel-3.9.21-1.el9_5.i686.rpmHi +aBBBBBBBBsecurityModerate: python3.11 security update!Mhttps://access.redhat.com/errata/RHSA-2024:11111RHSA-2024:11111RHSA-2024:11111 https://access.redhat.com/security/cve/CVE-2024-9287CVE-2024-9287CVE-2024-9287https://bugzilla.redhat.com/23214402321440https://errata.almalinux.org/9/ALSA-2024-11111.htmlALSA-2024:11111ALSA-2024:11111 ^python3.11-devel-3.11.9-7.el9_5.2.i686.rpm^python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-3.11.9-7.el9_5.2.x86_64.rpm_python3.11-libs-3.11.9-7.el9_5.2.i686.rpm_python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm^python3.11-devel-3.11.9-7.el9_5.2.i686.rpm^python3.11-devel-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-3.11.9-7.el9_5.2.x86_64.rpm_python3.11-libs-3.11.9-7.el9_5.2.i686.rpm_python3.11-libs-3.11.9-7.el9_5.2.x86_64.rpmpython3.11-tkinter-3.11.9-7.el9_5.2.x86_64.rpm|j 2lBBBBsecurityImportant: gstreamer1-plugins-good security updaten' https://access.redhat.com/errata/RHSA-2024:11122RHSA-2024:11122RHSA-2024:11122 https://access.redhat.com/security/cve/CVE-2024-47537CVE-2024-47537CVE-2024-47537https://access.redhat.com/security/cve/CVE-2024-47539CVE-2024-47539CVE-2024-47539https://access.redhat.com/security/cve/CVE-2024-47540CVE-2024-47540CVE-2024-47540https://access.redhat.com/security/cve/CVE-2024-47606CVE-2024-47606CVE-2024-47606https://access.redhat.com/security/cve/CVE-2024-47613CVE-2024-47613CVE-2024-47613https://bugzilla.redhat.com/23317192331719https://bugzilla.redhat.com/23317222331722https://bugzilla.redhat.com/23317262331726https://bugzilla.redhat.com/23317532331753https://bugzilla.redhat.com/23317602331760https://errata.almalinux.org/9/ALSA-2024-11122.htmlALSA-2024:11122ALSA-2024:11122 h gstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpmh gstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpmi gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpmi gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpmh gstreamer1-plugins-good-1.22.1-3.el9_5.x86_64.rpmh gstreamer1-plugins-good-1.22.1-3.el9_5.i686.rpmi gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.i686.rpmi gstreamer1-plugins-good-gtk-1.22.1-3.el9_5.x86_64.rpmrk ;sBBBBBBsecurityImportant: gstreamer1-plugins-base security updateBhttps://access.redhat.com/errata/RHSA-2024:11123RHSA-2024:11123RHSA-2024:11123 https://access.redhat.com/security/cve/CVE-2024-47538CVE-2024-47538CVE-2024-47538https://access.redhat.com/security/cve/CVE-2024-47607CVE-2024-47607CVE-2024-47607https://access.redhat.com/security/cve/CVE-2024-47615CVE-2024-47615CVE-2024-47615https://bugzilla.redhat.com/23317272331727https://bugzilla.redhat.com/23317402331740https://bugzilla.redhat.com/23317542331754https://errata.almalinux.org/9/ALSA-2024-11123.htmlALSA-2024:11123ALSA-2024:11123  gstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpm gstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpm gstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpm gstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpm gstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpm gstreamer1-plugins-base-devel-1.22.1-3.el9_5.i686.rpm gstreamer1-plugins-base-1.22.1-3.el9_5.x86_64.rpm gstreamer1-plugins-base-tools-1.22.1-3.el9_5.x86_64.rpm gstreamer1-plugins-base-1.22.1-3.el9_5.i686.rpm gstreamer1-plugins-base-devel-1.22.1-3.el9_5.x86_64.rpm-l >|securityModerate: edk2:20240524 security updateWBhttps://access.redhat.com/errata/RHSA-2024:11219RHSA-2024:11219RHSA-2024:11219 https://access.redhat.com/security/cve/CVE-2024-38796CVE-2024-38796CVE-2024-38796https://bugzilla.redhat.com/23153902315390https://errata.almalinux.org/9/ALSA-2024-11219.htmlALSA-2024:11219ALSA-2024:11219 Hiedk2-ovmf-20240524-6.el9_5.3.noarch.rpmsiedk2-aarch64-20240524-6.el9_5.3.noarch.rpmHiedk2-ovmf-20240524-6.el9_5.3.noarch.rpmsiedk2-aarch64-20240524-6.el9_5.3.noarch.rpmTm ?securityModerate: python3.11-urllib3 security update9https://access.redhat.com/errata/RHSA-2024:11238RHSA-2024:11238RHSA-2024:11238 https://access.redhat.com/security/cve/CVE-2023-45803CVE-2023-45803CVE-2023-45803https://bugzilla.redhat.com/22468402246840https://errata.almalinux.org/9/ALSA-2024-11238.htmlALSA-2024:11238ALSA-2024:11238  gpython3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm gpython3.11-urllib3-1.26.12-2.el9_5.2.noarch.rpm`n ABBBBBsecurityModerate: mpg123:1.32.9 security updateRqhttps://access.redhat.com/errata/RHSA-2024:11242RHSA-2024:11242RHSA-2024:11242 https://access.redhat.com/security/cve/CVE-2024-10573CVE-2024-10573CVE-2024-10573https://bugzilla.redhat.com/23229802322980https://errata.almalinux.org/9/ALSA-2024-11242.htmlALSA-2024:11242ALSA-2024:11242 4|mpg123-libs-1.32.9-1.el9_5.x86_64.rpm=|mpg123-plugins-pulseaudio-1.32.9-1.el9_5.x86_64.rpm<|mpg123-1.32.9-1.el9_5.x86_64.rpm4|mpg123-libs-1.32.9-1.el9_5.i686.rpm4|mpg123-libs-1.32.9-1.el9_5.x86_64.rpm=|mpg123-plugins-pulseaudio-1.32.9-1.el9_5.x86_64.rpm<|mpg123-1.32.9-1.el9_5.x86_64.rpm4|mpg123-libs-1.32.9-1.el9_5.i686.rpmo IBBBsecurityModerate: pam security updateC?https://access.redhat.com/errata/RHSA-2024:11250RHSA-2024:11250RHSA-2024:11250 https://access.redhat.com/security/cve/CVE-2024-10041CVE-2024-10041CVE-2024-10041https://bugzilla.redhat.com/23192122319212https://errata.almalinux.org/9/ALSA-2024-11250.htmlALSA-2024:11250ALSA-2024:11250 kpam-devel-1.5.1-21.el9_5.x86_64.rpmkpam-devel-1.5.1-21.el9_5.i686.rpmpam-docs-1.5.1-21.el9_5.x86_64.rpmkpam-devel-1.5.1-21.el9_5.x86_64.rpmkpam-devel-1.5.1-21.el9_5.i686.rpmpam-docs-1.5.1-21.el9_5.x86_64.rpmp OBsecurityModerate: curl security update@https://access.redhat.com/errata/RHSA-2024:1129RHSA-2024:1129RHSA-2024:1129 https://access.redhat.com/security/cve/CVE-2023-46218CVE-2023-46218CVE-2023-46218https://bugzilla.redhat.com/22520302252030https://errata.almalinux.org/9/ALSA-2024-1129.htmlALSA-2024:1129ALSA-2024:1129  Zlibcurl-devel-7.76.1-26.el9_3.3.i686.rpm Zlibcurl-devel-7.76.1-26.el9_3.3.x86_64.rpm Zlibcurl-devel-7.76.1-26.el9_3.3.i686.rpm Zlibcurl-devel-7.76.1-26.el9_3.3.x86_64.rpm6q SBBsecurityModerate: openssh security updateB0https://access.redhat.com/errata/RHSA-2024:1130RHSA-2024:1130RHSA-2024:1130 https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://access.redhat.com/security/cve/CVE-2023-51385CVE-2023-51385CVE-2023-51385https://bugzilla.redhat.com/22542102254210https://bugzilla.redhat.com/22552712255271https://errata.almalinux.org/9/ALSA-2024-1130.htmlALSA-2024:1130ALSA-2024:1130 openssh-askpass-8.7p1-34.el9_3.3.x86_64.rpmopam_ssh_agent_auth-0.10.4-5.34.el9_3.3.x86_64.rpmopenssh-askpass-8.7p1-34.el9_3.3.x86_64.rpmopam_ssh_agent_auth-0.10.4-5.34.el9_3.3.x86_64.rpmRr "XBBBBBBBBsecurityModerate: golang security updaterPhttps://access.redhat.com/errata/RHSA-2024:1131RHSA-2024:1131RHSA-2024:1131 https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45285CVE-2023-45285CVE-2023-45285https://bugzilla.redhat.com/22533232253323https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-1131.htmlALSA-2024:1131ALSA-2024:1131 mgolang-misc-1.20.12-1.el9_3.noarch.rpmlgolang-docs-1.20.12-1.el9_3.noarch.rpmngolang-src-1.20.12-1.el9_3.noarch.rpmogolang-tests-1.20.12-1.el9_3.noarch.rpmEgo-toolset-1.20.12-1.el9_3.x86_64.rpmAgolang-bin-1.20.12-1.el9_3.x86_64.rpm@golang-1.20.12-1.el9_3.x86_64.rpmmgolang-misc-1.20.12-1.el9_3.noarch.rpmlgolang-docs-1.20.12-1.el9_3.noarch.rpmngolang-src-1.20.12-1.el9_3.noarch.rpmogolang-tests-1.20.12-1.el9_3.noarch.rpmEgo-toolset-1.20.12-1.el9_3.x86_64.rpmAgolang-bin-1.20.12-1.el9_3.x86_64.rpm@golang-1.20.12-1.el9_3.x86_64.rpm/s +cBBBBBBsecurityImportant: tomcat security updateBhttps://access.redhat.com/errata/RHSA-2024:1134RHSA-2024:1134RHSA-2024:1134 https://access.redhat.com/security/cve/CVE-2023-46589CVE-2023-46589CVE-2023-46589https://bugzilla.redhat.com/22520502252050https://errata.almalinux.org/9/ALSA-2024-1134.htmlALSA-2024:1134ALSA-2024:1134 m tomcat-servlet-4.0-api-9.0.62-37.el9_3.2.noarch.rpmh tomcat-admin-webapps-9.0.62-37.el9_3.2.noarch.rpmi tomcat-docs-webapp-9.0.62-37.el9_3.2.noarch.rpmn tomcat-webapps-9.0.62-37.el9_3.2.noarch.rpmk tomcat-jsp-2.3-api-9.0.62-37.el9_3.2.noarch.rpml tomcat-lib-9.0.62-37.el9_3.2.noarch.rpmj tomcat-el-3.0-api-9.0.62-37.el9_3.2.noarch.rpmg tomcat-9.0.62-37.el9_3.2.noarch.rpmm tomcat-servlet-4.0-api-9.0.62-37.el9_3.2.noarch.rpmh tomcat-admin-webapps-9.0.62-37.el9_3.2.noarch.rpmi tomcat-docs-webapp-9.0.62-37.el9_3.2.noarch.rpmn tomcat-webapps-9.0.62-37.el9_3.2.noarch.rpmk tomcat-jsp-2.3-api-9.0.62-37.el9_3.2.noarch.rpml tomcat-lib-9.0.62-37.el9_3.2.noarch.rpmj tomcat-el-3.0-api-9.0.62-37.el9_3.2.noarch.rpmg tomcat-9.0.62-37.el9_3.2.noarch.rpmat 9lBBBBBBBBBBBsecurityLow: keylime security update3Ghttps://access.redhat.com/errata/RHSA-2024:1139RHSA-2024:1139RHSA-2024:1139 https://access.redhat.com/security/cve/CVE-2023-3674CVE-2023-3674CVE-2023-3674https://bugzilla.redhat.com/22229032222903https://errata.almalinux.org/9/ALSA-2024-1139.htmlALSA-2024:1139ALSA-2024:1139 |Fkeylime-registrar-7.3.0-13.el9_3.x86_64.rpm~Fkeylime-verifier-7.3.0-13.el9_3.x86_64.rpm Fpython3-keylime-7.3.0-13.el9_3.x86_64.rpmzFkeylime-7.3.0-13.el9_3.x86_64.rpm{Fkeylime-base-7.3.0-13.el9_3.x86_64.rpmFkeylime-selinux-7.3.0-13.el9_3.noarch.rpm}Fkeylime-tenant-7.3.0-13.el9_3.x86_64.rpm|Fkeylime-registrar-7.3.0-13.el9_3.x86_64.rpm~Fkeylime-verifier-7.3.0-13.el9_3.x86_64.rpm Fpython3-keylime-7.3.0-13.el9_3.x86_64.rpmzFkeylime-7.3.0-13.el9_3.x86_64.rpm{Fkeylime-base-7.3.0-13.el9_3.x86_64.rpmFkeylime-selinux-7.3.0-13.el9_3.noarch.rpm}Fkeylime-tenant-7.3.0-13.el9_3.x86_64.rpm*u zBBBBBBsecurityModerate: mysql security update`thttps://access.redhat.com/errata/RHSA-2024:1141RHSA-2024:1141RHSA-2024:1141 https://access.redhat.com/security/cve/CVE-2022-4899CVE-2022-4899CVE-2022-4899https://access.redhat.com/security/cve/CVE-2023-21911CVE-2023-21911CVE-2023-21911https://access.redhat.com/security/cve/CVE-2023-21919CVE-2023-21919CVE-2023-21919https://access.redhat.com/security/cve/CVE-2023-21920CVE-2023-21920CVE-2023-21920https://access.redhat.com/security/cve/CVE-2023-21929CVE-2023-21929CVE-2023-21929https://access.redhat.com/security/cve/CVE-2023-21933CVE-2023-21933CVE-2023-21933https://access.redhat.com/security/cve/CVE-2023-21935CVE-2023-21935CVE-2023-21935https://access.redhat.com/security/cve/CVE-2023-21940CVE-2023-21940CVE-2023-21940https://access.redhat.com/security/cve/CVE-2023-21945CVE-2023-21945CVE-2023-21945https://access.redhat.com/security/cve/CVE-2023-21946CVE-2023-21946CVE-2023-21946https://access.redhat.com/security/cve/CVE-2023-21947CVE-2023-21947CVE-2023-21947https://access.redhat.com/security/cve/CVE-2023-21953CVE-2023-21953CVE-2023-21953https://access.redhat.com/security/cve/CVE-2023-21955CVE-2023-21955CVE-2023-21955https://access.redhat.com/security/cve/CVE-2023-21962CVE-2023-21962CVE-2023-21962https://access.redhat.com/security/cve/CVE-2023-21966CVE-2023-21966CVE-2023-21966https://access.redhat.com/security/cve/CVE-2023-21972CVE-2023-21972CVE-2023-21972https://access.redhat.com/security/cve/CVE-2023-21976CVE-2023-21976CVE-2023-21976https://access.redhat.com/security/cve/CVE-2023-21977CVE-2023-21977CVE-2023-21977https://access.redhat.com/security/cve/CVE-2023-21980CVE-2023-21980CVE-2023-21980https://access.redhat.com/security/cve/CVE-2023-21982CVE-2023-21982CVE-2023-21982https://access.redhat.com/security/cve/CVE-2023-22005CVE-2023-22005CVE-2023-22005https://access.redhat.com/security/cve/CVE-2023-22007CVE-2023-22007CVE-2023-22007https://access.redhat.com/security/cve/CVE-2023-22008CVE-2023-22008CVE-2023-22008https://access.redhat.com/security/cve/CVE-2023-22032CVE-2023-22032CVE-2023-22032https://access.redhat.com/security/cve/CVE-2023-22033CVE-2023-22033CVE-2023-22033https://access.redhat.com/security/cve/CVE-2023-22038CVE-2023-22038CVE-2023-22038https://access.redhat.com/security/cve/CVE-2023-22046CVE-2023-22046CVE-2023-22046https://access.redhat.com/security/cve/CVE-2023-22048CVE-2023-22048CVE-2023-22048https://access.redhat.com/security/cve/CVE-2023-22053CVE-2023-22053CVE-2023-22053https://access.redhat.com/security/cve/CVE-2023-22054CVE-2023-22054CVE-2023-22054https://access.redhat.com/security/cve/CVE-2023-22056CVE-2023-22056CVE-2023-22056https://access.redhat.com/security/cve/CVE-2023-22057CVE-2023-22057CVE-2023-22057https://access.redhat.com/security/cve/CVE-2023-22058CVE-2023-22058CVE-2023-22058https://access.redhat.com/security/cve/CVE-2023-22059CVE-2023-22059CVE-2023-22059https://access.redhat.com/security/cve/CVE-2023-22064CVE-2023-22064CVE-2023-22064https://access.redhat.com/security/cve/CVE-2023-22065CVE-2023-22065CVE-2023-22065https://access.redhat.com/security/cve/CVE-2023-22066CVE-2023-22066CVE-2023-22066https://access.redhat.com/security/cve/CVE-2023-22068CVE-2023-22068CVE-2023-22068https://access.redhat.com/security/cve/CVE-2023-22070CVE-2023-22070CVE-2023-22070https://access.redhat.com/security/cve/CVE-2023-22078CVE-2023-22078CVE-2023-22078https://access.redhat.com/security/cve/CVE-2023-22079CVE-2023-22079CVE-2023-22079https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2023-22092CVE-2023-22092CVE-2023-22092https://access.redhat.com/security/cve/CVE-2023-22097CVE-2023-22097CVE-2023-22097https://access.redhat.com/security/cve/CVE-2023-22103CVE-2023-22103CVE-2023-22103https://access.redhat.com/security/cve/CVE-2023-22104CVE-2023-22104CVE-2023-22104https://access.redhat.com/security/cve/CVE-2023-22110CVE-2023-22110CVE-2023-22110https://access.redhat.com/security/cve/CVE-2023-22111CVE-2023-22111CVE-2023-22111https://access.redhat.com/security/cve/CVE-2023-22112CVE-2023-22112CVE-2023-22112https://access.redhat.com/security/cve/CVE-2023-22113CVE-2023-22113CVE-2023-22113https://access.redhat.com/security/cve/CVE-2023-22114CVE-2023-22114CVE-2023-22114https://access.redhat.com/security/cve/CVE-2023-22115CVE-2023-22115CVE-2023-22115https://access.redhat.com/security/cve/CVE-2024-20960CVE-2024-20960CVE-2024-20960https://access.redhat.com/security/cve/CVE-2024-20961CVE-2024-20961CVE-2024-20961https://access.redhat.com/security/cve/CVE-2024-20962CVE-2024-20962CVE-2024-20962https://access.redhat.com/security/cve/CVE-2024-20963CVE-2024-20963CVE-2024-20963https://access.redhat.com/security/cve/CVE-2024-20964CVE-2024-20964CVE-2024-20964https://access.redhat.com/security/cve/CVE-2024-20965CVE-2024-20965CVE-2024-20965https://access.redhat.com/security/cve/CVE-2024-20966CVE-2024-20966CVE-2024-20966https://access.redhat.com/security/cve/CVE-2024-20967CVE-2024-20967CVE-2024-20967https://access.redhat.com/security/cve/CVE-2024-20968CVE-2024-20968CVE-2024-20968https://access.redhat.com/security/cve/CVE-2024-20969CVE-2024-20969CVE-2024-20969https://access.redhat.com/security/cve/CVE-2024-20970CVE-2024-20970CVE-2024-20970https://access.redhat.com/security/cve/CVE-2024-20971CVE-2024-20971CVE-2024-20971https://access.redhat.com/security/cve/CVE-2024-20972CVE-2024-20972CVE-2024-20972https://access.redhat.com/security/cve/CVE-2024-20973CVE-2024-20973CVE-2024-20973https://access.redhat.com/security/cve/CVE-2024-20974CVE-2024-20974CVE-2024-20974https://access.redhat.com/security/cve/CVE-2024-20976CVE-2024-20976CVE-2024-20976https://access.redhat.com/security/cve/CVE-2024-20977CVE-2024-20977CVE-2024-20977https://access.redhat.com/security/cve/CVE-2024-20978CVE-2024-20978CVE-2024-20978https://access.redhat.com/security/cve/CVE-2024-20981CVE-2024-20981CVE-2024-20981https://access.redhat.com/security/cve/CVE-2024-20982CVE-2024-20982CVE-2024-20982https://access.redhat.com/security/cve/CVE-2024-20983CVE-2024-20983CVE-2024-20983https://access.redhat.com/security/cve/CVE-2024-20984CVE-2024-20984CVE-2024-20984https://access.redhat.com/security/cve/CVE-2024-20985CVE-2024-20985CVE-2024-20985https://bugzilla.redhat.com/21798642179864https://bugzilla.redhat.com/21881092188109https://bugzilla.redhat.com/21881132188113https://bugzilla.redhat.com/21881152188115https://bugzilla.redhat.com/21881162188116https://bugzilla.redhat.com/21881172188117https://bugzilla.redhat.com/21881182188118https://bugzilla.redhat.com/21881192188119https://bugzilla.redhat.com/21881202188120https://bugzilla.redhat.com/21881212188121https://bugzilla.redhat.com/21881222188122https://bugzilla.redhat.com/21881232188123https://bugzilla.redhat.com/21881242188124https://bugzilla.redhat.com/21881252188125https://bugzilla.redhat.com/21881272188127https://bugzilla.redhat.com/21881282188128https://bugzilla.redhat.com/21881292188129https://bugzilla.redhat.com/21881302188130https://bugzilla.redhat.com/21881312188131https://bugzilla.redhat.com/21881322188132https://bugzilla.redhat.com/22242112224211https://bugzilla.redhat.com/22242122224212https://bugzilla.redhat.com/22242132224213https://bugzilla.redhat.com/22242142224214https://bugzilla.redhat.com/22242152224215https://bugzilla.redhat.com/22242162224216https://bugzilla.redhat.com/22242172224217https://bugzilla.redhat.com/22242182224218https://bugzilla.redhat.com/22242192224219https://bugzilla.redhat.com/22242202224220https://bugzilla.redhat.com/22242212224221https://bugzilla.redhat.com/22242222224222https://bugzilla.redhat.com/22450142245014https://bugzilla.redhat.com/22450152245015https://bugzilla.redhat.com/22450162245016https://bugzilla.redhat.com/22450172245017https://bugzilla.redhat.com/22450182245018https://bugzilla.redhat.com/22450192245019https://bugzilla.redhat.com/22450202245020https://bugzilla.redhat.com/22450212245021https://bugzilla.redhat.com/22450222245022https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22450242245024https://bugzilla.redhat.com/22450262245026https://bugzilla.redhat.com/22450272245027https://bugzilla.redhat.com/22450282245028https://bugzilla.redhat.com/22450292245029https://bugzilla.redhat.com/22450302245030https://bugzilla.redhat.com/22450312245031https://bugzilla.redhat.com/22450322245032https://bugzilla.redhat.com/22450332245033https://bugzilla.redhat.com/22450342245034https://bugzilla.redhat.com/22587712258771https://bugzilla.redhat.com/22587722258772https://bugzilla.redhat.com/22587732258773https://bugzilla.redhat.com/22587742258774https://bugzilla.redhat.com/22587752258775https://bugzilla.redhat.com/22587762258776https://bugzilla.redhat.com/22587772258777https://bugzilla.redhat.com/22587782258778https://bugzilla.redhat.com/22587792258779https://bugzilla.redhat.com/22587802258780https://bugzilla.redhat.com/22587812258781https://bugzilla.redhat.com/22587822258782https://bugzilla.redhat.com/22587832258783https://bugzilla.redhat.com/22587842258784https://bugzilla.redhat.com/22587852258785https://bugzilla.redhat.com/22587872258787https://bugzilla.redhat.com/22587882258788https://bugzilla.redhat.com/22587892258789https://bugzilla.redhat.com/22587902258790https://bugzilla.redhat.com/22587912258791https://bugzilla.redhat.com/22587922258792https://bugzilla.redhat.com/22587932258793https://bugzilla.redhat.com/22587942258794https://errata.almalinux.org/9/ALSA-2024-1141.htmlALSA-2024:1141ALSA-2024:1141 <mysql-errmsg-8.0.36-1.el9_3.x86_64.rpm9<mysql-8.0.36-1.el9_3.x86_64.rpm<<mysql-server-8.0.36-1.el9_3.x86_64.rpm<mysql-common-8.0.36-1.el9_3.x86_64.rpm<mysql-errmsg-8.0.36-1.el9_3.x86_64.rpm9<mysql-8.0.36-1.el9_3.x86_64.rpm<<mysql-server-8.0.36-1.el9_3.x86_64.rpm<mysql-common-8.0.36-1.el9_3.x86_64.rpmyv CsecurityModerate: haproxy security updateT https://access.redhat.com/errata/RHSA-2024:1142RHSA-2024:1142RHSA-2024:1142 https://access.redhat.com/security/cve/CVE-2023-40225CVE-2023-40225CVE-2023-40225https://access.redhat.com/security/cve/CVE-2023-45539CVE-2023-45539CVE-2023-45539https://bugzilla.redhat.com/22313702231370https://bugzilla.redhat.com/22530372253037https://errata.almalinux.org/9/ALSA-2024-1142.htmlALSA-2024:1142ALSA-2024:1142 haproxy-2.4.22-3.el9_3.x86_64.rpmhaproxy-2.4.22-3.el9_3.x86_64.rpmew FsecurityModerate: rear security update]|https://access.redhat.com/errata/RHSA-2024:1147RHSA-2024:1147RHSA-2024:1147 https://access.redhat.com/security/cve/CVE-2024-23301CVE-2024-23301CVE-2024-23301https://bugzilla.redhat.com/22583962258396https://errata.almalinux.org/9/ALSA-2024-1147.htmlALSA-2024:1147ALSA-2024:1147 zrear-2.6-21.el9_3.alma.x86_64.rpmzrear-2.6-21.el9_3.alma.x86_64.rpm x IBBBBBBBBBBBBBBBsecurityModerate: kernel security updateYc$https://access.redhat.com/errata/RHSA-2024:11486RHSA-2024:11486RHSA-2024:11486 https://access.redhat.com/security/cve/CVE-2024-27399CVE-2024-27399CVE-2024-27399https://access.redhat.com/security/cve/CVE-2024-38564CVE-2024-38564CVE-2024-38564https://access.redhat.com/security/cve/CVE-2024-45020CVE-2024-45020CVE-2024-45020https://access.redhat.com/security/cve/CVE-2024-46697CVE-2024-46697CVE-2024-46697https://access.redhat.com/security/cve/CVE-2024-47675CVE-2024-47675CVE-2024-47675https://access.redhat.com/security/cve/CVE-2024-49888CVE-2024-49888CVE-2024-49888https://access.redhat.com/security/cve/CVE-2024-50099CVE-2024-50099CVE-2024-50099https://access.redhat.com/security/cve/CVE-2024-50110CVE-2024-50110CVE-2024-50110https://access.redhat.com/security/cve/CVE-2024-50115CVE-2024-50115CVE-2024-50115https://access.redhat.com/security/cve/CVE-2024-50124CVE-2024-50124CVE-2024-50124https://access.redhat.com/security/cve/CVE-2024-50125CVE-2024-50125CVE-2024-50125https://access.redhat.com/security/cve/CVE-2024-50142CVE-2024-50142CVE-2024-50142https://access.redhat.com/security/cve/CVE-2024-50148CVE-2024-50148CVE-2024-50148https://access.redhat.com/security/cve/CVE-2024-50192CVE-2024-50192CVE-2024-50192https://access.redhat.com/security/cve/CVE-2024-50223CVE-2024-50223CVE-2024-50223https://access.redhat.com/security/cve/CVE-2024-50255CVE-2024-50255CVE-2024-50255https://access.redhat.com/security/cve/CVE-2024-50262CVE-2024-50262CVE-2024-50262https://bugzilla.redhat.com/22804622280462https://bugzilla.redhat.com/22934292293429https://bugzilla.redhat.com/23117172311717https://bugzilla.redhat.com/23120852312085https://bugzilla.redhat.com/23202542320254https://bugzilla.redhat.com/23205172320517https://bugzilla.redhat.com/23239042323904https://bugzilla.redhat.com/23239302323930https://bugzilla.redhat.com/23239372323937https://bugzilla.redhat.com/23239442323944https://bugzilla.redhat.com/23239552323955https://bugzilla.redhat.com/23243152324315https://bugzilla.redhat.com/23243322324332https://bugzilla.redhat.com/23246122324612https://bugzilla.redhat.com/23248672324867https://bugzilla.redhat.com/23248682324868https://bugzilla.redhat.com/23248922324892https://errata.almalinux.org/9/ALSA-2024-11486.htmlALSA-2024:11486ALSA-2024:11486 %Jperf-5.14.0-503.19.1.el9_5.x86_64.rpmJkernel-doc-5.14.0-503.19.1.el9_5.noarch.rpm*Jrv-5.14.0-503.19.1.el9_5.x86_64.rpm#Jkernel-devel-5.14.0-503.19.1.el9_5.x86_64.rpm$Jkernel-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm)Jrtla-5.14.0-503.19.1.el9_5.x86_64.rpm!Jkernel-debug-devel-5.14.0-503.19.1.el9_5.x86_64.rpm"Jkernel-debug-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm(Jkernel-headers-5.14.0-503.19.1.el9_5.x86_64.rpm %Jperf-5.14.0-503.19.1.el9_5.x86_64.rpmJkernel-doc-5.14.0-503.19.1.el9_5.noarch.rpm*Jrv-5.14.0-503.19.1.el9_5.x86_64.rpm#Jkernel-devel-5.14.0-503.19.1.el9_5.x86_64.rpm$Jkernel-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm)Jrtla-5.14.0-503.19.1.el9_5.x86_64.rpm!Jkernel-debug-devel-5.14.0-503.19.1.el9_5.x86_64.rpm"Jkernel-debug-devel-matched-5.14.0-503.19.1.el9_5.x86_64.rpm(Jkernel-headers-5.14.0-503.19.1.el9_5.x86_64.rpmiy [BBsecurityModerate: skopeo security update<\https://access.redhat.com/errata/RHSA-2024:1149RHSA-2024:1149RHSA-2024:1149 https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-1149.htmlALSA-2024:1149ALSA-2024:1149 <skopeo-tests-1.13.3-4.el9_3.x86_64.rpm;skopeo-1.13.3-4.el9_3.x86_64.rpm<skopeo-tests-1.13.3-4.el9_3.x86_64.rpm;skopeo-1.13.3-4.el9_3.x86_64.rpm z $`BBsecurityModerate: buildah security updateyhttps://access.redhat.com/errata/RHSA-2024:1150RHSA-2024:1150RHSA-2024:1150 https://access.redhat.com/security/cve/CVE-2023-48795CVE-2023-48795CVE-2023-48795https://bugzilla.redhat.com/22542102254210https://errata.almalinux.org/9/ALSA-2024-1150.htmlALSA-2024:1150ALSA-2024:1150 libreoffice-help-hu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-uk-7.1.8.1-12.el9_3.alma.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-pa-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-pdfimport-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-nn-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-12.el9_3.alma.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-12.el9_3.alma.x86_64.rpm&libreoffice-xsltfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpmaautocorr-ko-7.1.8.1-12.el9_3.alma.noarch.rpmKlibreoffice-help-ro-7.1.8.1-12.el9_3.alma.x86_64.rpm%libreoffice-filters-7.1.8.1-12.el9_3.alma.x86_64.rpmfautocorr-pl-7.1.8.1-12.el9_3.alma.noarch.rpmqautocorr-zh-7.1.8.1-12.el9_3.alma.noarch.rpmYlibreoffice-langpack-as-7.1.8.1-12.el9_3.alma.x86_64.rpmdautocorr-mn-7.1.8.1-12.el9_3.alma.noarch.rpmolibreoffice-langpack-gu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-sv-7.1.8.1-12.el9_3.alma.x86_64.rpmYautocorr-fr-7.1.8.1-12.el9_3.alma.noarch.rpmtlibreoffice-langpack-id-7.1.8.1-12.el9_3.alma.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-12.el9_3.alma.x86_64.rpmElibreoffice-help-nb-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-or-7.1.8.1-12.el9_3.alma.x86_64.rpmflibreoffice-langpack-es-7.1.8.1-12.el9_3.alma.x86_64.rpmlautocorr-sr-7.1.8.1-12.el9_3.alma.noarch.rpm[autocorr-hr-7.1.8.1-12.el9_3.alma.noarch.rpmrlibreoffice-langpack-hr-7.1.8.1-12.el9_3.alma.x86_64.rpmMlibreoffice-help-si-7.1.8.1-12.el9_3.alma.x86_64.rpmUautocorr-en-7.1.8.1-12.el9_3.alma.noarch.rpm$libreoffice-emailmerge-7.1.8.1-12.el9_3.alma.x86_64.rpmiautocorr-ru-7.1.8.1-12.el9_3.alma.noarch.rpmwlibreoffice-langpack-kk-7.1.8.1-12.el9_3.alma.x86_64.rpm,libreoffice-help-ca-7.1.8.1-12.el9_3.alma.x86_64.rpmklibreoffice-langpack-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmRautocorr-de-7.1.8.1-12.el9_3.alma.noarch.rpmVlibreoffice-impress-7.1.8.1-12.el9_3.alma.x86_64.rpm$libreoffice-writer-7.1.8.1-12.el9_3.alma.x86_64.rpm'libreofficekit-7.1.8.1-12.el9_3.alma.x86_64.rpm6libreoffice-help-eu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm}libreoffice-langpack-ml-7.1.8.1-12.el9_3.alma.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-12.el9_3.alma.x86_64.rpmplibreoffice-langpack-he-7.1.8.1-12.el9_3.alma.x86_64.rpmAlibreoffice-help-ja-7.1.8.1-12.el9_3.alma.x86_64.rpmQlibreoffice-help-ta-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-data-7.1.8.1-12.el9_3.alma.noarch.rpm2libreoffice-help-en-7.1.8.1-12.el9_3.alma.x86_64.rpm:libreoffice-help-gu-7.1.8.1-12.el9_3.alma.x86_64.rpmalibreoffice-langpack-de-7.1.8.1-12.el9_3.alma.x86_64.rpm]libreoffice-langpack-ca-7.1.8.1-12.el9_3.alma.x86_64.rpm&libreoffice-gdb-debug-support-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-st-7.1.8.1-12.el9_3.alma.x86_64.rpm^libreoffice-langpack-cs-7.1.8.1-12.el9_3.alma.x86_64.rpm9libreoffice-help-gl-7.1.8.1-12.el9_3.alma.x86_64.rpmOlibreoffice-help-sl-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-12.el9_3.alma.x86_64.rpm4libreoffice-help-es-7.1.8.1-12.el9_3.alma.x86_64.rpmRlibreoffice-help-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm_autocorr-it-7.1.8.1-12.el9_3.alma.noarch.rpm~libreoffice-langpack-mr-7.1.8.1-12.el9_3.alma.x86_64.rpm!libreoffice-calc-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmZlibreoffice-langpack-bg-7.1.8.1-12.el9_3.alma.x86_64.rpmelibreoffice-langpack-eo-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-12.el9_3.alma.x86_64.rpm!libreoffice-pyuno-7.1.8.1-12.el9_3.alma.x86_64.rpmXautocorr-fi-7.1.8.1-12.el9_3.alma.noarch.rpm3libreoffice-help-eo-7.1.8.1-12.el9_3.alma.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmClibreoffice-help-lt-7.1.8.1-12.el9_3.alma.x86_64.rpm*libreoffice-help-bg-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-te-7.1.8.1-12.el9_3.alma.x86_64.rpmilibreoffice-langpack-fa-7.1.8.1-12.el9_3.alma.x86_64.rpmmlibreoffice-langpack-ga-7.1.8.1-12.el9_3.alma.x86_64.rpm_libreoffice-langpack-cy-7.1.8.1-12.el9_3.alma.x86_64.rpmvlibreoffice-langpack-ja-7.1.8.1-12.el9_3.alma.x86_64.rpmnlibreoffice-langpack-gl-7.1.8.1-12.el9_3.alma.x86_64.rpmpautocorr-vro-7.1.8.1-12.el9_3.alma.noarch.rpmIlibreoffice-help-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpm7libreoffice-help-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm`autocorr-ja-7.1.8.1-12.el9_3.alma.noarch.rpmXlibreoffice-langpack-ar-7.1.8.1-12.el9_3.alma.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpmBlibreoffice-help-ko-7.1.8.1-12.el9_3.alma.x86_64.rpmTautocorr-el-7.1.8.1-12.el9_3.alma.noarch.rpmOautocorr-ca-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-ss-7.1.8.1-12.el9_3.alma.x86_64.rpmPautocorr-cs-7.1.8.1-12.el9_3.alma.noarch.rpm.libreoffice-help-da-7.1.8.1-12.el9_3.alma.x86_64.rpmzlibreoffice-langpack-lt-7.1.8.1-12.el9_3.alma.x86_64.rpm1libreoffice-help-el-7.1.8.1-12.el9_3.alma.x86_64.rpm^autocorr-is-7.1.8.1-12.el9_3.alma.noarch.rpm+libreoffice-help-bn-7.1.8.1-12.el9_3.alma.x86_64.rpm)libreoffice-help-ar-7.1.8.1-12.el9_3.alma.x86_64.rpmhautocorr-ro-7.1.8.1-12.el9_3.alma.noarch.rpm8libreoffice-help-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmNlibreoffice-help-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-math-7.1.8.1-12.el9_3.alma.x86_64.rpmWlibreoffice-langpack-af-7.1.8.1-12.el9_3.alma.x86_64.rpm#libreoffice-wiki-publisher-7.1.8.1-12.el9_3.alma.x86_64.rpmclibreoffice-langpack-el-7.1.8.1-12.el9_3.alma.x86_64.rpmgautocorr-pt-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-nl-7.1.8.1-12.el9_3.alma.x86_64.rpm\autocorr-hsb-7.1.8.1-12.el9_3.alma.noarch.rpmZautocorr-ga-7.1.8.1-12.el9_3.alma.noarch.rpmWautocorr-fa-7.1.8.1-12.el9_3.alma.noarch.rpm libreoffice-langpack-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-12.el9_3.alma.x86_64.rpm]autocorr-hu-7.1.8.1-12.el9_3.alma.noarch.rpm libreoffice-base-7.1.8.1-12.el9_3.alma.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-12.el9_3.alma.x86_64.rpmslibreoffice-langpack-hu-7.1.8.1-12.el9_3.alma.x86_64.rpmqlibreoffice-langpack-hi-7.1.8.1-12.el9_3.alma.x86_64.rpm(libreoffice-gtk3-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-ure-common-7.1.8.1-12.el9_3.alma.noarch.rpmjautocorr-sk-7.1.8.1-12.el9_3.alma.noarch.rpm%libreoffice-x11-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-ve-7.1.8.1-12.el9_3.alma.x86_64.rpm=libreoffice-help-hr-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-ro-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-zu-7.1.8.1-12.el9_3.alma.x86_64.rpmylibreoffice-langpack-ko-7.1.8.1-12.el9_3.alma.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-tn-7.1.8.1-12.el9_3.alma.x86_64.rpm`libreoffice-langpack-da-7.1.8.1-12.el9_3.alma.x86_64.rpm1<libreoffice-help-hi-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-si-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-ru-7.1.8.1-12.el9_3.alma.x86_64.rpmeautocorr-nl-7.1.8.1-12.el9_3.alma.noarch.rpm@libreoffice-help-it-7.1.8.1-12.el9_3.alma.x86_64.rpmglibreoffice-langpack-et-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-nb-7.1.8.1-12.el9_3.alma.x86_64.rpmoautocorr-vi-7.1.8.1-12.el9_3.alma.noarch.rpm?libreoffice-help-id-7.1.8.1-12.el9_3.alma.x86_64.rpmkautocorr-sl-7.1.8.1-12.el9_3.alma.noarch.rpmulibreoffice-langpack-it-7.1.8.1-12.el9_3.alma.x86_64.rpmNautocorr-bg-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-ta-7.1.8.1-12.el9_3.alma.x86_64.rpm"libreoffice-core-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpm;libreoffice-help-he-7.1.8.1-12.el9_3.alma.x86_64.rpmMautocorr-af-7.1.8.1-12.el9_3.alma.noarch.rpm"libreoffice-ure-7.1.8.1-12.el9_3.alma.x86_64.rpmTlibreoffice-help-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpmLlibreoffice-help-ru-7.1.8.1-12.el9_3.alma.x86_64.rpmDlibreoffice-help-lv-7.1.8.1-12.el9_3.alma.x86_64.rpmQautocorr-da-7.1.8.1-12.el9_3.alma.noarch.rpmxlibreoffice-langpack-kn-7.1.8.1-12.el9_3.alma.x86_64.rpmmautocorr-sv-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-tr-7.1.8.1-12.el9_3.alma.x86_64.rpmnautocorr-tr-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-xh-7.1.8.1-12.el9_3.alma.x86_64.rpmSlibreoffice-help-uk-7.1.8.1-12.el9_3.alma.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-12.el9_3.alma.x86_64.rpmjlibreoffice-langpack-fi-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpm5libreoffice-help-et-7.1.8.1-12.el9_3.alma.x86_64.rpmVautocorr-es-7.1.8.1-12.el9_3.alma.noarch.rpm0libreoffice-help-dz-7.1.8.1-12.el9_3.alma.x86_64.rpm/libreoffice-help-de-7.1.8.1-12.el9_3.alma.x86_64.rpmbautocorr-lb-7.1.8.1-12.el9_3.alma.noarch.rpmFlibreoffice-help-nl-7.1.8.1-12.el9_3.alma.x86_64.rpmSautocorr-dsb-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-7.1.8.1-12.el9_3.alma.x86_64.rpm[libreoffice-langpack-bn-7.1.8.1-12.el9_3.alma.x86_64.rpm#libreoffice-draw-7.1.8.1-12.el9_3.alma.x86_64.rpmHlibreoffice-help-pl-7.1.8.1-12.el9_3.alma.x86_64.rpmcautocorr-lt-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-opensymbol-fonts-7.1.8.1-12.el9_3.alma.noarch.rpmJlibreoffice-help-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-ogltrans-7.1.8.1-12.el9_3.alma.x86_64.rpmdlibreoffice-langpack-en-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-nso-7.1.8.1-12.el9_3.alma.x86_64.rpm-libreoffice-help-cs-7.1.8.1-12.el9_3.alma.x86_64.rpm>libreoffice-help-hu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-uk-7.1.8.1-12.el9_3.alma.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-pa-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-pdfimport-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-nn-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-12.el9_3.alma.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-12.el9_3.alma.x86_64.rpm&libreoffice-xsltfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-12.el9_3.alma.x86_64.rpmaautocorr-ko-7.1.8.1-12.el9_3.alma.noarch.rpmKlibreoffice-help-ro-7.1.8.1-12.el9_3.alma.x86_64.rpm%libreoffice-filters-7.1.8.1-12.el9_3.alma.x86_64.rpmfautocorr-pl-7.1.8.1-12.el9_3.alma.noarch.rpmqautocorr-zh-7.1.8.1-12.el9_3.alma.noarch.rpmYlibreoffice-langpack-as-7.1.8.1-12.el9_3.alma.x86_64.rpmdautocorr-mn-7.1.8.1-12.el9_3.alma.noarch.rpmolibreoffice-langpack-gu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-sv-7.1.8.1-12.el9_3.alma.x86_64.rpmYautocorr-fr-7.1.8.1-12.el9_3.alma.noarch.rpmtlibreoffice-langpack-id-7.1.8.1-12.el9_3.alma.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-12.el9_3.alma.x86_64.rpmElibreoffice-help-nb-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-or-7.1.8.1-12.el9_3.alma.x86_64.rpmflibreoffice-langpack-es-7.1.8.1-12.el9_3.alma.x86_64.rpmlautocorr-sr-7.1.8.1-12.el9_3.alma.noarch.rpm[autocorr-hr-7.1.8.1-12.el9_3.alma.noarch.rpmrlibreoffice-langpack-hr-7.1.8.1-12.el9_3.alma.x86_64.rpmMlibreoffice-help-si-7.1.8.1-12.el9_3.alma.x86_64.rpmUautocorr-en-7.1.8.1-12.el9_3.alma.noarch.rpm$libreoffice-emailmerge-7.1.8.1-12.el9_3.alma.x86_64.rpmiautocorr-ru-7.1.8.1-12.el9_3.alma.noarch.rpmwlibreoffice-langpack-kk-7.1.8.1-12.el9_3.alma.x86_64.rpm,libreoffice-help-ca-7.1.8.1-12.el9_3.alma.x86_64.rpmklibreoffice-langpack-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmRautocorr-de-7.1.8.1-12.el9_3.alma.noarch.rpmVlibreoffice-impress-7.1.8.1-12.el9_3.alma.x86_64.rpm$libreoffice-writer-7.1.8.1-12.el9_3.alma.x86_64.rpm'libreofficekit-7.1.8.1-12.el9_3.alma.x86_64.rpm6libreoffice-help-eu-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-12.el9_3.alma.x86_64.rpm}libreoffice-langpack-ml-7.1.8.1-12.el9_3.alma.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-12.el9_3.alma.x86_64.rpmplibreoffice-langpack-he-7.1.8.1-12.el9_3.alma.x86_64.rpmAlibreoffice-help-ja-7.1.8.1-12.el9_3.alma.x86_64.rpmQlibreoffice-help-ta-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-data-7.1.8.1-12.el9_3.alma.noarch.rpm2libreoffice-help-en-7.1.8.1-12.el9_3.alma.x86_64.rpm:libreoffice-help-gu-7.1.8.1-12.el9_3.alma.x86_64.rpmalibreoffice-langpack-de-7.1.8.1-12.el9_3.alma.x86_64.rpm]libreoffice-langpack-ca-7.1.8.1-12.el9_3.alma.x86_64.rpm&libreoffice-gdb-debug-support-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-pt-PT-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-st-7.1.8.1-12.el9_3.alma.x86_64.rpm^libreoffice-langpack-cs-7.1.8.1-12.el9_3.alma.x86_64.rpm9libreoffice-help-gl-7.1.8.1-12.el9_3.alma.x86_64.rpmOlibreoffice-help-sl-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-12.el9_3.alma.x86_64.rpm4libreoffice-help-es-7.1.8.1-12.el9_3.alma.x86_64.rpmRlibreoffice-help-tr-7.1.8.1-12.el9_3.alma.x86_64.rpm_autocorr-it-7.1.8.1-12.el9_3.alma.noarch.rpm~libreoffice-langpack-mr-7.1.8.1-12.el9_3.alma.x86_64.rpm!libreoffice-calc-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmZlibreoffice-langpack-bg-7.1.8.1-12.el9_3.alma.x86_64.rpmelibreoffice-langpack-eo-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-12.el9_3.alma.x86_64.rpm!libreoffice-pyuno-7.1.8.1-12.el9_3.alma.x86_64.rpmXautocorr-fi-7.1.8.1-12.el9_3.alma.noarch.rpm3libreoffice-help-eo-7.1.8.1-12.el9_3.alma.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-12.el9_3.alma.x86_64.rpmClibreoffice-help-lt-7.1.8.1-12.el9_3.alma.x86_64.rpm*libreoffice-help-bg-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-te-7.1.8.1-12.el9_3.alma.x86_64.rpmilibreoffice-langpack-fa-7.1.8.1-12.el9_3.alma.x86_64.rpmmlibreoffice-langpack-ga-7.1.8.1-12.el9_3.alma.x86_64.rpm_libreoffice-langpack-cy-7.1.8.1-12.el9_3.alma.x86_64.rpmvlibreoffice-langpack-ja-7.1.8.1-12.el9_3.alma.x86_64.rpmnlibreoffice-langpack-gl-7.1.8.1-12.el9_3.alma.x86_64.rpmpautocorr-vro-7.1.8.1-12.el9_3.alma.noarch.rpmIlibreoffice-help-pt-BR-7.1.8.1-12.el9_3.alma.x86_64.rpm7libreoffice-help-fi-7.1.8.1-12.el9_3.alma.x86_64.rpm`autocorr-ja-7.1.8.1-12.el9_3.alma.noarch.rpmXlibreoffice-langpack-ar-7.1.8.1-12.el9_3.alma.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-12.el9_3.alma.x86_64.rpmBlibreoffice-help-ko-7.1.8.1-12.el9_3.alma.x86_64.rpmTautocorr-el-7.1.8.1-12.el9_3.alma.noarch.rpmOautocorr-ca-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-ss-7.1.8.1-12.el9_3.alma.x86_64.rpmPautocorr-cs-7.1.8.1-12.el9_3.alma.noarch.rpm.libreoffice-help-da-7.1.8.1-12.el9_3.alma.x86_64.rpmzlibreoffice-langpack-lt-7.1.8.1-12.el9_3.alma.x86_64.rpm1libreoffice-help-el-7.1.8.1-12.el9_3.alma.x86_64.rpm^autocorr-is-7.1.8.1-12.el9_3.alma.noarch.rpm+libreoffice-help-bn-7.1.8.1-12.el9_3.alma.x86_64.rpm)libreoffice-help-ar-7.1.8.1-12.el9_3.alma.x86_64.rpmhautocorr-ro-7.1.8.1-12.el9_3.alma.noarch.rpm8libreoffice-help-fr-7.1.8.1-12.el9_3.alma.x86_64.rpmNlibreoffice-help-sk-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-math-7.1.8.1-12.el9_3.alma.x86_64.rpmWlibreoffice-langpack-af-7.1.8.1-12.el9_3.alma.x86_64.rpm#libreoffice-wiki-publisher-7.1.8.1-12.el9_3.alma.x86_64.rpmclibreoffice-langpack-el-7.1.8.1-12.el9_3.alma.x86_64.rpmgautocorr-pt-7.1.8.1-12.el9_3.alma.noarch.rpmlibreoffice-langpack-nl-7.1.8.1-12.el9_3.alma.x86_64.rpm\autocorr-hsb-7.1.8.1-12.el9_3.alma.noarch.rpmZautocorr-ga-7.1.8.1-12.el9_3.alma.noarch.rpmWautocorr-fa-7.1.8.1-12.el9_3.alma.noarch.rpm libreoffice-langpack-sl-7.1.8.1-12.el9_3.alma.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-12.el9_3.alma.x86_64.rpm]autocorr-hu-7.1.8.1-12.el9_3.alma.noarch.rpm libreoffice-base-7.1.8.1-12.el9_3.alma.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-12.el9_3.alma.x86_64.rpmslibreoffice-langpack-hu-7.1.8.1-12.el9_3.alma.x86_64.rpmqlibreoffice-langpack-hi-7.1.8.1-12.el9_3.alma.x86_64.rpm(libreoffice-gtk3-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-ure-common-7.1.8.1-12.el9_3.alma.noarch.rpmjautocorr-sk-7.1.8.1-12.el9_3.alma.noarch.rpm%libreoffice-x11-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-ve-7.1.8.1-12.el9_3.alma.x86_64.rpm=libreoffice-help-hr-7.1.8.1-12.el9_3.alma.x86_64.rpm libreoffice-langpack-ro-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-zu-7.1.8.1-12.el9_3.alma.x86_64.rpmylibreoffice-langpack-ko-7.1.8.1-12.el9_3.alma.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-12.el9_3.alma.x86_64.rpmlibreoffice-langpack-tn-7.1.8.1-12.el9_3.alma.x86_64.rpm`libreoffice-langpack-da-7.1.8.1-12.el9_3.alma.x86_64.rpm^ securityImportant: postgresql-jdbc security update]ohttps://access.redhat.com/errata/RHSA-2024:1436RHSA-2024:1436RHSA-2024:1436 https://access.redhat.com/security/cve/CVE-2024-1597CVE-2024-1597CVE-2024-1597https://bugzilla.redhat.com/22665232266523https://errata.almalinux.org/9/ALSA-2024-1436.htmlALSA-2024:1436ALSA-2024:1436 )Gpostgresql-jdbc-42.2.28-1.el9_3.noarch.rpm)Gpostgresql-jdbc-42.2.28-1.el9_3.noarch.rpmg VBBBBBBBBsecurityImportant: nodejs security updateLHhttps://access.redhat.com/errata/RHSA-2024:1438RHSA-2024:1438RHSA-2024:1438 https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645742264574https://errata.almalinux.org/9/ALSA-2024-1438.htmlALSA-2024:1438ALSA-2024:1438 cxnpm-8.19.4-1.16.20.2.4.el9_3.x86_64.rpm+>nodejs-16.20.2-4.el9_3.x86_64.rpm>nodejs-libs-16.20.2-4.el9_3.i686.rpmd>nodejs-full-i18n-16.20.2-4.el9_3.x86_64.rpm<>nodejs-docs-16.20.2-4.el9_3.noarch.rpm>nodejs-libs-16.20.2-4.el9_3.x86_64.rpmcxnpm-8.19.4-1.16.20.2.4.el9_3.x86_64.rpm+>nodejs-16.20.2-4.el9_3.x86_64.rpm>nodejs-libs-16.20.2-4.el9_3.i686.rpmd>nodejs-full-i18n-16.20.2-4.el9_3.x86_64.rpm<>nodejs-docs-16.20.2-4.el9_3.noarch.rpm>nodejs-libs-16.20.2-4.el9_3.x86_64.rpm  +aBBBBBBBBsecurityImportant: golang security updateBhttps://access.redhat.com/errata/RHSA-2024:1462RHSA-2024:1462RHSA-2024:1462 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1462.htmlALSA-2024:1462ALSA-2024:1462 ogolang-tests-1.20.12-2.el9_3.noarch.rpm@golang-1.20.12-2.el9_3.x86_64.rpmAgolang-bin-1.20.12-2.el9_3.x86_64.rpmEgo-toolset-1.20.12-2.el9_3.x86_64.rpmmgolang-misc-1.20.12-2.el9_3.noarch.rpmlgolang-docs-1.20.12-2.el9_3.noarch.rpmngolang-src-1.20.12-2.el9_3.noarch.rpmogolang-tests-1.20.12-2.el9_3.noarch.rpm@golang-1.20.12-2.el9_3.x86_64.rpmAgolang-bin-1.20.12-2.el9_3.x86_64.rpmEgo-toolset-1.20.12-2.el9_3.x86_64.rpmmgolang-misc-1.20.12-2.el9_3.noarch.rpmlgolang-docs-1.20.12-2.el9_3.noarch.rpmngolang-src-1.20.12-2.el9_3.noarch.rpm& 0lBBsecurityCritical: firefox security update;VChttps://access.redhat.com/errata/RHSA-2024:1485RHSA-2024:1485RHSA-2024:1485 https://access.redhat.com/security/cve/CVE-2023-5388CVE-2023-5388CVE-2023-5388https://access.redhat.com/security/cve/CVE-2024-0743CVE-2024-0743CVE-2024-0743https://access.redhat.com/security/cve/CVE-2024-2607CVE-2024-2607CVE-2024-2607https://access.redhat.com/security/cve/CVE-2024-2608CVE-2024-2608CVE-2024-2608https://access.redhat.com/security/cve/CVE-2024-2610CVE-2024-2610CVE-2024-2610https://access.redhat.com/security/cve/CVE-2024-2611CVE-2024-2611CVE-2024-2611https://access.redhat.com/security/cve/CVE-2024-2612CVE-2024-2612CVE-2024-2612https://access.redhat.com/security/cve/CVE-2024-2614CVE-2024-2614CVE-2024-2614https://access.redhat.com/security/cve/CVE-2024-2616CVE-2024-2616CVE-2024-2616https://access.redhat.com/security/cve/CVE-2024-29944CVE-2024-29944CVE-2024-29944https://bugzilla.redhat.com/22436442243644https://bugzilla.redhat.com/22600122260012https://bugzilla.redhat.com/22706602270660https://bugzilla.redhat.com/22706612270661https://bugzilla.redhat.com/22706622270662https://bugzilla.redhat.com/22706632270663https://bugzilla.redhat.com/22706642270664https://bugzilla.redhat.com/22706652270665https://bugzilla.redhat.com/22706662270666https://bugzilla.redhat.com/22710642271064https://errata.almalinux.org/9/ALSA-2024-1485.htmlALSA-2024:1485ALSA-2024:1485 OSfirefox-x11-115.9.1-1.el9_3.alma.1.x86_64.rpm7Sfirefox-115.9.1-1.el9_3.alma.1.x86_64.rpmOSfirefox-x11-115.9.1-1.el9_3.alma.1.x86_64.rpm7Sfirefox-115.9.1-1.el9_3.alma.1.x86_64.rpm 3qsecurityModerate: thunderbird security updateKhttps://access.redhat.com/errata/RHSA-2024:1493RHSA-2024:1493RHSA-2024:1493 https://access.redhat.com/security/cve/CVE-2023-5388CVE-2023-5388CVE-2023-5388https://access.redhat.com/security/cve/CVE-2024-0743CVE-2024-0743CVE-2024-0743https://access.redhat.com/security/cve/CVE-2024-1936CVE-2024-1936CVE-2024-1936https://access.redhat.com/security/cve/CVE-2024-2607CVE-2024-2607CVE-2024-2607https://access.redhat.com/security/cve/CVE-2024-2608CVE-2024-2608CVE-2024-2608https://access.redhat.com/security/cve/CVE-2024-2610CVE-2024-2610CVE-2024-2610https://access.redhat.com/security/cve/CVE-2024-2611CVE-2024-2611CVE-2024-2611https://access.redhat.com/security/cve/CVE-2024-2612CVE-2024-2612CVE-2024-2612https://access.redhat.com/security/cve/CVE-2024-2614CVE-2024-2614CVE-2024-2614https://bugzilla.redhat.com/22436442243644https://bugzilla.redhat.com/22600122260012https://bugzilla.redhat.com/22681712268171https://bugzilla.redhat.com/22706602270660https://bugzilla.redhat.com/22706612270661https://bugzilla.redhat.com/22706632270663https://bugzilla.redhat.com/22706642270664https://bugzilla.redhat.com/22706652270665https://bugzilla.redhat.com/22706662270666https://errata.almalinux.org/9/ALSA-2024-1493.htmlALSA-2024:1493ALSA-2024:1493 9@thunderbird-115.9.0-1.el9_3.alma.1.x86_64.rpm9@thunderbird-115.9.0-1.el9_3.alma.1.x86_64.rpm٨? 6tsecurityImportant: grafana security updatednhttps://access.redhat.com/errata/RHSA-2024:1501RHSA-2024:1501RHSA-2024:1501 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1501.htmlALSA-2024:1501ALSA-2024:1501 Fgrafana-9.2.10-8.el9_3.alma.1.x86_64.rpmFgrafana-9.2.10-8.el9_3.alma.1.x86_64.rpm9 9wsecurityImportant: grafana-pcp security updateR:https://access.redhat.com/errata/RHSA-2024:1502RHSA-2024:1502RHSA-2024:1502 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-1502.htmlALSA-2024:1502ALSA-2024:1502 dfgrafana-pcp-5.1.1-2.el9_3.alma.1.x86_64.rpmdfgrafana-pcp-5.1.1-2.el9_3.alma.1.x86_64.rpm$ TBFaBBBBBBBsecurityImportant: nodejs:18 security update https://access.redhat.com/errata/RHSA-2024:1503RHSA-2024:1503RHSA-2024:1503 https://access.redhat.com/security/cve/CVE-2023-46809CVE-2023-46809CVE-2023-46809https://access.redhat.com/security/cve/CVE-2024-21892CVE-2024-21892CVE-2024-21892https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645692264569https://bugzilla.redhat.com/22645742264574https://bugzilla.redhat.com/22645822264582https://errata.almalinux.org/9/ALSA-2024-1503.htmlALSA-2024:1503ALSA-2024:1503 +ni'!nodejs-devel-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm+nodejs-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm<nodejs-docs-18.19.1-1.module_el9.3.0+59+28b95644.noarch.rpmk2nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmdnodejs-full-i18n-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmc^npm-10.2.4-1.18.19.1.1.module_el9.3.0+59+28b95644.x86_64.rpm+ni'!nodejs-devel-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm+nodejs-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm<nodejs-docs-18.19.1-1.module_el9.3.0+59+28b95644.noarch.rpmk2nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmdnodejs-full-i18n-18.19.1-1.module_el9.3.0+59+28b95644.x86_64.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmc^npm-10.2.4-1.18.19.1.1.module_el9.3.0+59+28b95644.x86_64.rpm  DBsecurityModerate: expat security update+Bhttps://access.redhat.com/errata/RHSA-2024:1530RHSA-2024:1530RHSA-2024:1530 https://access.redhat.com/security/cve/CVE-2023-52425CVE-2023-52425CVE-2023-52425https://access.redhat.com/security/cve/CVE-2024-28757CVE-2024-28757CVE-2024-28757https://bugzilla.redhat.com/22628772262877https://bugzilla.redhat.com/22687662268766https://errata.almalinux.org/9/ALSA-2024-1530.htmlALSA-2024:1530ALSA-2024:1530 #expat-devel-2.5.0-1.el9_3.1.i686.rpm#expat-devel-2.5.0-1.el9_3.1.x86_64.rpm#expat-devel-2.5.0-1.el9_3.1.i686.rpm#expat-devel-2.5.0-1.el9_3.1.x86_64.rpm  1~BBBBBFBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.1 security, bug fix, and enhancement updatem https://access.redhat.com/errata/RHSA-2024:1576RHSA-2024:1576RHSA-2024:1576 https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2023-36617CVE-2023-36617CVE-2023-36617https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22186142218614https://errata.almalinux.org/9/ALSA-2024-1576.htmlALSA-2024:1576ALSA-2024:1576 "nj'$DKrubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmLrrubygem-irb-1.4.1-143.module_el9.3.0+60+5ebc989a.noarch.rpmJeruby-default-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpmKrubygem-bundler-2.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpmVurubygems-devel-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpmeruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmeruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpmTArubygem-typeprof-0.21.3-143.module_el9.3.0+60+5ebc989a.noarch.rpmA=rubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpmQ2rubygem-rexml-3.2.5-143.module_el9.3.0+60+5ebc989a.noarch.rpmPUrubygem-rdoc-6.4.0-143.module_el9.3.0+60+5ebc989a.noarch.rpm*irubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmS>rubygem-test-unit-3.5.3-143.module_el9.3.0+60+5ebc989a.noarch.rpmeruby-doc-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpmC)rubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.i686.rpmUurubygems-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpm eruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmNrubygem-power_assert-2.0.1-143.module_el9.3.0+60+5ebc989a.noarch.rpmDKrubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.i686.rpmC)rubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpmeruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmeruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpmBkrubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.x86_64.rpm eruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm+rubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.i686.rpmMKrubygem-minitest-5.15.0-143.module_el9.3.0+60+5ebc989a.noarch.rpmO~rubygem-rake-13.0.6-143.module_el9.3.0+60+5ebc989a.noarch.rpmpkrubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm"eruby-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpmnirubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpmR;rubygem-rss-0.2.9-143.module_el9.3.0+60+5ebc989a.noarch.rpmA=rubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.i686.rpm"eruby-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmBkrubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.i686.rpmokrubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm+rubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.x86_64.rpm"nj'$DKrubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmLrrubygem-irb-1.4.1-143.module_el9.3.0+60+5ebc989a.noarch.rpmJeruby-default-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpmKrubygem-bundler-2.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpmVurubygems-devel-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpmeruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmeruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpmTArubygem-typeprof-0.21.3-143.module_el9.3.0+60+5ebc989a.noarch.rpmA=rubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpmQ2rubygem-rexml-3.2.5-143.module_el9.3.0+60+5ebc989a.noarch.rpmPUrubygem-rdoc-6.4.0-143.module_el9.3.0+60+5ebc989a.noarch.rpm*irubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmS>rubygem-test-unit-3.5.3-143.module_el9.3.0+60+5ebc989a.noarch.rpmeruby-doc-3.1.4-143.module_el9.3.0+60+5ebc989a.noarch.rpmC)rubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.i686.rpmUurubygems-3.3.26-143.module_el9.3.0+60+5ebc989a.noarch.rpm eruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmNrubygem-power_assert-2.0.1-143.module_el9.3.0+60+5ebc989a.noarch.rpmDKrubygem-psych-4.0.4-143.module_el9.3.0+60+5ebc989a.i686.rpmC)rubygem-json-2.6.1-143.module_el9.3.0+60+5ebc989a.x86_64.rpmeruby-libs-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmeruby-devel-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpmBkrubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.x86_64.rpm eruby-bundled-gems-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpm+rubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.i686.rpmMKrubygem-minitest-5.15.0-143.module_el9.3.0+60+5ebc989a.noarch.rpmO~rubygem-rake-13.0.6-143.module_el9.3.0+60+5ebc989a.noarch.rpmpkrubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpm"eruby-3.1.4-143.module_el9.3.0+60+5ebc989a.i686.rpmnirubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpmR;rubygem-rss-0.2.9-143.module_el9.3.0+60+5ebc989a.noarch.rpmA=rubygem-bigdecimal-3.1.1-143.module_el9.3.0+60+5ebc989a.i686.rpm"eruby-3.1.4-143.module_el9.3.0+60+5ebc989a.x86_64.rpmBkrubygem-io-console-0.5.11-143.module_el9.3.0+60+5ebc989a.i686.rpmokrubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm+rubygem-rbs-2.7.0-143.module_el9.3.0+60+5ebc989a.x86_64.rpmL  =kHBBBBBBBBBsecurityImportant: nodejs:20 security updateqUhttps://access.redhat.com/errata/RHSA-2024:1688RHSA-2024:1688RHSA-2024:1688 https://access.redhat.com/security/cve/CVE-2023-46809CVE-2023-46809CVE-2023-46809https://access.redhat.com/security/cve/CVE-2024-21890CVE-2024-21890CVE-2024-21890https://access.redhat.com/security/cve/CVE-2024-21891CVE-2024-21891CVE-2024-21891https://access.redhat.com/security/cve/CVE-2024-21892CVE-2024-21892CVE-2024-21892https://access.redhat.com/security/cve/CVE-2024-21896CVE-2024-21896CVE-2024-21896https://access.redhat.com/security/cve/CVE-2024-22017CVE-2024-22017CVE-2024-22017https://access.redhat.com/security/cve/CVE-2024-22019CVE-2024-22019CVE-2024-22019https://bugzilla.redhat.com/22645692264569https://bugzilla.redhat.com/22645742264574https://bugzilla.redhat.com/22645822264582https://bugzilla.redhat.com/22657172265717https://bugzilla.redhat.com/22657202265720https://bugzilla.redhat.com/22657222265722https://bugzilla.redhat.com/22657272265727https://errata.almalinux.org/9/ALSA-2024-1688.htmlALSA-2024:1688ALSA-2024:1688 +2k'< nodejs-docs-20.11.1-1.module_el9.3.0+88+29afeaa2.noarch.rpmbnodejs-packaging-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpm+ nodejs-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm! nodejs-devel-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpmk<nodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpmd nodejs-full-i18n-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpmbnodejs-packaging-bundler-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpmc_npm-10.2.4-1.20.11.1.1.module_el9.3.0+88+29afeaa2.x86_64.rpm+2k'< nodejs-docs-20.11.1-1.module_el9.3.0+88+29afeaa2.noarch.rpmbnodejs-packaging-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpm+ nodejs-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpm! nodejs-devel-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpmk<nodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpmd nodejs-full-i18n-20.11.1-1.module_el9.3.0+88+29afeaa2.x86_64.rpmbnodejs-packaging-bundler-2021.06-4.module_el9.3.0+48+1cf146a1.noarch.rpmc_npm-10.2.4-1.20.11.1.1.module_el9.3.0+88+29afeaa2.x86_64.rpmիv  ~BBBsecurityImportant: varnish security updateFthttps://access.redhat.com/errata/RHSA-2024:1691RHSA-2024:1691RHSA-2024:1691 https://access.redhat.com/security/cve/CVE-2024-30156CVE-2024-30156CVE-2024-30156https://bugzilla.redhat.com/22714862271486https://errata.almalinux.org/9/ALSA-2024-1691.htmlALSA-2024:1691ALSA-2024:1691 ,Qvarnish-6.6.2-4.el9_3.1.i686.rpm,Qvarnish-6.6.2-4.el9_3.1.x86_64.rpmQvarnish-docs-6.6.2-4.el9_3.1.x86_64.rpm,Qvarnish-6.6.2-4.el9_3.1.i686.rpm,Qvarnish-6.6.2-4.el9_3.1.x86_64.rpmQvarnish-docs-6.6.2-4.el9_3.1.x86_64.rpm>  DBBBBBsecurityImportant: unbound security update:6https://access.redhat.com/errata/RHSA-2024:1750RHSA-2024:1750RHSA-2024:1750 https://access.redhat.com/security/cve/CVE-2024-1488CVE-2024-1488CVE-2024-1488https://bugzilla.redhat.com/22641832264183https://errata.almalinux.org/9/ALSA-2024-1750.htmlALSA-2024:1750ALSA-2024:1750 lzunbound-libs-1.16.2-3.el9_3.5.x86_64.rpm zpython3-unbound-1.16.2-3.el9_3.5.x86_64.rpmzunbound-1.16.2-3.el9_3.5.x86_64.rpmlzunbound-libs-1.16.2-3.el9_3.5.i686.rpmlzunbound-libs-1.16.2-3.el9_3.5.x86_64.rpm zpython3-unbound-1.16.2-3.el9_3.5.x86_64.rpmzunbound-1.16.2-3.el9_3.5.x86_64.rpmlzunbound-libs-1.16.2-3.el9_3.5.i686.rpmH  LBBBBBBBBBBBBBsecurityImportant: bind security updatepGhttps://access.redhat.com/errata/RHSA-2024:1789RHSA-2024:1789RHSA-2024:1789 https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-1789.htmlALSA-2024:1789ALSA-2024:1789 ubind-license-9.16.23-14.el9_3.4.noarch.rpmupython3-bind-9.16.23-14.el9_3.4.noarch.rpmEubind-9.16.23-14.el9_3.4.x86_64.rpmGubind-dnssec-utils-9.16.23-14.el9_3.4.x86_64.rpmubind-dnssec-doc-9.16.23-14.el9_3.4.noarch.rpmFubind-chroot-9.16.23-14.el9_3.4.x86_64.rpm=7bind-dyndb-ldap-11.9-8.el9_3.3.alma.1.x86_64.rpmIubind-utils-9.16.23-14.el9_3.4.x86_64.rpmHubind-libs-9.16.23-14.el9_3.4.x86_64.rpm ubind-license-9.16.23-14.el9_3.4.noarch.rpmupython3-bind-9.16.23-14.el9_3.4.noarch.rpmEubind-9.16.23-14.el9_3.4.x86_64.rpmGubind-dnssec-utils-9.16.23-14.el9_3.4.x86_64.rpmubind-dnssec-doc-9.16.23-14.el9_3.4.noarch.rpmFubind-chroot-9.16.23-14.el9_3.4.x86_64.rpm=7bind-dyndb-ldap-11.9-8.el9_3.3.alma.1.x86_64.rpmIubind-utils-9.16.23-14.el9_3.4.x86_64.rpmHubind-libs-9.16.23-14.el9_3.4.x86_64.rpm (\BBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update7 https://access.redhat.com/errata/RHSA-2024:1818RHSA-2024:1818RHSA-2024:1818 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1818.htmlALSA-2024:1818ALSA-2024:1818 C]java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpmf]java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpmc]java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpme]java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpmd]java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpmB]java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpmb]java-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpmC]java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-2.el9.noarch.rpmf]java-1.8.0-openjdk-src-1.8.0.412.b08-2.el9.x86_64.rpmc]java-1.8.0-openjdk-demo-1.8.0.412.b08-2.el9.x86_64.rpme]java-1.8.0-openjdk-headless-1.8.0.412.b08-2.el9.x86_64.rpmd]java-1.8.0-openjdk-devel-1.8.0.412.b08-2.el9.x86_64.rpmB]java-1.8.0-openjdk-javadoc-1.8.0.412.b08-2.el9.noarch.rpmb]java-1.8.0-openjdk-1.8.0.412.b08-2.el9.x86_64.rpmy ;iBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security updateVn https://access.redhat.com/errata/RHSA-2024:1822RHSA-2024:1822RHSA-2024:1822 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21085CVE-2024-21085CVE-2024-21085https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750012275001https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1822.htmlALSA-2024:1822ALSA-2024:1822 )java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpm(java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpm,java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpm'java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpm&java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpm+java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpm-java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpm%java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpm*java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpm )java-11-openjdk-javadoc-11.0.23.0.9-3.el9.x86_64.rpm(java-11-openjdk-headless-11.0.23.0.9-3.el9.x86_64.rpm,java-11-openjdk-src-11.0.23.0.9-3.el9.x86_64.rpm'java-11-openjdk-devel-11.0.23.0.9-3.el9.x86_64.rpm&java-11-openjdk-demo-11.0.23.0.9-3.el9.x86_64.rpm+java-11-openjdk-jmods-11.0.23.0.9-3.el9.x86_64.rpm-java-11-openjdk-static-libs-11.0.23.0.9-3.el9.x86_64.rpm%java-11-openjdk-11.0.23.0.9-3.el9.x86_64.rpm*java-11-openjdk-javadoc-zip-11.0.23.0.9-3.el9.x86_64.rpmO |BBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updateD$ https://access.redhat.com/errata/RHSA-2024:1825RHSA-2024:1825RHSA-2024:1825 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://access.redhat.com/security/cve/CVE-2024-21094CVE-2024-21094CVE-2024-21094https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://bugzilla.redhat.com/22750052275005https://errata.almalinux.org/9/ALSA-2024-1825.htmlALSA-2024:1825ALSA-2024:1825 )java-17-openjdk-demo-17.0.11.0.9-2.el9.x86_64.rpm*java-17-openjdk-devel-17.0.11.0.9-2.el9.x86_64.rpm/java-17-openjdk-src-17.0.11.0.9-2.el9.x86_64.rpm,java-17-openjdk-javadoc-17.0.11.0.9-2.el9.x86_64.rpm0java-17-openjdk-static-libs-17.0.11.0.9-2.el9.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9.x86_64.rpm(java-17-openjdk-17.0.11.0.9-2.el9.x86_64.rpm+java-17-openjdk-headless-17.0.11.0.9-2.el9.x86_64.rpm.java-17-openjdk-jmods-17.0.11.0.9-2.el9.x86_64.rpm )java-17-openjdk-demo-17.0.11.0.9-2.el9.x86_64.rpm*java-17-openjdk-devel-17.0.11.0.9-2.el9.x86_64.rpm/java-17-openjdk-src-17.0.11.0.9-2.el9.x86_64.rpm,java-17-openjdk-javadoc-17.0.11.0.9-2.el9.x86_64.rpm0java-17-openjdk-static-libs-17.0.11.0.9-2.el9.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.11.0.9-2.el9.x86_64.rpm(java-17-openjdk-17.0.11.0.9-2.el9.x86_64.rpm+java-17-openjdk-headless-17.0.11.0.9-2.el9.x86_64.rpm.java-17-openjdk-jmods-17.0.11.0.9-2.el9.x86_64.rpm$ !OBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security updatehHhttps://access.redhat.com/errata/RHSA-2024:1828RHSA-2024:1828RHSA-2024:1828 https://access.redhat.com/security/cve/CVE-2024-21011CVE-2024-21011CVE-2024-21011https://access.redhat.com/security/cve/CVE-2024-21012CVE-2024-21012CVE-2024-21012https://access.redhat.com/security/cve/CVE-2024-21068CVE-2024-21068CVE-2024-21068https://bugzilla.redhat.com/22749752274975https://bugzilla.redhat.com/22749772274977https://bugzilla.redhat.com/22750032275003https://errata.almalinux.org/9/ALSA-2024-1828.htmlALSA-2024:1828ALSA-2024:1828 1$java-21-openjdk-headless-21.0.3.0.9-1.el9.alma.1.x86_64.rpm0$java-21-openjdk-devel-21.0.3.0.9-1.el9.alma.1.x86_64.rpm5$java-21-openjdk-src-21.0.3.0.9-1.el9.alma.1.x86_64.rpm3$java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.alma.1.x86_64.rpm4$java-21-openjdk-jmods-21.0.3.0.9-1.el9.alma.1.x86_64.rpm6$java-21-openjdk-static-libs-21.0.3.0.9-1.el9.alma.1.x86_64.rpm2$java-21-openjdk-javadoc-21.0.3.0.9-1.el9.alma.1.x86_64.rpm.$java-21-openjdk-21.0.3.0.9-1.el9.alma.1.x86_64.rpm/$java-21-openjdk-demo-21.0.3.0.9-1.el9.alma.1.x86_64.rpm 1$java-21-openjdk-headless-21.0.3.0.9-1.el9.alma.1.x86_64.rpm0$java-21-openjdk-devel-21.0.3.0.9-1.el9.alma.1.x86_64.rpm5$java-21-openjdk-src-21.0.3.0.9-1.el9.alma.1.x86_64.rpm3$java-21-openjdk-javadoc-zip-21.0.3.0.9-1.el9.alma.1.x86_64.rpm4$java-21-openjdk-jmods-21.0.3.0.9-1.el9.alma.1.x86_64.rpm6$java-21-openjdk-static-libs-21.0.3.0.9-1.el9.alma.1.x86_64.rpm2$java-21-openjdk-javadoc-21.0.3.0.9-1.el9.alma.1.x86_64.rpm.$java-21-openjdk-21.0.3.0.9-1.el9.alma.1.x86_64.rpm/$java-21-openjdk-demo-21.0.3.0.9-1.el9.alma.1.x86_64.rpmT $bsecurityImportant: mod_http2 security update0vhttps://access.redhat.com/errata/RHSA-2024:1872RHSA-2024:1872RHSA-2024:1872 https://access.redhat.com/security/cve/CVE-2024-27316CVE-2024-27316CVE-2024-27316https://bugzilla.redhat.com/22682772268277https://errata.almalinux.org/9/ALSA-2024-1872.htmlALSA-2024:1872ALSA-2024:1872 )mod_http2-1.15.19-5.el9_3.1.x86_64.rpm)mod_http2-1.15.19-5.el9_3.1.x86_64.rpm@ 0eBBBBBBBBBsecurityModerate: gnutls security update&https://access.redhat.com/errata/RHSA-2024:1879RHSA-2024:1879RHSA-2024:1879 https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-1879.htmlALSA-2024:1879ALSA-2024:1879 Qgnutls-dane-3.7.6-23.el9_3.4.i686.rpmRgnutls-devel-3.7.6-23.el9_3.4.x86_64.rpmgnutls-utils-3.7.6-23.el9_3.4.x86_64.rpmRgnutls-devel-3.7.6-23.el9_3.4.i686.rpmPgnutls-c++-3.7.6-23.el9_3.4.x86_64.rpmPgnutls-c++-3.7.6-23.el9_3.4.i686.rpmQgnutls-dane-3.7.6-23.el9_3.4.x86_64.rpmQgnutls-dane-3.7.6-23.el9_3.4.i686.rpmRgnutls-devel-3.7.6-23.el9_3.4.x86_64.rpmgnutls-utils-3.7.6-23.el9_3.4.x86_64.rpmRgnutls-devel-3.7.6-23.el9_3.4.i686.rpmPgnutls-c++-3.7.6-23.el9_3.4.x86_64.rpmPgnutls-c++-3.7.6-23.el9_3.4.i686.rpmQgnutls-dane-3.7.6-23.el9_3.4.x86_64.rpm 5qBBsecurityImportant: firefox security update8@https://access.redhat.com/errata/RHSA-2024:1908RHSA-2024:1908RHSA-2024:1908 https://access.redhat.com/security/cve/CVE-2024-2609CVE-2024-2609CVE-2024-2609https://access.redhat.com/security/cve/CVE-2024-3852CVE-2024-3852CVE-2024-3852https://access.redhat.com/security/cve/CVE-2024-3854CVE-2024-3854CVE-2024-3854https://access.redhat.com/security/cve/CVE-2024-3857CVE-2024-3857CVE-2024-3857https://access.redhat.com/security/cve/CVE-2024-3859CVE-2024-3859CVE-2024-3859https://access.redhat.com/security/cve/CVE-2024-3861CVE-2024-3861CVE-2024-3861https://access.redhat.com/security/cve/CVE-2024-3864CVE-2024-3864CVE-2024-3864https://bugzilla.redhat.com/22755472275547https://bugzilla.redhat.com/22755492275549https://bugzilla.redhat.com/22755502275550https://bugzilla.redhat.com/22755512275551https://bugzilla.redhat.com/22755522275552https://bugzilla.redhat.com/22755532275553https://bugzilla.redhat.com/22755552275555https://errata.almalinux.org/9/ALSA-2024-1908.htmlALSA-2024:1908ALSA-2024:1908 OMfirefox-x11-115.10.0-1.el9_3.alma.1.x86_64.rpm7Mfirefox-115.10.0-1.el9_3.alma.1.x86_64.rpmOMfirefox-x11-115.10.0-1.el9_3.alma.1.x86_64.rpm7Mfirefox-115.10.0-1.el9_3.alma.1.x86_64.rpm, 8vsecurityLow: thunderbird security update3xhttps://access.redhat.com/errata/RHSA-2024:1940RHSA-2024:1940RHSA-2024:1940 https://access.redhat.com/security/cve/CVE-2024-2609CVE-2024-2609CVE-2024-2609https://access.redhat.com/security/cve/CVE-2024-3302CVE-2024-3302CVE-2024-3302https://access.redhat.com/security/cve/CVE-2024-3852CVE-2024-3852CVE-2024-3852https://access.redhat.com/security/cve/CVE-2024-3854CVE-2024-3854CVE-2024-3854https://access.redhat.com/security/cve/CVE-2024-3857CVE-2024-3857CVE-2024-3857https://access.redhat.com/security/cve/CVE-2024-3859CVE-2024-3859CVE-2024-3859https://access.redhat.com/security/cve/CVE-2024-3861CVE-2024-3861CVE-2024-3861https://access.redhat.com/security/cve/CVE-2024-3864CVE-2024-3864CVE-2024-3864https://bugzilla.redhat.com/22733832273383https://bugzilla.redhat.com/22755472275547https://bugzilla.redhat.com/22755492275549https://bugzilla.redhat.com/22755502275550https://bugzilla.redhat.com/22755512275551https://bugzilla.redhat.com/22755522275552https://bugzilla.redhat.com/22755532275553https://bugzilla.redhat.com/22755552275555https://errata.almalinux.org/9/ALSA-2024-1940.htmlALSA-2024:1940ALSA-2024:1940 9:thunderbird-115.10.0-2.el9_3.alma.1.x86_64.rpm9:thunderbird-115.10.0-2.el9_3.alma.1.x86_64.rpm[ yBBBBBBBBsecurityImportant: golang security update;https://access.redhat.com/errata/RHSA-2024:1963RHSA-2024:1963RHSA-2024:1963 https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-1963.htmlALSA-2024:1963ALSA-2024:1963 @golang-1.20.12-4.el9_3.x86_64.rpmlgolang-docs-1.20.12-4.el9_3.noarch.rpmEgo-toolset-1.20.12-4.el9_3.x86_64.rpmogolang-tests-1.20.12-4.el9_3.noarch.rpmngolang-src-1.20.12-4.el9_3.noarch.rpmAgolang-bin-1.20.12-4.el9_3.x86_64.rpmmgolang-misc-1.20.12-4.el9_3.noarch.rpm@golang-1.20.12-4.el9_3.x86_64.rpmlgolang-docs-1.20.12-4.el9_3.noarch.rpmEgo-toolset-1.20.12-4.el9_3.x86_64.rpmogolang-tests-1.20.12-4.el9_3.noarch.rpmngolang-src-1.20.12-4.el9_3.noarch.rpmAgolang-bin-1.20.12-4.el9_3.x86_64.rpmmgolang-misc-1.20.12-4.el9_3.noarch.rpmt DsecurityModerate: libreswan security and bug fix updateINhttps://access.redhat.com/errata/RHSA-2024:2033RHSA-2024:2033RHSA-2024:2033 https://access.redhat.com/security/cve/CVE-2024-2357CVE-2024-2357CVE-2024-2357https://bugzilla.redhat.com/22689522268952https://errata.almalinux.org/9/ALSA-2024-2033.htmlALSA-2024:2033ALSA-2024:2033 (Mlibreswan-4.12-1.el9_3.1.alma.1.x86_64.rpm(Mlibreswan-4.12-1.el9_3.1.alma.1.x86_64.rpm` GBBsecurityImportant: buildah security updateghttps://access.redhat.com/errata/RHSA-2024:2055RHSA-2024:2055RHSA-2024:2055 https://access.redhat.com/security/cve/CVE-2024-1753CVE-2024-1753CVE-2024-1753https://bugzilla.redhat.com/22655132265513https://errata.almalinux.org/9/ALSA-2024-2055.htmlALSA-2024:2055ALSA-2024:2055 ~pmix-3.2.3-5.el9.x86_64.rpm@~pmix-pmi-3.2.3-5.el9.x86_64.rpm>~pmix-3.2.3-5.el9.i686.rpme~pmix-tools-3.2.3-5.el9.x86_64.rpm?~pmix-devel-3.2.3-5.el9.i686.rpm?~pmix-devel-3.2.3-5.el9.x86_64.rpm@~pmix-pmi-3.2.3-5.el9.i686.rpm>~pmix-3.2.3-5.el9.x86_64.rpm@~pmix-pmi-3.2.3-5.el9.x86_64.rpm>~pmix-3.2.3-5.el9.i686.rpme~pmix-tools-3.2.3-5.el9.x86_64.rpm?~pmix-devel-3.2.3-5.el9.i686.rpm+ DBBBBBBsecurityModerate: libnbd security update}<https://access.redhat.com/errata/RHSA-2024:2204RHSA-2024:2204RHSA-2024:2204 https://access.redhat.com/security/cve/CVE-2023-5215CVE-2023-5215CVE-2023-5215https://access.redhat.com/security/cve/CVE-2023-5871CVE-2023-5871CVE-2023-5871https://bugzilla.redhat.com/22410412241041https://bugzilla.redhat.com/22473082247308https://errata.almalinux.org/9/ALSA-2024-2204.htmlALSA-2024:2204ALSA-2024:2204 {3libnbd-1.18.1-3.el9.x86_64.rpmM3python3-libnbd-1.18.1-3.el9.x86_64.rpmB3nbdfuse-1.18.1-3.el9.x86_64.rpm<3libnbd-bash-completion-1.18.1-3.el9.noarch.rpm{3libnbd-1.18.1-3.el9.i686.rpm{3libnbd-1.18.1-3.el9.x86_64.rpmM3python3-libnbd-1.18.1-3.el9.x86_64.rpmB3nbdfuse-1.18.1-3.el9.x86_64.rpm<3libnbd-bash-completion-1.18.1-3.el9.noarch.rpm{3libnbd-1.18.1-3.el9.i686.rpm6, MBBBBBBsecurityModerate: freerdp security update9ihttps://access.redhat.com/errata/RHSA-2024:2208RHSA-2024:2208RHSA-2024:2208 https://access.redhat.com/security/cve/CVE-2023-39350CVE-2023-39350CVE-2023-39350https://access.redhat.com/security/cve/CVE-2023-39351CVE-2023-39351CVE-2023-39351https://access.redhat.com/security/cve/CVE-2023-39352CVE-2023-39352CVE-2023-39352https://access.redhat.com/security/cve/CVE-2023-39353CVE-2023-39353CVE-2023-39353https://access.redhat.com/security/cve/CVE-2023-39354CVE-2023-39354CVE-2023-39354https://access.redhat.com/security/cve/CVE-2023-39356CVE-2023-39356CVE-2023-39356https://access.redhat.com/security/cve/CVE-2023-40181CVE-2023-40181CVE-2023-40181https://access.redhat.com/security/cve/CVE-2023-40186CVE-2023-40186CVE-2023-40186https://access.redhat.com/security/cve/CVE-2023-40188CVE-2023-40188CVE-2023-40188https://access.redhat.com/security/cve/CVE-2023-40567CVE-2023-40567CVE-2023-40567https://access.redhat.com/security/cve/CVE-2023-40569CVE-2023-40569CVE-2023-40569https://access.redhat.com/security/cve/CVE-2023-40589CVE-2023-40589CVE-2023-40589https://bugzilla.redhat.com/22366062236606https://bugzilla.redhat.com/22366502236650https://bugzilla.redhat.com/22366562236656https://bugzilla.redhat.com/22366692236669https://bugzilla.redhat.com/22367302236730https://bugzilla.redhat.com/22367502236750https://bugzilla.redhat.com/22367592236759https://bugzilla.redhat.com/22367632236763https://bugzilla.redhat.com/22367662236766https://bugzilla.redhat.com/22367742236774https://bugzilla.redhat.com/22367792236779https://bugzilla.redhat.com/22367842236784https://errata.almalinux.org/9/ALSA-2024-2208.htmlALSA-2024:2208ALSA-2024:2208 BEfreerdp-2.11.2-1.el9.x86_64.rpm@Elibwinpr-2.11.2-1.el9.i686.rpm=Efreerdp-libs-2.11.2-1.el9.x86_64.rpm@Elibwinpr-2.11.2-1.el9.x86_64.rpm=Efreerdp-libs-2.11.2-1.el9.i686.rpmBEfreerdp-2.11.2-1.el9.x86_64.rpm@Elibwinpr-2.11.2-1.el9.i686.rpm=Efreerdp-libs-2.11.2-1.el9.x86_64.rpm@Elibwinpr-2.11.2-1.el9.x86_64.rpm=Efreerdp-libs-2.11.2-1.el9.i686.rpm2- VsecurityModerate: tcpdump security update"hhttps://access.redhat.com/errata/RHSA-2024:2211RHSA-2024:2211RHSA-2024:2211 https://access.redhat.com/security/cve/CVE-2021-41043CVE-2021-41043CVE-2021-41043https://bugzilla.redhat.com/20403922040392https://errata.almalinux.org/9/ALSA-2024-2211.htmlALSA-2024:2211ALSA-2024:2211 Qtcpdump-4.99.0-9.el9.x86_64.rpmQtcpdump-4.99.0-9.el9.x86_64.rpm. ,YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: pcp security update Mhttps://access.redhat.com/errata/RHSA-2024:2213RHSA-2024:2213RHSA-2024:2213 https://access.redhat.com/security/cve/CVE-2023-6917CVE-2023-6917CVE-2023-6917https://bugzilla.redhat.com/22549832254983https://errata.almalinux.org/9/ALSA-2024-2213.htmlALSA-2024:2213ALSA-2024:2213 lspcp-selinux-6.2.0-1.el9.x86_64.rpm>pcp-pmda-gpsd-6.2.0-1.el9.x86_64.rpmppcp-pmda-weblog-6.2.0-1.el9.x86_64.rpm\pcp-pmda-podman-6.2.0-1.el9.x86_64.rpm-pcp-pmda-bind2-6.2.0-1.el9.x86_64.rpmCpcp-pmda-libvirt-6.2.0-1.el9.x86_64.rpmJpcp-pmda-memcache-6.2.0-1.el9.x86_64.rpm8pcp-pmda-ds389log-6.2.0-1.el9.x86_64.rpm5pcp-pmda-dm-6.2.0-1.el9.x86_64.rpm&pcp-import-iostat2pcp-6.2.0-1.el9.x86_64.rpm'pcp-import-mrtg2pcp-6.2.0-1.el9.x86_64.rpmgpcp-pmda-slurm-6.2.0-1.el9.x86_64.rpmOpcp-pmda-mysql-6.2.0-1.el9.x86_64.rpmpcp-conf-6.2.0-1.el9.x86_64.rpmpcp-testsuite-6.2.0-1.el9.x86_64.rpmYpcp-pmda-oracle-6.2.0-1.el9.x86_64.rpmVpcp-pmda-nvidia-gpu-6.2.0-1.el9.x86_64.rpmyperl-PCP-PMDA-6.2.0-1.el9.x86_64.rpmwperl-PCP-LogSummary-6.2.0-1.el9.x86_64.rpmPpcp-pmda-named-6.2.0-1.el9.x86_64.rpmqpcp-pmda-zimbra-6.2.0-1.el9.x86_64.rpmTpcp-pmda-nfsclient-6.2.0-1.el9.x86_64.rpmHpcp-pmda-lustrecomm-6.2.0-1.el9.x86_64.rpm<pcp-pmda-gluster-6.2.0-1.el9.x86_64.rpmpcp-devel-6.2.0-1.el9.i686.rpmpcp-export-pcp2elasticsearch-6.2.0-1.el9.x86_64.rpmpcp-export-pcp2graphite-6.2.0-1.el9.x86_64.rpmupcp-zeroconf-6.2.0-1.el9.x86_64.rpm0pcp-pmda-bpftrace-6.2.0-1.el9.x86_64.rpmbpcp-pmda-roomtemp-6.2.0-1.el9.x86_64.rpm[pcp-pmda-perfevent-6.2.0-1.el9.x86_64.rpm{python3-pcp-6.2.0-1.el9.x86_64.rpmcpcp-pmda-rsyslog-6.2.0-1.el9.x86_64.rpmBpcp-pmda-json-6.2.0-1.el9.x86_64.rpm pcp-export-pcp2zabbix-6.2.0-1.el9.x86_64.rpm:pcp-pmda-farm-6.2.0-1.el9.x86_64.rpm^pcp-pmda-postgresql-6.2.0-1.el9.x86_64.rpm"pcp-geolocate-6.2.0-1.el9.x86_64.rpm2pcp-pmda-cisco-6.2.0-1.el9.x86_64.rpmkpcp-pmda-statsd-6.2.0-1.el9.x86_64.rpmpcp-devel-6.2.0-1.el9.x86_64.rpmpcp-6.2.0-1.el9.x86_64.rpm`pcp-pmda-redis-6.2.0-1.el9.x86_64.rpmUpcp-pmda-nginx-6.2.0-1.el9.x86_64.rpm$pcp-import-collectl2pcp-6.2.0-1.el9.x86_64.rpmhpcp-pmda-smart-6.2.0-1.el9.x86_64.rpmpcp-doc-6.2.0-1.el9.noarch.rpmZpcp-pmda-pdns-6.2.0-1.el9.x86_64.rpmapcp-pmda-resctrl-6.2.0-1.el9.x86_64.rpmpcp-libs-devel-6.2.0-1.el9.x86_64.rpmdpcp-pmda-samba-6.2.0-1.el9.x86_64.rpm=pcp-pmda-gpfs-6.2.0-1.el9.x86_64.rpm@pcp-pmda-haproxy-6.2.0-1.el9.x86_64.rpmpcp-export-pcp2json-6.2.0-1.el9.x86_64.rpm,pcp-pmda-bcc-6.2.0-1.el9.x86_64.rpmLpcp-pmda-mongodb-6.2.0-1.el9.x86_64.rpmpcp-libs-devel-6.2.0-1.el9.i686.rpmpcp-libs-6.2.0-1.el9.x86_64.rpmDpcp-pmda-lio-6.2.0-1.el9.x86_64.rpmQpcp-pmda-netcheck-6.2.0-1.el9.x86_64.rpmfpcp-pmda-shping-6.2.0-1.el9.x86_64.rpm%pcp-import-ganglia2pcp-6.2.0-1.el9.x86_64.rpm.pcp-pmda-bonding-6.2.0-1.el9.x86_64.rpmRpcp-pmda-netfilter-6.2.0-1.el9.x86_64.rpmopcp-pmda-unbound-6.2.0-1.el9.x86_64.rpmtpcp-system-tools-6.2.0-1.el9.x86_64.rpmApcp-pmda-infiniband-6.2.0-1.el9.x86_64.rpmepcp-pmda-sendmail-6.2.0-1.el9.x86_64.rpm6pcp-pmda-docker-6.2.0-1.el9.x86_64.rpmpcp-export-pcp2xml-6.2.0-1.el9.x86_64.rpmMpcp-pmda-mounts-6.2.0-1.el9.x86_64.rpm4pcp-pmda-denki-6.2.0-1.el9.x86_64.rpmNpcp-pmda-mssql-6.2.0-1.el9.x86_64.rpmpcp-export-pcp2spark-6.2.0-1.el9.x86_64.rpm(pcp-import-sar2pcp-6.2.0-1.el9.x86_64.rpm)pcp-pmda-activemq-6.2.0-1.el9.x86_64.rpmnpcp-pmda-trace-6.2.0-1.el9.x86_64.rpmmpcp-pmda-systemd-6.2.0-1.el9.x86_64.rpm*pcp-pmda-apache-6.2.0-1.el9.x86_64.rpmWpcp-pmda-openmetrics-6.2.0-1.el9.x86_64.rpmxperl-PCP-MMV-6.2.0-1.el9.x86_64.rpmipcp-pmda-snmp-6.2.0-1.el9.x86_64.rpm!pcp-export-zabbix-agent-6.2.0-1.el9.x86_64.rpm+pcp-pmda-bash-6.2.0-1.el9.x86_64.rpm9pcp-pmda-elasticsearch-6.2.0-1.el9.x86_64.rpmSpcp-pmda-news-6.2.0-1.el9.x86_64.rpmlpcp-pmda-summary-6.2.0-1.el9.x86_64.rpm7pcp-pmda-ds389-6.2.0-1.el9.x86_64.rpmrpcp-pmda-zswap-6.2.0-1.el9.x86_64.rpm/pcp-pmda-bpf-6.2.0-1.el9.x86_64.rpm?pcp-pmda-hacluster-6.2.0-1.el9.x86_64.rpmXpcp-pmda-openvswitch-6.2.0-1.el9.x86_64.rpm#pcp-gui-6.2.0-1.el9.x86_64.rpmFpcp-pmda-logger-6.2.0-1.el9.x86_64.rpmIpcp-pmda-mailq-6.2.0-1.el9.x86_64.rpmjpcp-pmda-sockets-6.2.0-1.el9.x86_64.rpm3pcp-pmda-dbping-6.2.0-1.el9.x86_64.rpm_pcp-pmda-rabbitmq-6.2.0-1.el9.x86_64.rpm1pcp-pmda-cifs-6.2.0-1.el9.x86_64.rpmpcp-testsuite-6.2.0-1.el9.i686.rpmpcp-libs-6.2.0-1.el9.i686.rpm]pcp-pmda-postfix-6.2.0-1.el9.x86_64.rpmGpcp-pmda-lustre-6.2.0-1.el9.x86_64.rpmKpcp-pmda-mic-6.2.0-1.el9.x86_64.rpmpcp-export-pcp2influxdb-6.2.0-1.el9.x86_64.rpmEpcp-pmda-lmsensors-6.2.0-1.el9.x86_64.rpmvperl-PCP-LogImport-6.2.0-1.el9.x86_64.rpm;pcp-pmda-gfs2-6.2.0-1.el9.x86_64.rpmlspcp-selinux-6.2.0-1.el9.x86_64.rpm>pcp-pmda-gpsd-6.2.0-1.el9.x86_64.rpmppcp-pmda-weblog-6.2.0-1.el9.x86_64.rpm\pcp-pmda-podman-6.2.0-1.el9.x86_64.rpm-pcp-pmda-bind2-6.2.0-1.el9.x86_64.rpmCpcp-pmda-libvirt-6.2.0-1.el9.x86_64.rpmJpcp-pmda-memcache-6.2.0-1.el9.x86_64.rpm8pcp-pmda-ds389log-6.2.0-1.el9.x86_64.rpm5pcp-pmda-dm-6.2.0-1.el9.x86_64.rpm&pcp-import-iostat2pcp-6.2.0-1.el9.x86_64.rpm'pcp-import-mrtg2pcp-6.2.0-1.el9.x86_64.rpmgpcp-pmda-slurm-6.2.0-1.el9.x86_64.rpmOpcp-pmda-mysql-6.2.0-1.el9.x86_64.rpmpcp-conf-6.2.0-1.el9.x86_64.rpmpcp-testsuite-6.2.0-1.el9.x86_64.rpmYpcp-pmda-oracle-6.2.0-1.el9.x86_64.rpmVpcp-pmda-nvidia-gpu-6.2.0-1.el9.x86_64.rpmyperl-PCP-PMDA-6.2.0-1.el9.x86_64.rpmwperl-PCP-LogSummary-6.2.0-1.el9.x86_64.rpmPpcp-pmda-named-6.2.0-1.el9.x86_64.rpmqpcp-pmda-zimbra-6.2.0-1.el9.x86_64.rpmTpcp-pmda-nfsclient-6.2.0-1.el9.x86_64.rpmHpcp-pmda-lustrecomm-6.2.0-1.el9.x86_64.rpm<pcp-pmda-gluster-6.2.0-1.el9.x86_64.rpmpcp-devel-6.2.0-1.el9.i686.rpmpcp-export-pcp2elasticsearch-6.2.0-1.el9.x86_64.rpmpcp-export-pcp2graphite-6.2.0-1.el9.x86_64.rpmupcp-zeroconf-6.2.0-1.el9.x86_64.rpm0pcp-pmda-bpftrace-6.2.0-1.el9.x86_64.rpmbpcp-pmda-roomtemp-6.2.0-1.el9.x86_64.rpm[pcp-pmda-perfevent-6.2.0-1.el9.x86_64.rpm{python3-pcp-6.2.0-1.el9.x86_64.rpmcpcp-pmda-rsyslog-6.2.0-1.el9.x86_64.rpmBpcp-pmda-json-6.2.0-1.el9.x86_64.rpm pcp-export-pcp2zabbix-6.2.0-1.el9.x86_64.rpm:pcp-pmda-farm-6.2.0-1.el9.x86_64.rpm^pcp-pmda-postgresql-6.2.0-1.el9.x86_64.rpm"pcp-geolocate-6.2.0-1.el9.x86_64.rpm2pcp-pmda-cisco-6.2.0-1.el9.x86_64.rpmkpcp-pmda-statsd-6.2.0-1.el9.x86_64.rpmpcp-devel-6.2.0-1.el9.x86_64.rpmpcp-6.2.0-1.el9.x86_64.rpm`pcp-pmda-redis-6.2.0-1.el9.x86_64.rpmUpcp-pmda-nginx-6.2.0-1.el9.x86_64.rpm$pcp-import-collectl2pcp-6.2.0-1.el9.x86_64.rpmhpcp-pmda-smart-6.2.0-1.el9.x86_64.rpmpcp-doc-6.2.0-1.el9.noarch.rpmZpcp-pmda-pdns-6.2.0-1.el9.x86_64.rpmapcp-pmda-resctrl-6.2.0-1.el9.x86_64.rpmpcp-libs-devel-6.2.0-1.el9.x86_64.rpmdpcp-pmda-samba-6.2.0-1.el9.x86_64.rpm=pcp-pmda-gpfs-6.2.0-1.el9.x86_64.rpm@pcp-pmda-haproxy-6.2.0-1.el9.x86_64.rpmpcp-export-pcp2json-6.2.0-1.el9.x86_64.rpm,pcp-pmda-bcc-6.2.0-1.el9.x86_64.rpmLpcp-pmda-mongodb-6.2.0-1.el9.x86_64.rpmpcp-libs-devel-6.2.0-1.el9.i686.rpmpcp-libs-6.2.0-1.el9.x86_64.rpmDpcp-pmda-lio-6.2.0-1.el9.x86_64.rpmQpcp-pmda-netcheck-6.2.0-1.el9.x86_64.rpmfpcp-pmda-shping-6.2.0-1.el9.x86_64.rpm%pcp-import-ganglia2pcp-6.2.0-1.el9.x86_64.rpm.pcp-pmda-bonding-6.2.0-1.el9.x86_64.rpmRpcp-pmda-netfilter-6.2.0-1.el9.x86_64.rpmopcp-pmda-unbound-6.2.0-1.el9.x86_64.rpmtpcp-system-tools-6.2.0-1.el9.x86_64.rpmApcp-pmda-infiniband-6.2.0-1.el9.x86_64.rpmepcp-pmda-sendmail-6.2.0-1.el9.x86_64.rpm6pcp-pmda-docker-6.2.0-1.el9.x86_64.rpmpcp-export-pcp2xml-6.2.0-1.el9.x86_64.rpmMpcp-pmda-mounts-6.2.0-1.el9.x86_64.rpm4pcp-pmda-denki-6.2.0-1.el9.x86_64.rpmNpcp-pmda-mssql-6.2.0-1.el9.x86_64.rpmpcp-export-pcp2spark-6.2.0-1.el9.x86_64.rpm(pcp-import-sar2pcp-6.2.0-1.el9.x86_64.rpm)pcp-pmda-activemq-6.2.0-1.el9.x86_64.rpmnpcp-pmda-trace-6.2.0-1.el9.x86_64.rpmmpcp-pmda-systemd-6.2.0-1.el9.x86_64.rpm*pcp-pmda-apache-6.2.0-1.el9.x86_64.rpmWpcp-pmda-openmetrics-6.2.0-1.el9.x86_64.rpmxperl-PCP-MMV-6.2.0-1.el9.x86_64.rpmipcp-pmda-snmp-6.2.0-1.el9.x86_64.rpm!pcp-export-zabbix-agent-6.2.0-1.el9.x86_64.rpm+pcp-pmda-bash-6.2.0-1.el9.x86_64.rpm9pcp-pmda-elasticsearch-6.2.0-1.el9.x86_64.rpmSpcp-pmda-news-6.2.0-1.el9.x86_64.rpmlpcp-pmda-summary-6.2.0-1.el9.x86_64.rpm7pcp-pmda-ds389-6.2.0-1.el9.x86_64.rpmrpcp-pmda-zswap-6.2.0-1.el9.x86_64.rpm/pcp-pmda-bpf-6.2.0-1.el9.x86_64.rpm?pcp-pmda-hacluster-6.2.0-1.el9.x86_64.rpmXpcp-pmda-openvswitch-6.2.0-1.el9.x86_64.rpm#pcp-gui-6.2.0-1.el9.x86_64.rpmFpcp-pmda-logger-6.2.0-1.el9.x86_64.rpmIpcp-pmda-mailq-6.2.0-1.el9.x86_64.rpmjpcp-pmda-sockets-6.2.0-1.el9.x86_64.rpm3pcp-pmda-dbping-6.2.0-1.el9.x86_64.rpm_pcp-pmda-rabbitmq-6.2.0-1.el9.x86_64.rpm1pcp-pmda-cifs-6.2.0-1.el9.x86_64.rpmpcp-testsuite-6.2.0-1.el9.i686.rpmpcp-libs-6.2.0-1.el9.i686.rpm]pcp-pmda-postfix-6.2.0-1.el9.x86_64.rpmGpcp-pmda-lustre-6.2.0-1.el9.x86_64.rpmKpcp-pmda-mic-6.2.0-1.el9.x86_64.rpmpcp-export-pcp2influxdb-6.2.0-1.el9.x86_64.rpmEpcp-pmda-lmsensors-6.2.0-1.el9.x86_64.rpmvperl-PCP-LogImport-6.2.0-1.el9.x86_64.rpm;pcp-pmda-gfs2-6.2.0-1.el9.x86_64.rpmY/ 3mBBBBsecurityModerate: motif security updateW$https://access.redhat.com/errata/RHSA-2024:2217RHSA-2024:2217RHSA-2024:2217 https://access.redhat.com/security/cve/CVE-2023-43788CVE-2023-43788CVE-2023-43788https://access.redhat.com/security/cve/CVE-2023-43789CVE-2023-43789CVE-2023-43789https://bugzilla.redhat.com/22422482242248https://bugzilla.redhat.com/22422492242249https://errata.almalinux.org/9/ALSA-2024-2217.htmlALSA-2024:2217ALSA-2024:2217 2Dmotif-2.3.4-28.el9.i686.rpm3Dmotif-devel-2.3.4-28.el9.i686.rpm3Dmotif-devel-2.3.4-28.el9.x86_64.rpm2Dmotif-2.3.4-28.el9.x86_64.rpm2Dmotif-2.3.4-28.el9.i686.rpm3Dmotif-devel-2.3.4-28.el9.i686.rpm3Dmotif-devel-2.3.4-28.el9.x86_64.rpm2Dmotif-2.3.4-28.el9.x86_64.rpm0 2tBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: perl security update{3https://access.redhat.com/errata/RHSA-2024:2228RHSA-2024:2228RHSA-2024:2228 https://access.redhat.com/security/cve/CVE-2023-47038CVE-2023-47038CVE-2023-47038https://bugzilla.redhat.com/22495232249523https://errata.almalinux.org/9/ALSA-2024-2228.htmlALSA-2024:2228ALSA-2024:2228 fVperl-NDBM_File-1.15-481.el9.x86_64.rpm#5perl-Net-1.02-481.el9.noarch.rpmGperl-ExtUtils-Constant-0.25-481.el9.noarch.rpmbperl-IPC-Open3-1.21-481.el9.noarch.rpmSperl-Attribute-Handlers-1.01-481.el9.noarch.rpmC*perl-libnetcfg-5.32.1-481.el9.noarch.rpmBPperl-less-0.03-481.el9.noarch.rpm|perl-AutoSplit-5.74-481.el9.noarch.rpmNTperl-vars-1.05-481.el9.noarch.rpm Uperl-Devel-SelfStubber-1.06-481.el9.noarch.rpm3Vperl-Tie-Memoize-1.1-481.el9.noarch.rpm0perl-Thread-Semaphore-2.13-481.el9.noarch.rpmnperl-ExtUtils-Embed-1.35-481.el9.noarch.rpm^*perl-interpreter-5.32.1-481.el9.x86_64.rpm5perl-I18N-Collate-1.02-481.el9.noarch.rpmperl-FileHandle-2.03-481.el9.noarch.rpmYperl-FileCache-1.10-481.el9.noarch.rpm@uperl-filetest-1.03-481.el9.noarch.rpmI3perl-overloading-0.02-481.el9.noarch.rpm;*perl-libs-5.32.1-481.el9.x86_64.rpmY'perl-POSIX-1.94-481.el9.x86_64.rpmSperl-Hash-Util-FieldHash-1.20-481.el9.x86_64.rpm.5perl-Text-Abbrev-1.02-481.el9.noarch.rpmLperl-DynaLoader-1.47-481.el9.x86_64.rpm uperl-Memoize-1.03-481.el9.noarch.rpm Tperl-DirHandle-1.05-481.el9.noarch.rpm%cperl-Pod-Html-1.25-481.el9.noarch.rpm!perl-Module-Loaded-0.08-481.el9.noarch.rpm*Uperl-Symbol-1.08-481.el9.noarch.rpm_perl-lib-0.65-481.el9.x86_64.rpm7Xperl-autouse-1.11-481.el9.noarch.rpm9Vperl-blib-1.07-481.el9.noarch.rpm;*perl-libs-5.32.1-481.el9.i686.rpmperl-Locale-Maketext-Simple-0.21-481.el9.noarch.rpm>7perl-encoding-warnings-0.13-481.el9.noarch.rpm[perl-File-Find-1.37-481.el9.noarch.rpmD6perl-locale-1.09-481.el9.noarch.rpm$wperl-Pod-Functions-1.13-481.el9.noarch.rpmOwperl-Fcntl-1.13-481.el9.x86_64.rpmPperl-File-DosGlob-1.12-481.el9.x86_64.rpmNperl-Class-Struct-0.66-481.el9.noarch.rpm,^perl-Term-ReadLine-1.17-481.el9.noarch.rpmE*perl-macros-5.32.1-481.el9.noarch.rpm:xperl-debugger-1.56-481.el9.noarch.rpmperl-Getopt-Std-1.12-481.el9.noarch.rpmAMperl-if-0.60.800-481.el9.noarch.rpmWperl-ODBM_File-1.16-481.el9.x86_64.rpm 5perl-DBM_Filter-0.06-481.el9.noarch.rpmJ6perl-sigtrap-1.09-481.el9.noarch.rpm6uperl-User-pwent-1.03-481.el9.noarch.rpmZperl-File-Compare-1.100.600-481.el9.noarch.rpmQ perl-GDBM_File-1.18-481.el9.x86_64.rpm%perl-File-Basename-2.85-481.el9.noarch.rpm&!perl-Safe-2.41-481.el9.noarch.rpm'Vperl-Search-Dict-1.07-481.el9.noarch.rpm|perl-AutoLoader-5.74-481.el9.noarch.rpmKperl-sort-2.04-481.el9.noarch.rpm perl-Dumpvalue-2.27-481.el9.noarch.rpm)dperl-SelfLoader-1.26-481.el9.noarch.rpma3perl-ph-5.32.1-481.el9.x86_64.rpm=3perl-doc-5.32.1-481.el9.noarch.rpm6perl-File-stat-1.09-481.el9.noarch.rpm:*perl-devel-5.32.1-481.el9.i686.rpm+uperl-Term-Complete-1.403-481.el9.noarch.rpm<[perl-diagnostics-1.37-481.el9.noarch.rpm6perl-ExtUtils-Miniperl-1.09-481.el9.noarch.rpm:*perl-devel-5.32.1-481.el9.x86_64.rpm?perl-fields-2.27-481.el9.noarch.rpmF3perl-meta-notation-5.32.1-481.el9.noarch.rpmperl-Benchmark-1.23-481.el9.noarch.rpmKperl-Devel-Peek-1.28-481.el9.x86_64.rpmM3perl-utils-5.32.1-481.el9.noarch.rpm8perl-base-2.27-481.el9.noarch.rpm//perl-Thread-3.05-481.el9.noarch.rpmI#perl-B-1.80-481.el9.x86_64.rpm`perl-mro-1.23-481.el9.x86_64.rpmMperl-Errno-1.30-481.el9.x86_64.rpm-Zperl-Test-1.31-481.el9.noarch.rpmLuperl-subs-1.03-481.el9.noarch.rpmPperl-Config-Extensions-0.03-481.el9.noarch.rpmRperl-Hash-Util-0.23-481.el9.x86_64.rpm4uperl-Time-1.03-481.el9.noarch.rpm"Operl-NEXT-0.67-481.el9.noarch.rpm;4perl-deprecate-0.04-481.el9.noarch.rpmHZperl-overload-1.31-481.el9.noarch.rpm[perl-Sys-Hostname-1.23-481.el9.x86_64.rpmyperl-Math-Complex-1.59-481.el9.noarch.rpmX perl-Opcode-1.48-481.el9.x86_64.rpmLperl-I18N-LangTags-0.44-481.el9.noarch.rpmH*perl-5.32.1-481.el9.x86_64.rpm(5perl-SelectSaver-1.02-481.el9.noarch.rpm perl-File-Copy-2.34-481.el9.noarch.rpm1Dperl-Tie-4.6-481.el9.noarch.rpmwperl-FindBin-1.51-481.el9.noarch.rpm2Uperl-Tie-File-1.06-481.el9.noarch.rpmT|perl-I18N-Langinfo-0.19-481.el9.x86_64.rpmGperl-open-1.12-481.el9.noarch.rpmUperl-IO-1.43-481.el9.x86_64.rpmOTperl-vmsish-1.04-481.el9.noarch.rpm5Pperl-Unicode-UCD-0.75-481.el9.noarch.rpm Xperl-English-1.11-481.el9.noarch.rpm\perl-Time-Piece-1.3401-481.el9.x86_64.rpmfVperl-NDBM_File-1.15-481.el9.x86_64.rpm#5perl-Net-1.02-481.el9.noarch.rpmGperl-ExtUtils-Constant-0.25-481.el9.noarch.rpmbperl-IPC-Open3-1.21-481.el9.noarch.rpmSperl-Attribute-Handlers-1.01-481.el9.noarch.rpmC*perl-libnetcfg-5.32.1-481.el9.noarch.rpmBPperl-less-0.03-481.el9.noarch.rpm|perl-AutoSplit-5.74-481.el9.noarch.rpmNTperl-vars-1.05-481.el9.noarch.rpm Uperl-Devel-SelfStubber-1.06-481.el9.noarch.rpm3Vperl-Tie-Memoize-1.1-481.el9.noarch.rpm0perl-Thread-Semaphore-2.13-481.el9.noarch.rpmnperl-ExtUtils-Embed-1.35-481.el9.noarch.rpm^*perl-interpreter-5.32.1-481.el9.x86_64.rpm5perl-I18N-Collate-1.02-481.el9.noarch.rpmperl-FileHandle-2.03-481.el9.noarch.rpmYperl-FileCache-1.10-481.el9.noarch.rpm@uperl-filetest-1.03-481.el9.noarch.rpmI3perl-overloading-0.02-481.el9.noarch.rpm;*perl-libs-5.32.1-481.el9.x86_64.rpmY'perl-POSIX-1.94-481.el9.x86_64.rpmSperl-Hash-Util-FieldHash-1.20-481.el9.x86_64.rpm.5perl-Text-Abbrev-1.02-481.el9.noarch.rpmLperl-DynaLoader-1.47-481.el9.x86_64.rpm uperl-Memoize-1.03-481.el9.noarch.rpm Tperl-DirHandle-1.05-481.el9.noarch.rpm%cperl-Pod-Html-1.25-481.el9.noarch.rpm!perl-Module-Loaded-0.08-481.el9.noarch.rpm*Uperl-Symbol-1.08-481.el9.noarch.rpm_perl-lib-0.65-481.el9.x86_64.rpm7Xperl-autouse-1.11-481.el9.noarch.rpm9Vperl-blib-1.07-481.el9.noarch.rpm;*perl-libs-5.32.1-481.el9.i686.rpmperl-Locale-Maketext-Simple-0.21-481.el9.noarch.rpm>7perl-encoding-warnings-0.13-481.el9.noarch.rpm[perl-File-Find-1.37-481.el9.noarch.rpmD6perl-locale-1.09-481.el9.noarch.rpm$wperl-Pod-Functions-1.13-481.el9.noarch.rpmOwperl-Fcntl-1.13-481.el9.x86_64.rpmPperl-File-DosGlob-1.12-481.el9.x86_64.rpmNperl-Class-Struct-0.66-481.el9.noarch.rpm,^perl-Term-ReadLine-1.17-481.el9.noarch.rpmE*perl-macros-5.32.1-481.el9.noarch.rpm:xperl-debugger-1.56-481.el9.noarch.rpmperl-Getopt-Std-1.12-481.el9.noarch.rpmAMperl-if-0.60.800-481.el9.noarch.rpmWperl-ODBM_File-1.16-481.el9.x86_64.rpm 5perl-DBM_Filter-0.06-481.el9.noarch.rpmJ6perl-sigtrap-1.09-481.el9.noarch.rpm6uperl-User-pwent-1.03-481.el9.noarch.rpmZperl-File-Compare-1.100.600-481.el9.noarch.rpmQ perl-GDBM_File-1.18-481.el9.x86_64.rpm%perl-File-Basename-2.85-481.el9.noarch.rpm&!perl-Safe-2.41-481.el9.noarch.rpm'Vperl-Search-Dict-1.07-481.el9.noarch.rpm|perl-AutoLoader-5.74-481.el9.noarch.rpmKperl-sort-2.04-481.el9.noarch.rpm perl-Dumpvalue-2.27-481.el9.noarch.rpm)dperl-SelfLoader-1.26-481.el9.noarch.rpma3perl-ph-5.32.1-481.el9.x86_64.rpm=3perl-doc-5.32.1-481.el9.noarch.rpm6perl-File-stat-1.09-481.el9.noarch.rpm:*perl-devel-5.32.1-481.el9.i686.rpm+uperl-Term-Complete-1.403-481.el9.noarch.rpm<[perl-diagnostics-1.37-481.el9.noarch.rpm6perl-ExtUtils-Miniperl-1.09-481.el9.noarch.rpm:*perl-devel-5.32.1-481.el9.x86_64.rpm?perl-fields-2.27-481.el9.noarch.rpmF3perl-meta-notation-5.32.1-481.el9.noarch.rpmperl-Benchmark-1.23-481.el9.noarch.rpmKperl-Devel-Peek-1.28-481.el9.x86_64.rpmM3perl-utils-5.32.1-481.el9.noarch.rpm8perl-base-2.27-481.el9.noarch.rpm//perl-Thread-3.05-481.el9.noarch.rpmI#perl-B-1.80-481.el9.x86_64.rpm`perl-mro-1.23-481.el9.x86_64.rpmMperl-Errno-1.30-481.el9.x86_64.rpm-Zperl-Test-1.31-481.el9.noarch.rpmLuperl-subs-1.03-481.el9.noarch.rpmPperl-Config-Extensions-0.03-481.el9.noarch.rpmRperl-Hash-Util-0.23-481.el9.x86_64.rpm4uperl-Time-1.03-481.el9.noarch.rpm"Operl-NEXT-0.67-481.el9.noarch.rpm;4perl-deprecate-0.04-481.el9.noarch.rpmHZperl-overload-1.31-481.el9.noarch.rpm[perl-Sys-Hostname-1.23-481.el9.x86_64.rpmyperl-Math-Complex-1.59-481.el9.noarch.rpmX perl-Opcode-1.48-481.el9.x86_64.rpmLperl-I18N-LangTags-0.44-481.el9.noarch.rpmH*perl-5.32.1-481.el9.x86_64.rpm(5perl-SelectSaver-1.02-481.el9.noarch.rpm perl-File-Copy-2.34-481.el9.noarch.rpm1Dperl-Tie-4.6-481.el9.noarch.rpmwperl-FindBin-1.51-481.el9.noarch.rpm2Uperl-Tie-File-1.06-481.el9.noarch.rpmT|perl-I18N-Langinfo-0.19-481.el9.x86_64.rpmGperl-open-1.12-481.el9.noarch.rpmUperl-IO-1.43-481.el9.x86_64.rpmOTperl-vmsish-1.04-481.el9.noarch.rpm5Pperl-Unicode-UCD-0.75-481.el9.noarch.rpm Xperl-English-1.11-481.el9.noarch.rpm\perl-Time-Piece-1.3401-481.el9.x86_64.rpm1 +sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update.https://access.redhat.com/errata/RHSA-2024:2236RHSA-2024:2236RHSA-2024:2236 https://access.redhat.com/security/cve/CVE-2024-2496CVE-2024-2496CVE-2024-2496https://bugzilla.redhat.com/22696722269672https://errata.almalinux.org/9/ALSA-2024-2236.htmlALSA-2024:2236ALSA-2024:2236 1libvirt-daemon-lock-10.0.0-6.el9_4.alma.1.x86_64.rpmO1libvirt-daemon-driver-nodedev-10.0.0-6.el9_4.alma.1.x86_64.rpmP1libvirt-daemon-driver-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpmQ1libvirt-daemon-driver-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpmY1libvirt-daemon-driver-storage-rbd-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-daemon-log-10.0.0-6.el9_4.alma.1.x86_64.rpmS1libvirt-daemon-driver-storage-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-daemon-common-10.0.0-6.el9_4.alma.1.x86_64.rpmN1libvirt-daemon-driver-network-10.0.0-6.el9_4.alma.1.x86_64.rpmJ1libvirt-daemon-10.0.0-6.el9_4.alma.1.x86_64.rpm\1libvirt-libs-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-client-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-daemon-plugin-lockd-10.0.0-6.el9_4.alma.1.x86_64.rpmR1libvirt-daemon-driver-secret-10.0.0-6.el9_4.alma.1.x86_64.rpmV1libvirt-daemon-driver-storage-iscsi-10.0.0-6.el9_4.alma.1.x86_64.rpmX1libvirt-daemon-driver-storage-mpath-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-daemon-proxy-10.0.0-6.el9_4.alma.1.x86_64.rpm[1libvirt-daemon-kvm-10.0.0-6.el9_4.alma.1.x86_64.rpmI1libvirt-client-10.0.0-6.el9_4.alma.1.x86_64.rpmM1libvirt-daemon-driver-interface-10.0.0-6.el9_4.alma.1.x86_64.rpmK1libvirt-daemon-config-network-10.0.0-6.el9_4.alma.1.x86_64.rpmT1libvirt-daemon-driver-storage-core-10.0.0-6.el9_4.alma.1.x86_64.rpm]1libvirt-nss-10.0.0-6.el9_4.alma.1.x86_64.rpmH1libvirt-10.0.0-6.el9_4.alma.1.x86_64.rpmU1libvirt-daemon-driver-storage-disk-10.0.0-6.el9_4.alma.1.x86_64.rpmL1libvirt-daemon-config-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpmW1libvirt-daemon-driver-storage-logical-10.0.0-6.el9_4.alma.1.x86_64.rpmZ1libvirt-daemon-driver-storage-scsi-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-daemon-lock-10.0.0-6.el9_4.alma.1.x86_64.rpmO1libvirt-daemon-driver-nodedev-10.0.0-6.el9_4.alma.1.x86_64.rpmP1libvirt-daemon-driver-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpmQ1libvirt-daemon-driver-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpmY1libvirt-daemon-driver-storage-rbd-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-daemon-log-10.0.0-6.el9_4.alma.1.x86_64.rpmS1libvirt-daemon-driver-storage-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-daemon-common-10.0.0-6.el9_4.alma.1.x86_64.rpmN1libvirt-daemon-driver-network-10.0.0-6.el9_4.alma.1.x86_64.rpmJ1libvirt-daemon-10.0.0-6.el9_4.alma.1.x86_64.rpm\1libvirt-libs-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-client-qemu-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-daemon-plugin-lockd-10.0.0-6.el9_4.alma.1.x86_64.rpmR1libvirt-daemon-driver-secret-10.0.0-6.el9_4.alma.1.x86_64.rpmV1libvirt-daemon-driver-storage-iscsi-10.0.0-6.el9_4.alma.1.x86_64.rpmX1libvirt-daemon-driver-storage-mpath-10.0.0-6.el9_4.alma.1.x86_64.rpm1libvirt-daemon-proxy-10.0.0-6.el9_4.alma.1.x86_64.rpm[1libvirt-daemon-kvm-10.0.0-6.el9_4.alma.1.x86_64.rpmI1libvirt-client-10.0.0-6.el9_4.alma.1.x86_64.rpmM1libvirt-daemon-driver-interface-10.0.0-6.el9_4.alma.1.x86_64.rpmK1libvirt-daemon-config-network-10.0.0-6.el9_4.alma.1.x86_64.rpmT1libvirt-daemon-driver-storage-core-10.0.0-6.el9_4.alma.1.x86_64.rpm]1libvirt-nss-10.0.0-6.el9_4.alma.1.x86_64.rpmH1libvirt-10.0.0-6.el9_4.alma.1.x86_64.rpmU1libvirt-daemon-driver-storage-disk-10.0.0-6.el9_4.alma.1.x86_64.rpmL1libvirt-daemon-config-nwfilter-10.0.0-6.el9_4.alma.1.x86_64.rpmW1libvirt-daemon-driver-storage-logical-10.0.0-6.el9_4.alma.1.x86_64.rpmZ1libvirt-daemon-driver-storage-scsi-10.0.0-6.el9_4.alma.1.x86_64.rpm|2 0lBBsecurityModerate: skopeo security updateD\https://access.redhat.com/errata/RHSA-2024:2239RHSA-2024:2239RHSA-2024:2239 https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/22531932253193https://errata.almalinux.org/9/ALSA-2024-2239.htmlALSA-2024:2239ALSA-2024:2239 <skopeo-tests-1.14.3-0.1.el9.x86_64.rpm;skopeo-1.14.3-0.1.el9.x86_64.rpm<skopeo-tests-1.14.3-0.1.el9.x86_64.rpm;skopeo-1.14.3-0.1.el9.x86_64.rpm3 5qBBsecurityModerate: buildah security update https://access.redhat.com/errata/RHSA-2024:2245RHSA-2024:2245RHSA-2024:2245 https://access.redhat.com/security/cve/CVE-2023-39326CVE-2023-39326CVE-2023-39326https://access.redhat.com/security/cve/CVE-2023-45287CVE-2023-45287CVE-2023-45287https://bugzilla.redhat.com/22531932253193https://bugzilla.redhat.com/22533302253330https://errata.almalinux.org/9/ALSA-2024-2245.htmlALSA-2024:2245ALSA-2024:2245 < buildah-1.33.6-2.el9.x86_64.rpm= buildah-tests-1.33.6-2.el9.x86_64.rpm< buildah-1.33.6-2.el9.x86_64.rpm= buildah-tests-1.33.6-2.el9.x86_64.rpmD4 :vBBsecurityModerate: ansible-core bug fix, enhancement, and security update*https://access.redhat.com/errata/RHSA-2024:2246RHSA-2024:2246RHSA-2024:2246 https://access.redhat.com/security/cve/CVE-2024-0690CVE-2024-0690CVE-2024-0690https://bugzilla.redhat.com/22590132259013https://errata.almalinux.org/9/ALSA-2024-2246.htmlALSA-2024:2246ALSA-2024:2246 hansible-core-2.14.14-1.el9.x86_64.rpmhansible-test-2.14.14-1.el9.x86_64.rpmhansible-core-2.14.14-1.el9.x86_64.rpmhansible-test-2.14.14-1.el9.x86_64.rpm'5 <;securityImportant: edk2 security update QBBBBBBBBBsecurityImportant: tigervnc security updatehttps://access.redhat.com/errata/RHSA-2024:2298RHSA-2024:2298RHSA-2024:2298 https://access.redhat.com/security/cve/CVE-2023-5380CVE-2023-5380CVE-2023-5380https://access.redhat.com/security/cve/CVE-2023-5574CVE-2023-5574CVE-2023-5574https://bugzilla.redhat.com/22447352244735https://bugzilla.redhat.com/22447362244736https://errata.almalinux.org/9/ALSA-2024-2298.htmlALSA-2024:2298ALSA-2024:2298 9wtigervnc-selinux-1.13.1-8.el9.noarch.rpmowtigervnc-server-1.13.1-8.el9.x86_64.rpm7wtigervnc-icons-1.13.1-8.el9.noarch.rpmnwtigervnc-1.13.1-8.el9.x86_64.rpmpwtigervnc-server-minimal-1.13.1-8.el9.x86_64.rpm8wtigervnc-license-1.13.1-8.el9.noarch.rpmqwtigervnc-server-module-1.13.1-8.el9.x86_64.rpm9wtigervnc-selinux-1.13.1-8.el9.noarch.rpmowtigervnc-server-1.13.1-8.el9.x86_64.rpm7wtigervnc-icons-1.13.1-8.el9.noarch.rpmnwtigervnc-1.13.1-8.el9.x86_64.rpmpwtigervnc-server-minimal-1.13.1-8.el9.x86_64.rpm8wtigervnc-license-1.13.1-8.el9.noarch.rpmqwtigervnc-server-module-1.13.1-8.el9.x86_64.rpm`? %]BBBBBBsecurityModerate: gstreamer1-plugins-base security updatelhttps://access.redhat.com/errata/RHSA-2024:2302RHSA-2024:2302RHSA-2024:2302 https://access.redhat.com/security/cve/CVE-2023-37328CVE-2023-37328CVE-2023-37328https://bugzilla.redhat.com/22545402254540https://errata.almalinux.org/9/ALSA-2024-2302.htmlALSA-2024:2302ALSA-2024:2302  gstreamer1-plugins-base-tools-1.22.1-2.el9.x86_64.rpm gstreamer1-plugins-base-1.22.1-2.el9.x86_64.rpm gstreamer1-plugins-base-devel-1.22.1-2.el9.i686.rpm gstreamer1-plugins-base-1.22.1-2.el9.i686.rpm gstreamer1-plugins-base-devel-1.22.1-2.el9.x86_64.rpm gstreamer1-plugins-base-tools-1.22.1-2.el9.x86_64.rpm gstreamer1-plugins-base-1.22.1-2.el9.x86_64.rpm gstreamer1-plugins-base-devel-1.22.1-2.el9.i686.rpm gstreamer1-plugins-base-1.22.1-2.el9.i686.rpm gstreamer1-plugins-base-devel-1.22.1-2.el9.x86_64.rpm9@ ,fBBBBsecurityModerate: gstreamer1-plugins-good security update4https://access.redhat.com/errata/RHSA-2024:2303RHSA-2024:2303RHSA-2024:2303 https://access.redhat.com/security/cve/CVE-2023-37327CVE-2023-37327CVE-2023-37327https://bugzilla.redhat.com/22545392254539https://errata.almalinux.org/9/ALSA-2024-2303.htmlALSA-2024:2303ALSA-2024:2303 i gstreamer1-plugins-good-gtk-1.22.1-2.el9.x86_64.rpmi gstreamer1-plugins-good-gtk-1.22.1-2.el9.i686.rpmh gstreamer1-plugins-good-1.22.1-2.el9.x86_64.rpmh gstreamer1-plugins-good-1.22.1-2.el9.i686.rpmi gstreamer1-plugins-good-gtk-1.22.1-2.el9.x86_64.rpmi gstreamer1-plugins-good-gtk-1.22.1-2.el9.i686.rpmh gstreamer1-plugins-good-1.22.1-2.el9.x86_64.rpmh gstreamer1-plugins-good-1.22.1-2.el9.i686.rpmA /msecurityModerate: python3.11-cryptography security update7ohttps://access.redhat.com/errata/RHSA-2024:2337RHSA-2024:2337RHSA-2024:2337 https://access.redhat.com/security/cve/CVE-2023-49083CVE-2023-49083CVE-2023-49083https://bugzilla.redhat.com/22553312255331https://errata.almalinux.org/9/ALSA-2024-2337.htmlALSA-2024:2337ALSA-2024:2337 vDpython3.11-cryptography-37.0.2-6.el9.x86_64.rpmvDpython3.11-cryptography-37.0.2-6.el9.x86_64.rpmB 10securityModerate: python-jinja2 security update&https://access.redhat.com/errata/RHSA-2024:2348RHSA-2024:2348RHSA-2024:2348 https://access.redhat.com/security/cve/CVE-2024-22195CVE-2024-22195CVE-2024-22195https://bugzilla.redhat.com/22578542257854https://errata.almalinux.org/9/ALSA-2024-2348.htmlALSA-2024:2348ALSA-2024:2348  python3-jinja2-2.11.3-5.el9.noarch.rpm python3-jinja2-2.11.3-5.el9.noarch.rpmC 4rsecurityModerate: mingw components security update;Bhttps://access.redhat.com/errata/RHSA-2024:2353RHSA-2024:2353RHSA-2024:2353 https://access.redhat.com/security/cve/CVE-2023-1579CVE-2023-1579CVE-2023-1579https://bugzilla.redhat.com/21809052180905https://errata.almalinux.org/9/ALSA-2024-2353.htmlALSA-2024:2353ALSA-2024:2353 8mingw-binutils-generic-2.41-3.el9.x86_64.rpm8mingw-binutils-generic-2.41-3.el9.x86_64.rpmD ;uBBBBsecurityModerate: freeglut security update}{https://access.redhat.com/errata/RHSA-2024:2366RHSA-2024:2366RHSA-2024:2366 https://access.redhat.com/security/cve/CVE-2024-24258CVE-2024-24258CVE-2024-24258https://access.redhat.com/security/cve/CVE-2024-24259CVE-2024-24259CVE-2024-24259https://bugzilla.redhat.com/22639392263939https://bugzilla.redhat.com/22639432263943https://errata.almalinux.org/9/ALSA-2024-2366.htmlALSA-2024:2366ALSA-2024:2366 rSfreeglut-3.2.1-10.el9.x86_64.rpmrSfreeglut-3.2.1-10.el9.i686.rpmsSfreeglut-devel-3.2.1-10.el9.x86_64.rpmsSfreeglut-devel-3.2.1-10.el9.i686.rpmrSfreeglut-3.2.1-10.el9.x86_64.rpmrSfreeglut-3.2.1-10.el9.i686.rpmsSfreeglut-devel-3.2.1-10.el9.x86_64.rpmsSfreeglut-devel-3.2.1-10.el9.i686.rpmE >|securityModerate: mod_http2 security updatexhttps://access.redhat.com/errata/RHSA-2024:2368RHSA-2024:2368RHSA-2024:2368 https://access.redhat.com/security/cve/CVE-2023-43622CVE-2023-43622CVE-2023-43622https://access.redhat.com/security/cve/CVE-2023-45802CVE-2023-45802CVE-2023-45802https://bugzilla.redhat.com/22438772243877https://bugzilla.redhat.com/22451532245153https://errata.almalinux.org/9/ALSA-2024-2368.htmlALSA-2024:2368ALSA-2024:2368 )mod_http2-2.0.26-1.el9.x86_64.rpm)mod_http2-2.0.26-1.el9.x86_64.rpmZF BBBsecurityModerate: zziplib security update{https://access.redhat.com/errata/RHSA-2024:2377RHSA-2024:2377RHSA-2024:2377 https://access.redhat.com/security/cve/CVE-2020-18770CVE-2020-18770CVE-2020-18770https://bugzilla.redhat.com/22469072246907https://errata.almalinux.org/9/ALSA-2024-2377.htmlALSA-2024:2377ALSA-2024:2377 dzziplib-utils-0.13.71-11.el9_4.x86_64.rpmzziplib-0.13.71-11.el9_4.x86_64.rpmzziplib-0.13.71-11.el9_4.i686.rpmdzziplib-utils-0.13.71-11.el9_4.x86_64.rpmzziplib-0.13.71-11.el9_4.x86_64.rpmzziplib-0.13.71-11.el9_4.i686.rpmzG EBBsecurityModerate: mod_jk and mod_proxy_cluster security update _https://access.redhat.com/errata/RHSA-2024:2387RHSA-2024:2387RHSA-2024:2387 https://access.redhat.com/security/cve/CVE-2023-41081CVE-2023-41081CVE-2023-41081https://access.redhat.com/security/cve/CVE-2023-6710CVE-2023-6710CVE-2023-6710https://bugzilla.redhat.com/22388472238847https://bugzilla.redhat.com/22541282254128https://errata.almalinux.org/9/ALSA-2024-2387.htmlALSA-2024:2387ALSA-2024:2387 @mod_proxy_cluster-1.3.20-1.el9_4.x86_64.rpm? mod_jk-1.2.49-1.el9_4.x86_64.rpm@mod_proxy_cluster-1.3.20-1.el9_4.x86_64.rpm? mod_jk-1.2.49-1.el9_4.x86_64.rpm0H JBBBBBBBBBBBBBBBsecurityImportant: kernel security, bug fix, and enhancement updateh%zhttps://access.redhat.com/errata/RHSA-2024:2394RHSA-2024:2394RHSA-2024:2394 https://bugzilla.redhat.com/19186011918601https://bugzilla.redhat.com/20497002049700https://bugzilla.redhat.com/21334522133452https://bugzilla.redhat.com/21519592151959https://bugzilla.redhat.com/21777592177759https://bugzilla.redhat.com/21855192185519https://bugzilla.redhat.com/21881022188102https://bugzilla.redhat.com/22100242210024https://bugzilla.redhat.com/22131322213132https://bugzilla.redhat.com/22183322218332https://bugzilla.redhat.com/22193592219359https://bugzilla.redhat.com/22210392221039https://bugzilla.redhat.com/22214632221463https://bugzilla.redhat.com/22217022221702https://bugzilla.redhat.com/22267772226777https://bugzilla.redhat.com/22267872226787https://bugzilla.redhat.com/22267882226788https://bugzilla.redhat.com/22314102231410https://bugzilla.redhat.com/22398452239845https://bugzilla.redhat.com/22398482239848https://bugzilla.redhat.com/22447202244720https://bugzilla.redhat.com/22469802246980https://bugzilla.redhat.com/22500432250043https://bugzilla.redhat.com/22527312252731https://bugzilla.redhat.com/22530342253034https://bugzilla.redhat.com/22536322253632https://bugzilla.redhat.com/22549612254961https://bugzilla.redhat.com/22549822254982https://bugzilla.redhat.com/22552832255283https://bugzilla.redhat.com/22554982255498https://bugzilla.redhat.com/22564902256490https://bugzilla.redhat.com/22568222256822https://bugzilla.redhat.com/22576822257682https://bugzilla.redhat.com/22580132258013https://bugzilla.redhat.com/22585182258518https://bugzilla.redhat.com/22600052260005https://bugzilla.redhat.com/22621262262126https://bugzilla.redhat.com/22621272262127https://bugzilla.redhat.com/22652852265285https://bugzilla.redhat.com/22655172265517https://bugzilla.redhat.com/22655182265518https://bugzilla.redhat.com/22655192265519https://bugzilla.redhat.com/22655202265520https://bugzilla.redhat.com/22656452265645https://bugzilla.redhat.com/22656462265646https://bugzilla.redhat.com/22656532265653https://bugzilla.redhat.com/22670412267041https://bugzilla.redhat.com/22676952267695https://bugzilla.redhat.com/22677502267750https://bugzilla.redhat.com/22677582267758https://bugzilla.redhat.com/22677602267760https://bugzilla.redhat.com/22677612267761https://bugzilla.redhat.com/22677882267788https://bugzilla.redhat.com/22677952267795https://bugzilla.redhat.com/22691892269189https://bugzilla.redhat.com/22692172269217https://bugzilla.redhat.com/22700802270080https://bugzilla.redhat.com/22701182270118https://bugzilla.redhat.com/22708832270883https://errata.almalinux.org/9/ALSA-2024-2394.htmlALSA-2024:2394ALSA-2024:2394 https://www.redhat.com/security/data/cve/CVE-2020-26555.htmlCVE-2020-26555CVE-2020-26555https://www.redhat.com/security/data/cve/CVE-2022-0480.htmlCVE-2022-0480CVE-2022-0480https://www.redhat.com/security/data/cve/CVE-2022-38096.htmlCVE-2022-38096CVE-2022-38096https://www.redhat.com/security/data/cve/CVE-2022-45934.htmlCVE-2022-45934CVE-2022-45934https://www.redhat.com/security/data/cve/CVE-2023-24023.htmlCVE-2023-24023CVE-2023-24023https://www.redhat.com/security/data/cve/CVE-2023-25775.htmlCVE-2023-25775CVE-2023-25775https://www.redhat.com/security/data/cve/CVE-2023-28464.htmlCVE-2023-28464CVE-2023-28464https://www.redhat.com/security/data/cve/CVE-2023-28866.htmlCVE-2023-28866CVE-2023-28866https://www.redhat.com/security/data/cve/CVE-2023-31083.htmlCVE-2023-31083CVE-2023-31083https://www.redhat.com/security/data/cve/CVE-2023-3567.htmlCVE-2023-3567CVE-2023-3567https://www.redhat.com/security/data/cve/CVE-2023-37453.htmlCVE-2023-37453CVE-2023-37453https://www.redhat.com/security/data/cve/CVE-2023-39189.htmlCVE-2023-39189CVE-2023-39189https://www.redhat.com/security/data/cve/CVE-2023-39193.htmlCVE-2023-39193CVE-2023-39193https://www.redhat.com/security/data/cve/CVE-2023-39194.htmlCVE-2023-39194CVE-2023-39194https://www.redhat.com/security/data/cve/CVE-2023-39198.htmlCVE-2023-39198CVE-2023-39198https://www.redhat.com/security/data/cve/CVE-2023-4133.htmlCVE-2023-4133CVE-2023-4133https://www.redhat.com/security/data/cve/CVE-2023-42754.htmlCVE-2023-42754CVE-2023-42754https://www.redhat.com/security/data/cve/CVE-2023-42756.htmlCVE-2023-42756CVE-2023-42756https://www.redhat.com/security/data/cve/CVE-2023-45863.htmlCVE-2023-45863CVE-2023-45863https://www.redhat.com/security/data/cve/CVE-2023-46862.htmlCVE-2023-46862CVE-2023-46862https://www.redhat.com/security/data/cve/CVE-2023-51043.htmlCVE-2023-51043CVE-2023-51043https://www.redhat.com/security/data/cve/CVE-2023-51779.htmlCVE-2023-51779CVE-2023-51779https://www.redhat.com/security/data/cve/CVE-2023-51780.htmlCVE-2023-51780CVE-2023-51780https://www.redhat.com/security/data/cve/CVE-2023-52434.htmlCVE-2023-52434CVE-2023-52434https://www.redhat.com/security/data/cve/CVE-2023-52448.htmlCVE-2023-52448CVE-2023-52448https://www.redhat.com/security/data/cve/CVE-2023-52450.htmlCVE-2023-52450CVE-2023-52450https://www.redhat.com/security/data/cve/CVE-2023-52476.htmlCVE-2023-52476CVE-2023-52476https://www.redhat.com/security/data/cve/CVE-2023-52489.htmlCVE-2023-52489CVE-2023-52489https://www.redhat.com/security/data/cve/CVE-2023-52522.htmlCVE-2023-52522CVE-2023-52522https://www.redhat.com/security/data/cve/CVE-2023-52529.htmlCVE-2023-52529CVE-2023-52529https://www.redhat.com/security/data/cve/CVE-2023-52574.htmlCVE-2023-52574CVE-2023-52574https://www.redhat.com/security/data/cve/CVE-2023-52578.htmlCVE-2023-52578CVE-2023-52578https://www.redhat.com/security/data/cve/CVE-2023-52580.htmlCVE-2023-52580CVE-2023-52580https://www.redhat.com/security/data/cve/CVE-2023-52581.htmlCVE-2023-52581CVE-2023-52581https://www.redhat.com/security/data/cve/CVE-2023-52597.htmlCVE-2023-52597CVE-2023-52597https://www.redhat.com/security/data/cve/CVE-2023-52610.htmlCVE-2023-52610CVE-2023-52610https://www.redhat.com/security/data/cve/CVE-2023-52620.htmlCVE-2023-52620CVE-2023-52620https://www.redhat.com/security/data/cve/CVE-2023-6040.htmlCVE-2023-6040CVE-2023-6040https://www.redhat.com/security/data/cve/CVE-2023-6121.htmlCVE-2023-6121CVE-2023-6121https://www.redhat.com/security/data/cve/CVE-2023-6176.htmlCVE-2023-6176CVE-2023-6176https://www.redhat.com/security/data/cve/CVE-2023-6531.htmlCVE-2023-6531CVE-2023-6531https://www.redhat.com/security/data/cve/CVE-2023-6546.htmlCVE-2023-6546CVE-2023-6546https://www.redhat.com/security/data/cve/CVE-2023-6622.htmlCVE-2023-6622CVE-2023-6622https://www.redhat.com/security/data/cve/CVE-2023-6915.htmlCVE-2023-6915CVE-2023-6915https://www.redhat.com/security/data/cve/CVE-2023-6931.htmlCVE-2023-6931CVE-2023-6931https://www.redhat.com/security/data/cve/CVE-2023-6932.htmlCVE-2023-6932CVE-2023-6932https://www.redhat.com/security/data/cve/CVE-2024-0565.htmlCVE-2024-0565CVE-2024-0565https://www.redhat.com/security/data/cve/CVE-2024-0841.htmlCVE-2024-0841CVE-2024-0841https://www.redhat.com/security/data/cve/CVE-2024-1085.htmlCVE-2024-1085CVE-2024-1085https://www.redhat.com/security/data/cve/CVE-2024-1086.htmlCVE-2024-1086CVE-2024-1086https://www.redhat.com/security/data/cve/CVE-2024-25744.htmlCVE-2024-25744CVE-2024-25744https://www.redhat.com/security/data/cve/CVE-2024-26582.htmlCVE-2024-26582CVE-2024-26582https://www.redhat.com/security/data/cve/CVE-2024-26583.htmlCVE-2024-26583CVE-2024-26583https://www.redhat.com/security/data/cve/CVE-2024-26584.htmlCVE-2024-26584CVE-2024-26584https://www.redhat.com/security/data/cve/CVE-2024-26585.htmlCVE-2024-26585CVE-2024-26585https://www.redhat.com/security/data/cve/CVE-2024-26586.htmlCVE-2024-26586CVE-2024-26586https://www.redhat.com/security/data/cve/CVE-2024-26593.htmlCVE-2024-26593CVE-2024-26593https://www.redhat.com/security/data/cve/CVE-2024-26602.htmlCVE-2024-26602CVE-2024-26602https://www.redhat.com/security/data/cve/CVE-2024-26609.htmlCVE-2024-26609CVE-2024-26609https://www.redhat.com/security/data/cve/CVE-2024-26633.htmlCVE-2024-26633CVE-2024-26633https://www.redhat.com/security/data/cve/CVE-2024-26671.htmlCVE-2024-26671CVE-2024-26671 ):rtla-5.14.0-427.13.1.el9_4.x86_64.rpm!:kernel-debug-devel-5.14.0-427.13.1.el9_4.x86_64.rpm":kernel-debug-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm$:kernel-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm%:perf-5.14.0-427.13.1.el9_4.x86_64.rpm#:kernel-devel-5.14.0-427.13.1.el9_4.x86_64.rpm:kernel-doc-5.14.0-427.13.1.el9_4.noarch.rpm*:rv-5.14.0-427.13.1.el9_4.x86_64.rpm(:kernel-headers-5.14.0-427.13.1.el9_4.x86_64.rpm ):rtla-5.14.0-427.13.1.el9_4.x86_64.rpm!:kernel-debug-devel-5.14.0-427.13.1.el9_4.x86_64.rpm":kernel-debug-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm$:kernel-devel-matched-5.14.0-427.13.1.el9_4.x86_64.rpm%:perf-5.14.0-427.13.1.el9_4.x86_64.rpm#:kernel-devel-5.14.0-427.13.1.el9_4.x86_64.rpm:kernel-doc-5.14.0-427.13.1.el9_4.noarch.rpm*:rv-5.14.0-427.13.1.el9_4.x86_64.rpm(:kernel-headers-5.14.0-427.13.1.el9_4.x86_64.rpm"I "\BBBBsecurityModerate: harfbuzz security update {https://access.redhat.com/errata/RHSA-2024:2410RHSA-2024:2410RHSA-2024:2410 https://access.redhat.com/security/cve/CVE-2023-25193CVE-2023-25193CVE-2023-25193https://bugzilla.redhat.com/21672542167254https://errata.almalinux.org/9/ALSA-2024-2410.htmlALSA-2024:2410ALSA-2024:2410 cJharfbuzz-icu-2.7.4-10.el9.x86_64.rpmbJharfbuzz-devel-2.7.4-10.el9.i686.rpmbJharfbuzz-devel-2.7.4-10.el9.x86_64.rpmcJharfbuzz-icu-2.7.4-10.el9.i686.rpmcJharfbuzz-icu-2.7.4-10.el9.x86_64.rpmbJharfbuzz-devel-2.7.4-10.el9.i686.rpmbJharfbuzz-devel-2.7.4-10.el9.x86_64.rpmcJharfbuzz-icu-2.7.4-10.el9.i686.rpmJ (cBBBsecurityModerate: avahi security updateO https://access.redhat.com/errata/RHSA-2024:2433RHSA-2024:2433RHSA-2024:2433 https://access.redhat.com/security/cve/CVE-2023-38469CVE-2023-38469CVE-2023-38469https://access.redhat.com/security/cve/CVE-2023-38470CVE-2023-38470CVE-2023-38470https://access.redhat.com/security/cve/CVE-2023-38471CVE-2023-38471CVE-2023-38471https://access.redhat.com/security/cve/CVE-2023-38472CVE-2023-38472CVE-2023-38472https://access.redhat.com/security/cve/CVE-2023-38473CVE-2023-38473CVE-2023-38473https://bugzilla.redhat.com/21916872191687https://bugzilla.redhat.com/21916902191690https://bugzilla.redhat.com/21916912191691https://bugzilla.redhat.com/21916922191692https://bugzilla.redhat.com/21916942191694https://errata.almalinux.org/9/ALSA-2024-2433.htmlALSA-2024:2433ALSA-2024:2433 <avahi-tools-0.8-20.el9.x86_64.rpmavahi-glib-0.8-20.el9.x86_64.rpmavahi-glib-0.8-20.el9.i686.rpm<avahi-tools-0.8-20.el9.x86_64.rpmavahi-glib-0.8-20.el9.x86_64.rpmavahi-glib-0.8-20.el9.i686.rpm K .iBBBsecurityModerate: pam security updateWOhttps://access.redhat.com/errata/RHSA-2024:2438RHSA-2024:2438RHSA-2024:2438 https://access.redhat.com/security/cve/CVE-2024-22365CVE-2024-22365CVE-2024-22365https://bugzilla.redhat.com/22577222257722https://errata.almalinux.org/9/ALSA-2024-2438.htmlALSA-2024:2438ALSA-2024:2438 pam-docs-1.5.1-19.el9.x86_64.rpmkpam-devel-1.5.1-19.el9.i686.rpmkpam-devel-1.5.1-19.el9.x86_64.rpmpam-docs-1.5.1-19.el9.x86_64.rpmkpam-devel-1.5.1-19.el9.i686.rpmkpam-devel-1.5.1-19.el9.x86_64.rpmL 4oBBBsecurityLow: openssl and openssl-fips-provider security update3&/https://access.redhat.com/errata/RHSA-2024:2447RHSA-2024:2447RHSA-2024:2447 https://access.redhat.com/security/cve/CVE-2023-2975CVE-2023-2975CVE-2023-2975https://access.redhat.com/security/cve/CVE-2023-3446CVE-2023-3446CVE-2023-3446https://access.redhat.com/security/cve/CVE-2023-3817CVE-2023-3817CVE-2023-3817https://access.redhat.com/security/cve/CVE-2023-5678CVE-2023-5678CVE-2023-5678https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://bugzilla.redhat.com/22230162223016https://bugzilla.redhat.com/22249622224962https://bugzilla.redhat.com/22278522227852https://bugzilla.redhat.com/22486162248616https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://errata.almalinux.org/9/ALSA-2024-2447.htmlALSA-2024:2447ALSA-2024:2447 m'openssl-perl-3.0.7-27.el9.x86_64.rpm'openssl-devel-3.0.7-27.el9.x86_64.rpm'openssl-devel-3.0.7-27.el9.i686.rpmm'openssl-perl-3.0.7-27.el9.x86_64.rpm'openssl-devel-3.0.7-27.el9.x86_64.rpm'openssl-devel-3.0.7-27.el9.i686.rpmM :uBBBsecurityModerate: systemd security updateUhttps://access.redhat.com/errata/RHSA-2024:2463RHSA-2024:2463RHSA-2024:2463 https://access.redhat.com/security/cve/CVE-2023-7008CVE-2023-7008CVE-2023-7008https://bugzilla.redhat.com/22226722222672https://errata.almalinux.org/9/ALSA-2024-2463.htmlALSA-2024:2463ALSA-2024:2463 }:systemd-journal-remote-252-32.el9_4.alma.1.x86_64.rpm+:systemd-devel-252-32.el9_4.alma.1.i686.rpm+:systemd-devel-252-32.el9_4.alma.1.x86_64.rpm}:systemd-journal-remote-252-32.el9_4.alma.1.x86_64.rpm+:systemd-devel-252-32.el9_4.alma.1.i686.rpm+:systemd-devel-252-32.el9_4.alma.1.x86_64.rpmN >{BsecurityLow: libssh security update3Vhttps://access.redhat.com/errata/RHSA-2024:2504RHSA-2024:2504RHSA-2024:2504 https://access.redhat.com/security/cve/CVE-2023-6004CVE-2023-6004CVE-2023-6004https://access.redhat.com/security/cve/CVE-2023-6918CVE-2023-6918CVE-2023-6918https://bugzilla.redhat.com/22511102251110https://bugzilla.redhat.com/22549972254997https://errata.almalinux.org/9/ALSA-2024-2504.htmlALSA-2024:2504ALSA-2024:2504 jflibssh-devel-0.10.4-13.el9.i686.rpmjflibssh-devel-0.10.4-13.el9.x86_64.rpmjflibssh-devel-0.10.4-13.el9.i686.rpmjflibssh-devel-0.10.4-13.el9.x86_64.rpmO ?securityLow: file security update3^Bhttps://access.redhat.com/errata/RHSA-2024:2512RHSA-2024:2512RHSA-2024:2512 https://access.redhat.com/security/cve/CVE-2022-48554CVE-2022-48554CVE-2022-48554https://bugzilla.redhat.com/22357142235714https://errata.almalinux.org/9/ALSA-2024-2512.htmlALSA-2024:2512ALSA-2024:2512 \Qpython3-file-magic-5.39-16.el9.noarch.rpm\Qpython3-file-magic-5.39-16.el9.noarch.rpmP ABBBBBBBsecurityModerate: podman security and bug fix update ^https://access.redhat.com/errata/RHSA-2024:2548RHSA-2024:2548RHSA-2024:2548 https://access.redhat.com/security/cve/CVE-2024-1753CVE-2024-1753CVE-2024-1753https://access.redhat.com/security/cve/CVE-2024-24786CVE-2024-24786CVE-2024-24786https://bugzilla.redhat.com/22655132265513https://bugzilla.redhat.com/22680462268046https://errata.almalinux.org/9/ALSA-2024-2548.htmlALSA-2024:2548ALSA-2024:2548 -podman-4.9.4-3.el9_4.x86_64.rpm.podman-plugins-4.9.4-3.el9_4.x86_64.rpm0podman-tests-4.9.4-3.el9_4.x86_64.rpmfpodman-docker-4.9.4-3.el9_4.noarch.rpm/podman-remote-4.9.4-3.el9_4.x86_64.rpm-podman-4.9.4-3.el9_4.x86_64.rpm.podman-plugins-4.9.4-3.el9_4.x86_64.rpm0podman-tests-4.9.4-3.el9_4.x86_64.rpmfpodman-docker-4.9.4-3.el9_4.noarch.rpm/podman-remote-4.9.4-3.el9_4.x86_64.rpm Q KBBsecurityModerate: skopeo security and bug fix update~1https://access.redhat.com/errata/RHSA-2024:2549RHSA-2024:2549RHSA-2024:2549 https://access.redhat.com/security/cve/CVE-2024-24786CVE-2024-24786CVE-2024-24786https://access.redhat.com/security/cve/CVE-2024-28180CVE-2024-28180CVE-2024-28180https://bugzilla.redhat.com/22680462268046https://bugzilla.redhat.com/22688542268854https://errata.almalinux.org/9/ALSA-2024-2549.htmlALSA-2024:2549ALSA-2024:2549 ;skopeo-1.14.3-2.el9_4.x86_64.rpm<skopeo-tests-1.14.3-2.el9_4.x86_64.rpm;skopeo-1.14.3-2.el9_4.x86_64.rpm<skopeo-tests-1.14.3-2.el9_4.x86_64.rpm<R PBBsecurityModerate: buildah bug fix update/Ohttps://access.redhat.com/errata/RHSA-2024:2550RHSA-2024:2550RHSA-2024:2550 https://access.redhat.com/security/cve/CVE-2024-24786CVE-2024-24786CVE-2024-24786https://bugzilla.redhat.com/22680462268046https://errata.almalinux.org/9/ALSA-2024-2550.htmlALSA-2024:2550ALSA-2024:2550 = buildah-tests-1.33.7-1.el9_4.x86_64.rpm< buildah-1.33.7-1.el9_4.x86_64.rpm= buildah-tests-1.33.7-1.el9_4.x86_64.rpm< buildah-1.33.7-1.el9_4.x86_64.rpm<S $UBBBBBBBBBBBBBsecurityImportant: bind security update~https://access.redhat.com/errata/RHSA-2024:2551RHSA-2024:2551RHSA-2024:2551 https://access.redhat.com/security/cve/CVE-2023-4408CVE-2023-4408CVE-2023-4408https://access.redhat.com/security/cve/CVE-2023-50387CVE-2023-50387CVE-2023-50387https://access.redhat.com/security/cve/CVE-2023-50868CVE-2023-50868CVE-2023-50868https://access.redhat.com/security/cve/CVE-2023-5517CVE-2023-5517CVE-2023-5517https://access.redhat.com/security/cve/CVE-2023-5679CVE-2023-5679CVE-2023-5679https://access.redhat.com/security/cve/CVE-2023-6516CVE-2023-6516CVE-2023-6516https://bugzilla.redhat.com/22638962263896https://bugzilla.redhat.com/22638972263897https://bugzilla.redhat.com/22639092263909https://bugzilla.redhat.com/22639112263911https://bugzilla.redhat.com/22639142263914https://bugzilla.redhat.com/22639172263917https://errata.almalinux.org/9/ALSA-2024-2551.htmlALSA-2024:2551ALSA-2024:2551 =8bind-dyndb-ldap-11.9-9.el9_4.alma.1.x86_64.rpmGvbind-dnssec-utils-9.16.23-18.el9_4.1.x86_64.rpmFvbind-chroot-9.16.23-18.el9_4.1.x86_64.rpmvpython3-bind-9.16.23-18.el9_4.1.noarch.rpmvbind-license-9.16.23-18.el9_4.1.noarch.rpmEvbind-9.16.23-18.el9_4.1.x86_64.rpmIvbind-utils-9.16.23-18.el9_4.1.x86_64.rpmvbind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpmHvbind-libs-9.16.23-18.el9_4.1.x86_64.rpm =8bind-dyndb-ldap-11.9-9.el9_4.alma.1.x86_64.rpmGvbind-dnssec-utils-9.16.23-18.el9_4.1.x86_64.rpmFvbind-chroot-9.16.23-18.el9_4.1.x86_64.rpmvpython3-bind-9.16.23-18.el9_4.1.noarch.rpmvbind-license-9.16.23-18.el9_4.1.noarch.rpmEvbind-9.16.23-18.el9_4.1.x86_64.rpmIvbind-utils-9.16.23-18.el9_4.1.x86_64.rpmvbind-dnssec-doc-9.16.23-18.el9_4.1.noarch.rpmHvbind-libs-9.16.23-18.el9_4.1.x86_64.rpm=T &%securityModerate: python-jwcrypto security update https://access.redhat.com/errata/RHSA-2024:2559RHSA-2024:2559RHSA-2024:2559 https://access.redhat.com/security/cve/CVE-2024-28102CVE-2024-28102CVE-2024-28102https://bugzilla.redhat.com/22687582268758https://errata.almalinux.org/9/ALSA-2024-2559.htmlALSA-2024:2559ALSA-2024:2559 LQpython3-jwcrypto-0.8-5.el9_4.noarch.rpmLQpython3-jwcrypto-0.8-5.el9_4.noarch.rpm U gBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security and bug fix update 2https://access.redhat.com/errata/RHSA-2024:2560RHSA-2024:2560RHSA-2024:2560 https://access.redhat.com/security/cve/CVE-2024-1441CVE-2024-1441CVE-2024-1441https://access.redhat.com/security/cve/CVE-2024-2494CVE-2024-2494CVE-2024-2494https://bugzilla.redhat.com/22638412263841https://bugzilla.redhat.com/22701152270115https://errata.almalinux.org/9/ALSA-2024-2560.htmlALSA-2024:2560ALSA-2024:2560 R/libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-daemon-common-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-daemon-lock-10.0.0-6.2.el9_4.alma.1.x86_64.rpmO/libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.alma.1.x86_64.rpm\/libvirt-libs-10.0.0-6.2.el9_4.alma.1.x86_64.rpmL/libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm]/libvirt-nss-10.0.0-6.2.el9_4.alma.1.x86_64.rpmT/libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.alma.1.x86_64.rpmQ/libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpmP/libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.alma.1.x86_64.rpmI/libvirt-client-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-daemon-log-10.0.0-6.2.el9_4.alma.1.x86_64.rpmN/libvirt-daemon-driver-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpmX/libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-client-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpmU/libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.alma.1.x86_64.rpm[/libvirt-daemon-kvm-10.0.0-6.2.el9_4.alma.1.x86_64.rpmJ/libvirt-daemon-10.0.0-6.2.el9_4.alma.1.x86_64.rpmV/libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpmY/libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-daemon-proxy-10.0.0-6.2.el9_4.alma.1.x86_64.rpmZ/libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpmM/libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.alma.1.x86_64.rpmK/libvirt-daemon-config-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpmH/libvirt-10.0.0-6.2.el9_4.alma.1.x86_64.rpmW/libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.alma.1.x86_64.rpmS/libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.alma.1.x86_64.rpmR/libvirt-daemon-driver-secret-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-daemon-common-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-daemon-lock-10.0.0-6.2.el9_4.alma.1.x86_64.rpmO/libvirt-daemon-driver-nodedev-10.0.0-6.2.el9_4.alma.1.x86_64.rpm\/libvirt-libs-10.0.0-6.2.el9_4.alma.1.x86_64.rpmL/libvirt-daemon-config-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm]/libvirt-nss-10.0.0-6.2.el9_4.alma.1.x86_64.rpmT/libvirt-daemon-driver-storage-core-10.0.0-6.2.el9_4.alma.1.x86_64.rpmQ/libvirt-daemon-driver-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpmP/libvirt-daemon-driver-nwfilter-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-daemon-plugin-lockd-10.0.0-6.2.el9_4.alma.1.x86_64.rpmI/libvirt-client-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-daemon-log-10.0.0-6.2.el9_4.alma.1.x86_64.rpmN/libvirt-daemon-driver-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpmX/libvirt-daemon-driver-storage-mpath-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-client-qemu-10.0.0-6.2.el9_4.alma.1.x86_64.rpmU/libvirt-daemon-driver-storage-disk-10.0.0-6.2.el9_4.alma.1.x86_64.rpm[/libvirt-daemon-kvm-10.0.0-6.2.el9_4.alma.1.x86_64.rpmJ/libvirt-daemon-10.0.0-6.2.el9_4.alma.1.x86_64.rpmV/libvirt-daemon-driver-storage-iscsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpmY/libvirt-daemon-driver-storage-rbd-10.0.0-6.2.el9_4.alma.1.x86_64.rpm/libvirt-daemon-proxy-10.0.0-6.2.el9_4.alma.1.x86_64.rpmZ/libvirt-daemon-driver-storage-scsi-10.0.0-6.2.el9_4.alma.1.x86_64.rpmM/libvirt-daemon-driver-interface-10.0.0-6.2.el9_4.alma.1.x86_64.rpmK/libvirt-daemon-config-network-10.0.0-6.2.el9_4.alma.1.x86_64.rpmH/libvirt-10.0.0-6.2.el9_4.alma.1.x86_64.rpmW/libvirt-daemon-driver-storage-logical-10.0.0-6.2.el9_4.alma.1.x86_64.rpmS/libvirt-daemon-driver-storage-10.0.0-6.2.el9_4.alma.1.x86_64.rpmKV *`BBBBBBBBsecurityImportant: golang security update>Xhttps://access.redhat.com/errata/RHSA-2024:2562RHSA-2024:2562RHSA-2024:2562 https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://access.redhat.com/security/cve/CVE-2023-45289CVE-2023-45289CVE-2023-45289https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://access.redhat.com/security/cve/CVE-2024-24784CVE-2024-24784CVE-2024-24784https://access.redhat.com/security/cve/CVE-2024-24785CVE-2024-24785CVE-2024-24785https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680182268018https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22680212268021https://bugzilla.redhat.com/22680222268022https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-2562.htmlALSA-2024:2562ALSA-2024:2562 Agolang-bin-1.21.9-2.el9_4.x86_64.rpmEgo-toolset-1.21.9-2.el9_4.x86_64.rpmmgolang-misc-1.21.9-2.el9_4.noarch.rpmogolang-tests-1.21.9-2.el9_4.noarch.rpmngolang-src-1.21.9-2.el9_4.noarch.rpm@golang-1.21.9-2.el9_4.x86_64.rpmlgolang-docs-1.21.9-2.el9_4.noarch.rpmAgolang-bin-1.21.9-2.el9_4.x86_64.rpmEgo-toolset-1.21.9-2.el9_4.x86_64.rpmmgolang-misc-1.21.9-2.el9_4.noarch.rpmogolang-tests-1.21.9-2.el9_4.noarch.rpmngolang-src-1.21.9-2.el9_4.noarch.rpm@golang-1.21.9-2.el9_4.x86_64.rpmlgolang-docs-1.21.9-2.el9_4.noarch.rpm?W -ksecurityModerate: mod_http2 security updatehttps://access.redhat.com/errata/RHSA-2024:2564RHSA-2024:2564RHSA-2024:2564 https://access.redhat.com/security/cve/CVE-2024-27316CVE-2024-27316CVE-2024-27316https://bugzilla.redhat.com/22682772268277https://errata.almalinux.org/9/ALSA-2024-2564.htmlALSA-2024:2564ALSA-2024:2564 )mod_http2-2.0.26-2.el9_4.x86_64.rpm)mod_http2-2.0.26-2.el9_4.x86_64.rpmX 0nsecurityModerate: libreswan security updateNhttps://access.redhat.com/errata/RHSA-2024:2565RHSA-2024:2565RHSA-2024:2565 https://access.redhat.com/security/cve/CVE-2024-2357CVE-2024-2357CVE-2024-2357https://bugzilla.redhat.com/22689522268952https://errata.almalinux.org/9/ALSA-2024-2565.htmlALSA-2024:2565ALSA-2024:2565 (Olibreswan-4.12-2.el9_4.alma.1.x86_64.rpm(Olibreswan-4.12-2.el9_4.alma.1.x86_64.rpmY qBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: pcp security, bug fix, and enhancement updateeMhttps://access.redhat.com/errata/RHSA-2024:2566RHSA-2024:2566RHSA-2024:2566 https://access.redhat.com/security/cve/CVE-2024-3019CVE-2024-3019CVE-2024-3019https://bugzilla.redhat.com/22718982271898https://errata.almalinux.org/9/ALSA-2024-2566.htmlALSA-2024:2566ALSA-2024:2566 l pcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpmmpcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpmpcp-devel-6.2.0-2.el9_4.x86_64.rpm^pcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpmIpcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpmMpcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpm$pcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpmEpcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpm]pcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpmpcp-libs-devel-6.2.0-2.el9_4.i686.rpm.pcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpm!pcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpmZpcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpmCpcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpm_pcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpmwperl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpmopcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpmTpcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpmSpcp-pmda-news-6.2.0-2.el9_4.x86_64.rpmFpcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpm4pcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpm8pcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpmpcp-libs-6.2.0-2.el9_4.i686.rpmvperl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpmapcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpmKpcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpm/pcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpmpcp-devel-6.2.0-2.el9_4.i686.rpm;pcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpm9pcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpmspcp-selinux-6.2.0-2.el9_4.x86_64.rpmpcp-libs-6.2.0-2.el9_4.x86_64.rpmJpcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpmHpcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpm<pcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpmBpcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm{python3-pcp-6.2.0-2.el9_4.x86_64.rpm[pcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpm?pcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpm\pcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpm1pcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpmlpcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpmWpcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpmppcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpmkpcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpmjpcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpmYpcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpmtpcp-system-tools-6.2.0-2.el9_4.x86_64.rpmpcp-testsuite-6.2.0-2.el9_4.i686.rpm%pcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpm'pcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpm5pcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpmfpcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpmRpcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpm#pcp-gui-6.2.0-2.el9_4.x86_64.rpmPpcp-pmda-named-6.2.0-2.el9_4.x86_64.rpmyperl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpm=pcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpmApcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpmipcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpm>pcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpm3pcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpm`pcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpmepcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpm2pcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpmNpcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpm-pcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpm,pcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpm7pcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpmXpcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpmVpcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpmpcp-6.2.0-2.el9_4.x86_64.rpmOpcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpmnpcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpm)pcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpmhpcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpmupcp-zeroconf-6.2.0-2.el9_4.x86_64.rpmpcp-libs-devel-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpmcpcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpm*pcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpm0pcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpmDpcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpm6pcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpmpcp-conf-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpm:pcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpm(pcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpm"pcp-geolocate-6.2.0-2.el9_4.x86_64.rpmbpcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpmpcp-testsuite-6.2.0-2.el9_4.x86_64.rpmUpcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpmGpcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpmpcp-doc-6.2.0-2.el9_4.noarch.rpm+pcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpmLpcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpmqpcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpmgpcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpmxperl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpmrpcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpmdpcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpmQpcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpm@pcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpm&pcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpml pcp-export-pcp2zabbix-6.2.0-2.el9_4.x86_64.rpmmpcp-pmda-systemd-6.2.0-2.el9_4.x86_64.rpmpcp-devel-6.2.0-2.el9_4.x86_64.rpm^pcp-pmda-postgresql-6.2.0-2.el9_4.x86_64.rpmIpcp-pmda-mailq-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2xml-6.2.0-2.el9_4.x86_64.rpmMpcp-pmda-mounts-6.2.0-2.el9_4.x86_64.rpm$pcp-import-collectl2pcp-6.2.0-2.el9_4.x86_64.rpmEpcp-pmda-lmsensors-6.2.0-2.el9_4.x86_64.rpm]pcp-pmda-postfix-6.2.0-2.el9_4.x86_64.rpmpcp-libs-devel-6.2.0-2.el9_4.i686.rpm.pcp-pmda-bonding-6.2.0-2.el9_4.x86_64.rpm!pcp-export-zabbix-agent-6.2.0-2.el9_4.x86_64.rpmZpcp-pmda-pdns-6.2.0-2.el9_4.x86_64.rpmCpcp-pmda-libvirt-6.2.0-2.el9_4.x86_64.rpm_pcp-pmda-rabbitmq-6.2.0-2.el9_4.x86_64.rpmwperl-PCP-LogSummary-6.2.0-2.el9_4.x86_64.rpmopcp-pmda-unbound-6.2.0-2.el9_4.x86_64.rpmTpcp-pmda-nfsclient-6.2.0-2.el9_4.x86_64.rpmSpcp-pmda-news-6.2.0-2.el9_4.x86_64.rpmFpcp-pmda-logger-6.2.0-2.el9_4.x86_64.rpm4pcp-pmda-denki-6.2.0-2.el9_4.x86_64.rpm8pcp-pmda-ds389log-6.2.0-2.el9_4.x86_64.rpmpcp-libs-6.2.0-2.el9_4.i686.rpmvperl-PCP-LogImport-6.2.0-2.el9_4.x86_64.rpmapcp-pmda-resctrl-6.2.0-2.el9_4.x86_64.rpmKpcp-pmda-mic-6.2.0-2.el9_4.x86_64.rpm/pcp-pmda-bpf-6.2.0-2.el9_4.x86_64.rpmpcp-devel-6.2.0-2.el9_4.i686.rpm;pcp-pmda-gfs2-6.2.0-2.el9_4.x86_64.rpm9pcp-pmda-elasticsearch-6.2.0-2.el9_4.x86_64.rpmspcp-selinux-6.2.0-2.el9_4.x86_64.rpmpcp-libs-6.2.0-2.el9_4.x86_64.rpmJpcp-pmda-memcache-6.2.0-2.el9_4.x86_64.rpmHpcp-pmda-lustrecomm-6.2.0-2.el9_4.x86_64.rpm<pcp-pmda-gluster-6.2.0-2.el9_4.x86_64.rpmBpcp-pmda-json-6.2.0-2.el9_4.x86_64.rpm{python3-pcp-6.2.0-2.el9_4.x86_64.rpm[pcp-pmda-perfevent-6.2.0-2.el9_4.x86_64.rpm?pcp-pmda-hacluster-6.2.0-2.el9_4.x86_64.rpm\pcp-pmda-podman-6.2.0-2.el9_4.x86_64.rpm1pcp-pmda-cifs-6.2.0-2.el9_4.x86_64.rpmlpcp-pmda-summary-6.2.0-2.el9_4.x86_64.rpmWpcp-pmda-openmetrics-6.2.0-2.el9_4.x86_64.rpmppcp-pmda-weblog-6.2.0-2.el9_4.x86_64.rpmkpcp-pmda-statsd-6.2.0-2.el9_4.x86_64.rpmjpcp-pmda-sockets-6.2.0-2.el9_4.x86_64.rpmYpcp-pmda-oracle-6.2.0-2.el9_4.x86_64.rpmtpcp-system-tools-6.2.0-2.el9_4.x86_64.rpmpcp-testsuite-6.2.0-2.el9_4.i686.rpm%pcp-import-ganglia2pcp-6.2.0-2.el9_4.x86_64.rpm'pcp-import-mrtg2pcp-6.2.0-2.el9_4.x86_64.rpm5pcp-pmda-dm-6.2.0-2.el9_4.x86_64.rpmfpcp-pmda-shping-6.2.0-2.el9_4.x86_64.rpmRpcp-pmda-netfilter-6.2.0-2.el9_4.x86_64.rpm#pcp-gui-6.2.0-2.el9_4.x86_64.rpmPpcp-pmda-named-6.2.0-2.el9_4.x86_64.rpmyperl-PCP-PMDA-6.2.0-2.el9_4.x86_64.rpm=pcp-pmda-gpfs-6.2.0-2.el9_4.x86_64.rpmApcp-pmda-infiniband-6.2.0-2.el9_4.x86_64.rpmipcp-pmda-snmp-6.2.0-2.el9_4.x86_64.rpm>pcp-pmda-gpsd-6.2.0-2.el9_4.x86_64.rpm3pcp-pmda-dbping-6.2.0-2.el9_4.x86_64.rpm`pcp-pmda-redis-6.2.0-2.el9_4.x86_64.rpmepcp-pmda-sendmail-6.2.0-2.el9_4.x86_64.rpm2pcp-pmda-cisco-6.2.0-2.el9_4.x86_64.rpmNpcp-pmda-mssql-6.2.0-2.el9_4.x86_64.rpm-pcp-pmda-bind2-6.2.0-2.el9_4.x86_64.rpm,pcp-pmda-bcc-6.2.0-2.el9_4.x86_64.rpm7pcp-pmda-ds389-6.2.0-2.el9_4.x86_64.rpmXpcp-pmda-openvswitch-6.2.0-2.el9_4.x86_64.rpmVpcp-pmda-nvidia-gpu-6.2.0-2.el9_4.x86_64.rpmpcp-6.2.0-2.el9_4.x86_64.rpmOpcp-pmda-mysql-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2spark-6.2.0-2.el9_4.x86_64.rpmnpcp-pmda-trace-6.2.0-2.el9_4.x86_64.rpm)pcp-pmda-activemq-6.2.0-2.el9_4.x86_64.rpmhpcp-pmda-smart-6.2.0-2.el9_4.x86_64.rpmupcp-zeroconf-6.2.0-2.el9_4.x86_64.rpmpcp-libs-devel-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2influxdb-6.2.0-2.el9_4.x86_64.rpmcpcp-pmda-rsyslog-6.2.0-2.el9_4.x86_64.rpm*pcp-pmda-apache-6.2.0-2.el9_4.x86_64.rpm0pcp-pmda-bpftrace-6.2.0-2.el9_4.x86_64.rpmDpcp-pmda-lio-6.2.0-2.el9_4.x86_64.rpm6pcp-pmda-docker-6.2.0-2.el9_4.x86_64.rpmpcp-conf-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2json-6.2.0-2.el9_4.x86_64.rpm:pcp-pmda-farm-6.2.0-2.el9_4.x86_64.rpm(pcp-import-sar2pcp-6.2.0-2.el9_4.x86_64.rpm"pcp-geolocate-6.2.0-2.el9_4.x86_64.rpmbpcp-pmda-roomtemp-6.2.0-2.el9_4.x86_64.rpmpcp-testsuite-6.2.0-2.el9_4.x86_64.rpmUpcp-pmda-nginx-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2elasticsearch-6.2.0-2.el9_4.x86_64.rpmGpcp-pmda-lustre-6.2.0-2.el9_4.x86_64.rpmpcp-doc-6.2.0-2.el9_4.noarch.rpm+pcp-pmda-bash-6.2.0-2.el9_4.x86_64.rpmLpcp-pmda-mongodb-6.2.0-2.el9_4.x86_64.rpmqpcp-pmda-zimbra-6.2.0-2.el9_4.x86_64.rpmgpcp-pmda-slurm-6.2.0-2.el9_4.x86_64.rpmxperl-PCP-MMV-6.2.0-2.el9_4.x86_64.rpmrpcp-pmda-zswap-6.2.0-2.el9_4.x86_64.rpmpcp-export-pcp2graphite-6.2.0-2.el9_4.x86_64.rpmdpcp-pmda-samba-6.2.0-2.el9_4.x86_64.rpmQpcp-pmda-netcheck-6.2.0-2.el9_4.x86_64.rpm@pcp-pmda-haproxy-6.2.0-2.el9_4.x86_64.rpm&pcp-import-iostat2pcp-6.2.0-2.el9_4.x86_64.rpmZ EBBsecurityModerate: grafana security update2jhttps://access.redhat.com/errata/RHSA-2024:2568RHSA-2024:2568RHSA-2024:2568 https://access.redhat.com/security/cve/CVE-2024-1313CVE-2024-1313CVE-2024-1313https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/22719032271903https://errata.almalinux.org/9/ALSA-2024-2568.htmlALSA-2024:2568ALSA-2024:2568 F7grafana-9.2.10-16.el9_4.alma.1.x86_64.rpml7grafana-selinux-9.2.10-16.el9_4.alma.1.x86_64.rpmF7grafana-9.2.10-16.el9_4.alma.1.x86_64.rpml7grafana-selinux-9.2.10-16.el9_4.alma.1.x86_64.rpmA[ JsecurityImportant: grafana-pcp security updatexhttps://access.redhat.com/errata/RHSA-2024:2569RHSA-2024:2569RHSA-2024:2569 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-2569.htmlALSA-2024:2569ALSA-2024:2569 dggrafana-pcp-5.1.1-2.el9_4.alma.1.x86_64.rpmdggrafana-pcp-5.1.1-2.el9_4.alma.1.x86_64.rpm\ MBBBBBBBBBsecurityModerate: gnutls security updatehttps://access.redhat.com/errata/RHSA-2024:2570RHSA-2024:2570RHSA-2024:2570 https://access.redhat.com/security/cve/CVE-2024-28834CVE-2024-28834CVE-2024-28834https://access.redhat.com/security/cve/CVE-2024-28835CVE-2024-28835CVE-2024-28835https://bugzilla.redhat.com/22690842269084https://bugzilla.redhat.com/22692282269228https://errata.almalinux.org/9/ALSA-2024-2570.htmlALSA-2024:2570ALSA-2024:2570 gnutls-utils-3.8.3-4.el9_4.x86_64.rpmRgnutls-devel-3.8.3-4.el9_4.x86_64.rpmPgnutls-c++-3.8.3-4.el9_4.i686.rpmRgnutls-devel-3.8.3-4.el9_4.i686.rpmPgnutls-c++-3.8.3-4.el9_4.x86_64.rpmQgnutls-dane-3.8.3-4.el9_4.x86_64.rpmQgnutls-dane-3.8.3-4.el9_4.i686.rpmgnutls-utils-3.8.3-4.el9_4.x86_64.rpmRgnutls-devel-3.8.3-4.el9_4.x86_64.rpmPgnutls-c++-3.8.3-4.el9_4.i686.rpmRgnutls-devel-3.8.3-4.el9_4.i686.rpmPgnutls-c++-3.8.3-4.el9_4.x86_64.rpmQgnutls-dane-3.8.3-4.el9_4.x86_64.rpmQgnutls-dane-3.8.3-4.el9_4.i686.rpmK] YsecurityModerate: sssd security and bug fix update%Hhttps://access.redhat.com/errata/RHSA-2024:2571RHSA-2024:2571RHSA-2024:2571 https://access.redhat.com/security/cve/CVE-2023-3758CVE-2023-3758CVE-2023-3758https://bugzilla.redhat.com/22237622223762https://errata.almalinux.org/9/ALSA-2024-2571.htmlALSA-2024:2571ALSA-2024:2571 [sssd-idp-2.9.4-6.el9_4.x86_64.rpm[sssd-idp-2.9.4-6.el9_4.x86_64.rpm^ '\BBBBBBBBBsecurityImportant: tigervnc security updatemhttps://access.redhat.com/errata/RHSA-2024:2616RHSA-2024:2616RHSA-2024:2616 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-2616.htmlALSA-2024:2616ALSA-2024:2616 oxtigervnc-server-1.13.1-8.el9_4.3.x86_64.rpmnxtigervnc-1.13.1-8.el9_4.3.x86_64.rpm9xtigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm8xtigervnc-license-1.13.1-8.el9_4.3.noarch.rpm7xtigervnc-icons-1.13.1-8.el9_4.3.noarch.rpmpxtigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpmqxtigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpmoxtigervnc-server-1.13.1-8.el9_4.3.x86_64.rpmnxtigervnc-1.13.1-8.el9_4.3.x86_64.rpm9xtigervnc-selinux-1.13.1-8.el9_4.3.noarch.rpm8xtigervnc-license-1.13.1-8.el9_4.3.noarch.rpm7xtigervnc-icons-1.13.1-8.el9_4.3.noarch.rpmpxtigervnc-server-minimal-1.13.1-8.el9_4.3.x86_64.rpmqxtigervnc-server-module-1.13.1-8.el9_4.3.x86_64.rpm7_ +hBsecurityModerate: libxml2 security updatesnhttps://access.redhat.com/errata/RHSA-2024:2679RHSA-2024:2679RHSA-2024:2679 https://access.redhat.com/security/cve/CVE-2024-25062CVE-2024-25062CVE-2024-25062https://bugzilla.redhat.com/22627262262726https://errata.almalinux.org/9/ALSA-2024-2679.htmlALSA-2024:2679ALSA-2024:2679 >7libxml2-devel-2.9.13-6.el9_4.i686.rpm>7libxml2-devel-2.9.13-6.el9_4.x86_64.rpm>7libxml2-devel-2.9.13-6.el9_4.i686.rpm>7libxml2-devel-2.9.13-6.el9_4.x86_64.rpmj` .lsecurityImportant: git-lfs security updatea( https://access.redhat.com/errata/RHSA-2024:2724RHSA-2024:2724RHSA-2024:2724 https://access.redhat.com/security/cve/CVE-2023-45288CVE-2023-45288CVE-2023-45288https://access.redhat.com/security/cve/CVE-2023-45289CVE-2023-45289CVE-2023-45289https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680182268018https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22682732268273https://errata.almalinux.org/9/ALSA-2024-2724.htmlALSA-2024:2724ALSA-2024:2724  7git-lfs-3.4.1-2.el9_4.x86_64.rpm 7git-lfs-3.4.1-2.el9_4.x86_64.rpmia oBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update &https://access.redhat.com/errata/RHSA-2024:2758RHSA-2024:2758RHSA-2024:2758 https://bugzilla.redhat.com/22508432250843https://bugzilla.redhat.com/22708362270836https://errata.almalinux.org/9/ALSA-2024-2758.htmlALSA-2024:2758ALSA-2024:2758 https://www.redhat.com/security/data/cve/CVE-2023-5090.htmlCVE-2023-5090CVE-2023-5090https://www.redhat.com/security/data/cve/CVE-2023-6240.htmlCVE-2023-6240CVE-2023-6240https://www.redhat.com/security/data/cve/CVE-2024-25742.htmlCVE-2024-25742CVE-2024-25742https://www.redhat.com/security/data/cve/CVE-2024-25743.htmlCVE-2024-25743CVE-2024-25743 %;perf-5.14.0-427.16.1.el9_4.x86_64.rpm;kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm!;kernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm#;kernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm$;kernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm*;rv-5.14.0-427.16.1.el9_4.x86_64.rpm";kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm);rtla-5.14.0-427.16.1.el9_4.x86_64.rpm(;kernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpm %;perf-5.14.0-427.16.1.el9_4.x86_64.rpm;kernel-doc-5.14.0-427.16.1.el9_4.noarch.rpm!;kernel-debug-devel-5.14.0-427.16.1.el9_4.x86_64.rpm#;kernel-devel-5.14.0-427.16.1.el9_4.x86_64.rpm$;kernel-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm*;rv-5.14.0-427.16.1.el9_4.x86_64.rpm";kernel-debug-devel-matched-5.14.0-427.16.1.el9_4.x86_64.rpm);rtla-5.14.0-427.16.1.el9_4.x86_64.rpm(;kernel-headers-5.14.0-427.16.1.el9_4.x86_64.rpmpb TBFhBBBBBBBsecurityImportant: nodejs:18 security update/P https://access.redhat.com/errata/RHSA-2024:2779RHSA-2024:2779RHSA-2024:2779 https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2779.htmlALSA-2024:2779ALSA-2024:2779 +nm'!nodejs-devel-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm<nodejs-docs-18.20.2-2.module_el9.4.0+99+a01f7676.noarch.rpmdnodejs-full-i18n-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpmk2nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmc`npm-10.5.0-1.18.20.2.2.module_el9.4.0+99+a01f7676.x86_64.rpm+nodejs-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm+nm'!nodejs-devel-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm<nodejs-docs-18.20.2-2.module_el9.4.0+99+a01f7676.noarch.rpmdnodejs-full-i18n-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpmk2nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmc`npm-10.5.0-1.18.20.2.2.module_el9.4.0+99+a01f7676.x86_64.rpm+nodejs-18.20.2-2.module_el9.4.0+99+a01f7676.x86_64.rpm@c %KBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update"https://access.redhat.com/errata/RHSA-2024:2842RHSA-2024:2842RHSA-2024:2842 https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2842.htmlALSA-2024:2842ALSA-2024:2842 [6dotnet-templates-8.0-8.0.105-1.el9_4.x86_64.rpmK.dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpmX.dotnet-runtime-8.0-8.0.5-1.el9_4.x86_64.rpmY6dotnet-sdk-8.0-8.0.105-1.el9_4.x86_64.rpmW.dotnet-hostfxr-8.0-8.0.5-1.el9_4.x86_64.rpmU.aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm 6netstandard-targeting-pack-2.1-8.0.105-1.el9_4.x86_64.rpmV.dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpmZ.dotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpmT.aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm.dotnet-host-8.0.5-1.el9_4.x86_64.rpmL6dotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpmD.aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpm [6dotnet-templates-8.0-8.0.105-1.el9_4.x86_64.rpmK.dotnet-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpmX.dotnet-runtime-8.0-8.0.5-1.el9_4.x86_64.rpmY6dotnet-sdk-8.0-8.0.105-1.el9_4.x86_64.rpmW.dotnet-hostfxr-8.0-8.0.5-1.el9_4.x86_64.rpmU.aspnetcore-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpm 6netstandard-targeting-pack-2.1-8.0.105-1.el9_4.x86_64.rpmV.dotnet-apphost-pack-8.0-8.0.5-1.el9_4.x86_64.rpmZ.dotnet-targeting-pack-8.0-8.0.5-1.el9_4.x86_64.rpmT.aspnetcore-runtime-8.0-8.0.5-1.el9_4.x86_64.rpm.dotnet-host-8.0.5-1.el9_4.x86_64.rpmL6dotnet-sdk-dbg-8.0-8.0.105-1.el9_4.x86_64.rpmD.aspnetcore-runtime-dbg-8.0-8.0.5-1.el9_4.x86_64.rpmKd 6fBBBBBBBBBBBBBBsecurityImportant: .NET 7.0 security update!#https://access.redhat.com/errata/RHSA-2024:2843RHSA-2024:2843RHSA-2024:2843 https://access.redhat.com/security/cve/CVE-2024-30045CVE-2024-30045CVE-2024-30045https://access.redhat.com/security/cve/CVE-2024-30046CVE-2024-30046CVE-2024-30046https://bugzilla.redhat.com/22796952279695https://bugzilla.redhat.com/22796972279697https://errata.almalinux.org/9/ALSA-2024-2843.htmlALSA-2024:2843ALSA-2024:2843 eCaspnetcore-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpmdCaspnetcore-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmi3dotnet-sdk-7.0-7.0.119-1.el9_4.x86_64.rpmhCdotnet-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmk3dotnet-templates-7.0-7.0.119-1.el9_4.x86_64.rpmgCdotnet-hostfxr-7.0-7.0.19-1.el9_4.x86_64.rpmfCdotnet-apphost-pack-7.0-7.0.19-1.el9_4.x86_64.rpmjCdotnet-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpmeCaspnetcore-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpmdCaspnetcore-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmi3dotnet-sdk-7.0-7.0.119-1.el9_4.x86_64.rpmhCdotnet-runtime-7.0-7.0.19-1.el9_4.x86_64.rpmk3dotnet-templates-7.0-7.0.119-1.el9_4.x86_64.rpmgCdotnet-hostfxr-7.0-7.0.19-1.el9_4.x86_64.rpmfCdotnet-apphost-pack-7.0-7.0.19-1.el9_4.x86_64.rpmjCdotnet-targeting-pack-7.0-7.0.19-1.el9_4.x86_64.rpmoe kBalBBBBBBBsecurityImportant: nodejs:20 security updateDO https://access.redhat.com/errata/RHSA-2024:2853RHSA-2024:2853RHSA-2024:2853 https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2853.htmlALSA-2024:2853ALSA-2024:2853 +2n'< nodejs-docs-20.12.2-2.module_el9.4.0+100+71fc9528.noarch.rpm+ nodejs-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpmk<nodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpmWnodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmWnodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm! nodejs-devel-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpmcanpm-10.5.0-1.20.12.2.2.module_el9.4.0+100+71fc9528.x86_64.rpmd nodejs-full-i18n-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpm+2n'< nodejs-docs-20.12.2-2.module_el9.4.0+100+71fc9528.noarch.rpm+ nodejs-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpmk<nodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpmWnodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmWnodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm! nodejs-devel-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpmcanpm-10.5.0-1.20.12.2.2.module_el9.4.0+100+71fc9528.x86_64.rpmd nodejs-full-i18n-20.12.2-2.module_el9.4.0+100+71fc9528.x86_64.rpm f ABBsecurityImportant: firefox security update https://access.redhat.com/errata/RHSA-2024:2883RHSA-2024:2883RHSA-2024:2883 https://access.redhat.com/security/cve/CVE-2024-4367CVE-2024-4367CVE-2024-4367https://access.redhat.com/security/cve/CVE-2024-4767CVE-2024-4767CVE-2024-4767https://access.redhat.com/security/cve/CVE-2024-4768CVE-2024-4768CVE-2024-4768https://access.redhat.com/security/cve/CVE-2024-4769CVE-2024-4769CVE-2024-4769https://access.redhat.com/security/cve/CVE-2024-4770CVE-2024-4770CVE-2024-4770https://access.redhat.com/security/cve/CVE-2024-4777CVE-2024-4777CVE-2024-4777https://bugzilla.redhat.com/22803822280382https://bugzilla.redhat.com/22803832280383https://bugzilla.redhat.com/22803842280384https://bugzilla.redhat.com/22803852280385https://bugzilla.redhat.com/22803862280386https://bugzilla.redhat.com/22803872280387https://errata.almalinux.org/9/ALSA-2024-2883.htmlALSA-2024:2883ALSA-2024:2883 O?firefox-x11-115.11.0-1.el9_4.alma.1.x86_64.rpm7?firefox-115.11.0-1.el9_4.alma.1.x86_64.rpmO?firefox-x11-115.11.0-1.el9_4.alma.1.x86_64.rpm7?firefox-115.11.0-1.el9_4.alma.1.x86_64.rpmBg FsecurityImportant: thunderbird security update Yhttps://access.redhat.com/errata/RHSA-2024:2888RHSA-2024:2888RHSA-2024:2888 https://access.redhat.com/security/cve/CVE-2024-4367CVE-2024-4367CVE-2024-4367https://access.redhat.com/security/cve/CVE-2024-4767CVE-2024-4767CVE-2024-4767https://access.redhat.com/security/cve/CVE-2024-4768CVE-2024-4768CVE-2024-4768https://access.redhat.com/security/cve/CVE-2024-4769CVE-2024-4769CVE-2024-4769https://access.redhat.com/security/cve/CVE-2024-4770CVE-2024-4770CVE-2024-4770https://access.redhat.com/security/cve/CVE-2024-4777CVE-2024-4777CVE-2024-4777https://bugzilla.redhat.com/22803822280382https://bugzilla.redhat.com/22803832280383https://bugzilla.redhat.com/22803842280384https://bugzilla.redhat.com/22803852280385https://bugzilla.redhat.com/22803862280386https://bugzilla.redhat.com/22803872280387https://errata.almalinux.org/9/ALSA-2024-2888.htmlALSA-2024:2888ALSA-2024:2888 9?thunderbird-115.11.0-1.el9_4.alma.1.x86_64.rpm9?thunderbird-115.11.0-1.el9_4.alma.1.x86_64.rpmMh IBBBBBBBBsecurityImportant: nodejs security updateyP https://access.redhat.com/errata/RHSA-2024:2910RHSA-2024:2910RHSA-2024:2910 https://access.redhat.com/security/cve/CVE-2024-22025CVE-2024-22025CVE-2024-22025https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://access.redhat.com/security/cve/CVE-2024-27982CVE-2024-27982CVE-2024-27982https://access.redhat.com/security/cve/CVE-2024-27983CVE-2024-27983CVE-2024-27983https://access.redhat.com/security/cve/CVE-2024-28182CVE-2024-28182CVE-2024-28182https://bugzilla.redhat.com/22657132265713https://bugzilla.redhat.com/22686392268639https://bugzilla.redhat.com/22705592270559https://bugzilla.redhat.com/22727642272764https://bugzilla.redhat.com/22753922275392https://errata.almalinux.org/9/ALSA-2024-2910.htmlALSA-2024:2910ALSA-2024:2910 cynpm-8.19.4-1.16.20.2.8.el9_4.x86_64.rpm?nodejs-libs-16.20.2-8.el9_4.x86_64.rpm+?nodejs-16.20.2-8.el9_4.x86_64.rpmd?nodejs-full-i18n-16.20.2-8.el9_4.x86_64.rpm https://access.redhat.com/errata/RHSA-2024:3339RHSA-2024:3339RHSA-2024:3339 https://access.redhat.com/security/cve/CVE-2024-2961CVE-2024-2961CVE-2024-2961https://access.redhat.com/security/cve/CVE-2024-33599CVE-2024-33599CVE-2024-33599https://access.redhat.com/security/cve/CVE-2024-33600CVE-2024-33600CVE-2024-33600https://access.redhat.com/security/cve/CVE-2024-33601CVE-2024-33601CVE-2024-33601https://access.redhat.com/security/cve/CVE-2024-33602CVE-2024-33602CVE-2024-33602https://bugzilla.redhat.com/22734042273404https://bugzilla.redhat.com/22772022277202https://bugzilla.redhat.com/22772042277204https://bugzilla.redhat.com/22772052277205https://bugzilla.redhat.com/22772062277206https://errata.almalinux.org/9/ALSA-2024-3339.htmlALSA-2024:3339ALSA-2024:3339 Ioglibc-devel-2.34-100.el9_4.2.i686.rpmoglibc-utils-2.34-100.el9_4.2.x86_64.rpmIoglibc-devel-2.34-100.el9_4.2.x86_64.rpmoglibc-doc-2.34-100.el9_4.2.noarch.rpmoglibc-locale-source-2.34-100.el9_4.2.x86_64.rpmoglibc-headers-2.34-100.el9_4.2.x86_64.rpmIoglibc-devel-2.34-100.el9_4.2.i686.rpmoglibc-utils-2.34-100.el9_4.2.x86_64.rpmIoglibc-devel-2.34-100.el9_4.2.x86_64.rpmoglibc-doc-2.34-100.el9_4.2.noarch.rpmoglibc-locale-source-2.34-100.el9_4.2.x86_64.rpmoglibc-headers-2.34-100.el9_4.2.x86_64.rpm|l zBBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix updateNbhttps://access.redhat.com/errata/RHSA-2024:3619RHSA-2024:3619RHSA-2024:3619 https://access.redhat.com/security/cve/CVE-2024-26735CVE-2024-26735CVE-2024-26735https://access.redhat.com/security/cve/CVE-2024-26993CVE-2024-26993CVE-2024-26993https://bugzilla.redhat.com/22732782273278https://bugzilla.redhat.com/22783142278314https://errata.almalinux.org/9/ALSA-2024-3619.htmlALSA-2024:3619ALSA-2024:3619 (=kernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm)=rtla-5.14.0-427.20.1.el9_4.x86_64.rpm*=rv-5.14.0-427.20.1.el9_4.x86_64.rpm#=kernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm"=kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm=kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm!=kernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm$=kernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm%=perf-5.14.0-427.20.1.el9_4.x86_64.rpm (=kernel-headers-5.14.0-427.20.1.el9_4.x86_64.rpm)=rtla-5.14.0-427.20.1.el9_4.x86_64.rpm*=rv-5.14.0-427.20.1.el9_4.x86_64.rpm#=kernel-devel-5.14.0-427.20.1.el9_4.x86_64.rpm"=kernel-debug-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm=kernel-doc-5.14.0-427.20.1.el9_4.noarch.rpm!=kernel-debug-devel-5.14.0-427.20.1.el9_4.x86_64.rpm$=kernel-devel-matched-5.14.0-427.20.1.el9_4.x86_64.rpm%=perf-5.14.0-427.20.1.el9_4.x86_64.rpmLm ,~BBBBBJBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.1 security, bug fix, and enhancement update0/https://access.redhat.com/errata/RHSA-2024:3668RHSA-2024:3668RHSA-2024:3668 https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3668.htmlALSA-2024:3668ALSA-2024:3668 "no'S?rubygem-test-unit-3.5.3-144.module_el9.4.0+101+d58a8d95.noarch.rpmTBrubygem-typeprof-0.21.3-144.module_el9.4.0+101+d58a8d95.noarch.rpmOrubygem-rake-13.0.6-144.module_el9.4.0+101+d58a8d95.noarch.rpmJvruby-default-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpm*irubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmDKrubygem-psych-4.0.4-144.module_el9.4.0+101+d58a8d95.x86_64.rpmrubygem-rbs-2.7.0-144.module_el9.4.0+101+d58a8d95.x86_64.rpmKrubygem-bundler-2.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpmMLrubygem-minitest-5.15.0-144.module_el9.4.0+101+d58a8d95.noarch.rpmN rubygem-power_assert-2.0.1-144.module_el9.4.0+101+d58a8d95.noarch.rpmPWrubygem-rdoc-6.4.1.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm"vruby-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpmBrubygem-io-console-0.5.11-144.module_el9.4.0+101+d58a8d95.x86_64.rpmUvrubygems-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpmvruby-doc-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmvruby-devel-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpmR<rubygem-rss-0.2.9-144.module_el9.4.0+101+d58a8d95.noarch.rpmpkrubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpmvruby-libs-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpmQ3rubygem-rexml-3.2.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmA/rubygem-bigdecimal-3.1.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpmLsrubygem-irb-1.4.1-144.module_el9.4.0+101+d58a8d95.noarch.rpmnirubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpmCrubygem-json-2.6.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpm vruby-bundled-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpmVvrubygems-devel-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpmokrubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm"no'S?rubygem-test-unit-3.5.3-144.module_el9.4.0+101+d58a8d95.noarch.rpmTBrubygem-typeprof-0.21.3-144.module_el9.4.0+101+d58a8d95.noarch.rpmOrubygem-rake-13.0.6-144.module_el9.4.0+101+d58a8d95.noarch.rpmJvruby-default-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpm*irubygem-mysql2-doc-0.5.4-1.module_el9.1.0+8+503f6fbd.noarch.rpmDKrubygem-psych-4.0.4-144.module_el9.4.0+101+d58a8d95.x86_64.rpmrubygem-rbs-2.7.0-144.module_el9.4.0+101+d58a8d95.x86_64.rpmKrubygem-bundler-2.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpmMLrubygem-minitest-5.15.0-144.module_el9.4.0+101+d58a8d95.noarch.rpmN rubygem-power_assert-2.0.1-144.module_el9.4.0+101+d58a8d95.noarch.rpmPWrubygem-rdoc-6.4.1.1-144.module_el9.4.0+101+d58a8d95.noarch.rpm"vruby-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpmBrubygem-io-console-0.5.11-144.module_el9.4.0+101+d58a8d95.x86_64.rpmUvrubygems-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpmvruby-doc-3.1.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmvruby-devel-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpmR<rubygem-rss-0.2.9-144.module_el9.4.0+101+d58a8d95.noarch.rpmpkrubygem-pg-doc-1.3.5-1.module_el9.1.0+8+503f6fbd.noarch.rpmvruby-libs-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpmQ3rubygem-rexml-3.2.5-144.module_el9.4.0+101+d58a8d95.noarch.rpmA/rubygem-bigdecimal-3.1.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpmLsrubygem-irb-1.4.1-144.module_el9.4.0+101+d58a8d95.noarch.rpmnirubygem-mysql2-0.5.4-1.module_el9.1.0+8+503f6fbd.x86_64.rpmCrubygem-json-2.6.1-144.module_el9.4.0+101+d58a8d95.x86_64.rpm vruby-bundled-gems-3.1.5-144.module_el9.4.0+101+d58a8d95.x86_64.rpmVvrubygems-devel-3.3.27-144.module_el9.4.0+101+d58a8d95.noarch.rpmokrubygem-pg-1.3.5-1.module_el9.1.0+8+503f6fbd.x86_64.rpm^n mBB_BE\BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.3 security, bug fix, and enhancement update_/https://access.redhat.com/errata/RHSA-2024:3671RHSA-2024:3671RHSA-2024:3671 https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3671.htmlALSA-2024:3671ALSA-2024:3671 "tp'&DMrubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.x86_64.rpmVzrubygems-devel-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpmnrubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpm gruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmK$rubygem-bundler-2.5.9-2.module_el9.4.0+102+68a93853.noarch.rpmRHrubygem-rss-0.3.0-2.module_el9.4.0+102+68a93853.noarch.rpmp}rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm/ rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.x86_64.rpmCrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.x86_64.rpmC-rubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpm/ rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.i686.rpmgruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmPYrubygem-rdoc-6.6.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm"gruby-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmOrubygem-rake-13.1.0-2.module_el9.4.0+102+68a93853.noarch.rpmBorubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpm*rubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpmSArubygem-test-unit-3.6.1-2.module_el9.4.0+102+68a93853.noarch.rpmgruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmQ8rubygem-rexml-3.2.6-2.module_el9.4.0+102+68a93853.noarch.rpmo}rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpmL[rubygem-irb-1.11.0-2.module_el9.4.0+102+68a93853.noarch.rpmgruby-doc-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmJgruby-default-gems-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm gruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmgruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmC-rubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.i686.rpmNrubygem-power_assert-2.0.3-2.module_el9.4.0+102+68a93853.noarch.rpmA?rubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.i686.rpmgruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmTDrubygem-typeprof-0.21.9-2.module_el9.4.0+102+68a93853.noarch.rpmCrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.i686.rpmDMrubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.i686.rpmBorubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.i686.rpmUzrubygems-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm"gruby-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmMNrubygem-minitest-5.20.0-2.module_el9.4.0+102+68a93853.noarch.rpmA?rubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.x86_64.rpm"tp'&DMrubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.x86_64.rpmVzrubygems-devel-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpmnrubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpm gruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmK$rubygem-bundler-2.5.9-2.module_el9.4.0+102+68a93853.noarch.rpmRHrubygem-rss-0.3.0-2.module_el9.4.0+102+68a93853.noarch.rpmp}rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm/ rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.x86_64.rpmCrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.x86_64.rpmC-rubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpm/ rubygem-racc-1.7.3-2.module_el9.4.0+102+68a93853.i686.rpmgruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmPYrubygem-rdoc-6.6.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm"gruby-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmOrubygem-rake-13.1.0-2.module_el9.4.0+102+68a93853.noarch.rpmBorubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.x86_64.rpm*rubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpmSArubygem-test-unit-3.6.1-2.module_el9.4.0+102+68a93853.noarch.rpmgruby-devel-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmQ8rubygem-rexml-3.2.6-2.module_el9.4.0+102+68a93853.noarch.rpmo}rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpmL[rubygem-irb-1.11.0-2.module_el9.4.0+102+68a93853.noarch.rpmgruby-doc-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpmJgruby-default-gems-3.3.1-2.module_el9.4.0+102+68a93853.noarch.rpm gruby-bundled-gems-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmgruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmC-rubygem-json-2.7.1-2.module_el9.4.0+102+68a93853.i686.rpmNrubygem-power_assert-2.0.3-2.module_el9.4.0+102+68a93853.noarch.rpmA?rubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.i686.rpmgruby-libs-3.3.1-2.module_el9.4.0+102+68a93853.i686.rpmTDrubygem-typeprof-0.21.9-2.module_el9.4.0+102+68a93853.noarch.rpmCrubygem-rbs-3.4.0-2.module_el9.4.0+102+68a93853.i686.rpmDMrubygem-psych-5.1.2-2.module_el9.4.0+102+68a93853.i686.rpmBorubygem-io-console-0.7.1-2.module_el9.4.0+102+68a93853.i686.rpmUzrubygems-3.5.9-2.module_el9.4.0+102+68a93853.noarch.rpm"gruby-3.3.1-2.module_el9.4.0+102+68a93853.x86_64.rpmMNrubygem-minitest-5.20.0-2.module_el9.4.0+102+68a93853.noarch.rpmA?rubygem-bigdecimal-3.1.5-2.module_el9.4.0+102+68a93853.x86_64.rpmfo ,ZBBBBBBBBBBBBBBBBsecurityImportant: ipa security updatewhttps://access.redhat.com/errata/RHSA-2024:3754RHSA-2024:3754RHSA-2024:3754 https://access.redhat.com/security/cve/CVE-2024-2698CVE-2024-2698CVE-2024-2698https://access.redhat.com/security/cve/CVE-2024-3183CVE-2024-3183CVE-2024-3183https://bugzilla.redhat.com/22703532270353https://bugzilla.redhat.com/22706852270685https://errata.almalinux.org/9/ALSA-2024-3754.htmlALSA-2024:3754ALSA-2024:3754 C:ipa-client-4.11.0-15.el9_4.alma.1.x86_64.rpmG:ipa-server-trust-ad-4.11.0-15.el9_4.alma.1.x86_64.rpmO:python3-ipaserver-4.11.0-15.el9_4.alma.1.noarch.rpmN:python3-ipalib-4.11.0-15.el9_4.alma.1.noarch.rpmF:ipa-server-4.11.0-15.el9_4.alma.1.x86_64.rpmJ:ipa-server-common-4.11.0-15.el9_4.alma.1.noarch.rpmG:ipa-client-common-4.11.0-15.el9_4.alma.1.noarch.rpmE:ipa-client-samba-4.11.0-15.el9_4.alma.1.x86_64.rpmK:ipa-server-dns-4.11.0-15.el9_4.alma.1.noarch.rpmI:ipa-selinux-4.11.0-15.el9_4.alma.1.noarch.rpmD:ipa-client-epn-4.11.0-15.el9_4.alma.1.x86_64.rpmM:python3-ipaclient-4.11.0-15.el9_4.alma.1.noarch.rpmH:ipa-common-4.11.0-15.el9_4.alma.1.noarch.rpm C:ipa-client-4.11.0-15.el9_4.alma.1.x86_64.rpmG:ipa-server-trust-ad-4.11.0-15.el9_4.alma.1.x86_64.rpmO:python3-ipaserver-4.11.0-15.el9_4.alma.1.noarch.rpmN:python3-ipalib-4.11.0-15.el9_4.alma.1.noarch.rpmF:ipa-server-4.11.0-15.el9_4.alma.1.x86_64.rpmJ:ipa-server-common-4.11.0-15.el9_4.alma.1.noarch.rpmG:ipa-client-common-4.11.0-15.el9_4.alma.1.noarch.rpmE:ipa-client-samba-4.11.0-15.el9_4.alma.1.x86_64.rpmK:ipa-server-dns-4.11.0-15.el9_4.alma.1.noarch.rpmI:ipa-selinux-4.11.0-15.el9_4.alma.1.noarch.rpmD:ipa-client-epn-4.11.0-15.el9_4.alma.1.x86_64.rpmM:python3-ipaclient-4.11.0-15.el9_4.alma.1.noarch.rpmH:ipa-common-4.11.0-15.el9_4.alma.1.noarch.rpmѧ|p mBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security update3https://access.redhat.com/errata/RHSA-2024:3820RHSA-2024:3820RHSA-2024:3820 https://access.redhat.com/security/cve/CVE-2024-34064CVE-2024-34064CVE-2024-34064https://bugzilla.redhat.com/22794762279476https://errata.almalinux.org/9/ALSA-2024-3820.htmlALSA-2024:3820ALSA-2024:3820 &fence-virt-4.10.0-62.el9_4.3.x86_64.rpm]&fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm^&fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm&fence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpm&fence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpm&fence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpm&fence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpm&fence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm_&fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpm&fence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpm&fence-virtd-4.10.0-62.el9_4.3.x86_64.rpm\&fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm&fence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm &fence-virt-4.10.0-62.el9_4.3.x86_64.rpm]&fence-agents-ibm-powervs-4.10.0-62.el9_4.3.noarch.rpm^&fence-agents-ibm-vpc-4.10.0-62.el9_4.3.noarch.rpm&fence-agents-kubevirt-4.10.0-62.el9_4.3.x86_64.rpm&fence-virtd-cpg-4.10.0-62.el9_4.3.x86_64.rpm&fence-virtd-libvirt-4.10.0-62.el9_4.3.x86_64.rpm&fence-virtd-multicast-4.10.0-62.el9_4.3.x86_64.rpm&fence-virtd-serial-4.10.0-62.el9_4.3.x86_64.rpm_&fence-agents-virsh-4.10.0-62.el9_4.3.noarch.rpm&fence-virtd-tcp-4.10.0-62.el9_4.3.x86_64.rpm&fence-virtd-4.10.0-62.el9_4.3.x86_64.rpm\&fence-agents-common-4.10.0-62.el9_4.3.noarch.rpm&fence-agents-compute-4.10.0-62.el9_4.3.x86_64.rpm)q DBBBsecurityModerate: rpm-ostree security update8https://access.redhat.com/errata/RHSA-2024:3823RHSA-2024:3823RHSA-2024:3823 https://access.redhat.com/security/cve/CVE-2024-2905CVE-2024-2905CVE-2024-2905https://bugzilla.redhat.com/22715852271585https://errata.almalinux.org/9/ALSA-2024-3823.htmlALSA-2024:3823ALSA-2024:3823 6rpm-ostree-libs-2024.3-3.el9_4.x86_64.rpm6rpm-ostree-libs-2024.3-3.el9_4.i686.rpmY6rpm-ostree-2024.3-3.el9_4.x86_64.rpm6rpm-ostree-libs-2024.3-3.el9_4.x86_64.rpm6rpm-ostree-libs-2024.3-3.el9_4.i686.rpmY6rpm-ostree-2024.3-3.el9_4.x86_64.rpmVr JBBBBBBBsecurityModerate: podman security and bug fix updateI4https://access.redhat.com/errata/RHSA-2024:3826RHSA-2024:3826RHSA-2024:3826 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://access.redhat.com/security/cve/CVE-2024-28180CVE-2024-28180CVE-2024-28180https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22688542268854https://errata.almalinux.org/9/ALSA-2024-3826.htmlALSA-2024:3826ALSA-2024:3826 -podman-4.9.4-4.el9_4.x86_64.rpm0podman-tests-4.9.4-4.el9_4.x86_64.rpmfpodman-docker-4.9.4-4.el9_4.noarch.rpm.podman-plugins-4.9.4-4.el9_4.x86_64.rpm/podman-remote-4.9.4-4.el9_4.x86_64.rpm-podman-4.9.4-4.el9_4.x86_64.rpm0podman-tests-4.9.4-4.el9_4.x86_64.rpmfpodman-docker-4.9.4-4.el9_4.noarch.rpm.podman-plugins-4.9.4-4.el9_4.x86_64.rpm/podman-remote-4.9.4-4.el9_4.x86_64.rpmBs TBBsecurityModerate: buildah security and bug fix update}=https://access.redhat.com/errata/RHSA-2024:3827RHSA-2024:3827RHSA-2024:3827 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://access.redhat.com/security/cve/CVE-2024-28180CVE-2024-28180CVE-2024-28180https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22688542268854https://errata.almalinux.org/9/ALSA-2024-3827.htmlALSA-2024:3827ALSA-2024:3827 = buildah-tests-1.33.7-2.el9_4.x86_64.rpm< buildah-1.33.7-2.el9_4.x86_64.rpm= buildah-tests-1.33.7-2.el9_4.x86_64.rpm< buildah-1.33.7-2.el9_4.x86_64.rpm)t YsecurityModerate: gvisor-tap-vsock security and bug fix update:{https://access.redhat.com/errata/RHSA-2024:3830RHSA-2024:3830RHSA-2024:3830 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://bugzilla.redhat.com/22680172268017https://errata.almalinux.org/9/ALSA-2024-3830.htmlALSA-2024:3830ALSA-2024:3830 wrgvisor-tap-vsock-0.7.3-3.el9_4.alma.1.x86_64.rpmwrgvisor-tap-vsock-0.7.3-3.el9_4.alma.1.x86_64.rpmru \securityModerate: containernetworking-plugins security and bug fix update5;https://access.redhat.com/errata/RHSA-2024:3831RHSA-2024:3831RHSA-2024:3831 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://bugzilla.redhat.com/22680172268017https://errata.almalinux.org/9/ALSA-2024-3831.htmlALSA-2024:3831ALSA-2024:3831 JWcontainernetworking-plugins-1.4.0-3.el9_4.x86_64.rpmJWcontainernetworking-plugins-1.4.0-3.el9_4.x86_64.rpm:v (_BBBBBBBsecurityModerate: gdk-pixbuf2 security updatepAhttps://access.redhat.com/errata/RHSA-2024:3834RHSA-2024:3834RHSA-2024:3834 https://access.redhat.com/security/cve/CVE-2022-48622CVE-2022-48622CVE-2022-48622https://bugzilla.redhat.com/22605452260545https://errata.almalinux.org/9/ALSA-2024-3834.htmlALSA-2024:3834ALSA-2024:3834 _Egdk-pixbuf2-devel-2.42.6-4.el9_4.x86_64.rpm_Egdk-pixbuf2-devel-2.42.6-4.el9_4.i686.rpm`Egdk-pixbuf2-modules-2.42.6-4.el9_4.i686.rpm^Egdk-pixbuf2-2.42.6-4.el9_4.x86_64.rpm^Egdk-pixbuf2-2.42.6-4.el9_4.i686.rpm`Egdk-pixbuf2-modules-2.42.6-4.el9_4.x86_64.rpm_Egdk-pixbuf2-devel-2.42.6-4.el9_4.x86_64.rpm_Egdk-pixbuf2-devel-2.42.6-4.el9_4.i686.rpm`Egdk-pixbuf2-modules-2.42.6-4.el9_4.i686.rpm^Egdk-pixbuf2-2.42.6-4.el9_4.x86_64.rpm^Egdk-pixbuf2-2.42.6-4.el9_4.i686.rpm`Egdk-pixbuf2-modules-2.42.6-4.el9_4.x86_64.rpmw #iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libreoffice security update1Xhttps://access.redhat.com/errata/RHSA-2024:3835RHSA-2024:3835RHSA-2024:3835 https://access.redhat.com/security/cve/CVE-2023-6185CVE-2023-6185CVE-2023-6185https://access.redhat.com/security/cve/CVE-2023-6186CVE-2023-6186CVE-2023-6186https://bugzilla.redhat.com/22540032254003https://bugzilla.redhat.com/22540052254005https://errata.almalinux.org/9/ALSA-2024-3835.htmlALSA-2024:3835ALSA-2024:3835 1libreoffice-langpack-ve-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm0libreoffice-help-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpmOautocorr-ca-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-te-7.1.8.1-12.el9_4.alma.1.x86_64.rpmQautocorr-da-7.1.8.1-12.el9_4.alma.1.noarch.rpmbautocorr-lb-7.1.8.1-12.el9_4.alma.1.noarch.rpmYautocorr-fr-7.1.8.1-12.el9_4.alma.1.noarch.rpm&libreoffice-gdb-debug-support-7.1.8.1-12.el9_4.alma.1.x86_64.rpmjlibreoffice-langpack-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmYlibreoffice-langpack-as-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmMlibreoffice-help-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpmmautocorr-sv-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-data-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-pa-7.1.8.1-12.el9_4.alma.1.x86_64.rpm-libreoffice-help-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm^libreoffice-langpack-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm}libreoffice-langpack-ml-7.1.8.1-12.el9_4.alma.1.x86_64.rpmzlibreoffice-langpack-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-12.el9_4.alma.1.x86_64.rpm@libreoffice-help-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpm5libreoffice-help-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ss-7.1.8.1-12.el9_4.alma.1.x86_64.rpm:libreoffice-help-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmnautocorr-tr-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpmolibreoffice-langpack-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nso-7.1.8.1-12.el9_4.alma.1.x86_64.rpmWlibreoffice-langpack-af-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-xh-7.1.8.1-12.el9_4.alma.1.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-12.el9_4.alma.1.x86_64.rpmFlibreoffice-help-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm$libreoffice-writer-7.1.8.1-12.el9_4.alma.1.x86_64.rpmgautocorr-pt-7.1.8.1-12.el9_4.alma.1.noarch.rpm"libreoffice-ure-7.1.8.1-12.el9_4.alma.1.x86_64.rpm[autocorr-hr-7.1.8.1-12.el9_4.alma.1.noarch.rpm!libreoffice-pyuno-7.1.8.1-12.el9_4.alma.1.x86_64.rpmVlibreoffice-impress-7.1.8.1-12.el9_4.alma.1.x86_64.rpm;libreoffice-help-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm^autocorr-is-7.1.8.1-12.el9_4.alma.1.noarch.rpmilibreoffice-langpack-fa-7.1.8.1-12.el9_4.alma.1.x86_64.rpmhautocorr-ro-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmDlibreoffice-help-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm&libreoffice-xsltfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1libreoffice-help-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-7.1.8.1-12.el9_4.alma.1.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-12.el9_4.alma.1.x86_64.rpm4libreoffice-help-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpm,libreoffice-help-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm_autocorr-it-7.1.8.1-12.el9_4.alma.1.noarch.rpmHlibreoffice-help-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmtlibreoffice-langpack-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpmUautocorr-en-7.1.8.1-12.el9_4.alma.1.noarch.rpm`libreoffice-langpack-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-ogltrans-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-math-7.1.8.1-12.el9_4.alma.1.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpmWautocorr-fa-7.1.8.1-12.el9_4.alma.1.noarch.rpmslibreoffice-langpack-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm[libreoffice-langpack-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm#libreoffice-wiki-publisher-7.1.8.1-12.el9_4.alma.1.x86_64.rpmclibreoffice-langpack-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-st-7.1.8.1-12.el9_4.alma.1.x86_64.rpmklibreoffice-langpack-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmIlibreoffice-help-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmqautocorr-zh-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmSautocorr-dsb-7.1.8.1-12.el9_4.alma.1.noarch.rpmylibreoffice-langpack-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpm?libreoffice-help-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpm(libreoffice-gtk3-7.1.8.1-12.el9_4.alma.1.x86_64.rpmZautocorr-ga-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm=libreoffice-help-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmKlibreoffice-help-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpmQlibreoffice-help-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpmwlibreoffice-langpack-kk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm~libreoffice-langpack-mr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmeautocorr-nl-7.1.8.1-12.el9_4.alma.1.noarch.rpmTautocorr-el-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-base-7.1.8.1-12.el9_4.alma.1.x86_64.rpmxlibreoffice-langpack-kn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm%libreoffice-x11-7.1.8.1-12.el9_4.alma.1.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm)libreoffice-help-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmOlibreoffice-help-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmnlibreoffice-langpack-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-ure-common-7.1.8.1-12.el9_4.alma.1.noarch.rpm.libreoffice-help-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpm+libreoffice-help-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmoautocorr-vi-7.1.8.1-12.el9_4.alma.1.noarch.rpm]libreoffice-langpack-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpmTlibreoffice-help-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpmdautocorr-mn-7.1.8.1-12.el9_4.alma.1.noarch.rpmpautocorr-vro-7.1.8.1-12.el9_4.alma.1.noarch.rpmNautocorr-bg-7.1.8.1-12.el9_4.alma.1.noarch.rpm]autocorr-hu-7.1.8.1-12.el9_4.alma.1.noarch.rpmZlibreoffice-langpack-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm6libreoffice-help-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmPautocorr-cs-7.1.8.1-12.el9_4.alma.1.noarch.rpmrlibreoffice-langpack-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmXautocorr-fi-7.1.8.1-12.el9_4.alma.1.noarch.rpmalibreoffice-langpack-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpmElibreoffice-help-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpmfautocorr-pl-7.1.8.1-12.el9_4.alma.1.noarch.rpmplibreoffice-langpack-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpmSlibreoffice-help-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmJlibreoffice-help-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpm<libreoffice-help-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-tn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmglibreoffice-langpack-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpmBlibreoffice-help-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpmqlibreoffice-langpack-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm"libreoffice-core-7.1.8.1-12.el9_4.alma.1.x86_64.rpmcautocorr-lt-7.1.8.1-12.el9_4.alma.1.noarch.rpmflibreoffice-langpack-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpm8libreoffice-help-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm'libreofficekit-7.1.8.1-12.el9_4.alma.1.x86_64.rpmVautocorr-es-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm`autocorr-ja-7.1.8.1-12.el9_4.alma.1.noarch.rpm\autocorr-hsb-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-12.el9_4.alma.1.x86_64.rpmmlibreoffice-langpack-ga-7.1.8.1-12.el9_4.alma.1.x86_64.rpmNlibreoffice-help-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmLlibreoffice-help-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpm2libreoffice-help-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpm#libreoffice-draw-7.1.8.1-12.el9_4.alma.1.x86_64.rpmdlibreoffice-langpack-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm9libreoffice-help-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmClibreoffice-help-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpmMautocorr-af-7.1.8.1-12.el9_4.alma.1.noarch.rpm!libreoffice-calc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmAlibreoffice-help-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm%libreoffice-filters-7.1.8.1-12.el9_4.alma.1.x86_64.rpm$libreoffice-emailmerge-7.1.8.1-12.el9_4.alma.1.x86_64.rpm_libreoffice-langpack-cy-7.1.8.1-12.el9_4.alma.1.x86_64.rpmXlibreoffice-langpack-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-opensymbol-fonts-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-or-7.1.8.1-12.el9_4.alma.1.x86_64.rpm7libreoffice-help-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3libreoffice-help-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlautocorr-sr-7.1.8.1-12.el9_4.alma.1.noarch.rpmRautocorr-de-7.1.8.1-12.el9_4.alma.1.noarch.rpm/libreoffice-help-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpmaautocorr-ko-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpm*libreoffice-help-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmvlibreoffice-langpack-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpmelibreoffice-langpack-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpmjautocorr-sk-7.1.8.1-12.el9_4.alma.1.noarch.rpm>libreoffice-help-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpmiautocorr-ru-7.1.8.1-12.el9_4.alma.1.noarch.rpmRlibreoffice-help-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpmkautocorr-sl-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-pdfimport-7.1.8.1-12.el9_4.alma.1.x86_64.rpmulibreoffice-langpack-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1libreoffice-langpack-ve-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm0libreoffice-help-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpmOautocorr-ca-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-te-7.1.8.1-12.el9_4.alma.1.x86_64.rpmQautocorr-da-7.1.8.1-12.el9_4.alma.1.noarch.rpmbautocorr-lb-7.1.8.1-12.el9_4.alma.1.noarch.rpmYautocorr-fr-7.1.8.1-12.el9_4.alma.1.noarch.rpm&libreoffice-gdb-debug-support-7.1.8.1-12.el9_4.alma.1.x86_64.rpmjlibreoffice-langpack-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmYlibreoffice-langpack-as-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmMlibreoffice-help-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpmmautocorr-sv-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-data-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-pa-7.1.8.1-12.el9_4.alma.1.x86_64.rpm-libreoffice-help-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm^libreoffice-langpack-cs-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpm}libreoffice-langpack-ml-7.1.8.1-12.el9_4.alma.1.x86_64.rpmzlibreoffice-langpack-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-12.el9_4.alma.1.x86_64.rpm@libreoffice-help-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpm5libreoffice-help-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ss-7.1.8.1-12.el9_4.alma.1.x86_64.rpm:libreoffice-help-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmnautocorr-tr-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpmolibreoffice-langpack-gu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nso-7.1.8.1-12.el9_4.alma.1.x86_64.rpmWlibreoffice-langpack-af-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-xh-7.1.8.1-12.el9_4.alma.1.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-12.el9_4.alma.1.x86_64.rpmFlibreoffice-help-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm$libreoffice-writer-7.1.8.1-12.el9_4.alma.1.x86_64.rpmgautocorr-pt-7.1.8.1-12.el9_4.alma.1.noarch.rpm"libreoffice-ure-7.1.8.1-12.el9_4.alma.1.x86_64.rpm[autocorr-hr-7.1.8.1-12.el9_4.alma.1.noarch.rpm!libreoffice-pyuno-7.1.8.1-12.el9_4.alma.1.x86_64.rpmVlibreoffice-impress-7.1.8.1-12.el9_4.alma.1.x86_64.rpm;libreoffice-help-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpm^autocorr-is-7.1.8.1-12.el9_4.alma.1.noarch.rpmilibreoffice-langpack-fa-7.1.8.1-12.el9_4.alma.1.x86_64.rpmhautocorr-ro-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmDlibreoffice-help-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm&libreoffice-xsltfilter-7.1.8.1-12.el9_4.alma.1.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-12.el9_4.alma.1.x86_64.rpm1libreoffice-help-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-sv-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-7.1.8.1-12.el9_4.alma.1.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-12.el9_4.alma.1.x86_64.rpm4libreoffice-help-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpm,libreoffice-help-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpm_autocorr-it-7.1.8.1-12.el9_4.alma.1.noarch.rpmHlibreoffice-help-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmtlibreoffice-langpack-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpmUautocorr-en-7.1.8.1-12.el9_4.alma.1.noarch.rpm`libreoffice-langpack-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-ogltrans-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-math-7.1.8.1-12.el9_4.alma.1.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpmWautocorr-fa-7.1.8.1-12.el9_4.alma.1.noarch.rpmslibreoffice-langpack-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpm[libreoffice-langpack-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm#libreoffice-wiki-publisher-7.1.8.1-12.el9_4.alma.1.x86_64.rpmclibreoffice-langpack-el-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-st-7.1.8.1-12.el9_4.alma.1.x86_64.rpmklibreoffice-langpack-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmIlibreoffice-help-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmqautocorr-zh-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmSautocorr-dsb-7.1.8.1-12.el9_4.alma.1.noarch.rpmylibreoffice-langpack-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-12.el9_4.alma.1.x86_64.rpm?libreoffice-help-id-7.1.8.1-12.el9_4.alma.1.x86_64.rpm(libreoffice-gtk3-7.1.8.1-12.el9_4.alma.1.x86_64.rpmZautocorr-ga-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm=libreoffice-help-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmKlibreoffice-help-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpmQlibreoffice-help-ta-7.1.8.1-12.el9_4.alma.1.x86_64.rpmwlibreoffice-langpack-kk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm~libreoffice-langpack-mr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmeautocorr-nl-7.1.8.1-12.el9_4.alma.1.noarch.rpmTautocorr-el-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-base-7.1.8.1-12.el9_4.alma.1.x86_64.rpmxlibreoffice-langpack-kn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm%libreoffice-x11-7.1.8.1-12.el9_4.alma.1.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-12.el9_4.alma.1.x86_64.rpm)libreoffice-help-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmOlibreoffice-help-sl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmnlibreoffice-langpack-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-ure-common-7.1.8.1-12.el9_4.alma.1.noarch.rpm.libreoffice-help-da-7.1.8.1-12.el9_4.alma.1.x86_64.rpm+libreoffice-help-bn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmoautocorr-vi-7.1.8.1-12.el9_4.alma.1.noarch.rpm]libreoffice-langpack-ca-7.1.8.1-12.el9_4.alma.1.x86_64.rpmTlibreoffice-help-zh-Hans-7.1.8.1-12.el9_4.alma.1.x86_64.rpmdautocorr-mn-7.1.8.1-12.el9_4.alma.1.noarch.rpmpautocorr-vro-7.1.8.1-12.el9_4.alma.1.noarch.rpmNautocorr-bg-7.1.8.1-12.el9_4.alma.1.noarch.rpm]autocorr-hu-7.1.8.1-12.el9_4.alma.1.noarch.rpmZlibreoffice-langpack-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpm6libreoffice-help-eu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmPautocorr-cs-7.1.8.1-12.el9_4.alma.1.noarch.rpmrlibreoffice-langpack-hr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmXautocorr-fi-7.1.8.1-12.el9_4.alma.1.noarch.rpmalibreoffice-langpack-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpmElibreoffice-help-nb-7.1.8.1-12.el9_4.alma.1.x86_64.rpmfautocorr-pl-7.1.8.1-12.el9_4.alma.1.noarch.rpmplibreoffice-langpack-he-7.1.8.1-12.el9_4.alma.1.x86_64.rpmSlibreoffice-help-uk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmJlibreoffice-help-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpm<libreoffice-help-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-tn-7.1.8.1-12.el9_4.alma.1.x86_64.rpmglibreoffice-langpack-et-7.1.8.1-12.el9_4.alma.1.x86_64.rpmBlibreoffice-help-ko-7.1.8.1-12.el9_4.alma.1.x86_64.rpmqlibreoffice-langpack-hi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm"libreoffice-core-7.1.8.1-12.el9_4.alma.1.x86_64.rpmcautocorr-lt-7.1.8.1-12.el9_4.alma.1.noarch.rpmflibreoffice-langpack-es-7.1.8.1-12.el9_4.alma.1.x86_64.rpm8libreoffice-help-fr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm'libreofficekit-7.1.8.1-12.el9_4.alma.1.x86_64.rpmVautocorr-es-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpm`autocorr-ja-7.1.8.1-12.el9_4.alma.1.noarch.rpm\autocorr-hsb-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-12.el9_4.alma.1.x86_64.rpmmlibreoffice-langpack-ga-7.1.8.1-12.el9_4.alma.1.x86_64.rpmNlibreoffice-help-sk-7.1.8.1-12.el9_4.alma.1.x86_64.rpmLlibreoffice-help-ru-7.1.8.1-12.el9_4.alma.1.x86_64.rpm2libreoffice-help-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpm#libreoffice-draw-7.1.8.1-12.el9_4.alma.1.x86_64.rpmdlibreoffice-langpack-en-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-12.el9_4.alma.1.x86_64.rpm9libreoffice-help-gl-7.1.8.1-12.el9_4.alma.1.x86_64.rpmClibreoffice-help-lt-7.1.8.1-12.el9_4.alma.1.x86_64.rpmMautocorr-af-7.1.8.1-12.el9_4.alma.1.noarch.rpm!libreoffice-calc-7.1.8.1-12.el9_4.alma.1.x86_64.rpmAlibreoffice-help-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-12.el9_4.alma.1.x86_64.rpm%libreoffice-filters-7.1.8.1-12.el9_4.alma.1.x86_64.rpm$libreoffice-emailmerge-7.1.8.1-12.el9_4.alma.1.x86_64.rpm_libreoffice-langpack-cy-7.1.8.1-12.el9_4.alma.1.x86_64.rpmXlibreoffice-langpack-ar-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-opensymbol-fonts-7.1.8.1-12.el9_4.alma.1.noarch.rpmlibreoffice-langpack-or-7.1.8.1-12.el9_4.alma.1.x86_64.rpm7libreoffice-help-fi-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3libreoffice-help-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlautocorr-sr-7.1.8.1-12.el9_4.alma.1.noarch.rpmRautocorr-de-7.1.8.1-12.el9_4.alma.1.noarch.rpm/libreoffice-help-de-7.1.8.1-12.el9_4.alma.1.x86_64.rpmaautocorr-ko-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-langpack-si-7.1.8.1-12.el9_4.alma.1.x86_64.rpm*libreoffice-help-bg-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmvlibreoffice-langpack-ja-7.1.8.1-12.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ro-7.1.8.1-12.el9_4.alma.1.x86_64.rpmelibreoffice-langpack-eo-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-12.el9_4.alma.1.x86_64.rpmjautocorr-sk-7.1.8.1-12.el9_4.alma.1.noarch.rpm>libreoffice-help-hu-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-12.el9_4.alma.1.x86_64.rpmiautocorr-ru-7.1.8.1-12.el9_4.alma.1.noarch.rpmRlibreoffice-help-tr-7.1.8.1-12.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pt-PT-7.1.8.1-12.el9_4.alma.1.x86_64.rpmkautocorr-sl-7.1.8.1-12.el9_4.alma.1.noarch.rpm libreoffice-pdfimport-7.1.8.1-12.el9_4.alma.1.x86_64.rpmulibreoffice-langpack-it-7.1.8.1-12.el9_4.alma.1.x86_64.rpm3x )dBBBsecurityImportant: 389-ds-base security update mhttps://access.redhat.com/errata/RHSA-2024:3837RHSA-2024:3837RHSA-2024:3837 https://access.redhat.com/security/cve/CVE-2024-2199CVE-2024-2199CVE-2024-2199https://access.redhat.com/security/cve/CVE-2024-3657CVE-2024-3657CVE-2024-3657https://bugzilla.redhat.com/22679762267976https://bugzilla.redhat.com/22744012274401https://errata.almalinux.org/9/ALSA-2024-3837.htmlALSA-2024:3837ALSA-2024:3837  3python3-lib389-2.4.5-8.el9_4.noarch.rpms3389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpmr3389-ds-base-2.4.5-8.el9_4.x86_64.rpm 3python3-lib389-2.4.5-8.el9_4.noarch.rpms3389-ds-base-libs-2.4.5-8.el9_4.x86_64.rpmr3389-ds-base-2.4.5-8.el9_4.x86_64.rpm y jBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby security updatevXhttps://access.redhat.com/errata/RHSA-2024:3838RHSA-2024:3838RHSA-2024:3838 https://access.redhat.com/security/cve/CVE-2021-33621CVE-2021-33621CVE-2021-33621https://access.redhat.com/security/cve/CVE-2023-28755CVE-2023-28755CVE-2023-28755https://access.redhat.com/security/cve/CVE-2023-28756CVE-2023-28756CVE-2023-28756https://access.redhat.com/security/cve/CVE-2024-27280CVE-2024-27280CVE-2024-27280https://access.redhat.com/security/cve/CVE-2024-27281CVE-2024-27281CVE-2024-27281https://access.redhat.com/security/cve/CVE-2024-27282CVE-2024-27282CVE-2024-27282https://bugzilla.redhat.com/21497062149706https://bugzilla.redhat.com/21840592184059https://bugzilla.redhat.com/21840612184061https://bugzilla.redhat.com/22707492270749https://bugzilla.redhat.com/22707502270750https://bugzilla.redhat.com/22768102276810https://errata.almalinux.org/9/ALSA-2024-3838.htmlALSA-2024:3838ALSA-2024:3838 prubygem-rbs-1.4.0-162.el9_4.noarch.rpmLlrubygem-irb-1.3.5-162.el9_4.noarch.rpmR?rubygem-rss-0.2.9-162.el9_4.noarch.rpm)ruby-libs-3.0.7-162.el9_4.i686.rpmCrubygem-json-2.5.1-162.el9_4.x86_64.rpm)ruby-devel-3.0.7-162.el9_4.i686.rpmUprubygems-3.2.33-162.el9_4.noarch.rpmO|rubygem-rake-13.0.3-162.el9_4.noarch.rpmA,rubygem-bigdecimal-3.0.0-162.el9_4.x86_64.rpmKrubygem-bundler-2.2.33-162.el9_4.noarch.rpmT9rubygem-typeprof-0.15.2-162.el9_4.noarch.rpmPSrubygem-rdoc-6.3.4.1-162.el9_4.noarch.rpmBrubygem-io-console-0.5.7-162.el9_4.x86_64.rpmD5rubygem-psych-3.3.2-162.el9_4.x86_64.rpm")ruby-3.0.7-162.el9_4.i686.rpmVprubygems-devel-3.2.33-162.el9_4.noarch.rpmMIrubygem-minitest-5.14.2-162.el9_4.noarch.rpm)ruby-devel-3.0.7-162.el9_4.x86_64.rpmN`rubygem-power_assert-1.2.1-162.el9_4.noarch.rpmQ6rubygem-rexml-3.2.5-162.el9_4.noarch.rpm)ruby-libs-3.0.7-162.el9_4.x86_64.rpm")ruby-3.0.7-162.el9_4.x86_64.rpmS;rubygem-test-unit-3.3.7-162.el9_4.noarch.rpmJ)ruby-default-gems-3.0.7-162.el9_4.noarch.rpmprubygem-rbs-1.4.0-162.el9_4.noarch.rpmLlrubygem-irb-1.3.5-162.el9_4.noarch.rpmR?rubygem-rss-0.2.9-162.el9_4.noarch.rpm)ruby-libs-3.0.7-162.el9_4.i686.rpmCrubygem-json-2.5.1-162.el9_4.x86_64.rpm)ruby-devel-3.0.7-162.el9_4.i686.rpmUprubygems-3.2.33-162.el9_4.noarch.rpmO|rubygem-rake-13.0.3-162.el9_4.noarch.rpmA,rubygem-bigdecimal-3.0.0-162.el9_4.x86_64.rpmKrubygem-bundler-2.2.33-162.el9_4.noarch.rpmT9rubygem-typeprof-0.15.2-162.el9_4.noarch.rpmPSrubygem-rdoc-6.3.4.1-162.el9_4.noarch.rpmBrubygem-io-console-0.5.7-162.el9_4.x86_64.rpmD5rubygem-psych-3.3.2-162.el9_4.x86_64.rpm")ruby-3.0.7-162.el9_4.i686.rpmVprubygems-devel-3.2.33-162.el9_4.noarch.rpmMIrubygem-minitest-5.14.2-162.el9_4.noarch.rpm)ruby-devel-3.0.7-162.el9_4.x86_64.rpmN`rubygem-power_assert-1.2.1-162.el9_4.noarch.rpmQ6rubygem-rexml-3.2.5-162.el9_4.noarch.rpm)ruby-libs-3.0.7-162.el9_4.x86_64.rpm")ruby-3.0.7-162.el9_4.x86_64.rpmS;rubygem-test-unit-3.3.7-162.el9_4.noarch.rpmJ)ruby-default-gems-3.0.7-162.el9_4.noarch.rpmFz JBsecurityLow: c-ares security update3Nhttps://access.redhat.com/errata/RHSA-2024:3842RHSA-2024:3842RHSA-2024:3842 https://access.redhat.com/security/cve/CVE-2024-25629CVE-2024-25629CVE-2024-25629https://bugzilla.redhat.com/22657132265713https://errata.almalinux.org/9/ALSA-2024-3842.htmlALSA-2024:3842ALSA-2024:3842 zc-ares-devel-1.19.1-2.el9_4.x86_64.rpmzc-ares-devel-1.19.1-2.el9_4.i686.rpmzc-ares-devel-1.19.1-2.el9_4.x86_64.rpmzc-ares-devel-1.19.1-2.el9_4.i686.rpmW{ NBBsecurityModerate: cockpit security updatePEhttps://access.redhat.com/errata/RHSA-2024:3843RHSA-2024:3843RHSA-2024:3843 https://access.redhat.com/security/cve/CVE-2024-2947CVE-2024-2947CVE-2024-2947https://bugzilla.redhat.com/22716142271614https://errata.almalinux.org/9/ALSA-2024-3843.htmlALSA-2024:3843ALSA-2024:3843  cockpit-storaged-311.2-1.el9_4.noarch.rpm cockpit-packagekit-311.2-1.el9_4.noarch.rpm cockpit-pcp-311.2-1.el9_4.x86_64.rpm cockpit-storaged-311.2-1.el9_4.noarch.rpm cockpit-packagekit-311.2-1.el9_4.noarch.rpm cockpit-pcp-311.2-1.el9_4.x86_64.rpmb| SBBsecurityImportant: firefox security update/https://access.redhat.com/errata/RHSA-2024:3955RHSA-2024:3955RHSA-2024:3955 https://access.redhat.com/security/cve/CVE-2024-5688CVE-2024-5688CVE-2024-5688https://access.redhat.com/security/cve/CVE-2024-5690CVE-2024-5690CVE-2024-5690https://access.redhat.com/security/cve/CVE-2024-5691CVE-2024-5691CVE-2024-5691https://access.redhat.com/security/cve/CVE-2024-5693CVE-2024-5693CVE-2024-5693https://access.redhat.com/security/cve/CVE-2024-5696CVE-2024-5696CVE-2024-5696https://access.redhat.com/security/cve/CVE-2024-5700CVE-2024-5700CVE-2024-5700https://access.redhat.com/security/cve/CVE-2024-5702CVE-2024-5702CVE-2024-5702https://bugzilla.redhat.com/22913942291394https://bugzilla.redhat.com/22913952291395https://bugzilla.redhat.com/22913962291396https://bugzilla.redhat.com/22913972291397https://bugzilla.redhat.com/22913992291399https://bugzilla.redhat.com/22914002291400https://bugzilla.redhat.com/22914012291401https://errata.almalinux.org/9/ALSA-2024-3955.htmlALSA-2024:3955ALSA-2024:3955 7Nfirefox-115.12.0-1.el9_4.alma.1.x86_64.rpmONfirefox-x11-115.12.0-1.el9_4.alma.1.x86_64.rpm7Nfirefox-115.12.0-1.el9_4.alma.1.x86_64.rpmONfirefox-x11-115.12.0-1.el9_4.alma.1.x86_64.rpmv} XBBBBBBsecurityImportant: flatpak security updateD|https://access.redhat.com/errata/RHSA-2024:3959RHSA-2024:3959RHSA-2024:3959 https://access.redhat.com/security/cve/CVE-2024-32462CVE-2024-32462CVE-2024-32462https://bugzilla.redhat.com/22759812275981https://errata.almalinux.org/9/ALSA-2024-3959.htmlALSA-2024:3959ALSA-2024:3959 t0flatpak-selinux-1.12.9-1.el9_4.noarch.rpm0flatpak-1.12.9-1.el9_4.x86_64.rpm0flatpak-libs-1.12.9-1.el9_4.x86_64.rpm0flatpak-session-helper-1.12.9-1.el9_4.x86_64.rpm0flatpak-libs-1.12.9-1.el9_4.i686.rpmt0flatpak-selinux-1.12.9-1.el9_4.noarch.rpm0flatpak-1.12.9-1.el9_4.x86_64.rpm0flatpak-libs-1.12.9-1.el9_4.x86_64.rpm0flatpak-session-helper-1.12.9-1.el9_4.x86_64.rpm0flatpak-libs-1.12.9-1.el9_4.i686.rpmB~ /aBBBBBBBBBBBBsecurityImportant: ghostscript security update@qhttps://access.redhat.com/errata/RHSA-2024:3999RHSA-2024:3999RHSA-2024:3999 https://access.redhat.com/security/cve/CVE-2024-33871CVE-2024-33871CVE-2024-33871https://bugzilla.redhat.com/22835082283508https://errata.almalinux.org/9/ALSA-2024-3999.htmlALSA-2024:3999ALSA-2024:3999 TPlibgs-9.54.0-16.el9_4.x86_64.rpmwPghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpmtPghostscript-9.54.0-16.el9_4.x86_64.rpmvPghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpmMPghostscript-doc-9.54.0-16.el9_4.noarch.rpmxPghostscript-x11-9.54.0-16.el9_4.x86_64.rpmTPlibgs-9.54.0-16.el9_4.i686.rpmuPghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpmTPlibgs-9.54.0-16.el9_4.x86_64.rpmwPghostscript-tools-printing-9.54.0-16.el9_4.x86_64.rpmtPghostscript-9.54.0-16.el9_4.x86_64.rpmvPghostscript-tools-fonts-9.54.0-16.el9_4.x86_64.rpmMPghostscript-doc-9.54.0-16.el9_4.noarch.rpmxPghostscript-x11-9.54.0-16.el9_4.x86_64.rpmTPlibgs-9.54.0-16.el9_4.i686.rpmuPghostscript-tools-dvipdf-9.54.0-16.el9_4.x86_64.rpmЧ 2psecurityImportant: thunderbird security update1https://access.redhat.com/errata/RHSA-2024:4002RHSA-2024:4002RHSA-2024:4002 https://access.redhat.com/security/cve/CVE-2024-5688CVE-2024-5688CVE-2024-5688https://access.redhat.com/security/cve/CVE-2024-5690CVE-2024-5690CVE-2024-5690https://access.redhat.com/security/cve/CVE-2024-5691CVE-2024-5691CVE-2024-5691https://access.redhat.com/security/cve/CVE-2024-5693CVE-2024-5693CVE-2024-5693https://access.redhat.com/security/cve/CVE-2024-5696CVE-2024-5696CVE-2024-5696https://access.redhat.com/security/cve/CVE-2024-5700CVE-2024-5700CVE-2024-5700https://access.redhat.com/security/cve/CVE-2024-5702CVE-2024-5702CVE-2024-5702https://bugzilla.redhat.com/22913942291394https://bugzilla.redhat.com/22913952291395https://bugzilla.redhat.com/22913962291396https://bugzilla.redhat.com/22913972291397https://bugzilla.redhat.com/22913992291399https://bugzilla.redhat.com/22914002291400https://bugzilla.redhat.com/22914012291401https://errata.almalinux.org/9/ALSA-2024-4002.htmlALSA-2024:4002ALSA-2024:4002 9;thunderbird-115.12.1-1.el9_4.alma.1.x86_64.rpm9;thunderbird-115.12.1-1.el9_4.alma.1.x86_64.rpmE 5ssecurityModerate: libreswan security updateGOhttps://access.redhat.com/errata/RHSA-2024:4050RHSA-2024:4050RHSA-2024:4050 https://access.redhat.com/security/cve/CVE-2024-3652CVE-2024-3652CVE-2024-3652https://bugzilla.redhat.com/22744482274448https://errata.almalinux.org/9/ALSA-2024-4050.htmlALSA-2024:4050ALSA-2024:4050 (Nlibreswan-4.12-2.el9_4.1.x86_64.rpm(Nlibreswan-4.12-2.el9_4.1.x86_64.rpmk vBBBBBBBBsecurityImportant: python3.11 security update0https://access.redhat.com/errata/RHSA-2024:4077RHSA-2024:4077RHSA-2024:4077 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://bugzilla.redhat.com/22765182276518https://errata.almalinux.org/9/ALSA-2024-4077.htmlALSA-2024:4077ALSA-2024:4077 python3.11-3.11.7-1.el9_4.1.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.1.i686.rpm_python3.11-libs-3.11.7-1.el9_4.1.i686.rpm_python3.11-libs-3.11.7-1.el9_4.1.x86_64.rpmpython3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.1.x86_64.rpmpython3.11-3.11.7-1.el9_4.1.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.1.i686.rpm_python3.11-libs-3.11.7-1.el9_4.1.i686.rpm_python3.11-libs-3.11.7-1.el9_4.1.x86_64.rpmpython3.11-tkinter-3.11.7-1.el9_4.1.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.1.x86_64.rpmI ABBBBsecurityImportant: python3.9 security updateFhttps://access.redhat.com/errata/RHSA-2024:4078RHSA-2024:4078RHSA-2024:4078 https://access.redhat.com/security/cve/CVE-2023-6597CVE-2023-6597CVE-2023-6597https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://bugzilla.redhat.com/22765182276518https://bugzilla.redhat.com/22765252276525https://errata.almalinux.org/9/ALSA-2024-4078.htmlALSA-2024:4078ALSA-2024:4078 Rdpython3-devel-3.9.18-3.el9_4.1.i686.rpmgdpython-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm1dpython3-tkinter-3.9.18-3.el9_4.1.x86_64.rpmRdpython3-devel-3.9.18-3.el9_4.1.x86_64.rpmRdpython3-devel-3.9.18-3.el9_4.1.i686.rpmgdpython-unversioned-command-3.9.18-3.el9_4.1.noarch.rpm1dpython3-tkinter-3.9.18-3.el9_4.1.x86_64.rpmRdpython3-devel-3.9.18-3.el9_4.1.x86_64.rpm' HBBBBBBBBBBBBBBBBBBsecurityImportant: git security update[ https://access.redhat.com/errata/RHSA-2024:4083RHSA-2024:4083RHSA-2024:4083 https://access.redhat.com/security/cve/CVE-2024-32002CVE-2024-32002CVE-2024-32002https://access.redhat.com/security/cve/CVE-2024-32004CVE-2024-32004CVE-2024-32004https://access.redhat.com/security/cve/CVE-2024-32020CVE-2024-32020CVE-2024-32020https://access.redhat.com/security/cve/CVE-2024-32021CVE-2024-32021CVE-2024-32021https://access.redhat.com/security/cve/CVE-2024-32465CVE-2024-32465CVE-2024-32465https://bugzilla.redhat.com/22804212280421https://bugzilla.redhat.com/22804282280428https://bugzilla.redhat.com/22804462280446https://bugzilla.redhat.com/22804662280466https://bugzilla.redhat.com/22804842280484https://errata.almalinux.org/9/ALSA-2024-4083.htmlALSA-2024:4083ALSA-2024:4083 perl-Git-2.43.5-1.el9_4.noarch.rpm}git-instaweb-2.43.5-1.el9_4.noarch.rpmgit-subtree-2.43.5-1.el9_4.x86_64.rpmgit-daemon-2.43.5-1.el9_4.x86_64.rpm{git-email-2.43.5-1.el9_4.noarch.rpm~git-svn-2.43.5-1.el9_4.noarch.rpmgit-credential-libsecret-2.43.5-1.el9_4.x86_64.rpmzgit-core-doc-2.43.5-1.el9_4.noarch.rpm perl-Git-SVN-2.43.5-1.el9_4.noarch.rpmgitweb-2.43.5-1.el9_4.noarch.rpmgit-core-2.43.5-1.el9_4.x86_64.rpm|git-gui-2.43.5-1.el9_4.noarch.rpmygit-all-2.43.5-1.el9_4.noarch.rpmgitk-2.43.5-1.el9_4.noarch.rpmgit-2.43.5-1.el9_4.x86_64.rpmperl-Git-2.43.5-1.el9_4.noarch.rpm}git-instaweb-2.43.5-1.el9_4.noarch.rpmgit-subtree-2.43.5-1.el9_4.x86_64.rpmgit-daemon-2.43.5-1.el9_4.x86_64.rpm{git-email-2.43.5-1.el9_4.noarch.rpm~git-svn-2.43.5-1.el9_4.noarch.rpmgit-credential-libsecret-2.43.5-1.el9_4.x86_64.rpmzgit-core-doc-2.43.5-1.el9_4.noarch.rpm perl-Git-SVN-2.43.5-1.el9_4.noarch.rpmgitweb-2.43.5-1.el9_4.noarch.rpmgit-core-2.43.5-1.el9_4.x86_64.rpm|git-gui-2.43.5-1.el9_4.noarch.rpmygit-all-2.43.5-1.el9_4.noarch.rpmgitk-2.43.5-1.el9_4.noarch.rpmgit-2.43.5-1.el9_4.x86_64.rpmT ']BBBBBBBBsecurityImportant: pki-core security updatez https://access.redhat.com/errata/RHSA-2024:4165RHSA-2024:4165RHSA-2024:4165 https://access.redhat.com/security/cve/CVE-2023-4727CVE-2023-4727CVE-2023-4727https://bugzilla.redhat.com/22322182232218https://errata.almalinux.org/9/ALSA-2024-4165.htmlALSA-2024:4165ALSA-2024:4165 $ idm-pki-est-11.5.0-2.el9_4.alma.1.noarch.rpm# idm-pki-ca-11.5.0-2.el9_4.alma.1.noarch.rpmK python3-idm-pki-11.5.0-2.el9_4.alma.1.noarch.rpm' idm-pki-server-11.5.0-2.el9_4.alma.1.noarch.rpm! idm-pki-acme-11.5.0-2.el9_4.alma.1.noarch.rpm( idm-pki-tools-11.5.0-2.el9_4.alma.1.x86_64.rpm& idm-pki-kra-11.5.0-2.el9_4.alma.1.noarch.rpm" idm-pki-base-11.5.0-2.el9_4.alma.1.noarch.rpm% idm-pki-java-11.5.0-2.el9_4.alma.1.noarch.rpm $ idm-pki-est-11.5.0-2.el9_4.alma.1.noarch.rpm# idm-pki-ca-11.5.0-2.el9_4.alma.1.noarch.rpmK python3-idm-pki-11.5.0-2.el9_4.alma.1.noarch.rpm' idm-pki-server-11.5.0-2.el9_4.alma.1.noarch.rpm! idm-pki-acme-11.5.0-2.el9_4.alma.1.noarch.rpm( idm-pki-tools-11.5.0-2.el9_4.alma.1.x86_64.rpm& idm-pki-kra-11.5.0-2.el9_4.alma.1.noarch.rpm" idm-pki-base-11.5.0-2.el9_4.alma.1.noarch.rpm% idm-pki-java-11.5.0-2.el9_4.alma.1.noarch.rpm) 2hBBBBBBBBsecurityModerate: golang security updateMhttps://access.redhat.com/errata/RHSA-2024:4212RHSA-2024:4212RHSA-2024:4212 https://access.redhat.com/security/cve/CVE-2024-24789CVE-2024-24789CVE-2024-24789https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://bugzilla.redhat.com/22926682292668https://bugzilla.redhat.com/22927872292787https://errata.almalinux.org/9/ALSA-2024-4212.htmlALSA-2024:4212ALSA-2024:4212 ngolang-src-1.21.11-1.el9_4.noarch.rpmlgolang-docs-1.21.11-1.el9_4.noarch.rpm@golang-1.21.11-1.el9_4.x86_64.rpmogolang-tests-1.21.11-1.el9_4.noarch.rpmmgolang-misc-1.21.11-1.el9_4.noarch.rpmEgo-toolset-1.21.11-1.el9_4.x86_64.rpmAgolang-bin-1.21.11-1.el9_4.x86_64.rpmngolang-src-1.21.11-1.el9_4.noarch.rpmlgolang-docs-1.21.11-1.el9_4.noarch.rpm@golang-1.21.11-1.el9_4.x86_64.rpmogolang-tests-1.21.11-1.el9_4.noarch.rpmmgolang-misc-1.21.11-1.el9_4.noarch.rpmEgo-toolset-1.21.11-1.el9_4.x86_64.rpmAgolang-bin-1.21.11-1.el9_4.x86_64.rpm^ sBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qemu-kvm security updateQrhttps://access.redhat.com/errata/RHSA-2024:4278RHSA-2024:4278RHSA-2024:4278 https://access.redhat.com/security/cve/CVE-2024-4467CVE-2024-4467CVE-2024-4467https://bugzilla.redhat.com/22788752278875https://errata.almalinux.org/9/ALSA-2024-4278.htmlALSA-2024:4278ALSA-2024:4278 \qemu-kvm-device-usb-host-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-common-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-docs-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.4.x86_64.rpm \qemu-kvm-8.2.0-11.el9_4.4.x86_64.rpm\qemu-pr-helper-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-block-curl-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-audio-pa-8.2.0-11.el9_4.4.x86_64.rpm \qemu-img-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-core-8.2.0-11.el9_4.4.x86_64.rpm|\qemu-kvm-block-blkio-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-tools-8.2.0-11.el9_4.4.x86_64.rpm \qemu-guest-agent-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-block-rbd-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-ui-opengl-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-device-usb-host-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-common-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-docs-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-device-display-virtio-vga-8.2.0-11.el9_4.4.x86_64.rpm \qemu-kvm-8.2.0-11.el9_4.4.x86_64.rpm\qemu-pr-helper-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-block-curl-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-audio-pa-8.2.0-11.el9_4.4.x86_64.rpm \qemu-img-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-device-usb-redirect-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-core-8.2.0-11.el9_4.4.x86_64.rpm|\qemu-kvm-block-blkio-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-device-display-virtio-gpu-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-ui-egl-headless-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-device-display-virtio-gpu-pci-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-tools-8.2.0-11.el9_4.4.x86_64.rpm \qemu-guest-agent-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-block-rbd-8.2.0-11.el9_4.4.x86_64.rpm\qemu-kvm-ui-opengl-8.2.0-11.el9_4.4.x86_64.rpm ZBBsecurityImportant: openssh security updateCshttps://access.redhat.com/errata/RHSA-2024:4312RHSA-2024:4312RHSA-2024:4312 https://access.redhat.com/security/cve/CVE-2024-6387CVE-2024-6387CVE-2024-6387https://bugzilla.redhat.com/22946042294604https://errata.almalinux.org/9/ALSA-2024-4312.htmlALSA-2024:4312ALSA-2024:4312 ppam_ssh_agent_auth-0.10.4-5.38.el9_4.1.x86_64.rpmopenssh-askpass-8.7p1-38.el9_4.1.x86_64.rpmppam_ssh_agent_auth-0.10.4-5.38.el9_4.1.x86_64.rpmopenssh-askpass-8.7p1-38.el9_4.1.x86_64.rpm 0_BBBBBBBBBBBBBBBsecurityModerate: kernel security and bug fix update6https://access.redhat.com/errata/RHSA-2024:4349RHSA-2024:4349RHSA-2024:4349 https://access.redhat.com/security/cve/CVE-2021-47400CVE-2021-47400CVE-2021-47400https://access.redhat.com/security/cve/CVE-2023-52626CVE-2023-52626CVE-2023-52626https://access.redhat.com/security/cve/CVE-2023-52667CVE-2023-52667CVE-2023-52667https://access.redhat.com/security/cve/CVE-2024-26801CVE-2024-26801CVE-2024-26801https://access.redhat.com/security/cve/CVE-2024-26974CVE-2024-26974CVE-2024-26974https://access.redhat.com/security/cve/CVE-2024-27393CVE-2024-27393CVE-2024-27393https://access.redhat.com/security/cve/CVE-2024-35870CVE-2024-35870CVE-2024-35870https://access.redhat.com/security/cve/CVE-2024-35960CVE-2024-35960CVE-2024-35960https://bugzilla.redhat.com/22716802271680https://bugzilla.redhat.com/22734292273429https://bugzilla.redhat.com/22783542278354https://bugzilla.redhat.com/22807452280745https://bugzilla.redhat.com/22813502281350https://bugzilla.redhat.com/22817402281740https://bugzilla.redhat.com/22819202281920https://bugzilla.redhat.com/22823362282336https://errata.almalinux.org/9/ALSA-2024-4349.htmlALSA-2024:4349ALSA-2024:4349 !>kernel-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm*>rv-5.14.0-427.24.1.el9_4.x86_64.rpm)>rtla-5.14.0-427.24.1.el9_4.x86_64.rpm%>perf-5.14.0-427.24.1.el9_4.x86_64.rpm">kernel-debug-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm(>kernel-headers-5.14.0-427.24.1.el9_4.x86_64.rpm>kernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm$>kernel-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm#>kernel-devel-5.14.0-427.24.1.el9_4.x86_64.rpm !>kernel-debug-devel-5.14.0-427.24.1.el9_4.x86_64.rpm*>rv-5.14.0-427.24.1.el9_4.x86_64.rpm)>rtla-5.14.0-427.24.1.el9_4.x86_64.rpm%>perf-5.14.0-427.24.1.el9_4.x86_64.rpm">kernel-debug-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm(>kernel-headers-5.14.0-427.24.1.el9_4.x86_64.rpm>kernel-doc-5.14.0-427.24.1.el9_4.noarch.rpm$>kernel-devel-matched-5.14.0-427.24.1.el9_4.x86_64.rpm#>kernel-devel-5.14.0-427.24.1.el9_4.x86_64.rpmx  5qBBsecurityImportant: buildah security updateD https://access.redhat.com/errata/RHSA-2024:4371RHSA-2024:4371RHSA-2024:4371 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4371.htmlALSA-2024:4371ALSA-2024:4371 <buildah-1.33.7-3.el9_4.x86_64.rpm=buildah-tests-1.33.7-3.el9_4.x86_64.rpm<buildah-1.33.7-3.el9_4.x86_64.rpm=buildah-tests-1.33.7-3.el9_4.x86_64.rpm.  ?vBBBBBBBsecurityImportant: podman security updateOuhttps://access.redhat.com/errata/RHSA-2024:4378RHSA-2024:4378RHSA-2024:4378 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4378.htmlALSA-2024:4378ALSA-2024:4378 /podman-remote-4.9.4-5.el9_4.x86_64.rpm0podman-tests-4.9.4-5.el9_4.x86_64.rpm.podman-plugins-4.9.4-5.el9_4.x86_64.rpm-podman-4.9.4-5.el9_4.x86_64.rpmfpodman-docker-4.9.4-5.el9_4.noarch.rpm/podman-remote-4.9.4-5.el9_4.x86_64.rpm0podman-tests-4.9.4-5.el9_4.x86_64.rpm.podman-plugins-4.9.4-5.el9_4.x86_64.rpm-podman-4.9.4-5.el9_4.x86_64.rpmfpodman-docker-4.9.4-5.el9_4.noarch.rpmM  @securityImportant: gvisor-tap-vsock security updateDGhttps://access.redhat.com/errata/RHSA-2024:4379RHSA-2024:4379RHSA-2024:4379 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4379.htmlALSA-2024:4379ALSA-2024:4379 wsgvisor-tap-vsock-0.7.3-4.el9_4.alma.1.x86_64.rpmwsgvisor-tap-vsock-0.7.3-4.el9_4.alma.1.x86_64.rpmF  CBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security update https://access.redhat.com/errata/RHSA-2024:4422RHSA-2024:4422RHSA-2024:4422 https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-4422.htmlALSA-2024:4422ALSA-2024:4422 _'fence-agents-virsh-4.10.0-62.el9_4.4.alma.1.noarch.rpm'fence-virtd-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-virtd-serial-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-virtd-tcp-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-agents-kubevirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-virtd-multicast-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-virtd-libvirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm^'fence-agents-ibm-vpc-4.10.0-62.el9_4.4.alma.1.noarch.rpm'fence-virtd-cpg-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-agents-compute-4.10.0-62.el9_4.4.alma.1.x86_64.rpm]'fence-agents-ibm-powervs-4.10.0-62.el9_4.4.alma.1.noarch.rpm\'fence-agents-common-4.10.0-62.el9_4.4.alma.1.noarch.rpm'fence-virt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm _'fence-agents-virsh-4.10.0-62.el9_4.4.alma.1.noarch.rpm'fence-virtd-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-virtd-serial-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-virtd-tcp-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-agents-kubevirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-virtd-multicast-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-virtd-libvirt-4.10.0-62.el9_4.4.alma.1.x86_64.rpm^'fence-agents-ibm-vpc-4.10.0-62.el9_4.4.alma.1.noarch.rpm'fence-virtd-cpg-4.10.0-62.el9_4.4.alma.1.x86_64.rpm'fence-agents-compute-4.10.0-62.el9_4.4.alma.1.x86_64.rpm]'fence-agents-ibm-powervs-4.10.0-62.el9_4.4.alma.1.noarch.rpm\'fence-agents-common-4.10.0-62.el9_4.4.alma.1.noarch.rpm'fence-virt-4.10.0-62.el9_4.4.alma.1.x86_64.rpmL  *ZBBBBBBBBBBBBBBsecurityModerate: dotnet6.0 security updateJhttps://access.redhat.com/errata/RHSA-2024:4439RHSA-2024:4439RHSA-2024:4439 https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4439.htmlALSA-2024:4439ALSA-2024:4439 !=aspnetcore-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpm"=dotnet-apphost-pack-6.0-6.0.32-1.el9_4.x86_64.rpm$=dotnet-runtime-6.0-6.0.32-1.el9_4.x86_64.rpm#=dotnet-hostfxr-6.0-6.0.32-1.el9_4.x86_64.rpm'+dotnet-templates-6.0-6.0.132-1.el9_4.x86_64.rpm&=dotnet-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpm =aspnetcore-runtime-6.0-6.0.32-1.el9_4.x86_64.rpm%+dotnet-sdk-6.0-6.0.132-1.el9_4.x86_64.rpm!=aspnetcore-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpm"=dotnet-apphost-pack-6.0-6.0.32-1.el9_4.x86_64.rpm$=dotnet-runtime-6.0-6.0.32-1.el9_4.x86_64.rpm#=dotnet-hostfxr-6.0-6.0.32-1.el9_4.x86_64.rpm'+dotnet-templates-6.0-6.0.132-1.el9_4.x86_64.rpm&=dotnet-targeting-pack-6.0-6.0.32-1.el9_4.x86_64.rpm =aspnetcore-runtime-6.0-6.0.32-1.el9_4.x86_64.rpm%+dotnet-sdk-6.0-6.0.132-1.el9_4.x86_64.rpmZ kBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: dotnet8.0 security updateg&https://access.redhat.com/errata/RHSA-2024:4450RHSA-2024:4450RHSA-2024:4450 https://access.redhat.com/security/cve/CVE-2024-30105CVE-2024-30105CVE-2024-30105https://access.redhat.com/security/cve/CVE-2024-35264CVE-2024-35264CVE-2024-35264https://access.redhat.com/security/cve/CVE-2024-38095CVE-2024-38095CVE-2024-38095https://bugzilla.redhat.com/22953202295320https://bugzilla.redhat.com/22953212295321https://bugzilla.redhat.com/22953232295323https://errata.almalinux.org/9/ALSA-2024-4450.htmlALSA-2024:4450ALSA-2024:4450 W/dotnet-hostfxr-8.0-8.0.7-1.el9_4.x86_64.rpmK/dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpmD/aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm/dotnet-host-8.0.7-1.el9_4.x86_64.rpmV/dotnet-apphost-pack-8.0-8.0.7-1.el9_4.x86_64.rpmX/dotnet-runtime-8.0-8.0.7-1.el9_4.x86_64.rpmZ/dotnet-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm 7netstandard-targeting-pack-2.1-8.0.107-1.el9_4.x86_64.rpmY7dotnet-sdk-8.0-8.0.107-1.el9_4.x86_64.rpmU/aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpmT/aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm[7dotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpmL7dotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm W/dotnet-hostfxr-8.0-8.0.7-1.el9_4.x86_64.rpmK/dotnet-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpmD/aspnetcore-runtime-dbg-8.0-8.0.7-1.el9_4.x86_64.rpm/dotnet-host-8.0.7-1.el9_4.x86_64.rpmV/dotnet-apphost-pack-8.0-8.0.7-1.el9_4.x86_64.rpmX/dotnet-runtime-8.0-8.0.7-1.el9_4.x86_64.rpmZ/dotnet-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpm 7netstandard-targeting-pack-2.1-8.0.107-1.el9_4.x86_64.rpmY7dotnet-sdk-8.0-8.0.107-1.el9_4.x86_64.rpmU/aspnetcore-targeting-pack-8.0-8.0.7-1.el9_4.x86_64.rpmT/aspnetcore-runtime-8.0-8.0.7-1.el9_4.x86_64.rpm[7dotnet-templates-8.0-8.0.107-1.el9_4.x86_64.rpmL7dotnet-sdk-dbg-8.0-8.0.107-1.el9_4.x86_64.rpm FBBsecurityModerate: openssh security update https://access.redhat.com/errata/RHSA-2024:4457RHSA-2024:4457RHSA-2024:4457 https://access.redhat.com/security/cve/CVE-2024-6409CVE-2024-6409CVE-2024-6409https://bugzilla.redhat.com/22950852295085https://errata.almalinux.org/9/ALSA-2024-4457.htmlALSA-2024:4457ALSA-2024:4457 qpam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpmopenssh-askpass-8.7p1-38.el9_4.4.x86_64.rpmqpam_ssh_agent_auth-0.10.4-5.38.el9_4.4.x86_64.rpmopenssh-askpass-8.7p1-38.el9_4.4.x86_64.rpmߴ KBBsecurityImportant: firefox security update4https://access.redhat.com/errata/RHSA-2024:4500RHSA-2024:4500RHSA-2024:4500 https://access.redhat.com/security/cve/CVE-2024-6601CVE-2024-6601CVE-2024-6601https://access.redhat.com/security/cve/CVE-2024-6603CVE-2024-6603CVE-2024-6603https://access.redhat.com/security/cve/CVE-2024-6604CVE-2024-6604CVE-2024-6604https://bugzilla.redhat.com/22966362296636https://bugzilla.redhat.com/22966382296638https://bugzilla.redhat.com/22966392296639https://errata.almalinux.org/9/ALSA-2024-4500.htmlALSA-2024:4500ALSA-2024:4500 7@firefox-115.13.0-3.el9_4.alma.1.x86_64.rpmO@firefox-x11-115.13.0-3.el9_4.alma.1.x86_64.rpm7@firefox-115.13.0-3.el9_4.alma.1.x86_64.rpmO@firefox-x11-115.13.0-3.el9_4.alma.1.x86_64.rpm߱m PBBsecurityImportant: skopeo security updateGNhttps://access.redhat.com/errata/RHSA-2024:4502RHSA-2024:4502RHSA-2024:4502 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4502.htmlALSA-2024:4502ALSA-2024:4502 ;skopeo-1.14.3-3.el9_4.x86_64.rpm<skopeo-tests-1.14.3-3.el9_4.x86_64.rpm;skopeo-1.14.3-3.el9_4.x86_64.rpm<skopeo-tests-1.14.3-3.el9_4.x86_64.rpm߱  !UBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security updatePhttps://access.redhat.com/errata/RHSA-2024:4563RHSA-2024:4563RHSA-2024:4563 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4563.htmlALSA-2024:4563ALSA-2024:4563 f^java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9.x86_64.rpmd^java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9.x86_64.rpmb^java-1.8.0-openjdk-1.8.0.422.b05-2.el9.x86_64.rpmC^java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9.noarch.rpme^java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9.x86_64.rpmB^java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9.noarch.rpmc^java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9.x86_64.rpmf^java-1.8.0-openjdk-src-1.8.0.422.b05-2.el9.x86_64.rpmd^java-1.8.0-openjdk-devel-1.8.0.422.b05-2.el9.x86_64.rpmb^java-1.8.0-openjdk-1.8.0.422.b05-2.el9.x86_64.rpmC^java-1.8.0-openjdk-javadoc-zip-1.8.0.422.b05-2.el9.noarch.rpme^java-1.8.0-openjdk-headless-1.8.0.422.b05-2.el9.x86_64.rpmB^java-1.8.0-openjdk-javadoc-1.8.0.422.b05-2.el9.noarch.rpmc^java-1.8.0-openjdk-demo-1.8.0.422.b05-2.el9.x86_64.rpmR 4bBBBBBBBBBBBBBBBBsecurityImportant: java-11-openjdk security updateeOhttps://access.redhat.com/errata/RHSA-2024:4567RHSA-2024:4567RHSA-2024:4567 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21144CVE-2024-21144CVE-2024-21144https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979642297964https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4567.htmlALSA-2024:4567ALSA-2024:4567 *java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9.x86_64.rpm'java-11-openjdk-devel-11.0.24.0.8-2.el9.x86_64.rpm&java-11-openjdk-demo-11.0.24.0.8-2.el9.x86_64.rpm%java-11-openjdk-11.0.24.0.8-2.el9.x86_64.rpm(java-11-openjdk-headless-11.0.24.0.8-2.el9.x86_64.rpm+java-11-openjdk-jmods-11.0.24.0.8-2.el9.x86_64.rpm-java-11-openjdk-static-libs-11.0.24.0.8-2.el9.x86_64.rpm)java-11-openjdk-javadoc-11.0.24.0.8-2.el9.x86_64.rpm,java-11-openjdk-src-11.0.24.0.8-2.el9.x86_64.rpm *java-11-openjdk-javadoc-zip-11.0.24.0.8-2.el9.x86_64.rpm'java-11-openjdk-devel-11.0.24.0.8-2.el9.x86_64.rpm&java-11-openjdk-demo-11.0.24.0.8-2.el9.x86_64.rpm%java-11-openjdk-11.0.24.0.8-2.el9.x86_64.rpm(java-11-openjdk-headless-11.0.24.0.8-2.el9.x86_64.rpm+java-11-openjdk-jmods-11.0.24.0.8-2.el9.x86_64.rpm-java-11-openjdk-static-libs-11.0.24.0.8-2.el9.x86_64.rpm)java-11-openjdk-javadoc-11.0.24.0.8-2.el9.x86_64.rpm,java-11-openjdk-src-11.0.24.0.8-2.el9.x86_64.rpmn uBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update4i https://access.redhat.com/errata/RHSA-2024:4568RHSA-2024:4568RHSA-2024:4568 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4568.htmlALSA-2024:4568ALSA-2024:4568 +java-17-openjdk-headless-17.0.12.0.7-2.el9.x86_64.rpm0java-17-openjdk-static-libs-17.0.12.0.7-2.el9.x86_64.rpm(java-17-openjdk-17.0.12.0.7-2.el9.x86_64.rpm*java-17-openjdk-devel-17.0.12.0.7-2.el9.x86_64.rpm.java-17-openjdk-jmods-17.0.12.0.7-2.el9.x86_64.rpm,java-17-openjdk-javadoc-17.0.12.0.7-2.el9.x86_64.rpm)java-17-openjdk-demo-17.0.12.0.7-2.el9.x86_64.rpm/java-17-openjdk-src-17.0.12.0.7-2.el9.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9.x86_64.rpm +java-17-openjdk-headless-17.0.12.0.7-2.el9.x86_64.rpm0java-17-openjdk-static-libs-17.0.12.0.7-2.el9.x86_64.rpm(java-17-openjdk-17.0.12.0.7-2.el9.x86_64.rpm*java-17-openjdk-devel-17.0.12.0.7-2.el9.x86_64.rpm.java-17-openjdk-jmods-17.0.12.0.7-2.el9.x86_64.rpm,java-17-openjdk-javadoc-17.0.12.0.7-2.el9.x86_64.rpm)java-17-openjdk-demo-17.0.12.0.7-2.el9.x86_64.rpm/java-17-openjdk-src-17.0.12.0.7-2.el9.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.12.0.7-2.el9.x86_64.rpmh HBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updatei https://access.redhat.com/errata/RHSA-2024:4573RHSA-2024:4573RHSA-2024:4573 https://access.redhat.com/security/cve/CVE-2024-21131CVE-2024-21131CVE-2024-21131https://access.redhat.com/security/cve/CVE-2024-21138CVE-2024-21138CVE-2024-21138https://access.redhat.com/security/cve/CVE-2024-21140CVE-2024-21140CVE-2024-21140https://access.redhat.com/security/cve/CVE-2024-21145CVE-2024-21145CVE-2024-21145https://access.redhat.com/security/cve/CVE-2024-21147CVE-2024-21147CVE-2024-21147https://bugzilla.redhat.com/22979612297961https://bugzilla.redhat.com/22979622297962https://bugzilla.redhat.com/22979632297963https://bugzilla.redhat.com/22979762297976https://bugzilla.redhat.com/22979772297977https://errata.almalinux.org/9/ALSA-2024-4573.htmlALSA-2024:4573ALSA-2024:4573 3%java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.alma.1.x86_64.rpm4%java-21-openjdk-jmods-21.0.4.0.7-1.el9.alma.1.x86_64.rpm5%java-21-openjdk-src-21.0.4.0.7-1.el9.alma.1.x86_64.rpm6%java-21-openjdk-static-libs-21.0.4.0.7-1.el9.alma.1.x86_64.rpm2%java-21-openjdk-javadoc-21.0.4.0.7-1.el9.alma.1.x86_64.rpm.%java-21-openjdk-21.0.4.0.7-1.el9.alma.1.x86_64.rpm0%java-21-openjdk-devel-21.0.4.0.7-1.el9.alma.1.x86_64.rpm/%java-21-openjdk-demo-21.0.4.0.7-1.el9.alma.1.x86_64.rpm1%java-21-openjdk-headless-21.0.4.0.7-1.el9.alma.1.x86_64.rpm 3%java-21-openjdk-javadoc-zip-21.0.4.0.7-1.el9.alma.1.x86_64.rpm4%java-21-openjdk-jmods-21.0.4.0.7-1.el9.alma.1.x86_64.rpm5%java-21-openjdk-src-21.0.4.0.7-1.el9.alma.1.x86_64.rpm6%java-21-openjdk-static-libs-21.0.4.0.7-1.el9.alma.1.x86_64.rpm2%java-21-openjdk-javadoc-21.0.4.0.7-1.el9.alma.1.x86_64.rpm.%java-21-openjdk-21.0.4.0.7-1.el9.alma.1.x86_64.rpm0%java-21-openjdk-devel-21.0.4.0.7-1.el9.alma.1.x86_64.rpm/%java-21-openjdk-demo-21.0.4.0.7-1.el9.alma.1.x86_64.rpm1%java-21-openjdk-headless-21.0.4.0.7-1.el9.alma.1.x86_64.rpm ,[BBBBBBBBBBBBBBBsecurityImportant: kernel security update$https://access.redhat.com/errata/RHSA-2024:4583RHSA-2024:4583RHSA-2024:4583 https://access.redhat.com/security/cve/CVE-2021-47548CVE-2021-47548CVE-2021-47548https://access.redhat.com/security/cve/CVE-2021-47596CVE-2021-47596CVE-2021-47596https://access.redhat.com/security/cve/CVE-2022-48627CVE-2022-48627CVE-2022-48627https://access.redhat.com/security/cve/CVE-2023-52638CVE-2023-52638CVE-2023-52638https://access.redhat.com/security/cve/CVE-2024-26783CVE-2024-26783CVE-2024-26783https://access.redhat.com/security/cve/CVE-2024-26858CVE-2024-26858CVE-2024-26858https://access.redhat.com/security/cve/CVE-2024-27397CVE-2024-27397CVE-2024-27397https://access.redhat.com/security/cve/CVE-2024-27435CVE-2024-27435CVE-2024-27435https://access.redhat.com/security/cve/CVE-2024-35958CVE-2024-35958CVE-2024-35958https://access.redhat.com/security/cve/CVE-2024-36270CVE-2024-36270CVE-2024-36270https://access.redhat.com/security/cve/CVE-2024-36886CVE-2024-36886CVE-2024-36886https://access.redhat.com/security/cve/CVE-2024-36904CVE-2024-36904CVE-2024-36904https://access.redhat.com/security/cve/CVE-2024-36957CVE-2024-36957CVE-2024-36957https://access.redhat.com/security/cve/CVE-2024-38543CVE-2024-38543CVE-2024-38543https://access.redhat.com/security/cve/CVE-2024-38586CVE-2024-38586CVE-2024-38586https://access.redhat.com/security/cve/CVE-2024-38593CVE-2024-38593CVE-2024-38593https://access.redhat.com/security/cve/CVE-2024-38663CVE-2024-38663CVE-2024-38663https://bugzilla.redhat.com/22675092267509https://bugzilla.redhat.com/22730822273082https://bugzilla.redhat.com/22734662273466https://bugzilla.redhat.com/22757352275735https://bugzilla.redhat.com/22772382277238https://bugzilla.redhat.com/22804342280434https://bugzilla.redhat.com/22811312281131https://bugzilla.redhat.com/22819252281925https://bugzilla.redhat.com/22834012283401https://bugzilla.redhat.com/22845412284541https://bugzilla.redhat.com/22845812284581https://bugzilla.redhat.com/22932302293230https://bugzilla.redhat.com/22933802293380https://bugzilla.redhat.com/22934022293402https://bugzilla.redhat.com/22934562293456https://bugzilla.redhat.com/22936532293653https://bugzilla.redhat.com/22942252294225https://errata.almalinux.org/9/ALSA-2024-4583.htmlALSA-2024:4583ALSA-2024:4583 #?kernel-devel-5.14.0-427.26.1.el9_4.x86_64.rpm*?rv-5.14.0-427.26.1.el9_4.x86_64.rpm?kernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm!?kernel-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm)?rtla-5.14.0-427.26.1.el9_4.x86_64.rpm"?kernel-debug-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm%?perf-5.14.0-427.26.1.el9_4.x86_64.rpm(?kernel-headers-5.14.0-427.26.1.el9_4.x86_64.rpm$?kernel-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm #?kernel-devel-5.14.0-427.26.1.el9_4.x86_64.rpm*?rv-5.14.0-427.26.1.el9_4.x86_64.rpm?kernel-doc-5.14.0-427.26.1.el9_4.noarch.rpm!?kernel-debug-devel-5.14.0-427.26.1.el9_4.x86_64.rpm)?rtla-5.14.0-427.26.1.el9_4.x86_64.rpm"?kernel-debug-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm%?perf-5.14.0-427.26.1.el9_4.x86_64.rpm(?kernel-headers-5.14.0-427.26.1.el9_4.x86_64.rpm$?kernel-devel-matched-5.14.0-427.26.1.el9_4.x86_64.rpm# mBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: qt5-qtbase security update @https://access.redhat.com/errata/RHSA-2024:4623RHSA-2024:4623RHSA-2024:4623 https://access.redhat.com/security/cve/CVE-2024-39936CVE-2024-39936CVE-2024-39936https://bugzilla.redhat.com/22958672295867https://errata.almalinux.org/9/ALSA-2024-4623.htmlALSA-2024:4623ALSA-2024:4623 &~qt5-qtbase-odbc-5.15.9-10.el9_4.i686.rpm(~qt5-qtbase-private-devel-5.15.9-10.el9_4.i686.rpm&~qt5-qtbase-odbc-5.15.9-10.el9_4.x86_64.rpm#~qt5-qtbase-examples-5.15.9-10.el9_4.x86_64.rpm%~qt5-qtbase-mysql-5.15.9-10.el9_4.i686.rpm%~qt5-qtbase-mysql-5.15.9-10.el9_4.x86_64.rpm'~qt5-qtbase-postgresql-5.15.9-10.el9_4.i686.rpm"~qt5-qtbase-devel-5.15.9-10.el9_4.i686.rpm!~qt5-qtbase-5.15.9-10.el9_4.x86_64.rpm'~qt5-qtbase-postgresql-5.15.9-10.el9_4.x86_64.rpm"~qt5-qtbase-devel-5.15.9-10.el9_4.x86_64.rpm$~qt5-qtbase-gui-5.15.9-10.el9_4.i686.rpm$~qt5-qtbase-gui-5.15.9-10.el9_4.x86_64.rpm#~qt5-qtbase-examples-5.15.9-10.el9_4.i686.rpm!~qt5-qtbase-5.15.9-10.el9_4.i686.rpm~qt5-qtbase-common-5.15.9-10.el9_4.noarch.rpm(~qt5-qtbase-private-devel-5.15.9-10.el9_4.x86_64.rpm&~qt5-qtbase-odbc-5.15.9-10.el9_4.i686.rpm(~qt5-qtbase-private-devel-5.15.9-10.el9_4.i686.rpm&~qt5-qtbase-odbc-5.15.9-10.el9_4.x86_64.rpm#~qt5-qtbase-examples-5.15.9-10.el9_4.x86_64.rpm%~qt5-qtbase-mysql-5.15.9-10.el9_4.i686.rpm%~qt5-qtbase-mysql-5.15.9-10.el9_4.x86_64.rpm'~qt5-qtbase-postgresql-5.15.9-10.el9_4.i686.rpm"~qt5-qtbase-devel-5.15.9-10.el9_4.i686.rpm!~qt5-qtbase-5.15.9-10.el9_4.x86_64.rpm'~qt5-qtbase-postgresql-5.15.9-10.el9_4.x86_64.rpm"~qt5-qtbase-devel-5.15.9-10.el9_4.x86_64.rpm$~qt5-qtbase-gui-5.15.9-10.el9_4.i686.rpm$~qt5-qtbase-gui-5.15.9-10.el9_4.x86_64.rpm#~qt5-qtbase-examples-5.15.9-10.el9_4.i686.rpm!~qt5-qtbase-5.15.9-10.el9_4.i686.rpm~qt5-qtbase-common-5.15.9-10.el9_4.noarch.rpm(~qt5-qtbase-private-devel-5.15.9-10.el9_4.x86_64.rpm GsecurityImportant: thunderbird security update`https://access.redhat.com/errata/RHSA-2024:4624RHSA-2024:4624RHSA-2024:4624 https://access.redhat.com/security/cve/CVE-2024-6601CVE-2024-6601CVE-2024-6601https://access.redhat.com/security/cve/CVE-2024-6603CVE-2024-6603CVE-2024-6603https://access.redhat.com/security/cve/CVE-2024-6604CVE-2024-6604CVE-2024-6604https://bugzilla.redhat.com/22966362296636https://bugzilla.redhat.com/22966382296638https://bugzilla.redhat.com/22966392296639https://errata.almalinux.org/9/ALSA-2024-4624.htmlALSA-2024:4624ALSA-2024:4624 9@thunderbird-115.13.0-3.el9_4.alma.1.x86_64.rpm9@thunderbird-115.13.0-3.el9_4.alma.1.x86_64.rpm1 JBBBBBBBBBBBBBBBBBBsecurityImportant: httpd security updatecq https://access.redhat.com/errata/RHSA-2024:4726RHSA-2024:4726RHSA-2024:4726 https://access.redhat.com/security/cve/CVE-2024-38473CVE-2024-38473CVE-2024-38473https://access.redhat.com/security/cve/CVE-2024-38474CVE-2024-38474CVE-2024-38474https://access.redhat.com/security/cve/CVE-2024-38475CVE-2024-38475CVE-2024-38475https://access.redhat.com/security/cve/CVE-2024-38477CVE-2024-38477CVE-2024-38477https://access.redhat.com/security/cve/CVE-2024-39573CVE-2024-39573CVE-2024-39573https://bugzilla.redhat.com/22950122295012https://bugzilla.redhat.com/22950132295013https://bugzilla.redhat.com/22950142295014https://bugzilla.redhat.com/22950162295016https://bugzilla.redhat.com/22950222295022https://errata.almalinux.org/9/ALSA-2024-4726.htmlALSA-2024:4726ALSA-2024:4726 :[mod_session-2.4.57-11.el9_4.x86_64.rpm7[mod_ldap-2.4.57-11.el9_4.x86_64.rpm"[httpd-core-2.4.57-11.el9_4.x86_64.rpm9lmod_proxy_html-2.4.57-11.el9_4.x86_64.rpm#[httpd-devel-2.4.57-11.el9_4.x86_64.rpm`[httpd-filesystem-2.4.57-11.el9_4.noarch.rpm$[httpd-tools-2.4.57-11.el9_4.x86_64.rpm;lmod_ssl-2.4.57-11.el9_4.x86_64.rpma[httpd-manual-2.4.57-11.el9_4.noarch.rpm8[mod_lua-2.4.57-11.el9_4.x86_64.rpm![httpd-2.4.57-11.el9_4.x86_64.rpm :[mod_session-2.4.57-11.el9_4.x86_64.rpm7[mod_ldap-2.4.57-11.el9_4.x86_64.rpm"[httpd-core-2.4.57-11.el9_4.x86_64.rpm9lmod_proxy_html-2.4.57-11.el9_4.x86_64.rpm#[httpd-devel-2.4.57-11.el9_4.x86_64.rpm`[httpd-filesystem-2.4.57-11.el9_4.noarch.rpm$[httpd-tools-2.4.57-11.el9_4.x86_64.rpm;lmod_ssl-2.4.57-11.el9_4.x86_64.rpma[httpd-manual-2.4.57-11.el9_4.noarch.rpm8[mod_lua-2.4.57-11.el9_4.x86_64.rpm![httpd-2.4.57-11.el9_4.x86_64.rpmr !_securityModerate: edk2 security updateTLhttps://access.redhat.com/errata/RHSA-2024:4749RHSA-2024:4749RHSA-2024:4749 https://access.redhat.com/security/cve/CVE-2022-36765CVE-2022-36765CVE-2022-36765https://access.redhat.com/security/cve/CVE-2023-45236CVE-2023-45236CVE-2023-45236https://access.redhat.com/security/cve/CVE-2023-45237CVE-2023-45237CVE-2023-45237https://bugzilla.redhat.com/22575842257584https://bugzilla.redhat.com/22587032258703https://bugzilla.redhat.com/22587062258706https://errata.almalinux.org/9/ALSA-2024-4749.htmlALSA-2024:4749ALSA-2024:4749 Hgedk2-ovmf-20231122-6.el9_4.2.noarch.rpmsgedk2-aarch64-20231122-6.el9_4.2.noarch.rpmHgedk2-ovmf-20231122-6.el9_4.2.noarch.rpmsgedk2-aarch64-20231122-6.el9_4.2.noarch.rpmH bBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update https://access.redhat.com/errata/RHSA-2024:4755RHSA-2024:4755RHSA-2024:4755 https://access.redhat.com/security/cve/CVE-2024-3044CVE-2024-3044CVE-2024-3044https://bugzilla.redhat.com/22805422280542https://errata.almalinux.org/9/ALSA-2024-4755.htmlALSA-2024:4755ALSA-2024:4755 1&libreoffice-gdb-debug-support-7.1.8.1-13.el9_4.alma.1.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-tn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-data-7.1.8.1-13.el9_4.alma.1.noarch.rpmiautocorr-ru-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-nso-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNlibreoffice-help-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmqlibreoffice-langpack-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-13.el9_4.alma.1.x86_64.rpm[autocorr-hr-7.1.8.1-13.el9_4.alma.1.noarch.rpmJlibreoffice-help-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmQlibreoffice-help-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm`autocorr-ja-7.1.8.1-13.el9_4.alma.1.noarch.rpmnlibreoffice-langpack-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-math-7.1.8.1-13.el9_4.alma.1.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpmFlibreoffice-help-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm?libreoffice-help-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-13.el9_4.alma.1.x86_64.rpmjlibreoffice-langpack-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-13.el9_4.alma.1.x86_64.rpmVlibreoffice-impress-7.1.8.1-13.el9_4.alma.1.x86_64.rpmqautocorr-zh-7.1.8.1-13.el9_4.alma.1.noarch.rpm!libreoffice-calc-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmdautocorr-mn-7.1.8.1-13.el9_4.alma.1.noarch.rpmelibreoffice-langpack-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpm-libreoffice-help-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpm=libreoffice-help-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm6libreoffice-help-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmxlibreoffice-langpack-kn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm]libreoffice-langpack-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpmfautocorr-pl-7.1.8.1-13.el9_4.alma.1.noarch.rpmRlibreoffice-help-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm}libreoffice-langpack-ml-7.1.8.1-13.el9_4.alma.1.x86_64.rpmTautocorr-el-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-te-7.1.8.1-13.el9_4.alma.1.x86_64.rpm.libreoffice-help-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpmrlibreoffice-langpack-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmoautocorr-vi-7.1.8.1-13.el9_4.alma.1.noarch.rpmplibreoffice-langpack-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpmcautocorr-lt-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpmbautocorr-lb-7.1.8.1-13.el9_4.alma.1.noarch.rpmhautocorr-ro-7.1.8.1-13.el9_4.alma.1.noarch.rpm[libreoffice-langpack-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmXautocorr-fi-7.1.8.1-13.el9_4.alma.1.noarch.rpm`libreoffice-langpack-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpm0libreoffice-help-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpmclibreoffice-langpack-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpm#libreoffice-wiki-publisher-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMautocorr-af-7.1.8.1-13.el9_4.alma.1.noarch.rpmklibreoffice-langpack-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-or-7.1.8.1-13.el9_4.alma.1.x86_64.rpm#libreoffice-draw-7.1.8.1-13.el9_4.alma.1.x86_64.rpmeautocorr-nl-7.1.8.1-13.el9_4.alma.1.noarch.rpm(libreoffice-gtk3-7.1.8.1-13.el9_4.alma.1.x86_64.rpmUautocorr-en-7.1.8.1-13.el9_4.alma.1.noarch.rpmylibreoffice-langpack-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm$libreoffice-emailmerge-7.1.8.1-13.el9_4.alma.1.x86_64.rpmpautocorr-vro-7.1.8.1-13.el9_4.alma.1.noarch.rpmDlibreoffice-help-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmQautocorr-da-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmSlibreoffice-help-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlautocorr-sr-7.1.8.1-13.el9_4.alma.1.noarch.rpmWautocorr-fa-7.1.8.1-13.el9_4.alma.1.noarch.rpmkautocorr-sl-7.1.8.1-13.el9_4.alma.1.noarch.rpm2libreoffice-help-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpm]autocorr-hu-7.1.8.1-13.el9_4.alma.1.noarch.rpmOlibreoffice-help-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm$libreoffice-writer-7.1.8.1-13.el9_4.alma.1.x86_64.rpm~libreoffice-langpack-mr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-13.el9_4.alma.1.x86_64.rpm<libreoffice-help-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmAlibreoffice-help-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm_libreoffice-langpack-cy-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-base-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-st-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ve-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMlibreoffice-help-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm'libreofficekit-7.1.8.1-13.el9_4.alma.1.x86_64.rpmRautocorr-de-7.1.8.1-13.el9_4.alma.1.noarch.rpmOautocorr-ca-7.1.8.1-13.el9_4.alma.1.noarch.rpmSautocorr-dsb-7.1.8.1-13.el9_4.alma.1.noarch.rpmZlibreoffice-langpack-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpmflibreoffice-langpack-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-xh-7.1.8.1-13.el9_4.alma.1.x86_64.rpmjautocorr-sk-7.1.8.1-13.el9_4.alma.1.noarch.rpmXlibreoffice-langpack-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmdlibreoffice-langpack-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpmtlibreoffice-langpack-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpm7libreoffice-help-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm9libreoffice-help-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmalibreoffice-langpack-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-opensymbol-fonts-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-7.1.8.1-13.el9_4.alma.1.x86_64.rpmIlibreoffice-help-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpm@libreoffice-help-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpmnautocorr-tr-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpm"libreoffice-ure-7.1.8.1-13.el9_4.alma.1.x86_64.rpmYautocorr-fr-7.1.8.1-13.el9_4.alma.1.noarch.rpm^autocorr-is-7.1.8.1-13.el9_4.alma.1.noarch.rpmmlibreoffice-langpack-ga-7.1.8.1-13.el9_4.alma.1.x86_64.rpmglibreoffice-langpack-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpmPautocorr-cs-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpmYlibreoffice-langpack-as-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpm4libreoffice-help-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpmulibreoffice-langpack-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpm^libreoffice-langpack-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpm)libreoffice-help-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmVautocorr-es-7.1.8.1-13.el9_4.alma.1.noarch.rpmilibreoffice-langpack-fa-7.1.8.1-13.el9_4.alma.1.x86_64.rpmvlibreoffice-langpack-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm%libreoffice-filters-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-ure-common-7.1.8.1-13.el9_4.alma.1.noarch.rpmKlibreoffice-help-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpmslibreoffice-langpack-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm+libreoffice-help-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm3libreoffice-help-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpm;libreoffice-help-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpmaautocorr-ko-7.1.8.1-13.el9_4.alma.1.noarch.rpmHlibreoffice-help-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpmolibreoffice-langpack-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmgautocorr-pt-7.1.8.1-13.el9_4.alma.1.noarch.rpm"libreoffice-core-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNautocorr-bg-7.1.8.1-13.el9_4.alma.1.noarch.rpmBlibreoffice-help-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-13.el9_4.alma.1.x86_64.rpm>libreoffice-help-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmmautocorr-sv-7.1.8.1-13.el9_4.alma.1.noarch.rpmwlibreoffice-langpack-kk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm,libreoffice-help-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpmClibreoffice-help-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-pdfimport-7.1.8.1-13.el9_4.alma.1.x86_64.rpm/libreoffice-help-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm5libreoffice-help-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpmZautocorr-ga-7.1.8.1-13.el9_4.alma.1.noarch.rpm%libreoffice-x11-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1libreoffice-help-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmElibreoffice-help-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpm:libreoffice-help-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm8libreoffice-help-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmWlibreoffice-langpack-af-7.1.8.1-13.el9_4.alma.1.x86_64.rpm!libreoffice-pyuno-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm_autocorr-it-7.1.8.1-13.el9_4.alma.1.noarch.rpm\autocorr-hsb-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ss-7.1.8.1-13.el9_4.alma.1.x86_64.rpmzlibreoffice-langpack-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpm*libreoffice-help-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpmLlibreoffice-help-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpmTlibreoffice-help-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm&libreoffice-xsltfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-ogltrans-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1&libreoffice-gdb-debug-support-7.1.8.1-13.el9_4.alma.1.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-tn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-data-7.1.8.1-13.el9_4.alma.1.noarch.rpmiautocorr-ru-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-nso-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNlibreoffice-help-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmqlibreoffice-langpack-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-13.el9_4.alma.1.x86_64.rpm[autocorr-hr-7.1.8.1-13.el9_4.alma.1.noarch.rpmJlibreoffice-help-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmQlibreoffice-help-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpm`autocorr-ja-7.1.8.1-13.el9_4.alma.1.noarch.rpmnlibreoffice-langpack-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-sv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-math-7.1.8.1-13.el9_4.alma.1.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pt-PT-7.1.8.1-13.el9_4.alma.1.x86_64.rpmFlibreoffice-help-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm?libreoffice-help-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-13.el9_4.alma.1.x86_64.rpmjlibreoffice-langpack-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-13.el9_4.alma.1.x86_64.rpmVlibreoffice-impress-7.1.8.1-13.el9_4.alma.1.x86_64.rpmqautocorr-zh-7.1.8.1-13.el9_4.alma.1.noarch.rpm!libreoffice-calc-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmdautocorr-mn-7.1.8.1-13.el9_4.alma.1.noarch.rpmelibreoffice-langpack-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpm-libreoffice-help-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpm=libreoffice-help-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm6libreoffice-help-eu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmxlibreoffice-langpack-kn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm]libreoffice-langpack-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpmfautocorr-pl-7.1.8.1-13.el9_4.alma.1.noarch.rpmRlibreoffice-help-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm}libreoffice-langpack-ml-7.1.8.1-13.el9_4.alma.1.x86_64.rpmTautocorr-el-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-te-7.1.8.1-13.el9_4.alma.1.x86_64.rpm.libreoffice-help-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpmrlibreoffice-langpack-hr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmoautocorr-vi-7.1.8.1-13.el9_4.alma.1.noarch.rpmplibreoffice-langpack-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpmcautocorr-lt-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ta-7.1.8.1-13.el9_4.alma.1.x86_64.rpmbautocorr-lb-7.1.8.1-13.el9_4.alma.1.noarch.rpmhautocorr-ro-7.1.8.1-13.el9_4.alma.1.noarch.rpm[libreoffice-langpack-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmXautocorr-fi-7.1.8.1-13.el9_4.alma.1.noarch.rpm`libreoffice-langpack-da-7.1.8.1-13.el9_4.alma.1.x86_64.rpm0libreoffice-help-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpmclibreoffice-langpack-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpm#libreoffice-wiki-publisher-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMautocorr-af-7.1.8.1-13.el9_4.alma.1.noarch.rpmklibreoffice-langpack-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-or-7.1.8.1-13.el9_4.alma.1.x86_64.rpm#libreoffice-draw-7.1.8.1-13.el9_4.alma.1.x86_64.rpmeautocorr-nl-7.1.8.1-13.el9_4.alma.1.noarch.rpm(libreoffice-gtk3-7.1.8.1-13.el9_4.alma.1.x86_64.rpmUautocorr-en-7.1.8.1-13.el9_4.alma.1.noarch.rpmylibreoffice-langpack-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm$libreoffice-emailmerge-7.1.8.1-13.el9_4.alma.1.x86_64.rpmpautocorr-vro-7.1.8.1-13.el9_4.alma.1.noarch.rpmDlibreoffice-help-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmQautocorr-da-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmSlibreoffice-help-uk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlautocorr-sr-7.1.8.1-13.el9_4.alma.1.noarch.rpmWautocorr-fa-7.1.8.1-13.el9_4.alma.1.noarch.rpmkautocorr-sl-7.1.8.1-13.el9_4.alma.1.noarch.rpm2libreoffice-help-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpm]autocorr-hu-7.1.8.1-13.el9_4.alma.1.noarch.rpmOlibreoffice-help-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm$libreoffice-writer-7.1.8.1-13.el9_4.alma.1.x86_64.rpm~libreoffice-langpack-mr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-13.el9_4.alma.1.x86_64.rpm<libreoffice-help-hi-7.1.8.1-13.el9_4.alma.1.x86_64.rpmAlibreoffice-help-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm_libreoffice-langpack-cy-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-base-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-st-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ve-7.1.8.1-13.el9_4.alma.1.x86_64.rpmMlibreoffice-help-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pa-7.1.8.1-13.el9_4.alma.1.x86_64.rpm'libreofficekit-7.1.8.1-13.el9_4.alma.1.x86_64.rpmRautocorr-de-7.1.8.1-13.el9_4.alma.1.noarch.rpmOautocorr-ca-7.1.8.1-13.el9_4.alma.1.noarch.rpmSautocorr-dsb-7.1.8.1-13.el9_4.alma.1.noarch.rpmZlibreoffice-langpack-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpmflibreoffice-langpack-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-xh-7.1.8.1-13.el9_4.alma.1.x86_64.rpmjautocorr-sk-7.1.8.1-13.el9_4.alma.1.noarch.rpmXlibreoffice-langpack-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmdlibreoffice-langpack-en-7.1.8.1-13.el9_4.alma.1.x86_64.rpmtlibreoffice-langpack-id-7.1.8.1-13.el9_4.alma.1.x86_64.rpm7libreoffice-help-fi-7.1.8.1-13.el9_4.alma.1.x86_64.rpm9libreoffice-help-gl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmalibreoffice-langpack-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-opensymbol-fonts-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-7.1.8.1-13.el9_4.alma.1.x86_64.rpmIlibreoffice-help-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpm@libreoffice-help-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpmnautocorr-tr-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-13.el9_4.alma.1.x86_64.rpm"libreoffice-ure-7.1.8.1-13.el9_4.alma.1.x86_64.rpmYautocorr-fr-7.1.8.1-13.el9_4.alma.1.noarch.rpm^autocorr-is-7.1.8.1-13.el9_4.alma.1.noarch.rpmmlibreoffice-langpack-ga-7.1.8.1-13.el9_4.alma.1.x86_64.rpmglibreoffice-langpack-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-si-7.1.8.1-13.el9_4.alma.1.x86_64.rpmPautocorr-cs-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-nn-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpmYlibreoffice-langpack-as-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-13.el9_4.alma.1.x86_64.rpm4libreoffice-help-es-7.1.8.1-13.el9_4.alma.1.x86_64.rpmulibreoffice-langpack-it-7.1.8.1-13.el9_4.alma.1.x86_64.rpm^libreoffice-langpack-cs-7.1.8.1-13.el9_4.alma.1.x86_64.rpm)libreoffice-help-ar-7.1.8.1-13.el9_4.alma.1.x86_64.rpmVautocorr-es-7.1.8.1-13.el9_4.alma.1.noarch.rpmilibreoffice-langpack-fa-7.1.8.1-13.el9_4.alma.1.x86_64.rpmvlibreoffice-langpack-ja-7.1.8.1-13.el9_4.alma.1.x86_64.rpm%libreoffice-filters-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-ure-common-7.1.8.1-13.el9_4.alma.1.noarch.rpmKlibreoffice-help-ro-7.1.8.1-13.el9_4.alma.1.x86_64.rpmslibreoffice-langpack-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm+libreoffice-help-bn-7.1.8.1-13.el9_4.alma.1.x86_64.rpm3libreoffice-help-eo-7.1.8.1-13.el9_4.alma.1.x86_64.rpm;libreoffice-help-he-7.1.8.1-13.el9_4.alma.1.x86_64.rpmaautocorr-ko-7.1.8.1-13.el9_4.alma.1.noarch.rpmHlibreoffice-help-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpmolibreoffice-langpack-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmgautocorr-pt-7.1.8.1-13.el9_4.alma.1.noarch.rpm"libreoffice-core-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmNautocorr-bg-7.1.8.1-13.el9_4.alma.1.noarch.rpmBlibreoffice-help-ko-7.1.8.1-13.el9_4.alma.1.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-13.el9_4.alma.1.x86_64.rpm>libreoffice-help-hu-7.1.8.1-13.el9_4.alma.1.x86_64.rpmmautocorr-sv-7.1.8.1-13.el9_4.alma.1.noarch.rpmwlibreoffice-langpack-kk-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm,libreoffice-help-ca-7.1.8.1-13.el9_4.alma.1.x86_64.rpmClibreoffice-help-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-pdfimport-7.1.8.1-13.el9_4.alma.1.x86_64.rpm/libreoffice-help-de-7.1.8.1-13.el9_4.alma.1.x86_64.rpm5libreoffice-help-et-7.1.8.1-13.el9_4.alma.1.x86_64.rpmZautocorr-ga-7.1.8.1-13.el9_4.alma.1.noarch.rpm%libreoffice-x11-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-sk-7.1.8.1-13.el9_4.alma.1.x86_64.rpm1libreoffice-help-el-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-sl-7.1.8.1-13.el9_4.alma.1.x86_64.rpmElibreoffice-help-nb-7.1.8.1-13.el9_4.alma.1.x86_64.rpm:libreoffice-help-gu-7.1.8.1-13.el9_4.alma.1.x86_64.rpm8libreoffice-help-fr-7.1.8.1-13.el9_4.alma.1.x86_64.rpmWlibreoffice-langpack-af-7.1.8.1-13.el9_4.alma.1.x86_64.rpm!libreoffice-pyuno-7.1.8.1-13.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-tr-7.1.8.1-13.el9_4.alma.1.x86_64.rpm_autocorr-it-7.1.8.1-13.el9_4.alma.1.noarch.rpm\autocorr-hsb-7.1.8.1-13.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ss-7.1.8.1-13.el9_4.alma.1.x86_64.rpmzlibreoffice-langpack-lt-7.1.8.1-13.el9_4.alma.1.x86_64.rpm*libreoffice-help-bg-7.1.8.1-13.el9_4.alma.1.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-13.el9_4.alma.1.x86_64.rpmLlibreoffice-help-ru-7.1.8.1-13.el9_4.alma.1.x86_64.rpmTlibreoffice-help-zh-Hans-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-13.el9_4.alma.1.x86_64.rpm&libreoffice-xsltfilter-7.1.8.1-13.el9_4.alma.1.x86_64.rpmlibreoffice-ogltrans-7.1.8.1-13.el9_4.alma.1.x86_64.rpmb ]BsecurityModerate: libuv security update7whttps://access.redhat.com/errata/RHSA-2024:4756RHSA-2024:4756RHSA-2024:4756 https://access.redhat.com/security/cve/CVE-2024-24806CVE-2024-24806CVE-2024-24806https://bugzilla.redhat.com/22632922263292https://errata.almalinux.org/9/ALSA-2024-4756.htmlALSA-2024:4756ALSA-2024:4756 /libuv-1.42.0-2.el9_4.i686.rpm/libuv-1.42.0-2.el9_4.x86_64.rpm/libuv-1.42.0-2.el9_4.i686.rpm/libuv-1.42.0-2.el9_4.x86_64.rpm0 aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update.\https://access.redhat.com/errata/RHSA-2024:4757RHSA-2024:4757RHSA-2024:4757 https://access.redhat.com/security/cve/CVE-2024-4418CVE-2024-4418CVE-2024-4418https://bugzilla.redhat.com/22786162278616https://errata.almalinux.org/9/ALSA-2024-4757.htmlALSA-2024:4757ALSA-2024:4757 \0libvirt-libs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-daemon-proxy-10.0.0-6.6.el9_4.alma.1.x86_64.rpmU0libvirt-daemon-driver-storage-disk-10.0.0-6.6.el9_4.alma.1.x86_64.rpm[0libvirt-daemon-kvm-10.0.0-6.6.el9_4.alma.1.x86_64.rpmQ0libvirt-daemon-driver-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm]0libvirt-nss-10.0.0-6.6.el9_4.alma.1.x86_64.rpmH0libvirt-10.0.0-6.6.el9_4.alma.1.x86_64.rpmP0libvirt-daemon-driver-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpmS0libvirt-daemon-driver-storage-10.0.0-6.6.el9_4.alma.1.x86_64.rpmW0libvirt-daemon-driver-storage-logical-10.0.0-6.6.el9_4.alma.1.x86_64.rpmN0libvirt-daemon-driver-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-daemon-plugin-lockd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-daemon-log-10.0.0-6.6.el9_4.alma.1.x86_64.rpmL0libvirt-daemon-config-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpmV0libvirt-daemon-driver-storage-iscsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpmK0libvirt-daemon-config-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpmY0libvirt-daemon-driver-storage-rbd-10.0.0-6.6.el9_4.alma.1.x86_64.rpmT0libvirt-daemon-driver-storage-core-10.0.0-6.6.el9_4.alma.1.x86_64.rpmI0libvirt-client-10.0.0-6.6.el9_4.alma.1.x86_64.rpmX0libvirt-daemon-driver-storage-mpath-10.0.0-6.6.el9_4.alma.1.x86_64.rpmM0libvirt-daemon-driver-interface-10.0.0-6.6.el9_4.alma.1.x86_64.rpmO0libvirt-daemon-driver-nodedev-10.0.0-6.6.el9_4.alma.1.x86_64.rpmR0libvirt-daemon-driver-secret-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-daemon-lock-10.0.0-6.6.el9_4.alma.1.x86_64.rpmJ0libvirt-daemon-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-client-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-daemon-common-10.0.0-6.6.el9_4.alma.1.x86_64.rpmZ0libvirt-daemon-driver-storage-scsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm\0libvirt-libs-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-daemon-proxy-10.0.0-6.6.el9_4.alma.1.x86_64.rpmU0libvirt-daemon-driver-storage-disk-10.0.0-6.6.el9_4.alma.1.x86_64.rpm[0libvirt-daemon-kvm-10.0.0-6.6.el9_4.alma.1.x86_64.rpmQ0libvirt-daemon-driver-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm]0libvirt-nss-10.0.0-6.6.el9_4.alma.1.x86_64.rpmH0libvirt-10.0.0-6.6.el9_4.alma.1.x86_64.rpmP0libvirt-daemon-driver-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpmS0libvirt-daemon-driver-storage-10.0.0-6.6.el9_4.alma.1.x86_64.rpmW0libvirt-daemon-driver-storage-logical-10.0.0-6.6.el9_4.alma.1.x86_64.rpmN0libvirt-daemon-driver-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-daemon-plugin-lockd-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-daemon-log-10.0.0-6.6.el9_4.alma.1.x86_64.rpmL0libvirt-daemon-config-nwfilter-10.0.0-6.6.el9_4.alma.1.x86_64.rpmV0libvirt-daemon-driver-storage-iscsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpmK0libvirt-daemon-config-network-10.0.0-6.6.el9_4.alma.1.x86_64.rpmY0libvirt-daemon-driver-storage-rbd-10.0.0-6.6.el9_4.alma.1.x86_64.rpmT0libvirt-daemon-driver-storage-core-10.0.0-6.6.el9_4.alma.1.x86_64.rpmI0libvirt-client-10.0.0-6.6.el9_4.alma.1.x86_64.rpmX0libvirt-daemon-driver-storage-mpath-10.0.0-6.6.el9_4.alma.1.x86_64.rpmM0libvirt-daemon-driver-interface-10.0.0-6.6.el9_4.alma.1.x86_64.rpmO0libvirt-daemon-driver-nodedev-10.0.0-6.6.el9_4.alma.1.x86_64.rpmR0libvirt-daemon-driver-secret-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-daemon-lock-10.0.0-6.6.el9_4.alma.1.x86_64.rpmJ0libvirt-daemon-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-client-qemu-10.0.0-6.6.el9_4.alma.1.x86_64.rpm0libvirt-daemon-common-10.0.0-6.6.el9_4.alma.1.x86_64.rpmZ0libvirt-daemon-driver-storage-scsi-10.0.0-6.6.el9_4.alma.1.x86_64.rpm  ZsecurityImportant: containernetworking-plugins security update https://access.redhat.com/errata/RHSA-2024:4761RHSA-2024:4761RHSA-2024:4761 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4761.htmlALSA-2024:4761ALSA-2024:4761 JXcontainernetworking-plugins-1.4.0-4.el9_4.x86_64.rpmJXcontainernetworking-plugins-1.4.0-4.el9_4.x86_64.rpmf ]securityImportant: runc security update1https://access.redhat.com/errata/RHSA-2024:4762RHSA-2024:4762RHSA-2024:4762 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://bugzilla.redhat.com/22629212262921https://errata.almalinux.org/9/ALSA-2024-4762.htmlALSA-2024:4762ALSA-2024:4762 WYrunc-1.1.12-3.el9_4.x86_64.rpmWYrunc-1.1.12-3.el9_4.x86_64.rpmW  *`BBBBBBBBsecurityLow: python3 security update3B,https://access.redhat.com/errata/RHSA-2024:4766RHSA-2024:4766RHSA-2024:4766 https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4766.htmlALSA-2024:4766ALSA-2024:4766 _python3.11-libs-3.11.7-1.el9_4.3.i686.rpm^python3.11-devel-3.11.7-1.el9_4.3.i686.rpm_python3.11-libs-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-tkinter-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-3.11.7-1.el9_4.3.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.3.x86_64.rpm_python3.11-libs-3.11.7-1.el9_4.3.i686.rpm^python3.11-devel-3.11.7-1.el9_4.3.i686.rpm_python3.11-libs-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-tkinter-3.11.7-1.el9_4.3.x86_64.rpmpython3.11-3.11.7-1.el9_4.3.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.3.x86_64.rpm! 9kBBBBBBBBBBBBsecurityModerate: cups security updaten https://access.redhat.com/errata/RHSA-2024:4776RHSA-2024:4776RHSA-2024:4776 https://access.redhat.com/security/cve/CVE-2024-35235CVE-2024-35235CVE-2024-35235https://bugzilla.redhat.com/22903182290318https://errata.almalinux.org/9/ALSA-2024-4776.htmlALSA-2024:4776ALSA-2024:4776 GGcups-devel-2.3.3op2-27.el9_4.i686.rpm Gcups-client-2.3.3op2-27.el9_4.x86_64.rpm Gcups-printerapp-2.3.3op2-27.el9_4.x86_64.rpmrGcups-filesystem-2.3.3op2-27.el9_4.noarch.rpm Gcups-ipptool-2.3.3op2-27.el9_4.x86_64.rpmGGcups-devel-2.3.3op2-27.el9_4.x86_64.rpm Gcups-2.3.3op2-27.el9_4.x86_64.rpm Gcups-lpd-2.3.3op2-27.el9_4.x86_64.rpmGGcups-devel-2.3.3op2-27.el9_4.i686.rpm Gcups-client-2.3.3op2-27.el9_4.x86_64.rpm Gcups-printerapp-2.3.3op2-27.el9_4.x86_64.rpmrGcups-filesystem-2.3.3op2-27.el9_4.noarch.rpm Gcups-ipptool-2.3.3op2-27.el9_4.x86_64.rpmGGcups-devel-2.3.3op2-27.el9_4.x86_64.rpm Gcups-2.3.3op2-27.el9_4.x86_64.rpm Gcups-lpd-2.3.3op2-27.el9_4.x86_64.rpm" zBBBBsecurityLow: python3 security update3x,https://access.redhat.com/errata/RHSA-2024:4779RHSA-2024:4779RHSA-2024:4779 https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://bugzilla.redhat.com/22929212292921https://errata.almalinux.org/9/ALSA-2024-4779.htmlALSA-2024:4779ALSA-2024:4779 Repython3-devel-3.9.18-3.el9_4.3.x86_64.rpmgepython-unversioned-command-3.9.18-3.el9_4.3.noarch.rpm1epython3-tkinter-3.9.18-3.el9_4.3.x86_64.rpmRepython3-devel-3.9.18-3.el9_4.3.i686.rpmRepython3-devel-3.9.18-3.el9_4.3.x86_64.rpmgepython-unversioned-command-3.9.18-3.el9_4.3.noarch.rpm1epython3-tkinter-3.9.18-3.el9_4.3.x86_64.rpmRepython3-devel-3.9.18-3.el9_4.3.i686.rpm7# AsecurityModerate: squid security update$~https://access.redhat.com/errata/RHSA-2024:4861RHSA-2024:4861RHSA-2024:4861 https://access.redhat.com/security/cve/CVE-2024-23638CVE-2024-23638CVE-2024-23638https://access.redhat.com/security/cve/CVE-2024-37894CVE-2024-37894CVE-2024-37894https://bugzilla.redhat.com/22600512260051https://bugzilla.redhat.com/22943532294353https://errata.almalinux.org/9/ALSA-2024-4861.htmlALSA-2024:4861ALSA-2024:4861 Xzsquid-5.5-13.el9_4.x86_64.rpmXzsquid-5.5-13.el9_4.x86_64.rpmI$ DBBBBBBBBBBBBBBBsecurityModerate: kernel security update"1$https://access.redhat.com/errata/RHSA-2024:4928RHSA-2024:4928RHSA-2024:4928 https://access.redhat.com/security/cve/CVE-2021-47459CVE-2021-47459CVE-2021-47459https://access.redhat.com/security/cve/CVE-2022-48743CVE-2022-48743CVE-2022-48743https://access.redhat.com/security/cve/CVE-2023-52458CVE-2023-52458CVE-2023-52458https://access.redhat.com/security/cve/CVE-2023-52809CVE-2023-52809CVE-2023-52809https://access.redhat.com/security/cve/CVE-2024-26737CVE-2024-26737CVE-2024-26737https://access.redhat.com/security/cve/CVE-2024-26773CVE-2024-26773CVE-2024-26773https://access.redhat.com/security/cve/CVE-2024-26852CVE-2024-26852CVE-2024-26852https://access.redhat.com/security/cve/CVE-2024-26880CVE-2024-26880CVE-2024-26880https://access.redhat.com/security/cve/CVE-2024-26982CVE-2024-26982CVE-2024-26982https://access.redhat.com/security/cve/CVE-2024-27030CVE-2024-27030CVE-2024-27030https://access.redhat.com/security/cve/CVE-2024-27046CVE-2024-27046CVE-2024-27046https://access.redhat.com/security/cve/CVE-2024-35857CVE-2024-35857CVE-2024-35857https://access.redhat.com/security/cve/CVE-2024-35885CVE-2024-35885CVE-2024-35885https://access.redhat.com/security/cve/CVE-2024-35907CVE-2024-35907CVE-2024-35907https://access.redhat.com/security/cve/CVE-2024-36924CVE-2024-36924CVE-2024-36924https://access.redhat.com/security/cve/CVE-2024-36952CVE-2024-36952CVE-2024-36952https://access.redhat.com/security/cve/CVE-2024-38580CVE-2024-38580CVE-2024-38580https://bugzilla.redhat.com/22657942265794https://bugzilla.redhat.com/22732362273236https://bugzilla.redhat.com/22732742273274https://bugzilla.redhat.com/22756902275690https://bugzilla.redhat.com/22757612275761https://bugzilla.redhat.com/22783372278337https://bugzilla.redhat.com/22784352278435https://bugzilla.redhat.com/22784732278473https://bugzilla.redhat.com/22812472281247https://bugzilla.redhat.com/22816472281647https://bugzilla.redhat.com/22817002281700https://bugzilla.redhat.com/22826692282669https://bugzilla.redhat.com/22828982282898https://bugzilla.redhat.com/22845062284506https://bugzilla.redhat.com/22845982284598https://bugzilla.redhat.com/22933162293316https://bugzilla.redhat.com/22934122293412https://errata.almalinux.org/9/ALSA-2024-4928.htmlALSA-2024:4928ALSA-2024:4928 %@perf-5.14.0-427.28.1.el9_4.x86_64.rpm$@kernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm#@kernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm@kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm)@rtla-5.14.0-427.28.1.el9_4.x86_64.rpm"@kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm(@kernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm!@kernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm*@rv-5.14.0-427.28.1.el9_4.x86_64.rpm %@perf-5.14.0-427.28.1.el9_4.x86_64.rpm$@kernel-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm#@kernel-devel-5.14.0-427.28.1.el9_4.x86_64.rpm@kernel-doc-5.14.0-427.28.1.el9_4.noarch.rpm)@rtla-5.14.0-427.28.1.el9_4.x86_64.rpm"@kernel-debug-devel-matched-5.14.0-427.28.1.el9_4.x86_64.rpm(@kernel-headers-5.14.0-427.28.1.el9_4.x86_64.rpm!@kernel-debug-devel-5.14.0-427.28.1.el9_4.x86_64.rpm*@rv-5.14.0-427.28.1.el9_4.x86_64.rpmM% $VBBBBBBBBBBBBsecurityImportant: freeradius security updateSGhttps://access.redhat.com/errata/RHSA-2024:4935RHSA-2024:4935RHSA-2024:4935 https://access.redhat.com/security/cve/CVE-2024-3596CVE-2024-3596CVE-2024-3596https://bugzilla.redhat.com/22632402263240https://errata.almalinux.org/9/ALSA-2024-4935.htmlALSA-2024:4935ALSA-2024:4935 )freeradius-krb5-3.0.21-40.el9_4.x86_64.rpm)freeradius-devel-3.0.21-40.el9_4.x86_64.rpmJ)python3-freeradius-3.0.21-40.el9_4.x86_64.rpm)freeradius-doc-3.0.21-40.el9_4.x86_64.rpm)freeradius-ldap-3.0.21-40.el9_4.x86_64.rpm)freeradius-utils-3.0.21-40.el9_4.x86_64.rpm)freeradius-3.0.21-40.el9_4.x86_64.rpm)freeradius-krb5-3.0.21-40.el9_4.x86_64.rpm)freeradius-devel-3.0.21-40.el9_4.x86_64.rpmJ)python3-freeradius-3.0.21-40.el9_4.x86_64.rpm)freeradius-doc-3.0.21-40.el9_4.x86_64.rpm)freeradius-ldap-3.0.21-40.el9_4.x86_64.rpm)freeradius-utils-3.0.21-40.el9_4.x86_64.rpm)freeradius-3.0.21-40.el9_4.x86_64.rpmʚN& 9eBBBBBBBBBBBBBBBBBBsecurityImportant: httpd security update.https://access.redhat.com/errata/RHSA-2024:5138RHSA-2024:5138RHSA-2024:5138 https://access.redhat.com/security/cve/CVE-2024-38476CVE-2024-38476CVE-2024-38476https://bugzilla.redhat.com/22950152295015https://errata.almalinux.org/9/ALSA-2024-5138.htmlALSA-2024:5138ALSA-2024:5138 7\mod_ldap-2.4.57-11.el9_4.1.x86_64.rpm!\httpd-2.4.57-11.el9_4.1.x86_64.rpm9mmod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpma\httpd-manual-2.4.57-11.el9_4.1.noarch.rpm#\httpd-devel-2.4.57-11.el9_4.1.x86_64.rpm`\httpd-filesystem-2.4.57-11.el9_4.1.noarch.rpm8\mod_lua-2.4.57-11.el9_4.1.x86_64.rpm:\mod_session-2.4.57-11.el9_4.1.x86_64.rpm"\httpd-core-2.4.57-11.el9_4.1.x86_64.rpm;mmod_ssl-2.4.57-11.el9_4.1.x86_64.rpm$\httpd-tools-2.4.57-11.el9_4.1.x86_64.rpm 7\mod_ldap-2.4.57-11.el9_4.1.x86_64.rpm!\httpd-2.4.57-11.el9_4.1.x86_64.rpm9mmod_proxy_html-2.4.57-11.el9_4.1.x86_64.rpma\httpd-manual-2.4.57-11.el9_4.1.noarch.rpm#\httpd-devel-2.4.57-11.el9_4.1.x86_64.rpm`\httpd-filesystem-2.4.57-11.el9_4.1.noarch.rpm8\mod_lua-2.4.57-11.el9_4.1.x86_64.rpm:\mod_session-2.4.57-11.el9_4.1.x86_64.rpm"\httpd-core-2.4.57-11.el9_4.1.x86_64.rpm;mmod_ssl-2.4.57-11.el9_4.1.x86_64.rpm$\httpd-tools-2.4.57-11.el9_4.1.x86_64.rpmԫ}' ?zBBBsecurityModerate: 389-ds-base security updateHjhttps://access.redhat.com/errata/RHSA-2024:5192RHSA-2024:5192RHSA-2024:5192 https://access.redhat.com/security/cve/CVE-2024-5953CVE-2024-5953CVE-2024-5953https://access.redhat.com/security/cve/CVE-2024-6237CVE-2024-6237CVE-2024-6237https://bugzilla.redhat.com/22921042292104https://bugzilla.redhat.com/22935792293579https://errata.almalinux.org/9/ALSA-2024-5192.htmlALSA-2024:5192ALSA-2024:5192 r4389-ds-base-2.4.5-9.el9_4.x86_64.rpm 4python3-lib389-2.4.5-9.el9_4.noarch.rpms4389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpmr4389-ds-base-2.4.5-9.el9_4.x86_64.rpm 4python3-lib389-2.4.5-9.el9_4.noarch.rpms4389-ds-base-libs-2.4.5-9.el9_4.x86_64.rpm>( @BBBBBBBBBBBBBsecurityImportant: bind and bind-dyndb-ldap security update2"https://access.redhat.com/errata/RHSA-2024:5231RHSA-2024:5231RHSA-2024:5231 https://access.redhat.com/security/cve/CVE-2024-1737CVE-2024-1737CVE-2024-1737https://access.redhat.com/security/cve/CVE-2024-1975CVE-2024-1975CVE-2024-1975https://access.redhat.com/security/cve/CVE-2024-4076CVE-2024-4076CVE-2024-4076https://bugzilla.redhat.com/22988932298893https://bugzilla.redhat.com/22989012298901https://bugzilla.redhat.com/22989042298904https://errata.almalinux.org/9/ALSA-2024-5231.htmlALSA-2024:5231ALSA-2024:5231 Hwbind-libs-9.16.23-18.el9_4.6.x86_64.rpmIwbind-utils-9.16.23-18.el9_4.6.x86_64.rpmwpython3-bind-9.16.23-18.el9_4.6.noarch.rpmFwbind-chroot-9.16.23-18.el9_4.6.x86_64.rpm=6bind-dyndb-ldap-11.9-10.el9_4.alma.1.x86_64.rpmwbind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpmwbind-license-9.16.23-18.el9_4.6.noarch.rpmEwbind-9.16.23-18.el9_4.6.x86_64.rpmGwbind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpm Hwbind-libs-9.16.23-18.el9_4.6.x86_64.rpmIwbind-utils-9.16.23-18.el9_4.6.x86_64.rpmwpython3-bind-9.16.23-18.el9_4.6.noarch.rpmFwbind-chroot-9.16.23-18.el9_4.6.x86_64.rpm=6bind-dyndb-ldap-11.9-10.el9_4.alma.1.x86_64.rpmwbind-dnssec-doc-9.16.23-18.el9_4.6.noarch.rpmwbind-license-9.16.23-18.el9_4.6.noarch.rpmEwbind-9.16.23-18.el9_4.6.x86_64.rpmGwbind-dnssec-utils-9.16.23-18.el9_4.6.x86_64.rpmq) PsecurityImportant: python3.11-setuptools security updateThttps://access.redhat.com/errata/RHSA-2024:5279RHSA-2024:5279RHSA-2024:5279 https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5279.htmlALSA-2024:5279ALSA-2024:5279 O}python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpmN}python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpmO}python3.11-setuptools-wheel-65.5.1-2.el9_4.1.noarch.rpmN}python3.11-setuptools-65.5.1-2.el9_4.1.noarch.rpm5* SBBsecurityImportant: firefox security updatekhttps://access.redhat.com/errata/RHSA-2024:5322RHSA-2024:5322RHSA-2024:5322 https://access.redhat.com/security/cve/CVE-2024-7518CVE-2024-7518CVE-2024-7518https://access.redhat.com/security/cve/CVE-2024-7519CVE-2024-7519CVE-2024-7519https://access.redhat.com/security/cve/CVE-2024-7520CVE-2024-7520CVE-2024-7520https://access.redhat.com/security/cve/CVE-2024-7521CVE-2024-7521CVE-2024-7521https://access.redhat.com/security/cve/CVE-2024-7522CVE-2024-7522CVE-2024-7522https://access.redhat.com/security/cve/CVE-2024-7524CVE-2024-7524CVE-2024-7524https://access.redhat.com/security/cve/CVE-2024-7525CVE-2024-7525CVE-2024-7525https://access.redhat.com/security/cve/CVE-2024-7526CVE-2024-7526CVE-2024-7526https://access.redhat.com/security/cve/CVE-2024-7527CVE-2024-7527CVE-2024-7527https://access.redhat.com/security/cve/CVE-2024-7528CVE-2024-7528CVE-2024-7528https://access.redhat.com/security/cve/CVE-2024-7529CVE-2024-7529CVE-2024-7529https://bugzilla.redhat.com/23031352303135https://bugzilla.redhat.com/23031362303136https://bugzilla.redhat.com/23031372303137https://bugzilla.redhat.com/23031382303138https://bugzilla.redhat.com/23031392303139https://bugzilla.redhat.com/23031412303141https://bugzilla.redhat.com/23031422303142https://bugzilla.redhat.com/23031432303143https://bugzilla.redhat.com/23031442303144https://bugzilla.redhat.com/23031452303145https://bugzilla.redhat.com/23031462303146https://errata.almalinux.org/9/ALSA-2024-5322.htmlALSA-2024:5322ALSA-2024:5322 OOfirefox-x11-115.14.0-2.el9_4.alma.1.x86_64.rpm7Ofirefox-115.14.0-2.el9_4.alma.1.x86_64.rpmOOfirefox-x11-115.14.0-2.el9_4.alma.1.x86_64.rpm7Ofirefox-115.14.0-2.el9_4.alma.1.x86_64.rpm^+ 2XBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: .NET 8.0 security update|}https://access.redhat.com/errata/RHSA-2024:5334RHSA-2024:5334RHSA-2024:5334 https://access.redhat.com/security/cve/CVE-2024-38167CVE-2024-38167CVE-2024-38167https://bugzilla.redhat.com/23024282302428https://errata.almalinux.org/9/ALSA-2024-5334.htmlALSA-2024:5334ALSA-2024:5334 [8dotnet-templates-8.0-8.0.108-1.el9_4.x86_64.rpm 8netstandard-targeting-pack-2.1-8.0.108-1.el9_4.x86_64.rpmL8dotnet-sdk-dbg-8.0-8.0.108-1.el9_4.x86_64.rpmW0dotnet-hostfxr-8.0-8.0.8-1.el9_4.x86_64.rpmV0dotnet-apphost-pack-8.0-8.0.8-1.el9_4.x86_64.rpmU0aspnetcore-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpmY8dotnet-sdk-8.0-8.0.108-1.el9_4.x86_64.rpmX0dotnet-runtime-8.0-8.0.8-1.el9_4.x86_64.rpmK0dotnet-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpmD0aspnetcore-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpmT0aspnetcore-runtime-8.0-8.0.8-1.el9_4.x86_64.rpmZ0dotnet-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpm0dotnet-host-8.0.8-1.el9_4.x86_64.rpm [8dotnet-templates-8.0-8.0.108-1.el9_4.x86_64.rpm 8netstandard-targeting-pack-2.1-8.0.108-1.el9_4.x86_64.rpmL8dotnet-sdk-dbg-8.0-8.0.108-1.el9_4.x86_64.rpmW0dotnet-hostfxr-8.0-8.0.8-1.el9_4.x86_64.rpmV0dotnet-apphost-pack-8.0-8.0.8-1.el9_4.x86_64.rpmU0aspnetcore-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpmY8dotnet-sdk-8.0-8.0.108-1.el9_4.x86_64.rpmX0dotnet-runtime-8.0-8.0.8-1.el9_4.x86_64.rpmK0dotnet-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpmD0aspnetcore-runtime-dbg-8.0-8.0.8-1.el9_4.x86_64.rpmT0aspnetcore-runtime-8.0-8.0.8-1.el9_4.x86_64.rpmZ0dotnet-targeting-pack-8.0-8.0.8-1.el9_4.x86_64.rpm0dotnet-host-8.0.8-1.el9_4.x86_64.rpmV, sBBBBBBBBBBBBBBBsecurityImportant: kernel security updatey4^https://access.redhat.com/errata/RHSA-2024:5363RHSA-2024:5363RHSA-2024:5363 https://access.redhat.com/security/cve/CVE-2021-47606CVE-2021-47606CVE-2021-47606https://access.redhat.com/security/cve/CVE-2023-52651CVE-2023-52651CVE-2023-52651https://access.redhat.com/security/cve/CVE-2023-52864CVE-2023-52864CVE-2023-52864https://access.redhat.com/security/cve/CVE-2024-21823CVE-2024-21823CVE-2024-21823https://access.redhat.com/security/cve/CVE-2024-26600CVE-2024-26600CVE-2024-26600https://access.redhat.com/security/cve/CVE-2024-26808CVE-2024-26808CVE-2024-26808https://access.redhat.com/security/cve/CVE-2024-26828CVE-2024-26828CVE-2024-26828https://access.redhat.com/security/cve/CVE-2024-26853CVE-2024-26853CVE-2024-26853https://access.redhat.com/security/cve/CVE-2024-26868CVE-2024-26868CVE-2024-26868https://access.redhat.com/security/cve/CVE-2024-26897CVE-2024-26897CVE-2024-26897https://access.redhat.com/security/cve/CVE-2024-27049CVE-2024-27049CVE-2024-27049https://access.redhat.com/security/cve/CVE-2024-27052CVE-2024-27052CVE-2024-27052https://access.redhat.com/security/cve/CVE-2024-27065CVE-2024-27065CVE-2024-27065https://access.redhat.com/security/cve/CVE-2024-27417CVE-2024-27417CVE-2024-27417https://access.redhat.com/security/cve/CVE-2024-27434CVE-2024-27434CVE-2024-27434https://access.redhat.com/security/cve/CVE-2024-33621CVE-2024-33621CVE-2024-33621https://access.redhat.com/security/cve/CVE-2024-35789CVE-2024-35789CVE-2024-35789https://access.redhat.com/security/cve/CVE-2024-35800CVE-2024-35800CVE-2024-35800https://access.redhat.com/security/cve/CVE-2024-35823CVE-2024-35823CVE-2024-35823https://access.redhat.com/security/cve/CVE-2024-35845CVE-2024-35845CVE-2024-35845https://access.redhat.com/security/cve/CVE-2024-35848CVE-2024-35848CVE-2024-35848https://access.redhat.com/security/cve/CVE-2024-35852CVE-2024-35852CVE-2024-35852https://access.redhat.com/security/cve/CVE-2024-35899CVE-2024-35899CVE-2024-35899https://access.redhat.com/security/cve/CVE-2024-35911CVE-2024-35911CVE-2024-35911https://access.redhat.com/security/cve/CVE-2024-35937CVE-2024-35937CVE-2024-35937https://access.redhat.com/security/cve/CVE-2024-35969CVE-2024-35969CVE-2024-35969https://access.redhat.com/security/cve/CVE-2024-36005CVE-2024-36005CVE-2024-36005https://access.redhat.com/security/cve/CVE-2024-36017CVE-2024-36017CVE-2024-36017https://access.redhat.com/security/cve/CVE-2024-36020CVE-2024-36020CVE-2024-36020https://access.redhat.com/security/cve/CVE-2024-36489CVE-2024-36489CVE-2024-36489https://access.redhat.com/security/cve/CVE-2024-36903CVE-2024-36903CVE-2024-36903https://access.redhat.com/security/cve/CVE-2024-36921CVE-2024-36921CVE-2024-36921https://access.redhat.com/security/cve/CVE-2024-36922CVE-2024-36922CVE-2024-36922https://access.redhat.com/security/cve/CVE-2024-36929CVE-2024-36929CVE-2024-36929https://access.redhat.com/security/cve/CVE-2024-36941CVE-2024-36941CVE-2024-36941https://access.redhat.com/security/cve/CVE-2024-36971CVE-2024-36971CVE-2024-36971https://access.redhat.com/security/cve/CVE-2024-37353CVE-2024-37353CVE-2024-37353https://access.redhat.com/security/cve/CVE-2024-37356CVE-2024-37356CVE-2024-37356https://access.redhat.com/security/cve/CVE-2024-38391CVE-2024-38391CVE-2024-38391https://access.redhat.com/security/cve/CVE-2024-38558CVE-2024-38558CVE-2024-38558https://access.redhat.com/security/cve/CVE-2024-38575CVE-2024-38575CVE-2024-38575https://access.redhat.com/security/cve/CVE-2024-39487CVE-2024-39487CVE-2024-39487https://access.redhat.com/security/cve/CVE-2024-40928CVE-2024-40928CVE-2024-40928https://access.redhat.com/security/cve/CVE-2024-40954CVE-2024-40954CVE-2024-40954https://access.redhat.com/security/cve/CVE-2024-40958CVE-2024-40958CVE-2024-40958https://access.redhat.com/security/cve/CVE-2024-40961CVE-2024-40961CVE-2024-40961https://bugzilla.redhat.com/22658382265838https://bugzilla.redhat.com/22734052273405https://bugzilla.redhat.com/22756002275600https://bugzilla.redhat.com/22756552275655https://bugzilla.redhat.com/22757152275715https://bugzilla.redhat.com/22757482275748https://bugzilla.redhat.com/22783802278380https://bugzilla.redhat.com/22784172278417https://bugzilla.redhat.com/22784292278429https://bugzilla.redhat.com/22785192278519https://bugzilla.redhat.com/22789892278989https://bugzilla.redhat.com/22810572281057https://bugzilla.redhat.com/22810972281097https://bugzilla.redhat.com/22811332281133https://bugzilla.redhat.com/22811902281190https://bugzilla.redhat.com/22812372281237https://bugzilla.redhat.com/22812572281257https://bugzilla.redhat.com/22812652281265https://bugzilla.redhat.com/22812722281272https://bugzilla.redhat.com/22816392281639https://bugzilla.redhat.com/22816672281667https://bugzilla.redhat.com/22818212281821https://bugzilla.redhat.com/22819002281900https://bugzilla.redhat.com/22819492281949https://bugzilla.redhat.com/22827192282719https://bugzilla.redhat.com/22844002284400https://bugzilla.redhat.com/22844172284417https://bugzilla.redhat.com/22844742284474https://bugzilla.redhat.com/22844962284496https://bugzilla.redhat.com/22845112284511https://bugzilla.redhat.com/22845132284513https://bugzilla.redhat.com/22845432284543https://bugzilla.redhat.com/22923312292331https://bugzilla.redhat.com/22932082293208https://bugzilla.redhat.com/22934182293418https://bugzilla.redhat.com/22934412293441https://bugzilla.redhat.com/22936572293657https://bugzilla.redhat.com/22936582293658https://bugzilla.redhat.com/22936862293686https://bugzilla.redhat.com/22936872293687https://bugzilla.redhat.com/22936882293688https://bugzilla.redhat.com/22970562297056https://bugzilla.redhat.com/22975122297512https://bugzilla.redhat.com/22975382297538https://bugzilla.redhat.com/22975422297542https://bugzilla.redhat.com/22975452297545https://errata.almalinux.org/9/ALSA-2024-5363.htmlALSA-2024:5363ALSA-2024:5363 $Akernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm(Akernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm*Arv-5.14.0-427.31.1.el9_4.x86_64.rpm#Akernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm)Artla-5.14.0-427.31.1.el9_4.x86_64.rpm"Akernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpmAkernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm%Aperf-5.14.0-427.31.1.el9_4.x86_64.rpm!Akernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpm $Akernel-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpm(Akernel-headers-5.14.0-427.31.1.el9_4.x86_64.rpm*Arv-5.14.0-427.31.1.el9_4.x86_64.rpm#Akernel-devel-5.14.0-427.31.1.el9_4.x86_64.rpm)Artla-5.14.0-427.31.1.el9_4.x86_64.rpm"Akernel-debug-devel-matched-5.14.0-427.31.1.el9_4.x86_64.rpmAkernel-doc-5.14.0-427.31.1.el9_4.noarch.rpm%Aperf-5.14.0-427.31.1.el9_4.x86_64.rpm!Akernel-debug-devel-5.14.0-427.31.1.el9_4.x86_64.rpmy- EsecurityImportant: thunderbird security update-https://access.redhat.com/errata/RHSA-2024:5392RHSA-2024:5392RHSA-2024:5392 https://access.redhat.com/security/cve/CVE-2024-7518CVE-2024-7518CVE-2024-7518https://access.redhat.com/security/cve/CVE-2024-7519CVE-2024-7519CVE-2024-7519https://access.redhat.com/security/cve/CVE-2024-7520CVE-2024-7520CVE-2024-7520https://access.redhat.com/security/cve/CVE-2024-7521CVE-2024-7521CVE-2024-7521https://access.redhat.com/security/cve/CVE-2024-7522CVE-2024-7522CVE-2024-7522https://access.redhat.com/security/cve/CVE-2024-7525CVE-2024-7525CVE-2024-7525https://access.redhat.com/security/cve/CVE-2024-7526CVE-2024-7526CVE-2024-7526https://access.redhat.com/security/cve/CVE-2024-7527CVE-2024-7527CVE-2024-7527https://access.redhat.com/security/cve/CVE-2024-7528CVE-2024-7528CVE-2024-7528https://access.redhat.com/security/cve/CVE-2024-7529CVE-2024-7529CVE-2024-7529https://bugzilla.redhat.com/23031352303135https://bugzilla.redhat.com/23031362303136https://bugzilla.redhat.com/23031372303137https://bugzilla.redhat.com/23031382303138https://bugzilla.redhat.com/23031392303139https://bugzilla.redhat.com/23031422303142https://bugzilla.redhat.com/23031432303143https://bugzilla.redhat.com/23031442303144https://bugzilla.redhat.com/23031452303145https://bugzilla.redhat.com/23031462303146https://errata.almalinux.org/9/ALSA-2024-5392.htmlALSA-2024:5392ALSA-2024:5392 9<thunderbird-115.14.0-1.el9_4.alma.1.x86_64.rpm9<thunderbird-115.14.0-1.el9_4.alma.1.x86_64.rpmf. HBsecurityModerate: curl security updateD(https://access.redhat.com/errata/RHSA-2024:5529RHSA-2024:5529RHSA-2024:5529 https://access.redhat.com/security/cve/CVE-2024-2398CVE-2024-2398CVE-2024-2398https://bugzilla.redhat.com/22704982270498https://errata.almalinux.org/9/ALSA-2024-5529.htmlALSA-2024:5529ALSA-2024:5529  [libcurl-devel-7.76.1-29.el9_4.1.i686.rpm [libcurl-devel-7.76.1-29.el9_4.1.x86_64.rpm [libcurl-devel-7.76.1-29.el9_4.1.i686.rpm [libcurl-devel-7.76.1-29.el9_4.1.x86_64.rpm*/ securityImportant: python3.12-setuptools security updatelhttps://access.redhat.com/errata/RHSA-2024:5533RHSA-2024:5533RHSA-2024:5533 https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-5533.htmlALSA-2024:5533ALSA-2024:5533 Q\python3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpmQ\python3.12-setuptools-68.2.2-3.el9_4.1.noarch.rpm_0 NBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libreoffice security update{https://access.redhat.com/errata/RHSA-2024:5583RHSA-2024:5583RHSA-2024:5583 https://access.redhat.com/security/cve/CVE-2024-6472CVE-2024-6472CVE-2024-6472https://bugzilla.redhat.com/23028662302866https://errata.almalinux.org/9/ALSA-2024-5583.htmlALSA-2024:5583ALSA-2024:5583 1Alibreoffice-help-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpmfautocorr-pl-7.1.8.1-14.el9_4.alma.1.noarch.rpm%libreoffice-filters-7.1.8.1-14.el9_4.alma.1.x86_64.rpm9libreoffice-help-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmqautocorr-zh-7.1.8.1-14.el9_4.alma.1.noarch.rpmbautocorr-lb-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmBlibreoffice-help-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpm,libreoffice-help-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpmulibreoffice-langpack-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm}libreoffice-langpack-ml-7.1.8.1-14.el9_4.alma.1.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpm>libreoffice-help-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpmYautocorr-fr-7.1.8.1-14.el9_4.alma.1.noarch.rpm$libreoffice-emailmerge-7.1.8.1-14.el9_4.alma.1.x86_64.rpmHlibreoffice-help-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm)libreoffice-help-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpm+libreoffice-help-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-te-7.1.8.1-14.el9_4.alma.1.x86_64.rpmvlibreoffice-langpack-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpmJlibreoffice-help-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpmaautocorr-ko-7.1.8.1-14.el9_4.alma.1.noarch.rpmLlibreoffice-help-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpm#libreoffice-draw-7.1.8.1-14.el9_4.alma.1.x86_64.rpmolibreoffice-langpack-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmjlibreoffice-langpack-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm5libreoffice-help-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpm.libreoffice-help-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpmeautocorr-nl-7.1.8.1-14.el9_4.alma.1.noarch.rpmUautocorr-en-7.1.8.1-14.el9_4.alma.1.noarch.rpmklibreoffice-langpack-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm2libreoffice-help-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpmSautocorr-dsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmNlibreoffice-help-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm^autocorr-is-7.1.8.1-14.el9_4.alma.1.noarch.rpmZautocorr-ga-7.1.8.1-14.el9_4.alma.1.noarch.rpm;libreoffice-help-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-ure-common-7.1.8.1-14.el9_4.alma.1.noarch.rpmIlibreoffice-help-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpmrlibreoffice-langpack-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm]libreoffice-langpack-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-xh-7.1.8.1-14.el9_4.alma.1.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-14.el9_4.alma.1.x86_64.rpm`libreoffice-langpack-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpmpautocorr-vro-7.1.8.1-14.el9_4.alma.1.noarch.rpmTlibreoffice-help-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpmalibreoffice-langpack-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpmVautocorr-es-7.1.8.1-14.el9_4.alma.1.noarch.rpm1libreoffice-help-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpmElibreoffice-help-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm-libreoffice-help-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-data-7.1.8.1-14.el9_4.alma.1.noarch.rpmDlibreoffice-help-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmwlibreoffice-langpack-kk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmglibreoffice-langpack-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-14.el9_4.alma.1.x86_64.rpmOlibreoffice-help-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nso-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-base-7.1.8.1-14.el9_4.alma.1.x86_64.rpmKlibreoffice-help-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlautocorr-sr-7.1.8.1-14.el9_4.alma.1.noarch.rpmXautocorr-fi-7.1.8.1-14.el9_4.alma.1.noarch.rpm8libreoffice-help-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmslibreoffice-langpack-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpm`autocorr-ja-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-ogltrans-7.1.8.1-14.el9_4.alma.1.x86_64.rpmSlibreoffice-help-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-pdfimport-7.1.8.1-14.el9_4.alma.1.x86_64.rpmilibreoffice-langpack-fa-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm[autocorr-hr-7.1.8.1-14.el9_4.alma.1.noarch.rpmWautocorr-fa-7.1.8.1-14.el9_4.alma.1.noarch.rpmylibreoffice-langpack-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm"libreoffice-core-7.1.8.1-14.el9_4.alma.1.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpmiautocorr-ru-7.1.8.1-14.el9_4.alma.1.noarch.rpmClibreoffice-help-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmWlibreoffice-langpack-af-7.1.8.1-14.el9_4.alma.1.x86_64.rpmhautocorr-ro-7.1.8.1-14.el9_4.alma.1.noarch.rpm&libreoffice-xsltfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpm0libreoffice-help-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpm<libreoffice-help-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpmcautocorr-lt-7.1.8.1-14.el9_4.alma.1.noarch.rpmOautocorr-ca-7.1.8.1-14.el9_4.alma.1.noarch.rpmZlibreoffice-langpack-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpm=libreoffice-help-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmflibreoffice-langpack-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpmclibreoffice-langpack-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpm4libreoffice-help-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpm$libreoffice-writer-7.1.8.1-14.el9_4.alma.1.x86_64.rpm'libreofficekit-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-14.el9_4.alma.1.x86_64.rpm%libreoffice-x11-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm_autocorr-it-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-or-7.1.8.1-14.el9_4.alma.1.x86_64.rpmYlibreoffice-langpack-as-7.1.8.1-14.el9_4.alma.1.x86_64.rpm!libreoffice-pyuno-7.1.8.1-14.el9_4.alma.1.x86_64.rpmMautocorr-af-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm3libreoffice-help-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpm*libreoffice-help-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpmzlibreoffice-langpack-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpmVlibreoffice-impress-7.1.8.1-14.el9_4.alma.1.x86_64.rpm7libreoffice-help-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ss-7.1.8.1-14.el9_4.alma.1.x86_64.rpmelibreoffice-langpack-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpmXlibreoffice-langpack-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-14.el9_4.alma.1.x86_64.rpm&libreoffice-gdb-debug-support-7.1.8.1-14.el9_4.alma.1.x86_64.rpmtlibreoffice-langpack-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm]autocorr-hu-7.1.8.1-14.el9_4.alma.1.noarch.rpm_libreoffice-langpack-cy-7.1.8.1-14.el9_4.alma.1.x86_64.rpm[libreoffice-langpack-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmNautocorr-bg-7.1.8.1-14.el9_4.alma.1.noarch.rpmqlibreoffice-langpack-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm#libreoffice-wiki-publisher-7.1.8.1-14.el9_4.alma.1.x86_64.rpm"libreoffice-ure-7.1.8.1-14.el9_4.alma.1.x86_64.rpm@libreoffice-help-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpmQautocorr-da-7.1.8.1-14.el9_4.alma.1.noarch.rpm6libreoffice-help-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmRautocorr-de-7.1.8.1-14.el9_4.alma.1.noarch.rpm(libreoffice-gtk3-7.1.8.1-14.el9_4.alma.1.x86_64.rpmMlibreoffice-help-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpmmautocorr-sv-7.1.8.1-14.el9_4.alma.1.noarch.rpmgautocorr-pt-7.1.8.1-14.el9_4.alma.1.noarch.rpmPautocorr-cs-7.1.8.1-14.el9_4.alma.1.noarch.rpmplibreoffice-langpack-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmoautocorr-vi-7.1.8.1-14.el9_4.alma.1.noarch.rpmxlibreoffice-langpack-kn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmdlibreoffice-langpack-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpmjautocorr-sk-7.1.8.1-14.el9_4.alma.1.noarch.rpm libreoffice-langpack-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm\autocorr-hsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-math-7.1.8.1-14.el9_4.alma.1.x86_64.rpm?libreoffice-help-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpmRlibreoffice-help-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmQlibreoffice-help-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpm/libreoffice-help-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpmnlibreoffice-langpack-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-opensymbol-fonts-7.1.8.1-14.el9_4.alma.1.noarch.rpmnautocorr-tr-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ve-7.1.8.1-14.el9_4.alma.1.x86_64.rpmmlibreoffice-langpack-ga-7.1.8.1-14.el9_4.alma.1.x86_64.rpmkautocorr-sl-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-zu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmdautocorr-mn-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-st-7.1.8.1-14.el9_4.alma.1.x86_64.rpm:libreoffice-help-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmTautocorr-el-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-tn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm!libreoffice-calc-7.1.8.1-14.el9_4.alma.1.x86_64.rpmFlibreoffice-help-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm^libreoffice-langpack-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm~libreoffice-langpack-mr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1Alibreoffice-help-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpmfautocorr-pl-7.1.8.1-14.el9_4.alma.1.noarch.rpm%libreoffice-filters-7.1.8.1-14.el9_4.alma.1.x86_64.rpm9libreoffice-help-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmqautocorr-zh-7.1.8.1-14.el9_4.alma.1.noarch.rpmbautocorr-lb-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmBlibreoffice-help-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpm,libreoffice-help-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpmulibreoffice-langpack-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpm}libreoffice-langpack-ml-7.1.8.1-14.el9_4.alma.1.x86_64.rpmblibreoffice-langpack-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpm>libreoffice-help-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpmYautocorr-fr-7.1.8.1-14.el9_4.alma.1.noarch.rpm$libreoffice-emailmerge-7.1.8.1-14.el9_4.alma.1.x86_64.rpmHlibreoffice-help-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm)libreoffice-help-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpm+libreoffice-help-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-te-7.1.8.1-14.el9_4.alma.1.x86_64.rpmvlibreoffice-langpack-ja-7.1.8.1-14.el9_4.alma.1.x86_64.rpmJlibreoffice-help-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpmaautocorr-ko-7.1.8.1-14.el9_4.alma.1.noarch.rpmLlibreoffice-help-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpm#libreoffice-draw-7.1.8.1-14.el9_4.alma.1.x86_64.rpmolibreoffice-langpack-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmjlibreoffice-langpack-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm5libreoffice-help-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpm.libreoffice-help-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-ru-7.1.8.1-14.el9_4.alma.1.x86_64.rpmeautocorr-nl-7.1.8.1-14.el9_4.alma.1.noarch.rpmUautocorr-en-7.1.8.1-14.el9_4.alma.1.noarch.rpmklibreoffice-langpack-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm2libreoffice-help-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpmSautocorr-dsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmNlibreoffice-help-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm^autocorr-is-7.1.8.1-14.el9_4.alma.1.noarch.rpmZautocorr-ga-7.1.8.1-14.el9_4.alma.1.noarch.rpm;libreoffice-help-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-ure-common-7.1.8.1-14.el9_4.alma.1.noarch.rpmIlibreoffice-help-pt-BR-7.1.8.1-14.el9_4.alma.1.x86_64.rpmrlibreoffice-langpack-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm]libreoffice-langpack-ca-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-xh-7.1.8.1-14.el9_4.alma.1.x86_64.rpm\libreoffice-langpack-br-7.1.8.1-14.el9_4.alma.1.x86_64.rpm`libreoffice-langpack-da-7.1.8.1-14.el9_4.alma.1.x86_64.rpmpautocorr-vro-7.1.8.1-14.el9_4.alma.1.noarch.rpmTlibreoffice-help-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpmalibreoffice-langpack-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpmVautocorr-es-7.1.8.1-14.el9_4.alma.1.noarch.rpm1libreoffice-help-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpmElibreoffice-help-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm-libreoffice-help-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-sr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-data-7.1.8.1-14.el9_4.alma.1.noarch.rpmDlibreoffice-help-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmwlibreoffice-langpack-kk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmglibreoffice-langpack-et-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pa-7.1.8.1-14.el9_4.alma.1.x86_64.rpm|libreoffice-langpack-mai-7.1.8.1-14.el9_4.alma.1.x86_64.rpmOlibreoffice-help-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nso-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-base-7.1.8.1-14.el9_4.alma.1.x86_64.rpmKlibreoffice-help-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlautocorr-sr-7.1.8.1-14.el9_4.alma.1.noarch.rpmXautocorr-fi-7.1.8.1-14.el9_4.alma.1.noarch.rpm8libreoffice-help-fr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmslibreoffice-langpack-hu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpm`autocorr-ja-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-ogltrans-7.1.8.1-14.el9_4.alma.1.x86_64.rpmSlibreoffice-help-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-pdfimport-7.1.8.1-14.el9_4.alma.1.x86_64.rpmilibreoffice-langpack-fa-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpm[autocorr-hr-7.1.8.1-14.el9_4.alma.1.noarch.rpmWautocorr-fa-7.1.8.1-14.el9_4.alma.1.noarch.rpmylibreoffice-langpack-ko-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-sk-7.1.8.1-14.el9_4.alma.1.x86_64.rpmGlibreoffice-help-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm"libreoffice-core-7.1.8.1-14.el9_4.alma.1.x86_64.rpm'libreoffice-graphicfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpmiautocorr-ru-7.1.8.1-14.el9_4.alma.1.noarch.rpmClibreoffice-help-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpmhlibreoffice-langpack-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmWlibreoffice-langpack-af-7.1.8.1-14.el9_4.alma.1.x86_64.rpmhautocorr-ro-7.1.8.1-14.el9_4.alma.1.noarch.rpm&libreoffice-xsltfilter-7.1.8.1-14.el9_4.alma.1.x86_64.rpm0libreoffice-help-dz-7.1.8.1-14.el9_4.alma.1.x86_64.rpm<libreoffice-help-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpmcautocorr-lt-7.1.8.1-14.el9_4.alma.1.noarch.rpmOautocorr-ca-7.1.8.1-14.el9_4.alma.1.noarch.rpmZlibreoffice-langpack-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpm=libreoffice-help-hr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmflibreoffice-langpack-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpmclibreoffice-langpack-el-7.1.8.1-14.el9_4.alma.1.x86_64.rpm4libreoffice-help-es-7.1.8.1-14.el9_4.alma.1.x86_64.rpm$libreoffice-writer-7.1.8.1-14.el9_4.alma.1.x86_64.rpm'libreofficekit-7.1.8.1-14.el9_4.alma.1.x86_64.rpm libreoffice-langpack-sl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ts-7.1.8.1-14.el9_4.alma.1.x86_64.rpm%libreoffice-x11-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm_autocorr-it-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-or-7.1.8.1-14.el9_4.alma.1.x86_64.rpmYlibreoffice-langpack-as-7.1.8.1-14.el9_4.alma.1.x86_64.rpm!libreoffice-pyuno-7.1.8.1-14.el9_4.alma.1.x86_64.rpmMautocorr-af-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-pt-PT-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nb-7.1.8.1-14.el9_4.alma.1.x86_64.rpm{libreoffice-langpack-lv-7.1.8.1-14.el9_4.alma.1.x86_64.rpm3libreoffice-help-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpm*libreoffice-help-bg-7.1.8.1-14.el9_4.alma.1.x86_64.rpmzlibreoffice-langpack-lt-7.1.8.1-14.el9_4.alma.1.x86_64.rpmVlibreoffice-impress-7.1.8.1-14.el9_4.alma.1.x86_64.rpm7libreoffice-help-fi-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-ss-7.1.8.1-14.el9_4.alma.1.x86_64.rpmelibreoffice-langpack-eo-7.1.8.1-14.el9_4.alma.1.x86_64.rpmXlibreoffice-langpack-ar-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-zh-Hans-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-th-7.1.8.1-14.el9_4.alma.1.x86_64.rpm&libreoffice-gdb-debug-support-7.1.8.1-14.el9_4.alma.1.x86_64.rpmtlibreoffice-langpack-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpm]autocorr-hu-7.1.8.1-14.el9_4.alma.1.noarch.rpm_libreoffice-langpack-cy-7.1.8.1-14.el9_4.alma.1.x86_64.rpm[libreoffice-langpack-bn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmNautocorr-bg-7.1.8.1-14.el9_4.alma.1.noarch.rpmqlibreoffice-langpack-hi-7.1.8.1-14.el9_4.alma.1.x86_64.rpm#libreoffice-wiki-publisher-7.1.8.1-14.el9_4.alma.1.x86_64.rpm"libreoffice-ure-7.1.8.1-14.el9_4.alma.1.x86_64.rpm@libreoffice-help-it-7.1.8.1-14.el9_4.alma.1.x86_64.rpmUlibreoffice-help-zh-Hant-7.1.8.1-14.el9_4.alma.1.x86_64.rpmQautocorr-da-7.1.8.1-14.el9_4.alma.1.noarch.rpm6libreoffice-help-eu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmllibreoffice-langpack-fy-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-pl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmRautocorr-de-7.1.8.1-14.el9_4.alma.1.noarch.rpm(libreoffice-gtk3-7.1.8.1-14.el9_4.alma.1.x86_64.rpmMlibreoffice-help-si-7.1.8.1-14.el9_4.alma.1.x86_64.rpmmautocorr-sv-7.1.8.1-14.el9_4.alma.1.noarch.rpmgautocorr-pt-7.1.8.1-14.el9_4.alma.1.noarch.rpmPautocorr-cs-7.1.8.1-14.el9_4.alma.1.noarch.rpmplibreoffice-langpack-he-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-nn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmoautocorr-vi-7.1.8.1-14.el9_4.alma.1.noarch.rpmxlibreoffice-langpack-kn-7.1.8.1-14.el9_4.alma.1.x86_64.rpmdlibreoffice-langpack-en-7.1.8.1-14.el9_4.alma.1.x86_64.rpmjautocorr-sk-7.1.8.1-14.el9_4.alma.1.noarch.rpm libreoffice-langpack-ro-7.1.8.1-14.el9_4.alma.1.x86_64.rpm\autocorr-hsb-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-math-7.1.8.1-14.el9_4.alma.1.x86_64.rpm?libreoffice-help-id-7.1.8.1-14.el9_4.alma.1.x86_64.rpmRlibreoffice-help-tr-7.1.8.1-14.el9_4.alma.1.x86_64.rpmQlibreoffice-help-ta-7.1.8.1-14.el9_4.alma.1.x86_64.rpm/libreoffice-help-de-7.1.8.1-14.el9_4.alma.1.x86_64.rpmnlibreoffice-langpack-gl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-opensymbol-fonts-7.1.8.1-14.el9_4.alma.1.noarch.rpmnautocorr-tr-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-ve-7.1.8.1-14.el9_4.alma.1.x86_64.rpmmlibreoffice-langpack-ga-7.1.8.1-14.el9_4.alma.1.x86_64.rpmkautocorr-sl-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-zu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmdautocorr-mn-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-st-7.1.8.1-14.el9_4.alma.1.x86_64.rpm:libreoffice-help-gu-7.1.8.1-14.el9_4.alma.1.x86_64.rpmTautocorr-el-7.1.8.1-14.el9_4.alma.1.noarch.rpmlibreoffice-langpack-tn-7.1.8.1-14.el9_4.alma.1.x86_64.rpm!libreoffice-calc-7.1.8.1-14.el9_4.alma.1.x86_64.rpmFlibreoffice-help-nl-7.1.8.1-14.el9_4.alma.1.x86_64.rpmPlibreoffice-help-sv-7.1.8.1-14.el9_4.alma.1.x86_64.rpmlibreoffice-langpack-uk-7.1.8.1-14.el9_4.alma.1.x86_64.rpm^libreoffice-langpack-cs-7.1.8.1-14.el9_4.alma.1.x86_64.rpm~libreoffice-langpack-mr-7.1.8.1-14.el9_4.alma.1.x86_64.rpm1 IBBBBBBsecurityImportant: tomcat security update~|https://access.redhat.com/errata/RHSA-2024:5693RHSA-2024:5693RHSA-2024:5693 https://access.redhat.com/security/cve/CVE-2024-34750CVE-2024-34750CVE-2024-34750https://bugzilla.redhat.com/22956512295651https://errata.almalinux.org/9/ALSA-2024-5693.htmlALSA-2024:5693ALSA-2024:5693 i"tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpmk"tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpml"tomcat-lib-9.0.87-1.el9_4.2.noarch.rpmm"tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpmn"tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpmh"tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpmj"tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpmg"tomcat-9.0.87-1.el9_4.2.noarch.rpmi"tomcat-docs-webapp-9.0.87-1.el9_4.2.noarch.rpmk"tomcat-jsp-2.3-api-9.0.87-1.el9_4.2.noarch.rpml"tomcat-lib-9.0.87-1.el9_4.2.noarch.rpmm"tomcat-servlet-4.0-api-9.0.87-1.el9_4.2.noarch.rpmn"tomcat-webapps-9.0.87-1.el9_4.2.noarch.rpmh"tomcat-admin-webapps-9.0.87-1.el9_4.2.noarch.rpmj"tomcat-el-3.0-api-9.0.87-1.el9_4.2.noarch.rpmg"tomcat-9.0.87-1.el9_4.2.noarch.rpm2 kBaGBBBBBBBsecurityModerate: nodejs:20 security updatez(https://access.redhat.com/errata/RHSA-2024:5815RHSA-2024:5815RHSA-2024:5815 https://access.redhat.com/security/cve/CVE-2024-22018CVE-2024-22018CVE-2024-22018https://access.redhat.com/security/cve/CVE-2024-22020CVE-2024-22020CVE-2024-22020https://access.redhat.com/security/cve/CVE-2024-36137CVE-2024-36137CVE-2024-36137https://bugzilla.redhat.com/22964172296417https://bugzilla.redhat.com/22969902296990https://bugzilla.redhat.com/22992812299281https://errata.almalinux.org/9/ALSA-2024-5815.htmlALSA-2024:5815ALSA-2024:5815 +2q'd nodejs-full-i18n-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm< nodejs-docs-20.16.0-1.module_el9.4.0+107+dbd477e4.noarch.rpm+ nodejs-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm! nodejs-devel-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpmk<nodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpmWnodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmWnodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmccnpm-10.8.1-1.20.16.0.1.module_el9.4.0+107+dbd477e4.x86_64.rpm+2q'd nodejs-full-i18n-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm< nodejs-docs-20.16.0-1.module_el9.4.0+107+dbd477e4.noarch.rpm+ nodejs-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpm! nodejs-devel-20.16.0-1.module_el9.4.0+107+dbd477e4.x86_64.rpmk<nodejs-nodemon-3.0.1-1.module_el9.3.0+47+c33bc288.noarch.rpmWnodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmWnodejs-packaging-bundler-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpmccnpm-10.8.1-1.20.16.0.1.module_el9.4.0+107+dbd477e4.x86_64.rpmi3 -\BBBBBBBBBBBBBBBsecurityImportant: kernel security update"Thttps://access.redhat.com/errata/RHSA-2024:5928RHSA-2024:5928RHSA-2024:5928 https://access.redhat.com/security/cve/CVE-2023-52771CVE-2023-52771CVE-2023-52771https://access.redhat.com/security/cve/CVE-2023-52880CVE-2023-52880CVE-2023-52880https://access.redhat.com/security/cve/CVE-2024-26581CVE-2024-26581CVE-2024-26581https://access.redhat.com/security/cve/CVE-2024-26668CVE-2024-26668CVE-2024-26668https://access.redhat.com/security/cve/CVE-2024-26810CVE-2024-26810CVE-2024-26810https://access.redhat.com/security/cve/CVE-2024-26855CVE-2024-26855CVE-2024-26855https://access.redhat.com/security/cve/CVE-2024-26908CVE-2024-26908CVE-2024-26908https://access.redhat.com/security/cve/CVE-2024-26925CVE-2024-26925CVE-2024-26925https://access.redhat.com/security/cve/CVE-2024-27016CVE-2024-27016CVE-2024-27016https://access.redhat.com/security/cve/CVE-2024-27019CVE-2024-27019CVE-2024-27019https://access.redhat.com/security/cve/CVE-2024-27020CVE-2024-27020CVE-2024-27020https://access.redhat.com/security/cve/CVE-2024-27415CVE-2024-27415CVE-2024-27415https://access.redhat.com/security/cve/CVE-2024-35839CVE-2024-35839CVE-2024-35839https://access.redhat.com/security/cve/CVE-2024-35896CVE-2024-35896CVE-2024-35896https://access.redhat.com/security/cve/CVE-2024-35897CVE-2024-35897CVE-2024-35897https://access.redhat.com/security/cve/CVE-2024-35898CVE-2024-35898CVE-2024-35898https://access.redhat.com/security/cve/CVE-2024-35962CVE-2024-35962CVE-2024-35962https://access.redhat.com/security/cve/CVE-2024-36003CVE-2024-36003CVE-2024-36003https://access.redhat.com/security/cve/CVE-2024-36025CVE-2024-36025CVE-2024-36025https://access.redhat.com/security/cve/CVE-2024-38538CVE-2024-38538CVE-2024-38538https://access.redhat.com/security/cve/CVE-2024-38540CVE-2024-38540CVE-2024-38540https://access.redhat.com/security/cve/CVE-2024-38544CVE-2024-38544CVE-2024-38544https://access.redhat.com/security/cve/CVE-2024-38579CVE-2024-38579CVE-2024-38579https://access.redhat.com/security/cve/CVE-2024-38608CVE-2024-38608CVE-2024-38608https://access.redhat.com/security/cve/CVE-2024-39476CVE-2024-39476CVE-2024-39476https://access.redhat.com/security/cve/CVE-2024-40905CVE-2024-40905CVE-2024-40905https://access.redhat.com/security/cve/CVE-2024-40911CVE-2024-40911CVE-2024-40911https://access.redhat.com/security/cve/CVE-2024-40912CVE-2024-40912CVE-2024-40912https://access.redhat.com/security/cve/CVE-2024-40914CVE-2024-40914CVE-2024-40914https://access.redhat.com/security/cve/CVE-2024-40929CVE-2024-40929CVE-2024-40929https://access.redhat.com/security/cve/CVE-2024-40939CVE-2024-40939CVE-2024-40939https://access.redhat.com/security/cve/CVE-2024-40941CVE-2024-40941CVE-2024-40941https://access.redhat.com/security/cve/CVE-2024-40957CVE-2024-40957CVE-2024-40957https://access.redhat.com/security/cve/CVE-2024-40978CVE-2024-40978CVE-2024-40978https://access.redhat.com/security/cve/CVE-2024-40983CVE-2024-40983CVE-2024-40983https://access.redhat.com/security/cve/CVE-2024-41041CVE-2024-41041CVE-2024-41041https://access.redhat.com/security/cve/CVE-2024-41076CVE-2024-41076CVE-2024-41076https://access.redhat.com/security/cve/CVE-2024-41090CVE-2024-41090CVE-2024-41090https://access.redhat.com/security/cve/CVE-2024-41091CVE-2024-41091CVE-2024-41091https://access.redhat.com/security/cve/CVE-2024-42110CVE-2024-42110CVE-2024-42110https://access.redhat.com/security/cve/CVE-2024-42152CVE-2024-42152CVE-2024-42152https://bugzilla.redhat.com/22651852265185https://bugzilla.redhat.com/22727972272797https://bugzilla.redhat.com/22736542273654https://bugzilla.redhat.com/22757422275742https://bugzilla.redhat.com/22757442275744https://bugzilla.redhat.com/22771662277166https://bugzilla.redhat.com/22782562278256https://bugzilla.redhat.com/22782582278258https://bugzilla.redhat.com/22782642278264https://bugzilla.redhat.com/22811012281101https://bugzilla.redhat.com/22812842281284https://bugzilla.redhat.com/22816692281669https://bugzilla.redhat.com/22816722281672https://bugzilla.redhat.com/22816752281675https://bugzilla.redhat.com/22819162281916https://bugzilla.redhat.com/22819582281958https://bugzilla.redhat.com/22827202282720https://bugzilla.redhat.com/22834682283468https://bugzilla.redhat.com/22844212284421https://bugzilla.redhat.com/22933562293356https://bugzilla.redhat.com/22934142293414https://bugzilla.redhat.com/22934552293455https://bugzilla.redhat.com/22934592293459https://bugzilla.redhat.com/22934612293461https://bugzilla.redhat.com/22959142295914https://bugzilla.redhat.com/22974892297489https://bugzilla.redhat.com/22974952297495https://bugzilla.redhat.com/22974962297496https://bugzilla.redhat.com/22974982297498https://bugzilla.redhat.com/22975132297513https://bugzilla.redhat.com/22975232297523https://bugzilla.redhat.com/22975252297525https://bugzilla.redhat.com/22975412297541https://bugzilla.redhat.com/22975622297562https://bugzilla.redhat.com/22975672297567https://bugzilla.redhat.com/22992402299240https://bugzilla.redhat.com/22993362299336https://bugzilla.redhat.com/23004102300410https://bugzilla.redhat.com/23004532300453https://bugzilla.redhat.com/23014732301473https://bugzilla.redhat.com/23015192301519https://errata.almalinux.org/9/ALSA-2024-5928.htmlALSA-2024:5928ALSA-2024:5928 $Bkernel-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm"Bkernel-debug-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm#Bkernel-devel-5.14.0-427.33.1.el9_4.x86_64.rpm(Bkernel-headers-5.14.0-427.33.1.el9_4.x86_64.rpm%Bperf-5.14.0-427.33.1.el9_4.x86_64.rpm)Brtla-5.14.0-427.33.1.el9_4.x86_64.rpm!Bkernel-debug-devel-5.14.0-427.33.1.el9_4.x86_64.rpmBkernel-doc-5.14.0-427.33.1.el9_4.noarch.rpm*Brv-5.14.0-427.33.1.el9_4.x86_64.rpm $Bkernel-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm"Bkernel-debug-devel-matched-5.14.0-427.33.1.el9_4.x86_64.rpm#Bkernel-devel-5.14.0-427.33.1.el9_4.x86_64.rpm(Bkernel-headers-5.14.0-427.33.1.el9_4.x86_64.rpm%Bperf-5.14.0-427.33.1.el9_4.x86_64.rpm)Brtla-5.14.0-427.33.1.el9_4.x86_64.rpm!Bkernel-debug-devel-5.14.0-427.33.1.el9_4.x86_64.rpmBkernel-doc-5.14.0-427.33.1.el9_4.noarch.rpm*Brv-5.14.0-427.33.1.el9_4.x86_64.rpm&4 _BBBMBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update:lhttps://access.redhat.com/errata/RHSA-2024:5929RHSA-2024:5929RHSA-2024:5929 https://access.redhat.com/security/cve/CVE-2024-4317CVE-2024-4317CVE-2024-4317https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/22799352279935https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-5929.htmlALSA-2024:5929ALSA-2024:5929 YAr'6|postgresql-server-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm9|postgresql-upgrade-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm|postgresql-server-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm8|postgresql-test-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm3Epostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm2Bpgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm|postgresql-plpython3-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmY|postgresql-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm7|postgresql-static-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm|postgresql-private-libs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm4|postgresql-test-rpm-macros-16.4-1.module_el9.4.0+109+624ac33a.noarch.rpm|postgresql-plperl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm|postgresql-pltcl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm|postgresql-upgrade-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm4|postgresql-docs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm|postgresql-contrib-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm5|postgresql-private-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm1pg_repack-1.4.8-1.module_el9.4.0+66+eb9878bc.x86_64.rpmYAr'6|postgresql-server-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm9|postgresql-upgrade-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm|postgresql-server-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm8|postgresql-test-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm3Epostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm2Bpgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm|postgresql-plpython3-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpmY|postgresql-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm7|postgresql-static-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm|postgresql-private-libs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm4|postgresql-test-rpm-macros-16.4-1.module_el9.4.0+109+624ac33a.noarch.rpm|postgresql-plperl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm|postgresql-pltcl-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm|postgresql-upgrade-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm4|postgresql-docs-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm|postgresql-contrib-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm5|postgresql-private-devel-16.4-1.module_el9.4.0+109+624ac33a.x86_64.rpm1pg_repack-1.4.8-1.module_el9.4.0+66+eb9878bc.x86_64.rpm5 NBBBBBBBBBBBBBBsecurityImportant: postgresql security update&https://access.redhat.com/errata/RHSA-2024:5999RHSA-2024:5999RHSA-2024:5999 https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-5999.htmlALSA-2024:5999ALSA-2024:5999 postgresql-pltcl-13.16-1.el9_4.x86_64.rpmpostgresql-plpython3-13.16-1.el9_4.x86_64.rpmpostgresql-contrib-13.16-1.el9_4.x86_64.rpmYpostgresql-13.16-1.el9_4.x86_64.rpmpostgresql-server-13.16-1.el9_4.x86_64.rpmpostgresql-upgrade-13.16-1.el9_4.x86_64.rpmpostgresql-private-libs-13.16-1.el9_4.x86_64.rpmpostgresql-plperl-13.16-1.el9_4.x86_64.rpmpostgresql-pltcl-13.16-1.el9_4.x86_64.rpmpostgresql-plpython3-13.16-1.el9_4.x86_64.rpmpostgresql-contrib-13.16-1.el9_4.x86_64.rpmYpostgresql-13.16-1.el9_4.x86_64.rpmpostgresql-server-13.16-1.el9_4.x86_64.rpmpostgresql-upgrade-13.16-1.el9_4.x86_64.rpmpostgresql-private-libs-13.16-1.el9_4.x86_64.rpmpostgresql-plperl-13.16-1.el9_4.x86_64.rpmz6 >[BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update+lhttps://access.redhat.com/errata/RHSA-2024:6020RHSA-2024:6020RHSA-2024:6020 https://access.redhat.com/security/cve/CVE-2024-4317CVE-2024-4317CVE-2024-4317https://access.redhat.com/security/cve/CVE-2024-7348CVE-2024-7348CVE-2024-7348https://bugzilla.redhat.com/22799352279935https://bugzilla.redhat.com/23036822303682https://errata.almalinux.org/9/ALSA-2024-6020.htmlALSA-2024:6020ALSA-2024:6020 Y.s'xpostgresql-plpython3-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm2=pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm9xpostgresql-upgrade-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmYxpostgresql-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmxpostgresql-plperl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmxpostgresql-server-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm4xpostgresql-docs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmxpostgresql-pltcl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm1pg_repack-1.4.8-1.module_el9.3.0+52+21733919.x86_64.rpmxpostgresql-private-libs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm5xpostgresql-private-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmxpostgresql-upgrade-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm6xpostgresql-server-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm7xpostgresql-static-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmxpostgresql-contrib-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm4xpostgresql-test-rpm-macros-15.8-1.module_el9.4.0+111+667b9e9e.noarch.rpm8xpostgresql-test-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmY.s'xpostgresql-plpython3-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm2=pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm9xpostgresql-upgrade-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmYxpostgresql-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmxpostgresql-plperl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmxpostgresql-server-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpm4xpostgresql-docs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmxpostgresql-pltcl-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm1pg_repack-1.4.8-1.module_el9.3.0+52+21733919.x86_64.rpmxpostgresql-private-libs-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm5xpostgresql-private-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmxpostgresql-upgrade-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm6xpostgresql-server-devel-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm7xpostgresql-static-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmxpostgresql-contrib-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpm4xpostgresql-test-rpm-macros-15.8-1.module_el9.4.0+111+667b9e9e.noarch.rpm8xpostgresql-test-15.8-1.module_el9.4.0+111+667b9e9e.x86_64.rpmK7 BBBBBBBBsecurityModerate: python3.12 security updatehttps://access.redhat.com/errata/RHSA-2024:6146RHSA-2024:6146RHSA-2024:6146 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6146.htmlALSA-2024:6146ALSA-2024:6146 ; python3.12-tkinter-3.12.1-4.el9_4.3.x86_64.rpm python3.12-devel-3.12.1-4.el9_4.3.x86_64.rpm python3.12-libs-3.12.1-4.el9_4.3.i686.rpm python3.12-libs-3.12.1-4.el9_4.3.x86_64.rpm: python3.12-3.12.1-4.el9_4.3.x86_64.rpm python3.12-devel-3.12.1-4.el9_4.3.i686.rpm; python3.12-tkinter-3.12.1-4.el9_4.3.x86_64.rpm python3.12-devel-3.12.1-4.el9_4.3.x86_64.rpm python3.12-libs-3.12.1-4.el9_4.3.i686.rpm python3.12-libs-3.12.1-4.el9_4.3.x86_64.rpm: python3.12-3.12.1-4.el9_4.3.x86_64.rpm python3.12-devel-3.12.1-4.el9_4.3.i686.rpm&8 TBFqBBBBBBBsecurityModerate: nodejs:18 security update3https://access.redhat.com/errata/RHSA-2024:6147RHSA-2024:6147RHSA-2024:6147 https://access.redhat.com/security/cve/CVE-2024-22020CVE-2024-22020CVE-2024-22020https://access.redhat.com/security/cve/CVE-2024-28863CVE-2024-28863CVE-2024-28863https://bugzilla.redhat.com/22932002293200https://bugzilla.redhat.com/22964172296417https://errata.almalinux.org/9/ALSA-2024-6147.htmlALSA-2024:6147ALSA-2024:6147 +nt'k2nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmd nodejs-full-i18n-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm+ nodejs-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm< nodejs-docs-18.20.4-1.module_el9.4.0+112+bb28ff81.noarch.rpmcbnpm-10.7.0-1.18.20.4.1.module_el9.4.0+112+bb28ff81.x86_64.rpm! nodejs-devel-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm+nt'k2nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpm|nodejs-packaging-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpmd nodejs-full-i18n-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm|nodejs-packaging-bundler-2021.06-4.module_el9.1.0+13+d9a595ea.noarch.rpm+ nodejs-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpm< nodejs-docs-18.20.4-1.module_el9.4.0+112+bb28ff81.noarch.rpmcbnpm-10.7.0-1.18.20.4.1.module_el9.4.0+112+bb28ff81.x86_64.rpm! nodejs-devel-18.20.4-1.module_el9.4.0+112+bb28ff81.x86_64.rpmܕ9 TBBBBsecurityModerate: python3.9 security updateGhhttps://access.redhat.com/errata/RHSA-2024:6163RHSA-2024:6163RHSA-2024:6163 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6163.htmlALSA-2024:6163ALSA-2024:6163 Rfpython3-devel-3.9.18-3.el9_4.5.x86_64.rpm1fpython3-tkinter-3.9.18-3.el9_4.5.x86_64.rpmRfpython3-devel-3.9.18-3.el9_4.5.i686.rpmgfpython-unversioned-command-3.9.18-3.el9_4.5.noarch.rpmRfpython3-devel-3.9.18-3.el9_4.5.x86_64.rpm1fpython3-tkinter-3.9.18-3.el9_4.5.x86_64.rpmRfpython3-devel-3.9.18-3.el9_4.5.i686.rpmgfpython-unversioned-command-3.9.18-3.el9_4.5.noarch.rpm: [BsecurityModerate: krb5 security update/https://access.redhat.com/errata/RHSA-2024:6166RHSA-2024:6166RHSA-2024:6166 https://access.redhat.com/security/cve/CVE-2024-37370CVE-2024-37370CVE-2024-37370https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/22946772294677https://errata.almalinux.org/9/ALSA-2024-6166.htmlALSA-2024:6166ALSA-2024:6166 Skrb5-devel-1.21.1-2.el9_4.i686.rpmSkrb5-devel-1.21.1-2.el9_4.x86_64.rpmSkrb5-devel-1.21.1-2.el9_4.i686.rpmSkrb5-devel-1.21.1-2.el9_4.x86_64.rpm; )_BBBBBBBBsecurityModerate: python3.11 security update5hhttps://access.redhat.com/errata/RHSA-2024:6179RHSA-2024:6179RHSA-2024:6179 https://access.redhat.com/security/cve/CVE-2024-6923CVE-2024-6923CVE-2024-6923https://bugzilla.redhat.com/23022552302255https://errata.almalinux.org/9/ALSA-2024-6179.htmlALSA-2024:6179ALSA-2024:6179 _python3.11-libs-3.11.7-1.el9_4.5.i686.rpm^python3.11-devel-3.11.7-1.el9_4.5.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.5.i686.rpmpython3.11-3.11.7-1.el9_4.5.x86_64.rpm_python3.11-libs-3.11.7-1.el9_4.5.x86_64.rpmpython3.11-tkinter-3.11.7-1.el9_4.5.x86_64.rpm_python3.11-libs-3.11.7-1.el9_4.5.i686.rpm^python3.11-devel-3.11.7-1.el9_4.5.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.5.i686.rpmpython3.11-3.11.7-1.el9_4.5.x86_64.rpm_python3.11-libs-3.11.7-1.el9_4.5.x86_64.rpmpython3.11-tkinter-3.11.7-1.el9_4.5.x86_64.rpm7< 2jBBBBBBsecurityModerate: orc security updateQhttps://access.redhat.com/errata/RHSA-2024:6184RHSA-2024:6184RHSA-2024:6184 https://access.redhat.com/security/cve/CVE-2024-40897CVE-2024-40897CVE-2024-40897https://bugzilla.redhat.com/23000102300010https://errata.almalinux.org/9/ALSA-2024-6184.htmlALSA-2024:6184ALSA-2024:6184 9-orc-devel-0.4.31-7.el9_4.i686.rpm8-orc-0.4.31-7.el9_4.x86_64.rpm9-orc-devel-0.4.31-7.el9_4.x86_64.rpmD-orc-compiler-0.4.31-7.el9_4.x86_64.rpm8-orc-0.4.31-7.el9_4.i686.rpm9-orc-devel-0.4.31-7.el9_4.i686.rpm8-orc-0.4.31-7.el9_4.x86_64.rpm9-orc-devel-0.4.31-7.el9_4.x86_64.rpmD-orc-compiler-0.4.31-7.el9_4.x86_64.rpm8-orc-0.4.31-7.el9_4.i686.rpm,= 5ssecurityModerate: containernetworking-plugins security updatenhttps://access.redhat.com/errata/RHSA-2024:6186RHSA-2024:6186RHSA-2024:6186 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6186.htmlALSA-2024:6186ALSA-2024:6186 JYcontainernetworking-plugins-1.4.0-5.el9_4.x86_64.rpmJYcontainernetworking-plugins-1.4.0-5.el9_4.x86_64.rpmm> 8vsecurityModerate: gvisor-tap-vsock security update}Ohttps://access.redhat.com/errata/RHSA-2024:6187RHSA-2024:6187RHSA-2024:6187 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6187.htmlALSA-2024:6187ALSA-2024:6187 wtgvisor-tap-vsock-0.7.3-5.el9_4.alma.1.x86_64.rpmwtgvisor-tap-vsock-0.7.3-5.el9_4.alma.1.x86_64.rpmܜQ? ;ysecurityModerate: runc security updateL9https://access.redhat.com/errata/RHSA-2024:6188RHSA-2024:6188RHSA-2024:6188 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6188.htmlALSA-2024:6188ALSA-2024:6188 WZrunc-1.1.12-4.el9_4.x86_64.rpmWZrunc-1.1.12-4.el9_4.x86_64.rpm:@ |BBsecurityModerate: buildah security updatehttps://access.redhat.com/errata/RHSA-2024:6189RHSA-2024:6189RHSA-2024:6189 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6189.htmlALSA-2024:6189ALSA-2024:6189 =buildah-tests-1.33.7-4.el9_4.x86_64.rpm<buildah-1.33.7-4.el9_4.x86_64.rpm=buildah-tests-1.33.7-4.el9_4.x86_64.rpm<buildah-1.33.7-4.el9_4.x86_64.rpmܛ}A AsecurityModerate: wget security updatehttps://access.redhat.com/errata/RHSA-2024:6192RHSA-2024:6192RHSA-2024:6192 https://access.redhat.com/security/cve/CVE-2024-38428CVE-2024-38428CVE-2024-38428https://bugzilla.redhat.com/22928362292836https://errata.almalinux.org/9/ALSA-2024-6192.htmlALSA-2024:6192ALSA-2024:6192 /wget-1.21.1-8.el9_4.x86_64.rpm/wget-1.21.1-8.el9_4.x86_64.rpmfB DBBBBBBBsecurityImportant: podman security update=https://access.redhat.com/errata/RHSA-2024:6194RHSA-2024:6194RHSA-2024:6194 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://access.redhat.com/security/cve/CVE-2024-37298CVE-2024-37298CVE-2024-37298https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22680192268019https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22950102295010https://errata.almalinux.org/9/ALSA-2024-6194.htmlALSA-2024:6194ALSA-2024:6194 -podman-4.9.4-10.el9_4.x86_64.rpm0podman-tests-4.9.4-10.el9_4.x86_64.rpm/podman-remote-4.9.4-10.el9_4.x86_64.rpmfpodman-docker-4.9.4-10.el9_4.noarch.rpm.podman-plugins-4.9.4-10.el9_4.x86_64.rpm-podman-4.9.4-10.el9_4.x86_64.rpm0podman-tests-4.9.4-10.el9_4.x86_64.rpm/podman-remote-4.9.4-10.el9_4.x86_64.rpmfpodman-docker-4.9.4-10.el9_4.noarch.rpm.podman-plugins-4.9.4-10.el9_4.x86_64.rpmC NBBsecurityModerate: skopeo security update[Vhttps://access.redhat.com/errata/RHSA-2024:6195RHSA-2024:6195RHSA-2024:6195 https://access.redhat.com/security/cve/CVE-2024-24783CVE-2024-24783CVE-2024-24783https://bugzilla.redhat.com/22680192268019https://errata.almalinux.org/9/ALSA-2024-6195.htmlALSA-2024:6195ALSA-2024:6195 ;skopeo-1.14.5-1.el9_4.x86_64.rpm<skopeo-tests-1.14.5-1.el9_4.x86_64.rpm;skopeo-1.14.5-1.el9_4.x86_64.rpm<skopeo-tests-1.14.5-1.el9_4.x86_64.rpmܛ'D !SBBBBBBBBBBBBsecurityModerate: ghostscript security update1Mhttps://access.redhat.com/errata/RHSA-2024:6197RHSA-2024:6197RHSA-2024:6197 https://access.redhat.com/security/cve/CVE-2024-29510CVE-2024-29510CVE-2024-29510https://access.redhat.com/security/cve/CVE-2024-33869CVE-2024-33869CVE-2024-33869https://access.redhat.com/security/cve/CVE-2024-33870CVE-2024-33870CVE-2024-33870https://bugzilla.redhat.com/22939502293950https://bugzilla.redhat.com/22939582293958https://bugzilla.redhat.com/22939592293959https://errata.almalinux.org/9/ALSA-2024-6197.htmlALSA-2024:6197ALSA-2024:6197 wQghostscript-tools-printing-9.54.0-17.el9_4.x86_64.rpmvQghostscript-tools-fonts-9.54.0-17.el9_4.x86_64.rpmTQlibgs-9.54.0-17.el9_4.x86_64.rpmtQghostscript-9.54.0-17.el9_4.x86_64.rpmMQghostscript-doc-9.54.0-17.el9_4.noarch.rpmxQghostscript-x11-9.54.0-17.el9_4.x86_64.rpmuQghostscript-tools-dvipdf-9.54.0-17.el9_4.x86_64.rpmTQlibgs-9.54.0-17.el9_4.i686.rpmwQghostscript-tools-printing-9.54.0-17.el9_4.x86_64.rpmvQghostscript-tools-fonts-9.54.0-17.el9_4.x86_64.rpmTQlibgs-9.54.0-17.el9_4.x86_64.rpmtQghostscript-9.54.0-17.el9_4.x86_64.rpmMQghostscript-doc-9.54.0-17.el9_4.noarch.rpmxQghostscript-x11-9.54.0-17.el9_4.x86_64.rpmuQghostscript-tools-dvipdf-9.54.0-17.el9_4.x86_64.rpmTQlibgs-9.54.0-17.el9_4.i686.rpm1E *bBBBBBBsecurityImportant: bubblewrap and flatpak security update~Jhttps://access.redhat.com/errata/RHSA-2024:6356RHSA-2024:6356RHSA-2024:6356 https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://bugzilla.redhat.com/23052022305202https://errata.almalinux.org/9/ALSA-2024-6356.htmlALSA-2024:6356ALSA-2024:6356 1flatpak-libs-1.12.9-3.el9_4.x86_64.rpmt1flatpak-selinux-1.12.9-3.el9_4.noarch.rpm1flatpak-session-helper-1.12.9-3.el9_4.x86_64.rpm1flatpak-libs-1.12.9-3.el9_4.i686.rpm1flatpak-1.12.9-3.el9_4.x86_64.rpm1flatpak-libs-1.12.9-3.el9_4.x86_64.rpmt1flatpak-selinux-1.12.9-3.el9_4.noarch.rpm1flatpak-session-helper-1.12.9-3.el9_4.x86_64.rpm1flatpak-libs-1.12.9-3.el9_4.i686.rpm1flatpak-1.12.9-3.el9_4.x86_64.rpmiF 1kBBBBsecurityModerate: glib2 security updateH https://access.redhat.com/errata/RHSA-2024:6464RHSA-2024:6464RHSA-2024:6464 https://access.redhat.com/security/cve/CVE-2024-34397CVE-2024-34397CVE-2024-34397https://bugzilla.redhat.com/22796322279632https://errata.almalinux.org/9/ALSA-2024-6464.htmlALSA-2024:6464ALSA-2024:6464 vGglib2-doc-2.68.4-14.el9_4.1.noarch.rpmGglib2-devel-2.68.4-14.el9_4.1.i686.rpmGglib2-devel-2.68.4-14.el9_4.1.x86_64.rpmGglib2-tests-2.68.4-14.el9_4.1.x86_64.rpmvGglib2-doc-2.68.4-14.el9_4.1.noarch.rpmGglib2-devel-2.68.4-14.el9_4.1.i686.rpmGglib2-devel-2.68.4-14.el9_4.1.x86_64.rpmGglib2-tests-2.68.4-14.el9_4.1.x86_64.rpm3G ;rBBBBBBBsecurityModerate: emacs security updateUjhttps://access.redhat.com/errata/RHSA-2024:6510RHSA-2024:6510RHSA-2024:6510 https://access.redhat.com/security/cve/CVE-2024-39331CVE-2024-39331CVE-2024-39331https://bugzilla.redhat.com/22939422293942https://errata.almalinux.org/9/ALSA-2024-6510.htmlALSA-2024:6510ALSA-2024:6510 @semacs-lucid-27.2-10.el9_4.x86_64.rpm>semacs-27.2-10.el9_4.x86_64.rpm?semacs-common-27.2-10.el9_4.x86_64.rpmAsemacs-nox-27.2-10.el9_4.x86_64.rpmFsemacs-filesystem-27.2-10.el9_4.noarch.rpm@semacs-lucid-27.2-10.el9_4.x86_64.rpm>semacs-27.2-10.el9_4.x86_64.rpm?semacs-common-27.2-10.el9_4.x86_64.rpmAsemacs-nox-27.2-10.el9_4.x86_64.rpmFsemacs-filesystem-27.2-10.el9_4.noarch.rpmH |BBBBBBsecurityModerate: dovecot security update?,https://access.redhat.com/errata/RHSA-2024:6529RHSA-2024:6529RHSA-2024:6529 https://access.redhat.com/security/cve/CVE-2024-23184CVE-2024-23184CVE-2024-23184https://access.redhat.com/security/cve/CVE-2024-23185CVE-2024-23185CVE-2024-23185https://bugzilla.redhat.com/23059092305909https://bugzilla.redhat.com/23059102305910https://errata.almalinux.org/9/ALSA-2024-6529.htmlALSA-2024:6529ALSA-2024:6529 /dovecot-pigeonhole-2.3.16-11.el9_4.1.x86_64.rpm/dovecot-pgsql-2.3.16-11.el9_4.1.x86_64.rpm/dovecot-mysql-2.3.16-11.el9_4.1.x86_64.rpm/dovecot-2.3.16-11.el9_4.1.x86_64.rpm/dovecot-pigeonhole-2.3.16-11.el9_4.1.x86_64.rpm/dovecot-pgsql-2.3.16-11.el9_4.1.x86_64.rpm/dovecot-mysql-2.3.16-11.el9_4.1.x86_64.rpm/dovecot-2.3.16-11.el9_4.1.x86_64.rpm[I EBBBBBBBBBBBBBBBsecurityModerate: kernel security updatekl8https://access.redhat.com/errata/RHSA-2024:6567RHSA-2024:6567RHSA-2024:6567 https://access.redhat.com/security/cve/CVE-2023-52463CVE-2023-52463CVE-2023-52463https://access.redhat.com/security/cve/CVE-2023-52801CVE-2023-52801CVE-2023-52801https://access.redhat.com/security/cve/CVE-2024-26629CVE-2024-26629CVE-2024-26629https://access.redhat.com/security/cve/CVE-2024-26630CVE-2024-26630CVE-2024-26630https://access.redhat.com/security/cve/CVE-2024-26720CVE-2024-26720CVE-2024-26720https://access.redhat.com/security/cve/CVE-2024-26886CVE-2024-26886CVE-2024-26886https://access.redhat.com/security/cve/CVE-2024-26946CVE-2024-26946CVE-2024-26946https://access.redhat.com/security/cve/CVE-2024-35791CVE-2024-35791CVE-2024-35791https://access.redhat.com/security/cve/CVE-2024-35797CVE-2024-35797CVE-2024-35797https://access.redhat.com/security/cve/CVE-2024-35875CVE-2024-35875CVE-2024-35875https://access.redhat.com/security/cve/CVE-2024-36000CVE-2024-36000CVE-2024-36000https://access.redhat.com/security/cve/CVE-2024-36019CVE-2024-36019CVE-2024-36019https://access.redhat.com/security/cve/CVE-2024-36883CVE-2024-36883CVE-2024-36883https://access.redhat.com/security/cve/CVE-2024-36979CVE-2024-36979CVE-2024-36979https://access.redhat.com/security/cve/CVE-2024-38559CVE-2024-38559CVE-2024-38559https://access.redhat.com/security/cve/CVE-2024-38619CVE-2024-38619CVE-2024-38619https://access.redhat.com/security/cve/CVE-2024-40927CVE-2024-40927CVE-2024-40927https://access.redhat.com/security/cve/CVE-2024-40936CVE-2024-40936CVE-2024-40936https://access.redhat.com/security/cve/CVE-2024-41040CVE-2024-41040CVE-2024-41040https://access.redhat.com/security/cve/CVE-2024-41044CVE-2024-41044CVE-2024-41044https://access.redhat.com/security/cve/CVE-2024-41055CVE-2024-41055CVE-2024-41055https://access.redhat.com/security/cve/CVE-2024-41073CVE-2024-41073CVE-2024-41073https://access.redhat.com/security/cve/CVE-2024-41096CVE-2024-41096CVE-2024-41096https://access.redhat.com/security/cve/CVE-2024-42082CVE-2024-42082CVE-2024-42082https://access.redhat.com/security/cve/CVE-2024-42096CVE-2024-42096CVE-2024-42096https://access.redhat.com/security/cve/CVE-2024-42102CVE-2024-42102CVE-2024-42102https://access.redhat.com/security/cve/CVE-2024-42131CVE-2024-42131CVE-2024-42131https://bugzilla.redhat.com/22657972265797https://bugzilla.redhat.com/22694342269434https://bugzilla.redhat.com/22694362269436https://bugzilla.redhat.com/22731412273141https://bugzilla.redhat.com/22756782275678https://bugzilla.redhat.com/22782062278206https://bugzilla.redhat.com/22810522281052https://bugzilla.redhat.com/22811512281151https://bugzilla.redhat.com/22817272281727https://bugzilla.redhat.com/22819682281968https://bugzilla.redhat.com/22827092282709https://bugzilla.redhat.com/22842712284271https://bugzilla.redhat.com/22844022284402https://bugzilla.redhat.com/22932732293273https://bugzilla.redhat.com/22932762293276https://bugzilla.redhat.com/22934402293440https://bugzilla.redhat.com/22975112297511https://bugzilla.redhat.com/22975202297520https://bugzilla.redhat.com/23004092300409https://bugzilla.redhat.com/23004142300414https://bugzilla.redhat.com/23004292300429https://bugzilla.redhat.com/23004912300491https://bugzilla.redhat.com/23005202300520https://bugzilla.redhat.com/23007132300713https://bugzilla.redhat.com/23014652301465https://bugzilla.redhat.com/23014962301496https://bugzilla.redhat.com/23016372301637https://errata.almalinux.org/9/ALSA-2024-6567.htmlALSA-2024:6567ALSA-2024:6567 )Crtla-5.14.0-427.35.1.el9_4.x86_64.rpm$Ckernel-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm*Crv-5.14.0-427.35.1.el9_4.x86_64.rpmCkernel-doc-5.14.0-427.35.1.el9_4.noarch.rpm!Ckernel-debug-devel-5.14.0-427.35.1.el9_4.x86_64.rpm"Ckernel-debug-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm%Cperf-5.14.0-427.35.1.el9_4.x86_64.rpm#Ckernel-devel-5.14.0-427.35.1.el9_4.x86_64.rpm(Ckernel-headers-5.14.0-427.35.1.el9_4.x86_64.rpm )Crtla-5.14.0-427.35.1.el9_4.x86_64.rpm$Ckernel-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm*Crv-5.14.0-427.35.1.el9_4.x86_64.rpmCkernel-doc-5.14.0-427.35.1.el9_4.noarch.rpm!Ckernel-debug-devel-5.14.0-427.35.1.el9_4.x86_64.rpm"Ckernel-debug-devel-matched-5.14.0-427.35.1.el9_4.x86_64.rpm%Cperf-5.14.0-427.35.1.el9_4.x86_64.rpm#Ckernel-devel-5.14.0-427.35.1.el9_4.x86_64.rpm(Ckernel-headers-5.14.0-427.35.1.el9_4.x86_64.rpmUJ WBBsecurityImportant: firefox security updateW~https://access.redhat.com/errata/RHSA-2024:6681RHSA-2024:6681RHSA-2024:6681 https://access.redhat.com/security/cve/CVE-2024-7652CVE-2024-7652CVE-2024-7652https://access.redhat.com/security/cve/CVE-2024-8381CVE-2024-8381CVE-2024-8381https://access.redhat.com/security/cve/CVE-2024-8382CVE-2024-8382CVE-2024-8382https://access.redhat.com/security/cve/CVE-2024-8383CVE-2024-8383CVE-2024-8383https://access.redhat.com/security/cve/CVE-2024-8384CVE-2024-8384CVE-2024-8384https://access.redhat.com/security/cve/CVE-2024-8385CVE-2024-8385CVE-2024-8385https://access.redhat.com/security/cve/CVE-2024-8386CVE-2024-8386CVE-2024-8386https://access.redhat.com/security/cve/CVE-2024-8387CVE-2024-8387CVE-2024-8387https://bugzilla.redhat.com/23094272309427https://bugzilla.redhat.com/23094282309428https://bugzilla.redhat.com/23094292309429https://bugzilla.redhat.com/23094302309430https://bugzilla.redhat.com/23094312309431https://bugzilla.redhat.com/23094322309432https://bugzilla.redhat.com/23094332309433https://bugzilla.redhat.com/23104902310490https://errata.almalinux.org/9/ALSA-2024-6681.htmlALSA-2024:6681ALSA-2024:6681 7Jfirefox-128.2.0-1.el9_4.alma.1.x86_64.rpmOJfirefox-x11-128.2.0-1.el9_4.alma.1.x86_64.rpm7Jfirefox-128.2.0-1.el9_4.alma.1.x86_64.rpmOJfirefox-x11-128.2.0-1.el9_4.alma.1.x86_64.rpmK \securityImportant: thunderbird security updateU3https://access.redhat.com/errata/RHSA-2024:6683RHSA-2024:6683RHSA-2024:6683 https://access.redhat.com/security/cve/CVE-2024-7652CVE-2024-7652CVE-2024-7652https://access.redhat.com/security/cve/CVE-2024-8381CVE-2024-8381CVE-2024-8381https://access.redhat.com/security/cve/CVE-2024-8382CVE-2024-8382CVE-2024-8382https://access.redhat.com/security/cve/CVE-2024-8384CVE-2024-8384CVE-2024-8384https://access.redhat.com/security/cve/CVE-2024-8385CVE-2024-8385CVE-2024-8385https://access.redhat.com/security/cve/CVE-2024-8386CVE-2024-8386CVE-2024-8386https://access.redhat.com/security/cve/CVE-2024-8387CVE-2024-8387CVE-2024-8387https://access.redhat.com/security/cve/CVE-2024-8394CVE-2024-8394CVE-2024-8394https://bugzilla.redhat.com/23094272309427https://bugzilla.redhat.com/23094282309428https://bugzilla.redhat.com/23094302309430https://bugzilla.redhat.com/23094312309431https://bugzilla.redhat.com/23094322309432https://bugzilla.redhat.com/23094332309433https://bugzilla.redhat.com/23104812310481https://bugzilla.redhat.com/23104902310490https://errata.almalinux.org/9/ALSA-2024-6683.htmlALSA-2024:6683ALSA-2024:6683 9Jthunderbird-128.2.0-1.el9_4.alma.1.x86_64.rpm9Jthunderbird-128.2.0-1.el9_4.alma.1.x86_64.rpm6L 5_BBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security update$https://access.redhat.com/errata/RHSA-2024:6726RHSA-2024:6726RHSA-2024:6726 https://access.redhat.com/security/cve/CVE-2024-6345CVE-2024-6345CVE-2024-6345https://bugzilla.redhat.com/22977712297771https://errata.almalinux.org/9/ALSA-2024-6726.htmlALSA-2024:6726ALSA-2024:6726 ^(fence-agents-ibm-vpc-4.10.0-62.el9_4.5.noarch.rpm](fence-agents-ibm-powervs-4.10.0-62.el9_4.5.noarch.rpm(fence-virtd-cpg-4.10.0-62.el9_4.5.x86_64.rpm(fence-agents-kubevirt-4.10.0-62.el9_4.5.x86_64.rpm(fence-virtd-libvirt-4.10.0-62.el9_4.5.x86_64.rpm(fence-virtd-multicast-4.10.0-62.el9_4.5.x86_64.rpm(fence-virtd-tcp-4.10.0-62.el9_4.5.x86_64.rpm\(fence-agents-common-4.10.0-62.el9_4.5.noarch.rpm(fence-agents-compute-4.10.0-62.el9_4.5.x86_64.rpm(fence-virt-4.10.0-62.el9_4.5.x86_64.rpm_(fence-agents-virsh-4.10.0-62.el9_4.5.noarch.rpm(fence-virtd-4.10.0-62.el9_4.5.x86_64.rpm(fence-virtd-serial-4.10.0-62.el9_4.5.x86_64.rpm ^(fence-agents-ibm-vpc-4.10.0-62.el9_4.5.noarch.rpm](fence-agents-ibm-powervs-4.10.0-62.el9_4.5.noarch.rpm(fence-virtd-cpg-4.10.0-62.el9_4.5.x86_64.rpm(fence-agents-kubevirt-4.10.0-62.el9_4.5.x86_64.rpm(fence-virtd-libvirt-4.10.0-62.el9_4.5.x86_64.rpm(fence-virtd-multicast-4.10.0-62.el9_4.5.x86_64.rpm(fence-virtd-tcp-4.10.0-62.el9_4.5.x86_64.rpm\(fence-agents-common-4.10.0-62.el9_4.5.noarch.rpm(fence-agents-compute-4.10.0-62.el9_4.5.x86_64.rpm(fence-virt-4.10.0-62.el9_4.5.x86_64.rpm_(fence-agents-virsh-4.10.0-62.el9_4.5.noarch.rpm(fence-virtd-4.10.0-62.el9_4.5.x86_64.rpm(fence-virtd-serial-4.10.0-62.el9_4.5.x86_64.rpm]M 9vBsecurityModerate: expat security update,;https://access.redhat.com/errata/RHSA-2024:6754RHSA-2024:6754RHSA-2024:6754 https://access.redhat.com/security/cve/CVE-2024-45490CVE-2024-45490CVE-2024-45490https://access.redhat.com/security/cve/CVE-2024-45491CVE-2024-45491CVE-2024-45491https://access.redhat.com/security/cve/CVE-2024-45492CVE-2024-45492CVE-2024-45492https://bugzilla.redhat.com/23086152308615https://bugzilla.redhat.com/23086162308616https://bugzilla.redhat.com/23086172308617https://errata.almalinux.org/9/ALSA-2024-6754.htmlALSA-2024:6754ALSA-2024:6754 $expat-devel-2.5.0-2.el9_4.1.i686.rpm$expat-devel-2.5.0-2.el9_4.1.x86_64.rpm$expat-devel-2.5.0-2.el9_4.1.i686.rpm$expat-devel-2.5.0-2.el9_4.1.x86_64.rpm2N zBBBBBBsecurityModerate: libnbd security updategQhttps://access.redhat.com/errata/RHSA-2024:6757RHSA-2024:6757RHSA-2024:6757 https://access.redhat.com/security/cve/CVE-2024-7383CVE-2024-7383CVE-2024-7383https://bugzilla.redhat.com/23028652302865https://errata.almalinux.org/9/ALSA-2024-6757.htmlALSA-2024:6757ALSA-2024:6757 {4libnbd-1.18.1-4.el9_4.x86_64.rpmB4nbdfuse-1.18.1-4.el9_4.x86_64.rpm<4libnbd-bash-completion-1.18.1-4.el9_4.noarch.rpmM4python3-libnbd-1.18.1-4.el9_4.x86_64.rpm{4libnbd-1.18.1-4.el9_4.i686.rpm{4libnbd-1.18.1-4.el9_4.x86_64.rpmB4nbdfuse-1.18.1-4.el9_4.x86_64.rpm<4libnbd-bash-completion-1.18.1-4.el9_4.noarch.rpmM4python3-libnbd-1.18.1-4.el9_4.x86_64.rpm{4libnbd-1.18.1-4.el9_4.i686.rpmO CBBBsecurityModerate: openssl security update8Phttps://access.redhat.com/errata/RHSA-2024:6783RHSA-2024:6783RHSA-2024:6783 https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-6783.htmlALSA-2024:6783ALSA-2024:6783 m(openssl-perl-3.0.7-28.el9_4.x86_64.rpm(openssl-devel-3.0.7-28.el9_4.i686.rpm(openssl-devel-3.0.7-28.el9_4.x86_64.rpmm(openssl-perl-3.0.7-28.el9_4.x86_64.rpm(openssl-devel-3.0.7-28.el9_4.i686.rpm(openssl-devel-3.0.7-28.el9_4.x86_64.rpmRP 5mBB_BExBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.3 security update https://access.redhat.com/errata/RHSA-2024:6785RHSA-2024:6785RHSA-2024:6785 https://access.redhat.com/security/cve/CVE-2024-39908CVE-2024-39908CVE-2024-39908https://access.redhat.com/security/cve/CVE-2024-41123CVE-2024-41123CVE-2024-41123https://access.redhat.com/security/cve/CVE-2024-41946CVE-2024-41946CVE-2024-41946https://access.redhat.com/security/cve/CVE-2024-43398CVE-2024-43398CVE-2024-43398https://bugzilla.redhat.com/22982432298243https://bugzilla.redhat.com/23022682302268https://bugzilla.redhat.com/23022722302272https://bugzilla.redhat.com/23072972307297https://errata.almalinux.org/9/ALSA-2024-6785.htmlALSA-2024:6785ALSA-2024:6785 "tu'&"iruby-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpmQ9rubygem-rexml-3.3.6-3.module_el9.4.0+115+226a984b.noarch.rpmJiruby-default-gems-3.3.5-3.module_el9.4.0+115+226a984b.noarch.rpm iruby-bundled-gems-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpmiruby-doc-3.3.5-3.module_el9.4.0+115+226a984b.noarch.rpm/ rubygem-racc-1.7.3-3.module_el9.4.0+115+226a984b.i686.rpmK"rubygem-bundler-2.5.16-3.module_el9.4.0+115+226a984b.noarch.rpmnrubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpmUxrubygems-3.5.16-3.module_el9.4.0+115+226a984b.noarch.rpmVxrubygems-devel-3.5.16-3.module_el9.4.0+115+226a984b.noarch.rpmDrubygem-rbs-3.4.0-3.module_el9.4.0+115+226a984b.i686.rpmC.rubygem-json-2.7.1-3.module_el9.4.0+115+226a984b.i686.rpmSBrubygem-test-unit-3.6.1-3.module_el9.4.0+115+226a984b.noarch.rpmp}rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm/ rubygem-racc-1.7.3-3.module_el9.4.0+115+226a984b.x86_64.rpmA@rubygem-bigdecimal-3.1.5-3.module_el9.4.0+115+226a984b.x86_64.rpmiruby-libs-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpm*rubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpmNrubygem-power_assert-2.0.3-3.module_el9.4.0+115+226a984b.noarch.rpmDNrubygem-psych-5.1.2-3.module_el9.4.0+115+226a984b.x86_64.rpm"iruby-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpmo}rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpmPZrubygem-rdoc-6.6.3.1-3.module_el9.4.0+115+226a984b.noarch.rpmOrubygem-rake-13.1.0-3.module_el9.4.0+115+226a984b.noarch.rpmA@rubygem-bigdecimal-3.1.5-3.module_el9.4.0+115+226a984b.i686.rpmDrubygem-rbs-3.4.0-3.module_el9.4.0+115+226a984b.x86_64.rpmiruby-devel-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpmC.rubygem-json-2.7.1-3.module_el9.4.0+115+226a984b.x86_64.rpmiruby-devel-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpmBprubygem-io-console-0.7.1-3.module_el9.4.0+115+226a984b.x86_64.rpmDNrubygem-psych-5.1.2-3.module_el9.4.0+115+226a984b.i686.rpmL\rubygem-irb-1.13.1-3.module_el9.4.0+115+226a984b.noarch.rpmMOrubygem-minitest-5.20.0-3.module_el9.4.0+115+226a984b.noarch.rpmBprubygem-io-console-0.7.1-3.module_el9.4.0+115+226a984b.i686.rpmiruby-libs-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpm iruby-bundled-gems-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpmRIrubygem-rss-0.3.1-3.module_el9.4.0+115+226a984b.noarch.rpmTErubygem-typeprof-0.21.9-3.module_el9.4.0+115+226a984b.noarch.rpm"tu'&"iruby-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpmQ9rubygem-rexml-3.3.6-3.module_el9.4.0+115+226a984b.noarch.rpmJiruby-default-gems-3.3.5-3.module_el9.4.0+115+226a984b.noarch.rpm iruby-bundled-gems-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpmiruby-doc-3.3.5-3.module_el9.4.0+115+226a984b.noarch.rpm/ rubygem-racc-1.7.3-3.module_el9.4.0+115+226a984b.i686.rpmK"rubygem-bundler-2.5.16-3.module_el9.4.0+115+226a984b.noarch.rpmnrubygem-mysql2-0.5.5-1.module_el9.4.0+75+1a8fe981.x86_64.rpmUxrubygems-3.5.16-3.module_el9.4.0+115+226a984b.noarch.rpmVxrubygems-devel-3.5.16-3.module_el9.4.0+115+226a984b.noarch.rpmDrubygem-rbs-3.4.0-3.module_el9.4.0+115+226a984b.i686.rpmC.rubygem-json-2.7.1-3.module_el9.4.0+115+226a984b.i686.rpmSBrubygem-test-unit-3.6.1-3.module_el9.4.0+115+226a984b.noarch.rpmp}rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpm/ rubygem-racc-1.7.3-3.module_el9.4.0+115+226a984b.x86_64.rpmA@rubygem-bigdecimal-3.1.5-3.module_el9.4.0+115+226a984b.x86_64.rpmiruby-libs-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpm*rubygem-mysql2-doc-0.5.5-1.module_el9.4.0+75+1a8fe981.noarch.rpmNrubygem-power_assert-2.0.3-3.module_el9.4.0+115+226a984b.noarch.rpmDNrubygem-psych-5.1.2-3.module_el9.4.0+115+226a984b.x86_64.rpm"iruby-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpmo}rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpmPZrubygem-rdoc-6.6.3.1-3.module_el9.4.0+115+226a984b.noarch.rpmOrubygem-rake-13.1.0-3.module_el9.4.0+115+226a984b.noarch.rpmA@rubygem-bigdecimal-3.1.5-3.module_el9.4.0+115+226a984b.i686.rpmDrubygem-rbs-3.4.0-3.module_el9.4.0+115+226a984b.x86_64.rpmiruby-devel-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpmC.rubygem-json-2.7.1-3.module_el9.4.0+115+226a984b.x86_64.rpmiruby-devel-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpmBprubygem-io-console-0.7.1-3.module_el9.4.0+115+226a984b.x86_64.rpmDNrubygem-psych-5.1.2-3.module_el9.4.0+115+226a984b.i686.rpmL\rubygem-irb-1.13.1-3.module_el9.4.0+115+226a984b.noarch.rpmMOrubygem-minitest-5.20.0-3.module_el9.4.0+115+226a984b.noarch.rpmBprubygem-io-console-0.7.1-3.module_el9.4.0+115+226a984b.i686.rpmiruby-libs-3.3.5-3.module_el9.4.0+115+226a984b.i686.rpm iruby-bundled-gems-3.3.5-3.module_el9.4.0+115+226a984b.x86_64.rpmRIrubygem-rss-0.3.1-3.module_el9.4.0+115+226a984b.noarch.rpmTErubygem-typeprof-0.21.9-3.module_el9.4.0+115+226a984b.noarch.rpmqQ vBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: pcp security updatehttps://access.redhat.com/errata/RHSA-2024:6848RHSA-2024:6848RHSA-2024:6848 https://access.redhat.com/security/cve/CVE-2024-45769CVE-2024-45769CVE-2024-45769https://access.redhat.com/security/cve/CVE-2024-45770CVE-2024-45770CVE-2024-45770https://bugzilla.redhat.com/23104512310451https://bugzilla.redhat.com/23104522310452https://errata.almalinux.org/9/ALSA-2024-6848.htmlALSA-2024:6848ALSA-2024:6848 lyperl-PCP-PMDA-6.2.0-5.el9_4.x86_64.rpmjpcp-pmda-sockets-6.2.0-5.el9_4.x86_64.rpm\pcp-pmda-podman-6.2.0-5.el9_4.x86_64.rpmUpcp-pmda-nginx-6.2.0-5.el9_4.x86_64.rpmapcp-pmda-resctrl-6.2.0-5.el9_4.x86_64.rpmOpcp-pmda-mysql-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2json-6.2.0-5.el9_4.x86_64.rpm'pcp-import-mrtg2pcp-6.2.0-5.el9_4.x86_64.rpmspcp-selinux-6.2.0-5.el9_4.x86_64.rpm-pcp-pmda-bind2-6.2.0-5.el9_4.x86_64.rpmPpcp-pmda-named-6.2.0-5.el9_4.x86_64.rpm3pcp-pmda-dbping-6.2.0-5.el9_4.x86_64.rpmWpcp-pmda-openmetrics-6.2.0-5.el9_4.x86_64.rpmSpcp-pmda-news-6.2.0-5.el9_4.x86_64.rpm,pcp-pmda-bcc-6.2.0-5.el9_4.x86_64.rpm+pcp-pmda-bash-6.2.0-5.el9_4.x86_64.rpmIpcp-pmda-mailq-6.2.0-5.el9_4.x86_64.rpmRpcp-pmda-netfilter-6.2.0-5.el9_4.x86_64.rpmupcp-zeroconf-6.2.0-5.el9_4.x86_64.rpm<pcp-pmda-gluster-6.2.0-5.el9_4.x86_64.rpm/pcp-pmda-bpf-6.2.0-5.el9_4.x86_64.rpmKpcp-pmda-mic-6.2.0-5.el9_4.x86_64.rpm;pcp-pmda-gfs2-6.2.0-5.el9_4.x86_64.rpmpcp-devel-6.2.0-5.el9_4.i686.rpmnpcp-pmda-trace-6.2.0-5.el9_4.x86_64.rpm$pcp-import-collectl2pcp-6.2.0-5.el9_4.x86_64.rpmNpcp-pmda-mssql-6.2.0-5.el9_4.x86_64.rpm1pcp-pmda-cifs-6.2.0-5.el9_4.x86_64.rpmJpcp-pmda-memcache-6.2.0-5.el9_4.x86_64.rpmlpcp-pmda-summary-6.2.0-5.el9_4.x86_64.rpm"pcp-geolocate-6.2.0-5.el9_4.x86_64.rpm_pcp-pmda-rabbitmq-6.2.0-5.el9_4.x86_64.rpmipcp-pmda-snmp-6.2.0-5.el9_4.x86_64.rpm6pcp-pmda-docker-6.2.0-5.el9_4.x86_64.rpm^pcp-pmda-postgresql-6.2.0-5.el9_4.x86_64.rpm>pcp-pmda-gpsd-6.2.0-5.el9_4.x86_64.rpm]pcp-pmda-postfix-6.2.0-5.el9_4.x86_64.rpm!pcp-export-zabbix-agent-6.2.0-5.el9_4.x86_64.rpmpcp-devel-6.2.0-5.el9_4.x86_64.rpm7pcp-pmda-ds389-6.2.0-5.el9_4.x86_64.rpmApcp-pmda-infiniband-6.2.0-5.el9_4.x86_64.rpmqpcp-pmda-zimbra-6.2.0-5.el9_4.x86_64.rpmepcp-pmda-sendmail-6.2.0-5.el9_4.x86_64.rpm[pcp-pmda-perfevent-6.2.0-5.el9_4.x86_64.rpm`pcp-pmda-redis-6.2.0-5.el9_4.x86_64.rpmgpcp-pmda-slurm-6.2.0-5.el9_4.x86_64.rpmrpcp-pmda-zswap-6.2.0-5.el9_4.x86_64.rpmpcp-testsuite-6.2.0-5.el9_4.x86_64.rpm2pcp-pmda-cisco-6.2.0-5.el9_4.x86_64.rpmHpcp-pmda-lustrecomm-6.2.0-5.el9_4.x86_64.rpm{python3-pcp-6.2.0-5.el9_4.x86_64.rpm(pcp-import-sar2pcp-6.2.0-5.el9_4.x86_64.rpmLpcp-pmda-mongodb-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2xml-6.2.0-5.el9_4.x86_64.rpmpcp-doc-6.2.0-5.el9_4.noarch.rpmEpcp-pmda-lmsensors-6.2.0-5.el9_4.x86_64.rpmGpcp-pmda-lustre-6.2.0-5.el9_4.x86_64.rpmpcp-conf-6.2.0-5.el9_4.x86_64.rpmZpcp-pmda-pdns-6.2.0-5.el9_4.x86_64.rpmXpcp-pmda-openvswitch-6.2.0-5.el9_4.x86_64.rpmMpcp-pmda-mounts-6.2.0-5.el9_4.x86_64.rpmdpcp-pmda-samba-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2spark-6.2.0-5.el9_4.x86_64.rpmYpcp-pmda-oracle-6.2.0-5.el9_4.x86_64.rpmVpcp-pmda-nvidia-gpu-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2graphite-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2elasticsearch-6.2.0-5.el9_4.x86_64.rpm9pcp-pmda-elasticsearch-6.2.0-5.el9_4.x86_64.rpmpcp-libs-6.2.0-5.el9_4.x86_64.rpm.pcp-pmda-bonding-6.2.0-5.el9_4.x86_64.rpm pcp-export-pcp2zabbix-6.2.0-5.el9_4.x86_64.rpm=pcp-pmda-gpfs-6.2.0-5.el9_4.x86_64.rpmmpcp-pmda-systemd-6.2.0-5.el9_4.x86_64.rpmpcp-libs-devel-6.2.0-5.el9_4.x86_64.rpmcpcp-pmda-rsyslog-6.2.0-5.el9_4.x86_64.rpmwperl-PCP-LogSummary-6.2.0-5.el9_4.x86_64.rpmQpcp-pmda-netcheck-6.2.0-5.el9_4.x86_64.rpmFpcp-pmda-logger-6.2.0-5.el9_4.x86_64.rpm:pcp-pmda-farm-6.2.0-5.el9_4.x86_64.rpm0pcp-pmda-bpftrace-6.2.0-5.el9_4.x86_64.rpm#pcp-gui-6.2.0-5.el9_4.x86_64.rpmDpcp-pmda-lio-6.2.0-5.el9_4.x86_64.rpm*pcp-pmda-apache-6.2.0-5.el9_4.x86_64.rpmxperl-PCP-MMV-6.2.0-5.el9_4.x86_64.rpm5pcp-pmda-dm-6.2.0-5.el9_4.x86_64.rpmvperl-PCP-LogImport-6.2.0-5.el9_4.x86_64.rpm@pcp-pmda-haproxy-6.2.0-5.el9_4.x86_64.rpmtpcp-system-tools-6.2.0-5.el9_4.x86_64.rpmpcp-libs-devel-6.2.0-5.el9_4.i686.rpmfpcp-pmda-shping-6.2.0-5.el9_4.x86_64.rpm?pcp-pmda-hacluster-6.2.0-5.el9_4.x86_64.rpmCpcp-pmda-libvirt-6.2.0-5.el9_4.x86_64.rpmTpcp-pmda-nfsclient-6.2.0-5.el9_4.x86_64.rpmppcp-pmda-weblog-6.2.0-5.el9_4.x86_64.rpmopcp-pmda-unbound-6.2.0-5.el9_4.x86_64.rpmpcp-testsuite-6.2.0-5.el9_4.i686.rpmpcp-libs-6.2.0-5.el9_4.i686.rpm&pcp-import-iostat2pcp-6.2.0-5.el9_4.x86_64.rpmkpcp-pmda-statsd-6.2.0-5.el9_4.x86_64.rpm)pcp-pmda-activemq-6.2.0-5.el9_4.x86_64.rpmBpcp-pmda-json-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2influxdb-6.2.0-5.el9_4.x86_64.rpm%pcp-import-ganglia2pcp-6.2.0-5.el9_4.x86_64.rpm8pcp-pmda-ds389log-6.2.0-5.el9_4.x86_64.rpmhpcp-pmda-smart-6.2.0-5.el9_4.x86_64.rpmpcp-6.2.0-5.el9_4.x86_64.rpm4pcp-pmda-denki-6.2.0-5.el9_4.x86_64.rpmbpcp-pmda-roomtemp-6.2.0-5.el9_4.x86_64.rpmlyperl-PCP-PMDA-6.2.0-5.el9_4.x86_64.rpmjpcp-pmda-sockets-6.2.0-5.el9_4.x86_64.rpm\pcp-pmda-podman-6.2.0-5.el9_4.x86_64.rpmUpcp-pmda-nginx-6.2.0-5.el9_4.x86_64.rpmapcp-pmda-resctrl-6.2.0-5.el9_4.x86_64.rpmOpcp-pmda-mysql-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2json-6.2.0-5.el9_4.x86_64.rpm'pcp-import-mrtg2pcp-6.2.0-5.el9_4.x86_64.rpmspcp-selinux-6.2.0-5.el9_4.x86_64.rpm-pcp-pmda-bind2-6.2.0-5.el9_4.x86_64.rpmPpcp-pmda-named-6.2.0-5.el9_4.x86_64.rpm3pcp-pmda-dbping-6.2.0-5.el9_4.x86_64.rpmWpcp-pmda-openmetrics-6.2.0-5.el9_4.x86_64.rpmSpcp-pmda-news-6.2.0-5.el9_4.x86_64.rpm,pcp-pmda-bcc-6.2.0-5.el9_4.x86_64.rpm+pcp-pmda-bash-6.2.0-5.el9_4.x86_64.rpmIpcp-pmda-mailq-6.2.0-5.el9_4.x86_64.rpmRpcp-pmda-netfilter-6.2.0-5.el9_4.x86_64.rpmupcp-zeroconf-6.2.0-5.el9_4.x86_64.rpm<pcp-pmda-gluster-6.2.0-5.el9_4.x86_64.rpm/pcp-pmda-bpf-6.2.0-5.el9_4.x86_64.rpmKpcp-pmda-mic-6.2.0-5.el9_4.x86_64.rpm;pcp-pmda-gfs2-6.2.0-5.el9_4.x86_64.rpmpcp-devel-6.2.0-5.el9_4.i686.rpmnpcp-pmda-trace-6.2.0-5.el9_4.x86_64.rpm$pcp-import-collectl2pcp-6.2.0-5.el9_4.x86_64.rpmNpcp-pmda-mssql-6.2.0-5.el9_4.x86_64.rpm1pcp-pmda-cifs-6.2.0-5.el9_4.x86_64.rpmJpcp-pmda-memcache-6.2.0-5.el9_4.x86_64.rpmlpcp-pmda-summary-6.2.0-5.el9_4.x86_64.rpm"pcp-geolocate-6.2.0-5.el9_4.x86_64.rpm_pcp-pmda-rabbitmq-6.2.0-5.el9_4.x86_64.rpmipcp-pmda-snmp-6.2.0-5.el9_4.x86_64.rpm6pcp-pmda-docker-6.2.0-5.el9_4.x86_64.rpm^pcp-pmda-postgresql-6.2.0-5.el9_4.x86_64.rpm>pcp-pmda-gpsd-6.2.0-5.el9_4.x86_64.rpm]pcp-pmda-postfix-6.2.0-5.el9_4.x86_64.rpm!pcp-export-zabbix-agent-6.2.0-5.el9_4.x86_64.rpmpcp-devel-6.2.0-5.el9_4.x86_64.rpm7pcp-pmda-ds389-6.2.0-5.el9_4.x86_64.rpmApcp-pmda-infiniband-6.2.0-5.el9_4.x86_64.rpmqpcp-pmda-zimbra-6.2.0-5.el9_4.x86_64.rpmepcp-pmda-sendmail-6.2.0-5.el9_4.x86_64.rpm[pcp-pmda-perfevent-6.2.0-5.el9_4.x86_64.rpm`pcp-pmda-redis-6.2.0-5.el9_4.x86_64.rpmgpcp-pmda-slurm-6.2.0-5.el9_4.x86_64.rpmrpcp-pmda-zswap-6.2.0-5.el9_4.x86_64.rpmpcp-testsuite-6.2.0-5.el9_4.x86_64.rpm2pcp-pmda-cisco-6.2.0-5.el9_4.x86_64.rpmHpcp-pmda-lustrecomm-6.2.0-5.el9_4.x86_64.rpm{python3-pcp-6.2.0-5.el9_4.x86_64.rpm(pcp-import-sar2pcp-6.2.0-5.el9_4.x86_64.rpmLpcp-pmda-mongodb-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2xml-6.2.0-5.el9_4.x86_64.rpmpcp-doc-6.2.0-5.el9_4.noarch.rpmEpcp-pmda-lmsensors-6.2.0-5.el9_4.x86_64.rpmGpcp-pmda-lustre-6.2.0-5.el9_4.x86_64.rpmpcp-conf-6.2.0-5.el9_4.x86_64.rpmZpcp-pmda-pdns-6.2.0-5.el9_4.x86_64.rpmXpcp-pmda-openvswitch-6.2.0-5.el9_4.x86_64.rpmMpcp-pmda-mounts-6.2.0-5.el9_4.x86_64.rpmdpcp-pmda-samba-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2spark-6.2.0-5.el9_4.x86_64.rpmYpcp-pmda-oracle-6.2.0-5.el9_4.x86_64.rpmVpcp-pmda-nvidia-gpu-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2graphite-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2elasticsearch-6.2.0-5.el9_4.x86_64.rpm9pcp-pmda-elasticsearch-6.2.0-5.el9_4.x86_64.rpmpcp-libs-6.2.0-5.el9_4.x86_64.rpm.pcp-pmda-bonding-6.2.0-5.el9_4.x86_64.rpm pcp-export-pcp2zabbix-6.2.0-5.el9_4.x86_64.rpm=pcp-pmda-gpfs-6.2.0-5.el9_4.x86_64.rpmmpcp-pmda-systemd-6.2.0-5.el9_4.x86_64.rpmpcp-libs-devel-6.2.0-5.el9_4.x86_64.rpmcpcp-pmda-rsyslog-6.2.0-5.el9_4.x86_64.rpmwperl-PCP-LogSummary-6.2.0-5.el9_4.x86_64.rpmQpcp-pmda-netcheck-6.2.0-5.el9_4.x86_64.rpmFpcp-pmda-logger-6.2.0-5.el9_4.x86_64.rpm:pcp-pmda-farm-6.2.0-5.el9_4.x86_64.rpm0pcp-pmda-bpftrace-6.2.0-5.el9_4.x86_64.rpm#pcp-gui-6.2.0-5.el9_4.x86_64.rpmDpcp-pmda-lio-6.2.0-5.el9_4.x86_64.rpm*pcp-pmda-apache-6.2.0-5.el9_4.x86_64.rpmxperl-PCP-MMV-6.2.0-5.el9_4.x86_64.rpm5pcp-pmda-dm-6.2.0-5.el9_4.x86_64.rpmvperl-PCP-LogImport-6.2.0-5.el9_4.x86_64.rpm@pcp-pmda-haproxy-6.2.0-5.el9_4.x86_64.rpmtpcp-system-tools-6.2.0-5.el9_4.x86_64.rpmpcp-libs-devel-6.2.0-5.el9_4.i686.rpmfpcp-pmda-shping-6.2.0-5.el9_4.x86_64.rpm?pcp-pmda-hacluster-6.2.0-5.el9_4.x86_64.rpmCpcp-pmda-libvirt-6.2.0-5.el9_4.x86_64.rpmTpcp-pmda-nfsclient-6.2.0-5.el9_4.x86_64.rpmppcp-pmda-weblog-6.2.0-5.el9_4.x86_64.rpmopcp-pmda-unbound-6.2.0-5.el9_4.x86_64.rpmpcp-testsuite-6.2.0-5.el9_4.i686.rpmpcp-libs-6.2.0-5.el9_4.i686.rpm&pcp-import-iostat2pcp-6.2.0-5.el9_4.x86_64.rpmkpcp-pmda-statsd-6.2.0-5.el9_4.x86_64.rpm)pcp-pmda-activemq-6.2.0-5.el9_4.x86_64.rpmBpcp-pmda-json-6.2.0-5.el9_4.x86_64.rpmpcp-export-pcp2influxdb-6.2.0-5.el9_4.x86_64.rpm%pcp-import-ganglia2pcp-6.2.0-5.el9_4.x86_64.rpm8pcp-pmda-ds389log-6.2.0-5.el9_4.x86_64.rpmhpcp-pmda-smart-6.2.0-5.el9_4.x86_64.rpmpcp-6.2.0-5.el9_4.x86_64.rpm4pcp-pmda-denki-6.2.0-5.el9_4.x86_64.rpmbpcp-pmda-roomtemp-6.2.0-5.el9_4.x86_64.rpmdR JBBBBBBBBsecurityImportant: golang security updateI https://access.redhat.com/errata/RHSA-2024:6913RHSA-2024:6913RHSA-2024:6913 https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://bugzilla.redhat.com/22953102295310https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://errata.almalinux.org/9/ALSA-2024-6913.htmlALSA-2024:6913ALSA-2024:6913 ogolang-tests-1.21.13-3.el9_4.noarch.rpmAgolang-bin-1.21.13-3.el9_4.x86_64.rpmmgolang-misc-1.21.13-3.el9_4.noarch.rpmEgo-toolset-1.21.13-3.el9_4.x86_64.rpmlgolang-docs-1.21.13-3.el9_4.noarch.rpm@golang-1.21.13-3.el9_4.x86_64.rpmngolang-src-1.21.13-3.el9_4.noarch.rpmogolang-tests-1.21.13-3.el9_4.noarch.rpmAgolang-bin-1.21.13-3.el9_4.x86_64.rpmmgolang-misc-1.21.13-3.el9_4.noarch.rpmEgo-toolset-1.21.13-3.el9_4.x86_64.rpmlgolang-docs-1.21.13-3.el9_4.noarch.rpm@golang-1.21.13-3.el9_4.x86_64.rpmngolang-src-1.21.13-3.el9_4.noarch.rpmʐPS UsecurityImportant: grafana-pcp security updateg<https://access.redhat.com/errata/RHSA-2024:6946RHSA-2024:6946RHSA-2024:6946 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-6946.htmlALSA-2024:6946ALSA-2024:6946 dhgrafana-pcp-5.1.1-3.el9_4.x86_64.rpmdhgrafana-pcp-5.1.1-3.el9_4.x86_64.rpmʎpT XBBsecurityImportant: grafana security update#`https://access.redhat.com/errata/RHSA-2024:6947RHSA-2024:6947RHSA-2024:6947 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-6947.htmlALSA-2024:6947ALSA-2024:6947 F8grafana-9.2.10-17.el9_4.x86_64.rpml8grafana-selinux-9.2.10-17.el9_4.x86_64.rpmF8grafana-9.2.10-17.el9_4.x86_64.rpml8grafana-selinux-9.2.10-17.el9_4.x86_64.rpmʍzU .]BBBBBBBBBBBBBBBsecurityImportant: kernel security update+https://access.redhat.com/errata/RHSA-2024:6997RHSA-2024:6997RHSA-2024:6997 https://access.redhat.com/security/cve/CVE-2023-52439CVE-2023-52439CVE-2023-52439https://access.redhat.com/security/cve/CVE-2023-52884CVE-2023-52884CVE-2023-52884https://access.redhat.com/security/cve/CVE-2024-26739CVE-2024-26739CVE-2024-26739https://access.redhat.com/security/cve/CVE-2024-26929CVE-2024-26929CVE-2024-26929https://access.redhat.com/security/cve/CVE-2024-26930CVE-2024-26930CVE-2024-26930https://access.redhat.com/security/cve/CVE-2024-26931CVE-2024-26931CVE-2024-26931https://access.redhat.com/security/cve/CVE-2024-26947CVE-2024-26947CVE-2024-26947https://access.redhat.com/security/cve/CVE-2024-26991CVE-2024-26991CVE-2024-26991https://access.redhat.com/security/cve/CVE-2024-27022CVE-2024-27022CVE-2024-27022https://access.redhat.com/security/cve/CVE-2024-35895CVE-2024-35895CVE-2024-35895https://access.redhat.com/security/cve/CVE-2024-36016CVE-2024-36016CVE-2024-36016https://access.redhat.com/security/cve/CVE-2024-36899CVE-2024-36899CVE-2024-36899https://access.redhat.com/security/cve/CVE-2024-38562CVE-2024-38562CVE-2024-38562https://access.redhat.com/security/cve/CVE-2024-38570CVE-2024-38570CVE-2024-38570https://access.redhat.com/security/cve/CVE-2024-38573CVE-2024-38573CVE-2024-38573https://access.redhat.com/security/cve/CVE-2024-38601CVE-2024-38601CVE-2024-38601https://access.redhat.com/security/cve/CVE-2024-38615CVE-2024-38615CVE-2024-38615https://access.redhat.com/security/cve/CVE-2024-40984CVE-2024-40984CVE-2024-40984https://access.redhat.com/security/cve/CVE-2024-41071CVE-2024-41071CVE-2024-41071https://access.redhat.com/security/cve/CVE-2024-42225CVE-2024-42225CVE-2024-42225https://access.redhat.com/security/cve/CVE-2024-42246CVE-2024-42246CVE-2024-42246https://bugzilla.redhat.com/22652712265271https://bugzilla.redhat.com/22732702273270https://bugzilla.redhat.com/22781672278167https://bugzilla.redhat.com/22782452278245https://bugzilla.redhat.com/22782482278248https://bugzilla.redhat.com/22782502278250https://bugzilla.redhat.com/22782522278252https://bugzilla.redhat.com/22783182278318https://bugzilla.redhat.com/22816772281677https://bugzilla.redhat.com/22838942283894https://bugzilla.redhat.com/22845492284549https://bugzilla.redhat.com/22933482293348https://bugzilla.redhat.com/22933642293364https://bugzilla.redhat.com/22934202293420https://bugzilla.redhat.com/22934232293423https://bugzilla.redhat.com/22934312293431https://bugzilla.redhat.com/22936852293685https://bugzilla.redhat.com/22975682297568https://bugzilla.redhat.com/23004482300448https://bugzilla.redhat.com/23015432301543https://errata.almalinux.org/9/ALSA-2024-6997.htmlALSA-2024:6997ALSA-2024:6997 (Dkernel-headers-5.14.0-427.37.1.el9_4.x86_64.rpm$Dkernel-devel-matched-5.14.0-427.37.1.el9_4.x86_64.rpm#Dkernel-devel-5.14.0-427.37.1.el9_4.x86_64.rpm"Dkernel-debug-devel-matched-5.14.0-427.37.1.el9_4.x86_64.rpm)Drtla-5.14.0-427.37.1.el9_4.x86_64.rpm%Dperf-5.14.0-427.37.1.el9_4.x86_64.rpm!Dkernel-debug-devel-5.14.0-427.37.1.el9_4.x86_64.rpm*Drv-5.14.0-427.37.1.el9_4.x86_64.rpmDkernel-doc-5.14.0-427.37.1.el9_4.noarch.rpm (Dkernel-headers-5.14.0-427.37.1.el9_4.x86_64.rpm$Dkernel-devel-matched-5.14.0-427.37.1.el9_4.x86_64.rpm#Dkernel-devel-5.14.0-427.37.1.el9_4.x86_64.rpm"Dkernel-debug-devel-matched-5.14.0-427.37.1.el9_4.x86_64.rpm)Drtla-5.14.0-427.37.1.el9_4.x86_64.rpm%Dperf-5.14.0-427.37.1.el9_4.x86_64.rpm!Dkernel-debug-devel-5.14.0-427.37.1.el9_4.x86_64.rpm*Drv-5.14.0-427.37.1.el9_4.x86_64.rpmDkernel-doc-5.14.0-427.37.1.el9_4.noarch.rpmV 1osecurityImportant: git-lfs security update,https://access.redhat.com/errata/RHSA-2024:7136RHSA-2024:7136RHSA-2024:7136 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-7136.htmlALSA-2024:7136ALSA-2024:7136  8git-lfs-3.4.1-4.el9_4.x86_64.rpm 8git-lfs-3.4.1-4.el9_4.x86_64.rpmLW 8rBBBBsecurityImportant: osbuild-composer security updateDhttps://access.redhat.com/errata/RHSA-2024:7204RHSA-2024:7204RHSA-2024:7204 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-7204.htmlALSA-2024:7204ALSA-2024:7204 U8osbuild-composer-core-101-2.el9_4.alma.1.x86_64.rpmT8osbuild-composer-101-2.el9_4.alma.1.x86_64.rpmV8osbuild-composer-worker-101-2.el9_4.alma.1.x86_64.rpmU8osbuild-composer-core-101-2.el9_4.alma.1.x86_64.rpmT8osbuild-composer-101-2.el9_4.alma.1.x86_64.rpmV8osbuild-composer-worker-101-2.el9_4.alma.1.x86_64.rpmdX yBBBBBBBBBBBBBBBsecurityModerate: net-snmp security updateEdhttps://access.redhat.com/errata/RHSA-2024:7260RHSA-2024:7260RHSA-2024:7260 https://access.redhat.com/security/cve/CVE-2022-24805CVE-2022-24805CVE-2022-24805https://access.redhat.com/security/cve/CVE-2022-24806CVE-2022-24806CVE-2022-24806https://access.redhat.com/security/cve/CVE-2022-24807CVE-2022-24807CVE-2022-24807https://access.redhat.com/security/cve/CVE-2022-24808CVE-2022-24808CVE-2022-24808https://access.redhat.com/security/cve/CVE-2022-24809CVE-2022-24809CVE-2022-24809https://access.redhat.com/security/cve/CVE-2022-24810CVE-2022-24810CVE-2022-24810https://bugzilla.redhat.com/21032252103225https://bugzilla.redhat.com/21047592104759https://bugzilla.redhat.com/21047632104763https://bugzilla.redhat.com/21047662104766https://bugzilla.redhat.com/21047682104768https://bugzilla.redhat.com/21047692104769https://errata.almalinux.org/9/ALSA-2024-7260.htmlALSA-2024:7260ALSA-2024:7260  net-snmp-devel-5.9.1-13.el9_4.3.x86_64.rpmZnet-snmp-utils-5.9.1-13.el9_4.3.x86_64.rpm!net-snmp-libs-5.9.1-13.el9_4.3.x86_64.rpm net-snmp-devel-5.9.1-13.el9_4.3.i686.rpmYnet-snmp-perl-5.9.1-13.el9_4.3.x86_64.rpm_python3-net-snmp-5.9.1-13.el9_4.3.x86_64.rpmnet-snmp-agent-libs-5.9.1-13.el9_4.3.i686.rpmnet-snmp-agent-libs-5.9.1-13.el9_4.3.x86_64.rpm!net-snmp-libs-5.9.1-13.el9_4.3.i686.rpmXnet-snmp-5.9.1-13.el9_4.3.x86_64.rpm  net-snmp-devel-5.9.1-13.el9_4.3.x86_64.rpmZnet-snmp-utils-5.9.1-13.el9_4.3.x86_64.rpm!net-snmp-libs-5.9.1-13.el9_4.3.x86_64.rpm net-snmp-devel-5.9.1-13.el9_4.3.i686.rpmYnet-snmp-perl-5.9.1-13.el9_4.3.x86_64.rpm_python3-net-snmp-5.9.1-13.el9_4.3.x86_64.rpmnet-snmp-agent-libs-5.9.1-13.el9_4.3.i686.rpmnet-snmp-agent-libs-5.9.1-13.el9_4.3.x86_64.rpm!net-snmp-libs-5.9.1-13.el9_4.3.i686.rpmXnet-snmp-5.9.1-13.el9_4.3.x86_64.rpmٺGY KBBBsecurityImportant: cups-filters security update)Lhttps://access.redhat.com/errata/RHSA-2024:7346RHSA-2024:7346RHSA-2024:7346 https://access.redhat.com/security/cve/CVE-2024-47076CVE-2024-47076CVE-2024-47076https://access.redhat.com/security/cve/CVE-2024-47175CVE-2024-47175CVE-2024-47175https://access.redhat.com/security/cve/CVE-2024-47176CVE-2024-47176CVE-2024-47176https://bugzilla.redhat.com/23142522314252https://bugzilla.redhat.com/23142532314253https://bugzilla.redhat.com/23142562314256https://errata.almalinux.org/9/ALSA-2024-7346.htmlALSA-2024:7346ALSA-2024:7346 [cups-filters-libs-1.28.7-17.el9_4.x86_64.rpmcups-filters-1.28.7-17.el9_4.x86_64.rpm[cups-filters-libs-1.28.7-17.el9_4.i686.rpm[cups-filters-libs-1.28.7-17.el9_4.x86_64.rpmcups-filters-1.28.7-17.el9_4.x86_64.rpm[cups-filters-libs-1.28.7-17.el9_4.i686.rpm߷*Z QsecurityModerate: mod_jk bug fix updateu6https://access.redhat.com/errata/RHSA-2024:7457RHSA-2024:7457RHSA-2024:7457 https://access.redhat.com/security/cve/CVE-2024-46544CVE-2024-46544CVE-2024-46544https://bugzilla.redhat.com/23141942314194https://errata.almalinux.org/9/ALSA-2024-7457.htmlALSA-2024:7457ALSA-2024:7457 ?mod_jk-1.2.50-1.el9_4.1.x86_64.rpm?mod_jk-1.2.50-1.el9_4.1.x86_64.rpmp[ TBBsecurityImportant: firefox security update+: https://access.redhat.com/errata/RHSA-2024:7505RHSA-2024:7505RHSA-2024:7505 https://access.redhat.com/security/cve/CVE-2024-9392CVE-2024-9392CVE-2024-9392https://access.redhat.com/security/cve/CVE-2024-9393CVE-2024-9393CVE-2024-9393https://access.redhat.com/security/cve/CVE-2024-9394CVE-2024-9394CVE-2024-9394https://access.redhat.com/security/cve/CVE-2024-9401CVE-2024-9401CVE-2024-9401https://access.redhat.com/security/cve/CVE-2024-9402CVE-2024-9402CVE-2024-9402https://bugzilla.redhat.com/23159502315950https://bugzilla.redhat.com/23159512315951https://bugzilla.redhat.com/23159562315956https://bugzilla.redhat.com/23159572315957https://bugzilla.redhat.com/23159592315959https://errata.almalinux.org/9/ALSA-2024-7505.htmlALSA-2024:7505ALSA-2024:7505 OKfirefox-x11-128.3.0-1.el9_4.alma.1.x86_64.rpm7Kfirefox-128.3.0-1.el9_4.alma.1.x86_64.rpmOKfirefox-x11-128.3.0-1.el9_4.alma.1.x86_64.rpm7Kfirefox-128.3.0-1.el9_4.alma.1.x86_64.rpm.\ #YBBBBBBBBsecurityModerate: golang security updateeMhttps://access.redhat.com/errata/RHSA-2024:7550RHSA-2024:7550RHSA-2024:7550 https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/23157192315719https://errata.almalinux.org/9/ALSA-2024-7550.htmlALSA-2024:7550ALSA-2024:7550 Ego-toolset-1.21.13-4.el9_4.x86_64.rpmmgolang-misc-1.21.13-4.el9_4.noarch.rpmogolang-tests-1.21.13-4.el9_4.noarch.rpm@golang-1.21.13-4.el9_4.x86_64.rpmngolang-src-1.21.13-4.el9_4.noarch.rpmAgolang-bin-1.21.13-4.el9_4.x86_64.rpmlgolang-docs-1.21.13-4.el9_4.noarch.rpmEgo-toolset-1.21.13-4.el9_4.x86_64.rpmmgolang-misc-1.21.13-4.el9_4.noarch.rpmogolang-tests-1.21.13-4.el9_4.noarch.rpm@golang-1.21.13-4.el9_4.x86_64.rpmngolang-src-1.21.13-4.el9_4.noarch.rpmAgolang-bin-1.21.13-4.el9_4.x86_64.rpmlgolang-docs-1.21.13-4.el9_4.noarch.rpm] &dsecurityImportant: thunderbird security update2`https://access.redhat.com/errata/RHSA-2024:7552RHSA-2024:7552RHSA-2024:7552 https://access.redhat.com/security/cve/CVE-2024-9392CVE-2024-9392CVE-2024-9392https://access.redhat.com/security/cve/CVE-2024-9393CVE-2024-9393CVE-2024-9393https://access.redhat.com/security/cve/CVE-2024-9394CVE-2024-9394CVE-2024-9394https://access.redhat.com/security/cve/CVE-2024-9396CVE-2024-9396CVE-2024-9396https://access.redhat.com/security/cve/CVE-2024-9397CVE-2024-9397CVE-2024-9397https://access.redhat.com/security/cve/CVE-2024-9398CVE-2024-9398CVE-2024-9398https://access.redhat.com/security/cve/CVE-2024-9399CVE-2024-9399CVE-2024-9399https://access.redhat.com/security/cve/CVE-2024-9400CVE-2024-9400CVE-2024-9400https://access.redhat.com/security/cve/CVE-2024-9401CVE-2024-9401CVE-2024-9401https://access.redhat.com/security/cve/CVE-2024-9402CVE-2024-9402CVE-2024-9402https://access.redhat.com/security/cve/CVE-2024-9403CVE-2024-9403CVE-2024-9403https://bugzilla.redhat.com/23159452315945https://bugzilla.redhat.com/23159472315947https://bugzilla.redhat.com/23159492315949https://bugzilla.redhat.com/23159502315950https://bugzilla.redhat.com/23159512315951https://bugzilla.redhat.com/23159522315952https://bugzilla.redhat.com/23159532315953https://bugzilla.redhat.com/23159542315954https://bugzilla.redhat.com/23159562315956https://bugzilla.redhat.com/23159572315957https://bugzilla.redhat.com/23159592315959https://errata.almalinux.org/9/ALSA-2024-7552.htmlALSA-2024:7552ALSA-2024:7552 9Kthunderbird-128.3.0-1.el9_4.alma.1.x86_64.rpm9Kthunderbird-128.3.0-1.el9_4.alma.1.x86_64.rpm5^ 7gBBBBBBBBBBBBBBsecurityImportant: .NET 6.0 security update"https://access.redhat.com/errata/RHSA-2024:7867RHSA-2024:7867RHSA-2024:7867 https://access.redhat.com/security/cve/CVE-2024-43483CVE-2024-43483CVE-2024-43483https://access.redhat.com/security/cve/CVE-2024-43484CVE-2024-43484CVE-2024-43484https://access.redhat.com/security/cve/CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/23157292315729https://bugzilla.redhat.com/23157302315730https://bugzilla.redhat.com/23157312315731https://errata.almalinux.org/9/ALSA-2024-7867.htmlALSA-2024:7867ALSA-2024:7867 $>dotnet-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm >aspnetcore-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm#>dotnet-hostfxr-6.0-6.0.35-1.el9_4.x86_64.rpm',dotnet-templates-6.0-6.0.135-1.el9_4.x86_64.rpm%,dotnet-sdk-6.0-6.0.135-1.el9_4.x86_64.rpm!>aspnetcore-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm">dotnet-apphost-pack-6.0-6.0.35-1.el9_4.x86_64.rpm&>dotnet-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm$>dotnet-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm >aspnetcore-runtime-6.0-6.0.35-1.el9_4.x86_64.rpm#>dotnet-hostfxr-6.0-6.0.35-1.el9_4.x86_64.rpm',dotnet-templates-6.0-6.0.135-1.el9_4.x86_64.rpm%,dotnet-sdk-6.0-6.0.135-1.el9_4.x86_64.rpm!>aspnetcore-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm">dotnet-apphost-pack-6.0-6.0.35-1.el9_4.x86_64.rpm&>dotnet-targeting-pack-6.0-6.0.35-1.el9_4.x86_64.rpm3_ xBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update4 https://access.redhat.com/errata/RHSA-2024:7869RHSA-2024:7869RHSA-2024:7869 https://access.redhat.com/security/cve/CVE-2024-38229CVE-2024-38229CVE-2024-38229https://access.redhat.com/security/cve/CVE-2024-43483CVE-2024-43483CVE-2024-43483https://access.redhat.com/security/cve/CVE-2024-43484CVE-2024-43484CVE-2024-43484https://access.redhat.com/security/cve/CVE-2024-43485CVE-2024-43485CVE-2024-43485https://bugzilla.redhat.com/23157292315729https://bugzilla.redhat.com/23157302315730https://bugzilla.redhat.com/23157312315731https://bugzilla.redhat.com/23161612316161https://errata.almalinux.org/9/ALSA-2024-7869.htmlALSA-2024:7869ALSA-2024:7869 X,dotnet-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm,dotnet-host-8.0.10-1.el9_4.x86_64.rpmW,dotnet-hostfxr-8.0-8.0.10-1.el9_4.x86_64.rpm[9dotnet-templates-8.0-8.0.110-1.el9_4.x86_64.rpmY9dotnet-sdk-8.0-8.0.110-1.el9_4.x86_64.rpmU,aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpmV,dotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpm 9netstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpmK,dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpmT,aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpmL9dotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpmD,aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpmZ,dotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpm X,dotnet-runtime-8.0-8.0.10-1.el9_4.x86_64.rpm,dotnet-host-8.0.10-1.el9_4.x86_64.rpmW,dotnet-hostfxr-8.0-8.0.10-1.el9_4.x86_64.rpm[9dotnet-templates-8.0-8.0.110-1.el9_4.x86_64.rpmY9dotnet-sdk-8.0-8.0.110-1.el9_4.x86_64.rpmU,aspnetcore-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpmV,dotnet-apphost-pack-8.0-8.0.10-1.el9_4.x86_64.rpm 9netstandard-targeting-pack-2.1-8.0.110-1.el9_4.x86_64.rpmK,dotnet-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpmT,aspnetcore-runtime-8.0-8.0.10-1.el9_4.x86_64.rpmL9dotnet-sdk-dbg-8.0-8.0.110-1.el9_4.x86_64.rpmD,aspnetcore-runtime-dbg-8.0-8.0.10-1.el9_4.x86_64.rpmZ,dotnet-targeting-pack-8.0-8.0.10-1.el9_4.x86_64.rpmQ` SBBsecurityImportant: firefox security updateJhttps://access.redhat.com/errata/RHSA-2024:7958RHSA-2024:7958RHSA-2024:7958 https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://errata.almalinux.org/9/ALSA-2024-7958.htmlALSA-2024:7958ALSA-2024:7958 7Wfirefox-128.3.1-2.el9_4.alma.1.x86_64.rpmOWfirefox-x11-128.3.1-2.el9_4.alma.1.x86_64.rpm7Wfirefox-128.3.1-2.el9_4.alma.1.x86_64.rpmOWfirefox-x11-128.3.1-2.el9_4.alma.1.x86_64.rpmZa XsecurityImportant: thunderbird security updatedihttps://access.redhat.com/errata/RHSA-2024:8025RHSA-2024:8025RHSA-2024:8025 https://access.redhat.com/security/cve/CVE-2024-9680CVE-2024-9680CVE-2024-9680https://bugzilla.redhat.com/23174422317442https://errata.almalinux.org/9/ALSA-2024-8025.htmlALSA-2024:8025ALSA-2024:8025 9Ethunderbird-128.3.1-1.el9_4.alma.1.x86_64.rpm9Ethunderbird-128.3.1-1.el9_4.alma.1.x86_64.rpm@b $[BBBBBBBsecurityModerate: OpenIPMI security updateM:https://access.redhat.com/errata/RHSA-2024:8037RHSA-2024:8037RHSA-2024:8037 https://access.redhat.com/security/cve/CVE-2024-42934CVE-2024-42934CVE-2024-42934https://bugzilla.redhat.com/23083752308375https://errata.almalinux.org/9/ALSA-2024-8037.htmlALSA-2024:8037ALSA-2024:8037 bCOpenIPMI-2.0.32-5.el9_4.i686.rpmbCOpenIPMI-2.0.32-5.el9_4.x86_64.rpmcCOpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpmdCOpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpmcCOpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpmdCOpenIPMI-libs-2.0.32-5.el9_4.i686.rpmbCOpenIPMI-2.0.32-5.el9_4.i686.rpmbCOpenIPMI-2.0.32-5.el9_4.x86_64.rpmcCOpenIPMI-lanserv-2.0.32-5.el9_4.x86_64.rpmdCOpenIPMI-libs-2.0.32-5.el9_4.x86_64.rpmcCOpenIPMI-lanserv-2.0.32-5.el9_4.i686.rpmdCOpenIPMI-libs-2.0.32-5.el9_4.i686.rpm`c .eBBBBBBBsecurityImportant: podman security update\ https://access.redhat.com/errata/RHSA-2024:8039RHSA-2024:8039RHSA-2024:8039 https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://errata.almalinux.org/9/ALSA-2024-8039.htmlALSA-2024:8039ALSA-2024:8039 /podman-remote-4.9.4-13.el9_4.x86_64.rpm-podman-4.9.4-13.el9_4.x86_64.rpm0podman-tests-4.9.4-13.el9_4.x86_64.rpm.podman-plugins-4.9.4-13.el9_4.x86_64.rpmfpodman-docker-4.9.4-13.el9_4.noarch.rpm/podman-remote-4.9.4-13.el9_4.x86_64.rpm-podman-4.9.4-13.el9_4.x86_64.rpm0podman-tests-4.9.4-13.el9_4.x86_64.rpm.podman-plugins-4.9.4-13.el9_4.x86_64.rpmfpodman-docker-4.9.4-13.el9_4.noarch.rpm*d 1osecurityImportant: containernetworking-plugins security updatecChttps://access.redhat.com/errata/RHSA-2024:8110RHSA-2024:8110RHSA-2024:8110 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-8110.htmlALSA-2024:8110ALSA-2024:8110 JZcontainernetworking-plugins-1.4.0-6.el9_4.x86_64.rpmJZcontainernetworking-plugins-1.4.0-6.el9_4.x86_64.rpme 6rBBsecurityImportant: skopeo security update& https://access.redhat.com/errata/RHSA-2024:8111RHSA-2024:8111RHSA-2024:8111 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-8111.htmlALSA-2024:8111ALSA-2024:8111 <skopeo-tests-1.14.5-2.el9_4.x86_64.rpm;skopeo-1.14.5-2.el9_4.x86_64.rpm<skopeo-tests-1.14.5-2.el9_4.x86_64.rpm;skopeo-1.14.5-2.el9_4.x86_64.rpmyf ;wBBsecurityImportant: buildah security update0r https://access.redhat.com/errata/RHSA-2024:8112RHSA-2024:8112RHSA-2024:8112 https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://errata.almalinux.org/9/ALSA-2024-8112.htmlALSA-2024:8112ALSA-2024:8112 =buildah-tests-1.33.9-1.el9_4.x86_64.rpm<buildah-1.33.9-1.el9_4.x86_64.rpm=buildah-tests-1.33.9-1.el9_4.x86_64.rpm<buildah-1.33.9-1.el9_4.x86_64.rpmgg |BBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security update"r https://access.redhat.com/errata/RHSA-2024:8117RHSA-2024:8117RHSA-2024:8117 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8117.htmlALSA-2024:8117ALSA-2024:8117 c_java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpme_java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpmC_java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpmf_java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpmd_java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpmB_java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpmb_java-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpmc_java-1.8.0-openjdk-demo-1.8.0.432.b06-2.el9.x86_64.rpme_java-1.8.0-openjdk-headless-1.8.0.432.b06-2.el9.x86_64.rpmC_java-1.8.0-openjdk-javadoc-zip-1.8.0.432.b06-2.el9.noarch.rpmf_java-1.8.0-openjdk-src-1.8.0.432.b06-2.el9.x86_64.rpmd_java-1.8.0-openjdk-devel-1.8.0.432.b06-2.el9.x86_64.rpmB_java-1.8.0-openjdk-javadoc-1.8.0.432.b06-2.el9.noarch.rpmb_java-1.8.0-openjdk-1.8.0.432.b06-2.el9.x86_64.rpmvh IBBBBBBBBBBBBBBBBsecurityModerate: java-11-openjdk security updateq https://access.redhat.com/errata/RHSA-2024:8121RHSA-2024:8121RHSA-2024:8121 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8121.htmlALSA-2024:8121ALSA-2024:8121 *java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpm)java-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpm%java-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpm&java-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpm,java-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpm-java-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpm(java-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpm+java-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpm'java-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpm *java-11-openjdk-javadoc-zip-11.0.25.0.9-2.el9.x86_64.rpm)java-11-openjdk-javadoc-11.0.25.0.9-2.el9.x86_64.rpm%java-11-openjdk-11.0.25.0.9-2.el9.x86_64.rpm&java-11-openjdk-demo-11.0.25.0.9-2.el9.x86_64.rpm,java-11-openjdk-src-11.0.25.0.9-2.el9.x86_64.rpm-java-11-openjdk-static-libs-11.0.25.0.9-2.el9.x86_64.rpm(java-11-openjdk-headless-11.0.25.0.9-2.el9.x86_64.rpm+java-11-openjdk-jmods-11.0.25.0.9-2.el9.x86_64.rpm'java-11-openjdk-devel-11.0.25.0.9-2.el9.x86_64.rpmfi .\BBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updateq https://access.redhat.com/errata/RHSA-2024:8124RHSA-2024:8124RHSA-2024:8124 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8124.htmlALSA-2024:8124ALSA-2024:8124 /java-17-openjdk-src-17.0.13.0.11-3.el9.alma.1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.alma.1.x86_64.rpm0java-17-openjdk-static-libs-17.0.13.0.11-3.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.13.0.11-3.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.13.0.11-3.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.13.0.11-3.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.13.0.11-3.el9.alma.1.x86_64.rpm.java-17-openjdk-jmods-17.0.13.0.11-3.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.13.0.11-3.el9.alma.1.x86_64.rpm /java-17-openjdk-src-17.0.13.0.11-3.el9.alma.1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.13.0.11-3.el9.alma.1.x86_64.rpm0java-17-openjdk-static-libs-17.0.13.0.11-3.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.13.0.11-3.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.13.0.11-3.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.13.0.11-3.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.13.0.11-3.el9.alma.1.x86_64.rpm.java-17-openjdk-jmods-17.0.13.0.11-3.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.13.0.11-3.el9.alma.1.x86_64.rpmlj oBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security updatev https://access.redhat.com/errata/RHSA-2024:8127RHSA-2024:8127RHSA-2024:8127 https://access.redhat.com/security/cve/CVE-2023-48161CVE-2023-48161CVE-2023-48161https://access.redhat.com/security/cve/CVE-2024-21208CVE-2024-21208CVE-2024-21208https://access.redhat.com/security/cve/CVE-2024-21210CVE-2024-21210CVE-2024-21210https://access.redhat.com/security/cve/CVE-2024-21217CVE-2024-21217CVE-2024-21217https://access.redhat.com/security/cve/CVE-2024-21235CVE-2024-21235CVE-2024-21235https://bugzilla.redhat.com/22510252251025https://bugzilla.redhat.com/23185242318524https://bugzilla.redhat.com/23185262318526https://bugzilla.redhat.com/23185302318530https://bugzilla.redhat.com/23185342318534https://errata.almalinux.org/9/ALSA-2024-8127.htmlALSA-2024:8127ALSA-2024:8127 4&java-21-openjdk-jmods-21.0.5.0.10-3.el9.alma.1.x86_64.rpm3&java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.alma.1.x86_64.rpm2&java-21-openjdk-javadoc-21.0.5.0.10-3.el9.alma.1.x86_64.rpm0&java-21-openjdk-devel-21.0.5.0.10-3.el9.alma.1.x86_64.rpm.&java-21-openjdk-21.0.5.0.10-3.el9.alma.1.x86_64.rpm5&java-21-openjdk-src-21.0.5.0.10-3.el9.alma.1.x86_64.rpm1&java-21-openjdk-headless-21.0.5.0.10-3.el9.alma.1.x86_64.rpm/&java-21-openjdk-demo-21.0.5.0.10-3.el9.alma.1.x86_64.rpm6&java-21-openjdk-static-libs-21.0.5.0.10-3.el9.alma.1.x86_64.rpm 4&java-21-openjdk-jmods-21.0.5.0.10-3.el9.alma.1.x86_64.rpm3&java-21-openjdk-javadoc-zip-21.0.5.0.10-3.el9.alma.1.x86_64.rpm2&java-21-openjdk-javadoc-21.0.5.0.10-3.el9.alma.1.x86_64.rpm0&java-21-openjdk-devel-21.0.5.0.10-3.el9.alma.1.x86_64.rpm.&java-21-openjdk-21.0.5.0.10-3.el9.alma.1.x86_64.rpm5&java-21-openjdk-src-21.0.5.0.10-3.el9.alma.1.x86_64.rpm1&java-21-openjdk-headless-21.0.5.0.10-3.el9.alma.1.x86_64.rpm/&java-21-openjdk-demo-21.0.5.0.10-3.el9.alma.1.x86_64.rpm6&java-21-openjdk-static-libs-21.0.5.0.10-3.el9.alma.1.x86_64.rpm^k BBBBBBBBBBBBBBBBsecurityModerate: kernel security update <https://access.redhat.com/errata/RHSA-2024:8162RHSA-2024:8162RHSA-2024:8162 https://access.redhat.com/security/cve/CVE-2021-47385CVE-2021-47385CVE-2021-47385https://access.redhat.com/security/cve/CVE-2023-28746CVE-2023-28746CVE-2023-28746https://access.redhat.com/security/cve/CVE-2023-52658CVE-2023-52658CVE-2023-52658https://access.redhat.com/security/cve/CVE-2024-27403CVE-2024-27403CVE-2024-27403https://access.redhat.com/security/cve/CVE-2024-35989CVE-2024-35989CVE-2024-35989https://access.redhat.com/security/cve/CVE-2024-36889CVE-2024-36889CVE-2024-36889https://access.redhat.com/security/cve/CVE-2024-36978CVE-2024-36978CVE-2024-36978https://access.redhat.com/security/cve/CVE-2024-38556CVE-2024-38556CVE-2024-38556https://access.redhat.com/security/cve/CVE-2024-39483CVE-2024-39483CVE-2024-39483https://access.redhat.com/security/cve/CVE-2024-39502CVE-2024-39502CVE-2024-39502https://access.redhat.com/security/cve/CVE-2024-40959CVE-2024-40959CVE-2024-40959https://access.redhat.com/security/cve/CVE-2024-42079CVE-2024-42079CVE-2024-42079https://access.redhat.com/security/cve/CVE-2024-42272CVE-2024-42272CVE-2024-42272https://access.redhat.com/security/cve/CVE-2024-42284CVE-2024-42284CVE-2024-42284https://bugzilla.redhat.com/22707002270700https://bugzilla.redhat.com/22811272281127https://bugzilla.redhat.com/22811492281149https://bugzilla.redhat.com/22818472281847https://bugzilla.redhat.com/22823552282355https://bugzilla.redhat.com/22845712284571https://bugzilla.redhat.com/22930782293078https://bugzilla.redhat.com/22934432293443https://bugzilla.redhat.com/22959212295921https://bugzilla.redhat.com/22974742297474https://bugzilla.redhat.com/22975432297543https://bugzilla.redhat.com/23005172300517https://errata.almalinux.org/9/ALSA-2024-8162.htmlALSA-2024:8162ALSA-2024:8162 $Ekernel-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm*Erv-5.14.0-427.40.1.el9_4.x86_64.rpm!Ekernel-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpmEkernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm)Ertla-5.14.0-427.40.1.el9_4.x86_64.rpm(Ekernel-headers-5.14.0-427.40.1.el9_4.x86_64.rpm%Eperf-5.14.0-427.40.1.el9_4.x86_64.rpm"Ekernel-debug-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm#Ekernel-devel-5.14.0-427.40.1.el9_4.x86_64.rpm $Ekernel-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm*Erv-5.14.0-427.40.1.el9_4.x86_64.rpm!Ekernel-debug-devel-5.14.0-427.40.1.el9_4.x86_64.rpmEkernel-doc-5.14.0-427.40.1.el9_4.noarch.rpm)Ertla-5.14.0-427.40.1.el9_4.x86_64.rpm(Ekernel-headers-5.14.0-427.40.1.el9_4.x86_64.rpm%Eperf-5.14.0-427.40.1.el9_4.x86_64.rpm"Ekernel-debug-devel-matched-5.14.0-427.40.1.el9_4.x86_64.rpm#Ekernel-devel-5.14.0-427.40.1.el9_4.x86_64.rpml TBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateHnhttps://access.redhat.com/errata/RHSA-2024:8180RHSA-2024:8180RHSA-2024:8180 https://access.redhat.com/security/cve/CVE-2024-23271CVE-2024-23271CVE-2024-23271https://access.redhat.com/security/cve/CVE-2024-27820CVE-2024-27820CVE-2024-27820https://access.redhat.com/security/cve/CVE-2024-27838CVE-2024-27838CVE-2024-27838https://access.redhat.com/security/cve/CVE-2024-27851CVE-2024-27851CVE-2024-27851https://access.redhat.com/security/cve/CVE-2024-40776CVE-2024-40776CVE-2024-40776https://access.redhat.com/security/cve/CVE-2024-40779CVE-2024-40779CVE-2024-40779https://access.redhat.com/security/cve/CVE-2024-40780CVE-2024-40780CVE-2024-40780https://access.redhat.com/security/cve/CVE-2024-40782CVE-2024-40782CVE-2024-40782https://access.redhat.com/security/cve/CVE-2024-40789CVE-2024-40789CVE-2024-40789https://access.redhat.com/security/cve/CVE-2024-40866CVE-2024-40866CVE-2024-40866https://access.redhat.com/security/cve/CVE-2024-44187CVE-2024-44187CVE-2024-44187https://bugzilla.redhat.com/23018412301841https://bugzilla.redhat.com/23020672302067https://bugzilla.redhat.com/23020692302069https://bugzilla.redhat.com/23020702302070https://bugzilla.redhat.com/23020712302071https://bugzilla.redhat.com/23127242312724https://bugzilla.redhat.com/23146962314696https://bugzilla.redhat.com/23146982314698https://bugzilla.redhat.com/23147022314702https://bugzilla.redhat.com/23147042314704https://bugzilla.redhat.com/23147062314706https://errata.almalinux.org/9/ALSA-2024-8180.htmlALSA-2024:8180ALSA-2024:8180 6webkit2gtk3-jsc-devel-2.46.1-2.el9_4.x86_64.rpm6webkit2gtk3-jsc-devel-2.46.1-2.el9_4.i686.rpm3webkit2gtk3-2.46.1-2.el9_4.x86_64.rpm3webkit2gtk3-2.46.1-2.el9_4.i686.rpm4webkit2gtk3-devel-2.46.1-2.el9_4.i686.rpm5webkit2gtk3-jsc-2.46.1-2.el9_4.x86_64.rpm4webkit2gtk3-devel-2.46.1-2.el9_4.x86_64.rpm5webkit2gtk3-jsc-2.46.1-2.el9_4.i686.rpm6webkit2gtk3-jsc-devel-2.46.1-2.el9_4.x86_64.rpm6webkit2gtk3-jsc-devel-2.46.1-2.el9_4.i686.rpm3webkit2gtk3-2.46.1-2.el9_4.x86_64.rpm3webkit2gtk3-2.46.1-2.el9_4.i686.rpm4webkit2gtk3-devel-2.46.1-2.el9_4.i686.rpm5webkit2gtk3-jsc-2.46.1-2.el9_4.x86_64.rpm4webkit2gtk3-devel-2.46.1-2.el9_4.x86_64.rpm5webkit2gtk3-jsc-2.46.1-2.el9_4.i686.rpmim +aBBBBBBBBsecurityModerate: python3.11 security update6Thttps://access.redhat.com/errata/RHSA-2024:8374RHSA-2024:8374RHSA-2024:8374 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8374.htmlALSA-2024:8374ALSA-2024:8374 _python3.11-libs-3.11.7-1.el9_4.6.i686.rpm_python3.11-libs-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-3.11.7-1.el9_4.6.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.6.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.6.i686.rpmpython3.11-tkinter-3.11.7-1.el9_4.6.x86_64.rpm_python3.11-libs-3.11.7-1.el9_4.6.i686.rpm_python3.11-libs-3.11.7-1.el9_4.6.x86_64.rpmpython3.11-3.11.7-1.el9_4.6.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.6.x86_64.rpm^python3.11-devel-3.11.7-1.el9_4.6.i686.rpmpython3.11-tkinter-3.11.7-1.el9_4.6.x86_64.rpmvn 2lBBBBsecurityModerate: python3.9 security update \https://access.redhat.com/errata/RHSA-2024:8446RHSA-2024:8446RHSA-2024:8446 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8446.htmlALSA-2024:8446ALSA-2024:8446 Rgpython3-devel-3.9.18-3.el9_4.6.i686.rpm1gpython3-tkinter-3.9.18-3.el9_4.6.x86_64.rpmggpython-unversioned-command-3.9.18-3.el9_4.6.noarch.rpmRgpython3-devel-3.9.18-3.el9_4.6.x86_64.rpmRgpython3-devel-3.9.18-3.el9_4.6.i686.rpm1gpython3-tkinter-3.9.18-3.el9_4.6.x86_64.rpmggpython-unversioned-command-3.9.18-3.el9_4.6.noarch.rpmRgpython3-devel-3.9.18-3.el9_4.6.x86_64.rpm!o =sBBBBBBBBsecurityModerate: python3.12 security updatef https://access.redhat.com/errata/RHSA-2024:8447RHSA-2024:8447RHSA-2024:8447 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-8447.htmlALSA-2024:8447ALSA-2024:8447  python3.12-libs-3.12.1-4.el9_4.4.i686.rpm python3.12-devel-3.12.1-4.el9_4.4.i686.rpm python3.12-devel-3.12.1-4.el9_4.4.x86_64.rpm python3.12-libs-3.12.1-4.el9_4.4.x86_64.rpm; python3.12-tkinter-3.12.1-4.el9_4.4.x86_64.rpm: python3.12-3.12.1-4.el9_4.4.x86_64.rpm python3.12-libs-3.12.1-4.el9_4.4.i686.rpm python3.12-devel-3.12.1-4.el9_4.4.i686.rpm python3.12-devel-3.12.1-4.el9_4.4.x86_64.rpm python3.12-libs-3.12.1-4.el9_4.4.x86_64.rpm; python3.12-tkinter-3.12.1-4.el9_4.4.x86_64.rpm: python3.12-3.12.1-4.el9_4.4.x86_64.rpmp ~BBsecurityImportant: buildah security updatesthttps://access.redhat.com/errata/RHSA-2024:8563RHSA-2024:8563RHSA-2024:8563 https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://bugzilla.redhat.com/23174582317458https://errata.almalinux.org/9/ALSA-2024-8563.htmlALSA-2024:8563ALSA-2024:8563 = buildah-tests-1.33.10-1.el9_4.x86_64.rpm< buildah-1.33.10-1.el9_4.x86_64.rpm= buildah-tests-1.33.10-1.el9_4.x86_64.rpm< buildah-1.33.10-1.el9_4.x86_64.rpm.q CBBBBBBBBBBBBBBBsecurityModerate: kernel security updateg>-https://access.redhat.com/errata/RHSA-2024:8617RHSA-2024:8617RHSA-2024:8617 https://access.redhat.com/security/cve/CVE-2021-47383CVE-2021-47383CVE-2021-47383https://access.redhat.com/security/cve/CVE-2024-2201CVE-2024-2201CVE-2024-2201https://access.redhat.com/security/cve/CVE-2024-26640CVE-2024-26640CVE-2024-26640https://access.redhat.com/security/cve/CVE-2024-26826CVE-2024-26826CVE-2024-26826https://access.redhat.com/security/cve/CVE-2024-26923CVE-2024-26923CVE-2024-26923https://access.redhat.com/security/cve/CVE-2024-26935CVE-2024-26935CVE-2024-26935https://access.redhat.com/security/cve/CVE-2024-26961CVE-2024-26961CVE-2024-26961https://access.redhat.com/security/cve/CVE-2024-36244CVE-2024-36244CVE-2024-36244https://access.redhat.com/security/cve/CVE-2024-39472CVE-2024-39472CVE-2024-39472https://access.redhat.com/security/cve/CVE-2024-39504CVE-2024-39504CVE-2024-39504https://access.redhat.com/security/cve/CVE-2024-40904CVE-2024-40904CVE-2024-40904https://access.redhat.com/security/cve/CVE-2024-40931CVE-2024-40931CVE-2024-40931https://access.redhat.com/security/cve/CVE-2024-40960CVE-2024-40960CVE-2024-40960https://access.redhat.com/security/cve/CVE-2024-40972CVE-2024-40972CVE-2024-40972https://access.redhat.com/security/cve/CVE-2024-40977CVE-2024-40977CVE-2024-40977https://access.redhat.com/security/cve/CVE-2024-40995CVE-2024-40995CVE-2024-40995https://access.redhat.com/security/cve/CVE-2024-40998CVE-2024-40998CVE-2024-40998https://access.redhat.com/security/cve/CVE-2024-41005CVE-2024-41005CVE-2024-41005https://access.redhat.com/security/cve/CVE-2024-41013CVE-2024-41013CVE-2024-41013https://access.redhat.com/security/cve/CVE-2024-41014CVE-2024-41014CVE-2024-41014https://access.redhat.com/security/cve/CVE-2024-43854CVE-2024-43854CVE-2024-43854https://access.redhat.com/security/cve/CVE-2024-45018CVE-2024-45018CVE-2024-45018https://bugzilla.redhat.com/22681182268118https://bugzilla.redhat.com/22701002270100https://bugzilla.redhat.com/22756042275604https://bugzilla.redhat.com/22771712277171https://bugzilla.redhat.com/22781762278176https://bugzilla.redhat.com/22782352278235https://bugzilla.redhat.com/22823572282357https://bugzilla.redhat.com/22936542293654https://bugzilla.redhat.com/22960672296067https://bugzilla.redhat.com/22974762297476https://bugzilla.redhat.com/22974882297488https://bugzilla.redhat.com/22975152297515https://bugzilla.redhat.com/22975442297544https://bugzilla.redhat.com/22975562297556https://bugzilla.redhat.com/22975612297561https://bugzilla.redhat.com/22975792297579https://bugzilla.redhat.com/22975822297582https://bugzilla.redhat.com/22975892297589https://bugzilla.redhat.com/23002962300296https://bugzilla.redhat.com/23002972300297https://bugzilla.redhat.com/23117152311715https://errata.almalinux.org/9/ALSA-2024-8617.htmlALSA-2024:8617ALSA-2024:8617 !Fkernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpmFkernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm$Fkernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm(Fkernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm"Fkernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm*Frv-5.14.0-427.42.1.el9_4.x86_64.rpm%Fperf-5.14.0-427.42.1.el9_4.x86_64.rpm#Fkernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm)Frtla-5.14.0-427.42.1.el9_4.x86_64.rpm !Fkernel-debug-devel-5.14.0-427.42.1.el9_4.x86_64.rpmFkernel-doc-5.14.0-427.42.1.el9_4.noarch.rpm$Fkernel-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm(Fkernel-headers-5.14.0-427.42.1.el9_4.x86_64.rpm"Fkernel-debug-devel-matched-5.14.0-427.42.1.el9_4.x86_64.rpm*Frv-5.14.0-427.42.1.el9_4.x86_64.rpm%Fperf-5.14.0-427.42.1.el9_4.x86_64.rpm#Fkernel-devel-5.14.0-427.42.1.el9_4.x86_64.rpm)Frtla-5.14.0-427.42.1.el9_4.x86_64.rpmBr UBBsecurityImportant: grafana security update%Khttps://access.redhat.com/errata/RHSA-2024:8678RHSA-2024:8678RHSA-2024:8678 https://access.redhat.com/security/cve/CVE-2024-47875CVE-2024-47875CVE-2024-47875https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/23157192315719https://bugzilla.redhat.com/23180522318052https://errata.almalinux.org/9/ALSA-2024-8678.htmlALSA-2024:8678ALSA-2024:8678 l9grafana-selinux-9.2.10-19.el9_4.x86_64.rpmF9grafana-9.2.10-19.el9_4.x86_64.rpml9grafana-selinux-9.2.10-19.el9_4.x86_64.rpmF9grafana-9.2.10-19.el9_4.x86_64.rpms ZsecurityLow: mod_http2 security update3phttps://access.redhat.com/errata/RHSA-2024:8680RHSA-2024:8680RHSA-2024:8680 https://access.redhat.com/security/cve/CVE-2024-36387CVE-2024-36387CVE-2024-36387https://bugzilla.redhat.com/22950062295006https://errata.almalinux.org/9/ALSA-2024-8680.htmlALSA-2024:8680ALSA-2024:8680 )mod_http2-2.0.26-2.el9_4.1.x86_64.rpm)mod_http2-2.0.26-2.el9_4.1.x86_64.rpm@t !]BBsecurityModerate: firefox security updateMhttps://access.redhat.com/errata/RHSA-2024:8726RHSA-2024:8726RHSA-2024:8726 https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-8726.htmlALSA-2024:8726ALSA-2024:8726 OXfirefox-x11-128.4.0-1.el9_4.x86_64.rpm7Xfirefox-128.4.0-1.el9_4.x86_64.rpmOXfirefox-x11-128.4.0-1.el9_4.x86_64.rpm7Xfirefox-128.4.0-1.el9_4.x86_64.rpmu $bsecurityModerate: thunderbird security updateThttps://access.redhat.com/errata/RHSA-2024:8793RHSA-2024:8793RHSA-2024:8793 https://access.redhat.com/security/cve/CVE-2024-10458CVE-2024-10458CVE-2024-10458https://access.redhat.com/security/cve/CVE-2024-10459CVE-2024-10459CVE-2024-10459https://access.redhat.com/security/cve/CVE-2024-10460CVE-2024-10460CVE-2024-10460https://access.redhat.com/security/cve/CVE-2024-10461CVE-2024-10461CVE-2024-10461https://access.redhat.com/security/cve/CVE-2024-10462CVE-2024-10462CVE-2024-10462https://access.redhat.com/security/cve/CVE-2024-10463CVE-2024-10463CVE-2024-10463https://access.redhat.com/security/cve/CVE-2024-10464CVE-2024-10464CVE-2024-10464https://access.redhat.com/security/cve/CVE-2024-10465CVE-2024-10465CVE-2024-10465https://access.redhat.com/security/cve/CVE-2024-10466CVE-2024-10466CVE-2024-10466https://access.redhat.com/security/cve/CVE-2024-10467CVE-2024-10467CVE-2024-10467https://bugzilla.redhat.com/23224242322424https://bugzilla.redhat.com/23224252322425https://bugzilla.redhat.com/23224282322428https://bugzilla.redhat.com/23224292322429https://bugzilla.redhat.com/23224332322433https://bugzilla.redhat.com/23224342322434https://bugzilla.redhat.com/23224382322438https://bugzilla.redhat.com/23224392322439https://bugzilla.redhat.com/23224402322440https://bugzilla.redhat.com/23224442322444https://errata.almalinux.org/9/ALSA-2024-8793.htmlALSA-2024:8793ALSA-2024:8793 9Fthunderbird-128.4.0-1.el9_4.alma.1.x86_64.rpm9Fthunderbird-128.4.0-1.el9_4.alma.1.x86_64.rpmv *eBBBsecurityImportant: openexr security updatep:https://access.redhat.com/errata/RHSA-2024:8800RHSA-2024:8800RHSA-2024:8800 https://access.redhat.com/security/cve/CVE-2023-5841CVE-2023-5841CVE-2023-5841https://bugzilla.redhat.com/22623972262397https://errata.almalinux.org/9/ALSA-2024-8800.htmlALSA-2024:8800ALSA-2024:8800 ,Dopenexr-libs-3.1.1-2.el9_4.1.x86_64.rpm]Dopenexr-3.1.1-2.el9_4.1.x86_64.rpm,Dopenexr-libs-3.1.1-2.el9_4.1.i686.rpm,Dopenexr-libs-3.1.1-2.el9_4.1.x86_64.rpm]Dopenexr-3.1.1-2.el9_4.1.x86_64.rpm,Dopenexr-libs-3.1.1-2.el9_4.1.i686.rpmw 1kBBBBsecurityModerate: libtiff security update* https://access.redhat.com/errata/RHSA-2024:8914RHSA-2024:8914RHSA-2024:8914 https://access.redhat.com/security/cve/CVE-2024-7006CVE-2024-7006CVE-2024-7006https://bugzilla.redhat.com/23029962302996https://errata.almalinux.org/9/ALSA-2024-8914.htmlALSA-2024:8914ALSA-2024:8914 uylibtiff-4.4.0-12.el9_4.1.x86_64.rpmvylibtiff-devel-4.4.0-12.el9_4.1.x86_64.rpmuylibtiff-4.4.0-12.el9_4.1.i686.rpmvylibtiff-devel-4.4.0-12.el9_4.1.i686.rpmuylibtiff-4.4.0-12.el9_4.1.x86_64.rpmvylibtiff-devel-4.4.0-12.el9_4.1.x86_64.rpmuylibtiff-4.4.0-12.el9_4.1.i686.rpmvylibtiff-devel-4.4.0-12.el9_4.1.i686.rpm x 4rsecurityModerate: edk2 security update5Ehttps://access.redhat.com/errata/RHSA-2024:8935RHSA-2024:8935RHSA-2024:8935 https://access.redhat.com/security/cve/CVE-2024-6119CVE-2024-6119CVE-2024-6119https://bugzilla.redhat.com/23061582306158https://errata.almalinux.org/9/ALSA-2024-8935.htmlALSA-2024:8935ALSA-2024:8935 shedk2-aarch64-20231122-6.el9_4.4.noarch.rpmHhedk2-ovmf-20231122-6.el9_4.4.noarch.rpmshedk2-aarch64-20231122-6.el9_4.4.noarch.rpmHhedk2-ovmf-20231122-6.el9_4.4.noarch.rpmty >uBBBBBBBsecurityImportant: podman security updateznhttps://access.redhat.com/errata/RHSA-2024:9051RHSA-2024:9051RHSA-2024:9051 https://access.redhat.com/security/cve/CVE-2024-9407CVE-2024-9407CVE-2024-9407https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://access.redhat.com/security/cve/CVE-2024-9676CVE-2024-9676CVE-2024-9676https://bugzilla.redhat.com/23158872315887https://bugzilla.redhat.com/23174582317458https://bugzilla.redhat.com/23174672317467https://errata.almalinux.org/9/ALSA-2024-9051.htmlALSA-2024:9051ALSA-2024:9051 -podman-4.9.4-16.el9_4.x86_64.rpm.podman-plugins-4.9.4-16.el9_4.x86_64.rpm/podman-remote-4.9.4-16.el9_4.x86_64.rpmfpodman-docker-4.9.4-16.el9_4.noarch.rpm0podman-tests-4.9.4-16.el9_4.x86_64.rpm-podman-4.9.4-16.el9_4.x86_64.rpm.podman-plugins-4.9.4-16.el9_4.x86_64.rpm/podman-remote-4.9.4-16.el9_4.x86_64.rpmfpodman-docker-4.9.4-16.el9_4.noarch.rpm0podman-tests-4.9.4-16.el9_4.x86_64.rpmuz ?securityModerate: edk2 security updateh= https://access.redhat.com/errata/RHSA-2024:9088RHSA-2024:9088RHSA-2024:9088 https://access.redhat.com/security/cve/CVE-2023-6129CVE-2023-6129CVE-2023-6129https://access.redhat.com/security/cve/CVE-2023-6237CVE-2023-6237CVE-2023-6237https://access.redhat.com/security/cve/CVE-2024-0727CVE-2024-0727CVE-2024-0727https://access.redhat.com/security/cve/CVE-2024-1298CVE-2024-1298CVE-2024-1298https://bugzilla.redhat.com/22575712257571https://bugzilla.redhat.com/22585022258502https://bugzilla.redhat.com/22599442259944https://bugzilla.redhat.com/22842432284243https://errata.almalinux.org/9/ALSA-2024-9088.htmlALSA-2024:9088ALSA-2024:9088 H*edk2-ovmf-20240524-6.el9_5.noarch.rpmH*edk2-ovmf-20240524-6.el9_5.noarch.rpm { AsecurityModerate: containernetworking-plugins security update%yhttps://access.redhat.com/errata/RHSA-2024:9089RHSA-2024:9089RHSA-2024:9089 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9089.htmlALSA-2024:9089ALSA-2024:9089 J[containernetworking-plugins-1.5.1-2.el9.x86_64.rpmJ[containernetworking-plugins-1.5.1-2.el9.x86_64.rpm,| DsecurityModerate: xorg-x11-server-Xwayland security update:https://access.redhat.com/errata/RHSA-2024:9093RHSA-2024:9093RHSA-2024:9093 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9093.htmlALSA-2024:9093ALSA-2024:9093 #!xorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpm#!xorg-x11-server-Xwayland-23.2.7-1.el9.x86_64.rpm,} GBBsecurityModerate: buildah security updateX}https://access.redhat.com/errata/RHSA-2024:9097RHSA-2024:9097RHSA-2024:9097 https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-3727CVE-2024-3727CVE-2024-3727https://bugzilla.redhat.com/22747672274767https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9097.htmlALSA-2024:9097ALSA-2024:9097 =buildah-tests-1.37.2-1.el9.x86_64.rpm<buildah-1.37.2-1.el9.x86_64.rpm=buildah-tests-1.37.2-1.el9.x86_64.rpm<buildah-1.37.2-1.el9.x86_64.rpmh~ LBBsecurityModerate: skopeo security updateUq https://access.redhat.com/errata/RHSA-2024:9098RHSA-2024:9098RHSA-2024:9098 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-3727CVE-2024-3727CVE-2024-3727https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22747672274767https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9098.htmlALSA-2024:9098ALSA-2024:9098 ;skopeo-1.16.1-1.el9.x86_64.rpm<skopeo-tests-1.16.1-1.el9.x86_64.rpm;skopeo-1.16.1-1.el9.x86_64.rpm<skopeo-tests-1.16.1-1.el9.x86_64.rpm< +QBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gnome-shell and gnome-shell-extensions security updateFhttps://access.redhat.com/errata/RHSA-2024:9114RHSA-2024:9114RHSA-2024:9114 https://access.redhat.com/security/cve/CVE-2024-36472CVE-2024-36472CVE-2024-36472https://bugzilla.redhat.com/22837502283750https://errata.almalinux.org/9/ALSA-2024-9114.htmlALSA-2024:9114ALSA-2024:9114 qbgnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpmpbgnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpmdbgnome-shell-extension-common-40.7-19.el9.noarch.rpmwbgnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpmsbgnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpmjbgnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpmcbgnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpmhbgnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpmhTgnome-shell-40.10-21.el9.x86_64.rpmkbgnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpmtbgnome-shell-extension-user-theme-40.7-19.el9.noarch.rpmebgnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpmfbgnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpmubgnome-shell-extension-window-list-40.7-19.el9.noarch.rpmnbgnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpmvbgnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm`bgnome-classic-session-40.7-19.el9.noarch.rpmabgnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpmobgnome-shell-extension-places-menu-40.7-19.el9.noarch.rpmrbgnome-shell-extension-top-icons-40.7-19.el9.noarch.rpmlbgnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpmibgnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpmmbgnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpmgbgnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpmbbgnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpmqbgnome-shell-extension-systemMonitor-40.7-19.el9.noarch.rpmpbgnome-shell-extension-screenshot-window-sizer-40.7-19.el9.noarch.rpmdbgnome-shell-extension-common-40.7-19.el9.noarch.rpmwbgnome-shell-extension-workspace-indicator-40.7-19.el9.noarch.rpmsbgnome-shell-extension-updates-dialog-40.7-19.el9.noarch.rpmjbgnome-shell-extension-gesture-inhibitor-40.7-19.el9.noarch.rpmcbgnome-shell-extension-classification-banner-40.7-19.el9.noarch.rpmhbgnome-shell-extension-desktop-icons-40.7-19.el9.noarch.rpmhTgnome-shell-40.10-21.el9.x86_64.rpmkbgnome-shell-extension-heads-up-display-40.7-19.el9.noarch.rpmtbgnome-shell-extension-user-theme-40.7-19.el9.noarch.rpmebgnome-shell-extension-custom-menu-40.7-19.el9.noarch.rpmfbgnome-shell-extension-dash-to-dock-40.7-19.el9.noarch.rpmubgnome-shell-extension-window-list-40.7-19.el9.noarch.rpmnbgnome-shell-extension-panel-favorites-40.7-19.el9.noarch.rpmvbgnome-shell-extension-windowsNavigator-40.7-19.el9.noarch.rpm`bgnome-classic-session-40.7-19.el9.noarch.rpmabgnome-shell-extension-apps-menu-40.7-19.el9.noarch.rpmobgnome-shell-extension-places-menu-40.7-19.el9.noarch.rpmrbgnome-shell-extension-top-icons-40.7-19.el9.noarch.rpmlbgnome-shell-extension-launch-new-instance-40.7-19.el9.noarch.rpmibgnome-shell-extension-drive-menu-40.7-19.el9.noarch.rpmmbgnome-shell-extension-native-window-placement-40.7-19.el9.noarch.rpmgbgnome-shell-extension-dash-to-panel-40.7-19.el9.noarch.rpmbbgnome-shell-extension-auto-move-windows-40.7-19.el9.noarch.rpmX 0lBBsecurityModerate: grafana security updateF4 https://access.redhat.com/errata/RHSA-2024:9115RHSA-2024:9115RHSA-2024:9115 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24789CVE-2024-24789CVE-2024-24789https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-6104CVE-2024-6104CVE-2024-6104https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22926682292668https://bugzilla.redhat.com/22927872292787https://bugzilla.redhat.com/22940002294000https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9115.htmlALSA-2024:9115ALSA-2024:9115 lFgrafana-selinux-10.2.6-4.el9.x86_64.rpmFFgrafana-10.2.6-4.el9.x86_64.rpmlFgrafana-selinux-10.2.6-4.el9.x86_64.rpmFFgrafana-10.2.6-4.el9.x86_64.rpm =qBBBBBBBBBBsecurityModerate: xorg-x11-server security updatez)https://access.redhat.com/errata/RHSA-2024:9122RHSA-2024:9122RHSA-2024:9122 https://access.redhat.com/security/cve/CVE-2024-31080CVE-2024-31080CVE-2024-31080https://access.redhat.com/security/cve/CVE-2024-31081CVE-2024-31081CVE-2024-31081https://access.redhat.com/security/cve/CVE-2024-31083CVE-2024-31083CVE-2024-31083https://bugzilla.redhat.com/22719972271997https://bugzilla.redhat.com/22719982271998https://bugzilla.redhat.com/22720002272000https://errata.almalinux.org/9/ALSA-2024-9122.htmlALSA-2024:9122ALSA-2024:9122 xorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpm xorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpm$xorg-x11-server-common-1.20.11-26.el9.x86_64.rpm"xorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpm!xorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpmxorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpmxorg-x11-server-Xephyr-1.20.11-26.el9.x86_64.rpm xorg-x11-server-Xnest-1.20.11-26.el9.x86_64.rpm$xorg-x11-server-common-1.20.11-26.el9.x86_64.rpm"xorg-x11-server-Xvfb-1.20.11-26.el9.x86_64.rpm!xorg-x11-server-Xorg-1.20.11-26.el9.x86_64.rpmxorg-x11-server-Xdmx-1.20.11-26.el9.x86_64.rpm 8~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: libvirt security update#|https://access.redhat.com/errata/RHSA-2024:9128RHSA-2024:9128RHSA-2024:9128 https://access.redhat.com/security/cve/CVE-2024-8235CVE-2024-8235CVE-2024-8235https://bugzilla.redhat.com/23086802308680https://errata.almalinux.org/9/ALSA-2024-9128.htmlALSA-2024:9128ALSA-2024:9128 .libvirt-daemon-log-10.5.0-7.el9_5.alma.1.x86_64.rpmO.libvirt-daemon-driver-nodedev-10.5.0-7.el9_5.alma.1.x86_64.rpmW.libvirt-daemon-driver-storage-logical-10.5.0-7.el9_5.alma.1.x86_64.rpmL.libvirt-daemon-config-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpmX.libvirt-daemon-driver-storage-mpath-10.5.0-7.el9_5.alma.1.x86_64.rpmJ.libvirt-daemon-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-daemon-plugin-lockd-10.5.0-7.el9_5.alma.1.x86_64.rpmQ.libvirt-daemon-driver-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpmU.libvirt-daemon-driver-storage-disk-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-daemon-common-10.5.0-7.el9_5.alma.1.x86_64.rpmZ.libvirt-daemon-driver-storage-scsi-10.5.0-7.el9_5.alma.1.x86_64.rpm[.libvirt-daemon-kvm-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-client-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpmH.libvirt-10.5.0-7.el9_5.alma.1.x86_64.rpm7.libvirt-ssh-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpmP.libvirt-daemon-driver-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpmT.libvirt-daemon-driver-storage-core-10.5.0-7.el9_5.alma.1.x86_64.rpm\.libvirt-libs-10.5.0-7.el9_5.alma.1.x86_64.rpmR.libvirt-daemon-driver-secret-10.5.0-7.el9_5.alma.1.x86_64.rpmI.libvirt-client-10.5.0-7.el9_5.alma.1.x86_64.rpmK.libvirt-daemon-config-network-10.5.0-7.el9_5.alma.1.x86_64.rpmN.libvirt-daemon-driver-network-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-daemon-lock-10.5.0-7.el9_5.alma.1.x86_64.rpm].libvirt-nss-10.5.0-7.el9_5.alma.1.x86_64.rpmV.libvirt-daemon-driver-storage-iscsi-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-daemon-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpmM.libvirt-daemon-driver-interface-10.5.0-7.el9_5.alma.1.x86_64.rpmS.libvirt-daemon-driver-storage-10.5.0-7.el9_5.alma.1.x86_64.rpmY.libvirt-daemon-driver-storage-rbd-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-daemon-log-10.5.0-7.el9_5.alma.1.x86_64.rpmO.libvirt-daemon-driver-nodedev-10.5.0-7.el9_5.alma.1.x86_64.rpmW.libvirt-daemon-driver-storage-logical-10.5.0-7.el9_5.alma.1.x86_64.rpmL.libvirt-daemon-config-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpmX.libvirt-daemon-driver-storage-mpath-10.5.0-7.el9_5.alma.1.x86_64.rpmJ.libvirt-daemon-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-daemon-plugin-lockd-10.5.0-7.el9_5.alma.1.x86_64.rpmQ.libvirt-daemon-driver-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpmU.libvirt-daemon-driver-storage-disk-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-daemon-common-10.5.0-7.el9_5.alma.1.x86_64.rpmZ.libvirt-daemon-driver-storage-scsi-10.5.0-7.el9_5.alma.1.x86_64.rpm[.libvirt-daemon-kvm-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-client-qemu-10.5.0-7.el9_5.alma.1.x86_64.rpmH.libvirt-10.5.0-7.el9_5.alma.1.x86_64.rpm7.libvirt-ssh-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpmP.libvirt-daemon-driver-nwfilter-10.5.0-7.el9_5.alma.1.x86_64.rpmT.libvirt-daemon-driver-storage-core-10.5.0-7.el9_5.alma.1.x86_64.rpm\.libvirt-libs-10.5.0-7.el9_5.alma.1.x86_64.rpmR.libvirt-daemon-driver-secret-10.5.0-7.el9_5.alma.1.x86_64.rpmI.libvirt-client-10.5.0-7.el9_5.alma.1.x86_64.rpmK.libvirt-daemon-config-network-10.5.0-7.el9_5.alma.1.x86_64.rpmN.libvirt-daemon-driver-network-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-daemon-lock-10.5.0-7.el9_5.alma.1.x86_64.rpm].libvirt-nss-10.5.0-7.el9_5.alma.1.x86_64.rpmV.libvirt-daemon-driver-storage-iscsi-10.5.0-7.el9_5.alma.1.x86_64.rpm.libvirt-daemon-proxy-10.5.0-7.el9_5.alma.1.x86_64.rpmM.libvirt-daemon-driver-interface-10.5.0-7.el9_5.alma.1.x86_64.rpmS.libvirt-daemon-driver-storage-10.5.0-7.el9_5.alma.1.x86_64.rpmY.libvirt-daemon-driver-storage-rbd-10.5.0-7.el9_5.alma.1.x86_64.rpmv =yBBsecurityModerate: toolbox security updateh https://access.redhat.com/errata/RHSA-2024:9135RHSA-2024:9135RHSA-2024:9135 https://access.redhat.com/security/cve/CVE-2023-45290CVE-2023-45290CVE-2023-45290https://access.redhat.com/security/cve/CVE-2024-24785CVE-2024-24785CVE-2024-24785https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://bugzilla.redhat.com/22680172268017https://bugzilla.redhat.com/22680222268022https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22953102295310https://errata.almalinux.org/9/ALSA-2024-9135.htmlALSA-2024:9135ALSA-2024:9135 q3toolbox-0.0.99.5-5.el9.x86_64.rpmr3toolbox-tests-0.0.99.5-5.el9.x86_64.rpmq3toolbox-0.0.99.5-5.el9.x86_64.rpmr3toolbox-tests-0.0.99.5-5.el9.x86_64.rpm= $~BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qemu-kvm security updateahttps://access.redhat.com/errata/RHSA-2024:9136RHSA-2024:9136RHSA-2024:9136 https://access.redhat.com/security/cve/CVE-2024-26327CVE-2024-26327CVE-2024-26327https://access.redhat.com/security/cve/CVE-2024-3446CVE-2024-3446CVE-2024-3446https://access.redhat.com/security/cve/CVE-2024-7409CVE-2024-7409CVE-2024-7409https://bugzilla.redhat.com/22648442264844https://bugzilla.redhat.com/22742112274211https://bugzilla.redhat.com/23024872302487https://errata.almalinux.org/9/ALSA-2024-9136.htmlALSA-2024:9136ALSA-2024:9136 ]qemu-pr-helper-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-docs-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-tools-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-ui-opengl-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-block-rbd-9.0.0-10.el9_5.x86_64.rpm ]qemu-kvm-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-common-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-audio-pa-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.x86_64.rpm ]qemu-guest-agent-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-block-curl-9.0.0-10.el9_5.x86_64.rpm|]qemu-kvm-block-blkio-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-device-usb-host-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-core-9.0.0-10.el9_5.x86_64.rpm ]qemu-img-9.0.0-10.el9_5.x86_64.rpm]qemu-pr-helper-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-docs-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-tools-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-device-display-virtio-gpu-pci-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-ui-opengl-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-block-rbd-9.0.0-10.el9_5.x86_64.rpm ]qemu-kvm-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-device-display-virtio-gpu-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-common-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-audio-pa-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-ui-egl-headless-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-device-display-virtio-vga-9.0.0-10.el9_5.x86_64.rpm ]qemu-guest-agent-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-block-curl-9.0.0-10.el9_5.x86_64.rpm|]qemu-kvm-block-blkio-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-device-usb-host-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-device-usb-redirect-9.0.0-10.el9_5.x86_64.rpm]qemu-kvm-core-9.0.0-10.el9_5.x86_64.rpm ]qemu-img-9.0.0-10.el9_5.x86_64.rpm8 1eBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateh https://access.redhat.com/errata/RHSA-2024:9144RHSA-2024:9144RHSA-2024:9144 https://access.redhat.com/security/cve/CVE-2023-42843CVE-2023-42843CVE-2023-42843https://access.redhat.com/security/cve/CVE-2023-42950CVE-2023-42950CVE-2023-42950https://access.redhat.com/security/cve/CVE-2023-42956CVE-2023-42956CVE-2023-42956https://access.redhat.com/security/cve/CVE-2024-4558CVE-2024-4558CVE-2024-4558https://bugzilla.redhat.com/22717172271717https://bugzilla.redhat.com/22717182271718https://bugzilla.redhat.com/22717192271719https://bugzilla.redhat.com/22796892279689https://errata.almalinux.org/9/ALSA-2024-9144.htmlALSA-2024:9144ALSA-2024:9144 5webkit2gtk3-jsc-2.44.3-2.el9.i686.rpm3webkit2gtk3-2.44.3-2.el9.i686.rpm4webkit2gtk3-devel-2.44.3-2.el9.x86_64.rpm6webkit2gtk3-jsc-devel-2.44.3-2.el9.i686.rpm3webkit2gtk3-2.44.3-2.el9.x86_64.rpm6webkit2gtk3-jsc-devel-2.44.3-2.el9.x86_64.rpm4webkit2gtk3-devel-2.44.3-2.el9.i686.rpm5webkit2gtk3-jsc-2.44.3-2.el9.x86_64.rpm5webkit2gtk3-jsc-2.44.3-2.el9.i686.rpm3webkit2gtk3-2.44.3-2.el9.i686.rpm4webkit2gtk3-devel-2.44.3-2.el9.x86_64.rpm6webkit2gtk3-jsc-devel-2.44.3-2.el9.i686.rpm3webkit2gtk3-2.44.3-2.el9.x86_64.rpm6webkit2gtk3-jsc-devel-2.44.3-2.el9.x86_64.rpm4webkit2gtk3-devel-2.44.3-2.el9.i686.rpm5webkit2gtk3-jsc-2.44.3-2.el9.x86_64.rpm 32securityModerate: python-jinja2 security updatewhttps://access.redhat.com/errata/RHSA-2024:9150RHSA-2024:9150RHSA-2024:9150 https://access.redhat.com/security/cve/CVE-2024-34064CVE-2024-34064CVE-2024-34064https://bugzilla.redhat.com/22794762279476https://errata.almalinux.org/9/ALSA-2024-9150.htmlALSA-2024:9150ALSA-2024:9150  python3-jinja2-2.11.3-6.el9.noarch.rpm python3-jinja2-2.11.3-6.el9.noarch.rpm :tBBBBsecurityModerate: lldpd security update~Mhttps://access.redhat.com/errata/RHSA-2024:9158RHSA-2024:9158RHSA-2024:9158 https://access.redhat.com/security/cve/CVE-2020-27827CVE-2020-27827CVE-2020-27827https://access.redhat.com/security/cve/CVE-2021-43612CVE-2021-43612CVE-2021-43612https://access.redhat.com/security/cve/CVE-2023-41910CVE-2023-41910CVE-2023-41910https://bugzilla.redhat.com/19214381921438https://bugzilla.redhat.com/20403882040388https://bugzilla.redhat.com/22374112237411https://errata.almalinux.org/9/ALSA-2024-9158.htmlALSA-2024:9158ALSA-2024:9158 03lldpd-1.0.18-4.el9.x86_64.rpm13lldpd-devel-1.0.18-4.el9.x86_64.rpm13lldpd-devel-1.0.18-4.el9.i686.rpm03lldpd-1.0.18-4.el9.i686.rpm03lldpd-1.0.18-4.el9.x86_64.rpm13lldpd-devel-1.0.18-4.el9.x86_64.rpm13lldpd-devel-1.0.18-4.el9.i686.rpm03lldpd-1.0.18-4.el9.i686.rpm {BBBBBBBBBBBBsecurityModerate: poppler security updateK+https://access.redhat.com/errata/RHSA-2024:9167RHSA-2024:9167RHSA-2024:9167 https://access.redhat.com/security/cve/CVE-2024-6239CVE-2024-6239CVE-2024-6239https://bugzilla.redhat.com/22935942293594https://errata.almalinux.org/9/ALSA-2024-9167.htmlALSA-2024:9167ALSA-2024:9167 poppler-21.01.0-21.el9.i686.rpmpoppler-glib-21.01.0-21.el9.i686.rpmpoppler-21.01.0-21.el9.x86_64.rpmpoppler-cpp-21.01.0-21.el9.i686.rpmpoppler-glib-21.01.0-21.el9.x86_64.rpm poppler-qt5-21.01.0-21.el9.i686.rpmzpoppler-utils-21.01.0-21.el9.x86_64.rpmpoppler-cpp-21.01.0-21.el9.x86_64.rpm poppler-qt5-21.01.0-21.el9.x86_64.rpm poppler-21.01.0-21.el9.i686.rpmpoppler-glib-21.01.0-21.el9.i686.rpmpoppler-21.01.0-21.el9.x86_64.rpmpoppler-cpp-21.01.0-21.el9.i686.rpmpoppler-glib-21.01.0-21.el9.x86_64.rpm poppler-qt5-21.01.0-21.el9.i686.rpmzpoppler-utils-21.01.0-21.el9.x86_64.rpmpoppler-cpp-21.01.0-21.el9.x86_64.rpm poppler-qt5-21.01.0-21.el9.x86_64.rpm   JsecurityModerate: mod_auth_openidc security updatev$https://access.redhat.com/errata/RHSA-2024:9180RHSA-2024:9180RHSA-2024:9180 https://access.redhat.com/security/cve/CVE-2024-24814CVE-2024-24814CVE-2024-24814https://bugzilla.redhat.com/22640922264092https://errata.almalinux.org/9/ALSA-2024-9180.htmlALSA-2024:9180ALSA-2024:9180  mod_auth_openidc-2.4.10-1.el9.x86_64.rpm mod_auth_openidc-2.4.10-1.el9.x86_64.rpm/  MBBBsecurityModerate: jose security updateRhttps://access.redhat.com/errata/RHSA-2024:9181RHSA-2024:9181RHSA-2024:9181 https://access.redhat.com/security/cve/CVE-2023-50967CVE-2023-50967CVE-2023-50967https://access.redhat.com/security/cve/CVE-2024-28176CVE-2024-28176CVE-2024-28176https://bugzilla.redhat.com/22688202268820https://bugzilla.redhat.com/22705382270538https://errata.almalinux.org/9/ALSA-2024-9181.htmlALSA-2024:9181ALSA-2024:9181 ""jose-14-1.el9.x86_64.rpm "libjose-14-1.el9.i686.rpm "libjose-14-1.el9.x86_64.rpm""jose-14-1.el9.x86_64.rpm "libjose-14-1.el9.i686.rpm "libjose-14-1.el9.x86_64.rpmb  SBBBBBBBBsecurityModerate: gtk3 security updatel+https://access.redhat.com/errata/RHSA-2024:9184RHSA-2024:9184RHSA-2024:9184 https://access.redhat.com/security/cve/CVE-2024-6655CVE-2024-6655CVE-2024-6655https://bugzilla.redhat.com/22970982297098https://errata.almalinux.org/9/ALSA-2024-9184.htmlALSA-2024:9184ALSA-2024:9184 gtk3-devel-3.24.31-5.el9.x86_64.rpmkgtk-update-icon-cache-3.24.31-5.el9.x86_64.rpmgtk3-devel-3.24.31-5.el9.i686.rpmlgtk3-immodule-xim-3.24.31-5.el9.x86_64.rpmgtk3-3.24.31-5.el9.i686.rpmgtk3-3.24.31-5.el9.x86_64.rpmgtk3-devel-3.24.31-5.el9.x86_64.rpmkgtk-update-icon-cache-3.24.31-5.el9.x86_64.rpmgtk3-devel-3.24.31-5.el9.i686.rpmlgtk3-immodule-xim-3.24.31-5.el9.x86_64.rpmgtk3-3.24.31-5.el9.i686.rpmgtk3-3.24.31-5.el9.x86_64.rpm  !^BsecurityModerate: iperf3 security update?https://access.redhat.com/errata/RHSA-2024:9185RHSA-2024:9185RHSA-2024:9185 https://access.redhat.com/security/cve/CVE-2023-7250CVE-2023-7250CVE-2023-7250https://access.redhat.com/security/cve/CVE-2024-26306CVE-2024-26306CVE-2024-26306https://bugzilla.redhat.com/22447072244707https://bugzilla.redhat.com/22702702270270https://errata.almalinux.org/9/ALSA-2024-9185.htmlALSA-2024:9185ALSA-2024:9185 Giperf3-3.9-13.el9.x86_64.rpmGiperf3-3.9-13.el9.i686.rpmGiperf3-3.9-13.el9.x86_64.rpmGiperf3-3.9-13.el9.i686.rpmA  )bBBBBBsecurityLow: bcc security update3Vvhttps://access.redhat.com/errata/RHSA-2024:9187RHSA-2024:9187RHSA-2024:9187 https://access.redhat.com/security/cve/CVE-2024-2314CVE-2024-2314CVE-2024-2314https://bugzilla.redhat.com/22690192269019https://errata.almalinux.org/9/ALSA-2024-9187.htmlALSA-2024:9187ALSA-2024:9187 *sbcc-tools-0.30.0-6.el9.x86_64.rpm&slibbpf-tools-0.30.0-6.el9.x86_64.rpm[spython3-bcc-0.30.0-6.el9.noarch.rpm)sbcc-0.30.0-6.el9.x86_64.rpm*sbcc-tools-0.30.0-6.el9.x86_64.rpm&slibbpf-tools-0.30.0-6.el9.x86_64.rpm[spython3-bcc-0.30.0-6.el9.noarch.rpm)sbcc-0.30.0-6.el9.x86_64.rpmA ,jsecurityLow: bpftrace security update3L@https://access.redhat.com/errata/RHSA-2024:9188RHSA-2024:9188RHSA-2024:9188 https://access.redhat.com/security/cve/CVE-2024-2313CVE-2024-2313CVE-2024-2313https://bugzilla.redhat.com/22690142269014https://errata.almalinux.org/9/ALSA-2024-9188.htmlALSA-2024:9188ALSA-2024:9188 /bpftrace-0.21.1-1.el9.x86_64.rpm/bpftrace-0.21.1-1.el9.x86_64.rpm0 7mBBBBBBBBsecurityModerate: python3.12 security update Fhttps://access.redhat.com/errata/RHSA-2024:9190RHSA-2024:9190RHSA-2024:9190 https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-4032CVE-2024-4032CVE-2024-4032https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/22929212292921https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9190.htmlALSA-2024:9190ALSA-2024:9190  python3.12-devel-3.12.5-2.el9.i686.rpm python3.12-devel-3.12.5-2.el9.x86_64.rpm python3.12-libs-3.12.5-2.el9.i686.rpm;python3.12-tkinter-3.12.5-2.el9.x86_64.rpm python3.12-libs-3.12.5-2.el9.x86_64.rpm:python3.12-3.12.5-2.el9.x86_64.rpm python3.12-devel-3.12.5-2.el9.i686.rpm python3.12-devel-3.12.5-2.el9.x86_64.rpm python3.12-libs-3.12.5-2.el9.i686.rpm;python3.12-tkinter-3.12.5-2.el9.x86_64.rpm python3.12-libs-3.12.5-2.el9.x86_64.rpm:python3.12-3.12.5-2.el9.x86_64.rpm< xBBBBBBBBsecurityModerate: python3.11 security updateRRhttps://access.redhat.com/errata/RHSA-2024:9192RHSA-2024:9192RHSA-2024:9192 https://access.redhat.com/security/cve/CVE-2024-0450CVE-2024-0450CVE-2024-0450https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/22765252276525https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9192.htmlALSA-2024:9192ALSA-2024:9192 ^python3.11-devel-3.11.9-7.el9.i686.rpm^python3.11-devel-3.11.9-7.el9.x86_64.rpmpython3.11-3.11.9-7.el9.x86_64.rpmpython3.11-tkinter-3.11.9-7.el9.x86_64.rpm_python3.11-libs-3.11.9-7.el9.x86_64.rpm_python3.11-libs-3.11.9-7.el9.i686.rpm^python3.11-devel-3.11.9-7.el9.i686.rpm^python3.11-devel-3.11.9-7.el9.x86_64.rpmpython3.11-3.11.9-7.el9.x86_64.rpmpython3.11-tkinter-3.11.9-7.el9.x86_64.rpm_python3.11-libs-3.11.9-7.el9.x86_64.rpm_python3.11-libs-3.11.9-7.el9.i686.rpmd CsecurityModerate: python3.12-PyMySQL security update$khttps://access.redhat.com/errata/RHSA-2024:9193RHSA-2024:9193RHSA-2024:9193 https://access.redhat.com/security/cve/CVE-2024-36039CVE-2024-36039CVE-2024-36039https://bugzilla.redhat.com/22828212282821https://errata.almalinux.org/9/ALSA-2024-9193.htmlALSA-2024:9193ALSA-2024:9193 jWpython3.12-PyMySQL+rsa-1.1.0-3.el9.noarch.rpmiWpython3.12-PyMySQL-1.1.0-3.el9.noarch.rpmjWpython3.12-PyMySQL+rsa-1.1.0-3.el9.noarch.rpmiWpython3.12-PyMySQL-1.1.0-3.el9.noarch.rpml FsecurityModerate: python3.11-PyMySQL security updatekhttps://access.redhat.com/errata/RHSA-2024:9194RHSA-2024:9194RHSA-2024:9194 https://access.redhat.com/security/cve/CVE-2024-36039CVE-2024-36039CVE-2024-36039https://bugzilla.redhat.com/22828212282821https://errata.almalinux.org/9/ALSA-2024-9194.htmlALSA-2024:9194ALSA-2024:9194 eSpython3.11-PyMySQL-1.0.2-2.el9.noarch.rpmfSpython3.11-PyMySQL+rsa-1.0.2-2.el9.noarch.rpmeSpython3.11-PyMySQL-1.0.2-2.el9.noarch.rpmfSpython3.11-PyMySQL+rsa-1.0.2-2.el9.noarch.rpml IBBBBBBBsecurityModerate: cyrus-imapd security updatez@https://access.redhat.com/errata/RHSA-2024:9195RHSA-2024:9195RHSA-2024:9195 https://access.redhat.com/security/cve/CVE-2024-34055CVE-2024-34055CVE-2024-34055https://bugzilla.redhat.com/22905102290510https://errata.almalinux.org/9/ALSA-2024-9195.htmlALSA-2024:9195ALSA-2024:9195 Jperl-Cyrus-3.4.8-1.el9.x86_64.rpm9cyrus-imapd-utils-3.4.8-1.el9.x86_64.rpmpcyrus-imapd-libs-3.4.8-1.el9.x86_64.rpmpcyrus-imapd-libs-3.4.8-1.el9.i686.rpm8cyrus-imapd-3.4.8-1.el9.x86_64.rpmJperl-Cyrus-3.4.8-1.el9.x86_64.rpm9cyrus-imapd-utils-3.4.8-1.el9.x86_64.rpmpcyrus-imapd-libs-3.4.8-1.el9.x86_64.rpmpcyrus-imapd-libs-3.4.8-1.el9.i686.rpm8cyrus-imapd-3.4.8-1.el9.x86_64.rpmW SsecurityModerate: runc security update:7https://access.redhat.com/errata/RHSA-2024:9200RHSA-2024:9200RHSA-2024:9200 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://bugzilla.redhat.com/22798142279814https://errata.almalinux.org/9/ALSA-2024-9200.htmlALSA-2024:9200ALSA-2024:9200 W[runc-1.1.13-4.el9.x86_64.rpmW[runc-1.1.13-4.el9.x86_64.rpm1 (VBBBBBBBBBBBBBBBBsecurityModerate: postfix security updateq https://access.redhat.com/errata/RHSA-2024:9243RHSA-2024:9243RHSA-2024:9243 https://access.redhat.com/security/cve/CVE-2023-51764CVE-2023-51764CVE-2023-51764https://bugzilla.redhat.com/22555632255563https://errata.almalinux.org/9/ALSA-2024-9243.htmlALSA-2024:9243ALSA-2024:9243 k+postfix-mysql-3.5.25-1.el9.x86_64.rpmn+postfix-pgsql-3.5.25-1.el9.x86_64.rpmi+postfix-ldap-3.5.25-1.el9.x86_64.rpmm+postfix-perl-scripts-3.5.25-1.el9.x86_64.rpml+postfix-pcre-3.5.25-1.el9.x86_64.rpmh+postfix-cdb-3.5.25-1.el9.x86_64.rpmo+postfix-sqlite-3.5.25-1.el9.x86_64.rpmj+postfix-lmdb-3.5.25-1.el9.x86_64.rpmg+postfix-3.5.25-1.el9.x86_64.rpm k+postfix-mysql-3.5.25-1.el9.x86_64.rpmn+postfix-pgsql-3.5.25-1.el9.x86_64.rpmi+postfix-ldap-3.5.25-1.el9.x86_64.rpmm+postfix-perl-scripts-3.5.25-1.el9.x86_64.rpml+postfix-pcre-3.5.25-1.el9.x86_64.rpmh+postfix-cdb-3.5.25-1.el9.x86_64.rpmo+postfix-sqlite-3.5.25-1.el9.x86_64.rpmj+postfix-lmdb-3.5.25-1.el9.x86_64.rpmg+postfix-3.5.25-1.el9.x86_64.rpm +isecurityModerate: oci-seccomp-bpf-hook security updatehttps://access.redhat.com/errata/RHSA-2024:9277RHSA-2024:9277RHSA-2024:9277 https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://bugzilla.redhat.com/22798142279814https://errata.almalinux.org/9/ALSA-2024-9277.htmlALSA-2024:9277ALSA-2024:9277 A oci-seccomp-bpf-hook-1.2.10-2.el9.x86_64.rpmA oci-seccomp-bpf-hook-1.2.10-2.el9.x86_64.rpm1 -,securityModerate: python-jwcrypto security updatehttps://access.redhat.com/errata/RHSA-2024:9281RHSA-2024:9281RHSA-2024:9281 https://access.redhat.com/security/cve/CVE-2023-6681CVE-2023-6681CVE-2023-6681https://bugzilla.redhat.com/22608432260843https://errata.almalinux.org/9/ALSA-2024-9281.htmlALSA-2024:9281ALSA-2024:9281 Lvpython3-jwcrypto-1.5.6-2.el9.noarch.rpmLvpython3-jwcrypto-1.5.6-2.el9.noarch.rpm nBBBBBBBBBBBBBBBBBBsecurityModerate: httpd security update+Lhttps://access.redhat.com/errata/RHSA-2024:9306RHSA-2024:9306RHSA-2024:9306 https://access.redhat.com/security/cve/CVE-2023-38709CVE-2023-38709CVE-2023-38709https://access.redhat.com/security/cve/CVE-2024-24795CVE-2024-24795CVE-2024-24795https://bugzilla.redhat.com/22734912273491https://bugzilla.redhat.com/22734992273499https://errata.almalinux.org/9/ALSA-2024-9306.htmlALSA-2024:9306ALSA-2024:9306 #_httpd-devel-2.4.62-1.el9.x86_64.rpm`_httpd-filesystem-2.4.62-1.el9.noarch.rpm7_mod_ldap-2.4.62-1.el9.x86_64.rpm;pmod_ssl-2.4.62-1.el9.x86_64.rpm!_httpd-2.4.62-1.el9.x86_64.rpm9pmod_proxy_html-2.4.62-1.el9.x86_64.rpm$_httpd-tools-2.4.62-1.el9.x86_64.rpm"_httpd-core-2.4.62-1.el9.x86_64.rpm:_mod_session-2.4.62-1.el9.x86_64.rpm8_mod_lua-2.4.62-1.el9.x86_64.rpma_httpd-manual-2.4.62-1.el9.noarch.rpm #_httpd-devel-2.4.62-1.el9.x86_64.rpm`_httpd-filesystem-2.4.62-1.el9.noarch.rpm7_mod_ldap-2.4.62-1.el9.x86_64.rpm;pmod_ssl-2.4.62-1.el9.x86_64.rpm!_httpd-2.4.62-1.el9.x86_64.rpm9pmod_proxy_html-2.4.62-1.el9.x86_64.rpm$_httpd-tools-2.4.62-1.el9.x86_64.rpm"_httpd-core-2.4.62-1.el9.x86_64.rpm:_mod_session-2.4.62-1.el9.x86_64.rpm8_mod_lua-2.4.62-1.el9.x86_64.rpma_httpd-manual-2.4.62-1.el9.noarch.rpm% CBBBBBBsecurityLow: NetworkManager security update3wjhttps://access.redhat.com/errata/RHSA-2024:9317RHSA-2024:9317RHSA-2024:9317 https://access.redhat.com/security/cve/CVE-2024-6501CVE-2024-6501CVE-2024-6501https://bugzilla.redhat.com/22957342295734https://errata.almalinux.org/9/ALSA-2024-9317.htmlALSA-2024:9317ALSA-2024:9317 5NetworkManager-config-connectivity-redhat-1.48.10-2.el9_5.alma.1.noarch.rpm5NetworkManager-cloud-setup-1.48.10-2.el9_5.alma.1.x86_64.rpm5NetworkManager-dispatcher-routing-rules-1.48.10-2.el9_5.alma.1.noarch.rpm 5NetworkManager-ovs-1.48.10-2.el9_5.alma.1.x86_64.rpm 5NetworkManager-ppp-1.48.10-2.el9_5.alma.1.x86_64.rpm5NetworkManager-config-connectivity-redhat-1.48.10-2.el9_5.alma.1.noarch.rpm5NetworkManager-cloud-setup-1.48.10-2.el9_5.alma.1.x86_64.rpm5NetworkManager-dispatcher-routing-rules-1.48.10-2.el9_5.alma.1.noarch.rpm 5NetworkManager-ovs-1.48.10-2.el9_5.alma.1.x86_64.rpm 5NetworkManager-ppp-1.48.10-2.el9_5.alma.1.x86_64.rpmH LBBsecurityLow: cockpit security update3a2https://access.redhat.com/errata/RHSA-2024:9325RHSA-2024:9325RHSA-2024:9325 https://access.redhat.com/security/cve/CVE-2024-6126CVE-2024-6126CVE-2024-6126https://bugzilla.redhat.com/22928972292897https://errata.almalinux.org/9/ALSA-2024-9325.htmlALSA-2024:9325ALSA-2024:9325  cockpit-pcp-323.1-1.el9_5.x86_64.rpm cockpit-storaged-323.1-1.el9_5.noarch.rpm cockpit-packagekit-323.1-1.el9_5.noarch.rpm cockpit-pcp-323.1-1.el9_5.x86_64.rpm cockpit-storaged-323.1-1.el9_5.noarch.rpm cockpit-packagekit-323.1-1.el9_5.noarch.rpm QBsecurityModerate: krb5 security update https://access.redhat.com/errata/RHSA-2024:9331RHSA-2024:9331RHSA-2024:9331 https://access.redhat.com/security/cve/CVE-2024-26458CVE-2024-26458CVE-2024-26458https://access.redhat.com/security/cve/CVE-2024-26461CVE-2024-26461CVE-2024-26461https://access.redhat.com/security/cve/CVE-2024-26462CVE-2024-26462CVE-2024-26462https://bugzilla.redhat.com/22667312266731https://bugzilla.redhat.com/22667402266740https://bugzilla.redhat.com/22667422266742https://errata.almalinux.org/9/ALSA-2024-9331.htmlALSA-2024:9331ALSA-2024:9331 Skrb5-devel-1.21.1-3.el9.x86_64.rpmSkrb5-devel-1.21.1-3.el9.i686.rpmSkrb5-devel-1.21.1-3.el9.x86_64.rpmSkrb5-devel-1.21.1-3.el9.i686.rpmd UBBBsecurityLow: openssl security update3L https://access.redhat.com/errata/RHSA-2024:9333RHSA-2024:9333RHSA-2024:9333 https://access.redhat.com/security/cve/CVE-2024-2511CVE-2024-2511CVE-2024-2511https://access.redhat.com/security/cve/CVE-2024-4603CVE-2024-4603CVE-2024-4603https://access.redhat.com/security/cve/CVE-2024-4741CVE-2024-4741CVE-2024-4741https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://bugzilla.redhat.com/22740202274020https://bugzilla.redhat.com/22810292281029https://bugzilla.redhat.com/22837572283757https://bugzilla.redhat.com/22945812294581https://errata.almalinux.org/9/ALSA-2024-9333.htmlALSA-2024:9333ALSA-2024:9333 *openssl-devel-3.2.2-6.el9_5.x86_64.rpmm*openssl-perl-3.2.2-6.el9_5.x86_64.rpm*openssl-devel-3.2.2-6.el9_5.i686.rpm*openssl-devel-3.2.2-6.el9_5.x86_64.rpmm*openssl-perl-3.2.2-6.el9_5.x86_64.rpm*openssl-devel-3.2.2-6.el9_5.i686.rpme ![BBBBsecurityModerate: python3.9 security updatejkhttps://access.redhat.com/errata/RHSA-2024:9371RHSA-2024:9371RHSA-2024:9371 https://access.redhat.com/security/cve/CVE-2024-8088CVE-2024-8088CVE-2024-8088https://bugzilla.redhat.com/23073702307370https://errata.almalinux.org/9/ALSA-2024-9371.htmlALSA-2024:9371ALSA-2024:9371 Rhpython3-devel-3.9.19-8.el9.x86_64.rpm1hpython3-tkinter-3.9.19-8.el9.x86_64.rpmghpython-unversioned-command-3.9.19-8.el9.noarch.rpmRhpython3-devel-3.9.19-8.el9.i686.rpmRhpython3-devel-3.9.19-8.el9.x86_64.rpm1hpython3-tkinter-3.9.19-8.el9.x86_64.rpmghpython-unversioned-command-3.9.19-8.el9.noarch.rpmRhpython3-devel-3.9.19-8.el9.i686.rpm< %bBsecurityModerate: libgcrypt security updateU https://access.redhat.com/errata/RHSA-2024:9404RHSA-2024:9404RHSA-2024:9404 https://access.redhat.com/security/cve/CVE-2024-2236CVE-2024-2236CVE-2024-2236https://bugzilla.redhat.com/22452182245218https://errata.almalinux.org/9/ALSA-2024-9404.htmlALSA-2024:9404ALSA-2024:9404 vlibgcrypt-devel-1.10.0-11.el9.i686.rpmvlibgcrypt-devel-1.10.0-11.el9.x86_64.rpmvlibgcrypt-devel-1.10.0-11.el9.i686.rpmvlibgcrypt-devel-1.10.0-11.el9.x86_64.rpmH ,fBBBBsecurityLow: vim security update3_thttps://access.redhat.com/errata/RHSA-2024:9405RHSA-2024:9405RHSA-2024:9405 https://access.redhat.com/security/cve/CVE-2021-3903CVE-2021-3903CVE-2021-3903https://bugzilla.redhat.com/20185582018558https://errata.almalinux.org/9/ALSA-2024-9405.htmlALSA-2024:9405ALSA-2024:9405 hZvim-enhanced-8.2.2637-21.el9.x86_64.rpmfZvim-X11-8.2.2637-21.el9.x86_64.rpmgZvim-common-8.2.2637-21.el9.x86_64.rpmhZvim-enhanced-8.2.2637-21.el9.x86_64.rpmfZvim-X11-8.2.2637-21.el9.x86_64.rpmgZvim-common-8.2.2637-21.el9.x86_64.rpms  1mBBsecurityModerate: bluez security updateS+https://access.redhat.com/errata/RHSA-2024:9413RHSA-2024:9413RHSA-2024:9413 https://access.redhat.com/security/cve/CVE-2023-27349CVE-2023-27349CVE-2023-27349https://access.redhat.com/security/cve/CVE-2023-44431CVE-2023-44431CVE-2023-44431https://access.redhat.com/security/cve/CVE-2023-45866CVE-2023-45866CVE-2023-45866https://access.redhat.com/security/cve/CVE-2023-50229CVE-2023-50229CVE-2023-50229https://access.redhat.com/security/cve/CVE-2023-50230CVE-2023-50230CVE-2023-50230https://access.redhat.com/security/cve/CVE-2023-51580CVE-2023-51580CVE-2023-51580https://access.redhat.com/security/cve/CVE-2023-51589CVE-2023-51589CVE-2023-51589https://access.redhat.com/security/cve/CVE-2023-51592CVE-2023-51592CVE-2023-51592https://access.redhat.com/security/cve/CVE-2023-51594CVE-2023-51594CVE-2023-51594https://access.redhat.com/security/cve/CVE-2023-51596CVE-2023-51596CVE-2023-51596https://bugzilla.redhat.com/22533912253391https://bugzilla.redhat.com/22787872278787https://bugzilla.redhat.com/22789452278945https://bugzilla.redhat.com/22789552278955https://bugzilla.redhat.com/22789622278962https://bugzilla.redhat.com/22789652278965https://bugzilla.redhat.com/22789672278967https://bugzilla.redhat.com/22789692278969https://bugzilla.redhat.com/22789722278972https://bugzilla.redhat.com/22789742278974https://errata.almalinux.org/9/ALSA-2024-9413.htmlALSA-2024:9413ALSA-2024:9413 , bluez-obexd-5.72-2.el9.x86_64.rpm+ bluez-cups-5.72-2.el9.x86_64.rpm, bluez-obexd-5.72-2.el9.x86_64.rpm+ bluez-cups-5.72-2.el9.x86_64.rpmJ! :rBBBBBBsecurityImportant: bubblewrap and flatpak security update~Rhttps://access.redhat.com/errata/RHSA-2024:9449RHSA-2024:9449RHSA-2024:9449 https://access.redhat.com/security/cve/CVE-2024-42472CVE-2024-42472CVE-2024-42472https://errata.almalinux.org/9/ALSA-2024-9449.htmlALSA-2024:9449ALSA-2024:9449 2flatpak-libs-1.12.9-3.el9_5.x86_64.rpm2flatpak-libs-1.12.9-3.el9_5.i686.rpm2flatpak-session-helper-1.12.9-3.el9_5.x86_64.rpm2flatpak-1.12.9-3.el9_5.x86_64.rpmt2flatpak-selinux-1.12.9-3.el9_5.noarch.rpm2flatpak-libs-1.12.9-3.el9_5.x86_64.rpm2flatpak-libs-1.12.9-3.el9_5.i686.rpm2flatpak-session-helper-1.12.9-3.el9_5.x86_64.rpm2flatpak-1.12.9-3.el9_5.x86_64.rpmt2flatpak-selinux-1.12.9-3.el9_5.noarch.rpmx" {BBBBBBBBsecurityModerate: python3.11 security updateP\https://access.redhat.com/errata/RHSA-2024:9450RHSA-2024:9450RHSA-2024:9450 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9450.htmlALSA-2024:9450ALSA-2024:9450 _python3.11-libs-3.11.9-7.el9_5.1.x86_64.rpm_python3.11-libs-3.11.9-7.el9_5.1.i686.rpmpython3.11-tkinter-3.11.9-7.el9_5.1.x86_64.rpmpython3.11-3.11.9-7.el9_5.1.x86_64.rpm^python3.11-devel-3.11.9-7.el9_5.1.x86_64.rpm^python3.11-devel-3.11.9-7.el9_5.1.i686.rpm_python3.11-libs-3.11.9-7.el9_5.1.x86_64.rpm_python3.11-libs-3.11.9-7.el9_5.1.i686.rpmpython3.11-tkinter-3.11.9-7.el9_5.1.x86_64.rpmpython3.11-3.11.9-7.el9_5.1.x86_64.rpm^python3.11-devel-3.11.9-7.el9_5.1.x86_64.rpm^python3.11-devel-3.11.9-7.el9_5.1.i686.rpm%# FBBBBBBBBsecurityModerate: python3.12 security update, https://access.redhat.com/errata/RHSA-2024:9451RHSA-2024:9451RHSA-2024:9451 https://access.redhat.com/security/cve/CVE-2024-6232CVE-2024-6232CVE-2024-6232https://bugzilla.redhat.com/23094262309426https://errata.almalinux.org/9/ALSA-2024-9451.htmlALSA-2024:9451ALSA-2024:9451  python3.12-libs-3.12.5-2.el9_5.1.x86_64.rpm python3.12-devel-3.12.5-2.el9_5.1.x86_64.rpm python3.12-libs-3.12.5-2.el9_5.1.i686.rpm:python3.12-3.12.5-2.el9_5.1.x86_64.rpm python3.12-devel-3.12.5-2.el9_5.1.i686.rpm;python3.12-tkinter-3.12.5-2.el9_5.1.x86_64.rpm python3.12-libs-3.12.5-2.el9_5.1.x86_64.rpm python3.12-devel-3.12.5-2.el9_5.1.x86_64.rpm python3.12-libs-3.12.5-2.el9_5.1.i686.rpm:python3.12-3.12.5-2.el9_5.1.x86_64.rpm python3.12-devel-3.12.5-2.el9_5.1.i686.rpm;python3.12-tkinter-3.12.5-2.el9_5.1.x86_64.rpm($ (QBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: pcp security update9https://access.redhat.com/errata/RHSA-2024:9452RHSA-2024:9452RHSA-2024:9452 https://access.redhat.com/security/cve/CVE-2024-45769CVE-2024-45769CVE-2024-45769https://access.redhat.com/security/cve/CVE-2024-45770CVE-2024-45770CVE-2024-45770https://bugzilla.redhat.com/23104512310451https://bugzilla.redhat.com/23104522310452https://errata.almalinux.org/9/ALSA-2024-9452.htmlALSA-2024:9452ALSA-2024:9452 ncpcp-pmda-rsyslog-6.2.2-7.el9_5.alma.1.x86_64.rpm;pcp-pmda-gfs2-6.2.2-7.el9_5.alma.1.x86_64.rpmwperl-PCP-LogSummary-6.2.2-7.el9_5.alma.1.x86_64.rpm+pcp-pmda-bash-6.2.2-7.el9_5.alma.1.x86_64.rpmdpcp-pmda-samba-6.2.2-7.el9_5.alma.1.x86_64.rpmMpcp-pmda-mounts-6.2.2-7.el9_5.alma.1.x86_64.rpm2pcp-pmda-cisco-6.2.2-7.el9_5.alma.1.x86_64.rpmxperl-PCP-MMV-6.2.2-7.el9_5.alma.1.x86_64.rpm]pcp-pmda-postfix-6.2.2-7.el9_5.alma.1.x86_64.rpmSpcp-pmda-news-6.2.2-7.el9_5.alma.1.x86_64.rpm4pcp-pmda-denki-6.2.2-7.el9_5.alma.1.x86_64.rpmUpcp-pmda-nginx-6.2.2-7.el9_5.alma.1.x86_64.rpmGpcp-pmda-lustre-6.2.2-7.el9_5.alma.1.x86_64.rpmjpcp-pmda-sockets-6.2.2-7.el9_5.alma.1.x86_64.rpm3pcp-pmda-dbping-6.2.2-7.el9_5.alma.1.x86_64.rpm<pcp-pmda-gluster-6.2.2-7.el9_5.alma.1.x86_64.rpmRpcp-pmda-netfilter-6.2.2-7.el9_5.alma.1.x86_64.rpmopcp-pmda-unbound-6.2.2-7.el9_5.alma.1.x86_64.rpmDpcp-pmda-lio-6.2.2-7.el9_5.alma.1.x86_64.rpm/pcp-pmda-bpf-6.2.2-7.el9_5.alma.1.x86_64.rpmqpcp-pmda-zimbra-6.2.2-7.el9_5.alma.1.x86_64.rpm_pcp-pmda-rabbitmq-6.2.2-7.el9_5.alma.1.x86_64.rpm[pcp-pmda-perfevent-6.2.2-7.el9_5.alma.1.x86_64.rpmhpcp-pmda-smart-6.2.2-7.el9_5.alma.1.x86_64.rpmPpcp-pmda-named-6.2.2-7.el9_5.alma.1.x86_64.rpm'pcp-import-mrtg2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2json-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-doc-6.2.2-7.el9_5.alma.1.noarch.rpmCpcp-pmda-libvirt-6.2.2-7.el9_5.alma.1.x86_64.rpmmpcp-pmda-systemd-6.2.2-7.el9_5.alma.1.x86_64.rpmQpcp-pmda-netcheck-6.2.2-7.el9_5.alma.1.x86_64.rpmFpcp-export-pcp2openmetrics-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-devel-6.2.2-7.el9_5.alma.1.x86_64.rpm8pcp-pmda-ds389log-6.2.2-7.el9_5.alma.1.x86_64.rpmBpcp-pmda-json-6.2.2-7.el9_5.alma.1.x86_64.rpmvperl-PCP-LogImport-6.2.2-7.el9_5.alma.1.x86_64.rpmupcp-zeroconf-6.2.2-7.el9_5.alma.1.x86_64.rpmlpcp-pmda-summary-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2xml-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-libs-6.2.2-7.el9_5.alma.1.i686.rpmVpcp-pmda-nvidia-gpu-6.2.2-7.el9_5.alma.1.x86_64.rpm*pcp-pmda-apache-6.2.2-7.el9_5.alma.1.x86_64.rpm.pcp-pmda-bonding-6.2.2-7.el9_5.alma.1.x86_64.rpm5pcp-pmda-dm-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-libs-devel-6.2.2-7.el9_5.alma.1.x86_64.rpm,pcp-pmda-bcc-6.2.2-7.el9_5.alma.1.x86_64.rpmgpcp-pmda-slurm-6.2.2-7.el9_5.alma.1.x86_64.rpmspcp-selinux-6.2.2-7.el9_5.alma.1.x86_64.rpm?pcp-pmda-hacluster-6.2.2-7.el9_5.alma.1.x86_64.rpmepcp-pmda-sendmail-6.2.2-7.el9_5.alma.1.x86_64.rpmJpcp-pmda-memcache-6.2.2-7.el9_5.alma.1.x86_64.rpm>pcp-pmda-gpsd-6.2.2-7.el9_5.alma.1.x86_64.rpmFpcp-pmda-logger-6.2.2-7.el9_5.alma.1.x86_64.rpmNpcp-pmda-mssql-6.2.2-7.el9_5.alma.1.x86_64.rpm=pcp-pmda-gpfs-6.2.2-7.el9_5.alma.1.x86_64.rpmtpcp-system-tools-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpm&pcp-import-iostat2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmXpcp-pmda-openvswitch-6.2.2-7.el9_5.alma.1.x86_64.rpm pcp-export-pcp2zabbix-6.2.2-7.el9_5.alma.1.x86_64.rpmWpcp-pmda-openmetrics-6.2.2-7.el9_5.alma.1.x86_64.rpmyperl-PCP-PMDA-6.2.2-7.el9_5.alma.1.x86_64.rpmKpcp-pmda-mic-6.2.2-7.el9_5.alma.1.x86_64.rpmipcp-pmda-snmp-6.2.2-7.el9_5.alma.1.x86_64.rpm%pcp-import-ganglia2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmLpcp-pmda-mongodb-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-testsuite-6.2.2-7.el9_5.alma.1.x86_64.rpm!pcp-export-zabbix-agent-6.2.2-7.el9_5.alma.1.x86_64.rpm`pcp-pmda-redis-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-libs-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2graphite-6.2.2-7.el9_5.alma.1.x86_64.rpmGpcp-pmda-uwsgi-6.2.2-7.el9_5.alma.1.x86_64.rpm$pcp-import-collectl2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm6pcp-pmda-docker-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-devel-6.2.2-7.el9_5.alma.1.i686.rpmOpcp-pmda-mysql-6.2.2-7.el9_5.alma.1.x86_64.rpmHpcp-pmda-lustrecomm-6.2.2-7.el9_5.alma.1.x86_64.rpm:pcp-pmda-farm-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-conf-6.2.2-7.el9_5.alma.1.x86_64.rpm^pcp-pmda-postgresql-6.2.2-7.el9_5.alma.1.x86_64.rpm7pcp-pmda-ds389-6.2.2-7.el9_5.alma.1.x86_64.rpm-pcp-pmda-bind2-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-testsuite-6.2.2-7.el9_5.alma.1.i686.rpm"pcp-geolocate-6.2.2-7.el9_5.alma.1.x86_64.rpmnpcp-pmda-trace-6.2.2-7.el9_5.alma.1.x86_64.rpm0pcp-pmda-bpftrace-6.2.2-7.el9_5.alma.1.x86_64.rpmbpcp-pmda-roomtemp-6.2.2-7.el9_5.alma.1.x86_64.rpmEpcp-pmda-lmsensors-6.2.2-7.el9_5.alma.1.x86_64.rpmYpcp-pmda-oracle-6.2.2-7.el9_5.alma.1.x86_64.rpmfpcp-pmda-shping-6.2.2-7.el9_5.alma.1.x86_64.rpm#pcp-gui-6.2.2-7.el9_5.alma.1.x86_64.rpmApcp-pmda-infiniband-6.2.2-7.el9_5.alma.1.x86_64.rpmapcp-pmda-resctrl-6.2.2-7.el9_5.alma.1.x86_64.rpm)pcp-pmda-activemq-6.2.2-7.el9_5.alma.1.x86_64.rpmIpcp-pmda-mailq-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2influxdb-6.2.2-7.el9_5.alma.1.x86_64.rpm\pcp-pmda-podman-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2spark-6.2.2-7.el9_5.alma.1.x86_64.rpm9pcp-pmda-elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpm@pcp-pmda-haproxy-6.2.2-7.el9_5.alma.1.x86_64.rpm{python3-pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm1pcp-pmda-cifs-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-libs-devel-6.2.2-7.el9_5.alma.1.i686.rpmZpcp-pmda-pdns-6.2.2-7.el9_5.alma.1.x86_64.rpmppcp-pmda-weblog-6.2.2-7.el9_5.alma.1.x86_64.rpmkpcp-pmda-statsd-6.2.2-7.el9_5.alma.1.x86_64.rpm(pcp-import-sar2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmrpcp-pmda-zswap-6.2.2-7.el9_5.alma.1.x86_64.rpmTpcp-pmda-nfsclient-6.2.2-7.el9_5.alma.1.x86_64.rpmncpcp-pmda-rsyslog-6.2.2-7.el9_5.alma.1.x86_64.rpm;pcp-pmda-gfs2-6.2.2-7.el9_5.alma.1.x86_64.rpmwperl-PCP-LogSummary-6.2.2-7.el9_5.alma.1.x86_64.rpm+pcp-pmda-bash-6.2.2-7.el9_5.alma.1.x86_64.rpmdpcp-pmda-samba-6.2.2-7.el9_5.alma.1.x86_64.rpmMpcp-pmda-mounts-6.2.2-7.el9_5.alma.1.x86_64.rpm2pcp-pmda-cisco-6.2.2-7.el9_5.alma.1.x86_64.rpmxperl-PCP-MMV-6.2.2-7.el9_5.alma.1.x86_64.rpm]pcp-pmda-postfix-6.2.2-7.el9_5.alma.1.x86_64.rpmSpcp-pmda-news-6.2.2-7.el9_5.alma.1.x86_64.rpm4pcp-pmda-denki-6.2.2-7.el9_5.alma.1.x86_64.rpmUpcp-pmda-nginx-6.2.2-7.el9_5.alma.1.x86_64.rpmGpcp-pmda-lustre-6.2.2-7.el9_5.alma.1.x86_64.rpmjpcp-pmda-sockets-6.2.2-7.el9_5.alma.1.x86_64.rpm3pcp-pmda-dbping-6.2.2-7.el9_5.alma.1.x86_64.rpm<pcp-pmda-gluster-6.2.2-7.el9_5.alma.1.x86_64.rpmRpcp-pmda-netfilter-6.2.2-7.el9_5.alma.1.x86_64.rpmopcp-pmda-unbound-6.2.2-7.el9_5.alma.1.x86_64.rpmDpcp-pmda-lio-6.2.2-7.el9_5.alma.1.x86_64.rpm/pcp-pmda-bpf-6.2.2-7.el9_5.alma.1.x86_64.rpmqpcp-pmda-zimbra-6.2.2-7.el9_5.alma.1.x86_64.rpm_pcp-pmda-rabbitmq-6.2.2-7.el9_5.alma.1.x86_64.rpm[pcp-pmda-perfevent-6.2.2-7.el9_5.alma.1.x86_64.rpmhpcp-pmda-smart-6.2.2-7.el9_5.alma.1.x86_64.rpmPpcp-pmda-named-6.2.2-7.el9_5.alma.1.x86_64.rpm'pcp-import-mrtg2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2json-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-doc-6.2.2-7.el9_5.alma.1.noarch.rpmCpcp-pmda-libvirt-6.2.2-7.el9_5.alma.1.x86_64.rpmmpcp-pmda-systemd-6.2.2-7.el9_5.alma.1.x86_64.rpmQpcp-pmda-netcheck-6.2.2-7.el9_5.alma.1.x86_64.rpmFpcp-export-pcp2openmetrics-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-devel-6.2.2-7.el9_5.alma.1.x86_64.rpm8pcp-pmda-ds389log-6.2.2-7.el9_5.alma.1.x86_64.rpmBpcp-pmda-json-6.2.2-7.el9_5.alma.1.x86_64.rpmvperl-PCP-LogImport-6.2.2-7.el9_5.alma.1.x86_64.rpmupcp-zeroconf-6.2.2-7.el9_5.alma.1.x86_64.rpmlpcp-pmda-summary-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2xml-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-libs-6.2.2-7.el9_5.alma.1.i686.rpmVpcp-pmda-nvidia-gpu-6.2.2-7.el9_5.alma.1.x86_64.rpm*pcp-pmda-apache-6.2.2-7.el9_5.alma.1.x86_64.rpm.pcp-pmda-bonding-6.2.2-7.el9_5.alma.1.x86_64.rpm5pcp-pmda-dm-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-libs-devel-6.2.2-7.el9_5.alma.1.x86_64.rpm,pcp-pmda-bcc-6.2.2-7.el9_5.alma.1.x86_64.rpmgpcp-pmda-slurm-6.2.2-7.el9_5.alma.1.x86_64.rpmspcp-selinux-6.2.2-7.el9_5.alma.1.x86_64.rpm?pcp-pmda-hacluster-6.2.2-7.el9_5.alma.1.x86_64.rpmepcp-pmda-sendmail-6.2.2-7.el9_5.alma.1.x86_64.rpmJpcp-pmda-memcache-6.2.2-7.el9_5.alma.1.x86_64.rpm>pcp-pmda-gpsd-6.2.2-7.el9_5.alma.1.x86_64.rpmFpcp-pmda-logger-6.2.2-7.el9_5.alma.1.x86_64.rpmNpcp-pmda-mssql-6.2.2-7.el9_5.alma.1.x86_64.rpm=pcp-pmda-gpfs-6.2.2-7.el9_5.alma.1.x86_64.rpmtpcp-system-tools-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpm&pcp-import-iostat2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmXpcp-pmda-openvswitch-6.2.2-7.el9_5.alma.1.x86_64.rpm pcp-export-pcp2zabbix-6.2.2-7.el9_5.alma.1.x86_64.rpmWpcp-pmda-openmetrics-6.2.2-7.el9_5.alma.1.x86_64.rpmyperl-PCP-PMDA-6.2.2-7.el9_5.alma.1.x86_64.rpmKpcp-pmda-mic-6.2.2-7.el9_5.alma.1.x86_64.rpmipcp-pmda-snmp-6.2.2-7.el9_5.alma.1.x86_64.rpm%pcp-import-ganglia2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmLpcp-pmda-mongodb-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-testsuite-6.2.2-7.el9_5.alma.1.x86_64.rpm!pcp-export-zabbix-agent-6.2.2-7.el9_5.alma.1.x86_64.rpm`pcp-pmda-redis-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-libs-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2graphite-6.2.2-7.el9_5.alma.1.x86_64.rpmGpcp-pmda-uwsgi-6.2.2-7.el9_5.alma.1.x86_64.rpm$pcp-import-collectl2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm6pcp-pmda-docker-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-devel-6.2.2-7.el9_5.alma.1.i686.rpmOpcp-pmda-mysql-6.2.2-7.el9_5.alma.1.x86_64.rpmHpcp-pmda-lustrecomm-6.2.2-7.el9_5.alma.1.x86_64.rpm:pcp-pmda-farm-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-conf-6.2.2-7.el9_5.alma.1.x86_64.rpm^pcp-pmda-postgresql-6.2.2-7.el9_5.alma.1.x86_64.rpm7pcp-pmda-ds389-6.2.2-7.el9_5.alma.1.x86_64.rpm-pcp-pmda-bind2-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-testsuite-6.2.2-7.el9_5.alma.1.i686.rpm"pcp-geolocate-6.2.2-7.el9_5.alma.1.x86_64.rpmnpcp-pmda-trace-6.2.2-7.el9_5.alma.1.x86_64.rpm0pcp-pmda-bpftrace-6.2.2-7.el9_5.alma.1.x86_64.rpmbpcp-pmda-roomtemp-6.2.2-7.el9_5.alma.1.x86_64.rpmEpcp-pmda-lmsensors-6.2.2-7.el9_5.alma.1.x86_64.rpmYpcp-pmda-oracle-6.2.2-7.el9_5.alma.1.x86_64.rpmfpcp-pmda-shping-6.2.2-7.el9_5.alma.1.x86_64.rpm#pcp-gui-6.2.2-7.el9_5.alma.1.x86_64.rpmApcp-pmda-infiniband-6.2.2-7.el9_5.alma.1.x86_64.rpmapcp-pmda-resctrl-6.2.2-7.el9_5.alma.1.x86_64.rpm)pcp-pmda-activemq-6.2.2-7.el9_5.alma.1.x86_64.rpmIpcp-pmda-mailq-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2influxdb-6.2.2-7.el9_5.alma.1.x86_64.rpm\pcp-pmda-podman-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-export-pcp2spark-6.2.2-7.el9_5.alma.1.x86_64.rpm9pcp-pmda-elasticsearch-6.2.2-7.el9_5.alma.1.x86_64.rpm@pcp-pmda-haproxy-6.2.2-7.el9_5.alma.1.x86_64.rpm{python3-pcp-6.2.2-7.el9_5.alma.1.x86_64.rpm1pcp-pmda-cifs-6.2.2-7.el9_5.alma.1.x86_64.rpmpcp-libs-devel-6.2.2-7.el9_5.alma.1.i686.rpmZpcp-pmda-pdns-6.2.2-7.el9_5.alma.1.x86_64.rpmppcp-pmda-weblog-6.2.2-7.el9_5.alma.1.x86_64.rpmkpcp-pmda-statsd-6.2.2-7.el9_5.alma.1.x86_64.rpm(pcp-import-sar2pcp-6.2.2-7.el9_5.alma.1.x86_64.rpmrpcp-pmda-zswap-6.2.2-7.el9_5.alma.1.x86_64.rpmTpcp-pmda-nfsclient-6.2.2-7.el9_5.alma.1.x86_64.rpmS% 2iBBBBBBBsecurityImportant: podman security updateH@https://access.redhat.com/errata/RHSA-2024:9454RHSA-2024:9454RHSA-2024:9454 https://access.redhat.com/security/cve/CVE-2024-34155CVE-2024-34155CVE-2024-34155https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9341CVE-2024-9341CVE-2024-9341https://access.redhat.com/security/cve/CVE-2024-9407CVE-2024-9407CVE-2024-9407https://access.redhat.com/security/cve/CVE-2024-9675CVE-2024-9675CVE-2024-9675https://access.redhat.com/security/cve/CVE-2024-9676CVE-2024-9676CVE-2024-9676https://bugzilla.redhat.com/23105272310527https://bugzilla.redhat.com/23105282310528https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23156912315691https://bugzilla.redhat.com/23158872315887https://bugzilla.redhat.com/23174582317458https://bugzilla.redhat.com/23174672317467https://errata.almalinux.org/9/ALSA-2024-9454.htmlALSA-2024:9454ALSA-2024:9454 /podman-remote-5.2.2-9.el9_5.x86_64.rpm.podman-plugins-5.2.2-9.el9_5.x86_64.rpmfpodman-docker-5.2.2-9.el9_5.noarch.rpm0podman-tests-5.2.2-9.el9_5.x86_64.rpm-podman-5.2.2-9.el9_5.x86_64.rpm/podman-remote-5.2.2-9.el9_5.x86_64.rpm.podman-plugins-5.2.2-9.el9_5.x86_64.rpmfpodman-docker-5.2.2-9.el9_5.noarch.rpm0podman-tests-5.2.2-9.el9_5.x86_64.rpm-podman-5.2.2-9.el9_5.x86_64.rpm|& 9sBBBBsecurityImportant: osbuild-composer security updatehttps://access.redhat.com/errata/RHSA-2024:9456RHSA-2024:9456RHSA-2024:9456 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2024-9456.htmlALSA-2024:9456ALSA-2024:9456 UDosbuild-composer-core-118-2.el9_5.alma.1.x86_64.rpmTDosbuild-composer-118-2.el9_5.alma.1.x86_64.rpmVDosbuild-composer-worker-118-2.el9_5.alma.1.x86_64.rpmUDosbuild-composer-core-118-2.el9_5.alma.1.x86_64.rpmTDosbuild-composer-118-2.el9_5.alma.1.x86_64.rpmVDosbuild-composer-worker-118-2.el9_5.alma.1.x86_64.rpm}' ;:securityModerate: python3.12-urllib3 security update&https://access.redhat.com/errata/RHSA-2024:9457RHSA-2024:9457RHSA-2024:9457 https://access.redhat.com/security/cve/CVE-2024-37891CVE-2024-37891CVE-2024-37891https://bugzilla.redhat.com/22927882292788https://errata.almalinux.org/9/ALSA-2024-9457.htmlALSA-2024:9457ALSA-2024:9457 Ripython3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpmRipython3.12-urllib3-1.26.18-2.el9_5.1.noarch.rpm8( =Qlibsoup-2.72.0-8.el9_5.2.x86_64.rpm?Qlibsoup-devel-2.72.0-8.el9_5.2.i686.rpm?Qlibsoup-devel-2.72.0-8.el9_5.2.x86_64.rpm>Qlibsoup-2.72.0-8.el9_5.2.i686.rpm>Qlibsoup-2.72.0-8.el9_5.2.x86_64.rpm?Qlibsoup-devel-2.72.0-8.el9_5.2.i686.rpm?Qlibsoup-devel-2.72.0-8.el9_5.2.x86_64.rpm>Qlibsoup-2.72.0-8.el9_5.2.i686.rpmE7 >mBBBBBBBBBBBBBBBsecurityModerate: kernel security updatez'https://access.redhat.com/errata/RHSA-2024:9605RHSA-2024:9605RHSA-2024:9605 https://access.redhat.com/security/cve/CVE-2024-42283CVE-2024-42283CVE-2024-42283https://access.redhat.com/security/cve/CVE-2024-46824CVE-2024-46824CVE-2024-46824https://access.redhat.com/security/cve/CVE-2024-46858CVE-2024-46858CVE-2024-46858https://bugzilla.redhat.com/23151762315176https://bugzilla.redhat.com/23152102315210https://errata.almalinux.org/9/ALSA-2024-9605.htmlALSA-2024:9605ALSA-2024:9605 "Gkernel-debug-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpmGkernel-doc-5.14.0-503.14.1.el9_5.noarch.rpm*Grv-5.14.0-503.14.1.el9_5.x86_64.rpm$Gkernel-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm!Gkernel-debug-devel-5.14.0-503.14.1.el9_5.x86_64.rpm%Gperf-5.14.0-503.14.1.el9_5.x86_64.rpm)Grtla-5.14.0-503.14.1.el9_5.x86_64.rpm#Gkernel-devel-5.14.0-503.14.1.el9_5.x86_64.rpm(Gkernel-headers-5.14.0-503.14.1.el9_5.x86_64.rpm "Gkernel-debug-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpmGkernel-doc-5.14.0-503.14.1.el9_5.noarch.rpm*Grv-5.14.0-503.14.1.el9_5.x86_64.rpm$Gkernel-devel-matched-5.14.0-503.14.1.el9_5.x86_64.rpm!Gkernel-debug-devel-5.14.0-503.14.1.el9_5.x86_64.rpm%Gperf-5.14.0-503.14.1.el9_5.x86_64.rpm)Grtla-5.14.0-503.14.1.el9_5.x86_64.rpm#Gkernel-devel-5.14.0-503.14.1.el9_5.x86_64.rpm(Gkernel-headers-5.14.0-503.14.1.el9_5.x86_64.rpmB8 securityImportant: squid security update!https://access.redhat.com/errata/RHSA-2024:9625RHSA-2024:9625RHSA-2024:9625 https://access.redhat.com/security/cve/CVE-2024-45802CVE-2024-45802CVE-2024-45802https://bugzilla.redhat.com/23221542322154https://errata.almalinux.org/9/ALSA-2024-9625.htmlALSA-2024:9625ALSA-2024:9625 X{squid-5.5-14.el9_5.3.x86_64.rpmX{squid-5.5-14.el9_5.3.x86_64.rpm:9 BBsecurityModerate: libvpx security update8>https://access.redhat.com/errata/RHSA-2024:9827RHSA-2024:9827RHSA-2024:9827 https://access.redhat.com/security/cve/CVE-2024-5197CVE-2024-5197CVE-2024-5197https://bugzilla.redhat.com/22911982291198https://errata.almalinux.org/9/ALSA-2024-9827.htmlALSA-2024:9827ALSA-2024:9827 libvpx-1.9.0-8.el9_5.x86_64.rpmlibvpx-1.9.0-8.el9_5.i686.rpmlibvpx-1.9.0-8.el9_5.x86_64.rpmlibvpx-1.9.0-8.el9_5.i686.rpmY: FBBBBBBBBBBBBBBBsecurityImportant: kernel security updatev https://access.redhat.com/errata/RHSA-2025:0059RHSA-2025:0059RHSA-2025:0059 https://access.redhat.com/security/cve/CVE-2024-46713CVE-2024-46713CVE-2024-46713https://access.redhat.com/security/cve/CVE-2024-50208CVE-2024-50208CVE-2024-50208https://access.redhat.com/security/cve/CVE-2024-50252CVE-2024-50252CVE-2024-50252https://access.redhat.com/security/cve/CVE-2024-53122CVE-2024-53122CVE-2024-53122https://bugzilla.redhat.com/23122212312221https://bugzilla.redhat.com/23246112324611https://bugzilla.redhat.com/23248982324898https://bugzilla.redhat.com/23299322329932https://errata.almalinux.org/9/ALSA-2025-0059.htmlALSA-2025:0059ALSA-2025:0059 !Kkernel-debug-devel-5.14.0-503.21.1.el9_5.x86_64.rpm$Kkernel-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm"Kkernel-debug-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm#Kkernel-devel-5.14.0-503.21.1.el9_5.x86_64.rpmKkernel-doc-5.14.0-503.21.1.el9_5.noarch.rpm(Kkernel-headers-5.14.0-503.21.1.el9_5.x86_64.rpm)Krtla-5.14.0-503.21.1.el9_5.x86_64.rpm%Kperf-5.14.0-503.21.1.el9_5.x86_64.rpm*Krv-5.14.0-503.21.1.el9_5.x86_64.rpm !Kkernel-debug-devel-5.14.0-503.21.1.el9_5.x86_64.rpm$Kkernel-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm"Kkernel-debug-devel-matched-5.14.0-503.21.1.el9_5.x86_64.rpm#Kkernel-devel-5.14.0-503.21.1.el9_5.x86_64.rpmKkernel-doc-5.14.0-503.21.1.el9_5.noarch.rpm(Kkernel-headers-5.14.0-503.21.1.el9_5.x86_64.rpm)Krtla-5.14.0-503.21.1.el9_5.x86_64.rpm%Kperf-5.14.0-503.21.1.el9_5.x86_64.rpm*Krv-5.14.0-503.21.1.el9_5.x86_64.rpm:; XBBsecurityImportant: firefox security updatehttps://access.redhat.com/errata/RHSA-2025:0080RHSA-2025:0080RHSA-2025:0080 https://access.redhat.com/security/cve/CVE-2025-0237CVE-2025-0237CVE-2025-0237https://access.redhat.com/security/cve/CVE-2025-0238CVE-2025-0238CVE-2025-0238https://access.redhat.com/security/cve/CVE-2025-0239CVE-2025-0239CVE-2025-0239https://access.redhat.com/security/cve/CVE-2025-0240CVE-2025-0240CVE-2025-0240https://access.redhat.com/security/cve/CVE-2025-0241CVE-2025-0241CVE-2025-0241https://access.redhat.com/security/cve/CVE-2025-0242CVE-2025-0242CVE-2025-0242https://access.redhat.com/security/cve/CVE-2025-0243CVE-2025-0243CVE-2025-0243https://bugzilla.redhat.com/23361652336165https://bugzilla.redhat.com/23361682336168https://bugzilla.redhat.com/23361702336170https://bugzilla.redhat.com/23361752336175https://bugzilla.redhat.com/23361812336181https://bugzilla.redhat.com/23361822336182https://bugzilla.redhat.com/23361882336188https://errata.almalinux.org/9/ALSA-2025-0080.htmlALSA-2025:0080ALSA-2025:0080 O[firefox-x11-128.6.0-1.el9_5.x86_64.rpm7[firefox-128.6.0-1.el9_5.x86_64.rpmO[firefox-x11-128.6.0-1.el9_5.x86_64.rpm7[firefox-128.6.0-1.el9_5.x86_64.rpmL< )]BBBBBBBBBBsecurityImportant: webkit2gtk3 security updateh https://access.redhat.com/errata/RHSA-2025:0146RHSA-2025:0146RHSA-2025:0146 https://access.redhat.com/security/cve/CVE-2024-54479CVE-2024-54479CVE-2024-54479https://access.redhat.com/security/cve/CVE-2024-54502CVE-2024-54502CVE-2024-54502https://access.redhat.com/security/cve/CVE-2024-54505CVE-2024-54505CVE-2024-54505https://access.redhat.com/security/cve/CVE-2024-54508CVE-2024-54508CVE-2024-54508https://bugzilla.redhat.com/23338412333841https://bugzilla.redhat.com/23338432333843https://bugzilla.redhat.com/23338442333844https://bugzilla.redhat.com/23338452333845https://errata.almalinux.org/9/ALSA-2025-0146.htmlALSA-2025:0146ALSA-2025:0146 6webkit2gtk3-jsc-devel-2.46.5-1.el9_5.x86_64.rpm3webkit2gtk3-2.46.5-1.el9_5.x86_64.rpm6webkit2gtk3-jsc-devel-2.46.5-1.el9_5.i686.rpm5webkit2gtk3-jsc-2.46.5-1.el9_5.i686.rpm4webkit2gtk3-devel-2.46.5-1.el9_5.x86_64.rpm5webkit2gtk3-jsc-2.46.5-1.el9_5.x86_64.rpm4webkit2gtk3-devel-2.46.5-1.el9_5.i686.rpm3webkit2gtk3-2.46.5-1.el9_5.i686.rpm6webkit2gtk3-jsc-devel-2.46.5-1.el9_5.x86_64.rpm3webkit2gtk3-2.46.5-1.el9_5.x86_64.rpm6webkit2gtk3-jsc-devel-2.46.5-1.el9_5.i686.rpm5webkit2gtk3-jsc-2.46.5-1.el9_5.i686.rpm4webkit2gtk3-devel-2.46.5-1.el9_5.x86_64.rpm5webkit2gtk3-jsc-2.46.5-1.el9_5.x86_64.rpm4webkit2gtk3-devel-2.46.5-1.el9_5.i686.rpm3webkit2gtk3-2.46.5-1.el9_5.i686.rpm= ,jsecurityImportant: thunderbird security updateYhttps://access.redhat.com/errata/RHSA-2025:0147RHSA-2025:0147RHSA-2025:0147 https://access.redhat.com/security/cve/CVE-2025-0242CVE-2025-0242CVE-2025-0242https://access.redhat.com/security/cve/CVE-2025-0243CVE-2025-0243CVE-2025-0243https://bugzilla.redhat.com/23361752336175https://bugzilla.redhat.com/23361812336181https://errata.almalinux.org/9/ALSA-2025-0147.htmlALSA-2025:0147ALSA-2025:0147 9Ithunderbird-128.6.0-3.el9_5.alma.1.x86_64.rpm9Ithunderbird-128.6.0-3.el9_5.alma.1.x86_64.rpm9> 0mBsecurityImportant: iperf3 security update`Uhttps://access.redhat.com/errata/RHSA-2025:0161RHSA-2025:0161RHSA-2025:0161 https://access.redhat.com/security/cve/CVE-2024-53580CVE-2024-53580CVE-2024-53580https://bugzilla.redhat.com/23331462333146https://errata.almalinux.org/9/ALSA-2025-0161.htmlALSA-2025:0161ALSA-2025:0161 Hiperf3-3.9-13.el9_5.1.i686.rpmHiperf3-3.9-13.el9_5.1.x86_64.rpmHiperf3-3.9-13.el9_5.1.i686.rpmHiperf3-3.9-13.el9_5.1.x86_64.rpm? 8qBBBBBsecurityImportant: dpdk security update5Rhttps://access.redhat.com/errata/RHSA-2025:0210RHSA-2025:0210RHSA-2025:0210 https://access.redhat.com/security/cve/CVE-2024-11614CVE-2024-11614CVE-2024-11614https://bugzilla.redhat.com/23279552327955https://errata.almalinux.org/9/ALSA-2025-0210.htmlALSA-2025:0210ALSA-2025:0210 dpdk-tools-23.11-2.el9_5.x86_64.rpmdpdk-23.11-2.el9_5.x86_64.rpmdpdk-doc-23.11-2.el9_5.noarch.rpmdpdk-devel-23.11-2.el9_5.x86_64.rpmdpdk-tools-23.11-2.el9_5.x86_64.rpmdpdk-23.11-2.el9_5.x86_64.rpmdpdk-doc-23.11-2.el9_5.noarch.rpmdpdk-devel-23.11-2.el9_5.x86_64.rpm@ yBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security updateZhttps://access.redhat.com/errata/RHSA-2025:0308RHSA-2025:0308RHSA-2025:0308 https://access.redhat.com/security/cve/CVE-2024-56201CVE-2024-56201CVE-2024-56201https://access.redhat.com/security/cve/CVE-2024-56326CVE-2024-56326CVE-2024-56326https://errata.almalinux.org/9/ALSA-2025-0308.htmlALSA-2025:0308ALSA-2025:0308 )fence-virtd-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-agents-kubevirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virtd-cpg-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virtd-tcp-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virtd-multicast-4.10.0-76.el9_5.4.alma.1.x86_64.rpm\)fence-agents-common-4.10.0-76.el9_5.4.alma.1.noarch.rpm])fence-agents-ibm-powervs-4.10.0-76.el9_5.4.alma.1.noarch.rpm^)fence-agents-ibm-vpc-4.10.0-76.el9_5.4.alma.1.noarch.rpm_)fence-agents-virsh-4.10.0-76.el9_5.4.alma.1.noarch.rpm)fence-agents-compute-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virtd-libvirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virtd-serial-4.10.0-76.el9_5.4.alma.1.x86_64.rpm )fence-virtd-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-agents-kubevirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virtd-cpg-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virtd-tcp-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virtd-multicast-4.10.0-76.el9_5.4.alma.1.x86_64.rpm\)fence-agents-common-4.10.0-76.el9_5.4.alma.1.noarch.rpm])fence-agents-ibm-powervs-4.10.0-76.el9_5.4.alma.1.noarch.rpm^)fence-agents-ibm-vpc-4.10.0-76.el9_5.4.alma.1.noarch.rpm_)fence-agents-virsh-4.10.0-76.el9_5.4.alma.1.noarch.rpm)fence-agents-compute-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virtd-libvirt-4.10.0-76.el9_5.4.alma.1.x86_64.rpm)fence-virtd-serial-4.10.0-76.el9_5.4.alma.1.x86_64.rpmA PBsecurityImportant: raptor2 security updatea@https://access.redhat.com/errata/RHSA-2025:0312RHSA-2025:0312RHSA-2025:0312 https://access.redhat.com/security/cve/CVE-2024-57823CVE-2024-57823CVE-2024-57823https://bugzilla.redhat.com/23369212336921https://errata.almalinux.org/9/ALSA-2025-0312.htmlALSA-2025:0312ALSA-2025:0312 Draptor2-2.0.15-32.el9_5.x86_64.rpmDraptor2-2.0.15-32.el9_5.i686.rpmDraptor2-2.0.15-32.el9_5.x86_64.rpmDraptor2-2.0.15-32.el9_5.i686.rpm@B securityImportant: rsync security update!8https://access.redhat.com/errata/RHSA-2025:0324RHSA-2025:0324RHSA-2025:0324 https://access.redhat.com/security/cve/CVE-2024-12085CVE-2024-12085CVE-2024-12085https://bugzilla.redhat.com/23305392330539https://errata.almalinux.org/9/ALSA-2025-0324.htmlALSA-2025:0324ALSA-2025:0324 1rsync-daemon-3.2.3-20.el9_5.1.noarch.rpm1rsync-daemon-3.2.3-20.el9_5.1.noarch.rpmeC *VBBBBBBBBBBBBBBBBBBsecurityModerate: ipa security updateYahttps://access.redhat.com/errata/RHSA-2025:0334RHSA-2025:0334RHSA-2025:0334 https://access.redhat.com/security/cve/CVE-2024-11029CVE-2024-11029CVE-2024-11029https://bugzilla.redhat.com/23255572325557https://errata.almalinux.org/9/ALSA-2025-0334.htmlALSA-2025:0334ALSA-2025:0334 Kipa-server-dns-4.12.2-1.el9_5.3.noarch.rpmOpython3-ipaserver-4.12.2-1.el9_5.3.noarch.rpmNpython3-ipalib-4.12.2-1.el9_5.3.noarch.rpmIipa-selinux-4.12.2-1.el9_5.3.noarch.rpmHipa-common-4.12.2-1.el9_5.3.noarch.rpmJipa-server-common-4.12.2-1.el9_5.3.noarch.rpmyipa-selinux-nfast-4.12.2-1.el9_5.3.noarch.rpmGipa-client-common-4.12.2-1.el9_5.3.noarch.rpmMpython3-ipaclient-4.12.2-1.el9_5.3.noarch.rpmFipa-server-4.12.2-1.el9_5.3.x86_64.rpmxipa-selinux-luna-4.12.2-1.el9_5.3.noarch.rpmCipa-client-4.12.2-1.el9_5.3.x86_64.rpmGipa-server-trust-ad-4.12.2-1.el9_5.3.x86_64.rpmEipa-client-samba-4.12.2-1.el9_5.3.x86_64.rpmDipa-client-epn-4.12.2-1.el9_5.3.x86_64.rpmKipa-server-dns-4.12.2-1.el9_5.3.noarch.rpmOpython3-ipaserver-4.12.2-1.el9_5.3.noarch.rpmNpython3-ipalib-4.12.2-1.el9_5.3.noarch.rpmIipa-selinux-4.12.2-1.el9_5.3.noarch.rpmHipa-common-4.12.2-1.el9_5.3.noarch.rpmJipa-server-common-4.12.2-1.el9_5.3.noarch.rpmyipa-selinux-nfast-4.12.2-1.el9_5.3.noarch.rpmGipa-client-common-4.12.2-1.el9_5.3.noarch.rpmMpython3-ipaclient-4.12.2-1.el9_5.3.noarch.rpmFipa-server-4.12.2-1.el9_5.3.x86_64.rpmxipa-selinux-luna-4.12.2-1.el9_5.3.noarch.rpmCipa-client-4.12.2-1.el9_5.3.x86_64.rpmGipa-server-trust-ad-4.12.2-1.el9_5.3.x86_64.rpmEipa-client-samba-4.12.2-1.el9_5.3.x86_64.rpmDipa-client-epn-4.12.2-1.el9_5.3.x86_64.rpmD 3kBBBBBBsecurityModerate: Security and bug fixes for NetworkManager:Lhttps://access.redhat.com/errata/RHSA-2025:0377RHSA-2025:0377RHSA-2025:0377 https://access.redhat.com/security/cve/CVE-2024-3661CVE-2024-3661CVE-2024-3661https://errata.almalinux.org/9/ALSA-2025-0377.htmlALSA-2025:0377ALSA-2025:0377  6NetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpm6NetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm6NetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpm 6NetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpm6NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm 6NetworkManager-ppp-1.48.10-5.el9_5.x86_64.rpm6NetworkManager-config-connectivity-redhat-1.48.10-5.el9_5.noarch.rpm6NetworkManager-cloud-setup-1.48.10-5.el9_5.x86_64.rpm 6NetworkManager-ovs-1.48.10-5.el9_5.x86_64.rpm6NetworkManager-dispatcher-routing-rules-1.48.10-5.el9_5.noarch.rpm%E tBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security update for AlmaLinux 8.6, 8.8, 8.10, 9.4 and 9.5fhttps://access.redhat.com/errata/RHSA-2025:0422RHSA-2025:0422RHSA-2025:0422 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0422.htmlALSA-2025:0422ALSA-2025:0422 .java-17-openjdk-jmods-17.0.14.0.7-2.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.14.0.7-2.el9.alma.1.x86_64.rpm/java-17-openjdk-src-17.0.14.0.7-2.el9.alma.1.x86_64.rpm0java-17-openjdk-static-libs-17.0.14.0.7-2.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.14.0.7-2.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.14.0.7-2.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.14.0.7-2.el9.alma.1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.14.0.7-2.el9.alma.1.x86_64.rpm .java-17-openjdk-jmods-17.0.14.0.7-2.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.14.0.7-2.el9.alma.1.x86_64.rpm/java-17-openjdk-src-17.0.14.0.7-2.el9.alma.1.x86_64.rpm0java-17-openjdk-static-libs-17.0.14.0.7-2.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.14.0.7-2.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.14.0.7-2.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.14.0.7-2.el9.alma.1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.14.0.7-2.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.14.0.7-2.el9.alma.1.x86_64.rpmOF GBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security update for AlmaLinux 8.10, 9.4 and 9.5lhttps://access.redhat.com/errata/RHSA-2025:0426RHSA-2025:0426RHSA-2025:0426 https://access.redhat.com/security/cve/CVE-2025-21502CVE-2025-21502CVE-2025-21502https://errata.almalinux.org/9/ALSA-2025-0426.htmlALSA-2025:0426ALSA-2025:0426 0'java-21-openjdk-devel-21.0.6.0.7-1.el9.alma.1.x86_64.rpm3'java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.alma.1.x86_64.rpm4'java-21-openjdk-jmods-21.0.6.0.7-1.el9.alma.1.x86_64.rpm.'java-21-openjdk-21.0.6.0.7-1.el9.alma.1.x86_64.rpm/'java-21-openjdk-demo-21.0.6.0.7-1.el9.alma.1.x86_64.rpm5'java-21-openjdk-src-21.0.6.0.7-1.el9.alma.1.x86_64.rpm1'java-21-openjdk-headless-21.0.6.0.7-1.el9.alma.1.x86_64.rpm6'java-21-openjdk-static-libs-21.0.6.0.7-1.el9.alma.1.x86_64.rpm2'java-21-openjdk-javadoc-21.0.6.0.7-1.el9.alma.1.x86_64.rpm 0'java-21-openjdk-devel-21.0.6.0.7-1.el9.alma.1.x86_64.rpm3'java-21-openjdk-javadoc-zip-21.0.6.0.7-1.el9.alma.1.x86_64.rpm4'java-21-openjdk-jmods-21.0.6.0.7-1.el9.alma.1.x86_64.rpm.'java-21-openjdk-21.0.6.0.7-1.el9.alma.1.x86_64.rpm/'java-21-openjdk-demo-21.0.6.0.7-1.el9.alma.1.x86_64.rpm5'java-21-openjdk-src-21.0.6.0.7-1.el9.alma.1.x86_64.rpm1'java-21-openjdk-headless-21.0.6.0.7-1.el9.alma.1.x86_64.rpm6'java-21-openjdk-static-libs-21.0.6.0.7-1.el9.alma.1.x86_64.rpm2'java-21-openjdk-javadoc-21.0.6.0.7-1.el9.alma.1.x86_64.rpmɲ"G +ZBBBBBBBBBBBBBBBsecurityModerate: kernel security updateoEhttps://access.redhat.com/errata/RHSA-2025:0578RHSA-2025:0578RHSA-2025:0578 https://access.redhat.com/security/cve/CVE-2024-50154CVE-2024-50154CVE-2024-50154https://access.redhat.com/security/cve/CVE-2024-50275CVE-2024-50275CVE-2024-50275https://access.redhat.com/security/cve/CVE-2024-53088CVE-2024-53088CVE-2024-53088https://bugzilla.redhat.com/23243132324313https://bugzilla.redhat.com/23271982327198https://bugzilla.redhat.com/23273282327328https://errata.almalinux.org/9/ALSA-2025-0578.htmlALSA-2025:0578ALSA-2025:0578 !Lkernel-debug-devel-5.14.0-503.22.1.el9_5.x86_64.rpm*Lrv-5.14.0-503.22.1.el9_5.x86_64.rpm#Lkernel-devel-5.14.0-503.22.1.el9_5.x86_64.rpm(Lkernel-headers-5.14.0-503.22.1.el9_5.x86_64.rpm$Lkernel-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpmLkernel-doc-5.14.0-503.22.1.el9_5.noarch.rpm)Lrtla-5.14.0-503.22.1.el9_5.x86_64.rpm%Lperf-5.14.0-503.22.1.el9_5.x86_64.rpm"Lkernel-debug-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpm !Lkernel-debug-devel-5.14.0-503.22.1.el9_5.x86_64.rpm*Lrv-5.14.0-503.22.1.el9_5.x86_64.rpm#Lkernel-devel-5.14.0-503.22.1.el9_5.x86_64.rpm(Lkernel-headers-5.14.0-503.22.1.el9_5.x86_64.rpm$Lkernel-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpmLkernel-doc-5.14.0-503.22.1.el9_5.noarch.rpm)Lrtla-5.14.0-503.22.1.el9_5.x86_64.rpm%Lperf-5.14.0-503.22.1.el9_5.x86_64.rpm"Lkernel-debug-devel-matched-5.14.0-503.22.1.el9_5.x86_64.rpmՕH -,securityImportant: python-jinja2 security update4Whttps://access.redhat.com/errata/RHSA-2025:0667RHSA-2025:0667RHSA-2025:0667 https://access.redhat.com/security/cve/CVE-2024-56326CVE-2024-56326CVE-2024-56326https://bugzilla.redhat.com/23338562333856https://errata.almalinux.org/9/ALSA-2025-0667.htmlALSA-2025:0667ALSA-2025:0667  python3-jinja2-2.11.3-7.el9_5.noarch.rpm python3-jinja2-2.11.3-7.el9_5.noarch.rpmRI 0nsecurityImportant: git-lfs security update shttps://access.redhat.com/errata/RHSA-2025:0673RHSA-2025:0673RHSA-2025:0673 https://access.redhat.com/security/cve/CVE-2024-53263CVE-2024-53263CVE-2024-53263https://bugzilla.redhat.com/23380022338002https://errata.almalinux.org/9/ALSA-2025-0673.htmlALSA-2025:0673ALSA-2025:0673  9git-lfs-3.4.1-4.el9_5.x86_64.rpm 9git-lfs-3.4.1-4.el9_5.x86_64.rpmeJ 6qBBBsecurityImportant: redis:7 security update~\https://access.redhat.com/errata/RHSA-2025:0692RHSA-2025:0692RHSA-2025:0692 https://access.redhat.com/security/cve/CVE-2024-46981CVE-2024-46981CVE-2024-46981https://access.redhat.com/security/cve/CVE-2024-51741CVE-2024-51741CVE-2024-51741https://bugzilla.redhat.com/23360042336004https://bugzilla.redhat.com/23360072336007https://errata.almalinux.org/9/ALSA-2025-0692.htmlALSA-2025:0692ALSA-2025:0692 6c|'UVredis-devel-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm6Vredis-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm:Vredis-doc-7.2.7-1.module_el9.5.0+134+2e645600.noarch.rpm6c|'UVredis-devel-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm6Vredis-7.2.7-1.module_el9.5.0+134+2e645600.x86_64.rpm:Vredis-doc-7.2.7-1.module_el9.5.0+134+2e645600.noarch.rpmXK =wBBBBsecurityImportant: redis security updateZ\ https://access.redhat.com/errata/RHSA-2025:0693RHSA-2025:0693RHSA-2025:0693 https://access.redhat.com/security/cve/CVE-2022-24834CVE-2022-24834CVE-2022-24834https://access.redhat.com/security/cve/CVE-2023-45145CVE-2023-45145CVE-2023-45145https://access.redhat.com/security/cve/CVE-2024-31228CVE-2024-31228CVE-2024-31228https://access.redhat.com/security/cve/CVE-2024-31449CVE-2024-31449CVE-2024-31449https://access.redhat.com/security/cve/CVE-2024-46981CVE-2024-46981CVE-2024-46981https://bugzilla.redhat.com/22216622221662https://bugzilla.redhat.com/22449402244940https://bugzilla.redhat.com/23170562317056https://bugzilla.redhat.com/23170582317058https://bugzilla.redhat.com/23360042336004https://errata.almalinux.org/9/ALSA-2025-0693.htmlALSA-2025:0693ALSA-2025:0693 6redis-6.2.17-1.el9_5.x86_64.rpm:redis-doc-6.2.17-1.el9_5.noarch.rpmUredis-devel-6.2.17-1.el9_5.i686.rpmUredis-devel-6.2.17-1.el9_5.x86_64.rpm6redis-6.2.17-1.el9_5.x86_64.rpm:redis-doc-6.2.17-1.el9_5.noarch.rpmUredis-devel-6.2.17-1.el9_5.i686.rpmUredis-devel-6.2.17-1.el9_5.x86_64.rpm'L ~BBBBsecurityImportant: libsoup security update6 https://access.redhat.com/errata/RHSA-2025:0791RHSA-2025:0791RHSA-2025:0791 https://access.redhat.com/security/cve/CVE-2024-52531CVE-2024-52531CVE-2024-52531https://bugzilla.redhat.com/23252772325277https://errata.almalinux.org/9/ALSA-2025-0791.htmlALSA-2025:0791ALSA-2025:0791 >Rlibsoup-2.72.0-8.el9_5.3.i686.rpm>Rlibsoup-2.72.0-8.el9_5.3.x86_64.rpm?Rlibsoup-devel-2.72.0-8.el9_5.3.x86_64.rpm?Rlibsoup-devel-2.72.0-8.el9_5.3.i686.rpm>Rlibsoup-2.72.0-8.el9_5.3.i686.rpm>Rlibsoup-2.72.0-8.el9_5.3.x86_64.rpm?Rlibsoup-devel-2.72.0-8.el9_5.3.x86_64.rpm?Rlibsoup-devel-2.72.0-8.el9_5.3.i686.rpmM !kBZBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: mariadb:10.11 security updateBhttps://access.redhat.com/errata/RHSA-2025:0912RHSA-2025:0912RHSA-2025:0912 https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0912.htmlALSA-2025:0912ALSA-2025:0912 e('Pmariadb-embedded-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmbmariadb-gssapi-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmcmariadb-oqgraph-engine-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmOmariadb-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm^mariadb-backup-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmamariadb-errmsg-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmumgalera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpm_mariadb-common-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmQmariadb-test-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmdmariadb-pam-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmfmariadb-server-galera-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmemariadb-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmemariadb-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm`mariadb-embedded-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmgmariadb-server-utils-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpme('Pmariadb-embedded-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmbmariadb-gssapi-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmcmariadb-oqgraph-engine-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmOmariadb-devel-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm^mariadb-backup-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmamariadb-errmsg-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmumgalera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpm_mariadb-common-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmQmariadb-test-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmdmariadb-pam-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmfmariadb-server-galera-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmemariadb-server-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmemariadb-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpm`mariadb-embedded-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmgmariadb-server-utils-10.11.10-1.module_el9.5.0+135+c9657a87.x86_64.rpmN :bBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera and mariadb security updateT4https://access.redhat.com/errata/RHSA-2025:0914RHSA-2025:0914RHSA-2025:0914 https://access.redhat.com/security/cve/CVE-2023-22084CVE-2023-22084CVE-2023-22084https://access.redhat.com/security/cve/CVE-2024-21096CVE-2024-21096CVE-2024-21096https://bugzilla.redhat.com/22450232245023https://bugzilla.redhat.com/22754522275452https://errata.almalinux.org/9/ALSA-2025-0914.htmlALSA-2025:0914ALSA-2025:0914 `6mariadb-embedded-10.5.27-1.el9_5.x86_64.rpme6mariadb-10.5.27-1.el9_5.x86_64.rpme6mariadb-server-10.5.27-1.el9_5.x86_64.rpmb6mariadb-gssapi-server-10.5.27-1.el9_5.x86_64.rpm^6mariadb-backup-10.5.27-1.el9_5.x86_64.rpmf6mariadb-server-galera-10.5.27-1.el9_5.x86_64.rpmu'galera-26.4.20-1.el9_5.x86_64.rpmd6mariadb-pam-10.5.27-1.el9_5.x86_64.rpma6mariadb-errmsg-10.5.27-1.el9_5.x86_64.rpmg6mariadb-server-utils-10.5.27-1.el9_5.x86_64.rpm_6mariadb-common-10.5.27-1.el9_5.x86_64.rpmc6mariadb-oqgraph-engine-10.5.27-1.el9_5.x86_64.rpm `6mariadb-embedded-10.5.27-1.el9_5.x86_64.rpme6mariadb-10.5.27-1.el9_5.x86_64.rpme6mariadb-server-10.5.27-1.el9_5.x86_64.rpmb6mariadb-gssapi-server-10.5.27-1.el9_5.x86_64.rpm^6mariadb-backup-10.5.27-1.el9_5.x86_64.rpmf6mariadb-server-galera-10.5.27-1.el9_5.x86_64.rpmu'galera-26.4.20-1.el9_5.x86_64.rpmd6mariadb-pam-10.5.27-1.el9_5.x86_64.rpma6mariadb-errmsg-10.5.27-1.el9_5.x86_64.rpmg6mariadb-server-utils-10.5.27-1.el9_5.x86_64.rpm_6mariadb-common-10.5.27-1.el9_5.x86_64.rpmc6mariadb-oqgraph-engine-10.5.27-1.el9_5.x86_64.rpm8O ={securityModerate: keepalived security updateUhttps://access.redhat.com/errata/RHSA-2025:0917RHSA-2025:0917RHSA-2025:0917 https://access.redhat.com/security/cve/CVE-2024-41184CVE-2024-41184CVE-2024-41184https://bugzilla.redhat.com/22985322298532https://errata.almalinux.org/9/ALSA-2025-0917.htmlALSA-2025:0917ALSA-2025:0917 #keepalived-2.2.8-4.el9_5.x86_64.rpm#keepalived-2.2.8-4.el9_5.x86_64.rpmcP ~BBBBBBBsecurityImportant: podman security update] https://access.redhat.com/errata/RHSA-2025:0922RHSA-2025:0922RHSA-2025:0922 https://access.redhat.com/security/cve/CVE-2024-11218CVE-2024-11218CVE-2024-11218https://bugzilla.redhat.com/23262312326231https://errata.almalinux.org/9/ALSA-2025-0922.htmlALSA-2025:0922ALSA-2025:0922 -podman-5.2.2-13.el9_5.x86_64.rpm0podman-tests-5.2.2-13.el9_5.x86_64.rpmfpodman-docker-5.2.2-13.el9_5.noarch.rpm.podman-plugins-5.2.2-13.el9_5.x86_64.rpm/podman-remote-5.2.2-13.el9_5.x86_64.rpm-podman-5.2.2-13.el9_5.x86_64.rpm0podman-tests-5.2.2-13.el9_5.x86_64.rpmfpodman-docker-5.2.2-13.el9_5.noarch.rpm.podman-plugins-5.2.2-13.el9_5.x86_64.rpm/podman-remote-5.2.2-13.el9_5.x86_64.rpmZQ HBBsecurityImportant: buildah security update}6https://access.redhat.com/errata/RHSA-2025:0923RHSA-2025:0923RHSA-2025:0923 https://access.redhat.com/security/cve/CVE-2024-11218CVE-2024-11218CVE-2024-11218https://bugzilla.redhat.com/23262312326231https://errata.almalinux.org/9/ALSA-2025-0923.htmlALSA-2025:0923ALSA-2025:0923 <buildah-1.37.6-1.el9_5.x86_64.rpm=buildah-tests-1.37.6-1.el9_5.x86_64.rpm<buildah-1.37.6-1.el9_5.x86_64.rpm=buildah-tests-1.37.6-1.el9_5.x86_64.rpm%R MBsecurityModerate: bzip2 security update3https://access.redhat.com/errata/RHSA-2025:0925RHSA-2025:0925RHSA-2025:0925 https://access.redhat.com/security/cve/CVE-2019-12900CVE-2019-12900CVE-2019-12900https://bugzilla.redhat.com/23320752332075https://errata.almalinux.org/9/ALSA-2025-0925.htmlALSA-2025:0925ALSA-2025:0925 lubzip2-devel-1.0.8-10.el9_5.x86_64.rpmlubzip2-devel-1.0.8-10.el9_5.i686.rpmlubzip2-devel-1.0.8-10.el9_5.x86_64.rpmlubzip2-devel-1.0.8-10.el9_5.i686.rpmS QBBsecurityImportant: firefox security updateD? https://access.redhat.com/errata/RHSA-2025:10072RHSA-2025:10072RHSA-2025:10072 https://access.redhat.com/security/cve/CVE-2025-6424CVE-2025-6424CVE-2025-6424https://access.redhat.com/security/cve/CVE-2025-6425CVE-2025-6425CVE-2025-6425https://access.redhat.com/security/cve/CVE-2025-6429CVE-2025-6429CVE-2025-6429https://access.redhat.com/security/cve/CVE-2025-6430CVE-2025-6430CVE-2025-6430https://bugzilla.redhat.com/23745552374555https://bugzilla.redhat.com/23745592374559https://bugzilla.redhat.com/23745612374561https://bugzilla.redhat.com/23745622374562https://errata.almalinux.org/9/ALSA-2025-10072.htmlALSA-2025:10072ALSA-2025:10072 OIfirefox-x11-128.12.0-1.el9_6.alma.1.x86_64.rpm7Ifirefox-128.12.0-1.el9_6.alma.1.x86_64.rpmOIfirefox-x11-128.12.0-1.el9_6.alma.1.x86_64.rpm7Ifirefox-128.12.0-1.el9_6.alma.1.x86_64.rpmÐKT VBBBBsecurityImportant: python3.9 security updateg https://access.redhat.com/errata/RHSA-2025:10136RHSA-2025:10136RHSA-2025:10136 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10136.htmlALSA-2025:10136ALSA-2025:10136 1lpython3-tkinter-3.9.21-2.el9_6.1.x86_64.rpmglpython-unversioned-command-3.9.21-2.el9_6.1.noarch.rpmRlpython3-devel-3.9.21-2.el9_6.1.x86_64.rpmRlpython3-devel-3.9.21-2.el9_6.1.i686.rpm1lpython3-tkinter-3.9.21-2.el9_6.1.x86_64.rpmglpython-unversioned-command-3.9.21-2.el9_6.1.noarch.rpmRlpython3-devel-3.9.21-2.el9_6.1.x86_64.rpmRlpython3-devel-3.9.21-2.el9_6.1.i686.rpmÓ=U ']BBBBBBBBsecurityImportant: python3.11 security updatejg https://access.redhat.com/errata/RHSA-2025:10148RHSA-2025:10148RHSA-2025:10148 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10148.htmlALSA-2025:10148ALSA-2025:10148 xpython3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpmxpython3.11-3.11.11-2.el9_6.1.x86_64.rpm^xpython3.11-devel-3.11.11-2.el9_6.1.x86_64.rpm_xpython3.11-libs-3.11.11-2.el9_6.1.i686.rpm^xpython3.11-devel-3.11.11-2.el9_6.1.i686.rpm_xpython3.11-libs-3.11.11-2.el9_6.1.x86_64.rpmxpython3.11-tkinter-3.11.11-2.el9_6.1.x86_64.rpmxpython3.11-3.11.11-2.el9_6.1.x86_64.rpm^xpython3.11-devel-3.11.11-2.el9_6.1.x86_64.rpm_xpython3.11-libs-3.11.11-2.el9_6.1.i686.rpm^xpython3.11-devel-3.11.11-2.el9_6.1.i686.rpm_xpython3.11-libs-3.11.11-2.el9_6.1.x86_64.rpmÔoV 2hBBBBBBBBsecurityImportant: python3.12 security updateQg https://access.redhat.com/errata/RHSA-2025:10189RHSA-2025:10189RHSA-2025:10189 https://access.redhat.com/security/cve/CVE-2024-12718CVE-2024-12718CVE-2024-12718https://access.redhat.com/security/cve/CVE-2025-4138CVE-2025-4138CVE-2025-4138https://access.redhat.com/security/cve/CVE-2025-4330CVE-2025-4330CVE-2025-4330https://access.redhat.com/security/cve/CVE-2025-4435CVE-2025-4435CVE-2025-4435https://access.redhat.com/security/cve/CVE-2025-4517CVE-2025-4517CVE-2025-4517https://bugzilla.redhat.com/23700102370010https://bugzilla.redhat.com/23700132370013https://bugzilla.redhat.com/23700142370014https://bugzilla.redhat.com/23700162370016https://bugzilla.redhat.com/23724262372426https://errata.almalinux.org/9/ALSA-2025-10189.htmlALSA-2025:10189ALSA-2025:10189  python3.12-libs-3.12.9-1.el9_6.1.i686.rpm:python3.12-3.12.9-1.el9_6.1.x86_64.rpm python3.12-devel-3.12.9-1.el9_6.1.i686.rpm python3.12-libs-3.12.9-1.el9_6.1.x86_64.rpm python3.12-devel-3.12.9-1.el9_6.1.x86_64.rpm;python3.12-tkinter-3.12.9-1.el9_6.1.x86_64.rpm python3.12-libs-3.12.9-1.el9_6.1.i686.rpm:python3.12-3.12.9-1.el9_6.1.x86_64.rpm python3.12-devel-3.12.9-1.el9_6.1.i686.rpm python3.12-libs-3.12.9-1.el9_6.1.x86_64.rpm python3.12-devel-3.12.9-1.el9_6.1.x86_64.rpm;python3.12-tkinter-3.12.9-1.el9_6.1.x86_64.rpmÔcW 5ssecurityImportant: thunderbird security update8https://access.redhat.com/errata/RHSA-2025:10196RHSA-2025:10196RHSA-2025:10196 https://access.redhat.com/security/cve/CVE-2025-5986CVE-2025-5986CVE-2025-5986https://bugzilla.redhat.com/23722812372281https://errata.almalinux.org/9/ALSA-2025-10196.htmlALSA-2025:10196ALSA-2025:10196 9Ithunderbird-128.12.0-1.el9_6.alma.1.x86_64.rpm9Ithunderbird-128.12.0-1.el9_6.alma.1.x86_64.rpmØX 8vsecurityModerate: socat security updateOvhttps://access.redhat.com/errata/RHSA-2025:10353RHSA-2025:10353RHSA-2025:10353 https://access.redhat.com/security/cve/CVE-2024-54661CVE-2024-54661CVE-2024-54661https://bugzilla.redhat.com/23302972330297https://errata.almalinux.org/9/ALSA-2025-10353.htmlALSA-2025:10353ALSA-2025:10353 !socat-1.7.4.1-6.el9_6.1.x86_64.rpm!socat-1.7.4.1-6.el9_6.1.x86_64.rpmøJY yBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateE] https://access.redhat.com/errata/RHSA-2025:10379RHSA-2025:10379RHSA-2025:10379 https://access.redhat.com/security/cve/CVE-2022-49846CVE-2022-49846CVE-2022-49846https://access.redhat.com/security/cve/CVE-2025-21759CVE-2025-21759CVE-2025-21759https://access.redhat.com/security/cve/CVE-2025-21887CVE-2025-21887CVE-2025-21887https://access.redhat.com/security/cve/CVE-2025-22004CVE-2025-22004CVE-2025-22004https://access.redhat.com/security/cve/CVE-2025-37799CVE-2025-37799CVE-2025-37799https://bugzilla.redhat.com/23485962348596https://bugzilla.redhat.com/23554052355405https://bugzilla.redhat.com/23571422357142https://bugzilla.redhat.com/23634322363432https://bugzilla.redhat.com/23638762363876https://errata.almalinux.org/9/ALSA-2025-10379.htmlALSA-2025:10379ALSA-2025:10379 "Pkernel-debug-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpmPkernel-doc-5.14.0-570.25.1.el9_6.noarch.rpm*Prv-5.14.0-570.25.1.el9_6.x86_64.rpm(Pkernel-headers-5.14.0-570.25.1.el9_6.x86_64.rpm)Prtla-5.14.0-570.25.1.el9_6.x86_64.rpmMPpython3-perf-5.14.0-570.25.1.el9_6.x86_64.rpm$Pkernel-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm!Pkernel-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm%Pperf-5.14.0-570.25.1.el9_6.x86_64.rpm#Pkernel-devel-5.14.0-570.25.1.el9_6.x86_64.rpm "Pkernel-debug-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpmPkernel-doc-5.14.0-570.25.1.el9_6.noarch.rpm*Prv-5.14.0-570.25.1.el9_6.x86_64.rpm(Pkernel-headers-5.14.0-570.25.1.el9_6.x86_64.rpm)Prtla-5.14.0-570.25.1.el9_6.x86_64.rpmMPpython3-perf-5.14.0-570.25.1.el9_6.x86_64.rpm$Pkernel-devel-matched-5.14.0-570.25.1.el9_6.x86_64.rpm!Pkernel-debug-devel-5.14.0-570.25.1.el9_6.x86_64.rpm%Pperf-5.14.0-570.25.1.el9_6.x86_64.rpm#Pkernel-devel-5.14.0-570.25.1.el9_6.x86_64.rpmÿZ MBBBBBBBsecurityImportant: podman security update"Thttps://access.redhat.com/errata/RHSA-2025:10550RHSA-2025:10550RHSA-2025:10550 https://access.redhat.com/security/cve/CVE-2025-6032CVE-2025-6032CVE-2025-6032https://bugzilla.redhat.com/23725012372501https://errata.almalinux.org/9/ALSA-2025-10550.htmlALSA-2025:10550ALSA-2025:10550 . podman-plugins-5.4.0-12.el9_6.x86_64.rpm/ podman-remote-5.4.0-12.el9_6.x86_64.rpm0 podman-tests-5.4.0-12.el9_6.x86_64.rpmf podman-docker-5.4.0-12.el9_6.noarch.rpm- podman-5.4.0-12.el9_6.x86_64.rpm. podman-plugins-5.4.0-12.el9_6.x86_64.rpm/ podman-remote-5.4.0-12.el9_6.x86_64.rpm0 podman-tests-5.4.0-12.el9_6.x86_64.rpmf podman-docker-5.4.0-12.el9_6.noarch.rpm- podman-5.4.0-12.el9_6.x86_64.rpmø [ WsecurityModerate: gnome-remote-desktop security updatev%https://access.redhat.com/errata/RHSA-2025:10631RHSA-2025:10631RHSA-2025:10631 https://access.redhat.com/security/cve/CVE-2025-5024CVE-2025-5024CVE-2025-5024https://bugzilla.redhat.com/23677172367717https://errata.almalinux.org/9/ALSA-2025-10631.htmlALSA-2025:10631ALSA-2025:10631 gSgnome-remote-desktop-40.0-11.el9_6.x86_64.rpmgSgnome-remote-desktop-40.0-11.el9_6.x86_64.rpmþ\ ZBBsecurityImportant: firefox security updatehttps://access.redhat.com/errata/RHSA-2025:1066RHSA-2025:1066RHSA-2025:1066 https://access.redhat.com/security/cve/CVE-2025-1009CVE-2025-1009CVE-2025-1009https://access.redhat.com/security/cve/CVE-2025-1010CVE-2025-1010CVE-2025-1010https://access.redhat.com/security/cve/CVE-2025-1011CVE-2025-1011CVE-2025-1011https://access.redhat.com/security/cve/CVE-2025-1012CVE-2025-1012CVE-2025-1012https://access.redhat.com/security/cve/CVE-2025-1013CVE-2025-1013CVE-2025-1013https://access.redhat.com/security/cve/CVE-2025-1014CVE-2025-1014CVE-2025-1014https://access.redhat.com/security/cve/CVE-2025-1016CVE-2025-1016CVE-2025-1016https://access.redhat.com/security/cve/CVE-2025-1017CVE-2025-1017CVE-2025-1017https://bugzilla.redhat.com/23437482343748https://bugzilla.redhat.com/23437502343750https://bugzilla.redhat.com/23437522343752https://bugzilla.redhat.com/23437542343754https://bugzilla.redhat.com/23437562343756https://bugzilla.redhat.com/23437602343760https://bugzilla.redhat.com/23437642343764https://bugzilla.redhat.com/23437652343765https://errata.almalinux.org/9/ALSA-2025-1066.htmlALSA-2025:1066ALSA-2025:1066 O\firefox-x11-128.7.0-1.el9_5.x86_64.rpm7\firefox-128.7.0-1.el9_5.x86_64.rpmO\firefox-x11-128.7.0-1.el9_5.x86_64.rpm7\firefox-128.7.0-1.el9_5.x86_64.rpm$] +_BBBBBBBBBBsecurityModerate: golang security update:https://access.redhat.com/errata/RHSA-2025:10676RHSA-2025:10676RHSA-2025:10676 https://access.redhat.com/security/cve/CVE-2025-4673CVE-2025-4673CVE-2025-4673https://bugzilla.redhat.com/23733052373305https://errata.almalinux.org/9/ALSA-2025-10676.htmlALSA-2025:10676ALSA-2025:10676 @golang-1.24.4-1.el9_6.x86_64.rpmEgo-toolset-1.24.4-1.el9_6.x86_64.rpmmgolang-misc-1.24.4-1.el9_6.noarch.rpm8golang-race-1.24.4-1.el9_6.x86_64.rpmlgolang-docs-1.24.4-1.el9_6.noarch.rpmogolang-tests-1.24.4-1.el9_6.noarch.rpmAgolang-bin-1.24.4-1.el9_6.x86_64.rpmngolang-src-1.24.4-1.el9_6.noarch.rpm@golang-1.24.4-1.el9_6.x86_64.rpmEgo-toolset-1.24.4-1.el9_6.x86_64.rpmmgolang-misc-1.24.4-1.el9_6.noarch.rpm8golang-race-1.24.4-1.el9_6.x86_64.rpmlgolang-docs-1.24.4-1.el9_6.noarch.rpmogolang-tests-1.24.4-1.el9_6.noarch.rpmAgolang-bin-1.24.4-1.el9_6.x86_64.rpmngolang-src-1.24.4-1.el9_6.noarch.rpm\^ /lBsecurityImportant: libxml2 security update>Lhttps://access.redhat.com/errata/RHSA-2025:10699RHSA-2025:10699RHSA-2025:10699 https://access.redhat.com/security/cve/CVE-2025-49794CVE-2025-49794CVE-2025-49794https://access.redhat.com/security/cve/CVE-2025-49796CVE-2025-49796CVE-2025-49796https://access.redhat.com/security/cve/CVE-2025-6021CVE-2025-6021CVE-2025-6021https://bugzilla.redhat.com/23723732372373https://bugzilla.redhat.com/23723852372385https://bugzilla.redhat.com/23724062372406https://errata.almalinux.org/9/ALSA-2025-10699.htmlALSA-2025:10699ALSA-2025:10699 >0libxml2-devel-2.9.13-10.el9_6.x86_64.rpm>0libxml2-devel-2.9.13-10.el9_6.i686.rpm>0libxml2-devel-2.9.13-10.el9_6.x86_64.rpm>0libxml2-devel-2.9.13-10.el9_6.i686.rpmþ#_ pBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:10837RHSA-2025:10837RHSA-2025:10837 https://access.redhat.com/security/cve/CVE-2025-21991CVE-2025-21991CVE-2025-21991https://bugzilla.redhat.com/23569172356917https://errata.almalinux.org/9/ALSA-2025-10837.htmlALSA-2025:10837ALSA-2025:10837 "Qkernel-debug-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpmQkernel-doc-5.14.0-570.26.1.el9_6.noarch.rpm%Qperf-5.14.0-570.26.1.el9_6.x86_64.rpm!Qkernel-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm*Qrv-5.14.0-570.26.1.el9_6.x86_64.rpm)Qrtla-5.14.0-570.26.1.el9_6.x86_64.rpmMQpython3-perf-5.14.0-570.26.1.el9_6.x86_64.rpm$Qkernel-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm(Qkernel-headers-5.14.0-570.26.1.el9_6.x86_64.rpm#Qkernel-devel-5.14.0-570.26.1.el9_6.x86_64.rpm "Qkernel-debug-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpmQkernel-doc-5.14.0-570.26.1.el9_6.noarch.rpm%Qperf-5.14.0-570.26.1.el9_6.x86_64.rpm!Qkernel-debug-devel-5.14.0-570.26.1.el9_6.x86_64.rpm*Qrv-5.14.0-570.26.1.el9_6.x86_64.rpm)Qrtla-5.14.0-570.26.1.el9_6.x86_64.rpmMQpython3-perf-5.14.0-570.26.1.el9_6.x86_64.rpm$Qkernel-devel-matched-5.14.0-570.26.1.el9_6.x86_64.rpm(Qkernel-headers-5.14.0-570.26.1.el9_6.x86_64.rpm#Qkernel-devel-5.14.0-570.26.1.el9_6.x86_64.rpmh` securityImportant: cloud-init security updatelhttps://access.redhat.com/errata/RHSA-2025:10848RHSA-2025:10848RHSA-2025:10848 https://access.redhat.com/security/cve/CVE-2024-6174CVE-2024-6174CVE-2024-6174https://bugzilla.redhat.com/23749242374924https://errata.almalinux.org/9/ALSA-2025-10848.htmlALSA-2025:10848ALSA-2025:10848  -cloud-init-24.4-4.el9_6.3.alma.1.noarch.rpm -cloud-init-24.4-4.el9_6.3.alma.1.noarch.rpm{a FBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update ahttps://access.redhat.com/errata/RHSA-2025:10862RHSA-2025:10862RHSA-2025:10862 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-30761CVE-2025-30761CVE-2025-30761https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10862.htmlALSA-2025:10862ALSA-2025:10862 dajava-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9.x86_64.rpmCajava-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9.noarch.rpmbajava-1.8.0-openjdk-1.8.0.462.b08-3.el9.x86_64.rpmfajava-1.8.0-openjdk-src-1.8.0.462.b08-3.el9.x86_64.rpmBajava-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9.noarch.rpmcajava-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9.x86_64.rpmeajava-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9.x86_64.rpmdajava-1.8.0-openjdk-devel-1.8.0.462.b08-3.el9.x86_64.rpmCajava-1.8.0-openjdk-javadoc-zip-1.8.0.462.b08-3.el9.noarch.rpmbajava-1.8.0-openjdk-1.8.0.462.b08-3.el9.x86_64.rpmfajava-1.8.0-openjdk-src-1.8.0.462.b08-3.el9.x86_64.rpmBajava-1.8.0-openjdk-javadoc-1.8.0.462.b08-3.el9.noarch.rpmcajava-1.8.0-openjdk-demo-1.8.0.462.b08-3.el9.x86_64.rpmeajava-1.8.0-openjdk-headless-1.8.0.462.b08-3.el9.x86_64.rpm,b %SBBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security updatek https://access.redhat.com/errata/RHSA-2025:10867RHSA-2025:10867RHSA-2025:10867 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10867.htmlALSA-2025:10867ALSA-2025:10867 -java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9.alma.1.x86_64.rpm.java-17-openjdk-jmods-17.0.16.0.8-2.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.16.0.8-2.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.16.0.8-2.el9.alma.1.x86_64.rpm/java-17-openjdk-src-17.0.16.0.8-2.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.16.0.8-2.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.16.0.8-2.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.16.0.8-2.el9.alma.1.x86_64.rpm0java-17-openjdk-static-libs-17.0.16.0.8-2.el9.alma.1.x86_64.rpm -java-17-openjdk-javadoc-zip-17.0.16.0.8-2.el9.alma.1.x86_64.rpm.java-17-openjdk-jmods-17.0.16.0.8-2.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.16.0.8-2.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.16.0.8-2.el9.alma.1.x86_64.rpm/java-17-openjdk-src-17.0.16.0.8-2.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.16.0.8-2.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.16.0.8-2.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.16.0.8-2.el9.alma.1.x86_64.rpm0java-17-openjdk-static-libs-17.0.16.0.8-2.el9.alma.1.x86_64.rpm޿ic 8fBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security updatexqhttps://access.redhat.com/errata/RHSA-2025:10873RHSA-2025:10873RHSA-2025:10873 https://access.redhat.com/security/cve/CVE-2025-30749CVE-2025-30749CVE-2025-30749https://access.redhat.com/security/cve/CVE-2025-30754CVE-2025-30754CVE-2025-30754https://access.redhat.com/security/cve/CVE-2025-50059CVE-2025-50059CVE-2025-50059https://access.redhat.com/security/cve/CVE-2025-50106CVE-2025-50106CVE-2025-50106https://errata.almalinux.org/9/ALSA-2025-10873.htmlALSA-2025:10873ALSA-2025:10873 0)java-21-openjdk-devel-21.0.8.0.9-1.el9.alma.1.x86_64.rpm3)java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9.alma.1.x86_64.rpm5)java-21-openjdk-src-21.0.8.0.9-1.el9.alma.1.x86_64.rpm2)java-21-openjdk-javadoc-21.0.8.0.9-1.el9.alma.1.x86_64.rpm.)java-21-openjdk-21.0.8.0.9-1.el9.alma.1.x86_64.rpm6)java-21-openjdk-static-libs-21.0.8.0.9-1.el9.alma.1.x86_64.rpm4)java-21-openjdk-jmods-21.0.8.0.9-1.el9.alma.1.x86_64.rpm/)java-21-openjdk-demo-21.0.8.0.9-1.el9.alma.1.x86_64.rpm1)java-21-openjdk-headless-21.0.8.0.9-1.el9.alma.1.x86_64.rpm 0)java-21-openjdk-devel-21.0.8.0.9-1.el9.alma.1.x86_64.rpm3)java-21-openjdk-javadoc-zip-21.0.8.0.9-1.el9.alma.1.x86_64.rpm5)java-21-openjdk-src-21.0.8.0.9-1.el9.alma.1.x86_64.rpm2)java-21-openjdk-javadoc-21.0.8.0.9-1.el9.alma.1.x86_64.rpm.)java-21-openjdk-21.0.8.0.9-1.el9.alma.1.x86_64.rpm6)java-21-openjdk-static-libs-21.0.8.0.9-1.el9.alma.1.x86_64.rpm4)java-21-openjdk-jmods-21.0.8.0.9-1.el9.alma.1.x86_64.rpm/)java-21-openjdk-demo-21.0.8.0.9-1.el9.alma.1.x86_64.rpm1)java-21-openjdk-headless-21.0.8.0.9-1.el9.alma.1.x86_64.rpmĨnd ?yBBBBsecurityModerate: glib2 security updateihttps://access.redhat.com/errata/RHSA-2025:11140RHSA-2025:11140RHSA-2025:11140 https://access.redhat.com/security/cve/CVE-2024-52533CVE-2024-52533CVE-2024-52533https://access.redhat.com/security/cve/CVE-2025-4373CVE-2025-4373CVE-2025-4373https://bugzilla.redhat.com/23253402325340https://bugzilla.redhat.com/23642652364265https://errata.almalinux.org/9/ALSA-2025-11140.htmlALSA-2025:11140ALSA-2025:11140 vHglib2-doc-2.68.4-16.el9_6.2.noarch.rpmHglib2-tests-2.68.4-16.el9_6.2.x86_64.rpmHglib2-devel-2.68.4-16.el9_6.2.i686.rpmHglib2-devel-2.68.4-16.el9_6.2.x86_64.rpmvHglib2-doc-2.68.4-16.el9_6.2.noarch.rpmHglib2-tests-2.68.4-16.el9_6.2.x86_64.rpmHglib2-devel-2.68.4-16.el9_6.2.i686.rpmHglib2-devel-2.68.4-16.el9_6.2.x86_64.rpm޽5e @BBBBBBsecurityImportant: tomcat security updatemhttps://access.redhat.com/errata/RHSA-2025:11335RHSA-2025:11335RHSA-2025:11335 https://access.redhat.com/security/cve/CVE-2024-56337CVE-2024-56337CVE-2024-56337https://access.redhat.com/security/cve/CVE-2025-31650CVE-2025-31650CVE-2025-31650https://bugzilla.redhat.com/23335212333521https://bugzilla.redhat.com/23627832362783https://errata.almalinux.org/9/ALSA-2025-11335.htmlALSA-2025:11335ALSA-2025:11335 n$tomcat-webapps-9.0.87-3.el9_6.1.noarch.rpmm$tomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpmg$tomcat-9.0.87-3.el9_6.1.noarch.rpmi$tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpml$tomcat-lib-9.0.87-3.el9_6.1.noarch.rpmj$tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpmk$tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpmh$tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpmn$tomcat-webapps-9.0.87-3.el9_6.1.noarch.rpmm$tomcat-servlet-4.0-api-9.0.87-3.el9_6.1.noarch.rpmg$tomcat-9.0.87-3.el9_6.1.noarch.rpmi$tomcat-docs-webapp-9.0.87-3.el9_6.1.noarch.rpml$tomcat-lib-9.0.87-3.el9_6.1.noarch.rpmj$tomcat-el-3.0-api-9.0.87-3.el9_6.1.noarch.rpmk$tomcat-jsp-2.3-api-9.0.87-3.el9_6.1.noarch.rpmh$tomcat-admin-webapps-9.0.87-3.el9_6.1.noarch.rpm-f IBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updateoVhttps://access.redhat.com/errata/RHSA-2025:11411RHSA-2025:11411RHSA-2025:11411 https://access.redhat.com/security/cve/CVE-2024-58002CVE-2024-58002CVE-2024-58002https://access.redhat.com/security/cve/CVE-2025-38089CVE-2025-38089CVE-2025-38089https://bugzilla.redhat.com/23485132348513https://bugzilla.redhat.com/23755292375529https://errata.almalinux.org/9/ALSA-2025-11411.htmlALSA-2025:11411ALSA-2025:11411 %Rperf-5.14.0-570.28.1.el9_6.x86_64.rpm*Rrv-5.14.0-570.28.1.el9_6.x86_64.rpm"Rkernel-debug-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm)Rrtla-5.14.0-570.28.1.el9_6.x86_64.rpm!Rkernel-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm#Rkernel-devel-5.14.0-570.28.1.el9_6.x86_64.rpmRkernel-doc-5.14.0-570.28.1.el9_6.noarch.rpm(Rkernel-headers-5.14.0-570.28.1.el9_6.x86_64.rpm$Rkernel-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpmMRpython3-perf-5.14.0-570.28.1.el9_6.x86_64.rpm %Rperf-5.14.0-570.28.1.el9_6.x86_64.rpm*Rrv-5.14.0-570.28.1.el9_6.x86_64.rpm"Rkernel-debug-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpm)Rrtla-5.14.0-570.28.1.el9_6.x86_64.rpm!Rkernel-debug-devel-5.14.0-570.28.1.el9_6.x86_64.rpm#Rkernel-devel-5.14.0-570.28.1.el9_6.x86_64.rpmRkernel-doc-5.14.0-570.28.1.el9_6.noarch.rpm(Rkernel-headers-5.14.0-570.28.1.el9_6.x86_64.rpm$Rkernel-devel-matched-5.14.0-570.28.1.el9_6.x86_64.rpmMRpython3-perf-5.14.0-570.28.1.el9_6.x86_64.rpmĂ>g 1]BBBBBBBBBBBBBBBBBBsecurityImportant: git security updateEMhttps://access.redhat.com/errata/RHSA-2025:11462RHSA-2025:11462RHSA-2025:11462 https://access.redhat.com/security/cve/CVE-2024-50349CVE-2024-50349CVE-2024-50349https://access.redhat.com/security/cve/CVE-2024-52006CVE-2024-52006CVE-2024-52006https://access.redhat.com/security/cve/CVE-2025-27613CVE-2025-27613CVE-2025-27613https://access.redhat.com/security/cve/CVE-2025-27614CVE-2025-27614CVE-2025-27614https://access.redhat.com/security/cve/CVE-2025-46835CVE-2025-46835CVE-2025-46835https://access.redhat.com/security/cve/CVE-2025-48384CVE-2025-48384CVE-2025-48384https://access.redhat.com/security/cve/CVE-2025-48385CVE-2025-48385CVE-2025-48385https://bugzilla.redhat.com/23378242337824https://bugzilla.redhat.com/23379562337956https://bugzilla.redhat.com/23788062378806https://bugzilla.redhat.com/23788082378808https://bugzilla.redhat.com/23791242379124https://bugzilla.redhat.com/23791252379125https://bugzilla.redhat.com/23793262379326https://errata.almalinux.org/9/ALSA-2025-11462.htmlALSA-2025:11462ALSA-2025:11462 git-core-2.47.3-1.el9_6.x86_64.rpm~git-svn-2.47.3-1.el9_6.noarch.rpmzgit-core-doc-2.47.3-1.el9_6.noarch.rpm{git-email-2.47.3-1.el9_6.noarch.rpm perl-Git-SVN-2.47.3-1.el9_6.noarch.rpmgitweb-2.47.3-1.el9_6.noarch.rpmgit-2.47.3-1.el9_6.x86_64.rpmperl-Git-2.47.3-1.el9_6.noarch.rpm|git-gui-2.47.3-1.el9_6.noarch.rpmgit-subtree-2.47.3-1.el9_6.x86_64.rpmgitk-2.47.3-1.el9_6.noarch.rpmygit-all-2.47.3-1.el9_6.noarch.rpm}git-instaweb-2.47.3-1.el9_6.noarch.rpmgit-credential-libsecret-2.47.3-1.el9_6.x86_64.rpmgit-daemon-2.47.3-1.el9_6.x86_64.rpmgit-core-2.47.3-1.el9_6.x86_64.rpm~git-svn-2.47.3-1.el9_6.noarch.rpmzgit-core-doc-2.47.3-1.el9_6.noarch.rpm{git-email-2.47.3-1.el9_6.noarch.rpm perl-Git-SVN-2.47.3-1.el9_6.noarch.rpmgitweb-2.47.3-1.el9_6.noarch.rpmgit-2.47.3-1.el9_6.x86_64.rpmperl-Git-2.47.3-1.el9_6.noarch.rpm|git-gui-2.47.3-1.el9_6.noarch.rpmgit-subtree-2.47.3-1.el9_6.x86_64.rpmgitk-2.47.3-1.el9_6.noarch.rpmygit-all-2.47.3-1.el9_6.noarch.rpm}git-instaweb-2.47.3-1.el9_6.noarch.rpmgit-credential-libsecret-2.47.3-1.el9_6.x86_64.rpmgit-daemon-2.47.3-1.el9_6.x86_64.rpm@h :rBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: fence-agents security updatehttps://access.redhat.com/errata/RHSA-2025:11463RHSA-2025:11463RHSA-2025:11463 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-11463.htmlALSA-2025:11463ALSA-2025:11463 6" fence-agents-scsi-4.10.0-86.el9_6.7.noarch.rpm fence-agents-bladecenter-4.10.0-86.el9_6.7.noarch.rpm fence-virtd-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-ilo-mp-4.10.0-86.el9_6.7.noarch.rpm fence-agents-lpar-4.10.0-86.el9_6.7.noarch.rpm% fence-agents-wti-4.10.0-86.el9_6.7.noarch.rpm fence-agents-eps-4.10.0-86.el9_6.7.noarch.rpm fence-agents-rsa-4.10.0-86.el9_6.7.noarch.rpm fence-agents-ipmilan-4.10.0-86.el9_6.7.noarch.rpm fence-agents-rsb-4.10.0-86.el9_6.7.noarch.rpm fence-agents-mpath-4.10.0-86.el9_6.7.noarch.rpm fence-agents-apc-4.10.0-86.el9_6.7.noarch.rpm fence-virt-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-ilo2-4.10.0-86.el9_6.7.noarch.rpm^ fence-agents-ibm-vpc-4.10.0-86.el9_6.7.noarch.rpm] fence-agents-ibm-powervs-4.10.0-86.el9_6.7.noarch.rpm fence-agents-ifmib-4.10.0-86.el9_6.7.noarch.rpm! fence-agents-sbd-4.10.0-86.el9_6.7.noarch.rpm fence-agents-compute-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-ilo-ssh-4.10.0-86.el9_6.7.noarch.rpmH fence-agents-redfish-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-cisco-ucs-4.10.0-86.el9_6.7.noarch.rpm fence-agents-hpblade-4.10.0-86.el9_6.7.noarch.rpmB fence-agents-all-4.10.0-86.el9_6.7.x86_64.rpm_ fence-agents-virsh-4.10.0-86.el9_6.7.noarch.rpm fence-agents-eaton-snmp-4.10.0-86.el9_6.7.noarch.rpm fence-agents-apc-snmp-4.10.0-86.el9_6.7.noarch.rpm fence-agents-heuristics-ping-4.10.0-86.el9_6.7.noarch.rpm fence-agents-amt-ws-4.10.0-86.el9_6.7.noarch.rpm fence-virtd-serial-4.10.0-86.el9_6.7.x86_64.rpm fence-virtd-libvirt-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-ilo-moonshot-4.10.0-86.el9_6.7.noarch.rpmF fence-agents-kdump-4.10.0-86.el9_6.7.x86_64.rpm fence-virtd-tcp-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-cisco-mds-4.10.0-86.el9_6.7.noarch.rpm fence-agents-ibmblade-4.10.0-86.el9_6.7.noarch.rpmA fence-agents-aliyun-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-ipdu-4.10.0-86.el9_6.7.noarch.rpm\ fence-agents-common-4.10.0-86.el9_6.7.noarch.rpmE fence-agents-gce-4.10.0-86.el9_6.7.x86_64.rpm fence-virtd-cpg-4.10.0-86.el9_6.7.x86_64.rpmG fence-agents-openstack-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-emerson-4.10.0-86.el9_6.7.noarch.rpm fence-agents-drac5-4.10.0-86.el9_6.7.noarch.rpm fence-agents-intelmodular-4.10.0-86.el9_6.7.noarch.rpm fence-agents-kubevirt-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-brocade-4.10.0-86.el9_6.7.noarch.rpmC fence-agents-aws-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-rhevm-4.10.0-86.el9_6.7.noarch.rpm$ fence-agents-vmware-soap-4.10.0-86.el9_6.7.noarch.rpmD fence-agents-azure-arm-4.10.0-86.el9_6.7.x86_64.rpm fence-virtd-multicast-4.10.0-86.el9_6.7.x86_64.rpmK ha-cloud-support-4.10.0-86.el9_6.7.x86_64.rpm# fence-agents-vmware-rest-4.10.0-86.el9_6.7.noarch.rpm6" fence-agents-scsi-4.10.0-86.el9_6.7.noarch.rpm fence-agents-bladecenter-4.10.0-86.el9_6.7.noarch.rpm fence-virtd-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-ilo-mp-4.10.0-86.el9_6.7.noarch.rpm fence-agents-lpar-4.10.0-86.el9_6.7.noarch.rpm% fence-agents-wti-4.10.0-86.el9_6.7.noarch.rpm fence-agents-eps-4.10.0-86.el9_6.7.noarch.rpm fence-agents-rsa-4.10.0-86.el9_6.7.noarch.rpm fence-agents-ipmilan-4.10.0-86.el9_6.7.noarch.rpm fence-agents-rsb-4.10.0-86.el9_6.7.noarch.rpm fence-agents-mpath-4.10.0-86.el9_6.7.noarch.rpm fence-agents-apc-4.10.0-86.el9_6.7.noarch.rpm fence-virt-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-ilo2-4.10.0-86.el9_6.7.noarch.rpm^ fence-agents-ibm-vpc-4.10.0-86.el9_6.7.noarch.rpm] fence-agents-ibm-powervs-4.10.0-86.el9_6.7.noarch.rpm fence-agents-ifmib-4.10.0-86.el9_6.7.noarch.rpm! fence-agents-sbd-4.10.0-86.el9_6.7.noarch.rpm fence-agents-compute-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-ilo-ssh-4.10.0-86.el9_6.7.noarch.rpmH fence-agents-redfish-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-cisco-ucs-4.10.0-86.el9_6.7.noarch.rpm fence-agents-hpblade-4.10.0-86.el9_6.7.noarch.rpmB fence-agents-all-4.10.0-86.el9_6.7.x86_64.rpm_ fence-agents-virsh-4.10.0-86.el9_6.7.noarch.rpm fence-agents-eaton-snmp-4.10.0-86.el9_6.7.noarch.rpm fence-agents-apc-snmp-4.10.0-86.el9_6.7.noarch.rpm fence-agents-heuristics-ping-4.10.0-86.el9_6.7.noarch.rpm fence-agents-amt-ws-4.10.0-86.el9_6.7.noarch.rpm fence-virtd-serial-4.10.0-86.el9_6.7.x86_64.rpm fence-virtd-libvirt-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-ilo-moonshot-4.10.0-86.el9_6.7.noarch.rpmF fence-agents-kdump-4.10.0-86.el9_6.7.x86_64.rpm fence-virtd-tcp-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-cisco-mds-4.10.0-86.el9_6.7.noarch.rpm fence-agents-ibmblade-4.10.0-86.el9_6.7.noarch.rpmA fence-agents-aliyun-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-ipdu-4.10.0-86.el9_6.7.noarch.rpm\ fence-agents-common-4.10.0-86.el9_6.7.noarch.rpmE fence-agents-gce-4.10.0-86.el9_6.7.x86_64.rpm fence-virtd-cpg-4.10.0-86.el9_6.7.x86_64.rpmG fence-agents-openstack-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-emerson-4.10.0-86.el9_6.7.noarch.rpm fence-agents-drac5-4.10.0-86.el9_6.7.noarch.rpm fence-agents-intelmodular-4.10.0-86.el9_6.7.noarch.rpm fence-agents-kubevirt-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-brocade-4.10.0-86.el9_6.7.noarch.rpmC fence-agents-aws-4.10.0-86.el9_6.7.x86_64.rpm fence-agents-rhevm-4.10.0-86.el9_6.7.noarch.rpm$ fence-agents-vmware-soap-4.10.0-86.el9_6.7.noarch.rpmD fence-agents-azure-arm-4.10.0-86.el9_6.7.x86_64.rpm fence-virtd-multicast-4.10.0-86.el9_6.7.x86_64.rpmK ha-cloud-support-4.10.0-86.el9_6.7.x86_64.rpm# fence-agents-vmware-rest-4.10.0-86.el9_6.7.noarch.rpmi ?{BBsecurityImportant: firefox security update:https://access.redhat.com/errata/RHSA-2025:11748RHSA-2025:11748RHSA-2025:11748 https://access.redhat.com/security/cve/CVE-2025-8027CVE-2025-8027CVE-2025-8027https://access.redhat.com/security/cve/CVE-2025-8028CVE-2025-8028CVE-2025-8028https://access.redhat.com/security/cve/CVE-2025-8029CVE-2025-8029CVE-2025-8029https://access.redhat.com/security/cve/CVE-2025-8030CVE-2025-8030CVE-2025-8030https://access.redhat.com/security/cve/CVE-2025-8031CVE-2025-8031CVE-2025-8031https://access.redhat.com/security/cve/CVE-2025-8032CVE-2025-8032CVE-2025-8032https://access.redhat.com/security/cve/CVE-2025-8033CVE-2025-8033CVE-2025-8033https://access.redhat.com/security/cve/CVE-2025-8034CVE-2025-8034CVE-2025-8034https://access.redhat.com/security/cve/CVE-2025-8035CVE-2025-8035CVE-2025-8035https://bugzilla.redhat.com/23827012382701https://bugzilla.redhat.com/23827032382703https://bugzilla.redhat.com/23827042382704https://bugzilla.redhat.com/23827072382707https://bugzilla.redhat.com/23827102382710https://bugzilla.redhat.com/23827112382711https://bugzilla.redhat.com/23827172382717https://bugzilla.redhat.com/23827182382718https://bugzilla.redhat.com/23827202382720https://errata.almalinux.org/9/ALSA-2025-11748.htmlALSA-2025:11748ALSA-2025:11748 7Ufirefox-128.13.0-1.el9_6.alma.1.x86_64.rpmOUfirefox-x11-128.13.0-1.el9_6.alma.1.x86_64.rpm7Ufirefox-128.13.0-1.el9_6.alma.1.x86_64.rpmOUfirefox-x11-128.13.0-1.el9_6.alma.1.x86_64.rpmĨDj @securityImportant: thunderbird security updateP https://access.redhat.com/errata/RHSA-2025:1184RHSA-2025:1184RHSA-2025:1184 https://access.redhat.com/security/cve/CVE-2025-0510CVE-2025-0510CVE-2025-0510https://access.redhat.com/security/cve/CVE-2025-1009CVE-2025-1009CVE-2025-1009https://access.redhat.com/security/cve/CVE-2025-1010CVE-2025-1010CVE-2025-1010https://access.redhat.com/security/cve/CVE-2025-1011CVE-2025-1011CVE-2025-1011https://access.redhat.com/security/cve/CVE-2025-1012CVE-2025-1012CVE-2025-1012https://access.redhat.com/security/cve/CVE-2025-1013CVE-2025-1013CVE-2025-1013https://access.redhat.com/security/cve/CVE-2025-1014CVE-2025-1014CVE-2025-1014https://access.redhat.com/security/cve/CVE-2025-1015CVE-2025-1015CVE-2025-1015https://access.redhat.com/security/cve/CVE-2025-1016CVE-2025-1016CVE-2025-1016https://access.redhat.com/security/cve/CVE-2025-1017CVE-2025-1017CVE-2025-1017https://bugzilla.redhat.com/23437482343748https://bugzilla.redhat.com/23437502343750https://bugzilla.redhat.com/23437522343752https://bugzilla.redhat.com/23437542343754https://bugzilla.redhat.com/23437562343756https://bugzilla.redhat.com/23437592343759https://bugzilla.redhat.com/23437602343760https://bugzilla.redhat.com/23437622343762https://bugzilla.redhat.com/23437642343764https://bugzilla.redhat.com/23437652343765https://errata.almalinux.org/9/ALSA-2025-1184.htmlALSA-2025:1184ALSA-2025:1184 9Jthunderbird-128.7.0-1.el9_5.alma.1.x86_64.rpm9Jthunderbird-128.7.0-1.el9_5.alma.1.x86_64.rpm(k CBBBBBBBsecurityImportant: unbound security update[hhttps://access.redhat.com/errata/RHSA-2025:11849RHSA-2025:11849RHSA-2025:11849 https://access.redhat.com/security/cve/CVE-2025-5994CVE-2025-5994CVE-2025-5994https://bugzilla.redhat.com/23809492380949https://errata.almalinux.org/9/ALSA-2025-11849.htmlALSA-2025:11849ALSA-2025:11849 ljunbound-libs-1.16.2-19.el9_6.1.x86_64.rpmjunbound-1.16.2-19.el9_6.1.x86_64.rpmljunbound-libs-1.16.2-19.el9_6.1.i686.rpm(junbound-dracut-1.16.2-19.el9_6.1.x86_64.rpm jpython3-unbound-1.16.2-19.el9_6.1.x86_64.rpmljunbound-libs-1.16.2-19.el9_6.1.x86_64.rpmjunbound-1.16.2-19.el9_6.1.x86_64.rpmljunbound-libs-1.16.2-19.el9_6.1.i686.rpm(junbound-dracut-1.16.2-19.el9_6.1.x86_64.rpm jpython3-unbound-1.16.2-19.el9_6.1.x86_64.rpmĞ_l MBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateChttps://access.redhat.com/errata/RHSA-2025:11861RHSA-2025:11861RHSA-2025:11861 https://access.redhat.com/security/cve/CVE-2024-57980CVE-2024-57980CVE-2024-57980https://access.redhat.com/security/cve/CVE-2025-21905CVE-2025-21905CVE-2025-21905https://access.redhat.com/security/cve/CVE-2025-22085CVE-2025-22085CVE-2025-22085https://access.redhat.com/security/cve/CVE-2025-22091CVE-2025-22091CVE-2025-22091https://access.redhat.com/security/cve/CVE-2025-22113CVE-2025-22113CVE-2025-22113https://access.redhat.com/security/cve/CVE-2025-22121CVE-2025-22121CVE-2025-22121https://access.redhat.com/security/cve/CVE-2025-37797CVE-2025-37797CVE-2025-37797https://access.redhat.com/security/cve/CVE-2025-37958CVE-2025-37958CVE-2025-37958https://access.redhat.com/security/cve/CVE-2025-38086CVE-2025-38086CVE-2025-38086https://access.redhat.com/security/cve/CVE-2025-38110CVE-2025-38110CVE-2025-38110https://bugzilla.redhat.com/23485992348599https://bugzilla.redhat.com/23566132356613https://bugzilla.redhat.com/23601862360186https://bugzilla.redhat.com/23601992360199https://bugzilla.redhat.com/23602122360212https://bugzilla.redhat.com/23602192360219https://bugzilla.redhat.com/23636722363672https://bugzilla.redhat.com/23675722367572https://bugzilla.redhat.com/23753052375305https://bugzilla.redhat.com/23760352376035https://errata.almalinux.org/9/ALSA-2025-11861.htmlALSA-2025:11861ALSA-2025:11861 %Sperf-5.14.0-570.30.1.el9_6.x86_64.rpm$Skernel-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm)Srtla-5.14.0-570.30.1.el9_6.x86_64.rpm!Skernel-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpmMSpython3-perf-5.14.0-570.30.1.el9_6.x86_64.rpmSkernel-doc-5.14.0-570.30.1.el9_6.noarch.rpm"Skernel-debug-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm#Skernel-devel-5.14.0-570.30.1.el9_6.x86_64.rpm(Skernel-headers-5.14.0-570.30.1.el9_6.x86_64.rpm*Srv-5.14.0-570.30.1.el9_6.x86_64.rpm %Sperf-5.14.0-570.30.1.el9_6.x86_64.rpm$Skernel-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm)Srtla-5.14.0-570.30.1.el9_6.x86_64.rpm!Skernel-debug-devel-5.14.0-570.30.1.el9_6.x86_64.rpmMSpython3-perf-5.14.0-570.30.1.el9_6.x86_64.rpmSkernel-doc-5.14.0-570.30.1.el9_6.noarch.rpm"Skernel-debug-devel-matched-5.14.0-570.30.1.el9_6.x86_64.rpm#Skernel-devel-5.14.0-570.30.1.el9_6.x86_64.rpm(Skernel-headers-5.14.0-570.30.1.el9_6.x86_64.rpm*Srv-5.14.0-570.30.1.el9_6.x86_64.rpmį'm 'aBBBBsecurityImportant: sqlite security updateQ https://access.redhat.com/errata/RHSA-2025:11992RHSA-2025:11992RHSA-2025:11992 https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-11992.htmlALSA-2025:11992ALSA-2025:11992 )Vsqlite-3.34.1-8.el9_6.i686.rpm)Vsqlite-3.34.1-8.el9_6.x86_64.rpm*Vsqlite-devel-3.34.1-8.el9_6.i686.rpm*Vsqlite-devel-3.34.1-8.el9_6.x86_64.rpm)Vsqlite-3.34.1-8.el9_6.i686.rpm)Vsqlite-3.34.1-8.el9_6.x86_64.rpm*Vsqlite-devel-3.34.1-8.el9_6.i686.rpm*Vsqlite-devel-3.34.1-8.el9_6.x86_64.rpmĢn -hBBBsecurityImportant: redis:7 security updateZthttps://access.redhat.com/errata/RHSA-2025:12008RHSA-2025:12008RHSA-2025:12008 https://access.redhat.com/security/cve/CVE-2025-27151CVE-2025-27151CVE-2025-27151https://access.redhat.com/security/cve/CVE-2025-32023CVE-2025-32023CVE-2025-32023https://access.redhat.com/security/cve/CVE-2025-48367CVE-2025-48367CVE-2025-48367https://bugzilla.redhat.com/23691532369153https://errata.almalinux.org/9/ALSA-2025-12008.htmlALSA-2025:12008ALSA-2025:12008 6c'6Tredis-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpmUTredis-devel-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm:Tredis-doc-7.2.10-1.module_el9.6.0+173+efaf9205.noarch.rpm6c'6Tredis-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpmUTredis-devel-7.2.10-1.module_el9.6.0+173+efaf9205.x86_64.rpm:Tredis-doc-7.2.10-1.module_el9.6.0+173+efaf9205.noarch.rpmĢ,o 3nBBBsecurityModerate: icu security updateNhttps://access.redhat.com/errata/RHSA-2025:12083RHSA-2025:12083RHSA-2025:12083 https://access.redhat.com/security/cve/CVE-2025-5222CVE-2025-5222CVE-2025-5222https://bugzilla.redhat.com/23686002368600https://errata.almalinux.org/9/ALSA-2025-12083.htmlALSA-2025:12083ALSA-2025:12083 Slibicu-devel-67.1-10.el9_6.x86_64.rpmoSicu-67.1-10.el9_6.x86_64.rpmSlibicu-devel-67.1-10.el9_6.i686.rpmSlibicu-devel-67.1-10.el9_6.x86_64.rpmoSicu-67.1-10.el9_6.x86_64.rpmSlibicu-devel-67.1-10.el9_6.i686.rpmħHp >tBBBBBBBBsecurityModerate: tbb security update`ahttps://access.redhat.com/errata/RHSA-2025:1210RHSA-2025:1210RHSA-2025:1210 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1210.htmlALSA-2025:1210ALSA-2025:1210 Iutbb-2020.3-8.el9_5.1.i686.rpmuupython3-tbb-2020.3-8.el9_5.1.x86_64.rpmJutbb-devel-2020.3-8.el9_5.1.i686.rpmIutbb-2020.3-8.el9_5.1.x86_64.rpmJutbb-devel-2020.3-8.el9_5.1.x86_64.rpm utbb-doc-2020.3-8.el9_5.1.x86_64.rpmIutbb-2020.3-8.el9_5.1.i686.rpmuupython3-tbb-2020.3-8.el9_5.1.x86_64.rpmJutbb-devel-2020.3-8.el9_5.1.i686.rpmIutbb-2020.3-8.el9_5.1.x86_64.rpmJutbb-devel-2020.3-8.el9_5.1.x86_64.rpm utbb-doc-2020.3-8.el9_5.1.x86_64.rpmq BsecurityModerate: libtpms security updateAhttps://access.redhat.com/errata/RHSA-2025:12100RHSA-2025:12100RHSA-2025:12100 https://access.redhat.com/security/cve/CVE-2025-49133CVE-2025-49133CVE-2025-49133https://bugzilla.redhat.com/23715852371585https://errata.almalinux.org/9/ALSA-2025-12100.htmlALSA-2025:12100ALSA-2025:12100 ~slibtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm~slibtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpm~slibtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.x86_64.rpm~slibtpms-0.9.1-5.20211126git1ff6fe1f43.el9_6.i686.rpmħDr CsecurityImportant: thunderbird security updateE https://access.redhat.com/errata/RHSA-2025:12187RHSA-2025:12187RHSA-2025:12187 https://access.redhat.com/security/cve/CVE-2025-8027CVE-2025-8027CVE-2025-8027https://access.redhat.com/security/cve/CVE-2025-8028CVE-2025-8028CVE-2025-8028https://access.redhat.com/security/cve/CVE-2025-8029CVE-2025-8029CVE-2025-8029https://access.redhat.com/security/cve/CVE-2025-8030CVE-2025-8030CVE-2025-8030https://access.redhat.com/security/cve/CVE-2025-8031CVE-2025-8031CVE-2025-8031https://access.redhat.com/security/cve/CVE-2025-8032CVE-2025-8032CVE-2025-8032https://access.redhat.com/security/cve/CVE-2025-8033CVE-2025-8033CVE-2025-8033https://access.redhat.com/security/cve/CVE-2025-8034CVE-2025-8034CVE-2025-8034https://access.redhat.com/security/cve/CVE-2025-8035CVE-2025-8035CVE-2025-8035https://bugzilla.redhat.com/23827012382701https://bugzilla.redhat.com/23827032382703https://bugzilla.redhat.com/23827042382704https://bugzilla.redhat.com/23827072382707https://bugzilla.redhat.com/23827102382710https://bugzilla.redhat.com/23827112382711https://bugzilla.redhat.com/23827172382717https://bugzilla.redhat.com/23827182382718https://bugzilla.redhat.com/23827202382720https://errata.almalinux.org/9/ALSA-2025-12187.htmlALSA-2025:12187ALSA-2025:12187 9Cthunderbird-128.13.0-3.el9_6.alma.1.x86_64.rpm9Cthunderbird-128.13.0-3.el9_6.alma.1.x86_64.rpmĨHs FBBBBsecurityImportant: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security updateNhttps://access.redhat.com/errata/RHSA-2025:12280RHSA-2025:12280RHSA-2025:12280 https://access.redhat.com/security/cve/CVE-2025-52999CVE-2025-52999CVE-2025-52999https://bugzilla.redhat.com/23748042374804https://errata.almalinux.org/9/ALSA-2025-12280.htmlALSA-2025:12280ALSA-2025:12280 TBpki-jackson-annotations-2.19.1-1.el9_6.noarch.rpmUBpki-jackson-core-2.19.1-1.el9_6.noarch.rpmVBpki-jackson-jaxrs-json-provider-2.19.1-1.el9_6.noarch.rpmWBpki-jackson-jaxrs-providers-2.19.1-1.el9_6.noarch.rpmCBpki-jackson-databind-2.19.1-1.el9_6.noarch.rpmXBpki-jackson-module-jaxb-annotations-2.19.1-1.el9_6.noarch.rpmTBpki-jackson-annotations-2.19.1-1.el9_6.noarch.rpmUBpki-jackson-core-2.19.1-1.el9_6.noarch.rpmVBpki-jackson-jaxrs-json-provider-2.19.1-1.el9_6.noarch.rpmWBpki-jackson-jaxrs-providers-2.19.1-1.el9_6.noarch.rpmCBpki-jackson-databind-2.19.1-1.el9_6.noarch.rpmXBpki-jackson-module-jaxb-annotations-2.19.1-1.el9_6.noarch.rpmݘ t MBsecurityImportant: libxml2 security updated!https://access.redhat.com/errata/RHSA-2025:12447RHSA-2025:12447RHSA-2025:12447 https://access.redhat.com/security/cve/CVE-2025-7425CVE-2025-7425CVE-2025-7425https://bugzilla.redhat.com/23792742379274https://errata.almalinux.org/9/ALSA-2025-12447.htmlALSA-2025:12447ALSA-2025:12447 >1libxml2-devel-2.9.13-11.el9_6.x86_64.rpm>1libxml2-devel-2.9.13-11.el9_6.i686.rpm>1libxml2-devel-2.9.13-11.el9_6.x86_64.rpm>1libxml2-devel-2.9.13-11.el9_6.i686.rpmijxu QsecurityModerate: python-requests security updateRhttps://access.redhat.com/errata/RHSA-2025:12519RHSA-2025:12519RHSA-2025:12519 https://access.redhat.com/security/cve/CVE-2024-47081CVE-2024-47081CVE-2024-47081https://bugzilla.redhat.com/23712722371272https://errata.almalinux.org/9/ALSA-2025-12519.htmlALSA-2025:12519ALSA-2025:12519 ,_python3-requests+socks-2.25.1-10.el9_6.noarch.rpm+_python3-requests+security-2.25.1-10.el9_6.noarch.rpm,_python3-requests+socks-2.25.1-10.el9_6.noarch.rpm+_python3-requests+security-2.25.1-10.el9_6.noarch.rpmhv %TBBBBBBBBBBBBBBBsecurityImportant: kernel security updateWhttps://access.redhat.com/errata/RHSA-2025:1262RHSA-2025:1262RHSA-2025:1262 https://access.redhat.com/security/cve/CVE-2024-53104CVE-2024-53104CVE-2024-53104https://bugzilla.redhat.com/23298172329817https://errata.almalinux.org/9/ALSA-2025-1262.htmlALSA-2025:1262ALSA-2025:1262 !Mkernel-debug-devel-5.14.0-503.23.2.el9_5.x86_64.rpm(Mkernel-headers-5.14.0-503.23.2.el9_5.x86_64.rpm%Mperf-5.14.0-503.23.2.el9_5.x86_64.rpm"Mkernel-debug-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpmMkernel-doc-5.14.0-503.23.2.el9_5.noarch.rpm$Mkernel-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpm)Mrtla-5.14.0-503.23.2.el9_5.x86_64.rpm*Mrv-5.14.0-503.23.2.el9_5.x86_64.rpm#Mkernel-devel-5.14.0-503.23.2.el9_5.x86_64.rpm !Mkernel-debug-devel-5.14.0-503.23.2.el9_5.x86_64.rpm(Mkernel-headers-5.14.0-503.23.2.el9_5.x86_64.rpm%Mperf-5.14.0-503.23.2.el9_5.x86_64.rpm"Mkernel-debug-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpmMkernel-doc-5.14.0-503.23.2.el9_5.noarch.rpm$Mkernel-devel-matched-5.14.0-503.23.2.el9_5.x86_64.rpm)Mrtla-5.14.0-503.23.2.el9_5.x86_64.rpm*Mrv-5.14.0-503.23.2.el9_5.x86_64.rpm#Mkernel-devel-5.14.0-503.23.2.el9_5.x86_64.rpm~w 9fBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updatetohttps://access.redhat.com/errata/RHSA-2025:12746RHSA-2025:12746RHSA-2025:12746 https://access.redhat.com/security/cve/CVE-2022-49788CVE-2022-49788CVE-2022-49788https://access.redhat.com/security/cve/CVE-2025-21727CVE-2025-21727CVE-2025-21727https://access.redhat.com/security/cve/CVE-2025-21928CVE-2025-21928CVE-2025-21928https://access.redhat.com/security/cve/CVE-2025-21929CVE-2025-21929CVE-2025-21929https://access.redhat.com/security/cve/CVE-2025-21962CVE-2025-21962CVE-2025-21962https://access.redhat.com/security/cve/CVE-2025-22020CVE-2025-22020CVE-2025-22020https://access.redhat.com/security/cve/CVE-2025-37890CVE-2025-37890CVE-2025-37890https://access.redhat.com/security/cve/CVE-2025-38052CVE-2025-38052CVE-2025-38052https://access.redhat.com/security/cve/CVE-2025-38087CVE-2025-38087CVE-2025-38087https://bugzilla.redhat.com/23485162348516https://bugzilla.redhat.com/23565922356592https://bugzilla.redhat.com/23565942356594https://bugzilla.redhat.com/23566242356624https://bugzilla.redhat.com/23600992360099https://bugzilla.redhat.com/23633782363378https://bugzilla.redhat.com/23668482366848https://bugzilla.redhat.com/23733802373380https://bugzilla.redhat.com/23755312375531https://errata.almalinux.org/9/ALSA-2025-12746.htmlALSA-2025:12746ALSA-2025:12746 "Tkernel-debug-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpmTkernel-doc-5.14.0-570.32.1.el9_6.noarch.rpm(Tkernel-headers-5.14.0-570.32.1.el9_6.x86_64.rpm*Trv-5.14.0-570.32.1.el9_6.x86_64.rpm#Tkernel-devel-5.14.0-570.32.1.el9_6.x86_64.rpm)Trtla-5.14.0-570.32.1.el9_6.x86_64.rpm!Tkernel-debug-devel-5.14.0-570.32.1.el9_6.x86_64.rpmMTpython3-perf-5.14.0-570.32.1.el9_6.x86_64.rpm$Tkernel-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm%Tperf-5.14.0-570.32.1.el9_6.x86_64.rpm "Tkernel-debug-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpmTkernel-doc-5.14.0-570.32.1.el9_6.noarch.rpm(Tkernel-headers-5.14.0-570.32.1.el9_6.x86_64.rpm*Trv-5.14.0-570.32.1.el9_6.x86_64.rpm#Tkernel-devel-5.14.0-570.32.1.el9_6.x86_64.rpm)Trtla-5.14.0-570.32.1.el9_6.x86_64.rpm!Tkernel-debug-devel-5.14.0-570.32.1.el9_6.x86_64.rpmMTpython3-perf-5.14.0-570.32.1.el9_6.x86_64.rpm$Tkernel-devel-matched-5.14.0-570.32.1.el9_6.x86_64.rpm%Tperf-5.14.0-570.32.1.el9_6.x86_64.rpmҚx =securityModerate: python3.12-setuptools security updatezJhttps://access.redhat.com/errata/RHSA-2025:12834RHSA-2025:12834RHSA-2025:12834 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-12834.htmlALSA-2025:12834ALSA-2025:12834 Q]python3.12-setuptools-68.2.2-5.el9_6.noarch.rpmQ]python3.12-setuptools-68.2.2-5.el9_6.noarch.rpmsz /BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc-toolset-14-gcc security updateDhttps://access.redhat.com/errata/RHSA-2025:1300RHSA-2025:1300RHSA-2025:1300 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1300.htmlALSA-2025:1300ALSA-2025:1300 \;gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.x86_64.rpmi;libasan8-14.2.1-1.3.el9_5.x86_64.rpm ;gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.x86_64.rpm ;gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.i686.rpmZ;gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.x86_64.rpm ;gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.i686.rpm;gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.x86_64.rpmX;gcc-toolset-14-gcc-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.i686.rpm[;gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.x86_64.rpmY;gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.x86_64.rpm ;gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.x86_64.rpm^;gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.i686.rpm;gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.i686.rpm>;libtsan2-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.x86_64.rpmi;libasan8-14.2.1-1.3.el9_5.i686.rpm];gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.i686.rpm;gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.x86_64.rpm_;gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.i686.rpm;gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.i686.rpm;gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.i686.rpm\;gcc-toolset-14-liblsan-devel-14.2.1-1.3.el9_5.x86_64.rpmi;libasan8-14.2.1-1.3.el9_5.x86_64.rpm ;gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.x86_64.rpm ;gcc-toolset-14-libstdc++-devel-14.2.1-1.3.el9_5.i686.rpmZ;gcc-toolset-14-gcc-gfortran-14.2.1-1.3.el9_5.x86_64.rpm ;gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.i686.rpm;gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.x86_64.rpmX;gcc-toolset-14-gcc-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.i686.rpm[;gcc-toolset-14-gcc-plugin-annobin-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.x86_64.rpmY;gcc-toolset-14-gcc-c++-14.2.1-1.3.el9_5.x86_64.rpm ;gcc-toolset-14-libubsan-devel-14.2.1-1.3.el9_5.x86_64.rpm^;gcc-toolset-14-libtsan-devel-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libasan-devel-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.i686.rpm;gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.i686.rpm>;libtsan2-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libgccjit-14.2.1-1.3.el9_5.x86_64.rpmi;libasan8-14.2.1-1.3.el9_5.i686.rpm];gcc-toolset-14-libstdc++-docs-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libatomic-devel-14.2.1-1.3.el9_5.i686.rpm;gcc-toolset-14-libquadmath-devel-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.x86_64.rpm_;gcc-toolset-14-offload-nvptx-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libgccjit-devel-14.2.1-1.3.el9_5.i686.rpm;gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.i686.rpm;gcc-toolset-14-gcc-plugin-devel-14.2.1-1.3.el9_5.x86_64.rpm;gcc-toolset-14-libitm-devel-14.2.1-1.3.el9_5.i686.rpm#{ pBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc-toolset-13-gcc security update`https://access.redhat.com/errata/RHSA-2025:1309RHSA-2025:1309RHSA-2025:1309 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1309.htmlALSA-2025:1309ALSA-2025:1309 {:gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.i686.rpmy:gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.x86_64.rpmy:gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.i686.rpm:gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.x86_64.rpmQ:gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.x86_64.rpmi:libasan8-13.3.1-2.2.el9_5.x86_64.rpmO:gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.x86_64.rpmP:gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.x86_64.rpmz:gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.x86_64.rpm:gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.i686.rpm{:gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.x86_64.rpmS:gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.x86_64.rpmi:libasan8-13.3.1-2.2.el9_5.i686.rpmx:gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.i686.rpmN:gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.x86_64.rpmz:gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.i686.rpm|:gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.i686.rpm~:gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.i686.rpmx:gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.x86_64.rpm}:gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.x86_64.rpm|:gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.x86_64.rpmT:gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.x86_64.rpm~:gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.x86_64.rpm>:libtsan2-13.3.1-2.2.el9_5.x86_64.rpm:gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.i686.rpm}:gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.i686.rpmM:gcc-toolset-13-gcc-13.3.1-2.2.el9_5.x86_64.rpm:gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.x86_64.rpmR:gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.x86_64.rpm{:gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.i686.rpmy:gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.x86_64.rpmy:gcc-toolset-13-libasan-devel-13.3.1-2.2.el9_5.i686.rpm:gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.x86_64.rpmQ:gcc-toolset-13-liblsan-devel-13.3.1-2.2.el9_5.x86_64.rpmi:libasan8-13.3.1-2.2.el9_5.x86_64.rpmO:gcc-toolset-13-gcc-gfortran-13.3.1-2.2.el9_5.x86_64.rpmP:gcc-toolset-13-gcc-plugin-annobin-13.3.1-2.2.el9_5.x86_64.rpmz:gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.x86_64.rpm:gcc-toolset-13-libubsan-devel-13.3.1-2.2.el9_5.i686.rpm{:gcc-toolset-13-libgccjit-13.3.1-2.2.el9_5.x86_64.rpmS:gcc-toolset-13-libtsan-devel-13.3.1-2.2.el9_5.x86_64.rpmi:libasan8-13.3.1-2.2.el9_5.i686.rpmx:gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.i686.rpmN:gcc-toolset-13-gcc-c++-13.3.1-2.2.el9_5.x86_64.rpmz:gcc-toolset-13-libatomic-devel-13.3.1-2.2.el9_5.i686.rpm|:gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.i686.rpm~:gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.i686.rpmx:gcc-toolset-13-gcc-plugin-devel-13.3.1-2.2.el9_5.x86_64.rpm}:gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.x86_64.rpm|:gcc-toolset-13-libgccjit-devel-13.3.1-2.2.el9_5.x86_64.rpmT:gcc-toolset-13-offload-nvptx-13.3.1-2.2.el9_5.x86_64.rpm~:gcc-toolset-13-libquadmath-devel-13.3.1-2.2.el9_5.x86_64.rpm>:libtsan2-13.3.1-2.2.el9_5.x86_64.rpm:gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.i686.rpm}:gcc-toolset-13-libitm-devel-13.3.1-2.2.el9_5.i686.rpmM:gcc-toolset-13-gcc-13.3.1-2.2.el9_5.x86_64.rpm:gcc-toolset-13-libstdc++-devel-13.3.1-2.2.el9_5.x86_64.rpmR:gcc-toolset-13-libstdc++-docs-13.3.1-2.2.el9_5.x86_64.rpm0| &aBBBsecurityImportant: openssl security update|qhttps://access.redhat.com/errata/RHSA-2025:1330RHSA-2025:1330RHSA-2025:1330 https://access.redhat.com/security/cve/CVE-2024-12797CVE-2024-12797CVE-2024-12797https://bugzilla.redhat.com/23427572342757https://errata.almalinux.org/9/ALSA-2025-1330.htmlALSA-2025:1330ALSA-2025:1330 +openssl-devel-3.2.2-6.el9_5.1.i686.rpmm+openssl-perl-3.2.2-6.el9_5.1.x86_64.rpm+openssl-devel-3.2.2-6.el9_5.1.x86_64.rpm+openssl-devel-3.2.2-6.el9_5.1.i686.rpmm+openssl-perl-3.2.2-6.el9_5.1.x86_64.rpm+openssl-devel-3.2.2-6.el9_5.1.x86_64.rpm]} *gBsecurityModerate: libxml2 security updatemhttps://access.redhat.com/errata/RHSA-2025:13428RHSA-2025:13428RHSA-2025:13428 https://access.redhat.com/security/cve/CVE-2025-32414CVE-2025-32414CVE-2025-32414https://access.redhat.com/security/cve/CVE-2025-32415CVE-2025-32415CVE-2025-32415https://bugzilla.redhat.com/23581212358121https://bugzilla.redhat.com/23607682360768https://errata.almalinux.org/9/ALSA-2025-13428.htmlALSA-2025:13428ALSA-2025:13428 >2libxml2-devel-2.9.13-12.el9_6.i686.rpm>2libxml2-devel-2.9.13-12.el9_6.x86_64.rpm>2libxml2-devel-2.9.13-12.el9_6.i686.rpm>2libxml2-devel-2.9.13-12.el9_6.x86_64.rpmԼ>~ kBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: gcc security updateKhttps://access.redhat.com/errata/RHSA-2025:1346RHSA-2025:1346RHSA-2025:1346 https://access.redhat.com/security/cve/CVE-2020-11023CVE-2020-11023CVE-2020-11023https://bugzilla.redhat.com/18500041850004https://errata.almalinux.org/9/ALSA-2025-1346.htmlALSA-2025:1346ALSA-2025:1346 ,Nlibubsan-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibitm-11.5.0-5.el9_5.alma.1.x86_64.rpm&Nlibquadmath-devel-11.5.0-5.el9_5.alma.1.i686.rpmGNgcc-c++-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibgccjit-11.5.0-5.el9_5.alma.1.x86_64.rpm,Nlibubsan-11.5.0-5.el9_5.alma.1.i686.rpmFNgcc-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibgccjit-11.5.0-5.el9_5.alma.1.i686.rpm&Nlibquadmath-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibitm-11.5.0-5.el9_5.alma.1.i686.rpm4Ncpp-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibgccjit-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmHNgcc-gfortran-11.5.0-5.el9_5.alma.1.x86_64.rpmJNgcc-plugin-annobin-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibasan-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibgccjit-devel-11.5.0-5.el9_5.alma.1.i686.rpm)Nlibgomp-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpm+Nlibstdc++-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibitm-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibitm-devel-11.5.0-5.el9_5.alma.1.i686.rpm1Nliblsan-11.5.0-5.el9_5.alma.1.x86_64.rpmINgcc-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpm6Nlibtsan-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibasan-11.5.0-5.el9_5.alma.1.i686.rpm+Nlibstdc++-devel-11.5.0-5.el9_5.alma.1.i686.rpm5Nlibstdc++-docs-11.5.0-5.el9_5.alma.1.x86_64.rpm,Nlibubsan-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibitm-11.5.0-5.el9_5.alma.1.x86_64.rpm&Nlibquadmath-devel-11.5.0-5.el9_5.alma.1.i686.rpmGNgcc-c++-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibgccjit-11.5.0-5.el9_5.alma.1.x86_64.rpm,Nlibubsan-11.5.0-5.el9_5.alma.1.i686.rpmFNgcc-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibgccjit-11.5.0-5.el9_5.alma.1.i686.rpm&Nlibquadmath-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibitm-11.5.0-5.el9_5.alma.1.i686.rpm4Ncpp-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibgccjit-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmHNgcc-gfortran-11.5.0-5.el9_5.alma.1.x86_64.rpmJNgcc-plugin-annobin-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibasan-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibgccjit-devel-11.5.0-5.el9_5.alma.1.i686.rpm)Nlibgomp-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpm+Nlibstdc++-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibitm-devel-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibitm-devel-11.5.0-5.el9_5.alma.1.i686.rpm1Nliblsan-11.5.0-5.el9_5.alma.1.x86_64.rpmINgcc-offload-nvptx-11.5.0-5.el9_5.alma.1.x86_64.rpm6Nlibtsan-11.5.0-5.el9_5.alma.1.x86_64.rpmNlibasan-11.5.0-5.el9_5.alma.1.i686.rpm+Nlibstdc++-devel-11.5.0-5.el9_5.alma.1.i686.rpm5Nlibstdc++-docs-11.5.0-5.el9_5.alma.1.x86_64.rpm XBsecurityImportant: libxml2 security updateM~https://access.redhat.com/errata/RHSA-2025:1350RHSA-2025:1350RHSA-2025:1350 https://access.redhat.com/security/cve/CVE-2022-49043CVE-2022-49043CVE-2022-49043https://bugzilla.redhat.com/23421182342118https://errata.almalinux.org/9/ALSA-2025-1350.htmlALSA-2025:1350ALSA-2025:1350 >8libxml2-devel-2.9.13-6.el9_5.1.i686.rpm>8libxml2-devel-2.9.13-6.el9_5.1.x86_64.rpm>8libxml2-devel-2.9.13-6.el9_5.1.i686.rpm>8libxml2-devel-2.9.13-6.el9_5.1.x86_64.rpm  \securityModerate: python3.11-setuptools security updateK3https://access.redhat.com/errata/RHSA-2025:13578RHSA-2025:13578RHSA-2025:13578 https://access.redhat.com/security/cve/CVE-2025-47273CVE-2025-47273CVE-2025-47273https://bugzilla.redhat.com/23669822366982https://errata.almalinux.org/9/ALSA-2025-13578.htmlALSA-2025:13578ALSA-2025:13578 N~python3.11-setuptools-65.5.1-4.el9_6.noarch.rpmO~python3.11-setuptools-wheel-65.5.1-4.el9_6.noarch.rpmN~python3.11-setuptools-65.5.1-4.el9_6.noarch.rpmO~python3.11-setuptools-wheel-65.5.1-4.el9_6.noarch.rpm8 2_BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update~Hhttps://access.redhat.com/errata/RHSA-2025:13602RHSA-2025:13602RHSA-2025:13602 https://access.redhat.com/security/cve/CVE-2025-38079CVE-2025-38079CVE-2025-38079https://access.redhat.com/security/cve/CVE-2025-38292CVE-2025-38292CVE-2025-38292https://bugzilla.redhat.com/23733832373383https://bugzilla.redhat.com/23792192379219https://errata.almalinux.org/9/ALSA-2025-13602.htmlALSA-2025:13602ALSA-2025:13602 *Urv-5.14.0-570.33.2.el9_6.x86_64.rpmMUpython3-perf-5.14.0-570.33.2.el9_6.x86_64.rpm$Ukernel-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm)Urtla-5.14.0-570.33.2.el9_6.x86_64.rpm!Ukernel-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm"Ukernel-debug-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpmUkernel-doc-5.14.0-570.33.2.el9_6.noarch.rpm#Ukernel-devel-5.14.0-570.33.2.el9_6.x86_64.rpm%Uperf-5.14.0-570.33.2.el9_6.x86_64.rpm(Ukernel-headers-5.14.0-570.33.2.el9_6.x86_64.rpm *Urv-5.14.0-570.33.2.el9_6.x86_64.rpmMUpython3-perf-5.14.0-570.33.2.el9_6.x86_64.rpm$Ukernel-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpm)Urtla-5.14.0-570.33.2.el9_6.x86_64.rpm!Ukernel-debug-devel-5.14.0-570.33.2.el9_6.x86_64.rpm"Ukernel-debug-devel-matched-5.14.0-570.33.2.el9_6.x86_64.rpmUkernel-doc-5.14.0-570.33.2.el9_6.noarch.rpm#Ukernel-devel-5.14.0-570.33.2.el9_6.x86_64.rpm%Uperf-5.14.0-570.33.2.el9_6.x86_64.rpm(Ukernel-headers-5.14.0-570.33.2.el9_6.x86_64.rpm 7sBBsecurityImportant: toolbox security updateFhttps://access.redhat.com/errata/RHSA-2025:13673RHSA-2025:13673RHSA-2025:13673 https://access.redhat.com/security/cve/CVE-2025-23266CVE-2025-23266CVE-2025-23266https://bugzilla.redhat.com/23817942381794https://errata.almalinux.org/9/ALSA-2025-13673.htmlALSA-2025:13673ALSA-2025:13673 q4toolbox-0.2-1.el9_6.x86_64.rpmr4toolbox-tests-0.2-1.el9_6.x86_64.rpmq4toolbox-0.2-1.el9_6.x86_64.rpmr4toolbox-tests-0.2-1.el9_6.x86_64.rpmD xBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateWJhttps://access.redhat.com/errata/RHSA-2025:13782RHSA-2025:13782RHSA-2025:13782 https://access.redhat.com/security/cve/CVE-2025-31273CVE-2025-31273CVE-2025-31273https://access.redhat.com/security/cve/CVE-2025-31278CVE-2025-31278CVE-2025-31278https://access.redhat.com/security/cve/CVE-2025-43211CVE-2025-43211CVE-2025-43211https://access.redhat.com/security/cve/CVE-2025-43212CVE-2025-43212CVE-2025-43212https://access.redhat.com/security/cve/CVE-2025-43216CVE-2025-43216CVE-2025-43216https://access.redhat.com/security/cve/CVE-2025-43227CVE-2025-43227CVE-2025-43227https://access.redhat.com/security/cve/CVE-2025-43240CVE-2025-43240CVE-2025-43240https://access.redhat.com/security/cve/CVE-2025-43265CVE-2025-43265CVE-2025-43265https://access.redhat.com/security/cve/CVE-2025-6558CVE-2025-6558CVE-2025-6558https://bugzilla.redhat.com/23802542380254https://bugzilla.redhat.com/23843852384385https://bugzilla.redhat.com/23862682386268https://bugzilla.redhat.com/23862692386269https://bugzilla.redhat.com/23862702386270https://bugzilla.redhat.com/23862712386271https://bugzilla.redhat.com/23862732386273https://bugzilla.redhat.com/23862742386274https://bugzilla.redhat.com/23862762386276https://errata.almalinux.org/9/ALSA-2025-13782.htmlALSA-2025:13782ALSA-2025:13782 6#webkit2gtk3-jsc-devel-2.48.5-1.el9_6.x86_64.rpm5#webkit2gtk3-jsc-2.48.5-1.el9_6.x86_64.rpm6#webkit2gtk3-jsc-devel-2.48.5-1.el9_6.i686.rpm3#webkit2gtk3-2.48.5-1.el9_6.x86_64.rpm3#webkit2gtk3-2.48.5-1.el9_6.i686.rpm5#webkit2gtk3-jsc-2.48.5-1.el9_6.i686.rpm4#webkit2gtk3-devel-2.48.5-1.el9_6.x86_64.rpm4#webkit2gtk3-devel-2.48.5-1.el9_6.i686.rpm6#webkit2gtk3-jsc-devel-2.48.5-1.el9_6.x86_64.rpm5#webkit2gtk3-jsc-2.48.5-1.el9_6.x86_64.rpm6#webkit2gtk3-jsc-devel-2.48.5-1.el9_6.i686.rpm3#webkit2gtk3-2.48.5-1.el9_6.x86_64.rpm3#webkit2gtk3-2.48.5-1.el9_6.i686.rpm5#webkit2gtk3-jsc-2.48.5-1.el9_6.i686.rpm4#webkit2gtk3-devel-2.48.5-1.el9_6.x86_64.rpm4#webkit2gtk3-devel-2.48.5-1.el9_6.i686.rpmb EBBBBBBBBBBsecurityImportant: golang security update!]https://access.redhat.com/errata/RHSA-2025:13935RHSA-2025:13935RHSA-2025:13935 https://access.redhat.com/security/cve/CVE-2025-4674CVE-2025-4674CVE-2025-4674https://bugzilla.redhat.com/23843292384329https://errata.almalinux.org/9/ALSA-2025-13935.htmlALSA-2025:13935ALSA-2025:13935 Agolang-bin-1.24.6-1.el9_6.x86_64.rpm@golang-1.24.6-1.el9_6.x86_64.rpmogolang-tests-1.24.6-1.el9_6.noarch.rpmmgolang-misc-1.24.6-1.el9_6.noarch.rpmlgolang-docs-1.24.6-1.el9_6.noarch.rpmngolang-src-1.24.6-1.el9_6.noarch.rpm8golang-race-1.24.6-1.el9_6.x86_64.rpmEgo-toolset-1.24.6-1.el9_6.x86_64.rpmAgolang-bin-1.24.6-1.el9_6.x86_64.rpm@golang-1.24.6-1.el9_6.x86_64.rpmogolang-tests-1.24.6-1.el9_6.noarch.rpmmgolang-misc-1.24.6-1.el9_6.noarch.rpmlgolang-docs-1.24.6-1.el9_6.noarch.rpmngolang-src-1.24.6-1.el9_6.noarch.rpm8golang-race-1.24.6-1.el9_6.x86_64.rpmEgo-toolset-1.24.6-1.el9_6.x86_64.rpmŌY %RBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update~https://access.redhat.com/errata/RHSA-2025:13962RHSA-2025:13962RHSA-2025:13962 https://access.redhat.com/security/cve/CVE-2024-28956CVE-2024-28956CVE-2024-28956https://access.redhat.com/security/cve/CVE-2025-21867CVE-2025-21867CVE-2025-21867https://access.redhat.com/security/cve/CVE-2025-38084CVE-2025-38084CVE-2025-38084https://access.redhat.com/security/cve/CVE-2025-38085CVE-2025-38085CVE-2025-38085https://access.redhat.com/security/cve/CVE-2025-38124CVE-2025-38124CVE-2025-38124https://access.redhat.com/security/cve/CVE-2025-38159CVE-2025-38159CVE-2025-38159https://access.redhat.com/security/cve/CVE-2025-38250CVE-2025-38250CVE-2025-38250https://access.redhat.com/security/cve/CVE-2025-38380CVE-2025-38380CVE-2025-38380https://access.redhat.com/security/cve/CVE-2025-38471CVE-2025-38471CVE-2025-38471https://bugzilla.redhat.com/23553342355334https://bugzilla.redhat.com/23661252366125https://bugzilla.redhat.com/23753032375303https://bugzilla.redhat.com/23753042375304https://bugzilla.redhat.com/23760412376041https://bugzilla.redhat.com/23760642376064https://bugzilla.redhat.com/23789822378982https://bugzilla.redhat.com/23833812383381https://bugzilla.redhat.com/23838932383893https://errata.almalinux.org/9/ALSA-2025-13962.htmlALSA-2025:13962ALSA-2025:13962 %Vperf-5.14.0-570.35.1.el9_6.x86_64.rpm(Vkernel-headers-5.14.0-570.35.1.el9_6.x86_64.rpm#Vkernel-devel-5.14.0-570.35.1.el9_6.x86_64.rpmMVpython3-perf-5.14.0-570.35.1.el9_6.x86_64.rpm$Vkernel-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm)Vrtla-5.14.0-570.35.1.el9_6.x86_64.rpmVkernel-doc-5.14.0-570.35.1.el9_6.noarch.rpm!Vkernel-debug-devel-5.14.0-570.35.1.el9_6.x86_64.rpm*Vrv-5.14.0-570.35.1.el9_6.x86_64.rpm"Vkernel-debug-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm %Vperf-5.14.0-570.35.1.el9_6.x86_64.rpm(Vkernel-headers-5.14.0-570.35.1.el9_6.x86_64.rpm#Vkernel-devel-5.14.0-570.35.1.el9_6.x86_64.rpmMVpython3-perf-5.14.0-570.35.1.el9_6.x86_64.rpm$Vkernel-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpm)Vrtla-5.14.0-570.35.1.el9_6.x86_64.rpmVkernel-doc-5.14.0-570.35.1.el9_6.noarch.rpm!Vkernel-debug-devel-5.14.0-570.35.1.el9_6.x86_64.rpm*Vrv-5.14.0-570.35.1.el9_6.x86_64.rpm"Vkernel-debug-devel-matched-5.14.0-570.35.1.el9_6.x86_64.rpmŠ} *fBBsecurityModerate: xterm security update^https://access.redhat.com/errata/RHSA-2025:14075RHSA-2025:14075RHSA-2025:14075 https://access.redhat.com/security/cve/CVE-2022-24130CVE-2022-24130CVE-2022-24130https://bugzilla.redhat.com/20486762048676https://errata.almalinux.org/9/ALSA-2025-14075.htmlALSA-2025:14075ALSA-2025:14075 bxterm-366-12.el9_6.x86_64.rpmcxterm-resize-366-12.el9_6.x86_64.rpmbxterm-366-12.el9_6.x86_64.rpmcxterm-resize-366-12.el9_6.x86_64.rpmőI 0kBBBsecurityImportant: libarchive security updatem}https://access.redhat.com/errata/RHSA-2025:14130RHSA-2025:14130RHSA-2025:14130 https://access.redhat.com/security/cve/CVE-2025-5914CVE-2025-5914CVE-2025-5914https://bugzilla.redhat.com/23708612370861https://errata.almalinux.org/9/ALSA-2025-14130.htmlALSA-2025:14130ALSA-2025:14130 Hbsdtar-3.5.3-6.el9_6.x86_64.rpmLHlibarchive-devel-3.5.3-6.el9_6.i686.rpmLHlibarchive-devel-3.5.3-6.el9_6.x86_64.rpmHbsdtar-3.5.3-6.el9_6.x86_64.rpmLHlibarchive-devel-3.5.3-6.el9_6.i686.rpmLHlibarchive-devel-3.5.3-6.el9_6.x86_64.rpmŗl 9qBBBBBBsecurityImportant: tomcat security updatejNhttps://access.redhat.com/errata/RHSA-2025:14181RHSA-2025:14181RHSA-2025:14181 https://access.redhat.com/security/cve/CVE-2025-48976CVE-2025-48976CVE-2025-48976https://access.redhat.com/security/cve/CVE-2025-48988CVE-2025-48988CVE-2025-48988https://access.redhat.com/security/cve/CVE-2025-48989CVE-2025-48989CVE-2025-48989https://access.redhat.com/security/cve/CVE-2025-49125CVE-2025-49125CVE-2025-49125https://access.redhat.com/security/cve/CVE-2025-52434CVE-2025-52434CVE-2025-52434https://access.redhat.com/security/cve/CVE-2025-52520CVE-2025-52520CVE-2025-52520https://access.redhat.com/security/cve/CVE-2025-53506CVE-2025-53506CVE-2025-53506https://bugzilla.redhat.com/23730152373015https://bugzilla.redhat.com/23730182373018https://bugzilla.redhat.com/23730202373020https://bugzilla.redhat.com/23733092373309https://bugzilla.redhat.com/23793742379374https://bugzilla.redhat.com/23793822379382https://bugzilla.redhat.com/23793862379386https://errata.almalinux.org/9/ALSA-2025-14181.htmlALSA-2025:14181ALSA-2025:14181 k%tomcat-jsp-2.3-api-9.0.87-3.el9_6.3.noarch.rpmh%tomcat-admin-webapps-9.0.87-3.el9_6.3.noarch.rpmj%tomcat-el-3.0-api-9.0.87-3.el9_6.3.noarch.rpml%tomcat-lib-9.0.87-3.el9_6.3.noarch.rpmi%tomcat-docs-webapp-9.0.87-3.el9_6.3.noarch.rpmg%tomcat-9.0.87-3.el9_6.3.noarch.rpmm%tomcat-servlet-4.0-api-9.0.87-3.el9_6.3.noarch.rpmn%tomcat-webapps-9.0.87-3.el9_6.3.noarch.rpmk%tomcat-jsp-2.3-api-9.0.87-3.el9_6.3.noarch.rpmh%tomcat-admin-webapps-9.0.87-3.el9_6.3.noarch.rpmj%tomcat-el-3.0-api-9.0.87-3.el9_6.3.noarch.rpml%tomcat-lib-9.0.87-3.el9_6.3.noarch.rpmi%tomcat-docs-webapp-9.0.87-3.el9_6.3.noarch.rpmg%tomcat-9.0.87-3.el9_6.3.noarch.rpmm%tomcat-servlet-4.0-api-9.0.87-3.el9_6.3.noarch.rpmn%tomcat-webapps-9.0.87-3.el9_6.3.noarch.rpmš#  >zBBsecurityImportant: firefox security update8J https://access.redhat.com/errata/RHSA-2025:14416RHSA-2025:14416RHSA-2025:14416 https://access.redhat.com/security/cve/CVE-2025-9179CVE-2025-9179CVE-2025-9179https://access.redhat.com/security/cve/CVE-2025-9180CVE-2025-9180CVE-2025-9180https://access.redhat.com/security/cve/CVE-2025-9181CVE-2025-9181CVE-2025-9181https://access.redhat.com/security/cve/CVE-2025-9182CVE-2025-9182CVE-2025-9182https://access.redhat.com/security/cve/CVE-2025-9185CVE-2025-9185CVE-2025-9185https://bugzilla.redhat.com/23895752389575https://bugzilla.redhat.com/23895802389580https://bugzilla.redhat.com/23895812389581https://bugzilla.redhat.com/23895832389583https://bugzilla.redhat.com/23895842389584https://errata.almalinux.org/9/ALSA-2025-14416.htmlALSA-2025:14416ALSA-2025:14416 7Vfirefox-128.14.0-2.el9_6.alma.1.x86_64.rpmOVfirefox-x11-128.14.0-2.el9_6.alma.1.x86_64.rpm7Vfirefox-128.14.0-2.el9_6.alma.1.x86_64.rpmOVfirefox-x11-128.14.0-2.el9_6.alma.1.x86_64.rpmŻt  BBBBBBBBBBBBBBBBBsecurityImportant: kernel security update!https://access.redhat.com/errata/RHSA-2025:14420RHSA-2025:14420RHSA-2025:14420 https://access.redhat.com/security/cve/CVE-2025-22058CVE-2025-22058CVE-2025-22058https://access.redhat.com/security/cve/CVE-2025-37914CVE-2025-37914CVE-2025-37914https://access.redhat.com/security/cve/CVE-2025-38417CVE-2025-38417CVE-2025-38417https://bugzilla.redhat.com/23602762360276https://bugzilla.redhat.com/23675002367500https://bugzilla.redhat.com/23834632383463https://errata.almalinux.org/9/ALSA-2025-14420.htmlALSA-2025:14420ALSA-2025:14420 *Wrv-5.14.0-570.37.1.el9_6.x86_64.rpm"Wkernel-debug-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm#Wkernel-devel-5.14.0-570.37.1.el9_6.x86_64.rpm)Wrtla-5.14.0-570.37.1.el9_6.x86_64.rpm!Wkernel-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm(Wkernel-headers-5.14.0-570.37.1.el9_6.x86_64.rpm$Wkernel-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm%Wperf-5.14.0-570.37.1.el9_6.x86_64.rpmWkernel-doc-5.14.0-570.37.1.el9_6.noarch.rpmMWpython3-perf-5.14.0-570.37.1.el9_6.x86_64.rpm *Wrv-5.14.0-570.37.1.el9_6.x86_64.rpm"Wkernel-debug-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm#Wkernel-devel-5.14.0-570.37.1.el9_6.x86_64.rpm)Wrtla-5.14.0-570.37.1.el9_6.x86_64.rpm!Wkernel-debug-devel-5.14.0-570.37.1.el9_6.x86_64.rpm(Wkernel-headers-5.14.0-570.37.1.el9_6.x86_64.rpm$Wkernel-devel-matched-5.14.0-570.37.1.el9_6.x86_64.rpm%Wperf-5.14.0-570.37.1.el9_6.x86_64.rpmWkernel-doc-5.14.0-570.37.1.el9_6.noarch.rpmMWpython3-perf-5.14.0-570.37.1.el9_6.x86_64.rpmŻs  ZS|mBBBBBBBsecurityImportant: nodejs:20 security update#Khttps://access.redhat.com/errata/RHSA-2025:1443RHSA-2025:1443RHSA-2025:1443 https://access.redhat.com/security/cve/CVE-2025-22150CVE-2025-22150CVE-2025-22150https://access.redhat.com/security/cve/CVE-2025-23083CVE-2025-23083CVE-2025-23083https://access.redhat.com/security/cve/CVE-2025-23085CVE-2025-23085CVE-2025-23085https://bugzilla.redhat.com/23391762339176https://bugzilla.redhat.com/23393922339392https://bugzilla.redhat.com/23426182342618https://errata.almalinux.org/9/ALSA-2025-1443.htmlALSA-2025:1443ALSA-2025:1443 +2}'dnodejs-full-i18n-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm+nodejs-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpmk2nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpmWnodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm<nodejs-docs-20.18.2-1.module_el9.5.0+137+381f3eaf.noarch.rpmcenpm-10.8.2-1.20.18.2.1.module_el9.5.0+137+381f3eaf.x86_64.rpmenodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm!nodejs-devel-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm+2}'dnodejs-full-i18n-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm+nodejs-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpmk2nodejs-nodemon-3.0.1-1.module_el9.2.0+36+853e48f5.noarch.rpmWnodejs-packaging-2021.06-4.module_el9.3.0+88+29afeaa2.noarch.rpm<nodejs-docs-20.18.2-1.module_el9.5.0+137+381f3eaf.noarch.rpmcenpm-10.8.2-1.20.18.2.1.module_el9.5.0+137+381f3eaf.x86_64.rpmenodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm!nodejs-devel-20.18.2-1.module_el9.5.0+137+381f3eaf.x86_64.rpm4  &gBBuBBBBBBBsecurityModerate: nodejs:18 security updatenwhttps://access.redhat.com/errata/RHSA-2025:1446RHSA-2025:1446RHSA-2025:1446 https://access.redhat.com/security/cve/CVE-2025-22150CVE-2025-22150CVE-2025-22150https://access.redhat.com/security/cve/CVE-2025-23085CVE-2025-23085CVE-2025-23085https://bugzilla.redhat.com/23391762339176https://bugzilla.redhat.com/23426182342618https://errata.almalinux.org/9/ALSA-2025-1446.htmlALSA-2025:1446ALSA-2025:1446 +n'< nodejs-docs-18.20.6-1.module_el9.5.0+136+92f38f3c.noarch.rpmcdnpm-10.8.2-1.18.20.6.1.module_el9.5.0+136+92f38f3c.x86_64.rpm+ nodejs-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm! nodejs-devel-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpmkinodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpmd nodejs-full-i18n-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpmfnodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpmenodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpm+n'< nodejs-docs-18.20.6-1.module_el9.5.0+136+92f38f3c.noarch.rpmcdnpm-10.8.2-1.18.20.6.1.module_el9.5.0+136+92f38f3c.x86_64.rpm+ nodejs-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpm! nodejs-devel-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpmkinodejs-nodemon-3.0.1-1.module_el9.5.0+136+92f38f3c.noarch.rpmd nodejs-full-i18n-18.20.6-1.module_el9.5.0+136+92f38f3c.x86_64.rpmfnodejs-packaging-2021.06-4.module_el9.5.0+136+92f38f3c.noarch.rpmenodejs-packaging-bundler-2021.06-4.module_el9.5.0+124+df88fe49.noarch.rpmO  )gsecurityImportant: aide security updateedhttps://access.redhat.com/errata/RHSA-2025:14493RHSA-2025:14493RHSA-2025:14493 https://access.redhat.com/security/cve/CVE-2025-54389CVE-2025-54389CVE-2025-54389https://bugzilla.redhat.com/23880192388019https://errata.almalinux.org/9/ALSA-2025-14493.htmlALSA-2025:14493ALSA-2025:14493 zaide-0.16-103.el9_6.2.x86_64.rpmzaide-0.16-103.el9_6.2.x86_64.rpmŻT ,jsecurityImportant: thunderbird security updateI https://access.redhat.com/errata/RHSA-2025:14640RHSA-2025:14640RHSA-2025:14640 https://access.redhat.com/security/cve/CVE-2025-9179CVE-2025-9179CVE-2025-9179https://access.redhat.com/security/cve/CVE-2025-9180CVE-2025-9180CVE-2025-9180https://access.redhat.com/security/cve/CVE-2025-9181CVE-2025-9181CVE-2025-9181https://access.redhat.com/security/cve/CVE-2025-9182CVE-2025-9182CVE-2025-9182https://access.redhat.com/security/cve/CVE-2025-9185CVE-2025-9185CVE-2025-9185https://bugzilla.redhat.com/23895752389575https://bugzilla.redhat.com/23895802389580https://bugzilla.redhat.com/23895812389581https://bugzilla.redhat.com/23895832389583https://bugzilla.redhat.com/23895842389584https://errata.almalinux.org/9/ALSA-2025-14640.htmlALSA-2025:14640ALSA-2025:14640 9Dthunderbird-128.14.0-3.el9_6.alma.1.x86_64.rpm9Dthunderbird-128.14.0-3.el9_6.alma.1.x86_64.rpmb _BBBOBBB{BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security updatebNhttps://access.redhat.com/errata/RHSA-2025:14827RHSA-2025:14827RHSA-2025:14827 https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14827.htmlALSA-2025:14827ALSA-2025:14827 YA'5pgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpmypostgresql-pltcl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmypostgresql-private-libs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm9ypostgresql-upgrade-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm7ypostgresql-static-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmypostgresql-upgrade-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm3Epostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpmypostgresql-plperl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm2Bpgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpmypostgresql-plpython3-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm5ypostgresql-private-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmypostgresql-server-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm4ypostgresql-test-rpm-macros-16.10-1.module_el9.6.0+174+80cb77f0.noarch.rpm4ypostgresql-docs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm1=pg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpmypostgresql-contrib-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm8ypostgresql-test-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmYypostgresql-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm6ypostgresql-server-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmYA'5pgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpmypostgresql-pltcl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmypostgresql-private-libs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm9ypostgresql-upgrade-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm7ypostgresql-static-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmypostgresql-upgrade-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm3Epostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpmypostgresql-plperl-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm2Bpgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpmypostgresql-plpython3-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm5ypostgresql-private-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmypostgresql-server-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm4ypostgresql-test-rpm-macros-16.10-1.module_el9.6.0+174+80cb77f0.noarch.rpm4ypostgresql-docs-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm1=pg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpmypostgresql-contrib-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm8ypostgresql-test-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmYypostgresql-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpm6ypostgresql-server-devel-16.10-1.module_el9.6.0+174+80cb77f0.x86_64.rpmƈ; ([BBBWBWBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update0Nhttps://access.redhat.com/errata/RHSA-2025:14862RHSA-2025:14862RHSA-2025:14862 https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14862.htmlALSA-2025:14862ALSA-2025:14862 Y.'rpostgresql-private-libs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm1<pg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm4rpostgresql-docs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm2=pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm6rpostgresql-server-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmrpostgresql-upgrade-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmYrpostgresql-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm5rpostgresql-private-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm8rpostgresql-test-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm4rpostgresql-test-rpm-macros-15.14-1.module_el9.6.0+176+c508cfa2.noarch.rpmrpostgresql-contrib-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmrpostgresql-plpython3-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmrpostgresql-server-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmrpostgresql-plperl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmrpostgresql-pltcl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm7rpostgresql-static-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm9rpostgresql-upgrade-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmY.'rpostgresql-private-libs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm1<pg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm4rpostgresql-docs-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm2=pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm6rpostgresql-server-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmrpostgresql-upgrade-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmYrpostgresql-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm5rpostgresql-private-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm8rpostgresql-test-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm4rpostgresql-test-rpm-macros-15.14-1.module_el9.6.0+176+c508cfa2.noarch.rpmrpostgresql-contrib-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmrpostgresql-plpython3-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmrpostgresql-server-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmrpostgresql-plperl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmrpostgresql-pltcl-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm7rpostgresql-static-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpm9rpostgresql-upgrade-devel-15.14-1.module_el9.6.0+176+c508cfa2.x86_64.rpmۓ* 9iBBBBBBBBBBBBBBsecurityImportant: postgresql security update~Nhttps://access.redhat.com/errata/RHSA-2025:14878RHSA-2025:14878RHSA-2025:14878 https://access.redhat.com/security/cve/CVE-2025-8714CVE-2025-8714CVE-2025-8714https://access.redhat.com/security/cve/CVE-2025-8715CVE-2025-8715CVE-2025-8715https://bugzilla.redhat.com/23885512388551https://bugzilla.redhat.com/23885532388553https://errata.almalinux.org/9/ALSA-2025-14878.htmlALSA-2025:14878ALSA-2025:14878 postgresql-plpython3-13.22-1.el9_6.x86_64.rpmpostgresql-upgrade-13.22-1.el9_6.x86_64.rpmpostgresql-server-13.22-1.el9_6.x86_64.rpmpostgresql-pltcl-13.22-1.el9_6.x86_64.rpmpostgresql-plperl-13.22-1.el9_6.x86_64.rpmpostgresql-private-libs-13.22-1.el9_6.x86_64.rpmpostgresql-contrib-13.22-1.el9_6.x86_64.rpmYpostgresql-13.22-1.el9_6.x86_64.rpmpostgresql-plpython3-13.22-1.el9_6.x86_64.rpmpostgresql-upgrade-13.22-1.el9_6.x86_64.rpmpostgresql-server-13.22-1.el9_6.x86_64.rpmpostgresql-pltcl-13.22-1.el9_6.x86_64.rpmpostgresql-plperl-13.22-1.el9_6.x86_64.rpmpostgresql-private-libs-13.22-1.el9_6.x86_64.rpmpostgresql-contrib-13.22-1.el9_6.x86_64.rpmYpostgresql-13.22-1.el9_6.x86_64.rpmŚg kBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateE https://access.redhat.com/errata/RHSA-2025:16398RHSA-2025:16398RHSA-2025:16398 https://access.redhat.com/security/cve/CVE-2023-53125CVE-2023-53125CVE-2023-53125https://access.redhat.com/security/cve/CVE-2025-37810CVE-2025-37810CVE-2025-37810https://access.redhat.com/security/cve/CVE-2025-38498CVE-2025-38498CVE-2025-38498https://access.redhat.com/security/cve/CVE-2025-39694CVE-2025-39694CVE-2025-39694https://bugzilla.redhat.com/23636862363686https://bugzilla.redhat.com/23650282365028https://bugzilla.redhat.com/23844222384422https://bugzilla.redhat.com/23935342393534https://errata.almalinux.org/9/ALSA-2025-16398.htmlALSA-2025:16398ALSA-2025:16398 $\kernel-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm)\rtla-5.14.0-570.46.1.el9_6.x86_64.rpm#\kernel-devel-5.14.0-570.46.1.el9_6.x86_64.rpm%\perf-5.14.0-570.46.1.el9_6.x86_64.rpm(\kernel-headers-5.14.0-570.46.1.el9_6.x86_64.rpm\kernel-doc-5.14.0-570.46.1.el9_6.noarch.rpm"\kernel-debug-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpmM\python3-perf-5.14.0-570.46.1.el9_6.x86_64.rpm!\kernel-debug-devel-5.14.0-570.46.1.el9_6.x86_64.rpm*\rv-5.14.0-570.46.1.el9_6.x86_64.rpm $\kernel-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpm)\rtla-5.14.0-570.46.1.el9_6.x86_64.rpm#\kernel-devel-5.14.0-570.46.1.el9_6.x86_64.rpm%\perf-5.14.0-570.46.1.el9_6.x86_64.rpm(\kernel-headers-5.14.0-570.46.1.el9_6.x86_64.rpm\kernel-doc-5.14.0-570.46.1.el9_6.noarch.rpm"\kernel-debug-devel-matched-5.14.0-570.46.1.el9_6.x86_64.rpmM\python3-perf-5.14.0-570.46.1.el9_6.x86_64.rpm!\kernel-debug-devel-5.14.0-570.46.1.el9_6.x86_64.rpm*\rv-5.14.0-570.46.1.el9_6.x86_64.rpmm( BBBBBBBBBBBBBBBsecurityModerate: kernel security updateLhttps://access.redhat.com/errata/RHSA-2025:1659RHSA-2025:1659RHSA-2025:1659 https://access.redhat.com/security/cve/CVE-2023-52490CVE-2023-52490CVE-2023-52490https://bugzilla.redhat.com/22691872269187https://errata.almalinux.org/9/ALSA-2025-1659.htmlALSA-2025:1659ALSA-2025:1659 !Nkernel-debug-devel-5.14.0-503.26.1.el9_5.x86_64.rpm#Nkernel-devel-5.14.0-503.26.1.el9_5.x86_64.rpmNkernel-doc-5.14.0-503.26.1.el9_5.noarch.rpm%Nperf-5.14.0-503.26.1.el9_5.x86_64.rpm*Nrv-5.14.0-503.26.1.el9_5.x86_64.rpm"Nkernel-debug-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm)Nrtla-5.14.0-503.26.1.el9_5.x86_64.rpm$Nkernel-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm(Nkernel-headers-5.14.0-503.26.1.el9_5.x86_64.rpm !Nkernel-debug-devel-5.14.0-503.26.1.el9_5.x86_64.rpm#Nkernel-devel-5.14.0-503.26.1.el9_5.x86_64.rpmNkernel-doc-5.14.0-503.26.1.el9_5.noarch.rpm%Nperf-5.14.0-503.26.1.el9_5.x86_64.rpm*Nrv-5.14.0-503.26.1.el9_5.x86_64.rpm"Nkernel-debug-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm)Nrtla-5.14.0-503.26.1.el9_5.x86_64.rpm$Nkernel-devel-matched-5.14.0-503.26.1.el9_5.x86_64.rpm(Nkernel-headers-5.14.0-503.26.1.el9_5.x86_64.rpm@) QBBBBBBBBsecurityImportant: bind9.18 security update]rhttps://access.redhat.com/errata/RHSA-2025:1670RHSA-2025:1670RHSA-2025:1670 https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://access.redhat.com/security/cve/CVE-2024-12705CVE-2024-12705CVE-2024-12705https://bugzilla.redhat.com/23428792342879https://bugzilla.redhat.com/23428802342880https://errata.almalinux.org/9/ALSA-2025-1670.htmlALSA-2025:1670ALSA-2025:1670 Vbind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpmVbind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm Vbind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpmVbind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm Vbind9.18-9.18.29-1.el9_5.1.x86_64.rpmVbind9.18-dnssec-utils-9.18.29-1.el9_5.1.x86_64.rpmVbind9.18-utils-9.18.29-1.el9_5.1.x86_64.rpm Vbind9.18-chroot-9.18.29-1.el9_5.1.x86_64.rpmVbind9.18-libs-9.18.29-1.el9_5.1.x86_64.rpm Vbind9.18-9.18.29-1.el9_5.1.x86_64.rpm/* $\BBBBBBsecurityImportant: mysql security updateO*dhttps://access.redhat.com/errata/RHSA-2025:1671RHSA-2025:1671RHSA-2025:1671 https://access.redhat.com/security/cve/CVE-2024-11053CVE-2024-11053CVE-2024-11053https://access.redhat.com/security/cve/CVE-2024-21193CVE-2024-21193CVE-2024-21193https://access.redhat.com/security/cve/CVE-2024-21194CVE-2024-21194CVE-2024-21194https://access.redhat.com/security/cve/CVE-2024-21196CVE-2024-21196CVE-2024-21196https://access.redhat.com/security/cve/CVE-2024-21197CVE-2024-21197CVE-2024-21197https://access.redhat.com/security/cve/CVE-2024-21198CVE-2024-21198CVE-2024-21198https://access.redhat.com/security/cve/CVE-2024-21199CVE-2024-21199CVE-2024-21199https://access.redhat.com/security/cve/CVE-2024-21201CVE-2024-21201CVE-2024-21201https://access.redhat.com/security/cve/CVE-2024-21203CVE-2024-21203CVE-2024-21203https://access.redhat.com/security/cve/CVE-2024-21212CVE-2024-21212CVE-2024-21212https://access.redhat.com/security/cve/CVE-2024-21213CVE-2024-21213CVE-2024-21213https://access.redhat.com/security/cve/CVE-2024-21218CVE-2024-21218CVE-2024-21218https://access.redhat.com/security/cve/CVE-2024-21219CVE-2024-21219CVE-2024-21219https://access.redhat.com/security/cve/CVE-2024-21230CVE-2024-21230CVE-2024-21230https://access.redhat.com/security/cve/CVE-2024-21231CVE-2024-21231CVE-2024-21231https://access.redhat.com/security/cve/CVE-2024-21236CVE-2024-21236CVE-2024-21236https://access.redhat.com/security/cve/CVE-2024-21237CVE-2024-21237CVE-2024-21237https://access.redhat.com/security/cve/CVE-2024-21238CVE-2024-21238CVE-2024-21238https://access.redhat.com/security/cve/CVE-2024-21239CVE-2024-21239CVE-2024-21239https://access.redhat.com/security/cve/CVE-2024-21241CVE-2024-21241CVE-2024-21241https://access.redhat.com/security/cve/CVE-2024-21247CVE-2024-21247CVE-2024-21247https://access.redhat.com/security/cve/CVE-2024-37371CVE-2024-37371CVE-2024-37371https://access.redhat.com/security/cve/CVE-2024-5535CVE-2024-5535CVE-2024-5535https://access.redhat.com/security/cve/CVE-2024-7264CVE-2024-7264CVE-2024-7264https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-21491CVE-2025-21491CVE-2025-21491https://access.redhat.com/security/cve/CVE-2025-21494CVE-2025-21494CVE-2025-21494https://access.redhat.com/security/cve/CVE-2025-21497CVE-2025-21497CVE-2025-21497https://access.redhat.com/security/cve/CVE-2025-21500CVE-2025-21500CVE-2025-21500https://access.redhat.com/security/cve/CVE-2025-21501CVE-2025-21501CVE-2025-21501https://access.redhat.com/security/cve/CVE-2025-21503CVE-2025-21503CVE-2025-21503https://access.redhat.com/security/cve/CVE-2025-21504CVE-2025-21504CVE-2025-21504https://access.redhat.com/security/cve/CVE-2025-21505CVE-2025-21505CVE-2025-21505https://access.redhat.com/security/cve/CVE-2025-21518CVE-2025-21518CVE-2025-21518https://access.redhat.com/security/cve/CVE-2025-21519CVE-2025-21519CVE-2025-21519https://access.redhat.com/security/cve/CVE-2025-21520CVE-2025-21520CVE-2025-21520https://access.redhat.com/security/cve/CVE-2025-21521CVE-2025-21521CVE-2025-21521https://access.redhat.com/security/cve/CVE-2025-21522CVE-2025-21522CVE-2025-21522https://access.redhat.com/security/cve/CVE-2025-21523CVE-2025-21523CVE-2025-21523https://access.redhat.com/security/cve/CVE-2025-21525CVE-2025-21525CVE-2025-21525https://access.redhat.com/security/cve/CVE-2025-21529CVE-2025-21529CVE-2025-21529https://access.redhat.com/security/cve/CVE-2025-21531CVE-2025-21531CVE-2025-21531https://access.redhat.com/security/cve/CVE-2025-21534CVE-2025-21534CVE-2025-21534https://access.redhat.com/security/cve/CVE-2025-21536CVE-2025-21536CVE-2025-21536https://access.redhat.com/security/cve/CVE-2025-21540CVE-2025-21540CVE-2025-21540https://access.redhat.com/security/cve/CVE-2025-21543CVE-2025-21543CVE-2025-21543https://access.redhat.com/security/cve/CVE-2025-21546CVE-2025-21546CVE-2025-21546https://access.redhat.com/security/cve/CVE-2025-21555CVE-2025-21555CVE-2025-21555https://access.redhat.com/security/cve/CVE-2025-21559CVE-2025-21559CVE-2025-21559https://bugzilla.redhat.com/22945812294581https://bugzilla.redhat.com/22946762294676https://bugzilla.redhat.com/23018882301888https://bugzilla.redhat.com/23188572318857https://bugzilla.redhat.com/23188582318858https://bugzilla.redhat.com/23188702318870https://bugzilla.redhat.com/23188732318873https://bugzilla.redhat.com/23188742318874https://bugzilla.redhat.com/23188762318876https://bugzilla.redhat.com/23188822318882https://bugzilla.redhat.com/23188832318883https://bugzilla.redhat.com/23188842318884https://bugzilla.redhat.com/23188852318885https://bugzilla.redhat.com/23188862318886https://bugzilla.redhat.com/23188972318897https://bugzilla.redhat.com/23189002318900https://bugzilla.redhat.com/23189052318905https://bugzilla.redhat.com/23189142318914https://bugzilla.redhat.com/23189222318922https://bugzilla.redhat.com/23189232318923https://bugzilla.redhat.com/23189252318925https://bugzilla.redhat.com/23189262318926https://bugzilla.redhat.com/23189272318927https://bugzilla.redhat.com/23311912331191https://bugzilla.redhat.com/23392182339218https://bugzilla.redhat.com/23392202339220https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23392262339226https://bugzilla.redhat.com/23392312339231https://bugzilla.redhat.com/23392362339236https://bugzilla.redhat.com/23392382339238https://bugzilla.redhat.com/23392432339243https://bugzilla.redhat.com/23392472339247https://bugzilla.redhat.com/23392522339252https://bugzilla.redhat.com/23392592339259https://bugzilla.redhat.com/23392662339266https://bugzilla.redhat.com/23392702339270https://bugzilla.redhat.com/23392712339271https://bugzilla.redhat.com/23392752339275https://bugzilla.redhat.com/23392772339277https://bugzilla.redhat.com/23392812339281https://bugzilla.redhat.com/23392842339284https://bugzilla.redhat.com/23392912339291https://bugzilla.redhat.com/23392932339293https://bugzilla.redhat.com/23392952339295https://bugzilla.redhat.com/23392992339299https://bugzilla.redhat.com/23393002339300https://bugzilla.redhat.com/23393042339304https://bugzilla.redhat.com/23393052339305https://errata.almalinux.org/9/ALSA-2025-1671.htmlALSA-2025:1671ALSA-2025:1671 <=mysql-server-8.0.41-2.el9_5.x86_64.rpm=mysql-common-8.0.41-2.el9_5.x86_64.rpm=mysql-errmsg-8.0.41-2.el9_5.x86_64.rpm9=mysql-8.0.41-2.el9_5.x86_64.rpm<=mysql-server-8.0.41-2.el9_5.x86_64.rpm=mysql-common-8.0.41-2.el9_5.x86_64.rpm=mysql-errmsg-8.0.41-2.el9_5.x86_64.rpm9=mysql-8.0.41-2.el9_5.x86_64.rpm݄d+ 2eBBBBBBBBBBBsecurityImportant: bind security updateyXhttps://access.redhat.com/errata/RHSA-2025:1681RHSA-2025:1681RHSA-2025:1681 https://access.redhat.com/security/cve/CVE-2024-11187CVE-2024-11187CVE-2024-11187https://bugzilla.redhat.com/23428792342879https://errata.almalinux.org/9/ALSA-2025-1681.htmlALSA-2025:1681ALSA-2025:1681 Gxbind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpmxpython3-bind-9.16.23-24.el9_5.3.noarch.rpmxbind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpmxbind-license-9.16.23-24.el9_5.3.noarch.rpmHxbind-libs-9.16.23-24.el9_5.3.x86_64.rpmExbind-9.16.23-24.el9_5.3.x86_64.rpmIxbind-utils-9.16.23-24.el9_5.3.x86_64.rpmFxbind-chroot-9.16.23-24.el9_5.3.x86_64.rpmGxbind-dnssec-utils-9.16.23-24.el9_5.3.x86_64.rpmxpython3-bind-9.16.23-24.el9_5.3.noarch.rpmxbind-dnssec-doc-9.16.23-24.el9_5.3.noarch.rpmxbind-license-9.16.23-24.el9_5.3.noarch.rpmHxbind-libs-9.16.23-24.el9_5.3.x86_64.rpmExbind-9.16.23-24.el9_5.3.x86_64.rpmIxbind-utils-9.16.23-24.el9_5.3.x86_64.rpmFxbind-chroot-9.16.23-24.el9_5.3.x86_64.rpmܴ , sBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateQi https://access.redhat.com/errata/RHSA-2025:16880RHSA-2025:16880RHSA-2025:16880 https://access.redhat.com/security/cve/CVE-2025-38472CVE-2025-38472CVE-2025-38472https://access.redhat.com/security/cve/CVE-2025-38527CVE-2025-38527CVE-2025-38527https://access.redhat.com/security/cve/CVE-2025-38718CVE-2025-38718CVE-2025-38718https://access.redhat.com/security/cve/CVE-2025-39682CVE-2025-39682CVE-2025-39682https://access.redhat.com/security/cve/CVE-2025-39698CVE-2025-39698CVE-2025-39698https://bugzilla.redhat.com/23839162383916https://bugzilla.redhat.com/23889282388928https://bugzilla.redhat.com/23931662393166https://bugzilla.redhat.com/23935112393511https://bugzilla.redhat.com/23935192393519https://errata.almalinux.org/9/ALSA-2025-16880.htmlALSA-2025:16880ALSA-2025:16880 %]perf-5.14.0-570.49.1.el9_6.x86_64.rpm"]kernel-debug-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpmM]python3-perf-5.14.0-570.49.1.el9_6.x86_64.rpm*]rv-5.14.0-570.49.1.el9_6.x86_64.rpm(]kernel-headers-5.14.0-570.49.1.el9_6.x86_64.rpm#]kernel-devel-5.14.0-570.49.1.el9_6.x86_64.rpm!]kernel-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm$]kernel-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpm]kernel-doc-5.14.0-570.49.1.el9_6.noarch.rpm)]rtla-5.14.0-570.49.1.el9_6.x86_64.rpm %]perf-5.14.0-570.49.1.el9_6.x86_64.rpm"]kernel-debug-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpmM]python3-perf-5.14.0-570.49.1.el9_6.x86_64.rpm*]rv-5.14.0-570.49.1.el9_6.x86_64.rpm(]kernel-headers-5.14.0-570.49.1.el9_6.x86_64.rpm#]kernel-devel-5.14.0-570.49.1.el9_6.x86_64.rpm!]kernel-debug-devel-5.14.0-570.49.1.el9_6.x86_64.rpm$]kernel-devel-matched-5.14.0-570.49.1.el9_6.x86_64.rpm]kernel-doc-5.14.0-570.49.1.el9_6.noarch.rpm)]rtla-5.14.0-570.49.1.el9_6.x86_64.rpm-- GBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security update:ghttps://access.redhat.com/errata/RHSA-2025:17084RHSA-2025:17084RHSA-2025:17084 https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-17084.htmlALSA-2025:17084ALSA-2025:17084 Fipa-server-4.12.2-14.el9_6.5.x86_64.rpmMpython3-ipaclient-4.12.2-14.el9_6.5.noarch.rpmMipa-server-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpmOpython3-ipaserver-4.12.2-14.el9_6.5.noarch.rpmJipa-server-common-4.12.2-14.el9_6.5.noarch.rpmGipa-server-trust-ad-4.12.2-14.el9_6.5.x86_64.rpmxipa-selinux-luna-4.12.2-14.el9_6.5.noarch.rpmNpython3-ipalib-4.12.2-14.el9_6.5.noarch.rpmyipa-selinux-nfast-4.12.2-14.el9_6.5.noarch.rpmKipa-server-dns-4.12.2-14.el9_6.5.noarch.rpmGipa-client-common-4.12.2-14.el9_6.5.noarch.rpmDipa-client-epn-4.12.2-14.el9_6.5.x86_64.rpmLipa-client-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpmHipa-common-4.12.2-14.el9_6.5.noarch.rpmIipa-selinux-4.12.2-14.el9_6.5.noarch.rpmCipa-client-4.12.2-14.el9_6.5.x86_64.rpmEipa-client-samba-4.12.2-14.el9_6.5.x86_64.rpmFipa-server-4.12.2-14.el9_6.5.x86_64.rpmMpython3-ipaclient-4.12.2-14.el9_6.5.noarch.rpmMipa-server-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpmOpython3-ipaserver-4.12.2-14.el9_6.5.noarch.rpmJipa-server-common-4.12.2-14.el9_6.5.noarch.rpmGipa-server-trust-ad-4.12.2-14.el9_6.5.x86_64.rpmxipa-selinux-luna-4.12.2-14.el9_6.5.noarch.rpmNpython3-ipalib-4.12.2-14.el9_6.5.noarch.rpmyipa-selinux-nfast-4.12.2-14.el9_6.5.noarch.rpmKipa-server-dns-4.12.2-14.el9_6.5.noarch.rpmGipa-client-common-4.12.2-14.el9_6.5.noarch.rpmDipa-client-epn-4.12.2-14.el9_6.5.x86_64.rpmLipa-client-encrypted-dns-4.12.2-14.el9_6.5.x86_64.rpmHipa-common-4.12.2-14.el9_6.5.noarch.rpmIipa-selinux-4.12.2-14.el9_6.5.noarch.rpmCipa-client-4.12.2-14.el9_6.5.x86_64.rpmEipa-client-samba-4.12.2-14.el9_6.5.x86_64.rpm. 3`BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update!Fhttps://access.redhat.com/errata/RHSA-2025:17377RHSA-2025:17377RHSA-2025:17377 https://access.redhat.com/security/cve/CVE-2024-50301CVE-2024-50301CVE-2024-50301https://access.redhat.com/security/cve/CVE-2025-38351CVE-2025-38351CVE-2025-38351https://access.redhat.com/security/cve/CVE-2025-39761CVE-2025-39761CVE-2025-39761https://bugzilla.redhat.com/23271882327188https://bugzilla.redhat.com/23820592382059https://bugzilla.redhat.com/23946062394606https://errata.almalinux.org/9/ALSA-2025-17377.htmlALSA-2025:17377ALSA-2025:17377 ^kernel-doc-5.14.0-570.51.1.el9_6.noarch.rpm$^kernel-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm(^kernel-headers-5.14.0-570.51.1.el9_6.x86_64.rpm)^rtla-5.14.0-570.51.1.el9_6.x86_64.rpm#^kernel-devel-5.14.0-570.51.1.el9_6.x86_64.rpm"^kernel-debug-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpmM^python3-perf-5.14.0-570.51.1.el9_6.x86_64.rpm!^kernel-debug-devel-5.14.0-570.51.1.el9_6.x86_64.rpm*^rv-5.14.0-570.51.1.el9_6.x86_64.rpm%^perf-5.14.0-570.51.1.el9_6.x86_64.rpm ^kernel-doc-5.14.0-570.51.1.el9_6.noarch.rpm$^kernel-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpm(^kernel-headers-5.14.0-570.51.1.el9_6.x86_64.rpm)^rtla-5.14.0-570.51.1.el9_6.x86_64.rpm#^kernel-devel-5.14.0-570.51.1.el9_6.x86_64.rpm"^kernel-debug-devel-matched-5.14.0-570.51.1.el9_6.x86_64.rpmM^python3-perf-5.14.0-570.51.1.el9_6.x86_64.rpm!^kernel-debug-devel-5.14.0-570.51.1.el9_6.x86_64.rpm*^rv-5.14.0-570.51.1.el9_6.x86_64.rpm%^perf-5.14.0-570.51.1.el9_6.x86_64.rpmǝN/ :tBBBBsecurityImportant: libpq security updategRhttps://access.redhat.com/errata/RHSA-2025:1738RHSA-2025:1738RHSA-2025:1738 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1738.htmlALSA-2025:1738ALSA-2025:1738 +libpq-devel-13.20-1.el9_5.x86_64.rpm+libpq-13.20-1.el9_5.x86_64.rpm+libpq-devel-13.20-1.el9_5.i686.rpm+libpq-13.20-1.el9_5.i686.rpm+libpq-devel-13.20-1.el9_5.x86_64.rpm+libpq-13.20-1.el9_5.x86_64.rpm+libpq-devel-13.20-1.el9_5.i686.rpm+libpq-13.20-1.el9_5.i686.rpm;0 [BBB|BbBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update9'https://access.redhat.com/errata/RHSA-2025:1741RHSA-2025:1741RHSA-2025:1741 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1741.htmlALSA-2025:1741ALSA-2025:1741 Y.~'qpostgresql-contrib-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmqpostgresql-plpython3-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm2=pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm7qpostgresql-static-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm8qpostgresql-test-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmqpostgresql-server-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm4qpostgresql-test-rpm-macros-15.12-1.module_el9.5.0+140+e3f03d9d.noarch.rpm9qpostgresql-upgrade-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm6qpostgresql-server-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmqpostgresql-pltcl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm1\pg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm5qpostgresql-private-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmqpostgresql-plperl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmqpostgresql-upgrade-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmYqpostgresql-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm4qpostgresql-docs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmqpostgresql-private-libs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmY.~'qpostgresql-contrib-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmqpostgresql-plpython3-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm2=pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm7qpostgresql-static-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm8qpostgresql-test-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmqpostgresql-server-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm4qpostgresql-test-rpm-macros-15.12-1.module_el9.5.0+140+e3f03d9d.noarch.rpm9qpostgresql-upgrade-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm6qpostgresql-server-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmqpostgresql-pltcl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm1\pg_repack-1.4.8-2.module_el9.5.0+120+4533eb20.x86_64.rpm5qpostgresql-private-devel-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmqpostgresql-plperl-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmqpostgresql-upgrade-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmYqpostgresql-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm4qpostgresql-docs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpmqpostgresql-private-libs-15.12-1.module_el9.5.0+140+e3f03d9d.x86_64.rpm1 )YBBBBBBBBBBBBBBsecurityImportant: postgresql security update`'https://access.redhat.com/errata/RHSA-2025:1742RHSA-2025:1742RHSA-2025:1742 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1742.htmlALSA-2025:1742ALSA-2025:1742 +postgresql-server-13.20-1.el9_5.x86_64.rpm+postgresql-pltcl-13.20-1.el9_5.x86_64.rpmY+postgresql-13.20-1.el9_5.x86_64.rpm+postgresql-private-libs-13.20-1.el9_5.x86_64.rpm+postgresql-upgrade-13.20-1.el9_5.x86_64.rpm+postgresql-plpython3-13.20-1.el9_5.x86_64.rpm+postgresql-plperl-13.20-1.el9_5.x86_64.rpm+postgresql-contrib-13.20-1.el9_5.x86_64.rpm+postgresql-server-13.20-1.el9_5.x86_64.rpm+postgresql-pltcl-13.20-1.el9_5.x86_64.rpmY+postgresql-13.20-1.el9_5.x86_64.rpm+postgresql-private-libs-13.20-1.el9_5.x86_64.rpm+postgresql-upgrade-13.20-1.el9_5.x86_64.rpm+postgresql-plpython3-13.20-1.el9_5.x86_64.rpm+postgresql-plperl-13.20-1.el9_5.x86_64.rpm+postgresql-contrib-13.20-1.el9_5.x86_64.rpms2 4jBBBBBBBBsecurityImportant: open-vm-tools security updatehttps://access.redhat.com/errata/RHSA-2025:17428RHSA-2025:17428RHSA-2025:17428 https://access.redhat.com/security/cve/CVE-2025-41244CVE-2025-41244CVE-2025-41244https://bugzilla.redhat.com/23977522397752https://errata.almalinux.org/9/ALSA-2025-17428.htmlALSA-2025:17428ALSA-2025:17428 +Topen-vm-tools-salt-minion-12.5.0-1.el9_6.2.x86_64.rpmjTopen-vm-tools-desktop-12.5.0-1.el9_6.2.x86_64.rpmkTopen-vm-tools-sdmp-12.5.0-1.el9_6.2.x86_64.rpmlTopen-vm-tools-test-12.5.0-1.el9_6.2.x86_64.rpmiTopen-vm-tools-12.5.0-1.el9_6.2.x86_64.rpm+Topen-vm-tools-salt-minion-12.5.0-1.el9_6.2.x86_64.rpmjTopen-vm-tools-desktop-12.5.0-1.el9_6.2.x86_64.rpmkTopen-vm-tools-sdmp-12.5.0-1.el9_6.2.x86_64.rpmlTopen-vm-tools-test-12.5.0-1.el9_6.2.x86_64.rpmiTopen-vm-tools-12.5.0-1.el9_6.2.x86_64.rpmDz3 _BBBzBBBXBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update 'https://access.redhat.com/errata/RHSA-2025:1743RHSA-2025:1743RHSA-2025:1743 https://access.redhat.com/security/cve/CVE-2025-1094CVE-2025-1094CVE-2025-1094https://bugzilla.redhat.com/23455482345548https://errata.almalinux.org/9/ALSA-2025-1743.htmlALSA-2025:1743ALSA-2025:1743 YAx'4}postgresql-docs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm1]pg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm5}postgresql-private-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm3Epostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm2Bpgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm9}postgresql-upgrade-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm}postgresql-server-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm6}postgresql-server-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm}postgresql-plperl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm7}postgresql-static-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm}postgresql-upgrade-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm}postgresql-plpython3-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm}postgresql-contrib-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm8}postgresql-test-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmRpgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm}postgresql-private-libs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmY}postgresql-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm4}postgresql-test-rpm-macros-16.8-1.module_el9.5.0+141+f4b0f9b7.noarch.rpm}postgresql-pltcl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmYAx'4}postgresql-docs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm1]pg_repack-1.5.1-1.module_el9.5.0+127+50ff03a9.x86_64.rpm5}postgresql-private-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm3Epostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm2Bpgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm9}postgresql-upgrade-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm}postgresql-server-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm6}postgresql-server-devel-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm}postgresql-plperl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm7}postgresql-static-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm}postgresql-upgrade-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm}postgresql-plpython3-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm}postgresql-contrib-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm8}postgresql-test-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmRpgvector-0.6.2-1.module_el9.5.0+120+4533eb20.x86_64.rpm}postgresql-private-libs-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmY}postgresql-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpm4}postgresql-test-rpm-macros-16.8-1.module_el9.5.0+141+f4b0f9b7.noarch.rpm}postgresql-pltcl-16.8-1.module_el9.5.0+141+f4b0f9b7.x86_64.rpmW4 SsecurityModerate: iputils security update2ghttps://access.redhat.com/errata/RHSA-2025:17558RHSA-2025:17558RHSA-2025:17558 https://access.redhat.com/security/cve/CVE-2025-48964CVE-2025-48964CVE-2025-48964https://bugzilla.redhat.com/23826572382657https://errata.almalinux.org/9/ALSA-2025-17558.htmlALSA-2025:17558ALSA-2025:17558 )iputils-ninfod-20210202-11.el9_6.3.x86_64.rpm)iputils-ninfod-20210202-11.el9_6.3.x86_64.rpmDz^5 VBBBBsecurityModerate: vim security updatezhttps://access.redhat.com/errata/RHSA-2025:17742RHSA-2025:17742RHSA-2025:17742 https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-17742.htmlALSA-2025:17742ALSA-2025:17742 f\vim-X11-8.2.2637-22.el9_6.1.x86_64.rpmh\vim-enhanced-8.2.2637-22.el9_6.1.x86_64.rpmg\vim-common-8.2.2637-22.el9_6.1.x86_64.rpmf\vim-X11-8.2.2637-22.el9_6.1.x86_64.rpmh\vim-enhanced-8.2.2637-22.el9_6.1.x86_64.rpmg\vim-common-8.2.2637-22.el9_6.1.x86_64.rpmǹ 6 0]BBBBBBBBBBBBBBBBBsecurityModerate: kernel security updated https://access.redhat.com/errata/RHSA-2025:17760RHSA-2025:17760RHSA-2025:17760 https://access.redhat.com/security/cve/CVE-2023-53373CVE-2023-53373CVE-2023-53373https://access.redhat.com/security/cve/CVE-2025-38556CVE-2025-38556CVE-2025-38556https://access.redhat.com/security/cve/CVE-2025-38614CVE-2025-38614CVE-2025-38614https://access.redhat.com/security/cve/CVE-2025-39757CVE-2025-39757CVE-2025-39757https://bugzilla.redhat.com/23894562389456https://bugzilla.redhat.com/23894912389491https://bugzilla.redhat.com/23946152394615https://bugzilla.redhat.com/23963792396379https://errata.almalinux.org/9/ALSA-2025-17760.htmlALSA-2025:17760ALSA-2025:17760 )_rtla-5.14.0-570.52.1.el9_6.x86_64.rpm_kernel-doc-5.14.0-570.52.1.el9_6.noarch.rpmM_python3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm#_kernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm%_perf-5.14.0-570.52.1.el9_6.x86_64.rpm!_kernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm"_kernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm*_rv-5.14.0-570.52.1.el9_6.x86_64.rpm$_kernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm(_kernel-headers-5.14.0-570.52.1.el9_6.x86_64.rpm )_rtla-5.14.0-570.52.1.el9_6.x86_64.rpm_kernel-doc-5.14.0-570.52.1.el9_6.noarch.rpmM_python3-perf-5.14.0-570.52.1.el9_6.x86_64.rpm#_kernel-devel-5.14.0-570.52.1.el9_6.x86_64.rpm%_perf-5.14.0-570.52.1.el9_6.x86_64.rpm!_kernel-debug-devel-5.14.0-570.52.1.el9_6.x86_64.rpm"_kernel-debug-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm*_rv-5.14.0-570.52.1.el9_6.x86_64.rpm$_kernel-devel-matched-5.14.0-570.52.1.el9_6.x86_64.rpm(_kernel-headers-5.14.0-570.52.1.el9_6.x86_64.rpm¿.7 =qBBBBBBBBBBsecurityImportant: webkit2gtk3 security updatewa https://access.redhat.com/errata/RHSA-2025:18097RHSA-2025:18097RHSA-2025:18097 https://access.redhat.com/security/cve/CVE-2025-43272CVE-2025-43272CVE-2025-43272https://access.redhat.com/security/cve/CVE-2025-43342CVE-2025-43342CVE-2025-43342https://access.redhat.com/security/cve/CVE-2025-43343CVE-2025-43343CVE-2025-43343https://access.redhat.com/security/cve/CVE-2025-43356CVE-2025-43356CVE-2025-43356https://access.redhat.com/security/cve/CVE-2025-43368CVE-2025-43368CVE-2025-43368https://bugzilla.redhat.com/23976262397626https://bugzilla.redhat.com/23976272397627https://bugzilla.redhat.com/23976282397628https://bugzilla.redhat.com/23976302397630https://bugzilla.redhat.com/24035982403598https://errata.almalinux.org/9/ALSA-2025-18097.htmlALSA-2025:18097ALSA-2025:18097 5$webkit2gtk3-jsc-2.50.1-0.el9_6.i686.rpm5$webkit2gtk3-jsc-2.50.1-0.el9_6.x86_64.rpm6$webkit2gtk3-jsc-devel-2.50.1-0.el9_6.x86_64.rpm3$webkit2gtk3-2.50.1-0.el9_6.x86_64.rpm4$webkit2gtk3-devel-2.50.1-0.el9_6.i686.rpm6$webkit2gtk3-jsc-devel-2.50.1-0.el9_6.i686.rpm4$webkit2gtk3-devel-2.50.1-0.el9_6.x86_64.rpm3$webkit2gtk3-2.50.1-0.el9_6.i686.rpm5$webkit2gtk3-jsc-2.50.1-0.el9_6.i686.rpm5$webkit2gtk3-jsc-2.50.1-0.el9_6.x86_64.rpm6$webkit2gtk3-jsc-devel-2.50.1-0.el9_6.x86_64.rpm3$webkit2gtk3-2.50.1-0.el9_6.x86_64.rpm4$webkit2gtk3-devel-2.50.1-0.el9_6.i686.rpm6$webkit2gtk3-jsc-devel-2.50.1-0.el9_6.i686.rpm4$webkit2gtk3-devel-2.50.1-0.el9_6.x86_64.rpm3$webkit2gtk3-2.50.1-0.el9_6.i686.rpm-8 ~BBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security updateXMhttps://access.redhat.com/errata/RHSA-2025:18149RHSA-2025:18149RHSA-2025:18149 https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18149.htmlALSA-2025:18149ALSA-2025:18149 Daspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpmKdotnet-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpmVdotnet-apphost-pack-8.0-8.0.21-1.el9_6.x86_64.rpm[qdotnet-templates-8.0-8.0.121-1.el9_6.x86_64.rpmUaspnetcore-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpmYqdotnet-sdk-8.0-8.0.121-1.el9_6.x86_64.rpmZdotnet-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpmTaspnetcore-runtime-8.0-8.0.21-1.el9_6.x86_64.rpmLqdotnet-sdk-dbg-8.0-8.0.121-1.el9_6.x86_64.rpmWdotnet-hostfxr-8.0-8.0.21-1.el9_6.x86_64.rpmXdotnet-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm Daspnetcore-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpmKdotnet-runtime-dbg-8.0-8.0.21-1.el9_6.x86_64.rpmVdotnet-apphost-pack-8.0-8.0.21-1.el9_6.x86_64.rpm[qdotnet-templates-8.0-8.0.121-1.el9_6.x86_64.rpmUaspnetcore-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpmYqdotnet-sdk-8.0-8.0.121-1.el9_6.x86_64.rpmZdotnet-targeting-pack-8.0-8.0.21-1.el9_6.x86_64.rpmTaspnetcore-runtime-8.0-8.0.21-1.el9_6.x86_64.rpmLqdotnet-sdk-dbg-8.0-8.0.121-1.el9_6.x86_64.rpmWdotnet-hostfxr-8.0-8.0.21-1.el9_6.x86_64.rpmXdotnet-runtime-8.0-8.0.21-1.el9_6.x86_64.rpm_9 1UBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update%Mhttps://access.redhat.com/errata/RHSA-2025:18151RHSA-2025:18151RHSA-2025:18151 https://access.redhat.com/security/cve/CVE-2025-55247CVE-2025-55247CVE-2025-55247https://access.redhat.com/security/cve/CVE-2025-55248CVE-2025-55248CVE-2025-55248https://access.redhat.com/security/cve/CVE-2025-55315CVE-2025-55315CVE-2025-55315https://bugzilla.redhat.com/24030832403083https://bugzilla.redhat.com/24030852403085https://bugzilla.redhat.com/24030862403086https://errata.almalinux.org/9/ALSA-2025-18151.htmlALSA-2025:18151ALSA-2025:18151 2dotnet-hostfxr-9.0-9.0.10-1.el9_6.x86_64.rpm2dotnet-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm2aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpmadotnet-sdk-aot-9.0-9.0.111-1.el9_6.x86_64.rpm2dotnet-apphost-pack-9.0-9.0.10-1.el9_6.x86_64.rpm anetstandard-targeting-pack-2.1-9.0.111-1.el9_6.x86_64.rpmadotnet-sdk-9.0-9.0.111-1.el9_6.x86_64.rpm2aspnetcore-runtime-9.0-9.0.10-1.el9_6.x86_64.rpmadotnet-templates-9.0-9.0.111-1.el9_6.x86_64.rpm2aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm2dotnet-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpmadotnet-sdk-dbg-9.0-9.0.111-1.el9_6.x86_64.rpm2dotnet-host-9.0.10-1.el9_6.x86_64.rpm2dotnet-runtime-9.0-9.0.10-1.el9_6.x86_64.rpm2dotnet-hostfxr-9.0-9.0.10-1.el9_6.x86_64.rpm2dotnet-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpm2aspnetcore-runtime-dbg-9.0-9.0.10-1.el9_6.x86_64.rpmadotnet-sdk-aot-9.0-9.0.111-1.el9_6.x86_64.rpm2dotnet-apphost-pack-9.0-9.0.10-1.el9_6.x86_64.rpm anetstandard-targeting-pack-2.1-9.0.111-1.el9_6.x86_64.rpmadotnet-sdk-9.0-9.0.111-1.el9_6.x86_64.rpm2aspnetcore-runtime-9.0-9.0.10-1.el9_6.x86_64.rpmadotnet-templates-9.0-9.0.111-1.el9_6.x86_64.rpm2aspnetcore-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpm2dotnet-targeting-pack-9.0-9.0.10-1.el9_6.x86_64.rpmadotnet-sdk-dbg-9.0-9.0.111-1.el9_6.x86_64.rpm2dotnet-host-9.0.10-1.el9_6.x86_64.rpm2dotnet-runtime-9.0-9.0.10-1.el9_6.x86_64.rpmȡl: 6rBBsecurityImportant: firefox security updaterDhttps://access.redhat.com/errata/RHSA-2025:18155RHSA-2025:18155RHSA-2025:18155 https://access.redhat.com/security/cve/CVE-2025-11708CVE-2025-11708CVE-2025-11708https://access.redhat.com/security/cve/CVE-2025-11709CVE-2025-11709CVE-2025-11709https://access.redhat.com/security/cve/CVE-2025-11710CVE-2025-11710CVE-2025-11710https://access.redhat.com/security/cve/CVE-2025-11711CVE-2025-11711CVE-2025-11711https://access.redhat.com/security/cve/CVE-2025-11712CVE-2025-11712CVE-2025-11712https://access.redhat.com/security/cve/CVE-2025-11714CVE-2025-11714CVE-2025-11714https://access.redhat.com/security/cve/CVE-2025-11715CVE-2025-11715CVE-2025-11715https://bugzilla.redhat.com/24037632403763https://bugzilla.redhat.com/24037652403765https://bugzilla.redhat.com/24037682403768https://bugzilla.redhat.com/24037692403769https://bugzilla.redhat.com/24037702403770https://bugzilla.redhat.com/24037742403774https://bugzilla.redhat.com/24037762403776https://errata.almalinux.org/9/ALSA-2025-18155.htmlALSA-2025:18155ALSA-2025:18155 7_firefox-140.4.0-3.el9_6.alma.1.x86_64.rpmO_firefox-x11-140.4.0-3.el9_6.alma.1.x86_64.rpm7_firefox-140.4.0-3.el9_6.alma.1.x86_64.rpmO_firefox-x11-140.4.0-3.el9_6.alma.1.x86_64.rpm.; :wBsecurityModerate: libssh security update6 https://access.redhat.com/errata/RHSA-2025:18275RHSA-2025:18275RHSA-2025:18275 https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-18275.htmlALSA-2025:18275ALSA-2025:18275 jglibssh-devel-0.10.4-15.el9_6.i686.rpmjglibssh-devel-0.10.4-15.el9_6.x86_64.rpmjglibssh-devel-0.10.4-15.el9_6.i686.rpmjglibssh-devel-0.10.4-15.el9_6.x86_64.rpm< {BBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateAhttps://access.redhat.com/errata/RHSA-2025:18281RHSA-2025:18281RHSA-2025:18281 https://access.redhat.com/security/cve/CVE-2022-50087CVE-2022-50087CVE-2022-50087https://access.redhat.com/security/cve/CVE-2025-22026CVE-2025-22026CVE-2025-22026https://access.redhat.com/security/cve/CVE-2025-38566CVE-2025-38566CVE-2025-38566https://access.redhat.com/security/cve/CVE-2025-38571CVE-2025-38571CVE-2025-38571https://access.redhat.com/security/cve/CVE-2025-39817CVE-2025-39817CVE-2025-39817https://access.redhat.com/security/cve/CVE-2025-39841CVE-2025-39841CVE-2025-39841https://access.redhat.com/security/cve/CVE-2025-39849CVE-2025-39849CVE-2025-39849https://bugzilla.redhat.com/23602242360224https://bugzilla.redhat.com/23735392373539https://bugzilla.redhat.com/23894802389480https://bugzilla.redhat.com/23894872389487https://bugzilla.redhat.com/23958052395805https://bugzilla.redhat.com/23969282396928https://bugzilla.redhat.com/23969442396944https://errata.almalinux.org/9/ALSA-2025-18281.htmlALSA-2025:18281ALSA-2025:18281 )`rtla-5.14.0-570.55.1.el9_6.x86_64.rpm`kernel-doc-5.14.0-570.55.1.el9_6.noarch.rpm(`kernel-headers-5.14.0-570.55.1.el9_6.x86_64.rpmM`python3-perf-5.14.0-570.55.1.el9_6.x86_64.rpm"`kernel-debug-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm$`kernel-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm%`perf-5.14.0-570.55.1.el9_6.x86_64.rpm#`kernel-devel-5.14.0-570.55.1.el9_6.x86_64.rpm!`kernel-debug-devel-5.14.0-570.55.1.el9_6.x86_64.rpm*`rv-5.14.0-570.55.1.el9_6.x86_64.rpm )`rtla-5.14.0-570.55.1.el9_6.x86_64.rpm`kernel-doc-5.14.0-570.55.1.el9_6.noarch.rpm(`kernel-headers-5.14.0-570.55.1.el9_6.x86_64.rpmM`python3-perf-5.14.0-570.55.1.el9_6.x86_64.rpm"`kernel-debug-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm$`kernel-devel-matched-5.14.0-570.55.1.el9_6.x86_64.rpm%`perf-5.14.0-570.55.1.el9_6.x86_64.rpm#`kernel-devel-5.14.0-570.55.1.el9_6.x86_64.rpm!`kernel-debug-devel-5.14.0-570.55.1.el9_6.x86_64.rpm*`rv-5.14.0-570.55.1.el9_6.x86_64.rpmx= OsecurityImportant: thunderbird security updateVhttps://access.redhat.com/errata/RHSA-2025:18321RHSA-2025:18321RHSA-2025:18321 https://access.redhat.com/security/cve/CVE-2025-11708CVE-2025-11708CVE-2025-11708https://access.redhat.com/security/cve/CVE-2025-11709CVE-2025-11709CVE-2025-11709https://access.redhat.com/security/cve/CVE-2025-11710CVE-2025-11710CVE-2025-11710https://access.redhat.com/security/cve/CVE-2025-11711CVE-2025-11711CVE-2025-11711https://access.redhat.com/security/cve/CVE-2025-11712CVE-2025-11712CVE-2025-11712https://access.redhat.com/security/cve/CVE-2025-11714CVE-2025-11714CVE-2025-11714https://access.redhat.com/security/cve/CVE-2025-11715CVE-2025-11715CVE-2025-11715https://bugzilla.redhat.com/24037632403763https://bugzilla.redhat.com/24037652403765https://bugzilla.redhat.com/24037682403768https://bugzilla.redhat.com/24037692403769https://bugzilla.redhat.com/24037702403770https://bugzilla.redhat.com/24037742403774https://bugzilla.redhat.com/24037762403776https://errata.almalinux.org/9/ALSA-2025-18321.htmlALSA-2025:18321ALSA-2025:18321 9Othunderbird-140.4.0-2.el9_6.alma.1.x86_64.rpm9Othunderbird-140.4.0-2.el9_6.alma.1.x86_64.rpm> RBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updatei\https://access.redhat.com/errata/RHSA-2025:18815RHSA-2025:18815RHSA-2025:18815 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18815.htmlALSA-2025:18815ALSA-2025:18815 Cbjava-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9.alma.1.noarch.rpmdbjava-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmbbjava-1.8.0-openjdk-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmfbjava-1.8.0-openjdk-src-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmcbjava-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmebjava-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmBbjava-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9.alma.1.noarch.rpmCbjava-1.8.0-openjdk-javadoc-zip-1.8.0.472.b08-1.el9.alma.1.noarch.rpmdbjava-1.8.0-openjdk-devel-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmbbjava-1.8.0-openjdk-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmfbjava-1.8.0-openjdk-src-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmcbjava-1.8.0-openjdk-demo-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmebjava-1.8.0-openjdk-headless-1.8.0.472.b08-1.el9.alma.1.x86_64.rpmBbjava-1.8.0-openjdk-javadoc-1.8.0.472.b08-1.el9.alma.1.noarch.rpmȍJ? 1_BBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updateEhttps://access.redhat.com/errata/RHSA-2025:18821RHSA-2025:18821RHSA-2025:18821 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://errata.almalinux.org/9/ALSA-2025-18821.htmlALSA-2025:18821ALSA-2025:18821 /java-17-openjdk-src-17.0.17.0.10-1.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.17.0.10-1.el9.alma.1.x86_64.rpm.java-17-openjdk-jmods-17.0.17.0.10-1.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.17.0.10-1.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.17.0.10-1.el9.alma.1.x86_64.rpm0java-17-openjdk-static-libs-17.0.17.0.10-1.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.17.0.10-1.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.17.0.10-1.el9.alma.1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9.alma.1.x86_64.rpm /java-17-openjdk-src-17.0.17.0.10-1.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.17.0.10-1.el9.alma.1.x86_64.rpm.java-17-openjdk-jmods-17.0.17.0.10-1.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.17.0.10-1.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.17.0.10-1.el9.alma.1.x86_64.rpm0java-17-openjdk-static-libs-17.0.17.0.10-1.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.17.0.10-1.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.17.0.10-1.el9.alma.1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.17.0.10-1.el9.alma.1.x86_64.rpmȌh@ rBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security updateJlhttps://access.redhat.com/errata/RHSA-2025:18824RHSA-2025:18824RHSA-2025:18824 https://access.redhat.com/security/cve/CVE-2025-53057CVE-2025-53057CVE-2025-53057https://access.redhat.com/security/cve/CVE-2025-53066CVE-2025-53066CVE-2025-53066https://access.redhat.com/security/cve/CVE-2025-61748CVE-2025-61748CVE-2025-61748https://errata.almalinux.org/9/ALSA-2025-18824.htmlALSA-2025:18824ALSA-2025:18824 6*java-21-openjdk-static-libs-21.0.9.0.10-1.el9.alma.1.x86_64.rpm1*java-21-openjdk-headless-21.0.9.0.10-1.el9.alma.1.x86_64.rpm/*java-21-openjdk-demo-21.0.9.0.10-1.el9.alma.1.x86_64.rpm0*java-21-openjdk-devel-21.0.9.0.10-1.el9.alma.1.x86_64.rpm3*java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9.alma.1.x86_64.rpm2*java-21-openjdk-javadoc-21.0.9.0.10-1.el9.alma.1.x86_64.rpm4*java-21-openjdk-jmods-21.0.9.0.10-1.el9.alma.1.x86_64.rpm.*java-21-openjdk-21.0.9.0.10-1.el9.alma.1.x86_64.rpm5*java-21-openjdk-src-21.0.9.0.10-1.el9.alma.1.x86_64.rpm 6*java-21-openjdk-static-libs-21.0.9.0.10-1.el9.alma.1.x86_64.rpm1*java-21-openjdk-headless-21.0.9.0.10-1.el9.alma.1.x86_64.rpm/*java-21-openjdk-demo-21.0.9.0.10-1.el9.alma.1.x86_64.rpm0*java-21-openjdk-devel-21.0.9.0.10-1.el9.alma.1.x86_64.rpm3*java-21-openjdk-javadoc-zip-21.0.9.0.10-1.el9.alma.1.x86_64.rpm2*java-21-openjdk-javadoc-21.0.9.0.10-1.el9.alma.1.x86_64.rpm4*java-21-openjdk-jmods-21.0.9.0.10-1.el9.alma.1.x86_64.rpm.*java-21-openjdk-21.0.9.0.10-1.el9.alma.1.x86_64.rpm5*java-21-openjdk-src-21.0.9.0.10-1.el9.alma.1.x86_64.rpmȌSA EBBBBsecurityImportant: libtiff security update6<https://access.redhat.com/errata/RHSA-2025:19113RHSA-2025:19113RHSA-2025:19113 https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-19113.htmlALSA-2025:19113ALSA-2025:19113 vzlibtiff-devel-4.4.0-13.el9_6.2.i686.rpmvzlibtiff-devel-4.4.0-13.el9_6.2.x86_64.rpmuzlibtiff-4.4.0-13.el9_6.2.x86_64.rpmuzlibtiff-4.4.0-13.el9_6.2.i686.rpmvzlibtiff-devel-4.4.0-13.el9_6.2.i686.rpmvzlibtiff-devel-4.4.0-13.el9_6.2.x86_64.rpmuzlibtiff-4.4.0-13.el9_6.2.x86_64.rpmuzlibtiff-4.4.0-13.el9_6.2.i686.rpmȁ2B LBBBBBBBsecurityImportant: emacs security updaterthttps://access.redhat.com/errata/RHSA-2025:1915RHSA-2025:1915RHSA-2025:1915 https://access.redhat.com/security/cve/CVE-2025-1244CVE-2025-1244CVE-2025-1244https://bugzilla.redhat.com/23451502345150https://errata.almalinux.org/9/ALSA-2025-1915.htmlALSA-2025:1915ALSA-2025:1915 Atemacs-nox-27.2-11.el9_5.1.x86_64.rpmFtemacs-filesystem-27.2-11.el9_5.1.noarch.rpm>temacs-27.2-11.el9_5.1.x86_64.rpm@temacs-lucid-27.2-11.el9_5.1.x86_64.rpm?temacs-common-27.2-11.el9_5.1.x86_64.rpmAtemacs-nox-27.2-11.el9_5.1.x86_64.rpmFtemacs-filesystem-27.2-11.el9_5.1.noarch.rpm>temacs-27.2-11.el9_5.1.x86_64.rpm@temacs-lucid-27.2-11.el9_5.1.x86_64.rpm?temacs-common-27.2-11.el9_5.1.x86_64.rpm0C VBBBBsecurityImportant: redis security updatef https://access.redhat.com/errata/RHSA-2025:19237RHSA-2025:19237RHSA-2025:19237 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-19237.htmlALSA-2025:19237ALSA-2025:19237 Uredis-devel-6.2.20-1.el9_6.i686.rpm:redis-doc-6.2.20-1.el9_6.noarch.rpm6redis-6.2.20-1.el9_6.x86_64.rpmUredis-devel-6.2.20-1.el9_6.x86_64.rpmUredis-devel-6.2.20-1.el9_6.i686.rpm:redis-doc-6.2.20-1.el9_6.noarch.rpm6redis-6.2.20-1.el9_6.x86_64.rpmUredis-devel-6.2.20-1.el9_6.x86_64.rpmȌZD QBBBsecurityImportant: redis:7 security update https://access.redhat.com/errata/RHSA-2025:19345RHSA-2025:19345RHSA-2025:19345 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-19345.htmlALSA-2025:19345ALSA-2025:19345 6c'U)redis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm6)redis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm:)redis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpm6c'U)redis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm6)redis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm:)redis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpmȷ>E 1^BBBBBBBBBBBBBBBBBsecurityModerate: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:19409RHSA-2025:19409RHSA-2025:19409 https://access.redhat.com/security/cve/CVE-2022-50367CVE-2022-50367CVE-2022-50367https://access.redhat.com/security/cve/CVE-2023-53494CVE-2023-53494CVE-2023-53494https://access.redhat.com/security/cve/CVE-2025-39702CVE-2025-39702CVE-2025-39702https://bugzilla.redhat.com/23935332393533https://bugzilla.redhat.com/23961142396114https://bugzilla.redhat.com/24007772400777https://errata.almalinux.org/9/ALSA-2025-19409.htmlALSA-2025:19409ALSA-2025:19409 )artla-5.14.0-570.60.1.el9_6.x86_64.rpm%aperf-5.14.0-570.60.1.el9_6.x86_64.rpm*arv-5.14.0-570.60.1.el9_6.x86_64.rpm"akernel-debug-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpmakernel-doc-5.14.0-570.60.1.el9_6.noarch.rpm(akernel-headers-5.14.0-570.60.1.el9_6.x86_64.rpm#akernel-devel-5.14.0-570.60.1.el9_6.x86_64.rpmMapython3-perf-5.14.0-570.60.1.el9_6.x86_64.rpm!akernel-debug-devel-5.14.0-570.60.1.el9_6.x86_64.rpm$akernel-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpm )artla-5.14.0-570.60.1.el9_6.x86_64.rpm%aperf-5.14.0-570.60.1.el9_6.x86_64.rpm*arv-5.14.0-570.60.1.el9_6.x86_64.rpm"akernel-debug-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpmakernel-doc-5.14.0-570.60.1.el9_6.noarch.rpm(akernel-headers-5.14.0-570.60.1.el9_6.x86_64.rpm#akernel-devel-5.14.0-570.60.1.el9_6.x86_64.rpmMapython3-perf-5.14.0-570.60.1.el9_6.x86_64.rpm!akernel-debug-devel-5.14.0-570.60.1.el9_6.x86_64.rpm$akernel-devel-matched-5.14.0-570.60.1.el9_6.x86_64.rpmȷDF =rBBBBBBBBBsecurityImportant: tigervnc security update thttps://access.redhat.com/errata/RHSA-2025:19489RHSA-2025:19489RHSA-2025:19489 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-19489.htmlALSA-2025:19489ALSA-2025:19489 q|tigervnc-server-module-1.14.1-9.el9_6.x86_64.rpmp|tigervnc-server-minimal-1.14.1-9.el9_6.x86_64.rpmo|tigervnc-server-1.14.1-9.el9_6.x86_64.rpm7|tigervnc-icons-1.14.1-9.el9_6.noarch.rpm8|tigervnc-license-1.14.1-9.el9_6.noarch.rpm9|tigervnc-selinux-1.14.1-9.el9_6.noarch.rpmn|tigervnc-1.14.1-9.el9_6.x86_64.rpmq|tigervnc-server-module-1.14.1-9.el9_6.x86_64.rpmp|tigervnc-server-minimal-1.14.1-9.el9_6.x86_64.rpmo|tigervnc-server-1.14.1-9.el9_6.x86_64.rpm7|tigervnc-icons-1.14.1-9.el9_6.noarch.rpm8|tigervnc-license-1.14.1-9.el9_6.noarch.rpm9|tigervnc-selinux-1.14.1-9.el9_6.noarch.rpmn|tigervnc-1.14.1-9.el9_6.x86_64.rpmȷGG ~BBBBBBBBBBBBBBBBBBBBBBsecurityModerate: galera and mariadb security update! https://access.redhat.com/errata/RHSA-2025:19584RHSA-2025:19584RHSA-2025:19584 https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://errata.almalinux.org/9/ALSA-2025-19584.htmlALSA-2025:19584ALSA-2025:19584 e7mariadb-10.5.29-2.el9_6.x86_64.rpmg7mariadb-server-utils-10.5.29-2.el9_6.x86_64.rpm`7mariadb-embedded-10.5.29-2.el9_6.x86_64.rpmc7mariadb-oqgraph-engine-10.5.29-2.el9_6.x86_64.rpmb7mariadb-gssapi-server-10.5.29-2.el9_6.x86_64.rpma7mariadb-errmsg-10.5.29-2.el9_6.x86_64.rpmf7mariadb-server-galera-10.5.29-2.el9_6.x86_64.rpmd7mariadb-pam-10.5.29-2.el9_6.x86_64.rpme7mariadb-server-10.5.29-2.el9_6.x86_64.rpmu(galera-26.4.22-1.el9_6.x86_64.rpm^7mariadb-backup-10.5.29-2.el9_6.x86_64.rpm_7mariadb-common-10.5.29-2.el9_6.x86_64.rpm e7mariadb-10.5.29-2.el9_6.x86_64.rpmg7mariadb-server-utils-10.5.29-2.el9_6.x86_64.rpm`7mariadb-embedded-10.5.29-2.el9_6.x86_64.rpmc7mariadb-oqgraph-engine-10.5.29-2.el9_6.x86_64.rpmb7mariadb-gssapi-server-10.5.29-2.el9_6.x86_64.rpma7mariadb-errmsg-10.5.29-2.el9_6.x86_64.rpmf7mariadb-server-galera-10.5.29-2.el9_6.x86_64.rpmd7mariadb-pam-10.5.29-2.el9_6.x86_64.rpme7mariadb-server-10.5.29-2.el9_6.x86_64.rpmu(galera-26.4.22-1.el9_6.x86_64.rpm^7mariadb-backup-10.5.29-2.el9_6.x86_64.rpm_7mariadb-common-10.5.29-2.el9_6.x86_64.rpmȶ H WsecurityImportant: runc security update5https://access.redhat.com/errata/RHSA-2025:19927RHSA-2025:19927RHSA-2025:19927 https://access.redhat.com/security/cve/CVE-2025-31133CVE-2025-31133CVE-2025-31133https://access.redhat.com/security/cve/CVE-2025-52565CVE-2025-52565CVE-2025-52565https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047052404705https://bugzilla.redhat.com/24047082404708https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-19927.htmlALSA-2025:19927ALSA-2025:19927 W_runc-1.2.5-3.el9_6.x86_64.rpmW_runc-1.2.5-3.el9_6.x86_64.rpmOI -ZBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateT9https://access.redhat.com/errata/RHSA-2025:19930RHSA-2025:19930RHSA-2025:19930 https://access.redhat.com/security/cve/CVE-2024-36350CVE-2024-36350CVE-2024-36350https://access.redhat.com/security/cve/CVE-2024-36357CVE-2024-36357CVE-2024-36357https://access.redhat.com/security/cve/CVE-2025-40300CVE-2025-40300CVE-2025-40300https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23946272394627https://errata.almalinux.org/9/ALSA-2025-19930.htmlALSA-2025:19930ALSA-2025:19930 "bkernel-debug-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpmbkernel-doc-5.14.0-570.62.1.el9_6.noarch.rpm#bkernel-devel-5.14.0-570.62.1.el9_6.x86_64.rpm(bkernel-headers-5.14.0-570.62.1.el9_6.x86_64.rpm!bkernel-debug-devel-5.14.0-570.62.1.el9_6.x86_64.rpm%bperf-5.14.0-570.62.1.el9_6.x86_64.rpm$bkernel-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpmMbpython3-perf-5.14.0-570.62.1.el9_6.x86_64.rpm)brtla-5.14.0-570.62.1.el9_6.x86_64.rpm*brv-5.14.0-570.62.1.el9_6.x86_64.rpm "bkernel-debug-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpmbkernel-doc-5.14.0-570.62.1.el9_6.noarch.rpm#bkernel-devel-5.14.0-570.62.1.el9_6.x86_64.rpm(bkernel-headers-5.14.0-570.62.1.el9_6.x86_64.rpm!bkernel-debug-devel-5.14.0-570.62.1.el9_6.x86_64.rpm%bperf-5.14.0-570.62.1.el9_6.x86_64.rpm$bkernel-devel-matched-5.14.0-570.62.1.el9_6.x86_64.rpmMbpython3-perf-5.14.0-570.62.1.el9_6.x86_64.rpm)brtla-5.14.0-570.62.1.el9_6.x86_64.rpm*brv-5.14.0-570.62.1.el9_6.x86_64.rpmѳJ 8nBBBBBBBBsecurityImportant: bind9.18 security update phttps://access.redhat.com/errata/RHSA-2025:19950RHSA-2025:19950RHSA-2025:19950 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-19950.htmlALSA-2025:19950ALSA-2025:19950  Wbind9.18-chroot-9.18.29-4.el9_6.2.x86_64.rpm Wbind9.18-9.18.29-4.el9_6.2.x86_64.rpmWbind9.18-dnssec-utils-9.18.29-4.el9_6.2.x86_64.rpmWbind9.18-utils-9.18.29-4.el9_6.2.x86_64.rpmWbind9.18-libs-9.18.29-4.el9_6.2.x86_64.rpm Wbind9.18-chroot-9.18.29-4.el9_6.2.x86_64.rpm Wbind9.18-9.18.29-4.el9_6.2.x86_64.rpmWbind9.18-dnssec-utils-9.18.29-4.el9_6.2.x86_64.rpmWbind9.18-utils-9.18.29-4.el9_6.2.x86_64.rpmWbind9.18-libs-9.18.29-4.el9_6.2.x86_64.rpm/K yBBBBBBBBBBsecurityImportant: webkit2gtk3 security update}# https://access.redhat.com/errata/RHSA-2025:2035RHSA-2025:2035RHSA-2025:2035 https://access.redhat.com/security/cve/CVE-2024-54543CVE-2024-54543CVE-2024-54543https://access.redhat.com/security/cve/CVE-2025-24143CVE-2025-24143CVE-2025-24143https://access.redhat.com/security/cve/CVE-2025-24150CVE-2025-24150CVE-2025-24150https://access.redhat.com/security/cve/CVE-2025-24158CVE-2025-24158CVE-2025-24158https://access.redhat.com/security/cve/CVE-2025-24162CVE-2025-24162CVE-2025-24162https://bugzilla.redhat.com/23446192344619https://bugzilla.redhat.com/23446212344621https://bugzilla.redhat.com/23446222344622https://bugzilla.redhat.com/23446232344623https://bugzilla.redhat.com/23446242344624https://errata.almalinux.org/9/ALSA-2025-2035.htmlALSA-2025:2035ALSA-2025:2035 3webkit2gtk3-2.46.6-1.el9_5.x86_64.rpm4webkit2gtk3-devel-2.46.6-1.el9_5.x86_64.rpm6webkit2gtk3-jsc-devel-2.46.6-1.el9_5.x86_64.rpm5webkit2gtk3-jsc-2.46.6-1.el9_5.x86_64.rpm5webkit2gtk3-jsc-2.46.6-1.el9_5.i686.rpm4webkit2gtk3-devel-2.46.6-1.el9_5.i686.rpm3webkit2gtk3-2.46.6-1.el9_5.i686.rpm6webkit2gtk3-jsc-devel-2.46.6-1.el9_5.i686.rpm3webkit2gtk3-2.46.6-1.el9_5.x86_64.rpm4webkit2gtk3-devel-2.46.6-1.el9_5.x86_64.rpm6webkit2gtk3-jsc-devel-2.46.6-1.el9_5.x86_64.rpm5webkit2gtk3-jsc-2.46.6-1.el9_5.x86_64.rpm5webkit2gtk3-jsc-2.46.6-1.el9_5.i686.rpm4webkit2gtk3-devel-2.46.6-1.el9_5.i686.rpm3webkit2gtk3-2.46.6-1.el9_5.i686.rpm6webkit2gtk3-jsc-devel-2.46.6-1.el9_5.i686.rpm)L FBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update Xahttps://access.redhat.com/errata/RHSA-2025:20518RHSA-2025:20518RHSA-2025:20518 https://bugzilla.redhat.com/22981692298169https://bugzilla.redhat.com/23120772312077https://bugzilla.redhat.com/23130922313092https://bugzilla.redhat.com/23201722320172https://bugzilla.redhat.com/23202592320259https://bugzilla.redhat.com/23204552320455https://bugzilla.redhat.com/23206162320616https://bugzilla.redhat.com/23207222320722https://bugzilla.redhat.com/23245492324549https://bugzilla.redhat.com/23272032327203https://bugzilla.redhat.com/23273742327374https://bugzilla.redhat.com/23278872327887https://bugzilla.redhat.com/23299182329918https://bugzilla.redhat.com/23303412330341https://bugzilla.redhat.com/23313262331326https://bugzilla.redhat.com/23343572334357https://bugzilla.redhat.com/23343962334396https://bugzilla.redhat.com/23344152334415https://bugzilla.redhat.com/23344392334439https://bugzilla.redhat.com/23345372334537https://bugzilla.redhat.com/23345472334547https://bugzilla.redhat.com/23345482334548https://bugzilla.redhat.com/23345602334560https://bugzilla.redhat.com/23346762334676https://bugzilla.redhat.com/23347952334795https://bugzilla.redhat.com/23348292334829https://bugzilla.redhat.com/23365412336541https://bugzilla.redhat.com/23371212337121https://bugzilla.redhat.com/23371242337124https://bugzilla.redhat.com/23388142338814https://bugzilla.redhat.com/23388282338828https://bugzilla.redhat.com/23388322338832https://bugzilla.redhat.com/23431722343172https://bugzilla.redhat.com/23431752343175https://bugzilla.redhat.com/23446842344684https://bugzilla.redhat.com/23446872344687https://bugzilla.redhat.com/23452402345240https://bugzilla.redhat.com/23462722346272https://bugzilla.redhat.com/23477072347707https://bugzilla.redhat.com/23477532347753https://bugzilla.redhat.com/23477592347759https://bugzilla.redhat.com/23477812347781https://bugzilla.redhat.com/23478072347807https://bugzilla.redhat.com/23478592347859https://bugzilla.redhat.com/23479192347919https://bugzilla.redhat.com/23479682347968https://bugzilla.redhat.com/23480222348022https://bugzilla.redhat.com/23480712348071https://bugzilla.redhat.com/23482382348238https://bugzilla.redhat.com/23482402348240https://bugzilla.redhat.com/23482792348279https://bugzilla.redhat.com/23485152348515https://bugzilla.redhat.com/23485232348523https://bugzilla.redhat.com/23485282348528https://bugzilla.redhat.com/23485412348541https://bugzilla.redhat.com/23485432348543https://bugzilla.redhat.com/23485472348547https://bugzilla.redhat.com/23485502348550https://bugzilla.redhat.com/23485542348554https://bugzilla.redhat.com/23485562348556https://bugzilla.redhat.com/23485662348566https://bugzilla.redhat.com/23485732348573https://bugzilla.redhat.com/23485742348574https://bugzilla.redhat.com/23485772348577https://bugzilla.redhat.com/23485782348578https://bugzilla.redhat.com/23485812348581https://bugzilla.redhat.com/23485842348584https://bugzilla.redhat.com/23485852348585https://bugzilla.redhat.com/23485872348587https://bugzilla.redhat.com/23485952348595https://bugzilla.redhat.com/23485972348597https://bugzilla.redhat.com/23486002348600https://bugzilla.redhat.com/23486012348601https://bugzilla.redhat.com/23486152348615https://bugzilla.redhat.com/23486202348620https://bugzilla.redhat.com/23486252348625https://bugzilla.redhat.com/23486342348634https://bugzilla.redhat.com/23486452348645https://bugzilla.redhat.com/23486502348650https://bugzilla.redhat.com/23486542348654https://bugzilla.redhat.com/23489012348901https://bugzilla.redhat.com/23503632350363https://bugzilla.redhat.com/23503672350367https://bugzilla.redhat.com/23503742350374https://bugzilla.redhat.com/23503752350375https://bugzilla.redhat.com/23503862350386https://bugzilla.redhat.com/23503882350388https://bugzilla.redhat.com/23503922350392https://bugzilla.redhat.com/23503962350396https://bugzilla.redhat.com/23503972350397https://bugzilla.redhat.com/23504002350400https://bugzilla.redhat.com/23505852350585https://bugzilla.redhat.com/23505892350589https://bugzilla.redhat.com/23507252350725https://bugzilla.redhat.com/23507262350726https://bugzilla.redhat.com/23516062351606https://bugzilla.redhat.com/23516082351608https://bugzilla.redhat.com/23516122351612https://bugzilla.redhat.com/23516132351613https://bugzilla.redhat.com/23516162351616https://bugzilla.redhat.com/23516182351618https://bugzilla.redhat.com/23516202351620https://bugzilla.redhat.com/23516242351624https://bugzilla.redhat.com/23516252351625https://bugzilla.redhat.com/23516292351629https://bugzilla.redhat.com/23516332351633https://bugzilla.redhat.com/23602152360215https://bugzilla.redhat.com/23633802363380https://bugzilla.redhat.com/23691842369184https://bugzilla.redhat.com/23760762376076https://bugzilla.redhat.com/23834412383441https://errata.almalinux.org/9/ALSA-2025-20518.htmlALSA-2025:20518ALSA-2025:20518 https://www.redhat.com/security/data/cve/CVE-2022-48830.htmlCVE-2022-48830CVE-2022-48830https://www.redhat.com/security/data/cve/CVE-2022-49024.htmlCVE-2022-49024CVE-2022-49024https://www.redhat.com/security/data/cve/CVE-2022-49269.htmlCVE-2022-49269CVE-2022-49269https://www.redhat.com/security/data/cve/CVE-2022-49353.htmlCVE-2022-49353CVE-2022-49353https://www.redhat.com/security/data/cve/CVE-2022-49357.htmlCVE-2022-49357CVE-2022-49357https://www.redhat.com/security/data/cve/CVE-2022-49432.htmlCVE-2022-49432CVE-2022-49432https://www.redhat.com/security/data/cve/CVE-2022-49437.htmlCVE-2022-49437CVE-2022-49437https://www.redhat.com/security/data/cve/CVE-2022-49443.htmlCVE-2022-49443CVE-2022-49443https://www.redhat.com/security/data/cve/CVE-2022-49623.htmlCVE-2022-49623CVE-2022-49623https://www.redhat.com/security/data/cve/CVE-2022-49627.htmlCVE-2022-49627CVE-2022-49627https://www.redhat.com/security/data/cve/CVE-2022-49643.htmlCVE-2022-49643CVE-2022-49643https://www.redhat.com/security/data/cve/CVE-2022-49648.htmlCVE-2022-49648CVE-2022-49648https://www.redhat.com/security/data/cve/CVE-2022-49657.htmlCVE-2022-49657CVE-2022-49657https://www.redhat.com/security/data/cve/CVE-2022-49670.htmlCVE-2022-49670CVE-2022-49670https://www.redhat.com/security/data/cve/CVE-2022-49672.htmlCVE-2022-49672CVE-2022-49672https://www.redhat.com/security/data/cve/CVE-2022-49845.htmlCVE-2022-49845CVE-2022-49845https://www.redhat.com/security/data/cve/CVE-2024-36350.htmlCVE-2024-36350CVE-2024-36350https://www.redhat.com/security/data/cve/CVE-2024-36357.htmlCVE-2024-36357CVE-2024-36357https://www.redhat.com/security/data/cve/CVE-2024-46689.htmlCVE-2024-46689CVE-2024-46689https://www.redhat.com/security/data/cve/CVE-2024-46744.htmlCVE-2024-46744CVE-2024-46744https://www.redhat.com/security/data/cve/CVE-2024-47679.htmlCVE-2024-47679CVE-2024-47679https://www.redhat.com/security/data/cve/CVE-2024-47727.htmlCVE-2024-47727CVE-2024-47727https://www.redhat.com/security/data/cve/CVE-2024-49570.htmlCVE-2024-49570CVE-2024-49570https://www.redhat.com/security/data/cve/CVE-2024-49864.htmlCVE-2024-49864CVE-2024-49864https://www.redhat.com/security/data/cve/CVE-2024-50060.htmlCVE-2024-50060CVE-2024-50060https://www.redhat.com/security/data/cve/CVE-2024-50195.htmlCVE-2024-50195CVE-2024-50195https://www.redhat.com/security/data/cve/CVE-2024-50294.htmlCVE-2024-50294CVE-2024-50294https://www.redhat.com/security/data/cve/CVE-2024-52332.htmlCVE-2024-52332CVE-2024-52332https://www.redhat.com/security/data/cve/CVE-2024-53052.htmlCVE-2024-53052CVE-2024-53052https://www.redhat.com/security/data/cve/CVE-2024-53090.htmlCVE-2024-53090CVE-2024-53090https://www.redhat.com/security/data/cve/CVE-2024-53119.htmlCVE-2024-53119CVE-2024-53119https://www.redhat.com/security/data/cve/CVE-2024-53135.htmlCVE-2024-53135CVE-2024-53135https://www.redhat.com/security/data/cve/CVE-2024-53170.htmlCVE-2024-53170CVE-2024-53170https://www.redhat.com/security/data/cve/CVE-2024-53216.htmlCVE-2024-53216CVE-2024-53216https://www.redhat.com/security/data/cve/CVE-2024-53229.htmlCVE-2024-53229CVE-2024-53229https://www.redhat.com/security/data/cve/CVE-2024-53241.htmlCVE-2024-53241CVE-2024-53241https://www.redhat.com/security/data/cve/CVE-2024-53680.htmlCVE-2024-53680CVE-2024-53680https://www.redhat.com/security/data/cve/CVE-2024-54456.htmlCVE-2024-54456CVE-2024-54456https://www.redhat.com/security/data/cve/CVE-2024-56603.htmlCVE-2024-56603CVE-2024-56603https://www.redhat.com/security/data/cve/CVE-2024-56645.htmlCVE-2024-56645CVE-2024-56645https://www.redhat.com/security/data/cve/CVE-2024-56662.htmlCVE-2024-56662CVE-2024-56662https://www.redhat.com/security/data/cve/CVE-2024-56672.htmlCVE-2024-56672CVE-2024-56672https://www.redhat.com/security/data/cve/CVE-2024-56675.htmlCVE-2024-56675CVE-2024-56675https://www.redhat.com/security/data/cve/CVE-2024-56690.htmlCVE-2024-56690CVE-2024-56690https://www.redhat.com/security/data/cve/CVE-2024-56709.htmlCVE-2024-56709CVE-2024-56709https://www.redhat.com/security/data/cve/CVE-2024-56739.htmlCVE-2024-56739CVE-2024-56739https://www.redhat.com/security/data/cve/CVE-2024-56786.htmlCVE-2024-56786CVE-2024-56786https://www.redhat.com/security/data/cve/CVE-2024-57981.htmlCVE-2024-57981CVE-2024-57981https://www.redhat.com/security/data/cve/CVE-2024-57986.htmlCVE-2024-57986CVE-2024-57986https://www.redhat.com/security/data/cve/CVE-2024-57987.htmlCVE-2024-57987CVE-2024-57987https://www.redhat.com/security/data/cve/CVE-2024-57988.htmlCVE-2024-57988CVE-2024-57988https://www.redhat.com/security/data/cve/CVE-2024-57989.htmlCVE-2024-57989CVE-2024-57989https://www.redhat.com/security/data/cve/CVE-2024-57990.htmlCVE-2024-57990CVE-2024-57990https://www.redhat.com/security/data/cve/CVE-2024-57993.htmlCVE-2024-57993CVE-2024-57993https://www.redhat.com/security/data/cve/CVE-2024-57995.htmlCVE-2024-57995CVE-2024-57995https://www.redhat.com/security/data/cve/CVE-2024-57998.htmlCVE-2024-57998CVE-2024-57998https://www.redhat.com/security/data/cve/CVE-2024-58012.htmlCVE-2024-58012CVE-2024-58012https://www.redhat.com/security/data/cve/CVE-2024-58014.htmlCVE-2024-58014CVE-2024-58014https://www.redhat.com/security/data/cve/CVE-2024-58015.htmlCVE-2024-58015CVE-2024-58015https://www.redhat.com/security/data/cve/CVE-2024-58057.htmlCVE-2024-58057CVE-2024-58057https://www.redhat.com/security/data/cve/CVE-2024-58062.htmlCVE-2024-58062CVE-2024-58062https://www.redhat.com/security/data/cve/CVE-2024-58068.htmlCVE-2024-58068CVE-2024-58068https://www.redhat.com/security/data/cve/CVE-2024-58072.htmlCVE-2024-58072CVE-2024-58072https://www.redhat.com/security/data/cve/CVE-2024-58075.htmlCVE-2024-58075CVE-2024-58075https://www.redhat.com/security/data/cve/CVE-2024-58077.htmlCVE-2024-58077CVE-2024-58077https://www.redhat.com/security/data/cve/CVE-2024-58083.htmlCVE-2024-58083CVE-2024-58083https://www.redhat.com/security/data/cve/CVE-2024-58088.htmlCVE-2024-58088CVE-2024-58088https://www.redhat.com/security/data/cve/CVE-2025-21631.htmlCVE-2025-21631CVE-2025-21631https://www.redhat.com/security/data/cve/CVE-2025-21647.htmlCVE-2025-21647CVE-2025-21647https://www.redhat.com/security/data/cve/CVE-2025-21648.htmlCVE-2025-21648CVE-2025-21648https://www.redhat.com/security/data/cve/CVE-2025-21671.htmlCVE-2025-21671CVE-2025-21671https://www.redhat.com/security/data/cve/CVE-2025-21672.htmlCVE-2025-21672CVE-2025-21672https://www.redhat.com/security/data/cve/CVE-2025-21691.htmlCVE-2025-21691CVE-2025-21691https://www.redhat.com/security/data/cve/CVE-2025-21693.htmlCVE-2025-21693CVE-2025-21693https://www.redhat.com/security/data/cve/CVE-2025-21696.htmlCVE-2025-21696CVE-2025-21696https://www.redhat.com/security/data/cve/CVE-2025-21702.htmlCVE-2025-21702CVE-2025-21702https://www.redhat.com/security/data/cve/CVE-2025-21714.htmlCVE-2025-21714CVE-2025-21714https://www.redhat.com/security/data/cve/CVE-2025-21726.htmlCVE-2025-21726CVE-2025-21726https://www.redhat.com/security/data/cve/CVE-2025-21728.htmlCVE-2025-21728CVE-2025-21728https://www.redhat.com/security/data/cve/CVE-2025-21729.htmlCVE-2025-21729CVE-2025-21729https://www.redhat.com/security/data/cve/CVE-2025-21738.htmlCVE-2025-21738CVE-2025-21738https://www.redhat.com/security/data/cve/CVE-2025-21739.htmlCVE-2025-21739CVE-2025-21739https://www.redhat.com/security/data/cve/CVE-2025-21745.htmlCVE-2025-21745CVE-2025-21745https://www.redhat.com/security/data/cve/CVE-2025-21746.htmlCVE-2025-21746CVE-2025-21746https://www.redhat.com/security/data/cve/CVE-2025-21765.htmlCVE-2025-21765CVE-2025-21765https://www.redhat.com/security/data/cve/CVE-2025-21786.htmlCVE-2025-21786CVE-2025-21786https://www.redhat.com/security/data/cve/CVE-2025-21787.htmlCVE-2025-21787CVE-2025-21787https://www.redhat.com/security/data/cve/CVE-2025-21790.htmlCVE-2025-21790CVE-2025-21790https://www.redhat.com/security/data/cve/CVE-2025-21791.htmlCVE-2025-21791CVE-2025-21791https://www.redhat.com/security/data/cve/CVE-2025-21795.htmlCVE-2025-21795CVE-2025-21795https://www.redhat.com/security/data/cve/CVE-2025-21796.htmlCVE-2025-21796CVE-2025-21796https://www.redhat.com/security/data/cve/CVE-2025-21806.htmlCVE-2025-21806CVE-2025-21806https://www.redhat.com/security/data/cve/CVE-2025-21826.htmlCVE-2025-21826CVE-2025-21826https://www.redhat.com/security/data/cve/CVE-2025-21828.htmlCVE-2025-21828CVE-2025-21828https://www.redhat.com/security/data/cve/CVE-2025-21829.htmlCVE-2025-21829CVE-2025-21829https://www.redhat.com/security/data/cve/CVE-2025-21837.htmlCVE-2025-21837CVE-2025-21837https://www.redhat.com/security/data/cve/CVE-2025-21839.htmlCVE-2025-21839CVE-2025-21839https://www.redhat.com/security/data/cve/CVE-2025-21844.htmlCVE-2025-21844CVE-2025-21844https://www.redhat.com/security/data/cve/CVE-2025-21846.htmlCVE-2025-21846CVE-2025-21846https://www.redhat.com/security/data/cve/CVE-2025-21847.htmlCVE-2025-21847CVE-2025-21847https://www.redhat.com/security/data/cve/CVE-2025-21848.htmlCVE-2025-21848CVE-2025-21848https://www.redhat.com/security/data/cve/CVE-2025-21851.htmlCVE-2025-21851CVE-2025-21851https://www.redhat.com/security/data/cve/CVE-2025-21853.htmlCVE-2025-21853CVE-2025-21853https://www.redhat.com/security/data/cve/CVE-2025-21855.htmlCVE-2025-21855CVE-2025-21855https://www.redhat.com/security/data/cve/CVE-2025-21861.htmlCVE-2025-21861CVE-2025-21861https://www.redhat.com/security/data/cve/CVE-2025-21863.htmlCVE-2025-21863CVE-2025-21863https://www.redhat.com/security/data/cve/CVE-2025-21864.htmlCVE-2025-21864CVE-2025-21864https://www.redhat.com/security/data/cve/CVE-2025-22056.htmlCVE-2025-22056CVE-2025-22056https://www.redhat.com/security/data/cve/CVE-2025-22097.htmlCVE-2025-22097CVE-2025-22097https://www.redhat.com/security/data/cve/CVE-2025-37994.htmlCVE-2025-37994CVE-2025-37994https://www.redhat.com/security/data/cve/CVE-2025-38116.htmlCVE-2025-38116CVE-2025-38116https://www.redhat.com/security/data/cve/CVE-2025-38396.htmlCVE-2025-38396CVE-2025-38396 (skernel-headers-5.14.0-611.5.1.el9_7.x86_64.rpm$skernel-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm%sperf-5.14.0-611.5.1.el9_7.x86_64.rpm*srv-5.14.0-611.5.1.el9_7.x86_64.rpmMspython3-perf-5.14.0-611.5.1.el9_7.x86_64.rpm!skernel-debug-devel-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-doc-5.14.0-611.5.1.el9_7.noarch.rpm"skernel-debug-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm)srtla-5.14.0-611.5.1.el9_7.x86_64.rpm#skernel-devel-5.14.0-611.5.1.el9_7.x86_64.rpm (skernel-headers-5.14.0-611.5.1.el9_7.x86_64.rpm$skernel-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm%sperf-5.14.0-611.5.1.el9_7.x86_64.rpm*srv-5.14.0-611.5.1.el9_7.x86_64.rpmMspython3-perf-5.14.0-611.5.1.el9_7.x86_64.rpm!skernel-debug-devel-5.14.0-611.5.1.el9_7.x86_64.rpmskernel-doc-5.14.0-611.5.1.el9_7.noarch.rpm"skernel-debug-devel-matched-5.14.0-611.5.1.el9_7.x86_64.rpm)srtla-5.14.0-611.5.1.el9_7.x86_64.rpm#skernel-devel-5.14.0-611.5.1.el9_7.x86_64.rpmAM ZBBBsecurityModerate: zziplib security updatexhttps://access.redhat.com/errata/RHSA-2025:20838RHSA-2025:20838RHSA-2025:20838 https://access.redhat.com/security/cve/CVE-2018-17828CVE-2018-17828CVE-2018-17828https://bugzilla.redhat.com/16358881635888https://errata.almalinux.org/9/ALSA-2025-20838.htmlALSA-2025:20838ALSA-2025:20838 zziplib-0.13.71-12.el9.x86_64.rpmdzziplib-utils-0.13.71-12.el9.x86_64.rpmzziplib-0.13.71-12.el9.i686.rpmzziplib-0.13.71-12.el9.x86_64.rpmdzziplib-utils-0.13.71-12.el9.x86_64.rpmzziplib-0.13.71-12.el9.i686.rpmtN )`BBBBBBBsecurityImportant: podman security update &https://access.redhat.com/errata/RHSA-2025:20909RHSA-2025:20909RHSA-2025:20909 https://access.redhat.com/security/cve/CVE-2025-47907CVE-2025-47907CVE-2025-47907https://access.redhat.com/security/cve/CVE-2025-9566CVE-2025-9566CVE-2025-9566https://bugzilla.redhat.com/23870832387083https://bugzilla.redhat.com/23931522393152https://errata.almalinux.org/9/ALSA-2025-20909.htmlALSA-2025:20909ALSA-2025:20909 fpodman-docker-5.6.0-6.el9_7.noarch.rpm-podman-5.6.0-6.el9_7.x86_64.rpm/podman-remote-5.6.0-6.el9_7.x86_64.rpm0podman-tests-5.6.0-6.el9_7.x86_64.rpm.podman-plugins-5.6.0-6.el9_7.x86_64.rpmfpodman-docker-5.6.0-6.el9_7.noarch.rpm-podman-5.6.0-6.el9_7.x86_64.rpm/podman-remote-5.6.0-6.el9_7.x86_64.rpm0podman-tests-5.6.0-6.el9_7.x86_64.rpm.podman-plugins-5.6.0-6.el9_7.x86_64.rpmɑzO 6jBBBBBBBBBBsecurityImportant: webkit2gtk3 security update0a https://access.redhat.com/errata/RHSA-2025:20922RHSA-2025:20922RHSA-2025:20922 https://access.redhat.com/security/cve/CVE-2025-43272CVE-2025-43272CVE-2025-43272https://access.redhat.com/security/cve/CVE-2025-43342CVE-2025-43342CVE-2025-43342https://access.redhat.com/security/cve/CVE-2025-43343CVE-2025-43343CVE-2025-43343https://access.redhat.com/security/cve/CVE-2025-43356CVE-2025-43356CVE-2025-43356https://access.redhat.com/security/cve/CVE-2025-43368CVE-2025-43368CVE-2025-43368https://bugzilla.redhat.com/23976262397626https://bugzilla.redhat.com/23976272397627https://bugzilla.redhat.com/23976282397628https://bugzilla.redhat.com/23976302397630https://bugzilla.redhat.com/24035982403598https://errata.almalinux.org/9/ALSA-2025-20922.htmlALSA-2025:20922ALSA-2025:20922 5%webkit2gtk3-jsc-2.50.1-1.el9_7.x86_64.rpm6%webkit2gtk3-jsc-devel-2.50.1-1.el9_7.i686.rpm4%webkit2gtk3-devel-2.50.1-1.el9_7.i686.rpm3%webkit2gtk3-2.50.1-1.el9_7.x86_64.rpm3%webkit2gtk3-2.50.1-1.el9_7.i686.rpm4%webkit2gtk3-devel-2.50.1-1.el9_7.x86_64.rpm5%webkit2gtk3-jsc-2.50.1-1.el9_7.i686.rpm6%webkit2gtk3-jsc-devel-2.50.1-1.el9_7.x86_64.rpm5%webkit2gtk3-jsc-2.50.1-1.el9_7.x86_64.rpm6%webkit2gtk3-jsc-devel-2.50.1-1.el9_7.i686.rpm4%webkit2gtk3-devel-2.50.1-1.el9_7.i686.rpm3%webkit2gtk3-2.50.1-1.el9_7.x86_64.rpm3%webkit2gtk3-2.50.1-1.el9_7.i686.rpm4%webkit2gtk3-devel-2.50.1-1.el9_7.x86_64.rpm5%webkit2gtk3-jsc-2.50.1-1.el9_7.i686.rpm6%webkit2gtk3-jsc-devel-2.50.1-1.el9_7.x86_64.rpm>P =wBBBBsecurityImportant: redis security update https://access.redhat.com/errata/RHSA-2025:20926RHSA-2025:20926RHSA-2025:20926 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-20926.htmlALSA-2025:20926ALSA-2025:20926 Uredis-devel-6.2.20-2.el9_7.x86_64.rpm:redis-doc-6.2.20-2.el9_7.noarch.rpm6redis-6.2.20-2.el9_7.x86_64.rpmUredis-devel-6.2.20-2.el9_7.i686.rpmUredis-devel-6.2.20-2.el9_7.x86_64.rpm:redis-doc-6.2.20-2.el9_7.noarch.rpm6redis-6.2.20-2.el9_7.x86_64.rpmUredis-devel-6.2.20-2.el9_7.i686.rpmQ ~BBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security update,ghttps://access.redhat.com/errata/RHSA-2025:20928RHSA-2025:20928RHSA-2025:20928 https://access.redhat.com/security/cve/CVE-2025-7493CVE-2025-7493CVE-2025-7493https://bugzilla.redhat.com/23894482389448https://errata.almalinux.org/9/ALSA-2025-20928.htmlALSA-2025:20928ALSA-2025:20928 Mpython3-ipaclient-4.12.2-22.el9_7.1.noarch.rpmHipa-common-4.12.2-22.el9_7.1.noarch.rpmLipa-client-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpmDipa-client-epn-4.12.2-22.el9_7.1.x86_64.rpmKipa-server-dns-4.12.2-22.el9_7.1.noarch.rpmxipa-selinux-luna-4.12.2-22.el9_7.1.noarch.rpmNpython3-ipalib-4.12.2-22.el9_7.1.noarch.rpmGipa-client-common-4.12.2-22.el9_7.1.noarch.rpmIipa-selinux-4.12.2-22.el9_7.1.noarch.rpmMipa-server-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpmJipa-server-common-4.12.2-22.el9_7.1.noarch.rpmyipa-selinux-nfast-4.12.2-22.el9_7.1.noarch.rpmGipa-server-trust-ad-4.12.2-22.el9_7.1.x86_64.rpmCipa-client-4.12.2-22.el9_7.1.x86_64.rpmOpython3-ipaserver-4.12.2-22.el9_7.1.noarch.rpmFipa-server-4.12.2-22.el9_7.1.x86_64.rpmEipa-client-samba-4.12.2-22.el9_7.1.x86_64.rpmMpython3-ipaclient-4.12.2-22.el9_7.1.noarch.rpmHipa-common-4.12.2-22.el9_7.1.noarch.rpmLipa-client-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpmDipa-client-epn-4.12.2-22.el9_7.1.x86_64.rpmKipa-server-dns-4.12.2-22.el9_7.1.noarch.rpmxipa-selinux-luna-4.12.2-22.el9_7.1.noarch.rpmNpython3-ipalib-4.12.2-22.el9_7.1.noarch.rpmGipa-client-common-4.12.2-22.el9_7.1.noarch.rpmIipa-selinux-4.12.2-22.el9_7.1.noarch.rpmMipa-server-encrypted-dns-4.12.2-22.el9_7.1.x86_64.rpmJipa-server-common-4.12.2-22.el9_7.1.noarch.rpmyipa-selinux-nfast-4.12.2-22.el9_7.1.noarch.rpmGipa-server-trust-ad-4.12.2-22.el9_7.1.x86_64.rpmCipa-client-4.12.2-22.el9_7.1.x86_64.rpmOpython3-ipaserver-4.12.2-22.el9_7.1.noarch.rpmFipa-server-4.12.2-22.el9_7.1.x86_64.rpmEipa-client-samba-4.12.2-22.el9_7.1.x86_64.rpmɵ`R WsecurityImportant: squid security updateFhttps://access.redhat.com/errata/RHSA-2025:20935RHSA-2025:20935RHSA-2025:20935 https://access.redhat.com/security/cve/CVE-2025-62168CVE-2025-62168CVE-2025-62168https://bugzilla.redhat.com/24047362404736https://errata.almalinux.org/9/ALSA-2025-20935.htmlALSA-2025:20935ALSA-2025:20935 X|squid-5.5-22.el9_7.1.x86_64.rpmX|squid-5.5-22.el9_7.1.x86_64.rpmDS ZBBBBsecurityImportant: sqlite security updateY https://access.redhat.com/errata/RHSA-2025:20936RHSA-2025:20936RHSA-2025:20936 https://access.redhat.com/security/cve/CVE-2025-6965CVE-2025-6965CVE-2025-6965https://bugzilla.redhat.com/23801492380149https://errata.almalinux.org/9/ALSA-2025-20936.htmlALSA-2025:20936ALSA-2025:20936 )Wsqlite-3.34.1-9.el9_7.i686.rpm)Wsqlite-3.34.1-9.el9_7.x86_64.rpm*Wsqlite-devel-3.34.1-9.el9_7.i686.rpm*Wsqlite-devel-3.34.1-9.el9_7.x86_64.rpm)Wsqlite-3.34.1-9.el9_7.i686.rpm)Wsqlite-3.34.1-9.el9_7.x86_64.rpm*Wsqlite-devel-3.34.1-9.el9_7.i686.rpm*Wsqlite-devel-3.34.1-9.el9_7.x86_64.rpmT $aBsecurityModerate: libssh security updateb https://access.redhat.com/errata/RHSA-2025:20943RHSA-2025:20943RHSA-2025:20943 https://access.redhat.com/security/cve/CVE-2025-5318CVE-2025-5318CVE-2025-5318https://bugzilla.redhat.com/23691312369131https://errata.almalinux.org/9/ALSA-2025-20943.htmlALSA-2025:20943ALSA-2025:20943 jhlibssh-devel-0.10.4-15.el9_7.i686.rpmjhlibssh-devel-0.10.4-15.el9_7.x86_64.rpmjhlibssh-devel-0.10.4-15.el9_7.i686.rpmjhlibssh-devel-0.10.4-15.el9_7.x86_64.rpmBU +eBBBBsecurityModerate: vim security updatemzhttps://access.redhat.com/errata/RHSA-2025:20945RHSA-2025:20945RHSA-2025:20945 https://access.redhat.com/security/cve/CVE-2025-53905CVE-2025-53905CVE-2025-53905https://access.redhat.com/security/cve/CVE-2025-53906CVE-2025-53906CVE-2025-53906https://bugzilla.redhat.com/23803602380360https://bugzilla.redhat.com/23803622380362https://errata.almalinux.org/9/ALSA-2025-20945.htmlALSA-2025:20945ALSA-2025:20945 g]vim-common-8.2.2637-23.el9_7.x86_64.rpmh]vim-enhanced-8.2.2637-23.el9_7.x86_64.rpmf]vim-X11-8.2.2637-23.el9_7.x86_64.rpmg]vim-common-8.2.2637-23.el9_7.x86_64.rpmh]vim-enhanced-8.2.2637-23.el9_7.x86_64.rpmf]vim-X11-8.2.2637-23.el9_7.x86_64.rpmSV .lsecurityImportant: sssd security updateg/https://access.redhat.com/errata/RHSA-2025:20954RHSA-2025:20954RHSA-2025:20954 https://access.redhat.com/security/cve/CVE-2025-11561CVE-2025-11561CVE-2025-11561https://bugzilla.redhat.com/24027272402727https://errata.almalinux.org/9/ALSA-2025-20954.htmlALSA-2025:20954ALSA-2025:20954 [sssd-idp-2.9.7-4.el9_7.1.x86_64.rpm[sssd-idp-2.9.7-4.el9_7.1.x86_64.rpmɵW /QBBBsecurityImportant: redis:7 security update https://access.redhat.com/errata/RHSA-2025:20955RHSA-2025:20955RHSA-2025:20955 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-20955.htmlALSA-2025:20955ALSA-2025:20955 6c'U)redis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm6)redis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm:)redis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpm6c'U)redis-devel-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm6)redis-7.2.11-1.module_el9.6.0+188+92104ce8.x86_64.rpm:)redis-doc-7.2.11-1.module_el9.6.0+188+92104ce8.noarch.rpmX 6pBBBBsecurityImportant: libtiff security update1<https://access.redhat.com/errata/RHSA-2025:20956RHSA-2025:20956RHSA-2025:20956 https://access.redhat.com/security/cve/CVE-2025-8176CVE-2025-8176CVE-2025-8176https://access.redhat.com/security/cve/CVE-2025-9900CVE-2025-9900CVE-2025-9900https://bugzilla.redhat.com/23835982383598https://bugzilla.redhat.com/23927842392784https://errata.almalinux.org/9/ALSA-2025-20956.htmlALSA-2025:20956ALSA-2025:20956 u{libtiff-4.4.0-15.el9_7.2.i686.rpmv{libtiff-devel-4.4.0-15.el9_7.2.i686.rpmu{libtiff-4.4.0-15.el9_7.2.x86_64.rpmv{libtiff-devel-4.4.0-15.el9_7.2.x86_64.rpmu{libtiff-4.4.0-15.el9_7.2.i686.rpmv{libtiff-devel-4.4.0-15.el9_7.2.i686.rpmu{libtiff-4.4.0-15.el9_7.2.x86_64.rpmv{libtiff-devel-4.4.0-15.el9_7.2.x86_64.rpm0Y 9wsecurityImportant: runc security updatemhttps://access.redhat.com/errata/RHSA-2025:20957RHSA-2025:20957RHSA-2025:20957 https://access.redhat.com/security/cve/CVE-2025-31133CVE-2025-31133CVE-2025-31133https://access.redhat.com/security/cve/CVE-2025-52565CVE-2025-52565CVE-2025-52565https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047052404705https://bugzilla.redhat.com/24047082404708https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-20957.htmlALSA-2025:20957ALSA-2025:20957 W`runc-1.3.0-4.el9_7.x86_64.rpmW`runc-1.3.0-4.el9_7.x86_64.rpmjZ zBBBBBBBBBsecurityImportant: tigervnc security update thttps://access.redhat.com/errata/RHSA-2025:20958RHSA-2025:20958RHSA-2025:20958 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20958.htmlALSA-2025:20958ALSA-2025:20958 7}tigervnc-icons-1.15.0-6.el9_7.noarch.rpm8}tigervnc-license-1.15.0-6.el9_7.noarch.rpmp}tigervnc-server-minimal-1.15.0-6.el9_7.x86_64.rpmn}tigervnc-1.15.0-6.el9_7.x86_64.rpmo}tigervnc-server-1.15.0-6.el9_7.x86_64.rpmq}tigervnc-server-module-1.15.0-6.el9_7.x86_64.rpm9}tigervnc-selinux-1.15.0-6.el9_7.noarch.rpm7}tigervnc-icons-1.15.0-6.el9_7.noarch.rpm8}tigervnc-license-1.15.0-6.el9_7.noarch.rpmp}tigervnc-server-minimal-1.15.0-6.el9_7.x86_64.rpmn}tigervnc-1.15.0-6.el9_7.x86_64.rpmo}tigervnc-server-1.15.0-6.el9_7.x86_64.rpmq}tigervnc-server-module-1.15.0-6.el9_7.x86_64.rpm9}tigervnc-selinux-1.15.0-6.el9_7.noarch.rpmɵz[ FBBBBsecurityImportant: libsoup security update_https://access.redhat.com/errata/RHSA-2025:20959RHSA-2025:20959RHSA-2025:20959 https://access.redhat.com/security/cve/CVE-2025-11021CVE-2025-11021CVE-2025-11021https://access.redhat.com/security/cve/CVE-2025-4945CVE-2025-4945CVE-2025-4945https://bugzilla.redhat.com/23671752367175https://bugzilla.redhat.com/23996272399627https://errata.almalinux.org/9/ALSA-2025-20959.htmlALSA-2025:20959ALSA-2025:20959 >Nlibsoup-2.72.0-12.el9_7.1.i686.rpm?Nlibsoup-devel-2.72.0-12.el9_7.1.i686.rpm>Nlibsoup-2.72.0-12.el9_7.1.x86_64.rpm?Nlibsoup-devel-2.72.0-12.el9_7.1.x86_64.rpm>Nlibsoup-2.72.0-12.el9_7.1.i686.rpm?Nlibsoup-devel-2.72.0-12.el9_7.1.i686.rpm>Nlibsoup-2.72.0-12.el9_7.1.x86_64.rpm?Nlibsoup-devel-2.72.0-12.el9_7.1.x86_64.rpm+\ MsecurityModerate: xorg-x11-server-Xwayland security update_ https://access.redhat.com/errata/RHSA-2025:20960RHSA-2025:20960RHSA-2025:20960 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20960.htmlALSA-2025:20960ALSA-2025:20960 #$xorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpm#$xorg-x11-server-Xwayland-23.2.7-5.el9_7.x86_64.rpm1] PBBBBBBBBBBsecurityModerate: xorg-x11-server security updateiyhttps://access.redhat.com/errata/RHSA-2025:20961RHSA-2025:20961RHSA-2025:20961 https://access.redhat.com/security/cve/CVE-2025-62229CVE-2025-62229CVE-2025-62229https://access.redhat.com/security/cve/CVE-2025-62230CVE-2025-62230CVE-2025-62230https://access.redhat.com/security/cve/CVE-2025-62231CVE-2025-62231CVE-2025-62231https://bugzilla.redhat.com/24026492402649https://bugzilla.redhat.com/24026532402653https://bugzilla.redhat.com/24026602402660https://errata.almalinux.org/9/ALSA-2025-20961.htmlALSA-2025:20961ALSA-2025:20961  xorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpmxorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpm"xorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpm$xorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpmxorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpm!xorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpm xorg-x11-server-Xnest-1.20.11-32.el9_7.x86_64.rpmxorg-x11-server-Xephyr-1.20.11-32.el9_7.x86_64.rpm"xorg-x11-server-Xvfb-1.20.11-32.el9_7.x86_64.rpm$xorg-x11-server-common-1.20.11-32.el9_7.x86_64.rpmxorg-x11-server-Xdmx-1.20.11-32.el9_7.x86_64.rpm!xorg-x11-server-Xorg-1.20.11-32.el9_7.x86_64.rpm^ %]BBBBBBsecurityModerate: qt5-qt3d security updatebYhttps://access.redhat.com/errata/RHSA-2025:20963RHSA-2025:20963RHSA-2025:20963 https://access.redhat.com/security/cve/CVE-2025-11277CVE-2025-11277CVE-2025-11277https://bugzilla.redhat.com/24016222401622https://errata.almalinux.org/9/ALSA-2025-20963.htmlALSA-2025:20963ALSA-2025:20963 ALqt5-qt3d-5.15.9-2.el9_7.1.i686.rpmALqt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpmBLqt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpmyLqt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpmBLqt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpmALqt5-qt3d-5.15.9-2.el9_7.1.i686.rpmALqt5-qt3d-5.15.9-2.el9_7.1.x86_64.rpmBLqt5-qt3d-devel-5.15.9-2.el9_7.1.x86_64.rpmyLqt5-qt3d-examples-5.15.9-2.el9_7.1.x86_64.rpmBLqt5-qt3d-devel-5.15.9-2.el9_7.1.i686.rpmS_ 3fBBBBBBBBBBBsecurityImportant: bind security update;~https://access.redhat.com/errata/RHSA-2025:21110RHSA-2025:21110RHSA-2025:21110 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://errata.almalinux.org/9/ALSA-2025-21110.htmlALSA-2025:21110ALSA-2025:21110 ybind-dnssec-doc-9.16.23-34.el9_7.1.noarch.rpmGybind-dnssec-utils-9.16.23-34.el9_7.1.x86_64.rpmIybind-utils-9.16.23-34.el9_7.1.x86_64.rpmHybind-libs-9.16.23-34.el9_7.1.x86_64.rpmybind-license-9.16.23-34.el9_7.1.noarch.rpmFybind-chroot-9.16.23-34.el9_7.1.x86_64.rpmEybind-9.16.23-34.el9_7.1.x86_64.rpmypython3-bind-9.16.23-34.el9_7.1.noarch.rpmybind-dnssec-doc-9.16.23-34.el9_7.1.noarch.rpmGybind-dnssec-utils-9.16.23-34.el9_7.1.x86_64.rpmIybind-utils-9.16.23-34.el9_7.1.x86_64.rpmHybind-libs-9.16.23-34.el9_7.1.x86_64.rpmybind-license-9.16.23-34.el9_7.1.noarch.rpmFybind-chroot-9.16.23-34.el9_7.1.x86_64.rpmEybind-9.16.23-34.el9_7.1.x86_64.rpmypython3-bind-9.16.23-34.el9_7.1.noarch.rpm>` >tBBBBBBBBsecurityImportant: bind9.18 security update9phttps://access.redhat.com/errata/RHSA-2025:21111RHSA-2025:21111RHSA-2025:21111 https://access.redhat.com/security/cve/CVE-2025-40778CVE-2025-40778CVE-2025-40778https://access.redhat.com/security/cve/CVE-2025-40780CVE-2025-40780CVE-2025-40780https://access.redhat.com/security/cve/CVE-2025-8677CVE-2025-8677CVE-2025-8677https://bugzilla.redhat.com/24058272405827https://bugzilla.redhat.com/24058292405829https://bugzilla.redhat.com/24058302405830https://errata.almalinux.org/9/ALSA-2025-21111.htmlALSA-2025:21111ALSA-2025:21111  Xbind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpmXbind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpmXbind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpmXbind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpm Xbind9.18-9.18.29-5.el9_7.2.x86_64.rpm Xbind9.18-chroot-9.18.29-5.el9_7.2.x86_64.rpmXbind9.18-dnssec-utils-9.18.29-5.el9_7.2.x86_64.rpmXbind9.18-utils-9.18.29-5.el9_7.2.x86_64.rpmXbind9.18-libs-9.18.29-5.el9_7.2.x86_64.rpm Xbind9.18-9.18.29-5.el9_7.2.x86_64.rpmɵa ?securityImportant: python-kdcproxy security update)https://access.redhat.com/errata/RHSA-2025:21139RHSA-2025:21139RHSA-2025:21139 https://access.redhat.com/security/cve/CVE-2025-59088CVE-2025-59088CVE-2025-59088https://access.redhat.com/security/cve/CVE-2025-59089CVE-2025-59089CVE-2025-59089https://bugzilla.redhat.com/23939552393955https://bugzilla.redhat.com/23939582393958https://errata.almalinux.org/9/ALSA-2025-21139.htmlALSA-2025:21139ALSA-2025:21139 ]Rpython3-kdcproxy-1.0.0-9.el9_7.noarch.rpm]Rpython3-kdcproxy-1.0.0-9.el9_7.noarch.rpmKb ABBBsecurityModerate: openssl security updateHZhttps://access.redhat.com/errata/RHSA-2025:21255RHSA-2025:21255RHSA-2025:21255 https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2025-21255.htmlALSA-2025:21255ALSA-2025:21255 /openssl-devel-3.5.1-4.el9_7.i686.rpm/openssl-devel-3.5.1-4.el9_7.x86_64.rpmm/openssl-perl-3.5.1-4.el9_7.x86_64.rpm/openssl-devel-3.5.1-4.el9_7.i686.rpm/openssl-devel-3.5.1-4.el9_7.x86_64.rpmm/openssl-perl-3.5.1-4.el9_7.x86_64.rpmɵsc GBBsecurityImportant: firefox security update"https://access.redhat.com/errata/RHSA-2025:21280RHSA-2025:21280RHSA-2025:21280 https://access.redhat.com/security/cve/CVE-2025-13012CVE-2025-13012CVE-2025-13012https://access.redhat.com/security/cve/CVE-2025-13013CVE-2025-13013CVE-2025-13013https://access.redhat.com/security/cve/CVE-2025-13014CVE-2025-13014CVE-2025-13014https://access.redhat.com/security/cve/CVE-2025-13015CVE-2025-13015CVE-2025-13015https://access.redhat.com/security/cve/CVE-2025-13016CVE-2025-13016CVE-2025-13016https://access.redhat.com/security/cve/CVE-2025-13017CVE-2025-13017CVE-2025-13017https://access.redhat.com/security/cve/CVE-2025-13018CVE-2025-13018CVE-2025-13018https://access.redhat.com/security/cve/CVE-2025-13019CVE-2025-13019CVE-2025-13019https://access.redhat.com/security/cve/CVE-2025-13020CVE-2025-13020CVE-2025-13020https://bugzilla.redhat.com/24140792414079https://bugzilla.redhat.com/24140802414080https://bugzilla.redhat.com/24140832414083https://bugzilla.redhat.com/24140842414084https://bugzilla.redhat.com/24140852414085https://bugzilla.redhat.com/24140862414086https://bugzilla.redhat.com/24140902414090https://bugzilla.redhat.com/24140912414091https://bugzilla.redhat.com/24140922414092https://errata.almalinux.org/9/ALSA-2025-21280.htmlALSA-2025:21280ALSA-2025:21280 7`firefox-140.5.0-1.el9_7.alma.1.x86_64.rpmO`firefox-x11-140.5.0-1.el9_7.alma.1.x86_64.rpm7`firefox-140.5.0-1.el9_7.alma.1.x86_64.rpmO`firefox-x11-140.5.0-1.el9_7.alma.1.x86_64.rpmɑ>d LBBBsecurityCritical: lasso security update;=$https://access.redhat.com/errata/RHSA-2025:21462RHSA-2025:21462RHSA-2025:21462 https://access.redhat.com/security/cve/CVE-2025-47151CVE-2025-47151CVE-2025-47151https://bugzilla.redhat.com/24127392412739https://errata.almalinux.org/9/ALSA-2025-21462.htmlALSA-2025:21462ALSA-2025:21462 5lasso-2.7.0-11.el9_7.3.x86_64.rpm5lasso-2.7.0-11.el9_7.3.i686.rpmq5python3-lasso-2.7.0-11.el9_7.3.x86_64.rpm5lasso-2.7.0-11.el9_7.3.x86_64.rpm5lasso-2.7.0-11.el9_7.3.i686.rpmq5python3-lasso-2.7.0-11.el9_7.3.x86_64.rpm e RsecurityImportant: haproxy security updatea$https://access.redhat.com/errata/RHSA-2025:21693RHSA-2025:21693RHSA-2025:21693 https://access.redhat.com/security/cve/CVE-2025-11230CVE-2025-11230CVE-2025-11230https://bugzilla.redhat.com/24130032413003https://errata.almalinux.org/9/ALSA-2025-21693.htmlALSA-2025:21693ALSA-2025:21693 haproxy-2.8.14-1.el9_7.1.x86_64.rpmhaproxy-2.8.14-1.el9_7.1.x86_64.rpmyf UBBBBBBBsecurityImportant: podman security updatehttps://access.redhat.com/errata/RHSA-2025:21702RHSA-2025:21702RHSA-2025:21702 https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://bugzilla.redhat.com/24047152404715https://errata.almalinux.org/9/ALSA-2025-21702.htmlALSA-2025:21702ALSA-2025:21702 0podman-tests-5.6.0-7.el9_7.x86_64.rpmfpodman-docker-5.6.0-7.el9_7.noarch.rpm/podman-remote-5.6.0-7.el9_7.x86_64.rpm-podman-5.6.0-7.el9_7.x86_64.rpm.podman-plugins-5.6.0-7.el9_7.x86_64.rpm0podman-tests-5.6.0-7.el9_7.x86_64.rpmfpodman-docker-5.6.0-7.el9_7.noarch.rpm/podman-remote-5.6.0-7.el9_7.x86_64.rpm-podman-5.6.0-7.el9_7.x86_64.rpm.podman-plugins-5.6.0-7.el9_7.x86_64.rpm1g -_BBBBBBBBBBBBsecurityModerate: delve and golang security updatePhttps://access.redhat.com/errata/RHSA-2025:21815RHSA-2025:21815RHSA-2025:21815 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-21815.htmlALSA-2025:21815ALSA-2025:21815 8golang-race-1.25.3-1.el9_7.x86_64.rpmmgolang-misc-1.25.3-1.el9_7.noarch.rpmlgolang-docs-1.25.3-1.el9_7.noarch.rpmngolang-src-1.25.3-1.el9_7.noarch.rpm>delve-1.25.2-1.el9_7.x86_64.rpm@golang-1.25.3-1.el9_7.x86_64.rpmEgo-toolset-1.25.3-1.el9_7.x86_64.rpmogolang-tests-1.25.3-1.el9_7.noarch.rpmAgolang-bin-1.25.3-1.el9_7.x86_64.rpm 8golang-race-1.25.3-1.el9_7.x86_64.rpmmgolang-misc-1.25.3-1.el9_7.noarch.rpmlgolang-docs-1.25.3-1.el9_7.noarch.rpmngolang-src-1.25.3-1.el9_7.noarch.rpm>delve-1.25.2-1.el9_7.x86_64.rpm@golang-1.25.3-1.el9_7.x86_64.rpmEgo-toolset-1.25.3-1.el9_7.x86_64.rpmogolang-tests-1.25.3-1.el9_7.noarch.rpmAgolang-bin-1.25.3-1.el9_7.x86_64.rpm(h 2nBBsecurityImportant: valkey security updatei: https://access.redhat.com/errata/RHSA-2025:21916RHSA-2025:21916RHSA-2025:21916 https://access.redhat.com/security/cve/CVE-2025-46817CVE-2025-46817CVE-2025-46817https://access.redhat.com/security/cve/CVE-2025-46818CVE-2025-46818CVE-2025-46818https://access.redhat.com/security/cve/CVE-2025-46819CVE-2025-46819CVE-2025-46819https://access.redhat.com/security/cve/CVE-2025-49844CVE-2025-49844CVE-2025-49844https://bugzilla.redhat.com/24012582401258https://bugzilla.redhat.com/24012922401292https://bugzilla.redhat.com/24013222401322https://bugzilla.redhat.com/24013242401324https://errata.almalinux.org/9/ALSA-2025-21916.htmlALSA-2025:21916ALSA-2025:21916 ^4valkey-8.0.6-2.el9_7.x86_64.rpm_4valkey-devel-8.0.6-2.el9_7.x86_64.rpm^4valkey-8.0.6-2.el9_7.x86_64.rpm_4valkey-devel-8.0.6-2.el9_7.x86_64.rpmɵ(i sBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update#https://access.redhat.com/errata/RHSA-2025:21926RHSA-2025:21926RHSA-2025:21926 https://access.redhat.com/security/cve/CVE-2025-39843CVE-2025-39843CVE-2025-39843https://bugzilla.redhat.com/23969412396941https://errata.almalinux.org/9/ALSA-2025-21926.htmlALSA-2025:21926ALSA-2025:21926 Mtpython3-perf-5.14.0-611.9.1.el9_7.x86_64.rpm$tkernel-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm%tperf-5.14.0-611.9.1.el9_7.x86_64.rpmtkernel-doc-5.14.0-611.9.1.el9_7.noarch.rpm*trv-5.14.0-611.9.1.el9_7.x86_64.rpm"tkernel-debug-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm)trtla-5.14.0-611.9.1.el9_7.x86_64.rpm!tkernel-debug-devel-5.14.0-611.9.1.el9_7.x86_64.rpm(tkernel-headers-5.14.0-611.9.1.el9_7.x86_64.rpm#tkernel-devel-5.14.0-611.9.1.el9_7.x86_64.rpm Mtpython3-perf-5.14.0-611.9.1.el9_7.x86_64.rpm$tkernel-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm%tperf-5.14.0-611.9.1.el9_7.x86_64.rpmtkernel-doc-5.14.0-611.9.1.el9_7.noarch.rpm*trv-5.14.0-611.9.1.el9_7.x86_64.rpm"tkernel-debug-devel-matched-5.14.0-611.9.1.el9_7.x86_64.rpm)trtla-5.14.0-611.9.1.el9_7.x86_64.rpm!tkernel-debug-devel-5.14.0-611.9.1.el9_7.x86_64.rpm(tkernel-headers-5.14.0-611.9.1.el9_7.x86_64.rpm#tkernel-devel-5.14.0-611.9.1.el9_7.x86_64.rpmɵBj GBBBsecurityImportant: gimp security update"\https://access.redhat.com/errata/RHSA-2025:21968RHSA-2025:21968RHSA-2025:21968 https://access.redhat.com/security/cve/CVE-2025-10920CVE-2025-10920CVE-2025-10920https://access.redhat.com/security/cve/CVE-2025-10921CVE-2025-10921CVE-2025-10921https://access.redhat.com/security/cve/CVE-2025-10922CVE-2025-10922CVE-2025-10922https://access.redhat.com/security/cve/CVE-2025-10923CVE-2025-10923CVE-2025-10923https://access.redhat.com/security/cve/CVE-2025-10924CVE-2025-10924CVE-2025-10924https://access.redhat.com/security/cve/CVE-2025-10925CVE-2025-10925CVE-2025-10925https://access.redhat.com/security/cve/CVE-2025-10934CVE-2025-10934CVE-2025-10934https://bugzilla.redhat.com/24071882407188https://bugzilla.redhat.com/24071912407191https://bugzilla.redhat.com/24071922407192https://bugzilla.redhat.com/24071942407194https://bugzilla.redhat.com/24071992407199https://bugzilla.redhat.com/24072002407200https://bugzilla.redhat.com/24072332407233https://errata.almalinux.org/9/ALSA-2025-21968.htmlALSA-2025:21968ALSA-2025:21968 c?gimp-3.0.4-1.el9_7.1.x86_64.rpm?gimp-libs-3.0.4-1.el9_7.1.x86_64.rpm?gimp-libs-3.0.4-1.el9_7.1.i686.rpmc?gimp-3.0.4-1.el9_7.1.x86_64.rpm?gimp-libs-3.0.4-1.el9_7.1.x86_64.rpm?gimp-libs-3.0.4-1.el9_7.1.i686.rpmɵk MBBBBsecurityModerate: go-rpm-macros security update~https://access.redhat.com/errata/RHSA-2025:22005RHSA-2025:22005RHSA-2025:22005 https://access.redhat.com/security/cve/CVE-2025-47906CVE-2025-47906CVE-2025-47906https://bugzilla.redhat.com/23965462396546https://errata.almalinux.org/9/ALSA-2025-22005.htmlALSA-2025:22005ALSA-2025:22005 JZgo-rpm-macros-3.6.0-12.el9_7.x86_64.rpm&Zgo-rpm-templates-3.6.0-12.el9_7.noarch.rpm'Zgo-srpm-macros-3.6.0-12.el9_7.noarch.rpmIZgo-filesystem-3.6.0-12.el9_7.x86_64.rpmJZgo-rpm-macros-3.6.0-12.el9_7.x86_64.rpm&Zgo-rpm-templates-3.6.0-12.el9_7.noarch.rpm'Zgo-srpm-macros-3.6.0-12.el9_7.noarch.rpmIZgo-filesystem-3.6.0-12.el9_7.x86_64.rpmɖ&l TBBsecurityImportant: buildah security updatehttps://access.redhat.com/errata/RHSA-2025:22011RHSA-2025:22011RHSA-2025:22011 https://access.redhat.com/security/cve/CVE-2025-52881CVE-2025-52881CVE-2025-52881https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24047152404715https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-22011.htmlALSA-2025:22011ALSA-2025:22011 <buildah-1.41.6-1.el9_7.x86_64.rpm=buildah-tests-1.41.6-1.el9_7.x86_64.rpm<buildah-1.41.6-1.el9_7.x86_64.rpm=buildah-tests-1.41.6-1.el9_7.x86_64.rpmɖ`m YBsecurityImportant: expat security update&https://access.redhat.com/errata/RHSA-2025:22175RHSA-2025:22175RHSA-2025:22175 https://access.redhat.com/security/cve/CVE-2025-59375CVE-2025-59375CVE-2025-59375https://bugzilla.redhat.com/23951082395108https://errata.almalinux.org/9/ALSA-2025-22175.htmlALSA-2025:22175ALSA-2025:22175 (expat-devel-2.5.0-5.el9_7.1.x86_64.rpm(expat-devel-2.5.0-5.el9_7.1.i686.rpm(expat-devel-2.5.0-5.el9_7.1.x86_64.rpm(expat-devel-2.5.0-5.el9_7.1.i686.rpmn ]BsecurityModerate: libxml2 security update.,https://access.redhat.com/errata/RHSA-2025:22376RHSA-2025:22376RHSA-2025:22376 https://access.redhat.com/security/cve/CVE-2025-9714CVE-2025-9714CVE-2025-9714https://bugzilla.redhat.com/23926052392605https://errata.almalinux.org/9/ALSA-2025-22376.htmlALSA-2025:22376ALSA-2025:22376 >3libxml2-devel-2.9.13-14.el9_7.i686.rpm>3libxml2-devel-2.9.13-14.el9_7.x86_64.rpm>3libxml2-devel-2.9.13-14.el9_7.i686.rpm>3libxml2-devel-2.9.13-14.el9_7.x86_64.rpmo 4aBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateZ;https://access.redhat.com/errata/RHSA-2025:22405RHSA-2025:22405RHSA-2025:22405 https://access.redhat.com/security/cve/CVE-2025-38724CVE-2025-38724CVE-2025-38724https://access.redhat.com/security/cve/CVE-2025-39864CVE-2025-39864CVE-2025-39864https://access.redhat.com/security/cve/CVE-2025-39898CVE-2025-39898CVE-2025-39898https://access.redhat.com/security/cve/CVE-2025-39918CVE-2025-39918CVE-2025-39918https://access.redhat.com/security/cve/CVE-2025-39955CVE-2025-39955CVE-2025-39955https://access.redhat.com/security/cve/CVE-2025-39981CVE-2025-39981CVE-2025-39981https://access.redhat.com/security/cve/CVE-2025-40058CVE-2025-40058CVE-2025-40058https://access.redhat.com/security/cve/CVE-2025-40185CVE-2025-40185CVE-2025-40185https://bugzilla.redhat.com/23931722393172https://bugzilla.redhat.com/23969342396934https://bugzilla.redhat.com/24005982400598https://bugzilla.redhat.com/24006282400628https://bugzilla.redhat.com/24026992402699https://bugzilla.redhat.com/24041052404105https://bugzilla.redhat.com/24067762406776https://bugzilla.redhat.com/24147412414741https://errata.almalinux.org/9/ALSA-2025-22405.htmlALSA-2025:22405ALSA-2025:22405 (ckernel-headers-5.14.0-611.11.1.el9_7.x86_64.rpm!ckernel-debug-devel-5.14.0-611.11.1.el9_7.x86_64.rpm)crtla-5.14.0-611.11.1.el9_7.x86_64.rpm#ckernel-devel-5.14.0-611.11.1.el9_7.x86_64.rpmMcpython3-perf-5.14.0-611.11.1.el9_7.x86_64.rpm$ckernel-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm%cperf-5.14.0-611.11.1.el9_7.x86_64.rpm"ckernel-debug-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm*crv-5.14.0-611.11.1.el9_7.x86_64.rpmckernel-doc-5.14.0-611.11.1.el9_7.noarch.rpm (ckernel-headers-5.14.0-611.11.1.el9_7.x86_64.rpm!ckernel-debug-devel-5.14.0-611.11.1.el9_7.x86_64.rpm)crtla-5.14.0-611.11.1.el9_7.x86_64.rpm#ckernel-devel-5.14.0-611.11.1.el9_7.x86_64.rpmMcpython3-perf-5.14.0-611.11.1.el9_7.x86_64.rpm$ckernel-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm%cperf-5.14.0-611.11.1.el9_7.x86_64.rpm"ckernel-debug-devel-matched-5.14.0-611.11.1.el9_7.x86_64.rpm*crv-5.14.0-611.11.1.el9_7.x86_64.rpmckernel-doc-5.14.0-611.11.1.el9_7.noarch.rpmۅip =uBBBBBBsecurityModerate: systemd security update)https://access.redhat.com/errata/RHSA-2025:22660RHSA-2025:22660RHSA-2025:22660 https://access.redhat.com/security/cve/CVE-2025-4598CVE-2025-4598CVE-2025-4598https://bugzilla.redhat.com/23692422369242https://errata.almalinux.org/9/ALSA-2025-22660.htmlALSA-2025:22660ALSA-2025:22660  Dsystemd-boot-unsigned-252-55.el9_7.7.alma.1.x86_64.rpm+Dsystemd-devel-252-55.el9_7.7.alma.1.x86_64.rpm}Dsystemd-journal-remote-252-55.el9_7.7.alma.1.x86_64.rpm+Dsystemd-devel-252-55.el9_7.7.alma.1.i686.rpmtDsystemd-ukify-252-55.el9_7.7.alma.1.noarch.rpm Dsystemd-boot-unsigned-252-55.el9_7.7.alma.1.x86_64.rpm+Dsystemd-devel-252-55.el9_7.7.alma.1.x86_64.rpm}Dsystemd-journal-remote-252-55.el9_7.7.alma.1.x86_64.rpm+Dsystemd-devel-252-55.el9_7.7.alma.1.i686.rpmtDsystemd-ukify-252-55.el9_7.7.alma.1.noarch.rpmƗ@q ~BBBBBBBBBBsecurityImportant: webkit2gtk3 security update>f&https://access.redhat.com/errata/RHSA-2025:22790RHSA-2025:22790RHSA-2025:22790 https://access.redhat.com/security/cve/CVE-2023-43000CVE-2023-43000CVE-2023-43000https://access.redhat.com/security/cve/CVE-2025-13502CVE-2025-13502CVE-2025-13502https://access.redhat.com/security/cve/CVE-2025-13947CVE-2025-13947CVE-2025-13947https://access.redhat.com/security/cve/CVE-2025-43392CVE-2025-43392CVE-2025-43392https://access.redhat.com/security/cve/CVE-2025-43419CVE-2025-43419CVE-2025-43419https://access.redhat.com/security/cve/CVE-2025-43421CVE-2025-43421CVE-2025-43421https://access.redhat.com/security/cve/CVE-2025-43425CVE-2025-43425CVE-2025-43425https://access.redhat.com/security/cve/CVE-2025-43427CVE-2025-43427CVE-2025-43427https://access.redhat.com/security/cve/CVE-2025-43429CVE-2025-43429CVE-2025-43429https://access.redhat.com/security/cve/CVE-2025-43430CVE-2025-43430CVE-2025-43430https://access.redhat.com/security/cve/CVE-2025-43431CVE-2025-43431CVE-2025-43431https://access.redhat.com/security/cve/CVE-2025-43432CVE-2025-43432CVE-2025-43432https://access.redhat.com/security/cve/CVE-2025-43434CVE-2025-43434CVE-2025-43434https://access.redhat.com/security/cve/CVE-2025-43440CVE-2025-43440CVE-2025-43440https://access.redhat.com/security/cve/CVE-2025-43443CVE-2025-43443CVE-2025-43443https://access.redhat.com/security/cve/CVE-2025-43458CVE-2025-43458CVE-2025-43458https://access.redhat.com/security/cve/CVE-2025-43480CVE-2025-43480CVE-2025-43480https://access.redhat.com/security/cve/CVE-2025-66287CVE-2025-66287CVE-2025-66287https://bugzilla.redhat.com/24163002416300https://bugzilla.redhat.com/24163242416324https://bugzilla.redhat.com/24163252416325https://bugzilla.redhat.com/24163262416326https://bugzilla.redhat.com/24163272416327https://bugzilla.redhat.com/24163292416329https://bugzilla.redhat.com/24163302416330https://bugzilla.redhat.com/24163312416331https://bugzilla.redhat.com/24163322416332https://bugzilla.redhat.com/24163342416334https://bugzilla.redhat.com/24163352416335https://bugzilla.redhat.com/24163362416336https://bugzilla.redhat.com/24163372416337https://bugzilla.redhat.com/24163382416338https://bugzilla.redhat.com/24163552416355https://bugzilla.redhat.com/24185762418576https://bugzilla.redhat.com/24188552418855https://bugzilla.redhat.com/24188572418857https://errata.almalinux.org/9/ALSA-2025-22790.htmlALSA-2025:22790ALSA-2025:22790 6&webkit2gtk3-jsc-devel-2.50.3-1.el9_7.x86_64.rpm4&webkit2gtk3-devel-2.50.3-1.el9_7.i686.rpm3&webkit2gtk3-2.50.3-1.el9_7.x86_64.rpm5&webkit2gtk3-jsc-2.50.3-1.el9_7.x86_64.rpm4&webkit2gtk3-devel-2.50.3-1.el9_7.x86_64.rpm6&webkit2gtk3-jsc-devel-2.50.3-1.el9_7.i686.rpm5&webkit2gtk3-jsc-2.50.3-1.el9_7.i686.rpm3&webkit2gtk3-2.50.3-1.el9_7.i686.rpm6&webkit2gtk3-jsc-devel-2.50.3-1.el9_7.x86_64.rpm4&webkit2gtk3-devel-2.50.3-1.el9_7.i686.rpm3&webkit2gtk3-2.50.3-1.el9_7.x86_64.rpm5&webkit2gtk3-jsc-2.50.3-1.el9_7.x86_64.rpm4&webkit2gtk3-devel-2.50.3-1.el9_7.x86_64.rpm6&webkit2gtk3-jsc-devel-2.50.3-1.el9_7.i686.rpm5&webkit2gtk3-jsc-2.50.3-1.el9_7.i686.rpm3&webkit2gtk3-2.50.3-1.el9_7.i686.rpm۴8r KBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update$Shttps://access.redhat.com/errata/RHSA-2025:22865RHSA-2025:22865RHSA-2025:22865 https://access.redhat.com/security/cve/CVE-2025-39925CVE-2025-39925CVE-2025-39925https://access.redhat.com/security/cve/CVE-2025-39979CVE-2025-39979CVE-2025-39979https://bugzilla.redhat.com/24006292400629https://bugzilla.redhat.com/24041092404109https://errata.almalinux.org/9/ALSA-2025-22865.htmlALSA-2025:22865ALSA-2025:22865 dkernel-doc-5.14.0-611.13.1.el9_7.noarch.rpm)drtla-5.14.0-611.13.1.el9_7.x86_64.rpm"dkernel-debug-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm$dkernel-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm#dkernel-devel-5.14.0-611.13.1.el9_7.x86_64.rpm%dperf-5.14.0-611.13.1.el9_7.x86_64.rpm(dkernel-headers-5.14.0-611.13.1.el9_7.x86_64.rpmMdpython3-perf-5.14.0-611.13.1.el9_7.x86_64.rpm*drv-5.14.0-611.13.1.el9_7.x86_64.rpm!dkernel-debug-devel-5.14.0-611.13.1.el9_7.x86_64.rpm dkernel-doc-5.14.0-611.13.1.el9_7.noarch.rpm)drtla-5.14.0-611.13.1.el9_7.x86_64.rpm"dkernel-debug-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm$dkernel-devel-matched-5.14.0-611.13.1.el9_7.x86_64.rpm#dkernel-devel-5.14.0-611.13.1.el9_7.x86_64.rpm%dperf-5.14.0-611.13.1.el9_7.x86_64.rpm(dkernel-headers-5.14.0-611.13.1.el9_7.x86_64.rpmMdpython3-perf-5.14.0-611.13.1.el9_7.x86_64.rpm*drv-5.14.0-611.13.1.el9_7.x86_64.rpm!dkernel-debug-devel-5.14.0-611.13.1.el9_7.x86_64.rpmʊ s #_BBsecurityImportant: firefox security updatewohttps://access.redhat.com/errata/RHSA-2025:23034RHSA-2025:23034RHSA-2025:23034 https://access.redhat.com/security/cve/CVE-2025-14321CVE-2025-14321CVE-2025-14321https://access.redhat.com/security/cve/CVE-2025-14322CVE-2025-14322CVE-2025-14322https://access.redhat.com/security/cve/CVE-2025-14323CVE-2025-14323CVE-2025-14323https://access.redhat.com/security/cve/CVE-2025-14324CVE-2025-14324CVE-2025-14324https://access.redhat.com/security/cve/CVE-2025-14325CVE-2025-14325CVE-2025-14325https://access.redhat.com/security/cve/CVE-2025-14328CVE-2025-14328CVE-2025-14328https://access.redhat.com/security/cve/CVE-2025-14329CVE-2025-14329CVE-2025-14329https://access.redhat.com/security/cve/CVE-2025-14330CVE-2025-14330CVE-2025-14330https://access.redhat.com/security/cve/CVE-2025-14331CVE-2025-14331CVE-2025-14331https://access.redhat.com/security/cve/CVE-2025-14333CVE-2025-14333CVE-2025-14333https://bugzilla.redhat.com/24205022420502https://bugzilla.redhat.com/24205032420503https://bugzilla.redhat.com/24205042420504https://bugzilla.redhat.com/24205062420506https://bugzilla.redhat.com/24205082420508https://bugzilla.redhat.com/24205092420509https://bugzilla.redhat.com/24205122420512https://bugzilla.redhat.com/24205132420513https://bugzilla.redhat.com/24205162420516https://bugzilla.redhat.com/24205172420517https://errata.almalinux.org/9/ALSA-2025-23034.htmlALSA-2025:23034ALSA-2025:23034 OPfirefox-x11-140.6.0-1.el9_7.alma.1.x86_64.rpm7Pfirefox-140.6.0-1.el9_7.alma.1.x86_64.rpmOPfirefox-x11-140.6.0-1.el9_7.alma.1.x86_64.rpm7Pfirefox-140.6.0-1.el9_7.alma.1.x86_64.rpmt ,dBBBBBBsecurityImportant: tomcat security updatef https://access.redhat.com/errata/RHSA-2025:23049RHSA-2025:23049RHSA-2025:23049 https://access.redhat.com/security/cve/CVE-2025-31651CVE-2025-31651CVE-2025-31651https://access.redhat.com/security/cve/CVE-2025-55752CVE-2025-55752CVE-2025-55752https://bugzilla.redhat.com/23627822362782https://bugzilla.redhat.com/24065912406591https://errata.almalinux.org/9/ALSA-2025-23049.htmlALSA-2025:23049ALSA-2025:23049 n&tomcat-webapps-9.0.87-6.el9_7.1.noarch.rpmg&tomcat-9.0.87-6.el9_7.1.noarch.rpmk&tomcat-jsp-2.3-api-9.0.87-6.el9_7.1.noarch.rpml&tomcat-lib-9.0.87-6.el9_7.1.noarch.rpmi&tomcat-docs-webapp-9.0.87-6.el9_7.1.noarch.rpmj&tomcat-el-3.0-api-9.0.87-6.el9_7.1.noarch.rpmh&tomcat-admin-webapps-9.0.87-6.el9_7.1.noarch.rpmm&tomcat-servlet-4.0-api-9.0.87-6.el9_7.1.noarch.rpmn&tomcat-webapps-9.0.87-6.el9_7.1.noarch.rpmg&tomcat-9.0.87-6.el9_7.1.noarch.rpmk&tomcat-jsp-2.3-api-9.0.87-6.el9_7.1.noarch.rpml&tomcat-lib-9.0.87-6.el9_7.1.noarch.rpmi&tomcat-docs-webapp-9.0.87-6.el9_7.1.noarch.rpmj&tomcat-el-3.0-api-9.0.87-6.el9_7.1.noarch.rpmh&tomcat-admin-webapps-9.0.87-6.el9_7.1.noarch.rpmm&tomcat-servlet-4.0-api-9.0.87-6.el9_7.1.noarch.rpmʊu mBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: ruby:3.3 security update&o`https://access.redhat.com/errata/RHSA-2025:23063RHSA-2025:23063RHSA-2025:23063 https://access.redhat.com/security/cve/CVE-2025-24294CVE-2025-24294CVE-2025-24294https://access.redhat.com/security/cve/CVE-2025-58767CVE-2025-58767CVE-2025-58767https://access.redhat.com/security/cve/CVE-2025-61594CVE-2025-61594CVE-2025-61594https://bugzilla.redhat.com/23796842379684https://bugzilla.redhat.com/23961862396186https://errata.almalinux.org/9/ALSA-2025-23063.htmlALSA-2025:23063ALSA-2025:23063 "t '&DOrubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.x86_64.rpm"hruby-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmTFrubygem-typeprof-0.21.9-5.module_el9.7.0+193+58179166.noarch.rpmMPrubygem-minitest-5.20.0-5.module_el9.7.0+193+58179166.noarch.rpm*mrubygem-mysql2-doc-0.5.5-3.module_el9.7.0+184+e2e36072.noarch.rpmAArubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.x86_64.rpmErubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.i686.rpmp}rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpmOrubygem-rake-13.1.0-5.module_el9.7.0+193+58179166.noarch.rpmhruby-libs-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmAArubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.i686.rpmBqrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.x86_64.rpmErubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.x86_64.rpmhruby-doc-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpmC/rubygem-json-2.7.2-5.module_el9.7.0+193+58179166.x86_64.rpmnmrubygem-mysql2-0.5.5-3.module_el9.7.0+184+e2e36072.x86_64.rpmP[rubygem-rdoc-6.6.3.1-5.module_el9.7.0+193+58179166.noarch.rpmNrubygem-power_assert-2.0.3-5.module_el9.7.0+193+58179166.noarch.rpmo}rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm"hruby-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmUyrubygems-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpm hruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmC/rubygem-json-2.7.2-5.module_el9.7.0+193+58179166.i686.rpmK#rubygem-bundler-2.5.22-5.module_el9.7.0+193+58179166.noarch.rpm/ rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.i686.rpm/ rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.x86_64.rpmDOrubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.i686.rpmL]rubygem-irb-1.13.1-5.module_el9.7.0+193+58179166.noarch.rpmRJrubygem-rss-0.3.1-5.module_el9.7.0+193+58179166.noarch.rpmVyrubygems-devel-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpm hruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmhruby-libs-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmBqrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.i686.rpmJhruby-default-gems-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpmQ=rubygem-rexml-3.4.4-5.module_el9.7.0+193+58179166.noarch.rpmSCrubygem-test-unit-3.6.1-5.module_el9.7.0+193+58179166.noarch.rpmhruby-devel-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmhruby-devel-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpm"t '&DOrubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.x86_64.rpm"hruby-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmTFrubygem-typeprof-0.21.9-5.module_el9.7.0+193+58179166.noarch.rpmMPrubygem-minitest-5.20.0-5.module_el9.7.0+193+58179166.noarch.rpm*mrubygem-mysql2-doc-0.5.5-3.module_el9.7.0+184+e2e36072.noarch.rpmAArubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.x86_64.rpmErubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.i686.rpmp}rubygem-pg-doc-1.5.4-1.module_el9.4.0+75+1a8fe981.noarch.rpmOrubygem-rake-13.1.0-5.module_el9.7.0+193+58179166.noarch.rpmhruby-libs-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmAArubygem-bigdecimal-3.1.5-5.module_el9.7.0+193+58179166.i686.rpmBqrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.x86_64.rpmErubygem-rbs-3.4.0-5.module_el9.7.0+193+58179166.x86_64.rpmhruby-doc-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpmC/rubygem-json-2.7.2-5.module_el9.7.0+193+58179166.x86_64.rpmnmrubygem-mysql2-0.5.5-3.module_el9.7.0+184+e2e36072.x86_64.rpmP[rubygem-rdoc-6.6.3.1-5.module_el9.7.0+193+58179166.noarch.rpmNrubygem-power_assert-2.0.3-5.module_el9.7.0+193+58179166.noarch.rpmo}rubygem-pg-1.5.4-1.module_el9.4.0+75+1a8fe981.x86_64.rpm"hruby-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmUyrubygems-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpm hruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmC/rubygem-json-2.7.2-5.module_el9.7.0+193+58179166.i686.rpmK#rubygem-bundler-2.5.22-5.module_el9.7.0+193+58179166.noarch.rpm/ rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.i686.rpm/ rubygem-racc-1.7.3-5.module_el9.7.0+193+58179166.x86_64.rpmDOrubygem-psych-5.1.2-5.module_el9.7.0+193+58179166.i686.rpmL]rubygem-irb-1.13.1-5.module_el9.7.0+193+58179166.noarch.rpmRJrubygem-rss-0.3.1-5.module_el9.7.0+193+58179166.noarch.rpmVyrubygems-devel-3.5.22-5.module_el9.7.0+193+58179166.noarch.rpm hruby-bundled-gems-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmhruby-libs-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmBqrubygem-io-console-0.7.1-5.module_el9.7.0+193+58179166.i686.rpmJhruby-default-gems-3.3.10-5.module_el9.7.0+193+58179166.noarch.rpmQ=rubygem-rexml-3.4.4-5.module_el9.7.0+193+58179166.noarch.rpmSCrubygem-test-unit-3.6.1-5.module_el9.7.0+193+58179166.noarch.rpmhruby-devel-3.3.10-5.module_el9.7.0+193+58179166.i686.rpmhruby-devel-3.3.10-5.module_el9.7.0+193+58179166.x86_64.rpmYv !]BBsecurityModerate: grafana security updateO"https://access.redhat.com/errata/RHSA-2025:23087RHSA-2025:23087RHSA-2025:23087 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23087.htmlALSA-2025:23087ALSA-2025:23087 FCgrafana-10.2.6-17.el9_7.x86_64.rpmlCgrafana-selinux-10.2.6-17.el9_7.x86_64.rpmFCgrafana-10.2.6-17.el9_7.x86_64.rpmlCgrafana-selinux-10.2.6-17.el9_7.x86_64.rpmʀw ,bBBBBBBBBsecurityModerate: mysql security updateq[https://access.redhat.com/errata/RHSA-2025:23109RHSA-2025:23109RHSA-2025:23109 https://access.redhat.com/security/cve/CVE-2025-53040CVE-2025-53040CVE-2025-53040https://access.redhat.com/security/cve/CVE-2025-53042CVE-2025-53042CVE-2025-53042https://access.redhat.com/security/cve/CVE-2025-53044CVE-2025-53044CVE-2025-53044https://access.redhat.com/security/cve/CVE-2025-53045CVE-2025-53045CVE-2025-53045https://access.redhat.com/security/cve/CVE-2025-53053CVE-2025-53053CVE-2025-53053https://access.redhat.com/security/cve/CVE-2025-53054CVE-2025-53054CVE-2025-53054https://access.redhat.com/security/cve/CVE-2025-53062CVE-2025-53062CVE-2025-53062https://access.redhat.com/security/cve/CVE-2025-53069CVE-2025-53069CVE-2025-53069https://bugzilla.redhat.com/24054862405486https://bugzilla.redhat.com/24054912405491https://bugzilla.redhat.com/24055112405511https://bugzilla.redhat.com/24055142405514https://bugzilla.redhat.com/24055232405523https://bugzilla.redhat.com/24055342405534https://bugzilla.redhat.com/24055412405541https://bugzilla.redhat.com/24055442405544https://errata.almalinux.org/9/ALSA-2025-23109.htmlALSA-2025:23109ALSA-2025:23109 *[mysql-libs-8.0.44-1.el9_7.x86_64.rpm[mysql-errmsg-8.0.44-1.el9_7.x86_64.rpm<[mysql-server-8.0.44-1.el9_7.x86_64.rpm[mysql-common-8.0.44-1.el9_7.x86_64.rpm9[mysql-8.0.44-1.el9_7.x86_64.rpm*[mysql-libs-8.0.44-1.el9_7.x86_64.rpm[mysql-errmsg-8.0.44-1.el9_7.x86_64.rpm<[mysql-server-8.0.44-1.el9_7.x86_64.rpm[mysql-common-8.0.44-1.el9_7.x86_64.rpm9[mysql-8.0.44-1.el9_7.x86_64.rpmEx :vBBBBBBBBBBnBBBBBBBBBBBsecurityModerate: mysql:8.4 security updateL[https://access.redhat.com/errata/RHSA-2025:23111RHSA-2025:23111RHSA-2025:23111 https://access.redhat.com/security/cve/CVE-2025-53040CVE-2025-53040CVE-2025-53040https://access.redhat.com/security/cve/CVE-2025-53042CVE-2025-53042CVE-2025-53042https://access.redhat.com/security/cve/CVE-2025-53044CVE-2025-53044CVE-2025-53044https://access.redhat.com/security/cve/CVE-2025-53045CVE-2025-53045CVE-2025-53045https://access.redhat.com/security/cve/CVE-2025-53053CVE-2025-53053CVE-2025-53053https://access.redhat.com/security/cve/CVE-2025-53054CVE-2025-53054CVE-2025-53054https://access.redhat.com/security/cve/CVE-2025-53062CVE-2025-53062CVE-2025-53062https://access.redhat.com/security/cve/CVE-2025-53069CVE-2025-53069CVE-2025-53069https://bugzilla.redhat.com/24054862405486https://bugzilla.redhat.com/24054912405491https://bugzilla.redhat.com/24055112405511https://bugzilla.redhat.com/24055142405514https://bugzilla.redhat.com/24055232405523https://bugzilla.redhat.com/24055342405534https://bugzilla.redhat.com/24055412405541https://bugzilla.redhat.com/24055442405544https://errata.almalinux.org/9/ALSA-2025-23111.htmlALSA-2025:23111ALSA-2025:23111 9 '<~mysql-server-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmavrapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpmW~mysql-test-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm~mysql-errmsg-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpmU1mecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmR+mecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmT1mecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmV~mysql-devel-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm*~mysql-libs-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm9~mysql-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmS+mecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm~mysql-common-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpm(~mysql-test-data-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpmCvrapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm9 '<~mysql-server-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmavrapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpmW~mysql-test-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm~mysql-errmsg-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpmU1mecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmR+mecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmT1mecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmV~mysql-devel-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm*~mysql-libs-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpm9~mysql-8.4.7-1.module_el9.7.0+194+73a02de8.x86_64.rpmS+mecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpm~mysql-common-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpm(~mysql-test-data-8.4.7-1.module_el9.7.0+194+73a02de8.noarch.rpmCvrapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpmʊby {BBBsecurityImportant: wireshark security update'&https://access.redhat.com/errata/RHSA-2025:23142RHSA-2025:23142RHSA-2025:23142 https://access.redhat.com/security/cve/CVE-2025-13499CVE-2025-13499CVE-2025-13499https://bugzilla.redhat.com/24162932416293https://errata.almalinux.org/9/ALSA-2025-23142.htmlALSA-2025:23142ALSA-2025:23142 0.wireshark-cli-3.4.10-8.el9_7.1.x86_64.rpm0.wireshark-cli-3.4.10-8.el9_7.1.i686.rpmd.wireshark-3.4.10-8.el9_7.1.x86_64.rpm0.wireshark-cli-3.4.10-8.el9_7.1.x86_64.rpm0.wireshark-cli-3.4.10-8.el9_7.1.i686.rpmd.wireshark-3.4.10-8.el9_7.1.x86_64.rpm$z ABBBBBBBBBBBsecurityImportant: keylime security updateM-https://access.redhat.com/errata/RHSA-2025:23210RHSA-2025:23210RHSA-2025:23210 https://access.redhat.com/security/cve/CVE-2025-13609CVE-2025-13609CVE-2025-13609https://bugzilla.redhat.com/24167612416761https://errata.almalinux.org/9/ALSA-2025-23210.htmlALSA-2025:23210ALSA-2025:23210  Dpython3-keylime-7.12.1-11.el9_7.3.x86_64.rpmzDkeylime-7.12.1-11.el9_7.3.x86_64.rpm|Dkeylime-registrar-7.12.1-11.el9_7.3.x86_64.rpm{Dkeylime-base-7.12.1-11.el9_7.3.x86_64.rpm~Dkeylime-verifier-7.12.1-11.el9_7.3.x86_64.rpm}Dkeylime-tenant-7.12.1-11.el9_7.3.x86_64.rpmDkeylime-selinux-7.12.1-11.el9_7.3.noarch.rpm Dpython3-keylime-7.12.1-11.el9_7.3.x86_64.rpmzDkeylime-7.12.1-11.el9_7.3.x86_64.rpm|Dkeylime-registrar-7.12.1-11.el9_7.3.x86_64.rpm{Dkeylime-base-7.12.1-11.el9_7.3.x86_64.rpm~Dkeylime-verifier-7.12.1-11.el9_7.3.x86_64.rpm}Dkeylime-tenant-7.12.1-11.el9_7.3.x86_64.rpmDkeylime-selinux-7.12.1-11.el9_7.3.noarch.rpmʊ!{ "OBBBBBBBBBBBBBBBBBsecurityImportant: kernel security updatezMhttps://access.redhat.com/errata/RHSA-2025:23241RHSA-2025:23241RHSA-2025:23241 https://access.redhat.com/security/cve/CVE-2025-38499CVE-2025-38499CVE-2025-38499https://access.redhat.com/security/cve/CVE-2025-39966CVE-2025-39966CVE-2025-39966https://access.redhat.com/security/cve/CVE-2025-40176CVE-2025-40176CVE-2025-40176https://bugzilla.redhat.com/23876702387670https://bugzilla.redhat.com/24041072404107https://bugzilla.redhat.com/24145242414524https://errata.almalinux.org/9/ALSA-2025-23241.htmlALSA-2025:23241ALSA-2025:23241 !ekernel-debug-devel-5.14.0-611.16.1.el9_7.x86_64.rpm)ertla-5.14.0-611.16.1.el9_7.x86_64.rpm*erv-5.14.0-611.16.1.el9_7.x86_64.rpm(ekernel-headers-5.14.0-611.16.1.el9_7.x86_64.rpm%eperf-5.14.0-611.16.1.el9_7.x86_64.rpmMepython3-perf-5.14.0-611.16.1.el9_7.x86_64.rpm$ekernel-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpmekernel-doc-5.14.0-611.16.1.el9_7.noarch.rpm"ekernel-debug-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm#ekernel-devel-5.14.0-611.16.1.el9_7.x86_64.rpm !ekernel-debug-devel-5.14.0-611.16.1.el9_7.x86_64.rpm)ertla-5.14.0-611.16.1.el9_7.x86_64.rpm*erv-5.14.0-611.16.1.el9_7.x86_64.rpm(ekernel-headers-5.14.0-611.16.1.el9_7.x86_64.rpm%eperf-5.14.0-611.16.1.el9_7.x86_64.rpmMepython3-perf-5.14.0-611.16.1.el9_7.x86_64.rpm$ekernel-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpmekernel-doc-5.14.0-611.16.1.el9_7.noarch.rpm"ekernel-debug-devel-matched-5.14.0-611.16.1.el9_7.x86_64.rpm#ekernel-devel-5.14.0-611.16.1.el9_7.x86_64.rpm| BBBBBBBBBBBBBVBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.3 security updateG+https://access.redhat.com/errata/RHSA-2025:23309RHSA-2025:23309RHSA-2025:23309 https://access.redhat.com/security/cve/CVE-2025-1220CVE-2025-1220CVE-2025-1220https://access.redhat.com/security/cve/CVE-2025-1735CVE-2025-1735CVE-2025-1735https://access.redhat.com/security/cve/CVE-2025-6491CVE-2025-6491CVE-2025-6491https://bugzilla.redhat.com/23786892378689https://bugzilla.redhat.com/23786902378690https://bugzilla.redhat.com/23797922379792https://errata.almalinux.org/9/ALSA-2025-23309.htmlALSA-2025:23309ALSA-2025:23309 ' |Kphp-pdo-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmrKphp-ffi-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmyKphp-mysqlnd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmA:php-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmKphp-xml-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmkKphp-cli-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmf_apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmzKphp-odbc-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmpKphp-embedded-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm=_php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmqKphp-enchant-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmsKphp-fpm-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmxKphp-mbstring-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm?wphp-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmKphp-soap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmvKphp-intl-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmKphp-snmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmKphp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmwKphp-ldap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmuKphp-gmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm}Kphp-pgsql-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmjKphp-bcmath-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmtKphp-gd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm{Kphp-opcache-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm~Kphp-process-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmoKphp-devel-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm@php-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpmnKphp-dbg-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmlKphp-common-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm>_php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmmKphp-dba-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm^-php-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm' |Kphp-pdo-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmrKphp-ffi-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmyKphp-mysqlnd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmA:php-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmKphp-xml-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmkKphp-cli-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmf_apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmzKphp-odbc-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmpKphp-embedded-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm=_php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmqKphp-enchant-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmsKphp-fpm-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmxKphp-mbstring-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm?wphp-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmKphp-soap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmvKphp-intl-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmKphp-snmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmKphp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmwKphp-ldap-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmuKphp-gmp-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm}Kphp-pgsql-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmjKphp-bcmath-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmtKphp-gd-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm{Kphp-opcache-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm~Kphp-process-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmoKphp-devel-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm@php-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpmnKphp-dbg-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpmlKphp-common-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm>_php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmmKphp-dba-8.3.26-1.module_el9.7.0+197+324afee8.x86_64.rpm^-php-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpmʥI} VBBBBBBBBsecurityModerate: python3.12 security updaterghttps://access.redhat.com/errata/RHSA-2025:23323RHSA-2025:23323RHSA-2025:23323 https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/24023422402342https://errata.almalinux.org/9/ALSA-2025-23323.htmlALSA-2025:23323ALSA-2025:23323 ; python3.12-tkinter-3.12.12-1.el9_7.x86_64.rpm python3.12-libs-3.12.12-1.el9_7.i686.rpm python3.12-devel-3.12.12-1.el9_7.i686.rpm python3.12-libs-3.12.12-1.el9_7.x86_64.rpm: python3.12-3.12.12-1.el9_7.x86_64.rpm python3.12-devel-3.12.12-1.el9_7.x86_64.rpm; python3.12-tkinter-3.12.12-1.el9_7.x86_64.rpm python3.12-libs-3.12.12-1.el9_7.i686.rpm python3.12-devel-3.12.12-1.el9_7.i686.rpm python3.12-libs-3.12.12-1.el9_7.x86_64.rpm: python3.12-3.12.12-1.el9_7.x86_64.rpm python3.12-devel-3.12.12-1.el9_7.x86_64.rpmʥ~ *aBBBBBBBsecurityModerate: podman security updateYshttps://access.redhat.com/errata/RHSA-2025:23325RHSA-2025:23325RHSA-2025:23325 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23325.htmlALSA-2025:23325ALSA-2025:23325 /podman-remote-5.6.0-9.el9_7.x86_64.rpm-podman-5.6.0-9.el9_7.x86_64.rpm.podman-plugins-5.6.0-9.el9_7.x86_64.rpm0podman-tests-5.6.0-9.el9_7.x86_64.rpmfpodman-docker-5.6.0-9.el9_7.noarch.rpm/podman-remote-5.6.0-9.el9_7.x86_64.rpm-podman-5.6.0-9.el9_7.x86_64.rpm.podman-plugins-5.6.0-9.el9_7.x86_64.rpm0podman-tests-5.6.0-9.el9_7.x86_64.rpmfpodman-docker-5.6.0-9.el9_7.noarch.rpmʥ /kBBsecurityModerate: skopeo security updateLLhttps://access.redhat.com/errata/RHSA-2025:23326RHSA-2025:23326RHSA-2025:23326 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2025-23326.htmlALSA-2025:23326ALSA-2025:23326 ;skopeo-1.20.0-2.el9_7.x86_64.rpm<skopeo-tests-1.20.0-2.el9_7.x86_64.rpm;skopeo-1.20.0-2.el9_7.x86_64.rpm<skopeo-tests-1.20.0-2.el9_7.x86_64.rpmʥO 7pBBBBBsecurityModerate: gcc-toolset-13-binutils security updateehttps://access.redhat.com/errata/RHSA-2025:23336RHSA-2025:23336RHSA-2025:23336 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23336.htmlALSA-2025:23336ALSA-2025:23336 Kgcc-toolset-13-binutils-2.40-21.el9_7.1.x86_64.rpmwgcc-toolset-13-binutils-devel-2.40-21.el9_7.1.i686.rpmLgcc-toolset-13-binutils-gold-2.40-21.el9_7.1.x86_64.rpmwgcc-toolset-13-binutils-devel-2.40-21.el9_7.1.x86_64.rpmKgcc-toolset-13-binutils-2.40-21.el9_7.1.x86_64.rpmwgcc-toolset-13-binutils-devel-2.40-21.el9_7.1.i686.rpmLgcc-toolset-13-binutils-gold-2.40-21.el9_7.1.x86_64.rpmwgcc-toolset-13-binutils-devel-2.40-21.el9_7.1.x86_64.rpmʥo >xBBBBsecurityModerate: python3.9 security update}x https://access.redhat.com/errata/RHSA-2025:23342RHSA-2025:23342RHSA-2025:23342 https://access.redhat.com/security/cve/CVE-2024-5642CVE-2024-5642CVE-2024-5642https://access.redhat.com/security/cve/CVE-2025-6069CVE-2025-6069CVE-2025-6069https://access.redhat.com/security/cve/CVE-2025-6075CVE-2025-6075CVE-2025-6075https://access.redhat.com/security/cve/CVE-2025-8291CVE-2025-8291CVE-2025-8291https://bugzilla.redhat.com/22946822294682https://bugzilla.redhat.com/23732342373234https://bugzilla.redhat.com/24023422402342https://bugzilla.redhat.com/24088912408891https://errata.almalinux.org/9/ALSA-2025-23342.htmlALSA-2025:23342ALSA-2025:23342 Rnpython3-devel-3.9.25-2.el9_7.x86_64.rpmgnpython-unversioned-command-3.9.25-2.el9_7.noarch.rpmRnpython3-devel-3.9.25-2.el9_7.i686.rpm1npython3-tkinter-3.9.25-2.el9_7.x86_64.rpmRnpython3-devel-3.9.25-2.el9_7.x86_64.rpmgnpython-unversioned-command-3.9.25-2.el9_7.noarch.rpmRnpython3-devel-3.9.25-2.el9_7.i686.rpm1npython3-tkinter-3.9.25-2.el9_7.x86_64.rpmʥs BsecurityModerate: binutils security updateuhttps://access.redhat.com/errata/RHSA-2025:23343RHSA-2025:23343RHSA-2025:23343 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2025-23343.htmlALSA-2025:23343ALSA-2025:23343 Ybinutils-devel-2.35.2-67.el9_7.1.i686.rpmYbinutils-devel-2.35.2-67.el9_7.1.x86_64.rpmYbinutils-devel-2.35.2-67.el9_7.1.i686.rpmYbinutils-devel-2.35.2-67.el9_7.1.x86_64.rpmʥj CBBsecurityModerate: openssh security updatewhttps://access.redhat.com/errata/RHSA-2025:23480RHSA-2025:23480RHSA-2025:23480 https://access.redhat.com/security/cve/CVE-2025-61984CVE-2025-61984CVE-2025-61984https://access.redhat.com/security/cve/CVE-2025-61985CVE-2025-61985CVE-2025-61985https://bugzilla.redhat.com/24019602401960https://bugzilla.redhat.com/24019622401962https://errata.almalinux.org/9/ALSA-2025-23480.htmlALSA-2025:23480ALSA-2025:23480 spam_ssh_agent_auth-0.10.4-5.47.el9_7.alma.1.x86_64.rpm openssh-askpass-8.7p1-47.el9_7.alma.1.x86_64.rpmspam_ssh_agent_auth-0.10.4-5.47.el9_7.alma.1.x86_64.rpm openssh-askpass-8.7p1-47.el9_7.alma.1.x86_64.rpmʡ HBsecurityModerate: libssh security update&https://access.redhat.com/errata/RHSA-2025:23483RHSA-2025:23483RHSA-2025:23483 https://access.redhat.com/security/cve/CVE-2025-5987CVE-2025-5987CVE-2025-5987https://bugzilla.redhat.com/23762192376219https://errata.almalinux.org/9/ALSA-2025-23483.htmlALSA-2025:23483ALSA-2025:23483 jilibssh-devel-0.10.4-17.el9_7.i686.rpmjilibssh-devel-0.10.4-17.el9_7.x86_64.rpmjilibssh-devel-0.10.4-17.el9_7.i686.rpmjilibssh-devel-0.10.4-17.el9_7.x86_64.rpmʡ  LBBsecurityImportant: firefox security update-nhttps://access.redhat.com/errata/RHSA-2025:2359RHSA-2025:2359RHSA-2025:2359 https://access.redhat.com/security/cve/CVE-2025-1930CVE-2025-1930CVE-2025-1930https://access.redhat.com/security/cve/CVE-2025-1931CVE-2025-1931CVE-2025-1931https://access.redhat.com/security/cve/CVE-2025-1932CVE-2025-1932CVE-2025-1932https://access.redhat.com/security/cve/CVE-2025-1933CVE-2025-1933CVE-2025-1933https://access.redhat.com/security/cve/CVE-2025-1934CVE-2025-1934CVE-2025-1934https://access.redhat.com/security/cve/CVE-2025-1935CVE-2025-1935CVE-2025-1935https://access.redhat.com/security/cve/CVE-2025-1936CVE-2025-1936CVE-2025-1936https://access.redhat.com/security/cve/CVE-2025-1937CVE-2025-1937CVE-2025-1937https://access.redhat.com/security/cve/CVE-2025-1938CVE-2025-1938CVE-2025-1938https://bugzilla.redhat.com/23497862349786https://bugzilla.redhat.com/23497872349787https://bugzilla.redhat.com/23497902349790https://bugzilla.redhat.com/23497922349792https://bugzilla.redhat.com/23497932349793https://bugzilla.redhat.com/23497942349794https://bugzilla.redhat.com/23497952349795https://bugzilla.redhat.com/23497962349796https://bugzilla.redhat.com/23497972349797https://errata.almalinux.org/9/ALSA-2025-2359.htmlALSA-2025:2359ALSA-2025:2359 O]firefox-x11-128.8.0-1.el9_5.x86_64.rpm7]firefox-128.8.0-1.el9_5.x86_64.rpmO]firefox-x11-128.8.0-1.el9_5.x86_64.rpm7]firefox-128.8.0-1.el9_5.x86_64.rpm2 QBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateIhttps://access.redhat.com/errata/RHSA-2025:23700RHSA-2025:23700RHSA-2025:23700 https://access.redhat.com/security/cve/CVE-2025-43501CVE-2025-43501CVE-2025-43501https://access.redhat.com/security/cve/CVE-2025-43529CVE-2025-43529CVE-2025-43529https://access.redhat.com/security/cve/CVE-2025-43531CVE-2025-43531CVE-2025-43531https://access.redhat.com/security/cve/CVE-2025-43535CVE-2025-43535CVE-2025-43535https://access.redhat.com/security/cve/CVE-2025-43536CVE-2025-43536CVE-2025-43536https://access.redhat.com/security/cve/CVE-2025-43541CVE-2025-43541CVE-2025-43541https://bugzilla.redhat.com/24231662423166https://bugzilla.redhat.com/24231852423185https://bugzilla.redhat.com/24231872423187https://bugzilla.redhat.com/24231882423188https://bugzilla.redhat.com/24231902423190https://bugzilla.redhat.com/24231912423191https://errata.almalinux.org/9/ALSA-2025-23700.htmlALSA-2025:23700ALSA-2025:23700 5'webkit2gtk3-jsc-2.50.4-1.el9_7.i686.rpm6'webkit2gtk3-jsc-devel-2.50.4-1.el9_7.i686.rpm5'webkit2gtk3-jsc-2.50.4-1.el9_7.x86_64.rpm3'webkit2gtk3-2.50.4-1.el9_7.x86_64.rpm4'webkit2gtk3-devel-2.50.4-1.el9_7.x86_64.rpm3'webkit2gtk3-2.50.4-1.el9_7.i686.rpm4'webkit2gtk3-devel-2.50.4-1.el9_7.i686.rpm6'webkit2gtk3-jsc-devel-2.50.4-1.el9_7.x86_64.rpm5'webkit2gtk3-jsc-2.50.4-1.el9_7.i686.rpm6'webkit2gtk3-jsc-devel-2.50.4-1.el9_7.i686.rpm5'webkit2gtk3-jsc-2.50.4-1.el9_7.x86_64.rpm3'webkit2gtk3-2.50.4-1.el9_7.x86_64.rpm4'webkit2gtk3-devel-2.50.4-1.el9_7.x86_64.rpm3'webkit2gtk3-2.50.4-1.el9_7.i686.rpm4'webkit2gtk3-devel-2.50.4-1.el9_7.i686.rpm6'webkit2gtk3-jsc-devel-2.50.4-1.el9_7.x86_64.rpmʥ" ^securityImportant: opentelemetry-collector security updated#https://access.redhat.com/errata/RHSA-2025:23729RHSA-2025:23729RHSA-2025:23729 https://access.redhat.com/security/cve/CVE-2025-68156CVE-2025-68156CVE-2025-68156https://bugzilla.redhat.com/24228912422891https://errata.almalinux.org/9/ALSA-2025-23729.htmlALSA-2025:23729ALSA-2025:23729 wopentelemetry-collector-0.135.0-2.el9_7.x86_64.rpmwopentelemetry-collector-0.135.0-2.el9_7.x86_64.rpmʪ! #asecurityImportant: mod_md security updateDhttps://access.redhat.com/errata/RHSA-2025:23739RHSA-2025:23739RHSA-2025:23739 https://access.redhat.com/security/cve/CVE-2025-55753CVE-2025-55753CVE-2025-55753https://bugzilla.redhat.com/24191402419140https://errata.almalinux.org/9/ALSA-2025-23739.htmlALSA-2025:23739ALSA-2025:23739 9nmod_md-2.4.26-1.el9_7.1.x86_64.rpm9nmod_md-2.4.26-1.el9_7.1.x86_64.rpmʥ~  &dsecurityImportant: git-lfs security updateKkhttps://access.redhat.com/errata/RHSA-2025:23744RHSA-2025:23744RHSA-2025:23744 https://access.redhat.com/security/cve/CVE-2025-26625CVE-2025-26625CVE-2025-26625https://bugzilla.redhat.com/24047202404720https://errata.almalinux.org/9/ALSA-2025-23744.htmlALSA-2025:23744ALSA-2025:23744  =git-lfs-3.6.1-4.el9_7.x86_64.rpm =git-lfs-3.6.1-4.el9_7.x86_64.rpmʤ0  )gsecurityImportant: thunderbird security update6>https://access.redhat.com/errata/RHSA-2025:23856RHSA-2025:23856RHSA-2025:23856 https://access.redhat.com/security/cve/CVE-2025-14321CVE-2025-14321CVE-2025-14321https://access.redhat.com/security/cve/CVE-2025-14322CVE-2025-14322CVE-2025-14322https://access.redhat.com/security/cve/CVE-2025-14323CVE-2025-14323CVE-2025-14323https://access.redhat.com/security/cve/CVE-2025-14324CVE-2025-14324CVE-2025-14324https://access.redhat.com/security/cve/CVE-2025-14325CVE-2025-14325CVE-2025-14325https://access.redhat.com/security/cve/CVE-2025-14328CVE-2025-14328CVE-2025-14328https://access.redhat.com/security/cve/CVE-2025-14329CVE-2025-14329CVE-2025-14329https://access.redhat.com/security/cve/CVE-2025-14330CVE-2025-14330CVE-2025-14330https://access.redhat.com/security/cve/CVE-2025-14331CVE-2025-14331CVE-2025-14331https://access.redhat.com/security/cve/CVE-2025-14333CVE-2025-14333CVE-2025-14333https://bugzilla.redhat.com/24205022420502https://bugzilla.redhat.com/24205032420503https://bugzilla.redhat.com/24205042420504https://bugzilla.redhat.com/24205062420506https://bugzilla.redhat.com/24205082420508https://bugzilla.redhat.com/24205092420509https://bugzilla.redhat.com/24205122420512https://bugzilla.redhat.com/24205132420513https://bugzilla.redhat.com/24205162420516https://bugzilla.redhat.com/24205172420517https://errata.almalinux.org/9/ALSA-2025-23856.htmlALSA-2025:23856ALSA-2025:23856 9Pthunderbird-140.6.0-1.el9_7.alma.1.x86_64.rpm9Pthunderbird-140.6.0-1.el9_7.alma.1.x86_64.rpmʫ   >jBBBBBBBBBBBBBBBBBBsecurityImportant: httpd security updatet\https://access.redhat.com/errata/RHSA-2025:23919RHSA-2025:23919RHSA-2025:23919 https://access.redhat.com/security/cve/CVE-2025-58098CVE-2025-58098CVE-2025-58098https://access.redhat.com/security/cve/CVE-2025-65082CVE-2025-65082CVE-2025-65082https://access.redhat.com/security/cve/CVE-2025-66200CVE-2025-66200CVE-2025-66200https://bugzilla.redhat.com/24191392419139https://bugzilla.redhat.com/24192622419262https://bugzilla.redhat.com/24193652419365https://errata.almalinux.org/9/ALSA-2025-23919.htmlALSA-2025:23919ALSA-2025:23919 `ahttpd-filesystem-2.4.62-7.el9_7.3.noarch.rpm9rmod_proxy_html-2.4.62-7.el9_7.3.x86_64.rpm#ahttpd-devel-2.4.62-7.el9_7.3.x86_64.rpm;rmod_ssl-2.4.62-7.el9_7.3.x86_64.rpm!ahttpd-2.4.62-7.el9_7.3.x86_64.rpm:amod_session-2.4.62-7.el9_7.3.x86_64.rpm"ahttpd-core-2.4.62-7.el9_7.3.x86_64.rpm7amod_ldap-2.4.62-7.el9_7.3.x86_64.rpmaahttpd-manual-2.4.62-7.el9_7.3.noarch.rpm$ahttpd-tools-2.4.62-7.el9_7.3.x86_64.rpm8amod_lua-2.4.62-7.el9_7.3.x86_64.rpm `ahttpd-filesystem-2.4.62-7.el9_7.3.noarch.rpm9rmod_proxy_html-2.4.62-7.el9_7.3.x86_64.rpm#ahttpd-devel-2.4.62-7.el9_7.3.x86_64.rpm;rmod_ssl-2.4.62-7.el9_7.3.x86_64.rpm!ahttpd-2.4.62-7.el9_7.3.x86_64.rpm:amod_session-2.4.62-7.el9_7.3.x86_64.rpm"ahttpd-core-2.4.62-7.el9_7.3.x86_64.rpm7amod_ldap-2.4.62-7.el9_7.3.x86_64.rpmaahttpd-manual-2.4.62-7.el9_7.3.noarch.rpm$ahttpd-tools-2.4.62-7.el9_7.3.x86_64.rpm8amod_lua-2.4.62-7.el9_7.3.x86_64.rpm+  BBBBBBBBBsecurityImportant: tigervnc security updatePohttps://access.redhat.com/errata/RHSA-2025:2500RHSA-2025:2500RHSA-2025:2500 https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-2500.htmlALSA-2025:2500ALSA-2025:2500 7ztigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm8ztigervnc-license-1.14.1-1.el9_5.1.noarch.rpmnztigervnc-1.14.1-1.el9_5.1.x86_64.rpmpztigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm9ztigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpmoztigervnc-server-1.14.1-1.el9_5.1.x86_64.rpmqztigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm7ztigervnc-icons-1.14.1-1.el9_5.1.noarch.rpm8ztigervnc-license-1.14.1-1.el9_5.1.noarch.rpmnztigervnc-1.14.1-1.el9_5.1.x86_64.rpmpztigervnc-server-minimal-1.14.1-1.el9_5.1.x86_64.rpm9ztigervnc-selinux-1.14.1-1.el9_5.1.noarch.rpmoztigervnc-server-1.14.1-1.el9_5.1.x86_64.rpmqztigervnc-server-module-1.14.1-1.el9_5.1.x86_64.rpm  KBBBBBBBBBBBBBBBsecurityImportant: kernel security update?9https://access.redhat.com/errata/RHSA-2025:2627RHSA-2025:2627RHSA-2025:2627 https://access.redhat.com/security/cve/CVE-2023-52605CVE-2023-52605CVE-2023-52605https://access.redhat.com/security/cve/CVE-2023-52922CVE-2023-52922CVE-2023-52922https://access.redhat.com/security/cve/CVE-2024-50264CVE-2024-50264CVE-2024-50264https://access.redhat.com/security/cve/CVE-2024-50302CVE-2024-50302CVE-2024-50302https://access.redhat.com/security/cve/CVE-2024-53113CVE-2024-53113CVE-2024-53113https://access.redhat.com/security/cve/CVE-2024-53197CVE-2024-53197CVE-2024-53197https://bugzilla.redhat.com/22682952268295https://bugzilla.redhat.com/23271682327168https://bugzilla.redhat.com/23271692327169https://bugzilla.redhat.com/23293702329370https://bugzilla.redhat.com/23299242329924https://bugzilla.redhat.com/23344122334412https://errata.almalinux.org/9/ALSA-2025-2627.htmlALSA-2025:2627ALSA-2025:2627 )Ortla-5.14.0-503.31.1.el9_5.x86_64.rpm#Okernel-devel-5.14.0-503.31.1.el9_5.x86_64.rpm"Okernel-debug-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpmOkernel-doc-5.14.0-503.31.1.el9_5.noarch.rpm%Operf-5.14.0-503.31.1.el9_5.x86_64.rpm!Okernel-debug-devel-5.14.0-503.31.1.el9_5.x86_64.rpm*Orv-5.14.0-503.31.1.el9_5.x86_64.rpm$Okernel-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm(Okernel-headers-5.14.0-503.31.1.el9_5.x86_64.rpm )Ortla-5.14.0-503.31.1.el9_5.x86_64.rpm#Okernel-devel-5.14.0-503.31.1.el9_5.x86_64.rpm"Okernel-debug-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpmOkernel-doc-5.14.0-503.31.1.el9_5.noarch.rpm%Operf-5.14.0-503.31.1.el9_5.x86_64.rpm!Okernel-debug-devel-5.14.0-503.31.1.el9_5.x86_64.rpm*Orv-5.14.0-503.31.1.el9_5.x86_64.rpm$Okernel-devel-matched-5.14.0-503.31.1.el9_5.x86_64.rpm(Okernel-headers-5.14.0-503.31.1.el9_5.x86_64.rpmI 9]BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security, bug fix, and enhancement updatex|https://access.redhat.com/errata/RHSA-2025:2668RHSA-2025:2668RHSA-2025:2668 https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2668.htmlALSA-2025:2668ALSA-2025:2668 3dotnet-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm3dotnet-apphost-pack-9.0-9.0.3-1.el9_5.x86_64.rpm3aspnetcore-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm^dotnet-sdk-dbg-9.0-9.0.104-1.el9_5.x86_64.rpm3aspnetcore-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm^dotnet-sdk-aot-9.0-9.0.104-1.el9_5.x86_64.rpm3aspnetcore-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm3dotnet-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm ^netstandard-targeting-pack-2.1-9.0.104-1.el9_5.x86_64.rpm3dotnet-host-9.0.3-1.el9_5.x86_64.rpm^dotnet-sdk-9.0-9.0.104-1.el9_5.x86_64.rpm^dotnet-templates-9.0-9.0.104-1.el9_5.x86_64.rpm3dotnet-hostfxr-9.0-9.0.3-1.el9_5.x86_64.rpm3dotnet-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm3dotnet-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm3dotnet-apphost-pack-9.0-9.0.3-1.el9_5.x86_64.rpm3aspnetcore-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm^dotnet-sdk-dbg-9.0-9.0.104-1.el9_5.x86_64.rpm3aspnetcore-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm^dotnet-sdk-aot-9.0-9.0.104-1.el9_5.x86_64.rpm3aspnetcore-runtime-9.0-9.0.3-1.el9_5.x86_64.rpm3dotnet-runtime-dbg-9.0-9.0.3-1.el9_5.x86_64.rpm ^netstandard-targeting-pack-2.1-9.0.104-1.el9_5.x86_64.rpm3dotnet-host-9.0.3-1.el9_5.x86_64.rpm^dotnet-sdk-9.0-9.0.104-1.el9_5.x86_64.rpm^dotnet-templates-9.0-9.0.104-1.el9_5.x86_64.rpm3dotnet-hostfxr-9.0-9.0.3-1.el9_5.x86_64.rpm3dotnet-targeting-pack-9.0-9.0.3-1.el9_5.x86_64.rpm] zBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security, bug fix, and enhancement updatet}https://access.redhat.com/errata/RHSA-2025:2669RHSA-2025:2669RHSA-2025:2669 https://access.redhat.com/security/cve/CVE-2025-24070CVE-2025-24070CVE-2025-24070https://bugzilla.redhat.com/23497332349733https://errata.almalinux.org/9/ALSA-2025-2669.htmlALSA-2025:2669ALSA-2025:2669 Lndotnet-sdk-dbg-8.0-8.0.114-1.el9_5.x86_64.rpmXdotnet-runtime-8.0-8.0.14-1.el9_5.x86_64.rpmTaspnetcore-runtime-8.0-8.0.14-1.el9_5.x86_64.rpmKdotnet-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpmDaspnetcore-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpmUaspnetcore-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpmYndotnet-sdk-8.0-8.0.114-1.el9_5.x86_64.rpm[ndotnet-templates-8.0-8.0.114-1.el9_5.x86_64.rpmWdotnet-hostfxr-8.0-8.0.14-1.el9_5.x86_64.rpmVdotnet-apphost-pack-8.0-8.0.14-1.el9_5.x86_64.rpmZdotnet-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpm Lndotnet-sdk-dbg-8.0-8.0.114-1.el9_5.x86_64.rpmXdotnet-runtime-8.0-8.0.14-1.el9_5.x86_64.rpmTaspnetcore-runtime-8.0-8.0.14-1.el9_5.x86_64.rpmKdotnet-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpmDaspnetcore-runtime-dbg-8.0-8.0.14-1.el9_5.x86_64.rpmUaspnetcore-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpmYndotnet-sdk-8.0-8.0.114-1.el9_5.x86_64.rpm[ndotnet-templates-8.0-8.0.114-1.el9_5.x86_64.rpmWdotnet-hostfxr-8.0-8.0.14-1.el9_5.x86_64.rpmVdotnet-apphost-pack-8.0-8.0.14-1.el9_5.x86_64.rpmZdotnet-targeting-pack-8.0-8.0.14-1.el9_5.x86_64.rpmR QBsecurityImportant: libxml2 security updateqPhttps://access.redhat.com/errata/RHSA-2025:2679RHSA-2025:2679RHSA-2025:2679 https://access.redhat.com/security/cve/CVE-2024-56171CVE-2024-56171CVE-2024-56171https://access.redhat.com/security/cve/CVE-2025-24928CVE-2025-24928CVE-2025-24928https://bugzilla.redhat.com/23464162346416https://bugzilla.redhat.com/23464212346421https://errata.almalinux.org/9/ALSA-2025-2679.htmlALSA-2025:2679ALSA-2025:2679 >9libxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm>9libxml2-devel-2.9.13-6.el9_5.2.i686.rpm>9libxml2-devel-2.9.13-6.el9_5.2.x86_64.rpm>9libxml2-devel-2.9.13-6.el9_5.2.i686.rpmʏS !UBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateAqhttps://access.redhat.com/errata/RHSA-2025:2864RHSA-2025:2864RHSA-2025:2864 https://access.redhat.com/security/cve/CVE-2025-24201CVE-2025-24201CVE-2025-24201https://bugzilla.redhat.com/23518022351802https://errata.almalinux.org/9/ALSA-2025-2864.htmlALSA-2025:2864ALSA-2025:2864 5webkit2gtk3-jsc-2.46.6-2.el9_5.i686.rpm5webkit2gtk3-jsc-2.46.6-2.el9_5.x86_64.rpm6webkit2gtk3-jsc-devel-2.46.6-2.el9_5.i686.rpm3webkit2gtk3-2.46.6-2.el9_5.x86_64.rpm3webkit2gtk3-2.46.6-2.el9_5.i686.rpm4webkit2gtk3-devel-2.46.6-2.el9_5.i686.rpm6webkit2gtk3-jsc-devel-2.46.6-2.el9_5.x86_64.rpm4webkit2gtk3-devel-2.46.6-2.el9_5.x86_64.rpm5webkit2gtk3-jsc-2.46.6-2.el9_5.i686.rpm5webkit2gtk3-jsc-2.46.6-2.el9_5.x86_64.rpm6webkit2gtk3-jsc-devel-2.46.6-2.el9_5.i686.rpm3webkit2gtk3-2.46.6-2.el9_5.x86_64.rpm3webkit2gtk3-2.46.6-2.el9_5.i686.rpm4webkit2gtk3-devel-2.46.6-2.el9_5.i686.rpm6webkit2gtk3-jsc-devel-2.46.6-2.el9_5.x86_64.rpm4webkit2gtk3-devel-2.46.6-2.el9_5.x86_64.rpm  $bsecurityImportant: thunderbird security update2Ehttps://access.redhat.com/errata/RHSA-2025:2899RHSA-2025:2899RHSA-2025:2899 https://access.redhat.com/security/cve/CVE-2025-1937CVE-2025-1937CVE-2025-1937https://access.redhat.com/security/cve/CVE-2025-1938CVE-2025-1938CVE-2025-1938https://bugzilla.redhat.com/23497932349793https://bugzilla.redhat.com/23497952349795https://errata.almalinux.org/9/ALSA-2025-2899.htmlALSA-2025:2899ALSA-2025:2899 9Kthunderbird-128.8.0-2.el9_5.alma.1.x86_64.rpm9Kthunderbird-128.8.0-2.el9_5.alma.1.x86_64.rpmv +eBBBBsecurityImportant: libxslt security updatewvhttps://access.redhat.com/errata/RHSA-2025:3107RHSA-2025:3107RHSA-2025:3107 https://access.redhat.com/security/cve/CVE-2025-24855CVE-2025-24855CVE-2025-24855https://bugzilla.redhat.com/23524832352483https://errata.almalinux.org/9/ALSA-2025-3107.htmlALSA-2025:3107ALSA-2025:3107 6libxslt-devel-1.1.34-9.el9_5.1.x86_64.rpm6libxslt-1.1.34-9.el9_5.1.i686.rpm6libxslt-devel-1.1.34-9.el9_5.1.i686.rpm6libxslt-1.1.34-9.el9_5.1.x86_64.rpm6libxslt-devel-1.1.34-9.el9_5.1.x86_64.rpm6libxslt-1.1.34-9.el9_5.1.i686.rpm6libxslt-devel-1.1.34-9.el9_5.1.i686.rpm6libxslt-1.1.34-9.el9_5.1.x86_64.rpm[ >lBBBBBBBBBBBBBBBBsecurityModerate: nginx:1.22 security updatem5https://access.redhat.com/errata/RHSA-2025:3261RHSA-2025:3261RHSA-2025:3261 https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://errata.almalinux.org/9/ALSA-2025-3261.htmlALSA-2025:3261ALSA-2025:3261 ' Oxnginx-mod-http-image-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmhxnginx-mod-devel-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmxnginx-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmxnginx-filesystem-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpmPxnginx-mod-http-perl-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmSxnginx-mod-stream-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmRxnginx-mod-mail-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmxnginx-all-modules-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpmQxnginx-mod-http-xslt-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmNxnginx-core-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm' Oxnginx-mod-http-image-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmhxnginx-mod-devel-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmxnginx-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmxnginx-filesystem-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpmPxnginx-mod-http-perl-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmSxnginx-mod-stream-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmRxnginx-mod-mail-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmxnginx-all-modules-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.noarch.rpmQxnginx-mod-http-xslt-filter-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpmNxnginx-core-1.22.1-8.module_el9.5.0+153+8c633b18.1.alma.1.x86_64.rpm BBBBBBBBBBBBBBBBsecurityModerate: nginx:1.24 security update"5https://access.redhat.com/errata/RHSA-2025:3262RHSA-2025:3262RHSA-2025:3262 https://access.redhat.com/security/cve/CVE-2024-7347CVE-2024-7347CVE-2024-7347https://errata.almalinux.org/9/ALSA-2025-3262.htmlALSA-2025:3262ALSA-2025:3262 Y' Pynginx-mod-http-perl-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmynginx-filesystem-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpmynginx-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmNynginx-core-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmOynginx-mod-http-image-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmQynginx-mod-http-xslt-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmhynginx-mod-devel-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmSynginx-mod-stream-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmynginx-all-modules-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpmRynginx-mod-mail-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmY' Pynginx-mod-http-perl-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmynginx-filesystem-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpmynginx-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmNynginx-core-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmOynginx-mod-http-image-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmQynginx-mod-http-xslt-filter-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmhynginx-mod-devel-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmSynginx-mod-stream-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmynginx-all-modules-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.noarch.rpmRynginx-mod-mail-1.24.0-4.module_el9.5.0+154+722f94fd.1.alma.1.x86_64.rpmĈl RBBsecurityImportant: grafana security updateW,https://access.redhat.com/errata/RHSA-2025:3344RHSA-2025:3344RHSA-2025:3344 https://access.redhat.com/security/cve/CVE-2025-30204CVE-2025-30204CVE-2025-30204https://bugzilla.redhat.com/23541952354195https://errata.almalinux.org/9/ALSA-2025-3344.htmlALSA-2025:3344ALSA-2025:3344 FHgrafana-10.2.6-9.el9_5.x86_64.rpmlHgrafana-selinux-10.2.6-9.el9_5.x86_64.rpmFHgrafana-10.2.6-9.el9_5.x86_64.rpmlHgrafana-selinux-10.2.6-9.el9_5.x86_64.rpm% securityImportant: python-jinja2 security updateQhttps://access.redhat.com/errata/RHSA-2025:3406RHSA-2025:3406RHSA-2025:3406 https://access.redhat.com/security/cve/CVE-2025-27516CVE-2025-27516CVE-2025-27516https://bugzilla.redhat.com/23501902350190https://errata.almalinux.org/9/ALSA-2025-3406.htmlALSA-2025:3406ALSA-2025:3406  python3-jinja2-2.11.3-8.el9_5.noarch.rpm python3-jinja2-2.11.3-8.el9_5.noarch.rpmL YBsecurityModerate: expat security updateTlhttps://access.redhat.com/errata/RHSA-2025:3531RHSA-2025:3531RHSA-2025:3531 https://access.redhat.com/security/cve/CVE-2024-8176CVE-2024-8176CVE-2024-8176https://bugzilla.redhat.com/23101372310137https://errata.almalinux.org/9/ALSA-2025-3531.htmlALSA-2025:3531ALSA-2025:3531 &expat-devel-2.5.0-3.el9_5.3.i686.rpm&expat-devel-2.5.0-3.el9_5.3.x86_64.rpm&expat-devel-2.5.0-3.el9_5.3.i686.rpm&expat-devel-2.5.0-3.el9_5.3.x86_64.rpmK !]BBsecurityImportant: firefox security update@https://access.redhat.com/errata/RHSA-2025:3556RHSA-2025:3556RHSA-2025:3556 https://access.redhat.com/security/cve/CVE-2025-3028CVE-2025-3028CVE-2025-3028https://access.redhat.com/security/cve/CVE-2025-3029CVE-2025-3029CVE-2025-3029https://access.redhat.com/security/cve/CVE-2025-3030CVE-2025-3030CVE-2025-3030https://bugzilla.redhat.com/23565562356556https://bugzilla.redhat.com/23565622356562https://bugzilla.redhat.com/23565632356563https://errata.almalinux.org/9/ALSA-2025-3556.htmlALSA-2025:3556ALSA-2025:3556 O^firefox-x11-128.9.0-2.el9_5.x86_64.rpm7^firefox-128.9.0-2.el9_5.x86_64.rpmO^firefox-x11-128.9.0-2.el9_5.x86_64.rpm7^firefox-128.9.0-2.el9_5.x86_64.rpmV 'bBBBsecurityImportant: gimp security updateC, https://access.redhat.com/errata/RHSA-2025:3617RHSA-2025:3617RHSA-2025:3617 https://access.redhat.com/security/cve/CVE-2023-44441CVE-2023-44441CVE-2023-44441https://access.redhat.com/security/cve/CVE-2023-44442CVE-2023-44442CVE-2023-44442https://access.redhat.com/security/cve/CVE-2023-44443CVE-2023-44443CVE-2023-44443https://access.redhat.com/security/cve/CVE-2023-44444CVE-2023-44444CVE-2023-44444https://bugzilla.redhat.com/22499382249938https://bugzilla.redhat.com/22499422249942https://bugzilla.redhat.com/22499442249944https://bugzilla.redhat.com/22499462249946https://errata.almalinux.org/9/ALSA-2025-3617.htmlALSA-2025:3617ALSA-2025:3617 c=gimp-2.99.8-4.el9_5.x86_64.rpm=gimp-libs-2.99.8-4.el9_5.i686.rpm=gimp-libs-2.99.8-4.el9_5.x86_64.rpmc=gimp-2.99.8-4.el9_5.x86_64.rpm=gimp-libs-2.99.8-4.el9_5.i686.rpm=gimp-libs-2.99.8-4.el9_5.x86_64.rpmϷ 2hBBBBBBBBsecurityLow: python3.12 security update3oXhttps://access.redhat.com/errata/RHSA-2025:3631RHSA-2025:3631RHSA-2025:3631 https://access.redhat.com/security/cve/CVE-2024-7592CVE-2024-7592CVE-2024-7592https://errata.almalinux.org/9/ALSA-2025-3631.htmlALSA-2025:3631ALSA-2025:3631  python3.12-devel-3.12.5-2.el9_5.3.x86_64.rpm:python3.12-3.12.5-2.el9_5.3.x86_64.rpm python3.12-devel-3.12.5-2.el9_5.3.i686.rpm python3.12-libs-3.12.5-2.el9_5.3.x86_64.rpm;python3.12-tkinter-3.12.5-2.el9_5.3.x86_64.rpm python3.12-libs-3.12.5-2.el9_5.3.i686.rpm python3.12-devel-3.12.5-2.el9_5.3.x86_64.rpm:python3.12-3.12.5-2.el9_5.3.x86_64.rpm python3.12-devel-3.12.5-2.el9_5.3.i686.rpm python3.12-libs-3.12.5-2.el9_5.3.x86_64.rpm;python3.12-tkinter-3.12.5-2.el9_5.3.x86_64.rpm python3.12-libs-3.12.5-2.el9_5.3.i686.rpm9 =sBBBBBBBBsecurityLow: python3.11 security update3GXhttps://access.redhat.com/errata/RHSA-2025:3634RHSA-2025:3634RHSA-2025:3634 https://access.redhat.com/security/cve/CVE-2024-7592CVE-2024-7592CVE-2024-7592https://errata.almalinux.org/9/ALSA-2025-3634.htmlALSA-2025:3634ALSA-2025:3634 _python3.11-libs-3.11.9-7.el9_5.3.i686.rpmpython3.11-tkinter-3.11.9-7.el9_5.3.x86_64.rpm^python3.11-devel-3.11.9-7.el9_5.3.x86_64.rpm_python3.11-libs-3.11.9-7.el9_5.3.x86_64.rpm^python3.11-devel-3.11.9-7.el9_5.3.i686.rpmpython3.11-3.11.9-7.el9_5.3.x86_64.rpm_python3.11-libs-3.11.9-7.el9_5.3.i686.rpmpython3.11-tkinter-3.11.9-7.el9_5.3.x86_64.rpm^python3.11-devel-3.11.9-7.el9_5.3.x86_64.rpm_python3.11-libs-3.11.9-7.el9_5.3.x86_64.rpm^python3.11-devel-3.11.9-7.el9_5.3.i686.rpmpython3.11-3.11.9-7.el9_5.3.x86_64.rpmC ~BBBBBBsecurityModerate: tomcat security update{https://access.redhat.com/errata/RHSA-2025:3645RHSA-2025:3645RHSA-2025:3645 https://access.redhat.com/security/cve/CVE-2024-50379CVE-2024-50379CVE-2024-50379https://access.redhat.com/security/cve/CVE-2025-24813CVE-2025-24813CVE-2025-24813https://bugzilla.redhat.com/23328172332817https://bugzilla.redhat.com/23511292351129https://errata.almalinux.org/9/ALSA-2025-3645.htmlALSA-2025:3645ALSA-2025:3645 m#tomcat-servlet-4.0-api-9.0.87-2.el9_5.1.noarch.rpmk#tomcat-jsp-2.3-api-9.0.87-2.el9_5.1.noarch.rpmh#tomcat-admin-webapps-9.0.87-2.el9_5.1.noarch.rpmj#tomcat-el-3.0-api-9.0.87-2.el9_5.1.noarch.rpml#tomcat-lib-9.0.87-2.el9_5.1.noarch.rpmg#tomcat-9.0.87-2.el9_5.1.noarch.rpmi#tomcat-docs-webapp-9.0.87-2.el9_5.1.noarch.rpmn#tomcat-webapps-9.0.87-2.el9_5.1.noarch.rpmm#tomcat-servlet-4.0-api-9.0.87-2.el9_5.1.noarch.rpmk#tomcat-jsp-2.3-api-9.0.87-2.el9_5.1.noarch.rpmh#tomcat-admin-webapps-9.0.87-2.el9_5.1.noarch.rpmj#tomcat-el-3.0-api-9.0.87-2.el9_5.1.noarch.rpml#tomcat-lib-9.0.87-2.el9_5.1.noarch.rpmg#tomcat-9.0.87-2.el9_5.1.noarch.rpmi#tomcat-docs-webapp-9.0.87-2.el9_5.1.noarch.rpmn#tomcat-webapps-9.0.87-2.el9_5.1.noarch.rpm  GBBBBBBBBBBsecurityImportant: webkit2gtk3 security update https://access.redhat.com/errata/RHSA-2025:3713RHSA-2025:3713RHSA-2025:3713 https://access.redhat.com/security/cve/CVE-2024-44192CVE-2024-44192CVE-2024-44192https://access.redhat.com/security/cve/CVE-2024-54467CVE-2024-54467CVE-2024-54467https://access.redhat.com/security/cve/CVE-2024-54551CVE-2024-54551CVE-2024-54551https://access.redhat.com/security/cve/CVE-2025-24208CVE-2025-24208CVE-2025-24208https://access.redhat.com/security/cve/CVE-2025-24209CVE-2025-24209CVE-2025-24209https://access.redhat.com/security/cve/CVE-2025-24216CVE-2025-24216CVE-2025-24216https://access.redhat.com/security/cve/CVE-2025-30427CVE-2025-30427CVE-2025-30427https://bugzilla.redhat.com/23538712353871https://bugzilla.redhat.com/23538722353872https://bugzilla.redhat.com/23579092357909https://bugzilla.redhat.com/23579102357910https://bugzilla.redhat.com/23579112357911https://bugzilla.redhat.com/23579172357917https://bugzilla.redhat.com/23579192357919https://errata.almalinux.org/9/ALSA-2025-3713.htmlALSA-2025:3713ALSA-2025:3713 4 webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm3 webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm3 webkit2gtk3-2.48.1-1.el9_5.i686.rpm5 webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm6 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm5 webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm6 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm4 webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm4 webkit2gtk3-devel-2.48.1-1.el9_5.i686.rpm3 webkit2gtk3-2.48.1-1.el9_5.x86_64.rpm3 webkit2gtk3-2.48.1-1.el9_5.i686.rpm5 webkit2gtk3-jsc-2.48.1-1.el9_5.x86_64.rpm6 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.i686.rpm5 webkit2gtk3-jsc-2.48.1-1.el9_5.i686.rpm6 webkit2gtk3-jsc-devel-2.48.1-1.el9_5.x86_64.rpm4 webkit2gtk3-devel-2.48.1-1.el9_5.x86_64.rpm "TBBBBBBBBBBBBsecurityImportant: delve and golang security update$https://access.redhat.com/errata/RHSA-2025:3773RHSA-2025:3773RHSA-2025:3773 https://access.redhat.com/security/cve/CVE-2024-34156CVE-2024-34156CVE-2024-34156https://bugzilla.redhat.com/23105282310528https://errata.almalinux.org/9/ALSA-2025-3773.htmlALSA-2025:3773ALSA-2025:3773 mgolang-misc-1.23.6-2.el9_5.noarch.rpmEgo-toolset-1.23.6-2.el9_5.x86_64.rpm@golang-1.23.6-2.el9_5.x86_64.rpmogolang-tests-1.23.6-2.el9_5.noarch.rpmngolang-src-1.23.6-2.el9_5.noarch.rpmlgolang-docs-1.23.6-2.el9_5.noarch.rpm>delve-1.24.1-2.el9_5.x86_64.rpm8golang-race-1.23.6-2.el9_5.x86_64.rpmAgolang-bin-1.23.6-2.el9_5.x86_64.rpm mgolang-misc-1.23.6-2.el9_5.noarch.rpmEgo-toolset-1.23.6-2.el9_5.x86_64.rpm@golang-1.23.6-2.el9_5.x86_64.rpmogolang-tests-1.23.6-2.el9_5.noarch.rpmngolang-src-1.23.6-2.el9_5.noarch.rpmlgolang-docs-1.23.6-2.el9_5.noarch.rpm>delve-1.24.1-2.el9_5.x86_64.rpm8golang-race-1.23.6-2.el9_5.x86_64.rpmAgolang-bin-1.23.6-2.el9_5.x86_64.rpm5  %csecurityImportant: gvisor-tap-vsock security update:Yhttps://access.redhat.com/errata/RHSA-2025:3833RHSA-2025:3833RHSA-2025:3833 https://access.redhat.com/security/cve/CVE-2025-22869CVE-2025-22869CVE-2025-22869https://bugzilla.redhat.com/23483672348367https://errata.almalinux.org/9/ALSA-2025-3833.htmlALSA-2025:3833ALSA-2025:3833 wugvisor-tap-vsock-0.8.5-1.el9_5.x86_64.rpmwugvisor-tap-vsock-0.8.5-1.el9_5.x86_64.rpm5! 2fBBBBBBBBBBsecurityModerate: java-1.8.0-openjdk security updatehttps://access.redhat.com/errata/RHSA-2025:3845RHSA-2025:3845RHSA-2025:3845 https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3845.htmlALSA-2025:3845ALSA-2025:3845 c`java-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9.x86_64.rpmb`java-1.8.0-openjdk-1.8.0.452.b09-2.el9.x86_64.rpmB`java-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9.noarch.rpme`java-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9.x86_64.rpmC`java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9.noarch.rpmf`java-1.8.0-openjdk-src-1.8.0.452.b09-2.el9.x86_64.rpmd`java-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9.x86_64.rpmc`java-1.8.0-openjdk-demo-1.8.0.452.b09-2.el9.x86_64.rpmb`java-1.8.0-openjdk-1.8.0.452.b09-2.el9.x86_64.rpmB`java-1.8.0-openjdk-javadoc-1.8.0.452.b09-2.el9.noarch.rpme`java-1.8.0-openjdk-headless-1.8.0.452.b09-2.el9.x86_64.rpmC`java-1.8.0-openjdk-javadoc-zip-1.8.0.452.b09-2.el9.noarch.rpmf`java-1.8.0-openjdk-src-1.8.0.452.b09-2.el9.x86_64.rpmd`java-1.8.0-openjdk-devel-1.8.0.452.b09-2.el9.x86_64.rpmW" sBBBBBBBBBBBBBBBBsecurityModerate: java-17-openjdk security updatehttps://access.redhat.com/errata/RHSA-2025:3852RHSA-2025:3852RHSA-2025:3852 https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3852.htmlALSA-2025:3852ALSA-2025:3852 .java-17-openjdk-jmods-17.0.15.0.6-2.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.15.0.6-2.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.15.0.6-2.el9.alma.1.x86_64.rpm/java-17-openjdk-src-17.0.15.0.6-2.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.15.0.6-2.el9.alma.1.x86_64.rpm0java-17-openjdk-static-libs-17.0.15.0.6-2.el9.alma.1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.15.0.6-2.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.15.0.6-2.el9.alma.1.x86_64.rpm .java-17-openjdk-jmods-17.0.15.0.6-2.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.15.0.6-2.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.15.0.6-2.el9.alma.1.x86_64.rpm/java-17-openjdk-src-17.0.15.0.6-2.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.15.0.6-2.el9.alma.1.x86_64.rpm0java-17-openjdk-static-libs-17.0.15.0.6-2.el9.alma.1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.15.0.6-2.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.15.0.6-2.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.15.0.6-2.el9.alma.1.x86_64.rpm # FBBBBBBBBBBBBBBBBsecurityModerate: java-21-openjdk security updatehttps://access.redhat.com/errata/RHSA-2025:3855RHSA-2025:3855RHSA-2025:3855 https://access.redhat.com/security/cve/CVE-2025-21587CVE-2025-21587CVE-2025-21587https://access.redhat.com/security/cve/CVE-2025-30691CVE-2025-30691CVE-2025-30691https://access.redhat.com/security/cve/CVE-2025-30698CVE-2025-30698CVE-2025-30698https://errata.almalinux.org/9/ALSA-2025-3855.htmlALSA-2025:3855ALSA-2025:3855 1(java-21-openjdk-headless-21.0.7.0.6-1.el9.alma.1.x86_64.rpm6(java-21-openjdk-static-libs-21.0.7.0.6-1.el9.alma.1.x86_64.rpm/(java-21-openjdk-demo-21.0.7.0.6-1.el9.alma.1.x86_64.rpm2(java-21-openjdk-javadoc-21.0.7.0.6-1.el9.alma.1.x86_64.rpm5(java-21-openjdk-src-21.0.7.0.6-1.el9.alma.1.x86_64.rpm3(java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9.alma.1.x86_64.rpm0(java-21-openjdk-devel-21.0.7.0.6-1.el9.alma.1.x86_64.rpm.(java-21-openjdk-21.0.7.0.6-1.el9.alma.1.x86_64.rpm4(java-21-openjdk-jmods-21.0.7.0.6-1.el9.alma.1.x86_64.rpm 1(java-21-openjdk-headless-21.0.7.0.6-1.el9.alma.1.x86_64.rpm6(java-21-openjdk-static-libs-21.0.7.0.6-1.el9.alma.1.x86_64.rpm/(java-21-openjdk-demo-21.0.7.0.6-1.el9.alma.1.x86_64.rpm2(java-21-openjdk-javadoc-21.0.7.0.6-1.el9.alma.1.x86_64.rpm5(java-21-openjdk-src-21.0.7.0.6-1.el9.alma.1.x86_64.rpm3(java-21-openjdk-javadoc-zip-21.0.7.0.6-1.el9.alma.1.x86_64.rpm0(java-21-openjdk-devel-21.0.7.0.6-1.el9.alma.1.x86_64.rpm.(java-21-openjdk-21.0.7.0.6-1.el9.alma.1.x86_64.rpm4(java-21-openjdk-jmods-21.0.7.0.6-1.el9.alma.1.x86_64.rpm$ ,YBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updatehttps://access.redhat.com/errata/RHSA-2025:3937RHSA-2025:3937RHSA-2025:3937 https://access.redhat.com/security/cve/CVE-2024-53150CVE-2024-53150CVE-2024-53150https://bugzilla.redhat.com/23339712333971https://errata.almalinux.org/9/ALSA-2025-3937.htmlALSA-2025:3937ALSA-2025:3937 (Gkernel-headers-5.14.0-503.38.1.el9_5.x86_64.rpm*Grv-5.14.0-503.38.1.el9_5.x86_64.rpmGkernel-doc-5.14.0-503.38.1.el9_5.noarch.rpm)Grtla-5.14.0-503.38.1.el9_5.x86_64.rpm!Gkernel-debug-devel-5.14.0-503.38.1.el9_5.x86_64.rpm$Gkernel-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpm"Gkernel-debug-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpmMGpython3-perf-5.14.0-503.38.1.el9_5.x86_64.rpm#Gkernel-devel-5.14.0-503.38.1.el9_5.x86_64.rpm%Gperf-5.14.0-503.38.1.el9_5.x86_64.rpm (Gkernel-headers-5.14.0-503.38.1.el9_5.x86_64.rpm*Grv-5.14.0-503.38.1.el9_5.x86_64.rpmGkernel-doc-5.14.0-503.38.1.el9_5.noarch.rpm)Grtla-5.14.0-503.38.1.el9_5.x86_64.rpm!Gkernel-debug-devel-5.14.0-503.38.1.el9_5.x86_64.rpm$Gkernel-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpm"Gkernel-debug-devel-matched-5.14.0-503.38.1.el9_5.x86_64.rpmMGpython3-perf-5.14.0-503.38.1.el9_5.x86_64.rpm#Gkernel-devel-5.14.0-503.38.1.el9_5.x86_64.rpm%Gperf-5.14.0-503.38.1.el9_5.x86_64.rpm_% 3mBBBBsecurityImportant: libxslt security update*https://access.redhat.com/errata/RHSA-2025:4025RHSA-2025:4025RHSA-2025:4025 https://access.redhat.com/security/cve/CVE-2024-55549CVE-2024-55549CVE-2024-55549https://bugzilla.redhat.com/23524842352484https://errata.almalinux.org/9/ALSA-2025-4025.htmlALSA-2025:4025ALSA-2025:4025 7libxslt-devel-1.1.34-9.el9_5.2.x86_64.rpm7libxslt-1.1.34-9.el9_5.2.i686.rpm7libxslt-devel-1.1.34-9.el9_5.2.i686.rpm7libxslt-1.1.34-9.el9_5.2.x86_64.rpm7libxslt-devel-1.1.34-9.el9_5.2.x86_64.rpm7libxslt-1.1.34-9.el9_5.2.i686.rpm7libxslt-devel-1.1.34-9.el9_5.2.i686.rpm7libxslt-1.1.34-9.el9_5.2.x86_64.rpm& 6tsecurityImportant: thunderbird security update/Rhttps://access.redhat.com/errata/RHSA-2025:4169RHSA-2025:4169RHSA-2025:4169 https://access.redhat.com/security/cve/CVE-2025-3028CVE-2025-3028CVE-2025-3028https://access.redhat.com/security/cve/CVE-2025-3029CVE-2025-3029CVE-2025-3029https://access.redhat.com/security/cve/CVE-2025-3030CVE-2025-3030CVE-2025-3030https://bugzilla.redhat.com/23565562356556https://bugzilla.redhat.com/23565622356562https://bugzilla.redhat.com/23565632356563https://errata.almalinux.org/9/ALSA-2025-4169.htmlALSA-2025:4169ALSA-2025:4169 9Lthunderbird-128.9.0-2.el9_5.alma.1.x86_64.rpm9Lthunderbird-128.9.0-2.el9_5.alma.1.x86_64.rpm' 9wsecurityImportant: thunderbird security update https://access.redhat.com/errata/RHSA-2025:4229RHSA-2025:4229RHSA-2025:4229 https://access.redhat.com/security/cve/CVE-2025-2830CVE-2025-2830CVE-2025-2830https://access.redhat.com/security/cve/CVE-2025-3522CVE-2025-3522CVE-2025-3522https://access.redhat.com/security/cve/CVE-2025-3523CVE-2025-3523CVE-2025-3523https://bugzilla.redhat.com/23597862359786https://bugzilla.redhat.com/23597892359789https://bugzilla.redhat.com/23597932359793https://errata.almalinux.org/9/ALSA-2025-4229.htmlALSA-2025:4229ALSA-2025:4229 9Mthunderbird-128.9.2-1.el9_5.alma.1.x86_64.rpm9Mthunderbird-128.9.2-1.el9_5.alma.1.x86_64.rpmb( zBBBBBBBBsecurityModerate: glibc security update!;https://access.redhat.com/errata/RHSA-2025:4244RHSA-2025:4244RHSA-2025:4244 https://access.redhat.com/security/cve/CVE-2025-0395CVE-2025-0395CVE-2025-0395https://bugzilla.redhat.com/23394602339460https://errata.almalinux.org/9/ALSA-2025-4244.htmlALSA-2025:4244ALSA-2025:4244 pglibc-doc-2.34-125.el9_5.8.alma.1.noarch.rpmpglibc-headers-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-locale-source-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-utils-2.34-125.el9_5.8.alma.1.x86_64.rpmIpglibc-devel-2.34-125.el9_5.8.alma.1.i686.rpmIpglibc-devel-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-doc-2.34-125.el9_5.8.alma.1.noarch.rpmpglibc-headers-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-locale-source-2.34-125.el9_5.8.alma.1.x86_64.rpmpglibc-utils-2.34-125.el9_5.8.alma.1.x86_64.rpmIpglibc-devel-2.34-125.el9_5.8.alma.1.i686.rpmIpglibc-devel-2.34-125.el9_5.8.alma.1.x86_64.rpm?) 7qBBBBBBBB_BnBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.1 security update\3https://access.redhat.com/errata/RHSA-2025:4263RHSA-2025:4263RHSA-2025:4263 https://access.redhat.com/security/cve/CVE-2024-11233CVE-2024-11233CVE-2024-11233https://access.redhat.com/security/cve/CVE-2024-11234CVE-2024-11234CVE-2024-11234https://access.redhat.com/security/cve/CVE-2024-8929CVE-2024-8929CVE-2024-8929https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23279602327960https://bugzilla.redhat.com/23285212328521https://bugzilla.redhat.com/23285232328523https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-4263.htmlALSA-2025:4263ALSA-2025:4263 6'Fphp-snmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmmFphp-dba-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmyFphp-mysqlnd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmAphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmpFphp-embedded-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm?vphp-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpmwFphp-ldap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm}Fphp-pgsql-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmkFphp-cli-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmoFphp-devel-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm{Fphp-opcache-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmlFphp-common-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmvFphp-intl-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmzFphp-odbc-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmFphp-soap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmtFphp-gd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmFphp-xml-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm|Fphp-pdo-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmxFphp-mbstring-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmjFphp-bcmath-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmqFphp-enchant-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmFphp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmrFphp-ffi-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm~Fphp-process-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm>|php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmuFphp-gmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmnFphp-dbg-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmf|apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmsFphp-fpm-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm=|php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm6'Fphp-snmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmmFphp-dba-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmyFphp-mysqlnd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmAphp-pecl-zip-1.20.1-1.module_el9.1.0+15+94ba28e4.x86_64.rpmpFphp-embedded-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm?vphp-pecl-rrd-2.0.3-4.module_el9.1.0+15+94ba28e4.x86_64.rpmwFphp-ldap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm}Fphp-pgsql-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmkFphp-cli-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmoFphp-devel-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm{Fphp-opcache-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmlFphp-common-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmvFphp-intl-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmzFphp-odbc-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmFphp-soap-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmtFphp-gd-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmFphp-xml-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm|Fphp-pdo-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmxFphp-mbstring-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm@php-pecl-xdebug3-3.1.4-1.module_el9.1.0+15+94ba28e4.x86_64.rpmjFphp-bcmath-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmqFphp-enchant-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmFphp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmrFphp-ffi-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm~Fphp-process-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm>|php-pecl-apcu-devel-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpmuFphp-gmp-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmnFphp-dbg-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpmf|apcu-panel-5.1.21-1.module_el9.1.0+15+94ba28e4.noarch.rpmsFphp-fpm-8.1.32-1.module_el9.5.0+156+9f1cd3fd.x86_64.rpm=|php-pecl-apcu-5.1.21-1.module_el9.1.0+15+94ba28e4.x86_64.rpm(* uemacs-27.2-11.el9_5.2.x86_64.rpm?uemacs-common-27.2-11.el9_5.2.x86_64.rpm@uemacs-lucid-27.2-11.el9_5.2.x86_64.rpmAuemacs-nox-27.2-11.el9_5.2.x86_64.rpmFuemacs-filesystem-27.2-11.el9_5.2.noarch.rpm>uemacs-27.2-11.el9_5.2.x86_64.rpmN0 ZBBBBsecurityModerate: python3.9 security update9[https://access.redhat.com/errata/RHSA-2025:6977RHSA-2025:6977RHSA-2025:6977 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-6977.htmlALSA-2025:6977ALSA-2025:6977 gkpython-unversioned-command-3.9.21-2.el9.noarch.rpm1kpython3-tkinter-3.9.21-2.el9.x86_64.rpmRkpython3-devel-3.9.21-2.el9.x86_64.rpmRkpython3-devel-3.9.21-2.el9.i686.rpmgkpython-unversioned-command-3.9.21-2.el9.noarch.rpm1kpython3-tkinter-3.9.21-2.el9.x86_64.rpmRkpython3-devel-3.9.21-2.el9.x86_64.rpmRkpython3-devel-3.9.21-2.el9.i686.rpmÔt1 %aBBsecurityModerate: openssh security updatehttps://access.redhat.com/errata/RHSA-2025:6993RHSA-2025:6993RHSA-2025:6993 https://access.redhat.com/security/cve/CVE-2025-26465CVE-2025-26465CVE-2025-26465https://bugzilla.redhat.com/23447802344780https://errata.almalinux.org/9/ALSA-2025-6993.htmlALSA-2025:6993ALSA-2025:6993  openssh-askpass-8.7p1-45.el9.x86_64.rpmrpam_ssh_agent_auth-0.10.4-5.45.el9.x86_64.rpm openssh-askpass-8.7p1-45.el9.x86_64.rpmrpam_ssh_agent_auth-0.10.4-5.45.el9.x86_64.rpm‡{2 (fsecurityModerate: python-requests security update`https://access.redhat.com/errata/RHSA-2025:7049RHSA-2025:7049RHSA-2025:7049 https://access.redhat.com/security/cve/CVE-2024-35195CVE-2024-35195CVE-2024-35195https://bugzilla.redhat.com/22821142282114https://errata.almalinux.org/9/ALSA-2025-7049.htmlALSA-2025:7049ALSA-2025:7049 +apython3-requests+security-2.25.1-9.el9.noarch.rpm,apython3-requests+socks-2.25.1-9.el9.noarch.rpm+apython3-requests+security-2.25.1-9.el9.noarch.rpm,apython3-requests+socks-2.25.1-9.el9.noarch.rpmÔ#3 +isecurityModerate: rsync security updatet`https://access.redhat.com/errata/RHSA-2025:7050RHSA-2025:7050RHSA-2025:7050 https://access.redhat.com/security/cve/CVE-2024-12087CVE-2024-12087CVE-2024-12087https://access.redhat.com/security/cve/CVE-2024-12088CVE-2024-12088CVE-2024-12088https://access.redhat.com/security/cve/CVE-2024-12747CVE-2024-12747CVE-2024-12747https://bugzilla.redhat.com/23306722330672https://bugzilla.redhat.com/23306762330676https://bugzilla.redhat.com/23329682332968https://errata.almalinux.org/9/ALSA-2025-7050.htmlALSA-2025:7050ALSA-2025:7050 rrsync-daemon-3.2.5-3.el9.noarch.rpmZrrsync-rrsync-3.2.5-3.el9.noarch.rpmrrsync-daemon-3.2.5-3.el9.noarch.rpmZrrsync-rrsync-3.2.5-3.el9.noarch.rpmÔ.4 /lBsecurityModerate: krb5 security updateT{https://access.redhat.com/errata/RHSA-2025:7067RHSA-2025:7067RHSA-2025:7067 https://access.redhat.com/security/cve/CVE-2025-24528CVE-2025-24528CVE-2025-24528https://bugzilla.redhat.com/23427962342796https://errata.almalinux.org/9/ALSA-2025-7067.htmlALSA-2025:7067ALSA-2025:7067 Skrb5-devel-1.21.1-6.el9.i686.rpmSkrb5-devel-1.21.1-6.el9.x86_64.rpmSkrb5-devel-1.21.1-6.el9.i686.rpmSkrb5-devel-1.21.1-6.el9.x86_64.rpmÔi5 ;pBBBBBBBBBsecurityModerate: gnutls security updateOxhttps://access.redhat.com/errata/RHSA-2025:7076RHSA-2025:7076RHSA-2025:7076 https://access.redhat.com/security/cve/CVE-2024-12243CVE-2024-12243CVE-2024-12243https://bugzilla.redhat.com/23446152344615https://errata.almalinux.org/9/ALSA-2025-7076.htmlALSA-2025:7076ALSA-2025:7076 Pgnutls-c++-3.8.3-6.el9.i686.rpmRgnutls-devel-3.8.3-6.el9.x86_64.rpmQgnutls-dane-3.8.3-6.el9.x86_64.rpmQgnutls-dane-3.8.3-6.el9.i686.rpmPgnutls-c++-3.8.3-6.el9.x86_64.rpmgnutls-utils-3.8.3-6.el9.x86_64.rpmRgnutls-devel-3.8.3-6.el9.i686.rpmPgnutls-c++-3.8.3-6.el9.i686.rpmRgnutls-devel-3.8.3-6.el9.x86_64.rpmQgnutls-dane-3.8.3-6.el9.x86_64.rpmQgnutls-dane-3.8.3-6.el9.i686.rpmPgnutls-c++-3.8.3-6.el9.x86_64.rpmgnutls-utils-3.8.3-6.el9.x86_64.rpmRgnutls-devel-3.8.3-6.el9.i686.rpmÔw6 |BBBsecurityModerate: libtasn1 security updateG4https://access.redhat.com/errata/RHSA-2025:7077RHSA-2025:7077RHSA-2025:7077 https://access.redhat.com/security/cve/CVE-2024-12133CVE-2024-12133CVE-2024-12133https://bugzilla.redhat.com/23446112344611https://errata.almalinux.org/9/ALSA-2025-7077.htmlALSA-2025:7077ALSA-2025:7077 }Mlibtasn1-devel-4.16.0-9.el9.x86_64.rpm=Mlibtasn1-tools-4.16.0-9.el9.x86_64.rpm}Mlibtasn1-devel-4.16.0-9.el9.i686.rpm}Mlibtasn1-devel-4.16.0-9.el9.x86_64.rpm=Mlibtasn1-tools-4.16.0-9.el9.x86_64.rpm}Mlibtasn1-devel-4.16.0-9.el9.i686.rpmÔ7 BsecurityModerate: aardvark-dns security update{yhttps://access.redhat.com/errata/RHSA-2025:7094RHSA-2025:7094RHSA-2025:7094 https://access.redhat.com/security/cve/CVE-2024-8418CVE-2024-8418CVE-2024-8418https://bugzilla.redhat.com/23096832309683https://errata.almalinux.org/9/ALSA-2025-7094.htmlALSA-2025:7094ALSA-2025:7094 )aardvark-dns-1.14.0-1.el9.x86_64.rpm)aardvark-dns-1.14.0-1.el9.x86_64.rpmÔ+8 EBBBBBBBBsecurityModerate: python3.12 security updatet[https://access.redhat.com/errata/RHSA-2025:7107RHSA-2025:7107RHSA-2025:7107 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7107.htmlALSA-2025:7107ALSA-2025:7107  python3.12-libs-3.12.9-1.el9.i686.rpm:python3.12-3.12.9-1.el9.x86_64.rpm;python3.12-tkinter-3.12.9-1.el9.x86_64.rpm python3.12-devel-3.12.9-1.el9.x86_64.rpm python3.12-libs-3.12.9-1.el9.x86_64.rpm python3.12-devel-3.12.9-1.el9.i686.rpm python3.12-libs-3.12.9-1.el9.i686.rpm:python3.12-3.12.9-1.el9.x86_64.rpm;python3.12-tkinter-3.12.9-1.el9.x86_64.rpm python3.12-devel-3.12.9-1.el9.x86_64.rpm python3.12-libs-3.12.9-1.el9.x86_64.rpm python3.12-devel-3.12.9-1.el9.i686.rpmÔ9 PBBBBBBBBsecurityModerate: python3.11 security updateO[https://access.redhat.com/errata/RHSA-2025:7109RHSA-2025:7109RHSA-2025:7109 https://access.redhat.com/security/cve/CVE-2025-0938CVE-2025-0938CVE-2025-0938https://bugzilla.redhat.com/23432372343237https://errata.almalinux.org/9/ALSA-2025-7109.htmlALSA-2025:7109ALSA-2025:7109 wpython3.11-tkinter-3.11.11-2.el9.x86_64.rpm^wpython3.11-devel-3.11.11-2.el9.i686.rpmwpython3.11-3.11.11-2.el9.x86_64.rpm_wpython3.11-libs-3.11.11-2.el9.i686.rpm_wpython3.11-libs-3.11.11-2.el9.x86_64.rpm^wpython3.11-devel-3.11.11-2.el9.x86_64.rpmwpython3.11-tkinter-3.11.11-2.el9.x86_64.rpm^wpython3.11-devel-3.11.11-2.el9.i686.rpmwpython3.11-3.11.11-2.el9.x86_64.rpm_wpython3.11-libs-3.11.11-2.el9.i686.rpm_wpython3.11-libs-3.11.11-2.el9.x86_64.rpm^wpython3.11-devel-3.11.11-2.el9.x86_64.rpmÔO: ([BBBBBBBBBBBsecurityImportant: osbuild and osbuild-composer security update*Bhttps://access.redhat.com/errata/RHSA-2025:7118RHSA-2025:7118RHSA-2025:7118 https://access.redhat.com/security/cve/CVE-2024-1394CVE-2024-1394CVE-2024-1394https://access.redhat.com/security/cve/CVE-2024-34158CVE-2024-34158CVE-2024-34158https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/22629212262921https://bugzilla.redhat.com/23105292310529https://bugzilla.redhat.com/23157192315719https://errata.almalinux.org/9/ALSA-2025-7118.htmlALSA-2025:7118ALSA-2025:7118 }Bosbuild-luks2-141-1.el9.alma.1.noarch.rpm`Bpython3-osbuild-141-1.el9.alma.1.noarch.rpmBosbuild-ostree-141-1.el9.alma.1.noarch.rpmTLosbuild-composer-132-1.el9.alma.1.x86_64.rpmBosbuild-selinux-141-1.el9.alma.1.noarch.rpm|Bosbuild-depsolve-dnf-141-1.el9.alma.1.noarch.rpmVLosbuild-composer-worker-132-1.el9.alma.1.x86_64.rpm~Bosbuild-lvm2-141-1.el9.alma.1.noarch.rpm{Bosbuild-141-1.el9.alma.1.noarch.rpmULosbuild-composer-core-132-1.el9.alma.1.x86_64.rpm }Bosbuild-luks2-141-1.el9.alma.1.noarch.rpm`Bpython3-osbuild-141-1.el9.alma.1.noarch.rpmBosbuild-ostree-141-1.el9.alma.1.noarch.rpmTLosbuild-composer-132-1.el9.alma.1.x86_64.rpmBosbuild-selinux-141-1.el9.alma.1.noarch.rpm|Bosbuild-depsolve-dnf-141-1.el9.alma.1.noarch.rpmVLosbuild-composer-worker-132-1.el9.alma.1.x86_64.rpm~Bosbuild-lvm2-141-1.el9.alma.1.noarch.rpm{Bosbuild-141-1.el9.alma.1.noarch.rpmULosbuild-composer-core-132-1.el9.alma.1.x86_64.rpmÔ\; 0iBBBBBsecurityModerate: protobuf security updatel:https://access.redhat.com/errata/RHSA-2025:7138RHSA-2025:7138RHSA-2025:7138 https://access.redhat.com/security/cve/CVE-2022-1941CVE-2022-1941CVE-2022-1941https://bugzilla.redhat.com/22914702291470https://errata.almalinux.org/9/ALSA-2025-7138.htmlALSA-2025:7138ALSA-2025:7138 -&protobuf-3.14.0-16.el9.x86_64.rpm.&protobuf-lite-3.14.0-16.el9.i686.rpm-&protobuf-3.14.0-16.el9.i686.rpm*&python3-protobuf-3.14.0-16.el9.noarch.rpm.&protobuf-lite-3.14.0-16.el9.x86_64.rpm-&protobuf-3.14.0-16.el9.x86_64.rpm.&protobuf-lite-3.14.0-16.el9.i686.rpm-&protobuf-3.14.0-16.el9.i686.rpm*&python3-protobuf-3.14.0-16.el9.noarch.rpm.&protobuf-lite-3.14.0-16.el9.x86_64.rpmÔC< 6qBBBsecurityModerate: rpm-ostree security update&phttps://access.redhat.com/errata/RHSA-2025:7147RHSA-2025:7147RHSA-2025:7147 https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7147.htmlALSA-2025:7147ALSA-2025:7147 7rpm-ostree-libs-2025.5-1.el9.i686.rpmY7rpm-ostree-2025.5-1.el9.x86_64.rpm7rpm-ostree-libs-2025.5-1.el9.x86_64.rpm7rpm-ostree-libs-2025.5-1.el9.i686.rpmY7rpm-ostree-2025.5-1.el9.x86_64.rpm7rpm-ostree-libs-2025.5-1.el9.x86_64.rpmÔL= ;wBBsecurityModerate: bootc security updateZhttps://access.redhat.com/errata/RHSA-2025:7160RHSA-2025:7160RHSA-2025:7160 https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7160.htmlALSA-2025:7160ALSA-2025:7160  7system-reinstall-bootc-1.1.6-3.el9_6.x86_64.rpm-7bootc-1.1.6-3.el9_6.x86_64.rpm 7system-reinstall-bootc-1.1.6-3.el9_6.x86_64.rpm-7bootc-1.1.6-3.el9_6.x86_64.rpmÔm> |BBBBBBBBBBsecurityModerate: xorg-x11-server security updatepshttps://access.redhat.com/errata/RHSA-2025:7163RHSA-2025:7163RHSA-2025:7163 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7163.htmlALSA-2025:7163ALSA-2025:7163 !xorg-x11-server-Xorg-1.20.11-28.el9_6.x86_64.rpm"xorg-x11-server-Xvfb-1.20.11-28.el9_6.x86_64.rpm xorg-x11-server-Xnest-1.20.11-28.el9_6.x86_64.rpmxorg-x11-server-Xdmx-1.20.11-28.el9_6.x86_64.rpm$xorg-x11-server-common-1.20.11-28.el9_6.x86_64.rpmxorg-x11-server-Xephyr-1.20.11-28.el9_6.x86_64.rpm!xorg-x11-server-Xorg-1.20.11-28.el9_6.x86_64.rpm"xorg-x11-server-Xvfb-1.20.11-28.el9_6.x86_64.rpm xorg-x11-server-Xnest-1.20.11-28.el9_6.x86_64.rpmxorg-x11-server-Xdmx-1.20.11-28.el9_6.x86_64.rpm$xorg-x11-server-common-1.20.11-28.el9_6.x86_64.rpmxorg-x11-server-Xephyr-1.20.11-28.el9_6.x86_64.rpmÔ-? IsecurityModerate: xorg-x11-server-Xwayland security updatechttps://access.redhat.com/errata/RHSA-2025:7165RHSA-2025:7165RHSA-2025:7165 https://access.redhat.com/security/cve/CVE-2024-9632CVE-2024-9632CVE-2024-9632https://access.redhat.com/security/cve/CVE-2025-26594CVE-2025-26594CVE-2025-26594https://access.redhat.com/security/cve/CVE-2025-26595CVE-2025-26595CVE-2025-26595https://access.redhat.com/security/cve/CVE-2025-26596CVE-2025-26596CVE-2025-26596https://access.redhat.com/security/cve/CVE-2025-26597CVE-2025-26597CVE-2025-26597https://access.redhat.com/security/cve/CVE-2025-26598CVE-2025-26598CVE-2025-26598https://access.redhat.com/security/cve/CVE-2025-26599CVE-2025-26599CVE-2025-26599https://access.redhat.com/security/cve/CVE-2025-26600CVE-2025-26600CVE-2025-26600https://access.redhat.com/security/cve/CVE-2025-26601CVE-2025-26601CVE-2025-26601https://bugzilla.redhat.com/23172332317233https://bugzilla.redhat.com/23452482345248https://bugzilla.redhat.com/23452512345251https://bugzilla.redhat.com/23452522345252https://bugzilla.redhat.com/23452532345253https://bugzilla.redhat.com/23452542345254https://bugzilla.redhat.com/23452552345255https://bugzilla.redhat.com/23452562345256https://bugzilla.redhat.com/23452572345257https://errata.almalinux.org/9/ALSA-2025-7165.htmlALSA-2025:7165ALSA-2025:7165 #"xorg-x11-server-Xwayland-23.2.7-3.el9_6.x86_64.rpm#"xorg-x11-server-Xwayland-23.2.7-3.el9_6.x86_64.rpmÔ@ LBBBBBBBBBBBBBBBBsecurityModerate: gstreamer1, gstreamer1-plugins-bad-free, gstreamer1-plugins-ugly-free, and gstreamer1-rtsp-server security updategshttps://access.redhat.com/errata/RHSA-2025:7178RHSA-2025:7178RHSA-2025:7178 https://access.redhat.com/security/cve/CVE-2024-0444CVE-2024-0444CVE-2024-0444https://access.redhat.com/security/cve/CVE-2024-4453CVE-2024-4453CVE-2024-4453https://bugzilla.redhat.com/22829992282999https://bugzilla.redhat.com/22923352292335https://errata.almalinux.org/9/ALSA-2025-7178.htmlALSA-2025:7178ALSA-2025:7178 ?gstreamer1-1.22.12-3.el9.x86_64.rpmg?gstreamer1-plugins-bad-free-1.22.12-3.el9.x86_64.rpmg?gstreamer1-plugins-bad-free-1.22.12-3.el9.i686.rpm?gstreamer1-rtsp-server-1.22.12-3.el9.i686.rpm?gstreamer1-1.22.12-3.el9.i686.rpm?gstreamer1-plugins-bad-free-libs-1.22.12-3.el9.x86_64.rpm?gstreamer1-plugins-bad-free-libs-1.22.12-3.el9.i686.rpma?gstreamer1-plugins-ugly-free-1.22.12-3.el9.i686.rpm?gstreamer1-rtsp-server-1.22.12-3.el9.x86_64.rpm?gstreamer1-devel-1.22.12-3.el9.x86_64.rpm?gstreamer1-devel-1.22.12-3.el9.i686.rpma?gstreamer1-plugins-ugly-free-1.22.12-3.el9.x86_64.rpm ?gstreamer1-1.22.12-3.el9.x86_64.rpmg?gstreamer1-plugins-bad-free-1.22.12-3.el9.x86_64.rpmg?gstreamer1-plugins-bad-free-1.22.12-3.el9.i686.rpm?gstreamer1-rtsp-server-1.22.12-3.el9.i686.rpm?gstreamer1-1.22.12-3.el9.i686.rpm?gstreamer1-plugins-bad-free-libs-1.22.12-3.el9.x86_64.rpm?gstreamer1-plugins-bad-free-libs-1.22.12-3.el9.i686.rpma?gstreamer1-plugins-ugly-free-1.22.12-3.el9.i686.rpm?gstreamer1-rtsp-server-1.22.12-3.el9.x86_64.rpm?gstreamer1-devel-1.22.12-3.el9.x86_64.rpm?gstreamer1-devel-1.22.12-3.el9.i686.rpma?gstreamer1-plugins-ugly-free-1.22.12-3.el9.x86_64.rpmÔ6A "_BsecurityModerate: corosync security updateZ$https://access.redhat.com/errata/RHSA-2025:7201RHSA-2025:7201RHSA-2025:7201 https://access.redhat.com/security/cve/CVE-2025-30472CVE-2025-30472CVE-2025-30472https://bugzilla.redhat.com/23542292354229https://errata.almalinux.org/9/ALSA-2025-7201.htmlALSA-2025:7201ALSA-2025:7201 oBcorosynclib-3.1.9-2.el9_6.i686.rpmoBcorosynclib-3.1.9-2.el9_6.x86_64.rpmoBcorosynclib-3.1.9-2.el9_6.i686.rpmoBcorosynclib-3.1.9-2.el9_6.x86_64.rpmÔ:B %csecurityModerate: rust-bootupd security update~Shttps://access.redhat.com/errata/RHSA-2025:7241RHSA-2025:7241RHSA-2025:7241 https://access.redhat.com/security/cve/CVE-2025-24898CVE-2025-24898CVE-2025-24898https://bugzilla.redhat.com/23435732343573https://errata.almalinux.org/9/ALSA-2025-7241.htmlALSA-2025:7241ALSA-2025:7241 .~bootupd-0.2.27-3.el9.x86_64.rpm.~bootupd-0.2.27-3.el9.x86_64.rpmÔIC ,fBBBBsecurityModerate: gstreamer1-plugins-good security updateQ$https://access.redhat.com/errata/RHSA-2025:7242RHSA-2025:7242RHSA-2025:7242 https://access.redhat.com/security/cve/CVE-2024-47543CVE-2024-47543CVE-2024-47543https://access.redhat.com/security/cve/CVE-2024-47544CVE-2024-47544CVE-2024-47544https://access.redhat.com/security/cve/CVE-2024-47545CVE-2024-47545CVE-2024-47545https://access.redhat.com/security/cve/CVE-2024-47546CVE-2024-47546CVE-2024-47546https://access.redhat.com/security/cve/CVE-2024-47596CVE-2024-47596CVE-2024-47596https://access.redhat.com/security/cve/CVE-2024-47597CVE-2024-47597CVE-2024-47597https://access.redhat.com/security/cve/CVE-2024-47598CVE-2024-47598CVE-2024-47598https://access.redhat.com/security/cve/CVE-2024-47599CVE-2024-47599CVE-2024-47599https://access.redhat.com/security/cve/CVE-2024-47601CVE-2024-47601CVE-2024-47601https://access.redhat.com/security/cve/CVE-2024-47602CVE-2024-47602CVE-2024-47602https://access.redhat.com/security/cve/CVE-2024-47603CVE-2024-47603CVE-2024-47603https://access.redhat.com/security/cve/CVE-2024-47774CVE-2024-47774CVE-2024-47774https://access.redhat.com/security/cve/CVE-2024-47775CVE-2024-47775CVE-2024-47775https://access.redhat.com/security/cve/CVE-2024-47776CVE-2024-47776CVE-2024-47776https://access.redhat.com/security/cve/CVE-2024-47777CVE-2024-47777CVE-2024-47777https://access.redhat.com/security/cve/CVE-2024-47778CVE-2024-47778CVE-2024-47778https://access.redhat.com/security/cve/CVE-2024-47834CVE-2024-47834CVE-2024-47834https://bugzilla.redhat.com/23317232331723https://bugzilla.redhat.com/23317392331739https://bugzilla.redhat.com/23317412331741https://bugzilla.redhat.com/23317432331743https://bugzilla.redhat.com/23317442331744https://bugzilla.redhat.com/23317472331747https://bugzilla.redhat.com/23317482331748https://bugzilla.redhat.com/23317492331749https://bugzilla.redhat.com/23317502331750https://bugzilla.redhat.com/23317512331751https://bugzilla.redhat.com/23317522331752https://bugzilla.redhat.com/23317552331755https://bugzilla.redhat.com/23317562331756https://bugzilla.redhat.com/23317592331759https://bugzilla.redhat.com/23317612331761https://bugzilla.redhat.com/23317622331762https://bugzilla.redhat.com/23317632331763https://errata.almalinux.org/9/ALSA-2025-7242.htmlALSA-2025:7242ALSA-2025:7242 i gstreamer1-plugins-good-gtk-1.22.12-4.el9.x86_64.rpmh gstreamer1-plugins-good-1.22.12-4.el9.i686.rpmh gstreamer1-plugins-good-1.22.12-4.el9.x86_64.rpmi gstreamer1-plugins-good-gtk-1.22.12-4.el9.i686.rpmi gstreamer1-plugins-good-gtk-1.22.12-4.el9.x86_64.rpmh gstreamer1-plugins-good-1.22.12-4.el9.i686.rpmh gstreamer1-plugins-good-1.22.12-4.el9.x86_64.rpmi gstreamer1-plugins-good-gtk-1.22.12-4.el9.i686.rpmÔqD 5mBBBBBBsecurityModerate: gstreamer1-plugins-base security updateb9 https://access.redhat.com/errata/RHSA-2025:7243RHSA-2025:7243RHSA-2025:7243 https://access.redhat.com/security/cve/CVE-2024-47541CVE-2024-47541CVE-2024-47541https://access.redhat.com/security/cve/CVE-2024-47542CVE-2024-47542CVE-2024-47542https://access.redhat.com/security/cve/CVE-2024-47600CVE-2024-47600CVE-2024-47600https://access.redhat.com/security/cve/CVE-2024-47835CVE-2024-47835CVE-2024-47835https://bugzilla.redhat.com/23317172331717https://bugzilla.redhat.com/23317242331724https://bugzilla.redhat.com/23317382331738https://bugzilla.redhat.com/23317422331742https://errata.almalinux.org/9/ALSA-2025-7243.htmlALSA-2025:7243ALSA-2025:7243  gstreamer1-plugins-base-devel-1.22.12-4.el9.i686.rpm gstreamer1-plugins-base-1.22.12-4.el9.x86_64.rpm gstreamer1-plugins-base-1.22.12-4.el9.i686.rpm gstreamer1-plugins-base-tools-1.22.12-4.el9.x86_64.rpm gstreamer1-plugins-base-devel-1.22.12-4.el9.x86_64.rpm gstreamer1-plugins-base-devel-1.22.12-4.el9.i686.rpm gstreamer1-plugins-base-1.22.12-4.el9.x86_64.rpm gstreamer1-plugins-base-1.22.12-4.el9.i686.rpm gstreamer1-plugins-base-tools-1.22.12-4.el9.x86_64.rpm gstreamer1-plugins-base-devel-1.22.12-4.el9.x86_64.rpmÔE 8vsecurityModerate: git-lfs security updateEhttps://access.redhat.com/errata/RHSA-2025:7256RHSA-2025:7256RHSA-2025:7256 https://access.redhat.com/security/cve/CVE-2023-39321CVE-2023-39321CVE-2023-39321https://access.redhat.com/security/cve/CVE-2023-39322CVE-2023-39322CVE-2023-39322https://access.redhat.com/security/cve/CVE-2024-24788CVE-2024-24788CVE-2024-24788https://access.redhat.com/security/cve/CVE-2024-24790CVE-2024-24790CVE-2024-24790https://access.redhat.com/security/cve/CVE-2024-24791CVE-2024-24791CVE-2024-24791https://access.redhat.com/security/cve/CVE-2024-9355CVE-2024-9355CVE-2024-9355https://bugzilla.redhat.com/22377772237777https://bugzilla.redhat.com/22377782237778https://bugzilla.redhat.com/22798142279814https://bugzilla.redhat.com/22927872292787https://bugzilla.redhat.com/22953102295310https://bugzilla.redhat.com/23157192315719https://errata.almalinux.org/9/ALSA-2025-7256.htmlALSA-2025:7256ALSA-2025:7256  ;git-lfs-3.6.1-1.el9.x86_64.rpm ;git-lfs-3.6.1-1.el9.x86_64.rpmÔ"F P MBBBBsecurityImportant: libxslt security update?https://access.redhat.com/errata/RHSA-2025:7410RHSA-2025:7410RHSA-2025:7410 https://access.redhat.com/security/cve/CVE-2024-55549CVE-2024-55549CVE-2024-55549https://bugzilla.redhat.com/23524842352484https://errata.almalinux.org/9/ALSA-2025-7410.htmlALSA-2025:7410ALSA-2025:7410 4libxslt-devel-1.1.34-13.el9_6.x86_64.rpm4libxslt-1.1.34-13.el9_6.i686.rpm4libxslt-1.1.34-13.el9_6.x86_64.rpm4libxslt-devel-1.1.34-13.el9_6.i686.rpm4libxslt-devel-1.1.34-13.el9_6.x86_64.rpm4libxslt-1.1.34-13.el9_6.i686.rpm4libxslt-1.1.34-13.el9_6.x86_64.rpm4libxslt-devel-1.1.34-13.el9_6.i686.rpm.Q TBBsecurityImportant: gimp security updateD, https://access.redhat.com/errata/RHSA-2025:7417RHSA-2025:7417RHSA-2025:7417 https://access.redhat.com/security/cve/CVE-2023-44441CVE-2023-44441CVE-2023-44441https://access.redhat.com/security/cve/CVE-2023-44442CVE-2023-44442CVE-2023-44442https://access.redhat.com/security/cve/CVE-2023-44443CVE-2023-44443CVE-2023-44443https://access.redhat.com/security/cve/CVE-2023-44444CVE-2023-44444CVE-2023-44444https://bugzilla.redhat.com/22499382249938https://bugzilla.redhat.com/22499422249942https://bugzilla.redhat.com/22499442249944https://bugzilla.redhat.com/22499462249946https://errata.almalinux.org/9/ALSA-2025-7417.htmlALSA-2025:7417ALSA-2025:7417 cgimp-2.99.8-4.el9_6.x86_64.rpmgimp-libs-2.99.8-4.el9_6.x86_64.rpmcgimp-2.99.8-4.el9_6.x86_64.rpmgimp-libs-2.99.8-4.el9_6.x86_64.rpm+R BBBBBBBBBBBBBLBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.3 security updatepghttps://access.redhat.com/errata/RHSA-2025:7418RHSA-2025:7418RHSA-2025:7418 https://access.redhat.com/security/cve/CVE-2024-11235CVE-2024-11235CVE-2024-11235https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://bugzilla.redhat.com/23575312357531https://errata.almalinux.org/9/ALSA-2025-7418.htmlALSA-2025:7418ALSA-2025:7418 ' sJphp-fpm-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmA:php-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmmJphp-dba-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmtJphp-gd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmzJphp-odbc-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm~Jphp-process-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmlJphp-common-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmpJphp-embedded-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmf_apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmyJphp-mysqlnd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmJphp-soap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmJphp-xml-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmqJphp-enchant-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmuJphp-gmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm=_php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmoJphp-devel-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmnJphp-dbg-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmJphp-snmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm?wphp-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmJphp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmjJphp-bcmath-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmxJphp-mbstring-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm{Jphp-opcache-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm}Jphp-pgsql-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmkJphp-cli-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmrJphp-ffi-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmwJphp-ldap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm|Jphp-pdo-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm@php-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm>_php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmvJphp-intl-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm^-php-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm' sJphp-fpm-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmA:php-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmmJphp-dba-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmtJphp-gd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmzJphp-odbc-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm~Jphp-process-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmlJphp-common-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmpJphp-embedded-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmf_apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmyJphp-mysqlnd-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmJphp-soap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmJphp-xml-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmqJphp-enchant-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmuJphp-gmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm=_php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmoJphp-devel-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmnJphp-dbg-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmJphp-snmp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm?wphp-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmJphp-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmjJphp-bcmath-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmxJphp-mbstring-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm{Jphp-opcache-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm}Jphp-pgsql-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmkJphp-cli-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmrJphp-ffi-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpmwJphp-ldap-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm|Jphp-pdo-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm@php-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpm>_php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmvJphp-intl-8.3.19-1.module_el9.6.0+166+f262c21c.x86_64.rpm^-php-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpmÔkS LsecurityImportant: mod_auth_openidc security updateWhttps://access.redhat.com/errata/RHSA-2025:7419RHSA-2025:7419RHSA-2025:7419 https://access.redhat.com/security/cve/CVE-2025-31492CVE-2025-31492CVE-2025-31492https://bugzilla.redhat.com/23577382357738https://errata.almalinux.org/9/ALSA-2025-7419.htmlALSA-2025:7419ALSA-2025:7419  mod_auth_openidc-2.4.10-1.el9_6.1.x86_64.rpm mod_auth_openidc-2.4.10-1.el9_6.1.x86_64.rpm*T OBBBBBBBBBBBBsecurityModerate: ghostscript security updateshhttps://access.redhat.com/errata/RHSA-2025:7422RHSA-2025:7422RHSA-2025:7422 https://access.redhat.com/security/cve/CVE-2023-46751CVE-2023-46751CVE-2023-46751https://access.redhat.com/security/cve/CVE-2024-46951CVE-2024-46951CVE-2024-46951https://access.redhat.com/security/cve/CVE-2024-46952CVE-2024-46952CVE-2024-46952https://access.redhat.com/security/cve/CVE-2024-46953CVE-2024-46953CVE-2024-46953https://access.redhat.com/security/cve/CVE-2024-46954CVE-2024-46954CVE-2024-46954https://access.redhat.com/security/cve/CVE-2024-46956CVE-2024-46956CVE-2024-46956https://bugzilla.redhat.com/22533652253365https://bugzilla.redhat.com/23250412325041https://bugzilla.redhat.com/23250432325043https://bugzilla.redhat.com/23250442325044https://bugzilla.redhat.com/23250452325045https://bugzilla.redhat.com/23250472325047https://errata.almalinux.org/9/ALSA-2025-7422.htmlALSA-2025:7422ALSA-2025:7422 vRghostscript-tools-fonts-9.54.0-18.el9_6.x86_64.rpmwRghostscript-tools-printing-9.54.0-18.el9_6.x86_64.rpmTRlibgs-9.54.0-18.el9_6.x86_64.rpmMRghostscript-doc-9.54.0-18.el9_6.noarch.rpmuRghostscript-tools-dvipdf-9.54.0-18.el9_6.x86_64.rpmTRlibgs-9.54.0-18.el9_6.i686.rpmxRghostscript-x11-9.54.0-18.el9_6.x86_64.rpmtRghostscript-9.54.0-18.el9_6.x86_64.rpmvRghostscript-tools-fonts-9.54.0-18.el9_6.x86_64.rpmwRghostscript-tools-printing-9.54.0-18.el9_6.x86_64.rpmTRlibgs-9.54.0-18.el9_6.x86_64.rpmMRghostscript-doc-9.54.0-18.el9_6.noarch.rpmuRghostscript-tools-dvipdf-9.54.0-18.el9_6.x86_64.rpmTRlibgs-9.54.0-18.el9_6.i686.rpmxRghostscript-x11-9.54.0-18.el9_6.x86_64.rpmtRghostscript-9.54.0-18.el9_6.x86_64.rpmeU 1^BBBBBBBBBBBBBBBBBsecurityImportant: kernel security update[@https://access.redhat.com/errata/RHSA-2025:7423RHSA-2025:7423RHSA-2025:7423 https://access.redhat.com/security/cve/CVE-2024-58005CVE-2024-58005CVE-2024-58005https://access.redhat.com/security/cve/CVE-2024-58007CVE-2024-58007CVE-2024-58007https://access.redhat.com/security/cve/CVE-2024-58069CVE-2024-58069CVE-2024-58069https://access.redhat.com/security/cve/CVE-2025-21633CVE-2025-21633CVE-2025-21633https://access.redhat.com/security/cve/CVE-2025-21927CVE-2025-21927CVE-2025-21927https://access.redhat.com/security/cve/CVE-2025-21993CVE-2025-21993CVE-2025-21993https://bugzilla.redhat.com/23388132338813https://bugzilla.redhat.com/23485652348565https://bugzilla.redhat.com/23485902348590https://bugzilla.redhat.com/23503642350364https://bugzilla.redhat.com/23565932356593https://bugzilla.redhat.com/23569082356908https://errata.almalinux.org/9/ALSA-2025-7423.htmlALSA-2025:7423ALSA-2025:7423 (Hkernel-headers-5.14.0-570.16.1.el9_6.x86_64.rpmMHpython3-perf-5.14.0-570.16.1.el9_6.x86_64.rpm!Hkernel-debug-devel-5.14.0-570.16.1.el9_6.x86_64.rpm*Hrv-5.14.0-570.16.1.el9_6.x86_64.rpmHkernel-doc-5.14.0-570.16.1.el9_6.noarch.rpm$Hkernel-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm%Hperf-5.14.0-570.16.1.el9_6.x86_64.rpm)Hrtla-5.14.0-570.16.1.el9_6.x86_64.rpm#Hkernel-devel-5.14.0-570.16.1.el9_6.x86_64.rpm"Hkernel-debug-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm (Hkernel-headers-5.14.0-570.16.1.el9_6.x86_64.rpmMHpython3-perf-5.14.0-570.16.1.el9_6.x86_64.rpm!Hkernel-debug-devel-5.14.0-570.16.1.el9_6.x86_64.rpm*Hrv-5.14.0-570.16.1.el9_6.x86_64.rpmHkernel-doc-5.14.0-570.16.1.el9_6.noarch.rpm$Hkernel-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpm%Hperf-5.14.0-570.16.1.el9_6.x86_64.rpm)Hrtla-5.14.0-570.16.1.el9_6.x86_64.rpm#Hkernel-devel-5.14.0-570.16.1.el9_6.x86_64.rpm"Hkernel-debug-devel-matched-5.14.0-570.16.1.el9_6.x86_64.rpmɐ,V 8rBBBBsecurityImportant: osbuild-composer security updateLhttps://access.redhat.com/errata/RHSA-2025:7425RHSA-2025:7425RHSA-2025:7425 https://access.redhat.com/security/cve/CVE-2025-30204CVE-2025-30204CVE-2025-30204https://bugzilla.redhat.com/23541952354195https://errata.almalinux.org/9/ALSA-2025-7425.htmlALSA-2025:7425ALSA-2025:7425 VMosbuild-composer-worker-132.2-1.el9_6.alma.1.x86_64.rpmUMosbuild-composer-core-132.2-1.el9_6.alma.1.x86_64.rpmTMosbuild-composer-132.2-1.el9_6.alma.1.x86_64.rpmVMosbuild-composer-worker-132.2-1.el9_6.alma.1.x86_64.rpmUMosbuild-composer-core-132.2-1.el9_6.alma.1.x86_64.rpmTMosbuild-composer-132.2-1.el9_6.alma.1.x86_64.rpmW RKB]BBBBBBBsecurityModerate: nodejs:20 security updateg+https://access.redhat.com/errata/RHSA-2025:7426RHSA-2025:7426RHSA-2025:7426 https://access.redhat.com/security/cve/CVE-2025-31498CVE-2025-31498CVE-2025-31498https://bugzilla.redhat.com/23582712358271https://errata.almalinux.org/9/ALSA-2025-7426.htmlALSA-2025:7426ALSA-2025:7426 +2'dnodejs-full-i18n-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpmknodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpmnodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm<nodejs-docs-20.19.1-1.module_el9.6.0+163+d268fe53.noarch.rpm!nodejs-devel-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpmcfnpm-10.8.2-1.20.19.1.1.module_el9.6.0+163+d268fe53.x86_64.rpmnodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm+nodejs-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpm+2'dnodejs-full-i18n-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpmknodejs-nodemon-3.0.1-1.module_el9.5.0+125+8dc38870.noarch.rpmnodejs-packaging-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm<nodejs-docs-20.19.1-1.module_el9.6.0+163+d268fe53.noarch.rpm!nodejs-devel-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpmcfnpm-10.8.2-1.20.19.1.1.module_el9.6.0+163+d268fe53.x86_64.rpmnodejs-packaging-bundler-2021.06-4.module_el9.6.0+162+8dc602e5.noarch.rpm+nodejs-20.19.1-1.module_el9.6.0+163+d268fe53.x86_64.rpmÔ@X CBBsecurityLow: xterm security update3Whttps://access.redhat.com/errata/RHSA-2025:7427RHSA-2025:7427RHSA-2025:7427 https://access.redhat.com/security/cve/CVE-2022-45063CVE-2022-45063CVE-2022-45063https://bugzilla.redhat.com/21424742142474https://errata.almalinux.org/9/ALSA-2025-7427.htmlALSA-2025:7427ALSA-2025:7427 cxterm-resize-366-10.el9_6.x86_64.rpmbxterm-366-10.el9_6.x86_64.rpmcxterm-resize-366-10.el9_6.x86_64.rpmbxterm-366-10.el9_6.x86_64.rpmnY HBBsecurityImportant: firefox security updateig https://access.redhat.com/errata/RHSA-2025:7428RHSA-2025:7428RHSA-2025:7428 https://access.redhat.com/security/cve/CVE-2025-2817CVE-2025-2817CVE-2025-2817https://access.redhat.com/security/cve/CVE-2025-4083CVE-2025-4083CVE-2025-4083https://access.redhat.com/security/cve/CVE-2025-4087CVE-2025-4087CVE-2025-4087https://access.redhat.com/security/cve/CVE-2025-4091CVE-2025-4091CVE-2025-4091https://access.redhat.com/security/cve/CVE-2025-4093CVE-2025-4093CVE-2025-4093https://bugzilla.redhat.com/23629022362902https://bugzilla.redhat.com/23629042362904https://bugzilla.redhat.com/23629072362907https://bugzilla.redhat.com/23629122362912https://bugzilla.redhat.com/23629152362915https://errata.almalinux.org/9/ALSA-2025-7428.htmlALSA-2025:7428ALSA-2025:7428 OGfirefox-x11-128.10.0-1.el9_6.alma.1.x86_64.rpm7Gfirefox-128.10.0-1.el9_6.alma.1.x86_64.rpmOGfirefox-x11-128.10.0-1.el9_6.alma.1.x86_64.rpm7Gfirefox-128.10.0-1.el9_6.alma.1.x86_64.rpmnZ MBBBsecurityImportant: redis:7 security updateP'https://access.redhat.com/errata/RHSA-2025:7429RHSA-2025:7429RHSA-2025:7429 https://access.redhat.com/security/cve/CVE-2025-21605CVE-2025-21605CVE-2025-21605https://bugzilla.redhat.com/23618832361883https://errata.almalinux.org/9/ALSA-2025-7429.htmlALSA-2025:7429ALSA-2025:7429 6c'UWredis-devel-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpm:Wredis-doc-7.2.8-1.module_el9.6.0+168+b8d8e900.noarch.rpm6Wredis-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpm6c'UWredis-devel-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpm:Wredis-doc-7.2.8-1.module_el9.6.0+168+b8d8e900.noarch.rpm6Wredis-7.2.8-1.module_el9.6.0+168+b8d8e900.x86_64.rpm[ SBBBsecurityImportant: yelp security updatewdhttps://access.redhat.com/errata/RHSA-2025:7430RHSA-2025:7430RHSA-2025:7430 https://access.redhat.com/security/cve/CVE-2025-3155CVE-2025-3155CVE-2025-3155https://bugzilla.redhat.com/23570912357091https://errata.almalinux.org/9/ALSA-2025-7430.htmlALSA-2025:7430ALSA-2025:7430 OCyelp-libs-40.3-2.el9_6.1.x86_64.rpmOCyelp-libs-40.3-2.el9_6.1.i686.rpm1Cyelp-40.3-2.el9_6.1.x86_64.rpmOCyelp-libs-40.3-2.el9_6.1.x86_64.rpmOCyelp-libs-40.3-2.el9_6.1.i686.rpm1Cyelp-40.3-2.el9_6.1.x86_64.rpm6\ YBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php security update[ https://access.redhat.com/errata/RHSA-2025:7431RHSA-2025:7431RHSA-2025:7431 https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-7431.htmlALSA-2025:7431ALSA-2025:7431 mAphp-dba-8.0.30-3.el9_6.x86_64.rpmzAphp-odbc-8.0.30-3.el9_6.x86_64.rpm|Aphp-pdo-8.0.30-3.el9_6.x86_64.rpmwAphp-ldap-8.0.30-3.el9_6.x86_64.rpm~Aphp-process-8.0.30-3.el9_6.x86_64.rpm{Aphp-opcache-8.0.30-3.el9_6.x86_64.rpmoAphp-devel-8.0.30-3.el9_6.x86_64.rpmsAphp-fpm-8.0.30-3.el9_6.x86_64.rpmrAphp-ffi-8.0.30-3.el9_6.x86_64.rpmjAphp-bcmath-8.0.30-3.el9_6.x86_64.rpmlAphp-common-8.0.30-3.el9_6.x86_64.rpmAphp-soap-8.0.30-3.el9_6.x86_64.rpmqAphp-enchant-8.0.30-3.el9_6.x86_64.rpmpAphp-embedded-8.0.30-3.el9_6.x86_64.rpmAphp-8.0.30-3.el9_6.x86_64.rpmuAphp-gmp-8.0.30-3.el9_6.x86_64.rpmtAphp-gd-8.0.30-3.el9_6.x86_64.rpmAphp-xml-8.0.30-3.el9_6.x86_64.rpmAphp-snmp-8.0.30-3.el9_6.x86_64.rpmxAphp-mbstring-8.0.30-3.el9_6.x86_64.rpmvAphp-intl-8.0.30-3.el9_6.x86_64.rpmyAphp-mysqlnd-8.0.30-3.el9_6.x86_64.rpmkAphp-cli-8.0.30-3.el9_6.x86_64.rpm}Aphp-pgsql-8.0.30-3.el9_6.x86_64.rpmnAphp-dbg-8.0.30-3.el9_6.x86_64.rpmmAphp-dba-8.0.30-3.el9_6.x86_64.rpmzAphp-odbc-8.0.30-3.el9_6.x86_64.rpm|Aphp-pdo-8.0.30-3.el9_6.x86_64.rpmwAphp-ldap-8.0.30-3.el9_6.x86_64.rpm~Aphp-process-8.0.30-3.el9_6.x86_64.rpm{Aphp-opcache-8.0.30-3.el9_6.x86_64.rpmoAphp-devel-8.0.30-3.el9_6.x86_64.rpmsAphp-fpm-8.0.30-3.el9_6.x86_64.rpmrAphp-ffi-8.0.30-3.el9_6.x86_64.rpmjAphp-bcmath-8.0.30-3.el9_6.x86_64.rpmlAphp-common-8.0.30-3.el9_6.x86_64.rpmAphp-soap-8.0.30-3.el9_6.x86_64.rpmqAphp-enchant-8.0.30-3.el9_6.x86_64.rpmpAphp-embedded-8.0.30-3.el9_6.x86_64.rpmAphp-8.0.30-3.el9_6.x86_64.rpmuAphp-gmp-8.0.30-3.el9_6.x86_64.rpmtAphp-gd-8.0.30-3.el9_6.x86_64.rpmAphp-xml-8.0.30-3.el9_6.x86_64.rpmAphp-snmp-8.0.30-3.el9_6.x86_64.rpmxAphp-mbstring-8.0.30-3.el9_6.x86_64.rpmvAphp-intl-8.0.30-3.el9_6.x86_64.rpmyAphp-mysqlnd-8.0.30-3.el9_6.x86_64.rpmkAphp-cli-8.0.30-3.el9_6.x86_64.rpm}Aphp-pgsql-8.0.30-3.el9_6.x86_64.rpmnAphp-dbg-8.0.30-3.el9_6.x86_64.rpm ] >DB^BBBBBBBBcBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: php:8.2 security updateg3https://access.redhat.com/errata/RHSA-2025:7432RHSA-2025:7432RHSA-2025:7432 https://access.redhat.com/security/cve/CVE-2024-11233CVE-2024-11233CVE-2024-11233https://access.redhat.com/security/cve/CVE-2024-11234CVE-2024-11234CVE-2024-11234https://access.redhat.com/security/cve/CVE-2024-8929CVE-2024-8929CVE-2024-8929https://access.redhat.com/security/cve/CVE-2025-1217CVE-2025-1217CVE-2025-1217https://access.redhat.com/security/cve/CVE-2025-1219CVE-2025-1219CVE-2025-1219https://access.redhat.com/security/cve/CVE-2025-1734CVE-2025-1734CVE-2025-1734https://access.redhat.com/security/cve/CVE-2025-1736CVE-2025-1736CVE-2025-1736https://access.redhat.com/security/cve/CVE-2025-1861CVE-2025-1861CVE-2025-1861https://bugzilla.redhat.com/23279602327960https://bugzilla.redhat.com/23285212328521https://bugzilla.redhat.com/23285232328523https://bugzilla.redhat.com/23559172355917https://bugzilla.redhat.com/23560412356041https://bugzilla.redhat.com/23560422356042https://bugzilla.redhat.com/23560432356043https://bugzilla.redhat.com/23560462356046https://errata.almalinux.org/9/ALSA-2025-7432.htmlALSA-2025:7432ALSA-2025:7432 'zHphp-odbc-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmqHphp-enchant-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmpHphp-embedded-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmmHphp-dba-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmkHphp-cli-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmlHphp-common-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmyHphp-mysqlnd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmnHphp-dbg-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmf^apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmrHphp-ffi-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm~Hphp-process-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm}Hphp-pgsql-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmHphp-xml-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmHphp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm?php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm|Hphp-pdo-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmsHphp-fpm-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmwHphp-ldap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmHphp-soap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmoHphp-devel-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm>^php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmA9php-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm@php-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpm{Hphp-opcache-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmvHphp-intl-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmjHphp-bcmath-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmxHphp-mbstring-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm=^php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmHphp-snmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmuHphp-gmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmtHphp-gd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm'zHphp-odbc-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmqHphp-enchant-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmpHphp-embedded-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmmHphp-dba-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmkHphp-cli-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmlHphp-common-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmyHphp-mysqlnd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmnHphp-dbg-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmf^apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmrHphp-ffi-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm~Hphp-process-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm}Hphp-pgsql-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmHphp-xml-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmHphp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm?php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpm|Hphp-pdo-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmsHphp-fpm-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmwHphp-ldap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmHphp-soap-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmoHphp-devel-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm>^php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmA9php-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm@php-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpm{Hphp-opcache-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmvHphp-intl-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmjHphp-bcmath-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmxHphp-mbstring-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpm=^php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmHphp-snmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmuHphp-gmp-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmtHphp-gd-8.2.28-1.module_el9.6.0+165+cf879a7c.x86_64.rpmÔ:^ AcB\BBBBBBBBBBBsecurityImportant: nodejs:22 security updatebhttps://access.redhat.com/errata/RHSA-2025:7433RHSA-2025:7433RHSA-2025:7433 https://access.redhat.com/security/cve/CVE-2025-31498CVE-2025-31498CVE-2025-31498https://access.redhat.com/security/cve/CVE-2025-3277CVE-2025-3277CVE-2025-3277https://bugzilla.redhat.com/23582712358271https://bugzilla.redhat.com/23595532359553https://errata.almalinux.org/9/ALSA-2025-7433.htmlALSA-2025:7433ALSA-2025:7433 +k' cknpm-10.9.2-1.22.15.0.1.module_el9.6.0+164+2d89b8ed.x86_64.rpmLlibsoup-2.72.0-10.el9_6.1.i686.rpm>Llibsoup-2.72.0-10.el9_6.1.x86_64.rpm?Llibsoup-devel-2.72.0-10.el9_6.1.i686.rpm?Llibsoup-devel-2.72.0-10.el9_6.1.x86_64.rpm>Llibsoup-2.72.0-10.el9_6.1.i686.rpm>Llibsoup-2.72.0-10.el9_6.1.x86_64.rpma WBBBBBsecurityModerate: avahi security updated*https://access.redhat.com/errata/RHSA-2025:7437RHSA-2025:7437RHSA-2025:7437 https://access.redhat.com/security/cve/CVE-2024-52616CVE-2024-52616CVE-2024-52616https://bugzilla.redhat.com/23264292326429https://errata.almalinux.org/9/ALSA-2025-7437.htmlALSA-2025:7437ALSA-2025:7437 Fhttps://access.redhat.com/errata/RHSA-2025:7600RHSA-2025:7600RHSA-2025:7600 https://access.redhat.com/security/cve/CVE-2025-26646CVE-2025-26646CVE-2025-26646https://bugzilla.redhat.com/23653172365317https://errata.almalinux.org/9/ALSA-2025-7600.htmlALSA-2025:7600ALSA-2025:7600 4dotnet-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm_dotnet-templates-9.0-9.0.106-1.el9_6.x86_64.rpm4dotnet-apphost-pack-9.0-9.0.5-1.el9_6.x86_64.rpm_dotnet-sdk-aot-9.0-9.0.106-1.el9_6.x86_64.rpm4dotnet-host-9.0.5-1.el9_6.x86_64.rpm4aspnetcore-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm4aspnetcore-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm4dotnet-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm4dotnet-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm4aspnetcore-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm_dotnet-sdk-dbg-9.0-9.0.106-1.el9_6.x86_64.rpm_dotnet-sdk-9.0-9.0.106-1.el9_6.x86_64.rpm4dotnet-hostfxr-9.0-9.0.5-1.el9_6.x86_64.rpm _netstandard-targeting-pack-2.1-9.0.106-1.el9_6.x86_64.rpm4dotnet-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm_dotnet-templates-9.0-9.0.106-1.el9_6.x86_64.rpm4dotnet-apphost-pack-9.0-9.0.5-1.el9_6.x86_64.rpm_dotnet-sdk-aot-9.0-9.0.106-1.el9_6.x86_64.rpm4dotnet-host-9.0.5-1.el9_6.x86_64.rpm4aspnetcore-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm4aspnetcore-runtime-9.0-9.0.5-1.el9_6.x86_64.rpm4dotnet-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm4dotnet-targeting-pack-9.0-9.0.5-1.el9_6.x86_64.rpm4aspnetcore-runtime-dbg-9.0-9.0.5-1.el9_6.x86_64.rpm_dotnet-sdk-dbg-9.0-9.0.106-1.el9_6.x86_64.rpm_dotnet-sdk-9.0-9.0.106-1.el9_6.x86_64.rpm4dotnet-hostfxr-9.0-9.0.5-1.el9_6.x86_64.rpm _netstandard-targeting-pack-2.1-9.0.106-1.el9_6.x86_64.rpmÔCh 54securityModerate: xdg-utils security updateMhttps://access.redhat.com/errata/RHSA-2025:7672RHSA-2025:7672RHSA-2025:7672 https://access.redhat.com/security/cve/CVE-2022-4055CVE-2022-4055CVE-2022-4055https://bugzilla.redhat.com/21437922143792https://errata.almalinux.org/9/ALSA-2025-7672.htmlALSA-2025:7672ALSA-2025:7672 \Wxdg-utils-1.1.3-13.el9_6.noarch.rpm\Wxdg-utils-1.1.3-13.el9_6.noarch.rpmÔ@i :vBBsecurityImportant: grafana security updateQ8https://access.redhat.com/errata/RHSA-2025:7893RHSA-2025:7893RHSA-2025:7893 https://access.redhat.com/security/cve/CVE-2025-4123CVE-2025-4123CVE-2025-4123https://bugzilla.redhat.com/23646322364632https://errata.almalinux.org/9/ALSA-2025-7893.htmlALSA-2025:7893ALSA-2025:7893 lAgrafana-selinux-10.2.6-13.el9_6.x86_64.rpmFAgrafana-10.2.6-13.el9_6.x86_64.rpmlAgrafana-selinux-10.2.6-13.el9_6.x86_64.rpmFAgrafana-10.2.6-13.el9_6.x86_64.rpmFj {BBBBBBBBBBBBBBBBBsecurityImportant: kernel security update 9https://access.redhat.com/errata/RHSA-2025:7903RHSA-2025:7903RHSA-2025:7903 https://access.redhat.com/security/cve/CVE-2025-21756CVE-2025-21756CVE-2025-21756https://access.redhat.com/security/cve/CVE-2025-21966CVE-2025-21966CVE-2025-21966https://access.redhat.com/security/cve/CVE-2025-37749CVE-2025-37749CVE-2025-37749https://bugzilla.redhat.com/23486092348609https://bugzilla.redhat.com/23566052356605https://bugzilla.redhat.com/23633322363332https://errata.almalinux.org/9/ALSA-2025-7903.htmlALSA-2025:7903ALSA-2025:7903 "Ikernel-debug-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm*Irv-5.14.0-570.17.1.el9_6.x86_64.rpm(Ikernel-headers-5.14.0-570.17.1.el9_6.x86_64.rpm!Ikernel-debug-devel-5.14.0-570.17.1.el9_6.x86_64.rpmMIpython3-perf-5.14.0-570.17.1.el9_6.x86_64.rpm)Irtla-5.14.0-570.17.1.el9_6.x86_64.rpm%Iperf-5.14.0-570.17.1.el9_6.x86_64.rpmIkernel-doc-5.14.0-570.17.1.el9_6.noarch.rpm$Ikernel-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm#Ikernel-devel-5.14.0-570.17.1.el9_6.x86_64.rpm "Ikernel-debug-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm*Irv-5.14.0-570.17.1.el9_6.x86_64.rpm(Ikernel-headers-5.14.0-570.17.1.el9_6.x86_64.rpm!Ikernel-debug-devel-5.14.0-570.17.1.el9_6.x86_64.rpmMIpython3-perf-5.14.0-570.17.1.el9_6.x86_64.rpm)Irtla-5.14.0-570.17.1.el9_6.x86_64.rpm%Iperf-5.14.0-570.17.1.el9_6.x86_64.rpmIkernel-doc-5.14.0-570.17.1.el9_6.noarch.rpm$Ikernel-devel-matched-5.14.0-570.17.1.el9_6.x86_64.rpm#Ikernel-devel-5.14.0-570.17.1.el9_6.x86_64.rpm`k OBsecurityImportant: compat-openssl11 security updateBhttps://access.redhat.com/errata/RHSA-2025:7937RHSA-2025:7937RHSA-2025:7937 https://access.redhat.com/security/cve/CVE-2023-0286CVE-2023-0286CVE-2023-0286https://bugzilla.redhat.com/21644402164440https://errata.almalinux.org/9/ALSA-2025-7937.htmlALSA-2025:7937ALSA-2025:7937 Zcompat-openssl11-1.1.1k-5.el9_6.1.i686.rpmZcompat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpmZcompat-openssl11-1.1.1k-5.el9_6.1.i686.rpmZcompat-openssl11-1.1.1k-5.el9_6.1.x86_64.rpmYl SBBBBBBBBBBsecurityImportant: webkit2gtk3 security updateGvhttps://access.redhat.com/errata/RHSA-2025:7995RHSA-2025:7995RHSA-2025:7995 https://access.redhat.com/security/cve/CVE-2025-31205CVE-2025-31205CVE-2025-31205https://access.redhat.com/security/cve/CVE-2025-31257CVE-2025-31257CVE-2025-31257https://bugzilla.redhat.com/23665012366501https://bugzilla.redhat.com/23665042366504https://errata.almalinux.org/9/ALSA-2025-7995.htmlALSA-2025:7995ALSA-2025:7995 3"webkit2gtk3-2.48.2-1.el9_6.i686.rpm6"webkit2gtk3-jsc-devel-2.48.2-1.el9_6.i686.rpm5"webkit2gtk3-jsc-2.48.2-1.el9_6.x86_64.rpm4"webkit2gtk3-devel-2.48.2-1.el9_6.i686.rpm6"webkit2gtk3-jsc-devel-2.48.2-1.el9_6.x86_64.rpm5"webkit2gtk3-jsc-2.48.2-1.el9_6.i686.rpm4"webkit2gtk3-devel-2.48.2-1.el9_6.x86_64.rpm3"webkit2gtk3-2.48.2-1.el9_6.x86_64.rpm3"webkit2gtk3-2.48.2-1.el9_6.i686.rpm6"webkit2gtk3-jsc-devel-2.48.2-1.el9_6.i686.rpm5"webkit2gtk3-jsc-2.48.2-1.el9_6.x86_64.rpm4"webkit2gtk3-devel-2.48.2-1.el9_6.i686.rpm6"webkit2gtk3-jsc-devel-2.48.2-1.el9_6.x86_64.rpm5"webkit2gtk3-jsc-2.48.2-1.el9_6.i686.rpm4"webkit2gtk3-devel-2.48.2-1.el9_6.x86_64.rpm3"webkit2gtk3-2.48.2-1.el9_6.x86_64.rpmÔ^m $`BBsecurityImportant: firefox security update=ghttps://access.redhat.com/errata/RHSA-2025:8049RHSA-2025:8049RHSA-2025:8049 https://access.redhat.com/security/cve/CVE-2025-4918CVE-2025-4918CVE-2025-4918https://access.redhat.com/security/cve/CVE-2025-4919CVE-2025-4919CVE-2025-4919https://bugzilla.redhat.com/23670162367016https://bugzilla.redhat.com/23670182367018https://errata.almalinux.org/9/ALSA-2025-8049.htmlALSA-2025:8049ALSA-2025:8049 OTfirefox-x11-128.10.1-1.el9_6.alma.1.x86_64.rpm7Tfirefox-128.10.1-1.el9_6.alma.1.x86_64.rpmOTfirefox-x11-128.10.1-1.el9_6.alma.1.x86_64.rpm7Tfirefox-128.10.1-1.el9_6.alma.1.x86_64.rpmjn +eBBBBsecurityImportant: libsoup security update$k https://access.redhat.com/errata/RHSA-2025:8126RHSA-2025:8126RHSA-2025:8126 https://access.redhat.com/security/cve/CVE-2025-2784CVE-2025-2784CVE-2025-2784https://access.redhat.com/security/cve/CVE-2025-32049CVE-2025-32049CVE-2025-32049https://access.redhat.com/security/cve/CVE-2025-32914CVE-2025-32914CVE-2025-32914https://access.redhat.com/security/cve/CVE-2025-4948CVE-2025-4948CVE-2025-4948https://bugzilla.redhat.com/23546692354669https://bugzilla.redhat.com/23570662357066https://bugzilla.redhat.com/23593582359358https://bugzilla.redhat.com/23671832367183https://errata.almalinux.org/9/ALSA-2025-8126.htmlALSA-2025:8126ALSA-2025:8126 ?Mlibsoup-devel-2.72.0-10.el9_6.2.i686.rpm?Mlibsoup-devel-2.72.0-10.el9_6.2.x86_64.rpm>Mlibsoup-2.72.0-10.el9_6.2.x86_64.rpm>Mlibsoup-2.72.0-10.el9_6.2.i686.rpm?Mlibsoup-devel-2.72.0-10.el9_6.2.i686.rpm?Mlibsoup-devel-2.72.0-10.el9_6.2.x86_64.rpm>Mlibsoup-2.72.0-10.el9_6.2.x86_64.rpm>Mlibsoup-2.72.0-10.el9_6.2.i686.rpmҥ&o .lsecurityImportant: python-tornado security update=https://access.redhat.com/errata/RHSA-2025:8136RHSA-2025:8136RHSA-2025:8136 https://access.redhat.com/security/cve/CVE-2025-47287CVE-2025-47287CVE-2025-47287https://bugzilla.redhat.com/23667032366703https://errata.almalinux.org/9/ALSA-2025-8136.htmlALSA-2025:8136ALSA-2025:8136 `qpython3-tornado-6.4.2-2.el9_6.2.x86_64.rpm`qpython3-tornado-6.4.2-2.el9_6.2.x86_64.rpm;p oBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateL https://access.redhat.com/errata/RHSA-2025:8142RHSA-2025:8142RHSA-2025:8142 https://access.redhat.com/security/cve/CVE-2025-21964CVE-2025-21964CVE-2025-21964https://bugzilla.redhat.com/23566652356665https://errata.almalinux.org/9/ALSA-2025-8142.htmlALSA-2025:8142ALSA-2025:8142 MJpython3-perf-5.14.0-570.18.1.el9_6.x86_64.rpmJkernel-doc-5.14.0-570.18.1.el9_6.noarch.rpm)Jrtla-5.14.0-570.18.1.el9_6.x86_64.rpm*Jrv-5.14.0-570.18.1.el9_6.x86_64.rpm(Jkernel-headers-5.14.0-570.18.1.el9_6.x86_64.rpm$Jkernel-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm%Jperf-5.14.0-570.18.1.el9_6.x86_64.rpm"Jkernel-debug-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm!Jkernel-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm#Jkernel-devel-5.14.0-570.18.1.el9_6.x86_64.rpm MJpython3-perf-5.14.0-570.18.1.el9_6.x86_64.rpmJkernel-doc-5.14.0-570.18.1.el9_6.noarch.rpm)Jrtla-5.14.0-570.18.1.el9_6.x86_64.rpm*Jrv-5.14.0-570.18.1.el9_6.x86_64.rpm(Jkernel-headers-5.14.0-570.18.1.el9_6.x86_64.rpm$Jkernel-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm%Jperf-5.14.0-570.18.1.el9_6.x86_64.rpm"Jkernel-debug-devel-matched-5.14.0-570.18.1.el9_6.x86_64.rpm!Jkernel-debug-devel-5.14.0-570.18.1.el9_6.x86_64.rpm#Jkernel-devel-5.14.0-570.18.1.el9_6.x86_64.rpmܣsq CBBBBsecurityImportant: gstreamer1-plugins-bad-free security updateYhttps://access.redhat.com/errata/RHSA-2025:8183RHSA-2025:8183RHSA-2025:8183 https://access.redhat.com/security/cve/CVE-2025-3887CVE-2025-3887CVE-2025-3887https://bugzilla.redhat.com/23679192367919https://errata.almalinux.org/9/ALSA-2025-8183.htmlALSA-2025:8183ALSA-2025:8183 ;gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.x86_64.rpmg;gstreamer1-plugins-bad-free-1.22.12-4.el9_6.x86_64.rpm;gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.i686.rpmg;gstreamer1-plugins-bad-free-1.22.12-4.el9_6.i686.rpm;gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.x86_64.rpmg;gstreamer1-plugins-bad-free-1.22.12-4.el9_6.x86_64.rpm;gstreamer1-plugins-bad-free-libs-1.22.12-4.el9_6.i686.rpmg;gstreamer1-plugins-bad-free-1.22.12-4.el9_6.i686.rpmr JBBsecurityImportant: firefox security updategzhttps://access.redhat.com/errata/RHSA-2025:8293RHSA-2025:8293RHSA-2025:8293 https://access.redhat.com/security/cve/CVE-2025-5263CVE-2025-5263CVE-2025-5263https://access.redhat.com/security/cve/CVE-2025-5264CVE-2025-5264CVE-2025-5264https://access.redhat.com/security/cve/CVE-2025-5266CVE-2025-5266CVE-2025-5266https://access.redhat.com/security/cve/CVE-2025-5267CVE-2025-5267CVE-2025-5267https://access.redhat.com/security/cve/CVE-2025-5268CVE-2025-5268CVE-2025-5268https://access.redhat.com/security/cve/CVE-2025-5269CVE-2025-5269CVE-2025-5269https://bugzilla.redhat.com/23687502368750https://bugzilla.redhat.com/23687512368751https://bugzilla.redhat.com/23687522368752https://bugzilla.redhat.com/23687552368755https://bugzilla.redhat.com/23687562368756https://bugzilla.redhat.com/23687572368757https://errata.almalinux.org/9/ALSA-2025-8293.htmlALSA-2025:8293ALSA-2025:8293 OHfirefox-x11-128.11.0-1.el9_6.alma.1.x86_64.rpm7Hfirefox-128.11.0-1.el9_6.alma.1.x86_64.rpmOHfirefox-x11-128.11.0-1.el9_6.alma.1.x86_64.rpm7Hfirefox-128.11.0-1.el9_6.alma.1.x86_64.rpm~s "OBBBBBBBBBBBBBBBBBsecurityModerate: kernel security updateaWhttps://access.redhat.com/errata/RHSA-2025:8333RHSA-2025:8333RHSA-2025:8333 https://access.redhat.com/security/cve/CVE-2022-3424CVE-2022-3424CVE-2022-3424https://access.redhat.com/security/cve/CVE-2025-21764CVE-2025-21764CVE-2025-21764https://bugzilla.redhat.com/21326402132640https://bugzilla.redhat.com/23485752348575https://errata.almalinux.org/9/ALSA-2025-8333.htmlALSA-2025:8333ALSA-2025:8333 )Krtla-5.14.0-570.19.1.el9_6.x86_64.rpm"Kkernel-debug-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm%Kperf-5.14.0-570.19.1.el9_6.x86_64.rpm$Kkernel-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm!Kkernel-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm#Kkernel-devel-5.14.0-570.19.1.el9_6.x86_64.rpm(Kkernel-headers-5.14.0-570.19.1.el9_6.x86_64.rpm*Krv-5.14.0-570.19.1.el9_6.x86_64.rpmMKpython3-perf-5.14.0-570.19.1.el9_6.x86_64.rpmKkernel-doc-5.14.0-570.19.1.el9_6.noarch.rpm )Krtla-5.14.0-570.19.1.el9_6.x86_64.rpm"Kkernel-debug-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm%Kperf-5.14.0-570.19.1.el9_6.x86_64.rpm$Kkernel-devel-matched-5.14.0-570.19.1.el9_6.x86_64.rpm!Kkernel-debug-devel-5.14.0-570.19.1.el9_6.x86_64.rpm#Kkernel-devel-5.14.0-570.19.1.el9_6.x86_64.rpm(Kkernel-headers-5.14.0-570.19.1.el9_6.x86_64.rpm*Krv-5.14.0-570.19.1.el9_6.x86_64.rpmMKpython3-perf-5.14.0-570.19.1.el9_6.x86_64.rpmKkernel-doc-5.14.0-570.19.1.el9_6.noarch.rpmÔXt (cBBBsecurityImportant: varnish security update8Zhttps://access.redhat.com/errata/RHSA-2025:8337RHSA-2025:8337RHSA-2025:8337 https://access.redhat.com/security/cve/CVE-2025-47905CVE-2025-47905CVE-2025-47905https://bugzilla.redhat.com/23642352364235https://errata.almalinux.org/9/ALSA-2025-8337.htmlALSA-2025:8337ALSA-2025:8337 ,Rvarnish-6.6.2-6.el9_6.1.i686.rpm,Rvarnish-6.6.2-6.el9_6.1.x86_64.rpmRvarnish-docs-6.6.2-6.el9_6.1.x86_64.rpm,Rvarnish-6.6.2-6.el9_6.1.i686.rpm,Rvarnish-6.6.2-6.el9_6.1.x86_64.rpmRvarnish-docs-6.6.2-6.el9_6.1.x86_64.rpm[u 6AcBFBBBBBBBBBBBsecurityImportant: nodejs:22 security update2https://access.redhat.com/errata/RHSA-2025:8467RHSA-2025:8467RHSA-2025:8467 https://access.redhat.com/security/cve/CVE-2025-23166CVE-2025-23166CVE-2025-23166https://bugzilla.redhat.com/23671632367163https://errata.almalinux.org/9/ALSA-2025-8467.htmlALSA-2025:8467ALSA-2025:8467 +k' onodejs-libs-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpm!onodejs-devel-22.16.0-1.module_el9.6.0+170+f035de78.x86_64.rpmgimp-2.99.8-4.el9_6.2.x86_64.rpm>gimp-libs-2.99.8-4.el9_6.2.x86_64.rpm>gimp-libs-2.99.8-4.el9_6.2.i686.rpmc>gimp-2.99.8-4.el9_6.2.x86_64.rpm>gimp-libs-2.99.8-4.el9_6.2.x86_64.rpm>gimp-libs-2.99.8-4.el9_6.2.i686.rpmÊh  qBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: ipa security updateghttps://access.redhat.com/errata/RHSA-2025:9184RHSA-2025:9184RHSA-2025:9184 https://access.redhat.com/security/cve/CVE-2025-4404CVE-2025-4404CVE-2025-4404https://bugzilla.redhat.com/23646062364606https://errata.almalinux.org/9/ALSA-2025-9184.htmlALSA-2025:9184ALSA-2025:9184 xipa-selinux-luna-4.12.2-14.el9_6.1.noarch.rpmMpython3-ipaclient-4.12.2-14.el9_6.1.noarch.rpmKipa-server-dns-4.12.2-14.el9_6.1.noarch.rpmOpython3-ipaserver-4.12.2-14.el9_6.1.noarch.rpmJipa-server-common-4.12.2-14.el9_6.1.noarch.rpmHipa-common-4.12.2-14.el9_6.1.noarch.rpmEipa-client-samba-4.12.2-14.el9_6.1.x86_64.rpmGipa-client-common-4.12.2-14.el9_6.1.noarch.rpmGipa-server-trust-ad-4.12.2-14.el9_6.1.x86_64.rpmIipa-selinux-4.12.2-14.el9_6.1.noarch.rpmMipa-server-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpmNpython3-ipalib-4.12.2-14.el9_6.1.noarch.rpmyipa-selinux-nfast-4.12.2-14.el9_6.1.noarch.rpmLipa-client-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpmDipa-client-epn-4.12.2-14.el9_6.1.x86_64.rpmCipa-client-4.12.2-14.el9_6.1.x86_64.rpmFipa-server-4.12.2-14.el9_6.1.x86_64.rpmxipa-selinux-luna-4.12.2-14.el9_6.1.noarch.rpmMpython3-ipaclient-4.12.2-14.el9_6.1.noarch.rpmKipa-server-dns-4.12.2-14.el9_6.1.noarch.rpmOpython3-ipaserver-4.12.2-14.el9_6.1.noarch.rpmJipa-server-common-4.12.2-14.el9_6.1.noarch.rpmHipa-common-4.12.2-14.el9_6.1.noarch.rpmEipa-client-samba-4.12.2-14.el9_6.1.x86_64.rpmGipa-client-common-4.12.2-14.el9_6.1.noarch.rpmGipa-server-trust-ad-4.12.2-14.el9_6.1.x86_64.rpmIipa-selinux-4.12.2-14.el9_6.1.noarch.rpmMipa-server-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpmNpython3-ipalib-4.12.2-14.el9_6.1.noarch.rpmyipa-selinux-nfast-4.12.2-14.el9_6.1.noarch.rpmLipa-client-encrypted-dns-4.12.2-14.el9_6.1.x86_64.rpmDipa-client-epn-4.12.2-14.el9_6.1.x86_64.rpmCipa-client-4.12.2-14.el9_6.1.x86_64.rpmFipa-server-4.12.2-14.el9_6.1.x86_64.rpmÊ_  JBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:9302RHSA-2025:9302RHSA-2025:9302 https://access.redhat.com/security/cve/CVE-2025-21883CVE-2025-21883CVE-2025-21883https://access.redhat.com/security/cve/CVE-2025-21919CVE-2025-21919CVE-2025-21919https://access.redhat.com/security/cve/CVE-2025-22104CVE-2025-22104CVE-2025-22104https://access.redhat.com/security/cve/CVE-2025-23150CVE-2025-23150CVE-2025-23150https://access.redhat.com/security/cve/CVE-2025-37738CVE-2025-37738CVE-2025-37738https://bugzilla.redhat.com/23554152355415https://bugzilla.redhat.com/23566182356618https://bugzilla.redhat.com/23602652360265https://bugzilla.redhat.com/23632682363268https://bugzilla.redhat.com/23633052363305https://errata.almalinux.org/9/ALSA-2025-9302.htmlALSA-2025:9302ALSA-2025:9302 "Nkernel-debug-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm(Nkernel-headers-5.14.0-570.23.1.el9_6.x86_64.rpm#Nkernel-devel-5.14.0-570.23.1.el9_6.x86_64.rpmMNpython3-perf-5.14.0-570.23.1.el9_6.x86_64.rpm*Nrv-5.14.0-570.23.1.el9_6.x86_64.rpm%Nperf-5.14.0-570.23.1.el9_6.x86_64.rpm$Nkernel-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpmNkernel-doc-5.14.0-570.23.1.el9_6.noarch.rpm!Nkernel-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm)Nrtla-5.14.0-570.23.1.el9_6.x86_64.rpm "Nkernel-debug-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpm(Nkernel-headers-5.14.0-570.23.1.el9_6.x86_64.rpm#Nkernel-devel-5.14.0-570.23.1.el9_6.x86_64.rpmMNpython3-perf-5.14.0-570.23.1.el9_6.x86_64.rpm*Nrv-5.14.0-570.23.1.el9_6.x86_64.rpm%Nperf-5.14.0-570.23.1.el9_6.x86_64.rpm$Nkernel-devel-matched-5.14.0-570.23.1.el9_6.x86_64.rpmNkernel-doc-5.14.0-570.23.1.el9_6.noarch.rpm!Nkernel-debug-devel-5.14.0-570.23.1.el9_6.x86_64.rpm)Nrtla-5.14.0-570.23.1.el9_6.x86_64.rpmÙD  ,^BBBBBBBBBBBBsecurityImportant: xorg-x11-server and xorg-x11-server-Xwayland security updatez https://access.redhat.com/errata/RHSA-2025:9303RHSA-2025:9303RHSA-2025:9303 https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9303.htmlALSA-2025:9303ALSA-2025:9303 ##xorg-x11-server-Xwayland-23.2.7-4.el9_6.x86_64.rpmxorg-x11-server-Xdmx-1.20.11-31.el9_6.x86_64.rpm"xorg-x11-server-Xvfb-1.20.11-31.el9_6.x86_64.rpm$xorg-x11-server-common-1.20.11-31.el9_6.x86_64.rpmxorg-x11-server-Xephyr-1.20.11-31.el9_6.x86_64.rpm xorg-x11-server-Xnest-1.20.11-31.el9_6.x86_64.rpm!xorg-x11-server-Xorg-1.20.11-31.el9_6.x86_64.rpm##xorg-x11-server-Xwayland-23.2.7-4.el9_6.x86_64.rpmxorg-x11-server-Xdmx-1.20.11-31.el9_6.x86_64.rpm"xorg-x11-server-Xvfb-1.20.11-31.el9_6.x86_64.rpm$xorg-x11-server-common-1.20.11-31.el9_6.x86_64.rpmxorg-x11-server-Xephyr-1.20.11-31.el9_6.x86_64.rpm xorg-x11-server-Xnest-1.20.11-31.el9_6.x86_64.rpm!xorg-x11-server-Xorg-1.20.11-31.el9_6.x86_64.rpmÊ  8mBBBBBBBBBsecurityImportant: tigervnc security updateu https://access.redhat.com/errata/RHSA-2025:9306RHSA-2025:9306RHSA-2025:9306 https://access.redhat.com/security/cve/CVE-2025-49175CVE-2025-49175CVE-2025-49175https://access.redhat.com/security/cve/CVE-2025-49176CVE-2025-49176CVE-2025-49176https://access.redhat.com/security/cve/CVE-2025-49178CVE-2025-49178CVE-2025-49178https://access.redhat.com/security/cve/CVE-2025-49179CVE-2025-49179CVE-2025-49179https://access.redhat.com/security/cve/CVE-2025-49180CVE-2025-49180CVE-2025-49180https://bugzilla.redhat.com/23699472369947https://bugzilla.redhat.com/23699542369954https://bugzilla.redhat.com/23699772369977https://bugzilla.redhat.com/23699782369978https://bugzilla.redhat.com/23699812369981https://errata.almalinux.org/9/ALSA-2025-9306.htmlALSA-2025:9306ALSA-2025:9306 9{tigervnc-selinux-1.14.1-8.el9_6.noarch.rpm7{tigervnc-icons-1.14.1-8.el9_6.noarch.rpmp{tigervnc-server-minimal-1.14.1-8.el9_6.x86_64.rpmq{tigervnc-server-module-1.14.1-8.el9_6.x86_64.rpmo{tigervnc-server-1.14.1-8.el9_6.x86_64.rpmn{tigervnc-1.14.1-8.el9_6.x86_64.rpm8{tigervnc-license-1.14.1-8.el9_6.noarch.rpm9{tigervnc-selinux-1.14.1-8.el9_6.noarch.rpm7{tigervnc-icons-1.14.1-8.el9_6.noarch.rpmp{tigervnc-server-minimal-1.14.1-8.el9_6.x86_64.rpmq{tigervnc-server-module-1.14.1-8.el9_6.x86_64.rpmo{tigervnc-server-1.14.1-8.el9_6.x86_64.rpmn{tigervnc-1.14.1-8.el9_6.x86_64.rpm8{tigervnc-license-1.14.1-8.el9_6.noarch.rpmÙ ,yBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libblockdev security update (https://access.redhat.com/errata/RHSA-2025:9327RHSA-2025:9327RHSA-2025:9327 https://access.redhat.com/security/cve/CVE-2025-6019CVE-2025-6019CVE-2025-6019https://bugzilla.redhat.com/23700512370051https://errata.almalinux.org/9/ALSA-2025-9327.htmlALSA-2025:9327ALSA-2025:9327 !m-libblockdev-fs-2.28-14.el9_6.x86_64.rpmv-libblockdev-part-2.28-14.el9_6.i686.rpmn-libblockdev-kbd-2.28-14.el9_6.i686.rpm8-libblockdev-plugins-all-2.28-14.el9_6.x86_64.rpmo-libblockdev-loop-2.28-14.el9_6.i686.rpmo-libblockdev-loop-2.28-14.el9_6.x86_64.rpmj-libblockdev-2.28-14.el9_6.i686.rpmu-libblockdev-nvme-2.28-14.el9_6.i686.rpmw-libblockdev-swap-2.28-14.el9_6.i686.rpmu-libblockdev-nvme-2.28-14.el9_6.x86_64.rpmI-python3-blockdev-2.28-14.el9_6.x86_64.rpmx-libblockdev-utils-2.28-14.el9_6.i686.rpmw-libblockdev-swap-2.28-14.el9_6.x86_64.rpmx-libblockdev-utils-2.28-14.el9_6.x86_64.rpml-libblockdev-dm-2.28-14.el9_6.i686.rpms-libblockdev-mpath-2.28-14.el9_6.x86_64.rpmm-libblockdev-fs-2.28-14.el9_6.i686.rpmk-libblockdev-crypto-2.28-14.el9_6.i686.rpms-libblockdev-mpath-2.28-14.el9_6.i686.rpmp-libblockdev-lvm-2.28-14.el9_6.i686.rpmp-libblockdev-lvm-2.28-14.el9_6.x86_64.rpmn-libblockdev-kbd-2.28-14.el9_6.x86_64.rpml-libblockdev-dm-2.28-14.el9_6.x86_64.rpmv-libblockdev-part-2.28-14.el9_6.x86_64.rpmj-libblockdev-2.28-14.el9_6.x86_64.rpmk-libblockdev-crypto-2.28-14.el9_6.x86_64.rpmt-libblockdev-nvdimm-2.28-14.el9_6.i686.rpmq-libblockdev-lvm-dbus-2.28-14.el9_6.x86_64.rpm9-libblockdev-tools-2.28-14.el9_6.x86_64.rpmt-libblockdev-nvdimm-2.28-14.el9_6.x86_64.rpmr-libblockdev-mdraid-2.28-14.el9_6.i686.rpmr-libblockdev-mdraid-2.28-14.el9_6.x86_64.rpmq-libblockdev-lvm-dbus-2.28-14.el9_6.i686.rpm!m-libblockdev-fs-2.28-14.el9_6.x86_64.rpmv-libblockdev-part-2.28-14.el9_6.i686.rpmn-libblockdev-kbd-2.28-14.el9_6.i686.rpm8-libblockdev-plugins-all-2.28-14.el9_6.x86_64.rpmo-libblockdev-loop-2.28-14.el9_6.i686.rpmo-libblockdev-loop-2.28-14.el9_6.x86_64.rpmj-libblockdev-2.28-14.el9_6.i686.rpmu-libblockdev-nvme-2.28-14.el9_6.i686.rpmw-libblockdev-swap-2.28-14.el9_6.i686.rpmu-libblockdev-nvme-2.28-14.el9_6.x86_64.rpmI-python3-blockdev-2.28-14.el9_6.x86_64.rpmx-libblockdev-utils-2.28-14.el9_6.i686.rpmw-libblockdev-swap-2.28-14.el9_6.x86_64.rpmx-libblockdev-utils-2.28-14.el9_6.x86_64.rpml-libblockdev-dm-2.28-14.el9_6.i686.rpms-libblockdev-mpath-2.28-14.el9_6.x86_64.rpmm-libblockdev-fs-2.28-14.el9_6.i686.rpmk-libblockdev-crypto-2.28-14.el9_6.i686.rpms-libblockdev-mpath-2.28-14.el9_6.i686.rpmp-libblockdev-lvm-2.28-14.el9_6.i686.rpmp-libblockdev-lvm-2.28-14.el9_6.x86_64.rpmn-libblockdev-kbd-2.28-14.el9_6.x86_64.rpml-libblockdev-dm-2.28-14.el9_6.x86_64.rpmv-libblockdev-part-2.28-14.el9_6.x86_64.rpmj-libblockdev-2.28-14.el9_6.x86_64.rpmk-libblockdev-crypto-2.28-14.el9_6.x86_64.rpmt-libblockdev-nvdimm-2.28-14.el9_6.i686.rpmq-libblockdev-lvm-dbus-2.28-14.el9_6.x86_64.rpm9-libblockdev-tools-2.28-14.el9_6.x86_64.rpmt-libblockdev-nvdimm-2.28-14.el9_6.x86_64.rpmr-libblockdev-mdraid-2.28-14.el9_6.i686.rpmr-libblockdev-mdraid-2.28-14.el9_6.x86_64.rpmq-libblockdev-lvm-dbus-2.28-14.el9_6.i686.rpmÙE /msecurityImportant: mod_auth_openidc security update2 https://access.redhat.com/errata/RHSA-2025:9396RHSA-2025:9396RHSA-2025:9396 https://access.redhat.com/security/cve/CVE-2025-3891CVE-2025-3891CVE-2025-3891https://bugzilla.redhat.com/23616332361633https://errata.almalinux.org/9/ALSA-2025-9396.htmlALSA-2025:9396ALSA-2025:9396  mod_auth_openidc-2.4.10-1.el9_6.2.x86_64.rpm mod_auth_openidc-2.4.10-1.el9_6.2.x86_64.rpmØb 3pBsecurityModerate: krb5 security update?https://access.redhat.com/errata/RHSA-2025:9430RHSA-2025:9430RHSA-2025:9430 https://access.redhat.com/security/cve/CVE-2025-3576CVE-2025-3576CVE-2025-3576https://bugzilla.redhat.com/23594652359465https://errata.almalinux.org/9/ALSA-2025-9430.htmlALSA-2025:9430ALSA-2025:9430 Skrb5-devel-1.21.1-8.el9_6.x86_64.rpmSkrb5-devel-1.21.1-8.el9_6.i686.rpmSkrb5-devel-1.21.1-8.el9_6.x86_64.rpmSkrb5-devel-1.21.1-8.el9_6.i686.rpmÊK 9tBBBsecurityModerate: libarchive security updateWRhttps://access.redhat.com/errata/RHSA-2025:9431RHSA-2025:9431RHSA-2025:9431 https://access.redhat.com/security/cve/CVE-2025-25724CVE-2025-25724CVE-2025-25724https://bugzilla.redhat.com/23492212349221https://errata.almalinux.org/9/ALSA-2025-9431.htmlALSA-2025:9431ALSA-2025:9431 LGlibarchive-devel-3.5.3-5.el9_6.x86_64.rpmGbsdtar-3.5.3-5.el9_6.x86_64.rpmLGlibarchive-devel-3.5.3-5.el9_6.i686.rpmLGlibarchive-devel-3.5.3-5.el9_6.x86_64.rpmGbsdtar-3.5.3-5.el9_6.x86_64.rpmLGlibarchive-devel-3.5.3-5.el9_6.i686.rpmÊA vemacs-27.2-14.el9_6.2.x86_64.rpm@vemacs-lucid-27.2-14.el9_6.2.x86_64.rpmFvemacs-filesystem-27.2-14.el9_6.2.noarch.rpm?vemacs-common-27.2-14.el9_6.2.x86_64.rpmAvemacs-nox-27.2-14.el9_6.2.x86_64.rpm>vemacs-27.2-14.el9_6.2.x86_64.rpmÊ #JBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: qt5-qtbase security update7.https://access.redhat.com/errata/RHSA-2025:9462RHSA-2025:9462RHSA-2025:9462 https://access.redhat.com/security/cve/CVE-2025-5455CVE-2025-5455CVE-2025-5455https://bugzilla.redhat.com/23697222369722https://errata.almalinux.org/9/ALSA-2025-9462.htmlALSA-2025:9462ALSA-2025:9462 'qt5-qtbase-postgresql-5.15.9-11.el9_6.x86_64.rpm&qt5-qtbase-odbc-5.15.9-11.el9_6.x86_64.rpm!qt5-qtbase-5.15.9-11.el9_6.x86_64.rpm(qt5-qtbase-private-devel-5.15.9-11.el9_6.i686.rpm"qt5-qtbase-devel-5.15.9-11.el9_6.x86_64.rpm(qt5-qtbase-private-devel-5.15.9-11.el9_6.x86_64.rpm!qt5-qtbase-5.15.9-11.el9_6.i686.rpm%qt5-qtbase-mysql-5.15.9-11.el9_6.i686.rpm"qt5-qtbase-devel-5.15.9-11.el9_6.i686.rpm$qt5-qtbase-gui-5.15.9-11.el9_6.x86_64.rpm&qt5-qtbase-odbc-5.15.9-11.el9_6.i686.rpm#qt5-qtbase-examples-5.15.9-11.el9_6.x86_64.rpm$qt5-qtbase-gui-5.15.9-11.el9_6.i686.rpm'qt5-qtbase-postgresql-5.15.9-11.el9_6.i686.rpm#qt5-qtbase-examples-5.15.9-11.el9_6.i686.rpm%qt5-qtbase-mysql-5.15.9-11.el9_6.x86_64.rpmqt5-qtbase-common-5.15.9-11.el9_6.noarch.rpm'qt5-qtbase-postgresql-5.15.9-11.el9_6.x86_64.rpm&qt5-qtbase-odbc-5.15.9-11.el9_6.x86_64.rpm!qt5-qtbase-5.15.9-11.el9_6.x86_64.rpm(qt5-qtbase-private-devel-5.15.9-11.el9_6.i686.rpm"qt5-qtbase-devel-5.15.9-11.el9_6.x86_64.rpm(qt5-qtbase-private-devel-5.15.9-11.el9_6.x86_64.rpm!qt5-qtbase-5.15.9-11.el9_6.i686.rpm%qt5-qtbase-mysql-5.15.9-11.el9_6.i686.rpm"qt5-qtbase-devel-5.15.9-11.el9_6.i686.rpm$qt5-qtbase-gui-5.15.9-11.el9_6.x86_64.rpm&qt5-qtbase-odbc-5.15.9-11.el9_6.i686.rpm#qt5-qtbase-examples-5.15.9-11.el9_6.x86_64.rpm$qt5-qtbase-gui-5.15.9-11.el9_6.i686.rpm'qt5-qtbase-postgresql-5.15.9-11.el9_6.i686.rpm#qt5-qtbase-examples-5.15.9-11.el9_6.i686.rpm%qt5-qtbase-mysql-5.15.9-11.el9_6.x86_64.rpmqt5-qtbase-common-5.15.9-11.el9_6.noarch.rpmÊ )dBBBsecurityImportant: pam security updatee0https://access.redhat.com/errata/RHSA-2025:9526RHSA-2025:9526RHSA-2025:9526 https://access.redhat.com/security/cve/CVE-2025-6020CVE-2025-6020CVE-2025-6020https://bugzilla.redhat.com/23725122372512https://errata.almalinux.org/9/ALSA-2025-9526.htmlALSA-2025:9526ALSA-2025:9526 k pam-devel-1.5.1-25.el9_6.x86_64.rpm pam-docs-1.5.1-25.el9_6.x86_64.rpmk pam-devel-1.5.1-25.el9_6.i686.rpmk pam-devel-1.5.1-25.el9_6.x86_64.rpm pam-docs-1.5.1-25.el9_6.x86_64.rpmk pam-devel-1.5.1-25.el9_6.i686.rpm' 0jBBBBsecurityModerate: osbuild-composer security updateWhttps://access.redhat.com/errata/RHSA-2025:9634RHSA-2025:9634RHSA-2025:9634 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9634.htmlALSA-2025:9634ALSA-2025:9634 TNosbuild-composer-132.2-2.el9_6.alma.1.x86_64.rpmVNosbuild-composer-worker-132.2-2.el9_6.alma.1.x86_64.rpmUNosbuild-composer-core-132.2-2.el9_6.alma.1.x86_64.rpmTNosbuild-composer-132.2-2.el9_6.alma.1.x86_64.rpmVNosbuild-composer-worker-132.2-2.el9_6.alma.1.x86_64.rpmUNosbuild-composer-core-132.2-2.el9_6.alma.1.x86_64.rpmÊ2 3qsecurityModerate: weldr-client security updatelyhttps://access.redhat.com/errata/RHSA-2025:9635RHSA-2025:9635RHSA-2025:9635 https://access.redhat.com/security/cve/CVE-2025-22871CVE-2025-22871CVE-2025-22871https://bugzilla.redhat.com/23584932358493https://errata.almalinux.org/9/ALSA-2025-9635.htmlALSA-2025:9635ALSA-2025:9635 cAweldr-client-35.12-4.el9_6.x86_64.rpmcAweldr-client-35.12-4.el9_6.x86_64.rpmÊJ >tBBBBBBBBsecurityModerate: glibc security updatee2https://access.redhat.com/errata/RHSA-2025:9877RHSA-2025:9877RHSA-2025:9877 https://access.redhat.com/security/cve/CVE-2025-5702CVE-2025-5702CVE-2025-5702https://bugzilla.redhat.com/23704722370472https://errata.almalinux.org/9/ALSA-2025-9877.htmlALSA-2025:9877ALSA-2025:9877 rglibc-utils-2.34-168.el9_6.20.x86_64.rpmrglibc-doc-2.34-168.el9_6.20.noarch.rpmIrglibc-devel-2.34-168.el9_6.20.x86_64.rpmIrglibc-devel-2.34-168.el9_6.20.i686.rpmrglibc-headers-2.34-168.el9_6.20.x86_64.rpmrglibc-locale-source-2.34-168.el9_6.20.x86_64.rpmrglibc-utils-2.34-168.el9_6.20.x86_64.rpmrglibc-doc-2.34-168.el9_6.20.noarch.rpmIrglibc-devel-2.34-168.el9_6.20.x86_64.rpmIrglibc-devel-2.34-168.el9_6.20.i686.rpmrglibc-headers-2.34-168.el9_6.20.x86_64.rpmrglibc-locale-source-2.34-168.el9_6.20.x86_64.rpmÊl BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update https://access.redhat.com/errata/RHSA-2025:9880RHSA-2025:9880RHSA-2025:9880 https://access.redhat.com/security/cve/CVE-2023-52933CVE-2023-52933CVE-2023-52933https://bugzilla.redhat.com/23554762355476https://errata.almalinux.org/9/ALSA-2025-9880.htmlALSA-2025:9880ALSA-2025:9880 (Okernel-headers-5.14.0-570.24.1.el9_6.x86_64.rpm#Okernel-devel-5.14.0-570.24.1.el9_6.x86_64.rpmOkernel-doc-5.14.0-570.24.1.el9_6.noarch.rpm$Okernel-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpm!Okernel-debug-devel-5.14.0-570.24.1.el9_6.x86_64.rpm*Orv-5.14.0-570.24.1.el9_6.x86_64.rpm"Okernel-debug-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpmMOpython3-perf-5.14.0-570.24.1.el9_6.x86_64.rpm%Operf-5.14.0-570.24.1.el9_6.x86_64.rpm)Ortla-5.14.0-570.24.1.el9_6.x86_64.rpm (Okernel-headers-5.14.0-570.24.1.el9_6.x86_64.rpm#Okernel-devel-5.14.0-570.24.1.el9_6.x86_64.rpmOkernel-doc-5.14.0-570.24.1.el9_6.noarch.rpm$Okernel-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpm!Okernel-debug-devel-5.14.0-570.24.1.el9_6.x86_64.rpm*Orv-5.14.0-570.24.1.el9_6.x86_64.rpm"Okernel-debug-devel-matched-5.14.0-570.24.1.el9_6.x86_64.rpmMOpython3-perf-5.14.0-570.24.1.el9_6.x86_64.rpm%Operf-5.14.0-570.24.1.el9_6.x86_64.rpm)Ortla-5.14.0-570.24.1.el9_6.x86_64.rpmÓ  SsecurityImportant: sudo security update shttps://access.redhat.com/errata/RHSA-2025:9978RHSA-2025:9978RHSA-2025:9978 https://access.redhat.com/security/cve/CVE-2025-32462CVE-2025-32462CVE-2025-32462https://bugzilla.redhat.com/23746922374692https://errata.almalinux.org/9/ALSA-2025-9978.htmlALSA-2025:9978ALSA-2025:9978 b%sudo-python-plugin-1.9.5p2-10.el9_6.1.x86_64.rpmb%sudo-python-plugin-1.9.5p2-10.el9_6.1.x86_64.rpmÐz VBBBBBBBBsecurityModerate: open-vm-tools security updatexhttps://access.redhat.com/security/cve/CVE-2025-22247CVE-2025-22247CVE-2025-22247https://bugzilla.redhat.com/23642612364261https://errata.almalinux.org/9/ALSA-2025-A002.htmlALSA-2025:A002ALSA-2025:A002 iSopen-vm-tools-12.5.0-1.el9.alma.1.x86_64.rpmjSopen-vm-tools-desktop-12.5.0-1.el9.alma.1.x86_64.rpmkSopen-vm-tools-sdmp-12.5.0-1.el9.alma.1.x86_64.rpmlSopen-vm-tools-test-12.5.0-1.el9.alma.1.x86_64.rpm+Sopen-vm-tools-salt-minion-12.5.0-1.el9.alma.1.x86_64.rpmiSopen-vm-tools-12.5.0-1.el9.alma.1.x86_64.rpmjSopen-vm-tools-desktop-12.5.0-1.el9.alma.1.x86_64.rpmkSopen-vm-tools-sdmp-12.5.0-1.el9.alma.1.x86_64.rpmlSopen-vm-tools-test-12.5.0-1.el9.alma.1.x86_64.rpm+Sopen-vm-tools-salt-minion-12.5.0-1.el9.alma.1.x86_64.rpmԨ^ aBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: libblockdev security update Ihttps://access.redhat.com/security/cve/CVE-2025-6019CVE-2025-6019CVE-2025-6019https://bugzilla.redhat.com/23700512370051https://errata.almalinux.org/9/ALSA-2025-A005.htmlALSA-2025:A005ALSA-2025:A005 !m,libblockdev-fs-2.28-13.el9_6.alma.1.i686.rpmn,libblockdev-kbd-2.28-13.el9_6.alma.1.i686.rpml,libblockdev-dm-2.28-13.el9_6.alma.1.x86_64.rpmp,libblockdev-lvm-2.28-13.el9_6.alma.1.x86_64.rpmt,libblockdev-nvdimm-2.28-13.el9_6.alma.1.i686.rpmu,libblockdev-nvme-2.28-13.el9_6.alma.1.x86_64.rpmk,libblockdev-crypto-2.28-13.el9_6.alma.1.x86_64.rpmj,libblockdev-2.28-13.el9_6.alma.1.x86_64.rpmq,libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.i686.rpml,libblockdev-dm-2.28-13.el9_6.alma.1.i686.rpmt,libblockdev-nvdimm-2.28-13.el9_6.alma.1.x86_64.rpmI,python3-blockdev-2.28-13.el9_6.alma.1.x86_64.rpmv,libblockdev-part-2.28-13.el9_6.alma.1.x86_64.rpmn,libblockdev-kbd-2.28-13.el9_6.alma.1.x86_64.rpmr,libblockdev-mdraid-2.28-13.el9_6.alma.1.i686.rpmo,libblockdev-loop-2.28-13.el9_6.alma.1.i686.rpmx,libblockdev-utils-2.28-13.el9_6.alma.1.x86_64.rpmq,libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.x86_64.rpmw,libblockdev-swap-2.28-13.el9_6.alma.1.i686.rpmm,libblockdev-fs-2.28-13.el9_6.alma.1.x86_64.rpmo,libblockdev-loop-2.28-13.el9_6.alma.1.x86_64.rpmj,libblockdev-2.28-13.el9_6.alma.1.i686.rpm8,libblockdev-plugins-all-2.28-13.el9_6.alma.1.x86_64.rpmp,libblockdev-lvm-2.28-13.el9_6.alma.1.i686.rpms,libblockdev-mpath-2.28-13.el9_6.alma.1.x86_64.rpmu,libblockdev-nvme-2.28-13.el9_6.alma.1.i686.rpms,libblockdev-mpath-2.28-13.el9_6.alma.1.i686.rpmk,libblockdev-crypto-2.28-13.el9_6.alma.1.i686.rpm9,libblockdev-tools-2.28-13.el9_6.alma.1.x86_64.rpmw,libblockdev-swap-2.28-13.el9_6.alma.1.x86_64.rpmv,libblockdev-part-2.28-13.el9_6.alma.1.i686.rpmr,libblockdev-mdraid-2.28-13.el9_6.alma.1.x86_64.rpmx,libblockdev-utils-2.28-13.el9_6.alma.1.i686.rpm!m,libblockdev-fs-2.28-13.el9_6.alma.1.i686.rpmn,libblockdev-kbd-2.28-13.el9_6.alma.1.i686.rpml,libblockdev-dm-2.28-13.el9_6.alma.1.x86_64.rpmp,libblockdev-lvm-2.28-13.el9_6.alma.1.x86_64.rpmt,libblockdev-nvdimm-2.28-13.el9_6.alma.1.i686.rpmu,libblockdev-nvme-2.28-13.el9_6.alma.1.x86_64.rpmk,libblockdev-crypto-2.28-13.el9_6.alma.1.x86_64.rpmj,libblockdev-2.28-13.el9_6.alma.1.x86_64.rpmq,libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.i686.rpml,libblockdev-dm-2.28-13.el9_6.alma.1.i686.rpmt,libblockdev-nvdimm-2.28-13.el9_6.alma.1.x86_64.rpmI,python3-blockdev-2.28-13.el9_6.alma.1.x86_64.rpmv,libblockdev-part-2.28-13.el9_6.alma.1.x86_64.rpmn,libblockdev-kbd-2.28-13.el9_6.alma.1.x86_64.rpmr,libblockdev-mdraid-2.28-13.el9_6.alma.1.i686.rpmo,libblockdev-loop-2.28-13.el9_6.alma.1.i686.rpmx,libblockdev-utils-2.28-13.el9_6.alma.1.x86_64.rpmq,libblockdev-lvm-dbus-2.28-13.el9_6.alma.1.x86_64.rpmw,libblockdev-swap-2.28-13.el9_6.alma.1.i686.rpmm,libblockdev-fs-2.28-13.el9_6.alma.1.x86_64.rpmo,libblockdev-loop-2.28-13.el9_6.alma.1.x86_64.rpmj,libblockdev-2.28-13.el9_6.alma.1.i686.rpm8,libblockdev-plugins-all-2.28-13.el9_6.alma.1.x86_64.rpmp,libblockdev-lvm-2.28-13.el9_6.alma.1.i686.rpms,libblockdev-mpath-2.28-13.el9_6.alma.1.x86_64.rpmu,libblockdev-nvme-2.28-13.el9_6.alma.1.i686.rpms,libblockdev-mpath-2.28-13.el9_6.alma.1.i686.rpmk,libblockdev-crypto-2.28-13.el9_6.alma.1.i686.rpm9,libblockdev-tools-2.28-13.el9_6.alma.1.x86_64.rpmw,libblockdev-swap-2.28-13.el9_6.alma.1.x86_64.rpmv,libblockdev-part-2.28-13.el9_6.alma.1.i686.rpmr,libblockdev-mdraid-2.28-13.el9_6.alma.1.x86_64.rpmx,libblockdev-utils-2.28-13.el9_6.alma.1.i686.rpm& UBBBBBBBsecurityModerate: gcc-toolset-14-binutils security update&Tehttps://access.redhat.com/errata/RHSA-2026:0052RHSA-2026:0052RHSA-2026:0052 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2026-0052.htmlALSA-2026:0052ALSA-2026:0052 U{gcc-toolset-14-binutils-2.41-5.el9_7.1.x86_64.rpmW{gcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1.x86_64.rpmV{gcc-toolset-14-binutils-gold-2.41-5.el9_7.1.x86_64.rpm{gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.x86_64.rpm{gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.i686.rpmU{gcc-toolset-14-binutils-2.41-5.el9_7.1.x86_64.rpmW{gcc-toolset-14-binutils-gprofng-2.41-5.el9_7.1.x86_64.rpmV{gcc-toolset-14-binutils-gold-2.41-5.el9_7.1.x86_64.rpm{gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.x86_64.rpm{gcc-toolset-14-binutils-devel-2.41-5.el9_7.1.i686.rpm -_BBBBBBBBBBBBsecurityModerate: poppler security update&9xhttps://access.redhat.com/errata/RHSA-2026:0126RHSA-2026:0126RHSA-2026:0126 https://access.redhat.com/security/cve/CVE-2025-32365CVE-2025-32365CVE-2025-32365https://bugzilla.redhat.com/23576562357656https://errata.almalinux.org/9/ALSA-2026-0126.htmlALSA-2026:0126ALSA-2026:0126 poppler-glib-21.01.0-23.el9_7.x86_64.rpmpoppler-21.01.0-23.el9_7.i686.rpmpoppler-21.01.0-23.el9_7.x86_64.rpmpoppler-glib-21.01.0-23.el9_7.i686.rpm poppler-qt5-21.01.0-23.el9_7.i686.rpmpoppler-cpp-21.01.0-23.el9_7.x86_64.rpm poppler-qt5-21.01.0-23.el9_7.x86_64.rpmzpoppler-utils-21.01.0-23.el9_7.x86_64.rpmpoppler-cpp-21.01.0-23.el9_7.i686.rpm poppler-glib-21.01.0-23.el9_7.x86_64.rpmpoppler-21.01.0-23.el9_7.i686.rpmpoppler-21.01.0-23.el9_7.x86_64.rpmpoppler-glib-21.01.0-23.el9_7.i686.rpm poppler-qt5-21.01.0-23.el9_7.i686.rpmpoppler-cpp-21.01.0-23.el9_7.x86_64.rpm poppler-qt5-21.01.0-23.el9_7.x86_64.rpmzpoppler-utils-21.01.0-23.el9_7.x86_64.rpmpoppler-cpp-21.01.0-23.el9_7.i686.rpmp  nBBBBBBBBBBBBBBBBBBBBsecurityImportant: mariadb security update&18https://access.redhat.com/errata/RHSA-2026:0137RHSA-2026:0137RHSA-2026:0137 https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0137.htmlALSA-2026:0137ALSA-2026:0137 c8mariadb-oqgraph-engine-10.5.29-3.el9_7.x86_64.rpme8mariadb-server-10.5.29-3.el9_7.x86_64.rpmb8mariadb-gssapi-server-10.5.29-3.el9_7.x86_64.rpm^8mariadb-backup-10.5.29-3.el9_7.x86_64.rpmd8mariadb-pam-10.5.29-3.el9_7.x86_64.rpmg8mariadb-server-utils-10.5.29-3.el9_7.x86_64.rpmf8mariadb-server-galera-10.5.29-3.el9_7.x86_64.rpma8mariadb-errmsg-10.5.29-3.el9_7.x86_64.rpm`8mariadb-embedded-10.5.29-3.el9_7.x86_64.rpme8mariadb-10.5.29-3.el9_7.x86_64.rpm_8mariadb-common-10.5.29-3.el9_7.x86_64.rpm c8mariadb-oqgraph-engine-10.5.29-3.el9_7.x86_64.rpme8mariadb-server-10.5.29-3.el9_7.x86_64.rpmb8mariadb-gssapi-server-10.5.29-3.el9_7.x86_64.rpm^8mariadb-backup-10.5.29-3.el9_7.x86_64.rpmd8mariadb-pam-10.5.29-3.el9_7.x86_64.rpmg8mariadb-server-utils-10.5.29-3.el9_7.x86_64.rpmf8mariadb-server-galera-10.5.29-3.el9_7.x86_64.rpma8mariadb-errmsg-10.5.29-3.el9_7.x86_64.rpm`8mariadb-embedded-10.5.29-3.el9_7.x86_64.rpme8mariadb-10.5.29-3.el9_7.x86_64.rpm_8mariadb-common-10.5.29-3.el9_7.x86_64.rpm! EBsecurityImportant: libpng security update&ihttps://access.redhat.com/errata/RHSA-2026:0238RHSA-2026:0238RHSA-2026:0238 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2025-66293CVE-2025-66293CVE-2025-66293https://bugzilla.redhat.com/24169042416904https://bugzilla.redhat.com/24169072416907https://bugzilla.redhat.com/24187112418711https://errata.almalinux.org/9/ALSA-2026-0238.htmlALSA-2026:0238ALSA-2026:0238 |:libpng-devel-1.6.37-12.el9_7.1.i686.rpm|:libpng-devel-1.6.37-12.el9_7.1.x86_64.rpm|:libpng-devel-1.6.37-12.el9_7.1.i686.rpm|:libpng-devel-1.6.37-12.el9_7.1.x86_64.rpmU" %kB^BBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: mariadb:10.11 security update&{https://access.redhat.com/errata/RHSA-2026:0247RHSA-2026:0247RHSA-2026:0247 https://access.redhat.com/security/cve/CVE-2023-52969CVE-2023-52969CVE-2023-52969https://access.redhat.com/security/cve/CVE-2023-52970CVE-2023-52970CVE-2023-52970https://access.redhat.com/security/cve/CVE-2023-52971CVE-2023-52971CVE-2023-52971https://access.redhat.com/security/cve/CVE-2025-13699CVE-2025-13699CVE-2025-13699https://access.redhat.com/security/cve/CVE-2025-21490CVE-2025-21490CVE-2025-21490https://access.redhat.com/security/cve/CVE-2025-30693CVE-2025-30693CVE-2025-30693https://access.redhat.com/security/cve/CVE-2025-30722CVE-2025-30722CVE-2025-30722https://bugzilla.redhat.com/23392212339221https://bugzilla.redhat.com/23509162350916https://bugzilla.redhat.com/23509172350917https://bugzilla.redhat.com/23509182350918https://bugzilla.redhat.com/23598852359885https://bugzilla.redhat.com/23599632359963https://bugzilla.redhat.com/24176932417693https://errata.almalinux.org/9/ALSA-2026-0247.htmlALSA-2026:0247ALSA-2026:0247 e('c mariadb-oqgraph-engine-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm_ mariadb-common-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmb mariadb-gssapi-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmP mariadb-embedded-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm^ mariadb-backup-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmg mariadb-server-utils-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpme mariadb-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmumgalera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpmd mariadb-pam-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmQ mariadb-test-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmO mariadb-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpme mariadb-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpma mariadb-errmsg-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm` mariadb-embedded-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmf mariadb-server-galera-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpme('c mariadb-oqgraph-engine-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm_ mariadb-common-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmb mariadb-gssapi-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmP mariadb-embedded-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm^ mariadb-backup-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmg mariadb-server-utils-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpme mariadb-server-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmumgalera-26.4.20-1.module_el9.5.0+135+c9657a87.x86_64.rpmd mariadb-pam-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmQ mariadb-test-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmO mariadb-devel-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpme mariadb-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpma mariadb-errmsg-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm` mariadb-embedded-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpmf mariadb-server-galera-10.11.15-1.module_el9.7.0+199+a988ea01.x86_64.rpm˓7# 4fBBBBBBBBBBBBsecurityModerate: cups security update&https://access.redhat.com/errata/RHSA-2026:0312RHSA-2026:0312RHSA-2026:0312 https://access.redhat.com/security/cve/CVE-2025-58436CVE-2025-58436CVE-2025-58436https://access.redhat.com/security/cve/CVE-2025-61915CVE-2025-61915CVE-2025-61915https://bugzilla.redhat.com/24160392416039https://bugzilla.redhat.com/24160402416040https://errata.almalinux.org/9/ALSA-2026-0312.htmlALSA-2026:0312ALSA-2026:0312  Jcups-client-2.3.3op2-34.el9_7.2.x86_64.rpm Jcups-ipptool-2.3.3op2-34.el9_7.2.x86_64.rpmGJcups-devel-2.3.3op2-34.el9_7.2.x86_64.rpmrJcups-filesystem-2.3.3op2-34.el9_7.2.noarch.rpm Jcups-2.3.3op2-34.el9_7.2.x86_64.rpmGJcups-devel-2.3.3op2-34.el9_7.2.i686.rpm Jcups-lpd-2.3.3op2-34.el9_7.2.x86_64.rpm Jcups-printerapp-2.3.3op2-34.el9_7.2.x86_64.rpm Jcups-client-2.3.3op2-34.el9_7.2.x86_64.rpm Jcups-ipptool-2.3.3op2-34.el9_7.2.x86_64.rpmGJcups-devel-2.3.3op2-34.el9_7.2.x86_64.rpmrJcups-filesystem-2.3.3op2-34.el9_7.2.noarch.rpm Jcups-2.3.3op2-34.el9_7.2.x86_64.rpmGJcups-devel-2.3.3op2-34.el9_7.2.i686.rpm Jcups-lpd-2.3.3op2-34.el9_7.2.x86_64.rpm Jcups-printerapp-2.3.3op2-34.el9_7.2.x86_64.rpm˩u$ ;uBBBBsecurityImportant: libsoup security update&$https://access.redhat.com/errata/RHSA-2026:0422RHSA-2026:0422RHSA-2026:0422 https://access.redhat.com/security/cve/CVE-2025-14523CVE-2025-14523CVE-2025-14523https://bugzilla.redhat.com/24213492421349https://errata.almalinux.org/9/ALSA-2026-0422.htmlALSA-2026:0422ALSA-2026:0422 ?Olibsoup-devel-2.72.0-12.el9_7.3.i686.rpm>Olibsoup-2.72.0-12.el9_7.3.i686.rpm>Olibsoup-2.72.0-12.el9_7.3.x86_64.rpm?Olibsoup-devel-2.72.0-12.el9_7.3.x86_64.rpm?Olibsoup-devel-2.72.0-12.el9_7.3.i686.rpm>Olibsoup-2.72.0-12.el9_7.3.i686.rpm>Olibsoup-2.72.0-12.el9_7.3.x86_64.rpm?Olibsoup-devel-2.72.0-12.el9_7.3.x86_64.rpm˩l% |BBsecurityImportant: buildah security update&'6https://access.redhat.com/errata/RHSA-2026:0437RHSA-2026:0437RHSA-2026:0437 https://access.redhat.com/security/cve/CVE-2025-47913CVE-2025-47913CVE-2025-47913https://bugzilla.redhat.com/24149432414943https://errata.almalinux.org/9/ALSA-2026-0437.htmlALSA-2026:0437ALSA-2026:0437 <buildah-1.41.8-1.el9_7.x86_64.rpm=buildah-tests-1.41.8-1.el9_7.x86_64.rpm<buildah-1.41.8-1.el9_7.x86_64.rpm=buildah-tests-1.41.8-1.el9_7.x86_64.rpm˩v& ABBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&]0 https://access.redhat.com/errata/RHSA-2026:0445RHSA-2026:0445RHSA-2026:0445 https://access.redhat.com/security/cve/CVE-2025-39806CVE-2025-39806CVE-2025-39806https://access.redhat.com/security/cve/CVE-2025-39840CVE-2025-39840CVE-2025-39840https://access.redhat.com/security/cve/CVE-2025-39883CVE-2025-39883CVE-2025-39883https://access.redhat.com/security/cve/CVE-2025-40240CVE-2025-40240CVE-2025-40240https://bugzilla.redhat.com/23958072395807https://bugzilla.redhat.com/23969362396936https://bugzilla.redhat.com/23975532397553https://bugzilla.redhat.com/24188322418832https://errata.almalinux.org/9/ALSA-2026-0445.htmlALSA-2026:0445ALSA-2026:0445 Mfpython3-perf-5.14.0-611.20.1.el9_7.x86_64.rpmfkernel-doc-5.14.0-611.20.1.el9_7.noarch.rpm"fkernel-debug-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm#fkernel-devel-5.14.0-611.20.1.el9_7.x86_64.rpm)frtla-5.14.0-611.20.1.el9_7.x86_64.rpm!fkernel-debug-devel-5.14.0-611.20.1.el9_7.x86_64.rpm*frv-5.14.0-611.20.1.el9_7.x86_64.rpm%fperf-5.14.0-611.20.1.el9_7.x86_64.rpm(fkernel-headers-5.14.0-611.20.1.el9_7.x86_64.rpm$fkernel-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm Mfpython3-perf-5.14.0-611.20.1.el9_7.x86_64.rpmfkernel-doc-5.14.0-611.20.1.el9_7.noarch.rpm"fkernel-debug-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm#fkernel-devel-5.14.0-611.20.1.el9_7.x86_64.rpm)frtla-5.14.0-611.20.1.el9_7.x86_64.rpm!fkernel-debug-devel-5.14.0-611.20.1.el9_7.x86_64.rpm*frv-5.14.0-611.20.1.el9_7.x86_64.rpm%fperf-5.14.0-611.20.1.el9_7.x86_64.rpm(fkernel-headers-5.14.0-611.20.1.el9_7.x86_64.rpm$fkernel-devel-matched-5.14.0-611.20.1.el9_7.x86_64.rpm˩S' UBBBBsecurityModerate: libpq security update& (https://access.redhat.com/errata/RHSA-2026:0458RHSA-2026:0458RHSA-2026:0458 https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0458.htmlALSA-2026:0458ALSA-2026:0458 ,libpq-devel-13.23-1.el9_7.x86_64.rpm,libpq-13.23-1.el9_7.i686.rpm,libpq-13.23-1.el9_7.x86_64.rpm,libpq-devel-13.23-1.el9_7.i686.rpm,libpq-devel-13.23-1.el9_7.x86_64.rpm,libpq-13.23-1.el9_7.i686.rpm,libpq-13.23-1.el9_7.x86_64.rpm,libpq-devel-13.23-1.el9_7.i686.rpm˩( %\BBBBBBBsecurityImportant: podman security update&5 https://access.redhat.com/errata/RHSA-2026:0470RHSA-2026:0470RHSA-2026:0470 https://access.redhat.com/security/cve/CVE-2025-47913CVE-2025-47913CVE-2025-47913https://bugzilla.redhat.com/24149432414943https://errata.almalinux.org/9/ALSA-2026-0470.htmlALSA-2026:0470ALSA-2026:0470 0 podman-tests-5.6.0-11.el9_7.x86_64.rpm/ podman-remote-5.6.0-11.el9_7.x86_64.rpm- podman-5.6.0-11.el9_7.x86_64.rpm. podman-plugins-5.6.0-11.el9_7.x86_64.rpmf podman-docker-5.6.0-11.el9_7.noarch.rpm0 podman-tests-5.6.0-11.el9_7.x86_64.rpm/ podman-remote-5.6.0-11.el9_7.x86_64.rpm- podman-5.6.0-11.el9_7.x86_64.rpm. podman-plugins-5.6.0-11.el9_7.x86_64.rpmf podman-docker-5.6.0-11.el9_7.noarch.rpm˩F) 6fBBBBBBBBBBBBBBsecurityModerate: postgresql security update&U[https://access.redhat.com/errata/RHSA-2026:0491RHSA-2026:0491RHSA-2026:0491 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0491.htmlALSA-2026:0491ALSA-2026:0491 Y,postgresql-13.23-1.el9_7.x86_64.rpm,postgresql-plpython3-13.23-1.el9_7.x86_64.rpm,postgresql-pltcl-13.23-1.el9_7.x86_64.rpm,postgresql-private-libs-13.23-1.el9_7.x86_64.rpm,postgresql-contrib-13.23-1.el9_7.x86_64.rpm,postgresql-upgrade-13.23-1.el9_7.x86_64.rpm,postgresql-plperl-13.23-1.el9_7.x86_64.rpm,postgresql-server-13.23-1.el9_7.x86_64.rpmY,postgresql-13.23-1.el9_7.x86_64.rpm,postgresql-plpython3-13.23-1.el9_7.x86_64.rpm,postgresql-pltcl-13.23-1.el9_7.x86_64.rpm,postgresql-private-libs-13.23-1.el9_7.x86_64.rpm,postgresql-contrib-13.23-1.el9_7.x86_64.rpm,postgresql-upgrade-13.23-1.el9_7.x86_64.rpm,postgresql-plperl-13.23-1.el9_7.x86_64.rpm,postgresql-server-13.23-1.el9_7.x86_64.rpm˩V* [BBBWBCBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:15 security update&0[https://access.redhat.com/errata/RHSA-2026:0492RHSA-2026:0492RHSA-2026:0492 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0492.htmlALSA-2026:0492ALSA-2026:0492 Y.'9spostgresql-upgrade-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmYspostgresql-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm1<pg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm2=pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm8spostgresql-test-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmspostgresql-pltcl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm4spostgresql-test-rpm-macros-15.15-2.module_el9.7.0+203+960b74c0.noarch.rpmspostgresql-plperl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm5spostgresql-private-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmspostgresql-server-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm6spostgresql-server-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmspostgresql-plpython3-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm7spostgresql-static-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmspostgresql-contrib-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmspostgresql-upgrade-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm4spostgresql-docs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmspostgresql-private-libs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmY.'9spostgresql-upgrade-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmYspostgresql-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm1<pg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpm2=pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpm8spostgresql-test-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmspostgresql-pltcl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm4spostgresql-test-rpm-macros-15.15-2.module_el9.7.0+203+960b74c0.noarch.rpmspostgresql-plperl-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm5spostgresql-private-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmspostgresql-server-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm6spostgresql-server-devel-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmspostgresql-plpython3-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm7spostgresql-static-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmspostgresql-contrib-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmspostgresql-upgrade-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm4spostgresql-docs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpmspostgresql-private-libs-15.15-2.module_el9.7.0+203+960b74c0.x86_64.rpm˸+ 2_BBBOBBBBBBBBBBBB\BBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityModerate: postgresql:16 security update& [https://access.redhat.com/errata/RHSA-2026:0493RHSA-2026:0493RHSA-2026:0493 https://access.redhat.com/security/cve/CVE-2025-12817CVE-2025-12817CVE-2025-12817https://access.redhat.com/security/cve/CVE-2025-12818CVE-2025-12818CVE-2025-12818https://bugzilla.redhat.com/24148252414825https://bugzilla.redhat.com/24148262414826https://errata.almalinux.org/9/ALSA-2026-0493.htmlALSA-2026:0493ALSA-2026:0493 YA'FKpostgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmHKpostgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm5pgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm7zpostgresql-static-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmzpostgresql-server-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm3Epostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpmzpostgresql-upgrade-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm2Bpgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpmEKpostgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm8zpostgresql-test-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmGKpostgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmzpostgresql-plperl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmzpostgresql-private-libs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm4zpostgresql-docs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm6zpostgresql-server-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm4zpostgresql-test-rpm-macros-16.11-1.module_el9.7.0+202+21427d8a.noarch.rpmzpostgresql-pltcl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm9zpostgresql-upgrade-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmzpostgresql-plpython3-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm1=pg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpmzpostgresql-contrib-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm5zpostgresql-private-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmDKpostgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmYzpostgresql-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmYA'FKpostgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmHKpostgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm5pgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm7zpostgresql-static-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmzpostgresql-server-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm3Epostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpmzpostgresql-upgrade-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm2Bpgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpmEKpostgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm8zpostgresql-test-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmGKpostgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmzpostgresql-plperl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmzpostgresql-private-libs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm4zpostgresql-docs-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm6zpostgresql-server-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm4zpostgresql-test-rpm-macros-16.11-1.module_el9.7.0+202+21427d8a.noarch.rpmzpostgresql-pltcl-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm9zpostgresql-upgrade-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmzpostgresql-plpython3-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm1=pg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpmzpostgresql-contrib-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm5zpostgresql-private-devel-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpmDKpostgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmYzpostgresql-16.11-1.module_el9.7.0+202+21427d8a.x86_64.rpm˷2, 5ssecurityModerate: vsftpd security update&f@https://access.redhat.com/errata/RHSA-2026:0605RHSA-2026:0605RHSA-2026:0605 https://access.redhat.com/security/cve/CVE-2025-14242CVE-2025-14242CVE-2025-14242https://bugzilla.redhat.com/24198262419826https://errata.almalinux.org/9/ALSA-2026-0605.htmlALSA-2026:0605ALSA-2026:0605 ..vsftpd-3.0.5-6.el9_7.2.x86_64.rpm..vsftpd-3.0.5-6.el9_7.2.x86_64.rpm˩g- :vBBsecurityImportant: firefox security update&&yhttps://access.redhat.com/errata/RHSA-2026:0694RHSA-2026:0694RHSA-2026:0694 https://access.redhat.com/security/cve/CVE-2025-14327CVE-2025-14327CVE-2025-14327https://access.redhat.com/security/cve/CVE-2026-0877CVE-2026-0877CVE-2026-0877https://access.redhat.com/security/cve/CVE-2026-0878CVE-2026-0878CVE-2026-0878https://access.redhat.com/security/cve/CVE-2026-0879CVE-2026-0879CVE-2026-0879https://access.redhat.com/security/cve/CVE-2026-0880CVE-2026-0880CVE-2026-0880https://access.redhat.com/security/cve/CVE-2026-0882CVE-2026-0882CVE-2026-0882https://access.redhat.com/security/cve/CVE-2026-0883CVE-2026-0883CVE-2026-0883https://access.redhat.com/security/cve/CVE-2026-0884CVE-2026-0884CVE-2026-0884https://access.redhat.com/security/cve/CVE-2026-0885CVE-2026-0885CVE-2026-0885https://access.redhat.com/security/cve/CVE-2026-0886CVE-2026-0886CVE-2026-0886https://access.redhat.com/security/cve/CVE-2026-0887CVE-2026-0887CVE-2026-0887https://access.redhat.com/security/cve/CVE-2026-0890CVE-2026-0890CVE-2026-0890https://access.redhat.com/security/cve/CVE-2026-0891CVE-2026-0891CVE-2026-0891https://bugzilla.redhat.com/24205072420507https://bugzilla.redhat.com/24289612428961https://bugzilla.redhat.com/24289632428963https://bugzilla.redhat.com/24289652428965https://bugzilla.redhat.com/24289662428966https://bugzilla.redhat.com/24289672428967https://bugzilla.redhat.com/24289682428968https://bugzilla.redhat.com/24289692428969https://bugzilla.redhat.com/24289712428971https://bugzilla.redhat.com/24289722428972https://bugzilla.redhat.com/24289732428973https://bugzilla.redhat.com/24289752428975https://bugzilla.redhat.com/24289782428978https://errata.almalinux.org/9/ALSA-2026-0694.htmlALSA-2026:0694ALSA-2026:0694 OQfirefox-x11-140.7.0-1.el9_7.alma.1.x86_64.rpm7Qfirefox-140.7.0-1.el9_7.alma.1.x86_64.rpmOQfirefox-x11-140.7.0-1.el9_7.alma.1.x86_64.rpm7Qfirefox-140.7.0-1.el9_7.alma.1.x86_64.rpm˩^. {BBBBBBBBBBBBBBBsecurityImportant: net-snmp security update&9https://access.redhat.com/errata/RHSA-2026:0696RHSA-2026:0696RHSA-2026:0696 https://access.redhat.com/security/cve/CVE-2025-68615CVE-2025-68615CVE-2025-68615https://bugzilla.redhat.com/24246182424618https://errata.almalinux.org/9/ALSA-2026-0696.htmlALSA-2026:0696ALSA-2026:0696 _python3-net-snmp-5.9.1-17.el9_7.1.x86_64.rpm!net-snmp-libs-5.9.1-17.el9_7.1.i686.rpmnet-snmp-agent-libs-5.9.1-17.el9_7.1.i686.rpmnet-snmp-agent-libs-5.9.1-17.el9_7.1.x86_64.rpmYnet-snmp-perl-5.9.1-17.el9_7.1.x86_64.rpm!net-snmp-libs-5.9.1-17.el9_7.1.x86_64.rpm net-snmp-devel-5.9.1-17.el9_7.1.i686.rpm net-snmp-devel-5.9.1-17.el9_7.1.x86_64.rpmZnet-snmp-utils-5.9.1-17.el9_7.1.x86_64.rpmXnet-snmp-5.9.1-17.el9_7.1.x86_64.rpm _python3-net-snmp-5.9.1-17.el9_7.1.x86_64.rpm!net-snmp-libs-5.9.1-17.el9_7.1.i686.rpmnet-snmp-agent-libs-5.9.1-17.el9_7.1.i686.rpmnet-snmp-agent-libs-5.9.1-17.el9_7.1.x86_64.rpmYnet-snmp-perl-5.9.1-17.el9_7.1.x86_64.rpm!net-snmp-libs-5.9.1-17.el9_7.1.x86_64.rpm net-snmp-devel-5.9.1-17.el9_7.1.i686.rpm net-snmp-devel-5.9.1-17.el9_7.1.x86_64.rpmZnet-snmp-utils-5.9.1-17.el9_7.1.x86_64.rpmXnet-snmp-5.9.1-17.el9_7.1.x86_64.rpm/ MsecurityImportant: gnupg2 security update&Xbhttps://access.redhat.com/errata/RHSA-2026:0719RHSA-2026:0719RHSA-2026:0719 https://access.redhat.com/security/cve/CVE-2025-68973CVE-2025-68973CVE-2025-68973https://bugzilla.redhat.com/24259662425966https://errata.almalinux.org/9/ALSA-2026-0719.htmlALSA-2026:0719ALSA-2026:0719  gnupg2-smime-2.3.3-5.el9_7.x86_64.rpm gnupg2-smime-2.3.3-5.el9_7.x86_64.rpm˧i0 PBBsecurityImportant: gpsd-minimal security update&:%https://access.redhat.com/errata/RHSA-2026:0771RHSA-2026:0771RHSA-2026:0771 https://access.redhat.com/security/cve/CVE-2025-67268CVE-2025-67268CVE-2025-67268https://access.redhat.com/security/cve/CVE-2025-67269CVE-2025-67269CVE-2025-67269https://bugzilla.redhat.com/24268102426810https://bugzilla.redhat.com/24268352426835https://errata.almalinux.org/9/ALSA-2026-0771.htmlALSA-2026:0771ALSA-2026:0771 iugpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpmjugpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpmiugpsd-minimal-3.26.1-1.el9_7.1.x86_64.rpmjugpsd-minimal-clients-3.26.1-1.el9_7.1.x86_64.rpm˽]1 (UBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&_+ https://access.redhat.com/errata/RHSA-2026:0793RHSA-2026:0793RHSA-2026:0793 https://access.redhat.com/security/cve/CVE-2025-38703CVE-2025-38703CVE-2025-38703https://access.redhat.com/security/cve/CVE-2025-39933CVE-2025-39933CVE-2025-39933https://access.redhat.com/security/cve/CVE-2025-40277CVE-2025-40277CVE-2025-40277https://access.redhat.com/security/cve/CVE-2025-68285CVE-2025-68285CVE-2025-68285https://access.redhat.com/security/cve/CVE-2025-68287CVE-2025-68287CVE-2025-68287https://bugzilla.redhat.com/23931572393157https://bugzilla.redhat.com/24014322401432https://bugzilla.redhat.com/24199542419954https://bugzilla.redhat.com/24227882422788https://bugzilla.redhat.com/24228012422801https://errata.almalinux.org/9/ALSA-2026-0793.htmlALSA-2026:0793ALSA-2026:0793 "gkernel-debug-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpmgkernel-doc-5.14.0-611.24.1.el9_7.noarch.rpmMgpython3-perf-5.14.0-611.24.1.el9_7.x86_64.rpm(gkernel-headers-5.14.0-611.24.1.el9_7.x86_64.rpm%gperf-5.14.0-611.24.1.el9_7.x86_64.rpm!gkernel-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm$gkernel-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm#gkernel-devel-5.14.0-611.24.1.el9_7.x86_64.rpm)grtla-5.14.0-611.24.1.el9_7.x86_64.rpm*grv-5.14.0-611.24.1.el9_7.x86_64.rpm "gkernel-debug-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpmgkernel-doc-5.14.0-611.24.1.el9_7.noarch.rpmMgpython3-perf-5.14.0-611.24.1.el9_7.x86_64.rpm(gkernel-headers-5.14.0-611.24.1.el9_7.x86_64.rpm%gperf-5.14.0-611.24.1.el9_7.x86_64.rpm!gkernel-debug-devel-5.14.0-611.24.1.el9_7.x86_64.rpm$gkernel-devel-matched-5.14.0-611.24.1.el9_7.x86_64.rpm#gkernel-devel-5.14.0-611.24.1.el9_7.x86_64.rpm)grtla-5.14.0-611.24.1.el9_7.x86_64.rpm*grv-5.14.0-611.24.1.el9_7.x86_64.rpm2 .iBBBsecurityImportant: gimp security update& n https://access.redhat.com/errata/RHSA-2026:0914RHSA-2026:0914RHSA-2026:0914 https://access.redhat.com/security/cve/CVE-2025-14422CVE-2025-14422CVE-2025-14422https://access.redhat.com/security/cve/CVE-2025-14423CVE-2025-14423CVE-2025-14423https://access.redhat.com/security/cve/CVE-2025-14424CVE-2025-14424CVE-2025-14424https://access.redhat.com/security/cve/CVE-2025-14425CVE-2025-14425CVE-2025-14425https://bugzilla.redhat.com/24247662424766https://bugzilla.redhat.com/24247672424767https://bugzilla.redhat.com/24247742424774https://bugzilla.redhat.com/24247822424782https://errata.almalinux.org/9/ALSA-2026-0914.htmlALSA-2026:0914ALSA-2026:0914 @gimp-libs-3.0.4-1.el9_7.2.i686.rpm@gimp-libs-3.0.4-1.el9_7.2.x86_64.rpmc@gimp-3.0.4-1.el9_7.2.x86_64.rpm@gimp-libs-3.0.4-1.el9_7.2.i686.rpm@gimp-libs-3.0.4-1.el9_7.2.x86_64.rpmc@gimp-3.0.4-1.el9_7.2.x86_64.rpm&3 ;oBBBBBBBBBBsecurityImportant: golang security update&xhttps://access.redhat.com/errata/RHSA-2026:0923RHSA-2026:0923RHSA-2026:0923 https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://bugzilla.redhat.com/24184622418462https://errata.almalinux.org/9/ALSA-2026-0923.htmlALSA-2026:0923ALSA-2026:0923 lgolang-docs-1.25.5-2.el9_7.noarch.rpm@golang-1.25.5-2.el9_7.x86_64.rpmmgolang-misc-1.25.5-2.el9_7.noarch.rpmogolang-tests-1.25.5-2.el9_7.noarch.rpmEgo-toolset-1.25.5-2.el9_7.x86_64.rpm8golang-race-1.25.5-2.el9_7.x86_64.rpmngolang-src-1.25.5-2.el9_7.noarch.rpmAgolang-bin-1.25.5-2.el9_7.x86_64.rpmlgolang-docs-1.25.5-2.el9_7.noarch.rpm@golang-1.25.5-2.el9_7.x86_64.rpmmgolang-misc-1.25.5-2.el9_7.noarch.rpmogolang-tests-1.25.5-2.el9_7.noarch.rpmEgo-toolset-1.25.5-2.el9_7.x86_64.rpm8golang-race-1.25.5-2.el9_7.x86_64.rpmngolang-src-1.25.5-2.el9_7.noarch.rpmAgolang-bin-1.25.5-2.el9_7.x86_64.rpmr4 >|securityImportant: thunderbird security update& Hhttps://access.redhat.com/errata/RHSA-2026:0924RHSA-2026:0924RHSA-2026:0924 https://access.redhat.com/security/cve/CVE-2025-14327CVE-2025-14327CVE-2025-14327https://access.redhat.com/security/cve/CVE-2026-0877CVE-2026-0877CVE-2026-0877https://access.redhat.com/security/cve/CVE-2026-0878CVE-2026-0878CVE-2026-0878https://access.redhat.com/security/cve/CVE-2026-0879CVE-2026-0879CVE-2026-0879https://access.redhat.com/security/cve/CVE-2026-0880CVE-2026-0880CVE-2026-0880https://access.redhat.com/security/cve/CVE-2026-0882CVE-2026-0882CVE-2026-0882https://access.redhat.com/security/cve/CVE-2026-0883CVE-2026-0883CVE-2026-0883https://access.redhat.com/security/cve/CVE-2026-0884CVE-2026-0884CVE-2026-0884https://access.redhat.com/security/cve/CVE-2026-0885CVE-2026-0885CVE-2026-0885https://access.redhat.com/security/cve/CVE-2026-0886CVE-2026-0886CVE-2026-0886https://access.redhat.com/security/cve/CVE-2026-0887CVE-2026-0887CVE-2026-0887https://access.redhat.com/security/cve/CVE-2026-0890CVE-2026-0890CVE-2026-0890https://access.redhat.com/security/cve/CVE-2026-0891CVE-2026-0891CVE-2026-0891https://bugzilla.redhat.com/24205072420507https://bugzilla.redhat.com/24289612428961https://bugzilla.redhat.com/24289632428963https://bugzilla.redhat.com/24289652428965https://bugzilla.redhat.com/24289662428966https://bugzilla.redhat.com/24289672428967https://bugzilla.redhat.com/24289682428968https://bugzilla.redhat.com/24289692428969https://bugzilla.redhat.com/24289712428971https://bugzilla.redhat.com/24289722428972https://bugzilla.redhat.com/24289732428973https://bugzilla.redhat.com/24289752428975https://bugzilla.redhat.com/24289782428978https://errata.almalinux.org/9/ALSA-2026-0924.htmlALSA-2026:0924ALSA-2026:0924 9Qthunderbird-140.7.0-1.el9_7.alma.1.x86_64.rpm9Qthunderbird-140.7.0-1.el9_7.alma.1.x86_64.rpm 5 BBBBBBBBBBBBBBBBsecurityImportant: java-17-openjdk security update&Tdhttps://access.redhat.com/errata/RHSA-2026:0927RHSA-2026:0927RHSA-2026:0927 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0927.htmlALSA-2026:0927ALSA-2026:0927 0java-17-openjdk-static-libs-17.0.18.0.8-1.el9.alma.1.x86_64.rpm.java-17-openjdk-jmods-17.0.18.0.8-1.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.18.0.8-1.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.18.0.8-1.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.18.0.8-1.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.18.0.8-1.el9.alma.1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.18.0.8-1.el9.alma.1.x86_64.rpm/java-17-openjdk-src-17.0.18.0.8-1.el9.alma.1.x86_64.rpm 0java-17-openjdk-static-libs-17.0.18.0.8-1.el9.alma.1.x86_64.rpm.java-17-openjdk-jmods-17.0.18.0.8-1.el9.alma.1.x86_64.rpm(java-17-openjdk-17.0.18.0.8-1.el9.alma.1.x86_64.rpm)java-17-openjdk-demo-17.0.18.0.8-1.el9.alma.1.x86_64.rpm*java-17-openjdk-devel-17.0.18.0.8-1.el9.alma.1.x86_64.rpm+java-17-openjdk-headless-17.0.18.0.8-1.el9.alma.1.x86_64.rpm-java-17-openjdk-javadoc-zip-17.0.18.0.8-1.el9.alma.1.x86_64.rpm,java-17-openjdk-javadoc-17.0.18.0.8-1.el9.alma.1.x86_64.rpm/java-17-openjdk-src-17.0.18.0.8-1.el9.alma.1.x86_64.rpm06 $RBBBBBBBBBBBBBBBBsecurityImportant: java-21-openjdk security update&8)https://access.redhat.com/errata/RHSA-2026:0928RHSA-2026:0928RHSA-2026:0928 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0928.htmlALSA-2026:0928ALSA-2026:0928 4"java-21-openjdk-jmods-21.0.10.0.7-1.el9.alma.1.x86_64.rpm2"java-21-openjdk-javadoc-21.0.10.0.7-1.el9.alma.1.x86_64.rpm0"java-21-openjdk-devel-21.0.10.0.7-1.el9.alma.1.x86_64.rpm."java-21-openjdk-21.0.10.0.7-1.el9.alma.1.x86_64.rpm5"java-21-openjdk-src-21.0.10.0.7-1.el9.alma.1.x86_64.rpm/"java-21-openjdk-demo-21.0.10.0.7-1.el9.alma.1.x86_64.rpm1"java-21-openjdk-headless-21.0.10.0.7-1.el9.alma.1.x86_64.rpm6"java-21-openjdk-static-libs-21.0.10.0.7-1.el9.alma.1.x86_64.rpm3"java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9.alma.1.x86_64.rpm 4"java-21-openjdk-jmods-21.0.10.0.7-1.el9.alma.1.x86_64.rpm2"java-21-openjdk-javadoc-21.0.10.0.7-1.el9.alma.1.x86_64.rpm0"java-21-openjdk-devel-21.0.10.0.7-1.el9.alma.1.x86_64.rpm."java-21-openjdk-21.0.10.0.7-1.el9.alma.1.x86_64.rpm5"java-21-openjdk-src-21.0.10.0.7-1.el9.alma.1.x86_64.rpm/"java-21-openjdk-demo-21.0.10.0.7-1.el9.alma.1.x86_64.rpm1"java-21-openjdk-headless-21.0.10.0.7-1.el9.alma.1.x86_64.rpm6"java-21-openjdk-static-libs-21.0.10.0.7-1.el9.alma.1.x86_64.rpm3"java-21-openjdk-javadoc-zip-21.0.10.0.7-1.el9.alma.1.x86_64.rpm7 1eBBBBBBBBBBsecurityImportant: java-1.8.0-openjdk security update&awhttps://access.redhat.com/errata/RHSA-2026:0932RHSA-2026:0932RHSA-2026:0932 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0932.htmlALSA-2026:0932ALSA-2026:0932 ccjava-1.8.0-openjdk-demo-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmecjava-1.8.0-openjdk-headless-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmfcjava-1.8.0-openjdk-src-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmbcjava-1.8.0-openjdk-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmCcjava-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el9.alma.1.noarch.rpmdcjava-1.8.0-openjdk-devel-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmBcjava-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el9.alma.1.noarch.rpmccjava-1.8.0-openjdk-demo-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmecjava-1.8.0-openjdk-headless-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmfcjava-1.8.0-openjdk-src-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmbcjava-1.8.0-openjdk-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmCcjava-1.8.0-openjdk-javadoc-zip-1.8.0.482.b08-1.el9.alma.1.noarch.rpmdcjava-1.8.0-openjdk-devel-1.8.0.482.b08-1.el9.alma.1.x86_64.rpmBcjava-1.8.0-openjdk-javadoc-1.8.0.482.b08-1.el9.alma.1.noarch.rpm8 rBBBBBBBBBBBBBBBBBBsecurityImportant: java-25-openjdk security update&Xfhttps://access.redhat.com/errata/RHSA-2026:0933RHSA-2026:0933RHSA-2026:0933 https://access.redhat.com/security/cve/CVE-2025-64720CVE-2025-64720CVE-2025-64720https://access.redhat.com/security/cve/CVE-2025-65018CVE-2025-65018CVE-2025-65018https://access.redhat.com/security/cve/CVE-2026-21925CVE-2026-21925CVE-2026-21925https://access.redhat.com/security/cve/CVE-2026-21933CVE-2026-21933CVE-2026-21933https://access.redhat.com/security/cve/CVE-2026-21945CVE-2026-21945CVE-2026-21945https://errata.almalinux.org/9/ALSA-2026-0933.htmlALSA-2026:0933ALSA-2026:0933 !Djava-25-openjdk-static-libs-25.0.2.0.10-1.el9.alma.1.x86_64.rpm Djava-25-openjdk-src-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-headless-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-javadoc-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-devel-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-jmods-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-demo-25.0.2.0.10-1.el9.alma.1.x86_64.rpm !Djava-25-openjdk-static-libs-25.0.2.0.10-1.el9.alma.1.x86_64.rpm Djava-25-openjdk-src-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-headless-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-javadoc-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-devel-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-crypto-adapter-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-javadoc-zip-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-jmods-25.0.2.0.10-1.el9.alma.1.x86_64.rpmDjava-25-openjdk-demo-25.0.2.0.10-1.el9.alma.1.x86_64.rpm9 GBBBBsecurityModerate: glib2 security update&>https://access.redhat.com/errata/RHSA-2026:0936RHSA-2026:0936RHSA-2026:0936 https://access.redhat.com/security/cve/CVE-2025-13601CVE-2025-13601CVE-2025-13601https://bugzilla.redhat.com/24167412416741https://errata.almalinux.org/9/ALSA-2026-0936.htmlALSA-2026:0936ALSA-2026:0936 Iglib2-tests-2.68.4-18.el9_7.1.x86_64.rpmvIglib2-doc-2.68.4-18.el9_7.1.noarch.rpmIglib2-devel-2.68.4-18.el9_7.1.x86_64.rpmIglib2-devel-2.68.4-18.el9_7.1.i686.rpmIglib2-tests-2.68.4-18.el9_7.1.x86_64.rpmvIglib2-doc-2.68.4-18.el9_7.1.noarch.rpmIglib2-devel-2.68.4-18.el9_7.1.x86_64.rpmIglib2-devel-2.68.4-18.el9_7.1.i686.rpmi: securityImportant: python3.12-urllib3 security update&[7https://access.redhat.com/errata/RHSA-2026:1088RHSA-2026:1088RHSA-2026:1088 https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1088.htmlALSA-2026:1088ALSA-2026:1088 Rjpython3.12-urllib3-1.26.19-1.el9_7.1.noarch.rpmRjpython3.12-urllib3-1.26.19-1.el9_7.1.noarch.rpm; securityImportant: python3.11-urllib3 security update&7https://access.redhat.com/errata/RHSA-2026:1089RHSA-2026:1089RHSA-2026:1089 https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1089.htmlALSA-2026:1089ALSA-2026:1089  hpython3.11-urllib3-1.26.12-5.el9_7.1.noarch.rpm hpython3.11-urllib3-1.26.12-5.el9_7.1.noarch.rpm < %RBBBBBBBBBBBBBBBBBsecurityImportant: kernel security update&Ihttps://access.redhat.com/errata/RHSA-2026:1143RHSA-2026:1143RHSA-2026:1143 https://access.redhat.com/security/cve/CVE-2025-38141CVE-2025-38141CVE-2025-38141https://access.redhat.com/security/cve/CVE-2025-38349CVE-2025-38349CVE-2025-38349https://access.redhat.com/security/cve/CVE-2025-38731CVE-2025-38731CVE-2025-38731https://access.redhat.com/security/cve/CVE-2025-40248CVE-2025-40248CVE-2025-40248https://access.redhat.com/security/cve/CVE-2025-40258CVE-2025-40258CVE-2025-40258https://access.redhat.com/security/cve/CVE-2025-40294CVE-2025-40294CVE-2025-40294https://access.redhat.com/security/cve/CVE-2025-68301CVE-2025-68301CVE-2025-68301https://access.redhat.com/security/cve/CVE-2025-68305CVE-2025-68305CVE-2025-68305https://bugzilla.redhat.com/23760522376052https://bugzilla.redhat.com/23818702381870https://bugzilla.redhat.com/23934882393488https://bugzilla.redhat.com/24188722418872https://bugzilla.redhat.com/24188762418876https://bugzilla.redhat.com/24198912419891https://bugzilla.redhat.com/24228362422836https://bugzilla.redhat.com/24228402422840https://errata.almalinux.org/9/ALSA-2026-1143.htmlALSA-2026:1143ALSA-2026:1143 "hkernel-debug-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm$hkernel-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm*hrv-5.14.0-611.26.1.el9_7.x86_64.rpm%hperf-5.14.0-611.26.1.el9_7.x86_64.rpmhkernel-doc-5.14.0-611.26.1.el9_7.noarch.rpmMhpython3-perf-5.14.0-611.26.1.el9_7.x86_64.rpm#hkernel-devel-5.14.0-611.26.1.el9_7.x86_64.rpm)hrtla-5.14.0-611.26.1.el9_7.x86_64.rpm!hkernel-debug-devel-5.14.0-611.26.1.el9_7.x86_64.rpm(hkernel-headers-5.14.0-611.26.1.el9_7.x86_64.rpm "hkernel-debug-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm$hkernel-devel-matched-5.14.0-611.26.1.el9_7.x86_64.rpm*hrv-5.14.0-611.26.1.el9_7.x86_64.rpm%hperf-5.14.0-611.26.1.el9_7.x86_64.rpmhkernel-doc-5.14.0-611.26.1.el9_7.noarch.rpmMhpython3-perf-5.14.0-611.26.1.el9_7.x86_64.rpm#hkernel-devel-5.14.0-611.26.1.el9_7.x86_64.rpm)hrtla-5.14.0-611.26.1.el9_7.x86_64.rpm!hkernel-debug-devel-5.14.0-611.26.1.el9_7.x86_64.rpm(hkernel-headers-5.14.0-611.26.1.el9_7.x86_64.rpm8= /fBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security update&fqhttps://access.redhat.com/errata/RHSA-2026:1239RHSA-2026:1239RHSA-2026:1239 https://access.redhat.com/security/cve/CVE-2025-66418CVE-2025-66418CVE-2025-66418https://access.redhat.com/security/cve/CVE-2025-66471CVE-2025-66471CVE-2025-66471https://access.redhat.com/security/cve/CVE-2026-21441CVE-2026-21441CVE-2026-21441https://bugzilla.redhat.com/24194552419455https://bugzilla.redhat.com/24194672419467https://bugzilla.redhat.com/24277262427726https://errata.almalinux.org/9/ALSA-2026-1239.htmlALSA-2026:1239ALSA-2026:1239 7_fence-agents-virsh-4.10.0-98.el9_7.4.noarch.rpmfence-agents-rhevm-4.10.0-98.el9_7.4.noarch.rpm fence-agents-cisco-mds-4.10.0-98.el9_7.4.noarch.rpm fence-agents-bladecenter-4.10.0-98.el9_7.4.noarch.rpmfence-agents-ilo-moonshot-4.10.0-98.el9_7.4.noarch.rpm^fence-agents-ibm-vpc-4.10.0-98.el9_7.4.noarch.rpmfence-agents-apc-4.10.0-98.el9_7.4.noarch.rpmfence-agents-ilo2-4.10.0-98.el9_7.4.noarch.rpmfence-agents-ipdu-4.10.0-98.el9_7.4.noarch.rpmDfence-agents-azure-arm-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-eaton-snmp-4.10.0-98.el9_7.4.noarch.rpmfence-virtd-libvirt-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-ibmblade-4.10.0-98.el9_7.4.noarch.rpmHfence-agents-redfish-4.10.0-98.el9_7.4.x86_64.rpmKha-cloud-support-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-nutanix-ahv-4.10.0-98.el9_7.4.noarch.rpm!fence-agents-sbd-4.10.0-98.el9_7.4.noarch.rpmfence-virtd-serial-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-mpath-4.10.0-98.el9_7.4.noarch.rpmfence-agents-emerson-4.10.0-98.el9_7.4.noarch.rpm%fence-agents-wti-4.10.0-98.el9_7.4.noarch.rpm"fence-agents-scsi-4.10.0-98.el9_7.4.noarch.rpmAfence-agents-aliyun-4.10.0-98.el9_7.4.x86_64.rpm fence-agents-drac5-4.10.0-98.el9_7.4.noarch.rpmfence-agents-lpar-4.10.0-98.el9_7.4.noarch.rpmfence-agents-rsa-4.10.0-98.el9_7.4.noarch.rpmBfence-agents-all-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-ilo-mp-4.10.0-98.el9_7.4.noarch.rpmfence-agents-hpblade-4.10.0-98.el9_7.4.noarch.rpmCfence-agents-aws-4.10.0-98.el9_7.4.x86_64.rpm fence-agents-cisco-ucs-4.10.0-98.el9_7.4.noarch.rpmfence-agents-kubevirt-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-eps-4.10.0-98.el9_7.4.noarch.rpm#fence-agents-vmware-rest-4.10.0-98.el9_7.4.noarch.rpmGfence-agents-openstack-4.10.0-98.el9_7.4.x86_64.rpmfence-virtd-multicast-4.10.0-98.el9_7.4.x86_64.rpm]fence-agents-ibm-powervs-4.10.0-98.el9_7.4.noarch.rpmfence-agents-heuristics-ping-4.10.0-98.el9_7.4.noarch.rpmfence-virtd-tcp-4.10.0-98.el9_7.4.x86_64.rpmfence-virtd-4.10.0-98.el9_7.4.x86_64.rpm fence-agents-brocade-4.10.0-98.el9_7.4.noarch.rpmfence-agents-ilo-ssh-4.10.0-98.el9_7.4.noarch.rpm fence-agents-rsb-4.10.0-98.el9_7.4.noarch.rpmfence-agents-apc-snmp-4.10.0-98.el9_7.4.noarch.rpmfence-agents-compute-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-intelmodular-4.10.0-98.el9_7.4.noarch.rpmFfence-agents-kdump-4.10.0-98.el9_7.4.x86_64.rpmfence-virtd-cpg-4.10.0-98.el9_7.4.x86_64.rpmfence-virt-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-amt-ws-4.10.0-98.el9_7.4.noarch.rpmfence-agents-ipmilan-4.10.0-98.el9_7.4.noarch.rpmEfence-agents-gce-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-ifmib-4.10.0-98.el9_7.4.noarch.rpm\fence-agents-common-4.10.0-98.el9_7.4.noarch.rpm$fence-agents-vmware-soap-4.10.0-98.el9_7.4.noarch.rpm7_fence-agents-virsh-4.10.0-98.el9_7.4.noarch.rpmfence-agents-rhevm-4.10.0-98.el9_7.4.noarch.rpm fence-agents-cisco-mds-4.10.0-98.el9_7.4.noarch.rpm fence-agents-bladecenter-4.10.0-98.el9_7.4.noarch.rpmfence-agents-ilo-moonshot-4.10.0-98.el9_7.4.noarch.rpm^fence-agents-ibm-vpc-4.10.0-98.el9_7.4.noarch.rpmfence-agents-apc-4.10.0-98.el9_7.4.noarch.rpmfence-agents-ilo2-4.10.0-98.el9_7.4.noarch.rpmfence-agents-ipdu-4.10.0-98.el9_7.4.noarch.rpmDfence-agents-azure-arm-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-eaton-snmp-4.10.0-98.el9_7.4.noarch.rpmfence-virtd-libvirt-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-ibmblade-4.10.0-98.el9_7.4.noarch.rpmHfence-agents-redfish-4.10.0-98.el9_7.4.x86_64.rpmKha-cloud-support-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-nutanix-ahv-4.10.0-98.el9_7.4.noarch.rpm!fence-agents-sbd-4.10.0-98.el9_7.4.noarch.rpmfence-virtd-serial-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-mpath-4.10.0-98.el9_7.4.noarch.rpmfence-agents-emerson-4.10.0-98.el9_7.4.noarch.rpm%fence-agents-wti-4.10.0-98.el9_7.4.noarch.rpm"fence-agents-scsi-4.10.0-98.el9_7.4.noarch.rpmAfence-agents-aliyun-4.10.0-98.el9_7.4.x86_64.rpm fence-agents-drac5-4.10.0-98.el9_7.4.noarch.rpmfence-agents-lpar-4.10.0-98.el9_7.4.noarch.rpmfence-agents-rsa-4.10.0-98.el9_7.4.noarch.rpmBfence-agents-all-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-ilo-mp-4.10.0-98.el9_7.4.noarch.rpmfence-agents-hpblade-4.10.0-98.el9_7.4.noarch.rpmCfence-agents-aws-4.10.0-98.el9_7.4.x86_64.rpm fence-agents-cisco-ucs-4.10.0-98.el9_7.4.noarch.rpmfence-agents-kubevirt-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-eps-4.10.0-98.el9_7.4.noarch.rpm#fence-agents-vmware-rest-4.10.0-98.el9_7.4.noarch.rpmGfence-agents-openstack-4.10.0-98.el9_7.4.x86_64.rpmfence-virtd-multicast-4.10.0-98.el9_7.4.x86_64.rpm]fence-agents-ibm-powervs-4.10.0-98.el9_7.4.noarch.rpmfence-agents-heuristics-ping-4.10.0-98.el9_7.4.noarch.rpmfence-virtd-tcp-4.10.0-98.el9_7.4.x86_64.rpmfence-virtd-4.10.0-98.el9_7.4.x86_64.rpm fence-agents-brocade-4.10.0-98.el9_7.4.noarch.rpmfence-agents-ilo-ssh-4.10.0-98.el9_7.4.noarch.rpm fence-agents-rsb-4.10.0-98.el9_7.4.noarch.rpmfence-agents-apc-snmp-4.10.0-98.el9_7.4.noarch.rpmfence-agents-compute-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-intelmodular-4.10.0-98.el9_7.4.noarch.rpmFfence-agents-kdump-4.10.0-98.el9_7.4.x86_64.rpmfence-virtd-cpg-4.10.0-98.el9_7.4.x86_64.rpmfence-virt-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-amt-ws-4.10.0-98.el9_7.4.noarch.rpmfence-agents-ipmilan-4.10.0-98.el9_7.4.noarch.rpmEfence-agents-gce-4.10.0-98.el9_7.4.x86_64.rpmfence-agents-ifmib-4.10.0-98.el9_7.4.noarch.rpm\fence-agents-common-4.10.0-98.el9_7.4.noarch.rpm$fence-agents-vmware-soap-4.10.0-98.el9_7.4.noarch.rpm̂s> 3pBsecurityModerate: curl security update&WAhttps://access.redhat.com/errata/RHSA-2026:1350RHSA-2026:1350RHSA-2026:1350 https://access.redhat.com/security/cve/CVE-2025-9086CVE-2025-9086CVE-2025-9086https://bugzilla.redhat.com/23947502394750https://errata.almalinux.org/9/ALSA-2026-1350.htmlALSA-2026:1350ALSA-2026:1350  \libcurl-devel-7.76.1-35.el9_7.3.i686.rpm \libcurl-devel-7.76.1-35.el9_7.3.x86_64.rpm \libcurl-devel-7.76.1-35.el9_7.3.i686.rpm \libcurl-devel-7.76.1-35.el9_7.3.x86_64.rpm? =tBBBBBBBsecurityModerate: gcc-toolset-15-binutils security update&ehttps://access.redhat.com/errata/RHSA-2026:1359RHSA-2026:1359RHSA-2026:1359 https://access.redhat.com/security/cve/CVE-2025-11083CVE-2025-11083CVE-2025-11083https://bugzilla.redhat.com/23999482399948https://errata.almalinux.org/9/ALSA-2026-1359.htmlALSA-2026:1359ALSA-2026:1359 a|gcc-toolset-15-binutils-gold-2.44-3.el9_7.1.x86_64.rpmb|gcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1.x86_64.rpm`|gcc-toolset-15-binutils-2.44-3.el9_7.1.x86_64.rpm |gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.i686.rpm |gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.x86_64.rpma|gcc-toolset-15-binutils-gold-2.44-3.el9_7.1.x86_64.rpmb|gcc-toolset-15-binutils-gprofng-2.44-3.el9_7.1.x86_64.rpm`|gcc-toolset-15-binutils-2.44-3.el9_7.1.x86_64.rpm |gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.i686.rpm |gcc-toolset-15-binutils-devel-2.44-3.el9_7.1.x86_64.rpm̂>@ ~securityModerate: image-builder security update&}*https://access.redhat.com/errata/RHSA-2026:1377RHSA-2026:1377RHSA-2026:1377 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2026-1377.htmlALSA-2026:1377ALSA-2026:1377 q@image-builder-31-2.el9_7.x86_64.rpmq@image-builder-31-2.el9_7.x86_64.rpm̶A ABBBBsecurityModerate: osbuild-composer security update&'Bhttps://access.redhat.com/errata/RHSA-2026:1381RHSA-2026:1381RHSA-2026:1381 https://access.redhat.com/security/cve/CVE-2025-58183CVE-2025-58183CVE-2025-58183https://bugzilla.redhat.com/24072582407258https://errata.almalinux.org/9/ALSA-2026-1381.htmlALSA-2026:1381ALSA-2026:1381 VTosbuild-composer-worker-149-3.el9_7.alma.3.x86_64.rpmTTosbuild-composer-149-3.el9_7.alma.3.x86_64.rpmUTosbuild-composer-core-149-3.el9_7.alma.3.x86_64.rpmVTosbuild-composer-worker-149-3.el9_7.alma.3.x86_64.rpmTTosbuild-composer-149-3.el9_7.alma.3.x86_64.rpmUTosbuild-composer-core-149-3.el9_7.alma.3.x86_64.rpm̂[B HBBBBBBBBsecurityModerate: python3.12 security update&i,https://access.redhat.com/errata/RHSA-2026:1408RHSA-2026:1408RHSA-2026:1408 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1408.htmlALSA-2026:1408ALSA-2026:1408  python3.12-libs-3.12.12-4.el9_7.x86_64.rpm; python3.12-tkinter-3.12.12-4.el9_7.x86_64.rpm python3.12-libs-3.12.12-4.el9_7.i686.rpm python3.12-devel-3.12.12-4.el9_7.x86_64.rpm: python3.12-3.12.12-4.el9_7.x86_64.rpm python3.12-devel-3.12.12-4.el9_7.i686.rpm python3.12-libs-3.12.12-4.el9_7.x86_64.rpm; python3.12-tkinter-3.12.12-4.el9_7.x86_64.rpm python3.12-libs-3.12.12-4.el9_7.i686.rpm python3.12-devel-3.12.12-4.el9_7.x86_64.rpm: python3.12-3.12.12-4.el9_7.x86_64.rpm python3.12-devel-3.12.12-4.el9_7.i686.rpmC DB^BBBBBBBBjBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.2 security update&Xhttps://access.redhat.com/errata/RHSA-2026:1409RHSA-2026:1409RHSA-2026:1409 https://access.redhat.com/security/cve/CVE-2025-1220CVE-2025-1220CVE-2025-1220https://access.redhat.com/security/cve/CVE-2025-14177CVE-2025-14177CVE-2025-14177https://access.redhat.com/security/cve/CVE-2025-14178CVE-2025-14178CVE-2025-14178https://access.redhat.com/security/cve/CVE-2025-14180CVE-2025-14180CVE-2025-14180https://access.redhat.com/security/cve/CVE-2025-1735CVE-2025-1735CVE-2025-1735https://access.redhat.com/security/cve/CVE-2025-6491CVE-2025-6491CVE-2025-6491https://bugzilla.redhat.com/23786892378689https://bugzilla.redhat.com/23786902378690https://bugzilla.redhat.com/23797922379792https://bugzilla.redhat.com/24256252425625https://bugzilla.redhat.com/24256262425626https://bugzilla.redhat.com/24256272425627https://errata.almalinux.org/9/ALSA-2026-1409.htmlALSA-2026:1409ALSA-2026:1409 '|Iphp-pdo-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmzIphp-odbc-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmIphp-xml-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmvIphp-intl-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmuIphp-gmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmqIphp-enchant-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmkIphp-cli-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmxIphp-mbstring-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmtIphp-gd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmf^apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmrIphp-ffi-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmwIphp-ldap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmIphp-snmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmmIphp-dba-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmpIphp-embedded-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmsIphp-fpm-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm?php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmIphp-soap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm>^php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmA9php-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm@php-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmIphp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmlIphp-common-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm}Iphp-pgsql-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmnIphp-dbg-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmjIphp-bcmath-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmoIphp-devel-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm=^php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm~Iphp-process-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmyIphp-mysqlnd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm{Iphp-opcache-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm'|Iphp-pdo-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmzIphp-odbc-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmIphp-xml-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmvIphp-intl-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmuIphp-gmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmqIphp-enchant-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmkIphp-cli-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmxIphp-mbstring-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmtIphp-gd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmf^apcu-panel-5.1.23-1.module_el9.4.0+65+49ff6472.noarch.rpmrIphp-ffi-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmwIphp-ldap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmIphp-snmp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmmIphp-dba-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmpIphp-embedded-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmsIphp-fpm-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm?php-pecl-rrd-2.0.3-4.module_el9.4.0+65+49ff6472.x86_64.rpmIphp-soap-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm>^php-pecl-apcu-devel-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpmA9php-pecl-zip-1.22.3-1.module_el9.4.0+65+49ff6472.x86_64.rpm@php-pecl-xdebug3-3.2.2-2.module_el9.4.0+65+49ff6472.x86_64.rpmIphp-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmlIphp-common-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm}Iphp-pgsql-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmnIphp-dbg-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmjIphp-bcmath-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmoIphp-devel-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm=^php-pecl-apcu-5.1.23-1.module_el9.4.0+65+49ff6472.x86_64.rpm~Iphp-process-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpmyIphp-mysqlnd-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm{Iphp-opcache-8.2.30-1.module_el9.7.0+205+fe410f10.x86_64.rpm̂uD FBBBBBBBBsecurityModerate: python3.11 security update&m,https://access.redhat.com/errata/RHSA-2026:1410RHSA-2026:1410RHSA-2026:1410 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://access.redhat.com/security/cve/CVE-2025-13836CVE-2025-13836CVE-2025-13836https://bugzilla.redhat.com/24180782418078https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1410.htmlALSA-2026:1410ALSA-2026:1410 |python3.11-tkinter-3.11.13-5.el9_7.x86_64.rpm^|python3.11-devel-3.11.13-5.el9_7.i686.rpm_|python3.11-libs-3.11.13-5.el9_7.i686.rpm|python3.11-3.11.13-5.el9_7.x86_64.rpm^|python3.11-devel-3.11.13-5.el9_7.x86_64.rpm_|python3.11-libs-3.11.13-5.el9_7.x86_64.rpm|python3.11-tkinter-3.11.13-5.el9_7.x86_64.rpm^|python3.11-devel-3.11.13-5.el9_7.i686.rpm_|python3.11-libs-3.11.13-5.el9_7.i686.rpm|python3.11-3.11.13-5.el9_7.x86_64.rpm^|python3.11-devel-3.11.13-5.el9_7.x86_64.rpm_|python3.11-libs-3.11.13-5.el9_7.x86_64.rpmIE BBBBBBBBBBBBBDBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: php:8.3 security update&[https://access.redhat.com/errata/RHSA-2026:1429RHSA-2026:1429RHSA-2026:1429 https://access.redhat.com/security/cve/CVE-2025-14177CVE-2025-14177CVE-2025-14177https://access.redhat.com/security/cve/CVE-2025-14178CVE-2025-14178CVE-2025-14178https://access.redhat.com/security/cve/CVE-2025-14180CVE-2025-14180CVE-2025-14180https://bugzilla.redhat.com/24256252425625https://bugzilla.redhat.com/24256262425626https://bugzilla.redhat.com/24256272425627https://errata.almalinux.org/9/ALSA-2026-1429.htmlALSA-2026:1429ALSA-2026:1429 ' Lphp-soap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmyLphp-mysqlnd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm}Lphp-pgsql-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm|Lphp-pdo-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmA:php-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmwLphp-ldap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmpLphp-embedded-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmzLphp-odbc-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmLphp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmoLphp-devel-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmf_apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmrLphp-ffi-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmxLphp-mbstring-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmnLphp-dbg-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm=_php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm{Lphp-opcache-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm?wphp-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmsLphp-fpm-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmLphp-xml-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmjLphp-bcmath-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmqLphp-enchant-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmtLphp-gd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmmLphp-dba-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm~Lphp-process-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm@php-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpmuLphp-gmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmLphp-snmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmlLphp-common-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm>_php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmkLphp-cli-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmvLphp-intl-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm^-php-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm' Lphp-soap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmyLphp-mysqlnd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm}Lphp-pgsql-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm|Lphp-pdo-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmA:php-pecl-zip-1.22.3-1.module_el9.6.0+151+5f31e576.x86_64.rpmwLphp-ldap-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmpLphp-embedded-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmzLphp-odbc-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmLphp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmoLphp-devel-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmf_apcu-panel-5.1.23-1.module_el9.6.0+151+5f31e576.noarch.rpmrLphp-ffi-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmxLphp-mbstring-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmnLphp-dbg-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm=_php-pecl-apcu-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpm{Lphp-opcache-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm?wphp-pecl-rrd-2.0.3-4.module_el9.6.0+151+5f31e576.x86_64.rpmsLphp-fpm-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmLphp-xml-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmjLphp-bcmath-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmqLphp-enchant-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmtLphp-gd-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmmLphp-dba-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm~Lphp-process-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm@php-pecl-xdebug3-3.3.1-1.module_el9.6.0+151+5f31e576.x86_64.rpmuLphp-gmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmLphp-snmp-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmlLphp-common-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm>_php-pecl-apcu-devel-5.1.23-1.module_el9.6.0+151+5f31e576.x86_64.rpmkLphp-cli-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpmvLphp-intl-8.3.29-1.module_el9.7.0+206+f4fec7f3.x86_64.rpm^-php-pecl-redis6-6.1.0-2.module_el9.6.0+151+5f31e576.x86_64.rpm=F DBBBsecurityImportant: openssl security update&tLhttps://access.redhat.com/errata/RHSA-2026:1473RHSA-2026:1473RHSA-2026:1473 https://access.redhat.com/security/cve/CVE-2025-11187CVE-2025-11187CVE-2025-11187https://access.redhat.com/security/cve/CVE-2025-15467CVE-2025-15467CVE-2025-15467https://access.redhat.com/security/cve/CVE-2025-15468CVE-2025-15468CVE-2025-15468https://access.redhat.com/security/cve/CVE-2025-15469CVE-2025-15469CVE-2025-15469https://access.redhat.com/security/cve/CVE-2025-66199CVE-2025-66199CVE-2025-66199https://access.redhat.com/security/cve/CVE-2025-68160CVE-2025-68160CVE-2025-68160https://access.redhat.com/security/cve/CVE-2025-69418CVE-2025-69418CVE-2025-69418https://access.redhat.com/security/cve/CVE-2025-69419CVE-2025-69419CVE-2025-69419https://access.redhat.com/security/cve/CVE-2025-69420CVE-2025-69420CVE-2025-69420https://access.redhat.com/security/cve/CVE-2025-69421CVE-2025-69421CVE-2025-69421https://access.redhat.com/security/cve/CVE-2026-22795CVE-2026-22795CVE-2026-22795https://access.redhat.com/security/cve/CVE-2026-22796CVE-2026-22796CVE-2026-22796https://bugzilla.redhat.com/24303752430375https://bugzilla.redhat.com/24303762430376https://bugzilla.redhat.com/24303772430377https://bugzilla.redhat.com/24303782430378https://bugzilla.redhat.com/24303792430379https://bugzilla.redhat.com/24303802430380https://bugzilla.redhat.com/24303812430381https://bugzilla.redhat.com/24303862430386https://bugzilla.redhat.com/24303872430387https://bugzilla.redhat.com/24303882430388https://bugzilla.redhat.com/24303892430389https://bugzilla.redhat.com/24303902430390https://errata.almalinux.org/9/ALSA-2026-1473.htmlALSA-2026:1473ALSA-2026:1473 0openssl-devel-3.5.1-7.el9_7.i686.rpmm0openssl-perl-3.5.1-7.el9_7.x86_64.rpm0openssl-devel-3.5.1-7.el9_7.x86_64.rpm0openssl-devel-3.5.1-7.el9_7.i686.rpmm0openssl-perl-3.5.1-7.el9_7.x86_64.rpm0openssl-devel-3.5.1-7.el9_7.x86_64.rpm̂G JBBBBsecurityModerate: python3.9 security update&@bhttps://access.redhat.com/errata/RHSA-2026:1478RHSA-2026:1478RHSA-2026:1478 https://access.redhat.com/security/cve/CVE-2025-12084CVE-2025-12084CVE-2025-12084https://bugzilla.redhat.com/24186552418655https://errata.almalinux.org/9/ALSA-2026-1478.htmlALSA-2026:1478ALSA-2026:1478 Ropython3-devel-3.9.25-3.el9_7.x86_64.rpmgopython-unversioned-command-3.9.25-3.el9_7.noarch.rpm1opython3-tkinter-3.9.25-3.el9_7.x86_64.rpmRopython3-devel-3.9.25-3.el9_7.i686.rpmRopython3-devel-3.9.25-3.el9_7.x86_64.rpmgopython-unversioned-command-3.9.25-3.el9_7.noarch.rpm1opython3-tkinter-3.9.25-3.el9_7.x86_64.rpmRopython3-devel-3.9.25-3.el9_7.i686.rpmtH QBsecurityModerate: iperf3 security update&"8https://access.redhat.com/errata/RHSA-2026:1595RHSA-2026:1595RHSA-2026:1595 https://access.redhat.com/security/cve/CVE-2025-54349CVE-2025-54349CVE-2025-54349https://bugzilla.redhat.com/23861512386151https://errata.almalinux.org/9/ALSA-2026-1595.htmlALSA-2026:1595ALSA-2026:1595 Iiperf3-3.9-14.el9_7.1.i686.rpmIiperf3-3.9-14.el9_7.1.x86_64.rpmIiperf3-3.9-14.el9_7.1.i686.rpmIiperf3-3.9-14.el9_7.1.x86_64.rpḿI (UBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&ZDhttps://access.redhat.com/errata/RHSA-2026:1617RHSA-2026:1617RHSA-2026:1617 https://access.redhat.com/security/cve/CVE-2025-38568CVE-2025-38568CVE-2025-38568https://access.redhat.com/security/cve/CVE-2025-40154CVE-2025-40154CVE-2025-40154https://access.redhat.com/security/cve/CVE-2025-40251CVE-2025-40251CVE-2025-40251https://bugzilla.redhat.com/23895072389507https://bugzilla.redhat.com/24144942414494https://bugzilla.redhat.com/24188922418892https://errata.almalinux.org/9/ALSA-2026-1617.htmlALSA-2026:1617ALSA-2026:1617 #ikernel-devel-5.14.0-611.27.1.el9_7.x86_64.rpmMipython3-perf-5.14.0-611.27.1.el9_7.x86_64.rpm)irtla-5.14.0-611.27.1.el9_7.x86_64.rpmikernel-doc-5.14.0-611.27.1.el9_7.noarch.rpm"ikernel-debug-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm%iperf-5.14.0-611.27.1.el9_7.x86_64.rpm!ikernel-debug-devel-5.14.0-611.27.1.el9_7.x86_64.rpm(ikernel-headers-5.14.0-611.27.1.el9_7.x86_64.rpm*irv-5.14.0-611.27.1.el9_7.x86_64.rpm$ikernel-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm #ikernel-devel-5.14.0-611.27.1.el9_7.x86_64.rpmMipython3-perf-5.14.0-611.27.1.el9_7.x86_64.rpm)irtla-5.14.0-611.27.1.el9_7.x86_64.rpmikernel-doc-5.14.0-611.27.1.el9_7.noarch.rpm"ikernel-debug-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm%iperf-5.14.0-611.27.1.el9_7.x86_64.rpm!ikernel-debug-devel-5.14.0-611.27.1.el9_7.x86_64.rpm(ikernel-headers-5.14.0-611.27.1.el9_7.x86_64.rpm*irv-5.14.0-611.27.1.el9_7.x86_64.rpm$ikernel-devel-matched-5.14.0-611.27.1.el9_7.x86_64.rpm̖AJ 2iBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: fence-agents security update&https://access.redhat.com/errata/RHSA-2026:1903RHSA-2026:1903RHSA-2026:1903 https://access.redhat.com/security/cve/CVE-2026-23490CVE-2026-23490CVE-2026-23490https://bugzilla.redhat.com/24304722430472https://errata.almalinux.org/9/ALSA-2026-1903.htmlALSA-2026:1903ALSA-2026:1903 7Kha-cloud-support-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-eaton-snmp-4.10.0-98.el9_7.5.noarch.rpm_fence-agents-virsh-4.10.0-98.el9_7.5.noarch.rpmfence-agents-amt-ws-4.10.0-98.el9_7.5.noarch.rpmDfence-agents-azure-arm-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ipmilan-4.10.0-98.el9_7.5.noarch.rpmEfence-agents-gce-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ipdu-4.10.0-98.el9_7.5.noarch.rpmfence-agents-apc-4.10.0-98.el9_7.5.noarch.rpmfence-agents-eps-4.10.0-98.el9_7.5.noarch.rpm fence-agents-cisco-mds-4.10.0-98.el9_7.5.noarch.rpmfence-agents-ifmib-4.10.0-98.el9_7.5.noarch.rpmBfence-agents-all-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-emerson-4.10.0-98.el9_7.5.noarch.rpmfence-agents-compute-4.10.0-98.el9_7.5.x86_64.rpmfence-virt-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-intelmodular-4.10.0-98.el9_7.5.noarch.rpmCfence-agents-aws-4.10.0-98.el9_7.5.x86_64.rpm fence-agents-rsb-4.10.0-98.el9_7.5.noarch.rpmfence-agents-rsa-4.10.0-98.el9_7.5.noarch.rpmfence-agents-lpar-4.10.0-98.el9_7.5.noarch.rpmfence-agents-hpblade-4.10.0-98.el9_7.5.noarch.rpmfence-agents-heuristics-ping-4.10.0-98.el9_7.5.noarch.rpm fence-agents-drac5-4.10.0-98.el9_7.5.noarch.rpmfence-agents-apc-snmp-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-libvirt-4.10.0-98.el9_7.5.x86_64.rpm#fence-agents-vmware-rest-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-multicast-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ilo-mp-4.10.0-98.el9_7.5.noarch.rpmfence-agents-ilo2-4.10.0-98.el9_7.5.noarch.rpmAfence-agents-aliyun-4.10.0-98.el9_7.5.x86_64.rpmGfence-agents-openstack-4.10.0-98.el9_7.5.x86_64.rpm fence-agents-brocade-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-cpg-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ilo-moonshot-4.10.0-98.el9_7.5.noarch.rpmfence-agents-mpath-4.10.0-98.el9_7.5.noarch.rpmfence-agents-kubevirt-4.10.0-98.el9_7.5.x86_64.rpm fence-agents-bladecenter-4.10.0-98.el9_7.5.noarch.rpm$fence-agents-vmware-soap-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-tcp-4.10.0-98.el9_7.5.x86_64.rpmFfence-agents-kdump-4.10.0-98.el9_7.5.x86_64.rpm!fence-agents-sbd-4.10.0-98.el9_7.5.noarch.rpm\fence-agents-common-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-serial-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-nutanix-ahv-4.10.0-98.el9_7.5.noarch.rpm fence-agents-cisco-ucs-4.10.0-98.el9_7.5.noarch.rpm"fence-agents-scsi-4.10.0-98.el9_7.5.noarch.rpm^fence-agents-ibm-vpc-4.10.0-98.el9_7.5.noarch.rpm%fence-agents-wti-4.10.0-98.el9_7.5.noarch.rpmfence-agents-rhevm-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ibmblade-4.10.0-98.el9_7.5.noarch.rpmHfence-agents-redfish-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ilo-ssh-4.10.0-98.el9_7.5.noarch.rpm]fence-agents-ibm-powervs-4.10.0-98.el9_7.5.noarch.rpm7Kha-cloud-support-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-eaton-snmp-4.10.0-98.el9_7.5.noarch.rpm_fence-agents-virsh-4.10.0-98.el9_7.5.noarch.rpmfence-agents-amt-ws-4.10.0-98.el9_7.5.noarch.rpmDfence-agents-azure-arm-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ipmilan-4.10.0-98.el9_7.5.noarch.rpmEfence-agents-gce-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ipdu-4.10.0-98.el9_7.5.noarch.rpmfence-agents-apc-4.10.0-98.el9_7.5.noarch.rpmfence-agents-eps-4.10.0-98.el9_7.5.noarch.rpm fence-agents-cisco-mds-4.10.0-98.el9_7.5.noarch.rpmfence-agents-ifmib-4.10.0-98.el9_7.5.noarch.rpmBfence-agents-all-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-emerson-4.10.0-98.el9_7.5.noarch.rpmfence-agents-compute-4.10.0-98.el9_7.5.x86_64.rpmfence-virt-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-intelmodular-4.10.0-98.el9_7.5.noarch.rpmCfence-agents-aws-4.10.0-98.el9_7.5.x86_64.rpm fence-agents-rsb-4.10.0-98.el9_7.5.noarch.rpmfence-agents-rsa-4.10.0-98.el9_7.5.noarch.rpmfence-agents-lpar-4.10.0-98.el9_7.5.noarch.rpmfence-agents-hpblade-4.10.0-98.el9_7.5.noarch.rpmfence-agents-heuristics-ping-4.10.0-98.el9_7.5.noarch.rpm fence-agents-drac5-4.10.0-98.el9_7.5.noarch.rpmfence-agents-apc-snmp-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-libvirt-4.10.0-98.el9_7.5.x86_64.rpm#fence-agents-vmware-rest-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-multicast-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ilo-mp-4.10.0-98.el9_7.5.noarch.rpmfence-agents-ilo2-4.10.0-98.el9_7.5.noarch.rpmAfence-agents-aliyun-4.10.0-98.el9_7.5.x86_64.rpmGfence-agents-openstack-4.10.0-98.el9_7.5.x86_64.rpm fence-agents-brocade-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-cpg-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ilo-moonshot-4.10.0-98.el9_7.5.noarch.rpmfence-agents-mpath-4.10.0-98.el9_7.5.noarch.rpmfence-agents-kubevirt-4.10.0-98.el9_7.5.x86_64.rpm fence-agents-bladecenter-4.10.0-98.el9_7.5.noarch.rpm$fence-agents-vmware-soap-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-tcp-4.10.0-98.el9_7.5.x86_64.rpmFfence-agents-kdump-4.10.0-98.el9_7.5.x86_64.rpm!fence-agents-sbd-4.10.0-98.el9_7.5.noarch.rpm\fence-agents-common-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-serial-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-nutanix-ahv-4.10.0-98.el9_7.5.noarch.rpm fence-agents-cisco-ucs-4.10.0-98.el9_7.5.noarch.rpm"fence-agents-scsi-4.10.0-98.el9_7.5.noarch.rpm^fence-agents-ibm-vpc-4.10.0-98.el9_7.5.noarch.rpm%fence-agents-wti-4.10.0-98.el9_7.5.noarch.rpmfence-agents-rhevm-4.10.0-98.el9_7.5.noarch.rpmfence-virtd-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ibmblade-4.10.0-98.el9_7.5.noarch.rpmHfence-agents-redfish-4.10.0-98.el9_7.5.x86_64.rpmfence-agents-ilo-ssh-4.10.0-98.el9_7.5.noarch.rpm]fence-agents-ibm-powervs-4.10.0-98.el9_7.5.noarch.rpm̫LK 5ssecurityImportant: opentelemetry-collector security update&5!https://access.redhat.com/errata/RHSA-2026:1908RHSA-2026:1908RHSA-2026:1908 https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://bugzilla.redhat.com/24184622418462https://errata.almalinux.org/9/ALSA-2026-1908.htmlALSA-2026:1908ALSA-2026:1908 xopentelemetry-collector-0.135.0-3.el9_7.x86_64.rpmxopentelemetry-collector-0.135.0-3.el9_7.x86_64.rpm̫/L vBBBBBBBBBBBsecurityModerate: util-linux security update&Vhttps://access.redhat.com/errata/RHSA-2026:1913RHSA-2026:1913RHSA-2026:1913 https://access.redhat.com/security/cve/CVE-2025-14104CVE-2025-14104CVE-2025-14104https://bugzilla.redhat.com/24193692419369https://errata.almalinux.org/9/ALSA-2026-1913.htmlALSA-2026:1913ALSA-2026:1913 plibblkid-devel-2.37.4-21.el9_7.x86_64.rpm,puuidd-2.37.4-21.el9_7.x86_64.rpm#plibmount-devel-2.37.4-21.el9_7.x86_64.rpm.plibuuid-devel-2.37.4-21.el9_7.i686.rpmplibblkid-devel-2.37.4-21.el9_7.i686.rpm#plibmount-devel-2.37.4-21.el9_7.i686.rpmsppython3-libmount-2.37.4-21.el9_7.x86_64.rpm.plibuuid-devel-2.37.4-21.el9_7.x86_64.rpmplibblkid-devel-2.37.4-21.el9_7.x86_64.rpm,puuidd-2.37.4-21.el9_7.x86_64.rpm#plibmount-devel-2.37.4-21.el9_7.x86_64.rpm.plibuuid-devel-2.37.4-21.el9_7.i686.rpmplibblkid-devel-2.37.4-21.el9_7.i686.rpm#plibmount-devel-2.37.4-21.el9_7.i686.rpmsppython3-libmount-2.37.4-21.el9_7.x86_64.rpm.plibuuid-devel-2.37.4-21.el9_7.x86_64.rpm̫GM securityImportant: python3.12-wheel security update&rhhttps://access.redhat.com/errata/RHSA-2026:1939RHSA-2026:1939RHSA-2026:1939 https://access.redhat.com/security/cve/CVE-2026-24049CVE-2026-24049CVE-2026-24049https://bugzilla.redhat.com/24319592431959https://errata.almalinux.org/9/ALSA-2026-1939.htmlALSA-2026:1939ALSA-2026:1939 kKpython3.12-wheel-0.41.2-3.el9_7.1.noarch.rpmkKpython3.12-wheel-0.41.2-3.el9_7.1.noarch.rpm̫ N FBBBBBBsecurityImportant: brotli security update&Zhttps://access.redhat.com/errata/RHSA-2026:2042RHSA-2026:2042RHSA-2026:2042 https://access.redhat.com/security/cve/CVE-2025-6176CVE-2025-6176CVE-2025-6176https://bugzilla.redhat.com/24087622408762https://errata.almalinux.org/9/ALSA-2026-2042.htmlALSA-2026:2042ALSA-2026:2042 k.brotli-devel-1.0.9-9.el9_7.i686.rpmp.python3-brotli-1.0.9-9.el9_7.x86_64.rpmk.brotli-devel-1.0.9-9.el9_7.x86_64.rpmj.brotli-1.0.9-9.el9_7.x86_64.rpmj.brotli-1.0.9-9.el9_7.i686.rpmk.brotli-devel-1.0.9-9.el9_7.i686.rpmp.python3-brotli-1.0.9-9.el9_7.x86_64.rpmk.brotli-devel-1.0.9-9.el9_7.x86_64.rpmj.brotli-1.0.9-9.el9_7.x86_64.rpmj.brotli-1.0.9-9.el9_7.i686.rpm̒7O OBBBBBBsecurityImportant: freerdp security update&yhttps://access.redhat.com/errata/RHSA-2026:2048RHSA-2026:2048RHSA-2026:2048 https://access.redhat.com/security/cve/CVE-2026-23530CVE-2026-23530CVE-2026-23530https://access.redhat.com/security/cve/CVE-2026-23531CVE-2026-23531CVE-2026-23531https://access.redhat.com/security/cve/CVE-2026-23532CVE-2026-23532CVE-2026-23532https://access.redhat.com/security/cve/CVE-2026-23533CVE-2026-23533CVE-2026-23533https://access.redhat.com/security/cve/CVE-2026-23534CVE-2026-23534CVE-2026-23534https://access.redhat.com/security/cve/CVE-2026-23883CVE-2026-23883CVE-2026-23883https://access.redhat.com/security/cve/CVE-2026-23884CVE-2026-23884CVE-2026-23884https://bugzilla.redhat.com/24308772430877https://bugzilla.redhat.com/24308802430880https://bugzilla.redhat.com/24308852430885https://bugzilla.redhat.com/24308862430886https://bugzilla.redhat.com/24308872430887https://bugzilla.redhat.com/24308882430888https://bugzilla.redhat.com/24308912430891https://errata.almalinux.org/9/ALSA-2026-2048.htmlALSA-2026:2048ALSA-2026:2048 =Ffreerdp-libs-2.11.7-1.el9_7.1.i686.rpmBFfreerdp-2.11.7-1.el9_7.1.x86_64.rpm@Flibwinpr-2.11.7-1.el9_7.1.i686.rpm=Ffreerdp-libs-2.11.7-1.el9_7.1.x86_64.rpm@Flibwinpr-2.11.7-1.el9_7.1.x86_64.rpm=Ffreerdp-libs-2.11.7-1.el9_7.1.i686.rpmBFfreerdp-2.11.7-1.el9_7.1.x86_64.rpm@Flibwinpr-2.11.7-1.el9_7.1.i686.rpm=Ffreerdp-libs-2.11.7-1.el9_7.1.x86_64.rpm@Flibwinpr-2.11.7-1.el9_7.1.x86_64.rpm̫wP +XBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&u"https://access.redhat.com/errata/RHSA-2026:2212RHSA-2026:2212RHSA-2026:2212 https://access.redhat.com/security/cve/CVE-2025-37789CVE-2025-37789CVE-2025-37789https://access.redhat.com/security/cve/CVE-2025-37819CVE-2025-37819CVE-2025-37819https://access.redhat.com/security/cve/CVE-2025-38022CVE-2025-38022CVE-2025-38022https://access.redhat.com/security/cve/CVE-2025-38024CVE-2025-38024CVE-2025-38024https://access.redhat.com/security/cve/CVE-2025-38403CVE-2025-38403CVE-2025-38403https://access.redhat.com/security/cve/CVE-2025-38415CVE-2025-38415CVE-2025-38415https://access.redhat.com/security/cve/CVE-2025-38459CVE-2025-38459CVE-2025-38459https://access.redhat.com/security/cve/CVE-2025-38730CVE-2025-38730CVE-2025-38730https://access.redhat.com/security/cve/CVE-2025-39760CVE-2025-39760CVE-2025-39760https://access.redhat.com/security/cve/CVE-2025-40135CVE-2025-40135CVE-2025-40135https://access.redhat.com/security/cve/CVE-2025-40141CVE-2025-40141CVE-2025-40141https://access.redhat.com/security/cve/CVE-2025-40158CVE-2025-40158CVE-2025-40158https://access.redhat.com/security/cve/CVE-2025-40170CVE-2025-40170CVE-2025-40170https://access.redhat.com/security/cve/CVE-2025-40269CVE-2025-40269CVE-2025-40269https://access.redhat.com/security/cve/CVE-2025-40271CVE-2025-40271CVE-2025-40271https://access.redhat.com/security/cve/CVE-2025-40318CVE-2025-40318CVE-2025-40318https://bugzilla.redhat.com/23633152363315https://bugzilla.redhat.com/23650322365032https://bugzilla.redhat.com/23733262373326https://bugzilla.redhat.com/23733542373354https://bugzilla.redhat.com/23834042383404https://bugzilla.redhat.com/23834212383421https://bugzilla.redhat.com/23834872383487https://bugzilla.redhat.com/23931912393191https://bugzilla.redhat.com/23946012394601https://bugzilla.redhat.com/24145062414506https://bugzilla.redhat.com/24145212414521https://bugzilla.redhat.com/24145222414522https://bugzilla.redhat.com/24145232414523https://bugzilla.redhat.com/24198372419837https://bugzilla.redhat.com/24199192419919https://bugzilla.redhat.com/24199202419920https://errata.almalinux.org/9/ALSA-2026-2212.htmlALSA-2026:2212ALSA-2026:2212 )jrtla-5.14.0-611.30.1.el9_7.x86_64.rpmMjpython3-perf-5.14.0-611.30.1.el9_7.x86_64.rpm*jrv-5.14.0-611.30.1.el9_7.x86_64.rpm#jkernel-devel-5.14.0-611.30.1.el9_7.x86_64.rpm!jkernel-debug-devel-5.14.0-611.30.1.el9_7.x86_64.rpmjkernel-doc-5.14.0-611.30.1.el9_7.noarch.rpm%jperf-5.14.0-611.30.1.el9_7.x86_64.rpm(jkernel-headers-5.14.0-611.30.1.el9_7.x86_64.rpm$jkernel-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm"jkernel-debug-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm )jrtla-5.14.0-611.30.1.el9_7.x86_64.rpmMjpython3-perf-5.14.0-611.30.1.el9_7.x86_64.rpm*jrv-5.14.0-611.30.1.el9_7.x86_64.rpm#jkernel-devel-5.14.0-611.30.1.el9_7.x86_64.rpm!jkernel-debug-devel-5.14.0-611.30.1.el9_7.x86_64.rpmjkernel-doc-5.14.0-611.30.1.el9_7.noarch.rpm%jperf-5.14.0-611.30.1.el9_7.x86_64.rpm(jkernel-headers-5.14.0-611.30.1.el9_7.x86_64.rpm$jkernel-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm"jkernel-debug-devel-matched-5.14.0-611.30.1.el9_7.x86_64.rpm̶+Q 2lBBBBsecurityImportant: libsoup security update& https://access.redhat.com/errata/RHSA-2026:2216RHSA-2026:2216RHSA-2026:2216 https://access.redhat.com/security/cve/CVE-2026-0719CVE-2026-0719CVE-2026-0719https://access.redhat.com/security/cve/CVE-2026-1761CVE-2026-1761CVE-2026-1761https://bugzilla.redhat.com/24279062427906https://bugzilla.redhat.com/24359612435961https://errata.almalinux.org/9/ALSA-2026-2216.htmlALSA-2026:2216ALSA-2026:2216 >Plibsoup-2.72.0-12.el9_7.5.x86_64.rpm>Plibsoup-2.72.0-12.el9_7.5.i686.rpm?Plibsoup-devel-2.72.0-12.el9_7.5.i686.rpm?Plibsoup-devel-2.72.0-12.el9_7.5.x86_64.rpm>Plibsoup-2.72.0-12.el9_7.5.x86_64.rpm>Plibsoup-2.72.0-12.el9_7.5.i686.rpm?Plibsoup-devel-2.72.0-12.el9_7.5.i686.rpm?Plibsoup-devel-2.72.0-12.el9_7.5.x86_64.rpm̬wR sBBBBBBBBBBBsecurityCritical: keylime security update&;+[https://access.redhat.com/errata/RHSA-2026:2224RHSA-2026:2224RHSA-2026:2224 https://access.redhat.com/security/cve/CVE-2026-1709CVE-2026-1709CVE-2026-1709https://bugzilla.redhat.com/24355142435514https://errata.almalinux.org/9/ALSA-2026-2224.htmlALSA-2026:2224ALSA-2026:2224 }Ekeylime-tenant-7.12.1-11.el9_7.4.x86_64.rpm|Ekeylime-registrar-7.12.1-11.el9_7.4.x86_64.rpm Epython3-keylime-7.12.1-11.el9_7.4.x86_64.rpmEkeylime-selinux-7.12.1-11.el9_7.4.noarch.rpm~Ekeylime-verifier-7.12.1-11.el9_7.4.x86_64.rpmzEkeylime-7.12.1-11.el9_7.4.x86_64.rpm{Ekeylime-base-7.12.1-11.el9_7.4.x86_64.rpm}Ekeylime-tenant-7.12.1-11.el9_7.4.x86_64.rpm|Ekeylime-registrar-7.12.1-11.el9_7.4.x86_64.rpm Epython3-keylime-7.12.1-11.el9_7.4.x86_64.rpmEkeylime-selinux-7.12.1-11.el9_7.4.noarch.rpm~Ekeylime-verifier-7.12.1-11.el9_7.4.x86_64.rpmzEkeylime-7.12.1-11.el9_7.4.x86_64.rpm{Ekeylime-base-7.12.1-11.el9_7.4.x86_64.rpm̲HS ABBBsecurityImportant: gimp security update&9https://access.redhat.com/errata/RHSA-2026:2707RHSA-2026:2707RHSA-2026:2707 https://access.redhat.com/security/cve/CVE-2025-15059CVE-2025-15059CVE-2025-15059https://bugzilla.redhat.com/24322962432296https://errata.almalinux.org/9/ALSA-2026-2707.htmlALSA-2026:2707ALSA-2026:2707 cAgimp-3.0.4-1.el9_7.3.x86_64.rpmAgimp-libs-3.0.4-1.el9_7.3.x86_64.rpmAgimp-libs-3.0.4-1.el9_7.3.i686.rpmcAgimp-3.0.4-1.el9_7.3.x86_64.rpmAgimp-libs-3.0.4-1.el9_7.3.x86_64.rpmAgimp-libs-3.0.4-1.el9_7.3.i686.rpmц&T GBBBBBBBBBBsecurityImportant: golang security update&? https://access.redhat.com/errata/RHSA-2026:2709RHSA-2026:2709RHSA-2026:2709 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61732CVE-2025-61732CVE-2025-61732https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24370162437016https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-2709.htmlALSA-2026:2709ALSA-2026:2709 8 golang-race-1.25.7-1.el9_7.x86_64.rpml golang-docs-1.25.7-1.el9_7.noarch.rpmo golang-tests-1.25.7-1.el9_7.noarch.rpmE go-toolset-1.25.7-1.el9_7.x86_64.rpmn golang-src-1.25.7-1.el9_7.noarch.rpm@ golang-1.25.7-1.el9_7.x86_64.rpmm golang-misc-1.25.7-1.el9_7.noarch.rpmA golang-bin-1.25.7-1.el9_7.x86_64.rpm8 golang-race-1.25.7-1.el9_7.x86_64.rpml golang-docs-1.25.7-1.el9_7.noarch.rpmo golang-tests-1.25.7-1.el9_7.noarch.rpmE go-toolset-1.25.7-1.el9_7.x86_64.rpmn golang-src-1.25.7-1.el9_7.noarch.rpm@ golang-1.25.7-1.el9_7.x86_64.rpmm golang-misc-1.25.7-1.el9_7.noarch.rpmA golang-bin-1.25.7-1.el9_7.x86_64.rpmх-U 'TBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&Fhttps://access.redhat.com/errata/RHSA-2026:2722RHSA-2026:2722RHSA-2026:2722 https://access.redhat.com/security/cve/CVE-2023-53034CVE-2023-53034CVE-2023-53034https://access.redhat.com/security/cve/CVE-2025-40064CVE-2025-40064CVE-2025-40064https://access.redhat.com/security/cve/CVE-2025-40304CVE-2025-40304CVE-2025-40304https://access.redhat.com/security/cve/CVE-2025-40322CVE-2025-40322CVE-2025-40322https://access.redhat.com/security/cve/CVE-2025-68349CVE-2025-68349CVE-2025-68349https://access.redhat.com/security/cve/CVE-2025-68811CVE-2025-68811CVE-2025-68811https://access.redhat.com/security/cve/CVE-2026-22998CVE-2026-22998CVE-2026-22998https://bugzilla.redhat.com/23602392360239https://bugzilla.redhat.com/24067472406747https://bugzilla.redhat.com/24198702419870https://bugzilla.redhat.com/24199022419902https://bugzilla.redhat.com/24248802424880https://bugzilla.redhat.com/24291162429116https://bugzilla.redhat.com/24326712432671https://errata.almalinux.org/9/ALSA-2026-2722.htmlALSA-2026:2722ALSA-2026:2722 %kperf-5.14.0-611.34.1.el9_7.x86_64.rpmMkpython3-perf-5.14.0-611.34.1.el9_7.x86_64.rpm(kkernel-headers-5.14.0-611.34.1.el9_7.x86_64.rpm*krv-5.14.0-611.34.1.el9_7.x86_64.rpm$kkernel-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm"kkernel-debug-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm!kkernel-debug-devel-5.14.0-611.34.1.el9_7.x86_64.rpm#kkernel-devel-5.14.0-611.34.1.el9_7.x86_64.rpmkkernel-doc-5.14.0-611.34.1.el9_7.noarch.rpm)krtla-5.14.0-611.34.1.el9_7.x86_64.rpm %kperf-5.14.0-611.34.1.el9_7.x86_64.rpmMkpython3-perf-5.14.0-611.34.1.el9_7.x86_64.rpm(kkernel-headers-5.14.0-611.34.1.el9_7.x86_64.rpm*krv-5.14.0-611.34.1.el9_7.x86_64.rpm$kkernel-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm"kkernel-debug-devel-matched-5.14.0-611.34.1.el9_7.x86_64.rpm!kkernel-debug-devel-5.14.0-611.34.1.el9_7.x86_64.rpm#kkernel-devel-5.14.0-611.34.1.el9_7.x86_64.rpmkkernel-doc-5.14.0-611.34.1.el9_7.noarch.rpm)krtla-5.14.0-611.34.1.el9_7.x86_64.rpm6V *hsecurityModerate: edk2 security update&]Ghttps://access.redhat.com/errata/RHSA-2026:2776RHSA-2026:2776RHSA-2026:2776 https://access.redhat.com/security/cve/CVE-2025-9230CVE-2025-9230CVE-2025-9230https://bugzilla.redhat.com/23960542396054https://errata.almalinux.org/9/ALSA-2026-2776.htmlALSA-2026:2776ALSA-2026:2776 Hjedk2-ovmf-20241117-4.el9_7.3.noarch.rpmsjedk2-aarch64-20241117-4.el9_7.3.noarch.rpmHjedk2-ovmf-20241117-4.el9_7.3.noarch.rpmsjedk2-aarch64-20241117-4.el9_7.3.noarch.rpm׆;W 7uBDsBBBBBBBBBBsecurityImportant: nodejs:24 security update&$Bhttps://access.redhat.com/errata/RHSA-2026:2781RHSA-2026:2781RHSA-2026:2781 https://access.redhat.com/security/cve/CVE-2025-55130CVE-2025-55130CVE-2025-55130https://access.redhat.com/security/cve/CVE-2025-55131CVE-2025-55131CVE-2025-55131https://access.redhat.com/security/cve/CVE-2025-55132CVE-2025-55132CVE-2025-55132https://access.redhat.com/security/cve/CVE-2025-59465CVE-2025-59465CVE-2025-59465https://access.redhat.com/security/cve/CVE-2025-59466CVE-2025-59466CVE-2025-59466https://access.redhat.com/security/cve/CVE-2026-21637CVE-2026-21637CVE-2026-21637https://bugzilla.redhat.com/24313382431338https://bugzilla.redhat.com/24313402431340https://bugzilla.redhat.com/24313432431343https://bugzilla.redhat.com/24313492431349https://bugzilla.redhat.com/24313502431350https://bugzilla.redhat.com/24313522431352https://errata.almalinux.org/9/ALSA-2026-2781.htmlALSA-2026:2781ALSA-2026:2781 +%' !qnodejs-devel-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpmkknodejs-nodemon-3.0.3-3.module_el9.7.0+209+ecf6523e.noarch.rpmcnpm-11.6.2-1.24.13.0.1.module_el9.7.0+209+ecf6523e.noarch.rpmgnodejs-packaging-bundler-2021.06-6.module_el9.7.0+198+8bf605ba.noarch.rpmdqnodejs-full-i18n-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm+qnodejs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpm]Iv8-13.6-devel-13.6.233.17-1.24.13.0.1.module_el9.7.0+209+ecf6523e.x86_64.rpmhnodejs-packaging-2021.06-6.module_el9.7.0+209+ecf6523e.noarch.rpmqnodejs-libs-24.13.0-1.module_el9.7.0+209+ecf6523e.x86_64.rpmmunge-0.5.13-14.el9_7.x86_64.rpm5munge-libs-0.5.13-14.el9_7.i686.rpm5munge-libs-0.5.13-14.el9_7.x86_64.rpm>munge-0.5.13-14.el9_7.x86_64.rpm5munge-libs-0.5.13-14.el9_7.i686.rpm5munge-libs-0.5.13-14.el9_7.x86_64.rpm̀;_ $bsecurityImportant: grafana-pcp security update&UHhttps://access.redhat.com/errata/RHSA-2026:3040RHSA-2026:3040RHSA-2026:3040 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3040.htmlALSA-2026:3040ALSA-2026:3040 ddgrafana-pcp-5.1.1-12.el9_7.x86_64.rpmddgrafana-pcp-5.1.1-12.el9_7.x86_64.rpm` 8eBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&whttps://access.redhat.com/errata/RHSA-2026:3066RHSA-2026:3066RHSA-2026:3066 https://access.redhat.com/security/cve/CVE-2025-38129CVE-2025-38129CVE-2025-38129https://access.redhat.com/security/cve/CVE-2025-38206CVE-2025-38206CVE-2025-38206https://bugzilla.redhat.com/23760342376034https://bugzilla.redhat.com/23763772376377https://errata.almalinux.org/9/ALSA-2026-3066.htmlALSA-2026:3066ALSA-2026:3066 Mlpython3-perf-5.14.0-611.35.1.el9_7.x86_64.rpm$lkernel-devel-matched-5.14.0-611.35.1.el9_7.x86_64.rpm!lkernel-debug-devel-5.14.0-611.35.1.el9_7.x86_64.rpm)lrtla-5.14.0-611.35.1.el9_7.x86_64.rpm#lkernel-devel-5.14.0-611.35.1.el9_7.x86_64.rpm%lperf-5.14.0-611.35.1.el9_7.x86_64.rpm(lkernel-headers-5.14.0-611.35.1.el9_7.x86_64.rpmlkernel-doc-5.14.0-611.35.1.el9_7.noarch.rpm*lrv-5.14.0-611.35.1.el9_7.x86_64.rpm"lkernel-debug-devel-matched-5.14.0-611.35.1.el9_7.x86_64.rpm Mlpython3-perf-5.14.0-611.35.1.el9_7.x86_64.rpm$lkernel-devel-matched-5.14.0-611.35.1.el9_7.x86_64.rpm!lkernel-debug-devel-5.14.0-611.35.1.el9_7.x86_64.rpm)lrtla-5.14.0-611.35.1.el9_7.x86_64.rpm#lkernel-devel-5.14.0-611.35.1.el9_7.x86_64.rpm%lperf-5.14.0-611.35.1.el9_7.x86_64.rpm(lkernel-headers-5.14.0-611.35.1.el9_7.x86_64.rpmlkernel-doc-5.14.0-611.35.1.el9_7.noarch.rpm*lrv-5.14.0-611.35.1.el9_7.x86_64.rpm"lkernel-debug-devel-matched-5.14.0-611.35.1.el9_7.x86_64.rpm̀#a yBBBBBBsecurityImportant: freerdp security update&^https://access.redhat.com/errata/RHSA-2026:3067RHSA-2026:3067RHSA-2026:3067 https://access.redhat.com/security/cve/CVE-2026-22855CVE-2026-22855CVE-2026-22855https://access.redhat.com/security/cve/CVE-2026-22858CVE-2026-22858CVE-2026-22858https://access.redhat.com/security/cve/CVE-2026-22859CVE-2026-22859CVE-2026-22859https://bugzilla.redhat.com/24296452429645https://bugzilla.redhat.com/24296492429649https://bugzilla.redhat.com/24296532429653https://errata.almalinux.org/9/ALSA-2026-3067.htmlALSA-2026:3067ALSA-2026:3067 @Glibwinpr-2.11.7-1.el9_7.2.x86_64.rpmBGfreerdp-2.11.7-1.el9_7.2.x86_64.rpm@Glibwinpr-2.11.7-1.el9_7.2.i686.rpm=Gfreerdp-libs-2.11.7-1.el9_7.2.i686.rpm=Gfreerdp-libs-2.11.7-1.el9_7.2.x86_64.rpm@Glibwinpr-2.11.7-1.el9_7.2.x86_64.rpmBGfreerdp-2.11.7-1.el9_7.2.x86_64.rpm@Glibwinpr-2.11.7-1.el9_7.2.i686.rpm=Gfreerdp-libs-2.11.7-1.el9_7.2.i686.rpm=Gfreerdp-libs-2.11.7-1.el9_7.2.x86_64.rpm̀b BBBBBBsecurityImportant: protobuf security update&r9https://access.redhat.com/errata/RHSA-2026:3095RHSA-2026:3095RHSA-2026:3095 https://access.redhat.com/security/cve/CVE-2026-0994CVE-2026-0994CVE-2026-0994https://bugzilla.redhat.com/24323982432398https://errata.almalinux.org/9/ALSA-2026-3095.htmlALSA-2026:3095ALSA-2026:3095 -'protobuf-3.14.0-17.el9_7.x86_64.rpm*'python3-protobuf-3.14.0-17.el9_7.noarch.rpm.'protobuf-lite-3.14.0-17.el9_7.x86_64.rpm-'protobuf-3.14.0-17.el9_7.i686.rpm.'protobuf-lite-3.14.0-17.el9_7.i686.rpm-'protobuf-3.14.0-17.el9_7.x86_64.rpm*'python3-protobuf-3.14.0-17.el9_7.noarch.rpm.'protobuf-lite-3.14.0-17.el9_7.x86_64.rpm-'protobuf-3.14.0-17.el9_7.i686.rpm.'protobuf-lite-3.14.0-17.el9_7.i686.rpm.c JBBBBBsecurityModerate: 389-ds-base security update&+https://access.redhat.com/errata/RHSA-2026:3189RHSA-2026:3189RHSA-2026:3189 https://access.redhat.com/security/cve/CVE-2025-14905CVE-2025-14905CVE-2025-14905https://bugzilla.redhat.com/24236242423624https://errata.almalinux.org/9/ALSA-2026-3189.htmlALSA-2026:3189ALSA-2026:3189 r389-ds-base-2.7.0-10.el9_7.x86_64.rpms389-ds-base-libs-2.7.0-10.el9_7.x86_64.rpm389-ds-base-snmp-2.7.0-10.el9_7.x86_64.rpm python3-lib389-2.7.0-10.el9_7.noarch.rpmr389-ds-base-2.7.0-10.el9_7.x86_64.rpms389-ds-base-libs-2.7.0-10.el9_7.x86_64.rpm389-ds-base-snmp-2.7.0-10.el9_7.x86_64.rpm python3-lib389-2.7.0-10.el9_7.noarch.rpm̀d RsecurityImportant: runc security update&Dyhttps://access.redhat.com/errata/RHSA-2026:3291RHSA-2026:3291RHSA-2026:3291 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3291.htmlALSA-2026:3291ALSA-2026:3291 Warunc-1.4.0-2.el9_7.x86_64.rpmWarunc-1.4.0-2.el9_7.x86_64.rpm̀,e UBBsecurityImportant: buildah security update&=Shttps://access.redhat.com/errata/RHSA-2026:3298RHSA-2026:3298RHSA-2026:3298 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3298.htmlALSA-2026:3298ALSA-2026:3298 <buildah-1.41.8-2.el9_7.x86_64.rpm=buildah-tests-1.41.8-2.el9_7.x86_64.rpm<buildah-1.41.8-2.el9_7.x86_64.rpm=buildah-tests-1.41.8-2.el9_7.x86_64.rpm̀f #ZBBBBBBBsecurityImportant: podman security update&, https://access.redhat.com/errata/RHSA-2026:3337RHSA-2026:3337RHSA-2026:3337 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3337.htmlALSA-2026:3337ALSA-2026:3337 - podman-5.6.0-14.el9_7.x86_64.rpm. podman-plugins-5.6.0-14.el9_7.x86_64.rpm0 podman-tests-5.6.0-14.el9_7.x86_64.rpmf podman-docker-5.6.0-14.el9_7.noarch.rpm/ podman-remote-5.6.0-14.el9_7.x86_64.rpm- podman-5.6.0-14.el9_7.x86_64.rpm. podman-plugins-5.6.0-14.el9_7.x86_64.rpm0 podman-tests-5.6.0-14.el9_7.x86_64.rpmf podman-docker-5.6.0-14.el9_7.noarch.rpm/ podman-remote-5.6.0-14.el9_7.x86_64.rpm̀1g (dBBsecurityImportant: firefox security update&<2Nhttps://access.redhat.com/errata/RHSA-2026:3339RHSA-2026:3339RHSA-2026:3339 https://access.redhat.com/security/cve/CVE-2026-2447CVE-2026-2447CVE-2026-2447https://access.redhat.com/security/cve/CVE-2026-2757CVE-2026-2757CVE-2026-2757https://access.redhat.com/security/cve/CVE-2026-2758CVE-2026-2758CVE-2026-2758https://access.redhat.com/security/cve/CVE-2026-2759CVE-2026-2759CVE-2026-2759https://access.redhat.com/security/cve/CVE-2026-2760CVE-2026-2760CVE-2026-2760https://access.redhat.com/security/cve/CVE-2026-2761CVE-2026-2761CVE-2026-2761https://access.redhat.com/security/cve/CVE-2026-2762CVE-2026-2762CVE-2026-2762https://access.redhat.com/security/cve/CVE-2026-2763CVE-2026-2763CVE-2026-2763https://access.redhat.com/security/cve/CVE-2026-2764CVE-2026-2764CVE-2026-2764https://access.redhat.com/security/cve/CVE-2026-2765CVE-2026-2765CVE-2026-2765https://access.redhat.com/security/cve/CVE-2026-2766CVE-2026-2766CVE-2026-2766https://access.redhat.com/security/cve/CVE-2026-2767CVE-2026-2767CVE-2026-2767https://access.redhat.com/security/cve/CVE-2026-2768CVE-2026-2768CVE-2026-2768https://access.redhat.com/security/cve/CVE-2026-2769CVE-2026-2769CVE-2026-2769https://access.redhat.com/security/cve/CVE-2026-2770CVE-2026-2770CVE-2026-2770https://access.redhat.com/security/cve/CVE-2026-2771CVE-2026-2771CVE-2026-2771https://access.redhat.com/security/cve/CVE-2026-2772CVE-2026-2772CVE-2026-2772https://access.redhat.com/security/cve/CVE-2026-2773CVE-2026-2773CVE-2026-2773https://access.redhat.com/security/cve/CVE-2026-2774CVE-2026-2774CVE-2026-2774https://access.redhat.com/security/cve/CVE-2026-2775CVE-2026-2775CVE-2026-2775https://access.redhat.com/security/cve/CVE-2026-2776CVE-2026-2776CVE-2026-2776https://access.redhat.com/security/cve/CVE-2026-2777CVE-2026-2777CVE-2026-2777https://access.redhat.com/security/cve/CVE-2026-2778CVE-2026-2778CVE-2026-2778https://access.redhat.com/security/cve/CVE-2026-2779CVE-2026-2779CVE-2026-2779https://access.redhat.com/security/cve/CVE-2026-2780CVE-2026-2780CVE-2026-2780https://access.redhat.com/security/cve/CVE-2026-2781CVE-2026-2781CVE-2026-2781https://access.redhat.com/security/cve/CVE-2026-2782CVE-2026-2782CVE-2026-2782https://access.redhat.com/security/cve/CVE-2026-2783CVE-2026-2783CVE-2026-2783https://access.redhat.com/security/cve/CVE-2026-2784CVE-2026-2784CVE-2026-2784https://access.redhat.com/security/cve/CVE-2026-2785CVE-2026-2785CVE-2026-2785https://access.redhat.com/security/cve/CVE-2026-2786CVE-2026-2786CVE-2026-2786https://access.redhat.com/security/cve/CVE-2026-2787CVE-2026-2787CVE-2026-2787https://access.redhat.com/security/cve/CVE-2026-2788CVE-2026-2788CVE-2026-2788https://access.redhat.com/security/cve/CVE-2026-2789CVE-2026-2789CVE-2026-2789https://access.redhat.com/security/cve/CVE-2026-2790CVE-2026-2790CVE-2026-2790https://access.redhat.com/security/cve/CVE-2026-2791CVE-2026-2791CVE-2026-2791https://access.redhat.com/security/cve/CVE-2026-2792CVE-2026-2792CVE-2026-2792https://access.redhat.com/security/cve/CVE-2026-2793CVE-2026-2793CVE-2026-2793https://bugzilla.redhat.com/24402192440219https://bugzilla.redhat.com/24422842442284https://bugzilla.redhat.com/24422872442287https://bugzilla.redhat.com/24422882442288https://bugzilla.redhat.com/24422902442290https://bugzilla.redhat.com/24422912442291https://bugzilla.redhat.com/24422922442292https://bugzilla.redhat.com/24422942442294https://bugzilla.redhat.com/24422952442295https://bugzilla.redhat.com/24422972442297https://bugzilla.redhat.com/24422982442298https://bugzilla.redhat.com/24423002442300https://bugzilla.redhat.com/24423022442302https://bugzilla.redhat.com/24423042442304https://bugzilla.redhat.com/24423072442307https://bugzilla.redhat.com/24423082442308https://bugzilla.redhat.com/24423092442309https://bugzilla.redhat.com/24423122442312https://bugzilla.redhat.com/24423132442313https://bugzilla.redhat.com/24423142442314https://bugzilla.redhat.com/24423162442316https://bugzilla.redhat.com/24423182442318https://bugzilla.redhat.com/24423192442319https://bugzilla.redhat.com/24423202442320https://bugzilla.redhat.com/24423222442322https://bugzilla.redhat.com/24423242442324https://bugzilla.redhat.com/24423252442325https://bugzilla.redhat.com/24423262442326https://bugzilla.redhat.com/24423272442327https://bugzilla.redhat.com/24423282442328https://bugzilla.redhat.com/24423292442329https://bugzilla.redhat.com/24423312442331https://bugzilla.redhat.com/24423332442333https://bugzilla.redhat.com/24423342442334https://bugzilla.redhat.com/24423352442335https://bugzilla.redhat.com/24423372442337https://bugzilla.redhat.com/24423422442342https://bugzilla.redhat.com/24423432442343https://errata.almalinux.org/9/ALSA-2026-3339.htmlALSA-2026:3339ALSA-2026:3339 Oafirefox-x11-140.8.0-2.el9_7.alma.1.x86_64.rpm7afirefox-140.8.0-2.el9_7.alma.1.x86_64.rpmOafirefox-x11-140.8.0-2.el9_7.alma.1.x86_64.rpm7afirefox-140.8.0-2.el9_7.alma.1.x86_64.rpm̀@h -iBBsecurityImportant: skopeo security update&nhttps://access.redhat.com/errata/RHSA-2026:3340RHSA-2026:3340RHSA-2026:3340 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3340.htmlALSA-2026:3340ALSA-2026:3340 ; skopeo-1.20.0-3.el9_7.x86_64.rpm< skopeo-tests-1.20.0-3.el9_7.x86_64.rpm; skopeo-1.20.0-3.el9_7.x86_64.rpm< skopeo-tests-1.20.0-3.el9_7.x86_64.rpm͖Ii 0nsecurityImportant: containernetworking-plugins security update&Ohttps://access.redhat.com/errata/RHSA-2026:3341RHSA-2026:3341RHSA-2026:3341 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3341.htmlALSA-2026:3341ALSA-2026:3341 J]containernetworking-plugins-1.7.1-3.el9_7.x86_64.rpmJ]containernetworking-plugins-1.7.1-3.el9_7.x86_64.rpm͖Ij 3qsecurityImportant: python-pyasn1 security update&S]https://access.redhat.com/errata/RHSA-2026:3359RHSA-2026:3359RHSA-2026:3359 https://access.redhat.com/security/cve/CVE-2026-23490CVE-2026-23490CVE-2026-23490https://bugzilla.redhat.com/24304722430472https://errata.almalinux.org/9/ALSA-2026-3359.htmlALSA-2026:3359ALSA-2026:3359 dQpython3-pyasn1-modules-0.4.8-7.el9_7.noarch.rpmcQpython3-pyasn1-0.4.8-7.el9_7.noarch.rpmdQpython3-pyasn1-modules-0.4.8-7.el9_7.noarch.rpmcQpython3-pyasn1-0.4.8-7.el9_7.noarch.rpm̀Hk 7tBsecurityImportant: libpng security update&06https://access.redhat.com/errata/RHSA-2026:3405RHSA-2026:3405RHSA-2026:3405 https://access.redhat.com/security/cve/CVE-2026-22695CVE-2026-22695CVE-2026-22695https://access.redhat.com/security/cve/CVE-2026-22801CVE-2026-22801CVE-2026-22801https://access.redhat.com/security/cve/CVE-2026-25646CVE-2026-25646CVE-2026-25646https://bugzilla.redhat.com/24288242428824https://bugzilla.redhat.com/24288252428825https://bugzilla.redhat.com/24385422438542https://errata.almalinux.org/9/ALSA-2026-3405.htmlALSA-2026:3405ALSA-2026:3405 |;libpng-devel-1.6.37-12.el9_7.2.x86_64.rpm|;libpng-devel-1.6.37-12.el9_7.2.i686.rpm|;libpng-devel-1.6.37-12.el9_7.2.x86_64.rpm|;libpng-devel-1.6.37-12.el9_7.2.i686.rpm͖l xBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&fZhttps://access.redhat.com/errata/RHSA-2026:3488RHSA-2026:3488RHSA-2026:3488 https://access.redhat.com/security/cve/CVE-2025-40168CVE-2025-40168CVE-2025-40168https://access.redhat.com/security/cve/CVE-2025-71085CVE-2025-71085CVE-2025-71085https://access.redhat.com/security/cve/CVE-2026-23097CVE-2026-23097CVE-2026-23097https://bugzilla.redhat.com/24144822414482https://bugzilla.redhat.com/24290262429026https://bugzilla.redhat.com/24368022436802https://errata.almalinux.org/9/ALSA-2026-3488.htmlALSA-2026:3488ALSA-2026:3488 *mrv-5.14.0-611.36.1.el9_7.x86_64.rpm#mkernel-devel-5.14.0-611.36.1.el9_7.x86_64.rpm!mkernel-debug-devel-5.14.0-611.36.1.el9_7.x86_64.rpm%mperf-5.14.0-611.36.1.el9_7.x86_64.rpm"mkernel-debug-devel-matched-5.14.0-611.36.1.el9_7.x86_64.rpm(mkernel-headers-5.14.0-611.36.1.el9_7.x86_64.rpmMmpython3-perf-5.14.0-611.36.1.el9_7.x86_64.rpm$mkernel-devel-matched-5.14.0-611.36.1.el9_7.x86_64.rpmmkernel-doc-5.14.0-611.36.1.el9_7.noarch.rpm)mrtla-5.14.0-611.36.1.el9_7.x86_64.rpm *mrv-5.14.0-611.36.1.el9_7.x86_64.rpm#mkernel-devel-5.14.0-611.36.1.el9_7.x86_64.rpm!mkernel-debug-devel-5.14.0-611.36.1.el9_7.x86_64.rpm%mperf-5.14.0-611.36.1.el9_7.x86_64.rpm"mkernel-debug-devel-matched-5.14.0-611.36.1.el9_7.x86_64.rpm(mkernel-headers-5.14.0-611.36.1.el9_7.x86_64.rpmMmpython3-perf-5.14.0-611.36.1.el9_7.x86_64.rpm$mkernel-devel-matched-5.14.0-611.36.1.el9_7.x86_64.rpmmkernel-doc-5.14.0-611.36.1.el9_7.noarch.rpm)mrtla-5.14.0-611.36.1.el9_7.x86_64.rpm͠Vm LBBsecurityImportant: valkey security update&@https://access.redhat.com/errata/RHSA-2026:3507RHSA-2026:3507RHSA-2026:3507 https://access.redhat.com/security/cve/CVE-2025-67733CVE-2025-67733CVE-2025-67733https://access.redhat.com/security/cve/CVE-2026-21863CVE-2026-21863CVE-2026-21863https://bugzilla.redhat.com/24420252442025https://bugzilla.redhat.com/24420262442026https://errata.almalinux.org/9/ALSA-2026-3507.htmlALSA-2026:3507ALSA-2026:3507 ^5valkey-8.0.7-1.el9_7.x86_64.rpm_5valkey-devel-8.0.7-1.el9_7.x86_64.rpm^5valkey-8.0.7-1.el9_7.x86_64.rpm_5valkey-devel-8.0.7-1.el9_7.x86_64.rpm͠Un QsecurityImportant: thunderbird security update&ZNhttps://access.redhat.com/errata/RHSA-2026:3516RHSA-2026:3516RHSA-2026:3516 https://access.redhat.com/security/cve/CVE-2026-2447CVE-2026-2447CVE-2026-2447https://access.redhat.com/security/cve/CVE-2026-2757CVE-2026-2757CVE-2026-2757https://access.redhat.com/security/cve/CVE-2026-2758CVE-2026-2758CVE-2026-2758https://access.redhat.com/security/cve/CVE-2026-2759CVE-2026-2759CVE-2026-2759https://access.redhat.com/security/cve/CVE-2026-2760CVE-2026-2760CVE-2026-2760https://access.redhat.com/security/cve/CVE-2026-2761CVE-2026-2761CVE-2026-2761https://access.redhat.com/security/cve/CVE-2026-2762CVE-2026-2762CVE-2026-2762https://access.redhat.com/security/cve/CVE-2026-2763CVE-2026-2763CVE-2026-2763https://access.redhat.com/security/cve/CVE-2026-2764CVE-2026-2764CVE-2026-2764https://access.redhat.com/security/cve/CVE-2026-2765CVE-2026-2765CVE-2026-2765https://access.redhat.com/security/cve/CVE-2026-2766CVE-2026-2766CVE-2026-2766https://access.redhat.com/security/cve/CVE-2026-2767CVE-2026-2767CVE-2026-2767https://access.redhat.com/security/cve/CVE-2026-2768CVE-2026-2768CVE-2026-2768https://access.redhat.com/security/cve/CVE-2026-2769CVE-2026-2769CVE-2026-2769https://access.redhat.com/security/cve/CVE-2026-2770CVE-2026-2770CVE-2026-2770https://access.redhat.com/security/cve/CVE-2026-2771CVE-2026-2771CVE-2026-2771https://access.redhat.com/security/cve/CVE-2026-2772CVE-2026-2772CVE-2026-2772https://access.redhat.com/security/cve/CVE-2026-2773CVE-2026-2773CVE-2026-2773https://access.redhat.com/security/cve/CVE-2026-2774CVE-2026-2774CVE-2026-2774https://access.redhat.com/security/cve/CVE-2026-2775CVE-2026-2775CVE-2026-2775https://access.redhat.com/security/cve/CVE-2026-2776CVE-2026-2776CVE-2026-2776https://access.redhat.com/security/cve/CVE-2026-2777CVE-2026-2777CVE-2026-2777https://access.redhat.com/security/cve/CVE-2026-2778CVE-2026-2778CVE-2026-2778https://access.redhat.com/security/cve/CVE-2026-2779CVE-2026-2779CVE-2026-2779https://access.redhat.com/security/cve/CVE-2026-2780CVE-2026-2780CVE-2026-2780https://access.redhat.com/security/cve/CVE-2026-2781CVE-2026-2781CVE-2026-2781https://access.redhat.com/security/cve/CVE-2026-2782CVE-2026-2782CVE-2026-2782https://access.redhat.com/security/cve/CVE-2026-2783CVE-2026-2783CVE-2026-2783https://access.redhat.com/security/cve/CVE-2026-2784CVE-2026-2784CVE-2026-2784https://access.redhat.com/security/cve/CVE-2026-2785CVE-2026-2785CVE-2026-2785https://access.redhat.com/security/cve/CVE-2026-2786CVE-2026-2786CVE-2026-2786https://access.redhat.com/security/cve/CVE-2026-2787CVE-2026-2787CVE-2026-2787https://access.redhat.com/security/cve/CVE-2026-2788CVE-2026-2788CVE-2026-2788https://access.redhat.com/security/cve/CVE-2026-2789CVE-2026-2789CVE-2026-2789https://access.redhat.com/security/cve/CVE-2026-2790CVE-2026-2790CVE-2026-2790https://access.redhat.com/security/cve/CVE-2026-2791CVE-2026-2791CVE-2026-2791https://access.redhat.com/security/cve/CVE-2026-2792CVE-2026-2792CVE-2026-2792https://access.redhat.com/security/cve/CVE-2026-2793CVE-2026-2793CVE-2026-2793https://bugzilla.redhat.com/24402192440219https://bugzilla.redhat.com/24422842442284https://bugzilla.redhat.com/24422872442287https://bugzilla.redhat.com/24422882442288https://bugzilla.redhat.com/24422902442290https://bugzilla.redhat.com/24422912442291https://bugzilla.redhat.com/24422922442292https://bugzilla.redhat.com/24422942442294https://bugzilla.redhat.com/24422952442295https://bugzilla.redhat.com/24422972442297https://bugzilla.redhat.com/24422982442298https://bugzilla.redhat.com/24423002442300https://bugzilla.redhat.com/24423022442302https://bugzilla.redhat.com/24423042442304https://bugzilla.redhat.com/24423072442307https://bugzilla.redhat.com/24423082442308https://bugzilla.redhat.com/24423092442309https://bugzilla.redhat.com/24423122442312https://bugzilla.redhat.com/24423132442313https://bugzilla.redhat.com/24423142442314https://bugzilla.redhat.com/24423162442316https://bugzilla.redhat.com/24423182442318https://bugzilla.redhat.com/24423192442319https://bugzilla.redhat.com/24423202442320https://bugzilla.redhat.com/24423222442322https://bugzilla.redhat.com/24423242442324https://bugzilla.redhat.com/24423252442325https://bugzilla.redhat.com/24423262442326https://bugzilla.redhat.com/24423272442327https://bugzilla.redhat.com/24423282442328https://bugzilla.redhat.com/24423292442329https://bugzilla.redhat.com/24423312442331https://bugzilla.redhat.com/24423332442333https://bugzilla.redhat.com/24423342442334https://bugzilla.redhat.com/24423352442335https://bugzilla.redhat.com/24423372442337https://bugzilla.redhat.com/24423422442342https://bugzilla.redhat.com/24423432442343https://errata.almalinux.org/9/ALSA-2026-3516.htmlALSA-2026:3516ALSA-2026:3516 9Pthunderbird-140.8.0-1.el9_7.alma.1.x86_64.rpm9Pthunderbird-140.8.0-1.el9_7.alma.1.x86_64.rpm͠4o &TBBBBBBBBBBBBBBBBsecurityModerate: nginx:1.24 security update&[Lhttps://access.redhat.com/errata/RHSA-2026:3638RHSA-2026:3638RHSA-2026:3638 https://access.redhat.com/security/cve/CVE-2026-1642CVE-2026-1642CVE-2026-1642https://bugzilla.redhat.com/24367382436738https://errata.almalinux.org/9/ALSA-2026-3638.htmlALSA-2026:3638ALSA-2026:3638 Y' Qznginx-mod-http-xslt-filter-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmPznginx-mod-http-perl-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmRznginx-mod-mail-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmhznginx-mod-devel-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmznginx-filesystem-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.noarch.rpmznginx-all-modules-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.noarch.rpmSznginx-mod-stream-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmNznginx-core-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmOznginx-mod-http-image-filter-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmznginx-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmY' Qznginx-mod-http-xslt-filter-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmPznginx-mod-http-perl-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmRznginx-mod-mail-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmhznginx-mod-devel-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmznginx-filesystem-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.noarch.rpmznginx-all-modules-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.noarch.rpmSznginx-mod-stream-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmNznginx-core-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmOznginx-mod-http-image-filter-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpmznginx-1.24.0-5.module_el9.7.0+212+9d3c155a.1.alma.1.x86_64.rpm͠p -gBBBBsecurityImportant: go-rpm-macros security update&'https://access.redhat.com/errata/RHSA-2026:3668RHSA-2026:3668RHSA-2026:3668 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://bugzilla.redhat.com/24344322434432https://errata.almalinux.org/9/ALSA-2026-3668.htmlALSA-2026:3668ALSA-2026:3668 I[go-filesystem-3.6.0-13.el9_7.x86_64.rpm'[go-srpm-macros-3.6.0-13.el9_7.noarch.rpmJ[go-rpm-macros-3.6.0-13.el9_7.x86_64.rpm&[go-rpm-templates-3.6.0-13.el9_7.noarch.rpmI[go-filesystem-3.6.0-13.el9_7.x86_64.rpm'[go-srpm-macros-3.6.0-13.el9_7.noarch.rpmJ[go-rpm-macros-3.6.0-13.el9_7.x86_64.rpm&[go-rpm-templates-3.6.0-13.el9_7.noarch.rpm͠q >nBBBBBBBBBBBBBBsecurityImportant: postgresql security update&9https://access.redhat.com/errata/RHSA-2026:3730RHSA-2026:3730RHSA-2026:3730 https://access.redhat.com/security/cve/CVE-2026-2004CVE-2026-2004CVE-2026-2004https://access.redhat.com/security/cve/CVE-2026-2005CVE-2026-2005CVE-2026-2005https://access.redhat.com/security/cve/CVE-2026-2006CVE-2026-2006CVE-2026-2006https://bugzilla.redhat.com/24393242439324https://bugzilla.redhat.com/24393252439325https://bugzilla.redhat.com/24393262439326https://errata.almalinux.org/9/ALSA-2026-3730.htmlALSA-2026:3730ALSA-2026:3730 postgresql-pltcl-13.23-2.el9_7.x86_64.rpmpostgresql-server-13.23-2.el9_7.x86_64.rpmpostgresql-plpython3-13.23-2.el9_7.x86_64.rpmpostgresql-plperl-13.23-2.el9_7.x86_64.rpmYpostgresql-13.23-2.el9_7.x86_64.rpmpostgresql-private-libs-13.23-2.el9_7.x86_64.rpmpostgresql-contrib-13.23-2.el9_7.x86_64.rpmpostgresql-upgrade-13.23-2.el9_7.x86_64.rpmpostgresql-pltcl-13.23-2.el9_7.x86_64.rpmpostgresql-server-13.23-2.el9_7.x86_64.rpmpostgresql-plpython3-13.23-2.el9_7.x86_64.rpmpostgresql-plperl-13.23-2.el9_7.x86_64.rpmYpostgresql-13.23-2.el9_7.x86_64.rpmpostgresql-private-libs-13.23-2.el9_7.x86_64.rpmpostgresql-contrib-13.23-2.el9_7.x86_64.rpmpostgresql-upgrade-13.23-2.el9_7.x86_64.rpmcr BBBBsecurityImportant: osbuild-composer security update&>{ https://access.redhat.com/errata/RHSA-2026:3753RHSA-2026:3753RHSA-2026:3753 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61728CVE-2025-61728CVE-2025-61728https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344312434431https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3753.htmlALSA-2026:3753ALSA-2026:3753 VUosbuild-composer-worker-149-4.el9_7.alma.3.x86_64.rpmTUosbuild-composer-149-4.el9_7.alma.3.x86_64.rpmUUosbuild-composer-core-149-4.el9_7.alma.3.x86_64.rpmVUosbuild-composer-worker-149-4.el9_7.alma.3.x86_64.rpmTUosbuild-composer-149-4.el9_7.alma.3.x86_64.rpmUUosbuild-composer-core-149-4.el9_7.alma.3.x86_64.rpm<s FsecurityModerate: delve security update&9ohttps://access.redhat.com/errata/RHSA-2026:3842RHSA-2026:3842RHSA-2026:3842 https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3842.htmlALSA-2026:3842ALSA-2026:3842 >delve-1.25.2-2.el9_7.x86_64.rpm>delve-1.25.2-2.el9_7.x86_64.rpmϱ-t &[BBBWBUBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:15 security update&(https://access.redhat.com/errata/RHSA-2026:3896RHSA-2026:3896RHSA-2026:3896 https://access.redhat.com/security/cve/CVE-2026-2004CVE-2026-2004CVE-2026-2004https://access.redhat.com/security/cve/CVE-2026-2005CVE-2026-2005CVE-2026-2005https://access.redhat.com/security/cve/CVE-2026-2006CVE-2026-2006CVE-2026-2006https://bugzilla.redhat.com/24393242439324https://bugzilla.redhat.com/24393252439325https://bugzilla.redhat.com/24393262439326https://errata.almalinux.org/9/ALSA-2026-3896.htmlALSA-2026:3896ALSA-2026:3896 Y.'1<pg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpmtpostgresql-pltcl-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm2=pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmtpostgresql-private-libs-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm4tpostgresql-docs-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmtpostgresql-plpython3-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmtpostgresql-upgrade-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm5tpostgresql-private-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm6tpostgresql-server-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm4tpostgresql-test-rpm-macros-15.17-1.module_el9.7.0+214+91f631df.noarch.rpmtpostgresql-contrib-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmtpostgresql-server-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm7tpostgresql-static-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmYtpostgresql-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm8tpostgresql-test-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmtpostgresql-plperl-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm9tpostgresql-upgrade-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmY.'1<pg_repack-1.4.8-2.module_el9.5.0+119+18833d03.x86_64.rpmtpostgresql-pltcl-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm2=pgaudit-1.7.0-1.module_el9.3.0+52+21733919.x86_64.rpmtpostgresql-private-libs-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm4tpostgresql-docs-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm3?postgres-decoderbufs-1.9.7-1.Final.module_el9.3.0+52+21733919.x86_64.rpmtpostgresql-plpython3-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmtpostgresql-upgrade-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm5tpostgresql-private-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm6tpostgresql-server-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm4tpostgresql-test-rpm-macros-15.17-1.module_el9.7.0+214+91f631df.noarch.rpmtpostgresql-contrib-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmtpostgresql-server-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm7tpostgresql-static-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmYtpostgresql-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm8tpostgresql-test-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmtpostgresql-plperl-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpm9tpostgresql-upgrade-devel-15.17-1.module_el9.7.0+214+91f631df.x86_64.rpmeu )gsecurityImportant: git-lfs security update&-8https://access.redhat.com/errata/RHSA-2026:3928RHSA-2026:3928RHSA-2026:3928 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-61729CVE-2025-61729CVE-2025-61729https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24184622418462https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-3928.htmlALSA-2026:3928ALSA-2026:3928  >git-lfs-3.6.1-7.el9_7.x86_64.rpm >git-lfs-3.6.1-7.el9_7.x86_64.rpmͫ%v .jBBsecurityModerate: nfs-utils security update&e@https://access.redhat.com/errata/RHSA-2026:3940RHSA-2026:3940RHSA-2026:3940 https://access.redhat.com/security/cve/CVE-2025-12801CVE-2025-12801CVE-2025-12801https://bugzilla.redhat.com/24130812413081https://errata.almalinux.org/9/ALSA-2026-3940.htmlALSA-2026:3940ALSA-2026:3940 ?snfs-utils-coreos-2.5.4-38.el9_7.3.x86_64.rpm@snfsv4-client-utils-2.5.4-38.el9_7.3.x86_64.rpm?snfs-utils-coreos-2.5.4-38.el9_7.3.x86_64.rpm@snfsv4-client-utils-2.5.4-38.el9_7.3.x86_64.rpmϲ w oBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&%https://access.redhat.com/errata/RHSA-2026:3966RHSA-2026:3966RHSA-2026:3966 https://access.redhat.com/security/cve/CVE-2025-38106CVE-2025-38106CVE-2025-38106https://access.redhat.com/security/cve/CVE-2026-23001CVE-2026-23001CVE-2026-23001https://bugzilla.redhat.com/23760772376077https://bugzilla.redhat.com/24326642432664https://errata.almalinux.org/9/ALSA-2026-3966.htmlALSA-2026:3966ALSA-2026:3966 (nkernel-headers-5.14.0-611.38.1.el9_7.x86_64.rpm!nkernel-debug-devel-5.14.0-611.38.1.el9_7.x86_64.rpm#nkernel-devel-5.14.0-611.38.1.el9_7.x86_64.rpm$nkernel-devel-matched-5.14.0-611.38.1.el9_7.x86_64.rpm*nrv-5.14.0-611.38.1.el9_7.x86_64.rpm)nrtla-5.14.0-611.38.1.el9_7.x86_64.rpm%nperf-5.14.0-611.38.1.el9_7.x86_64.rpmMnpython3-perf-5.14.0-611.38.1.el9_7.x86_64.rpm"nkernel-debug-devel-matched-5.14.0-611.38.1.el9_7.x86_64.rpmnkernel-doc-5.14.0-611.38.1.el9_7.noarch.rpm (nkernel-headers-5.14.0-611.38.1.el9_7.x86_64.rpm!nkernel-debug-devel-5.14.0-611.38.1.el9_7.x86_64.rpm#nkernel-devel-5.14.0-611.38.1.el9_7.x86_64.rpm$nkernel-devel-matched-5.14.0-611.38.1.el9_7.x86_64.rpm*nrv-5.14.0-611.38.1.el9_7.x86_64.rpm)nrtla-5.14.0-611.38.1.el9_7.x86_64.rpm%nperf-5.14.0-611.38.1.el9_7.x86_64.rpmMnpython3-perf-5.14.0-611.38.1.el9_7.x86_64.rpm"nkernel-debug-devel-matched-5.14.0-611.38.1.el9_7.x86_64.rpmnkernel-doc-5.14.0-611.38.1.el9_7.noarch.rpmx _BBBOBBBBBBBBBBBBJBBBBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: postgresql:16 security update&6 https://access.redhat.com/errata/RHSA-2026:4110RHSA-2026:4110RHSA-2026:4110 https://access.redhat.com/security/cve/CVE-2026-2003CVE-2026-2003CVE-2026-2003https://access.redhat.com/security/cve/CVE-2026-2004CVE-2026-2004CVE-2026-2004https://access.redhat.com/security/cve/CVE-2026-2005CVE-2026-2005CVE-2026-2005https://access.redhat.com/security/cve/CVE-2026-2006CVE-2026-2006CVE-2026-2006https://bugzilla.redhat.com/24393242439324https://bugzilla.redhat.com/24393252439325https://bugzilla.redhat.com/24393262439326https://errata.almalinux.org/9/ALSA-2026-4110.htmlALSA-2026:4110ALSA-2026:4110 YA'FKpostgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm{postgresql-server-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpmHKpostgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm5pgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm4{postgresql-test-rpm-macros-16.13-1.module_el9.7.0+213+65e1da69.noarch.rpm3Epostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm{postgresql-contrib-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm2Bpgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm8{postgresql-test-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpmEKpostgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmGKpostgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm{postgresql-upgrade-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm6{postgresql-server-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm{postgresql-pltcl-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm{postgresql-plpython3-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm9{postgresql-upgrade-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm5{postgresql-private-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm1=pg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpmY{postgresql-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm4{postgresql-docs-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm7{postgresql-static-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpmDKpostgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm{postgresql-plperl-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm{postgresql-private-libs-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpmYA'FKpostgis-docs-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm{postgresql-server-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpmHKpostgis-utils-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm5pgvector-0.6.2-2.module_el9.6.0+167+4e561146.x86_64.rpm4{postgresql-test-rpm-macros-16.13-1.module_el9.7.0+213+65e1da69.noarch.rpm3Epostgres-decoderbufs-2.4.0-1.Final.module_el9.4.0+66+eb9878bc.x86_64.rpm{postgresql-contrib-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm2Bpgaudit-16.0-1.module_el9.4.0+66+eb9878bc.x86_64.rpm8{postgresql-test-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpmEKpostgis-client-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpmGKpostgis-upgrade-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm{postgresql-upgrade-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm6{postgresql-server-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm{postgresql-pltcl-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm{postgresql-plpython3-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm9{postgresql-upgrade-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm5{postgresql-private-devel-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm1=pg_repack-1.5.1-1.module_el9.6.0+146+c54fdeca.x86_64.rpmY{postgresql-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm4{postgresql-docs-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm7{postgresql-static-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpmDKpostgis-3.5.3-3.module_el9.7.0+187+2286ff0a.x86_64.rpm{postgresql-plperl-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpm{postgresql-private-libs-16.13-1.module_el9.7.0+213+65e1da69.x86_64.rpmIy +aBBBBBBBBsecurityModerate: python3.12 security update&;`https://access.redhat.com/errata/RHSA-2026:4165RHSA-2026:4165RHSA-2026:4165 https://access.redhat.com/security/cve/CVE-2025-15366CVE-2025-15366CVE-2025-15366https://access.redhat.com/security/cve/CVE-2025-15367CVE-2025-15367CVE-2025-15367https://access.redhat.com/security/cve/CVE-2026-1299CVE-2026-1299CVE-2026-1299https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4165.htmlALSA-2026:4165ALSA-2026:4165  python3.12-devel-3.12.12-4.el9_7.1.i686.rpm; python3.12-tkinter-3.12.12-4.el9_7.1.x86_64.rpm python3.12-libs-3.12.12-4.el9_7.1.i686.rpm python3.12-libs-3.12.12-4.el9_7.1.x86_64.rpm python3.12-devel-3.12.12-4.el9_7.1.x86_64.rpm: python3.12-3.12.12-4.el9_7.1.x86_64.rpm python3.12-devel-3.12.12-4.el9_7.1.i686.rpm; python3.12-tkinter-3.12.12-4.el9_7.1.x86_64.rpm python3.12-libs-3.12.12-4.el9_7.1.i686.rpm python3.12-libs-3.12.12-4.el9_7.1.x86_64.rpm python3.12-devel-3.12.12-4.el9_7.1.x86_64.rpm: python3.12-3.12.12-4.el9_7.1.x86_64.rpmZz 2lBBBBsecurityModerate: python3.9 security update&` https://access.redhat.com/errata/RHSA-2026:4168RHSA-2026:4168RHSA-2026:4168 https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4168.htmlALSA-2026:4168ALSA-2026:4168 https://www.redhat.com/security/data/cve/CVE-2025-15366.htmlCVE-2025-15366CVE-2025-15366https://www.redhat.com/security/data/cve/CVE-2025-15367.htmlCVE-2025-15367CVE-2025-15367https://www.redhat.com/security/data/cve/CVE-2026-0865.htmlCVE-2026-0865CVE-2026-0865https://www.redhat.com/security/data/cve/CVE-2026-1299.htmlCVE-2026-1299CVE-2026-1299Rppython3-devel-3.9.25-3.el9_7.1.i686.rpm1ppython3-tkinter-3.9.25-3.el9_7.1.x86_64.rpmRppython3-devel-3.9.25-3.el9_7.1.x86_64.rpmgppython-unversioned-command-3.9.25-3.el9_7.1.noarch.rpmRppython3-devel-3.9.25-3.el9_7.1.i686.rpm1ppython3-tkinter-3.9.25-3.el9_7.1.x86_64.rpmRppython3-devel-3.9.25-3.el9_7.1.x86_64.rpmgppython-unversioned-command-3.9.25-3.el9_7.1.noarch.rpmϰ({ 8sBBBsecurityImportant: gimp security update&{E https://access.redhat.com/errata/RHSA-2026:4173RHSA-2026:4173RHSA-2026:4173 https://access.redhat.com/security/cve/CVE-2026-0797CVE-2026-0797CVE-2026-0797https://access.redhat.com/security/cve/CVE-2026-2044CVE-2026-2044CVE-2026-2044https://access.redhat.com/security/cve/CVE-2026-2045CVE-2026-2045CVE-2026-2045https://access.redhat.com/security/cve/CVE-2026-2047CVE-2026-2047CVE-2026-2047https://access.redhat.com/security/cve/CVE-2026-2048CVE-2026-2048CVE-2026-2048https://bugzilla.redhat.com/24415172441517https://bugzilla.redhat.com/24415212441521https://bugzilla.redhat.com/24415222441522https://bugzilla.redhat.com/24415242441524https://bugzilla.redhat.com/24415272441527https://errata.almalinux.org/9/ALSA-2026-4173.htmlALSA-2026:4173ALSA-2026:4173 Bgimp-libs-3.0.4-1.el9_7.4.x86_64.rpmBgimp-libs-3.0.4-1.el9_7.4.i686.rpmcBgimp-3.0.4-1.el9_7.4.x86_64.rpmBgimp-libs-3.0.4-1.el9_7.4.x86_64.rpmBgimp-libs-3.0.4-1.el9_7.4.i686.rpmcBgimp-3.0.4-1.el9_7.4.x86_64.rpm+| ;ysecurityImportant: opentelemetry-collector security update&@Rhttps://access.redhat.com/errata/RHSA-2026:4177RHSA-2026:4177RHSA-2026:4177 https://access.redhat.com/security/cve/CVE-2025-61726CVE-2025-61726CVE-2025-61726https://access.redhat.com/security/cve/CVE-2025-68121CVE-2025-68121CVE-2025-68121https://bugzilla.redhat.com/24344322434432https://bugzilla.redhat.com/24371112437111https://errata.almalinux.org/9/ALSA-2026-4177.htmlALSA-2026:4177ALSA-2026:4177 yopentelemetry-collector-0.144.0-1.el9_7.x86_64.rpmyopentelemetry-collector-0.144.0-1.el9_7.x86_64.rpmϯ} |BBBBBBBBBsecurityModerate: gnutls security update&Thttps://access.redhat.com/errata/RHSA-2026:4188RHSA-2026:4188RHSA-2026:4188 https://access.redhat.com/security/cve/CVE-2025-14831CVE-2025-14831CVE-2025-14831https://access.redhat.com/security/cve/CVE-2025-9820CVE-2025-9820CVE-2025-9820https://bugzilla.redhat.com/23925282392528https://bugzilla.redhat.com/24231772423177https://errata.almalinux.org/9/ALSA-2026-4188.htmlALSA-2026:4188ALSA-2026:4188 Pgnutls-c++-3.8.3-10.el9_7.x86_64.rpmgnutls-utils-3.8.3-10.el9_7.x86_64.rpmPgnutls-c++-3.8.3-10.el9_7.i686.rpmRgnutls-devel-3.8.3-10.el9_7.i686.rpmQgnutls-dane-3.8.3-10.el9_7.i686.rpmQgnutls-dane-3.8.3-10.el9_7.x86_64.rpmRgnutls-devel-3.8.3-10.el9_7.x86_64.rpmPgnutls-c++-3.8.3-10.el9_7.x86_64.rpmgnutls-utils-3.8.3-10.el9_7.x86_64.rpmPgnutls-c++-3.8.3-10.el9_7.i686.rpmRgnutls-devel-3.8.3-10.el9_7.i686.rpmQgnutls-dane-3.8.3-10.el9_7.i686.rpmQgnutls-dane-3.8.3-10.el9_7.x86_64.rpmRgnutls-devel-3.8.3-10.el9_7.x86_64.rpmϮ7~ HBBBBBBBBsecurityModerate: python3.11 security update&f`https://access.redhat.com/errata/RHSA-2026:4216RHSA-2026:4216RHSA-2026:4216 https://access.redhat.com/security/cve/CVE-2025-15366CVE-2025-15366CVE-2025-15366https://access.redhat.com/security/cve/CVE-2025-15367CVE-2025-15367CVE-2025-15367https://access.redhat.com/security/cve/CVE-2026-1299CVE-2026-1299CVE-2026-1299https://bugzilla.redhat.com/24313682431368https://bugzilla.redhat.com/24313732431373https://bugzilla.redhat.com/24324372432437https://errata.almalinux.org/9/ALSA-2026-4216.htmlALSA-2026:4216ALSA-2026:4216 _zpython3.11-libs-3.11.13-5.1.el9_7.x86_64.rpmzpython3.11-tkinter-3.11.13-5.1.el9_7.x86_64.rpmzpython3.11-3.11.13-5.1.el9_7.x86_64.rpm^zpython3.11-devel-3.11.13-5.1.el9_7.i686.rpm_zpython3.11-libs-3.11.13-5.1.el9_7.i686.rpm^zpython3.11-devel-3.11.13-5.1.el9_7.x86_64.rpm_zpython3.11-libs-3.11.13-5.1.el9_7.x86_64.rpmzpython3.11-tkinter-3.11.13-5.1.el9_7.x86_64.rpmzpython3.11-3.11.13-5.1.el9_7.x86_64.rpm^zpython3.11-devel-3.11.13-5.1.el9_7.i686.rpm_zpython3.11-libs-3.11.13-5.1.el9_7.i686.rpm^zpython3.11-devel-3.11.13-5.1.el9_7.x86_64.rpmϭ; %SBBBBBBBBBBBBBBBBsecurityModerate: nginx:1.26 security update&FLhttps://access.redhat.com/errata/RHSA-2026:4235RHSA-2026:4235RHSA-2026:4235 https://access.redhat.com/security/cve/CVE-2026-1642CVE-2026-1642CVE-2026-1642https://bugzilla.redhat.com/24367382436738https://errata.almalinux.org/9/ALSA-2026-4235.htmlALSA-2026:4235ALSA-2026:4235 ' S}nginx-mod-stream-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmR}nginx-mod-mail-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmh}nginx-mod-devel-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmO}nginx-mod-http-image-filter-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm}nginx-all-modules-1.26.3-2.module_el9.7.0+215+8d94e91c.noarch.rpm}nginx-filesystem-1.26.3-2.module_el9.7.0+215+8d94e91c.noarch.rpmN}nginx-core-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmP}nginx-mod-http-perl-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmQ}nginx-mod-http-xslt-filter-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm}nginx-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm' S}nginx-mod-stream-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmR}nginx-mod-mail-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmh}nginx-mod-devel-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmO}nginx-mod-http-image-filter-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm}nginx-all-modules-1.26.3-2.module_el9.7.0+215+8d94e91c.noarch.rpm}nginx-filesystem-1.26.3-2.module_el9.7.0+215+8d94e91c.noarch.rpmN}nginx-core-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmP}nginx-mod-http-perl-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmQ}nginx-mod-http-xslt-filter-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpm}nginx-1.26.3-2.module_el9.7.0+215+8d94e91c.x86_64.rpmŜG fBBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 10.0 security update&*https://access.redhat.com/errata/RHSA-2026:4445RHSA-2026:4445RHSA-2026:4445 https://access.redhat.com/security/cve/CVE-2026-26127CVE-2026-26127CVE-2026-26127https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24460982446098https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4445.htmlALSA-2026:4445ALSA-2026:4445 @,dotnet-sdk-aot-10.0-10.0.104-1.el9_7.x86_64.rpmA,dotnet-sdk-dbg-10.0-10.0.104-1.el9_7.x86_64.rpm= dotnet-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm>,dotnet-sdk-10.0-10.0.104-1.el9_7.x86_64.rpm' aspnetcore-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpm& aspnetcore-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm< dotnet-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm dotnet-host-10.0.4-1.el9_7.x86_64.rpmB dotnet-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpmC,dotnet-templates-10.0-10.0.104-1.el9_7.x86_64.rpm; dotnet-hostfxr-10.0-10.0.4-1.el9_7.x86_64.rpm% aspnetcore-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm: dotnet-apphost-pack-10.0-10.0.4-1.el9_7.x86_64.rpm @,dotnet-sdk-aot-10.0-10.0.104-1.el9_7.x86_64.rpmA,dotnet-sdk-dbg-10.0-10.0.104-1.el9_7.x86_64.rpm= dotnet-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm>,dotnet-sdk-10.0-10.0.104-1.el9_7.x86_64.rpm' aspnetcore-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpm& aspnetcore-runtime-dbg-10.0-10.0.4-1.el9_7.x86_64.rpm< dotnet-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm dotnet-host-10.0.4-1.el9_7.x86_64.rpmB dotnet-targeting-pack-10.0-10.0.4-1.el9_7.x86_64.rpmC,dotnet-templates-10.0-10.0.104-1.el9_7.x86_64.rpm; dotnet-hostfxr-10.0-10.0.4-1.el9_7.x86_64.rpm% aspnetcore-runtime-10.0-10.0.4-1.el9_7.x86_64.rpm: dotnet-apphost-pack-10.0-10.0.4-1.el9_7.x86_64.rpm@ ABsecurityImportant: libvpx security update&<9https://access.redhat.com/errata/RHSA-2026:4447RHSA-2026:4447RHSA-2026:4447 https://access.redhat.com/security/cve/CVE-2026-2447CVE-2026-2447CVE-2026-2447https://bugzilla.redhat.com/24402192440219https://errata.almalinux.org/9/ALSA-2026-4447.htmlALSA-2026:4447ALSA-2026:4447 libvpx-1.9.0-10.el9_7.i686.rpmlibvpx-1.9.0-10.el9_7.x86_64.rpmlibvpx-1.9.0-10.el9_7.i686.rpmlibvpx-1.9.0-10.el9_7.x86_64.rpmH EBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 8.0 security update&u_https://access.redhat.com/errata/RHSA-2026:4454RHSA-2026:4454RHSA-2026:4454 https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4454.htmlALSA-2026:4454ALSA-2026:4454 Kdotnet-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpmLrdotnet-sdk-dbg-8.0-8.0.125-1.el9_7.x86_64.rpm[rdotnet-templates-8.0-8.0.125-1.el9_7.x86_64.rpmTaspnetcore-runtime-8.0-8.0.25-1.el9_7.x86_64.rpmVdotnet-apphost-pack-8.0-8.0.25-1.el9_7.x86_64.rpmUaspnetcore-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpmYrdotnet-sdk-8.0-8.0.125-1.el9_7.x86_64.rpmZdotnet-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpmWdotnet-hostfxr-8.0-8.0.25-1.el9_7.x86_64.rpmDaspnetcore-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpmXdotnet-runtime-8.0-8.0.25-1.el9_7.x86_64.rpm Kdotnet-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpmLrdotnet-sdk-dbg-8.0-8.0.125-1.el9_7.x86_64.rpm[rdotnet-templates-8.0-8.0.125-1.el9_7.x86_64.rpmTaspnetcore-runtime-8.0-8.0.25-1.el9_7.x86_64.rpmVdotnet-apphost-pack-8.0-8.0.25-1.el9_7.x86_64.rpmUaspnetcore-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpmYrdotnet-sdk-8.0-8.0.125-1.el9_7.x86_64.rpmZdotnet-targeting-pack-8.0-8.0.25-1.el9_7.x86_64.rpmWdotnet-hostfxr-8.0-8.0.25-1.el9_7.x86_64.rpmDaspnetcore-runtime-dbg-8.0-8.0.25-1.el9_7.x86_64.rpmXdotnet-runtime-8.0-8.0.25-1.el9_7.x86_64.rpmϬ' 6\BBBBBBBBBBBBBBBBBBBBBBBBsecurityImportant: .NET 9.0 security update&T)https://access.redhat.com/errata/RHSA-2026:4456RHSA-2026:4456RHSA-2026:4456 https://access.redhat.com/security/cve/CVE-2026-26127CVE-2026-26127CVE-2026-26127https://access.redhat.com/security/cve/CVE-2026-26130CVE-2026-26130CVE-2026-26130https://bugzilla.redhat.com/24460982446098https://bugzilla.redhat.com/24461342446134https://errata.almalinux.org/9/ALSA-2026-4456.htmlALSA-2026:4456ALSA-2026:4456 aspnetcore-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpmdotnet-apphost-pack-9.0-9.0.14-1.el9_7.x86_64.rpmbdotnet-sdk-aot-9.0-9.0.115-1.el9_7.x86_64.rpmbdotnet-sdk-dbg-9.0-9.0.115-1.el9_7.x86_64.rpmaspnetcore-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpmdotnet-runtime-9.0-9.0.14-1.el9_7.x86_64.rpmbdotnet-templates-9.0-9.0.115-1.el9_7.x86_64.rpmaspnetcore-runtime-9.0-9.0.14-1.el9_7.x86_64.rpmdotnet-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpm bnetstandard-targeting-pack-2.1-9.0.115-1.el9_7.x86_64.rpmdotnet-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpmbdotnet-sdk-9.0-9.0.115-1.el9_7.x86_64.rpmdotnet-hostfxr-9.0-9.0.14-1.el9_7.x86_64.rpm aspnetcore-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpmdotnet-apphost-pack-9.0-9.0.14-1.el9_7.x86_64.rpmbdotnet-sdk-aot-9.0-9.0.115-1.el9_7.x86_64.rpmbdotnet-sdk-dbg-9.0-9.0.115-1.el9_7.x86_64.rpmaspnetcore-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpmdotnet-runtime-9.0-9.0.14-1.el9_7.x86_64.rpmbdotnet-templates-9.0-9.0.115-1.el9_7.x86_64.rpmaspnetcore-runtime-9.0-9.0.14-1.el9_7.x86_64.rpmdotnet-targeting-pack-9.0-9.0.14-1.el9_7.x86_64.rpm bnetstandard-targeting-pack-2.1-9.0.115-1.el9_7.x86_64.rpmdotnet-runtime-dbg-9.0-9.0.14-1.el9_7.x86_64.rpmbdotnet-sdk-9.0-9.0.115-1.el9_7.x86_64.rpmdotnet-hostfxr-9.0-9.0.14-1.el9_7.x86_64.rpm$ :wBsecurityModerate: compat-openssl11 security update&}'https://access.redhat.com/errata/RHSA-2026:4472RHSA-2026:4472RHSA-2026:4472 https://access.redhat.com/security/cve/CVE-2025-69419CVE-2025-69419CVE-2025-69419https://bugzilla.redhat.com/24303862430386https://errata.almalinux.org/9/ALSA-2026-4472.htmlALSA-2026:4472ALSA-2026:4472 Zcompat-openssl11-1.1.1k-5.el9_7.1.i686.rpmZcompat-openssl11-1.1.1k-5.el9_7.1.x86_64.rpmZcompat-openssl11-1.1.1k-5.el9_7.1.i686.rpmZcompat-openssl11-1.1.1k-5.el9_7.1.x86_64.rpm  {BBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&$https://access.redhat.com/errata/RHSA-2026:4759RHSA-2026:4759RHSA-2026:4759 https://access.redhat.com/security/cve/CVE-2025-39818CVE-2025-39818CVE-2025-39818https://access.redhat.com/security/cve/CVE-2025-68800CVE-2025-68800CVE-2025-68800https://bugzilla.redhat.com/23957972395797https://bugzilla.redhat.com/24290652429065https://errata.almalinux.org/9/ALSA-2026-4759.htmlALSA-2026:4759ALSA-2026:4759 okernel-doc-5.14.0-611.41.1.el9_7.noarch.rpm#okernel-devel-5.14.0-611.41.1.el9_7.x86_64.rpm"okernel-debug-devel-matched-5.14.0-611.41.1.el9_7.x86_64.rpm%operf-5.14.0-611.41.1.el9_7.x86_64.rpm*orv-5.14.0-611.41.1.el9_7.x86_64.rpmMopython3-perf-5.14.0-611.41.1.el9_7.x86_64.rpm(okernel-headers-5.14.0-611.41.1.el9_7.x86_64.rpm)ortla-5.14.0-611.41.1.el9_7.x86_64.rpm!okernel-debug-devel-5.14.0-611.41.1.el9_7.x86_64.rpm$okernel-devel-matched-5.14.0-611.41.1.el9_7.x86_64.rpm okernel-doc-5.14.0-611.41.1.el9_7.noarch.rpm#okernel-devel-5.14.0-611.41.1.el9_7.x86_64.rpm"okernel-debug-devel-matched-5.14.0-611.41.1.el9_7.x86_64.rpm%operf-5.14.0-611.41.1.el9_7.x86_64.rpm*orv-5.14.0-611.41.1.el9_7.x86_64.rpmMopython3-perf-5.14.0-611.41.1.el9_7.x86_64.rpm(okernel-headers-5.14.0-611.41.1.el9_7.x86_64.rpm)ortla-5.14.0-611.41.1.el9_7.x86_64.rpm!okernel-debug-devel-5.14.0-611.41.1.el9_7.x86_64.rpm$okernel-devel-matched-5.14.0-611.41.1.el9_7.x86_64.rpmo OBBBBBBBBsecurityModerate: mysql security update&(Ahttps://access.redhat.com/errata/RHSA-2026:4828RHSA-2026:4828RHSA-2026:4828 https://access.redhat.com/security/cve/CVE-2026-21936CVE-2026-21936CVE-2026-21936https://access.redhat.com/security/cve/CVE-2026-21937CVE-2026-21937CVE-2026-21937https://access.redhat.com/security/cve/CVE-2026-21941CVE-2026-21941CVE-2026-21941https://access.redhat.com/security/cve/CVE-2026-21948CVE-2026-21948CVE-2026-21948https://access.redhat.com/security/cve/CVE-2026-21964CVE-2026-21964CVE-2026-21964https://access.redhat.com/security/cve/CVE-2026-21968CVE-2026-21968CVE-2026-21968https://bugzilla.redhat.com/24313842431384https://bugzilla.redhat.com/24313852431385https://bugzilla.redhat.com/24314022431402https://bugzilla.redhat.com/24314092431409https://bugzilla.redhat.com/24314132431413https://bugzilla.redhat.com/24314312431431https://errata.almalinux.org/9/ALSA-2026-4828.htmlALSA-2026:4828ALSA-2026:4828 <\mysql-server-8.0.45-1.el9_7.x86_64.rpm\mysql-errmsg-8.0.45-1.el9_7.x86_64.rpm*\mysql-libs-8.0.45-1.el9_7.x86_64.rpm\mysql-common-8.0.45-1.el9_7.x86_64.rpm9\mysql-8.0.45-1.el9_7.x86_64.rpm<\mysql-server-8.0.45-1.el9_7.x86_64.rpm\mysql-errmsg-8.0.45-1.el9_7.x86_64.rpm*\mysql-libs-8.0.45-1.el9_7.x86_64.rpm\mysql-common-8.0.45-1.el9_7.x86_64.rpm9\mysql-8.0.45-1.el9_7.x86_64.rpm? ZBsecurityImportant: capstone security update&iThttps://access.redhat.com/errata/RHSA-2026:4898RHSA-2026:4898RHSA-2026:4898 https://access.redhat.com/security/cve/CVE-2025-67873CVE-2025-67873CVE-2025-67873https://access.redhat.com/security/cve/CVE-2025-68114CVE-2025-68114CVE-2025-68114https://bugzilla.redhat.com/24234162423416https://bugzilla.redhat.com/24234192423419https://errata.almalinux.org/9/ALSA-2026-4898.htmlALSA-2026:4898ALSA-2026:4898 mJcapstone-4.0.2-11.el9_7.i686.rpmmJcapstone-4.0.2-11.el9_7.x86_64.rpmmJcapstone-4.0.2-11.el9_7.i686.rpmmJcapstone-4.0.2-11.el9_7.x86_64.rpmS #^BBBsecurityImportant: libarchive security update&=https://access.redhat.com/errata/RHSA-2026:5080RHSA-2026:5080RHSA-2026:5080 https://access.redhat.com/security/cve/CVE-2026-4111CVE-2026-4111CVE-2026-4111https://bugzilla.redhat.com/24464532446453https://errata.almalinux.org/9/ALSA-2026-5080.htmlALSA-2026:5080ALSA-2026:5080 LIlibarchive-devel-3.5.3-7.el9_7.i686.rpmIbsdtar-3.5.3-7.el9_7.x86_64.rpmLIlibarchive-devel-3.5.3-7.el9_7.x86_64.rpmLIlibarchive-devel-3.5.3-7.el9_7.i686.rpmIbsdtar-3.5.3-7.el9_7.x86_64.rpmLIlibarchive-devel-3.5.3-7.el9_7.x86_64.rpm  4dBBBBBBBBBBBBBBsecurityModerate: nginx security update&>Lhttps://access.redhat.com/errata/RHSA-2026:5599RHSA-2026:5599RHSA-2026:5599 https://access.redhat.com/security/cve/CVE-2026-1642CVE-2026-1642CVE-2026-1642https://bugzilla.redhat.com/24367382436738https://errata.almalinux.org/9/ALSA-2026-5599.htmlALSA-2026:5599ALSA-2026:5599 Ocnginx-mod-http-image-filter-1.20.1-24.el9_7.1.alma.1.x86_64.rpmcnginx-1.20.1-24.el9_7.1.alma.1.x86_64.rpmScnginx-mod-stream-1.20.1-24.el9_7.1.alma.1.x86_64.rpmQcnginx-mod-http-xslt-filter-1.20.1-24.el9_7.1.alma.1.x86_64.rpmcnginx-filesystem-1.20.1-24.el9_7.1.alma.1.noarch.rpmPcnginx-mod-http-perl-1.20.1-24.el9_7.1.alma.1.x86_64.rpmcnginx-all-modules-1.20.1-24.el9_7.1.alma.1.noarch.rpmNcnginx-core-1.20.1-24.el9_7.1.alma.1.x86_64.rpmRcnginx-mod-mail-1.20.1-24.el9_7.1.alma.1.x86_64.rpm Ocnginx-mod-http-image-filter-1.20.1-24.el9_7.1.alma.1.x86_64.rpmcnginx-1.20.1-24.el9_7.1.alma.1.x86_64.rpmScnginx-mod-stream-1.20.1-24.el9_7.1.alma.1.x86_64.rpmQcnginx-mod-http-xslt-filter-1.20.1-24.el9_7.1.alma.1.x86_64.rpmcnginx-filesystem-1.20.1-24.el9_7.1.alma.1.noarch.rpmPcnginx-mod-http-perl-1.20.1-24.el9_7.1.alma.1.x86_64.rpmcnginx-all-modules-1.20.1-24.el9_7.1.alma.1.noarch.rpmNcnginx-core-1.20.1-24.el9_7.1.alma.1.x86_64.rpmRcnginx-mod-mail-1.20.1-24.el9_7.1.alma.1.x86_64.rpmΔ0  ;uBBBBsecurityModerate: vim security update& xhttps://access.redhat.com/errata/RHSA-2026:5602RHSA-2026:5602RHSA-2026:5602 https://access.redhat.com/security/cve/CVE-2026-25749CVE-2026-25749CVE-2026-25749https://bugzilla.redhat.com/24378432437843https://errata.almalinux.org/9/ALSA-2026-5602.htmlALSA-2026:5602ALSA-2026:5602 h^vim-enhanced-8.2.2637-23.el9_7.1.x86_64.rpmg^vim-common-8.2.2637-23.el9_7.1.x86_64.rpmf^vim-X11-8.2.2637-23.el9_7.1.x86_64.rpmh^vim-enhanced-8.2.2637-23.el9_7.1.x86_64.rpmg^vim-common-8.2.2637-23.el9_7.1.x86_64.rpmf^vim-X11-8.2.2637-23.el9_7.1.x86_64.rpmΔ`  vBBBBBBBBBB}BBBBBBBBBBBsecurityModerate: mysql:8.4 security update&Ahttps://access.redhat.com/errata/RHSA-2026:5640RHSA-2026:5640RHSA-2026:5640 https://access.redhat.com/security/cve/CVE-2026-21936CVE-2026-21936CVE-2026-21936https://access.redhat.com/security/cve/CVE-2026-21937CVE-2026-21937CVE-2026-21937https://access.redhat.com/security/cve/CVE-2026-21941CVE-2026-21941CVE-2026-21941https://access.redhat.com/security/cve/CVE-2026-21948CVE-2026-21948CVE-2026-21948https://access.redhat.com/security/cve/CVE-2026-21964CVE-2026-21964CVE-2026-21964https://access.redhat.com/security/cve/CVE-2026-21968CVE-2026-21968CVE-2026-21968https://bugzilla.redhat.com/24313842431384https://bugzilla.redhat.com/24313852431385https://bugzilla.redhat.com/24314022431402https://bugzilla.redhat.com/24314092431409https://bugzilla.redhat.com/24314132431413https://bugzilla.redhat.com/24314312431431https://errata.almalinux.org/9/ALSA-2026-5640.htmlALSA-2026:5640ALSA-2026:5640 9'avrapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpmWmysql-test-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm*mysql-libs-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpmmysql-errmsg-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpmU1mecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmR+mecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmT1mecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm9mysql-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm(mysql-test-data-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpmmysql-common-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpmVmysql-devel-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm<mysql-server-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpmS+mecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmCvrapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpm9'avrapidjson-devel-1.1.0-19.module_el9.6.0+152+8cbce00c.x86_64.rpmWmysql-test-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm*mysql-libs-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpmmysql-errmsg-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpmU1mecab-ipadic-EUCJP-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpmR+mecab-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmT1mecab-ipadic-2.7.0.20070801-24.module_el9.6.0+152+8cbce00c.x86_64.rpm9mysql-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm(mysql-test-data-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpmmysql-common-8.4.8-1.module_el9.7.0+219+aca48cd3.noarch.rpmVmysql-devel-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpm<mysql-server-8.4.8-1.module_el9.7.0+219+aca48cd3.x86_64.rpmS+mecab-devel-0.996-3.module_el9.6.0+152+8cbce00c.4.x86_64.rpmCvrapidjson-doc-1.1.0-19.module_el9.6.0+152+8cbce00c.noarch.rpmΔW  JBBsecurityImportant: firefox security update&CjLhttps://access.redhat.com/errata/RHSA-2026:5930RHSA-2026:5930RHSA-2026:5930 https://access.redhat.com/security/cve/CVE-2026-4684CVE-2026-4684CVE-2026-4684https://access.redhat.com/security/cve/CVE-2026-4685CVE-2026-4685CVE-2026-4685https://access.redhat.com/security/cve/CVE-2026-4686CVE-2026-4686CVE-2026-4686https://access.redhat.com/security/cve/CVE-2026-4687CVE-2026-4687CVE-2026-4687https://access.redhat.com/security/cve/CVE-2026-4688CVE-2026-4688CVE-2026-4688https://access.redhat.com/security/cve/CVE-2026-4689CVE-2026-4689CVE-2026-4689https://access.redhat.com/security/cve/CVE-2026-4690CVE-2026-4690CVE-2026-4690https://access.redhat.com/security/cve/CVE-2026-4691CVE-2026-4691CVE-2026-4691https://access.redhat.com/security/cve/CVE-2026-4692CVE-2026-4692CVE-2026-4692https://access.redhat.com/security/cve/CVE-2026-4693CVE-2026-4693CVE-2026-4693https://access.redhat.com/security/cve/CVE-2026-4694CVE-2026-4694CVE-2026-4694https://access.redhat.com/security/cve/CVE-2026-4695CVE-2026-4695CVE-2026-4695https://access.redhat.com/security/cve/CVE-2026-4696CVE-2026-4696CVE-2026-4696https://access.redhat.com/security/cve/CVE-2026-4697CVE-2026-4697CVE-2026-4697https://access.redhat.com/security/cve/CVE-2026-4698CVE-2026-4698CVE-2026-4698https://access.redhat.com/security/cve/CVE-2026-4699CVE-2026-4699CVE-2026-4699https://access.redhat.com/security/cve/CVE-2026-4700CVE-2026-4700CVE-2026-4700https://access.redhat.com/security/cve/CVE-2026-4701CVE-2026-4701CVE-2026-4701https://access.redhat.com/security/cve/CVE-2026-4702CVE-2026-4702CVE-2026-4702https://access.redhat.com/security/cve/CVE-2026-4704CVE-2026-4704CVE-2026-4704https://access.redhat.com/security/cve/CVE-2026-4705CVE-2026-4705CVE-2026-4705https://access.redhat.com/security/cve/CVE-2026-4706CVE-2026-4706CVE-2026-4706https://access.redhat.com/security/cve/CVE-2026-4707CVE-2026-4707CVE-2026-4707https://access.redhat.com/security/cve/CVE-2026-4708CVE-2026-4708CVE-2026-4708https://access.redhat.com/security/cve/CVE-2026-4709CVE-2026-4709CVE-2026-4709https://access.redhat.com/security/cve/CVE-2026-4710CVE-2026-4710CVE-2026-4710https://access.redhat.com/security/cve/CVE-2026-4711CVE-2026-4711CVE-2026-4711https://access.redhat.com/security/cve/CVE-2026-4712CVE-2026-4712CVE-2026-4712https://access.redhat.com/security/cve/CVE-2026-4713CVE-2026-4713CVE-2026-4713https://access.redhat.com/security/cve/CVE-2026-4714CVE-2026-4714CVE-2026-4714https://access.redhat.com/security/cve/CVE-2026-4715CVE-2026-4715CVE-2026-4715https://access.redhat.com/security/cve/CVE-2026-4716CVE-2026-4716CVE-2026-4716https://access.redhat.com/security/cve/CVE-2026-4717CVE-2026-4717CVE-2026-4717https://access.redhat.com/security/cve/CVE-2026-4718CVE-2026-4718CVE-2026-4718https://access.redhat.com/security/cve/CVE-2026-4719CVE-2026-4719CVE-2026-4719https://access.redhat.com/security/cve/CVE-2026-4720CVE-2026-4720CVE-2026-4720https://access.redhat.com/security/cve/CVE-2026-4721CVE-2026-4721CVE-2026-4721https://bugzilla.redhat.com/24507102450710https://bugzilla.redhat.com/24507112450711https://bugzilla.redhat.com/24507122450712https://bugzilla.redhat.com/24507132450713https://bugzilla.redhat.com/24507142450714https://bugzilla.redhat.com/24507152450715https://bugzilla.redhat.com/24507182450718https://bugzilla.redhat.com/24507192450719https://bugzilla.redhat.com/24507202450720https://bugzilla.redhat.com/24507212450721https://bugzilla.redhat.com/24507222450722https://bugzilla.redhat.com/24507232450723https://bugzilla.redhat.com/24507242450724https://bugzilla.redhat.com/24507252450725https://bugzilla.redhat.com/24507262450726https://bugzilla.redhat.com/24507272450727https://bugzilla.redhat.com/24507282450728https://bugzilla.redhat.com/24507292450729https://bugzilla.redhat.com/24507302450730https://bugzilla.redhat.com/24507322450732https://bugzilla.redhat.com/24507332450733https://bugzilla.redhat.com/24507342450734https://bugzilla.redhat.com/24507352450735https://bugzilla.redhat.com/24507382450738https://bugzilla.redhat.com/24507392450739https://bugzilla.redhat.com/24507402450740https://bugzilla.redhat.com/24507412450741https://bugzilla.redhat.com/24507422450742https://bugzilla.redhat.com/24507442450744https://bugzilla.redhat.com/24507462450746https://bugzilla.redhat.com/24507472450747https://bugzilla.redhat.com/24507482450748https://bugzilla.redhat.com/24507512450751https://bugzilla.redhat.com/24507522450752https://bugzilla.redhat.com/24507552450755https://bugzilla.redhat.com/24507562450756https://bugzilla.redhat.com/24507572450757https://errata.almalinux.org/9/ALSA-2026-5930.htmlALSA-2026:5930ALSA-2026:5930 ORfirefox-x11-140.9.0-1.el9_7.alma.1.x86_64.rpm7Rfirefox-140.9.0-1.el9_7.alma.1.x86_64.rpmORfirefox-x11-140.9.0-1.el9_7.alma.1.x86_64.rpm7Rfirefox-140.9.0-1.el9_7.alma.1.x86_64.rpmΩ`  OBBBBBBBBBBsecurityImportant: golang security update&-Hhttps://access.redhat.com/errata/RHSA-2026:5942RHSA-2026:5942RHSA-2026:5942 https://access.redhat.com/security/cve/CVE-2025-61731CVE-2025-61731CVE-2025-61731https://access.redhat.com/security/cve/CVE-2026-25679CVE-2026-25679CVE-2026-25679https://bugzilla.redhat.com/24344332434433https://bugzilla.redhat.com/24453562445356https://errata.almalinux.org/9/ALSA-2026-5942.htmlALSA-2026:5942ALSA-2026:5942 n golang-src-1.25.8-1.el9_7.noarch.rpmm golang-misc-1.25.8-1.el9_7.noarch.rpmA golang-bin-1.25.8-1.el9_7.x86_64.rpmo golang-tests-1.25.8-1.el9_7.noarch.rpm8 golang-race-1.25.8-1.el9_7.x86_64.rpm@ golang-1.25.8-1.el9_7.x86_64.rpml golang-docs-1.25.8-1.el9_7.noarch.rpmE go-toolset-1.25.8-1.el9_7.x86_64.rpmn golang-src-1.25.8-1.el9_7.noarch.rpmm golang-misc-1.25.8-1.el9_7.noarch.rpmA golang-bin-1.25.8-1.el9_7.x86_64.rpmo golang-tests-1.25.8-1.el9_7.noarch.rpm8 golang-race-1.25.8-1.el9_7.x86_64.rpm@ golang-1.25.8-1.el9_7.x86_64.rpml golang-docs-1.25.8-1.el9_7.noarch.rpmE go-toolset-1.25.8-1.el9_7.x86_64.rpmΙH $\BBBBBBsecurityImportant: freerdp security update&uhttps://access.redhat.com/errata/RHSA-2026:6004RHSA-2026:6004RHSA-2026:6004 https://access.redhat.com/security/cve/CVE-2026-26955CVE-2026-26955CVE-2026-26955https://access.redhat.com/security/cve/CVE-2026-26965CVE-2026-26965CVE-2026-26965https://bugzilla.redhat.com/24429592442959https://bugzilla.redhat.com/24431322443132https://errata.almalinux.org/9/ALSA-2026-6004.htmlALSA-2026:6004ALSA-2026:6004 BHfreerdp-2.11.7-1.el9_7.3.x86_64.rpm=Hfreerdp-libs-2.11.7-1.el9_7.3.i686.rpm@Hlibwinpr-2.11.7-1.el9_7.3.x86_64.rpm@Hlibwinpr-2.11.7-1.el9_7.3.i686.rpm=Hfreerdp-libs-2.11.7-1.el9_7.3.x86_64.rpmBHfreerdp-2.11.7-1.el9_7.3.x86_64.rpm=Hfreerdp-libs-2.11.7-1.el9_7.3.i686.rpm@Hlibwinpr-2.11.7-1.el9_7.3.x86_64.rpm@Hlibwinpr-2.11.7-1.el9_7.3.i686.rpm=Hfreerdp-libs-2.11.7-1.el9_7.3.x86_64.rpmή' 8eBBBBBBBBBBBBBBBBBsecurityModerate: kernel security update&<https://access.redhat.com/errata/RHSA-2026:6153RHSA-2026:6153RHSA-2026:6153 https://access.redhat.com/security/cve/CVE-2025-38180CVE-2025-38180CVE-2025-38180https://access.redhat.com/security/cve/CVE-2025-40096CVE-2025-40096CVE-2025-40096https://access.redhat.com/security/cve/CVE-2026-23144CVE-2026-23144CVE-2026-23144https://access.redhat.com/security/cve/CVE-2026-23171CVE-2026-23171CVE-2026-23171https://access.redhat.com/security/cve/CVE-2026-23191CVE-2026-23191CVE-2026-23191https://access.redhat.com/security/cve/CVE-2026-23193CVE-2026-23193CVE-2026-23193https://access.redhat.com/security/cve/CVE-2026-23204CVE-2026-23204CVE-2026-23204https://access.redhat.com/security/cve/CVE-2026-23209CVE-2026-23209CVE-2026-23209https://bugzilla.redhat.com/23763762376376https://bugzilla.redhat.com/24073332407333https://bugzilla.redhat.com/24398722439872https://bugzilla.redhat.com/24398862439886https://bugzilla.redhat.com/24398872439887https://bugzilla.redhat.com/24399002439900https://bugzilla.redhat.com/24399312439931https://bugzilla.redhat.com/24399472439947https://errata.almalinux.org/9/ALSA-2026-6153.htmlALSA-2026:6153ALSA-2026:6153 $pkernel-devel-matched-5.14.0-611.45.1.el9_7.x86_64.rpm!pkernel-debug-devel-5.14.0-611.45.1.el9_7.x86_64.rpmMppython3-perf-5.14.0-611.45.1.el9_7.x86_64.rpm"pkernel-debug-devel-matched-5.14.0-611.45.1.el9_7.x86_64.rpmpkernel-doc-5.14.0-611.45.1.el9_7.noarch.rpm%pperf-5.14.0-611.45.1.el9_7.x86_64.rpm*prv-5.14.0-611.45.1.el9_7.x86_64.rpm)prtla-5.14.0-611.45.1.el9_7.x86_64.rpm#pkernel-devel-5.14.0-611.45.1.el9_7.x86_64.rpm(pkernel-headers-5.14.0-611.45.1.el9_7.x86_64.rpm $pkernel-devel-matched-5.14.0-611.45.1.el9_7.x86_64.rpm!pkernel-debug-devel-5.14.0-611.45.1.el9_7.x86_64.rpmMppython3-perf-5.14.0-611.45.1.el9_7.x86_64.rpm"pkernel-debug-devel-matched-5.14.0-611.45.1.el9_7.x86_64.rpmpkernel-doc-5.14.0-611.45.1.el9_7.noarch.rpm%pperf-5.14.0-611.45.1.el9_7.x86_64.rpm*prv-5.14.0-611.45.1.el9_7.x86_64.rpm)prtla-5.14.0-611.45.1.el9_7.x86_64.rpm#pkernel-devel-5.14.0-611.45.1.el9_7.x86_64.rpm(pkernel-headers-5.14.0-611.45.1.el9_7.x86_64.rpmθ ;ysecurityImportant: thunderbird security update&D https://access.redhat.com/errata/RHSA-2026:6300RHSA-2026:6300RHSA-2026:6300 https://access.redhat.com/security/cve/CVE-2026-2920CVE-2026-2920CVE-2026-2920https://access.redhat.com/security/cve/CVE-2026-2921CVE-2026-2921CVE-2026-2921https://access.redhat.com/security/cve/CVE-2026-2922CVE-2026-2922CVE-2026-2922https://access.redhat.com/security/cve/CVE-2026-2923CVE-2026-2923CVE-2026-2923https://access.redhat.com/security/cve/CVE-2026-3082CVE-2026-3082CVE-2026-3082https://access.redhat.com/security/cve/CVE-2026-3083CVE-2026-3083CVE-2026-3083https://access.redhat.com/security/cve/CVE-2026-3085CVE-2026-3085CVE-2026-3085https://bugzilla.redhat.com/24474902447490https://bugzilla.redhat.com/24474922447492https://bugzilla.redhat.com/24474952447495https://bugzilla.redhat.com/24474962447496https://bugzilla.redhat.com/24474982447498https://bugzilla.redhat.com/24475002447500https://bugzilla.redhat.com/24475032447503https://errata.almalinux.org/9/ALSA-2026-6300.htmlALSA-2026:6300ALSA-2026:6300 *gstreamer1-plugins-base-devel-1.22.12-5.el9_7.x86_64.rpm*gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.x86_64.rpmg*gstreamer1-plugins-bad-free-1.22.12-5.el9_7.x86_64.rpm*gstreamer1-plugins-base-tools-1.22.12-5.el9_7.x86_64.rpmh*gstreamer1-plugins-good-1.22.12-5.el9_7.x86_64.rpm*gstreamer1-plugins-base-1.22.12-5.el9_7.x86_64.rpmi*gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.x86_64.rpmh*gstreamer1-plugins-good-1.22.12-5.el9_7.i686.rpmi*gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.i686.rpm*gstreamer1-plugins-base-devel-1.22.12-5.el9_7.i686.rpmg*gstreamer1-plugins-bad-free-1.22.12-5.el9_7.i686.rpmagstreamer1-plugins-ugly-free-1.22.12-4.el9_7.i686.rpmagstreamer1-plugins-ugly-free-1.22.12-4.el9_7.x86_64.rpm*gstreamer1-plugins-base-1.22.12-5.el9_7.i686.rpm*gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.i686.rpm*gstreamer1-plugins-base-devel-1.22.12-5.el9_7.x86_64.rpm*gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.x86_64.rpmg*gstreamer1-plugins-bad-free-1.22.12-5.el9_7.x86_64.rpm*gstreamer1-plugins-base-tools-1.22.12-5.el9_7.x86_64.rpmh*gstreamer1-plugins-good-1.22.12-5.el9_7.x86_64.rpm*gstreamer1-plugins-base-1.22.12-5.el9_7.x86_64.rpmi*gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.x86_64.rpmh*gstreamer1-plugins-good-1.22.12-5.el9_7.i686.rpmi*gstreamer1-plugins-good-gtk-1.22.12-5.el9_7.i686.rpm*gstreamer1-plugins-base-devel-1.22.12-5.el9_7.i686.rpmg*gstreamer1-plugins-bad-free-1.22.12-5.el9_7.i686.rpmagstreamer1-plugins-ugly-free-1.22.12-4.el9_7.i686.rpmagstreamer1-plugins-ugly-free-1.22.12-4.el9_7.x86_64.rpm*gstreamer1-plugins-base-1.22.12-5.el9_7.i686.rpm*gstreamer1-plugins-bad-free-libs-1.22.12-5.el9_7.i686.rpmοB 3qsecurityImportant: squid security update&Iyhttps://access.redhat.com/errata/RHSA-2026:6301RHSA-2026:6301RHSA-2026:6301 https://access.redhat.com/security/cve/CVE-2026-32748CVE-2026-32748CVE-2026-32748https://access.redhat.com/security/cve/CVE-2026-33526CVE-2026-33526CVE-2026-33526https://bugzilla.redhat.com/24515742451574https://bugzilla.redhat.com/24515772451577https://errata.almalinux.org/9/ALSA-2026-6301.htmlALSA-2026:6301ALSA-2026:6301 X}squid-5.5-22.el9_7.4.x86_64.rpmX}squid-5.5-22.el9_7.4.x86_64.rpmγ 50%d3483fixrrupiauyby dm-1 982187mCTP cli$-sid eloffns [al(_-9]<404#n finasymmec8.61102)Mozillabird# ndg mZnewsg4p. TO K 91.11_: CS jbox0dL`ow-s`beD pasz/regeijava+.RI,34468)uU nsSHj8708Apnd] could a way l hdd@ ba webT p9pMsafbugs` iFi}7׫ESR{Y84nd atbuan oto.20&ɳDa0}g OS PGP gna Lwas|ceptslidc26c9 en[sty1hej 1745ilyPACulOfreqsebled2XPoiu=ReceEleeA8SquiVf-@ Jx, fs,p"FTP, GopHT' b obs: DoS xcezgM|p/ es1-467/ -jdkAJDK 1J/ RunEnon+Softwa!D lop,Ki* xhaveHen?3a r D:(S0.168).77Ct " BXa -J (JAXm82073416Ocl{r ilN(HotPtF1859 1XFpIrMedH .invokeBasicoaa? rh1991003 pE br s#n..pkcswr er.PKCSInce7@,P[L9e#GYKeyje/imz^ don'tKA_SIGNMFIPSg{107ǡ{Rct s1@e6=gevh.8.0-8,*T+(.342.b06$08/V/z95V.u-Graf n%, fe h ushboargqh G, InfluxDB &TSDBeAua ccount3keg 107$7 7 +T(174 9aratm\sL8J3875J9Prous\s&"abhe )+ AirdfacSNi%a"mumoi*5at%dedE%i0=\g!e3</W0pv,qwfBlaeU`9 wce</Nfigu105395ޢ/r'>T'ma;v_8i~uTboh-D}HeSPF=U-D..fips=f e,ڢan{r'{F1lEha} rIi7e,Ṇ1 x Ma7uless- (! ed¶3\ -" browsg:rdli, {|t2UU 3.150LDOxebuF\*ft*URLamet631MoPos#ofC0)#GFGo T!!8 s+Go  !lb.,Zn. y ngo<. 6  r e*Q:%R/p+'RO.0)I/http T.En4%V17Ugo/Y(er̛"P*sM962Mew/xmlPDe%r.SkipW81io/fsBGlob(0:Kh/!BU#rshF3Fgob K$#: NewS]leH`seP- omit X-warn $worj2148v C t-git`es9b]UXGoJI7L+8PHPHTML-embe $mS$ApacS:phpsswordexve^ ngM4& F) o RCE-4)N/O%Wr+88*o*0+_reg)+_> rxp.cK897KS/i-/EmbyteD927MaF)-%$, thBSQLHb * is((omp pMy40gal (26 11), mdb0.5._ysql-sel (5)p=: ou3M9w@ :ack_ on _co_to_in(%-KxBIGINT!O JE6l2 h fUo@5uTf\'o~0wiag -;&0,8˒exfnc/k] .o,v50 av(befui"a(t,ifi51uCONNECT SREng'4P(E(V5p2pir3;I_s::walk D73Dpoison exivoli.% X7Xcr0,_tmp_1::f1F8F(_B or:: e_r*_X9Xmy_d::uor=A80AField:: IfaH&=y)f^s2cTRfx![s/`_w_a)__^oSy_$ca8~8I4N0*V3V#ɺ2ee::-_vr_ct _/kǮ4eN%ry_are$SEL(view`d(__s8V]HAVINGNOT EXISTd|a&q+c&_elf445IS NULLޡ _;BTi& :_M7&ɤv B it Q*GR4/iL3.ccA;)in ; ORD4BYO5 ‘u˔5LWHERE$h n er ind(˩VD3:/_ȴinK"due"-:=,gD3iqueP$)o5')TPund/=bup/ds  2XkCc5VIEW= gg \9S| 5  nLfi_:d ^*n 9b(CTE 1˚ 13_,::VɹerG>|3|+ &_p'joa# ă4 P8ȏbec8jk Ĉ5- y~D2IN 8b+S+= 3csi_i>l>049[kc_1_y<s d/cls_api 0[9 ower9LPAR';t:Shaxp,.:(#s[H&22H$+:_Dyss-ng`TsOF5fi|nam>3 gfs2;=?h dvo#>(^<#oc 7,e5DAP{:f en6ofti85;Un5j7+#575-KRBmt2C*$T;3 #A:*#vXSLT-89Cro(inhe%nt's+e3e$4>2;$2Y7!Y,V,mzm$D;pP: PK11_C'PWS6 '3'j>*SSL@'ki }@_NOCHECKSo3P#S31lHIn$71mgnutlsFFDHE8032 . TZ3DES+3v4Bs uD3ll&c v,|LN5508]mUC`ECDSA k/ZTs_-w ip256k1>[XxM19/XS6UCo#X8p-onSl+FKAT8$=1RRsPon23+qs G uYOZtKwsu&]|iN5(O5[IBMHW$T] POWER10pPe/5\yG|[ 1ew]R-R*1*DH tTg*5856*EC*7*S+8+AND,9,zero-,_,HKDF5mi 147?QK4/go"~ VM6SkI .L!K 9usri%K. X!I vm-/:4dTMh]4 164 5 Z6 999QDOf-- ASP]CMVC/s-" MlS=DQ; ru. 0YwRubxa< ow+prL,Z)en(/O"?xt)ȢMsk94+r(p4=1e]28)JIu! R-= 87:)Sr=[-F6tEl9y(.>-iLM daem0-d!mk5a866Hw (E0J,8J2:26 tzerXunB,d>6C(Xg2r Z?4143567840529678$Dv3NNN$V5VInno"/j1512DDL/22*iFTS$=27NG'PluK#c5ʲPAM EZJulZ5/ZεLog#R60R!` 505;52678O30153o69R "5+T3(2gP= d!.22vedeyd$@4: E#_d ,D2logroE tjr(lVN .jG} $dBIp^ BfasIZ ;%EISZ 2?75Y nϡ(_SbS- 29t $?  G$:MtNX c INImu0-778 Hg4-og`s, 0 4Ka -O:JReWV) mXANSI'%D17lrze- B!B43502p] o 7v%.gitS.+CSW2Z20$R+/mlx5jnujDrlNX#ntr /7 8,B tC+"dB\-\ke,extOp-.G5wF'J0)un1U`M"u-: WR0xVamazo4.32xiPn9nX86/ /UV-ST/Fi[KUV5 77Gl!:#2-sync s\  0.b>mq_]2_h- _Ma[9J 0.zw11ONVMe/lderak n-donips,nic^77WAd[nvmeӪa0-7(/tcp9iVFstag3Brq()_)l(qf)O'mI QR bY&929x2 9/ppc64 I]# & "T "=aTwlscpu+" 17,/ */ HvwJ1AMX 2amx0C8, bf- H82L1G pm#H!4!avf"19Q&i40e"dWebVGTKI'l8(re+e B:qB7x%2gtk&2.36.7)+*:4( @Rfkx R:289])***(**(BfSFPo=dEB k4_" )-5 9UTF-8C YL)5.)3Y*"e$#4 __Mn__8pvix8l[gs-g4 -ZhC6ChsTCjWASMARM64T -00KGLnnS-6_#rJl)2nNjMEz8&resh G/-2022-3033) * Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVER40959SData-race when0r`non-UTF-8 URLs iThreadL60LMemory safety bugs fixed?Firefox 105 andESR2.3Y2YRYte contspecifiYan HTML documthat was n#side'iframe's src. at8bute.ot block3ċAG elepemailuld [gger atworkqu]4Ca6x SDK@ndlwith Th erbird vulnerable to denial-of-serviceacke60KSecJ CZxtL forokiD__Ho__8pǡd8l[nt-1ity-base- bC6CIncohernucachbuildWASMARM64T7) Fֱe9ts abou6e s issue(s),mcluW impact,CVSS scG cknowgs,!othrelaMma, 2Rm liR&ences:.TBerk{yter\ NDo|n (BIND)mpy ofX)5Syrm (DNS)otocols. Ees `(n8d);.ollibra(rKines=app{susifacWZ~;7tool=Wifyzaipt r"ly. SFix(es): Hbind:9sQfigǢw 7wYfromYzero stale-!-time3may minaDunexpedly8'm$leakECDSASEC/E8177FsGdGExpat Cz2XseE:Cusf-freexdo funnxmlde.cZ674TSquidThigh-pXncexypweb clisupporFTP, GopHTTP dn objrs:ffovzSSPILSMB authv131gnutpv v3GNU T p LayhN(GnuTLSg,tich ryptograp algormsѡ6 SSL, RD Nettle1OBigndfit easilyalmRy xtN kit7-en=langu,C++, Pyth}2Pike,fl LSH!GPG+evekRlc  䪈followhave be2upd@ reamss:(3.7.6nn;8) 3:u d&_pkcs7_'.2509 Bug[IBM 9.1] [P10] POWER10 enh4y:u-r l (BZ#2 58( AMd KAlmaLinux385! DES-CBC g{ FIPS41531 ah uRkeys <22FmK9770).NET ed-softwar9 . Ita9bs@  C- APIsevi l?wi CLRn "wsd`add il navE. eZdfU'V3 6.0.1Run 0jdot: Nug poisonvia.ld-wBڤ+di~ :Ng.jsXPdlop} ppkn fa(scal(yJScript{gmD. 6nϡ(16.17.1{':aomnWebCgez35255)>RSmuggOduin "hea,lo[j-17- njdkOJ17Environy+SDKit?:rS MultiByr;no ` f(JGS 82860 16 eexce{ :X. ceG e(h5h26hHttpS nonlimiL twe2c9c̯2haloNTLM h 4sá,9_nsjicFiz+hJNDI numb(0ƿ4_miNI /2 (NO936ï3939h Prep6or4nquarR n\releas10, Z0.5) [a0 l:-9]329 .8.0 8 *& o11+p1V71) ur{DbrowW,+undar com7 ,/7b' s}9w.01"4 JSEginmviolkU[cross/ 292 CupJSg:&Dni w.prie>} 6d} 4Y6 e sgpwL{w fon by lciouad2istor7924)g!9x-je1e"h"clb3"P7'/¾=1 ;VariLN78zma-l^l"mp0U ddifw" *p-E&d. orif .1rgszip ra43a3!,c}%sC&cpu rJ C%ml vilee=cUn(dTKc&PTRACE_SEIZEWO_SUSPEND_)%COMP`3-)cras+!^booT14/G2 AMD^p (mt7921eiule))5,execveA,.ntD+ced666 JblscrvVGA Uput someNs.201needQ(oa+yhee,DRBGf miycfN')vx)watchdog BUG:k. - CPU#30u 34s! [swer/30:0]O785UV ,5.16"A Bad L qemu-kvm pfn:68a74600?vfio(Ems 2M H+a5>879Vhpa2)9 E!(Nlo!e hpiloq& HPE RL3 Gen", (aarch64f94&$*T, aGve,u$_% !3cl, g yb'vcdy25%.typedl. tC+eB9Cpib t = & sp}:u()PyL_FSt$doeL/wamddp tgv)ptto$S0g735pPublK-fra.@ (PKI)b esQdaA0i,4 $CC-ki-:OSxteeyt/ 2J+XXE41 lua ]ILuapowtulVG-Ndn".Vlso'("ntld \ ,- #:%  G_errCsde.c"unrora )7 < 30)ImB$ei0&[$cuszMOS aac*VM̳SOST  mi% use'sS((hoodgo: h/bi l(o .Flo`'nd R:1Tpani'en0d m iTh,i(jn218&i Chhes:Ҥj c%Ti', seRBN\,n podmanl)s`.gs)D.r)<3fv.5!#Kub4eN.org/x/-PnPEAcULUl)-u-Z3288#-gv Ycp47 tagf):m`eD.wFgvp?1QbounMa IP1(R8H 3r _sQ as i;XTdR *B/s8:~ c[>29^X-/h6l ePYwesfirs emp,l33,l//> wr A--t _45u _"in}>ws 7271>skf!mm fyou insj7]7 g - lQ/ creUyles,4J ygn(rv9fa% Npt;sic35cg-f5' a | g ndE: &tuaWdisk y: _T2 t<-&icsi"M:onS6y/UUID/&*, rscrm 0KFVhMh(KVMK@(F?u]M/rItecV5p-}9_run5  .6)4(.0)0647FBQEMUqcd-ehciMA Ecu 7G"Nfdcaad=qfU L507L5l-hda:aa ,sr"+K6KNULL er]pci_$7eYhw/acpi/hp.~ 415Ay%-v2vcGRcUCcKVM ') hyp sor EXiI3; wbo p4 :ssociN+ta.zso,O9 ۢIO drivpo~ k:H$PPb$GooglJ/.3Ce*$d? /yet R/#fl5,8"BommeisU;seri8Ł9Id:nar.mbolN%pt25=GI"(CMpulPiI!' si *e,.RX )vnD,Nr_~ed#4(8.5031 3F8'nwۡjNumOfNWF< : :08>ah Qling OCIQs^ m`>tD:sc'to:(@ Y:N6iBA8#i;V$KlW$=TvackF;!- KHlsU]*R9,(urz#vMdh< i[ FriBidi] $ KsJn%ex Hebrew, ALc)aplay^d7^:@;-,X"*Ftselfl$tPlogM-> fZ 8 9a3425V)7HJ30- _ _rtl_to_4 SVN9NSEGV>ve_ marks=1AGQt5 Qt 5.P 5&Qt:M& IPqQP0z:)2ub$n?r EO,C.f(%xPATH8mM:8N@FGTK$&@l@re*Ge <:BB,FY:gtk: U 1 o@ deM 2D9P8PQ9QC[_ YsI2 Bf:af<S=6700:cP9TSDB8rUgG!85p553Cf2tdl?3UK!zin1UrlH1-5B4(:RTM!-E>170qgo/Hr:D!exhausm.*Mf2: F OAu I@t)TokeP5F;Y n 167;pro)heus/-_D?I;vH. u!]ªYin›D42VCSRFFY 2>O3OIDOROh171Q3e"/JD3 SkipI8(LIio/^ BGlobd630:"/@BR.IÄpߌ2Unm hjFXgob XK \S]leh- o:X-Q] j21^>unbd(ac8=P1Qgg8(1.Q\287@)4\gdiI"_sTloVednS&qA.82Zp`T<$$97(?NA<79mT<2:1_ad/h*xyon394R;=Us46uni oVur: bodyO2c OrV8i orqAmLb?#`Bi21Źp_ajprXpsa`C638l94045o7 522ʮ:Edq pe@hoyy-htF&T181Outp,#o,8614<p_cmp_mA5>I" +sMa'q>f-7 f1yGoSuG$TCP! 039A dnsmasq D-DD(N)?DHCP'HvC64-)#x JUZdhcp6_no_y/9uO~ LACP `FLQA8oZD. *is!=milaOgg Vo $=)810?-lxp,@>=;822fN: x in(_fifo_ved_X_5050O>>8CM F DF (OCF) a CnRAAi1haUbinher^ny* 1):$Redis( advPdm-'eR.of#;zTI-3 si66s0Oah1sGwets, and sorte. For performance, Redis workith2 in-memory data9. You c6) R,etails about sissue(s),clu impact,CVSSsG cknowledgolrelain¢,f3R pagm l,R&es:^Addi al Changes:Ҥj o %TeasseefAlmaLinuxp Not0linkNfromΎToolbox ist fMoz9symJcllowsSumofFnnerizqTl Itjbuilttop>Podmanust arJX technoiOCIgol4: net/http:r sanz^f Trans-Enco'head(x170Uio/fckhausMGlob930630:press/gzipBR~.I1Ipath/f0ߌ2]iffh  XTag ImOFileTIFC }: DjjIH56pBNuNF pol"^2^rer.865.O|-{!cp24=.-buff:.c m 35Ą _cpy>T_q xV284ĔhT “exctS[9pPddrg bF hN[lsdirü~ 8tDiz e By Zerorop89RawDStedfÒN;W HPHTML-embedOC }ummonlS}pacHTTPo7php0.2575 hpArduee_fat(Wail j1-2Qnime arraRpg_b ry_am ,jo RCE316>O-JPEG<wrijE2000ijajpeg mfa opj2_dekyu=12=DgcoIM c U UNIX kten >mari;als smaPOP3txe-mBŢm SQL du1nt plug-z subzd): ( escalZwhSimimasnon-zdb|05 :Mut E fb"tW ?d MIMEycn[KmoU!s+lM,weA 6^m: uuT a 28da, sl,Ad+bo) )Be/gobAD .KiRewS]leH Rse!xy - omb.X-wed t.j214=V Y/AnJSON(YAJL) <nt-SAX-style)7n ANSI CKCv_ da5gen-oyajl3 Qg:xatD5T479=Udpdk d{ 1W P,e D{ op Kit/teth>qvfaa, & spaD":Ca Vh+@sthaUwo o$s m5 1eDPDK/,vy___l _fymay2b1-383 rv3ilx54Tz d/l%R #819A~ kern*3W!,1any/3off-! '+4rXU55or BatHc '?. s[ 0-3651!*g--vulb+in_so-"ms64 smb2_ioctl# d# 016*idf_"]_. _icbd)y,b[617wiotlb!kDMA_FROM_DEVIg08"*s,Hr nft_do_uin&$ ,UMi10J HWspcm_hw_PoM4S 78p4Gmŷoarupk18#c@8urywbe%`drm%,m_F*_get3,28cKYpfkey_:353 in P9k_htc_Rbei6(&%anofß67 x86_3e_]n%185} o ysufd:tpG99nf_)s%-)poten@£loCg258  FMH_sfa_4G#26,s-P_Dv23din-ean-uO8mri-sha' 乮 SBDRNc3Ni]architufZ'TST5T5ifRC&_DRPW_6po/0del3Nz#;ofUo]149AMD:+tBle@Arb26*p)= r,6en1usitJ!(*hr|6z#(3rF[5..γǤoisbe%&" 1-ifinq @65.whol!b""u)n olE z-*9g@B) m+awu*el7434@2zE3own(fu!vouat!), Fe1~}:dH IPv63 nԩ I1777=^7ba@n!sMe2Blo[SMB) [8C+(rn~0SIFS;DV- P ma; ne ;pr\ C.6-,s,(4.16.4/,7748E;2)8is?E1$274=)F   :, &font<gJ6@$c,-A$[>sW[r.9d0u glyph)f "ly$W: sfn`i\$*40>SQ,viol a FNT_S _R!H5HtHTBOG=6!pre, ac{ Kb-orhe.gM0mV{1 m?^cla:, cepx 9 p'dynam %dl.S"*x'tABy  C2,3 .w([-7p3.9 (;A}24?6:q-D: findch2Bdo sea5A150^!;;~.pyc?ur1H7> e2fsD mu"5O':ym 4R 98d'Odah,KBugc(6est)v Nnew "sItS1"04=Unf-=brokeh*nt!n53p.</8>/cni.d . /?///X9 XkPd1=[x ]747Y& 4.jsgeC7mpt(ssuddenfwerIH3627CPANIC&- q# &/panic>8Enh+ 髺Tvolume++shbe5 [al-9D0 Z67[RFE][o\Xstom aP unlth5+1).NETd-Pfe e9+eC-@ ,=B lLR N0 sd`add9;&6 avai-pdU'VSDK 7A>1;RC Y/R;!8MQdot*7X(} 3464rF7AgeZ?sO. ld- _+n =410VKeyl`U8/O8P|%es} rJ mur9>lkGi +mB/Kornaa$3@35 w#֪m"pg+fK^ 1h# 29PMoz#a$birds,\lon'?usg]Vp<is6!sL 102.5N*W]mL* r Yh#% ma540!_FuicrY;& byX?:4:U!'I/S~H5HofrJaS_Re@6&NameI8Garb C(@9@MsafetyXfixwFi>BESRY21Y -;eASScooki y^10^C=4T;M5 D%% rd rs]żyms )l[ WR! #&S2So6CS-)L0+:0C mour|W)h drawn! wc0UIU<I Q re32ui- ;webP, M?!Z9R 8d t}pltK_ eJ )(I i+vYyEb%)li)4n-Id c=( V(pryAJlgB'R&ƳUjGPhelG/aec$p yM5#H>bo,c2KDC)}rb5PACv7 f28O1fVi8Ck#Qb1l;td-sm'modon'it9 @Zf, giv*(sTa ^bp.upv."ForgV<06<N_j;d;ppk O,x$yZ8nϡ(18.1l[469, 30 4 5$X-#\b'05b7Et8(L35Z8F? 6*|VR. 6. 2/aro7evNX687f  6g_ r WebGL3C9ƓF"u6 DraDropp+n t"c1J3  ʜ2U6 QuojnZA cer< tagtOh QlB, hQPg lU b6µX N=Byt8w%&gG\1oCEGig196vCway $yze,; m}m(b ry) tD . --: a bytAJpkedo=n29FGTK$K! E0N0:vB~ Fkitgtk:XNW)p+anhy "11Y"3$8"G (s 5445#/"PHa*?q%^ponse:\LJOC2?TI3-3P j P-F jK` 17 EX}+S2K?:"!,ke?HQxDTLS9JSSE, 8218PYsObankns:(SI9377I4cvV the References section. Bug Fix(es): * In FIPS mode,6use of a SQLite databaprovided by NSS was assumed, whichopen$in read-only] and with no PIN exped. This^event:o r\rttingDon.%. Pupvllowsre control ovUkusStwo newpertiq- fips.nssdb.pa-can bffigurˡFmanשijava.urityIletemporari(viaCmmi-linrgfnts toCJC&rtual mach%(RHBZ#2147476)Prepaf_5next quarterfOJDK(stmle(2023-01, 17.0.6) [almaux-9] (f53097)T-11-jdk packages3}n11Runtime Enon߫[+SoftwD$lop,KitSI?: hQshak9oS att against DTLSns (JSSE, 8287411) (CVE- 21835)Ysoundbank URL:molloadH(SI93742I43) FdetailKbouti^e(s),;cluZ imat,CVscG cknowledg+,MAaZin ma,ferQgm lis,G0j1j18k7798k.8.0n8m*&l8ݡiTFCORBAseriz$v502v0Jv8u362t9912|solr broken dueacsDni("io.FPB" "/etc/pki/!/cacWs"w,;-863594sudoa)utilsysW adminiatorC(FusQp,extivgs,orFdu crole.V/httpGG\eProxhorwi ne}/ti80irxp/sy xmԥ>bH]+171Ikөppc64le4454crypzc*/|o 390x493 )l  hd{C vTvEc^s, FeLDAP}*OSTPUTfu622 ny ]E:t >pdiVllto eZbUAX88179_178AeKnet.V64Vi915GPU TLB flushïrom Z3ïnfsd ,!RPC m: TCPg  945ò2cleng=g s)smt_ 0 YUnmaW PTRACE_SEIZEeO_SUSPENDCCOMP1' 0wl 9.2:%navfs32788vvfio zw]ppaf 2M (a|>851>nvme-tcpoc re~!lyz r@EMC wt~NDUd313q%DriU/5.19)207WARNINGAPU:~ 6P$D: 3440n/x86/mm/.c:105_V"_f+0x3f/0x50f458drm: ed crm_acy__r_erin)&or$ i6p$elroughfo ren*"-EINVAL evS69DELLi boojeRTerc12.J9JNwP VGA   @l{ A9-acio%d01JP|idy_ "Dummit" 'ar|osMy& oomnere'scaleftzswapZ39%fa t:{inckT: BrCh t%etng 9IAMdCLIENT: 5uD& "no:"̪m+8\7\z&zCIva6ECI_5MA@MEMORYmeM' x#S50910S z-E:t#i'oynVMs^ qg' led+ s19- On PE R760,esob LgEunessl>w 0/ seBs^twa0 d?P:eI-w bur)>B-+i e!4fac dW:-dacras\ cei!#ne#nthe y")>zV)$ @varrarJns"n0elPp1p`__m~ hal_by`p fd\Ă"f" ann) u NpK$mV  init{llpm\,s R&vBtar& s,D on-æ#"ekeeps8k)e cgwpnS t7p napW\qtmair u([  ell=ns Pepncy- 7-Mcalso xsp#-iRrYysvj/: Z_r 8v< XMLc.IeE:- caZYe}d*uI. RDTDm_ExEtyPrCre5 6#xml2{b%zWHJl'u: UPARSE_HUGEw0309"Adict_e cycM2CthW 3 . A li b ȡ&92N2AleteA!-ngleskAPI()Tv>,,2A"1,o+wR%w6 o'-Uq0nh htHo7IInf eJun@(&0v=6/Th$rdxlon nws cli.P/LtT/1 nP/  o*ub S/M]5)s=bchekd043 Gi]d Z-])]Sentr)ed}".1- A>p'SsT-< e" eaL?cop ']os+o0 $c his/g?onb*hs Xon) (Ǯ0))'38p#chOtJr *im],Pm=spoM1oån? G$i\/ ~230>H1`git$`,8--`'C19V@NC}u3(VNC)t<{yf:iAaŤG-/e=oAw;iY" 5y$! etY1i..-sC xorg-x7A3XGCP3ClaE-,!"le9\:8:^ < PKCS 12D76 b pb l0>violWMu , 572 S( hijQF lE@EPoQ rtmf%SpiMon3^ 6s'c.*s <*2 mT6ad,4U-00PUnsl;um*j?PBKDF2Xstun-8hig>'+p{+"3\a R!Sp ɭ8SHAKEdig.-OAEP>g10gSSVPL:#a os`hash6(]",ٙ2R%9.31dm5oN4,38512P56eB )DRBGsЙ3 5-37ުáQ欘hv9kC<48_ EVPEY_m+uw(?02.1 N!ly[0%R]O01J'93:dikl"F roe  ]&?cPXibmca -2#l%cVXo.4 (3.0)9mHsud084 b9(l2(mJ_sdu(5=bluetoU/'J35C9s% do_: _dvecskip_sp278QŹQ__P942_ssc_fs/n4)(c+3D!(a/6S- ~9Nvul(1ft_pay<_B_vla 1[|%sQ9-9O!7v?WW4: LACT+ R8f!14~S!hirdas Pn8T+|330%d1INMIfa a l[ e 57ua@ua4V3-wR0 x >e ?LuaYfr.D!dE,-O`1ua &Sa|cs;OVs f5975=i RUEFI #,+qasB it7a1 NQvDh U5I ibjpeg-bkeJPEG-0he3sosW Fo==Mse-9*a1-?asK1^bet/ reL_=_rgb_)^rdppm6>2{Ignutl4fYNT$Gnu$Np$i gormsp$bK,G QsJ$s-6}  3FCCM(g"bm'f s% ,jB!5T,dcmdP[]:i >^cle%1elf ir0)14{P14W$JIY7] 1+5y>-1,9YX+.  Prlec epĮy,.>l.P6,?~8L?4?ed?w9\ `j19I+toaWc5Kc-enod} #-2(7P |nsc' 7 NK=I=ew 3H87WE94C-of-bounds when accessing throttled streams (CVE-2023-25752) * Mozilla: Invalid downcast in Worklet88168URL bepdraggnfrom a removcross-origRiframe\toe s tab tger/navigationw4) For more details atJecurity issue(s),fclud tmpact,CVSS scG,0know&gmentsnd o/rlatinform,f pagm lis,R&en:.Tkernel pv7s conȤ3Linux!, ofyopersyom. SFix(es): E: tun: avoubleeeun_ _netdevl2-474k* ALSA: pcm:ve rwsem lock?sidsnd_ctl_elem_ddprevJ UAF0266Tu: CPU softTupTC miregre9to- aH©269 BugAlma9.0 - zfcp: fixaueortanthustarget!BZ#2127880~Cgroups_v2,0cOnew c/erspu affinNmasks fxall usrozo쵠437booAddeǩQ;51528<-rt-debug: WARNING:circularRependtyu(&n->_%->&p->pi wai)6061Sup}.sched)ad_bala by changfaultsdiroryuct_1105! s390/kexecipladdkdumpK6903Klibgpioesn'teñ?w withterphase *chiE5zxsi:orvsFswiotlb ufleakRfidKial VM`77Enh7k(IBM 9.2 FEATepgradeWQETHlivqu, e.g.l6F30¢l_ SPRMX mvl_fVe cod8382)VirtuNetVCompuT(VNC){tesplayichCows NrsviaiGdesktop environ( n'onlyomanertvrunn?,"J 5netFwvariety~YarBut. TisuitvˢTcliCxorg-x11-3: X.Org S O.Win B-Af-FLocvP -ge Escal;Vuln*bilp139HhttpdG2ApacHTTPFpowerfulcexten<webv:[requzitOmod wr_x25PostSQLnvobj$-p*da bman`(DBMS)ppdsq3 Escriptslacepsbeloze6.: 262l_C memclos)onnKerbe fifie 181 parlia?, high-pgvn rTCPJ-d apIc.:gXDoSg 0'mugglRattac{/1 he[rr? '%t , raM 1|>Ţfns-u:4ouatocols m, FeLDAP}emi- M L qil3916]/FUSE -p_d s ep38{Upd i8 _idHEagles /ShirOapids & * 61K E n nO pp>n robu utexud eg m ()_`)oxo-sourcbrows W igned ndardemp, pW 'Thisw u s} er102.10 ESRMFSA-TMP01gD- 86^)A.Fullsc,nifbobscu]+95338)193WSdHTML2> 2>9>ilen7r]ogcZ8191Z54Z ǤWs>negoI]310]67]_st:RzNULLract 62O KPBuil]5]8˭ lashZURIapath&6 IIPSeDDcryptopcsalgormvl;osat cV t. Itf %t5 B-toolcalsoSwributhesn<mAnhey,in-7RH8@Ply4X Jarun/ y. F e :+Rrb.edoisedń1PKCS#11[bymi xt@tokenssome&y ~iaYf8 yf{,\Yoe "#wn-.JmreAH ?)xp|ߢN #7)11+9.8.08*K T(SAPSSS iu M U)ys\cSun:0H9!D!S#did eNb1D  emptJo 3&Kerrorecu<mm PMwil I $2l$  8024)WebGTKT r]  ree e : Bp<7*l:y-a($~a tT'u382'GNU E%sw#( self-docu^ edi s#`w6di-fea"leu(el)碩cap%0,e-Je:Am*injUN& 617Ba oolLP .imMa lyyn d/tah =sPcosta+c "oVP8i+$l,(Re(M+u :F(RIFF)wmas,GdV `us,(vnd$BCE'ly 1999Samba[y)Mu B_0(SMB)tE#?CA*SN'CIFS;.b+ PC- t(*sh !, priZ%#sC4/HMAC-MD5,Logon 1Lhan"is-bsh212-38f-2 (P D-J)$yfaiorvNnobcy res@1Ϊ 4 ܥe. pyn-o1h޺S5eQ IPV6 608 1<:Ҥjc%Tse,?$p No *?2h/M.(KVM/ v sol) k\&n+'//qemu-kvmEN&-sp+X /k j ?c a+1r%1 :(7.2.0)311769, 3580&QEM=1/tege f|i nc_!_o _e _i 6exha\c16aACPI ERST:,s9$&t_or.e417}kE(Embed~g  UEFIW Vi>= L{pA64-b6HfirmwIA~:ssl2400_5typkfu 0X.509 Ge| lN 02**& k2SmmEntryPoiunp"SMM2p*1!57- n-De  5I5:P cR\PEM_hbio_exD4"DBIO_ _NDE,:1}/5RADIUSz0 lyigu%Rw AuthcD@U` .e) /c+ rYed aR^waG1w r:u#IUl` &REAP-PWD85=CrU:un* 1ASIMA60AiM&n4//7J2)ePI4 NorwunexLrn41A:2=i:T0s`7GOAWAYM=4N=h6e:dmoW u/pi:5957Y&3e 4(I s~?6i 9229rxp/syxsmi6+R >s pluDUPuCo-PilooDIeta@#`sem pm PRe, PC*bpftrd S>da,welsa9:>z@8fs-w" T 9 si b>s 3 @XA\Hr G&;y@mkAcn3g:9p\AovP &y/1-467b=@crd NTFSttcaO]R_ID_K'_ 0784da_ s__atp6GbIM+)sSofp -lT 7AT>PodmanujI7%hno2V _ DV-XV,1 lNl_%G$ab1 G-fkei3W ,faa!up:yW_GetCounS\7()xkb/.cFXkbEKbdBy]%uB$H283ATrSwapF 9Inputv_D634͇IPaUngr`H1HvdiSe,VoNHy֡H2HSth'Pc,s you\)ea^3>RNE_iBscH ch_4sp&P4p;V$KlW$nQiOiy Do ;c - R _ rJ/tlF+AWkflZra m__adp(06>}Z?FAgtk40I ?2-$V74Y3`]5BY8Y WM2eBif{"cc.$cêRn[JITfE]923]حUI Vp=K3$xƢMv hD4c5# ap<Y636Avy 691YS OpPo;ypa=HcȋyPA79DY700YdnCV::R2Lay} :Ch(H5y:)UerU6* ,N1S3>i[1+pa( A hGapsf2)f\DR8entD)otFlagk@}W <5n:7Mako<@N $ te1PD2a(m(ar,XAXB'Q:i/B%maximumgEmU(EEL8K$a&0F}&PoppBw)PDMEKPDF)I,&n&Evi y@JBIG2 emalѳ}38_4:GS,(:(B9a 'M6M]s.@";v(FgVer1-9s-gootI9-N\<-C@quE-LGPL l nsÑSf7n3_mgoska_d%Gxp_wvpk_^-& 2M2,jH 6~ g)eAVI&E-2022-1921) * gstreamer-plugins-good: Potential heap overwrite in mkv demuxing uszlibcompression (CVEk28kbz2j38jlzoj48jHEADERSTRIPr5&rp421 For more'tails about the secu]y issue(s),gclud[ impact, a CVSS scG cknowledgmsnd o/r relatedFformat,ftoR pagm lis,R&ences:. Addi Changes:Ҥj c%TiseasseefAlmaLinuxp NtsnkNfromΎTBerk8y Internet N Domai~BIND) is>le#fX)5Sym (DNS) protocols. Ees~rvG(n8d);olrary (rin2f"applic{s~uwhenXfacwith^Ptool=Wify a/operat r"lySSFix(es)* binܡcarglegmay[veygradep婎79M^flBUPDATEAquest_ᩁSE3094EsenDspecific ?rie@PcaSaP736;P>podman alcontaGr7Itpartֹ<,iich$Ofv. CD#ceptKubpesggol3: $/http: exrve me;y growthNa GoacdTTP/2741717)ecrypto/tls~ticketsck r5_H_addy629@sko mlyou gp'ԤGgiige+G layQsignaturc@ f PublKV fraucT (PKI) undaW l p8irlbyCertul ;pki-: W# ` caSrgen_DirUX,r(n2csUIDse} \ RSubjfiell2393nYigh3ndsmseDs unex edlyx;476mBypass afe.dis<9187316>f} edr?7?di zero8>P engmvdyG9G3buf{fxB20ˊpasa`dr`H47HinpN4N> fu5 EC mpulaTagghIJFil (TIFF)-~}Bp.c[57>-of-`_tcp:./_MxQ97QexctigSasShif24bm /͹98goS^leSW9sS6260eSgg% XRRGBATGExVm W;pKI4645IBb  TAG_INKNAMESFNUMBEROF$Su3774zH32~,0Z>LXS (LFa ~I! aToJ, seC/pptex siL}fh or E  impriz TVs-Exhea 170 Ul:U e5 xy ou,#war acybi2880i: hHl error}ftGOAWAYM7664Nio/f]tNexhGlob063É2 /B2Be`/gobAD .K NewfHost- omX-Fed j2148jrxp/syLx:OKu b +˹: Ater' _Ibmbig^ .Float RP yp? p.c im iorpo#_l8=GNU EBspowmul8uZmjlf-docKedKB/Y!ۻ -feWwscrifu:e7p)vcaplȩde-m!newX emt loc^ex0Tvula593A !N:q%faNI0%8co|h#" s# wy'-i Bfigunin.lonm$a numberuproa!NI:n2v*Il m.la<$ur%s a%'~_1un$ng[cYg,(SEC&lc RDe((nolump1(NRespLAL)0AX'wiha'payz to!- r runn}oMDu V'*5ethLrm"'e <*-cy: yleo19=?PM greSQLO n !v+t - ^)*pKsql-jdbceF.jareo!g5ms h:aHkpre vstatduinBe poUP946=HnML-e d& ( ~}p ?&䲠fo beu&p. brh$!(hp (8.1.14)XKCP: SHA-3745rOx'rcookib)d '__'-' S35g-g zOOB "u!;"*tdfy()XwXPDO::qu$/re|ni w1Z1Zpoa 3Y(gzQ&=`%+-snmp V'1(<-M SNMPa)X'-#ag?,h8 ~t (S_af;do_P optK66KIGD/ű\v_aclLP36+)jQ_p$SguV#8 u}2euy\A]{ fCdev,o!_ _y5QUSB-CbrcmfD<31_deinA4vDou?._2MB_gtt_%lt_<p_nf70ptc subGal attim41l2(s+ockco+u_i όdgig niYhemc_rcuyoclo7+et 21 .r,0b-IMA,15#d usb_8~_0 rt_x!/&* }-8JnDbandront<d SKBXSA-4Hn&mZ_rn ()m ^VM_PFNMAP /sosb9e TLB91¢flE35  are I= 9 KnV_PMPTEDm{oMt8vl 5dfg8<1_upd _~# 416B(f!  on_vmareG270]ss_(l/s# 7M.B 4 _([Db5on3 P2P-deO#HĢmo 5375 c6H9HrawR5_p&_f ' 399q_gr+DG590G%P h;fs/ q*119{tipce63Q >R2P/1V7(mf|u4sM, FeLDAP}| W"_m%cha-b525QUggev?.p)M@35P>fwa6E9L;h#7w`4 firm`n:*l!adJ ;/etc/&/ f.cf%[2F:N?3rrty e6ot ?4301-@2-@=,1ba~ -#\ MB (SMb"8CM0jI0;I PC-=) hE,ZC.6 s,(4.17.5).NZ#21"2: GnuTLS gnuz'_rndanQg?%pr+ct'316.:OSS# kiIat"T SLISL),z2*(rP,wt?-l-ju:Nl-purpl )r3y&ss8". CipNID_A<,lrt35A5C;= My-J, thB- ' i6aM4dae (my-d m!AH^'7w+0.< 77731, >:#*[ K6ed8PU,r  p_O< mi1TOVR1Vƴto$PPd$[9[InnoDB#I60ʥ,608511ɞ9:N Ha$^7@q0_3Re%V353AU4 9T0BT8@T1ʩDMLNJ 28_%T63AT4AT5AT7ATJI357*7.EU$_AG7+SA78ATI8*T1ATGIS%N* TT Z2oz A!RFRe _ O=Word%.)x72("_'N(),+~&!51 v(FTP Oea(?*9-3>R53WebKitGTK <#web re^?:vBpl:`l[205[2&Nj2 (dlop}Nas7ByFS, J4(nϡ(18C.2?gU-AFnt Exv/` /1+0c-ares#D)ig_s}/3C3 9]QN-LeGf7ޯRe)2: @Gpo:e8beedbpRi.uc>@9[`W%W9" R9RFe8APIlWvaglt CRLF 6Xs\\  CUC8 _uA on+ ^2^HfU486{6.19!,->2 OMozillaDox . G, "EKjN,z8 is1Gupgrades Firefox to version 102.11.0 ESR. Security*x(es): * Mozilla: Browser prompts could have been obs>ed by popups (CVE-2023-32205)NCrash in RLBExpat drivb767Potential permiss request{pass via clickjackingQ7QMemory safebugs fixȡ4113 and0=Z1on3ces3dueinvalid wasmMdeJ1spoofDuaddrbbarG2GmcorruptleRe0r::Do Data()S3) For Ae details about the sIue(s),[clud impact, a CVSS scG cknowledgms,ro/rlatforma, R pagm lis,R&enc:.TAPortabl'umAPR)pillibra0usZ BHTTP Serjos. apr-utilTHwhich%vi i+>>rfafm;HsupXMLng, LDAP, daaseE, URI': -of-nds w)^%_g64$2-25147$LeswannleuZ IP,IKELinux.6[Inet Protocol n:Pttrocryptophy b auMc;1si. se allow youPbui{@unnelrough ruworksdcxRrtuud (VPN)@l@:_g7L0570oOAlmaEs2295MDerbirdsttalone ma$newsgpaTh-upd}LGitRdiOibu/revicondjyGm wiRcezprchct~. As oc'hSsT-eOdel, ensurtha a[E@copya'revit{exZ$cco h/2not onlyu@)ncne/u#chang׫irficibSalsokt si~ =ǥnonngit:f% pelyf@po `gitp--re`hsytreꩍbe o t%V thle^565at *figurin whaam$Let a fvBfilew90#w T#t.malous/490MH:&>h3946h pl Q4y sej errt DH PCTrnOgalwaysv0PBo2 er , Ko;pkcs5 2Z UtB11+Sj0*iEMSW 1.2faul=itciǥP880~1rsa_'r!ver7n's*5as5d399- sshd4mprebmca,i52e7_= CIPHERSbALLS)E3 k;l !,of  xE\RwE_e_J{KPt Ev 23\^/nj batch]`e"3.KblueB th:"< c0;0OOB<%>'s XFS0H!Hi2cx_sli2_)_x()N9Ntl0I_g # o#mayKNULL ider`y8 % tQAT U0 - (p1768RPL-P IOTG/ S : cpu f!85?g $ ¡-R*kPT_l'>172jBUGiwlmv:fi9=QvBMe k:F672NAzh =?9 BQG93827a0a36f2fd6368a54a020f420c8916e9b [KVM: VMX:Nr_vmcs]82blk nvme/047aE753S ,'sE s,beesrW;y lth2 h s`70[-rt]ask8ai6e :1778)\Q622o$65hd85map_ _J59342.ws ^l&=occձhu]lbwcD^9234 wG_wd 6|do riUMunexpk ^ 9#9:CPU}GNSeptp4I1L"smpb: Sirriwwobbly,lab7!"nohz_ plHCn }7D_Kkr"caE3Q[al-9]P2^ FJ: [REG] NYinfeopCOMMIT5.$4ERR_DELAY \;$7Y3s"ev 4tax: '_l8d_c_}_rt_5'" b'_ oNg,hximumD V'747cha{trpmins,D/K /zh_CN/G/mc-number.rst8247cifs:7smCp&06l9-1aefc40a7fTwrEun?f= urn/!)_<_nܥ904x86_64* 2nwil"*lyn g"kvm-g@ 25.hv2"_106{&;cmd/go: k $a-FN%ycA94 g7 ee4ecfAOtFbnkb(sW5W>::aviLtuid/gidnQK N MaC Ts "G!!VM(6''(z ,Cnh* d$c4ImU-:IFvg, uA089Gh<,> r% s shbo ediqG,fluxDB &hTSDB0g:Sount keD8 D OA'@+?b++9,+9u+96I u+CSInMAr PdA >hodC 9D6Di:20D20ED E^434U?CRTC672!%M omV9f KmAoSpMon}^0N25, 23+oNFu,crJ? NĬ7jdk,J VL? Enonv+S D?K?: ZIPQ[a(830L3zIDw('?y#DD41DiOslae\-Z+on4e531eL@fbuzz:oO(n^,gHWAeav ZI519?] i7@N4K2475ŝ0Harra}d8tege22K44$&P o%n%%er1+ res!07, Z k231,+77+ o}04 InT ll%-h2ǽFfa1)GaA%ǥupreB{?;,;'jm!(beon\=&ui-c Ibd7FS!RHf1650)828'.8.08*&JD[/y8u3x066xe^Wa$o$>3?.Yh@ uz%V?X9b(iMes$B"(SMBUo>F7IB1PC-t+ sh,5+Z%AgsE%MB2BetT(eDk9t"9$= #.ed"0f3ijhjioJ(ptw]Xs5 mY8)ed 6 :vQT rSnjV2& 6 8 9  5kcinM".""#lL8meKis/D CCPpoi'GuiP84Q-Y cxV99i8iR}jSmugg E&ky   s] CRS9SDif6:H:ma/&o7Gs aovYyexT6.1Y3Y36 Y40 2 +Yxml2e\]boxi, 9NOu:14%mlS1upCojxT -848IHashofZty dicboOcc:W;Sin0_s69ve_oa?P57Q82/mmu:^U_f_=N!OA9N=4OQ:Qo@ 3K:/P/K[YSI1v2$T miK' bl<19MCJ 5ejHOibrary implementing the Javascript Object Signand Encryption (JOSE). Security Fix(es): * cjose: AES GCM de7usesiTag length fromactual Au ca2)provided inWE (CVE-2023-37464) For moreptails about0sissue(s),Jclud ~, a CVSS scG,knowledg%s,o/r relatform,ftoR pagm lis,R&enc sd:.OpenSSHd tocolsupporNbynumbtof Linux, UNIXsimilaperasyms. It filnesfPbo!cli_ervero0ssh:motbde ex*ish- MPKCS#118408MozillaDox -source web browR, vRstards@iaZ, ѣ 6abilThbupdawupgra}©s102.14.0 ESR: Offeen Can(uld havepasscross-origrestris4045)YInrovalue&d dWASMilG6GPg9Dmxrequ viackjaP7PCrashDOMParsdA|-of-meyndi8MUra8whe1leasp oX9XSt bufovlowStorManrB50BMsafebugsxֶ8116, 15.1Q, Thunderbird&*Ĕ66mlookie jaBcaunexp%st^Q9lone mգnewsgroupxL|x kt#le Ext% ]SpoofuText Di!O_riD CharaW341D-Bus R enm g/betw^applw # s :I-wB"urvi as -uslo-ses4fac dW:-dan: rfurea itveg drivPcannotlO969I& toI whichas;maximum TCP bԩ频tuvarioppmetUDP cic.lre sL lay jitt ?a-gR liP3: allohazardJc(/ 3Ru5Tsets-sQ]BContlyR cH c1,P]WindJ_  {/5/ׯFLACxsFz LlAo-$. *i; oOgg Vo,bl80$cost/tCť¢ enn"x iny21-line @>"#J;m ed2,flac!#CfE!#(r)5bitw>er_g_ fun},7#lyfp>ͭ u0-2221kel pvaconȤ3!;any elYnS!a r *:(5,'&: UAFnf __lup_glob[f{hblnanonym>batW:~_:Hina cBrt7HjNFT_MSG_NEWRUL'61x/sched:5s_fw onibploit^sulX cf_che_iv'x776-T-fsr( ezmoval_pipapo_e()J04 \_@rud]a iEBA_<_CHAIN_ID-sŰy1R y3īݶibyid312T Os-o ?-Ybyteorde4V5001V/!JulaMSRs!S3sF*um163hw+mKC"ProcL92059!`sha)eSae' Q1 e Bug[Il 9.3 BUG] [SPR][EMFHF] ACPIs"swake,(BZ#802[DelT2TM  lu#D19TBSSUT &'VGA/DVIype-C nglej946rtmu #waibwok#)uein2_3_adj_p1Σ^`2Alma\AWS ARMgsl DMi$hift e2DH33H9.x` SEV-SNP g_$5+>Q Lo!  ne blo$lk_fl} _m562 /p9/rq-x ".\70h-9] bz)2169//0'N~g-suit d arch64Ps[Z]/w d3921E(FEAT] cpuf:l_p:3<HWP IO&f@a:1z7Y- MB,AMP(ngeMayay (ad)X896XZMDRA -Lk G2G Add5 -ue $1&Lap64s POSIX.1t er 6)[a15 Milt)T+__dupG 2603>j p_ct ? Keyl TPMahighlya/ tetW ewr!B((sol: istra)F"' DoS/ SSLn &2WKQl e-`&-t6 ` aP5Xsvg2%!SV1>phSVG)ʴogartu8r[\7x# hOs"/*63-OVir9Mj (KVM)f vizRX,x+zrchi"ureqemu-kvmq-sp0@_:!Y*at QEMU: VNC:I/O9WTLS3kelZy :e_$A. 35:@] rh edQmi \F%rWaG C DeHInimw19[a ltv] hot/unjmlx vdpa dNoc)%ied']n- dump'mshuts773(2(2j(5(EC urig`vm-AML:kacO09N.j ? }A4;fi@n-? -?yALSALL'; 4^%)(18).M8? 4409;d*CpolbXD'Modus _0* \P?mv#,u(2-258חEon&m .htru.R<~#6y. &S55  3  f5%i,O% r*9P'Op95$9UnIi?97R-n/8n/3Jn/3lvpxvp8'+in/H2aEv !gl_ CC (/u$Am,%m)ڢi%<%G (nscd)|&byplA0sT.1`2seq. G,D):,ld.soX?p g `;491QKHUgetno-aweK527K}LP;-8Baih_i @H$ Py8nacs i , -l ~yic4*dƩ} ^ `mphN21V,N5vy s co--pyp:R 40Gho> &ett8$eIP1p PDFAP(s4t myҡaB) pyB rUn:ltOSwinjrS/  fz#KiJ.6Zac1,QReL5, e9 y_ _^L_dl. ,2ms5llC a9llE yMw/9 D+vY]p# ReTet N 16eq#'-m+6434)  a@P e 6C,C1'M medWu'>A1 HQUVP9A440aDB>U, BSQLs. 8yzMy42}gal (2i0;), mdb0.5$;(esD. poinS@o',eysq 2gb40H1iXd+ OsOn pI70_inpl_} _@v r0a:.c24_V. [->g< _coun == 0`d[0\2\6a_;?)$u6lectK4K&Yi35_l7u((::  _M9MJO;CACHE::o\"7fiel&ON9Ea_<7t3*97fN87NNUB?erjC_db_m>:: _wB2-4701ZBeQl, PNDom8(BIND,K)5ODNOt$Ee'(?); a re,. ($%e t=Y.M W,~;7!vfB W= hausntro.n6d6y,0\DO)W6J:+3+3KHTTP/2B'8Lr&J73TRapid ReZA n9thhxycI,%fo n\u4^ \jl-1.8.0-Hjdk #Jf8aEn on*SD Ki >h iMKB;Z!4@Iby some Zip64 creation tools. With boreleases, the checks can be disabled using -Djdk.util.zip.`ExtraFieldValidk=true. (RHBZ#2237185) * Tg/usr/bin/jfr altern3ve is now ownvâjava-17-open package (AlmaLinux-13648\jcmdMprovidP-headlessY, ra'r,-devel,` makt more accBiŘ51)curlaslibrary andoity for dloadfilFfrom serversvariouatoc, inclu5HTTP, FeLDAP. SejdFix(es): J}: a p-b#?uffomflXinSOCKS5pxy hWsh(CVE-2023-3854Scookie=jecwnone86) Fedetails about|sissue(s) imtt,CVSS scG, gmentsoatinsm,Rgms,R&encs.Node.jsaftwaɱFop} ppkbuilastscalaXnetwork applicsyJScriptgrammDlangu. njs:/2: Multipl enwebhvulnera DDoS attXapid set A)44487A ( Bulletihich addrWurilaw^vJL_Dintegoro poiecircumvenop52Ucodvia WebAmbly export namZF9333F-und{p514.Grafanan -urcf}urmets dashboardcph editGit=InfluxDB & OUTSDBzgo:P/http, x/ rEst m rLcause@6B23"$Varnish Cac*high-p`- le or. ItorH%mmeM <don'tv8_ same@* gaigiv*(siteignifipeeu p.vPHPHTML-ed smmonu UApJ4SYphp: XML ex l ,S:be2:Hpharv mism`ge0401-byOrraytrunש3 solvG0568G!6 whe?rd myarequestMdyL662LMis5Finsnt'nd wkDig\auth>SOAP247oPassw_ify()cways'#ha+Tom2, lcontef@ բ J(JSP) technologG 5rhel9/boxim T(oob*!Biz mmlineviron׫qiUB ' [ t..wMV t Op of Podm&st =OCIFTupdatAWregi] yJ  Gun cKfol s p̣I\y.io/ġ(ed)C"Jx/ubiJunLnginra:agD sup ac y,  usaz g4fs-w pa s Wins 3@ɪ-Hgausq&mod tum2"(VM)k8NTFS-3G:{! rexNNc73ma8a;2-40284MozillaKDo0-03brer, R Wm: aid}º115.4.0 ESR: Queue diGuld w yckj5721)WMm afezbugsxP119, Thubi{l30lvpx:ysޡVP9 o+p(# LarGL dralUah4E?E& nsBAatURLsB5BImpb 5ckduGCe^eг.qAusrooffbidVc p~ ri lkmգnewsgro/L1.NET-d- frgim  ao bF WC- API1 sev lͣitp CLRZa N0sd`^t Zw.8dU'VSDK 6.0.124RuS 24Gdoteni桨iB C Cep f tcKelO36799P7P13P3PmGho sus!%o|P1 PDF^.PtKss4{  mapcҡaB)$Qye Si0: PDLHlb#{rG3>Squi+ cg ; #Goph,IsSQUIDV:3 sA68V1VR%/p[muggl_/1.1ICV6V5VdʭFT? 0pip.#sy=m\Atalt %=tePyn. Many foun)I PyPI). rLachymVP ei&"P5IsXs"iz"p: tar@&ul aJ07t!5I ddi CheҤjc%Ti),SbR NoHkedE((E]DQKit)ro o" UEFIVMs;(alr64-b3 Hfirm IQEMU~KVMedkFun GetEfiGlobalVE2B;valnotDxeIVoHw[ (19-1456Essl:4*_ASN5idrfi 265L:X.Org X S +icK-l #da f"-fke%ical l rfaa up:xorg-x11-: Ol Use-Afd-Fr=LozPr"leiE,(VB 1$= lX  n7X W W2.UEbejOIr& :F-(229)/158761)ƌLibR7( 0e$RAW0 OdigitphorRW/CR2, NEF,<DNGOs):E 0 __ ::gs)i rc/w .cppE1J$142F4zI_,_ idc7ID Conn1~ 73 J!< enyP-?/iO 2(Rp:g>7To_v@e_r_>Ng)K#2352fNULL) der{b3OIDCStmC.:;I w&"u;eI4286B89K5elA (K:-Y-u5n+AV'arcac!qemu-kvmb'-Ks(nD)-Nu6/(8"08089~Mcd-eh =DMA rera0 (in% tes(ܵ768=Q?64kie54;G@/qt-0-E!rep}9aS 332IFM#W"G2xbypasǤrL$ic F=C$ ]v4410v0n QXmlSR37369>i =8197Un8iXed=G3Gm_usPerEmC2)@# cloud-3%%5 !R. ' ed 7 9to6<,\Ae|!nKSSH keytodO3Hf:nsiIj$,b%poZnD 178A GNUj!bN%1GDB)5dE#,JE|C, C++YF!W _ibe TH;J/dm_l@EdgKm*cC1>ACCl(twe\6K6l!3 CF (OCF) j ;r;,U;nc(ootMMs `/r/fs/c3`R 5809Fv mu@ (rH5B#99O3S754SAppArmv'ed`/Bc` ip <s5m;4fic,figur?IZAmsg8ngbfOes pB8' ̋1+79i@$ il=p&k-])orLPB>Is' u(Ul7 u,*9Jun 'o0m*/havhyphen2. !1.Ye%ly`adh ?Na 3 roM. aal>/mdEb(Ne)hHvys$< agn/ cQJcap- X?AS*./ ,!s$[Z"tokenSdPȰ3@0|D|Ń[݃9ÃeHYC\ buK3 KUenumoI?for@)U@7@S Foorigi.UbB naps1sN1 : gLi Go) NW5PMV 1g[@, Apq9A/SQL6$2ptb, & EU+p*sq1zDBs;|KJero{6Qi%8XACbjslG IEntO7=fJSON)@c%T(9J@PCpm!-bGvert# #reԭaf|<-c ,7ut-of-bA e#6mg0-127>FRRouci1eec% s TCP/IP}r2W`{BGPrOOSPFv23 SIS, RIPng, PIM9HRP BR, EIGR=XBFD@frrEar*D eek_<_as4_ y864Oby& OPEN mDdA type 0xff0302>digp+__/vȏ18'Hdaem{*P368y==mwi}-in a~ ayzerG 3Wmtk+oM'V}TPSorRwa" 1IEEE C37M8Bnchrop:cG8GCp2:2Ci:VMSIPe=S?er8ƱXRAi389>Fzlah >O$alp=qe8Am`>tMPc l8 C 8TiRN,{Jsc7h onox2>cM;V$KlW$J i,LDo8#;ei@)ou- cd4(iupsTt -[dc K517ee wZDq hoX# or^s{5fv.#!#Kubw6tcemWrou4g ^n[397 C ?+-b[66nav6dzccPPy(AMQo:balEklows you to communicate with AMQP servers using protocol ion 0-9-1. Security Fix(es): * rabbitmq-c/lib : Ins.e credentials submisT(CVE-2023-35789) For mo1detai-about the JyArra8dex uHCalcpar _950L  1833R docu1ltp\ptIFsP225=Fp[  buil4, mi unn boxed7 f(1.12.8 2179l =4: TIOCLINUXoseġutWV rtucol810gM?NSI6ro> anus( iser bpa1=ornado web4q synchronw Q]asc 7 non-blocFpmtool % -t:ireb vulbi1ScFWHZlM figul370@H dnsmasqI D-lT twe DNS (Dom"NS()war˪?DH] (DwHo C P )i_:!fault ximum E.0 UDPetzat4096sld 1232T45=TWebKitGTK$+ ' pbreGengine :Bp*Fkitgta  /U 239 6byp SOrigio+y78537P .5bm 9/ّ859Y64#65#67!666116Memo3rruB+lpQ288 crafuO5793sd gr s usU5 rreeM198:plT fcGe clos̿3813\d9>c943,jscri A403tturL SE@ eƲf45>O PANW ry, n_ Alz`D 3:'.pmTesU tn ify TLS ifsz} S1484/h'f a yipul TagghIma/p F (TIFF)$}jull# - derLZWDe()3/_lzwc1 Wc5 aCfa%16Lm [Á24heap*OaE乳Rj26965kBOuv_en<:D+qbWKAmpurpof-^R0F-/q reus|fur0u9;gi% -5p%i0qbkk_*%997Anb;tGqcŤ+[bC&msZ(%3]2)s+Ka +gf, ld mx3copydump, Ea7f;",spaddr2l  : NULL_bfd_t_get_symbol_v%_#.seg(2-422= UNIXinZS[ (CUPS)P'"p*^ ,ICl-q8, 5Gca*N$=--indAc<6Cs r/7424=GK%, )+9,,C]>,u -GNOME,%'lo+-3 gf y =0q3g: GVanaf'aeQ0'iQis_nl\ 94K"Wg_vX_bytIp-t\timX>so +Yfpu32$Ŷdeseria XcWpec'[Y6Ac-ar[sH-*-) 7 [n"Volv{API.6P0O09.1:-53U-_sdue@wngth`r90Yay U0[3in _inn1130DfAuz3S!ra;l#.sQ47QAutoT.yFCARES_RANDOM_FILE pi~ \M:|ssh>rSSHftx"!to.#e ; re7algorm gu(/166Z-zZ*Upki &__signB26:zVA9A8A(A>$ gmpMP( ,piN6ae#?tegClG{numbffp. 1 mpB^Hrn&  / s1-4361=q?c1bas8-8`4|MZaiB#MBx :+8&IFS;Z&PC- bm to+6are3,FC7@s,(4:.6<1x 1F2q9))J AUTH_CRAP 212@in 0dssvc RPC 'pot 8' 4Kn uL˜# - =T@E=Durl1"+0buOfs$, FeLDAP })g(1J%4nީ*- 753դCTELNET-IACj;434SFT:~%)y:4: weill==pipr tDn-%22%Bftw.42 . M p fk/' PIE(PyPI rO#acy7&an stZ Dei"P5IsXs"r0z" y n(new routpaC-iGp2P9edpU,cN edrow( m!SD f/3piBC decc r s;IEc0sS 7l to>&: Local:tPdou= TGS cT#=AvahioSDi0v MX;@#do :dly-˺?>s502® 6edTDBuBA2$=: PDLHl@%4C&R4&E-jdk NTJDK 21>2Run5#Enj;on+SD]U,I?:k Hx86_64AVX-51K831:1$.TC O9^" _W d09dB;""sFhl=Zip;h-'2483,r tIW21.0MrB,3u%=zip]to nH$arr ;+k1,z z-"h ,r ap pbycre#Q W>ws 3t1[-Dr.h..`ZraFieldV= W OE ,'prt ]jar.-S()S,400596,t D)8 MB}u sbo:MJAR31(rO ;F16d(-14?KWTtparHu<6TH6uncTcXo 8j  -.)ReSe(RSS)y%a rcbefQZ kl=ݼ szJ hpVAM7VM) tttS:9IereHa `ge #is@bdt &)cErtIDv%)QH6C &s'-lW&wofsű-in0!.jsap&be>WyDShvve5 G.st ' ac>ǥu:e( g"um*3,à=,S"on*<`?,4/usr//jfrterNs[V>519]jcmolNQ th-T^,mt,it$acy8)@ smbd,2iyx d+las *W6-d"ued-onl l 09R"rpc9=o" M` (dZy w[e.llAD "h".DNaN;i-OCKS5pf k 85aScookiSn88Squidg3cNg/S,O"GopE)lsDDigeA 684"IR%0/ ponseuggREPIC#I6IdʓN 2.U!7d-8^9.aq4WC_1 seviGwi&pCLRK,dot:Xd)Wr+XDeleVW:@Ftpi(604~\SP B>.ZWBlazomsX55CNew'i`%<sEZYV  isa3pedU'k714r4. {62525w^!@7Ԣ:e uVM6!9Vgn>S 5KonlHD #pe3cSc@vm-:1SML:k=540= whijf!vm!--s -wrRf | o~gt;D3A589Moz,azIib$)alFm@sg#pt.0is0sL .5z8Z+cGL2@itHoF62oE-2023-6209) For more details about the security issue(s), including impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:.Mozilla FiDoxl open-source web browser,signRfstards compliaZ, per portabil. Thbupdšgrad}vers 115.5.0 ESR5SHFix(es): * : Out-of-vnmeyCsWebGL2 bFramebuf.((4)OUse-after-freeCMKSP::EnglC5CClickjɪmpr+tsfullschransit'Z6՞ReadableByteStreamQueuery::B7QM3safecbugs fix9120, Thyerbirdl12žSel API wouldFpynt{X112ima2.8^InDr(rjof6ive URLsrtwith "///"QTA Runtime (APR)TbreusZbyZBHTTPrvjos. It via M{C atructur#CrLinesapr:egjovTlow/wraջ#_ede2-24963rlscolci/hlr / A$sticese lMf0er unchTno}beAcibly l-rpvedomܥe. python-ce-fi:\vߡe-Tu o c 7920)Furl>3:okiequeheadn't%ippducross-origredis38 QPixmDx lipulnBX Wind SyYmCairo._ O_sa_or_ op ob s was44638sk o mhlekyou p^ A,zgiege+G lay-Ja to ctvfylgol ypto/tl\ӣ=|,zlarRSA keyX294 hhtml/npv:ropekHTML-likJ mc u x39318hi b4pjc whe5cpost-qsham RQUICdn8g21glˢamitJ(edmQ>YrunClightwe, ROpCmF (OCF)a| r .u<_pbuildah Lfaca 0OCIAmozngcen*torN, eiBBsF t +apo ;V$KlWnBin0Dof; B bo podj t sw, < ,ii appl  fv.#ceptKubernet)NetrNI)XZsRs+΢uiemlug-GonfigJnninLinux,ea numberhup aN)cLtfx=p"vlco|sN6!dele'PgreSQLdv;d-p*al-s(DBMS)dsql: $; garrayWd0z5863XDdisclosureEgg^funcEcallsK8Ken/@substits@quoDn5ĭ394bRol g_l_ba an a;uauser ¿7s ERGE/ae,c!PDATESELECT rpo TĹG#eTs mU dgl h} "t pK"; gVer1-% O-bad#` %  jV1 !c !-44 )IMXFmuxer f$vuln-"F4$'$&a ilnewsg"p@i&Lt&6.0&Hī-acl& <>DrawE9sIn'm*o m0761VTZP ( wahown idePGPZ&Symn ksfol\&䡥!ex4Ro'knsT( N'#(PR_GetIdent(esLB9BPot+#duꤙVSoBridge mG_0A::Pi(void){Oless5eq#eDNS&z j Ufi^behaviorJShutdjObs>'()P&Virtu)C*u(VNCm(! play3 S: ss&,iew G&vnu no)lyma e t(ny 5~nJ"v\tY8'(i +u-sT&xorg-x11-3,l |XICh9eD#Pty/RR5+36kg 8-r>s/tsuKB;ton a637ZRͱ*Pr647 ov/6v/ؠ Vun'iz+En 80YC2pop >286Squi h#-=]xyl a,"FTP, Goph/1=s: Den صSSL C4672INULL -!e<+r gtocol5N8N-F5fe9 49285Q3CheFRe, "Re6:Ŀ 1:.")~-s bJrtyo6"8ue.GO-1F7)0Q1Q+/o7o7o+oi12ZIPAdust(82'23\3i W4T par%HumP(THP)aun-bX&$a&,y:mY&@%fNto g/P6eSe! (RSS*a r8be)B7k&l)psj%$LMorTsl!3ntqd*)Dig\ SOAPo3247o=Olo3K65r?iutE RH823Hpharw"/!040Pd_y()wayN"CesoU h QP] rUP K-l[)X.7cdUHl+ al ,( n r  Frpm1OCTOU=un))1-3593A:N ch&/ch'/ͺPU 7\OδU8Uшt{+e+|%68o a .s 79?4:TNH &92Ni@%,e60A!tora leU0k ?TZi#% vEƫofiD. 9 oYRJflexiof4adm5,straZhae5R(. Ds 9i@7-t s Buzz712bgpd/_.c 4 c@Our.AN#el>7>rrF P2Gly[MP_UNREACH_NLRI-HB%2P>7P>7l @7*pf@{cL:#de ` 6&{GIMPNlIcaMciPE `aoQBe#,.Rw"992@4<7w<7AwsBudo packages contain the sutility which allows system administrators tGrovide cerFusewithQpermission,execute privileged~mmands,oreCd foru ment purpose.bout having]log as root. Bug Fix(es) c EnhancH(s): * CVE-2023-28487: Sdonot escape'rol charactl0replay pS6SmessN42465NTarget&Corrupt`of RegisGSt Variables.NET is aPd-softwqframework. It impl%+subset\ϣC- APIskseveral new,itcludeICLRZaN0v sd`that addr5rvulnfbnow avail. Th=pdaU'VSDK 8.0.102Runtime2Sl9&dotnet: Deni塧ServiceSignalR sz(4-21386)>X509C=ific2@404) F modetbmeue,rheqZ,VSS scG ck:ledg笮o/r rel?inm,fdR?gm lo,R&ecsPostgreSQL|nvobj$-p*abase(DBMS)pdsql:n-own'REFRESH MATERIALIZED VIEW CONCURRENTLY'+biry 09856Mozilla7Doxopenurweb brxer, =atardKi,f port'Thbgra}* 115. ESR: Out-of-vnmeyaqcsne154KAl doguld e beebpoofn٬siO7OMsafebugs fix123, =Therdl53lFullscrNoLhiddbyl elW8[Custom sQobse]^ =L9ouХKre-iunexpecly¸ltointedqG"0qultipaHTTP nse baccepSet-Cookie head㩪r/ Bh1hInc Tco ge& n 32-bARMJuJ2O ,lil sgroup cliL" na validengeivEcachDNS SECwol. bind9: KeyTrap - ExtremPUsumSo> 3-5038OPhaK53 +n r] c exhausW s]86MVirtu NP mput(VNC)rtes iew2cG ktopavirononly=m&eRereunnRbLfrany 5I3rnZ!vȦYartuigeru-s/ * xorg-x11-9: t\vnc:jp- dfovh ls6 D963Dj Why?'spncyeeVquir-zerofigurss iGmai{&exFsiAplug-i"iuushellrip. Whens10 MB AM l-App-cpanus>e#:: DC[E V 45321PgAutheDModuljPAM)gw a7policiznebilePghaeH ammEpHnapre(_LroACBypas-00kl/&Lx!,^^T K: bpf:h R100 IUSB:  :s7840: crashWuF2244Fcxl/K&-af)-  or dec rutd_50226tu M %;s *o1 Mrofi )x: `_``}-fS,sndv 42336)si5san z*`t{_K` pa 5 cte()` hodp7&ebKitGTK %>rD eng :wBp Lkitgtk:xo bv437orna^ PyWn`|asynch ouslibq   ,blocFpmtool y p-thi cNsaDoS528)+ 8RJot0 is: ۹oxtOPGP\rypyf,:iCSP' XWExppvia hp:s"W~VMk- o2062975{T?w!_vy+rrl0`7]pe#ATO#s309VFALR_v(FILi6_Vj6Ds6_%458JEw|*.F A8925Acgi.&k.̤M0ol$q7q!-FPM L,1x(90}$#Z a'1gO+m9Aes+,e & highvey'ictypi-t\a C> iasllto w+2ow!;$:Us(v ) 8@6(o quV1T hsL28[U   C S T45s. es F6o'IlӡFuCe 1T59LGSt-m?Oea"+i6o9;ph sC@7;FgVer1-45"-goo/aA a-7q5@qua- LGPL l5 ͘:4< 6Maa3ska/I&;muxeZG47540)aOOB-EP.mp4/qtK.cKx/KKu"_to_s334_1aM9MnullU der6\4_gdk_pix'_N2_flu2b613beX# MP4/MOVOԭs)1c;. o?sč06'/9ed 5=: Sc.ck-:vos_)_iden@_et8)zRhOgp< PϻNopusHe_A@O`(  (IPeC LoReeIm(@9"3url 3v3< O M+' POST i |S"sZody?st p9 ?303tuxo"r@6G#z801;mpg4Fl bPMPEG 1.0/25L"lxr !< 04]cur2  W=z$"|'Natoc91eLDAPZK} 7"IloUi2c% flawq62M8SNR ]aVe=ay  =L@ UNIXsimFV s$7ox0%boc1_jssh:H/t@"a#n B'EePan P(BPP) , *.T$inj%1KEmetac3'I13qS{ oGG(1vS"http/nsBW(D()rRe7C K 3 393pcmd/g3=Fb*r6$mq 2Tomca(xBle\#H @J Z4P (JSD_Jhno' tq: sm m "'-+T4R5054inU`J66* 89)1044UDF#1>N@RfDE4P4-2(T1S25671234^_8` :hI3_PVs%_sV7* 1$R\UN9:N8$N  W,rewall%_$Njzst TY" !29"Q3/$Y4Y!4m FIb#S30199` b32rjC reg(--s_gtid-mvl=OFF (Alma-uU*ahaxyb]l.,-:Q HBlTCPl\u:%UʢIw @eryX-L`5022dQunmBURI#X9eLofKf/"A:Q:%ROx-_-RCr L>ig1TnapQa<=i :8rTqt!)_8the k-F_8_ F>23o*t_w_nW_P9#skeN le yeEiu ?x2v2ge+G &uPy!R\bu>ah ] X4 0OCIA.gt s,c,;t CGRN,G_%crEGGan F;V$KlWnsHq 3 closeen r procan exhauԡ|ourYf868Squideh-perX% xy chò web8i8"FTP, Gopga objrss:AnimiceDheaw561ADASAChunked!coD111DІrequ.C 269 LibreOff) open ,mmun-d?ld$-+duEvsuiteNkey ktop applic?ch adHcFoA sprsheep&ula edit8 a drawYQg. laO6,visimr buhd#extend 61866: vous flawXJIRA:AlmaLinux465A5 APWgreSQLadvR-p*ibase syamjpKsql-jdbc.jailneeJIsac *JDBC DriRallowJtta'in f ukPEQueryMode=SIMPLE159N.js nppkbuilfastsca\ myScriptmDlangu. njs: 0unedwithx(c{7 s201IngoPv [3Goybp{+ *T:-fips/ssl: Me0y leakconrypdeRSAylocG394)MozilTFiox- br>ign-sti) s li, [ z7  Thb } 115.9.1 ESRh : tiZ` ag L38 * : CrashENATLS method(07432JITsfail savmturng8r9n Armv7-A607NIntegov9l:could hR^ hs wri vp ethgh peie,189Y mleXanBleenbacPKCS#1 v1.5dMaxn) 4680;5F FExpatCaPXMLcuGeE:3g}kens gNa#P52425)NzEBl 87MRuby2geped,orG s+"has= tY:task(pfofsbe rst.m <(3.1). (J905 3/cgi-:jsp/eCGIP1-3362?:.qM3UR3353-'eteiK[36JӏT|Đ Bug-irb RBhdepBncy! 'ru4 not4 \IPS[u E 9R3$I]eKha l mon-bufHM6M%tiplew 0Xpassdui? ŀsB& sanzr1rH wck--p-fs-ժAa0assid()7es drello_uVarni^CZElertsto £Lso:sn'vcrere @= , giv(sgnificRspeupv/2 Br0 W pAzmay&=4-301 #2a \!es +"!:olAOw }nrdefa,, any8 ysaPmfyrL$ c"+t?=""?#rol-^cer; no""$\ eiY Vit"im useIa]P5%Zf" WTf a Gn;Bloh#to $8953,%+al ~(.in% ?gjk o ipupn fh$衠mr$quer?.dǣ {meisru (LltogeR g=' "/etc/,/E.d/rt ." e} w%l, "R,%vwo di<ah@limitMKa: "/ "- "yes"se , "manÆ"{Upxfdvisvm kB+yziZ ,Ȼ^t!| gf" "Jma㺭pua()"3n dpipe)",̝ dt l'^S becaitfe7#LR| bf 9" Q: Xxe8"a cum r$I614  5Berk yrn@+)*5*(BIND)&C,_*(E)t5*.E l();SO(routF sA heD*W ~;7tool=zais l** *\:+ o:+NSpec_ sy s0 l tooKa65C`E~ bo64_-s-eb|sser 7uA 679vD%5RFC 19184ae zo7r>“nxd ”T~51VPOm@| yexUЪO44"$jc-1./-jdk ?J0'0Environ*SDKit>: gEce7c(83198510MlC1$genO8322122XXP.200.|7 cII85IC24fP" )_t_s1ray"75[9;j111+h["\lookFO57{N'477+U22+ͣG _h2 AphttpdulN;A02 (h2+h2c)c4 wngB22L2.4% (5ONTINUATION;{u734 A&0nutlsGNU Trv!Layh6(Gnu)g, n&%phalgorymsTn6SSL,C*D Mindhanl+%883NJD/M ,*a1@a110.0b1 GetB$,be^wr*38N#0m* -mizeEX#JWI/drgJ%++tgarbc@$`P3Nmp"Rd+i "i)cu+ ,-o\Typ{%åVPV껷AlDB5 sX,-m2I6},,,5,10{,10d!]^0->=9l30?y7x7/, x/ 2:Yeul52~>sw3 QIP}ah  a3+(OCI*e!G. Amt#cs4$@)3N, "fG,aorAL]Cpo;V$KlWnsr!t"at>; B : full{'pe 9f3fGi F!SP(LF fB-B76os,E@' G.O'in$ }'" oh,VU#421644.;` I7&w[N] OS fac VMcrST !i%|OosI% hood--Y,aco %GPG9osi^e 30( Ad nChes:ҤjIc%Trese,Sd }/R Nxs HRLoGTK6!lreGeng7#:B/ Fkitgtk 'NI9 tc!6K=04=?Y24>YMYaJT ,,:U!w145vU!r Irb{lou&a-to-,=cS+983 9gM aRecoMPvXGSX35F^si9928 M.pmaX+I6 ZGZX+/cAZly| f pifing[6inPu"0;Q+-agIa +[(43&1n power 7$~s4DwT@ no 8&b[cx80 eJ,pvܥe url3364@stM$Z3S*[4AGtS 80jpysd-:>2OAEP BPyC9Jxk52kj4a29&riM4nXaNmxml9x219}xKl]VMk2KVMT*f"5'>o s7cu@cq;8/qemu-kvm,f3 mp0mk/Rt QEMU: e1000Rp_5_et_to_ge(34UVNC=4"5pLinf7_,7() 32l;Yi+IDE rpXKMBR6*8ũNULL der_-pHB_a66Qam53c974Sdi#0$H @o46= Raw?:RAWob2Odigithoto[merah RW/CR2, NEF,<DNGOs: ao-|in .T2@ _exd1729@` X)w53 "D5:Ds(2b_XkbRSyms?z(Ks:/_bx.outSubT6T#X=M? $,X=X.Org}pm&:|pm|y|ߡF*%NoNPMcuL&#pL=;IL:M (Id centr edJb:B(d tra /c0 eE (s7(&i ipa3.Bs[M ?61!CP/V>r2&A_s BGPNOSPFv2>ISI'RIP?PIMq HRP BR, EIGRPzBFDZfrrect7ngheLi gp_Dy_llgE do93T W$ngU_pX_QSS7 NLRIs[:p= 1358Kai cA  Gnlri_a_()d/!.cd90FhaTjleda| 3-' D3N UPDATE,E3Eaa Jf ORFa*6> py|n- 5!;P#!1-W"pZ!f;:P G}@!.i` YisDF6+rossqMQs 804=2b+ O#z=Ns-7DS&.") AlPdsSt~/PodABu,X hn g.D"!.W/pIY-lik in%31*h Wb9b!/P?))()[Re-C:> p2=\k/iPAXJMA- 1lULl4Cnha6E V-fkey$aI-`M Fsm/up:Ixorg-x@;# }"OiInD Pty/RRODu53gRs/tsuKB ton a 637ZRͱPr6478sHN1/Fa/^hpXI@P? b8~AbtK ilRmas dq]229qSEP&abe\GLXa @@@ =~hSXISV#YHier3y]UO$VDd%WIU0,y 8= Xwe[X Xo'W2/>C uQU*Z x7 L F (OCF) 7 g q 3 c io/fVcGlob2 63:!?/gzipB$I1IW/ߌ2Ì$/;TYSD"$Yaf[E(N3)/=Vsnd`9 բ1d s,/AIF AU,'WAVsrc/ 4.6au.cb#286=&S.Zs,1pa/podl@P=&fv.}ci= Ku3net\\YHdetails about the security issue(s), including impact, a CVSS score cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:. Addi al Changes: For j c%TiseasseefAlmaLinuxp Not0linkNfromΎTPros Manƪ Interface (PMI) provid8p+m+funLs fMPIdla. C ExascalQxRan extendversf7stard specifiCly 8ign1support st@ upe~sizesS*Fix(es)* pmix: rcon powtt'_\obwnhiparbitrary fs (-2023-41915)mq*Network Block DeviNBD) is%_tocolacJ.hYdisks9 -lik!) overNn. 1libnbdgusp1liwwr1uzS:licious4\may crashz[5871)?C&hisbehavKhenPreturn|unexpUpb!`2>FreeRDP@fre!2RemSsktop(<),ddhcensexardpcannMsJch a icrosoft WindmWinexJVirtualBoxy:PrqoffselculŴ*o DOSz39350)GNull Poir\C@9FXL1Linvld ǑOOf BouWeS2SmigS-of-Ssagdi_multi_opaque_/l6lgfcocbwvulabilqCrejSu018mOQsRinUear_decompre_ba_aN567N`gKiveY`k dueiVOsv9vbuff2rncrushhMsrwith fdput`8`U3*O/nsc_rl tI41-U12fezgfxbse)Xre}l_LumaToYUV444F8th'Pcenabto\ RN, eiBsccu:Pa< t ;V$KlW$n.u!va Do; B - /http/i:niS (DoS)Res5nsTHTTP st2Ansible rp sedel-drfigu , -n2 deployD&taskԩ<}sSSH8doe fjiw .aem)b % a 1ip(XTagt]l (TIFF)}2X a(G2[0A'9faf4Fax3En ,/_f.c1618Qi cp7407458Braw2'D117D-HcpS pToTi1 /ɠ622=Mut , l|"MIME e-m.. Ksx !s(s,.mboMas q#A82sPOP36IMAPm.i80=1Pythons{pr_, vjob-'nc#, peG,asse,hy #& type"iy# t6y#)C-.vc4wT& (}:orep/_!r.pyf/uH. (h/j)%tupl27?+jpeg-!b $JPEGWysoFo42+c(tjMk1sa*a $asKb betQ,K ?9-] in 1moA}1jdcoefctJ1-293>9TCu(VNCE0#+o-9iewGdz7enF&on.o(er}ni ny 5n$"wetY."i K[/7T p:xorg-x11-3: UD1buDaroU5F@,F3>wgk$MgO1maid 5]nsutl73> ekgooV k@quE LGPL A=P <~FLACF #gA* -yNs C& Auq's6yCA'ID s*$G5mier bv# .-GloPKCS7 c#X e#9083Gnjinja2hJ2 p p gS r<(p8.1,DjqspiJ(noXML dx :l\Cd? an$alk nd*ed :q _9 $ n H? $69219=MinGW (M9ma GNUC< pe\ )#C! ! tX1HD`!NbtiO#H-gdb/bfd/oni!fd_2l6[@157=8gluyH=zQ""2G#i#y1NIsDc#,t>Ih2+h2c)oMl=KgOL2.4 Peh#=: X(r/2l_K0u 36p#*Fre Rl$rb ĪE=()0Disclos 10?J1/: Sto Cross sBSc!M671Akl#3W!D1@. K *K:(M7[G-0e"_new G604|GC'w3ff-SKBs+ix_ _r_Oic()UAF~7h7 r!WroupUas(ofYa)ev'!1Vu3Zw XFu L9sDtnRU24rdma,mpF1r} ;577YK;douNhci+n_dSnu gbW846(RCI:obal)Fc)2886Sbe pUARTSETPROTOIGu$_tty_ioct*3fĪP45y89912IP_CMD_ADDSWAPU /k&fXI_~%th T.586Csmb:' :H+OOB "2%)Gmm/s1Vina_c->u s 3a _pe&c@_yŬ528F?A'Vbridge: /in - "_hae_&_-shƯ78]/:VOETH_P_1588 d PaPs a0Scdskb coo g61SCIFS .DeIVWZCq.EAVw%de Xen\ed_+`&|&569a HsEZ`oseK 3Lcklogg K:G4֔txB u ՚ lxsw:L<?m_acl_tcaF cO Ki2c801<1^_ 6Y`*Ba9}/wbar$@c toUma oC_/]60 ref=QUEUE/DROP++Sa?WMddd/a3?I~ -a3WIM B+[o aRK,BR,+fP topprYLnfinW Pa:aq 2rF _dns_Xet_ndao63 GOpe_labelCCdbu_t_h 5_ns/C1އr B2B@Ϗ>]mg&cxML(PAMk aR/to a7pol@1/[2mp'p'2 H Hcp _un S anIi23$ :NsSSLuE~Nۡ se :),TW M (LGt96a fu,trd-L'p7 )fcK@-SIV )r'a0OfouOekHyoci*enV1 9<;K* OqH7`GaeX^_JX9.42ore* mbeG9s& 6/POLY1305 Mj-sI&KXaPEPC[ 9Ip+P QPdJG N <<72A.`0-Sr6 ~, LSysV7LSB $ ssM Br^0K;l], V RD-Busiv.@Xs, oQ)(.t[#ofTkeepsDfe47.fcn]r,snapshotcWre? PsH , !4L=un U E elH2a?X yO@hIo:Y d-ir-c^Yysv2/-@lvbUnt renszonVfa=- SEC=y700=4sP*?CXu8bQ >.+er-:qxyC_/ J~kfe^*k/o8:q Etho@A @ 6009lMia+tdigQ691Ac?!aisZdenMm-borw[t^BT^RIBdift-Bϣ FYLHbV<2,RR>hbv$5oma<\:G- in%strCs\!85*q>podman  ss,e[ai"DMP(j'wi~;=a3atiS0corrly.bind: PreparNSEC3 clst r&c exh!t CPUurd@3-50868)\KeyTrapExtre[8cump~sv atorN387NSific rs query s`ya|aut-of-memorywdiua6516`E) iNS64_-b&asserR* duLuv5679vQĢ5RFC 19184vre zo7r>“nxd-redi”d~51VParlarOmyexcЪloaO440^-dyndb-sp:~tt ABhe0 FKetjbȳsi (s)F ct,CVSSG cknowg,rela: ,fGoR`gmg python-jwcrypEP s Web>WKS| SEnnhJWE)TokeT) JOSE Obj VdH)ndardsE:2ious Cu:FdeniSice} 8102) s API agrac^5 izcapa ie* sIng,Vr te_~edQKX:4f-by- error'+vL5esBySts()1441)Knegng_new0ngIunndoZ 94T%p :n9515 (sGogrammnguM{  r fips/nssl: Mkq edeRSAys3Sb&t/":' dRest.heMultip: FC5290T/cookiejarw wLnsih,Ȥ8s HTTP u89u/x509: VpanicFczf Va  ubl kegor 3m:ʻC,displvQ r Vhtml/p:s4n9 M medbr < estbn5, x/ 2:liminumbf CONTINUATIvfrs SP mod_h2 ApeEdulsA2m (h2+h2c)ttb=ng]L2 3:73 Lib| wIP,IKEU.iSPg:=g hyO auth};y 8seOw{unnelbghsBouchpriv٥ (VPN)9l@7is# .ShaH 0 np 8shN357MPMHnc9o-PiloHPCPXi V , 4acquiarv)anysfv -l measur>Cli-weCbuң^tŲ1makeet icuTwell-ceG plex  cp:posq zse} exUPvia p}xyL3019:L _LGrafZ L, ferirzdObo_ e orOG,fluxDB & OUTSDB J( kvuln +' bypas=10 6-pluginQ KP} gnutlsU T NU L(GnuTLSf,b ic s3~SSL, RD (M0vazde-0ne*p883xNpazJin[/^M xSc DaemSSSD))ad',cF bo meism9soSccI ")M!P,gA[MY sAM) PWow;hwJ-  lfZtousssq Ra}PHGPOE. un/sl3-375s*t|234nPscTotTll & dz16)Is7209)V N C u(VNC Ku us&view2cGksen5 on #onoa"whetvr i butny 5I }v tybY  igerl TcliHxorg-x11-3: HeV"r/5R cXI#SccgEv 108M)`GDe`1`U-aftfreNRenAddGlyphƫV fxml2d+ op box_}XMLu:@w?R~;506GLFiS(LF@le?$ao sasoRF Qtex0&  }s\f^o6" JmBN$ t sa3!,). I( *K:vin5 )- n u 62! e743 hw: amI% rai#VC*!Uat iAMD-SN08,L2 ffdhe*9tih inrduc0a2e5b909w._ed=1 l pairwg cy tsl 009mm/mglru:*uV Q(B[EMR] [TBOOT OS] SUT > ldX gonS3|te9(2 Tbo'OS O |$ -16v BUSYɄ673 m"te - NMIsi E30678E0:6f:00.0>##e<A+timC110N.js oftw}(fas9 s- T&JavaScrip>+nj1$92(fe o re" URL' *"5z Sm %ACnLObfu@2Pb813c-areOa__ _l 25..NETd-ԫ7? bTWC-$#s'n o eICLR N0 d`4)#rZ6nr@ig upd6U'VSDK 8.0.105Run5 dot:& u)ou 004?+ Y600Y25P 8*?Z1Zas@NI' _?c0KT, o@enx 1has1 p{',$_ol> %k"yfo f|have |Na rstmeB(3.1).y!,47V3:fG(uRSIOo 2(BRCE6.rL_o" RGE1Eɖ_Reg4e5*VԮ3 $Id M<(Id0b g80Ӧ:wT/ZH^oq/a ud rs5. m)lBgru"&=xy2 -|o d/%2Qt)+t8`Cz@X;obah0?0I/)C ute-].{)f-2nt5M a coll/";k>,p7(r$s 54t f w orohFty re:O pve1ܥejinjaSQ+ 5L;hXG4064yDrpm-oolJgemPML^FlOST; ot-L4"4;s b O ~Bͺh-.M!-:t_o &w:Pld-/</md [O.z]1852*Us;PM`ir#o8>O?fv.uon|KunetG$OSOB.¬MRÑ7GSA5YT<A =3cslirpCK2 tep@GooD&gViso]* .y-7ZmparC2Yvc-tap-vp9b$figu-%X,o ^ sosTX947)22 2-657y"8H,-n"IJ68.ExEPp_ !UC!e i,y|MfM SaboH.+were toi/s%0R) awYk1k/O/I! scrCafsG3G /CF F>6> I/7I/2iI/20) uFNp#s\ )bKA*eQJz:r[ ln&l~324{H{Gho]Ls- rXKP1NM2u u.Pfs4Stnoetm ϡ+)Medq2|hLPVP !TrW-Dri h1^62.1t6;M2QPo,K#BI9_v1auolAH/ES deQ$2G"65dlK "b87!f&,ns, Ls,y8 _9:imtWiU/Cw,5_~R+% "<l oE'nf.Tempo x2Ip)b/G zi8.{"-bombO ];GzyU crevi[ rQeY+GYY$sH 4' ' Ssk uX2encQa }/!'siaX!pSj8his/ais Z`_+(Ǯn|/us(s{iw!iɻF][e3ǥ!o!rgRtc s20 ,,W,oc545*qal.b465,6h'kW20*sym c&1HF+ct, a CVSS score cknowledgmentsnd other related information,fEE page(s) lis)R#ences sec7.TPublic Key Infrastructure (PKI) Co contains fundaalgckjs~quirjby AlmaLinux Certific Sym. Security Fix(es): * dogtag ca: token aunt;Vpass vulnerabil@(-2023-4727) For mdels aboutsuissu,cluding im5o$golaVprovide3Gogramm(u$mpilerZS: archive/zip:rz hlPof caZIP fSsb4-24789)Onet/MUnexpLehavifrom Is method6IPv4-mapp( 6 addressh90Kernel-bas'Virtu-ManUKVM)full vizsolu2Hon+varietes. :qemu-kvm<user-s/on_runn5 ms5at6 Zs: QEMU: 'imgG' leads@hostQSad/write446; _OpenSSHn tocolle1uppor,ynumbtի, UNIXsimilaptsEItթ7necSaryb!cli_erv8o0ssh: PossibmotkUex3due2a r^ndiiignTc638kt&3!,ny.  *K{mlx5e:"Dsprd bugj timesta(hnapi_poxextH52626)kBluetoA: AvoidQt-aftZfreemhci_error_eY6801Ycrypto: qi- 0olveEd AER oyU974Uxen-ntdd miakb_mark_fcycleK7393Kgfgadoufs__cte_groupW[smb:]UAF3mb2onnh_()35870̨r ly pkwintO96O: hns3: no/llow ll_nic_%_%pdl1 40 Bci->n wi_pumb_JIRA:T -2894BUG: unaefe faulccf16bf752f593ff8 [aTlT9.4.z]k35672k[HPE & ]quemergAMDi^ansllibrpatchpix6220x9]/ 4\/_de.c:51!\68icDPLL-ݡ71)CNB95schedpd TCtm v6.y764.) : SR: beb XS69TRFE] BOtmpfsswapuopU825#IsoDs,uws 5Og^ ^8as W .ۈ595ީ]G oc VFbetTx MDD ev"Z9083MC REGRESSION] bos: br z10+ ckets495ybnx2x*ch PCI qe,JurF k432x buildah i lfac>t0OF~im. Amoth'cews you CiworkRN, eiBscr anoa .rpo;V$KlWn"-a D{r) ;!  S-fips/& 3Me9ysk& ndVRSAylo# 1394 podmanv,f sortZengeCheckEli"ParraydevqT (83212114P[UTF8[zeB1"4B31BExivemb0lengTan in loopW98W8W (RCE)t-Lt05480[P200}?savde2106e4eOut-of-bosŪ'|2DO454W O1L11M+N7N7N+nN2727+u%Z(TIPC mkemb`(504$88(e7&isi4on&_d_dc'NQ/ge_sr%by_O''vÁX'c)hclgevf&nd_mbx_msgV9vC(m=lNdelerתbuf,Y2-4862(: j1939:a1$MadlyPngY#_6s_rw `)3mm/vmsfug(akeup_k%d["(aD"zone67$s)Us?%bi,eBrPTP WQ x@qtrocɹժpulMmD a_mapÐ85B f_tG#:P+ce"Sa*7avm*I* &rx3cLW435#w,iE2~o#2&tc<2sfcu'_Q__zerocp_twsk_uniq7).98S)d'_hmm.c:*src_pf ? 4\854Ir8169IlRracTxR&a`M r g-ivcm!an8841^,ytwT)Pif 3h%be2isd!-|2,o40x2:..ofUy-{)sGpaO95blk-cL-dK(iot66 Q #% V%ki d1 %4t54G9!;)xmlR#3QtqtP:Delayun7 le W!po 9936Y lmxws`e,\\ httpd;ApacHTSL$#8*fG; |/ ~v9em . @pnYdv2738m )DS !tity en uD4Dn8+er.A?7?PSSRFwP37E`bN o E](E dSV~:L! &UEFIW :Vi'Ma 64-bHfirm^#I#:Q:F2: gerq .Hob2ouldJHOB OR/W226edk25'ctTCP=iAi'{N=!5452zA  W PseudoR; Ge D8Lw-eOe8 -ty-e -ad/vsuq"ky)ktop,,ch0dHosp2ep #%&uve8nddrawM?. ,s6iK#but5hO!*llt(:9%cu.%pr!tlle *1t-7ȩ cMa ph,0Cuvm7i-p_Z~77f^5asynchEoI/Ob;Dom< Lookup '0t9at.@80 @o @5n numerh$3 D:rhmRzP 3U @80@@74p alsi0)fg]n-terack;edn'f0X=NetC IOEL<4418& 3NI^f.NFco st7+ecnF\r; lug-ForB1in)+%l~Su))a. :c2s ,selflp%ofl[0je|sN47:p{%"C 6alightwe,:)l+$.<F (OCF) 3Nr-.#Py) n  3, vo<.23e QI]8 os,P s, 68i vBhvel6  typeæi6 3sm83 C, well.H;wi op}h JIdIpriv rq+4032cmm~!/in0UPSd p* +@k/c@?=dMstLrC chm:0777 WqSaPd-0xyr g ; Es,"FTP,z_irq;T#N` (i9R90RsC#?shut]nĚ8"scsi;"f2")fc_lR_ptp_ u88hN%1%_K@(~ Nrx_kp],`bM5`pRel/hba%ef\%$_h%_þ4!24]MovPIV'Lq6AE6Icn uph5*#amd-xgbPOa0)I&7#eP:a beyDrTlifeR#Œ#0./ FRADIUS3 {lDRi)AYDInhrhe)v :5PCrYBa r1uOorg p /ko6 #sa?OyIwW Z3sal or +ZloiOv47389$ LDAPA "v3=t%vLjA.P(@^<-lut,-%dmw-ds: l8e MS},!-se&[ds6$Bel_: #,N *(BIND!n)5JGEGJ(na);lp(| TMo,, W~;7(vL>zais l@bk: 'sTp_(sr"RvX"RRseist s@namc1 *ivSIG(0(exhau!PU% 9%úAss\a( O othK&!8 l B/G rlS D 4L!_3,&lMPRU ily S¢1rib!E, e o[_ /Xpnc 9l%4E, Eje;"K,ckkg[pa/ei 3i"wnpV}2_1in\3d5sE}:k+4/+.1+(jm+Fucr A diaobscue$U75 ]OuVK3z7$5ǂe!sw#'ee$4<c/!91ŭk,/x86*TL40M602Ÿrlg'1=;7t7G606W525pvlt;=!7gi$tls4Op!cxl/<ođ839őbo %9]nr -BL:Vr J cT`H (N ycZgl(' ,a'e*r0/2d55-.2392M;rF(vTvac<(N[Nf.@mz4nz"TomcaFnle5@-Qo P(JSPf5echno+.tq:;Ha? E C\E C03{S- a CVSS score, acknowledgmentsnd other related information,fto "HE page(s) lis,R&ences sec:.Node.js issoftware develop} ppk  building fastscalable network applicsyJavaScripNrogrammDlangu. Security Fix(es): * njs: Bypassbimportstri via data URL (-2024-20)Ifs.lstat bR permissDm$l=18=fchown/-E36137) F?mo]tailpboutsBu,9cluj act,g'Tkernpv7s conȤ3Linux!, ofyo$syom.  *K: nft_s _set_rbtre4kip enterval elefrom gc6581)Wetfil9Xlimit:"jfiguthaauselgEoverflowd668dvfio/pci: Lock extINTx ma© opsE810Ǫ: ice:$ potiENULLUrȡ._bridge3link()e55ex86/xen: Adomull_chec?smp.^90^_raEmutex afX}gcq_ͫrtithe25e%-ra__nexpr_type_get700cobjb19bSc{Kerb|?uthentB|GcmeyourEfenatn-cos~8ds/n\ed E sȲTktoe@Ghelpru-U *y#keyJce(KDC krbGmo t[*733Orc 0t ool =if +sizO"#e arrayc B ""~o NmblyNresJ furvy SIMDuchitvs2C ubtVPg}##\ -d fM#vulU ORCU0OK%Ck BNI NI),$sR  .c!wrivplug-in$|%cumbfGa. :cs)on=p!nvlrv>$oN4d go!9/x509: VCfynichertQhun n publalghm5 478A:N/LlirptVPNKit!tenIp Gos oasA$gV+u*. ypodT-mane\ual kom0"C, gvc--vsb4'DNS #}wi+N<unC8ghtwe,mOpcF (OCF) 9u me0&ah laκ4 WOCImagAmEth,cenh' $C:!N} iB4scd rM1no axr!;V$KlWns !(atk9; B bo, /wge71GNU W=  .x = HTTP,SFTPDtoc 1s isVG)l#per&h8428ss, %po} w/fv."g p(Kub9"teVj-yhttp#rFV  ogS#Urilla/sch-#exhaI+kas|tlKdes]%29sko mhl.uh- ,k+ lay0 uUrto(ev[2GhosuEsr. PDF dCPnss4ձIof,itmapXaaB)bep%dZprSd:X ~_y]shtSAFER6{295Y'gg3alS;+ u-.9Zto" if0urrd/cti\7tNstBubwrJ(/usr/bin/b)2<-rQl6s s etuid bVryAW)<)#2spfpak#6#šCs s&box es= (--)472GLib3 ֢0 bY/uCI ]:`-GNOME"Hop r,nrg] < un  2lB 43 E pow6ul,s$o F&.-y'eworade -Zn (el})2ap]e0e-!e:g-N:- (2-abbr.Do0 uunsafe E9331Dco IMAP f;[}UNIXA4[ma :n mindsa;aPOP3teinŢim&*dr3Yo$de d):{_prXeh{gr=a E12318 cz`N =\% f$Da59  TM3G?(fs3ROpng 2Va!sRs94%"2fsd!2RELEASE_L<3OWN 665m;6aE,A6->-fq@in'8lkS30S/bc7di2-by-6Twb_dirx3@J:gb7>Blueth9U= F7B-'Bkbes/?: Uepy~8_"_no#:3-%d94dKVMFlus[su kvm->{9o(UAFsvm_|d8ģ ong;:4a 3m 6s>6Ac-;Sr{[=i ufFP>of s_i,CjAsplhiopt_aS80$C-of-bos a inB;ê8z7mq7ap-.H[ru in&_';V=9Ausb-s) a&<*ud C:\aQi"izM6AEPCI/MSI si_p (97x9R !e WARN(9x9{@=_aH19082Jp |gror>JƕReve<4;2Is100>\@$NBFg icJ3;:LdouO payload7# Moz!r0=x oa- web2ws6 4a2 m66, 43}: 115.15/128.2 ES m: T8) f upAfto2a &(; U83Ief%%weee &( E9r.)s ranā2Ádid J>ig: fu5Le3eG l6c5)-orc-JrOOM'si4iWASM*invA(C5CSeEr55-an%s( popup*883 `M @ ?130, Th b-l7C  Async G15tLA[3mER76>i}: ZlMGxgroup/LtLPL`CDenx$ OTR cK9]2f-ag!#  2Qt"wer"$cl3G?syZGeLa9on;i{/r_ ,eܥep/pA0 d8 A_jOx 1in\#634Expaj C9yXML8eH:/gay#LlOPFV02O454HNO MWra:;1;i; 1-0BWD (NBD'K.hw?S!n N)HY1enblFA1"8DS:*i (#<7 -SS E lkii>oL3%"SL)vm#/m(TLS)Z 7a Ml-@-0v B%g{Ox ssjX.%1 D61BRub onD\9O9,uD|6t14"ȢT tarexmlwS56RE39X4rc-CanF+ng6y5 7NsuchG7Q, >]]>11941T433)Po -Pil0(PCP1'U,oW#Pe+"8ܤ)a Xd7-;pmjTurs 2-2= Z9 Ts i.rFula`;->rWx ;7TmI*m9+>eC1cprroo%g77Pcd;!|ugh mp/c#.]N6>+ 3GT>il $.Dlm)N100-?e inDtI'Y g{^-EW,CaS!

e=>kM,h saOshbo"';7 ,e r9M篬 T)EG,fluxDB &{:TSDBHg&uio!in_jlx&b C_mirr ['tr)> 8wK%yskb67dAR@%9a/]fH%:\@1&is r5or-m1%e%[` 2v4pfKyKha&vp#; X0XfcOE'fN1 %l7vma (l isie <$2f &J&%!D]le|Ϋ ]&, @\%P"_vc1o#__^+iCXd"`c!o &V"0_3el%K"gpio 6\w&wE _chaed_^yY899afd:$i(Co ak86fG%-FaabHe$E, Jccppc_WJai$P5"Cfs2H9go8]+PN`nlaA*#)G@sTof H gafI<=ydadqW=oszf/um fe%ACPICA$$I\(6'BARYNK.$_`bAc3E$1ht7Vri?_@70 _%J22f,dnrjaReEPERMbnp i xs_tcp_f_etj@%GL+FSh* (LFz[!aos, +os, eg c; VO7GzG1UfO OSTq i%@se8/7 oo4Be(sq>orIal>aDipn?4upR*s;l6clouUA5"tos^cpit- 2LA -snmpC /R *USNMP(SNMPnX|^< Ant,hmes or 0STŒ7ْGNEXTnsV|u9  AGENTnsLogń8݄9zBcc(-frs&qenI#_Aa c _I Cc?*<{i9S(CUP~ SZ 3i-9w 5st/b /Bd^ UDPADDR_ANY:631ZF SM,^0+/.b`cfGeterA` APIX#/" aHoIPP647l~pp- [E 8onUlxc@PPD} 4(_jk;( Ap73M#$=OW+C 1 &TomcF(leH*DBugRe5iI6 1.2{#?z(JIRA:Alma-58zfN^'Dv|/O!16tb989CS3<'formance, and portability. Secur Fix(es): * firefox: 115.16/128.3 ESR ()thunderbird: Memory safeNbugs(xed in\1 131, O`m, T\7(CVE-2024-9401='2ЊCross-orig{access to PDF contents0rough multipart responsesg393gJSON h4hompromisNX pcan bypa site isolation]. For e details aboutje sissue(s),cluding impact CVSS scG,knowledgm쬸o/r塆, ܡ#R pagm lis,R&ences:.Tgڡpv7svide3Gogramm(u$/mpilerS-fips:D`FIPS zerobufL55LMozillacissttalone mգnewsgp cliISpecially crafWebTransGquestsuld leadden4 ofrvice9.PodctpuploadviaLckjþ71Externtocol hPKbe enumerYpopup8mrup{dJIT400#Zmay oc whenFonjcern objr6,.NET 5d-softwaf!ework. ItleubsetUWC- APIssev3liteICLRZa N0viϢd`that addraZvulnfG ; avaJble. updU'VSDK 6.0.135RuSme35dotnetyem.IO.Po- Mle DoSwsuseSedLQ4348ZDSAoText.Js@5@asusce'ble9hash flooPe4{. 8100 k :sHTTP/3 amcaa raYdisN rdtd xr3822S Flg# R penurweb broww, JignRf:rd_ Xiper'Use-r-freAni 'lin.1KChemsp)9680:hOIPMIim{-tooܡ l2ep™MIlligeP&M mrf().ia}N s0 healthnito!ipmi: mcheck o@auth?z)ypeoLANssBssi29349podmanswain\Xs s  lib<rary,ich$oappA8 fv. 2#Kub%etes/:*aallJyP" func%deepne?lit vpanic/YexhO\415enc3/gobȐDer.a;sŕQuctureɗ՞b,build/cintȥ+"// +1"  tag \wiĥexp `$P: Brah:{i-o: Crypto-Po]y DiMo </kLwJNetqCNI)%|sif.wriWplug-BfiguEnninLLinuxg8a bsupt edaNIrnsselfj=p!nvIl vlloco' sNivle'. msko  s you inlf?zgyige+G lay sl attobeate ify} lese b j a0OCIAm{th'cenito  dRN, eiBsc ʡ7 ja r8o;V$KlWn]iODocko;) bo > j-1.-Ujdk|#J J1Environ*SADlop+Kit if : Heap-B#OvlIoSaDumpSc$n2RGB F3-4816"!: Array8dexAtegzf(8328544F21210Arop? P@maxHerSizeP286P08PUnboDd T-of-w err833144S17SIױ:Wr reGY263111+77+}21 reenel}h 35!,..  *K: Ll,suu_n(R) Atom)2874 XtBnft__offO-: dsre+   7-iR8$t "u/mlx5 lo|Zchdev$dh2ncyA526:kBeng : idxd:W oopsrmmod8le-CPUS +35989[hwM: (w83792d)[NULL*der<+ u-e[r1-473e!rmptcp:%snd_nx8li,+թ-n68!sd_,q:T.O"OOBCT!_tune()\978\Add aquire,0umaph2[855KVMh#WARNvN+ wiffs&x-htUsked]9#]ioif_napi_dh)B5*/Bxfrm6: ip6_B_iա8real+__s'Z4095gfs2: rT%_logu $Q207QY_ct:kep# zo_ht_keyW27$cnon-35 _udp_2_bZ8: y3K GTK%3#l$:d  :wB Fkitgtk: 2 U"0%R%CuE%4077FZPomaiousw4)vc!n;&edI0ra07|O s r[wW*~Gg vei'h0Th73$d ! 2fVis,1+bar '2of86AR c2beh 23271\bN%tdJ(2ߣ`be cerprin{user_38й5'ex 5 7-a418 Py;%nj"pr, acw  :$d9 ulclassex+ ,y hig5lF dynamr%di!& N tw&y^&c C ,w&tdr &/p}DoR9vecktrale  hG 6S UY ,2`* ,-,a=~mK.$d mp&0is,\9.,),xten.&yh1 va'R H--s)yW3 I$!$" ": rT!J3zmajo i=1W-%ssh< ed+o=&Krem )&ǝ #0ken ߩptkeneeoÿseaU!uyh *doc*. Py1^S'_-!j 6#-" pix2B$  "ws Bm"s9675s94?Zhwu:BNatBrN5h HmInj (BHI2CIaddCnq< rxFcopyA6640| reR,e;q682'af_uni4.gKClI74ga۪m3()T92mac8547 ec ,res-_(5@b6Gscsi:ߤunBcfs host<+{&Wpty  vm1p blie <tap :) d G4mu4tX9r(9iűerycRo36244Mu=2s-bamu XSSC78 _h2 A httpd1EB#2ntM(h2+h2ctngB2ڤL2.4 \Oer ><::Bbullq t~$~A2363\g1C 1046̇o1T9-DisposXbegn«rN/x-mOP-re_rN}1}Per>o}&kR,9dM<$eAW#WDA7,V9VSQ2@QdQ4DSQ4<7ҍClip"pax3ttJp#a sY5YDOM p!ID3PX N6Ө:o*JH3HOBj"8promptbe|y FURLc2Ӭ;dla Rk0L#Df EXR` ~-.'-' | 7qual"is dms aief viGQ?V%l9faJITaggg2FIFI(TIFF)\ 3: !,,.c7006E64(EZ6)pOFt'UEFI-#VirtuMach58 a 64-b8HpmrUIQEMU. rssl\o_i.509g6119OK @@I6InpV|inG#O RUN --I9, /pEACRI-O:~mk I4/$BB ( )ďlmysqOLY1305 MAC1clasW Her&PowerPC61UE):sp$+in RSA blisR237Ra j7s072CedkTempoW"A%Ch s ֤ny'Xi# ,W 6Alma!R> Not0Hed14<*:AN 4H@8=!NSBi, 2/p[:]()i'-fe9=inMEk91BxXw " e?)X8s W2 xorg-xEPY,/Wsinh3XIGetSe$edEvx 3105-bPaG#kb1bOR7GlyphƮ3F2[*//:c g.Zdo%/\tee y 6|.UZ=F go-r_$ygurl*AAs3&{)La61v)pGNOME Sh7p<Cf >]F5k$(s)8zN#qP likEN,une gBs:)vag0cap of SFrno''hN8ntr% nova=n` ! nome-sn.=i$l !6-A})9Oar/ve/zipKgFr tZIPQ9/netOUAAqIs3h IPv4-m( 6Bj90X.Org >is an open-source implementatiof the X Window System. It provides basic low-level func@ality!atll-fledged graphical user interfacere Uign&upon. SecurJFix(es): * xorg-x11-Fver: Heap buffVoread/data leakagel ProcXIGetSelectedEvs (CVE-2024-31080).bPassiveGrabDevi`b1bUse-af-freORenderAddGlyphƮ3) For moCtailOboutsCissue(s),Wcluding act, a CVSS scG cknowm#,1d o/r relatinform1,toR pm lis,R&ense+i8 Changes֤n c'Xress9jAlmaLinuxt Not0linkNfromΒ Kernel-b6d VirtuMachinKVM)$7s6 v#izsolu numerous hardwpIs. TD:rhImodule conns paw>hE-spac)m5urun m.pV alsoVAPIs5nag/a withPodmzst 8X technologiesOCI gol;: net/[http:]()mime/multipa2text&to&euy exhausRequest.ParseMCF3-4529e[html/Op^: ]orturMShalJSON|thodsy br < escap*24785p:=lW`DNSSsscanűviniSloO8OGDeni̩duemr@ 100-űRe hlinMEk91e n ariearItmureqemu-kvmwr7_na  QEMU: SR-IOV:vd NumVFs ds fl 6327)YDMA ntrancPdoub vulabi+ 446YMSM!ISynchK*7 NBD0"D=Socket Closur 7409B`WebKitGTKG%port\ a web r Leng~: B* Lkitsiaiciv s4^addr apoof92843)Zh t QrbicodeoU950Up es ðbc]Bmium-brb ANGLE4558CW yn-jinja2 J7wopPH.1a Djo NpirnoXML dxt sup~ xpr|ons;s H ` :cepfkeys"attrieuW L064BLLDPLd [ c .5 pLk-Lay4s) s EbCDPgo{tlHvekr me ism;eliwnotifNأSadj= G work4 ldp/ vsch:]s 1 rigge] l 0-278 ]d: -of-ndwhde%ONMPe1-43612JCCPDU P+ cdp.c_1910BLPop9r( PDocu F (PDF) ,by aEȿDvim p?df: cWk`so-dUraIx623C _auth_nidcO ID  !ec  Ap e HTTP >envJ!AeUnyPy/iOAu2.0$p : Sz`OIDCSmTypliokie`mpula 2481CJos-'u Javascript ObjGS0]2Encryp/[jb jdep/[clev~aQ.toge>nNB Disk}(E). Q: r817a .o olCPU sumpP3-50967Fu>+s) -X kthcA } tk3 pv 3 oA:/ L> CWD65CIp mJtmaximum TCP0ndwidthuneV U islreL, diyAt,c-gR  iV3: ` (7250,ESNET-SECADV000p Mlmarv0 ioi:6306BBPF mpi CqB(BCCe"(f effx k t onD\!d BerkyFee e) bc8 unlv:#}scaoh mihl=hN23D1 в% high %;F tfenhan &` iltre@4.x)LLVM Uckeo#ile ,5-bytekeTע!p ,owe&ex.%i`dynamB&$(kbe{ J%u%{poinL  nwk9C@pec orLrsDTI&'T pfC>C%G 12n<,,d_premF;]hysٺy #es,OI(:hcoCird-p0i  $" ":rAr&J ajooe tsӪF-%'u$shoulҢNe o=aloKrem)s|ǝ'SrtkTestneeÿse? t.H h **.\ya _ge Dna#$"j"=fi T0:vzipf^ mbs 4-04LfinreIPv46 rQB4032BcI"5ZIP !f8088Ivko-or Rcl-exysy& .&y'.dt /any Cn .ww/+\QTR!!a|!-MySQL&Py#iO'e C- xcWx(dbf`Ch,GPI}!%J -pymysql(]uua+inputi360FXjay{-imapd  m IMAP'OP3, NNTPDSIE )%beJ#I1EbyxnLITERALa Nl1Y1?40D"6unC n 7ghtwe,+3x v jF (OC.2ruUm #91D6t'r)MaTs .Ag(MTA)' pj(likDSM"AUTH (SASLTLS :?smuggl0CD6 H#utJ json s 3EBzD'3oci->--h[[ z'lk$ )]U7cw' 7zKubt j* jwB$o >k= W1Ke;JWKy!%a6S$JWETvT) JOSE  x%)y% JWC,Via3ecg- ^*f W323"81F: 7[p)?pow ul,7Ou5 |:a'pel"387F73R3S3)].alg5*hXP{3M3A323C ViNVi' d|3nUd d#,>vi eo vimHLK1-39mDbluez R!3fo A f B9tooci ,n7h ,p6d2,q 2(pcmc\. ?! oHD@c  t/. $K23e#K586c=ZdioXAVR9NVNArrI mowCl0EhV2734phonB1rtLY596tOBEXDoE cN`4`aLavrcp se_me_d2z2ze3{89{m_mJ_s4n0nsy2(44431^0`t2C(Bub wraS /usr/bin/b%<%N7n!  ssWirn9U3T fpakMk"Is N!pZ sdatasourJ-scalable timrirom pm Redilive PCP metricbpftraceKript>das wellseveralshboards. SpFix(es): * ou/gob: golang: CallDeer. onmessF which connseply neYstructurcanuse anic duest exht (-2024-34156C?i open , fea rDﯴgraph tMGit=InfluxDB & OUTSDBdompfy:[-basbmuta6XvulnbilH478750Kerberos1twork au0nticsyGm,vroveof ylEby eliminatn-e prac_e4senpass8ds ovС/JunrypѢ. It Mow li)(=sƳeaHwithahelpa X.thiparty,"#key dis:buc]L(KDC) freEdius:gery at59ExpatOC/braMRsXML|cu 6>eN: DoiaC_ResCPUE50602F.NETEmged-softwaframele+subsetТXC- API#newiWLRZaN2_sfbthaddr]<> av. upd9U'VSDK 9.0.100Run ?dotB: TypeQfubŗlead/AVeC7Nrbf7Ԧ:(4solV6Kbo26a2 cloud8e#p vi| E #|dmstwv@e1d j021S vsso>XtCpo70acl:.v!5It:p 8eUEK,mrel ,b<hadb(WWAN)APPPoE,=T !*!a> yt8!vmf~RKton#6tj eoaxJIRA:-730diUۢW&rou.?is@2e#ipv4.'e-%ڂ1i$y2\iP3rusgn3661z" HCPop81=puM'ZtH3؊647 dj-17-j @3J 177EC+S# A:^hparrn ,21\ BB߹yF--5ig$K5suhtoUw9b. W is} )/twV9ƖHE}soyearsҢIr9(867, 712).J 21 +R%/dcDon'tp#p (A:3&sk_7&u$8k($@Y 015 $arm64/sve^i(4xCPU 'S7t BWi40RfEc-byIb1er'!te x~08Py| n M s, ,Q$n2q mDuq s s, BexM vA%m ve:Ge; t9N l. @7m C .wow @ jf28VG LarF S< (LFS) 0s9!suZ%s dioMm,@%s,IeGGr =G"} R%a h git-lfhFS.H5d_ en s/ '.\MKHadvd ,F-!u "oft!F CHH si3I w,n hE*s, %so. \N#& F-9. Youwp1 DeiBbyW+2ΡZ{I?8a,;qp'G( log :' LuaMGs~dJexT4698#Y(d-of-4 OcACL17?`hUB*lcjsnimsg y2-24834poL6ydKx 14 Q3,145QxMŢRCEͬ(31449\DuEp^rt6.X/75F 2<3",MTF-8-_53_am__cA+2C+Ma8-_Qi/-, R pQLFpa(My4 8mysql9:r QApr \/210=&unde(kaOJ8ae/iwMdaemmdbd) Xs"42- /SqSgInnoZ \O\3-2WepaWy sYrob0f0aloadlL բ(~/8)ePrelMor-wid'hIPPDiVS(IPV% -}&/>CE)Ō.SKf!7ckeadapli Wak^p'?T lthq?*sÝ'runsCP=(VRRPv2)X eveo&:Zt =S5Lia5rrp`3 _d>& 11Tpodman |) ss,0s 0 poy': a`fv.r!ndKuVnet  ildah:Wb--jobs=2'K_3G9"l%S11218?F%3ja(OCIC. AmBt ¦c$ytoBeaRN,scr2orQ O;V$KlWnB0s; B" Szip2 ʡ'$",Sf (9o ('m,<7 ,haCk~ +:U-",e 'n2;-O'il19&90.9IPCI9%i'%롿Ita64CqIFF5Set:A:Incor7h9KYedd$I.cZb98 ExIshipy5o)rI UUIDf)"cpWaO* /te^mrsf/=0A443PBiOQodvcmk(j1 )227}kEdx!e_5[]fAa6twri(t8r h, S Ų&)K@em&tC1>iH0AmWnso'D,h+k SpE1nCr&6a)$b ///K,ks598Fs8t-9b9h'bi-i6R#e t0s3b2\0thd-ZT#XB/a$)Gs P/)seip4nd" .:p9"c3/t[5466"cU/ 56c';:eRCUtigmp6_:O07[Oovl.UAF9_ry_(3_^ mdI/+_%d8\`dTatmi6 [ecɬ200/udCFNsl-1$b$s L7in*_f_X2-j46Xvmx3N(e6>in'_pB_xd377j'xTLS k6034[R'D[D'[crUWY(`[Q= zme-n-=nrCky>C umjK(MRGPDUK0aBV J5J5J7J710= ̌~Cud-mcghltL c4jK20K& aPo#Jpenof 1_; '0biD2so LA]MAmG+ErqvlaNf HdXSLT@0 SCee[ngtKRasS>p/K$dĖ ]eŖduurren?azCYvCAcfer to the CVE page(s) listed inRe&ences section. Tgolang5ck8s provide4Gogrammi#(u$ compiler. Security Fix(es): * net/[http:]() Sensitive headers not clearon cross-origirâLD (-2025-4673) For more details aboutsissu,Kclud΢ imt, a:SS scG cknowledgmentsn/rlaVformaH,+libxml2rardevelopZolboxle of various XML stards {: Heap use aftfree (UAFĩsDenialgservic DoS)9794)WTyp0nfusL6L2: IntegOverflowZBuildQName() LbSt Buff1ok6021Kkernelzɤ4Linux!,anyopersypm =K: x86/micode/AMD:* ;-of-CnSs with CPU-less NUMA d2199cloud-initga+tscripts f5ȡS. C{specH9run dTiz"etrieveKll SSHy %le`usOYf :ermlaw4-6174java-1.8.0-Jnjdk[OJDK 8 J1 Runtime Environ*Softwa#D!Kit @: BetGlyph draw;r30749).Enhi TLStݱhupport6546Ime+J3s4614˚450106'BugO>erfvigurthe5QIPv4 wav6 (ei$due -D..-B`=tr"be續fiHrIintza*%@s)method ^IAddr.getLocalHost() wouldurfully quh+naTeIh. ThihavionHe ndLS+ risBtiHfrom'U> .-OeasewiĴKM(Alma-102904, 567891012717+HTTPi hlt5005t/6ZD Hdefault phic#displayyWaylB"seca! fure*tradi!bX11thatawt.Rob @{akcf nXptO,duca bk[. W/ +updӤRPM n $ommec 2PipeWi,ichscanĐNf6666970 21 +83845 xchoomigrtaskj one;$anY 1 garballor,AllocRegobjr\ssoc 9atsamʪob| re r.thr S icC, bOhê l)rbit'chT-to-T Qacrash9 )­ (dcmid-O olvis by ways s Lp/oughan }903 81JGLib]sFapplicbbJkGUiq-tuC4t]-GNOME ploop,n 2 g^utildfunդstoatauc g:u_n_msg(^4-52533)?(Und@or&/g.c g__x_uni9r43ATomcat/ieA#P+ (JSP) technologi twVgp0379 - RCETOCTOUޡu66337)k: malS//2 PRIORITY_UPDATE> 1650)dma: uvco:m d%pof8002)Fsunrpc: e SVC_GARBAG.5svc aupesas'o38089[idie[vir  cen^edchite. Aspo.'vSsTG -s%m(l : j ea workAcopy_'revi Gn exact$c9h/al Ȣr{n)*G ce/us~ ` ir a alsoxkeswpoMbleoåN LHdoe saEze URL2 yxc ene tc?03p^NewlineinHElp exfilt 9g033 z ex83846fig. es353k4*c `31(4ƚGUI hL Z has " 5f-3ntsa wr^)owanAlus}s1eiabcy tarϪpveGe s%p"!s:V Trae)Vulnbu  +*I x72 MozAa,E:" -sourceb breign{o a:"+i,1 Z Rf:u] bird: L n#ctxc 8028)`Memsafebugs<in. pmdiCyZ958Dz:9Wun+^acc]mii_nw_YZ6Z/mdiobu:e- 6457/Bya1SQL C>y wM(base .ub&92NR"ed%A!torn leleAPIB*v Mmsık agaU'oJflexinadms3<].D sql2TBi696RedP vadvyd /-,iftf,tod-GjZceI!j,hsǥs. \m-e"Youwistm-bymh2λ,y o#lxo9X ; \ `r:94X715 7Un#A44C;67CHy og OBWu|7+=C(ssUY (ICUQ!r/-fu7n6 hicu:W!SRBRoot::UTag !522 B]#B]#(TBB)'++'4)1&tG?5v tUneNlor tiXmi- k @ jque Un HT592>DOMipu$!(0-11rtpmlTTFPzu Mo'ePM)a$ +tu:|R 4913Vt}C5 Jafo-akfJ9A  ellL ic(7LAwi |.fasr ?.jr./ ~ %  E&5299"jAslAAF.JatxArrupuAPt742*Py npre4, C-R&pD2es mexceU hi- dynamdin=%)IeXs3 t(t?R>Podm36 X-PO:OCI 1n a-CKkJIP?EEs9HH#?I>d?NVIDIAXTI23[@lZGTK%tof $%DGr?Z,:wBpl7/ a7! W p3i>on598+*dfa65G:glKA nload?s ekmay@i ,MV0QP!&j@rduɢh\.Er(P1 Sh8hT 5N4(B/anNSaf Bq2^q6-q"lsn7/r276r? ]6/sB8r6Focmd/go:EVCS{E_36ic bpf, te&3 '_skb_pkt_c'8:mm_R\'orE%94-2895Q@Atlb:F0Mb4@V^p,Fbef80RY nALA_fvs GUP-0 racP B&dp gs3!se3qpullb u+g_S12ŤA rtw88['>'G:Cg6C9Dc5 B4toY((N fljU YTi2c/S@rc( PH3Et^WB/':Cso]5~T&xmTR er]al4Do%\Xb S^D5HVT[TektrHx 4I/^iy a2 1 nwl-aul! s"^b^sLl k!ics.*2-6YX7.VhGseverayefT{75Ks$EJpioISO 9660 CD-ReOLouYaKMbsdt_`,=obi?Asg&v-񤄦poVskHm)VrRR^2>_90_Yek-()&.}&K |t|`Ć`in?8up` 89/S`rcokFe/or#G|:RbR09182lS esjrLcbtAu>L/V6GMPq79qme}poyCas2D0gUn edb?Ea1aUU7U13lB+40.2*/Oerbird ESR 140.2, Firefox2 and Thund&(CVE-2025-9185) For more details about the security issue(s), including impact, a CVSS scG cknowledgments,o/r relatedFformation, toR pagm lis,R&ences:. Tkernel pw8s conɤ4Linux!, ofyopersypm. SFix(es): *K: udp: me>ycounFleak.j22058)=net_sched: etsHdouble adclass with1em ahild qdiscc37914cice: fXesAchdearesetenarioP8417 N.jssoftwavelop~ pql fbu\fascalawork applicszJavaScripNrogrammanguQ Rici: U UsInsuffly Rom ValuZ150njJW6Threa#xposuvia Diagnostics Chan>S3083SGOAWAY HTTP/2 fߺgausOsicheapP5JAdvadGtrus D Environ(AIDE)utilthat ctedatabasfiloyyǡn u=3enâ:teg;4dGs a:crpneutralizabbyp54389Mozilla. tualon֣newsgroupS bf :|[:Anial-of-serv du4^Graph: WebReFmpw 2lSbocaprinvd poRrtAo/V!o MPq79qme-origTpoyFCas2D0gUniniti=QEnea1aMSsafetygs[ Wu 15.27,28.14,^+ * PgreSQLn obj%-q+al(mana(DBMS) pjsq: vex0eG i; tM @ *~8715)WD\9N4KImod_h2 Ah ttpdulleB 2 toco<h2+h2c) op libngB2 L2.4 er .:dxy_I: u from4 sf f X49630yth pre4, a'v enRy, w he3excepy y high#veynamic  typdl. support& faթm7LlCjraJ-ell.vu@w̤; |cp ^ ow par ar 194:gWhfscXaten UAF_dequeB)782K40LMMIO wres-!Ea1_cr_hw\8200\RDMA/iwcm-af-fre,h  cm_isb11b/Always notif^xbe)emps`3*`tipc˾_nosoJ46vsockK ns_* TOCTOU:xfrm:Ő?ha g lW_md=ri=by  uTLS 1.3 sesum 48z/3HijZ5aPupv`A49812luggAuth.  MD (PAM)`amB a7< need2rZp hleH l- -paL rTrama602itmldޢ 55&CK6ed #amas)OpenTet x0[:]()= (d> edcr$ ТLD4673podman 6s% erIta f < y /+)fv. # KubTt  k6+b mmm host)9566My!B lti-, t_.A#!<I scsM t (my!d  op:Ti ,-ECDSAgnatM+8utY 13176 :dA spec vulnb+(CPUwr 0722NO7 m8 r#N688NS"do##U99UUDF%1;<Re %P3PC=*i#[$XP#/747DN8ĚDML%H{0-InnoDB%47;yN(40S%62G709Ks$L0]ĝ70<<3G'Tt56K7038KDD&0tPl:1Sxet eCs:539!JulDž 97N%N787H-9:210NΗ!K8/X7- En=/C%1%ėg U +1; .N=Poo'$=(;+9+S:102^R7  =P302xjK I.!-sour-4brow)!SA$Krd'mD, pp. )N KgK;hK1052s2rp&b=9 EP l KKCh, fifbehavior8XL8Ԉ [LLay\9\KK3K3K3WK3v >t;I=wNQRU76dSPer3^SVGP(gnutl(H9GNUH6n>Vi(Gnu8h(1GW22algor*LpDGs*ch2SSL,k8D : Vi/d2)temp:q)Q3299NNSCT+:onJJN SANT_I8I3T_$_fig_)os@iphl*u)-63 BugQoEnh(3dBZ#235962+`F1)\E2le 1312PKdwc3: gadg^ e?3=nuntU;e>5@> E:v?10jdo_Ie_Y>(ܩYto ;unmoed/l>u ]84;390/cSCCB pr*c>96+Mmmig<8DiU%pWFB724 BINDU e l @6 Doml`nj #DNS\W(4<)q. de3$(n3d)olv$6pAIPfr,es;@&r  (rout7#AA9);_L=vlAfyaisp`l b&B:9uF?F cexhaus}7611|]-- Ss??V%ple9d vyD7 o s2 eg8_seEPnXXCe5538rb5 nmAtokA43737cQ0ASN.1rs72fQ"OG@{D123ADJin#M1%͜4tC$% Sma%7W3ͣ1$ N0!&>GGCS%ZAFT%H#HealMoEo%C1w!H -52HLPRKA[ti#:pę) 0=5, N#Hs$O4Bk UnaeHedXNNRif35+P4'"h,)#͢<NP!+3;49#FPA6pel-a>Mmore details about the security issue(s), including impact, a CVSS scG cknowledgmentsnd o/r relatedFformation,ftoRCVE pagm lis,R&ences:. AlmaLinux IdlMan?z (IdM)cralizPauO,ci:m:(oriz' solu b Qdial/cloud-basdDerprise viron . SXFix(es): * FreeIPA:m: PrivilegAscalfrom host1domaadm? (F-2025-7493) FTkernel pw8s conta4!, ofyopersypm K:/keys: fix slab-<-of-Dnds_task_fmI4-50301)YKVM: x86/hy2-v: Skip non-caicUddressdPV TLB flush3835_wifi: ath12k: DecrTID RX pefragtup err%hlj]9761ElibpqD provs3PTgreSQLi*,rary, which allows;gramsnf Eserver ip0sqSicԉ7910MozillaEox brer,J ignSJst i,@ ?  thu] bird`: Me]y safet9ug 117 =Ous` s)ad/wrinutrigg'd by GLWurew09wCross-Tk]du2 IPC m, 0iUse-jr-fMnaTrFGraphI::GetInce 8_An OBJECLaK%buterode! haviorY0 Fs a -K2҉ ඿ESR 140.4,D)144&Đ5ҐSoR OLscould mfi`Ns )(=SSHtocol!canu'{.Z< appl : osftp_8)-nfsdon'gnU^re:desvc__regr2/kmZ :|m_scpEn# _9yno-sirobe d208sunrpcysi l71K?ƣWK6,fivarfi+n #_d_ S981 cfg80211me:p lthW__#__ult`49cs`lpfcbuf/crdercdjXeive]c i,@ loni:$ sgro!2 jn-1.-o jdkI)hJ= J1fEL(*SDVlop+ S@ccPF-or5300Cf e?t6u BugySiA8.8teT)9.2hasX a leilkeea maj EZ. Wi^his, samO|wsoofo%&l@8.2,46f3 On{ somean 's FIPS#e(ll4enV_a eP>.!verpbuuk-Dd..fips=f8777, 8982717+־889 +6St01617tfufun4$anA$lkTagImai'Fil (TIFF)A le:b4 A F #AW -Wwe[9900GNU E)spowucC"om)L,0lf-docuk'$ItסZB -f "langu(ep)袪te-" el he Injvi "" URI Schemo )R)2-')ue stHt; mto a')-strucm 3sh sTs"ed. \D(in-m9. Youwpst6eiB um(2ΡZk%o9y#;O moog rOu@s"B)bpoMRCE46R_A6e-exLUAsi;e#b8b;#DoS<"lX9X!rUͺV*KgZipv6WrOMACpaRd lays9:view2cG|ktop*>onl4re&unn?, but>u 5I>neR!vat YarteA5isu -^sT xorg6@l3XPtHNo ycre6222XwXkbcv71R30RVRSetatMap&HGafas5nchm^imasn0ws~ !-/)2nsa^;6Bsim(!@Dt*)e osy]axZۥgwww.g*ct1r> my6HighA }(iy72149madbDB,CZ.DCEmpOBGte82969M]I_di__lK7 /*(CPU Apr p 0722NInno"K6CC :lWtwe,2i;;CuOCtpc$r _ :4>;3'm Ced !'mZou:UEѭ)` m$ fig^/dev/- olekw 2565m=dmar6'r4gadge A fs A{88d7 -lB"z} /i>E AMD"974-3635j4Ud Fvmg@ddmIBPB=tig 4cFBIND (Berk]y NDH;DNS>I4S<)t*Zd32(n3d)E2 lv$sI IPG; &rS(ro e>ifac);_a@=v{8fya(O#l r/bi CacIpoP;$u+KRRsg)Gw{PRNG;80;R exhaJ AiaO|KEYH8671:u< 5454hA_*[f=Mn 241aCop#aLWI! t#3i%^)9+V\G:r6U cK: tp=CAN7 , in0_rcv2C8a^so[ qimd-p p shadWC,WBg4668-Squsanckmb @ QF7Fv,beS en ey/o2 Andd()&D]767Ťtd*"6MMIO"@72 rxj/>aĢOket HI-I/OJG46io_uc:T0we{esdul OO06Mm_pcOddF_cl0__ ()Np0/e,d2-2x-U9ck'd 64n_)_650195~V>challsM29o/rwsSNOWAIT O_DIR]-!A [#aC1eC4@ir%/vKdc_queuX G11QVMX: Bu0 l PT_J( K/] )){)iCONFIG_BROKENj3xePXJRt] .Dw#ve (6Advis4 %s21sRDMA/rxe"sqp% m*reqG2&buafErq itV/s 74rG(v4#/ o8 rcu_Ü16N!lim== 0U PL| inZcKBo 6?*pc/xi)9 efJicp_opaO4:Nd 3 u9paprK<<{ s'0'd:_353v |MYJ!@N60 l/d<œ26a1s%>raJ__m u\î4/x"Omap >BOe>=D imG c0sUEFIL Foot T2GW 8'ar$ >rdl#8J h)\=LlU=In&:^ap-^an6oG-thYl4NFS^QL# 4_shutdown_ bFSen: gna A !pm72p_:_r6Y44QB="totrtKNULLup  79@?brcms#T ranctl{Ahy_iqc}! ms_nd80rRûbc@de__boH_#Ǽq=mlx5Pk ODP#Ɵdrm/xe/PTP_Ek495Shid"Q_*d*nd jrtw8 1cg+l_hw_s-* 4&le/ 7X`mt76925gl n_ch:! ``b'x FhOPPix]:Yid$ fu9uıa+tin&_[_aDto_vi #$_/ ;m%zeCo]  E:greDd?vrf:Al3ml_l3_oWf te beuEAM_OPTION_TYPE_STRI]] Wh'<  erRZF3ūvxlO _vni  1offgEloadc}-ip6_1mss6ASoCOF[ thda-daiDAI+ge+8®?LG @T'?b, ýX let.[.h&{+s.c18-17 Cpodman V4m`s 3ims@p%,lpuodMU/i/ fv.4c@p/Kubyt r8/sqnsER|C4m!9kub+;+N9Wb.1-8i\FB strings, hashelistseand sorted. For performance, Redis workith2 in-memory data9. You col ghtwe, _ 5 z OphCꡃOC c$rume ):4pK'masked 'muse(mra:31133)`ma iou^/dev/cRolekwm525- m=da, marbit gadge dVcfsc {88VirtuNetJjmpu/(VNCh spl} > Uview2cGktop notWl\m\eRicn?, bMany 5Rrne#!^da tYartesiVsu- Ixorg: xl3:af}XPtHNoy! c6222 XwXk a vO R30RV ^RSetatMapHN/pNGE ofYGNOMEtaOeCookie Expi DYHa"4[OBR]RަRL_1102X0 XT 8W2X.OrgoH -9j X Wind(ic >-lll a full-fݡgraphicF aQupxQt 3D<(near-l !m on^& ~12DVre%&nC++ Quick) ^2:k AsImx#A! Q3DLoa|.cpp~ sMheap[277:Berkeley AD*(BINDdh)wK (DNo p E/ (n8d); ) (rou so! whe'Xi~;8=vdfy{ape  ly hbiCisoattµu RR"077{G w PRNG;8K(  y(~y, }s-!eIP?dreHsy ;Roexhaus<O|KEY 86mPyn#e4, ac,\"-nRz mmguqm,a,fcep,Vy # dy #typedl. s¼m<c7Ciasllto"w  p-kdcp# naSSRFHRm?\rollO SRVG5908WRunboL d TCP eamKU9/ SSLkim#=ock_LayL:bTranso (TL ak enggezl-purpoBcryptphyy 8! "T&!& RFC 3211 KEK[wa9 Mozilla"EoxB&brer, stm) f: MmgbypassDOM:4uon } 30N KAo/V oI4IIn 2XJavaS: Webf mblЮ6dS^gin;~yWo rsU9RTC: 20QRQG И2poof$F757 $C&MLω3"xx [1o:3L  SertSl Slgn-On?SA٢2Zr# whNlife-cyclCfed"  i!K#Q +: TyuX&YEn'ouve-#4715`ha& `oi,k-nlotbalT ): vHAPmjso%podman ]'s Himnis ,'f*<1p u fv.X c$ptKub {% Go P?L pgo:eve/tarw  5s\GNU pOf%U2ke e(S( S(R((.o-oseJke'o;xr{i%; push6;$ "!q*:,L,'ce;y(dmA Ies#nkz. >evtutq4 `)XDey ,{)7z),t+ to-i$ sla re,fablr synchrz2bo-o,spliF o th. Of"ea=oPub/Sub,)1),,yHmEl,s5ǭ!beh y5ƥ'\#m[si *kl@ 4/!,c7 K: m2slubvo8w.-kswapL_tr_pr6*3~3 IMP (2,ML,p" m!seV,.R^ao89gt s,cen' s tCCs ^ RN,! sc oU 'l sta>po8 ;V$KlWngia ck+N;<o& ~e}.s XMLcu ]eK:E w^@##2tM D!XsC sm Ts ³937F>Vxml2d op0 &S"h {slۢiw4at&Dyn+Fu**"/.W971*nf>B$_-_ld()il@in+4_#id_-rm-387^ dwfg80": x/Acmp_oCL986Le1000eD;,#._eepJ98ʗmt76N'Fec u%C91CtcA Cl- _sk(sk)->!_ršdis955TBtolGMT: #si5UAFs??i"u/vt-DisKAty9Cifohlk 0058Xce_adap: }GxaYK|  F]18fp ':?mpVvk+V7LSB ?i2=;+HoH'lC - )(usO&RD-Bus ;vo$r_uD,ifde4#okDfkxsen +/ cgro']+tusnapshoWreqPst, ,r);  boItEal+yrol0zH22,-i:cHYysv 5-:8=  cl( EIa SUIM2EK ' FK\n/F m?858%KitGTK %9)LM?'r(3L :wBp L):?7/ WPE0)b8l!W=1350zgtk:s1??fOon)1V 3-43000hA s Gex tZys&b339Ph4>/hD}rYr7_r_X30T431_2CrSaf q4^40_r3i 48_2eb1-9IUag--j1394_Ly Ur6628f,cI : j1939:c NETDEV_UNREGISTER~,x8!-et/mlx5< OJJ7.4T2.saf0Gbu-=ɦESR 140.6,W biQ)146&! a0 1/a.U043?OJIT m_&P S2. ,X\1Se}22:nvasG1x 2\YImonUN8;ND3!2Requ(FY3Ҩv2p5  ?y9`p876 GrnaY, r 3metr9d boZm 4JK|>un8ed<(CPU Ot _05HInnoE#K447K627K58VPKOxmgr%N0NCs^$?9;2wim hapa,>p F a(y4>gc! Xnt fq' UoMuV  BUnianPo W13497lQTPM f 9ly  5boote iwn!] /mur o : KRegij#wsot4odu8$e r560hUl'_df_mn:&: 9 "LCAP_SYS_ADMINr1` n7&8Hm7&f4&Fdt"du!$#"*egor&66Ptlwai;~;a;DkJif*_Ap_msg_yDd3&%ObLPHPOG-=dl [J &+[ LphC$pg!Ion`2Jckps73RNULLDerSOAP-q6L-GRspcP8of6491fJHD<)R N2ChaOut426*!PcqP: zipEf Cexvi(EOCWLocor*fa@)_f82F,kN+l"5h6i: t6 ge+G `=s 9_ vW#B_ t# b\r?t  (:>Y+bng8va a mil.gbEmbl)f^gFJ P/lUH1rnmAmbY7)copyѡ -ly 3,Ŧk< files), ranlib (for generating an index the contents ofarchive@eadelfAdisplayAdetacdGmVo6bout binarysize>lis}psec2uobj )CBtr7sEptablefromvpcard4symboland addr2linver esstoR/*). Security Fix(o: *utils: GNU B Linker heap-bas7ojflow (CVE-2025-11083) FmoreesX7xissue(incluݢ impact CVSS scG cknowgmo/rlatferR pagm},R&enc'. Pythonfterpre4, a'v-orienRprogrammlanguq, whichemodu, cla, excepy Ry high level dynamic data typedl. supporfaթmany7m callCUraJs well.vou`ows;s 7p: Invalid ueOpenSSL APIyuse BufE-(en NPNwu`W4-5642)ecfHTMLParsIquadcmplex6069CKzip(EYf Cral DirorLEOCD) Locatow*fset not check5-8291ulQʦi;s.path.expv()th r-rolp75wTbppy:sVvidecu-ities ipula(code~ߥItKar, gf, lnmcopydumpn5CH toleObynumbff.ux, UNIXsimilapU necWQbo!cl _er o6ssh:?: CKaiercl/Hex\via ProxyComm 1984)rNulon// URI(oҩ u0yu >6be{.  applic curn ha20 poly1305@ba5987Mozilla.Eox$-sourceb browq, ignS2st[ sia[, pG Raby f: Use-aftfrexWebT&sKChil193'@AboIPC StTmD coulOrigg8^d$B鲐f0fUnqeccGC durRegExp0ilHK4KCkjregrPHKlbforhrW5Wthu rbird: Mem safebu7 ix"136, T5ESR 128.8'Č8ŌJITru YWASM i32 `n 64-bit CPU3P15.21%7ŠIncor XSLT sow o 5-of-Ends 2dQ%00$ faklpsgTa jar:Lngjh u6FKitGTK%Alreᢹengo :wBH Lkitgtk: d rQ mD4352 PPfmaJ l/redҭGa 5r01^r3`r5_r6CrSaf q41C bona Alma ; TeW th gi`b.T/\r- : EDeniTS i2 unvr\Ԣ;o z6815kThi' mx5domainoivirtuXhos^Sifi% ACME utomcg5te wiC bfigure d.oirĜnatIewal %'_mdpacHTTPMe_ (unidVH5575GLarge0FSa (LFS)X/l!bsu`a  ;os, qrpD0 N8s9ior7n#rtUR-lfFSw*ar .Ml2662.[ ;elm֣QsgroupW 40." F 46 4 43 ] RTC: S]alO2R mis.iSJavaSc:t  X8Sbe?p n ect dixmyGWansGLx PrivgezNetmN8;N9megin*icy,pasReqt ҨDOMkokΰp5 6y4~httpd{3pow+ulff R|?CGIonJr6508QUdir+AlFO[Ifd6200dDIPs _to #cmd=...g58098[Vj work CFu0(VNC)%}!oariew2cGYktop%onj oma!nejre vrunK ,Jt!. 5IL ne!l de Y!turTiu -  X.Org: Xwayl4ro oT2659xoFxFSyncIQTgH6FHPReEvK0K' Mze YRediW Y599YO PCctePaBarrCX8X ikbCT!OfKeyM7MHKWCSymsGXەVModMaskTII kl a4H!,q+# K:PI:lo NULLder-"{3-5260 Mvsock/io d` cocWvsk->tviO#0264iHID:: zero-wU#MI302I: bcm:# UAF_@_sh92Am; 9inc_p_bulk_noprofš3113XALSA:Cb-ZpoeExtigyMO de#sm8.NET6Aftwafr5 !b%C-%seveP%n CLRZaaN2-i4 fbthat(]vul'* n 2 . upd9U'VSDK 9.0.104Ru"me3.dot( E V×n-InMmr.hAs8&+24070jBugEnh:(TBZ#23497"814^$xml2 d,opO tool'b)XML`# ? {E AE FE l617 7St.) $Snq/fE[`9~+% I d p2Qz%$Dslp* dVVoa $1,Ģz&¢K s%ll,5r)8 )%tyl"eet me%is9 -s.c:85v*ipV- ,"]. s,ac0nE4curpy*%us : s MP43dO"O"7347dGrQ&na!. !., furmQ%S!dx&boj! edk#t=luxDB &%SDB go%-jwt/: -go8^%veT-hi4r par-0"9jinja J bkt gh%trXseT7as751'ExpaZ C\ B deNI,Res;ISE?C.DjhFh817k3 E0B2Spoof8non-BMP3iT57_9)Y3e8/ -orS0_ 7_ K 9=K 9Ì30GI(5;ImaM g: "6RCE3-4t2PSD222psp g333c?-by-C-AU0s7 lc?gBin%1ok// 592W(TomcR 2letf#e!AI+ )Z+%Pa#(JSP) t,no7#Ctw: -TOCTOU2Q+"7 GP"Q/o<,Ilosc <O LPUTE 48"kXH84-rAis[ex@ra*?rossU/n4467TϳH5455[:Loa* i Zs.5tC208һ?M:rD<M:qXq3042L` oF ,L, en\i:gob:f3l(Dezr.6mesbs6>7yMwux-W9anw&sexh34:A S8jl5FlirpuVPNK8tpGo$s JJbn/7gViJiM. ypod -/o:s.0arClKvc-tJ+'iQa:cDNSueJ }w1Q |.4-/x/crypto/bG=t-BA`28zNj -1. &-jdk pa+4JK& A&E1*Sr'Dw$ @.etTLS'nJ 15H7i. 6O:t&e/@fha6798717+21 +d[319of=s ~Ssfin5clB152&(GetInheriHNsLP)554 ^|*=HQra= (UI) Mis_<h |o5.BXIDI/tmp :< 28'BQLD#?had v<ede<Fүghc i# (/POSIX $4p),Amath%m)ۢincdaeK(nscd<plBKsWi8q{nZ@fun` cNFl "/:2a Cg's Tr=03=PHPJ_-e-d Ls ly&OjC xphphm?' `iysqln`89bS`byAver`cc.quotX8c-d'Y112vIZCaxyXxtFghtE* CRL=j 2[sh4hHV*fewrZer%'es]C |Zl*1217 FK* ?omitNh"V7rRVsWf iC[?\lfW ml lonIM- rGIrBeN@)J)tDcaOJ ,1γ{86\5N(JUs;E8 n +iFe EY-XP-408V? bH ":"`OinTsw0Z5 8 10 10Îݎȍon3 F5RubNtn'a', has4&&! ɢ BntI @%reoS=RE99"6rk-EVBhav 'XVwB5sp, >]]>4 Ê#46 633K~Pm&e6( :Ui#WTP@7220:MFC((.n @ I%foh"m?f#jI, me.2 +Ō 389m?(vLDAPD 3ZYv3) t % L} we jAAP[^)R-k} %dminist/ -dsB: niKq$"9$gA٪Q^cust)POS fa>1XVM 13OSTPi%BGuKosR_hood.M>[sqMx l;,]o\Glo.* toude#+) w2eoliSckpc[$RU:eE$ HVM,0lf- 8;ZY= m-4(elTE6e-i e:u]mLiH3'ro88539\!000:e_ure braDnQbA 0+FHj Us0֤nNc'XiVOD[eW]es-e\XqsM*{T-N-mid[.i6Y fyHd))isK,>6465A"Z(R ntsg g*a519?Eetailed information changes this release, seee AlmaLinuxR Not/linkMfrom&Referencsec]. Trsync utility enabl#2user o copy and *hronize fi'locally or across a network. S.withofast becausonJsenddifqoverfstead of:ing whol. ilsod amirror:tool. Secur-Fix(es): *K: Patrav$al vulnerabanr(CVE-2024-12087)A--safe-p"bypasVЫzpeN8NRace CoIHlSymbolic LqK74 Fmoryboutmsissue(s),acluo impact,LCVSS scG,knowgments,Fo/rat,foRgms,Ad)C7֤\_Kerbeqau0nticsym,ich canJrwyourEbliminEn-e prac_eW8dA unryptө. It ows cliereeaڻahelpaudrdrty,"#keystribuc]L(KDC) krb5:fIen cululog bk s5-24528AugnutIp ahid[GNU Transport Lay(GnuTLSbraryhleM ographalgortmhtocolu6SSL, RD Q: IuIneffic DER Deco Gtasn1 LNmo!DoSr243AwA3"atrs AbsttaxROnASN.1,(specifieX.680 ITU-TcommP:)sct}s manB}nH&uishWEn/Ru(Cypl90) e"=d_funs :Pf13CImDNS f A/A nncwa'quest nfigd ol.z$ %`src/b/mod.rs` js/avark-dnMTCP Que} FlaweA(|Deny,Sy841BPyxn m pre, D vjobj2- ^xmmZlatod,> y exce vhigh vel dynamY+ ypel. sup6t aթwyN lCiewell.vous ndow̤; _p: cURL 1 e quabrM doma 093A s!buil.c`omd OS `if:s, VMN .OSTr i%. useOsSd5ho  BesJ qM>.itcpload*dirlyloudgisp=b<o-|cpit- o-fips/openssl: Meyck er Qt RSA/y4394)d//cond :y: C7EPEa "// +1"K tagdeep"neexp s[U/anTu{staexhaus34158  FIPS zedo;9355EqP BGoogle'sC .3*Fed? yet:tRa flex,8"ommeism iz|ā : mafc2-1941Erpm-oҢNorbioge;PMתLmly boyile^saaabdAthn-IW-:t_p |6 /srollG - :sct_n_ affA89Bk BX.Org-s]c+cfBX WJ > bas " - afull-fo4 U asignedW>kxorg-x11-: tig heap-ba! "privrg s_ 632A 4: Xw - se---r5 soM 652 : xF; InitTrig()H601HPlaydEvK0Kuninite oYKRe Y599YOuf-YwףCreuPaBarrCrX8XBTXkboTzOfKeyM7MH?KWCL sG6%ەVModMaskTI5BX frunn;XW26"r ,r1_ +7aO*$, G= s3toperatgo'^42 4&g4_9 - :3f:5N%d 5lk=.D3v2rjnSSA i1i,M_Gnel_m[0^ %LRCӼ83Ci4rF StoragLF4r%l!:r'aX%h*seG s!!K *!t:h0!or1 &J5/4pU&@7cx&kposhake#pQUICn,L3-3932Kil o88tL oS2S8:+l:=1.'i0nloop2238O/ip n|'e5eh or)Isc!+"IPv4:pp( 6 add'esj9b[http:]()0)'r 100-e MEkzp'Of r r 6KHF<+Yi 2000' gjpehIzin%/$olor.>5682 I/%2/j2kHBc>R|nt?Oe "2KitGTKۢ%@! Yweb reKe: Bp. Lkitgtk:1. malek1crdvO #2a!C  5sh 419 rAis [exZ>Ggi1A67TϳT T V551VLo}iZscri83tDFһ=r9CrSafq16ZqK 4ahS+aTolD &ac|6OCI_6. A gngs,cJFG\:$itRNiBscur.n a{5r;V$KlWB6uLiDoh9r ;<".60 go-joo JOSEQ4"Vw'lu?71" 389C7' 8Fn LDAP t7 3v3) l'l!t ^^d wLD twejAc5^)Rs2LeLiej%dminis=-d]nuc ]z d wsk oi ins{Ne{gz ge+G lH` /aFtodcifyN xGi7x:P HTTPpJ,laTcu: psJ5a}m<<< n<&ruOngx__mp4_ 2-417H#M:=sMH2HHQL24-734Gr^ na, fe r7rd boar e\ Gt=InfluxDB & TSDBjwt/: OJ vyc du! he&"+ 204i&@a!PeHvirol`L"en"4/a2=<' qS :u 'SsT10Iel, en: Q pQa'/os4yxexact$@le!his/n2no,lwCC6>o=En))Ǯnehavemisp/us; irG$ bu0Rsk sQ>ȥnoRD gi' baANp0'/ݢztinAJ5 Jxsl$PtdQdXMLGg' uak HTML,ez&¢Ke,9 lyA) - >OCXSLT yheetL@ 9\&(GetInheriHNsLP)5549 GIMP@S^SI MEpUUP)z ?i K.RDY"V736VsWf inv7dKnlf4f/ml swrN-""sR r8euR)9 )t:caHJ c1UV861Viun<n__shutR"s61123 _h_ id}_w ID2^x \GXhI OJ!&n: P \/iO U 2.0B :- OIDCPrlRM# PF lL-u314.hk%ssyrP1S1PDFcu.P s4Jt|o"tmO"} saC)G p5d/prR >g:ng1%<=gdevn#_Sr_kB+DhJrX`l6kel p4:!a! n! zK0o_u3/sqpm.:u(BTd->th3-ctx4T3Msoq6 &void oIL[.numb;58007Ztpm:!dkvb()WeAAb/acpi&8;Hrtpcf85063:lxqV]).'PCF$ NVMEMZ69Znvme-tcpU`,_,_du@ Usi_ibfLF_UBSAN shifXK/ar*Dih._xrW ow_;,f93?pUNk.js >@ dop~$l-k*GNhppl szJavam ( M c-ar&&2F_ w 86x8CJemoE $NDEC VTTektmx 4014^yV'3nwl :Y e OSC 50pu  HMozillaEoGPTbr $O? "-((J .f:bk;&KҦUBh8QUnjn a tX s4nΨ'ison"j "K^I !*(`(sw3w өTbugs $138,'5ESR 128.10(ÎM3ݎȍonfLn$vdm-Z uoftMferru-'!inceI] 'haP g7sjC. \Qs-9. Y%$wpst{ 'byOm /2ΡZkG ry oi'7/9o;$ { Fr:i$EOJ6uni7e owth" Pabby,odX 67YpiEpGNOMEktopto5;&9qiex 8ra/ml fo aXFZ*Hk 4yf# 59j$ LO#-"hN:t(zugh bYAmysqln92ingle98HO.quo-B-HN 3ZC*o}k*̣xts&CRLF(j}2 sh2زJSQL$ NI>72_N1C, a CVSS score cknowledgmentsnd other related information,fto "HE page(s) lis,R&ences sec:. Mozilla Thunderbir/sstualone mailnewsgroup cli. Security Fix(es): *sR: UsInterface (UI) MisrepresJ of attach URL (-2025-3523)XI  DisclosureI/tmp dirory ingQ2830QLeak?hash=Window credials viaaf\ү2) For modetH[bouts:issu,clud impactiTlibspx9s providew HTTP vl2ratfGNOME *ateg?ov(lvappend_param_quof205ŧEHeap buffIsniff_un>n()E2EsFfeed_or_htmlKkip_insig!icant_spj3jOqndsadh_h ersse_requestQ906QDenTiceOwhenOlargml|ranwith R Ņ7ƅouble fremessEget_co-disposi{thkgh "7-7-7.c""s" GHTaovalueĚ11ŚNULL poi derwݧM"filename" eUi),GtP nofCM-DMV1.dma;seVAuthoriz7haCfostbee@rbyA4642ZMempGqual_ƫ`0GAvahiYnler6DNS S~yMultM#spec]P&i bjs918)PGmizQlarmMG-rZ``6784 k$DwtBJOOB9ad(@I_mOH t__"#StoBJexiYpÚ91 Uu ԉLvo'i48Pyn4, a've,7Iergm  uq,c,moduldcl*exce s,y hi1ll dyR i_g !$4m cC. ,2well.vCv$̤;  nado: T4Z1m-DF;728gB s 80,WaM&gmax l# 4St7me #R( mapba{5 D$;gVer1-p)-bad a ll1-  &: H265dec PS-BJOR΢0ic38 )Cb kjaDcould ve led $#aapayArd"'yPo, #`eV?Copy#cf*?g b4b%safebugş8]ZŠ FCGI Pq6{ p*-fcgis:&0.44 0.82,Z =.6.\2 (aka L06'!gsfiCwnhiH/__udp_.192"v:ce =lyde A0Axskv:xp_ _a:as _u7 [997Xg} veng.gH2&H/4I9"( h12umin"_rx_h_Vcap_n@b94%gc 1"(/POSIX wp),Amath%m)ۢin]7cdae/(nsc23@\ 6Wiunn;+ /:Luid(dl{(!sLD_LIBRARY_PATHV80/x) 1717P/039971766ModS)  r*de%+en)"^6  #cHPo  < B 1` Co-Pilop< se -pm =>PCPbpftrIc3>da,,$7 getbnx2esizmb-xdp-4cas"11 BA 0OL2CAP s->7)i2 -F_cmd]9]$ $3cfg 11: cwiphy_3$efrcS7ŲUUAF?i>md!Z&fv.*)nptKubt 8skopleN8j  /iH#ge+G Fend.4.'vfy<J%ah;:^P{%OCI Pm1thiNcSb P@~NRN,\NXsc! 0r u nA/O<r ;V$KlWn?ck%|;0il0? 6A jl7lirpuVPNK{ FQiGo3bs 9PgVis+4Ka~Q`v-tap-AX1tzSQT_960@wVi69GIMP (GNUNM.pul PP%s(!X/,.R0al\l1:upon xorg-x11-k -Xwayl7::?g ncH.BH.X (ExteWAnimzCur T.7'"Big st6(tUn?DS DI ByVI {80)ud9 (R R)y8VirtSW u4PVNCvX('XCB` GdR? )oMrep#Lunn cny 5ne5vt7Y )i!5`#Y-7 7s=tbl0 a^GOb%oQrQire(i 0^s 'kbr1RO,LVM, Btrf?LUKSbMD RAIDG"PE\_act$kro%<Y:u@c60M>'__ idc -ID& 4uT Ap/?S ban!@9nRe2PPci4V*nKKs^pioISO Y0 CD-ROMLis#noVybsdtard1\?%:pO-񤄦poo # lR:K1/PiVFQip"`([#JiS'?Q |o=k Timeuuino 7P>xy_sLe.ESas aclrN %dž:əlMCTt4-1030Epowul!`bFng&-i*l {AJ8&(el)袪- e-]C e: jC BXLrro k,(q3{=Q Gy_kG3qt5DG q, xml B3Q* n:6:*CnAs FvK V54eEdg MX (PALto 7up po^eZ.nLW&Hv L eH {\1m:g |I b0w s%;=OS 6%fa  Vg / 'i%) sS)Bhoo+BlqMFuI , > ~o6*co#ble< !e<'r-cli and cockpit-composer ents. Security Fix(es): * net/[http:]() Request smuggling due to acceptance of invaliwhunked dataQI (CVE-2025-22871) For more details about the sissue(s),Lclud impact, a CVSS scG,knowledgm, o/r relatinformation,f̢R pagm lis,R&es:. Comm^e utilJcontrol osbuild5xTbc pv7s providet{ard C $rari (/POSIX&readp$Ah%m)ۢinam0rvicache}emon (nscd) usby multiplegrams osym. Withseq,$Linux*fnnot fun ~rly /: V*ogfr overw0e bugtW257021kernel2a4a!s]anyoperӮ oK: Squashfs: fix hɢsan95ckmxattr_idunt3-52933sudoIwhich allowsadmineorscerFus wiQm (,ex!tivilegcorefgu  pur.hav^o loAas root : LPE via hoopz3246{Open Virtual M(2Tooˡע;o"sourclo~!VMw,6. Vy, Ew ar 28podmansx is pWo_"inu~fv.D ##Kubut 1wbnv'd|-q+] N4 (DBMS CREATE STATISTICS do#3" ma+pm7)vsftpd SVe emT"mProtoc(FTP) EH xTn :ji$ N,!me)p424&Mozilla FiEox6%&web br 0 igne'+0H ,%U fpo ng7DownloPax>&32MUse-af-freMJavaScc[ GCL6-0885KthbirSM safe+s pOESR 140.7,&';)147.&91ŏS1b<#pe d, <ndiT:.sWebGL78SIPH2 Eng N4NI.!lossVGQO3OM+gNbypas5DOM: -JCI#&sDragD^^C kja,bg  *ew6/h-9j]8,I08I-snmvb%+6p1E+s%Si(M SNMP\&ena,hry3:qet QS c1u byU r USB '-fa maBt#-ta, /c se/veB0xil 4-r ETCP 29 6×E1 Almab6/limi.e [% ;:@#_1euAVCOM? 672"YA ~*SNMEA2000wxxcdrm/xe#k;ma-f4G ru3870m#:!t v_done//_off, lengthir3['q97vmwgf V $s h .aga SVGA_CMD_MAX_DATASIZEc/ cusbhwc3:R &r (twePurrF+_$v(s\/h"828ol6:epWuq /7e_W__osd_ma\1I (7I MR4P6 seng.R!l2<4 chan6cn%s,! csub-pSlW9&an:)akS:c/sI, (4-levelo i~ :H@'CEPNM Q0 @144(\JP2\~+f5fXCF ~$AFZ4ZsJ&ͱLB=j"V4G)04 ;rMp$/%^4tejC4]@J.--=d eiYN,nQAvElJ0c@ p;" $g__;_iPYA0XPypTn pre4, acMO,0orEed.bsQ(,|M xi6,y hDdy~: 6typxinqP!1">#m tdC,=well.(wiQwAurlRUnedrAexh&{o64zGa St%nPQ7Cly[Il|H]nE]qD"mbcg&x;foK:~AreE%s®6446g%YW mer $&zoA&381r$ntpollE349E&F%vm_bi$ioctl8uyOg_F73ьJ6uXJWqYu@\FA8\ cO"%2_8_H 4OĬO)BIGtoMGMT;.|<7É94ĉ.:&l$cf H 0 RX K@830: hc] :%Ai\)teFa&)-a0a Xs /Mpo]y;$sIo[T]ledGnr^[no -Ac[re#Hed(d1e. 1C cur l*lL]or d$]tn@suchMicrosoft WsAchinxJVirtualBox  op nt . 53IȎ nQ- r-vulobyv8vj3jps nUs %GFX Q updfs%18v9-suhz hz2,<:vsch;nek<g a3778xc½rqWp/gv2mVW81WRDMA/"KASAN: s-UR ib_regr_"j bl k8022ãyrxeԼa~4~MrujSquashfso$ bkze cuA p415pvs3/vmcCk ns r{ izitf03+ATM CLIP !inrs59f < inGm io_u /net387v<USB976pus st_rcu k_up_capsF7Fipv6GRCU>p6_xmit83=Blue_tNISOpo UAF so_ _9N41ه0hƉ5zUi_mdiN+ yey2.Å271Ѕ ALSAari:! gÈ6hci_syncrcmdqueue_onW3tphn HTTP@ "~ GNOME ha: S"eU Con ErrOLS-B <inNTLM Auth^c6-073WMultipa Pym r 6-Keyl!TPM3Ply lbT attTr$tB$sol : K%sau^rdAst:v. ! Xiq $CP"GIMP (GNU ImaManip P})n!isiedin 5R@4Uo1> s;ɡ34  -8D1 XB:VQme7g3*aȪSgQ 2550| plu7P.`ncei$-Pilote ta|8:<"se e0pm Re ,PCP\ bpftG&<>da,6sev3  hd W_c_p#w _Gycle_I3KDou#.[exFAT '38266-2285:glob8<8oll, I R/F (OCF) Qc$H. %ahO,.NZ< VOCIQ9F %g¦c &s<to:( RNiB @t: o'aB/9J';V$KlWniWal ck{O ;i o RpodD>-Mss,. 5o5yGK"Pfv.ac7ptKubVtMozillagEox w-0webFws ,"H# p: ~vptL8 244$fc.iR%Enga 5bOO785OusafMbugm$xT3ESR 115.33,40.8,. bird)148&&–93ŖUn.eoDOM:l&(!<8#OAuS: JS1$66SS,defDBO9O dL^N8#">misKil$!k83uzX!MP\MFg`{M;۪:::^59_L>(.κ62+WebRePv"AVM+GS_S7d4So y i{JARWVj?7xsK7Wm' *'8p8pt!RT[x5 x2NP[8back"*7(A3Sm[y,p 5 (f,c+V( GCK5CQ9 BinSIDL)1skjletinsl*Nc0ge+G CgH&X%gy ( s*n T(CNI)=i("k-g(=&-=c@Nnn[;#lYnumb fw`aNXcvsOselfw+=p!c!t_lBbKme& O)lH]N"`_ze0! a65q.000NG0 0EFNsin _fie7r{CAPI280s ƀDe. ̖4"-u:i51Gish_„6p|1gH+IU __iV}V7 &ZVmc_cl Hrfx_m2 UlVBUG@pskb_a JhhcpdV$Qrb710bIaadXYhulbliUQgW09s9Vala1ladv'\<oft:f h,(&e!inceIO)~ "h%0s, s s . Y =SouPQo5Jkeenaդo;xS{; push6; Iu3-:,y=o diY;"9dmeh 8 Xd/M"z.Ne"e4( utn4avs -2XDey ,:ap(st[#b1[moʥM|j1y IXi *o8vnGZo3 4o8 tD,to-Zis^ k!_fCne]r5st Xhrwz2l+-re on net liCoth. Ov< )TNaVAub/Sub, Lu>,U limi'l l Ys52 ǭ!nAƥ' osyDsi H:U]2zqP]nulltNin! v}*Nc7bu^18!g9$z!lonVimnews81Vl!1teger overflow in the Libraries componentNSS (CVE-2026-2781) * firefox: Use-after-freeMJavaScript Engine: JITZS66SStoragIIndexedDBO9ODOM: Windand LocationU87US4box escap 8OInformdisclosure due to>mKil$!k83ucorrect boundary9ndiasbAudio/Video: GMP\MFgbypasP{SecurityM4!Graphics.m^59^_:axd.κ62+WebRe0rPvPrivilRMessag SystemS7me-origGpolicyNetworkYbARW90HTML Pars75KMemosafetugsXF$ ESR 140.8, Thubi)148N&"$'+'8p8pt!RTC: UiR2NPlayback"*7(Assembly, u05 monif,c+V(sCoX&zGCK5Cach^9 Bin(IDL)d Fmdetails aKtMsissue(s),qlu] impact, a CV6 scG cknowledgmrs,o/r reg , ѡ΢R pUm lis,R&enc s:. xw,iproxy \vUsupportHTTP&tocolwith@focus highHpy, p }- mEus. Fix(es):: NGINX: Dataj via Z-in--middle att#TLSi n6s1642Thpqa4v.sild-strpm auto3 fslifyUcreof Go langu6(go )\s. It do]not neKbFdefault roogo-s-macrosm eu>bina%ysDng&t }9c= tuq,; hecksnprf aurL1Y\skip/AJO(o.‰G35Fa-e4C difTt7Ksx,vioISO 9660 CD-RO7.G86sMJ470H[N15.34,N9N9N9N9ã2ӣ(J4717ZJuJ5 AcOVv6RN*NCanvas2D6.kENP)c95Si҆0SXPC c P2T',Uk+1 Ra&r,uPS4mUnIibeha1raMQSaQ5_/1b:z68/k R4;tW9Q0dXfidgC a_2]76p3aVp9  <6M0 1%C 0, CYut/3- : TBuFoK o `< Wn R/1 e/3'd ARRespon/D M` <[4 0ӏiV * p8^70 !qU0X41a5!#M Hmd/gwI"-`l#pkg0figOQ53466IPv6QD!li2l/66\FbRDPo'8DP3 (<)$SAp([lnkO1xardp/iMiW(es%, xJVirtualBox L# TCon%RLhlan;&h! v-GDI fpipeA3p5CsbH A ATM)+Fj3%%Jdrm/s d%poMdou5H '_'_job_ +_v_depgnc(h400 I kyDAMON,fs 1!=1c31=5 b ng 7au;67rash .!~71~scsi:": i+'int__;__co,I1 'IerrocIc"1_6kT2TXc:u32:h"b_D7_L(_caUulQALSA:"2 S9yea-PCMoMiU  ]lo08sg*)OprOxoOu4V=N?I2P43Uijpoof)?(>38 ;u-xslga-y`MdXsb@obuag3 (s,(z&¢K+cr_n<.flyAk.) gJzXSLT yheetmeSis /+con/y nqTM4 3405aM0ions, very high level dynamic data types anding. Python supports interfac.to many system callClibrarieuas well.vouindow_;s. Security Fix(es): * p:: Commg-line optiinjec rbbrowser.open() via crafted URLs (CVE-2026-4519) For more detaibout the sissue(s),eclud¢ impact CVSS scG cknowledgment o/r relainforma,f'R pagmPs,R&ens. ipre4, a'vob&-onRprogrammlanguq, whichemodulclassexcewXGStream?[ s medfrwork basen Pphs of filsO1r";!. TygVer1-plugins-bad-free p con>ncolle1-fh &: Arbitayade>eASFe3"s2920)ZRemoCWEWheap-al~ideo_tim4491NNULL Po rdp__logon_B_v2h 9aH̰play_thfd84!urb_bulk_wns_cbW1!W put_send_ W Z3Zse< _p 9!ZW5 =  m U 31806 ana{ sourcfeaturc metsshboard toGe, InfluxDB & OUTSDB net/url::rIPv6 host litlsץ35i/ _P Co-Piloteta sab Kirom pm Rl Pbpftrsscript>da,2sev& rsync  ens2us Ycopy*hronize s loy a8 X.F. S.withoiafbecagonly -difqf /t:]whol zlsodCa mirrIool AK Oy array Uati xA5-1015 iSSH p ey$umber:Linux, UNIXsimilareI{ 3{boj! _b ssh:?GSSAPI69 closrd ` dueVuninit6dc497Mkern9s4!,0" K:Y (mlx5'U ECVF vunload l=3810O uKPrivg Kf_tinWe* ck* 111I mri2ZdiuVSIbuilds210s _addch" cru OC`un 1:ci`- r`d0892n xiiqhs, acus.npy, me7y' : NGINXnspeci MP49 "2647_f2iaingx_http_dav_c76t-upxb78bn Mrequestem_authӥϱ7; d1Git Lar FWSag_LFS)X/l!Rgao sa$[Pegcsp2eaadsGNU/_ %}   oR s= figurw& %p~, ,gn , SEk uhoo N a/r* Mc: ws: lZt? =+Vn{[li46> = Mozilla(Go[ %-r , ignSD st"B/<U ipng:&"  334adE=o*////NeoD 0g 3363th! r-f{-safebugsUESR 140.9.1,O"F-149.0.2,5734215.34ƒH *ú0GnlsS42&G: Ton@yThifA Bay4 XML d'"s;t2*$::PL4::Ex Z*bJ[C k's0b. Each)oS hoyregnec-Ȗtr%\. /v/y,$d'0c]d%seEx edAFm@eHy10+&givenra Q<$zcayrRtԣ- erl-xml-W6:>dey nem06&00] `*l:K-g)w x.x NtUM`c }:ck+kinkrv n790 M%BJ (Berk&yF56H) i5DNS (kS)P. d#a3gP@ d)lv$\ IP z&Tes; a&r (rout5t ^);_K,=yais(pr l b#:_ +$sSEC-z1#* }8 ~NSyX )YViVi IM ߵBupzimKPvi4 ~vim: V L6OS 'inM3w3]84Cd R0sw N84?p(fun`U 8 -=9.  &aC9plx+9r s9oA jl sgMz\.NETm;ged-|IPnubse8XC J6ssg;i7LRN2 KJb ]nvaio U'VSDK 8V126Rx326.dot; :4: &BNEV26)Vta5=C322GInR1XmlDecryTA|1QeDSMC I#HMA8"17:war v k S!I C4-񤄦popu;d9 *r 4R: -!IRARG!~442x fu51 paO-rpm h#ot.UGon(go )\doesvtpT'ault r : go-s-m@>lull9Gojw@ ./?EXR M9-*fc=Y-0!7quaADfZ1is4 b/9fviq?o"sRt/eWDremM iXj+abDg A&exr:- e('{(762!eE@s>d:keke_enm+c